content
stringlengths 0
1.88M
| url
stringlengths 0
5.28k
|
---|---|
Dependency theory is a conjecture which explains the interaction and relationship between the developed and developing nations of the world. This presumption tends to contravene the popular school of thoughts of economic relationships that are propagated by the free market theory. The theory propagates the element of dependency which was crafted in the year 1950 through the guidance of what is known as Marxian study of the worldwide economy. Contrary to the assertions of the free market concepts which had the view that participation of developing countries in the world economy would be beneficial as the countries would pursue and enjoy equal benefits. Thus, dependency theory propagates the view that such a move would create more problems for the developing nations whereby they will have to depend on their developed counterparts for survival (Matias, 2004).
The cycle of dependency was further extended by the practices exhibited by the developed nations who used the raw materials from the developing countries for their own development. In this regard, the developed countries are perceived as the colonial exploiters who take resources from the developing nations with very little or no compensation. This subsequently leads to a condition whereby the developing nations are placed in a subservient stance where all their benefits are believed to come from the developed countries. The other practice that has extended the dependency is the practice of introducing sanctions on the developing countries, which heavily depend on the developed counterparts for trade and development (Matias, 2004). In this paper we will be exploring how the governance of the global economy is biased towards developed countries.
The aspect of globalization and entities that promote worldwide trade such as the World Trade Organization (WTO) play a great role in marginalization of developing countries. This is also exhibited by differential measures of trade whereby the initiatives such as liberalization of trade benefit developed countries at the expense of the developing nations. This is manifested in the deliberate trade protection policies, which are meant to improve the growth of the developed countries economies (Stallings, 2005).
Institutions used in the global economy have greatly contributed to the marginalization of the developing countries. The author adds that the world trade does not need institutions for global participation in trade. This is mainly fueled by the belief that such institutions are formed by the developed economies with selfish interest for ill acquisition of profits and extreme control of trade. Developing countries are active participants in agriculture and textile industry; however, these two sectors have not realized the anticipated benefits due to trade protectionism by the worldwide trade institutions.
To add to the list of factors that have contributed to marginalization of developing countries, is the issue of difference in political power between the countries. There is a wide belief that developed countries have stronger political powers which tend to enforce their policies on the weaker political powers of developing countries. The strong political powers are used to shape the institutional trade regulations and trade process in the global arena. Consequently, these rules and regulations affect trade and economic development of Least Developed Countries (LDC) (Scherer and Watal, 2008).
The need for trade related aspects on Intellectual Property Rights is to promote equal development of trade in all sectors across the world. In the health sector, this has been a burning issue whereby developing countries are denied the Trade-Related Aspects of Intellectual Property Rights (TRIPs). The issue has placed the WTO in a hot debate with regards to the protection of human rights. Contrary to the general perceptions on international trade bodies of promoting non-bias trade participation, foster bureaucratic fairness and promote transparent relations, the WTO tends to contravene these perceptions especially with regards to the issue of TRIPs (Watal, 2011).
The issue of Intellectual Property Rights (IPR) on trade related aspects tends to attract contentions from various sects of the world. For example, the move by the WTO to amend IPR to enhance access to medicine in the public health sector is still regarded by many countries as a discriminative practice. The amendment is believed to have been done on the grounds of respecting and protecting human rights. The issue raises the question as to whether trade agreements on IPR can only be resolved on the grounds of human rights and not trade and economic development. This instance clearly indicates how international trade entities such as the WTO are being used by the developed countries to slow down the development of trade in sectors such as medicine and health.
In the light of the above observations, issues touching on TRIPs have been evaluated with regards to innovation, technology transfer, investment and international trade. Developing nations have therefore gone ahead to assess the potential economic benefits that will generate from IPRs. However, revelations of the regulations stated in the TRIPs agreements have been criticized to embrace the practices in developed countries. Therefore, a move by the WTO to protect IPR tends to promote development of trade in the developed countries. This has been manifested by the dominance of developed countries IPR possession. Most companies in the developed countries own more patents than the companies in the developing countries. Consequently, in some cases, developing countries are forced to believe that agreements on TRIPs are meant to foster protectionism on a technological stance whereby the developed countries innovate and develop products that are later sold to the consumers in the developing countries (Hoekman and Kostecki, 2008).
Agreements on TRIPs have also been found to create very powerful monopolies that control the market, for instance in the pharmaceutical and technological businesses big companies from the west control almost all the trade activities in these two sectors. Pharmaceutical companies are the most common examples of tools that are used by the developed countries to exploit developing countries. The companies take advantage of their global presence in the international market to charge very high prices for their products in the developing countries (Richman, 2009).
Most developed countries tend to inhibit the inception of pharmaceutical patents in the developing countries due to reasons of insecurity. The USA and Canada have several times instituted sanctions on pharmaceutical patents from the developing countries due to terrorism.
The trends tend to increase drug monopolies in the developing countries and hence creating a situation of Medical apartheid. Certain provisions of WTO requires the institution of IPR in developing countries to take place by 2016, however, such are moves are not expected to affect pricing and access to medicine in developing countries. This has been evaluated on two different drug cases which are ARV drugs used in the treatment of HIV and Malaria drugs. Despite the fact that most developing countries have the raw materials used in manufacturing such drugs, monopolistic nature of the companies in the developed economies will not enable the patients in the developing economies to acquire the drugs at low prices. In some countries such India and Brazil, intense foyer from the NGOs and government entities have forced to international pharmaceutical companies to lower prices of ARV drugs. TRIPs have also affected access to such drugs in developing countries given the provisions on agreements which tend to establish the grounds to grant the licenses and freedom to developing countries before they can produce the drugs (Hoekman and Kostecki, 2008).
In addition to trade the above issue of IPR, processes and meetings at the international front on trade issues tend to discriminate developing countries. These processes and institutions determine the politics of power. There are beliefs that developing countries do not get equal treatment in the international bargaining table where issues are ratified. Decision making on important issues such as transparency, competition policy, investment and trade and procurement facilitation is entirely decided on the basis of consensus (Richman, 2009)
Decision making process in the WTO is guided by four major approaches. These approaches have different operational modalities; however, the most important aspect in these approaches is the impact on developing countries. The most common approach is called one-participant-one vote system whereby the vote casted by a participant during the decision making process is entirely based her economic power. Despite the fact that this approach of voting tends to promote the provisions of chapter 9 of WTO agreements which state3 that all the members have the equal opportunity to participate in the voting process irrespective of their economic power, the approach tend to limit the voting rights of textile monitoring body where most trading interest of developing countries are found (WTO, 2004).
Section 9 of the WTO agreements also provides that decisions will be arrived by majority of the votes shed, however, striking enough, this provision does not favor developing countries given that fact they are the majority of the votes. The difficulties in influencing financial decisions in IMF where developing countries constitute more than 80% of the votes are also very eminent. Powerful economies like the USA highly influence decisions due to their veto power. This therefore reveals that with regards to voting WTO is therefore a sympathetic ground for developing countries. However, the principle of one vote one-participant-one has not been lauded in helping developing countries at the negation table since most of the counties are not ready to embrace principle and take advantage of it. The second of approach voting in WTO meetings and decision making is widely guided by the principle of consensus. The principle states that decisions will be arrived when the members present in the meeting unanimously propose a decision (WTO, 2007).
In conclusion, all the decisions and voting processes tend to embrace the veto powers of powerful developed economies and therefore decisions made on world trade issues by international institutions will always be at the interest of the developed countries and hence marginalizing developing countries in various areas of trade and economic development (WTO, 2004).
References
WTO (2004) Agreement establishing the World Trade Organization, http://www.wto.org/english/docs_e/legal_e/final_e.htm.
Richman, B. (2009) ‘Consensus, ICANN and the public interest: pressing issues, Berkman affiliate analysis’, Workshop presented by the Berkman Center for Internet and Society and the Markle Foundation, Los Angeles, Organization, http://www.wto.org/english/docs_e/legal_e/final_e.htm.
Hoekman, B. M., & Kostecki, M. (2008) The Political Economy of the World Trading System: the WTO and beyond, 2nd edition, Oxford: Oxford University Press.
Stallings, B. (2005). The New International Context of Development. In Global Change, Regional Response: The New International Context of Development, edited by Barbara Stallings. Cambridge: Cambridge University Press http://users.ox.ac.uk/~ntwoods/.
Watal, J. (2011). “ Pharmaceutical Patents, Prices, and Welfare Losses: A Simulation Study of Policy Options for India under the WTO TRIPS agreement, ” World Economy, vol. (23),.5, pp. 732-752
Scherer, F. M., & J. Watal. (2008). “Post-TRIPS Options for Access to Patented Medicines in Developing Countries,” Journal of International Economic Law, no. 5, pp 913-939.
Matias, V. (2004). Technology, Finance and Dependency: Latin American Radical Political Economy in Retrospect“. Pp. 540-545.
WTO (2007) General Council Informal Meeting (28 March), Internal Transparency and the Effective Participation of all Members, Main Points raised by Delegations, JOB(00). http://www.wto.org/english/docs_e/legal_e/final_e.htm.
Time is precious
don’t waste it! | https://essays.io/governance-in-the-global-economy-research-paper-example/ |
The Youth Environmental Alliance in Higher Education (YEAH) Network is a transdisciplinary, multi-institutional network that equips students with real-world experience of collaborative, evidence-based approaches to global environmental sustainability. In today’s students, we see agents of change for the future. Therefore, the YEAH Network connects institutions of higher education from all over the globe to provide integrated knowledge to students that empowers them to address complex global environmental problems, ranging from pollinator decline and biodiversity loss to climate shifts and ecosystem transformations. Our Members are geographically and culturally diverse institutions that share a common desire to prepare and inspire undergraduate and graduate students to effectively analyse global environmental issues and contribute to policy solutions. Together, we recognize that a truly transdisciplinary approach to student training and professional development is necessary and can be accomplished by a multi-institutional approach that is seamlessly incorporated in the higher educational experience.
The YEAH Network develops virtual classrooms at the undergraduate and graduate levels that provide environmental learning through structured and real-life experiences of international negotiations. Our modules are designed to impart knowledge that integrates science and international governance using the frameworks that guide international conversations, such as the Sustainable Development Goals. Students work together in virtual and collaborative classrooms as teams with international and multicultural members whom they would not encounter at their home institutions. Students and seasoned investigators from diverse backgrounds collaborate for a common purpose and agenda giving them a sense of belonging, purposefulness, and continued motivation to achieve global goals. In this manner, students are introduced into the realms of policy and trained to engage actively in international collaborations that are tackling global environmental issues. Students participating in the YEAH Network classrooms directly increase public scientific literacy by sharing their research at the annual COP meetings of the United Nations, where diplomats are invited to listen, at professional society meetings, such as those of the Ecological Society of America, and in their local communities as well. Student participants of the YEAH Network are trained to apply their learning into multitudinous career paths, whether it be scientific research, economics, business, academia, health fields, policy, or other related fields.
Our communication platforms
YEAH is a virtual worldwide network. By necessity, the primary communication tools are online, such as social media and virtual conferences. Given the complex structure of YEAH as both a network that is also developing teaching tools, we use diverse forms for communication and are always looking to expand our horizons.
01
Steering Committee Virtual Conference Calling
The YEAH steering committee meets via Zoom conferencing once a month during the US spring semesters and weekly during the fall semesters in advance of the UN COP meetings. Zoom recordings of all steering committee meetings will be filed in the YEAH library and open for review by all YEAH members.
02
Online student work platforms
Slack is a virtual workspace that provides tools for facilitating student progress and communication within project teams including links to google docs and other electronic platforms. Slack is open to students and institutions participating in the annual COP Lab and is not publicly visible outside of YEAH.
03
Social Media
Within the greater framework of the UN COP WhatsApp and Twitter are the primary sources of communication among participants. YEAH uses both the COP Lab and Twitter for public communication, while Whatsapp communications are closed groups requiring an invitation or open link to join. Students and YEAH members will be introduced to the common ‘diplomacy’ that takes place on social media during COPs especially with the international audiences.
04
Professional Organisations
The YEAH works through Research and Independent Non-Governmental Organisations (RINGO), Ecological Society of America (ESA), and other professional organizations. RINGO as a recognized observer to COP and ESA as a professional science society are two important groups to assist with communicating YEAH goals and encouraging new members. YEAH anticipates adding other professional societies as the network grows. | https://yeah-net.org/about/ |
This information is for the 2020/21 session.
Teacher responsible
Prof Anita Prazmowska SAR M.09
Availability
This course is available on the BA in History, BSc in Government and History, BSc in International Relations and History and BSc in Politics and History. This course is available as an outside option to students on other programmes where regulations permit and to General Course students.
May be taken by 3rd years where regulations permit.
Course content
The course aims to explain the history of these regions as expressed and moulded by the peoples and their leaders during a particularly turbulent period in European History. Attention will be paid to two European wars and the Russian Revolution, all of which had a profound impact on these countries' freedom to determine their destiny. The study of the inter-war period will include a debate of the reasons for the collapse of democratic institutions, the emergence of patriotic and anti-Semitic movements, economic failures and responses to German and Italian aggression. The establishment, development and the collapse of Soviet domination of the region after the Second World War will be discussed on the background of ethnic and inter ethnic conflicts. In addition political, economic and cultural theories, which formed the background to the emergence of the independent states of Eastern and South Eastern Europe, will be considered. The course will develop these themes in the history of Poland, Czechoslovakia, Hungary, Bulgaria, Romania, Yugoslavia, Albania and the Baltic States. Final lectures will concentrate on the transition from Communism to democratic states. The break up of Yugoslavia and the wars in the Balkans will be considered in a separate lecture.
Teaching
Recorded lectures. Classes will be on campus or via Zoom, as circumstances dictate. There will be a reading week in Michaelmas and Lent terms.
Formative coursework
One essay in the MT, one essay in the LT and a timed essay as exam preparation.
Indicative reading
R J Crampton, Eastern Europe in the Twentieth Century (1994); S K Pavlowitch, A History of the Balkans 1804-1945 (1999); I Y T Berend, Decades of Crisis. Central and Eastern Europe before World War II (1998); A J Prazmowska, Eastern Europe and the Outbreak of the Second World War (1999); P G Lewis, Central Europe since 1945 (1994); T Rakowska-Harmstone, Communism in Eastern Europe (1979); G Swain & N Swain, Eastern Europe since 1945 (1993); F Fejto, A History of the People's Democracies; Eastern Europe since Stalin (1971); J Rothschild, Return to Diversity. A Political History of East Central Europe since World War II (1990); G Stokes, The Walls Came Tumbling Down. The Collapse of Communism in Eastern Europe (1993).
Assessment
Exam (100%, duration: 3 hours) in the summer exam period.
Important information in response to COVID-19
Please note that during 2020/21 academic year some variation to teaching and learning activities may be required to respond to changes in public health advice and/or to account for the situation of students in attendance on campus and those studying online during the early part of the academic year. For assessment, this may involve changes to mode of delivery and/or the format or weighting of assessments. Changes will only be made if required and students will be notified about any changes to teaching or assessment plans at the earliest opportunity. | https://www.lse.ac.uk/resources/calendar2020-2021/courseGuides/HY/2020_HY232.htm |
The Ramon Foundation, along with the Israeli Space Agency and the Ministry of Science and Technology published a call for proposals on Wednesday for scientists and researchers to apply to send their experiments or technology to the International Space Station (ISS). A scientific committee, which will be overseen by top Israeli space scientist Inbal Kreiss, who is the Head of Innovation at the Systems Missiles and Space Division of Israel Aerospace Industries, will choose between 10-15 such experiments - which are awaiting approval from NASA - that will travel aboard a SpaceX rocket alongside Israel’s next astronaut, Eytan Stibbe, when he embarks to the ISS in October 2021.
Stibbe, who is a former Israel Air Force pilot and businessman, will dedicate his flight hours to the Ramon Foundation, in memory of fallen Israeli astronaut Ilan Ramon, will conduct scientific research for Israeli space tech businesses and academia, and hold an educational outreach program in Hebrew to be broadcast live from the station. He plans to spend 200 hours or eight days aboard the station.
Next Israeli astronaut Eytan Stibbe (third from right, back row) is surrounded by other space experts and researchers. Photo: Yossi Zeliger
The scientific committee is composed of leading individuals in the Israeli science, medical, and space industry. Proposals must be experiments that meet the following criteria: possess the technical feasibility to be conducted aboard the ISS, have the availability of required partner resources that adhere to Stibbe’s strict AX-1 mission timeline, display a scientific and economic impact, and the ideas must also demonstrate novelty and the potential to achieve a significant scientific breakthrough. The deadline to apply is Feb. 14, 2021 and proposals can be submitted here.
Experiments will be chosen from the fields of telecommunications, astrophysics, telehealth, agriculture, optics, remote sensing, medicine, robotics and AI, among others.
Stibbe will be one of the first private astronauts to be sent by a nongovernmental nonprofit organization.
“This mission is a rare opportunity to conduct and advance groundbreaking research on a broad scale, while enabling the Israeli space community quick access to the International Space Station to conduct a wide range of experiments,” Kreiss said.
“Astronaut hours are one of the most valuable and expensive resources in the space industry, and this will allow us to provide exceptional opportunities for many entities in Israel to integrate into the space industry,” General-Director of the Ramon Foundation Ran Livne said.
“Israel has the potential to become a major player in the developing space tech industry,” Minister of Science and Technology Yizhar Shai said, and added how this is part of the ministry’s mission to create an industry of 350 companies in the civilian space industry, which employs 25,000 employees, and raises more than half a billion dollars a year through private investors. | https://www.calcalistech.com/ctech/articles/0,7340,L-3883757,00.html |
Humans aren’t built for deep space exploration. We’ve evolved to live here on Earth with an atmosphere, gravity, and a vitally important magnetic field that deflects high-energy cosmic radiation. It will take all our technological prowess to expand on to other worlds, and it won’t simply be a matter of physically getting there. We also need to preserve delicate human biology. A new study from Georgetown University and NASA suggests it may be much harder than we thought to ensure astronauts maintain healthy gastrointestinal (GI) tract tissue in space.
While doctors expect long-term exposure to high-energy radiation will have myriad effects, it’s difficult to study them in a lab on Earth. The effects of the GI tract are easier to assess because the cells lining this body system are replaced every few days. New cells migrate upward from a structure called a “crypt” to take their places lining the gut. Any disturbance of this mechanism can lead to dysfunction.
The study assessed mice under exposure to different radiation conditions as an analog for humans. They’re much smaller, so they can’t handle as much radiation has a human. However, their GI tracts respond much like ours would from exposure to high-energy particles. The researchers used the NASA Space Radiation Laboratory (NSRL) in Brookhaven National Laboratory to bombard the mice with either simulated galactic cosmic radiation (sometimes called cosmic rays), gamma rays, or no radiation (control group).
It turns out that galactic cosmic radiation (GCR) might be the greatest threat. This isn’t electromagnetic radiation like x-rays, radio, or gamma rays — it’s atomic nuclei. The nuclei in GCR have lost all their electrons and swing around the galaxy at near the speed of light, probably accelerated by supernovae. The high mass of these particles appears to cause severe damage to the sensitive tissues of the GI tract.
According to researchers, mice that were exposed to heavy ion GCR showed poor nutrient absorption following the test. They also had a higher than expected incidence of cancerous polyps. The team also detected damage to DNA in the GI tract that could lead to permanent dysfunction. This was just with a simulated low dose over the course of months. Attempting to live on the surface of Mars for years or decades would likely be impossible with current shielding technology.
This was just a study of one organ system, though it’s a particularly vulnerable one. However, the team believes that other organs could be similarly affected by cosmic rays. | https://www.extremetech.com/extreme/278004-deep-space-exploration-could-permanently-damage-human-gi-tracts |
STOW, MA – “If you have a fire at home you may only have less than three minutes after the alarm sounds to get out safely. Knowing what to do can mean the difference between life and death,” says State Fire Marshal Peter J. Ostroskey. The theme of this year’s Fire Prevention Week campaign, Every Second Counts – Plan Two Ways Out!” reminds us of the importance of planning and practicing a home escape plan. Fire Prevention Week is October 8-14, 2017.
“Time and again, I’ve seen the life-saving impact of having a home escape plan, when firefighters arrive at a fire and see the family outside at their meeting place. Most fatal fires occur in the home, and I’ve seen the tragedy that can result when people don’t get out,” said State Fire Marshal Ostroskey. “That’s why we’re making a concerted effort to educate Massachusetts residents about the importance of planning and practicing a home escape plan that everyone knows.”
“Children practice fire drills in school at least four times each year. Families should also have home fire drills so they can practice their home escape plans,” said Ostroskey.
Protect Your Home and Family with Home Escape Planning
A home escape plan includes two ways out of every room, which could be a window or door, a route to exits and a meeting place outside and away from the house. A neighbor’s porch, a tree or a mailbox near the house would be good meeting places. In addition to a home escape plan, homes must have working smoke alarms. “When creating your family home escape plan, it would be a great time to check that all smoke alarms are less than ten years old, and are working,” Ostroskey said. “Most smoke alarms last about ten years, so it’s important to replace them when they expire.” When replacing battery-operated alarms, choose smoke alarms with a 10-year sealed battery and a hush button feature that never needs replacing until the entire alarm does. Smoke alarms should be tested monthly, and alkaline batteries should be replaced at least once a year or when the alarm begins to chirp, signaling the battery is running low.
How to develop a home escape plan
The Department of Fire Services offer these tips on creating a home escape plan:
- Have a family planning session. Draw a map of your home, identifying two ways out of every room.
- Include the routes out of each room.
- Teach the route and meeting place to everyone.
- Practice! Hold a fire drill during the day and one at night.
- Make sure your house number is visible from the road so the fire department can locate your home.
Escape Plans not just for families
“Businesses should also review emergency plans and evacuation routes with employees during Fire Prevention Week,” reminds Ostroskey. “No matter where you are – at work or at play, you need to know what to do in case of fire, and you need to know how to get out of any building.” With so little time to leave a building in a fire, preparation and practice is the best way to remember the plan. “And once out, stay out,” explained Marshal Ostroskey. “Never go back into the home, or workplace even if it looks safe. Things can be replaced. You cannot be replaced.”
For additional information and a chart to use to create a home escape plan visit www.mass.gov/dfs and type in home escape plans in the search bar. | https://www.capecod.com/cape-wide-news/october-9-15-is-fire-prevention-week-every-second-counts-plan-two-ways-out/ |
President and Vice-Chancellor Mamdouh Shoukri has issued the following message to the York University community:
Dear Members of the York Community,
I am writing to update you on the Academic and Administrative Program Review (AAPR) and, in particular, to share some information on the next phase of the process.
With the release of the task force reports to the community on Nov. 7, the analysis & assessment phase of AAPR is now complete. The reports mark the completion of over 18 weeks of work by the Academic and Administrative Task Forces. Members of the task forces carefully reviewed 409 program information forms, supporting data, and engaged in critical discourse surrounding program quality and sustainability in order to evaluate each academic and administrative program using consistent methodology. The reports are a culmination of this hard work. I would like to take this opportunity to recognize the considerable work undertaken by our task force colleagues and to thank them for their dedication, commitment and service to the University. As a reminder to the community, the names of the Academic and Administrative Task Force member are listed at the end of this letter.
Two task force reports are being released. One report for academic programs, Academic Task Force Report, and one for administrative programs, Administrative Task Force Report, will be available to the York community on Friday, Nov. 7, via the AAPR YU Link site, Task Force Reports page. The reports highlight themes and observations, as well as discuss the institutional scatter plots, which show each program in its location relative to cumulative program scores for quality and sustainability.
The release of the task force reports marks the beginning of the response phase of AAPR. The overarching goal in the next few months is to engage the community in important discussions that will inform future decisions on how the University will achieve its academic mission. The external landscape for higher education is undergoing significant change, with continuing focus on fiscal constraint, differentiation and accountability.
Working in collaboration with strong leadership across the University, I am confident that we are putting in place processes to encourage open dialogue on the task force reports, and more generally, on the challenges and opportunities we face in maintaining the progress we have made thus far in advancing our shared vision for York as a leading, engaged institution of higher education.
I encourage each of you to review the reports when available and to attend one of three upcoming AAPR community information sessions to begin the collegial dialogue about the reports:
Friday, Nov. 14 – 12 to 1:30pm, Winters Dining Hall, Keele Campus
Thursday, Nov. 27 – 12 to 1:30pm, BMO Conference Centre, Glendon College
Friday, Dec. 5 – 12 to 1:30pm, Winters Dining Hall, Keele Campus
In addition to these sessions, APPR Committee is hosting a forum to discuss planning priorities following the release of the task force reports. This event is scheduled for Nov. 13, from 9am to 12pm, in Founders Assembly Hall, Founders College. Throughout the month of November, we are encouraging dialogue at the local and institutional level to discuss the implications of the reports and consider strategies and opportunities to address our challenges and to enhance our quality. A framework and time frame on response plan development will be circulated shortly.
As we move through this final phase of AAPR, we are reiterating our commitment to a transparent and inclusive process, one that incorporates valued input from our community, involves evidence-based decision-making, and is shaped to suit our institution’s unique needs. Please continue to visit the AAPR YU Link site regularly for access to task force reports, updates and response phase documentation.
Sincerely, | https://yfile.news.yorku.ca/2014/11/02/aapr-update-a-message-from-york-universitys-president/ |
How to Convert Wind Speed to Roof Uplift
One of the most dangerous events that take place in a hurricane, tornado or straight line wind storm is the uplift and removal of a roof. The physics behind this refers to the velocity pressure of the wind or the pressure induced by wind speed. Pressure is a force per unit area so a pressure of 10 pounds per square foot (psf) becomes a very large force when there is a high surface area (measured in square feet). For instance, a roof lip with a square foot area of 100 square feet will experience a force of 1000 pounds (10 psf x 100 square feet). The force required to lift a roof is extremely variable and depends on the direction of wind, materials of construction and roof supports.
Step 1
Determine the calculated wind speed pressure based on the dynamic pressure formula: P = 1/2 ρ x v^2 where P is pressure in pounds per square foot, ρ is the air density in pounds per cubic foot (lbs/ft3) and v is the air velocity in feet per second (fps). Assume there is a 100 mph wind (146.67 fps) and air has a density of 0.075 lbs/ft3. This is calculated to be 806.7 pounds per square foot.
Step 2
Determine the maximum designed force a roof can withstand before failure. For instance, assume a residential roof has an exposed surface area of 125 square feet and can withstand 110,000 pounds of force applied to it.
Step 3
Calculate the maximum force that will be applied to the roof by multiplying the velocity pressure by the exposed roof surface area. This is 806.7 x 125, or approximately 101,000 pounds of force. This means that a roof designed for 110,000 pounds of force should withstand the wind speed.
References
Writer Bio
Brian Baer has been writing since 1982. His work has appeared on Web sites such as eHow, where he specializes in technology, management and business topics. Baer has a Bachelor of Science in chemical engineering from the University of Arkansas and a Master of Business Administration from the University of Alabama, Huntsville. | https://homesteady.com/how-12008762-convert-wind-speed-roof-uplift.html |
Last updated on April 4th, 2017 at 02:34 am
Heterochromia indicates “different (hetero-) colors (- chromia).” Generally the term is used to describe the condition where a person has actually different colored eyes– one blue eye and one green eye, for instance.
What Is Heterochromia?
Other terms to describe various colored eyes are heterochromia iridis and heterochromia iridum. “Iridis” and “iridum” describe the iris of the eye. The iris is the thin, circular structure that surrounds the pupil and contains the pigment melanin, which gives our eyes their distinct color.
The quantity of melanin in the iris figures out whether we have blue eyes, green eyes, hazel eyes or brown eyes. Blue eyes have the least amount of melanin in the iris; brown eyes have the most.
Heterochromia usually is benign. To puts it simply, it is not an eye disease, and it does not impact visual acuity.
Benign heterochromia can provide a person a captivating, even exotic, appearance. In reality, a variety of stars– including Dan Aykroyd, Kate Bosworth, Henry Cavill, Alice Eve, Josh Henderson, Mila Kunis, Jane Seymour and Christopher Walken– have heterochromia.
Heterochromia also happens in animals. Types of dogs that typically display heterochromia include Siberian husky, Australian shepherd, border collie, collie, Shetland sheepdog, Welsh corgi, Great Dane, dachshund and Chihuahua. Such cat types consist of Turkish Van, Turkish angora, Japanese bobtail and sphynx. Frequently such “odd-eyed felines” have been reproduced particularly to have this function.
Types Of Heterochromia
There are 3 types of heterochromia, based upon where the various colors lie:
- Total heterochromia. This is where the iris of one eye is an entirely various color than the iris of the other eye.
- Partial heterochromia (or sectoral heterochromia). This is where only a portion (or sector) of the iris of one eye has a different color than the remainder of the iris of that eye. Partial heterochromia can happen in one eye or both eyes.
- Central heterochromia. In this type of heterochromia, the iris has a various color near the border of the pupil (compared to the color of the remainder of the iris), with spikes of the main color radiating from the student toward the middle of the iris.
Something that’s often puzzled with heterochromia is a benign growth called an iris mole. A pigmented mole in the iris usually is round in shape and brown in color. Normally, just one iris mole exists, but it’s possible to have more.
Though an individual may argue that a brown iris mole on a blue, green or hazel eye is a kind of partial heterochromia, the term heterochromia typically isn’t really used when the cause of the color variation in the iris is a nevus.
Iris nevi (plural of mole) normally stay stable in size. If you have an iris nevus, your optometrist usually will wish to see you every six months (for a while, at least) to determine its size and dismiss any development that might suggest malignancy.
Causes coming from such colorings might be very varied, although in most of the cases, it is a genetic condition, which indicates that people affected are born with this condition, which isn’t truly pertinent, as it does not suggest any vision change whatsoever. In such cases, the difference of color between the two eyes or within the very same eye does not change, and ocular function is normal.
What Causes Different Colored Eye?
As currently pointed out, many cases of heterochromia are benign. A baby can be born with benign heterochromia, or it can emerge in early youth as the iris attains its total of melanin. These types are called congenital heterochromia.
Usually, hereditary heterochromia is a hereditary trait that is acquired. Benign heterochromia likewise can happen as the result of a hereditary mutation during embryonic advancement.
In some cases, heterochromia is a symptom of another condition that exists at birth or establishes quickly thereafter.
One example of a condition that causes heterochromia is Horner’s syndrome. This is the combination of a restricted pupil, partial ptosis and loss of the ability to sweat on half of the face, all triggered by a disruption of particular nerve impulses to the eye.
Heterochromia that develops later on in life is called obtained heterochromia. Causes of obtained heterochromia consist of eye injuries, uveitis and particular glaucoma medications.
Latisse, a repurposed glaucoma medication now used primarily as a cosmetic representative to thicken eyelashes, likewise can cause the iris to alter color.
Have An Eye Exam To Be Safe
Though many cases of heterochromia are hereditary and benign, if you or your child has actually various colored eyes (or various colored segments of one or both eyes), see your eye doctor for a thorough eye exam to rule out other causes.
After your eye doctor confirms your eyes are healthy, delight in the compliments you are most likely to receive about the special appearance of your two various colored eyes. | https://eyexan.com/different-colored-eye-heterochromia-human/ |
NASA Mars helicopter “Wit” completed its second flight on Thursday. This time, “Wit” flew higher, farther, and longer.
At 5:33 on Thursday, US Eastern Time 17:33 on Thursday, Beijing Time, “Witty” took off automatically from the surface of Mars, and a burst of dust was stirred up during the ascent.
Besides, it reached a height of 16 feet (approximately 4.9 meters), then tilted 5 degrees, moved 7 feet (approximately 2.1 meters) to one side, hovered, turned to point the color camera it carried in multiple directions, and finally returned Departure point for landing.
Moreover, the flight lasted a total of 59.1 seconds. During the maiden flight of the historic Mars of “Wiz”, it flew at an altitude of 3 meters and lasted a total of 40 seconds. | https://www.tip3x.com/2021/04/23/nasas-mars-helicopter-wit-completed-its-second-flight/ |
Visual Arts, University of Nottingham
Thesis title:
Histories of American art and photography have for most part focused on the country’s peripheral metropolises, including New York and Los Angeles, ignoring the influence of other historically defined regions in the formation of American cultural imaginary. My PhD research investigates the cultural and mythological roles of such regions, including the Midwest, the Pacific Northwest, and the Appalachia, identifying each as a cultural signifier in the realm of photography. The research addresses the following question: how do contemporary photographers deploy, appropriate, critique, or otherwise engage with Regionalism as a cultural, critical, and/or political tool?
Through their representations in visual and popular culture, each region has been defined by distinct visual iconographies and narratives, thus creating a tension between local realities and regional mythologies. For example, the Midwest has often been portrayed through the lens of domesticity, highlighting its status as a symbolic heartland, whilst the history of Appalachia has seen the recycling of images connoting poverty and isolation. Seeking to counter such regional, cultural and historical biases, the research project will trace how the emphasis on place and space can shape contemporary readings of American visual culture and Americanness at large, in addition to underlining photography’s inherent ability to intertwine fact and fiction. | https://www.midlands4cities.ac.uk/student_profile/jarkko-tanninen/ |
FED Releases Hypothetical Scenarios for Stress Test Exercise in 2020
FED released hypothetical scenarios for the stress test exercise in 2020. This year, the stress tests will evaluate 34 large banks with more than USD 100 billion in total assets and include two hypothetical scenarios: baseline and severely adverse. Banks are required to submit their capital plans and the results of their own stress tests to FED by April 06, 2020. FED will announce the results of the supervisory stress tests by June 30, 2020. In its announcement, FED has disclosed the list of banks that will be undergoing the exercise this year, along with the components that apply to each participating bank.
The severely adverse scenario and baseline scenarios are not forecasts. The severely adverse scenario describes a hypothetical sets of events designed to assess the strength of banking organizations. Similarly, the baseline scenario is in line with average projections from surveys of economic forecasters. Each scenario includes 28 variables—such as gross domestic product, the unemployment rate, stock market prices, and interest rates—covering domestic and international economic activity. The severely adverse scenario this year features a severe global recession in which the U.S. unemployment rate rises by 6.5 percentage points to 10% and elevated stress in corporate debt markets and commercial real estate. The scenarios start in the first quarter of 2020 and extend through the first quarter of 2023.
Banks with large trading operations will be required to factor in a global market shock component as part of their scenarios. This year's shock features, among other things, heightened stress to trading book exposures to leveraged loans. Additionally, firms with substantial trading or processing operations will be required to incorporate a counterparty default scenario component. The counterparty default scenario component involves the instantaneous and unexpected default of the largest counterparty of a firm.
The stress test exercise ensures that large banks have adequate capital and processes so that they can continue lending to households and businesses, even during a severe recession. The stress test framework of FED consists of the Comprehensive Capital Analysis and Review, also known as CCAR, and the Dodd-Frank Act stress tests.
Related Links
Keywords: Americas, US, Banking, Stress Testing, DFAST, CCAR, 2020 Stress Test, Severely Adverse Scenario, Baseline Scenario, Stress Testing Scenarios, FED
Featured Experts
James Partridge
Credit analytics expert helping clients understand, develop, and implement credit models for origination, monitoring, and regulatory reporting.
Laurent Birade
Advises U.S. and Canadian financial institutions on risk and finance integration, CCAR/DFAST stress testing, IFRS9 and CECL credit loss reserving, and credit risk practices.
Metin Epözdemir
Metin Epözdemir helps European and African banks with design and implementation of credit risk, stress testing, capital management, and credit loss accounting solutions.
Previous ArticleESMA Publishes Its Strategy on Sustainable Finance
Related Articles
EC Consults on PSD2 and Open Finance; EU Reaches Agreement on DORA
The European Commission (EC) published a public consultation on the review of revised payment services directive (PSD2) and open finance.
EC Mandates ESAs to Propose Amendments to SFDR Technical Standards
The European Commission (EC) has issued two letters mandating the European Supervisory Authorities (ESAs) to jointly propose amendments to the regulatory technical standards under Sustainable Finance Disclosure Regulation or SFDR.
EBA Examines Supervisory Practices, Issues Deposits Reporting Template
The European Banking Authority (EBA) published its annual report on convergence of supervisory practices for 2021. Additionally, following a request from the European Commission (EC),
US Agency Publications Address Basel, Reporting, and CECL Developments
The Farm Credit Administration published, in the Federal Register, the final rule on implementation of the Current Expected Credit Losses (CECL) methodology for allowances
SEC Extends Comment Period on Climate Risk Disclosures
The U.S. Securities and Exchange Commission (SEC) looks set to intensify focus on crypto-assets and cyber risk and extended the comment period on the proposed rules to enhance and standardize climate-related disclosures for investors.
APRA Reduces Committed Liquidity Facility, Issues Other Updates
The Australian Prudential Regulation Authority (APRA) announced reduction in the aggregate Committed Liquidity Facility and issued an update on the operational preparedness for zero and negative market interest rates.
CMF Consults on Basel Rules, Presents Roadmap to Address Climate Risks
The Commission for the Financial Market (CMF) in Chile published capital adequacy ratios (as of February 2022, January 2022, and December 2021) for 17 banks and for the banking system.
PRA Issues Statement on NPEs and Policy on Trading Activity Wind-Down
The Prudential Regulation Authority (PRA) issued a statement on the European Banking Authority (EBA) guidelines on management of non-performing exposures (NPEs) and forborne exposures.
EBA Updates Standards for 2023 Benchmarking of Internal Approaches
The European Banking Authority (EBA) updated the implementing technical standards that specify the data collection for the 2023 supervisory benchmarking exercise in relation to the internal approaches used in market risk, credit risk, and IFRS 9 accounting.
EIOPA Responds to Stakeholder Views on Blockchain in Insurance
The European Insurance and Occupational Pensions Authority (EIOPA) published a feedback statement on the responses received to the consultation on blockchain and smart contracts in insurance. | https://www.moodysanalytics.com/regulatory-news/Feb-06-20-FED-Releases-Hypothetical-Scenarios-for-Stress-Test-Exercise-in-2020 |
Cost, location, availability – the top three considerations for event planners when selecting an appropriate venue. However, there are many more things to keep in mind if you want to make sure that your venue choice fully supports your event objectives. Whilst these will differ dependent on what those objectives are, here are five considerations that should be applicable regardless of event scope, size or purpose.
1. Consider your audience
When choosing your event venue, considerations relating to your audience extend far beyond the basics of an expected head count. In order to provide your attendees with the best experience possible, you need to cater to their preferences. Consider their demographics – their likes and dislikes, how they spend their leisure time, what type of lifestyle they are accustomed to – what sort of venue, and in what location, would best reflect their wants and needs?
Another aspect to consider with regards to your audience is accessibility and facilities. Inclusivity is a driving force of today’s events industry and rightly so – but too often it is used as a buzzword and not given the required attention. Consider the accessibility in and around the venue and what facilities your audience may require.
2. Picture the finished article
When choosing your venue try and think ahead to picture your event as a finished article. Consider the flow of movement from one room to another, your set and stage design, your chosen seating arrangement. Will what you have in mind work practically and effectively within the space?
This is of particular importance when selecting your main plenary room. Beyond its basic shape and dimensions, you need to take into consideration ceiling height, any room features such as pillars, columns or steps, doors and windows, emergency exit routes – every aspect of the space will impact your final event design. Your audiences comfort too – if you’re looking to use rear projection, your screen size will dictate how far from the wall your stage needs to sit so your chosen space needs to have sufficient dimensions to accommodate this additional space requirement and still leave ample room for your audience to be seated comfortably.
3. Be sure on venue availability and access
When discussing the availability of a venue, think beyond your actual event days. Activities taking place either side of your chosen dates can have a major impact on you, your production company and your budget. Many venues will piggyback bookings in order to maximise revenue and, whilst this makes good business sense for them, it could lead to you paying for additional staff and crew in order to set up or tear down safely in limited time frames.
Of equal importance is access. Not just in terms of timings but also the physical access available. Your AV and/or production team will have a significant amount of kit – the easier it is for them to move this in and around the space the better. Does the venue have a dedicated load-in entrance with parking? If not, are there parking restrictions that may impact the load-in process? Do they have allocated lifts for the transportation of equipment? Anything that impacts on the movement of kit could again lead to an increase in crew and a subsequent increase in your budget.
4. Understand your technical requirements
When choosing your venue it’s useful to have at the very least an idea of what the technical set up of your event will include. Are you planning front or rear projection? Does your set up require rigging and, if so, does the venue have the relevant hang points? Do you require AV support for breakouts and workshops and could the venue supply this? The better the picture you have of your technical requirements the better placed you’ll be to find a venue to suit.
An increasingly important technical consideration is internet capability – the experience your event attendees have will be hugely reliant on it. On a basic, personal level, they will expect to be able to access the internet with ease and relative speed. In an age where almost all of us carry more than one digital device, our bandwidth demands are increasing – the higher your attendee figures, the more devices on site and the greater your bandwidth needs.
And that’s before we even take into consideration the event program itself. Live streaming, online registration, social media, event apps, webcasting, live polling; there are an increasing number of activities that are reliant on sufficient bandwidth. Your AV or event tech provider should offer advice in this area but arming yourself with an understanding of your requirements is hugely beneficial to selecting an appropriate venue.
5. Consider Sustainable Practice
As a key priority in the events and conferencing world, every event planner has a responsibility towards sustainable practice. Your venue selection is one area that can have a big impact here. The location of your venue is of course a major consideration. An easily accessible spot with good public transport links can hugely reduce the carbon footprint of your event.
Beyond location, ensure your venue selection is size appropriate to reduce excessive heating or cooling, assess the natural light available and how this can be used in place of artificial light, and enquire as to what venue owned equipment is available for use – this will reduce the need to transport kit from elsewhere.
It’s also important to take into account the sustainable practices and policies of the venue itself and how these will add to your own efforts. Many venues now have sustainable accreditation and some will even produce reports to demonstrate the reduced impact of a meeting or event.
Finding the perfect venue is a lengthy process and if you’re not using a specialist venue finding service, the key is to start early. Preparation is the best way to ensure you secure a venue that is budget friendly, offers value and supports your all important event objectives.
The Presentation Group offer valuable support in the venue selection process, attending site inspections to advise on event set up and specification. Contact us today for more on our creative and technical event production services. | https://www.thepresentationgroup.co.uk/blog/5-steps-for-choosing-the-right-event-venue |
This term paper was researched and written by Amy Proni (now Amy Ranger) for the course ILS-538, Computer-mediated communication, taught by Dr. E. Sierpe, Southern Connecticut State University, Spring, 2005.
Assignment: The purpose of this assignment is to give you the opportunity to explore an area of CMC and CMC research. The area will be entirely of your choice. There are no restrictions on the characteristics of the area chosen as long as it pertains to CMC, our field, or the application of CMC technologies to the dissemination of information. The possibilities are almost infinite. You do not have to concentrate on CMC problems related to libraries in the traditional sense.
The Term Paper will be developed during the entire academic session. At the end of our course you should have a well structured paper. Your paper should give its intended audience a clear understanding of the area of interest as well as insights on the issues that have been explored.
This paper discusses the confluence of technological innovation, computer-mediated communication, and the World Wide Web as a virtual place where individuals may pursue distance and life-long learning.
The purpose of this paper is to explore the confluence of computer-mediated communication (CMC) and technology with distance learning and lifelong learning. The effects of this learning environment on individuals and implications for continuing education will be discussed.
There was a time in American society when a person’s destiny was dictated by biology and a strict adherence to social constructs. Formal education ended for most people early in life. The phrase “distance education” might have referred to boarding school, but the concept as it is today did not exist. Over the course of two hundred years the United States evolved from one of a rural/agrarian culture to that of an industrial/technological superpower; education in the country evolved as well, from an elite system to one of mass higher education. (Goodyear, 1998). Compulsory education laws were enacted, beginning with Massachusetts in 1852; by 1918 all of the states mandated education for children. (Novello, 1998). Early distance learning programs were correspondence courses based on an exchange of printed materials via the postal service. Later programs used interactive radio, sometimes in conjunction with broadcast television, or video-recordings and CD-ROMs. As defined by the United States Distance Learning Association (USDLA), distance education is an “education program whereby students may complete all or part of an educational program in a geographical location apart from the institution hosting the program; the final award given is equivalent in standard and content to an award program completed on campus.” (USDLA, 2005). The Association also defines distance learning as “The acquisition of Knowledge and skills through mediated information and instruction, encompassing all technologies and other forms of learning at a distance.” (USDLA, 2005).
Distance modes have empowered students to determine when, where, and how they study and so have freed them from the constraints of face-to-face instruction. (Wells, 1992). “It is understood that modern telecommunications, computers, and innovative software can greatly enhance the educational capabilities of the broadcasting technologies. Courses on the Web can be offered asynchronously, enabling people in remote areas or with busy schedules to take them from any location and at convenient times. Professionals can upgrade their skills or learn new ones without committing to a formal program in fixed classrooms. However, it has not yet been demonstrated, for the currently available technologies, that they can be effectively used under all conditions for all students.” (Niederman & Rollier, 2000, p. 59). In other words, a variety of distance learning options does not mean that each option works equally well for every learner.
Communications in19th century America, primarily based on written words or symbols (such as by semaphore), were transmitted via personal messenger, rudimentary postal service, other delivery service, or line-of-sight. (USPS, 2005; Fang and Ross, 1996). The development of the telegraph, then the telephone, followed by the broadcast media of radio and television, were the beginning of a revolution in communications. The development of computers for government, military, and scientific applications in the mid-20th century served as a catalyst for a true transformation of communications technologies. Personal computers (PCs), which were introduced to the American public in the mid-1970s, quickly became a necessity in the business environment, spreading from there to the classroom and the home environments. Electronic mail (e-mail), developed “in 1965 as a way for multiple users of a time-sharing mainframe computer to communicate” (Wikipedia, 2005) took communications to an entirely new level through the use of the internet, a worldwide system of interconnected computer networks that transmits electronic data. E-mail is essentially a message sent from one computer to another, using specialized software, over standard telephone lines, high-speed data lines, cable television, or via satellite. Like the computer, e-mail and the internet were also developed primarily for government and research. E-mail was the killer app (a colloquial expression meaning “prominent or essential [software] application”) that truly changed how people communicate with each other. The development of the World Wide Web (known simply as the web) and Hyper Text Markup Language (HTML) further fueled societal transformations evidenced by the sense of living in a global community. The web is a virtual space accessed through the internet with an electronic device such as a personal computer (PC), personal digital assistant (PDA), telephone or cellular phone, and specialized browser software. HTML is a simple but powerful computer language used to describe web pages (also called web sites) and is the main interface language to the web. (Stewart, 2005). The brief messages that had been popularized by e-mail in the 1960s were precursors to a universal dialect utilizing abbreviated words, phrases, and acronyms in the 21st century. The specialized language associated with e-mail is also useful for text-messaging and instant-messaging (IM) which can be done on a PC, PDA, or cell phone. When viewed in context, the potent mixture of innovations in technology and communications enabled computer-mediated communications to become a major force for change in the 21st century.
“Every individual must be in a position to keep learning throughout his life. The idea of Lifelong education is the keystone of the learning society.” (Faure, 1972). Learning and education today are not limited to pre-specified times and places. People realized that a formal education would not be enough to provide all of the knowledge and skills that necessary to succeed in the new knowledge economy. (Sharples, Corlett, & Westmancott, 2002). That realization, combined with the emergence of new learning styles and technologies led to the development in the late 20th century of hybrid subjects and courses and the evolution of new paradigms regarding knowledge production. This in turn caused academic institutions to reinvent themselves in an effort to meet the needs of a continually expanding market. (Scott, 2005). Four dominant sub-systems that co-evolved with education are information technology, communication systems, the economics of the market place, and cultural forces. Information technology, using ever more powerful communication systems, transformed the educational process from a place-and-time-bound set of interactions to a fluid and virtual environment where students are as likely to participate from within a home or office as from within the traditional academic building. Policy makers now must consider the high cost of institutional infrastructures such as administrative overhead, academic costs, student services, and facility maintenance. The emergence of continuous learning, resulting in fluid career choices, coupled with a global and continuing information explosion, are but two of the cultural forces that threaten the status quo. (Achleitner, Vowell, & Wyatt, 1998).
The technologies necessary to support lifelong learning are many and varied. It is not enough for an individual to have access to a computer that is connected to the internet and the web. Individuals must also have access to technologies that are portable – or at least available at a time and place when the user is ready to learn. The supporting technologies must also be individual and adaptable to the learners’ abilities, knowledge and learning style, and designed to support personal learning. Ideally they will be unobtrusive or seamless allowing the learner to focus on learning and not just on technologies. They must be widely available and persistent. A lifelong learner needs to access the accumulated resources and knowledge despite technological changes. The burden of dealing with multiple computers, operating systems, storage media, and formats is challenging for even technically-minded individuals. It is overwhelming for those who are “computer-challenged,” are techno-phobic, or have minimal technological expertise. Finally, innovative technologies that support lifelong learning must be useful and easy to use—suitable to meet everyday needs of communication, reference, work, and learning. (Sharples, Corlett, & Westmancott, 2002, p. 223). Given the rate of change and development in computers and integrated electronics since 1975 one can only hope that the exponential growth and innovations witnessed so far will continue, and that truly intelligent machines are just around the corner.
It is important that discussions on the influence of computer-mediated communication also take into account certain contextual factors, as the type of technology employed by a learner will impact the experience. These contextual factors include the channel (e-mail or website) and mode of communication employed (text, graphics, multi-media, or a combination); the type and number of participants (male or female, young or old; one-to-one, one-to-many, many-to-many); the length (long-term or brief) and nature of the relationships of the individuals (personal or professional). Other factors that must be considered are the topic (course work, research, personal interactions) and purpose of the exchange (academic, private, or commercial); whether it is synchronous (occurring in real-time) or asynchronous (delayed or sequential, but not in real-time); whether it is public or private (interpersonal, small group, or mass communication) and moderated or unmoderated; and, finally, the attitude of the participants towards CMC (enthused or skeptical, committed or disinterested) and length of time they have been doing it (novice or experienced). (Thurlow, Lengel, & Tomic, 2004). A distance learning class may include individuals subject to any or all of those contextual factors. For these and other reasons, an instructor must be technologically competent, patient, and aware that the students are vulnerable to a host of factors that could adversely impact their learning.
“The rapid growth in numbers of distance education courses and programs continues to have a profound impact on the ideas and beliefs that encompass teaching and learning. The use of e-mail and the Internet, coupled with Web-based coursework, has become a core method of instruction, particularly in higher education. The number of students enrolled, course offerings, and the availability of distance education as a reliable method of instruction gained tremendous momentum during the last decade.” (Derrick, 2003, p. 6). It is accepted as a fact of life that Americans do everything on the run: from shortened vacations to fast food, there is a sense that multi-tasking and doing things as quickly as possible is both effective and preferred. This attitude is reflected in the marketplace, where there is a constant demand for greater computing power, improved software, and faster online connections. Consumers have come to believe that Moore’s Law, an empirical observation that the rate of technological development on the complexity of integrated circuits increases exponentially every 18 months, (attributed to Gordon E. Moore) (Wikipedia, 2005b) applies to everything, and not only to the semiconductor industry.
According to a recent survey by the Pew Internet & American Life Project of 2,201 adults (aged 18 and over), 81% of the people between the ages of 18 to 29, and 78% of those aged 30 to 49 go online on a typical day. (Pew, 2005). On an average day, 77 million American adults go online; some 58% of them have internet access at home. About 2% of those 77 million adults go online to take a class online just for personal enjoyment or enrichment, and 2% will take a class online for credit toward a degree of some kind. (Pew, 2005b). Two percent may not seem like a significant number, but the National Center for Education Statistics published similar information in 2004: “course enrollments in distance education have increased from 1.7 million to 3.1 million between 1997-98 and 2000-01 at both undergraduate and graduate levels. The growth of course enrollments at public 2-year institutions is particularly notable. In 1997-98, public 2- and 4-year institutions each had approximately 710,000 enrollments in distance education courses. In 2000-01, enrollments at public 2-year institutions rose to nearly 1.5 million, compared with 945,000 at public 4-year institutions. By 2000-01, about half of all course enrollments in distance education courses were at public 2-year colleges.” (Wirt et al., 2004, p. 79). The demand for distance learning that is fast, easy and cheap (in spite of the fact that these are concepts which are most definitely in conflict with reality) will likely increase, if for no other reason than the “cool factor” that seems to be associated with all things related to the internet or web. This argument follows the logic of the “Technology Acceptance Model,” which suggests that users will be influenced by a number of factors on how and when they will use new software presented to them, including its perceived usefulness and perceived ease-of-use. (Wikipedia, 2004). As more individuals perceive the value of distance education, more will embrace it. The technologies associated with CMC and distance learning are still very much in their infancy and can be expected to evolve considerably over the next decade. Estimates from the United States Department of Education indicate that about 9 percent (between 14.5 and 16 million persons) of the resident population (ages 18 to 64) in the year 2000 were enrolled in postsecondary education. (U.S.D.o.E., 2005). The fact that more than three million Americans were enrolled in distance learning courses in 2004 indicates that distance education is perceived as valuable by a significant percentage of the population, and not only by the early adopters of technology.
Contrary to the traditional mode of stand-up-in-front-and-talk, teachers in classrooms using communication technology often find a dramatic change in classroom dynamics. An essential spirit of collaboration between teacher and learner in the computer classroom means that the teacher also becomes the learner. The emphasis on process (exploration, evaluation, collaboration, discussion, reflection, and formulation of individual and shared meanings) requires that teachers participate as learners alongside students. (Thurlow, Lengel, & Tomic, 2004). This is an important aspect of the constructivist view of learning: that learning is a collaborative process based on prior knowledge, wherein the instructor acts as a mentor or guide. Prior educational experiences are unlikely to prepare students for this new type of learner-centered setting, in which the responsibility for success is squarely on the shoulders of the student. The reality is that students involved in distance learning must be active participants and prepared to take personal responsibility for their role in the learning process. The value of computer-mediated instruction for today’s adult learners must be evaluated by considering basic questions about the teaching and learning process. (Muirhead, 2000). Students who fail to explore the nature of distance education may also find it difficult to complete a graduate-level program. In general, teaching and learning are thought of as inherently social endeavors. The absence of face-to-face contact with professors and classmates can be a concern for learners, and rightly so: it means that the computer-mediated communication style of learning is less than ideal for those who tend to be more verbal than textual, or who possess oral/aural learning styles. (Bird, 2004). Some students may be intimidated by the communication styles exhibited by their peers, or feel inadequate with regard to life experiences or topic knowledge. Some instructors are unable to provide consistent, timely, and relevant feedback, creating a situation reminiscent of the ‘sound of one hand clapping.’ The online learning environment necessitates all participants work together, significantly more so than in a traditional learning environment. “Because I consider myself a lifelong learner, I decided I needed the experience of learning through CMC… I made arrangements, worked through the computer complexities and technical problems, and found myself in a ‘virtual classroom.’ Having managed to arrive at the level of doctoral student and having taught at both high school and university levels, I feel I am quite familiar with the world of the classroom. However, I was not prepared for what transpired during those 13 weeks in that virtual classroom: my learning style and conceptual framework were challenged, and my pedagogical paradigm given a good shake.” (Bird, 2004, p. ).
The experience of this author is similar in that the specific challenges associated with online learning were unexpected. The effort of searching and finding relevant information for assignments has been quite difficult. Some professors seem reluctant to state precisely what they want, so that the student must then set to work as a mind-reader. The coursework in the majority of courses taken in pursuit of a master’s degree in library science has been overwhelming. Lest the reader think that distance learning has been dry and dull, it should be stated that the program has included moments of humor. One professor’s comments on a paper proposing an instructional design were written in capital letters (the CMC equivalent of shouting, which is considered to be rather rude). He indicated that if the proposed plan were implemented perhaps as many as half of the students for whom the instruction had been designed would be overlooked, because the plan did not include all possible combinations of students, learning styles, and learning needs. Oh, the irony of it all! Very few instructional design proposals are able to meet the needs of all learners at all times, and that includes distance education.
And yet, for other students the level of discourse within online classrooms is as good or better than what may be experienced in a traditional setting. Reasons for this are primarily traceable to the asychronicity of CMC, which allows students to consult and incorporate outside resource materials into their response; reflect at leisure before responding; and participate anytime, twenty-four hours a day, seven days a week. In fact, the accessibility of the online environment can facilitate and sustain a level of intensity that is rarely achieved in face-to-face classes. (Wells, 1992). The freedom to participate in class at a time of day that is most convenient for the learner is routinely mentioned as one of the most positive aspects of asynchronous learning. For courses in which both time and space separate students from each other and from the instructor, electronic discussion boards often provide the main forum for class discussion. A candidate for a master’s degree in business communication says “It’s a place a teacher can post a series of topics for discussion. At your own leisure, you go to the site and write a response. Your classmates also write responses. You comment on their responses, they comment on yours, and you have a real back-and-forth dialog.” (Mariani, 2001). Discussion boards also allow students to seek aid. When one student had trouble getting her computer programs to compile for a class in data structures, she turned to her school’s discussion board and to e-mail. “I posted to a new discussion group, and people responded, saying they were having the same problems.” Suggestions were offered in this venue, and some classmates followed up with e-mail messages. (Mariani, 2001). Studies have shown that there are significant relationships between classroom community and perceived cognitive learning. (Rovai, 2002). The formats utilized in distance learning have the potential to support that sense of community.
Social presence, conceptualized from the theory of knowledge as socially-constructed, refers to the degree of interpersonal awareness found in an online environment. Computer-mediated communication possesses limited social presence and is therefore perceived as an impersonal medium because it is unable to provide ‘social context cues.’ By connecting with others in new social situations we create a social presence or degree of interpersonal contact. The challenge in online learning environments is facilitating this degree of interpersonal contact with the instructor and other participants. (Aragon, 2003). Perhaps the most compelling argument for the necessity of social presence is its perception as a spark that transforms alpha-numeric characters on the computer screen into a real person. An environment lacking in social presence can feel impersonal to the participants, resulting in a reduced amount of interaction. In a face-to-face classroom, lack of participation can be attributed to diverse factors, including shyness, apathy, personality or cultural style. An online course that is at once experiential and reflective presents a difficult learning environment for students who are accustomed to the myriad non-verbal cues and group dynamics of a traditional classroom environment. The virtual classroom does not allow for an easy resolution of issues with communications. (Davis & Ralph, 2001). And though it may seem to be counterintuitive, there is a case to be made for a ‘lean’ communications medium: it is useful when breaking bad news to people, for example, or as a means of hiding nervousness through impersonal but professional e-mail messages. Participants are forced to slow down by the very nature of the media—especially asynchronous CMC—which enables them to take the time to compose messages more thoughtfully. (Thurlow, Lengel, & Tomic, 2004).
Research by Mike Davis and Sue Ralph on the levels of participation in an online course indicated that while there was enthusiasm for CMC among the learners and instructors, the environment was difficult to manage and participation levels were disappointing. A subsequent course the next semester with many of the same students was more successful. In that course, the increased activity level was attributed to a more structured environment and task, the necessity of meeting a course deadline, and an increased confidence in the use of the technology. (Davis & Ralph, 2001). Student participation is highly dependent upon a number of factors. There are a different ways to measure engagement in cyberspace, from hits on the server to the number of words written. In the study by Davis & Ralph, comments made during the evaluation phase of the course indicated that students who in face-to-face environments would be quiet observers became active participants and intense followers of the arguments and unfolding debates in the online course. One woman admitted that she found it difficult to speak out in a group, but during the course she made the most contributions, most hits on the server, and wrote more words than anyone else. In contrast, a man working as a television presenter who is generally a very confident speaker stated unequivocally that he preferred the face-to-face mode of communicating, because it was there that he felt he would be in control of his messages and how they would be received. (Davis & Ralph, 2001).
Paradoxically, few qualitative research studies on student satisfaction with CMC distance education have been performed (Hara & Kling, 1999). That in itself renders it difficult to fully evaluate the effectiveness of distance education: there may be anecdotal knowledge regarding individual experiences with distance education and learning, but not definitive data. This reflects the difficulty associated with fully implementing new modes of learning: how can the experience be refined or improved without answers to the at-present unasked questions?
No consensus between economists, sociologists, career-guidance professionals, or other labor market observers has been reached concerning the relevant and appropriate criteria that should be used for defining careers and career changes; as a result, there are no reliable statistics or estimates on the number of times people change careers in the course of their lives. (U.S. Department of Labor, Bureau of Labor Statistics, 2005). Even so, the conventional wisdom suggests that the workforce of today requires that workers must adapt to rapidly evolving demands for new knowledge, skills, and competencies, (many of which were not anticipated during their formal education), and therefore must develop competent information technology skills, both as an end goal and as a means for other learning. (Kirby et al., 2002). As aging baby-boomers retire, the effects on the overall economy and on certain occupations and industries will be substantial, creating a need for younger workers to fill the vacated jobs, many of which require relatively high levels of skill. (Dohm, 2000). “Organizational success in the 21st Century will surely require an emphasis on lifelong learning. Throughout the world there is an increasing mismatch between the level of education being attained by the majority of the population and the needs of employers.” (Neiderman & Rollier, 2000, p. 57).
The intersection of lifelong learning and distance education provides opportunities for individuals to learn for the pleasure of learning, and not only for reasons of economy. Self-directed learning may be guided by attributes such as initiative, resourcefulness, and persistence—qualities valued by organizations that rely upon innovation and a vibrant workforce. Distance- and e-learning have the capacity to influence worker productivity and performance, attributes that directly affect the economic growth of business and industry. Skills and expertise needed for the future will require workers who are learning-oriented; online learning opportunities will be a catalyst for sweeping changes in the structure of the workplace environment and the workforce. Well-designed distance learning should not be viewed as correspondence courses because the environment is the medium and not the outcome. Traditional course curricula, however, are not easily transferred to a distance learning platform. The goals and the objectives of the course should remain constant, but the delivery must be suited to the medium. (Derrick, 2003). The pressure on instructors is quite significantand at the same time, students must realize that the workload of online courses will be much more substantial than that of a traditional learning environment.
By choosing distance learning via computer-mediated communication, a middle-age student will have the opportunity to experience learning as a journey, in which the end result is secondary to the process. As learners develop an understanding of their capacities for learning—any learning—they are fundamentally changed with regard to their personal view of their capabilities and competence. The learning reinforces beliefs and supports successful behaviors for lifelong and sustained learning. (Derrick, 2003).
Handheld camcorders, digital cameras, cell phones, portable music devices (MP3 players) and PDAs (personal data assistants) are among the myriad electronic devices enjoyed by Americans in the early 21st century. Senior citizens have not been entirely left behind in this digital revolution: according to a survey of 22,610,000 householders aged 65 and older, 6,344,000 (28.1%) have access to a computer in the home; 5,329,000 (23.6%) use the Internet at home (U.S. Census Bureau, 2001). A related survey provides information on the purpose of Internet use by seniors: the killer app for most (87.1%) of those interviewed was e-mail; 61.7% access information on products or services; 32.1% purchase products or services; 29.3% play online games; 1.5% take an online course. Not surprisingly, older people who own computers and go online are also more likely to participate in adult education programs. The level of formal education and socioeconomic status of senior learners, as well as their gender (male users predominate), are also important factors. Many older adults, particularly those who live more than 50 miles from their families, were willing to try out electronic communication because they were not able to get together face to face as frequently as they would like, and they wanted to be involved in the lives of their children even at a distance. (Timmerman, 1998).
It stands to reason however that a large majority of older adults at this time are not early adopters of new technologies, and have not learned how to use computers. However, one may speculate that older adults will be willing to use them once their value has been demonstrated. A SeniorNet study (Adler, 1996) found that the use of high-tech products historically considered “cutting edge” was almost as high among these older Americans as among the general population. Among the respondents, 89 percent owned a microwave oven, 74 percent owned a VCR, and 62 percent subscribed to cable TV. The longer the product has been available, the more likely it is that older Americans will incorporate it into their lives. (Timmerman, 1998).
A variety of courses designed for senior learners, and information about lifelong learning, are available online, through organizations like SeniorNet, the AARP, PBS Campus, and local libraries. Good courses employ a non-threatening teaching methodology and self-paced instruction. Once older learners master the basics of computer use, they become empowered and are eager to use the technology. The virtual classroom has great potential to attract older computer users and meet their needs both for growth and for socialization; this is particularly true for those people who are homebound due to physical disabilities, who are caring for others at home and find it difficult to attend classes, or who want to participate in night-time activities but do not drive at night. (Timmerman, 1998).
Rapid technological change and societal needs have coalesced in recent years to allow lifelong learning to become both a necessity and a reality for millions of people. Simultaneously, the perception of distance learning by the general public has moved from a state of low status to one of acceptance, with increased confidence as its methods are adopted across education as a whole. Distance education has evolved from an essentially modernist form of education based first upon printed matter and postal service, followed by television or radio broadcasting and two-way radiotelephone feedback, into a post-modernist phenomenon using multimedia technologies and computer-mediated communication “with a focus on the student as consumer, on �flexibility, and on global reach.” (Rumble, 2001, p. 31). The possibility now exists for learners of all ages to engage in informal and serendipitous learning, driven by general interest and curiosity rather than just career incentives. (Flew, 2002). The era of computer-mediated communication as a force for change in distance and lifelong learning has just begun.
Aragon, S.R. (2003). Creating social presence in online environments. New Directions for Adult and Continuing Education, vol. 2003, no. 100, p. 57-68. Retrieved March 25, 2005, from EBSCO Academic Search Premier database.
Bird, C.M. (2004). Sinking in a C-M sea: a graduate student’s experience of learning through asynchronous computer-mediated communication. Reflective practice, 5(2), p. -263. Retrieved March 23, 2005, from EBSCO Academic Search Premier database.
Davis, M., & Ralph, S. (2001). Stalling the learning process: group dynamics in cyberspace. Studies in the Education of Adults, 33(2), p. 217-229. Retrieved March 22, 2005, from Wilson Select Plus database.
Derrick, M.G. (2003). Creating environments conducive for lifelong learning. New Directions in Adult Continuing Education, Winter 2003, no. 100, p. 5-18. Retrieved March 27, 2005, from Wilson Select Plus database.
Flew, T. (2002). Educational media in transition: broadcasting, digital media and lifelong learning in the knowledge economy. International Journal of Instructional Media, 29(1), p. 47-60. Retrieved March 27, 2005, from Wilson Select Plus database.
Kirby, J.R., Knapper, C.K., Maki, S.A., Egnatoff, W.J., van Melle, E. (2002). Computers and students’ conceptions of learning: the transition from post-secondary education to the workplace. Educational Technology & Society 5(2).
Mariani, M. (2001). Distance learning in post-secondary education. Occupational Outlook Quarterly, Summer 2001, p. 2-10. Retrieved March 23, 2005, from EBSCO Academic Search Premier database.
Muirhead, B. (2000). Interactivity in a graduate distance education school. Educational Technology & Society 3(1).
Niederman, F., & Rollier, B. (2000). “How are you going to keep them in the classroom after they’ve seen MTV? Online education in a virtual world.” In Our virtual world: the transformation of work, play and life via technology. (p. 56-73). Hershey, PA : Idea Group Publishing.
Rumble, G. (2001). Re-inventing distance education, 1971-2001. International Journal of Lifelong Education, vol. 20, no1/2, p. 31-43. Retrieved March 27, 2005, from EBSCO Academic Search Premier database.
Sharples, M., Corlett, D., & Westmancott, O. (2002). The design and implementation of a mobile learning resource. Personal and Ubiquitous Computing, 2002, 6, 220-234.
Thurlow, C., Lengel, L., & Tomic, A. (2004). Computer mediated communication: social interaction and the internet. London : Sage Publications.
Timmerman, S. (1998). The role of information technology in older adult learning. New Directions for Adult and Continuing Education, 7(7), p. 61-71. Retrieved March 27, 2005, from Wilson Select Plus database.
Wells, R. (1992). Computer-mediated communication for distance education: an international review of design, teaching, and institutional issues. University Park, PA : Pennsylvania State University (Research Monographs, no. 6).
Last updated 2007-06-11. ALR. Contact me. | http://www.isherartifacts.com/Amy/ap538tp.html |
TECHNICAL FIELD OF THE INVENTION
BACKGROUND OF THE INVENTION
SUMMARY OF THE INVENTION
DESCRIPTION OF PREFERRED EMBODIMENTS
The present invention relates to electronic games such as electronic sweepstakes games and electronic wagering games. More particularly, the invention relates to a system in such electronic games for awarding prizes having some potential future value in addition to the regular prizes having some current value. The invention encompasses both methods for awarding future value prizes in a game, and apparatus and program products for implementing these methods.
