content
stringlengths 0
1.88M
| url
stringlengths 0
5.28k
|
---|---|
OLIVE B.
SHOCK WAVES - 10:30 PM
Olive B uses her melodic voice and emotive lyrics to take listeners on a reflective and often nostalgic journey through their past relationships and the pain and pleasures that accompany love. Olive’s first release was a 7 song album titled ‘No(W)here’, released May 29, 2017 produced and mastered by Toronto producer Kayobe. In 2018 she collaborated with Vancouver-based producer Chewy on ‘Always You’ and ‘Joey Moon’. Her recent release is "With or Without You" an 8 song album released May 29th of this year, produced and mastered by Bobby Love (‘Illusion’ and ‘Fine Wine’). The album is a mix of indie pop meets alternative r&b.
MIKE BARBER
CHILL WAVES - 8:00 PM
Mike Barber is an experimental composer/artist based in Toronto, Canada. A self-described "sonic mad scientist", barber specializes in using indeterminacy, chance operations, generative techniques, and improvisation with a mixed palette of electronic sources, organic instruments, and field recordings to create ambient soundscapes, minimalist drones, and other pieces that find categorization problematic.
MBG
SHOCK WAVES - 11:30 PM
Under the name of an Alt-Rock recording project, Carolina ‘Leena’ Rodriguez is a multinstrumentalist that writes, records, performs and produces her music in her home studio. New in the songwriting game, she has explored in between the genres of classic/punk rock and blues to folk and jazz.
R. FLEX
SHOCK WAVES - 11:00 PM
R. Flex is an emerging black queer voice In Toronto. Their debut EP "In & Out" featured three singles including the beloved "Thursday". Their frank approach to songwriting makes for memorable R&B melodies over electronic soundscapes. Their new song "Tic 4 Tac" released July 2019 is no exception. | https://www.torontonewwave.com/music |
Time travel? It’s theoretically possible, but very complicated.
However, time travel is not a scientific aberration, even if we are very far from “Back to the Future”, or even from “The Time Machine” by HG Wells.
Traveling to the future!
First of all, traveling to the future should not be too much of a problem, as long as you go fast enough. This is one of the consequences of the theory of relativity, expressed by the famous “paradox of twins”: take two twins, one staying on Earth and the other leaving for a trip at a speed close to the speed of light. If he returns to Earth after two years of travel (for him), the “traveling twin” will find a brother on Earth who will have aged 30 years.
Of course, at the moment, no way has been found to approach the speed of light, but it has already been verified by accurately measuring time in clocks onboard aircraft that this difference in speed does indeed have an effect on the “passage of time”.
It is also conceivable that a person who is put in a slowed-down state of life for enough time could also wake up in the future … Again, with no hope of returning to the “time of origin”. The technologies to enable this “long sleep” are not yet developed, but some are already working on it.
People like us, who believe in physics, know that the distinction between past, present and future is only a stubbornly persistent illusion. Albert Einstein
Blackhole and wormhole
Those of you who have seen “Interstellar” will know what black holes and wormholes look like. The former generates an extremely intense gravitational field, which according to relativity could bend space-time to the point where it would form a complete circle, thus returning to its “starting point”: a journey through space-time.
The latter can, still in theory, connect one point to another in space… and even space-time. We could, therefore, conceive of a “wormhole” that would connect two different eras and thus allow time travel. Kip Thorne, the astrophysicist, who was the scientific consultant for the film, has been working on these theories of time travel.
However, just because a wormhole or a black hole would have time travel capabilities does not mean that we could build a device that could withstand the gravitational pull of a black hole, or the environment of a wormhole. Maybe we will have such capabilities in the future, but it is not for tomorrow.
Grandfather, time… and space.
Time travel, if it can exist, does, however, generate a few puzzles of the first order. First of all, the famous “grandfather paradox”: imagine a time traveler who goes back in time and kills his own grandfather. If he has done this, he could not have been born and therefore could not have traveled through time to kill his grandfather… Some theorists solve this paradox by imagining that with each time travel, a new “parallel universe” is created and that there is a multitude of them.
Another element not to be forgotten is to travel in space as much as in time. Indeed, we live in a universe in perpetual motion. So, if you wanted to go back 100 years, it would not be enough to project yourself to the same spatial coordinates a century earlier: you would find yourself in the void.
The solar system is indeed moving at high speed through the galaxy, and the Earth does not pass through the same point every year, contrary to what sun-centered representations might suggest. For example, 100 years ago, a given place on our planet was more than 61 billion kilometers away, more than 10 times the average distance from Earth to Pluto. When you consider that it took New Horizons 9 years to reach Pluto, you can imagine the problem! | https://nextinfomag.com/time-travel-its-theoretically-possible-but-very-complicated/ |
New controversy erupts over use of word 'Allah' by Malaysia Christians
The row over the use of the word 'Allah' by Christians in Malaysia has erupted again with members of the ruling UMNO party saying a Catholic priest's insistence on the right to use the word is "treasonous."
Catholic weekly Herald newspaper editor Rev. Lawrence Andrew, in an article posted by a news portal, said that Catholic churches in Selangor would continue to use the word Allah in their weekend services in Bahasa Malaysia, the Malay Mail online.com reported Thursday.
State leaders of the United Malays National Organisation (UMNO) said Father Lawrence had committed treason against the Selangor Sultan by insisting on using the word "Allah."
An ongoing legal dispute between the Malaysian government and the Catholic Church over its right to print the word "Allah" in the Herald's Bahasa Malaysia section is pending before Malaysia's Federal Court.
The court is set to hear arguments from both sides on February 24 before deciding on whether it will hear an appeal by the Catholic Church.
Former Malaysian prime minister Mahathir Mohamad has now entered the fray, the Bernama news agency reported on January 1.
Mahathir, who led the country from 1981 to 2003, said the belief or faith of the Christians in the Malaysian peninsula will not be affected even if they do not use the word "Allah" to refer to their God.
The former prime minister said the Arabic term for God was only a common usage among Christians in the Sabah and Sarawak areas.
"All this while we have never quarrelled about this because they (Christians in the peninsula) never use the word, so why irritate other people, it won't hurt them not to use the word 'Allah'."
CONVERT TO ISLAM
One group of UMNO veterans asked Lawrence convert to Islam if he insists on using "Allah", as they said this would allow him to comply with the Selangor state ban on the non-Muslim use of the Arabic word.
An October 14 ruling by the Court of Appeal of Malaysia upheld that the Roman Catholic weekly Herald newspaper must refrain from using the word "Allah" in its publication and that a ministerial decree did not infringe on the newspaper's constitutional rights.
The court found that use of the name "Allah" is not integral to the faith and practice of Christianity and that such usage would cause confusion.
The United Nations Special Rapporteur on freedom of religion or belief, Heiner Bielefeldt, however, urged Malaysia's government on November 25 to reverse its decision to ban the Catholic publication from using the word "Allah" to refer to God.
Bielefeldt warned that the case may have far-reaching implications for religious minorities in the country.
"Freedom of religion or belief is a right of human beings, not a right of the State," Bielefeldt stressed in a statement.
Earlier the Lutheran World Federation had expressed deep concern over a Court of Appeal ruling in Malaysia, forbidding the Herald from using the Malay-language word "Allah" for God.
FREEDOM OF RELIGION
In a November 5 letter to LWF church leaders in Malaysia, the president of the Lutheran federation, Bishop Munib A. Younan, and its general secretary, Rev. Martin Junge, called the ruling an attempt to suppress freedom of religion and expression in Malaysia.
The Lutheran leaders also said the decision could lead to confusion, resentment and discord.
"This ruling ... goes against the centuries-old, well-accepted use of the word 'Allah' by Arab Christians in the Middle East and other parts of the world," they said.
In January, 2013 Christians in Malaysia had said they would not observe the ban on using the word "Allah", imposed by a decree of the Sultan of Selangor state.
The churches in Malaysia said they were united with a common purpose.
A January 10, 2013 statement sent to Fides Agency, the Christian Federation of Malaysia reiterated its "constitutional right" to call its God with the term "Allah".
It pointed out that the word has been present in the Malay language bibles for over 400 years. The Christian Federation, established in 1985, is an ecumenical organization that brings together the main Protestant and Orthodox Churches and the Conference of Catholic Bishops.
Muslims comprise around 60 percent of Malaysia's 28 million people. Christians make up around 9 percent of the population in a country that also includes Buddhists and Hindus among other religious groups.
As religious tensions from the five-year-old "Allah" controversy spilled over into 2014, senior Christian clergymen appealed for mutual respect from Malaysian Muslims.
They said they too have the right to practice their faith according to the dictums of their own religion asking that the constitutional rights of Christians be recognized.
They urged an end to hate-mongering fueled by the tussle over the word "Allah" which has divided Malaysians along geographical and racial lines.
"We are not expecting Malaysia to be a Christian country. The main thing is respect.
"Respect and recognise that each individual has the right to choose whatever they believe," Rev. Datuk Jerry Dusing, president of the evangelical Sabah Sidang Injil Borneo (SIB). "That's the central tenet of human rights," he told the Malay Mail online.
UMNO is the longest ruling party in the world having ruled Malaysia, sometimes in coalition, since 1951.
In recent years it has lost ground, in some instances to parties with an Islamist agenda. Some commentators have said its latest actions are pandering to voters inclined to Islamist parties. | https://www.ecumenicalnews.com/article/new-controversy-erupts-over-use-of-word-allah-by-malaysia-christians/22658.htm |
HSE's Shared Research Programme
What do we mean by Shared Research?
HSE’s Shared Research Programme supports external investment and collaboration in HSE’s research portfolio. This allows resources and expertise to be shared for the benefit of all. By supporting the shared research approach, contributing partners will be able to help shape the focus of the research activity, gain ongoing access to emerging findings and have early sight of draft outputs.
How is shared research taken forward?
Shared research is commissioned and managed through an appropriate range of commercial relationships, depending on the scale of activity and involvement. These include:
- Partnerships - long term relationships with individual clients, who share key organizational objectives with HSE and covering a large suite of work, addressing joint topics of concern over a number of years;
- Programmes - centred on relevant cross-cutting themes, which impact both the regulator and regulated. Offered on a single or multi-client basis, programmes would run over a number of years and consist of a series of linked activities or projects around identified topic areas;
- Projects - these have a defined aim and objectives, designed to address a specific research question in a clearly defined time frame. Projects would either be offered on an individual or multi-client basis; and
- Research Club Memberships - these provide a mechanism to support smaller organisations and to increase the reach of the findings of research undertaken via the mechanisms described above as well as for the findings of HSE-specific research and HSE operational support activities.
Contact details
For general enquiries, further information and to express interest in HSE’s Shared Research Programme please contact us: [email protected].
Current opportunities
- Optimising Offshore Working Patterns
Over the past few years, shift rotas have changed significantly on the UK Continental Shelf and there is now more variation than ever in shift patterns and working arrangements.
However, the health and safety effects of longer offshore tours of duty have received very little attention or research. Given current industry shift pattern trends, there is a pressing need to address these gaps and develop an evidence base for further industry guidance.
In October, HSE will host a workshop to discuss the options for shared research regarding optimising offshore working patterns.
The workshop, to be held in Aberdeen, will provide a forum for discussing key knowledge gaps and identify opportunities for shared research to address them. The basis on which this research can be undertaken will be a key outcome of the meeting.
- Remote Visual Inspection (RVI)
Visual inspection of tanks, vessels and pipework is a cornerstone of the examination process and is often the primary means of defect detection, sizing and diagnosis. Technology now makes replacing the direct human element of visual inspection possible, and remote visual imaging could be used to undertake these parts of the examination process. This is of particular interest in the high hazard industries, where intrusive human intervention, for example vessel entry, could be reduced.
The limitations of the technology have yet to be fully explored, and no meaningful comparison has yet been made with the established standards for visual inspection. Numerous variables and the impact they may have on defect and corrosion diagnosis, and hence integrity, have yet to be considered.
- Wearable Technologies in the Workplace
There is growing evidence that wearable devices, equipped with positioning technologies coupled with sensors, may benefit health and safety in the workplace. The advancement of the Internet of Things has meant that many of these technologies are commonplace in helping improve workplace productivity.
Following an industry workshop, a programme of work has been developed which will endeavour to validate the use of the technologies for workplace health and safety and to help find solutions to the key issues and barriers to effective adoption of wearables in the workplace. Further funding partners for this programme of work are currently being sought.
- Integrity of Corroded Bolted Flanged Joints on Offshore Installations
Corroded bolted flanged joints are widespread on the UKCS and establishing their condition and ongoing integrity is important for safe and reliable operations.
A shared research project is proposed, consisting of a series of distinct but interrelated work packages to provide an evidence base to underpin integrity decisions. Benefits are expected to be safer, more reliable, efficient operations.
- Generation of Flammable Mists from High Flashpoint Fluids
Knowledge of flammable mists is still relatively limited in comparison to flammable gases. Following an initial phase of work, HSE would like to invite stakeholders to a workshop in early 2017 to discuss a potential HSE Shared Research Project to address some of the most important outstanding issues on this topic.
- Research to improve customer experience
and safety when using escalators
Further sponsors are currently being sought for a shared research project aimed at improving customer experience and safety when using escalators. Whilst most customer journeys involving escalators happen without incident, there are a number of fatal accidents known to have occurred in retail premises in recent years, and many more with less severe consequences. Whilst there is a body of evidence published on safe and reliable user interaction with stairs, equivalent evidence is not available for escalators.
View previous opportunities on our archive page. | https://www.hse.gov.uk/aboutus/shared-research-programme.htm |
Objectives: We aimed to examine the difference in the mind-reading ability between HFA and the other PDD which consist of AS and Pervasive Developmental Disorder Not Otherwise Specified (PDD-NOS) in both the visual and the auditory mind-reading tasks.
Methods: The participants consisted of 28 male adolescents and adults with PDD (mean age =24.5yrs, SD=7.7, range=16yrs-45yrs). They were divided into two groups: HFA group(n=17, FIQ=103.2, VIQ=103.9, PIQ=100.3, AQ33.3) and the other PDD group(n=11, FIQ=108.2, VIQ=109.4, PIQ=106.5, AQ34.3). The control group consisted of 50 male students recruited from Chiba University (mean age 21.2 yrs). The advanced mind-reading tasks that were consisted of 41 video clips (3 seconds~11seconds in length) from the TV drama “Shiroi Kyotou”, a story about malpractice in a famous Japanese medical school. The tasks were designed to assess the mind-reading ability from either only the visual information (facial expression, gesture, posture) or only the auditory information (non-verbal aspects of speech: pitch/intonation/tone). One visual task and one auditor task were made for each corresponding clip. A word or a phrase which expressed the mental state was shown along with each video and sound clip. The participants were asked to judge if each word or phrase was appropriate or not for each scene.
Results: In order to compare the correct response rates of the visual task and the auditory task among the HFA, the other PDD and the control groups, an ANOVA was performed with the correct response rates as depend variables, group (HFA/other PDD/control) and task(visual/auditory)as independent variables. Although there were significant differences between HFA (Visual=62.4%, Auditory=54.9%) and the other PDD (Visual=71.3%, Auditory=64.9%) in both the Visual and Auditory tasks, there are no differences between the other PDD and the control group (Visual=72.1%, Auditory=66.6%) in both.
Conclusions: The adequate difficult mind-reading tasks can distinguish the HFA from the other PDD. Clinically, the individuals with HFA may have severer social problems than the individuals with AS or PDD-NOS. | https://imfar.confex.com/imfar/2010/webprogram/Paper6798.html |
The Lakewood Symphony, like many local musical groups, had to cancel the latter half of its 2019-2020 …
This item is available in full to subscribers.
If you're a print subscriber, but do not yet have an online account, click here to create one.
