content
stringlengths
0
1.88M
url
stringlengths
0
5.28k
What is burning method of waste disposal? Incineration is a fancy way to describe burning waste as a disposal method. This process generates heat, which is then used for energy. Incineration also creates byproducts, including various gases and inert ash. Incineration is the preferred method for disposing of toxic chemicals and hazardous wastes. How do you dispose of human waste? Human waste should not be disposed of with regular the trash; however, a heavy duty trash bag can be used to line a trash can and all waste bags placed inside the larger bag, or one bin can be designated for human waste can be if multiple bins are available (e.g., green waste bin). What is the best methods of waste disposal? Ways to Dispose of Waste without Harming the Environment - Recycling. The first and most obvious way is recycling. - Composting. Composting turns your food waste into fuel for your garden and it can suit gardens of any kind. - Reusing. - Anaerobic Digestion. What is the best method of disposing waste? Methods of Waste Disposal - Landfill. In this process, the waste that cannot be reused or recycled are separated out and spread as a thin layer in low-lying areas across a city. - Incineration. - Waste Compaction. - Biogas Generation. - Composting. - Vermicomposting. - Further Reading: What waste can be incinerated? A material commonly associated with waste incineration is municipal solid waste (MSW). This type of waste is typically general waste such as household waste, food waste, cardboard, and paper. All of these are safe to incinerate. Can you burn human waste? Burning poop is not a safe waste disposal method when living off-grid. Human waste has a high moisture content which prevents thorough burning of the material. It also carries bacteria and could pose a danger to the environment if not dealt with appropriately.
https://magwherever.com/what-is-burning-method-of-waste-disposal/
In addition to the exhibition at the Museum, a virtual exhibition of accepted work will be hosted on our website. If you are unable to or uncomfortable with visiting in-person, you may enjoy the great work of the Department of Art and Art History students here. All entries for the Baylor Art Student Exhibition will be submitted digitally. No artwork will be delivered to the Museum until the juror has selected which works will be included in the exhibition. Students who plan to enter will need to photograph their artwork in advance. Students may do this on their own, or attend the photography workshop hosted by the Museum, March 1-5, 2021. The juror will review all of the digital submissions to determine which artworks will be included in the exhibition. Students will be notified if any of their entries have been accepted into the exhibition, and will be given time to prepare their work for professional display, before dropping it off to the Museum. The juror will also select award winners in 8 categories as well as a Best of Show. Winners will be notified via email. There will be no opening reception or awards ceremony, due to COVID restrictions. Currently enrolled students at Baylor may submit up to four artworks which were produced within the context of Baylor's studio art courses beginning in March 2020 through March 2021. Artwork previously submitted or exhibited in the Art Student Juried Exhibition is NOT eligible for submission. Artworks by students who have graduated prior to Spring 2021 are NOT eligible.
https://www.baylor.edu/martinmuseum/index.php?id=928678
His Highness Sheikh Mohammed bin Rashid Al Maktoum, Vice President, Prime Minister and Ruler of Dubai, and His Highness Sheikh Mohamed bin Zayed Al Nahyan, Crown Prince of Abu Dhabi and Deputy Supreme Commander of the UAE Armed Forces, visited the Louvre Abu Dhabi on Saadiyat Island on Monday, where they viewed the museum’s art installations in preparation for its official opening on 11th November 2017. A first of its kind in the Middle East region, with a selection of works that are of a cultural and artistic significance spanning various historical periods and human civilisations, the Louvre Abu Dhabi embodies the spirit of tolerance and intercultural dialogue, while celebrating the region’s multicultural heritage. To date, the museum has acquired more than 620 works of art, including important artworks on loan from 13 leading museums in France within the walls of the architectural masterpiece designed as an homage to the Arab city. Their Highnesses were received by Mohamed Khalifa Al Mubarak, Chairman of Abu Dhabi Tourism and Culture Authority, TCA Abu Dhabi, and Tourism Development and Investment Company, TDIC, and Saif Saeed Ghabash, Director-General of TCA Abu Dhabi, along with a number of officials. During the tour, Sheikh Mohammed bin Rashid and Sheikh Mohamed bin Zayed were briefed on a number of art works, including an ancient statue of the Sphinx dating back to the 6th century BC, funerary practices of ancient Egypt illustrated by a set sarcophagi of Princess Henuttawy, the ‘Bonifilius’ basin from Northern Italy dating between the late twelfth-early thirteenth century, 13 fragments of a frieze detailing Surah al-hashr from the Holy Quran, and the bust of Alexander the Great on loan from the Louvre Museum in Paris. Their Highnesses were also acquainted with Louvre Abu Dhabi’s first site-specific works, installed in the outdoor areas by renowned contemporary artists, including American artist Jenny Holzer (1950 -) who created three engraved stone walls named ‘For Louvre Abu Dhabi’, 2017. These cite important historical texts from Ibn Khaldun’s Muqaddimah, the Mesopotamian bilingual (Akkadian / Sumerian) Creation Myth tablet, and the 1588 annotated edition of Michel de Montaigne’s Les Essais. Louvre Abu Dhabi was designed by the Pritzker Prize winning French architect, Jean Nouvel, who envisioned a museum city, or Arab medina, under a vast silvery dome. Visitors will be able to walk along promenades overlooking the sea beneath the museum’s 180-metre dome, comprised of almost 8,000 unique metal stars set in a complex geometric pattern. When sunlight filters through, it creates a moving ‘rain of light’ beneath the dome, reminiscent of the overlapping palm trees in the UAE’s oases. The Louvre Abu Dhabi will showcase its own art collection and other works of art on loan from one of France’s oldest museums. These span the entirety of human existence from prehistorical objects to commissioned contemporary artworks, highlighting universal themes and ideas and marking a departure from traditional museography that often categorises according to origin. In addition to the galleries, the museum will include exhibitions, a children’s museum, a restaurant, a boutique and a cafe. The museum was built in accordance with an intergovernmental agreement signed between the UAE and France in 2007, that includes the loan of the Musee du Louvre’s name for 30 years and 6 months, temporary exhibitions for 15 years, and loans of artworks for 10 years.
https://emic.ae/sheikh-mohammed-and-mohamed-bin-zayed-visit-louvre-abu-dhabi/
The Driver that Hit Me in Greenwood, South Carolina Did Not Have Insurance. How Can I Collect My Damages? - Ayers, Smithdeal, & Bettis, P.C. The Driver that Hit Me in Greenwood, South Carolina Did Not Have Insurance. How Can I Collect My Damages? You are on your lunch break in Greenwood, South Carolina, and leave the office to grab a quick bite to eat. As you return to your office, a driver runs a red light and hits your car. There is extensive damage to your vehicle, and you have what you suspect are minor injuries from the car accident. After the police arrive and you exchange all the necessary information with the other driver, you go to the hospital to seek treatment for your injuries. The next day when you try to contact the other driver’s insurance company, you discover their vehicle insurance is not active. What do you do to seek damages or compensation for your injuries? In the state of South Carolina, all motor vehicle drivers must carry liability insurance for their cars in case of an accident. Since the other driver does not have insurance and was driving illegally, it is a good idea for you to consult with a personal injury attorney to discuss your options. A lawyer will be able to tell you how you can collect for your property and personal injury damages. After discussing your case, the attorney will explain how you can proceed with a claim against the other driver and seek to recover compensation from your own insurance company and possibly the other driver as well. Seek damages for your car accident claim when you contact ASB today! In order to collect compensation for your damages in a car accident, you must prove the other driver was at fault for the collision. The negligence system for the state operates on a “comparative negligence” basis which means you may be able to collect some damages even if you are partly to blame for the car crash. You will, however, have to prove that you were less at fault than the other driver for the cause of the car accident. What Damages Can I Collect for My Greenwood, South Carolina Accident? After your accident there are basically two types of damages you may be eligible to collect. The damages can be economic losses and non-economic damages, which are essentially more abstract damages that cannot be calculated with any monetary certainty. To give you a better understanding of the two types of damages, here are some examples. The best way to determine which type of damages you will be able to collect is to schedule an appointment with an attorney or a team of personal injury attorneys and discuss the specifics of your accident and your case. A lawyer will be able to fully evaluate the case and help you determine a fair value for all the damages related to your case. How Long Do I Have to Seek Legal Action in my Greenwood, South Carolina Accident? All states have a specific time period for accident victims to file a claim or a lawsuit for the damages or personal injuries. In Greenwood, South Carolina, generally you will have three years to pursue legal action and request compensation for your damages. You should seek help from a personal injury attorney if you are thinking about filing a lawsuit to make sure you are within the statute of limitations. Once that time period expires your opportunity to file a claim for damages is lost forever. An early consultation with an attorney after the accident will help ensure that your claim handled professionally and timely before the statute of limitations expires. How Can a South Carolina Personal Injury Attorney Help Me? If you or someone you love suffers injuries in a car accident in South Carolina, a personal injury attorney will be able to use their resources to investigate your accident, review your medical documentation, and help you understand what will happen when you pursue the claim and possibly file a personal injury lawsuit. A lawyer will work with you to answer all the questions about your case and help you navigate the difficult and confusing legal system. An attorney will fight your legal battle with the insurance company and the other driver so you can focus on recuperating and getting back to good health. A car accident can leave you with permanent and debilitating injuries. We are here to help you in your time of need and make sure you receive all the compensation you deserve to cover your injuries and property damages. We will work hard to get you the justice you deserve. Our attorneys care about our clients and want to see you get back on your feet as soon as possible. Call our office today so we can discuss your case and determine how we can assist you and your family.
https://asblawfirm.com/collect-damages-accident-with-no-insurance-sc/
Application of management tools to integrate ecological principles with the design of marine infrastructure. Globally the coastal zone is suffering the collateral damage from continuing urban development and construction, expanding resource sectors, increasing population, regulation to river flow, and on-going land change and degradation. While protection of natural coastal habitat is recommended, balancing conservation with human services is now the challenge for managers. Marine infrastructure such as seawalls, marinas and offshore platforms is increasingly used to support and provide services, but has primarily been designed for engineering purposes without consideration of the ecological consequences. Increasingly developments are seeking alternatives to hard engineering and a range of ecological solutions has begun to replace or be incorporated into marine and coastal infrastructure. But too often, hard engineering remains the primary strategy because the tools for managers to implement ecological solutions are either lacking or not supported by policy and stakeholders. Here we outline critical research needs for marine urban development and emerging strategies that seek to mitigate the impacts of marine infrastructure. We present case studies to highlight the strategic direction necessary to support management decisions internationally.
this will vary, for a domestic patio deck we typically recommend a simple concrete base and our own wpc joists. the maximum recommended space between joist rows depends on the angle at which you intend to lay your boards in relation to the joists, but should never exceed 40cm, . 2: fix decking boards to joists. 12. erect each deck panel using the specified lifting points and place it on the deck support system. 13. use backer rod to fill the gaps between adjacent deck panels and clean/moist the joint surfaces. 14. pour flowable concrete/grout in the transverse joints between deck panels. fig. 1. (continued). a new precast concrete. 19 may 2015 . a deck can beautifully bridge the gap between indoors and out, providing an inviting, comfortable space from which to enjoy your backyard. combining wood decking with concrete elements — like the low wall and stairs shown here — works especially well with contemporary, modern and urban homes. when designing and building timber decks where timber is less than 400 mm from or on the ground, considerations must be given to the . on a well drained gravel/sand or concrete base as long as they are of minimum in-ground . the gaps between boards, particularly over joists, cleared of debris. recoating should be. 15 jun 2012 . dear tim: my concrete driveway has eight large slabs. the driveway slopes down from my garage to the street. the straight-line gaps between the slabs has enlarged, and some cracks are as wide as 2 inches now. i patch them and they open up again. is there a guaranteed way to repair these cracks so i. put the screening in 2" deep under the edging stone or cinder block and place them along the edge leaving a 1" gap between the stone and the concrete. pour screening between the stone and the concrete to fill the gap. the stone should help re enforce the soil under the poured concrete and the screening will provide. gaps between decking boards should be at least 5mm to allow for expansion and for rainwater to drain through freely – cut a piece of timber to 5mm and use between boards for a consistent gap (wickes. fix the posts concrete the posts into the ground adjacent to the deck, or secure them firmly to the deck frame posts. caulking gap between building and sidewalk - maintenance and . 30 jun 2014 . small gaps between concrete sidewalks and exterior walls might not seem like a big problem today, but could cause soil erosion, foundation damage and of course damage to the sidewalk in the future. don't forget to watch more of these helpful videos and increase your knowledge about construction,. when designing the deck, remember to factor in gaps of 5-8mm between deck boards into your plans. we would advise that you plan your deck to fit only whole deck boards, to avoid having to cut a deck board lengthways to fill a gap. an existing patio or concrete base can be used as a solid foundation for your deck. cracks and gaps in concrete are more than just an eyesore. water can get into the joints, freeze and then expand, making the cracks even larger. gaps against a house can direct water against the foundation, leading to more problems. once a year, go around your home and fill these gaps and joints with urethane caulk to. fill hole with gravel. now we have emptied a bag of gravel into the hole, this will fill the gaps between the pieces of concrete that we put in the hole first. postcrete. now it is time to add a couple of bags of postcrete. there are several different brands of this and they do vary in quality a little . the beauty of these products is that. temporary braces to the pile to secure it in position while concrete is poured in . or concrete. the 100 x 75 mm bearer should be bolted to the corner piles on the front edge of the deck using a 12 mm bolt with a 50 x 50 x 3 mm washer under the . the next boards, using a 75 mm nail to set the space between the boards. i have a similar gap between my foundation and concrete porch that has some board filling the space. it's made of some sort of non-wooden grey-looking material, with plastic sheeting on each side, presumably to allow the foundation and house to shift separately. posted by monsieurbon at 7:43 pm on.
http://kaizenflooring.in/wpc-bench/421.html
DOE program aids in community clean energy planning State, local and tribal officials looking to implement clean energy projects and programs may be interested in the U.S. DOE Technical Assistance Program. TAP, which provides the tools and resources necessary to implement community energy strategic planning at city and county levels, held a webinar May 12 to educate officials on the benefits of the program and how to take advantage of it. “As you go through the process, we have an A-to-Z approach from technology identification to project implantation,” said the DOE’s Rebecca McEwen. Brian Levitt, principle at Prism Consulting Inc., explained the importance of a community strategic energy plan (CSEP), which he defined as a framework for thinking about energy at the local level. “It’s an opportunity to stop and think about what you’re going to do,” he said. The main drivers for implementing a CSEP are saving money and lowering carbon footprints while providing clear guidance and a set of principles, according to Levitt. Basically, it is a business plan for reducing energy consumption in a community that illustrates opportunities to local leaders. “A CSEP provides a clear vision and a path to achieve it, estimates cost and cost savings, and it’s your tool to get the support you need in the community to really move forward,” he said. “You have to prioritize your efforts and make sure you direct your money and resources to the area where it will have the most impact.” Whether the project is energy efficient lighting or a wastewater treatment plant retrofit, it’s important for stakeholders to have a road map to ensure that everyone involved understands what’s going on, including new players interested in participating in the project, Levitt said. “It helps you manage progress toward energy goals,” he said. Part of the process in developing a CSEP is benchmarking the energy situation and tracking accomplishments over time to determine the effectiveness of each tactic you are using, he added. Developing a CSEP involves nine core steps which are: identify and convince stakeholders, form a leadership team, develop an energy vision, determine an energy baseline, develop specific goals, identify/evaluate/rank programs and policies, identify funding sources, compile the plan and measure/alter plan. For projects that get hung up on the funding step, TAP can also help, Levitt said. “There are options beyond direct funding from community or state government or within a corporation,” he said. Although not all of the steps apply to every community, organization, project or program, they should all be considered. Any government that wants to save money and provide energy leadership, or any community that doesn’t have a clear plan to execute energy performance should develop a CSEP, Levitt added. To learn more about TAP, visit http://www.nrel.gov/applying_technologies/state_local_activities/technical_assistance.html.
https://biomassmagazine.com/articles/5516/doe-program-aids-in-community-clean-energy-planning
Also See: Port Henry, NY ZIP Codes & ZIP Code Maps | Local Area Photos The Village of Port Henry (historical) had a population of 1,187 as of July 1, 2017. The primary coordinate point for Port Henry is located at latitude 44.0468 and longitude -73.4611 in Essex County. The formal boundaries for the Village of Port Henry (historical) (see map below) encompass a land area of 1.18 sq. miles and a water area of 0.3 sq. miles. Essex County is in the Eastern time zone (GMT -5). The elevation is 243 feet. The Village of Port Henry (historical) (GNIS ID: 2391077) has a X1 Census Class Code which indicates deleted feature that was a governmental entity. It also has a Functional Status Code of "A" which identifies an active government providing primary general-purpose functions. The Village of Port Henry (historical) is located within Town of Moriah, a minor civil division (MCD) of Essex County. Beneath the boundary map are tables with Port Henry population, income and housing data, five-year growth projections and peer comparisons for key demographic data. The estimates are for July 1, 2017. POPULATION |Total Population||1,187| |Daytime Population: Workers||418| |Daytime Population: Residents||584| |Total Daytime Population (TDP)||1,002| |Ratio TDP/Total Population1||0.84| |Population in Households||1,183| |Population in Familes||889| |Population in Group Qrtrs||4| |Population Density2||1,009| |Diversity Index3||13| INCOME |Median Household Income||$46,458| |Average Household Income||$57,379| |Per Capita Income||$25,293| HOUSING |Total Housing Units||648 (100%)| |Owner Occupied HU||383 (59.1%)| |Renter Occupied HU||151 (23.3%)| |Vacant Housing Units||114 (17.6%)| |Median Home Value||$106,387| |Average Home Value||$132,115| HOUSEHOLDS |Total Households||534| |Average Household Size||2.22| |Family Households||320| |Average Family Size||3| | | GROWTH RATE / YEAR |2010-2017||2017-2022| |Population||-0.08%||-0.24%| |Households||0.0%||-0.19%| |Families||1.08%||-0.38%| |Median Household Income||1.64%| |Per Capita Income||2.1%| The table below compares Port Henry to the other 1,196 incorporated cities, towns and CDPs in New York by rank and percentile using July 1, 2017 data. The location Ranked # 1 has the highest value. A location that ranks higher than 75% of its peers would be in the 75th percentile of the peer group. |Variable Description||Rank||Percentile| |Total Population||# 777||35th| |Population Density||# 699||42nd| |Diversity Index||# 894||26th| |Median Household Income||# 951||21st| |Per Capita Income||# 874||27th| Additional comparisons and rankings can be made with a VERY EASY TO USE New York Census Data Comparison Tool.
https://newyork.hometownlocator.com/ny/essex/port-henry.cfm
Geophysicist and astronaut Alexander Gerst visited the AWI, where he gave an in-house talk on his work as ‘astro-Alex’ for ca. 200 members of staff and exchanged notes with AWI researchers. On the glacier German President and AWI Director visit Iceland State visit focused on climate change, environmental protection and sustainable energy Together with a group of climate experts, German President Frank-Walter Steinmeier visited Iceland from 12 to 14 June. Antje Boetius accompanied the President at his request, in order to discuss global climate change and Germany’s contribution to climate protection. International Exchange First conference for research software in Germany with AWI participation "In research, almost nothing is possible without software” Conference for research software for the first time in Potsdam: About 200 guests from Germany and Europe participate in the expanded conference and networked within the German scientific landscape. Arctic Symposium Together for a sustainable Arctic Passing of the Presidency of the Arctic Council to Iceland In May 2019, the Chair of the Arctic Council was transferred from Finland to Iceland. To inform the German Arctic interested parties, the Arctic Office of the AWI, together with the Finnish and the Icelandic Embassy and the Foreign Office organized a symposium. Aquaculture Research Start of the project "AquaVitae" Aquaculture on the spotlight in new EU funded project New types, processes and products that contribute to increasing production and improving sustainability in aquaculture value chains in the Atlantic: their introduction is the goal of the EU-funded project "AquaVitae".
https://www.awi.de/en/about-us/service/press/archive.html?tx_smsnews_news%5Byear%5D=2019&tx_smsnews_news%5B%40widget_0%5D%5BcurrentPage%5D=7&cHash=b4a52a37ed9224ccb6e15348ae17ba37
Max Planck Day is held across Germany on 14 September 2018. Under the hashtag #wonachsuchstdu (“what are you looking for”), the event is addressed to all those who are interested in research, and would like to get a hands on experience of the topics that the Institutes of the Max-Planck-Gesellschaft are concerned with. In Munich there will be a Science Market with exhibitions, presentations and two science slams. The MPI of Physics (MPP) is taking part with two interesting exhibits that invite visitors to get involved and discover. The hashtag #wonachsuchstdu is the motto of the Max Planck Day on Sept. 14, 2018, where scientists show what research topics they are working on. “Insight must precede application”. This statement was made by Max Planck, who would have turned 160 years old in 2018. It was exactly 100 years ago that the scientist received the Nobel Prize for Physics. The Max-Planck-Gesellschaft was founded 70 years ago, and it has been committed to basic research at a world-class level ever since. The current areas of research of scientists working for the MPG are presented during Max Planck Day, which is held across Germany on 14 September 2018. One of the main event locations is the science market in the centre of Munich, where the Max Planck Institute for Physics (MPP) is also represented. The MPP explores the ways in which elementary particles – the smallest building blocks of matter – behave, as well as the forces acting upon them. In their research work, physicists strive to learn more about the universe: How it came to be, how it is structured and how it will develop in the future. Moreover the institute shows an instrument from the ATLAS detector at CERN and a large multimedia exhibit. What do we need particle accelerators for? What happens when protons are shot at each other? A large-scale multimedia exhibit in the cafeteria enables visitors to experience the processes that take place inside the particle accelerator Large Hadron Collider (LHC). However, particle collision is not only interesting for physicists. Proton beams can also be used in tumour treatment: a computer simulation that visitors may control themselves, shows how this works. In tent 15, visitors will learn how cosmic radiation particles can be made visible on earth. These are muons, the relatives of the better known electrons but which have a greater mass. Muons are created through proton collisions in the LHC and they play an important role for particle physics: They led the physicists on the track of the Higgs boson that was discovered by the ATLAS detector in 2012. This is why instruments for measuring muons are extremely important for ATLAS. The MPP presents such muon chambers and explains how they work. The detectors are developed and built at the Institute. Scientists are currently working on new models: even more particles are expected to collide in the LHC from 2026 – and the muon chambers need to get into shape for this. Der Max-Planck-Tag im Live-Stream1:00:30 – Vortrag von Béla Majorovits, MP: "Wie baue ich ein Dunkle-Materie-Kraftwerk?" +++ 5:24:00 – Science-Slam-Beitrag von Philipp Gadow, MPP: "Licht ins Dunkel: Die Suche nach Dunkler Materie am LHC"
https://www.mpp.mpg.de/en/what-s-new/news/detail/wonachsuchstdu-das-mpi-fuer-physik-beim-max-planck-tag-am-14-september-2018/
A lot of it will depend on your athletic history, your level of fitness and your goals. Four times a week for an hour a day is a good bit for someone like my mom who’s exercising more for fitness than a specific goal, but it’s nothing to a marathon runner in training. It also depends on what kind of workout you’re doing and on your available free time. Maybe running every day would be too harsh on your joints but you can substitute yoga or cycling. It also depends on how you yourself function. Maybe you have an especially busy schedule and four classes a week will stress you out, or maybe those classes give you a place to recover from the rest of your life. It’s a very individual thing; you just have to decide if you feel better both mentally and physically when you go that often. If so, you’re fine. If not – if you’re in better shape but feel stressed OR if you feel great mentally but your body feels overworked, then cut back one workout, or try changing one to see if a different type of workout helps. Different types of workouts help anyway, in terms of both physical fitness nad avaoiding mental fatigue; you need to balance stength, aerobic capacity and flexibility / balance. Listen to your body, selectively. You need to push it a bit, because if you always did what it wanted you’d probably just stay on the couch. On the other hand, there are times when you’re heading off to the gym and it says “NO”. I think you ought to listen to it. (This applies even to athletes in training, though the more fit you are and the more important the event you’re training for, the more your body might need to force its objections on you. A signal that should persuade a casual member of an aerobics class to stay home is not going to knock an Olympian off her planned training regimen, and it shouldn’t – but even the Olympian might need to take a very rare unplanned timeout to avoid physical or mental overtraining. Finally, don’t expect there’s one single answer for always, either. Depending on how the rest of your life is going, you might easily handle at some times what’s too much for you at other times. Then again, mindless physical activity might be a perfect antidote to an emotional upheaval. When I was doing my Six Sigma training, they told us the standard Black Belt answer: “It depends.” Others might disagree, but I think that’s the answer here, that and “listen to yourself”.
http://www.riseagain.net/wp/2006/12/07/it-depends/
My Approach to Helping I feel it is a privilege and honor to work with people and share in their journey. It takes bravery and courage to face ones past and current struggles. Therapy provides a safe place to explore your history and examine the impact of your experiences on your thinking, feelings, relationships, and behaviors. I can provide a judgement free and confidential space for you to process and find support to help you move forward in identifying what you need to get back to a healthy balanced life. I believe that therapy builds empowerment, resiliency, supports vulnerability, and helps build a connection to one\'s inner self. I am excited to help others begin this process and would love to share in this journey with you. I can offer my clients healing through a positive corrective emotional experience while meeting them where they are in the healing process. I feel that the healing process is part of a larger system; the system as a whole needs to change in order for you to achieve maximum healing benefit.
https://www.goodtherapy.org/therapists/profile/ashley-tokuda
1. Field of the Invention The present invention relates to a magneto-optical information reproducing apparatus which reproduces information magnetically recorded on a recording medium by utilizing a magneto-optical effect, and more particularly to an optical element which is to be used in an optical head of the apparatus and which is simple in structure and yet assures a high performance of the apparatus and significantly contributes to reduction of size, weight and cost of the apparatus. 2. Related Background Art An optical memory which records and reproduces information by a semiconductor laser beam has been recently researched and development vigorously for practical use as a high recording density memory. A read-only optical disk and a DRAW type optical disk which have been commercialized as compact disks as well as an erasable and rewritable magneto-optical disk are considered promising. In the magneto-optical disk, information is magnetically recorded by utilizing a local temperature rise of a magnetic thin film by irradiation of a laser beam spot, and the information is reproduced by a magneto-optical effect (particularly a Kerr effect). The Kerr effect is a phenomenon in which polarization plane is rotated when light is reflected by a magnetic recording medium. A basic configuration of a prior art magneto-optical disk apparatus is shown in FIG. 1. In FIG. 1, numeral 1 denotes a semiconductor laser, numeral 2 denotes a collimator lens, numerals 11 and 12 denote half-mirrors, numeral 4 denotes an objective lens, numeral 6 denotes a magneto-optical recording medium, numerals 7.sub.1 and 7.sub.2 denote analyzers, numeral 8 denotes a focusing lens, and numerals 9.sub.1 and 9.sub.2 denote photo-detectors. A P-polarized light is parallel to the plane of the drawing and an S-polarized light is normal to the plane of the drawing. The reproduction of the magneto-optical information in the above apparatus is explained below. A light beam emitted from the semiconductor laser 1 as a linearly polarized P-polarized light is collimated by the collimator lens 2 and passes through the half-mirror 11. In the half-mirror 11, .vertline.t.sub.OP .vertline..sup.2 =.vertline.t.sub.OS .vertline..sup.2 =0.5 where t.sub.op is an amplitude transmittance of a P-polarization component and t.sub.OS is an amplitude transmission of an S-polarization component. The light beam is focused on the magneto-optical recording medium 6 by the objective lens 4 as a fine spot. When a magnetic domain (pit) is preformed on the medium 6, a reflected light from the medium 6 has a polarization plane thereof rotated by .+-..theta..sub.K by the Kerr effect depending on whether the direction of magnetization at the area of the spot irradiation is upward or downward. The following relationship exists between a P-polarization component R and an S-polarization component K of an amplitude reflectance of the recording medium 6. ##EQU1## The magneto-optically modulated reflected light is again collimated by the objective lens 4, is reflected by the half-mirror 11, converged by the focusing lens 8 and split by the half-mirror 12. The split beams pass through the analyzers 7.sub.1 and 7.sub.2 and are detected by the photodetectors 9.sub.1 and 9.sub.2 as intensity-modulated light beams. As shown in FIG. 2, an angle between an optical axis of the analyzer and the P-polarization direction is .+-..theta..sub.A on the transmission side and the reflection side, respectively, and the light beam is detected as an orthogonal projection of the amplitude to the optical axis of the analyzer. The Kerr rotation angle .theta..sub.K is approximately 1 degree and the magneto-optical modulation component is very small. Accordingly, it is necessary to set an azimuth angle .theta..sub.A of the optical axis of the analyzer to an optimum one such that a C/N (carrier to noise ratio) of the detected signal is maximum. For example, in the prior art apparatus, the azimuth angle .theta..sub.A of the optical axis of the analyzer is set to 45 degrees so that the signal light is maximum. When the Kerr rotation angle is +.THETA..sub.K, the intensities of the lights which pass through the analyzers in the transmission side and the reflection side and are directed to the photodetectors, respectively, are given by ##EQU2## where I.sub.O is the intensity of incident light to the recording medium. Since .theta..sub.K is approximately one degree, .vertline.R.vertline..sup.2 >>.vertline.K.vertline..sup.2 is met. Accordingly, the formula (2) is expressed as ##EQU3## A second term in the parentheses of the formula (3) represents the magneto-optical modulation component, and a first term represents a non-modulation component. Those lights are photo-electrically converted by the photo-detectors 9.sub.1 and 9.sub.2 and they are differentially detected by a differential circuit (not shown) to produce a magneto-optical signal. However, when noise superimposed on the detected signal is taken into account, it is not always true that a maximum C/N ratio is attained by setting .theta..sub.A to 45 degrees. On the other hand, in order to improve the C/N ratio of the reproduced signal, Japanese Laid-Open Patent Application No. 57-200958 proposes a magneto-optical information reproducing apparatus which uses a polarization beam splitter in place of the half-mirror 11 of FIG. 1. Japanese Laid-Open Patent Application No. 58-128037 discloses an apparatus which uses a one-half wavelength plate and a polarization beam splitter (PBS) in place of the half-mirror 12 and the analyzers 7.sub.1 and 7.sub.2. This is explained with reference to FIG. 3. In FIG. 3, a light beam emitted from a light source (laser diode) 27 passes through a beam splitter 24, a mirror 25 and an objective lens 26 and is directed to a recording medium 31. The light beam reflected by the medium 31 then passes through the objective lens 26 and the mirror 25 and is directed to the beam splitter 24, and it is reflected toward a focusing lens 23 by the beam splitter 24. Numeral 33 denotes a direction of polarization when the polarized light emitted from the light source 27 travels toward the focusing lens 23 without being subjected to the Kerr effect. Actually, however, when the light is reflected by the medium 31, the polarization plane is rotated by the Kerr rotation angle .+-..theta..sub.K with respect to the direction 33 and is directed to the focusing lens 23. The polarization plane is rotated by 45 degrees by the one-half wavelength plate 34 which has the optical axis thereof inclined by 22.5 degrees with respect to the direction 33 so that it is polarized in the direction 35. A portion of the light beam thus polarized is reflected by the beam splitter 22 and is detected by a servo signal detecting sensor (photo-electric converter) 28. On the other hand, the light beam which has transmitted through the beam splitter 22 is directed to the PBS 21. The light beam directed to the PBS 21 is split into two light beams which are polarized in orthogonal directions, and they are detected by magneto-optical signal sensors (photo-electric converters) 29 and 30, respectively. By differentiating the detection signals of the sensors, the information recorded on the-medium is reproduced. However, in the apparatus shown in FIG. 3, the number of parts required is large and the assembly of those parts is not easy because the azimuth angles of the one-half wavelength plate 34 and the PBS 21 must be strictly adjusted with respect to the direction of polarization of the light beam.
We present observations of the first two supernovae discovered with the recently installed Advanced Camera for Surveys (ACS) on the Hubble Space Telescope (HST). The supernovae were found in Wide Field Camera images of the Hubble Deep Field-North taken with the F775W, F850LP, and G800L optical elements as part of the ACS guaranteed time observation program. Spectra extracted from the ACS G800L grism exposures confirm that the objects are Type la supernovae (SNe la) at redshifts z = 0.47 and 0.95. Follow-up HST observations have been conducted with ACS in F775W and F850LP and with the Near-Infrared Camera and Multi-Object Spectrometer in the near-infrared F110W bandpass, yielding a total of nine flux measurements in the three bandpasses over a period of 50 days in the observed frame. We discuss many of the important issues in doing accurate photometry with the ACS. We analyze the multiband light curves using two different fitting methods to calibrate the supernova luminosities and place them on the SNe Ia Hubble diagram. The resulting distances are consistent with the redshift-distance relation of the accelerating universe model, although evolving intergalactic gray dust remains as a less likely possibility. The relative ease with which these SNe la were found, confirmed, and monitored demonstrates the potential ACS holds for revolutionizing the field of high-redshift SNe la and therefore of testing the accelerating universe cosmology and constraining the "epoch of deceleration".
https://research-repository.uwa.edu.au/en/publications/discovery-of-two-distant-type-ia-supernovae-in-the-hubble-deep-fi
How Can I Help Someone Addicted To Drugs? Help With Cocaine Addiction Help With Alcohol Abuse Help With Marijuana Abuse Help With Heroin Addiction Help With Prescription Drug Abuse Help With Meth Addiction How Do I Go About Setting Up An Intervention? What Are Common Signs of Drug Abuse? Bath Salts Abuse Help What Are Common Signs of Alcoholism? Facts Nearly 1.5 million adolescents ages 12-17 meet the criteria for alcohol dependence or alcohol abuse. While overall drug use in the U.S. dropped sharply through the Eighties, heroin use has remained relatively stable. The excessive release of dopamine and stimulation of the brain and central nervous system's natural reward system as a result of opiate use is what leads to addiction. Just one Ecstasy pill can cause a high which can last anywhere from three to six hours. Tweet GET HELP LOCATING A DRUG TREATMENT PROGRAM Your Name: Email Address: Phone Number: Seeking Help For: Choose Self Son Daughter husband Wife Brother Sister Friend Family Other Main Drug Abused: Choose Alcohol Cocaine Marijuana Meth Heroin Methadone OxyContin Ecstasy PCP Speed LSD XTC Inhalants Bath Salts Spice K2 Other Contact Me By? Phone Email General Situation:
https://www.addictionwithdrawal.com/Florida_Halfway-House.htm
There have been significant improvements to Africa’s Internet connectivity in the last five years. Enormous investment in telecoms infrastructure has characterised these improvements, especially in terms of intercontinental connectivity and terrestrial fibre networks: Submarine cable investment has amounted to around USD3.8 billion and terrestrial networks have seen over USD8 billion of investment. Internet exchange points (IXPs), used for local exchange of traffic, have become increasingly important in many countries. However, these investments have not always translated into a corresponding improvement in the Internet access services experienced by users, through lowered prices or increased quality of service. In many countries the development of Internet access services is still held back by constraints on key inputs, notably in relation to the terrestrial connectivity between the submarine cables, the IXPs, the ‘last-mile’ access infrastructure – whether fixed or wireless – and the Internet service providers (ISPs) that deliver access to the end-users in Africa. As discussed in this report, policy remedies are required that remove roadblocks to new market entry and expansion, promote of investment by providing clear rules, and provide strong political leadership to achieve ICT goals This paper examines the factors that are obstructing the further development of the Internet ecosystem in Africa and the implications of those obstructions. It goes on to explore the possible remedies that can assist in resolving them. It follows on from a previous study on the impact of IXPs in Kenya and Nigeria, which found that IXPs can and do improve the quality of Internet services and save African operators millions of dollars per year in connectivity fees – but that a key factor in the success of IXPs is the availability of good domestic connectivity.
https://domainingafrica.com/lifting-barriers-to-internet-development-in-africa-suggestions-for-improving-connectivity/
Q: Measuring perimeter and area of QGIS polygons and middle point coordinates I have >1000 shapefile polygons on a QGIS project that I need to find the perimeter and area of. They're located on a world map, and I can't seem to get the geometry outputs for the measurements in metres. I also need the coordinates for the centre point of each polygon, any idea how to do that. A: If you want measurements in meters (area, length etc.) usually you need to first convert to from the original projection to a local UTM zone. If your study area spans multiple UTM zones then choose an appropriate regional projection. Convert projection: On the layers panel right click your polygon layer and click Export > Save Features As > then change the CRS to your local UTM zone > Ok (exports a new layer in UTM projection). Calculate perimeter and area: Click on your new UTM layer and open the field calculator. In the output field name type 'my_area' then in the expression box type '$area' (no quotes). Click ok and area will appear in field attribute table. Repeate this process for perimeter, but substitute $length for $area. Polygon Centroid: Go back to the layer panel. highlight the target layer and then click Vector> Geometry Tools > Centroid. That should give you what you're looking for. Please read up on Cartesian coordinates, geometry calculations and GIS projections. If this is your first time doing this I recommend checking some of your calculations manually in Google Earth to make sure everything worked ok.
UNSPECIFIED (2005) Social capital, economic growth and regional development. REGIONAL STUDIES, 39 (8). pp. 1015-1040. doi:10.1080/00343400500327943Research output not available from this repository, contact author. Official URL: http://dx.doi.org/10.1080/00343400500327943 Abstract This paper examines the relationships between social capital, economic performance and regional development, and it stresses the complexity and variability across space of such relationships. In contrast to the conventional macroeconomic approach of using indicators of social capital in formal growth models, what is required is a more nuanced analysis that evaluates the impact of social capital by region. To support this argument, the paper examines social capital data from the Social Capital Community Benchmark Survey 2000, which provides social capital data for more than 24000 individuals living in 40 communities, grouped into nine regions, in the USA. These data show remarkable diversity of social capital by region. Multivariate analysis is used to examine the impact of economic and social determinants of social capital and shows that education is important for nearly all indicators of social capital, and that ethnic diversity is associated with lower levels of social capital. Furthermore, analysis indicates the need to distinguish between local and non-local forms of social capital. The paper concludes by suggesting that future analysis of social capital will benefit from a more region-specific approach towards examining its development and impacts.
http://wrap.warwick.ac.uk/34310/
Related Articles It appeared that Porte's attack was going to give him both the stage and the overall lead but his gap was narrowed with Gerrans and Ulissi attacking in the final 100m and he now sits fourth overall with just tomorrow's street race around Adelaide to come. With nine bonus seconds on offer in intermediate sprint points and 10 seconds on the finish line, the final day of racing could provide further exciting racing. "The guys were absolutely incredible today, it was a little bit of a shame on the Corkscrew stage being a little bit out of position and I lost some time. But I felt great coming into today and the team had a plan and the boys were absolutely incredible all day," Porte said after claiming the win. "This result is more than I hoped for. It was a very stressful day with crosswinds but I had my team doing an incredible work for me. Ian Stannard, Bernhard Eisel, Luke Rowe, the Classics' guys… I just had to sit in their back pocket all day. I panicked a little bit and Stannard said he'd drop me at the right place." Porte is building for his season objective, victory in the Giro d'Italia in May, but showed his class when the roads start heading upwards and was grateful to repay the faith Sky have placed in the Tasmanian. "It's January, I'm not yet in top form just yet but to win in Australia on this climb is a very special victory," Porte said. "Winning here means everything for me. Sky is such a great team. It's a great way to repay them for the belief they have in me." Simon Gerrans entered the race needing to find eight seconds to end the stage in the leaders' ochre jersey and did just that. He now enters the final day with a one second lead over Evans which is a similar scenario to 2012 when he last won the race. "All the way up the climb, I always knew what I had to do. I needed to save energy for the very last part. Earlier on, we had Matt Goss at the front, then Daryl (Impey) and Simon (Clarke) looked after me. It's a dream result to get the jersey back," Gerrans said in the aftermath of the race. "It's only by one second though. Actually it's one second more than two years ago (against Alejandro Valverde) but it's still going to be tight and nervous tomorrow. I'm very pleased to be back in the lead." The day had begun with riders trying to make the day's break with Mark O'Brien (UniSA) starting proceedings but he missed out. In the break were Matteo Trentin (Omega Pharma-Quick Step), Jens Voigt (Trek Factory Racing) Jose Lobato (Movistar) and Mikhail Ignatyev (Katusha). The break built a lead of eight minutes after 50km of racing with the peloton deciding to let the four riders go which meant that there was no possibility of Gerrans gaining bonus seconds at the intermediate sprint points. Orica-GreenEdge decided the break's time was up and started to up the tempo as BMC, Sky and Garmin-Sharp came forward to help out with the chase. Voigt crested the first ascent of Willunga Hill but the break was reeled in on the descent back into Willunga so that when the race went up the climb for a second time it was all together. The crowds on the climb was one of the largest seen at the race cheering on every cyclist on both ascents. As the climb started to head upwards, on the front of the peloton was BMC and Evans and the race leader then tried to distance his rivals. With 2km to go, Porte put the hammer down and was briefly joined by Evans before increasing his speed while Gerrans remained cool with Daryl Impey by his side. Evans began to fade and sat up to join Ulissi and Gerrans and the three headed for the finish line and in another impressive showing at the race, Diego Ulissi beat Gerrans in the sprint for second place who he now trails by five seconds in the overall. Evans finished the stage in sixth place alongside Robert Gesink (Belkin) and Daryl Impey (Orica-GreenEdge) after they caught him in the final hundred meters and the three crossed the line together. Gerrans ended the stage in the box seat for his third overall Tour Down Under victory and GreenEdge sport director Matt White said after the race the team are confident ahead of tomorrow's criterium stage. "Even if Cadel hadn't been dropped today, we were pretty confident we could have gotten three seconds tomorrow. Now we don't have to, and we can play it defensive," White said. "Over the last three years, he's done well on this climb. It's a climb that suits him. This climb is always won in the last kilometre, so long as he didn't get distanced too much in the steep part at the bottom, he could attack at the top. Simon is very smart, and he rode a very calculating climb."
I have searched the net for Digitrax converter or complete Digitrax package, but I was unable to find it. I also checked Downloads section of this site. Does someone have some information about those programs, or maybe have them?I's like to convert some smaller module files, to try them on the Enterprise. Digitrax converter is part and a module of EDC windows Page created in 0.144 seconds with 26 queries.
https://enterpriseforever.com/programming/digitrax-modules/
The history of hockey has spanned across nearly every continent in some form. While ice hockey is typically the first sport to come to mind in North America, field hockey sports historically outnumber the former by far. The earliest evidence of such games, discussed below, dates to approximately 2,000 BC, making the history of hockey span over the course of more than 4,000 years. Despite the fact that these sports appear to have developed independently in different regions of the world, many of them bear striking similarities. Regardless, the history of hockey, from medieval French ball-and-stick games to Mexican fireball pelota purépecha, is rich with culture and intrigue. Middle and Far East One of the earliest archaeological records of a game that may have been a precursor to field hockey lies in the tombs at Beni Hasan, an ancient Egyptian burial site. The walls inside these tombs, covered in ancient Egyptian murals, give flashes of insight into the lives of this ancient society. One such painting depicts two men wielding sticks with curves at the end, apparently fighting over possession of what appears to be a ball. If this does indeed depict a hockey-like sport, this would be the earliest record in the history of hockey, roughly around 2,000 BC. Though not as old as the aforementioned Egyptian sport, the Mongolian game of beikou, typically called Daur hockey after the people who play, is a hockey game with origins over 1,000 years ago. It comes from a game called bu da qiu, played during the Tang dynasty (618–907) in northern China. Throughout the ensuing centuries, the rules of the sport changed until a sport by a new name, beikou, emerged. During this period, the sport lost popularity among most ethnic groups outside of the Daur. Africa Africa houses a variety of field hockey sports, such as the Ethiopian game of genna, with which the Ethiopian Christmas festival shares the same name. As the only historical records for the sport lie in the legends its players tell, it is difficult to pinpoint its origins. Ethiopian oral tradition relates that when Jesus was born and news of his birth reached shepherds in the local area, they were so overjoyed that they picked up their crooks and started hitting a ball around, inventing the game on the spot. If this is to be taken at face value, the game would originate between 4 and 6 AD, though no verifiable evidence exists to confirm this. Genna is a fairly straightforward field hockey game without many differences from field hockey itself. Its primary twists lie in the area in which it is played. Matches typically take place in open fields without borders, and as such players can technically take the ball as far out as they want, though this is likely discouraged. Cattle often graze on these fields, so players also have to watch out for living, moving obstacles in the heat of the game. Mediterranean Region A Greek marble relief from approximately 500 BC depicts several men playing a sport which appears to be similar to field hockey. Two men meet in the middle of the carving, holding crooks of some sort with which they appear to fight over a ball. Men also wielding crooks watch from the sides and don’t appear to be actively involved in the skirmish. This very well appears to be a hockey sport of some kind, though judging by the lack of other archaeological records of the sport, it may not have been a very popular game compared to others (such as the football-like game of episkyros). Regardless of its popularity, this unnamed Greek sport serves as ancient Greece’s solitary entry in the history of hockey. European Region France Within the history of hockey, the sport of biggest scale would likely be the French game la soule, played since the 13th century and perhaps earlier. In this sport, two or more teams with a few dozen to a few hundred players each would skirmish for a ball in an attempt to bring it back to their parish. This game is unique from other medieval mob football sports in that one of its variations had players wielding sticks with which to handle the ball. As such, though la soule was not strictly a hockey sport, it does deserve mention in the history of hockey. Ireland The Irish game of hurling, a game with traits of hockey, baseball, and soccer, plays an integral role in the history of hockey. The game is even likely responsible for the development of Canadian ice hockey, detailed below under North America. Irish oral tradition relates that the sport has origins over 3,000 years ago, likely in the same sport that Scottish shinty originates from. However, the details of these legends are not verifiable. The earliest literary references to the Gaelic predecessor to hurling lie in the 5th century AD. Though not strictly a hockey sport, hurling has some of the same characteristics. In this fast-paced game, players wield sticks called hurleys to handle a ball called the sliotar, attempting to pass it through the opposing team’s goal. What makes this sport stand out in the history of hockey is its unique style of ball handling. Unlike within strict field hockey sports, hurling players use their hurleys to pick the ball up off the ground, balance it on the stick, and strike it in a manner similar to baseball. This gives the ball much more time off the ground than other ball-and-stick sports do. Though not very popular worldwide, hurling is one of the most popular sports in Ireland today and represents an important part of both Irish culture and the history of hockey. Scotland The Scottish game of shinty claims origins with the same ancient Gaelic game as the Irish game of hurling. Oral tradition specifically relates that the game was been played since 1200 BC, and, as mentioned above, literary references for the original Gaelic sport go back to the 5th century AD. This game, though likely originating from the same sport as hurling, aligns more closely with traditional field hockey than its Irish cousin. Like in traditional field hockey, shinty players use a stick, called a caman, to manipulate the ball on the ground. Unlike within hurling, players are not allowed to pick up the ball with their hands. Though not well known, shinty is very central within Scottish culture, and an importance piece in the history of hockey. England Perhaps the first widely established ice hockey sport, bandy provides a significant contribution to the history of hockey. England has historically been the most influential contributor to the game, hosting the first official match in 1875, though other European regions likely contributed to its development as well. Bandy is nearly identical to ice hockey, except that players use a ball instead of a puck. On a 120×70 yard ice rink, teams of 11 players each, including a goalie, attempt to bass a ball through the opposing team’s goal. Though not incredibly popular today, bandy was widely practiced throughout Europe in the 20th century. Wales Though only a niche sport today, the game of bando, a cousin of bandy, was the most popular sport in Wales during in the 18th century. It was apparently so ubiquitous that some areas underwent a certain level of deforestation to meet the demand of producing bando sticks, as reported by a traveller through Wales in 1797. Bando represents a departure from the chaotic unruliness of medieval mob football games, such as the Welsh game of cnapan or the aforementioned la soule, to something slightly more structured and codified. This was partially because bando matches were often subject to wagers, which was not true of mob football games. As such, these games had to have more stringent rules to mitigate complaints about cheaters from the losing side. While the sport was somewhat more structured, bando as a whole was still fairly chaotic in comparison to modern sports. For example, players would regularly strike opposing players with their bando sticks, even when the rules for a particular match specifically forbade so. In addition, since most rules were negotiated and agreed upon before each game, they could vary from match to match. These issues are representative of the somewhat chaotic nature of sports in Europe coming out of the Middle Ages. Mesoamerica The Mesoamerican game of pelota purépecha, played even to this day in Mexico, is perhaps the oldest hockey sport in the Americas. Likely originating the Valley of Mexico, this sport may have ties back to 1500 BC, making it a notable figure in the history of hockey. Murals at the Palacio de Tepantitla, located in the ancient city of Teotihuacan in the Valley of Mexico, seem to depict this sport or one very similar. With respect to gameplay, it is quite similar to field hockey itself. Its most exciting twist is its nighttime variation, in which players used a special ball that could be lit on fire for illuminated play. (Historically, players used a wooden ball soaked in pine resin.) Another hockey sport in Mesoamerica, though not very predominant, is the Chilean game of chueca, played among the native Mapuche people since the 16th century. The sport is described as very similar to hockey. Historically, players wielded twisted hockey sticks called weno with which to handle a small, wooden ball called the pali, typically measuring only 1.5 to 2 inches in diameter. Spanish conquistadors first witnessed the game in 1558, though how long it was played beforehand is unknown. It is possible this game influenced the development of other hockey games played by Spanish settlers, such as pelota purépecha. It is also possible this sport ties into the aforementioned murals at the Palacio de Tepantitla. Regardless, the sport has been played for at least 450 years, earning it a significant place in the history of hockey. North America Within North America, the most common form of hockey, and likely the only one to come to mind at the mention of the word, is ice hockey. The sport likely owes its origins to the Irish game of hurling, adapted to ice in late 18th to early 19th century Canada. This is attested by writings from Nova Scotian politician Thomas Chandler Haliburton (1796–1865). In his book The attaché, or, Sam Slick in England (1843), he recounts that during his schooling days he played “hurley” (another name for Irish hurling) on Long Pond in Windsor, Nova Scotia. If this account is to be accepted, Haliburton would have played hurley on ice sometime between 1804 and 1809. It is primarily based upon this attestation that the town of Windsor proclaims itself as the birthplace of Canadian ice hockey. Other references of “hurley on ice” from the same period attest to ice hockey’s Irish origins as well. A relevant group of sports is the collection of First Nations (the term for native Canadian Indians) and Native American games called shinny, played before European contact in North America. There is an informal Canadian ice hockey sport by the same name played to this day, suggesting the two sets of sports share a history. These games resembled ice hockey, wherein two teams of variable numbers of players tried to pass a ball into the opponents’ goal using curved sticks, though the Native North Americans did not always play this game on ice. They knew this sport by different names among different tribes; for example, it was called tikauwich among the Chumash, ohonistuts among the Cheyenne, and gugahawat among the Arapaho. Regardless of complexities and debates regarding its origins and development among native tribes and European settlers, shinny holds a central position in the modern history of hockey. Ying, X., & Baoqin, W. (2008). Ethnic minorities of China. Beijing: China Intercontinental Press.Minahan, J. (2014). Ethnic groups of North, East, and Central Asia: An encyclopedia. ABC-CLIO. Briggs, P. (2012). Ethiopia (Bradt Travel Guides). Chalfont St. Peter: Bradt Travel Guides. Rouse, P. (2015). Sport and Ireland: A history. Oxford: Oxford University Press. Koch, J. T. (2006). Celtic culture: A historical encyclopedia. Santa Barbara, CA: ABC-CLIO. Culley, P., & Pascoe, J. (2009). Sports facilities and technologies. New York: Routledge. Noble, J. (2016). Lonely Planet Mexico (Travel Guide). Footscray, Vic.: Lonely Planet. Davies, R. A. (2005). Inventing Sam Slick: A biography of Thomas Chandler Haliburton. Toronto: University of Toronto Press. Carlisle, R. P. (2009). Encyclopedia of play in today’s society.Trans World Sport. (2015, August 24th). Genna | Ancient Ethiopian Sport on Trans World Sport [Video file]. Retrieved from https://youtu.be/UOttBUvRcBU Industrial Ethiopia. (1970). Nairobi: United Africa Press. Nauright, J. (2012). Sports around the World: History, Culture, and Practice. Santa Barbara: ABC-CLIO. Elliott-Binns, L. E. (1955). Medieval Cornwall. London: Methuen & Co. Baker, W. J. (1982). Sports in the Western world. Totowa, NJ: Rowman and Littlefield. Day, C., & O’Neill, M. (2006). Ireland. London: Cadogan Guides. King, S. J. (1998). The clash of the ash in foreign fields: Hurling abroad. Boherclough, Cashel, Co. Tipperary: S.J. King. Levinson, D., & Christensen, K. (1996). Encyclopedia of World Sport: From Ancient Times to the Present. ABC-CLIO Interactive. Crego, R. (2003). Sports and games of the 18th and 19th centuries. Westport, CT: Greenwood Press. Williams, G., Morgan, P., & Williams, M. F. (1988). Glamorgan county history. Cardiff: Glamorgan County History Trust. Fosty, G. R., Fosty, D., & Jelley, J. (2003). George and Darril Fosty’s splendid is the sun: The 5,000 year history of hockey. New York: Stryker-Indigo PubTrans World Sport. (2013, March 9th). Crazy Fireball Hockey [Video file]. Retrieved from https://youtu.be/end2M3lBrM4 Hosler, D. (1999). Prehistoric Polymers: Rubber Processing in Ancient Mesoamerica. Science, 284 (5422), 1988-1991. doi:10.1126/science.284.5422.1988 Vivar, J. D., & Leonard, I. A. (n.d.). Crónica y relación copiosa y verdadera de los Reynos de Chile. Santiago de Chile. The Cambridge history of Latin American literature. (1996). Cambridge: Cambridge University Press. Hilger, M. I. (1956). Smithsonian Miscellaneous Collections. Volume 133. Washington, D.C.: Smithsonian institution. Raddall, T. (n.d.). Thomas Raddall Fonds, Correspondence [Letter written January 25, 1954 to Douglas M. Fisher]. Rand, S. T. (1971). Legends of the Micmacs. New York: Johnson Reprint. Matlock, B., & Matlock, J. (2011). The Salt Lake loonie. Regina: Canadian Plains Research Center.
