content
stringlengths
0
1.88M
url
stringlengths
0
5.28k
# Committee on the Medical Effects of Air Pollutants Committee on the Medical Effects of Air Pollutants (COMEAP) is a group of scientific experts who provide independent and authoritative advice to the UK government on the health effects of air pollution. Its core members are typically senior academics or professionals drawn from fields such as atmospheric chemistry, environmental health, epidemiology, and toxicology; a single lay member helps to ensure the committee's technical work is accessible to the public. ## Activities COMEAP's periodic reports often make headline news on issues such as how many people die from air pollution, and the connections between air pollution and disease. In 2001, COMEAP warned that long-term exposure to particulates increases risk of premature death, especially from cardiovascular disease. One of its recent reports, issued in 2022, reviewed almost 70 epidemiological studies and concluded that air pollution is likely to increase the risk of cognitive decline and dementia in older people. COMEAP has also reported on the relative risks of breathing air pollution in different situations. In January 2019, for example, it reported that pollution from particulates is up to 30 times higher on the London Underground than on streets in the roads above, with the Northern Line having the worst air quality. COMEAP also advises on how to best communicate air pollution risks to the public (such as through the 1–10 point warning scale used in London) and how people should change their behaviour when air pollution levels are high. ## Reports COMEAP has issued numerous reports on air pollution and health, including: Air Pollution: Cognitive Decline and Dementia (2022) Air Pollution and Cardiovascular Disease (2018) Long-term Exposure to Air Pollution (2018) Mortality effects of Long-term Exposure to Air Pollution in the UK (2018) Nitrogen Dioxide (2018) Long-term Exposure to Air Pollution and Chronic Bronchitis (2016) Quantification of Mortality and Hospital Admissions associated with Ground-level Ozone (2015) Review of the UK Air Quality Index (2011) Cardiovascular Disease and Air Pollution (2006) Guidance on the Effects on Health of Indoor Air Pollutants (2001) The Quantification of the Effects of Air Pollution on Health in the United Kingdom (1998) Non-Biological Particles and Health (1995) Asthma and Outdoor Air Pollution (1995) ## Membership COMEAP's current chair is Anna Hansell; previous chairs have included Frank J Kelly, Jon Ayres, and Sir Stephen Holgate. Other members have included Roy M. Harrison, Jonathan Grigg, David Newby, and H. Ross Anderson.
https://en.wikipedia.org/wiki/Committee_on_the_Medical_Effects_of_Air_Pollutants
The third progress report from Sustainable Aviation (SA) is launched today by its Chair Jill Brady. The 2011 Progress Report sets out SA’s achievements over the past two years in working collaboratively towards its goals on the environment, climate change, noise, air quality and waste. It also outlines the new work programme already under way in SA, a unique coalition of UK airports, airlines, engine and airframe manufacturers and air traffic management, set up six years ago by the industry to address its long-term sustainability. In a speech to the UK Aviation Club, Jill Brady said: “Despite the most challenging couple of years in the industry that I can remember, members’ commitment to Sustainable Aviation has not wavered. Real progress has been made in many areas, not least in the management of aircraft waste and local air quality, identifying and proving new sustainable fuels, initiatives in air traffic management and airport procedures, and in offering a realistic assessment of the inter-dependencies between noise, CO2 and local air quality.” She highlighted an initiative last year testing a “Perfect Flight” between Heathrow and Edinburgh. Every stage of the journey was calibrated to achieve optimal performance. The flight used around 350kg less fuel and one tonne of CO2 (about 11%) on the norm for the route. “This shows that collaboration between Sustainable Aviation signatories can deliver tangible positive results and demonstrates the potential for future environmental improvements,” said Jill. “With the Government set to develop a new policy framework for aviation, Sustainable Aviation will continue to play a crucial role in proving the industry’s commitment to addressing its environmental impacts. It will also be an opportunity for us to demonstrate how our sector can grow sustainably while maintaining its position as a critical part of the UK and global economy.” The Progress Report has been endorsed by Sustainable Aviation’s Stakeholder Panel, a group of recognised independent sustainability experts. –ends– Notes to Editors - A world first, Sustainable Aviation was launched in 2005 and brings together a broad coalition of UK airlines, airports, engine and airframe manufacturers and its main Air Traffic Management provider. It published Progress Reports in 2006 and 2009 and a CO2 Roadmap in 2008. All publications are available on the SA website www.sustainableaviation.co.uk - SA is unique in the transport sector, established specifically to find industry solutions to the aviation sustainability challenge. There is no equivalent in road, rail or shipping. Solutions require the cooperation and collaboration of all parts of the industry working together. - SA aims to inform aviation policy development to ensure a balanced approach for meeting sustainability criteria while safeguarding the future development of an industry critical to the health of the UK economy. - SA’s work is overseen by a Council comprising senior representatives from industry associations and signatory companies which have adopted SA’s goals. - An independent Stakeholder Panel monitors SA’s progress and works with the SA Council to ensure that relevant priorities and challenges are tackled. The Panel includes representatives from the Aviation Environment Federation, University of Leeds, the Department for Transport and Department for Business, Innovation & Skills. - Jill Brady is Director of HR and External Affairs at Virgin Atlantic.
https://airlinesuk.org/sustainable-aviation-progress-report-2011-published/
OAK HAMMOCK MARSH, MANITOBA--(Marketwire - Sept. 10, 2012) - Two new plaques will be fastened to the North American Waterfowl Conservation Honour Roll wall this September to celebrate two deserving conservationists. Ducks Unlimited Canada (DUC) is pleased to honour George Finney, President of Bird Studies Canada and the late Harvey Nelson, former Executive Director of the U.S. Office for the North American Waterfowl Management Plan with the U.S. Fish and Wildlife Service. Established by DUC, the Honour Roll is an international recognition program for individuals who have made unique and significant contributions to the success of the North American Waterfowl Management Plan (NAWMP) in Canada. The NAWMP was established in 1986 by conversation leaders in Canada and the United States and is one of the most successful conservation initiatives in the world. The goal of the NAWMP is restoring and conserving North America's wetlands and the associated upland habitat for the benefit of waterfowl. George Finney George Finney began his 37-year career in conservation as a consulting biologist based in Alberta. His extensive field experience and wildlife knowledge later took him to the Canadian Wildlife Service, where he held several key positions including Chief of the Migratory Birds Program and Director of the Atlantic Region. Currently, Finney is President of Bird Studies Canada, a not-for-profit organization dedicated to advancing the understanding, appreciation, and conservation of wild birds and their habitats in Canada and abroad. As one of the architects of the NAWMP, Finney was one of six Canadian negotiators assigned to develop the Plan with U.S. officials. His leadership was instrumental in establishing the Plan in Eastern Canada, as well as in developing the Sea Duck Joint Venture. Through his current position with Bird Studies Canada, Finney is focused on integrating the conservation of other water and wetland bird species into the strategic plans of each Joint Venture. In 1999, Finney received the Prime Minister's Outstanding Achievement Award for his career achievements and leadership abilities. Harvey Nelson Harvey Nelson completed an outstanding 41-year career with the U.S. Fish and Wildlife Service in 1992. Beginning in 1950 as a refuge biologist, he proudly and successfully served the organization in a number of roles. As the first Director of the Northern Prairie Wildlife Research Center in Jamestown, North Dakota, Nelson later became the Associate Director for Fish and Wildlife Resources in Washington D.C. and the Regional Director for the North Central Region in the Twin Cities, Minnesota. Finally in 1988, he capped off his long and distinguished career with his appointment as the first Executive Director of the U.S. Office for the North American Waterfowl Management Plan, a position he held until his retirement. As the Executive Director for the U.S. Office for the NAWMP, Nelson was an international ambassador of wetland conservation and helped build a solid foundation for the NAWMP by bringing together coalitions of federal, state, private conservation organizations, local groups, and other members of the private sector. Having earned the trust and respect as a skilled diplomat among his Canadian colleagues, Nelson served as the first Chairman of the Plan Committee. The importance of his steadfast leadership during these initial phases of implementation of the NAWMP cannot be overstated. Nelson authored numerous scientific publications and was the driving force behind the highly acclaimed book, The Flyways, and brought incredible drive and dedication to the NAWMP. Both extremely deserving inductees were honoured at a ceremony held at the Oak Hammock Marsh Conservation Centre on September 8, 2012 in Stonewall, Manitoba. Ducks Unlimited Canada (DUC) is the leader in wetland conservation. A registered charity, DUC partners with government, industry, non-profit organizations and landowners to conserve wetlands that are critical to waterfowl, wildlife and the environment. Learn more at www.ducks.ca.
http://www.marketwired.com/press-release/ducks-unlimited-canada-honours-north-american-conservation-leadership-1699496.htm
THIS WORKSHOP WILL LEAD YOU IN WRITING ON NUMEROUS TOPICS TO: 1) Aid in self-discovery and understanding 2) Uncover connections between current challenges and past events 3) Explore and address shadow work 4) Stimulate an ongoing practice of journaling Hi there! My name is Calla and I have a degree in Counseling Psychology as well as a personal therapeutic journaling practice. Journaling is a gentle and effective way to gain insight to create choices for greater mental and spiritual well-being.
https://www.practicalmagickvt.com/event-details/journaling-for-wellness-2021-09-12-14-00
Immunohistochemical detection of fibronectin using different fixatives in paraffin embedded sections. Different fixatives and immunohistochemical methods were tested for detection of fibronectin in various paraffin embedded tissues: rat kidney, spleen, gastro-intestinal tract, muscle, normal and fibrotic liver and human skin. Using cryostat sections, localisation with immunofluorescence and peroxidase technics comparable to those obtained in unfixed tissue sections, could be obtained with the following fixatives: 10% formalin in PBS containing 4% sucrose; 96% ethanol; 96% ethanol + 1% acetic acid; a series of ethanol solutions of increasing strength: 70-80-96%. These fixatives also proved to be the best for paraffin embedding. Without enzyme digestion, however, satisfactory results could not be obtained with either indirect peroxidase or immunofluorescence methods in paraffin embedded tissues. Following digestions with the enzymes at the concentrations described in the literature, the alteration of tissues made the morphological localization of fibronectin difficult. The self-sandwich peroxidase method following a gentle pepsin digestion gave results closest to those of unfixed cryostat sections; however a slight increase in background staining was observed but without interfering with the evaluation of results.
Exploring domestic violence and social distress in Australian-Indian migrants through community theater. (2016-02) In many parts of the world, young adult women have higher levels of common mental disorders than men. The exacerbation of domestic violence (DV) by migration is a salient social determinant of poor mental health. Ecological ... Does type 2 diabetes mellitus promote intervertebral disc degeneration? (2016-09) PURPOSE: LDD is an important cause of low back pain. Many people believe there is an adverse influence of type 2 diabetes (T2D) on lumbar intervertebral disc degeneration (LDD). We examined a population sample for ... T cell subset profile in healthy Zambian adults at the University Teaching Hospital. (2016) INTRODUCTION: Symptom-free human immunodeficiency virus antibody-negative Zambian adults (51 subjects, aged 20 to 62 years, 33.3% women and 66.7% men) were studied to establish T cell subset reference ranges. METHODS: We ... The Presence of Chronic Mucus Hypersecretion across Adult Life in Relation to Chronic Obstructive Pulmonary Disease Development. (2016-03-15) RATIONALE: Chronic mucus hypersecretion (CMH) is common among smokers and is associated with chronic obstructive pulmonary disease development and progression. OBJECTIVES: To understand how the relationships between smoking, ... Patient-reported outcomes of parenteral somatostatin analogue injections in 195 patients with acromegaly. (2016-03) BACKGROUND: Long-acting somatostatin analogues delivered parenterally are the most widely used medical treatment in acromegaly. This patient-reported outcomes survey was designed to assess the impact of chronic injections ... Learning Temporal Statistics for Sensory Predictions in Aging. (2016-03) Predicting future events based on previous knowledge about the environment is critical for successful everyday interactions. Here, we ask which brain regions support our ability to predict the future based on implicit ... EUROmediCAT signal detection: a systematic method for identifying potential teratogenic medication. (2016-10) AIMS: Information about medication safety in pregnancy is inadequate. We aimed to develop a signal detection methodology to routinely identify unusual associations between medications and congenital anomalies using data ... Mortality of emergency general surgical patients and associations with hospital structures and processes. (2016-01) BACKGROUND: Variations in patient outcomes between providers have been described for emergency admissions, including general surgery. The aim of this study was to investigate whether differences in modifiable hospital ...
https://qmro.qmul.ac.uk/xmlui/discover?filtertype_0=subject&filtertype_1=subject&filter_relational_operator_1=equals&filter_relational_operator_0=equals&filter_1=Female&filter_0=Young+Adult&filtertype=dateIssued&filter_relational_operator=equals&filter=2016
Phaneroo is a dynamic, life-transforming, and generational-impacting ministry with a vision to transform nations and the entire world with the Word of God. The Greek Word ‘Phaneroo’ is translated as bringing to manifestation that which existed but is not seen. Consequently, what we want to see in this generation is that Christians start bringing forth things that men never thought existed yet they did in fact exist. We understand that the visibility of the invisible things, even the Godhead is the manifestation of the sons of God for which creation groans. The Phaneroo vision entails the raising of Christians that are distinguished as sons of God; separated for the demonstration of the God-life to the world and crowned with the glories of eternity.
https://vinepulse.com/podcast/discerning-the-signs-given-by-god-to-fulfil-your-destiny/
WordSearch: Countries Game Details WordSearch: Countries Flash Game How to play WordSearch: Countries Game Play with mouse. Click and hold to start the selection of the word, then drag from first to last letter of the word you found. If the word is correct, the selection will became lighter and the word in the list will became semi-transparent. Words can be vertical, horizontal and either diagonal, in both directions. Can you find them all in less time than other players ? Game Description A "classic" egnigmistic game: Word Search! With 3 difficulty levels! Words are extracted anytime from a large set, and obviously they're always disposes in different palces: every game is different from the other ones! In this set, almost all world countries!
"The Democratic Party must finally understand which side it is on …" —Sen. Bernie Sanders addressing The People's Summit There’s a war on for the soul of the Democratic Party. On one side are the neoliberal elitists who make up the establishment wing of the party – many of whom pose as progressives every two to four years or so – on the other are the real progressives. That’s not news. But what is stunning is how the Democratic establishment is choosing to cling to power in the face of clear evidence that that their center-right policies have hurt them, and how the establishment press is supporting them. For example, take this article from the New York Times with this headline: "Democrats in Split-Screen: The Base Wants It All. The Party Wants to Win." If one reads on, when they say “the base wants it all” it means they want progressive policies like single payer health care, a $15 minimum wage, tax increases on the rich, and strong environmental protection laws and regulations. The implicit assumption here is that these policies are somehow not consistent with winning. The reality is, Democrats have been losing ground at all levels for decades now, precisely because of their reluctance to embrace progressive policies. Now, the Times is not alone in propounding the notion that backing progressive policies hurts candidates in elections – you’ll hear it on the airwaves, see it in magazines, read it on the Internet. It’s a staple of the establishment media. The Myth of the Center Right Country But wait, you say, isn’t America a center-right country? Don’t the Democrats have to appeal to the center to win? Certainly, that’s what the establishment would have you believe. Now there are places where these issues don’t play well, but the fact is, the majority of Americans are left of center on an issue-by-issue basis, and they support these and other progressive policies. And this is true in many so-called red states, as results on liberal ballot initiatives show. And yet, when you ask people whether they are liberal or moderate or conservative, self-declared “liberals” are a minority. For example, in recent polls on the topic, Gallup found that 37 percent of Americans self-identified as conservative; 35 percent called themselves moderates; and only 24 percent considered themselves to be liberal. So what gives? Why, if Americans overwhelmingly hold progressive positions on most issues – even in red states – are voters so loathe to call themselves “liberal?” This may be the most important question facing America, and the answer reveals what amounts to a silent coup, four decades in the making, in which a few rich families and corporations took over first the Republican Party, then the Democrats and the media. Today, all three are in the business of hawking myths such as the center right majority that support the interests of an elite oligarchy at the people’s expense. Let’s examine how the myth of the center-right was fabricated and why folks reject the “liberal” label. Branding and the Demonization of “Liberal” The Business Dictionary defines branding as the process involved in creating a unique name and image for a product in the consumer’s mind, mainly through advertising campaigns with a consistent theme. Branding aims to establish a significant and differentiated presence in the market that attracts and retains loyal customers. SCROLL TO CONTINUE WITH CONTENT The Stakes Have Never Been Higher. The nonprofit, independent journalism of Common Dreams needs your help. Our journalists are working harder than ever to bring you journalism that is essential to the survival of our democracy. But we can't do it without you. Please support our 2020 Mid-Year Campaign today: Notice what is not mentioned in this definition. The differentiation of the product or service need not have any basis in truth, accuracy, reality, or substance. In politics, branding is used as much to vilify the opposition as to foster your own brand, and the right wing has been quite adept at it. Branding is frequently designed to sell the attribute, not the product. Coke doesn’t sell cheap flavored sugar water, they sell “taste the feeling.” Everyone in their commercials is young, hip and having much more fun than you and I. Old Spice doesn’t sell a moderately nice-smelling aftershave; it sells “The man you could smell like.” And he’s someone a lot of guys would like to be, and a lot of women would like to be with. In the same way, conservatives don’t sell tax cuts for the rich, ineffective government, perpetual wars, corporate hegemony, and constraints on personal choice; rather, they sell “trickle down,” “deregulation,” “strong Defense and national security” (always with a capitol D, and always having more to do with offense). Similarly, they sell “family values,” not restrictions on whom you may sleep with, who you may—and may not—marry, what sexual practices you may engage in, whether you may choose to die on your own terms, etc. And they do it using the best lessons of rhetoric, a field that is neglected today. As noted by Joseph Romm, author of Language Intelligence: Lessons in Persuasion from Jesus, Shakespeare, Lincoln and Lady Gaga, most of us are taught to use big words, avoid repetition and be as literal as possible—using facts, numbers, and details. If you think about most Democrats, this is precisely how they communicate – snooze alert; no one cares about your issue papers. In contrast, conservatives have been quite effective at creating their brand. As Kevin Drum put it in Mother Jones: Every American over the age of ten knows what the GOP and the conservative movement stand for. Sing it with me now: low taxes, small government, strong defense, traditional families. See? You know the tune, and the harmony line, too…Everybody knows what the conservative brand stands for, because the conservative leadership has spent four decades nurturing a consistent brand identity for themselves. One important emphasis conservatives have made in their branding efforts is to target the limbic lizard brain in us all with messages grounded in fear, hate, anger, greed, jingoism, jealousy, or bigotry. These simple techniques go a long way toward explaining how conservatives have successfully branded both their “product” as desirable and good and the liberal “product” as something between mindless and evil, why it worked, and why liberals (aka progressives) have been unsuccessful in countering the conservative rhetorical juggernaut. Democrats Join the Coup There’s one other reason conservatives have been successful at this con game. Not only have establishment Democrats failed to establish a brand of any kind (let alone one based on New Deal policies supporting the people) they’ve rarely – if ever – confronted the grotesque failures of the conservative brand. How hard could this be? In virtually every case the conservative playbook has been tried it’s resulted in extreme income inequality, huge deficits, and an economic slow-down. Look at Kansas; look at Louisiana; look at the fact that the three biggest economic downturns in US history were all preceded by the laissez-faire policies being hawked by conservatives as solutions to the problems they cause. Or take the case of California, where they increased taxes and ignited an economic boom. C’mon folks. Picking apart the conservative brand should be as easy as shooting ducks in a barrel. Of course, there’s a reason the neoliberals now in control of the Democratic Party and the elite mainstream media don’t do it. They are both in the pocket of the plutocrats. It’s becoming increasingly obvious that Democrats can only win by moving to the left, and just as obvious that those in control of the Party would rather retain power than win victories. And the media? As wholly-owned subsidiaries of corporate America, they’re literally paid to keep the myth alive.
https://www.commondreams.org/views/2017/06/15/power-or-principles-how-establishment-branch-democratic-party-choosing-lose-both
This dissertation explores the religious experience of eight Muslim participants from California through a series of twenty-four interviews. The research examines four areas: the Islamic formal prayer rite, the participants’ motivations for worship, their perception of sin and forgiveness, and their beliefs about death and the hereafter. The research employed methods of participant observation, in-depth interview, and ranking. It focused on a relationship of trust between the researcher—who participated in their formal prayer rites—and the participants. The design of interviews relied on storytelling and conversation. The findings indicated that one central factor, the unknowable nature of Allah, orchestrates the Muslim religious experience. First, it doesn’t allow for knowing Allah’s nature, but rather his attributes through the Qur’an and the divine law. Consequently, the law functions to inspire fear of Allah’s punishment and verdict. It also emphasizes observance of rules in a performance-oriented worship, where sin is treated as an act in a legal context, rather than a nature and where forgiveness is postponed to The Day of Judgment. Lastly, it produces an enduring sense of guilt and uncertainty filled with hope. In the application phase, the researcher utilized the three-part dialogue method to train and mentor three Christians for three months to employ skills for experientialdialogue with Muslims on the subject of religious experience, rather than theological issues. Findings showed significant change in motivations, attitude, and the quality and the quantity of interaction of these individuals in their engagement with Muslim friends.
https://digitalcommons.fuller.edu/dmiss/42/
Course Outline: Economic activities of corporations are interrelated with spheres of society, politics, culture, and international relations. The relationship between Business and Society has been drastically changing in the last few decades. Globalization has provided a positive and a negative impact to economy, environment, and society. Sustainable development has been demanded and widely recognized as a common crucial challenge. At the same time expected roles and responsibilities of corporations have been changing. This course will focus on understanding various issues concerning the interface between business and society. Students will encounter a variety of movements and discussions on Corporate Social Responsibility. This course is designed to expose students to the following topics; 1) changing relationship between corporation and its stakeholders: consumers, labor unions, NGOs, government, international organizations, environment and community, 2) changing expected role and responsibility of corporations 3) CSR/sustainable management and total corporate value. CSR/Sustainability challenges are characterized by their inherent complexity and interrelatedness. This topics need to enhance students to deal with complexity and ambiguity and engage in problem-solving approaches. A transdisciplinary approach is needed to study these topics, that is, management, economics, sociology, psychology, political science and others. Within management field, strategic management, organizational studies, risk management, corporate governance, HRM, marketing and such are required to research the field of Business & Society and CSR. It is called an applied management. This course is composed seven modules; 1. Business and Stakeholders 2. Global CSR Movement 3. CSR Management 4. Strategic Philanthropy 5. Social Innovation 6. Corporate Evaluation 7. Public Policy I will show you a variety of cases on CSR throughout the course. You should check the website all along the line. Learning Goals: This course provides a perspective of Business in Society, theories and practical ideas of corporate social responsibility and social innovation in global context. Students are expected to understand activities of corporations from the perspective of CSR and to consider various social and environmental issues as you will relate to make a decision in social affair. Evaluation Method Mid-term Exam 40% Class Participation 20% Final Exam 40% References I provide one core reading: ‘Must-read’ in each class and some ‘Further readings’ to study in more depth. In each class I will show you some relevant web resources; leading MNCs, international organizations, NGOs, academic institutions, and news sites.
https://tanimoto-office.jp/lecture_indexNTPU_2016_en.html
As a result of the suspension of all on-site activities at the University of Granada (both teaching and administrative), the Rector’s Office for the Digital University, in liaison with the Monitoring and Coordinating Committee responsible for tracking the current epidemiological situation triggered by COVID-19, has adopted a series of measures to ensure continued operation of services at the University, for the duration of this exceptional period. The centres reporting to this Office—the Resource Production Centre for the Digital University (CEPRUD) and the Computer and Communication Networks Centre (CSIRC)—have selected a range of tools and procedures that enable staff to continue performing their academic and administrative functions as effectively as possible. The selection has been made with the following aims: – To facilitate adaptation to remote, off-site teaching settings. All affected groups (both staff and students) will be provided with good-practice remote-teaching guides and online training courses. – To provide the necessary resources to support remote, off-site teaching, as the most suitable means of providing a continuous academic service, including classes and tutorials. In order to ensure that the period of adaptation to these teaching tools is as short as possible, the simplest and most useful tools have been selected, along with their respective tutorials, user guides and multimedia support materials. – To provide mechanisms to facilitate teleworking, based on procedures that enable remote access to work stations and training in the use of collaborative remote communication tools for the purpose of meetings, should these be necessary. All these materials will be made available to the whole university community from Monday 16 March, via the UGR website. Links to further information & recommendations (in Spanish):
https://www.ugr.es/en/about/news/remote-teaching-tools-and-teleworking-methods
The Postal Service is committed to fostering a positive and safe work environment that’s free of threats, fear and violence for all employees. To help fulfill this commitment, a Threat Assessment Team is available at USPS headquarters in Washington, DC, and in all area and district offices to respond to threats and potential violence. Team members are trained to assess the danger or harm of threats, whether implied or direct. The goals are to reduce risks to employees and the Postal Service, discourage inappropriate behavior and resolve conflicts. If you’ve been threatened or believe you’re in a potentially unsafe situation that involves a co-worker or supervisor — or if you’re experiencing a domestic violence situation that could pose a threat in the workplace — notify your immediate supervisor and respective Threat Assessment Team. The zero tolerance policy and reporting procedures will be distributed by the end of March. Report emergency situations to the Postal Inspection Service at 877-876-2455 or call 911. The Postal Inspection Service number is monitored 24/7.
https://www.21cpw.com/usps-promotes-safe-workplaces-zero-tolerance-policy/
As financial institutions’ commercial credit portfolios have expanded in recent quarters, regulators have increasingly warned against growing so quickly that risk management standards and processes fall behind. Indeed, credit risk is expected to remain a top examiner focus in the coming months, given the low-yield environment and pressure on financial institutions. 1. Develop a thorough understanding of the borrower or counterparty. 2. Establish and monitor credit concentrations at a micro and macro level. 3. Ensure adequate documentation is obtained for ongoing credit-risk monitoring. Develop a thorough understanding of the borrower or counterparty. A key part of analyzing a credit application is having enough information to understand the borrower or counterparty thoroughly. Many banks, however, find this task complicated by time constraints and the financial interdependence of a business owner and the business: personal assets are often pledged against the debt of the business, and business and guarantor financial assets are typically intermingled. A thorough understanding of the borrower’s financial condition requires a careful review of income statement and balance sheet information for both the guarantor and the business. For this reason, it is important for credit and lending departments to have standards for when and how to conduct a global cash flow analysis. Reviewing a borrower’s industry and the borrower’s financial performance relative to industry peers can also help develop a thorough understanding of the applicant. Industry benchmarking provides a more accurate picture of trends and related risks in a particular industry, and the peer comparisons add context to reviews of the borrower’s financial statements and forecasts. Establish and monitor credit concentrations at a micro and macro level. Establishing and monitoring credit concentrations can help the bank or credit union take risk-mitigating steps, such as closely monitoring industry data, pricing for the added risk or using loan participations to reduce exposure to a particular sector. Ensure adequate documentation is obtained for ongoing credit-risk monitoring. A recurring problem among troubled banks has been the failure of banks and credit unions to monitor borrowers or collateral values, and often, this issue stems from failing to obtain periodic financial statement information or real estate appraisals during the credit analysis process. A financial institution can hardly evaluate the quality of its loan portfolio or the adequacy of its collateral or allowance for loan losses and reserves without accurate, timely information on areas appraisals and financial statements. Strong credit policies will outline the information and documents needed for loan approvals, for changing terms of previously approved loans and for renewing credit. But it’s important to put those policies into practice and to develop ways to track exceptions and to monitor updated documentation requirements. Chuck Nwokocha leads the Advisory and Bank Consulting team at Sageworks, focusing in Credit Analysis, Risk Rating, Stress Testing, and Allowance for Loan and Lease Losses (ALLL). Chuck is a graduate of Harvard University, with a B.A. in Psychology with a focus in Organizations and Economics.
http://www.jeff4banks.com/2014/03/guest-post-three-commercial-credit.html
To determine a review of a Private Hire & Hackney Carriage Driver Licence. Minutes: The Senior Licensing and Compliance Officer gave a summary of his report which requested that members determine a review of the applicant’s Private Hire and Hackney Carriage Driver Licence. In response to various questions from Members, the driver said that he had not attempted to bribe the vehicle technician but had said that the technician could keep the change when he paid a £35 invoice with a £50 note. The driver said that he had not used the vehicle since then but he had been using a vehicle supplied by Happicabs, the operator for whom he drives. DECISION NOTICE The matter before the Panel today is an application for the review of the driver’s joint hackney carriage/PHV driver’s licence reference PH/HC0187. Since the driver is an owner/driver, we may also need to consider vehicle licence reference number PHV 4109, dependent on our decision today. This is a hybrid hearing with the Panel, our Legal Advisor and the driver in the Council Chamber at London Road and the other parties attending remotely. We have had the opportunity of reading the officer’s report in this case, a copy of which has been served on the driver, and we have also seen, as has he, the background documents annexed thereto including the list of vehicle defects and the written statements of the vehicle technician involved. We have had the opportunity of hearing from the driver and have been able to ask him questions. We have also seen some video footage of the car in question prior to today’s hearing. In reaching our decision we have also taken into account national and the Council’s policy and have heard from the Case Officer and the driver. We also understand that the Police have become involved in this matter since it involves, inter alia, allegations of dishonesty The facts of the case are simply that on 16 July 2021, Private Hire Vehicle PHV4109 underwent a vehicle compliance test at Takeley Performance Tyres (TPT), which is one of the testing stations on the Council’s approved list. The car was due for a 6 monthly inspection. The Private Hire vehicle owned by the driver failed its test on 11 items. A list of these items along with the compliance test certificate and photo of the vehicle are included in the bundle before us. TPT contacted the Licensing Team at the time the test was being carried out to advise of the poor condition of the vehicle, and they provided photographic evidence of this. Pictures of the car are in our bundle and a short video of the wheel being tested has also been viewed by us. Furthermore, a member of staff at TPT advised officers that the driver had attempted to bribe him into passing the vehicle with a £20 note, both before and after the test had been carried out. A S9 Witness Statement provided by the member of staff at TPT is among our papers and we accept the truth thereof.. Licensing Officers attempted to arrange an interview with the driver following the incident, however he failed to attend at the scheduled date and time and no contact has been made with the Licensing Team. It was made clear to the driver in the letter that his attendance was voluntary but that failure to attend would not prevent the investigation continuing towards a possible outcome. We have seen this letter. Licensing Officers have multiple concerns, which we share, namely; - The driver presented the vehicle for inspection in the condition shown in our papers. The inference we can, and do draw is that he did so knowing the vehicle was going to fail the examination. - He then attempted to bribe the staff member with money even before the test had commenced, indicating the possible knowledge and acceptance of the vehicle’s condition as alluded to above. - The driver then repeated the attempt to bribe the member of staff a second time after the vehicle test result was confirmed as being a failure. We have heard from the case officer and the driver has had the opportunity to address us today. Unfortunately we have not found him to be a convincing witness, his explanation being merely that he offered the member of staff at TPT a large denomination banknote to cover the inspection fee, and told him to keep the change. The figures do not add up and we prefer the written evidence of the member of staff at TPT. The primary function of this Committee is the protection of the travelling public. The legislation makes this clear as does the case law and all authority in the area. We are not entitled to take into account issues such as hardship to the driver in the exercise of our statutory function. Our role is to determine whether or not he remains a fit and proper person to hold a HC/PHV licence and if we consider that he is not, then our duty is clear – we should revoke the licence. In this case we do revoke the licence, and with immediate effect in the interests of public safety. The driver demonstrated by his actions that he was prepared to drive, and to carry members of the public for reward in a vehicle that he was aware was unsafe. Further, the driver has attempted, on two occasions, to dishonestly bribe a Department of Transport accredited vehicle tester, acting as such to certify an unsafe vehicle as being safe to carry members of the public for reward and on the first occasion he clearly knew that the vehicle he was presenting for testing was unsafe. Repeating the offer after the test had been failed merely compounds matters and we take the most serious possible view of this. At this point we pause to add that the operator for whom he drives, Happicabs, immediately directed that the vehicle be taken off the road and this remains the position. These allegations amount to two counts of dishonesty, and further evince a cavalier attitude towards the safety of the travelling public. This is totally unacceptable and makes it abundantly clear to us that he is not a fit and proper person to hold an Uttlesford licence. We therefore revoke the drivers’ licence, with immediate effect, and understand officers have rightly referred the matter to the Police. We now turn to consider whether any action should be taken against the Private Hire Vehicle licence PHV4109, of which the driver is the sole named proprietor, and since only a licenced driver may drive a licenced vehicle, we also revoke the vehicle licence, again with immediate effect, so it can be driven, assuming the defects in it have been rectified, for private purposes. We are, however, pleased to note that it has not been used to transport the public since the inspection but even so its condition suggests to us that it should not be on the road at all. The driver does have a right of appeal against this decision to the Magistrates Court, which must be exercised within 21 days and he will receive a letter from the Legal Department explaining this. Since the licences have been revoked with immediate effect he may not drive for reward pending the determination of any such appeal. The meeting was adjourned at 14.45 hrs for the Panel to consider both items.
https://uttlesford.moderngov.co.uk/mgAi.aspx?ID=9230
OMO Recommends... > Black History Month Disabilities Awareness Month Whole Self/Community Wellness Hispanic Heritage Month Children's Book Recommendations Let's Talk Books with Ms Chris Resources > Schooling at Home Resources Student Support Summer Family Fun Ideas Book Groups Book Talks & Book Studies Revolutionary Love Project > Conversation with Valarie Kaur Author Hena Khan Drawing with Kazu Kibuishi Harry Potter OMO Retreats Women's Renewal Retreat 2023 Women's Restorative Retreat 2022 Educators' Retreat Women's Retreat 2021 Evening Sessions The 1619 Project Education Forums Caste Study Group REACH Maryland Legislation Mass Incarceration Forum Redistricting Forum Mindfulness with Rebecca Beall Voting Information Resources About Us Meet the OMO Team Partners > Chasing Childhood Film HCLS Sessions > Children's Book Recommendations Financial Transparency Sessions by Subject > Journaling Social Activism Covid-19 Related Sessions Yoga/Exercise English/Social Studies > Eva Schloss Math/Science > Puberty Ed Gardening Languages/Cultures > Hispanic Heritage Month Learn Vietnamese Creative Arts Freaky Fridays Recordings Book Group 2023 Book Clubs Join us on Zoom Wednesdays at 7pm The Light We Carry January 18, February 1, February 15 The 1619 Project Docuseries Discussion February 8, February 22 Want to register for an OMO Event? Do you need updates and reminders? Want to share OMO events with friends? Click here: www.eventbrite.com/o/omo-30646165938 Book Group Sessions We use Eventbrite to help you set reminders for upcoming can't-miss sessions. Visit our OMO Eventbrite page to view all upcoming sessions. What is Book Group all about? WE LOVE READING! Book groups are a great way to engage with others and to make new friends while bonding over your favorite stories and through learning together. Bestseller Book Group Past Bestseller reads include: Wild Seed by Octavia Butler The Secret Lives of Church Ladies by Deesha Philyaw The Sum of Us by Heather McGhee Caste: The Origins of Our Discontents by Isabel Wilkerson ( January-March 2021, m ore info on our Caste Study Group page) Poetry of Rupi Kaur: Milk and Honey , Homebody , The Sun and Her Flowers An Indigenous Peoples' History of the United States for Young People by Roxanne Dunbar-Ortiz There There by Tommy Orange The Color of Law by Richard Rothstein Homegoing by Yaa Gyasi White Fragility: Why It's So Hard For White People to Talk About Racism by Robin Diangelo The Art of Tidying Up by Marie Kondo Untamed by Glennon Doyle Family Book Group Our series of Family Book Group and Diverse Voices reads are chosen to highlight the writings and life experiences of people in cultures and communities that are often underrepresented. Past reads include: Akata Witch by Nnedi Okorafor Stamped: Racism, Antiracism, and You by Jason Reynolds and Ibram X. Kendi The Crossover by Kwame Alexander The House on Mango Street by Sandra Cisneros More to the Story by Hena Khan Check back for upcoming Family Book Group picks or contact us if you have a book in mind! Kid Book Group Periodically, one of the OMO kids will choose a book they think others will enjoy. Past reads include: Because of Winn-Dixie by Kate DiCamillo OTHER PAST READS The Hunger Games Series (independent readers; completed) This series was another great one for mixing age groups. Perspectives change with age and life experiences, so it was good to hear from different age perspectives : The Hunger Games Book Group Spy School and Decoding with Harriet the Spy Your Body Sick and Well by Dr. Steven Cunningham Young Adult Book Group Past Young Adult reads include: The Books of Angie Thomas: The Hate U Give, On the Come Up, Concrete Rose The Lunar Chronicles series by Marissa Meyer Dorothy Must Die series by Danielle Paige I'm Thinking of Ending Things by Iain Reid The Thief series by Megan Whalen Turner The Hunger Games series by Suzanne Collins Poet X by Elizabeth Acevedo With the Fire on High by Elizabeth Acevedo Clap When You Land by Elizabeth Acevedo Fantasy Book Group Many thanks to Ms. Alanna for providing so many months of fun family fantasy reading and performing! Past reads: Harry Potter series, including a live reading of Harry Potter and the Cursed Child Find even more book groups on our Book Talks & Book Studies page Sessions Evening Sessions Youth Sessions Book Groups LEARN Partners Hispanic Heritage Resources Retreats OMO About Contact Donate Oakland Mills Online, Inc. is a 501(c)(3) nonprofit organization. © COPYRIGHT 2021. ALL RIGHTS RESERVED. Home Youth Programming Spanish Club Scorpion Speaker Series OMO Recommends...
https://www.oaklandmillsonline.com/book-groups.html
GLEN ELLYN, Ill. — June 7, 2018 — The College of DuPage Robotics Team placed ninth in NASA’s ninth annual Robotic Mining Competition, beating out dozens of renowned four-year universities, including Colorado School of Mines, Illinois Institute of Technology, Milwaukee School of Engineering, Purdue, Texas A&M University and the University of Illinois Urbana-Champaign. For COD Engineering and Technology Club President Josie Suter, the most valuable lessons were gained during the months spent preparing for the competition. During the competition, students from more than 40 schools performed a variety of challenges, including the abrasive characteristics of the basaltic regolith simulant, the weight and size limitations of the mining robot, and the ability to tele-operate it from a remote Mission Control Center. Scoring was based on autonomy, communications, dust tolerance and projection, power requirements, vehicle mass and other factors. Robots were required to mine gravel simulating icy Mars regolith located beneath approximately 30 cm of simulated Mars surface regolith. A minimum of 1 kg of mined gravel was required to score mining points. In addition, teams were required to submit an in-depth systems engineering report and a written description of engineering-related outreach undertaken by students. Weighing in at 68 kilograms, 12 kilograms under the competition’s 80-kilogram limit, the team’s robot featured a six-inch diameter auger for digging, a bin to carry and transport the payload and a conveyor belt mechanism to dump the payload into the receptacle at the competition. Remote control was achieved through a repurposed Xbox gaming console controller connected to a laptop and a Raspberry Pi transmitter. Since teams were required to control the robot from a NASA mission control center out of sight of the competition area, the robot featured fore, aft and overhead video cameras to allow for navigation. The robot also featured rear-wheel drive and pivot steering. Suter, who has just completed COD’s Engineering Pathways program and will be transferring to the University of Illinois Urbana-Champaign College of Engineering this fall, credits the success of the team to the hard work and commitment of the team members in bringing a range of skills and expertise to the project. She said the competition provided a wealth of experience and benefits to the participants. “By participating in this competition, we gained both technical and managerial experience,” Suter said. “The competition itself challenged our engineering skills with difficult problems to solve within specific constraints. Supplemental deliverables like the systems paper, outreach report and systems presentation pushed our team to organize our engineering process, develop our technical communication skills, and create lasting change in our community.
https://www.textileworld.com/textile-world/2018/06/college-of-dupage-robotics-competes-in-prestigious-nasa-competition/
Subscribe to our newsletter to receive the latest news and events from TWI: By Jeroen De Backer Although friction stir welding (FSW) is an established joining technology, the majority of applications utilise linear joints made on bespoke, product specific FSW machines. The industrial adoption of robotic FSW for multidimensional joints remains low. This report describes the assessment of a range of FSW process variants, applied using a robot, for linear, curvilinear and circumferential joint geometries, with the aim of facilitating industrial uptake. Work was undertaken to compare and contrast floating-bobbin and stationary shoulder with conventional FSW when implemented on a robot. Both linear and corner SSFSW configurations were considered. Emphasis was placed on establishing capability, including the effect of welding forces on robot path accuracy, the range of component thicknesses that could be welded robotically and the overall repeatability of the process. All of the FSW variants assessed, originally developed for linear joints, are transferable to multidimensional joints using a FSW system based on an industrial robot. The main restriction is the lack of stiffness and payload of robots, which significantly restricts the achievable joint thickness, welding speed, workspace and positional accuracy. A robot platform with higher stiffness and force capability is therefore needed. Print version For more information please email: [email protected] Browser does not support script.
https://www.twi-global.com/what-we-do/research-and-technology/research-programmes/core-research-programme/report-abstracts/development-of-robotic-bobbin-and-stationary-shoulder-friction-stir-welding-1095-2018
Hurricane Ida makes landfall as strong Category 4 storm, but expected to weaken overnight Hurricane Ida made landfall Sunday afternoon as a Category 4 hurricane with maximum sustained winds of 150 mph. WATCH: Timelapse video shows Hurricane Ida flooding Louisiana roads in under an hour Ida blasted ashore Sunday as one of the most powerful storms ever to hit the U.S., blowing off roofs and reversing the flow of the Mississippi River as it rushed from the Louisiana coast toward New Orleans and one of the nation’s most important industrial corridors. MORE: Hurricane Ida leaves trail of damage across Louisiana RELATED: Louisiana evacuees head to Houston as Hurricane Ida approaches the coast Around 12:15 p.m. Friday, Ida strengthened to a hurricane after making landfall in Cuba. Initially, it seemed like Ida would reach that status on Saturday but continued to grow stronger as it headed for Louisiana. And once it arrived Sunday in Louisiana, Ida began its reign of destruction on the city of New Orleans. FOX 26 Chief Meteorologist Dr. Jim Siebert says Ida's impact will be minor for the Texas coast but will be very dangerous for our friends in Louisiana, Mississippi, and Alabama. "It’s difficult to describe the immense power of this storm and my concern for anyone in its path," Dr. Jim said. "It will make landfall Sunday, but its impact will be felt for years to come." The severity behind Ida could not be understated as hours after the hurricane hit, virtually all of New Orleans suffered power outages even though it started weakening by Sunday evening. MORE: New Orleans braces for heavy rain and hurricane force winds as Ida gets closer Life-threatening storm surge, destructive winds, and flooding rainfall hit the Louisiana coast Sunday and hospital staff already overwhelmed by the state’s fourth COVID-19 surge have an added burden in the coming days — working alongside one of the most powerful hurricanes to ever hit the United States. MORE: Louisiana hospitals full with COVID-19 patients hope for best as Ida hits Additionally, Ida's arrival is on the 16th anniversary of Hurricane Katrina, which devastated the state of Louisiana, but officials say they are working to ensure residents are not faced with the same calamity as they did nearly two decades ago. RELATED: Hurricane Ida hits Louisiana as one of most powerful hurricanes to strike US In fact, President Joe Biden gave a press conference Sunday afternoon from FEMA headquarters noting relief efforts are underway but encouraged residents to also take shelter and look out for their neighbors as Ida looks to cause destruction throughout its path on the Gulf Coast. VISIT OUR TROPICS PAGE FOR THE LATEST RADARS Southeast Texas meanwhile, is seeing the minimal impact and experiencing relatively normal weather for the end of August. Chances for rain are expected to increase during the coming week. For the Louisiana area, the impacts from the flood seem to be more pressing and will remain a threat until about Tuesday before it downgrades to a depression. However, we're told the hurricane could weaken overnight Sunday into a category 2, which can still cause some severe damage. As of Sunday around 6 p.m., Ida dropped in intensity to a Cat. 3 storm with winds at 125 mph. The rainfall will remain heavy and stay strong for hours. "This storm can't fall apart quick enough for anyone in it," Dr. Jim said. RELATED: Hurricane evacuees shelter in Lake Charles as Ida makes landfall FOX 26 Houston is your Gulf Coast Weather Authority and we will continue to update this story as we learn more information about this developing hurricane. The Associated Press contributed to this story.
https://www.fox26houston.com/weather/hurricane-ida-makes-landfall-as-strong-category-4-storm-but-expected-to-weaken-overnight
Study finds Harris County leads nation in exonerations Harris County had more exonerations last year than any state in the country, a study has found. That's because the county does something most places don't: testing evidence in drug cases even after defendants plead guilty A new study has found that Harris County leads the country in exonerations, turning loose 48 people in 2016 alone. That's because its crime labs take an added precaution most others don't: testing the materials seized from drug defendants even after they enter guilty pleas. And when the supposed drugs they possessed were tested, in many cases no illegal drugs were found. According to a study released Tuesday by the National Registry of Exonerations, Harris County had all but 10 of the state's 58 exonerations last year. The state with the second highest number, Illinois, had 16 exonerations in 2016. Harris County District Attorney Kim Ogg said her department isn't ashamed of the high number. Ogg said her department takes extra precautions "to ensure the integrity of our convictions,” a move she hopes more crime labs across the nation will follow. “We take the Supreme Court mandate to disclose favorable evidence, even post-conviction, to heart,” Ogg told the Texas Tribune. “We’ve assigned resources to making sure that even in cases where someone has pleaded guilty, but did so without actually being guilty, that we take every measure to make that right.” Most of those convicted and later exonerated for drug-related offenses in Harris County were African-American. The researchers found that African-Americans are roughly five times as likely to go to prison for drug possession as whites. And judging from exonerations, innocent black people are about 12 times more likely to be convicted of drug crimes than innocent white people, the study found. “Harris County is extremely valuable for our research because it’s an unusual example of something you wouldn’t otherwise see,” said Samuel Gross, a University of Michigan law professor and senior editor of the study. "One possibility is that they're more conscientious. What's striking is that they do this." Gross said the rate of illegal drug use is roughly the same for whites and blacks, but the number of arrests and convictions is much higher for African-Americans than for whites. “Why are African-Americans so overrepresented when it comes to people who are falsely arrested for drug possession?" Gross said. "The answer is that drug law enforcement is more heavy on the black community than the white community.” The study also found: African-American prisoners who were convicted of murder are about 50 percent more likely to be innocent than other convicted murderers. Innocent black people are about 12 times more likely to be convicted of drug crimes than innocent white people. 62 percent of those exonerated for drug crimes in Harris County in 2016 were African-American — in a county where they comprise 20 percent of the population. “Historically our drug laws have been enforced unequally and I want to stop that,” Ogg said. “Obviously that’s going to require law enforcement leadership, training and policies that effect the way our laws are enforced, but as DA I can level the playing field by offering an equal opportunity to all offenders.” The number of African-Americans arrested for drug-related offenses came as no surprise to Jay Jenkins, a project attorney for the Texas Criminal Justice Coalition who has worked in Harris County for nearly three years. Jenkins said that oftentimes defendants will plead guilty to a drug charge to try to get out of jail. “A lot of those folks plead guilty before the lab has even gotten the test back to the court,” Jenkins said. “Low-income defendants have very little options if they can’t make bail.” While Jenkins commended the Harris County officials for testing suspected drugs even after a defendant has pleaded guilty, he said there’s work to be done when it comes to how law enforcement treats the African-American community. “The way that these communities are policed and the way that these individuals are prosecuted — it really is different than how they’d police a white person from a rich neighborhood,” Jenkins said. “They almost get an entirely separate criminal justice system from what is used to police and prosecute low income communities here in Houston.” Ogg said she'll continue to work to level the playing field on drug-related cases. “I think the big takeaway for us is that every case of wrongful conviction has to be seriously considered because it shapes the public’s trust in our system,” Ogg said. “I promise to help try and build a trustworthy system ... These exonerations on these drug cases are part of that.” Comment Policy The Texas Tribune is pleased to provide the opportunity for you to share your observations about this story. We encourage lively debate on the issues of the day, but we ask that you refrain from using profanity or other offensive speech, engaging in personal attacks or name-calling, posting advertising, or wandering away from the topic at hand. To comment, you must be a registered user of the Tribune, and your user name will be displayed. Thanks for taking time to offer your thoughts.
The scriptures consistently counsel Christians to obey the government except in cases where our duty to god and our conscience demands otherwise. We have also seen that the reason for obedience is not necessarily because the state’s rule is just. In an earlier post, Jesus and the Temple Tax, we have seen that Jesus told St. Peter to pay the tax, not because it was owed, but to avoid giving offense to the authorities. St. Paul often advised Christians not to quarrel or speak ill of anyone; “to live quietly, to mind your own affairs.” 1 Thess. 4:11. Apart from the attractive appeal of a genuinely humble life, leading that quiet life played an important role in avoiding conflict with the state. Mindful of these things, we must more closely consider two New Testament scriptures often cited to compel Christians to both honor and obey the state. 1 Peter 2 St. Peter wrote his first letter from Rome to Christians in Asia, probably in the early 60’s A.D. He wrote these verses regarding the Christian duty to honor and obey human rulers: “For the Lord’s sake accept the authority of every human institution, whether of the emperor as supreme, or of governors, as sent by him to punish those who do wrong and to praise those who do right. For it is God’s will that by doing right you should silence the ignorance of the foolish. As servants of God, live as free people, yet do not use your freedom as a pretext for evil. Honor everyone. Love the family of believers. Fear God. Honor the emperor.” Peter 2:13–17 Here, Peter calls Christians to accept the authority of human rulers, “as sent by [the Lord] to punish those who do wrong and to praise those who do right.” He urges his brother Christians to accept the authority of the state to the extent that it punishes wrongdoing and praises good deeds. Since his readers are already called to do good and avoid wrongdoing, Peter’s instruction imposes no additional burden upon his readers. The verse adds nothing which we would not already be morally required to do, with or without the state. In the next verse, Peter tells us: “live as free people, yet do not use your freedom as a pretext for evil.” Just as Jesus taught regarding the temple tax, Peter is cautioning his readers that while they may not be morally bound to obey some directive, they must not use their freedom when its exercise would cause a greater evil. “Honor everyone,” begins verse 17. Obviously, people may be honored greatly, or honored little, or not at all, depending on how they conduct their lives, but in this verse, Peter refers to a different sort of honor: the honor which is owed to every person as an immortal creature made in the image and likeness of God. As such, the reader is reminded to respect that innate dignity and to love each person as they love themselves. Then Peter ends the verse with the phrase: “Honor the emperor,” a reminder that the emperor is due that same honor. Yes, even the emperor. On closer examination, it would appear that the Apostle Peter’s exhortation is nuanced and looks more to one’s duty to God than to the emperor. 1 Peter 2 does is not the blanket endorsement of the state that a cursory reading might suggest. In the next post. we will take a look at chapter 13 of St. Paul’s epistle to the Romans, which contains the chief proof-text and wellspring for those who press for unquestioned submission to the state.
https://freeisbeautiful.com/1-peter-2
Singapore, March 29, 2012 – Huawei, a leading global information and communications technology (ICT) solutions provider, today signed a memorandum of understanding (MOU) with Temasek Polytechnic (TP), a tertiary education institution in Singapore that offers diploma courses in the areas of applied science, business, design, engineering, humanities & social sciences and informatics & IT. This partnership is underscored by the establishment of The Cloud Technology & Innovation Center, a joint laboratory dedicated to the research, development, and teaching of cloud computing technology. Tony Zhang, VP, SP Region, Huawei Enterprise and Mrs. Lay-Tan Siok Lie, Deputy Principal, Temasek Polytechnic at the signing ceremony In addition to establishing the joint laboratory, this partnership allows for the sharing of knowledge and skills in cloud technologies as well as collaboration between Huawei and TP in hosting industry events related to cloud computing. Moreover, Huawei will invest significant resources in student scholarships, student development, and curriculum development. As one of the region’s leading polytechnics, TP plays a major role in educating and developing future industry leaders. This wide-ranging collaboration with Huawei will enable it to equip its students with the latest skills and abilities relevant to cloud computing, a technology that will increasingly define the future of computing and communications. “This collaboration with Huawei will equip our students with the skills to lead in cloud computing technology projects and enable them to respond effectively to growing industry demands in this area. Huawei’s support for student development initiatives is greatly valued as they will provide our students with opportunities for internships at Huawei’s offices and scholarships that will help to groom future professionals in this field,” said Mr Boo Kheng Hua, Principal and CEO Temasek Polytechnic. “We are excited about this new partnership with Temasek Polytechnic,” said Tony Zhang, South Pacific Regional VP of Huawei Enterprise. “The school has a rich heritage of training future industry leaders, and we are honored to support its dual mission of education and research while also advancing the development of cloud computing. In addition, we are thankful for the logistical and installation and services support provided by GrandTech Systems and ECS Computer (Asia) Pte Ltd to facilitate the establishment of this partnership.” Jayson Goh, Executive Director, Infocomms and Media, Singapore Economic Development Board (EDB), said, “With the advent of cloud computing, Singapore has grown to become an important data hub for global enterprises. Huawei’s joint student training program with Temasek Polytechnic and the opening of the Huawei Enterprise Solutions Showcase Centre mark another important milestone in Singapore’s efforts to further develop the base of cloud computing talent in Singapore. This is aligned with our long term vision for Singapore to become a global data management hub.” The Enterprise Solutions Showcase Center, the first for Huawei in South Pacific, includes an array of Huawei Enterprise solutions, most notably cloud computing data center and cloud application solutions. The efficacy of Huawei’s desktop cloud solution is evident in the fact that over 45,000 Huawei engineers around the world use virtual desktops as part of the world's largest desktop cloud collaboration, resulting in enhanced information security, more efficient maintenance, and lower operating costs. Tony Zhang, VP, South Pacific, Huawei Enterprise & YiJin , Head of Singapore Huawei Enterprise with the Mr. Zheng Chao, Minister Counselor (Economical & Commercial), Embassy of The People ‘s Republic of China in the Republic of Singapore visiting Singapore showcase Other products and solutions on display derive from Huawei’s industries solutions department and from several product lines, including DataCOM, unified communications and collaboration (UC&C), and IT. Other products and solutions on display at the Showcase Center include communications solutions, including a video conferencing demo of Huawei’s cutting-edge telepresence solution, and Huawei eSpace, a next-generation solution that provides enterprises with convergent communication and information services. Huawei Enterprise supplies e-government solutions for governments around the world as well as comprehensive ICT solutions for companies and organizations across an array of industries, including finance, utilities, education, transportation, healthcare, logistics, energy, and media. Huawei Enterprise is a strategic business group of Huawei dedicated to providing quality end-to-end communications solutions and services to customers worldwide. Leveraging Huawei’s leadership in information and communications technology (ICT) solutions and customer-centric innovation, Huawei Enterprise offers a suite of solutions and services in network infrastructure, unified communications and collaboration, cloud computing and data center management. Our vertical industry applications are tailored to the needs of enterprises across sectors, including government, public utilities, energy, finance, transportation and power. For more information, visit Huawei Enterprise online: www.huawei.com/enterprise Follow us on Twitter: www.twitter.com/huaweiENT Facebook: http://www.facebook.com/HuaweiEnterprise LinkedIn:www.linkedin.com/groups/Huawei-Enterprise-4070523?home=&gid=4070523 Huawei is a leading global information and communications technology (ICT) solutions provider. Through our dedication to customer-centric innovation and strong partnerships, we have established end-to-end advantages in telecom networks, devices and cloud computing. We are committed to creating maximum value for telecom operators, enterprises and consumers by providing competitive solutions and services. Our products and solutions have been deployed in over 140 countries, serving more than one third of the world’s population. For more information, visit Huawei online: www.huawei.com Follow us on Twitter: www.twitter.com/huaweipress YouTube: http://www.youtube.com/user/HuaweiPress Temasek Polytechnic (TP) is a significant contributor to the field of para-professional education in Singapore. TP currently offers 53 full-time diploma courses in the areas of applied science, business, design, engineering, humanities & social sciences and informatics & IT. It also offers over 40 part-time courses, up to the advanced diploma level. TP students undergo a holistic learning system that combines hands-on experience, character education and relevant life skills, in an enriching learning environment. The Polytechnic has also infused global realities into its programmes and developed a mindset on campus that embraces socio-cultural diversity. These approaches ensure that TP graduates are economy relevant, future relevant and life relevant. For more information, please visit www.tp.edu.sg.
https://e.huawei.com/en/news/ru/2012/hw_127510
Launched in 2020 in collaboration with O2, the Darwin SatCom Lab is the first space in the UK designed for testing driverless car technology. It’s based at the Harwell Science and Innovation Campus in Oxfordshire. We have two on-site connected and autonomous vehicles (CAVs) that can be controlled remotely. We use these to test and refine our carbon tracking technology, our ability to switch seamlessly between 5G and satellite communications, and more. The ability to blend terrestrial and satellite communications opens up new possibilities for CAVs. The Darwin SatCom Lab allows these ideas to be put into action using actual autonomous cars. Its combination of hardware, software and the physical space to experiment means that any interested organisation can test and refine the technology’s possibilities on a practical level. If you’re interested in finding out how the Darwin SatCom Lab can help to solve the challenges your business is facing, you can get in touch through the enquiry form.
https://darwincav.com/satcom-lab/
Maybe you have not noticed but there are quite a few talking animals in television and film. From a talking parrot (Paulie) to talking bees (Bee Movie), and beyond, there are conversational critters everywhere. What’s with humans’ fascination with talking animals? Who knows, but if the Cetacean Hearing and Telemetry (CHAT) project has any success, we humans will soon be experiencing two-way communication with one of the most intelligent mammals on Earth: dolphins. At the moment, humans can communicate with dolphins, giving commands and orders. But dolphins are not able to “talk” back. The CHAT project hopes to close the communication gap through an underwater computer. Previously, researchers used electronic keyboards with symbols the dolphins could press to communicate but that system wasn’t very “dolphin friendly.” The new system features a smartphone-sized computer with attached hydrophones for detecting dolphin sounds (which can range up to 200 kilohertz – much higher than the 15 kilohertz adult humans can hear!). Through a system of hearing and sending out dolphin sounds through the computer, researchers hope to crack the basic building blocks of dolphin language.
http://scienceandentertainmentexchange.org/blog/so-long-and-thanks-for-all-the-fish/
Vision: KleverKlues works with a vision to revolutionise the world of education. The company looks forward to introduce innovative techniques and services, which can help students and professionals in attaining the best. It also focuses in helping students choose certain career, which can be best, suited to them and their needs. Our vision also includes to tackle the problems of today’s’ professionals and students who go through stressful situations by introducing unique approaches. We look forward to bring in newer learning processes which can help everyone in leading a quality life in a stress-free environment. Our endeavour is to ensure that our clients learn about their true selves while strengthening their inherent capabilities. We aim to make them a fast learner, we want them to overcome their shortcomings and look at learning as a fun exercise. Further, we work with a vision to take Eugenics services to each and every corner of the world to ensure a holistic growth.