Various types of electronically implemented wagering games have become popular over the past ten to twenty years. These games include modern reel-type games or “slot machines,” video poker machines, electronic lottery games, and electronic bingo games. Electronic sweepstakes games have also proven popular. All of these games award prizes to the various players according to some prize distribution for the respective game. The prize distribution defines a number of different prize levels at different prize values along with a respective probability of obtaining the respective prize on a given play in the game.
Many modern reel-type games having either mechanical or video reel displays, and video poker machines employ result identifying algorithm that is designed to identify results at the frequencies defined by the result distribution for the game. In these games, each time a play is entered at the gaming machine the result identifying algorithm identifies the result from the play from the various results available in the game, and the identified result is immediately awarded to the player.
Electronically implemented lottery systems provide another way to assign results in various types of game presentations. In an electronic lottery gaming system, such as the system described in U.S. Pat. No. 6,733,385, the results are identified through a set of electronic lottery game play records, and may be communicated to the player in any number of different game presentations employed at a given electronic lottery player terminal. A “game presentation” as used in this disclosure refers to the symbols and graphic representations used to communicate a result to a player. The set of electronic lottery game play records is analogous to a set of printed paper lottery game tickets, and defines some prize distribution for the lottery game. Each time a game play request is entered at an electronic lottery player station, one of the electronic lottery game play records is assigned for the play and the result for the play is read from the assigned game play record.
The electronic sweepstakes game described in U.S. patent application Ser. No. 11/365,058 also identifies a result for each play in the game by selecting one or more records from a predefined record set which is produced to provide some desired prize distribution in the sweepstakes game. A difference between lottery games and this electronic sweepstakes game is that the sweepstakes game is not a wagering game and does not require a player to place a wager in return for a play in the game. Rather, an entry in the sweepstakes game corresponding to a record in the sweepstakes game record set is given to a player typically in association with the player's purchase of some good or service. For example, a purchaser may be given one sweepstakes entry in the electronic sweepstakes game described in U.S. patent application No. 11/365,058 in response to their purchase of a unit of Internet access time. The results for the various sweepstakes entries are revealed to the purchaser/player through a reveal station which may portray the results according to any one of a number of different game presentations.
In electronic bingo games such as that disclosed in U.S. patent application publication No. 2004-0152499-A1 each play in the bingo gaming system is entered at a player terminal. This bingo gaming system quickly groups the various bingo game entries (that is, game play requests) and conducts a bingo game for each group to identify a result in the game for each player. The results in the game for each player are returned to the respective player terminal and may be displayed at the player terminal by a suitable game presentation, which may imitate play in a card game, a traditional reel-type game, or some other game. In the case of a bingo game, the desired prize distribution may be produced by mapping one or more bingo patterns to each prize level so that the overall probability of achieving any bingo pattern mapped to a give prize level is approximately equal to the desired probability of awarding the prize at that prize level. This mapping of bingo patterns to produce a desired prize distribution is shown for example in U.S. patent application publication No. 2004-0048647-A1.
One persistent issue with electronically implemented games such as electronic lotteries, electronic bingo games, and even modern slot machines is that players may soon tire of a given game presentation and switch to some other type of game. Game providers and operators must continuously introduce new games and new game presentations in order to capture and attempt to hold the players' interest. The cost of producing new games and game presentations greatly increases the cost of providing the game system.
The present invention provides a sense of anticipation in an electronic game to help capture and hold the players' interest. This sense of anticipation is created according to the present invention by including “future results” in the prize distribution for a game. These future results are each associated with a play in another game to be conducted at some point in the future and are assigned to players in the same fashion as regular, current results in the game. The invention also encompasses apparatus for awarding a future result in an electronic game and conducting a future game to identify or reveal the value that is ultimately associated with the future result.
In one method embodying the principles of the invention, a number of game play requests in a current game are received from one or more player stations. For some of the game play requests in the current game (sometimes referred to as “first game play requests”), the invention includes displaying a result in the current game at the respective player station from which the respective game play request was received. However, for some game play requests (sometimes referred to as “second game play requests”), the invention includes awarding a respective future result which may or may not have any present value, but is in any case associated with a play in a game to be conducted at some designated time in the future and thus represents at least some potential value. These future results are communicated to a respective receiving player at the player's respective player station to advise the receiving player that they have won a chance to participate in a future game.
The future game within the scope of the present invention may be an entirely separate game in which results are determined entirely independently of the current game. Alternatively, the future game may be dependent upon the current game is some fashion. For example, one preferred arrangement may define a certain future game value for each future result. In this arrangement, the value of the future result is set in the current game but is revealed to the receiving player only in the course of the future game conducted after the future result is awarded to the player. Thus, the future game may involve revealing results that have already been assigned to the player via the future result, and may not involve any separate result determination. Alternatively, the results for the various participants in a future game may be awarded separately as part of the future game.
A future game according to the invention may have a relatively high winning prize and thus the future result according to the invention may have a high potential value. The high potential value of the future results may attract players to the current games offering future prizes. Furthermore, because each future result may only be associated with a potential prize value in a separate game, and because the payout in the separate game may be controlled separately from the current game, a relatively large number of future results may be awarded according to the invention. The frequency with which future results may be rewarded may also be very attractive to players in the current game and encourage players to participate in the current game. These players in the current game essentially compete for the future results to have a chance at the high value prize that may be available in the future game. Also, depending upon how the future game is conducted, players may be attracted to the current game by the shear spectacle of the periodic, high-potential value future game. For example, some forms of the present invention may conduct a competition between the players obtaining a future result in the current game. One of the participants may win a single high-value prize while the other contestants may win relatively low-level consolation prizes.
The current game may be, for example, an electronic lottery game, an electronic sweepstakes game, a bingo game, or a game such as a mechanical or video reel-type game or video poker game in which results are identified employing a result identifying algorithm. The future result may have not current value in some forms of the invention, however, other forms of the invention may provide a current value as an alternative value to the potential value represented by the future result. For example, a future result may have a current value of $500, while the highest prize available in the separate, future game may be considerably higher, say $10,000. Where the ultimate value of a future result is not determined in the current game, the separate game conducted for the future result receiving players to identify the results in the future game may be any type of game. The future game may be a drawing, a reel-type game, a lottery game, a bingo game, a card game, or multiple instances of these types of games or a series made up a combination of any of these types of games. In particular, the future game may be a tournament of a series of games, where the player with the highest score wins the future game and the typically high-value prize paid in the future game. In either a competitive or non-competitive format for the future game, the present invention may include using a suitable display device to publicly display aspects of the future game as it is being conducted in order to build excitement for the future game and thus encourage play in the current game.
One preferred apparatus according to the present invention includes one or more player stations, each including a respective player input device and a respective result communication device. The apparatus further includes a result awarding arrangement for receiving a number of game play requests which have been entered in a current game through the one or more player stations. The result awarding arrangement awards a current result for each of one or more of the received game play requests, and also awards a future result as described above for each of one or more of the received game play requests. The apparatus may further include a future game arrangement for conducting the future game in a competitive or non-competitive format to identify future game results or to simply reveal future game results defined in the current game. The apparatus may include one or more separate future game player stations, or may include one or more player stations used in the current game. A public display device as mentioned above may be associated with the future game arrangement for displaying aspects of the future game whether the future game is a competition on non-competitive game.
Because the invention may be implemented using one or more general processing devices, the invention further encompasses a program product stored on one or more computer readable devices. One preferred program product includes result program code and player station program code. The result program code is executable for awarding either a current result or a future result for each of a number of game play requests in the current game as described above. The result program code is also executable for causing each respective current result and future result to be communicated to a respective player station. The player station program code is executable for generating a respective game play request for a current game in response to a player input at a player station. The player station program code also facilitates the receipt of each respective current result and future result communicated to the respective player station, and causes the respective player station to provide a respective result presentation for each received result. A program product according to the present invention may also include future game program code which is executable for identifying a result in the future game to determine a value of a particular future result, or for revealing a result in the future game to reveal a result that has been defined in the current game for the particular future result.
These and other advantages and features of the invention will be apparent from the following description of the preferred embodiments, considered along with the accompanying drawings.
FIGS. 1 and 2
FIGS. 3 and 4
In the following description of preferred embodiments, will be used to describe the present invention generally, together with certain variations within the scope of the invention. will be used to describe a particular result awarding arrangement which, although not required according to the present invention, is particularly suited for awarding both current results and future results within the scope of the present invention.
FIG. 1
101
102
102
104
105
104
107
107
108
110
As shown in , one preferred process according to the present invention includes receiving a particular game play request as indicated at process block . The process then includes awarding a result for the game play request as indicated at process block . The result awarded as indicated at process block will comprise either a current result in the current game or a future result. The current result may be a winning result associated with some prize or a losing result which is not associated with any prize, while each future result may or may not be associated with any current value, but is associated with a play in a future game to be conducted at some designated time in the future. If the awarded result is not a future result as indicated by a negative result at decision block , the current result is displayed for the receiving player as indicated a process block . If the awarded result comprises a future result as indicated by a positive outcome at decision block , the present invention includes displaying or otherwise communicating the future result to the receiving player as indicated at process block . The receiving player may also be enrolled in a future game at this point in the process. Once the future result has been displaying or otherwise communicated to the player as indicated at process block , some forms of the invention may include a step of providing the future result receiving player with a current value option as indicated at process block . In this current value option, the player may trade their play in the future game for some current value. Ultimately, the invention may include conducting the future game as indicated at process block to identify or reveal a value for the future result that was awarded.
101
102
105
107
108
110
102
FIG. 1
The process steps shown at process blocks and are performed for each game play request received in the particular gaming system. The step indicated at process block or the step indicated at process block will be performed for each received game play request depending upon whether the awarded result is a current result or a future result. The step of providing a current value option as shown at process block may or may not be performed for each awarded future result. Also, the step of conducting a future game as shown at process block in may or may not be performed for each awarded future result depending upon the particular implementation of the future game. Some forms of the invention include a non-competitive future game in which a single player plays the future game. In these cases, a respective future game is eventually conducted for each awarded future result. However, one preferred form of the invention conducts the future game as a competition between two of more recipients of a future result at process block . In this implementation, a future game may be conducted, for example, once for every set number of future results that are awarded in the current game. Alternatively, competition-type future games may be conducted at certain times regardless of the number of future results that have been awarded in the current game.
101
200
201
201
202
203
202
101
201
202
202
206
205
FIG. 1
FIG. 2
FIG. 2
FIG. 1
FIG. 2
FIG. 2
The step of receiving a game play request as indicated at process block in refers to receiving a game play request at the component of a game system that is responsible for awarding a respective result in the current game. In the example system shown in the result awarding arrangement is responsible for awarding results in the current game. This particular result awarding arrangement is shown in as a separate component in communication with player stations from which the game play requests are received. Communications may be through a network switch or other suitable device. As will be discussed further below, some alternative forms of the invention may include a separate result awarding arrangement at each respective player station for awarding a result for a respective game play request entered through that player station. The nature of the result awarding component as either a remote network component or a local component at the particular player station will affect the nature of the game play request that is received as indicated at process block in . It in the networked result awarding arrangement shown in , a game play request may comprise one or more data packets that identify the communication as a game play request and identify the player station which transmitted game play request. Additional information such as a wager level or identifier for a particular current game may also be included in the network communication representing a game play request for a current game. However, in a game system in which a result awarding arrangement is included with each respective player station, the game play request may simply be a signal received from a suitable player input device for the respective player station. In the example system shown in , each player station includes a player interface having an input device for making inputs to initiate a game play request, and a display device for displaying or otherwise communicating results to a player at the player station.
102
201
201
102
201
102
201
FIG. 1
FIG. 2
FIG. 2
FIG. 1
FIG. 2
FIG. 2
FIG. 3
FIG. 4
The result awarding step shown in process block in may be performed by any suitable device or collection of devices for identifying or producing a result in the current game. For example, a result awarding device such as result awarding arrangement in may award results as in electronic lottery or electronic sweepstakes systems in which each result in the game is associated with a particular electronic data record included in a set of such records. In this example the step of awarding a particular result involves selecting one of these electronic data records in some random fashion from the set of data records. Alternatively, a result awarding arrangement such as device in may conduct a bingo game for a game play request or collection of game play requests and then award each game play request a result according to a bingo pattern produced for the particular game play request as disclosed in U.S. patent publication No. 2004-0152499-A1 or some other electronic bingo gaming system. In yet other forms of the invention, the element for awarding results as indicated that process block and may comprise a device for executing a result identifying algorithm which is designed to return results according to some desired prize distribution. Thus, result awarding arrangement in may include such an algorithm executing device in some forms of the invention. A further variation on the step of awarding results as shown in process block in will be described below in connection with the particular result awarding arrangement shown in , which applies a result level structure shown in . However, it should be appreciated that the present invention is not limited to any particular arrangement in an electronic game system for awarding results in the current game, provided that the arrangement is operable to award future result in addition to current results.
102
201
102
FIG. 1
FIG. 2
FIG. 1
According to the present invention, the result awarded as indicated at process block in by the result awarding arrangement such as arrangement shown in will comprise either a current result or a future result. The invention encompasses a wide variety of future results as defined in this disclosure and used in the accompanying claims. Some future results may comprise merely a code or identifier that represents an opportunity for a play in the future game, and may thus not be associated with any current value but merely a potential value of any result available in the future game. In this case, the opportunity for the play in the future game represents merely a chance for some result in the future game. However, other forms of the invention may associate some current value with a future result. In one current value alternative for a future result, the future result awarded at process block in is associated with a current value that represents an alternative to a chance in the future game. In this case, a player receiving the future result may be given the opportunity to trade the chance in the future game for the designated current value as will be described further below. In another form of the invention, each future result is associated with some value that will be awarded to the player for their play in the future game. In this case the future result defines the result for the player's play in the future game, although the player will generally not be advised of the future game result until they play the future game.
104
202
201
102
FIG. 1
FIG. 2
FIG. 1
The decision indicated at decision block in may be made in any suitable fashion according to the present invention. In some perform preferred forms of invention, the devices responsible for displaying results to the player, such as player station in , are capable of distinguishing the various results awarded by result awarding component as a current result or a future results. For example, data representing a result awarded as indicated at process block in may include a prize value which may identify the result as a current result, or may include a code or index value from which result may be identified as a current result or future result by reference to a data table which correlates the codes/indexes to various results available in the current game.
105
205
202
205
FIG. 1
FIG. 2
The process of displaying a current result as indicated at process block in is preferably performed in the example system shown in using the display associated with the player station from which the respective game play request was received. The present invention is not limited to any particular game presentation or display arrangement for showing current results. A game presentation used in connection with the present invention to show a current result may show results as a result in a reel-type game, a card game, a bingo game, a simulated competition, or in any other graphic fashion that may be used to communicate the current result. In various forms of the invention, display may comprise a mechanical reel display or may include one or more video display devices that are operated to communicate a particular current result.
107
200
205
205
205
202
102
205
107
FIG. 2
FIG. 2
FIG. 1
FIG. 2
The manner in which a future result may be displayed to a receiving player as indicated at process block may also vary widely within the scope of the present intention. For example, in the game system shown in , the same display used to display a current result to the receiving player may be used to display a future result. However, the graphic representation of the future result will include some particular form that will distinguish it from a current result. Where the display simulates or produces a reel-type display, for example, a future result may be displayed to a player as a particular reel symbol combination or as a special scatter symbol appearing on the reel-type display. In some forms of the invention, the display device or other device used to communicate a future result to the receiving player may present the future result in an entirely different fashion than a current result presented at the same display device. For example, where display device is a video display and a current result is shown as a result in a reel-type games with video simulated reels, the video display may be controlled to produce some special non-reel graphic in order to communicate the award of the future result to the player. Also, the player station such as player stations shown in may include separate audible and visual alarms which announce to the player and adjacent players that a future result has been awarded. In other forms of the invention, the display arrangement used to display a current result to the player may not be used to display a future result to the player. For example, a future result awarded as indicated a process block in may alert an attendant, and the attendant may be instructed to physically deliver to the receiving player a voucher or other document evidencing that the player has been awarded a future result. The voucher or other document or communication to the player preferably notifies the player that they have been enrolled in a future game and gives the player instructions in suitable form to let the player know how to participate in the future game. Alternatively, such instructions for participating in a future game may be presented to the future result receiving player through player station display device . In any event, the display of the future result as indicated at process block in will preferably not communicate to the player any value for the future result where a value for the future result is identified at the time the future result is awarded.
108
202
205
FIG. 1
FIG. 2
Where the current value option is provided to a player as indicated at process block in , the option may be provided at the time the future result is displayed to the player or at some later time. For example, concurrently or shortly after displaying the future result to the player, the player station in may be controlled to offer the receiving player the option of trading the future result for a current value or keeping the future result so that the player is enrolled in the future game. This offer may be communicated to the player through a suitable video or text display device included in player station display . Alternatively, this option of trading the future result and associated play in the future game for a current value may be provided to each future result receiving player in connection with conducting the future game. In one implementation of the invention, the various players who have been awarded future results may collect together at a designated time for the conduct of the future game, and each player may be offered (manually or otherwise) the alternative of keeping their future result and associated play in the future game or trading that play for a lower but guaranteed prize value.
110
200
208
209
201
208
209
208
FIG. 1
FIG. 2
FIG. 2
FIG. 2
The future game may be conducted as indicated at process block in in any suitable fashion. The particular game system shown in includes a future game player interface through which a player may participate in a future game and a future game controller for identifying a result in the future game. Such a future game controller may comprise a device for identifying a result in a future game as described above in connection result awarding arrangement . However, the invention is not limited to electronic future games. Rather, a future game within the scope of the invention may comprise a live game such as a card game, drawing, or wheel spin, and thus a game system according to the invention may not include any networked future game player interface or future game controller as shown in . In yet other forms of the invention, players participate in future games through the same player stations or types of player stations through which the current game was played. In this case, a game system would require no separate future game player interface such as that shown at in . The apparatus that may be included in a game system to accommodate the particular future game or games may vary greatly from one implementation of the invention to the next depending upon the type of future game being conducted.
200
210
210
210
210
FIG. 2
In some forms of the invention, a future game may be conducted as a noncompetitive game for a given player who has received a future result. An example of a noncompetitive game may comprise a simple wheel spin in a roulette-type game, or a single play in a reel-type game or card game. Alternatively, a noncompetitive future game may include a number of individual plays in some game and the result for the future game is determined by some score for the player after they have completed their series of plays. Other preferred forms of the invention may collect two or more future result receiving players into a group and conduct a competitive game or a series of competitive games between the players. For example, the future game may comprise a reel-type game tournament, or card game tournament, for a random drawing between competing players. Whether the future game is a competitive game or noncompetitive game, the invention preferably includes some arrangement to publicly display aspects of the future game to increase excitement in the gaming facility and to add entertainment value in the game system. In the example system shown in , a future game display which may be controlled by a separate computer system or other processing system not shown in the figure. Future game display is included for displaying aspects of a future game as it is being conducted. For example, future game display may show live video of a competitive or non-competitive future game. In a competitive game like a reel-type game tournament, future game display may show the tournament scores of the various players in the future game as the tournament progresses. These tournament scores may be produced be a tournament controller (not shown) associated with the player stations or other player interfaces through which the players participate in the tournament. This display of scores in a competitive game helps build excitement and interest in the current game and future game, and enhances entertainment value.
200
201
201
202
205
206
201
201
209
208
202
209
FIG. 2
FIG. 2
FIG. 2
FIG. 2
FIG. 2
FIG. 2
It will be appreciated that the example game system shown in may be implemented in numerous different types of hardware arrangements. As mentioned above, some forms of the invention may implement a separate result awarding at each respective player station to performing the functions of result awarding arrangement for the particular player station. This, result awarding arrangement at each respective player station is particular suited to current games in which a result identifying algorithm is used to identify the result for the game play request in the current game. Regardless of where and how the result awarding arrangement is implemented in a given system, each player station such as player stations in will preferably include one or more special purpose or general purpose processing devices to control the operation of the respective player station and associated components such as display and input device shown in . These processing devices are omitted from to avoid obscuring the invention in unnecessary detail. Similarly, the various functions performed by result awarding arrangement to award results in current games may be performed by one or more special or general purpose processing devices. In a typical networked game arrangement as shown in , result awarding arrangement may be implemented in a separate computer system. Any future game controller included in the system may be implemented in the same computer system or an additional computer system. The future game player interface shown in may be implemented as specialized player stations similar to player stations , but which cooperate with future game controller to identify results in the future game.
202
105
107
FIG. 2
FIG. 1
Where the player stations in are implemented using general purpose processing devices, the devices will operate under the control of suitable program code. In particular, the present invention includes player station program code that is executed at a respective player stations for generating a respective game play request for a current game in response to a player input at the player station. The player station program code will also control the receipt of each respective current result and future result communicated to the respective player station, and cause the respective player station to provide a respective result presentation for each received result either in accordance with process block in for a current result, or in accordance with process block for a future result.
201
209
FIG. 2
FIG. 2
Also, where the result awarding arrangement in is implemented using one or more general purpose processing devices, the result program code will be executed by the devices to control their operation. This result program code will cause either a current result or a future result to be awarded for each game play request in a current game, and will also cause each respective current result and future result to be communicated to a respective player station associated with the game play request for which the respective result was awarded. Similarly, future game program code may be executable by a suitable processing device, such as the device implementing future game controller in , for identifying a result in the future game to determine a value of the future result.
209
208
202
208
209
FIG. 2
It should be noted that in the variation of the invention in which the value of the future result in the future game is known, the invention requires no separate arrangement, such as future game controller , for identifying the result for the future game. Rather, the invention will include some future game player interface such as interface , or potentially a player station , which simply reveals the value for the player's future result, perhaps under the control of future game program code. For example, a future game player interface such as interface in may include a large prize wheel with various prizes spaced apart about its periphery, and the player may spin the wheel to display the value associated with the future result. A suitable control arrangement such as a stepper motor controlled through a suitable controller may cause the wheel to land on the prize associated with the future result. This same sort of future game player interface may be used where the ultimate value of the future result is identified by a device such as future game controller .
201
201
305
306
307
201
302
FIGS. 3 and 4
FIG. 3
FIG. 4
FIG. 3
FIG. 3
FIG. 4
A particular result awarding arrangement may be described with reference to . Result awarding arrangement shown in includes a level assignment component , a result control component , and a result level storage device . These components of result awarding arrangement cooperate to award results in a game according to the result level structure shown in . Management component is included in the system shown in to enable a system operator to add future results and other results to a current game without modifying the underlying prize distribution for the current game, and to remove those results as desired. Future results may be added or removed from the prize distribution for the current game at any time by employing the system shown in and result level structure as shown in .
201
307
302
FIG. 3
FIG. 4
Result awarding arrangement shown in may include a suitable general purpose or special purpose processing device, or collection of processing devices, programmed or otherwise configured to perform the various functions described below. Result level storage device may comprise any suitable data storage device for storing a result level structure such as that shown in . Management component may comprise a suitable computer workstation having a display, keyboard, and pointer combination or any other suitable arrangement providing a user interface.
FIG. 4
FIG. 3
FIG. 4
FIG. 1
400
201
401
402
403
404
405
406
409
400
409
400
401
402
409
403
403
403
404
409
405
409
406
409
404
405
As shown in , a result level structure that may be used in connection with the result awarding arrangement shown in may be represented as a data table including two columns, column and column . The data included in the remaining columns shown in , namely, columns , , , and contain information associated with the various result levels of result level structure . For each result level , result level structure includes a result level identifier under column and a result value under column . At each result level , column shows a value for the number of results per given number of plays in the game under the label “# of results.” As indicated at the bottom of column , this particular example table assumes a total of 100,000 plays in the game. Thus, each value in column represents that number of results for each 100,000 plays in the game. The value in column at each result level represents the total value of the results at that particular result level. This value is the product of the result value and the number of results at that particular result level. The value in column at each result level represents the payout percentage for the given result level, that is, the percentage of the total value at that result level as compared to the total payout in the game for the given number of plays. Finally, the value in column for each result level represents the probability of achieving that particular result level in the given number of plays represented as a percentage. It is assumed in that each play in the game is made with a wager of one credit. Thus for 100,000 plays in the game, the game would produce a total of 100,000 credits. The total value paid out is 90,000 as shown at the bottom of column which represents a overall payout percentage of 90 percent as indicated the bottom of column .
409
400
409
0
10
401
402
400
400
11
15
401
402
402
15
102
15
FIG. 4
FIG. 4
FIG. 4
In order to allow a game operator to add results in a game, including future results and current results, two different types of result levels are included with the result levels of result level structure . The result levels associated with result identifiers through (in column ) may be referred to as first result levels. These first result levels each include an unalterable result value in column of result level structure . In addition to the first result levels, result level structure includes a number of second result levels identified by result identifiers through in column . Each second result level includes a user definable result value field under column rather than a unalterable result value. All of the user definable result value fields which are shown in may be changed from the value shown in the figure to a user defined value. Although various values may be added to the data structure shown in , the present invention contemplates adding future results, or some value representing a future result to selectively add future results in the game. In the example table shown in , the value under column for the last row, result level ID , is shown as having been set to the value “FR” indicating that the result is a future result. Setting the value under column for result level ID effectively adds five future results to the game defined by the result level structure and associated hit probabilities.
FIG. 3
FIG. 2
FIG. 4
FIG. 4
305
202
305
400
306
400
307
400
305
409
15
400
306
400
15
In the operation of the system shown in , level assignment component receives a game play request in the current game as entered at a player station such as player station shown in . In response to the game play request, assignment component selects a result level from the total universe of available result levels included in result level structure shown in . This selection may be made from an electronic lottery game set, an electronic sweepstakes game set, a bingo game, a result selecting algorithm, or in any other fashion. In any event, this selection of result level effectively defines the result for the game play request because each result level in the game is correlated to a given result, either an unalterable result value or a user definable result value. The selected result level is communicated to result control component , which uses the selected result level to query a result level structure such as structure stored in result level storage device . The purpose of this query is to locate the particular result value which is correlated to the result level in the result level structure . For purposes of example, assume that the result level identified by level assignment component in response to a game play request is the result level correlating to result level identifier . In this case, the result located by querying the result level structure identifies the result as a future result, and this future result is ultimately communicated back to the requesting player station under the control of result control component . In the example result level structure shown in , any other result level other than that identified by result level identifier represents a current result according to the present invention and does not entitle the receiving player to a play in a future game.
201
302
307
FIG. 3
FIG. 3
In the result awarding arrangement shown in employing user definable result levels as described above, future results according to the invention may be added at any time, or previously added future results may be removed at any time. This is accomplished in the illustrated system through management component in . This component has access to result level storage device for the purpose of causing any of the stored user alterable result values to be modified. One preferred use of this user alterable result value arrangement is to allow the game operator offer future results as special promotional prizes periodically in the system without modifying the prize distribution for underlying game. A relatively high value may be assigned and advertised for the winner in the future game to generate excitement and anticipation in the game system.
As used herein, whether in the above description or the following claims, the terms “comprising,” “including,” “carrying,” “having,” “containing,” “involving,” and the like are to be understood to be open-ended, that is, to mean including but not limited to. Only the transitional phrases “consisting of” and “consisting essentially of,” respectively, shall be closed or semi-closed transitional phrases, as set forth, with respect to claims, in the United States Patent Office Manual of Patent Examining Procedures (Eighth Edition, August 2001 as revised May 2004), Section 2111.03.
Any use of ordinal terms such as “first,” “second,” “third,” etc., in the claims to modify a claim element does not by itself connote any priority, precedence, or order of one claim element over another, or the temporal order in which acts of a method are performed. Rather, unless specifically stated otherwise, such ordinal terms are used merely as labels to distinguish one claim element having a certain name from another element having a same name (but for use of the ordinal term).
The above described preferred embodiments are intended to illustrate the principles of the invention, but not to limit the scope of the invention. Various other embodiments and modifications to these preferred embodiments may be made by those skilled in the art without departing from the scope of the following claims. In particular, the various processing steps described above may be performed by any suitable processing device or devices included in the system.
BRIEF DESCRIPTION OF THE DRAWINGS
FIG. 1
is a flow diagram illustrating one preferred method according to the present invention.
FIG. 2
is a diagrammatic representation of an apparatus according to one preferred form of the invention
FIG. 3
is a diagrammatic representation of one preferred result awarding arrangement that may be employed in implementations of the present invention.
FIG. 4
FIG. 3
is a representation of a data structure that may be used in connection with the apparatus shown in to selectively add and remove future results from a game. | |
Living with life-limiting illness significantly impacts quality of life. A growing body of evidence suggests that arts engagement facilitated by artists promotes well-being. However, no synthesis of the literature exists to describe arts engagement delivered by artists with individuals receiving palliative care. To systematically review and synthesize evidence to identify outcomes and key knowledge gaps to inform future research and practice. A systematic integrative literature review was conducted using a pre-defined search strategy and reported using PRISMA guidelines. Analysis was conducted iteratively and synthesis achieved using constant comparison to generate themes. PubMed/MEDLINE, CINAHL, PsycINFO, Scopus, Web of Science, and Embase were searched for studies published between database inception and August 2020. Search terms included variations on arts/artists; patients/service users; and palliative or end-of-life care. Eligibility criteria was applied and study quality assessed. Seven reviewed studies explored literary, performing, and visual arts engagement in hospitals, hospice and community settings in England, the United States, France, and Canada. Study designs, interventions and findings were discussed. Themes identified across studies associated arts engagement with (1) a sense of well-being, (2) a newly discovered, or re-framed, sense of self, (3) connection with others, and (4) challenges associated with practice. Recommendations for future research were offered in order to maximize benefits, minimize risks and address complexity of artists' engagement in palliative care including: (1) consistency in methods and reporting; (2) inclusion of wider perspectives; and (3) key considerations for adapting the arts by health condition and art form. | https://pure.ulster.ac.uk/en/publications/arts-engagement-facilitated-by-artists-with-individuals-with-life |
Apply for a position as an Inventory & Logistics Analyst
The company is looking for their next team member in the Finance department for the role of Inventory & Logistics Analyst.
Reporting to the Director, Finance, this role is responsible for inventory data management, analyzing performance, identifying problems, and developing recommendations that support logistics management.
Summary of Responsibilities
Oversee the OTC (Order to Cash) process for Buy/Sell inventory with leading meetings to provide updates about the market and shipment status.
Update and maintain various reports such as forecasting documents, issued purchase orders, inventory and open orders reports, etc…
Manage warehouse transfers as needed
Provide support to the Ontario Sales team to mitigate any out of stocks within system
Transact with the ERP system to receive/adjust inventory as needed.
Assist with month end inventory reconciliations for various warehouses
Assist with on/off boarding suppliers
Liaise between Brand/Sales teams and suppliers
Requirements
Post-secondary education ideally in business or supply chain
Proficiency in Microsoft Excel – Advanced Excel experience; lookup, pivot tables, etc.
Two+ years logistics or inventory analyst experience an asset, but not required
Strong analytic and quantitative skills, with business acumen
Strong knowledge of logistics and inventory management – procurement to cash process
Knowledge in inventory and logistics planning concepts
Ambitious, with a drive to continuously improve processes with thorough recommendations
Experience in the Ontario Wine / Beverage Alcohol industry an asset, but not required
Communicate results and findings in a clear and concise manner, collaboratively with other departments.
We thank all applicants for applying, however only those individuals selected for an interview will be contacted.
Diamond Estates and its divisions is an equal opportunity employer. We welcome and encourage applications from people with differing abilities. Accommodations are available on request for candidates taking part in all aspects of the selection process.
The company has a full vaccination policy against COVID-19 to ensure the health and safety of employees, guests and customers. | https://www.lakeviewwineco.com/site/blog/2022/06/22/inventory-logistics-analyst |
In Part I of this series on my Vegan Pantry Essentials and Staples, I talked about some of my favorite vegan condiments that I keep in my pantry. Today, I’m dishing on some of the other staples in my plant-based pantry. And when you’re done here, head to Part III of the My Vegan Pantry Essentials series!
Beans
My earliest memory of beans is this childhood rhyme on the playground:
Beans, beans, the magical fruit
The more you eat, the more you toot!
I’m not gonna lie. This song had a nice ring to it, and sometimes I still get that jam stuck in my head.
Farts aside, beans are a vegan’s best friend. They’re a completely natural source of protein packed with protein, fiber, vitamins, and minerals.
I highly recommend cooking beans from scratch, especially if you have an Instant Pot or other electric pressure cooker. With an Instant Pot, you don’t have to soak beans (though sometimes I still do because it can help minimize those aforementioned farts), and you don’t have to babysit the pot to make sure the beans don’t burn.
I put beans in everything, from salads and stews to pasta dishes and even desserts (when I’m trying to be healthy).
Black Beans and Pinto Beans
Black beans are best in Latin-inspired dishes, IMO. I like to make my own spicy refried black or pinto beans with pre-cooked or canned beans. You can check out how to do that in these pantry tacos or pantry quesadillas!
Chickpeas
Is there anyone who doesn’t like the humble chickpea? Chickpeas are so versatile. You can add them to salads, grain bowls, and pastas, or you can turn them into hummus, use them to make gluten-free brownies or blondies, or bake them in the oven until crispy.
For more chickpea ideas, check out this blog post on every way to use canned chickpeas!
PS: you can even use them in these buffalo chickpea quesadillas, because, well, look how good these look!
Cannellini beans
These are mellow, soft white beans that are quite versatile. They have a very creamy texture, which is great for making bean dips and purées. When I get tired of the usual hummus, I simply substitute cannellini beans for chickpeas for a white bean hummus.
I especially love pan-frying cooked white beans because it gives them a crunchy, crispy exterior but the beans still have that rich, creamy interior.
Some community favorite recipes featuring the cannellini bean: Creamy White Bean Soup with Kale and Instant Pot White Bean Stew.
Lentils
I love beans, but I might love lentils even more. The jury is still out on this one.
They’re incredibly cheap, packed with protein and fiber, and can be used in a wide range of dishes, from curries and salads to soups and stews (like this flavor-packed, plant-forward Mushroom and Black Beluga Lentil Stew).
I’m a fan of all lentils, which is probably attributable to my Indian genes. We Indians sure love our dal. Try my restaurant-style Dal Tadka or my community favorite red lentil curry!
But you should know that not all lentils cook in the same way. For instance, black beluga lentils hold their shape during cooking, making them ideal for salads, grain bowls and side dishes. In contrast, red lentils get mushy, making them perfect for Indian dals.
Lentils also cook well in the instant pot so I highly suggest you give that a try.
Grains
Most weeks, I make a big batch of whole grains using my Instant Pot so that I can enjoy veggie grain bowls throughout the week.
Quinoa
This is one is a bit obvious, I know. Is there a single vegan out there who hasn’t eaten quinoa? I mean, what is this, 2007? However, I couldn’t write a pantry essentials list and not mention quinoa.
My tips for quinoa are (1) toast your quinoa if you have the time – it tastes nuttier; (2) use a bit less than a 2:1 liquid:grain ratio, as more water makes for soggy quinoa; (3) try cooking your quinoa in vegetable broth instead of water and add in flavorings like smashed garlic, peppercorns, and fresh thyme or rosemary sprigs.
Quinoa is extremely versatile. You can use it as a base in grain bowls, use it to stuff bell peppers, tomatoes or winter squash; replace rice with it in a pilaf; cook it in plant-based milk and mashed bananas to make a breakfast porridge; or add it to granola bars, soups, chilis, or burger patties.
Pasta
I know some of you may avoid pasta because it contains gluten and refined grains, but these days you can find all kinds of pasta varieties, from whole grain and spelt to quinoa- and bean-based pasta. I always keep a variety of pastas on hand to make random spur-of-the-moment weeknight meals possible.
Farro
Farro is an ancient grain that has a very nutty taste and a complex texture that is both firm and soft. It’s my favorite grain but under utilized in most kitchens.
My favorite way to use farro is in a grain salad. I like to mix cooked farro with a light vinaigrette, a protein, vegetables, and add-ons. One of my favorite combinations is farro with chickpeas or cannellini beans, toasted hazelnuts or walnuts, dried cherries or apricots, chopped parsley, and a vinaigrette made with lemon juice, orange juice, maple syrup, and extra virgin olive oil. You can eat the salad alone or stuff it into baked winter squash, tomatoes, or bell peppers.
And I also love using farro instead of rice for an equally creamy but healthier version of risotto!
Rolled Oats
This is another obvious one, but I couldn’t not mention every vegan’s favorite breakfast food. Oats are naturally gluten-free but may be contaminated with gluten during processing. Luckily you can buy gluten-free oats, including at Trader Joe’s, which sells a 2 pound bag of gluten-free rolled oats for like $3. In addition to making oatmeal and porridge, I also add oats to smoothies. It adds bulk and nutrition, which helps me stay full.
Canned or Jarred Goods
My list of canned/jarred goods could easily be longer, but I will limit it to just a few of my faves so I don’t bore you to death. I know some of you may be freaking out about canned goods and BPA lining, but the good news is many of these goods are now offered in glass jar form and/or in BPA-free cans.
Artichoke Hearts
I am almost always too lazy to cook a whole artichoke, but I will lay into a jar of artichoke hearts like nobody’s business. You can find canned or jarred artichoke hearts, the latter of which are typically marinated in some type of oil. They have a meaty texture, so they feel substantial when you eat them. Plus, artichokes have higher antioxidant density than blueberries or kale or even dark chocolate!.
Sun-Dried Tomatoes
These are another life-long favorite of mine. The chewy texture of sun-dried tomatoes is just amazing, and I love the rich umami flavor they impart. Even my tomato-hating boyfriend loves sun-dried tomatoes.
Unsurprisingly, I add sun-dried tomatoes to pasta, but I also use them in sauces and dips, like sun-dried tomato pesto and sun-dried tomato cashew cream. For sun-dried tomato cashew cream, simply add 3-4 chopped sun-dried tomatoes to my standard cashew cream recipe (cashew cream recipes here).
Coconut milk
I use canned coconut milk in everyday cooking as well as in baking. I use it in Thai and Indian curries, to give soups a velvety finish, and to give smoothie bowls that luscious thick texture (this Thai-inspired butternut squash curry is a must-make).
If you’re calorie conscious, you can try lite canned coconut milk or a coconut milk beverage (“drinking milk”), but it won’t be as creamy. I also use it in lieu of ingredients like milk and cream in baking applications with delectable and equally indulgent-tasting results. Like in this incredibly lush and rich (yet healthyish) Salted Chocolate Cream Tart.
Hope you enjoyed Part II of My Vegan Pantry Essentials and Staples! What kind of essentials do you keep in your pantry? I would love to hear from you in the comments below! | https://rainbowplantlife.com/my-vegan-pantry-essentials-part-ii/ |
Attorney John VanLuvanee Proposes Ordinance Change to Allow Super WaWa on Bypass
Land use attorney John VanLuvanee, speaking at a Work Session meeting of the Newtown Board of Supervisors (BOS) on Monday, May 14, 2018, made a case for amending a Township ordinance in order to allow a Wawa Super Store to be located at the southwestern corner of Newtown Bypass and Lower Silver Lake Road.
One major stumbling block is the fact that the site is within the Office Research (OR) zoning district, which does not allow retail stores or the selling of gasoline according to a memorandum prepared by CKS Engineers.
According to Article III, paragraph 300, of the Newtown Area Zoning Jointure (JMZO) an OR zone is specifically intended to "provide for special office and research, industrially related uses on large tracts of land, which will provide a major employment center for the Region while enhancing its open space characteristics and natural features."
"This site is never going to be a corporate headquarters or office building," claimed land use and zoning law attorney John VanLuvanne in remarks to the BOS. Therefore, Mr. VanLuvanne proposed to amend the CO ordinance to allow as a special condition the use of the site for a Super WaWa type convenience store with fuel pumps. Supervisor Mack questioned Mr. VanLuvanne on this issue and asked what, if anything, would be the financial benefit to Newtown. The following is an edited audio excerpt from that discussion.
It should be noted that employment centers envisioned by the OR zone could generate significant Earned Income Tax revenue for the Township. Retail stores, such as WaWa, that pay a wage of $10 per hour to a minimal number of employees, do not provide any significant tax income for the Township. | https://www.johnmacknewtown.info/jvwawapodcast.html |
Simple choices: the story of minimalist furniture
We take a look at the history of minimalist furniture design, and how the concepts still apply today...
Ronald Knul, one of the Netherlands’ leading designers has described minimalist furniture – in a suitably pared down definition – as ‘form and function in harmony’. There are lengthier definitions but, essentially, they all tell the same triangular story.
We’ve been embracing minimalist furniture since the 1960s, when more streamlined, simpler styles with a distinctly futuristic look – the furniture equivalent of the white heat of technology – started to become popular in the USA. The minimalist approach flew across the Atlantic and spread not only across Europe but also around the world. As we explained in an earlier article, minimalist design, including furniture design, can trace its roots back to Japan and Zen philosophy, which influenced architects and designers, such as Ludwig Mies van der Rohe (1886-1969) and Marcel Breuer (1902-1981), in the first half of the 20th century.[caption id="attachment_3596" align="alignnone" width="700"] Barcelona chair and couch (Image: pud_pud)[/caption]
We have had almost a century to get used to the clean, elegant lines of the Barcelona chair and couch, designed by van der Rohe, one of the pioneers of modernist architecture. But, in 1929 when he unveiled these designs to the world, they were groundbreaking. Nothing could be further from the heavy, ornate pieces that he would have been familiar with growing up in 19th century Aachen in Germany.[gallery link="file" ids="3587,3589"]
Just a few years earlier, the Hungarian modernist architect, Marcel Breuer, had astonished the design world with his equally iconic design – the Wassily chair, with its distinctive leather supports – and the Cesca chair, which combined tubular steel with a beech-framed woven seat and back support.
What all these pieces have in common are clean lines and plain materials; despite being free of embellishment or decoration, they draw the eye and hold our attention. All are still in production. If we add a preference for neutral colours, we have the essence of 21st century minimalist furniture.[caption id="attachment_3588" align="alignnone" width="700"] Richard Neutra's 1960s modernist house. (Image: WowHaus)[/caption]
It’s no surprise, perhaps, that a preference for minimalist furniture really took off in the 1960s. It was due, in part, to the major changes in our lifestyles and working lives that were to become such a strong feature of the latter half of the 20th century and which have continued beyond the millennium. Cluttered homes, stuffed with high maintenance ornate furniture, are not the ideal domestic environment for people juggling busy working and family lives. The interior of Richard Neutra’s modernist house in Brentwood, California, brings together all the elements of 1960s minimalism.[gallery link="file" ids="3592,3590"]
A touch of glass
New generations of designers would continue to adopt a minimalist approach, using traditional and modern materials, while staying faithful to the notion of simplicity. What, for example, could be simpler than Japanese designer, Shiro Kuramata’s glass chair, which dates from 1978? A 2008 version, made in Japan, sold in a London auction 10 years later for £32,500 – not just an iconic chair but a shrewd investment too. Kuramata (1934-1991) was fascinated by transparency and weightlessness, which – combined with minimalism – provided the inspiration for his signature designs, including tables and shelving.
French designer Philippe Starck (b.1949) also created transparent waves with his highly popular acrylic Louis Ghost chair (2002), which managed to be – more or less – minimalist, while giving a backwards nod in the direction of Louis XV.
More recently, the work of architect designers, such as Vincent Van Duysen (Belgium), Luke Wong (USA) and Andreas Engevik (Norway), has continued the minimalist furniture journey, which continues to evolve.
The Raft approach to minimalism
Here at Raft, we love minimalism, not least because its clean, uncluttered lines bring out the beauty of the materials we use, from the rich patina of recycled teak, the reassuring timelessness of thick leather, and the neutral shades of many of our upholstered sofas.
As we’ve been looking at chairs, let’s start with Raft’s sling back chair – a classic minimalist design that would work well in any modern home or office. It combines strong, high quality natural or black leather, with a robust, recycled teak frame.
Browse Raft’s armchair range here.
When it comes to dining, no table could be more minimalist in concept than our unmilled version, with its natural finish, made of 100 per cent recycled teak. If you’re aiming for a minimalist look but space is tight, the simplicity of our Megan round table, with its block base and thick top would work well – and will last. If you want to incorporate glass into your minimalist themed dining area, we offer rectangular and round glass tables, both of which have teak root bases.
Browse the full range of Raft dining tables here.
Even the tidiest of homes has to accommodate a certain amount of stuff, but if you are aiming for a minimalist look, you want storage units that are unobtrusive but pleasing to the eye and that do the job efficiently. Our recycled storage units come in a range of styles, sizes and finishes, from single cubes to shelved cubes, as well as shelved screens and the geometric lines of the metal and recycled teak Witney display unit.
Alternatively, you might prefer the cool grey tones and distinctly modernist look of our concrete storage cubes. Used singly or in groups, they adapt easily to a variety of interiors.
Browse Raft’s storage units here.
Mirrors are an excellent way of introducing more light into a room and creating a sense of space – both key elements of minimalism. Raft’s mirrors include the classic, black-framed Brooklyn, available in two sizes, and the Hoxton, with its thin brass frame, as well as unmilled, natural and dark teak-framed mirrors.
Browse Raft’s full range of accessories here.
Raft is one of the world’s largest retailers of 100% recycled teak, which we turn into stunning and enduring furniture for the home and workplace. You’ll find our entire range of furniture and accessories here. | https://www.raftfurniture.co.uk/blog/simple-choices-the-story-of-minimalist-furniture/ |
Integrating Human Factor Engineering in Construction and Fabrication
Human-factors engineering (HFE) is applied widely in the design phase of capital projects in order to build human-centered facilities. By considering the interactions between workers, tools, and facilities, a project team can identify any additional controls that may improve overall human performance in the construction phase. This paper describes the operator’s experience in the consideration of HFE during the construction and fabrication/installation phase of the project with the goal of proposing a structured approach.
Introduction
Starting from a high-level screening of possible human interactions with the equipment, work environment, and monitoring and control systems, the project team can identify human-performance criticalities that can negatively affect integrity of operations, or those HFE opportunities that may relieve operational bottlenecks, thus allowing for the implementation of new concepts and operational practices. As more-detailed information on the design of the facility becomes available, more in-depth analyses may be carried out on the basis of the specific needs of the project. This approach, coupled with adequate competencies, is capable of channelling the efforts of the project team toward continuous improvement and of reducing capital expenditure (0.25–5%), operating expense (3–6%), design rework, and turnaround time. But a systematic approach to HFE during construction does not yet exist in the industry.
Constructability Hazard Identification (HAZID)
The operator has introduced, in its health, safety, and environment (HSE) risk-management process, a dedicated step aimed at providing an early focus on possible human-performance issues that can be faced during the operational phase. Considering the analogies with constructability reviews that can exist when evaluating these factors, the operators have labelled this process Constructability HAZID.
The optimal timing for Constructability HAZID is during engineering activities, when the first revision of preliminary procedures has been issued. Like constructability reviews, Constructability HAZID is held in a workshop format, led by an independent facilitator having knowledge of HFE or relevant past experience in the specific scope of work. The personnel constituting the first line of construction supervision are required to attend to bring their experience to the discussion and to effectively agree on proposed action items. These will influence decisions taken by all the functions during the engineering, procurement, construction, and installation project life cycle; any deviation would require the implementation of a formal change-management process.
Because Constructability HAZID is a workshop-based risk-management tool, the role of the facilitator is critical for the success of the study. The facilitator should ensure the correct definition of the nodes to be analyzed and selection of the terminology to be used, so that all operational steps and related criticalities are considered in the discussion. Focus shall be on those human-factor issues that may have an effect on human performance or HSE, such as accessibility, workstation layout, fabrication and installation aids, weather conditions, material handling, rescue protocol, and past incidents. The facilitator should also ensure that the boundaries of the analysis are clearly defined and explained to all participants to optimize the efforts of the team. The objective is to maintain a high level of detail on all steps of the construction, fabrication, and installation sequence, keeping the workshop within a predefined duration, typically of 1 day, on the basis of project novelty and complexity. In the same way, the facilitator should always challenge the team on complacent or traditionalist attitudes, encouraging all participants to propose improvements.
Examples of Constructability HAZID Implementation
One example of the successful application of this methodology is related to the fabrication of buoyancy tanks in Nigeria. Environmental conditions and heat inside the structures were identified to be significant performance-influencing factors, considering that the scope of work requires continuous access to confined spaces to perform the internal welds of the shells, with no alternatives to eliminate the hazard. Common practice in these cases is to perform the job by implementing the standard control measures for confined-space management and ensuring continuous monitoring of air inside the compartments, availability of ventilated welding masks, and adequate work rotation. Still, considering the preheating process and multiple weld locations, temperatures in the working area can be expected to exceed 50°C routinely, and the residual risk related to heat stress and dehydration is significant. Welder performance is also influenced strongly by turnover requirements and by environmental conditions. The solution proposed by the project team was the procurement of advanced confined-space equipment that could allow the implementation of a different operational concept, achieving an overall optimization of manpower requirements, minimizing the needs for rework, and reducing work schedules. By providing welders with ergonomic respiratory protection for the entire upper body, which allowed the customization of air temperature, it was possible to allow welders to work continuously for an extended period. Infrared cameras and gas-detection sensors were also installed inside the tanks, providing real-time feedback to a portable control panel positioned directly on site. In such a way, a single operator could monitor the conditions of several work locations.
Another case study proving Constructability HAZID to be an effective tool in ensuring proper task-planning and emergency preparedness was the identification of an additional means of access for the emergency-response team during the construction of a floating production unit in Indonesia. At its peak, the project saw 1,500 workers aboard the vessel, moored at the quayside. The workshop process highlighted the fact that, considering the width of the gangways, in the event of any major incident requiring the complete evacuation of the facility, the continuous flow of people could impair the access of firefighters or medical teams. The proposed solution consisted of the provision of a third gangway, having adequate dimensions to ensure accessibility with a stretcher or emergency-response equipment, fully dedicated to this purpose. During project execution, there was no need to use the additional gangway, and access for personnel was allowed only in a few particular cases. Nevertheless, while ensuring adequate emergency preparedness in a critical phase of the construction, the gangway remains an asset for the fabrication yard in view of future projects.
Integrating HFE Experience Into EPCI-Project Life Cycle
The Constructability HAZID phase should identify any additional study that should be performed at a later stage in the project, when adequate information becomes available to address effectively the issues identified in terms of HSE, and the goal-oriented requirements in terms of human performance. This approach can optimize the efforts of the project team effectively, making the most out of past experience and lessons learned.
As with the HFE process, a typical analysis to be performed as engineering progresses is a 3D-model walk-through, focused on accessibility and workspace issues to anticipate possible operational constraints at the interface between people, the working environment, tools, and materials.
In the operator’s experience, a successful example of the benefits of a 3D-model walk-through involved the installation of living quarters offshore west Africa. The facility, supplied by a third-party company, was split into four modules to be stacked on top of one another, making use of guides and pins. On the basis of a lesson learned from a past project, in which similar welding operations proved to be extremely difficult and particularly hazardous because of limited access to welding locations, the project team used the 3D model to identify critical areas and to propose corrective actions to minimize the risks and optimize welder performance. The analysis highlighted those locations that would constitute a confined space (and, thus, obstructed accessibility for rescue) in order to properly plan for the installation of ventilation systems. Therefore, additional openings in the module roofs were designed, linking the work stations to the external walkways. The new configuration of emergency escape routes was assessed against the need to use a stretcher, confirming the suitability of the solution.
These modifications allowed the achievement of significantly safer conditions for the welders during the offshore installation. Escape paths were privileged and working space was maximized. Installation proceeded smoothly; no incidents were reported, and out of the 42 days forecast for the installation, three were saved.
Challenges to HFE Implementation
Project management should be made aware of the benefits of human factors in construction, starting from project kickoff, in order to obtain necessary buy-in and to plan for potentially resource-consuming analyses. Once management commitment has been obtained, other challenges may jeopardize process effectiveness:
-
Resistance to change of experienced construction team members
-
Resistance to change of engineering team members
-
The belief that hazards are an accepted, and acceptable, part of job tradition
-
Ineffective follow-up of actions. It is fundamental to clearly explain at the beginning of the study, whether it is a Constructability HAZID or a 3D-model walk-through or any other type of study, that any change of an agreed action will require a formal change-management process implementation.
A key element in minimizing objections from project team members is to ensure the effective communication of the added value that the approach can bring to the project. For example, the study can be opened with a presentation that highlights the concept of HFE, showing successful examples of application in past projects, thereby fostering the active participation of team members in the discussion.
This article, written by JPT Technology Editor Chris Carpenter, contains highlights of paper SPE 190513, “Integrating Human Factors in the Constructability Process,” by Matteo Palazzolo and Angelo Spingardi, Saipem, prepared for the 2018 SPE International Conference and Exhibition on Health, Safety, Security, Environment, and Social Responsibility, Abu Dhabi, 16–18 April. The paper has not been peer reviewed.
ISO Approves First Safety Standards for Commercial Drone Operation
The organization said the new standard, which focuses on air safety and data protection, is the first step in a wider move to promote the use of drones within a framework of approved regulatory compliance.
North Dakota, Texas Fuel Increase in US Natural Gas Venting and Flaring
According to a new report from the EIA, the volume of natural gas reported as flared reached its highest average annual level in 2018, 1.28 Bcf/D. With production soaring in the Bakken, Permian, and Eagle Ford plays, North Dakota and Texas accounted for more than 80% of that total.
Drones Take Off in the Oil Field, but How High Will They Fly?
Unmanned aerial vehicles are creeping up on ubiquity in the oil and gas industry, but their potential still firmly outweighs the actuality. A panel at the 2019 SPE Annual Technical Conference and Exhibition took a close look at the benefits of drones and at the tethers still holding back their use.
ADVERTISEMENT
STAY CONNECTED
Don't miss out on the latest technology delivered to your email every two weeks. Sign up for the OGF newsletter. If you are not logged in, you will receive a confirmation email that you will need to click on to confirm you want to receive the newsletter. | https://pubs.spe.org/en/ogf/ogf-article-detail/?art=5391 |
QA engineers test software to assess its design and functionality before its official launch. They identify problems and their causes, and assist developers in finding solutions.
The work involves documenting all phases of software development, including detailed bug reports. They help clients and designers determine the technical specifications and processes needed to bring a proposed software idea to functional reality.
Duties
- Install and use software testing programs, design new test plans, scripts and procedures
- Develop and implement testing protocols for software scenarios, usability and regression tests
- Document standardised procedures for replicating all testing
- Create a schedule for testing and other activities based on size of project and launch date
- Identify software bugs and document location, steps to reproduce, error results and risk level
- Analyse problems with program functions, screen and content
- Perform software compatibility tests with hardware, operating systems, networks and other programs
- Provide input on functional requirements and design needed for new software and app ideas
- Inform developers of all problems of usability and functionality and suggest solutions
- Retest all system modifications and repairs
- Monitor and document all bug resolution attempts and results
- Identify any deviance from software standards and suggest modifications for compliance
- Implement user or third-party testing, analyse results
- Monitor program performance over time to check for efficient and error-free functionality
- Develop standards and procedures for assessing software quality, design and launch readiness
- Investigate customer problems referred by technical support for beta and final product releases
Skills and qualities
Job outlook
Projected growth
10%
New jobs
42.2k
Automation risk
22%
Career progression
Knowledge and experience are key to progressing in your career as a QA engineer. Success in problem-solving and delivering highly efficient software leads to bigger projects. QA engineers can advance to supervisory roles on more prestigious projects.
You may also transition to a role as software engineer or developer. The knowledge required to analyse software and systems for QA can open doors to many other technical jobs.
Working conditions
Average hours
40h/ week
Typical schedule
Full Time
Standard business hours
QA engineers typically work full time during normal business hours. You may put in some overtime to complete final testing of a product before its official launch. Work in industries like automotive, aeronautics and medical could require testing work outside the usual office environment.
QA engineers spend extensive time sitting at a computer. The sustained focus required and intense detail work under deadline can be stressful for some.
Salary
Bottom 10%
$46k
Median
$89k
Top 10%
$140k
Annual salary estimates are based on percentile wage data collected through the Occupational Employment Statistics (OES) survey of US workers.
Qualifications and training
Education level
Undergraduate
Bachelor's degree in computer science
Study time
4 years
Most employers require a bachelor’s degree in computer science, information systems, electrical engineering or a related subject. They also typically expect three to five years of experience with software development and testing, though some ask for more.
Knowledge of a variety of programming languages, operating systems and testing programs is essential. Internships while earning your degree are advisable. You can gain additional experience as a tester or other entry-level role in quality assurance. | https://www.careerhunter.io/careers/qa-engineer |
FIELD OF THE INVENTION
BACKGROUND OF THE INVENTION
SUMMARY OF THE INVENTION
BRIEF DESCRIPTION OF THE DRAWINGS
DESCRIPTION OF THE PREFERRED EMBODIMENTS
The present invention relates generally to an animal leash or lead, and more particularly, to a leash or lead with an adjustable handle for securing the animal to a stationary object.
Owners of dogs, cats, ferrets, and other domestic animals often use a hand-held lead with a pre-formed loop handle when they go for a walk with their pet. For people who live in an urban or city area, it is often convenient to walk their pet while also running an errand or going to a store for groceries. For the safety of the animal and convenience of the owner, and since many businesses prohibit pets from entering the premises, the animal must be temporarily tethered to a stationary or fixed object outside the establishment, such as parking meters, signposts, bicycle racks, security gates, and the like. To do so, the leash is typically fastened around the surface area of the stationary or fixed object by tying the hand-held lead into a knot or otherwise fastening the lead to the stationary or fixed object. While sometimes effective, this method can often be problematic. Knots are generally not secure, can be easily undone by the animal, can be cumbersome for the handler to secure (particularly if the fixed object is wide or has unusual dimensions), and can be difficult to tie in inclement weather such as snow or rain. Other means of fastening the lead to a fixed or stationary object—such as clips or hooks—require the handler to carry additional items, or disengage the lead from the animal while the handler is securing the lead.
Accordingly, there is a need for a leash that allows the handler of an animal to easily and securely attach the leash to any one of a variety of fixed or stationary objects without disengaging the lead from the animal while at the same time eliminating the need to carry extra items.
Prior attempts to address similar problems in U.S. Pat. Nos. 2,250,171; 4,165,713; and 4,998,507. However, none of these references disclose leashes where the size of the handle can be easily adjusted so that the lead can be readily secured to a stationary object in order to secure the pet. Although these conventional leashes have a preformed loop handle which fits a persons hand located at one end of the lead, the user cannot secure the lead to a stationary object without either tying the lead into a cumbersome and insecure knot or, if the stationary object is small enough, fitting the distal end of the lead through the loop handle and then extending it through the preformed loop handle. However, the pre-formed loop handle standard on most conventional leads does not fit around many stationary objects including those located on urban and suburban sidewalks, such as parking meters, sign posts, bicycle racks and the like. While the prior art is of interest, the known methods and apparatus of the prior art present several limitations which the present invention seeks to overcome.
Accordingly it is an objective of the invention to provide an improved leash device which allows a person walking their dog or pet to adjust the size of the lead's handle to snuggly fit the users hand or to adjust the size of the handle.
It is another object of the present invention to allow the user to secure their pet to stationary objects of varying sizes by adjusting the size of the handle to fit securely around a stationary object to allow the user to temporarily leave their pet while they enter a residence, store or place of business.
A further objective of the present invention is to provide a leash handle which has a securing device attached to an adjustable, open end that can be secured to different latching points along the body of the lead.
It is another object of the present invention to solve the shortcomings of the prior art.
To accomplish the objectives of the present invention in accordance with a preferred embodiment thereof, there is provided, an adjustable leash for restraining an animal. The leash comprises a lead having a lead having a releasable clip suitable for securing the device to the animal, wherein the middle section of the leash is fitted with one or more securing receptors, and the first end has at least one securing device adapted to releasably engage one of the securing receptors so that the user can refasten and create an opening for holding the lead or securing the lead to a stationary object of varying sizes.
Other objectives, advantages and features of the present invention will become more readily appreciated and understood when taken together with the following detailed description of the preferred, albeit exemplary, embodiment in conjunction with the accompanying drawings, in which:
FIG. 1
is a side view of a preferred form of leash apparatus in an elongated position with the handle portion unfastened and elongated.
FIG. 2
is also a side view of a preferred form of leash apparatus with a dual fastening system.
10
12
14
14
16
12
18
10
18
10
18
18
10
12
16
18
18
18
The present invention generally relates to a leash leash having a handle on one end, and a clip located at the opposite end. The clip operates to fasten the lead to a collar or harness worn around the neck, head or body of the pet. At least one male fastening device is secured to the inner portion of the lead handle , and a female securing device is attached to the main body portion of the leash . In a preferred embodiment of the present invention, a plurality of female securing devices are provided along the length of the main body portion of the leash . The terms leash or lead may be used interchangeably herein. Preferably, the female securing devices are spaced equidistant at regular intervals from the distal end of the leash to the first end of the leash. Of course the female securing devices can be separated by other distances if desired. The leash may be made of any fabric or material that is suitable for pet leashes, such as leather or nylon. In accordance with the present invention the handle is fitted with a male fastening device and a female securing device are secured to each other in order to construct a loop which can comfortably fit the hand of the user while the user is walking their pet. The male and female fastening apparatus can be constructed of any type of known or hereinafter developed, fastening device, including, but not limited to a hook and corresponding loop fastening system, velcro, button and snap, and/or a buckle. Since a plurality of female fastening devices are provided in the preferred embodiment, the male fastening device can be fastened to any of these components to allow the handle and loop to be adjustable.
FIG. 1
FIG. 1
18
16
18
10
In the embodiment shown in , the leash utilizes a hook and loop fastening system, with the loop operating as female securing means and the hook operating as the male fastening device . The hook and loop fastening system should be strong enough to withstand the force of a sudden pull or tug along the lead and remain fastened and easy enough to attach with minimal force by contacting the male and female securing devices. In these embodiments the female securing devices are generally rectangular, having dimensions lengthwise 6 cm×6 cm along the full width of the leash . Of course, the fastening devices can be of other sizes and shapes without departing from the core concept of the present invention. The fastening system of can also use other fasteners, such as velcro instead of the hook and loop fastening devices in the same manner as shown.
FIG. 2
FIG. 1
20
22
20
12
22
20
In a second embodiment of the present invention, the lead in utilizes a velcro or hook and loop fastening system as shown in as well as a button securing device which works to fasten the adjustable open end of the handle to the handle or the lead. The button securing device has one male component or stud located on the first end of the adjustable handle which can be secured to the female components or sockets located at four separate intervals along the lead. In this embodiment, the stud is located approximately 2 centimeters from the male hook and loop or velcro fastening device located along the bottom facing portion of the adjustable handle . The sockets are also located approximately two centimeters from the male hook and loop or velcro fastening device located at intervals along the body of the lead so that the stud can be secured to the sockets when the hook and loop or velcro fastening system is secured.
While various embodiments of the present invention have been described above, it should be understood that they have been presented by way of example, and not limitation. It will be apparent to persons skilled in the relevant art that various changes in form and detail can be made therein without departing from the spirit and scope of the invention. Thus, the present invention should not be limited by any of the above-described exemplary embodiments, but should be, defined only in accordance with the following claims and their equivalents. | |
The present invention relates to convertible garments. In particular, the invention relates to a garment having a first purpose and worn by a care giver which is transferable to the child and thereafter has a second purpose.
It is known to provide an apron which is worn by a care giver, such as a parent, guardian or care worker, which has a number of toys or symbols fastened to the outer front surface of the apron. Some of the toys are detachable while others are not. The garment provides a play area and playthings to entertain a small child under the direct supervision of the care giver. Also known are other garments such as scarves, T shirts or arm bands which again include playthings for stimulating the child.
It is also known to provide sleeping bags for babies and small children. These are a popular choice by parents, one reason being that the covering cannot be thrown or kicked off during sleep. Typically, the sleeping bag includes fastening means that prevent the baby from sliding down into the bag which would present a risk of suffocation.
It is common for babies and infants to fall asleep while close to, or being cradled by, the care giver. The baby will often then be lying asleep on the care giver's chest. It can then be awkward to move the child to apply a warm protective covering, and the movement and change in temperature during this task can wake the baby. Also, in this position, the care giver's freedom of movement is restricted.
a sheet member adapted to provide an apron member; and
first fastening means which, when engaged, substantially converts the apron member to form an enclosure.
According to a first aspect of the present invention there is provided a convertible garment comprising:
The term "apron member" is intended to cover any substantially continuous panel member which, when worn by a first user, substantially covers the chest area of the first user.
Preferably the convertible garment is adapted for use by a care giver. Preferably the apron member comprises an absorbent material such that the apron member provides a bib member.
™
™
™
Preferably the apron member includes a play panel having one or more playthings or symbols arranged at the play panel. Preferably one or more of the playthings or symbols are detachable. Preferably the outer surface of the play panel and the attachment surface of the detachable playthings or symbols include attaching means such as Velcro. Preferably the outer surface of the play panel includes the relatively soft Velcro eyes and the attachment surface of the detachable playthings or symbols includes the relatively hard Velcro hooks.
Preferably the apron member includes one or more devices arranged at the play panel. Preferably one or more devices are musical. Preferably one or more devices are provided between the sheet member and the play panel. Preferably one or more devices include an operating member provided at the outer surface of the play panel. The operating member may graphically represent a musical instrument or a musical note or the like.
The play panel may be substantially square or rectangular, or it may be have the profile of an object such as a teddy bear head or an animal or the like. The play panel may include artwork in one or more colours.
Preferably the sheet member includes a neck opening within the plane of the sheet member.
In a first embodiment, preferably the neck opening comprises an interior aperture of the sheet member. Preferably the neck opening is located in a substantially central region of the sheet member such that the sheet member, when worn by the first user, defines a tabard member having a front panel member and a back panel member. Preferably tie members are provided for securing the front panel member and the back panel member when worn by the first user.
Preferably the enclosure has at least one open end. Preferably the first fastening means is provided along one longitudinal edge of the sheet member, most preferably along both longitudinal edges of the sheet member.
Preferably the apron member is convertible to form a sleeping bag.
Preferably the first fastening means includes an interval provided at the central region of each longitudinal edge of the sheet member. Preferably the convertible garment includes second fastening means provided at each interval such that the convertible garment includes two arm openings when the first fastening means and second fastening means is engaged.
Preferably the apron member is convertible to form a baby sleeping bag.
Preferably the tabard member comprises a substantially continuous sheet. Alternatively, the tabard member comprises two sheets which are detachably connected by the second fastening means.
Preferably first fastening means is also provided along one adjacent edge of the sheet member such that, when engaged, the apron member forms an enclosure having a closed end. Preferably the open end is provided by the neck opening.
™
™
Preferably the first fastening means comprises a zip member. Alternatively, the first fastening means comprises a substantially continuous strip of Velcro. Alternatively, the first fastening means comprises a plurality of discrete fasteners, such as snap fasteners, individual Velcro tabs, ties, buttons or the like.
Pulling means may be provided to assist with pulling the back panel member upwards when the convertible garment is worn by the first user. The pulling means may comprise one or more ties connected to the adjacent edge of the back panel member. The pulling means may comprise one or more shoulder guides.
In a second embodiment, preferably the convertible garment includes at least one longitudinal member extending from an adjacent edge of the sheet member. Preferably the longitudinal member is adapted to loop around and third fastening means is provided to fasten the longitudinal member to the sheet member to define the neck opening. Preferably the third fastening means is detachable. Alternatively, the longitudinal member may comprise a tie member.
Preferably the apron member includes a recess provided at an adjacent edge of the apron member. Preferably the apron member is foldable or rollable. Preferably the apron member is pliable such that the apron member in a folded or rolled state remains in this state. Preferably the apron member may be folded or rolled from the adjacent edge opposite to the recess and then substantially contained within the recess. In this embodiment, the pliability of the apron member provides the first fastening means and folding or rolling the apron member into the recess forms the enclosure.
Closing means may be provided for closing the open end of the recess.
providing a sheet member adapted to provide an apron member;
providing means for transferring the convertible garment from the first user to the second user; and
providing first fastening means which, when engaged, substantially converts the apron member to form an enclosure.
According to a second aspect of the present invention there is provided a method of forming a convertible garment which may be transferred from a first user to a second user, the method comprising:
Preferably the convertible garment is adapted for use by a care giver. Preferably the method includes forming the apron member from an absorbent material such that the apron member provides a bib member.