https://healthahoy.com/explore-history/history-of-hockey/
February 23, 2022 Art in activism, activism in art. This is the motto of the Lipstick Theatre. Northwestern’s Feminist Student Theater Council offers three productions per year. Most recently, the group performed “Sunrise Coven” in early February. All of her shows portray intersectional and inclusive feminism while educating cast members, board members, and audiences on these issues. Freshman communications student Sam Webster, the council’s director of co-production, said many of Lipstick’s shows include educational programming like talkbacks, where actors talk to the audience about the show’s process and themes. “We offer theater and performance that serves an important social function and speaks to feminism and intersectionalism,” Webster said. “We promote activism through art and use theater as a medium.” Webster joined Lipstick this fall in a recruiting round to staff the board after a difficult year and a half, according to senior communications and creative director Payton Shearn. Shearn said the council struggled to generate enough interest in virtual theater to continue operating, let alone produce any shows last year aside from a radio play. However, lipstick is in full swing this year. McCormick and communications manager Gillian Finnegan, chair of board governance, said the fall and winter productions were especially special to her. “It was great to see everything we’re talking about as a board set up, now that we have to do in-person productions and collaborate with directors, producers and production crews,” Finnegan said. Directors and producers begin the process of selecting plays for the following year in late spring. They pitch their ideas to the Lipstick board, including the specific feminist issues they intend to address. Although Lipstick’s mission is inherently intersectional, Shearn said the board sometimes struggles to uphold those values at a predominantly white institution like NU. “Our whole thing is to raise marginalized voices, but that’s hard to do because there’s really only so many marginalized people in this school,” Shearn said. “How can we work with diverse and marginalized people and raise their voices without symbolizing them, without exploiting them and their work? » Working towards this goal, the group has updated its new member petition process. Shearn said board members previously focused on assessing a candidate’s “vibes,” about which people’s opinions could easily come from unconscious bias. Now, they said the group is more methodical in its reviews, with an anonymous feedback form featuring specific content-based questions. “Making this petitioning process a little more objective will really help make sure that we attract people who are really excited about the mission,” Shearn said. “It will really preserve the integrity of the board.” E-mail: [email protected] Twitter: @AlexaCrowder Related stories:
https://rdk-invest.com/lipstick-theater-brings-feminist-performance-to-northwestern-campus/
We decided on Westminster Gold because it would stand out well in the room and coordinated amazingly with the wall and rug. And then I painted it on the hutch and almost started to cry at my wasted time and how truly awful it looked in the room. The color on the chip didn’t at all make us think we were getting a cannery yellow color. Comments - I LOVE that piece! I also love the look you have in your house, with no clutter. I’m reaching that goal myself, removing a little more each week. For our first year anniversary, fordating that is, I make my to-be husband, a big red overstuffed, heart, in two halves, using red sating material. Looking back, I would have made something different, however, becaue it looked REALLY tacky, lol! But then again, that was 18 years ago, and I’ve come a LONG way since. God is gracious, and my husband thanks Him for helping me out with my decor taste, lol! - yay! The veggies look great. And I just realized that your dining room was open to your kitchen. I love it even more now! - Love the color! I wish my neighbors threw out such beautiful furniture! I am hoping to flip a dresser and changing station for a nursery, hope it turns out as well! - I like both paint colors! And even the before. I painted a chair and dresser a while ago, I wanted it to be light blue, so I was about to pick out a light blue,(on the paintchip it looked light blue),and from out of nowhere the thought came to me that it would dry way darker. So I picked one that barely had a tinge of blue and now that I painted it ,I am so glad I did. It’s the perfect shade of blue I envisioned! Even though the paintchip was deceiving. - I have to agree with the last comment that I liked the yellow! It definitely stood out a little more where as the the whiter color blends in with the wall. I love all your posts. I’ve been reading for a few months now and never commented, but I had to stick up for the yellow 🙂 - This comment has been removed by the author. - The yellow did look good, just not in the kitchen because it was all wrong with the rug… It was far too really yellow and not gold-y yellow. I think I will paint it darker at some point because I would like more contrast with the wall but I think I need to think on the color for a bit longer!
http://migonishome.porch.com/2012/07/side-of-road-buffet-makeover/
I’ve often struggled with establishing a consistent evening routine. Several years of undergrad and grad school made it hard to have any type of reliable schedule—you never know when you might be up late studying. Then, that lack of nighttime planning carried over when I started a more traditional 9-6 job. But, after reading about the benefits of properly unwinding and prepping for the next day, I decided to try implementing some type of evening routine. Having now had a set evening routine for a couple years, I must say, those lauded benefits are no joke. Not only do I feel more prepared when I wake up, but I typically have an easier time falling asleep at night, too. And, on the nights when I don’t stick to my routine, well, let’s just say I can definitely tell. The most important part of establishing a nightly routine is sticking with it. Given that, it may be best to start out with a short one and add from there (as time allows). Also, create one that works with your schedule. If you only have 20 free minutes every night, that’s okay—just make the most of them. If you can spare a good hour or hour and a half to unwind and prepare, make the most of that, too. It’s all about designing something that works for you. Well, that and turning off your cell phone—that thing can distract you and waste your entire night away. So, what all practices should you consider building into your PM routine? Cleaning A messy home is the opposite of relaxing, and few people want to spend precious weekend hours cleaning everything that was scattered around the home during the week. That’s why you should add 10-15 minutes of tidying up to your nightly routine. Put everything in its proper place, wash the dishes, sweep the floor. You just need to do enough to keep things looking nice—plus you never know when a friend might stop over, so why not keep your place presentable? Prepping One of the most dependable ways to ensure an easy morning is prepping for it the night before. Figure out what you want to wear the next day and lay out the outfit. Decide what you’re eating for breakfast and lunch tomorrow, and I’d highly recommend getting your lunch ready and packed so you can grab it on your way out of the house in the AM. Finally, make a list of goals for the following day—write out everything you hope to accomplish and organize it so you know what’s the most important. While you’re at it, now’s a great time to take care of your pre-sleep routines, like washing your face, brushing your teeth, and applying lotions or night creams. Reflecting To me, the most important part of an evening routine is reflecting on the day. I like to do this after I’ve gotten everything ready for tomorrow because I can start unwinding. If you only have a few free minutes, sit down in a quiet place and think over how the day went: What went well, what do you want to differently, how do you feel overall? Gratitude journaling can also be super rewarding—and it’s supposed to make you happier, too! If you process your thoughts best through writing, definitely give this a try. Free writing notes about your day can also help you think through things that might be causing stress. Relaxing Reflecting may be the most beneficial part of an evening routine, but my favorite part is relaxing. This can take many different forms. It could be a refreshing bath. 20 minutes of a calming yoga practice (just avoid anything too strenuous). A tranquil meditation where you clear your mind for several minutes. Sitting with a warm cup of tea (caffeine free, of course). Or, my personal go-to, reading a chapter or two of a book. Now, don’t take a solid nightly routine as an excuse to slack on your mindful morning routine. It’s more like a wine-and-cheese paring—good on their own but better together. When figuring out how to set up your evening routine, choose one that will be easy to stick with because it won’t do any good if you don’t keep it up—that’s the whole point of a routine, right?
http://edits.ahalife.com/?p=6242
Jian Huang, who is new to the University, has joined ECE Illinois and CSL as an assistant professor of electrical and computer engineering. Huang received his PhD from the School of Computer Science at Georgia Institute of Technology in 2017. His research interests lie in the areas of computer systems, including operating systems, systems architecture, systems security, distributed systems, and especially the intersections of those areas. He will be a member of CSL's Reliable and High Performance Computing research group. He enjoys building computer systems. The goal of his research is to build practical, reliable, secure, and high-performance systems, and to bridge all layers of systems stack from hardware platforms to applications. His research contributions have been published at top-tier systems, architecture, and security conferences. His work won the Best Paper Award at USENIX ATC in 2015 and the IEEE Micro Top Picks Honorable Mention in 2016. Most of the technologies he has developed have had an impact on industrial and real-world systems, and some are being transferred into products including those at Microsoft data centers. His collaborative research with MSR won the Microsoft Research Outstanding Project Award in 2017.In addition, CSL has welcomed two faculty members, Aleksandr Stolyar and Ruoyu Sun, from Illinois' Industrial and Enterprise Systems Engineering department. Stolyar is one of the world’s top queueing theorists, specializing in analysis and control of stochastic networks. One of his fundamental theoretical contributions to the field is the introduction of the fluid limit technique for establishing the stochastic stability of queueing networks. This method has become a powerful tool in the stochastic networks theory. Another of Stolvar's important contributions is the pioneering study of the MaxWeight scheduling algorithm in the heavy-traffic asymptotic regime. This work received the 2002-2004 Best Publication Award from the INFORMS Applied Probability Society. Stolyar’s work has also made significant industrial impact, especially during his 16 years at Bell Labs Mathematical Sciences Research Center. He is an author of over 20 patents, with many solutions and algorithms implemented in real systems. He will join CSL's Decision and Control group.Assistant Professor Ruoyu Sun's work focuses on data analytics. His research interests focus on large-scale optimization and its application in machine learning, data analysis and signal processing. He has also worked on signal processing and information theory for wireless networks, receiving the second place of INFORMS Nicholson student paper competition for hisy work on randomly permuted ADMM, and the honorable mention of INFORMS optimization society student paper prize on matrix completion via non-convex factorization. Prior to joining Illinois, Sun was a visiting researcher at FAIR (Facebook Artificial Intelligence Research) as a (full-time) and a postdoctoral scholar in the Dept. of Management Science and Engineering at Stanford University, where he worked with Yinyu Ye. At CSL, he will work with the Signals, Inference, and Networks group.Illinois Professor of Mathematics Vadim Zharnitsky has also joined CSL as a member of the Decision and Control group. Zharnitsky's research interests center around dynamical systems and differential equations, nonlinear waves, and Hamiltonian dynamics.
https://csl.illinois.edu/news/four-new-faculty-join-csl
Evelyn K. Spruill, LMT Evelyn Spruill embraces her identity as a healer today, but her earliest calling was a very different kind of therapy. In 1991, she earned a Bachelor of Science degree in Music Therapy from Nazareth College. With a minor in Voice, she hoped to sing professionally. Her first therapeutic role was at a nursing home where she administered music therapies for residents experiencing dementia. When Evelyn was 25, skin cancer changed everything. Her 24-year-old brother Mark, for whom she cared during his last year of life, died of Melanoma. After his passing, she felt called to play a role helping others recognize the early signs of skin cancers — most of which are highly treatable when caught early. Evelyn attended The New York Institute of Massage, graduating in 1999. She developed a uniquely personal approach to massage therapy which blends popular and specialized treatment techniques with the added benefit of a consistent awareness of each client’s skin. She extends the benefits of music therapy to her massage clients by incorporating carefully selected ambient music for each session. She takes great pleasure in the very gratifying role of a massage therapist. "It gives me great pleasure knowing that what I do is really making a difference in many peoples' lives.” She is married and a mother of 3 beautiful children whom she adores and loves spending quality time with. Evelyn also enjoys volunteering in the community, singing, crafting and being outdoors.
BACKGROUND OF THE INVENTION 1. Field of the Invention This invention relates to test systems and methods of developing same, and more particularly to Cloze type tests adapted to be automatically scored by optical scanning equipment or by microcomputer controlled apparatus. 2. Background of Cloze Testing The "Cloze" procedure as a form of testing was introduced in a publication by Wilson Taylor in 1953. Originally developed as an improved method of assessing text readability, cloze testing involves the presentation of a prose passage from which words have been deleted, thereby leaving a series of gaps or spaces in the text. The examinee is asked to fill in the blank corresponding to the deleted word by supplying the missing word or a reasonable substitute for it. Different algorithms can be devised for deletion of every nth word; deletion corresponding to particular parts of speech; or random deletion of words. A large number of public studies of the cloze approach to testing have helped establish its validity as a measure of reading comprehension that is in several ways superior to conventional tests, e.g. those which rely on asking multiple choice questions. However, the procedure has a fundamental problem in that it requires scoring by "exact word" or "acceptable word" rules. The traditional open-ended or "completion cloze" test methods have obvious short comings in large scale testing programs, in that they are not readily amenable to machine scoring such as by optical scanners. In order to render cloze testing amenable to machine scoring, "multiple choice cloze" appraoches have been developed. In this application, examinees are presented with four or five choices corresponding to each deleted word, and are asked to choose the best alternative word. However, this procedure has been criticized because the task is fundamentally one of recognizing the correct word, as opposed to producing it. The subject matter of this invention encompasses specific developments of two formats that differ from the traditional cloze testing procedures, and which are adapted particularly for automatic scoring and/or presentation through a terminal screen. These formats are the "cloze- edit" procedure, and the "maze" procedure. In both of these procedures the test consists of a reading passage into which has been inserted, preferably randomly, words which are extraneous to the text. The task of the examinee is to elide, or strike out, the words that have been inserted into the running text. As a generic term for this general approach, I use the term Cloze-Elide testing. Although other alternative forms are possible, the invention is disclosed here only in terms of these two procedures, and particularly with respect to development of the cloze-edit procedure for automatic test scoring. The cloze edit technique in this general form has been discussed in the published literature. Reference is made to the publication of Davies in Testing Language Proficiency, edited by Jones and Spolsky, Center for Applied Linguisticts, pp. 119-130 (1975); Bowen, The Identification Of Irrelevant Lexical Distraction: An Editing Task, TESL Reporter, Vol. 12, No. 1, pp. 1-3, 14- 16 (1978); and Mullen, An Alternative To The Cloze Test, TESOL, 1979. In one embodiment of my development of the cloze edit test, specially prepared passages with distractor words inserted therein are printed on optically scannable answer sheets, and the examinee is required to eliminate the incorrect distractor words from the text by drawing a line through the words with a pencil or other marking device which generates a mark with reflectivity which is distinguishable from that of the printed text. Each text word, and particularly the distractor words which are to be deleted, are printed at precisely predetermined locations on the page, and programmably controlled optical scanner apparatus is utilized to determine which distractor words had been properly elided and which other text words have been incorrectly elided. Alternately, as set forth in greater detail under the Description of the Preferred Embodiments, the test passage may be presented electronically, such as on a video screen, with the examinee being provided means for electronically deleting the distractor words. The maze technique has been disclosed in a series of studies by Guthrie (1973); Guthrie, Siefert, Bernum and Caplin (1974); Fitzgerald & Fitzgerald (1978); and Pikulskin (1977). In this general format, target words are selected from the given text, and two or more incorrect (foil) words are paired with the target word to form a triplet. The student then must choose from the presented options the word that is most appropriate. Generally, the triplets are chosen so that one of the "foil" words is in the same word class whereas a third word is in a different class. In this way, it is possible to distinguish between lexical and syntactical errors in reading the passage. While this format has the scoring advantage of a traditional multiple choice test, it has not heretofore been developed so as to be susceptible to automatic machine scoring. SUMMARY OF THE INVENTION It is an object of this invention to provide a system and method for automatic machine scoring of Cloze-Elide tests. It is another object of this invention to provide a system and method for automatic scoring of a Cloze-Elide test administered on a sheet. It is another object of this invention to provide a system and method for automatic scoring of a Cloze-Elide test displayed on a video terminal. It is another object of this invention to provide a system and method of automatic presentation of a Cloze-Elide test on a video terminal with electronic means for test taking by manipulation of the terminal display. It is another object of this invention to provide a system for automatic scoring of an electronically presented Cloze-Elide test. It is another object of this invention to provide a method of generating a Cloze-Elide test for automatic presentation upon demand. It is a still further object of this invention to provide a method of selecting answers to a Cloze-Elide test presented on a video terminal, and of automatic scoring of the selected answers. In accordance with the above objects, a Cloze-Elide automated testing system and method is provided, having a display surface in the form either of a printed sheet or electronic display such as a video terminal, the display surface containing a text of words, the text having distractor words inserted therein which are to be elided by the person taking test, the inserted distractor words being positioned on the surface at predetermined surface positions, the system further having storage for electronically storing data representative of the predetermined distractor word positions. Following selection of the words to be elided by the test taker, such as crossing out the elided words on the printed sheet or removing them electronically from the video display, the system provides means for determining the positions or identity of the word selected to be elided from the text and for generating data representative of the elided words or word positions. Means for comparing the predetermined distractor word positions and the determined elided positions are provided, along with automatic computing means for providing an indication of the score made by the test taker. BRIEF DESCRIPTION OF THE DRAWINGS FIG. 1A illustrates an unmarked test portion of the test in the Cloze- Elide test format. FIG. 1B shows the same test portion as FIG. 1A, with overmark indicia indicating words selected to be elided by the test taker. FIG. 1C shows an unmarked test portion of a Maze test embraced by this invention. FIG. 2 shows a block diagram of a system of this invention utilizing a test sheet and scanning means for determining the elided words, and computing apparatus for computing the test score. FIG. 3 is a block diagram indicating the basic elements of an electronic system for Cloze-Elide testing, utilizing a video terminal, a CPU such as a microprocessor, and automatic elide means for manipulation of the text display on the video terminal. FIG. 4A is a block diagram illustrating the steps taken in a system and method of this invention for presenting and scoring a Cloze- Elide test. FIG. 4B is a flow diagram of a system and method of this invention for generating, displaying and scoring a Cloze-Elide test. FIG. 4C is another embodiment of a system and method of this invention for generating, displaying and scoring a Cloze-Elide test. Referring now to FIGS. 1A-1C, there are illustrated two forms of Cloze- Elide test presented in standard sheet form. Referring first to FIG. 1A, there is illustrated a text 30 which is typed on a sheet having rows of marking areas 33, each marking area having a predetermined position with respect to the dimensions of the sheet. As seen, each word of the text covers one or more position areas, and thus is identified with one or more predetermined position areas. As set forth in the discussion above of Cloze-Elide testing, selected distractor words 31 are introduced into the text, these being the words that the test taker is asked to identify and elide. As illustrated in FIG. 1B, the test taker has elided distractor words by providing an indicia, suitably in the form of a pencil marking of predetermined optical reflectivity, which is capable of being sensed by scan camera type of equipment. In practice, the marking areas 33, shown as approximately oval in form and sometimes referred to as "bubbles", are printed in an ink of a first optical reflectivity, to which the scanning equipment is substantially insensitive. For example, the mark areas may be printed in red ink. This contrasts with the pencil marking made by the test taker, with a type of lead which has a very reduced optical reflectivity compared to the rest of the test sheet, such that the mark is clearly sensed by the scanning equipment adopted for use with the system. Also illustrated in FIGS. 1A and 1B are position marks, or row marks in the form of bars shown in the lefthand margin. These marks are used, in a manner well known in the art, for providing synchronizing signals to scanning equipment, to aid the scanning equipment in finding and identifying rows which are being scanned. FIG. 1C shows a portion of a Maze test text, printed on the same form of test sheet with bubble marking areas, or positions. As with the Cloze- Edit test, a student eliminates the distractor or unwanted words, in this case by crossing out two of the three words presented. Of course, it is to be understood that other variations of the Cloze-Elide type test may be presented and utilized within the scope of this invention. Referring now to FIG. 2, there is shown a block diagram of the system of this invention for automatic scoring of a Cloze-Elide test which has been presented and taken on a sheet 40, such as shown in FIGS. 1A and 1B. The sheet 40 is transmitted past a light source 41 by document handling means not shown. Such document handling means are well known in the art. A scan camera 42 is utilized to scan each successive row, under the control of scan control 45. Scan control 45 is suitably in turn controlled by document position control 44, which also controls the document handling means, the signal from document position control 44 synchronizing the scan control 45. Also, as previously indicated, row marks 34 may be utilized to further aid the scanning synchronization process. Applicant refers to U.S. Pat. No. 4,300,123, which shows a typical type of scanning system employing a light source and scan camera, for generating video data representative of marked test sheets. Reference is made to this patent for disclosure of a typical prior art scanning system which can be utilized in the practice of this invention. As is further shown in FIG. 2, the video data from block 42 is processed at block 46 to provide video signals, suitably in digital form, representative of markings found in each successive row as it is scanned. The processing of 46 may also suitably be controlled by signals from scan control 45. In practice of the system and method of this invention, the distractor position data, representing the distractor words 31 inserted into the text, is stored in memory 48. This data is inputted to a compare circuit, or program computer 49, for performing a comparison function. The distractor position data is compared with synchronized data from the video processing block 46. By this means, the apparatus of block 49 can determine whether the distractor words have been properly identified, and also determine whether other words not inserted as distractor words have been selected by the student. The results of the comparisons at block 49 are computed at block 50 to determine the test score. The computing steps of block 50 may be made by a separate digital circuit of standard design, but more preferably are carried out within the same programmed computing apparatus as the comparison steps of block 49. In the preferred embodiment, the computer, or CPU, may be a commercially available microprocessor based small computer. The stored distractor position data may be in any readily available form, such as read only memory (ROM), PROM, or any other medium. The actual architecture of the apparatus of FIG. 2 is not essential to the invention, but it is essential to the embodiment of FIG. 2 to have the stored distractor position data so as to obtain an accurate comparison with the video signals generated by the scan camera. Referring to FIG. 3, there is shown a simplified block diagram of an embodiment utilizing a video terminal 55 having a video display 56 of a known type. The video terminal 55 receives signals from a CPU 58, again in a known manner. The manner of controlling a video display from stored data in a CPU is well known in the art. At the start of the test, the CPU contains the stored text for display, as well as distractor data, either in the form of the distractor words or the form of the locations of the display distractor words, or both. The test taker uses an automatic elide means, illustrated at 59, to select and elide words which are identified as distractor words. Such automatic elide means may be any one of a number of commercially available means. Touch screen apparatus may be used, in which procedure the student or test taker merely touches the screen at the position of the word to be deleted, whereupon the stored program in CPU 58 causes the word to be deleted from the text. A light pen may be utilized, which technique is similar to the touch screen but incorporates the use of a light pen to delete the selected word or words. Alternately, a Koala pad may be used, with which a cursor is moved about on the video terminal screen by the student moving his or her finger across a specially designed pad which is an analog of the screen itself. When the cursor is properly located, the distractor words can be deleted or identified. Alternately, a "mouse" can be used, a device that is moved about on a desk top so as to control a cursor on the screen. The preferred embodiment employs a computer based technique such as illustrated in FIG. 3 for response to the test, so as to make available a simple, direct and rapid response mode which facilitates student motivation and enables the text processing task to be completed in a real time frame that is compatible with the act of reading and editing a text. Referring now to FIG. 4A, there is shown a flow diagram of a method carried out by the system of either FIG. 2 or FIG. 3. As illustrated at 60, the text data is first stored in any convenient form. It may be previously stored on magnetic tape or a disk and transferred into a computer memory, or it may be available in any other convenient medium. For example, in the embodiment of FIG. 2, it could be stored solely in a wordprocessor typewriter. At block 61, distractor words are selected in the fashion as discussed in the section titled Background of the Invention. Distractor data representing the selected distractor words is then stored or placed on a convenient medium, as shown at block 62. The next step is to insert the selected words into the text, as shown at 64. This may be done semi-automatically such as by an operator inserting the words into the text using a wordprocessor. Alternately, it may be done automatically by a software subroutine which operates under a control algorithm to insert the distractor words at different places in the text. Following this, position data is generated corresponding to the words of the text, and stored as indicated at 65. Thus, for a software controlled system, i.e., one where the text will be displayed on a video terminal, information is generated which is used to control display of the text such that each word occurs at a predetermined and known position, which positions are then recorded. In particular this step involves recording or storing position data corresponding to the distractor words which were inserted at step 64 into the text. Alternately, for a system of the embodiment of FIG. 3, word data corresponding to the distractor words themselves may be stored, for later comparison with elided words, i. e. a word-to-word comparison as contrasted to a position comparison. Continuing with FIG. 4A, as illustrated at 66, the text is displayed, in any of the forms as has been discussed hereinabove. The method then entails waiting for the test taking, which is done by the student or person who actually takes the test. At this point, the manner of eliding is determined by the type of system being used, again as discussed above. After the test has been taken, at block 68 the system determines what data has been elided. This may be done either by determining the positions of elided data, or by determining the actual words that have been elided. In either event, the step embraces generating electronic signals representative of the elided data This electronic elide data is then compared with the distractor data that had been stored at 62 and/or 65, as illustrated at block 69. This comparison may be a position-to- position comparison, or a word-to-word comparison. It is preferably done automatically in accordance with conventional software technique. Following this comparison, a test score is computed at block 70, in accordance with any desired algorithm. For a Cloze-Edit test, the algorithm preferably includes a compilation of the number of distractor words correctly elided, as well as a compilation of the number of other text words which should not have been elided but which were elided by the student. For example, the test score may be computed by simple difference determination of the number of correctly elided words minus the number of incorrectly elided words. Other variations may be adopted within the scope of the invention. Referring now to FIG. 4B, there is indicated a flow diagram of a method which incorporates initial generation of a test, wherein the scoring is done on a position comparison basis. As indicated at block 74, the first step is to get the text data. Next, at 75, the distractor data corresponding to selected distractor words is obtained and stored. Following this, at 76, the distractor words are inserted into the text, in a manner as discussed above. Thus, following step 76, for an electronic embodiment there has been obtained stored data which can be sequentially read to provide the text to be presented to the test taker, the text having inserted therein the selected distractor words. Next, at block 77, the display positions of the text with the distractor words are determined. In other words, there is a determination of where, for example, the text will be displayed on a video terminal, i.e., where it will be placed on a row-by-row and word-by-word basis. The method then proceeds to generate display position data corresponding to the determined display positions and to record or store such data as indicated at block 78. Thus, electronic signals are generated which can be used to control display of the text such that all words, and particularly the distractor words, appear at predetermined known locations on the display. Thus, no matter what the display device, the method embraces presenting the display in a predetermined spatial manner, such that the system knows exactly where each word is located. Specifically, as indicated at block 79, the distractor word position data is stored for later use in scoring the test after the student has taken the test. As indicated at block 80, the text; the display position data; and the distractor position data are stored or recorded at block 80. This may suitably be done on magnetic tape, on a disk, or any type of cartridge which can conveniently be utilized for causing display of the test text, either on a video or like terminal, or on a printed sheet. The next step in the method of FIG. 4B is to actually display the test, under control of the data which has been recorded at block 80. Thus, a disk or cartridge, or PROM may be inserted into apparatus such as shown in FIG. 3, to cause the text to appear on the video terminal. Alternately, the stored data, such as on magnetic tape, can be used to cause printout of a test sheet. Then, at block 82, after the student or test taker has taken the test, the positions of the elided words are automatically determined. These elided word positions are compared with the distractor word positions that have been stored at block 79, and the test score is computed in any desired manner, as described above in the context of the method of FIG. 4A. Referring now to FIG. 4C, there is shown another block diagram of a method which incorporates generation of a Cloze-Elide test, and wherein the scoring is done by comparing distractor words with selected elided words, whether or not positions are compared. At block 88, the text words are obtained, and at block 90 the selected distractor words are obtained and stored. At block 91, the distractor words are inserted into the text in the manner as described above, and at block 93 the test is displayed, i.e. the full text with the inserted distractor words is displayed. Following this the student takes the test, and at block 95 the elided words are determined. For example, referring to FIG. 1B, data representative of the actual words that were crossed out is generated and held in storage. Then, at block 97, the elided word data is compared with the stored distractor words, and at block 98 the test score is computed. The above descriptions are applicable to either type of Cloze- Elide test as discussed herein, i.e. either Cloze-Edit or Maze. Also, as used herein, the term "word" includes both the idea of words as normally considered in the context of written language, and also includes alpha- numeric words. For example, the system and method of this invention may embrace mathematical texts, or texts which include other than conventional language texts. As set forth in the background section, a preferred embodiment incorporates language testing, and in particular second language testing, i.e., testing of a student in a foreign language.
The quest for a just education has, since the existence of education systems, been a part of humanity’s central concerns. The impetus for this is due to the fact that schools and many other institutions of learning exist as miniature societies which mirror that which happens in broader communities. Educationists have, in many ways, been preoccupied with the question of whether institutions of learning are engaged in the ‘undesirable’ process of reproducing inequalities. This has further resulted in the question of whether such inequalities are a by-product of systemic injustices or are mandated by our natural abilities (i.e. how the world is in and of itself). In this article, I provide a historical account of education in the context of apartheid and its legacies. I further argue that attempts to address distributive injustices are not subject to ‘extreme’ contestations, while attempts to unravel epistemic injustices are dominated by innumerable incongruities. Thus, I maintain that only knowledge that is rooted in mind-independent truth stands to liberate future citizens.
https://journals.uj.ac.za/index.php/The_Thinker/article/view/600
The cipher is based on Advanced Encryption Standard (AES) operating in counter mode, used for generating keys, and a 3-round version of Serpent for encrypting actual content. The Cascaded Cipher has not been subject to an open peer review process. A license for using the Cascaded Cipher is required from Intel Corporation. Serpent Algorithm, one of the most important proposed Algorithm for AES (Advanced encryption standard) which haven't been paid attention like Rijndael Algorithm but still it is considered as a The cipher is a Substitution-permutation network and uses two 4-bit S-boxes. The key selects which S-boxes are used. The key selects which S-boxes are used. A later Lucifer was a 16-round Feistel network , also on 128-bit blocks and 128-bit keys, described in (Sorkin, 1984). Implements the Serpent algorithm, a 128 bit block cipher with variable key length, designed R. Anderson, E. Biham, L. Knudsena. You should call Cipher.getInstance with the "Serpent" algorithm name to get a Cipher object for the Serpent cipher. You optionally may specify operation mode and padding scheme (the default operation mode used by the Serpent is a 32-round SP-network operating on four 32-bit words, thus giving a block size of 128 bits. All values used in the cipher are represented as bit- streams. The indices of the bits are counted from 0 to bit 31 in one 32-bit word, 0 to bit 127 in 128-bit blocks, 0 to bit 255 in 256-bit keys, and so on.
https://vpnizahf.web.app/olfers87541hize/serpent-cipher-jeh.html
Explore and develop initial concepts for a creative fashion collection through freehand drawing. Over 4-weeks, students learn the process of ideation, developing a means to convey ideas, sequencing creative exploration, thoughts, words, visuals from concept to final implementation. Through quick sketch and flat drawing techniques, they will create a cohesive and unified collection in the form of professionally illustrated hand-drawn technical flats. This workshop is ideal for students who are passionate about fashion design; it is open to all levels, including those with no prior knowledge. Notes: - This course does not provide certificate credit.
https://extension.otis.edu/search/publicCourseSearchDetails.do?method=load&courseId=1787478
The Fuqua on Board (FOB) program matches Duke MBA students with Durham area nonprofits to serve as non-voting board members. Over the course of a year-long apprenticeship, pairs of students work with a board mentor, participate in board meetings, attend relevant committee meetings and fulfill the responsibilities of an active board member. Students also complete a project designed to map directly onto improving board governance and functioning. Students serve as “board associates,” gaining valuable insight into the governance and inner workings of nonprofit organizations while providing the nonprofits with fresh perspectives and critical business skills. FOB provides training, coaching, and peer support throughout their board engagement. FOB is an extracurricular volunteer commitment. Students do not receive academic credit for their participation and commit 10-12 hours/month to FOB. Through FOB, students learn what makes boards effective and are prepared with skills to help them serve effectively on boards in the future. Benefits to Participating Organizations - Gain access to talented MBA students with business experience and fresh, innovative ideas - Help develop future community leaders - Strengthen relationships with the Duke Fuqua School of Business Eligibility Organizations participating in FOB must: - Be a nonprofit based in Durham, North Carolina - Have a reasonably stable governing board that meets monthly or bi-monthly (preference for monthly meetings) - Be willing to invite two students to participate in a non-voting role in board and committee meetings on a regular basis - Provide mentoring and supervision to students assigned to your board via a staff liaison and a board member “mentor” - Have a robust anti-discrimination or inclusivity policy that prohibits discrimination on the basis of marginalized identities Expectations - Appoint a board mentor AND a staff liaison. - Provide mentoring and supervision to your Associates (onboard them to your board and organization history/mission/vision, get to know them and their skillsets and desired learning objectives, etc). - Help to scope out a project that fits your needs and the students expectations and support them throughout it. - Provide feedback to improve the FOB program experience for all.
https://sites.duke.edu/fuquaonboard/for-nonprofit-partners/
Marine antifouling laboratory bioassays: an overview of their diversity. In aquatic environments, biofouling is a natural process of colonization of submerged surfaces, either living or artificial, involving a wide range of organisms from bacteria to invertebrates. Antifouling can be defined as preventing the attachment of organisms onto surfaces. This article reviews the laboratory bioassays that have been developed for studying the control of algae and invertebrates by epibiosis (chemical ecology) and the screening of new active compounds (natural products and biocides) to inhibit settlement or adhesion, ie fouling-release coatings. The assays utilize a range of organisms (mainly marine bacteria, diatoms, algae, barnacles). The main attributes of assays for micro- and macroorganisms are described in terms of their main characteristics and depending on the biological process assessed (growth, adhesion, toxicity, behavior). The validation of bioassays is also discussed.
Should the elderly re-test for their drivers licence? That's unfair, says AA There's no legal age at which you must stop driving. However, the driving ability of senior citizens has come into question following an incident where an elderly woman crashed car through restaurant window. It's reported that the 80-year-old woman apparently confused the accelerator and the brakes on her car and crashed through a window of the Spur restaurant in Jeffrey's Bay on Wednesday. Her Nissan Sentra ended up halfway through the massive window and into the Spur's play area for children. Image: Netwerk24. Automobile Association (AA) spokesperson Layton Beard says it is not right to discriminate against motorists based on their age or other demographics. Beard says a blanket regulation for all elderly people of a certain age may have damaging consequences. It's very dangerous to say that people over a specific age may not be allowed to drive legally.Layton Beard, Automobile Association spokesman He proposes that elderly people should instead be tested for their eyesight and ensure that they are still capable of driving their vehicle. Beard has encouraged families of the elderly to have ongoing discussions about their loved ones' driving ability. A few listeners also called in to share their opinions on the matter. I'm a 70-year-old driver... and I think I am fine and safe on the road. But I would welcome an independent test that reinforces my belief or proves me wrong.Ross, caller I actually got hit by a 93-year-old man when I was loading my vehicle about year and a half ago.Hugh, caller Take a listen:
http://www.702.co.za/articles/246795/should-the-elderly-re-test-for-their-drivers-licence-that-s-unfair-says-aa
Last Friday, the Office of Foreign Assets Control (OFAC) published more targeted guidance for digital asset companies related to compliance with sanctions and best practices for mitigating risks. This guide comes on the heels of OFAC’s first enforcement action against a cryptocurrency exchange, SUEX (which we discussed in our blog here). Given the rise of ransomware threats from malicious cyber-actors that are often linked to sanctioned countries and persons, the lack of very robust regulatory oversight of the virtual currency world, the emerging nature of the technologies, and the growth of the market, it is clear that OFAC hopes crypto companies will pay more attention to sanctions risks and compliance with the issuance of this guidance. While the guide covers a lot of familiar territory, we outline a few key takeaways below. What’s in the Guide and Why You Should Care At a high level, the guide reiterates OFAC’s 2019 guidance on sanctions compliance programs (found here) in the context of virtual currencies, including OFAC’s expectation that a company’s program should include, at a minimum: (1) management commitment; (2) risk assessments; (3) internal controls; (4) testing/auditing; and (5) training. Every company’s risk profile when it comes to sanctions varies. For virtual currency companies that have international users and where KYC and associated diligence is trickier than with other traditional financial institutions, having a risk-based sanctions compliance program will not only help you prevent and detect potential violations, but also mitigate penalties if you face enforcement. Because sanctions violations are essentially strict liability offenses, it is in every virtual currency company’s best interest to assess its risk and implement controls, especially in light of OFAC’s recent scrutiny of the virtual currency industry, the government beefing up its staff for enforcement, and, more broadly, the Administration’s interest in curtailing ransomware threats (see our post, here). For new companies dabbling in the virtual currency world, the guide recommends developing sanctions compliance during the beta testing stage so that compliance can be accounted for as the technology is being developed before its launch. Nuggets of Useful Information for the Virtual Currency Industry Though the guidance largely follows OFAC’s 2019 guidance provided to companies with international touchpoints, it does provide some nuggets of useful information for companies dealing in the virtual currency industry (e.g., technology companies, exchangers, administrators, miners, wallet providers, and other traditional financial institutions dealing with virtual currency). - Block Virtual Currency: U.S. persons holding virtual currency deemed to be blocked by OFAC regulations must deny all parties to that virtual currency. Notably, there is no need to convert the virtual currency to fiat currency or put it in an interest-bearing account. Blocked virtual currency must be reported to OFAC within 10 business days, and thereafter on an annual basis, so long as the virtual currency remains blocked. - Screen Internet Protocol (IP) Addresses: Companies should screen for IP addresses that originate in sanctioned jurisdictions and block any users there. The guide notes OFAC’s settlement with a company that did not prevent its services from being used by individuals with IP addresses located in sanctioned jurisdictions. - Use Geolocation Tools: Geolocation tools enable companies to identify IP addresses that may originate in sanctioned jurisdictions. This can help companies prevent persons in sanctioned jurisdictions to access their platform and services. Other analytic tools can recognize IP misattribution by identifying users who may be hiding behind a different IP address (i.e. VPN users). - Screen for Virtual Currency Addresses Listed on SDN List: In 2018, OFAC began listing virtual currency addresses on the SDN list. The guide encourages companies to screen for such addresses when screening SDNs and block any related transaction. Unlisted virtual currency addresses that share a “wallet” with a listed virtual currency address may also pose a sanctions risk and further diligence may be needed to ensure that the transaction does not involve an SDN. Co-author Jonathan Wang is a law clerk in Sheppard Mullin’s Washington, D.C. office.
https://www.natlawreview.com/article/sanctions-compliance-crypto-ofac-issues-guidance-targeting-virtual-currency-industry
The potential for fraud is a major hurdle in the evolution and growth of online commerce. E-payment and e-banking services -- the focus of this book -- suffer substantially from public mistrust. Given the growth of online ID theft, many OECD member countries have taken steps to ensure that consumers and Internet users are adequately protected. These steps encompass various measures: consumer and user-awareness campaigns, new legislative frameworks, private-public partnerships, and industry-led initiatives focused on technical responses. The purpose of this book is threefold: Executive Summary Part I. The Scope of Online Identity Theft Chapter 1. The Problem Posed by Online Identity Theft A new Internet landscape | What is identity theft? | ID theft’s main elements Chapter 2. Online Identity Theft: Tools of the Trade ID theft based solely on malware | Key drivers of online ID theft: Phishing and its variants | Phishing techniques | Phishing evolution and trends | What online ID thieves do with the data: credit card fraud and other abuses Chapter 3. The Impact of Online Identity Theft Defining the victims | Victims’ direct and indirect losses | Are there more victims off line than on line? | Remediation tools for victims Part II. Addressing Online Identity Theft Chapter 4. The Role of Government How OECD countries currently define ID theft | The option of criminalising ID theft | Public education and awareness campaigns | Annex: ID Theft - Education and Government Initiatives in OECD Countries | Annex: United States Initiatives to Combat Identity Theft Chapter 5. Private Sector Initiatives: What Role for Industry and Internet Service Providers? A serious private-sector threat | Annex: Private-Sector Initiatives to Educate Consumers about ID Theft Chapter 6. International, Bilateral and Regional Initiatives International organisations | International informal networks | Annex: Multilateral Instruments Addressing Online ID Theft | Annex: United Nations Study on Identity Fraud Chapter 7. Online Identity Theft: What Can Be Done? Enhancing education and awareness | Dissemination of information | Co-ordination of education initiatives | Authentication and data security | Electronic authentication | Areas for further work Chapter 8. Conclusions and Recommendations Part III. OECD Policy Guidance on Online Identity Theft Introduction | Ways that education and awareness could be enhanced to prevent online ID theft | Data security | Electronic authentication | Further work Glossary Bibliography How to obtain this publication Readers can access the full version of this book choosing from the following options:
https://www.oecd.org/sti/ieconomy/onlineidentitytheft.htm
A HOUSE on Hill Road in Stanhope went up in smoke earlier this month, but it was all for a good cause. It was ignited for training purposes and gave local firefighting crew the chance to test and hone their skills in a controlled environment. Twelve members from Stanhope Fire Brigade, eight from Girgarre and two members from Echuca Fire Brigade took part in the exercise. The structure, a derelict empty house, was donated by the couple who own the property who said it was no longer needed. Instead of having it demolished they were happy to see CFA use it for educational purposes. "It was an extremely controlled environment, so as we could use it to learn," Stanhope Fire Brigade captain Chris Dent said. "Everyone was so keen to be a part of the opportunity. We made the exercise as practical as possible and had lots of younger members get involved – which was great for the development of their situational awareness." Prior to the burn, members of Stanhope Fire Brigade spent countless hours preparing for the exercise. The whole process took about 18 months from the application request to the lighting of the match, and members worked tirelessly to ensure the process was done properly. The house took just 13 minutes from initial lighting until structural collapse of the roof, a timely reminder to everyone of how important smoke detectors are in homes. "The main focus of the day was to show people how quickly a fire can develop," Mr Dent said. As well as developing structural firefighting skills, the exercise gave fireys the chance to conduct skills maintenance on the new breathing apparatus (BA), which have been used since December 2018 around Victoria. Echuca Fire Brigade members used their new support vehicle, and were on scene to assist with BA cylinders, a BA control point and act as an incident control point. "Forcible entry was a big focus as it’s something we don't get many opportunities to practice," Mr Dent said. "Our volunteers were able to have a go, practice their techniques and all benefited from the training."
https://www.benallaensign.com.au/kyabram-news/2019/08/23/770640/firey-training-heats-up-in-stanhope
What are fixed resistors? The electrical behavior of a resistor obeys Ohm’s law for a constant resistance; however, some resistances are sensitive to heat, light or other variables. Resistors can have a fixed resistance value, or they can be made variable or adjustable within a certain range The fixed resistance is an electrical component designed to introduce a known resistance value in a circuit. Resistors are often made of carbon chips or thin films of carbon or other resistant materials. Types of fixed value resistor Carbon Composition Resistors: The carbon composition resistors consist of a solid cylindrical resistive element with embedded wire cables or metal caps to which the lead wires are attached. The body of the resistance is protected with paint or plastic. The resistive element is made of a mixture of finely ground carbon (powder) and an insulating material (usually ceramic). A resin keeps the mixture together. The conductive path is from particle to particle, each of which touches another along the trajectory. Carbon Film Resistors: A carbon film is deposited on an insulating substrate and a helix is cut to create a long and narrow resistive path. Variable shapes, together with carbon resistivity (ranging between 90 and 400 nΩ m) can provide a variety of resistances Carbon film resistors have a power range of 0.125 W at 5 W at 70 ° C. Available resistors range from 1 ohm to 10 M Metal Film Resistors: The introduction of metal film technologies brought significant reductions in the size of the resistance and noise. The metallic film resistors are manufactured by the evaporation or sputtering of a layer of nickel chromium on a ceramic substrate. The thickness of the layer depends on the value and varies from 10 Angstroms to 500 Angstroms in thickness. The thicker this layer is (the lower the value), the less noise is inserted. There are resistances that resemble the types of metallic films, but they are made of metal oxides such as tin oxide. This results in a higher operating temperature and greater stability / reliability than the metal film. They are used in applications with high resistance demands. Wire-wound resistors: The winding resistors are made of alloys similar to those used in the sheet resistors, which are described below. As a result, the only noise insertion caused by these devices comes from the tabs used to connect the thin wire to the thick outer wires. Due to the very high surface temperature, these resistances can withstand temperatures up to +450 ° C The types with aluminum housing are designed to be connected to a heat sink to dissipate heat; the rated power depends on use with a suitable heat sink, for example, a resistor with a power of 50 W will overheat a fraction of the power dissipation if it is not used with a heat sink. Large winding resistors can have a nominal capacity of 1,000 watts or more. The applications of winding resistors are similar to those of composition resistors, with the exception of high frequency. A typical noise index is -38 dB. The high frequency of wire resistances is substantially worse than that of a composition resistance which is the main objection Foil Resistors: The main resistance element of a sheet resistance is a special alloy sheet several micrometers thick. The aluminum resistors have had the best precision and stability of all the available resistors. One of the important parameters that influence stability is the resistance temperature coefficient (TCR). The TCR of sheet resistances is extremely low and has been further improved over the years. A range of ultra-precision sheet resistors offers a TCR of 0.14 ppm / ° C, tolerance ± 0.005%,
https://automationforum.co/what-are-fixed-resistors-types-of-fixed-value-resistors/
Synopsis: An imaginative tour de force, A Dream Under the Southern Bough: Existence is the final installation of this fantastical tale of love and dreams by Singaporean company, Toy Factory Productions Ltd. Written more than 400 years ago, A Dream Under the Southern Bough is renowned Ming Dynasty writer Tang Xianzu's play about naval officer Chun Yu Fen, who plunges into a dream world he never knew existed, after falling asleep under a bough tree. Ambitiously adapted for the contemporary stage, A Dream Under the Southern Bough: Existence is the triumphant culmination of an epic trilogy by Singapore's leading bilingual theatre company, Toy Factory Productions Ltd. Depicting an extravagant dream across two decades, reminisce the wonders of The Beginning, and the heady beauty of Reverie, as Existence unfolds with all its bold and ambitious glory. Chun Yu Fen is now living the perfect life in the Ant Kingdom. He excels in governing the Southern Bough and lives blissfully with his wife, the Kingdom's princess and their children. But trouble soon arrives in paradise, as a series of tragic events threaten to unravel everything he loves – the arrival of a romantic rival, a violent invasion, the loss of his troops in crossfire, and the death of his wife. Disillusioned and heartbroken, Chun drowns himself in work and drunken merry-making. But his indulgences soon take their toll. As Chun neglects his official duties, much to the chagrin of the King, he finds himself banished from the Ant Kingdom. As dream and reality collide, Chun abruptly wakes up from his twenty-year dream to discover time has barely passed. Retracing the paths he crossed decades ago, he realises dreams are but a mere reflection of reality – a broken world filled with love, sorrow and calamity. Despite the passage of a mere few minutes, Chun realises he has spent an entire lifetime in his slumber, traversing the blurred lines between dreams and reality...
https://artsrepublic.sg/events/2020/05/a-dream-under-the-southern-bough-existence
The NDC Code 25021-174-16 is assigned to a package of 10 vial in 1 carton > 10 ml in 1 vial of Daptomycin, a human prescription drug labeled by Sagent Pharmaceuticals. The product's dosage form is injection, powder, lyophilized, for solution and is administered via intravenous form. NDC Code Structure - 25021 - Sagent Pharmaceuticals - 25021-174 - Daptomycin - 25021-174-16 - 10 VIAL in 1 CARTON - 25021-174 - Daptomycin The NDC Directory contains ONLY information on final marketed drugs submitted to FDA electronically by labelers. A labeler might be a manufacturer, re-packager or re-labeler. The product information included in the NDC directory does not indicate that FDA has verified the information provided by the product labeler. Assigned NDC numbers are not in any way an indication of FDA approval of the product. * Please review the disclaimer below. NDC HCPCS Crosswalk This crosswalk is intended to help the public understand which drug products (identified by NDCs) are assigned to which HCPCS billing codes. NDC 25021-174-16 HCPCS crosswalk information with package details and bill units information. |NDC Billing Code||HCPCS Code||HCPCS Code Desc.||Dosage||Package Size||Package Quantity||Billable Units||Billable Units / Pkg| |25021017416||J0878||Daptomycin injection||1 MG||1||10||500||5000| * Please review the disclaimer below. Other Product Packages The following packages are also available for Daptomycin with product NDC 25021-174. |NDC Package Code||Package Description| |25021-174-15||1 VIAL in 1 CARTON > 10 mL in 1 VIAL| * Please review the disclaimer below.