https://kleverklues.com/vision-mission/
CROSS-REFERENCE TO RELATED APPLICATION This U.S. nonprovisional patent application claims the benefit of priority under 35 U.S.C. § 119 to Korean Patent Application No. 10-2020-0116067, filed on Sep. 10, 2020 in the Korean Intellectual Property Office, the contents of which are herein incorporated by reference in their entirety. BACKGROUND 1. Technical Field 2. Description of the Related Art The inventive concept(s) described herein relate to a memory controller, a memory device, and a storage device. By configuring a storage device so that a plurality of NAND dies operate in parallel, consistency of write performance may be enhanced. For example, a plurality of blocks included in NAND dies different from each other may be grouped and controlled by super block management. In order to program a specific block of a NAND die, an erase of the specific block needs to precede programming. While the NAND die performs the erase operation, the programming required for the NAND die may not be performed. If all the plurality of NAND dies controlled in this manner by the super block management have blocks being erased, none of the plurality of NAND dies may execute programming requested by a host. That is, a throughput (a host write throughput) may be 0 in a section in which all the plurality of NAND dies have blocks being erased. SUMMARY According to aspects of the present disclosure, a memory controller and a memory device are capable of improving erasing of a plurality of NAND dies controlled by a super block management and thereby enhancing the consistency of write performance. According to another aspect of the present disclosure, a storage device that includes the memory controller and the memory device is capable of improving erasing of the plurality of NAND dies controlled by the super block management and thereby enhancing the consistency of write performance. However, aspects of the inventive concept(s) described herein are not restricted to those set forth herein. Other aspects of the inventive concept(s) described herein will become more apparent to one of ordinary skill in the art to which the present disclosure pertains by referencing the detailed description of the present disclosure as provided below. According to an aspect of the present disclosure, a memory controller includes an interface and a control module. The interface is provided for communicating with a memory device which includes a first die and a second die. The first die includes a first block and a second block, and the second die includes a third block and a fourth block. The control module manages the memory device in units of a first super block and a second super block. The first super block includes the first block and the third block, and the second super block including the second block and the fourth block. The control module causes a program of the first super block and an erase of the second super block to complete before starting the program of the second super block. The erase of the second super block is performed in multiple steps. Completion of the program of the first super block and the erase of the second super block includes performing a first step erase of the second block after programming a first portion of the first block, programming a second portion of the first block after the first step erase of the second block, and performing a second step erase of the second block after programming the second portion of the first block. According to another aspect of the present disclosure, a memory controller includes an interface and a control module. The interface interfaces with a memory device including a plurality of dies that each include a plurality of blocks. The control module groups the plurality of blocks included in different dies and manages the plurality of blocks as super blocks. The control module performs scheduling to alternately perform a program of a part of an Nth super block, wherein N is a natural number, and a phased erase of an N+1st super block. The control module causes the program on the Nth super block and the erase on the N+1st super block to complete before the program on the N+1st super block starts. According to another aspect of the present disclosure, a memory device includes a first die and a second die. The first die includes a first block and a second block. The second die includes a third block and a fourth block. The memory device is controlled in units of a first super block and a second super block, the first super block includes the first block and the third block, and the second super block includes the second block and the fourth block. Before starting a program of the second super block, a program of the first super block and an erase of the second super block are completed, and the erase of the second super block is divided into multiple steps. Completion of the program of the first super block and the erase of the second super block includes performing a first step erase of the second block after programming a first portion of the first block, programming a second portion of the first block after the first step erase of the second block, and performing a second step erase of the second block after programming the second portion of the first block. According to an aspect of the present disclosure, a storage device includes a memory device and a controller. The memory device includes a first die and a second die. The first die includes a first block and a second block, and the second die includes a third block and a fourth block. The controller manages the memory device by a first super block or a second super block. The first super block includes the first block and the third block, and the second super block includes the second block and the fourth block. The controller completes a program on the first super block and an erase on the second super block before starting the program of the second super block, and divides performance of the erase on the second super block into multiple steps. The program of the first super block and the erase of the second super block include performing a first step erase of a second block after programming a first portion of the first block, programming a second portion of the first block after the first step erase of the second block, and performing a second step erase of the second block after programming a second portion of the first block. According to an aspect of the present disclosure, a memory controller includes an interface and a control module. The interface is provided for communicating with a memory device which includes a first die and a second die. The first die includes a first block and a second block, and the second die includes a third block and a fourth block. The control module manages the memory device in units of a first super block and a second super block. The first super block includes the first block and the third block, and the second super block includes the second block and the fourth block. The control module causes a program of the first super block and an erase of the second super block to complete, before starting the program of the second super block, and the control module controls so that an erase section of the second block of the first die and an erase section of the fourth block of the second die only partially overlap to erase the second super block. According to another aspect of the present disclosure, a memory controller includes an interface and a control module. The interface is provided for communicating with a memory device which includes a first die and a second die. The first die includes a first block and a second block, and the second die includes a third block and a fourth block. The control module manages the memory device in units of a first super block and a second super block. The first super block includes the first block and the third block, and the second super block includes the second block and the fourth block. The control module completes an erase of the second super block before starting a program of the second super block. The erase of the second super block includes starting the erase of the second block of the first die, reducing a total token from an initial number by a predetermined consumed token, when the erase of the second block of the first die starts, increasing the number of total tokens with an erase progress time, and starting the erase of the fourth block of the second die, when the number of total tokens reaches the number of threshold tokens. According to an aspect of the present disclosure, a memory device includes a first die and a second die. The first die includes a first block and a second block. The second die includes a third block and a fourth block. The memory device is controlled in units of a first super block and a second super block. The first super block includes the first block and the third block, and the second super block includes the second block and the fourth block. Before starting a program of the second super block, a program of the first super block and an erase of the second super block are completed, and the second super block is erased by controlling so that an erase section of the second block of the first die and an erase section of the fourth block of the second die only partially overlap. According to an aspect of the present disclosure, a storage device includes a memory device and a controller. The memory device includes a first die and a second die. The first die includes a first block and a second block, and the second die includes a third block and a fourth block. The controller manages the memory device by a first super block or a second super block. The first super block includes the first block and the third block, and the second super block includes the second block and the fourth block. The controller completes a program on the first super block and an erase on the second super block, before starting the program of the second super block, and the controller controls so that an erase section of the second block of the first die and an erase section of the fourth block of the second die only partially overlap to erase the second super block. Specific matters of other embodiments are included in the detailed description and drawings. BRIEF DESCRIPTION OF THE DRAWINGS These and other aspects and features of the inventive concept(s) described herein will become more apparent by describing in detail exemplary embodiments thereof referring to the attached drawings, in which: FIG. 1 is a block diagram illustrating a system including a storage device according to some embodiments of the present disclosure; FIG. 2 FIG. 1 is a block diagram illustrating a memory device of the system in ; FIG. 3 FIG. 1 is a diagram for explaining a queue and job scheduler used in a memory controller of the system in ; FIG. 4 is a conceptual diagram for explaining the operation of a memory controller according to some embodiments of the present disclosure; FIG. 5 FIG. 6 and are diagrams for explaining the operation of a memory controller according to some embodiments of the present disclosure; FIG. 7 FIG. 8 FIG. 9 FIG. 10 , , , and are diagrams for explaining an implementing method in which a program on a part of a Nth super block and a phased erase of a N+1st super block are alternately performed; FIG. 11 is a flowchart for explaining the operation of a memory controller according to some embodiments of the present disclosure; FIG. 12 is another flowchart for explaining the operation of a memory controller according to some embodiments of the present disclosure FIG. 13 is another flowchart for explaining the operation of a memory controller according to some embodiments of the present disclosure FIG. 14 is a diagram for explaining the operation of a memory controller according to some other embodiments of the present disclosure; FIG. 15 FIG. 16 and are diagrams for explaining a control so that erase sections of the dies overlap to a minimum by introduction of a token concept; and FIG. 17 FIG. 18 and are flowcharts for explaining the operation of a memory controller according to some other embodiments of the present disclosure. DETAILED DESCRIPTION OF THE EMBODIMENTS In the following detailed description, for the purposes of explanation and not limitation, representative embodiments disclosing specific details are set forth in order to provide a thorough understanding of an embodiment according to the present teachings. Descriptions of known systems, devices, materials, methods of operation and methods of manufacture may be omitted so as to avoid obscuring the description of the representative embodiments. Nonetheless, systems, devices, materials and methods that are within the purview of one of ordinary skill in the art are within the scope of the present teachings and may be used in accordance with the representative embodiments. It is to be understood that the terminology used herein is for purposes of describing particular embodiments only and is not intended to be limiting. The defined terms are in addition to the technical and scientific meanings of the defined terms as commonly understood and accepted in the technical field of the present teachings. It will be understood that, although the terms first, second, third etc. may be used herein to describe various elements or components, these elements or components should not be limited by these terms. These terms are only used to distinguish one element or component from another element or component. Thus, a first element or component discussed below could be termed a second element or component without departing from the teachings of the inventive concept. The terminology used herein is for purposes of describing particular embodiments only and is not intended to be limiting. As used in the specification and appended claims, the singular forms of terms ‘a’, ‘an’ and ‘the’ are intended to include both singular and plural forms, unless the context clearly dictates otherwise. Additionally, the terms “comprises”, and/or “comprising,” and/or similar terms when used in this specification, specify the presence of stated features, elements, and/or components, but do not preclude the presence or addition of one or more other features, elements, components, and/or groups thereof. As used herein, the term “and/or” includes any and all combinations of one or more of the associated listed items. Unless otherwise noted, when an element or component is said to be “connected to”, “coupled to”, or “adjacent to” another element or component, it will be understood that the element or component can be directly connected or coupled to the other element or component, or intervening elements or components may be present. That is, these and similar terms encompass cases where one or more intermediate elements or components may be employed to connect two elements or components. However, when an element or component is said to be “directly connected” to another element or component, this encompasses only cases where the two elements or components are connected to each other without any intermediate or intervening elements or components. The present disclosure, through one or more of its various aspects, embodiments and/or specific features or sub-components, is thus intended to bring out one or more of the advantages as specifically noted below. For purposes of explanation and not limitation, example embodiments disclosing specific details are set forth in order to provide a thorough understanding of an embodiment according to the present teachings. However, other embodiments consistent with the present disclosure that depart from specific details disclosed herein remain within the scope of the appended claims. Moreover, descriptions of well-known apparatuses and methods may be omitted so as to not obscure the description of the example embodiments. Such methods and apparatuses are within the scope of the present disclosure. Hereinafter, various embodiments of the present disclosure will be explained referring to the accompanying drawings. FIG. 1 FIG. 2 FIG. 1 is a block diagram illustrating a system including a storage device according to some embodiments of the present disclosure. is a block diagram illustrating a memory device of the system in . FIG. 1 FIG. 1 The system of may be a mobile system such as a mobile phone, a smart phone, a laptop computer, a tablet PC (tablet personal computer), a wearable device, a healthcare device or an IOT (internet of things) device. However, the system of is not necessarily limited to mobile systems, but may also be a personal computer, a workstation computer, a server, a media player, or an automotive device such as a navigation controller. FIG. 1 100 10 10 10 100 100 10 100 Referring to , the storage device may communicate with the host to write or read data at the request of the host . The host may be physically separated from the storage device and may be connected to the storage device via a wired interface or a wireless interface. Nevertheless, the host and the storage device may also or alternatively be components of an integrated system, and may even be housed within a common housing. 100 100 110 150 110 FIG. 1 The storage device functions as a non-volatile storage device that stores data regardless of a power supply. In , the storage device includes a memory controller , and a memory device that stores data under the control of the memory controller . 110 141 142 120 130 119 120 10 142 150 141 120 110 120 130 120 120 FIGS. 4 to 18 The memory controller may include an arrangement of circuitry and/or other components including a memory interface , a host interface , a control module , and a memory connected to each other through a bus . The control module communicates with the host through the host interface , and controls the memory device through the memory interface . The control module performs some or all aspects of methods attributed to the memory controller herein, such as an erase control method to be explained referring to . The control module may be or include a processor, such as a microprocessor, that executes instructions from the memory to implement some or all aspects of methods attributed to the control module herein. The control module may also or alternatively be or include an application specific integrated circuit (ASIC). 142 10 141 142 141 The host interface provides a connection that may send and receive data to and from the host , and may be, for example, compliant with various interface standards, protocols and/or conventions such as ATA (Advanced Technology Attachment), SATA (Serial ATA), e-SATA (external SATA), SCSI (Small Computer Small Interface), SAS (Serial Attached SCSI), PCI (Peripheral Component Interconnection), PCIe (PCI express), NVMe (NVM express), IEEE 1394, USB (universal serial bus), SD (secure digital) card, MMC (multi-media card), eMMC (embedded multi-media card), UFS (Universal flash Storage), eUFS (embedded Universal flash Storage), or CF (compact flash). The memory interface may be implemented to comply with standard conventions such as Toggle or ONFI. Examples of the host interface and/or the memory interface includes ports, adapters, sockets, connectors, drives and other types of physical interfaces compliant with one or more standards, protocols and/or conventions of the type noted above. 130 10 130 150 130 The memory may serve as a buffer memory which temporarily stores the data provided when the host requests the write. Also, the memory may also serve as a queue in which commands and information for tasks related to the operations of the memory device (e.g., program commands, read commands, and refresh commands) are sequentially stored. Also, the memory may be, but is not limited to, a volatile memory such as a SRAM (static random-access memory) and/or a DRAM (dynamic random-access memory). 150 100 10 10 The memory device may include, but is not limited to, a V-NAND flash memory of 2D (2-dimensional) or 3D (3-dimensional) structure. As noted above, the storage device may be physically separated from the host and also or alternatively may be implemented in the same package as the host . FIG. 2 150 0 3 0 1 2 3 Referring to , the memory device may include a plurality of dies from DIE to DIE, i.e., DIE, DIE, DIE and DIE. 0 3 0 0 0 0 3 0 110 0 0 1 1 0 1 Each of the dies DIE to DIE may include a plurality of blocks BLK to BLKa (here, a is a natural number). Super blocks SPBLK to SPBLKa are each a different group of a plurality of blocks BLK to BLKa included in different of the dies DIE to DIE. The plurality of blocks BLK to BLKa of any particular super block may be selected by the memory controller simultaneously. For example, in many embodiments described herein, a first die may be DIE and may include at least a first block (e.g., a BLK) and a second block (e.g., a BLK), and a second die may be DIE and may include a third block (e.g., a BLK) and a fourth block (e.g., a BLK). FIG. 2 0 0 0 3 0 0 0 1 1 2 2 0 3 0 Although in a plurality of blocks belonging to the super block SPBLK are shown as BLK of each die DIE to DIE as an example, the present disclosure is not limited thereto. For example, the plurality of blocks belonging to the super block SPBLK may be BLK in the die DIE, may be BLK in another die DIE, and may be BLK in still another die DIE. That is, there may be various methods for binding a plurality of blocks of the different dies DIE to DIE with any of the super blocks SPBLK to SPBLKa, and the relative order of the BLK in each DIE of any super block may vary. FIG. 3 FIG. 1 is a diagram for explaining the queue and job scheduler used in a memory controller of the system in . FIG. 3 130 110 131 132 120 121 131 132 130 121 131 132 130 130 131 132 131 132 Referring to , the memory of the memory controller includes a plurality of queues and . The control module may include a job scheduler that schedules tasks on the basis of commands stored in the queues and of the memory . For example, the job scheduler may check a program command and an erase command and perform a scheduling operation. The queues and and other queues of the memory may be physically and/or logically partitioned from one another and from other components of the memory . The queues and may also be dedicated to functionality as queues on a persistent basis so as to remain as queues and even when no tasks are stored therein or thereon. 131 132 131 0 0 132 1 1 FIG. 3 FIG. 3 Each of the plurality of queues and may correspond to a plurality of dies, respectively. For example, the queue in corresponds to the die DIE and sequentially stores commands related to the tasks to be performed in the die DIE. Also, the queue in corresponds to the die DIE, and sequentially stores commands related to the tasks to be performed by the die DIE. FIG. 3 FIG. 3 FIG. 3 FIG. 3 FIG. 3 FIG. 3 0 1 2 3 In particular, as shown in , program commands (PGMs) and erase commands (ERSs) may be managed separately inside each of different queues for a DIE. In , the plurality of program commands are stored sequentially in one queue (e.g., a second queue for each DIE as in ) in the order of task. The plurality of erase commands are stored sequentially in another queue (e.g., a third queue for each DIE as in ) in the order of task. Furthermore, the plurality of read commands may be stored sequentially in another queue (e.g., a first queue for each DIE in ) in the order of task. The labels of first, second and third for the queues for each DIE in are arbitrary, such that for each DIE (e.g., the DIE, the DIE, the DIE and the DIE), a first queue may store a program command for a corresponding DIE for each of the plurality of DIEs, and a second queue which is different from the first queue may store an erase command for the corresponding DIE for each of the plurality of DIEs. 120 FIG. 3 FIGS. 4 to 18 When managing the queue in this way, the control module may check commands and perform a scheduling operation to schedule a plurality of pending tasks of different types. For example, using the plurality of queues in the manner arranged in , it is possible to perform the scheduling operation effectively, while simultaneously considering a program operation of the Nth super block (where N is a natural number) and an erase operation of the N+1st super block. The scheduling method will be explained below referring to . FIG. 4 is a conceptual diagram for explaining the operation of the memory controller according to some embodiments of the present disclosure. FIG. 4 110 120 110 Referring to , it is assumed that the memory controller controls performance of the program on the Nth super block (where N is a natural number) and performance of the program on the N+1st super block. That it, it is assumed that the control module in the memory controller controls performance of the program on the Nth super block (where N is a natural number) and performance of the program on the N+1st super block. Here, the erase on the N+1st super block precedes the start of the program on the N+1st super block. 10 When the program on the Nth super block, the erase on the N+1st super block, and the program on the N+1st super block are performed in sequence, throughput (i.e., a host write throughput) may be 0 in at least a part of a section in which erase is performed on the N+1st super block. The reason is that, if all the dies corresponding to the N+1st super block have blocks that are being erased, all the dies corresponding to the N+1st super block may not perform the program requested by the host . 10 130 10 130 10 10 FIG. 1 Specifically, the host write throughput may be kept above 0 while the program data provided by the host is stored in a buffer memory such as the memory in . However, from the moment when an amount of program data provided by the host becomes larger than the storage capacity of the buffer memory (i.e., the memory ), because the buffer memory may not receive any more program data provided by the host , the host write throughput becomes 0. A large amount of buffer memory is required in order to store all the program data provided by the host during the time when all the dies with blocks included in the N+1st super block have blocks that are being erased. However, it is difficult to adopt a large capacity of buffer memory because its size is quite large. 100 In this way, when throughput becomes 0 in a section, the solution throughput of the storage device has no choice but to deteriorate. This is because the solution throughput is calculated as an average of the throughput of a program section and the throughput of an erase section. 150 Even if a MAX throughput of the memory device is larger than a Host Interface Max Write Throughput, when such a section in which the throughput becomes 0 occurs, the solution throughput becomes smaller than the Host Interface Max Write Throughput. Therefore, in order for the solution throughput to fulfill the Host Interface Max Write Throughput, it is necessary to improve the manner of erase on the N+1st super block. FIG. 4 1 10 2 20 1 As shown in , in some embodiments of the present disclosure, the program on the Nth super block and the erase on the N+1st super block are completed within a predetermined time t at S, and thereafter, the program on the N+1st super block is performed within a time t at S. The program on the N+1st super block may be held until the predetermined time t has passed, and/or until the program on the Nth super block and the erase on the N+1st super block are completed. FIG. 4 FIGS. 5 to 13 1 10 In , within the time (i.e., t) at which the program on the Nth super block needs to be completed, the erase on the N+1st super block is not completed at once, and the erase on the N+1st super block may be divided into multiple steps. That is, the erase on the N+1st super block may be divided into multiple steps, and the erase section performed at one time may be adjusted to be shorter. When the erase on the N+1st super block is divided into multiple steps each with a lower duration, since the data provided by the host may be stored in the buffer memory during the erase section without significantly increasing the storage capacity of the buffer memory, the host write throughput does not become 0. Such an erase method will be explained below referring to . 1 FIGS. 14 to 18 Alternatively, the control may be performed so that the erase sections of the dies overlap to a minimum within the time (i.e., t) at which the program on the Nth super block needs to be completed. With such a control, since it is possible to prevent a situation in which all dies perform the erase operations at the same time, the host write throughput does not become 0. Such an erasing method will be explained below referring to . FIGS. 5 to 13 A method of performing the erase of the super block divided into multiple steps will be explained referring to . FIG. 5 FIG. 6 and are diagrams for explaining the operation of the memory controller according to some embodiments of the present disclosure. FIG. 5 1 3 1 4 1 1 3 1 4 10 First, referring to , programs PGM to PGM of a part of the Nth super block, and phased erases ERS to ERS of the N+1st super block are alternately performed for a predetermined time t, so that the programs PGM to PGM on the Nth super block and the erases ERS to ERS on the Nth super block are completed before the N+1st super block program starts at S. FIG. 5 0 0 1 0 is explained using a first block (e.g., BLK) of the first die (e.g., DIE) included in the Nth super block and a second block (e.g., BLK) of the first die DIE included in the N+1st super block. 1 1 1 1 1 A first step erase ERS of the second block BLK is performed for the time tn. The erase is performed in block units. The erase on the second block BLK is performed according to a predetermined rule (or according to a predetermined standard), and then is suspended. The first step erase ERS is an erase operation from after the start of the erase on the second block BLK until suspension. 1 0 21 0 21 0 0 Subsequently, the program PGM on the first portion of the first block BLK is performed for the time t. Since the program is performed in word line units, NAND flash cells connected to some word lines included in the first block BLK are programmed for the time t. The meaning of the “portion” of the first block BLK in this embodiment may be NAND flash cells connected to at least one word line belonging to the first block BLK. 2 1 12 1 2 1 Subsequently, a second step erase ERS of the second block BLK is executed for the time t. The erase that was suspended for the second block BLK is resumed, performed according to the predetermined rule (or according to the predetermined standard), and then is suspended again. The second step erase ERS is an erase operation from when the erase of the second block BLK is resumed and until the erase operation is suspended again. 2 0 22 Subsequently, a program PGM on the second portion of the first block BLK is performed for the time t. 3 1 13 3 1 Subsequently, a third step erase ERS of the second block BLK is executed for time t. Similarly, the third step erase ERS is an erase operation from when the erase on the suspended second block BLK is resumed and until the erase operation is suspended again. 3 0 23 Subsequently, the program PGM on the third portion of the first block BLK is performed for the time t. 4 1 14 1 4 1 Subsequently, a fourth step erase ERS of the second block BLK is executed for the time t, and thus, the erase on the second block BLK is completed. Similarly, the fourth step erase ERS is an erase operation from when the erase of the second block BLK is resumed and until the erase is completed. FIG. 5 FIG. 5 FIG. 5 1 0 For convenience of explanation, although explains that the erase on the second block BLK is completed through the four-step erase, embodiments based on are not limited thereto. Although, the program of the first block BLK is explained as being divided into three steps, embodiments based on are not limited thereto. FIG. 6 1 3 0 3 1 4 0 3 Referring to , programs PGM to PGM on a plurality of dies (e.g., DIE to DIE) with blocks included in the Nth super block, and the erases ERS to ERS on a plurality of dies (e.g., DIE to DIE) with blocks included in the N+1st super block are performed alternately. 1 0 0 3 0 As shown, in the first step erase ERS section, the first step erase (see, reference numeral “N+1.first”) of the first block BLK of each die (e.g., DIE to DIE) with blocks included in the N+1st super block may be performed. Accordingly, four blocks total are subject to the step erase operation, and the erased blocks are one block (i.e., the first block BLK) of each of the four DIEs with blocks included in the N+1st super block. 1 1 0 3 1 FIG. 5 Subsequently, in the program PGM section, the program of the second block BLK of each die (e.g., DIE to DIE) with blocks included in the Nth super block is performed. Unlike the programming shown in , here four blocks total are programmed, and the programmed blocks are one block (i.e., the second block BLK) of each of the four DIEs with blocks included in the Nth super block. 3 0 0 3 0 Subsequently, in the third step erase ERS section, a n−1 step erase (see, reference numeral “N+1.n−1”) of the first block BLK of each die (e.g., DIE to DIE) with blocks included in the N+1st super block may be performed. Here, again, four blocks total are subject to the step erase operation, and the erased blocks are one block (i.e., the first block BLK again) of each of the four DIEs with blocks included in the N+1st super block. 3 1 0 3 1 Subsequently, in the program PGM section, the program of the second block BLK of each die (e.g., DIE to DIE) with blocks included in the Nth super block is performed. Here, again, the four blocks total are programmed, and the programmed blocks are one block (i.e., the second block BLK again) of each of the four DIEs with blocks included in the Nth super block. 4 0 0 3 0 Subsequently, in a fourth step erase ERS section, a n-step erase (see, reference numeral “N+1.n”) of the first block BLK of each die (e.g., DIE to DIE) with blocks included in the N+1st super block may be performed. Here, again, four blocks total are subject to the step erase operation, and the erased blocks are one block (i.e., the first block BLK again) of each of the four DIEs with blocks included in the N+1st super block. 1 4 0 3 1 4 0 0 3 10 1 4 130 0 As shown, the multiple step erase (ERS to ERS) sections of each die (e.g., DIE to DIE) with blocks included in the N+1st super block may overlap each other. However, since the step erase (ERS to ERS) sections of each step are short compared to performing the erase operation for the first block BLK of each die (e.g., DIE to DIE) without stopping until completion, the data provided by the host may be stored in the buffer memory during the erase (ERS to ERS) sections of each step without significantly increasing the storage capacity of the buffer memory (e.g. the memory ), and the host write throughput does not become . FIGS. 7 to 10 FIGS. 7 to 10 0 Hereinafter, an implementing method of alternately performing a program on a part of the Nth super block and a phased erase of the N+1st super block will be explained referring to as an example. For convenience of explanation, mainly explain the operation of the first die DIE. FIG. 7 FIG. 8 FIG. 9 FIG. 7 FIG. 8 FIG. 9 1 1 , and are diagrams indicating a current throughput (Current_throughput). In each of , and , an x-axis indicates a time, and a y-axis indicates a throughput. TH indicates a threshold throughput, and MAX indicates the maximum throughput of the first die. FIG. 7 FIG. 8 FIG. 9 FIG. 7 0 0 1 0 1 0 0 1 1 1 As shown in , , and , and as explained below, when a program of a block (e.g., BLK) is performed, the current throughput of the DIE (e.g., DIE) that includes the block increases, whereas when an erase of the block (e.g., BLK) is performed, the current throughput of the DIE (e.g., DIE) that includes the block decreases. Thus, for a first DIE, the current throughput of the first DIE increases when the program of the first block of the first DIE is performed, and the current throughput of the first DIE decreases when the erase of the second block of the first DIE is performed. First, referring to , a first program PGM on the first block BLK of the first die DIE is performed. While the first program PGM is performed, the current throughput continuously increases and may reach the maximum throughput MAX (see, reference numeral P). 1 1 1 0 1 1 1 1 1 1 1 1 When the first program PGM is completed, the first step erase ERS of the second block BLK may be performed. If the current throughput of the first die DIE is greater than the threshold throughput TH when the first program PGM is completed, the first step erase ERS of the second block BLK may be performed. Here, since the program operation is not performed during an erase operation, the current throughput is reduced from the maximum throughput MAX to the threshold throughput TH (see, reference numeral B). When the current throughput becomes equal to or smaller than the threshold throughput TH, it is confirmed whether a program task waits in the queue. If the program task awaits, the erase operation is suspended. 2 2 1 Subsequently, the waiting program tsk (i.e., the second program PGM) is performed. While the second program PGM is performed, the current throughput continuously increases and may reach the maximum throughput MAX. 2 2 1 0 1 2 2 1 1 1 1 When the second program PGM is completed, the erase may be resumed to perform the second step erase ERS of the second block BLK. If the current throughput of the first die DIE is greater than the threshold throughput TH when the second program PGM is completed, the second step erase ERS of the second block BLK may be performed. The current throughput is reduced from the maximum throughput MAX to the threshold throughput TH. If the current throughput becomes equal to or smaller than the threshold throughput TH and the program task awaits, the erase operation is again suspended. 3 Then, the waiting program task (i.e., the third program PGM) is performed. That is, the programming task that is waiting to be performed, is performed. 0 1 1 1 In this way, the program on the first block BLK and the erase on the second block BLK may be alternately performed so that the current throughput is controlled between the threshold throughput TH and the maximum throughput MAX. FIG. 8 1 0 0 1 1 1 Referring to , the first program PGM on the first block BLK of the first die DIE is performed. While the first program PGM is performed, the current throughput continuously increases and may reach the maximum throughput MAX (see, reference numeral P). 1 1 1 1 1 2 1 1 10 1 1 When the first program PGM is completed, the first step erase ERS of the second block BLK is performed. Since the program operation is not performed during an erase operation, the current throughput may be reduced from the maximum throughput MAX to the threshold throughput TH (see, reference numeral B). When the current throughput reaches the threshold throughput TH, it is confirmed whether the program task waits in the queue. If there is no waiting program task, the first step erase ERS is continued. Since there is no program requested by the host , even if the first step erase ERS is continued, the current throughput maintains the threshold throughput TH. 10 1 2 0 0 When there is a program request from the host , the erase ERS is suspended, and the second program PGM on the first block BLK of the first die DIE is performed. FIG. 9 FIG. 10 1 2 0 Referring to and , the maximum throughput MAX and MAX may be set differently depending on the position where programming is occurring in the first block BLK. FIG. 10 0 2 0 1 3 6 0 2 1 1 2 For example, in , when programming some word lines (for example, WL to WL) at the beginning of the first block BLK, the maximum throughput may be set to MAX, and when programming some word lines (e.g., WL to WL) located in the middle of the first block BLK, the maximum throughput may be set to MAX greater than MAX. Also, the maximum throughput when programming some word lines (e.g., WLb) located at the end of the first block may be reduced from MAX to MAX. 0 0 The program of the first block BLK may be performed in the order of the arranged word lines (that is, in the order of WL to WLb). 1 0 0 1 0 2 1 1 1 The first program PGM on the first block BLK of the first die DIE is performed. Here, the first program PGM may be performed on the word lines WL to WL. While the first program PGM is being performed, the current throughput continuously increases, and may reach the maximum throughput MAX (see, reference numeral P). 1 1 1 1 1 1 When the first program PGM is completed, the first step erase ERS of the second block BLK is performed. The current throughput is reduced from the maximum throughput MAX to the threshold throughput TH (see, reference numeral B). Because the program task waits in the queue, the erase is suspended. 2 2 3 6 2 2 3 Next, the waiting program task (i.e., the second program PGM) is performed. Here, the second program PGM may be performed on the word lines WL to WL. While the second program PGM is being performed, the current throughput continuously increases and may reach the maximum throughput MAX (see, reference numeral P). 2 2 1 2 1 3 When the second program PGM is completed, the erase is resumed and the second step erase ERS of the second block BLK is performed. The current throughput is reduced from the maximum throughput MAX to the threshold throughput TH (see, reference numeral B). When the program task waits, the erase is suspended. 2 1 2 1 2 1 2 1 1 1 A duration of the second step erase ERS is longer than a duration of the first step erase ERS. Since the maximum throughput MAX is larger than the maximum throughput MAX, the time taken to reach from the maximum throughput MAX to the threshold throughput TH (that is, the duration of the second step erase ERS) becomes longer than the time taken to reach from the maximum throughput MAX to the threshold throughput TH (that is, the duration of the first step erase ERS). 3 3 3 1 4 3 3 3 1 1 3 2 Next, the waiting program task (that is, the third program PGM) is performed. The third program PGM may be performed on the word line WLb. While the third program PGM is being performed, the current throughput gradually increases and may reach the maximum throughput MAX (see, reference numeral P). Although not shown separately, the third step erase ERS is performed after the third program PGM, and the third step erase ERS is performed until the current throughput reaches from the maximum throughput MAX to the threshold throughput TH. Therefore, the duration of the third step erase ERS is shorter than the duration of the second step erase ERS. 1 2 1 2 0 In this way, the durations of the phased erases ERS and ERS may be adjusted by setting the maximum throughputs MAX and MAX differently depending on the position of the programming operation in the first block BLK. FIG. 11 FIG. 12 FIG. 13 , and are flowcharts for explaining the operation of the memory controller according to some embodiments of the present disclosure. FIG. 11 First, referring to , it is assumed that the program on the Nth super block and the erase on the N+1st super block are both waiting in the queue. FIG. 11 310 The process of begins by selecting one die among all dies at S. For example, the selected die may be selected according to a round robin procedure. Selection by the round robin procedure may mean selection of one die among all dies without prioritization. All dies may be subject to selection by the round robin procedure, and dies may be individually selected using the round robin procedure in a plurality of selections. FIG. 11 320 Next, the process of includes confirming whether the selected die is being erased at S. 320 332 FIG. 12 When the die is being erased (S=Y), an erase start time (erase start_time) is subtracted from the current time (current_time) to calculate an erase processing time (erase_processing_time). The erase processing time is calculated at S as shown in . 334 FIG. 12 Next, the current value of the current throughput (Current_throughput) is calculated at S as shown in . A value obtained by multiplying the throughput of the selected die (Die_throughput) by the erase processing time (erase_processing_time) is subtracted from the previous value of the current throughput to determine the current value of the current throughput. 336 334 1 FIG. 12 FIG. 8 Subsequently, at S in , the final current throughput (Current_throughput) is determined by comparing the value calculated in S with the threshold throughput (threshold_throughput). The final current throughput (Current_throughput) does not fall below the threshold throughput (threshold_throughput). As explained in , when there is no waiting program task, even if the erase operation is continued without suspension, the current throughput maintains the threshold throughput TH. 338 FIG. 12 Next, at S in , the erase start time (erase start_time) is recorded as the current time (current_time). FIG. 11 FIG. 12 338 340 Referring to again, after S in , at S it is checked whether the current throughput (Current_throughput) is equal to or smaller than the threshold throughput (threshold_throughput). 340 350 If the current throughput (Current_throughput) is equal to or smaller than the threshold throughput (threshold_throughput) (S=Y), it is checked whether there is a waiting program at S. 350 360 362 370 If there is a waiting program (S=Y), the erase is suspended at S, and the programming operation starts at S. Next, the program start time (program start_time) is recorded as the current time at S. 350 350 391 340 340 391 If there is no waiting program in step S (S=N), the process ends at S and may return to the beginning. Or, if the current throughput (Current_throughput) is larger than the threshold throughput (threshold_throughput) in step S (S=N), the process ends at S and may return to the beginning. 320 320 322 On the other hand, if the erase operation is not being performed in step S (S=N), it is checked whether the program operation is performed at S. 322 382 FIG. 13 If the program operation is performed (S=Y), the program start time (program start_time) is subtracted from the current time (current_time) to calculate the program processing time (program_processing_time), as shown in S of . 384 FIG. 13 Next, the current value of the current throughput (Current_throughput) is calculated at S of . The previous value of current throughput is added to the value obtained by multiplying the throughput of die (Die_throughput) by the program processing time (program_processing_time) to determine the current value of current throughput. 384 386 FIG. 13 Subsequently, the final current throughput (Current_throughput) is determined by comparing the value calculated at S with the throughput of die (Die_throughput), as shown in S of . The final current throughput (Current_throughput) does not exceed the throughput of die (Die_throughput) (i.e., the maximum throughput of die). This is because the current throughput may not exceed the throughput of die, even if only a program is continued without erasing in the middle. 388 FIG. 13 Next, the program start time (program start_time) is recorded as the current time (current_time) at S of . FIG. 11 FIG. 13 338 391 Referring to again, after S in , the process ends at S and may return to the beginning. 322 322 324 On the other hand, if the program operation is not performed (S=N) in step S, it is checked whether there is a suspended erase (S). 324 392 If there is a suspended erase (S=Y), the erase is resumed again at S. 394 Next, the erase start time (erase start_time) is recorded as the current time (current_time) at S. 324 324 326 On the other hand, if there is no suspended erase (S=N) in step S, it is confirmed whether there is an erase task in the queue corresponding to the selected die at S. 326 392 326 310 If there is an erase task in the queue (S=Y), the erase starts at S, and if there is no erase task in the queue (S=N), the process returns to the beginning at S. 1 FIGS. 14 to 19 Hereinafter, a method for controlling so that erase sections of the dies overlap to a minimum within the time (i.e., t) at which the program on the Nth super block needs to be completed will be explained referring to . FIG. 14 is a diagram for explaining the operation of the memory controller according to some other embodiments of the present disclosure. FIG. 14 FIG. 14 FIG. 14 FIG. 14 FIG. 14 0 0 1 1 0 1 10 11 12 13 0 1 2 3 1 0 10 1 2 3 11 12 13 0 1 2 0 1 1 2 3 0 1 2 3 In , as with many other embodiments herein, a first die may be DIE and may include at least a first block (e.g., a BLK) and a second block (e.g., a BLK), and a second die may be DIE and may include a third block (e.g., a BLK) and a fourth block (e.g., a BLK). Referring to , the erase sections ERS, ERS, ERS, and ERS of dies DIE, DIE, DIE, and DIE are placed so as not to overlap each other for a predetermined time t. For example, while a die DIE performs the erase ERS of the N+1st super block, other dies DIE, DIE, and DIE do not perform erases ERS, ERS, and ERS of the N+1st super block. Thus, for example, a first erase section of the second block of DIE and a first step erase section of the fourth block of DIE do not overlap at all in . Similarly, if a third die may be DIE and may include at least a fifth block (e.g., a BLK) and a sixth block (e.g., a BLK), the first erase section of the fourth block of DIE and a first erase section of the sixth block of DIE do not overlap at all in . Moreover, if a fourth die may be DIE and may include at least a seventh block (e.g., a BLK) and an eighth block (e.g., a BLK), the first erase section of the sixth block of DIE and the first erase section of the eighth block of DIE do not overlap at all in . Specifically, if the program of the Nth super block needs to be completed for 100 ms, the erase of the N+1st super block also needs to be completed within 100 ms. For example, if the memory device is assumed to include four dies and the time taken for one die to perform the erase operation is 25 ms, the four dies may perform the erase without overlapping at all because the 4 segments each of 25 ms total to 100 ms. However, if the time taken for one die to perform the erase operation is 30 ms, the four dies may not perform an erase without overlapping at all because the 4 segments each of 30 ms total to 120 ms, and thus exceed the 100 ms time for completion. When comparing the program time (100 ms) with the total erase time (120 ms), the erases of the four dies overlap by at least 20% (=20 ms/100 ms). In this way, the overlapping erase sections may be determined in consideration of the program time of the Nth super block, and the erase time of each die (that is, the time to erase the blocks included in the N+1st super block on each die). FIG. 15 FIG. 16 and show a control so that the erase sections of the dies overlap to a minimum by the introduction of a token concept. The token concept described herein may be considered analogous to a timer such as an hourglass used to count up from an initial number of total tokens during a step erase and that is at 0 or from an offset from 0 at the beginning of each step erase. The initial number of total tokens and the rate of increase may both be adjusted based on a length of an erase section (e.g., durations of step erases for a second block and for a fourth block of a second super block), and/or based on a length of a program time (e.g., a duration of a programming operation for a first block and for a third block of a first super block). FIG. 15 10 Referring to , for example, the initial number of total tokens may be given as . The initial number of total tokens may be determined in consideration of the program time on the Nth super block, and the erase time of each die (that is, the time to erase the blocks included in the N+1st super block on each die). 21 0 0 10 10 21 At time t, the blocks included in the N+1st super block of the first die DIE are erased. When the DIE erase starts, the initial number is reduced by predetermined consumed tokens. Because the initial number is , and the number of predetermined consumed tokens is , the total tokens becomes 0 at time t (∴10−10=0). If the erase progresses, the number of total tokens gradually increases with the erase progress time. Or, the number of total tokens may increase in consideration of not only the erase progress time but also the number of dies in which the erase operation is being performed. That is, “erase progress time x number of erase operation dies=number of increased tokens” may be established. For example, if one die performs an erase for a specific time, the number of total tokens may be increased by 1 (∴ 1×1=1). However, if two dies perform the erase for the specific time, the number of total tokens may be increased by 2 (∴1×2=2). Hereinafter, a case where the number of total tokens is increased in consideration of the erase progress time and the number of dies in which the erase operation is being performed will be explained. 22 1 At time t, the number of total tokens becomes 5 (∴5×1=5) in consideration of the erase progress time and the number of dies in which the erase operation is performed. Since the number of total tokens has not reached the number of threshold tokens (for example, 10), the blocks included in the N+1st super block of the second die DIE are not erased. 23 1 1 At time t, the number of total tokens becomes 10 in consideration of the erase progress time and the number of dies in which the erase operation is performed. Since the number of total tokens has reached the number of threshold tokens (for example, 10), the blocks included in the N+1st super block of the second die DIE are erased. When the DIE erase starts, the total tokens decrease by predetermined consumed tokens, and becomes 0 (∴10−10=0). 24 At time t, the number of total tokens becomes 5. 25 2 2 At time t, the number of total tokens becomes 10. Since the number of total tokens has reached the number of threshold tokens (for example, 10), the blocks included in the N+1st super block of the third die DIE are erased. When the DIE erase starts, the total tokens decrease by the predetermined consumed tokens, and becomes 0 (10−10=0). 26 At time t, the number of total tokens becomes 5. 27 3 At time t, since the number of total tokens becomes 10, the blocks included in the N+1st super block of the fourth die DIE are erased. 28 At time t, the number of total tokens becomes 5. 29 0 At time t, since the number of total tokens reached 10, although not shown separately, the erase of the blocks included in the N+1st super block is finished and the blocks included in the N+2nd super block of the first die DIE may be erased. FIG. 16 FIG. 15 FIG. 16 FIG. 16 FIG. 16 FIG. 16 FIG. 16 0 0 1 1 0 1 0 1 2 0 1 1 2 3 0 1 2 3 The greatest difference between the method explained in and the method explained in is that the initial number of total tokens is different. Referring to , for example, the initial number of total tokens may be given as 15. The initial number of total tokens is determined by considering the program time on the Nth super block, and the erase time of each die (that is, the time to erase the blocks included in the N+1st super block on each die). In , as with many other embodiments herein, a first die may be DIE and may include at least a first block (e.g., a BLK) and a second block (e.g., a BLK), and a second die may be DIE and may include a third block (e.g., a BLK) and a fourth block (e.g., a BLK). As explained below, in , for example, a first erase section of the second block of DIE and a first step erase section of the fourth block of DIE only partially overlap. Similarly, if a third die may be DIE and may include at least a fifth block (e.g., a BLK) and a sixth block (e.g., a BLK), the first erase section of the fourth block of DIE and a first erase section of the sixth block of DIE only partially overlap in . Moreover, if a fourth die may be DIE and may include at least a seventh block (e.g., a BLK) and an eighth block (e.g., a BLK), the first erase section of the sixth block of DIE and the first erase section of the eighth block of DIE only partially overlap in . FIG. 16 21 0 0 10 21 Referring to , at time t, the blocks included in the N+1st super block of the first die DIE are erased. When the DIE erase starts, the total tokens are reduced from the initial number 15 by predetermined consumed tokens , and becomes 0 at time t (∴15−10=5). The number of total tokens increases, in consideration of the erase progress time and the number of dies in which the erase operation is performed. 22 1 10 22 0 1 At time t, the total tokens increase by 5 (∴ 5×1=5), in consideration of the erase progress time and the number of dies in which the erase operation is performed, and the number of total tokens becomes 10. Since the number of total tokens has reached the number of threshold tokens (for example, 10), the blocks included in the N+1st super block of the second die DIE are erased. Since the erase starts, the total tokens decrease by the predetermined consumed tokens , and becomes 0 (∴ 10−10=0). At time t, under the situation in which the erase of the first die DIE does not end, it may be known that the erase of the second die DIE starts. 23 2 10 23 1 2 At time t, the total tokens increase by 10 (∴ 5×2=10) in consideration of the erase progress time and the number of dies in which the erase operation is performed, and the number of total tokens becomes 10. Since the number of total tokens has reached the number of threshold tokens (for example, 10), the blocks included in the N+1st super block of the third die DIE are erased. Since the erase starts, the total tokens decrease by predetermined consumed token , and becomes 0 (∴ 10−10=0). At time t, under the situation in which the erase of the second die DIE is not ended, it may be known that the erase of the third die DIE starts. 24 3 10 At time t, the total tokens increase by 10 (∴ 5×2=10), in consideration of the erase progress time and the number of dies in which the erase operation is performed, and the number of total tokens becomes 10. The blocks included in the N+1st super block of the fourth die DIE are erased. The erase starts, and at the same time, the total tokens decrease by predetermined consumed tokens , and becomes 0 (∴ 10−10=0). 25 0 Similarly, at time t, the total token becomes 10, and the blocks included in the N+2nd super block of the first die DIE are erased. 26 1 At time t, the total token becomes 10, and the blocks included in the N+2nd super block of the second die DIE are erased. 27 2 At time t, the total token becomes 10, and the blocks included in the N+2nd super block of the third die DIE are erased. 28 3 At time t, the total token becomes 10, and the blocks included in the N+2nd super block of the fourth die DIE are erased. FIGS. 15 and 16 As explained using , by setting the number of tokens to increase in consideration of at least one of the initial number of total tokens, the number of tokens consumed at the start of the erase, and the erase progress time, it is possible to control the degree of overlap of the erase sections of the plurality of dies. For example, as explained below, when a first die includes a first block and a second block and a second die includes a third block and a fourth block, the relative and/or absolute amount of overlap of the overlapping section changes or may be changed. The change in relative and/or absolute amount of overlap may be based on, for example, a program time of the first super block, a length of the erase section of the second block of the first die, and a length of the erase section of the fourth block of the second die (e.g., when the second block of the first die and the fourth block of the second die comprise a second super block). The number of total tokens at the start of a step erase may change or be changed based on factors such as these. FIG. 15 0 1 0 1 For example, as shown in , by setting the initial number of total tokens to 10 and the number of tokens consumed at the start of erase to 10, it is possible to perform the control so that the erase sections of two dies (e.g., DIE and DIE) do not overlap. The control may be performed so that the erase of the first die DIE ends, and at the same time, the erase of the second die DIE starts. FIG. 16 0 1 As shown in , by setting the initial number of total tokens to 15 and the number of tokens consumed at the start of erase to 10, it is possible to perform the control so that the erase sections of the two dies (e.g., DIE and DIE) overlap each other by about 50%. 0 1 As still another example, when the initial number of total tokens is set to 12, and the number of tokens consumed at the start of erase is set to 10, it is possible to perform he control so that the erase sections of the two dies (e.g., DIE and DIE) overlap each other by about 20%. 0 1 As still another example, when the initial number of total tokens is set to 8, and the number of tokens consumed at the start of erase is set to 10, it is possible to perform the control so that an erase free section (a section in which the erase is not performed on any die) is located between the erase sections of two dies (e.g., DIE and DIE). FIG. 17 FIG. 18 and are flow charts for explaining an operation of a memory controller according to other embodiments of the present disclosure. FIG. 17 Referring to first, it is assumed that the program on the Nth super block and the erase on the N+1st super block are waiting in the queue. 410 It is checked whether the erase operations are being performed at S. 410 422 FIG. 18 If the erase operations are being performed (S=Y), an elapsed time (elapsed_time) is calculated for all the dies in which the erase operations are being performed at S of . The elapsed time (elapsed_time) is calculated by subtracting the check time (check_time) from the current time (current_time). 424 FIG. 18 Next, the number of remaining tokens (remain_tokens) (that is, total tokens) is calculated at S of . The previous value of the remaining tokens (remain_tokens) is added to the number of tokens which increases in proportion to the elapsed time (elapsed_time) to determine the current value of the remaining tokens (remain_tokens). Specifically, the number of increasing tokens may be a value obtained by multiplying the token (erase_consume_token) consumed at the same time as the start of erase by the ratio of the elapsed time (elapsed_time) and the erase time (erase_time). That is, if the token (erase consume_token) consumed at the same time as the start of erase is 10, the erase time (erase_time) is 25 ms, and the elapsed time (elapsed_time) is 5 ms, the number of increasing tokens is 2 (∴2=10×5/25). 426 FIG. 18 Then, the current time (current_time) is recorded as the check time (check_time) at S of . FIG. 17 430 Refer to again, it is checked whether there are remaining erases to be performed at S. 340 440 If there are remaining erases to be performed (S=Y), a die that has no record of performing the erase (that is, the erase count (die_erase_count) is smaller than 1) is selected at S. 450 Next, it is checked whether the remaining tokens (total tokens) are equal to or larger than the consumed tokens (erase_consume_token) at S. 450 460 If the remaining tokens are equal to or larger than the consumed tokens (S=Y), the consumed tokens are subtracted from the initial values of the remaining tokens to calculate the current value of the remaining tokens at S. 470 Next, the erase operation starts at S. 480 430 Next, the current time (current_time) is recorded as the check time (check_time) at S. Next, the process returns to S. 430 430 450 450 On the other hand, if there are no remaining erases to be performed in step S (S=N), or if the remaining tokens are smaller than the consumed tokens in step S (S=N), the process ends. FIGS. 5 to 13 FIGS. 14 to 18 On the other hand, although the method for performing the erase on the N+1st super block divided into multiple steps (see ), and the method for controlling so that the erase sections of dies overlap to the minimum (see ) have been explained, the methods may be used in combination with each other. FIG. 6 0 0 1 0 0 1 0 1 4 For example, although shows that the erase section (N+1.first) of the first die DIE and the erase section (N+1.first) of the second die DIE belonging to the first step erase ERS overlap each other, the erase section (N+1.first) of the first die DIE and the erase section (N+1.first) of the second die DIE belonging to the first step erase ERS may only partially overlap or may not completely overlap each other. Or, the erase section (N+1.n) of the first die DIE and the erase section (N+1.n) of the second die DIE belonging to some other step erase (e.g., ERS) may only partly overlap or may not completely overlap each other. 150 100 On the other hand, in some embodiments of the present disclosure, the maximum throughput (Max throughput) of the memory device is larger than the Host Interface Max Write Throughput. Therefore, even if a large-capacity buffer memory is not adopted, the erase section may be controlled in the same manner as in the above-mentioned methods, and the solution throughput of the storage device may be made as much as the maximum write throughput of the host interface. Although examples of implementations relating to the inventive concept(s) described herein have been explained above referring to the attached drawings, the inventive concept(s) described herein are not limited to the examples and may be produced or otherwise manifested in various different forms. Those skilled in the art will appreciate that the examples may be implemented in other specific forms without changing the technical ideas and essential features of the inventive concept(s) described herein. Therefore, the disclosed preferred embodiments of the inventive concept(s) described herein are used in a generic and descriptive sense only and not for purposes of limitation.
Recruitment, Part-time, and Separations by Employment Growth of Firms One test of the model is in its ability to match the vacancy rates, hiring rate, layoff rate, and part-time rate used by firms over the employment growth distribution. Figure 1.12 shows that the model is able to match the patterns of vacancies and hires across the growth distribution of firms. Similar to Kaas and Kircher (2015), the model matches the broad pattern that vacancies are posted by growing firms, though the vacancy rate is higher than it is in the data. This can be matched more closely through a higher Y in the recruitment cost function. The data may also not entirely account for the increased recruitment of rapidly growing firms if multiple hires result from a single vacancy. Figure 1.13 shows the growth rate of hours per worker, the layoff rate, and the part-time rate of firms by monthly employment growth rate. The model produces a positive correlation of layoff rates and part-time share of employment for contracting firms. This result is consistent with the evidence in CPS flow data that workers in part-time employment have high separation rates to unemployment. While layoffs are only used in contracting firms, some workers separate from all firms due to exogenous quits. Part-time usage, however, is exclusively used by shrinking firms. The likelihood of separating to unemployment given a worker has been placed into part-time work is therefore high, as some workers in the firm will also be laid off at the end of the period. Although the monthly average part-time rate is lower than the layoff rate for shrinking firms, this is not necessarily contrary to the fact that full-time workers are more likely to move to P T E than to unemployment in the CPS. From the firm’s individual policy function, Figure 1.9 in Section 1.4 showed that a contracting firm can use more part-time than separations in a period. While the layoff rate reflects total layoffs by a firm within the month, part-time percentage is an average of the weekly part-time utilization of a firm. The transitory nature of part-time usage and time-aggregation of total separations to a monthly rate can make the average parttime rate low in Figure 1.13, even if firms are moving more workers to part-time than using layoffs. This short-term nature of part-time utilization in the model is also reflected in the growth-rate of weekly hours per worker for shrinking firms. While part-time usage and layoffs increase steadily for shrinking firms, the average monthly change in weekly hours per worker is relatively stable except at very negative growth-rates. This is due to fluctuations in part-time usage within a given month. If part-time usage were very persistent, it would be reflected in a steadier decline in the monthly growth rate of average weekly hours per worker.
http://www.dankinhte.vn/recruitment-part-time-and-separations-by-employment-growth-of-firms/
MIAMI— August 14, 2017 —Abstracting History, the second chapter of Pérez Art Museum Miami’s (PAMM) multi-part, yearlong exhibition dedicated to contemporary Cuban art, opens September 22, 2017. On the Horizon: Contemporary Cuban Art from the Jorge M. Pérez Collection features over 170 works of art spanning painting, drawing, photography, mixed-media and sculpture and highlights a rich panorama of recent work produced by artists living both in Cuba and abroad. Chapter 2: Abstracting History takes a closer look at artists whose work primarily explores abstract geometries—including linear horizon lines—as they relate to both personal and historical narratives. On the Horizon celebrates the recent generous gift of Cuban artworks donated to the museum by Jorge M. Pérez in December 2016, and includes a significant number of recent acquisitions purchased during the last year with funds provided as part of Mr. Pérez’s donation. Picking up the thematic thread from Chapter 1: Internal Landscapes (on view June 9, 2017 – September 10, 2017), Chapter 2: Abstracting History explores spiritual and political histories, and examines past and contemporary realities within the context of Cuba and its diaspora. A triptych by seminal 20th century Cuban abstract artist, Waldo Balart, will hang alongside works by contemporary artists who share similar formal, linguistic and modernist tendencies, including Kenia Arguiñao, Sandú Darié, and Aimée Garcia. Havana-based artist Reynier Leyva Novo revisits scenes from Cuban history to offer new critical perspectives; his El Peso de la Historia (The Weight of History) (2014), an installation of black squares of ink painted directly on the gallery wall, represents the amount of ink used to write nine influential laws that changed the history of Cuba. Multi-panel canvases by Zilia Sánchez, a Cuban artist living and working in Puerto Rico, showcase the artist’s approach to formal abstraction through her signature use of a shaped canvas, expressing a sensual juxtaposition between femininity and masculinity. Other important works that are now in PAMM’s permanent collection and part of the installation are: José Ángel Vincench Barrera’s Exilio 5 (2013); Alexandre Arrechea’s Remote Control – Campamento (2005); a series of 12 photographs by Havana-based artist, Leandro Feal, entitled ¿Y allá qué hora es? (2015-16); Leyden Rodríguez-Casanova’s mixed-media work, A Layered Frame Set (2013); and two artist books by Glenda León. With a new chapter opening every three months, On the Horizon is PAMM’s most ambitious Cuban art exhibition to date. The exhibition is organized around the metaphor of the horizon line—a motif that appears in many of the works on view—and brings together a strong view of artistic practices in Cuba from the last three decades as well as work by young, lesser-known artists working on the island and across the globe. The individual chapters each explore various meanings of the horizon, which include the vista as a symbol of desire, longing or containment. This symbolic framework helps generate a larger dialogue between the works on view and the specificities of Cuba’s current physical, social and political landscape, as revealed through each artist’s personal experience and unique aesthetics. As Miami’s flagship contemporary art museum, collecting the work of Cuban artists and documenting the Cuban Diaspora exemplifies PAMM’s mission to represent its place in the world—geographically, conceptually and intellectually. Cuba, equally a part of Latin America and the Caribbean, has been an area of sustained interest at PAMM going back to its beginnings as a presenting institution. The presentation of On the Horizon at PAMM coincides with a renewed energy internationally around Cuban art at a time when US-Cuban relations remain an active subject of discussion. Through this gift, PAMM now holds one of the largest collections of contemporary Cuban art in any American museum. On the Horizon: Contemporary Cuban Art from the Jorge M. Pérez Collection will be accompanied by two publications, the first being an exhibition guide available at the opening of Chapter 1 and a fully illustrated bi-lingual exhibition catalogue with commissioned essays. Pérez Art Museum Miami (PAMM) promotes artistic expression and the exchange of ideas, advancing public knowledge and appreciation of art, architecture and design, and reflecting the diverse community of its pivotal geographic location at the crossroads of the Americas. A 32-year-old South Florida institution formerly known as Miami Art Museum (MAM), Pérez Art Museum Miami opened a new building, designed by world-renowned architects Herzog & de Meuron, in Downtown Miami’s Museum Park on December 4, 2013. The facility is a state-of-the-art model for sustainable museum design and progressive programming and features 200,000 square feet of indoor and outdoor program space with flexible galleries; shaded outdoor verandas; a waterfront restaurant and bar; a museum shop; and an education center with a library, media lab and classroom spaces. For more information, please visit www.pamm.org, find us on Facebook (facebook.com/perezartmuseummiami), or follow us on Instagram and Twitter (@pamm).
https://www.pamm.org/about/news/2017/abstracting-history-second-chapter-horizon-contemporary-cuban-art-jorge-m-p%C3%A9rez?lang=tl
Let’s say you are in a situation where you’re required to spend time with someone who has a negative attitude, be it in school, in a volunteer situation, at work, or in your own family. It seems like their attitude is consistently negative, and you grow more and more annoyed by them as time passes. They are annoying you! Maybe you think they are totally ruining your day, and you believe you’re right in your thinking, and you want them to know it! How much of your thinking is making you suffer? Everyone has days when an attitude adjustment would make being around them more pleasant. But, the way they are acting doesn’t have to cause you to feel negative too. People are people, and things happen. Have you ever considered that it doesn’t have to be an invitation to join in? You are only in control of you. Having a real understanding of this is a part of what emotional maturity is. Emotional maturity doesn’t mean that you no longer enjoy things with youthful curiosity. It means that you no longer react to people, places, and things from feeling disempowered by what you can’t control. What IS emotional maturity? When you consistently choose to take full responsibility for your emotions, you are acting mature. Your experience is a product of your own thinking. No matter how painful most things are, or how people can be, mostly nothing is being done to you without your interpretation of how you choose to act or react towards it. Emotional maturity is a skill you can develop. You can learn to witness your thoughts and make decisions about how you want to process them. Without this skill, most people who experience uncomfortable emotions will react, shut down, or blame others for their present feelings. Why is emotional maturity necessary? (Especially on a gap year!) Although you might be completely justified in reacting the way you do towards another person’s behavior, blaming something outside of yourself for how you feel disconnects you from your source of power to do something about it. Makes sense, right? In every moment, you have the power to choose between blaming something outside of yourself for how you feel or taking full responsibility for the thoughts you have about it. When you live with emotional maturity, it empowers you because you reconnect with your ability to respond intentionally to any circumstance, instead of reacting emotionally out of a place of fear, judgment, or victimhood. The more often you choose to self-regulate your emotional well-being, the more resilient you become when facing the inevitable challenges of taking a gap year, attending university, or exploring the world. How will you benefit from living with more emotional maturity? - You have the self-awareness to see the most empowering perspective available to you in every situation. - You free yourself from the drama cycle that perpetuates immature or disrespectful communication. - You no longer get upset or distracted by little things that don’t matter. - You are less likely to speak or act in a way that would harm, offend, or otherwise be unhelpful towards others. - You are more open to considering different points of view without getting defensive about your own. - You will respond intentionally, instead of reacting unconsciously, to emotionally challenging situations. What steps can you take to become more emotionally mature? - Identify when, where, and to whom you give your power away, so you can consciously reclaim it next time. - Identify where you might still be blaming an external person for the negative emotions you feel. - Learn how to relate to the emotions you observe and experience from a place of love, acceptance, and deep listening. - Begin voicing the authenticity of your present emotions to yourself or trusted members of your community, in the form of writings, recorded videos, or 1:1 conversations. - Practice taking a few deep breaths when you get triggered by something, and observe your thoughts with curiosity to understand the source of your suffering more clearly.
https://intentionalgapyear.org/the-value-of-emotional-maturity-for-college-and-gap-years/
The coronavirus pandemic forced brands across industries to change their approach to customer experience (CX) on the fly. So how did they do? This report reveals the scores of 220 brands across 13... - Report The Technology Imperative For Customer Experience LeadersMay 20, 2021 | TJ Keitt Customer experience (CX) functions cannot ensure quality experiences without the proper technology. This means that CX leaders must take an active role in how their businesses develop requirements... - Report The US Customer Experience Index, 2020 How Brands Build Loyalty With The Quality Of Their ExperienceJune 15, 2020 | TJ Keitt As brands grapple with changing consumer behaviors thanks to COVID-19, how well have they built loyalty with the quality of their customer experience (CX)? This year, we reveal the scores of all... - Report The Definitive Guide To Forrester's Journey Mapping Research A Guide To Our 25 Leading Journey Mapping ReportsAugust 2, 2019 | Angelina Gennis, Joana de Quintanilha, TJ Keitt Forrester has written more than 50 reports for customer experience (CX) pros on customer journey maps, which are fundamental tools for understanding and improving CX. Whether you are familiarizing... - Report A Snapshot Of B2B CX Programs What We Learned From Surveying Attendees Of The B2B Track At CX NYC 2019July 24, 2019 | TJ Keitt, Judy Weader CX NYC 2019's B2B track offered the opportunity for B2B customer experience (CX) leaders to baseline their CX programs' core capabilities needed for success: business case development, customer... - Report Keys To Implementing A B2B Customer Experience Program Lessons Learned From The B2B Track Session At CX NYCJuly 24, 2019 | TJ Keitt, Judy Weader Customer experience (CX) professionals at B2B companies have expressed a desire to learn more about how to create or improve upon their programs. This report shares highlights from the speakers at...
https://www.forrester.com/search-results/searchResults.xhtml?searchOption=0&N=0+80003+21108+52002&sort=3
ACE's Math PACE 1069 covers: reviewing place value and expanded notation through the hundred billions' place; reviewing the order of operations; reviewing how to solve for the missing number using inverse operations; learning about positive and negative numbers using the number line and the thermometer; reviewing how to add, subtract, multiply, and divide fractions; multiplying three fractions using cancellation; learning more about taking a fraction of a whole number; solving for the missing number in a proportion; reviewing how to divide by a decimal; dividing whole numbers when the divisor is greater than the dividend; changing a fraction to a decimal by dividing the numerator by the denominator; reviewing the relationship between fractions, decimals, and percents; changing a fraction to a percent and a percent to a fraction; and solving word problems. A variety of exercises help with review and retention. Full-color pictures. 49 pages, paperback booklet. Grade 6. PACE 1069. Answers are in the sold-separate PACE SCORE Key booklet. Accelerated Christian Education (ACE) curriculum has Scripture as its foundation, fully integrating biblical principles, wisdom, and character-building concepts into education. Students move at their own speed through the self-instructional 'PACE' workbooks. Following the mastery approach, PACEs are formatted for students to complete the exercises found throughout the workbook, take a practice 'self test,' and conclude with a 'final test' (removed from the center) to measure understanding. More From ChristiansUnite...
http://christian-book-store.christiansunite.com/6011319/Latest-Edition-Math-PACE-1069,-Grade-6.shtml
Palazzo Malvezzi Campeggi was built in around 1500 by Andrea Marchesi Di Pietro, called the Formigine, and by his brother Giacomo on top of an older structure belonging to Giovanni II Bentivoglio and later sold to the powerful aristocratic family Malvezzi. The First Floor was designed in the 18th century and frescoed by Carlo Lodi and Antonio Rossi. Some of the frescoes exalt the military valour of the Malvezzi family, including Emilio Malvezzi, who fought for King Sigismund II of Poland. The stuccoes by Carlo Nessi link the heraldic symbols of the Malvezzi and Campeggi families, who were joined in 1707 by the marriage between Matteo Malvezzi and Francesca Maria Campeggi. Vittorio Bigari, Gioacchino Pizzoli and Giovanni Benedetto Paolazzi decorated other rooms. The courtyard, damaged during WWII, has three orders of superposed columns: Doric, Ionic and Corinthian, with medallions depicting the major Roman emperors. A large sculpture of Hercules by Giuseppe Mazza decorates a niche in the courtyard.
https://www.bolognawelcome.com/en/home/discover/places/architecture-and-monuments/historical-buildings-and-streets/palazzo-malvezzi-campeggi/
The purpose of this study was to describe and analyze the discourses used by White preservice teachers in a dialogue about race with people of color. I used Whiteness theory to frame my observations, which defines Whiteness as a set of racialized relations that are historically, socially, politically and culturally produced. These relations result in White domination of people of color. Whiteness is a function of racism, and refers to the dimensions of racism that serve to elevate Whites.From the framework of Whiteness, I observed a series of facilitated interracial dialogues. Participants were seven White preservice teachers and five students of color. They participated in a series of four, two-hour sessions facilitated by an interracial team trained to lead dialogues on race. My analysis focused on describing the production of Whiteness in this context and the ways in which White preservice teachers discursively produced their racial positions in these conversations.I used discourse analysis to analyze my observations. Discourse analysis is the study of language use in social contexts, and is concerned with how ideologies are communicated (Evans, 2002; Gee, 1999). Discourse analysis allows for a nuanced explication of the socially and historically informed discourses that are available for negotiating racial positions, and can reveal processes of racism that would likely be formally denied by participants (Van Dijk, 1993).I document and analyze two master discourses of Whiteness in practice: individualism and universalism. Individualism posits that Whites are first and foremost individuals who have earned their place in society on their own merit. It works to deny that Whites benefit from their racial group memberships. Universalism posits that White interests and perspectives are objective and representative of all groups. An additional discourse that has not been highly visible in the Whiteness literature also surfaced: personal experience. This discourse represents racial perspectives as internal and private rather than as social or interrelational. All of these discourses serve to obscure White power and privilege and to reproduce Whiteness. I discuss the implications of these findings for teacher education, classroom teaching, and for White researchers conducting race related research.
https://digital.lib.washington.edu/researchworks/handle/1773/7867
Cross-Reference to Related Applications Technical Field CN201811093386X The present disclosure claims priority to Chinese Patent Application No. , filed with the Chinese Patent Office on September 18, 2018, entitled "Customer Visit Analysis Method and Apparatus, and Storage Medium", which is incorporated herein by reference in its entirety. The present disclosure relates to the field of data analysis and processing technologies, and in particular to a customer visit analysis method, a customer visit analysis apparatus, and a storage medium. Background Art With the increasing development of artificial intelligence, there is little difference between the accuracies of recognition of human faces by machines and by humans, and there are more and more applications based on face recognition. In a commercially intelligent scenario, each visitor photographed by a camera can basically be correctly identified based on a face recognition technology, but no effective solution has been proposed at this stage regarding how to accurately analyze visit records of each visitor according to the faces of these identified visitors. Summary The present disclosure provides a customer visit analysis method, a customer visit analysis apparatus, and a storage medium. acquiring face recognition result data of customers in a store, wherein the face recognition result data includes IDs of the customers and time periods during which the customers are photographed; clustering the face recognition result data of the customers in the store according to the IDs of the customers to obtain at least one time period which corresponds to the ID of each customer and during which the customer is photographed; if the ID of a customer corresponds to a plurality of time periods during which the customer is photographed, judging whether a time difference between two adjacent time periods among the plurality of time periods during which the customer is photographed is not greater than a staying duration threshold; if not greater, determining that the two adjacent time periods correspond to the same visit to the store; and determining arrival time and departure time for each visit to the store. In the present disclosure, the time period may be understood as a time stamp. A first aspect of the present disclosure provides a customer visit analysis method, comprising: Optionally, before the acquiring face recognition result data of customers in a store, the method further includes: clustering face recognition result data of all customers according to stores, to obtain face recognition result data of customers in each store. packaging face recognition result data transmitted from an upper-layer service and sending the face recognition result data to a message queue; and reading and processing the face recognition result data from the message queue. Optionally, before clustering face recognition result data of all customers according to stores, the method further includes: preprocessing face recognition result data after acquiring the face recognition result data transmitted from an upper-layer service, the preprocessing including completing data verification, sorting data structures, and compressing data; and packaging and sending the preprocessed face recognition result data to a message queue. Optionally, the packaging face recognition result data transmitted from an upper-layer service and sending the face recognition result data to a message queue includes: The reading and processing the face recognition result data from the message queue includes: decompressing the face recognition result data and sorting data structures; and saving the processed face recognition result data into a time series database according to a preset saving rule. dividing each day into a plurality of consecutive preset time periods and mapping each of the time periods which correspond to the ID of each customer and during which the customer is photographed to the plurality of consecutive preset time periods; determining the minimum time point and the maximum time point corresponding to the ID of the customer in each preset time period; and judging whether a difference between the minimum time point in a later preset time period and the maximum time point in an earlier preset time period of two adjacent preset time periods, among the preset time periods to which the time periods during which the customer is photographed are mapped, is not greater than the staying duration threshold. Optionally, the judging whether a time difference between two adjacent time periods among the plurality of time periods during which the customer is photographed is not greater than a staying duration threshold includes: projecting, into the consecutive preset time periods, consecutive time points in each of time periods which correspond to the ID of the same customer and during which the customer is photographed, wherein the length of a time interval between two adjacent preset time periods among the plurality of consecutive preset time periods is equal to the staying duration threshold. Optionally, the dividing each day into a plurality of consecutive preset time periods and mapping each of the time periods which correspond to the ID of each customer and during which the customer is photographed to the plurality of consecutive preset time periods includes: Optionally, the method further includes, after the determination of arrival time and departure time for each visit to the store, determining a staying duration for each visit of the ID of each customer to the store. Optionally, the face recognition result data includes a date. The method further includes, after the determination of arrival time and departure time for each visit to the store, determining the number of visits and a total staying duration corresponding to the ID of each customer on the date. integrating and saving at least one of the arrival time, the departure time, the staying duration, the total staying duration, and the number of visits corresponding to the ID of each customer into a database according to a preset saving condition, the preset saving condition including a store and/or a photographing area. Optionally, the face recognition result data further includes a photographing area where the customer is photographed. The method further includes: when real-time face recognition result data is being transmitted, judging whether facial data corresponding to the face recognition result data is the same as pre-stored facial data of an employee; if the facial data corresponding to the face recognition result data is the same as the pre-stored facial data of an employee, determining that the face recognition result data corresponds to face recognition result data of the employee; if the facial data corresponding to the face recognition result data is not the same as the pre-stored facial data of an employee, determining that the face recognition result data corresponds to face recognition result data of a customer in a store, and acquiring the face recognition result data. In the present disclosure, the employees include, but are not limited to, couriers, cleaners, security guards, etc. Optionally, the acquiring face recognition result data of customers in a store includes: if the ID of a customer corresponds to one time period during which the customer is photographed, deeming the time period to correspond to one visit of the customer to the store. Optionally, the method further includes: a data acquisition module, configured to acquire face recognition result data of customers in a store, where the face recognition result data includes IDs of the customers and time periods during which the customers are photographed; a customer analysis module, configured to cluster the face recognition result data of the customers in the store according to the IDs of the customers, to obtain at least one time period which corresponds to the ID of each customer and during which the customer is photographed; a data processing module, configured to judge, when the ID of a customer corresponds to a plurality of time periods during which the customer is photographed, whether a time difference between two adjacent time periods among the plurality of time periods during which the customer is photographed is not greater than a staying duration threshold; and determine that the two adjacent time periods correspond to the same visit to the store when the time difference is not greater than the staying duration threshold; and a visit determination module, configured to determine arrival time and departure time for each visit to the store. A second aspect of the present disclosure provides a customer visit analysis apparatus, comprising: Optionally, the apparatus further includes: a data classification module, configured to cluster face recognition result data of all customers according to stores, to obtain face recognition result data of customers in each store. Optionally, the data classification module is further configured to: package face recognition result data from an upper-layer service and send the face recognition result data to a message queue; and read and process the face recognition result data from the message queue, before clustering face recognition result data of all customers according to stores. Optionally, the data classification module is configured to: preprocess face recognition result data after acquiring the face recognition result data from an upper-layer service, the preprocessing including completing data verification, sorting data structures, and compressing data; package and send the preprocessed face recognition result data to a message queue; and save the processed face recognition result data into a time series database according to a preset saving rule. a time mapping module, configured to divide each day into a plurality of consecutive preset time periods and map each of the time periods which correspond to the ID of each customer and during which the customer is photographed to the plurality of consecutive preset time periods; an aggregation statistics module, configured to determine the minimum time point and the maximum time point corresponding to the ID of the customer in each preset time period; and a threshold judgment module, configured to judge whether a difference between the minimum time point in a later preset time period and the maximum time point in an earlier preset time period of two adjacent preset time periods, among the preset time periods to which the time periods during which the customer is photographed are mapped, is not greater than the staying duration threshold. Optionally, the data processing module includes: Optionally, the time mapping module is configured to: project, into the consecutive preset time periods, consecutive time points in each of time periods which correspond to the ID of the same customer and during which the customer is photographed, where the length of a time interval between two adjacent preset time periods among the plurality of consecutive preset time periods is equal to the staying duration threshold. Optionally, the visit determination module is further configured to: determine a staying duration for each visit of the ID of each customer to the store. Optionally, the face recognition result data includes a date. The visit determination module is further configured to: determine the number of visits and a total staying duration corresponding to the ID of each customer on the date after the arrival time and the departure time are determined for each visit to the store. A third aspect of the present disclosure provides an electronic device, comprising a processor, a memory, and a bus. The memory stores machine-readable instructions executable by the processor. When the electronic device is in operation, the processor communicates with the memory via the bus, and the machine-readable instructions are executed by the process to execute the method described in the first aspect. A fourth aspect of the present disclosure provides a storage medium. The storage medium stores a computer program that, when run by a processor, executes the method described in the first aspect. A fifth aspect of the present disclosure provides a computer program product which, when running on a computer, causes the computer to execute the method described in the first aspect. Compared with the prior art, a customer visit analysis method, a customer visit analysis apparatus, and a storage medium according to the present disclosure enable analysis of visit behaviors of customers based on face recognition results. Specifically, images in a store are captured by a camera and faces are recognized therefrom to obtain face recognition result data in the store, from which information on visits of customers to the store is analyzed so as to achieve the accurate analysis of the customer visit information, where the customer visit information includes the arrival time of a customer at the store and the departure time of the customer from the store. In order to enable clearer and easier understanding of the above objects, features, and advantages of the present disclosure, preferred embodiments will be described in detail below by way of example with reference to the accompanying drawings. Brief Description of the Drawings FIG. 1 shows a schematic diagram of an application scenario according to the present disclosure. FIG. 2 shows a flowchart of a customer visit analysis method according to the present disclosure; FIG. 3 shows another flowchart of a customer visit analysis method according to the present disclosure; and FIG. 4 shows a schematic diagram of a customer visit analysis apparatus according to the present disclosure. In order to more clearly illustrate technical solutions of embodiments of the present disclosure, drawings required for use in the embodiments will be described briefly below. It is to be understood that the drawings below are merely illustrative of some embodiments of the present disclosure, and therefore should not be considered as limiting its scope. It will be understood by those of ordinary skill in the art that other relevant drawings can also be obtained from these drawings without any inventive effort. Reference Numerals: Electronic device-10; memory-11; processor-12; network module-13; customer visit analysis apparatus-14; data acquisition module-100; customer analysis module-101; data processing module-102; visit determination module-103. Detailed Description of the Embodiments First Embodiment Second Embodiment The technical solutions of the present disclosure will be described below clearly and completely with reference to the accompanying drawings of the present disclosure. It is apparent that the embodiments to be described are some, but not all of the embodiments of the present disclosure. Generally, the components of the embodiments of the present disclosure, as described and illustrated in the figures herein, may be arranged and designed in a wide variety of different configurations. Thus, the following detailed description of the embodiments of the present disclosure, as represented in the figures, is not intended to limit the scope of the present disclosure as claimed, but is merely representative of selected embodiments of the present disclosure. All the other embodiments obtained by those of ordinary skill in the art in light of the embodiments of the present disclosure without inventive efforts will fall within the scope of the present disclosure as claimed. It should be noted that similar reference numerals and letters refer to similar items in the following figures, and thus once an item is defined in one figure, it may not be further defined or explained in the following figures. Some embodiments of the present disclosure will be described below in detail with reference to the accompanying drawings. The following embodiments and the features in the embodiments can be combined with each other without conflict. FIG. 1 FIG. 1 shows a schematic block diagram of an electronic device 10 according to the present disclosure. The electronic device 10 in the present disclosure may be a device with data processing functions, such as a server, a personal computer, a tablet computer, a smart phone, or the like. As shown in , the electronic device 10 includes a memory 11, a processor 12, a network module 13, and a customer visit analysis apparatus 14. The memory 11, the processor 12, and the network module 13 are directly or indirectly electrically connected to one another to implement data transmission or interaction. For example, these elements may be electrically connected to each other via one or more communication buses or signal lines. A customer visit analysis apparatus 14 is stored in the memory 11. The customer visit analysis apparatus 14 includes at least one software functional module that can be stored in the memory 11 in the form of software or firmware. The processor 12 executes various functional applications and data processing, namely, implements a data processing method executed by the electronic device 10 in the present disclosure, by running software programs and modules stored in the memory 11, such as the customer visit analysis apparatus 14 in the present disclosure. Here, the memory 11 may be, but is not limited to, a random access memory (RAM), a read only memory (ROM), a programmable read-only memory (PROM), an erasable programmable read-only memory (EPROM), an electric erasable programmable read-only memory (EEPROM), or the like. Here, the memory 11 is configured to store a program. The processor 12 executes the program after receiving an execution instruction. The processor 12 may be an integrated circuit chip with data processing capability. The above-mentioned processor 12 may be a general-purpose processor, including a central processing unit (CPU), a network processor (NP), and so on. The methods, steps, and logical block diagrams provided in the present disclosure can be implemented or executed. The general-purpose processor may be a microprocessor, or the processor may be any conventional processor or the like. The network module 13 is configured to establish a communication connection between the electronic device 10 and an external communication terminal through a network to implement the operations of transmission and reception of network signals and data. The above-mentioned network signals may include wireless signals or wired signals. FIG. 1 FIG. 1 FIG. 1 FIG. 1 It can be understood that the structure shown in is merely illustrative, and the electronic device 10 may include more or fewer components than those shown in , or have a different configuration from that shown in . The components shown in may be implemented by hardware, software, or a combination thereof. For example, the electronic device 10 may further include a face recognizer, and the electronic device 10 performs face recognition by means of the face recognizer included therein to obtain face recognition result data. For another example, the processor 12 in the electronic device 10 may be communicatively connected to a face recognizer independent of the electronic device 10 so as to acquire face recognition result data recognized and obtained by the face recognizer. FIG. 2 FIG. 1 This embodiment provides a customer visit analysis method. Referring to , the method includes the following steps. These steps may be executed by the processor 12 in the electronic device 10 shown in . In step 110, face recognition result data of customers in a store is acquired. Taking a certain store or shop as an example, multiple cameras are set in the store, and each camera captures images in the store. In an image, multiple people are walking in the image, and employees and customers are included in the image. The face recognition result data transmitted from the camera in real time includes facial data of employees and facial data of customers. Therefore, if it is desired to acquire face recognition result data of customers, it is necessary to distinguish the face recognition result data of the employees from the face recognition result data of the customers. In one of the implementations, a database containing employee information and facial data corresponding to the employees is established in advance. When real-time face recognition result data is being transmitted, it is judged whether facial data corresponding to the face recognition result data is the same as pre-stored facial data of an employee. If the facial data corresponding to the face recognition result data is the same as the pre-stored facial data of an employee, it is determined that the piece of face recognition result data corresponds to face recognition result data of the employee. If the facial data corresponding to the transmitted face recognition result data is not the same as the pre-stored facial data of an employee, it is determined that the piece of face recognition result data corresponds to face recognition result data of a customer in a store. The above-mentioned face recognition result data includes an ID (identification number) of a customer and a time period during which the customer is photographed. When there are a plurality of employees and a plurality of customers in an image captured by the camera, each facial data is converted into an ID by a face recognition technology, and the facial data of different people are distinguished by ID so as to facilitate subsequent analysis of a visit behavior of each customer. Multiple cameras are set in the store. Data transmitted from each camera may be a video stream. A time period during which each customer is photographed by the camera can be acquired by recognizing the faces from the video stream image. The video stream may also be understood as a picture stream, and the camera transmits the captured pictures back in real time so that faces are recognized from the pictures. For example, if a customer is captured by the first camera from 9:05 to 9:10, then the time period during which the customer is photographed is from 9:05 to 9:10 in a piece of face recognition result data. In step 120, the face recognition result data of the customers in the store are clustered according to IDs of the customers. A piece of face recognition result data includes an ID of a customer and a time period during which the customer is photographed. Of course, other information may also be included. For example, an area where the customer is photographed may also be included. If there are multiple stores, information on a store in which the customer is photographed may be included. When multiple pieces of face recognition result data are transmitted, the multiple pieces of face recognition result data are clustered according to the IDs of customers included in the face recognition result data, and one or more time periods which correspond to the ID of each customer and during which the customer is photographed are obtained, so as to achieve the clustering of the face recognition result data. In general cases, the ID of each customer corresponds to a plurality of time periods during which the customer is photographed. When there is only one camera in the store and the customer is always photographed by the camera, there may be only one time period during which the customer is photographed. In step 130, it is determined whether two adjacent time periods correspond to the same visit to the store. If a customer's ID corresponds to only one time period during which the customer is photographed, then this time period is deemed to correspond to one visit of the customer to the store. If a customer's ID corresponds to a plurality of time periods during which the customer is photographed, it is necessary to judge whether a time difference between two adjacent time periods among the plurality of time periods during which the customer is photographed is not greater than a preset staying duration threshold. For example, for a certain customer, when there is a large area in the store, the customer may be located, within a certain period of time after the customer is photographed, in some blind spots in the store where the face of the customer is not photographed by the camera. Therefore, in the face recognition result data, there may be a certain time gap in a plurality of time periods during which the customer is photographed. For example, if the customer is photographed from 9:05 to 9:10 and the customer is photographed from 9:20 to 9:40, there is a time difference of 10 minutes between the two adjacent time periods. A staying duration threshold of for example 30 minutes corresponding to a customer identity is set in advance. In other words, when there is a time difference of 10 minutes between two adjacent time periods in which the customer is photographed, which is not greater than the preset staying duration threshold of 30 minutes, it is judged that the time periods in the two pieces of data during which the customer is photographed correspond to the same visit to the store. It should also be noted that, for the same customer, when he/she is purchasing goods in a store, he/she may be photographed by multiple cameras at the same time. For example, the customer is photographed by the first camera from 9:05 to 9:20 and photographed by the second camera from 9:10 to 9:30. This case is also regarded as one visit to the store, because the time periods during which the customer is photographed overlap each other and a time difference therebetween is obviously not greater than the preset staying duration threshold. In the present disclosure, the staying duration threshold may be flexibly set. For example, different staying duration thresholds may be set for different stores. For example, the staying duration threshold is set according to the area size in each store, and the staying duration threshold set for a store with a larger area may be greater than the staying duration threshold set for a store with a smaller area. For another example, different staying duration thresholds may be set for different customer IDs. For example, historical data is collected and analyzed for individual customers, and the staying duration threshold set for a customer who is analyzed to stay in the store for a longer time may be greater than the staying duration threshold set for a customer who is analyzed to stay in the store for a shorter time. For another example, for different stores and customers, the staying duration threshold may be set at the same fixed duration. In step 140, arrival time and departure time are determined for each visit to the store. After each visit of each customer to the store is determined according to step 130, arrival time and departure time for each visit to the store may be determined according to the time period(s) in the face recognition result data during which the customer is photographed, thereby obtaining visit information of each customer in the store. The visit behaviors of customers can be analyzed for a certain store by the solution described in the above steps 110 to 140. Images in stores are captured by cameras, from which face recognition result data in the stores are obtained, and then visit information of each customer in each store can be analyzed, where the visit information of each customer includes the arrival time of the customer at the store and the departure time of the customer from the store. clustering face recognition result data of all customers according to stores to obtain face recognition result data of customers in each store. However, there are multiple cities across a country, and there may be multiple branch stores in each city. In order to adapt to such a situation with big data and large traffic, before step 110, the method may further include: For example, if a large supermarket chain has multiple stores in various cities across a country, multiple cameras in each store transmit the captured images back, and the faces in the images are recognized. After face recognition result data in all the stores are acquired, face recognition result data of customers in each store is determined according to stores, and the face recognition result data in each store is analyzed respectively. In this way, the analysis efficiency can be effectively increased, and the data analysis time can be reduced. Optionally, in order to process a large amount of face recognition result data, before clustering the face recognition result data of all customers according to stores, face recognition result data from an upper-layer service should be packaged and sent to a message queue, and the data is read from the message queue to process the face recognition result data. For example, a face recognizer may be integrated into a camera. After the camera captures an image in the store, the face recognizer performs a process of recognizing a face(s) from the image captured by the camera to obtain face recognition result data. The processor 12 of the electronic device 10 includes a message queue for caching the face recognition result data. After the face recognizer obtains the face recognition result data, the obtained face recognition result data is sent to the processor 12, and the processor 12 packages the face recognition result data transmitted from the face recognizer and sends the face recognition result data to the message queue. When processing the face recognition result data, the processor 12 reads and processes the face recognition result data from the message queue in the order of the cache. In this way, a reliable data analysis is ensured. Since the analysis of customer visits does not require high real-time performance, and it is time-consuming to analyze and calculate a large amount of data, a message queue is introduced into this embodiment as a buffer for data processing. An asynchronous mechanism may also be introduced. For example, a plurality of message queues are introduced, and the respective message queues are processed respectively by using multithreaded asynchronous processing, thereby effectively improving the data processing capability. Especially in the case of large data traffic, big data can be processed by using an asynchronous mechanism in combination with message queues, whereby the data processing load can be effectively reduced. In the present disclosure, each data may be stored in a database. Accordingly, the load for processing data in the database can be effectively reduced by processing the big data using an asynchronous mechanism. FIG. 3 Optionally, in step 130, the step of judging whether a time difference between two adjacent time periods among the plurality of time periods during which the customer is photographed is not greater than a staying duration threshold may be implemented with reference to . A detailed implementation of this step is carried out in the following manner. In step 210, each day is divided into a plurality of consecutive preset time periods, and each of the time periods which correspond to the ID of each customer and during which the customer is photographed is mapped to the plurality of consecutive preset time periods. Consecutive time points in each of time periods which correspond to the ID of the same customer and during which the customer is photographed are projected into the consecutive preset time periods. Here, the length of a time interval between two adjacent preset time periods among the plurality of consecutive preset time periods is equal to the staying duration threshold. In step 220, the minimum time point and the maximum time point corresponding to the ID of the customer in each preset time period are determined. The minimum time point and the maximum time point among all the consecutive time points in each preset time period are obtained by means of an aggregation function. In step 230, it is judged whether a difference between the minimum time point in a later preset time period and the maximum time point in an earlier preset time period of two adjacent preset time periods, among the preset time periods to which the time periods during which the customer is photographed are mapped, is not greater than the staying duration threshold. The minimum time point and the maximum time point in each preset time period corresponding to each time period during which each customer is photographed are analyzed and obtained by the above-mentioned algorithm, and then one visit of the customer to the store is determined by analysis and calculation. Next, an embodiment of the overall customer visit analysis method under big data and high traffic will be described in further detail. The processor 12 in the electronic device 10 preprocesses face recognition result data after acquiring the face recognition result data from an upper-layer service. The preprocessing may include completing data verification, sorting data structures, and compressing data. The preprocessed face recognition result data is packaged and sent to a message queue. The data is read from the message queue, and the read data is post-processed. The post-processing may include decompressing the face recognition result data and sorting data structures. The post-processed face recognition result data is saved into a time series database according to a certain preset saving rule, for example, according to stores or according to photographing areas, and customer visits are analyzed using the data. In the present disclosure, the time series database may be understood to be formed by storing the face recognition result data in the above-mentioned database in chronological order. The time series here mainly means that each piece of data has a time field. Data may be acquired according to certain conditions based on this time field. For example, data may be acquired in order of entry time, or data may be acquired in reverse order of leaving time. The time series database in the present disclosure may refer to the same database as the above-mentioned database. For example, it may be a structured query language (SQL)-type database or a non-relational database NoSQL or the like. The acquired face recognition result data consists of face recognition result data obtained from images captured by each camera in each photographing area in each of all the stores across a country. From these data, data of different stores is distinguished, and some useless data is filtered. The useless data may include recognized facial data of employees and some fuzzy facial data. Customer visits are analyzed using the face recognition result data in each store, wherein data analysis conditions are constructed. The data analysis conditions may include fields such as the ID of a customer to be analyzed, the date of data, and a staying duration threshold for the customer. A query aggregation statement is constructed for the time series data according to the data analysis conditions, and a request for query aggregation operation is initiated to the time series database. For example, if it is desired to analyze a visit behavior of a certain customer's ID on a certain day, the time series database is queried for a plurality of time periods corresponding to the customer's ID during which the customer is photographed on this day, and time points in these time periods are arranged and corresponded to each preset unit time. The length of a unit time interval is equal to the staying duration threshold for the customer included in the data analysis conditions. If the staying duration threshold for the customer is 30 minutes, a day with 24 hours is equally divided by 30 minutes. The minimum time point and the maximum time point in each preset unit time during which the customer is photographed are obtained by an aggregation function. For instance, when the staying duration threshold is 30 minutes, each preset unit time interval is also 30 minutes. If the customer is photographed by the first camera from 9:05 to 9:20, photographed by the second camera from 9:10 to 9:25, and photographed by the third camera from 9:45 to 9:50, then time points corresponding to these time periods are arranged according to the time. A period from 9:00 to 9:30 is a preset unit time, and a period from 9:30 to 10:00 is another adjacent preset unit time. An aggregation function is used to obtain the minimum time point at 9:05 and the maximum time point at 9:25 in the period from 9:00 to 9:30 and obtain the minimum time point at 9:45 and the maximum time point at 9:50 in the period from 9:30 to 10:00. After the minimum time point and the maximum time point in each preset unit time corresponding to the ID of each customer are determined by aggregation statistics, it is judged whether a difference between the minimum time point in the later preset unit time and the maximum time point in the earlier preset unit time is not greater than the preset staying duration threshold. If not greater, for example, if a difference of 20 minutes between 9:45 and 9:25 is not greater than a staying duration threshold of 30 minutes, one visit of the customer is determined, and the arrival time and the departure time are determined for this visit. In other words, the customer in the above example is determined to arrive at the store at 9:05 and leave the store at 9:50. If the difference is greater than the preset staying duration threshold, another visit is determined. After the arrival time and the departure time are determined for each customer, the data is further analyzed and calculated to determine the staying duration for each visit. When the customer has visited the store multiple times, the number of visits of the customer and the total staying duration of the customer on this day are obtained. The visit behavior of each of customers in different stores can be analyzed by the above-mentioned process. A photographing area may be added to the above-mentioned data analysis conditions, so that visit behaviors of customers in each area can be analyzed according to areas, such as a fresh food area, a clothing area, a living area, etc. After the analysis and calculation are completed, the staying duration of each visit, the number of visits, and the total staying duration on the day can be obtained for each customer. Further, it is also possible to obtain the total number of visits per week, per month, and per year, the staying duration of each visit, and the total staying duration for each customer according to the data analyzed daily. The data obtained in the entire analysis process are integrated. For example, data such as a customer's ID, store, photographing area, date, the arrival time, departure time, staying duration threshold, and staying duration for each visit, the number of visits, and the total staying duration are integrated. These data are saved into a database according to a preset saving condition, for example, according to stores and areas. The visit records of each customer can be effectively analyzed using the facially recognized data by the above-mentioned steps, and the entire data processing process is suitable for scenarios with large traffic and big data and is highly available. FIG. 4 This embodiment provides a customer visit analysis apparatus. Referring to , the apparatus includes following modules. The data acquisition module 100 is configured to acquire face recognition result data of customers in a store, where the face recognition result data includes IDs of the customers and time periods during which the customers are photographed. FIG. 2 The data acquisition module 100 may be specifically implemented with reference to the related description of step S110 in , therefore a detailed description is omitted here. The customer analysis module 101 is configured to cluster the face recognition result data of the customers in the store according to the IDs of the customers to obtain at least one time period which corresponds to the ID of each customer and during which the customer is photographed. FIG. 2 The customer analysis module 101 may be specifically implemented with reference to the related description of step S120 in , therefore a detailed description is omitted here. The data processing module 102 is configured to judge, when the ID of a customer corresponds to a plurality of time periods during which the customer is photographed, whether a time difference between two adjacent time periods among the plurality of time periods during which the customer is photographed is not greater than a staying duration threshold; and determine that the two adjacent time periods correspond to the same visit to the store when the time difference is not greater than the staying duration threshold. FIG. 2 The data processing module 102 may be specifically implemented with reference to the related description of step S130 in , therefore a detailed description is omitted here. The visit determination module 103 is configured to determine arrival time and departure time for each visit to the store. FIG. 2 The visit determination module 103 may be specifically implemented with reference to the related description of step S140 in , therefore a detailed description is omitted here. Optionally, the apparatus further includes: a data classification module configured to cluster face recognition result data of all customers according to stores to obtain face recognition result data of customers in each store. Optionally, the data classification module is further configured to: package face recognition result data from an upper-layer service and send the face recognition result data to a message queue; and read and process the face recognition result data from the message queue, before clustering face recognition result data of all customers according to stores. Optionally, the data classification module is further configured to: preprocess face recognition result data after acquiring the face recognition result data from an upper-layer service, the preprocessing including completing data verification, sorting data structures, and compressing data; package and send the preprocessed face recognition result data to a message queue; and save the processed face recognition result data into a time series database according to a preset saving rule. Optionally, the data processing module includes: a time mapping module, configured to divide each day into a plurality of consecutive preset time periods and map each of the time periods which correspond to the ID of each customer and during which the customer is photographed to the plurality of consecutive preset time periods; an aggregation statistics module, configured to determine the minimum time point and the maximum time point corresponding to the ID of the customer in each preset time period; and a threshold judgment module, configured to judge whether a difference between the minimum time point in a later preset time period and the maximum time point in an earlier preset time period of two adjacent preset time periods, among the preset time periods to which the time periods during which the customer is photographed are mapped, is not greater than the staying duration threshold. Optionally, the time mapping module is configured to: project, into the consecutive preset time periods, consecutive time points in each of time periods which correspond to the ID of the same customer and during which the customer is photographed, where the length of a time interval between two adjacent preset time periods among the plurality of consecutive preset time periods is equal to the staying duration threshold. Optionally, the visit determination module 103 is further configured to: determine a staying duration for each visit of the ID of each customer to the store. Optionally, the face recognition result data includes a date. The visit determination module 103 is further configured to: determine the number of visits and a total staying duration corresponding to the ID of each customer on the date after the arrival time and the departure time are determined for each visit to the store. It will be clearly appreciated by those skilled in the art that, for the convenience and brevity of the description, the specific operating process of the apparatus described above may be performed with reference to the corresponding process in the foregoing method and will not be described in detail here. The present disclosure further provides an electronic device, comprising a processor, a memory, and a bus. The memory stores machine-readable instructions executable by the processor. When the electronic device is in operation, the processor communicates with the memory via the bus, and the machine-readable instructions are executed by the process to execute the method described in the first embodiment. The present disclosure further provides a storage medium. The storage medium stores a computer program that, when run by a processor, executes the method described in the first embodiment. The present disclosure further provides a computer program product which, when running on a computer, causes the computer to execute the method described in the first embodiment. In the embodiments according to the present disclosure, it should be understood that the disclosed apparatus and method may also be implemented in other ways. The embodiments of the apparatus described above are merely illustrative in nature. For example, the flow charts and block diagrams in the figures illustrate implementable architectures, functionalities, and operations of apparatuses, methods, and computer program products according to multiple embodiments of the present disclosure. In this regard, each block in the flow charts or block diagrams may represent a module, a program segment, or a portion of code, wherein the module, the program segment, or the portion of code includes one or more executable instructions for implementing specified logical function(s). It should also be noted that in some alternative implementations, the functions noted in the blocks may occur out of the order noted in the figures. For example, two blocks shown in succession may in fact be executed substantially concurrently, or they may sometimes be executed in a reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flow charts, and combinations of blocks in the block diagrams and/or flow charts, may be implemented by special purpose hardware-based systems that execute the specified functions or actions, or by a combination of special purpose hardware and computer instructions. Besides, the individual functional modules in the embodiments of the present disclosure may be integrated together to form an independent part, or each of the modules may be physically stand-alone, or two or more of the modules may be integrated into an independent part. When implemented in the form of a software functional module and sold or used as an independent product, the functions may be stored in a computer-readable storage medium. Based on such understanding, a technical solution of the present disclosure essentially, or the part thereof contributing to the prior art, or a part of the technical solution may be embodied in the form of a software product. The computer software product is stored in a storage medium, and includes a number of instructions for causing a computer device (which may be a personal computer, a server, a network device, or the like) to execute all or some of the steps of the methods described in the various embodiments of the present disclosure. The preceding storage medium includes any medium that can store program codes, such as a USB flash disk, a mobile hard disk, a read-only memory (ROM), a random access memory (RAM), a magnetic disk, or an optical disk. It should be noted that in this text, relationship terms such as first, second, and the like are used only for distinguishing one entity or operation from another entity or operation, while it is not necessarily required or implied that these entities or operations have any such practical relationship or order. Furthermore, the terms "comprise", "include", or any variations thereof are intended to cover non-exclusive inclusions, such that a process, method, article, or apparatus that comprises a list of elements not only comprises those elements, but also comprises other elements not expressly listed or also comprises elements inherent to such process, method, article, or apparatus. Without more restrictions, an element defined with the wording "comprising a..." does not exclude the presence of additional identical elements in the process, method, article, or apparatus comprising said element. The above description is merely illustrative of preferred embodiments of the present disclosure and is not intended to limit the present disclosure. It will be understood by those skilled in the art that various modifications and variations may be made to the present disclosure. Any modifications, equivalent alternatives, improvements and so on made within the spirit and principle of the present disclosure are intended to be encompassed within the scope of protection of the present disclosure. Industrial Applicability A customer visit analysis method, a customer visit analysis apparatus, and a storage medium according to the present disclosure enable analysis of visit behaviors of customers based on face recognition results, whereby information on visits of customers to a store is analyzed so as to achieve the accurate analysis of the customer visit information, where the customer visit information includes the arrival time of a customer at the store and the departure time of the customer from the store.