™
™
™
Preferably the apron member includes a play panel having one or more playthings or symbols arranged at the play panel. Preferably one or more of the playthings or symbols are detachable. Preferably the outer surface of the play panel and the attachment surface of the detachable playthings or symbols include attaching means such as Velcro. Preferably the outer surface of the play panel includes the relatively soft Velcro eyes and the attachment surface of the detachable playthings or symbols includes the relatively hard Velcro hooks.
Preferably the method includes forming a neck opening within the plane of the sheet member. Preferably the neck opening comprises an interior aperture of the sheet member. Preferably the neck opening is located in a substantially central region of the sheet member such that the sheet member, when worn by the first user, defines a tabard member having a front panel member and a back panel member. Preferably tie members are provided for securing the front panel member and the back panel member when worn by the first user.
Preferably the method includes providing the first fastening means along one longitudinal edge of the sheet member, most preferably along both longitudinal edges of the sheet member such that the convertible garment, when transferred to the second user, is convertible to form a sleeping bag.
Preferably the method includes providing an interval of the first fastening means at the central region of each longitudinal edge of the sheet member. Preferably the method includes providing second fastening means at each interval such that the convertible garment includes two arm openings when the first fastening means and second fastening means is engaged such that the convertible garment, when transferred to the second user, is convertible to form a baby sleeping bag.
™
™
Preferably the first fastening means comprises a zip member. Alternatively, the first fastening means comprises a substantially continuous strip of Velcro. Alternatively, the first fastening means comprises a plurality of discrete fasteners, such as snap fasteners, individual Velcro tabs, ties, buttons or the like.
Preferably the method includes providing pulling means to assist with transferring the convertible garment to the second user. Preferably the pulling means assists with pulling the back panel member upwards when the convertible garment is worn by the first user. The pulling means may comprise one or more ties connected to the adjacent edge of the back panel member. The pulling means may comprise one or more shoulder guides.
Figure 1
is a perspective view of a first embodiment of a convertible garment as an (a) apron member and a (b) baby sleeping bag;
Figure 2
Figure 1
is a perspective view of a variation of the first embodiment of as an (a) apron member and a (b) baby sleeping bag;
Figure 3
Figure 1
is a perspective view of another variation of the first embodiment of as an (a) apron member and a (b) baby sleeping bag;
Figure 4
Figure 1
is a perspective view of another variation of the first embodiment of as an (a) apron member and a (b) baby sleeping bag;
Figure 5
is a perspective view of a second embodiment of a convertible garment as an (a) apron member, (b) in an intermediary state, and as a (c) packed garment; and
Figure 6
Figure 5
is a perspective view of a variation of the second embodiment of as an apron member.
Embodiments of the present invention will now be described, by way of example only, with reference to the accompanying drawings in which:
Figure 1
shows a convertible garment 10 which comprises a sheet member 12 which forms a tabard having a front panel 14 and a back panel 16. The front panel 14 provides an apron member.
™
The sheet member 12 includes a neck opening 18 within the plane of the sheet member 12. The neck opening 18 comprises an interior aperture of the sheet member 12. In this embodiment, the sheet member 12 comprises two sheets which are detachably connected by second fastening means in the form of Velcro tabs 22. However, the tabard may be formed from a continuous sheet having a cut out aperture.
The neck opening 18 is located in a central region of the sheet member 12 to define the front and back panels of the tabard. Tie members 24 are provided for securing the front panel 14 to the back panel 16 when worn by a first user.
The convertible garment 10 also includes first fastening means in the form of a zip 20. The zip 20 is provided along each longitudinal edge 30, 32 and also the adjacent edge 34 of each of the front and back panels of the sheet member 12 in a continuous manner. When the zip 20 is closed, the sheet member 12 is converted to form an enclosure. This enclosure has an open end and a closed end and thus defines a sleeping bag.
™
Figure 1 (b)
A break or interval 36 is provided at the central region of each longitudinal edge 30, 32 of the sheet member 12. Therefore, the zip 20 does not close the edges 30, 32 all the way round to the neck opening 18. The Velcro tabs 22 are located at each interval so that the convertible garment 10 includes two arm openings 19 when the zip 20 and the tabs 22 are fastened. The sheet member 12 is therefore convertible from an apron to form a baby sleeping bag and this is shown in .
The convertible garment 10 is primarily intended for use by a care giver, such as a parent, guardian or care worker. The apron comprises an absorbent material so as to provide functionality as a bib.
In use, a first user, such as the care giver, wears the convertible garment 10 as an apron. The child can be cradled by the care giver or be positioned on the care giver's knee and the apron will act as a bib to protect the clothing of the care giver. The child may then fall asleep, resting on the apron in the chest area of the care giver.
Figure 1 (a)
™
™
The care giver may then, without substantially moving the child, pull the back panel 16 upwards and over the head of the care giver in the direction of arrow A in , thus removing the apron. Or, if preferred, the Velcro tabs 22 can be unfastened to detach the back panel 16 from the front panel 14. Either way, the back panel 16 can then be draped over the child, and the Velcro tabs 22 reattached and the zip 20 closed such that the child's arms extend from the arm openings 19. The child is then safely positioned in the baby sleeping bag.
Pulling means (not shown) may be provided to assist with pulling the back panel member upwards and over the head of the care giver. This could comprise a tie which is connected to the bottom edge of the back panel 16, the tie being pulled downwards from the front. A shoulder guide (not shown) may be provided to ensure that downward pulling of the tie from the front results in upward movement of the back panel 16.
Figure 2
shows a variation in which discrete snap fasteners 26 are used for both the second fastening means and for securing the front panel 14 to the back panel 16 when worn by as an apron. A zip 20 is still provided for converting to a sleeping bag.
Figure 3
™
™
™
Cradling of the child, or the child playing on the care giver's knee, promotes bonding between the care giver and child. To encourage this, shows a variation in which the front panel 14 includes a play panel 40 having a number of playthings 42 and symbols 44 arranged on the play panel 40. Some or all of these can be detachable using Velcro or any other suitable means. The outer surface of the play panel 40 can be formed from the relatively soft Velcro eyes while the attachment surface of the detachable playthings 42 or symbols 44 can be formed from the relatively hard Velcro hooks.
Musical devices (not shown) can also be arranged at the play panel, such as sewn into the lining of the play panel 40. The devices could include an operating member provided at the outer surface of the play panel 40. The operating member could graphically represent a musical instrument such as a musical keyboard or a musical note or a horn or rattle or the like.
Figure 4
The play panel 40 may have any shape. shows a variation of this embodiment in which the play panel 40 has the profile of a teddy bear head. The play panel 40 also includes multicoloured artwork (not shown).
Figure 5
™
shows a second embodiment of the invention. In this embodiment, the convertible garment 10 is formed from a single sheet defining the front panel 14. A longitudinal member or wrap 50 extends from one shoulder region of the front panel 14 and loops around before fastening to the other shoulder region of the front panel 14 using third fastening means in the form of Velcro tabs 22. This defines the neck opening 18. Thus the front panel 14 again functions as an apron. Ties 24 are again provided in a waist region of the front panel 14 although they are longer to allow wrapping around the waist of the user.
Figure 5 (c)
The front panel 14 includes a recess or pocket 52 provided at a bottom edge of the front panel 14. The material of the convertible garment 10 is pliable so that the apron member can be folded or rolled starting at the top edge and then packed into the pocket 52 as shown in .
In this embodiment, the pliability of the apron member provides the first fastening means as the folded or rolled front panel 14 will be secured and remain within the pocket 52 due to tight packing. The dimensions of the pocket 52 are selected to ensure this tight packing. The pocket 52 defines the enclosure.
™
The convertible garment 10 can be packed and readily carried, such as during travelling. It is also possible to leave the ties 24 extending outwards from the pocket 52, due to their location lower down at the waist region, and the ties 24 can be used to tie the packed garment 10 around the user's waist. Closing means in the form of Velcro strips 54 are provided for closing the pocket 52. This closing means still allows the ties 24 to extend outwards from the pocket 52. Although not shown, the front panel 14 may include a play panel.
Figure 6
™
shows a variation in which the convertible garment 10 includes a back panel 16 similar to the first embodiment. Also Velcro tabs 56 are used to secure the front panel 14 to the back panel 16 at the waist region. The front panel 14 includes a play panel 40 and the pocket 52 can be utilized for storing the playthings and symbols.
Whilst specific embodiments of the present invention have been described above, it will be appreciated that departures from the described embodiments may still fall within the scope of the present invention. For instance, it is conceivable that the invention may have applications other than for care givers and children. For instance, the garment could function as a protective apron for medical workers which can be transferred to the patient to act as, say, a wound covering or protective blanket for a patient. In such case, the apron may be formed from a sterile dressing material. | |
On Monday night, ABC Family premiered a new reality docuseries — a rare occurrence for the network that usually focuses on scripted shows and the occasional reality competition. After watching Becoming Us, I'm so glad the network broke from its usual programming, because it is an honest, respectful look at a real family with a transgender parent. Becoming Us focuses on Ben Lehwald and his parents, Suzy and Carly, who recently divorced after Carly revealed she was transitioning into presenting as a woman. The show never feels exploitative or disrespectful, and I think its success is all due to the simple fact that Becoming Us lets the Lehwalds tell their own story, and offers many different perspectives.
Ben is the central focus of the show, and though his relationship with Carly and struggle to deal with her transition is clearly emphasized, we also get to see him spending time with his other parent, sister, girlfriend, and friends, making it clear that neither Ben nor Carly is defined by her transgender status. Between various scenes from Ben's life, we often get talking heads from the Lehwalds and friends, letting each of them express their own emotions, in their own words. Sometimes, they don't use the right pronouns when talking about Carly, or use problematic phrases when describing her gender, but I find those issues to enhance the authenticity of Becoming Us. It doesn't feel like there is someone off-camera coaching them, or like they've memorized their words. They are truthfully discussing their feelings, letting viewers see what their lives are really like.
Sometimes those feelings can be difficult to watch. In the first episode, Carly tells Ben that she is planning on having surgery to treat her gender dysphoria, and Ben does not react positively. He explains that to him, the surgery finalizes Carly's transition, and that it's essentially the final sign that things won't "go back to normal." As much as Carly expresses her love for Ben and tries to reassure him that she's the same person, Ben can't help but struggle with what to him, feels like a big change. Later in the episode, Ben affirms that he loves Carly, but says that it doesn't mean he understands what she's going through.
Becoming Us doesn't gloss over Ben's feelings, but it doesn't present them as right or pass judgement on them at all. It just shows them to you, along with Carly's own feelings and Suzy's. It even presents a totally different narrative, as Ben's girlfriend Danielle also has a transgender parent, though unlike Carly, he still uses male pronouns and has not changed his name from Daniel. By letting all of these people share their own stories and not filtering their emotions, Becoming Us successfully lets viewers into the life of a real family with a transgender parent, without glossing over the messy times or over-exaggerating the good. If it continues with this truthful depiction of the Lehwalds, ABC Family's new show has the potential to make an enormous, positive impact on the transgender community by helping those outside it understand the many different journeys people like Carly, Daniel, and their families go through. | https://www.bustle.com/articles/88911-becoming-us-introduces-the-lehwald-family-lets-them-tell-their-own-story |
Weather :
Timings : 8:00 AM - 5:30 PM (April-June), 8:30 AM - 5:00 PM (July-March). Closed on Mondays.
Time Required : 3-4 hours
Entry Fee : Adults: INR 20 and Children: INR 10, Train ride- Adults: INR 15 and Children: INR 5, Safari ride- Adult: INR 25 and Children: INR 10
With over 1500 species finding habitat here, the Nehru Zoological Park is one of the most loved attractions in the city. Neighbouring the Mir Alam tank, it is also known as Hyderabad Zoo. The massive enclosure plays host to Indian Rhino, Asiatic Lion, Bengal Tiger, Indian Elephant as well as panthers, pythons, deer, and antelopes. Given the proximity to the tank, a number of migratory birds can also be spotted here. It is among the largest zoos in India at 380 Acres and is popular among visitors as the animals here have been kept in enclosures that resemble their natural habitat.
Once inside, the zoological park offers a number of safaris including Lion, Tiger, and Bear Safaris. For kids, there are many fun activities and enclosures like the Dinosaur Park visit, Mini train ride and elephant rides. The zoo also has a museum detailing its natural history. Migratory birds are known to arrive every year to the Mir Alam tank lake and its embankment, making it their home for a few months and adding to the biological diversity of the place. | https://www.holidify.com/places/hyderabad/nehru-zoological-park-sightseeing-2055.html |
BACKGROUND
SUMMARY
DETAILED DESCRIPTION
To prevent email spam and other malicious activities, email providers have attempted to identify attackers based on abnormal signatures associated with their activities. However, as the attackers evolved and changed their strategies, the abnormal signatures changed as well, making it more difficult for email providers to detect the activities.
Other defenses include reputation systems that assign a reputation score to each of the users based on a set of rules that examine an individual user's email communication patterns. However, the set of rules for detecting attackers are not robust and attackers can easily game the system once they learn the rules. Yet another is a geolocation-based defense system, which marks a user as suspicious if the user logins are from disparate geographic locations. However, geolocation-based systems can be defeated by changing the login pattern of user accounts under control of attackers.
Disclosed herein are methods and systems providing techniques to identify legitimate users of services, such as email, chat, social media sites and the like. Knowledge of legitimate users may be used by service providers in several ways. For example, service providers do not have to trade off usability for security after having identified the legitimate users. As such, they can devote more resources and quality of service guarantees to legitimate users so that their normal activities are not impaired by attackers. Protecting legitimate users is a robust approach to defend against ever-changing attacks. The service providers may combat attacks knowing that the set of legitimate users is relatively stable and has common patterns that do not change significantly. Service providers can aid in the detection of malicious users by identifying legitimate users and their associated user signatures and profiles. This information may be used in a complementary fashion with attacker detection based approaches.
In some implementations, a core set of trusted users is identified by determining connected components of user friendship graphs, and all users on the biggest connected component are identified. The core set of trusted users may be used to identify more legitimate users by looking at their communication to the set of trusted users, e.g., email communications. Graph features of the identified legitimate users are derived to detect hijacked users and malicious users. For example, PageRank and degree-based detection techniques may be used to detect spammer email accounts.
This summary is provided to introduce a selection of concepts in a simplified form that are further described below in the detailed description. This summary is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to be used to limit the scope of the claimed subject matter.
The present disclosure describes systems and methods for both identifying legitimate users and detecting hijacked and attacker email accounts, such as those used by spammers. A social graph may be constructed of email users, and biggest connected components (BCC) of the graph are identified to recognize legitimate users. Further, a degree-based algorithm and a PageRank-based detection algorithm may be applied to the social graph to identify the attackers' email accounts. In addition, the users' email sending and receiving behaviors are analyzed, and techniques like subgraph structures are applied to detect stealthy attackers.
FIG. 1
FIG. 1
100
100
110
120
110
120
110
120
Referring to , there is illustrated an exemplary networked computing email account management system in which processes of the present disclosure may be implemented. The email account management system may include one or more detection servers, shown as detection server , and one or more email servers, shown as email server . shows only one detection server and one email server for purpose of clarity and should not be construed to limit the present disclosure to implementations having only one detection server and one email server .
120
130
124
110
120
110
120
122
120
124
The email server may send and receive emails, monitor and log email traffic for one or more email accounts , and may generate reports that are sent to the detection server . The email server may run on a separate computer from the detection server , or on the same computer. The email server may also include a database , which stores information about email that passes through the email server and information about the one or more email accounts .
120
122
The email server may process emails and logged information about the emails in the database , including, but not limited to, the sending email account, the recipient email accounts, the number of recipients, the number of attachments, if any, the time and date of the email, the size in bytes of the email body, the size in bytes of the subject line, the number and list of “keywords” in the email subject line or body, other linguistic features of the email content (e.g., the number of nouns or noun phrases, the frequency distribution of words, the frequency distribution of n-grams, and/or other such linguistic features commonly known in the art), as well as other recorded properties of the email (some that may be inferred by application of a probabilistic, statistical, or classification model which may label the email with some category of interest).
110
112
114
116
114
120
130
110
120
120
100
110
The detection server may run at a central location and may include a database , a communication component , and an analysis component . The communication component receives and sends information to and from the email server . Information about the email traffic may be transmitted to one or more detection servers from the email server , and vice versa, such that each email server in the email account management system is aware of any findings by the detection server .
116
130
The analysis component analyzes email traffic and account activity and may identify various types of spamming attacks launched from email accounts. Such attacks include, but are not limited to, a simple attack, a colluded attack without hijacked accounts, and a colluded attack with hijacked accounts. Simple attacks are those where a malicious email account is created by attackers that is used to send out spam emails without the help of other malicious email accounts. A collusive attack without hijacked accounts comprises a group of accounts created by attackers, i.e., non-hijacked accounts that are used for spamming and colluding among themselves. The colluded attack with hijacked accounts comprises a group of malicious accounts, which may be either created by attackers or hijacked accounts that are used for spamming and colluding among themselves.
116
d
d
1
2
d
1
2
u
1
2
u
u
1
2
u
1
2
2
1
1
2
1
2
To detect the attacks, in some implementations, the analysis component may construct two graphs: an email-communication graph (a directed graph) and a user friendship graph (an undirected graph). On both graphs, each node corresponds to an email user represented by a unique email address. Edges on both graphs may be weighted. For the directed communication graph (G), an edge e(v; v)εEwith weight w means user vhas sent w emails to vduring the data collection period. An edge e(v; v)εEon the undirected friendship graph (G) means vand vhave mutually sent at least two emails to each other. Its weight may be defined as w(e)=min(n(v; v); n(v; v)), where n(v; v) represents the number of emails sent from vto v.
116
116
FIGS. 2-4
The analysis component may use the user friendship (undirected) graph to identify good (i.e., legitimate) users, as the majority of the users in the biggest connected components are legitimate users. The email communication graph may be used to detect spammer accounts using degree-based detection techniques and PageRank-based detection techniques. In graph theory, a “connected component” of an undirected graph is a subgraph in which any two nodes (vertices) are connected to each other by paths, and which is connected to no additional vertices. The BCC of a graph is the largest subgraph where all nodes in the subgraph are reachable by all other nodes in the subgraph. As such, the BCC can be used to rapidly identify and expand a core set of good and active users using the directed graph (i.e., the users to which the good users in the BCC communicate). Optionally or additionally, the users' email sending and receiving behaviors may be compared, and subgraph structures may be used to detect stealthy attackers. Further details of the techniques implemented by the analysis component are described below in .
110
110
100
The detection server may be operated by a trusted third party, an email service provider, a social network service provider, a corporate network, etc., to propagate a list of known “bad” (i.e., malicious) email accounts to the email servers. This propagation may be automated for rapid update of the email servers. The detection server may aggregate statistics obtained from the email servers which allows the email account management system to monitor email flows at a global level.
FIG. 2
200
202
204
206
208
210
212
214
200
204
206
204
202
illustrates an exemplary social graph associated with an email system. Each node , , , , , , and of the social graph may be an account uniquely defined by, e.g., an email address. Each directed edge of the social graph is determined from recipients of emails sent from the account or from senders of emails to the account. For example, if Alice sends emails to Bob, an edge (A) pointing from the node associated with Alice (i.e., node ) to the node associated with Bob (i.e., node ) is added in the social graph. The direction of the edge represents the flow of emails. In some implementations, each edge may also be assigned a weight indicating how trustworthy this edge is. The edge weight may be determined by various factors, including a number of emails, whether any emails have been marked as spam, a time span between emails sent to the recipient, etc. Undirected edges, such as B, exist if a sender and recipient both send emails to each other. For example, if Alice (node ) and Harry (node ) both send emails to each other and there are two directed edges between them, then the undirected edge B between them represents a friendship. In some implementations where weights are used as noted above, as multiple emails in each direction may be required for a friendship.
200
202
204
206
208
Several conclusions may be drawn from the social graph . For example, legitimate (also referred to as “good”) users typically receive emails from other good users. Such communication is shown by the circle of good users in the BCC to which nodes , , , and belong. Malicious (also referred to as “bad”) users may communicate with good users, but their communication is typically directed to the good users without a reply. As such, edges associated with bad users are typically directional (e.g., edge C). Emails sent to bad users from good users are suspicious (e.g., edge D), as this is usually an error on the part of the good user. Also, it is generally difficult for bad users to enter good users' communities.
116
As noted above, good users are typically found in the BCC. Although there could be other connected components separate from this one in the graph (not shown), their size would be much smaller. For example, if two users only email each other and do not communicate with any other users, there is a connection between them and these two users form a small connected component of size two. Therefore, the graph may contain different connected components of varying weights. With the knowledge of legitimate user set on BCC, the analysis component may proceed to identify additional legitimate users in a process using the email-communication (directed) graph and the following observation: legitimate users usually send emails to other legitimate users, not to spammers. So the directed email-communication graph can be used to identify the email recipients of BCC users and define them as also legitimate users. Essentially in this process, the legitimacy of BCC users “vouches” for the legitimacy of their email recipients.
During the legitimate user expansion process, two heuristics may be applied to avoid mistakenly including malicious accounts in the expanded legitimate user set. For example, for a user to be included, she may be required to first receive a number of emails from multiple BCC users. A legitimate user may have accidentally replied to a spam email, thus by requiring a user to receive emails from multiple BCC users, the possibility of including spammer accounts in the expanded legitimate user set is reduced. In another example, all the BCC users that have degree larger than a preset threshold μ(=5000, for example) may be removed before the expansion process is performed. Such users include active, large email lists that do not correspond to real human users. Using the later heuristic reduces the chance of a spammer account being included because it triggers auto-reply type messages from large email lists or subscribe to these large email lists.
In practice, the implicit “vouching” process described above may be used to determine the legitimacy of new users. Many service providers today ask a new user to perform CAPTCHA tests for every 20-30 emails they send or limit their daily maximum number of messages. The implicit “vouching” process can potentially replace CAPTCHA so that legitimate new users are recognized earlier. Further, this strategy can defend against attackers who redirect CAPTCHA to cheap laborers.
In addition, the communications from authoritative entities may be used to vouch for legitimate new users. For example, receiving an order confirmation email from Amazon.com may indicate the user is likely a legitimate user.
FIG. 3
FIG. 3
116
300
illustrates an operational flow diagram of exemplary processes that are performed to identify attacker email accounts. The operational flow of may be implemented in, e.g., the analysis component . At , social graphs associated with all email accounts are constructed. For email accounts to be analyzed, the email-communication graph (directed graph) and a user friendship graph (undirected graph) may be constructed to provide a view of the connectivities associated with the email accounts.
302
116
At , the biggest connected component of the friendship graph (undirected graph) is determined. The analysis component may analyze the email-communication graph to identify the biggest connected component of the connected components in the email-communication graph. It is likely that the biggest connection component is several orders of magnitude larger than next largest connected component. The set of users on biggest connected component likely correspond to legitimate accounts actively used by human users.
304
116
At , a legitimate user expansion process is performed. As described above, the analysis component may expand the set of legitimate users using the email communication graph (directed graph) to identify the email recipients of set of users on the biggest connected component in the implicit vouching process.
306
116
At , a good user profile is determined. The analysis component may use the email-communication graph (directed graph) and a user friendship graph (undirected graph) to determine a profile of good users. The profile may be developed using degree-based and PageRank based evaluations. The degree-based detection is performed based on the edges of the social graph. The degree-based detection is effective for detecting users with obvious patterns, including inactive users who only send a few emails, aggressive attackers who send many emails with few responses, and active good users who have many friends. Degree-based detection looks at an in-degree, which is a number of source users who send emails to the user; an out-degree, which is a number of destination users to whom the user sends emails; and a friend-degree, which is a number of friends of the user (represented by an undirected edge).
A directional degree-based detection is defined based on a threshold N. If the out-degree is less than or equal to N, then the user account is considered good. A bidirectional degree-based detection is defined as follows: if the out-degree is less than N for inactive users, then the account is considered good. If the out-degree is greater than N and the friend-degree/out-degree (i.e., response rate) is greater than a second threshold, K, then the account is considered good; otherwise, the account is considered bad. Bidirectional degree-based detection is based on an assumption that attackers will have a lower response rate than normal users. To select suitable thresholds N and K, a known good set and bad set of users may be selected.
200
202
204
206
208
210
212
214
306
PageRank may be used to assign a reputation score to the email account associated with a node on the graphs. The PageRank algorithm is widely used for ranking web pages. For web pages, PageRank utilizes a reputation value of a web page that is propagated to the web pages with an initial distribution. The PageRank computation may be iteratively repeated until a convergence point is reached. In the context of an email account (i.e., a node in the social graph ), a reputation score is assigned to each node , , , , , , and in the social graph. The score is propagated to the node's recipients/senders, at , described below.
200
202
204
206
208
210
212
214
A,i+1
In particular, let the social graph be defined as follows: G=(V,E), where Vis a set of nodes (email accounts) and E is a set of edges. For the PageRank algorithm with G, each node , , , , , , and is initially assigned a uniform reputation score (e.g., 1.0). After the ith iteration, a node A's reputation score Ris given by equation (1):
<math overflow="scroll"><mtable><mtr><mtd><mrow><msub><mi>R</mi><mrow><mi>A</mi><mo>,</mo><mrow><mi>i</mi><mo>+</mo><mn>1</mn></mrow></mrow></msub><mo>=</mo><mrow><mn>1</mn><mo>-</mo><mi>d</mi><mo>+</mo><mrow><mi>d</mi><mo></mo><mrow><munder><mo>∑</mo><mrow><mo>{</mo><mrow><mi>X</mi><mo>:</mo><mrow><msub><mi>e</mi><mi>XA</mi></msub><mo>∈</mo><mi>E</mi></mrow></mrow><mo>}</mo></mrow></munder><mo></mo><mstyle><mspace width="0.3em" height="0.3ex" /></mstyle><mo></mo><mfrac><msub><mi>R</mi><mrow><mi>X</mi><mo>,</mo><mi>i</mi></mrow></msub><mrow><mi>outdegree</mi><mo></mo><mrow><mo>(</mo><mi>X</mi><mo>)</mo></mrow></mrow></mfrac></mrow></mrow></mrow></mrow></mtd><mtd><mrow><mo>(</mo><mn>1</mn><mo>)</mo></mrow></mtd></mtr></mtable></math>
X,i
XA
where d is a damping factor (e.g., 0.85 or other predefined value), Ris the reputation score of node X after the previous iteration, and {X: eεE} is the set of nodes in the graph having directed edges pointing to A. In some implementations, the original graph may be modified by adding an edge for each node starting and ending in itself, if this self-loop edge does not exist. This modification would have negligible impact on the overall ranking of all nodes, but provides for conservation of reputation, i.e., after each iteration, the sum of all nodes' reputation remains constant and is the same as the initial sum |V|.
This property (|V|) may be given by relationships (2)-(4):
<math overflow="scroll"><mtable><mtr><mtd><mrow><munder><mo>∑</mo><mrow><mo>{</mo><mrow><mi>A</mi><mo>∈</mo><mi>V</mi></mrow><mo>}</mo></mrow></munder><mo></mo><mstyle><mspace width="0.3em" height="0.3ex" /></mstyle><mo></mo><msub><mi>R</mi><mrow><mi>A</mi><mo>,</mo><mrow><mi>i</mi><mo>+</mo><mn>1</mn></mrow></mrow></msub></mrow></mtd><mtd><mrow><mo>(</mo><mn>2</mn><mo>)</mo></mrow></mtd></mtr><mtr><mtd><mrow><mo>=</mo><mrow><mo>|</mo><mi>V</mi><mo>|</mo><mrow><mrow><mo>(</mo><mrow><mn>1</mn><mo>-</mo><mi>d</mi></mrow><mo>)</mo></mrow><mo>+</mo><mrow><mi>d</mi><mo></mo><mrow><munder><mo>∑</mo><mrow><mo>{</mo><mrow><mi>A</mi><mo>∈</mo><mi>V</mi></mrow><mo>}</mo></mrow></munder><mo></mo><mstyle><mspace width="0.3em" height="0.3ex" /></mstyle><mo></mo><mrow><munder><mo>∑</mo><mrow><mo>{</mo><mrow><mi>X</mi><mo>:</mo><mrow><msub><mi>e</mi><mi>XA</mi></msub><mo>∈</mo><mi>E</mi></mrow></mrow><mo>}</mo></mrow></munder><mo></mo><mstyle><mspace width="0.3em" height="0.3ex" /></mstyle><mo></mo><mfrac><msub><mi>R</mi><mrow><mi>X</mi><mo>,</mo><mi>i</mi></mrow></msub><mrow><mi>outdegree</mi><mo></mo><mrow><mo>(</mo><mi>X</mi><mo>)</mo></mrow></mrow></mfrac></mrow></mrow></mrow></mrow></mrow></mrow></mtd><mtd><mrow><mo>(</mo><mn>3</mn><mo>)</mo></mrow></mtd></mtr><mtr><mtd><mrow><mo>=</mo><mrow><mo>|</mo><mi>V</mi><mo>|</mo><mrow><mrow><mo>(</mo><mrow><mn>1</mn><mo>-</mo><mi>d</mi></mrow><mo>)</mo></mrow><mo>+</mo><mrow><mi>d</mi><mo></mo><mrow><munder><mo>∑</mo><mrow><mo>{</mo><mrow><mrow><mi>X</mi><mo>:</mo><mrow><mo>∃</mo><mrow><mi>A</mi><mo>∈</mo><mi>E</mi></mrow></mrow></mrow><mo>,</mo><mrow><mrow><mi>s</mi><mo>.</mo><mi>t</mi><mo>.</mo><msub><mi>e</mi><mi>XA</mi></msub></mrow><mo>∈</mo><mi>E</mi></mrow></mrow><mo>}</mo></mrow></munder><mo></mo><mstyle><mspace width="0.3em" height="0.3ex" /></mstyle><mo></mo><mfrac><msub><mi>R</mi><mrow><mi>X</mi><mo>,</mo><mi>i</mi></mrow></msub><mrow><mi>outdegree</mi><mo></mo><mrow><mo>(</mo><mi>X</mi><mo>)</mo></mrow></mrow></mfrac></mrow></mrow></mrow></mrow></mrow></mtd><mtd><mrow><mo>(</mo><mn>4</mn><mo>)</mo></mrow></mtd></mtr></mtable></math>
In the above, each edge in the graph contributes to one term in the sum, so relationship (4) can be written as relationship (5):
<math overflow="scroll"><mtable><mtr><mtd><mrow><mo>=</mo><mrow><mo>|</mo><mi>V</mi><mo>|</mo><mrow><mrow><mo>(</mo><mrow><mn>1</mn><mo>-</mo><mi>d</mi></mrow><mo>)</mo></mrow><mo>+</mo><mrow><mi>d</mi><mo></mo><mrow><munder><mo>∑</mo><mrow><mo>{</mo><mrow><mrow><mi>X</mi><mo>:</mo><mrow><mo>∃</mo><mrow><mi>A</mi><mo>∈</mo><mi>E</mi></mrow></mrow></mrow><mo>,</mo><mrow><mrow><mi>s</mi><mo>.</mo><mi>t</mi><mo>.</mo><msub><mi>e</mi><mi>XA</mi></msub></mrow><mo>∈</mo><mi>E</mi></mrow></mrow><mo>}</mo></mrow></munder><mo></mo><mstyle><mspace width="0.3em" height="0.3ex" /></mstyle><mo></mo><msub><mi>R</mi><mrow><mi>X</mi><mo>,</mo><mi>i</mi></mrow></msub></mrow></mrow></mrow></mrow></mrow></mtd><mtd><mrow><mo>(</mo><mn>5</mn><mo>)</mo></mrow></mtd></mtr></mtable></math>
Because each node is the source of at least one edge according to the self-loop modification, relationship (5) can be written as relationship (6):
<math overflow="scroll"><mtable><mtr><mtd><mrow><mo>=</mo><mrow><mrow><mo>|</mo><mi>V</mi><mo>|</mo><mrow><mrow><mo>(</mo><mrow><mn>1</mn><mo>-</mo><mi>d</mi></mrow><mo>)</mo></mrow><mo>+</mo><mrow><mi>d</mi><mo></mo><mrow><munder><mo>∑</mo><mrow><mo>{</mo><mrow><mi>X</mi><mo>:</mo><mrow><mi>X</mi><mo>∈</mo><mi>V</mi></mrow></mrow><mo>}</mo></mrow></munder><mo></mo><mstyle><mspace width="0.3em" height="0.3ex" /></mstyle><mo></mo><msub><mi>R</mi><mrow><mi>X</mi><mo>,</mo><mi>i</mi></mrow></msub></mrow></mrow></mrow></mrow><mo>=</mo><mrow><mo>|</mo><mi>V</mi><mo>|</mo></mrow></mrow></mrow></mtd><mtd><mrow><mo>(</mo><mn>6</mn><mo>)</mo></mrow></mtd></mtr></mtable></math>
This indicates that for a group of nodes, the sum of their reputation scores will remain constant no matter how they are connected.
200
100
302
304
The PageRank based evaluation may develop a goodness score and a badness score for each node in the social graph from the reputation score. The goodness score is based on an assumption that when good users send emails to another email address, that recipient email address is highly likely to be good. As such, the goodness score may be assigned to each node and propagated to its recipients. Using PageRank, after 40 to 50 iterations for example, the ranks of the nodes will converge to determine the goodness scores for the nodes in the social graph . In general, the more emails a user receives from other good users, the higher its goodness score. While receiving emails from spammers or mailing lists will increase a user's goodness, the increase is limited. This is because a spammer or a mailing list may have a high goodness score (since many users send to it), so that it has a high out-degree as well. So each of its recipients will only receive a small amount of goodness during propagation. This property increases the difficulty in spoofing the email account management system . For example, if an attacker subscribes to mailing lists, the degree-based detection at may be circumvented; however, to defeat the PageRank-based detection at , the attacker has to subscribe to a large number of mailing lists which is not a simple task.
In order to make the propagation more accurately reflect the real relations among different nodes, in some implementations, an edge weight may be adjusted based on communication patterns. For example, if there is strong indication that a good user is sending to a bad user (e.g., the bad user sends a large number of emails and the number of good user's emails to the bad user are few), the goodness propagated to that bad user may be adjusted to be smaller. Similarly, if there is strong indication that a user is sending to one of his friends (e.g., email communication is balanced among the two), the goodness propagated to the recipient-friend is relatively larger. In some implementations, edges may be adjusted by a weight based on an age component. Because a healthy user community normally takes time to build, a newly formed connected component of nodes may be suspicious if a majority of its edges are very recent communications.
200
A badness score may be determined to indicate how likely a user is bad, e.g., a spammer. The badness score may be calculated based on the inverse edges in the social graph . Because spammers normally send many emails, the badness propagation is defined as that from the recipients to the sender. As such, spammers would receive more badness propagation. The above is based on the assumption that if a good user sends emails to a bad account, this behavior would not be normal because a good user will typically not send to a spammer (however, sometimes, a good user may also respond to spam). Attackers may also create a group of accounts and make them send emails among themselves in an effort to defeat detection. However, using the badness score, the bad users sending emails to bad users can be detected.
In some implementations, an edge weight adjustment may be defined for badness propagation. A good user will propagate more badness to a bad user, and less to his friends who are also good users. This adjustment mitigates the problem of a good user who accidentally or for another reason responds to spam emails, because in most of these cases, spammers send out many more emails to good users rather than the opposite.
In some instances, using the individual goodness and badness scores may not separate good users from bad users. This is because some bad users may have higher goodness scores than inactive good users. As such, the badness-goodness ratio may be used as a metric to separate the good users from the bad users. Using training user sets of good and bad users, a badness-goodness ratio may be set, for example, at a threshold of 5 to separate bad users from good users. In other words, if the badness score is more than five times larger than the goodness score for an email account, the email account is bad; otherwise, it is good.
308
116
At , hijacked accounts are determined. The analysis component may analyze one or more of the following social-graph features to determine if an email account has been hijacked. An outdegree D(v) of a node v on the directed email-communication graph may be determined by the relationship D(v)=|R(v)| where R(v) stands for the set of email recipients of v. Since the goal of attackers is to send spam to as many recipients as possible, it is expected that hijacked users will have large outdegrees. Other features can include the PageRanks introduced earlier in the document, including the goodness scores and badness scores, and the distance of the set of email users that received email from an account.
In view of the above, for normal users, the outdegree D(v) follows a Poisson distribution, and the average distance I(v) follows normal distribution. However, for hijacked users, the outdegree distribution has heavy tail and the average distance will be large. Thus, hijacked email accounts may be identified based on the features noted above.
310
116
At , malicious accounts may be determined based on the developed good user profile. For example, accounts that deviate from the profile may be identified by the analysis component as malicious user accounts or hijacked user accounts and appropriate actions taken.
FIG. 3
Thus, the operational flow of may be used to separate good email accounts from bad email accounts associated with attackers who send spam or other malicious content, and hijacked email accounts that are associated with legitimate users but compromised by attackers.
FIG. 4
FIG. 1
FIG. 3
FIG. 4
400
100
400
116
402
404
406
408
410
412
illustrates an exemplary account management framework , which may be implemented in the email account management system of and may implement the operational flow of . As illustrated in , the account management framework may be implemented in the analysis component , and may include a registration component , a vouching component , a trusted component , a quarantine component , an account removal component , and an account recovery component .
402
The registration component serves to register new user email accounts. Users enter information and may be asked to pass a reverse Turing test, such as CAPTCHA. Turing tests are tests of a machine's ability to demonstrate human intelligence. CAPTCHA is a particular variant that protects websites against bots by generating and grading optical character recognition tests that humans can pass, but current computer programs cannot. For example, humans can read distorted text displayed in a verification window, but current computer programs cannot.
404
406
408
FIG. 3
Newly created accounts are placed into the vouching component , which implements a vouching process that uses various channels to validate user identity, such as that described with respect to . If the new account completes the vouching process, it is placed into the trusted component . Otherwise, it is placed into the quarantine component .
406
408
410
412
FIG. 3
In both the trusted component and quarantine component , a method such as the method of may be implemented to monitor and detect abnormal behaviors associated with the email accounts. For accounts that are known to be malicious and are not recoverable, they will be put into the removal component and may be removed. If suspicious activity is identified in what was believed to be good accounts, then additional actions may be performed to help users recover their accounts in the recovery component . A more detailed description of each component follows.
402
400
402
404
404
The registration component may be implemented in a similar fashion as existing social applications, in which users are asked to enter information into the system and pass a reverse Turing test. Because such tests can be defeated, the account management framework operates under the assumption that attackers will pass this registration component . As such, the vouching component is provided to offer a newly registered user options to “vouch” for the account. The vouching component provides for stronger authentication and to make it difficult for the attackers to create fake identities. For example, vouching options may include, but are not limited to, binding the newly registered email account with a mobile telephone number, a credit card, or a home address, etc.
404
404
404
408
FIG. 3
In some implementations, the vouching component may use social connectivity information to verify the user identify, as described above with regard to . Implicit vouching and explicit vouching options may be provided. With implicit vouching, a new user may be required to receive emails from a sufficient number of senders before the user obtains the privilege to send emails. In the evaluation process, the vouching component will check the connectivity among the list of users and each individual account's reputation, whether the user is on BCC, and lifetime, etc. Qualified accounts (nodes) in the social graph may be selected as vouchers, based upon which the vouching component will decide whether to trust the new account. If not, the new account will be put into the quarantine component .
404
In some implementations, the newly registered email account may be immediately able to send a limited number of emails. These email accounts may send emails before receiving any from the BCC senders. For these users, explicit vouching may be provided as an option. For example, user's contact list may be considered in constructing the social graph. In addition, external social graphs from other services (e.g., Facebook, LinkedIn) may be incorporated too. The account management framework may then ask each user identified in the list whether they can confirm that the new account user is a real user. A similar evaluation process as implicit vouching may then apply (e.g., checking the connectivity among the list of users and each individual account's reputation, whether in BCC and lifetime, etc.). In yet other implementations, identified well trusted users on BCC may be used to “vouch” for more legitimate users.
404
400
400
In some implementations, the vouching component may limit the number of times a particular email account can be used as a voucher in order to prevent attackers from using hijacked accounts. If a voucher email account is found to be hijacked, backtracking may be added into the framework , i.e., if the framework detects that a new account passed the vouching component and later turns into a bad email account (e.g., a spamming account), all related vouchers are then marked as suspicious, along with any other new accounts that the related vouchers have vouched for.
404
408
408
After an email account is processed in the vouching component , some accounts may be put into the quarantine component , including most attacker-created accounts and a limited number of accounts of legitimate users. The quarantine component may limit the functionality of each account placed therein. The behavior of each account may also be monitored, with the reputation of the account updated over time.
400
406
410
408
After a period of time, the account management framework may move the account into the trusted component or the account removal component . For example, an account may be quarantined until the account sends emails to, e.g., a predetermined number of destination addresses, such as 25, 50, or 100 destination addresses. While quarantined, the account can send only a small number of emails on a daily basis, which may be very inconvenient to highly actively legitimate users, but thwarts active spammers. Using the BCC, a good user account can quickly prove its legitimacy if the account receives emails from different users located in the BCC. As such, good user email accounts can pass the quarantine component fairly quickly.
408
The following metrics may be used for making the judgment to move an account into or out of the quarantine component :
(1) Badness-to-goodness ratio: spammers have a significantly different ratio from legitimate users, as discussed above.
(2) Clustering coefficient of the recipient set: legitimate users tend to send emails to a defined group of users rather than a group of random users.
(3) How many BCC users sent email to this account: legitimate users have a high probability of connecting with BCC or receiving emails from BCC users over time.
(4) The features described above for hijacked user detection, e.g., graph distance between contacts.
406
406
404
408
400
412
Once the account is trusted by the system, it would be granted the intended functionality of legitimate users by the trusted component . A similar set of metrics as noted above may be used to detect abnormal behaviors of email accounts in the trusted component , as a trusted email account could be hijacked during its lifetime, or a stealthy malicious account may have passed the vouching component or the quarantine component . If the account management framework detects a significant change in the account behavior represented by the social graph based metrics described above, the email account may determine that the email account has been hijacked, and the account may be moved to account recovery component , such that the hijacked account can be returned to exclusive control by its rightful owner.
412
400
408
In the account recovery component , the account management framework may try various ways to help the owner of hijacked account to regain control of the account, including but not limited to, contacting the cell phone number bound with the account, asking security questions created by the user during registration, etc. Once the account recovery is completed, the account may be placed into the quarantine component . This is performed because attackers could buy email accounts from legitimate users for spamming purposes, or the account may have been a stealthy malicious account.
410
410
However, if the account recovery is not able to complete within a time window, it would be put into account removal component to prepare it for final removal. The account removal component is provided to save resources that are consumed maintaining email accounts. Accounts known to be malicious with little hope of recovery may be moved into a recycle bin or removed permanently.
Thus, as described above, systems and methods are provided to determine legitimate users, malicious users, and legitimate users who have been compromised based on the social connectivity patterns of the users.
Aspects of the subject matter may be implemented in the general context of computer-executable instructions, such as program modules, being executed by a computer. Generally, program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types. Aspects of the subject matter may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, program modules may be located in both local and remote computer storage media, including memory storage devices.
FIG. 5
shows an exemplary computing environment in which example embodiments and aspects may be implemented. The computing system environment is only one example of a suitable computing environment and is not intended to suggest any limitation as to the scope of use or functionality.
Numerous other general purpose or special purpose computing system environments or configurations may be used. Examples of well known computing systems, environments, and/or configurations that may be suitable for use include, but are not limited to, personal computers (PCs), server computers, handheld or laptop devices, multiprocessor systems, microprocessor-based systems, network personal computers, minicomputers, mainframe computers, embedded systems, distributed computing environments that include any of the above systems or devices, and the like.
FIG. 5
FIG. 5
500
500
502
504
504
506
With reference to , an exemplary system for implementing aspects described herein includes a computing device, such as computing device . In its most basic configuration, computing device typically includes at least one processing unit and memory . Depending on the exact configuration and type of computing device, memory may be volatile (such as random access memory (RAM)), non-volatile (such as read-only memory (ROM), flash memory, etc.), or some combination of the two. This most basic configuration is illustrated in by dashed line .
500
500
508
510
FIG. 5
Computing device may have additional features/functionality. For example, computing device may include additional storage (removable and/or non-removable) including, but not limited to, magnetic or optical disks or tape. Such additional storage is illustrated in by removable storage and non-removable storage .
500
500
Computing device typically includes a variety of computer readable media. Computer readable media can be any available media that can be accessed by device and includes both volatile and non-volatile media, removable and non-removable media.
504
508
510
500
500
Computer storage media include volatile and non-volatile, and removable and non-removable media implemented in any method or technology for storage of information such as computer readable instructions, data structures, program modules or other data. Memory , removable storage , and non-removable storage are all examples of computer storage media. Computer storage media include, but are not limited to, RAM, ROM, electrically erasable program read-only memory (EEPROM), flash memory or other memory technology, CD-ROM, digital versatile disks (DVD) or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store the desired information and which can be accessed by computing device . Any such computer storage media may be part of computing device .
500
512
500
514
516
Computing device may contain communications connection(s) that allow the device to communicate with other devices. Computing device may also have input device(s) such as a keyboard, mouse, pen, voice input device, touch input device, etc. Output device(s) such as a display, speakers, printer, etc. may also be included. All these devices are well known in the art and need not be discussed at length here.
It should be understood that the various techniques described herein may be implemented in connection with hardware or software or, where appropriate, with a combination of both. Thus, the methods and apparatus of the presently disclosed subject matter, or certain aspects or portions thereof, may take the form of program code (i.e., instructions) embodied in tangible media, such as floppy diskettes, CD-ROMs, hard drives, or any other machine-readable storage medium where, when the program code is loaded into and executed by a machine, such as a computer, the machine becomes an apparatus for practicing the presently disclosed subject matter.
Although exemplary implementations may refer to utilizing aspects of the presently disclosed subject matter in the context of one or more stand-alone computer systems, the subject matter is not so limited, but rather may be implemented in connection with any computing environment, such as a network or distributed computing environment. Still further, aspects of the presently disclosed subject matter may be implemented in or across a plurality of processing chips or devices, and storage may similarly be effected across a plurality of devices. Such devices might include personal computers, network servers, and handheld devices, for example.
Although the subject matter has been described in language specific to structural features and/or methodological acts, it is to be understood that the subject matter defined in the appended claims is not necessarily limited to the specific features or acts described above. Rather, the specific features and acts described above are disclosed as example forms of implementing the claims.
BRIEF DESCRIPTION OF THE DRAWINGS
The foregoing summary, as well as the following detailed description of preferred embodiments, is better understood when read in conjunction with the appended drawings. For the purposes of illustration, there is shown in the drawings exemplary embodiments; however, these embodiments are not limited to the specific methods and instrumentalities disclosed. In the drawings:
FIG. 1
illustrates an exemplary networked computing email account management system in which processes of the present disclosure may be implemented;
FIG. 2
illustrates an exemplary social graph associated with an email system;
FIG. 3
illustrates an operational flow diagram of exemplary processes that are performed to identify attacker email accounts;
FIG. 4
FIG. 1
illustrates an exemplary account management framework, which may be implemented in the email account management system of ; and
FIG. 5
shows an exemplary computing environment. | |
Human Error as a Factor in Corrosion Failure
Takeaway:
Mitigating human errors requires the same careful use of protocols, supervision, and inspection as reducing other corrosion factors.
Corrosion failure happens for all kinds of reasons. Environmental conditions, the materials in question and the stresses that a material undergoes all play major roles. And while different materials, technologies and processes are thoroughly discussed in industries where corrosion is an issue, one of the least addressed contributing factors to corrosion is human error. It can occur for a number of reasons:
Lack of communication
Unwillingness to improve the situation
Lack of knowledge
Distractions
Lack of teamwork
Stress and fatigue
Lack of resources
Pressure
Lack of assertiveness
Lack of awareness
Insufficient control and supervision
Here we'll take a look at how human error contributes to corrosion failure and what can be done to mitigate its effects.
Where Human Error Occurs
Any project consists of many stages, beginning at manufacturing and design, all the way through construction, and ending with supervision and maintenance work. Human error can occur at one or all of the above stages.
The design stage of any metallic system is the most important one; if a major error occurs at this stage, it significantly raises the risk of corrosion failure. There are many factors to be considered for optimum design, including material selection, wall thickness and diameter (for pipelines), as well as corrosion allowance and corrosion control measures. (For a primer on this subject, see An Introduction to Pipeline Corrosion and Coatings.)
Email Newsletter
All metallic structures suffer from internal or external corrosion according to their applications. So, the metal type and grade must be compatible with the medium being used, and a suitable corrosion control technique must be selected and applied to mitigate corrosion. Corrosion control is achieved by coating, lining, chemical inhibitors, or cathodic protection (CP) systems. These techniques may be combined to ensure good performance along the system life.
It's common to use a coating in conjunction with cathodic protection and for the applied coating to be inspected before the installation of the metallic system in order to determine the efficiency of this coating. The deterioration of coating material due to its interaction with the surrounding electrolyte must be considered as well. An incorrect appreciation of these factors can lead to insufficient design of the cathodic protection system and accelerated corrosion of the structure. (Be sure to read The Basics of Cathodic Protection for an introduction to CP.)
Many faults may exist during construction of metallic systems, such as faults in coating or lining application or faults in welding processes. Many such factors must be considered to eliminate these faults, such as ambient temperature, metallic system temperature, surface finishing during manufacturing, and surface preparation before application.
Because there are so many factors at play, corrosion supervision is necessary for predictive maintenance (PdM). Corrosion supervision is achieved by measuring the corrosion rate. A number of techniques are used in order to determine the corrosion rate, such as measuring weight loss or measuring thickness. Corrosion coupons and smart pigs are another form of corrosion monitoring equipment. Human error in the selection of corrosion monitoring equipment, determining the accuracy of this equipment, or analyzing the output data may lead to unpredictable corrosion failure.
Types of Human Error
According to Neville W. Sachs in "Understanding Why It Failed," there are six key error categories that can contribute to corrosion failure.
1. Operational Errors
Win a $100 Amazon Gift Card | Help Us Improve by Completing a 2 Minute Survey
We would love to hear your thoughts or feedback to help us improve. Please fill out our 2 minute survey below and you could win a $100 Amazon Gift Card!
Operational errors occur when a system or process operates outside of or beyond the parameters of its design. For example, if specified operating practices call for a specific operating temperature, and a worker makes a decision to exceed this temperature, accelerated corrosion may be the result.
2. Design Errors
Design errors can occur when a system's design fails to match up to its application, or when the way the system is used is changed without a thorough review. This type of error can be an engineering error, or can occur when other workers install systems or machines without proper oversight.
3. Maintenance Errors
Maintenance errors occur when maintenance personnel fail to properly maintain or repair a system, or improperly install one of its components.
4. Manufacturing Errors
Manufacturing errors occur when components in a system are improperly manufactured or include flaws that can contribute to corrosion failure.
5. Installation Errors
Original installation of a system's components can cause corrosion failure if those components are installed incorrectly or without proper oversight.
6. Supervisory Errors
Supervisory errors are said to occur when a problem is noticed, but no action is taken. Often, a worker may believe that someone else will take care of the problem, or that it's someone else's responsibility.
How to Reduce Human Error
In order to mitigate human errors, human factors must be considered. Human factors are all those things that enhance or improve human performance in the workplace. As a discipline, human factors are concerned with understanding interactions between people and other elements of complex systems.
Human factors apply scientific knowledge and principles, as well as lessons learned from previous incidents and operational experience to optimize human well-being, overall system performance, and reliability. The discipline contributes to the design and evaluation of organizations, tasks, jobs and equipment, environments, products, and systems. It focuses on the inherent characteristics, needs, abilities, and limitations of people, and the development of sustainable and safe working cultures. In other words, mitigating human errors requires the same careful use of protocols, supervision, and inspection as reducing other corrosion factors. (Discover more management tools in Corrosion Knowledge Management versus Corrosion Management: An Essential Tool for Assets Integrity Management.)
Additionally, all work should be done according to applicable codes and standards, and should be completed by professionals.
| |
Administrator blindness affects the recording of eyewitness lineup outcomes.
We investigated the effects of administrator knowledge of suspect identity in a lineup (blind vs. nonblind), witness identification (suspect vs. filler), and witness confidence (high vs. low) on whether administrators recorded the identification as an affirmative response; whether administrators recorded qualitative notes regarding the lineup task; and the content of those qualitative notes. We predicted that nonblind administrators would record more identifications of the suspect than the filler, but blind administrators would record such identifications at comparable rates. We predicted this difference would be larger in the low (vs. high) confidence condition. We examined effects on administrators' qualitative notes in an exploratory fashion. Undergraduate participant administrators (N = 488) presented a lineup to a confederate witness (who made a scripted identification decision) and completed a record of the lineup task. Nonblind administrators recorded 25% fewer identifications of fillers (vs. suspects), and evaluated witnesses less favorably in the filler (vs. suspect) identification condition (ηp² = .194). Blind administrators were not influenced by witness selection. Blind (vs. nonblind) administrators recorded more qualitative notes, confidence statements, and information relevant to witnesses' decision processes, regardless of whether witnesses identified the suspect or the filler. Among those who recorded a confidence statement, nonblind administrators' characterizations were biased such that independent coders judged witnesses to be more confident in their identifications of the suspect (vs. filler). Blind administration eliminates numerous biases associated with administrator expectations and may yield more informative lineup records. These results further support blind lineup reform recommendations. (PsycINFO Database Record (c) 2019 APA, all rights reserved).
| |
Andrew was educated in Easingwold, Bishop Burton College and then Newcastle University where he graduated with honours in Agriculture and Estate management. Whilst at University, being a young entrepreneur, he purchased two properties to rent out in the Leeds area and that’s where his love of property began.
After graduating Andrew initially began his career in farming and whilst that is also one of his life’s passions the passion for property took over and he decided to diversify into Estate Agency in 2002. Andrew purchased the business of Waite & Co Horsforth and since then has acquired both the Guiseley and Otley Offices and joined forces with his two brothers Ian and Peter. Andrew believes in a strong and hard working ethic and bases his business practices on being independent and family run where commitment, dedication and quality of service is paramount.
Andrew and his two brother’s focus on what the customer wants and they ensure that their full range of services are available seven days a week and early evenings to allow their clients the opportunity to take advantage of viewings and valuations at times to suit their busy lifestyles. Andrew now resides in Rawdon with his wife and four young children and is heavily involved in the local community.
Contact Andrew
Tracey has been working in the estate agency industry since 1986 and has a wealth of knowledge and experience. Tracey began her career in the Bramley area of Leeds working for a small independent estate agent. Throughout her career she has experienced the corporate and independent worlds of estate agency and quickly decided that the work ethic and personal service offered by the independent estate agent determined a definite pathway which she wanted her career to take.
Tracey moved to work in the Horsforth area of Leeds in 1989 and this is where she has settled and remained. Tracey is highly regarded and respected within the profession and has a wealth of valued and loyal clients. She now holds the position of area manager overseeing the Horsforth residential sales and lettings divisions and the Guiseley and Otley offices. Tracey has an extremely strong work ethic, focused on family values and ensures that her loyal, committed and motivated teams are on top of their game and provide a first class service to all of our clients.
Contact Tracey
Richard was educated at Northallerton College and completed his A levels before leaving to commence his further higher education at Leeds Metropolitan University. Rich graduated in 2010 and commenced his working life, firstly, in recruitment. In 2012 Richard found an opportunity to diversify his career path to Property and joined the company, working from the highly successful flag ship office at Horsforth as a trainee sales negotiator. Rich quickly moved up the ranks to senior sales negotiator and then to assistant manager.
Richard has proven his excellent abilities and provides a top class, professional service to all of his clients. He is an extremely organised and motivated individual who heads up the superb sales team at the Horsforth Branch. Rich successfully completed his Technical Award in Residential Estate Agency in 2013 and holds the position of Residential Sales Manager.
Contact Richard
Phillip has always lived in Horsforth, Leeds and attended Horsforth High School where he achieved his GCSE’s and A-Levels. In 2010 Phil joined Leeds City College studying business where he progressed to his final year in 2012 finishing his degree at Leeds Metropolitan University; graduating BA Hons in business. After a short break following his studies Phil joined the company at the Horsforth office in 2013 as a trainee sales negotiator. With his hard work, commitment and training Phil quickly progressed to a fully qualified sales negotiator achieving his MNAEA in September 2014. Phil is now an accomplished negotiator who is extremely dedicated to his clients and provides a first class service in all aspects of his role. Phil is an exceptional communicator and a highly driven and motivated individual, ensuring that he achieves the best possible price for the properties under his care and provides a comprehensive after sales service and holds the position of Head of Prestige and Assistant Sales Manager at the Horsforth Office.
Contact Phil
Jamie who is originally from Hull attended Wolfreton School and achieved his A levels in sixth form. At a young age Jamie decided that further education wasn’t for him and very early on wanted to grasp working life head on. His career set off in the hospitality and catering industry working in bars and then restaurants. Jamie soon worked his way up to management level and excelled in customer service and engaging with his clients. Jamie moved to Leeds in 2007 when he decided that he wanted his career to move forward in a different direction. Jamie joined a large conveyancing firm and instantly fell in love with the property market, conveyancing and all aspects of the industry but Jamie missed the client engagement. Within a short space of time he moved to a successful Leeds city centre estate agent valuing and negotiating in both sales and lettings and he quickly set up excellent working relationships with a substantial client portfolio. Jamie joined the Hardisty team in April 2014, Valuing at the Horsforth office and has never looked back since! Jamie lives locally and has an excellent knowledge of the area and has now achieved his MNAEA.
Contact Jamie
Rory is originally from Nottinghamshire but headed further North in 2012 where he completed his degree achieving a BSc in Sport and Exercise Science at Manchester Metropolitan University. Rory moved to Yorkshire in 2013 to be with his now wife Sarah and their cockapoo Peppa! After settling in Leeds Rory began his career here in the retail sector, swiftly moving into management, however, he found that retail wasn’t his real passion and decided he wanted a more challenging and rewarding career.
He began his career in property forming part of a lettings team in a corporate agency and was quickly fulfilling a senior position, passing his NFOPP Level 3 in lettings and property management. Rory quickly found that his strength and passion was in valuing and moved specifically into a combined sales and lettings valuer role. Rory has extensive knowledge and experience having valued across North Yorkshire including Leeds, Harrogate, Ripon, Wetherby, Tadcaster. Rory joined HARDISTY AND CO in 2019 and values for the Horsforth and Otley offices and has achieved his MNAEA.
Health and fitness in his spare time, spending time with his family, in the gym or eating pizza are his favourite pastimes!
Charlotte lives locally and attended Benton Park High School until sixth form and left at eighteen with her A levels. Initially Charlotte set off on her career path working in debt purchasing in Leeds City Centre. Over four years Charlotte experienced three different roles mainly in customer and client services. Charlotte decided to have a gap year and left to travel alone, backpacking travelling in Australia, Fiji and South East Asia. During her travels Charlotte gained excellent people and life skills working in call centre sales, restaurant and bars. When Charlotte retuned to the UK she worked as par planner for a Horsforth based firm of financial advisers, mortgage brokers, wealth management for the retirement and investment planning. However, Charlotte has always had a close connection and interest in the property market as her parents have worked in property for many years and she therefore had a desire to progress within the property industry. An opportunity arose In April 2014, when Charlotte joined the Hardisty team at the flagship office in Horsforth as sales negotiator. Charlotte is already a very accomplished and professional estate agent and has achieved her MNAEA.
Contact Charlotte
Georgina completed her “A” levels at Farnley Park Academy and during her time of study began working for the Hardisty team, Horsforth, in October 2013 as a part time/weekend negotiator and administration assistant. After completing her studies she started full time with the company, in June 2014, as a full time trainee sales negotiator. Georgina has already gained a wealth of experience and a great knowledge of the local area and is already part way through her studies for her MNAEA and hopes to qualify within the next few months. Georgina is a valued, conscientious and committed member of the team who is showing the early signs of an accomplished estate agent and sales negotiator. She is hard working and always willing to go above and beyond the call of duty to service the needs of all of her clients.
Contact Georgina
Ann is the mum of the three proprietors of the business and is based at the Horsforth Office. She works there as a negotiator and administrator. Ann comes from a secretarial background which has given her an excellent grounding for the estate agency industry where attention to detail is fundamentally important.
She is extremely organised, efficient and is an excellent communicator and is dedicated to providing her clients with a top class and complete service. Ann is an excellent all rounder and strives to give the best and most professional advice to all of her clients. Ann is committed to the business and is a valued and highly respected member of the team at the Horsforth Office and she is often around long after the office has closed ensuring that her clients receive an optimum service.
Contact Ann
Paul left school and began his early career in property working for a small independent estate agent. After he had gained some initial experience he left to join his father in their family business managing a small portfolio of investment properties and carrying out various duties as a surveyor’s assistant drawing floorplans and completing general administration.
In 2002 Paul began incorporating into his role joinery, bathroom and kitchen fitting and general property maintenance which gave him a great platform for his role today. In 2007 he qualified as a DEA and worked successfully for himself until 2012 when he joined the Hardisty team, Horsforth. Paul achieved his APIP (Association of Professional Inventory Providers) qualification in 2014.
Paul is a valued member of both the residential sales and property management teams carrying out EPC’s, photography and other associated business for the lettings division.
Contact Paul
Rebecca has grown up in the local area all her life and moved to Farsley recently when she bought her own first home with her partner. She started her working life originally in childcare employed at a pre-school in Harrogate for nearly five years. Rebecca wanted to reach back to the roots where she grew up and moved to a nursery closer to home in Greengates. During her time there Rebecca decided that she had a passion for more and she embarked on a career in estate agency working for a large corporate agent, where she received excellent training and a much grounded knowledge. However, Rebecca wanted to be more in touch, on a personal level, with her clients and colleagues and decided that the independent estate agent was more for her and joined HARDISTY AND CO in March 2017. Rebecca has a fantastic knowledge of the local area and excellent estate agency skills; she is a very driven individual who always goes the extra mile for her clients. Rebecca also has volunteered coaching athletics to school children and enjoys horse riding and helping out at the stables when she can alongside walking her dogs.
Ashley has lived in Horsforth and Rawdon for most of his life and attended Horsforth High School where he completed his GCSE examinations. Whilst Ashley was studying at high school he completed his work experience here and that is where his love of property began. He went on to take a part time job with the company as an office junior and administration assistant whilst attending Park Lane College where he completed his BTEC level 3 in business studies. Ashley commenced working for the company, full time in 2013 and has since qualified as a Domestic Energy Assessor in 2014. Ashley is an accomplished photographer and forms a valued part of the DEA, Photographic and administrational team based at the Horsforth Office.
Contact Ashley
Josh grew up in West Leeds and attended the Farnley Academy where he completed his GCSE’s. Josh wanted to broaden his education experience and left school and attended the Elliott Hudson college to complete his AS and A Level studies. Whilst he studied Josh joined Hardisty and Co as a weekend/part time negotiator where he gained excellent initial experience and knowledge.
Josh is already showing great flair as a sales negotiator and gives an excellent service to our customers. Josh is currently undergoing an apprenticeship with the business and is a very motivated and enthusiastic individual with a very professional edge and drive to ensure our clients achieve the best possible prices for their properties. In his spare time Josh enjoys socialising with his friends and family and attending music festivals and concerts.
Mollie attended Farnley Academy where she completed her GCSE’s. She then moved to the Elliott Hudson College to finish her AS and A-Levels. During this time Mollie became a Police Explorer eventually becoming a Police Cadet Leader. Mollie also worked in a popular department store during this time which lead to full time employment where she learned a lot about the need for excellent customer service and the importance of delivering quality to the customer.
Mollie decided that she wanted to pursue a professional career in the property sector and joined HARDISTY AND CO in 2018 in the position of trainee property assistant. Mollie has already commenced her studies for her Award in the Sale of Residential Property which she is hoping to complete in 2019 and enjoys socialising with her friends and family.
Danny has always loved the property industry from been very young; following in the footsteps of his father who runs his own property business. Danny has lived locally all his life and attended Guiseley High school where he completed his GCSE’s and A-Levels. Danny started his career working shifts at a wine bar in Guiseley, the Wetherby Whaler, coaching at Coachwise Sports and Leeds Sports Academy.
Danny has an excellent work ethic and has a real drive and enthusiasm for sales and customer service. Danny commenced his apprenticeship with us in the summer of 2017 and is a keen footballer; kickboxer enjoys the gym and loves music and attending music events and festivals.
George grew up in Baildon and attended Guiseley high school where he completed his GCSE’s. George wanted to broaden his education experience and left school and attended Leeds City College where is trained to be a fitness instructor. Whilst at college he wanted to experience work and started as a part time bartender and waiter at pub restaurant. Whilst at college George secured an apprenticeship at a fitness gym where he learned excellent customer service skills and found a real passion for working with the general public.
George also has a passion for property coming from a family of building and renovation back ground and felt that on completion of his first apprenticeship he had some really strong transferable skills and continued his journey pursuing a career in estate agency. George currently holds the position of Sales Negotiator at the Horsforth branch and still enjoys fitness and attending Leeds United football matches. | https://hardistyandco.com/meet-the-team/ |
---
abstract: |
Background
: A new mode of nuclear fission has been proposed by the FOBOS collaboration, called Collinear Cluster Tri-partition (CCT), suggesting that three heavy fission fragments can be emitted perfectly collinearly in low-energy fission. This claim is based on indirect observations via missing-energy events using the $2v2E$ method. This proposed CCT seems to be an extraordinary new aspect of nuclear fission. It is surprising that CCT escaped observation for so long given the relatively high reported yield, of roughly $0.5\%$ relative to binary fission. These claims call for an independent verification with a different experimental technique.
Purpose
: Verification experiments based on direct observation of CCT fragments with fission fragment spectrometers require guidance with respect to the allowed kinetic energy range, which we present in this paper. Furthermore, we discuss corresponding model calculations which, if CCT is found in such verification experiments, could indicate how the breakups proceed. Since CCT refers to collinear emission, we also study the intrinsic stability of collinearity.
Methods
: Three different decay models are used that together span the timescales of three-body fission. These models are used to calculate the possible kinetic energy ranges of CCT fragments by varying fragment mass splits, excitation energies, neutron multiplicities and scission-point configurations. Calculations are presented for the systems ${^{235}\text{U}}(\text{n}_{\text{th}},\text{f})$ and ${^{252}\text{Cf}}(\text{sf})$, and the fission fragments previously reported for CCT, namely isotopes of the elements Ni, Si, Ca and Sn. In addition, we use semi-classical trajectory calculations with a Monte-Carlo method to study the intrinsic stability of collinearity.
Results
: CCT has a high net Q-value, but in a sequential decay, the intermediate steps are energetically and geometrically unfavorable or even forbidden. Moreover, perfect collinearity is extremely unstable, and broken by the slightest perturbation.
Conclusions
: According to our results, the central fragment would be very difficult to detect due to its low kinetic energy, raising the question of why other $2v2E$ experiments could not detect a missing-mass signature corresponding to CCT. Considering the high kinetic energies of the outer fragments reported in our study, direct-observation experiments should be able to observe CCT. Furthermore, we find that a realization of CCT would require an unphysical fine-tuning of the initial conditions. Finally, our stability calculations indicate that, due to the pronounced instability of the collinear configuration, a prolate scission configuration does not necessarily lead to collinear emission, nor does equatorial emission necessarily imply an oblate scission configuration. In conclusion, our results enable independent experimental verification and encourage further critical theoretical studies of CCT.
author:
- 'P. Holmvall'
- 'U. Köster'
- 'A. Heinz'
- 'T. Nilsson'
title: 'Collinear cluster tri-partition: Kinematics constraints and stability of collinearity '
---
\[sec:introduction\]Introduction
================================
Nuclear fission has been the focus of intense experimental and theoretical studies ever since its discovery almost 80 years ago [@bib:hahn39a; @bib:meitner39; @bib:bohr39]. Usually, fission results in two fragments (binary fission) with similar (symmetric fission) or dissimilar (asymmetric fission) masses. The possibility of fission into three fragments (ternary fission, see @bib:gonnenwein05 for a review), was proposed [@bib:present40] shortly after the discovery of binary fission. Experimental evidence of ternary fission was found 70 years ago in nuclear emulsion photographs [@bib:tsien46; @bib:tsien47a] and in measurements with ionization chambers [@bib:farwell47]. Detailed investigations showed that ternary fission occurs once every few hundred fission events. In $90\%$ of all ternary fission events, the third particle, called the ternary particle, is a ${^{4}\text{He}}$ nuclei, and in $9\%$ hydrogen or a heavier helium nuclei. In only $1\%$ of all ternary fission events does the ternary particle have $Z>2$, with yields rapidly dropping with increased $Z$ [@bib:gonnenwein04]. Ternary particles up to $Z=16$ have been observed at yields of the order of $10^{-9}$ per fission [@bib:tsekhanovich03]. However, early claims [@bib:tsien47b; @bib:rosen50; @bib:muga63; @bib:muga67_1; @bib:muga67_2] for yet heavier ternary particles or even “true ternary fission” with three fragments of comparable masses remain disputed. Dedicated counting experiments searching for such events in planar geometry [@bib:schall87] and radiochemical experiments [@bib:roy61; @bib:stoenner66; @bib:kugler71] gave upper yield limits below $10^{-8}$ for true ternary fission.