https://ndclist.com/ndc/25021-174/package/25021-174-16
FIELD OF THE INVENTION The invention relates to a monitoring system for monitoring the discharging period of the charging/discharging cycles of a rechargeable battery to form a smart battery. The invention likewise relates to a host device which includes a smart battery. The invention finds its application in the field of modular apparatus equipped with a rechargeable battery such as, for example: private or professional cellular telephones, cordless tools, portable computers, toys, etc. A smart battery is generally understood to mean a rechargeable battery coupled to a system that monitors its state of charge. This system comprises means for collecting data on the state of charge of the battery and means for producing calculated predictive information signals relating to the discharging conditions in the future. A technical problem posed when predictive information signals about the discharging conditions in the future are determined for a rechargeable battery depends on the variability of the manufacturing parameters of the battery and on the variability of the habits of the user of the host device. The individual variability of the manufacturing parameters of the battery is due to the spreading of the structure data during manufacturing for the same type of battery. The variability of the user habits leads to improper use which may damage the battery and affect the later recharging possibilities. These habits of improper use comprise charging for too long a lapse of time, or frequent recharging of a battery that is hardly discharged. Another technical problem also depends on the fact that the current applications of the rechargeable batteries require very high precision relating to the amount of energy available at a given instant. BACKGROUND OF THE INVENTION A system for monitoring the state of charge of a battery, utilizing a neural network, is already known from the publication entitled "NEURAL NETWORK, A PROPER APPROACH TO THE ENERGY MANAGEMENT PROBLEM", by MARCUS STOLL IN "10TH EUROPEAN PHOTOVOLTAIC SOLAR ENERGY CONFERENCE", 8-10 Apr. 1991, LISBON. PORTUGAL, pages 427-430. The cited publication describes the use of a neural network for undertaking the task of estimating the state of charge (SOC) of a lead- acid battery in a recharging system (RES). According to the cited document, determining the state of charge (SOC) is an important task that is to be carried out to monitor the energy level of a battery. More particularly, the estimation of the state of charge makes it possible to plan the use of the renewable energy, to optimize the conditions of use of a host device, and to make decisions concerning the various periods of the charging/discharging cycles of the battery. A neural network is involved in estimating the state of charge (SOC) via a data base. To reduce the cost, the neural network is involved in only a small part of the discharging domain of the battery. As the discharge current is very small during most of the time, the involvement of the neural network lies in this domain. In the learning period of the neural network a data base is used including the discharge current, the discharge voltage and the state of charge under standard conditions of use, that is to say, at a fixed temperature of 20° C. and with a fixed current. In addition, this data base may include information relating to discharging cycles and to what degree the discharge has taken place and relating to the average temperature of the battery. The various batches of these data, which form input vectors, are applied to the neural network to inform the network of the discharging behavior of the batteries. The neural network is arranged for a suitable representation of the behavior of the battery. In the classification period of the neural network, only the discharge current and voltage are applied thereto and it produces on its output the corresponding state of charge of the battery. A problem which results from the use of the known system is that this system is unable to predict forthwith the lapse of time that is left before a critical discharge voltage threshold is reached. Another problem which results from the use of the known system is that the data corresponding to the number of previous charging/discharging cycles and to the degree of discharge in these cycles, cannot be correctly taken into account. Indeed, these data are highly variable as a function of the actual use that is made of the battery during operation, and largely influence the real state of charge present in the battery at a given instant of a discharging cycle, whereas in the known system of the cited document the weights of the neural network are ultimately fixed from the end of the learning period onwards. SUMMARY OF THE INVENTION It is an object of the present invention to provide a system for monitoring the discharging period of the battery charging/discharging cycles of a rechargeable battery which produces predictive information relating to the instant at which a predetermined critical threshold of the battery discharge voltage will be reached and, more particularly, produces predictive information relating to the remaining lapse of time that is left from each current instant of use onwards until the instant at which this predetermined critical threshold of discharge voltage will be reached. It is an object of the present invention to provide a system for monitoring the discharging period of the battery charging/discharging cycles which produces such predictive information that automatically adapts itself to new voltage data which vary with each discharging period of the battery as a function of the number of charging/discharging cycles already effected previously and as a function of an average behavior of the type of the respective battery. These problems are resolved by a monitoring system for monitoring the discharging period of the charging/discharging cycles of a battery coupled to a rechargeable battery having charging periods alternating with discharging periods according to charging/discharging cycles, this system comprising: first adaptive calculation means which are arranged for collecting, at an initial instant at the beginning of a discharging period of a charging/discharging cycle of the battery, a predetermined value of a critical discharge voltage threshold, and for calculating and providing a predictive indication of a critical instant at which the battery will reach this critical, predetermined discharge voltage threshold, second adaptive calculation means coupled to the first calculation means, which are arranged for collecting, at the initial instant, a measured value of an initial voltage, of an initial variation of the voltage at a later instant after a short lapse of time starting from this initial instant onwards, and of the initial number of charging/discharging cycles of this battery effected before this initial instant, and arranged for calculating and producing from the instant of said discharging period at which the initial values are available onwards, operating parameters which are automatically adapted to the values of the initial measurements to be imposed on the first calculation means. These problems are particularly resolved by a system such as defined previously, in which the first adaptive calculation means are also arranged for collecting, at a current instant during the respective discharging period of the charging/discharging cycle of the battery in operation, a temperature measurement, and for calculating and providing at this current instant a predictive indication of a critical instant at which the battery will reach the predetermined critical discharge voltage threshold. These problems are particularly resolved by either one of the two above monitoring systems, in which the first adaptive calculation means are also arranged for calculating and providing at each current instant a predictive indication of the lapse of time that is left from this current instant onwards till the instant at which the battery will reach the predetermined critical discharge voltage threshold. In a particular embodiment, these problems are resolved by a monitoring system as defined previously, in which the first and second adaptive calculation means are formed by, respectively: a first neural network arranged for calculating and providing at each current instant a predictive indication of the lapse of time that is left from this current instant onwards till the critical instant at which the battery will reach this predetermined critical discharge voltage threshold, on the basis of the predetermined critical discharge voltage threshold and on the basis of the temperature measurement, a second neural network, combined in series with the first neural network, arranged for calculating and providing automatically adapted synaptic weights to be imposed on the first neural network, on the basis of the initial measurement of the voltage values, of the initial voltage variation and of the initial number of cycles, with each start of a discharging period of each discharging cycle, from the instant of the respective period onwards at which the initial measurements are available. In another particular embodiment, these problems are resolved by a monitoring system as defined previously in which the first and second adaptive calculation means are respectively formed by: a first neural network arranged for calculating and providing at each current instant a predictive indication of the lapse of time that is left from this current instant onwards till the critical instant at which the battery will reach this predetermined critical discharge voltage threshold on the basis of the predetermined critical discharge voltage threshold and on the basis of the temperature measurement, a second neural network, combined in series with the first neural network, arranged for calculating and providing automatically adapted synaptic weights to be imposed on the first neural network, on the basis of the initial measurement of the voltage values, of the initial voltage variation and of the initial number of cycles, with each start of a discharging period of each discharging cycle, from the instant of the respective period onwards at which the initial measurements are available. The advantage of this monitoring system in either one of these two embodiments is that the predictive indications are adapted to the individual charging/discharging characteristics of the battery to which this monitoring system is coupled for a given type of battery; that these predictive indications are very precise and very reliable and that they relate to a measurement which permits the user of operating a host device that comprises such a "smart" battery in the best conditions of use. In a mode of application of the invention, such a predictive and adaptive monitoring system is coupled to a host system and within this host system the monitoring system is coupled to a rechargeable battery, to time measuring means, voltage measuring means, possibly temperature measuring means, and to display means arranged for providing either an indication of the critical instant at which the battery will reach the critical voltage threshold, or an indication of the lapse of time that is left from a current instant of use onwards till the instant at which the battery will reach a predetermined critical voltage threshold, or the two indications, this monitoring system comprising a microprocessor for carrying out the calculations, and memory areas for storing the data, these memory areas being accessible via the microprocessor and including a ROM memory area for storing the structure data of the neural networks, the fixed parameters and the synaptic coefficients of the second neural network, and a RAM memory area for recording or producing the variable measurements and the synaptic coefficients of the first neural network. The advantage of this system is that it is simple to use. The host device coupled to this system performs particularly well. BRIEF DESCRIPTION OF THE DRAWINGS The invention is described in more detail with reference to the accompanying drawings, of which FIG. 1A represents a first monitoring system for a rechargeable battery to form an overall system called smart battery, and FIG. 1B represents a second monitoring system for a rechargeable battery, to form a smart battery; FIG. 2A represents a first neural network NN1A for the first monitoring system, and FIG. 2B represents a second neural network NN2A for this first monitoring system; FIG. 3A represents a first neural network NN1B for a second monitoring system, and FIG. 3B represents a second neural network NN2B for the second monitoring system; FIG. 4A represents a curve of the discharge voltage of a battery plotted against time; FIG. 4B represents a discharging time curve of a battery plotted against the discharge voltage; FIG. 4C represents a curve of the average discharging time of a battery plotted against the number of charging/discharging cycles; FIG. 4D represents discharging time curves of a battery plotted against voltage and against temperature; FIG. 5A represents the elements for operating a monitoring system; and FIG. 5B represents a monitoring system in a host system; FIG. 6A represents the structure of a neural cell of the hidden layer of the first neural network NN1A of the first monitoring system; and FIG. 6B represents the structure of the neural output cell of this same network NN1A. DESCRIPTION OF PREFERRED EMBODIMENTS With reference to FIG. 5B of which the legend is stated in Table II, a monitoring system 100 is coupled to a rechargeable battery 110 to form a total system called smart battery 120. This rechargeable battery has charging periods alternating with discharging periods in charging/discharging cycles. This smart battery 120 is coupled to, or incorporated in, a host device 130 which comprises battery measuring means 140 for giving the user an indication of an instant t.sub.TH in a discharging period at which the battery voltage will reach a predetermined critical voltage threshold V.sub.TH and, more particularly, an indication of the lapse of time &Dgr;T.sub.TH that is left before a predetermined critical discharge voltage threshold V.sub.TH will be reached, or the two indications. With reference to FIG. 5A of which the legend is stated in Table I, the monitoring system 100 is coupled to time measuring means 150a, battery voltage measuring means 150b, and possibly to temperature measuring means 150c, and to charging/discharging cycle means 160 which effect the augmentation of the number of charging/discharging cycles which the battery accommodated in the host device 130 undergoes. With reference to FIGS. 1A and 1B, the monitoring system 100 obtains, on the one hand, values called initial values at an instant called initial instant to, which coincides with the very beginning of a discharging period of the battery in a charging/discharging cycle. These initial values are: Vo the battery voltage, Vo thus being called initial battery voltage at this initial instant to; &Dgr;Vo the variation of the battery voltage also called initial voltage variation, measured during a first lapse of time &Dgr; to which is very short, in which the battery is used between the initial instant to and a later instant t'o=&Dgr;to+&Dgr;to right at the beginning of the respective discharging period; No the number of charging/discharging cycles of the battery already effected prior to the respective initial instant to; No may be equal to 0 (zero) as required, if the considered cycle is the first using cycle of the battery, new and never having been recharged. This system 100 may collect, on the other hand, instantaneous values at each successive current instant t of this discharging period. These instantaneous values are: Vt the battery voltage at this current instant t. The system 100 may possibly collect at each instant t: Tt the temperature of the battery. With reference to FIGS. 1A and 1B, embodiments of a system 100 for monitoring the charging state of a rechargeable battery will be described below. The monitoring system 100 in essence comprises first and second coupled adaptive and predictive calculation means NN1A and NN2A, or NN1B and NN2B, for providing, on the basis of initial voltage values Vo, . DELTA.Vo, No, and on the basis of a critical voltage threshold V.sub.TH, and possibly on the basis of the instantaneous value Tt measured in a discharging period, the predictive indication of an instant called critical instant t.sub.TH at which, in the same discharging period, the battery voltage will reach this critical threshold V.sub.TH, and more specifically, a predictive indication of the lapse of time &Dgr;t.sub. TH that is still left before this critical discharge voltage threshold V. sub.TH is reached, this threshold being predetermined so that before the battery voltage reaches this threshold V.sub.TH, the host system 130 has operating energy that is precisely known and is situated in a certain range where this energy is correctly adapted to the operation of the host device 130. EXAMPLE I As is shown in FIG. 1A, in a first embodiment, the first and second adaptive and predictive calculation means of the monitoring system 100 are formed, respectively, by a first neural network referenced NN1A, and a second neural network referenced NN2A combined in series with the first neural network NN1A. In the description that follows, a discharging period commencing at an instant to in a charging/discharging cycle is considered first; and a predetermined critical discharge voltage threshold V.sub.TH is fixed. The first neural network NN1A has an input for: the voltage V.sub.TH which forms the predetermined critical threshold, and has an output for producing at each current instant t, for example, every minute: the instant t.sub.TH at which this predetermined critical voltage threshold V.sub.TH is reached. With reference to FIG. 5A of which the legend is stated in Table I, the first neural network NN1A is coupled to time measuring means 150a which produce a measurement of each current instant t, and is coupled to the calculator 160 which produces as a difference between the current instant t and the calculated value of the instant t.sub.TH : a value &Dgr;t.sub.TH of the lapse of time that is left until the predetermined critical discharge voltage threshold V.sub.TH is reached, in the case where the host device 130 is in normal operation, and where the battery 110 is discharged in normal fashion because of this operation. There are thirteen synaptic coefficients or weights of this first neural network NN1A and they are referenced WjA where j is an index running from 1 to 13. They are calculated and produced automatically at each current instant t during this discharging period by the second neural network NN2A. The second neural network NN2A has three inputs for: Vo the initial voltage measured at the initial instant to of the discharging period, &Dgr;Vo the initial variation at an instant to' positioned after a short lapse of time &Dgr;to reckoned after the initial instant to, for example, 1 minute, No the initial number of cycles, and now has thirteen inputs for thirteen weights WjA automatically transmitted to the first neural network NN1A at each current instant t. Each of the neural networks NN1A and NN2A is to be organized (or arranged) for bringing these calculations to a successful issue. With this object in view, each of them is subjected to a learning procedure and to a test procedure called learning periods during which periods their synaptic coefficients are determined and, in certain cases, fixed. Learning Procedure of the Neural Networks The task of the first neural network NN1A is to learn discharging curve models. This learning makes it possible to form a relation between the battery discharge voltage denoted Vt and the current instant t at which the battery reaches this voltage Vt. The first neural network NN1A is to form, during its learning period, functions Fw which resolve the relation (1a): t=Fw(Vt) (1a) where w assigned to F symbolizes the fact that the function F is linked with the weights WjA, or synaptic coefficients, of the first neural network NN1A. The neural network NN1A has been formed to generate a non- linear function Fw. With reference to FIG. 2A, the first neural network NN1A comprises: an input layer formed by two neural cells which include a first neural cell NEO for inputting a threshold voltage selected to be -1, and a second neural cell EC1 for inputting the voltage value Vt at the instant t, a hidden layer of five neural cells which include a first hidden neural cell NCO for inputting a threshold value selected to be -1, and four hidden neural cells denoted NC1 to NC4, and an output layer which has a sole neural cell denoted NS. Thus, there is observed that, during the learning procedure of the first neural network NN1A, its input EC1 receives an instantaneous voltage value Vt, whereas this same input receives the value of the critical voltage threshold V.sub.TH during current use. The structure and the operation equation of each hidden neural network, denoted NC1 to NC4, are cells of a formel (standard) neuron, and are illustrated by FIG. 6A which shows the hidden cell NC1 by way of example. Each given hidden neuron NCi receives on the input the voltage Vt with an input weight or input synaptic coefficient which is one of the thirteen weights referenced WjA, and also receives a threshold which has the constant "-1" as its value, bearing another one of the thirteen weights referenced WjA. The index "i" is the index 1 to 4 of the respective hidden neural cell NC1 to NC4. Each hidden neuron NCi produces a weighted sum denoted &Sgr; of the inputs bearing one of the thirteen weights WjA and calculates an intermediate output signal Ei(Vt). Each hidden neuron NC1 to NC4 transfers this intermediate output signal Ei(Vt) via an activation function denoted Si and calculates an output signal denoted Si(Vt) in accordance with the relation (2a): Si(Vt)=Si[Ei(Vt)] (2a) The activation function Si(Vt) of each hidden neuron thus remains to be defined better. As a possible activation function may only be adopted a function selected from the set of the non-linear functions. The activation function Si is preferably a sigmoidal function "tanh", equal to the tangential hyperbolic function which is well adapted to the form of the discharging curves to be made, as will be shown later. In the hidden layer, the 4 neural cells CN1 to CN4 thus show in the described example a non-linear function "tanh". The structure of the sole output neuron NS is illustrated by FIG. 6B. A weighted sum is realized, denoted &Sgr;, of the output signals Si(Vt) of all the hidden neurons NCi, by utilizing synaptic coefficients WjA, to which sum is added the value of a "-1" threshold coming from the hidden cell NC0, this threshold value being introduced in the output neuron NS via one of the synaptic coefficients WjA. This output neuron thus first produces the weighted sum &Sgr; which gives an intermediate output signal Es(Vt). Then, the neuron of output NS transfers this intermediate output signal Es(Vt) via an activation function denoted Ls, and calculates a final output signal denoted Fw(Vt) according to the relation (3a): Fw(Vt)=Ls[Es(Vt)] (3a) The activation function Ls of this output neuron is selected linearly. The output signal of the output neuron is the function Fw one seeks to generate. The notations of the weights of each hidden neuron NCi are indicated in FIG. 2A as are the notations of the input weights of the output neuron NS. The set of these weights denoted W1A to W13A is formed by the set of the thirteen weights WjA transmitted by the second neural network NN2A. With reference to FIG. 4A, a conventional discharging curve of a nickel-cadmium battery taken by way of example shows the voltage Vt in volts plotted against time t in minutes. This curve shows a steep slope in the first operating period of the battery, for example, the 100 first minutes, followed by a slight slope between 100 and 500 minutes of use, and finally again a steep slope beyond the 500 minutes. Of course it will be evident that this discharging curve is given totally by way of example. But, in the present system it will be recollected that the first neural network NN1A is to undergo a learning period which leads to providing a time t which is a function Fw of the voltage Vt of the battery. Therefore, an example of a discharging curve which is interesting for the present description is shown in FIG. 4B. This curve shows the time t plotted against the battery voltage Vt. This curve of FIG. 4B is simply plotted by bringing the values which were on the time axis in FIG. 4A to the Y-axis in FIG. 4B; and by bringing the values which were on the Y- axis in FIG. 4A to the time axis in FIG. 4B. It may be found that this discharging curve has a form approaching the form of a curve "tanh". Therefore, the functions of the sigmoidal type are preferred for realizing the activating functions in the neurons of the hidden layer. FIG. 4B thus shows a discharging curve giving the time t in minutes plotted against the voltage Vt in volts, which shows substantially flat end parts and a central part which has a steep slope. Therefore, the central part of the discharging curves of the relation (1a) is modelled by the two first neural cells CN1, CN2 of the hidden layer, of which the activating functions have a steep slope; whereas the end parts of these curves are modelled by the following hidden neural cells CN3, CN4 which show an activating function which has a less steep slope. The presence of hidden cells which have activating functions and show slopes which are considerably different amounts to specifying each hidden cell when predetermined different tasks are executed. It will be clear that the neural network NN1A could learn the task of producing the function Fw with the same level of performance, without this specifying. But, according to the invention, it has been found that the learning period of the neural network NN1A is found to be considerably shorter because each cell is dedicated to a predetermined task. The slopes of the activating functions Si of the hidden cells NC1, NC2 may be, for example, 7,0, and the slopes of the activating functions of the following hidden cells NC2 A, NC4 A may be, for example, 2,0. For the learning period of the first neural network NN1A, curves of discharging time t plotted against the discharge voltage V(t) are recorded, for example, every minute for a large number N of discharging cycles, and for a large number of batteries 110 of the same type, for example, nickel-cadmium batteries. In an example, 20 batteries are used and undergo 140 charging/discharging cycles. A charging period lasts sixteen hours. A battery is considered fully charged when its voltage Vo=9V, and is considered to have reached the critical discharging threshold when its voltage reaches V.sub.TH =6V. By this method, 20×140=2800 discharging curves are recorded, so that each curve produces 1600 points. Each curve shows a different network NN1A. Thus, in the learning period, 2800 networks are initialized, that is to say, one network per curve. In each curve, for example, half of the points, that is to say, 800 points, are used for the learning of the corresponding neural network and, the other half of the points, that is to say, 800 other points, are used for testing said neural network. At the start of this learning period, which comprises the learning period and the tests, the thirteen weights WjA of each of the 2800 neural networks NN1A are stored in a RAM memory area. The RAM is referenced 170b in FIG. 5B. On the basis thereof, the values of the batches of thirteen weights WjA in the memory will form a data base for the learning of the second neural network NN2A. The task of the second neural network NN2A is to learn a relation between parameters which depend on the battery discharge voltage. Thus, the second neural network NN2A receives: No the previous number of cycles, Vo the first recorded voltage of a given discharging curve, and &Dgr;Vo the slope at the start of this discharging curve, and is to be capable of calculating, on the basis of these measurements, the thirteen weights WjA necessary for the operation of the first neural network NN1B. This relation is expressed by the function G of the relation (4a): WjA=G(Vo,&Dgr;Vo,No) (4a) With reference to FIG. 2B, the structure of the second neural network NN2A is dictated by its task. This neural network NN2A comprises: in input layer having three input cells NE1, NE2, NE3, for the values Vo, &Dgr;Vo and No, plus an input cell NEO for a threshold of - 1; thirteen output cells NS1 to NS13 for each of the thirteen weights WjB to be calculated; a single hidden layer having eight hidden neural cells denoted NC1 to NC8, plus a hidden cell NCO for a threshold of -1. According to the invention, the inputs formed by the initial values Vo and &Dgr;Vo have been specifically chosen, because it has appeared that they were the values that were most sensitive to the characteristics of the battery. The third input formed by the initial number No of cycles has also been specifically chosen, because this input makes it possible to take an aging effect of the battery into account, because the more a battery is subjected to charging/discharging cycles, the shorter its useful life will be, that is to say, the less the effect of recharging will be effective and the faster the discharging will be. This effect of aging is shown by FIG. 4C which shows the average discharging period t. sub.TH for reaching the critical threshold V.sub.TH from the initial instant to plotted against the initial number of cycles No. The synaptic coefficients or weights, referenced Wn2A of this second neural network are fixed during its learning period and are stored in the ROM memory area 170a represented in FIG. 5B. Attempts applied to the neural network NN2A have shown that such a network having 8 hidden cells, which has for its function to activate a non-linear tangential hyperbolic function "tanh" is capable of properly managing the task assigned thereto. It should be noted that if the difference of the output cell NS of the first neural network occurs, the output cells denoted NS1 to NS13 of the second neural network NN2A have a non-linear activating function, preferably "tanh". Like the first neural network NN1A, this second neural network NN2A has hidden cells of which the slope of the sigmoidal activating function differs from one cell to another. This embodiment makes it possible not to use a large number of hidden cells. Thus, the second neural network is entailed in that 1400 vectors are used having thirteen weight values generated via the learning of the first neural network by means of the 2800 recorded curves, and the 1400 other generated vectors are used for the tests. The test procedure is realized in the following manner: for the 1400 vectors that do not belong to the learning batch, the corresponding initial values Vo, &Dgr;Vo and No are applied to the inputs of the second neural network. This network calculates an output vector of thirteen weight values WjB as this network has been caused to calculate. Following this test procedure, these thirteen weight values are imposed on a neural network NN1A, at the same time as the predetermined critical discharge voltage value V.sub.TH =6 volts is applied to its input EC1. This first neural network NN1A thus calculates the predictive value automatically adapted to the discharging time t.sub.TH which is compared with that of the test curve. Modes of Operation of the Rechargeable-Battery Monitoring System The monitoring system 100 has two modes of operation called starting mode and current use mode. The starting mode is utilized each time when the battery 110 has terminated a charging or recharging procedure and when it thus starts being discharged. The moment the battery 10 is put in operation, the initial voltage Vo is recorded forthwith. Then, at the instant t'o, after a very short lapse of time to-t'o=&Dgr;to has passed, preferably exactly 1 minute, the battery voltage is again recorded yielding a value denoted V'o, and the difference of initial voltage Vo-V'o=&Dgr;Vo is calculated, for example, by the calculator 160 shown in FIGS. 5A and 5B. Then, the two values Vo and &Dgr;Vo, at the same time as the initial number No of cycles that have already taken place, which number is calculated in that the calculator 160 is incremented, are applied to the input of the second neural network NN2A which then calculates the vector of 13 weight values WjA to be applied to the first neural network NN1A. The current use mode is utilized during the discharging period itself. In this current use mode the voltage Vt need not be measured. The input EC1 of the first neural network NN1A receives the voltage V. sub.TH =6V. The lapse of time left &Dgr;t.sub.TH before the battery reaches this predetermined critical voltage threshold is then calculated as a difference between an instant t.sub.TH and an instant t, where t.sub.TH is the output of the network NN1A when its input is set to V.sub.TH =6V, and where t is a time measurement provided by measuring means 150a shown in FIG. 5A. This calculation of the time difference may be performed by the first neural network NN1A, or by an individual calculation zone, or by the calculator 160 preferably formed by a microprocessor shown in FIGS. 5A and 5B. EXAMPLE II As shown in FIG. 1B, in a second embodiment, the monitoring system 100 comprises a first neural network referenced NN1B, and a second neural network referenced NN2B combined in series with the first neural network NN1B. In the description that follows, a discharging period which starts at instant to, in a charging/discharging cycle is first taken into consideration; and a predetermined critical discharge voltage threshold V. sub.TH is fixed. The first neural network NN1B now has two inputs for, respectively: the predetermined critical voltage threshold V.sub.TH, the temperature Tt of the battery at this current instant t, and has an output for producing at each current instant t, every minute: the instant t.sub.TH at which this predetermined critical voltage threshold V.sub.TH is reached. With reference to FIG. 5A, the first neural network NN1A is coupled to time measuring means 150a which make a measurement of each current instant t and is coupled to the calculator 160 which produces as a difference between the current instant t and the calculated value of the instant t.sub.TH : a value &Dgr;t.sub.TH of the lapse of time that is left until the predetermined critical discharge voltage threshold V.sub.TH is reached in normal operation. The synaptic coefficients or weights WjB of this first neural network NN1B are calculated and produced automatically at each current instant t during this discharging period just as they are calculated in the first mode of operation already described. The second neural network NN2B has three inputs for: Vo the initial voltage measured at the initial instant to of the discharging period, &Dgr;Vo the initial variation in a short lapse of time &Dgr; to, for example, 1 minute, No the initial number of cycles, and now has seventeen outputs for seventeen weights WjB transmitted to the first neural network NN1B. Each of the neural networks NN1B and NN2B is to be organized (or arranged) for bringing these calculations to a successful issue and producing these output signals. With this object in view, each of them is subjected to a learning procedure and to a test procedure called learning periods during which periods their synaptic coefficients are determined and, in certain cases, fixed. Learning Procedure of the Neural Networks The task of the first neural network NN1B is to learn discharging curve models. This learning makes it possible to form a relation between the battery discharge voltage Vt, the temperature Tt, and the current instant t at which the battery reaches this voltage Vt for this temperature Tt. The first neural network NN1B is to form, during its learning period, functions Fw which resolve the relation (1b): t=Fw(Vt,Tt) (1b) where w assigned to F symbolizes the fact that the function F is linked with the synaptic coefficients, to the weights WjB of the first neural network NN1B. With reference to FIG. 3A, the first neural network NN1B of the monitoring system 100 comprises: an input layer formed by three neural cells which include a first neural cell NEO for inputting a threshold voltage fixed at -1, a second neural cell NE1 for inputting voltage value Vt at the instant t, and a third neural cell NE2 for inputting the value of the temperature Tt at this same instant t, a hidden layer of five neural cells which include a first hidden neural cell NCO for inputting a threshold value fixed at -1, and four hidden neural cells denoted NC1 to NC4, as was the case in the first monitoring system 100, and an output layer which has a single neural cell denoted NS. The learning and test periods of each of the two neural networks NN1B and NN2B are begun in the same manner as the learning and test periods of the neural networks NN1A and NN2A of the first embodiment of the monitoring system, except that the discharging currents are learned for various different temperatures. The weights of this first neural network are referenced WjB and there are seventeen of them. The index "j" represents the numbers 1 to 17. Each given hidden neuron NCi receives on the input the voltage Vt having one of the weights referenced WjB, the temperature having another one of the weights WjB, and also receives a threshold which has the constant "-1" as its value to which another one of the weights WjB is assigned. The index "i" is the index 1 to 4 of the respective hidden neural cell NC1 to NC4. Each hidden neuron NCi produces a weighted sum and calculates an intermediate output signal as described in connection with the first embodiment of the monitoring system 100. Each hidden neuron NC1 to NC4 transfers this weighted sum via an activation function denoted Si, and calculates an Output signal denoted Si(Vt,Tt) as already described, while now the temperature is taken into consideration. The activation function Si is still, in this second example, a sigmoidal function "tanh" representing the tangential hyperbolic function which is very well adapted to the shape of the discharging curves to be made. Thus, in the hidden layer, the four neural cells CN1 to CN4 show a non-linear function tanh. The structure of the sole output neuron NS forms a weighted sum of the output signals Si(Vt,Tt) of all the hidden neurons NCi, by utilizing synaptic coefficients WjB, to which sum is added the value of a "-1" threshold coming from the hidden cell NC0, this threshold value being introduced in the output neuron NS via one of the synaptic coefficients WjB. The output neuron NS transfers this weighted sum via an activation function denoted Ls, and it calculates an output signal denoted Fw(Vt,Tt). The activation, function Ls of this output neuron is linear. The output of the output neuron NS is thus the value Fw one seeks to generate. The notations of the weights of each hidden neuron NCi are indicated in FIG. 3A as are the notations of the input weights of the output neuron NS. The set of these weights denoted W1B to W17B is formed by the set of the seventeen weights WjB transmitted by the second neural network NN2B. An example of discharging curves which is interesting for the present description is represented in FIG. 4D. This curve shows time t plotted against battery voltage Vt, for various values T1, T2, T3, of the temperature T taken as a parameter. These discharging curves each have a form approaching the form of a `tanh` curve. Therefore, the sigmoidal- type functions are preferred for realizing the activating functions in the neurons of the hidden layer. As in the example I, the central part of the discharging curves is modelled by the two first neural cells CN1, CN2 of the hidden layer, of which the activating functions have a steep slope; whereas the end parts of these curves are modelled by the following hidden neural cells CN3, CN4 which show an activating function which has a less steep slope. In this example II, with reference to FIG. 3B, the task of the second neural network NN2B is to learn a relation between parameters during the discharge voltage of the battery. Thus, the second neural network NN2B receives No the number of previous cycles called initial number of charging/discharging cycles, Vo the first voltage recorded of a given discharging curve, and &Dgr;Vo the slope at the start of this discharging curve, and is to be capable of calculating on the basis of these measurements, the seventeen weights WjB which are necessary for the operation of the first neural network NN1B. This relation is expressed in the function (4b): WjB=G(Vo,&Dgr;Vo,No) (4b) With reference to FIG. 3B, the structure of the second neural network NN2B is dictated by its task. This network NN2B comprises: an input layer having three input cells NE1, NE2, NE3 for the values Vo, &Dgr;Vo and No, plus an input cell NEO for a threshold of - 1; seventeen output cells for each of the respective seventeen weights WjB to be calculated; a single hidden layer having eight hidden neural cells denoted NC1 to NC8, plus a hidden cell NCO for a threshold of -1. In this example II, the entailment of the neural networks and their operating mode and current use is the same as in the example I when taking into account the input signal Tt of the first neural network NN1B. EXAMPLE III In an embodiment of the monitoring system of the charging state of a battery, the first neural network can provide on the output, independently, either an indication of the instant t.sub.TH where the critical voltage threshold value V.sub.TH is reached, or an indication of the lapse of time left, or the two indications. Actually, the indication of the instant t.sub.TH is calculated of necessity in the so-termed current use mode, when the input of the first neural network NN1A or NN1B is set to the threshold value V.sub.TH =6V to be able to calculate the lapse of time &Dgr;t.sub.TH as a difference between the instant t and the instant t.sub.TH. This difference can also be calculated in addition to the first neural network by the calculator denoted 160 in the FIGS. 5A and 5B. This indication of the instant t.sub. TH can thus be given to the user of the host system by suitable display means 140 displaying what time it is. Moreover, after a discharging period, the battery is to undergo a charging period which is completed when the voltage in the battery reaches the initial value Vo, which is, for example, 9 volts. In this example the display means may display that the recharging of the battery has terminated. EXAMPLE IV With reference to FIG. 5A, of which the legend is stated in Table I, the monitoring system 100 is used by a microprocessor 160 to carry out the calculations, and memory areas 170a, 170b are used for storing the data. These memory areas are accessible via the microprocessor 160 and include a ROM memory area 170a for storing the structure data of the first and second neural networks NN1A, NN2A, NN1B, NN2B, the fixed parameters and the weights WN2A, WN2B of the second neural network, and a RAM memory area 170b for recording or producing, as the case may be, the variable measurements and the weight vectors WjA, WjB of the first and second neural networks. The microprocessor 160 carries out the calculations necessary for the operation of the monitoring system. With reference to FIG. 5B, of which the legend is stated in Table II, the monitoring system 100 is coupled to display means 140 for giving the user an indication of time t.sub.TH or also of the lapse of time . DELTA. t.sub.TH that is left from a current instant t of use onwards until the instant at which the battery will reach this predetermined critical voltage threshold Vt.sub.TH, or also the two indications. The display means 140 may furthermore display the time, that is to say, an indication of the exact current instant t; these display means may further display an indication in a recharging period of the battery that this recharging period has terminated, when the battery has reached the initial voltage Vo. As stated above, the monitoring system 100 forms part of a host device 130 which comprises connection means D1, D2 for the rechargeable battery 110. The rechargeable battery 110 is coupled to the monitoring system 100 to form the smart battery 120. The host device 130 further accommodates the measuring means 150, for example, a multimeter, the microprocessor 160, the memory areas 170a, 170b which are accessible via the microprocessor, and the display means 140. For realizing the display means, various devices known from the state of the art can be used. A device may be a screen with indications written on it, or with indications drawn on it, or also a panel formed by diodes. TABLE 1 ______________________________________ (FIG. 5A) ______________________________________ 150a Measuring means for time t.sub.o, t'.sub.o, t 150b Measuring means for voltage V.sub.o, V'.sub.o, Vt 150c Measuring means for temperature Tt 110 Rechargeable battery 160 Microprocessor for performing the calculations &Dgr;t.sub.TH = t-t.sub.TH, &Dgr;Vo = Vo - V'o, No NN1A First neural network NN1B NN2A Second neural network NN2B 170 Memory areas ______________________________________ TABLE II ______________________________________ (FIG. 5B) ______________________________________ 130 Host Device D1, D2 Connection of the host device and of the battery 110 Rechargeable battery 150 Time, temperature and voltage measuring means 160 Microprocessor for performing the calculations 170a ROM memory area 170b RAM memory area 100 Battery monitoring system 120 Smart battery 140 Display means for displaying the current instant and calculated times, and possibly the end of the charging period. ______________________________________
RELATED APPLICATIONS BACKGROUND SUMMARY DETAILED DESCRIPTION This non-provisional patent application claims priority benefit with regard to all common subject matter of earlier-filed U.S. provisional patent application titled BUSHING AND SPACER SYSTEM FOR HAMMER MILLS, filed Feb. 15, 2011, and assigned application No. 61/443,147. The earlier-filed provisional application is hereby incorporated by reference in its entirety into the present application. 1. Field Embodiments of the present invention relate to bushing and spacer systems for use with hammer mills. More particularly, embodiments of the present invention relate to bushings configured to be mounted on a hammer rod and to receive hammers such that the bushings support the hammers, shield the rod from contact with the hammers, and separate the hammers one from another. 2. Related Art Hammer mills, sometimes referred to as impact grinders, are well known in the art and are used for grinding or comminuting materials such as scrap metal, forestry and agricultural materials, minerals, recycling materials, and food components such as grain. A typical hammer mill comprises a rotor mounted on a rotor shaft that is driven by a motor. The rotor includes a series of rotor discs spaced axially along the rotor shaft, and a plurality of hammer rods mounted on the rotor discs and extending the length of the rotor. The hammer rods are spaced radially outwardly from the rotor shaft and spaced circumferentially from one another. A plurality of free-swinging “hammers,” typically planar, elongated metal pieces, are mounted on the rods such that when the motor induces rotational movement in the rotor, the hammers extend radially outwardly from the rotor responsive to the centrifugal force associated with the rotation of the rotor. An enclosure surrounds the rotor and includes a material inlet typically located at a top of the enclosure for allowing material to be dropped into the hammer mill for grinding. The enclosure may further comprise a perforated wall at least partially defining a grinding chamber, wherein the perforated wall enhances the grinding process and filters material particles from the grinding chamber as they are sufficiently reduced in size. Because the hammers rotate and otherwise move on the rods, both the hammers and rods tend to wear over time at the points of contact. Over time this wearing tends to cause the hammer apertures to elongate and the rods to develop grooves. Such wearing can cause the hammers to extend radially outwardly relative to the rotor which can, in turn, cause the hammers to come into contact with the enclosure, potentially damaging both the hammers and the enclosure if not corrected. Accordingly, there is a need for an improved hammer mill which overcomes the limitations described above. A bushing system for a hammer mill in accordance with an embodiment of the invention comprises a rod, a first bushing mounted on the rod, and a second bushing mounted on the rod. The second bushing includes a spacer portion and a neck portion, the spacer portion presenting a larger cross section than the neck portion. The second bushing is mounted on the rod such that the neck portion of the second bushing is adjacent the first bushing. A hammer is rotatably mounted on the neck portion of the second bushing. A bushing system for a hammer mill in accordance with another embodiment of the invention comprises a rod, a first bushing removably mounted on the rod, and a second bushing removably mounted on the rod. The first bushing includes a cylindrical spacer portion corresponding to a first axial end of the bushing and a cylindrical neck portion corresponding to a second axial end of the bushing, the spacer portion presenting a larger outer diameter than the neck portion and including a cylindrical recess. The second bushing includes a cylindrical spacer portion corresponding to a first axial end and a cylindrical neck portion corresponding to a second axial end, the spacer portion presenting a larger outer diameter than the neck portion. The second bushing is mounted on the rod such that the neck portion of the second bushing matingly engages the cylindrical recess of the first bushing. A hammer presents an elongated, planar shape with a circular aperture proximate an end of the hammer. The circular aperture presents a diameter that is greater than the outer diameter of the neck portion of the second bushing but less than the outer diameter of each of the spacer portions of the first and second bushings. The hammer is mounted on the neck portion of the second bushing such that the aperture rotatably engages the neck portion. A method of assembling a bushing system for a hammermill in accordance with yet another embodiment of the invention comprises mounting a first bushing on a hammer rod, the first bushing including a neck portion and a spacer portion, and placing a hammer on the first bushing by sliding a circular aperture of the hammer over the neck portion of the first bushing. A second bushing is mounted on the hammer rod, the second bushing including a neck portion and a spacer portion. The second bushing is mounted on the hammer rod such that the neck portion of the first bushing matingly engages the spacer portion of the first bushing and a distance between the spacer portion of the first bushing and the spacer portion of the second bushing is slightly more than a thickness of the hammer. This summary is provided to introduce a selection of concepts in a simplified form that are further described below in the detailed description. This summary is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to be used to limit the scope of the claimed subject matter. Other aspects and advantages of the present invention will be apparent from the following detailed description of the preferred embodiments and the accompanying drawing figures. The drawing figures do not limit the present invention to the specific embodiments disclosed and described herein. The drawings are not necessarily to scale, emphasis instead being placed upon clearly illustrating the principles of the invention. The following detailed description references the accompanying drawings that illustrate specific embodiments in which the invention may be practiced. The embodiments are intended to describe aspects of the invention in sufficient detail to enable those skilled in the art to practice the invention. Other embodiments can be utilized and changes can be made without departing from the scope of the present invention. The following detailed description is, therefore, not to be taken in a limiting sense. The scope of the present invention is defined only by the appended claims, along with the full scope of equivalents to which such claims are entitled. In this description, references to “one embodiment”, “an embodiment”, or “embodiments” mean that the feature or features being referred to are included in at least one embodiment of the technology. Separate references to “one embodiment”, “an embodiment”, or “embodiments” in this description do not necessarily refer to the same embodiment and are also not mutually exclusive unless so stated and/or except as will be readily apparent to those skilled in the art from the description. For example, a feature, structure, act, etc. described in one embodiment may also be included in other embodiments, but is not necessarily included. Thus, the present technology can include a variety of combinations and/or integrations of the embodiments described herein. 10 10 12 14 14 10 16 18 20 22 24 14 26 16 18 20 22 26 10 10 26 16 18 20 22 28 16 18 20 22 30 10 32 10 16 18 20 22 12 FIG. 1 FIG. 2 FIGS. 5 and 6 Turning now to the drawings, an exemplary hammer mill rotor including a bushing and spacer system embodying principles of the present invention is illustrated. The rotor includes a plurality of rotor discs approximately equally spaced along a longitudinal axis of a rotor shaft . The shaft is drivingly coupled to a motor (not shown) such that, during operation, the motor induces rotational movement in the rotor . A plurality of hammer rods ,,, are mounted in axially-aligned disc apertures and are positioned generally parallel with, and radially outwardly from, the rotor shaft . A plurality of free-swinging hammers are mounted on each of the hammer rods ,,, such that during operation the hammers tend toward radially extended positions, as illustrated in , due to rotation of the rotor . When the rotor is at rest the hammers depend from the hammer rods ,,,, as illustrated in . A plurality of locking collars may be placed on the rods ,,, at a first end of the rotor , a second end of the rotor , or both. Furthermore, locking collars may be placed on the rods ,,, at one or more intermediate points between the rotor discs , as illustrated in and explained below in greater detail. 16 20 14 18 22 14 16 20 18 22 16 18 20 22 10 The first rod and third rod are generally positioned on opposite sides of the rotor shaft , while the second rod and the fourth rod are generally positioned on opposite sides of the rotor shaft . The first and third rods , generally lie on a line that is perpendicular to a line that intersects the second and fourth rods ,. Thus, the rods ,,, are generally equally circumferentially spaced around the rotor . 34 46 16 18 20 22 26 26 26 16 18 20 22 16 18 20 22 26 26 16 18 20 22 26 26 A plurality of bushings, such as bushings -, are mounted on each of the hammer rods ,,, and are configured to both support the hammers and maintain the hammers in a spaced relationship with each other. The hammers are mounted on the bushings such that the hammers do not contact the rods ,,,, thus the bushings shield the rods ,,, from the hammers and the wear associated with the movement of hammers relative to the rods ,,,. Because the bushings support and hammers and are exposed to the rigors of hammer mill operation—including potentially abrasive movement of the hammers relative to the bushings—the bushings are preferably constructed of a hard, resilient material such as steel or aluminum. 10 48 12 26 16 18 20 22 48 48 26 28 10 16 20 18 22 26 16 18 20 22 FIGS. 4 through 6 In the illustrated embodiment, the rotor is divided into sections delineated by the rotor discs . A plurality of hammers are associated with each rod ,,, in each section and are mounted on a series of bushings that spans each section. The particular dimensions and configuration of each of the bushings, as well as the placement pattern of the bushings, depends on the length of the particular section , the size of the hammers , the desired hammer pattern, and the presence of other elements placed in the section, such as locking collars . The illustrated rotor includes two hammer patterns and corresponding bushing placement patterns, wherein a first rod and a third rod each present a first bushing pattern, and a second rod and fourth rod each present a second bushing pattern. The different patterns enable staggered or offset placement of the hammers , as illustrated in . Because the first rod is circumferentially followed by the second rod , which is followed by the third rod then by the fourth rod , consecutive rods present different or offset hammer patterns. FIGS. 5 and 6 FIG. 5 FIG. 6 FIGS. 5 and 7 16 20 18 22 48 16 b b The two bushing placement patterns that enable the staggered hammer patterns are illustrated in . illustrates a bushing pattern on the first rod , which may be identical to the bushing pattern on the third rod . illustrates a bushing pattern on the second rod , which may be identical to the bushing pattern on the fourth rod . With reference to the second section of the first rod illustrated in , each of the bushings include a neck portion and a spacer portion, and three of the four bushings include a recess for receiving the neck portion of an adjacent bushing. 34 34 16 34 50 52 54 56 50 58 54 60 60 58 62 58 60 More particularly, and with particular reference to a first bushing , the bushing generally cylindrical in shape and configured to partially or completely encircle the rod when slidably mounted thereon. The bushing presents a neck portion corresponding to a first axial end and a spacer portion corresponding to a second axial end . The neck portion is defined by a first cylindrical outer surface and the spacer portion is defined by a second cylindrical outer surface , the second outer surface presenting a larger diameter than the first outer surface . An outer annular shoulder adjoins the first and second outer cylindrical surfaces. 64 34 52 66 66 68 64 70 64 68 A first inner cylindrical surface runs part of the axial length of the bushing , extending from the first axial end to a recess adjacent the second axial end. The recess may be an annular recess defined by a second inner cylindrical surface presenting a larger diameter than the first inner cylindrical surface . An inner annular shoulder adjoins the first and second inner cylindrical surfaces. 34 16 36 The bushing may be configured to be slidably mounted on the rod and to matingly engage an adjacent, identically configured second bushing . 64 16 58 34 50 68 34 66 50 36 34 36 72 50 34 36 FIG. 5 Therefore, the first inner surface presents a diameter that is slightly greater than an outer diameter of the rod . Furthermore, the first cylindrical outer surface of the bushing corresponding to the neck portion presents a diameter that is slightly less than the second inner surface of the bushing corresponding to the recess such that the neck portion may slidably engage a recess of the second bushing , as illustrated in . When the first and second bushings are thus engaged, an outer rim of the neck portion of the first bushing may engage an inner annular shoulder of the second bushing . 34 36 26 26 50 34 54 34 36 50 34 50 36 74 26 54 34 36 26 50 54 16 3 The first and second bushings and the hammers are configured such that a hammer is rotatably mounted on the neck portion of the first bushing and between the spacer portions of the first and second bushings. Thus, the neck portion of the first bushing and the neck portion of the second bushing each present an axial length dthat is sufficient to extend through the aperture of a hammer and into a recess of an adjacent bushing. The spacer portions of the first and the second bushings prevent lateral movement of a hammer mounted on a neck portion between the two spacer portions , that is, movement in a direction parallel with a longitudinal axis of the rod . 26 16 18 20 22 16 18 20 22 26 16 18 20 22 26 26 26 26 26 It will be appreciated by those skilled in the art that because the hammers are mounted on the bushings rather than directly on the hammer rods ,,,, the bushings shield the rods ,,, from wear that would otherwise occur due to contact between the hammers and the rods ,,,. With the illustrated bushing and spacer system, any wear that occurs will involve the hammers and the bushings. Furthermore, because the neck portions of the bushings are larger in diameter than the rods, the total area of contact between each hammer and bushing is greater than an area of contact that would exist between each hammer and rod if the hammers were mounted directly on the rods. This larger area of contact between the bushings and the hammers will result in less wear on both the hammers and the bushings. 38 36 12 38 76 78 34 36 76 38 50 34 36 78 38 12 76 38 26 76 50 34 36 26 76 38 26 38 78 38 12 26 b b b 3 3 3 A third bushing is positioned between the second bushing and the second rotor disc . The third bushing includes a neck portion and a spacer portion and may be similar or identical to the first and second bushings in size and shape with the exception that an axial length dof the neck portion of the third bushing is less than the corresponding axial length dof the neck portions of the first and second bushings due to the fact that the neck portion of the third bushing engages a planar surface of the second rotor disc rather than a recess of another bushing. By way of example, the neck portion of the third bushing may present a length that is approximately equal to or greater than a thickness of the hammer . In the illustrated embodiment, the axial length dof the neck portion is approximately one-half the length of the neck portions of the first and second bushings. A hammer is placed on the neck portion of the third bushing such that the hammer can rotate about the bushing , wherein the spacer portion of the bushing and the second rotor disc prevent lateral movement of the hammer . 40 34 12 40 80 82 34 36 40 82 12 26 80 40 26 40 82 40 50 34 26 c c A fourth bushing is positioned between the first bushing and the third disc rotor . The fourth bushing includes a neck portion and a spacer portion , and may be similar or identical to the first and second bushings in size and shape with the exception that the fourth bushing does not include a recess, as the spacer portion is adjacent the third rotor disc and does not engage another bushing. A hammer is placed on the neck portion of the fourth bushing such that the hammer can rotate about the bushing , wherein the spacer portion of the bushing and the spacer portion of the first bushing prevent lateral movement of the hammer . 48 16 48 20 20 48 16 20 48 32 10 48 16 b b b b While the bushings corresponding to the second section of the first rod have been described, it will be appreciated that the bushings corresponding to section of the third rod are similarly or identically configured and placed on the rod . Furthermore, all other sections of the first and third rods between the second section and the second end of the rotor may include identical bushings, placed in an identical pattern, as the bushings corresponding to the second section of the first rod described above. 48 16 48 28 16 48 28 42 12 38 44 42 28 84 86 88 84 84 26 88 28 26 84 44 50 34 36 86 44 54 34 86 44 88 44 76 38 a b a FIG. 5 The first section of the first rod may be the same length as the second section and may include a locking collar that includes, for example, opposed arcuate portions and a pair of locking bolts for securing the opposed arcuate portions on the rod . Bushings may be used in the first section that are specially configured or adapted to accommodate the locking collar (or other component). In the illustrated embodiment, a fifth bushing is placed adjacent the first rotor disc a and may be identical in size and shape to the third bushing . A sixth bushing is positioned between the fifth bushing and the locking collar and includes a first neck portion , a spacer portion , and a second neck portion opposite the first neck portion . As illustrated in , the first neck portion engages a recess in the fifth bushing and supports a hammer , while the second neck portion is engages the locking collar and supports another hammer . The first neck portion of the sixth bushing may be identical to the neck portion of the first and second bushings, and the spacer portion of the sixth bushing may be identical to the spacer portion of the first bushing except that the spacer portion of the sixth bushing does not include a recess. The second neck portion of the sixth bushing may be identical to the neck portion of the third bushing . 46 28 12 90 12 92 28 46 40 92 46 80 40 b b 3 3 A seventh bushing is positioned between the locking collar and the second rotor disc and includes a spacer portion adjacent the disc and a neck portion adjacent the locking collar . The seventh bushing may be identical to the fourth bushing except that an axial length dof the neck portion of the seventh bushing is approximately one-half the length of a corresponding axial length dthe neck portion of the fourth bushing . FIG. 6 18 16 18 48 18 16 18 16 With reference to , the bushings used on the second hammer rod may be identical to the bushings used on the first hammer rod and described above, except that the bushings are positioned differently on the second rod . In particular, each section of the second rod may include the same bushings present on the corresponding section of the first rod except that the bushing pattern is reversed—that is, the bushings on the second rod are placed in a reverse order and rotated end-for-end relative to the bushings on the first rod . As explained below in greater detail, this difference in bushing placement patterns enables the hammers on each rod to be offset from the hammers on other rods. 48 48 48 32 10 18 34 36 38 40 34 36 38 40 34 36 38 40 12 12 40 12 12 38 12 12 34 36 34 36 48 18 48 16 18 16 22 18 b b c b b c c b a a The second section (and every other section between the second section and the second end of the rotor ) of the second rod includes a first, second, third and fourth bushings ′, ′, ′ and ′ that are identical in size and shape the bushings , , and , respectively. However, each of the bushings ′, ′, ′ and ′ is positioned such that the neck portions extend toward the third disc rather than the second disc . Furthermore, the fourth bushing ′ is positioned adjacent the second disc rather than the third disc , the third bushing ′ is positioned adjacent the third disc rather than the second disc , and the positions of the first and second bushings ′ and ′ are transposed relative to the positions of the first and second bushings and . Similarly, the bushings on the first section of the second rod may be identical in size and shape to the bushings on the first section of the first rod , described above, except that the bushings on the second rod are placed in a reverse order and rotated end-for-end relative to the bushings on the first rod . The bushings on the fourth rod may be identical in size, shape and placement as the bushings on the second rod . FIG. 4 16 18 20 22 26 16 20 18 22 26 As illustrated in , the difference in bushing patterns between the rods ,,, results in the hammers on the first and third rods , being offset or staggered relative to the hammers on the second and fourth rods ,. The staggered formation improves the efficiency of the hammer mill by increasing the impact area of the hammers . While the particular dimensions and proportions of the bushing are not critical to the present invention, certain preferred dimensions of one exemplary embodiment of the invention will be discussed for illustrative purposes only, and should not be interpreted as limiting the scope of the present invention. FIG. 13 1 2 3 8 34 54 34 50 34 66 With particular reference to , the axial length dof the first bushing is preferably within the range of from about one-half of an inch to about two inches, more preferably within the range of from about three-quarters of an inch to about one and one-half inches, and may particularly be about one inch or about one and one-quarter inch. The axial length dof the spacer portion of the bushing is preferably within the range of from about one-quarter of an inch to about three-quarters of an inch and may particularly be about one-half of an inch. The axial length dof the neck portion of the bushing is preferably within the range of from about one-quarter of an inch to about three-quarters of an inch and may particularly be about one-half of an inch. The axial length dof the recess is preferably within the range of from about one-eighth of an inch to about one-half of an inch and may particularly be about one-quarter of an inch. 26 50 34 66 54 34 54 36 26 50 34 50 16 54 34 36 26 50 66 3 8 3 8 The thickness of the hammers , the axial length dof the neck portion of the bushing , and the axial length dof the recess are interrelated. The space between the spacer portion of the first bushing and the spacer portion of the second bushing is such that the hammer , when mounted on the neck portion of the bushing , can freely rotate about the neck portion but is restricted from moving laterally (i.e., along the longitudinal axis of the rod ) by the spacer portions of the bushings ,. If the hammer is one-quarter of an inch thick, for example, the axial length dof the neck portion may be about one-half of an inch and the axial length dof the recess may be about one-quarter of an inch, or slightly less than one-quarter of an inch. This is but one example. 16 64 34 16 16 58 50 34 60 34 36 46 34 46 34 The diameter of the hammer rod is preferably within the range of from about one-half inch to about two inches, more preferably within the range of from about one inch to about one and one-half inches, and may particularly be about one and one-quarter inches in diameter. The first inner cylindrical surface of the bushing is sized such that it may slidingly engage the rod and thus may be slightly greater in diameter than the rod , such as one-sixteenth or one-eighth of an inch greater. The first cylindrical outer surface of the neck portion of the bushing preferably has a diameter within the range of from about one-half inch to about three inches and more preferably from about one inches to about two inches, and may particularly be about one and one-quarter inches, one and one-half inches or about one and three-quarter inches. The diameter of the second cylindrical outer surface of the bushing is preferably within the range of from about three-quarters of an inch to about three inches and more preferably from about one and one-quarter inch to about two and one-half inches, and may particularly be about one and one-half inches, one and three-quarters inches or about two inches. The inner and outer diameters of the other bushings - and ′-′ may be similar or identical in size to corresponding inner and outer diameters of the first bushing and will therefore not be described in detail. 16 58 50 34 74 16 60 54 34 58 60 26 74 26 54 34 2 The ratio of the outer diameter of the hammer rod to the diameter of the first outer surface corresponding to the neck portion of the first bushing (or the diameter of the hammer aperture ) is preferably between about 0.4 and about 0.95, more preferably between about 0.6 and about 0.9, and may particularly be about 0.7 or 0.8. The ratio of the outer diameter of the hammer rod to the diameter of the second outer surface corresponding to the spacer portion of the bushing is preferably between about 0.2 and about 0.95, more preferably between about 0.4 and 0.9, and may particularly be about 0.6, about 0.7 or about 0.8. The ratio of the diameter of the first outer surface to the second outer surface is preferably between about 0.4 and about 0.95, more preferably between about 0.6 and 0.9, and may particularly be about 0.75, about 0.8, or about 0.85. The ratio of the width of a hammer to the diameter of the hammer aperture is preferably between about 0.25 and 0.75, more preferably between about 0.35 and 0.65, and may particularly be about 0.45 or about 0.55. The ratio of the thickness of a hammer to the axial length dof the spacer portion of the first bushing is preferably between about 0.5 and 1.5, more preferably between about 0.75 and about 1.25 and may particularly be about 0.85, about 1.0 or about 1.15. 16 18 20 22 10 10 12 16 18 20 22 26 48 16 18 20 22 12 16 18 20 22 48 10 48 As described above, the bushings are configured to be slidably mounted on the hammer rods ,,,. It will be appreciated that such a configuration facilitates assembly of the rotor . By way of example, the rotor may be assembled by sliding a rotor disc onto the rods ,,,, then sliding the bushings and hammers corresponding to that section onto the rods ,,,, then sliding the next rotor disc onto the rods ,,,. This process is repeated for each section of the rotor until all sections have been assembled. Although the invention has been described with reference to the exemplary embodiments illustrated in the attached drawings, it is noted that equivalents may be employed and substitutions made herein without departing from the scope of the invention as recited in the claims. For example, the spacer portions of the bushings need not present a cross section that is perfectly cylindrical, but could present a cross section that is oval or other shape. BRIEF DESCRIPTION OF THE DRAWINGS FIG. 1 is a perspective view of a hammer mill rotor including a bushing and spacer system constructed according to principles of the present invention, illustrating the hammers in an operational position wherein the hammers are extended radially relative to the rotor; FIG. 2 FIG. 1 is a partially exploded view of the hammer mill rotor of , illustrating the hammers in an idle position wherein the hammers depend downwardly from the rods; FIG. 3 FIG. 2 is an end elevation view of the hammer mill rotor of ; FIG. 4 FIG. 2 FIG. 3 4 4 is a fragmentary cross-sectional side elevation view of the hammer mill rotor of , corresponding to line - of , illustrating the bushing and spacer system wherein each of the bushings includes a neck portion and a spacer portion and at least some of the bushings are in an overlapping relationship with one another; FIG. 5 FIG. 2 is a fragmentary, partially cross-sectional plan view of a first of the hammer rods of the hammer mill rotor of , illustrating the bushing and spacer system with bushings placed on the rod according to a first pattern; FIG. 6 FIG. 2 is a fragmentary, partially cross-sectional plan view of a second of the hammer rods of the hammer mill rotor of , illustrating the bushing and spacer system with bushings placed on the rod according to a second pattern; FIG. 7 FIG. 5 a is an exploded view of the bushing system corresponding to a first, end section of the rod of ; FIG. 7 FIG. 5 b is an exploded view of the bushing system corresponding to a second section of the rod of proximate the first section; FIG. 8 FIG. 6 a is an exploded view of the bushing system corresponding to a first, end section of the rod of ; FIG. 8 FIG. 6 b is an exploded view of the bushing system corresponding to a second section of the rod of proximate the first section; FIG. 9 is a cross-sectional side elevation view of a first exemplary bushing for use in various embodiments of the bushing and spacer system; FIG. 10 is a cross-sectional side elevation view of a second exemplary bushing for use in various embodiments of the bushing and spacer system; FIG. 11 is a cross-sectional side elevation view of a third exemplary bushing for use in various embodiments of the bushing and spacer system; FIG. 12 is a cross-sectional side elevation view of a fourth exemplary bushing for use in various embodiments of the bushing and spacer system; AND FIG. 13 is a cross-sectional side elevation view of a fifth exemplary bushing for use in various embodiments of the bushing and spacer system.