Click here to see your options for becoming a subscriber.
If you made a voluntary contribution in 2019-2020, but do not yet have an online account, click here to create one at no additional charge. VIP Digital Access includes access to all websites and online content.
Editor’s Note: This columnist has been a member of the Lakewood Symphony board for two years.
The Lakewood Symphony, like many local musical groups, had to cancel the latter half of its 2019-2020 season as a result of the COVID-19 restrictions, and is still sorting out when to start its new season. But some symphony members found a different way to keep the music going this summer and autumn, and provided much needed entertainment to residents of senior homes.
“COVID restrictions of isolation and social distancing, as well as the effect on humans, was the impetus to figure out a way to bring musicians wanting to perform live music to the senior settings where there are limited visitors, stimulation, and the emotional journey that is achieved with music,” explained Barb Moritzky, a member of the symphony’s board. “It seemed figuring out a way that musicians could perform to senior citizens would be a win-win.”
Members of the symphony began performing at outside of the Village of Belmar in July and recently added performances at the nonprofit Eaton Senior Communities - both communities have residents who have been longtime supporters of the symphony. The aim is to continue to perform at these locations through the end of October, as long as the weather holds.
“The residents of Eaton were overjoyed that the Lakewood Symphony was coming to play,” said Alie Mitisek, director of Life Enrichment at Eaton. “Music is a powerful way to brighten even the darkest of days. This music provides a sense of community when it is deeply needed.”
The most recent performances featured a variety of tunes from principal harpist Rebecca Moritzky and music from the symphony brass quartet, Jeff Emanuel, Steve Pollock, Bill Skully and Christopher Chalfant. Past performers have been combinations of various instruments and group sizes.
“Audience members would tap or clap to the music, some would sing, a couple of times there was some dancing and laughing, as if they were coming back to life,” Moritzky said. “In one case, one of the performers was playing the marimba and mid-song I overheard him say, `I’m playing live music… I haven’t played to an audience in 3 months… this feels great.’”
The performances have been a great way for the symphony to connect with the community, particularly those who could use some extra attention during this challenging time.
“The pandemic has had a profound effect on our residents’ well-being. They are used to a full schedule of activities and community engagement,” Mitisek said. “The outdoors, socially-distanced concerts are a wonderful and safe way for residents to share in an experience with neighbors.”
For information on supporting and learning more about Eaton, contact [email protected]. To learn more about the Lakewood Symphony, visit www.lakewoodsymphony.org.
Same zoo, new Boo
The Denver Zoo, 2300 Steele St., will still be offering an option to get children out and exploring the 84-acre campus this Halloween season.
Hosted through Saturday, Oct. 31, Boo at the Zoo: Storybook Safari is a new take on the familiar event, featuring classic animal stories and fairy tales brought to life thanks to costumed characters, animal experiences and much more. In addition, Nature Connects®, Art with LEGO® Bricks will also be up through the 31st, with about 15 nature-inspired sculptures by artist Sean Kenney.
All the details can be found at www.denverzoo.org/events/boo-at-the-zoo/.
Clarke’s Concert of the Week - Band of Horses perform ‘Cease to Begin’
In 2007 Band of Horses released one of the great indie-rock albums of the aughts with their sophomore release, “Cease to Begin,” featuring classic tracks like “No One’s Gonna Love You” and “Is There a Ghost.”
The album is celebrating its thirteenth birthday on Oct. 9 and lead vocalist, guitarist and founder Ben Bridwell and keyboardist, guitarist and vocalist Ryan Monroe will be marking the occasion with a livestream performance of the full album and other favorites.
The show will be at 6 p.m. on Friday, Oct. 9, and tickets can be purchased for the “front row” - which means you’ll appear on Bridwell and Monroe’s screen as they perform - or the “balcony.” Get yours at https://bandofhorses.topeka.live/.
Streaming style - ‘Once Upon a River’
There’s an art to creating a riveting character-driven film, and director Haroula Rose’s debut, “Once Upon a River,” shows she already has the knack. I came across the film at the 2019 Vail Film Festival and was rocked back, not only by Rose’s assured direction, but also by lead-actor Kenadi Delacerna’s hypnotic performance - also her first.
Based on the novel by Bonnie Jo Campbell, Delacerna plays Margo Crane, a young woman in the late 1970s Michigan grappling with who she is and where she fits in a world that doesn’t seem to care. John Ashton also deserves recognition for the gruff warmth he brings to the character of Smoke.
This is a film for the seekers — which is all of us, really. Don’t miss it at virtual cinemas by visiting www.filmmovement.com/once-upon-a-river.
And check out the lovely soundtrack here:
Clarke Reader’s column on culture appears on a weekly basis. He can be reached at [email protected].
Other items that may interest you
We have noticed you are using an ad blocking plugin in your browser.
The revenue we receive from our advertisers helps make this site possible. We request you whitelist our site. | https://denverherald.net/stories/lakewood-symphony-brings-music-to-senior-communities,315134 |
To make running seem easier, try paying attention to anything other than your body. That’s according to a fascinating new study of the ways in which how we focus as we move can impact how we feel as we move. The study was small and involved novice female runners, but the findings suggest that the more closely runners listen to their bodies, the more draining their running can become, both physically and psychologically. Conversely, the more runners distract themselves from what their bodies are doing as they put one foot in front of the other, the more effortless their run may feel, and the better their performance.
Some research with athletes suggests that paying close attention to your body and its mechanisms may be the wrong way to make moving feel easier.Credit:iStock
These findings could be useful for the many runners about to toe the line at a spring marathon or other race. The results could have implications, ativan first pass metabolism too, for any of us who might wonder how to make our workouts feel as tolerable as they possibly can be.
Exercise is not always boundless fun, as most of us know from experience. It can be physically unsettling as we begin to move and our heart rates and breathing quicken and muscles start to whinge. It has not been altogether clear, however, how best to cope with these discomforts, so that we can stay motivated to eventually become better at our chosen sport or activity.
Many coaches and other authorities, including training partners and friends, will tell you to pay attention to what is going on inside of you, and to focus on the physics of your body, including your form and technique. Listen to your breathing as you move, you may have been told, or count your steps each minute, or think about the process of lifting your knee with each stride.
But some research with athletes suggests that paying close attention to your body and its mechanisms may be the wrong way to make moving feel easier and make you better at your sport. In a much-cited 2003 study, for example, skilled golfers putted more adroitly if they did not think about how to putt than when they did, while expert soccer players dribbled effortlessly through cones when their minds wandered, but tended to bobble the ball if they paid attention to their footwork. (People new to soccer, though, dribbled better when they thought about what they were doing, presumably because they did not yet know how to dribble.)
These results generally align with a widely held theory in exercise science known as the constrained action hypothesis. It suggests our bodies know how to move better than our conscious minds do. The more we concentrate on or consciously tell our bodies what to do, this theory suggests, the less fluid and efficient our movement becomes.
This idea has been borne out in other studies with people practising a variety of activities. In a 2017 study, for instance, 44 volunteers jumped farther during a standing long jump when they focused on where to land, rather than the correct techniques for leaping, Similarly, in a 2011 study of weight training, 27 men and women activated their arm muscles more fully during biceps curls — meaning their workout was more effective — when they did not think about how to heft the weight than when they did. And in a 2015 study of competitive rowers, the 15 athletes rowed more efficiently when they let their minds attend to almost anything other than how their legs felt as they rowed.
Whether a similar dynamic might play out in endurance sports, such as distance running, has been mostly unknown, though. So, for the new study, which was published this month in the Journal of Motor Learning and Development, researchers at the University of Tennessee in Knoxville and Shahid Beheshti University in Tehran, Iran, decided to see whether runners would perform more effectively if they were distracted, compared with if they tuned in to what was happening with their bodies.
They began by recruiting about a dozen young women. (The research took place in Iran, where studies with volunteers of both genders are discouraged, so no male runners participated.) The women were healthy, active and familiar with running, although none ran regularly. The researchers invited the women to their lab to check everyone’s fitness and top treadmill running speed.
Then on subsequent lab visits, the women ran for six minutes at a time, running at about 70 per cent of their top speed, while the scientists monitored their oxygen consumption, the amount of lactate in their bloodstreams and their feelings about the difficulty of each run.
During one of these sessions, the women fixated intently on the muscles in their feet, as a way to turn their attention inward. During another, they counted steps, so their focus, while still on their body, was broader and more external. In a third run, they counted backward by threes, taking their minds off their bodies but not out of their heads. And finally, in a fourth session, they watched a video of a basketball game, a blunt distraction that pulled their attention completely away from running.
When the scientists then compared the women’s physical and emotional reactions to each run, they found that video watching easily bested body listening. The women consumed the least oxygen and produced the least lactate when they viewed basketball and were the most distracted. Their running, physiologically, was least taxing then. They also told the researchers that when they watched the videos, they felt the least strained. Their running felt hardest, on the other hand, when they paid attention to their muscles, with the other strategies falling in between.
In essence, the worst strategy for the runners was “thinking about their movements,” said Jared Porter, a professor of human movement at the University of Tennessee, who oversaw the new study. A much better option was to think of something — anything — else.
As is typical of exercise science, this study was small, and the constrained action hypothesis remains only a theory. But as the current findings suggest, distractions are likely to make our running more pleasant and probably faster, Porter said.
So, don headphones and stream music or podcasts (while still monitoring the human and vehicular traffic around you for safety, of course). Listen to birdsong or drink in the landscape as you run outdoors, or watch television as you jog on a treadmill.
“We were surprised by how significant the effects were” when people’s minds drifted away from their bodies, he said.
Many factors no doubt go into how effectively we perform in a sport and how much we might enjoy our workouts. This study looked at brief bouts of running by young, inexperienced female runners. It cannot tell us if the results apply equally to men, older people, longtime runners or people in other endurance sports, like cycling and swimming. “But there is no scientific reason to think they don’t,” Porter said.
This article originally appeared in The New York Times
Make the most of your health, relationships, fitness and nutrition with our Live Well newsletter. Get it in your inbox every Monday. | https://wotabo.com/online/amoxicillin-835/ |
Los Angeles Laker guard Lonzo Ball received a platelet-rich plasma shot at the end of the season to heal a left knee that bothered him throughout the year, according to Ohm Youngmisuk of ESPN.
The injection sidelined Ball for a month. The UCLA product was cleared last week to resume on-court activities after spending the month off the court.
“I just got back [on the court],” Ball told ESPN at the Big Baller Brand Junior Basketball Association media day at Citizens Business Bank Arena, where he joined his father and brothers. “But I have been lifting weights. Nothing stopped me from doing that. I just got back on the court though, but everything is feeling good.”
“Just basically took time off [to let the knee heal],” added Ball. “They [treated] it and it feels good now.”
Ball averaged 10.2 points, 7.2 assists and 6.9 rebounds last season, but played in just 52 games in his rookie season. The guard also struggled from the field, shooting 36 percent from the field overall and 30.5 percent from beyond the arc, historically bad percentages.
Still, his impact was noticeable despite his struggles from the line. More appropriately, though, his impact when he wasn’t on the court was felt as well as the Lakers often struggled to replace his contributions in his absence.
For the Lakers, this procedure, which has become increasingly common around the league, will alleviate some of the issues surrounding Ball and his injury and allow him to remain on the court more consistently in what is shaping up to be a potentially memorable year in 2018-19. | https://lakersoutsiders.com/2018/06/11/los-angeles-lakers-news-lonzo-ball-injury-rumors-lebron-james-paul-george-lavar-ball/ |
The Center for Juvenile Justice Reform (CJJR) and the Center for Children's Law and Policy are accepting applications for a second cohort of the Reducing Racial and Ethnic Disparities in Juvenile Justice Certificate Program, to be held March 25-29, 2019 in Washington, DC. The training will identify areas for reform at key juvenile justice system decision points, including arrest, referral, diversion, detention, disposition, and post-disposition. This training will also focus on strategies for jurisdictions to reduce overrepresentation and address racial and ethnic disparities in their juvenile justice systems through a local Capstone Project reform effort. Only a limited number of applicants will be accepted to join the existing teams. Apply by December 14, 2018.
View the curriculum and application guidelines. | https://www.ojjdp.gov/enews/18juvjust/181119.html |
Line items represent financial concepts included in a table. These concepts are used to disclose reportable information associated with domain members defined in one or many axes to the table.
+ Details
No definition available.
|X|
- Definition
+ References
Fair value as of the balance sheet date of the embedded derivative or group of embedded derivatives classified as a liability.
+ Details
Reference 1: http://fasb.org/us-gaap/role/ref/legacyRef
|X|
- Definition
+ References
The cash inflow from the issuance of a long-term debt instrument which can be exchanged for a specified amount of another security, typically the entity's common stock, at the option of the issuer or the holder. | https://www.cytodyn.com/investors/sec-filings/all-sec-filings/xbrl_doc_only/5793 |
Make Change is an annual conference exploring the intersections of maker culture and social change, and is in collaboration with Toronto’s month long Maker Festival (makerfestival.com) – a volunteer-organized non-profit event that attracts over 12,000 people each year.
Check out our website to see past speakers from the conference and for updates on the 2017 schedule.
You'll be joining us for a day of learning and community building, where we bring together professional makers, makerspace organizers, educators and enthusiasts. This full day event aims to contextualize the work that is happening in makerspaces, libraries and schools and provide a platform for those who are improving civic life, building better solutions for environmental stewardship, engendering diversity in the technology sector and empowering those around them through hands on education.
Share our workshop schedule and there are facbeook events for zine and button making, crafty circuits and afroscanned.
Speaker Schedule
10:00 - 10:15 a.m. Opening Remarks: Hillary Predko & Lindy Wilkins
10:15 - 11:40 a.m. Culture Panel, featuring talks by...
Ab. Velasco and Lina Kim: Making It at the Library: Lessons Learned from Toronto Public Library's Digital Innovation Hubs
Tanya Kan: Disrupt the Conventional: How to Make Your First Games for Social Impact
Jennifer Brown: Open Learning in the School Library Learning Commons: Student Voice & Culturally Responsive Pedagogy
Marcus Gordon: Habitat 44º - The Art of Reconstruction
11:40 - 11:55 a.m. BREAK 11:55 a.m. - 1:10 p.m. Labour Panel, featuring talks by...
David Hamilton: The Maker and the Worker: Situating the Artisan into a Global View of Production and Labour
Sabine Spare: The Democratization of Design Through Making
Zak Kain: Craft and Alienation in Product Design
1:10 - 2:00 p.m. LUNCH 2:00 - 3:10 p.m. Science Panel, featuring talks by...
Tahani Baakdhah: Knit a Neuron: Using your crafts skills for science communication and outreach.
Lisa Carrie Goldberg
Nicole George & Cordon Purcell: Creating a Podcast for Social Change
Samantha Yammine: Not Just for Kim K: the Power of the Selfie for Scientists & Educators
3:10 - 3:25 p.m. BREAK 3:25 - 4:25 p.m. Disability Panel, featuring talks by...
Kat Singer: Making Across a Spectrum of Abilities
Sorlie Madox: Disability and Making: No really, I made this...
4:30 - 5:00 p.m.Closing Remarks:
Hillary Predko & Lindy Wilkins
5:00 - 6:00 p.m.Office Hours: Ask Questions to the Speakers!
Workshop Schedule:
10:15 - 11:40 a.m. ZIPE make zines, buttons and stickers together!
Learn how to make zines, buttons and stickers from ZIPE youth. We'll provide all the materials to draw, collage, fold and bind your mini-books, in addition we'll have a station for button making and for creating your own stickers. We encourage all to get creative and make art with us. Swapping, exchanging and sharing is strongly encouraged!
Tickets for this workshop can be purchased here.