When approving an insurance policy, an insurance company has effectively taken the risk on behalf of the policyholder. That in the case of accidents or other acts of nature, given that it is stipulated in the policy, the insurance provider will cover for potential losses. Prior to granting coverage to a policyholder, risks are determined and gauged. An insurance underwriter?s job is to assess the risks associated with insuring a person or property and approve or reject applications based on the risks involved. They evaluate insurance applications, analyze, and process this information using computer software to determine the recommended coverage amount and premium. Insurance underwriters are essentially the risk-takers of insurance companies as they decide whether to grant insurance or not. Insurance underwriters work in an office and may sometimes travel to assess properties. A bachelor?s degree is not required for the job but is usually preferred by employers, particularly those with a background in business and finance. Training programs including classroom instruction is provided by employers. There are many certification options for insurance underwriters. Often these certifications are necessary for advancement to a higher underwriter position. Keenness to detail and the ability to interpret and analyze numerical information for decision-making are vital qualities of a good insurance underwriter. If you have a head for numbers and with good communication skills, then this career might be right for you! We’re in the process of adding additional content to this Career Guide. Please check back soon.
https://www.thecareerproject.org/career/insurance-underwriter/
The Lagoa–Barra Highway (Portuguese:Autoestrada Lagoa–Barra), officially named Engenheiro Fernando Mac Dowell Highway , is a highway linking Gávea and Barra da Tijuca in Rio de Janeiro, Brazil. The highway was opened in 1971. Rio de Janeiro, or simply Rio, is anchor to the Rio de Janeiro metropolitan area and the second-most populous municipality in Brazil and the sixth-most populous in the Americas. Rio de Janeiro is the capital of the state of Rio de Janeiro, Brazil's third-most populous state. Part of the city has been designated as a World Heritage Site, named "Rio de Janeiro: Carioca Landscapes between the Mountain and the Sea", by UNESCO on 1 July 2012 as a Cultural Landscape. Florianópolis is the capital and second largest city of the state of Santa Catarina, in the South region of Brazil. The city encompasses Santa Catarina Island and surrounding small islands, as well as part of the mainland. It has a population of 477,798, according to the 2016 IBGE population estimate, the second most populous city in the state, and the 47th in Brazil. The metropolitan area has an estimated population of 1,111,702, the 21st largest in the country. The city is known for having the country's third highest Human Development Index score among all Brazilian cities (0.847). The city is considered safe by Brazilian standards. In 2014, Florianópolis had the second-lowest incidence of murders of Brazilian capitals. São João, Portuguese for "Saint John", may refer to: Leblon is a neighborhood of Rio de Janeiro, Brazil. It is also the name of the local beach. The neighborhood is located in the South Zone of the city, between Lagoa Rodrigo de Freitas, Morro Dois Irmãos and the Jardim de Alá channel, bordering the Gávea, Ipanema, Lagoa, and Vidigal neighborhoods. It is regarded as having the most expensive price per residential square meter in Latin America. Barra may refer to: The Rio de Janeiro Metro is a mass-transit underground railway network that serves the city of Rio de Janeiro, Brazil. The Metrô was inaugurated on March 5, 1979 and consisted of five stations operating on a single line. The system currently covers a total of 58 kilometres (36 mi), serving 41 stations, divided into three lines: Line 1 ; Line 2, which together travel over a shared stretch of line that covers 10 stations of an approximate distance of 5 kilometers; and Line 4. Metrô Rio has the second highest passenger volume of the metro systems in Brazil, after the São Paulo Metro. Barra da Tijuca is a neighborhood or bairro in the West Zone of Rio de Janeiro, Brazil, located in the western portion of the city on the Atlantic Ocean. Barra is well known for its beaches, its many lakes and rivers, and its lifestyle. This neighbourhood represents 4.7% of the city population and 13% of the total area of Rio de Janeiro. The Campeonato Fluminense was the football league of the state of Rio de Janeiro, Brazil, during the period when the Guanabara state and the Rio de Janeiro state where two separated states. Rodrigo de Freitas Lagoon is a lagoon in the district of Lagoa in the Zona Sul area of Rio de Janeiro. The lagoon is connected to the Atlantic Ocean, allowing sea water to enter by a canal along the edge of a park locally known as Jardim de Alah. Barra do Garças is a city with a population of 50,000 located in the Brazilian state of Mato Grosso, around 550 km (340 mi) far from the capital city of Cuiabá. It was founded on 13 June 1924, but it became political independent just on 15 September 1948. Nowadays, Barra do Garças is the 8th biggest city in Mato Grosso. It is situated on the border between Mato Grosso and Goiás states and due to this a geodesic center settled down there. Santa Catarina Island is an island in the Brazilian state of Santa Catarina, located off the southern coast. It is home to the state capital, Florianópolis. Gávea is an affluent residential neighborhood located in the South Zone of the city of Rio de Janeiro, Brazil. It borders São Conrado, Leblon, Lagoa and Jardim Botânico neighborhoods and is famous for its high concentration of artists and intellectuals. PUC-Rio, one of the most important universities of the Rio de Janeiro state, as well as several schools are located in the neighborhood. Gávea is well known because of the "Baixo Gávea" area, which is considered a Bohemian quarter and which is frequented by the city's youth. General Osório is a station on Line 1 of the Rio de Janeiro Metro located in the Ipanema borough of Rio de Janeiro, Brazil. It is the line's southern terminus. The station opened in December 2009. Jacarepaguá–Roberto Marinho Airport is an airport in the neighborhood of Barra da Tijuca, Rio de Janeiro, Brazil previously dedicated to general aviation. Following refurbishment completion in 2008 the airport was renamed after Roberto Pisani Marinho (1904–2003), a journalist and former president of Globo Network, and since become a major helibase for offshore support. Esporte Clube São João da Barra, commonly known as São João da Barra, is a Brazilian football club based in São João da Barra, Rio de Janeiro state. BR-040 is a federal highway of Brazil. The 1,178.7 kilometres (732.4 mi) road connects Brasilia to Rio de Janeiro. Península is a sub-district located at Barra da Tijuca, in Rio de Janeiro, which occupies an area of 8,395,850 square feet (780,000 m2). It has an estimated population of 28,000 people with low ground occupancy rate – 8% of built area. Escola Suíço-Brasileira Rio de Janeiro is a Swiss international school in Barra da Tijuca, Rio de Janeiro. A part of the SIS Swiss International School network, it serves levels Educação Infantil until Ensino Médio. Fernando Luiz Cumplido Mac Dowell da Costa was a Brazilian engineer and politician. He worked in several governments in Brazil, always defending the accomplishment of great interventions in the urbanism of Rio de Janeiro. He was one of the great critics of the transport system of Rio de Janeiro during the government of Sérgio Cabral.
https://wikimili.com/en/Lagoa%E2%80%93Barra_Highway
Our client is looking for a Secretary with previous experience in a legal environment to join their commercial property department based at Clifton Moor. This is a fixed term contract position for a period of 9 months. The successful candidate will provide a confidential secretarial service to the Commercial Property Department with duties including: * To efficiently and promptly deal with word processing, audio typing and the inputting of documents and correspondence of team members as required. * To accurately deal with filing – storage and retrieval of files, according to the Firm’s and the Department’s system. * To maintain files in a neat and tidy order. * To make appointments, arrange meetings and maintain an up to date Outlook diary for team members. * To deal with incoming and outgoing post, correctly differentiating between DX post and Royal Mail post. * To photocopy and scan documents to required standard. * To assist team with general administrative tasks including the preparation of plans. * To complete SDLT Forms * To complete LR Forms. * To prepare Financial statements and finance chits for checking/signature by Fee Earner * To deal professionally with clients, colleagues and other professional agencies on the telephone and in person as required. * To accurately record messages and forward them to the appropriate person without delay. * To ensure the confidentiality and security of all the Firm’s and client’s documentation and/or information. * To provide fee earners and clients with refreshments during interviews as required, clearing crockery immediately following interviews.
https://www.jobdepository.co.uk/job/secretary-3/
Bullying has become a nationwide problem and public health issue. Because of this, the majority of states are starting to take action by passing laws and amending current laws in order to help control and restrain bullying. However, there are currently no federal laws that directly address bullying. Bullying can overlap with the federal civil rights laws about harassment if the bullying is based on race, national origin, color, sex, age, disability, or religion. These anti-harassment laws include the Civil Rights Act of 1964, Title IX of the Education Amendments, the Rehabilitation Act, Americans with Disabilities Act, and the Individuals with Disabilities Education Act. Even though these federal laws help prevent some harassment between students, not all students are covered. The history of the States’ history of bullying legislation really took off after the 1999 school shooting at Columbine. The Columbine shooting committed by Dylan Klebold and Eric Harris was thought to have happened because the two were bullied. “From 1990 to 2012 state legislatures nationally enacted more than 120 separate bills (about bullying). As of 2012, there are only two states (Montana and South Dakota) that do not have anti-bullying legislation. Even though most states have bullying legislation, as of 2012, ten states still do not have a definition of bullying and only 35 states have enacted legislation in their education or criminal codes about cyber bullying. Should legislation include everyone or should it have enumerated classes? Seventeen states include language of enumerated classes and protected groups. Enumeration of specific characteristics “refers to the language in bullying legislation that conveys explicit legal protections for certain groups or classes of individuals.” Having enumerated classes in bullying legislation can be very helpful to help limit the legal definition of bullying or to communicate that discrimination against certain groups is no accepted in that state, district, or school. All seventeen states that include enumeration list race as a protect class; sixteen list disability, religious practices, and sex or gender; fourteen list national origin and sexual orientation; twelve states list ethnicity and gender identity or expression; five include age, association with groups or other individuals, marital status, and socioeconomic status; four states list family status and physical appearance; and two states list academic status and obesity and weight. Some states define bullying “as behavior that is motivated by the perceived or actual characteristics of the victim” but do not give restrictions on the types of characteristics. Other states discourage or prohibit school districts “from defining bullying in terms of the characteristics of targeted students.” The states that prohibit enumeration of characteristics want to prevent school districts from adopting policies that would protect specific classes of students because of “a commitment to providing equal protections for all students.” Even some states that have enumerated classes add to their policy a requirement that all students have the same protection “regardless of their status under the law.” Arizona: A Case Study In Arizona, A.R.S 15-341(A)(37) focuses its efforts on addressing bullying and what school boards and districts should focus its efforts on. Specifically, the statute states: “The governing board shall Prescribe and enforce policies and procedures to prohibit pupils from harassing, intimidating and bullying other pupils on school grounds, on school property, on school buses, at school bus stops, at school-sponsored events and activities and through the use of electronic technology or electronic communication on school computers, networks, forums and mailing lists that include the following components…” The components that need to be included in the policies and procedures put forth by the governing board include confidential reporting systems for instances of harassment, intimidation, or bullying; required reporting for school district employees and disciplinary procedures for those who fail to report known incidents; notice of rights and protections to students every year; notice or rights and protections for victims, confidential documentation systems that keeps documents for at least 6 years; formal investigatory process and notice to the victim; disciplinary procedures for offenders; procedures and consequences for false reports of bullying, harassment, or intimidation; procedures that protect physically harmed students; and the definitions of harassment, intimidation, and bullying. There are no enumerated groups that are specified in the statute or training, prevention, monitoring, or legal remedies. Much of the burden is placed on the school board to create the specific rules. Even though there is a major outline and base for school boards, there are no statewide specifics or definitions. This could be a problem because there is no cohesion between the school districts. The fact that school boards have the ability to tailor it to their specific school districts could also be a positive. A current prospective bill that is currently attempting to be pushed through legislation is SB 1462. This bill provides a specific definition of bullying that includes cyber bullying, makes it broad to cover many types of bullying and harassment, and allows more acts to be considered bullying. It also makes bullying polices and procedures a specific and separate statute under the education section of Arizona Revised Statutes apart from the school board’s general powers and duties. This bill is getting a lot of push back from conservatives and anti-LGBT groups. It has been proposed previously but voted against. Lobbying groups that are Christian and family values are pushing back against this bill because these groups believe that it is part of a “gay-friendly agenda” even the bill never references sexual orientation as an enumerated group. Those that are attempting to pass this bill want to protect LGBT youth but their main goal is to protect all youth from the terror of bullying. http://www.stopbullying.gov/laws/federal/index.html http://www2.ed.gov/rschstat/eval/bullying/state-bullying-laws/state-bullying-laws.pdf https://www.networkforphl.org/_asset/khqyg6/50StateAntiBullyingStatutes41612FINAL.pdf http://www2.ed.gov/rschstat/eval/bullying/state-bullying-laws/state-bullying-laws.pdf (27) Id. Id. At 28 Id. Id.
https://lawjournalforsocialjustice.com/2014/09/23/bullying-legislation-arizona/
BACKGROUND DESCRIPTION Terminology Example Illustrations Variations The disclosure generally relates to the field of data processing, and more particularly to data storage and recovery. In distributed data storage systems, various methods can be used to store data in a distributed manner, e.g., to improve data availability, reliability, protection. Erasure coding is one such method of data protection in which a data object is broken into fragments, encoded with parity information, and stored across a set of storage nodes in the distributed data storage system. When a data object is erasure coded, the distributed data storage system stores the storage information in metadata. This metadata can include identities of the storage nodes that store each fragment of the encoded data object. The metadata may be maintained in a distributed database that is stored across storage nodes in the distributed data storage system. Erasure coding involves transforming a set of k fragments of a data object into n erasure coded fragments by using the k fragments to generate m parity fragments, where n=k+m (often referred to as k+m erasure coding scheme). Some examples of k+m erasure coding scheme include 2+1, 6+3, and 8+2 erasure coding schemes. A data object can be rebuilt using a subset k of the n erasure coded fragments. If the number of available fragments is less than k, then the object cannot be recovered. The description that follows includes example systems, methods, techniques, and program flows that embody aspects of the disclosure. However, it is understood that this disclosure may be practiced without these specific details. For instance, this disclosure refers to recovery of erasure coded data in illustrative examples. Aspects of this disclosure can be also applied to distributed storage systems that replicate data or utilize other data storage protection techniques. In other instances, well-known instruction instances, protocols, structures and techniques have not been shown in detail in order not to obfuscate the description. The description below refers to storing erasure coded data that is organized according to erasure coding groups (“ECGs”) and virtual chunk spaces (“VCSs”). A VCS is a logical aggregation of storage space at a storage node. A storage node can be split into multiple VCSs and each of the VCSs can be assigned a unique ID in the distributed storage system. An ECG, or storage group, is a logical aggregation of one or more VCSs or storage space across one or more storage nodes. An ECG is associated with a specified erasure coding scheme and may have other storage restrictions, such as maximum object size, deduplication restrictions, object placement, etc. An ECG is assigned a set of VCSs across a set of storage nodes. When a data object is received for storage in the distributed storage system, a corresponding ECG is identified for the data object; the data object is erasure coded according to the scheme for the ECG; and the resulting fragments are stored in across storage nodes in a designated VCS. Overview Distributed storage systems frequently use a centralized metadata repository that stores metadata in an eventually consistent distributed database. Because the database is eventually consistent, failure of a storage node in the system can mean the loss of metadata which had yet to be replicated outside of the failed storage node. Additionally, executing a query on the metadata repository may require that multiple nodes be available to query against their respective copies of the metadata. If one or nodes become unavailable, metadata queries can fail and prevent recovery operations for the failed storage nodes. The risk of query failure and metadata loss is magnified in instances of multiple storage node or data center failure. As a result, the metadata repository cannot be relied upon for determining which erasure coded fragments were lost because of the storage node(s) failures. Instead, when recovering a failed storage node, a list of missing fragments is generated based on fragments stored in storage devices of available storage nodes. A storage node performing the recovery sends a request to one or more of the available storage nodes for a fragment list. The fragment list is generated, not based on a metadata database, but on scanning storage devices for fragments related to the failed storage node. The storage node performing the recovery merges retrieved lists to create a master list indicating fragments that should be regenerated for recovery of the failed storage node. FIG. 1 FIG. 1 FIG. 1 100 100 120 121 122 111 119 116 116 101 101 102 103 104 105 104 111 119 116 is a conceptual diagram of a distributed storage system that supports reliable recovery of erasure coded data. depicts a distributed storage system (“system ”) that is geographically distributed across multiple sites, including sites , , and which communicate via a wide area network (WAN). Each of the sites houses multiple of the storage nodes -. A storage node is a collection of processes (application processes, services, etc.) that store object data and metadata on storage devices and access object data and metadata on storage devices. The collection of processes can be encapsulated by a virtual machine and/or a physical host machine. depicts a conceptual diagram of a storage node . The node includes a storage controller (“controller ”), a metadata database , a storage subsystem , and storage devices with a file system . The storage devices can include a number of hard disks, random access memory, flash storage arrays, magnetic tape storage, etc. Each of the nodes - may be similar to the node . 111 119 120 122 100 100 100 111 119 100 100 111 119 102 100 100 Storage nodes - at any of the sites - can ingest objects into the system . Ingest refers to the operations by one or more storage nodes to store an object in the system according to a client request and any governing storage policies or schemes. The ingest process includes assigning an object identifier to an object based on an object namespace defined for the system . Ingest also includes erasure coding an object based on an erasure coding scheme for a corresponding ECG and storing the resulting fragments across one or more of the nodes - in the system . The object identifier and ECG identifier are recorded in a distributed metadata database for the system . Each of the nodes - includes a metadata database, such as the metadata database , that is part of an overall distributed metadata database for the system . The distributed metadata database is an eventually consistent database, meaning that changes to the database at one node in the system are eventually synchronized with metadata databases at other nodes. 114 116 114 114 116 114 114 114 116 100 116 100 114 115 114 116 115 121 120 122 FIG. 1 At stage A, the node fails, and the node initiates a recovery process after detecting failure of the node . The node may fail due to failed storage devices, corrupt data, loss of network connection, etc. The node can detect that the node has failed based on the node not responding to requests, or the failure of the node may be indicated to the node by an administrator through a management interface for the system . depicts the node as managing the recovery process; however, each of the nodes in the system may be capable of detecting the failure of the node and performing the recovery process. In some implementations, the recovery process may be performed by whichever node is currently acting as a manager or leader for a cluster of nodes. For example, if node is the leader for the cluster of nodes -, the node may perform the recovery process. In instances where an entire site, such as the site , is taken offline, a node from another site, such as the site or , may perform the recovery process. 101 116 114 114 114 101 102 114 101 102 101 102 114 101 111 116 FIG. 1 At stage B, the controller of the node identifies ECGs affected by the failure of the node . Affected ECGs are those who have data stored on the node . Recovery of the node is performed per affected ECG since the recovery process for each ECG will utilize different VCSs, erasure coding schemes, and storage nodes depending on the current ECG being recovered. The controller queries the metadata database to identify ECGs that utilize the node for storage of erasure coded fragments. Also, for each affected ECG, the controller determines the VCSs assigned to the ECG, the erasure coding scheme, and the utilized storage nodes. Some or all of this information may be contained in another location besides the metadata database . For example, the erasure coding scheme utilized for the ECG or assigned storage nodes may be stored in memory or in a configuration file for the ECG. In , the controller determines from the metadata database that the ECG “ECGroup1” has been affected by the failure of the node . Additionally, the controller determines that the VCSs “vcs1” and “vcs3” and nodes - are assigned to the “ECGroup1” and that the “ECGroup1” utilizes a 4+2 erasure coding scheme. 101 101 101 101 111 116 FIG. 1 After identifying affected ECGs, the controller may determine whether each ECG can be recovered. Since each ECG uses a k+m erasure coding scheme, the ECG can be recovered if at least k storage nodes are still available. The controller may iteratively verify that each ECG has the requisite number of nodes available and remove ECGs without the requisite number of nodes from a list of ECGs to be recovered. Recovery of the ECGs without the requisite number of nodes may be later retried by the controller automatically or after a manual instruction by an administrator. For the “ECGroup1” with a 4+2 scheme, the controller verifies that at least four nodes of the assigned nodes - are available, which is the case in . 101 106 103 103 104 105 103 104 105 At stage C, the controller sends a request for a list of fragments in VCSs assigned to the “ECGroup1” from the storage subsystem . The storage subsystem manages the underlying file system and storage of fragments on the storage devices . As shown in the depiction of the file system , the storage subsystem may organize fragments on the storage devices into directories according to a designated VCS. For example, the “vcs1” directory in the file system includes the fragments with identifiers “1234_0_1” and “1234_1_1.” 101 107 101 101 107 111 113 101 101 101 116 115 121 116 Also, at stage C, the controller sends requests for fragment lists from other storage nodes in the “ECGroup1.” While the controller may recover an ECG based on a fragment list from a single node, a master list of missing fragments is more reliable if generated based on fragment lists merged from multiple nodes. For instance, a node may have missing fragments due to data corruption, write failures, disk failures, etc., so a fragment list from that node may not list all fragments that need to be restored. Merging fragment lists from multiple nodes reduces the chance that a fragment will be missed during recovery. Therefore, the controller sends the requests for fragment lists to the nodes -. In some implementations, the controller may be configured to obtain fragment lists from at least k nodes, where k corresponds to the erasure coding scheme for an ECG (e.g., k=4 for the “ECGroup1”). Additionally, if more than the minimum number of nodes are available, the controller may send requests to all available nodes. Also, the controller may prioritize which nodes receive requests based on their network or geographic proximity to the node . For example, the node may be prioritized based on being at the same site as the node , which would reduce overall network traffic between sites. Nodes may be prioritized based on other factors such as available network bandwidth, current processor load, storage requests load, etc. 103 108 103 105 104 101 105 103 101 103 103 108 108 101 111 113 109 101 111 113 103 109 FIG. 1 At stage D, the storage subsystem generates a list of fragments which indicates fragments in the requested VCSs. The storage subsystem performs operations to scan the file system on the storage devices for the fragments in the requested VCSs. In , the fragments are organized into directories which correspond to each VCS, so the controller scans the directories corresponding to the requested VCSs, “vcs1” and “vcs3.” In some implementations, the file system may not support directories, and instead, a VCS may be indicated in a fragment identifier for each stored fragment, such as “vcs1_1234_0_1.” In such implementations, the storage subsystem analyzes the fragment identifiers to identify those in the requested VCSs. In other implementations, fragments may be stored in a database as opposed to a file system, and the controller or the storage subsystem may perform queries against the database to identify related fragments. The storage subsystem adds the identified fragments to the fragment list and supplies the list to the controller . Also, at stage D, the nodes - return their lists of fragments to the controller . Storage subsystems on the nodes - perform similar operations as the storage subsystem described above to generate the lists of fragment identifiers . 101 108 109 114 101 FIG. 1 At stage E, the controller merges the list of fragments , to generate a master list of fragments to be restored for the node . In , a fragment identifier consists of three parts: (1) an object identifier, (2) a stripe number, and (3) a fragment number. For example, for the fragment identifier “1234_0_1,” the “1234” is an object identifier corresponding to the object from which the fragment was generated via erasure coding; the “0” is the stripe number; and the “1” is the fragment number. If two fragments from the same object are stored on the same VCS, the fragment identifier for the second fragment will have an incremented stripe number. For example, the fragment identifier “1234_1_1” has a stripe number of 1, and the other fragment identifier corresponding to the object 1234, “1234_0_1,” has a stripe number of 0. The controller identifies each unique pair of object identifier and stripe number in the fragment identifiers to generate the master list of fragments to be recovered for the ECG. The object identifiers in the master list indicate which object data should be used to generate the missing fragments, and the stripe numbers control the number of fragments to be generated from the object. 101 108 109 101 101 101 101 101 FIG. 1 The controller may merge the four lists , using a variety of merging algorithms. The controller may first combine the lists and create a new list sorted based on object identifier. The controller may then begin removing any entries with a duplicate object identifier and stripe number pair. In some implementations, the controller may parse the fragment identifiers to extract the object identifier and stripe number pairs prior to sorting and deduplicating the combined list. The master list generated by the controller in would include the following object identifier and stripe number pairs: 1234_0, 1234_1, 1238_0, and 1239_0. The controller may use a variety of data structures for merging, sorting, and listing the fragments, such as a linked list, array, table, graph, tree etc. 101 108 109 109 108 116 101 116 116 FIG. 1 When merging the lists, the controller can record fragments which appear to be missing from one or more storage nodes which supplied the fragment lists , . For example, in , the fragment lists include a fragment “1239_0_2” in “vcs3” which was not included in the fragment list from the storage node . The controller may supply the object identifier “1239” to a fragment recovery service for the storage node so that a fragment for the data object “1239” can be generated and restored to the storage node . 101 114 101 100 114 114 After creating the master list, the controller may begin recovering the failed node or may supply the master list to another node or service for regenerating the lost fragments. For example, the controller may iteratively invoke a function or application programming interface (API) for a service in the system using the object identifiers in the master list to generate the necessary fragments. The process of restoring a fragment can differ based on an erasure coding algorithm used. For example, in some instances, an object may first be reconstructed so that the reconstructed object can be processed using the erasure coding algorithm to generate another fragment. In some instances, the erasure coding algorithm can generate additional fragments based on existing fragments and not require reconstruction of the object. Once a missing fragment is generated, the fragment is stored on the recovered node or another node designated as a replacement for the node . 101 104 101 The controller may persist the generated master list in the storage devices or other persistent storage. The master list may be labeled as corresponding to one or more ECGs or storage nodes. If those ECGs or storage nodes are again being recovered, the controller uses the persisted master list as a starting point for recovery. Additionally, the persisted master list may be timestamped and used as a checkpoint for indicating which fragments were stored on the storage nodes at that point in time. 111 112 113 116 101 101 In order to reduce an in-memory footprint, each of the nodes , , , and may only stream a portion of the fragment identifiers at a time. Since a VCS may store up to 1,000,000 fragments, sending all fragment identifiers at once may be prohibitively resource intensive. As a result, the controller may request a subset of fragment identifiers, e.g. 1,000, at a time. After processing the subset, the controller may request another subset until all fragment identifiers in the identified VCSs have been analyzed and merged into a master list as described at stage E. FIG. 1 114 101 116 116 depicts a single ECG as being affected by the node to avoid obfuscating the illustration. Generally, a storage node failure will affect multiple ECGs. The controller can iteratively perform the operations described above to recover each ECG. In some instances, the node may not be part of or assigned to an ECG to be recovered. In such instances, the node can still perform the recovery by requesting fragment lists from nodes in the ECG or may transmit a request to a node in the ECG to perform recovery of the ECG. FIG. 2 FIG. 2 depicts a flowchart with example operations for recovering erasure coded data. describes a storage node as performing the operations although naming of devices and program code can vary among implementations. 202 A storage node (“node”) detects the failure of one or more storage nodes in a distributed storage system (). The node may detect the failure of other storage nodes in a variety of ways including determining that the storage nodes are non-responsive, receiving a notification from a network monitoring agent, etc. The node may be a manager of a cluster of storage nodes and may use a heartbeat system with periodic requests to determine whether storage nodes are still active. In some implementations, the node receives instructions from a management application indicating that one or more nodes have failed and need to be recovered. 204 The node identifies ECGs affected by the storage node(s) failure (). The node may query a metadata database using identifiers for the failed storage nodes to retrieve a list of the affected ECGs. While the metadata database may be unreliable for obtaining fragment listings, ECG and VCS information do not change as frequently as fragments, so the metadata database is likely a reliable source for this information. Alternatively, an administrator through a management application may supply the node with a list of affected ECGs. 206 The node determines assigned VCSs, erasure coding schemes, and assigned storage nodes for each of the ECGs (). The node may obtain this information by querying the metadata database or may obtain this information from a configuration file for the ECG. 208 The node begins recovering erasure coded data for each of the ECGs (). The node iterates through the ECGs to be recovered to identify and recover missing fragments. The node may begin with affected ECGs that have been flagged as critical or may sort the ECGs for recovery based on the amount of data stored in each ECG, the number of VCSs assigned to each ECG, etc. The ECG currently being recovered is hereinafter referred to as “the selected ECG.” 210 The node determines whether there is a sufficient number of storage nodes available to recover the selected ECG (). If there is an insufficient number of storage nodes available, the missing fragments for the selected ECG cannot currently be recovered. The node may mark the selected ECG to be recovered later, or the node may mark the ECG as lost if recovery of the ECG has been attempted a specified number of times or if storage nodes in the ECG are determined to be permanently unavailable. The node can infer the number of storage nodes needed based on the erasure coding scheme and number of storage nodes assigned to the selected ECG. For a k+m erasure coding scheme, k fragments are needed to reconstruct a data object and regenerate missing fragments. If fragments are stored in a 1 fragment to 1 storage node ratio, then k number of storage nodes are needed to recover erasure coded data. In some instances, each node may contain two or more fragments, requiring less storage nodes to be available. The node can infer the number of fragments stored per node based on the number of storage nodes assigned to an ECG and the erasure coding scheme. If 6 storage nodes are assigned to an ECG with a 4+2 erasure coding scheme, the node can infer that fragments are stored at a 1:1 ratio. If 3 storage nodes are assigned to an ECG with a 4+2 erasure coding scheme, the node can infer that fragments are stored at a 2 fragments to 1 storage node ratio so only 2 nodes are required for recovery. The node can determine whether the sufficient number of storage nodes are available by pinging the storage nodes assigned to the selected ECG or querying a manager application for the status of the storage nodes. 212 FIG. 3 If there is a sufficient number of storage nodes, the node requests fragment lists for each of the VCSs assigned to the selected ECG (). The node submits requests to one or more of the available storage nodes assigned to the selected ECG. The storage nodes generate the fragment lists by scanning their storage devices for fragments stored in the identified VCSs. The storage nodes add fragment identifiers for each of the fragments to the fragment list and return the fragment list to the requesting node. When multiple VCSs assigned to an ECG are being recovered, the node may recover them sequentially or in parallel. Also, as described in more detail in , the node may incrementally collect the fragment lists by requesting a portion of the fragment lists from the storage nodes at a time. Furthermore, the node can vary the number of fragment lists requested from storage nodes based on a number of available storage nodes, an erasure coding scheme utilized by the selected ECG, a target recovery time, available bandwidth, etc. For example, if speed is prioritized over accuracy when recovering missing fragments, the node may request a fragment list from a single node or rely on its owned stored fragments, if possible. Additionally, the node may prioritize which storage nodes of available storage nodes receive requests based on proximity to the storage nodes and available resources of the storage nodes. 214 The node merges the fragment lists to create a master list of fragments to be restored for the selected ECG (). The master list indicates which data objects had fragments stored on the failed storage node(s) and how many fragments were stored on each node. The node analyzes the retrieved fragment lists to identify unique object identifier and stripe number pairs. Alternatively, the node may identify unique object identifiers and determine the largest stripe number associated with each object identifier. If multiple fragments for a same object are stored on a storage node, the stripe number is incremented for each fragment. So, based on the largest stripe number, the node can infer how many fragments for an object are stored on each node. For example, a stripe number of 3 indicates that four fragments (belonging to stripe numbers 0, 1, 2, and 3, respectively) should be generated from the associated object data and stored on a storage node being recovered. 216 The node recovers fragments in the master list for the selected ECG (). Using the object identifiers in the master list and the ECG information, the node (or another recovery service) retrieves corresponding fragments from available nodes to generate missing fragments through erasure coding. The number of fragments retrieved is based on the erasure coding scheme for the selected ECG. For example, for a 5+4 erasure coding scheme, any of the 5 available fragments of a stripe are retrieved. The number of missing fragments generated is based on the number of unique object identifier and stripe number pairs for a given object identifier in the master list or on the largest stripe number associated with an object identifier as described above. The same master list can be used to recover missing fragments for each failed storage node in the selected ECG. The missing fragments may be stored on the same failed storage node after repair or on another storage node designated as a replacement. In instances where an entire site has failed, the recovered fragments may be temporarily stored on nodes in another site and replicated to the failed site upon repair. 218 After recovery of the selected ECG or after determining that the selected ECG cannot be recovered, the node determines whether there is an additional ECG (). If there is an additional affected ECG, the node selects the next ECG for recovery. If there are no additional ECGs to be recovered, the process ends. FIG. 3 FIG. 3 FIG. 3 FIG. 2 212 214 depicts a flowchart with example operations for recovering incrementally collecting fragment identifiers. describes a storage node as performing the operations although naming of devices and program code can vary among implementations. describes an alternate implementation for performing blocks and of . 302 A storage node (“node”) initiates streams with storage nodes assigned to an affected ECG (). After failure of a storage node, the node identifies an affected ECG and determines storage nodes assigned to the ECG. The node then selects one or more of the storage nodes from which to request a list of fragment identifiers. To begin collecting the fragment lists, the node initiates a stream or opens a connection with each of the selected storage nodes to be used for incrementally streaming fragment identifiers. The node may initiate a stream by retrieving connection information for the storage nodes (e.g. Internet Protocol addresses, port numbers) and submitting a request to connect to the storage nodes. If storage nodes are located at a different site, the node may initiate a secure shell (SSH) connection or authenticate with a virtual private network (VPN) associated with a local area network of the site. In some implementations, the node may utilize an API of the other storage nodes to invoke a service for identifying and sending fragment identifiers. 304 The node requests a number of fragment identifiers from the storage nodes (). The node submits a request through the stream established with the storage nodes. The number of fragment identifiers requested can vary based on available resources of the node or the storage nodes receiving the requests. For example, if the node has sufficient memory space, the node may increase the number of fragment identifiers requested. Conversely, if the node is low on a resource, such as bandwidth, the node may decrease the number of fragment identifiers requested. The storage nodes which receive the requests scan their storage devices for fragments related to the request (e.g. fragments in a VCS indicated in the request). The storage nodes then stream the requested number of fragment identifiers to the node. The storage nodes may be configured to stream the fragment identifiers in alphabetical or numerical order. 306 FIGS. 1 and 2 The node merges partial fragment lists to identify unique fragments (). As the node receives the streams of fragment identifiers, the node adds the fragment identifiers to lists in memory, each list corresponding to one of the storage nodes. The node then merges the partial lists as described above in to remove duplicate fragment identifiers (i.e. identifiers for fragments corresponding to a same data object). 308 The node adds the unique fragments to a master list (). The node may maintain a master list of fragment identifiers in memory to which additional batches of unique fragment identifiers are added. Alternatively, the node may maintain the master list in a file system on other storage media (e.g., hard disk, flash array), especially when operating in an environment with limited memory resources. 310 The node determines whether there are additional fragment identifiers (). The node submits another request for fragment identifiers to the storage nodes. If additional fragment identifiers are received, the node continues processing the identifiers. If no additional fragment identifiers are received, the node determines that there are no more fragment identifiers. If there are no more fragment identifiers, the node terminates the streams with the storage nodes. The node may terminate the stream by terminating any SSH connections which were opened or relinquishing ports used for the stream. If an API service was invoked, the service may automatically terminate the connection once the end of the fragment identifiers is reached. After the stream is terminated, the process ends. FIG. 1 is annotated with a series of letters A-E. These letters represent stages of operations. Although these stages are ordered for this example, the stages illustrate one example to aid in understanding this disclosure and should not be used to limit the claims. Subject matter falling within the scope of the claims can vary with respect to the order and some of the operations. 306 308 202 FIG. 3 FIG. 2 The flowcharts are provided to aid in understanding the illustrations and are not to be used to limit scope of the claims. The flowcharts depict example operations that can vary within the scope of the claims. Additional operations may be performed; fewer operations may be performed; the operations may be performed in parallel; and the operations may be performed in a different order. For example, the operations depicted in blocks and of can be performed in parallel or concurrently. With respect to , the operations of block may not be performed by a storage node as a recovery process may be manually initiated. It will be understood that each block of the flowchart illustrations and/or block diagrams, and combinations of blocks in the flowchart illustrations and/or block diagrams, can be implemented by program code. The program code may be provided to a processor of a general purpose computer, special purpose computer, or other programmable machine or apparatus. The examples often refer to a “node.” The node is a construct used to refer to implementation of functionality for managing data storage in a distributed storage system. This construct is utilized since numerous implementations are possible. A node may be a particular component or components of a machine (e.g., a particular circuit card enclosed in a housing with other circuit cards/boards), machine-executable program or programs (e.g., file systems, operating systems), firmware, a circuit card with circuitry configured and programmed with firmware for managing data storage, etc. The term is used to efficiently explain content of the disclosure. The node can also be referred to as storage controller, a storage manager, a file server. Although the examples refer to operations being performed by a node, different entities can perform different operations. For instance, a dedicated co-processor or application specific integrated circuit can identify missing fragments or perform fragment recovery. As will be appreciated, aspects of the disclosure may be embodied as a system, method or program code/instructions stored in one or more machine-readable media. Accordingly, aspects may take the form of hardware, software (including firmware, resident software, micro-code, etc.), or a combination of software and hardware aspects that may all generally be referred to herein as a “circuit,” “module” or “system.” The functionality presented as individual modules/units in the example illustrations can be organized differently in accordance with any one of platform (operating system and/or hardware), application ecosystem, interfaces, programmer preferences, programming language, administrator preferences, etc. Any combination of one or more machine readable medium(s) may be utilized. The machine readable medium may be a machine readable signal medium or a machine readable storage medium. A machine readable storage medium may be, for example, but not limited to, a system, apparatus, or device, that employs any one of or combination of electronic, magnetic, optical, electromagnetic, infrared, or semiconductor technology to store program code. More specific examples (a non-exhaustive list) of the machine readable storage medium would include the following: a portable computer diskette, a hard disk, a random access memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or Flash memory), a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the context of this document, a machine readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. A machine readable storage medium is not a machine readable signal medium. A machine readable signal medium may include a propagated data signal with machine readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A machine readable signal medium may be any machine readable medium that is not a machine readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a machine readable medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing. Computer program code for carrying out operations for aspects of the disclosure may be written in any combination of one or more programming languages, including an object oriented programming language such as the Java® programming language, C++ or the like; a dynamic programming language such as Python; a scripting language such as Perl programming language or PowerShell script language; and conventional procedural programming languages, such as the “C” programming language or similar programming languages. The program code may execute entirely on a stand-alone machine, may execute in a distributed manner across multiple machines, and may execute on one machine while providing results and or accepting input on another machine. The program code/instructions may also be stored in a machine readable medium that can direct a machine to function in a particular manner, such that the instructions stored in the machine readable medium produce an article of manufacture including instructions which implement the function/act specified in the flowchart and/or block diagram block or blocks. FIG. 4 FIG. 4 401 407 407 403 405 411 411 401 401 401 405 403 403 407 401 depicts an example computer system with an erasure coded data recovery manager. The computer system includes a processor unit (possibly including multiple processors, multiple cores, multiple nodes, and/or implementing multi-threading, etc.). The computer system includes memory . The memory may be system memory (e.g., one or more of cache, SRAM, DRAM, zero capacitor RAM, Twin Transistor RAM, eDRAM, EDO RAM, DDR RAM, EEPROM, NRAM, RRAM, SONOS, PRAM, etc.) or any one or more of the above already described possible realizations of machine-readable media. The computer system also includes a bus (e.g., PCI, ISA, PCI-Express, HyperTransport® bus, InfiniBand® bus, NuBus, etc.) and a network interface (e.g., a Fiber Channel interface, an Ethernet interface, an internet small computer system interface, SONET interface, wireless interface, etc.). The system also includes an erasure coded data recovery manager . The erasure coded data recovery manager allows for high availability recovery of erasure coded data by identifying and recovering missing fragments without relying on a centralized metadata system. Any one of the previously described functionalities may be partially (or entirely) implemented in hardware and/or on the processor unit . For example, the functionality may be implemented with an application specific integrated circuit, in logic implemented in the processor unit , in a co-processor on a peripheral device or card, etc. Further, realizations may include fewer or additional components not illustrated in (e.g., video cards, audio cards, additional network interfaces, peripheral devices, etc.). The processor unit and the network interface are coupled to the bus . Although illustrated as being coupled to the bus , the memory may be coupled to the processor unit . While the aspects of the disclosure are described with reference to various implementations and exploitations, it will be understood that these aspects are illustrative and that the scope of the claims is not limited to them. In general, techniques for identifying and recovering missing erasure coded fragments as described herein may be implemented with facilities consistent with any hardware system or hardware systems. Many variations, modifications, additions, and improvements are possible. Plural instances may be provided for components, operations or structures described herein as a single instance. Finally, boundaries between various components, operations and data stores are somewhat arbitrary, and particular operations are illustrated in the context of specific illustrative configurations. Other allocations of functionality are envisioned and may fall within the scope of the disclosure. In general, structures and functionality presented as separate components in the example configurations may be implemented as a combined structure or component. Similarly, structures and functionality presented as a single component may be implemented as separate components. These and other variations, modifications, additions, and improvements may fall within the scope of the disclosure. Use of the phrase “at least one of” preceding a list with the conjunction “and” should not be treated as an exclusive list and should not be construed as a list of categories with one item from each category, unless specifically stated otherwise. A clause that recites “at least one of A, B, and C” can be infringed with only one of the listed items, multiple of the listed items, and one or more of the items in the list and another item not listed. BRIEF DESCRIPTION OF THE DRAWINGS Aspects of the disclosure may be better understood by referencing the accompanying drawings. FIG. 1 is a conceptual diagram of a distributed storage system that supports reliable recovery of erasure coded data. FIG. 2 depicts a flowchart with example operations for recovering erasure coded data. FIG. 3 depicts a flowchart with example operations for incrementally collecting fragment identifiers. FIG. 4 depicts an example computer system with an erasure coded data recovery manager.
Atrius Health is the Northeast’s largest nonprofit independent multispecialty medical group. As of July 1, 2015, three Atrius Health medical groups (Harvard Vanguard Medical Associates, Granite Medical Group and Dedham Medical Associates) merged to become one single, multi-specialty group practice. On June 1, 2017, PMG Physician Associates joined Atrius Health. Atrius Health cares for 740,000 adult and pediatric patients across 36 clinical locations providing primary and specialty care, in addition to pharmacy, lab and imaging. Atrius Health is the sole corporate member of the VNA Care Network Foundation and also has a Participating Organization Agreement and a Management Services Agreement with VNA Care Network Foundation for home care and hospice services. Atrius Health also has strategic affiliation agreements with certain hospitals and hospital systems that are Atrius Health preferred providers. Atrius Health has participated in Medicare’s ACO models as well as other outcomes-based payer contracts that demonstrated positive financial outcomes. Tufts Health Public Plans (THPP) (formerly known as Network Health, Inc.) was founded in 1997 as a division of Cambridge Health Alliance (CHA) to improve access to care for underserved populations through the operation of a Medicaid managed care health plan. THPP has 18 years of experience serving diverse, subsidized populations, including those with specialized needs, such as pregnant women, children in substitute care, people with disabilities, people with mental illness, and the homeless. Over the past two years, overall membership increased from 218,000 to more than 400,000 Members. As of March 1, our total Masshealth membership will be 265,000 Members. The Joint Operating Committee (JOC), with equal representation from THPP and the Atrius Health, will be the governing committee of the ACPP and is responsible for making key decisions on the ACPP relationship and financial investment, including decisions on DSRIP. Reporting to this committee is the ACPP Governing Board, which will be accountable for provider and care delivery strategy and performance. Two committees will report directly to the ACPP Governing Board: the Patient and Family Advisory Committee (PFAC) and the Quality Committee. The former will be responsible for representing the interest of the patients and families served by the ACPP, and the latter will be accountable for monitoring the performance of joint Quality Initiatives. The Parties may establish other committees as they deem necessary and appropriate such as a Finance Committee and a Compliance Committee. 1.2 ACO Population Served Population Served The number of patients attributed to the ACO as provided in Section I of the Funding Notification Letter equals 28,097. The patient count has been changed to 23,122 in January 2018. Atrius Health’s service area includes Attleboro, Beverly, Boston, Brockton, Falmouth, Framingham, Gardner-Fitchburg, Lawrence, Lowell, Lynn, Malden, Plymouth, Quincy, Revere, Salem, Somerville, Waltham, Wareham, and Woburn. Both THPP and Atrius Health have long organizational histories of understanding its Member populations. Given its diverse geography, Atrius Health cares for patients across the spectrum of socioeconomic status in urban and suburban communities. Its communities are rich in ethnic and racial diversity with a multitude of primary languages represented and many unique cultural norms. Specifically, the Atrius Health Medicaid population is 58% female and 42% male. Of those that declare their race, 47% identify as Caucasian, 20% African American, 10% Hispanic, 7% Asian and 0.2% American Indian. Of those that declare their language, 89% identify speaking English, with the three other most frequently reported languages as Spanish, Portuguese, and Chinese. Atrius Health also cares for patients across the age continuum from pregnant women to neonates through adolescence and adulthood. Atrius Health has developed models of care that address the medical, psychiatric and social needs of its patients and families with embedded clinicians, e.g. community health workers, care facilitators, and case managers, skilled in needs assessment and in providing essential care coordination. Disease burden in the adult Atrius Health Medicaid population include (with prevalence when known), asthma (14%), diabetes (7%), hypertension, obesity, chronic obstructive pulmonary disease (COPD) (2%), early coronary artery disease, substance use, depression (7%), and anxiety. Atrius Health Medicaid Pediatric patients have high incidence of asthma (19%), obesity, Autism (3%) and ADHD and other learning disabilities. Conditions with the highest PMPM spend include Asthma, Diabetes, Drug Dependence, Chronic Hepatitis, Metastatic Cancer and Sepsis. Mental health diagnoses such as depression, anxiety and adjustment disorders are also prevalent. Enabling access to therapists and psychiatrists and prescribing Advanced Practice Clinicians is challenging, as it is throughout the State. To support the Atrius Health practice and the needs of its patients, Atrius Health maintains a large behavioral health practice with nearly 150 clinicians across nearly every one of its primary care sites. Adult patients are triaged to determine the optimal location of care. Care coordination is essential for patients with behavioral health diagnoses as health outcomes and utilization are typically areas of focus for this population. Atrius Health partners with its subsidiary, VNA Care and with THPP to identify patients with home-based care needs. Historically, Atrius Health’s case managers, care facilitators, and community health workers connect patients with preferred community agencies and services for long term care needs. The ACPP will work to identify Members with LTSS needs, including but not limited to Members with developmental, intellectual, physical, and psychological disabilities, using information provided by the Commonwealth of Massachusetts, Member health assessment, and current use of MassHealth services that could reasonably be viewed as LTSS. Relationships with our LTSS CPs are being developed currently to support direct interfaces between the Primary Care Team, supporting Care Managers and the LTSS CPs. Other sources for individual and population health data may come from participation in the Home and Community-based Services (HCBS) waiver, affiliation with any state agency that provides HCBS waiver-like services (DDS, EOEA, Mass Commission for the Blind, Mass Commission for the Deaf and Hard of Hearing, and Mass Rehab), and THPP disease and highrisk population registries. Atrius Health is committed to addressing the social determinants of health. Registries exist and are continually refined to support Primary Care Teams, Care Facilitators and Community Health Workers in identifying at-risk patients. Atrius Health staff members are trained in motivational interviewing, patient advocacy, and making community resource connections. The ACPP appreciates that we have a great deal to learn about the social milieus of our Members and appreciates the challenges of meeting diverse and pervasive unmet needs of this population. To that end we must invest in culturally sensitive efforts to identify those needs and develop trusting relationships that will facilitate solutions. The ACPP will leverage its in-depth experience, comprehensive population health infrastructure, advanced data analytics and its new relationships with Community Partners to advance the care of the entire MassHealth population. Using new tools and relationships, we will also identify our most vulnerable Members and institute care plans that improve quality, reduce utilization and cost and keep the Member functioning at the highest level possible within their community. 1.3 Overview of DSRIP Investment Approach 1. ACO Programmatic Strategy a. Overall ACO approach to PHM and provider accountability The overall approach to population health management is to start with risk stratification. Atrius Health develops actionable registries of the Atrius Health population stratified by current utilization and cost and informed by predictive analytics to identify patients at high risk of future utilization. Next, a path for caring for these patients is developed that focuses first on prevention. Care facilitators and population health managers proactively address the preventive health needs of these patients. For those patients that cannot be engaged at the office level, Community Health Workers will work to engage them in the community. Regular case conferences about the highest risk patients allow for intensive care coordination and enhanced care. PCPs will have immediate access to their high risk cohorts in EMR based registries and will play an active role in their management. Disease and Care management programs of the ACO and MCO support the primary care team. Foundational work over the past 5 years has demonstrated that this combination of proactive care by a committed care manager and impact-focused case conferences can yield utilization reductions that support sustainability of the investment. The Atrius Health physician compensation model has multiple incentives for productivity as well as quality. Below is the breakout of these incentives for Internal Medicine/Family Practice, Pediatrics, OBGynecology, and Behavioral Health: |Component||IM/FP||Pediatrics||OB-Gynecology||BH| |Base, citizenship, seniority||6%||0%||7%||5%| |Productivity||90%||90%||90%||90%| |Quality||4%||10%||3%||5%| |Quality Metrics||3 equally weighted outcome metrics measured at site level (Hypertension Control, Diabetic Hypertension Control, Diabetes A1C Control) prorated to FTE||4 equally weighted metrics (Well Child 12-21, web portal activation, site level combo10, Asthma Action Plan) prorated to panel size||2 equally weighted metrics (salpingectomy with hysterectomy, baby ASA in high risk preeclampsia patients) measured at hospital group level||Care Model implementation, individual level| Atrius leadership does have incentives based on several domains, including quality, growth, financial results, etc. The incentives are based on the performance of the ACO across all Atrius Health patients, including the MassHealth population. As part of the overall compensation program, THPP leadership (MCO Leadership) is eligible for an annual incentive bonus based on company’s financial, membership and quality results against objectives. In addition to these performance based targets, the Annual Incentive Plan also includes certain strategic initiatives that are set annually in alignment with the organization’s long-term goals. b. Overall ACO approach to total cost of care management and path to sustainability With years of experience in managing total cost of care, Atrius Health approaches this by working on prevention through PHM, by providing access to care when needed (e.g. same day appointments, telephone coverage staffed by advanced practice clinicians, urgent care offered regionally), and by managing site of care (use high value hospitals, bring care into the community, avoid use of the Emergency Department). It has been our experience that successful programs in these areas can generate savings that are self-sustaining. 2. Goals for the DSRIP that support overall ACO programmatic strategy The ACPPs key goals for the DSRIP program to support ACO programmatic strategy are a) to continue to fund robust infrastructure around risk stratification and predictive analytics to produce actionable data and to fund to managed care quality and performance improvement infrastructure, b) to provide dedicated case management, social workers and a variety of care facilitation staff to cost effectively address the needs of the population, and c) to identify gaps in care and develop associated clinical programs. 3. DSRIP investment strategy that supports the stated goals Atrius Health investment strategy is to fund the expansion of existing infrastructure that supports ACO programmatic strategy, and then to make new investments in the following key areas: 1. ACO Director to provide administrative leadership for the ACO, 2. invest in additional care facilitators and links to the community, and 3. develop and integrate a screening tool for social determinants supported by an effective community resource database. 4. Anticipated challenges There are numerous challenges yet to be overcome. First is ensuring that information collected about social determinants of health is continually updated and acted upon effectively. Second, it will take some time to critically assess and prioritize programs both at the ACO and MCO level. Additionally, THPP and Atrius Health are newly developing relationships with numerous community partners and will need to determine best methods of communicating back and forth. Patients may continue to receive care at various institutions that are not Atrius Health preferred partners where effective care management is enabled through interoperability.
https://www.mass.gov/service-details/atrius-health-inc
France is reportedly going to try to convince other European Union member states to adopt cryptocurrency regulations similar to its own, Reuters reported on April 15. The Minister of Finance of the Chilean government Felipe Larraín announced the introduction of a bill regulating cryptocurrencies and fintech to Congress, Cointelegraph Spain reported on April 15. The central bank of Russia has reviewed the potential benefits and drawbacks of central bank digital currencies (CBDC) in a policy brief published on April 18. Andrew Yang, a United States Democratic presidential candidate for the 2020 elections, is advocating for clear regulations on digital assets. Yang put the key operative points in a policy published on his campaign website. Japan’s Financial Services Agency (FSA) will reportedly introduce new rules regarding cold wallets for storing cryptocurrencies at crypto exchanges, Reuters reported on April 17. Disclaimer : The information presented in this e-newsletter is intended to provide a brief summary of various events and developments that affect, or that might in the future affect, the value of one or more of the cryptocurrencies described above. The information contained in this e-newsletter and any information contained herein, is not intended to provide sufficient information to form the basis for an investment decision. The information presented herein is accurate only as of its date. You should seek additional information regarding the merits and risks of investing in any cryptocurrency before deciding to buy or sell any such instruments.
https://www.unicoindcx.com/newsletter/01/28/
BACKGROUND OF THE INVENTION SUMMARY OF THE INVENTION 1. Field of the Invention The present invention relates to a method for controlling the drive of an actuator of an active vibration isolation support system that includes an elastic body receiving a load from a vibrating body, a liquid chamber having a wall of which at least a part is formed by the elastic body, a movable member for changing the capacity of the liquid chamber, and an electromagnetic actuator for driving the movable member. 2. Description of the Relevant Art Such an active vibration isolation support system is known and disclosed in Japanese Patent Application Laid-open No. 10-110771. This active vibration isolation support system calculates a fixed period drive signal based on a reference signal that is output every time a crankshaft rotates through a fixed angle and a residual vibration signal that is transmitted from an engine to a vehicle body frame via the active vibration isolation support system, and feedforward control of the actuator is carried out based on this drive signal. FIG. 6 Conventionally, as shown in , in the case where the amount of lift of the actuator of the active vibration isolation support system is controlled so as to change with a sinusoidal wave form having a fixed period, a proportion of a constant voltage that is supplied to the actuator driver is regulated so as to be converted into thermal energy, and the remainder of the voltage is applied to the actuator thus giving a current with a sinusoidal wave form. However, if the above-mentioned method is adopted not only is there the problem that the actuator driver generates heat thus requiring cooling, but there is also the problem that a proportion of the electrical energy is wasted as thermal energy in the driver thus increasing power consumption. The present invention has been conducted under the above-mentioned circumstances, and it is an object of the present invention to allow the waveform and the period of the lift of an actuator of an active vibration isolation support system to be freely controlled while avoiding the generation of heat in the actuator driver and the corresponding increase in the power consumption. In order to achieve the above-mentioned object, in accordance with the invention according to a first aspect and feature of the invention, there is provided a method for controlling the drive of an actuator of an active vibration isolation support system that includes an elastic body receiving a load from a vibrating body, a liquid chamber having a wall of which at least a part is formed by the elastic body, a movable member which changes a capacity of the liquid chamber, and an electromagnetic actuator which drives the movable member, the method comprising the steps of setting a large number of consecutive micro time regions, carrying out duty control of voltage that is applied to the actuator in each of the micro time regions, and setting, via a fixed number of consecutive micro time regions in which changes of duty ratio form a defined pattern, a period of a current that drives the actuator. In accordance with the above-mentioned arrangement, by carrying out duty control of the voltage that is applied to the actuator individually in each of the large number of consecutive micro time regions, the waveform of a current that is applied to the actuator, that is to say, the waveform of the lift of the actuator can be set freely and, moreover, by changing the number of consecutive micro time regions in which changes of the duty ratio form a defined pattern, the period of the current that drives the actuator, that is to say, the period of the lift of the actuator can be set freely. Furthermore, since electrical energy is not wasted as thermal energy in the actuator driver, the problems of heat being generated in the driver and the power consumption increasing can be avoided. 14 24 An engine E of an embodiment corresponds to the vibrating body of the present invention, a first elastic body of the embodiment corresponds to the elastic body of the present invention, and a first liquid chamber of the embodiment corresponds to the liquid chamber of the present invention. BRIEF DESCRIPTION OF THE DRAWINGS FIG. 1 is a longitudinal cross sectional view of an active vibration isolation support system which may be used according to the present invention. FIG. 2 2 2 1 is a cross sectional view looking down at line — of FIG. . FIG. 3 3 3 1 is a cross sectional view looking down at line — in FIG. . FIG. 4 1 is a magnified view of an essential, lower half part of FIG. . FIG. 5 is a diagram showing a method for controlling an actuator according to an embodiment of the invention. FIG. 6 is a diagram showing a conventional method for controlling an actuator. DETAILED DESCRIPTION OF THE INVENTION FIGS. 1 5 Modes for carrying out the present invention are explained below by reference to an embodiment of the present invention illustrated in the appended drawings. Specifically, to illustrate one embodiment of the present invention. FIGS. 1 4 20 29 An active vibration isolation support system M shown in to is for elastically supporting an engine E of an automobile in a vehicle body frame F. It is controlled by an electronic control unit U to which are connected an engine rotational speed sensor Sa for detecting the engine rotational speed, a load sensor Sb for detecting the load that is input to the active vibration isolation support system M, an acceleration sensor Sc for detecting the acceleration acting on the engine E, and a lift sensor Sd for detecting the amount of lift of a movable member of the actuator , which will be described below. 12 11 13 12 12 13 14 15 15 16 17 15 16 13 13 b a The active vibration isolation support system M has a structure that is substantially symmetrical with respect to an axis L. It includes an inner tube that is welded to a plate-shaped mounting bracket that is joined to the engine E and an outer tube that is placed coaxially around the inner tube . The inner tube and the outer tube are bonded by vulcanization bonding to the upper end and lower end respectively of a first elastic body made of a thick rubber. A disc-shaped first orifice-forming member having an aperture in its center, an annular second orifice-forming member having a U-shaped cross section open at the top, and a third orifice-forming member similarly having a U-shaped cross section open at the top are welded into a single unit. The outer peripheries of the first orifice-forming member and the second orifice-forming member are superimposed and fixed to a caulking fixing part provided in a lower part of the outer tube . 18 17 19 18 20 21 13 13 22 21 23 22 20 a The outer periphery of a second elastic body made of a rubber membrane is fixed by vulcanization bonding to the inner periphery of the third orifice-forming member . A cap that is fixed by vulcanization bonding to the inner periphery of the second elastic body is press-fitted and fixed onto a movable member that is disposed on the axis L in a vertically movable manner. A ring is fixed to the caulking fixing part of the outer tube , the outer periphery of a diaphragm is fixed to the ring by vulcanization bonding, and a cap that is fixed by vulcanization bonding to the inner periphery of the diaphragm is press-fitted and fixed onto the movable member . 14 18 24 18 22 25 24 25 26 27 15 16 17 Between the first elastic body and the second elastic body is thus defined a first liquid chamber , which is filled with a liquid. Between the second elastic body and the diaphragm is thus defined a second liquid chamber , which is filled with a liquid. The first liquid chamber and the second liquid chamber communicate with each other via an upper orifice and a lower orifice that are formed from the first to third orifice-forming members , and . 26 15 16 15 15 26 26 16 16 26 26 15 15 16 16 2 a a a a a a The upper orifice is an annular passage formed between the first orifice-forming member and the second orifice-forming member . A through hole is formed in the first orifice-forming member on one side of a partition provided in a part of the upper orifice , and a through hole is formed in the second orifice-forming member on the other side of the partition . The upper orifice is therefore formed along an almost complete circumference from the through hole of the first orifice-forming member to the through hole of the second orifice-forming member (FIG. ). 27 16 17 16 16 27 27 17 17 27 27 16 16 17 17 3 a a a a a a The lower orifice is an annular passage formed between the second orifice-forming member and the third orifice-forming member . The through hole is formed in the second orifice-forming member on one side of a partition provided in a part of the lower orifice , and a through hole is formed in the third orifice-forming member on the other side of the partition . The lower orifice is therefore formed along an almost complete circumference from the through hole of the second orifice-forming member to the through hole of the third orifice-forming member (FIG. ). 24 25 26 27 That is to say, the first liquid chamber and the second liquid chamber communicate with each other via the upper orifice and the lower orifice that are connected to each other in tandem. 13 13 28 28 30 29 20 a To the caulking fixing part of the outer tube is fixed an annular mounting bracket for fixing the active vibration isolation support system M to the vehicle body frame F, and to the lower face of the mounting bracket is welded an actuator housing forming an outer shell of the actuator for driving the movable member . 30 32 34 33 30 32 36 32 32 32 34 36 36 32 38 34 30 38 38 36 38 42 38 34 30 30 a a a a a To the actuator housing is fixed a yoke , and an annular coil wound around a bobbin is housed in a space surrounded by the actuator housing and the yoke . A bottomed cylinder-shaped bearing is inserted from beneath into a tubular part of the yoke , the tubular part being fitted in the inner periphery of the annular coil , and is positioned by a retaining part at the lower end of the bearing being engaged with the lower end of the yoke . A disc-shaped armature that faces the upper face of the coil is slidably supported on the inner periphery of the actuator housing , and a step formed on the inner periphery of the armature engages with the upper end of the bearing . The armature is forced upward by a dish spring that is disposed between the armature and the upper face of the coil , and is positioned by being engaged with a retaining part provided on the actuator housing . 43 36 20 20 36 44 43 41 36 43 36 41 43 a A cylindrical slider is slidably fitted on the inner periphery of the bearing , and a shaft extending downward from the movable member runs loosely through the upper base of the bearing and is connected to a boss that is fixed to the interior of the slider . A coil spring is positioned between the upper base of the bearing and the slider , the bearing being forced upward by the coil spring and the slider being forced downward thereby. 29 45 30 47 46 45 48 47 45 44 43 50 47 49 45 49 50 51 20 50 20 A lift sensor Sd provided beneath the actuator includes a sensor housing that is fixed to the lower end of the actuator housing . A sensor rod is slidably supported in a guide member that is fixed to the interior of the sensor housing , and forced upward by means of a coil spring disposed between the sensor rod and the base of the sensor housing so as to be in contact with the boss of the slider . A contact point that is fixed to the sensor rod is in contact with a resistor that is fixed to the interior of the sensor housing . The electrical resistance between the lower end of the resistor and the contact point is input into the electronic control unit U via a connector . Since the lift of the movable member is equal to the travel of the contact point , the lift of the movable member can be detected based on the electrical resistance. 34 29 41 43 36 48 47 44 43 41 48 34 38 38 36 41 41 43 20 43 44 20 20 24 34 20 18 24 a a When the coil of the actuator is in a demagnetized state, the coil spring applies a downward elastic force to the slider slidably supported on the bearing , the coil spring applies an upward elastic force thereto via the sensor rod and the boss , and the slider therefore comes to rest at a position where the elastic forces of the two coil springs and are in balance. When the coil is energized from the above-mentioned state so as to draw the armature downward, the step pushes the bearing making it slide downward so compressing the coil spring . As a result, the elastic force of the coil spring increases so lowering the slider , the movable member that is connected to the slider via the boss and the shaft therefore descends, and the second elastic body that is connected to the movable member deforms downward so increasing the capacity of the first liquid chamber . Conversely, when the coil is demagnetized, the movable member rises, the second elastic body deforms upward and the capacity of the first liquid chamber decreases. 14 24 24 25 26 27 24 25 25 22 26 27 14 When a low frequency engine shake vibration occurs while the automobile is traveling, a load that is input from the engine E deforms the first elastic body so changing the capacity of the first liquid chamber , and as a result the liquid travels to and fro between the first liquid chamber and the second liquid chamber , which are connected to each other via the upper orifice and the lower orifice . When the capacity of the first liquid chamber increases and decreases, the capacity of the second liquid chamber decreases and increases accordingly, and this change in the capacity of the second liquid chamber is absorbed by elastic deformation of the diaphragm . Since the shapes and dimensions of the upper orifice and the lower orifice and the spring constant of the first elastic body are set so that a high spring constant and a high attenuation force can be obtained in a region including the above-mentioned frequency of the engine shake vibration, the vibration that is transmitted from the engine E to the vehicle body frame F can be reduced effectively. 29 In the above-mentioned frequency region of engine shake vibration the actuator is maintained in a non-operational state. 26 27 24 25 29 When vibration occurs having a frequency that is higher than that of the above-mentioned engine shake vibration, that is to say, when idling vibration or muffled sound vibration due to rotation of the crankshaft of the engine E occurs, since the liquid within the upper orifice and the lower orifice that provide communication between the first liquid chamber and the second liquid chamber becomes stationary and cannot exhibit the vibration isolation function, the actuator is operated so as to exhibit the vibration isolation function. 34 29 24 38 34 38 20 41 18 20 24 The electronic control unit U controls the application of current to the coil of the actuator based on the signals from the engine rotational speed sensor Sa, the load sensor Sb, the acceleration sensor Sc and the lift sensor Sd. More specifically, when the engine E is biased downward due to the vibration and the capacity of the first liquid chamber thereby decreases so increasing the liquid pressure, the armature is drawn in by energizing the coil . As a result, the armature moves downward together with the movable member while compressing the coil spring , thus deforming downward the second elastic body that is connected to the inner periphery of the movable member . The capacity of the first liquid chamber thereby increases so suppressing the increase in the liquid pressure, and the active vibration isolation support system M thus generates an active support force to prevent transmission of the downward load from the engine E to the vehicle body frame F. 24 38 34 38 20 41 18 20 24 Conversely, when the engine E is biased upward due to the vibration and the capacity of the first liquid chamber thus increases so decreasing the liquid pressure, the drawing-in of the armature is canceled by demagnetizing the coil . As a result, the armature moves upward together with the movable member due to the elastic force of the coil spring , thus deforming upward the second elastic body that is connected to the inner periphery of the movable member . The capacity of the first liquid chamber thereby decreases so suppressing the decrease in the liquid pressure, and the active vibration isolation support system M thus generates an active support force to prevent transmission of the upward load from the engine E to the vehicle body frame F. 20 29 The electronic control unit U compares the actual lift of the movable member that has been detected by the lift sensor Sd with the target lift thereof that has been calculated based on the outputs from the engine rotational speed sensor Sa, the load sensor Sb and the acceleration sensor Sc, and the operation of the actuator is feedback controlled so that the deviation converges to 0. 29 5 29 29 29 29 Now, according to the primary aspect of the invention, a method of controlling the drive of the actuator of the active vibration isolation support system M is described with reference to FIG. . Specifically, when the target lift of the actuator is in a sinusoidal form having a fixed cycle, a large number of consecutive micro time regions are set, and duty control of the voltage that is applied to the actuator is carried out in each of the micro time regions. In the present embodiment, fourteen micro time regions together form one cycle for the lift of the actuator , and duty control of the voltage that is applied to the actuator is carried out individually in each of the fourteen micro time regions. Of course, the large number of micro time regions used according to the invention is not limited to fourteen, as in the foregoing example, but may be a lesser or greater number depending on the desired or appropriate cycle of the lift for the actuator in a given situation. FIG. 5 29 29 More specifically, in the example of , the duty ratios of the first four micro time regions are set at 100%, the duty ratios of the subsequent seven micro time regions are decreased gradually from 100% to 0%, and the duty ratios of the last three micro time regions are set at 0%. As a result, the lift of the actuator can be obtained as a sinusoidal wave form with 14 micro time regions in a single cycle. Decreasing the number of consecutive micro time regions whose duty ratios change with a defined pattern from the above-mentioned number of 14 can shorten the cycle over which the lift changes. Conversely, increasing the number of consecutive micro time regions whose duty ratios change with a defined pattern from the above-mentioned number of 14 can lengthen the cycle of the lift. Furthermore, changing the pattern of the duty ratios of a plurality of micro time regions forming one period in various ways can freely control the waveform of the lift of the actuator . FIG. 6 29 Moreover, unlike the conventional example illustrated in , since it is unnecessary to regulate a proportion of the voltage that is applied to the actuator in a driver so as to convert it to thermal energy, the problems of cooling a hot driver and wasting part of the electrical energy so increasing the power consumption can be eliminated. As hereinbefore described, in accordance with the invention described in conjunction with the disclosed embodiment, by carrying out duty control of the voltage that is applied to the actuator individually in each of the large number of consecutive micro time regions, the waveform of current that is applied to the actuator, that is to say, the waveform of the lift of the actuator can be set freely and, moreover, by changing the number of consecutive micro time regions in which changes of the duty ratio form a defined pattern, the period of the current that drives the actuator, that is to say, the period of the lift of the actuator can be set freely. Furthermore, since electrical energy is not wasted as thermal energy in the actuator driver, the problems of heat being generated in the driver and the power consumption increasing can be avoided. An embodiment of the present invention has been described in detail above, but the present invention can be modified in a variety of ways without departing from the spirit and scope of the invention. For example, an active vibration isolation support system M supporting an engine E of an automobile is illustrated in the embodiment, but the active vibration isolation support system of the present invention can be applied to the support of another vibrating body such as a machine tool. The scope of the invention is indicated by the appended claims.