Since mid-March, MarketCast has analyzed the thoughts, feelings and behaviors of media, entertainment and sports fans as they increasingly learn to cope with the impact of COVID-19 and its disruption to their work and personal lives. Our survey of more than 1,000 consumers, combined with analysis of millions of social media conversations, is updated weekly to identify the changing sentiment among fans. The result is this comprehensive report detailing how people from all walks of life are managing their time, spending their money, and engaging with one another and popular forms of media and entertainment. The MarketCast State of Fandom Report Digs Deep to Understand: - How are people coping with social distancing and what forms of media are they engaging with most? - Are people gravitating to local, national and cable TV and digital news or are they finding alternative sources? - What is the impact of the virus on media spending habits for cable TV and streaming subscribers? - Will sports fans return to live events once the crisis ends? - How are sports fans filling the void? - How will brand behaviors during the pandemic impact consumer perceptions when we return to normalcy? Complete the form below to access the report. Thank you for your interest in viewing our State of Fandom Report. Please fill out the form below to download. Contact us, with any questions.
https://marketcast.com/insights/marketcast-state-of-fandom-report-wave-3/
Background {#Sec1} ========== Recruiting and involving minority participants in health surveys present important challenges \[[@CR1], [@CR2]\]. Recruiting participants is a time and resource consuming part of survey research among minority groups \[[@CR3]\]. Various studies have experienced difficulties in penetrating minority communities, resulting in low participation rates and poor representativeness of the respondents for the target population \[[@CR4]--[@CR9]\]. Studies among ethnic minorities therefore need to improve the recruitment methods and take into account characteristics of the target population in order to achieve satisfactory response rates \[[@CR4]\]. Many recommendations have been made regarding strategies to involve and recruit minority participants in research \[[@CR4], [@CR10]--[@CR12]\]. Communication with the people and building relationships is stated to be foundational in research among minority communities. Recommended strategies include building trust, increasing visibility of the investigators, involving community advisors, sharing insights with the target group, and forming social networks within the community \[[@CR13]--[@CR17]\]. Recruiting minority participants can be done in various ways, including door-to-door enumeration, community approaches such as community events, and snowball methods \[[@CR3], [@CR18]--[@CR21]\]. Avoiding distrust and creating trust is a common theme in different strategies to recruit minority participants in research \[[@CR3], [@CR16], [@CR22]--[@CR24]\]. One general approach has not been identified for maximizing response rates among minority participants. Response rates may strongly vary among studies that employ similar recruitment strategies though among different minorities. For example, the studies of Khan et al. and of Tucker et al. both used snowball sampling but achieved response rates of respectively 48.3 and 7.2 % \[[@CR18], [@CR20], [@CR25]--[@CR27]\]. Recruitment strategies such as face-to-face recruitment, telephone follow-up and the use of incentives appear to increase the response rate among several minority groups \[[@CR25], [@CR28], [@CR29]\]. The effectiveness of different strategies in reaching and involving minority groups is particularly important in low-budget health surveys. In such surveys, strategies that require a huge input in terms of money or manpower may not be feasible. In low-budget studies, therefore, a critical question is which specific recruitment strategies require few resources but may nonetheless be effective in enhancing response rates. This study aims to provide systematic evidence to support such choices. Unfortunately, there is yet limited available empirical evidence to determine which low-budget strategies could be most effectively applied among minority groups. In the Netherlands, most of the research on health of minorities focuses on the largest minority groups of Moroccans, Turkish and Surinamese. One hard-to-reach minority group has been largely ignored until now: the Moluccans. In 1951, a group of approx. 3000 Moluccan soldiers with their families, who served in the Royal Dutch East-Indies Army during the WOII, were transferred to the Netherlands \[[@CR30]\]. Soon after arrival, those who were unable to return to the new Republic of Indonesia were turned into exiles. Today, the total number of Moluccans is estimated to be about 50,000 \[[@CR30]\], of which approx. one third is 3rd generation. Still today, Moluccans have some degree of social disadvantage; generally Moluccans are lower educated and have lower-ranking occupations than the Dutch autochthonous population \[[@CR31]\]. By the start of this study, there was very limited evidence regarding the health status of the Moluccan population. Recent studies demonstrate that Moluccans have high prevalence rates of hypertension and ischemic heart disease as compared to the native Dutch \[[@CR30], [@CR32]\]. Given their lower socioeconomic position and persistent problems of integration \[[@CR33]\] other types of health problems might as well be more prevalent among Moluccan residents. A particular feature of this minority group is their residence in so-called 'Moluccan districts' (MDs). These districts are located at the outskirt of more than 60 Dutch villages and towns distributed throughout the Netherlands and they accommodate the majority of the first and second generation Moluccans \[[@CR34]\]. The Moluccan community may be particularly difficult to access. The Moluccan culture is one with a strong adherence to traditional values, social hierarchy, family bonds and Malay language \[[@CR30]\]. Respect for privacy is important, and personal affairs are not easily disclosed to those outside the family. Furthermore, political history has left its scars within the community, resulting in distrust towards the Dutch government and also towards non-governmental organizations \[[@CR33]\]. Finally, the Moluccans wait-and-see attitude restricts their close involvement in research \[[@CR33]\]. As a consequence, recruiting Moluccans may be challenging. Unfortunately, to our knowledge, experiences in recruiting Moluccans in health surveys, if any, are not documented. The general aim of this paper is to report on the recruitment strategies that we applied with the aim to increase the response rate to a health survey among Moluccans in the Netherlands. This survey was carried out in 19 MDs. In the different MDs, we applied zero to five recruitment strategies, which were administered in different combinations. The specific aim of this study was to evaluate these different combinations of strategies with regard to their effect on response rates. Methods {#Sec2} ======= The survey {#Sec3} ---------- The survey, conducted from August 2012 to March 2013, aimed to obtain national-level estimates of the health situation of Moluccans, aged between 30 and 65 years, living in Moluccan districts (MDs). We selected 19 of the 60 existing MDs throughout the Netherlands. The selection was based on three criteria: the population size of each MD should be relatively large (more than 50 eligible persons), key informants could be approached easily, and all geographic regions and religious groups (mostly Christian, few Muslim) should be represented. Lists of addresses were collected via key informants. They created a list of potential respondents and their addresses, taking into account three guidelines: respondents had to be of Moluccan origin, respondents had to live within or close to the MD. We also included persons with only one parent with Moluccan roots. Selected persons received a health questionnaire delivered at their address by hand or post. The health questionnaire was based on the *POLS* (Continuous Survey of Living Conditions) questionnaire of Statistics Netherlands \[[@CR35]\]. Socio-demographics, self-reported health, healthcare utilization and health-related behaviours were the core topics of the questionnaire. The questionnaire contained approximately 80 questions and could be completed within 20 to 25 min. The questionnaire was translated into the Malay language for those who would not master the Dutch written language. Questionnaires could be filled in during a face-to-face interview, using an Internet questionnaire, or using the paper-and-pencil method. All non-respondents received a reminder after 2 weeks. In each MD, key informants of Moluccan roots were closely involved in the survey fieldwork. Most of them were members of the local Moluccan neighbourhood council or of the board of the Moluccan community centre. In consultation with each key informant, we developed a set of recruitment strategies that could be implemented with the time and resources available within their own MD. Recruitment strategies {#Sec4} ---------------------- The available recruitment strategies can be categorized into "direct" and "indirect". A direct strategy involved personal contact with the potential participants with the aim to provide them with personalized information regarding the survey. In an indirect strategy, we did not approach people individually but we provided information about the survey to the community as a whole, including information on how to contact the researchers for further information. Direct recruitment strategies included information meetings and door-to-door collection of questionnaires. Information meetings lasted approximately 3 h and aimed to inform the participating community members about the survey and to discuss the survey design, possibilities for follow-up research, and requirements to dissemination. In door-to-door collection, key informants would go door-to-door in the community to collect the questionnaires. Indirect recruitment strategies included use of announcement letters, social media, local media, and community organizations. Announcement letters were sent by post or by email to each Moluccan person listed in the selected MD. This letter explained the purpose of the research, introduced the involved community key informants and presented the researchers. Social media included the website of local community centre and the local Facebook page. Local media included local newspapers and the local radio station. At both media, we placed short messages to inform Moluccans about the research and to remind the invited community members to participate. Finally, we could involve the Moluccan church in two MDs and the local general practitioners (GP) centre in one MD. Their involvement consisted of providing a recommendation letter in support of the study. Contact with these community organizations were initiated by the researchers or by the key informants. To stimulate response we introduced a financial reward of three travelling vouchers with a value of €500,- and twenty dinner vouchers of €20,-. After the fieldwork was closed, the winning persons were randomly selected from all respondents. Analysis {#Sec5} -------- For each MD we collected data on the number of key informants, the number and type of recruitment strategies that were implemented, the number of questionnaires that were distributed, and the number of questionnaires that were returned to the researchers. The response rate for each MD was calculated by dividing the number of returned to the number of distributed questionnaires. With regard to key informants, we also measured their level of activity during the recruitment process. Key informants were considered to have been 'active' if they made major effort during the recruitment process, e.g., by recruiting respondents via door-to-door enumeration. A key informant was considered 'inactive' as he/she only provided the address list and/or distributed reminders in the community. In a first step, univariate analysis was performed to calculate the response rate according to the presence of each recruitment strategy. For each strategy, we distinguished between "exposed" and "non-exposed" MDs and we calculated the total number of questionnaires that were distributed and returned in the exposed and non-exposed group, respectively. A similar calculation was performed to calculate response rates in relationship to the presence of 'active' key informants. In further analyses, we assessed the independent association of each strategy to the response rates by using multilevel and multivariate logistic regression analysis, with individual invited participants at the lower level and MDs representing the higher level. The dependent variable was whether or not an invited participant had responded. Independent variables were dichotomous variables measuring the presence of specific recruitment strategies at the level of MDs. We also include the number of key informants as continuous variable, and the presence of 'active' key informants as dichotomous variable. Odds ratios (ORs), the corresponding 95 % confidence intervals (95 % CI) and p values were derived from the regression estimates. A p value ≤ 0.05 was considered to indicate statistical significance. Analyses were performed using the statistical program R i386 3.0.1. Results {#Sec6} ======= The number and combination of recruitment strategies used within each MD are shown in Table [1](#Tab1){ref-type="table"}. Overall, the number of implemented recruitment strategies varied from one to four. Exceptions were Middelburg (where no recruitment strategy was applied) and Vaassen (where five recruitment strategies were applied). Only three pairs of MDs applied the same combination of recruitment strategies: Nistelrode and Oost-Souburg/Vlissingen; Maastricht and Waalwijk; and Vught and Ridderkerk. The number of key informants involved varied between MDs. In Capelle aan den IJssel, no key informants were involved, and we had to organize the recruitment ourselves. Also the activity level of the key informants varied between the MDs (see Table [1](#Tab1){ref-type="table"}).Table 1Overview of the implemented recruitment strategies in each Moluccan districtMoluccan districtStrategy (N)Key informantsIndirect recruitment strategiesDirect recruitment strategiesNActive^a^Announcement letterLocal mediaSocial mediaCommunity organizationsInformation meetingDoor-to-doorMaastricht25YesXXDen Helder21YesXXBovensmilde44YesXXXXLunteren33YesXXXBreukelen31NoXXXWaalwijk21YesXXNistelrode42YesXXXXMiddelburg01YesOost-Souburg/Vlissingen41NoXXXXZwolle23NoXXVught11YesXAssen25NoXXCapelle a/d Ijssel40NoXXXXRidderkerk12NoXGroningen12NoXHoogeveen22NoXXVaassen52YesXXXXXWierden21NoXXBreda11NoX^a^Activity level: key informants were considered to be 'active' if they made major effort during the recruitment process (see text for the details) Table [2](#Tab2){ref-type="table"} presents an overview of the response rates achieved in each MD. The total response rate was 24 %. The response rates of individual MDs varied from 9 to 58 %. The MD of Maastricht had the highest response rate (58 %), followed by Den Helder (46 %) and Bovensmilde (38 %) (see Table [2](#Tab2){ref-type="table"}).Table 2Overview of the distribution of respondents, questionnaires and response rates for each Moluccan DistrictMoluccan districtRespondents (N)Questionnaires distributed (N)Response rate (%)Maastricht8013758Den Helder357646Bovensmilde6316538Lunteren6820334Breukelen216731Waalwijk258031Nistelrode4617926Middelburg6726925Oost-Souburg/Vlissingen3214123Zwolle4319822Vught2612621Assen4521921Capelle aan den Ijssel4422020Ridderkerk136620Groningen189619Hoogeveen2011517Vaassen2923213Wierden1815112Breda182129*On request* ^a^*44*--Total715295624^a^On request revers to respondents who were not recruited via the presented recruitment strategies but via verbal transmission For each recruitment strategy, Table [3](#Tab3){ref-type="table"} presents the number of exposed and non-exposed MDs and the corresponding response rates. Higher response rates were obtained in MDs where we applied door-to-door collection of questionnaires (31.8 vs. 21.2 %) and where we sent an announcement letter (25.5 vs. 19.8 %) compared to MDs where we did not apply these strategies. No higher response rates were observed in MDs where we utilized local and social media, where we could involve community organizations, or where we organized an information meeting. Response rates were higher in MDs where key informants were actively involved in the recruitment process (30.0 vs. 18.1 %) (see Table [3](#Tab3){ref-type="table"}).Table 3Association between recruitment strategy and response rate: comparing exposed and non-exposed districts, to different strategiesNumber of districts (N)Response rate (%)ExposedNon-exposedExposedNon-exposedIndirect recruitment strategy Announcement letter145*25.5*19.8 Information meeting71224.124.1 Local media61323.024.6 Social media10920.628.5Direct recruitment strategy Door-to-door collection514*31.8*21.2 Involvement of community organizations31621.824.5Other strategies "Active" key informants^a^910*30.0*18.1Response rates with more than 5 % increase between exposed and non-exposed communities are presented in italics^a^Key informants were considered to be 'active' if they made major effort during the recruitment process (see text for the details) Table [4](#Tab4){ref-type="table"} presents the results of the regression analysis in terms of odds ratios (ORs) with their corresponding 95 % confidence intervals (95 % CI). Response rates were positively associated with door-to-door collection (OR 1.57; 95 % CI 1.01--2.43), but inversely associated with the involvement of community organizations (OR 0.53; 95 % CI 0.32--0.88). The number of key informants is positively related with response rates: involving one more key informant in the recruitment process increases the OR with 0.25 (95 % CI 1.07--1.45). The involvement of key informants who were 'active' is also associated with higher response rates (OR 1.68; 95 % CI 1.18--2.38). Excluding the variable on door-to-door collection from the model did not substantially change the ORs corresponding to the other recruitment strategies. No independent associations were found for variables representing, respectively, the use of announcement letters, information meetings, local and social media (see Table [4](#Tab4){ref-type="table"}).Table 4Association between recruitment strategy and response rate: results from multivariate and multilevel logistic regressionOR (95 % CI)Model 1Model 2Model 3Model 4No strategy (ref.)1.001.001.001.00Announcement letter1.03 (0.47--2.25)0.56 (0.26--1.17)0.69 (0.36--1.29)0.83 (0.42--1.62)Information meeting1.27 (0.69--2.35)1.41 (0.86--2.31)1.31 (0.86--1.98)1.16 (0.74--1.80)Local Media1.08 (0.49--2.39)1.89 (0.91--3.94)\*1.52 (0.81--2.83)1.46 (0.73--2.93)Social Media0.71 (0.36--1.40)*0.52 (0.29--0.93)*0.64 (0.38--1.05)0.58 (0.33--1.01)\*Door-to-door collection1.69 (0.87--3.25)1.64 (0.97--2.79)\**1.57 (1.01--2.43)*--Involvement of community organizations0.75 (0.37-1.54)0.58 (0.31-1.06)\**0.53 (0.32--0.88)*0.60 (0.34-1.05)\*Key informant (cont.)^a^--*1.32 (1.11--1.58)1.25 (1.07--1.45)1.25 (1.06--1.48)*Active key informant^b^----*1.68 (1.18--2.38)1.72 (1.16--2.53)*Model 1: single recruitment strategiesModel 2: model 1 + key informantsModel 3: model 2 + active key informantsModel 4: model 3---door-to-door collectionA p value ≤ 0.05 is presented in italics\* A p value ≤ 0.1^a^The continuous variable of key informants represents the increase in OR corresponding to one additional key informant contributing to the recruitment process^b^Key informants were considered to be 'active' if they made major effort during the recruitment process (see text for the details) Discussion {#Sec7} ========== The aim of this paper was to assess the effectiveness of several recruitment strategies to increase the response rate in a low-budget health survey among a hard-to-reach minority community in the Netherlands. We achieved a total response rate of 24 %, which varied from 9 to 58 % between the Moluccan districts (MDs). Response rates were positively associated with door-to-door collection of questionnaires, and with the involvement of 'active' key informants in the recruitment process. The overall response rate of 24 % was disappointingly low \[[@CR36]\]. This response rate is lower than the reported response rates achieved in studies among other minority groups in the Netherlands and which are generally above 40 % \[[@CR37]--[@CR40]\]. Between the MDs, response rates were achieved ranging from 9 to 58 %. The demographic composition varied between the MDs. Closer inspection showed this composition is not clearly correlated with overall response rates, nor with the application of specific recruitment strategies. Possible explanations for this low response can be found in the study design and in characteristics of the Moluccan community. With regard to study design, the limited time and financial resources available to this study could have negatively influenced the response rate. No prior experiences were available in recruiting respondents in population surveys in these MDs. The total fieldwork period was limited to about 8 months, during which the address lists had to be created and recruitment strategies had to be developed and implemented in 19 MDs throughout the Netherlands. The recruitment period per MD varied from 3 to 7 months. Due to limited financial resources, we could not apply resource-demanding strategies that are potentially effective, such as telephone follow-up and substantial financial rewards to all respondents. Finally, for reasons related to their unique history \[[@CR33]\], Moluccans cannot be identified as such in the Dutch population registry, and we had to invest considerable time in creating address lists that included all eligible persons. As to the role of the Moluccan community itself, several barriers became apparent during the survey. Our conversations with community members revealed high levels of distrust towards this study despite the key researcher (AB) being of Moluccan descent. This distrust reinforced pre-existing reluctance among Moluccans to disclose personal information to other people. Moreover, the subject 'health' appeared to be a taboo topic within the Moluccan community, rather than a subject that fostered interest and participation. A case of disease is kept within the family and is not spoken of within the community. At a wider community level, we observed that response was affected by a high degree of segmentation within the local communities. A strong sense of individualism and orientation of single families affected the residents' willingness to contribute to community-oriented activities. This also affected the survey: while we emphasized the value of the survey as a 'public' good, potential respondents tended to be looking for the personal benefits that they could gain from participation. Despite these hurdles, we observed some recruitment strategies to be positively associated with response rates. Door-to-door collection of questionnaires seemed an effective strategy in raising response among Moluccans. Other than in the general Dutch population \[[@CR41]\] and most of its minority groups, simply sending a questionnaire was insufficient in achieving a high response rate among most Moluccan residents. A possible reason is that within the Moluccan community, personal contact is essential, be it via telephone, personal visits, or meeting at special occasions. We experienced that non-personal communication routes such as post, e-mail, Facebook and Twitter were not common ways to contact Moluccans, especially those of the first generation (about 65 years and older) and second generation (between 44 and 64 years). Door-to-door collection may be essential to achieve the personal contact that is needed to create trust and mutual understanding \[[@CR3], [@CR14], [@CR42]\]. Involving key informants in the research process was associated with increased response rates \[[@CR43], [@CR44]\]. Most of our key informants represent the needs and wishes of the community members and were considered to be the backbone of the local community \[[@CR3]\]. Most studies place key informants in an 'advisory' role within the research process, whose role is to inform the researchers about the community \[[@CR11], [@CR16], [@CR45]\]. In our case, however, key informants played an active role in recruiting respondents, e.g., by door-to-door enumeration or organizing community meetings in which the questionnaire could be filled in jointly. In most other studies, door-to-door enumeration is done by researchers themselves or by recruited minority interviewees \[[@CR44], [@CR45]\]. In our case, the presence of key informants may have increased the impact of house visits on individual respondents. Response rates were lower in MDs where we involved community organizations, more specifically churches. This result has to be interpreted with caution because churches were involved in only three MDs. We expected a positive impact as the majority of the Moluccan community is strongly religious \[[@CR14]\]. The lack of evidence for such a positive impact may suggest that the involvement of churches had limited added value. This finding is in contrast to other studies \[[@CR46], [@CR47]\], and might be related to segmented nature of Moluccans communities, high levels of distrust, and wish for privacy among Moluccans. The church board may not be fully trusted and Moluccans may be apprehensive that the information from the surveys may be used for personal gain by the church board. In Vaassen, the response rate was very low (13 %) even though we applied five recruitment strategies and involved active key informants. This low response might be due to the fact that this is one of the most traumatized Moluccan communities. In 1976 Moluccans in this area were displaced contrary to their will---an event that led to a violent encounter with local authorities \[[@CR48]\]. This event has left deep scares within the local community until today. Conclusions {#Sec8} =========== To conclude, our experiences underline that increasing response rates among hard-to-reach minorities is challenging in surveys that have few resources for individual communities. Before starting, an analysis of the community structure is needed to identify possible recruitment obstacles, such as distrust and social segmentation. The involvement of active key-informants may be critical in this phase. While developing recruitment strategies focusing on community values and public good \[[@CR49]\] may be effective in communities with strong social cohesion, such an approach may be insufficient in segmented, individualised communities. In such cases, recruitment methods may instead need to emphasize the personal benefits of participation and use personalized strategies such as door-to-door recruitment. AB contributed to the study design and acquisition of data. AB analysed and interpreted the presented data and wrote this manuscript. AK contributed to the study design, assisted in the data analysis and interpretation, and commented on previous drafts of this manuscript. Both authors read and approved the final manuscript. Acknowledgements {#FPar1} ================ We would like to thank W. Busschers for his statistical support. Special thanks to all key informants and volunteers who made it possible to carry out the survey in all 19 MDs. Competing interests {#FPar2} =================== The authors certify that they have no affiliations with or involvement in any organization or entity with any financial interest or non-financial interest in the subject matter discussed in this paper. Availability of data and materials {#FPar3} ================================== The dataset supporting the conclusions of this article are available on request, in the institution repository of the AMC in a secured internal environment. Ethics approval, consent to participate and consent for publication {#FPar4} =================================================================== Ethical approval was obtained from the Medical Ethics Review Committee of the Academic Medical Centre (AMC) Amsterdam (document number: W12_180). Respondents expressed their consent to participation in this study by filling in and resending the questionnaire to the researchers. In the letter accompanying the survey, respondents were informed on the use of the data and publication of the results, with the guarantee of confidentiality and anonymity. Funding {#FPar5} ======= This project was funded by BUAT Foundation-Platform for Moluccans, Grant Number CJ2081008.
Newswise — DENVER (April 13, 2011) − An estimated 4,030 new cases of childhood primary nonmalignant and malignant brain and central nervous system tumors were diagnosed in the US in 2010. Of the 4,030 new cases, an estimated 2,880 were in children younger than 15. As many as 15 percent of these pediatric brain tumors occur in the brainstem. Eighty percent of brainstem gliomas (BSG’s) are diffuse intrinsic pontine gliomas (DIPGs), an almost always fatal tumor with no effective treatment. DIPG affects young children, primarily under the age of 10, and has one of the highest mortality rates of all pediatric cancers. Current treatment is radiation therapy, but this only temporarily decreases symptoms and does not improve overall survival. Despite many clinical trials investigating new therapies, there have been no advances in DIPG treatment for over 35 years. Researchers at Georgetown University Hospital and the Center for Genetic Medicine Research at Children’s National Medical Center in Washington, D.C., studied the biology of pediatric brainstem glioma in an effort to advance treatment of this leading cause of brain tumor death in children. The results of this study, Proteomic Profiling of Pediatric Brainstem Glioma using Cerebrospinal Fluid, will be presented by Amanda Muhs Saratsis, MD, 12:31-12:45 pm, Wednesday, April 13, during the 79th Annual Scientific Meeting of the American Association of Neurological Surgeons in Denver. Co-authors are Suresh Magge, MD, and Javad Nazarian, PhD. Dr. Saratsis will be presented with the Kenneth Shulman and WINS Louise Eisenhardt Awards for this research. The lack of progress is due in large part to DIPG tumor tissue not being readily available for molecular study. The location and infiltrative nature of this tumor prevents surgical resection, and diagnostic biopsy is rarely performed, resulting in a lack of understanding of DIPG biology. To address this, the researchers devised an alternate approach to studying DIPG through proteomic analysis of cerebrospinal fluid (CSF). In patients with brain tumors, CSF is in direct contact with tumor tissue. As a result, proteins secreted by a brain tumor can be detected via analysis of a patient’s CSF. Proteomic analysis allows rapid, comprehensive identification of protein content in a biological specimen, and can reveal information about tumor formation and behavior. This information can help identify tumor biomarkers for more accurate diagnosis, or lead to development of more effective treatments. Proteomic analysis of CSF was performed on patients with BSGs, and these results were compared to the protein profile of CSF from patients with other brain tumors and healthy controls. CSF was collected during the course of patient treatment or at autopsy from 12 patients with BSGs, including 8 with DIPG, and compared to CSF from 4 healthy controls and 3 patients with non-brainstem tumors. Mass spectroscopy was used to detect, identify and quantify proteins in the CSF samples, and the resulting protein profile of each patient was analyzed. The analysis yielded the following results: •528 total proteins were identified; multiple proteins showed different expression levels in BSG patients compared to controls, indicating abnormal protein expression patterns in tumor patients. •Dysregulated proteins mapped to known pathways of glioma formation, neural cell migration and cell response to stress, suggesting the role of these biological pathways in DIPG formation. •A subset of proteins was detected uniquely in DIPG samples. This supports the hypothesis that DIPG may arise due to a biologically distinct mechanism from other pediatric gliomas, and could help explain why DIPG does not respond to treatments that are effective for other tumors. “To our knowledge, this is the first comprehensive protein profile of BSG and DIPG CSF specimens generated and shows promising potential. Further evaluation and validation using tumor tissue is underway. Proteomic analysis of CSF from children with BSG offers a systematic approach to enhancing our understanding of tumor biology and identifying unique tumor biomarkers. We hope that one day this research translates into improved outcome and survival in children affected by these devastating brain tumors,” said Dr. Saratsis. Founded in 1931 as the Harvey Cushing Society, the American Association of Neurological Surgeons (AANS) is a scientific and educational association with more than 8,000 members worldwide. The AANS is dedicated to advancing the specialty of neurological surgery in order to provide the highest quality of neurosurgical care to the public. All active members of the AANS are certified by the American Board of Neurological Surgery, the Royal College of Physicians and Surgeons (Neurosurgery) of Canada or the Mexican Council of Neurological Surgery, AC. Neurological surgery is the medical specialty concerned with the prevention, diagnosis, treatment and rehabilitation of disorders that affect the entire nervous system, including the spinal column, spinal cord, brain and peripheral nerves. Disclosure: the author reports no conflicts of interest. Funding has been provided by the Isabella Kerr Molina Foundation, Zickler Family Foundation, Childhood Brain Tumor Foundation, and Musella Foundation. Media Representatives: If you would like to cover the meeting or interview a neurosurgeon − either on-site or via telephone − please contact the AANS Communications Department at (847) 378-0517 or call the Annual Meeting Press Room beginning Monday, April 11 at (303) 228-8431.
https://www.newswise.com/articles/identification-of-protein-biomarkers-offers-promise-for-children-with-deadly-brainstem-gliomas
Published On: February 3, 2017 12:25 AM NPT By: The Week Bureau Meditation, after all, has been globally appreciated for helping people become more peaceful, more focused, less anxious and more attentive to everything in their lives. Further, many also claim that meditation helps them better understand their own minds. When you meditate, you need to spare at least an hour. When you meditate, you have to sit in a particular posture. When you meditate, there should be no thoughts running through your mind. When you meditate, you need to have good concentration and laser-like focus. Lila Lamichhane, meditation teacher at The Art of Living, has heard it all and she couldn’t be more against these misinterpretations. She is also well aware that these false ideas about meditation are keeping many people from giving it a try. Lamichhane stresses that while not many people can immediately adapt to the act of meditating, the fact still remains that anybody can do it with a little practice. Lamichhane actually considers meditation one of the most important habits that she has formed in the last 10 years. Meditation, after all, has been globally appreciated for helping people become more peaceful, more focused, less anxious and more attentive to everything in their lives. Further, many also claim that meditation helps them better understand their own minds. Considering all these benefits it’s no wonder that it comes highly recommended. However, in case, you too aren’t sure where to start, Lamichhane has some helpful tips. Here, she shares how she teaches those interested with their practical beginner’s guide to meditation sessions at The Art of Living trainings. Setting the record straight We have all heard how meditation utilizes focused breathing and mind exercises that are aimed at reducing heart rate, respiration and other signs of stress. We have also been told that when we meditate the goal is to unite the body, breath and mind. Now since it’s easy to be overwhelmed by this very idea, Lamichhane apparently always makes it a point to brief her new students. She debunks the myths and explains to them exactly how the task is completely achievable. The trick is to take it step by step and also understand that there isn’t only one particular way to meditate. According to Lamichhane, the desire to meditate must come from within. One must be serious about their attempts and, when they are, they will discover that they have many options to explore. Lamichhane also strongly believes that the practice of meditation is easier to grasp when there is someone guiding you through the basics. Practice leniency More often than not, attempts at meditation fail because people tend to be too strict with themselves. “There is a common misconception that you need to sit for hours on end and often, in our busy lives, this just isn’t possible,” says Lamichhane. She recommends that beginners start off with just 10 minutes of meditation a day. However, make it a point to limit distractions – find a quiet place where other people won’t disturb you and leave your phone in another room or keep it in silent mode so you won’t be interrupted by texts or Facebook notifications. Also don’t assume that you have to abide by rigid meditation postures. There is no need to tolerate aches and cramps. Try to be as comfortable as you can. As long as you are not lying down (since we don’t want you to doze off), you can sit in any relaxed position. You can even simply sit upright in a chair with both feet planted on the ground and both arms at your sides or resting on your thighs. Even closing your eyes is an option. If you want, you can choose to leave them open as well. And last but not the least, Lamichhane shares that too many people emphasize on the importance of having a blank mind while meditating. But this, according to her, is impossible. She explains that even while meditating thoughts are bound to drift in and out of your head and that’s completely okay. We can consciously decide to get the mind back on track. The power of combining exercise and meditation Many people tend to meditate after vigorous workout sessions to regulate their breathing and soothe their aching muscles. This is the norm. However, physical exercise before sitting down to meditate has also been helpful to people. Lamichhane reveals that her meditating sessions at The Art of Living meetings always begin with some light physical activity. She recommends we stretch, jog around a little, and warm up with some simple yoga poses such as the surya namaskar because when our body relaxes, it’s easier to relax our minds as well. Also since light exercise helps with our blood circulation, when we sit to meditate we will be more alert and less likely to slip into stupor. Chants and sound vibrations Breathe better and you will live better, they say. So it is no surprise that breathing is a very important aspect of meditation. It is believed to be the bridge between your body and your mind. If you learn to regulate your breathing, you can regulate your mind and emotions as well. Lamichhane explains that they specifically conduct multiple day sessions to teach their students the right breathing techniques as well as brief them about its importance. There are said to be many unique rhythms of breathing that are associated with different forms of meditation. For those who are trying meditation on their own though, Lamichhane suggests chanting. Even at The Art of Living sessions, they tend to give a mantra to each participant. It has been found that sound vibrations help people get into meditation much more effectively. “We have many layers of consciousness and chants affect them in a positive way,” says Lamichhane adding that sound vibrations help suppress and shake off unwanted repetitive thoughts that tend to plague us on a daily basis. So she concludes mantras can be used as a tool to aid our meditation sessions.
https://myrepublica.nagariknetwork.com/news/beginner-s-guide-to-meditation/
: CSC 0018 Title : Malaysia's National Cyber Security Policy: The Country's Cyber Defence Initiative Author/s : Mohd Shamir Hashim Abstract : The launching of Malaysia's Vision 2020 mark the country's journey towards becoming a developed nation and embracing the knowledge- based economy as a mean of achieving it. By consciously choosing to utilize the information and communication technology as a tool for development, it has resulted in the increasing use of digital information systems throughout the industry, the private and public organizations and the society at large. However, the dependency on digital information systems bring with it escalating vulnerabilities and risks, especially to the Critical National Information Infrastructure (CNII) which among others include cybercrimes such as Hacking, Intrusion, Fraud, Harassment, Malicious Code and Denial of Service Attacks. Acknowledging the growth of cyber threats that are endangering the e-Sovereignty of the nation, a cyber security policy was put in place. The National Cyber Security Policy (NCSP) is Malaysia's comprehensive cyber security implementation to be done in an integrated manner to ensure the CNII is protected to a level that commensurate the risks faced. Cutting across the government machineries, the implementation has drawn in various ministries and agencies to work together to meet the vision of having a CNII that is secured, resilient and self reliant that will eventually promote stability, social well being and wealth creation for the country. After 4 years of the NCSP implementation, the Malaysia's cyber security is now being looked as something to be reckon with. Much has been done and more need to be done as the landscape of cyber threats changes with the development of new technologies and tools. Successfully implemented, Malaysia's CNII will be better placed to meet the challenges and opportunities that technological advancement brings and that it will help to achieve the objectives of Vision 2020 and beyond. Publication : Proceedings of the 2011 Second Worldwide Cybersecurity Summit Year Published : 2011|1-7|IEEE Conference Proceeding PDF / Official URL :
https://www.cybersecurity.my/en/knowledge_banks/journal_conference/main/detail/2397/index.html
The electronic medical records market in the United States generates over $25 billion in revenue a year. However, many voices are now being raised, given the number of repeat errors which are endangering not only the overall standard of care given to patients but also their lives. Driven by the Obama administration’s initiative to encourage nationwide use of Electronic Medical Record (EMR) systems by 2014, a growing number of US healthcare professionals are speeding up the digitization of their data processing services. According to a recent report by global management consulting firm Accenture, over 93% of the US doctors surveyed are already using EMR systems and half said they regularly access clinical data from outside their own organization, using Health Information Exchange (HIE) tools. However, at a time when the US Federal Drug Administration (FDA) has already warned electronic medical device manufacturers about the need to design more security into their products so as to counter the risk of cyber-attacks, a number of recent reports have been highlighting a variety of problems encountered during the transition to open digital processing of medical data. In many cases, these imperfections constitute a threat either to patients’ data privacy or to their actual health. Repeated anomalies, communication failures Taking medical records into the digital era in the United States has resulted in a large number of reported incidents, as recognized by the American College of Emergency Physicians. Inadequate software programs have for instance led to “wrong order-wrong patient” type errors and “poor data display” among other shortcomings. In Pennsylvania, the authorities noted that the number of errors linked to the use of EMRs is on the increase, rising to 1,142 in 2011, i.e. double those reported in 2010. In the latest example, the UnitedHealth Group recalled all its digital health record software – Picis ED PulseCheck – which is used in over 20 US states, because of an error that caused doctor’s notes on patient prescriptions to drop out of their files. The main reason for the errors observed appears to be the learning curve of healthcare staff, who were not entirely comfortable with the digital tools they needed to use for EMR processing. A report published recently by Bloomberg News indicates that the most dangerous time when patients are exposed to potential failures in the system appears to be immediately after a facility installs the new technology; after the initial adaptation phase, the number of systems irregularities drops significantly. Nevertheless, it is often difficult to trace a failure back to its source, i.e. basically to distinguish between human error and a fault in the system. Moreover, there is a shortage of feedback. First of all, the FDA does not impose any transparency rules on EHR users; and secondly many doctors complain that it can even be impossible to raise alerts on problems detected because of the ‘gag clauses’ in some software providers’ contracts that prevent medical practitioners from giving honest feedback on areas in need of improvement. Results still impressive However, it seems that the technological transition and the time necessary to train healthcare professionals are the main causes of error, and that mistakes are rarely due to inherent software problems. Meanwhile the new EMR approach to medical data processing is bearing real fruit. Two studies published this week in the Journal of the American Medical Association highlight the improvements brought about by this new data processing technology. The first study, carried out by California-based Kaiser Permanente, analyses the impact of EMRs on the health status of diabetics and reports that, post the transition to electronic processing, the number of A&E admissions and overall hospitalization fell by over 5%. Along the same lines, another study carried out in Finland underlined how effective EMRs were in helping to detect malformations in young children.
https://atelier.bnpparibas/en/smart-city/article/emr-room-improvement-digital-medical-data-processing
Providing an attachment friendly community which fosters warmth with high boundaries so that all can achieve to their full potential. Providing an attachment friendly community which fosters warmth with high boundaries so that all can achieve to their full potential. We are proud to be a Rights Respecting School (Level One). The Rights Respecting Schools Award focuses on children’s rights in schools and takes a whole-school approach to child rights and human rights education. Child Rights Education (CRE) can be defined as learning about rights, learning through rights and learning for rights within an overall context of education as a right. It aims to build the capacity of children and young people as rights-holders to claim their rights, and the capacity of adults as duty-bearers to fulfil their obligations. Child rights education helps adults, children and young people to work together, providing the space and encouragement for the meaningful participation and sustained civic engagement of children and young people. Achieving the award has helped our pupils create a safe and inspiring place to learn, where pupils are respected, their talents are nurtured and they are able to thrive. Pupils are also given the opportunity for the best chance to lead happy, healthy lives and to be responsible, active citizens. Benefits form being involved in the award has seen We are in the process of developing further and achieving the Level 2 Right Respecting Award. This award is the highest level of the Award and is granted by Unicef UK to schools that have fully embedded children’s rights throughout the school in its policies, practice and ethos, as outlined in the four standards. Achieving Level 2 means there is evidence that Hope School have met the Level 2 Expected Outcomes and that: The Unicef UK Rights Respecting Schools Award (RRSA) supports schools across the UK to embed children’s human rights in their ethos and culture. The award recognises achievement in putting the UN Convention on the Right of the Child (UNCRC) at the heart of a school’s practice to improve well-being and help all children and young people realise their potential. The award is based on principles of equality, dignity, respect, non-discrimination and participation. The initiative started in 2006 and schools involved in the Award have reported a positive impact on relationships and well-being, leading to better learning and behaviour, improved academic standards and less bullying. Article 37: Children must not be tortured, sentenced to the death penalty or suffer cruel or degrading treatment or punishment. Children should be arrested, detained or imprisoned only as a last resort and for the shortest time possible. They must be treated with respect and care, and be able to keep in contact with their family. Children must not be put in prison with adults. Article 42; Governments must actively work to make sure children and adults know about the Convention.
https://www.hopeschool-liverpool.co.uk/right-respecting-schools-award/
Aldea, Mihaela and Petrescu, Florian and Parlow, Eberhard and Iacoboaea, Cristina and Luca, Oana and Sercaianu, Mihai and Gaman, Florian. (2016) Demonstrative potential of multitemporal satellite imagery in documenting urban dynamics: generalisation from the Bucharest city case. In: Fourth International Conference on Remote Sensing and Geoinformation of the Environment (RSCy2016). Bellingham, Washington, pp. 9688-9629. Full text not available from this repository. Official URL: http://edoc.unibas.ch/53392/ Downloads: Statistics Overview Abstract The main objective of this paper is to demonstrate the potential of multitemporal satellite imagery to be processed and used in documenting urban changes that took place over time, with limited resources involved and taking advantage of the opportunity to be able to use the satellite imagery available as open data. The possibilities to analyse and compare the written literature regarding the chronological evolution of a city with the patterns of Land Use/Land Cover obtained from the processing of satellite remotely sensed images of the respective scenery were investigated based upon a case study of a selected city. The extent of the prospects of using remote sensing based methods and multitemporal satellite imagery is also expressed as a result of this investigation.