Therefore, it came as a great surprise when the FOBOS collaboration reported new experiments indicating true ternary fission events with a yield of $5 \cdot 10^{-3}$ per fission [@bib:pyatkov10; @bib:pyatkov10_3; @bib:pyatkov12]. These experiments were performed with the fission fragment spectrometers FOBOS and mini-FOBOS [@bib:ortlepp98], in which detector modules are placed at opposite sides ($180^{\circ}$ angle) of a thin fission target. The fission target backing creates an intrinsic asymmetry of the setup since fragments detected in one of the arms have to traverse the backing. Binary coincidences from ${^{252}\text{Cf}(\text{sf})}$ and ${^{235}\text{U}(\text{n}_{\text{th}},\text{f})}$ were measured with this setup. The binary spectrum showed an enhancement of events with lower energy from the detector arm on the side of the target backing. Some of these missing energy events were interpreted as missing mass, that could correspond to a third particle missing detection due to scattering in the fission target backing. The claim was that three heavy fragments were emitted perfectly collinearly along the fission axis, the two lightest fragments in the same direction as the target backing, and the heavy in the opposite, and that the smallest of the three fragments (the ternary particle) did not reach the active area of the detector. Hence, this interpretation was dubbed “Collinear Cluster Tri-partition” (CCT). In the following, we will use this definition of CCT as collinear fission events with a relative angle between fragment emission directions of $180\pm2^{\circ}$ [@bib:pyatkov10].
A similar experiment, but without an explicit asymmetry in any of the flight paths, was performed by @bib:kravtsov99, showing no indication of neither CCT nor missing mass events, down to a level of $7.5\cdot10^{-6}$ per fission in ${^{252}\text{Cf}(\text{sf})}$.
Given these surprising results and the high reported yield of $0.5\%$, the fact that no indication of CCT was found before in neither radiochemical analysis, nor coincidence measurements, calls for an independent verification, preferably with a direct observation method. This is indeed possible, and under way, with the LOHENGRIN fission fragment recoil separator (to be reported in a future paper). For a verification experiment based on direct observation, it is crucial to know which kinetic energies to scan. Since the FOBOS collaboration did not report at which kinetic energies the fragments were measured, these kinetic energies need to be inferred from theory, which is the main focus of this paper. The kinetic energy distribution of one fragment in a ternary decay cannot be derived from first principles. Instead, the full range of kinetic energies allowed by energy and momentum conservation can be calculated, which is done in this study. This is straightforward since CCT is a one-dimensional decay in which the acceleration is repulsion dominated, yielding a limited amount of possibilities of how the kinetic energy can be distributed between the fragments. The possible kinetic energies are reduced even further by the constraint posed by the FOBOS experiments, that two of the fragments have a kinetic energy which is high enough to enter the detector arms and leave a clear signal. An experiment that can cover all the energies allowed by energy and momentum conservation can thus verify CCT model-independently. If events are found, our model calculations would indicate how the breakups proceed in CCT, by comparison with the measured kinetic energies.
We start this paper by detailing which fissioning systems will be studied. This is followed by a description of the theoretical models spanning the possible kinetic energies in CCT, and the Monte-Carlo method used to study the intrinsic stability of collinearity. Results are then presented in the form of possible final kinetic energies in CCT, benchmarks of the methods used, studies that highlight overlooked contradictions in the models currently favored in the literature, and studies of the stability of CCT. This is followed by discussions on verification of CCT by direct observation, on the CCT interpretation and on the intrinsic stability of CCT. Finally, the paper ends with conclusions and appendices with details of each model and method.
\[sec:systems\]Fissioning systems
=================================
In this paper, we present new and detailed calculations on the reported CCT clusters [@bib:pyatkov10; @bib:pyatkov10_3; @bib:pyatkov12] $$\begin{aligned}
\label{eq:intro:235u_decay}
{^{235}\text{U}}(\text{n}_{\text{th}},\text{f}) & \rightarrow & {\text{Sn}} + {\text{Si}} + {\text{Ni}} + \nu{\cdot}\text{n},
\\
\label{eq:intro:252cf_decay}
{^{252}\text{Cf}}(\text{sf}) & \rightarrow & {\text{Sn}} + {\text{Ca}} + {\text{Ni}} + \nu{\cdot}\text{n},\end{aligned}$$ both with and without intermediate steps leading up to the final fragments, where $\nu$ is the neutron multiplicity. Other speculated fragments have similar masses and Q-values, and therefore similar kinematics. The derivations presented in this paper allow easy extension to any desired system.
In the analysis of the FOBOS experiments [@bib:pyatkov10; @bib:pyatkov10_3; @bib:pyatkov12], the measurements were interpreted as masses $\mathrm{A_{Sn}}\approx132$ and $\mathrm{A_{Ni}}\approx68\text{--}72$ with $\nu \approx 0\text{--}4$, with missing masses $\mathrm{A_{Si}}\approx34\text{--}36$ and $\mathrm{A_{Ca}}\approx48\text{--}52$, respectively. These are the most energetically favorable masses, as shown in Fig. \[fig:fs\_qtot\].
![\[fig:fs\_qtot\] (Color online) Plots (a) and (b) show the Q-value versus the final mass split between the lightest fragments, in the decays in Eqs. (\[eq:intro:235u\_decay\]) and (\[eq:intro:252cf\_decay\]), respectively, at zero neutron multiplicity ($\nu=0$). The Q-values are calculated from mass excesses taken from AME2012 [@bib:audi12]. No data are available for the bottom left corner (i.e. for masses $\text{A}_{\text{Sn}} > 138$). Prompt neutron emission $\nu>0$ generally lowers the Q-values (see Fig. \[fig:fs\_q\_first\]).](fs_qtot_auto_custom.pdf){width="1.0\linewidth"}
Our study includes a slightly wider range of masses. The figure shows Q-values which are relatively high compared to binary fission. As our results will show, however, a high Q-value does not necessarily imply a high yield or probability for fission, since the intermediate steps may be unfavorable or forbidden.
\[sec:models\]Theoretical models
================================
CCT is a decay in one spatial dimension, in which three fragments are formed from one fissioning system (FS) through two breakups [@bib:garrido06; @bib:kadmensky16] and accelerated along the same line (see Fig. \[fig:sequential\_decay\]). If the time between breakups is long enough, there exists an intermediate state with a heavy fragment (HF) and an intermediate fragment (IF), the latter which splits in turn into a light fragment (LF) and a ternary particle (TP). The ternary particle here refers to the lightest fragment. If the time between breakups is sufficiently short, there is no intermediate state, and the decay is a “true” three-body decay.
![\[fig:sequential\_decay\] (Color online) Schematic picture of the formation of CCT. For long timescales between two successive (sequential) breakups, there is an intermediate state (2). For sufficiently short timescales between breakups, there is no intermediate state, and the decay is a true three-body decay. Arrows indicate momentum direction. See text for explanation of acronyms. ](shapes_sequential.pdf){width="0.65\linewidth"}
Therefore, for a given fissioning system, the essential parameter to describe CCT is the time between the two breakups. In this paper, we divide the timescale of this parameter into three regimes, or models, and explicitly show that the kinetic energies of these models overlap in the limits.
The first model is called the “sequential” decay model [@bib:vijayaraghavan12] and is based on two sequential binary fissions, with long timescales between the two successive scissions (i.e. assuming fully accelerated fragments before the second scission). The second model is the recently proposed “almost sequential” decay model [@bib:tashkhodjaev15], with intermediate timescales between scissions (assuming partially accelerated fragments before the second scission). These sequential models are the currently favored models in the literature. As is shown in the results, however, both of these models assume the fission of an intermediate system with a high fission barrier and extremely low (or even negative) Q-value. This motivates the study of a third model which is based on traditional ternary fission models, and called in the following the “true ternary” decay model, with “infinitesimal” timescales between scissions (i.e. no intermediate step or fragment). We mainly focus on the sequential and true ternary decay models, as they represent the extremes of the kinetic energy range, but we also show how to calculate all the possible kinetic energies allowed by energy and momentum conservation for all three models, for other fissioning systems as well.
The final kinetic energies of the fission fragments are obtained analytically in the sequential decay model. This is possible since the kinematics in this model is fully determined by energy and momentum conservation. In the almost sequential and true ternary decay models, the final kinetic energies depend on the dynamics. Thus, these results are obtained with semi-classical trajectory calculations (see @bib:wagemans91 chapter 12-III for a review). In these calculations, the scission configuration (initial fragment positions and momenta) is constrained by energy and momentum conservation for a given fissioning system. Subsequently, the final kinetic energies are calculated by starting from the scission configuration and solving the equations of motion iteratively. The latter is done with a fourth-order Runge-Kutta method using a time step of $10^{-25}$ s, until more than $99\%$ of the potential energy is converted into kinetic energy.
Since the 1960s, semi-classical trajectory calculations have been applied to ternary fission, mainly with the aim to determine the scission configuration [@bib:boneh67]. As in many of these studies, a “point charge approximation” is used in our trajectory calculations, which assumes only a repulsive Coulomb force between spherical fragments. For the purpose of finding which scission configuration matches a particular final distribution, this method has received critique due to ambiguity [@bib:dakowski79; @bib:gavron75; @bib:pikpichak84; @bib:kunhikrishnan12], since several initial configurations can have the same final distribution. We do not have the same aim, however. Instead, we vary all possible initial collinear configurations in order to find all possible final kinetic energies of CCT fragments. Furthermore, we again stress the fact that in contrast to the previously mentioned studies, we study CCT which is a one-dimensional problem in which the dynamics during the fission fragment acceleration is dominated by the repulsive Coulomb interaction. Adding an attractive nuclear correction to the sequential model does not affect the final momenta, since the latter is uniquely determined by energy and momentum conservation. This is verified by the perfect agreement between our results and that of @bib:vijayaraghavan12, who included an attractive nuclear correction. Still, we show explicitly that the attractive nuclear correction has a negligible effect in both the sequential and the almost sequential decay models (see Sec. \[sec:almost\_sequential\_decay\_results\]). In the true ternary decay model, the attractive nuclear interaction reduces the possible kinetic energy range (as discussed in Sec. \[sec:simultaneous\_decay\_kinematics\]). Since we are looking for the widest possible kinetic energy range to cover experimentally, the attractive nuclear interaction is excluded in this model to get a safe upper limit.
In addition to deriving the possible final kinetic energies, we use a Monte-Carlo method to sample perturbations in the trajectory calculations, testing the intrinsic stability of collinearity in ternary fission, yielding the final angular distributions versus the perturbations. Previous studies using the point charge approximation with a Monte-Carlo approach successfully reproduced experimental ternary fission data [@bib:guet80; @bib:radi82]. Furthermore, for the purpose of calculating final kinetic energies and angular distributions, it has been shown that the simple point charge approximation gives similar results to more sophisticated models, which incorporate attractive nuclear forces, fragment deformations and other effects [@bib:carjan80; @bib:flassig83].
Nevertheless, to test the validity of our semi-classical trajectory calculations, we set up several benchmarks. As a quantitative verification against analytical calculations, the sequential and almost sequential models are compared for extremely long times between the two scissions, and the two techniques show excellent agreement (see results in Sec. \[sec:sequential\_decay\_results\]). Additional tests for ternary fission with ${^{4}\text{He}}$ (not reported here) reproduced well the results of the previously mentioned studies. We also verified for certain configurations that the inclusion of higher order moments corresponding to deformed fragments does not considerably affect the final momenta along the fission axis.
\[sec:sequential\_decay\_kinematics\]Sequential decay model
-----------------------------------------------------------
In the sequential decay model [@bib:vijayaraghavan12], the fissioning system splits into a heavy fragment and an intermediate fragment. The latter splits in turn into a light fragment and a ternary particle. The ternary particle here refers to the lightest fragment. Either the TP or the LF can be formed at the center, as illustrated in Fig. \[fig:sequential\_decay\]. Potential energy surface calculations [@bib:vijayaraghavan15; @bib:oertzen15; @bib:tashkhodjaev15] predict that it is more likely that the TP is formed at the center. Nevertheless, we present results for both cases. Using conservation of proton numbers in Eqs. (\[eq:intro:235u\_decay\]) and (\[eq:intro:252cf\_decay\]), the intermediate fragments are found to be molybdenum (Mo) and cadmium (Cd) in ${^{235}\text{U}}(\text{n}_{\text{th}},\text{f})$ and ${^{252}\text{Cf}}(\text{sf})$, respectively. Allowing for neutron emission from the FS and the IF with multiplicities $\nu_1$ and $\nu_2$, respectively, gives $$\begin{aligned}
{^{235}\text{U}}(\text{n}_{\text{th}},\text{f}) & \rightarrow & \text{Sn} + \text{Mo} + \nu_1\cdot\text{n}\nonumber\\
\label{eq:sequential_fission_235u}
& \rightarrow & \text{Sn} + \text{Si} + \text{Ni} + (\nu_1+\nu_2)\cdot\text{n}
\\
{^{252}\text{Cf}}(\text{sf}) & \rightarrow & \text{Sn} + \text{Cd} + \nu_1\cdot\text{n}\nonumber\\
\label{eq:sequential_fission_252cf}
& \rightarrow & \text{Sn} + \text{Ca} + \text{Ni} + (\nu_1+\nu_2)\cdot\text{n}.\end{aligned}$$ The most energetically favorable masses of the IFs are found to be $\text{A}_{\text{Mo}}=104$ and $\text{A}_{\text{Cd}}=120$ with neutron multiplicity $\nu_1=0$, as seen in Figs. \[fig:fs\_q\_first\] (a) and (b), respectively. The most favorable mass split in the decay of ${^{104}\text{Mo}}$ is $\text{A}_{\text{Ni}}=70$ and $\text{A}_{\text{Si}}=34$ with $\nu_2=0$, and in the decay of ${^{120}\text{Cd}}$ it is $\text{A}_{\text{Ni}} = 70$ and $\text{A}_{\text{Ca}}=50$ with $\nu_2=0$, as seen in Figs. \[fig:fs\_q\_first\] (c) and (d), respectively.
![\[fig:fs\_q\_first\] (Color online) The Q-value versus the mass split in the binary decays of (a) ${^{235}\text{U}}(\text{n}_{\text{th}},\text{f})$, (b) ${^{252}\text{Cf}}(\text{sf})$, (c) ${^{104}\text{Mo}}$ and (d) ${^{120}\text{Cd}}$. The Q-values are calculated from the mass excesses, taken from AME2012 [@bib:audi12]. Lines have been added to guide the eye.](fs_q_first_auto.pdf){width="1.0\linewidth"}
We will present final kinetic energies for a range of masses centered around these mass splits, with neutron multiplicities $\nu_1=0\text{--}4$. Note, however, that in the decay of both Mo and Cd, the Q-value is extremely low, for many mass splits even negative, and that any neutron multiplicity $\nu_2>0$ lowers the Q-value further. To have any chance of decaying, the IF needs excitation energy (from here on denoted ${E^{*}_{IF}}$). Even if the low Q-values are compensated for by an extremely high excitation energy, it does not mean that the intermediate fragment can fission, it also has to overcome a very high fission barrier (see Sec. \[sec:cct\_model\_discussion\] for discussion). Therefore, we assume cold compact fission of the IF, by setting both the neutron multiplicity $\nu_2$ and the sum of the excitation energies of the final fragments $\mathit{TXE} = {E^{*}_{HF}}+{E^{*}_{TP}}+{E^{*}_{LF}}$ to zero in our calculations. We show how to calculate a more general case, however, and such results can be directly obtained from our results by simple subtraction. Any $\mathit{TXE} > 0$ lowers the sum of the final kinetic energies accordingly, and any $\nu_2>0$ lowers the IF Q-value and the final total kinetic energy of the TP and LF by up to $8$ MeV per neutron (see discussion in Sec. \[sec:cct\_model\_discussion\]).
The final kinetic energies of the fragments will be calculated and presented versus fragment mass splits, neutron multiplicity and the excitation energy ${E^{*}_{IF}}$.
Details of this model are found in App. \[sec:app:almost\_sequential\].
\[sec:almost\_sequential\_decay\_kinematics\]“Almost sequential” decay model
----------------------------------------------------------------------------
To calculate the kinematics of an “almost sequential” decay [@bib:tashkhodjaev15], a similar parametrization as in the sequential model is used. The main difference with respect to the sequential model is the finite time between the first and the second scission, which is analogous to the charge-center distance between the HF and the IF at the second scission, denoted $D$ (see Fig. \[fig:almost\_sequential\_decay\]).
![\[fig:almost\_sequential\_decay\] (Color online) CCT as an “almost sequential” decay. In contrast to the sequential model, the Coulomb repulsion of the heavy fragment is crucial after the second scission, making the inter-fragment distances relevant to the kinematics. Arrows indicate momentum direction.](shapes_almost_sequential_first.pdf){width="0.65\linewidth"}
The finite time and distance makes it necessary to account for the Coulomb repulsion at all stages in the almost sequential model, thus the final kinetic energies depend on the full dynamics. To this end the scission-point configuration after the second scission is constrained, and the final kinetic energies are calculated from this configuration using semi-classical trajectory calculations (described in the beginning of this section). As will be shown in the results (Sec. \[sec:almost\_sequential\_decay\_results\]), an attractive nuclear interaction is found to have negligible influence on the final kinetic energies.
Apart from the parameters of the sequential model (neutron multiplicities, fragment mass splits and excitation energies), the almost sequential model relies on two additional parameters to constrain the scission-point configuration. We choose these parameters to be the tip distances (surface separation distances) between the HF and the IF ($\Delta{D}$) at the moment of the second scission, and between the LF and the TP ($\Delta{d}$) after the second scission. The tip distance is defined as $$\label{eq:seq:asec:tip_distance}
\Delta{D}_{ij} = D_{ij} - R_{i} - R_{j},$$ where $R_{k}=r_0\sqrt[3]{A_k}$ is the radius of fragment $k$ with mass $A_k$ and $r_0\approx1.25$ fm, and $D_{ij}$ is the charge-center distance between the respective fragments. Note that as $D,\Delta{D} \to \infty$, the equations of the almost sequential decay model become exactly the same as those for the sequential decay model. Details of this model are found in App. \[sec:app:almost\_sequential\].
As will be shown in the results (Sec. \[sec:almost\_sequential\_decay\_results\]), not even the most favorable mass splits will have enough energy to allow for a physically reasonable tip distance ($<4$ fm [@bib:gonnenwein91]). Therefore, cold compact fission of the IF is assumed in our calculations, i.e. minimizing $\Delta{d}$, by setting both the neutron multiplicity $\nu_2$ and the sum of the final fragment excitation energies $\mathit{TXE}=E^{*}_{HF}+E^{*}_{TP}+E^{*}_{LF}$ to zero. As described in Sec. \[sec:sequential\_decay\_kinematics\], results for $\nu_2>0$ and $\mathit{TXE}>0$ can be obtained directly from our results.
\[sec:simultaneous\_decay\_kinematics\]True ternary decay model
---------------------------------------------------------------
In the most common theoretical models of ternary fission (see @bib:wagemans91 chapter 12 and references therein), all three fragments are considered to be formed during a very short time interval from the same fissioning system, with the ternary particle at the center. The different models have a similar parametrization, but are based on different hypotheses and favor different starting positions of the ternary particle between the heavier fragments. Our true ternary decay model is based on the most common models, but is collinear, as is illustrated in Fig. \[fig:simultaneous\_decay\].
![\[fig:simultaneous\_decay\] (Color online) CCT as a true ternary decay. Arrows indicate momentum direction.](shapes_true_ternary.pdf){width="0.65\linewidth"}
Furthermore, our model treats the ternary particle offset between the other fragments as a parameter, denoted $x_{r}$. We let $x_{r} = 0$ and $x_{r} = 1$ correspond to the cases when the ternary particle is formed “touching” the heavy and light fragment, respectively. The results show that the highest kinetic energy for the LF is achieved if the TP is formed touching the HF. This is because the HF accelerates the TP, which then transfers momentum to the LF. The opposite configuration gives the lowest kinetic energy for the LF, and the highest possible for the HF. Obviously, these touching configurations are not real “scission” configurations, since in reality the fragments would not separate due to the attractive nuclear force. Therefore, the exploration from one touching configuration to the other will predict a wider kinetic energy range than physically possible. The touching configurations thus provide safe upper limits for the experimental search, which is why the attractive nuclear interaction is disregarded in this model.
The scission-point configuration is constrained by energy conservation for given fragment mass splits, neutron multiplicity and pre-scission kinetic energies, with the parameters $x_r$ and $\mathit{TXE}$, where the latter is the sum of the fragment excitation energies ($\mathit{TXE} = E^{*}_{HF} + E^{*}_{TP} + E^{*}_{LF}$). Note that axial pre-scission kinetic energy can be canceled in most cases by choosing an earlier reference time, corresponding to a tighter scission configuration. We have therefore set the pre-scission kinetic energy to zero in our calculations. Lateral pre-scission kinetic energy is studied in Sec. \[sec:intrinsic\_stability\_collinearity\], and is found to break collinearity, even for extremely low values.
Using the scission-point configuration, the final kinetic energies are computed with semi-classical trajectory calculations, as described in Sec. \[sec:models\].
Details of this model are found in App. \[sec:app:ternary\].
\[sec:intrinsic\_stability\_collinearity\]Intrinsic stability of collinearity
-----------------------------------------------------------------------------
Using the true ternary decay model (Sec. \[sec:simultaneous\_decay\_kinematics\]), the intrinsic stability of collinearity in ternary fission is analyzed by using a Monte-Carlo method to sample a perturbation in the ternary particle position and momentum perpendicular to the fission axis, independently (see Fig. \[fig:stability\_simultaneous\_decay\]).
![\[fig:stability\_simultaneous\_decay\] (Color online) CCT as a true ternary decay, with an initial lateral momentum or spatial offset of the ternary particle from the fission axis. The arrow indicates momentum direction.](shapes_instability.pdf){width="0.65\linewidth"}
As in the true ternary decay model, the parameters are $x_r$ (the relative ternary particle position at scission, as described in Sec. \[sec:simultaneous\_decay\_kinematics\]) and $\mathit{TXE}$ (the sum of the fragment excitation energies). In addition, a parameter representing the perturbation is also varied, being either initial lateral momentum or spatial offset of the ternary particle from the fission axis, denoted $p_y$ and $y$, respectively. Given these parameters, the scission-point configuration is uniquely constrained by invoking conservation of energy, as well as linear and angular momentum. Each parameter is sampled in a uniform interval, with $\sim100$ sampling points per parameter, giving more than $10^{6}$ data points per system.
Using the scission-point configuration, the final kinetic energies and emission angles are computed with semi-classical trajectory calculations, as described in Sec. \[sec:models\].
Details of this model are found in App. \[sec:app:stability\].
\[sec:results\]Results
======================
The results are divided into four subsections. The first subsection covers final kinetic energies in the sequential decay model, both if the ternary particle is formed at the center (which is considered the most favorable case according to potential energy surface calculations [@bib:vijayaraghavan15; @bib:oertzen15; @bib:tashkhodjaev15]), and if the light fragment is formed at the center, for sake of completeness. The first subsection also includes a benchmark of the semi-classical trajectory calculations, which is used in the other models.
The second subsection covers results for the “almost sequential” decay model, which show that this model spans the kinetic energy continuum between the sequential and “true ternary” decay models. Furthermore, it is explicitly shown that although CCT might have a high net Q-value, the intermediate steps in a sequential and an almost sequential decay are energetically and geometrically unfavorable or even forbidden. It is also shown that the attractive nuclear interaction is negligible in both the sequential models.
The third subsection covers final kinetic energies in the true ternary decay model.
The fourth subsection covers an analysis of the intrinsic stability of collinearity in ternary fission, in which the final scattering angle between the ternary particle and light fragment is presented versus a spatial and a momentum-based perturbation, independently. Requiring a collinear emission sets a threshold on the position and momentum of the ternary particle, which is shown to be much smaller than variations expected due to the uncertainty principle.
\[sec:sequential\_decay\_results\]Sequential decay results
----------------------------------------------------------
Using the sequential model described in Sec. \[sec:sequential\_decay\_kinematics\] (derivations in App. \[sec:app:almost\_sequential\]), we present in Figs. \[fig:sequential\_double\] (a)–(b) and (d)–(e) the final fragment kinetic energies versus the mass split between the TP and the LF in the decays $$\begin{aligned}
\label{eq:seq:235u}
{^{235}\text{U}}(\text{n}_{\text{th}},\text{f}) & \rightarrow & {^{132}\text{Sn}} + {^{104}\text{Mo}} \rightarrow {^{132}\text{Sn}} + \text{Si} + \text{Ni} \\
\label{eq:seq:252cf}
{^{252}\text{Cf}}(\text{sf}) & \rightarrow & {^{132}\text{Sn}} + {^{120}\text{Cd}} \rightarrow {^{132}\text{Sn}} + \text{Ca} + \text{Ni},\end{aligned}$$ respectively (note that the mass split between the HF and the IF will be varied later). For sake of completeness, results are presented for fission both when the (a),(d) TP and when (b),(e) the LF are formed at the center. Figs. \[fig:sequential\_double\] (c) and (f) show the Q-value in the fission of the intermediate fragments ${^{104}\text{Mo}}$ and ${^{120}\text{Cd}}$, respectively.
![\[fig:sequential\_double\] (Color online) Final kinetic energies of the TP and LF versus the TP to LF mass split in the sequential decay of (a)–(b) ${^{235}\text{U}}(\text{n}_{\text{th}},\text{f})$ and (d)–(e) ${^{252}\text{Cf}}(\text{sf})$, calculated with the analytic method ($\bigcirc$, $\bigtriangleup$) described in Sec. \[sec:sequential\_decay\_kinematics\] (derivations in App. \[sec:app:almost\_sequential\]), and with trajectory calculations (+, $\times$) described in Sec. \[sec:almost\_sequential\_decay\_kinematics\] (derivations in App. \[sec:app:almost\_sequential\]). The case when the TP is formed at the center is shown in (a) and (d), while the case when the LF is formed at the center is shown in (b) and (e), (upper and lower signs in Eqs. (\[eq:aseq:p\_lf\]) and (\[eq:aseq:p\_tp\]), respectively). The corresponding final kinetic energy of the HF is labeled in each plot. The excitation energy of the intermediate fragment is $E^{*}_{IF} = 30$ MeV. The missing trajectory calculations for $A_{\text{Si}}=28$ highlights that the intermediate steps of the decay are energetically forbidden. The corresponding Q-values in the fission of (c) ${^{104}\text{Mo}}$ and (f) ${^{120}\text{Cd}}$ are calculated from mass excesses taken from AME2012 [@bib:audi12]. Lines have been added to guide the eye. ](sequential_single_onecolumn_v2.pdf){width="1.0\linewidth"}
In both systems, the excitation energy of the intermediate fragment is $E^{*}_{IF} = 30$ MeV. As a benchmark of the semi-classical trajectory calculations, the figures also show results (+, $\times$) obtained from the almost sequential model (described in Sec. \[sec:almost\_sequential\_decay\_kinematics\], derivations in App. \[sec:app:almost\_sequential\]) at extremely long times between the two scissions. There is an excellent agreement between the two methods, as shown by the complete overlap of the symbols. The small difference is attributed to the fact that the trajectory calculations have to start and end with a finite potential energy ($<1\%$). The kinetic energy of the HF is labeled in each plot. The shape of the kinetic energy plot directly follows the Q-value in the fission of the intermediate fragment.
For comparison, the Q-value in the fission of both Mo and Cd is shown as a function of the mass split between the TP and LF in Fig. \[fig:IF\_q\_values\].
![\[fig:IF\_q\_values\] (Color online) The Q-value as a function of the mass split between the LF and the TP, in the decays (a) $\text{Mo} \rightarrow \text{Si} + \text{Ni}$ and (b) $\text{Cd} \rightarrow \text{Ca} + \text{Ni}$. Recall from Fig. \[fig:fs\_qtot\] that masses under the dashed line correspond to nuclides without data for the corresponding HF ($\text{A}_{\text{Sn}} > 138$), and from Fig. \[fig:fs\_q\_first\] that the most favorable mass splits are $\text{A}_{\text{Sn}}=132$ with (a) $\text{A}_{\text{Mo}}=104$ and (b) $\text{A}_{\text{Cd}}=120$. The most favorable mass split between the TP and LF are therefore found along the solid diagonal lines as $A_{\text{Ni}}=70$ with (a) $A_{\text{Si}}=34$ and (b) $A_{\text{Ca}}=50$. The Q-values are calculated from mass excesses taken from AME2012 [@bib:audi12]. Prompt neutron emission from the IF ($\nu_2$) lowers the Q-values significantly (see Fig. \[fig:fs\_q\_first\]). ](IM_q_values_redblue_auto.pdf){width="1.0\linewidth"}
To have any probability of fissioning, only the most energetically favorable systems should be considered. Further calculations therefore assume that no neutrons originate from the fission of the IF (i.e. $\nu_2=0$ in Eqs. (\[eq:sequential\_fission\_235u\]) and (\[eq:sequential\_fission\_252cf\])), and that $\mathit{TXE} = E^{*}_{HF} + E^{*}_{TP} + E^{*}_{LF} = 0$ MeV. Any $\mathit{TXE}> 0$ MeV lowers the final kinetic energy sum accordingly. If any neutrons are emitted in the fission of the IF, the Q-value, and therefore the summed kinetic energy of the TP and LF, are reduced by up to $8$ MeV per neutron. See Sec. \[sec:cct\_model\_discussion\] for further discussion.
To see how the kinetic energies are affected when varying $E^{*}_{IF}$ and the mass split between the HF and the IF, multiple plots are compared to each other in a grid in Fig. \[fig:sequential\_vary\_a1\], for both (a) ${^{235}\text{U}}(\text{n}_{\text{th}},\text{f})$, and (b) ${^{252}\text{Cf}}(\text{sf})$. Comparing plots in the horizontal direction, the heavy fragment mass is varied $A_{\text{Sn}}=134\text{--}130$, and comparing plots in the vertical direction, $E^{*}_{IF}$ is varied ($0$, $20$ and $40$ MeV).
{width="0.8\linewidth"} {width="0.8\linewidth"}
The corresponding final kinetic energy of Sn and the varied parameters are labeled in each plot. Note that the results for ${^{252}\text{Cf}}(\text{sf})$ in Fig. \[fig:sequential\_vary\_a1\] (b) shows perfect agreement with the corresponding parameter choices in Fig. 6 of @bib:vijayaraghavan12. Increasing the excitation energy $E^{*}_{IF}$ frees more energy for the acceleration of the TP and LF. Because the direction of acceleration of the inner fragment is opposite to the flight direction of the IF before it fissions, the inner fragment is retarded. For higher excitation energies, the kinetic energy of the inner fragment approaches $0$ MeV. Increasing $E^{*}_{IF}$ leaves less energy available as kinetic energy to the HF. Note that some of the corresponding systems are energetically forbidden for lower excitation energies and for unusual $N/Z$ ratios. Results obtained with trajectory calculations (+, $\times$) only show fission decays which are energetically allowed and have a tip distance that is $\leq 7$ fm at the second scission. None of the systems have a tip distance which is considered to be physically valid, i.e. less than $4$ fm [@bib:gonnenwein91] (see Sec. \[sec:almost\_sequential\_decay\_results\] for results and discussion).
Finally, we present in Fig. \[fig:sequential\_areas\_all\] the final kinetic energies when varying all parameters (including the neutron multiplicity) simultaneously, in the sequential decays of (a–c) ${^{235}\text{U}}(\text{n}_{\text{th}},\text{f})$ and (d–f) ${^{252}\text{Cf}}(\text{sf})$, respectively. The parameter ranges are given in the caption.
![\[fig:sequential\_areas\_all\] (Color online) Areas of attainable final fragment kinetic energies versus the excitation energy of the intermediate fragment in the sequential decays (a–c) ${^{235}\text{U}}(\text{n}_{\text{th}},\text{f}) \rightarrow \text{Sn} + \text{Mo} + \nu_1\cdot\text{n} \rightarrow \text{Sn} + \text{Si} + \text{Ni} + \nu_1\cdot\text{n}$, and (d–f) ${^{252}\text{Cf}}(\text{sf}) \rightarrow \text{Sn} + \text{Cd} + \nu_1\cdot\text{n} \rightarrow \text{Sn} + \text{Ca} + \text{Ni} + \nu_1\cdot\text{n}$. Each figure is element specific, and shows results both when the TP and when the LF are formed at the center. The colors indicate formation position, as shown by the inset in (f). The areas are spanned between the highest and lowest kinetic energies obtained. For a given set of parameters, the final kinetic energy versus ${E^{*}_{IF}}$ follows a well-defined line. The bold dashed line is an example of the latter, with the most favorable set of parameters. For comparison, the horizontal lines correspond to the kinetic energy of the same fragment from compact binary fission (see text and Eqs. (\[eq:u\_binary\_ni\])–(\[eq:cf\_binary\_sn\])). The masses are varied as $\text{A}_{\text{Sn}}=128\text{--}134$ and $\text{A}_{\text{Ni}}=68,70,72$, and the prompt neutron multiplicity as $\nu_1=0\text{--}4$. As a consequence, the other masses are in the ranges (a–c) $\text{A}_{\text{Mo}}=98\text{--}108$, $\text{A}_{\text{Si}}=28\text{--}40$, and (d–f) $\text{A}_{\text{Cd}}=114\text{--}124$, $\text{A}_{\text{Ca}}=42\text{--}56$. ](sequential_areas_all_auto.pdf){width="1.0\linewidth"}
We represent the kinetic energy range for each fragment with an area, spanned by the highest and lowest kinetic energies obtained. The colors of the areas represent formation configuration (either the TP or the LF is formed at the center), as shown in the inset in Fig. \[fig:sequential\_areas\_all\] (f). The bold dashed lines correspond to the most energetically favorable cluster combinations for each fissioning system, namely $$\begin{aligned}
{^{235}\text{U}}(\text{n}_{\text{th}},\text{f}) & \rightarrow & {^{132}\text{Sn}} + {^{104}\text{Mo}}\nonumber\\
\label{eq:res:most_favorable_235u}
& \rightarrow & {^{132}\text{Sn}} + {^{34}\text{Si}} + {^{70}\text{Ni}}\\
{^{252}\text{Cf}}(\text{sf}) & \rightarrow & {^{132}\text{Sn}} + {^{120}\text{Cd}}\nonumber\\
\label{eq:res:most_favorable_252cf}
& \rightarrow & {^{132}\text{Sn}} + {^{50}\text{Ca}} + {^{70}\text{Ni}}.\end{aligned}$$ For a given set of parameters, the kinetic energy of the outer and inner fragment versus $E^{*}_{IF}$ follows an increasing and decreasing curve, respectively. The heavy fragment is not affected by the second scission, and its kinetic energy is therefore linearly decreasing with increasing $E^{*}_{IF}$. The curves are cut off when ${Q_{IF}^{\text{eff}}} < 0$ (as defined in Eq. (\[eq:aseq:q2\_eff\]) in App. \[sec:app:almost\_sequential\]), which is why the artificial “teeth” structures appear. The horizontal lines correspond to the maximum kinetic energies of the same fragment that would be produced in cold compact binary fission (zero excitation energy and consequently no neutron evaporation) as calculated from Q-values: $$\begin{aligned}
\label{eq:u_binary_ni}
&\text{(a)}\quad& {^{235}\text{U}(\text{n}_{\text{th}},\text{f})} \rightarrow {^{70}\text{Ni}} + {^{166}\text{Gd}}\\
\label{eq:u_binary_si}
&\text{(b)}\quad& {^{235}\text{U}(\text{n}_{\text{th}},\text{f})} \rightarrow {^{34}\text{Si}} + {^{202}\text{Pt}}\\
\label{eq:u_binary_sn}
&\text{(c)}\quad& {^{235}\text{U}(\text{n}_{\text{th}},\text{f})} \rightarrow {^{132}\text{Sn}} + {^{104}\text{Mo}}\\
\label{eq:cf_binary_ni}
&\text{(d)}\quad& {^{252}\text{Cf}(\text{sf})} \rightarrow {^{70}\text{Ni}} + {^{182}\text{Yb}}\\
\label{eq:cf_binary_ca}
&\text{(e)}\quad& {^{252}\text{Cf}(\text{sf})} \rightarrow {^{50}\text{Ca}} + {^{202}\text{Pt}}\\
\label{eq:cf_binary_sn}
&\text{(f)}\quad& {^{252}\text{Cf}(\text{sf})} \rightarrow {^{132}\text{Sn}} + {^{120}\text{Cd}}.\end{aligned}$$ The mean kinetic energy of binary fragments lies much lower than these horizontal lines due to the considerable excitation energies of binary fragments. Experiments searching for ternary fission, which are not based on coincidence measurements, can thus use these limits as a reference, in order to determine the source of possible events. If events are found above the maximum energy of binary fission, the origin must be ternary fission.
\[sec:almost\_sequential\_decay\_results\]Almost sequential decay results
-------------------------------------------------------------------------
It is explicitly shown in the following that since the almost sequential decay model represents the time continuum between the sequential and true ternary decay models, it also represents the kinetic energy continuum. It is also shown that both the sequential and the almost sequential models are geometrically and energetically unfavorable or forbidden, and that the attractive nuclear interaction has a negligible influence on the kinetic energies. The almost sequential model is described in Sec. \[sec:almost\_sequential\_decay\_kinematics\] (derivations in App. \[sec:app:almost\_sequential\]).
In Fig. \[fig:almost\_sequential\_d0\_sweep\], the final fragment kinetic energies are shown versus the time between the two scissions (i.e. the distance $D$ between the HF and the LF at the second scission, due to the direct correspondence), in the almost sequential decays of (a) ${^{235}\text{U}}(\text{n}_{\text{th}},\text{f})$, and (b) ${^{252}\text{Cf}}(\text{sf})$, respectively.
![\[fig:almost\_sequential\_d0\_sweep\] (Color online) Final kinetic energies versus the time between the first and the second scission (logarithmic scale), in the “almost sequential” decays (a) ${^{235}\text{U}}(\text{n}_{\text{th}},\text{f}) \rightarrow {^{132}\text{Sn}} + {^{104}\text{Mo}} \rightarrow {^{132}\text{Sn}} + {^{34}\text{Si}} + {^{70}\text{Ni}}$, and (b) ${^{252}\text{Cf}}(\text{sf}) \rightarrow {^{132}\text{Sn}} + {^{120}\text{Cd}} \rightarrow {^{132}\text{Sn}} + {^{50}\text{Ca}} + {^{70}\text{Ni}}$. The excitation energies are $E^{*}_{IF}=40$ MeV and $\mathit{TXE}=0$ MeV, the tip distance at the second scission is $\Delta{d_0}=7$ fm, and the ternary particle is set to be formed at the center. The fine solid and dashed lines represent the corresponding kinetic energies of the sequential and true ternary decay models, respectively. See text for further explanation how these results are obtained. Less than $1\%$ of the total energy remains as potential energy in the almost sequential and ternary model results.](almost_sequential_d0_sweep_auto.pdf){width="1.0\linewidth"}
See caption for mass splits and other parameter values. The results show that as the time between scissions becomes very long, the kinetic energies approach the asymptotic results of the sequential model (fine solid lines), since in the limit $D\to\infty$, the equations of the two models become identical. Furthermore, the results show that at short times between scissions, the kinetic energies approach the asymptotic results of the true ternary decay model (fine dashed lines). The true ternary decay model results are obtained as described in Sec. \[sec:simultaneous\_decay\_kinematics\] and App. \[sec:app:ternary\], by using the same mass splits, setting $\mathit{TXE}=0$ MeV and using the corresponding distances (setting $D-x = r_{TP}+r_{LF}+\Delta{d}$, which gives $x_r=0.03$ and $x_r=0.02$ for ${^{235}\text{U}}(\text{n}_{\text{th}},\text{f})$ and ${^{252}\text{Cf}}(\text{sf})$, respectively).
We will now derive the maximum $E_{IF}^{*}$ versus the first scission tip distance between the HF and the IF, $\Delta{D_0}$. Furthermore, we will study if this ${E^{*}_{IF}}$ can balance the extremely low Q-values of the IF, for different values of the second scission tip distance between the TP and the LF, $\Delta{d_0}$ (see Fig. \[fig:almost\_sequential\_decay\] for an illustration of these distances). This study will reveal which constraints are posed on the scission configurations if requiring an energetically allowed decay. We focus on the most energetically favorable case, i.e. when the TP is formed at the center, when there is no pre-scission kinetic energy, and with the mass splits from Eqs. (\[eq:res:most\_favorable\_235u\]) and (\[eq:res:most\_favorable\_252cf\]) for ${^{235}\text{U}}(\text{n}_{\text{th}},\text{f})$ and ${^{252}\text{Cf}}(\text{sf})$, respectively. We will also assume fully accelerated fragments before the second scission, since the Coulomb barrier in the fission of the IF is higher when the heavy fragment is present. Energy balance of the first fission gives $$\label{eq:res:first_q}
Q_{FS} = V_1(\Delta{D}) + E_{HF} + E_{LF} + E_{HF}^{*} + E_{IF}^{*},$$ where $\Delta{D}$ is the tip distance and $V_1$ the potential $$\label{eq:res:potential}
V_1 = E_C + E_N.$$ Here, $E_C$ is the repulsive Coulomb potential and $E_N$ the attractive nuclear potential. For the latter, we used the Yukawa-plus-exponential function [@bib:krappe79_prl; @bib:krappe79_prc]. The total excitation energy $\mathit{TXE}_{1} = {E_{IF}^{*}} + {E_{HF}^{*}}$ is maximal when it takes up all the available energy, with zero pre-scission kinetic energy $E_{HF} = E_{LF} = 0$. Thus, the maximum excitation energy for a given scission tip distance $\Delta{D_0}$ is $$\label{eq:res:TXE_HFIF}
\mathit{TXE}_{1}^{\text{max}} = Q_{FS} - V_1(\Delta{D_0}).$$ If this quantity is less than zero, the corresponding scission configuration is energetically forbidden. Consequently, $\mathit{TXE}_{1} = 0$ would give the tightest possible scission configuration (cold compact fission). Energy balance at the second scission gives $$\begin{gathered}
\label{eq:res:second_q}
Q_{IF} + E_{IF}^{*} + E_{IF} + V_1(D_1) = V_2(\Delta{d_0})\\+ E_{TP} + E_{LF} + E_{TP}^{*} + E_{LF}^{*},\end{gathered}$$ where $D_1$ is the distance between the HF and the IF (i.e. between the HF and the mass center of the TP and the LF) at the moment of the second scission, and $\Delta{d_0}$ is the TP to LF scission tip distance. Assuming that there is no additional pre-scission kinetic energy of the TP and the LF, other than that from the IF, imposes the constraint $v_{IF} = v_{TP} = v_{LF}$. Assuming also conservation of mass ($m_{IF} = m_{TP} + m_{LF}$), leads to $E_{IF} = E_{TP} + E_{LF}$ right after the second scission. Consequently, for a given scission tip distance $\Delta{d_0}$, the available energy in the second fission becomes $$\label{eq:res:TXE_TPLF}
E_{TP}^{*} + E_{LF}^{*} = Q_{IF} + E_{IF}^{*} + V_1({D_1}) - V_2({\Delta{d_0}}).$$ Again, if this quantity is less than zero, the corresponding scission configuration is energetically forbidden. Assuming fully accelerated fragments before the second scission sets $V_1(D_1\to\infty)\to0$. The maximum available energy or the tightest scission configuration in the second fission can therefore be obtained as a function of $\Delta{d_0}$ and $\Delta{D_0}$, where the latter gives the available $E_{IF}^{*}$. Combining Eqs. (\[eq:res:first\_q\])–(\[eq:res:TXE\_TPLF\]) gives $$\label{eq:res:aseq_final}
\mathit{TXE}_{2} = Q_{IF} + \mathit{TXE}_{1} + V_1({D_1}) - V_2({\Delta{d_0}})$$ where $\mathit{TXE}_{2} = E_{HF}^{*} + E_{TP}^{*} + E_{LF}^{*}$. This quantity reflects the net total energy available after the second fission, having provided the corresponding $E_{IF}^{*}$.
In Figs. \[fig:solutions\_almost\_sequential\] (a) and (b), the energy available in the first and second fissions are shown versus $\Delta{D_0}$ and $\Delta{d_0}$ (Eqs. (\[eq:res:TXE\_HFIF\]) and (\[eq:res:TXE\_TPLF\])), respectively. Results are shown for the systems ${^{235}\text{U}}(\text{n}_{\text{th}},\text{f})$ (solid lines) and ${^{252}\text{Cf}}(\text{sf})$ (dashed lines), both with and without an attractive nuclear interaction (bold and fine lines, respectively).
![\[fig:solutions\_almost\_sequential\] (Color online) The maximal available energy versus the corresponding scission tip distance in the fission processes (a) ${^{235}\text{U}}(\text{n}_{\text{th}},\text{f}) \rightarrow {^{132}\text{Sn}} + {^{104}\text{Mo}}$ (solid lines) and ${^{252}\text{Cf}}(\text{sf}) \rightarrow {^{132}\text{Sn}} + {^{120}\text{Cd}}$ (dashed lines), as well as in (b) ${^{104}\text{Mo}} \rightarrow {^{34}\text{Si}} + {^{70}\text{Ni}}$ (solid lines) and ${^{120}\text{Cd}} \rightarrow {^{50}\text{Ca}} + {^{70}\text{Ni}}$ (dashed lines). Results are shown both with and without an attractive nuclear interaction (bold and fine lines, respectively). In (c), a contour plot of the maximal available energy after fission of the IF (Eq. (\[eq:res:aseq\_final\])) for a certain scission tip distance $\Delta{d_0}$ is shown, assuming the maximum $E_{IF}^{*}$ has been provided. The latter is set by the tip distance $\Delta{D_0}$ of the first fission. The first and the second fissioning systems are ${^{235}\text{U}}(\text{n}_{\text{th}},\text{f})$ and ${^{104}\text{Mo}}$, respectively, and the contour lines show the available energy in MeV. In (d), the shaded regions show the $\Delta{D_0}$ and $\Delta{d_0}$ which lead to geometrically and energetically allowed fission of the IF, both for ${^{235}\text{U}}(\text{n}_{\text{th}},\text{f})$ (solid lines) and ${^{252}\text{Cf}}(\text{sf})$ (dashed lines). See text for further information. ](solutions_almost_sequential_auto.pdf){width="1.0\linewidth"}
It is apparent that there is a conflict in trying to reduce the first and the second scission tip distances. The reason is that a more narrow first tip distance will leave less $E_{IF}^{*}$ available, but a more narrow second tip distance requires a higher $E_{IF}^{*}$. Keeping both as narrow as possible, an $E_{IF}^{*}$ in the range of $39\text{--}40$ MeV is required in both ${^{235}\text{U}}(\text{n}_{\text{th}},\text{f})$ and ${^{252}\text{Cf}}(\text{sf})$. The figures also show that at any energetically allowed tip distances, the attractive nuclear interaction is negligible, and that it therefore is safe to neglect it in any further analysis. Fig. \[fig:solutions\_almost\_sequential\] (c) shows the total net energy available after the second fission (Eq. (\[eq:res:aseq\_final\])) as a contour plot versus $\Delta{d_0}$ and $\Delta{D_0}$, where the latter gives the available $E_{IF}^{*}$. The system is ${^{235}\text{U}}(\text{n}_{\text{th}},\text{f})$, and it is inherently assumed that the maximal $E_{IF}^{*}$ has been used. The available energies are indicated along the contour lines in units of MeV. Negative energies indicate that the corresponding scission configurations are energetically forbidden, and the contour line of $0$ MeV shows the most compact scission configuration that is energetically allowed. In Fig. \[fig:solutions\_almost\_sequential\] (d), the values of $\Delta{D_0}$ and $\Delta{d_0}$ that leads to energetically allowed fission of the IF and geometrically allowed scission configurations are indicated by the corresponding shaded areas. With the latter, we refer to that typical tip distances at scission are close to $\sim 2.5$ fm, while tip distances over $4$ fm are generally not considered as physically valid [@bib:gonnenwein91]. The solid and dashed lines indicate where ${^{235}\text{U}}(\text{n}_{\text{th}},\text{f})$ and ${^{252}\text{Cf}}(\text{sf})$ are energetically allowed, respectively. Note that for no scission configurations is the decay geometrically and energetically allowed simultaneously. We remind that these results were obtained for the most favorable systems and choice of parameters. Any non-zero excitation energies $E_{HF}^{*}, E_{TP}^{*}, E_{LF}^{*}$ separates the regions in Fig. \[fig:solutions\_almost\_sequential\] (d) even further as indicated by the contour lines, as does any less favorable mass splits, emitted neutrons, pre-scission kinetic energies or finite $D_1$. Even if there was somehow any configurations that were energetically and geometrically allowed, the low fissility and fission barrier penetrability has to be accounted for as well (see discussion in Sec. \[sec:cct\_model\_discussion\]).
In conclusion, these results show that CCT as a sequential decay is geometrically and energetically unfavorable or forbidden. This is highlighted by the fact that there is a competition in keeping the first and the second scission compact, and that a high $E_{IF}^{*}$ is required but leads to less geometrically favorable scission configurations.
\[sec:simultaneous\_decay\_results\]True ternary decay results
--------------------------------------------------------------
Using the true ternary decay model described in Sec. \[sec:simultaneous\_decay\_kinematics\] (derivations in App. \[sec:app:ternary\]), we parametrize the scission configuration using the fragment mass splits, neutron multiplicity, the relative distance $x_r$ (see Fig. \[fig:simultaneous\_decay\]) and the total excitation energy of all fragments $\mathit{TXE}=E^{*}_{HF}+E^{*}_{TP}+E^{*}_{LF}$. In Fig. \[fig:simultaneous\_single\_plot\], the final kinetic energies of the fragments are plotted against $x_r$ for $\mathit{TXE}=0$ MeV.
![\[fig:simultaneous\_single\_plot\] (Color online) Final fragment kinetic energies versus the relative starting position of the TP, $x_r$, in the true ternary decay model (as described in Sec. \[sec:simultaneous\_decay\_kinematics\], derivations in App. \[sec:app:ternary\]) of (a) ${^{235}\text{U}}(\text{n}_{\text{th}},\text{f})$, and (b) ${^{252}\text{Cf}}(\text{sf})$. When $x_r=0$ and $x_r=1$, the TP starts touching the HF and LF, respectively. Less than $1\%$ of the total energy remains as potential energy, and $\mathit{TXE}=0$ MeV.](simultaneous_single_plot_auto.pdf){width="1.0\linewidth"}
The highest kinetic energy of the LF is achieved if the TP is formed touching the HF ($x_r=0$), since the TP in this case transfers momentum from the HF to the LF. The central fragment ends up with almost no kinetic energy, since it is confined between the Coulomb forces of the outer fragments. In Fig. \[fig:simultaneous\_areas\_all\], all final fragment kinetic energies are plotted versus $\mathit{TXE}$.
![\[fig:simultaneous\_areas\_all\] (Color online) Areas of attainable final kinetic energies of the fission fragments, versus the total excitation energy of all fragments, in the true ternary decays (a–c) ${^{235}\text{U}}(\text{n}_{\text{th}},\text{f}) \rightarrow \text{Sn} + \text{Si} + \text{Ni}$, and (d–f) ${^{252}\text{Cf}}(\text{sf}) \rightarrow \text{Sn} + \text{Ca} + \text{Ni}$. Each figure is element specific, and the different areas indicate the choice of $x_r$, as indicated in the legend in (d). The areas are spanned between the highest and lowest kinetic energies obtained for each choice of $x_r$, by varying the neutron multiplicity as $\nu=0\text{--}4$ and the mass split as $A_{\text{Sn}} = 128\text{--}134$, $A_{\text{Ni}}=68,70,72$, (a–c) $A_{\text{Si}} = 34\text{--}40$, and (d–f) $A_{\text{Ca}} = 42\text{--}56$. Less than $1\%$ of the total energy remains as potential energy. ](simultaneous_areas_all_auto.pdf){width="1.0\linewidth"}
We represent the kinetic energy range for each fragment with an area, spanned by the highest and lowest kinetic energies obtained. The three different areas represent three different choices of $x_r$, as shown in the legend in Fig. \[fig:simultaneous\_areas\_all\] (d). The ranges of the varied mass splits and neutron multiplicies are given in the caption.
Here, results are presented up to $\mathit{TXE}=30$ MeV. This is higher than the average $\mathit{TXE}$ in alpha accompanied ternary fission. Note that the average $\mathit{TXE}$ also decreases rapidly with increased ternary particle size [@bib:mutterer04]. For true ternary fission, any significant $\mathit{TXE}>0$ MeV is therefore not expected.
Our results show that the final kinetic energies generally decrease for increased $\mathit{TXE}$, since there is less energy that can be converted into kinetic energy. The only exception is the kinetic energy of the TP, which increases with increased $\mathit{TXE}$ if it is formed touching the LF ($x_r = 1.0$ in Figs. \[fig:simultaneous\_areas\_all\] (c) and (f)). This is due to the back-scattering dynamics of the ternary particle against the heavy fragment. This dynamics depends on the distance between the light and heavy fragment (which increases with $\mathit{TXE}$), and the ternary particle position between them.
\[sec:collinearity\_stability\_results\]Collinear stability results
-------------------------------------------------------------------
Using the Monte-Carlo method described in Sec. \[sec:intrinsic\_stability\_collinearity\] (derivations in App. \[sec:app:stability\]), the intrinsic stability of collinearity is examined in the “true ternary” decay processes ${^{235}\text{U}}(\text{n}_{\text{th}},\text{f}) \rightarrow {^{132}\text{Sn}} + {^{34}\text{Si}} + {^{70}\text{Ni}}$ and ${^{252}\text{Cf}}(\text{sf}) \rightarrow {^{132}\text{Sn}} + {^{48}\text{Ca}} + {^{72}\text{Ni}}$. The final emission angle between the ternary particle and the light fragment is shown in Fig. \[fig:angle\_vs\_y\] versus the lateral offset of the ternary particle charge-center from the fission axis, denoted $y$, with zero initial momentum, and in Fig. \[fig:angle\_vs\_py\] versus the initial lateral kinetic energy of the ternary particle, i.e. initial momentum $p_y$, when all fragments are formed perfectly collinearly, with zero total linear and angular momentum.
![\[fig:angle\_vs\_y\] (Color online) Final emission angle between the light fragment and the ternary particle, versus the initial lateral fission axis offset $y$ of the ternary particle, when the ternary particle is initially closer to (a) the heavy fragment ($x_r < 0.5$), and (b) the light fragment ($x_r \geq 0.5$), respectively. The decays are ${^{235}\text{U}}(\text{n}_{\text{th}},\text{f}) \rightarrow {^{132}\text{Sn}} + {^{34}\text{Si}} + {^{70}\text{Ni}}$ and ${^{252}\text{Cf}}(\text{sf}) \rightarrow {^{132}\text{Sn}} + {^{48}\text{Ca}} + {^{72}\text{Ni}}$, as indicated by the legend. The plots are generated according to App. \[sec:app:stability\], by varying $x_r=0\text{--}1$, $\mathit{TXE}=0\text{--}30$ MeV, and $y=0\text{--}1$ fm. All initial momenta are set to zero.](angle_vs_y_auto.pdf){width="1.0\linewidth"}
![\[fig:angle\_vs\_py\] (Color online) Final emission angle between the light fragment and the ternary particle, versus the initial lateral kinetic energy of the ternary particle, when the ternary particle is initially closer to (a) the heavy fragment ($x_r < 0.5$), and (b) the light fragment ($x_r \geq 0.5$), respectively. The decays are ${^{235}\text{U}}(\text{n}_{\text{th}},\text{f}) \rightarrow {^{132}\text{Sn}} + {^{34}\text{Si}} + {^{70}\text{Ni}}$ and ${^{252}\text{Cf}}(\text{sf}) \rightarrow {^{132}\text{Sn}} + {^{48}\text{Ca}} + {^{72}\text{Ni}}$, as indicated by the legend. The plots are generated according to App. \[sec:app:stability\], by varying $x_r=0\text{--}1$, $\mathit{TXE}=0\text{--}30$ MeV, and $E_{\text{K},0}=0\text{--}0.05$ MeV. The total linear and angular momentum is set to zero, and all particles are initially set perfectly collinearly.](angle_vs_py_auto.pdf){width="1.0\linewidth"}
In these figures, each area is spanned by the smallest to largest angles obtained, from more than $10^6$ Monte-Carlo simulations, sampling three different parameters uniformly with $\sim100$ different values each. The first parameter is the ternary particle position between the heavy and light fragment, denoted $x_r$, which is varied from touching the HF ($x_r=0$), to touching the LF ($x_r=1$). The results are shown separately when the ternary particle is formed closer to (a) the HF, and (b) the LF. The second parameter is the sum of the excitation energies of the fragments, denoted $\mathit{TXE} = {E_{HF}^{*}} + {E_{LF}^{*}} + {E_{TP}^{*}}$, which is varied between $0$ and $30$ MeV. The third parameter is the perturbation, being either the lateral ternary particle position ($y$) or momentum ($p_y$). For the position-based perturbation, $y$ is varied between $0$ and $1$ fm, which is much smaller than the TP radius of $r_{TP} = r_{0}\sqrt[3]{A_{TP}} > 4$ fm (where $r_0 \approx 1.25$ fm). The momentum-based perturbation $p_y$ is set by varying the lateral pre-scission kinetic energy of the ternary particle. Note that the total linear and angular momentum can be broken during the time specified by the uncertainty principle. Monte-Carlo simulations were run both conserving and not conserving these momenta, and the results were on the same order of magnitude. Results are shown here (Fig. \[fig:angle\_vs\_py\]) for the former case, with a total lateral pre-scission kinetic energy of the system, denoted $E_{K,0}$, between $0$ and $0.05$ MeV. Note that this initial kinetic energy is very small compared to usual energies in fission. In Fig. \[fig:angle\_vs\_py\], the initial kinetic energy of the TP extends higher for the lighter ${^{34}\text{Si}}$ than for the heavier ${^{48}\text{Ca}}$, due to momentum conservation.
The calculated angles are expected to hold even for more realistic trajectory calculations, because, as discussed by @bib:carjan80 for the case of alpha-accompanied fission, explicit inclusion of deformations and attractive nuclear interactions leads only to a small ($<10\%$) modification of the resulting angles. For heavier ternary particles than alphas, experiments have shown [@bib:grachev80; @bib:grachev88; @bib:schall88] that with rising nuclear charge of the ternary particle, its angular distribution gets narrower and more perpendicular to the fission axis.
According to our results, the requirement of a collinear emission angle[^1] imposes that the charge-center can deviate no more than $y_{\text{TP}}^{\text{max}} \approx 0.02$ fm from the fission axis, or that the lateral initial kinetic energy of the ternary particle can be no larger than $E_{\text{TP}}^{\text{max}} \approx 10^{-4}$ MeV. The corresponding momentum is calculated from $$\label{eq:stability:results:momentum}
\frac{p_{\text{TP}}^{y,\text{max}}}{\hbar} = \frac{\sqrt{2E_{\text{TP}}^{\text{max}}m_{TP}}}{\hbar},$$ with a value of $0.013$ and $0.015$ fm$^{-1}$ for Si and Ca, respectively. From a quantum mechanical perspective, it seems rather unlikely that both the position and momentum could be constrained to such a narrow region. Comparing with the uncertainty principle, we get $$\label{eq:uncertainty_principle_stability}
\frac{y_{\text{TP}}^{\text{max}}p_{\text{TP}}^{y,\text{max}}}{\hbar} \approx 0.0003 \ll \frac{1}{2} \leq \frac{\Delta{y}\Delta{p_y}}{\hbar},$$ for both ${^{34}\text{Si}}$ and ${^{48}\text{Ca}}$. Only one of the two off-axis dimensions have been included. Introducing the second off-axis dimension reduces the threshold even further, as does including simultaneously a perturbation in position and momentum, or considering only realistic excitation energies close to zero MeV. This implies that collinearity is extremely unstable and improbable in ternary fission due to quantum-mechanical uncertainties.
In addition, we artificially increased the initial separation distance between the outer fragments (the HF and the LF) until the repulsion between them became negligible. These simulations gave similar results, and showed that the repulsion between the TP and the LF alone can break collinearity. Thus, even in a very late sequential decay, collinearity is in question. Assuming a sequential decay, @bib:nasirov16 showed that lateral offsets of the TP up to $2$ fm are expected at scission, and @bib:tashkhodjaev16 confirmed that collinearity indeed can be broken.
\[sec:discussion\]Discussion
============================
The discussion is separated into three subsections. In the first subsection, we discuss how CCT can be experimentally verified through direct observation, by covering the possible kinetic energy ranges that we have derived. In the second subsection, we discuss the CCT interpretation, and highlight some of its features which are in contrast to previous experiments. In the third subsection, we discuss the intrinsic stability of collinearity, and its consequence for the angular distribution in ternary fission.
\[sec:results\_discussion\]Verification by direct observation
-------------------------------------------------------------
Regardless of any decay model a possible CCT could occur through, the kinetic energies must conform to energy and momentum conservation. As apparent in the FOBOS measurements [@bib:pyatkov10; @bib:pyatkov10_3; @bib:pyatkov12], two fragments will be emitted in opposite directions, with enough energy to be detected by spectrometers. This sets a constraint on the possible kinetic energies of the outer fragments, and consequently leaves little room for considerably changing the kinetic energy distribution of a potential third fragment. Therefore, an experiment aiming at direct observation of CCT with a spectrometer only needs to cover a wide enough energy range to ensure a model-independent verification.
To aid such experiments, we have presented the kinetic energy ranges allowed by energy and momentum conservation, for the collinear emission of three fragments in the processes ${^{235}\text{U}}(\text{n}_{\text{th}},\text{f}) \rightarrow {\text{Sn}} + {\text{Si}} + {\text{Ni}} + \nu{\cdot}\text{n}$, and ${^{252}\text{Cf}}(\text{sf}) \rightarrow {\text{Sn}} + {\text{Ca}} + {\text{Ni}} + \nu{\cdot}\text{n}$. Our derivations allow easy extension to any fissioning system. We have focused on the late sequential and the true ternary decay models, since they represent the extremes of the kinetic energy distribution (illustrated in Figs. \[fig:sequential\_areas\_all\] and \[fig:simultaneous\_areas\_all\], respectively). These kinetic energy ranges obviously extend into physically unreasonable parameter values, and therefore give a safe upper limit for experiments. Therefore, an experiment that can cover the kinetic energies between these extremes can directly verify CCT, and if any events are found, determine the corresponding decay model by comparing the measured kinetic energies to our results.
These results indicate that it would be relatively easy to use a fission fragment spectrometer to verify CCT through direct observation, by looking for the light fragment, Ni, and in certain configurations, also the ternary particles Si and Ca. Detection of the heavy fragment Sn would be challenging given the similar kinetic energies to binary fission, but more importantly, due to the high background of the latter. At the reported CCT yields of $0.5\%$ [@bib:pyatkov10; @bib:pyatkov10_3; @bib:pyatkov12], the fragment Ni would be easily discernible against the far-asymmetric fission yield of roughly $10^{-8}$ [@bib:kellett09; @bib:endf-349], regardless of kinetic energies. If the ternary particle was formed on the outside, our results indicate that it would have a kinetic energy which is easily separated in a spectrometer, as there is no background of such fragments from binary fission. Several potential energy surface calculations [@bib:vijayaraghavan15; @bib:oertzen15; @bib:tashkhodjaev15] have shown, however, that it would be energetically favorable if the ternary particle was in the center position. In this configuration, all three models show that the kinetic energy of the ternary particle would be close to zero MeV. At such low kinetic energies, the ternary particle would barely be able to leave the target, traverse detector windows and dead layers to deposit enough energy for a clear signal. Hence, it would be very easy to discriminate the ternary particle from the light fragment in a correctly designed experiment, due to the highly differing energies and velocities. Both a symmetric and an asymmetric double-armed detector setup would therefore show a clear missing-mass signature in *both* detectors in a mass-versus-mass spectrum. These results raises the question of why the FOBOS experiments [@bib:pyatkov10; @bib:pyatkov10_3; @bib:pyatkov12] did not see a missing-mass signature in both detector arms, or why @bib:kravtsov99 saw no missing-mass signature from CCT.
\[sec:cct\_model\_discussion\]On the CCT interpretation
-------------------------------------------------------
To this date, almost all theoretical research that studies yields and probabilities of CCT, have been based on macroscopic potential-energy surface calculations with few dimensions, see for example Refs. [@bib:vijayaraghavan15; @bib:oertzen15; @bib:tashkhodjaev15]. In this context it is important to remember a fundamental caveat for all fission models, that was concisely discussed by @bib:moller01:
*“In the past, fission properties have often been correlated with models of the binding energy of separated fission fragments, and of valleys inside the point of contact. However, the valleys by themselves do not determine the final state of a fissioning nucleus. Final states corresponding to three or more fragments are in many cases energetically more favoured than are states of two final fission fragments. In these cases the nucleus nonetheless divides into only two fragments. This occurs because the barrier between the ground state and the binary fission valley favours such divisions and a ridge separates the binary from the ternary valley, although dynamical effects may also affect the division.”*
Therefore, a full theoretical treatment determining the probability or yield of CCT would require a macroscopic-microscopic or microscopic description with an adequate number of degrees of freedom. State-of-the-art macroscopic-microscopic calculations of potential-energy surfaces in binary fission are based on a 5-dimensional parameterization including elongation, mass asymmetry, neck radius and deformation of the left and the right fragments [@bib:moller01; @bib:randrup11; @bib:ichikawa12; @bib:moller15]. To find the fission valleys in this 5-dimensional potential-energy surface, typically 5 million grid points are calculated [@bib:moller01]. An extension to CCT with similar details would require in addition five more parameters, namely the mass, deformation and longitudinal position of the ternary fragment, its lateral offset from the fission axis and the second neck radius. Such 10-dimensional potential-energy surface calculations have never been reported and will probably remain beyond computational limitations for some time. The microscopic description by Density Functional Theory (DFT) method also explores a multidimensional deformation landscape by constraining the collective degrees of freedom to the lowest multipole orders (elongation, reflection-asymmetry, necking and triaxiality) [@bib:staszczak09]. Again such a description is already very computing intensive for binary fission and a direct extension covering all degrees of freedom required for ternary fission cannot be envisaged at the present.
The original reports by the FOBOS collaboration [@bib:pyatkov10; @bib:pyatkov10_3; @bib:pyatkov12] and the previously mentioned theoretical studies of CCT favor a sequential [@bib:vijayaraghavan12] or an “almost sequential” [@bib:tashkhodjaev15] decay model as an interpretation of the FOBOS experiments. In such a decay, it is not enough to know if the final result has a high Q-value or a low potential-energy surface. The intermediate steps also have to be studied in detail, as they might be forbidden or improbable. The latter was shown to be the case for the masses proposed by FOBOS, as illustrated in our results by the very low, at times even negative, Q-value, of the intermediate fragment. Even if this is compensated for by excitation energy, it does not mean that the fragment will always fission. It also has to overcome or tunnel through the fission barrier, and the probability to fission depends on the barrier penetrability. The fissility of the intermediate fragment ($Z^2/A < 17$ for ${^{104}\text{Mo}}$ and $Z^2/A < 20$ for ${^{120}\text{Cd}}$) is much lower than that of known fissioning systems. The fission barrier can be estimated from the generalized liquid drop model [@bib:royer98] to be $44$ MeV for both $^{104}\text{Mo}$ and $^{120}\text{Cd}$. It is known that this model overestimates the real fission barriers [@bib:moller95] by up to $10\text{--}12$ MeV.