A recent discovery was made in Mexico where archaeologists dug up a pre-Aztec temple of the "flayed god" called Xipe Totec. Items relating to the deity were discovered at a site in Puebla state, and believed to date from 900-1150 AD. Mexican archaeologists say the find may be the earliest dedication to Xipe Tótec discovered in Mexico. Worship of the God, who represents fertility and regeneration, is known to have later spread throughout Mesoamerica during Aztec times.
https://www.neatorama.com/2019/01/08/Xipe-Totec-The-Flayed-Lord-of-Mexico/
Outdoor Notebook: Fishing for crappies The 10 p.m. weather forecast reported that the weather the next day was for calm winds and temperatures would be in the 30s. Dawn that next morning was calm and warm. After several days in a row of relatively high winds, it was an invitation for me to go out and sit on the ice. Upon arrival at the boat landing, it was obvious that several persons had walked out on the ice, but there were no vehicle tracks in the snow. I have made it a practice to never make the first vehicle tracks on the ice of any lake. There is a story to be told about that decision, but that can wait for another day. After sitting in the pickup looking at the ice, I decided to drive over to another access point that was quite close to where I intended to fish. With only a few inches of snow on the ice, the walk out to the area where I wanted to fish was easy. Even pulling my sled out, it was an easy walk. As I walked out, I checked my watch and was pleased that there was still an hour left in the major feeding period. I arrived in the area where we had been fishing several times this year and had been quite successful. As I picked the auger out of the sled, I could not believe how quiet it was on the ice. The auger broke the silence and scared several crows off the ice. They were gathered in an area where numerous holes had been drilled through the ice. They were most likely eating minnows left on the ice. The auger made quick work of drilling five holes through the ice. A quick measurement of the ice showed that it was 10 inches thick and it was good, clear ice. That is plenty of ice to support a pickup, but there is always the thought that there is no such thing as “safe ice” and there were no vehicle tracks on the ice, which made me satisfied with my decision to walk out. The holes were cleared out and two tip-downs were set with tiny crappie minnows suspended about two feet above the bottom. Although I drilled five holes, I only fished in three of them; but once I am set up, my preference is to reduce noise on the ice as much as possible. My target was to catch some crappies and I planned to set out two tip-downs and a jig in the other hole. The first tip-down was set and I was trying to get a second tip-down, again baited with a tiny crappie minnow hooked lightly under the dorsal fin with a number 16 gold treble hook. Just as I was dropping the second line with a lead weight on it, the first tip-down began to move. The second line was left sitting and the first one yielded a decent crappie. The hook was removed and a fresh minnow hooked and dropped back into the water. For the next hour, the action was steady and seven crappies were laid on the ice. After that hour, the bite slowed to almost nothing. I fished for two more hours and only caught one more crappie after the major was over. Following that morning, several guys fishing other lakes told me that their action was about the same as mine. Once the major was over, so was the bite. The most recent intense cold spell has definitely kept me off the ice. During the past several meetings of the Wisconsin Conservation Congress, we have received requests to lower the bag limit on crappies to 10 per day. I have solved that problem by telling anyone who goes crappie fishing in my boat that the limit is 10 crappies per day. The same rule is in effect on the ice from my little tent. Longtime Northwoods outdoors personality Roger Sabota writes a bi-monthly column for the Star Journal. Leave a reply You must be logged in to post a comment.
https://starjournalnow.com/2013/01/24/outdoor-notebook-fishing-for-crappies/
CROSS-REFERENCE TO RELATED APPLICATIONS BACKGROUND OF THE INVENTION SUMMARY OF THE INVENTION DETAILED DESCRIPTION OF THE EMBODIMENTS EXAMPLE 1 EXAMPLE 2 This application is a continuation-in-part of International Patent Application No. PCT/CN2010/080471 with an international filing date of Dec. 30, 2010, designating the United States, now pending, and further claims priority benefits to Chinese Patent Application No. 201010231677.8 filed Jul. 21, 2010. The contents of all of the aforementioned applications, including any intervening amendments thereto, are incorporated herein by reference. Inquiries from the public to applicants or assignees concerning this document or the related applications should be directed to: Matthias Scholl P.C., Attn.: Dr. Matthias Scholl Esq., 14781 Memorial Drive, Suite 1319, Houston, Tex. 77079. 1. Field of the Invention The invention relates to a polishing technique, and more particularly to a method of cleaning wafer surfaces after polishing aluminum wirings in ultra large scale integrated circuits. 2. Descriptions of Related Art Currently, the most applicable integrated circuits are products employing technologies of 90 nm and above, the wiring of which is aluminum. Chemical-mechanical polishing (CMP) technique is a very important process in multilayer wirings of ultra large scale integrated circuit (ULSI) techniques, because the degree of flattening, roughness and dirt of the surface after CMP process directly affect aluminum wiring of next layer, breakdown characteristics of circuits, interface state, and the lifetime of minority carrier, all of which directly relates to properties and yields of wafers of integrated circuits (IC). A large amount of organic matters, grains, and heavy metal ions in particular are introduced during CMP. As aluminum is very active, the newly naked surface of aluminum in CMP tends to be oxidized, and after CMP, it still reacts with residues of the polishing solution. The naked surface in CMP has high surface energy, and thus large grains and metal ions surrounding are easily to be adsorbed. Shortly after CMP, chemical adsorption further occurs between the surface and dirt, and the dirt is difficult to remove, thereby resulting in contamination. Due to uneven distribution of polishing solution residues and barriers of adsorbed large grains, chemical corrosion and oxidation occurs unevenly on the surface, and the performance of the surface is decreased and cannot meet the standard. Conventional treatment after CMP is to lift polishing discs from the polishing solution to deionized water to wash, due to the time delay and cleaning solution only containing deionized water, the effectiveness is not good but often seriously contaminated by organic matters, large grains, and metal ions. In view of the above-described problems, it is one objective of the invention to provide a method of cleaning wafer surfaces after polishing aluminum wirings in ULSIs. a) preparing an aqueous cleaning solution comprising steps as follows: collecting deionized water, stirring with between 0.5 and 5 wt. % of a surfactant, between 0.1 and 5 wt. % of an FA/O II chelating agent, and between 0.01and 5 wt. % of an FA/O II corrosion inhibitor added into the deionized water, continuing stirring to yield a neutral aqueous cleaning solution, the wt. % being based on the total weight of the solution; and b) after CMP treatment of the aluminum wirings, without lifting the polishing disc, directly washing wafer surfaces with the neutral aqueous cleaning solution at a large flow rate to make the surface clean. To achieve the above objective, in accordance with one embodiment of the invention, there is provided a method of cleaning wafer surfaces after polishing aluminum wirings by means of a polishing disc in ultra large scale integrated circuits, the method comprising: flow rate: between 1000 and 5000 mL/min; time: between 0.5 and 2 min; and pressure on the wafer surfaces: zero or equivalent to the weight of the polishing disc on the wafer surfaces. In a class of this embodiment, the washing is carried out under following conditions: Advantages of the invention are summarized below: aqueous cleaning is quickly processed after CMP treatment without stopping rotation of the polishing disc, a large flow rate of the neutral aqueous cleaning solution containing surfactant, chelating agent, and corrosion inhibitor can clean wafer surfaces with no corrosion to device, and wash away unevenly distributed polishing solution, organic matters and large grains, thereby obtaining a clean and perfect surface. The surfactant reduces the surface tension of wafers, and the cleaning solution can expand evenly on the wafer surfaces, thus, the effectiveness of the clean is improved. The chelating agent reacts with metal ions forming chemical bonds to yield macromolecular chelates, thereby effectively controlling the adsorption of metal ions on the wafer surfaces, and washing away metal ions using large flow rate of cleaning solution. The corrosion inhibitor forms a single molecular passive film on the surface to prevent residue of polishing solution from continuing reacting with the surface and forming uneven corrosion and oxidation, so that the perfection of the wafer surface is improved. To further illustrate the invention, experiments detailing a method of cleaning wafer surfaces after polishing aluminum wirings in ULSIs are described below. It should be noted that the following examples are intended to describe and not to limit the invention. a) preparing an aqueous cleaning solution comprising steps as follows: mixing and stirring deionized water, between 0.5 and 5 wt. % of a surfactant, between 0.1 and 5 wt. % of an FA/O II chelating agent, and between 0.01 and 5 wt. % of an FA/O II corrosion inhibitor, to yield a neutral aqueous cleaning solution, the wt. % being based on the total weight of the solution; and b) after CMP treatment of the aluminum wirings, without lifting the polishing disc, directly washing wafer surfaces with the neutral aqueous cleaning solution at a large flow rate to make the surface clean. A method of cleaning wafer surfaces after polishing aluminum wirings by means of a polishing disc in ultra large scale integrated circuits, comprises: flow rate: between 1000 and 5000 mL/min; time: between 0.5 and 2 min; and pressure on wafer surfaces: zero or equivalent to the weight of the polishing disc on wafer surfaces. The washing is under following conditions: π 10 21 6 4 2 2 7 π 10 21 6 4 2 2 10 12-18 25-37 6 4 2 2 70 13 The surfactant is selected from the group consisting of an FA/O I surfactant, O-7 ((CH—CH—O—CHCHO)—H), O-10 ((CH—CH—O—CHCHO)—H), O-20 (CH—CH—O—CHCHO) H), or JFC. The FA/O II chelating agent is supplied by Tianjin Jingling Microelectronics Materials Co., Ltd. The FA/O II corrosion inhibitor has a concentration of between 0.01 and 5 wt. %, and the FA/O II corrosion inhibitor is supplied by Tianjin Jingling Microelectronics Materials Co., Ltd. A method of cleaning wafer surfaces after polishing aluminum wirings in ULSIs comprises steps as follows: To 3000 g of deionized water, 100 g of an FA/O I surfactant and 50 g of an FA/O II chelating agent were added and stirred to yield a mixture. Thereafter, 5 g of a corrosion inhibitor diluted with 200 g of deionized water was added to the mixture and stirred for full dissolution. After CMP treatment, the aluminum wirings were washed with the cleaning solution at a flow rate of 1000 mL/min for 1 min. It was observed that no corrosion circles and oxidations existed on the surface. A method of cleaning wafer surfaces after polishing aluminum wirings in ULSIs comprises steps as follows: To 3400 g of deionized water, 100 g of an FA/O I surfactant and 50 g of an FA/O II chelating agent were added and stirred to yield a mixture. Thereafter, 10 g of a corrosion inhibitor diluted with 200 g of deionized water was added to the mixture and stirred for full dissolution. After CMP treatment, the aluminum wirings were washed with the cleaning solution at a flow rate of 4000 mL/min for 0.6 min. It was observed that no corrosion circles and oxidations existed on the surface. Aluminum wirings in ULSIs after polishing have high surface energy, large surface tension, uneven distribution of polishing solution residues, adsorption of organic matters, grains, and metal ions. Once alkaline polishing is accomplished, cleaning method of the invention is processed before polishing disc stops rotation, in which most of grains can be removed; the large flow rate of cleaning solution washes away polishing solution residues; the surfactant, chelating agent, and corrosion inhibitor in the cleaning solution quickly reduce the surface tension, and react with metal ions to form soluble chelates and a single molecular passive film, therefore, uneven corrosion and oxidation on the surface can be prevented, and a clean and perfect surface is obtained. Effects of the invention are summarized below: While particular embodiments of the invention have been shown and described, it will be obvious to those skilled in the art that changes and modifications may be made without departing from the invention in its broader aspects, and therefore, the aim in the appended claims is to cover all such changes and modifications as fall within the true spirit and scope of the invention.
--- abstract: 'We report the observation of harmonic generation and strong nonlinear coupling of two collective modes of a condensed gas of rubidium atoms. Using a modified TOP trap we changed the trap anisotropy to a value where the frequency of the $m=0$ high-lying mode corresponds to twice the frequency of the $m=0$ low-lying mode, thus leading to strong nonlinear coupling between these modes. By changing the anisotropy of the trap and exciting the low-lying mode we observed significant frequency shifts of this fundamental mode and also the generation of its second harmonic.' address: | Clarendon Laboratory, Department of Physics, University of Oxford,\ Parks Road, Oxford, OX1 3PU,\ United Kingdom. author: - 'G. Hechenblaikner, O.M. Maragò, E. Hodby, J. Arlt, S. Hopkins[^1], and C.J. Foot' title: Observation of harmonic generation and nonlinear coupling in the collective dynamics of a Bose condensate --- epsf Ever since the first Bose condensed gases were produced [@Anderson], collective excitations have played a key role in the theoretical models and their experimental verification. Measurements of collective excitation frequencies may be compared with theoretical predictions and the first measurements of the lowest collective modes of a Bose gas were carried out soon after the first condensates were made [@jin; @mewes]. Those experiments verified that the Gross-Pitaevskii (GP) equation, also called the nonlinear Schrödinger equation (NLSE), gives a very accurate prediction of the frequencies of the measured collective modes. The nonlinearity of the condensate is manifested as a term in the GP equation proportional to the mean-field or condensate density. In this experiment we have observed effects arising directly from this term. The spectroscopy of the excited states of the condensate has been extended to include measurements of damping rates and frequency shifts as a function of temperature (in the range $0<T/T_c<1$, where $T_c$ is the critical temperature of condensation)[@jin2]. The finite temperature measurements test dynamical aspects of the theory which require higher order terms in the calculations and as yet there is not full agreement [@hutchinson]. Recent theoretical work has contributed to a better understanding of damping of the collective excitations at finite temperature [@damping]. Although mechanisms that lead to damping are complex one may consider two broad types of behavior. Firstly, energy may be lost from a mode by being transferred into a multitude of other modes through the nonlinear coupling that is intrinsic to condensates. The second cause of damping is scattering of non-condensate particles in so-called Landau processes. The relative importance of these two processes depends on the shape of the condensate. In this work we have been able to vary the aspect ratio of the condensate around a value where nonlinear coupling is large and hence likely to dominate over other processes. In the hydrodynamic limit which applies to condensates with a large number of atoms, the GP equation reduces to the hydrodynamic equations of nondissipative fluid dynamics. In this limit Stringari [@stringari] found analytic solutions for the frequencies of the collective modes and Edwards et al.[@edwards] extended the calculations to the non-hydrodynamic region by direct integration of the GP equation. The measured oscillation frequencies correspond to those obtained from linear response theory only in the limit of small driving and response amplitudes (zero amplitude limit). For strong driving the inherent nonlinearity in the condensate becomes apparent and the actual response frequency is shifted from the zero amplitude limit, $\omega_0$. The shift $\Delta\omega$ is predicted to be proportional to the square of the response amplitude to first order approximation, i.e. $\Delta\omega/\omega_0 =A^2\delta(\lambda)$, where $A$ is the excitation response amplitude, $\delta(\lambda)$ is a nonlinearity factor which varies for different trap geometries [@dalfovo] characterized by $\lambda=\omega_z/\omega_r$ (the ratio of axial to radial trap frequencies). Thus a frequency shift of the collective excitation can be achieved in two ways: either by increasing the driving and consequently the response amplitude of the oscillation or by changing the trap geometry and hence the nonlinearity factor. In previous work only the amplitude dependence of the frequency shift for a fixed trap geometry has been studied [@jin; @mewes; @jin2]. This paper describes the use of a trap with adjustable anisotropy [@ensher] to study the effects of trap geometry on collective excitations. The three lowest collective modes of a condensate in an axially symmetric trap ($\omega_x=\omega_y=\omega_r$) are the $m=2$ mode, the low-lying $m=0$ mode and the high-lying $m=0$ mode, where $m$ is the azimuthal angular momentum (the trivial centre of mass motion is not considered). The $m=2$ mode corresponds to a quadrupole type excitation in the radial plane. The low-lying $m=0$ mode corresponds to a radial oscillation of the width which is out of phase with an oscillation along the trap axis. The high-lying $m=0$ mode is an in-phase compressional mode along all directions (breathing mode). In our experiment we changed the trap anisotropy parameter $\lambda$ around a resonance between the low-lying and the high-lying $m=0$ modes. At this resonance two quanta of excitation of the low-lying mode are converted into one quantum of excitation of the high-lying mode, i.e. the second harmonic of the low-lying collective mode is excited. The theoretical plot (for the hydrodynamic limit) in Fig.\[resonance2\]a shows that at a trap anisotropy of $\lambda\approx 1.95$ (resonance) the frequency of the high-lying $m=0$ mode corresponds to exactly twice the frequency of the low-lying mode.\ The nonlinearity factor $\delta(\lambda)$ also changes dramatically across the resonance. A theoretical plot of $\delta(\lambda)$ against $\lambda$ is given in Fig.\[resonance2\]b using the formula given in [@dalfovo]. Our experimental apparatus for creating Bose condensates is described elsewhere [@arlt] and we only briefly mention the relevant features here. Atoms are loaded into a TOP trap and then evaporatively cooled to the quantum degenerate regime. We cool the atoms to well below the critical temperature where no thermal cloud component is observable ($\sim 0.5 T_c$). For this experiment the usual TOP trap configuration with a rotating field in the radial plane was modified by the addition of a pair of ’z-coils’ in Helmholtz configuration which produced an oscillating axial bias field along the (vertical) quadrupole coil axis. The total field in the trap is $$\begin{aligned} {\mathbf B}(t)=B'_q\left(x{\mathbf e}_{x}+y{\mathbf e}_{y}-2z{\mathbf e}_{z}\right)+\nonumber\\ B_r\left(\cos \omega_t t\ {\mathbf e}_{x}+\sin \omega_t t\ {\mathbf e}_{y} \right)+ B_z\cos 2\omega_t t\ {\mathbf e}_{z}. \label{topfield}\end{aligned}$$ The first term is the static quadrupole field and is written in terms of its gradient $B'_q$ in the radial direction. The second term is the conventional TOP field of magnitude $B_r$ rotating in the xy-plane at a frequency $\omega_t$. The third term is the additional z-bias field of magnitude $B_z$ modulated at twice the frequency of the field in the xy-plane. Hence the locus of the quadrupole field does not simply follow a planar circular path like that of a standard TOP trap but it also moves up and down following a saddle shape. The time average of this field configuration yields the value for a trap frequency ratio that is smaller than $\lambda=\sqrt 8$ in a TOP trap with $B_z=0$. By increasing $B_z$ the anisotropy $\lambda$ is tuned continuously from $2.83$ to $1.6$. The practical limit on $\lambda$ in our present apparatus arises because of the noise created by the amplifier driving the z-coils which induces Zeeman substate changing transitions for large amplitudes of $B_z$. This limit may be overcome to create a spherical trap ($\lambda=1$) as described in [@hodby], which also gives more details of the technique. We calibrated the trap by measuring the centre of mass oscillations of a thermal cloud for various amplitudes of $B_z$. The measured frequencies agree to better than $1\%$ with a theoretical prediction obtained by numerically time-averaging the field in Eq.\[topfield\], i.e. integrating over one complete TOP cycle. Note that the radial trap frequency remains approximately constant whereas the axial frequency decreases as the amplitude $B_z$ increases. The trap frequencies for this experiment were $126$ Hz radially and the axial frequencies varied from $356$ Hz at $B_z/B_r=0$ ($\lambda=\sqrt 8$) to $194$ Hz at $B_z/B_r=2.3$ ($\lambda=1.6$). Once the trap had been calibrated we investigated the behavior of the $m=0$ mode for various anisotropies. To excite the $m=0$ low-lying mode, the TOP-field amplitude $B_r$ was modulated sinusoidally at a frequency of $225$ Hz (matching the hydrodynamic mode frequency in a $126$ Hz radial trap with $B_z=0$) for a period of $8$ cycles ($35$ ms). Note that the actual measured mode frequency for the above trap parameters differs from $225$ Hz because the finite number of atoms leads to deviations from the hydrodynamic limit. Also, the change of mode frequency with trap anisotropy (see Fig.\[resonance2\]a) means that the driving frequency does not exactly match the hydrodynamic mode frequency for traps with anisotropies different from $2.83$ (the value for $B_z=0$), but it is close enough to excite the fundamental mode for all our measurements. After being excited the condensate was left to oscillate for variable times of between $2$ to $30$ ms before the magnetic trap was switched off and the condensate allowed to expand freely for $12$ ms to make a time-of-flight (TOF) measurement. Then absorption images were taken of the condensate from which we extracted both the radial and axial widths and the total number of atoms in the condensate (typically $2\times 10^4$). The radial TOP field produced an $8\%$ modulation of the trap spring constant and we measured response amplitudes of around $20\%$ in TOF. These correspond to even smaller amplitudes of oscillation for the condensate before expansion which produce no measurable frequency shift in the ordinary TOP trap (for $\lambda=2.83$ the nonlinear coupling $\delta$ for the $m=0$ mode is close to zero, see Fig.\[resonance2\]b). Even for strong driving and large response amplitudes no significant frequency shift of the $m=0$ mode from the zero amplitude limit has been observed before [@jin2]. The anisotropy of our trap was tuned across the resonance between the low and the high-lying $m=0$ mode. We observed the occurrence of the second harmonic frequency when we tuned our trap close to resonance (Fig.\[data\]b) and on resonance it was the dominant component (Fig.\[data\]c). It arises from the excitation due to nonlinear coupling of the $m=0$ high-lying mode and could only be observed in the oscillations of the axial width. The radial width oscillated at a single frequency corresponding to the $m=0$ low-lying mode and did not have a second frequency component (Fig.\[data\]d,e). This is also what we found in simulations based on the hydrodynamic equations and indicates that the geometries of the low and high-lying modes are such that the excitation of the high-lying mode can only be observed by measuring the axial widths. We obtained the low-lying mode frequency from a single frequency fit to the radial oscillations and also from a two frequency fit to the axial oscillations and found good agreement between the two values (exponential decay factors were included in both fits). The frequency of the second harmonic (corresponding to the high-lying mode) was obtained as the second frequency component in the fit along the axial direction. We found that the fundamental frequency was strongly suppressed on resonance in both the radial and axial oscillations as shown in Fig.\[data\]c,f. This indicates that the low-lying mode is not populated anymore and all the energy of the excitation has been transferred to the high-lying mode [@morgan]. The large error for the point at resonance ($\lambda=1.93$) in Fig.\[freq\] reflects the difficulty in obtaining the fundamental component from the data in Fig.\[data\]c. The frequencies of the fundamental mode for various trap geometries were normalized by the corresponding radial trap frequency and plotted as a function of the trap anisotropy parameter $\lambda$ in Fig.\[freq\]a. The dotted line is the prediction of the small amplitude mode frequencies in the hydrodynamic limit as given in [@stringari]. The solid line was calculated by Hutchinson [@hutchinson2] from the GP equation for the atomic number and trap frequencies of our experiment. Figure \[freq\]a shows that the measured mode frequency is above the hydrodynamic prediction for the ordinary TOP trap with $\lambda=2.83$ in agreement with previous experiments [@jin]. Far from resonance the data agree very well with the finite number prediction (solid line). However, when approaching the resonance from above the nonlinear coupling becomes large enough to shift the mode frequency below the predicted curve. On the lower ($\lambda<1.95$) side of the resonance the frequency shift becomes positive in agreement with the predicition illustrated in Fig.\[resonance2\]b. One can see that the measured frequency shifts follow a dispersive curve which crosses zero at $\lambda=1.93\pm 0.02$, in good agreement with the prediction of $\lambda=1.95$ for the hydrodynamic regime [@dalfovo]. Figure \[freq\]b shows a plot of the ratio of the squared amplitudes (higher to lower-lying mode) which is proportional to the ratio of the mode energies. Away from resonance we observed no second harmonic contribution and the ratio (and its error) is taken as zero. These data have been fitted by a simple Lorentzian centered at $\lambda=1.94\pm 0.02$ with HWHM$=0.035\pm 0.005$. The damping rates are plotted against the anisotropy $\lambda$ in Fig. \[freq\]c. They were around $20 s^{-1}$ for the fundamental and $50 s^{-1}$ for the second harmonic frequency. In conclusion, we have a TOP trap in which the anisotropy can be tuned whilst keeping the trap frequencies high [@ensher]. This offers the opportunity to investigate a range of interesting phenomena in Bose-Einstein condensates related to the trap geometry, in particular the greatly enhanced nonlinear effects for certain anisotropy parameters $\lambda$. We observed the generation of the second harmonics of the $m=0$ low-lying mode frequency as well as a dispersive resonance in the mode frequency at $\lambda=1.93\pm 0.02$. Future improvements and modifications of our experiment will allow us to study another predicted resonance at $\lambda=1.5$ as well as additional nonlinear phenomena such as the collapse and revival of oscillations and the onset of chaos for stronger driving amplitude [@salasnich]. A particularly interesting case is the spherical trap ($\lambda=1$) where all frequencies are degenerate. Quantitative theoretical predictions have been made for the damping rates in a spherical trap [@sphere] which can be compared with the experiment to provide a stringent test. We would like to thank all the members of the Oxford theoretical BEC group, in particular D. Hutchinson for providing the theoretical prediction, K. Burnett, M. Davis, S. Morgan and M. Rusch for their help and many useful discussions. This work was supported by the EPSRC and the TMR program (No. ERB FMRX-CT96-0002). O.M. Maragò acknowledges the support of a Marie Curie Fellowship, TMR program (No. ERB FMBI-CT98-3077). M.H. Anderson [*et al.*]{}, Science [**269**]{}, 198 (1995); K.B. Davis [*et al.*]{}, Phys. Rev. Lett. [**75**]{}, 3969 (1995). For a review see Bose-Einstein Condensation in Atomic Gases, Proceedings of the International School of Physics “Enrico Fermi”, edited by M. Inguscio, S. Stringari and C.E. Wieman, (IOS Press, Amsterdam, 1999). D. S. Jin, J.R. Ensher, M.R. Matthews, C.E. Wieman and E. A. Cornell, Phys. Rev. Lett. [**77**]{}, 420 (1996); M.O. Mewes, M.R. Andrews, N.J. van Druten, D.M. Kurn, C.G. Townsend and W. Ketterle, Phys. Rev. Lett. [**77**]{}, 988 (1996) D.S. Jin, M.R. Matthews,J.R. Ensher, C.E. Wieman and E. A. Cornell, Phys. Rev. Lett. [**78**]{}, 764 (1997) D.A.W. Hutchinson, R.J. Dodd, and K. Burnett, Phys. Rev. Lett. [**81**]{}, 2198 (1998) L.P. Pitaevskii and S. Stringari, Phys. Lett. A [**235**]{}, 398 (1997); P.O. Fedichev, G.V. Shlapnykov, and J.T.M. Walraven, Phys. Rev. Lett. [**80**]{}, 2269 (1998); S. Stringari, Phys. Rev. Lett. [**77**]{}, 2360 (1996) M. Edwards, P.A. Ruprecht, K. Burnett, R.J. Dodd and C.W. Clark, Phys. Rev. Lett. [**77**]{}, 1671 (1996) F. Dalfovo, C. Minniti, and L.P. Pitaevskii, Phys. Rev. A [**56**]{}, 4855 (1997) The aspect ratio has been changed to become spherical by allowing the atoms to sag under gravity in a very weak trap. This is described in the PhD thesis of J.R. Ensher, University of Colorado, Boulder, (1998) J. Arlt, O. Maragò , E. Hodby, S.A. Hopkins, G. Hechenblaikner, S. Webster and C.J. Foot, J. Phys. B [**32**]{}, 5861 (1999) E. Hodby, G. Hechenblaikner, O. Maragò, J. Arlt, S. Hopkins and C.J. Foot, in preparation S.A. Morgan, S. Choi, and K. Burnett, Phys. Rev. A [**57**]{}, 3818 (1998) D.A.W. Hutchinson and E.Zaremba, Phys. Rev. A [**57**]{}, 1280 (1998) L. Salasnich, cond-mat/0001087 (2000) H. Guilleumes and L. P. Pitaevskii, Phys. Rev. A [**61**]{}, 013602 (2000); M. Rusch, private communication [^1]: Present address: SCOAP, CPES, University of Sussex, Falmer, Brighton BN1 9QH
This is ATHENA’s fifth annual Pre-IPMT workshop. Rudolf Steiner gave the fundamentals of Eurythmy Therapy (the Curative Eurythmy Course) to a group of young doctors during a medical course in April of 1921 with the hope and expectation that they would take up these indications and develop them further as part of their medical practice. These workshops are held in this spirit and are intended as a forum for collaborative research and sharing between medical professionals and eurythmy therapists. The hope is to both broaden the exposure and deepen the understanding of TE and how it can be applied with patients. As a spiritual-corporeal process Therapeutic Eurythmy (TE) can access the formative forces which issue out of the cosmos and work in our body and soul, to bring health and renewal. With the practice of TE the patient is asked to consciously participate in the healing process. What sound gestures and movement activities are helpful in working with women’s health issues? Why or how is this so? How do we bring these to the patient? And are there preventative measures or exercises offered through eurythmy therapy? This year we look forward to coming together to share our understanding of women’s health issues and to practice the applicable eurythmy gestures and exercises gained through our training and through the many years of experience carried by some of our colleagues. Our time together will be devoted to learning and experiencing the TE gestures and exercises - and the forces at work in and through them - in relation to the theme of women’s health. Click here for schedule and downloadable registration form. Registration deadline is April 20, 2019.
https://anthroposophicmedicine.org/event-3287734
PROBLEM TO BE SOLVED: To provide a method for purifying nucleic acids from a sample containing nucleic acids, and to provide kits for purifying the nucleic acids. SOLUTION: The present intimation relates to a method for purifying nucleic acids from a sample containing nucleic acids, the method comprising at least the following steps: a. bringing the sample containing nucleic acids into contact with a nucleic acid binding phase comprising protonatable groups, the protonatable groups having a pK value of 9 to 12; b. binding the nucleic acids to the nucleic acid phase at a pH (binding pH) that is at least one pH unit less than the pK value of at least one of the protonatable groups; c. eluting the nucleic acids at a pH greater than the binding pH but at least one pH unit less than the pK value of at least one of the protonatable groups. Also disclosed are corresponding kits and nucleic acid binding phases that can be used for purifying nucleic acids. COPYRIGHT: (C)2016,JPO&INPIT
Since our inception in 2005, Omega has strived to serve various industries with the most innovative and future-facing Human Resource solutions. We constantly evolve to ensure that we remain at the forefront of fit-for-purpose, customised solutions that will enable us to assist our clients achieve their goals. We do this by attracting and appointing qualified and experienced Wellness Crafters who live the Omega Drivers, not only at the office but in life. Our team is driven by: Originality: Omega People Solutions fosters an environment where our staff can be innovative and creative. Mindfulness: Each team member is ever conscious and aware of the value and importance of People & Clients. Engagement: We acknowledge and respect each other’s uniqueness and continuously engage with one another to remain at the forefront of People Solutions. Gumption: Omega People are spirited, resourceful, and operate with tenacity. We dress up and show up! Agility: We are highly responsive to the changing workplace landscape, and we are adaptive meet our client’s People Wellness needs.
https://omegapeople.co.za/index.php/omega-drivers/
Figure 5.11 Rotors with Vertical Axes opposite sides. Near the axis, the blades overlap so that the redirected wind can flow from one blade to the other. The rotor blades also utilize the lift principle so that the efficiency of the Savonius rotor is little better than that of simple drag devices. However, the efficiency is much worse than that of good lift devices, reaching maximum power coefficients of the order of 0.25 (Hau, 2000). Savonius rotors have the advantage that they can start at very low wind speeds. They are therefore used for ventilation purposes on buildings or utility vehicles. Besides poor efficiency, Savonius rotors have the disadvantage of a high material demand. Thus, they are not used in large systems. The Darrieus rotor was developed by the Frenchman Georges Darrieus in 1929. The Darrieus rotor consists of two or three rotor blades that have the shape of a parabola. The profile of the rotor blades corresponds to lift devices so that the Darrieus rotor utilizes the lift principle. Due to its vertical axis the angle of attack at the Savonius rotor changes continuously. The efficiency of the Darrieus rotor is much above the efficiency of the Savonius rotor; however, it reaches efficiencies of only about 75 per cent of modern rotors with horizontal axes. A grave disadvantage of the Darrieus rotor is that is cannot start on its own: it always needs an auxiliary starting system that can be a drive motor or a coupled Savonius rotor. A further development of the Darrieus rotor is the H rotor or H-Darrieus rotor. This rotor is also called the Heidelberg rotor after the company Heidelberg Motor. A permanent-magnet generator is directly integrated into the rotor structure and needs no gearbox. The rotor works in the same way as the Darrieus rotor as a lift device. The three rotor blades of the H rotor are attached vertically. Supports to the vertical axis help the rotor maintain its shape. The very robust H rotor was designed for the extreme weather conditions existing in high mountains or in Antarctica. Wind power plants with vertical axes have some advantages. Their structure and their assembly are relatively simple. The electric generator and the gear as well as all electronic components can be placed on the ground. This simplifies the maintenance compared to rotors with horizontal axes. Rotors with vertical axes need not be oriented into the wind; therefore, they are perfectly suited for regions with very fast changes of wind direction. However, these advantages have not resulted in a breakthrough for wind generators with vertical axes. Today, almost all wind power plants use rotors with horizontal axes; systems with vertical axes are only used for very special applications. The poorer efficiency and higher material demand of systems with vertical axes have been the deciding factors for the market dominance achieved by horizontal axis turbines to date. Was this article helpful? Renewable energy is energy that is generated from sunlight, rain, tides, geothermal heat and wind. These sources are naturally and constantly replenished, which is why they are deemed as renewable. The usage of renewable energy sources is very important when considering the sustainability of the existing energy usage of the world. While there is currently an abundance of non-renewable energy sources, such as nuclear fuels, these energy sources are depleting. In addition to being a non-renewable supply, the non-renewable energy sources release emissions into the air, which has an adverse effect on the environment. How to make woodpellets?
https://www.freeenergyplanet.biz/renewable-energy-systems/wind-turbine-design.html
Excitement is gathering pace for the Derby City Triathlon on Sunday 6th September at Moorways swimming pool and athletics track. The event will include swimming, cycling and running events at different levels - making it suitable for novices and experienced triathletes as well as a junior event for eight to 14-year-old competitors. The swim will take place in the 33m pool, then a bike route through the local area past the famous Rolls-Royce factories before an off road run which will finish on the athletics running track. The transition will be in the centre of the running track. There will be something for everyone including a Junior Triathlon (100m/2.5km bike/1km run) for 8 to 14 year olds, a Super Sprint (200m - 10km bike - 2.5km run) and Sprint Event (400m - 20 km bike - 5km run).
https://www.marketingderby.co.uk/news-library/2015/8/13/triathlon-fever-set-to-continue-in-derby
Topic: How does a leader set a sense of urgency for change in an organization? To improve things, change is introduced and learning makes it possible to make the change. Change is a process through which people and organizations move as they gradually learn, come to understand, and become skilled and competent in the use of new ways (Hall & Hord, 2015). Embracing change can be beneficial for organizations, especially since things in the world are constantly changing. Therefore, it is imperative for leaders to act as agents of change. Change Agent is defined as an individual whose “job is to engage with the user system and prospective adopters to introduce and encourage adoption of the innovation” (Hall & Hord, 2015). In simpler terms, an agent of change is an individual that that seeks to increase effectiveness within an organization. From my experience, most staff members are resistant to consistent change. It, also, makes it more difficult when the consistent change is mandated. Teamwork and collaboration are huge factors that contributes to the success of the company. When the staff are included in the decision making process, it makes the transition more comfortable. “Leadership is a set of processes involving creating a vision of the future and a strategy for getting there” (Kotter, 2010). In regards to establishing a sense of urgency, change one of John Kotter’s 8 Stages of Organizational Change, details the significance of motivating staff to change (Hall & Hord, 2018). As there cannot be a leader without followers, leadership involves interpersonal influence. The leader has the ability to motivate others to get involved with achieving a common goal. Leadership involves the leader being goal directed and action oriented. Therefore, leaders play an active role in groups and organization by using influence to guide others through a certain course of action. It is the leader that sets the tone of the work environment. When the leader embraces and encourages change, the staff will follow suit. Hall, G. E. & Hord, S. M. (2015). Implementing change: Patterns, principles, and potholes (4th ed.). Upper Saddle River, NJ: Prentice- Hall. Kotter, J. (2013). The Key Differences Between Leading and Managing. Retrieved from https://www.youtube.com/watch?v=SEfgCqnMl5E&list=PLRA49gaKoVqOdc28ycg8rgTOC6tNoxKP0&index=12) CLASSMATE 2 Change is inevitable and must occur (David & David, 2017). Businesses cannot remain the same as competitors are constantly shifting their practices to improve productivity and customer satisfaction. It is imperative that leaders do not become complacent. Being complacent can hinder the organization from growing, expanding, and increasing productivity. Leaders must consider having competitive rates, excellent customer service, deals, etc. to stay in competition with others. Leaders and employees want to envision change as something positive that than an anxious event or a pessimistic way (David & David, 2017). Organizations must be able to recognize the urgency for the need to change. Kotter 8 step model for leading change discusses leaders creating a sense of urgency. Kotter and Cohen (2012) mentioned that creating a sense of urgency will require leaders to make bold or risky decisions. Leaders in the position must be okay with making difficult decisions even if others in the organization do not approve of it, as long as it benefits the whole organization. Leaders can create a sense of urgency by recognizing that change needs to occur within the organization. Once the leader realizes that change needs to occur, it is important for leaders to assess what needs to change. Leaders want to ensure that they prepare efficiently and effectively for the change that needs to occur. Communicating the change to the team will be a vital step in ensuring that the change is implemented accurately. Once the change is implemented, it will also be important to track the progression of that change and whether the organization is improving or deteriorating from the change. It is always vital to assess the needs of the organization, for things change, and sometimes change quickly. Leaders want to ensure that they are aware of what is needed to generate effective productivity and overall job satisfaction. As mentioned above, change is inevitable; therefore, leaders want to be aware of when a change needs to occur, how often it occurs, and the outcome of the occurrence. David, F. R., & David, F. R. (2017). Strategic Management: A Competitive Advantage Approach. Florence: Pearson. Kotter, J. P., and Cohen, D. S. (2012). Leading Change. Boston, M.A., Harvard Business School Press. The post CLASSMATE 1 Discussion 8 Topic: How does a leader set a sense of urgency for cha appeared first on Essaybrook.
https://openbooks.link/2020/10/13/classmate-1discussion-8topic-how-does-a-leader-set-a-sense-of-urgency-for-cha/
Developed for use in middle and high school classrooms, Mission US engages students in the study of transformational moments in American history. Each mission consists of an interactive game and a set of curriculum materials that are aligned to national standards and feature document-based activities. The game immerses players in rich, historical settings and then empowers them to make choices that illuminate how ordinary people experienced the past. The Educator's Guide provides a wealth of resources and activities for both teachers and students, including primary source documents that show the broader social, political and economic context of events and perspectives featured in the game. The goals of Mission US are to help students: - Learn how Americans struggled to realize the ideals of liberty and equality. - Understand the role of ordinary men and women, including young people, in history. - Develop historical empathy. - Build understanding and critical perception to think like an historian. Serious Gaming Mission US is part of a growing body of "serious games" that immerse users in historical and contemporary problems in ways that encourage perspective-taking, discussion and weighing of multiple kinds of evidence. Research has shown that, by assuming the roles of peers from the past, students develop a more personal, memorable and meaningful connection with complex historical content and context. Missions - “For Crown or Colony?” puts players in the shoes of Nat Wheeler, a printer’s apprentice in 1770 Boston. They encounter both Patriots and Loyalists, and when rising tensions result in the Boston Massacre, they must choose where their loyalties lie. - In “Flight to Freedom,” players take on the role of Lucy, a 14-year-old enslaved in Kentucky. As they navigate her escape and journey to Ohio, they discover that life in the “free” North is dangerous and difficult. In 1850, the Fugitive Slave Act threatens all African Americans in the North and brings new urgency to the anti-slavery movement. - In “A Cheyenne Odyssey,” players become Little Fox, a Northern Cheyenne boy whose life is changed by the encroachment of white settlers, railroads and U.S. military expeditions. As buffalo diminish and the U.S. expands westward, players experience the Cheyenne's persistence through conflict and national transformation. - In “City of Immigrants,” players navigate New York’s Lower East Side as Lena, a young Jewish immigrant from Russia. Trying to save money to bring her parents to America, she works long hours in a factory for little money and gets caught up in the growing labor movement. - In “Up from the Dust,” players take on the roles of twins Frank and Ginny Dunn, whose family wheat farm is devastated by the Great Depression and Dust Bowl. As they experience the hardships of the 1930s, players learn about Americans’ strategies for survival – as individuals, communities and a nation. “Up from the Dust” is available online and for the iPad.
http://www.iowapbs.org/education/story/27927/immerse-your-students-us-history-mission-us
In the UK, the benefits of flexible working, for both employees and employers, have been widely advocated. Is there a link between flexible working practices and firm performance? Data suggests there has been an increase in the offering of flexible working options to employees in Britain, and that similar schemes have been introduced across Europe. A systematic review of the academic research showed that a clear link between flexible working arrangements and organisational performance is yet to be established. In fact, a large empirical study of firms in the UK, France, Germany and the USA concluded that there was no direct link between flexible working practices and firm performance. This study investigates the links between flexible working, organisational commitment and performance-related outcomes (labour productivity, product or service quality, absenteeism and labour turnover). The focus is on working arrangements that allow employees to exercise their preferences with regards to when and where they work. Employee and workplace data from the Workplace Employment Survey of 2004, which is a representative sample of British workplaces with five or more employees, is used. Both the provision of a flexible working arrangement and the perception of access are analysed. Results suggest a range of impacts. Employees' perceptions of being able to work flexitime, from home or compressed weeks are positively associated with workforce commitment, but only the latter is positively related to labour productivity and quality. This link with quality is mediated by workforce commitment, as expected in a gift-exchange context. Allowing employees flexibility of working hours and a compressed week may lead to higher product or service quality, but may not increase commitment. Overall, a policy of allowing work from home appears to be the most attractive arrangement for the employer, as it is positively associated with workforce commitment and may have positive effects on organisational performance. This research was first presented at the Economic Modelling Network in 2010 and is currently being developed for a journal release. The full paper can be accessed via the link below.
https://www.cass.city.ac.uk/faculties-and-research/research/cass-knowledge/2013/january/can-a-gift-exchange-model-explain-a-potential-link-between-flexible-working-and-organisational-performance
1205023 views – YouTube Do strawberries grow well in pots? Strawberries are a great choice to fill your pots, planters, hanging baskets, or maybe even window boxes. The plants are compact and the berries hang beautifully off of the edge of the container. How deep do containers need to be for strawberries? Tips for Growing Strawberries In Pots Choose a pot that’s at least 6″ deep with a drainage hole. Strawberries need well-drained soil, so this is another good reason to use one of the lightweight pot fillers I mentioned earlier. How many strawberries can I plant in a container? Your strawberry plants need to be spaced at least 2 ft apart, so only plant 1 or 2 plants per container. Remember, these plants like to spread out as they grow, so give them plenty of room. Do strawberries like full sun? Planting and caring for young plants. Strawberries require sun to produce fruit. Ten or more hours of sunlight each day is ideal,but they need a minimum of six hours of direct sunlight each day. … Keep the plants moist and cool, and plant them as soon as possible. How long does it take for a strawberry plant to produce fruit? Generally, strawberry plants do take about a year to really begin producing good fruit. Do strawberries grow better in pots or ground? Growing strawberries in the ground is easiest for long-term, perennial growing. While you can grow in containers, it may shorten the lifespan of the plant. Window boxes, flower bags, and hanging baskets are fine for a single growing season. You can also overwinter containers to continue growing in spring. How do strawberries grow for beginners? How To Grow Strawberries – For Beginners! – YouTube How long do strawberry plants last in pots? A bed of strawberries usually lasts up to four years if planted into well-drained, fertile soil that is free from troublesome weeds. To avoid disease build-up, choose a different plot and replant strawberries every three years. What is the best container for growing strawberries? The best pots for strawberries are those which are urn-shaped, punctuated with holes down the sides in variable areas. Even though the holes make the pot look like dirt, water or even the plant may fall out of them, these pots are perfect for growing strawberries in containers. Do strawberries come back every year? Strawberries are perennials — they go through a period of dormancy in the winter and return each spring ready to go again. … Virtually every planting zone is conducive for growing strawberry plants at least a few months out of the year. How often should I water a strawberry plant? Watering. Strawberry plants need regular water to thrive, especially during fruit bearing season, when they need an average of 1-2 inches of water daily. The best way to water strawberries is to use drip or soaker hose placed at least two inches away from the plant. Do strawberries grow in shade? Can strawberries grow in shade? Strawberry lovers with shaded yards rejoice because, yes, you can grow strawberries in shade, provided you select shady strawberry varieties. What is the best way to plant strawberries? How to Grow Strawberries from Planting to Harvest – YouTube Do strawberries need a trellis? The fruit of climbing strawberry plants is typically much smaller than other varieties. … These strawberries grow well in the ground as well as in hanging baskets and containers. However, because of the longer vines, ground-planted climbing strawberries require a trellis to keep the fruit and foliage off of the ground. How many times a year do strawberries fruit? They are classified into early, mid-season and late varieties. Everbearing strawberries produce three periods of flowers and fruit during the spring, summer and fall. Everbearers do not produce many runners. Day neutral strawberries will produce fruit throughout the growing season. Can you plant strawberries indoors? You can plant your indoor berries any time of year. No need to wait for the normal growing season. Without the benefit of bees and other pollinators, however, you may have to pollinate your strawberries by hand. How long does a strawberry plant live? Under ideal conditions, a strawberry plant can live up to 5-6 years. After 3 productive years, however, they usually begin to lose vigor, and the production of strawberries begins to decline rapidly. Can strawberry plants survive winter in pots? Container-grown strawberries benefit from a little winter protection. One of the best ways is to place the container in a bigger container and then insulate the space between with leaves or straw. You can also place the container on the ground next to a heated wall and ideally out of the winter wind. How do you care for potted strawberry plants? The trick to growing strawberries in containers is to avoid both dryness and sogginess. That is accomplished by watering with less water several times a day in the heat of the summer. The soil should stay just-damp, never dry. Also, make sure that your chosen container will drain adequately. Do strawberries grow best in sun or shade? Strawberries need at least 8 hours of full sun each day, and they prefer slightly acidic soil with a pH between 5.5 and 6.8. Is it easy to grow strawberries at home? The best thing about strawberries is that they’re very easy to grow in almost all climates and soils across the United States and Canada—as long as you plant them in a location that gets full sun. Strawberry plants come in three types: June-bearing varieties bear fruit all at once, usually over a period of three weeks. What month is best to plant strawberries? Strawberries are best planted in the spring, as early as several weeks before the last frost date. By selecting a range of strawberry varieties you can spread your harvest from late spring through to early fall. Where is the best place to plant strawberry plants? When planting strawberries, choose a spot with full sun. In warm regions, try to provide morning sun with some shade protection during the hottest part of the day. Soil should have excellent drainage. Do potted strawberries come back? As long as you take proper care of them, they will come back. You should not have to replant them. The number of berries you get depends on the amount of nutrients the strawberry plants get. … If they are in good soil with appropriate water, they will produce just about as well as any other planting modality. What do I do with my strawberry plants in winter? To winterize strawberry plants, heap a loose mulch over plants to a depth of 3 to 5 inches. Use a material that won’t compact heavily. Good choices include straw, clean hay, bark chips, chopped cornstalks or cobs, evergreen branches or pine straw. What do you put under strawberry plants? The best mulches for strawberry plants are plastic, straw and pine needles. Do strawberries need deep soil? Strawberries only need about 4-6 inches of soil for their roots so shallow containers will work. Whatever size or shape container you use, make sure they have adequate drainage holes in the bottom. Water your strawberry plants whenever the soil is dry to ½ inch depth. Can you overwater strawberries? Strawberry plants don’t tolerate wet feet, and too much water can damage the plants quickly. However, too little water is just as harmful, as excessively dry soil stresses the plants and results in reduced growth and decreased yield. Why my strawberries are dying? Dying Strawberry plants is usually because of under watering. If the soil is not consistently moist whilst the strawberry plant’s roots are establishing the leaves lose too much moisture, which causes wilting and brown leaves resulting in a dying strawberry plant. Can strawberries grow in partial sun? Strawberry plants don’t do well in full shade, but so long as they receive at least six hours of direct sunlight per day they will grow in areas of partial shade. … Strawberries planted in partial shade should be planted in early spring to ensure that they get sufficient sunlight while growing in late spring and summer. Can strawberries grow in hot weather? He narrated that what he did was to expose the strawberry plant to the heat of the sun in varying duration until he was able to create shoots that withstand and thrive under the heat of the sun. … How many hours of light do strawberries need indoors? Strawberries do best with plenty of light. 12 to 16 hours per day are recommended for growing indoors with Bulbo lights. Are strawberries hard to grow? Strawberries have a reputation for being hard to grow and requiring lots of space. … But strawberries don’t require lots of room to grow and in fact, they can thrive in small pots and planters sited on a deck or patio. You don’t need large raised beds or a farmer to grow them successfully in your yard. Do strawberries grow well in hanging baskets? You can also grow strawberries in a hanging basket – it will not only look great, but will provide you with rich pickings of fresh fruit over several weeks, and all for just a few pounds. Choose your varieties carefully and you can have fruit from June until early autumn – find out how to enjoy strawberries all summer. Will strawberries grow up a fence? The plants grow horizontally in each rain gutter, but you can mount several planters to a fence or building to create a vertical growing system. … Plant strawberry transplants every 12 inches, tuck runners into the soil as they develop or clip them to reduce overcrowding. How do you grow strawberries upside down? How to Plant Strawberries in a Topsy Turvy : Garden Space – YouTube How many strawberry plants do I need for a family of 4? Planting For a Family of Four To grow enough berries — 20 pounds — to feed a typical family of four, the Louisiana State University Extension office recommends planting a 15-foot row of strawberries. With June-bearing plants grown in a matted-row system and spaced 18 inches apart, you will need 10 plants. How long do strawberries take to sprout? Press the seeds into the surface but do not cover them, because in addition to cold stratification, strawberry seeds require light to germinate. Seeds will germinate in one to six weeks. Six weeks after the seeds germinate, transplant them into bigger, individual pots. Can I plant strawberries in March? The ideal time for planting cold-stored runners is from March to July – these plants will fruit around 60 days after planting. … For the best results, bare-rooted strawberries must be planted so that the ‘crowns’ (the base of the plants from which the leaves appear) are at (or just above) ground level.
https://tchaise.com/2023/03/10/how-plant-strawberries-in-pots/
As if the threat of flooding weren’t bad enough, scientists warn that droughts may become more commonplace too Although water covers 70% of our planet’s surface, only 3% of it is fresh water – and two-thirds of that is frozen in glaciers or otherwise unusable. This means that 1.1 billion people across the world lack access to water and some 2.7 billion people find it hard to gain access to water for at least one month a year. If things stay the same, the situation is only going to get worse. It has been estimated that two-thirds of the world’s population could face water shortages by 2025. The threat of shortages doesn’t just apply to individuals, though. Didier Bélot, Swiss Re Corporate Solutions head of innovative risk solutions APAC, says droughts and a general lack of water have caused interruptions to business operations in the past, and will continue to do so. “Given the large population in Asia, periods of drought or high temperature have major repercussions for clients in agricultural and energy sectors and beyond,” he says. “For example, a major soda drinks producer lost a lucrative operating licence in India because of a serious water shortage in 2004.” A sportswear provider temporarily shut down four factories in Thailand following the country’s severe flooding in 2008, adds Bélot, “and the company remains concerned about rising droughts in regions that produce cotton”. As well as a growing population putting pressure on global water supplies, the combined effect of climate change and global warming is adding further strain to an already stressed water system. Climate change expert Dr Chris Brierley, of University College London’s Environmental Change Research Centre, says an Earth made warmer by greenhouse gases will produce a climate more prone to extreme weather events. This in turns leads to increasing incidences of drought and flooding. He explains that as the temperature of the atmosphere rises, air particles have a greater capacity for storing water, leading to increased evaporation in drier areas and more intense rainfall in wetter regions. “A warmer atmosphere has the potential for holding more water vapour in it,” he says. “The big consequences for Asia are going to be related to this feature of the warmer atmosphere. “When it is going to rain, it is going to rain more heavily. Places that are wet are going to get wetter and, because of the evaporative e ect, places that are characteristically more dry in the current climate are going to get drier.” Brierley argues that the marked change this is going to cause will be bad news for risk managers and businesses operating in the region. “If you have slow changes in average patterns, then you can imagine adapting to them, but if you have a situation where when it is going to rain, it rains stronger, that’s where you start having more extreme rainfall events and more extreme flooding events and, on the converse, more extreme drought events where it is dry,” he says. “We are probably going to get fewer storms in total, but those that do come are going to be more intense and the total amount of damage is going to go up.” If, as he predicts, rainfall will become more intense as climate change takes hold, other, knock-on effects will become apparent. “Even if you have the same amount of rainfall, but it falls in a more rapid event, then you are going to be much more likely to have flash-flooding than a gentle percolation of water down into the soil,” he says. “So that changes the longevity of the rainfall you are getting.” FOOTPRINT REDUCTION However, steps can be taken to mitigate the risk of water shortages. Besides reducing those emissions that are causing climate change and warming the Earth, the World Energy Council says that businesses need to reassess their operations’ water footprint and come up with new, more water-friendly methods of production, particularly in the energy sector. “To mitigate resource constraints, it will be necessary to further reduce the amount of water needed for energy production,” states its World Energy Perspectives 2016 report. “Early analysis indicates that the overall water footprint of the energy sector could be lowered if more power or heat were produced by renewables such as wind, photovoltaics, or natural gas, as they show comparatively low water usage.” And if other business sectors also take steps to reduce their reliance on water in their manufacturing and other operations, risk managers will be able to prepare for a world where, even if water shortages do occur, their business will be able to continue largely unhindered by the changing water supply.
https://www.strategicrisk-asiapacific.com/just-how-serious-is-water-risk/1423639.article
Modulation of substrate specificity of the DnaK chaperone by alteration of a hydrophobic arch. Hsp70 chaperones assist protein folding by reversible interaction with extended hydrophobic segments of substrate polypeptides. We investigated the contribution of three structural elements of the substrate- binding cavity of the Escherichia coli homologue, DnaK, to substrate specificity by investigating mutant DnaK proteins for binding to cellulose-bound peptides. Deletion of the C-terminal subdomain (Delta539-638) and blockage of the access to the hydrophobic pocket in the substrate-binding cavity (V436F) did not change the specificity, although the latter exchange reduced the affinity to all peptides investigated. Mutations (A429W, M404A/A429W) that affect the formation of a hydrophobic arch spanning over the bound substrate disfavored DnaK binding, especially to peptides with short stretches of consecutive hydrophobic residues flanked by acidic residues, while binding to most other peptides remained unchanged. The arch thus contributes to the substrate specificity of DnaK. This finding is of particular interest, since of all the residues of the substrate-binding cavity that contact bound substrate, only the arch-forming residues show significant variation within the Hsp70 family.
Magna Medika is a medical journal of APKKM contains papers and scientific articles created as a form of realization Tridharma college. The journal is published every six months, February and August of three sections in the form of: - Research article - Case report - Literature review The scope of this journal is all the field of medicine such as: - Internal medicine (including Pulmonary medicine and cardiovascular medicine) - Surgery (including urology, orthopaedic and traumatologic, plastic surgery, neurosurgery) - Anesthesia and Emergency Medicine - Neurology - Dermatology - Obstetric and Gynecologic - Forensic and Medicolegal - Clinical Pathology - Anatomical Pathology - Psychiatric - Ophthalmology - Otolaryngology - Pediatric - Radiology - Microbiology and parasitology - Basic Science of Medicine (including biochemistry, physiology, anatomy and Histology) - Public health and Health Management - Medical Education - Islamic Medicine Magna Medika has already registered in LIPI and has ISSN as follows: p-ISSN: 2407-0505 e-ISSN: 2774-2318 Section Policies Articles |Open Submissions||Indexed||Peer Reviewed| Review |Open Submissions||Indexed||Peer Reviewed| Case Report |Open Submissions||Indexed||Peer Reviewed| Peer Review Process All manuscripts submitted to this journal must follow focus and scope, and author guidelines of this journal. The submitted manuscripts must address scientific merit or novelty appropriate to the focus and scope. All manuscripts must be free from plagiarism contents. All authors are suggested to use plagiarism detection software to do the similarity checking. Editors check the plagiarism detection of articles in this journal by using a Turnitin software. The research article submitted to this journal will be double blind reviewed at least 2 (two) or more expert reviewers. The reviewers give scientific valuable comments improving the contents of the manuscript. Final decision of articles acceptance will be made by Editors according to reviewers comments. Publication of accepted articles including the sequence of published articles will be made by Editor in Chief by considering sequence of accepted date and geographical distribution of authors as well as thematic issue. Type of Decision There are four types of editorial decisions during the peer review process, which are: Decline submission | Resubmit for review | Revison Required | Accept submission Decline submission Following peer review, the paper is judged not to be acceptable for publication in Magna Medika and resubmission is not possible. Resubmit for Review The submitted version of the paper is not acceptable and requires major revision, but there is clear potential in the work, and Magna Medika is prepared to consider a new version. Authors are offered the opportunity to resubmit their paper as a new submission. Concerns will remain regarding the suitability of the paper for publication until the editors are convinced by the authors that their paper fits the scope and standards of Magna Medika. The resubmitted manuscript will be returned to the original associate editor if at all possible. Revision Required The paper requires changes before a final decision can be made. Authors are asked to modify their manuscript in light of comments received from referees and editors and to submit a new version for consideration within 2 weeks of receiving the decision letter. A point-by-point explanation of how comments have been addressed must be supplied with the revised version of the paper. Revisions may undergo further peer review and papers may undergo more than one round of revision. If the authors do not revise their papers to the satisfaction of the editors, the paper can still be declined from publication in Magna Medika. Accept submission The paper is accepted for publication, subject to conditions that need to be addressed in producing a final version of the manuscript. These may include sub-editing changes and the minor amendment to ensure the paper fully matches our criteria. After final checking in the editorial office, acceptance is confirmed and the paper is forwarded to the publishers for publication. Galley proof Page proofs will be sent to the corresponding author for final checking. Corrections to the proofs must be restricted to printer’s errors: any other changes to the text, in equations or grammar, may be charged to the author. Proofs should be returned to the editors within three days of receipt to minimize the risk of the author’s contribution having to be held over to a later issue. The editors do not accept responsibility for the correctness of published content. It is the author’s responsibility to check the content at the proof stage. Magna Medika Editorial and publishing process Magna Medika follow the editorial and publishing process set by PKP, as presented in the following figure. Publication Frequency Magna Medika will be published two times a year at the end of February and August yearly Open Access Policy This journal provides immediate open access to its content on the principle that making research freely available to the public supports a greater global exchange of knowledge. Benefits of open access for the author, include: - Free access for all users worldwide - Increased visibility and readership - Rapid publication - No spatial constraints Archiving Digital Preservation Policy Deposit Policy The pre-print, post-print, and publisher's version/PDF can be archived under the following conditions. As soon as the MAGNA MEDIKA: Berkala Ilmiah Kedokteran dan Kesehatan has published an article, the version of the article that has been submitted, accepted for publication, and the printed version can be used for a variety of scholarly or academic purposes under Attribution-Non Comercial-Share Alike 4.0 International (CC BY-NC-SA 4.0). Author(s) may deposit and use the document as follows: - on the personal website - on the company or institutional repository - on subject repositories - with individuals requesting personal use for teaching and training within the author's institution, and as part of an author's grant applications or theses/doctorate submissions. Authors may post the version of the article that was submitted to the journal (pre-print) to the above resources, at any time. Please make sure that you consult our policies on the website to prevent any disputes or doubts. Archiving The MAGNA MEDIKA: Berkala Ilmiah Kedokteran dan Kesehatan stores back issues and current articles following LOCKSS's idea of keeping lots of copies of our items on several servers to keep them safe (LOCKSS system has permission to collect, preserve, and serve this Archival Unit). Our Archives are stored and digitally submitted to Indonesian National Library's Indonesia One Search, Internet Archive and periodically harvested by the BASE, Crossref, OCLC WorldCat, and Dimensions. The MAGNA MEDIKA: Berkala Ilmiah Kedokteran dan Kesehatan also implementing the PKP Private LOCKSS Network (PLN) preservation function (A list of journal issues preserved in the PKP PN). The MAGNA MEDIKA: Berkala Ilmiah Kedokteran dan Kesehatan allows authors to deposit the pre-print, post-print, and published PDF version, as stated in the Deposit Policy section. For further information about the Magna Medika: Berkala Ilmiah Kedokteran dan Kesehatan journal digital preservation policy, please contact. Plagiarism Policy All manuscripts must be free from plagiarism contents. All authors are suggested to use plagiarism detection software to do the similarity checking. Editors check the plagiarism detection of articles in this journal by using a Turnitin software. Maximum threshold of similarity check is 20%. If the plagiarism check is over 20%, the manuscript will be rejected. The author must paraphrase at first then resubmit. Article Proccessing Charge Payment By not overlooking the Magna Medika copyright ownership and the legal formal aspect of the journal, any article published in this open access journal can be downloaded for free. No payment is charged. References Management Every article submitted to Magna Medika shall use reference management software e.g. Mendeley or Zotero. Publication Ethics Statement Magna Medika (p-ISSN: 2407-0505; e-ISSN: 2774-2318) is a peer-reviewed journal published by Universitas Muhammadiyah Semarang that committed to upholding the highest standards of publication ethics and takes all possible measures against publication malpractice. This statement clarifies ethical behavior of all parties involved in the act of publishing an article in this journal, including the author, the editor in chief, editorial board, reviewer and publisher. This statement is based on COPE’s Best Practice Guidelines for Journal Editors. Our responsibility is to publish original work of value to the intellectual community in the best possible form and to the highest possible standards. We expect similar standards from our reviewers and authors. Honesty, originality, and fair dealing on the part of authors, and fairness, objectivity, and confidentiality on the part of editors and reviewers are among the critical values that enable us to achieve our goal. Magna Medika is committed to following best practices on ethical matters, errors, and retractions, and to provide a legal review if necessary. Duties of Editor Publication Decisions The editors of Magna Medika ensure that all submitted manuscripts being considered for publication undergo peer-review by at least two reviewers who are experts in the field. The Editor in chief is responsible for deciding which of the manuscripts submitted to the journal will be published, based on the validation of the work in question, its importance to researchers and readers, the reviewers’ comments, and such legal requirements as are currently in force regarding libel, copyright infringement and plagiarism. The Editor may confer with other editors or reviewers in making this decision. Fair Play Editors evaluate submitted manuscripts exclusively on the basis of their academic merit (importance, originality, study’s validity, clarity) and its relevance to the journal’s scope, without regard to the authors’ race, gender, sexual orientation, ethnic origin, citizenship, religious belief, political philosophy or institutional affiliation. Decisions to edit and publish are not determined by the policies of governments or any other agencies outside of the journal itself. The Editor in chief has full authority over the entire editorial content of the journal and the timing of publication of that content. Confidentiality The editors and any editorial staff must not disclose any information about a submitted manuscript to anyone other than the corresponding author, reviewers, potential reviewers, other editorial advisers, and the publisher, as appropriate. Disclosure and conflicts of interest The Editors will not use unpublished information disclosed in a submitted manuscript for their own research purposes without the authors’ explicit written consent. Privileged information or ideas obtained by editors as a result of handling the manuscript will be kept confidential and not used for their personal advantage. Editors will recuse themselves from considering manuscripts in which they have conflicts of interest resulting from competitive, collaborative, or other relationships/connections with any of the authors, companies or institutions connected to the papers; instead, they will ask another member of the editorial board to handle the manuscript. Management of unethical behavior (s) The editors, together with the publisher(s), should take rationally responsive measures when ethical complaints have been presented regarding a submitted manuscript or published article. Every reported act of unethical publishing behavior will be looked into, even if it is discovered years after publication. Duties of Authors Reporting Standards Authors of original research should present an accurate account of the work performed and the results, followed by an objective discussion of the significance of the work. The manuscript should contain sufficient detail and references to permit others to replicate the work. Review articles should be accurate, objective and comprehensive, while editorial ‘opinion’ or perspective pieces should be clearly identified as such. Fraudulent or knowingly inaccurate statements constitute unethical behavior and are unacceptable. Data access and retention Authors are asked to provide the raw data in connection with a paper for editorial review, and should be prepared to provide public access, and should, in any event, be prepared to retain such data for a reasonable time after publication. Originality and plagiarism The authors should ensure that they have written entirely original works, and if the authors have used the work and/or words of others, that this has been appropriately cited or quoted. Plagiarism takes many forms, from 'passing off' another's paper as the author's own paper, to copying or paraphrasing substantial parts of another's paper (without attribution), to claiming results from research conducted by others. Plagiarism in all its forms constitutes unethical publishing behavior and is unacceptable. We will check each manuscript using a turnitin to ensure the originality of the article. Furthermore, each submitted article should be accompanied by a letter of statement from the author(s) stating that the article is free from plagiarism. Multiple, redundant or concurrent publication Papers describing essentially the same research should not be published in more than one journal or primary publication. Hence, authors should not submit for consideration a manuscript that has already been published in another journal. Submission of a manuscript concurrently to more than one journal is unethical publishing behavior and unacceptable. Acknowledgment of sources Authors should ensure that they have properly acknowledged the work of others, and should also cite publications that have been influential in determining the nature of the reported work. Information obtained privately (from the conversation, correspondence or discussion with third parties) must not be used or reported without explicit, written permission from the source. Authors should not use information obtained in the course of providing confidential services, such as refereeing manuscripts or grant applications unless they have obtained the explicit written permission of the author(s) of the work involved in these services. Authorship of the paper Authorship should be limited to those who have made a significant contribution to the conception, design, execution, or interpretation of the reported study. All those who have made significant contributions should be listed as co-authors. Where there are others who have participated in certain substantive aspects of the research project, they should be acknowledged or listed as contributors. The corresponding author should ensure that all co-authors have seen and approved the final version of the paper and have agreed to its submission for publication. Fundamental errors in published works When an author discovers a significant error or inaccuracy in his/her own published work, it is the author's obligation to promptly notify the journal editor or publisher and cooperate with the editor to retract or correct the paper. If the editor or the publisher learns from a third party that a published work contains a significant error, it is the obligation of the author to promptly retract or correct the paper or provide evidence to the editor of the correctness of the original paper. Hazards and human or animal subjects If the work involves chemicals, procedures, or equipment that have any unusual hazards inherent in their use, the author must clearly identify these in the manuscript. If the work involves the use of animal or human subjects, the author should ensure that the manuscript contains a statement that all procedures were performed in compliance with relevant laws and institutional guidelines and that the appropriate institutional committee(s) has approved them. The authors should include a statement in the manuscript that informed consent was obtained for experimentation with human subjects. The privacy rights of human subjects must always be observed. For human subjects, the author should ensure that the work described has been carried out in accordance with The Code of Ethics of the World Medical Association (Declaration of Helsinki) for experiments involving humans; and The Code of Ethics of the WMA (Declaration of Helsinki) for animal subject in biomedical research. Declaration of competing interests All authors should disclose in their manuscript any financial and personal relationships with other people or organizations that could be viewed as inappropriately influencing (bias) their work. All sources of financial support for the conduct of the research and/or preparation of the article should be disclosed, as should the role of the sponsor(s), if any, in study design; in the collection, analysis and interpretation of data; in the writing of the report; and in the decision to submit the article for publication. If the funding source(s) had no such involvement then this should be stated. The author must declare competing interests in the manuscript/paper template. Image integrity It is not acceptable to enhance, obscure, move, remove, or introduce a specific feature within an image. Adjustments of brightness, contrast, or color balance are acceptable if and as long as they do not obscure or eliminate any information present in the original. Manipulating images for improved clarity is accepted, but manipulation for other purposes could be seen as scientific ethical abuse and will be dealt with accordingly. Authors should comply with any specific policy for graphical images applied by the relevant journal, e.g. providing the original images as supplementary material with the article, or depositing these in a suitable repository. Duties of Reviewers Contribution to Editorial Decisions Peer review assists the editor in making editorial decisions and through the editorial communications with the author may also assist the author in improving the paper. Promptness Any selected referee who feels unqualified to review the research reported in a manuscript or knows that its prompt review will be impossible should notify the editor and excuse himself from the review process. Confidentiality Any manuscripts received for review must be treated as confidential documents. They must not be shown to or discussed with others except as authorized by the editor. Standards of Objectivity Reviews should be conducted objectively. Personal criticism of the author is inappropriate. Referees should express their views clearly with supporting arguments. Acknowledgment of sources Reviewers should identify relevant published work that has not been cited by the authors. Any statement that an observation, derivation, or argument had been previously reported should be accompanied by the relevant citation. A reviewer should also call to the editor's attention any substantial similarity or overlap between the manuscript under consideration and any other published paper of which they have personal knowledge. Disclosure and Conflict of Interest Privileged information or ideas obtained through peer review must be kept confidential and not used for personal advantage. Reviewers should not consider manuscripts in which they have conflicts of interest resulting from competitive, collaborative, or other relationships or connections with any of the authors, companies, or institutions connected to the papers. Direct link to: Manuscript Readiness Level (MRL) Before you submit your manuscript, it is highly recommended for you to pre-evaluate it using Manuscript Readiness Level (MRL), an instrument that we developed to help you get effective time of peer-reviewing process. Pre-Evaluation Criteria Strong (Level 1) Fair (level 2) Poor (level 3) Title: Straightforward, informative, and represents the contents of the article. 5 3 2 Abstract: Concise but at least contain the problem, purpose, method, important findings, and implications of the research. 10 5 2 Keywords: Searchable by search engine, truly represents the intention of research. Don’t use phrases, only words. 5 to 6 keyword is recommended. 5 3 2 Introduction: Directing the reader about the importance of the research. Presenting significant problems, a clear state of the art, gap analysis, and novel concepts to fill the gaps. End it with the purpose of research. 15 10 5 Method: Clear and replicable. Reveals how research objectives are achieved with the appropriate tools, procedures, and stages. 10 5 2 Results: Presenting experimental or survey data, or any other kind of data depending on the type of research. The results are generally presented in clear and readable tables and figures. 15 10 5 Discussion: Meaningful. Good discussion is written as a dialogue that reveals the progress of the research in comparison to previous researches. 20 15 5 Conclusion: Contains a summary of research results (the most important research finding) that relates with the objectives written in the introduction. 10 4 1 References: Accountable, about 80% of the literatures from primary sources (reputable journals) and up to date (last 10 years). Use reference management tools. 10 5 1 Total score 100 60 25 Decision matrix Score Probability 85-100 Most likely to be published with little discussion with Editor/Reviewer 70-84 Possible minor revision (if there are no mistakes in principle) 50-69 Possible major revision 25-49 Most likely to be rejected in the first stage Disclaimer: The Manuscript Readiness Level (MRL) above is used by authors as a “tool” to optimize peer-reviewing process. The decision to accept or reject an article for publication in Magna Medika is the authority of Editor based on recommendations from reviewers.
https://jurnal.unimus.ac.id/index.php/APKKM/about/editorialPolicies
Learn about safe, pure & cost effective onsite H2 generation Nel is a global, dedicated hydrogen company, delivering optimal solutions to produce, store, and distribute hydrogen from renewable energy. We serve industries, energy, and gas companies with leading hydrogen technology. Our roots date back to 1927, and since then, we have had a proud history of development and continuous improvement of hydrogen technologies. Today, our solutions cover the entire value chain: from hydrogen production technologies to hydrogen fueling stations, enabling industries to transition to green hydrogen, and providing fuel cell electric vehicles with the same fast fueling and long range as fossil-fueled vehicles – without the emissions.
https://expo.asminternational.org/HT2021/Public/eBooth.aspx?IndexInList=58&FromPage=Exhibitors.aspx&ParentBoothID=&ListByBooth=true&BoothID=117547&Nav=False
After a brief safety speech, we will shove off the dock and head into the scenic Charleston Harbor. As we raise the sails and turn the engine off, you'll immediately feel the relaxation set in and discover why the sailboat is named Mental Heeling. You'll be involved as much (or as little) as you prefer as we navigate the Harbor together. Tacking and gybing our way to the various landmarks including: Fort Sumter, The Battery, USS Yorktown, Castle Pinckney and the iconic Ravenel Bridge. Guests under the age of 13 will be required to wear a life jacket per the US Coast Guard. I will have adult and child life jackets onboard. Your host Jay Captain Jay After being laid off from the Financial Industry in 2009 during the "Great Recession" I decided to migrate south and trade spreadsheets for sailing. In 2014, I purchased my 1988 30ft Catalina MKII and named her Mental Heeling as that is what she does best. Come out and see one of the most beautiful cities as it was meant to be seen, from the water. Instagram: @MentalHeeling Captain Jennifer Jen loves sharing the history and ecological wonders that make the Lowcountry the special place that it is. Captain Trey: Swim coach to sailing captain What's included Drinks Water Of age guests are welcome to bring alcoholic beverages (please avoid glass) Guests are welcome to bring their own snack Guest photos Guest reviews 4.97 Navigation section for review pages Where you'll be While visiting Charleston, it's a must to see this beautiful city from the water and under sail on Mental Heeling, a 1988 30ft Catalina MKII. Views include Fort Sumter, Castle Pinckney, The Ravenel Bridge, USS Yorktown and Historic Charleston Battery Availability Guest safety Outdoor activities carry risks, and you may be exposed to dangerous situations as part of this experience. Make sure you can participate safely given your abilities and the conditions (such as location, weather, and equipment). Things to keep in mind Cancellation policy Any experience can be canceled and fully refunded within 24 hours of purchase, or at least 7 days before the experience starts. Communication policy Always communicate through Airbnb. To protect your payment, never transfer money or communicate outside of the Airbnb website or app. Guest requirements Up to 6 guests ages 3 and up can attend. No experience necessary. Guests are welcome to be involved as much or as little as they would like. Government ID You’ll need to take a picture of yourself that matches the photo on your ID. This is so Airbnb can confirm who’s actually going on the experience. You’ll only have to do this once. More tips You will receive a Welcome Message via Airbnb messenger upon booking, PLEASE READ! Booking Tip- book early in your visit in case we need to reschedule due to weather. You can bring any snacks/drinks that you would like. Adults 21+ may bring alcohol. **Please avoid bringing any glass** Airbnb Experiences are vetted for quality Airbnb Experiences are vetted for quality - Local experts Led by locals who love where they’re from and what they do. - Small groups With intimate group sizes, you’ll never get lost in the crowd. - High standards Every experience is reviewed for unique access.