https://edoc.unibas.ch/53392/
Decades of unproductive monetary [and fiscal] policies have encouraged tremendous misallocation of capital, as evidenced by an estimated underinvestment gap of c.$400trn in the past half century. Accomodative monetary policies across major econoomies, such as the USA, the UK and the EU, were in part necessary to mitigate the economic impact of the global financial crisis. However, when interest rates fall to zero or near zero, it signals that we are approching the end of a long-term debt cycle (which usually lasts between 50-75 years). This also suggests that the economy is close to peak capital misallocation within the cycle. The net result of capital misallocation due to [too] easy moentary policy is a distortion of the fundamental function of the economy – which is to facilitate progress through innovation and wealth creation. Across developed countries, especially in the US, we now have for the most part a ‘monetised’ economy which is kept alive by historically low interest rates and ever more debt – in other words, economic growth has been subjugated to monetary expansion. This creates an illusion of prosperity and also prevents the economy from performing its fundamental function, which requires capital to be allocated productively over the long-term. If we look at the US economy from a high level perspective, things don’t look too bad – for example, the US household and nonprofit orgarnisations’ net wealth in Q1 2019 was about 500% of nominal GDP. However, as Ray Dalio suggests, we can get a better understanding of a situation when we look at it more granularly – and when we do that, we can see clear signs that the economic system is malfunctioning. Going forward, it will soon become a non-viable option that economic progress ought to be scarified for political capital. In other words, our political leaders are running out of trade-offs – the economy needs to be cleared of unproductively allocated capital. If our leaders do not do it proactively, eventually the system itself will – indeed, this process has already begun: Brexit, the election of Donald Trump, as well as the “yellow vests” protests in France, Belgium and Netherlands are clear signs of this. This paper was last updated in July 2019. The economy and its function In our world, different markets bring together buyers and sellers that exchange money and / or credit for goods, services or financial assets. The total number of transactions across all markets make up the economy. Economic actors engage in transactions motivated by various self-interests (which can be rational, emotional or a combination of both). When these economic actors are free to make their own decisions, regardless of what the self-interests are, both buyers and sellers must believe that they will be better off as a result of completing the exchange (transaction), otherwise there will be no point in entering in one . An aside: the fact that the government is an economic actor is self-evident – Keynes suggested that the government could stimulate economic growth by spending (i.e. pursuing an expansionary fiscal policy). Although it was an appropriate solution at the time when “The General Theory of Employment, Interest and Money” was published in 1936, over time it became a problem – the role of the government was and still is to set the rules of the ‘game’, not to play the ‘game’. If you have an institution that can both set the rules and also engage in the activities governed by these rules, there is a chance that the institution will tilt the rules towards its own interests of doing well in the game. However, we risk digressing too much and therefore, we will return to the main argument now. It is from this intrinsic belief, namely that our lives will be improved as a result of completing a transaction, that we can deduce the function of the economy – over time, as economic actors seek to improve their living standards, they aim to do things better, i.e. more efficient. Aiming for more efficiency eventually produces Schumpeter’s creative destruction, which ensures that complacency is removed by innovation and unproductive activities and enterprises are replaced by productive ones. As my favorite Red Hot Chilli Peppers song, Californication, goes on to say – “Destruction leads to a very rough road but it also breeds creation”. The net result of this is progress through innovation and wealth formation (i.e. more ownership / stake in the economy and the wider society). However, we need to acknowledge that there were, still are and will continue to be people that push our civilisation forward through their contributions, who are not necessarily motivated by a desire to better their own lives; rather these people are moved by sheer curiosity and creativity – the intellectual instinct to explore and the imaginative drive to create are powerful influences on human behaviour that can manifest at the expense of nearly all other motivations, including that of survival in some cases. That said, improving one’s living standards is what motivates most economic actors, as far as we can observe. For the economy to ensure progress through innovation and wealth creation, it needs a production structure that efficiently employs resources (capital). ‘Efficiently’ means productively – in other words, using resources must [eventually] deliver to the economy a benefit larger than the cost of obtaining, manufacturing and utilising them. There are various factors that determine whether capital is being employed efficiently or not, including fiscal policies (what the government does) and monetary policies (what the central bank does). Of course, there are other elements that influence capital allocation within the economy but these two factors in particular have the biggest impact on the behaviour of private economic actors that produce and consume – companies and households. Although we will focus in this article primarily on monetary factors (interest rates and money supply), it is important to understand that monetary policy is not entirely a-political and it is indeed closely connected to fiscal policy. Interest rates There are many theories that try to explain what interest rates are. For example, the marginal productivity theory, developed by American economist John Bates Clark in The Distribution of Wealth (1899), implies that the interest is paid because capital is productive – the more productive the capital the higher the interest rate paid on it. Another explanation of interest rates comes from Knut Wicksell who, in his seminal work Interest Rates and Prices (1898), differentiated between the natural (real) interest rate, which is the by-product of supply and demand forces for goods (and services), and the rate that can be observed on credit, which is an entirely financial construct. Wicksell called this financial entity, the monetary (nominal) interest rate. However, as Yogi Berra said: “In theory there is no difference between theory and practice. In practice it is.” Therefore, in discussing interest rates we will look at their practical use, taking inspiration from Ray Dalio’s How the Economic Machine Works; as such, interest rates are the cost of servicing debt, the amount paid on cash deposits and the rate at which the future value of cash flows from assets such as stocks is discounted back to the present. As a general rule, lowering interest rates makes servicing debt less costly, diminishes the amount savers get from cash deposits and boosts the present value of future cash flows. The converse is true when interest rates are increased. Therefore, all else being equal, at a macroeconomic level, lower interest rates encourage more spending and less saving, stimulating demand and, as a result, uplifting economic growth – higher interest rates have the reverse impact. We can think of interest rates as signals that direct the flow of money and credit across financial markets and different parts of an economy, both within mainland and cross-border. Money supply Another important monetary factor that impacts economic development and growth is money supply or, more specifically, broad money supply. The relationship between GDP and money supply is expressed by the following equation: MV = PT (or the quantity theory of money, developed by Irving Fisher). M is the quantity of money, V is the velocity of money in circulation, P is the price level and T is the volume of transactions. For practical purposes, the equivalence can be re-written as: Growth in money supply x Velocity of money (the speed at which one unit of currency changes hands in an economy) = Inflation x Growth in real GDP; or: Growth in money supply x Velocity of money = Growth in nominal GDP. Research done by the Institute of International Monetary Research demonstrates “a clear link in the last 30 years […] between the rates of increase in money (broadly-defined, to include all or nearly all bank deposits) and in nominal gross domestic product across the G20 leading nations”. For the mathematically inclined readers, the relationship can be expressed as: ∆% NGDP = 0.78 + 0.91(∆% Broad Money), with an R-squared of 0.98. Consequently, if the money supply drops, nominal economic growth also suffers – this was also very clearly demonstrated by Milton Friedman and Anna J. Schwartz in A Monetary History of the United States 1867 – 1960, in which they showed that a key cause of the USA’s 1929-1933 Great Depression was a c.40% fall in broad money supply. However, Friedrich Hayek argued that when money supply rises faster than potential nominal GDP, asset values rise in absolute terms and relative to income – this induces a boom as economic actors gear up to buy, build and service assets. The reverse happens when money supply grows slower than potential nominal GDP. Therefore, taking inspiration from research produced by the MacroStrategy Partnership, the above equation can be re-written as: Asset velocity x Money velocity x Money supply growth = Asset inflation x Price inflation x real GDP. ‘Economic monetisation’ The term ‘economic monetisation’ describes the shift in the drivers of economic growth, away from saving and investing and towards an approach to capital allocation dependent on debt growth and accommodative monetary policy. In response to the 2008 global financial crisis (GFC), central banks across the world were required to act fast and prevent what could have been a far worse financial and economic outcome. Of crucial importance to our discussion is what the big 5 central banks have done, especially the Federal Reserve (Fed) – the reason for focusing on the Fed is based on the global status of the USD as reserve currency, as well as on the multi-trillion offshore USD economy that has grown over the past 50 years. In response to the crisis, the Fed lowered short-term interest rates to near zero. However, as Glenn Rudebush’s December 2018 Economic Letter tells us, this was not enough: “…during the global financial crisis and Great Recession, the Fed again cut the funds rate a bit more than 5 percentage points. However, given the much worse economic conditions, the usual response wasn’t nearly enough. With the unemployment rate reaching 10% in 2009, the simple policy rule would have prescribed much more monetary policy stimulus – indeed, an additional 7 percentage points of interest rate cuts…Unfortunately, the Fed was limited from lowering the funds rate further because of an effective lower bound on interest rates near zero…”. He continues: “The shortfall between what the Fed could deliver with conventional policy and what seemed appropriate given the dire economic conditions prompted the Fed to employ unconventional monetary policy tools. While conventional policy employs a short-term interest rate to affect financial conditions and the economy, unconventional monetary policy uses other tools to do so. The Fed employed forward guidance and quantitative easing as these unconventional policy tools.” The main reason why lowering interest rates did not work was because the mechanism of transmition between monetary policy and the real economy, i.e. the banking system, was insolvent – banks across Western economies were unable to lend to businesses and consumers and therefore, unable to support money supply growth. As we know from the quantitative theory of money, a declining money supply eventually means a declining nominal GDP. Consequently, to prevent economic collapse, while also allowing the banks to recover by recognising bad loans and recapitalising their balance sheets, the Fed drastically eased monetary policy – not only by cutting short interest rates but also by expanding its balance sheet through the acquisition of Treasuries, Agency debt and Mortgage-backed securities from financial institutions (both banks and non-banks). The Federal Reserve has done this through three rounds of QE (QE1 from December 2008 – March 2010, QE2 from November 2010 – June 2012 and QE3 from September 2012 – October 2014) and Operation Twist (September 2011 – December 2012). To contextualise just how much liquidity has been pumped into the system via these actions, in 2008 the Federal Reserve’s balance sheet stood at c.$900bn, or 6% of the US GDP. In December 2017, it reached a peak of c.$4.5trn, or roughly 25% of the US GDP. Although over the past 24 months the Fed has tightened monetary policy by both normalising its balance sheet and raising interest rates, the three QE programmes coupled with ultra-low interest rates represented huge injections of liquidity – and a much needed one. However, as we shall see it has had severe unintended consequences. There are good reasons to suggest that the Fed kept its monetary policy accommodative for too long. We can measure excesses caused by “too” easy monetary policy by taking money supply growth relative to potential nominal GDP. M2 money supply (the broadest measure on which data is available) has been above the potential nominal GDP for the best part of the last 10 years. Keeping interest rates down artificially has severe negative consequences for the economy. Ludwig von Misses pointed out in Human Action – A Treaties on Economics that “the drop in interest rates falsifies the businessman’s calculations. Although the amount of capital goods available did not increase, the calculation employs figures which would be utilizable only if such an increase had taken place…They make some projects appear profitable and realizable which a correct calculation, based on interest rate not manipulated by credit expansion, would have shown as unrealizable.” In other words, low interest rates can make unproductive businesses look like gold mines, creating a zombie economy. These are a massive drag on productivity, meaning that future growth will be dependent on even more [cheap] debt. Also, the bull runs in equity and credit markets that subdued interest rates fueled have helped the financial sector across the developed world to grow dramatically over the past 3 decades. This can be problematic for the economy as financial firms compete with the rest of the industries for resources: for example, a physicist whose R&D may improve efficiency of airplane engines, lured by higher wages in a growing financial sector, is now employed to develop systematic strategies for hedge funds. This can further drag on productivity in the long-term as human capital migrates more and more towards finance, depleting the talent pool for other R&D-focused sectors. Another issue posed by low interest rates is that they distort the consumption preference of economic actors – consumption is an inter-temporal decision: subdued interest rates discourage deferred consumption (savings) and encourage present consumption, likely fuelled by cheap credit. This kind of economic behaviour can create all sorts of problems, such as bubbles across asset classes and speculative capital allocation at the expense of disciplined, wealth-creating investment. This is exactly what has happened since the financial crisis of 2008 – the US corporate sector’s debt reached $6.4trn in Q1 2019, up from $3.3trn in Q4 2007, while America’s public debt stood at $22trn in Q1 2019 vs. $9.2trn in Q4 2017. Also, credit card liabilities reached $1.04trn in September 2018, surpassing the $1.02trn level of 2008. However, debt in itself is not an issue – as Ray Dalio argued in A Template for Understanding Debt Crises, whether debt becomes a problem or not hinges on a) what that debt produces and b) how it is serviced. In other words, it depends how debt is allocated – productively or not. This will ultimately dictate if the return on debt is high enough to service it or if new debt needs to be issued to service the old one, a process which eventually hits a wall and defaults start to unfold, marking the start of the end of the debt cycle. There are several ways we can assess whether or not credit was productively allocated. One of them is to look at how fast the debt has been growing relative to a measure of income (such as GDP, at a national level). The chart below is for the US (source: Fred). Additionally, looking at the total debt in the US (public plus private debt) it stood at 1.3x its GDP in Q1 2019. As research from the MacroStrategy Partnership suggests, another way to look at whether debt resulted in misallocation of capital is to look at the Wicksell spread – Knut Wicksell argued that when the borrowing costs for the average business are 2% above nominal GDP (to compensate for a) the risks of the investment and b) unproductive government spending) monetary policy is neutral. When borrowing costs fall below the 2% figure, funding becomes cheap and it induces a boom – but it also incentivises misallocation of capital. We can see from the chart below that the spread has been below the neutral line for monetary policy for quite some years now. This accommodative interest rate environment has manifested while the Fed was also injecting massive amounts of liquidity into the system. However, QE was necessary as the golden rule for a central bank when dealing with an insolvent banking system is to provide liquidity so that the banks recognise losses and then recapitalise their balance sheets – eventually, the banks will recover and will start lending to the economy. However, banks got ‘repaired’ back in early 2014 and we know this because they started lending again. A quick gander at US bank lending data shows that loan charge-offs lowered close to a pre-crisis level, while bank lending picked up (between January 2014 – September 2018, loans issued by US banks to corporates and consumers grew by c.$983bn). That means that the Fed’s QT was about 3 years overdue. However, we need to give credit where credit is due! In the words of Ray Dalio: “…investors only have to understand how the economic machine works and anticipate what will happen next. Policy makers have to do that, plus make everything turn out well—i.e., they have to know what should be done while navigating through all the political impediments that make it so hard to get it done. To do that requires a lot of smarts, a willingness to fight, and political savvy—i.e., skills and heroism—and sometimes even with all those things, the constraints under which they work still prevent them from being successful.” The injection of USD into the system through QE was not only a saving potion for the US markets (and economy) but for the rest of the world economy as well. When USD liquidity is abundant, the greenback weakens, boosting international trade and commodity prices and supporting financial assets rallies. That said, if policymakers keep these accommodative conditions for longer than needed excesses start to form across the financial system and the economy. Remember that QE was there primarily to ensure that money gets injected into the economy while the banks repaired their balance sheets and started lending again – bank lending is the ‘natural’ way for money supply to grow. As the data above points out, US banks reclaimed their economic function in 2014. Nevertheless, we can see several signs of excesses across financial markets and economies that can be attributed primarily to easy monetary policy. The first one was mentioned above – money supply has been running above nominal GDP for a while: this provides excess liquidity to support overvalued assets and / or unproductive ventures. Another sign of misallocation of capital can be seen in the US corporate sector that geared up and bought back shares like there was no tomorrow. Take for example Apple, which repurchased $43.5 billion of its own stock during the first six months of 2018 (according to The New York Times). But Apple is not alone – data from Goldman Sachs reported in August 2018, shows how companies in the US technology sector have accounted for 40% of authorized spending on buybacks so far in 2018. To contextualise this, US corporates have authorised $1trn of buybacks for this year (if executed, this would represent a 46% rise on the previous year). Importantly, companies have been doing this at the expense of investing in their own businesses. Additionally, Morgan Stanley reported in May 2018 that the amount of leveraged loans in the US reached $1trn (this represents 102% increase from the amount seen in 2010). Meanwhile, a more recent report from the Bank of England suggests that there are as much as $2.2trn of leveraged loans globally. Leveraged buyouts (LBOs) levered over 6x are now at a similar level (52.3%) as a percentage of new LBO loans as they were in 2007 (50.7%), based on the same research note from Morgan Stanley. These excesses are a by-product of the ultra-easy monetary policies pursued by central banks for longer than necessary. These are just a few pockets of excesses – not to mention bitcoin (not blockchain) and the red hot housing markets in Canada, Australia, Norway, Honk Kong and London. For all of this to be sustainable, i.e. for things to continue as before without major shocks, the Fed needs to keep monetary policy accommodative. However, this subjugates real economic growth to monetary expansion. Under these conditions, wealth is increasingly an illusion of prosperity. (US household) wealth is an illusion There is a lot of discussion of what precisely constitutes wealth. Our interpretation is that wealth is synonymous to having a stake in the economy and society – the larger the stake, the wealthier you are. For example, owning a house will give you a stake in the broader economy, in your neighbourhood, in the city you live in, in the country you are residing and so on. Therefore, viewed from this perspective, wealth consists of property, equity (shares in companies), bonds (money you lend to others that put it at work for the economy to develop and grow), real estate and relationships (personal and professional). The latter element is not quantifiable but is, in our view, a catalyst for acquiring the other three elements of wealth, which are calculable. An alternative way of thinking about this is to view wealth as claims on future income streams (dividends from stocks, interest payments from bonds and rents from properties). In the US, the households’ net wealth was c.500% of nominal GDP as of Q1 2019 – way above the long-term trend of this ratio. As Niels Jensen of Absolute Return Partners notes in his December 2018 letter, “the US long-term mean value is around 380%; i.e. total US household wealth is on average about 3.8 times US GDP. The mean value varies somewhat from country to country, but it is long-term stable everywhere. Think of the ratio as a measure of capital efficiency, i.e. how much capital does it take to produce one unit of output? The lower the mean value, the more efficient a country is at utilizing the capital at its disposal…it must drop 25-30% to re-establish the long-term mean value. That can happen in two ways. Either GDP grows faster than wealth for an extended period of time, or 25-30% of all US household wealth is destroyed.” Why is the household wealth so elevated? We think that expansionary monetary policy increases and supports inflated asset prices. The reason behind this observation was accurately underlined by Murray Rothbard in Man, Economy and State: “The individuals who receive the new money first are the greatest gainers from the increased money; those who receive it last are the greatest losers.” The first to receive money were banks and asset managers. When the Fed bought securities from the banks, it increased the banks’ excess reserves at the central bank – these cannot be used to issue loans to the economy and therefore, these purchases do not increase money supply in a direct manner. But they can do so if these excess reserves are used to satisfy demand for cash. However, when the Fed bought securities from non-banks, like pension funds and money managers, it increased these institution’s deposits at their respective banks and, as a result, it boosted money supply. With this additional purchasing power, these economic actors bought more financial assets, bidding up asset prices. The last to receive the cheap money was labour: the share that workers take home, as a % of GDP, has been declining since the 1970s. However, it has fallen of a cliff after the 2008 financial crisis and, nearly ten years later, it barely improved – up a mere 1.1 percentage point in 2017 from the lows of 2014. Therefore, Rothbard’s observation points to another problematic outcome as a result of easy monetary policy – it widens the wealth gap: those that can make use of cheap money earlier in the process have bought goods and services, thereby increasing their stake in the economy (i.e. their wealth). As they buy more, prices start to rise across the economy. However, those who received the cheap money later on (or never) have seen their wealth stagnate or even decrease, as they couldn’t keep up with the overall price increases. Some might be sceptical of such inflation as we’ve only started to see inflation, in the traditional sense, emerge over the past few 18 months or so in the US – but that’s because the typical measures of inflation like CPI do not include financial assets. In fact, if we look at the NY Fed’s inflation gauge, which includes financial variables, it has been above 2% for some time now! Inflation can occur in relatively isolated pockets of the economy, such as its financial sector or the housing market – indeed, if we look at the general increase of prices in the sphere of financial assets, inflationary forces are clear: this cycle has seen the longest bull market in recorded financial history – the S&P 500 has delivered a c.287% total return from July 2009 to July 2019 (with dividends reinvested); fixed income products also delivered good results, with the 10-year US Treasury yield being in decline for more than 3 decades, while commercial and residential real estate have recovered nicely since the financial crisis. These three assets – property, stocks and bonds – are the most common ones on US households’ balance sheets. As such, we argue that the 500% of wealth to GDP ratio is primarily due to inflated asset prices as a result of accommodative monetary policy. The link between changes in money supply and national income and wealth are very well documented by Professor Tim Congdon in his video “Can monetary policy became ‘exhausted’?”. Another way to think about wealth-to-GDP is to change wealth for capital and GDP for output. By doing that we arrive at the capital-to-output ratio first expressed by Paul Douglas and Charles Cobb in the 1920s: a capital-to-output ratio of 500% means that in order to produce $1 of output, the economy requires $5 of capital (up from the long-term norm of $3.8). This is another sign of weak productivity caused by capital misallocation. The situation is more worrying when we consider the massive underinvestment gap which the MacroStrategy Partnership estimates to be about $400 trillion globally (or about 5 years of global GDP) – this is the amount of money that is needed to take GDP growth back to levels seen in 1950s and 1960s. Easy monetary policy coupled with underinvestment means that economic growth is supported by debt and, when this debt will no longer be sustainable, capital consumption will required to sustain GDP growth in absence of a boost in productivity. In time, if these conditions are allowed to prevail, they will cause GDP not only to slow but to eventually turn negative. We are now living under an illusion of prosperity – too many economic actors are focused on short-term consumption and have become accustomed to cheap debt funding. Indeed, we have many goods around us that we can buy; but what about their utility? What about the costs in making these goods? Have they paid for themselves? An economy with chronically low productivity, depended on low interest rates to serve a titanic amount of debt and with a labour force that has taken home less pay over the years would suggest that the answer the these questions is a clear “No”. The unrest in France, which is spreading to Belgium and the Netherlands are the latest signs that the economic system is no longer delivering for people – the first indications of this were Brexit and the election of Donald Trump. We believe that tensions will only increase from here until the large amounts of misallocated capital are cleared. What does it mean to investors? No imbalance can prevail forever – sooner or later the system will correct it, either proactively, i.e. through political and economic action or forcefully, i.e. through social unrest, forced debt restructuring and abrupt changes in political leadership. There are many factors at play that can see a correction of economic imbalances in a chaotic manner. That said, investors can hedge against these events.
https://power-of-ideas.com/the-wealth-illusion/
Welcome to Codidact Meta! Codidact Meta is the meta-discussion site for the Codidact community network and the Codidact software. Whether you have bug reports or feature requests, support questions or rule discussions that touch the whole network – this is the site for you. Randomize order of answers with same score Answers are shown in order according to their score derived from their votes. However, for answers with the same score, they seem to be shown in chronological order of creation time. This tends to "feature" earlier answers higher than later answers, even if the later answers have been rated the same by the community. It would be better if the display order of answers with the same score were randomized. Or perhaps a small random amount is added to the score of all answers for the purpose of sorting them. That might cause slightly lower rated answers to occasionally be featured above other answers. The purpose of featuring answers on average according to their score only, not creation date, is so that votes become more representative of their quality. It was pretty clear from another Q&A site that upvotes on good answers were influenced by how they were featured. This is not a high priority, but I would like it to at least be on the eventual plan. 0 comments 1 answer Since it's easy: yes, done - going live in the next build. 3 comments Does MVP remain "We order answers by score, with newer answers winning ties." ? @pnuts: That would be favoring newer answers. The system should strive to not add bias to the voting. @OlinLathrop Agreed. Mild concern is a common "ideal", which both implementations strive for (that's @luap42 20200707 on Discord about C# and Qpixel), and MVP was (s/h been?) consensus, whereas above looks unilateral.
https://meta.codidact.com/questions/277855
Disruptive innovation has become a chewing gum in the mouths of the CEOs of small and big companies. Everyone wants to be a “disruptor” regardless of their market positioning or innovation approach. Unfortunately, disruptive innovation has also become a buzzword haunting the theoretical, practice-relevant and practical work of design and innovation academics who can be broadly placed in the field of system innovations and transitions for sustainability. I am not intending to argue against the general usefulness and relevance of the term within the mainstream management theory and practice. Instead I’d like to argue against its use in the context of system innovations and transitions for sustainability and propose that we use “discontinuous innovation” instead. The following paragraphs have a go at why. The term “disruptive innovation” was coined by Clayton Christensen in his seminal book “The Innovator’s Dilemma” in 1997 (Christensen, 1997). Hoping to avoid any injustice to the intricacies of his theory, my simplified understanding of Christensen’s use of disruptive innovation puts emphasis on business model innovation (i.e. organizational innovation) by adoption and use of new technologies for offering new products/services that’ll meet the anticipated needs of users instead of focusing on meeting the current needs as an innovation strategy. This we understand as design researchers and practitioners very well albeit implement only occasionally. One could argue even, the whole premise of the non-diluted version of design thinking movement is based on this approach to innovation. If you’re not inclined to read Christensen’s book but would like to develop your understanding based on primary source, Harvard Business Review has an article in this month’s issue (Christensen, Raynor &McDonald, 2015) (in which the authors complain about the misuse of the term and how it has been made meaningless – just like what happened to “sustainability” and “resilience in the hands of greenwashers and whitewashers). The theory of disruptive innovation is very relevant to system innovations and transitions as it explains how niche innovations can become successful and take over the incumbents (at least within the dominant economic paradigm). Nevertheless, the emphasis is on single companies and the “disruption” is not necessarily disruption at the level of socio-technical systems. The chances of a particular disruptive innovation being a significant factor –a core cause- in systemic transformations at the level of socio-technical systems is low, although, considered within the dynamics of a socio-technical system, one disruptive innovation may trigger a series of changes over time that could eventually add up to a systemic transformation. Disruptive innovation theory is somewhat congruous to the multi-level model of system innovation and these two could be integrated for a better leveraging of the niche-level. I’ll leave thinking of potential alignments of two theories to another time and move on. Discontinuous innovation, although also a management buzzword, hasn’t made the mark disruptive innovation has, perhaps because no Harvard professor has yet written a book about it. According to the “lexicon” of the Financial Times, discontinuous innovation and radical innovation are synonymous and point to: “a paradigm shift in science or technology and/or the market structure of an industry”. Garcia and Calantone (2002), on the other hand, provide a more nuanced explanation and articulate that discontinuous innovations may be radical innovations or really new innovations depending on which level they influence (firm and the customer, i.e. micro, or the world or whole industry and market, i.e. macro) and whether they affect marketing or technology S-curves or both. According to them, radical innovations create discontinuity both at micro- and at macro-levels as well as embody new technologies and create new markets. On the other hand really new innovations create either technological or marketing discontinuity at macro- level and at micro-level they may create either or both (see table below). So, in this typology, the most common yet least acknowledged type of innovation –really new innovation- becomes visible and better articulated in terms of discontinuity. Nevertheless, the problem with innovation typologies developed in management and engineering disciplines perceives the world of innovation to consist of two dynamics, i.e. market and technology, and as only taking place in firms. When we talk about system innovations and transitions on the other hand, we include innovations in socio-cultural and politico-organisational contexts (i.e. individual and group behavior, business model, governance model, institutional set-up) and several other actors in addition to firms. Therefore, framing discontinuity in system innovations with a narrow set of parameters and with references to only one actor is not sufficient, however, the strength of the concept of discontinuous innovation as understood in mainstream theory comes from its acknowledgement of the contextual changes that an innovation may create in addition to changes within the organizational boundaries where the innovation took place. For this reason, discontinuous innovation as a concept is more promising in terms of being able to take into account the complex dynamics of socio-technical systems. Another reason for discontinuous innovation to be the preferred term in the context of system innovations and transitions is the implicational alignment of the concept of discontinuity with the required level of change for socio-technical systems to become sustainable (which is often referred to as “radical”) and the methodologies used in identifying the practical interventions necessary (mostly visioning and scenario development work to identify policy development and/or R&D investment requirements). I am hoping to write another post on creating imaginaries of discontinuities using these futures inquiry approaches in the near future. References I cited in this post: Christensen, C. M. (1997). The innovator’s dilemma: when new technologies cause great firms to fail. Boston, Mass.: Harvard Business School Press. Christensen, C. M., Raynor, M., & McDonald, R. (2015). What is disruptive innovation? Harvard Business Review, 93(12), 44-53.
https://idilgaziulusoy.com/tag/system-innovation/
Capstone Project to culminate learnings from UX Diploma Program at Brainstation. Overview GuideMe is a travel management app designed to alleviate the stress of organizing and planning a trip that many people go through. It allows travelers to consolidate their travel plans and creates an itinerary that’s appropriate for their needs. The traveler can upload their current itinerary and plans, search and add new places to their trip, and the app automatically generates an itinerary for them to follow. Design Process 01 Problem Space For this design challenge, I wanted to focus on something from my own experiences with planning travel. Normally when I plan a trip, I go through different outlets to find the information that I need. From looking for information about different places, to creating multiple spreadsheets to keep track of my plans, it’s always a hassle to keep track of all that information. I wanted to find out if other people struggle and deal with the same issues. Digital interactions are increasingly taking over the tourism sphere – more people are looking online to plan their trips. There is currently a plethora of platforms out there that deal with travel and tourism, from booking tickets to itinerary recommendations. Although this may be a convenience, travelers still have to keep track of all the information they find. Travelers also spend a lot of time planning their itineraries and routes, creating stress even before the trip starts. 02 Project Definition Goal The project should deliver a way for experienced travelers to easily manage their travel itinerary. The solution should be able to improve the way their travel information is organized, in a manner that is easy to follow, yet detailed enough to see all relevant information. Assumptions I believe that my users have a need to easily find and organize what they need when planning a trip. People want to be prepared before going on the trip, but are overwhelmed by the current way of managing trip plans. Project Hypothesis I believe that efficiently planning the travel itinerary for experienced travelers will allow them to spend less time gathering information on all aspects of their trip. I will know this to be true when people are less overwhelmed when planning for a trip. 03 User Research Determine how people plan their trips, Interview Insights 04 Personas 05 Experience Map 06 User Stories 07 Task Flow 08 Sketches 09 Prototype V1 Usability Testing Round 1 10 Prototype V2 Usability Testing Round 2 11 Final Prototype 12 Visual Identity I took the two main colours that I found and further refined the aRGB values to create a colour palette that fits the brand. After I was able to settle with two colour palettes, I then injected the palettes into a few screens to test if the colours work with the app layout. Accessibility As an aspiring designer, I learned about how it is a responsibility for a good designer to make sure that everyone has access to the things we create. Using the Stark plugin for Sketch, I checked the content on the app relative to the background colours to make sure it was WCAG compliant, at minimum to the 'AA' standard for the purposes of the content. Logo Behind every successful brand, there is some sort of ‘icon’ or graphic that represents and speaks to what the brand is. I explored ideas by looking into travel-related elements for inspiration. I decided to use the rigid Libre Franklin font for the app name in the logo to further emphasize the reliability of the app. 13 Final Design 14 Marketing Website 15 Multi- Platform Design As an experienced traveler, I want to determine the distance from the current location to the next location so that I know how far I need to travel. As an experienced traveler, I want to be able to know when I have visited a location so that I can keep track of where I've been. As an experienced traveler, I want to be guided as I follow my itinerary so that I know where I am at all times. Taking these user stories, I created user flows to identify how this functionality would look like. These are the concept screens for a smart watch and Tesla in-car display. 16 Design Impact & Future Thinking 17 Business Model 17 What I've Learned Doing usability testing during the design phases are crucial in learning how a potential user would react using the product. I learned that sometimes when I design an element or a task flow a certain way, it might not be how the user actually perceives it. Testing allowed me to see the things I couldn't see, and relinquishing my app to someone who hasn't been working on it for weeks provides a fresh set of eyes and perspective. One major area I struggled in was visual design. I do not have a graphic or visual background, so having an eye for colours and visual sense is not my strong suit. However, the UX/UI process encourages trial and error – to go through multiple iterations throughout the entire process, whether it be for wireframes or branding. This is an area that I look forward to improving in the future, and I am quite excited for the day when I don't have to struggle choosing between two shades of green.
https://www.albertly.ca/guideme
Using computer simulations, a team of astronomers found that when galaxies collide and form starbursts, the total number of star clusters decrease. Their research shows that smaller star clusters were effectively destroyed by the rapidly changing gravitational forces that typically occur during starbursts, while the brightest and largest star clusters were capable of surviving the galaxy collision due to their own gravitational attraction. Our Milky Way galaxy is surrounded by some 200 compact groups of stars, which, viewed through small telescopes, look like snowballs. These globular clusters are 13 billion years old, which is almost as old as the universe itself. Now a team of astronomers from Germany and the Netherlands have conducted a novel type of computer simulation. Their surprising findings: these giant clusters of stars are the only survivors of a massacre that destroyed their smaller siblings. Globular star clusters have a remarkable characteristic: the typical number of stars they contain appears to be about the same throughout the Universe. This goes against what is known about young stellar clusters in nearby galaxies, which can contain almost any number of stars, from less than 100 to many thousands. The team of scientists proposes that this difference can be explained by the conditions under which globular clusters formed early on in the evolution of their host galaxies. The researchers ran simulations of isolated and colliding galaxies, in which they included a model for the formation and destruction of stellar clusters. When galaxies collide, they often generate spectacular bursts of star formation (“starbursts”) and a wealth of bright, young stellar clusters. Therefore it was always thought that the total number of star clusters increases during starbursts. But the Dutch-German team found the opposite result in their simulations. While the very brightest and largest star clusters were indeed capable of surviving the galaxy collision due to their own gravitational attraction, the numerous smaller star clusters were effectively destroyed by the rapidly changing gravitational forces that typically occur during starbursts. After the starburst that lasted about two billion years had ended, the researchers were surprised to see that only star clusters with high numbers of stars had survived. These clusters had all the characteristics that should be expected for a young population of globular clusters, as they would have looked about 11 billion years ago. According to the simulations, most of the star clusters were destroyed shortly after their formation, when the galactic environment was still very hostile to the young clusters. After this episode ended, the surviving globular clusters have lived quietly until the present day. Most of a globular cluster’s traits were established when it formed. The fact that globular clusters are comparable everywhere thus indicates that the environments in which they formed were very similar, regardless of the galaxy they currently reside in. Be the first to comment on "Large Globular Star Clusters Survive Collisions, Smaller Clusters Do Not"
https://scitechdaily.com/large-globular-star-clusters-survive-collisions-smaller-clusters-do-not/
Do you remember Harambe, the 17-year-old silverback who was shot dead after a boy fell into the gorilla enclosure at the Cincinnati Zoo, Cecil, the lion who was shot with an arrow by an American dentist in Zimbabwe, and Marius, the giraffe who was killed and fed to other animals at the Copenhagen Zoo? Every once in a while, a news story about the human-caused death of an animal sparks global outrage, briefly lights up the comments sections on the internet, and reminds us of the inconsistency in how think about non-human animals. According to the Food and Agriculture Organization of the United Nations, we kill approximately two thousand animals for food per second, not including fish and other marine animals. All of these animals have rich emotional lives that matter to them, and what we do to them is as bad, and often much worse, than what was done to Harambe, Cecil, and Marius. Most farm animals are raised in filthy and unnatural conditions, and are subject to routine mutilations and other mistreatment. They are transported in ways that are at best unpleasant and at worst horrific, and they die violent deaths. Yet, most of us while expressing our moral indignation about the treatment of Harambe, Cecil, and Marius rarely spare a thought for the animals we eat. Morally speaking, there does not seem to be much of a difference between what happened in Cincinnati, Zimbabwe, and Denmark and what happens in factory farms and slaughterhouses in every part of the world, every day. If anything, there was a better reason to kill Harambe namely, to avert danger from a child than there is to kill animals for food. We do not need to consume animal products to live a healthy and fulfilled life. In fact, careful studies have found that a well-balanced plant-based diet decreases the chances of suffering from diseases such as diabetes, heart disease, stroke, and some cancers, and benefits the environment. The number of fish killed annually by the fishing industry, even on the most conservative estimate, is more than ten times larger than the number of terrestrial animals killed annually for food, and yet animal advocates largely focus on the latter in their efforts to reduce animal suffering. Bob Fischer (Wild Fish and Expected Utility) does the math and argues that considerations of expected utility call that focus into question. He concludes that animal advocacy organizations owe an explanation of why they are not directing more of their resources to fish. Akande Michael Aina and Ofuasia Emmanuel (The Chicken Fallacy and the Ethics of Cruelty to Non-Human Animals) challenge the common view that non-human animals are mere resources that we can use as we please, and ask whether Peter Singers ethics of animal liberation is a plausible alternative. They think it is not, in part because it denies moral status to non-sentient life, and take another approach that draws from Charles Darwins theory of evolution. They argue that cruelty to non-human animals, with whom they claim we are on an equal moral footing, betrays our trusting and neighborly relationship with them. Iván Ortega Rodríguez (Animal Citizenship, Phenomenology, and Ontology: Some reflections on Donaldsons & Kymlickas Zoopolis) provides a brief summary of the position Sue Donaldson and Will Kymlicka defend in their ground-breaking book Zoopolis, and argues that they are mistaken in failing to consider an important metaphysical difference between human beings and other animals. While human and non-human animals share a common environment, only human interaction constitutes what he calls a world. That difference, however, does not undermine the case for animal rights but rather strengthens it. Rhyddhi Chakraborty (Animal Ethics and India: Understanding the Connection through the Capabilities Approach) takes a critical look at a wide range of legal provisions in Indian law designed to protect non-human animals. She argues that, despite such provisions, nonhuman animals continue to suffer greatly at the hands of human beings in India, which is partly due to the lack of a comprehensive ethical vision. She suggests that the capabilities approach can provide such a vision, and concludes by making a number of policy recommendations to improve animal welfare in India. Robin Attfield and Rebekah Humphreys (Justice and Non-Human Animals) complete their argument for the claim that our treatment of non-human animals is a matter of justice, the first part of which can be found in the previous issue of this journal. I thank the contributors for choosing this journal to share their exciting ideas, and the reviewers for their insightful comments and suggestions. I am also indebted to Professor Shamima Parvin Lasker and Ms. Tahera Ahmed for their cooperation and trust. If you, dear reader, are new to the academic debate over the moral status of non-human animals, and if the two Bangladesh Journal of Bioethics special issues on animal ethics have made you curious, as I hope they did, I would like to recommend to you two classics of the animal ethics literature: Peter Singer, Animal Liberation: A New Ethics for Our Treatment of Animals (New York: New York Review/Random House, 1975); and Tom Regan, The Case for Animal Rights (Berkeley/Los Angeles: University of California Press, 1983). I hope you will enjoy reading through this issue, and I am sending you my warm regards. (c) Bangladesh Journal of Bioethics. Articles in the Bangladesh Journal of Bioethics are Open Access articles published under the Creative Commons CC BY-NC-ND License Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License. This license permits use, distribution and reproduction in any medium, provided the original work is properly cited, is not changed in any way, and is not used for commercial purposes.
https://www.banglajol.info/index.php/BIOETHICS/article/view/31077
Press release, June 16, 2021 Members of the New Yorker, Pitchfork, and Ars Technica Unions are proud to announce that a strike has been averted and that they have reached an agreement in principle on their first contracts with Condé Nast. The agreements include wage increases of up to 63 percent at The New Yorker, up to 58 percent at Pitchfork and up to 35 percent at Ars Technica. All three units will have a salary floor of $60,000 by the final year of the agreement. The agreements also include strict limitations on future health-care cost increases, defined working hours for salaried employees (a 40-hour workweek and an eight-hour day), a ban on nondisclosure agreements related to discrimination and harassment, and successorship provisions to help ensure that our members’ hard-won collective bargaining agreements will remain in effect if a publication is sold. The deal also includes: - Editorial integrity guidelines giving employees the right to withhold bylines from any story that is inaccurate or violates journalistic ethics, and to decline paid-advertising assignments. - Clear, consistent systems for freelancing that allow employees to take on outside work if it does not conflict with their jobs. - A ban on nondisclosure agreements that would prevent employees who believe they suffered workplace discrimination or harassment from speaking about their experiences, along with a contractual right for employees to have Guild representation in investigatory meetings when they raise complaints about harassment. - Job security in the form of a just cause clause, successorship language, enhanced severance for employees laid off out of seniority order, and strong coverage and jurisdiction provisions that prevent the company from weakening our bargaining units.
https://www.unifor2000.ca/strike-averted-new-yorker-pitchfork-ars-technica-unions-reach-agreement-with-conde-nast/
Innovation is the opposite of predictable, it’s messy. It almost never works out as planned and it takes a lot out of people. In most organizations a failed idea means getting fired. Which means people won’t be proactive and contribute ideas because of fear of retaliation. Still, leaders need to encourage and support it. How? When it comes to encouraging innovation in your organization, you need to flip how you view recognition and rewards. The problem is that the process of innovating is inherently imperfect. If you reward only success, you will get a lot less initiative because of the fear of failed outcomes. How do you encourage team members to be innovative knowing that their ideas will not all be successful? The answer is by rewarding the effort as much as the outcome. If you reward only successful outcomes, you will get very little innovative effort from your team. So, when the outcome is disappointing you need to follow steps similar to those used to handle flawed decisions: - Review the circumstances of the innovative effort with the team members. - Do not be critical. - Explain that your goal is to make sure everyone learns from the experience and that the outcome is better next time. - Drive the conversation toward what can be done differently next time to get a better outcome. - Make it clear that while the effort was not as successful as desired this time, you appreciate their willingness to be innovative and creative and want to encourage them to continue to do so. That’s it. Culture is what you celebrate and what you don’t tolerate. As stated before, culture is the single biggest driver of innovation. Thus, your culture must celebrate and reward effort as much as successful outcomes. Bottom line: Every time you find a better way to do something, you are being innovative. The cost of not improving is higher than doing nothing. The best leaders know this and encourage, support and reward their people for taking risks; not just when things go right but also when they don’t.
http://www.game-changer.net/2022/07/05/take-these-5-steps-to-encourage-team-members-to-be-innovative-when-their-ideas-are-not-successful/
Considering that the average person spends roughly a third of their lives sleeping, mattress cleaning is a necessary ritual. Although admittedly awkward and time-consuming, following this step-by-step procedure can make the task less daunting. General Cleaning What you will need: - Vacuum with upholstery attachment - Cold Water - Sponge - Mild DRY Laundry detergent - Upholstery shampoo - Electric fans (optional) - Shop vac (optional) The Cleaning Process: - Move your mattress away from walls, furniture, etc. and make sure it is accessible from all sides. - Using the upholstery attachment, vacuum the mattress thoroughly on BOTH sides. Some vacuums have attachments specially designed for mattress cleaning which are especially effective in removing dust and other particles because of their vibrating action. - Next, you want to tackle any soiled or stained areas. - Mix about 1 tablespoon of laundry detergent with about 1 quart of cold water and mix vigorously to form thick suds (a hand-whisk may help in this regard). - Wet sponge with cleaning solution (using plenty of suds) and rub soiled areas in a firm, circular motion until stain disappears, rewetting sponge as necessary (for stubborn stains, see cleaning methods listed below). Be aware that this method will only work for superficial (surface) stains, and that if the stain has soaked into the mattress padding, it may be impossible to remove entirely. - To remove general dirt and grime from the mattress, apply upholstery shampoo to the mattress as per the manufacturer’s direction. (NOTE: Always test a small, inconspicuous area of the mattress first to make sure the fabric can tolerate the cleaner without damage). Remember to clean both sides of the mattress. - Mattress will be damp after cleaning. Allow to dry completely before using. The mattress can be allowed to air dry in a warm location. Placing a couple of fans around the mattress may hasten the drying process. As an alternative, a shop vac can be used to pull excess moisture from the mattress. - When mattress is completely dry, vacuum again to remove any residue Removing Mattress Stains Some stains are more stubborn in nature, and are therefore harder to remove. Try these methods to treat stubborn stains, such as urine, vomit and sweat. What you may need: - Spray bottle - Distilled White Vinegar - Baking Soda - Boric Acid (i.e. Borax) - Hydrogen Peroxide - Enzymatic Pet Stain remover - Sponge or cloth Removal Process: - Using a spray bottle, spray the stain with distilled white vinegar, and allow to set for approximately 5 minutes. - Sprinkle on baking soda (enough to cover the vinegar spot), and leave on until the fizzing stops and the spot is dry. - Blot the area and vacuum up the baking soda. Hopefully the spot will be gone. - If not, dampen the spot with plain water and sprinkle with dry boric acid (20 Mule Team Borax, usually found in the laundry aisle of the grocery store). - Blot the spot with a sponge or cloth in circular motion until the stain disappears. - Wipe dry and vacuum the area to remove residue - If the stain still remains, dampen a sponge or cloth with hydrogen peroxide and blot the stain in a circular motion (NOTE: hydrogen peroxide can have a bleaching effect, so test a small, inconspicuous area first to make sure it will not damage the fabric of the mattress). - If stain still remains, spray the stain with an enzymatic pet stain remover (such as Petzyme™, available at most pet stores), and let set for 15 minutes. Wipe area with a damp cloth and vacuum when dry. - If these methods fail, you may consider contacting a mattress cleaning professional. Also, check with your mattress retailer as they may carry products specifically designed to assist with stain removal for your particular mattress. NOTE: For stains that have soaked into the mattress padding, for health and sanitary reasons (i.e. bacteria can continue to grow inside the padding even after the surface stain is gone), it may be necessary to replace to mattress. Removing Mattress Odors Odors from stains (especially urine or vomit) and from the air (such as cigarette smoke) can linger in a mattress. To remove odors, try any one (or more) of the following methods: - Sprinkle the entire mattress with baking soda, and allow to set overnight. Vacuum thoroughly. - Using a citrus-based cleaning product, spray the mattress lightly and allow to dry. Vacuum thoroughly. - Using a spray bottle, spray the mattress down with a mixture of ½ water, ½ white distilled vinegar, and allow to dry completely. NOTE: While the initial odor may be gone, the mattress will have a slight vinegar smell to it, which should fade in a couple of days. - Try a commercially available product such as Febreze (Proctor & Gamble) or FreshCare(Clorox), which are often effective at eliminating or reducing odors. Additional Hints and Tips - To extend the life of your mattress, it should be flipped and rotated (bottom to top) every six months. NOTE: If your mattress is a pillow top, it should not be flipped, but it can be rotated. - To prevent stains and keep your mattress clean and fresh longer, change your sheets often and vacuum your mattress regularly. - Before cleaning, always check the manufacturer’s tags on your mattress for additional cleaning tips, and make sure to follow all warnings and cautions on the tag to avoid damage to your mattress. - Use a mattress pad to help protect your mattress—it’s easier to throw a mattress pad in the washer than it is to clean a stain directly from the mattress. - Always clean a stain as soon as possible for easier removal and to avoid having it soak into the mattress padding.
https://www.howtocleanstuff.net/how-to-wash-a-mattress/
· Listen to the customer queries patiently and solve it. If the problem doesn't seem to solve, then forward the problem to the superiors. · Maintain a follow up on the customer, whose query you had solved,. Ensure they are satisfied with your answer. · Should have the skill of versatility; they will have to adapt to many situations regarding the customer . · Consult with users and evaluate requirements, recommend designs, provide cost analyses, plan projects, and coordinate tasks for installation of data networks. · Analyze and resolve technical problems for established networks. · Plan, test, recommend, and implement network, file server, mainframe, and workstation hardware and software. · Provide network documentation, training, and guidance to computing system clients and programmers. · Serve as technical specialist in network problems and emergencies. · Troubleshoot and resolve network production problems. · Conduct technical research on network upgrades and components to determine feasibility, cost, time required, and compatibility with current system. · Recommend network solutions for short-, medium-, and long-range network projects. · Install, configure and maintain network components. · Determine plan layout for new hardware or modifications to existing layout. · Install, upgrade, and configure network printing, directory structures, user access, security, software, and file services. · Establish user profiles, user environments, directories, and security for networks being installed. · Work as a team member with other technical staff, such as systems to ensure connectivity and compatibility between systems. · Work with vendors to resolve complex network problems. · Maintain confidentiality with regard to the information being processed, stored or accessed by the network. · Document network problems and resolutions for future reference. · Oversee the installation of hardware and software. · Provide on-the-job training to new department staff members. · Provide computer orientation to new company staff. · Basic reading, writing, and arithmetic skills required. This is normally acquired through a high school diploma or equivalent. · Knowledge of company supported network platforms such as Novell and Windows NT. Ability to design and coordinate the installation of data networks. Ability to maintain and troubleshoot computer network hardware, software, and peripherals. Ability to provide a range of systems training and/or support activities for users. Ability to develop and write systems and applications documentation and guides for users. · Responsibilities may require evening and weekend work in response to needs of the systems being supported. Working conditions are normal for an office environment. Work requires extensive work using a computer. Responsibilities may require evening and weekend work in response to needs of the systems being supported. · Responsible for answering customer calls / Chat regarding technical issues and abide by the prescribed norms. · Installation of windows & MAC. · Configuration of computer peripherals. · Candidate with a flair for computer troubleshooting and an aptitude for Customer Support. · Operating Systems; Windows 9x, 2K, XP. · Basic Hardware & Networking knowledge. · Any degree or equivalent with strong academic record. · Previous experience in Customer Service. · Active user of internet and online applications. · Demonstrated proficiency in English. · Must be able to work on flexible schedule. · Flexibility working in any assigned shift. · Candidates should be flexible in working in rotational shifts. Looking for someone who is calibrated and professional to work with one of our Top Clients!! · Provide World Class Customer Service. · End to Transaction of Reports. · Need to maintain Accuracy in Reports. · Pleasant, professional, and courteous personality. · Strong customer service approach to dealing with people at all levels internal and external. 1) Deliver prepared sales talks, reading from scripts that describe products or services, in order to persuade potential customers to purchase a product or service or to make a donation. · Script memorization: Tele-marketers are always provided with scripts that they are required to follow strictly. It is a must for the telemarketers to memorize these scripts. · Customer service: The most vital aspect of telemarketing is to be patient and polite while answering the questions of customers. · Product knowledge: Telemarketers must know everything about their products so as to be better equipped to handle customer queries about products and services. · Customer records: This task includes the maintenance of names, addresses and phone numbers of prospective customers along with their reactions to the products. · Adventurousness. Travel agencies that specialize in exotic destinations or particular types of travel, such as adventure travel or ecotourism, may prefer to hire travel agents who share these interests. · Communication skills. Travel agents must listen to customers, understand their travel needs, and offer appropriate travel advice and information. · Customer-service skills. When customers need to make last-minute changes in their travel arrangements, travel agents must be able to respond to questions and complaints in a friendly and professional manner. · Detail oriented . Travel agents must pay attention to details in order to ensure that the reservations they make match travelers’ needs. They must make reservations at the correct dates, times, and locations to meet travelers’ schedules. · Organizational skills. Travel agents should have strong organizational skills because they often work on itineraries for many customers at once. Keeping client information in order and ensuring that bills and receipts are processed in a timely manner is essential. · Sales skills. Travel agents must be able to persuade clients to buy transportation, lodging, or tours. Sometimes they might need to persuade tour operators, airline staff, or others to take care of their clients’ special needs. Earnings for many travel agents depend on commissions and service fees. Position Summary :To provide a professional and efficient customer service to all the clients involved. · Experience –Graduates with 6 to 12 months of international BPO technical support experience. · Be responsible to deliver a high quality, customer-driven, support service resolving customer enquiries at the first point of call wherever possible. · Assist customer in resolving any open requests for support, assistance, information on upgrading etc. · Demonstrate ownership and willingness to resolve issues in a timely manner. Demonstrates confidence and willingness to resolve customer requests or queries. · Maintain and improve Customer Satisfaction by delivering against those initiatives that have been identified as crucially important during each and every customer support engagement, Whether voice or non-voice. · Deliver First Call Resolution by handling customer requests and resolving customer issues as often as possible during the first contact. · Ability to assess customer sentiment at all stages during the communication, to take the lead in escalating an issue on behalf of the customer and to arrange for a supervisor to mediate in the interaction if deemed necessary by you or if requested by the customer. · Manages all customer communication with the appropriate level of etiquette, timeliness and professionalism, whilst working towards achieving agreed operational targets. If you any questions feel free to call me !
https://www.freelancer.com/projects/sales-marketing-fix-15889270/
The Department of Homeland Security (DHS), Chief Information Security Office (CISO) is leading the DHS enterprise-wide deployment of Continuous Diagnostics and Mitigation (CDM) tools under the Continuous Monitoring as a Service (CMaaS) Program to support the agency-specific efforts to implement adequate, risk-based, and cost-effective cybersecurity across DHS. CMaaS provides continuous monitoring, diagnostics, and mitigation capabilities designed to strengthen the security posture of DHS and its Components, systems, and networks through the establishment of a suite of functionalities that enable network administrators to know the state of their respective networks at any given time. CMaaS further informs Chief Information Officers (CIO) and Chief Information Security Officers (CISO) on the relative risks of cybersecurity threats, and makes it possible for Department personnel to identify, prioritize, and mitigate vulnerabilities. This Privacy Impact Assessment (PIA) is being conducted to cover the first two phases of the program (Asset Management and Identity and Access Management) and addresses the privacy risks associated with the deployment and operation of the CDM Agency Dashboard. February 2020 Associated SORN(s):
https://www.dhs.gov/publication/dhsallpia-082-continuous-monitoring-service-cmaas
The Covid-19 crisis has proven to be an accelerator of the digitization already underway in many companies. It exerted particular pressure on financial services. Therefore, in an increasingly competitive context, where digital is becoming an essential value, the wealth management world needs to amplify their digitization processes and focus more than ever on the customer experience. While the impact of the health crisis has forced wealth management professionals to show resilience, they must now draw conclusions from this crisis and manage the impact on their business. Indeed, the crisis has revealed many weaknesses among wealth management professionals. Example: Security issues, lack of follow-up, difficulties accessing files (digital or paper)… By forcing wealth management professionals to work remotely, the pandemic has accelerated the demand for digitalization that had been simmering before. This is therefore an opportunity to improve the existing systems, but also, if necessary, to set up a new way of working. What if digital tools and processes could be used to improve the customer experience? The need to put the customer experience back at the center of the relationship The fact is, at the height of the health crisis, the companies that did well were the ones that could adapt as quickly and efficiently as possible. According to a study conducted by McKinsey, 72% of companies that used new technologies during the crisis reported very good management of them in their company, compared to 33% for companies that did not use these technologies. In fact, if the customer experience was already an essential element in the success of companies before the outbreak of the crisis, it is now crucial, even a priority. This is why many companies – and especially the private wealth management world – are now focusing on improving their customer experience, with the aim of distinguishing themselves from competitors and adapting to the post-crisis context. Strengthening complaint follow-up programs, increasing investment in CRM, developing digital tools, simplifying customer journeys, developing an omnichannel strategy that also emphasizes security… So many ways to greatly improve the customer experience as we adapt to changing customer requirements and needs, especially in the field of digital technology. Indeed, the Covid-19 crisis has demonstrated the importance of the proper functioning of digital platforms. The digitization of the customer experience thus consists of simplifying the handling of requests and access to information for the customer and employees. This is especially important in a context where remote work is becoming ubiquitous and where client advisors don’t always have access to the platforms and databases they use in their usual work environment. Strengthen knowledge and customer relationships thanks to data Thanks to informative data, it is now possible to personalize the customer relationship. This makes it possible to create a stronger and more lasting bond with prospects and customers, in particular by offering communication and services based on informational data (first name, last name, date of birth, etc.). This personalization, which can be done with the help of data intelligence tools, makes it possible to target key moments in the lives of customers: relocation, divorce, birth, sale of a company, inheritance, etc. It is especially important on this crucial moment, when customers demand not only greater development of digital services, but also more attention to their personal needs. Digital to win in commercial and operational efficiency The application of “KYC” (Know Your Client) is a major challenge for the private wealth management world. This set of regulations requires them to regularly collect information about their customers in order to identify possible fraudulent transactions (money laundering, etc.), and expose themselves to severe penalties in case of infringement. Fortunately, it is possible to make this process (as well as any other legal process imposed on the private banking world) more fluid, especially through automation. This automation of processes allows wealth management professionals to focus on the core of their mission (tailored advice, customer relations, customer follow-up, etc.). By optimizing the legal procedures, it is therefore possible to free up time for its core business, a time saving that also benefits customers. By enhancing their commercial and operational efficiencies, the private wealth management world is also driving greater customer satisfaction and better risk management. Definitely a winning arbitration.