These fission barriers highlight an overlooked contradiction in the previous theoretical studies on CCT. In a sequential or an almost sequential decay, the intermediate fragment must somehow fission. The low Q-values and the high fission barrier together signify that fission of the intermediate fragment is unlikely. This in turn implies that the yield of binary fission, in which the intermediate fragments Mo and Cd are formed but do not decay, must be significantly higher than the reported yield of CCT of $0.5\%$. No such overabundance of the respective intermediate fragment has been observed. Thus the intermediate Mo and Cd would need to fission with a very high probability, which is in contradiction with the high fission barrier and the low Q-values. To have any probability for fission, a considerable excitation energy would be required. As the excitation energy increases, however, the results have shown that the kinetic energy of the ternary particle approaches zero MeV, leading to the case where CCT should have been found in previous experiments, described in the previous section (Sec. \[sec:results\_discussion\]). More importantly, at high excitation energies, other modes of de-excitation become competitive, most importantly neutron emission, reducing the likelihood of fission. It is evident that neutron emission in the first fission of the sequential model takes away excitation energy from the system that is essential to enable the second fission step. Therefore it is surprising that FOBOS concluded from their Experiment 3 [@bib:pyatkov12] on the isotropic emission of about four neutrons in coincidence with CCT events. To be isotropic these neutrons must be emitted at the first scission, not after pre-acceleration of the IF. The excitation energy of the IF would be correspondingly reduced by about $30$ MeV, i.e. effectively preventing any second fission. Clearly this experimental indication cannot be reconciled with any sequential or near-sequential model.
\[sec:instability\_of\_collinearity\]Intrinsic stability of collinearity
------------------------------------------------------------------------
The discussion has so far highlighted possible short-comings with the currently favored CCT models (the sequential decay models). This inspired us to study a “true ternary” decay model. It was shown, however, in Sec. \[sec:collinearity\_stability\_results\] that collinearity is extremely unstable and improbable in ternary fission, since it occurs at an unstable equilibrium point. Thus, it was found that a sufficient perturbation in the ternary particle position or momentum perpendicular to the fission axis breaks collinearity. Furthermore, we found that the threshold in position and momentum for a collinear emission is much smaller than the typical variations governed by the uncertainty principle. The latter could therefore be responsible for breaking collinear configurations into equatorial emission in ternary fission. This means that a collinear (prolate) scission configuration does not necessarily imply collinear emission, and that equatorial emission does not necessarily imply a triangular (oblate) scission configuration. In other words, if CCT occurred through ternary fission, it should have been detected previously by triple-coincidence experiments [@bib:schall87]. These arguments might hold even for CCT occurring through late sequential decay, given recent results showing that in this model, it is indeed possible that the ternary particle deviates from the fission axis [@bib:nasirov16], and that collinearity is broken [@bib:tashkhodjaev16]. So far, ternary fission experiments have shown that with rising nuclear charge of the ternary particle, its angular distribution gets narrower and more perpendicular to the fission axis [@bib:grachev80; @bib:grachev88; @bib:schall88]. In addition, the collinearity of the heavy and light fragment is lost due to momentum conservation [@bib:gonnenwein05]. This raises the question of why only collinear events but not ternary events with larger angles would be observed for the mass splits proposed by the FOBOS collaboration.
\[sec:conclusions\]Conclusions
==============================
Initially, our model calculations aimed to guide an independent validation experiment by predicting the physically possible kinetic energy range for CCT that has to be covered. Eventually the detailed investigation of currently favored CCT models brought to light features that are either unphysical or that would lead to unique experimental observables, some of which are in contrast to previous experiments.
In the most favorable geometrical configuration, when the lightest fragment is formed at the center, the light fragment has so little energy that it would barely leave the target, traverse windows and dead layers to deposit enough energy in a detector arm. Hence, such CCT events should be clearly visible in any $2v2E$ setup as “missing mass” events, even without a specific left-right asymmetry as the support grid in the FOBOS setup. Consequently FOBOS should have observed a similar pattern in both arms and other two-arm-spectrometers should have observed CCT too.
All sequential models implicitly assume a very high fission probability of the intermediate fragment. However, in reality the fissility of the intermediate fragment is low and its fission barrier is very high ($> 30$ MeV). As shown in our calculations, excitation energies of the intermediate fragment far above its fission barrier are unphysical, hence other de-excitation modes (neutron and gamma emission) will largely dominate. Therefore, a given yield of CCT would be accompanied by a much higher yield of binary events involving the specific intermediate fragments that did not undergo fission. Such a peculiar pattern of local over-abundance of specific mass splits should have been detected in previous experiments, in particular in $\gamma \gamma \gamma$-spectroscopy with large Ge detector arrays.
The inclusion of any realistic excitations would further destroy collinearity. For example any fragment angular momentum can turn the fission axis of the intermediate fragment with respect to the first fission axis, thus destroying collinearity.
Collinear configurations are intrinsically unstable in three-body systems with pure or dominantly repulsive forces. Thus, also for true ternary fission models where both scissions happen synchronously, collinearity is unstable. Our calculations quantify this fact by deriving the very restricted phase space of scission configurations that could lead to somehow collinear configurations after acceleration. Even under these simplified model assumptions, all but very few of the “nearly collinear” scission configurations will after full acceleration result in large angles between the fragments. Despite the overwhelming number of true ternary fission scission configurations leading to large angles between the fragments, so far no plausible mechanism has been proposed to explain why only CCT events would be observed but not ternary events with larger angles. Our stability calculations imply that the latter should be far more frequent, i.e. leading to an excess yield of ternary mass splits that must have been observed by previous experiments.
In conclusion, our investigation of the currently favored CCT models highlights serious discrepancies of model features with experimental observations. Obviously these very simplified models do not include shell effects, collective excitations, angular momenta, etc. However, in our opinion it is not likely that the explicit inclusion of all these effects could cure the discrepancies of the CCT models, namely the intrinsic instability of collinearity in true ternary fission, or the low fission probability of the intermediate fragment in sequential fission. Thus, we have to conclude that today there is no model that could provide a valid explanation of the experimental claims of CCT put forward by the FOBOS collaboration. Therefore, we encourage further critical theoretical studies with more realistic ternary fission models. More importantly, to truly resolve this matter, experimental verifications are required, which is made possible by covering the kinetic energy ranges derived in this paper, for example with high-resolution fission fragment spectrometers.
We thank Christian Forssén and Hkan T. Johansson for fruitful discussions. P.H. is thankful to the members of the subatomic physics group at Chalmers for their support, and to the staff at the Institut Laue-Langevin for their hospitality extended during his stays in Grenoble.
\[sec:app:almost\_sequential\]Sequential and “almost sequential” decay model derivations
========================================================================================
This appendix describes how the final kinetic energies are solved analytically for CCT fragments from a sequential decay (described in Sec. \[sec:sequential\_decay\_kinematics\], depicted in Fig. \[fig:app:almost\_sequential\_decay\]), and how the scission-point configuration (initial positions and momenta) of such fragments is constrained in an “almost sequential” decay (described in Sec. \[sec:almost\_sequential\_decay\_kinematics\], depicted in Fig. \[fig:app:almost\_sequential\_decay\]). In both cases, this is achieved by energy and momentum conservation.
![\[fig:app:almost\_sequential\_decay\] (Color online) CCT as a sequential or an “almost sequential” decay, as described in Secs. \[sec:sequential\_decay\_kinematics\] and \[sec:almost\_sequential\_decay\_kinematics\], respectively. In contrast to the former model, the Coulomb repulsion between the fragments is relevant at all times in the latter model, making the inter-fragment distances relevant to the kinematics. Arrows indicate momentum direction.](shapes_almost_sequential_app.pdf){width="0.65\linewidth"}
Both models use the same set of equations, with the difference that in the sequential and almost sequential models, the fragments are fully and partially accelerated before the second scission (the potential energy is zero and non-zero), and the derived kinetic energies are the final and inital (after the second scission), respectively. In the almost sequential model, the final kinetic energies are computed from the scission configuration with semi-classical trajectory calculations, as described in Sec. \[sec:models\]. The derivation includes both a repulsive Coulomb potential and an attractive nuclear potential, where a Yukawa-plus-exponential function [@bib:krappe79_prl; @bib:krappe79_prc] was used for the latter in our calculations. Deformed fragments can be assumed by including the corresponding higher-order moments in these potentials. The kinetic energies carried away by neutrons have not been explicitly included. This is energy which is not available to the acceleration of the final fragments, and can therefore be added to the effective Q-values.
Energy conservation of the first scission gives $$\label{eq:aseq:q_fs}
Q_{FS} + E^{*}_{FS} = V_1 + E_{HF} + E_{IF} + E^{*}_{HF} + E^{*}_{IF},$$ where $V_1$ is the potential, ${E^{*}_{\text{FF}}}$ represents the excitation energy and $E_{\text{FF}}$ the kinetic energy of the respective fragment. The Q-value of the fissioning system is $$\label{eq:aseq:q1_2}
Q_{FS} = M_{FS} - M_{HF} - M_{IF} - \nu_1 \cdot M_{n},$$ where $M$ are the mass excesses and $\nu_1$ is the neutron multiplicity. The potential is $$\label{eq:aseq:pot1}
V_1 = E_{C,1} + E_{N,1}$$ where $E_{N,1}$ is the attractive potential, and $E_{C,1}$ the Coulomb potential $$\label{eq:aseq:ec1}
E_{\text{C},1} = k\frac{e^2Z_{HF}Z_{IF}}{D},$$ with $D$ being the center-to-center distance between the HF and the IF, $k$ the Coulomb constant and $e$ the elementary charge. Let ${Q_{FS}^{\text{eff}}}$ denote the “effective” Q-value of the first scission (the energy available for acceleration of the HF and the IF) $$\label{eq:aseq:q1_eff}
{Q_{FS}^{\text{eff}}} = Q_{FS} + {E^{*}_{FS}} - V_1 - {E^{*}_{HF}} - {E^{*}_{IF}}.$$ If this term is negative, the corresponding configuration and value of ${E^{*}_{HF}} + {E^{*}_{IF}}$ is energetically forbidden. Let $D_1$ denote the distance at the instant before the scission of the intermediate fragment (note that there is a unique correspondence between this parameter and the time between the two scissions). At this point, the momenta and kinetic energies of the HF and IF are determined from energy and momentum conservation $$\begin{aligned}
\label{eq:aseq:energy_conservation_1}
E_{HF} + E_{IF} & = & \frac{p^2_{HF}}{2m_{HF}} + \frac{p^2_{IF}}{2m_{IF}}
\\
\label{eq:aseq:momentum_conservation_1}
p_{HF} + p_{IF} & = & 0 ,\end{aligned}$$ with the solutions $$\begin{aligned}
\label{eq:aseq:HF_mom}
p_{HF} & = & \mp\sqrt{2m_{HF} \cdot {Q_{FS}^{\text{eff}}} \cdot \mu_{IF} }
\\
\label{eq:aseq:IF_mom}
p_{IF} & = & \pm\sqrt{2m_{IF} \cdot {Q_{FS}^{\text{eff}}} \cdot \mu_{HF} }
\\
\label{eq:aseq:HF_kin}
E_{HF} & = & {Q_{FS}^{\text{eff}}} \cdot \mu_{IF}
\\
\label{eq:aseq:IF_kin}
E_{IF} & = & {Q_{FS}^{\text{eff}}} \cdot \mu_{HF},\end{aligned}$$ where the reduced masses are $$\begin{aligned}
\label{eq:aseq:reduced_HF}
\mu_{HF} & = & \frac{m_{HF}}{m_{HF}+m_{IF}}\\
\label{eq:aseq:reduced_IF}
\mu_{IF} & = & \frac{m_{IF}}{m_{HF}+m_{IF}}.\end{aligned}$$ Eqs. (\[eq:aseq:HF\_kin\]) and (\[eq:aseq:IF\_kin\]) are the final kinetic energies of fully accelerated fragments if $V_1(D_1\to\infty)\to0$. The positive and negative signs of the momenta correspond to the two directions along the fission axis. After the second scission, $D$ denotes the distance between the HF and the mass-center of the TP and the LF. Let $d$ denote the charge-center distance between the TP and the LF $$\label{eq:aseq:d}
d = d_{TP} + d_{LF},$$ where $d_{TP}$ and $d_{LF}$ are the center-of-mass distances to the TP and LF, respectively, related by $$\label{eq:aseq:com_conservation}
-d_{TP}m_{TP} + d_{LF}m_{LF} = 0.$$ Combining Eqs. (\[eq:aseq:com\_conservation\]) and (\[eq:aseq:d\]) yields $$\begin{aligned}
\label{eq:aseq:d_tp_lf_2}
d_{LF} & = & d \cdot \mu_{TP}
\\
\label{eq:aseq:d_tp_lf_1}
d_{TP} & = & d \cdot \mu_{LF},\end{aligned}$$ where the reduced masses are $$\begin{aligned}
\label{eq:aseq:reduced_LF}
\mu_{LF} & = & \frac{m_{LF}}{m_{LF}+m_{TP}}\\
\label{eq:aseq:reduced_TP}
\mu_{TP} & = & \frac{m_{TP}}{m_{LF}+m_{TP}}.\end{aligned}$$ Energy conservation of the second scission gives $$\begin{gathered}
\label{eq:aseq:q2_1}
Q_{IF} + V_1 + E_{IF} + E_{IF}^{*} =\\V_2 + E_{TP} + E_{LF} + E_{TP}^{*} + E_{LF}^{*},\end{gathered}$$ and energy conservation of both fission processes give $$\label{eq:aseq:q_full}
Q_{FS} + E^{*}_{FS} + Q_{IF} = V_2 + \mathit{TKE} + \mathit{TXE}$$ where $$\begin{aligned}
\label{eq:aseq:pot1}
V_2 & = & E_{C,2} + E_{N,2}\\
\label{eq:aseq:TKE}
\mathit{TKE} & = & E_{HF} + E_{LF} + E_{TP}\\
\label{eq:aseq:TXE}
\mathit{TXE} & = & {E^{*}_{HF}} + {E^{*}_{LF}} + {E^{*}_{TP}}.\end{aligned}$$ The Q-value is given by $$\label{eq:aseq:q2_2}
Q_{IF} = M_{IF} - M_{LF} - M_{TP} - \nu_2 \cdot M_{n},$$ and the Coulomb energy after the second scission is $$\begin{aligned}
E_{\text{C},2} = k\frac{e^2Z_{TP}Z_{HF}}{D - d\cdot \mu_{LF}} & + & k\frac{e^2Z_{LF}Z_{HF}}{D+d\cdot \mu_{TP}}\nonumber\\
\label{eq:aseq:ec2}
& + & k\frac{e^2Z_{TP}Z_{LF}}{d}.\end{aligned}$$ Rearranging the equations slightly yields $$\begin{gathered}
\label{eq:aseq:ekin_tplf}
E_{TP}+E_{LF} =\\Q_{IF} + E^{*}_{IF} + E_{IF} + V_1 - V_2 - E^{*}_{TP} - E^{*}_{LF},\end{gathered}$$ where from now on $V_1$ is evaluated at $D_1$ and $V_2$ at any arbitrary $D \geq D_1$. The momenta and kinetic energies of the TP and LF are determined from energy and momentum conservation $$\begin{aligned}
\label{eq:aseq:ekin_tplf_2}
E_{TP}+E_{LF} & = & \frac{p^{2}_{TP}}{2m_{TP}} + \frac{p^{2}_{LF}}{2m_{LF}}\\
\label{eq:aseq:mom_cons_2}
p_{LF} + p_{TP} & = & p_{IF},\end{aligned}$$ with the solutions $$\begin{aligned}
\label{eq:aseq:p_lf}
p_{LF} & = & p_{IF}\cdot\mu_{LF} \pm \sqrt{2m_{LF} \cdot {Q_{IF}^{\text{eff}}} \cdot \mu_{TP}}\\
\label{eq:aseq:p_tp}
p_{TP} & = & p_{IF}\cdot\mu_{TP} \mp \sqrt{2m_{TP} \cdot {Q_{IF}^{\text{eff}}} \cdot \mu_{LF}}.
\\
\label{eq:aseq:LF_kin}
E_{LF} & = & \left(\sqrt{E_{IF} \cdot \tilde{\mu}_{IF} \cdot \mu_{LF}} \pm \sqrt{ {Q_{IF}^{\text{eff}}} \cdot \mu_{TP} }\right)^2\\
\label{eq:aseq:TP_kin}
E_{TP} & = & \left(\sqrt{E_{IF} \cdot \tilde{\mu}_{IF} \cdot \mu_{TP}} \mp \sqrt{ {Q_{IF}^{\text{eff}}} \cdot \mu_{LF} }\right)^2\end{aligned}$$ where ${Q_{IF}^{\text{eff}}}$ is the effective Q-value of the second fission (the energy available for acceleration of the TP, LF and the HF, if not fully accelerated already) $$\label{eq:aseq:q2_eff}
{Q_{IF}^{\text{eff}}} = Q_{IF} + V_1 - V_2 + E^{*}_{IF} - E^{*}_{TP} - E^{*}_{LF} - E_{n}$$ with the kinetic energy of the emitted neutrons $$\label{eq:aseq:n_kin}
E_{n} = E_{IF}\frac{\nu_2m_{n}}{m_{LF}+m_{TP}}.$$ and the reduced mass $\tilde{\mu}_{IF}$ $$\label{eq:aseq:reduced_IF_2}
\tilde{\mu}_{IF} = \frac{m_{IF}}{m_{LF}+m_{TP}}.$$ The positive and negative signs of the momenta represent an increase and decrease in momentum corresponding to the outer and inner positions, respectively. This is because the acceleration of the inner fragment is opposite to the direction that the IF was moving in, leaving it with little to zero kinetic energy. Conversely, the outer fragment is accelerated in the same direction as the IF was moving in, boosting its kinetic energy. The boost is increased as $E^{*}_{IF}$ increases. The kinetic energy of the HF follows the opposite trend, since any excitation energy steals energy from the first scission, leaving less for kinetic energy.
If at the moment of the second scission $V_1(D_1\to\infty)\to0$, and subsequently $V_2(D,d\to\infty)\to0$, then the kinetic energies in Eqs. (\[eq:aseq:HF\_kin\]), (\[eq:aseq:LF\_kin\]) and (\[eq:aseq:TP\_kin\]) are the final kinetic energies of the HF, LF and TP, respectively. On the other hand, if $D_1$ is finite at the moment of the second scission such that the potential energy of the HF is not negligible, then the scission-point configuration is specified by $D_1$ and $d$ together with the momenta in Eqs. (\[eq:aseq:HF\_mom\]), (\[eq:aseq:p\_lf\]) and (\[eq:aseq:p\_tp\]). The configuration is uniquely constrained by energy and momentum conservation for given excitation energies, mass splits and neutron multiplicities. The final kinetic energies in turn depend on exactly how $D$ and $d$ are taken to infinity. This is contained in the dynamics but not the kinematics, which is why semi-classical trajectory calculations are used.
\[sec:app:ternary\]True ternary decay model derivations
=======================================================
This appendix describes how the scission-point configuration is constrained by energy and momentum conservation for given CCT fragments in the true ternary decay model (see Fig. \[fig:app:simultaneous\_decay\]). The final kinetic energies are computed from this scission configuration with semi-classical trajectory calculations, as described in Sec. \[sec:models\].
![\[fig:app:simultaneous\_decay\] (Color online) CCT as a true ternary decay, as described in Sec. \[sec:simultaneous\_decay\_kinematics\]. Note that $x_r$ is a relative and dimensionless coordinate, defined between $0$ and $1$, corresponding to the TP “touching” the HF and the LF, respectively.](shapes_true_ternary_app.pdf){width="0.65\linewidth"}
Energy conservation of the fission gives $$\label{eq:q_simultaneous}
Q_{FS} + {E^{*}_{FS}} = V + \mathit{TXE} + E_{\text{K},0},$$ where $\mathit{TXE} = {E_{HF}^{*}} + {E_{LF}^{*}} + {E_{TP}^{*}}$ is the sum of all fragment excitation energies, $E_{\text{K},0}$ is the total pre-scission kinetic energy, ${E^{*}_{FS}}$ the excitation energy of the fissioning system, and $V$ is the potential energy $$\label{eq:trueternary:potential}
V = E_{\text{C}} + E_{\text{N}}.$$ The Q-value is $$\label{eq:q2_simultaneous}
Q_{FS} = M_{FS} - M_{HF} - M_{TP} - M_{LF} - \nu \cdot M_{n},$$ where $M$ are the mass excesses and $\nu$ is the neutron multiplicity. The Coulomb potential is given by $$\label{eq:ec_simultaneous}
E_{\text{C}} = k\frac{e^2Z_{TP}Z_{HF}}{x} + k\frac{e^2Z_{TP}Z_{LF}}{D-x} + k\frac{e^2Z_{HF}Z_{LF}}{D},$$ where $k$ is the Coulomb constant, $e$ the elementary charge, and the center-to-center distances are $x$ between the TP and HF, $D$ between the HF and LF, and $D-x$ between the TP and LF. $E_{\text{N}}$ is the attractive nuclear potential. Note that we can express $x$ in terms of $D$ and the relative (and dimensionless) coordinate $x_r\in[0,1]$ as $$\label{eq:x_simultaneous}
x = r_{TP} + r_{HF} + x_r\left(D - 2r_{TP} - r_{LF} - r_{HF}\right),$$ where $r_{TP}$, $r_{HF}$ and $r_{LF}$ denote the radii of the respective fragments. To obtain the scission configuration, Eqs. (\[eq:q2\_simultaneous\])–(\[eq:x\_simultaneous\]) are substituted into Eq. (\[eq:q\_simultaneous\]) and solved with respect to $D$. There are multiple solutions corresponding to all possible fragment arrangements, only one of which corresponds to the arrangement in Fig. \[fig:simultaneous\_decay\]. Choosing this $D$ fully determines the scission-point configuration through the above equations, for a given fragment mass split, neutron multiplicity and pre-scission kinetic energy, with the parameters $x_r$ and $\mathit{TXE}$.
\[sec:app:stability\]Intrinsic stability of collinearity derivations
====================================================================
Based on the equations of App. \[sec:app:ternary\], this appendix describes how the scission-point configuration is constrained by energy and momentum conservation for given CCT fragments in the true ternary decay model, with a perturbation in the ternary particle position or momentum (see Fig. \[fig:app:stability\_simultaneous\_decay\]). The final kinetic energies are computed from this scission configuration with semi-classical trajectory calculations, as described in Sec. \[sec:models\].
![\[fig:app:stability\_simultaneous\_decay\] (Color online) CCT as a true ternary decay with a perturbation in the ternary particle position or momentum, as described in Sec. \[sec:intrinsic\_stability\_collinearity\]. Note that $x_r$ is a relative and dimensionless coordinate, defined between $0$ and $1$, corresponding to the TP “touching” the HF and the LF, respectively.](shapes_instability_app.pdf){width="0.65\linewidth"}
For the momentum-based perturbation, the ternary particle offset from the fission axis is set to $y=0$, and the total pre-scission kinetic energy $$\label{eq:stability:ekin}
E_{\text{K},0} = \frac{p^2_{TP}}{2m_{TP}} + \frac{p^2_{HF}}{2m_{HF}} + \frac{p^2_{LF}}{2m_{LF}}$$ in Eq. (\[eq:q\_simultaneous\]) is sampled as $E_{\text{K},0} \in [0,{E_{\text{K},0}^{\text{max}}}]$, where ${E_{\text{K},0}^{\text{max}}}$ is a limit to be set. The relative ternary particle position $x_r$ is sampled as $x_r \in [0, 1]$, and the sum of the excitation energies of the fragments as $\mathit{TXE} \in [0, \mathit{TXE}_{\text{max}}]$, where $\mathit{TXE}_{\text{max}}$ is a limit to be set. With these parameters given, all the inter-particle distances are fully determined as described in the true ternary decay model (App. \[sec:app:ternary\]). It is now described how to determine the initial momenta. Let the origin of the lab frame be the charge-center of the ternary particle. Let the $x$-axis be the fission axis, and the initial momenta be along the $y$-axis. The coordinate of the center-of-mass in this lab frame is $$\label{eq:stability:com}
R_{\text{CM}} = \frac{-x \cdot m_{HF} + (D-x) \cdot m_{LF}}{m_{TP} + m_{HF} + m_{LF}},$$ The particle coordinates in the center-of-mass frame are $$\begin{aligned}
R_{TP} & = & -R_{\text{CM}}\label{eq:stability:com_tp},\\
R_{HF} & = & R_{TP} - x\label{eq:stability:com_hf},\\
R_{LF} & = & R_{TP} + (D-x)\label{eq:stability:com_lf}.\end{aligned}$$ Conservation of linear and angular momenta yield $$\begin{aligned}
p_{TP} + p_{HF} + p_{LF} & = & 0\label{eq:stability:linear_mom}\\
R_{TP} \cdot p_{TP} + R_{HF} \cdot p_{HF} + R_{LF} \cdot p_{LF} & = & 0,\label{eq:stability:angular_mom}\end{aligned}$$ respectively, which gives the relations $$\begin{aligned}
p_{HF} = \eta_{1}p_{TP}\label{eq:stability:phf}\\
p_{LF} = \eta_{2}p_{TP}\label{eq:stability:plf},\end{aligned}$$ where $$\begin{aligned}
\eta_{1} = \frac{R_{LF} - R_{TP}}{R_{HF} - R_{LF}}\label{eq:stability:eta1}\\
\eta_{2} = \frac{R_{HF} - R_{TP}}{R_{LF} - R_{HF}}\label{eq:stability:eta2}.\end{aligned}$$ Inserting these relations into Eq. (\[eq:stability:ekin\]), the initial momentum of the ternary particle is found to be $$\label{eq:stability:ptp}
p_{TP} = \sqrt{2E_{\text{K},0}\left(\frac{1}{m_{TP}} + \frac{\eta_1}{m_{HF}} + \frac{\eta_2}{m_{LF}}\right)^{-1}},$$ where the TP momentum has been chosen to be along the positive $y$-direction.
For the position-based perturbation, the pre-scission kinetic energy is set to zero, and the ternary particle is offset from the fission axis with a distance $y \in [0, y_{max}]$, where $y_{max}$ is a limit to be set. This allows for a tighter scission configuration, giving a higher off-axis repulsion (which more easily breaks collinearity), but this effect was ignored in this paper.
[^1]: Recall that CCT refers to collinear fission events with a relative angle between fragment emission directions of $180\pm2^{\circ}$ [@bib:pyatkov10].
| |
Lauren is an experienced and accredited meditation teacher and coach specialising in supporting women to reconnect to the wisdom of their bodies and develop a strong inner presence so they can live a life deeply aligned with their true self.
As a law graduate and ex-government worker, Lauren knows what it is like to live a life of imbalance, depletion and dissatisfaction as a result of ignoring her true inner desires and feminine essence.
Lauren’s epiphany coincided with infertility issues and ... a 21-day trek in the Californian wilderness, at which point she was seriously questioning her life path. At that point, she chose to live a life deeply aligned to her heart's desires by choosing an alternate career path and living more holistically. She is now a passionate advocate for other women to do the same through her nurturing, grounded and compassionate approach.
Lauren works with women to:
• gently reconnect them to their body's innate wisdom
• reclaim their feminine qualities that may have been denied through living in a masculine heavy world
• find a sense of deeper purpose and meaning in life
• take action to start a new career (either full time or part-time) or new creative pursuit
• re-discover and establish regular flow essence practices to balance their action-oriented way of living
• establish a self-care routine that is sacred and grounded; and
• navigate challenging times with greater compassion.
Her clients are often questioning their life path, feeling disillusioned or disempowered and seeking more passion and purpose in their lives.
Lauren’s lived experience and understanding of what it's like to be on the “other side” gives her a sense of empathy towards those who might be questioning the diverging from the ‘old story’ and traditional way of living. She admits that 10 years ago, she had accepted that simply feeling ‘ok’ with life was normal, but is now visibly demonstrating that living a purposeful and passionate life is possible.
Nature is pivotal to Lauren’s practice as she believes it holds elements of healing. She works to honour the connection with mother earth and encourages her clients to re-establish a relationship with nature too.
Lauren has taught meditation nationally for many years. She works for the Australian Centre of Meditation and Mindfulness (ACMM) as a coach, training new meditation teachers. She is passionate about continuous learning and has completed her Diploma in Guiding and Teaching Meditation with ACMM and Embodiment Teacher Training in the Non-Linear Movement Method with Michaela Boehm. She is also a Trauma-Informed Facilitator and uses trauma-sensitive practices in her teaching.
Lauren offers her guidance remotely via online sessions using Zoom. | https://www.souladvisor.com/practitioner/lauren-howe |
Media outlets access enhanced multi-platform content at no charge, with alerts when we have new content on issues or from regions you may select. Once we receive the filled out form below, you'll receive a message with the passcode/s. Welcome!
*These fields are required
*Media Outlet name
*Media Outlet City/State
Contact name
Contact phone
*Email address or fax #
*Media Outlet type
Additional (beyond the state you are located in) content that you would like to receive
PNS National Newscast
Audio Activation
"Siri, play the Public News Service (podcast)"
"Hey Google, play the Public News Service podcast"
"Alexa, play Public News Service podcast" or "Alexa, what's my news flash?" once you set it up in the Alexa app
2020Talks
Audio Activation
"Siri, play the 2020Talks podcast"
"Hey Google, play the 2020Talks podcast"
"Alexa, play Two-Thousand-Twenty Talks podcast" or "Alexa, what's my news flash?" once you set it up in the Alexa app
Newscasts
PNS Daily Newscast - March 8, 2021
Nationwide protests in advance of trial of former Minneapolis police officer charged in the killing of George Floyd; judicial districts amendment faces bipartisan skepticism in PA.
2021Talks - March 8, 2021
After a whirlwind voting session the Senate approves $1.9 Trillion COVID relief bill, President Biden signs an executive order to expand voting access and the president plans a news conference this month.
Biden Order Temporarily Blocks Start of Oak Flat Mine Project
Downloading Audio
We love that you want to share our Audio! And it is helpful for us to know where it is going. Media outlets that are interested in downloading content should go to www.newsservice.org Click Here if you do not already have an account and need to sign up. Please do it now, as the option to download our audio packages is ending soon
Oak Flat in the Tonto National Forest in considered sacred ground by several native tribes and also is a popular area for outdoor recreation. (Elias Butler/Wikimedia Commons)
March 8, 2021
GLOBE, Ariz. -- Native Americans, conservationists and a host of other advocates are cheering a Biden administration move to delay plans for a copper mine at Arizona's Oak Flat natural area.
The project would have allowed mining giant Rio Tinto to excavate massive tunnels under the natural area, which is considered sacred ground by several native tribes.
A policy memo from President Joe Biden brought a stop order from the USDA Forest Service, forcing the company to scrap its current environmental impact statement and start over.
Sandy Bahr, director for the Grand Canyon Chapter of the Sierra Club, called it a major win in the years-long battle to save Oak Flat.
"This is a mine that would create a 1,000-foot crater because of the land subsidence," Bahr explained. "Because they basically are going deep underground and blowing up the rocks, taking the ore out, creating a void, and Oak Flat will sink."
The project was created by Congress in 2014. It has been opposed by a wide variety of advocates, from environmental groups and recreation enthusiasts to religious leaders and members of Congress.
Biden's order came within a week of the final go-ahead for the project.
Bahr noted native tribes such as the San Carlos Apaches use the land to pray, collect medicinal plants, hold ceremonies and honor their ancestors.
"The key reason the Biden administration withdrew it was because of failure to adequately consult tribal nations," Bahr observed. "That is something that they're really going to be focusing on."
After the November election, Bahr added the Trump administration appeared to move quickly to get the project finalized before Inauguration Day.
"All of a sudden, late last year, the Forest Service decided to push up the date for issuing the final environmental impact statement," Bahr recounted. "That document triggers this final transfer of the land to Rio Tinto." | |
› Budget Menu & Dirt Cheap Recipes › F.A.Q › Warm Caramel Apple Cake
- This topic has 0 replies, 2 voices, and was last updated December 9, 2009 at 2:43 pm by .
- AuthorPosts
- October 9, 2009 at 2:28 pm #277207brchbell
I got this recipe yesterday and adapted it to meet my needs and had it for breakfast today! Oh my it was so very good! I would suggest using 3 apples instead of just 2 though!
Cherlynn
Warm Caramel Apple CakeServe this yummy apple upside-down cake warm from the oven. It’s all made easier with Betty Crocker® cake and frosting.
Prep Time: 30 min
Total Time: 1 hour 25 min
Makes: 15 servings
Cake
1/2 cup butter or margarine
1/4 cup whipping cream
1 cup packed brown sugar
1/2 cup chopped pecans
2 large cooking apples, peeled, cored and thinly sliced (about 2 1/3 cups)
1 box Betty Crocker® SuperMoist® yellow cake mix
1 1/4 cups water
1/3 cup vegetable oil
3 eggs
1/4 teaspoon apple pie spice
Topping, optional
2/3 cup Betty Crocker® Whipped fluffy white frosting (from 12-oz container)
1/2 cup frozen (thawed) whipped toppingCaramel topping, if desired
1. Heat oven to 350°F. In 1-quart heavy saucepan, cook butter, whipping cream and brown sugar over low heat, stirring occasionally, just until butter is melted. Pour into 13×9-inch pan.
Sprinkle with pecans; top with sliced apples.
2. In large bowl, beat cake mix, water, oil, eggs and apple pie spice with electric mixer on low speed until moistened. Beat on medium speed 2 minutes. Carefully spoon batter over apple mixture.
3. Bake 40 to 45 minutes or until toothpick inserted near center comes out clean.Cool in pan 10 minutes. Loosen sides of cake from pan. Place heatproof serving platter upside down on pan; carefully turn platter and pan over.
Let pan remain over cake about 1 minute so caramel can drizzle over cake. Remove pan.
4. This step is completely optional. In small bowl, mix frosting and whipped topping.Serve warm cake topped with frosting mixture and drizzled with caramel topping.
High Altitude (3500-6500 ft): Bake 45 to 50 minutes.
Make the Most of This Recipe
Substitution
You can use cinnamon for the apple pie spice for a slightly different flavor.
Success
Granny Smith and Braeburn are good apple choices to use in this recipe.
Nutrition Information:
1 Serving: Calories 410 (Calories from Fat 190); Total Fat 21g (Saturated Fat 8g, Trans Fat 1 1/2g); Cholesterol 65mg; Sodium 300mg; Total Carbohydrate 52g (Dietary Fiber 0g, Sugars 38g); Protein 3g Percent Daily Value*: Vitamin A 6%; Vitamin C 0%; Calcium 8%; Iron 6% Exchanges: 1 Starch; 2 1/2 Other Carbohydrate; 0 Vegetable; 4 Fat Carbohydrate Choices: 3 1/2
*Percent Daily Values are based on a 2,000 calorie diet.
Attachments:You must be logged in to view attached files.
- December 9, 2009 at 2:43 pm #426695Archenstonethis looks so good! I think I’m going to try it next time I go shopping!
- AuthorPosts
- You must be logged in to reply to this topic. | https://www.budget101.com/community/topic/warm-caramel-apple-cake/ |
Cultivate an interest in STEAM with engaging experiments, demonstrations, and more.
STEAM Projects is designed with projects, experiments, demonstrations, and resources that help students see the connections among the fields of Science, Technology, Engineering, Art, and Math. The key is for students to engage in the process by experimenting, observing phenomena, and presenting research findings. Easy to set up activities, most requiring only one to two class periods, investigate topics in physics, chemistry, earth sciences, plant and animal sciences, the human body, and space and atmospheric sciences.
Mark Twain Media Publishing Company specializes in providing engaging supplemental books and decorative resources to complement middle- and upper-grade classrooms. Designed by leading educators, the product line covers a range of subjects including mathematics, sciences, language arts, social studies, history, government, fine arts, and character. | https://www.carsondellosa.com/405032-eb--steam-projects-workbook-grade-5-8-ebook-405032-eb/ |
This black cowl neck top is beautifully draped and ties up at the back. Pair it with a high waisted skirt (black to make it look like a full dress) or jeans to dress it down. This is a very versatile piece.
Name :
E-Mail :
Please write your question....(min. 50, max. 2000 characters)
Characters written: | https://zukoh.com/cowl-neck-top-black-detail/askquestion?tmpl=component |
Introduction {#sec1}
============
The advent of new digital imaging technologies including high-throughput slide scanners is making a very compelling case as part of the clinical workflow. Tools developed for morphometric image analysis are accelerating the transition of pathology into a more quantitative science. The system for detection of regions suspected to be cancerous in gastric and colorectal tissue is already available. There is a real need for not only cancer detection but also quantification of histological features, because quantitative morphological characteristics can include important diagnostic and prognostic information. If an association between quantitative features and clinical findings is indicated, quantification of morphological features would be extremely useful to select the best treatment. Image measurement technology also has the potential for investigative pathology. We have developed a prototype system for both quantification of morphological features and automated identification of hepatocellular carcinoma (HCC) within whole slide images (WSI) of liver biopsy based on image recognition and measurement techniques. Our system displays quantified cell and tissue features as histogram, bar graph, and heat map on the screen. Displaying all features in such a unified visualization makes it easy to interpret quantitative feature. In this paper, we present a prototype designed specifically for morphological feature visualization in an easy-to-understand manner.
Method
======
Our system automatically analyzes WSI of liver biopsy stained by hematoxylin and eosin (H&E) stain, as shown in [Figure 1](#fig1){ref-type="fig"}. Once a WSI is accepted, about 0.9 mm^2^ regions called ROIs (region of interests) are automatically arranged to cover the whole tissue area in a balanced manner. This means that WSI is not cropped into grid tiles. Then, morphological features, such as nuclear and structural atypia level, are extracted and measured from each ROI image in parallel \[[@B2], [@B3]\]. In addition, the system predicts the HCC \[[@B1], [@B4]\]. Every feature measurement module outputs multiple and/or single feature values in the same format. In this protocol, our system is designed to add new feature measurement modules easily. And then, the system produces histogram, bar graph, and heat map of all features in the same method.
Results {#sec3}
=======
The placement of ROIs is in a fine balance, and quantitative morphological features are visually displayed, as shown in [Figure 2](#fig2){ref-type="fig"}. The quantification and visualization of histological features are recognized and assessed as informative system.
Conclusion {#sec4}
==========
Our prototype represents the first step on the path towards a quantitative pathology. The prototype offers a visualization of morphological features. We plan to compute morphological feature values in extensive sets of liver biopsy data using this system and explore the relationship between morphological features and clinical information.
This work is supported by the New Energy and Industrial Development Organization of Japan (NEDO).
{#fig1}
{#fig2}
| |
At Psychotherapy & Pastoral Counseling Associates (PPCA), we are committed to cultivating a team of professional psychotherapists that value cultural diversity, best practice therapeutic approaches, and sustainable practices that enrich our well-being as well as the well-being of the clients we serve. We value the importance of holistic health and wellness as well as the mind-body-emotion-spirit interconnections that impact the journey of healing.
Psychotherapy & Pastoral Counseling Associates, LLC was inspired by the non-profit counseling organization called The Pastoral Counseling Center of Santa Fe, founded in 1993. Many of our psychotherapist have been with PPC from early on. Throughout our history in Santa Fe and northern New Mexico, our group has been a well-known and respected professional presence in the community. PPCA is a group of therapists with extensive experience, training, and talent that provide caring, therapeutic support for families, couples, and individuals, from pregnancy through end of life. Our intention is to promote healing and empowerment through counseling services and professional psychotherapy that honor each client's culture, values, philosophy, spirituality, and faith journey.
To Inquire contact: [email protected]
Copyright 2013. Psychotherapy & Pastoral Counseling Associates.
All Rights Reserved. | https://www.ppcasantafe.org/employment.html |
American painter and inventor. A portraitist whose subjects included Lafayette, he refined (1838) and patented (1840) the telegraph and developed the telegraphic code that bears his name.
American inventor who was a pioneer in the field of telegraphy and in 1844 introduced a telegraphic code for transmitting messages, which became known as Morse code. | https://www.yourdictionary.com/morse-samuel-finley-breese |
The Endocrinology and Diabetes Unit deals with all aspects of endocrinology and diabetes. Due to the extensive clinical experience accumulated by the unit over the years, it serves as the main referral center for the region on these issues.Endocrinology ClinicThe clinic counsels and treats patients suffering from various hormonal problems (under and over active) and endocrine gland disorders of the pituitary gland, thyroid, parathyroid, adrenal and pancreas. Evaluations are conducted at the clinic for endocrine malignancies and dynamic function testing.
Diabetes Clinic
The clinic is engaged in counseling and treating diabetes and its complications. Those that come to the clinic are taught about the disease and how it is treated, monitoring blood sugar levels, medication, use of insulin by injection or insulin pump.
Thyroid Disease
Clinic Evaluation and treatment for hyper and hypothyroidism. Monitoring and treatment of benign thyroid (Goiter), diagnosis, monitoring and treatment of thyroid malignancies.
General Endocrinology Clinic
This clinic treats patients with adrenal disorders, hyperthyroidism and parathyroid disorders
.
Location:
The clinic is located in the outpatient clinic area near the front entrance of the main building.
Telephone:
Endocrinology Clinic: 077-6828757, 04-6822757 Clinic Office: 077-6828879, 04-6828879 Fax: 077-6828884 (Diabetes research), 04-6828884
Email:
[email protected]
Hours:
Sunday, Tuesday, Wednesday: 09:00-14:00
The center for clinical research conducts many international clinical trials in the treatment of diabetes and its complications.
Those interested in participating in these studies are invited to call 04-682-8884, Sunday through Thursday between 09:00 to 14:00. | http://www.ziv.org.il/?CategoryID=2455&ArticleID=4318 |
Implied authors and unreliable narrators are two concepts which are closely linked in narrative theory, as they were originally developed by Wayne Booth. Their afterlives have diverged: the implied author is often questioned or rejected as a theoretical concept, and is usually downplayed in narratologists's accounts; while the unreliable narrator has acquired an unprecedented popularity and expansion. I will add some historical notes and will try to show that the implied author is not so easily done away with; moreover, it is a necessary concept in order to give an adequate definition of the unreliable narrator.
Note: Downloadable document is in Spanish. | https://papers.ssrn.com/sol3/papers.cfm?abstract_id=1926133 |
|These rare-earth oxides are used as tracers to determine which parts of|
a watershed are eroding. Clockwise from top center: praseodymium,
cerium, lanthanum, neodymium, samarium, and gadolinium.
A rare earth metal (REM), as defined by IUPAC, is one of a set of seventeen chemical elements in the periodic table, specifically the fifteen lanthanides, as well as scandium and yttrium. Scandium and yttrium are considered rare earth elements because they tend to occur in the same ore deposits as the lanthanides and exhibit similar chemical properties.
Rare earth cerium is actually the 25th most abundant element in Earth's crust, having 68 parts per million (about as common as copper). Only the highly unstable and radioactive promethium "rare earth" is quite scarce.
The rare earth elements are often found together. The longest-lived isotope of promethium has a half life of 17.7 years, so the element exists in nature in only negligible amounts (approximately 572 g in the entire Earth's crust). Promethium is one of the two elements that do not have stable (non-radioactive) isotopes and are followed by (i.e. with higher atomic number) stable elements (the other being technetium).
Due to lanthanide contraction, yttrium, which is trivalent, is of similar ionic size as dysprosium and its lanthanide neighbors. Due to the relatively gradual decrease in ionic size with increasing atomic number, the rare earth elements have always been difficult to separate.
Even with eons of geological time, geochemical separation of the lanthanides has only rarely progressed much farther than a broad separation between light versus heavy lanthanides, otherwise known as the cerium and yttrium earths. This geochemical divide is reflected in the first two rare earths that were discovered, yttria in 1794 and ceria in 1803. As originally found, each comprised the entire mixture of the associated earths. Rare earth minerals, as found, usually are dominated by one group or the other, depending on which size range best fits the structural lattice.
Thus, among the anhydrous rare earth phosphates, it is the tetragonal mineral xenotime that incorporates yttrium and the yttrium earths, whereas the monoclinic monazite phase incorporates cerium and the cerium earths preferentially. The smaller size of the yttrium group allows it a greater solid solubility in the rock-forming minerals that comprise Earth's mantle, and thus yttrium and the yttrium earths show less enrichment in Earth's crust relative to chondritic abundance, than does cerium and the cerium earths.
Well-known minerals containing yttrium include gadolinite, xenotime, samarskite, euxenite, fergusonite, yttrotantalite, yttrotungstite, yttrofluorite (a variety of fluorite), thalenite, yttrialite. Small amounts occur in zircon, which derives its typical yellow fluorescence from some of the accompanying heavy lanthanides. The zirconium mineral eudialyte, such as is found in southern Greenland, contains small but potentially useful amounts of yttrium.
Of the above yttrium minerals, most played a part in providing research quantities of lanthanides during the discovery days. Xenotime is occasionally recovered as a byproduct of heavy sand processing, but is not as abundant as the similarly recovered monazite (which typically contains a few percent of yttrium). Uranium ores from Ontario have occasionally yielded yttrium as a byproduct.
Well-known minerals containing cerium and the light lanthanides include bastnäsite, monazite, allanite, loparite, ancylite, parisite, lanthanite, chevkinite, cerite, stillwellite, britholite, fluocerite, and cerianite. Monazite (marine sands from Brazil, India, or Australia; rock from South Africa), bastnäsite (from Mountain Pass, California, or several localities in China), and loparite (Kola Peninsula, Russia) have been the principal ores of cerium and the light lanthanides.
|Abundance of elements in Earth's crust per million of Si atoms (y-axis is logarithmic)|
In 2011, Yasuhiro Kato, a geologist at the University of Tokyo who led a study of Pacific Ocean seabed mud, published results indicating the mud could hold rich concentrations of rare earth minerals. The deposits, studied at 78 sites, came from "[h]ot plumes from hydrothermal vents pull[ing] these materials out of seawater and deposit[ing] them on the seafloor, bit by bit, over tens of millions of years.
One square patch of metal-rich mud 2.3 kilometers wide might contain enough rare earths to meet most of the global demand for a year, Japanese geologists report July 3 in Nature Geoscience." "I believe that rare earth resources undersea are much more promising than on-land resources," said Kato. "[C]oncentrations of rare earths were comparable to those found in clays mined in China. Some deposits contained twice as much heavy rare earths such as dysprosium, a component of magnets in hybrid car motors." | https://www.geologyin.com/2016/05/the-geological-distribution-of-rare.html |
AT contributor Larry Downing interviewed Rodney Vance, MFA, Chair of the Department of Film and Television Production at La Sierra University. Rodney Vance is a professional filmmaker and has mentored many Adventist students who wish to pursue a career in the film industry.
LD: Rodney, in the past, faculty of Adventists colleges and universities were educated in their specialty at Adventist schools. This practice is unlikely for those of you in the film program for the reason Adventist schools did not have film programs. Is this true in your case?
RV: Yes. I received my Master of Fine Arts (MFA) in Theater with an emphasis in playwriting from The Catholic University of America in Washington, DC.
LD: Where did this degree take you?
RV: Pacific Union College invited me to join the faculty of their long-established Film Program. While there, the film students, faculty, and I produced a 40-minute giant screen film called “Napa Valley Dreams.” It was the first documentary film to feature Dolby Atmos sound and was distributed internationally by Sony Entertainment. After four years at PUC, I agreed to start a brand new film department at La Sierra University. With the students and faculty there I produced a ten-minute short film called “The Butterfly, The Harp, and The Timepiece” starring Academy Award-Winner Melissa Leo. This film was especially satisfying in that it was the first Seventh-day Adventist-produced film to qualify for an Academy Award nomination. It didn’t receive an Oscar nomination, but it was exciting to be in the running.
LD: What led you to your interest in films?
RV: I’ve always been interested in storytelling as a way to communicate. I find that storytelling brings people together instead of driving them apart. Everybody loves a good story regardless of one’s political or religious beliefs. This conviction is the light that guides my commitment to produce good stories!
LD: How have Adventist church officials responded to the establishment of film programs in church-operated institutions?
RV: The North American Division (NAD) sponsors the Sonscreen Film Festival every year and it is operated through the NAD Communications Department. The president of the NAD often attends and is very supportive.
LD: What do you think is important to know about a film program?
RV: Film is simply another medium for storytelling. At its core, it’s not about the technology. More importantly, visual storytelling is today’s global lingua franca. If an organization wishes to grab the attention of people who live in today’s world visual storytelling is the vehicle to do this. If an organization (org), including religious orgs, intends to talk mainly to retirees, then it can limit or neglect the visual storytelling and keep on dong what has been done.
LD: What is the job market for those who major in film and film production?
RV: The notion that people with visual storytelling skills can’t get work is a myth. Opportunities continue to exist in movies, streaming television, webisodes, and independent storytelling. Today career opportunities for those with visual storytelling skills are as promising as for those with computer skills in the 1990’s. Corporations with ten or more employees now have media departments. Loma Linda University’s media department produces Emmy-winning programming. Storynomics has advertisers with billion-dollar advertising budgets supporting stories that are in line with a company’s brand. Government at all levels uses visual storytelling for training purposes. Educators who can teach these skills are also in high demand. In the Inland Empire, where La Sierra is located, half of the high schools offer media education. According to the 2018 Otis Report, California alone had 192,200 direct jobs (part of 1.6 million direct, indirect, and induced jobs) in visual storytelling generating $141.5 billion in wages. Nearly 50% of those jobs require a bachelor’s degree or higher. This growth is against the backdrop of a global surge in economies connected to visual storytelling.
LD: How many Adventist universities/colleges have film programs?
RV: Pacific Union College was the first among the Adventist collegiate educational system to establish a media education program. The college continues to maintain a thriving film education program. Southern Adventist University offers the largest and best-funded film education program. Andrews University focuses on teaching documentary film production. Walla Walla University has the only graduate program in media, offering an MA in Cinema, Religion and Worldview and has an especially strong focus in television. Union College offers a film studies minor and is the only SDA school to offer a minor in dance, which is also a form of visual storytelling.
La Sierra University has the only Department of Film and Television Production—all of the other film education programs are part of a another department. The faculty at La Sierra University (LSU) is loaded with professional experience and qualifications: two of us are members of the Writers Guild, one of the faculty is a member of the Directors Guild, another faculty member is a composer of scores with six Emmy wins. I hold membership in the TV Academy. In addition, LSU is unique among Adventist universities in that we are the only school to offer certified Avid editing instruction and an emphasis in sound mixing. [Avid is a professional editing system that is commonly used in the production of major films.]
LD: Why should the Adventist church care about preparing professionals to engage in the film industry?
RV: Visual storytelling is the dominant language of the global culture—more so than English or French. If you want to communicate to a wide audience, you have to be able to “speak” visual storytelling.
LD: What’s your guess on the number of current or former Adventists who are involved in the film industry?
RV: A lot more than people realize but I don’t think I can give you a number. The Head of Development at Sony is Seventh-day Adventist (SDA). The primary source of Hollywood funding out of Asia is a graduate of La Sierra University. The owner of one of the major recording studios in L.A. is an SDA and actively supports La Sierra Film. There are many, many others. Most of them stay quiet but they are eager to support Adventist efforts to get serious about professional visual storytelling education.
LD: What are the areas of producing visual products that LSU covers?
RV: We offer a new BA degree that combines teaching film production skills with earning the required certification to teach at high schools in California and Adventist academies anywhere. This is ideal for those looking to ensure their education results in a job upon degree completion.
We also offer a BFA degree with four areas of emphasis: production, script writing, sound, and editing. A fifth “independent” emphasis allows the student to use courses from throughout the University to customize their degree toward their chosen career path. Students have used this to prepare them for careers in acting, the business-side of Producing, and more.
LD: What areas of producing visual products most interest your students?
RV: Creative production. Most students want to pick up a camera and make visual stories.
LD: If you could implement one core area that affects an Adventist film program, what would that be?
RV: I understand your question to apply to implementing something we don’t have now. We need an “employment agency” for visual storytellers. We need a way to coordinate internships and turn them into jobs upon graduation. The training is there. The jobs are there. We need to connect the two in an organized manner.
We also need a more entrepreneurial approach to film education. We are at the early stages of figuring out how to combine the education of visual storytelling with Silicon Valley-style incubators that can foster student careers.
LD: What do you believe is important for people to know about your film programs and the people involved in it?
RV: Every faculty member is either Seventh-day Adventist or familiar with and supportive of the Seventh-day Adventist mission.
Our faculty have worked with and continue to work professionally as visual storytellers at every level. Jordi Ros used to be Head of Development for Disney, and Carrie Specht was an Assistant Director for Star Trek, Malcolm in the Middle, and many more television series. These teachers have assimilated, and can teach, the long history of how to create visual stories that can’t be found in any textbook. You don’t really know how it’s done until you do it as part of a professional crew. As a small example: when we made Butterfly one of our students began whistling on set. Our A-list star immediately called him on it—you never whistle on a set. This is the only time I saw our star get upset. How do you learn this in a classroom? Some production skills are simply handed down from one generation to the next.
This fall we are bringing to campus two new adjunct faculty members: A-list Hollywood Producer Jay Stern (Rush Hour, Horrible Bosses) and YouTube entrepreneur Malek Houlihan. Jay is already helping one of our students develop his short film into a Hollywood feature. Malek is working with our students to build an audience, and a career, using YouTube.
The department has only one full-time teacher, Carrie Specht. All other faculty are either adjunct or, in my case, dividing time between teaching and administration.
LD: What are examples of where LSU students have found employment?
RV: We just completed our fifth year as a department so there aren’t a lot of graduates. However, we already have a graduate working in documentary development at the Sundance Film Festival, two or three with profitable independent film companies, one who has already signed with a Hollywood Manager and is at a meeting with Disney as I write this. Disney is looking to buy his animated television series. Some are working below-the-line as grips. More are working in corporate environments, including at Loma Linda University. One is now completing his MFA at Chapman University, the number-five-ranked film school in the world. The department teaches the student the language of visual storytelling and the student chooses exactly how he/she wishes to use that language in support of a career.
At least one of our students is graduating debt-free. She used her visual storytelling skills to pay her entire tuition.
Our students’ films are “official selections” and winning awards at film festivals all around the world. One had her film selected for national broadcast on PBS as part of Film School Shorts.
LD: How are your students enabled to serve the Adventist community and the mission of the church?
RV: We teach our students the dominant language of the global culture as part of a university liberal arts education which teaches them how to function within many changing environments. And we present the teachings and world view of the Seventh-day Adventist church in a positive manner that supports the student’s faith amid the challenging ideas they confront outside the “Adventist ghetto.” We understand that changing the world begins with the story you tell yourself inside your head.
LD: How does the film program enhance LSU’s mission?
RV: The mission of La Sierra University, the university with the most diverse student body in the United States, is to help students develop a passion for learning that crosses cultural and interdisciplinary boundaries, enabling them to not only thrive in a changing world but also to change the world. Call it storynomics, social justice, the gospel narrative, drama, art and design, film and television, no matter what you call it, the language of visual storytelling with its hands-on, interactive style of education is foundational to that mission.
LD: Has LSU, or other church organizations, utilized the skills of your students?
RV: Yes, the North American Division has hired and continues to hire our students. La Sierra University Marketing also hires our students as do Loma Linda University, Seventh-day Adventist television ministries, and other Adventist organizations.
With proper staffing, La Sierra Film can experience exponential growth and teach Seventh-day Adventists how to be part of the cultural conversation in powerful and innovative ways. We have maximized the effectiveness of the current department budget and are actively developing additional resources that can enable the department to thrive. Should you wish to donate to the department or contribute the visual storytelling education of Adventist students in other ways, please reach out to Rodney Vance, Chair, [email protected] or Norman Yergen, VP of Advancement, [email protected].
Lawrence Downing, D.Min, is a retired pastor who has served as an adjunct instructor at La Sierra University School of Business and the School of Religion, and the Adventist International Institute of Advanced Studies in the Philippines. | https://atoday.org/interview-with-rodney-vance-of-the-lsu-film-tv-production-department/ |
Friends, Families and Travellers (FFT) need volunteers to help with a mass mystery shop of GP surgeries in England. In recent years, FFT has exposed that GP surgeries routinely broke NHS guidelines by refusing to register a nomadic, Romany or Traveller patient, both before and during the Covid-19 pandemic.
CRT Annual Public Meeting online, 22nd November
Canal & River Trust (CRT) is holding its 2021 Annual Public meeting online at 2pm on Monday 22nd November 2021. CRT says that it is inviting people to submit questions to be answered in the meeting, which will be a live broadcast on YouTube. You can email questions to [email protected].
Send your photos, videos or written accounts of dangerous boat handling under the influence of alcohol or drugs to the Department for Transport before 1st November
The Department for Transport (DfT) is running a consultation on strengthening enforcement against the dangerous use of recreational and personal watercraft. The consultation mainly concerns the dangerous use of craft such as jetskis. However the DfT is also asking in Question 12 for respondents to submit documentary evidence that alcohol or drug use among recreational […]
Boaters pledge to disobey restrictions as CRT reneges on so-called ‘safety zones’ agreement
After a successful campaign against the so-called ‘safety zones’ which were to be implemented on the Lee Navigation in Broxbourne and Hackney, Canal & River Trust (CRT) advised the public that they would not be introducing them; unfortunately, we now know this not to be fully true. We believe that CRT, having lost the opening […]
We still want to hear from boaters affected by new CRT licence T&C – Update regarding Crowdjustice fundraiser ‘Protect boats that are people’s homes!’
The coalition of boat dwellers, NBTA and other support organisations that is running the appeal for funds for the legal challenge to CRT’s revised Boat Licence Terms and Conditions is extremely grateful to all the supporters who have made donations to this appeal. The appeal has been paused and may be wound up soon. This […]
NBTA General Meeting by phone and Zoom, 23rd October
The NBTA will be holding its General Meeting on Saturday 23rd October 2021. Given the continued risks presented by Covid-19, this year the meeting will be held by phone and Zoom. For regular users of Zoom this will be straightforward. For people less used to video conferencing we will be giving some brief guidance on […]
CRT backs down over so-called River Lea ‘safety zones’
The climbdown response on 1st September 2021 by Canal & River Trust (CRT) to the stakeholder engagement with respect to the River Lee Water Safety Zones, carried out by Hopkins Van Mil, represents a massive victory for the boating community of London, said the NBTA’s London branch, which made the following statement:
EA sacks District Enforcement
The Environment Agency (EA) has today terminated its contract with District Enforcement for enforcement of EA visitor mooring time limits on the Thames and District Enforcement will cease operations on 31st August 2021. In an email to members of the Thames Navigation Users Forum, the EA said the decision was made “following a review that […]
EA to increase registration fees by 10% – please respond to consultation by 16th September
The Environment Agency (EA) is running a consultation on proposals for a revised and standardised boat registration charging framework and increases in its registration charges between 2022 and 2024 across the Thames, Anglian and Upper Medway waterways. We would like members’ views on the proposals to help with formulating the NBTA response, please contact [email protected] […]
Resist CRT mooring restrictions in Milton Keynes! | https://www.bargee-traveller.org.uk/news/ |
When two or more people come together with an aligned goal, a team is formed. This team is comprised of members, each with his own plan of action to best achieve the task at hand. Many times one member believes that his point of view is the most correct or most efficient, while another member of the team may disagree, offering her idea as best. When one individual challenges another, conflict is born. This is a very basic example, and only one type of conflict is addressed. In reality, there are several types of conflict; some positive, some negative. The sources of conflict are as varied as each member’s own personality style. Humans differ in countless ways. These differences contribute to the strength of team members. Each personality brings with it a different interaction and different communication styles, ideas, and varying levels of creativity. With each difference the possibility of conflict increases. Once conflict is encountered, resolution is vital so that the team can again focus on its common goal. Knowing what types of conflicts you will encounter will help you deal with issues when they arise. | https://brightkite.com/essay-on/conflict-resolution-3 |
The mission of the USC Rossier School of Education is to prepare leaders to achieve educational equity through practice, research and policy. We work to improve learning opportunities and outcomes in urban settings and to address disparities that affect historically marginalized groups. We teach our students to value and respect the cultural context of the communities in which they work and to interrogate the systems of power that shape policies and practices. Through innovative thinking and research, we strive to solve the most intractable educational problems.
The Organizational Change and Leadership Program is in search of an instructor to teach EDUC 603: Framing Organizational Change and Leadership. The purpose of this course is to help students begin to identify and research problems of practice particularly pertinent in urban learning. Essential to solving such problems of practice is the fair and accurate identification and representation of these problems. The presentation of problems of practice requires the use of sound evidence-based research to justify and support the statement of the problem as well as provide a history and background of a problem. This course is also designed to develop academic literacy skills that incorporate critical analysis in writing and speaking, the identification of and incorporation of different types of evidence to support assertions, and effective practices in presenting academic content. | https://interdisciplinoxy.com/adjunct-assistant-professor-in-organizational-change-and-leadership,i4155.html |
The United Nations Office for Project Services (UNOPS) is the operational arm of the United Nations, supporting the successful implementation of its partners’ peacebuilding, humanitarian and development projects around the world. Mandated as a central resource of the United Nations, UNOPS provides sustainable project management, procurement and infrastructure services to a wide range of governments, donors and United Nations organizations. With over 8,000 personnel spread across 80 countries, UNOPS offers its partners the logistical, technical and management knowledge they need, where they need it. By implementing around 1,000 projects for our partners at any given time, UNOPS makes significant contributions to results on the ground, often in the most challenging environments.
Background Information – Project
The project ‘Mozambique Northern Crisis Recovery Project’ will be based in Cabo Delgado Province supporting the resettlement of IDPs in 20 relocation sites. The project will support both IDPs and Host communities to improve access to basic services and economic opportunities. The project comprises of 4 main objectives related to the
● Component 1: psychosocial social support and community peace building; and enhancing State-society trust and confidence.
● Component 2: provision of agriculture and fisheries inputs, cash for work programs for youth and women and the provision of kits for micro and small business development; and training on entrepreneurship and business management.
● Component 3: the restoration of basic services, small works for agriculture production, education and health infrastructure and the construction or rehabilitation of school and health infrastructure and community services and amenities in temporary and relocation sites and host communities.
● Component 4: strengthening of technical capacity of government authorities and local governments for conflict management. This component will also support project implementation, financial management, procurement, safeguards, reporting, and monitoring and evaluation.
The project will be implemented in collaboration with government authorities and will be guided by the various programme guidelines provided by the World bank- as the funding source.
The project team is expected to contain Programme management staff, Safeguards staff, Monitoring and Evaluation staff and infrastructure staff and will require significant stakeholder and partner participation, engagement, coordination and management.
Local Context:
While UNOPS has an established presence in Mozambique, this new project requires establishment of operational presence in the North, particularly the provincial capital of Pemba. UNOPS will support the National Government PIU to deliver this project and ensure adequate support is provided to build sustainable capacity in relevant institutions
Background Information – Job Specific
The Community Mobilizer will be a key member of the project under the guidance of the Project Manager, and direct supervision of Lead Engineer and the Environment and Social Safeguards Officers. S/he will be tasked to assist in the implementation of the various community led initiatives, stakeholder consultations and engagements and plans and help ensure that outputs/deliverables as spelled-out in their plans are delivered on time and contribute to the achievement of outcomes, and prepare reports/feedback for management’s actions and decisions.
FUNCTIONAL RESPONSIBILITIES
- Provide assistance in designing the community awareness strategy and materials to be used for/by the IDPs and Host Communities and direct the communication of information to project affected persons/ communities identified by the project teams.
- Provide assistance in terms of coordination with appropriate IDP and host community representatives and other relevant stakeholder to coordinate NCRPs Component 1, 2 and 3 activities and get their engagement, support participation and advocacy;
- Provide support in planning and budgeting, preparation of work plans, implementation, monitoring and follow-up the implementation of project activities and community led initiatives and compliance with the provisions and tasks and responsibilities under the project’s Component 1, 2 and 3.
- Provide assistance in implementation of all aspects of the community awareness operations in the project area.
- Assist the project team for the identification of beneficiaries and ensure their active participation in project activities
- Mobilize and facilitate active participation of youth, women and other vulnerable groups to participate in planning, monitoring and implementation and evaluation of community development initiatives
- Collect relevant data and information necessary for NCRP project planning, implementation, monitoring and evaluation as well as undertake regular monitoring and evaluation of project plans, activities and targets
- Assist in the implementation of the awareness and information activities through close coordination with community liaison teams.
- Facilitate grievance redress management for project components as stipulated in the ESMF including setting up of local grievance redress committee and capacity building them into using the available channels including the Dialogue and Grievance Mechanism (MDR)
- Notify the Community Development Specialist (CDS) about anticipated delays or any project related community concerns, build the capacity of youth, women and vulnerable groups within IDPs and host community to collectively engage local leaders on identified issues.
- Assist in operations management; transportation, security, internal communications, planning checking land ownership/property documentation and agreements of selected beneficiaries or selected sites.
- Assist in drafting and preparing press releases, documentation of evidence based impact stories of the project and other communication materials for onward approval by the Community Development Specialist, also the briefs and talking points for discussions with partners in relation to the project.
- Any other duties requested by the CDS, PM and Lead Engineer and the Environment and Social Safeguards Officer .
EDUCATION
- Completion of secondary school with five (5) years of experience is required;
- Diploma Certificate in Community Development, Community mobilization or equivalent disciplines will be an added advantage with 3 years of relevant professional experience may be accepted in lieu of respective years of experience.;
- First University Degree in Community Development, Community mobilization or equivalent disciplines with 1 year of relevant experience will be an added advantage.
EXPERIENCE
- At least 5 years of experience in community coordination/ community mobilization/engagement is required.
- Previous working experience in development projects with NGO/UN experience is an advantage.
- Experience in working with Local authorities and local communities is an added advantage.
LANGUAGES
- Excellent command of Portuguese language (oral and written) is required. Knowledge of local languages is recommended. Knowledge of English language is an asset.
COMPETENCIES
|Treats all individuals with respect; responds sensitively to differences and encourages others to do the same. Upholds organizational and ethical norms. Maintains high standards of trustworthiness. Role model for diversity and inclusion.|
|Acts as a positive role model contributing to the team spirit. Collaborates and supports the development of others. For people managers only: Acts as positive leadership role model, motivates, directs and inspires others to succeed, utilizing appropriate leadership styles.|
|Demonstrates understanding of the impact of own role on all partners and always puts the end beneficiary first. Builds and maintains strong external relationships and is a competent partner for others (if relevant to the role).|
|Efficiently establishes an appropriate course of action for self and/or others to accomplish a goal. Actions lead to total task accomplishment through concern for quality in all areas. Sees opportunities and takes the initiative to act on them. Understands that responsible use of resources maximizes our impact on our beneficiaries.|
|Open to change and flexible in a fast paced environment. Effectively adapts own approach to suit changing circumstances or requirements. Reflects on experiences and modifies own behavior. Performance is consistent, even under pressure. Always pursues continuous improvements.|
|Evaluates data and courses of action to reach logical, pragmatic decisions. Takes an unbiased, rational approach with calculated risks. Applies innovation and creativity to problem-solving.|
|Expresses ideas or facts in a clear, concise and open manner. Communication indicates a consideration for the feelings and needs of others. Actively listens and proactively shares knowledge. Handles conflict effectively, by overcoming differences of opinion and finding common ground.|
ADDITIONAL CONSIDERATIONS
- UNOPS – KEMCO is recruiting for Community Mobilizers through an Emergency Recruitment process (EPP).
- Please note that the closing date is midnight Copenhagen time
- Applications received after the closing date will not be considered.
- Only those candidates that are short-listed for interviews will be notified.
- Qualified female candidates are strongly encouraged to apply.
- UNOPS seeks to reasonably accommodate candidates with special needs, upon request.
- Work life harmonization – UNOPS values its people and recognizes the importance of balancing professional and personal demands. We have a progressive policy on work-life harmonization and offer several flexible working options. This policy applies to UNOPS personnel on all contract types
- For staff positions only, UNOPS reserves the right to appoint a candidate at a lower level than the advertised level of the post
- For retainer contracts, you must complete a few Mandatory Courses (around 4 hours) in your own time, before providing services to UNOPS.
- The incumbent is responsible to abide by security policies, administrative instructions, plans and procedures of the UN Security Management System and that of UNOPS.
It is the policy of UNOPS to conduct background checks on all potential recruits/interns. Recruitment/internship in UNOPS is contingent on the results of such checks.
CONTRACT TYPE, LEVEL AND DURATION
- Contract type: Local Individual Contractor Agreement
- Contract level: ICS 5/ LICA 5
- Contract duration: Ongoing ICA – ‘Open-ended, subject to organizational requirements, availability of funds and satisfactory performance.’
This position is NOT based in a family duty station
This is a local post. As such, it is only open to Mozambique Nationals or persons with valid residence permits.