https://www.airbnb.com/experiences/407135?location=Charleston%2C%20SC&currentTab=experience_tab&federatedSearchId=01ce5bca-c8a0-46a2-8507-dcd03c3de3b9&searchId=c484b49b-5a2f-e9ca-495b-5656da107ea4&sectionId=b04f0c30-c559-42a8-8dcc-ed479a0f9420&source=p2
Computer consists of a set of hardwares and softwares. A computer system can be viewed as a combination of input, processing and output subsystems. Input –> Process –> Output Hardware examples: - Keyboard - Monitor - Mouse, etc. Software examples: - Operating system - Computer games - Antivirus, etc. Case The computer case comtains most of the computer components. Power supply A power supply unit converts alternating current (AC) electric power to low-voltage DC power for the internal components of the computer. Motherboard The motherboard is a large rectangular board with integrated circuitry that connects the other parts of the computer including the CPU, RAM, disk drive as well as any peripherals connected via the ports or the expansion slots. CPU (Central Processing Unit) CPU performs most of the calculations which enable a computer to function, and is sometimes referred to as the “brain” of the computer. Fan CPU is cooled by a heat sink and fan. Chipset The Chipset, which includes the north bridge, mediates communication between the CPU and the other components of the system, including main memory. RAM (Random Access Memory) RAM stores the code and data that are being actively accessed by the CPU. ROM (Read Only Memory) ROM stores the BIOS that runs when the computer is powered on or otherwise begins execution, a process known as Bootstrapping, or “booting” or “booting up”. BIOS (Basic Input Output System) BIOS includes boot firmware and power management firmware. Buses Buses connect the CPU to various internal components and to expand cards for graphics and sound. CMOS battery CMOS battery is also attached to the motherboard. This battery powers the memory for date and time in the BIOS chip. Expansion cards Expansions cards can be used to obtain or expand on features not offered by the motherboard. Storage devices Storage devices, refers to computer components and recording media that save digital data. - Fixed storage device : Reside permanently on computers, like hard disk. - Removable storage device : USed to transfer data between computers, like USB flash drive. Input device Device which provide inputs to the computer. Input device includes keyboard, mouse, scanner, etc. Output device The device which display outputs of the computer. Output device includes printers, speakers, monitors, etc.
https://easyexamnotes.com/p/structure-of-desktop-computers.html
On July 15, 2021, the California Supreme Court released a ruling that will dramatically increase the potential liability of California employers for missed meals, rest and recovery breaks. InFerra v Loews Hollywood Hotel, LLC, the court unanimously ruled that employers must pay bonuses to employees for missed meals, rest and recovery breaks at the employees’ regular rate of pay instead of their basic hourly rate, as was done by many employers. The regular rate of pay may be higher than the base hourly rate because the regular rate of pay must include all non-discretionary incentive payments such as bonuses and commissions. Additionally, because the court ruling applies retroactively, the court created exposure for California employers who acted in good faith in trying to comply with the law by paying a premium at the base hourly rate. California employers should expect a new wave of class actions and Private Attorney General Act (PAGA) claims based on the ruling. Background Jessica Ferra was a bartender for Loews, who earned an hourly wage as well as non-discretionary quarterly incentive payments. Under Loewss’s Meals and Breaks Policy, hourly employees who do not receive a compliant meal or rest period are entitled to one hour of overtime pay based on their base hourly pay at the time of meal or rest period was not provided. Loews did not take into account non-discretionary payments (such as Quarterly Ferras Incentive Payments), which employees may have earned in addition to hourly wages, in calculating the bonus due under section 226.7 (c) of the California Labor Code. Ferra alleged that Lowes, by omitting non-discretionary incentive payments from her bonus calculation, failed to pay her for non-compliant meal or rest breaks in accordance with her regular rate of pay, as required by the section 226.7 (c). The trial court ruled in favor of Loews, and thecourt of appeal confirmed. The California Supreme Court overturned, finding that bonuses paid for break violations must be at the highest regular rate of pay, which must include an incentive pay calculation in its rate. Regular rate of pay for overtime California law provides that daily overtime rates are multiples of regular employee rates of pay. The overtime rate for workers who receive a guaranteed hourly rate and performance-based incentive bonuses or piecework rates considers these incentive payments to be part of their regular rates, making overtime pay higher than their basic hourly rate. The employee is therefore entitled to one and a half times his regular rate of pay for time worked over 8 hours in a day and double his regular rate of pay for time worked more than 12 hours in a day. The court explained that the reasoning behind the application of the regular rate of pay includes statements by the California legislatures that [t]he eight hour work day is the backbone of California workers’ protection, [n]Many studies have linked long working hours to increased accident and injury rates, and [f]Family life suffers when one or both parents are kept away from the home for an extended period of daily life. The court also noted that the higher overtime rate serves to deter employees from working overtime. Regular rate of pay California law also requires payment of a premium for violations of meals, rest and recovery breaks. If an employer does not provide an employee with a compliant meal, rest or recovery period, section 226.7 (c) [of the Labor Code] requires the employer to pay the employee one hour of overtime pay at the employee’s regular rate of pay. Loews argued for the application of the statutory interpretation canon according to which a legislator is presumed to want a different meaning when using different words in a legislative scheme. Since the legislature used the term regular rate of pay instead of regular rate of pay, many courts have found that the legislature intended bonuses to be paid at the basic hourly rate of pay. The California Supreme Court disagreed. The court applied a different principle of interpretation which provides that when laws use synonymous words or expressions interchangeably, those words or expressions must be understood as having the same meaning. The court concluded that the legislature and the courts had used the terms wages and compensation interchangeably, and therefore the court interpreted the intention of the legislatures to apply the same meaning to both terms. The court also identified several policy reasons for applying the regular rate of pay to bonus payments, including the fact that when [employees] are forced to work during breaks, [there are] increased risks of accidents at work and increased stress, and deprivation of free time from the control of the employer which is often necessary to be able to perform important personal tasks. The court also notes that [w]when interpreting the labor code and wage regulations, [the court] adopt[s] the construction which best meets the objective of protecting employees with regard to working conditions, wages and hours. Thus, the court liberally interprets[s] the Labor Code and wage ordinances to promote the protection of employees. Retroactive request The court concluded the opinion by stating that its decision applies retroactively, without being convinced by the potential exposure that such a determination presented to employers: Loews maintains that our decision will have a substantial effect as it will expose employers to millions of responsibilities. But Loews cites no evidence that applying retroactively to our participation will expose employers to millions of liabilities, and even if Loews was right, it is not clear why we should favor employers’ interests in avoiding millions of dollars. responsibilities rather than the interests of employees in obtaining the millions owed to them under the law. California employers can expect another deluge of class and class action lawsuits seeking legal and civil penalties for non-payment of meal, rest and recuperation break premiums at regular rates of pay. Key points to remember In light of the court ruling, California employers may consider taking the following steps: Update premium payment systems Employers may want to update their premium payment systems to pay meal, rest or payback premiums in accordance with the applicable regular rate of pay. Because bonus payments are often due before the incentive compensation earned is final and can be calculated, employers may want to develop a process for retroactive payment at the regular rate of pay for previously paid severance bonuses. Restitution payments Employers may want to pay compensation to employees who received bonuses in previous periods at the base rate only rather than the regular rate of pay, which can help avoid litigation costs, including legal penalties and civil, attorney’s fees and related costs. Incentive compensation programs Employers may find it helpful to modify or eliminate incentive compensation programs that unreasonably increase the administrative burden of having to perform retroactive adjustment calculations for premium payments. Waiver programs Employers may want to adopt a first and second meal break waiver program that allows employees to voluntarily forgo their first meal break for shifts of 6 hours or less, and their second meal breaks for longer shifts. 10 hours (but not more than 12 hours) long ,. Certification programs In light of the decision of the state’s highest courts, employers may wish to implement an attestation program whereby employees can confirm, on a regular basis, whether they have received opportunities that comply with the law to take meals, breaks and recovery breaks in a timely manner and duty free. During her current tenure, the California Supreme Court is also considering another case involving whether severance bonuses should be treated as wages that need to be accurately recorded on pay statements and are subject to penalties. of waiting time if not paid to employees who leave in a timely manner. based. Now more than ever, California employers may want to closely review their meal, rest, and recovery break policies and practices to avoid growing exposure to class and PAGA responsibility. LOS ANGELES, CA / ACCESSWIRE / June 24, 2020, / Compare-autoinsurance.Org has launched a new blog post that presents the main benefits of comparing multiple car insurance quotes. For more info and free online quotes, please visit https://compare-autoinsurance.Org/the-advantages-of-comparing-prices-with-car-insurance-quotes-online/ The modern society has numerous technological advantages. One important advantage is the speed at which information is sent and received. With the help of the internet, the shopping habits of many persons have drastically changed. The car insurance industry hasn't remained untouched by these changes. On the internet, drivers can compare insurance prices and find out which sellers have the best offers. View photos The advantages of comparing online car insurance quotes are the following: Online quotes can be obtained from anywhere and at any time. Unlike physical insurance agencies, websites don't have a specific schedule and they are available at any time. Drivers that have busy working schedules, can compare quotes from anywhere and at any time, even at midnight. Multiple choices. Almost all insurance providers, no matter if they are well-known brands or just local insurers, have an online presence. Online quotes will allow policyholders the chance to discover multiple insurance companies and check their prices. Drivers are no longer required to get quotes from just a few known insurance companies. Also, local and regional insurers can provide lower insurance rates for the same services. Accurate insurance estimates. Online quotes can only be accurate if the customers provide accurate and real info about their car models and driving history. Lying about past driving incidents can make the price estimates to be lower, but when dealing with an insurance company lying to them is useless. Usually, insurance companies will do research about a potential customer before granting him coverage. Online quotes can be sorted easily. Although drivers are recommended to not choose a policy just based on its price, drivers can easily sort quotes by insurance price. Using brokerage websites will allow drivers to get quotes from multiple insurers, thus making the comparison faster and easier. For additional info, money-saving tips, and free car insurance quotes, visit https://compare-autoinsurance.Org/ Compare-autoinsurance.Org is an online provider of life, home, health, and auto insurance quotes. This website is unique because it does not simply stick to one kind of insurance provider, but brings the clients the best deals from many different online insurance carriers. In this way, clients have access to offers from multiple carriers all in one place: this website. On this site, customers have access to quotes for insurance plans from various agencies, such as local or nationwide agencies, brand names insurance companies, etc. "Online quotes can easily help drivers obtain better car insurance deals. All they have to do is to complete an online form with accurate and real info, then compare prices", said Russell Rabichev, Marketing Director of Internet Marketing Company. CONTACT: Company Name: Internet Marketing CompanyPerson for contact Name: Gurgu CPhone Number: (818) 359-3898Email: [email protected]: https://compare-autoinsurance.Org/ SOURCE: Compare-autoinsurance.Org View source version on accesswire.Com:https://www.Accesswire.Com/595055/What-Are-The-Main-Benefits-Of-Comparing-Car-Insurance-Quotes-Online View photos
Health insurance providers are currently using artificial intelligence (AI) and machine learning to review medical records, optimize care for chronic conditions and identify risk. However, the precedent for leveraging AI for consumer experience has been somewhat limited. Join this session to learn how health insurance providers can leverage AI and a next-generation consumer experience platform to better understand their members’ needs, and strengthen their relationships with members in order to drive behavior change and improve health outcomes.
https://www.ahip.org/agenda_item/predict-member-intent-leverage-ai-and-next-generation-consumer-experience-technology-to-improve-member-engagement/
Trapp Family Lodge Main Dining Room Enjoy European-style cuisine in the Main Dining Room of the Trapp Family Lodge. Open for breakfast and dinner, this expansive, wood-paneled room offers a relaxed, gourmet dining experience complemented with attentive service and beautiful mountain views. Add in farm-to-table ingredients and you have the recipe for a deliciously fresh meal that you won’t soon forget. The perfect way to start your day is with breakfast in our Main Dining Room. In the morning, we serve a bounteous Vermont country breakfast with all the trimmings. In the evening, join us for a candlelit dinner with your special someone. Choose the perfect appetizers, entrees, and desserts from our exquisite menu and allow our sommelier to introduce you to our award-winning wine list.
https://gostowe.com/listing/trapp-family-lodge-main-dining-room/
Countries: Czechia praguego.com Prague's Jewish Quarter (Ghetto) Prague’s Jewish Quarter (“Židovské město” in Czech) is one of the most impressive places in the capital of the Czech Republic. Josefov, as the quarter is officially named, is at the same time beautiful and wrathful, due to its complicated history. It used to be the largest Jewish ghetto in Europe, and its Old Jewish Cemetery is the most remarkable of its kind on the continent. Many cities used to have – or still have – the so called “Jewish quarters”, where the Jewish minority lived. Apart from Prague, we can for example name Jerusalem, Seville, or New York. Those quarters were quite often in the form of ghettos. The Jewish quarter of Prague, since 1992 listed as a UNESCO World Heritage site, is definitely one of the most significant ones and if you are visiting Prague, you should definitely see it. Not only as a reminder of a tragic part of the world’s history, but also for its undeniable beauty and charm. Prague Map Museums Museums in Prague HistoricalSites HistoricalSites in Prague Have we missed one? You can add a new place, sight, landmark, attraction, things to see Explore more places related to this search: hrad-karlstejn.cz Karlstejn Castle Karlštejn Castle was founded in 1348 by the Charles IV, King of Bohemia and Holy Roman Emperor as his private residence and a place of safekeeping royal treasures, especially his collections of holy relics and the Imperial Crown Jewels. In 1355 Charles IV stayed here for the first time, overseeing the construction and decoration work, especially in chapels. The construction was completed in 1365 when the Chapel of the Holy Cross in the Great Tower was consecrated. Over the centuries the castle has always been in hands of the king or a state institution, never in private hands. Nowadays it is owned by the state. Very impressive is the preserved original stair-arrangement of individual castle buildings. The lower section with a small courtyard by the Well Tower and the Burgrave´s House continue through the majestic five-storey Imperial Palace and the Marian Tower. At the highest point, the construction of the castle culminates in a monumental, 60-meter-high Great Tower and its massive fortifications. A unique original 14th-century wall decoration, a set of 129 paintings created by Master Theodoric in the Chapel of the Holy Cross (the largest in the world), the largest portrait gallery of kings of Bohemia in the Czech Republic, a replica of the royal Crown of Bohemia, a unique castle well. The castle is also famous as a set to a comedy play Night at Karlštejn Castle by Czech poet Jaroslav Vrchlický. Karlstejn Map Architecture Architecture in Karlstejn HistoricalSites HistoricalSites in Karlstejn Castles Castles in Karlstejn waymarking.com Svata Hora Baroque complex Svatá Hora (Holy Hill), the prominent Marian pilgrimage site of Czech Lands with central Basilica of the Assumption of Virgin Mary, is also an outstanding cultural, architectonic and historic monument of the country. Pribram Map Architecture Architecture in Pribram Churches Churches in Pribram HistoricalSites HistoricalSites in Pribram destinace.kutnahora.cz The Cathedral of St Barbara The Cathedral of St Barbara, a jewel of the Late Gothic period and one of the four cathedral-type buildings in Bohemia, was incribed on the UNESCO World Heritage List together with the Cathedral of the Assumption of Our Lady and St John the Baptist and the historical centre of Kutná Hora. Kutna Hora Map Architecture Architecture in Kutna Hora Temples Temples in Kutna Hora Churches Churches in Kutna Hora HistoricalSites HistoricalSites in Kutna Hora destinace.kutnahora.cz Dacicky House Dačický House, located on a sloping square in sight of the Stone Fountain, is a unique exhibit in itself. At its core is a pre-Hussite house, which was generously reconstructed after 1500 for the Utraquist bishop Filip de Villanuova, and was the birthplace of the chronicler Mikuláš Dačický of Heslov in the mid-16th century. Kutna Hora Map Architecture Architecture in Kutna Hora ArtandCulture ArtandCulture in Kutna Hora HistoricalSites HistoricalSites in Kutna Hora destinace.kutnahora.cz Kutna Hora Tyl Municipal Theatre This historical building is, as its name suggests, associated with Josef Kajetán Tyl, an important figure of Czech theatre and the National Revival movement. J. K. Tyl, a native of Kutná Hora, was the first person to publicly formulate the idea to build an independent theatre in Kutná Hora for the then Tyl Amateur Theatre Company, which was based in Kutná Hora and of which Tyl was himself a member. Kutna Hora Map Architecture Architecture in Kutna Hora Theaters Theaters in Kutna Hora ArtandCulture ArtandCulture in Kutna Hora HistoricalSites HistoricalSites in Kutna Hora czechtourism.com Chateau Breznice Originally a water keep, converted in the 16th century into a Renaissance chateau. A renaissance garden, a herb garden, and an English park surround the buildings. Pribram Map ParksandGardens ParksandGardens in Pribram Architecture Architecture in Pribram HistoricalSites HistoricalSites in Pribram plzen.eu Republic square Pilsen's main square of the Republic is dominated by the beautiful Gothic cathedral of St. Bartholomew with the highest church tower in the Czech Republic. You will find many beautiful historic houses, lots of cafes and restaurants. During the year there are dozens of cultural events, festivals and festivals. Plzen Map ParksandGardens ParksandGardens in Plzen Architecture Architecture in Plzen Markets Markets in Plzen Churches Churches in Plzen ArtandCulture ArtandCulture in Plzen HistoricalSites HistoricalSites in Plzen kralovehradecko-info.cz Hradek u Nechanic Castle Near the Hrádek village, the Hrádek u Nechanic Castle was built between 1839 and 1857 on so-called Lubenský hill. It was built as a prestige summer residence of the county family of Harrach by František Arnošt, the count of Harrach, an important representative of the Jilemnice family line. Hradec Kralove Map Architecture Architecture in Hradec Kralove HistoricalSites HistoricalSites in Hradec Kralove telc.eu Rostejn Castle Castle was built in the first half of the 14th century. In the 1570s Zacharias of Hradec carried out a major reconstruction and ordered two enclosures for deer nearby. From 17th century to beginning of the 20th century it was used as a hunting castle. Telc Map Architecture Architecture in Telc HistoricalSites HistoricalSites in Telc telc.eu House of Telc The Telč´ House on the square of Zacharias from Hradec 31. The permanent exhibition about history and legends of Telč and surroundings. Telc Map Architecture Architecture in Telc HistoricalSites HistoricalSites in Telc en.inbudejovice.cz Black tower The Renaissance tower originally served as a watchtower and belfry. The building structure is 71.9 m tall and holds 5 bells and a clockwork. Once you conquer 225 stairs (height of 45 m) you will be rewarded with a strikingly beautiful view of České Budějovice and the surroundings. Ceske Budejovice Map Architecture Architecture in Ceske Budejovice HistoricalSites HistoricalSites in Ceske Budejovice zamek-ceskykrumlov.cz Castle Museum & Castle Tower The new Castle Museum exhibition was opened in 2011 by the National Heritage Institute. Museum visitors have a unique opportunity to peek into the secrets of the castle depositories relating to the most important events connected with the Rožmberk, Eggenberk and Schwarzenberg owners of the Krumlov estate. Entry to the Castle Museum exhibition is individual, without a guide but with the option to rent an audioguide. This rounded six-storied tower, surrounded by the residential palace of the Little Castle, is situated on a narrow rocky promontory towering above Latrán and the Vltava River between the Ist and IInd Courtyard of Český Krumlov Castle. The origins of this structure are partly Gothic and partly Renaissance, as is evident from the tower's external appearance. The tower as well as the Little Castle is a segment of a structure dating from the first half of the 13th century. Castle Tower The oldest part of it is the groundfloor and first floor. The origin of the second floor is around the 14th century, while the third floor is part of the Renaissance belfry. We can not eliminate the Gothic origin, however, due to the bell dated 1406. Under the architect Baldassare Maggi of Arogno, the castle was remodelled and converted from a plain Gothic palace into a Renaissance residence, and the tower was provided with an arcaded gallery at the top in 1581. In 1590 the tower was decorated with mural paintings and figural and architectural motifs by Bartoloměj Beránek - Jelínek. Castle Tower The Tower is the symbol of the town of Český Krumlov, of its history and beauty. It is "The towerest of all towers" as once characterised by Karel Čapek. The tower is publically accessible and offers a beautiful view over Krumlov and surroundings. Cesky Krumlov Map Museums Museums in Cesky Krumlov Architecture Architecture in Cesky Krumlov ArtandCulture ArtandCulture in Cesky Krumlov HistoricalSites HistoricalSites in Cesky Krumlov ckrumlov.info Cesky Krumlov State Castle Český Krumlov State Castle with its architectural standard, cultural tradition, and expanse ranks among the most important historic sights in the central European region. Originally Gothic castle from 13th century was enlarged in 14th century and it was rebuit in the Renaissance style in 16th century. Cesky Krumlov Map Architecture Architecture in Cesky Krumlov HistoricalSites HistoricalSites in Cesky Krumlov czechtourism.com Veveri Castle The castle was held in possession of various noblemen and its history is interwoven with a number of myths and legends. Today it is a venue of various cultural and social events. At the foot of the castle there is a steamboat stop. Brno Map Architecture Architecture in Brno ArtandCulture ArtandCulture in Brno HistoricalSites HistoricalSites in Brno Castles Castles in Brno czechtourism.com Znojmo Underground The Znojmo Underground extends over several levels and is one of the largest underground labyrinths in Central Europe. Decide whether you would rather take the traditional tour, which mainly introduces you to the history of the city, or have a spookier experience on a less traditional tour along an alternative route. Znojmo Map HistoricalSites HistoricalSites in Znojmo LearningCenters LearningCenters in Znojmo czechtourism.com Spilberk Castle A prison shrouded in horrific legends, valuable historical collections, a beautiful view over the city and many cultural events held throughout the year – all of this is Špilberk Castle. One of the two most important dominant features of the Moravian capital and a place which became synonymous with the most horrific of dungeons throughout the whole of Europe is nowadays one of the most valuable monuments in Brno. Špilberk’s importance and role changed fundamentally over the course of the centuries. This leading royal castle and seat of the Moravian margraves, gradually transformed into a monumental Baroque fortress, the toughest prison of the Austrian monarchy and later a military barracks. Nowadays it is home to Brno City Museum and one of the most important cultural centres in the city. Brno Map Museums Museums in Brno Architecture Architecture in Brno HistoricalSites HistoricalSites in Brno Castles Castles in Brno czechtourism.com Brno underground Proof of the fact that the Moravian capital still has its secrets, is the newly renovated Brno underground under Zelný trh. It was only recently that a tour route was opened here for the general public, which leads under the surface of one of the oldest squares in Brno. Brno Map Architecture Architecture in Brno HistoricalSites HistoricalSites in Brno czechtourism.com Moravian Museum The museum was created back in 1817 by means of an imperial decree by František I, and nowadays it contains over six million items. Take a closer look at prehistoric life in Pavilon Anthropos where you will see a life-size mammoth and all the things a prehistoric family had to face. Brno Map Museums Museums in Brno Architecture Architecture in Brno HistoricalSites HistoricalSites in Brno cottbus-tourismus.de Stiftung Fuerst Pueckler Museum Park und Schloss Branitz Visitors will only see original interior from the world and the era of Prince Pückler in Branitz Castle. While the library allows the visitors to familiarise themselves with his thinking, the Oriental rooms will take people on the great journey of the prince to the pyramids of Egypt. Cottbus Map Museums Museums in Cottbus Architecture Architecture in Cottbus HistoricalSites HistoricalSites in Cottbus routeperfect.com Schonbuhel Castle Overlooking the Danube from its scenic location, this 12C castle features a chapel, a 17C convent, and a relief of "The Last Supper." Krems Map Architecture Architecture in Krems HistoricalSites HistoricalSites in Krems krems.gv.at Krems old town Krems is one of the oldest cities in the land; the first documented reference to it dates to 995. Visitors to the city encounter a millenium of history at every step - on the streets and squares, in old monasteries and churches, in burgher houses and fortification structures. A stroll through Krems and Stein is always a rewarding experience - and a pleasurable one, with all the cafes, restaurants and heurige bidding passers-by to stop in and enjoy. Krems Map Architecture Architecture in Krems HistoricalSites HistoricalSites in Krems Shopping Shopping in Krems bayreuth-wilhelmine.de Eremitage - Old Palace Several kilometres outside the town, the Hermitage Palace, which later became known as the Old Palace, dominates the extensive park with its tree-covered slopes that rises above the Roter Main river. Bayreuth Map Museums Museums in Bayreuth Architecture Architecture in Bayreuth Palaces Palaces in Bayreuth HistoricalSites HistoricalSites in Bayreuth tourism.olomouc.eu Holy Trinity Column The Holy Trinity Column in Olomouc is the largest group of Baroque statues within a single sculptural monument in Central Europe. The column reaches a height of 35 metres and its lower part houses a chapel. The sculptural decoration is made of 18 stone sculptures of saints, 12 light-bearers and 6 relief busts of the apostles. The column is dominated by gilded copper sculptures of the Holy Trinity on the top and the Assumption of the Virgin beneath it. The larger-than-life figures are enveloped in light, airy drapery with lively expressions on their faces and corresponding gesticulations of their hands. The overall sculptural decoration has a natural and harmonious appearance without being exaggerated in the typically flamboyant and exaggerated Baroque mode. Olomouc Map Architecture Architecture in Olomouc HistoricalSites HistoricalSites in Olomouc Monuments Monuments in Olomouc tourism.olomouc.eu Olomouc castle You simply should not miss the Olomouc castle site situated on the Wenceslas Hill! Right here in 1306, the last Přemyslid, the Czech king Wenceslas III, was assassinated. You can admire the Bishop's Palace with its famous Romanesque windows, the gothic St. Wenceslas Cathedral, today the seat of the Archbishop of Olomouc, or the Archdiocesan Museum founded on the initiative of Pope John Paul II. Olomouc Map Museums Museums in Olomouc Architecture Architecture in Olomouc Churches Churches in Olomouc ArtandCulture ArtandCulture in Olomouc HistoricalSites HistoricalSites in Olomouc tourismus.regensburg.de The Stone Bridge A Wonder of the World: The Stone Bridge. The people of Regensburg were obviously brilliant bridge-builders way back in the 12th century. The “Bruckmandl” however, the little statue on the bridge, didn’t take up his breezy position there till the middle of the 16th century. Regensburg Map Architecture Architecture in Regensburg HistoricalSites HistoricalSites in Regensburg tourismus.regensburg.de Regensburg Old Town Hall Today, after numerous additions and alterations, you can admire the three-section building complex dating from the 13th century which consists of the Town Hall tower, the Gothic Imperial Chamber building and the baroque Town Hall. From 1663 to 1806 the Perpetual Imperial Assembly met in the Imperial Chamber. It was there that the well-known expressions “to put something on the long bench” (to postpone something) and “to sit at the green table” (to take important decisions) originated. Regensburg Map Architecture Architecture in Regensburg ArtandCulture ArtandCulture in Regensburg HistoricalSites HistoricalSites in Regensburg jenatourismus.de Historic Town Hall One of the oldest town halls in Germany and witness to the historical change in Jena. Admire the astronomical clock from the 15th century and "Schnapphans" (snatching Hans), one of the "Seven Wonders" of Jena. Jena Map Architecture Architecture in Jena HistoricalSites HistoricalSites in Jena visitworldheritage.com Goettweig Abbey The Göttweig Abbey is a treasure overlooking the Wachau from a hill covered by vineyards and forests. Often called the “Austrian Montecassino” because it is visible from great distances—a characteristic that provides epic panoramas when you visit. Göttweig Abbey was founded in 1083—although the current baroque building was constructed after a fire in the early 18th century. If you visit the abbey today you'll experience High Baroque in all its splendour. For example, the monumental imperial staircase with the ceiling fresco by Paul Troger from 1739 is one of the largest and most beautiful staircases of its kind in the world. The library and the archives of Göttweig Abbey house a huge trove of visual art and a comprehensive music collection. The abbey shows its art collections during special annual exhibitions staged in the adjoining royal and imperial rooms. The church houses the largest chimes of any church in Austria. To the south you'll find the highest elevated orchard of the famous Wachau apricot, with information on various aspects of the Wachau apricot. Krems Map Architecture Architecture in Krems ArtandCulture ArtandCulture in Krems HistoricalSites HistoricalSites in Krems ruineaggstein.at Aggstein Castle The history of the castle ruin which is around 150 metres long on the right bank of the Danube extends back to the 12th century. Find out why the “Rosengärtlein” (“Rose Garden”) was so feared and who the “Hounds of Kuenring” were. The castle which is around 150 metres long was built at the start of the 12th century. It is located on a rocky outcrop at a height of approx. 300 metres above the right bank of the Danube. At the time of the Kuenrings, the castle was successfully besieged and destroyed at least twice, which is why there are still only a few foundations from this time at the so-called “Bürgl” (or “little castle”). Special highlights are the escape-proof prison with the quaint name of “Rosengärtlein” or the chapel – a romantic place that can be still be used for weddings and christenings. Krems Map Architecture Architecture in Krems HistoricalSites HistoricalSites in Krems czechtourism.com Mikulov Castle One of the most picturesque castles in Moravia. The silhouette of this monumental castle in South Moravia is visible from afar. In its time it has played host to a number of important personalities, such as French Emperor Napoleon Bonaparte. Mikulov Map Architecture Architecture in Mikulov HistoricalSites HistoricalSites in Mikulov czechtourism.com Mikulov Historic Market Square The great fire of the original wooden houses in 1584 gave rise to Mikulov square in its present form. Part of the square, which is also the entrance to Mikulov Castle, is formed by houses with a Renaissance core and picturesque arcades. Probably the most interesting of the Renaissance buildings is the bourgeois Knights’ House (dům U Rytířů), which was created after the rebuilding of several Gothic buildings in the second half of the 16th century. At first glance, you can not overlook it on the square due to its sgraffito decoration with biblical and ancient scenes covering two-thirds of the house. The painting draws attention to the fact that it was originally a two-story house. Another feature of the square is the statue of the Holy Trinity, in addition to showing the Trinity it also displays angels that symbolize faith, hope and love. The column is complemented by statues of St. John of Nepomuk, St. Francis Xavier and Charles Borromeo, who were supposed to protect the inhabitants of the city from the plague. The Plague Column was built during the reign of the Dietrichsteins in 1724. Mikulov Map Architecture Architecture in Mikulov ArtandCulture ArtandCulture in Mikulov HistoricalSites HistoricalSites in Mikulov Monuments Monuments in Mikulov visitwroclaw.eu Wroclaw Old Town Hall Old Town Hall is a unique Gothic building in European architecture. It has 2 storeys, 3 parts with a rectangular building of the councils, which is attached to the northern wall and a square tower. Located in the city centre, it was being built for about 250 years (13 - 16th century). It used to serve as the seat of the city authorities and the court. The oldest part of the Town Hall was built ca. 1299 (according to the sources). This part is called consistorium (Latin: place of gatherings) and now belongs to the building. The consistorium has two parts: the underground hall covered with the ceiling and the Western tower. After buying the rights of the voyt, the meaning of the Council was much bigger. The growing number of the Council members demanded a new building. In the years 1328-1333, near the consistorium a new, smaller building was built - praetorium (Latin: the seat of the leaders). The building is the northern part of the Town Hall, near the square with the whipping post. Since the very beginning the Town Hall has witnessed many important historical events and has been a representative building where the authorities invited their honourable guests. This tradition is still alive. The most important world leaders, monarchs, clergy and artists have been invited into the Town Hall. In the cellar of the building there is one of the oldest restaurants in Europe - the legendary Piwnica Świdnicka. Wroclaw Map Architecture Architecture in Wroclaw HistoricalSites HistoricalSites in Wroclaw StreetViews StreetViews in Wroclaw austria.info Visit the town of Melk Taking the cruise ship from Kerms, you will end up at a charming town Melk. You can enjoy a walk around the town and admiring beautiful architecture. Melk is an Austrian town on the River Danube, west of Vienna. It’s known for the 11th-century Melk Abbey, a vast monastery built high above the town. No tour of monasteries in Austria, or Middle Europe, for that matter, would be complete without a visit to the magnificent Melk Abbey. Abbot Berthold Dietmayr and his architects Jakob Prandtauer and Joseph Munggenast left no stone unturned in their quest from 1701 to 1736 to construct a sacred palace upon the foundations of a medieval monastery. Krems Map Architecture Architecture in Krems HistoricalSites HistoricalSites in Krems
https://www.explorow.com/tag-city/historical_sites/27/prague/1487
The Arabic script developed as an artistic/calligraphic medium over a span of approximately 1000 years, from the sixth century of the current era to the sixteenth century of that era. From the humble beginnings of a writing system designed to record commercial data and occasional funerary inscriptions the Arabic script has developed and blossomed into a world renowned vehicle of artistic expression. With the writing down of the Koran and the beginning of the Islamic religious sciences the Arabic script necessarily began to become refined in order to fulfill the new needs to which it was subjected. The initial forms of the script, for example Hijazi, named for the Hijaz where the cities of Mecca and Medinah are located, had neither vowel markers nor markers to distinguish between letters of a similar shape, for example, the letters ba and ta. Following Hijazi, and the other early forms, is the Kufic form of the script, developed in Iraq during the eighth century of the current era, late second century of the Islamic era. Kufic rapidly developed markers for vowels and distinguishing like formed letters, and the first truly beautiful calligraphic examples of the Koran were created. In the Central and Eastern Islamic lands on one hand, and in North Africa on the other hand, Kufic followed diverging paths of development. In the West, Western Kufic developed into the Maghribi script used in Islamic Spain and North Africa, and which gave birth to the local West African scripts, commonly called Sudani, which are used there to write Arabic and local, African, languages until the present day. There are many fine examples of calligraphy using the Maghribi script, including large format Korans copied during the fourteenth and fifteenth centuries of the current era. In the Central and Eastern Islamic lands during the eleventh century of the current era Eastern Kufic developed into, and was replaced by, six major forms of the Arabic script. These are Naskh, Thuluth, Rayhanni, Muhaqqaq, Taliq and Riqah. All of these scripts are used at the present time and many, if not most, of the greatest monuments of Arabic calligraphy, whether pen on paper or engraving on stone, are written in one of these scripts. Naskh, Thuluth, Rayhanni and Muhaqqaq are all used for copying the Koran, Taliq and Riqah are rarely used. From the four Koranic scripts is derived Musahif, the book script, which has become the most commonly used script to copy the Koran. Riqah has become the modern cursive form of the Arabic script in daily use in the Central Islamic lands. In Ottoman Turkey, Iran and further East the Nastaliq form of the script is used for copying literary and secular works. This form of the Arabic script was developed in Iran based on a combining of forms of Naskh and Taliq. Its first great master was Sultan Ali Mashshadi who worked at the court of Sultan Husayn Bayqara, King of Herat, in the late fourteenth and early fifteenth century of the current era.. Nastaliq is used throughout the Eastern Islamic world, however, it is rarely used to copy the Koran.
https://www.wdl.org/en/curator-video/13/
--- author: - 'Andreas Vollmer ([email protected])' bibliography: - 'references.bib' title: 'Killing tensors in stationary and axially symmetric space-times' --- Abstract {#abstract .unnumbered} ======== We discuss the existence of Killing tensors for certain (physically motivated) stationary and axially symmetric vacuum space-times. We show nonexistence of a nontrivial Killing tensor for a Tomimatsu-Sato metric (up to valence 7), for a C-metric (up to valence 9) and for a Zipoy-Voorhees metric (up to valence 11). The results are obtained by mathematically completely rigorous, nontrivial computer algebra computations with a huge number of equations involved in the problem. Introduction {#sec:introduction} ============ Let $(M,g)$ be a 4-dimensional manifold with Lorentzian metric $g$ of signature (+,+,+,–). A *Killing tensor* of valence $d$ on $M$ is a symmetric tensor field $K$ whose symmetrized covariant derivative vanishes, $$\label{eqn:killing} \nabla_{(j}K_{i_1\dots i_d)}=0.$$ Here, $\nabla$ denotes the Levi-Civita connection of $g$ and the components $K_{i_1\dots i_d}$ smoothly depend on the position coordinates. The metric $g$ itself trivially is a Killing tensor of valence 2. Killing vectors with lowered indices are valence-1 Killing tensors. Given two Killing tensors, we can construct a new Killing tensor by forming their symmetrized product. Since Equation  is linear in the components of $K$, the linear combination of Killing tensors of the same valence is also a Killing tensor. Killing tensors correspond to first integrals of the geodesic flow that are homogeneous polynomials in the momenta: An integral of the geodesic flow is a function $I:{\ensuremath{T^\ast\!M}}\to{\ensuremath{\mathds{R}}}$ such that its Poisson bracket with the Hamiltonian $H:{\ensuremath{T^\ast\!M}}\to{\ensuremath{\mathds{R}}}$, $H=g^{ij}p_ip_j$, vanishes, [i.e.]{}$$\label{eqn:poisson} \{H,I\}=\sum_i \frac{\partial H}{\partial x^i}\frac{\partial I}{\partial p_i}-\frac{\partial H}{\partial p_i}\frac{\partial I}{\partial x^i} = 0.$$ It is well known that for a Killing tensor $K$ the function, $$\label{eqn:integral} I_K(x,p) = \sum K^{i_1\dots i_d}(x)\,p_{i_1}\cdots p_{i_d},$$ is an integral (here the $K^{i_1\dots i_d}$ denote components of a Killing tensor with raised indices). Two Killing tensors are in involution if their corresponding integrals commute [w.r.t.]{} the standard Poisson bracket on [$T^\ast\!M$]{}. The requirement is equivalent to a system of partial differential equations (PDEs) on the coefficients of $I$, [i.e.]{} on the $K^{i_1\dots i_d}$. These equations are coefficients of $\{I,H\}=0$ and therefore obviously polynomial in the momenta. Killing tensors appear in many contexts, [e.g.]{} in mechanics, mathematical relativity, integrability or differential geometry. In general relativity, the geodesic flow determines trajectories of free-falling particles. Integrals of the geodesic flow provide *constants of the motion* of such particles. Hamiltonian systems on 4-dimensional manifolds with four functionally independent integrals in involution are Liouville integrable. For such systems the orbits are restricted to tori (compact case) or cylinders, and the equations of motion can be solved by quadrature. It has recently been shown by Kruglikov & Matveev that a generic metric does not admit non-trivial Killing tensors [@kruglikov_generic_2015]. However, many examples in physics do admit nontrivial Killing tensors. Such examples are in some sense the most important ones, [e.g.]{} the classical Kepler problem. In the context of stationary and axially symmetric vacuum metrics, the most prominent example is the family of Kerr metrics. These metrics are used as a model for the space-time around rotating neutron stars and black holes. In particular, the Schwarzschild metric is the static limit of the Kerr family. A metric satisfies the *vacuum condition* if it is Ricci-flat, [i.e.]{} if its Ricci tensor vanishes. This requirement is a system of partial differential equations on the components of the metric. For our examples, this requirement is automatically satisfied. See [@vollmer_reducibility_2015] for a result on Killing tensors of valence 3 on arbitrary static and axially symmetric vacuum space-times. This reference makes explicit use of the vacuum condition. Physically, the vacuum condition ${\ensuremath{\mathrm{Ric}}}(g)=0$ is a fair assumption in the exterior region of stationary and axially symmetric astrophysical objects when we ignore electromagnetic fields. The present paper generally follows the method used by Kruglikov & Matveev in [@kruglikov_nonexistence_2011], which is based on an algorithm. We improve this algorithm and achieve considerably higher computational efficiency. The method can prove non-existence of nontrivial Killing tensors. In case there are additional Killing tensors, the method finds them. In our computations, we have to deal with up to more than 10,000 equations and unknowns, which necessitates the use of computer algebra. This has also been done in [@kruglikov_nonexistence_2011] where nonexistence of a nontrivial Killing tensor of valence up to 6 is proven for the Darmois metric (in [@kruglikov_nonexistence_2011] it is called the Zipoy-Voorhees metric with $\delta=2$). The reachable valence of the Killing tensors is, however, only restricted by computer strength. Our code is based on [@kruglikov_nonexistence_2011], but we employ additional tricks and achieve for the same metric a nonexistence proof up to valence 11. Note that our result on the Darmois metric does not follow from [@maciejewski_nonexistence_2013] where only analytic integrals are considered. See also Section \[sec:darmois\]. Moreover, we implement the method for the first time for a non-static metric. Specifically, we prove for a certain Tomimatsu-Sato metric that there are no additional Killing tensors up to valence 7. The paper is organized as follows. In Section \[sec:methods\], we give a description of the method we use. The algorithm is summarized on page . Then, in Section \[sec:examples\], examples are given to exemplify application of the method. We investigate a (non-static) Tomimatsu-Sato metric in Theorem \[thm:TS-7\], a Zipoy-Voorhees metric (the Darmois solution) in Theorem \[thm:ZV-11\] and a C-metric in Theorem \[thm:C-metric\]. As an example for a case of existence of a nontrivial Killing tensor, we discuss the Kerr metric in Section \[sec:kerr\]. Method {#sec:methods} ====== The general idea is classical and sometimes called Cartan-Kähler method or prolongation-projection method. It allows us to deal with a nontrivial overdetermined system of PDEs, say ${\ensuremath{\mathcal{S}}}$, by straightforward, but computationally challenging, algebraic calculations. Actually, the system ${\ensuremath{\mathcal{S}}}$ is linear in our cases, and therefore our computations are also linear-algebraic. The basic procedure is as follows. Consider the differential consequences of ${\ensuremath{\mathcal{S}}}$, [i.e.]{} differentiate the equations [w.r.t.]{} the independent coordinate variables. The system of equations resulting after $k$ differentiations is called the $k$-th *prolongation*. An overdetermined system ${\ensuremath{\mathcal{S}}}$ of PDEs is called *finite* or *of finite type* if highest derivatives of the unknowns can be expressed through lower derivatives after a finite number of differentiations. The existence of Killing tensors is equivalent to the existence of solutions for an overdetermined system of PDEs of finite type. Consider derivatives of the unknown functions (in our case the coefficients in $I$ and their derivatives) as new, independent *unknowns*. The equations are then algebraic equations on the unknowns. This algebraic system admits at least the solutions corresponding to solutions of the initial differential problem. Solving the algebraic problem therefore leads to an upper bound to the number of Killing tensors. Nonexistence of nontrivial Killing tensors is proven if this upper bound coincides with the number of trivial Killing tensors. In general, stationary and axially symmetric vacuum metrics can be written in so-called Lewis-Papapetrou coordinates $(x,y,\phi,t)$, $$\label{eqn:metric-sav} g_\text{SAV} = e^{2U}\,\left( e^{-2\gamma}\,\left(dx^2+dy^2\right) +x^2\,d\phi^2 \right) +e^{-2U}\,(dt+A\,d\phi)^2,$$ with three parametrizing functions $U(x,y)$, $\gamma(x,y)$ and $A(x,y)$. For the metrics in question, these parametrizing functions are fixed. In our examples, it is actually convenient not to use the coordinates of . Instead, we use slightly different coordinate choices, see Equations , and . All our coordinate choices have the following property: The coordinates are adapted to the obvious symmetries of the metric. We clearly see that the metrics are invariant under rotations $\phi\mapsto\phi+\phi_0$ and time translations $t\mapsto t+t_0$. These symmetries correspond to the Killing vectors $\partial_t$ and $\partial_\phi$. Consider level surfaces of the integrals $p_t$ and $p_\phi$ corresponding to the two Killing vectors $\partial_t$ and $\partial_\phi$, respectively. For regular values, these level surfaces are submanifolds. They are endowed with the coadjoint action of the symmetry group, and the quotient space $M_\text{red}$ is known as the symplectic quotient. It inherits a natural symplectic form and a Hamiltonian from the original manifold [@whittaker_treatise_1904; @marsden_lectures_1992]. The Hamiltonian on this *reduced* space is, however, inhomogeneous, and therefore the initial problem of finding Killing tensors turns into the problem of finding *inhomogeneous integrals* of the geodesic flow for a reduced Hamiltonian of the form $H=K_g+V$. The first term $K_g$ is called the *kinetic term* and corresponds to a Killing tensor on $M_\text{red}$. The function $V:M\to\mathds{R}$ is called the *potential*. The coordinates $x,y$ (and the respective momenta) are called *non-ignorable*, while $\phi,t$ ($p_\phi,p_t$) are called *ignorable* [@whittaker_treatise_1904; @carter_hamilton-jacobi_1968]. We are interested in functions $I:{\ensuremath{T^\ast\!M}}_\text{red}\to\mathds{R}$ such that the Poisson equation  for the Hamiltonian flow defined by $H$ is satisfied, [i.e.]{} such that $\{H,I\}=0$. This equation is an inhomogeneous polynomial in the momenta $(p_x,p_y)$. We introduce the following notion of parity for such polynomials: We say that the polynomial is of even (odd) parity if all its homogeneous components have even (odd) degree in the momenta $(p_x,p_y)$. Since $H$ is even in the momenta $(p_x,p_y)$, we can consider integrals $I$ of odd and even parity in these momenta separately, [cf.]{} [@kruglikov_nonexistence_2011; @hietarinta_direct_1987]. Considering homogeneous components of , one obtains a list of polynomial equations \[eqns:decomposition-ni-degree\] $$\begin{aligned} {\ensuremath{\mathcal{E}}}_0\, & & \{T,I^{\ensuremath{\text{($d$)}}}\} &= 0 \\ {\ensuremath{\mathcal{E}}}_1\, & & \{T,I^{\ensuremath{\text{($d-2$)}}}\} +\{V,I^{\ensuremath{\text{($d$)}}}\} &= 0 \\ \vdots\,\,\, & & &\hspace{-0.05cm}\dots \nonumber \\ \smash{\raisebox{-0.3cm}{${\ensuremath{\mathcal{E}}}_\text{fin}$}} & & \smash{\begin{array}{l} \null\\[\jot] \left\{\begin{array}{l} \{T,I^{\ensuremath{\text{($0$)}}}\} +\{V,I^{\ensuremath{\text{($2$)}}}\} \\[\jot] \{V,I^{\ensuremath{\text{($1$)}}}\} \end{array}\right. \end{array} } &= 0 \quad\text{(even parity branch)} \\ & & &= 0 \quad\text{(odd parity branch)}\end{aligned}$$ Here, we denote by $I^{\ensuremath{\text{($r$)}}}$ the homogeneous polynomial component of $I$ of degree $r$ [w.r.t.]{} the momenta $(p_x,p_y)$. The polynomials ${\ensuremath{\mathcal{E}}}_k$ can be further decomposed [w.r.t.]{} the *ignorable* momenta $p_\phi$ and $p_t$. We have two ignorable momenta, and thus we can decompose the $k$-th equation ${\ensuremath{\mathcal{E}}}_{k-1}$ into $2k-1$ new polynomial equations. We can consider every polynomial equation ${\ensuremath{\mathcal{E}}}_l$ as corresponding to a collection of equations provided by the coefficients [w.r.t.]{} $p_\phi$ and $p_t$. Denote these equations by ${\ensuremath{\mathcal{E}}}_l$ as well. We follow the Cartan-Kähler method as explained above. We differentiate each ${\ensuremath{\mathcal{E}}}_l$ [w.r.t.]{} $(x,y)$ and consider derivatives of the components $K^{i_1\dots i_d}$ of $I$ ([i.e.]{} the unknown functions) as new, independent unknowns. Since the metric is given explicitly in our examples, we obtain a linear-algebraic problem. The number of solutions of the linear problem can be determined by computing the rank of a (huge) matrix. Solutions of system of PDEs corresponding to  are equivalent to solutions of the linear problem. Therefore the matrix rank is an upper bound to the number of Killing tensors that the metric admits. Since the matrix dimensions are huge in our cases, we need to find tricks that can speed up the computations, particularly the required rank computation. For the metrics in question, highest derivatives of the unknowns can be expressed through lower derivatives after differentiating the equations ${\ensuremath{\mathcal{E}}}_l$ for $d+1$ times [@wolf_structural_1997]. We need $d$ differentiations to find the lowest possible upper bound [@kruglikov_nonexistence_2011; @vollmer_thesis_2016]. Specifically, write the Poisson bracket as the polynomial $$\label{eqn:poisson-for-sav} \{H,I\}=\sum_{i=0}^{d+1} \sum_{j=0}^i \sum_{k=0}^{d+1-i} P^{\ensuremath{\text{($i,j$)}}}_k\ p_1^{i-j}\,p_2^j\,p_3^k\,p_4^{d+1-i-k},$$ where each represents an equation in the system of PDEs. The prolongated system is obtained by taking derivatives of the . For given $i$, $j$ and $k$, denote the resulting equation obtained after $m$ differentiations (with $\mu$ derivatives [w.r.t.]{} $x$ and $m-\mu$ [w.r.t.]{} $y$) by $P^{\ensuremath{\text{($i,j,m,\mu$)}}}_k$. We denote by ${\llbracket{a,b}\rrbracket}$ the integers between (and including) $a$ and $b$. The indices run over the following values: $i\in{\llbracket{0,d+1}\rrbracket},\ j\in{\llbracket{0,i}\rrbracket},\ k\in{\llbracket{0,d+1-i}\rrbracket}$, and $\mu\in{\llbracket{0,m}\rrbracket}$. For integrals of pure parity [w.r.t.]{} $(p_x,p_y)$, many $P^{\ensuremath{\text{($i,j$)}}}_k$ are zero. Particularly, if we consider integrals of odd (even) $(p_1,p_2)$-parity, then only with even (odd) value of $i$ can be non-zero. Now, the unknown functions are the coefficients in the polynomial that represents $I$, $$I = \sum_{\mathclap{\substack{i=0\\ {\ensuremath{\wp}}(i)=e}}}^d\ \sum_{j=0}^i\ \sum_{k=0}^{d-i}\ I^{\ensuremath{\text{($i,j$)}}}_k\ p_1^{i-j}\,p_2^j\,p_3^k\,p_4^{d-i-k} \qquad\text{with}\ e=0\text{ or }e=1$$ and where ${\ensuremath{\wp}}(i)$ denotes the parity of the integer $i$. For the derivatives of the unknown functions, we use a notation analogous to that for the , namely $I^{\ensuremath{\text{($i,j,m,\mu$)}}}_k$, with $i\in{\llbracket{0,d}\rrbracket},\ j\in{\llbracket{0,i}\rrbracket},\ k\in{\llbracket{0,d-i}\rrbracket},\ \mu\in{\llbracket{0,m}\rrbracket}$. Here, $m$ denotes the order of partial differentiation, and $\mu$ is the order of differentiation [w.r.t.]{} the coordinate $x$. #### Structuring the equations and unknowns. With the considerations just made, we can organize the equations and unknowns into a tabular structure. For the equations, consider all sets ${\ensuremath{\mathcal{E}}}_l$ and denote them in one column with $l$ indexing the rows. Then, put their differential consequences in columns to the right, [i.e.]{} the first derivatives of ${\ensuremath{\mathcal{E}}}_0$ [w.r.t.]{} $(x,y)$ are in the first row of the second column and so forth ([cf.]{} Figure \[fig:ordering-eqns\]). The unknowns are the coefficient functions of $I$ [w.r.t.]{} momenta. They can be organized in a way similar to the equations. Let $2l=i-d+\tilde{e}$, where $\tilde{e}\in\{0,1\}$ is the parity of $d+e$. Then, we first arrange the according to the value of $l$. For equal values of $l$, we then arrange the unknowns according to the order $m$ of differentiation. Note that the resulting table for the unknowns has one column more than the table for the equations. The reason is that the system of PDEs following from  is of first order. #### Elimination scheme Let us have a closer look at the structure of these tables. We regard derivatives of the unknown functions as new, independent unknowns. We observe that in the table of equations the $(l,m)$-cell shares the unknowns $I^{\ensuremath{\text{($i,j,m+1,\mu$)}}}_k$ with the $(l,m+1)$-cell if $i=2l+d-\tilde{e}$. Together with the structuring of the unknowns obtained above, this pattern suggests to solve the linear system of equations stepwise. In principle, one can handle one cell of the table of equations at a time, and iteratively replace unknowns. However, we are not going to follow this prescription entirely. Instead, only those equations that are monomial in the respective unknowns will be taken into account. Yet, this will be done iteratively, so a maximal number of substitutions can be achieved. This partial solution of the system reduces the number of equations and unknowns considerably and therefore improves performance in the following steps. #### Computing the number of Killing tensors We need to identify the number of solutions of the obtained linear-algebraic system. This system is described by a matrix and we have to compute the rank of this matrix. On a computer, we can do this by choosing a point of reference in which we complete the computations. Actually, a little caution is necessary since we need the number of solutions for the generic matrix system; in non-generic points, the rank of the matrix may drop. We also restrict to rational reference points. In case the expressions are rational in the coordinates $x$ and $y$, we can rewrite the equations such that the coefficients become integer numbers. After choosing a reference point, our freedom to add arbitrary multiples of known integrals can be made use of to further eliminate unknowns from the system. Specifically, we can set all . For the remaining matrix problem, we can determine the number of solutions from the dimensionality of the matrix kernel. We use usual Gau[ß]{} elimination for this computation. Better algorithms might be available for particular situations. The computation of an upper bound to the number of involutive Killing tensors can now be performed algorithmically: \[alg:sav\]   1. \[step:initial\] Consider the two pure-parity integrals [w.r.t.]{} $(p_x,p_y)$ separately. Compute the differential consequences of the corresponding differential systems up to $d$-th prolongation. Consider the corresponding algebraic problem. 2. Choose a generic point $P$ and evaluate the algebraic system at this point. Add multiples of the known integrals to set as many of the unknowns as possible to zero (in $P$). 3. Perform the elimination scheme as discussed above. 4. If possible, rewrite the matrix system such that the coefficients are integers. Determine the kernel dimension. The algorithm confirms nonexistence of an additional integral if the matrix has full rank. Examples {#sec:examples} ======== Let us explore some examples with the method we developed in the previous section. Coordinates are chosen according to the specific problem and are not identical to those in Equation . However, they are still adjusted to the symmetries, [i.e.]{} to stationarity and axial symmetry. The computation times have been achieved on a desktop computer with a 3.4GHz processor and 32GB RAM. The computations were performed using Maple 18. Tomimatsu-Sato metrics ---------------------- The Tomimatsu-Sato family generalizes the Kerr metric. Its static subclass is the Zipoy-Voorhees family, which contains the Schwarzschild metric as its Kerr limit. ### A non-static example We begin with a non-static case and consider a Tomimatsu-Sato metric with perturbation parameter $\delta=2$. In the Ernst-Perjés representation, it has the general form [@ernst_representation_1976; @perjes_factor_1989; @manko_physical_2012] $$\label{eqn:tomimatsu-sato} \resizebox{0.9\textwidth}{!}{ $g_\text{TS} = \kappa^2\,f^{-1}\ \bigg( e^{2\gamma}\,(x^2-y^2)\bigg(\frac{dx^2}{x^2-1}+\frac{dy^2}{1-y^2}\bigg) +(x^2-1)(1-y^2)\,d\phi^2 \bigg) -f\,(dt-\omega\,d\phi)^2$. }$$ where the functions $f$, $\gamma$ and $\omega$ are defined by $$\begin{aligned} f &= \frac{\mu^2-(x^2-1)(1-y^2)\sigma^2}{\mu^2+\mu\nu-(1-y^2)((x^2-1)\sigma^2-\sigma\tau)}, \\ e^{2\gamma} &= \frac{\mu^2-(x^2-1)(1-y^2)\sigma^2}{p^4\,(x^2-y^2)^4}, \\ \omega &= -\frac{\kappa\,(1-y^2)((x^2-1)\sigma\nu+\mu\tau)}{\mu^2-(x^2-1)(1-y^2)\sigma^2}, \\ \intertext{and where $\mu$, $\nu$, $\sigma$ and $\tau$ are the polynomials} \mu &= p^2\,(x^2-1)^2+q^2\,(1-y^2)^2, \\ \nu &= 4x\,(px^2+2x+p), \\ \sigma &= 2pq\,(x^2-y^2), \\ \tau &= -4qp^{-1}\,(1-y^2)(px+1).\end{aligned}$$ In addition, $p$ and $q$ have to obey the restriction, $p^2+q^2=1$. The other free parameter, $\kappa$, can in principle be removed through redefinition of some quantities, but we keep it in view of [@manko_physical_2012]. We study the particular example with parameter values $\delta=2$, $\kappa=2$, and $p=\nicefrac{3}{5}\ (q=\nicefrac{4}{5})$. These parameters have also been chosen in [@manko_physical_2012], where some physical properties of the Tomimatsu-Sato metric for $\delta=2$ are discussed. \[thm:TS-7\] For this Tomimatsu-Sato metric, there is no additional independent Killing tensor of valence $d\leq7$ that is in involution with the trivial Killing tensors $d\phi$, $dt$, and the metric. Indeed, the following table shows that after $d=7$ steps of prolongation the algorithm yields the upper bound 20 (sum of the , which denote the obtained upper bound for degree $d$ and after $d$ prolongation steps). The number ${\ensuremath{\Lambda_{d}^0}}$ of trivial integrals is given by the formula $${\ensuremath{\Lambda_{d}^0}} = \sum_{l=0}^{\lfloor\nicefrac{d}{2}\rfloor} \left(\begin{array}{c} D+d-2l-3 \\ d-2l\end{array}\right) \underset{\text{D=4}}{\overset{\text{d=7}}{=}} 20.$$ Both numbers coincide and this confirms the nonexistence of an additional Killing tensor. **Results Tomimatsu-Sato metric**\ *$\delta=2$, $\kappa=2$, $p=\nicefrac{3}{5}\ (q=\nicefrac{4}{5})$* 0.2cm d e ${\ensuremath{m_{d,d}}}$ ${\ensuremath{n_{d,d}}}$ rows of $M$ columns of $M$ ${\mathrm{rk}}(M)$ time --- --- ---- -------------------------- -------------------------- ------------- ---------------- -------------------- ------ 0 20 2880 2700 556 356 356 21h 1 0 3060 2700 776 416 416 24h Recall that $e$ is the parity of the integral [w.r.t.]{} the momenta $(p_x,p_y)$. Thus, for given valence $d$, we have to compute two separate branches $e=0$ and $e=1$. By $M$, we denote the matrix obtained after Step \[step:initial\] of the algorithm. The symbols ${\ensuremath{m_{d,d}}}$ and ${\ensuremath{n_{d,d}}}$ denote, respectively, the number of equations and unknowns of the initial matrix system obtained after Step \[step:initial\] of the algorithm, [i.e.]{} for degree $d$ and after $d$ prolongation steps. The point of reference for the computations is $(x,y)=(\nicefrac12,2)$. The last column provides the (approximate) computation times, [cf.]{} also Section \[par:efficiency\]. One might wonder why the number ${\ensuremath{n_{d,d}}}$ coincides for both branches. The reason is that for the number of unknowns the following formula holds (for degree $d$ after $M$ prolongations) [@vollmer_thesis_2016]: $$\label{eqn:number-unknowns-tomimatsu-sato} \begin{split} {\ensuremath{n_{d,M}}} &= \sum_{l=0}^{\frac{d-e-\tilde{e}}{2}} (2l+1+\tilde{e})(d+1-\tilde{e}-2l)\,\binom{M+3}{2} \\ &= \frac{1}{24}\ (d+2-\Upsigma)\,(M+2)(M+3)\cdot \\ &\qquad\qquad\qquad \cdot(d^2+d\Upsigma-2\Upsigma^2+4d+6e(\Upsigma-1)+2\Upsigma+6), \end{split}$$ where we define $\Upsigma=e+\tilde{e}$. Hence, if $d$ is odd, then $e$ cancels from , because $\tilde{e}+e=1$ and thus $\Upsigma=1$ (recall that $\tilde{e}={\ensuremath{\wp}}(d+e)$). Similarly, for the number of equations, we find $$\label{eqn:number-equations-tomimatsu-sato} \begin{split} {\ensuremath{m_{d,M}}} &= \sum_{l=0}^{\frac{d+e-\tilde{e}}{2}} (2l+1+\tilde{e})(d+2-\tilde{e}-2l)\,\binom{M+2}{2} \\ &= \frac{1}{24}\ (d+2+\Updelta)\,(M+1)(M+2)\cdot \\ &\qquad\qquad\qquad \cdot(d^2-d\Updelta-2\Updelta^2+6e\Updelta+7d-5\Updelta+12), \end{split}$$ with $\Updelta=e-\tilde{e}$. Thus, $e$ cancels from if $d$ is even, because $\tilde{e}=e$ and $\Updelta=0$. ### Kerr metric {#sec:kerr} For the Kerr metric, it is known that a nontrivial Killing tensor of valence 2 exists. We consider the particular case of the extreme Kerr metric (with rotation parameter $a=1$). In Boyer-Lindquist coordinates $(r,\theta,\phi,t)$, this metric reads as follows[@boyer_maximal_1967; @stephani_exact_2003]: $$\label{eqn:extreme-kerr-metric} g = \left(\begin{matrix} \frac{r^2+\cos^2(\theta)}{r^2-2r+1} &&& \\ & r^2+\cos^2(\theta) && \\ && \frac{P_a(r,\theta)\sin^2(\theta)}{r^2+\cos^2(\theta)} & \frac{-2\sin^2(\theta)r}{r^2+\cos^2(\theta)} \\ && \frac{-2\sin^2(\theta)r}{r^2+\cos^2(\theta)} & -\frac{r^2-2r+\cos^2(\theta)}{r^2+\cos^2(\theta)} \end{matrix}\right)$$ with $P_a(r,\theta)=\cos^2(\theta)r^2+r^4-2\cos^2(\theta)r+\cos^2(\theta)+r^2+2r$. Algorithm \[alg:sav\] yields the following results for the point of reference $(r,\theta)=(2,\nicefrac{\pi}{4})$, [cf.]{} [@vollmer_thesis_2016]. Degree 1 2 3 4 ----------------- --- ------- --- ---- -- $e=0$ integrals 2 **5** 8 14 $e=1$ integrals 0 **0** 0 0 All integrals 2 **5** 8 14 Here, $e=0$ and $e=1$ refer again to the branches according to parity in $(p_x,p_y)$. In second degree we find an upper bound of 5. This is one above the number of trivial Killing tensors of valence 2. And indeed, the Kerr metric has an additional Killing tensor of valence 2 that commutes with the trivial Killing tensors. This is the Carter constant [@carter_hamilton-jacobi_1968; @carter_global_1968]. ### The Darmois solution {#sec:darmois} The Darmois metric is a particular Zipoy-Voorhees metric [@stephani_exact_2003; @darmois_equations_1927]. It is therefore a static Tomimatsu-Sato metric. In prolate spheroidal coordinates it has the following form: $$\label{eqn:zipoy-voorhees} \resizebox{0.9\textwidth}{!}{ $g= \left(\frac{x+1}{x-1}\right)^2 \left((x^2-y^2)\left(\frac{x^2-1}{x^2-y^2}\right)^4 \left(\frac{dx^2}{x^2-1}+\frac{dy^2}{1-y^2}\right) +(x^2-1)(1-y^2)d\phi^2\right) -\left(\frac{x-1}{x+1}\right)^2\ dt^2$. }$$ Existence of a nontrivial Killing tensor for the Darmois solution has been suggested by [@brink_II_2008; @brink_formal_2009], but later studies challenged this claim [@kruglikov_nonexistence_2011; @gerakopoulos_non-integrability_2012; @maciejewski_nonexistence_2013]. In [@kruglikov_nonexistence_2011], Kruglikov & Matveev study the number of Killing tensors for this metric up to valence 6, and the method we discuss here is based on this work. It is therefore interesting to compare the computer performance of both methods (see below). For static and axially symmetric metrics, the algorithm can be improved further. It is possible to restrict to integrals of even parity in $p_\phi$. Their parity [w.r.t.]{} $(p_x,p_y)$ can be taken equal to the parity of $d$. In order to make a statement for valence $d$, we need to apply the algorithm for $d$, $d-1$ and $d-2$. The reason for this simplification is the following observation: The Hamiltonian is not only of even parity [w.r.t.]{} $(p_x,p_y)$, but also [w.r.t.]{} $p_\phi$ or $p_t$. Thus, components of the integral of even and odd parity [w.r.t.]{} $p_\phi$ can be considered separately. Now, consider only integrals of even parity in $p_\phi$ and such that their parity [w.r.t.]{} $(p_x,p_y)$ equals the parity of $d$ as an integer number. Let [$\mathcal{S}_d$]{} be the system of equations obtained from the Poisson equation by considering coefficients with respect to momenta. For Weyl metrics, the system of equations [$\mathcal{S}_d$]{} splits into four separate subsystems, see Figure \[fig:subsystems\]. Each of the subsystems can be solved independently. Unknowns of one of the subsystems do not appear in the other subsystems. The crucial observation is that each of this subsystems corresponds to one of the described type, but possibly with another value for $d$. For details, see [@vollmer_thesis_2016]. **Subsystems according to parity of the integral** **parity [w.r.t.]{} $(p_x,p_y)$** **even parity in $p_\phi$** **odd parity in $p_t$** ----------------------------------------- --------------------------------------------------- --------------------------------------------------- [equals ${\ensuremath{\wp}}(d)$]{} [$\mathcal{S}_d$]{} corresponds to ${\ensuremath{\mathcal{S}}}_{d-2}$ [opposite to ${\ensuremath{\wp}}(d)$]{} corresponds to ${\ensuremath{\mathcal{S}}}_{d-1}$ corresponds to ${\ensuremath{\mathcal{S}}}_{d-1}$ \[thm:ZV-11\] The Darmois solution, [i.e.]{} the Zipoy-Voorhees space-time with parameter $\delta=2$, has no additional independent Killing tensor of valence $d\leq 11$ that is in involution with the trivial Killing tensors $d\phi$, $dt$, and the metric. **Results Darmois metric**\ *(all values refer to [$\mathcal{S}_d$]{} only)* 0.2cm d ${\ensuremath{m_{d,d}}}$ ${\ensuremath{n_{d,d}}}$ rows of $M$ columns of $M$ ${\mathrm{rk}}(M)$ time ---- ---- -------------------------- -------------------------- ------------- ---------------- -------------------- ------- 9 0 5005 4620 1058 726 726 1.8h 10 21 7392 7098 1358 1064 1043 13h 11 0 10780 10192 2162 1510 1510 7days The upper bound to the number of Killing tensors is therefore 42, and this equals the number of minimally expected Killing tensors (note that ${\ensuremath{\mathcal{S}}}_{d-1}$ contributes twice). The point of reference in this computation is $(\nicefrac12,2)$. #### Computational Efficiency {#par:efficiency} Let us quickly contrast the performance of the method presented in Section \[sec:methods\] with the original method from [@kruglikov_nonexistence_2011]. While on our computer the algorithm from [@kruglikov_nonexistence_2011] takes about 3 minutes for all the necessary computations for valence $d=4$, the modified algorithm takes only around 3 seconds. For valence $d=6$, we needed approximately 47 minutes with the algorithm from [@kruglikov_nonexistence_2011]. We needed a little more that a minute (67 seconds) with the improved method. These numbers include both branches for [@kruglikov_nonexistence_2011] and all three branches for the method of Algorithm \[alg:sav\] in combination with the decomposition according to Figure \[fig:subsystems\]. C-metrics --------- The C-metric is used in relativity as a model for systems of two black holes accelerating in opposite directions under the action of certain forces. Its physical properties are described, for instance, in [@griffiths_interpreting_2006]. We express the C-metric in a form given by Hong and Teo [@hong_form_2003; @griffiths_interpreting_2006], $$\label{eqn:c-metric} g = \frac{1}{\alpha^2(x+y)^2}\,\left(\frac{dx^2}{X}+\frac{dy^2}{Y}+X\,d\phi^2-Y\,d\tau^2\right),$$ where $X$ and $Y$ are $$X=(1-x^2)(1+2m\alpha\,x), \qquad Y=(y^2-1)(1-2m\alpha\,y).$$ This metric can describe space-times with different properties [@griffiths_interpreting_2006]. The most interesting case is the case of two accelerated black holes and requires $x+y>0$ and $-1<x<1$ [@griffiths_interpreting_2006]. The parameter $\alpha$ describes an acceleration and $m$ denotes a mass parameter; they are restricted by the requirement $0<2m\alpha<1$ [@griffiths_interpreting_2006]. Space-times of the kind described have three regions, separated by what is called the black hole horizon (at $y=1$) and the acceleration horizon (at $y=\frac{1}{2m\alpha}$). In the region between the horizons, the space-time is static and $\partial_t$ is a timelike Killing vector [@griffiths_interpreting_2006]. We only consider this region for brevity of discussion. \[thm:C-metric\] The C-metric with $\alpha=\nicefrac12$ and $m=\nicefrac12$ has no additional, independent Killing tensor of valence $d\leq 9$ that is in involution with $d\phi$, $dt$, and the metric. **Results C-metric with $\alpha=\nicefrac12$ and $m=\nicefrac12$**\ *(all values refer to [$\mathcal{S}_d$]{} only)* 0.2cm d ${\ensuremath{m_{d,d}}}$ ${\ensuremath{n_{d,d}}}$ rows of $M$ columns of $M$ ${\mathrm{rk}}(M)$ time --- ---- -------------------------- -------------------------- ------------- ---------------- -------------------- ------ 7 0 1980 1800 488 308 308 17m 8 15 3150 3025 608 468 468 21h 9 0 5005 4620 1113 728 728 57h The upper bound to the number of Killing tensors is therefore 30, and this equals the number of minimally expected Killing tensors. The point of reference for the computation was $(0,\nicefrac32)$. Conclusions =========== We have seen that taking into account the full structural properties of the system of PDEs connected to , the method suggested by [@kruglikov_nonexistence_2011] can be modified to achieve higher computational efficiency. In particular, we introduced an elimination scheme and the freedom to add trivial integrals to speed up the computations and to reach higher degrees of the integrals. Moreover, we saw that for static space-times the Killing tensors partially come from lower degrees, and that this fact can significantly improve computational performance. The additional techniques were implemented for several examples, namely the Darmois solution, a C-metric and a Tomimatsu-Sato metric. The extreme Kerr solution was discussed as an example that admits a nontrivial Killing tensor. We saw that the new techniques also work fine with axially symmetric metrics that are stationary (instead of only static). Obviously, the techniques applied in our method rely on the structural properties of the problem rather than its physical properties. The method is applicable not only for stationary and axially symmetric metrics, and it can produce results in other contexts as well, see [@kruglikov_certain_2015] for an application of a similar method in sub-Riemannian geometry. Acknowledgements {#acknowledgements .unnumbered} ================ The author wishes to thank Vladimir Matveev for introduction to the prolongation-projection approach to the existence of Killing tensors, as well as for generous support and fruitful discussions. He is grateful for financial support by the Research Training Group Quantum and Gravitational Fields at the University of Jena, financed by Deutsche Forschungsgemeinschaft. The author wishes to thank Galliano Valent for drawing his attention to the C-metric.