https://dienlanhthienphong.com/2022/04/27/the-health-crisis-an-accelerator-for-the-digitization-of-private-management/
Q: Python CaesarCipher IndexError Running python 3.5. I'm start a study of basic encryption and I decided to try my hand at writing a simple Caesar cipher. Pretty straight forward logic: 1) for a given plaintext message, find the index for each message symbol in my LETTERS string 2) add the shift key to the index 3) the resulting number is the index of the cipher symbol 4) if the resulting number is greater than the length of my LETTERS string, then subtract the length of the LETTERS string from the number (this handles the wrap around back to the beginning of the string. So here is the code for that program. caesarCipher2.py LETTERS = "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrustuvwxyz1234567890!@#$%^&*()><.,?/" message = str(input("Enter a message. ")) key = int(input("Enter a whole number key (1-79). ")) mode = str(input("Press 'E' to encrypt or 'D' to decrypt. ")) def encrypt_message(plain_message): translated = " " for symbol in plain_message: if symbol in LETTERS: num = LETTERS.find(symbol) num += key if num > len(LETTERS): num -= len(LETTERS) translated += LETTERS[num] else: translated += symbol return translated def decrypt_message(cipher_message): translated = " " for symbol in cipher_message: if symbol in LETTERS: num = LETTERS.find(symbol) num -= key if num < 0: def main(): if mode == "E" or mode == "e": print(encrypt_message(message)) elif mode == "D" or mode == "d": print(decrypt_message(message)) if __name__ == "__main__": main() Program seems to work ok, however as I'm running test cases, I start noticing that some shift keys are throwing an IndexError at the following line of the encrypt_Message(): translated += LETTERS[num] So I decided to write another script, using the code from the encrypt_Message() to test any given message for all possible keys. What I found was that any plaintext message I pass through the function will result in a few of the shift keys (usually 5 - 10 keys) throwing an IndexError at that same line. All the rest of the keys return the ciphertext as intended. Debugging the code on these error throwing keys shows me that some point in translating the plaintext message for these specific keys, the line: num = LETTERS.find(symbol) returns the length of LETTERS instead of the index of the symbol within LETTERS and then the code seems to hang up from there. The if statement doesn't fire off to adjust the num variable and so by the time it reaches the translated statement, the num variable is index out of bounds. My question is why is this happening? Why is the code working as intended for the majority of the keys, while throwing this exception for the remaining? Any thoughts? Thanks. A: Python indexes lists starting at 0. This will have the following effects: >>> x = ['a', 'b', 'c', 'd'] >>> len(x) 4 >>> x[0] 'a' >>> x[3] 'd' >>> x[4] IndexError: list index out of range Notice that x[4] is already out-of-scope for a list with 4 elements. As a rule of thumb, the maximum index that can be considered inbounds is len(x) - 1. In your case, the mistake is if num > len(LETTERS): which should be if num >= len(LETTERS):
Sustainability was a driving force in the design of the Sonoma State University Student Recreation Center. Approximately 70% of the building is naturally ventilated and cooled; the building is “night flushed” of all hot air and utilizes interior thermal mass to moderate daytime interior temperatures. Vents located in the lobby skylight and under built-in exterior window seats assure adequate air movement and natural ventilation throughout the lobby area. An indirect evaporative cooling system is used in the offices, multipurpose and fitness room and a de-stratification/ventilation system is employed in the small gym. Along with proper orientation and a well insulated exterior skin, the building is 43% more efficient than that California code (Title 24), with an energy savings of approximately 339,000 kWh/Yr. As Title 24 is one of the most stringent building codes in the US, the building is well below the 50% operating energy consumption reduction target called for by The 2030 Challenge. The project was designed to meet a LEED Silver certification rating from the USGBC. University of California, Berkeley The Early Childhood Education Center (ECEC) at UC Berkeley is an example of using an integrated design process to achieve sustainable building design goals. Comprehensive collaboration between the user group, the design team, and the project delivery team produced a highly-sustainable building that satisfies programmatic requirements while adhering to construction schedule and budget. The building is largely illuminated with natural daylight introduced via skylights and south clerestory windows to create a comfortable, healthful environment while reducing electricity use. In addition to providing the building’s young occupants with a healthy indoor environment, the ECEC also promotes stewardship of the natural environment. Examples of sustainable resource use at the ECEC include: • Diversion of over 75% of construction waste from landfill into recycling and reuse venues • Low flow fixtures reduce indoor water use by 25% • Landscaping water is use reduced by 61% • Energy-efficient design reduces energy use to 26% below Title 24 energy conservation standards • Passive solar controls reduce energy consumption The building is expected to receive a LEED-NC Silver rating from the USGBC, and was honored with a Best Practice Award for Integrated Design Process at the 2006 UC/CSU/IOU Sustainability Conference. Los Angeles Community College Capping a year of local leadership in promoting sustainable building practices, the Los Angeles Community College District (LACCD) was honored in December 2006 with the United States Green Building Council – Los Angeles Chapter’s (USGBC-LA) Sustainable Future Award. The LACCD is currently undertaking the largest public sector green building program in the United States, funded by the $2.2 billion Proposition A/AA Bond Program. In April 2006, the LACCD opened its first green building, the Maintenance and Operations (M&O) building at Los Angeles Valley College. The M&O building earned Leadership in Energy and Environmental Design (LEED™) certification from the US Green Building Council because it incorporates a number of features designed to reduce energy and water consumption. In October 2006, the LACCD further illustrated its commitment to sustainability with the announcement of its plan to be the first community college district in the nation to “go off the grid” by generating its own power for all energy needs. The LACCD is currently planning to install photovoltaic (solar energy) panels that will produce enough electricity to meet daytime power needs at each of its nine colleges. The Los Angeles Community College District is one of the largest community college districts in the country, educating more than 110,000 students at its nine colleges each year. The District’s strong leadership in its adoption of sustainability practices has been recognized by numerous organizations, including the California Climate Registry, Global Green USA, and Flex Your Power. University of California, Santa Barbara The University of California, Santa Barbara boasts the only LEED Platinum laboratory building in the US. In constructing Bren Hall, home to the interdisciplinary graduate school of environmental science and management, 100% of the demolition waste and 92% of the construction waste were recycled. The building, which gets 10% of its power from a photovoltaic system, was designed by Zimmer Gunsul Frasca, an environmentally conscious firm that also designed the adjacent Marine Science Building. The Marine Science Building is UCSB’s second LEED for New Construction certified building and is 25% more energy efficient than California building codes require. Both projects have purchased wind energy to power the buildings for two years. The university has also signed an agreement with the USGBC to use LEED for Existing Buildings ratings to LEED certify 25 of its existing buildings over the next five years. One building, Girvetz Hall, has already been certified. California Polytechnic University at San Luis Obispo In June 2005, California Polytechnic’s Sustainable Environments minor received the AIA COTE’s top award for “ecological literacy.” Cal Poly also offers Sustainable Architecture as a graduate study program within their Masters of Science in Architecture degree. The university’s dedication to sustainable efforts is further exemplified in the numerous courses offered in its sustainability catalog. The Renewable Energy Institute at Cal Poly has also partnered with the California Integrated Waste Management Board to promote sustainable environmental design principles in higher education and industry continuing education programs. Their project, Sustainable Environmental Design Education (SEDE), provides a curriculum model for teaching sustainable design practices and lists green programs and campuses.
https://architecture2030.org/campus-sustainability-examples/
Category: Asian elephants We’ve begun a pilot study of a new vaccine to FIGHT the deadly virus which affects young elephants, EEHV. The African elephant, now considered two separate species, is closer to extinction than ever before, a pivotal moment for earth’s largest land animal. There’s so much we can still do to save elephant populations, so where do we go from here? On our quest to prevent the extinction of the Asian elephant, we take a closer look at what our Hi-Way herd get up to at night. The healthy, female calf, arrived to 15-year-old mum Sundara Hi Way following a 22-month gestation, with the birth caught on our CCTV cameras. A two-year-old Asian elephant at Chester Zoo has made a full recovery, experts believe, from the deadly virus threatening Asian elephants globally. Human-elephant conflict was highlighted as one of the major threats to elephants in Kenya in the ‘Kenya Wildlife Service (KWS) Conservation and Management Strategy for Elephant in Kenya 2012-2021′. It was this document that inspired Lydia to develop a PhD project to try and understand the impacts of land-use change on human-elephant conflict and elephant movement in the Trans Mara District, Kenya. Lydia specifically wanted to: - Determine the implications of agricultural expansion on human-elephant conflict; - Understand the seasonal, temporal and spatial drivers of crop raiding over time; - Investigate elephant pathway use and their role in human-elephant conflict; - Understand links between farmer poverty and human-elephant conflict. Lydia chose the Trans Mara District to carry out her research as it is an unprotected area adjacent to the Masai Mara National Reserve where communities are experiencing high levels of human-elephant conflict, which is impacting peoples livelihoods and threatening elephant populations. In 2014, Lydia headed out to the Trans Mara to start collecting data. In order to look at seasonal, temporal and spatial trends of elephant crop raiding and compare these to the past, she had to monitor and collect incidences of conflicts over 18 months. Lydia hired and trained 12 field scouts from across the region, which was approximately 2,900 km2, to help her collect data. Lydia tells us more below: “Whenever there was an incident with an elephant our scouts would go and collect this data. As the scouts were embedded members of the community, farmers would alert them straight away to incidents. The scouts would then interview the farmers about the incident, verify the amount of damage, collect a GPS coordinate and work out the type of elephant group involved. “My research also focussed on elephant movements in the area and so I looked at natural pathways that elephants use to travel up from the Masai Mara Reserve into the Trans Mara and back down again. The first step was to actually identify where the pathways were which we did by consulting with local farmers and rangers and verifying them by physically visiting them and looking for elephant signs. In order to understand pathway usage we installed over 38 camera traps along the pathways. Our goal was to determine when, how often and what time of day elephants are using the pathways, and what characteristics of these pathways might be driving their movement.” Another aspect of human-wildlife conflict that Lydia wanted to investigate was the link between wealth and the number of conflicts being recorded in the region. The research team conducted a total of 326 interviews with farmers and four focus group sessions to determine what the wealth metric of the area was. Lydia also digitised land cover in the area and ran regression models to create maps of areas particularly vulnerable to crop raiding, allowing her to generate different land-use change scenarios. Firstly, she documented dramatic land-cover change in the area showing that between 2012 and 2015 there was a 42.5% increase in agricultural land and over 30% decline in forest area. Lydia continues: “These trends are concerning because the forest in the Trans Mara is extremely important not just for wildlife but for the local community too. My scenario modelling suggests that even with high future deforestation levels, large areas will remain susceptible to elephant crop raiding. Many farmers are clearing the forest because they think it will reduce crop raiding. However, our models show that conflict will continue because as long as small patches of forest remain, elephants will be able to use these as staging posts for crop raiding. “Human-elephant conflict has increased in the area by 49% since 2000 and has become much less predictable. Elephants are crop raiding throughout the whole year and eating crops at all stages of growth. Historically, they would only eat mature crops and crop raiding would only occur seasonally. This unpredictability is costing local farmers as they are having to guard their fields all year round and have to spend more on mitigation. This will all accumulate to farmers having less tolerance towards elephants which could lead to more retaliatory killing.” Lydia also found that elephants were using the pathways connecting the Masai Mara to the Trans Mara mostly at night when they had less chance of being detected by humans. The elephant groups would travel up to the Trans Mara in the early evening and would then head to the Masai Mara in the late morning. The key drivers of the pathway use turned out to be access to resources such as salt lakes and forest, but also to farmers’ crops, highlighting the key role that pathways play in human-elephant conflict. Finally, Lydia found that human-elephant conflict impacts some of the poorest people in the Trans Mara because they tend to live closest to the Masai Mara National Reserve, although the very poor are relatively unaffected, presumably because they have fewer resources for elephants to target. Lydia believes that in light of changing patterns of human-elephant conflict and land cover, land-use planning is crucial to balance the needs of humans and wildlife. The knowledge gained from this study can directly inform conservation management in this area. Lydia explains: “We now know the areas susceptible to conflict, the drivers of conflict, the role pathways play and the socio-economic context of the communities in the Trans Mara. The knowledge of pathway use can enable us to direct mitigation methods. For instance, we could block elephant access on certain pathways which lead directly to farms by using fences and early warning detection systems.” Having finished her PhD recently, Lydia is now Research & Science Manager for Save the Elephant’s Human-Elephant Coexistence Program in Tsavo, Kenya. The team there is working towards reducing damage from crop-raiding elephants by setting up beehive fences as a natural deterrent. They also monitor and analyse the movement of 30 GPS collared elephants in Tsavo to understand their movement and crop raiding behaviour. Photo credits: Lydia Tiller So, this little baby ELEPHANT was born yesterday! _üü _Ù÷ 24 hours old and already playing in mud… pic.twitter.com/5FY8l1GLBW — Chester Zoo (@chesterzoo) May 18, 2018 The newborn arrived overnight on Thursday (17/05) to 35-year-old mum Thi Hi Way after an assumed gestation of 25 months. Keepers and scientists at the zoo believed that Thi had started a natural resorption process after hormone tracking showed that the mum of six previous calves was due to give birth three months prior, and she was slowly returning to her normal weight. Despite the unusual circumstances, Thi gave birth to a healthy baby boy and our keepers say both mum and calf, who is yet to be named, are doing very well. Mike Jordan, Collections Director, said: Thi is a wonderful matriarch to our family herd and a really experienced mum. She has successfully given birth to seven calves before, but this time around circumstances were really quite astonishing. We believed Thi had exceeded her normal gestation period, which we were monitoring closely. Her hormone levels, behaviour and drop in weight gave us every indication that she may have been resorbing the calf – a natural process that some elephants experience. However, nature always has that incredible ability to surprise you and that was certainly the case when we came in yesterday morning. The new youngster was up on his feet, suckling from mum and bonding closely with the rest of the family herd, including one-year-old calves, Indali and Aayu. It’s truly magnificent to witness. We are part of a breeding programme coordinated by the European Association of Zoos and Aquariums (EAZA) that is focused on sustaining the elephant population in Europe. The new calf is another huge boost to these efforts.Asian elephants are listed as endangered on the International Union for the Conservation of Nature’s (IUCN’s) Red List, threatened by habitat loss, poaching, disease and direct conflict with humans. Tim Rowlands, Curator of Mammals, added: It’s absolutely magical to see Thi bring another new arrival into the world. These momentous events always bring the entire elephant family together and we expect to see the other young calves in the group showing a lot of interest in the little one over the coming days, weeks and months.Crucially, this is important news for Asian elephants more widely. The species is endangered in the wild. If we don’t act now then the unthinkable could happen. By combining our breeding programme successes with field projects in the wild, we are really making a difference for these magnificent animals. Zoo conservationists have been operating in India for more than twelve years, preventing extinction in the wild by utilising the skills and knowledge developed working with the herd in Chester. One of our major projects in Assam, northern India, has successfully eliminated conflict between local communities and the nearby Asian elephant population, offering a blueprint for the future conservation of the species. Meanwhile, scientists at the zoo are leading the global fight to find a cure for a deadly disease which is threatening Asian elephants globally, in zoos and the wild. There is currently no cure for elephant endotheliotropic herpesvirus, also known as EEHV, but our researchers are leading the fight to produce a vaccine, thanks in part to more than £150,000 in donations from the public as part of a major Never Forget fundraising campaign. The elephant house is open as normal. After few years working with non-governmental organisations (NGOs) on various projects including turtles, wetlands and wildlife enforcement, Ee Phin realised how crucial engaging with people is to the conservation world. Ee Phin explains: “Actually, conservation is more about managing people instead of wildlife. If you can work together with different stakeholders and gain their trust, it becomes extremely valuable for advancing conservation efforts. Each stakeholder can contribute their strength and jointly make a project a success.” Without good collaboration, conservation may be stalled. A few years ago, a new opportunity presented itself to Ee Phin: a PhD offer to work with Dr.Ahimsa Campos-Arceiz, the principal investigator of a project called Management and Ecology of Malaysian Elephants (MEME). The Malaysian conservationist didn’t hesitate and enrolled as a PhD student at the University of Nottingham Malaysia Campus and later on became a Chester Zoo Conservation Scholar. Ee Phin continues: “The project was very exciting because it was all about tracking wild elephants and using faecal endocrinology to study them. I thought that was really interesting because it is very difficult to track or even see wildlife in the rainforest so using GPS collars really gives us a new window to observe and follow these animals. “Also I was really interested by the topic of faecal endocrinology because it seems to be a very diverse tool! If you learn the technique you can apply it not only to elephants but to other wildlife as well.” During her PhD, Ee Phin looked at glucocorticoid metabolite concentrations (a class of steroid hormone) in wild Asian elephants’ dung. Glucocorticoids modulate daily levels of energy and are also involved in stress responses. She continues: “If an accident happens out of the blur and you need to either ‘fight or flight’, the first wave of hormones will give you that adrenaline rush. Those first hormones are really quick acting hormones but glucocorticoids are released in a second wave of hormones a few minutes later and its effect on the body lasts longer. It is easier to study glucocorticoids in faecal as its molecules are more stable thanks to its cholesterol ring. “Translocation is very relevant in Malaysia as lots of large areas are being converted to plantations and elephants are pushed away further and further. Villagers and plantation owners are not willing to tolerate the losses caused by elephants, and they pressured the authorities to translocate the elephants.” Before 1970s, elephants in Malaysia were considered agricultural pests and were often killed. The situation shifted in 1974 when the country signed a new Wildlife Act protecting the iconic species and the Wildlife Department created an Elephant Capture Unit. “Instead of culling the troubled elephants, the Unit started capturing them and transported them out to release them in large forests. It has been estimated that a few hundred elephants have been captured and moved so translocation could potentially have a large impact on the wild population. “Assessing the impact that those translocations have on the species is essential but elephants are hard to track in the rainforest so gathering data is challenging. That’s why MEME decided to focus on Malaysian elephants and managed to raise enough funds to buy 50 GPS collars to enable the team to track the pachyderms in the forest. “Sometimes if they don’t move they might be just few feet away and you wouldn’t know they are there. It’s very surprising but in the forest the elephants, even though they are so big, can move quietly or hide if they want to! “Having the opportunity to deploy GPS collars on the translocated elephants opened a window to follow the elephants and collect their dung. However, once collected the remaining challenge was to know how long the hormone metabolites would stay stable. Most people recommend to collect samples as soon as possible, potentially right after the elephant defecates, but that’s not possible for me because these are wild animals and they can be dangerous.” This is why Ee Phin decided to carry out research to determine how stable the glucocorticoid metabolites in dung over time are and in different environment conditions. Collecting 80 samples of fresh dung within housed elephants and assessing their hormone levels straight away, the Malaysian researcher then measured hormone metabolites in those same dung piles within 30 minutes to two days after excretion. Ee Phin explains: “I found that the hormone metabolite concentrations are stable up to eight hours after defecation. After that it can go up or down but most of the hormone metabolites will increase. This unique investigation also assessed the impact of a contrasted environment to see how the rainforest conditions could impact on the metabolite levels. “For me the biggest output I shared with the scientific community is that basically we have to be aware of time, otherwise we might interpret our data in a wrong way. Validation experiments are very important when studying faecal endocrinology, to ensure we are interpreting the right data and not some artefact of the environment.” As part of her PhD, Ee Phin also assessed the differences in hormone levels in translocated elephants and in non-translocated elephants. Since finishing her PhD, she has continued her research in Malaysia and she is now working as a lecturer in the newly opened School of Environmental and Geographical Sciences. One of the new MEME PhD students is currently working on the movements of translocated elephants and he actually found that there is a movement difference between translocated and non-translocated elephants in terms of road crossing behaviour. Ee Phin concludes: My next step is to link my hormone study with this movement study to actually get a stronger support for us saying that translocations do have an impact on the elephants’ physiology and behaviour. I’m hoping that with our studies people can start thinking at how to mitigate these physiological impacts. For more information on Ee Phin work follow the link below: Wong, E.P., Yon, L., Purcell, R., Walker, S. L., Othman, N., Saaban, S., Campos-Arceiz, A. (2016) Concentrations of faecal glucocorticoid metabolites in Asian elephant dung are stable for up to 8j in a tropical environment. Conservation Physiology, 4(1), 1-7. What are you fundraising for? I’m running the marathon to raise money for our Never Forget campaign to fight EEHV. EEHV is a devastating virus that kills young elephants both in the wild and in zoos. Unfortunately five calves born at Chester Zoo have died from the virus. We currently have three young elephants within the herd so EEHV is never far from the elephant team’s thoughts. We are doing what we can with the knowledge we already have but more research is required to improve our understanding of the virus and how best to treat it. Why did you choose to do a marathon? This will be my second marathon, I ran my first in 2015. Thought it was about time I conquered another one as I enjoy challenging myself. Why Loch Ness? I’m originally from Glasgow so have been keen to complete a Scottish race. I chose Loch Ness because I thought the gorgeous scenery would be a welcome distraction when fatigue starts to set in. How has the training been going? In July I completed my first sprint triathlon so my training has involved not only running but also swimming and cycling. Now my focus is to gradually increase my mileage up until race day. At times it has been difficult keeping to my training routine but running in aid of such an important cause has kept me motivated. Update She did it! Katie conquered this monster marathon! She faced terrible weather and a very tough race, but she made it to the finish line and raised over £400. Well done Katie! Thank you everyone for your support.
https://www.chesterzoo.org/news/category/brand-science/asian-elephants/
Travelling around the world, exploring new destinations is the perfect way to also widen your food experiences. We deliberately plan our travel around food and we know many others do too. Whichever way you look at it, food is an important part of travelling. Through food, you can learn more about different cultures and it's the perfect way to interact with people in general and locals. Eating, learning, cooking, the role of food in our travel plans are integral. Eating food that you have never tried before can be an uplifting experience, or a scary one, depending on your palate and tastes. It's always fun to try new foods. From food tours to cooking classes, home cooking to fine dining restaurants, we aim to bring you as many experiences as we can that are centred around food.
https://www.beerandcroissants.com/eat-with-me/
The mechanism for inactivation of the KIP family cyclin-dependent kinase inhibitor (CDKI) genes, the p21, p27, and p57 genes, in gastric cancer cells was tested by treating the cells with either the DNA demethylation agent, 5- aza-2'-deoxycytidine or the histone deacetylase inhibitor, n-butyric acid or trichostatin A. RNA expression of the gene was determined by reverse transcription PCR. The p21 gene was activated only by histone deacetylase inhibitor. The p57 gene was activated by histone deacetylase inhibitors in all of the gastric cancer cell lines and by 5-aza-2'-deoxycytidine in five of eight gastric cell lines. However, the p27 gene was not inactivated in gastric cancer cell lines. The methylation status of the promoter of the p21 and p57 genes was also tested by digestion with the methylation-sensitive restriction enzymes and a subsequent PCR. The promoter of the p21 gene has no methylation. The promoter of the p57 gene is, however, methylated in five of eight gastric cancer cell lines as expected from the result of the treatment with 5-aza-2'-deoxycytidine. Formation of the inactive chromatin through histone deacetylation seems to be the general mechanism for inactivation of both the p21 and the p57 genes in gastric cancer cells. Hypermethylation of promoter region seems to be an alternative pathway for inactivation of the p57 gene.
https://pure.ewha.ac.kr/en/publications/mechanism-for-inactivation-of-the-kip-family-cyclin-dependent-kin
Pdf on dec 1, 1996, jyh wee sew and others published colloquial malay. Learn more in the cambridge english malay dictionary. Studying malay grammar is very important because it is the backbone of the language. A read is counted each time someone views a publication summary such as the title, abstract, and list of authors, clicks on a figure, or views or downloads the fulltext. This can be done more easily by practicing the grammar exercise and taking the regular grammar test in this grammar app. Prepared by teachers of madrasa ayesha siddiqah in karachi, a madrasa known for its extremely high. The study is based on sixteen hours of recordings of spontaneous narratives and conversations between papuan malay speakers, recorded in the sarmi area on the northeast coast of west papua. English words of malay origin include orangutan, gingham, sarong, bamboo, rattan, kapok, paddy, and amok. Massive foreign linguistic loan and transliteration in malay lexicology, especially from english. Helpful marginal notes throughout the books have been provided to reinforce existing skills and call attention to common problem areas. Learn spoken english and grammar from hindi, indonesian, thai, arabic, malay, urdu, malay, bangladeshi bengali, bengali, punjabi, telugu, tamil, kannada, marathi, gujarati, oriya, assamese, malayalam, chinese, portuguese, turkish and nepali. A baseball pitcher must work constantly on their pitch. Indonesian% formed%15 th%century% considered%as%aformal%dialectof%malay%riau% member%of%the%austronesian%language%family%. With a preliminary dissertation, volume 2 a grammar and dictionary of the malay language. The grammar app offline helps you to improve your grammar skills on daily basis. If the malay grammar is what the author claims, malay speakers should worry. About is a free web service that delivers books in pdf. The arabic element of the malay, as stated in the grammar, may be said to be. This book has 40 units and each unit has a grammatical annotation to qualify and elaborate on the information put forth. If youre trying to learn malay which is also called malaysian, check our courses about adjectives, adverbs, articles, gender feminine, masculine. A students grammar of malay and indonesian books pics. Try to concentrate on the lesson and notice the pattern that occurs each time the word changes its place. Topics include tamil literature, stories, siddha and health from famous authors. Models of english grammar new straits times malaysia. In general, they are used to link words to other words. Learn malay with these useful resources from around the web. Each of the 28 units deals with a grammatical topic and provides associated exercises, designed to put grammar into a communicative context. Contact indonesian malay texts for further information about availability and distribution, or if you have questions about how to place an order for the books. Childrens malayenglish audio, books kids dual language. If youre trying to learn malay articles which is also called malaysian, check our courses about definite and indefinite help you with your malay grammar. An indonesian and malay grammar for students mintz 1. See more ideas about malay language, english for beginners and language. The study is based on sixteen hours of recordings of spontaneous narratives and conversations between papuan malay. A free english learning course used by over 50 million learners for spoken english, grammar, and vocabulary building. Grammar handbook personal pronoun, it has now become an acceptable and genderneutral way to refer to someone. No matter your age or experience, a plethora of tools and resources are available to get you started or help you improve your language skills. Click download or read online button to get colloquial malay ebook and mp3 pack book now. English grammar, tenses page 9 of 38 present perfect tense i have sung the present perfect tense is a rather important tense in english, but it gives speakers of some languages a difficult time. Online source for books published by penerbitan pelangi sdn bhd. He said in his introduction, \ my intention is simply to make clear to every shia what the books of their religious leaders contain. A manual of the malay language dodo press pdf complete. This site is like a library, use search box in the widget to get ebook that you want. Large collection of popular tamil pdf ebooks and epub tamil ebooks. Malayenglish vocabulary, containing over 7000 malay words. Topics malay language grammar publisher oxford, the clarendon press collection cdl. Correct grammar on translation in english with examples. Whether you are starting from scratch, or are just out of practice, complete malay bahasa malaysia will guarantee success. English grammar in use raymond murphy free pdf ebook download. Advanced grammar in use with answers pdf bookspdf4free. The big grammar book is jampacked from cover to cover with a great selection of photocopiable worksheets taken from the popular english website. Download free pdf english books from english grammar pdf and word doc at. Malay grammar is the body of rules that describe the structure of expressions in the malay language known as indonesian in indonesia and malaysian malay in malaysia. Similar to determiners in english, determiners in the malay language also form part of a noun phrase. Welcome to the online home of the farlex grammar book, your complete guide to the english language. Special attention is paid to topics which differ from english and european language structures. A grammar and dictionary of the malay language wallace online. The arabic element of the malay, as stated in the grammar. These are things that many people still do not realize. Learn malay grammar and vocabulary learn languages. Free tamil books, tamil pdf books collection for download. This content was uploaded by our users and we assume good faith they have the permission to share this book. Tamil to english spoken english book pdf free download. A students grammar of malay and indonesian pdf free download. Awardwinning malayenglish bilingual childrens books and dual language picture books are a great resource for teaching and learning malay and english as a second language. The music podcast from two best buds think millennial artist spotlight hosted by brandon. This page offers free lessons in learning malay such as adjectives adverbs articles. Malay, followed immediately by a malayenglish vocabulary. An advanced english grammar with exercises by farley and kittredge free ebook project gutenberg. Clear explanations of natural written and spoken english. Itcontainstwentythree sounds,representedinwriting by letters ofthe arabic alphabet. Students learning malay grammar are better able to. Coined as kata penentu words that determine in the malay grammar abdullah hassan 1993, 54, the malay equivalent to the english determiner. Studying turkish grammar with it can be challenging in the elementary stages but this is a book that you must have in your studying repertoire. English words of malay origin include orangutan, gingham, sarong, bamboo. Latin into english, or sanskrit itself into the languages of the. Vocabulary, straits dialogues malay and english school primer, and all the. This article outlines the differences between malaysian english, malaysian colloquial english and british english, which for the purposes of this article is assumed to be the form of english spoken in south east england, used by the british government, the bbc and widely understood in other parts of the united kingdom. Download advanced grammar in use with answers pdf by martin hewings published in april 1999. Sep 15, 2017 learning the malay language otherwise known as bahasa melayu or bahasa malaysia. Jun 25, 2011 free tamil books, tamil pdf books collection for download here is a collection of popular tamil ebooks, in pdf format, handpicked by raj computers for your reading pleasure. Download ncert english text books for class 5 to 12 pdf. Free kindle book and epub digitized and proofread by project gutenberg. This book teaches arabic grammar by using examples from the quraan. British council society of authors award for elt books 2012. If youre trying to learn malay articles which is also called malaysian, check our courses about definite and indefinite articles. Learning the malay language is fundamentally simple to learn as it is written in the roman alphabet although traditonally, it was written in jawi writing. Abdurrahman dimashqeyyah shows and discusses the wrong believes in shii doctrine. A simple but complete grammar of the malay language. To learn other languages please check our homepage here. Home english books for download english grammar pdf and word doc. English grammar pdf and word doc 10 learning phonics pdf 2 vivid verbs a to z pdf 2 english idioms dictionary pdf. The grammar describes modern malay and indonesian and makes no attempt to account for the structures and vocabulary typically found in classical malay literature. Grammar in use intermediate 3rd edition free download ebook pdf. English books for download pdf english grammar pdf and. It is probable thatthe javanesewas the alphabetformerly in. Contextual translation of correct grammar on translations into english. We will first learn about prepositions, negation, questions, adverbs, and pronouns including. English text books for class 5 to 12 in hindi and englishall download pdf. Any opinions in the examples do not represent the opinion of the cambridge dictionary editors or of cambridge university press or its licensors. Theres never been a better time to learn a language. We suggest printing out the malay exercise book and doing the exercises with a pencil or a pen. Learn more in the cambridge englishmalay dictionary. We are giving discounts in this week, a lot of good books to read and enjoy in this weekend, one of which is a manual of the malay language dodo press pdf complete, the book also includes a bestseller in this years and received many awards. These books will take your english to the next level. Page 225 a dictionary of the malayan language, in two parts, malayan and english, and english and malayan. These examples are from the cambridge english corpus and from sources on the web. Are you looking for a complete course in malay bahasa malaysia which takes you effortlessly from beginner to confident speaker. British and malaysian english differences wikipedia. The entries cover everyday french and malay including all essential set expressions so you can be sure of having all the vocabulary you need. The dictionary also offers additional help in the form of a full guide to using the dictionary, and essential english grammar pages. With a preliminary dissertation, john crawfurd author. Collection includes malay folktales, fables, and multicultural stories. This english grammar book offline helps you to learn the rules of grammar in english language. The grammar presented here is a pedagogical grammar and has been written for the primary purpose of aiding students who are studying malay or indonesian as a foreign language. Malay grammar is the body of rules that describe the structure of expressions in the malay. An advanced english grammar with exercises by farley and. If youre trying to learn malay which is also called malaysian, check our. An excellent gift to students of islamic sciences literally translated the fundamental principles of quraanic interpretation, this book refers to the branches of knowledge which are necessary to provide an accurate interpretation of the quranic texts, such as arabic grammar and syntax, arabic literature and quranic sciences uloom alquraan. Grammar in use intermediate 3rd edition free download. Its good news that indonesian verbs dont change depending on tense. Without it, you will be limited to what expressions you can use. Tafsir ibn kathir 10 volumes alhamdulillahlibrary pdf imam ibn kathir language. Pdf mastery of language grammar among nonmalay students. The language is spoken in coastal west papua which covers the western part of the island of new guinea. Papuan malay is the language of wider communication and the first or second language for an everincreasing number of people of the area. Mastery of malay language grammar, chinese students, attitude. Best english grammar and vocabulary learning books download for free. Download essential english words complete set of 6 books. He carries out research on malay and indonesian as well as the philippines and has published a number of books and articles related to these areas. Apr 14, 2010 malay grammar by winstedt, richard olof sir, 19, clarendon press edition, in english. Top resources for learning malay 101 languages resources. The blurb of liaw claims that the book will enable you to read and write standard malay language in a couple of. Appears in 52 books from 18022002 page 126 pantun is a stanza of four short lines rhyming alternately. English grammar learning free offline grammar book apps. But if we formulate an abstract rule and say that english puts adjectives before nouns and malay puts them after nouns, or that english uses a definite article when a prepositional phrase follows the head noun, many people begin to get lost. The books are freely accessible and downloadable on single click. Generally, sentences begin with a subject, followed by a verb also called a predicate, and then an object. English grammar app offline is the best way to improve your english grammar skills. This authoritative work investigates turkish grammar in every aspect. We wish you every success in your pursuit of english proficiency. Now fully updated to make your language learning experience fun and interactive. Download english grammar lessons, for free, in the pdf format feel free to download, reuse, or share the following english grammar lessons with your. Panacea definition in the cambridge english dictionary. The oxford english grammar course basic, intermediate and advanced levels, with catherine walter oup 2011. Indicating the past or future tense only requires inserting words that indicate the time, in a very regular system. This book presents an indepth linguistic description of papuan malay, a nonstandard variety of malay. Other indonesian malay books by the same author a course in conversational malay a course in conversational indonesian readings in indonesian culture guided writing for students of indonesian and. In english there are no books in print dealing with the. Sudah in relation to the perfective aspect in english. Unlike english, the word kalian is placed after the noun. Marsdeiij my book certainly never would have been written. A threelevel grammar course designed to revise, teach and practise the most important points of english grammar. We wanted to provide teachers with a really useful book of nononsense grammar. English books download pdf free basic, intermediate, and advanced. Djray, dlanguage studio langkawi dlanguage studio provides malay video lessons this page reveals the basic fundamentals of malay, designed for english.
https://pertservlibca.web.app/1095.html
Author Carol Dunbar stands outside of her writing studio that is under her family’s water tower on their property deep in the woods south of Superior, Wisconsin. Jed Carlson / Superior Telegram Carol Dunbar works at the desk inside her writing studio in her family’s water tower in the woods south of Superior on Tuesday afternoon, Oct. 26, 2021. Jed Carlson / Superior Telegram Carol Dunbar speaks about her love of nature and living off the grid on her family’s property deep in the woods south of Superior on Tuesday afternoon, Oct. 26, 2021. Jed Carlson / Superior Telegram Carol Dunbar looks through short writings and other trinkets that were her grandmothers that she keeps in her writing studio in her family’s water tower in the woods south of Superior on Tuesday afternoon, Oct. 26, 2021. Jed Carlson / Superior Telegram Author Carol Dunbar talks about her struggles with the editing process of her upcoming novel as she sits in her writing studio in the family’s water tower south of Superior on Tuesday afternoon, Oct. 26, 2021. Jed Carlson / Superior Telegram Author Carol Dunbar looks out of one of the windows of her writing studio in her family’s water tower on their property deep in the woods south of Superior on Tuesday afternoon, Oct. 26, 2021. Jed Carlson / Superior Telegram SUPERIOR, Wis. — Carol Dunbar stepped through the woods as fallen leaves crunched beneath her feet. Her homestead south of Superior includes the main residence, her husband’s workshop and a water tower. Living off the grid, the structure is a necessity for the homestead’s water pressure — and for Dunbar’s work. “Me getting into this water tower was finding a space where I could shut a door behind me to create,” she said. “I wouldn’t want any other kind of office, but it definitely has its challenges.” The novelist and freelance ghostwriter’s computers, manuscripts and books all reside under what some might consider to be their worst enemy: “There are literally two 250-gallon tanks of water over my head right now,” she said. Yes, her office has flooded several times. “It’s like being in a room that’s pouring rain. It’s awful, and I’ve had to make peace with that.” To see her work be so vulnerable makes it that much more endearing. “I know there’s a really interesting metaphor about art and risk,” she added. There’s no other space on their 80 acres where she can work the way she’s able to here. After numerous floods and years spent working from the living room, her husband redid the space and built the staircase for better access and heat circulation. Originally intended as a guest room, it’s a 10-by-10 space on the second floor of the water tower. She calls it the cockpit. There’s a porch on the back and windows on all four sides, so “I feel like I’m writing in the treetops,” she said. While she hears water moving through the pipes around her, “The view that it affords me and the peace that I have here in this little space, and it is little … I wouldn’t trade it for anything.” THE SPACE Light floods in from every angle. Her sitting and standing desks, compliments of her husband, rest at the center and in a corner, an ancient-looking podium holds one of her numerous dictionaries; she likes to compare decades-old definitions to those of today. There are several aloe plants, drawings on the wall, and a storyboard with pinned photos of a sculpture and an Irish skyline — inspiration for future works, she said. An assortment of candles, one of which she lights daily before she begins. “It keeps me mindful that I’m trying to capture the best light, the best in human nature,” she said. She keeps a collection of notebooks, color-coated for whatever novel she’s writing, in her office, in the car, by her bed, to help her document inspiration when it strikes. “I got very frustrated when I got a good idea or I’d hear a piece of dialogue or I’d finally know how to describe the snow on that day, and I would write it down and never find it again,” she said. It has helped, but she still has scraps of paper pinned to her notebook pages. “It’s like leaving yourself love letters,” she said, sorting through a pile. She wrote her second novel in long-hand on paper. It’s an accessible way to create away from a screen, she said. In the corner rests a red cushioned chair that came from a Minneapolis alley. Around her desk she has taped quotes and reminders. “In the end, it all comes down to what we think we deserve,” reads one. Also a piece of wood with words: “You just have to trust your own madness — Clive Barker.” Dunbar cherishes a writing award and remnants of work kept on paper scraps, memorabilia from an ancestor who emigrated from Italy. While Dunbar’s relative wasn’t supported in pursuing writing, Dunbar feels her work today honors herself and her ancestor. Her book shelf holds works by Joyce Carol Oates, Jesmyn Ward, Barbara Kingsolver, and a treasured copy of Eleonora Duse’s “The Mystic in the Theatre.” Duse strove to eliminate ego, Dunbar said. “Forget the self, it’s purely about the story.” This is guidance she takes to heart in her craft. THE WRITER Dunbar describes her ghostwriting work as producing books but remaining invisible. “My name is not on the cover at all,” she said. “As far as not getting credit, that’s what the money’s for.” This removal of ego serves her well and she has a talent and experience adopting another’s voice. Before focusing on writing, Dunbar was an actor performing in theater and commercials. She and her husband traded the bustle of Minneapolis to live off the grid south of Superior 18 years ago. “We found this property and just went for it,” she recalled. Born in Guam, Dunbar graduated high school on the east coast. The daughter of a Navy man, she moved around a lot. Living south of Superior is the first home she has chosen, a home where she has remained the longest, where she intends to stay. Author Carol Dunbar talks about her struggles with the editing process of her upcoming novel as she sits in her writing studio in the family’s water tower south of Superior on Tuesday afternoon, Oct. 26, 2021. Jed Carlson / Superior Telegram Where she’s positioned in the water tower and the time of day can determine what she’s writing. “Sitting is usually where I’m laying track, new ground; and standing for me is editing, email, more active work and interviews,” she said. And, she writes every day because it’s easier to keep her own stories alive if she touches them daily. Dunbar wrote her novel “The Net Beneath Us” over 12 years of child rearing, several office debacles and more. It’s inspired by her home, and more specifically, the skeleton of a second story in their main residence. She wondered why the previous owners didn’t complete the project, and crafted an answer that turned out being more interesting than the truth, she said. Working on this piece created a safe space for her to be vulnerable and learn about herself. After a family accident, Dunbar split firewood for their home out of necessity. The first time she did it, she got a black eye — an experience she included in her work. “I put it all in my novel. It was a really safe place to explore things emotionally,” she said. After 28 rejections, Dunbar landed a two-book deal, and “The Net Beneath Us” is set for a fall 2022 release. Writing a novel is a leap of faith, she said. You invest hours on something you don’t know will be of value to anyone else, but you keep at it because it’s of value to you. And, it has to be a sacred thing, she said. Sitting in her red chair, Dunbar spoke further of her craft, paraphrasing a quote from poet William Stafford. “He believed writers didn’t write because they have something to say. “Writers write because they’ve discovered a process that, had they not gone through it, they wouldn’t have found what they found. You wouldn’t have arrived at essential things. “The reason I didn’t give up on my novel is because it taught me what I think about this place. “My novel’s fiction, but it’s very much telling emotional truths.”
What are sequence analysis tools? Popular tools for sequence alignment include: - Pair-wise alignment – BLAST, Dot plots. - Multiple alignment – ClustalW, PROBCONS, MUSCLE, MAFFT, and T-Coffee. Which tools are used in bioinformatics? This review summarizes the most commonly used bioinformatics tools for the assembly and annotation of metagenomic sequence data with the aim of discovering novel genes. - Background. - Sequencing Technologies for Whole Genome Shotgun Metagenomics. - Metagenomic Assembly. - Phylogenetic Binning. - Metagenome Gene Prediction. What are the tools used for sequence alignment? For many years, the previous version of the tool, Clustal W, was widely used for this kind of multiple sequence alignment. Clustal Omega is an improved version of that tool. Accepted sequence formats are GCG, FASTA, EMBL, GenBank, PIR, NBRF, PHYLIP or UniProtKB/Swiss-Prot. Which NCBI tool is used to Analyse sequences of nucleotides and peptides? BLAST The Basic Local Alignment Search Tool (BLAST) finds regions of similarity between sequences. The program compares nucleotide or protein sequences and calculates the statistical significance of matches. What is sequence pattern in bioinformatics? In Bioinformatics, a sequence motif is a nucleotide or amino-acid sequence pattern that is widespread and has been proven or assumed to have a biological significance. What is bioinformatics data analysis? What is bioinformatics? As the name indicates – bioinformatics deals with computational analysis of biological data at a molecular level. It is a crossover of biology, computer science, statistics and mathematics which are not the usual disciplines that are studied together. What is the most important tool used in bioinformatics? A number of tools are available to predict the secondary structure of a protein molecule. One of the most important tools is ExPASy (the Expert Protein Analysis System), powered by the Swiss Institute of Bioinformatics (SIB). What are bioinformatics tools used for? Bioinformatics tools aid in comparing, analyzing and interpreting genetic and genomic data and more generally in the understanding of evolutionary aspects of molecular biology. At a more integrative level, it helps analyze and catalogue the biological pathways and networks that are an important part of systems biology. What are alignment tools? ALIGNMENT TOOLS is a manufacturer and supplier of stainless steel shims for machine alignment, accurate foils, metal strips, flexible segments and other metal products. We provide sheet metal forming and produce a wide range of products for oil and lubrication systems, like drip pans, barrels, carts, etc. What is PIR in bioinformatics? The Protein Information Resource (PIR) is an integrated public resource of protein informatics that supports genomic and proteomic research and scientific discovery. PIR maintains the Protein Sequence Database (PSD), an annotated protein database containing over 283 000 sequences covering the entire taxonomic range. Which is the online sequence alignment tool of NCBI? The NCBI Multiple Sequence Alignment Viewer (MSA) is a graphical display for multiple alignments of nucleotide and protein sequences. To start using Multiple Sequence Alignment viewer go to the Multiple Sequence Alignment Viewer application page. How are bioinformatics tools used in genomic testing? Bioinformatics tools with their genomic testing abilities have been helpful in finding genetic alternations that have strong link to serious disorders and diseases. Test genomic tools has various applications: Sequence analysis- Sequence analysis is the method of subjecting an RNA, peptide sequence and DNA to different kinds of analytical methods. How is sequence analysis used in bioinformatics work? Sequence analysis- Sequence analysis is the method of subjecting an RNA, peptide sequence and DNA to different kinds of analytical methods. This is done to identify the origin, evolution and structure of biological databases. Which is the best tool for genome sequencing? Clustal Omega in bioinformatics is a next generation sequencing tool designed for doing multi sequence alignments. The genome testing software for Linux supports different input sequence types such as HMM profile and aligning the sequence. Get Clustal Omega: Available Clustal Omega Download. What kind of databases are used in bioinformatics? Biological databases in Bioinformatics – Biological databases in bioinformatics can be best understood by analysing its three classifications that exist. The three classifications are- functional, structure and sequence. Protein sequences and nucleic acid is stored in sequence database whereas proteins & RNA exists in structural databases.
https://www.ammarksman.com/what-are-sequence-analysis-tools/
In the early 1900s, Albert Einstein formulated two theories that would forever change the landscape of physics: the Special Theory of Relativity and the General Theory of Relativity. By 1925, quantum mechanics had been born out of the dissection of these two theories, and shortly after that, relativistic quantum field theory. We now had in place some important ties between the laws of physics and the types of particle interactions the new physics was uncovering. Gravity is one of the four types of forces that are found throughout the universe. In fact, although it is a relatively weak force, it operates at huge distances, and so must be accounted for in any cosmological system. Unfortunately, gravity continues to defy our neat categorization of how all the forces in nature work together. Professor Tai Chow, from the California State University at Stanislaus in Turlock, lays out for us the basic ideas of Einstein, including his law of gravitation, explains the physics behind black holes, and weaves into this an absorbing account an explanation of the structure of the universe and the science of cosmology, including presenting the various models of the Big Bang, the Inflationary Universe, and the Unification of Forces. Travel with him down this engaging path to reach some fascinating conclusions, which raise even more interesting questions for the future of astronomy and physics. Says Dr. Mark Silverman of Trinity College in Hartford, Connecticut: "The author … introduces the mathematical methods essential to understanding and applying general relativity…but leaves to more advanced references derivations that a beginning student would likely find overly long and tedious…. In this way the student can concentrate on learning physics ….A strong point [is] the comprehensive discussion of the physics of black holes. Here again the author has hit just the right level of presentation: sufficient mathematical detail to demonstrate …the physical attributes of black holes…yet not so much mathematics as to lose track of the physics in an impenetrable forest of equations. An equally strong point is the discussion of the most exciting contemporary issues in astrophysics apart from black holes…" - About the authors - Tai L. Chow is Professor of Physics at California State University, Stanislaus. He has written a successful text on Mathematical Methods with Cambridge University Press: Chow, Mathematical Methods for Physicists: A Concise Introduction (Cambridge, ISBN 0521655447 , 555 pp., Hardcover, $58.00 [Hardcover: $120.00], 7/2000) - Reviews - From the reviews:
https://www.springer.com/gp/book/9780387736297
The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment, today announced the publication of a new document, Implementation Guidelines for the Cloud Controls Matrix (CCM) v4. The implementation guidelines are a new addition to the CCM v4, CSA’s flagship cybersecurity framework for cloud computing, and were developed to support users in the proper application of CCM controls, while providing additional guidance and recommendations tailored to the control specifications for each of CCM v4’s 17 cloud security domains. “Given the enterprise-specific nature of cloud infrastructure and architecture, CSA cannot provide detailed, prescriptive guidance pertinent to every organization and cloud service implementation or technology. That being said, the guidelines represent an ideal compendium to the CCM controls as they provide a greater level of detail regarding cloud security and privacy best practices. We are confident that the Implementation Guidelines represent a very useful tool for supporting cloud service providers and cloud customers in their adoption of the CCM requirements,” said Daniele Catteddu, Chief Technology Officer, Cloud Security Alliance. The guidelines are available as both a spreadsheet and PDF: The former allows organizations to leverage the guidelines in conjunction with the full roster of CCM v4 components, while the PDF provides structured guidance on working through the CCM framework. It should be noted that the document is not meant to be a “how-to” manual for the CCM controls implementation. Given the nature of CCM controls, their operationalization will depend on numerous factors, largely the IT/service architecture, the type of technology used, risks faced, applicable regulations, and organizational policies, among others. The CCM Implementation Guidelines are a collaborative product of the volunteer CCM Working Group and are based on shared cloud service provider and cloud service customer experiences in implementing and securing cloud services and using CCM controls. The working group’s insight covers myriad topics and queries, including how organizations can best: - implement controls for the first time - improve an existing implementation - answer a Consensus Assessment Initiative Questionnaire (CAIQ) question - better understand a customer’s security responsibilities - leverage CCM controls within a specific platform or architecture CSA also released The Evolution of STAR: Introducing Continuous Auditing, which provides an overview of STAR Level 3, the most rigorous assurance tier in CSA’s Security, Trust, Assurance and Risk (STAR) program. STAR Level 3 allows certified service providers to demonstrate that critical security controls are being continuously monitored and validated, thereby providing customers with the ultimate level of transparency and assurance. It’s important, therefore, that enterprises understand the critical role this plays in third-party risk management. The white paper reviews implementation concepts and process design, demonstrating how continuous security control auditing and certification delivers best-in-class security transparency. “When implemented properly, the CCM framework, the foundation of the STAR program, helps reduce cybersecurity risk by delivering best-in-class security. It’s critical therefore that those seeking STAR Level 3 certification understand and properly apply the CCM control set to their organization,” said John DiMaria, CSA Research Fellow, Assurance Investigatory Fellow, Cloud Security Alliance. CSA is currently working with solution providers on a Proof of Concept (POC) to demonstrate how commercially available technology solutions can be leveraged to achieve STAR Level 3 certification. CSA invites additional organizations, both solution providers and customers, to join the POC and extend its scope of applicability. For more information or to volunteer, please contact us at [email protected]. Download the Implementation Guidelines for the Cloud Controls Matrix (CCM) v4 and The Evolution of STAR: Introducing Continuous Auditing now. About Cloud Security Alliance The Cloud Security Alliance (CSA) is the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment. CSA harnesses the subject matter expertise of industry practitioners, associations, governments, and its corporate and individual members to offer cloud security-specific research, education, training, certification, events, and products. CSA’s activities, knowledge, and extensive network benefit the entire community impacted by cloud — from providers and customers to governments, entrepreneurs, and the assurance industry — and provide a forum through which different parties can work together to create and maintain a trusted cloud ecosystem. For further information, visit us at www.cloudsecurityalliance.org, and follow us on Twitter @cloudsa.
https://www.channelbiz.co.uk/press-release/cloud-security-alliance-releases-new-guidelines-providing-insight-into-effectively-using-its-industry-leading-security-assessment-assurance-tools/
The Future Classroom Lab Strategic Seminar took place on 15 May 2019 in Brussels with the presence of 40 participants, mainly policy-makers and educational authorities from European, national and regional levels. Innovation in Maths and Science Teaching (IEMC2019) – Santarém, Portugal 28/03/2019 During the weekend of 15 and 16 March 2019, the Escola Superior de Educação do Instituto Politécnico de Santarém (Portugal) organized the IEMC conference about innovation in teaching of Mathematics and Sciences. More than 150 attendees took part in a very varied programme of keynotes and discussions, as well as engaging hands-on sessions. The conference promotes the ideas of active and project based learning. SCHOOL-BASED CASE STUDIES Call for Teachers March 2019– December 2019 14/02/2019 In order to provide better frameworks of support for teachers to mainstream the impact of Teacher Academy (TA) courses, a newly established study group will carry out school-based case studies during 2019. Transforming education through technology in the recently opened #MicrosoftEDULab 01/02/2019 Microsoft opens its door to innovation by creating the #MicrosoftEDULab, the second innovative lab in Madrid after the creation of the Aula del Futuro of INTEF, in December 2017. EU Code Week 2018, a celebration of code with a huge impact! 11/01/2019 Since August, European Schoolnet has been supporting EU Code Week, a run by volunteers grassroots initiative that invites everyone to try coding with or without electronic equipment. The idea is to make programming more visible, to show young, adults and elderly how to bring ideas to life with code, to demystify these skills and bring motivated people together to learn. Active learning for active students! 10/12/2018 One of the main challenges of educators is to plan lessons that stimulate a classroom by putting students at the center of the learning process and by actively involving them. What are the key action verbs to be considered to this end and how can the environment encourage active learning? Programming: not just coding but collaboration, problem-solving, creativity and much more! 09/11/2018 Programming and computational thinking skills are already ever more important in our society and working life. Learning to code develops various skills such as problem-solving, logical reasoning and creativity, and can help student motivation in mathematics theory as it encourages them to apply their knowledge. Schools are key players in introducing programming to students in an engaging way, and help defuse negative stereotypes around computer science. FCL training programme 2019 just released! 22/10/2018 Future Classroom Lab launches the new training programme for 2019 and invites teachers from all around Europe to challenge their teaching practices and start innovating in their classrooms today! Getting inspired by school visits in Portugal 16/10/2018 The biannual meeting of the network Future Classroom Lead Ambassadors took place on the first days of October 2018 in Lisbon, Portugal. The programme included a one-day study visit to two innovative schools outside the capital. Newsletter The newsletter includes news from the Future Classroom Lab, related EC-funded and other European Schoolnet projects, including Novigado, EDU Regio, ITELab, and many more. The newsletter is issued approximately four times a year, in English. Previous newsletters: want a preview? Read them all. Future Classroom Lab Blog The Blog is closed now but you can read the old Blog stories here.
https://fcl.eun.org/news;jsessionid=714905168E43FBDD84988099063F37A3?p_p_id=eunwebcontentbrowser_WAR_eunliferaycontentbrowserportlet_INSTANCE_v9sryzpuoifH&p_p_lifecycle=0&p_p_state=normal&p_p_col_id=column-1&p_p_col_count=1&_eunwebcontentbrowser_WAR_eunliferaycontentbrowserportlet_INSTANCE_v9sryzpuoifH_pageNumber=5&_eunwebcontentbrowser_WAR_eunliferaycontentbrowserportlet_INSTANCE_v9sryzpuoifH_keepSession=true
A variety of primary and secondary source documents on multiple topics are available for teaching and learning through the New Mexico State University Library (NMSU). Many of the items in the digital collections are part of NMSU Library’s Archives and Specials Collections. Use the links below to learn more about teaching with digital collections. Consult the Lesson Plans tab for ideas on using digital collections in your classroom. We are available to help you use digitized and born-digital collections in order to meet a wide variety of learning goals. If you have questions, ideas or want to learn more about using NMSU’s digital collections, please contact the Digital Projects Collections Team directly. Introduce your students to Archives & Special Collections and primary source research online. Use digital collections and surrogates to help students understand the context of a digital source, engage with data, and make connections between digital materials and course themes. Use primary source sets for students to interpret and engage in document analysis, build narrative between sources, and contribute to scholarly communications through transcription, annotation, and other activities. Using data visualization and textual analysis tools students can create interactive methods to learn from collections, leverage voices often lost in the archive, and foster a better understanding of the context of a collection. The NMSU Library makes its collection images available for any lawful purpose without licensing or permission fees to the library.