For more details about the ICA contractual modality, please follow this link:
https://www.unops.org/english/Opportunities/job-opportunities/what-we-offer/Pages/Individual-Contractor-Agreements.aspx
BACKGROUND INFORMATION – UNOPS
UNOPS is an operational arm of the United Nations, supporting the successful implementation of its partners’ peacebuilding, humanitarian and development projects around the world. Our mission is to help people build better lives and countries achieve sustainable development.
UNOPS areas of expertise cover infrastructure, procurement, project management, financial management and human resources.
Working with us
UNOPS offers short- and long-term work opportunities in diverse and challenging environments across the globe. We are looking for creative, results-focused professionals with skills in a range of disciplines.
Diversity
With over 4,000 UNOPS personnel and approximately 7,000 personnel recruited on behalf of UNOPS partners spread across 80 countries, our workforce represents a wide range of nationalities and cultures. We promote a balanced, diverse workforce — a strength that helps us better understand and address our partners’ needs, and continually strive to improve our gender balance through initiatives and policies that encourage recruitment of qualified female candidates.
Work life harmonization
UNOPS values its people and recognizes the importance of balancing professional and personal demands.
Kenya Multi-Country Office (KEMCO)
UNOPS Kenya Multi Country Office is located in Nairobi, Kenya, the Kenya Multi Country Office manages a growing portfolio of engagements, including associated strategic and operational risks. The KEMC sub-region currently consists of an established Operation Centre in Nairobi/Kenya which manages a portfolio of engagements in multiple countries in East and South Africa. This includes transactional projects in partnership with the Nairobi based UN Agencies, UN-Habitat and UNEP, and multiple ‘operational’ projects in Kenya, Uganda, Tanzania, Zimbabwe, Zambia, Mozambique and island states.
Integrated Northern Development Agency (ADIN) is a public institution that promotes socio-economic development in the Provinces of Niassa, Cabo Delgado and Nampula. Its Headquarters is in the Province of Cabo Delgado., and Its mandate encompasses articulation and coordination of programmes, promoting business development, investments, and employment in northern Mozambique. ADIN is also active in the areas of resource mobilization, multi form assistance to conflict affected populations, it promotes socio-cultural and sporting events. | https://altojob.mais-moz.com/vaga-para-mobilizador-comunitario-varias-posicoes/ |
This job is in NPMD (Nano-Positioning Metrology Division) where we design, develop and manufacture the world’s most precise displacement measurement instruments used to control motion in semiconductor equipment making the world’s next generation ICs, microprocessors, and flash memory chips. Your work will advance the state of the art of precision measurement – imagine the excitement you’ll feel as you push the boundary into picometer territory.
In this role as a Precision Mechanical Design Engineer you will be a key member of a multidisciplinary team of R&D engineers who develop precision opto-mechanical systems with interferometers and lasers. You will bring the design from initial concept to final product realization, develop manufacturing tools and processes to support your product and carry it into production in our local world class factory right here in Santa Clara.
* Using your innate creativity and deep knowledge of precision engineering design principles to conceive and develop products that satisfy customer’s system requirements.
* Analyze and optimize your designs using FEA to ensure performance under all thermal and dynamic conditions in the application. Prototype and validate your design with real hardware built by our internal model shop and local manufacturing line.
* Design and develop precision alignment tooling and manufacturing processes to ensure achieving performance at desired production yields.
* Coordinate your work and share technology with others in multidisciplinary team including MEs, physicists, EEs, optical engineers.
* Research new, emerging materials and technologies for use in current and future products.
* BS in Mechanical Engineering or related technical field (Materials Science, etc) or equivalent combination of training and experience.
* Minimum 5+ years of mechanical design experience for products and/or tool development.
* Expertise in one or more of the following technical areas: kinematic design, optics, adhesives, vacuum, and precision machining.
* Self-starter able to think and act independently to translate general objectives into tangible results, with a record of delivering successful designs on schedule to meet market requirements.
* Proficiency in using ME CAD tools for design and FEA for analysis. (PTC Creo and ANSYS preferred).
* Excellent communication and ability to work well in team environment with people at all levels.
* Direct design experience with precision opto-mechanical products such as lasers, interferometers, fiber optics collimators or optical systems. Familiarity with optical design principles and ray tracing.
* MS or equivalent in Mechanical Engineering, Materials Science or similar technical field.
* Experience the semiconductor capital equipment and/or precision motion control.
* Knowledge of and significant prior experience in optics and laser systems is highly desirable. | https://jobsearch.keysight.com/job/Santa-Clara-Precision-Mechanical-Design-Engineer-CA-95050/501327500/ |
How is this country’s ability to cater for vegans/vegetarians/celiacs?
Most restaurants are able to cater for vegans, vegetarians and celiacs but please let your Trip Expert know if you have any specific requests.
I have allergies, will these be catered for?
We will do our best to cater for allergies, but please let us know your requirements as soon as possible before your trip.
Is it safe to drink the tap water?
It’s not advisable to drink the tap water in Ecuador or the Galapagos Islands. We recommend that you keep a refillable water bottle with you at all times to stay hydrated and help us reduce our plastic footprint.
Don’t worry, there will be plenty of opportunities to fill up your water bottle during the trip.
I don’t drink alcohol, will this trip be full of drinking? What options will I have instead?
This trip will not be full of drinking, however, there will certainly be occasions where alcohol is available. There will always be plenty of soft drinks and non-alcoholic alternatives available too. Please let us know if you prefer not to drink alcohol so that we can make your Pack Leader aware, they will be able to help if you would like to ask for a specific drink. | https://flashpack.zendesk.com/hc/en-us/articles/360003495398-Galapagos-Food-and-drink |
Mr. Dirk Pilat, a Dutch national, is Deputy Director of the OECD Directorate for Science, Technology and Innovation. He supports the Director of STI in pursuing the Directorate’s programme of work and contributing to the strategic goals of the Organisation as defined by the OECD Secretary-General.
Dirk joined the OECD in February 1994 and has worked on many policy issues since then, including innovation, the link between information technology and economic growth, climate change, labour markets, regulatory reform, global value chains, productivity and entrepreneurship, as well as health innovation.
He was responsible for the OECD’s Committee for Scientific and Technological Policy from 2006 to January 2009, and the Committee on Industry, Innovation and Entrepreneurship from February 2009 to December 2012.
Before joining the OECD, Dirk was a researcher at the University of Groningen, where he also earned his PhD in Economics, working primarily on productivity and economic growth. He has published widely both before and since joining the OECD. | http://www.digiworldsummit.com/intervenant/dirk-pilat/ |
Occupational Groups:
- Communication and Public Information
- Human Resources
- Documentation and Information Management
- Closing Date: 2020-01-12
Click "SAVE JOB" to save this job description for later.
Sign up for free to be able to save this job for later.
Under the overall supervision of
the Chief of Conduct and Discipline Team/ SEA Coordinator and the direct responsibility of the CDT Reporting Officer, the UN Volunteer Associate conduct and discipline officer (Reporting), within the limit of his delegated powers, will perform the following tasks:
Undertake reviews of alleged misconduct by UN mission personnel; receive and document complaints, gather information and advise on whether further investigation is warranted; analyse relevant information and advise on actions to be taken based on an impartial and independent examination of the facts; liaise with relevant parties internally and externally; undertake appropriate follow-up;
Develop reporting guidelines for the different activities of the Unit;
Serve as focal point for the drafting, editing and coordination of inputs of weekly, quarterly, annual reports, adhoc reports and annual quality assurance report;
Contribute to maintaining and monitoring a data management system for all categories of personnel misconduct; perform data mining and data analysis to produce narrative and statistical reports;
Prepare various written outputs, e.g. management briefings, background papers, presentations, analysis, sections of reports and studies, inputs to communications, publications.
Contribute to identifying, establishing and maintaining contacts and partnerships with UN and other actors (national and international) with a view to pursuing the agenda for conduct and discipline activities, including assistance to victims of misconduct;
Engage in day-to-day coordination of activities with other mission components (e.g. legal officers, personnel, security, training, child protection and UN entities);
Identify trends/patterns, lessons learned and best practice relating to conduct and discipline issues with a view to furthering the mission’s objectives in policy development, preventive actions and awareness building initiatives;
Assume all other related duties as requested by the direct supervisor;
When working with (including supervising) national staff or (non-)governmental counterparts, the incumbent is strongly encouraged to set aside dedicated time for training, coaching, mentoring and capacity development.
Advanced university degree (Master’s degree or equivalent) in the field of social sciences, political science, law, human rights, human resources management, or other related fields. Familiarity with administrative, labour, criminal and/or military law and principles is desirable. A first-level university degree in combination with two additional years of relevant work experience may be accepted in lieu of an advanced university degree.Required experience: 60 Months Experience remark:
A minimum of five years of progressively responsible working experience in positions in the field of conduct and discipline, law, human rights and/or human resources management. Experience with data management including databases is desirable. Experience with the application of UN rules and regulations related to conduct and discipline is desirable, as well as experience in UN peacekeeping missions.Language skills: | https://www.impactpool.org/jobs/559068 |
The irregular stone shapes, sizes and textures of Farmledge have been molded into panels to re-create the time honored look of stacked stone with the benefit of a simplified installation. Farmledge stone panels are approximately 4.875" high with varying lengths ranging from 7.75"–19.75".
Photos on this website are as accurate as possible. Variations in lighting conditions, display devices, and actual viewing conditions can alter the perception of color.
Variations in color and texture should be expected, and color and texture of products may vary from samples, displays, and photos. | http://www.fmsupply.net/prstc_product.php?profile=farmledge |
Have you read my previous post on Introduction to IoT? I would recommend you to read it first especially if you are new to IoT!
Ok! Moving On..Let’s get straight to the point. IoT Architecture has Five Main layers.
Perception Layer
This is the first layer in IoT architecture. The perception layer handles the sensors and captures the relevant data. A temperature sensor would periodically capture the temperature and transfers to IoT gateway# .
Transport Layer
Transport layer handles the transfer of this captured data to the Gateway. This is then sent to IoT platform* for processing.
- Usually, data transfer between sensors and gateway takes place in a local area network (LAN). Zigbee, Bluetooth, Wi-Fi are some of the technologies used in this process.
- For data transfer between gateway to IoT platform, we need WAN technologies like 3G, GSM, PSTN etc.
Processing Layer
Processing layer ensures that meaningful information is derived from the received data. This happens with help of data mining servers. BIG data is processed and analysed here. There is a continuous stream of data coming to this layer from sensors via Gateway. This layer is expected to understand and send relevant info to various system in real time. Hence, it becomes a critical layer.
Application Layer
Application layer deals with the actual application or use-case for IoT. It can be a smart home application or a Healthcare or logistic application.
Business Layer
This is the top most layer or last layer in IoT architecture. It controls the application along with related Operation support system (OSS ) and Business support system (BSS) like billing, CRM, Order management etc
On web, you may find 3 layer and 7 layer architecture. These are nothing but the compressed and expanded form of this 5 layer architecture only! I hope, this post must have given you insights on the IoT architecture. Stay tuned for my next post on IoT Finally, do, let me know in comments if you want me to write on any new topic. My old & new blogs are available here – My Little Blog!
In addition to reading my posts, I would recommend following books to enhance your knowledge on IoT
Cheers! | https://www.deepakupreti.com/iot-architecture-demsytified/ |
Related Links:
Authors: D'Anna R, Santamaria A, Alibrandi A, Corrado F, DI Benedetto A, Facchinetti F Abstract Gestational Diabetes Mellitus (GDM) is one of the most frequent complications of pregnancy and is characterized by a carbohydrate intolerance which is diagnosed with the oral glucose tolerance test. The prevalence of GDM in our population is about 12%, but risk factors like a previous GDM, ethnicity, a parent with diabetes mellitus type 2 and maternal overweight may increase its occurrence. Complications of GDM are a pre-term birth (before 37 wk gestation), macrosomia (birth weight ≥4 kg) and gestational hypertension....
Source: Journal of Nutritional Science and Vitaminology - Category: Nutrition Tags: J Nutr Sci Vitaminol (Tokyo) Source Type: research
Joint Associations of Maternal Gestational Diabetes and Hypertensive Disorders of Pregnancy With Overweight in Offspring
Objectives: Either maternal gestational diabetes mellitus (GDM) or hypertensive disorder of pregnancy (HDP) is associated with an increased risk of obesity in the offspring. However, their joint associations with obesity in offspring remain unclear. We investigated the joint associations of maternal GDM and HDP with childhood overweight in offspring.Methods: We performed a large study in 1967 mother-child pairs. Maternal GDM was diagnosed according to the 1999 World Health Organization (WHO) criteria. HDP was defined as self-reported doctor-diagnosed hypertension or treatment of hypertension (including gestational hyperten...
Source: Frontiers in Endocrinology - Category: Endocrinology Source Type: research
Dietary Inflammatory Index Score and Cardiovascular Disease Risk Markers in Women with Systemic Lupus Erythematosus
ConclusionsHigher inflammatory potential of the diet was positively associated with higher total cholesterol levels in women with SLE. These findings suggest that the inflammatory potential of a person’s diet may play a role in lipid profiles in this population. Future intervention studies are needed to build on these results and explore the effect of anti-inflammatory diets on health outcomes in individuals with SLE.
Source: Journal of the Academy of Nutrition and Dietetics - Category: Nutrition Source Type: research
Identifying appropriate pre-pregnancy body mass index classification to improve pregnancy outcomes in women of childbearing age in Beijing, China: a retrospective cohort study.
This study explored the appropriate classification of pre-pregnancy body mass index (BMI) in women of childbearing age in Beijing, China. METHODS AND STUDY DESIGN: Women with singleton pregnancies at more than 28 gestational weeks were retrospectively reviewed. Based on the pre-pregnancy BMI (kg/m2), these patients were divided into 7 groups: =18.5-22.9,>=23-23.9,>=24-24.9,>=25-27.9,>=28-29.9, and>=30. Pregnancy adverse outcomes, including gestational hypertension with or without preeclampsia, gestational diabetes mellitus, initial cesarean section, postpartum hemorrhage, macrosomia, large-for-gestation...
Source: Asia Pacific Journal of Clinical Nutrition - Category: Nutrition Authors: Zhao RF, Zhou L, Zhang WY Tags: Asia Pac J Clin Nutr Source Type: research
Prevalence and determinants of gestational diabetes mellitus in Africa based on the updated international diagnostic criteria: a systematic review and meta-analysis
AbstractBackgroundGestational diabetes mellitus (GDM) is a major public health problem and threat to maternal and child health in Africa. No prior review has been conducted in Africa using the updated GDM diagnostic criteria. Therefore, this review aimed to estimate the pooled prevalence and determinants of GDM in Africa by using current international diagnostic criteria.MethodsA systematic review and meta-analysis was conducted by comprehensive search of the published studies in Africa. Electronic databases (PubMed, Scopus, Cochrane Library, EMBASE, Google Scholar, CINAHL, Web of Science, Science direct and African Journa...
Source: Archives of Public Health - Category: International Medicine & Public Health Source Type: research
Barriers in determining prevalence of type 2 diabetes mellitus among postpartum GDM: The research and retraining needs of healthcare professionals
ConclusionsThere is neither concerted effort to diagnose GDM, nor systematic records of screening and postpartum follow-up. The gap in diabetology knowledge and practice calls for re-training of antenatal healthcare professionals. GDM screening checklist needs to be established and positive results entered into GDM registers for proper management during and after delivery.
Source: Diabetes and Metabolic Syndrome: Clinical Research and Reviews - Category: Endocrinology Source Type: research
AbstractPurpose of ReviewTo present current data on the coexistence of attention deficit hyperactivity disorder (ADHD) and the metabolic syndrome and type 2 diabetes mellitus in adults and children and to discuss possible mechanisms.Recent FindingsEmerging data suggest that risk factors for obesity and insulin resistance such as diabetes during pregnancy and intrauterine growth failure may also have a role in the development of ADHD. Furthermore, ADHD and obesity share lifestyle factors, such as abnormal eating patterns, binge eating, and a sedentary lifestyle. ADHD is a risk factor for components of the metabolic syndrome...
Source: Current Diabetes Reports - Category: Endocrinology Source Type: research
IJERPH, Vol. 16, Pages 1751: Maternal Body Mass Index and Gestational Weight Gain and Their Association with Pregnancy Complications and Perinatal Conditions
This study aimed to evaluate the impact of selected pregnancy pathologies statistically depending on overweight/obesity and excessive maternal weight gain during pregnancy on women who gave birth in the years 2013–2015 at the Second Department of Gynecology and Obstetrics at the University Hospital in Bratislava, Slovakia. In a retrospective study, we analyzed data gathered from the sample, which consisted of 7122 women. Our results suggest a statistically significant, higher risk for the groups of women with overweight and obesity and gestational hypertension (adjusted odds ratio (AOR) = 15.3; 95% CI 9.0&min...
Source: International Journal of Environmental Research and Public Health - Category: Environmental Health Authors: Martin Simko Adrian Totka Diana Vondrova Martin Samohyl Jana Jurkovicova Michal Trnka Anna Cibulkova Juraj Stofko Lubica Argalasova Tags: Article Source Type: research
In Reply —Acute Myocardial Infarction During Pregnancy and the Puerperium: Experiences and Challenges From Southern India
We thank Dr Senthilkumaran and colleagues for their interest in our work and for sharing their experience with myocardial infarction (MI) during pregnancy in southern India. In the series of 12 cases they reported, MI occurred in the third trimester or in the first week of the puerperium. All women were of advanced maternal age or had at least one cardiovascular risk factor, including obesity, hypertension, or diabetes mellitus. These data differ from our analysis of the large US National Inpatient Sample, in which 61% of women had no known preceding risk factors for MI.
Source: Mayo Clinic Proceedings - Category: Internal Medicine Authors: Nathaniel R. Smilowitz, Harmony R. Reynolds Tags: Letter to the Editor Source Type: research
Conclusion: Periodontal disease is significantly and positively correlated with increased risk of hypertension in Chinese population, and exact mechanisms of this association should be explored in future. Introduction Periodontal disease is a complex polymicrobial inflammation, including gingivitis and periodontitis. According to the 2015 Global Burden of Disease (GBD) study, the prevalence of severe chronic periodontitis in 2015 has reached 616 million (Kassebaum et al., 2017). In China, the periodontal disease standardized DALYs rate has risen from 24.7 in 1990 to 25.7 in 2013 according to the data from 2013 GBD ... | https://medworm.com/619526436/anesthetic-and-obstetric-outcomes-in-pregnant-women-undergoing-cesarean-delivery-according-to-body-m/ |
The process development of products due to raised amount of information to be manipulated is characterized for its complexity. To assist the product project innumerable tools exist: CAD (Computer Aided Design), CAE (Computer Aided Engineering), CAM (Computer Aided Manufacturing), QFD (Quality Function Deployment) and the TRIZ (Theory of Inventive Problem Solving) and others.
This article presents an application of QFD (Quality Function Deployment) and of the TRIZ (Theory of Inventive Problem Solving) to assist professionals of the CAE in the design components in the computational simulation of durability. It also presents the differences between the mathematical modeling using the attachment points of the part used in this paper in two different ways. To evaluate the results of the application of the proposal, a critical analysis of the modeling used currently and the proposal will be carried through.
To carry through the computational simulation it was used MSC_Nastran software 2004 R2, Sol 103 (normal modes with option: design sensitivity - modes) and Sol 112 (modal transient response). [
17
].
DOI:
https://doi.org/10.4271/2008-36-0101
Citation:
da Silva Rosa, S. and Ferreira, C., "The Use of QFD and TRIZ in the Component Mathematics Modeling for Virtual Durability Simulation," SAE Technical Paper 2008-36-0101, 2008,
https://doi.org/10.4271/2008-36-0101
.
Download Citation
Author(s):
Silas Luis Sartori Paschoal da Silva Rosa, Cristiano Vasconcellos Ferreira
Affiliated:
MSX International The Smart Alternative, SENAI CIMATEC
Pages:
10
Event:
2008 SAE Brasil Congress and Exhibit
Related Topics:
CAD, CAM, and CAE
Computer simulation
Quality function deployment
Mathematical models
Simulation and modeling
SAE MOBILUS
Subscribers can view annotate, and download all of SAE's content.
Learn More »
Access SAE MOBILUS »
Digital
$28.00
Print
$28.00
Preview Document
Add to Cart
Members save up to
43%
off list price.
Login
to see discount.
Special Offer:
With TechSelect, you decide what SAE Technical Papers you need, when you need them, and how much you want to pay. | https://www.sae.org/publications/technical-papers/content/2008-36-0101/ |
“You are what you do…not what you say you’ll do” – Unknown Author
If you look at that trajectory of your life, you’ll notice a pattern. That pattern is that your most important accomplishments are preceded by being proactive and taking action. Whether it’s getting your college degree, accepting an offer for your dream job or starting your business… there was an origin to that occurrence. That origin is when you made a decision and took action to move in the direction of your goal.
That action step might have been as seemingly insignificant as visiting a website or ordering the brochure for the University you attended, or registering the URL of what was to become your new business on GoDaddy. It doesn’t matter what it was… the point is that you took action and but the wheels in motion towards achieving the goal that is now bearing fruit for you today.
It sounds easy, but it’s not of course. Many important decisions require thoughtful consideration, as they’ll impact the trajectory of your life. Just like a slight turn of the steering wheel has a slow and steady impact on the direction that your car takes, so do your decisions on your life trajectory. Therefore, it’s prudent to make ‘wise’ and informed decisions with full consideration of the consequences, both short and long term. With that said, most people never take decisive action because they get too caught up in the details, otherwise known as ‘analysis paralysis’. They get stuck in the need for ‘perfection’, and as a result, nothing happens.
In my 30+ year career as an entrepreneur, corporate team leader and now executive coach, I have come to recognize that the most successful people make fast decisions and are quick to take action. Below are a few traits and characteristics of those successful people.
- They follow the 80/20 Rule, knowing that 20% of their work will yield 80% of their results.
- They recognize that ‘perfection’ is an unrealistic expectation, and don’t delay their start, or in taking action, in order to try and achieve it.
- They take action quickly, and put things in motion to gain momentum.
- They ‘pivot’ quickly when something isn’t working to move the needle in the right direction.
- They “pressure test” their idea frequently to see where the holes are, and move fast to plug them.
- They leverage trusted peers/mentors/coaches early in the process to gain insights and get honest feedback.
- They measure their progress frequently using KPI’s (key performance indicators) to make sure they are on track.
- They are not afraid to fail. In fact, they purposefully try to ‘fail fast’ so as not to waste time and resources going down the wrong path.
Recognizing that your biggest and most important successes in life were preceded by the decisive action you took several (fill in the blank, Days/Months/Years) ago, and that your crystal ball was broken at the time so you couldn’t accurately predict the future, what action are you taking now for your next BIG success? And if you’re not taking action, what’s holding you back, and what do you need to do in order to get out of your own way?
The bottom line is this… don’t wait! Your next big success down the road depends on the action you take TODAY! | https://catipult.ai/blog/get-un-stuck-take-action/ |
Mount Vernon Presbyterian School seeks a versatile, dedicated, and forward-thinking educator to serve as a Lower School Learning Coach. This person will support all learners by partnering with grade-level teams to guide both curricular initiatives as well as student services.
A Learning Coach’s responsibilities include inspiring, modeling and mentoring faculty members in designing learning experiences through the lens of project-based learning, design thinking, and other inquiry-based approaches. This leader will help plan and facilitate learning experiences for students that cascade the mission, vision, and strategic plan of the school. Additionally, the learning coach is responsible for helping all students to be successful in their learning journeys through small-group, differentiated instruction, student progress monitoring, student support accommodations, and parent support in conjunction with the classroom teacher.
Role description:
Skills and Qualifications:
Current Mount Vernon Pedagogical Influences include
Compensation is competitive and commensurate with experience. | https://jobs.magazine.org/jobs/12142356 |
When it comes to historical flair, the ancient port town of Caesarea (or Kesariya) in north-central Israel, originally built by Herod the Great in honor of Augustus Caesar (circa late 1st century BC), still holds on to its Romanized legacy. In fact, the settlement then subsequently served as the provincial capital of the Judaea Province of the Roman Empire, and as such was an important trading hub (bolstered by farming lands) even after the passing of the Romans, till the Fatimid period. Considering all these history-based ‘credentials’, Israeli authorities have decided to restore the once-imposing ancient Roman temple of the 2,000-year old metropolis, aided by a $27 million project.
According to many scholars, this impressive temple was grandiosely conceived, so much so that the massive structure beckoned to travelers and ships from afar, much like the renowned Acropolis of Athens. Architecturally, Caesarea was also accompanied by a slew of other infrastructural features, including a deep sea harbor with built storerooms, markets, connective roads, baths, and large public buildings. These public spaces were complemented by recreational aspects, which in turn allowed this major Roman city to host important sporting events, gladiatorial spectacles and theatrical programs.
The whole experience of the visitor will be completely different. He will be able to sense the atmosphere and actually understand the essence of the building. This is something that you don’t get at any other archaeological site today.
It should also be noted that last year (in May, 2016), archaeologists came across what was touted to be the largest hoard of marine-based objects in the last 30 years in Israel, from a wreck of a big merchant ship off the coast of Caesarea. Back then, IAA (Israel Antiquities Authority) had announced that the treasure stash contained both bronze statues and coins, along with other assorted stuff. And interestingly enough, the discovery was made quite by chance when two divers identified the remains of the ancient Roman ship (dating from 4th century AD) and reported back to IAA.
One of the intricate items salvaged from the shipwreck discovered last year. | https://www.realmofhistory.com/2017/05/02/restore-caesarea-ancient-roman-hub-israel/ |
JPMorgan Chase & Co.
270 Park Avenue
New York, NY 10017
SIZE OF FIRM:
Market capitalization of $145 billion.
PREVIOUS POSITIONS:
JPMorgan Investment Bank, CTO. JPMorgan: CTO, global markets; head of application development and technology infrastructure for the fixed-income business; manager, swap derivatives systems team; application developer, global swaps area.
EDUCATION:
B.S. in economics, computing and statistics from Bath University, U.K.
WHO WAS YOUR MENTOR?
Peter Hancock, who ran the fixed-income business at JPMorgan. He was one of the most innovative people I have ever come across and had an amazing ability to attract and retain top talent. He also was down to earth and was always able to carve out time to spend with people.
Top 3 Current Projects
Credit Infrastructure Transformation
Objective:The project -- a complete reengineering of our credit risk environment in the wake of our mergers -- is all about improving the accuracy of information for people making credit risk decisions. Start Date: End of 2003.
Expected Completion:2007.
Designated Funds:More than $100 million.
Credit Flow Trading
Objective:We are rolling out an enhanced version of Murex to support our global vanilla credit flow trading business. We are replacing a range of bespoke systems. With volumes expected to grow rapidly, this platform will give us a scalable engine.
Start Date:End of 2004.
Expected Completion:Early 2007.
Securitized Products Trading
Objective:We are building out a U.S.-focused trading capability for mortgage and related securitized products. We see big revenue opportunities in this area and need to get the systems in place to really scale up.
Start Date:2005.
Expected Completion:2006/early 2007.
2007 Initiatives
Electronic Connectivity
There is going to be more and more electronic integration with our clients at all levels -- pre-trade, trade execution and post-trade servicing -- across all product areas from the trading businesses through to prime brokerage. Connectivity with clients is relentless in its growth. The disparate number of integration points -- whether multidealer platforms, industry utilities or individual clients -- to which to connect and maintain are the challenge.
Capacity Projects
We are a big player in almost all markets, and we have to continue to grow our applications to cope with that. We have our grid Compute Backbone platform running the majority of our risk management systems on a shared infrastructure, which allows us to scale much more successfully.
Vitals
IT Budget:In the range of $1 billion for the Investment Bank.
Size of Technology Team:About 5,000 employees for the Investment Bank.
Percent of IT Projects Outsourced:We have nearly 600 outsourced staff. The majority are in India, with some onshore.
Key Technology Partners:We leverage a variety of vendors, such as ADP, SunGard and Murex. But it's not usually just unwrap the box and pop it in. They are mixed projects between vendor staff and JPMorgan staff.
Success Metrics:We have a balanced scorecard across our group that measures four main areas. No. 1 is delivering business value, for which we measure the on-time, on-budget delivery of projects. No. 2 is a stable and resilient operating environment. For each application, we have three to five service level agreements defined with the user community. No. 3 concerns productivity and efficiency. Everyone has a target to reach for doing things more cheaply, and we measure our progress. Lastly, we measure client and employee satisfaction. We measure that regularly by taking checkpoints from our staff.
We are starting to see interesting opportunities in the virtualization of storage -- each application no longer needs its own dedicated storage space, and rapid provisioning of storage between applications in light of new demand is possible. It has a huge impact in terms of the complexity of provisioning the plumbing for a financial institution such as ours.
The other area is developments in chip technology. We can do more calculations than we ever would have dreamed of a couple of years ago, and that allows us to better analyze risk inside portfolios and better understand more- complicated products. | http://www.wallstreetandtech.com/credit-infrastructure-transformation-credit-flow-trading-and-securitized-products-trading-in-the-queue-for-jpmorgan-investment-bank/d/d-id/1257900.html |
Located on a very quiet street at the top of the development. The best views in the neighborhood come from these properties on Pinnacle Place. One of the last remaining buildable lots on the bluff side of the road with panoramic views of Lake Chelan. The Chelan Hills neighborhood has an incredible amenity package. With access to two private waterfront parks, a boat launch, community pools and tennis courts.
Essential Information
Community Information
Amenities
Exterior
School Information
Additional Information
118 Pinnacle Place, Chelan (MLS® #1447314) Property History
All listings featuring the icon are provided courtesy of the Northwest Multiple Listing Service (NWMLS), Copyright 2020. All rights reserved. The database information herein is provided from and copyrighted by the Northwest Multiple Listing Service (NWMLS). NWMLS data may not be reproduced or redistributed and is only for people viewing this site. All information provided is deemed reliable but is not guaranteed and should be independently verified. The information contained in these listings has not been verified by Sterling Johnston Real Estate and should be verified by the buyer. All properties are subject to prior sale or withdrawal. All rights are reserved by copyright. Property locations as displayed on any map are best approximations only and exact locations should be independently verified.
Listing information last updated on July 8th, 2020 at 10:08pm PDT. | https://www.sterlingjohnstonre.com/listing/1447314-118-pinnacle-place-chelan-wa-98816/ |
This year, the California Office of Health Information Integrity (CalOHII) is hosting an event focusing on ways in which healthcare is “getting personal,” thanks to data and technology, and the impact these changes will have on helping Californians achieve better care, lower costs, and better health – Triple Aim.
The objectives of the fifth summit in the Transforming Healthcare series are to:
- Reinforce the necessity of engaging patients and putting them at the center of health care;
- Educate/inform California stakeholders, in their roles as patients, patient advocates, and/or care providers, about how they can benefit from healthcare data and technology; and
- Build enthusiasm and momentum for the innovations that are being developed as a result of new technologies and patient data being available.
Presenters include national, state, and local healthcare leaders and innovators, as well as people on the front lines who will share their challenges and progress.
What Attendees Will Gain
Stakeholders will come away from the day with a better understanding about the impact personalized medicine is having on the future of healthcare. They will have an opportunity to network with colleagues and healthcare leaders, exchange ideas, and learn about innovations that are improving care and costs.
Who Attends
The Summit typically attracts more than 350 participants from a broad range of healthcare stakeholders from all over the state, including those working in consumer advocacy organizations, provider and payor organizations, academic institutions, health care and health IT related associations, state and local government, legislative offices, public health, EHR and HIE vendors, technology innovators, rural health clinics, telehealth, accountable care organizations, patient medical homes, community and enterprise HIOs, and behavioral health providers. | http://norcal.himsschapter.org/event/calohii-stakeholder-summit |
Poetry is commonly attributed to historical periods such as The European Renaissance, The Enlightenment and the Golden Ages of many empires. It was our predecessor’s way of telling their stories and ideas in an artistic, far-fetched manner. However, for many poets, a poem is much more than metaphors and enjambment.
As said by the Editor of The Great Modern Poets Michael Schmidt, “Poems are wonderfully open, democratic spaces. They may ask us to read them several times before we understand the balances and contrasts, the lights and shadows, that they offer, but they are for the most part not deliberately obscure..No good poem makes common sense: the essence of a good poem is the uncommness of the sense it makes. It is a structuring of words in which many meanings, or meanings at many levels, are enacted. If we read poems as prose, they have very little to say.”
For me, poetry is the best way to write down thoughts and ideas without needing to explain myself or pay attention to what I’m saying, rather how I say it. It’s a coping mechanism for when I have emotions that I cannot put into words, so instead I say ideas that pop into my head to compromise for those lack of words.
My love for poetry started in 6th grade, when I unknowingly wrote my first poems. My English teacher would tell us to write a story using our vocabulary words every week, and I had gotten tired of the same ‘I watched my flamboyant bird in its cage’ cookie-cutter type sentence. So, I used the words to dramatize emotions I had fealt or observed and different symbols to represent certain feelings. My entire class would ask for me to read one every week, as they didn’t understand what message I was trying to convey but knew they had felt the emotions I was portraying. Their admiration and curiosity not only motivated me to continue, but also taught me to pride my work. I had to use full sentences, so it really was not as poetic as it could’ve been, but my love for creative writing and my new exaggerated voice bloomed after that class.
I learned what poetry was in 8th grade when our English teachers decided to create a beatnik performance, in reference to the 60s era, for the students. Most students recited songs in a poetic manner, but I decided to write my own. As it was one of my favorite poems I’ve ever written, I submitted it to the Beverly Hopkins Poetry Contest for High School Students, and lost.
I plan on continuing to enter contests, as I care less for the price and more for the feedback. As many writers are aware, the number one advice given by most highly skilled writers is to continue writing, which is something I’ve taken to heart.
Although I know each person has their own interests and might not be completely fascinated with poetry or writing in general, I do recommend people to give it a shot in their free time. It’s an efficient way to journal and can be thought of as a cryptic message that only you will fully understand. It can be related to building a puzzle, painting, and even simply observing with its wide-range of regulations and thought-provoking ideas. It unfortunately has died down over time and been misunderstood by people that have little knowledge of how poetry works. It can be assumed that all poems are as confusing as Shakespeare’s stories and are all related to the exaggerated poems that are read and analyzed in class. However, contrary to some beliefs, a poem doesn’t need a deep second meaning or intricate words in order to be a good poem. Poems, in my opinion, have 3 key details: an observation, a sense of feeling and a passionate poet. | https://lancerfeed.press/opinions/2021/04/13/opinion-poetry-is-not-a-thing-of-the-past/ |
American gold medal winners Michael Phelps, Katie Ledecky and Simone Biles are featured on the cover of this week's Sports Illustrated.
The magazine revealed the cover on its website Tuesday. It shows Phelps with his arms around Ledecky and Biles. They each have gold medals draped around their necks — a combined total of 14.
Sports Illustrated says the photo was taken Sunday in Rio de Janeiro. A video of the shoot reveals Phelps showing fellow swimmer Ledecky the best way to arrange her medals, adding "I've done it before, you'll learn, don't worry about it." Phelps has won 28 Olympic medals, 23 of them gold.
Biles has won three gymnastics golds and a bronze in Rio. She could add to that haul during the floor exercise final Tuesday. | https://www.nbcnewyork.com/news/national-international/Phelps-Ledecky-Biles-Grace-Sports-Illustrated-Cover-390328471.html |
Work carry out: Production and Assembly of the expóción Music in Antiquity, includes the construction of showcases, audiovisuals, lighting, collocation of pieces, graphic, cabinetmaking and painting.
Designer:
Thematic
Music in antiquity is the result of the agreement between "la Caixa" Welfare Projects and the Musée du Louvre for the joint organization of exhibitions that bring to light or discover the public artists, collections and periods of history of art based on the funds of the Parisian museum. This exhibition follows the line of other projects that have been developed jointly with the Musée du Louvre, such as those dedicated to Pharaonic Egypt, the routes of Arabia, the Etruscan princes, Mesopotamia, Delacroix and Le Brun.
Imagine that, in 2,000 years, only samples of Mozart's music, small fragments of Brel's songs and broken or damaged musical instruments, were just as a sign of it. In a way, this is the situation faced by specialists in ancient music, who only have access to incomplete elements, both in terms of the few "scores" and the instruments that have been found fragmented in tombs, houses or sanctuaries. There are, however, the numerous texts and the thousands of images that show scenes of musical life and from which scholars recompose the sound environment of each culture, thanks also to the latest advances in research . Although ancient societies seem to share certain musical instruments and certain practices, there are in these practices a series of forms of musical expression that are their own. | http://expomon.es/en/projects/music-in-antiquity |
Opportunity to purchase a well maintained 20 unit apt complex in St. Ann located across the street from Tiemeyer Park. The building located in a quiet neighborhood surrounded by single family homes is comprised of 16 one bed apts and 4 two bed apts with central AC and 25 parking spots. The building has had a number of recent capital improvements including exterior and interior electric updating throughout, a new retaining wall running the length of the property and updates to a number of the apts. Rents have been raised to as much as $675 for the 2 beds and $550 for the 1 beds so there is the ability to raise rents. With rents at $675 for the 2 beds and $550 for the 1 beds fully rented the building would generate $138,000 annually. There is only currently one vacancy while a unit is being rehabbed, there is a history of high occupancy rates. Projected income for 2019 is $130,000 with projected expenses at $32,680 for a net potential income of $97,320 which would be a 10% cap rate.
Paying buyers agents 2.00%
Search the MLS below using the city, postal code, address or listing id of the desired property. | https://investinstlouis.com/invest-listings/20-unit-apartment-complex-for-sale/ |
“Doctor,” the woman hesitated, as she struggled to accept what she had been dreading during the many weeks that her father had been in the hospital. “How exactly, you know, does the deed happen? Will he suffer?” As I watched our patient’s daughter struggle with the realization that her elderly father may never recover or be able to return home, I imagined the questions racing in her head, trying to grasp what her father’s final days may look like. Even acknowledging the reality by using the word “dying” or “death” was overwhelming for her, and speaking in euphemisms like “deed” seemed more comfortable. The doctor calmly explained to her what she could expect, what the team of doctors and nurses could do to ensure her father’s comfort, and what support was available to the daughter during this difficult time. While there was little that could be offered from a curative perspective, there was still hope that her father’s final days would be meaningful, memorable, and comfortable.
As a medical student, I only spent two weeks rotating with the palliative care service, yet I was astounded by the many conversations like these which I had the privilege of observing and sometimes partaking in — conversations between doctors, patients, family members, nurses, and social workers. I was touched to see that palliative care truly restores meaning, hope, and beauty to patients and families, and even to healthcare providers, during times that otherwise appear hopeless. For patients suffering with chronic illness and their families, often times each day brings new aches and pains, worsening prognoses, and limitations on what one was previously able to do. In each of these moments, accepting this new reality can be a process of loss and grief. Palliative care providers have the power to carry patients and families through these difficult transitions and transform these moments by redefining hope. These are opportunities to discuss what the patient values and is aiming for, how these goals can best be achieved, and what is most important in the remaining time. These are also opportunities to explore uncertainty in an authentic way, acknowledging that there is much about medicine and illness which we (as healthcare professionals, as patients, as family members) cannot control; however, the things that we can control can be optimized to respect each patient’s goals and values.
In his book Being Mortal, Atul Gawande states, “You may not control life’s circumstances, but getting to be the author of your life means getting to control what you do with them.” Perhaps the most important lesson I learned during my palliative care rotation is that as health care providers, we have the privilege of empowering patients to reclaim authorship of their lives when they feel their reality, their purpose, and their hope has been stripped away. We can assure them that they will not be alone during life’s difficult transitions. In the midst of uncertainty, we can return the pen to our patients and remind them that they still get to write the final chapters. | https://www.mypcnow.org/blog/redefining-hope-a-medical-students-perspective/ |
Southeast Michigan urban hospitals continued to report steady income improvements for the nine months ended Sept. 30, but suburban community hospitals saw declines in volume and income.
With nine hospitals reporting results for the quarter ended Sept. 30 to the Michigan State Hospital Finance Authority, three saw declines in operating income for the three months compared with the same period in 2003. Five reported improved results. One remained flat.
Detroit-based Henry Ford Health System, The Detroit Medical Center, Royal Oak-based William Beaumont Hospitals, Novi-based Trinity Health and Pontiac Osteopathic Hospital all reported year-over-year improvements in third-quarter operating income.
CFO James Connelly said the improvement was primarily because of the turnaround plans the system implemented in 2002 and a 6.2 percent increase in admissions.
"We've seen substantial growth in inpatient admissions," Connelly said. "Combined with cost discipline, that's really what's driving the top line."
The system hasn't closed its 2004 books yet, but Connelly said he expects Henry Ford to be profitable in the fourth quarter as well.
The Detroit Medical Center has reported similar reasons for its improvement. The hospital system reported a $4 million loss for the quarter, up from a $37 million loss in the same quarter last year.
President and CEO Michael Duggan has attributed the improvement to better efficiency and a focus on seeing patients quickly. That, he said, has resulted in increased patient volumes and operating income.
Smaller hospitals continued to report some struggles, though.
Crittenton Hospital Medical Center CFO Ken Belke said the Rochester-based hospital suffered some declines in admissions because the system lacked complete neurosurgical coverage for a portion of the year so couldn't accept as many emergency patients. The hospital took care of the problem in October, Belke said, and that should be reflected in fourth-quarter results when they become available.
Farmington Hills-based Botsford General Hospital saw its earnings drop to $1.7 million for the quarter from $6.4 million in the same quarter a year earlier.
Botsford administrators have attributed the drop to declines in patient volumes and increases in the amount of uncompensated care the hospital is treating. | https://www.crainsdetroit.com/article/20050131/SUB/501310890/urban-hospitals-fare-better-in-3q |
Regular exercise or relaxation techniques like yoga and massage will keep cortisol naturally in check by releasing beta-endorphins, brain chemicals that give you a calming effect.
A recent study from Wales shows that regular consumption of breakfast cereal is associated with reduced stress and improved physical and mental health. Those who ate cereal daily had lower levels of cortisol. On the Abs Diet, that means oatmeal and bran cereals.
Regularly working overtime may inflate your weight. The stress of a string of 12-hour days can cause a spike in cortisol that stimulates hunger.
A recent Australian study discovered that workers whose jobs require more than 6 hours of chair time a day are up to 68 percent more likely to wind up overweight or obese. | https://www.menshealth.com/health/a19545953/living-well-9/ |
After completing its second meeting of 2017, the Federal Reserve announced it had decided to increase the federal funds rate for the second time in three months, according to an official statement.
The Fed's long-discussed goal is to encourage inflation to reach 2%. The statement released after the March 14-15 meeting pointed out that this objective is within reach, though the country remains just shy of it.
The federal funds rate is now at a range of 0.75% to 1%, though several central bank officials have spoken up with predictions of multiple increases yet to come before the year ends.
Boston Federal Reserve President Eric Rosengren said in a speech that he's in favor of one increase for every two FOMC meetings. That amounts to four rate hikes total (including March's rise), all an increase of one-quarter point, CNBC reported.
"Several Fed members have spoken up with predictions of multiple increases yet to come."
Rosengren argues that this approach is necessary to keep wages steady. A labor shortage amid a growing economy could push wages up and may, in turn, "overheat" the economy, as he put it.
"If the economy runs too hot, it could ultimately require a less gradual monetary policy adjustment – which could potentially place at risk the significant progress the economy and labor market have made since the Great Recession," Rosengren said, according to CNBC.
San Francisco Fed President John Williams echoed Rosengren's sentiments, CBNC reported.
"What a difference four years makes," Williams said in a statement addressing the Forecasters Club in New York. "We're now very close to reaching the Fed's dual mandate goals of maximum employment and price stability. In fact, if you do the math, we are about as close to these goals as we've ever been."
Williams, a non-voting member who contributes to policy discussions, noted that investors shouldn't rule out at least three more hikes this year.
Chicago Fed President Charles Evans also indicated his support for another couple potential increases - though he was cautious of indicating he would vote for three.
"To the extent that I gain more confidence in the forecast that I have, that would be a good indicator that I could perhaps support three," he told Bloomberg TV. "Two might be the right number if there's a little bit more uncertainty."
Nine of the 10 voting members supported the March increase, according to the Fed's statement. The one member who didn't was Minneapolis Fed President Neel Kashkari. Kashkari also voted against increasing it during the first meeting of the year, ending on Feb. 1, though he was in good company then; the final decision was to keep it at between 0.5 and 0.75 for another month.
Kashkari, who is new to the FOMC vote this year, took to Medium following the Feb. 1 meeting to elaborate on his individual position. He wrote that, though inflation is moving in the right direction, it's not doing so very rapidly. Additionally, he noted that while employment numbers look positive, there still seem to be challenges in many corners of the country.
"We also know that the aggregate national averages don't highlight the serious challenges individual communities are experiencing," he wrote. "For example, today while the headline unemployment rate for all Americans is 4.8%, it is 7.7% for African Americans and 5.9% for Hispanics."
About a month after Kashkari published his essay, the Bureau of Labor Statistics reported that 235,000 jobs were added in February and unemployment came in at 4.7% for the nation. However, black and Hispanic Americans showed unemployment rates of 8.1% and 5.6%, respectively.
Kashkari refrains from making any predictions. He says attempting to estimate what will happen in future meetings can take a negative turn in the event that economic indicators don't pan out as expected, forcing Fed members to reverse their previous stances.
On that point, Kashkari is correct; There is no way to predict what future interest rates will be or which particular economic indicators will influence them. For now, though, consumers can expect that rates will begin to tick upward. Those looking to make a home purchase this spring may benefit from locking in a low rate sooner rather than risking a higher quote later. | https://academymortgage.com/news/article/financial-regulation/what-the-fed-has-in-store-for-2017-interest-rates |
I use this short stereo delay to add a touch of excitement and width to a lead vocal, and to help it sit in the mix. I typically prefer this approach over a short reverb.
Note that since my FX are set up as sends and returns, the mix is at 100%.
Having the left and right delay times slightly different creates the width, while the LPF setting eliminates extra sibilance and helps the effect blend into the mix.
I usually mix this delay very subtly, so that it doesn’t jump out yet is obviously missed when muted.
Experiment with different delay times to suit your taste, and try using this effect in place of a reverb.
In fact, this type of delay tends to sound and act like a reverb – without the negative effect of pushing the vocal back in the mix. | https://hardcoremusicstudio.com/blog/plugin-preset-friday-vocal-stereo-delay/ |
Chocolate cupcakes with cream cheese frosting recipe, these chocolate cupcakes have a rich chocolate flavor and the chocolate cream cheese frosting lends them a moist, fudgy texture, such a delicious treat for all of you chocolate lovers!
This is really my favorite chocolate cupcake recipe whether in texture and rich chocolate flavor, also this chocolate cream cheese frosting is delicious to the max, I could eat it on its own!
What I like about this cupcake recipe is that the cake is denser, has more texture than the usual cupcakes, the main difference is that it is made with butter instead of oil.
About the chocolate cream cheese frosting, the ingredient quantity I am giving makes enough frosting for 12 cupcakes as I piped them on the picture. If you need more frosting, you can double the recipe. Conversely, you may halve the recipe but then I do not recommend making it in your stand mixer as it will be too small a batch to mix well, use a hand mixer in this latter case.
♦ Since the frosting is made with melted chocolate, please do not forget to take the cupcakes out of your fridge about 30 minutes before enjoying so to allow the frosting to come to room temperature
If you like individual dessert, you might be interested by my Candied Fruit Mini Bundt Cakes or Nutella Ganache Cookie Cups.
Cupcakes:
6 tbsp. (84g.), unsalted butter, room temperature
3/4 cups (155g.) sugar
6 tbsp. (86g.) sour cream
2 tsp vanilla extract
3 large egg whites, room temperature
1 cup (130 g.) all-purpose flour
1/3 cup (30 g.) unsweetened cocoa powder
2 tsp baking powder
1/4 tsp salt
6 tbsp. (90ml) milk
2 tbsp. (30ml) water
Frosting:
5.2 oz. (150 g.) dark chocolate, melted and cooled slightly
5 tbsp. (70 g.) unsalted butter, soft
7 oz. (200 g.) cream cheese
3 cups (330 g.) icing sugar, sifted
1 12 muffin pan – 12 muffin cups
Preheat your oven to 350°F (175°C) and line a muffin pan with cupcake cups
In the bowl of a stand mixer fitted with the paddle attachment, or with a hand mixer, cream butter and sugar together on medium high speed until light and fluffy, about 3-4 minutes
Add sour cream and vanilla extract, mix until incorporated
Add egg whites in two batches, mixing until well combined after each
Into a separate bowl, mix together the flour, cocoa powder, baking powder and salt
Combine milk and water in a small measuring cup
With the mixer on medium/low speed, add half the flour mixture, mix until incorporated, then pour the milk mixture, mix well, lastly pour the other half flour mixture
Finish mixing with a spatula, scraping the sides and checking that there is no more flour at the bottom of the bowl
Fill the liners about halfway and bake for 15-17 minutes, or until a toothpick inserted in the center comes out clean
Let cool a few minutes in the pan, then remove to a cooling rack, let cool completely before frosting
Make a water bath/bain-Marie, into a saucepan, boil about 2 inches water, put a heatproof bowl on top, add the chocolate and stir until melted, set aside to cool
In the bowl of your stand mixer fitted with the paddle attachment, add the butter and cream cheese, mix to combine
Add the icing sugar in few increments, mixing well after each addition
Lastly add the cooled melted chocolate, check the consistency, if your frosting is a bit too liquid, add more icing sugar 1 tablespoon at a time, conversely if your frosting is too thick, add 1 teaspoon at a time heavy cream or sour cream
Frost cupcakes the way you like best, I used a Wilton 109 tip called Drop Flower Small
Keep in your refrigerator for a few days, do not forget to take the cupcakes out of your fridge about 30 minutes before enjoying so to allow the frosting to come to room temperature
Check this page to visualize the different types of piping you can get using different tips
Recipe inspired by Lindsay at Life, Love and Sugar, click here for her method. | https://pattysaveurs.com/en/sweet/378-chocolate-cupcakes-cream-cheese-frosting.html |
For all water park information, please visit our website HERE, PRIOR TO MAKING YOUR PURCHASE.
Due to limitations in our computer system, only 1-hour tickets may be purchased online. We recommend purchasing 1-hour online then upgrading to either 2 or 3 hours at the park for a discounted rate. TICKETS START ON THE HOUR.
All advanced ticket sales are final. Paid sessions cannot be refunded or changed. Please note that reservations cannot be changed, canceled, or transferred after payment has been processed. A general admission ticket (not a spectator) must be purchased with all toddler passes as toddlers may not be in the park unattended.
Please review all terms & conditions by visiting our main website: HERE
REMINDER: Outside food & drinks and coolers are no longer permitted. | https://yawgoo.connectintouch.com/water-park?viewmode=list |
research and peer review reports, press releases, and policy briefs
Respond to your colleagues by offering additional ideas to overcome the barriers to strategies suggested by your colleagues and/or by offering additional ideas to facilitate dissemination.
At least 2 references in each peer responses!
Dissemination tools include, research and peer review reports, press releases, and policy briefs. Theses topic may be presented as posters, presentations, or papers. Personally, I am inclined to use posters and presentations when trying to disseminate new information with my colleagues, particularly new evidence-based practice (EBP), which as a clinical educator I am expecting them to incorporate into their daily professional practice. Newhouse et al., 2007, reported that the very act of getting ones’ colleagues to introduce EBP into their daily routine may present a complete change in nursing culture.
It is for this very reason I have chosen posters and presentations as my primary methods for the dissipation of new information. I feel that these methods allow the participants two very valuable opportunities such as the ability to consume the information in a rapid style (i.e., posters) and to promote self-guided research. The poster approach stimulates the nurses to ponder the content and gives the opportunity to discuss its contents with myself or other staff members. It is important to stress the importance of EBP to actively review ones’ practice for safer, more effective, and the most productive methods of practicing the nursing profession.
In the same vein, I feel that presentations are quite valuable for disseminating new information to a large group of people. This allows for a volley of questions and answers to occur at the end of the presentation, instead of the consumer of this information feeling as if they have been “drinking out of a firehose.” Being able to unpack and break down complicated amounts of data, especially number driven statistical analysis, may be required of the staff to implement and their daily nursing practice as EBP.
Neither of the above-mentioned modes of dissemination are with faults. Posters do not typically only allow for consumption of information on a macro level; Posters can prevent the amount of knowledge sharing which impedes the target users from the ability to drill down into the details nor does the poster allow for a question and answer on the spot, causing the reader to completely dismiss the contents on the poster. Presentations can often feel as if the attendee, or the target user, is required to attend the presentation related to the new policy change as directed by a particular healthcare system This can cause them to shut down and not be particularly inquisitive as to how these new changes may be implemented into their daily nursing practice. This disillusionment may cost you the buy in of the end-user or leadership, which is so desperately needed to properly institute systemwide changes as they are directed by EBP (Gallagher et al., 2011).
As stated above with the poster, the reader can then circle back to the author and ask specific questions or exhibit signs of curiosity and do some of their own research on the subject matter. The presentation allows for this real time dissemination of knowledge and the answering of questions which removes a shroud of doubt which helps implement the knowledge into one’s practice at a quicker pace. An organic sense of ownership that can only come with believing that what you are about to change is truly beneficial becomes more apparent. After the barrier is smashed, one can truly be successful at implementing or changing the professional practice of others.
The two methods that I would least likely employ would be a press release and policy briefings. I find that these are too superficial and do not dive deep enough into the particular subject matter to gain the trust or the adherence of the end-user or leadership, for that matter. These methods may work better for brief communications with the public or a talking point. However, when one is trying to convey complicated new methods based solely around evidence in particular body of knowledge for that profession, then you need to have an arena that allows you to explore and welcomes questions by the end-user or the leadership team. This allows for a more seamless implementation into daily practice and helps with reducing resistance from the intended audience allowing for EBP changes to be continued over time as seen in the advancing research and clinical practice through close collaboration model (ARCC) founded by Melnyk and colleagues in their 2017 research on this very topic. | https://www.writers24x7.com/549-2/ |
The number of vehicles in operation worldwide surpassed the 1 billion-unit mark in 2010 for the first time ever.
According to Ward’s research, which looked at government-reported registrations and historical vehicle-population trends, global registrations jumped from 980 million units in 2009 to 1.015 billion in 2010.
The figures reflect the approximate number of cars, light-, medium- and heavy-duty trucks and buses registered worldwide, but that does not include off-road, heavy-duty vehicles.
The 3.6% rise in vehicle population was the largest percentage increase since 2000, while the 35.6 million year-to-year unit increase was the second-biggest increase in overall volume ever.
The market explosion in China played a major role in overall vehicle population growth in 2010, with registrations jumping 27.5%. Total vehicles in operation in the country climbed by more than 16.8 million units, to slightly more than 78 million, accounting for nearly half the year’s global increase.
The leap in registrations gave China the world’s second-largest vehicle population, pushing it ahead of Japan, with 73.9 million units, for the first time.
India’s vehicle population underwent the second-largest growth rate, up 8.9% to 20.8 million units, compared with 19.1 million in 2009.
Brazil experienced the second largest volume increase after China, with 2.5 million additional vehicle registrations in 2010.
U.S. registrations grew less than 1% last year, but the country’s 239.8 million units continued to constitute the largest vehicle population in the world.
Related document: World Vehicles in Operation
Vehicles in operation in 2010 equated roughly to a ratio of 1:6.75 vehicles to people among a world population of 6.9 billion, compared with 1:6.63 in 2009. But the distribution was not equal, even among the biggest markets.
In the U.S., the ratio was 1:1.3 among a population of almost 310 million – the highest vehicle-to-person ratio in the world. Italy was second with 1:1.45. France, Japan, and the U.K. followed, all of which fell in the 1:1.7 range.
In China, the ratio was 1:17.2 among the country’s more than 1.3 billion people. India, the world’s second most-populous nation with 1.17 billion people, saw a ratio of 1:56.3.
The world vehicle population in 2010 passed the 1 billion-unit mark 24 years after reaching 500 million in 1986. Prior to that, the vehicle population doubled roughly every 10 years from 1950 to 1970, when it first reached the 250 million-unit threshold. | https://www.wardsauto.com/news-analysis/world-vehicle-population-tops-1-billion-units |
RF Graduate EngineerWhat is the opportunity?
Our Radio-Frequency (RF) department works on projects that cover the whole product lifecycle from research and development through to full product design and production. The role covers Radio-Frequency Systems and Datalinks technologies with applications including systems design work, hardware and firmware. You will be able to perform highly scientific technical investigations, provide problem assessments and design solutions within a culture of innovative thinking.
What will you be doing?
You will develop expertise in innovative RF systems, communications and datalinks, and how these interact with other subsystems to form part of the wider missile system. Hands-on testing, integrating and designing industry-leading hardware and system components.
You will gain an understanding in the following areas:
- A variety of radio frequency subsystems including data communications; radars and radio altimeters, typically operating between 1 and 18GHz,
- Specification and assessment of RF products to support development, production and in-service programmes via interaction with UK and European colleagues and suppliers,
- Development, procurement, parameterisation, verification and/or validation of complex hardware performance models (e.g. Matlab, Simulink or similar),
- Monitoring supplier and technology roadmaps and identifying innovative and future technologies for investment,
- Research and design activities in collaboration with French, Italian and/or German colleagues.
Our roles will typically allow a blend of on-site and at-home working to suit the needs of the role and the individual. You will have support from the whole team both virtually and in person, as well as access to our range of high-tech lab equipment.
What are the benefits for you?
- Excellent opportunities for personal development
- Access to a vast array of training and opportunities to learn directly from experts in the field
- Ability to apply technical knowledge to influence the direction of technologies and projects
- Experience products at different phases of the product lifecycle
- Diverse range of roles available creating varied and stimulating work
- Excellent team culture with a collaborative and innovative mind-set
- Team members are friendly, approachable and offer support throughout all aspects of the role
- Opportunity to work alongside highly skilled engineers and physicists
- Team events and socials, building stronger relationships in and out of the office
- Interaction with other departments across the wider technical community, including external customers and suppliers
- Degree qualified by September 2023 (minimum 2:2) in any relevant applied Physics, Electronics or Engineering degree
- Good communication and presentation skills
- A passion for applying your university learning to real-world engineering projects and technologies
- £30,000 starting salary plus £3,000 joining bonus
- Pension Scheme
- Access to range of employee discounts including Dining and Lifestyle discounts subsidised gym membership and more
Why choose us?
MBDA is an award winning company; committed to providing an inclusive working environment where our employees can be themselves and everyone has equal opportunity to reach their full potential. We value difference and know that a diverse community makes for greater innovation and brings a breadth of skills, experience and perspectives.
We're here to help and want to ensure you have a positive experience throughout our recruitment process. We recognise that everyone is unique and we encourage you to speak to us should you require any advice, support or adjustments.
MBDA is a proud member of Working Families - the UK's work-life balance organisation. We welcome applicants who are looking for flexible working arrangements.
We understand that flexibility benefits our people, our teams and our business; wherever possible we will seek to accommodate a blended approach to on-site and remote working.
Follow us on LinkedIn (MBDA), Twitter (@MBDAcareers), Instagram (lifeatMBDA_UK) and Glassdoor or visit our MBDA Careers website for more information.
Please Note: MBDA UK requires all employees to achieve the appropriate clearance relevant to the role.
#LI-DNI
Company
MBDA, a world leader in missiles and missile systems, is a multi-national group with 10,000 employees working across France, the United Kingdom, Italy, Germany, Spain and the United States. It has three major aeronautical and defence shareholders - Airbus Group (37.5%), BAE Systems (37.5%) and Finmeccanica (25%) - and is the first truly integrated European defence company. In 2013, the Group recorded a turnover of 2.8 billion euros, produced about 3,000 missiles and added 4 billion euros of new orders to the order book which now stands at 10.8 billion euros. MBDA works with over 90 armed forces worldwide.
MBDA was created in December 2001, after the merger of the main missile producers in France, Italy and the UK. Each of these companies contributed the experience gained from fifty years of technological and operational success. The restructuring of the industry in Europe was completed with the acquisition of the German subsidiary EADS/LFK in March 2006. This further enriched MBDA’s range of technologies and products, consolidating the Group’s world-leading position in the industry.
MBDA is the only Group capable of designing and producing missiles and missile systems to meet the whole range of current and future operational requirements for the three armed forces (army, navy, air force). Overall, the Group offers a range of 45 products in service and another 15 in development.
The Group has demonstrated its ability to bring together the best skills across the whole of Europe and as a result has been chosen to lead a series of strategic multi-national programmes. These include the six-nation Meteor air superiority weapon, the Franco-British conventionally armed cruise missile, Storm Shadow/SCALP, and a family of air defence systems based on the Aster missile for France and Italy (for ground and naval based air defence) and for the UK (naval air defence for the Royal Navy’s Type 45 destroyers).
The mastery of cutting-edge technologies is not only an advantage for MBDA in successfully developing and producing new products. It is also a means of guaranteeing customers that innovations can be made to existing products during their life span in order to meet constantly changing specifications arising from increasingly complex engagement scenarios. It is precisely this combination which makes MBDA the defence sector partner of choice in many countries around the world. | https://engineering-jobs.theiet.org/job/36085/rf-graduate-engineer-2023/ |
The world of business often focuses on tried and true ideas. In a field that’s often characterized as risk-averse, this can make a good deal of sense — if something’s worked in the past, the thinking goes, it’s likely to be viable in the future as well. However, the history of business is also peppered with examples of innovative thinking that has changed the field as a whole and, oftentimes, the world. To better understand the power of innovative thinking as it relates to business, we’ve turned to the work of Jesse Willms. The eCommerce entrepreneur has built a successful career on his ability to identify new business ideas.
Building a foundation
In order to innovate in business, it’s often necessary to understand where the field has previously been. When a person knows the existing norms in a field, they are better equipped to move beyond them and bring new direction to the space. Without this understanding, however, an individual may not know what mistakes have been made in the past by those who’ve engaged in their own forms of innovation. This can be costly since repeating the mistakes of the past can often cause a person to stagnate in their work and fail to reach their lofty goals.
In practice, this often plays out through a concerted effort to study business as it has previously been conducted. By seeing how past leaders in the field have engaged in their respective areas of expertise, you can hope to be better informed as to how you can innovate in your own particular area. Looking to large-scale or emerging trends in an industry can also be a boon in this area. Taken together, these two foundations of knowledge can equip a business professional with the tools they need to think outside of the box and change the market with innovative thinking.
In the work of Jesse Willms, we see this concept illustrated at a very early age. When he was still a teenager, he was already developing his lifelong interest in the field of business. At that time, he became deeply invested in researching the accomplishments of past business leaders, reading memoirs and various articles on the subject. By building his understanding of how business was conducted at the highest levels by those who came before him, he was able to equip himself with a range of tools to innovate on the field when he began his own career.
Leveraging technology
In some ways, the story of business progression has mirrored the progression of technology itself. As technology has advanced, some of the most impactful business leaders throughout history have found ways to utilize it to achieve lofty new business goals. By utilizing the ability of new technology to accomplish tasks in more efficient or entirely new ways, business leaders are able to pass previously unrealized capabilities on to their customers.
This again is illustrated in the work of the eCommerce entrepreneur, who was one of the first individuals to leverage the power of the internet and powerful new data tools to provide targeted marketing to consumers. Much of this work revolved around utilizing new marketing abilities afforded by search engines and large-scale ad networks to better understand consumer habits. Through this work, the entrepreneur was able to pass along advertising to consumers that was much more relevant to their needs and interests, affording them access to products that may have otherwise gone unnoticed. Though many individuals had used the internet for marketing prior to that point, this new way to inform consumers of products proved to be a pivotal turn in the space.
Innovation support
Oftentimes, the story of innovation is characterized as a single person with one big idea. That idea, as the story goes, is so powerful that once it is brought into existence it has the power to fundamentally change many aspects of its field. While there are certainly ideas that have had this effect, it is not usually the case that a single idea can change a space on its own. Instead, ideas of this type need additional support from those that conceive of them in order for them to be successful. In other words, ideas can be plentiful, but execution is where they really shine.
Jesse Willms has shown this in his own work by engaging in a committed effort to build upon his ideas wherever possible. Rather than letting them exist in their smallest version, he’s worked hard to support them through investments in technology and team members who can help build upon the initial concept and bring its benefit to his customers. In doing so, he gives the innovation space to organically expand and achieve a greater impact than would otherwise be possible.
Continued growth
One final point to keep in mind when it comes to idea innovation is the need for continual growth. This growth can be with respect to an entrepreneur’s first big concept, as they seek to grow their business, or it can be with respect to the innovation of additional ideas along the way.
In the work of the eCommerce entrepreneur, this has manifested through a steadfast commitment to creating new offerings to consumers even after his first ideas proved quite successful. He’s noted that, to this day, he’ll often spend hours on search engines and the internet seeking to stress test and generate ideas that can be of use. Most recently, this process has led to the creation of a network of sites focused on offering free vehicle history reports to consumers, building on the opportunity realized by the free credit report space.
While tried and true ideas have their place in business, notably to serve consumers in a low-risk fashion, the history of business has often been told through a recounting of its most innovative ideas. These ideas have the potential to push the field to new heights and fundamentally change the lives of people across the globe. The work of Jesse Willms is a good example of what can be accomplished when entrepreneurs engage in this truly innovative thinking. That example bears further exploration for anyone interested in the way business capitalizes on the power of human imagination to help drive progress and change. | https://thepointnews.com/jesse-willms-innovative-thinking/ |
A measurement of the Hubble constant is reported that combines the distance to the source inferred purely from the gravitational-wave signal with the recession velocity inferred from measurements of the redshift using the electromagnetic data.
The Emergence of a Lanthanide-Rich Kilonova Following the Merger of Two Neutron Stars
- Physics
- 2017
We report the discovery and monitoring of the near-infrared counterpart (AT2017gfo) of a binary neutron-star merger event detected as a gravitational wave source by Advanced Laser Interferometer…
GW170817: Observation of Gravitational Waves from a Binary Neutron Star Inspiral.
- PhysicsPhysical review letters
- 2017
The association of GRB 170817A, detected by Fermi-GBM 1.7 s after the coalescence, corroborates the hypothesis of a neutron star merger and provides the first direct evidence of a link between these mergers and short γ-ray bursts.
From Spitzer Galaxy photometry to Tully–Fisher distances
- Physics
- 2014
This paper involves a data release of the observational campaign: Cosmicflows with Spitzer (CFS). Surface photometry of the 1270 galaxies constituting the survey is presented. An additional ∼400…
Gravitational waves from merging compact binaries: How accurately can one extract the binary's parameters from the inspiral waveform?
- PhysicsPhysical review. D, Particles and fields
- 1994
This work investigates how accurately the distance to the source and the masses and spins of the two bodies will be measured from the inspiral gravitational wave signals by the three-detector LIGO-VIRGO network using ``advanced detectors'' (those present a few years after initial operation).
Galaxy groups and clouds in the local (z∼ 0.01) Universe
- Physics
- 2010
We present an all-sky catalogue of 395 nearby galaxy groups revealed in the Local Supercluster and its surroundings. The groups and their associations are identified among 10 914 galaxies at |b| >…
The 6dF Galaxy Survey : peculiar velocity field and cosmography
- Physics
- 2014
We derive peculiar velocities for the 6dF Galaxy Survey (6dFGS) and describe the velocity field of the nearby ( z< 0.055) Southern hemisphere. The survey comprises 8885 galaxies for which we have…
Spectroscopic identification of r-process nucleosynthesis in a double neutron-star merger
- PhysicsNature
- 2017
The spectral identification and physical properties of a bright kilonova associated with the gravitational-wave source GW170817 and γ-ray burst GRB 170817A associated with a galaxy at a distance of 40 megaparsecs from Earth are described.
Swope Supernova Survey 2017a (SSS17a), the optical counterpart to a gravitational wave source
- PhysicsScience
- 2017
A rapid astronomical search located the optical counterpart of the neutron star merger GW170817 and shows how these observations can be explained by an explosion known as a kilonova, which produces large quantities of heavy elements in nuclear reactions. | https://www.semanticscholar.org/paper/The-Distance-to-NGC-4993%3A-The-Host-Galaxy-of-the-Hjorth-Levan/165dd2cdb336e0e2412b6deb0b524904e7647f7d |
Brexit and NHS competition and procurement rules
Brexit’s impact on the regulation of NHS procurement and competition, as foreshadowed in HSJ last Friday, is likely to be limited. At the risk of unnecessarily adding to the volume of Brexit-related discussions, this blog post looks in further detail at the likely impact on procurement, merger control, state aid and prohibitions on anticompetitive behaviour in the NHS.