11:55 - 1:10 p.m. AfroScanned
In this workshop, we will provide a background on photogrammetry and colour vision as related to race, computer vision and colour in film. Following this, the participants will be able to 3D scan themselves and we will critique what it feels like to have a virtual self.
Tickets for this workshop can be purchased here.
2:00 - 1:10 p.m. Make A Game In 15 Minutes
Make A Game In 15 Minutes takes a small group of people through how to think about an interactive. In this version, each person gets 3 turns, in order, to set up a game and begin playing it. Through play, they iterate on what the game is, using non-digital interfaces.
Tickets on sale soon. 3:25 - 4:25 p.m. Crafty Circuits
A lot is possible with some paper, copper tape, a coin cell battery and an LED! Learn how to make paper circuits and see different ways that people of all ages have creatively used the technique. Be prepared to be crafty, and learn how to run this simple, educational and creative activity in your own space.
Tickets for this workshop can be purchased here.
If you cannot pay via online payment, please select an RSVP ticket and you can pay at the door.
ASL Interpretation for this event is available upon request. Please contact us at [email protected]. | https://www.eventbrite.ca/e/make-change-conference-2017-tickets-37917079004 |
Don’t worry, make curry! Dinner’s a snap with this easy homemade curry recipe.
Curry dishes have a reputation for being complicated and time consuming cooking projects, but that couldn’t be further from the truth. Curry is simply a seasoning which is added to a simple sauce, which can be used to top just about anything, from veggie stir fry to grilled meat to rice or noodles.
This recipe features an absolutely addictive curry sauce, which is made with coconut milk, cashew pieces, and other seasonings, and then used to smother a stir-fried veggie mix. The finished result is bursting with flavor, but boasts plenty of health benefits, too: it’s naturally vegan (see recipe note), and high in fiber, making for a meal that will leave you and your taste buds feeling good.
In separate vessels (to preserve the unique flavors), steam the broccoli and carrots. Err on the side of slightly under-cooking them, as you will be adding them to a heated mixture later. Set to the side for the moment.
Heat the sesame oil in a wok or large skillet over medium-high heat. Fry the garlic until it begins to turn brown, and then add the mushrooms and eggplant pieces. Add more oil if needed.
Once the mushrooms and eggplant pieces have become crispy and hot, add the steamed vegetables. Toss to mix in a wok, or stir into your large skillet. Remove from heat.
Make the sauce. Combine all of the ingredients in a bowl. Whisk to combine. Taste, and adjust to your liking, adding more soy sauce if desired.
Add the sauce to the vegetable mixture, and place over medium-low heat. Bring to a simmer, stirring occasionally, until the vegetables are fully coated and the sauce becomes thick. It will be slightly more liquid if you decide not to use the cornstarch called for in the ingredients.
Enjoy over rice, with pasta, or all by its delicious, naturally vegan self!
If you’re craving meat or protein in your curry, that’s an easy addition. You can stir-fry 12 ounces of cubed chicken, pork, tofu, or beef to the fried garlic, then incorporate the mushrooms and eggplant once the meat is cooked in step 2 in the recipe below.
For an alternate source of protein, this recipe tastes great with an egg on top, too.
Don’t have rice wine vinegar? Liquid amino acids or cider vinegar will also do the trick, or you can simply add more soy sauce. The taste won’t be quite the same, but it will certainly still pass muster.
Don’t like the veggie mix featured in this recipe? Feel free to omit or substitute as you see fit. You can also just use the sauce part of the recipe and use it to top your meal of choice, be it chicken and rice or beef sautéed with broccoli.
To make this dish vegan-appropriate, make sure that your soy sauce is not processed with fish products. For those on a gluten-free diet, be sure to check that the ingredients you use for the sauce are all gluten-free.
Have you ever made a curry dish?
Make fragrant Indian curries at home!
Thanks for a yummy recipe. Made it the other night and everyone loved it. I did include about a pound of chicken. | https://shop.mybluprint.com/cooking/article/easy-homemade-curry-recipe/ |
Q:
Series problem - finding the a and d values from given terms
EDIT -
here's a screenshot of the question
Here's a shot of the answer
I'm trying to do a series problem and keep on going wrong. The question is :
$$\text{The sum of the first two terms of an arithmetic series is 47}$$
$$\text{The 13th term of this series is -62. Find:}$$
$$\text{a. the first term of the series and the common difference }$$
$$\text{b. the sum of the first 60 terms of the series}$$
So what I have tried is as follows :
The question has given the sum of the first two terms, so I should be able to use this as a series in itself, and say that :
$$a = a$$
$$n = 2$$
$$d = d$$
$$sum = 47$$
$$47 = 2a + d $$
Then looking at the other piece of information the 13th term is -62. So I know that it's going to be a negative common difference, and that -62 will be :
$$-62 = a + (n-1)d$$
$$-62 = a + 12d$$
I can then use simultaneous equations to solve for a and d.
$$\text{eq[1]: 47 = 2a + d} $$
$$\text{eq[2]: -62 = a + 12d} $$
$$\text{multiply equation 2 by 2 then calculate eq[1] - eq[2]}$$
$$\text{equation 3 : }2(eq[2]) = -124 = 2a + 24d$$
$$\text{then work out eq[1] - eq[3] which leaves :}$$
$$171 = 0a - 23d$$
$$\text{So I should be able to say that the value for d is }-\frac{171}{23}$$
But this answer is wrong, it also looks wrong. But that's just because it's not a nice number and the questions in my level usually have nice number answers, which probably isn't great logic going forwards but still.
I'm not sure what I'm doing wrong here, no doubt something very basic.
Thank you
A:
Actually the question is saying that the $30th$ element of the progression is $-62$.
For the record, I find ordinal numbers' names horribly confusing. In fact, I didn't even know that a thing such as thirtieth existed!
Taking this into account, we have the following system
$$\begin{cases}47 = 2a + d\\
-62 = a + 29d
\end{cases}$$
which indeed gives $a = 25$ and $d = -3$.
But remember: beyond the actual problem the most important thing is the method, and yours was working (albeit for a different version of the problem).
| |
Article Rating:
|May 26, 2011 03:00 PM EDT||
|
Reads:
|12,987|
An array of business intelligence (BI), predictive analytics, data and content mining, portals and more tap a growing volume of information sourced from enterprise data warehouses (EDW). However, significant volumes of business-critical enterprise data resides outside the enterprise data warehouse. To deliver the most comprehensive information to business decision-makers, IT teams are implementing data virtualization to preserve and extend their existing enterprise data warehouse investments.
This article discusses five integration patterns that combine both enterprise data warehouses and data virtualization to solve real business and IT problems along with examples from Composite Software's data virtualization customers. The five patterns include:
- Data Warehouse Augmentation
- Data Warehouse Federation
- Data Warehouse Hub and Virtual Data Mart Spoke
- Complementing the ETL Process
- Data Warehouse Prototyping
Maximizing Value from Enterprise Data Warehouse Investments
Supporting critical, yet ever-changing information requirements in an environment of ever-increasing data volumes and complexity is a challenge well understood by large enterprises and government agencies today.
This inexorable pressure has and will continue to drive the demand for enterprise data warehouses as an array of BI, predictive analytics, data and content mining, portals and other key applications rely on data sourced from enterprise data warehouses.
However, business change often outpaces enterprise data warehouse evolution. And while useful for physically consolidating and transforming a large portion of enterprise data, significant volumes of enterprise data resides outside the confines of the enterprise data warehouse. Further, enterprise data warehouses themselves require support throughout their lifecycles, driving demand for solutions that prototype, migrate, extend, federate and leverage enterprise data warehouse assets.
Data virtualization middleware, an advanced version of earlier data federation or enterprise information integration (EII) middleware, complements enterprise data warehouses by providing a range of flexible data integration techniques that preserve, extend and thereby drive greater business value from existing enterprise data warehouse investments.
1. Data Warehouse Augmentation
Organizations overwhelmed by scattered data silos and exponentially growing data volumes have deployed data warehouses to meet many of their reporting requirements. However, a number of data sources remain outside the warehouse. Providing users with complete business insight in support of revenue, cost and risk management goals often requires the following:
- Historical data from the warehouse and up-to-the-minute data from transaction systems or operational data stores;
- Summarized data from the warehouse and drill-down detail from transaction systems or operational data stores;
- Master customer, product or employee data from an MDM hub or warehouse and detail from transaction systems or operational data stores; and
- Internal data from the warehouse and external data from outside sources including cloud computing.
Data virtualization effectively federates data-warehouse information with additional sources, therefore extending existing data warehouse schemas and data. These complementary views are conducive to adding current data to historical warehouse data, detailed data to summarized warehouse data, and external data to internal warehouse data.
Energy Company Combines Up-to-the-minute and Historical Data - To optimize deployment of repair crews and equipment across more than 10,000 production oil wells, an energy company uses data virtualization to federate real-time crew, equipment and well status data from their wells and SAP's maintenance management system with historical surface, subsurface and business data from their enterprise data warehouse. The net result is faster repairs for more uptime and thus more revenue.
2. Data Warehouse Federation
A primary reason enterprises implement data warehouses is to overcome the various transaction and analytic system silos typical in most large enterprise and government agencies today. However, for a number of often pragmatic reasons, the single "enterprise" data warehouse remains elusive. Instead, for these same reasons, multiple data warehouses and data marts have been developed and deployed, in effect perpetuating, rather than overcoming, the data silo issue.
Optimizing business performance requires data from across these various warehouses and marts. But physically combining multiple marts and warehouses into a singular and complete enterprise-wide data warehouse is often too costly and time consuming.
Data virtualization federates multiple physical warehouses. Two examples include combining data from the sales and financial warehouses, or combining two sales data warehouses after a corporate merger. This approach achieves logical consolidation of warehouses by creating an integrated view across them, using abstraction to rationalize the different schema designs.
Investment Bank Federate Financial Trading Data Warehouses - To enable more flexible customer self-service reporting and meet SEC compliance reporting mandates, a prime brokerage uses data virtualization to federate equity, fixed income and other investment positions and trades information from siloed trading data warehouses. The net result is higher customer satisfaction and lower reporting costs.
3. Data Warehouse Hub and Virtual Spoke
A typical data warehouse pattern is a central data warehouse hub with satellite data marts as spokes around the hub. These marts use a subset of the warehouse data and are used by a subset of the data warehouse users. Sometimes these marts are created because the analytic tools require data in a different form than the warehouse. On the other hand, they may be created to work around the controls provided by the warehouse, and thus act as "rogue" data marts. Regardless of the reason, every additional mart adds cost and compromises data quality.
Data virtualization provides virtual data marts that eliminate, or at least significantly reduce, the need for physical data marts around the data warehouse hubs. This approach abstracts the warehouse data to meet specific consuming tool and user query requirements, while still preserving the quality and controls inherent in the data warehouse.
Mutual Fund Manager Eliminates "Rogue" Financial Data Marts - A mutual fund company uses data virtualization to enable more than 150 financial analysts to build portfolio analysis models with MATLAB® and other analysis tools leveraging a wide range of equity financial data from a 10 terabyte financial research data warehouse. Prior to introducing data virtualization, analysts frequently spawned new satellite data marts with useful data subsets for every new project. To accelerate and simplify data access and to stop the proliferation of costly, unnecessary physical marts, the firm instead used data virtualization to create virtual data marts formed from a set of robust, reusable views that directly accessed the financial warehouse on demand. This enables analysts to spend more time on analysis and less on access, thereby improving portfolio returns. The IT team has also eliminated extra, unneeded marts and all the costs that go with maintaining them.
4. Complementing the ETL Process
Extract, Transform, and Load (ETL) middleware is the tool of choice for loading data warehouses. However, there are some cases where ETL tools are not the most effective approach. Some examples include:
- ETL tools lack interfaces to easily access source data, for example data from packaged applications such as SAP or new technologies such as web services;
- Readily available, existing virtual views or data services can be reused rather than building new ETL scripts from scratch; and
- Tight batch windows require access, abstraction and federation activities to be pre-processed and virtually staged in advance of ETL processes.
ETL tools can leverage data virtualization views and data services as inputs to their batch processes, appearing as another data source. This integration pattern also integrates data source types that ETL tools cannot easily access as well as reuse existing views and services, saving time and costs. Further these abstractions do not require ETL developers to understand the structure of, or interact directly with, actual data sources, significantly simplifying their work and reducing time to solution.
Energy Company Preprocesses SAP Data - To provide the SAP financial data required for their financial data warehouse, an energy company uses data virtualization to access and abstract SAP R/3 FICO data. This replaces an error-prone, SAP data-expert-intensive, flat-file-extraction process that would not scale across a complex SAP landscape. The results include more complete and timely data in the financial data warehouse enabling better performance management.
5. Data Warehouse Prototyping
Building a new data warehouse from scratch is a large undertaking that requires significant design, development and deployment efforts. One of the biggest issues is schema change, a frequent activity early in a warehouse's lifecycle. This change process requires modification of both the ETL scripts and physical data in the warehouse and thus becomes a bottleneck that slows new warehouse deployments. This problem does not go away later in the lifecycle; it just lessens as the pace of change slows.
Data virtualization middleware can be the platform for prototype development environment for a new data warehouse. In this prototype stage, a virtual data warehouse is built, rather than a physical one, saving the time to build the physical warehouse. This virtual warehouse includes a full schema that is easy to iterate as well as a complete functional testing environment. Performance testing is somewhat constrained at this stage, however.
Once the actual warehouse is deployed, the views and data services built during the prototype stage still have value. These are useful for prototyping and testing subsequent warehouse schema changes that arise as business needs or underlying data sources change.
Government Agency Prototypes New Data Warehouses - To reduce data warehousing time-to-solution for new data warehouse projects and changes to existing ones, a government agency uses data virtualization. The time spent in getting the data right has proven to be four times faster than directly building the ETL and warehouse, even when the subsequent translation of these working views into ETL scripts and physical warehouse schemas is factored in.
Key Takeaways
As data sources proliferate, including many web-based and cloud computing sources outside the traditional enterprise data warehouse, enterprises and government agencies are deploying solutions that combine enterprise data warehouses and data virtualization to deliver the most comprehensive information to decision-makers. The results are extended life to existing information system investments, greater agility for adding new BI and other analytic technologies, and less disruption from corporate activities such as mergers and acquisitions.
SYS-CON Events announced today that 910Telecom will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Housed in the classic Denver Gas & Electric Building, 910 15th St., 910Telecom is a carrier-neutral telecom hotel located in the heart of Denver. Adjacent to CenturyLink, AT&T, and Denver Main, 910Telecom offers connectivity to all major carriers, Internet service providers, Internet backbones and ...
Jul. 27, 2016 11:00 AM EDT Reads: 666
SYS-CON Events announced today that LeaseWeb USA, a cloud Infrastructure-as-a-Service (IaaS) provider, will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. LeaseWeb is one of the world's largest hosting brands. The company helps customers define, develop and deploy IT infrastructure tailored to their exact business needs, by combining various kinds cloud solutions.
Jul. 27, 2016 10:30 AM EDT Reads: 1,207
Manufacturers are embracing the Industrial Internet the same way consumers are leveraging Fitbits – to improve overall health and wellness. Both can provide consistent measurement, visibility, and suggest performance improvements customized to help reach goals. Fitbit users can view real-time data and make adjustments to increase their activity. In his session at @ThingsExpo, Mark Bernardo Professional Services Leader, Americas, at GE Digital, discussed how leveraging the Industrial Internet a...
Jul. 27, 2016 09:45 AM EDT Reads: 431
The cloud market growth today is largely in public clouds. While there is a lot of spend in IT departments in virtualization, these aren’t yet translating into a true “cloud” experience within the enterprise. What is stopping the growth of the “private cloud” market? In his general session at 18th Cloud Expo, Nara Rajagopalan, CEO of Accelerite, explored the challenges in deploying, managing, and getting adoption for a private cloud within an enterprise. What are the key differences between wh...