https://nmsu.libguides.com/nmsudigitalcollections/teach
The report provides separate comprehensive analytics for the US, Canada, Japan, Europe, Asia-Pacific, Latin America, and Rest of World. Annual estimates and forecasts are provided for the period 2015 through 2022. Also, a six-year historic analysis is provided for these markets. This report analyzes the worldwide markets for Patch and Remediation Software in US$ Thousand. The report profiles 44 companies including many key and niche players such as: Automox Technologies, Inc. (USA) Autonomic Software, Inc. (USA) CA Technologies, Inc. (USA) Comodo Group, Inc. (USA) Ecora Software Corporation (USA) Flexera Software LLC (USA) GFI Software (USA) International Business Machines Corporation (IBM) (USA) Kaseya Limited (Ireland) Landesk (USA) Shavlik (USA) LogMeIn, Inc. (USA) Lumension Security, Inc. (USA) Microsoft Corporation (USA) SmiKar Software (Australia) SolarWinds Worldwide, LLC (USA) Symantec Corporation (USA) ZOHO Corporation (USA) Key Topics Covered 1. INDUSTRY OVERVIEW IT Patch Management: An Important Component of Lifecycle Management Major Market Trends & Drivers Focus On Vulnerability Management Lifecycle: The Cornerstone for Growth in the Market The Vital First Step that Precedes Remediation & Patching . Growing Concerns Over Cyber Security & Information Security Drives Demand for Security Patch Management Solutions Rise in Cyber Crime Throws the Spotlight on Patching & Remediation Omnipresence of IT Vulnerabilities: A Review Zero Day Exploits: A Security Challenge that Pushes Up the Importance of Continuous Patching & Remediation Phishing Attacks Increase in Threats for Mobile Devices Drives the Need for Mobile Patching & Patching at End-Points Exploits On Websites, Browsers & Operating Systems Rising Number of Vulnerabilities Discovered on Internet/IT Platforms Heightens the Need for IT Administrators to Stay Current on Patches to Close the Window of Threat Conclusions Focus on Security Vulnerabilities in IoT Systems Drives the Need for IoT Patching High Network Availability Needs Drives Demand for Runtime Patching/Dynamic Patching/Hotpatching Patching in the BYOD Environment Becomes All Consuming Cost Savings Drive the Popularity of Third Party Patches Over Vendor Supported Patches The Need for More Effective Patch Prioritization Fuels Interest in Patch Management Software Unviability of Manual Patching Drives the Era of Automated Patch Management A Patch in Time Saves Time & Money . Enterprise Patch Fatigue as a Result of Continuous Patch Assessment & the Need to Pre-Test Patches Drives Interest in Automated Patch Testing Solutions Cloud Based Patch Management Software/ Services Witness a Spike in Commercial Value Over Traditional In-House Programs Cloud Computing Preps the Market for a New Patching Experience Will the Market Be Jumping Onto the Cloud Bandwagon? Not So Fast Challenges Still Linger Standalone Solutions Give Way for Bundled Solutions Opportunistic MSPs Target SMBs as a Lucrative Customer Cluster in an Increasingly Commoditized Market Healthcare Sector Emerges as the Rapidly Growing End-Use Market for Patch & Remediation Software Strong Investments in Healthcare IT Lays the Foundation for the Growth of Patch Software IoT in Healthcare & the Rise of Connected Equipment Brings Patching Into the Spotlight as the Most Vital Inoculation against Security Breaches Regulations Exert Pressure on Mandatory Patching Needs Cloud-Based Patching Grows in Prominence in the Healthcare Sector Developing Markets: The Focal Point for Future Growth Key Challenges Restraining Growth Prevailing Confusion Impacts Patch Management Efforts Data Overload: A Key Challenge in Developing Processes for Prioritizing Patching Efforts Competition: A Qualitative Review A Fragmented Market Select Patch Management Software Products Review of Select Leading Patch Management Tools Altiris Patch Management Solution GFI LanGuard Lumension Endpoint Management and Security Suite Market Outlook
How to write about your hobbies? How to write about your hobbies? This is where the things get a little bit easier. And the fact that you can study in peace is thanks to the plan we have compiled for you. Just equip yourself with a peculiar hobby and you are ready to go. But there are some rules that must be strictly observed. As soon as you start playing games, the above rules will no longer be applied. It is just the algorithm of how our ancestors tried to survive in the mortal world. If a person is engaged in intellectual work, they experience some difficulties as they do not know how to express their thoughts. That is why they will never regret game development. In the process of training, you will learn how to think logically, create logical chains, which will simplify the way of the argument. The more you play, the more your brain is getting about. The more you learn, the more you can analyze the world and the people you meet around. Learning isn’t a matter of how brilliant your knowledge is, it is just a matter of how much you can work on it. And the more you play, the more actively you are learning, the more you can develop your abilities. Playing is a great service to your brain. As a result, you will become a professional in a chosen area. The most important thing to ask yourself is, why do you like the game. Therefore, it is important to think about the position of the designer in the symbol of your work. Are you comfortable with the image of a hero on your forehead? For some games, this question is actually quite clear: a person can choose the role of this character for themselves. In many companies, there are people who can work even better than the maximum number of workers, and they are not just standing out from the competition. The reason for such a success is a deep commitment to the role, the desire to take part in the management of the company. It should be noted in a essay on video games advantages and disadvantages that differences in the evaluation of video games are due to subjective complexity of the picture of the world in the field of aggression: some people can distinguish gaming behavior from real life, while others — no. Adulthood usually increases this ability: a small child brings an emotional relationship that has arisen during role-playing into reality. The adult sportsman demonstratively shakes hands with his opponent after a tough fight. The further development of this skill is manifested as the ability typical for modern people — to kill each other in virtual space and to be friends in reality. The more criteria for analysis a person has, the more aggressive his behavior may be while remaining within the framework of generally accepted moral norms. A respected member of society often differs from a criminal not by what he does, but by how. The complexity of the perception of the world allows people to choose ways to achieve the goal more flexible, reducing damage to the interests of individuals, society or the entire environment. This characteristic is typical of all kinds of human activity, especially for creative thinking. Often people talk about the life of a famous scientist or artist with military terms: “revolution of the outlook,” “struggle of ideas.” You may conclude in positive effects of video games essay that, if not to oppose the virtual reality to the real world and to consider them as parts of one life, then computer games become a simulator for learning how to control aggressiveness. When the player changes the game for some other activity, the skill remains and becomes quite useful. Another attractive feature of video games is the use of a computer. The role and significance of operator’s work steadily grow: more and more people control something or anyone using a keyboard, mouse, and monitor. Although many parents oppose such entertainment, for their children, this is a good way to obtain valuable knowledge. General review for essays about video games with the elements of violence The relevance of “Do violent video games cause more aggression, bullying, and fighting?” argument essay is connected with the fact that the world is divided by the abyss which has become more rooted in recent years. Children say that computer games are lovely, great, cool, and so on. They always want to play. Parents can punish kids not getting to play or encourage them by allowing such pastime. Adults talk about Veldt syndrome. A generation obsessed with aggression grows in their homes. The Veldt syndrome hides the problem of the generation gap. The computer became the most cherished childhood dream. And parents faced a question “What to do?” Not to pay much attention to it or to declare war on computer games? Since they “conquered” the world, humankind has divided into two camps: supporters and opponents of virtual reality. Each time, researchers from different countries find more and more arguments for and against games. But, probably, it will be most accurate to write in an argumentative essay on video games and violence that the scales are still in an equilibrium position.
https://vivu.tv/how-to-write-about-your-hobbies-22/
ON SEPTEMBER 9, 2014, REPRESENTATIVES OF THE 21 FIRST NATIONS OF THE ROBINSON-HURON TREATY OF 1850 BROUGHT A LAWSUIT AGAINST CANADA AND ONTARIO FOR THEIR FAILURE TO IMPLEMENT THE ANNUITY AUGMENTATION TERMS OF THE 1850 TREATY AS UNDERSTOOD BY THE OJIBWAYS OF LAKE HURON. In total, 21 Indigenous communities inside of the Robinson Huron Treaty territory are taking Canada to court over their annuities claim. We are honoured that we have been asked to help tell their story. WHAT DOES IT REALLY MEANS TO LIVE IN A COUNTRY FOUNDED BY TREATY? This fight began in 1850 when the Treaty was signed, even then, the Anishinaabe Headmen that negotiated the treaty, called for fair treatment and an honourable deal. Litigation talks began in 1992. Finally, in 2014, a lawsuit was brought against Canada and the province of Ontario. This project is exciting for a number of reasons - it is potentially precedence setting, we're going to take you inside one of the most important Treaties in Canada and we're working with Elders, Youth and other Knowledge Carriers from the 21 RHT communities in a collaborative and forward looking way to tell this story. This project will help the communities involved as well as the general public better understand the case and why it is significant. We will bring you inside the expert testimony, you'll hear the voices of people with knowledge of the 1850 RHT and we'll help communicate where the proceedings are at throughout the duration of the case. We are currently in pre-production on an audio podcast mini-series and video series that will feature the voices of Youth, Elders and other knowledge keepers that will help to shine a light on the importance of the 1850 RHT and why this litigation is an essential step to correcting the relationship between Indigenous communities and the Crown. The audio podcast will be available wherever you listen to podcasts (iTunes, podcasting apps), online on their website, through various social media channels, and, it will also be available for FREE to community radio stations across the RHT territory. All video content will be shared across social media platforms. If you're interested in keeping up to date with updates and the content from this project, simply join our mailing list and everytime we drop new content it'll get sent directly to your inbox! Sign up with your email address to receive news and updates about this project.
https://www.makoonsmedia.org/news/2017/12/13/makoons-media-group-partners-with-1850-robinson-huron-treaty-trust
Bilbo Baggins (Holm) has had an adventurous life as he tells Frodo (Elijah Wood). He decides to sit down and write about what happened to him sixty years ago. When he was a much younger hobbit, Bilbo (Freeman) received a strange invitation from a wizard by the name of Gandalf the Grey (McKellen) that involves a bunch of dwarves. Gandalf tricks Bilbo into having a dinner party. Bilbo is taken back, to say the least, as twelve dwarves start showing up at his doorstep unannounced and ready for a feast. Gandalf used a bit of magic to mark Bilbo’s door as a marker. The dwarves are on a journey to reclaim their land. Dwarf King Thror had become the ruler under the Lonely Mountain area. The area prospered for all until Smaug the Dragon was drawn to their copious amounts of gold and destroyed their town of Dale. The arrival of Smaug drew the dwarves out of their town. Thror and his son Thrain perished, but Thrain’s son Thorin (Armitage) survived as he was out hunting. Thorin arrives to see the destruction of his town and noticed King Thranduil (Pace) and his elves standing on the hillside refusing to help. This refusal led to the animosity and feud between the dwarves and elves. After much hesitation, Bilbo joins Gandalf and the rest of the dwarves on their trek to the Lonely Mountain to reclaim their territory. All does not go safely to plan for our company as they battle the many Orcs and goblins along the way. Gandalf leads the group to Rivendell to seek advice from Elrond (Weaving), Galadriel (Blanchett), and Saruman the White (Lee). Bilbo encounters the creature Gollum (Serkis) along the way and steals the ring he is possessing after learning of its invisibility power. The presence of the mysterious Necromancer and Smaug looms in the air and could have a lasting impression on Bilbo, Gandalf, and the dwarves. Peter Jackson has released the movie in quite a few viewing formats: 2D, 3D, and the new HFR 3D. HFR stands for high frame rate. Jackson shot the movie at 48 frames per second compared to the standard 24 frames per second most movies are shot in. I was able to watch The Hobbit: An Unexpected Journey in HFR 3D. Not many theaters are able to show this specific format, so if you are interested you may need to check your local theater to see what format they are playing the movie in. The HFR format is getting mixed reviews. The picture quality is unbelievably clear and crisp. The easiest thing I can compare it to is as if you are watching a live recording of a show or concert on an LED HD TV. I think it enhances the 3D and gives the picture a clearer and less dark and murky quality that typically comes with 3D territory. The picture quality takes a little bit to get used to, but after ten or twenty minutes you will adjust. Everything about the picture is clear and noticeable. You may be able to notice wigs, make-up, and prosthetics more than you had before. HFR has great potential, but it will take some time before filmmakers fully understand how to use it and work with it. The Hobbit: An Unexpected Journey is the first part in a new trilogy. Unlike The Lord of the Rings trilogy that was based on three different books, the new trilogy is only based on the one book plus some additional appendices and Tolkien notes that screenwriters Peter Jackson, Fran Walsh, Phillipa Boyens, and Guillermo del Toro are using to expand the story and incorporate The Lord of the Rings into it. This first part of the new trilogy does feel a little long and tends to drag on a bit at the beginning and in the middle sections. I was also missing an emotional connection with the characters like I did with The Fellowship of the Ring. I do not feel like Jackson and company needed to incorporate previous characters into it if they do not enhance the story or move it forward. The Frodo scenes are the beginning are completely unneeded and feel a bit awkward. On the other end of that spectrum, I enjoyed the scenes at Rivendell where we see a very different side of Saruman the White. Will the movie appeal to movie-goers that are new to the series or people that were a little ho-hum about the first three? Probably not. You will probably find the story long and drawn out. If you are a fan of the first trilogy, you will still enjoy and geek out of The Hobbit: An Unexpected Journey. You will not mind a bit that it will be three new movies. I adore the original trilogy and think they are stunning achievements in film making. Jackson has a way of capturing J.R.R. Tolkien’s worlds and characters and makes them a visual feast. They are detailed, lush, and fully realized often times making the audience believe they are real places instead sound stages and green screens. The Hobbit: An Unexpected Journey has it’s problems and is nowhere near as perfect as The Lord of the Rings. Despite that, this fan will still be in line opening night for The Hobbit: Desolation of Smaug.
https://paulstriptothemovies.com/movie-review-the-hobbit-an-unexpected-journey/
SES and Luxembourg Expand Reach of SATMED Telemedicine Project SES and the Luxembourg government have reached an agreement to broaden the reach of the SATMED telemedicine project through 2024. This is a program that has been in use since 2014 that uses satellite to connect doctors and nurses in remote locations, providing a platform with cloud applications for e-training, virtual consultations, medical data records, and video conferencing. This platform has been deployed in 10 locations across Africa and Asia in partnership with NGOs. Recently, SATMED supported COVID-19 response in a remote hospital in Sierra Leone with the NGO German Doctors, and in floating hospitals in remote areas of Bangladesh via NGO Friendship. Under the new agreement, the SATMED platform is set to scale to serve more users, through cooperation with partnering organizations. SATMED is a fully managed service deployed by SES subsidiary SES Techom with connectivity through the SES satellite fleet. “Our close working relationship with the partners enables us to constantly develop the platform to maximize its benefits for the end-users. SATMED’s recent software developments will further facilitate their work as we are introducing new interoperable applications and standardization in line with the internationally recognized classifications and medical data handling,” commented Alan Kuresevic, managing director of SES Techcom.
https://www.satellitetoday.com/healthcare/2021/04/02/ses-and-luxembourg-expand-reach-of-satmed-telemedicine-project/
Project management is a fairly new discipline, originating in the chemical industry of the 1930s (Williams, 2002) in DuPont Corporation (Hornstein, 2015). Project management gained acceptance as a ‘practitioners discipline’ in the post-WWII developments taking place in the domains of technology and infrastructure (Svetlana Cicmil & Damian Hodgson, 2006, p. 3). In the years following the publication of the first academic article on project management by Gaddis (1959), the discipline has made significant strides on various fronts, such as: operations management, information systems, conflict and negotiations, relationships, success, risk etc. In recent years, particularly after the publication of Cicmil and Hodgson’s (2006) Making Projects Critical, the discipline’s focus has turned towards an introspective critical examination through the lens of complexity. Project management has been a target of sufficient criticism for its failure to deliver projects on time, within budget, and within acceptable bounds of quality. The brunt of the criticism, emerging propositions, and recent research trajectories are focused on the failure of traditional project management as it applies to contemporary project environments (Cicmil, Cooke-Davies, Crawford, & Richardson, 2009). Other authors have argued similarly, contending that traditional project management methodologies founded on control system thinking are no longer sufficient (Padalkar & Gopinath, 2016; Remington & Crawford, 2004; Remington & Pollack, 2008). It is therefore necessary to discuss projects from an alternative perspective i.e. that of complexity. However, this does not require starting anew by any means, as it has been argued that complexity theory of the form applied to organizations may be applied to projects (Remington & Pollack, 2008). A general consensus found within the project management literature is that it is difficult to produce a precise definition of a complex project (Daniel & Daniel, 2018). Within the various definitions of complexity there exists a common theme of a number of parts or components and the interrelationships between them. Klaus and Liebscher (1979) definition of complexity, originating from the cybernetics camp, clarifies that ‘complexity is a character of a system defined by the type and number of relations existing between the elements, in contrast to the elaborateness of a system that is related to the number of different elements’. A hint of what these interrelationships are can be found in a helpful definition provided by the College of Complex Project Managers (2006) which states that ‘complex projects are open systems and are characterized by recursiveness and non-linear feedback loops, which make them sensitive to small differences in initial conditions and emergent changes’. The College goes on to identify certain characteristics of complex projects that differentiate them from traditional projects, these are: Complex projects are to some degree disorderly, instable, emergent, non-linear, recursive, uncertain, irregular, and random. Such systems, exhibit dynamic complexity where the interactions between the various elements comprising projects are varied and undefined; and there is uncertainty in objectives and methods. The reader may be interested to know that the College has now been renamed as the ‘International Center for Complex Project Management’ and is based at the Australian National University.
https://www.igi-global.com/article/towards-the-development-of-a-holistic-framework-of-project-complexity/227019
A programming language is a vocabulary and set of grammatical guidelines for instructing a pc or computing gadget to perform specific tasks. The time period programming language often refers to excessive-stage languages, similar to BASIC, C, C++, COBOL, Java, FORTRAN, Ada, and Pascal. Compile-time Reflection And Compile-time Code Execution § A programming language is a notation designed to attach directions to a machine or a computer. Programming languages are mainly used to manage the efficiency of a machine or to precise algorithms. For example, they might not have compile-time type checking. Usually, these languages require tiny syntax to get began. At present, computer programmer has many decisions to decide on the language, however there are many variations between programming languages. So, this text offers a short info relating to what are the various kinds of programming languages, differences between programming languages and types of programming languages in useful ways. High-stage programming languages, whereas simple compared to human languages, are extra complicated than the languages the pc actually understands, known as machine languages. Each completely different sort of CPU has its personal unique machine language. - While Python could be extra person-friendly than Java, because it has a extra intuitive coding type, each languages do have their distinctive advantages for builders and end customers. - With that in mind, listed here are the main similarities and variations. - However, if you are simply starting your path towards a programming profession, you might need to start by studying Python, as it’s less advanced. - Python climbed from third place to tie for second in the newest rating of programming language popularity revealed by the analyst agency RedMonk. - On the other hand, you will be ahead of a lot of your colleagues if you’ll be able to understand each. Like reusability and it can be difficult to put in writing efficient code in Java. But, nowadays the pace of the Java language has increased and 1.5 model provides some good options for simple program making. However, this language is used to design cross platform packages, Since it much like C++ in structure and syntax. For C++ programmers, Java language could be very simple to study and it offers some benefits supplied by object oriented programming. At current, thousand programming languages have been implemented. In the pc subject, many languages have to be acknowledged in an imperative type, whereas different programming languages make the most of declarative form. The program could be divided into two varieties corresponding to syntax and semantics. Some languages are defined by an SO standard like C language. Programming languages are used to manage the performance of the computer or machine. Python is a basic-use programming language identified for its readability and simple coding philosophy. The Java language is a multi platform language that’s notably helpful in networking. Of course, largely this language is used on the internet with Java applets.
https://www.plataformademujeresartistas.org/why-java-should-be-your-first-language-instead-of-python-2.html
The U.S. is a natural point of comparison for the Canadian economy for many obvious reasons. But Australia is an even better point of reference when is comes to certain aspects of our economy, especially in the last decade. Both countries are a major exporters of natural resources and have undergone significant transformation over the last decade. The surge in commodity prices increased the terms of trade — the ratio of the price of exported goods to the price of imported goods — in both economies, but the effect in Australia was far stronger than what we saw: So it is perhaps appropriate that the most intuitive explanation for the effects of an improvement in terms of trade on economic welfare that I’ve seen came from Governor or the Reserve Bank of Australia Glenn Stevens: “When the terms of trade are high, the international purchasing power of our exports is high. To put it in very (over-) simplified terms, five years ago, a ship load of iron ore was worth about the same as about 2,200 flat screen television sets. Today it is worth about 22,000 flat-screen TV sets – partly due to TV prices falling but more due to the price of iron ore rising by a factor of six. This is of course a trivialised example – we do not want to use the proceeds of exports entirely to purchase TV sets. But the general point is that high terms of trade, all other things equal, will raise living standards, while low terms of trade will reduce them.” (Regular readers will recognize this passage from here.) We all know that the Canadian dollar appreciated as resource prices rose. The Australian dollar appreciated even faster: And it’s worth noting that the Australian experience of the last recession was “Recession? What recession?” I suspect the reasons why Australia sailed through the downturn unscathed is that it is less integrated than Canada with the U.S. and European economies (which tanked) and more integrated with China (which didn’t). The swift recovery in resource prices was a significant factor in explaining why Canada recovered more quickly than other G7 countries, and probably explains why Australia only saw a short-lived reduction in the rate of growth of GDP during 2008-09. For some reason, the term “Dutch disease” seems to be uniquely associated with fossil fuels, so the phrase doesn’t dominate the public debate in Australia the the extent it does here. But the same mechanisms are at work: a shift toward resources and away from other export sectors. My own take is that these transitions have been a net benefit to the Canadian economy, and that the transition costs have been surprisingly low. A recent RBA report uses much the same approach and reaches essentially the same conclusion for Australia: “Strong growth in Asia, particularly in China, has had a profound impact on the Australian economy over the past decade. Most notable so far has been the boom in the resource sector, with commodity prices and hence Australia’s terms of trade rising to historically high levels over a number of years. This has been accompanied by a sizeable appreciation of the exchange rate. While the terms of trade have passed their peak, the substantial investment in productive capacity of the resource sector in recent years is expected to provide a large boost to the production and exports of resources in coming years. … relative wages and prices adjusted in a way that facilitated the reallocation of factors of production towards the resource sector.” The RBA study pays special attention to the exchange rate appreciation, noting that the stronger Australian dollar had the effect of moderating the effects of resource price increases: higher exchange rates make all exports — including resource exports — less competitive on world markets. It also emphasizes the role a stronger currency has in increasing real incomes. As Mark Carney noted in his Dutch disease speech, “In a world of elevated commodity prices, it is better to have them.” Indeed it is. Just ask the Australians.
https://www.macleans.ca/economy/business/the-dutch-disease-down-under-how-did-high-resource-prices-work-out-for-australia/
Hang on for a minute...we're trying to find some more stories you might like. Email This Story If one thing has become apparent in the aftermath of the recent party conventions, it is that our nation’s two most prominent political parties are more polarized than ever before. Individuals on the right see the liberals as Godless socialists, and those on the left view the conservatives as Christian fundamentalists or greedy elites who want to take everything they can and give nothing back. The truth is the vast majority of the American people would not be found on the extreme left or right of the ideological spectrum and more than likely would agree with some ideas from both sides of the aisle. There are a plethora of individuals who gravitate towards what Americans would call the middle of the political sphere; however, for the most part these voices cannot be heard over the ridiculous opinions of more drastic fundamentalists such as Rush Limbaugh or Michael Moore. Although neither party platform is quite as crazy as Limbaugh or Moore would like, both have assisted in creating the contemporary perspective on American politics as one that appears to be a choice of one extreme or the other. Due to this view of politics, many people have taken a strong stance as either a stern Democrat or Republican. With this comes the adoption of all of that party’s views, whether one really agrees with them or not. A prime example of someone who has made this shift is presidential candidate Mitt Romney. Less than a decade ago, Romney was pro-choice and supported gay rights, as well as initiatives such as socialized health care. But Mitt wanted to run for President, and for him to do that he had to drop his more moderate views and join the rest of the radical individuals on the far right. Although the Democrats have become more polarized in their own way, their outlook has remained fairly consistent. Also, it’s difficult to argue that President Obama is any different today than he was ten years ago, other than the fact he has a lot more experience and his hair is much grayer. With that said, in no way, shape or form is Obama as perfect as many of his supporters would like to believe. But at least he is honest with them on most accounts. Mitt Romney has been willing to completely change his views on a number of topics for the purpose of appeasing his party’s base. Whether he actually believes what he tells his constituents is debatable as well. Who knows what this election would look like if Mitt Romney was willing to show his true colors. Probably it would have been impossible for him to win the election, but at least the American people would have received an honest choice between two candidates, not two parties and their super PACs. It’s sad that in a country which boasts about its individual freedoms and civil liberties, we lack political candidates who are able to maintain a degree of distinctiveness.
https://theseahawk.org/6010/opinion/worlds-apart/
How many of us like RULES? Imagine standing in a queue to buy movie tickets, wouldn’t it be much better if we could simply jump to the first place near the ticket window? As a kid, I remember my dad saying “Go to bed at 10, no late nights”, and I felt awful and questioned why I couldn’t watch a late night movie. What about the policy of your organization to wear casuals on Fridays? Thank God, we can work in jeans at least for a day in the office! If I look up the word policy in the dictionary, it says “The set of basic principles and associated guidelines, formulated and enforced by the governing body of an organization, to direct and limit its actions in pursuit of long-term goals.” Why does the governing body (country/organization/even dad) need to enforce rules and guidelines? To this, they’d easily say, “To bring discipline into our lives”. To progress, one needs discipline, and policies make sure that people are disciplined. On opening SSMS under the management folder, we can find Policy Management. Policy Management allows creating policies for various facets with a specified condition. Facets: Facets is the property of SQL Server which the policy will consider managing. There are several facets on which policies could be implemented. For example, we will use the “Database Option” facet to implement a policy which will ensure that the AutoShrink option should be TRUE for all hosted databases on the server. Similarly, we will be creating policies on the Stored Procedure facet. Conditions: It is the criteria upon which the facet is evaluated. While designing a policy for the server, the first step is to create a condition which is to be evaluated by the policy for the facet. Policies: As the dictionary says, I reform, a SQL Server policy is a set of basic principles and associated guidelines, formulated and enforced by the Policy Manager of a server, for the desired server facets to conform with, which in the long run shall maintain the server consistent and help the DBA achieve organizational level IT norms. Scenario: We will create an on demand policy to ensure that all the databases have the Auto Shrink option set to True. By default, a database that is created has Auto Shrink set to False, as shown in the figure below. Next, provide a name to the Condition: “Check Auto Shrink”, and select the facet from the Facets drop down as “database option”. In the Expression Editor, choose the field from the drop down “@AutoShrink”, select operator as “=”, and value as “True”. The condition will check all databases for their auto shrink properties to be true. Provide a name as “AutoShrinkPolicy”; from the Check condition drop down, select the Condition we just created. And from Targets, check every database as we want every database to conform to this policy. Next is the evaluation mode. Let’s keep it “On demand” for this example. On demand means we will evaluate the policy at our will instead of at a predefined schedule. We are all set, the policy is in place. We have been able to create the policy; now we will let the Policy Manager evaluate the policy. To evaluate, right click the Policy “AutoShrinkPolicy” and click Evaluate. SQL Server evaluates and lists the result as shown in the screenshot below. Since for none of my databases Auto Shrink is True, there are non-conformations for each one of the hosted databases on my server. For conforming the results as per the Policy, check against the database and click on the Apply button. This will set the Auto Shrink property for TestDB to True and a green sign will denote its conformance. Scenario: The scenario is ensuring that each user defined Stored Procedure created on the server is prefixed with ‘usp_%’. Let’s design a policy for this. Next, provide a name to the condition “CheckProcName”, and select the facet from the Facets drop down as “Stored Procedure”. In the Expression Editor, choose the field from the drop down “@Name”, select operator as “LIKE”, and value as ‘usp_%’. The condition will check the names of all the Stored Procedure to be prefixed with usp_. Provide the name as “ProcPolicy”; from the Check condition drop down, select the condition we just created, i.e., CheckProcName. And from Targets, check every Stored Procedure in every database as we want every Stored Procedure to conform to this policy. Next is the evaluation mode. Let’s keep it “On Change: Prevent” for this example. On Change: Prevent will evaluate the policy for any further procedure creation, and will prevent it from being created unless it is as per the policy. Also, do remember to check the Enabled check box, and click OK. We have been able to create the policy, now let the Policy Manager evaluate the policy. To evaluate this policy, open the SSMS query analyzer and try to create an SP under any database. With these two examples, I hope I have been able to explain Policy Management at the beginner’s level. To summarize, policies are made to ensure that rules are followed and guidelines are adhered to. Till SQL Server 2005, policy implementation was a mammoth task which DBAs had to do manually (with the help of triggers etc.), but the introduction of SQL Server 2008 has made the the lives of DBA’s much easier (literally). Creating and implementing policies has become much easier, faster, and more reliable. All that’s required to do is to first create a ‘Condition’ which is nothing but the guideline or rule that has to be followed, and then create the policy to adhere to this condition, and voila we have our Policy. Policies can be created on various ‘Facets’ of the database, e.g., database, table, Stored Procedure, etc. Policies can be on demand, or scheduled, or on change (log only or prevent). Someone asked, using policy management we can restrict users to follow a particular naming convention for procedures, that’s awesome. But we can’t do the same thing for table names. I tried to set up this one but only got two evaluation modes (on schedule and on demand). I didn’t get on change: prevent, is there a way to implement this in Policy Management? While the first two don’t provide the option of “on change: prevent”, the last one does, giving the option to prevent the naming of the table which doesn’t adhere to the policy in place. The key is to explore; there are a lot of facets in place but figuring out which suits the bill needs a piece of thought. I tried the Exmple No. 2 but it did not work out as you mentioned in blog in SQL SERVER 2008 R2. When i evaluate the policy manually; then it says; you violate the Policy. Is it something need to configure more in Policy or any Server Level? Please reply if you have any answer. "can not create the trigger 'syspolicy_server_trigger',because you do not have permission" showing when policy is created.I am sys admin.Still this error showing. exactly which permission required ?
https://www.codeproject.com/Articles/196025/Policy-Based-Management-in-SQL-Server-2008
Why do partial charges on a water molecule occur? Why do partial charges on a water molecule occur? Because oxygen is more electronegative—electron-greedy—than hydrogen, the Ostart text, O, end text atom hogs electrons and keeps them away from the Hstart text, H, end text atoms. This gives the oxygen end of the water molecule a partial negative charge, while the hydrogen end has a partial positive charge. Why does the partial negative charge in a molecule of water occur? A) The partial negative charge in a molecule of water occurs because the electrons shared between the oxygen and hydrogen atoms spend more time around the oxygen atom nucleus than around the hydrogen atom nucleus. Why do the atoms of a water molecule have partial charges quizlet? A water molecule is formed by covalent bonds between an oxygen atom and two hydrogen atoms. Because of the unequal sharing of electrons in water molecules, the hydrogen atoms have a partial positive charge and oxygen has a partial negative charge. What part of the water molecule has a partial positive charge? hydrogen atoms How do charged objects affect water? A charged object attract small particles, such as dust. The charge in the object causes a complementary charge to develop in something close to it. The charge on the comb attracts the molecules of water in the stream. Because the molecules in the stream can be moved easily, the stream bends toward the comb. Can water be affected by a charged rod explain? Yes! Water is a polar molecule which means that one side is postively charged and the other negatively charged. A charged rod can attact one side of the water molecule. When you run a thin stream of water and place a charged rod near it, the water will be attracted to the rod and bend toward it. Is tap water positively charged? Water, which is two hydrogen atoms and one oxygen atom, also is made up of charged particles, with the two hydrogen atoms having a positive charge. Because in water’s liquid form these atoms are free to move around any which way, it can easily be affected by a static electrical charge. Why does the charged balloon stick to the wall? When you rub a balloon against your clothes and it sticks to the wall, you are adding a surplus of electrons (negative charges) to the surface of the balloon. As the two come in contact, the balloon will stick because of the rule that opposites attract (positive to negative). What causes charged objects to attract? Any two charged objects exert a force on one another. The electrostatic force can either pull the objects together or push them apart. For example, the charged balloon and jumper attract each other. What happens if you have a positively charged object near a negatively charged one? When two positively charged objects are brought near each other, a similar repulsive force is produced. When a negatively charged object is brought near a positively charged object, an attractive force is produced. Neutral objects have no influence on each other.
https://rehabilitationrobotics.net/why-do-partial-charges-on-a-water-molecule-occur/
Jägers, P., Wagner, L., Schütz, R. et al. Social signaling via bioluminescent blinks determines nearest neighbor distance in schools of flashlight fish Anomalops katoptron. Sci Rep 11, 6431 (2021). Below a flashlight fish’s eyes is an organ that provides the ideal conditions for a special partnership. Bioluminescent bacteria live inside these organs. Here bacteria find the necessary nutrients to grow and reproduce. Flashlight fish cannot control how much light is created by these bacteria. However, it does have special flaps that block the bioluminescent light. According to a new study published in Scientific Reports in March of 2021, the blinking patterns of this fish are used to communicate with members of its own species. To find out how flashlight fish communicate with members of their own species, scientists conducted three separate experiments – two in a lab, and one in the wild. First, they placed a fish dummy inside a tank and introduced a single flashlight fish inside the tank. The faster that the fish dummy flashed its lights, the closer the flashlight fish stayed to the test dummy. In a second experiment, scientists placed thirteen LED lights around a circular tank and turned them on one after the other. Flashlight fish followed the LED lights and moved faster when the LED light flashed at a faster interval. From these two experiments, scientists determined that flashlight fish use light to follow fish of their own species and that fast blinking patterns are a signal to move faster and stay closer to other fish. These two findings are important for two main reasons. First, flashlight fish spend most of their time in dark underground caves and holes in the ocean. They come out to the surface to feed on zooplankton during dark moonless nights. Therefore, in such dark settings, light is an important way to communicate with members of its own species. Second, flashlight fish are a type of schooling fish. When schooling fish feel threatened by a predator they stay close to one another and move quickly. The fast blinking pattern is one way in which flashlight fish signal other members of the species that danger is looming. Diving at night off the coast of Indonesia, scientists waited for a school of flashlight fish to get close so that they could test their experiment in the field. Once the fish were close, they startled the school of fish using red dim lights and filmed their escape. From the film, scientists confirmed what they had seen in the lab – the fish blinked faster and stayed closer together. In ray-finned fish, the largest group of fish, bioluminescence has evolved independently at least 27 times. However, the majority of these bioluminescent fish live in deep areas where it is difficult for scientists to do experiments. While flashlight fish are closely related to deep bioluminescent fish, they live in relatively shallow waters. Thus, they are the perfect species to study so that we further our understanding of bioluminescence and learn how fish survive in dark areas of the ocean. Hello! I am a science communicator who loves sharing stories about the ocean. In my free time, I enjoy running, spending time outdoors, doing puzzles and sipping on coffee while reading a good book. I am also an educator at the Museum of Science in Boston.
https://oceanbites.org/to-communicate-with-members-of-its-own-species-flashlight-fish-uses-a-special-type-of-morse-code/
Alcohol dependency can be a complex and challenging situation for everyone involved. It is crucial to approach the situation with compassion, understanding, and patience. Remember that there are many ways you can help your family member who is struggling with alcohol dependency. Here are some strategies to get started. Educate Yourself The first step in helping someone with alcohol dependency is to educate yourself on the issue. The more knowledge you have about these topics, the better equipped you will be to help your family member. Understand the signs and symptoms of alcohol abuse, its effects on the body, and how it affects the person’s life. You can learn through books, articles, and online resources. Talking to a doctor or an addiction specialist can be beneficial as well. Discussing with a person who has gone through similar experiences can also be helpful. You can develop empathy and understanding of their struggles through learning. This will enable you to better support them through their journey. It also helps to minimize any judgment that you may have about their situation. Have an Open Conversation When talking about alcohol dependency, it’s important to keep an open mind and an open heart. Always remember that no one chooses to be dependent on alcohol. It’s a medical condition that needs professional treatment and support from loved ones such as yourself. When having a conversation with your family member, focus on listening rather than lecturing or judging them for their behavior. Make sure they know they have your support during this difficult time. Try to avoid being confrontational and instead focus on understanding the underlying issue. Furthermore, ask them what they need from you in order to get through this difficult time. This will help create an open dialogue that makes them feel heard and understood. It will also help them take ownership of the situation and take steps toward recovery. Seek Professional Help for Them It’s essential to get your loved one the professional help they need. Finding an effective alcohol rehab program can be a great way to start their journey toward recovery. Look for programs specializing in treating alcohol dependency and have good reviews from other former patients. You can also reach out to their primary care physician for advice on which programs may be the most suitable for your family member. Once you have found that is suitable, encourage them to attend and provide emotional support throughout the process. If possible, join them in some of their sessions or activities so that they know you are there for them. Your support can help them stay on track and make the most of their therapy. Set Boundaries Setting boundaries is needed for maintaining healthy relationships when dealing with someone with an addiction problem. This is to ensure that they are held accountable for their actions and to protect you or anyone from getting hurt. This means setting expectations for how you want them to behave around you or others and providing consequences if these expectations are not met. Help them determine which behaviors are unacceptable, such as drinking in front of the children or asking for money to buy alcohol. Be clear and consistent when communicating these boundaries and maintain them at all times. Let your loved one know that you are willing to help them, but only if they take the necessary steps to recover. By setting clear boundaries, you are showing your family member that you care and will do whatever it takes to protect them from themselves. Take Care of Yourself Taking care of yourself should always come first when dealing with someone whose life has been affected by substance abuse. Make sure you take time out of each day for self-care activities such as yoga, meditation, journaling, or going for walks in nature. You can also try to join a supportive group of people who understand what you are going through and can offer advice or reassurance. It’s important to remember that you cannot help them if you don’t take care of yourself first. The better shape you are in emotionally, the more equipped you will be when it comes to helping your loved one in their recovery. Addiction can take a toll on both those suffering from it and their loved ones, too—especially when it comes to alcoholism within families. However, by using some of these strategies, family members can provide much-needed support and guidance toward recovering from alcohol dependency. Remember: education, communication, helpful programs, boundary setting, and self-care are key components in helping someone closely recover from addiction. With enough love and understanding, anyone suffering from alcoholism can get back on track toward living healthier lives without relying on substances like alcohol for comfort or escape.
https://www.growhealthyvending.com/helping-a-family-member-with-alcohol-dependency/
Welcome to the podcast! Today I am delighted to be joined by Jake Thiessen, PhD, a Licensed Marriage & Family Therapist with a private practice in Lemoyne, Pennsylvania. Jake’s orientation to psychotherapy is existential and experiential. What that means is that he believes the most productive focus of therapy is on the here-and-now as opposed to the there-and-then. Granted, we are all, in many ways, the product of our history. As a result, it is often important to explore events from the past. Gathering information about the past and the patterns of behavior that were established then can be very useful and informative. But, the only place we can affect change is in the present. So, his primary interest is in how one experiences one's self and others in the present. Although he frequently works with individuals, Jake’s primary interest is in relationship difficulties. As humans, we are essentially relational and emotional beings. Because of this, he works with couples whenever possible. Jake believes change occurs most efficiently in the context of an intimate relationship where we have an opportunity to feel accepted just as we are. Most of us want to feel that no matter how messed up we are, we are still lovable and deserve respect. Psychotherapy offers a safe environment to address those things that keep us from feeling loved and respected. Full show notes available at - lourdesviado.com/womenindepth Welcome to the podcast! Today I am delighted to be joined by Melanie Greenberg PhD, who is a practicing psychologist, author, speaker, and life/business coach, with more than 20 years of experience as a clinician, professor, and researcher. A recognized expert on stress management, and health and relationship challenges, she draws on neuroscience, mindfulness, and positive psychology in her work, blending science with mindful wisdom and heart-based compassion practices. Melanie seeks to educate, support, heal, and inspire her clients helping them to realize their full potential. She is the author of The Stress-Proof Brain (New Harbinger) – an Amazon bestseller in Neuropsychology, Stress-Management, and Health. She also writes The Mindful Self-Express blog, which has over 8 million page views, for Psychology Today. Melanie has delivered talks and workshops to national and international audiences, businesses, non-profits, and professional organizations such as the American Psychological Association and The Bay Club, A popular media expert, she has been featured on CNN, Forbes, BBC radio, ABC News, Yahoo, Lifehacker, and the Huffington Post, as well as in Business Insider, Self, Redbook, Women’s Health, Men’s Health, Fitness Magazine, Women’s Day, and Marie Claire. She has also been interviewed on numerous radio shows and podcasts. With almost 50,000 followers, Melanie was named one of the 30 Most Prominent Psychologists to follow on Twitter by the British Psychological Association. Full show notes available at - https://lourdesviado.com/womenindepth Welcome to the podcast! Today I am delighted to welcome back Daniela Paolone, who is a Licensed Marriage and Family Therapist who practices in Westlake Village, CA. Daniela specializes in supporting people living with chronic pain, illness, anxiety, and depression. Their unique challenges aren’t understood by those who haven’t experienced these issues. She’s here to deepen our understanding and awareness, because many of us have loved ones who are facing these challenges. Daniela has worked as a therapist for the past seven years in many settings. That includes working at a non-profit agency, in schools, and in private practice. Full show notes available at - lourdesviado.com/womenindepth Welcome to the podcast! Today I am delighted to be joined by Julie Bjelland, LMFT. Julie specializes in working with the highly sensitive person (HSP), anxiety, couple's communication, self-esteem, and the LGBTQ community. Her passion and expertise is in neuroscience and determining how to successfully train the brain so people can live their best lives. Her most recent book Brain Training for the Highly Sensitive Person: Techniques to Reduce Anxiety and Overwhelming Emotions, has received beautiful reviews from world-renowned psychologists Tara Brach, PhD, Rick Hanson, PhD, and Ted Zeff, PhD. As a licensed psychotherapist in California, Julie enjoys working with clients in her private practice and continues to expand her work by developing online brain-training courses; coaching the highly sensitive person globally; supervising interns; serving as a consultant to mental health professionals; working with parents of highly sensitive children; and serving on the advisory council for global sensitive leaders. Julie loves her work and uses her deeply intuitive and empathetic abilities to truly connect with clients and students and to support them in getting to know and celebrate their authentic selves. It’s beautiful to be a part of the change that helps people live remarkably better lives. Full show notes available at - lourdesviado.com/womenindepth Welcome to the podcast! Today I am delighted to be joined by Dr. Jonice Webb. Dr. Webb has been a licensed psychologist since 1991, and has worked in a variety of different settings over the course of her career, including a psychiatric emergency service and substance abuse programs. She has been the Director of several large outpatient clinics. For the past eight years, she has been enjoying her private practice in Lexington, Massachusetts, specializing in the treatment of couples and families. Dr. Jonice Webb has been interviewed on NPR and over thirty radio shows across the United States and Canada about the topic of her book, Emotional Neglect, and has been quoted as a psychologist expert in the Chicago Tribune. She writes the popular Childhood Emotional Neglect Blog on PsychCentral.com. Over two decades of practicing psychology, Dr. Webb gradually started to see a factor from childhood which weighs upon people as adults. This factor is extremely subtle. In fact, it’s so difficult to see that it goes virtually unnoticed while it quietly saps a person’s joy in life, causing him or her to struggle with self-discipline, or to feel disconnected and unfulfilled. Dr. Webb gave a name to this invisible factor from childhood. She calls it Childhood Emotional Neglect (CEN).™ Full show notes available at - https://lourdesviado.com/womenindepth/ Welcome to the podcast! Today I am very delighted to be joined by dreamer, writer, and artist Toko-pa Turner. Toko-pa was born in a farmhouse in Devon, England by a midwife to poet-parents. Because they liked the music saying it made, they named her after the Maori deity, Toko-pa, who is the “Parent of the Mist” according to the Maori creation myth. She came to Canada at the age of four, where her grandparents settled after the war in Poland, and was raised in a Sufi community in Montreal. Along with yoga, meditation, Sufi dancing and singing, dreaming was an everyday part of her culture. From a very young age, Toko-pa was encouraged to share and explore her vivid dreams. In her early twenties, Toko-pa toured with a band, eventually recording her first original album. It wasn’t until her mid-twenties that she returned to the mystical teachings of Sufism and the study of dreams. She became deeply interested in Analytical Psychology and did a 3-year internship at the Jung Foundation of Ontario, while pursuing her studies in spirituality, mythology and shamanism. In early 2001, she was awarded a scholarship to study with psycho-physiologist and lucid dreaming expert, Dr. Stephen LaBerge, in Hawaii. She spent the following year writing a documentary series, “Awake and Dreaming” which was picked up for development by Vision TV. Blending the mystical tradition of Sufism in which she was raised with a Jungian approach to dreamwork, Toko-pa founded the Dream School in 2001 from which hundreds of students have since graduated. Toko-pa has been interviewed by CNN News and BBC Radio and has a community of over 100,000 online readers. Her writing has been published worldwide, and she is currently releasing her first book “Belonging” which explores the themes of exile, and the search for belonging. Sometimes called a Midwife of the Psyche, Toko-pa’s work focuses on restoring the feminine, reconciling paradox, and facilitating grief and ritual practice. You can find Toko-pa on her beloved Facebook page “Dreamwork with Toko-pa” or on her website at toko-pa.com. Welcome to the podcast! Today I am delighted to be joined by Dr. Ellis Edmunds, Psy.D. who is licensed psychologist in Oakland, California. Ellis spent much of his childhood playing board games, card games, and video games. As a graduate student, he became interested in using games in a therapeutic context. In his training, he focused on learning Acceptance and Commitment Therapy (ACT) and Mindfulness and continues to practice ACT with his clients. He also continues to love games and plays them regularly. Ellis was born and raised in Oakland, CA and graduated summa cum laude from the University of California, Berkeley with a Bachelors of Arts in Psychology in 2009. Ellis received his Doctorate of Psychology (Psy.D.) from the California School of Professional Psychology (CSPP) in San Francisco in 2013 where he wrote his dissertation on teaching mindfulness to socially anxious young adults. He has worked in community mental health, college counseling, and various Bay Area schools helping people from a variety of backgrounds improve their mental health and live more fulfilling lives. Full show notes available at - https://lourdesviado.com/womenindepth Welcome to the podcast! Today I am joined by Anita Johnston, Ph.D. who is the Director of the Anorexia & Bulimia Center of Hawaii which she co-founded in 1982 and is the Clinical Director and the Founder of the ‘Ai Pono Intensive Out-Patient Eating Disorders Programs in Honolulu and 'Ai Pono Maui, a residential treatment facility in Maui. She is also Senior Clinical Consultant to EATFED intensive outpatient program in Sydney Australia. Dr. Johnston developed Hawaii’s first inpatient eating disorders treatment program at Kahi Mohala Hospital in 1986 and is an expert in treating a wide range of eating disorders. She is the author of Eating in the Light of the Moon: How Women Can Transform Their Relationships with Food Through Myth, Metaphor, and Storytelling which has been published in six languages, and the co-creator of the Light of the Moon Cafe, an online e-course and support circle http://www.lightofthemooncafe.com Dr. Johnston has a private practice specializing in women’s issues and is a recognized international workshop presenter, lecturing widely to professional organizations, universities, medical institutions, and the community at large. In her work, she uses metaphor and storytelling in addition to her training as a clinical psychologist to explain the complex issues that underlie disordered eating behavior. Full show notes available at - https://lourdesviado.com/womenindepth Welcome to the podcast! Today I’m very excited to be joined by Susan Winter (Allowing Magnificence and Older Women/Younger Men). Susan is a bestselling author and relationship expert specializing in higher thinking for an evolving world. She writes, speaks and coaches on cutting-edge partnership models as well as traditional relationship challenges from a platform that fosters self-esteem and personal empowerment. Having graduated from Indiana University’s School of Music, her experience as a professional communicator led her from Opera singer to On-Camera Anchor. Transitioning from the stage to TV, Susan became the host/moderator of Corporate Profiles on FINANCIAL NEWS NETWORK (now CNBC). Prior to that position, she spent a decade as the On-Camera Spokeswoman for over 200 of the Fortune 500 companies. Susan is the recipient of numerous awards in the field of business communications. Given her vast media expertise, she’s worked as a Consultant for the TELEVISION BUREAU OF ADVERTISING, MIRAMAX FILMS (Tadpole), and in strategic alliances with MCGARRYBOWEN’s Fortune 100 clientele. Aware that foundational shifts in social consciousness alter consumer preference, Susan’s understanding of human behavior helps her clients anticipate trends while connecting to the heartbeat of their customers. Susan’s first book, “Older Women/Younger Men” quickly became an international bestseller as it opened the hearts and minds of readers’ worldwide to the validity of this type of age-gap love. Susan’s second book, “Allowing Magnificence” completely reframes how we view life’s challenges, empowering the reader to reconnect with the limitless power they already possess. Susan is currently a contributing writer for The Huffington Post and The Good Men Project. Full show notes available at - https://lourdesviado.com/womenindepthh Welcome to the podcast! Today I’m very excited to be joined by Venessa Rodriguez. Venessa is a certified holistic and integrative nutrition coach, practicing functional nutrition. That means she uses food as medicine and creates a roadmap to better digestion, more energy and healthy weight management that’s totally unique to YOU. Her path to integrative nutrition and holistic health began when her mom was diagnosed with breast cancer in 2005. That’s when she truly witnessed the healing power of nutritious foods and a well-balanced lifestyle. After 5 long years of treatments, triumphs, ups, and downs… she lost her beautiful mom Norma. It was the most difficult and transformative time in their lives, and it taught her more than she could ever imagine. Her mom's journey taught Venessa that we are the stewards of our own health and must be our own advocates; that food truly is medicine; that positivity, happiness, and love are more potent healing tools than anything else; that every day truly is precious so we better live like we mean it; and that we can’t do it alone. Full show notes available at - https://lourdesviado.com/womenindepth Welcome to the podcast! Today I’m very excited to be joined by Anna Osborn, LMFT. Anna Osborn, LMFT is a licensed psychotherapist and relationship specialist in Sacramento, California. Anna works with individuals and couples to restore connection, heal trust, improve communication and increase intimacy. Anna gets the privilege of seeing folks transform their relationships and begin to live a more happy, connected, and loving life. As hard as it is to admit, we are our relationships. Whether we are in an amazing relationship, a lonely one or an unhealthy one, it has a profound impact on success in all areas of our lives. Specializing in relationships over the past 10 years has allowed Anna to work with folks leaving abusive relationships to singles seeking out "the one", to couples wanting to improve their relationships, and even divorced parents struggling to maintain a healthy co-parenting relationship. As a psychotherapist and relationship specialist, she knows the profound impact that working on our relationships has on improving all aspects of our lives. Anna sees the folks that she works with improve their primary relationship and then experience amazing success in their professional lives, their hobbies, and their friendships. Anna practices in the vibrant town of Sacramento, California and loves having a practice there and having the opportunity to work with diverse people who are successful in their professions and want to have that same success reflected in their relationships. Full show notes available at - lourdesviado.com/womenindepth Welcome to the podcast! Today I’m very excited to be joined by Katie Ortlip, RN LCSW & Jahnna Beecham, authors of the book “Living with Dying: A Complete Guide for Caregivers.” At this moment in the U.S., nearly 10 million people over the age of 50 are caregivers for a parent or loved one. They are often overwhelmed trying to handle health emergencies, confusing legal matters, and prepare for the worst, while trying to live their own lives. Given there wasn’t a guidebook for death, Katie always wanted to write a sort of “Death for Dummies,” because it was sorely needed by her patients and their families. Being a writer, Jahnna said, “Let’s do it together.” It was at this time that Jahnna’s 90-year-old father was told his long-dormant prostate cancer had spread to his bones. She became his caregiver; Katie became his hospice social worker; and their writing journey began. Katie Ortlip is a Hospice Expert on SHARECARE, Dr. Ahmet Oz’s online health and wellness platform that provides consumers with expert information to help them lead healthier lives. She is also the co-author of Spiritual Tools for the Dying, a booklet distributed by Asante Health Care of Oregon to patients on hospice. She received her nursing degree from Santa Barbara City College in 1982 and then spent three years working in neonatology at St. Luke’s-Roosevelt Hospital in New York City and Mary Dartmouth-Hitchcock Hospital in Hanover, New Hampshire. Jahnna Beecham most recently edited National Geographic’s Science Encyclopedia, which was released in the fall of 2016; and was a contributing editor for National Geographic’s The Ultimate Explorer Field Guide: Birds. For the past 15 years she has been a contributing writer and editor for Uncle John’s Bathroom Reader—both the adult books and For Kids Only. Under the pen name Jahnna N. Malcolm, Jahnna Beecham and Malcolm Hillgartner have written more than 130 books for juveniles and young adults for Scholastic, Simon & Schuster, Random House, HarperCollins, Bantam and others. Full show notes available at lourdesviado.com/womenindepth Welcome to the podcast! Today I’m very excited to be joined by Dr. Sharon Cohen who is a Relationship and Love Consultant in Newport Beach, California. She specializes in rational communication strategies and the social dynamics of men and women. Her primary mission is to help women gain the skills to attract and keep long-lasting love. A sub-set of that mission is to get women inspired to attract the love they desire. Her expertise and life experiences spark awareness and prompt change in her clients. Using an educational and action-oriented program, Dr. Sharon’s clients see their interactions and relationships in a whole new light. With this new-found awareness, her clients free themselves from their past mistakes in their dating, relationships, and life so they can now relax into love. Dr. Sharon graduated from UCLA (B.A. in Sociology; Business and Administration concentration), USC (Master in Social Work; Families and Children concentration) and the University of Texas at Austin (Doctor of Philosophy, Ph.D., School of Social Work). She was in charge of the Outpatient admissions process at Seton Shoal Creek Hospital in Austin, Texas. Included programs: a Substance Abuse & Addictions Intensive Outpatient Program (IOP) and an Adult (Mental Health & Well-Being) IOP. She’s worked for start-up companies, music festivals, as a social coordinator and much more. All these experiences add to the secret sauce that makes Dr. Sharon who she is. Full show notes available at - lourdesviado.com/womenindepth Welcome to the podcast! Today I’m very excited to be joined by April Snow, a psychotherapist in San Francisco, California who wants to help you heal your past wounds, embrace your true self and begin to thrive again. In an effort to survive the struggles of early life or cope with present-day stressors, we often become disconnected from ourselves, needs and innate internal resources. We also may lack connection and nurturance during these difficult times, making them even more challenging to navigate. April's own journey towards emotional healing and growth has come most easily through safe connections with another. By offering a compassionate and supportive atmosphere suited specifically to your needs, she aims to be that safe place for you to explore your deepest feelings without judgement. April helps her clients explore these areas of deep suffering or disconnection; their current impact; and how the impact prevents them from living fully. April truly believes that when we can begin to feel, we can finally begin to heal. Full show notes available at - https://lourdesviado.com/womenindepth Welcome to the podcast! Today I’m very excited to be joined by Lisa Marchiano, LCSW who is a Jungian analyst, writer, and mom. She has a private practice in Philadelphia, PA, and is on the faculty of the Philadelphia Jung Institute. Lisa has a particular fondness for fairy tales and what they can teach us about relating to our inner lives and leads workshops on fairy tales nationally. She enjoys running an online workshop for mothers that explores how being a mom can be a catalyst for personal growth. Lisa holds a BA in history from Brown University, a Masters in International Affairs from Columbia University, and a Masters in Social Work from New York University. She trained as an analyst with the Inter-Regional Society for Jungian Analysts. Lisa has taught across the United States on fairy tales and related topics, and is the Seminar Director for the Philadelphia Jung Institute. She is currently writing a book on motherhood as a psychological growth opportunity. Full show notes available at - lourdesviado.com/womenindepth Welcome to the podcast! Today I’m very excited to be joined by Elizabeth Cush, MA, LCPC who is a therapist in Annapolis, Maryland. She works with people whose stress and anxiety overwhelm them, and they don't know where to start and find it hard to ask for help. What prevents you from living your life with ease and purpose? Maybe you're feeling stressed out, anxious, overwhelmed, and disconnected from yourself and the those you're closest to. You've been able to manage your stress and anxiety by keeping busy, you're always moving, but recently that just feels exhausting. You would like to know yourself better, to show up in your life in an authentic way, but you're not sure how to do that. Elizabeth helps you fully engage with yourself and others in more meaningful ways, to show up more fully, and live your life with more intention and purpose. She provides support, encouragement, compassion, and guidance to help you move toward the person you want to be. Full show notes available at - http://lourdesviado.com/womenindepth Welcome to the podcast! Today I’m very excited to be joined by coach, author and artist, Ruth Bleakley-Thiessen. Ruth was born in Northern Ireland and now lives in the north of Germany. Before her life as a coach, she studied Communications Design and did freelance work as a designer, illustrator, artist and entrepreneur. She is the mother of three adult sons. After the birth of her third son, she experienced a “vegetative exhaustion” - which propelled her into a long search for herself, which has become an ongoing journey. Ruth became a certified Journey Practitioner and has worked for thirteen years with clients of all ages. Ruth has been called the “Protectoress of Authenticity” - helping others to live authentically from the truth of who they are; clearing out blocks; unhealthy habits; and issues that make people shut themselves down. As a coach, teacher and writer, working with women in her private coaching sessions and mentorship programs, Ruth is fiercely committed to guiding her clients to achieve extraordinary results through the use of the Journey method. Her deepest passion is to help women transform their pain of low self-esteem, lack of confidence, eating disorders, body confidence and weight issues, fertility, miscarriage, abortion, emotional and health issues, abuse, grief, depression, physical issues, intimacy issues, relationship or family concerns - into an opportunity to reinvent themselves and experience new possibilities. She has written six books, including Woman Rise and Shine, a simple path for women who want to be themselves and Flown the Coop, a guide to dealing with transition when the kids leave home. Both books come with workbooks to assist you in your own journey. Ruth has also written two children's books: Snotme: The Unicorn who thought he wasn't a Unicorn and Nuffin -The Land Where Feelings are Not Allowed. Full show notes available at - http://lourdesviado.com/womenindepth Welcome to the podcast! Today I’m very excited to be joined by Dr. Elizabeth Bonet who is a certified hypnotherapist with a PhD in Clinical Psychology. Dr. Elizabeth Bonet helps people feel more emotionally stable, happier and more connected to their partner, friends, and loved ones of their choosing. No one wants to feel bad about themselves or their parenting. She helps you feel better and more stable about both. She specializes in hypnosis for a variety of problems and chronic conditions, such as if are you feeling overwhelmed or anxious, having physical symptoms due to psychological problems or trauma in your past, chronic pain, IBS and even if you just want to stop smoking. She has also been a yoga teacher for over 15 years and was the founder of the award-winning Yogafairy Prenatal Yoga company, won The 2014 Top 100 Leading Moms in Business Award, and ran the company for close to 15 years before selling the company in May of 2016. Her prenatal yoga classes have been repeatedly featured in the Sun-Sentinel and the Miami Herald. She has two kids, a cat and a rescue dog who she loves to walk. Full show notes available at - https://lourdesviado.com/womenindepth Welcome to the podcast! Today I’m very excited to be joined by Jocelyn Mercado, a transformational life coach, author, holistic health consultant, and environmentalist. She worked in finance and project management for over 15 years before taking the leap to leave the corporate world and begin her coaching and consulting career, and she has never looked back! Jocelyn has been studying indigenous wisdom, shamanic practices, and earth-based healing methods for years. She has experienced major life shifts that have led her to develop a life coaching method based on the following ideas: 1) we must heal ourselves first; and then 2) connect with others and help others to heal. In this way, we will find our innate power to change the world. As a transformational life coach, Jocelyn works with visionary clients all around the world to help them discover their life's purpose; break free from everything that holds them back; launch their inspired vision or new business to the world, and turn their skills as a healer or teacher into a financially sustainable business. Jocelyn helps people to connect to their heart's truth, and then redesign their lives so they can spend more time (or all of their time!) doing what they love and what they are meant to do in this precious and beautiful lifetime. Her website, Sacred Planet, was created to connect a global community of visionaries, revolutionaries, and thought leaders who are unified by the knowledge that we CAN and we MUST work together to create a brighter future for ourselves, our children, and the next generations of beings on our beautiful planet. Full show notes available at - https://lourdesviado.com/womenindepth Welcome to the podcast! Today I’m very excited to be joined by Galen Fous, MTP. Galen is considered one of America’s leading sex educators, psychotherapists & sex researchers on understanding the unconscious psychological dynamics of kink, fetish and D/s-BDSM sexuality. Galen is the author of two books: “Decoding Your Kink – Guide to Explore, Share and Enjoy Your Wildest Sexual Desires” and “The Sharp Edge of Love – Extreme Sex, Mythic Passion, Primal Intensity.” He regularly presents at sexuality related conferences, lectures at universities and grad schools on sex-positive topics, and has been interviewed in numerous media for his innovative views on conscious sexuality and the nature of fetish sexuality Galen frames his scholarly understandings of sexual identity and expression in the contexts of myth, history and the mediating power of social and psychological constructions. His contributions are made more powerful with his compelling sense of the contemporary and rapid shifts in what is and isn’t sexually taboo. As a therapist, Galen helps his clients shift from compulsive, dishonest, risky sexual behaviors to authentic sexual expression, and heal from the decades of fear, shame and judgments that held their authentic desire back. Full show notes available at - https://lourdesviado.com/womenindepth Welcome to the Women In-Depth Podcast! This week I’m delighted to be joined by Laurel Moll, who is a lifestyle writer, dancer, fitness instructor, and co-owner of the inspirational t-shirt company Golden Rhino. She was born and raised in Florida and has also spent several years living and working in New York City. Her writing has been featured in The Huffington Post, VitaMix Blog, Quiet Revolution, TinyBuddha, Mind Body Green, and more. Laurel's latest book, Following Fear: How I Faced 30 Fears and Learned to Trust the Unknown, is a memoir about how the curious events of the summer of 2013 inspired Laurel to stop following her bliss and start following her fear. This collection of intimate short stories about facing 30 of her biggest fears shares the journey of learning to trust everything that happens—the wins, the heartbreaks, the embarrassments, the deepest disappointments—and to find safety in the unknown. Following Fear offers a fresh approach. Instead of encouraging readers to get rid of their fears and be fearless, it looks more at what happens when you are willing to take yourself to the edge; see what’s underneath the fears; and learn to love the experience of growing through your discomfort. It shares its unique message by telling 30 honest and vulnerable experiences of one woman who never expected to become the brave one. Full show notes available at - lourdesviado.com/womenindepth Welcome to the Women In-Depth Podcast. This week I’m delighted to be joined by psychotherapist Tiffany McClain, who speaks to me about the taboo subject of money, our feelings toward it and the importance for us to have boundaries and a sense of safety. For Tiffany, watching her parents level up was… interesting. In some ways, they equipped her mightily for success! In other ways – not so much. With a generation of poverty, violence and societal racism on one side of the equation and rigid, fundamentalist Christian conservatism on the other, she had a herculean cargo of doubt, insecurity, confusion, and mistrust all combined with a devastating fashion sense. Being an in-the-flesh product of two extremely opposite worlds led to the feeling that she was an outsider in every situation. So, she did what any fun-loving misfit does: she became a psychotherapist. But first, she had to overcome huge external, but more importantly, internal, barriers that kept her from going after the life of freedom that she wanted – for herself, her family and the people who she is so stoked to serve. Though the doubts once felt insurmountable, she finally came to learn that battling forces inside could lead to fundamental paradigm shifts – shifts that stand to change the course of one’s life. Full show notes available at - lourdesviado.com/womenindepth Welcome to the Women In-Depth Podcast. This week I’m delighted to be joined by Dr. Kat Kaeni about the issue of Maternal Mental Health, which is all about maternal mental health during conception, pregnancy, miscarriage or loss, birth and postpartum. Dr. Kat is a psychologist who helps her clients find ways out of suffering or confusion and into wellness. People go to her psychotherapy practice when they are struggling with things in their life and want to feel better. Her style of working with people is to be real and keep therapy down to earth. In her sessions, she uses compassion, insight and empathy in addition to education and training to guide healing. Her belief is that therapy should not be a mysterious process. She believes that we all have the ability to get better. Sometimes we just need a little help, and sometimes we need a lot of help. Full show notes at - http://lourdesviado.com/womenindepth Welcome to the Women In-Depth Podcast, this week I’m delighted to be joined by Mia Quaglia who speaks to me about divorce, how to overcome it, ways in which to support others going through it and what thriving can look like at this difficult time in a woman’s life. Mia started Divorce and Thrive after she was a woman in a divorce situation after being married for 25 years. She felt lost and didn’t know where to turn, even as a therapist. Now she feels the need to help others with what they’re feeling. She also wants to walk them through steps that help them recover. Divorce and Thrive is for women that are in the process of going through their divorce, or have been divorced and are still going through grief or the healing process. The Divorce and Thrive Academy and Coaching, will provide resources and a safe place to process your own unique situation. You’ll be able to find yourself again, be more empowered, and become more resilient. You’re not alone, there are other women going through the same process, and I can help you with the use of my programs and support.