Cyprus Museum of Modern Arts , considering the contemporary aesthetic and understandings of art , is a foundation located on the campus of Near East University which undertakes an important role in selection, collection, conservation and exhibition of artworks of our country and of the international platform. The collection of the Cyprus Museum of Modern Arts consists of artworks that represent the artistic and cultural values of their country in the best possible way in terms of the art history. As can be seen, the works reflect the various creative periods of their painters; It is noteworthy that the Museum is of a representative nature in all respects with its wide range of collection in terms of style, ecole and pattern. The Cyprus Museum of Modern Arts has an important collection with more than 8000 artworks dating from the 1940s to the present. The collection of the Cyprus Museum of Modern Arts consists of works of state artists from 14 Turkic states, representing their countries in the best way in the context of art history. The majority of the collection is kept in rooms specially designed for protection. Founded on August 9, 2018, the Cyprus Museum of Modern Arts of the Near East University was designed as the largest modern art museum in the Near East region, with its infrastructure that will allow exhibitions of all kind of classic and modern works of art. Weekdays and Saturdays Foreigner: 20 Euro Adults: 30 TL Student: 20 TL Between Monday and Friday Open to visitors from 10:00 to 16:00.
https://cyprusmodernart.com/?lang=en
This year, “2010,” is the year of the engaged older adult. The idea is to celebrate the contributions of older adults and expand civic engagement of all ages. As the baby boomer demographic becomes “older adults,” we have many people to learn from and many people to “engage” in community life. This year, “2010,” is the year of the engaged older adult. I did not make that up. Someone in the governor’s office did. The idea is to celebrate the contributions of older adults and expand civic engagement of all ages. As the baby boomer demographic becomes “older adults,” we have many people to learn from and many people to “engage” in community life. I envision other cultures, scenes from movies, where the older gentlemen gather around chess boards in the outdoor cafes and the younger boys collect knowledge simply from spending time with them. It happened organically, the passing on of stories and wisdom. The desire of the young boys to grow up like them was natural. The older generation was engaged, respected and revered. They were the patriarchs until death. Now the generations have become more separated and isolated. Older folks hang with older folks, and young ones hang with their own age group. Not much co-mingling going on. The given of respecting our elders and looking to them for wisdom and guidance sometimes feels like an antiquated notion. But maybe I am getting off the track. This Generations initiative is designed to improve the lives of older Americans. That is a worthwhile cause. My community has a plethora of enrichment courses for older adults. I teach workshops at our local college and Center for Learning in Retirement. There are many courses I would like to attend myself. Keeping the mind, fingers and body nimble is good for any age. They’ve told me that I do not have to be retired to partake of their classes. Native American Spirituality interests me. A tour of a local historic district appeals to me. Tips for traveling alone grabs me. There are music classes, learn a language classes and introduction to biodynamic agriculture. I can learn woodworking, the hip-hop hustle, and the medicinal properties of culinary herbs. I can attempt basket weaving, belly dancing and blues guitar. I understand that “we” want to engage the older adult. We need to get our elders out of the house and into active community life where they can feel fulfilled and growing and learning; and where they can share their experiences and expertise. My wish is that 2010 be the year of the engaged adult period, no qualifier as to age. Instead of going home after work to watch mindless television, take a community education workshop. There are no tests, no grades and no homework. Keep the mind, body and soul active and engaged no matter how old you are. If you feel renewed energy, you may inspire another to do the same. Then the ripples begin. Who knows? Maybe even “older adults” will play games with the younger generations. They just might be able to teach them a thing or two. Kelly Epperson is a contributor to The Journal-Standard in Freeport, Ill. Write Kelly at www.kellyepperson.com or [email protected] or PO Box 2324, Loves Park IL 61131. This column is the opinion of the writer and not of the newspaper.
https://www.dansvilleonline.com/article/20100122/NEWS/301229997
It seems apt that fifth-year doctoral student Etienne Demarly pursues the Japanese martial art of kyudo. This ancient form of archery, encouraging a near-spiritual form of marksmanship, demands endless iteration and years to master. Outside the kyudo dojo, Demarly is patiently zeroing in on another kind of target: a robust set of algorithms that will help simulate the turbulent conditions inside nuclear reactors. “My formulations translate the physics of different boiling phenomena into a useful model,” says Demarly. “I keep advancing the formulation, because we must have a model that works in all kinds of reactor conditions, including different power levels, flow rates, coolant temperatures, and pressures.” Demarly’s efforts in generating physically realistic computer simulations may soon enable current generation reactors to operate more efficiently. It is research that could also assist in the design of new and more powerful nuclear reactors. His research, under the supervision of Emilio Baglietto, the Norman C. Rasmussen Associate Professor of Nuclear Science and Engineering, is part of a larger, long-term initiative funded by the U.S. Department of Energy, through the Consortium for Advanced Simulation of Lightwater Reactors (CASL), for which Baglietto serves as thermal hydraulics focus-area lead. Demarly is helping attack a decades-old problem in nuclear energy. Nuclear reactors generate heat through atomic fission occurring in fuel assemblies that are surrounded by water or other fluids. As nuclear components heat up the liquid, bubbles form on the surface of these assemblies, producing steam. This transfer of heat through steam powers turbines that produce electricity. It is a process that proves manageable — up to a point. “A boiling crisis can occur in nuclear reactors, which is difficult to predict in all possible conditions,” explains Demarly. “It involves the point at which steam forms a blanket, like an insulator, that produces a big spike in the temperature of the heating surface, threatening to melt the fuel.” To avoid such a crisis, nuclear reactor operators adopt very broad safety margins, running plants at lower power levels, and as a result, generating less energy. “Utilities and nuclear companies would like to bring that uncertainty bound down,” says Demarly. “Our research goal is to develop models that capture and predict the very chaotic and complex physics leading to a boiling crisis, so we can reduce uncertainty for operators.” Two major advances are boosting efforts to achieve this goal. First, recent experiments at MIT and elsewhere provide visual proof that when a boiling crisis begins, tiny dry spots forming under bubbles on the surface of fuel assemblies can expand and cover a large surface. These dry areas pose a direct threat to the fuel assemblies. The second advance is in computation. “In the 1960s and 1970s, modeling of reactors involved the simplification of the complex geometries of fuel assemblies, and therefore the use of large safety margins” says Demarly. “But now we have computers powerful enough to produce simulations to characterize this complexity.” Using Computational Fluid Dynamics (CFD) — a software domain in which Baglietto and his team specialize — Demarly says scientists can “swiftly resolve the complex geometries inside nuclear reactor systems, coding the full distribution of fluid flow everywhere, from the generation of steam to the production of dry spots.” Writing, running and tweaking programs comes naturally to Demarly. He grew up in a Paris suburb, where, he says, “my big passion was building and maintaining computers, and playing computer games.” In middle school, he set up library computers, and pursued a mathematics, engineering and physics track, which landed him at one of France’s elite science and engineering universities, the École supérieure d’électricité, or Supélec. Demarly’s professional interest in nuclear energy emerged quickly during college. He enrolled in the Institut National des Sciences et Techniques Nucleaires for his master’s degree. There he secured a nine-month internship at MIT. “I had never been to the U.S. before, and the novelty appealed to me,” he says. It was an experience that proved life-altering. “I met with Emilio Baglietto, who had recently joined the faculty and was setting up his group,” recalls Demarly. “He had just received delivery of a computer cluster, so I immediately got to work physically assembling machines.” Demarly was not adept just at hardware. He quickly picked up Baglietto’s computational methods, which he applied in research aimed at improving the design and performance of steam generators. “These are big pieces of equipment with thousands of tubes arranged in a complicated geometry,” he says. “Nobody had tackled simulation of steam generators before at this level.” With his rapidly expanding grasp of computational fluid dynamics, and a keen interest in solving key problems in the nuclear energy industry, Demarly returned to MIT and the Baglietto group for his doctorate. Today he is refining a novel set of software codes with the potential to simulate a wide range of conditions (heat flux, mass flow, pressure, temperature) that affect the behaviors of steam and bubbles inside a reactor. “I’ve got a good framework now that enables me to quickly test new ideas, and eventually it will be able to model and predict most cases correctly,” he says. It is work that industries are already eager to adopt and apply to operating reactors, notes Demarly. It could also save companies millions of R&D dollars that are now spent prototyping next generation reactor components based on less predictive simulations. With his innovative algorithms in hand, Demarly hopes to work in the nuclear industry after receiving his doctorate. But there are other opportunities as well. “Thermal hydraulics is increasingly important for big computing companies like IBM and Google that hope to reduce and improve the cooling performance of their cluster systems,” he says. With his expertise in fluid dynamics and computing, the tech world beckons. For now, Demarly is focused on perfecting his simulations. “There have been roadblocks every step of the way, and it’s a long process,” he says “But I like making something from scratch, something real and useful,” he says.
https://news.mit.edu/2018/mit-grad-student-etienne-demarly-mastering-fluid-flow-and-bubble-boil-0709
Author: Duncan, Dave Read by: Bevine, Victor ISBN: 978-1-5226-8973-7 Publication Date: Aug 2016 Publisher: Brilliance Publishing, Inc. Imprint: Audible Studios on Brilliance Audio Book Format: CD-Audio List Price: USD $9.99 Buy Now Book Details Physical Dimensions (W X L X H) : 5.25 x 6.75 x 0.5 Inches Author Biography Duncan, Dave (Author) Dave Duncan was born in Scotland in 1933. He graduated from the University of St. Andrews in 1955 and moved to Canada. He worked for 31 years as a geologist in the petroleum industry. He started writing novels in 1984 and became a full-time author in 1986. He has written over 40 novels including the series The Seventh Sword, A Man of His Word, A Handful of Men, The King's Blades, The Great Game, Years of Longdirk, King's Daggers, and Seventh Sword. He has also written under the names Sarah B. Franklin and Ken Hood. 030 Featured Books The Woman in White Collins, Wilkie Paperback: $250.00 Alice's Adventures in Wonderland Carroll, Lewis Paperback: $10.25 The Chronicles of Narnia Lewis, C. S. Electronic book text: View more Featured Books Rate this title: Select your rating below then click 'submit'. Rating value is required. I do not wish to rate this title. Contact | | Copyright ® 2013 R.R. Bowker LLC. All rights reserved.
https://www.bookwire.com/book/USA/The-Alchemist-Apprentice-9781522689737-Duncan-Dave-55257875
Comics as geo-artistic collaborations Exploring the potentialities of artistic languages to promote citizens’participation in the processes of urban change, SG wanted to directly engage the audience in a process of spatial thinking as well as of rediscovery of the meaning and narrative potential of ordinary landscapes. For this reason, we selected three main keywords, namely neighbourhoods, mobility, and waterways, that should also be able to stimulate citizens’ curiosity. As said, these were the topics of geographical interest around which artist—geographer pairs had to develop their site-specific installations to compose the SG art exhibition. Once the structure of the geo-artistic project, the sites that should have hosted the artworks, and the key topics were chosen, together with the curators at the PG, we co-authored a list of young artists who had demonstrated a long-lasting interest in landscape, urban space, place-making, and spatial storytelling in their artistic projects. The shortlist was realised including especially young local artists that had already collaborated with the PG Office: namely, in Italian ‘Giovani’ means ‘young’, and the Office aims to help in launching and promoting early career artists through the organisation and funding of exhibitions, residencies, and creative initiatives in the city of Padua. Moreover, we preferred to work with local artists that had a personal link with the territory for two main reasons. The first was that they had only a short period of time to understand in-depth the specificities of the sites that were meant to host their artworks: therefore, having a prior relationship with those places would have been of great help for them to understand local dynamics. The second reason was that, given the small amount of money at the disposal of the SG project and the need to participate in many meetings with the Committee, it would have been easier and cheaper for artists to come to Padua if they had a place to stay near the city. Despite its office being located in Padua’s city centre, spatial proximity was only one of several reasons we decided to involve the Italian publishing house BeccoGiallo - which will also play a central role in Chapter 3 - from the very early stages of this project. BeccoGiallo selected with us one of the three young artists and appeared from the beginning the best interlocutor for the realisation of an art-installation in comics form for several reasons. First, BeccoGiallo has achieved national and even international reputation because it was launched more than ten years ago with the very ambitious, critical, and radical editorial goal of publishing works of graphic journalism in order to compose a contemporary history of Italy in comics form. In this scenario, the voices of the earliest Italian graphic journalists and artists-activists, like Claudio Calia and Gianluca Costantini, who were already mentioned in Chapter 1, represent fundamental tiles in this mosaic, now made up of dozens of reportages, biographies, inquiries, interviews, and many other stories told in comics form. Second, because of its specialisation in graphic journalism, BeccoGiallo has always paid particular attention to the narration of real places and cities, often collaborating with emerging young artists. This interest in the narrative translation of reality in comics stories was essential for our dialogue with BeccoGiallo to succeed. The SG project was certainly stimulated by what is called a creative (re)turn in geography (Eshun and Madge 2016), a restored stimulus to engage with art and artistic products not simply as objects of geographical research but also as tools at our disposal to disclose geographical discourses, even beyond academic boundaries. As geography-art engagements are proliferating in the geohumanities (Hawkins 2013, p. 53), our goal was to realise a project that could speak in an equally effective manner to both a specialist audience and a wider, non-academic public. In fact, SG was inaugurated during the national conference Giornate della Geografia, which in 2018 was hosted in Padua: that year, the topic at the centre of the geographical event was public geography, and specifically the role and forms through which the discipline should act and interact, communicate, and work with people, experts, and artists beyond academic boundaries (see Rivista Geografica Italiana 2019, pp. 121-158). The interaction between research and art promoted by SG was particularly relevant to the discussion on ‘public geography’ activated by the conference (Bertoncin et al. 2019). When drafting the project SG, the scientific committee that I was coordinating was inspired by what Harriet Hawkins calls the ‘expanding field’ of art—geography engagements (2013, p. 53), and by the many creative research projects that include collaboration between artists and researchers and involve non-specialist audiences, stimulated by the so-called creative (re)turn in geography (Madge 2014). As Kate Foster and Hayden Lorimer observe, these art-geography collaborations have taken diverse forms that comprise but are not limited to the following combinations: geographers look to artists to help their research ‘outreach’ to communities; geographers have been curators of art exhibitions; artists exhibit and perform at geography conferences, as well as offer papers; university departments host artists’ residencies; artists contribute to geographers’ research projects; geographers evaluate the social impacts of public art projects; artists employ a spa- tialized vocabulary to label, describe and explain their work that geographers recognize as their own. (2007, pp. 425-426) In our case, among a wide range of both national and international examples, we were particularly inspired by the work done by the Royal Holloway Centre for the GeoHumanities with the launch of the first round of the Creative Commission in 2018.2 We were especially intrigued by the opportunity to bring couples of artists and researchers together around a specific topic of geographical interest, activating an exchange of ideas, perspectives, and methodologies. From the geographers’ perspective, SG represented a great opportunity to expand our experimentation with creative methods and collaborations; be for the first time actively involved in the process of ideation, realisation, and promotion of a geo-artistic project; and become more aware of the challenges that have to be faced in these contexts of collaboration with experts from very different fields. In fact, when thinking about an art-geography collaboration, we should take into account that the ‘ethics of practice and intention can widely differ, between and within these collaborating cohorts’ (Foster and Lorimer 2007, p. 426). Our group, for example, was composed of curators, academics, and artists but also of other actors that played a very crucial role in the realisation of the project: the members of the steering board of Cento- stazioni; the surveyor of the Municipality of Padua, who was in charge of assessing the feasibility of the installations; and the key-informants encountered during fieldwork, comprising commuters, workers, and members of the associations. The presence of professional curators and experts that were able to mediate between the University and the artists was especially useful in this context. On the one hand, geographers, who commissioned the work, were expecting an output that should be visible and accessible to different audiences, from academics to students and simple passers-by. Following this need for accessibility, we sometimes run the risk of asking the artworks to become too didactic. On the other hand, the artists necessarily had to adapt their works not only to the needs of the commissioner but especially to the limits set by material conditions concerning the low budget, short time, and often limited space that they had at their disposal. As Mora reminded me in a couple of interviews run in spring 2020, in her specific case, the access to a very small budget (around 2,000 €) determined the choice of the materials and the need to mediate between the quality of print and the possibility of realising a quite high number of panels (more than 40) in a big format. The physical form in which the story was printed, then, influenced also the way in which the narrative contents were structured and some important stylistic choices: like, for example, the use of shorter texts to be printed in a bigger font size; the choice to avoid too-detailed drawings in favour of more effective and minimalist lines; or the decision to arrange the story in squared panels, mirroring the form of the physical support on which they had to be printed. Furthermore, the relatively small time-window in which the artists were expected to work on the ideation and realisation of their artworks did not allow for a longterm period of preliminary creative research. In Mora’s case, she concentrated the ethnographic research on the train station area in a couple of weeks, during an ‘artist in residence’ programme at BeccoGiallo. During this period, she observed how the place changes at different times of the day and collected keywords about the train station and impressions from the people who work in or pass through it. As Mora’s words confirmed, both the site-specific conditions and the different actors involved in the management of the single sites and areas of artistic intervention deeply influenced the artists’ choices and the creative processes that led to the realisation of the SG public art exhibition. This happened for Fabio Roncato, who had to negotiate the price to rent the billboards with APS Holding, the company that administrates the advertising spaces in the whole area of the Municipality of Padua: only because they agreed on a lower rental price was it possible to display his posters on many advertising billboards in the Arcella neighbourhood, letting his artwork became a ‘diffused art-installation’. Something similar happened also to Caterina Ros- sato, whose choices were deeply limited by the site where her backlit screen was positioned, and especially by the scarce flexibility of the Civil Engineering Office that is in charge of the management of the riverbanks of the Scaricatore Canal. Of course, a negotiation was needed also for Monica Bellido Mora, who had to adapt not only the narrative structure of her story but even part of its contents to the requests of Centostazioni, a joint stock company then merged with the Rete Ferroviaria Italiana - Gruppo Ferrovie dello Stato Italiane (the Italian Railway Network public company) that is responsible for managing the space of the train station of Padua. Sitting down at the negotiating table There is a glass table dose to a large glass wall overlooking a huge squared open space, covered by a glass roof. On the second floor of the Centro Culturale San Gaetano, in the historical centre of Padua, the light floods into the room and creates green light reflections on the table we are sitting around. We are all in a state of restrained excitement. It is 21 June 2018, and we are waiting for two representatives of Centostazioni, who are travelling by train from Rome to discuss with us the artwork of the SG geo-artistic project that concerns their area of interest: the train station of Padua. Their role is critical, since in order to exhibit the comics story in the spaces within the train station and on its external walls, we need their consent. Without it, to install the artwork we will only be allowed to use the area under the direct management of the Municipality of Padua, which means that we will have to place the story along the walkways and the bus shelters in front of the train station. It is a short distance, of course, just a few dozen metres away from the facade of the building, but still it would represent a symbolic step behind our intended site and spatial focus. In the meantime, in the preceding weeks, people working at the Centostazioni Office in Rome had already received a general presentation of the SG project, together with a first draft of the text of the comics story and image documentation (photographs, drawings, and renderings) gathered by Mora to help FIGURE 2.2 Excerpts from the storyboard of Monica Bellido Moras A Station of Stories. By permission of the author. them imagine the artwork’s visual impact. Beyond presenting the main contents and tone of the comics story, the documentation was aimed at recognising the importance of the railway station as a node of urban and translocal mobility in the city of Padua and, consequently, its centrality as a symbolic space within the whole SG project. Renderings and sketches were sent along to show where the exhibition could be displayed, and in what form. As soon as they arrive, we know that the time at our disposal is short. Needless to say, they have to take another train in the afternoon to go back to Rome. So, they go straight to the point. 'We like your project’, they say, ‘and we will be happy to support it. Yet, you have to be aware of the fact that almost the 70% of the internal space of the train station, comprising its walls, billboards, and even the floors, where possible, is considered a commercial surface’. This information, which is easily confirmed by everyone’s experience of contemporary bus, train, underground stations in many cities, rescales our vision, drastically narrowing the space available for our geo-artistic installation. We are to turn those ‘commercial surfaces’ into spaces of narrative intervention. In the end, even though we will have to adjust our blueprint, and to reassemble the story according to the narrow interstices they allow us to use, still we have their permission to install the comics story in the train station, on an advertising billboard situated close to platform number one, and on the outer facade of the building. When leaving the negotiating table, we are more than happy with what we obtained. Except for one small detail about the story’s content. In the first draft of the storyboard, Mora had decided to mention also the lives of those who do not simply pass through or work in the train station but even live within its walls. Yet, Centostazioni explicitly asked to avoid any reference to critical or conflictual themes, like the presence of homeless people, sleeping in the train station, or the reference to the suicides that often cause delays, missed connections, and cancelled trains. Needless to say, we were not entirely happy with this part of the negotiation. In the neoliberal city, where walls are interpreted as commercial surfaces, no space is allowed to tell stories that expose ‘users’ to potentially critical contents. Centostazioni didn’t know, at that time, that in our guided tours this would become one of the stories to tell and topics to discuss. They didn’t know that the comics story by Mora was expected to exceed the material spaces under their direct control by activating ‘invisible’ storytelling practices beyond the visible frames of the train station’s walls.
https://ebrary.net/154433/education/comics_artistic_collaborations
Background: Mutations in GABRB3 have been identified in subjects with different types of epilepsy and epileptic syndromes, including West syndrome (WS), Dravet syndrome (DS), Lennox-Gastaut syndrome (LGS), myoclonic-atonic epilepsy (MAE), and others. Methods and results: We herewith report on a girl affected by DS, who has been followed from infancy to the current age of 18 years. Next-generation sequencing (NGS)-based genetic testing for multigene analysis of neurodevelopmental disorders identified two likely de novo pathogenic mutations, a missense variant in GABRB3 gene (c.842 C>T; p.Thr281IIe) and a nonsense variant found in BBS4 gene (c.883 C>T; p.Arg295Ter). Conclusion: A likely relationship between the novel GABRB3 gene variant and the clinical manifestations presented by the girl is proposed. Previously, one case of DS and two of DS-like linked with GABRB3 mutations have been reported. To the best of our knowledge, this is the first report of DS associated with this novel variant. A literature review of clinical cases with various types of epileptic encephalopathies (EEs) related to GABRB3 mutations is reported.
https://pure.unipa.it/en/publications/a-novel-gabrb3-variant-in-dravet-syndrome-case-report-and-literat
News that as many as 143 million Americans may have had their data stolen from the consumer credit reporting agency Equifax has once again thrust data security into the news. While this attack was especially egregious — stolen data included social security numbers, birth dates, driver’s license numbers and some credit card numbers — every data breach has the potential to wreak havoc on lives and businesses. Consumers want to know that they can do, and as importantly, they want to know what the companies they entrust with their data are doing to keep it safe. To learn how Rackspace handles data security, I sat down with Rackspace Managed Security Director of Operations Daniel Clayton and the Senior Manager of our Customer Security Operations Center Travis Mercier to learn what practices all companies should follow to improve operational resiliency to better respond to similar attacks in the future. Clayton, who came to Rackspace after more than two decades building and running operations for the NSA and the British military, oversees global customer security operations and strategy for Rackspace Managed Security. Mercier, who has more than 13 years of cybersecurity experience, runs day-to-day security operations for the company. After a major breach, what goes on behind the scenes? What happens first? TM: While every security operation is different, the first thing you have to do is assess the situation — understand what you’ve lost, who needs to be pulled in from various departments, and then start investigating the facts. The next step is to determine the who, what, when, where, why and how. Specifically: - Who or what actor was behind the data breach? This can help identify the why and how to help understand motivations and tactics, techniques and procedures, or TTPs. It’s important to not spend too much time at this step because you run the risk of bogging down answering the other key questions, and while attribution is helpful, it’s not the end all be all in an investigation. - What data was taken and what is the scope of the data compromised? This can help you understand what data is of interest to the adversary and their motivations, to begin looking where else the adversary may have pivoted or other places the adversary may have tried to gain access. - When did this data breach occur? When did this activity start and how long did it go on? This will help scope the investigation by narrowing down a timeframe for the security team to analyze. It avoids boiling the ocean — reviewing all activity over a larger period of time. - Where was the breached data stored? This again will help limit the scope of the investigation and focus efforts on a specific set of systems, dramatically cutting down the time it takes to begin the investigation and start determining next steps. - Why did the adversary target these systems? This is really to better understand the adversaries motivations, which can help determine who the adversary is and also what types of data and objectives they are trying to achieve. - How did the adversary gain access to the compromised systems and applications? This is arguably the most important question and is key in remediating the breach and cutting off the attackers’ access. Understanding how attackers were able to exploit the environment enables organizations to deploy counter measures and remediate vulnerabilities to stop the current attacker and help prevent other attackers from using similar techniques to gain access. Once all that is determined, the next step is to figure out the best way to stop or slow the bleeding. This will depend on the adversary and how long this breach has been active. If you know this is the first time they’ve come into the environment and have only been in for 24 hours or less with minimal actions taken, it’s advisable to cut off access immediately. But if the breach has gone on over six months or longer, it’s likely they have multiple ways to get back into the environment, and you need to assess those before you fully engage. If the compromise has occurred for a larger period of time, it’s critical to put some mitigating controls in place, but you want to be careful — you may not want to totally cut off the adversary, because if you tip them off, they could go dormant — or worse, become malicious and destroy evidence. That can really complicate an investigation. How does a company organize the remediation efforts? How do they communicate what’s happened? DC: There are three levels of communication that are very important in these situations. First, you need an internal communications plan. There will be multiple teams within the organization responding to a breach. Maybe that’s because you need to take forensic images of a particular system or you need to collaborate between the security and IT teams. Whatever it is, an internal communications plan has to be in place, has to be understood and has to be executed so everyone is working together. Secondly, you have to think about what to tell your customers. Is it possible that whatever has happened is impacting them — not in terms of their data being out there, but has the adversary been able to move from your environment to a customer environment? Do you need to be actively communicating from an incident response perspective to your customers? Finally, there’s the legal side. What are you obligated to tell people, what is the right thing to do in terms of transparency, when do you make those calls, when do you speak to the press, etc. A lot of the time, security people will assume the worst — you’ll see something and be pretty convinced there’s been a data exfiltration and then it will turn out later that wasn’t the case. I‘ve seen that many times, and so it’s important to have the communication piece buttoned up and be clear about what you’re saying, otherwise you can make things worse. Are the first 24-36 hours really key? TM: Yes. That’s when it’s time to get all the appropriate parties into a war room — a large conference room or a digital platform where people can talk about the situation. The goal is to keep the lines of communication open between teams. Typically, these are out-of-band types of communication, because if you have an adversary in your environment, you don’t know if email or other methods of communication have been compromised. So it’s key to develop a plan of action around how to divulge information to your teams. What can be done to help prepare for a breach? DC: When I presented at Solve New York, Sean Wessman, the principal and cybersecurity leader for Automotive and Transportation at EY, described an incident he responded to; when he arrived in the building, people were walking down the halls crying, because they thought it was going to be this Armageddon event for the company. It’s not uncommon for people to have an emotional reaction to mistakes that may have been made — people take it personally. If you haven’t prepared for it, it’s during this period that people aren’t thinking straight, and things can happen that result in litigation. Someone tries to cover something up, someone tries to fix something without understanding the implications of what they’re doing — these are the things that can come back and bite you. You must try to prepare for every eventuality, so when you’re reacting, it’s like a drill, it‘s muscle memory, as opposed to an emotional response, which is what happens most of the time. My advice is to not just think about the security team but also how to support the security team, and all the peripheral things that need to happen to make an incident response effective. So that when people have to deal with it, they don’t feel like they’re doing it the first time. It’s not “oh my god,” it’s “oh my god, I know what to do.” How do businesses improve operational resiliency? DC: Generally, we think of operations in three layers — there’s maturity, which is what you’ve implemented from a people, process and technology perspective. There’s effectiveness, which is your ability to deliver the potential of what you’ve built. And then there’s resiliency, which is your ability to deliver under stress and under pressure. The resiliency piece is what’s important in these situations. This is where things go wrong, where people get emotional and tired and make bad decisions. In all of my experience, I haven’t found a better way to prepare for that than practice. Most companies don’t practice at all – they put things in place they think will protect them then cross their fingers, but don’t think about what to do when things do go badly. If you haven’t thought through and processed what’s going to happen when you execute on something, then you’re really trusting to luck. Even the most forward-thinking companies that do war gaming and take this seriously, nine times out of 10, they’re only testing the security operations center. They’re not testing their response on an enterprise level. I know I’ve said it before, but that is the stuff that gets you sued – it’s mistakes you make there that get you into trouble. Thank you both! Still have questions? Visit Rackspace to find out more about our managed security services and the ways we’re helping businesses prepare for the ever-evolving data breach threat. And keep an eye on this space for more on the activities we’ll be doing during National Cybersecurity Awareness Month in October.
https://www.rackspace.com/en-gb/blog/behind-scenes-data-breach-5-questions-managed-security-team
Laboratory users should use this information to supplement their Safety Plan for their specific operations and to correlate those operations with this manual. Assistance in developing specific safety plans is available from the EH&S office. This Laboratory Safety Manual is intended to meet the requirements of the Federal Laboratory Safety Standard. Category: Laboratory safety manual pdf Just Now Webfiles.ehs.ufl.edu Show details the basic safety policies outlined in this manual. An annual Laboratory Safety Survey is performed by EH&S to verify compliance with the policies set out in this manual as well as compliance with safety programs pertinent to the type of research conducted and agents used in the lab. If a safety issue is observed the surveyor will Category: general lab safety manual 5 hours ago Safety.duke.edu Show details • Read and be familiar with this section of the Laboratory Safety Manual. • Train laboratory employees and students when there is new laboratory-specific safety information or when a new employee or student is assigned to the laboratory. Document training as described under Laboratory-specific Training. Training must be documented for all Category:: User Manual 2 hours ago Osha.gov Show details hazards present in the laboratory where it is to be used. Laboratory personnel must receive training regarding the Laboratory standard, the CHP, and other laboratory safety practices, including exposure detection, physical and health hazards associated with chemicals, and protective measures. The Hazard Communication standard (29 CFR 1910.1200) 1 hours ago Manualstemplate.com Show details Laboratory Safety Manual Template. It is one of the primary responsibilities of a laboratory to provide a safe and healthy laboratory atmosphere for its faculty, staff, students and visitors. You can find Laboratory Safety Manual Template here. The major purpose of the Laboratory safety is to minimize the risk of injury or illness to laboratory ("HTML/Text")Show more 2 hours ago Safetymanualosha.com Show details Free Safety Manual Downloads. Download free toolbox talks, templates, signage and more. If you’re looking for a safety manual template, a good place to start is with OSHA’s small business handbook. PDF Download Small Business Handbook – Word. 6 hours ago Hemic.com Show details GENERAL INDUSTRY SAFETY MANUAL INJURY/ILLNESS PREVENTION MANUAL GUIDELINES DISCLAIMER: Information provided in this writ ten material should not be considered as all encompassing, or suitable for all situations, conditions or environments. Each company is responsible for implementing their own safety/injury/illness prevention program … Category:: Ge User Manual Just Now Dilipbuildcon.com Show details ENVIRONMENTAL HEALTH AND SAFETY MANUAL Page 5 7.0 General Safety Rules Each employee is to follow safety rules. Every employee should consider it as a part of his duty to work safely jobs Should insist on the observance of safe practice by fellow workers. 6 hours ago Wrla.org Show details Health & Safety Manual Page 9 of 20 Responsibilities Our safety program is the responsibility of all levels of company employees. The chain of responsibility is as follows. 1) Warehouse staff and delivery driver report to the warehouse supervisor. 2) Warehouse supervisor, sales staff and suppliers report to the safety 1 hours ago Scu.edu.au Show details Health and Safety Guidelines Laboratory Safety Manual. Southern Cross University - Laboratory Safety Guidelines 1-2 . Southern Cross University - Laboratory Safety Guidelines 1-3 SCU Laboratory Safety Guidelines Table of Contents 1 INTRODUCTION 1-8 2 GLOSSARY 2-1 3 RESPONSIBILITIES 3-1 3 hours ago Astate.edu Show details throughout this manual, the general rules for laboratory safety are as follows: Avoid ^routine _ exposure. Do not smell or taste chemicals. Use a hood if the TLV (available on the SDS) of a substance is <50 ppm. Do not apply cosmetics, eat, drink, smoke or chew in laboratories. Do not store or handle food or beverages in laboratories. Category:: Tec User Manual 7 hours ago Www2.lbl.gov Show details 1.1.1 The purpose of this Electrical Safety Manual is to establish Berkeley Lab site-specific electrical safe work practices that meet regulatory requirements and match the types of hazards found on site. 1.1.2 The electrical safe work practices prescribed in this manual are mandatory, unless specifically indicated 7 hours ago Algomau.ca Show details manual: the faculty and staff of the Department of Biology and the Department of Human Resources. Algoma University’s Laboratory Health and Safety Manual’s general forms and content were additionally shaped by similar manuals from Wilfred Laurier University, The University of Guelph, Lakehead University and the University of Western Ontario. Category:: Lg User Manual 4 hours ago Ehs.washington.edu Show details Welcome to the UW Laboratory Safety Manual (LSM). Please bookmark this page electronically or print a copy of the complete LSM and make it available to laboratory staff. Staff in UW laboratories using hazardous chemicals must have access to a copy of the manual and the supplemental laboratory specific information. Just Now Infolific.com Show details Safety can be achieved through a systematic approach to evaluating risks and seeking solutions to eliminating them. This begins with all members of an organization that wish to create a safe and productive work environment. Although it may seem that increasing safety on the job will cost more, in the long run it is financially worse if 5 hours ago Wssu.edu Show details Winston-Salem State University Laboratory Safety Plan . SIGNATURE and ACKNOWLEDGEMENT PAGE . Authorization [This section is based upon your specific laboratory setup] All members of the [Principal Investigator’s] Lab who have signed the list below are approved for entry into Room [XXXX] while work with BSL [1 or 2] agents is in progress. 2 hours ago Sampleformats.org Show details 10+ Safety Manual Templates. The safety manual template contains instructions, policies, and procedures which a company adopts regarding the security of its employees. The main objective of having this document is to ensure the safety of employees at workplace. These manuals are important especially in industries for construction. 9 hours ago Safetyhub.co.nz Show details The Health and Safety (H&S) Manual details our commitment and the practical steps we have taken to prevent harm to all of our employees, contractors, visitors or any other person. This Manual is aimed at providing the ‘need-to-know’ information for the majority of employees. 8 hours ago Aphl.org Show details or one quality manual with multiple process management appendices to address each accredited area of the laboratory. This template follows the latter option to allow each appendix to be updated independently during annual updates. TITLE PAGE: The title page should contain the following: Minimum: • Title of the manual • Name and address of 6 hours ago Riskmanagement.nd.edu Show details Laboratory Safety Manual including the Chemical Hygiene Plan Revision Date: April 2019 Owner: RMS/Lab Safety/Chemical Hygiene Officer Page 5 of 52 4.1.4 Conducts audits of laboratories, tracks corrections of deficiencies and validates laboratories as described in the Laboratory Integrated Safety Plan (LISP). 3 hours ago Sifacilities.si.edu Show details Attachment 1: Laboratory Safety Plan Guidance Manual (SUPERCEDES 2005 Lab Safety Manual) Appendix A. Laboratory Safety Plan Template Appendix B. Interactive NFPA diamond Appendix B1. NFPA Diamond Codes Appendix C. Job Hazard Analysis for Laboratories Appendix D. Technical Guidance on Hazard Identification and Control 1 hours ago Safetyrisk.net Show details Free Safety Manual Template. “Safety Measure” are providing their 250 page Safety Manual absolutely free – it doesn’t get any better than that! The manual has been expertly developed by Safety Guru, Doug Wakefield. It contains most of the critical elements required for an effective safety system for virtually any size business. Just Now Dept.harpercollege.edu Show details Environmental Health & Safety Procedure Manual 6 1.1 PURPOSE OF THE MANUAL This Environmental Health and Safety Procedure Manual (EH&S Manual) outlines procedures, rules and regulations governing health, safety and environmental protection in which to follow while working at Harper College. The EH&S Manual is maintained by the Manager of Just Now Fda.gov Show details : Laboratory worksheets, records, memoranda, and notes, or exact copies thereof, that are the result of original observations an d activities of a laboratory study and are necessary for the 9 hours ago Ehs.unc.edu Show details Appendix 1-A: Completing the Laboratory/Radiation Worker Registration Form. Appendix 1-B: Request for Monitoring. Appendix 1-C: Request for Medical Consultation or Examination. Appendix 1-D: UNC-Chapel Hill Laboratory Safety Self-Inspection Checklist. Chapter 2: Laboratory Safety Plan. Introduction. Schedule A: Laboratory Project Information. 1 hours ago Vectorfantina.blogspot.com Show details Laboratory Safety Manual Template : Laboratory Safety Manual /. Laboratory safety manual the information provided in the uc davis laboratory safety manual, which contains the campus chemical hygiene plan . The lsm serves as a resource for identifying and evaluating the nature of potential laboratory hazards, as well as . Just Now Mssu.edu Show details academic activities occurring in the lab. 2. No lab user shall infringe upon the privacy, rights, privileges, health, or safety of other lab users. 3. All faculty, staff and students must complete the SCICE orientation prior to using the equipment. 4. No eating or drinking is allowed in the SCICE. 5. 1 hours ago Ehs.stanford.edu Show details The Radiation Safety Manual is published and copyrighted by Stanford University. For more information and updates on health and safety, visit the EH&S website: Setting up the radioactive materials laboratory 44 Setting up the radiation device laboratory 45 Signs and labels 47 Personnel monitoring 47 Category:: Iat User Manual 2 hours ago Ehs.yale.edu Show details Always wear long pants, safety glasses, and a lab coat when working with hazardous materials in the laboratory. Wearing the proper protective clothing is the best way to protect yourself while working in the laboratory. Scan here for more information on laboratory safety asses, and ardous thing is hile Yale Environmental Health & Safety 7 hours ago Alabamapublichealth.gov Show details A written procedure manual containing procedures for all activities of the ACHDLS will be maintained and readily available at all times to personnel in each testing site. The manual will be reviewed annually by the laboratory director and/or the technical consultants. C. Quality Control (QC) Assessment 1. 4 hours ago Static.training.nij.gov Show details pdi_lab_userguide.pdf President's DNA Initiative - DNA Analyst Training Page 3 of 13 The Laboratory Training Manual uses the Scientific Working Group on DNA Analysis Methods (SWGDAM) Training Guidelines as a reference for establishing a training program. 8 hours ago Safetyculture.com Show details Laboratory Inspection Checklist. A laboratory inspection checklist is used by safety inspectors to verify the safety of a lab. This laboratory inspection checklist includes emergency preparedness, housekeeping, compressed gasses, mechanical hazards, electrical hazards, spill clean up, lab hoods, personal protective equipment, chemical storage, and … 7 hours ago Cdc.gov Show details safety and health protection for teachers and other school system employees. Some States (North Carolina, for example) require school systems to abide by State regula-tions, which are similar to the OSHA Laboratory Standard (29 CFR 1910.1450). All safety programs must actively involve the school administrators, supervisors, 6 hours ago Columbus.gov Show details ment and facilities that promote safety and injury prevention. Some health and safety programs will differ between divisions. Be familiar with and follow safety programs specific to your division or facility. Page 3 City of Columbus The purpose of this handbook is to pro-vide general health and safety knowl-edge to all City of Columbus (City) em- 5 hours ago Cartercenter.org Show details Laboratory accidents and safety 102 5.1 Laboratory hazards and accidents 102 5.2 Factors contributing to laboratory hazards 108 5.3 Firs aid for laboratory hazards 109 5.4 Safe use and storage of chemicals and reagents 114 5.5 Planning for safety 119 5.6 General precautions for the avoidance of laboratory accidents 121 4 hours ago Www2.lbl.gov Show details Refer to the PUB 3000 Construction Safety Requirements Manual for -specified controls. Yes No Hazard/Activity with specific -based control measures. PUB 3000 Chapter 10 construction requirements manual unless noted LBL-issued Permit required Attach copy of Subcontractor Program or Project Plan addressing this activity Asbestos use, alteration 1 hours ago Who.int Show details health harm. This edition also includes safety information from the 1997 WHO publication Safety in health-care laboratories (1). The third edition of the WHO Laboratory biosafety manual is a helpful reference and guide to nations that accept the challenge to … 2 hours ago Apps.ecology.wa.gov Show details e) Located in the lab are copies of the CWWTP discharge permit, "Standard Methods," applicable EPA meth ods, this QA Manual, and, in a readily available binder, safety data sheets for all potentially hazardous chemicals used in the lab. 4 hours ago Safetymanualosha.com Show details We have and will continue to maintain a Safety and Health Program designed to train our employees to follow safe practices, and to recognize and correct unsafe working conditions. Safety is a part of each employee’s job. Active participation and adherence to the Safety Program is a condition of each employee’s employment. 2 hours ago Template.net Show details 29+ Lab Report Templates – PDF, Google Docs, Word, Apple Pages. In the scientific community, a lab report sample gives the guidance needed by any researcher so that they can have a sensible result of their experimental research whether it supports their study or not. This sample laboratory report template can be opened using Microsoft word Category:: Apple User Manual 8 hours ago Dentalclinicmanual.com Show details Policies & Procedures Manual (Template) January 2015 . P a g e (SNS) created this template to assist safety net dental clinics in establishing their own policies and procedures manual. We encourage clinics to carefully review the contents of this document and modify them Laboratory work for the fabrication of removable and fixed Just Now Ehs.cornell.edu Show details The purpose of this manual is to meet the basic regulatory requirements of the OSHA Laboratory Standard for the development of a Chemical Hygiene Plan and to provide laboratories with useful recommendations that can help achieve compliance with the intent of the OSHA Lab Standard. Throughout this document, areas where regulatory or University 2 hours ago Safetyrisk.net Show details Free Health and Safety Manual Template. Safety Manual Template. Doug Wakefield from Safe Measure has developed this excellent manual, over many years, while providing health and safety consulting services and training to a range of industries and at all organisational levels. The document is in Word format and can be easily modified, cut and 7 hours ago Template.net Show details The free medical laboratory template is the most used template that has various themes and page setup to include the finest detail of your research and development. The template opens with a welcome page, gallery that can include all your research photographs and a contact page to include detailed description about your location and also 7 hours ago Framerscouncil.org Show details Home National Framers Council 8 hours ago Ehs.princeton.edu Show details The Princeton University Radiation Safety Manual is a handbook of procedures and useful information for the radiation worker who uses either radioactive materials or radiation-producing machines in a laboratory setting at Princeton University. The Manual also reflects the requirements of relevant federal and state regulations. Links to LSM Sections Table of Contents Emergency Information ( PDF, Word) ... Section 1 Laboratory Responsibilities Section 2 Chemical Management Section 3 Chemical Waste Management 14 more rows ... Laboratory Health and Safety Checklist A laboratory health and safety checklist is used by lab workers to determine if a lab is safe before use, especially in an academic setting. The World Health Organization (WHO) has long recognized that safety and, in particular, biological safety are important international issues. WHO published the first edition of the Laboratory biosafety manualin 1983. There are a number of regulations and guidelines concerning laboratory safety. The primary regulation is the Occupational Safety and Health Administration (OSHA) Lab Standard (29CFR1910.1450); however, this is not the only source of requirements for working safely in the laboratory.
https://www.sitespk.com/laboratory-safety-manual-template/
Surfer'S Row - San Clemente33.40119, -117.59538 Surfer'S Row apartment provides good lodging for 7 guests in San Clemente. The property is located 12 km away from The Coach House Concert Hall. San Clemente city center is 4 km away. Serving a wide range of dishes, Cafe 207 and Adele's Cafe can be reached within 5 minutes’ walk. John Wayne airport can be reached in 45 minutes by car. Rooms This property features climate control, cable TV with on-demand movies, a private safe, pay television and TV with satellite channels in rooms. The apartment offers 3 bedrooms. Guests can benefit from 2 bathrooms with a shower and a bidet. Eat & Drink There is a full kitchen fitted with a microwave, a dishwasher, coffee/tea makers, a fridge and a stove. Relax This apartment features a balcony. Guests will appreciate a patio and a golf course available on site. Internet High-speed internet access is available in the hotel rooms for free. Wireless internet is available in the entire hotel for free. Guest Parking Private parking is possible on site for free.
http://surfer-s-row-apartment-san-onofre.booked.net/
Other major (if applicable): Minor(s) (if applicable): Background Ever since humans began to settle into larger, denser populations, we have been implementing infrastructure projects in an attempt to control the surface-based hydrologic system and ensure society has a constant and abundant supply of fresh water. These projects have been implemented on a variety of scales, from giant dams hundreds of meters high capable of holding back multiple years’ supplies of water to small irrigation channels supporting a single farm. For the vast majority of this history, the outcome of the effort has been focused on meeting the anthropogenic needs of agriculture and municipalities. River basin impact increases with economic activity (Nilsson et al. 2005), and this economic growth driven mindset has led to certain impacts on ecological processes, geologic processes, and human well-being caused by the construction of dams, stream channel modification, and land use changes. Although all three of these causes play a role in impacting river systems, large scale river systems are mainly impacted by the construction of dams, and environmental flows are usually implemented by regulating water released from dams. In the United States, all watersheds larger than 2000 square kilometers, about half the size of Rhode Island, have some dams (Graf 1999). In addition, just 3% of dams in the US account for 63% of the country’s total storage (Graf 1999). Although the dam building era is essentially over in the United States (Graf 1999), large-scale development of the surface-based hydrologic system in other parts of the world continues. There are over 45,000 dams worldwide that are together capable of holding back over 15% of the total annual global river runoff (Nilsson et al. 2005), and less than 35% of the world’s large river systems (LRS) remain unmodified by humans. The ecological and geologic impacts of this fragmentation and flow regulation due to dams are numerous. The eight LRSs that span seven or more biomes are all strongly or moderately affected (Nilsson et al. 2005). The fragmentation of rivers has a huge impact on the ability of fish to migrate upstream and downstream. In their undammed state, rivers generally undergo large fluctuations in discharge, temperature, and sediment supply depending on the season. However, downstream from dams, these factors stay relatively consistent, and often even experience an inversion of the natural regime as water is released downstream for agricultural purposes during the drier season (Arthington 2012). River reaches below hydroelectric dams can experience an extremely sporadic flow regime that varies daily as the need for electricity fluctuates. Together, these highly unnatural alterations, or lack thereof, have negative impacts on the ecology of the river that is so used to the natural variance (Arthington 2012). The concept of environmental flows began as a way to sustain ecological processes on top of providing water for anthropogenic use. They were thought to be implemented as a baseflow requirement, meaning the discharge of the river cannot fall below a certain amount (Acreman et al.). More recently, however, it has been recognized that environmental flows ought to follow this unimpacted flow regime of high flows and low flows in order to successfully sustain its ecosystem (Acreman et al. 2014). In addition to sustaining ecological and geologic processes through environmental flows, there has been a recent surge in the concept of environmental flows providing ecosystem services to support human well-being (Anderson et al. 2019). A significant new element of the 2018 Brisbane Declaration and Global Action Agenda on Environmental Flows is the emphasis on including people in the environmental flow discussion (Anderson et al. 2019). Therefore, the contemporary definition of environmental flows takes this into account. The social and cultural needs of riparian communities vary dramatically. Historically, the most common “need” other than water and electricity supply that was taken into account when developing rivers was preserving their natural beauty and characteristics for people to enjoy and recreate (Anderson et al. 2019). More recently, environmental flows have taken into account less visible relationships between people and rivers (Anderson et al. 2019). The use of rivers for transportation is another factor that should be taken into account with environmental flows (Anderson et al. 2019); the water level of a river needs to be at a certain height for it to be navigable. Rivers as being sacred is a concept that is also increasingly being recognized as an important aspect of environmental flows. Religious groups develop “customs, rituals, and philosophies that reflect and align with the natural rhythms of the river” (Anderson et al. 2019, 11). A key component of thinking of rivers as social and cultural also involves respecting the rights and needs of indigenous groups through the lense of all of these concepts, who have been benefiting from what rivers provide long before experiencing these more modern modifications. Although controversial, another way to attempt to restore a river to its natural state is through dam removal. The long term effects of dam removal include a large increase in biodiversity as the riparian ecosystem is allowed to restore its natural processes (Bednarek 2001). These effects take place on a larger scale and longer time frame than any environmental flow ever would, but conversely limit the possibility for anthropogenic use. An identifiable short term impact on the riparian ecosystem is an increase in sediment supply that may cause suffocation and abrasion, but previously observed dam removals have shown that this occurs over a very short time frame following the removal (Bednarek 2001). Designing environmental flows to accommodate these varying needs can come in different forms depending on the intended outcome of the flow. Acreman et al. (2014) outline two different types: the natural flow regime paradigm and the designer paradigm. The former attempts to maintain a flow regime as close as possible to the natural flow regime in order to maximize the conservation of ecological species and systems (Acreman et al. 2014). The latter attempts to design a flow regime to “achieve specific ecological and ecosystem service outcomes”, and is more realistic for heavily modified river systems (Acreman et al. 2014). Key questions - Descriptive: - What are the key processes that alter natural flow regimes at different scales? - Explanatory: - Why do humans engage in altering the natural flow regime of rivers? - Evaluative: - Who stands to benefit from the implementation of environmental flows? - Instrumental: - How can environmental flows be implemented in order to balance the needs of both humans and riparian ecosystems? Related courses - GEOL 150 – Environmental Geology – fall 2020 – This course relates geologic processes with human activity and includes consequences of dams and channel modification. - GEOL 280 – The Fundamentals of Hydrology – fall 2019 – This course goes into detail on the science of fresh water and provides information on hydrologic processes. - GEOL 340 – Spatial Problems in Earth System Science (GIS) – spring 2019 – This course also relates major earth systems with people and is focused on developing analytical skills, primarily spatially. - ENVS 460 – Topics in Environmental Law and Policy – fall 2021 – This course is highly applicable to environmental flows, as it includes water policy which can be connected to environmental flow policy. Breadth courses Here are the required breadth courses I will include in my ENVS major/minor: CHEM 110, GEOL 170, ECON 260, SOAN 265, HIST 239, PHIL 215. These are in addition to my ENVS core courses, and the area of interest courses I propose above. Revisions to date 17 March 2020 feedback from Liz Safran - Describe more of a range of scale instead of just jumping right into large river systems. Cited references - Acreman, Mike, Angela H Arthington, Matthew J Colloff, Carol Couch, Neville D Crossman, Fiona Dyer, Ian Overton, Carmel A Pollino, Michael J Stewardson, and William Young. 2014. “Environmental Flows for Natural, Hybrid, and Novel Riverine Ecosystems in a Changing World.” Frontiers in Ecology and the Environment 12 (8): 466–73. https://doi.org/10.1890/130134. - Anderson, Elizabeth P., Sue Jackson, Rebecca E. Tharme, Michael Douglas, Joseph E. Flotemersch, Margreet Zwarteveen, Chicu Lokgariwar, et al. 2019. “Understanding Rivers and Their Social Relations: A Critical Step to Advance Environmental Water Management.” WIREs Water 6 (6): e1381. https://doi.org/10.1002/wat2.1381. - Arthington, Angela H. 2012. Environmental flows: Saving rivers in the third millennium. Berkeley: Univ. of California Press. https://doi.org/10.1525/california/9780520273696.001.0001. - Bednarek, Angela T. 2001. “Undamming Rivers: A Review of the Ecological Impacts of Dam Removal.” Environmental Management 27 (6): 803-14. https://doi.org/10.1007/s002670010189. - Graf, William L. 1999. “Dam Nation: A Geographic Census of American Dams and Their Large-Scale Hydrologic Impacts.” Water Resources Research 35 (4): 1305–11. https://doi.org/10.1029/1999WR900016. - Nilsson, Christer, Catherine A. Reidy, Mats Dynesius, and Carmen Revenga. 2005. “Fragmentation and Flow Regulation of the World’s Large River Systems.” Science 308 (5720): 405–8. https://doi.org/10.1126/science.1107887.
https://envs.lclark.edu/220/area-of-interest/environmental-flows-finding-the-balance-in-fresh-water-use/
Greetings Raiders! This is the KING’s RAID Studio. We have been combing through the feedback that you had provided on the first Developer Talk and took to heart the feedback about it being about time that we actually followed up on what we had talked about. We would also like to re-emphasize that our intentions of taking your feedback into consideration while preparing future content and updates. Without further ado, let’s start November’s Developer Talk. Among the feedback that you had provided, we would like to talk about the following 3 issues and development plans for them. 1. Hero balancing isn’t being done in a timely/periodic manner. 2. Farming Technomagic Gear is too difficult/inefficient. 3. The game client is too large and lags too much. ▌ Hero balancing isn’t being done in a timely/periodic manner. ‘There aren’t enough useful Heroes when clearing the Trail of the Sky’, ‘There are too many places where melee dealers are at a disadvantage’, ‘Older Heroes are being replaced by new Heroes and are becoming obsolete’ are just a few bits of feedback that we have been receiving a lot of. We would like to apologize for this as this has been an issue that has been popping up for a long time without much progress in actually solving the issue. To cut to the chase, we are preparing to re-balance 16 Heroes during the update on November 10th (Tue). This update aside, we fully understand that it is just as important to continue with the Hero balancing in a timely manner. We also realize that this is not the first time we have made these promises and will humbly accept any criticism. We know that the only way to regain your trust will be to show continuous balance updates and will strive to balance Heroes in a more periodic fashion. ▌ Farming Technomagic Gear is too difficult/inefficient. Right after the Technomagic Gear was added in the Chapter 10 update, we decided that we needed more data to see if it conformed to the concept we had developed for the gear. Statistically we see more Raiders clearing the Technomagic Kingdom Raids but also feeling the increased burden of farming the Technomagic Gear and we fully understand and empathize with the pressure you must be feeling. As such, we are looking for ways to reduce the amount of randomness that is currently in the farming process. While it would be best to improve and implement it immediately, we would like to humbly ask for your understanding as it may take a bit longer than expected. Our current goal is to implement the changes before mid-December. ▌ The game client is too large and lags too much. There are 2 main problems with regards to the game client. First of all, we are continuously resolving issues with memory leaks in order to combat the increase of required memory capacity. We plan on providing a new build for the game on November 3rd and 17th in order to improve the client structure and separate the resources required for Low and Recommended settings in order to provide a more stable gaming environment. However, we also need to find an answer to solve the lag experienced during battles. The reason behind the lag or heat during battles is because there is too much being processed. This is due to there being an increase in required process power due to Heroes being released with diverse combat mechanics in order to provide a more dynamic style of battle. We are constantly pondering how to solve this issue. For now, we are researching how to lighten the combat structure which has become much more complex than it used to be. Unfortunately, we believe that it may take a while to do so and then fully test the results. This is another issue to solve on our to-do list. Apart from the aforementioned issues, these are a few points of feedback that we wish to address before mid-December. Ⅰ. Renewal of the monthly Roll Book rewards Ⅱ. Increased Gold rewards for certain Raids Ⅲ. Reworking the Ether Enhancement costs Ⅳ. Increasing the chance of obtaining a Soulstone via Soul Judgement The following are issues that we would like to also address but are exploring the feasibility to depending on how things pan out. A. Adding Turbo Battle or Dispatch functions to Devourer Shakmeh & Raids B. Improving Gear Preset related lag issues We would love nothing more than to resolve as many issues as possible, there are certain issues that require the base structure to be changed before they can be fixed. As such, we are constantly discussing the possible schedules and methodology. While we cannot currently provide a concrete answer as to what we will do, we will continue to look for ways to resolve these issues as well. We would have preferred to have been able to share this second episode earlier but it was unfortunately delayed a bit to today. We will continue to provide our thoughts and future plans even if it does take a while to get them all out on paper and will strive to make a KING’s RAID which encompasses your feedback along with our vision. Thank you.
https://kr-official.community/kings-raid-studio-november-3rd-developer-talk/
Ogre-faced spiders are strange looking animals that live in tropical forests. They look like an ogre because their faces are dominated by two huge eyes. These eyes are two-thousand times more sensitive than the human eye under low-light conditions, making them perfectly suited for hunting at night. Each night, the spider hangs suspended from a frame web, waiting for an unfortunate insect. Then it pounces and snares its prey with a sticky web held between the front four of its eight legs. Sometimes the spider lunges downward to catch prey off the ground. But, they also make backwards strikes, doing a back flip to snatch a flying insect out of mid-air. These strikes couldn’t be guided by vision. In 2020 a team of neuroethologists reported that the ogre-faced spider uses sound to guide its back-flip strikes. The researchers discovered the spiders’ sensitivity by using electrodes to show that cells in their legs and brains responded with electrical activity when they played sounds to the animal. The frequencies they used included those found in the buzzing of flying insects. Next, the researchers played these same sounds to ogre-faced spiders in the field and in the carefully acoustically-controlled circumstances of the lab. The spiders responded with back flip strikes, like the ones they used to catch flying insects. This was good evidence that those strikes are indeed guided by sound. The researchers found that the spiders detect sound with organs in their legs like those many other spider species use to detect vibrations in their webs. It is not yet clear whether the spiders are actually hearing sounds in the air or detecting sound-caused vibrations in their web.
https://indianapublicmedia.org/amomentofscience/the-ogre-faced-spider-hunts-using-sound.php
The good news is that you can be kind to yourself, and achieve more, increase your wellbeing and feel more positive. A win-win! You don’t have to be self-critical to succeed. Evidence is increasing of the benefits of treating ourself kindly and with compassion, rather than being driven by an internal critic. Research* has shown multiple benefits of self-kindness including • Being more likely to adopt healthy behaviours for example exercising and a good diet, leading to improved overall health and wellbeing • More effective responses to stressful situations in daily life • Demanding less perfectionism of ourself What is self-compassion? Self-compassion is treating ourself with the same kindness that we treat others (Neff, 2011). The model Neff developed, which is used almost exclusively in research, breaks self-compassion down into six factors, divided between those that show kindness towards ourself, and those that are cold or unkind. Self-kindness means showing care and understanding towards ourselves. It is accepting ourselves and offering ourselves comfort when we need it. This doesn’t mean we accept things about ourselves we want to change, or which cause us difficulty, it about approaching this from a place of kindness, rather than being critical and judgemental about perceived inadequacies. Common humanity is about recognising that we all make mistakes and fail sometimes. We are not alone in this. It is acknowledging that humans are not perfect and that we share human experiences. It is feeling connected to others, even when facing a personal struggle. It is also about not feeling alone in our difficulties, with the distorted perspective that everyone else is coping and happy. Mindfulness is being present and balanced in our awareness, having space for a non-judgemental and objective perspective. This contrasts with over-identification when we get so caught up in our negative thoughts and emotions our ability to think clearly is restricted. What is misunderstood about self-compassion? Generally, we are brought up with the message to think of others. Social pressures and expectations mean we tend to put others first, believing it is the right thing to do. There is a fear that being kind to ourselves will seem selfish and indulgent, and these are behaviours we feel guilty about demonstrating. I have also often heard the concern that it could mean letting ourselves ‘off the hook’ when things go wrong rather than learning from mistakes or improving. Why self-criticism isn’t an effective strategy The evidence clearly shows driving ourself through judgement is flawed thinking. Those that are compassionate towards themselves achieve more, but from a place of kindness and self-worth, rather than criticism. For example, numerous studies* have shown the benefits of self-compassion in relation to mental illnesses including depression and anxiety. Those demonstrating self-compassion had a lower incidence of these illnesses, with the oppositive also found, i.e. those who were self-critical experienced higher levels*. Try this exercise There are many interventions and exercises that can help build self-compassion. This is a quick practical exercise which helps me recognise when I am not showing compassion towards myself. Try it. - When something doesn’t go to plan for example you forget something or make an error at work, notice how you talk to yourself. Notice the exact language you use. - Ask yourself if you would speak to someone else in the same way. - Take the same scenario and consider how you would respond if a friend or colleague had the same issue. Notice the language you use. - Now, use this awareness to reframe how we talk to yourself, offering kindness rather than judgement, recognise these things happen to people – it isn’t just you, and notice the emotion rather than getting swept up in it. Try listening to this kinder voice and see what differences you notice. Contact us for details To learn more about how to achieve self-kindness for yourself or within your organisation please call us on 01202 612 326 or get in touch. *References Gilbert, P., & Procter, S. (2006). Compassionate mind training for people with high shame and self-criticism: Overview and pilot study of a group therapy approach. Clinical Psychology and Psychotherapy, 13(6), 353–379. https://doi.org/10.1002/cpp.507 Longe, O., Maratos, F. A., Gilbert, P., Evans, G., Volker, F., Rockliff, H., & Rippon, G. (2010). Having a word with yourself: Neural correlates of self-criticism and self-reassurance. NeuroImage, 49(2), 1849–1856. https://doi.org/10.1016/j.neuroimage.2009.09.019 Magnus, C. M. R., Kowalski, K. C., & McHugh, T. L. F. (2010). The role of self-compassion in women’s self-determined motives to exercise and exercise-related outcomes. Self and Identity, 9(4), 363–382. https://doi.org/10.1080/15298860903135073 MacBeth, A., & Gumley, A. (2012). MacBeth , A ., and Gumley , A . ( 2012 ) Exploring compassion : a meta- analysis of the association between self-compassion and. 32(November), 545–552. Neff, K. D., & Pommier, E. (2013). The Relationship between Self-compassion and Other-focused Concern among College Undergraduates, Community Adults, and Practicing Meditators. Self and Identity, 12(2), 160–176. https://doi.org/10.1080/15298868.2011.649546 0 Comments Submit a Comment Unleash the power today We understand that every organisation is unique. That's why we start by simply talking and learning about you and your business. Talk with us below now. Its quick, easy, free. Click here to email us.
https://proteasolutions.co.uk/2022/01/23/the-benefits-of-self-kindness/
15 October 2008, Rome – Governments should avoid reducing aid to developing countries’ agriculture and introducing protectionist trade measures in response to the unfolding global financial crisis, FAO Director-General Jacques Diouf cautioned today. In a statement marking the 34th Session of FAO’s Committee on World Food Security (CFS) from October 14-17, Diouf warned that such steps could increase the risk of another food crisis occurring next year. That could happen despite the record 2008 cereal harvest which is now expected. According to the latest issue of FAO’s Crop Prospects and Food Situation report, production this year is forecast to increase 4.9 percent to a record 2 232 million tonnes. However some 36 countries around the world are still in need of external assistance as a result of crop failures, conflict or insecurity, or continuing local high prices, the report noted. “The great uncertainty now enveloping international markets and the threat of global recession may tempt countries towards protectionism and towards reassessing their commitments to international development aid,” Diouf said. “It would be unfortunate if this were to be the case and the recently mobilized political will towards enhanced international support for developing country agriculture were to evaporate,” he added. From pan to fire Diouf noted that the financial crisis, following hard on the heels of the soaring food price crisis which threw an additional 75 million people into hunger and poverty in 2007 alone, may well deepen the plight of the poor in developing countries. “Last year it was the pan,” Diouf said. “ Next year could be the fire”. Commodity prices are currently dropping, mainly on expectation of favourable crop prospects but also because of a slowing world economy, among other factors. This could mean a cutback in plantings followed by reduced harvests in major exporting countries. Given continuing low grains stocks, this scenario could lead to another turn of record food prices next year – a catastrophe for millions who by then would be left with little money and no credit. The impact of the financial crisis may also be felt in developing countries at the macro level, with further potentially negative effects on agriculture and food security, Diouf said. “Borrowing, bank lending, official development aid, foreign direct investment and workers’ remittances – all may be compromised by a deepening financial crisis”, he noted. Urgent action Diouf recalled that governments and world leaders agreed at an FAO High-Level Conference on World Food Security held last June that “the international community needs to take urgent and coordinated action to combat the negative impacts of soaring food prices on the world’s most vulnerable countries and populations”. A G8 Summit in Japan a month later confirmed the resolve of world leaders to address global food security as a top priority and demonstrated a growing political will to reverse disturbing trends in global hunger, he noted. “It is vital that this momentum be maintained,” Diouf said. “Unless political will and donor pledges are turned into real and immediate action, millions more may fall into deeper poverty and chronic hunger.” “The global financial crisis should not make us forget the food crisis. Agriculture needs urgent and sustained attention too to make hunger and rural poverty part of history,” he added. Contact:
http://www.fao.org/newsroom/en/news/2008/1000937/index.html
The majority of machine learning algorithms rely on the assumption that data are sampled from a fixed probability distribution. This assumption is often violated in practice, which results in classification and regression strategies that are far from optimal or even reliable. Recent work has shown that an adversary can significantly compromise the outcome of preprocessing techniques and classification. Unfortunately, a unified framework for learning in the presence of an adversary from streaming data has not been addressed despite the growing number of applications that need such techniques. This CAREER will study to understand when and why feature selection fails with an adversary. Not only will this research focus on understanding why feature selection fails, but also the transferability of black and white box attacks on feature selection. This project also proposes to develop novel methods to attack information-theoretic algorithms and approaches for resilient information-theoretic feature selection. This CAREER also addresses the problem of learning in a nonstationary environment with the presence of an adversary. A comprehensive set of synthetic and real-world benchmarks will be performed for each of the tasks. The research focuses on this unmet need and tackles a variety of adversarial learning problems drawn from different subfields of machine learning: specifically, algorithms for feature selection and learning in nonstationary environments. A successful implementation of the proposed research plan will have broader impacts on machine learning and application-driven domains. The education plan includes mentoring and training the future workforce for data scientists, who are currently in high demand, by introducing machine learning through multiple levels of education in a collaborative learning environment at the university. The CAREER project also includes integrated then integration research, revise research and learning with a community-based integration of research in education to draw more students at all levels for STEM and machine learning. This CAREER will engage K-12 students in Tucson to promote STEM education and also machine learning through hands-on teaching techniques. There will also be public talks to the data science community based on the CAREER research outcomes and the most recent trends in machine learning. This award reflects NSF's statutory mission and has been deemed worthy of support through evaluation using the Foundation's intellectual merit and broader impacts review criteria. For specific questions or comments about this information including the NSF Project Outcomes Report, contact us.
https://www.research.gov/research-portal/appmanager/base/desktop?_nfpb=true&_windowLabel=rsrRecentAwards_2&wsrp-urlType=blockingAction&wsrp-url=&wsrp-requiresRewrite=&wsrp-navigationalState=eJyLL07OL0i1Tc-JT0rMUYNQtgBZ6Af8&wsrp-interactionState=wlprsrRecentAwards_2_action%3DviewRsrDetail%26wlprsrRecentAwards_2_fedAwrdId%3D1943552&wsrp-mode=wsrp%3Aview&wsrp-windowState=
Lady Braves sweep Raton in volleyball What happened: The Lady Braves showed how good they can be in the opening District 2-3A game Saturday against the Lady Tigers in Raton, which set the tone for a 25-9, 25-17, 27-25 sweep. SFIS head coach Brian Gurule said his team served the ball very well and was balanced in the hitting attack. "We didn't take them for granted," Gurule said. "We remember how well they played against us [in the SFIS Dig Pink Classic], but I think they were even shocked the way we played in that first game." The same, though, could not be said of Game 3, as SFIS struggled with its serving and almost surrendered a 24-23 lead. Top players: Senior Cameron Conners was dominant with 16 kills to lead SFIS. Angelina Geissinger recorded eight of her 12 kills in Game 3. What's next: The Lady Braves (7-6 overall, 1-1 in 2-3A) head to St. Michael's to take on the Lady Horsemen in a big district match Tuesday. Questa 3, Monte del Sol 2 What happened:The Lady Dragons were supposed to be homecoming fodder for the Lady Wildcats, but they dragged out the nondistrict match to five games before Questa rallied for a 20-25, 25-15, 17-25, 25-17, 16-14 win in the Mini-Pit. Monte del Sol held a 12-7 lead in the finale, but a bad serve and a couple of bad passes fueled a 7-0 Questa run. The Lady Dragons rallied to tie the score at 14-all, but then stalled out. "We just had a couple of mistakes there at the end that proved to be costly," Monte del Sol head coach Chela Butler said. "Overall, I thought the girls played good, and we showed a lot of moxie in coming back [in Game 5]." Top players: Krista Terrazas led the Lady Dragons with 23 kills, and she had 14 digs on the defensive end. Daisy Ortiz had seven kills, 26 assists and 12 digs, while Xandra Zubia led the defensive front with 22 digs and recorded five aces. What's next: Monte del Sol (3-8 overall) heads into District 2-2A play with a home match against Estancia at the Genoveva Chavez Community Center. Questa (9-2) hits the ground running Monday with a nondistrict road trip to Cimarron. Boys soccer Santa Fe High 10, Capital 0 What happened: The Demons continued to roll as they needed just 45 minutes to take care of the Jaguars in a District 5-5A match at Jaguar Field. Six players scored a goal for Santa Fe High, which built an 8-0 lead at the half. Demons head coach Chris Eadie said it was a nice tuneup for district matches against Albuquerque Rio Grande on Thursday and a rematch with Albuquerque High at home Saturday. "It's a tough week that will greatly influence our district and state chances," Eadie said. "We need a huge crowd out for Saturday's [match] against Albuquerque." Top players: Alex Waggoner scored four times to pad his season total to 40, which is second-best in the state. Mike Wissman had four assists to go with one goal, while Henry Mazulis scored a pair of goals. What's next: The Demons (13-1 overall, 4-0 in 5-5A) head to Albuquerque to face Rio Grande on Wednesday to finish the first half of the district season. The Jaguars (4-8-2, 0-4) play Albuquerque Manzano at home the same day. Girls soccer West Las Vegas 1, Santa Fe Prep 0 OT What happened: The Lady Dons sneaked past the Blue Griffins by the scantest of margins — the fingertips of Prep goalkeeper Maya Crawford. That was the amount of space West Las Vegas sophomore Danielle Marquez had in overtime to get her shot past Crawford from the midfield in the 97th minute of a District 2 1A-3A match for the golden goal. The disappointing ending overshadowed a new formation Blue Griffins head coach Rennae Ross used, and she said it was more effective. “We played really hard,” Ross said. “We had more shots [on goal], and they had a few. We got overtime and that’s what happened.” (0) comments Welcome to the discussion. Thank you for joining the conversation on Santafenewmexican.com. Please familiarize yourself with the community guidelines. Avoid personal attacks: Lively, vigorous conversation is welcomed and encouraged, insults, name-calling and other personal attacks are not. No commercial peddling: Promotions of commercial goods and services are inappropriate to the purposes of this forum and can be removed. Respect copyrights: Post citations to sources appropriate to support your arguments, but refrain from posting entire copyrighted pieces. Be yourself: Accounts suspected of using fake identities can be removed from the forum.