In summary, there will be no practical change to the existing arrangements if the UK swaps EU membership for membership of EFTA (the club for Norway, Iceland and Switzerland) and the European Economic Area. EFTA’s procurement and competition rules basically mirror those of the EU.
Even without EFTA/EEA membership, Brexit will – in and of itself – have a limited impact on NHS procurement and competition regulation. In procurement, newly negotiated trade agreements with other countries, including those in Europe, and domestic concerns about ensuring value for money in public purchasing, can be expected to result in a public sector procurement rules for the UK that are similar to those that currently exist.
Withdrawing from the EU does, however, make it a little easier to lift the current prohibition on anticompetitive behaviour by NHS providers and commissioners (if policymakers decided that this was desirable). Currently, there is some uncertainty as to whether NHS organisations would be caught by EU-level prohibitions on anticompetitive behaviour if UK-level prohibitions were removed. This is no longer the case if the UK is no longer bound by EU-level rules.
Finally, as EU merger control and state aid rules have limited impact on the NHS, withdrawal from the EU will have limited consequences in these two areas.
Procurement
NHS procurement is governed by both the Public Contracts regulations, and the Procurement, Patient Choice and Competition regulations. This latter set of regulations (also known as the s.75 regulations) were put in place under the Health & Social Care Act.
The Public Contracts regulations transpose EU public procurement directives into UK law. (The most recent Public Contracts regulations 2015 implement the EU’s Public Sector Procurement Directive (2014/24/EU)).
EU procurement regulation, “by guaranteeing transparent and non-discriminatory procedures”, seeks to “ensure that economic operators from across the Single Market benefit fully from the basic freedoms in competing for public contracts”. The importance of transparent, non-discriminatory public procurement procedures to the single market is underlined by the fact that public authorities spend around 18% of GDP annually on supplies, works and services.
As set out above, even if the UK withdraws from the EU, and does not join EFTA, future international trade agreements negotiated by the UK are likely to impose obligations on UK public procurement given the size of public purchasing as a proportion of the economy. Moreover, even without trade-related obligations, it is questionable whether it would be a good idea to pursue a public procurement strategy that was not based on securing the best possible value for money for taxpayers through transparent, non-discriminatory purchasing.
The procurement-related requirements of the Procurement, Public Choice and Competition regulations, in large part, mirror the requirements of the Public Contracts regulations. As set out in the Explanatory Memorandum to these regulations, the purpose of this duplication is – at least in part – to allow disputes to be resolved by way of complaint to Monitor (now NHS Improvement), rather than through court action.
The UK Government is able to rescind or change these regulations, with or without Brexit. The desirability of this, in large part, rests on whether it is considered a good idea to provide the NHS with an alternative to the courts for resolving procurement-related disputes.
Competition
NHS competition rules have three main components: (i) the prohibition on anticompetitive behaviour; (ii) merger control; and (iii) the prohibition on illegal state aid.
Anti-competitive behaviour
Anti-competitive behaviour by ‘undertakings’ is prohibited under the Treaty on the Functioning of the European Union (TFEU) as well as by the Competition Act 1998. Both prohibit ‘undertakings’ from entering into anticompetitive agreements and abusing a dominant position. The TFEU prohibitions can be applied directly to UK businesses (and other entities subject to these prohibitions) by both the European Commission (through its Competition Directorate) and the Competition & Markets Authority (CMA).
Monitor (i.e. NHS Improvement) has concurrent powers with the CMA to enforce the Competition Act in the health sector. Anticompetitive behaviour by providers of NHS services is also prohibited under the terms of the provider licenses issued by Monitor, and anticompetitive behaviour by commissioners is prohibited under the Procurement, Patient Choice and Competition regulations.
Withdrawing from the EU (and thus the TFEU) still leaves the Competition Act in place, as well as Monitor’s provider licenses and the Procurement, Patient Choice and Competition regulations, each of which continue to prohibit anticompetitive behaviour by NHS providers and commissioners.
That said, it becomes easier to withdraw or modify these arrangements if the UK is no longer part of the EU, and wishes for policy reasons to remove the prohibition on anticompetitive behaviour from NHS organisations. This is because there would be greater freedom for UK competition law to diverge from its EU counterpart. For example, it would be possible to legislate to ensure that NHS organisations were not defined as ‘undertakings’ for the purposes of the Competition Act, while also rescinding the relevant parts of Monitor’s provider licenses and the Procurement, Patient Choice and Competition regulations.
Of course, if it remains policy to use market-based mechanisms and incentives in the NHS to encourage the provision of high quality services, then removing the prohibition on anticompetitive behaviour (just because EU withdrawal had made this easier) would make little sense.
Merger control
NHS mergers involving Foundation Trusts are regulated by the CMA, while mergers between NHS Trusts are reviewed by Monitor, which then provides advices on competition issues to the Trust Development Authority (a process now internalised within NHS Improvement).
EU-level merger control has not been an issue in NHS mergers to date as it only applies to very large transactions or those that involve operations in multiple European countries. As a result, leaving the EU will not, of itself, affect the regulation of NHS mergers.
State aid
EU rules on state aid, in essence, prohibit the provision of government assistance to one or more organisations that gives them an advantage over other organisations providing the same service. There are, however, limits on the applicability of this prohibition to healthcare services.
To date, the Government has not found the prohibition on illegal state aid a barrier to bailing out to NHS providers that are in deficit or to providing other selective allocations of money to NHS organisations (e.g. winter pressures money).
As a result, it is not clear that the removal of the state aid prohibition will have a significant impact on how NHS services, and providers of those services, are financed (other than removing the need for policy makers to make sure that their financing initiatives are state aid compliant). | https://aldwychpartners.co.uk/brexit-and-nhs-competition-and-procurement-rules/ |
Due to the existence of uncertainty in the structure of modelling, uncertainties play a major role in the dynamical processes. So, appearance of such uncertainties in the data is inevitable, and consequently, applying uncertain differential equations is a natural way to respond to the situations. Because of the presence of uncertainty, obtaining an exact solution for such systems is not applicable. For responding to this essential restriction, several numerical methods were applied to derive the approximate solutions. However, working with large systems need to be applied some adaptive approach like using machine learning algorithms.
Machine learning (ML) algorithms focus on separating hyperplane to maximizes the margin between two classes in this space. For real-world applications, the input of the system should be considered under uncertainty. For such restriction in comparison to the deterministic ML, we need to provide the membership with uncertainty to each input point of ML and reformulates ML into uncertain ML (FML). Using this realization, the ML algorithms will be more applicable, global minima of the original problem will be determined better, as well.
This special issue will provide a systematic overview and state-of-the-art research in the field of Intelligent Decision systems with machine learning applications and will outline new and important developments in fundamentals, approaches, models, methodologies, and applications in this area.
Specific topics of interest include (but are not limited to):
Manuscript Submission Information
All manuscripts must be submitted through the manuscripts system at https://www.editorialmanager.com/ijfs/default.aspx
Please select the designated special issue (SI) in the additional information Questionnaire (the fourth step).
A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. | https://research.com/special-issue/machine-learning-algorithms-under-uncertainty-real-world-systems |
What Is Shrimp Bisque?
Shrimp bisque is a thick, creamy soup that is generally eaten before the main course. It has a smooth consistency that is achieved by pureeing, and its ingredients usually include an alcoholic beverage such as white wine, sherry, or cognac. Other ingredients tend to include onions, bell peppers, and parsley. Flour and rice are used to thicken the soup and provide texture. Once it is finished and before it is served, the soup is usually garnished, often with homemade croutons or minced tarragon.
When shrimp bisque is made in the traditional manner, shrimp shells are used to make a stock, or flavored water, which is used as the base of the soup. Individuals who do not have access to shrimp shells may instead decide to use a concentrated version, which is commonly available from grocery stores. There are also a variety of vegetables used to make this soup, including scallions, tomatoes, and bell peppers. Carrots, celery, and onions are also commonly included.
With regard to cooking equipment, a person should have a skillet, a stockpot, and a blender or food processor. After the stock is prepared, ingredients such as bay leaves, celery, and onions are generally added to provide additional flavor. It is recommended that these be boiled for at least about 30 minutes. The rice will also need to be added at some point and boiled in the stock. When this is done depends on the type of rice that is used.
There are a variety of other ingredients that the preparer should have cut and ready to cook. These include bell peppers, scallions, and mushrooms. These vegetables are usually sauteed, and during that process, they may be sprinkled with flour. This will help to thicken the soup once the milk or cream is added, which is generally done at a slow pace when the vegetables begin to get tender. After this, the shrimp stock and pieces of shrimp will be added.
Once all of the ingredients are cooked, they need to be pureed to achieve the proper consistency. Shrimp bisque is commonly served with garnishes such as homemade croutons, minced herbs, and sour cream. The dish is often eaten before the main course. When shrimp bisque is served as a main course, it is often preceded with a salad or served with sandwiches or extra homemade croutons.
This dish is generally unsuitable for individuals with shellfish allergies. Even if shrimp and shrimp shells are omitted, concentrated stocks usually include some type of shrimp components that make them unsuitable for those with shellfish allergies. Individuals who are on certain diets also need to be careful due to the inclusion of ingredients such as butter, cream, and sour cream.
Readers Also Love
Discussion Comments
When I make shrimp bisque, I like to use shrimp that came from warm waters instead of the kind that came from cold water. I think it gives the recipe a sweeter, richer flavor.
I like to add celery to the vegetables that I put in my shrimp bisque recipe. I think its flavor and texture makes this dish more flavorful and also enhances the consistency.
Using red wine instead of white wine also makes a nice base for shrimp bisque. I like the bold flavor and the deep color that it provides. | https://www.wisegeek.com/what-is-shrimp-bisque.htm |
How AI is Starting to Influence Wireless Communications
Machine learning and deep learning technologies are promising an end-to-end optimization of wireless networks while they commoditize PHY and signal-processing designs and help overcome RF complexities What happens when artificial intelligence (AI) technology arrives on wireless channels? For a start, AI promises to address the design complexity of radio frequency (RF) systems by employing powerful machine learning algorithms and significantly improving RF parameters such as channel bandwidth, antenna sensitivity and spectrum monitoring. So far, engineering efforts have been made for smartening individual components in wireless networks via technologies like cognitive radio.
However, these piecemeal optimizations targeted at applications such as spectrum monitoring have been labor intensive, and they entail efforts to hand-engineer feature extraction and selection that often take months to design and deploy. On the other hand, AI manifestations like machine learning and deep learning can invoke data analysis to train radio signal types in a few hours. For instance, a trained deep neural network takes a few milliseconds to perform signal detection and classification as compared to traditional methodologies based on the iterative and algorithmic signal search and signal detection and classification. | https://aaaminds.com/20190608/how-ai-is-starting-to-influence-wireless-communications/ |
FIELD OF THE INVENTION
BACKGROUND OF THE INVENTION
SUMMARY OF THE INVENTION
BRIEF DESCRIPTION OF THE DRAWINGS
DETAILED DESCRIPTION OF THE PRESENT INVENTION
The present invention relates to equipment and methods for testing the electrical integrity of electrical circuits, and more particularly to equipment and methods for the non-contact electrical testing of printed circuit boards (“TCBs”), chip carriers and similar electrical circuits having conductors of various configurations.
Electrical circuits, such as PCBs and chip carriers, are generally tested after manufacture to determine whether or not all of the conductors and other electrically conductive elements in the circuit are in their designated positions and to ensure that they are not unintentionally cut, shorted or otherwise have an undesired continuity or lack thereof. The conductors of electrical circuits are normally interconnected to define nets.
Conventional methods and apparatus for electrically testing electrical circuits typically employ some kind of physical-contact with the nets. For example, in moving probe apparatus, a pair of probes may be physically moved by an X-Y mechanism into and out of contact with terminals of various nets. Because nets are tested sequentially by moving the probes from net to net, moving probe testing is a relatively slow method for electrically testing complicated electrical circuits.
Another method for electrically testing electrical circuits employs a so-called “bed-of-nails” testing fixture. A bed-of-nails fixture typically includes a large number of pins, which are positioned so that when a circuit to be tested is pressed thereagainst, the pins come into electrical contact with pads at the terminal ends of each net to establish electrical contact therewith. The conductivity of each net is subsequently measured. Although an electrical circuit can be tested much faster on an existing bed-of-nails fixture than by using a moving probe, bed-of-nails testing requires a dedicated fixture to be constructed for each electrical circuit configuration. As a result, bed-of-nails testing is, overall, a time consuming and costly solution.
Electrical testing methods which rely on physical contact with an electrical circuit to be tested, such as the moving probe and bed-of-nails methods described above, suffer from at least two additional fundamental disadvantages: First, as the size of pads at the terminal ends of conductors on electrical circuits decreases and their density increases, it becomes increasingly difficult to obtain adequate electrical contact therewith. Second, physical contact between conductor pads and the probes or pins may damage the pads.
To overcome these difficulties, a number of non-contact electrical testing methods have been proposed. One non-contact printed circuit board testing method is described in U.S. Pat. No. 5,218,294, issued to Soiferman. The patent describes stimulating a PCB under test with an AC signal through power and ground lines or layers, or in a non-contact manner by employing a near-field active antenna. The resulting stimulation generates an electromagnetic field which characterizes the PCB under test. The electromagnetic field proximate to the PCB under test is measured in a non-contact manner and compared to the electromagnetic field of a known faultless circuit board to determine whether the PCB under test is defective.
U.S. Pat. No. 5,517,110, also issued to Soiferman, describes non-contact stimulation of a PCB by a pair of stimulators located adjacent to the PCB on one side thereof A resulting electromagnetic field is detected using a sensor array located between the stimulators on the same side of the PCB.
U.S. Pat. No. 5,424,633, issued to Soiferman describes a spiral loop antenna useful in the electrical testing of PCBs, as well as electrical testing in which an electromagnetic field is applied to a first side of a PCB under test by a non contact stimulator and an array of non-contact sensors on an opposite side of the PCB is operative to measure an electromagnetic field that is characteristic of the PCB when stimulation is applied. This system is able to electrically test nets that have terminal points on opposite sides of a PCB and relatively thin PCBs that do not have internal metal layers.
The present invention seeks to provide improved methods and apparatus for non-contact electrical testing of electrical circuits such as PCBs. For the purpose of the description and claims which follow, an electrical circuit being tested is referred to as a “board under test” or “BUT”.
One aspect of a preferred embodiment of the present invention provides for the non-contact electrical testing of BUTs, such as PCBs, that have nets which begin and terminate on the same side thereof, and that have other nets which begin and terminate on opposite sides thereof.
Another aspect of a preferred embodiment of the present invention provides for the non-contact electrical testing of BUTs, such as PCBs, that have internal metal layers and conductors that cross through or between the metal layers.
In accordance with a preferred embodiment of the invention, non-contact electrical testing of BUTS, such as PCBs, that have nets which begin and terminate on the same side as well as nets which begin and terminate on opposite sides is performed generally simultaneously. One side of a BUT is stimulated with an AC electric field at a first frequency and the other side of the BUT is stimulated with an AC electric field at a second frequency. Potentials induced by the different frequency stimulation in conductors on the BUT are measured and separated according to frequency.
It is readily appreciated that by applying stimulation to both sides of the BUT that results in separable potentials that are identified with stimulation applied to one side or the other of BUT, the electric continuity in different types of conductors on a BUT can be tested simultaneously.
In accordance with a still further aspect of the present invention, a pattern of potentials on a BUT is analyzed and compared to a pattern characteristic of an electrical circuit known to be not defective.
There is thus provided in accordance with a preferred embodiment of the present invention an apparatus for electrical testing of an electrical circuit having first and second side surfaces and including a plurality of conductors, the apparatus including at least one stimulation electrode disposed adjacent at least one of the first and second side surfaces of the electrical circuit and being operative to apply thereto a stimulation electromagnetic field in a non-contact manner, at least one sensing electrode disposed adjacent at least one of the first and second side surfaces of the electrical circuit and being operative to sense a resulting electromagnetic field produced by application of the stimulation. electromagnetic field at various locations thereon in a non-contact manner, wherein at least one of the at least one simulation electrode and the at least one sensing electrode includes at least two electrodes at least one of which is disposed adjacent each of the first and second side surfaces of the electrical circuit.
Further in accordance with a preferred embodiment of the present invention the at least one stimulation electrode includes at least first and second simulation electrodes disposed adjacent respective ones of the first and second side surfaces of the electrical circuit.
Still further in accordance with a preferred embodiment of the present invention the at least one sensing electrode includes at least first and second sensing electrodes disposed adjacent respective ones of the first and second side surfaces of the electrical circuit.
Further in accordance with a preferred embodiment of the present invention there is provided at least one stimulation signal generator providing at least one stimulation signal to the at least one stimulation electrode.
Additionally in accordance with a preferred embodiment of the present invention the at least one stimulation signal generator provides stimulation signals to a plurality of stimulation electrodes in a manner such that signals induced in the electrical circuit by individual ones of the stimulation electrodes may be distinguished from each other, and preferably also includes at least one separating detector for receiving from the at least one sensing electrode signals induced in the electrical circuit by individual ones of the stimulation electrodes and distinguishes the signals from each other.
Additionally the apparatus for electrical testing of an electrical circuit also includes a signal analyzer operative to analyze at least one signal received from the at least one sensing electrode and a comparator receiving at least one signal derived from the resulting electromagnetic field and operative to compare the at least one signal with a reference.
Preferably the apparatus for electrical testing of an electrical circuit also includes a defect report generator providing a defect report relating to the electrical circuit based on the output of the comparator.
Additionally in accordance with a preferred embodiment of the present invention the at least one stimulation electrode includes first and second stimulation electrodes arranged to be disposed alongside a first side of the electrical circuit and a third stimulation electrode arranged to be disposed alongside a second side of the electrical circuit. Preferably the at least one sensing electrode includes a linear array of sensing electrodes.
Still further in accordance with a preferred embodiment of the present invention the linear array is disposed intermediate the first and second stimulation electrodes.
Additionally or alternatively the at least one stimulation electrode includes a linear array of stimulation electrodes.
Preferably the at least one sensing electrode includes first and second sensing electrodes arranged to be disposed alongside a first side of the electrical circuit and a third sensing electrode arranged to be disposed alongside a second side of the electrical circuit.
Further in accordance with a preferred embodiment of the present invention the at least one sensing electrode includes first and second sensing electrodes arranged to be disposed alongside a first side of the electrical circuit.
Still further in accordance with a preferred embodiment of the present invention the linear array is disposed intermediate the first and second stimulation electrodes.
Moreover in accordance with a preferred embodiment of the present invention the at least one signal generator provides signals having different frequencies to different ones of the stimulation electrodes, and the at least one signal generator provides multiplexed signals to different ones of the stimulation electrodes.
Preferably the at least one stimulation electrode includes a plurality of individually controllable sections.
There is also provided in accordance with a preferred embodiment of the present invention a method for electrical testing of an electrical circuit having first and second side surfaces and including a plurality of conductors, the method including the steps of applying an electromagnetic field in a non-contact manner to at least one of first and second side surfaces of the electrical circuit and sensing a resulting electromagnetic field in a non-contact manner at various locations along at least one of the first and second side surfaces of the electrical circuit, wherein at least one of the applying and sensing steps employs non-contact electrodes disposed along both the first and second side surfaces of the electrical circuit.
Further in accordance with a preferred embodiment of the present invention the applying step includes employing at least first and second simulation electrodes disposed adjacent respective ones of the first and second side surfaces of the electrical circuit to apply at least one electromagnetic field thereto.
Preferably the sensing step includes employing at least first and second sensing electrodes disposed adjacent respective ones of the first and second side surfaces of the electrical circuit to sense the resulting electromagnetic field.
Still further in accordance with a preferred embodiment of the present invention at least one stimulation signal and is generated and provided to at least one stimulation electrode.
Additionally in accordance with a preferred embodiment of the present invention the generating step includes providing stimulation signals to a plurality of stimulation electrodes in a manner such that signals induced in the electrical circuit by individual ones of the stimulation electrodes may be distinguished from each other. Additionally or alternatively the method also includes receiving signals induced in the electrical circuit by individual stimulation electrodes and distinguishing the signals from each other.
Preferably the method electrical testing of an electrical circuit also includes analyzing at least one signal induced in the electrical circuit,
Moreover according to a preferred embodiment, the present invention also includes receiving at least one signal derived from the resulting electromagnetic field and comparing the at least one signal with a reference. Preferably the step also includes providing a defect report relating to the electrical circuit based on the comparing step.
Additionally according to a preferred embodiment of the present invention the applying step employs first and second stimulation electrodes disposed alongside a first side of the electrical circuit and a third stimulation electrode disposed alongside a second side of the electrical circuit.
Still further according to a preferred embodiment of the present invention the sensing step employs a linear array of sensing electrodes. The linear array may also be disposed intermediate first and second stimulation electrodes.
Additionally according to a preferred embodiment of the present invention the applying step employs a linear array of stimulation electrodes. Furthermore the linear array is disposed intermediate first and second stimulation electrodes.
Preferably the sensing step employs first and second sensing electrodes disposed alongside a first side of the electrical circuit and a third sensing electrode disposed alongside a second side of the electrical circuit. Additionally or alternatively the sensing step employs first and second sensing electrodes disposed alongside a first side of the electrical circuit.
Preferably the method for electrical testing of an electrical circuit includes a generating step in which signals having different frequencies are provided to different ones of the stimulation electrodes. Additionally or alternatively the generating step includes providing multiplexed signals to different ones of the stimulation electrodes.
Still further in accordance with a preferred embodiment of the present invention the applying step employs at least one stimulation electrode including a plurality of individually controllable sections.
Additionally according to a preferred embodiment of the present invention also includes the step of grounding an intermediate metal layer in the electrical circuit.
Moreover in accordance with a preferred embodiment of the present invention the sensing step includes sensing potentials on one side of the electrical circuit and sensing potentials on the opposite side of the electrical circuit.
There is also provided in accordance with yet another preferred embodiment of the present invention a method for electrical testing of a multi-layered electrical circuit having first and second side surfaces and including a plurality of conductors, the method including the steps of grounding an intermediate metal layer in the electrical circuit, inducing potentials into at least some of the conductors of the electrical circuit, and sensing a resulting electromagnetic field in a non-contact manner at various locations along at least the first side surface thereof to obtain electromagnetic field data characteristic of the electrical circuit.
Further in accordance with a preferred embodiment of the present invention also includes sensing a resulting electromagnetic field at various locations along at least the second side surface thereof to obtain electromagnetic field data characteristic of the electrical circuit.
Still further in accordance with a preferred embodiment of the present invention the electromagnetic field data is for the potential in conductors including the electrical circuit. Furthermore, the inducing step may include inducing potentials on both a first side and a second side of the electrical circuit.
Additionally in accordance with a preferred embodiment of the present invention the inducing step includes inducing potentials on the first side of the electrical circuit which are differentiable from potentials induced on the second side of the circuit.
Moreover in accordance with a preferred embodiment of the present invention the inducing step includes inducing potentials which are differentiable by frequency.
Still further in accordance with a preferred embodiment, the present invention provides a method for electrical testing of a multi-layered electrical circuit wherein the inducing step includes inducing potentials which are multiplexed.
Moreover in accordance with a preferred embodiment of the present invention the sensing step includes sensing electromagnetic field data on one side of the electrical circuit. Preferably the sensing step further includes distinguishing the electromagnetic field resulting from potentials induced on the first side of the electrical circuit from the electromagnetic field resulting from potentials induced on the second side of the electrical circuit.
Further in accordance with a preferred embodiment of the present invention the inducing step includes inducing potentials on a first side of the electrical circuit.
Additionally or alternatively the inducing step employs a plurality of stimulators, and each stimulator induces potentials which are differentiable by frequency. Preferably the inducing step employs a plurality of stimulators, and each stimulator induces potentials which are multiplexed.
Additionally in accordance with a preferred embodiment of the present invention the sensing step employs at least a first sensor and a second sensor arranged along a first side of the electrical circuit. Preferably the sensing step additionally employs a third sensor located along a second side of the electrical circuit.
Moreover in accordance with a preferred embodiment of the present invention also includes correlating electromagnetic field data sensed by the sensors to a stimulator. Additionally or alternatively a preferred embodiment of the present invention also includes determining electrical continuity of at least some of the conductors by comparing the electromagnetic field data to reference electromagnetic field data characteristic of a desired electrical circuit.
Still further in accordance with a preferred embodiment of the present invention the inducing step is carried out in a non-contact manner.
There is further provided in accordance with a preferred embodiment of the present invention a method for electrical testing of a multi-layered electrical circuit having first and second side surfaces and including a plurality of conductors, the method including the steps of stimulating the electric circuit to induce in proximity thereto an electromagnetic field, acquiring electromagnetic field data in a non-contact manner at various locations along the first side surface, acquiring electromagnetic field data in a non-contact manner at various locations along the second side surface, and determining electrical continuity characteristics of the conductors by analysis of electromagnetic field data for the first side surface and by analysis of electromagnetic field data for the second side surface.
Preferably in the method for electrical testing of a preferred embodiment of the present invention, the analysis steps employs reference data which is characteristic of an electrical circuit having known structure.
Still further in accordance with a preferred embodiment of the present invention the electrical circuit is a multi-layered circuit which includes at least one intermediate layer which is substantially completely metalized, and the method includes grounding the at least one substantially completely metalized layer.
There is further provided in accordance with a preferred embodiment of the present invention a method for electrical testing of an electrical circuit having a plurality of electrically conductive elements, the method including the steps of applying a first electromagnetic field to the electrical circuit with at least one stimulator located near but not contacting the article on a first side thereof, applying a second electromagnetic field to the article at generally the same time as the first electromagnetic field with at least one stimulator located near but not contacting the article on a second side thereof, and separately detecting first and second potentials induced on the electrically conductive elements of the article by the first and second electromagnetic fields, respectively.
Further in accordance with a preferred embodiment of the present invention the first and second steps of applying an electromagnetic field include the steps of generating electromagnetic signals of first and second frequencies, respectively.
Still further in accordance with a preferred embodiment of the present invention the step or separately detecting includes the step of sensing the potentials with at least one sensor located near the first side of the article. Preferably the method further includes the step of scanning by at least one sensor.
Additionally according to a preferred embodiment of the present invention the step of scanning includes the step of scanning in a first scanning direction and followed by the step of scanning in a second scanning direction which is substantially perpendicular to the first scanning direction. Additionally or alternatively the step of scanning includes the step of scanning the article in a first position followed by the step of scanning the article in a second position which is upside-down from the first position.
Preferably the method further including step of grounding internal metal layers of the article.
There is also provided in accordance with a preferred embodiment of the present invention an apparatus for electrically testing an article having an electric circuit therein formed of a plurality of conductors, in which the apparatus includes (i) a first electromagnetic field generator applying a first electromagnetic field to the article, wherein the first field generator includes at least one stimulator located near but not in contact with a first side of the article, and (ii) a second electromagnetic field generator applying a second electromagnetic field to the article, wherein the second field generator includes at least one stimulator located near but not in contact with a second side of the article, wherein the second side is opposite the first side, and (iii) a sensor operative to separately detect first and second potentials induced on the conductors by the first and second electromagnetic fields, respectively.
Further in accordance with a preferred embodiment of the present invention the sensor includes an array of sensors adjacent to the at least one stimulator of the first field generator. Preferably the first field generator generates an electromagnetic field at a first frequency, and the second field generator generates an electromagnetic field at a second frequency. Additionally or alternatively in the apparatus for electrically testing an article, the first field generator includes a first stimulator and a second stimulator operative to generate the electromagnetic field.
Additionally according to a preferred embodiment of the present invention the first stimulator and second stimulator each generate a field which are 180 degrees out of phase with respect to each other. Preferably the stimulators are made of a plurality of strip-shaped elements.
Still further in accordance with a preferred embodiment of the present invention the strip-shaped elements extend obliquely relative to the array of sensors.
Additionally or alternatively at least one of the stimulators is made of a plurality of patch-shaped stimulators.
There is also provided in accordance with a preferred embodiment of the present invention a method for electrically testing an article having a plurality of conductors therein, which preferably includes the steps of subjecting a first side of the article to an electromagnetic field with at least one stimulator in close but not in contact arrangement with a first side of the article, scanning the side of the article in at least two partially orthogonal directions with a not in contact sensor, sensing potentials induced on the conductors by the electromagnetic field, and analyzing the potentials to determine the existence of defects in the elements.
Still further in accordance with a preferred embodiment of the present invention the method also includes the additional steps of subjecting a second side of the article to a second electromagnetic field with a second stimulator in close but not in contact arrangement with the second side, scanning the side of the article in at least two at least partially orthogonal directions with a not in contact sensor and sensing the induction of potentials induced on the elements by the second electromagnetic field, and analyzing the potentials induced by the second electromagnetic field to determine the existence of defects in the elements.
Additionally according to a preferred embodiment of the present invention the article is subjected to the first and second electromagnetic fields at generally the same time. Preferably the electromagnetic fields are propagated at different frequencies. Additionally or alternatively the article includes a metal layer, and the metal layer is grounded.
Moreover according to a preferred embodiment of the present invention the article is subjected to the first and second electromagnetic fields one after the other.
There is also provided in accordance with a preferred embodiment of the present invention a method for the electrical testing of an article having a plurality of electrically conductive elements and internal conductive layers, the method including the steps of subjecting the article to an electromagnetic field with at least one stimulator in close but not in contact arrangement with at least one side of the article, grounding the internal conductive layers of the article, scanning the at least one side of the article with a not in contact sensor and sensing the induction of potentials induced on the elements by the electromagnetic field, and analyzing the potentials to determine the existence of defects in the elements.
These and other features and advantages of the present invention will become apparent from the ensuing detailed description of the preferred embodiments, given by way of example only, when taken in conjunction with the drawings, in which:
FIG. 1
is a simplified pictorial illustration of non-contact electrical testing apparatus, constructed and operative in accordance with a first preferred embodiment of the present invention;
FIG. 2
FIG. 1
is a schematic cross-sectional illustration of a simplified BUT together with stimulators and sensors in accordance with a preferred embodiment of the present invention, taken along line II-II in ;
FIG. 3
FIG. 1
is a schematic circuit diagram of an exemplary circuit useful as part of a separating detector forming part of the hardware of ;
FIGS. 4A and 4B
are simplified illustrations of unbroken and broken conductors extending entirely along a first surface of a BUT in spatial registration with a diagrams of potentials sensed thereon;
FIGS. 5A and 5B
are simplified illustrations of unbroken and broken conductors extending entirely along a second surface of a BUT in spatial registration with diagrams of potentials sensed thereon;
FIGS. 6A-6D
are simplified illustrations of unbroken and broken conductors having a portion extending along a first surface of a BUT, a portion extending through intermediate parts thereof, and a portion extending along a second surface thereof, in spatial registration with diagrams of potentials sensed thereon;
FIGS. 7A-7D
FIGS. 6A-6D
are simplified illustrations of the unbroken and broken conductors shown in , but in upside-down testing orientation, in spatial registration with diagrams of potentials sensed thereon;
FIGS. 8A-8C
are simplified illustrations of unbroken and broken conductors having a portion extending along a first surface of a BUT, a portion extending through intermediate parts thereof, and another portion extending along the first surface thereof, in spatial registration with diagrams of potentials sensed thereon;
FIGS. 9A-9C
FIGS. 8A-8C
are simplified illustrations of the unbroken and broken conductors shown in , but in upside-down testing orientation, in spatial registration with diagrams of potentials sensed thereon;
FIGS. 10A-10B
are simplified illustrations of two non-shorted and two shorted conductors in spatial registration with diagrams of potentials sensed thereon;
FIGS. 11A-11B
FIGS. 10A-10B
are simplified illustrations of the two non-shorted and shorted conductors shown in but in upside-down testing orientation, in spatial registration with diagrams of potentials sensed thereon;
FIGS. 12 and 13
schematic illustrations of two alternative stimulator configurations;
FIG. 14
is a simplified pictorial illustration of non-contact electrical testing apparatus, constructed and operative in accordance with a second preferred embodiment of the present invention; and
FIG. 15
FIG. 14
is a schematic circuit diagram of an exemplary circuit useful as part of a separating detector forming part of the hardware of .
FIG. 1
10
12
13
Reference is now made to which is a schematic illustration of non-contact electrical testing apparatus, constructed and operative in accordance with a preferred embodiment of the present invention. Testing apparatus is operative to perform non-contact electrical testing of electrical circuits, such as are found on a BUT , having a multiplicity of electrical conductors . Although the present invention is generally described in the context of non-contact electrical testing of printed circuit boards, it is readily appreciated that the methods and apparatus disclosed herein are generally applicable to the non-contact electrical testing of other electrical circuits including, for example, chip carriers, ball grid array substrates, multi-chip modules, hybrid circuit substrates and printed circuit boards loaded with electronic components. Reference herein to BUTs shall be deemed to additionally refer to other suitable similar forms of electrical circuits.
10
14
16
12
18
14
16
20
20
12
22
24
25
14
16
14
16
25
In a preferred embodiment of the invention, testing apparatus includes two first side stimulators and disposed to be adjacent to a first side of a BUT and a first signal generator supplying first AC electrical stimulation signals to stimulator electrodes and , hereinafter referred to as stimulators. A second side stimulator electrode , hereinafter referred to as stimulator , is disposed to be adjacent to an opposite side of the BUT and a second signal generator provides second AC electrical stimulation signals thereto. An array of sensor electrodes , preferably comprising a plurality of individual sensors arranged along a line, is preferably disposed between stimulators and . Preferably, first side stimulators and and sensors are configured in as described in U.S. Pat. No. 5,517,110, incorporated herein by reference.
26
25
28
30
14
16
20
12
12
FIG. 1
A separating detector receives the outputs of each sensor and supplies them to a signal analyzer which outputs to a comparator and report generator . As used herein, the terms “first side stimulators” and and “second side stimulator” relate to their respective locations as shown in . It is readily appreciated by those skilled in the art that the important factor relating to the position of the stimulators is that the two sets of stimulators are on geometrically opposing sides of BUT . It is not of consequence which stimulators are above or below BUT .
18
22
18
14
16
1
22
20
2
18
14
16
Preferably, the AC signals provided by first generator and second generator respectively are different. For example, the AC signals provided by first generator to first side stimulators and are at a first frequency F while the AC signals provided by second generator for second side stimulator are at a second frequency F. Preferably, first signal generator provides signals to respective first side stimulators and which are equal in amplitude and 180° out of phase with respect to each other.
18
22
It is readily appreciated that instead of distinguishing the AC signals by frequency, the signals provided by first generator and second generator may be at the same frequency but distinguished from each other by suitable known signal separation techniques.
14
16
20
12
13
12
25
24
25
When energized by the AC electrical stimulation signals, first and second first side stimulators and and second side stimulator generate electromagnetic fields which stimulate BUT and induce measurable potentials on conductors of BUT . Each sensor in array senses the potential induced in the conductors. Preferably, the potentials are sensed by sensors by capacitive coupling. Alternatively any other suitable sensing technique may be employed.
14
16
12
Preferably, the AC electrical simulation signals have a frequency in the range of 10 KHz to 20 MHz, and more preferably about 1 MHz. First side stimulators and are preferably each as large as BUT and separated therefrom by an air gap typically 0.2 mm-2 mm, preferably as thin as possible due to mechanical limitations, or other suitable insulating layer.
12
20
12
24
14
16
12
20
24
14
16
12
24
In a preferred embodiment of the present invention, BUT and second side stimulator , which is preferably sufficiently large to underlie all of BUT , are moved linearly past sensor array and stimulators and . It is readily appreciated that alternatively BUT and stimulator may be held stationary while sensor array and stimulators and are moved. Other combinations may also be suitable to scan BUT with sensor array .
13
As is readily appreciated, the potentials induced in conductors are distinguishable from each other to the extent that the stimuli which induce these potentials are distinguishable from each other, for example by frequency or by multiplexing.
12
25
28
13
12
By employing information indicating potentials at various locations on BUT sensed by sensors , signal analyzer generates a precise representation characteristic of potentials in conductors on a BUT , which indicates, inter alia, conductor continuity and which includes information regarding shorts and breaks in conductors constituting defects.
28
30
34
13
12
28
32
FIG. 1
The representation provided by signal analyzer to comparator and report generator enables provision of a defect report indicating defective electrical continuity in conductors of BUT (), such as missing continuity where continuity is expected (opens and cuts in conductors) and excess continuity where not expected (shorts between conductors). The defect report preferably is generated by comparing the representation supplied by signal analyzer with a reference representing a non-defective printed circuit board having the same design.
FIG. 2
FIG. 1
13
12
14
16
20
25
12
40
42
40
13
Reference is now made to , which is a schematic cross-sectional illustration of a typical arrangement of conductors of a simplified BUT together with stimulators . and and sensors (). In the illustrated example BUT has a first surface and a second surface , opposite to first surface , and comprises several electrical conductors , including:
50
40
(I) a conductor located entirely along first surface ;
52
42
(II) a conductor located entirely along second surface ;
54
40
42
(III) a first metal plane located intermediate first and second surfaces and , which is preferably grounded during testing;
56
54
42
(IV) a second metal plane located intermediate first metal plane and second surface , which is preferably grounded during testing;
58
60
42
62
64
54
56
66
68
40
(V) a conductor , including a first portion extending along second surface and being connected through a plated via hole to a second portion located intermediate first metal plane and second metal plane , which is in turn connected through a plated via hole to a third portion , which extends along first surface ;
70
72
40
74
76
54
56
78
80
40
(VI) a conductor , including a first portion extending along first surface and being connected through a plated via hole to a second portion located intermediate first metal plane and second metal plane , which is in turn connected through a plated via hole to a third portion , which extends along first surface .
It is appreciated that the there may be only a single metal plane or a multiplicity of metal planes, for example grounding planes, power planes or shielding, in a BUT. Conventionally, metal layers are not grounded, so that when a BUT is stimulated, a complex pattern of superimposed potentials of the ungrounded metal layer and conductors is produced. However, if a metal layer separating the first and second surfaces of the BUT is grounded, a potential is not induced in the metal layer. Moreover, the metal layer normally isolates sensors from measuring potentials in conductors in a non-contact manner on those portions of the conductors which are situated across the grounded metal layer from the sensor.
FIGS. 4A-11B
FIG. 2
FIG. 2
14
16
54
40
50
58
70
20
56
42
52
58
As described in greater detail hereinbelow with reference to , first side stimulators and stimulate conductors having portions that extend above a first metal plane and along first surface adjacent thereto, such as conductors , and in . Similarly second side stimulator stimulates conductors having portions that extend below metal plane and along second surface , such as conductors and in . It is a particular feature of a preferred embodiment of the present invention that by stimulating on both sides of the BUT, all conductors having at least one portion that is not sandwiched between two internal metal layers are stimulated and potentials thereon are sensed.
25
40
54
25
25
42
12
25
42
56
56
54
56
54
FIG. 2
It is appreciated that sensors are able to sense potentials on conductor portions extending along first surface or therebelow down to grounded first metal plane . Sensors are not able to sense potential on other conductor portions. In general, the BUT is preferably grounded when performing electrical testing in various layers comprising a multi-layered BUT. Thus, normally following testing of a BUT in the orientation illustrated in , the BUT is turned upside down and tested again, with sensors adjacent second surface . When BUT is in this orientation, sensors are able to sense potentials on conductor portions extending along second surface or therebelow down to second metal plane . It is appreciated that potentials on conductor portions lying intermediate second metal plane and first metal plane normally cannot be sensed in a non contact manner when the second metal plane and first metal plane are grounded.
FIG. 2
FIG. 2
FIG. 1
12
It is also appreciated potentials on conductors which extend entirely in a direction perpendicular to the scanning direction indicated in may not be adequately sensed. For this reason, normally following testing of a BUT in the orientation illustrated in , the BUT is rotated by 90 degrees and tested again, such that all of the conductors are rotated by 90 degrees with respect to the scanning direction. It is thus appreciated that full testing of a BUT preferably involves four passes through the apparatus of .
FIG. 3
FIG. 1
FIG. 1
127
26
25
128
130
132
1
2
18
22
130
132
134
136
130
132
1
2
25
1
2
134
136
1
2
28
127
25
24
25
127
Reference is now made to , which is a schematic circuit diagram of a preferred embodiment of a separating circuit in separating detector (). An output from sensor is supplied to an amplifier , which outputs to first and second mixers and which receive respective frequency inputs F and F from signal generators and respectively (). The outputs of mixers and are supplied to respective low-pass filters (LPF) and , respectively. The outputs of the mixers and are DC voltages proportional to the amplitudes of the respective F or F frequency components of the output from sensor and a an undesirable AC out-band signal obtained as result from mixing of the components of the frequencies F and F. The LPFs and remove the undesirable AC signal portion and provide the resultant DC voltages, one relating to a signal of frequency F and the other relating to a signal of frequency F, to signal analyzer , preferably via an AID converter (not shown). Preferably, a separating circuit may be provided for each sensor in array , however, it is appreciated that signals from sensors may be multiplexed to a lesser number of separating circuits .
14
16
1
180
25
13
14
16
14
16
14
16
The first side stimulators and preferably generate signals of the same frequency F, but which are degrees out of phase with each other. The signal component at frequency F I sensed by sensor at any particular sampling location is the sum of the potentials induced in the conductors by stimulators and . The amplitude and phase of this signal component depends on the location of the conductors relative to the locations of the first side stimulators and . Alternatively, the first side stimulators and can be energized in-phase with each other.
FIG. 4A
FIG. 2
FIG.2
FIG. 2
FIG. 4A
25
40
12
50
40
14
16
20
90
40
42
12
Reference is now made to which shows electrical potentials, sensed by a sensor () lying above first surface of a BUT , induced in a typical conductor, such as conductor shown in , which extends along first surface , by an electromagnetic field generated by first side stimulators and and second side stimulator in the arrangement of . In , at least one grounded metal layer , such as a ground plane or a power plane, extends between first and second surfaces and of BUT .
FIG. 4A
FIG. 2
FIG. 2
50
100
14
16
25
50
14
16
102
50
20
50
25
includes a representation of conductor arranged in spatial registration with a first diagram of the potential thereon, induced by stimulators and and sensed by sensor , as a function of the position along conductor of the midpoint between stimulators and along the scanning direction shown in and a second diagram of the potential on conductor induced by stimulator as a function of the position along conductor of a sensor along the scanning direction shown in .
100
50
14
16
50
14
16
It is seen in diagram that as the conductor is scanned in the scanning direction by stimulators and operating in a 180 degree out of phase mode, the potential on the conductor induced by stimulators and goes quickly from a zero value up to a positive value +J and then decreases to a negative value −J, and thereafter returns quickly to zero. It is appreciated that in this and other diagrams hereinbelow, if the phase relationship of the stimulators is reversed then the order in which positive and negative values are obtained is also reversed.
102
50
25
40
50
20
50
20
40
20
42
90
It is also seen in diagram that as the conductor is scanned in the scanning direction by a sensor lying above first surface , the potential on the conductor induced by stimulator remains zero inasmuch as conductor is not stimulated by stimulator since it extends only along first surface , which is isolated from stimulator adjacent to second surface by at least one grounded metal layer .
50
FIG. 4A
It is appreciated that conductor shown in is continuous and has no breaks therealong.
FIG. 4B
FIG. 4A
FIG. 4B
FIG. 2
FIG. 2
FIG. 4B
150
50
150
40
12
14
16
20
190
40
42
12
Reference is now made to , which is identical to but relates to a conductor , identical to conductor , except in that it has a break at a location “i” therealong. shows electrical potentials induced in conductor , extending along first surface of a BUT in the environment of , by an electromagnetic field generated by first side stimulators and and second side stimulator in the arrangement of . In , at least one grounded metal layer , such as a ground plane or a power plane, extends between first and second surfaces and of BUT .
FIG. 4B
FIG. 2
FIG. 2
150
104
14
16
25
150
14
16
106
150
20
150
25
includes a representation of conductor arranged in spatial registration with a first diagram of the potential thereon induced by stimulators and and sensed by a sensor as a function of the position along conductor of the midpoint between stimulators and along the scanning direction shown in and a second diagram of the potential on conductor induced by stimulator as a function of the position along conductor of sensor along the scanning direction shown in .
150
14
16
150
14
16
150
14
16
150
150
50
It is seen that as the conductor is scanned in the scanning direction by stimulators and operating in a 180 degree out of phase mode, the potential on the conductor induced by stimulators and goes quickly from zero up to a positive value +J and then decreases to a negative value −J, and thereafter returns quickly to zero at location “i”. From location “i”, in the scanning direction, the potential on the conductor induced by stimulators and again goes quickly from zero up to a positive value +J and then decreases to a negative value −J and thereafter returns quickly to zero at the end of conductor . It is appreciated that there is a clear and measurable difference in the potential pattern produced in broken conductor as compared with that in continuous conductor .
106
150
25
150
20
150
20
40
42
190
150
20
150
It is also seen from diagram that as the conductor is scanned in the scanning direction by a sensor , the potential on the conductor induced by stimulator remains zero inasmuch as conductor is not stimulated by stimulator since it extends only along first surface which is isolated from second surface by at least one grounded metal layer . Thus inasmuch as conductor does not include any portion extending below grounded metal plane, the stimulator does not have any effect in detecting a break in conductor .
FIG. 5A
FIG. 2
FIG. 2
FIG. 2
25
40
52
42
12
14
16
20
Reference is now made to which shows potentials, sensed by a sensor () lying above first surface , induced in a typical conductor, such as conductor shown in , which extends along second surface of BUT , by an electromagnetic field generated by first side stimulators and and second side stimulator in the arrangement of .
FIG. 5A
200
40
42
12
In the embodiment of , at least one grounded metal layer , such as a ground plane or a power plane, extends between first and second surfaces and of BUT .
FIG. 5A
FIG. 2
FIG. 2
52
210
14
16
52
14
16
212
52
20
52
25
includes a representation of conductor arranged in spatial registration with a first diagram of the potential thereon induced by stimulators and as a function of the position along conductor of the midpoint between stimulators and along the scanning direction shown in and a second diagram of the potential on conductor induced by stimulator as a function of the position along conductor of sensor along the scanning direction shown in .
52
14
16
52
14
16
52
14
16
42
14
16
200
It is seen that as the conductor is scanned in the scanning direction by stimulators and operating in a 180 degree out of phase mode, the potential on the conductor induced by stimulators and is zero, inasmuch as conductor is not stimulated by stimulators and since it extends only along second surface , which is isolated from stimulators and by at least one grounded metal layer .
52
25
40
52
25
52
200
It is also seen that as the conductor is scanned in the scanning direction by sensor lying above first surface , the potential on the conductor as sensed by sensor remains zero inasmuch as conductor does not have any portion that extends above grounded metal layer .
FIG. 2
FIG. 4A
52
12
50
It is appreciated that in order for the system of to test a conductor such as conductor for continuity, BUT must be turned upside down and tested again, in which case its characteristics are the same as those of conductor shown in .
FIG. 5B
FIG. 5A
FIG. 5B
FIG. 2
FIG. 2
FIG. 5B
252
52
252
42
12
14
16
20
300
40
42
12
Reference is now made to , which is identical to but relates to a conductor , identical to conductor , except in that it has a break at a location “j” therealong. shows electrical potentials induced in conductor in the environment of , extending along first surface of BUT , by an electromagnetic field generated by first side stimulators and and second side stimulator in the arrangement of . In , at least one grounded metal layer , such as a ground plane or a power plane, extends between first and second surfaces and of BUT .
FIG. 5B
FIG. 2
FIG. 2
252
314
25
40
14
16
252
14
16
316
252
20
252
25
includes a representation of conductor arranged in spatial registration with a first diagram of the potential thereon, sensed by a sensor lying above first surface , induced by stimulators and as a function of the position along conductor of the midpoint between stimulators and along the scanning direction shown in and a second diagram of the potential on conductor induced by stimulator as a function of the position along conductor of sensor along the scanning direction shown in .
314
252
14
16
252
14
16
252
14
16
42
40
300
It is seen in diagram that as the conductor is scanned in the scanning direction by stimulators and operating in a 180 degree out of phase mode the potential on the conductor induced by stimulators and is zero, inasmuch as conductor is not stimulated by stimulators and since it extends only along second surface , which is isolated from first surface by at least one grounded metal layer .
316
252
25
40
252
25
252
300
It is also seen in diagram that as the conductor is scanned in the scanning direction by sensor lying above first surface , the potential on the conductor as sensed by sensor remains zero inasmuch as conductor does not have any portion that extends above grounded metal layer .
FIG. 2
FIG. 4B
252
12
52
It is appreciated that in order for the system of to test a conductor such as conductor for continuity, BUT must be turned upside down and tested again, in which case its characteristics are the same as those of conductor shown in .
FIG. 2
42
300
It is thus appreciated that the system of the embodiment of does not provide any information regarding breaks in conductors which lie entirely along second surface or entirely below grounded metal layer , unless the BUT is turned upside down and tested again.
FIG. 6A
FIG. 2
58
60
42
64
400
40
68
40
12
14
16
20
25
40
Reference is now made to which shows electrical potentials induced in a typical conductor, such as conductor which includes first portion which extends along second surface , second portion located intermediate a grounded metal layer and first surface , and third portion , which extends along first surface of BUT . The electrical potentials are induced by an electromagnetic field generated by first side stimulators and and second side stimulator in the arrangement of and are sensed by a sensor lying above first surface .
FIG. 6A
FIG. 2
FIG. 2
58
420
14
16
58
14
16
422
58
20
58
25
includes a representation of conductor , which does not have any breaks therealong, arranged in spatial registration with a first diagram of the potential thereon induced by stimulators and as a function of the position along conductor of the midpoint between stimulators and along the scanning direction shown in and a second diagram of the potential on conductor induced by stimulator as a function of the position along conductor of a sensor along the scanning direction shown in .
420
58
14
16
58
14
16
58
400
25
64
400
40
64
68
14
16
64
14
16
68
FIG. 2
It is seen in diagram that as the conductor is scanned in the scanning direction by stimulators and operating in a 180 degree out of phase mode, the potential on conductor induced by stimulators and initially remains at a zero value inasmuch as conductor extends below grounded metal layer . When sensor in the arrangement of reaches second portion , which extends above grounded metal layer but below first surface , the sensed potential goes quickly from a zero value up to a first positive value and then upon reaching the end of second portion decreases to a second positive value which is less than the first positive value. Upon reaching third portion , the sensed potential increases quickly to a third positive value, which is greater than the first positive value, and then goes to a negative value, the amplitude which is greater than the amplitude of the third positive value, and thereafter returns quickly to zero. It is appreciated that when the midpoint of the stimulators and is over second portion , the maximum strength of the potential sensed is less than the maximum strength of the potential sensed when the midpoint of the stimulators and is over third portion , thus contributing to the difference in relative amplitudes.
422
58
60
42
20
58
20
58
422
25
58
25
400
25
60
25
64
68
64
25
25
68
FIG. 2
Turning now to diagram , it is seen that inasmuch as conductor includes first portion which is located on second side adjacent to second side stimulator (), a potential is induced in conductor by stimulator along the entire length of conductor . As seen in diagram , because sensor only measures the potential induced on the conductor when the sensor is adjacent to those portions thereof which are above grounded metal layer , when sensor is over first section no potential is sensed. Potential is sensed when sensor is situated over second portion and over third portion , however because second portion is located at a relatively greater distance from sensor the amplitude of the sensed potential is less than the amplitude sensed when sensor is situated over third section .
FIG. 6B
FIG. 6A
FIG. 6B
FIGS. 2
FIG. 2
FIG. 2
458
58
458
458
460
42
464
500
40
468
40
14
16
20
458
25
40
Reference is now made to , which is identical to but relates to a conductor , identical to conductor , except in that it has a break at a location “i” therealong. shows electrical potentials induced in conductor in the environment of . Conductor includes a first portion which extends along second surface , a second portion located intermediate a grounded metal layer and first surface , and a third portion , which extends along first surface and has a break therein at location “i” as shown. An electromagnetic field is generated by first side stimulators and and second side stimulator in the arrangement of and electrical potential on conductor is sensed by sensor () which lies above first surface .
FIG. 6B
FIG. 2
FIG. 2
458
530
14
16
458
14
16
532
458
20
458
25
includes a representation of conductor arranged in spatial registration with a first diagram of the potential thereon induced by stimulators and as a function of the position along conductor of the midpoint between stimulators and along the scanning direction shown in and a second diagram of the potential on conductor induced by stimulator as a function of the position along conductor of a sensor along the scanning direction shown in .
530
458
14
16
458
14
16
458
500
25
464
500
464
468
458
14
16
458
FIG. 2
It is seen in diagram that as the conductor is scanned in the scanning direction by stimulators and operating in a 180 degree out of phase mode, the potential on the conductor induced by stimulators and remains at a zero value inasmuch as conductor extends below grounded metal layer . When sensor in the arrangement of reaches second portion , which extends above grounded metal layer , the sensed potential goes quickly from a zero value up to a first positive value and then at the end of second portion decreases to a second positive value, the value which is less than the first positive value. Upon reaching third portion , the sensed potential increases quickly to a third positive value, which is greater than the second positive value, and then goes to a negative value and thereafter returns quickly to zero at location “i”. From location “i”, in the scanning direction, the potential on the conductor induced by stimulators and goes quickly from zero up to a positive value and then decreases quickly to a negative value and there after returns quickly to zero at the end of conductor .
458
58
It is appreciated that there is a clear and measurable difference in the potential pattern produced in broken conductor as compared with that produced in continuous conductor .
532
458
460
42
20
458
532
25
458
500
25
460
25
464
468
468
458
500
FIG. 2
Turning now to diagram , it is see that inasmuch as conductor includes first portion which is located on second side adjacent to second side stimulator as shown in the arrangement of , a potential is induced in conductor along its length until break at location “k”. As seen in diagram , because sensor only senses the potential induced on the conductor when it is adjacent to the portions thereof which are above grounded metal layer , when sensor is situated over first section no potential is sensed. Potential is sensed when sensor is situated over second portion and over third portion until location “k”. Because of electrical discontinuity due to the break at location “k”, for the section of third portion following the break in the scanning direction, which is not connected to any portion of the conductor extending below grounded metal layer , no potential is induced.
FIG. 6C
FIG. 6A
FIG. 6C
FIG. 2
FIG. 2
FIG. 2
558
58
558
558
560
42
564
600
40
568
40
560
14
16
20
558
25
40
Reference is now made to , which is identical to but relates to a conductor , identical to conductor , except in that it has a break at a location “l” therealong. shows electrical potentials induced in conductor in the environment of . Conductor includes a first portion which extends along second surface , a second portion. located intermediate a grounded metal layer and first surface , and a third portion , which extends along first surface . First portion has a break therein as shown. An electromagnetic field is generated by first side stimulators and and second side stimulator in the arrangement of and electrical potential on conductor is sensed by sensor () which lies above first surface .
FIG. 6C
FIG. 2
FIG. 2
558
630
14
16
558
14
16
632
558
20
558
25
includes a representation of conductor arranged in spatial registration with a first diagram of the potential thereon induced by stimulators and as a function of the position along conductor of the midpoint between stimulators and along the scanning direction shown in and a second diagram of the potential on conductor induced by stimulator as a function of the position along conductor of a sensor along the scanning direction shown in .
630
558
14
16
558
14
16
558
600
25
564
600
40
564
568
560
600
560
564
568
FIG. 2
It is seen in diagram that as the conductor is scanned in the scanning direction by stimulators and operating in a 180 degree out of phase mode, the potential on the conductor induced by stimulators and remains at a zero value inasmuch as conductor extends below grounded metal layer , When sensor in the arrangement of reaches second portion , which extends above grounded metal layer but below first surface , the sensed potential goes quickly from a zero value up to a first positive value and then upon reaching the end of second portion the potential decreases to a second positive value which is less than the first positive value. Upon reaching third portion , the sensed potential increases quickly to a third positive value and then goes to a negative value, the amplitude which is greater than the amplitude of the third positive value, and thereafter returns quickly to zero. It is appreciated that because the break at location “l” is in first portion which lies below grounded metal layer , the only information about the presence of a break in first portion is provided by the amplitude of the potential sensed at the second and third portions and .
632
558
560
42
558
632
25
58
600
25
560
25
564
568
560
20
568
58
FIG. 2
Turning now to diagram , it is see that inasmuch as conductor includes first portion which is located on second side adjacent to second side stimulator as shown in the arrangement of , despite the break at location “l”, some potential is induced in conductor along its length from break until the end of the conductor. As seen in diagram , because sensor only measures the potential induced on the conductor when it is adjacent to those portions thereof which are above grounded metal layer , when sensor is situated over first section no potential is sensed. Potential is sensed when sensor is situated over second portion and third portion , however because of the break at location “i” reduces the effective size of first portion stimulated by stimulator , less potential is induced in conductor , as compared to the potential induced in corresponding unbroken conductor . It is appreciated that the difference may be small and difficult to measure.
FIG. 6D
FIG. 6A
FIG. 6D
FIG. 2
FIG. 2
FIG. 2
658
58
658
658
660
42
700
664
700
40
668
40
664
14
16
20
658
25
40
Reference is now made to , which is identical to but relates to a conductor , identical to conductor , except in that it has a break at a location “m” therealong. shows electrical potentials induced in conductor in the environment of . Conductor includes a first portion which extends along second surface below a grounded metal layer , a second portion located intermediate grounded metal layer and first surface , and a third portion , which extends along first surface . A break is shown at location “m” in second portion . An electromagnetic field is generated by first side stimulators and and second side stimulator in the arrangement of and electrical potential on conductor is sensed by sensor () which lies above first surface .
FIG. 6D
FIG. 2
FIG. 2
658
730
14
16
658
14
16
732
658
20
658
25
includes a representation of conductor arranged in spatial registration with a first diagram of the potential thereon induced by stimulators and as a function of the position along conductor of the midpoint between stimulators and along the scanning direction shown in and a second diagram of the potential on conductor induced by stimulator as a function of the position along conductor of a sensor along the scanning direction shown in .
730
658
14
16
658
14
16
660
658
700
25
664
700
664
668
658
FIG. 2
It is seen in diagram that as the conductor is scanned in the scanning direction by stimulators and operating in a 180 degree out of phase mode, the potential on the conductor induced by stimulators and remains at a zero value inasmuch as first portion of conductor extends below grounded metal layer . When sensor in the arrangement of reaches second portion , which extends above grounded metal layer , the sensed potential goes quickly from a zero value up to a relatively small first positive value decreases to a relatively small negative value the amplitude of which is generally the same as the first positive value quickly increases to 0 at the break at location m. From location “m” in the scanning direction, the sensed potential quickly increases to a second relatively small third positive value, and then decreases to a third positive value at the end of second portion . From the beginning of the third portion in the scanning direction, the sensed potential quickly increases to a fourth positive value, and decreases to a negative value, the amplitude of which is greater than the fourth positive value, and then quickly increases to zero at the end of conductor .
658
58
It is appreciated that there is a clear and measurable difference in the potential pattern produced in broken conductor as compared with the potential pattern produced in continuous conductor .
732
658
660
42
20
658
732
25
658
700
25
660
25
664
664
668
700
FIG. 2
FIG. 2
Turning now to diagram , it is seen that inasmuch as conductor includes first portion which is located on second side adjacent to second side stimulator as shown in the arrangement of , a potential is induced in conductor along its length until break at location “m”. As seen in diagram , because sensor only measures the potential induced on the conductor when the sensor is adjacent to those portions which are above grounded metal layer , when sensor is situated over first section no potential is sensed. Potential is sensed when sensor is situated over second portion until location “m”. Because of the electrical discontinuity due to the break at location “m”, for the second section of second portion in the environment of following the break at location “m” in the scanning direction and for third portion , neither of which have any part extending below grounded metal layer , no potential is induced.
658
58
It is appreciated that there is a clear and measurable difference in the potential pattern produced in broken conductor as compared with continuous conductor .
FIG. 7A
FIG. 6A
FIG. 2
58
12
25
42
12
Reference is now made to , which includes a representation of a conductor shown in in which BUT is turned upside down for additional testing. Sensor in the arrangement of now lie above second surface of BUT .
FIG. 7A
FIG. 6A
58
60
42
64
400
40
68
40
14
16
42
20
40
25
42
shows electrical potentials induced in conductor which, as indicated hereinabove with reference to , includes first portion which extends along second surface , second portion located intermediate grounded metal layer and first surface , and third portion , which extends along first surface . The electrical potentials are induced by an electromagnetic field generated by first side stimulators and , which now lie above second surface , and second side stimulator , which now lies below first surface , and are sensed by a sensor lying above first surface .
FIG. 7A
FIG. 2
FIG. 2
58
740
14
16
58
14
16
742
58
20
58
25
includes a representation of conductor , which does not have any breaks therealong, arranged in spatial registration with a first diagram of the potential thereon induced by stimulators and as a function of the position along conductor of the midpoint between stimulators and along the scanning direction shown in and a second diagram of the potential on conductor induced by stimulator as a function of the position along conductor of sensor along the scanning direction shown in .
740
58
14
16
58
14
16
60
64
68
400
It is seen in diagram that as the conductor is scanned in the scanning direction by stimulators and operating in a 180 degree out of phase mode, the potential on conductor induced by stimulators and goes quickly from a zero value to a positive value and then decreases to a negative value, of the same amplitude as the positive value, at the end of first portion , and quickly returns to a zero value. Inasmuch as second portion and third portion are below grounded metal layer , the potential remains at a zero value.
58
64
40
20
58
20
58
740
25
58
25
400
60
25
64
68
FIG. 2
As conductor includes third portion which is located on first side , now adjacent to second side stimulator as shown in the arrangement of , a potential is induced in conductor by stimulator along the entire length of conductor . As seen in diagram , because sensor only measures the potential induced on the conductor when the sensor is adjacent to those portions which are above grounded metal layer , a potential is sensed over first portion . When sensor is over second portion and third portion , no potential is sensed.
FIG. 7B
FIG. 6B
FIG. 2
458
25
42
Reference is now made to , which includes a representation of broken conductor shown in except that it is turned upside down for additional testing such that sensors in the arrangement of now lie above second surface .
FIG. 7B
FIG. 7A
FIG. 7A
458
58
458
460
42
464
500
40
468
40
12
468
14
16
42
20
40
25
42
shows the electrical potential induced in conductor which is identical to conductor in except that it includes a break at position “k”. As indicated hereinabove with reference to , conductor includes first portion which extends along second surface , second portion located intermediate a grounded metal layer and first surface , and third portion , which extends along first surface of BUT . The break at a location “k” is situated in third portion . The electrical potential is induced by an electromagnetic field generated by first side stimulators and , which now lie above second surface , and second side stimulator , which now lies below first surface , and are sensed by sensor lying above second surface .
FIG. 7B
FIG. 2
FIG. 2
458
744
14
16
458
14
16
746
458
20
458
25
includes a representation of conductor , arranged in spatial registration with a first diagram of the potential thereon induced by stimulators and as a function of the position along conductor of the midpoint between stimulators and along the scanning direction shown in and a second diagram of the potential on conductor induced by stimulator as a function of the position along conductor of sensor along the scanning direction shown in .
744
458
14
16
458
14
16
460
464
468
500
25
It is seen in diagram that as the conductor is scanned in the scanning direction by stimulators and operating in a 180 degree out of phase mode, the potential on the conductor induced by stimulators and goes quickly from a zero value to a positive value, decreases to a negative value, of the same amplitude as the positive value, and quickly returns to a zero value at the end of first portion . Inasmuch as second portion and third portion are below grounded metal layer , the potential of these portions sensed by sensor remains at a zero value.
746
458
464
600
468
40
20
458
20
458
68
FIG. 2
FIG. 7A
Turning now to diagram , it is seen that inasmuch as conductor includes second portion which is located beneath metal plane and third portion which is located on first side , now adjacent to second side stimulator as shown in the arrangement of , a potential is induced in conductor by stimulator along the entire length of conductor . However, because of the break at location “k”, the potential is somewhat reduced relative to the potential induced by unbroken third portion ().
746
25
458
500
460
25
464
468
20
FIG. 7A
FIG. 7B
As seen in diagram , because sensor only measures the potential induced on the conductor when the sensor is adjacent to those portions which are above grounded metal layer , a somewhat reduced potential is sensed over first portion , however when sensor is over second portion and third portion , no potential is sensed. It is appreciated that there may be only small differences in the potential induced by stimulator in the configurations of and respectively, and that it may be difficult to differentiate between these differences.
FIGS. 7A and 7B
458
58
20
It is appreciated that when tested in the “upside-down” orientation of the difference in the potential patterns produced in broken conductor as compared with the potential patterns induced in continuous conductor , namely the amplitude of the potential induced by stimulator , may be difficult to measure.
FIG. 7C
FIG. 6C
FIG. 2
558
25
42
12
Reference is now made to , which includes a representation of conductor shown in except that it is turned “upside-down” such that sensor in the arrangement of now lies above second surface of BUT .
FIG. 7C
FIG. 7A
FIG. 7A
558
58
1
558
560
42
564
600
40
568
40
560
14
16
42
20
40
25
42
shows the electrical potential induced in conductor which is identical to conductor in except that it includes a break at position “”. As indicated hereinabove with reference to , conductor includes a first portion which extends along second surface , a second portion located intermediate a grounded metal layer and first surface , and a third portion , which extends along first surface . A break at a location “l” is situated in first portion . The electrical potentials are induced by an electromagnetic field generated by first side stimulators and , which now lie above second surface , and by second side stimulator , which now lies below first surface , and are sensed by sensor lying above first surface .
FIG. 7C
FIG. 2
FIG. 2
558
748
14
16
558
14
16
750
558
20
558
25
includes a representation of conductor arranged in spatial registration with a first diagram of the potential thereon induced by stimulators and as a function of the position along conductor of the midpoint between stimulators and along the scanning direction shown in and a second diagram of the potential on conductor induced by stimulator as a function of the position along conductor of a sensor along the scanning direction shown in .
748
558
14
16
558
14
16
558
14
16
560
564
568
600
FIG. 2
It is seen in diagram that as the conductor is scanned in the scanning direction by stimulators and operating in a 180 degree out of phase mode, the potential on the conductor induced by stimulators and goes quickly from zero up to a first positive value and then decreases to a negative value the amplitude of which is the same as the first positive value, and thereafter returns quickly to zero at location “l”. From location “l”, in the scanning direction shown in , the potential on the conductor induced by stimulators and again goes quickly from zero up to the first positive value and then decreases to a negative value and thereafter returns quickly to zero at the end of first portion . Inasmuch as second portion and third portion are below grounded metal layer , the measured potential thereon remains at a zero value.
750
558
564
568
600
20
558
20
750
560
20
25
558
600
560
560
25
564
568
600
FIG. 2
FIG. 2
FIG. 2
Turning now to diagram , it is see that inasmuch as conductor includes second portion and a third portion which are beneath grounded metal layer , now adjacent to second side stimulator as shown in the arrangement of , a potential is induced in conductor by stimulator . However, as seen in diagram , because of a break at location “l”, from the beginning of first portion in the scanning direction of until the break at location “l”, no potential is induced by bottom stimulator . Because sensor only measures the potential induced on the conductor when adjacent to those portions which are above grounded metal layer , a potential is only sensed over first portion from the break at location “l” in the scanning direction of until the end of first portion . When sensor is over second portion and third portion , which are beneath grounded metal layer , no potential is sensed.
558
58
25
It is appreciated that there are a clear and measurable differences in the potential patterns produced in broken conductor as compared with the potential patterns produced in continuous conductor , as sensed by sensor .
FIG. 7D
FIG. 6D
FIG. 2
658
25
42
12
Reference is now made to , which includes a representation of conductor shown in except that it is turned “upside-down” such that sensor in the arrangement of now lies above second surface of BUT .
FIG. 7D
FIG. 7A
FIG. 7A
FIG. 2
FIG. 2
658
58
658
660
42
664
600
40
668
40
664
14
16
20
658
25
40
shows the electrical potential induced in conductor , which is identical to conductor in except that it includes a break at location “m”. As indicated hereinabove with reference to , conductor includes a first portion which extends along second surface , a second portion located intermediate a grounded metal layer and first surface , and a third portion , which extends along first surface . A break at a location “m” is shown in second portion . An electromagnetic field is generated by first side stimulators and and second side stimulator in the arrangement of and electrical potential on conductor is sensed by sensor () which lies above first surface .