Jul. 27, 2016 09:30 AM EDT Reads: 2,057
SYS-CON Events announced today that Venafi, the Immune System for the Internet™ and the leading provider of Next Generation Trust Protection, will exhibit at @DevOpsSummit at 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Venafi is the Immune System for the Internet™ that protects the foundation of all cybersecurity – cryptographic keys and digital certificates – so they can’t be misused by bad guys in attacks...
Jul. 27, 2016 09:15 AM EDT Reads: 1,352
The best-practices for building IoT applications with Go Code that attendees can use to build their own IoT applications. In his session at @ThingsExpo, Indraneel Mitra, Senior Solutions Architect & Technology Evangelist at Cognizant, provided valuable information and resources for both novice and experienced developers on how to get started with IoT and Golang in a day. He also provided information on how to use Intel Arduino Kit, Go Robotics API and AWS IoT stack to build an application tha...
Jul. 27, 2016 09:15 AM EDT Reads: 1,129
Amazon has gradually rolled out parts of its IoT offerings in the last year, but these are just the tip of the iceberg. In addition to optimizing their back-end AWS offerings, Amazon is laying the ground work to be a major force in IoT – especially in the connected home and office. Amazon is extending its reach by building on its dominant Cloud IoT platform, its Dash Button strategy, recently announced Replenishment Services, the Echo/Alexa voice recognition control platform, the 6-7 strategic...
Jul. 27, 2016 09:00 AM EDT Reads: 441
For basic one-to-one voice or video calling solutions, WebRTC has proven to be a very powerful technology. Although WebRTC’s core functionality is to provide secure, real-time p2p media streaming, leveraging native platform features and server-side components brings up new communication capabilities for web and native mobile applications, allowing for advanced multi-user use cases such as video broadcasting, conferencing, and media recording.
Jul. 27, 2016 08:45 AM EDT Reads: 919
IoT generates lots of temporal data. But how do you unlock its value? You need to discover patterns that are repeatable in vast quantities of data, understand their meaning, and implement scalable monitoring across multiple data streams in order to monetize the discoveries and insights. Motif discovery and deep learning platforms are emerging to visualize sensor data, to search for patterns and to build application that can monitor real time streams efficiently. In his session at @ThingsExpo, ...
Jul. 27, 2016 08:45 AM EDT Reads: 1,058
Verizon Communications Inc. (NYSE, Nasdaq: VZ) and Yahoo! Inc. (Nasdaq: YHOO) have entered into a definitive agreement under which Verizon will acquire Yahoo's operating business for approximately $4.83 billion in cash, subject to customary closing adjustments. Yahoo informs, connects and entertains a global audience of more than 1 billion monthly active users** -- including 600 million monthly active mobile users*** through its search, communications and digital content products. Yahoo also co...
Jul. 27, 2016 08:00 AM EDT Reads: 591
There will be new vendors providing applications, middleware, and connected devices to support the thriving IoT ecosystem. This essentially means that electronic device manufacturers will also be in the software business. Many will be new to building embedded software or robust software. This creates an increased importance on software quality, particularly within the Industrial Internet of Things where business-critical applications are becoming dependent on products controlled by software. Qua...
Jul. 27, 2016 06:30 AM EDT Reads: 1,470
In addition to all the benefits, IoT is also bringing new kind of customer experience challenges - cars that unlock themselves, thermostats turning houses into saunas and baby video monitors broadcasting over the internet. This list can only increase because while IoT services should be intuitive and simple to use, the delivery ecosystem is a myriad of potential problems as IoT explodes complexity. So finding a performance issue is like finding the proverbial needle in the haystack.
Jul. 27, 2016 04:45 AM EDT Reads: 2,274
Machine Learning helps make complex systems more efficient. By applying advanced Machine Learning techniques such as Cognitive Fingerprinting, wind project operators can utilize these tools to learn from collected data, detect regular patterns, and optimize their own operations. In his session at 18th Cloud Expo, Stuart Gillen, Director of Business Development at SparkCognition, discussed how research has demonstrated the value of Machine Learning in delivering next generation analytics to imp...
Jul. 27, 2016 04:30 AM EDT Reads: 2,503
Large scale deployments present unique planning challenges, system commissioning hurdles between IT and OT and demand careful system hand-off orchestration. In his session at @ThingsExpo, Jeff Smith, Senior Director and a founding member of Incenergy, will discuss some of the key tactics to ensure delivery success based on his experience of the last two years deploying Industrial IoT systems across four continents.
Jul. 27, 2016 04:00 AM EDT Reads: 1,567
The 19th International Cloud Expo has announced that its Call for Papers is open. Cloud Expo, to be held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, brings together Cloud Computing, Big Data, Internet of Things, DevOps, Digital Transformation, Microservices and WebRTC to one location. With cloud computing driving a higher percentage of enterprise IT budgets every year, it becomes increasingly important to plant your flag in this fast-expanding business opportuni...
Jul. 27, 2016 02:15 AM EDT Reads: 2,608
The Internet of Things will challenge the status quo of how IT and development organizations operate. Or will it? Certainly the fog layer of IoT requires special insights about data ontology, security and transactional integrity. But the developmental challenges are the same: People, Process and Platform. In his session at @ThingsExpo, Craig Sproule, CEO of Metavine, demonstrated how to move beyond today's coding paradigm and shared the must-have mindsets for removing complexity from the develo...
Jul. 27, 2016 02:15 AM EDT Reads: 1,471
Basho Technologies has announced the latest release of Basho Riak TS, version 1.3. Riak TS is an enterprise-grade NoSQL database optimized for Internet of Things (IoT). The open source version enables developers to download the software for free and use it in production as well as make contributions to the code and develop applications around Riak TS. Enhancements to Riak TS make it quick, easy and cost-effective to spin up an instance to test new ideas and build IoT applications. In addition to...
Jul. 27, 2016 12:00 AM EDT Reads: 1,948
IoT is rapidly changing the way enterprises are using data to improve business decision-making. In order to derive business value, organizations must unlock insights from the data gathered and then act on these. In their session at @ThingsExpo, Eric Hoffman, Vice President at EastBanc Technologies, and Peter Shashkin, Head of Development Department at EastBanc Technologies, discussed how one organization leveraged IoT, cloud technology and data analysis to improve customer experiences and effi...
Jul. 26, 2016 11:00 PM EDT Reads: 2,019
Internet of @ThingsExpo, taking place November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with the 19th International Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world and ThingsExpo Silicon Valley Call for Papers is now open.
Jul. 26, 2016 11:00 PM EDT Reads: 2,622
"We've discovered that after shows 80% if leads that people get, 80% of the conversations end up on the show floor, meaning people forget about it, people forget who they talk to, people forget that there are actual business opportunities to be had here so we try to help out and keep the conversations going," explained Jeff Mesnik, Founder and President of ContentMX, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY. | http://virtualization.sys-con.com/node/1849158 |
For the past decade, I’ve taken special delight in looking at, and drawing, insects.
It all started with a three-year artist residency at the Watershed Education Network, where I developed a place-based journal/sketching component for their stream ecology field trips, drew about 30 aquatic macroinvertebrate (small water-dwelling insects) illustrations for a wetland guide book, and helped develop a new logo and merchandise line.
Spending three years thinking carefully about the ecosystem role and scientific value of these insects instilled in me a deep curiosity and appreciation for insects in general.
Since then, I’ve gone out of my way to sketch moths, butterflies, beetles, and just about any other insect I can capture on the page before it scuttles or flutters or buzzes away.
So, I was excited to write an article about insects for National Pollinator week – and somewhat surprised to be reminded – by my research – that insects aren’t the only pollinators out there.
In the syndicated column, we take a closer look at a host of pollinators, their ecosystem roles and conservation challenges, and what we can do to create pollinator-friendly spaces, even in our back yards.
The following illustrations accompany the column, which is available to direct subscribers (new!) and publications running Drawn to the West as a syndicated column.
Below are the references I used to develop the pollinator article.
← June newsletter: Birds on the brain! | https://commnatural.com/2015/06/13/a-quick-look-at-insects-during-national-pollinator-week/ |
As we get older, it’s not unusual to find our memory isn’t as sharp as it used to be. We might struggle to concentrate for as long, and we may notice it’s harder to see the solutions to problems we’d once have solved in seconds. All of this is a normal part of aging: our cognitive capacities aren’t as strong as they once were, just as we can’t run as fast as we used to.
But that doesn’t mean we have to sit back and accept it. There is no known cure for progressive brain diseases like Alzheimer’s, but it is possible to slow the general decline of our mental faculties in the same way regular exercise keeps our body fitter for longer. And, as with physical fitness, maintaining brain health helps us to remain active and independent, manage the symptoms of anxiety and depression, and live fuller lives.
Exercise and Keep Physically Healthy
Physical health is directly connected to mental health; our brain is an organ like any other, and it works better when the circulatory, respiratory, and other systems it depends on are in the best possible condition. If you want a healthy brain, make sure that you:
- Take as much regular exercise as you can. Something as simple as a short walk every day can make a big difference. Even people who are bedridden can exercise with the right equipment.
- Eat a balanced diet. Your brain needs lots of energy, as well as the right mix of vitamins and nutrients.
Exercising and eating well are probably the most important activities you can do to promote brain health.
Get Enough Sleep
Bad sleep impacts cognitive performance in people of all ages, but it has an even bigger effect on seniors. If you don’t get enough sleep, you won’t be able to concentrate, your memory will deteriorate, and you’re more likely to suffer from mood disorders like depression and anxiety.
Even worse, if you don’t sleep well, you’re unlikely to have the energy or the motivation to do all the other activities that might make it easier to maintain brain health.
We’ve written extensively about how seniors can improve their sleep. To learn more, take a look at:
- What Is Good Sleep Hygiene for Someone Who Has Limited Mobility?
- Blankets and Pillows That Help You Sleep Better
- Are There Foods That Help You Sleep Better?
- Do Exercise, Yoga, and Meditation Help Sleep?
Keep Your Mind Occupied
The evidence suggests that keeping your mind active with intellectual pursuits has a beneficial effect on several areas of brain health, including emotional health and cognitive functions like memory and concentration. But what does “keep your mind active” mean?
As you research brain health, you may come across “brain training” and similar exercises purported to help with brain health and cognitive abilities. There is some evidence that they work, but they are unlikely to be as effective as more active and engaging activities. If you enjoy doing them, there’s no reason to stop, but they aren’t a substitute for other types of mental stimulation, including:
- Maintaining your social life. Complex social interactions—which can be as simple as a regular chat with friends—exercise many of the most important aspects of our brains, including memory, emotions, and concentration. In addition to which, they help us to remain connected to the world around us, to stay physically active, and to avoid the loneliness and isolation that can cause depression and anxiety.
- Take up a new hobby. Learning something new—whether it’s gardening, art, a language, or something else—stimulates a broad range of brain functions. It’s fun and interesting too, and, in many cases, it provides an opportunity for physical exercise.
- Reading. Reading a good novel or a non-fiction book is a mental workout. You’ll exercise your memory, your ability to visualize, and your ability to empathize with other people.
In this article, we’ve suggested three main techniques for promoting brain health: physical fitness, sleep, and mental stimulation. However, you may want to consult a medical professional if you notice a significant decrease in brain health in yourself or a loved one. A doctor can offer advice and treatment to help people with poor memory and concentration who struggle to carry out everyday tasks. | https://www.transfermaster.com/how-to-promote-brain-health-for-healthy-senior-living |
Urban reforestation is the practice of planting trees, typically on a large scale, in urban environments. It sometimes includes also urban horticulture and urban farming. Reasons for practicing urban reforestation include urban beautification, increasing shade, modifying the urban climate, improving air quality, and restoration of urban forests after a natural disaster.
Large scale urban reforestation programs include New York City's Million Tree Initiative, and TreePeople in Los Angeles, which planted 1 million trees in preparation for the 1984 Summer Olympics and continued planting thereafter.
Grassroots efforts include Friends of the Urban Forest in San Francisco which advocates the planting of street trees and the Urban Reforestation organization in Australia, which focuses on sustainable living in urban places.
Urban reforestation efforts compete for money and urban land that could be used for other purposes. For example, effort placed in planting new trees can take away from maintenance of already established trees.
^ a b c d e Gary Moll, Sara Ebenreck (1989). Shading Our Cities: A Resource Guide For Urban And Community Forests. Island Press. ISBN 9780933280953.
^ a b Green thumbs and high-rise ambitions, The Age, June 11, 2010, See also urbanreforestation.com website.
^ Lisa L. Burban, John W. Anderson (1996). Storms Over the Urban Forest: Planning, Responding, and Regreening - A Community Guide to Natural Disaster Relief. DIANE Publishing. ISBN 9780788129483.
^ a b Corso, Phil. "Avella opposes mayor’s Million Trees effort". TimesLedger. Retrieved 31 January 2013. | http://research.omicsgroup.org/index.php/Urban_reforestation |
Eight cases of paralytic poliomyelitis were reported for 1984; one patient, a recipient of OPV, had onset of illness in 1982. Of the seven cases with onset in 1984, six were classified as endemic: three patients were recipients of OP one was a household contact of an OPV recipient, and one was an immune-deficient, non-household contact of an OPV recipient. One case was classified as not vaccine-associated. This patient had a history of contact with an OPV recipient who had been vaccinated 69 days before. A vaccine-related poliovirus was isolated from this patient. Vaccine-related polioviruses were also isolated from two of the OPV recipients, the household contact, and the immune-deficient patient. The one imported case occurred in a patient whose illness began outside the country.
'A case is defined as vaccine-associated when contact with an OPV recipient occurs within 30 days before onset of illness, and onset of illness occurs 4-60 days after administration of OPV to recipient.
PSITTACOSIS – Cases, by year, United States, 1955-1984
The number of reported cases of psittacosis (172 cases in 1984) appears to have stabilized for the past 7 years at a level about double that for the 1960s. Although most reported cases were associated with exposure to pet birds, outbreaks among employees of the turkeyprocessing industry accounted for many of the human cases reported in 1974, 1976, 1981, and 1984.
RABIES – Cases in wild and domestic animals, by year, United States, 1965-1984
Three cases of human rabies were reported in 1984. Two cases (Texas, Pennsylvania) occurred in children with no known history of exposure to a rabid animal. The third case involved a Guatemalan exposed in Guatemala and diagnosed in California.
There were 5,627 reported cases of animal rabies in the United States and Puerto Rico in 1984, a decline of 301 cases from 1983. Fewer rabies cases were reported for most species.
RABIES 1984
Reported cases in animals, by area and species of animal, United States,
|| مات . اا اا ه اا ایہاا ه ه ا ااااه
MN
ا ا ا د د د
1
1,810
6. 1100
12 208 41 27 67 200 149
ہو نہ یہ ی ه اه اه ااه
19
و ایم ایم ا|ایم ا
-ها- 0 ما
78
مایہ نہ |
||| ابها
ة اايي |||||
RUBELLA (German measles) – Rates, by yoar, United States, 1966-1984
REPORTED CASES PER 100,000 POPULATION
REPORTED CASES (THOUSANDS)
20
15
80 01
YEAR
10
5
0
YEAR
In 1984, the total of 752 cases of rubella reported in the United States was the lowest since rubella became a nationally notifiable disease in 1966. The represents a decrease of 22.5% from the 1983 total of 970 cases and a 98.7% decline from 1969, the year of rubella vaccine licensure. The reported incidence for 1984 is 0.32 cases/100,000 population.