I’m going away for the weekend to some resort place a few hours drive away. I’m going with the wife and children and a whole bunch of her friends. Basically all I have to do is get home at 6 tonight and drive down there. That got me thinking. I have never, ever selected (or really had any input into) where my family goes on holidays or for breaks together. And a quick ring round of some friends confirms the same thing. Who makes the decisions in buying your product? Who should you be marketing to? As a quick example, I remember some stats from years ago that children under the age of 15 influenced the type of new car purchased in something like 40% of cases (I’d guess it is even more today). If I had a holiday business I’d be marketing almost exclusively to women. Because in my experience, they make all of the buying decisions. Not the most scientific of research, but I’m guessing it would be an effective strategy.
https://www.tailoredmedia.com.au/blog/who-makes-the-decisions/
This collection of essays from world-renowned scholar Hans Walter Gabler contains writings from a decade and a half of retirement spent exploring textual criticism, genetic criticism, and literary criticism. In these sixteen stimulating contributions, he develops theories of textual criticism and editing that are inflected by our advance into the digital era; structurally analyses arts of composition in literature and music; and traces the cultural implications discernible in book design, and in the canonisation of works of literature and their authors. Distinctive and ambitious, these essays move beyond the concerns of the community of critics and scholars. Gabler responds innovatively to the issues involved and often endeavours to re-think their urgencies by bringing together the orthodox tenets of different schools of textual criticism. He moves between a variety of topics, ranging from fresh genetic approaches to the work of James Joyce and Virginia Woolf, to significant contributions to the theorisation of scholarly editing in the digital age. Written in Gabler’s fluent style, these rich and elegant compositions are essential reading for literary and textual critics, scholarly editors, readers of James Joyce, New Modernism specialists, and all those interested in textual scholarship and digital editing under the umbrella of Digital Humanities. Eight highly-readable essays on science fiction and fantasy writers, including David Brin, Jonathan Carroll, Samuel R. Delany, Joe Haldeman, Robert Irwin, Graham Joyce, Michael Shea, plus a major piece, "Against the New Gods," on British SF and crime writer Sydney Fowler Wright. Complete with Bibliography and Index. "What is Literature?" challenges anyone who writes as if literature could be extricated from history or society. But Sartre does more than indict. He offers a definitive statement about the phenomenology of reading, and he goes on to provide a dashing example of how to write a history of literature that takes ideology and institutions into account. Jonathan Nkhoma, in this scholarly collection of essays, enriches the reader with different interesting windows on how one can unearth the riches contained in some of the New Testament writings. The first two essays underscore the importance of placing the New Testament in a proper context and attempt to construct this context by discussing the historical background and the theological understanding of the Qumran Covenanters as derived from the Dead Sea Scrolls. Jonathan Nkhoma treats many aspects touching the proper interpretation of the New Testament writings. For example, he shows how the sacramental rituals of washing and eating together in the Qumran Community add meaning to the same rituals carried over to the New Testament. The significance of table fellowship is treated in greater depth in a subsequent essay. Throughout the various essays the question of the historicity of the various texts is treated in a succinct way and the author is able to come to some helpful conclusions drawing on the previous work of many well know scholars. The later essays tackle the very difficult question of martyrdom and Jonathan Nkhoma delves into the history of two particular cases in order to shed light on this difficult subject. All essays are written in impeccable English which flows in an easy style. This collection of essays would be invaluable to anyone who would wish to make a serious study of the New Testament writings. Posted on What Is Literature? French existentialist philosopher Sartreexplores the phenomenology of literature, focusing on the role of the artist as moral actor In Jean-Paul Sartre’s What Is Literature?, the renowned French philosopher explains his concept of the “committed” writer, linking authorship with moral responsibility. In the aftermath of World War II, Sartre argues that writing prose is a conscious act of freedom that addresses other independent humans who might be in situations of “unfreedom.” Sartre goes on to analyze the relationship between the writer and the reader, as well as the writer and “the public.” In Sartre’s view, art (literature included) is the purest way in which we practice freedom. In addition to a discussion of twentieth-century French literature, Sartre critiques surrealism and communism, while above all calling for writers to care about their art. Providing remarkable insight into the world of existential thought, reading, and writing, What Is Literature? is a vital text for any writer, philosopher, or thinker. Posted on Sammelkatalog der biographischen und literarkritischen Werke zu englischen Schriftstellern des 19. und 20. Jahrhunderts (1830-1958). Sammelkatalog der biographischen und literarkritischen Werke zu englischen Schriftstellern des 19. und 20. Jahrhunderts (1830-1958). Posted on What Is History? This highly readable new collection of thirty pieces by Michael Oakeshott, almost all of which are previously unpublished, covers every decade of his intellectual career, and adds significantly to his contributions to the philosophy of historical understanding and political philosophy, as well as to the philosophy of education and aesthetics. The essays were intended mostly for lectures or seminars, and are consequently in an informal style that will be accessible to new readers as well as to those already well acquainted with Oakeshott’s works. Early pieces include a long essay ‘On the Relations of Philosophy, Poetry, and Reality’, and Oakeshott’s comments on ‘The Cambridge School of Political Science’ through which he himself had passed as an undergraduate. The collection also reproduces a substantial wartime essay ‘On Peace with Germany’. There are two new essays on the philosophy of education, and the essay which gives the work its title, ‘What is History?’, is just one of over half a dozen discussions of the nature of historical knowledge. Oakeshott’s later sceptical, ‘hermeneutic’, thought is also well represented by pieces such as ‘What is Political Theory?’ and ‘The Emergence of the History of Thought.’ Reviews of books by English and European contemporaries such as Butterfield, Hayek, Voegelin, and Arendt also help to place him in context more clearly than before. The book will be indispensable for all Oakeshott’s readers, no matter which area of his thought concerns them most. WRITING: TEN CORE CONCEPTS is based on ten fundamental lessons-the Core Concepts-that student writers must learn to become sophisticated writers. The thorough integration of these Core Concepts distinguishes the book from all other writing guides. Most composition textbooks present far more material than students could ever grasp and retain in a single semester. That approach ultimately waters down the most essential lessons students need to learn for their different writing tasks. Emphasizing writing as an interaction between a writer and a reader, WRITING: TEN CORE CONCEPTS offers students guidance in three main aims of writing and a way to participate in the important conversations that shape our lives. Each student text is packaged with a free Cengage Essential Reference Card to the MLA HANDBOOK, Eighth Edition. Important Notice: Media content referenced within the product description or the product text may not be available in the ebook version. The major section of this volume, dealing with court trials in Mark Twain, is here published for the first time with the of the discussion of the trial of Silas Phelps. The exception account of this trial and the essay entitled "The Source of Mark Twain's Tom Sawyer, Detective" were originally published to gether as "Mark Twain's Tom Sawyer, Detective" in Studia Neophilologica in 1953 (XXV, 161-179). In this section I tried to retain at least a little of the quality of Twain in retelling the stories and on this basis alone it should be judged. The other essays appeared, respectively, in the Philological Quarterly for October, 1953 (XXXII, 353-365), the Tennessee Historical Quarterly for September, 1952 (XI, 246-253), the Southern Folklore Quarterly for December, 1953 (XVII, 241-243), the Philological Quarterly for July, 1948 (XXVII, 276-279), Modern Language Notes for April, 1948 (LXIII, 221-228), and the University of Texas Studies in English for 1949 (XXVIII, 2 0 257- 7 ). These essays are "essays," indeed, in the etymological sense of the word, in that they "try out" my ideas on different topics and different texts. As they are developed, they build up to a climactic crescendo of futility, which may be explained, in part, not by the darkening vision of a wizened and aging man, but by the gathering storms, which have tended to becloud the nation-state of Nigeria. ... The milieu from which my essays emerge has not been conducive to any optimistic or celebratory readings of texts and contexts. These nineteen essays richly confirm Gore Vidal's reputation as "America's finest essayist" (The New Statesman), and are further evidence of the breadth and depth of his intelligence and wit. Included here are his highly praised essays on Theodore Roosevelt ("An American Sissy"), F. Scott Fitzgerald, Edmund Wilson ("This Critic and This Gin and These Shoes"), the need for a new constitutional convention—as well as his controversial study of relations between the homosexual and Jewish communities ("Pink Triangle and Yellow Star"). Vidal's other subjects range from Christopher Isherwood to L. Frank Baum ("The OZ BOoks"), from the question of "Who Makes the Movies?" to the misadventures—religious and financial—of Bert Lance. Revision Revisited LINDA ALLAL* & LUCILE CHANQUOY** *University ofGeneva, SWitzerland, **UniversityofNantes, France Revision is a fundamental component of the writing process. So fundamental that for some specialists writing is largely a matter of revising, or as Murray (1978) stated, "Writing is rewriting..." (p. 85). Experience with writing does not, however, automatically translate into increased skill in revision. Learning to revise is a lengthy, complex endeavor. Beginning writers do little revision spontaneously and even experienced writers encounter difficulties in attempting to improve the quality of their texts (Fitzgerald, 1987). Although revision has been extensively dealt with in the writing and learning-to write literature, this book proposes to "revisit" theory and research in this area through a series of new contributions. The introduction begins with an overview of what revision encompasses. It then examines two parallel interrogations that under lie the chapters assembled here, namely: (1) What are the implications of research on cognitive processes for instruction in revision? (2) What are the questions raised by instructional research for the investigation of cognitive processes of revision? A final section presents the chapters of this book. Concerned with both the nature and the practice of discourse, the eighteen essays collected here treat rhetoric as a dynamic enterprise of inquiry, exploration, and application, and in doing so reflect James L. Kinneavy’s firm belief in the vital relationship between theory and practice, his commitment to a spirit of accommodation and assimilation that promotes the development of ever more powerful theories and ever more useful practices. A thorough introduction provides the reader with clear summaries of the essays by leading-edge theorists, researchers, and teachers of writing and rhetoric. A "field context" for the ideas presented in this book is provided through the division of the various chapters into four major sections that focus on classical rhetoric and rhetorical theory in historical contexts; on dimensions of discourse theory, aspects of discourse communities, and the sorts of knowledge people access and use in producing written texts; on writing in school-related contexts; and on several dimensions of nonacademic writing. A fifth section contains a bibliographic survey and an appreciation of James Kinneavy’s work. The exceptional range of these essays makes A Rhetoric of Doing an ecumenical examination of the current state of mind in rhetoric and written communication, a survey and description of what discourse and those in the field of discourse are, in fact, doing. This book is an outstanding account of the current state of using writing in service of learning. It presents psychological and educational foundations of writing across the curriculum movement and describes writing-to-learn practices implemented at different levels of education. It provides concrete applications and ideas about how to enhance student learning by means of writing. It is useful for educators, curriculum developers, psychologists, cognitive scientists, writing researchers, and teachers. Louis A. Arena University of Delaware Newark, DE This monograph contains select, revised, and invited papers which deal with the topic, Language Proficiency: Defining, Teaching, and Testing. This topic was the theme of the eighth annual symposium held at the University of Delaware. The papers contained in this volume are invited papers or were originally scheduled for presentation and/or presented at the eighth annual Delaware Symposium on Language Studies. The papers combine research con ducted in the areas of teaching, testing, and defining second language pro ficiency within the profession of applied linguistics. They are divided into three principal sections: "Applied Linguistics and Language Pro ficiency", "Language Proficiency in Reading and Writing", and "Testing for Language Proficiency". In Part I, Paul Angelis' "Applied Linguistics: Realities and Projections re the Teaching Profession'; sketches a historical portrait of Applied Linguistics, its definition, presence, and role in the profession that teaches second language proficiency. Angelis concludes that Applied Linguistics is still a young discipline in terms of substance, organization, and strategy, and that these three components will determine the prospects for the future of applied linguistics re the teaching profession. The next six papers address the issue of second language proficiency from various points of view. Kensaku Yoshida's essay "Knowing vs Believing vs Feeling: Studies on Japanese Bilinguals" concludes that some Japanese bilinguals are actually not necessarily bilingual because they very often face problems requiring other kinds of proficiency, i. e.
http://ebooksion.com/search/the-writer-s-situation-and-other-essays/
MedLine Citation: |PMID: 24016155 Owner: NLM Status: Publisher| | | Abstract/OtherAbstract: |For studying multistable auditory perception, we propose a paradigm that evokes integrated or segregated perception of a sound sequence, and permits decomposition of the segregated grouping into foreground and background sounds. The paradigm combines 3-tone pitch patterns with alternating timbres, resulting in a repeating 6-tone structure that can be perceived as rising based on temporal proximity, or as falling based on timbre similarity. Listeners continuously report their percept while EEG is recorded. Results show an ERP modulation starting at ∼70 ms after sound onset that can be explained by whether a sound belongs to perceived foreground or background, with no additional effect of integrated versus segregated grouping. Auditory grouping as indexed by the mismatch negativity did not correspond with reported sound grouping. The paradigm offers a new possibility for investigating effects of conscious perceptual organization on sound processing.| | | Authors: |Orsolya Szalárdy; István Winkler; Erich Schröger; Andreas Widmann; Alexandra Bendixen| | | Related Documents : |8008785 - Effect of relaxation training on cardiac parasympathetic tone. | 23750125 - Time, self, and intertemporal choice. 10338035 - Diurnal variation of autonomic nervous activity in the rat: investigation by power spec... 16906935 - Understanding volatility correlation behavior with a magnitude cross-correlation function. 25268915 - Evaluating classifiers to detect arm movement intention from eeg signals. 17935755 - Astronomically forced climate change in the kenyan rift valley 2.7-2.55 ma: implication... | | Publication Detail: |Type: JOURNAL ARTICLE Date: 2013-9-9| | | Journal Detail: |Title: Psychophysiology Volume: - ISSN: 1540-5958 ISO Abbreviation: Psychophysiology Publication Date: 2013 Sep| | | Date Detail: |Created Date: 2013-9-10 Completed Date: - Revised Date: -| | | Medline Journal Info: |Nlm Unique ID: 0142657 Medline TA: Psychophysiology Country: -| | | Other Details: |Languages: ENG Pagination: - Citation Subset: -| | | Copyright Information: |Copyright © 2013 Society for Psychophysiological Research.| | | Affiliation: |Institute of Cognitive Neuroscience and Psychology, Research Centre for Natural Sciences, Hungarian Academy of Sciences, Budapest, Hungary; Department of Cognitive Science, Faculty of Natural Sciences, Budapest University of Technology and Economics, Budapest, Hungary.| | | Export Citation: |APA/MLA Format Download EndNote Download BibTex| |MeSH Terms| | | Descriptor/Qualifier: From MEDLINE®/PubMed®, a database of the U.S. National Library of Medicine Previous Document: Do Ketoanalogues Still Have a Role in Delaying Dialysis Initiation in CKD Predialysis Patients? Next Document: Beliefs about the causes of success in sports and susceptibility for doping use in adolescent athlet...
http://www.biomedsearch.com/nih/Foreground-background-discrimination-indicated-by/24016155.html
U.S. hits targets around Kobani for humanitarian purposes - Allen Retired U.S. General John Allen, an envoy charged with building the coalition against the Islamic State, meets with Egyptian Foreign Minister Sameh Shukri in Cairo, October 9, 2014. REUTERS/Asmaa Waguih WASHINGTON The United States is bombing targets in Kobani for humanitarian purposes to relieve defenders of the Syrian town and give them time to organize against Islamic State militants, a senior U.S. official said on Wednesday. "We are striking the targets around Kobani for humanitarian purposes. I'd be very reluctant to attempt to assign ... a term like 'a strategic target,' or 'a strategic outcome,'" retired U.S. General John Allen, the U.S. special envoy for building the coalition against Islamic State, told reporters. "Clearly ... given the circumstances associated with the defense of that town, there was a need for additional fire support to go in to try to relieve the defenders and to buy some white space, ultimately, for the reorganization on the ground," he added. "We have picked up the tempo and the intensity of the air strikes in order to provide that white space." A U.S.-led coalition began bombing Islamic State targets in Iraq in August and extended the campaign to Syria in September in an effort to beat back the Sunni militant group, which has overrun an estimated one-third of Syrian and Iraqi territory. Allen, who is in charge of building the coalition against Islamic State, declined to be drawn on whether Turkey might allow coalition aircraft to use Incirlik Air Base for lethal strikes against the militant group. He was not asked directly whether Syrian Kurds were giving the coalition targeting information for their strikes around Kobani, as Kurdish officials say, but he suggested the United States was open to getting information from anywhere. "Obviously, information comes in from all different sources associated with providing local information or potentially targeting information. And we’ll take it all when it comes in. It’s ultimately evaluated for its value," he said. Next In World News CHATELLERAULT, France French presidential hopeful Emmanuel Macron launched a scathing attack on Friday against politicians who have failed to endorse him against far-right rival Marine Le Pen, saying they were making France "morally weak" and pandering to extremists. MANILA Southeast Asian countries have altered a statement to be issued at Saturday's ASEAN summit to include references to militarization and island-building in the South China Sea, the latest draft shows, in a move likely to frustrate Beijing. Sponsored Topics Reuters is the news and media division of Thomson Reuters. Thomson Reuters is the world's largest international multimedia news agency, providing investing news, world news, business news, technology news, headline news, small business news, news alerts, personal finance, stock market, and mutual funds information available on Reuters.com, video, mobile, and interactive television platforms. Learn more about Thomson Reuters products:
COVID-19 pandemic and the China-US trade war changed the landscape of the tech industry, causing instability in the global economics, virtualization of the work environment and scarcity of high-end electronic components. The semiconductor market highly affected, and the unprecedented chip shortage that started in 2020 continued. In this article we present the most important semiconductor trends for 2022, including the evolution of the chip shortage, the next step in Moore’s law, the arise of RISC-V architecture and new growth markets in semiconductor applications. From 2020 to now, more than 169 industries were affected by the global chip supply shortage, caused by a combination of factors, including increase in electronics demand, unstable global economics, and the COVID-19 pandemic. Moreover, because chip manufacturing requires tons of water, the production was greatly affected by the severe drought in Taiwan, which controls more than a half of the global semiconductor market. Because the production could not meet the market demand, the chips that didn’t run out of stock had their price increased way beyond the MSRP. The automotive industry alone, which absorbs 15% of the global chip production, lost more than 210 billion dollars in 2021. Although global economics is finally starting to recover from the pandemics, it is likely that the market still needs a couple of years to ease the supply deficit, thus the shortage is expected to continue up to 2023. However, several company executives and experts forecast that the situation will already improve in 2022, and both Qualcomm CEO Cristiano Amon and AMD CEO Lisa Su believe the production will catch-up with the demands after the second half of 2022, perhaps due to the deals both companies signed with Global Foundries in the second semester of 2021. The vice-president of Samsung, Han Jin-man, also believes in an increase in supply power at the second semester of 2022. On the other hand, Nvidia CEO Jensen Huang, ARM CEO Simon Segars and Intel CEO Pat Gelsinger are less optimistic, as they don’t expect any alleviation in the shortage before 2023, or at very least until the end of 2022. Either way, the consensus is that the shortage will continue throughout 2022. Nevertheless, the shortage is not bad news for the semiconductor business. In fact, the large increase in demand combined with the global production halt made the prices skyrocket, creating the perfect scenario for investors. The president of SEMI Taiwan, Terry Tsao, predicts that investments in wafer manufacturing will grow to US$ 8.5 billion in 2022. The global semiconductor market is expected to grow to US$ 601 billion, which corresponds to an 8.8% increase, according to the WSTS, mostly attributed to the sensors and logic chips category. Besides money opportunities, the shortage is forcing foundries to optimize production and consumers to search for alternatives in chip manufacturing. For instance, major foundries are investing heavily in production automation, machine learning and data analytics, which can be used to reduce production cost and increase overall throughput, without losing quality. Furthermore, the installation of new fabs is already starting in the US. At the customer size, big companies are migrating to in-house chip production and increasing the diversification of the supply chain. The urge for better distribution methods, the decentralization of chip production and the rise of AI driven manufacturing provide all the ingredients for innovation in the field. The prediction made by Gordon Moore in 1965, based purely on empirical observation, determines that the maximum transistor density inside a chip, and hence the computing power, doubles every two years. He predicted it so well that it became a law, that lived strong and well until last year. However, the director of the Microsystems Technology Office of DARPA, Robert Colwell, predicted 8 years ago that Moore’s Law wouldn’t see the light of 2022, stopping probably at the 7 or 5nm node. As we know now, TSMC announced the 3nm in 2020, overcoming the 5nm performance limitations by using the gate-all-around (GAA) technology. The giant Taiwanese company plans to start production by the end of 2022, giving at least one last breath to Moore’s prediction. Samsung also expects to produce the 3nm node in 2022. However, if the life of the law depended only on conventional monolithic chip production, it would probably not outlive its creator. This is because, besides the physical limitation of brute-force transistor shrinkage, the cost and time necessary to manufacture tech-leading nodes is becoming more and more unpractical. Thus, 2022 will probably bring the death of Moore’s law, right? Well, not according to Intel CEO Pat Gelsinger, that expects to go even faster than Moore’s law by using the chiplet technology. Chiplets divide a single die into several small dies that work together in an optimized package. 3D chiplets go one step further, and stack multiple chiplets on top of each other. Both Intel and AMD are planning to implement chiplets in the next generation of processors, with AMD having the upper hand by using 3D stacking combined with the 7nm node in collaboration with TSMC. Designing a new microprocessor is hard and requires many professionals with different specialties working in synergy. Therefore, when a designer wants to create an application, such as a new microcontroller or SoC, he selects the best suited processor architecture in the market, pays the license fee and plugs the IP core into his design. Proprietary instruction set architectures (ISA), such as Intel and ARM, completely dominated the market for several years. To sustain technological dominance, the companies fight to keep the design secrets safe, so the reasoning behind any design decision remains hidden. Although this approach is understandable from a business perspective, it makes it difficult for early-stage companies to put new devices into the market due to the costly IP fees, which in turns reduce competition and innovation. In this scenario, the RISC-V architecture was developed. The RISC-V is an open-source ISA developed at the University of Berkeley, California, based on the reduced instruction set principles. It is completely open-source and free to use, which embraces small businesses and new developers without requiring fees to use. The open-source nature allows the development of a community of different contributors, kickstarting innovation and optimization. Although still shy in comparison with the proprietary giants, the RISC-V should face an exponential growth in market revenue in the next few years, according to Deloitte Global, doubling its revenue this year in comparison with 2021. But why is the market trending towards RISC-V? The main reason is China: as the trade war with the US continues, the country is facing severe sanctions in different technological fronts, and the risk of receiving restrictions in their ISA favors the migration to open-source solutions. By implementing RISC-V in their chips, China shields itself from external influence and becomes one step closer from chip self-sufficiency. Besides China, the RISC-V market also includes start-ups and early-stage companies, but big companies are already starting to catch-up. Some of the players that are already using RISC-V designs include Samsung, Microchip, Google, Nvidia and Qualcomm. Although the future of RISC-V in the industry is still uncertain, the popularization is inevitable. For perspective, the first RISC-V smartphones are expected to be launched already in 2022. According to Applied Materials, one foundry with 50,000 wafer starts pet month consumes a terawatt-hour of energy, which is equivalent to a city with 100,000 people, and two to four million gallons of ultra-pure water a day. After the Taiwan drought significantly delayed the production of TSMC, chip makers are running towards more aggressive sustainability programs to reduce the environmental impact of chip production. For instance, Intel plans to completely migrate to renewable power sources until 2030, which would preserve 4 billion kWh of energy. Moreover, Intel intends to obtain a net positive water use , which according to them means restoring completely the water use and supporting water conservation programs. TSMC also has a 2030 sustainability plan: to reduce unit water consumption by more than 30%, increase water regeneration by 30% and improve the water pollution indicator beyond 30%. However, TSMC failed to meet sustainability objectives in 2020, and its water consumption doubled every 2 years, following the increase in chip demand. This suggests that the company may receive more pressure from the public and the government in the near future, especially due to the deals with car makers. – Going 5G: The long promised 5G network that would make the world wireless has finally arrived, and the applications go way beyond telecommunications: customized private 5G networks will bring high-speed, high-capacity, low-latency connectivity to indoors industry and government networks. The increase in 5G penetration in new smartphones will contribute to the high demand for new chips in 2022, especially for mmWave frontends and IoT devices. – Automotive: For the semiconductor industry car technology is the new playground. Radar chips, sensor, safety and more silicon are put into use in new cars. Both startup and large IDM are putting together ICs and solution for electrical cars as we speak. – Artificial Intelligence: AI, machine learning and data analyses is now present in almost any high-end smart device. The recent advancements in AI hardware and acceleration will demand a great number of specialized ASICs in 2022, promising to add more heat to the chip market. – Cloud Demand: The demand for servers is likely going to increase in 2022. The category can expect some interesting innovations, as Intel and Google recently announced their collaboration in the development of the Mount Evans, an ASIC optimized for cloud infrastructure, and Alibaba launched their new server chip, the Yitian 710.
https://anysilicon.com/5-hottest-semiconductor-trends-for-2022/
Are there safeguards at the point of operation? Are there any exposed moving parts (chains, belts, gears, fly-wheels, etc.)? Are there any other exposed mechanical parts that might be sharp or otherwise hazardous (screws, bolts, edges, etc.)? Is the machine properly anchored to the ground or other structures as needed? Are the right limit switches installed to stop operation when a limit is exceeded? Electrical Hazards Was the machine set-up according to applicable codes and standards? Is the machine grounded properly? Does the power supply have suitable fuses and protection? Are all electrical connections tight? Are there any shock hazards from open connections? Are any hazardous wires or other electrical components suitably labeled? Is the floor free of any cords where workers need to move? Other Hazards Are workers protected against noise from the machine? Is the environment conducive to safe worker functioning (temperature, humidity, radiation, etc.)? Is lighting enough to operate the machine safely? Is the floor dry and safer for worker motion? Are required ergonomic features in place (arm rests, keyboard height, display height and angle)? Protective Equipment Has the proper protective equipment been provided? What additional equipment is needed... Have the workers been trained in proper use of the protective equipment? Are workers dressed properly to operate the machinery safely (no jewelry, no loose clothing, proper footwear, hair tied back, etc.)? Maintenance and Repair Is there a maintenance log present at the machine? Is the maintenance log up to date? Are workers trained in how to review maintenance information to ensure that the machine is ready to use? Are maintenance workers trained in safe procedures such as disconnecting the machine from power sources? Safeguards Is there a master cut-off switch to stop functioning of the machinery? Are starting and stopping controls in place and reachable? Have starting and stopping controls been tested? Are there safeguards against any hazardous materials (lubricants, chemicals, scrap materials, etc.)? Are the safeguards suitable for workers of all sizes? Is appropriate emergency response equipment available? What additional equipment is needed... Is there a first aid kit (including an eyewash station) available? Training Have all workers present been trained to use the machine properly? Have all workers present been trained on the safety features of the machine (safeguards, start/stop controls, etc.)? Have all workers present been trained in the proper response for safety issues that might arise? Is the machine’s operating manual and other documentation present and current? Are operating procedures documented at the machine location? Are the electrical, hydraulic, and pneumatic diagrams for the machine available and up to date? Are all operating manuals and documentation in the languages understood by the workers?
https://www.getmaintainx.com/procedures/d/EluNT_8gi0c/machine-safety-checklist
A startup co-founded by two Penn students is measuring brain activity to help doctors develop a better understanding of mental health. Chris Molaro, a 2017 MBA graduate, co-founded NeuroFlow last year with Adam Pardes, a bioengineering Ph.D. candidate now on leave from Penn, because Molaro saw a need for improvement in mental health treatment after serving in the Army. The two bonded over a shared desire to improve technology designed to analyze mental health. The company's data analytics platform uses wearable devices to measure stress markers in real time, said Ellen McGeoch, 2016 Master of Science graduate and director of strategic initiatives and partnerships at NeuroFlow. The digital health platform is designed to assist clinicians in their decision-making processes by offering objective measurements of stress and other mental states. The tool was used in a study over the summer in the Wharton Behavioral Lab and is currently in use at the Children’s Hospital of Philadelphia and a number of private clinics in the Philadelphia area. The company has received funding and other support from accelerator programs at Penn, including Wharton VIP and PennApps. They work in conjunction with researchers at the Wharton Neuroscience Initiative. “Right now, we’re clinician facing,” McGeoch said. “People [are] using this under the care of their clinicians or with a therapist.” The goal now is to push NeuroFlow out to more medical practices to test the product as much as possible. “We need technology out there to assess and treat mental health, and it’s not something that’s been leveraged enough," Pardes said. "We wanted to change that and make a positive impact." “It’s not about replacing clinicians or making a diagnosis in five minutes, but about really trying to understand how someone’s feeling quantitatively rather than by just relying on self-reporting.” Of eight full-time employees at NeuroFlow, seven are Penn students and graduates. Most of them come from backgrounds in software engineering, bioengineering, and business. Moving forward, the company hopes to be a more active participant in campus-wide discussions about mental health. “We support the [Penn] community and are willing to help out in any way we can to spread awareness and reduce the stigma of seeking help for issues related to mental health,” McGeoch said. The company staged a demonstration for students at the College of Liberal and Professional Studies on Wednesday as a part of the school’s Wellness Week initiative and plans to continue to participate in the wider conversation surrounding mental health on campus. All comments eligible for publication in Daily Pennsylvanian, Inc. publications.
https://www.thedp.com/article/2017/11/neuroflow-wharton-philadelphia-upenn-startup-mental-health-depression
Below are the sites that perform the best in Google's search results for "trilogy". Scroll down to find list of the most popular sites targeting the keyword "trilogy", including spectrasonics.net, gateworld.net and theonering.net and to find other keywords that are targeted by the websites in this list, including december, news and star. This real-time search engine results page (SERP) from Google shows the top performing sites for "trilogy" at this specific moment. Record these rankings and track changes over time. This list shows web sites that are specifically targeting the keyword phrase "trilogy". This list is sorted by showing the most highly visited web sites first. By using a collaborative filtering method, we can identify keywords that are closely related to "trilogy". Of all the web sites that target "trilogy", these are the most commonly targeted keywords by this same group of web sites, sorted by the highest number of web site matches. The root keyword phrase "trilogy" also exists in these keywords. Drill down to see who is targeting long-tail variations off of "trilogy".
https://www.trafficestimate.com/profiles/keyword-trilogy/
Below are the sites that perform the best in Google's search results for "aircraft". Scroll down to find list of the most popular sites targeting the keyword "aircraft", including nasm.si.edu, airliners.net and rcgroups.com and to find other keywords that are targeted by the websites in this list, including aviation, airplane and airplanes. This real-time search engine results page (SERP) from Google shows the top performing sites for "aircraft" at this specific moment. Record these rankings and track changes over time. This list shows web sites that are specifically targeting the keyword phrase "aircraft". This list is sorted by showing the most highly visited web sites first. By using a collaborative filtering method, we can identify keywords that are closely related to "aircraft". Of all the web sites that target "aircraft", these are the most commonly targeted keywords by this same group of web sites, sorted by the highest number of web site matches. The root keyword phrase "aircraft" also exists in these keywords. Drill down to see who is targeting long-tail variations off of "aircraft".
https://www.trafficestimate.com/profiles/keyword-aircraft/
Mild and nutty flavored, chia seeds were cultivated long ago by the Aztecs and the Maya. The name “chia” comes from the word chian, meaning “oily” in the Aztec language of Nahuatl. The special oils in this tiny superseed are omega-3 essential fatty acids, which may contribute to the maintenance of mental function and normal heart health. Healthy chia is also high in fiber and a good source of calcium, iron and magnesium.
https://www.juthour.com/products/chia-seeds-454g
Founded in 2005, Alpha is a private, invitation-only network for founders, CEOs and thought leaders passionate about the next generation of technology. Our mission is to create the premier peer networking organization in the technology startup community and connect leaders and influencers through forums and events where they can engage in a meaningful, candid, dialogue and forge deep relationships with their peers. a network for founders welcome to alpha An Exclusive Founders' Club for Founders The idea is simple: to create an environment where leaders in tech can connect and collaborate with their peers in a private setting where they can speak candidly. Alpha curates events that foster strong professional and personal relationships. We bring together the brightest people on a subject, theme or technology trend, and let them decide where to take the conversation. We host 50+ events per year, including our Annual Alpha Founders' Summit and the Alpha Hardware Conference.
https://www.crosslinkcapital.com/alpha
BACKGROUND DETAILED DESCRIPTION Sharpness is a perceptual feature, which is determined by the human visual system. While the human eye is more sensitive to the sharpness of the luminance signal than to that of the chrominance, higher resolution images such as ,igh definition television (HDTV) images, require the co-joint enhancement of both the luminance (black and white) and the chrominance sharpness. In color television broadcasting standards, such as National Television System Committee (NTSC) and Phase Alteration by Line (PAL), for example, the limited bandwidth of the chrominance and the luminance signals produces relatively slow transitions, causing smeared edges in the received images. Various methods for sharpness enhancement have used edge transition to better improve the picture quality, but either lacked adaptability to the picture contents, degraded with noisy sequences and/or required complex hardware. Even though improving the edge transitions results in an improved overall sharpness, the lack of adaptability to the picture contents produces irritating artifacts and reduces the overall impression of sharpness improvement. FIG. 1 FIG. 1 FIG. 1 100 100 100 illustrates one embodiment of a system. illustrates a block diagram of a communications system . In various embodiments, the communications system may comprise multiple nodes. A node generally may comprise any physical or logical entity for communicating information in the communications system and may be implemented as hardware, software, or any combination thereof, as desired for a given set of design parameters or performance constraints. Although may show a limited number of nodes by way of example, it can be appreciated that more or less nodes may be employed for a given implementation. In various embodiments, a node may comprise, or be implemented as, a computer system, a computer sub-system, a computer, an appliance, a workstation, a terminal, a server, a personal computer (PC), a laptop, an ultra-laptop, a handheld computer, a personal digital assistant (PDA), a set top box (STB), a telephone, a mobile telephone, a cellular telephone, a handset, a wireless access point, a base station (BS), a subscriber station (SS), a mobile subscriber center (MSC), a radio network controller (RNC), a microprocessor, an integrated circuit such as an application specific integrated circuit (ASIC), a programmable logic device (PLD), a processor such as general purpose processor, a digital signal processor (DSP) and/or a network processor, an interface, an input/output (I/O) device (e.g., keyboard, mouse, display, printer), a router, a hub, a gateway, a bridge, a switch, a circuit, a logic gate, a register, a semiconductor device, a chip, a transistor, or any other device, machine, tool, equipment, component, or combination thereof. The embodiments are not limited in this context. In various embodiments, a node may comprise, or be implemented as, software, a software module, an application, a program, a subroutine, an instruction set, computing code, words, values, symbols or combination thereof. A node may be implemented according to a predefined computer language, manner or syntax, for instructing a processor to perform a certain function. Examples of a computer language may include C, C++, Java, BASIC, Perl, Matlab, Pascal, Visual BASIC, assembly language, machine code, micro-code for a network processor, and so forth. The embodiments are not limited in this context. 100 In various embodiments, the communications system may communicate, manage, or process information in accordance with one or more protocols. A protocol may comprise a set of predefined rules or instructions for managing communication among nodes. A protocol may be defined by one or more standards as promulgated by a standards organization, such as, the International Telecommunications Union (ITU), the International Organization for Standardization (ISO), the International Electrotechnical Commission (IEC), the Institute of Electrical and Electronics Engineers (IEEE), the Internet Engineering Task Force (IETF), the Motion Picture Experts Group (MPEG), and so forth. For example, the described embodiments may be arranged to operate in accordance with standards for media processing, such as NTSC, PAL, MPEG-1, MPEG-2, MPEG-4, the Digital Video Broadcasting Terrestrial (DVB-T) broadcasting standard, the ITU/IEC H.263 standard, Video Coding for Low Bitrate Communication, ITU-T Recommendation H.263v3, published November 2000 and/or the ITU/IEC H.264 standard, Video Coding for Very Low Bit Rate Communication, ITU-T Recommendation H.264, published May 2003. The embodiments are not limited in this context. FIG. 1 100 102 102 As shown in , the communications system may comprise a media processing node . In various embodiments, the media processing node may comprise, or be implemented as, one or more of a processing system, a processing sub-system, a processor, a computer, a device, an encoder, a decoder, a coder/decoder (CODEC), a filtering device (e.g., graphic scaling device, deblocking filtering device), a transformation device, an entertainment system, a display, or any other processing architecture. The embodiments are not limited in this context. 102 In various embodiments, the media processing node may be arranged to process one or more types of information, such as media information and control information. Media information generally may refer to any data representing content meant for a user, such as image information, video information, graphical information, audio information, voice information, textual information, numerical information, alphanumeric symbols, character symbols, and so forth. Control information generally may refer to any data representing commands, instructions or control words meant for an automated system. For example, control information may be used to route media information through a system, or instruct a node to process the media information in a certain manner. The embodiments are not limited in this context. 102 104 104 In various embodiments, media processing node may be arranged to process media information received from a media source node . The media source node may comprise any media source capable of delivering media information such as image information, video information, and/or audio/video (A/V) information. An example of a media source may include a source for video signals, such as from a computer to a display. Another example of a media source may include a source for A/V signals such as television signals. The media source may be arranged to source or deliver standard analog television signals, digital television signals, HDTV signals, and so forth. The television signals may include various types of information, such as television audio information, television video information, and television control information. The television video information may include content from a video program, computer generated images (CGI), and so forth. The television audio information may include voices, music, sound effects, and so forth. The television control information may be embedded control signals to display the television video and/or audio information, commercial breaks, refresh rates, synchronization signals, and so forth. The embodiments are not limited in this context. 104 104 102 104 In some embodiments, the media source node may include a device arranged to deliver pre-recorded media stored in various formats, such as a Digital Video Disc (DVD) device, a Video Home System (VHS) device, a digital VHS device, a digital camera, A/V camcorder, a gaming console, a Compact Disc (CD) player, and so forth. In yet another example, the media source node may include media distribution systems to provide broadcast or streaming analog or digital television or audio signals to media processing node . Examples of media distribution systems may include, for example, Over The Air (OTA) broadcast systems, terrestrial cable systems (CATV), satellite broadcast systems, and so forth. The types and locations of the media source node are not limited in this context. 102 In various embodiments, the media processing node may be arranged to receive an input image. The input image may comprise any data derived from or associated with one or more video images. In one embodiment, for example, the input image may comprise a picture in a video sequence comprising signals (e.g., Y, U, and V) sampled in both the horizontal and vertical directions. In various embodiments, the input image may comprise one or more of image data, video data, video sequences, groups of pictures, pictures, images, regions, objects, frames, slices, macroblocks, blocks, pixels, signals, and so forth. The values assigned to pixels may comprise real numbers and/or integer numbers. 102 102 102 In various embodiments, the media processing node may be arranged to perform sharpness enhancement on the received input image. The media processing node may perform adaptive sharpness enhancement using luminance transient improvement and chrominance transient improvement (LTI/CTI), for example. In various implementations, the media processing node may perform LTI/CTI processing to enhance perceived sharpness by decomposing edge information via a wavelet filter bank and adaptively changing the frequency-amplitude distribution for the edges. The LTI/CTI processing may comprise real time video sharpness enhancement, which adaptively sharpens a picture by improving the edge transitions (e.g., variable edge enhancement at different parts of the image) using wavelet transforms. The LTI/CTI processing may result in a significant enhancement of the perceived sharpness while avoiding the introduction of artifacts. The embodiments are not limited in this context. FIG. 2 FIG. 2 100 102 illustrates one embodiment of sharpness enhancement. illustrates one embodiment of sharpness enhancement using LTI/CTI processing. In various embodiments, the LTI/CTI processing may be performed a system (e.g., communications system ) and/or by a node (e.g., media processing node ). The embodiments are not limited in this context. FIG. 2 As shown in , the sharpness of an original edge (a) may be enhanced to an LTI/CTI modified edge (b). When a picture is completely plain, all sample values are substantially equal. The original edge (a) illustrates that when an edge (e.g., horizontal edge) exists, the sample values in the horizontal direction undergo an abrupt change. As shown by the LTI/CTI modified edge (b), LTI/CTI processing may make edges sharper by making them steeper or increasing the slope. The embodiments are not limited in this context. In various embodiments, LTI/CTI processing may comprise detecting a transition, calculating the length of the transition (e.g., number of samples needed to achieve the transition corresponding to an edge), and changing the distribution of the transition. For example, LTI/CTI processing may comprise tracing pixel values in a certain direction to detect the transition and calculating the steepness or slope of the edge. In various implementations, sharpness may be improved by changing the pixel values (e.g., frequency components) to change edge steepness. The embodiments are not limited in this context. FIG. 1 102 Referring again to , the media processing node may comprise multiple modules. The modules may comprise, or be implemented as, one or more systems, sub-systems, processors, devices, machines, tools, components, circuits, registers, applications, programs, subroutines, or any combination thereof, as desired for a given set of design or performance constraints. In various embodiments, the modules may be connected by one or more communications media. Communications media generally may comprise any medium capable of carrying information signals. For example, communication media may comprise wired communication media, wireless communication media, or a combination of both, as desired for a given implementation. The embodiments are not limited in this context. The modules may comprise memory which may be implemented as any computer-readable storage media capable of storing data, including both volatile and non-volatile memory. Examples of storage media include random-access memory (RAM), dynamic RAM (DRAM), Double-Data-Rate DRAM (DDRAM), synchronous DRAM (SDRAM), flash memory, ROM, programmable ROM (PROM), erasable programmable ROM (EPROM), electrically erasable programmable ROM (EEPROM), flash memory, content addressable memory (CAM), polymer memory (e.g., ferroelectric polymer memory, ovonic memory, phase change or ferroelectric memory), silicon-oxide-nitride-oxide-silicon (SONOS) memory, disk memory (e.g., floppy disk, hard drive, optical disk, magnetic disk), or card (e.g., magnetic card, optical card), or any other type of media suitable for storing information. The storage media may contain various combinations of machine-readable storage devices and/or various controllers to store computer program instructions and data. The embodiments are not limited in this context. 102 106 106 The media processing node may comprise a wavelet decomposition module . In various embodiments, the decomposition module may be arranged to receive an input image. The input image may comprise, for example, a picture in a video sequence comprising signals (e.g., Y, U, and V) sampled in both the horizontal and vertical directions. The embodiments are not limited in this context. 106 In various implementations, the wavelet decomposition module may be arranged to perform wavelet decomposition. The wavelet decomposition may comprise two-dimensional orthogonal wavelet decomposition, for example. The wavelet decomposition may automatically detect edge information in any general direction in the signal components (e.g., YUV or RGB). It can be appreciated that various wavelet decompositions may be used. The embodiments are not limited in this context. In various implementations, wavelet decomposition may comprise determining the location of the edges as well as making the edges steeper by modifying the constituent frequency components. The wavelet decomposition may comprise performing wavelet analysis for edge detection and/or transient processes. The edge information may be decomposed via a wavelet filter bank, for example, and the frequency-amplitude distribution for the edges may be adaptively changed. The wavelets may comprise time aspects and scale or space aspects, which enable analysis in both time and space for any physical phenomenon. Wavelet analysis may comprise a windowing technique with variable-sized regions. Wavelet analysis may allow the use of long time intervals where more precise low-frequency information is desired, and the use of shorter regions where high-frequency information is desired. The embodiments are not limited in this context. The wavelet decomposition may comprise employing a wavelet transform. In various embodiments, the wavelet transform may comprise a discrete wavelet transform (DWT) such as a Debauchies wavelet transform, for example. In various implementations, the wavelet transform may use dyadic scales and positions following a geometric sequence of ratio two in order to reduce the amount of wavelet coefficient calculations. The dyadic wavelet transform improves efficiency and generally is just as accurate. The embodiments are not limited in this context. In various embodiments, the wavelet decomposition may comprise performing multiple levels of decomposition. In one embodiment, for example, the wavelet decomposition may comprise three levels of decomposition. The embodiments are not limited in this context. FIG. 3 FIG. 3 1 1 1 2 2 S=A +D =A +D +D =A +D +D +D 1 1 2 2 1 3 3 2 1 illustrates one embodiment of wavelet decomposition. illustrates one embodiment of multi-level wavelet decomposition. In various implementations, employing a wavelet transform such as a DWT allows decomposition of a signal (S) into a low-detail component (A) and a high-detail component (D) in horizontal, vertical and diagonal directions. The approximation and detail analysis may be duplicated at multiple levels. For example, the DWT may be applied recursively on the low detail component (A) into another low detail component (A) and another level of high-detail component (D) in horizontal, vertical and diagonal directions. Recursive application may be performed for multiple levels of decomposition according the following equation: (1), i i where S is the original image, Aand Dare the ith level approximation and details decomposition. This equation could be more generally written as: <math overflow="scroll"><mtable><mtr><mtd><mrow><mi>S</mi><mo>=</mo><mrow><msub><mi>A</mi><mi>i</mi></msub><mo>+</mo><mrow><munderover><mo>∑</mo><mrow><mi>j</mi><mo>&lt;</mo><mi>i</mi></mrow><mstyle><mspace width="0.3em" height="0.3ex" /></mstyle></munderover><mo>⁢</mo><msub><mi>D</mi><mi>j</mi></msub></mrow></mrow></mrow></mtd><mtd><mrow><mo>(</mo><mn>2</mn><mo>)</mo></mrow></mtd></mtr></mtable></math> FIG. 4 FIG. 4 illustrates one embodiment of wavelet decomposition output. illustrates one embodiment of output from a wavelet decomposition comprising a three-level, two-dimensional wavelet decomposition of a luminance signal. In various embodiments, images may comprise 2-dimensional signals (x and y direction). Performing wavelet decomposition by applying a three-level, two-dimensional DWT (2D-DWT) to an original image (a) may generate a first level approximation and details (b), a second level approximation and details (c), and a third level approximation and details (d). The embodiments are not limited in this context. FIG. 1 106 108 106 110 1 110 2 110 3 Referring again to , the wavelet decomposition module may arranged to perform wavelet decomposition on an original image . In various embodiments, the wavelet decomposition module may perform a three-level, two-dimensional wavelet decomposition (e.g., 2D-DWT) to generate a first level approximation and details -, a second level approximation and details -, and a third level approximation and details -. The embodiments are not limited in this context. 102 112 116 112 116 The media processing node may comprise one or more edge enhancement modules, such as a horizontal edge enhancement module , a vertical edge enhancement module, and a diagonal edge enhancement module . In various embodiments, the horizontal edge enhancement module , the vertical edge enhancement module, and the diagonal edge enhancement module may be arranged to change to the decomposition output (e.g., 2D-DWT output). In various implementations, horizontal, vertical and diagonal enhancement may be applied only to the detail component (high frequency) of the wavelet decomposition, while the approximation component (low frequency) of every level of wavelet decomposition may be passed without any enhancement, to further ensure the sharpness enhancement method does not respond to the low frequency components in the image, but rather to the mid and high frequency components. The embodiments are not limited in this context. 112 116 1 2 3 1 2 3 In various embodiments, the horizontal edge enhancement module , the vertical edge enhancement module, and the diagonal edge enhancement module may be arranged to pad higher frequency components with more components, which fit the decomposed components. The different decomposition levels may be treated differently (soft threshold), based on the relative amount of energy in every decomposition level. In various implementations, the 2D-DWT decomposition may be modified by boosting the high frequency components in the horizontal, vertical and diagonal directions at the first level with a factor t, at the second level with a factor t, and at the third level with a factor t, where t>t>t. The embodiments are not limited in this context. 112 110 1 1 112 110 2 2 112 110 3 3 1 2 3 h h h h h h In various implementations, the horizontal edge enhancement module may boost the high frequency components from the first level approximation and details - in the horizontal direction by a first enhancement factor t. The horizontal edge enhancement module may boost the high frequency components from the second level approximation and details - in the horizontal direction by a second enhancement factor t. The horizontal edge enhancement module may boost the high frequency components from the third level approximation and details - in the horizontal direction by a third enhancement factor t (t>t>t). The embodiments are not limited in this context. 114 110 1 1 114 110 2 2 114 110 3 3 1 2 3 v v v v v v In various implementations, the vertical edge enhancement module may boost the high frequency components from the first level approximation and details - in the vertical direction by a first enhancement factor t. The vertical edge enhancement module may boost the high frequency components from the second level approximation and details - in the vertical direction by a second enhancement factor t. The vertical edge enhancement module may boost the high frequency components from the third level approximation and details - in the vertical direction by a third enhancement factor t (t>t>t). The embodiments are not limited in this context. 116 110 1 1 116 110 2 2 116 110 3 3 1 2 3 d d d d d d In various implementations, the diagonal edge enhancement module may boost the high frequency components from the first level approximation and details - in the diagonal direction by a first enhancement factor t. The diagonal edge enhancement module may boost the high frequency components from the second level approximation and details - in the diagonal direction by a second enhancement factor t. The diagonal edge enhancement module may boost the high frequency components from the third level approximation and details - in the diagonal direction by a third enhancement factor t (t>t>t). The embodiments are not limited in this context. 102 118 118 118 112 116 118 106 118 The media processing node may comprise a reconstruction module . In various embodiments, the reconstruction module may be arranged to perform reconstruction using the modified decomposition levels. In various implementations, the reconstruction module may receive the enhanced horizontal, vertical and diagonal detail component of the wavelet decomposition from the horizontal edge enhancement module , the vertical edge enhancement module, and the diagonal edge enhancement module . The reconstruction module may received the approximation component (low frequency) of every level of wavelet decomposition without enhancement from the wavelet decomposition module . In various implementations, the reconstruction module may use the modified frequency components of the luma and chorma (YUV signals) and perform inverse transformation to obtain every image back from the wavelet transforms. The embodiments are not limited in this context. In some cases, if the edge information is weak, weak real signals may be confused with noise. In various implementations, a local noise measurement technique may be used to adaptively decide on the local threshold for noise presence to remedy this situation. The local noise measurement technique may adaptively determine a coring value based on the picture contents. The coring value may be set to a very low percentage of the input signal (YU or V), depending on the picture characteristics. In various implementations, the coring value may be set to 2-4% so that almost 96% of the original values are excluded (assuming a valid Gaussian assumption) to hypothesize the coring threshold in an image. The coring value may be used locally at every decomposition level to measure the level of noise and to give a localized measure both in the time domain (the image itself) and in the frequency domain (every decomposition level). The embodiments are not limited in this context. 102 120 120 102 In various embodiments, the media processing node may be arranged to provide an output image to a media destination node . The media destination node may comprise any media destination capable of receiving media information such as image information, video information, and/or A/V information. In various embodiments, the media processing node may comprise, or be implemented as, one or more of a system, a sub-system, a processor, a computer, a device, an entertainment system, a display, or any other architecture. The embodiments are not limited in this context. Operations for various embodiments may be further described with reference to the following figures and accompanying examples. Some of the figures may include a logic flow. It can be appreciated that the logic flow merely provides one example of how the described functionality may be implemented. Further, the given logic flow does not necessarily have to be executed in the order presented unless otherwise indicated. In addition, the logic flow may be implemented by a hardware element, a software element executed by a processor, or any combination thereof. The embodiments are not limited in this context. FIG. 5 FIG. 5 500 500 500 100 102 500 illustrates one embodiment of a logic flow . illustrates logic flow for performing sharpness enhancement. In various embodiments, the logic flow may be performed by system (e.g., communications system ) and/or a node (e.g., media processing node ). It is to be understood that the logic flow may be implemented by various other types of hardware, software, and/or combination thereof. The embodiments are not limited in this context. 500 502 The logic flow may comprise receiving an input image (block ). In various embodiments, the input image may comprise a picture in a video sequence comprising signals (e.g., Y, U, and V) sampled in both the horizontal and vertical directions. The embodiments are not limited in this context. 500 504 The logic flow may comprise performing wavelet decomposition on the input image (block ). In various embodiments, wavelet decomposition may comprise two-dimensional orthogonal wavelet decomposition. In implementations, performing wavelet decomposition may comprise performing multiple levels of decomposition. The wavelet decomposition may automatically detect edge information in any general direction in the signal components (e.g., YUV or RGB). The wavelet decomposition may determine the location of the edges as well as making the edges steeper by modifying the constituent frequency components. The wavelet decomposition may comprise employing a wavelet transform (e.g., DWT). The embodiments are not limited in this context. 500 506 1 2 3 1 2 3 The logic flow may comprise enhancing the output of the wavelet decomposition (block ). In various embodiments, horizontal, vertical and diagonal enhancement may be applied to the detail component (high frequency) of the wavelet decomposition. In various implementations, higher frequency components are padded with more components, which fit the decomposed components. Different decomposition levels may be treated differently (soft threshold), based on the relative amount of energy in every decomposition level. In various implementations, the output of the wavelet decomposition may be enhanced by boosting the high frequency components in the horizontal, vertical and diagonal directions at a first decomposition level with a factor t, at a second decomposition level with a factor t, and a third decomposition level with a factor t, where t>t>t. The embodiments are not limited in this context. 500 508 The logic flow may comprise reconstructing the image (block ). In various embodiments, reconstruction may be performed using the modified decomposition levels. In various implementations, reconstruction may be performed using the enhanced horizontal, vertical and diagonal detail component of the wavelet decomposition and the approximation component (low frequency) of every level of wavelet decomposition without enhancement. Reconstruction may comprise performing inverse transformation to obtain every image back from the wavelet transforms. The embodiments are not limited in this context. FIG. 6 illustrates one embodiment of a processed image. As shown, the sharpness of an original image (a) has been enhanced without the introduction of added artifacts. The embodiments are not limited in this context. In various implementations, the described embodiments may improve the overall sharpness impression by LTI/CTI using wavelet transforms and reconstruction while avoiding noise and artifact amplification. Picture quality may be improved by boosting the perceived sharpness while not suffering from any artifacts such as aliasing, jitter or clipping. Sharpness may be enhanced for various video sequences (e.g., interlaced/progressive, blocky/block-free, noisy/noise-free) and contents (e.g., high motion contents, human and skin-rich subjects, natural and synthetic contents). Even with the presences of noise, the overall perceived sharpness may be improved without amplifying the noise beyond its original level. The embodiments are not limited in this context. In various implementations, the described embodiments may utilize the two dimensional wavelet decomposition of only the current image (the picture under consideration for enhancement). The beginning and the end of an edge may be determined accurately from one frame. As such, significantly less memory may be required. The described embodiments may adapt thresholds and decomposition decisions to the contents of the current image under consideration. The embodiments are not limited in this context. In various implementations, the described embodiments may inherently detect edges in all directions without hypothesizing on both the edge direction (e.g., vertical or horizontal) as well as the window of support (the number of pixels over which the transition is assumed to have taken place). The described embodiment may be transparent to such requirements and make no prior assumptions to the picture contents. As no prior assumptions of edge directions are made, the described embodiments are thus effective in sharpness improvement when applied to HDTV signals even if an HDTV's original source has been a lower resolution image (e.g. SD). The embodiments are not limited in this context. In various implementations, the described embodiments may perform wavelet analysis. Wavelet analysis may provide advantages over Fourier analysis, which breaks down a signal into constituent sinusoids of different frequencies. For example, when looking at a Fourier transform of a signal, it is impossible to tell when a particular event took place. This is a major drawback since almost all natural signals are non-stationary signals having time varying statistical characteristics. The Short-Time FourierTransform (STFT) overcomes shortcomings of regular Fourier transforms by mapping a signal into a two-dimensional function of time and frequency. Yet, such approach suffers from low precision since once a particular size is chosen for a time window, that window is the same for all frequencies. In various implementations, the described embodiments may achieve better results than peaking. While LTI/CTI improves the perceived sharpness by adding frequency components to the transitions, peaking enhances the perceived image sharpness by amplifying the high frequency components' amplitude. In other words, the bandwidth and the frequency components in the signal are changed after LTI/CTI, while for peaking, no new frequency components are generated. Peaking basically boosts the higher spatial frequency components by adding the first or the second derivative, which is obtained by convolving the image with a Laplacian kernel, while avoiding overflow (clipping prevention) and/or susceptibility to noise (coring prevention). Peaking re-emphasizes the over/undershoots of the luminance signal, by adding the signal's first or second derivative to itself. Numerous specific details have been set forth herein to provide a thorough understanding of the embodiments. It will be understood by those skilled in the art, however, that the embodiments may be practiced without these specific details. In other instances, well-known operations, components and circuits have not been described in detail so as not to obscure the embodiments. It can be appreciated that the specific structural and functional details disclosed herein may be representative and do not necessarily limit the scope of the embodiments. In various implementations, the described embodiments may comprise, or form part of a wired communication system, a wireless communication system, or a combination of both. Although certain embodiments may be illustrated using a particular communications media by way of example, it may be appreciated that the principles and techniques discussed herein may be implemented using various communication media and accompanying technology. In various implementations, the described embodiments may be arranged to communicate information wired or wireless communications media. Examples of wired communications media may include a wire, cable, printed circuit board (PCB), backplane, switch fabric, semiconductor material, twisted-pair wire, co-axial cable, fiber optics, and so forth. An example of a wireless communication media may include portions of a wireless spectrum, such as the radio-frequency (RF) spectrum. In such implementations, the described embodiments may include components and interfaces suitable for communicating information signals over the designated wireless spectrum, such as one or more antennas, transmitters, receivers, transceivers, amplifiers, filters, control logic, and so forth. The embodiments are not limited in this context. In various embodiments, communications media may be connected to a node using an input/output (I/O) adapter. The I/O adapter may be arranged to operate with any suitable technique for controlling information signals between nodes using a desired set of communications protocols, services or operating procedures. The I/O adapter may also include the appropriate physical connectors to connect the I/O adapter with a corresponding communications medium. Examples of an I/O adapter may include a network interface, a network interface card (NIC), a line card, a disc controller, video controller, audio controller, and so forth. The embodiments are not limited in this context. In various implementations, the described embodiments may comprise or form part of a network, such as a Wide Area Network (WAN), a Local Area Network (LAN), a Metropolitan Area Network (MAN), the Internet, the World Wide Web, a telephone network, a radio network, a television network, a cable network, a satellite network, a wireless personal area network (WPAN), a wireless WAN (WWAN), a wireless LAN (WLAN), a wireless MAN (WMAN), a Code Division Multiple Access (CDMA) cellular radiotelephone communication network, a third generation (3G) network such as Wide-band CDMA (WCDMA), a fourth generation (4G) network, a Time Division Multiple Access (TDMA) network, an Extended-TDMA (E-TDMA) cellular radiotelephone network, a Global System for Mobile Communications (GSM) cellular radiotelephone network, a North American Digital Cellular (NADC) cellular radiotelephone network, a universal mobile telephone system (UMTS) network, and/or any other wired or wireless communications network configured to carry data. The embodiments are not limited in this context. Some embodiments may be implemented, for example, using a machine-readable medium or article which may store an instruction or a set of instructions that, if executed by a machine, may cause the machine to perform a method and/or operations in accordance with the embodiments. Such a machine may include, for example, any suitable processing platform, computing platform, computing device, processing device, computing system, processing system, computer, processor, or the like, and may be implemented using any suitable combination of hardware and/or software. The machine-readable medium or article may include, for example, any suitable type of memory unit, memory device, memory article, memory medium, storage device, storage article, storage medium and/or storage unit, for example, memory, removable or non-removable media, erasable or non-erasable media, writeable or re-writeable media, digital or analog media, hard disk, floppy disk, Compact Disk ROM (CD-ROM), Compact Disk Recordable (CD-R), Compact Disk Rewriteable (CD-RW), optical disk, magnetic media, magneto-optical media, removable memory cards or disks, various types of Digital Versatile Disk (DVD), a tape, a cassette, or the like. The instructions may include any suitable type of code, such as source code, compiled code, interpreted code, executable code, static code, dynamic code, and the like. The instructions may be implemented using any suitable high-level, low-level, object-oriented, visual, compiled and/or interpreted programming language. The embodiments are not limited in this context. Some embodiments may be implemented using an architecture that may vary in accordance with any number of factors, such as desired computational rate, power levels, heat tolerances, processing cycle budget, input data rates, output data rates, memory resources, data bus speeds and other performance constraints. For example, an embodiment may be implemented using software executed by a general-purpose or special-purpose processor. In another example, an embodiment may be implemented as dedicated hardware, such as a circuit, an ASIC, PLD, DSP, and so forth. In yet another example, an embodiment may be implemented by any combination of programmed general-purpose computer components and custom hardware components. The embodiments are not limited in this context. Unless specifically stated otherwise, it may be appreciated that terms such as “processing,” “computing,” “calculating,” “determining,” or the like, refer to the action and/or processes of a computer or computing system, or similar electronic computing device, that manipulates and/or transforms data represented as physical quantities (e.g., electronic) within the computing system's registers and/or memories into other data similarly represented as physical quantities within the computing system's memories, registers or other such information storage, transmission or display devices. The embodiments are not limited in this context. It is also worthy to note that any reference to “one embodiment” or “an embodiment” means that a particular feature, structure, or characteristic described in connection with the embodiment is included in at least one embodiment. The appearances of the phrase “in one embodiment” in various places in the specification are not necessarily all referring to the same embodiment. While certain features of the embodiments have been illustrated as described herein, many modifications, substitutions, changes and equivalents will now occur to those skilled in the art. It is therefore to be understood that the appended claims are intended to cover all such modifications and changes as fall within the true spirit of the embodiments. BRIEF DESCRIPTION OF THE DRAWINGS FIG. 1 illustrates one embodiment of a system. FIG. 2 illustrates one embodiment of sharpness enhancement. FIG. 3 illustrates one embodiment of wavelet decomposition. FIG. 4 illustrates one embodiment of wavelet decomposition output. FIG. 5 illustrates one embodiment of a logic flow. FIG. 6 illustrates one embodiment of a processed image.
Synthesis, structure, magnetism and nuclease activity of tetranuclear copper(II) phosphonates containing ancillary 2,2'-bipyridine or 1,10-phenanthroline ligands. The reaction of cyclohexylphosphonic acid (C(6)H(11)PO(3)H(2)), anhydrous CuCl(2) and 2,2'-bipyridine (bpy) in the presence of triethylamine followed by a metathesis reaction with KNO(3) afforded [Cu(4)(mu-Cl)(2)(mu(3)-C(6)H(11)PO(3))(2)(bpy)(4)](NO(3))(2) (1). In an analogous reaction involving Cu(OAc)(2).H(2)O, the complex [Cu(4)(mu-CH(3)COO)(2)(mu(3)-C(6)H(11)PO(3))(2)(2,2'-bpy)(4)](CH(3)COO)(2) (2) has been isolated. The three-component reaction involving Cu(NO(3))(2).3H(2)O, cyclohexylphosphonic acid and 2,2'-bipyridine in the presence of triethylamine afforded the tetranuclear assembly [Cu(4)(mu-OH)(mu(3)-C(6)H(11)PO(3))(2)(2,2'-bpy)(4) (H(2)O)(2)](NO(3))(3) (3). Replacing 2,2'-bipyridine with 1,10-phenanthroline (phen) in the above reaction resulted in [Cu(4)(mu-OH)(mu(3)-C(6)H(11)PO(3))(2)(phen)(4)(H(2)O)(2)](NO(3))(3) (4). In all the copper(II) phosphonates (1-4) the two phosphonate ions bridge the four copper(II) ions in a capping coordination action. Each phosphonate ion bridges four copper(II) ions in a mu(4), eta(3) coordination mode or 4.211 of the Harris notation. Variable-temperature magnetic studies on reveal that all four complexes exhibit moderately strong intramolecular antiferromagnetic coupling. The DNA cleavage activity of complexes 1-4 is also described. Compounds 1 and 3 were able to completely convert the supercoiled pBR322 DNA form I to nick form II without any co-oxidant. In contrast, 50% conversion occurred with and 40% with 4. In the presence of magnesium monoperoxyphthalate all four compounds achieved rapid conversion of form I to form II.