FIG. 7D
FIG. 2
FIG. 2
658
752
14
16
658
14
16
754
658
20
658
25
includes a representation of conductor arranged in spatial registration with a first diagram of the potential thereon induced by stimulators and as a function of the position along conductor of the midpoint between stimulators and along the scanning direction shown in and a second diagram of the potential on conductor induced by stimulator as a function of the position along conductor of sensor along the scanning direction shown in .
752
658
14
16
658
14
16
660
664
668
600
It is seen in diagram that as the conductor is scanned in the scanning direction by stimulators and operating in a 180 degree out of phase mode, the potential on the conductor induced by stimulators and goes quickly from zero up to a first positive value and then decreases to a negative value, the amplitude of which is the same as the first positive value, and thereafter returns quickly to zero at the end of first portion . Inasmuch as second portion and third portion are below grounded metal layer , the measured potential remains at a zero value.
754
658
664
600
664
40
20
664
658
20
664
25
660
664
668
25
600
FIG. 2
FIG. 2
FIG. 2
Turning to diagram , it is seen that conductor includes second portion which is beneath metal plane and third portion which is located on first surface , now adjacent to second side stimulator as shown in the arrangement of . A break is shown at location “m” in second portion . A relatively small potential is induced in conductor by stimulator along the first section of second portion in the scanning direction of , and this relatively small potential is sensed by sensor when adjacent to first portion . A potential is also induced in the second section of second portion in the scanning direction shown in , and in third portion , however when sensor is over these portions, which are beneath grounded metal layer , no potential is sensed thereby.
658
658
58
20
FIG. 6D
FIG. 7D
FIG. 7A
It is appreciated that when conductor of is tested in the “upside-down” orientation of , the difference in the potential patterns produced in broken conductor as compared with the potential patterns produced in continuous conductor in the orientation of , namely the amplitude of the potential induced by stimulator , may be difficult to measure.
FIG. 8A
FIG. 2
770
772
40
776
800
42
780
40
12
14
16
20
25
40
Reference is now made to which shows electrical potentials induced in a typical conductor, such as a conductor which includes a first portion which extends along first surface , a second portion located intermediate a grounded metal layer and second surface , and a third portion , which extends along first surface of BUT . The electrical potentials are induced by an electromagnetic field generated by first side stimulators and and second side stimulator in the arrangement of and are sensed by sensor lying above first surface .
FIG. 8A
FIG. 2
FIG. 2
770
830
14
16
770
14
16
832
770
20
770
25
includes a representation of conductor , which does not have any breaks therealong, arranged in spatial registration with a first diagram of the potential thereon induced by stimulators and as a function of the position along conductor of the midpoint between stimulators and along the scanning direction shown in and a second diagram of the potential on conductor induced by stimulator as a function of the position along conductor of sensor along the scanning direction shown in .
830
770
14
16
770
14
16
772
772
776
800
25
776
It is seen in diagram that as the conductor is scanned in the scanning direction by stimulators and operating in a 180 degree out of phase mode, the potential on conductor induced by stimulators and quickly goes to a positive value at beginning of first portion and decreases to zero at the end of first portion . Inasmuch as second portion is beneath grounded metal layer , no potential is sensed while sensor is over second portion , and the potential value remains zero.
FIG. 2
25
780
780
Progressing in the scanning direction indicated in , as sensor reaches third portion , the potential decreases to a negative value and then goes to zero at the end of third portion .
832
770
776
800
20
770
20
770
832
25
770
25
800
25
772
780
776
800
25
776
12
FIG. 2
Turning to diagram , it is seen that inasmuch as conductor includes second portion which is located beneath grounded metal layer adjacent to second side stimulator as shown in the arrangement of , a relatively small potential is induced in conductor by stimulator along the entire length of conductor . As seen in diagram , because sensor only measures the potential induced on the conductor when sensor is adjacent to those portions which are above grounded metal layer , when sensor is over first portion and third portion , a relatively small potential is sensed. Inasmuch as second portion is situated beneath grounded metal layer , no potential is sensed when sensor is situated over second portion of BUT .
FIG. 8B
FIG. 8A
FIG. 85B
FIG. 2
FIG. 2
870
70
870
870
872
40
876
900
42
880
40
14
16
20
25
40
Reference is now made to , which is identical to but relates to a conductor , identical to conductor , except in that it has a break at a location “n” therealong. shows electrical potentials induced in conductor in the environment of . Conductor includes a first portion which extends along first surface , and has a break as shown, a second portion located intermediate a grounded metal layer and second surface , and a third portion , which extends along first surface . The electrical potentials are induced by an electromagnetic field generated by first side stimulators and and second side stimulator in the arrangement of and are sensed by sensor lying above first surface .
FIG. 8B
FIG. 2
FIG. 2
870
930
14
16
870
25
14
16
932
870
20
870
25
includes a representation of conductor arranged in spatial registration with a first diagram of the potential thereon induced by stimulators and as a function of the position along conductor of a sensor situated between stimulators and along the scanning direction shown in and a second diagram of the potential on conductor induced by stimulator as a function of the position along conductor of sensor along the scanning direction shown in .
930
870
14
16
870
14
16
870
872
876
900
25
776
880
880
FIG. 2
FIG. 2
It is seen in diagram that as the conductor is scanned in the scanning direction by stimulators and operating in a 180 degree out of phase mode, the potential on the conductor induced by stimulators and quickly goes to a first positive value, decreases to a negative value and returns to zero at the break at location “n”. From location “n” in the scanning direction indicated in , the potential on conductor quickly goes to a second positive value, and decreases to a third positive value and quickly returns to zero at the end of first portion . Inasmuch as second portion is beneath grounded metal layer , no potential is sensed while sensor is over second portion , and the potential value remains zero. At the beginning of third portion , in the scan direction of , the potential quickly goes to the third positive value, then decreases to a negative value and quickly increases to zero at the end of third portion .
932
870
876
900
20
870
20
870
880
832
872
25
870
900
25
872
880
876
900
25
876
12
FIG. 2
Turning to diagram , it is seen that inasmuch as conductor includes second portion which is located beneath grounded metal layer adjacent to second side stimulator as shown in the arrangement of , a relatively small potential is induced in conductor by stimulator along conductor from the break at location “n” until the end of third portion . As seen in diagram , because of the electrical discontinuity resulting from the break at location “n”, no potential is induced in first portion up to break at location “n” along the scanning direction. Sensor measures the potential induced on the conductor when it is adjacent to those portions which are above grounded metal layer . When sensor is over first portion , after location “n” in the scanning direction, and third portion , a relatively small potential is sensed. Inasmuch as second portion is situated beneath grounded metal layer , no potential is sensed when sensor is situated over second portion of BUT .
FIG. 8C
FIG. 8A
FIG. 8C
FIG. 2
FIG. 2
970
770
970
970
972
40
976
1000
42
980
40
14
16
20
25
40
Reference is now made to , which is identical to but relates to a conductor , identical to conductor , except in that it has a break at a location “o” therealong. shows electrical potentials induced in conductor in the environment of . Conductor includes a first portion which extends along first surface , a second portion located intermediate a grounded metal layer and second surface , and has a break at location “o” as shown, and a third portion , which extends along first surface . The electrical potentials are induced by an electromagnetic field generated by first side stimulators and and second side stimulator in the arrangement of and are sensed by sensor lying above first surface .
FIG. 8C
FIG. 2
FIG. 2
970
1030
14
16
970
14
16
1032
970
20
970
25
includes a representation of conductor arranged in spatial registration with a first diagram of the potential thereon induced by stimulators and as a function of the position along conductor of the midpoint between stimulators and along the scanning direction shown in and a second diagram of the potential on conductor induced by stimulator as a function of the position along conductor of a sensor along the scanning direction shown in .
1030
970
14
16
970
14
16
972
972
976
1000
25
976
25
980
980
980
FIG. 2
It is seen in diagram that as the conductor is scanned in the scanning direction by stimulators and operating in a 180 degree out of phase mode, the potential on the conductor induced by stimulators and quickly goes to a positive value at beginning of first portion , decreases to a negative value and quickly returns to zero at the end of first portion . Inasmuch as second portion is beneath grounded metal layer , no potential is sensed while sensor is over second portion , and the potential value remains zero. Progressing in the scanning direction indicated in , as sensor reaches third portion , the potential quickly goes to a positive value at beginning of third portion , decreases to a negative value and quickly returns to zero at the end of third portion .
1032
970
976
1000
20
970
20
1032
25
970
1000
25
972
980
976
1000
25
976
FIG. 2
Turning to diagram , it is see that inasmuch as conductor includes second portion which is located beneath grounded metal layer adjacent to second side stimulator as shown in the arrangement of , a relatively small potential is induced in conductor by stimulator along the conductor on either side of break at location “o”. As seen in diagram , because sensor only measures the potential induced on the conductor when the sensor is adjacent to those portions of the conductor which are above grounded metal layer , when sensor is over first portion and third portion , a relatively small potential is sensed. Inasmuch as second portion is situated beneath grounded metal layer , no potential is sensed when sensor is situated over second portion .
FIG. 9A
FIG. 8A
FIG. 2
770
12
25
42
12
Reference is now made to , which includes a representation of a conductor shown in in which BUT is turned “upside-down” for additional testing. Sensors in the arrangement of now lie above second surface of BUT .
FIG. 9A
FIG. 8A
770
772
40
776
800
42
780
40
12
14
16
42
20
40
25
42
shows electrical potentials induced in conductor which, as indicated hereinabove with reference to , includes first portion which extends along first surface , second portion located intermediate grounded metal layer and second surface , and third portion , which extends along first surface of BUT . The electrical potentials are induced by an electromagnetic field generated by first side stimulators and which now lie above second surface , and second side stimulator , which now lies below first surface , and are sensed by sensor lying above second surface .
FIG. 9A
FIG. 2
FIG. 2
770
1040
14
16
770
25
14
16
1042
770
20
770
25
includes a representation of conductor , which does not have any breaks therealong, arranged in spatial registration with a first diagram of the potential thereon induced by stimulators and as a function of the position along conductor of sensor situated between stimulators and along the scanning direction shown in and a second diagram of the potential on conductor induced by stimulator as a function of the position along conductor of sensor along the scanning direction shown in .
1040
770
14
16
772
800
770
25
772
25
776
776
770
776
776
42
780
780
800
It is seen in diagram that as the conductor is scanned in the scanning direction by stimulators and operating in a 180 degree out of phase mode, inasmuch as first portion is located beneath grounded metal layer , the potential on conductor sensed by sensor when it is above first portion is zero. When sensor reaches second portion the value for the potential sensed quickly goes to a positive value, decreases to a negative value and quickly returns to zero at the end of second portion . It is appreciated that potential induced in conductor and sensed when sensor is over second portion is attenuated because second portion is located below, and not on, second surface . From the beginning of third portion the sensed value for the potential is zero inasmuch as third portion is beneath the grounded metal layer .
1042
770
772
780
40
20
770
20
1042
25
770
800
776
776
42
25
772
780
800
FIG. 2
Turning to diagram , it is seen that inasmuch as conductor includes first portion and third portion located on first side , now adjacent to second side stimulator as shown in the arrangement of , a potential is induced in conductor by stimulator along its entire length. As seen in diagram , because sensor only measures the a potential induced on conductor when it is adjacent to those portions thereof which are above grounded metal layer , potential is sensed only over second portion , however this potential is relatively small because second portion is situated below, and not on, second surface . When sensor is over first portion and third portion , no potential is sensed because these portions are below grounded metal layer .
FIG. 9B
FIG. 8B
FIG. 2
870
25
42
12
Reference is now made to , which includes a representation of a conductor shown in except that it is turned “upside-down” such that sensors in the arrangement of now lie above second surface of BUT .
FIG. 9B
FIG. 9A
FIG. 9A
870
770
870
872
40
876
800
42
880
40
14
16
42
20
40
25
42
shows the electrical potential induced in conductor which is identical to conductor in except that it includes a break at position “n” therealong. As indicated hereinabove with reference to , conductor includes a first portion which extends along first surface and has a break therein at location “n” as shown, a second portion located intermediate grounded metal layer and second surface , and a third portion , which extends along first surface . The electrical potentials are induced by an electromagnetic field generated by first side stimulators and which now lie above second surface , and second side stimulator , which now lies below first surface , and are sensed by sensor lying above second surface .
FIG. 9B
FIG. 2
FIG. 2
870
1044
14
16
870
14
16
1046
870
20
870
25
includes a representation of conductor , arranged in spatial registration with a first diagram of the potential thereon induced by stimulators and as a function of the position along conductor of the midpoint between stimulators and along the scanning direction shown in and a second diagram of the potential on conductor induced by stimulator as a function of the position along conductor of sensor along the scanning direction shown in .
1044
870
14
16
872
800
870
25
872
25
876
876
870
876
876
42
880
It is seen in diagram that as the conductor is scanned in the scanning direction by stimulators and operating in a 180 degree out of phase mode, inasmuch as first portion is located beneath grounded metal layer , the potential on conductor sensed by sensor when it is above first portion is zero. When sensor reaches second portion the value for the potential sensed quickly goes to a positive value decreases to a negative value and quickly returns to zero at the end of second portion . It is appreciated that potential induced in conductor and sensed when sensor is over second portion is attenuated because second portion is located below, and not on, said second surface . From the beginning of third portion the sensed value for the potential is zero inasmuch as third portion is beneath the grounded metal layer.
1046
870
872
880
40
20
870
20
1046
25
870
800
876
876
42
872
870
25
872
880
800
FIG. 2
Turning now to diagram , it is seen that inasmuch as conductor includes first portion and third portion located on first side , now adjacent to second side stimulator as shown in the arrangement of , a potential is induced in conductor by stimulator . As seen in diagram , because sensor only measures the potential induced on conductor when adjacent to those portions which are above grounded metal layer , potential is sensed only over second portion , however this potential is relatively small because second portion is situated below, and not on, second surface , and is further attenuated because the length of first portion contributing to the potential on conductor is shortened due to break at location “n”. When sensor is over first portion and third portion , no potential is sensed because these portions are below grounded metal layer .
FIG. 9C
FIG. 8C
FIG. 2
970
25
42
12
Reference is now made to , which includes a representation of a conductor shown in except that it is turned “upside-down” such that sensor in the arrangement of now lies above second surface of BUT .
FIG. 9C
FIG. 9A
FIG. 9A
970
770
970
972
40
976
1000
42
980
40
14
16
42
20
40
25
42
shows the electrical potential induced in conductor which is identical to conductor in except that it includes a break at position “o”. As indicated hereinabove with reference to , conductor includes first portion which extends along first surface , second portion located intermediate grounded metal layer and second surface , and has break therein at location “o” as shown, and third portion , which extends along first surface . The electrical potentials are induced by an electromagnetic field generated by first side stimulators and which now lie above second surface , and second side stimulator , which now lies below first surface , and are sensed by sensor lying above second surface .
FIG. 9C
FIG. 2
FIG. 2
970
1048
14
16
970
14
16
1050
970
20
970
25
includes a representation of conductor arranged in spatial registration with a first diagram of the potential thereon induced by stimulators and as a function of the position along the conductor of the midpoint between stimulators and along the scanning direction shown in and a second diagram of the potential on conductor induced by stimulator as a function of the position along conductor of sensor along the scanning direction shown in .
1048
970
14
16
972
1000
970
25
972
25
976
976
980
980
1000
FIG. 2
It is seen in diagram that as the conductor is scanned in the scanning direction by stimulators and operating in a 180 degree out of phase mode, inasmuch as first portion is located beneath grounded metal layer , the potential on conductor sensed by sensor when the sensor is above first portion is zero. When sensor reaches second portion the value for the potential sensed quickly goes to a positive value decreases to a negative value and quickly returns to zero at the break at location “o”. From break at location “o” in the scanning direction as indicated in , the potential sensed quickly returns to a positive value, decreases to a negative value and quickly returns to zero at the end of second portion . From the beginning of third portion the sensed value for the potential is zero inasmuch as third portion is beneath the grounded metal layer .
1050
970
972
980
40
20
970
20
1050
25
970
1000
976
976
42
976
976
25
972
980
1000
FIG. 2
FIG. 2
Turning now to diagram , it is seen that inasmuch as conductor includes first portion and third portion located on first side , now adjacent to second side stimulator as shown in the arrangement of , a potential is induced in conductor by stimulator along either side of break at location “o”. As seen in diagram , because sensor only measures the potential induced on conductor when adjacent to those portions which are above grounded metal layer , the potential is sensed only over second portion , however this potential is relatively small because second portion is situated below, and not on, second surface . From the beginning of second portion in the direction indicated in , the potential sensed quickly increases to a first positive value and quickly decreases at location “o” of the break, and thereafter again quickly increases to a positive value and quickly returns to zero at the end of second portion . It is appreciated that the extent to which the potential patterns on either side of the break at location “o” are differentiable one from the other is a function of the size of the break. Inasmuch as sensor is over first portion and third portion , no potential is sensed because these portions are below grounded metal layer .
FIGS. 10A, 10B
FIG. 1
FIG. 2
11
11
1052
Reference is now made to , A and B which are illustrative of the operation of the apparatus of to detect shorts between conductors on a BUT in the environment shown in .
FIG. 10A
FIG. 2
FIG. 2
58
70
1058
1060
1042
1052
1062
1060
1064
1054
1056
1068
1040
1052
1070
1072
1040
1076
1054
1056
1078
1076
1080
1040
14
16
20
25
1040
Reference is now made to which shows electrical potentials induced in typical conductors, such as conductors and in . A conductor includes a first portion which extends along a second surface of BUT , a via hole connecting between first portion and a second portion , which is located intermediate grounded metal layers and , a third portion which extends along a first surface of BUT . A conductor includes a first portion which extends along first surface , a second portion located intermediate grounded metal layers and , a via hole connection between second portion and a third portion , which extends along first surface . The electrical potentials are induced by an electromagnetic field generated by first side stimulators and and second side stimulator in the arrangement of and are sensed by sensor lying above first surface .
FIG. 10A
FIG. 2
FIG. 2
1058
1070
1130
1058
1070
14
16
1058
1070
14
16
1132
1058
1070
20
25
includes a representation of conductors and which do not have any breaks therealong, and which are not mutually shorted, arranged in spatial registration with a first diagram of the potential on conductors and induced by stimulators and as a function of the position along conductors and of the midpoint between stimulators and along the scanning direction shown in and a second diagram of the potential on conductors and induced by stimulator as a function of the position along the conductors of sensor along the scanning direction shown in .
1130
1058
1070
14
16
1070
14
16
1072
1072
1076
1054
25
1076
25
1080
1080
1064
1058
1054
25
1068
1058
1068
FIG. 2
FIG. 2
It is seen in diagram that as conductors and are scanned in the scanning direction by stimulators and operating in a 180 degree out of phase mode, the potential on conductor induced by stimulators and quickly goes to a positive value at beginning of first portion and decreases to zero at the end of first portion . Inasmuch as second portion lies beneath grounded metal layer , no potential is sensed while sensor is over second portion , and the potential value remains zero. Progressing in the scanning direction indicated in , as sensor reaches third portion , the potential decreases from zero to a negative value and then quickly goes to zero at the end of third portion . Further progressing in the scanning direction of , inasmuch as second portion of conductor is beneath grounded metal layer , the zero value is maintained until sensor reaches third portion of conductor , at which point it quickly increases to a positive value, then decreases to a negative value and quickly increases to zero at the end of conductor .
1132
1060
1058
1070
1054
1056
20
1058
1132
Turning to diagram , it is see that inasmuch as only first portion of conductor and no portion of conductor is located beneath both grounded metal layers and , stimulator induces a potential only on conductor , as seen in diagram .
FIG. 10B
FIG. 10A
FIG. 10B
FIG. 2
1158
1170
1158
1158
1160
1042
1162
1160
1164
1154
1156
1168
1040
1170
1172
1040
1176
1154
1156
1178
1176
1180
1040
1158
1170
1162
1158
1178
1170
Reference is now made to , which is identical to except that conductors and are mutually shorted at location “s”. shows electrical potentials induced in conductor in the environment of . As noted above, conductor includes a first portion which extends along second surface , a via hole connecting between first portion and second portion which is located intermediate grounded metal layers and , and a third portion which extends along a first surface . Conductor includes a first portion which extends along first surface , a second portion located intermediate grounded metal layers and , a via hole connecting between second portion and third portion , which extends along first surface . Conductors and are shorted at location “s” between via hole of conductor and via hole of conductor .
14
16
20
25
1040
FIG. 2
The electrical potentials are induced by an electromagnetic field generated by first side stimulators and and second side stimulator in the arrangement of and are sensed by sensor lying above first surface .
FIG. 10B
FIG. 2
FIG. 2
1158
1170
1234
14
16
14
16
1236
1158
1170
20
25
includes a representation of conductors and which is arranged in spatial registration with a first diagram of the potential on the conductors induced by stimulators and as a function of the position along the conductors of the midpoint between stimulators and along the scanning direction shown in and a second diagram of the potential on conductors and induced by stimulator as a function of the position along the conductors of sensor along the scanning direction shown in .
FIG. 11A
FIG. 10A
FIG. 2
1058
1070
12
25
1042
1052
Reference is now made to , which includes a representation of conductors and shown in and in which BUT is turned “upside-down” for additional testing. Sensor in the arrangement of now lies above second surface of BUT .
FIG. 11A
FIG. 10A
FIG. 2
1058
1070
1058
1060
1042
1062
106
1064
1054
1056
1068
1040
1070
1072
1040
1076
1054
1056
1078
1076
1080
1040
14
16
20
25
1042
shows electrical potentials induced in conductors and . As indicated hereinabove with reference to , conductor includes first portion which extends along second surface , a via hole connecting between first portion and second portion , located between grounded metal planes and , and third portion which extends along first surface . Conductor includes first portion which extends along first surface , second portion located between grounded metal planes and and via hole connecting second portion and third portion , which extends along first surface . The electrical potentials are induced by an electromagnetic field generated by first side stimulators and and second side stimulator in the arrangement of and are sensed by a sensor lying above second surface .
FIG. 11A
FIG. 2
FIG. 2
1058
1070
1238
1058
1070
25
14
16
14
16
1240
1058
1070
20
25
includes a representation of non-broken and non-shorted conductors and , arranged in spatial registration with a first diagram of the potential on the conductors and , as sensed by sensor , induced by stimulators and as a function of the position along the conductors of the midpoint between stimulators and along the scanning direction shown in , and a second diagram of the potential on conductors and induced by stimulator as a function of the position along the conductors of sensor along the scanning direction shown in .
1238
1058
1070
14
16
1070
14
16
25
1060
1060
1064
1068
1058
1054
14
16
1064
1068
1070
1054
14
16
1052
It is seen in diagram that as conductors and are scanned in the scanning direction by stimulators and operating in a 180 degree out of phase mode, the potential on conductor induced by stimulators and , as measured by sensor , quickly goes to a positive value at beginning of first portion , decreases to a negative value, and at the end of first portion quickly increases to zero. It is seen that inasmuch as second portion and third portion of conductor , are situated below grounded metal layer , no potential is sensed with respect to potential induced by stimulators and when sensor is over second portion and third portion . It is also seen that inasmuch as conductor is situated entirely below grounded metal layer , it is not stimulated by stimulators and when BUT is tested in the “upside-down” orientation.
1240
1058
1068
1056
1058
20
1052
25
1060
20
25
1064
1068
1058
1054
25
1070
1054
1070
25
Turning now to diagram , it is seen that inasmuch as conductor includes third portion which is below grounded metal layer , conductor is stimulated by stimulator . When BUT is scanned in the scanning direction, when sensor is over first section the potential induced by stimulator is sensed by sensor . Inasmuch as second portion and third portion of conductor , are beneath grounded metal layer , sensor does not sense potentials when over these portions. Inasmuch as all of conductor is beneath grounded metal layer , the potential induced on conductor is not sensed by sensor .
FIG. 11B
FIG. 10B
FIG. 11A
FIG. 11B
FIG. 10B
FIG. 2
1052
1158
1170
1158
1160
1042
1162
1160
1164
1154
1156
1168
1040
1052
1170
1172
1040
1176
1154
1156
1178
1176
1180
1040
1162
1158
1178
1170
14
16
20
25
1042
Reference is now made to , which is identical to , but refers to testing of BUT in “upside-down” orientation for testing as shown in . shows electrical potentials induced in conductors and which are mutually shorted at location “t”. As indicated hereinabove with reference to , conductor includes first portion which extends along second surface , a via hole connecting between first portion and second portion , located between grounded metal planes and , and third portion which extends along first surface of BUT . Conductor includes first portion which extends along first surface , second portion located between grounded metal planes and , via hole connecting between second portion and third portion , which extends along first surface . A short exists between via hole of conductor and via hole of conductor at location “t”. The electrical potentials are induced by an electromagnetic field generated by first side stimulators and and second side stimulator in the arrangement of and are sensed by a sensor lying above second surface .
FIG. 11B
FIG. 2
FIG. 2
1158
1170
1242
14
16
14
16
1244
1158
1170
20
25
includes a representation of conductors and arranged in spatial registration with a first diagram of the potential thereon induced by stimulators and as a function of the position along the conductors of the midpoint between stimulators and along the scanning direction shown in and a second diagram of the potential on conductors and induced by stimulator as a function of the position along the conductors of a sensor along the scanning direction shown in .
1242
1158
1170
14
16
1158
14
16
25
1160
1160
1164
1168
1158
1156
14
16
1164
1168
1170
1154
14
16
1052
It is seen in diagram that as conductors and are scanned in the scanning direction by stimulators and operating in a 180 degree out of phase mode, the potential on conductor induced by stimulators and , as measured by sensor , quickly goes to a positive value at beginning of first portion , decreases to a negative value, and at the end of first portion quickly increases to zero. It is seen that inasmuch as second portion and third portion of conductor are situated below grounded metal layer , no potential is sensed with respect to potential induced by stimulators and when sensor is over second portion and third portion . It is also seen that inasmuch as conductor is situated entirely below grounded metal layer , it is not stimulated by stimulators and when BUT is tested in “upside-down” orientation.
1244
1158
1168
1154
1158
20
1052
25
1160
20
1164
1168
1158
1156
25
1170
1154
1170
25
Turning now to diagram , it is seen that inasmuch as conductor includes third portion , which is below grounded metal layer , conductor is stimulated by stimulator . As BUT is scanned along the scanning direction, when sensor is over first section the potential induced by stimulator is sensed. Inasmuch as second portion and third portion of conductor , are beneath grounded metal layer , sensor does not sense potentials when it is over these portions. Inasmuch, as all of conductor is beneath grounded metal layer , the potential induced on conductor is not sensed by sensor .
1054
1158
1170
1058
1070
1054
1158
1170
1058
1070
FIG. 10B
FIG. 10A
It is appreciated that when testing BUT in “upside-down” orientation, the potential patterns produced by shorted conductors and is substantially the same as the potential patterns produced by non-shorted conductors and . Thus in order to identify a short in the BUT , it is necessary to perform electrical testing in “right-side-up” orientation wherein, as seen in shorted conductors and are sensed to have a clear and different potential pattern as compared to non-shorted conductors and in .
It is generally appreciated that the foregoing examples of test results for various BUT configurations are not intended to encompass all testable BUT configurations and defects, but rather they are intended to provide illustrative examples of testing possibilities. Thus, in order to achieve fully robust non-contact electrical testing, such as electrical testing able to test for defects located in-between and across internal metal layers in BUTs, BUTs are preferably non-contact electrically tested using the aforementioned apparatus and methods by applying stimulation and sensing, including applying stimulation to the same side of the BUT from one or more sensors to induce potentials in the conductors; applying stimulation to the opposite side of the BUT from one or more sensors also to induce potentials in conductors, and applying stimulation and/or testing to both sides of the BUT simultaneously and/or sequentially. If, as is preferable, stimulation is applied simultaneously to both sides of the BUT, the stimulation is applied so as to induce potentials which, when the electromagnetic field in proximity to the BUT is sensed, it is possible to distinguish between potentials induced by stimulators adjacent to the first side of the BUT and potentials induced by stimulators adjacent to the second side of the BUT.
For example stimulators may be operated on both opposite sides of a BUT while the BUT is sensed by sensors on one or both sides thereof. Stimulation on opposite sides of a BUT may take place concurrently and/or sequentially. Stimulation on both sides of the BUT may be at different frequencies or multiplexed. The same or different sequence of stimulation may be used for testing a BUT in mutually “upside-down” orientations, and the BUT may be tested sequentially in substantially orthogonal directions.
The inventors have found that the present invention results not only in a time savings by preferably providing simultaneous performance of non-contact testing steps which previously could only have been performed sequentially, but additionally significantly increases the detectability of faults in BUTs and reduces false alarms.
One particular advantage of the present invention lies in the fact that by using sensors each of which simultaneously detects potentials induced by multiple, separable electromagnetic stimuli, the potential patterns generated are automatically spatially registered thus generally obviating the need for further spatial registration. As a result, distribution patterns of potentials received in respect of stimulation provided on the same side of the BUT as on which the potentials are sensed are easily correlated with distribution patterns of potentials received in respect of stimulation provided on the opposite side of the BUT from that on which the potentials are sensed.
FIGS. 12 and 13
FIGS. 12 and 13
FIG. 2
14
16
20
54
56
Reference is now made to , which are schematic illustrations of two alternative preferred configurations of first side stimulators and and second side stimulator . The configurations illustrated in are designed to reduce interference difficulties, such as capacitance interference as may be caused by conductors which cross through metal layers such as first metal layer and second metal layer ().
FIG. 12
FIG. 2
1310
1312
12
Referring to , it is seen that a stimulator is preferably sectioned into a plurality of mutually aligned linear stimulation strips , which are oriented perpendicular orientation to the scanning direction along which a BUT, such as BUT shown in , is scanned.
FIG. 13
FIG. 12
FIG. 13
1320
1322
1312
1310
1322
1320
1312
1322
Turning now to , a stimulator may be partitioned into a multiplicity of individual stimulator patches , each patch being a separate individually controllable antenna. As is readily appreciated, strips of stimulator , as shown in , and stimulation patches of stimulator as shown in are preferably provided with AC stimulation signals of different frequencies or multiplexed inputs, in order to enable separation of potentials induced by individual strips or patches respectively.
FIG. 14
FIG. 14
FIG. 1
Reference is now made to which is an alternative configuration of non-contact electrical testing apparatus constructed and operative in accordance with a preferred embodiment of the present invention. The apparatus of may be similar to that shown in and differs therefrom in the arrangement of the stimulators and the sensors.
FIG. 14
1410
12
13
1410
1414
1416
12
1417
1416
As seen in , there is provided testing apparatus , which is operative to perform non-contact electrical testing of electrical circuits, such as are found on BUT , having a multiplicity of electrical conductors . Testing apparatus comprises an array of stimulator electrodes , including a multiplicity of individually controlled stimulators linearly disposed adjacent to a first side of BUT . A signal generator supplies an electrical stimulation signal to each of the stimulators . Preferably the stimulation signals are at different frequencies, or multiplexed.
1418
1420
1414
12
1422
12
1418
1420
141
1420
1422
First side sensor electrodes, hereinafter referred to as sensors and are arranged on opposite sides of array to lie adjacent a first side of BUT . A second side sensor electrode, hereinafter referred to as sensor , is arranged to underlie BUT on a side thereof opposite first side sensors and . Each of the sensors , and is preferably at least as large as a BUT.
1426
1418
1420
1422
1428
1430
A separating detector receives the outputs of each sensor , and respectively, and supplies the outputs to a signal analyzer which outputs to a comparator and report generator .
1417
1416
1414
As noted hereinabove, the AC signals provided by signal generator to each stimulator in stimulator array are preferably different. This may be accomplished either by providing signals of different frequencies or alternatively by multiplexing or other known signal differentiation methods.
1416
12
1418
1420
1422
1426
When energized by the AC electrical stimulation signals, stimulators generate localized electromagnetic fields which stimulate various conductors on BUT . It is appreciated that each stimulator induces a characteristically different measurable potential. Sensors , and sense the different potentials and preferably output to the separating detector , which is operative to separate out each of the potentials.
12
1422
1414
1418
1420
12
1422
1414
1418
1420
12
1414
In a preferred embodiment of the present invention, BUT and second side sensor are moved linearly past stimulator array and sensors and . It is readily appreciated that alternatively BUT and sensor may be held stationary while stimulator array and sensors and are moved. Other combinations may also be suitable to scan BUT with stimulator array .
FIG. 1
12
1418
1420
1422
1428
13
12
As in the apparatus described with respect to , by employing information indicating potentials at various locations on BUT sensed by sensors , and , signal analyzer generates a precise representation characteristic of potentials in conductors on BUT , which indicates, inter alia, conductor continuity and which includes information regarding shorts and breaks in conductors, which constitute defects.
1428
1430
1431
13
12
The representation provided by signal analyzer to comparator and report generator enables provision of a defect report indicating defective electrical continuity in conductors of BUT .
FIG. 15
FIG. 14
1440
1426
1418
1420
1442
1444
1446
Turning now to , there is shown a schematic circuit diagram of a preferred embodiment of a separating circuitry useful in separating detector (). Outputs from each of top side sensors and are supplied to first and second amplifiers and respectively, which are input into a differential amplifier .
1446
1448
1417
1450
1450
12
1418
1420
1418
1420
1416
The output of differential amplifier is provided to a mixer which also receives a signal input from signal generator and outputs to a low-pass filter (LPF) , operative to remove undesirable AC out-band signal portions. The output of LPF is a DC voltage representative of the potential sensed on BUT by a sensor or at a predetermined frequency, which is proportional to the relative amplitude of the signal input components input from sensor and respectively, each frequency being correlated to a given one of stimulators , thereby to provide spatial information.
1422
1452
1454
1417
1454
1456
1456
12
1422
An output from bottom side sensor is supplied to an amplifier which outputs to a mixer , which also receives a signal input from signal generator . The output of mixer is provided to a low-pass filter (LPF) , operative to remove undesirable AC out-band signal portions. The output of LPF is a DC voltage representative of the amplitude of the signal input of a potential at a predetermined frequency sensed on BUT by sensor .
1416
12
1416
It is readily appreciated that separate circuits may be provided for each of the frequencies at which stimulators stimulate BUT , or a lesser number of circuits may be employed, in which event multiplexing of signals to sensors is required.
It will be appreciated by persons skilled in the art that the present invention is not limited by what has been specifically described hereinabove. Rather the scope of the present invention includes both combinations and subcombinations of various features described hereinabove as well as modifications and variations thereof which would occur to a person skilled in the art upon reading the foregoing description and which are not in the prior art. | |
In a lengthy statement released Friday afternoon, Oakland Mayor Libby Schaaf pushed back against a news report suggesting that she is reversing a long-standing position against using taxpayer money to build a new stadium for the Raiders.
The
San Francisco Chronicle
reported
on Friday that Schaaf’s presentation earlier this week to National Football League owners included a proposal for the city examine the possibility of using lease revenue bonds to help pay for a stadium. The news report also noted that Schaaf is considering the use of tax increment proceeds as a stadium financing tool.
In the past, Schaaf has consistently ruled out helping the Raiders build a new stadium on the public’s dime, although she has pledged up to $120 million for improving the infrastructure surrounding the future stadium.
“Since I took office I have been nothing but clear about how I believe Oakland can responsibly keep its sports teams without publicly subsidizing stadium construction. My position is unchanged. The
San Francisco Chronicle
’s suggestion that I would be willing to put public money at risk is simply not true,” said Schaaf in a 685-word statement.
“I am focused on responsibly keeping our teams in Oakland, which is why I am also open to exploring the use of dollars that could be created by a new project — money that the City would not otherwise have. I think that it would be appropriate to pledge money that is created by the Raiders for the Raiders so long as it can be done without ever putting the taxpayers at risk. But that’s it. I will not recreate the mistakes of the past in Oakland.”
Much of Schaaf’s statement, however, does not actually contradict to the
Chronicle
’s report, which noted that she believes that various funding mechanisms could be crafted without jeopardizing public money. Instead, the mayor’s strong reaction may have more to do with the story's online headline: “Oakland Mayor Schaaf toots a new tune: a publicly funded stadium.” A sports economist in the article also asserts that bonding for the project puts the city’s treasury at risk.
Numerous media reports described Schaaf’s presentation in New York City on Wednesday as effective. NFL owners are expected to decide by early next year whether the Raiders, the San Diego Chargers, and/or the St. Louis Rams will be allowed to move to Los Angeles.
Oakland, though, was the only city of the three that did not present a detailed public financing proposal to the league this week. Instead, Schaaf portrayed the East Bay market as a growing economic engine and one that could prosper in a region that the Raiders no longer share with the San Francisco 49ers, because of that team’s move to the South Bay last season.
There was also movement this week on a possible new facility for the Oakland A’s. While in New York City, Schaaf reportedly met with Major League Baseball Commissioner Rob Manfred to discuss a new ballpark for the team in Oakland. Also, on Friday, the
Oakland Tribune
reported
that A’s ownership is eyeing locations in Oakland other than the Coliseum complex. The news will likely reignite hopes for bringing the team downtown or possibly to waterfront property just north of Jack London Square known as the Howard Terminal. Schaaf supports a move downtown and it has been the city’s preferred location going back to former Mayor Jean Quan.
Prev
Next
Everyday Artisanal
Filibusted
The Long Road
Sheriff and DA Challenged
Care Is on the Menu
Top Stories
Advertisement: | https://m.eastbayexpress.com/oakland/schaaf-im-not-proposing-to-put-taxpayers-money-at-risk-with-raiders-stadium/Content?oid=4576496 |
There are 263 calories in 1 serving of Spicy Beef with Shrimp & Bok Choy.
Calorie split: 36% fat, 21% carbs, 44% protein.
|Serving Size||1 serving|
|
|
Beef Bok Choy Stir Fry
Tasty, low-sugar dish.
Per serve - Energy: 273kcal | Carb: 11.86g | Prot: 22.38g | Fat: 16.87g
|
|
Stir Fry Shrimp
A tasty seafood dish that's ready in less than 30 minutes.
Per serve - Energy: 179kcal | Carb: 2.25g | Prot: 17.41g | Fat: 11.46g
|
|
Stir Fry Sirloin Steak
A low-cholesterol, meat dish that's easy to prepare.
Per serve - Energy: 115kcal | Carb: 10.45g | Prot: 6.15g | Fat: 6.22g
|
|
Sausage and Shrimp Gumbo
A classic, flavorful Cajun dish.
Per serve - Energy: 274kcal | Carb: 35.05g | Prot: 9.51g | Fat: 10.75g
|
|
Shrimp Noodle Soup
A low-fat dish that's bursting with unique flavors.
Per serve - Energy: 214kcal | Carb: 31.26g | Prot: 19.32g | Fat: 1.90g
|
|
Seafood Salad
Shrimp and crab salad suitable for mixing with pasta, on roll or crackers. Can also be used as a dip. | https://mobile.fatsecret.com/recipes/spicy-beef-with-shrimp-and-bok-choy/Default.aspx |
The main drivers and barriers identified in the EPoSS SRA are also addressed in the analysed documents:
- Drivers: “Increased functionality” is addressed in the EPoSS SRA as the main driver for Smart Systems. This corresponds with the identified application opportunities and technology challenges links, which demand new functional materials, cognitive capabilities and human-worker interaction for Smart Systems.
- Barriers: in the EPoSS SRA, “fragmented supply chain” appears to be the most obstructive difficulty. This corresponds with what was found in the analysed documents, showing manufacturing capabilities and supply chains as missing capabilities for a reasonably priced mass production of diverse materials, and to manufacture the first batches of products.
This reinforces the actions claimed in the EPoSS SRA that should be complemented with additional actions on:
- Positioning EPoSS as a key actor for collaboration regarding Smart Systems Integration.
- Building collaboration streams with other more application oriented (sectoral) ETPs, defining collaborative programs with user, societal, and advanced manufacturing needs as “pull” forces to foster innovation based on smartness of new technology.
- Fostering the urgent definition of interoperability standards, protocols, and interfaces.
Regarding research priorities, priority and long term actions identified in the EPoSS SRA match with the application opportunities identified in the links. Obviously, as the spectrum of analysed ETPs was very wide, there would be more actions that should be added. Nevertheless, it would require a prior collaboration task between platforms as suggested in “Drivers and barriers”, in order to agree on common priorities. Additionally, a new level of technology challenges was identified that is closer to KETs. This new level set some more basic technology challenges. These should be aligned with application opportunities related actions, and an adequate time-phased prioritisation should be agreed in collaboration between the corresponding platforms.
There is also a match between the technology challenges derived from the links identified in the analysed documents and the resulting benefits that can be obtained by meeting them. Three main benefits were identified in the EPoSS SRA: Miniaturised and networked sensors; Smart tooling; Smart processes and products. This corresponds with the main technology challenges derived from links:
- Micro-nano technologies looking for miniaturisation.
- Sensors for analytical purposes and equipment condition monitoring.
- Control/Actuators oriented to medical devices and drug delivery mechanisms.
- Power technologies to enable autonomous smarts systems.
- Interfaces and communications for interaction with users, cooperative devices and data exchange.
- Cognition to implement intelligent manufacturing.
Augmented Information
The following table highlights (yello) the European Technology Platforms (ETPs) involved in this sector and for which the integration of Smart Systems does represent a potential benefit and competitive advantage. It provides also access to the results of analysis of opportunities, drivers & barriers as well as technical/research challenges for the specific sector. | https://www.express-ca.eu/public/ecosystem-knowledge-gateway/application-sectors/smart-systems-for-manufacturing-factory-automation-1/Augmented%20-%20Production%20and%20processes/smart-systems-for-production-and-processes-augmented-information |
What is a Veterinary Specialist?
A veterinary specialist is a highly trained veterinarian who is board certified and has completed advanced training in various veterinary medical or surgical disciplines.
To be qualified as a veterinary specialist, they must have completed at least four years at a veterinary school, a one-year internship or equivalent time in practice, two to three years in a residency program that meets the standards of a recognised specialty college or board, publish at least one paper and pass a series of rigorous examinations. Not all vets with a ‘special interest’ have completed this training.
Most veterinary specialists work at large hospitals or referral centres with access to state-of-the-art facilities and equipment, advanced training, support staff and other veterinary specialists.
Veterinary specialists are often leading in veterinary research, clinical trials, diagnostic imaging and treatment options while also provide education to veterinary students and the veterinary community.
At U-Vet we have specialists in small animal medicine, small animal surgery, neurology, oncology, diagnostic imaging, anaesthesia, emergency and critical care, clinical pathology, equine surgery, equine medicine and equine sports medicine. We also have visiting ophthalmologists, cardiologists and dermatologists.
Do you need to see a veterinary specialist?
Similar to the human health care industry, where you may be referred to a medical specialist by general practitioner, in the veterinary industry, animal conditions would usually be evaluated by a general practice (primary care) veterinarian. Your general practice veterinarian may then refer the animal to a veterinary specialist, if the advanced care and procedures are required. The veterinary specialist will work closely with you and the general practice veterinarian to ensure best quality of care. | https://www.u-vet.com.au/news/what-is-a-veterinary-specialist |
The utility model discloses a friction temperature rise testing device for safety tongs. The friction temperature rise testing device comprises a guide rail circular ring device and a safety tongs device, the guide rail circular ring device comprises a guide rail circular ring and a driving motor used for driving the guide rail circular ring to rotate. The safety tongs device comprises a tongs block used for abutting against the guide rail circular ring, a sliding assembly used for installing the tongs block and a power system used for driving the tongs block to slide. And a pressure sensor and a temperature sensor are arranged on the clamp block. According to the utility model, equivalent or efficient simulation can be carried out on the initial braking speed of the safety tongs, the initial kinetic energy of the elevator car and the action of the gravity of the car, so that the problems of high cost, high test difficulty and test hidden danger caused by the actual test of a safety tongs system are avoided. | |
By Scott Hamilton, President, Hamilton Resource Economics
Environmentally, the San Joaquin Valley is very different from what it was 170 years ago. And during that time, the Valley landscape has been evolving. The Valley floor originally consisted of a number of diverse ecosystems: grasslands, oak woodlands, alkali desert scrub, wetlands, a number of lakes, and riparian habitats. The period of the early Mexican ranchos (1830s-1850s) was an era dominated by cattle grazing. By the late 1800s, the Valley was transformed into fields of wheat, barley and hay. Beginning in the 1950s cotton became dominant, and while fruit had always been present, vineyard and tree crops acreage expanded greatly since 1990. As a result, major changes to the valley ecosystems occurred, particularly with the construction of large dams on the eastside rivers in the mid 1900s. Before the construction of those dams, the rivers expanded and contracted with the seasons supporting a variety of ephemeral and unique habitats, hundreds of miles of riparian habitat and millions of acres of wetlands. The development of a vast water infrastructure has supported expansive agricultural and urban development and caused the repurposing of large swaths of natural lands.
The conversion of row crop land to orchards and vineyards required nearly double the water use and resulted in an unsustainable level of groundwater pumping. That led to the advent of the Sustainable Groundwater Management Act (SGMA) passed by the California legislature in 2014. The Act mandates groundwater sustainability by 2040 for most of the Valley.
As water district managers scramble to capture every last drop of water, the reality has set in that there is simply not enough water available in the Valley to sustain the current level of agricultural production. The Water Blueprint for the San Joaquin Valley (WaterBlueprintCA.com) is working to bring additional sources of water into the Valley to sustain communities, agriculture and the environment, but the new sources of water will not be cheap, and land conversion will be needed to increase the capacity to recharge aquifers. It is inevitable that some agricultural land will come out of production. How much is not yet clear, but the number will certainly be in the tens of thousands, and maybe hundreds of thousands of acres.
A number of efforts are underway to facilitate that process and minimize the ensuing hardship, primarily by buying land at fair market value from willing sellers. But then what will happen to that land? SGMA necessarily will create a major transition in the Valley. Within that transition is an opportunity.
Without some organized plan, land fallowing that occurs randomly could result in increased dust, weeds and pests with little ecological benefit. But with thoughtful planning and the right structure, it is possible to develop an environmental vision for the Valley–one that restores lost ecosystems, adds biodiversity and makes the Valley a better place for animals and people alike. A number of organizations have been giving thought to that vision. Among them are the Central Valley Joint Venture, the San Joaquin Valley Greenprint, the Central Valley Landscape Conservation Project, and the Endangered Species Recovery Program at CSU Stanislaus. Regionally, the Tulare Lake Watershed Partnership is doing impressive work, River Partners is working on floodplain restoration in the northern Valley and the Nature Conservancy is working on a number of projects including recovery of upland species.
While individual restoration projects can provide targeted benefits, ecologists also see the need for connectivity–core areas of different habitat types and establishment of corridors that connect them to preserve species and their genetic diversity. Dr Patrick Huber, at UC Davis, started his work on this over a decade ago (Figure 1). If the ultimate plan calls for core areas and connecting corridors, what should these areas be restored to? Frequently the easiest path to restoration is reversion to an historical state: the system of grasslands, woodlands, wetlands and other ecosystems that existed historically on the Valley Floor (Figure 2). Agreement is needed on how these fundamental concepts can be used to prevent what otherwise might be haphazard land retirement and instead develop a plan with real environmental benefits.
The Valley is likely going through its biggest change in 60 years. Land repurposing is inevitable, but by drawing on a wealth of ecological expertise and demanding sensible use of resources, the vision of a Valley that is biologically diverse, while still maintaining a strong economy and communities is worth working for. | https://www.valleyagvoice.com/an-environmental-vision/ |
The marginal funding rate was left on hold at 11.25 percent; the interest rate on borrowing facilities provided for primary dealers via repo transactions was kept at 10.75 percent, and the borrowing rate at 7.5 percent.
The late liquidity window borrowing rate was kept at 0 percent and the lending rate was left steady at 12.75 percent.
In January of 2014, policymakers raised rates sharply aiming to protect a falling lira. Since then, the benchmark repo rate was cut four times by 225 bps.
Loan growth continues at reasonable levels in response to the tight monetary policy stance and macroprudential measures. The favorable developments in the terms of trade and the moderate course of consumer loans will contribute to the improvement in the current account balance. External demand remains weak, while domestic demand contributes to growth moderately. The Committee assesses that the implementation of the announced structural reforms would contribute to the potential growth significantly.
The tight monetary policy stance and macroprudential measures continue to have favorable impact on inflation, especially inflation excluding energy and food (core inflation) indicators, and inflation expectations. Moreover, declining commodity prices, in particular oil prices, contribute to disinflation. In light of these positive developments, the Committee has decided on a measured cut in the one week repo rate.
Under the current monetary policy stance, the Committee anticipates that inflation will decline to levels close to the target by mid-2015. Yet, a more persistent reduction in inflation necessitates a cautious approach in monetary policy. In this context, future monetary policy decisions will be conditional on the improvements in the inflation outlook. Inflation expectations, pricing behavior and other factors that affect inflation will be closely monitored and the tight monetary policy stance will be maintained, by keeping a flat yield curve, until there is a significant improvement in the inflation outlook. | http://cdn.tradingeconomics.com/articles/01202015121444.htm |
學歷:
經歷:
專長及教授課程:
研究方向及計畫:Major Research Interests : Regulation of nitric oxide synthesis and gene expression in inflammatory disorders and tissue fibrosis by epigenetic mechanism.
Nitric oxide (NO) is a magic gas molecule critical to numerous biological processes, and acts an important host defense effector in the immune system. NO acts as a double-edged sword. NO produced by mammalian cells at an appropriate scale serves as a key signaling molecule in physiological processes; while excessive and unregulated NO synthesis has been implicated in pathophysiological conditions in human diseases, such as inflammatory disorders including glomerulonephritis (GN), chronic obstructive pulmonary disease (COPD), arthritis and so forth. Nitric oxide is a fairly short-lived molecule (with a half-life of a few seconds) produced from enzymes known as nitric oxide synthase (NOS). The major research activities of Dr. Ting-Hui Lin’s lab in the past years were to investigate the regulation of inducible nitric oxide synthase (iNOS) at transcriptional and post-translational levels in glomerular mesangial cells during glomerulonephritis and renal fibrosis.
Many of the physiological processes that are promoted by NO are mediated by the NO–cGMP signalling pathway. Moreover, NO signaling mediates physiolgocial functions by means of post--translational modification of proteins, mainly through S-nitrosylation of cysteine thiol residues. Therefore, NO also acts as a versatile epigenetic regulator. Epigenetics is defined as somatically heritable changes in gene activity and expression without alterations in the DNA sequences. The patterns of epigenetic modifications include DNA methylation, histone modifications, chromatin remodeling, and microRNAs. Epigenetics has become a central issue in many diseases during development and differentiation, or in response to environmental stimuli. The current research interests of Dr. Ting-Hui Lin’s lab are to investigate the epigenetic regulation of NO synthesis and gene expression during glomerulonephritis and renal fibrosis.
期刊論文:
研討會議論文: | http://biomedical.csmu.edu.tw/files/11-1047-96.php?Lang=zh-tw |
My son’s hockey team won the Motown Hockey tournament in Detroit this weekend. We played the same team twice in the tournament – once in the final round of the round robin, and once again in the tournament finals. We lost the first game 6-2 and won the finals game 3-2.
The key to winning the finals game was that we made adjustments after losing to them. Since they had beaten us, they didn’t make any adjustments and played the same way. The adjustments we made allowed us to win because they did exactly what we expected them to do.
They could have anticipated changes that we would make and made some adjustments of their own, but they didn’t.
This happens in business all the time. Many top companies get complacent and don’t anticipate what their competitors, or their customers, or the market will do. They then find themselves struggling to compete.
You compete with the same companies day in and day out. What are you doing each day to give yourself an advantage?
This entry was posted in Operational Excellence and tagged competitive advantage, hockey, market share, operational excellence by Andrew. Bookmark the permalink. | https://www.acmconsulting.ca/millers-monday-morning-message-126/ |
Morocco offered humanitarian assistance to Qatar when the Saudi coalition imposed a blockade on the Gulf country in 2017.
Rabat – As Qatar and Morocco maintain strong diplomatic ties, they are seeking to foster further cooperation.
Head of Government Saad Eddine El Othmani held bilateral talks in Rabat with the speaker of the Qatari Advisory Council, Ahmed bin Abdullah bin Zaid Al Mahmoud, at the 14th session of the Parliamentary Union of the Organization of Islamic Cooperation (OIC) Member States.
The two officials expressed satisfaction with their diplomatic ties, emphasizing the importance of developing their relations in several sectors, such as economy, politics, and culture.
Both officials also said that they share the same views and commitments on important issues, including the Palestinian cause.
Al Mahmoud also spoke about his country’s pride in its long-standing and deep friendship with Morocco.
Qatar highly appreciated Morocco’s neutrality in the Gulf crisis when the Saudi coalition enforced a hard blockade on Qatar in May 2017.
Read Also: Timeline: All You Should Know About Morocco-Saudi Arabia Friction
King Mohammed VI had ordered his government to offer humanitarian assistance, sending food assistance to Qatar to offer solidarity during the month of Ramadan.
King Mohammed VI also flew to Qatar, becoming the first leader to break the blockade.
Qatari media showed eminent respect for Morocco and King Mohammed VI, naming him the “first blockade breaker.”
Morocco’s position apparently incensed Saudi Arabia, which retaliated with actions against Morocco’s interest.
Despite the friction, Morocco and Saudi Arabia have recently touted their partnership in several formal messages.
Amid rumors on the friction, Morocco’s Minister of Foreign Affairs Nasser Bourita denied any tension between the two countries, emphasizing that diplomatic ties with Gulf countries like Saudi Arabia and the UAE are “historic” and strong.
Both countries also renewed their commitment to reinforce their diplomatic ties at the OIC conference. | https://www.moroccoworldnews.com/2019/03/268107/qatar-morocco-diplomacy-saudi-arabia/ |
Attendees of the DLI2016 will have access also to the Program and Keynote Speech of the colocated conference ArtsIT2016.
Dr Antoni Jaume Capó
Antoni Jaume-i-Capó obtained the Ph.D. degree in Computer Science at the Balearic Islands University in 2009. Since 2005 he works at the Mathematics and Computer Science Department of the Balearic Islands University.
His main research interests include computational vision, vision-based interfaces, serious games and rehabilitation. He has published in several international journals his research work.
He also has participated and led funded research projects (Regional Government, Spanish Government, European Union).
Sudarshan Khanna
Professor and Design Educator Sudarshan Khanna , was Principal Designer, Chairman of Education & Research, and Head of Toy Innovation Centre at the National Institute of Design (NID), Ahmedabad, India. An internationally acclaimed designer and educator, who has established several new courses and programmes, including the Post Graduate Programme in Toy & Game Design.
Sudarshan Khanna is a pioneer in the research of interesting facets of indigenous toys and crafts communities all over India. In 1996 he was conferred the National Award for his life time work for design-science among children by the Department of Science and Technology. He is recipient of the international BRIO Award 2013 for his lifelong contribution to research and innovation for toy design and development in India. Professor Sudarshan Khanna is the past president of ITRA (International Toy Research Association) and founder Chairperson of “Toys for Tomorrow”- vision-action international forum.
Author of three books and many articles on toy design, culture and creative education, he features in many educational TV programmes. He has been conducting workshops in India and other countries all over the world, for teachers, trainers and students, relating the value of design methods and creativity as parts of innovative learning processes.
Surabhi Khanna
[email protected]
Surabhi Khanna is a designer, educator and workshop specialist. She has a Master degree in design from the National Institute of Design (NID), Ahmedabad, India, focusing on toy and game design, after her graduation in architecture. She has been working on projects and workshops related to heritage, innovations, and culture-based design. She is associated with several institutions of design and education as a part time and visiting faculty.
She was an exchange designer in Germany, invited participant for UNESCO Creativity Workshop on Inclusive Education and Development, and she was co-invitee to Colombia, South America for talks-workshops on design and education.
Surabhi Khanna has developed courses and electives related to playful design concepts for students of design and architecture. She conducts design and education workshops for teachers, trainers and children at several organisations and schools. | http://archive.designlearninginnovation.org/2016/show/keynotes |
Belgian designer Hermine Van Dijck (°1989) attended the Ghent School of Art where she specialized in textile design, graduating in 2012. Later she was accepted to do an internship at a weaving company based in Paris, where she developed her interest in weaving even more.
In 2013 Hermine opened her own studio in Antwerp (Belgium), working on handwoven designs and interesting collaborations. Hermine's work is characterized by a typical use of color. Her love for handwoven imperfections and geometrical patterns are unmistakably hers.
She translate poetic feelings into strong visual designs. By using unique graphic combinations and natural fibers. She is inspired by weaving on her Scandinavian weaving looms, the atmosphere of the high north and traditional textiles. She cleverly combines the artisanal character of old weaving techniques, with modern aesthetics into textiles for the home and heart.
In her studio she creates small collections of handwoven objects. Every piece is 100% unique, and handmade by her hands. | https://herminevandijck.bigcartel.com/about |
As reported on March 26, 2012, in the New England Journal of Medicine, STAMPEDE, a recently released study, concluded that bariatric surgery resulted in better glucose control than medical therapy in severely obese patients with Type 2 diabetes.
At Foothills Weight Loss Specialists, we advise all of our patients that incorporating regular exercise into their routines is a critical component of weight loss success. Our patient Kim Chambers, who had a gastric banding procedure in August 2009, took our advice and “ran” with it. | https://www.premiersurgical.com/2012/05/ |
Pomegranate Rye Cocktail
We call on cherry juice and the versatile pomegranate to balance the rye whiskey in this cocktail and add depth of flavor.
Ingredients
- 240 ml (1 cup) rye whiskey
- 120 ml (½ cup) fresh lemon juice
- 120 ml (½ cup) pomegranate juice
- 2 Tablespoons honey, or other sweetener, to taste
- 60 ml (¼ cup) dark cherry juice
- 2 dashes Angostura bitters
- 180 ml (6 ounces) club soda
- ice cubes, plus extra for glasses
- 4 strips of lemon peel, for garnish
- pomegranate seeds
Directions
- Fill four highball glasses with ice and set aside.
- Place all ingredients into the Vitamix container in the order listed and secure lid.
- Select Variable 1.
- Start the machine and blend for 30 to 45 seconds, remaining on Variable 1 throughout the blend.
- Divide evenly among the prepared glasses and garnish with lemon peel and pomegranate arils.
Chef's Notes
For additional froth, add 1 egg white before blending. | https://www.vitamix.com/vr/en_us/recipes/pomegranate-rye-cocktail?referer_st=&sc=recipe |
and by the Governors of Guam, American Samoa, and the Virgin Islands, respectively. Additional libraries within areas served by Representatives or the Resident Commissioner from Puerto Rico may be designated by them to receive Government publications to the extent that the total number of libraries designated by them does not exceed two within each area. Not more than two additional libraries within a State may be designated by each Senator from the State. Before an additional library within a State, congressional district or the Commonwealth of Puerto Rico is designated as a depository for Government publications, the head of that library shall furnish his Senator, Representative, or the Resident Commissioner from Puerto Rico, as the case may be, with justification of the necessity for the additional designation. The justification, which shall also include a certification as to the need for the additional depository library designation, shall be signed by the head of every existing depository library within the congressional district or the Commonwealth of Puerto Rico or by the head of the library authority of the State or the Commonwealth of Puerto Rico, within which the additional depository library is to be located. The justification for additional depository library designations shall be transmitted to the Superintendent of Documents by the Senator, Representative, or the Resident Commissioner from Puerto Rico, as the case may be. The Commissioner of the District of Columbia may designate two depository libraries in the District of Columbia, the Governor of Guam and the Governor of American Samoa may each designate one depository library in Guam and American Samoa, respectively, and the Governor of the Virgin Islands may designate one depository library on the island of Saint Thomas and one on the island of Saint Croix. | https://www.govregs.com/uscode/title44_chapter19_section1905 |
- Nominal Exchange Rates represent how many units of one currency can be exchanged for one unit of another currency.
- Nominal exchange rates are the rates quoted in the global markets for foreign currency exchange.
- Real Exchange Rates represent the amount of purchasing power in one currency can be exchanged for one unit of another currency.
- Example: 10 Euros buys one “global burger joint chain meal deal” in Paris; converting 10 Euros to US dollars and going into the same chain in downtown Cincinnati buys 1.5 of the same meal deals.
- Determining Change to Real Exchange Rate
- Real and Nominal Exchange Rates under PPP
- SR X/Y = Real X/Y exchange rate measuring purchasing power
- SN X/Y = The nominal X /Y exchange rate; i.e. the forex market quote
- PX = Price of a standard basked of goods in country X
- PY = Price of the same basket of goods in country Y
- Percent Change of the Nominal Exchange Rate under PPP
- I = Inflation rate over measurement period
- The amount of change in the real exchange rate between the currencies of two countries can be calculated by comparing an observed change in nominal exchange rates of the two currencies with the currency change predicted by Purchasing Power Parity.
- The real exchange rate between two currencies will change whenever the nominal exchange rate changes by an amount that is not explained by inflation. | https://financetrain.com/changes-in-real-exchange-rates/ |
Thurman James -- World News Trust
Aug. 26, 2009 -- While so many people in this nation struggle to survive, a tiny percentage of our population lives like kings, siphoning off nearly half of the wealth produced by the laboring masses of the world. We've all seen the reports: corporate CEO's raking in salaries of hundreds of thousands of dollars, bailed out banks paying employee bonuses in the millions, big insurance companies striking deals to preserve their monopoly on rationing medicine.
What sort of extravagant lifestyle do these people lead that requires such outrageous incomes year in and year out? What does one do with that much money?
How much is enough?
I've been asking that question for years now, and until very recently most people looked at me like I had three eyes or called me ugly names when I dared to wonder aloud -- but lately things seem to be changing.
While visiting relatives recently, a distant cousin in her seventies went off on a rant that took me by surprise. Our conversation touched briefly on the state of the economy and she railed against the vast disparities in compensation between working people and the executive elites of corporate America, condemning upper level managers and executives who make hundreds of times more money than the lower level employees who actually generate the wealth
A few days later, after the weekly meeting at my workplace, one of my co-workers -- a quiet gentleman approaching retirement age -- wandered away muttering, "How much is enough?" after the parking lot conversation touched on the differences in what owners and investors reap and what they're willing to pay the workers who facilitate their success.
Am I dreaming? Can it really be true? Is some part of mainstream America finally beginning to wake up and realize that oligopolistic capitalism and excessive executive compensation is at the root of so many of our problems today?
How much is enough?
Our current economic system values and rewards people for their labor unfairly. For example, garbage collectors are the people responsible for removing most of the unsanitary waste produced by our civilization. Their service, an unpleasant task by any measure, greatly reduces the chance of widespread disease epidemics in our communities. The garbage collector is vital to the healthy functioning of our economy, yet these people are traditionally among the lowest paid members of our society.
The corporate CEO makes his living sitting behind a desk, fielding phone calls and emails, shuffling bits of electronic data from one pile to another and skimming a percentage of the wealth produced by each of his employees in the process. I won't argue that there is no place in our society for the functions of corporate executives, but I can't understand what makes the CEO's time and labor worth so much more than that of a garbage collector or any other laborer, skilled or otherwise.
While trash collectors spend their lives hanging onto the back of a foul smelling truck, inhaling the fetid odor of rotting refuse and toxic diesel fumes all day every day, they also risk being hit by inattentive drivers, bitten by dogs, or infected by pathogens in the garbage they haul away. Their reward for the invaluable service they provide their communities is barely enough to keep a roof over their heads and clothes on the backs of their families, much less provide medical insurance or higher educational opportunities for their children. In order to have something resembling what most of us consider a decent life, garbage collectors and their brothers and sisters in most other labor intensive, low skill industries have little choice but to mortgage their entire lives into debt serfdom.
Without the services of the garbage collector, the corporate executive and many others in the community would suffer and die as a result of contact with some of the nasty pathogen that thrive wherever large groups of people live or work in close proximity to one another under less than sanitary conditions.
It's a national disgrace for a nation as affluent as the United States of America to allow such vast disparities in the compensation of its citizenry. The time and efforts of all members of an advanced civilization are required to keep it functioning. Lawyers, bankers, corporate executives, and politicians are no more valuable to our society than day laborers, trash collectors, bartenders and store clerks.
Market economies do not ensure the fair and equitable distribution of resources; that's not what they were designed for. After several generations of under-regulated, free-market capitalism the American people are left with a broken public education system, a health care system that spends roughly twice that of other industrial nations, crumbling infrastructure on a national scale and a hungry, impoverished underclass unique in the high-income western world.
Just as markets do not serve the interests of the working class, neither do they protect our physical environment. In fact, consumer and industrial-driven economies actually encourage us to deplete resources rather than preserve them for future generations. Corporations operate with no consideration for ethics, morality and human values; and humanity is left at the mercy of mankind's baser instincts: hoarding and greed. I've got mine, screw everyone else.
We need to adopt a holistic, humanitarian approach to the increasingly complex resource challenges our nation will face in the coming century. In the past 50 years, the American people placed our economic welfare almost entirely in the hands of free-market capitalists, allowing the modest regulatory systems put in place during and after the Great Depression to be systematically dismantled. The near-crash of the global economy in late 2008 opened many eyes to the ugly truth: modern, global capitalism is little more than the instrument by which most of humanity is held in debt servitude by powerful corporate interests.
This realization has had is a revitalizing effect on many monetary reform initiatives, especially the movement to again tie our currency to the value of gold and other precious metals. Unfortunately, returning to a gold/silver standard will do little to stabilize our economy. In fact. such a move would ultimately lead to further concentration of wealth to an even smaller minority of the population.
Precious metals, like so many other commodities, are finite and a currency based on such a standard would eventually result in money supply shortages and more economic stagnation. A more sustainable and ethical means of exchange would be a currency based on the time, skill, and labor required to produce a given product or service.
Perhaps the biggest problem with money, regardless of what standard it represents, is usury; the charging of interest. Many ancient cultures forbade usury and modern Islam still retains that prohibition. Usury turns every transaction into one of debt slavery and requires endless economic growth in order to expand the money supply and facilitate repayment of loans plus interest.
Rather than continue supporting an economic model that enables debt slavery or returning to a monetary system based on limited resources such as gold or silver, maybe we ought to attack the problem at its root by abolishing usury and retooling our currency to reflect the value of our labor and time to society.
The capitalist economic model, based on endless growth and debt slavery is the natural result of an artificial, linear view of the universe that is unnatural and unsustainable. Nature operates in cycles of birth and death, growth and contraction, ebbs and flows. Perpetual growth, whether of a skin cell, a small business, a multinational corporation, or a global economy, is never sustainable. The only form of unlimited growth that occurs in nature is malignant cancer; and cancer almost always kills its host.
The arrogant assumption that humanity can and should have dominion over the earth, that infinite growth on a finite planet is not only possible but desirable, is indicative of the twisted thinking that allows us to accept the status quo and in the past has led to such atrocities as slavery and genocide.
If we expect to survive, let alone prosper in the coming decades of resource shortages, climate change, mass migrations and many other challenges then we, especially Americans, must abandon the mistaken belief that infinite growth is possible. The love of money and the power it enables is indeed the root of much evil in this world. Unchecked, these obsessions will almost certainly lead to the destruction of our nation and the world.
How much is enough? | https://worldnewstrust.com/how-much-is-enough-thurman-james |
Tagalog Theme - Informational Essay Topics For Learning TagalogIf you have an interesting topic for your Informational Essay, one way to utilize it is to include a tagalog theme. Tagalog is a traditional Filipino language and also a widely spoken language in the Philippines. Learning it as a second language can be very helpful to those who do not understand it. This is because it is easy to read, pronounce and learn.
If you are taking an Informational Essay course to learn the language, you may want to consider using a significant topic that will help others to understand the writing. It can be something you know or one that is new to you. Another idea is to include a different dialect.
One important part of learning a second language is listening. In Tagalog, listening is paramount. There are several people who are hard of hearing or who have hearing problems. You may want to teach these students how to effectively listen to the audio file that you teach in your class.
Tagalog is a rich language, with many sounds that are different from Spanish. When people speak Tagalog, they are likely to use the various sounds in the same way that they would in English. Learning the Tagalog pronunciation helps the student to understand the written text as well.
Learning English is very much different from learning Tagalog. The primary difference between the two is that Tagalog speakers typically would ask questions such as 'how are you?' versus asking 'what time is it?'
Vernacular speakers of the two languages can't really understand each other. However, if you have a speaker who speaks in Tagalog, they will understand your written message. If they don't understand, they may try to correct you in their own vernacular. These days, learners of Tagalog are bilingual, with English and Tagalog. Those who need an Informational Essay to improve their English skills should learn the language in order to understand the written word.
|
|
Author
Write something about yourself. No need to be fancy, just an overview. | https://sociologyresearchpaper119.weebly.com/blog/category/all |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.