Twelve states and the District of Columbia reported no rubella cases in 1984, compared with 14 reporting areas in 1983. The number of counties reporting rubella continued to decline from 284 (9.0%) in 1983 to 219 (7.0%) in 1984. | https://books.google.co.ke/books?id=so0gAAAAMAAJ&pg=RA2-PA11&focus=viewport&dq=related:ISBN0857490168&lr=&output=html_text |
To ask the Minister for Justice and Equality if she believes that the present arrangements for investigations into Garda Síochána whistleblowing allegations are sufficiently robust, given the present ongoing cases; and if she will make a statement on the matter.
Read More
Dáil Questions on Defence -Defence Forces in Mali, Lariam, White Paper on Defence, Israeli arms imports, EU Battlegroups
2015
Minister for Defence Simon Coveney was up on Tuesday for questions, Clare asked him a few, The suggestion that Irish troops are deployed to Mali was among them as well as a question about import and export of arms with Israel and the Irish Army’s continued use of the controversial drug Larium which can have very serious side effects. See replies below:
To ask the Minister for Defence the merits he envisage in Irish Defence Forces personnel being deployed to Mali to relieve French troops, given the history of that country.
– Deputy Clare Daly.
Read More
Defence Questions – Defence Forces in Mali
2015
Clare questioned the Minister on the appropriateness of sending Irish troops to Mali under 42.7 of the Lisbon Treaty, which states that the rule ‘shall not prejudice the specific character of member states’ Ireland is under no obligation to send troops. It is clearly better that the best thing Ireland can do is to remain neutral. | http://claredaly.ie/tag/neutrality/page/5/ |
Lake Compounce in Bristol has decided to close its SkyRide permanently, a spokesperson for the park confirmed Wednesday.
Park officials said they made the decision because there is limited access to the area and rugged terrain due to the mountain.
The move comes not long after a teenager was hurt falling out of a similar style ride at a upstate New York amusement park.
Sara Frias, a spokesperson for the park, issued the following statement on the matter:
“Due to the rugged terrain of the mountain and the limited access to the remote area, Lake Compounce has decided to close the SkyRide attraction permanently.
We look forward to utilizing the loading zone area for future attractions in the coming years to continue to bring unforgettable fun to America's longest continuously operating amusement park.”
The ride took visitors on a leisurely ride up over Southington Mountain in a ski-lift like chair and then descended. | https://www.nbcconnecticut.com/news/local/lake-compounce-permanently-closes-skyride/17738/ |
DENVER — On the same day that the Colorado Public Utilities Commission (PUC) gave energy companies a March 5 deadline to explain their high-price purchases of natural gas this month, Xcel Energy sent an email warning customers about an increase in natural gas rates.
The two are not related.
The PUC, which regulates utility companies, is investigating the efforts energy companies in Colorado made to have customers conserve before buying natural gas at sky-high prices, as a result of the winter storm in Texas and elsewhere in the country.
Xcel recently told investors that electricity and natural gas costs increased $650 million in February. Xcel plans to work with the PUC on to have customers pay back that cost over time.
RELATED: Energy regulators investigate if Coloradans were charged inflated prices during Texas power crisis
The email about an increase in natural gas rates had nothing to do with that.
It is about an increase to the fee Xcel charges, the "Pipeline System Integrity Adjustment rider" (PSIA).
"The notice customers received this week is to let them know that we have requested an extension of that existing Rider that was set to expire at the end of this year," said Xcel spokeswoman Michelle Aguayo.
Xcel provided a link for more information in the email, except it doesn't direct the customer to content about the PSIA rider. It takes customers to a general site about regulatory filings. You have to know what you're looking for on the page to learn more about the natural gas rate increase request.
"If you follow the link that is in the notice, it's kind of difficult to pull the pleadings up, you have to look for the case number," said Bresee Carlson, an oil and gas attorney with Kuiper Law Firm.
Carlson is also an adjunct oil and gas professor at Western Colorado University in Gunnison.
"This particular notice relates to a 2002 federal statute that mandated certain upgrades and infrastructure investments for pipeline safety improvements," said Carlson.
Customers have actually been paying this fee since 2012.
The current fee for residential customers is $3.10 per month.
The requested increase is to move to $3.85 per month for 2022, $4.27/month for 2023 and $4.67/month for 2024.
The breakdown is listed in the documents provided to the PUC, but not included in the body of the email.
The 2022 increase would be $9 more per year for residential customers. If the PUC approves the extension, the 2024 amount is $18.84 more per year than customers pay currently.
"To your point about wanting to put or summarize utility-related costs and operations into layman's terms, they absolutely could have done that for their customers and chose not to," said Carlson.
Xcel is also waiting for a PUC decision on a "Wildfire Protection Rider."
It's a fee that would be added to customer bills for upgrades to Xcel's infrastructure in wildland-urban interface areas, to reduce risk of ignition from poles, wires and pipelines.
PG&E in California pleaded guilty to 84 counts of manslaughter after its equipment caused the Camp Fire in Paradise, CA, killing at least 84 people and destroying 14,000 homes.
Former 9NEWS reporter Brandon Rittiman has investigated that fire for our sister station in Sacramento.
Xcel's "Wildfire Protection Rider" would be a fee to upgrade infrastructure to prevent a catastrophe like the Camp Fire.
According to Xcel, in 2021, a residential customer's bill would increase 49 cents per month, for a total of almost $6 a year. | https://www.9news.com/article/news/local/next/xcels-rate-hike-natural-gas-february-2021/73-d3467456-5e17-4c57-89ff-3d1eeed247c6 |
Mergers and acquisitions (M&A) are transactions in which the ownership of companies, other business organizations, or their operating units are transferred or consolidated with other entities. As an aspect of strategic management, M&A can allow enterprises to grow or downsize, and change the nature of their business or competitive position.
Merger
From a legal point of view, a merger is a legal consolidation of two entities into one, whereas an acquisition occurs when one entity takes ownership of another entity’s stock, equity interests or assets. From a commercial and economic point of view, both types of transactions generally result in the consolidation of assets and liabilities under one entity, and the distinction between a “merger” and an “acquisition” is less clear. A transaction legally structured as an acquisition may have the effect of placing one party’s business under the indirect ownership of the other party’s shareholders, while a transaction legally structured as a merger may give each party’s shareholders partial ownership and control of the combined enterprise. A deal may be euphemistically called a merger of equals if both CEOs agree that joining together is in the best interest of both of their companies, while when the deal is unfriendly (that is, when the management of the target company opposes the deal) it may be regarded as an “acquisition”.
Acquisition
An acquisition/takeover is the purchase of one business or company by another company or other business entity. Specific acquisition targets can be identified through myriad avenues including market research, trade expos, sent up from internal business units, or supply chain analysis. Such purchase may be of 100%, or nearly 100%, of the assets or ownership equity of the acquired entity. Consolidation/ amalgamation occurs when two companies combine to form a new enterprise altogether, and neither of the previous companies remains independently. Acquisitions are divided into “private” and “public” acquisitions, depending on whether the acquiree or merging company (also termed a target) is or is not listed on a public stock market. Some public companies rely on acquisitions as an important value creation strategy. An additional dimension or categorization consists of whether an acquisition is friendly or hostile.
“Acquisition” usually refers to a purchase of a smaller firm by a larger one. Sometimes, however, a smaller firm will acquire management control of a larger and/or longer-established company and retain the name of the latter for the post-acquisition combined entity. This is known as a reverse takeover. Another type of acquisition is the reverse merger, a form of transaction that enables a private company to be publicly listed in a relatively short time frame. A reverse merger occurs when a privately held company (often one that has strong prospects and is eager to raise financing) buys a publicly listed shell company, usually one with no business and limited assets.
The combined evidence suggests that the shareholders of acquired firms realize significant positive “abnormal returns” while shareholders of the acquiring company are most likely to experience a negative wealth effect. The overall net effect of M&A transactions appears to be positive: almost all studies report positive returns for the investors in the combined buyer and target firms. This implies that M&A creates economic value, presumably by transferring assets to management teams that operate them more efficiently.
There are also a variety of structures used in scouring control over the assets of a company, which have different tax and regulatory implications:
- The buyer buys the shares, and therefore control, of the target company being purchased. Ownership control of the company in turn conveys effective control over the assets of the company, but since the company is acquired intact as a going concern, this form of transaction carries with it all of the liabilities accrued by that business over its past and all of the risks that company faces in its commercial environment.
- The buyer buys the assets of the target company. The cash the target receives from the sell-off is paid back to its shareholders by dividend or through liquidation. This type of transaction leaves the target company as an empty shell, if the buyer buys out the entire assets. A buyer often structures the transaction as an asset purchase to “cherry-pick” the assets that it wants and leave out the assets and liabilities that it does not. This can be particularly important where foreseeable liabilities may include future, unquantified damage awards such as those that could arise from litigation over defective products, employee benefits or terminations, or environmental damage. A disadvantage of this structure is the tax that many jurisdictions, particularly outside the United States, impose on transfers of the individual assets, whereas stock transactions can frequently be structured as like-kind exchanges or other arrangements that are tax-free or tax-neutral, both to the buyer and to the seller’s shareholders.
The terms “demerger”, “spin-off” and “spin-out” are sometimes used to indicate a situation where one company splits into two, generating a second company which may or may not become separately listed on a stock exchange.
Documentation/ Process of M & A
The documentation of an M&A transaction often begins with a letter of intent. The letter of intent generally does not bind the parties to commit to a transaction, but may bind the parties to confidentiality and exclusivity obligations so that the transaction can be considered through a due diligence process involving lawyers, accountants, tax advisors, and other professionals, as well as business people from both sides.
After due diligence is complete, the parties may proceed to draw up a definitive agreement, known as a “merger agreement”, “share purchase agreement” or “asset purchase agreement” depending on the structure of the transaction. Such contracts are typically 80 to 100 pages long and focus on five key types of terms:
- Conditions, which must be satisfied before there is an obligation to complete the transaction. Conditions typically include matters such as regulatory approvals and the lack of any material adverse change in the target’s business.
- Representations and warranties by the seller with regard to the company, which are claimed to be true at both the time of signing and the time of closing. Sellers often attempt to craft their representations and warranties with knowledge qualifiers, dictating the level of knowledge applicable and which seller parties’ knowledge is relevant. Some agreements provide that if the representations and warranties by the seller prove to be false, the buyer may claim a refund of part of the purchase price, as is common in transactions, involving privately held companies (although in most acquisition agreements involving public company targets, the representations and warranties of the seller do not survive the closing). Representations regarding a target company’s net working capital are a common source of post-closing disputes.
- Covenants, which govern the conduct of the parties, both before the closing (such as covenants that restrict the operations of the business between signing and closing) and after the closing (such as covenants regarding future income tax filings and tax liability or post-closing restrictions agreed to by the buyer and seller parties).
- Termination rights, which may be triggered by a breach of contract, a failure to satisfy certain conditions or the passage of a certain period of time without consummating the transaction, and fees and damages payable in case of a termination for certain events (also known as breakup fees).
- Provisions relating to obtaining required shareholder approvals under state law and related SEC filings required under federal law, if applicable, and terms related to the mechanics of the legal transactions to be consummated at closing (such as the determination and allocation of the purchase price and post-closing adjustments (such as adjustments after the final determination of working capital at closing or earnout payments payable to the sellers), repayment of outstanding debt, and the treatment of outstanding shares, options and other equity interests).
- An indemnification provision, which provides that an indemnitor will indemnify, defend, and hold harmless the indemnitee(s) for losses incurred by the indemnitees as a result of the indemnitor’s breach of its contractual obligations in the purchase agreement.
Post-closing, adjustments may still occur to certain provisions of the purchase agreement, including the purchase price. These adjustments are subject to enforceability issues in certain situations. Alternatively, certain transactions use the ‘locked box’ approach where the purchase price is fixed at signing and based on seller’s equity value at a pre-signing date and an interest charge. | https://wandofknowledge.com/mergers-and-acquisitions-ma-meaning-documentation-process/ |
Ethical considerations for sleep intervention in organizational psychology research.
Over the past several years, interest into the role of sleep in the workplace has grown. The theoretical shift from research questions examining sleep as an outcome to placing sleep as the independent variable has increased experimental approaches to manipulating sleep in organizational studies. This is an exciting trend that is likely to continue in the organizational sciences. However, sleep experimentation can also pose special challenges for organizational researchers unaccustomed to sleep science. In this commentary, I discuss five ethical considerations of conducting negative sleep interventions in organizational psychology research. I also provide recommendations for organizational researchers-or even other researchers in disciplines outside of sleep science-who wish to implement sleep interventions in their studies.
| |
Quick academic help
Don't let the stress of school get you down! Have your essay written by a professional writer before the deadline arrives.
A Quick Guide to Writing Learning Objectives
The number of words can be the criterion that we use to evaluate students but it won't affect the nature of how well students described how to maintain common electrical test equipment. According to the three principles for adding criteria, this learning objective can be revised to
Bloom's Taxonomy - Designing Activities tutorial developed by Colorado Community Colleges Online describes a variety of activities at each level of the revised Bloom's Taxonomy. You may refer to it when writing your own learning objectives. It can help you align your activity with a specific level of cognitive development process.
Objectives for Writing an Essay | The Pen and The Pad
education. - John Dewey’s influence on American education research papers explore the impact and the philosophy about education and his institutions. - Kinesthetic intelligence research papers examine one of the multiple intelligences catagories developed by Howard Gardner. - Kinesthetic learning style is one of the three learning styles that allows a student to learn through moving, touching and doing, rather than seeing or listening. - Knowledge construction is an active process by which individuals incorporate new content into their existing cognitive frameworks, formulating new conclusions and pieces of evidence as a result. - Kolb’s theory states that although every person has a favorite learning style they are able to use all styles that are offered to them. - Research papers latent learning discuss the type of learning where individuals learned without the introduction of reinforcement of principles - Research papers on learning skills discuss one of the most valuable services that any teacher can provide their students to propagate lifelong learning and critical thinking. - Learning objectives research papers examine how many learning objectives follow Bloomâs Taxonomy of educational objectives.
- Albert Bandura’s Social Learning Theory uses traditional learning and development theories to take a step forward towards a comprehensive understanding of how children learn. - Auditory learning style is one of the three learning styles that allows a student to learn through listening, rather than seeing or acting out. - Albert Bandura’s Observational Theory identifies three basic models: live, verbal instructional, and symbolic. - Bandura is best known for his research surrounding social learning and the social learning theory. - Bloomâs Taxonomy research papers analyze the educational learning objectives first outlined by a committee of educators led by Benjamin Bloom in 1956. - Blooms Taxonomy of Educational Objectives research papers discuss the framework used for categorizing learning targets according to domain and level of complexity.
An essay does more than inform or persuade a reader
Please take a look at the example below which includes a well-written learning objective, a learning activity and an assessment. They are all in alignment.
You probably know what a paragraph looks like in a written work. It is an organized grouping of lines offset from another grouping of lines. But why is it formatted this way? A writer groups a series of lines together to show that they are related. Just as the salt belongs on the spice shelf, certain sentences belong in certain paragraphs.
Why choose our assistance?
-
UNMATCHED QUALITY
As soon as we have completed your work, it will be proofread and given a thorough scan for plagiarism.
-
STRICT PRIVACY
Our clients' personal information is kept confidential, so rest assured that no one will find out about our cooperation.
-
COMPLETE ORIGINALITY
We write everything from scratch. You'll be sure to receive a plagiarism-free paper every time you place an order.
-
ON-TIME DELIVERY
We will complete your paper on time, giving you total peace of mind with every assignment you entrust us with.
-
FREE CORRECTIONS
Want something changed in your paper? Request as many revisions as you want until you're completely satisfied with the outcome.
-
24/7 SUPPORT
We're always here to help you solve any possible issue. Feel free to give us a call or write a message in chat.