CROSS-REFERENCE TO RELATED APPLICATIONS STATEMENT REGARDING FEDERALLY SPONSORED RESEARCH OR DEVELOPMENT FIELD OF THE INVENTION BACKGROUND OF THE INVENTION SUMMARY OF THE INVENTION DESCRIPTION OF THE INVENTION Experimental Section 1 Preparation of 1,5-di-test-butyl-1,2,5-triazapentadiene Preparation of 1-tert-butyl-5-dimethylamino-1,2,5-triazapentadiene Preparation of Bis(1,5-di-test-butyl-1,2,5-triazapentadienyl)nickel(II) (1) Preparation of Bis(1,5-di-tert-butyl-1,2,5-triazapentadienyl)cobalt(II) (2) Preparation of Bis(1,5-di-test-butyl-1,2,5-triazapentadienyl)iron(II) (3) Preparation of Bis(1,5-di-test-butyl-1,2,5-triazapentadienyl)manganese(II) (4) Preparation of Bis(1,5-di-test-butyl-1,2,5-triazapentadienyl)chromium(II) (5) Preparation of Bis(1,5-di-test-butyl-1,2,5-triazapentadienyl)magnesium(II) (6) Preparation of Bis(1-tert-butyl-5-dimethylamino-1,2,5-triazapentadienyl)nickel(II) (7) Preparation of Bis(1-tert-butyl-5-dimethylamino-1,2,5-triazapentadienyl)cobalt(II) (8) Preparation of Bis(1-tert-butyl-5-dimethylamino-1,2,5-triazapentadienyl)iron(II) (9) Preparation of Bis(1-tert-butyl-5-dimethylamino-1,2,5-triazapentadienyl)manganese(II) (10) Preparation of Bis(1-tert-butyl-5-dimethylamino-1,2,5-triazapentadienyl)magnesium(II) (11) Experimental Section 2 Preparation of 1-(tert-butylimino)-3-methylbutan-2-one Preparation of Bis(1-(tert-butylimino)-3-methylbut-2-en-2-olate)chromium(II) (12) Preparation of Bis(1-(tert-butylimino)-3-methylbut-2-en-2-olate)manganese(II) (13) Preparation of Bis(1-(tert-butylimino)-3-methylbut-2-en-2-olate)iron(II) (14) Preparation of Bis(1-(tert-butylimino)-3-methylbut-2-en-2-olate)cobalt(II) (15) Preparation of Bis(1-(tert-butylimino)-3-methylbut-2-en-2-olate)nickel(II) (16) Preparation of Bis(1-(tert-butylimino)-3-methylbut-2-en-2-olate)copper(II) (17) Preparation of Bis(1-(test-butylimino)-3,3-dimethylbutan-2-oyl)chromium(II) (18) Preparation of Bis(1-(tert-butylimino)-3,3-dimethylbutan-2-oyl)manganese(II) (19) Preparation of Bis(1-(tert-butylimino)-3,3-dimethylbutan-2-oyl)iron(II) (20) Preparation of Bis(1-(tert-butylimino)-3,3-dimethylbutan-2-oyl)cobalt(II) (21) Preparation of Bis(1-(tert-butylimino)-3-methylbut-2-en-2-olate)nickel (II) (22) REFERENCES This application is the U.S. National Phase of PCT Appln. No. PCT/US2013/045144 filed Jun. 11, 2013, which claims the benefit of U.S. provisional application Ser. No. 61/658,064 filed Jun. 11, 2012, the disclosures of which are incorporated in their entirety by reference herein. The invention was made with Government support under Contract No. CHE0910475 awarded by the National Science Foundation. The Government has certain rights in the invention. In at least one aspect, the present invention is related to the formation of metal films from “metalorganic” precursors. The growth of thin films is a central step in the fabrication of many functional materials. In recent years, atomic layer deposition (ALD) has been recognized as an important process for forming thin films for the electronics industry. Synthesizing suitable precursors for ALD growth of transition metal-containing thin films is an important and challenging aspect of this process. Transition metal complexes should possess the following features in order to serve as good precursors in ALD of transition metal-containing thin films: (1) the highest possible volatility to allow the lowest deposition temperatures, (2) high thermal stability throughout the range of desired deposition temperatures, (3) the ability to chemisorb or react with surface sites, and (4) high reactivity with the second precursor (co-reactant that reduces the metal precursor to its metal). Accordingly, there is a need for the design of novel ALD precursors having the requisite chemical properties. The present invention solves one or more problems of the prior art by providing a triazapentadienyl compound that is useful for forming a metal-containing film. The triazapentadienyl compound is described generally by formula (I): wherein: M is a metal selected from groups 2 to 12 of the Periodic Table (e.g., Mg, Zn, Cr, Mn, Fe, Co, or Ni); 1 1-8 5-12 5 6 Ris Calkyl, Caryl, or NRR; 2 1-8 Ris Calkyl; 3 4 1-8 R, Rare each independently hydrogen or Calkyl; and 5 6 1-8 5 2-8 R, Rare each independently Calkyl with the proviso that when M is Zn, Mg, Cr, Ris Calkyl. In another embodiment, an α-imino enolate compound that is useful for forming a metal-containing film is provided. The α-imino enolate compound is described generally by formula (I): wherein: M is a metal selected from groups 2 to 12 of the Periodic Table (e.g., Zn, Mg, Cr, Mn, Fe, Co, Ni, or Cu); 7 8 9 1-8 5-12 5-12 10 1-8 5-12 5-12 R, R, Rare each independently hydrogen, Calkyl, Caryl, or Cheteroaryl; and Ris Calkyl, Caryl, or Cheteroaryl. In another embodiment, an α-imino ketonate compound that is useful for forming a metal-containing film is provided. The α-imino ketonate compound is described generally by formula (III): M is a metal selected from groups 2 to 12 of the Periodic Table (e.g., Zn, Mg, Cr, Mn, Fe, Co, Ni, or Cu); 11 1-8 5-12 5-12 Ris Calkyl, Caryl, or Cheteroaryl; and 12 13 1-8 5-12 5-12 R, Rare each independently hydrogen, Calkyl, Caryl, or Cheteroaryl. In another embodiment, a method of forming a metal-containing product is provided. The method includes a step of reacting a first compound having bidentate ligands with an reactive compound to form a first product. The first compound is selected from the group consisting of compounds having formula 1, 2 and 3 set forth above. Reference will now be made in detail to presently preferred compositions, embodiments and methods of the present invention which constitute the best modes of practicing the invention presently known to the inventors. The Figures are not necessarily to scale. However, it is to be understood that the disclosed embodiments are merely exemplary of the invention that may be embodied in various and alternative forms. Therefore, specific details disclosed herein are not to be interpreted as limiting, but merely as a representative basis for any aspect of the invention and/or as a representative basis for teaching one skilled in the art to variously employ the present invention. Except in the examples, or where otherwise expressly indicated, all numerical quantities in this description indicating amounts of material or conditions of reaction and/or use are to be understood as modified by the word “about” in describing the broadest scope of the invention. Practice within the numerical limits stated is generally preferred. Also, unless expressly stated to the contrary:percent, “parts of,” and ratio values are by weight; the description of a group or class of materials as suitable or preferred for a given purpose in connection with the invention implies that mixtures of any two or more of the members of the group or class are equally suitable or preferred; description of constituents in chemical terms refers to the constituents at the time of addition to any combination specified in the description, and does not necessarily preclude chemical interactions among the constituents of a mixture once mixed; the first definition of an acronym or other abbreviation applies to all subsequent uses herein of the same abbreviation and applies mutatis mutandis to normal grammatical variations of the initially defined abbreviation; and, unless expressly stated to the contrary, measurement of a property is determined by the same technique as previously or later referenced for the same property. It is also to be understood that this invention is not limited to the specific embodiments and methods described below, as specific components and/or conditions may, of course, vary. Furthermore, the terminology used herein is used only for the purpose of describing particular embodiments of the present invention and is not intended to be limiting in any way. It must also be noted that, as used in the specification and the appended claims, the singular form “a,” “an,” and “the” comprise plural referents unless the context clearly indicates otherwise. For example, reference to a component in the singular is intended to comprise a plurality of components. Throughout this application, where publications are referenced, the disclosures of these publications in their entireties are hereby incorporated by reference into this application to more fully describe the state of the art to which this invention pertains. In an embodiment, a triazapentadienyl compound that is useful for forming a metal-containing film is provided. The triazapentadienyl compound is described generally by formula (1): wherein: M is a metal selected from groups 2 to 12 of the Periodic Table. In particular, M is Zn, Mg, Cr, Mn, Fe, Co, Ni, or Cu; 1 1-8 5-12 5 6 Ris Calkyl, Caryl, or NRR; 2 1-8 Ris Calkyl; 3 4 1-8 R, Rare each independently hydrogen or Calkyl; and 5 6 1-8 5 2-8 1 1-8 1 5 6 1 2 3 4 2 R, Rare each independently Calkyl with the proviso that when M is Cr, Ris Calkyl. In a refinement, when Ris Calkyl, M is Zn, Mg, Cr, Mn, Fe, Co, or Ni, and when Ris N RR; M is Zn, Mg, Mn, Fe, Co, or Ni. In a refinement, R, R, R, Rare each independently methyl, ethyl, n-propyl, isopropyl, n-butyl, sec-butyl, isobutyl, t-butyl, or phenyl. In a particularly useful refinement, Ris t-butyl. 1 1-8 1 5 6 1 1-8 1 5 6 In a variation of the compound having formula (1), when Ris Calkyl, M is Cr, Mn, Fe, Co, or Ni, and when Ris N RR, M is Zn, Mg, Mn, Fe, Co, or Ni. In another variation, Ris Calkyl and M is Zn, Mg, Cr, Mn, Fe, Co, or Ni. In still another variation, Ris N RRand M is Zn, Mg, Mn, Fe, Co, or Ni. In another embodiment, an α-imino ketonate compound that is useful for the deposition of metal-containing films and, in particular, metal films is provided. The compound of this embodiment is described by formula II: wherein: M is a metal selected from groups 2 to 12 of the Periodic Table. In particular, M is Zn, Mg, Cr, Mn, Fe, Co, Ni, or Cu; 7 8 9 1-8 5-12 5-12 R, R, Rare each independently hydrogen, Calkyl, Caryl, or Cheteroaryl; and 10 1-8 5-12 5-12 Ris Calkyl, Caryl, or Cheteroaryl. 7 8 9 10 10 In a refinement, R, R, R, Rare each independently methyl, ethyl, n-propyl, isopropyl, n-butyl, sec-butyl, isobutyl, t-butyl, or phenyl. In a particularly useful refinement, Ris t-butyl. The α-imino enolate complexes of the present embodiment sublime in the range of 100-160° C. at 0.05 Torr and decompose in the temperature range of 190-295° C. making these compounds useful for atomic layer deposition (ALD). In still another embodiment, an α-imino ketonate compound that is useful for forming a metal-containing film and, in particular, a metal film is provided. The α-imino ketonate compound is described generally by formula (III): 11 1-8 5-12 5-12 M is a metal selected from groups 2 to 12 of the Periodic Table. In particular, M is Zn, Mg, Cr, Mn, Fe, Co, Ni, or Cu; Ris Calkyl, Caryl, or Cheteroaryl; and 12 13 1-8 5-12 5-12 R, Rare each independently hydrogen, Calkyl, Caryl, or Cheteroaryl. 11 12 13 11 In a refinement, R, R, Rare each independently methyl, ethyl, n-propyl, isopropyl, n-butyl, sec-butyl, isobutyl, t-butyl, or phenyl. In a particularly useful refinement, Ris t-butyl. The α-imino ketonate complexes of the present embodiment sublime at 100-135° C. at 0.05 Torr and decompose between 180-250° C. making these compounds useful precursors for ALD. In another embodiment, a method for forming a metal-containing compound includes a step of reacting a compound having bidentate ligands with an reactive compound to form a first product, the first compound selected from the group consisting of: wherein: M is a metal selected from groups 2 to 12 of the Periodic Table. In particular, M is Zn, Mg, Cr, Mn, Fe, Co, Ni, or Cu; 1 1-8 5-12 5 6 Ris Calkyl, Caryl, or N RR; 2 3 4 1-8 R, R, Rare each independently Calkyl; 5 1-8 5 2-8 R, R6 is Calkyl with the proviso that when M is Cr, Ris Calkyl; and 5 6 7 8 9 10 1-8 5-12 5-12 R, R, R, R, R, Rare each independently Calkyl, Caryl, or Cheteroaryl. In a refinement, the reactive compound is a reducing agent. In this variation, the resulting product is a metal (i.e, zero oxidation state). Examples of useful reducing agents include, but are not limited to, molecular hydrogen, atomic hydrogen, silane, disilane, organosilanes, compounds containing Si—H bonds, germane, organogermanes, compounds containing Ge—H bonds, stannane, compounds containing Sn—H bonds, other metal hydride compounds, formic acid, glyoxalic acid, oxalic acid, other carboxylic acids, diborane, compounds containing B—H bonds, hydrazine, carbon-substituted hydrazines, formalin, formaldehyde, organic alcohols, organoaluminum compounds, organozinc compounds, other organometallic compounds, plasma-activated versions of the above compounds. In another refinement, the reactive compound is an oxidizing agent with the resulting product being a metal oxide. Examples of useful oxidizing agents include, but are not limited to, water, ozone, molecular oxygen, atomic oxygen, organic alcohols, hydrogen peroxide, organic hydroperoxides, organic peroxides, nitrous oxide, plasma-activated versions of the above compounds. In still another variation, the activating compound is a nitriding agent (i.e., a nitrogen-containing agent) with the resulting product being a metal nitride. Examples of such nitriding agents include, but are not limited to, ammonia, hydrazine, alkyl-substituted hydrazines, and plasma activated versions thereof. 1 2 3 10 12 14 16 20 18 20 22 12 24 26 30 32 12 16 FIG. 1 In another variation, a method for forming a metal-containing film using compounds , , or is provided. provides a schematic of an atomic layer deposition system that is useful for forming such films. Deposition system includes reaction chamber , substrate holder , and vacuum pump . Typically, substrate is heated via heater . The method has a deposition cycle comprising contacting substrate with a vapor of a metal-containing compound described by formula 1, 2, or 3 as set forth above. In particular, the vapor is introduced from precursor source into reaction chamber for a predetermined pulse time. The pulse time is controlled via control valve . At least a portion of the vapor of the metal-containing compound having formula 1, 2, or 3 modifies (e.g, adsorbs or reacts with) substrate surface to form a modified surface. The method further comprises contacting the modified surface with a vapor of a reactive compound from compound source for a predetermined pulse time. The pulse time is controlled via control valve . The reactive compound causes the metal-containing compound to react and form at least a portion of the thin metal containing film on the surface of the substrate. The reduced pressure of chamber is maintained by vacuum pump . 34 12 36 In a variation of the present embodiment, the method further comprises removing at least a portion of the vapor of the metal containing compound having formula 1, 2, or 3 that is lingering in the gas phase (i.e., has not adsorbed or reacted with the substrate) from the vicinity of the substrate before introducing the vapor of the reactive compound and removing at least a portion of the vapor of the reactive compound from the vicinity of the substrate. The metal-containing compound and reactive compound are removed in purging steps by introducing a purge gas from purge source into reaction chamber for a predetermined purge time. The purge time is controlled by control valve . In another variation, the method further includes at least one additional deposition cycle comprising sequentially contacting the substrate with the vapor of a metal-containing compound having formula 1, 2, or 3 and then the vapor of the reactive compound. In some refinements, the substrate is contacted for a plurality of additional deposition cycles. For example, the substrate may be contacted with from 1 to several thousand deposition cycles depending on the thickness of the film desired. 1 2 3 10 12 14 16 18 20 22 12 24 26 40 12 42 32 12 FIG. 1 FIG. 2 FIG. 2 14 − 14 − − 1 2 1-8 6-12 1-8 3 3 1-4 6-10 1-4 3 3 In another variation, a method for forming a metal-containing film using compounds , , or is provided. Referring again to , deposition system includes reaction chamber , substrate holder , and vacuum pump . Typically, the substrate is heated via heater . The method has a deposition cycle comprising contacting substrate with a vapor of a metal-containing compound described by formula 1, 2, or 3 as set forth above. In particular, the vapor is introduced from precursor source into reaction chamber for a predetermined pulse time. The pulse time is controlled via control valve . At least a portion of the vapor of the metal-containing compound having formula 1, 2, or 3 modifies (e.g, adsorbs or reacts with) substrate surface to form a modified surface. In the next reaction step of the deposition cycle, an acid such as formic acid is then introduced from acid source into reaction chamber for a second predetermined pulse time. The second predetermined pulse time is controlled by valve . Examples of other suitable acids are provided in . In , Ris H (i.e., hydride), Calkyl, Caryl, or Cfluoroalkyl, X is N, NO, halide (e.g., Cl, F, Br), and n is an integer from 1 to 6. In a refinement, Ris hydride, Calkyl, Caryl, or Cfluoroalkyl, X is N, NO, halide (e.g., Cl, F, Br), and n is an integer from 1 to 6. Examples of useful alkyl groups include, but are not limited to, methyl, ethyl, n-propyl, isopropyl, n-butyl, t-butyl, isobutyl, sec-butyl, and the like. Examples of useful aryl groups include, but are not limited to, phenyl, tolyl, naphthyl, and the like. It should also be appreciated that R, R, Rmay be optionally substituted with groups such as halide. The second predetermined pulse time should be sufficiently long that available binding sites on the first modified substrate surface are saturated and a second modified surface is formed. Typically, the second predetermined pulse time is from 0.1 second to 20 seconds. The second predetermined pulse time is controlled via control valve . Reaction chamber is then purged with an inert gas for a second purge time (typically, 0.5 seconds to 2 minutes as set forth above). 30 12 12 2 2 In the final reaction step of the deposition cycle, a reducing agent is then introduced from reductant source into reaction chamber for a third predetermined time. Examples of suitable reducing agents include, but are not limited to, hydrazine, hydrazine hydrate, alkyl hydrazines, 1,1-dialkylhydrazines, 1,2-dialkylhydrazines, H, Hplasma, ammonia, ammonia plasma, silanes, disilanes, trisilanes, germanes, diborane, formalin, amine borane, dialkyl zinc, alkyl aluminum, alkyl gallium, alkyl indium complexes, and other plasma-based gases, and combinations thereof. The third predetermined pulse time should be sufficiently long that available binding sites on the second modified substrate surface are saturated with a metal layer being formed thereon. Typically, the third predetermined pulse time is from 0.1 second to 20 seconds. Reaction chamber is then purged with an inert gas for a third purge time (typically, 0.5 seconds to 2 minutes as set forth above). 34 12 36 In a variation as set forth above, the method further comprises removing at least a portion of the vapor of the metal containing compound having formula 1, 2, or 3 that is lingering in the gas phase (i.e., has not adsorbed or reacted with the substrate) from the vicinity of the substrate before introducing the vapor of the reactive compound and removing at least a portion of the vapor of the reactive compound from the vicinity of the substrate. The metal-containing compound and reactive compound are removed in purging steps by introducing a purge gas from purge source into reaction chamber for a predetermined purge time. The purge time is controlled by control valve . Pulse times and purge times also depend on the properties of the chemical precursors and the geometric shape of the substrates. Thin film growth on flat substrates uses short pulse and purge times, but pulse and purge times in ALD growth on 3-dimensional substrates can be very long. Therefore, in one refinement, pulse times and purge times are each independently from about 0.0001 to 200 seconds. In another refinement, pulse and purge times are each independently from about 0.1 to about 10 seconds. In the film forming methods set forth above, the specific type of reactive compound that will be used depends on the particular metal compound to be made. If a metal film is to be made, the reactive compound will be a reducing agent as set forth above. If a metal oxide film is made, the reactive compound is an oxidizing agent as set forth above. If a nitride film is made, the reactive compound is a nitriding agent as set forth above. During film formation by the methods, the substrate temperature will be at a temperature suitable to the properties of the chemical precursor(s) and film to be formed. In a refinement of the method, the substrate is set to a temperature from about 0 to 1000° C. In another refinement of the method, the substrate has a temperature from about 50 to 450° C. In another refinement of the method, the substrate has a temperature from about 100 to 250° C. In still another refinement of the method, the substrate has a temperature from about 150 to 400° C. In another refinement of the method, the substrate has a temperature from about 200 to 300° C. The desired metal film thickness depends on the number of deposition cycles. Therefore, in a refinement, the deposition cycle is repeated a plurality of times to form a predetermined thickness of the metal film. In a further refinement, the deposition cycle is repeated a plurality of times to form a metal film having a thickness from about 5 nanometers to about 200 nanometers. In still another refinement, the deposition cycle is repeated a plurality of times to form a metal film having a thickness from about 5 nanometers to about 300 nanometers. In yet another refinement, the deposition cycle is repeated a plurality of times to form a metal film having a thickness from about 5 nanometers to about 100 nanometers. During film formation by the method of the present embodiment, the substrate temperature will be at a temperature suitable to the properties of the chemical precursor(s) and film to be formed. In a refinement of the method, the substrate is set to a temperature from about 0 to 1000° C. In another refinement of the method, the substrate has a temperature from about 50 to 450° C. In another refinement of the method, the substrate has a temperature from about 100 to 250° C. In still another refinement of the method, the substrate has a temperature from about 150 to 400° C. In another refinement of the method, the substrate has a temperature from about 200 to 300° C. −6 Similarly, the pressure during film formation is set at a value suitable to the properties of the chemical precursors and film to be formed. In one refinement, the pressure is from about 10Torr to about 760 Torr. In another refinement, the pressure is from about 0.1 millitorr to about 10 Torr. In still another refinement, the pressure is from about 1 to about 100 millitorr. In yet another refinement, the pressure is from about 1 to 20 millitorr. The following examples illustrate the various embodiments of the present invention. Those skilled in the art will recognize many variations that are within the spirit of the present invention and scope of the claims. General Considerations. 2 5 2 2 2 2 2 2 3 1 All manipulations were carried out under argon using either Schlenk or glove box techniques, except that the ligands were prepared in ambient atmosphere. Tetrahydrofuran was distilled from sodium benzophenone ketyl, and hexane was distilled from PO. Anhydrous transition metal chlorides (CrCl, MnCl, FeCl, CoCl, and NiCl) were obtained from Strem Chemicals Inc. and used as received. NiCl.CHCN was prepared according to a literature procedure.Potassium hydride (30 wt % dispersion in mineral oil; washed with hexane before use), tert-butyl amine, and 1,1-dimethylhydrazine were purchased from Sigma-Aldrich. tert-Butyl hydrazine hydrochloride was purchased from Acros Organics. Glyoxal was purchased from Alfa Aesar. 1 13 1 13 1 6 H and C{H} NMR spectra were obtained at 400 and 100 MHz in benzene-dor chloroform-d and were referenced to the residual proton and the C resonances of the solvents. Infrared spectra were obtained using Nujol as the medium. Melting points were obtained on a Thermo Scientific Mel-Temp 3.0 digital melting point apparatus and are uncorrected. Thermogravimetric analyses (TGA) were carried out with a SDT-2960 TGA/DTA instrument. Magnetic moments were determined in the solid state using a Johnson Mathey magnetic susceptibility apparatus, and by H NMR in benzene solution using the Evans method. 3 −1 1 13 1 + 2 4 3 3 3 3 3 3 3 3 3 3 3 3 3 3 10 22 3 2-(2-(tert-butyl)hydrazono)acetaldehyde was prepared according to a published procedure.A 100 mL round bottom flask was charged with a magnetic stir bar, 2-(2-(tert-butyl)hydrazono)acetaldehyde (1.000 g, 7.80 mmol), and diethyl ether (15 mL). To this stirred solution at ambient temperature was slowly added tert-butyl amine (0.83 mL, 7.80 mmol) and the solution was stirred for 4 h. The resultant yellow solution was washed with water (20 mL) and the organic layer was separated. The organic layer was dried over anhydrous NaSOand the volatile components were removed under reduced pressure. Light yellow crystals were obtained by sublimation of the crude solid at 80° C./0.05 Torr (0.786 g, 55%): mp 200° C.; IR (Nujol, cm) 3144 (m), 1620 (m), 1547 (m), 1365 (m), 1346 (m), 1304 (w), 1260 (w), 1222 (m) 1166 (m), 1096 (w), 1026 (w), 970 (w), 883 (w), 799 (w); H NMR (CDCl, 23° C., δ) 7.84 (s, 1H, CHN), 7.30 (s, 1H, CHN), 5.28 (s, broad 1H, NH), 1.22 (s, 9H, C(CH)), 1.21 (s, 9H, C(CH)); C{H} NMR (CDCl, 23° C., ppm) 155.22 (s, CHN), 137.35 (s, CHN), 56.91 (s, C(CH)), 54.50 (s, C(CH)), 29.65 (s, C(CH)), 28.57 (s, C(CH)); ESI-HRMS: calcd for CHN([M+H]) 184.1814, found 184.1814. 4 −1 1 13 1 + 2 5 6 6 3 2 3 3 6 3 3 3 2 3 3 8 19 4 2-(2,2-Dimethylhydrazono)acetaldehyde was prepared according to a published procedure.A 100 mL round bottom flask was charged with a magnetic stir bar, 2-(2,2-dimethylhydrazono)acetaldehyde (1.000 g, 9.98 mmol), and water (20 mL). To this stirred solution at ambient temperature was slowly added a mixture of tert-butyl hydrazine hydrochloride (1.370 g, 11.00 mmol) and potassium hydroxide (0.726 g, 11.00 mmol) in water (30 mL). This solution was stirred for 15 min and was set aside for 18 hours. An oil formed initially, which converted to a yellow solid over this time. The solution was filtered and the solid was dried using a desiccator filled with PO. Light yellow crystals were obtained by sublimation at 60° C./0.05 Torr (1.120 g, 66%): mp 56° C.; IR (Nujol, cm) 3214 (m), 1559 (w), 1365 (m), 1300 (w), 1261 (w), 1229 (w) 1132 (w), 1038 (m), 1022 (m); H NMR (CD, 23° C., δ) 7.49 (d, 1H, (J=8.0 Hz), CH), 7.17 (d, 1H, (J=8.0 Hz), CH), 4.65 (s, broad 1H, NH), 2.47 (s, 6H, N(CH)), 1.14 (s, 9H, C(CH)); C{H} NMR (100 MHz, benzene-d, 23° C., ppm) 139.26 (s, CHN), 133.22 (s, CHN), 53.44 (s, C(CH)), 42.26 (s, N(CH)), 28.66 (s, C(CH)); ESI-HRMS: calcd for CHN([M+H]) 171.1610, found 171.1607. 2 3 6 6 3 3 3 3 eff B 20 40 6 −1 1 A 100 mL Schlenk flask was charged with a magnetic stir bar, 1,5-di-tert-butyl-1,2,5-triazapentadiene (1.000 g, 5.45 mmol), and tetrahydrofuran (30 mL). To this stirred solution at ambient temperature was slowly added potassium hydride (0.241 g, 6.00 mmol), and the solution was stirred for 4 h. This solution was then slowly added dropwise by cannula to a stirred suspension of anhydrous NiCl.CHCN (0.456 g, 2.70 mmol) in tetrahydrofuran (40 mL) at −78° C. The resultant dark brown solution was stirred for 15 h at ambient temperature. The volatile components were then removed under reduced pressure, and the resultant dark red powder was dissolved in hexane (60 mL). The solution was filtered through a 1 cm pad of Celite on a coarse glass frit, and the hexane was then removed under reduced pressure. Dark red crystals of 1 were obtained by sublimation at 155° C./0.05 Torr (0.397 g, 35%): mp 262° C.; IR (Nujol, cm) 1548 (m), 1365 (s), 1339 (m), 1253 (w), 1213 (m), 1174 (m), 1060 (w), 791 (w); H NMR (CD, 23° C., δ) 16.64 (s, broad 18H, C(CH)), 15.20 (s, broad 18H, C(CH)); μ=2.84 and 2.86 μin the solid state and in benzene solution, respectively. Anal. Calcd for CHNiN: C, 56.75; H, 9.53; N, 19.86. Found: C, 56.66; H, 9.49; N, 19.84. −1 eff B 20 40 6 In a fashion similar to the preparation of 1, treatment of anhydrous cobalt(II) chloride (0.350 g, 2.70 mmol) in tetrahydrofuran (40 mL) with a solution of potassium 1,5-di-tert-butyl-1,2,5-triazapentadienate (prepared from 1,5-di-tert-butyl-1,2,5-triazapentadiene (1.000 g, 5.45 mmol) and potassium hydride (0.241 g, 6.00 mmol) in tetrahydrofuran (30 mL)) for 15 h at ambient temperature afforded 2 (0.623 g, 57%) as dark green crystals upon sublimation at 160° C./0.05 Torr: mp 260° C.; IR (Nujol, cm) 1542 (s), 1364 (s), 1354 (s), 1340 (s), 1255 (m), 1214 (m), 1178 (s), 1054 (m), 996 (w), 790 (m); μ=3.78 and 3.95 μin the solid state and in benzene solution, respectively. Anal. Calcd for CHCoN: C, 56.72; H, 9.52; N, 19.84. Found: C, 56.59; H, 9.46; N, 19.79. −1 eff B 20 40 6 In a fashion similar to the preparation of 1, treatment of anhydrous iron(II) chloride (0.342 g, 2.70 mmol) in tetrahydrofuran (40 mL) with a solution of potassium 1,5-di-tert-butyl-1,2,5-triazapentadienate (prepared from 1,5-di-tert-butyl-1,2,5-triazapentadiene (1.000 g, 5.45 mmol) and potassium hydride (0.241 g, 6.00 mmol) in tetrahydrofuran (30 mL)) for 15 h at ambient temperature afforded 3 (0.805 g, 73%) as dark red crystals upon sublimation at 175° C./0.05 Torr: mp 275° C.; IR (Nujol, cm) 1529 (s), 1362 (m), 1350 (m), 1336 (s), 1254 (m), 1242 (m), 1215 (m), 1176 (s), 1055 (m), 994 (m), 926 (m), 918 (m), 791 (m); μ=5.00 and 4.92 μin the solid state and in benzene solution, respectively. Anal. Calcd for CHFeN: C, 57.14; H, 9.59; N, 19.99. Found: C, 57.76; H, 9.29; N, 20.14. −1 eff B 20 40 6 In a fashion similar to the preparation of 1, treatment of anhydrous manganese(II) chloride (0.340 g, 2.70 mmol) in tetrahydrofuran (40 mL) with a solution of potassium 1,5-di-tert-butyl-1,2,5-triazapentadienate (prepared from 1,5-di-tert-butyl-1,2,5-triazapentadiene (1.000 g, 5.45 mmol) and potassium hydride (0.241 g, 6.00 mmol) in tetrahydrofuran (30 mL)) for 15 h at ambient temperature afforded 4 (0.597 g, 54%) as dark yellow crystals upon sublimation at 165° C./0.05 Torr: mp 284° C.; IR (Nujol, cm) 1552 (m), 1366 (m), 1346 (m), 1257 (m), 1176 (m), 1052 (w), 786 (w); μ=5.89 and 5.85 μin the solid state and in benzene solution, respectively. Anal. Calcd for CHMnN: C, 57.26; H, 9.61; N, 20.03. Found: C, 57.55; H, 9.50; N, 20.12. −1 eff B 20 40 6 In a fashion similar to the preparation of 1, treatment of anhydrous chromium(II) chloride (0.332 g, 2.70 mmol) in tetrahydrofuran (40 mL) with a solution of potassium 1,5-di-tert-butyl-1,2,5-triazapentadienate (prepared from 1,5-di-tert-butyl-1,2,5-triazapentadiene (1.000 g, 5.45 mmol) and potassium hydride (0.241 g, 6.00 mmol) in tetrahydrofuran (30 mL)) for 15 h at ambient temperature afforded 5 (0.602 g, 55%) as brown crystals upon sublimation at 165° C./0.05 Torn mp 257° C.; IR (Nujol, cm) 1500 (w), 1366 (m), 1351 (m), 1334 (m), 1313 (w), 1266 (s), 1231 (w), 1211 (w), 1179 (s), 1143 (m), 1135 (m), 1046 (m), 967 (s), 792 (m); μ=4.85 and 4.96 μin the solid state and in benzene solution, respectively. Anal. Calcd for CHCrN: C, 57.67; H, 9.68; N, 20.17. Found: C, 57.98; H, 9.48; N, 20.19. −1 1 6 6 3 3 3 3 20 40 6 In a fashion similar to the preparation of 1, treatment of anhydrous magnesium(II) bromide (0.497 g, 2.70 mmol) in tetrahydrofuran (40 mL) with a solution of potassium 1,5-di-tert-butyl-1,2,5-triazapentadienate (prepared from 1,5-di-tert-butyl-1,2,5-triazapentadiene (1.000 g, 5.45 mmol) and potassium hydride (0.241 g, 6.00 mmol) in tetrahydrofuran (30 mL)) for 15 h at ambient temperature afforded 6 (0.886 g, 81%) as yellow crystals upon sublimation at 165° C./0.05 Torr: mp 268° C.; IR (Nujol, cm) 1500 (w), 1366 (m), 1351 (m), 1334 (m), 1313 (w), 1266 (s), 1231 (w), 1211 (w), 1179 (s), 1143 (m), 1135 (m), 1046 (m), 967 (s), 792 (m); H NMR (CD, 23° C., δ) 6.87 (d, (J=4.4 Hz), 1H, CHN), 6.77 (d, (J=4.4 Hz), 1H, CHN), 1.45 (s, 18H, C(CH)), 1.06 (s, 18H, C(CH)); Anal. Calcd for CHMgN: C, 61.77; H, 10.37; N, 21.61. Found: C, 61.92; H, 10.33; N, 21.76. 2 3 6 6 3 2 3 3 aff B 16 34 8 −1 1 In a fashion similar to the preparation of 1, treatment of anhydrous NiCl.CHCN (0.490 g, 2.95 mmol) in tetrahydrofuran (40 mL) with a solution of potassium 1-tert-butyl-5-dimethylamino-1,2,5-triazapentadienate (prepared from 1-tert-butyl-5-dimethylamino-1,2,5-triazapentadiene (1.000 g, 5.90 mmol) and potassium hydride (0.259 g, 6.50 mmol) in tetrahydrofuran (30 mL)) for 15 h at ambient temperature afforded 7 (0.267 g, 23%) as dark red crystals upon sublimation at 105° C./0.05 Torr: mp 99° C.; IR (Nujol, cm) 1535 (w), 1366 (m), 1351 (m), 1317 (m), 1255 (m), 1195 (m), 1174 (m), 1055 (m), 1037 (m), 961 (m), 792 (m); H NMR (CD, 23° C., δ) 32.57 (s, broad 12H, N(CH)), 16.53 (s, broad 18H, C(CH)); μ=2.86 and 2.85 μin the solid state and in benzene solution, respectively. Anal. Calcd for CHNiN: C, 48.38; H, 8.63; N, 28.21. Found: C, 48.27; H, 8.53; N, 28.23. −1 eff B 16 34 8 In a fashion similar to the preparation of 1, treatment of anhydrous cobalt(II) chloride (0.376 g, 2.95 mmol) in tetrahydrofuran (40 mL) with a solution of potassium 1-tert-butyl-5-dimethylamino-1,2,5-triazapentadienate (prepared from 1-tert-butyl-5-dimethylamino-1,2,5-triazapentadiene (1.000 g, 5.90 mmol) and potassium hydride (0.259 g, 6.50 mmol) in tetrahydrofuran (30 mL)) for 15 h at ambient temperature afforded 8 (0.301 g, 27%) as dark green crystals upon sublimation at 105° C./0.05 Torr: mp 105° C.; IR (Nujol, cm) 1529 (m), 1366 (m), 1352 (s), 1316 (m), 1256 (m), 1235 (m), 1216 (m), 1198 (m), 1178 (m), 1051 (m), 1029 (m), 963 (m), 789 (m), 779 (m); μ=3.92 and 3.95 μin the solid state and in benzene solution, respectively. Anal. Calcd for CHCoN: C, 48.35; H, 8.62; N, 28.19. Found: C, 48.24; H, 8.66; N, 28.14. −1 eff B 16 34 8 In a fashion similar to the preparation of 1, treatment of anhydrous iron(II) chloride (0.374 g, 2.95 mmol) in tetrahydrofuran (40 mL) with a solution of potassium 1-tert-butyl-5-dimethylamino-1,2,5-triazapentadienate (prepared from 1-tert-butyl-5-dimethylamino-1,2,5-triazapentadiene (1.000 g, 5.90 mmol) and potassium hydride (0.259 g, 6.50 mmol) in tetrahydrofuran (30 mL)) for 15 h at ambient temperature afforded 9 (0.190 g, 18%) as dark green crystals upon sublimation at 105° C./0.05 Torr: mp 106° C.; IR (Nujol, cm) 1515 (w), 1368 (m), 1351 (m), 1312 (w), 1258 (w), 1196 (w), 1176 (w), 1026 (w), 794 (w); μ=4.78 and 4.82 μin the solid state and in benzene solution, respectively. Anal. Calcd for CHFeN: C, 48.73; H, 8.69; N, 28.42. Found: C, 49.05; H, 8.72; N, 28.10. −1 eff B 16 34 8 In a fashion similar to the preparation of 1, treatment of anhydrous manganese(II) chloride (0.371 g, 2.95 mmol) in tetrahydrofuran (40 mL) with a solution of potassium 1-tert-butyl-5-dimethylamino-1,2,5-triazapentadienate (prepared from 1-tert-butyl-5-dimethylamino-1,2,5-triazapentadiene (1.000 g, 5.90 mmol) and potassium hydride (0.259 g, 6.50 mmol) in tetrahydrofuran (30 mL)) for 15 h at ambient temperature afforded 10 (0.350 g, 32%) as dark orange crystals upon sublimation at 105° C./0.05 Torr: mp 108° C.; IR (Nujol, cm) 1539 (m), 1357 (m), 1323 (m), 1256 (m), 1196 (m), 1186 (m), 1152 (w), 1048 (m), 957 (w), 1021 (m), 786 (w), 730 (w); μ=5.80 and 5.82 μin the solid state and in benzene solution, respectively. Anal. Calcd for CHMnN: C, 48.84; H, 8.71; N, 28.48. Found: C, 48.86; H, 8.78; N, 28.32. −1 1 6 6 3 3 3 3 16 34 8 In a fashion similar to the preparation of 1, treatment of anhydrous magnesium(II) bromide (0.543 g, 2.95 mmol) in tetrahydrofuran (40 mL) with a solution of potassium 1-tert-butyl-5-dimethylamino-1,2,5-triazapentadienate (prepared from 1-tert-butyl-5-dimethylamino-1,2,5-triazapentadiene (1.000 g, 5.90 mmol) and potassium hydride (0.259 g, 6.50 mmol) in tetrahydrofuran (30 mL)) for 15 h at ambient temperature afforded 11 (0.689 g, 63%) as yellow crystals upon sublimation at 165° C./0.05 Torr: mp 113° C.; IR (Nujol, cm) 1529 (m), 1366 (m), 1352 (s), 1316 (m), 1256 (m), 1235 (m), 1216 (m), 1198 (m), 1178 (m), 1051 (m), 1029 (m), 963 (m), 789 (m), 779 (m); H NMR (CD, 23° C., δ) 6.73 (d, (J=4.4 Hz), 1H, CHN), 6.71 (d, (J=4.4 Hz), 1H, CHN), 2.31 (s, 18H, C(CH)), 1.45 (s, 18H, C(CH)); Anal. Calcd for CHMgN: C, 52.97; H, 9.45; N, 30.89. Found: C, 52.82; H, 9.66; N, 30.83. The following reaction scheme shows the synthesis of bis(1,2,5-triazapentadienyl) transition metal complexes. TABLE 1 Thermal properties of the complexes Sublimation Solid state temperature Melting decomposition % % Non volatile Complex (° C./0.05 Torr) point (° C.) temperature (° C.) Recovery residue 1 175 255-257 280 97 3 2 165 282-284 310 97 2 3 175 273-275 310 98 <1 4 160 258-260 296 98 1 5 155 260-262 290 98 1 6 165 268-270 290 96 3 7 105 106-108 200 95 4 8 105 104-106 181 93 5 9 105 103-105 225 94 5 10 105 97-99 188 95 4 11 105 113-114 180 95 3 FIG. 3 FIG. 3 1 5 7 10 provides TGA curves for compounds - and provides TGA curves for compounds -. Solution phase reactivity. FIG. 5 To assess initial viability for use in ALD film growth, 10 (Bis(1-tert-butyl-5-dimethylamino-1,2,5-triazapentadienyl)nickel(II)) was treated with anhydrous hydrazine in tetrahydrofuran at 23° C. A metallic black precipitate was observed within 0.25 h. The precipitate stuck to the magnetic stir bar and a powder X-ray diffraction spectrum indicated the formation of nickel metal (). General Considerations. 2 5 2 2 2 2 2 2 2 3 2 1 All manipulations were carried out under argon using either Schlenk or glove box techniques, except the ligands were prepared in ambient atmosphere. Tetrahydrofuran was distilled from sodium benzophenone ketyl, hexane was distilled from PO. Anhydrous transition-metal chlorides (CuCl, NiCl, CoCl, FeCl, MnCland CrCl) were obtained from Strem Chemicals Inc. and used as received. NiCl.CHCN was prepared according to a literature procedure.Potassium hydride (30 wt % dispersion in mineral oil; washed with hexane before use), was purchased from Sigma-Aldrich. 3-Methylbutanal, and tert-butyl amine were purchased from across organics. SeOand pinacolone were purchased from Alfa Aesar. 1 13 1 13 1 2 6 H and C{H} NMR spectra were obtained at 400 and 100 MHz, respectively, in benzene-dor chloroform-d as indicated and were referenced to the residual proton and the C resonances of the solvents. Infrared spectra were obtained using Nujol as the medium. Magnetic moments were determined in the solid state using a Johnson Mathey magnetic susceptibility apparatus, and by, H NMR in benzene solution using Evans method.Melting points were determined on a Thermo Scientific Mel-Temp 3.0 digital melting point apparatus and are uncorrected. TGA and DTA were carried out with a SDT-2960 TGA/DTA instruments. 2 2 4 3 3 2 3 3 3 2 3 3 3 3 2 3 3 3 2 5 −1 1 13 1 Isopropyl glyoxal[3-methyl-2-oxobutanal] was prepared using 3-methylbutanal and SeOaccording to a published procedure.A 100 mL round-bottomed flask was charged with a magnetic stir bar, 3-methyl-2-oxobutanal (1.000 g, 9.99 mmol) and diethyl ether (15 mL). To this stirred solution at ambient temperature was slowly added tert-butyl amine (1.059 g, 9.99 mmol). This solution was stirred for 6 h. The resultant yellow solution was washed with water (10 ml) and the organic layer was dried over anhydrous NaSO. The volatile components were removed by vacuum and resultant yellow oil was vacuum distilled. A light yellow oil was obtained at 60° C./0.05 Torr (1.147 g, 74%): IR (Nujol, cm) 1697 (s), 1638 (m), 1383 (s), 1365 (s), 1347 (s), 1213 (s), 1191 (s), 1149 (s), 1087 (s), 1027 (m), 949 (s), 902 (s), 644 (m); H NMR (CDCl, 23° C., δ) 7.48 (s, 1H, CHN), 3.57 (sep, 1H, (J=7.2), CH(CH)), 1.19 (s, 9H, C(CH)), 1.04 (d, 6H, (J=7.2), CH(CH)); C{H} NMR(CDCl, 23° C., ppm) 206.33 (s, CO), 118.93 (s, CHN), 58.40 (s, C(CH)), 33.92 (s, CH(CH)), 28.96 (s, C(CH)), 18.25 (s, CH(CH)). −1 eff B 18 32 2 2 A 100 mL Schlenk flask was charged with a magnetic stir bar, 1-(tert-butylimino)-3-methylbutan-2-one (1.000 g, 6.44 mmol) and tetrahydrofuran (30 mL). To this stirred solution at ambient temperature was slowly added potassium hydride (0.284 g, 7.08 mmol), and solution was stirred for 4 hours. This solution was then slowly added dropwise by cannula to a stirred suspension of anhydrous chromium(II) chloride (0.393 g, 3.22 mmol) in tetrahydrofuran (40 mL) at −78° C. The resultant dark green solution was stirred for 15 hours at ambient temperature. The volatile components were then removed under reduced pressure, and the resultant dark green powder was dissolved in hexane (50 mL). The solution was filtered through a 1 cm pad of Celite on a coarse glass frit, and hexane was then removed under reduced pressure. Dark green crystals of 12 (0.115 g, 10%) were obtained by sublimation at 120° C./0.05 Torr: mp 150-152° C.; IR (Nujol, cm) 1601 (m), 1580 (w), 1360 (m), 1352 (m), 1305 (m), 1215 (m), 971 (w); μ=4.80 and 4.98 μin the solid state and in benzene solution, respectively Anal. Calcd for CHCrNO: C, 59.98; H, 8.95; N, 7.77. Found: C, 59.81; H, 8.86; N, 7.66. −1 eff B 18 32 2 2 In a fashion similar to the preparation of 12, treatment of anhydrous manganese(II) chloride (0.403 g, 3.22 mmol) in tetrahydrofuran (40 mL) with a solution of potassium 1-(tert-butylimino)-3-methylbutan-2-olate (prepared from 1-(tert-butylimino)-3-methylbutan-2-one (1.000 g, 6.44 mmol) and KH (0.284 g, 7.08 mmol) in tetrahydrofuran (30 mL)) for 15 h at ambient temperature afforded 13 (0.429 g, 37%) as orange crystals upon sublimation at 165° C./0.05 Torr: mp 193-195° C.; IR (Nujol, cm) 1609 (m), 1594 (m), 1365 (m), 1349 (m), 1310 (m), 1291 (m), 1218 (m), 1202 (m), 1031 (w), 956 (m), 798 (w); μ=8.45 and 7.89μin the solid state and in benzene solution, respectively Anal. Calcd for CHMnNO: C, 59.49; H, 8.88; N, 7.71. Found: C, 59.39; H, 8.78; N, 7.64. −1 eff B 18 32 2 2 In a fashion similar to the preparation of 12, treatment of anhydrous iron(II) chloride (0.414 g, 3.22 mmol) in tetrahydrofuran (40 mL) with a solution of potassium 1-(tert-butylimino)-3-methylbutan-2-olate (prepared from 1-(tert-butylimino)-3-methylbutan-2-one (1.000 g, 6.44 mmol) and KH (0.284 g, 7.08 mmol) in tetrahydrofuran (30 mL)) for 15 h at ambient temperature afforded 14 (0.562 g, 49%) as dark red crystals upon sublimation at 155° C./0.05 Torr: mp 160-162° C.; IR (Nujol, cm) 1600 (w), 1595 (w), 1350 (w), 1358 (m), 1300 (m), 1260 (m), 1090 (m), 1020 (m), 799 (m); μ=7.21 and 6.72μin the solid state and in benzene solution, respectively Anal. Calcd for CHFeNO: C, 59.34; H, 8.85; N, 7.69. Found: C, 59.34; H, 8.76; N, 7.79. −1 eff B 18 32 2 2 In a fashion similar to the preparation of 12, treatment of anhydrous cobalt(II) chloride (0.418 g, 3.22 mmol) in tetrahydrofuran (40 mL) with a solution of potassium 1-(tert-butylimino)-3-methylbutan-2-olate (prepared from 1-(tert-butylimino)-3-methylbutan-2-one (1.000 g, 6.44 mmol) and KH (0.284 g, 7.08 mmol) in tetrahydrofuran (30 mL)) for 15 h at ambient temperature afforded 15 (0.933 g, 80%) as dark red crystals upon sublimation at 135° C./0.05 Torr: mp 166-168° C.; IR (Nujol, cm) 1605 (m), 1588 (m), 1365 (m), 1348 (m), 1307 (m), 1290 (m), 1203 (m), 964 (m), 799 (m); μ=6.83 and 7.01 μin the solid state and in benzene solution, respectively Anal. Calcd for CHCoNO: C, 58.85; H, 8.79; N, 7.62. Found: C, 59.02; H, 8.81; N, 7.67. 2 3 6 6 3 2 3 2 3 3 6 6 3 2 3 3 3 2 3 3 3 2 18 32 2 2 −1 1 13 1 In a fashion similar to the preparation of 12, treatment of anhydrous NiCl.CHCN (0.540 g, 3.22 mmol) in tetrahydrofuran (40 mL) with a solution of potassium 1-(tert-butylimino)-3-methylbutan-2-olate (prepared from 1-(tert-butylimino)-3-methylbutan-2-one (1.000 g, 6.44 mmol) and KH (0.284 g, 7.08 mmol) in tetrahydrofuran (30 mL)) for 15 h at ambient temperature afforded 16 (0.767 g, 66%) as pale green crystals upon sublimation at 120° C./0.05 Torr: mp 166-168° C.; IR (Nujol, cm) 1607 (w), 1574 (m), 1358 (m), 1351 (m), 1299 (m), 1213 (m), 978 (w), 799 (w); H NMR (CD, 23° C., δ) 7.94 (s, 1H, CHN), 2.48 (s, 6H, C(CH)), 2.31 (s, 6H, C(CH)), 1.35 (s, 18H, C(CH)); C{H} NMR(CD, 23° C., ppm) 156.31 (s, CN), 150.64 (s, C(CH)), 126.95 (s, CO), 61.42 (s, C(CH)), 30.29 (s, C(CH)), 18.05 (s, C(CH)), 17.61 (s, C(CH)); Anal. Calcd for CHNiNO: C, 58.88; H, 8.78; N, 7.63. Found: C, 58.97; H, 8.89; N, 7.61. −1 eff 13 18 32 2 2 In a fashion similar to the preparation of 12, treatment of anhydrous copper(II) chloride (0.430 g, 3.22 mmol) in tetrahydrofuran (40 mL) with a solution of potassium 1-(tert-butylimino)-3-methylbutan-2-olate (prepared from 1-(tert-butylimino)-3-methylbutan-2-one (1.000 g, 6.44 mmol) and potassium hydride (0.284 g, 7.08 mmol) in tetrahydrofuran (30 mL)) for 15 hours at ambient temperature afforded 17 (0.505 g, 43%) as brown crystals upon sublimation at 110° C./0.05 Torr: mp 135-138° C.; IR (Nujol, cm) 1607 (m), 1586 (s), 1365 (m), 1350 (m), 1300 (s), 1239 (m), 1214 (s), 1126 (m), 1035 (m), 971 (m), 675 (m); μ=1.88 and 1.80μin the solid state and in benzene solution, respectively Anal. Calcd for CHCuNO: C, 58.12; H, 8.67; N, 7.53. Found: C, 58.33; H, 8.76; N, 7.58. −1 In a fashion similar to the preparation of 12, treatment of anhydrous chromium(II) chloride (0.362 g, 2.95 mmol) in tetrahydrofuran (40 mL) with a solution of the lithium radical anion of 1-(tert-butylimino)-3,3-dimethylbutan-2-oyl (prepared from 1-(tert-butylimino)-3,3-dimethylbutan-2-one (1.000 g, 5.91 mmol) and lithium metal (0.045 g, 6.49 mmol) in tetrahydrofuran (30 mL)) for 15 h at ambient temperature afforded 18 (0.056 g, 5%) as brown crystals upon sublimation at 135° C./0.05 Torr: mp 248-250° C.; IR (Nujol, cm) 1623 (w), 1489 (m), 1413 (w), 1367 (m), 1358 (m), 1341 (m), 1262 (w), 1200 (m), 1164 (m), 1062 (w), 984 (w). −1 eff B 40 78 2 4 4 In a fashion similar to the preparation of 12, treatment of anhydrous manganese(II) chloride (0.365 g, 2.95 mmol) in tetrahydrofuran (40 mL) with a solution of the lithium radical anion of 1-(tert-butylimino)-3,3-dimethylbutan-2-oyl (prepared from 1-(tert-butylimino)-3,3-dimethylbutan-2-one (1.000 g, 5.91 mmol) and lithium metal (0.045 g, 6.49 mmol) in tetrahydrofuran (30 mL)) for 15 h at ambient temperature afforded 19 (0.407 g, 37%) as dark orange crystals upon sublimation at 145° C./0.05 Torr: mp 175-177° C.; IR (Nujol, cm) 1650 (w), 1360 (m), 1344 (m), 1262 (w), 1211 (w), 1153 (w); μ=5.96 and 5.86 μin the solid state and in benzene solution, respectively Anal. Calcd for CHMnNO: C, 60.89; H, 9.97; N, 7.10. Found: C, 60.92; H, 10.04; N, 6.84. −1 eff B 40 77 2 4 4 In a fashion similar to the preparation of 12, treatment of anhydrous iron(II) chloride (0.381 g, 2.95 mmol) in tetrahydrofuran (40 mL) with a solution of the lithium radical anion of 1-(tert-butylimino)-3,3-dimethylbutan-2-oyl (prepared from 1-(tert-butylimino)-3,3-dimethylbutan-2-one (1.000 g, 5.91 mmol) and lithium metal (0.045 g, 6.49 mmol) in tetrahydrofuran (30 mL)) for 15 h at ambient temperature afforded 20 (0.210 g, 18%) as dark green crystals upon sublimation at 140° C./0.05 Torr: mp 143-145° C.; IR (Nujol, cm) 1650 (m), 1365 (m), 1263 (w), 1214 (m), 1156 (w), 1125 (w), 1022 (w), 800 (w); μ=4.82 and 4.74 μin the solid state and in benzene solution, respectively Anal. Calcd for CHFeNO: C, 60.83; H, 9.83; N, 7.09. Found: C, 60.74; H, 9.60; N, 7.22. −1 eff B 20 38 2 2 In a fashion similar to the preparation of 12, treatment of anhydrous cobalt(II) chloride (0.383 g, 2.95 mmol) in tetrahydrofuran (40 mL) with a solution of the lithium radical anion of 1-(tert-butylimino)-3,3-dimethylbutan-2-oyl (prepared from 1-(tert-butylimino)-3,3-dimethylbutan-2-one (1.000 g, 5.91 mmol) and lithium metal (0.045 g, 6.49 mmol) in tetrahydrofuran (30 mL)) for 15 h at ambient temperature afforded 21 (0.869 g, 79%) as dark red crystals upon sublimation at 135° C./0.05 Torr: mp 194-196° C.; IR (Nujol, cm) 1626 (w), 1482 (m), 1407 (m), 1332 (m), 1265 (w), 1216 (m), 1156 (m), 992 (w), 815 (w); μ=1.79 and 1.73 μin the solid state and in benzene solution, respectively Anal. Calcd for CHCoNO: C, 60.44; H, 9.64; N, 7.05. Found: C, 60.42; H, 9.48; N, 7.07. 2 3 6 6 3 3 3 3 6 6 3 3 3 3 3 2 3 3 20 38 2 2 −1 1 13 1 In a fashion similar to the preparation of 12, treatment of anhydrous NiCl.CHCN (0.498 g, 2.95 mmol) in tetrahydrofuran (40 mL) with a solution of the lithium radical anion of 1-(tert-butylimino)-3,3-dimethylbutan-2-oyl (prepared from 1-(tert-butylimino)-3,3-dimethylbutan-2-one (1.000 g, 5.91 mmol) and lithium metal (0.045 g, 6.49 mmol) in tetrahydrofuran (30 mL)) for 15 h at ambient temperature afforded 22 (0.340 g, 30%) as red crystals upon sublimation at 135° C./0.05 Torr: mp 181-183° C.; IR (Nujol, cm) 1633 (w), 1484 (m), 1407 (m), 1358 (s), 1264 (m), 1218 (m), 1158 (m), 991 (m), 887 (m), 818 (m), 761 (m), 621 (m); H NMR (CD, 23° C., δ) 9.93 (s, 1H, CHN), 2.27 (s, 9H, C(CH)), 0.70 (s, 9H, C(CH)); C{H} NMR(CD, 23° C., ppm) 148.50 (s, CO), 132.07 (s, CN), 73.63 (s, C(CH)), 54.56 (s, C(CH)), 23.26 (s, C(CH)), 15.30 (s, C(CH)); Anal. Calcd for CHNiNO: C, 60.47; H, 9.64; N, 7.05. Found: C, 59.95; H, 9.38; N, 7.06. The following reaction scheme shows the synthesis of bis(1-(tert-butylimino)-3-methylbutan-2-olate) transition metal complexes. TABLE 2 Thermal properties of 12-17. Isolated Solid state yield by Sublimation decomposition % Non sublimation temperature Melting temperature % volatile Compound (%) (° C./0.05 Torr) point (° C.) (° C.) Recovery residue 12 10 120 150-152 220 96 3 13 37 165 193-195 295 97 2 14 49 155 160-162 262 97 2 15 80 135 166-168 276 98 <1 16 66 120 166-168 260 97 2 17 43 110 135-138 190 97 2 The following reaction scheme shows the synthesis of bis(1-(tert-butylimino)-3,3-dimethylbutan-2-oyl) transition metal complexes. TABLE 3 Thermal properties of 18-22. Isolated yield by Sublimation Melting Solid state % Non- sublimation temperature point decomposition % volatile Compound (%) (° C./0.05 Torr) (° C.) temperature (° C.) Recovery residues 18 5 135 248-250 250 90 7 19 37 145 175-177 245 91 6 20 18 140 143-145 241 90 8 21 79 135 194-196 235 93 6 22 30 135 181-183 180 90 5 FIG. 6 18 20 22 provides TGA traces of compounds -, and . Solution Phase Reactivity. 2 2 3 2 2 2 3 2 3 2 2 2 FIG. 7 FIG. 8 In order to get some insight into reactivity of these precursors, 15-17 were treated with reducing co-reagents. In these reactions, a solution of 15-17 in tetrahydrofuran was treated with 5-times molar excess of NHNHand BH(NHMe) in separate flasks. Reactions that did not afford a black powder or black solution at ambient temperature within one hour were then refluxed for one hour. Results are summarized in Table 4. Treatment of 17 with NHNHand BH(NHMe) afforded a copper colored powder which gave reflections for copper metal in X-ray powder diffraction (). Additionally, 16 reacted with both reducing agents at ambient temperature to afford nickel metal which was confirmed by X-ray powder diffraction (). Moreover, 15 reacted with BH(NHMe) at ambient temperature and gave a black precipitate which stuck to stir bar, suggesting the formation of cobalt metal. However, X-ray powder diffraction did not show reflections. Treatment of 15 with NHNHdid not afford a black solution or black precipitate either at ambient temperature or reflux condition. TABLE 4 Reactivity of 15-17 toward reducing agents in tetrahydrofuran. Reducing agent (CoL<sub>2</sub>)<sub>2 </sub>(15) NiL<sub>2 </sub>(16) CuL<sub>2 </sub>(17) NH<sub>2</sub>NH<sub>2</sub> No change metallic mirror on copper colored the flask wall powder BH<sub>3</sub>(NHMe<sub>2</sub>) Black powder; black powder; sticks copper colored sticks to to stir bar powder stir bar While embodiments of the invention have been illustrated and described, it is not intended that these embodiments illustrate and describe all possible forms of the invention. Rather, the words used in the specification are words of description rather than limitation, and it is understood that various changes may be made without departing from the spirit and scope of the invention. Rect. Tray. Chim. Pays Bas Reedijk, J.; Groeneveld, W. L. -1968, 87, 552. J. Chem. Soc. Evans, D. F. 1959, 2003. J. Chem. Soc., Perkin Trans. McNab, H. 2 1981, 1283. Chem. Ber. Severin, T.; Poehlmann, H. 1977, 110, 491. Tetrahedron Kwiatowski, P.; Chaladaj, W.; Jurczak, J. 2006, 62, 5116-5125. BRIEF DESCRIPTION OF THE DRAWINGS Exemplary embodiments of the present invention will become more fully understood from the detailed description and the accompanying drawings, wherein: FIG. 1 is a schematic illustration of an ALD deposition system used in an embodiment of the present invention; FIG. 2 provides examples of acids that can be reacted with the compounds of having formula 1, 2, and 3; FIG. 3 1 5 provides thermogravimetric analysis (TGA) for compounds -; FIG. 4 7 10 provides thermogravimetric analysis (TGA) for compounds -; FIG. 5 10 provides an X-ray Powder Diffraction Spectrum of nickel metal produced upon treatment of compound with hydrazine; FIG. 6 18 20 22 provides thermogravimetric analysis (TGA) for compounds -, and ; FIG. 7 3 2 provides an X-ray powder diffraction spectrum of copper metal produced upon treatment of 17 with BH(NHMe); and FIG. 8 3 2 provides an X-ray powder diffraction spectrum of nickel metal produced upon treatment of 16 with BH(NHMe).
GENERAL CHARACTER NATURE OF INVENTION INVENTIVE IDEA FULL DESCRIPTION PRIOR ART This invention involves a process which uses rpm's, weight and the diameter of connectors to regulate the torque that is required to increase the efficiency of generating units and/or decrease harmful emissions. Most generator ends use a stator, armature, magnets, copper wires and rotation to generate power. In a conventional gas generator, the motor turns the armature inside the stator and the magnets create an electro-magnetic field which becomes stronger as the power increases. In TJ POWER, it uses a flywheels stored energy to overpower the magnetic field. Since the flywheel is supplying all the torque to drive the generator end, a secondary driving energy can be used to drive the flywheel. With large generating unit that are using water, burning fossil fuels or uranium to make steam to generate power, these can be replaced by the process of using rpm's, weight and the diameter of connectors to generate the power. This process can be used with existing systems reduce the power of the steam or water that is required to turn the turbines thus reducing their emissions or using less water. During my research into power generation, I noticed how much the use of torque played a part, so I had to do my research on how to get the torque needed to run the generating unit instead of a motor. I started by using the formula Me=Pe+Ke whereas, Me is mechanical energy, Pe is potential energy and Ke is kinetic energy. I had a 2000 watt generator end and the manufacturer said it took a 4 hp (horse power) to run it. I also had a 110 amp alternator, which when I asked around at repair shops, was told it would need at least a 3 hp (horse power) to produce the 110 amps (over 1500 watts). I decided on using the car alternator connected to a dead battery due to it's size. I tried using a ¾ hp (horse power) motor to start the alternator, but as soon as I flashed the field (this energizes the alternator so it will start to produce the power), the alternator stopped. The electro-magnetic force was too strong for the ¾ hp motor. I tried different ratio of sprockets and gears to no avail, the electro-magnetic field was still too strong. This is when I thought of installing a flywheel to produce the torque through kinetic energy to drive the alternator and it worked perfectly. After watching it run for awhile, I came up with a guideline that will work on most generating units, I called TJ POWER, it is Me=PDe+SDe whereas, Me is mechanical energy, PDe is primary driving energy (flywheel) and SDe is secondary driving energy. When you are using this guideline, the flywheel's stored energy must be able to produce enough kinetic energy to operate the generating unit at full power. To figure out the kinetic energy required, use 1000 watts equals 72 in/lbs of torque (place weight on the outside diameter of flywheel for larger generating units.), this is the minimum amount of kinetic energy required to run the generator at full capacity. The flywheel can be any shape or size, but it must be able to produce the proper kinetic energy for the generating unit. Once you have the flywheel connected to the generating unit, the secondary driving energy that is going to be used can be connected and it must be able to turn the flywheel at the proper speed. By changing the diameter sizes of the connections or by slowing or increasing rpm's speed, you can adjust the amount of torque required by the secondary driving energy to accomplish this. If you apply this guideline to the 2000 watt generator end, the flywheel would have to produce at least 144 in/lbs of torque and the secondary driving energy used must be able to supply enough torque to turn the flywheel. When using this process on large generating units, the secondary driving unit must gradually build up the rpm's on the flywheel. An example, is using a 240 volt ac, 3 phase motor connected to a VFD that will change 120 volt ac, single phase power to 240 volt ac and 3 phase power and the rpm's can be adjusted. 6 5 3 6 6 5 3 4 3 4 5 6 4 5 5 6 5 6 6 3 6 6 Using the block drawing in the abstract to show how the process works following the guidelines. First, the alternator is the mechanical energy, second the flywheel is the primary driving energy, third the ¾ electric motor is the secondary driving energy. The alternator will need the spin at over 2200 rpm's to produce the 110 amps @ over 14 volts dc. Since the alternator will produce around 1500 watts, the flywheel must be able to produce at least 108 in/lb of torque. The ¾ hp motor is connected to a 15-1 speed reducer to build up the torque. In this case, the ¾ hp motor produces 27 in/lbs of torque @ 1750 rpm's, so when connected to the input shaft of the speed reducer , the output shaft will produce 405 in/lbs of torque @ around 116 rpm's which strong enough to spin the flywheel . Now to connect everything to get to the working rpm's of the alternator . The use of sprocket and roller chains are being used to cut down on the friction. On the speed reducers output shaft there is a 60 tooth sprocket which is connected to a 12 tooth sprocket on the shaft of the flywheel to create 580 rpm's. There is another sprocket on the shaft of the flywheel that is connected to the alternator . The sprocket on the shaft of the flywheel has 60 teeth and the sprorket on the generating unit has 14 making the speed of the alternator over 2400 rpm's. So the final product is a ¾ hp motor which uses around 850 watts running a an alternator which produces around 1500 watts of power and in this case, since we are using a car alternator which produces dc voltage this process will increase the efficiency of charging a battery. Back in 2003, I filed for a patent in Canada and was given a filing #2,450,028. After building a prototype, I discovered it wouldn't produce maximum power so I let it become abandon. A few years ago I noticed a U.S. Pat. No. 7,095,126 which uses the same principles of my original patent filed back in 2003. By using my changes it will greatly improve the efficiency of these inventions. This invention will make power generation more efficient over prior art. DESCRIPTION OF DRAWING FIG. 1 , shows a block drawing of the guideline for TJ POWER. FIG. 2 6 5 4 4 3 4 3 5 6 4 6 3 4 5 5 5 6 5 6 6 , it shows a block drawing of a 110 amp dc alternator with a 14 tooth sprocket on its shaft which is connected by a roller chain to a shaft with a 60 tooth sprocket and a flywheel (which can produce over 108 in/lbs of torque) and a 12 tooth sprocket . This 12 tooth sprocket is connected by a roller chain to a 60 tooth sprocket on a 15-1 ratio speed reducer and then the speed reducer is attached to the ¾ hp motor . The reason for the speed reducer is to build up the torque of the motor to turn the shaft with the flywheel which needs more torque at the start. The sprockets are being used to increase the speed so the alternator will turn at the proper speed (the diameter of the sprockets also help with the torque). This has to be done because the speed reducer's manufacturer says the input speed should be 1750 rpm's bringing the output speed to 115 rpm's and the alternator works at over 2200 rpm's to produce it's 110 amps over 12 volts DC. So TJ POWER the process is, build up the torque of the electric motor , then using different diameter of sprockets , to build back-up the rpm's and again to adjust the torque to turn the flywheel . Calculate the amount of energy that is required by the flywheel to get the generating unit to produce full power and use connectors on the shaft of the flywheel and generating unit to run it at the proper rpm's. To help with the torque, place a larger connector on the shaft or the generating unit to apply more torque. FIG. 3 FIG. 2 6 1 2 3 8 6 7 6 9 10 6 , it shows a block drawing of (with a few additions) in which uses an alternator as a battery charger which can charge a battery in minutes not hours using 110 volt ac power . Added are a switch which turns the ¾ hp motor on and off, another switch which connects the alternator to a 6 volt dc battery to flash the field of the alternator , a battery to be charged and a ground connected to the alternator . FIG. 4 5 5 5 11 12 , it shows an illustration of a flywheel which could be used on larger generating units. When using this type of flywheel or any other type or shape flywheel , keep the weight on the outside diameter . By doing so, you will increase the torque on the shaft through the bore hole and make the calculation of torque required easier.
CROSS-REFERENCE TO RELATED APPLICATION This application claims the benefit of U.S. Provisional Pat. application Ser. No. 60/020,792, filed Jun. 27, 1996. BACKGROUND OF THE INVENTION 1. Field of the Invention The present invention is directed to furniture in general and, more specifically, to modular children's furniture, having planar bases with recessed rubber caster-wheels, a planar top, a cube, a rectangular cubicle, a drawer component, a shelf, and an adaptable playpen. The bases are configured in differing lengths and widths in order to accommodate a variety of modular configurations. The cube and cubicle components include hinged doors. The playpen has two solid wall panels and two plastic coated wire mesh panels, the solid panels being adaptable to a standard bedframe. Further, the present invention is made of wood, or a similarly durable material, and all surfaces have an attractive stain finish. 2. Description of the Related Art The present invention imparts great versatility and adaptability in modular furniture that heretofore has been unavailable, especially in regard to furniture suiting the needs of infants and growing children. The modular components of the present invention are regrouped variously to build and assemble modular furniture that will continue to serve different and changing needs of growing children. Modular means: &quot;constructed with independent standardized units for use together.&quot; Indeed, the present invention is modular, unlike previously known and described furniture, each component not only having independent utility, but also being uniquely configured so that each modular component can be adapted to another component in an infinite variety of configurations, thus to create a functional whole that is greater than the sum of the individual parts. Numerous U.S. and foreign patents describe and disclose articles of furniture having numerous parts that can be assembled in a variety ways; no matter how the parts of the furniture are assembled, however, the result invariably is a bed, a desk, a playpen, a cabinet. In direct contradistinction thereto, the present invention is unique--each component or module has its own inherent function as an article of furniture, independent of its potential interrelation with other modular components. For example, the hinged cube and the rectangular cubicle can serve as hampers or chests. The modular drawer-and-case is an attractive and useful feature alone. Further, the bases are convenient platforms, and the tops are portable and storable counters. U.S. Pat. No. 2,787,007 issued to Erdkamp on Apr. 2, 1957, discloses a baby and youth bed assembly having a plurality of units that can be adapted to make a playpen with a dresser cabinet. No matter how the parts are assembled, and no matter what the final configuration or spacial orientation, the sum of the parts is still a playpen. The parts cannot be assembled to provide, for instance, a table. Similarly, U. S. Pat. No. 2, 809,691 issued to Davis et al. on Aug. 18, 1959, describes a dual sofa- bed assembly, the type commonly found in many American vacation homes in the 1970's. Though this device provides the user a certain degree of flexibility, regarding assembly and orientation, the assembled sofa is still fundamentally a pair of twin beds and an end table. The assembly disclosed in U.S. Pat. No. 3,241,885 issued to Deaton on Mar. 22, 1966, is an expandable sofa, end table and coffee table. Simply altering the manner of assembly yields no other versatility or variety of function beyond that which is already inherent to the function of a sofa and a table. Furthermore, the unassembled parts of an article of furniture generally have no utility until assembled. In contrast, the present invention provides modular components that have a dual aspect of utility: 1) the modular components of the present invention have utility as independent items of furniture; and 2) the modular components are the building blocks for articles of furniture that do not have a predetermined function. Other U.S. patents have disclosed furniture that have similar structural limitations; that is to say, even though the furniture can be assemble in numerous fashions, its basic function cannot be altered. U.S. Pat. No. 3,338,648 issued to Bannister on Aug. 29, 1967, discloses a bunk- bed/desk/cabinet suitable for living quarters that have limited space, such as a college dormitory. Convenient, versatile and admittedly adaptable, but still, unlike the present invention, the parts of a bunk- bed cannot be utilized for any purpose other than for the assembly of a bunk-bed. Conversely, the user of the independent modular components of the present invention can regroup the same modular. components differently, to obtain modular furniture that serves different and changing needs. Similarly, U.S. Pat. No. 4,109,328 issued to Mason on Aug. 29, 1978, describes a bunk-bed that does not teach that independently functioning units can be grouped together to form different functions. Several U.S. patents describe uses that the present invention could conceivable serve; however, none of these devices teach that the same independent modular elements can be recombined by the user to fulfill a different purposes and produce new results. In essence, the user becomes the decision-maker regarding the ultimate function and purpose of the assemble structure. U.S. Pat. No. 4,259,755 issued to Hollander on Apr. 7, 1981, describes an expandable bedframe with multiple compartments. Though the present invention might be utilized to form a bedframe with multiple compartments, the user is not needlessly constrained to a single adaptation. Similarly, U.S. Pat. No. 5,423, 597 issued to Rogers on Jun. 13, 1998, discloses the interchangeable parts for children's school chair and desk. And again, U.K. Pat. App. No. 2, 137,082 published by Geddis on Oct. 3, 1984, discloses a bed, a desk, a cabinet, a shelf, and a bracket. Unlike the previously disclosed articles of furniture, the purpose and function of the assembled structure of the present invention, is not predetermined. The present invention is a unique combination of modular elements that can be assembled in any number of configurations to provide an infinite number of functions. U.S. Pat. No. 5,176,435 issued to Pipkens on Jan. 5, 1993, discloses furniture for hotels with parts that can be replaced in the event of excessive wear or damage by hotel guests. The modular elements of the present invention are not replacement parts for a particular article of furniture, but rather are creative building blocks, adaptable to an infinite number of structures and purposes. Finally, British Provisional Spec. No. 162,779 issued to Bender on May 3, 1921, discloses an improved construction for desks, counters and tables, whereby articles of furniture can be constructed from parts that can be rearranged to enhance adaptability of the particular article of furniture. Like previously discussed articles of furniture, the use, purpose, and function of the desks, counters and tables are predetermined, and unlike the modular elements of the present invention, the unassembled parts serve no independent function other than as assembly components. Unlike currently available furniture described as modular, the present invention is uniquely configured to allow the user to become the ultimate decision maker regarding the final assembled use. Furthermore, unlike existing furniture, the component modules of the present invention have inherent function as items of furniture. None of the above inventions and patents, taken either singly or in combination, is seen to describe children's modular furniture as claimed. Thus, modular children's furniture solving the aforementioned problems is desired. SUMMARY OF THE INVENTION The present invention is modular children's furniture made up of a base with recessed rubber caster-wheels, a top, a cube with a hinged door, a case with a drawer, a rectangular cubicle having a hinged rectangular door, a shelf and an adaptable playpen. The cube component is specifically configured so that the hinged face can be opened to the side as a door or lifted as a lid. The cube can serve alone as a hamper or a chest, and as a component with other modular components. The cube may include shelves. Similarly, the rectangular cubicle is configured so that the rectangular hinged door can be opened to the side as a door or lifted up as a lid. The rectangular cubicle can also serve as a chest or a hamper, and can include shelves. The cube and the rectangular cubicle can serve as a pedestal when used in conjunction with other cubes, cubicles and modular components. The drawer component includes a case with runners and a drawer that is slidably mounted therein with tracks. The drawer component further includes a child proof latch. The drawer components are stackable, as are the cube and rectangular cubicle. Individually, the drawer components can be made/used as a chest or table top storage container. In conjunction with other components the drawer and case can be stacked to form a pedestal, a file cabinet, or an armoire. The top and base are adapted from a planar panel. The top is a planar panel without caster wheels and the base is a planar panel with rubber caster wheels. The planar panels are configured in different lengths and widths in order to accommodate a variety of configurations and provide the user greater flexibility and versatility. Used alone the planar panels with caster wheels form a convenient rolling stand or platform. Used in conjunction with other modular components the planar bases furnish a movable stand upon which cubes, cubicles, playpens, and drawer components can be arranged. Similarly, the planar tops provide a convenient countertop. The planar tops are configured to provide versatility and flexibility. The shelf component includes a base, a top, two side panels, a rear panel, and a plurality of plastic coated wire meshed shelves. The shelves are made of a mesh material to enhance air circulation, and reduce weight and expense. Finally, to further enhance versatility and adaptability for an infant, the present invention includes a playpen having two solid panels and two plastic covered wire panels. When the infant becomes too large for the playpen, the solid side panels of the playpen are configured to be easily mounted on a standard twin bedframe. The present invention provides versatility and adaptability in modular furniture that heretofore has been unavailable, especially in regard to growing children. Further, the present invention is made of wood, or a similarly durable material, and all surfaces have an attractive stain finish. Accordingly, it is a principal object of the invention to provide modular components that can be assembled into furniture for children. The components including a wheeled base, a top, a stackable cube having a hinged face, a stackable rectangular cubicle also having a hinged rectangular face, a case with a drawer, a shelf, and a playpen. It is another object of the invention to provide modular furniture for children that can be used separately or in conjunction with other components. When the components are used in conjunction with other components it is specifically intended that the functions and purposes should not be limited, but instead adaptable to a variety of uses and changing conditions. Indeed it is intended that the present invention provide adaptability for the growing child. It is an object of the invention to provide improved elements and arrangements thereof in an article for the purposes described which is inexpensive, dependable and fully effective in accomplishing its intended purposes. These and other objects of the present invention will become readily apparent upon further review of the following specification and drawings. BRIEF DESCRIPTION OF THE DRAWINGS FIG. 1 is an environmental perspective view of modular children's furniture showing a possible configuration of the modular components. FIG. 2 is a perspective view of the case of the drawer component. FIG. 3 is a perspective view of the cube component. FIG. 4 is a perspective view of the planar panel without caster wheels, and an outline of an elongated embodiment of the planar panel. FIG. 5 is a perspective view of the planar panel with caster wheels, and an outline of an elongated embodiment of the panel. FIG. 6 is a perspective view of the shelf component. FIG. 7 is a perspective view of the adaptable playpen. Similar reference characters denote corresponding features consistently throughout the attached drawings. DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENT As depicted in FIG. 1 the children's modular furniture 10 includes a stackable cube 18, a stackable rectangular cubicle 16, a planar panel without caster wheels 12, a planar panel with casters 14, a stackable drawer component 22, a shelf component 70 (FIG. 6) and an adaptable playpen 80 (FIG. 7). As depicted in FIG. 3, the stackable cube 18 has five squared walls 40, 40, 40, 40, 40, and a hinged door 42, mounted on a squared wall 40 by a hinge 44. The stackable cube component 18 can be stacked in a manner that permits the hinged door 42 to swing open to the side as a door, or up as a lid as depicted in FIG. 3. Alternatively, the stackable cube includes a plurality of shelves. (not shown). In the preferred embodiment the stackable cube component is made from wood and has a natural stain finish; however, alternatively any durable, child safe material, such as plastic is suitable. Furthermore, in the preferred embodiment the dimension of the square walls of the stackable cube is twenty-two inches; furthermore, the walls are two inches thick. The stackable rectangular cubicle 16 (shown in FIG. 1), includes two squared sides 25, 25, three rectangular walls 17, 17, 17 and a hinged rectangular door 20, connected to a rectangular wall 19 along the length with a second hinge 23. The stackable rectangular cubicle 16 can be stacked in a manner which permits the rectangular door 20 to swing open to the side as depicted in FIG. 1, or else stacked to permit the rectangular door to lift as a lid. Alternatively, the stackable rectangular cubicle 16 includes a plurality of shelves 21. In the preferred embodiment the stackable rectangular cubicle component is made from wood and has a natural stain finish; however, alternatively any durable, child safe material, such as plastic is suitable. Furthermore, in the preferred embodiment the rectangular cubicle has two squared sides 25, 25 that are twenty-two inches by twenty-two inches. The rectangular walls 17, 17, 17 and the rectangular door 20 have a length of thirty- three inches and a width of twenty-two inches, the walls and door being two inches thick. As depicted in FIGS. 1 and 2, present invention includes a stackable drawer component 22 having a case 32 and a drawer 24. FIG. 1 shows the drawer 24, and FIG. 3 illustrates the case 32 in which the drawer 24 is inserted. The case 32 includes a case top 36, a case bottom 34, two case sides 30, 30 and a case rear 38. The case side walls 30, 30 have interior surfaces 31, 31. Each interior surface has mounted thereon a runner 26, 26. The drawer 24, as shown in FIG. 1, has a drawer bottom 39, a drawer front 37, two drawer sides 35, 35, a drawer rear (not shown), and a child proof safety latch 31. The drawer sides 35, 35 each have an exterior surface 41, 41 whereupon are mounted a runner 33, 33 for slidably mounting the drawer 24 inside of the case 32. In the preferred embodiment the stackable drawer component is made from wood and has a natural stain finish; however, alternatively any durable, child safe material, such as plastic is suitable. Furthermore, in the preferred embodiment the case rear is thirty- three inches by eleven inches and the case side walls are twenty-two inches by eleven inches the walls being one inch thick, further the drawer being specifically configured to be slidably mounted within the case. As is seen in FIG. 4, the modular children's furniture includes a planar panel 12 without caster wheels, the planar panel having a counter top 46, side walls 48, 48, and an inferior surface 42 that caps the stackable modular components, as shown in FIG. 1. Furthermore, as indicated by outline 52, the planar panel has alternative embodiments. Specifically, the planar panel includes four sizes: 1) thirty-three inches by twenty two inches; 2) sixty-six inches by twenty-two inches; 3) ninety-nine inches by twenty-two inches; and 4) sixty-six inches by forty- four inches. The planar panel in all the embodiments is three inches thick. Furthermore, in the preferred embodiment the planar panel without casters is made from wood and has a natural stain finish; however, alternatively any durable, child safe material, such as plastic is suitable. As shown in FIG. 5, the modular children's furniture includes a stacking planar panel 14 with a plurality caster wheels 56, 56, 56, 56. The planar panels has a stacking surface 54, side walls 58, 58 and a lower surface 50 upon which are mounted a plurality of caster wheels 56. The modular components are conveniently stacked on the stackable surface of the planar panel with caster wheels, as depicted in FIG. 1. Furthermore, as depicted in outline 60, the planar panel has alternative embodiments. Specifically, the stacking planar panel includes four sizes: 1) thirty-three inches by twenty two inches having four recessed caster wheels; 2) sixty-six inches by twenty-two inches having six recessed caster wheels; 3) ninety-nine inches by twenty-two inches having six caster wheels; and 4) sixty-six inches by forty-four inches having eight rubber caster wheels; and 5) forty-four inches by forty- four inches having four rubber caster wheels and being specifically adaptable to a playpen. The planar panel in all the embodiments is three inches thick. Furthermore, in the preferred embodiment the planar panel with casters is made from wood and has a natural stain finish; however, alternatively any durable, child safe material, such as plastic is suitable. Finally, in the preferred embodiment the caster wheels are a rubber, such as hard rubber, and recessed so that the stackable planar panel is one half of an inch above the surface upon which it sits, as indicated by lines 11 in FIG. 1. With reference to FIG. 6, the modular children's furniture includes a shelf component 70. The shelf has a shelf bottom 76, a shelf top 74, shelf side panels 72, 72, a shelf rear panel 77 and a plurality of plastic coated wire shelves 78, 78. In the preferred embodiment the shelf component is sixty-six inches high, twenty-two inches deep and twenty-two inches wide, the shelves being spaced at twelve inch intervals. Furthermore, the shelf top and bottom are three inches thick. In the preferred embodiment the shelf component is made from wood and has a natural stain finish; however, alternatively any durable, child safe material, such as plastic is suitable. Finally, and as illustrated in FIG. 7, the modular children's furniture includes a playpen 80 adapted specifically from a planar base with casters that measures forty-four inches by forty-four inches. The playpen includes a base 88, two playpen solid side panels 86, 86, and two plastic coated wire panels 82, 82. The side panels 86, 86, 82, 82, are thirty-six inches high. In the preferred embodiment the shelf component is made from wood and has a natural stain finish; however alternatively, any durable, child safe material, such as plastic is suitable. Furthermore, solid playpen side panels are specifically adapted to permit the adaptation of the frame of a standard bed frame. Thus as a baby grows the playpen portion can be modified for continued use. It is to be understood that the present invention is not limited to the embodiment described above, but encompasses any and all embodiments within the scope of the following claims.
CROSS-REFERENCE TO RELATED APPLICATIONS FIELD BACKGROUND SUMMARY DETAILED DESCRIPTION This application is based on and claims domestic priority under 35 USC §119(e) to U.S. Provisional Application Ser. No. 61/887,313 and is related to commonly owned U.S. Design Patent Application No. 29/469,017 , each being filed on filed on Oct. 4, 2013, the entire contents of each such prior filed application being expressly incorporated hereinto by reference. The embodiments disclosed herein relate generally to passenger service units and assemblies thereof that may be employed in interiors of transport vehicles, especially aircraft interior cabins. The traditional Passenger Service Units (PSUs) for transport category commercial aircraft are typically a one-piece unit that integrally accommodates multiple service functions for passenger comfort and/or safety, such as air flow, reading lights, crew assistance call buttons, crew messages and concealed oxygen delivery masks. Usually the conventional PSU will located overhead in such a manner that passengers seated side-by-side in the same row will need to share PSU controls associate with their particular seat. Such a sharing arrangement can present uncomfortable situations during use, for example, by a passenger's forearm and/or elbow inadvertently striking an adjacent passenger's head or at least invading the adjacent passenger's personal space when reaching to operate the PSU controls. Conventional PSUs also do not have the passenger-operated controls (e.g., individual reading lights and air flow nozzles) positioned at an optimal location for each seat in a row. That is, since the conventional once piece PSUs are oriented along the aircraft's longitudinal axis, they must be positioned such that all passengers seated in a row (i.e., seated side-by-side along an axis transverse to the aircraft's longitudinal axis), they necessarily must be located overhead so as to be accessible by all passengers in that row. This means that a conventional PSU must be located overhead in such a manner that it is capable of servicing all passengers in the row, which in turn dictates that the PSU cannot be accessed comfortably by all such passengers (i.e., causing some of the passengers to reach across another passenger when it is necessary to operate the PSU functions). In addition, it is a common occurance that the reading light and/or air flow may encounter interference or obstruction from an immediately adjacent passenger. The conventional one-piece PSUs are also inflexible as to cabin arrangement options that may be available to the interior design. For example, the conventional one-piece PSU must be oriented along a common longitudinal axis and thus cannot be positioned along another longitudinal axis in order to accommodate passenger seats in a different side-by-side coordinate relationship. One proposal in the art is provided by US Patent Application Publication 2012/0012707 (the entire content of which is expressly incorporated hereinto by reference) which suggests that passenger supply functions be integrated in a storage compartment module that may be automatically hooked up to the supply system of the aircraft during mechanical installation of the module on a load-bearing structure of the cabin. Further improvements and solutions to the problems noted previously are however needed. Therefore, what has been needed in this art are PSUs that have installation flexibility so as to provide optimum location of passenger service functions to minimize or substantially eliminate the problems associated with conventional one-piece PSUs. It is towards fulfilling such a need that the embodiments of the present invention are directed. In general, the embodiments disclosed herein are directed toward passenger service units and assemblies thereof. According to certain embodiments, elongate passenger service unit (PSU) assemblies are comprised of a plurality of modular passenger service units, and a plurality of variable-length modular spacer units. The modular spacer units are positioned between the modular passenger service units in an end-to-end manner so as to provide a desired lengthwise array of the passenger service units along the PSU assembly. According to some embodiments, the PSU assemblies will further comprise at least one modular audio speaker unit connected in an end-to-end manner with at least one of the modular passenger service units and/or at least one modular emergency oxygen component accommodating at least one emergency oxygen delivery system therewithin. The modular emergency oxygen component will thus be connected in an end-to-end manner with at least one of the modular passenger service units. Certain ones of the modular emergency oxygen components may be of variable length as compared to others of the modular emergency oxygen components, each respectively accommodating at least one emergency oxygen delivery system therewithin. The modular passenger service units included in the PSU assemblies may include a light unit and a light switch to activate/deactivate the light unit, an attendant call button and an air flow outlet diverter. According to some embodiments, the air flow outlet diverter may be in the form of a plurality of pivotal vanes, in which case a recessed channel may be provided adjacent to the vanes to allow for manual manipulation thereof. A perimeter light band may be provided so as to bound the light unit, attendant call button and air flow diverter. Transport category vehicles, e.g., aircraft, may thus be provided with inboard and outboard PSU assemblies. The passenger seats may be arranged in a latitudinally side-by-side arrangement and/or may be arranged in a longitudinally staggered arrangement. By providing variable length modular spacer units, therefore, the individual passenger service units may be arranged directly overhead of each passenger seat. These and other aspects and advantages of the present invention will become more clear after careful consideration is given to the following detailed description of the preferred exemplary embodiments thereof. FIG. 1 10 10 10 Accompanying depicts one embodiment of an overhead PSU system installed on the starboard side of an aircraft interior cabin IC (i.e., the starboard side of the aircraft's longitudinal centerline) according to one embodiment of the invention. It will be understood that reference to an aircraft interior cabin IC is merely an exemplary embodiment of the invention since the PSU system could equally be employed in other transport vehicles (e.g., trains, busses, boats and the like) It will also be appreciated that the discussion below is equally applicable to an overhead PSU system installed on the port side of the aircraft interior cabin in the form of a mirror image of the starboard side installation. 10 10 10 10 10 12 10 14 16 a b a b As shown, the PSU system will include inboard and outboard (i.e., relative to the aircraft's longitudinal centerline) PSU assemblies , that are oriented generally parallel to the aircraft's longitudinal axis and positioned generally overhead of each inboard and outboard passenger seat (not shown) in a seat row. The PSU assemblies , are latitudinally separated from one another (i.e., relative to a latitudinal axis of the aircraft) by an aligned series of spacer panels . The PSU system may be provided in combination with an overhead bin assembly for storage of a passenger's carry-on articles. Overhead aisle lighting units may be provided in the aircraft interior cabin IC to illuminate the center passenger aisle between seat rows. FIG. 2 FIG. 1 10 10 10 10 1 10 2 10 2 10 3 10 10 1 10 4 10 3 10 2 10 3 10 4 10 2 10 3 10 4 10 2 10 3 10 4 10 1 10 5 10 2 10 4 10 2 10 4 10 3 10 3 a a a b Accompanying depicts in greater detail the overhead PSU system that is shown in . In this regard, it will be observed that the inboard PSU assembly may be formed of a number of modular components assembled end-to-end in a series. By way of example, the inboard PSU assembly may include a modular PSU component - which is positioned between a modular audio speaker component - having an audio speaker -which allows for audio output of, e.g., cabin crew announcements and the like, and a modular lengthwise spacer component -. By way of further example, the outboard PSU assembly may include a modular PSU component - positioned between a modular emergency oxygen component - and a modular lengthwise spacer component -. The modular components -, - and - will include at one end thereof a transverse edge -′, -′ and -′, and at an opposite end thereof a recessed edge -″, -″ and -″, respectively, so as to accommodate an edge region of the modular PSU component - when abutted thereagainst. A pair of lateral spacer strips - are provided adjacent to the modular PSU component so as to extend between the recessed ends -″ or -″ of modular components - or - and the recessed end -″ of an opposed modular spacer component - respectively. FIG. 3 10 1 10 1 10 1 20 20 22 20 a a Accompanying is an enlarged perspective view of the modular PSU component -. As can be seen, the embodiment of the modular PSU component - includes several functions for passenger comfort and in-flight service. Specifically, the modular PSU component - will preferably include at one end a light unit which may be activated/deactivated by pressing the light switch to provide the illumination of the passenger's individual seated space. An attendant call button may be provided at an opposite end of the switch to provide an alert to flight attendants that a passenger may need some assistance. 10 1 24 24 26 28 a The modular PSU component - is also provided with an air flow outlet diverter in the form of pivotal vanes that may be manually manipulated by a passenger's fingers inserted into a central recessed channel . A perimeter light band can be provided with a light (e.g., a white light or a soothing colored light such as green or blue) which can be activated by flight attendants during aircraft boarding/unboarding. 10 10 10 1 10 10 10 10 10 10 10 1 a b a b a b a b FIGS. 1 and 2 FIG. 2 FIGS. 5 and 6 L L It will be observed that the inboard and outboard PSU assemblies , as depicted in are substantially parallel to one another and to the aircraft's longitudinal axis (i.e., axis Ain ). Moreover, modular PSU components - of the inboard and outboard assemblies , are aligned with one another along the aircrafts latitudinal axis (i.e., an axis perpendicular to axis A). Thus, the embodiment of the inboard and outboard assemblies , is especially adapted for use in combination with a side-by-side seating arrangement within the interior cabin IC whereby the seats are positioned in a row aligned with the aircraft's latitudinal axis. In such an arrangement, therefore, the individual seats in the row are aligned with a common coincident latitudinal axis. However, as will be discussed in greater detail below in relation to , the modular components of the inboard and outboard assemblies , could be constructed so that the individual modular PSU components - thereof are staggered in the direction of the aircraft's longitudinal axis to thereby permit individual aircraft seats to likewise be staggered (i.e., such that each seat is arranged relative to a respective latitudinal axis that is longitudinally separated from a latitudinal axis of an adjacent seat). 10 10 10 4 10 3 10 1 10 4 10 3 10 10 10 4 10 1 a b, a b FIG. 4 FIG. 2 FIGS. 5 and 6 An exemplary array of possible modular components that may be assembled in an end-to-end manner relative to one another so as to provide the inboard and outboard PSU assemblies , respectively, is depicted in . As is shown, both the modular emergency oxygen components - and modular lengthwise spacer components - may be provided with varying lengthwise dimensions to allow the layout of the modular PSU components - in an aligned configuration (e.g., as shown in ) or to allow the modular PSU components to be staggered relative to one another (e.g., as shown in ). The varying lengths of the modular emergency oxygen components - and modular lengthwise spacer components - additionally allow the PSU assemblies , to be accommodated within different sizes of aircraft interior cabins IC. In addition, the different lengthwise dimensions of the emergency oxygen components - will allow at least one emergency oxygen delivery system (e.g., oxygen masks and associated tubing that is operatively connected to the aircraft's on-board emergency oxygen system which deploy automatically in response to depressurization of the aircraft's interior cabin IC) to be installed in dependence upon the passenger seat layout. Due to the modular nature of the components, therefore, greater flexibility in layouts of the PSU component - can be achieved. FIGS. 5 and 6 FIG. 2 10 1 10 10 10 10 10 1 10 2 10 3 10 3 10 10 1 10 4 10 10 1 a b a b b L Accompanying depict a staggered arrangement of the modular PSU components - associated with the inboard and outboard PSU assemblies ′, ′, respectively, associated with the PSU system ′. By way of example, the inboard PSU assembly ′ may include adjacently positioned modular PSU and speaker components - and - in a manner similar to the embodiment described previously (see ). However, unlike the previously described embodiment, modular longitudinal spacers - of greater length as compared to the modular longitudinal spacers - associated with the outboard PSU assembly ′ thereby physically staggering the modular PSU components - relative to the aircraft's longitudinal axis A(which in turn allows the individual passenger seats to be physically staggered for improved spatial passenger comfort). The modular emergency oxygen components - may be provided in the outboard PSU assembly ′ and are of a sufficient lengthwise dimension so as to house multiple (at least two) emergency oxygen delivery systems (i.e., so as to provide emergency oxygen delivery to each occupant of the staggered seats below the modular PSU components -). 10 1 10 4 Using various combinations of the modular components - through - as described above, the aircraft interior designer will have greater flexibility to design passenger seating layouts that is currently possible with conventional one-piece PSUs. Therefore, it will be understood that the description provided herein is presently considered to be the most practical and preferred embodiments of the invention. Thus, the invention is not to be limited to the disclosed embodiments, but on the contrary, is intended to cover various modifications and equivalent arrangements included within the spirit and scope thereof. BRIEF DESCRIPTION OF ACCOMPANYING DRAWINGS The disclosed embodiments of the present invention will be better and more completely understood by referring to the following detailed description of exemplary non-limiting illustrative embodiments in conjunction with the drawings of which: FIG. 1 is partial perspective view of an interior aircraft cabin showing an overhead PSU assembly of modular passenger service components according to one embodiment of the invention on a starboard side of the aircraft cabin (i.e., the starboard side of the aircraft's centerline); FIG. 2 FIG. 1 is a plan view of the overhead PSU assembly depicted in as seen from below; FIG. 3 FIG. 1 is an enlarged view from a seated passenger's perspective of a modular PSU component employed in the overhead PSU assembly depicted in ; FIG. 4 is an exploded plan view showing various modular PSU components that may be grouped as needed according to aircraft interior design to form overhead PSU assemblies according to the invention; FIG. 5 is perspective as viewed from below showing an overhead PSU assembly of modular passenger service components according to another embodiment of the invention; and FIG. 6 FIG. 5 is a plan view of the overhead PSU assembly depicted in as seen from below.