https://womenindepth.libsyn.com/2017
A research team led by scientists at Brigham and Women's Hospital has assembled a catalogue of every active gene in a variety of tissues in the axolotl, a type of salamander known for its striking ability to fully regenerate limbs following amputation. The catalogue, known as a "transcriptome," provides a important resource for the community of researchers who study axolotls -- a model organism that promises to shed light not only on the molecular mechanisms that underlie limb regeneration but also how on potential ways to repair and replace human tissues that are damaged or lost as a result of injury, illness, or even congenital disorders. Despite the promise of axolotl research for human regenerative medicine, the genomic resources currently available for axolotls remain quite limited. This is due in part to the large size and highly repetitive nature of the organism's genome -- indeed, it is roughly 10 times the size of the human genome. Propelled by recent advances in genomic sequencing and bioinformatics, researchers have found an alternative for identifying and studying axolotl genes: transcriptomes. "Our hope is that this new resource will help make axolotls accessible not only to researchers who already work on the organism, but also to those in other fields who wish to explore it," said Jessica Whited, PhD, a senior author of the study and an assistant professor in the Department of Orthopedic Surgery at BWH. "Unfortunately, the axolotl has been largely impenetrable for the majority of scientists." To help accomplish this goal, Whited and her collaborators, led by Brian Haas, Senior Computational Biologist at the Broad Institute, are making their data available through an easily navigable web portal, https:/ In the last few years, a handful of axolotl transcriptome studies have been published. What distinguishes the latest study is its near-completeness, in terms of represented genes, and its coverage of diverse tissues involved in limb regeneration, including bone and cartilage, skeletal muscle, heart, and blood vessels. The researchers also included different portions of the blastema, a cluster of cells that forms shortly after limb amputation and directs the formation of a complete new limb. In addition to developing this valuable resource, Whited and her colleagues also mined it to uncover important axolotl genes and investigate the genes' potential functions. One interesting gene is kazald1, which is very highly enriched in blastema cells. Although it has been identified in mammals and has even been found in certain types of tumors, virtually nothing is known about kazald1's function. Because of the axolotl's relatively long generation time -- it takes 9 months for a newly-fertilized embryo to develop, grow, and become sexually mature-- traditional methods for deleting genes to understand their effects are labor-intensive and daunting at large scale. Therefore, the study's first author, graduate student Donald Bryant, developed an innovative approach to modify, or "edit" genes solely in the axolotl limb. Although the efficiency of the method needs to be improved, future work in this area could help accelerate efforts to elucidate the functions of scores of axolotl genes and, in turn, help reveal the molecular steps required for limb regeneration. ### Paper cited: Bryant DM et al. "A tissue-mapped axolotl de novo transcriptome enables identification of limb regeneration factors." Cell Reports.
https://www.eurekalert.org/pub_releases/2017-01/bawh-ngt011317.php
Demon Slayer – Nezuko Kamado Nezuko Kamado is a character from the manga series, Demon Slayer: Kimetsu no Yaiba. She is an incredibly powerful and strong girl who is able to transform herself into a demon and kill the enemies that she faces. Character arc Nezuko Kamado is the younger sister of Tanjiro Kamado. She is a timid girl with dark brown hair. Her character arc started after a mysterious demon attack. Upon becoming a demon, she lost her memory. However, she does not seem to regret her decision. Instead, she continues to protect her brother. In addition to her protectiveness, she also displays great combat skills. Her growth rate is remarkable. While in her Demon Slayer form, she can take down opponents that are larger than her. This is especially impressive because she doesn’t need to consume human blood to survive. Another interesting fact about Nezuko is her ability to fight off the sun. This is because she has the ability to re-energize without the need to consume human blood. Also, she is capable of transforming into an adult demon. Demon Slayer series The Demon Slayer series by Nezuko is one of the most popular anime series in recent years. Originally based on Koyoharu Gotoge’s manga, the series has become a hit. The plot of the series follows Tanjiro Kamado, a breadwinner in a family living in the mountains. One day, Tanjiro returns home and finds his family slaughtered by a demon. He then joins the Demon Slayer Corps. However, Nezuko is different from other demons. While other demons rely on brute strength, Nezuko uses her human consciousness and meditation to recharge her energy. In addition to being able to use her limbs as weapons, she also can transform into a human adult. Though Nezuko was a sweet girl when she was a human, she has changed dramatically since she became a demon. She seems emotionally detached, though it is possible that she still retains some of her human traits. As she learns how to protect humans, she starts caring more. Demon Slayer: Kimetsu no Yaiba Kimetsu no Yaiba is a Japanese anime and manga series. It is set in Taisho era Japan. The story revolves around Tanjiro Kamado, a demon slayer who is tasked with hunting down the Demons. Tanjiro becomes part of the Demon Slayer Corps after he passes the exam. The Corps is a secret society in Taisho era Japan. This group is made up of elite swordsmen called Hashira. As a new member of the Corps, Tanjiro is given the task of avenging the deaths of his family. His first assignment takes him to bustling Asakusa, Tokyo. While there, he encounters a gruesome scene in a temple. The demon, Muzan Kibutsuji, was the progenitor of all demons. He was created by a generous Heian Period doctor. Before becoming a demon, he consumed the last part of the “Blue Spider Lily” medicine. Demonic transformation Nezuko Kamado is a young woman who has been growing up on a mountain with her younger sister Tanjiro. They help out around the house and take on the responsibility of looking after their older brother. As a result, Nezuko has become a fierce protector of her brother and her allies. However, she has recently started displaying some of her demonic abilities. One of the most notable of these is the ability to regenerate her arms and legs instantly. This is possible because Nezuko has a very strong willpower and is able to keep her body functioning without consuming human blood. Nezuko can also transform into a larger form. She can even shrink to the size of a child. But, unlike most other demons, Nezuko does not have the ability to consume human blood, and she has no desire to do so. Demon art There are various supernatural powers that demons can access. Some are more powerful than others. These abilities are known as Demon Art. A Blood Demon Art is a special magical power that demons use to enhance their attacks. Blood Demon Arts can be divided into simple and complex forms. The former can be used to generate or manipulate fire, while the latter can help turn the tide of a critical battle. Nezuko Kamado is one of the most popular characters in the Demon Slayer series. She has several abilities, including the ability to turn her blood into pink flames. Although her flames are only harmful to demons, they can also burn through demonic flesh. In addition to her Blood Demon Art, Nezuko also has the ability to grow stronger. When she sleeps, she regenerates energy and regains her strength.
https://magbuzzer.com/demon-slayer-nezuko-kamado/
Category: Basic Tips Why Perform a Dance Warm-Up? When it comes to learning how to dance, the first thing you will need to do is to perform a dance warm-up. This is an integral part of the learning process and you will find that there are a lot of benefits that can be derived from performing a warm-up before you begin your first dance class. This is often a crucial component of your dancing class as it enables you to familiarise yourself with the basics and it also helps you get a feel for the type of music that will be played during your dance class. Basics However, when performing a dance warm-up, there are some things that you need to keep in mind. The first thing that you need to remember when performing a dance warm-up is that you need to be aware of the music that will be playing during the dance class. To ensure that your dance class is full of energy and fun, you should learn as much about the music as possible, so that you know which songs will provide a good atmosphere and help you to get through the class. There are many reasons why learning how to dance can benefit you as well as a good dance class. One of the most important reasons to learn how to dance is the fact that it can provide you with a lot of opportunities to meet new people. Dancing with different people from all over the world will allow you to experience cultures and learn a little bit about how people live. Dancing with a new group of people will also give you the chance to socialise with people who are very similar to you in terms of gender, race, sexual orientation and age. As you learn how to dance, you will also discover the importance of finding a dance partner. You will quickly come to realise that being a good dancer does not require you to dance alone, but if you want to learn how to dance with other people, then you need to be aware of where to look to find a good partner. Popular Routines Dance warm-ups are usually performed regularly, so you will need to learn how to prepare yourself for each class. When performing a dance warm-up, it is a good idea to start practising in front of a mirror. It is best to have someone to guide you so that you can work out how you are going to perform and whether or not you are in the right frame of mind. If you want to learn how to dance, then you will also need to ensure that you keep fit and maintain a healthy lifestyle by exercising, eating right and taking your weight in check. Dancing with friends and having fun is what the first night of a dance class should be about. If you want to ensure that you have the best possible night of dancing and enjoy yourself, then it is best to do some preparation before you attend the dance class. If you want to learn how to dance, then you need to make sure that you have an enjoyable time at your first dance class. Extra Benefits Another important reason to perform a dance warm-up is that it will allow you to become familiar with the music that will be played during the dance classes. This will allow you to identify certain instruments or beats and tunes before you join the dance class. By being familiar with the musical genres that you will be learning in dance classes, you will also be able to avoid being embarrassed in public situations because you have not learnt the right music. By doing this, you will also be able to increase your enjoyment when performing your dance, and it will allow you to get a better understanding of the songs and rhythms. You will learn how to listen to the music and understand how it can create the atmosphere that you need to have.… Tips for Your Wedding Dance Lessons What are the safety measures during COVID-19 for wedding dance lessons? How many first dance classes do you need? Be Safe The main safety measure during the rehearsal or wedding dance sequence is to ensure that no one falls or gets hurt. At least two people should be in the same lineup. It’s also important to remember that it is the bride and groom who will have to walk down the aisle, not their friends and family. A good idea is to put a couple of chairs between the two people in the lineup. The most important thing to remember is to never to hold hands during the ceremony. It’s okay to get a little closer than normal though so that everyone can get a better view of the ceremony. And once the wedding dances begin, the rule is pretty much the same as well. Basic Tips The first dance should start with a song and then the couple will dance together for a couple of minutes. They will usually start by dancing to their favourite songs. After the first couple of minutes, the next couple will begin to dance. After the first couple has performed a song, the next couple will start to dance. Each person will lead the other during the whole ceremony and dance sequence. This way the couple can make sure they’re moving smoothly along with the music. When they are done dancing, the groom will take the microphone and give a speech about the happy occasion. Dancing is an important part of a wedding. You’ll need to have at least four people in your dance team, if not more. This makes it more fun. If your dancing is too much for you, don’t worry, there are plenty of other things to do besides dancing. Remember to Have Fun Dancing is a great way to let loose and have fun with your loved ones. After the dance sequence, people will gather around the dance floor to enjoy the festivities and enjoy the food. Some people even have their photographs taken while dancing. So you might want to join in too. The more your guests there are to enjoy the festivities the more chances you have of having fun. Before you go into a marriage, take the time to think carefully about all the possible wedding dance steps you might have to do. As, well as the wedding dance lessons, it’s best to be able to dance at least a few times before the wedding too. This will make it a lot easier for you at the wedding and you will not have to worry about what the other people there might be doing. Dance is not just for girls anymore. You can see women of all ages dancing on stage during weddings. As, well as men too, but you will find they usually have to wear tuxedos or formal clothing to make them look good. Clothing It is also very important to think about the type of dress you should wear on your wedding day. There are many options out there from bridesmaid dresses to evening gowns and even evening gowns that are designed to cover your lower half completely. You can even have your wedding party arrive dressed in fancy costumes. No matter what type of wedding dress you choose, there are many details that you should keep in mind during the wedding. One of the most important things is the shoes you should wear to your wedding. These shoes should be comfortable and not hurt your feet while walking. Don’t forget to bring along a camera with you too, as some of your pictures will be taken there too. As well as shoes, you should dress properly for your wedding. Your wedding is an occasion where you should dress to impress. So make sure you dress appropriately if you’re attending the wedding as a bride rather than a guest.… What Is The Best Way To Set Up A Good Stretching Routine For Dancers? Stretching routines for dancers are very important. If you’re a dancer, you’ve probably already started stretching and improving your flexibility so that you can become more limber and dance better. Benefits of Dancing Dancing is a form of exercise that improves a number of muscles in the body. The more flexible a body is, the greater range of motion it has, and it is this ability to move smoothly and efficiently that is so attractive to dancers. The flexibility and range of motion of a dancer can also increase their strength and endurance. Dancing helps build up a person’s flexibility and improves their muscle tone, all of which can lead to good health and good posture. Dancing can also improve circulation, a phenomenon called “cardiovascular exercise”. By improving circulation, dancers can make sure they have more energy and that their blood is flowing smoothly and efficiently throughout the body. They can also prevent many different conditions, including heart disease, high blood pressure and stroke. Stretching Proper stretching helps increase flexibility by stretching the muscles and tendons in the body, especially the muscles of the abdomen and hip region. This can also help prevent injuries that tend to come from over-stretching. Muscles and tendons that are not properly stretched are less able to perform at peak efficiency and are prone to injuries, such as those that can occur during a performance or while working out at the gym. Proper stretching also promotes blood flow in the body. When blood has a chance to circulate it goes to the most important areas where it’s needed most. This means that the most important organs like the brain and heart benefit most from being able to get the nutrients and oxygen they need. Proper stretching routines also allow dancers to stretch properly and not force their bodies to do so. Over-stretching can cause problems with the body and may even lead to injury. Breathing Finally, proper stretching also allows a dancer to breathe correctly. When a dancer is breathing properly and fully, they will be able to use their lungs more effectively and improve their balance. Many dancers have learned how to use their lungs in a very specific way that increases their flexibility and prevents injuries from them breathing in a bad way. Overall, proper stretching is important to dancers of all levels, regardless of their level of skill and ability. With a little time and effort, all dancers can begin to enjoy the benefits of stretching every day. Warm-up Before Stretching To begin, all dancers should begin by taking a few short warm-up routines at the beginning of the routine. These routines can include things like stretching, light aerobic exercises, and breathing exercises that will ensure proper alignment. Next, dancers should decide how often they want to stretch each day. Some dancers choose to stretch every day, while other dancers like to stretch at different times throughout the day depending on what they’re doing. If dancers have a routine in place of where they want to stretch, this will help prevent stretching from occurring too frequently or too infrequently. Stretching Duration Finally, dancers should also keep track of how long each stretching session takes. This will allow them to be sure they are stretching properly, keeping their muscles from getting strained or injured. By keeping track of how long a particular stretch takes, dancers will know how much they should stretch to get the same results. and what to expect in terms of the benefits from each stretching session. By performing the stretching routines several times per week, dancers can reap many benefits from their daily sessions of dancing. Some of the benefits include the reduction of tension headaches, better posture, healthier circulation and better flexibility. While these benefits are certainly important, they don’t have to happen quickly. As well as regular stretches, dancers should also make sure that they are eating nutritious foods, getting enough sleep and getting enough rest. These things are all important to ensure that the body is functioning correctly and that it can continue to function properly without too much strain.… How to Find the Right Dance Class How long does it take to begin dancing? Some dance lessons, such as tap, jazz, and ballet, can have up to 20 students in the class, all learning together from one instructor. When you are in such a large dance class, instead of being able to learn individually, as if you were in a private, one-on-one dance training, you need to be able to learn with a group. Group classes give you more opportunity to get to know and bond with your fellow students, as well as an opportunity to improve your skills. Before You Begin The first thing that beginning dancers need to know about is that their moves are not the same as more advanced moves. You need to work with your instructor to find out what your own body is capable of. You can learn how to do many of the basic moves in an advanced class, but you will be doing them at a slower pace than if you were to do them as an advanced beginner. You also need to make sure that you are taking a class that is going to help you keep fit. If your classes only offer aerobics or dancing classes, you may be disappointed, since you do not have the opportunity to stay fit while you are improving. When first enrolling in a dance class, you must make sure to ask your dance instructor which classes you should take. If they are unfamiliar with the type of classes that you want to take, they can refer you to someone who can explain it in detail. It is also a good idea to ask other people for advice. This will allow you to see how other students feel about the different dance styles that they practice, so you will be able to gauge if you are compatible with the type of students you are interested in taking classes with. Types of Classes There are different types of dance classes offered. There are lessons for beginners, intermediate, advanced, professionals, and even a dance class for those that want to continue learning after they have mastered the basics. You should know the type of dance you want to learn as soon as you start taking classes to determine which lessons you need to take and which ones you do not need to take. Once you have decided what kind of dance you want to pursue, then you can begin to think about your dancing style and what kind of dance class you want to attend. Most dance studios have a basic dance floor and a dance studio area where all of the students come and go. Once you have signed up for classes you will probably be sent to this location for at the studio. Before you set foot on the dance floor, however, you will have to go to one of several different dance studios to check in and make sure that you are attending the right dance class. Make sure to ask the studio what types of classes they offer, and make sure you know the dates and times that the classes are offered. Many dance studios offer different types of classes every day, so if you are just starting, make sure that you check with your instructor to see if there is a particular dance class that is right for you. This is especially true if the class is an advanced one that you don’t know the instructor very well. Talk to Instructors Make sure that you make the most of the instructors that are teaching the classes that are offered at the studio. This is why it is so important to make sure that you feel comfortable with the person you are with and the techniques they are teaching. Some instructors just give you the information and leave you in the dark about any special requirements that you may have to meet to advance your dance. This can be very frustrating and it can prevent you from enjoying your dance lessons.
https://www.dancetango.com.au/category/basic-tips/
Whenever you have people gathering in one place, there need to be rules to govern how they interact with each other. This is true even when there isn”t a specific reason for them being in the same place. Just to make sure that people can be in the same location without assaulting each other or robbing each other, we need some basic rules in place for how people ought to interact. But when people are in the same place for a shared purpose (for instance, when people are in a classroom together to learn), there are even more behaviors that they ought to not participate in, and even more behaviors that they should be encouraged to participate in. Of these additional behaviors that ought to be encouraged within the classroom, we can classify them into two categories: behaviors that are good because they promote learning and behaviors that are good because they show respect between students. It should be fairly obvious why behaviors that promote learning are good classroom behaviors. The purpose that unites people in the classroom, after all, is learning. Behaviors that promote that purpose should be encouraged when possible. Into this category we can sorta few behaviors. One of them is orderly behavior. Outside of the context of the classroom, excessive noise or motion can be tolerated, but because the students must be able to focus well on what the teacher is saying or what they are working on in order to learn, the classroom should be relatively quiet and there should be no moving around. Another is asking questions when appropriate. While it may seem that a student who never needs to ask the teacher questions appears to be more intelligent or more in command of the material, asking good questions to clarify confusing material helps everybody learn better. Obviously, this does not include questions that are asked in order to be entertaining or with the purpose of wasting time, but only questions that are asked because the student sincerely believes that the teacher”s answer can clarify some aspect of the material. The second category of behaviors that are good within the classroom are behaviors that show respect for others. Generally speaking, one will have the same classmates and teacher for at least the semester and possibly the entire year. It is not good for anyone if some students feel disrespected by others, or if the teacher feels disrespected by the students. we can name a few good classroom behaviors that fall into this category. The first such behavior is showing willingness to work with anyone, especially those students who are less popular. Feelings of social exclusion contribute to general social anxiety and an unwillingness to take risks in public. A second behavior is neither bragging about nor exhibiting anger about one”s grade. Bragging about one”s grade may make others feel inferior or inadequate, whereas being upset about a grade that another might consider relatively good can be similarly disheartening. Finally, to show respect for teachers, students ought to endeavor to turn in all work on time, or early if possible. Getting late work puts a teacher in a difficult position. If they accept it, they are giving themselves the extra work of grading the assignment when they did not plan to; if they do not accept it, they are seen as being unfair. These two classifications of good classroom behavior should be useful in understanding why it is so important to engage in certain classroom behaviors and refrain from others. Classifying behaviors that we think are good based on what purpose they serve is a good way to remind ourselves and others to engage in those behaviors. It also provides a good way of understanding the mindset of those who want to enforce or promote those behaviors.
https://mycustomessay.com/samples/classifying-good-classroom-behaviors.html
Youngest woman to fly solo around the world attempts on 18th August! Zara Rutherford wants to encourage women to take up careers in aviation and other technical and scientific fields- Credit: Graphic News via FlyZolo Zara Rutherford, a nineteen year-old who has been flying since the age of four, is about to embark on a world record solo flight around the world. Take off is planned for 10:30 local time on the 18th August, from EBKT Kortrijk Wevelgem Airport. If successful, Rutherford would be the youngest woman to fly solo around the globe, and the youngest person to make the 50,100km (27,052nm) trip in a microlight aircraft. She is flying a Shark powered by a 100hp Rotax 91 ULS. Announcing the flight, Rutherford said: “The current female record holder is American, Shaesta Waiz who was thirty years old at the time of her circumnavigation in 2017. The youngest male record holder is just over eighteen years old. The gap in ages between the men and women is one indication of the disparity in the number of male and female opportunity. I am hoping to get more girls interested in aviation”.
This German family company has been active in the metalworking sector for 130 years. The KALTENBACH Group has over 20 branch offices and 10 subsidiaries providing solutions for metal production, metal construction, mechanical engineering, plant engineering and construction, the steel trade, and vehicle construction. KALTENBACH machines can be used in a huge variety of processes. The company produces coping robots, painting systems, welding robots, marking systems, punching and shearing systems, shotblast systems, bandsawing machines and circular sawing machines. KALTENBACH provides technical services including original replacement parts and tools. The KALTENBACH KC 1201 gas cutting robot offers top-level coping, which is a technique for shaping the of a moulding/frame component to neatly fit the contours of an adjoining piece. This robust coping robot guarantees consistently high quality even in complex cutting procedures. Entering data is simple and requires no programming knowledge. Machining simulation and collision control ensure trouble-free operation. The company is primarily known for its high-quality, powerful sawing machines used in metalworking applications. The KALTENBACH saw range consists of bandsawing machines and circular saws. A total of ten bandsawing machines are produced by KALTENBACH for the metalworking sector. The machines can be found in the KALTENBACH "KBS" range and are primarily designed for processing light- and medium-weight steel. See below for an overview of key features.Area of application Light- to medium-weight steel Structural steel profiles Medium- to heavy-duty steel Types KBS 400 DG KBS 761 DG KBS 1301 DG KBS 400 DG NA KBS 1051 DG KBS 2101 DG KBS 620 DG KBS 750 DG KBS 750 DG NA KBS 1010 DG Working range (in mm) 90° 90° 90° 400 x 350 - 1000 x 500 750 x 500 - 1030 x 500 1300 x 700 - 2100 x 800 Sawband inclination 3 ° 1,5 - 10 ° 2,5 - 4 ° Below is a list of abbreviations used for additional equipment: KALTENBACH circular saws comprise the following series: Below is an overview of key technical features for KALTENBACH circular sawing machines:Series TL-Series SKL-Series KKS-Series HDM-Series Types TL 250 SKL 450 E KKS 400 E HDM 1432 TL 350 SKL 450 H KKS 400 H TL 450 SKL 450 NA KKS 400 T KKS 400 NA KKS 450 R KKS 401 NA KKS 450 E KKS 450 H KKS 451 NA KKS 463 NA Max. diameter 75 - 140 mm 130 - 160 mm 130 - 153 mm Max. saw blade diameter 250 - 450 mm 450 mm 450 - 460 mm The circular saws of the TL Series, including the KALTENBACH TL 250 and TL 350, are manual saws suitable for use on non-ferrous metals. The devices in the SKL range are fully- and semi-automatic mitre saws and are also used to process non-ferrous metals. Most of the company’s circular saws are in the KALTENBACH KKS Series, which encompasses fully-automatic universal saws (such as the KKS 400 E, KKS 400 H and KKS 400 NA) as well as semi-automatic mitre saws (including the KKS 350). There are also KALTENBACH cold saws, such as the KKS 370, which uses a toothed blade to dissipate the heat generated by cutting to the chips, thereby enabling both the blade and material being cut to remain cool. High-performance KALTENBACH HDM 1432 and KALTENBACH HDM 800 circular sawing machines are widely used in heavy-steel processing and trading. The HDM 800 is no longer produced but can be found on the second-hand market. The company produces four plate cutting/drilling centres which are grouped together in the KALTENBACH KF Series. The machines are classified according to maximum working range, which lies between 1600 x 6000 mm in the smallest model and 3100 x 6000 mm in the top model. All the machines are also available in an expanded version enabling plates measuring up to 12000 mm in length to be processed. A 14-slot tool changer comes as standard offering tools for drilling, burning, creation of contours, marking, milling, tap-drilling and levelling without requiring lengthy tool set-up times. KALTENBACH’s painting system range includes seven machines. Painting and drying in a single package – the models in the KPC range are fitted with between 4 and 12 spray guns to enable a range of painting applications. The KTC Series can be equipped with 12 – 24 spray guns and are used as final-painting systems for customised steel profiles and steel constructions. The capacity range of the machines lies between 1500 mm in the KPC 1512 and 3000 mm in the KTC 3012. Six profile drilling machines and one high-performance processing centre are available from KALTENBACH. The drilling machines offer space for 3, 15 or 18 tools, while the BAZ KDH 1060 can be equipped with up to 60. KALTENBACH drills are used to process steel construction profiles, heavy-duty steelwork and are prevalent in the steel-trading sector. The company’s drilling machine range offers a selection of capacity ranges that are as varied as their other lines. The KDE 603 features a range of 600 x 500 mm, while the top model can process workpieces with surfaces of up to 2100 x 700 mm. Below is an overview of the available models:Series KDE KDM KDL KDH Types KDE 603 KDM 615 KDL 1318 KDH 1030 KDE 1003 KDM 1015 KDL 2118 KDH 1060 Steel Beam Assembly (SBA) is the description given to KALTENBACH’s welding robots. Their steel beam assemblers feature fully-automated controls and can operate error-free. The production data are imported directly from any standard CAS system, transferred by the software solution "pro-FIT", and then executed by the SBA welding robots. The SBA offers a huge range of production applications and can process batches of any size starting from a single unit. The two machines of the KALTENBACH KPS-A Series are powerful punching/shearing machines for angle steel. The working range on angle material on the KPS-A 167 is 160 x 160 x 20 mm, which is smaller than that of the KPS-A 207. THE KPS-A 207 machine is designed for angle materials measuring 200 x 200 x 25 mm. Both machines come equipped with 2 x 3 punching tools/2 x 3 dies, automated material thickness measuring, and a marking unit with triple marking wheel. The KPS-A 207 features an impressive double-cut shearing unit and the KALTENBACH KPS-A 167 comes equipped with a single shearing unit, but this contains several shear blades. Sprint, Marathon and Triathlon - these are the athletic-sounding names given to KALTENBACH’s shotblast systems. The economical 1504, 1506, 2506 and A3008 models of the Sprint Series offer an optimal cleaning effect using a range of turbines, which differ in number depending on model (between four and eight). The four A1506, A2506, A3008 and A4008 models of the Marathon Series are designed for continual use. The A1506 and A2506 models have six turbines, which they use to blast abrasives at rough surfaces. The Triathlon A1508, A3010 and A3010HD models are large-scale shotblasting plants for steel constructions. The high quality and prevalence of KALTENBACH machines mean they can be found in large numbers on the used machinery market. The most popular used device is the KKS 400 Series, which is mostly used for individual cuts and small-series processing. In addition to its impressive technical features, the small footprint of this device makes it an ideal investment. A quick search online for KALTENBACH used machines will frequently feature the TL Series – manual mitre saws for non-ferrous metals. The prices for used KALTENBACH saws can vary widely and depend on the condition and construction year of the machine.
https://www.surplex.com/en/products/kaltenbach.html
Q: How can I convert a "tent" into a "cap"? I wanted to draw a "cap"-like paraboloid structure. like this one ... . But, the function $$f(x, y) = -x^2-y^2+4$$ is giving me a "tent"-like structure. See the link. How should I modify my equation/function to achieve this? A: generally $z=ax^2+by^2+c$ plots that paraboloid shape.the higher the magnitudes of a and b are the higher stiff the graph gets.change in c changes the vertical distance.if a and b are negative then the graph flips its face like your case. to get your desired shape,it is just needed to change the sign of your coefficient "a","b".make them positive.you can make them higher in magnitude to get a stiffer graph...or simply you can change the domain(make it larger) of "x" and "y" in your plotting function to have a stiffer look .
The Firebird is described as a large bird with majestic plumage that glows brightly emitting red, orange, and yellow light, like a bonfire that is just past the turbulent flame. The feathers do not cease glowing if removed, and one feather can light a large room if not concealed. In later iconography, the form of the Firebird is usually that of a smallish fire-colored peacock, complete with a crest on its head and tail feathers with glowing "eyes". Fairy talesEdit A typical role of the Firebird in fairy tales is as an object of a difficult quest. The quest is usually initiated by finding a lost tail feather, at which point the hero sets out to find and capture the live bird, sometimes of his own accord, but usually on the bidding of a father or king. The Firebird is a marvel, highly coveted, but the hero, initially charmed by the wonder of the feather, eventually blames it for his troubles. The Firebird tales follow the classical scheme of fairy tale, with the feather serving as a premonition of a hard journey, with magical helpers met on the way who help in travel and capture of the Bird, and returning from the faraway land with the prize. There are many versions of the Firebird story as it was primarily told orally in the beginning. One version is the tale of Ivan Tsarevich, the Firebird and the Gray Wolf. Suzanne Massie retells another story of the Firebird legend. A modest and gentle orphan girl named Maryushka lives in a small village. People would come from all over to buy her embroidery, and many merchants asked her to come away and work for them. She told them all that she would sell to any who found her work beautiful, but she would never leave the village of her birth. One day the evil sorcerer Kaschei the Immortal heard of Maryushka’s beautiful needlework and transformed himself into a beautiful young man and visited her. Upon seeing her ability he became enraged that a mere mortal could produce finer work than he himself possessed. He tried to tempt her by offering to make her Queen if she would embroider for him alone, but she refused saying she never wanted to leave her village. Because of this last insult to his ego he turned Maryushka into a Firebird, and himself into a great black Falcon, picked her up in his talons, and stole her away from her village. To leave a memory of herself with her village forever she shed her feathers onto the land below. As the last feather fell Maryushka died in the falcon’s talons. The glowing rainbow feathers were magic and remain undimmed, but show their colors only to those who love beauty and seek to make beauty for others. Irina Zheleytova translates another version, The Firebird and Princess Vasilisa. In this version a king’s archer is on a hunt and runs across a firebird’s feather. The archer’s horse warns the archer not to touch it, as bad things will happen. The archer ignores the advice and takes it to bring back to the king so he will be praised and rewarded. When the king is presented with the feather he demands the entire firebird or the death of the archer. The archer weeps to his horse, who instructs him to put corn on the fields in order to capture the firebird. The firebird comes down to eat, allowing the archer to capture the bird. When the king is presented with the firebird he demands that the archer fetch the Princess Vassilissa so the king may marry her; otherwise, the archer will be killed. The archer goes to the princess' lands and drugs her with wine to bring her back to the king. The king is pleased and rewards the archer; however, when the princess awakes and realizes she is not home she begins to weep. If she is to be married she wants her wedding dress, which is under a rock in the middle of the Blue Sea. Once again the archer weeps to his horse and fulfills his duty to his king and brings back the dress. The princess is stubborn and refuses to marry the king even with her dress until the archer is dipped in boiling water. The archer begs to see his horse before he is boiled and the horse puts a spell on the archer to protect him from the water. The archer comes out more handsome than anyone had ever seen. The king sees this and jumps in as well but is instead boiled alive. The archer is chosen to be king and marries the princess and they live happily ever after.The Firebird concept has parallels in Iranian legends of magical birds, in the Brothers Grimm fairy tale about The Golden Bird, and related Russian magical birds like the Sirin. The story of the quest itself is closely paralleled by Armenian Hazaran Blbul. In the Armenian tale, however, the bird does not glow, but rather makes the land bloom through its song. In Czech folklore, it is called Pták Ohnivák (Fire-like Bird) and appears, for example, in a Karel Jaromír Erben fairy tale, also as an object of a difficult quest. Moreover, in the beginning of this fairy tale, the bird steals magical golden apples belonging to a king and is therefore pursued by the king's servants in order to protect the precious apples. The story of the firebird comes in many forms. Some folk tales say that the Firebird is a mystical bird that flies around a king’s castle and at night swoops down and eats all the king's golden apples. Others say that the firebird is just a bird that flies around giving hope to those who need it. Some additions to that legend say that when the firebird flies around, his eyes sparkle and pearls fall from his beak. The pearls would then fall to the peasants, giving them something to trade for goods or services. In the most common version of the legend, a Tsar commands his three sons to capture the firebird that keeps flying down from above and eating his apples. The golden apples are in the Tsar’s orchard and give youth and strength to all who eat them. The sons end up barely missing the bird, but they catch one of his feathers that glows in the night. They take it to a dark room and it lights the room completely.
https://fairytale.fandom.com/wiki/The_Firebird
Graphics displays, such as liquid-crystal displays (LCDs), are used for many different applications such as televisions, wireless telephones and notebook and portable computers. Due to the response time of the display elements, visual artifacts such as motion blur may occur when images with high-motion content are being displayed. Displays with faster response times exhibit fewer of these visual artifacts, but are generally more expensive. Compensation has been conventionally applied to less-expensive displays with lower response time elements to help reduce occurrence of these visual artifacts, but these techniques require memory, such as a frame buffer, increasing the cost of the display panel. Thus, what are needed are graphics controllers, display panels and methods of compensating for the response time of display elements. What are also needed are graphics controllers, display panels and methods of compensating for the response time without additional memory on the display panel.
User-Generated Content is More Trusted, More Shared, and Encourages More Sales Than Any Other Content Type Customers trust other customers more than marketers or businesses. User-generated content (UGC) is a powerful way to connect with your most loyal customers and share impactful messages. In this guide, we’ll explore tips and strategies to encourage customers to create content around your brand. We’ll discuss multiple ways to incentivize, gather, and leverage user-generated content, so you can find the right fit for your business. Download the Guide to Learn:
https://content.boast.io/marketers-guide-to-user-generated-content
Main Features: Aluminium Alloy Material, Sturdy And Durable Small And Lightweight, Easy To Carry Can Be Used For Hanging Keys, Backpacks, Kettles, Pens, Toys, Etc. Specification Dimensions And Weight Product Weight: 0.0220 Kg Package Weight: 0.0250 Kg Package Contents Package Contents: 1 X Carabiner Disclaimer Of Product Usage: This Carabiner Is Not For Professional Climbing, Please Notice This!R Share Share on Facebook Tweet Tweet on Twitter Pin it Pin on Pinterest Search Choosing a selection results in a full page refresh. Press the space key then arrow keys to make a selection.
https://hodbusinessgroup.com/products/6213820645544
As the title implies, in this post I will try to answer to the following question: Which is the average car speed that minimizes the fuel consumption? Well, the straight answer is that there is not only one speed, but, for each car there is an optimum velocity range. The chart above depicts the relationship between the fuel consumption and the average speed of a typical small gasoline (< 1400 cm³) Euro 4 passenger car. The chart can be divided into four areas, corresponding to four velocity ranges: 0 – 30 km/h (0 – 18.64 mph): For velocities below 30 km/h the fuel consumption is quite high (above 8 l/100km – 29.34 mpg). Unfortunately this speed range is typical for cars circulating in a city – urban environment. Cars are subjected to a continuous start and stop motion due to junctions and traffic lights. Furthermore, at the main city roads (at the center of the city for example) there is very often traffic congestion. These two parameters – as well as some others – lead to a very low average speed, and, consequently, to high fuel consumption and emissions. 30 – 55 km/h (18.64 – 34.18 mph): Until 55 km/h, as the average speed increases the fuel consumption drops. This velocity range is quite common in sub-urban or rural areas, where there is less traffic congestion and vehicles are able to move with higher speeds. 55 – 80 km/h (34.18 – 49.71 mph): For the particular vehicle, this is the optimum velocity range that minimizes the fuel consumption (around 6 l/100 km – 39.15 mpg). This range corresponds to rural or even highway driving conditions. Fuel consumption is almost steady in this range. Let’s look an example with numbers: The flat line in this range suggesting that the car A, which moves with an average speed of 55 km/h will consume almost the same fuel with a similar car B that moves with 80 km/h. So, if these two cars have to cross a distance of 100 km, then car B will reach to the destination 34 minutes earlier than car A, having consumed almost the same fuel (6 l). So, if the driving conditions are suitable and the speed limits are high, within this velocity range, driving in higher speeds will save travel time! 80 – 120 km/h (49.71 – 74.56 mph): Within this range as the average speed increases the fuel consumption augments too. This velocity range is quite common in highways. Contrary to the previous example, car C that moves in a highway with an average speed of 120 km/h will reach to the destination 25 minutes earlier than car B, which moves with 80 km/h, BUT, car C will have consumed almost one liter more fuel. The fuel consumptions below were calculated with the fuel consumption calculator. The previous analysis is quite idealized. There are many parameters that are involved in fuel consumption, like engine’s operational conditions, air resistance, driver behavior, road and ambient conditions, tire pressure and many others. However, the average car speed is a useful indicator of fuel consumption. So, the next time that you will have to drive for a long distance try to keep your instantaneous car speed within the range 55 – 80 km/h as much as possible, in order to minimize the fuel consumption of your car.
https://myengineeringworld.net/2012/05/optimal-speed-for-minimum-fuel.html
This exhibition offers a unique opportunity to experience masterpieces by Giovanni Bellini (about 1430–1516), one of the greatest Venetian painters of the Renaissance. Landscape played a prominent role throughout his long and illustrious career, complementing his religious subject matter and enhancing the meditational nature of paintings intended for the private devotion of highly sophisticated patrons. Bellini’s evocative landscapes are as much the protagonists of his paintings as are the religious subjects that dominated 15th-century Italian art. One of the most influential painters of the Renaissance, he worked in and around Venice, and while his landscapes are highly metaphorical, they also accurately reflect the region’s topography and natural light. Created for sophisticated patrons, Bellini’s works present characters and symbols from familiar sacred stories, set in a dimension of reality and lived experience to a degree unprecedented in the history of Italian painting. Distinguished by a refined sensitivity to the natural world, Bellini transformed traditional symbolic motifs into convincing yet poetic depictions of the Venetian mainland, marking the beginning of a new chapter in the history of European painting. Credit: Exhibition overview from museum website Praised by Albrecht Dürer as being “the best in painting,” Giovanni Bellini (ca. 1430– 1516) is unquestionably the supreme Venetian painter of the quattrocento and one of the greatest Italian artists of all time. His landscapes assume a prominence unseen in Western art since classical antiquity. Whether or not you go, the exhibition catalog, Giovanni Bellini: Landscapes of Faith in Renaissance Venice, focuses on the main function of landscape in his oeuvre: to enhance the meditational nature of paintings intended for the private devotion of intellectually sophisticated, elite patrons. The subtle doctrinal content of Bellini’s work—the isolated crucifix in a landscape, the “sacred conversation,” the image of Saint Jerome in the wilderness—is always infused with his instinct for natural representation, resulting in extremely personal interpretations of religious subjects immersed in landscapes where the real and the symbolic are inextricably intertwined. Drawing from a selection of masterpieces that span Bellini's long and successful career, this volume includes a biography of the artist, essays by leading authorities in the field explicating the themes of the J. Paul Getty Museum’s exhibition, and detailed discussions and glorious reproductions of the twelve works in the show, including their history and provenance, function, iconography, chronology, and style. Select Giovanni Bellini: Landscapes of Faith in Renaissance Venice to learn more or to purchase this book.
https://www.artgeek.io/exhibitions/58caf63d568f63fc372cb845/58caf63d568f63fc372cb844