Writing Measurable Learning Objectives - TeachOnline
This learning objective includes all of the three major components. It is specific, measurable, and clearly stated. We can easily tell what students are expected to do and what should be taught based on this learning objective. This lesson will teach students how to use the College's online library databases to find books and articles they need. To teach students this skill, we should demonstrate how to use the databases that are available through the College's online library to find reliable resources. When it is time to assess students' mastery of this learning objective, we can give students a topic and have them find at least one book and one scholarly article related to the given topic via the College's online library databases.
When writing an objective essay/paper, try to follow these tips:
Don't fret, once you get started, you can always change formats if the format you chose isn't working out for you.
The following are useful steps for developing a diagram to organize ideas for your essay.
Writing Service Learning Objectives
The teacher should be prepared to allow extra time for students struggling to produce this essay. The teacher might share how each hand symbolized something significant from their own life to help them identify a topic for their own writing. During the writing process, the teacher should constantly suggest strategies for writing a clear, supported essay that grabs the attention of the reader.
Creating Writing Assignments: Taxonomy of Learning Objectives
Writing Learning Objectives: Beginning With The End In Mind: This presentation clearly explained the differences between learning objectives and learning goals, the three components of an ideal learning objective, and how to write specific and measurable learning objectives.
Writing Learning Objectives Powerpoint Essay - 316 …
If your essay is intended to be informative or explain (analytical), write the major categories into which information can be divided.
The following are useful steps for developing an outline to organize ideas for your essay.
How it works
-
You submit your order instructions
-
We assign an appropriate expert
-
The expert takes care of your task
-
We send it to you upon completion
Our achievements
-
37 684
Delivered orders
-
763
Professional writers
-
311
Writers online
-
4.8/5
Average quality score
Students’ reviews
-
Kim
"I have always been impressed by the quick turnaround and your thoroughness. Easily the most professional essay writing service on the web."
-
Paul
"Your assistance and the first class service is much appreciated. My essay reads so well and without your help I'm sure I would have been marked down again on grammar and syntax."
-
Ellen
"Thanks again for your excellent work with my assignments. No doubts you're true experts at what you do and very approachable."
-
Joyce
"Very professional, cheap and friendly service. Thanks for writing two important essays for me, I wouldn't have written it myself because of the tight deadline."
-
Albert
"Thanks for your cautious eye, attention to detail and overall superb service. Thanks to you, now I am confident that I can submit my term paper on time."
-
Mary
"Thank you for the GREAT work you have done. Just wanted to tell that I'm very happy with my essay and will get back with more assignments soon." | http://decontaminationgear.com/learning-objectives-for-essay-writing.html |
re: Do tattoos influence the probability of getting hired? VIEW POST
re: I agree with the first statement, the type of tattoo can indeed have a strong influence here. About implications, I really want to live in a world...
Oh, I absolutely agree! It would be nice if we lived in a world where people don't look at outward appearance to judge someone. Unfortunately, that's not the world we have, and it doesn't look like we'll be changing the whole of mankind anytime soon. Thus, while we ourselves can choose to focus on character and skill instead of appearance, we should still consider how others may view us, and weigh whether the potential consequences of that are strong enough to bear our own consideration in how we present ourselves. | https://practicaldev-herokuapp-com.global.ssl.fastly.net/codemouse92/comment/3lih |
Jun 10, 2018 - National Geographic Orion
As the sun timidly rose behind clouds, National Geographic Orion arrived at one of the best kept secret of French Polynesia, the enchanted Huahine Islands. With so much publicity about the likes of Bora Bora and Moorea, Huahine is not as visited, but it will cast a spell over you from the moment you arrive. Lush forests, untamed landscape, picturesque villages, tropical beaches and colorful reefs are all part of the scenery. Relatively untouched by the modern world, the island offers the unhurried and more serene pace of old Polynesia. Huahine was one of the first islands to be colonized by the ancient Polynesians, with records dating back to the 9th century AD. There seemed to be something special about this place to the ancient Polynesians, as Huahine has the largest concentration of ancient temples, marae, in all of French Polynesia. While Raiatea is home to the most important marae, the ones in Huahine are a lot more diverse. Once the home of Tahitian royalty, Huahine is considered the cradle of Polynesian culture. This is not surprising, as Huahine is gifted with a rich and fertile soil providing bountiful harvests and is surrounded by plentiful and generous seas. Huahine’s secluded nature and natural beauty enchanted and charmed us all.
Join us for updates, insider reports & special offers. | https://www.expeditions.com/daily-expedition-reports/186189/ |
Getting in front of people to give a talk is not easy for many. Some even say they fear public speaking more than they fear death. However, speaking in public is easier than you might think, especially if you focus on the strongest subject matter for you. Equally as important is having a clear message, and making sure you keep it to the allowed time.
Over the past few months, I have attended meetings, conferences, commencements, workshops, and seminars. These experiences have provided opportunities to observe speakers in action. Some were excellent, others were mediocre, and a few not so good. To be effective, you must focus both on your message, and the ability to engage your audience. In other words, the audience should dictate your approach.
Here are three things you should avoid when speaking before an audience:
#1: Tell them you were just recently given this speaking assignment.
A big turn-off for the audience is when the speaker says the following: “Okay! I hope this goes well. My boss told me yesterday I had to do this!” While that comment might seem humorous, it’s unprofessional. The audience is excited to hear your message, and it’s your job to step up to the plate.
You might be asked to speak with little lead-time, and it’s your responsibility to deliver an excellent message. You shouldn’t seek sympathy from anyone. Regardless of the time you have to prepare, do the best you can. More important, avoid communicating to the audience that you are unprepared.
#2: Spend too much time reading from the script.
It’s acceptable to have notes when you speak. I usually jot down the key points that will be discussed, and fill in the rest of the talk with personal and professional experiences. I understand there are times when you must read every word from the script, such as an important announcement from a company president. However, most speeches do not require a verbatim delivery.
I’m unsure of the science, but I do know that you lose the audience’s attention when you look down to read your notes. If you read more than a sentence before re-establishing eye contact, it might be a long speech.
#3: The speech turns into a lecture.
I know very few people who want to be told what to do, especially in public. You should also avoid making others feel inferior. The fact is that most people are looking for knowledge and information that will makes them better, and not necessarily for reasons why they have fallen behind.
It’s better to focus on how they can identify and overcome obstacles. The message can be forthright, but the speaker must ensure the delivery is positive, encouraging, and professional. In other words, you don’t want them to feel like losers. You want hope.
There are many options available to improve your public speaking skills, including a university class or Toastmasters International. However, you can make improvements on your own.
Good advice includes speaking about a subject on which you are an expert, using a bullet list to recall main items, maintaining excellent eye contact, meeting the timeframe, and most importantly, making your audience feel important. | http://www.blog.koolderby.com/3-things-avoid-delivering-speech/ |
Dr. Todd Shurn is an associate professor in the Computer Science program at Howard University. He earned his Bachelor’s (1983) and Master’s (1984) of science in industrial and operations engineering from the University of Michigan. He went on to earn a Ph.D. in computer science and engineering from Southern Methodist University in 1994. Dr. Shurn’s specialties include interactive applications, computational optimization and engineering and computer science entrepreneurship amongst many others. His research includes games, service oriented programming, agriculture applications, and immersive applications. Dr. Shurn has taught various subjects at the Howard University School of Communications and computer science program, such as video game development, interactive multimedia applications and discrete structures.
Dr. Shurn had many early influences and life-shaping moments. He explained that he is from Benton Harbor, Mich., a predominately black city that was taken over by the state of Michigan. Benton Harbor has a very high crime and unemployment rate. He explained that he did not want to be in a position where he was a part of the negative entities that surrounded him in his community. Thus, he strived to acquire a skill that would allow him to define his own way. That is what led him to computer science. Making sure that he was in a position to define his own way despite his surroundings is what affects his decisions still today. Dr. Shurn also explained that the reason why he came to Howard was to work with black students and be a part of the movement of empowering the community to have better representation in computer science fields, whether it was games, blockchain, interactive media etc.
Dr. Shurn explained the necessary qualities that are important for a developer to have are commitment to finishing the job, resourcefulness and confidence in your skill set. That’s because, when developing original software, there is always the question of rather or not your goal is accomplishable in the first place. Thus, those qualities are important to reach your end goal. In addition, Dr. Shurn mentioned that he appreciated the creative side of software deployment and that it enables opportunities for the black community to create jobs within the community, due to the many areas where software is deployable.
One of Dr. Shurns current projects involves blockchain technology. Merriam-Webster defines a blockchain as “a digital database containing information (such as records of financial transactions) that can be simultaneously used and shared with a large decentralized, publicly-accessible network.” Dr. Shurn mentioned the Black Blockchain Summit, which was recently held at Howard University. The summit’s website states that the purpose of the summit is to “convene Blockchain technology developers, entrepreneurs, and enthusiasts to present Blockchain applicants for solving challenges worldwide. The objective of the summit is to find innovative and lasting solutions that disrupt the unsustainable status quo, bringing lasting prosperity and independence as envisaged by freedom fighters and liberators in the ‘Arusha Declaration.’ ” Dr. Shurn gave much insight about the implications of blockchain.
Dr. Shurn explained that one of the utilities of the blockchain is that it creates an immutable record that parties can agree to. For example, if there is a land transaction, that transaction can be documented in a blockchain in a way that is indisputable. It is unchangeable and its validation is not dependent on any particular government or political organization. This notion, particularly in underdeveloped countries is major because you can, for example, stake out a deed for land or another resource and no one can dispute the transaction because the transaction is documented on computers around the world. Blockchain does not even allow users to pull documented transactions off their own systems. However, if that was to occur, the rest of the users in the network would still have the record. A possible con of blockchain technology is due to the fact that blockchain transactions cannot be changed. So if someone executes a transaction that they are not satisfied with, there is no way to undo it. The only possibility is to do another transaction. Thus, proper procedures and guidelines to ensure the accuracy and integrity of a transaction before entering must be established. When asked if he thought the implication was positive to use blockchain for transactions such as voting and taxes, he agreed and added that another major notion for blockchain deployment is using the technology to track nuclear material (waste and material for weapons). Another aspect that Dr. Shurn mentioned that made blockchain especially notable for undeveloped and African countries was its ability to transfer currency that it is not controlled by any one government or bank. The digital currency bitcoin for example is the same all around the world. Thus, governments cannot repress citizens with measures such as raising the cost of a product or not making something available. Dr. Shurn explained that it was relatively the equivalent of providing the ability to make international purchases and have the products sent to you.
Another project that Dr. Shurn is currently working on is “Smart Cities”, which is a system in which sensors are put in roadways that interact with cars and in waterways that identify pollution. Dr. Shurn explained that a current major emphasis in development is developing code around real-time sense-data, which means that inexpensive sensors can be deployed (in the ground, water systems, the air etc.) and decisions can be made in order to control what is desired to be controlled. For example, low-cost sensors programmed with software that can read water levels and pollution to control gates in a sewer system can be deployed to improve optimal water flow and to ensure that the treatment center is getting the most polluted water first. The Smart Cities concept involves computer science, electrical engineering and mechanical engineering.
Dr. Shurn explained that he is an avid reader and participant in workshops and conferences to keep up with the constantly changing and evolving field of technology. When asked if he came across any problems or challenges in his computer science journey, he explained that he did not consider his challenge to be a problem but an opportunity. The broad domain of information technology (database, cyber security, network optimization, artificial intelligence, human computer interface etc.) makes it somewhat challenging to identify a core expertise. Dr. Shurn made some decisions in terms of the skill set within that space that he wanted to develop, which was network optimization (logistics, optimization, getting data from point a to point b efficiently, etc.).
In closing, a last message from Dr. Shurn for individuals who might be interested in the field of computer science was to reiterate the idea of identifying an area of specialization. In addition, he encouraged showing initiative by participating in competitions, which is very important (rather it is cyber security, robotics, programming, steel bridge design and other design competitions etc.). This is a means to test your creative skills and try to develop it as much as possible to solve problems. Lastly, for communications students, Dr. Shurn advised that learning how to code makes a communications student more employable. In addition, because technology is so heavily involved in the field of journalism, many reporters have to know how to interact with content management systems and conduct their own data analysis. Thus, Dr. Shurn shared with me that a major Journalism outlet views reporting as more of a data analysis type of endeavor, compiling data from various sources. Due to this, he has experienced that particular journalism company often recruit people from the computer science department at Howard, because their idea is they can teach the computer science student the journalism skills on the job. I had a very insightful conversation with Dr. Shurn. | https://webdevclass.greglinch.com/tag/black-blockchain/ |
Impact of binding interaction characteristics on physicochemical, structural, and rheological properties of waxy rice flour.
Impact of covalent and non-covalent binding interactions on physicochemical, structural, and rheological properties of waxy rice flour were investigated using several typical types of chemicals. Dynamic rheometer was used to investigate the viscoelastic properties and resistance to deformation or shearing. Both hydrogen bonds and hydrophobic interactions were necessary for waxy rice flour to form a material with stable structure matrix. Besides this, X-ray diffraction pattern and pasting property measurements showed that the relative crystallinity and pasting viscosity values of waxy rice flour exposed to SDS and l-cysteine treatments increased whereas those of urea decreased compared with the control. Addition of acid, alkali, and NaCl might result in electrostatic forces, ion interactions, and indirectly change hydrogen bonds and hydrophobic interactions between starch and protein, which played a synthetic role on property changes of waxy rice flour.
| |
Molecular electrostatic potentials and hydrogen bonding in alpha-, beta-, and gamma-cyclodextrins.
Cyclodextrins (CDs) are cyclic oligomers of glucose having the toroid of sugars elaborating a central cavity of varying size depending on the number of glucoses. The central hydrophobic cavity of CD shows a binding affinity toward different guest molecules, which include small substituted benzenes to long chain surfactant molecules leading to a variety of inclusion complexes when the size and shape complementarity of host and guest are compatible. Further, interaction of guest molecules with the outer surface of alpha-CD has also been observed. Primarily it is the electrostatic interactions that essentially constitute a driving force for the formation of inclusion complexes. To gain insights for these interactions, the electronic structure and the molecular electrostatic potentials in alpha-, beta-, and gamma-CDs are derived using the hybrid density functional theory employing the three-parameter exchange correlation functional due to Becke, Lee, Yang, and Parr (B3LYP). The present work demonstrates how the topography of the molecular electrostatic potential (MESP) provides a measure of the cavity dimensions and understanding of the hydrogen-bonded interactions involving primary and secondary hydroxyl groups. In alpha-CD, hydrogen-bonded interactions between primary -OH groups engender a "cone-like" structure, while in beta- or gamma-CD the interactions from the primary -OH with ether oxygen in glucose ring facilitates a "barrel-like" structure. Further, the strength of hydrogen-bonded interactions of primary -OH groups follows the rank order alpha-CD > beta-CD > gamma-CD, while the secondary hydrogen-bonded interactions exhibit a reverse trend. Thus weak hydrogen-bonded interactions prevalent in gamma-CD manifest in shallow MESP minima near hydroxyl oxygens compared to those in alpha- or beta-CD. Furthermore, electrostatic potential topography reveals that the guest molecule tends to penetrate inside the cavity forming the inclusion complex in beta- or gamma-CD.
| |
Headaches are common in pregnancy. They are more common in the first trimester (0-13 weeks) or third trimester (27-40 weeks). Read more about the causes of headaches during pregnancy, how to treat them and when to seek help.
Headaches are common in pregnancy. They are more common in the first trimester (0 to 13 weeks) or third trimester (27 to 40 weeks).
Headaches can be unpleasant for you but are not dangerous for your baby. They can be a sign that you need to get checked out by your GP, midwife or obstetrician. It's important to be aware of what to look out for.
If you suffer from migraine headaches, you may find you get migraines more often or less often when you are pregnant.
Speak with your GP or pharmacist before taking your usual migraine medications.
Some medicines, including painkillers, can harm your baby's health.
Paracetamol is generally considered safe during pregnancy. Always check the packaging for the correct amount of tablets to take, and how often you may take them.
If you find you need to take paracetamol for more than a couple of days, you may need to speak to your GP.
Ibuprofen is sometimes recommended for headaches during pregnancy. You can only take this at certain times during your pregnancy. Always check with your GP, pharmacist or obstetrician before taking ibuprofen.
Check with your GP, pharmacist or midwife before taking any medication.
Tell your doctor or midwife if you often have bad headaches. It could be a sign of a more serious problem. | https://www2.hse.ie/conditions/child-health/headaches-in-pregnancy.html |
Surviving COVID-19 - Black Women’s Health Imperative
Facts about COVID-19, self-care tips, parenting during the pandemic, grocery shopping tips and more.
COVID-19 Resources - Black Legal Action Centre
Free legal services and other helpful resources for low or no income Black residents living in Ontario.
8 Mental Health Practices for People of African Descent while Isolated - Medium
Coping skills and practical tips to maintain good mental health.
Black & Well TV - Black Women’s Health Imperative [Video]
Video episodes on how to remain well during the COVID-19 pandemic, high risk health conditions, sexual health, relationships.
Managing Anxiety about Coronavirus, Session #145 - Therapy for Black Girls [Podcast]
Weekly chat about mental health and personal development.
Mental Health & Addictions Support for Racialized Communities - Across Boundaries
Holistic mental health and addictions services for racialized communities.
Copyright © - University Health Network. All rights reserved. | https://guides.hsict.library.utoronto.ca/c.php?g=716817&p=5123669 |
CROSS REFERENCE TO RELATED APPLICATIONS
BACKGROUND OF THE INVENTION
BRIEF DESCRIPTION OF THE INVENTION
DETAILED DESCRIPTION OF THE INVENTION
(1) First Embodiment
(2) Second Embodiment
This application claims the benefit of Japanese Patent Application No. 2009-264851 filed Nov. 20, 2009, which is hereby incorporated by reference in its entirety.
The present invention relates to a magnetic resonance imaging apparatus which performs a calibration scan and an imaging scan.
As a method for imaging a subject using a magnetic resonance imaging apparatus, there have been known ASSET (Array Spatial Sensitivity Encoding Technique) corresponding to one parallel imaging method and PURE (Phased array UnifoRmity Enhancement) corresponding to one sensitivity correction technology (refer to Japanese Unexamined Patent Publication No. 2008-099974).
When imaging is performed by ASSET or PURE, it is necessary to prepare calibration data for correcting image data acquired by an actual scan. Generally, the calibration data can be obtained by performing a calibration scan for acquiring calibration data each time the imaging is executed by ASSET or PURE. This method is however accompanied by a problem that each time the imaging is performed by ASSET or PURE, an operator needs to set a condition for performing a calibration scan, and hence a burden is placed on the operator.
It is desirable that the problem described previously is solved.
A first aspect of the invention is a magnetic resonance imaging apparatus which executes a calibration scan for acquiring calibration data used to correct image data of a subject and an imaging scan for acquiring the image data of the subject and receives magnetic resonance signals using combinations of coil elements selected out of a plurality of coil elements, including: calibration scan condition determining device for determining a scan condition for the calibration scan, based on a first scan range of the subject taken when the imaging scan is executed and a first combination of coil elements used to receive magnetic resonance signals in the first scan range.
In some embodiments, a condition for a calibration scan is determined based on a first scan range at an imaging scan and a first combination of coil elements. Accordingly, an operator needs not to manually set the condition for the calibration scan, and hence a burden on the operator is lightened.
Further aspects of the present invention will be apparent from the following description of the preferred embodiments of the invention as illustrated in the accompanying drawings.
FIG. 1
is a magnetic resonance imaging apparatus according to a first embodiment of the invention.
1
2
3
4
41
The magnetic resonance imaging apparatus (hereinafter called “MRI (Magnetic Resonance Imaging) apparatus”) has a magnetic field generator , a table , a cradle , a coil device , etc.
2
21
13
22
23
24
22
23
24
13
The magnetic field generator has a bore in which a subject is accommodated, a superconductive coil , a gradient coil and an RF coil . The superconductive coil generates a static magnetic field BO and the gradient coil applies a gradient magnetic field. Further, the RF coil transmits an RF pulse and receives each magnetic resonance signal of the subject as needed.
3
4
13
4
21
13
21
The table is provided with the cradle with the subject placed thereon. The cradle is moved into the bore to thereby convey the subject within the bore .
41
4
4
13
41
4
a
h
The coil device has a plurality of coil elements through for receiving the magnetic resonance signals of the subject . The coil device is placed in a position determined in advance with respect to the cradle .
1
5
6
7
8
9
10
11
12
The MRI apparatus further has a sequencer , a transmitter , a gradient magnetic field power supply , a receiver , a database , a central processing unit , an input device and a display device .
10
5
7
Under the control of the central processing unit , the sequencer transmits information (center frequency, bandwidth and the like) about an RF pulse and sends information (strength of gradient magnetic field, etc.) about a gradient magnetic field to the gradient magnetic field power supply .
6
24
5
The transmitter drives the RF coil , based on the information transmitted from the sequencer .
7
23
5
The gradient magnetic field power supply drives the gradient coil , based on the information sent from the sequencer .
8
41
10
The receiver signal-processes each magnetic resonance signal received by the coil device and transmits it to the central processing unit .
9
5
FIGS. 3(
a
b
The database stores therein sensitive regions (refer to ) through ()) to be described later.
10
1
1
8
10
5
10
10
10
FIG. 6
The central processing unit controls the operations of respective parts of the MRI apparatus so as to implement various operations of the MRI apparatus such as reconstruction of an image based on each signal received from the receiver , etc. Further, the central processing unit determines whether a calibration scan (refer to Step S of to be described later) to be described later should be executed. When it is determined that the calibration scan is executed, the central processing unit decides a scan range at the calibration scan and further selects a combination of coil elements used to receive magnetic resonance signals in the scan range. The central processing unit includes, for example, a computer. Incidentally, the central processing unit is one example of a calibration scan condition determining device in the invention and functions as this device by executing a predetermined program.
11
10
14
12
The input device inputs various instructions to the central processing unit according to the operations of an operator . The display device displays various information thereon.
1
The MRI apparatus is configured as described above.
4
4
41
13
13
4
4
4
4
a
h
a
h
a
h
The coil elements through of the coil device will next be described. In the first embodiment, when the magnetic resonance signals of the subject are received, the combinations of the coil elements suited to receiving the magnetic resonance signals of the subject are selected out of the eight coil elements through . However, the combinations of the coil elements selectable out of the eight coil elements through have been determined in advance. The combinations of the selectable coil elements will be explained below.
FIG. 2
is a diagram for describing the combinations of the selectable coil elements.
1
10
1
4
4
a
b
In the first embodiment, ten combinations Set through Set are prepared as the combinations of the selectable coil elements. For instance, the combination Set of the coil elements includes the two coil elements and .
FIGS. 3A-3D
4
4
5
5
1
10
, A-D, A and B are respectively diagrams for explaining sensitive regions of the combinations Set through Set of the coil elements.
1
1
1
1
1
1
1
4
9
FIG. 3A
For instance, the sensitive region CR of the combination Set is shown in . The sensitive region CR is of a region considered to have sensitivity enough for the combination Set to acquire a high-quality MR image. The range of the sensitive region CR is determined based on the sensitivity characteristic of the combination Set, which has been examined in advance. Information about the position of the sensitive region CR relative to the cradle has been stored in the database .
1
1
2
10
2
10
9
While the sensitive region CR of the combination Set has been explained in the above description, information about the positions of the sensitive regions CR through CR of other combinations Se through Set have also been stored in the database .
1
10
1
10
The sensitive regions CR through CR of the combinations Set through Set have been defined as described above.
13
A flow used when the subject is imaged will next be explained.
FIG. 6
FIG. 6
FIGS. 7 through 17
1
13
is a diagram showing a processing flow of the MRI apparatus when the subject is imaged. Incidentally, when describing , it will be explained referring to as needed.
1
13
FIG. 7
At Step S, the subject is placed on the cradle (refer to ).
FIG. 7
13
is a diagram showing the manner in which the subject is placed on the cradle.
13
13
13
2
After the subject has been placed thereon, the subject is conveyed within the bore. After the subject has been conveyed within the bore, the processing flow proceeds to Step S.
2
14
13
FIG. 8
At Step S, the operator develops a scan plan when the subject is scanned (refer to ).
FIG. 8
is a diagram showing one example of a display screen at the time that a scan plan is drawn out.
13
1
3
1
3
1
2
3
1
3
FIG. 8
The names of imaging scans executed to acquire image data of the subject are displayed in the upper left columns C through C of the display screen. In , the names of the imaging scans displayed in the columns C through C are respectively taken as “imaging scan IS”, “imaging scan IS” and “imaging scan IS” for convenience of explanation. These imaging scans IS through IS are different in the conditions such as an imaging section and the like, but are scans all carried out by a parallel imaging method.
14
1
1
14
1
1
1
1
1
2
13
The operator first sets a scan condition for the imaging scan IS. When the scan condition for the imaging scan IS is set, the operator clicks the column C. When the column C is clicked, a condition input screen for inputting the scan condition related to the imaging scan IS is displayed in the upper right and lower part of the display screen. A positioning image IM for performing the positioning of each slice is displayed in the upper right of the display screen. A coil element selection button D for selecting coil elements used in the imaging scan IS, an orientation/posture set button D for inputting the orientation and posture of the subject , etc. are displayed in the lower part of the display screen.
14
11
1
1
1
1
1
FIG. 1
FIG. 8
The operator operates the input device (refer to ) while referring to the positioning image IM to thereby input each slice to the positioning image IM. shows the manner in which slices K though Kn are inputted to the positioning image IM. In the first embodiment, the slices K through Kn are axial sections but may be other sections. A range surrounded by the slices K through Kn becomes a scan range SR at the imaging scan IS.
1
14
1
4
4
3
3
4
4
1
10
14
1
1
10
1
14
8
1
10
14
1
8
1
10
a
h
FIG. 1
FIGS. 2
FIG. 8
After the slices K through Kn have been set, the operator selects the corresponding combination of coil elements suited to receiving magnetic resonance signals of the slices K through Kn out of the coil elements through (refer to ). In the first embodiment, as shown in , A-D, and A-D, the combinations of the selectable coil elements have been determined in advance (combinations Set through Set of coil elements). Thus, the operator selects the corresponding combination of coil elements suited to receiving the magnetic resonance signals of the slices K through Kn out of the combinations Set through Set of the coil elements. Now, assume that when the imaging scan IS is executed, the operator has judged that the combination Set of the coil elements is most suitable within the combinations Set through Set. Thus, the operator clicks the coil element selection button D (refer to ) and thereby selects the combination Set of the coil elements out of the combinations Set through Set. Incidentally, the combination of the coil elements may be selected automatically.
14
2
13
13
13
2
2
13
FIG. 9A
FIG. 9H
The operator operates the orientation/posture set button D to input the orientation and posture of the subject taken when the subject is placed on the cradle. The orientation and posture of the subject are displayed in the orientation/posture set button D. Each time the orientation/posture set button D is clicked, the orientations and postures of the subject corresponding to eight patterns are displayed (refer to through ).
FIG. 9A
FIG. 9H
13
2
through are diagrams showing the patterns of the orientations and postures of the subject , each of which is displayed in the orientation/posture set button D.
13
13
13
13
13
13
14
2
13
13
13
FIG. 8
In the first embodiment, the orientations and postures of the subject are divided into eight patterns (a) through (h). In the patterns (a) through (d), the orientation of the subject is set in such a manner that the head thereof faces in a z direction (leg portion thereof faces in a-z direction), whereas the posture of the subject assumes a face-up, a lateral orientation (left side thereof is placed down), a face-down and a lateral orientation (right side thereof is placed down). In the patterns (e) through (h), the orientation of the subject is set in such a manner that the leg portion thereof faces in the z direction (head thereof faces in the −z direction), whereas the posture of the subject assumes a face-up, a lateral orientation (left side is placed down), a face-down and a lateral orientation (right side is placed down). In the present embodiment, since the orientation and posture of the subject belong to the pattern (a), the operator causes the orientation/posture set button D (refer to ) to display the orientation and posture of the subject corresponding to the pattern (a). It is thus possible to input the orientation and posture of the subject when the subject is placed on the cradle.
14
1
Further, the operator also sets other scan conditions such as a slice thickness, etc. where necessary. It is thus possible to input the scan condition for the imaging scan IS.
1
14
1
1
1
3
After the scan condition for the imaging scan IS has been inputted, the operator clicks a scan execution button E to perform the imaging scan IS. After the scan execution button E has been clicked, the processing flow proceeds to Step S.
3
10
1
6
1
10
4
At Step S, the central processing unit determines whether it is necessary to correct image data obtained by the imaging scan IS by calibration data indicative of a sensitivity distribution of each coil element. When it is determined that there is no need to correct it by the calibration data, the processing flow proceeds to Step S, where the imaging scan IS is executed. On the other hand, when it is determined by the central processing unit that there is a need to correct it by the calibration data, the processing flow proceeds to Step S.
1
8
1
1
4
4
8
10
1
4
FIG. 8
FIG. 4D
a
f
In the first embodiment, the imaging scan IS corresponds to the scan using the parallel imaging technique for receiving each magnetic resonance signal using the combination Set of the coil elements (refer to button D of ). Accordingly, the image data acquired by the imaging scan IS needs to be corrected by calibration data indicative of respective sensitivity distributions of the six coil elements through (refer to ) contained in the combination Set of the coil elements. Therefore, the central processing unit determines that the image data obtained by the imaging scan IS needs to be corrected by the calibration data, and the processing flow proceeds to Step S.
4
10
11
11
11
FIG. 1
At Step S, the central processing unit (refer to ) decides a scan condition for a calibration scan Sca executed to acquire calibration data. Described concretely, it decides the combination of coil elements for receiving the magnetic resonance signals generated by execution of the calibration scan Sca and the scan range taken when the calibration scan Sca is performed. A description will be made below of how the combination of the coil elements and the scan range are determined.
11
(1) A method for determining the combination of the coil elements at the calibration scan Sca:
11
1
1
8
1
10
8
11
FIG. 8
The combination of the coil elements used in the calibration scan Sca should be identical to that of coil elements used in the imaging scan IS. At the imaging scan IS, the combination Set of the coil elements is used (refer to button D of ). Accordingly, the central processing unit determines that the magnetic resonance signals are received using the combination Set of the coil elements at the calibration scan Sca.
11
(2) A method for determining the scan range taken when the calibration scan Sca is performed:
11
1
1
14
11
1
1
14
FIG. 8
FIG. 10
The scan range for the calibration scan Sca needs to include the entire scan range SR (refer to the positioning image IM of ) at the imaging scan IS, which has been set by the operator . Thus, the scan range for the calibration scan Sca is set to include the entire scan range SR at the imaging scan IS, which has been set by the operator (refer to ).
FIG. 10
11
is a diagram showing the scan range for the calibration scan Sca.
FIG. 10
1
1
11
1
1
1
1
1
1
8
8
11
1
1
1
1
11
1
1
11
In , two scan ranges V and V′ are respectively shown as the scan range for the calibration scan Sca. The scan range V′ is set so as to include only the scan range SR for the imaging scan IS. On the other hand, the scan range V is set so as to include both of the scan range SR for the imaging scan IS and the sensitive region CR of the combination Set of the coil elements. Since the scan range for the calibration scan Sca may include the entire scan range SR for the imaging scan IS, either of the scan ranges V and V′ may be set as the scan range for the calibration scan Sca. In the first embodiment, the description of the scan range V will be continued assuming that the scan range V is adopted as the scan range for the calibration scan Sca.
8
11
1
5
The combination Set of the coil elements at the calibration scan Sca, and the scan range V are determined Other scan conditions are also determined as needed. Thereafter, the processing flow proceeds to Step S.
5
11
4
11
1
1
8
10
1
4
4
8
1
FIG. 10
FIG. 10
a
f
At Step S, the calibration scan Sca is performed in accordance with the scan condition determined at Step S. At the calibration scan Sca, the scan range V (refer to ) is scanned. Magnetic resonance signals from the scan range V are received by the combination Set of the coil elements. The central processing unit calculates calibration data CAL indicative of respective sensitivity distributions of the six coil elements through (refer to ) configuring the combination Set, based on the received magnetic resonance signals. The calculated calibration data CAL is stored in association with the following information (1) through (3):
8
11
(1) Combination Set of coil elements used in calibration scan Sca,
11
(2) Orientation and posture of subject at calibration scan Sca (pattern (a)), and
1
11
(3) Scan range V at calibration scan Sca.
FIG. 11
1
1
6
schematically shows the manner in which the calibration data CAL and the above information (1) through (3) are associated with one another. After the calibration data CAL has been stored in association with the above information (1) through (3), the processing flow proceeds to Step S.
6
1
1
1
8
14
1
5
1
7
FIG. 11
At Step S, the imaging scan IS is performed. At the imaging scan IS, the corresponding magnetic resonance signals of the slices K through Kn are received using the combination Set of the coil elements in accordance with the condition set by the operator . Thereafter, image data is generated based on the received magnetic resonance signals, and the generated image data is corrected using the calibration data CAL (refer to ) determined at Step S. It is thus possible to acquire a high-quality MR image. After the execution of the imaging scan IS, the processing flow proceeds to Step S.
7
8
At Step S, it is determined whether all imaging scans are executed. When it is determined that all the imaging scans have been executed, the processing flow is terminated. On the other hand, when it is determined that all the imaging scans have not yet been executed, the processing flow proceeds to Step S.
1
3
1
2
3
8
FIG. 8
In the first embodiment, there is a need to perform the three imaging scans IS through IS (refer to ). The imaging scan IS has been executed, but other two imaging scans IS and IS have not yet been executed. Accordingly, the processing flow proceeds to Step S.
8
14
2
At Step S, the operator develops a scan plan at the imaging scan IS.
FIG. 12
12
is a diagram showing one example of a display screen when the scan plan at the imaging scan IS is developed.
14
11
1
1
1
2
2
FIG. 1
FIG. 12
The operator operates the input device (refer to ) while referring to the positioning image IM and thereby inputs slices to the positioning image IM. The manner in which slices K′ through Kn′ are inputted to the positioning image IM is shown in . In the first embodiment, the slices K′ through Kn′ are oblique sections but may be other sections. A range surrounded by the slices K′ through Kn′ becomes a scan range SR at the imaging scan IS.
1
14
1
4
4
3
3
4
4
5
5
1
10
14
1
1
10
2
14
10
1
10
14
1
10
1
10
a
h
FIG. 1
FIGS. 2
After the slices K′ through Kn′ have been set, the operator selects the corresponding combination of coil elements suited to receiving magnetic resonance signals of the slices K′ through Kn′ out of the coil elements through (refer to ). In the first embodiment, as shown in , A-D, A-D, A and B, the combinations of the selectable coil elements have been determined in advance (combinations Set through Set of coil elements). Thus, the operator selects the corresponding combination of coil elements suited to receiving the magnetic resonance signals of the slices K′ through Kn′ out of the combinations Set through Set of the coil elements. Now, assume that when the imaging scan IS is executed, the operator has judged that the combination Set of the coil elements is most suitable within the combinations Set through Set. Thus, the operator clicks the coil element selection button D and thereby selects the combination Set of the coil elements out of the combinations Set through Set.
14
2
13
13
13
14
2
13
13
13
The operator operates the orientation/posture set button D to input the orientation and posture of the subject when the subject is placed on the cradle. In the first embodiment, since the orientation and posture of the subject are given as the pattern (a), the operator causes the orientation/posture set button D to display the orientation and posture of the subject corresponding to the pattern (a). It is thus possible to input the orientation and posture of the subject when the subject is placed on the cradle.
14
2
Further, the operator also sets other scan conditions such as a slice thickness, etc. where necessary. It is thus possible to input the scan condition for the imaging scan IS.
2
14
1
2
1
9
After the scan condition for the imaging scan IS has been inputted, the operator clicks a scan execution button E to perform the imaging scan IS. After the scan execution button E has been clicked, the processing flow proceeds to Step S.
9
10
2
6
2
10
10
At Step S, the central processing unit determines whether it is necessary to correct image data obtained by the imaging scan IS by calibration data indicative of a sensitivity distribution of each coil element. When it is determined that there is no need to correct it by the calibration data, the processing flow proceeds to Step S, where the imaging scan IS is executed. On the other hand, when it is determined by the central processing unit that there is a need to correct it by the calibration data, the processing flow proceeds to Step S.
2
10
1
2
4
4
10
10
2
10
FIG. 12
FIG. 5B
a
h
In the first embodiment, the imaging scan IS corresponds to the scan using the parallel imaging technique for receiving each magnetic resonance signal using the combination Set of the coil elements (refer to button D of ). Accordingly, the image data acquired by the imaging scan IS needs to be corrected by calibration data indicative of respective sensitivity distributions of the eight coil elements through (refer to ) contained in the combination Set of the coil elements. Therefore, the central processing unit determines that the image data obtained by the imaging scan IS needs to be corrected by the calibration data, and the processing flow proceeds to Step S.
10
1
2
11
2
FIG. 11
At Step S, it is determined whether the already-acquired calibration data CAL (refer to ) is of calibration data usable to correct the image data obtained by the imaging scan IS. In order to carry out this determination, the scan condition for the calibration scan Sca and the scan condition for the imaging scan IS are compared with each other.
FIG. 13
11
2
is a diagram in which the scan condition for the calibration scan Sca and the scan condition for the imaging scan IS are compared with each other.
10
11
2
At Step S, the scan condition for the calibration scan Sca and the scan condition for the imaging scan IS are compared with each other. It is determined whether the result of comparison satisfies the following conditions.
11
2
(Condition 1) The combination of the coil elements used when the calibration scan Sca is executed is the same as the combination of the coil elements used when the imaging scan IS is executed.
13
11
13
2
(Condition 2) The orientation and posture of the subject at the time that the calibration scan Sca is executed, and the orientation and posture of the subject at the time that the imaging scan IS is executed, are the same.
13
11
13
2
(Condition 3) The scan range of the subject at the time that the calibration scan Sca is executed includes the scan range of the subject at the time that the imaging scan IS is executed.
2
1
11
2
1
3
1
11
2
4
FIG. 13
When any one of the above conditions is not satisfied, the image data acquired by the imaging scan IS cannot be corrected by the calibration data CAL acquired by the calibration scan Sca. It is understood that referring to , “the condition ” is satisfied but “the condition ” and “the condition ” are not satisfied. It is thus determined that the calibration data CAL acquired by the calibration scan Sca cannot be used for the correction of the image data acquired by the imaging scan IS. The processing flow is returned to Step S.
4
12
2
12
12
At Step S, a scan condition for a calibration scan Sca executed to acquire calibration data suitable for the imaging scan IS is determined Described concretely, a combination of coil elements for receiving magnetic resonance signals generated by execution of the calibration scan Sca and a scan range taken when the calibration scan Sca is performed are determined A description will be made below of how the combination of the coil elements and the scan range are determined.
12
(1) As to a method for determining the combination of the coil elements at the calibration scan Sca:
12
2
2
10
1
10
10
12
FIG. 12
The combination of the coil elements used in the calibration scan Sca should be identical to that of the coil elements used in the imaging scan IS. At the imaging scan IS, the combination Set of the coil elements is used (refer to button D of ). Accordingly, the central processing unit determines that the magnetic resonance signals are received using the combination Set of the coil elements at the calibration scan Sca.
12
(2) As to a method for determining the scan range taken when the calibration scan Sca is performed:
12
2
2
14
12
2
2
14
FIG. 12
FIG. 14
The scan range for the calibration scan Sca needs to include the entire scan range SR (refer to the positioning image IM of ) at the imaging scan IS, which has been set by the operator . Thus, the scan range for the calibration scan Sca is set so as to include the entire scan range SR at the imaging scan IS, which has been set by the operator (refer to ).
FIG. 14
12
is a diagram showing the scan range for the calibration scan Sca.
FIG. 14
2
2
12
2
2
2
2
2
2
10
10
12
2
2
2
2
12
2
2
12
In , two scan ranges V and V′ are respectively shown as the scan range for the calibration scan Sca. The scan range V′ is set so as to include only the scan range SR for the imaging scan IS. On the other hand, the scan range V is set so as to include both of the scan range SR for the imaging scan IS and the sensitive region CR of the combination Set of the coil elements. Since the scan range for the calibration scan Sca may include the entire scan range SR for the imaging scan IS, either of the scan ranges V and V′ may be set as the scan range for the calibration scan Sca. In the first embodiment, the description of the scan range V will be continued assuming that the scan range V is adopted as the scan range for the calibration scan Sca.
10
12
2
5
The combination Set of the coil elements at the calibration scan Sca, and the scan range V are determined. Other scan conditions are also determined as needed. Thereafter, the processing flow proceeds to Step S.
5
12
4
12
2
2
10
10
2
4
4
10
2
FIG. 14
FIG. 14
a
h
At Step S, the calibration scan Sca is performed in accordance with the scan condition determined at Step S. At the calibration scan Sca, the scan range V (refer to ) is scanned. Magnetic resonance signals from the scan range V are received by the combination Set of the coil elements. The central processing unit calculates calibration data CAL indicative of respective sensitivity distributions of the eight coil elements through (refer to ) configuring the combination Set of the coil elements, based on the received magnetic resonance signals. The calibration data CAL is stored in association with the following information (1) through (3):
10
12
(1) Combination Set of coil elements used in calibration scan Sca,
12
(2) Orientation and posture of subject at calibration scan Sca (pattern (a)), and
2
12
(3) Scan range V at calibration scan Sca.
FIG. 15
2
2
6
schematically shows the manner in which the calibration data CAL and the above information (1) through (3) are associated with each other. After the calibration data CAL has been stored in association with the above information (1) through (3), the processing flow proceeds to Step S.
6
2
2
1
10
14
2
5
2
7
FIG. 15
At Step S, the imaging scan IS is performed. At the imaging scan IS, the corresponding magnetic resonance signals of the slices K′ through Kn′ are received using the combination Set of the coil elements in accordance with the condition set by the operator . Thereafter, image data is generated based on the received magnetic resonance signals, and the generated image data is corrected using the calibration data CAL (refer to ) determined at Step S. It is thus possible to acquire a high-quality MR image. After the execution of the imaging scan IS, the processing flow proceeds to Step S.
7
1
3
1
2
3
8
FIG. 8
At Step S, it is determined whether all imaging scans are executed. In the first embodiment, there is a need to execute the three imaging scans IS through IS (refer to ). The imaging scans IS and IS have been executed, but the imaging scan IS has not yet been executed. Accordingly, the processing flow proceeds to Step S.
8
14
3
At Step S, the operator develops a scan plan at the imaging scan IS.
FIG. 16
13
is a diagram showing one example of a display screen when the scan plan at the imaging scan IS is developed.
14
11
1
1
1
3
3
FIG. 1
FIG. 16
The operator operates the input device (refer to ) while referring to the positioning image IM and thereby inputs slices to the positioning image IM. The manner in which slices K″ through Kn″ are inputted to the positioning image IM is shown in . In the first embodiment, the slices K″ through Kn″ are coronal sections but may be other sections. A range surrounded by the slices K″ through Kn″ becomes a scan range SR at the imaging scan IS.
1
14
1
4
4
4
4
5
5
6
8
1
10
14
1
1
10
3
14
8
1
10
14
1
8
1
10
a
h
FIG. 1
FIGS. 3A-3D
After the slices K″ through Kn″ have been set, the operator selects the corresponding combination of coil elements suited to receiving magnetic resonance signals of the slices K″ through Kn″ out of the coil elements through (refer to ). In the first embodiment, as shown in , A-D, A and B, and -, the combinations of the selectable coil elements have been determined in advance (combinations Set through Set of coil elements). Thus, the operator selects the corresponding combination of coil elements suited to receiving the magnetic resonance signals of the slices K″ through Kn″ out of the combinations Set through Set of the coil elements. Now, assume that when the imaging scan IS is executed, the operator has judged that the combination Set of the coil elements is most suitable within the combinations Set through Set. Thus, the operator clicks a coil element selection button D and thereby selects the combination Set of the coil elements out of the combinations Set through Set.
14
2
13
13
13
14
2
13
13
13
The operator operates an orientation/posture set button D to input the orientation and posture of the subject when the subject is placed on the cradle. In the first embodiment, since the orientation and posture of the subject are given as the pattern (a), the operator causes the orientation/posture set button D to display the orientation and posture of the subject corresponding to the pattern (a). It is thus possible to input the orientation and posture of the subject when the subject is placed on the cradle.
14
3
Further, the operator also sets other scan conditions such as a slice thickness, etc. as needed. It is thus possible to input the scan condition for the imaging scan IS.
3
14
1
3
1
9
After the scan condition for the imaging scan IS has been inputted, the operator clicks a scan execution button E to perform the imaging scan IS. After the scan execution button E has been clicked, the processing flow proceeds to Step S.
9
10
3
3
8
1
3
4
4
8
10
3
10
FIG. 16
FIG. 4D
a
f
At Step S, the central processing unit determines whether it is necessary to correct image data obtained by the imaging scan IS by calibration data indicative of a sensitivity distribution of each coil element. In the first embodiment, the imaging scan IS is a scan using a parallel imaging technique for receiving each magnetic resonance signal using the combination Set of the coil elements (refer to button D of ). Thus, the image data obtained by the imaging scan IS needs to be corrected by the corresponding calibration data indicative of the respective sensitivity distributions of the six coil elements through (refer to ) contained in the combination Set. Therefore, the central processing unit determines that it is necessary to correct the image data acquired by the imaging scan IS by the calibration data, and the processing flow proceeds to Step S.
10
1
2
3
11
12
3
FIGS. 11 and 15
At Step S, it is determined whether the already-acquired calibration data CAL and CAL (refer to ) are respectively of calibration data usable to correct the image data obtained by the imaging scan IS. In order to perform this determination, the scan conditions for the calibration scans Sca and Sca, and the scan condition for the imaging scan IS are compared with each other.
FIG. 17
11
12
3
is a diagram in which the scan conditions for the calibration scans Sca and Sca and the scan condition for the imaging scan IS are compared with each other.
10
11
12
3
At Step S, the scan conditions for the calibration scans Sca and Sca and the scan condition for the imaging scan IS are compared with each other. It is determined whether the result of comparison satisfies the following conditions.
11
12
3
(Condition 1) The combination of the coil elements used when the calibration scan Sca or Sca is executed is the same as the combination of the coil elements used when the imaging scan IS is executed.
13
11
12
13
3
(Condition 2) The orientation and posture of the subject at the time that the calibration scan Sca or Sca is executed, and the orientation and posture of the subject at the time that the imaging scan IS is executed, are the same.
13
11
12
13
3
(Condition 3) The scan range of the subject at the time that the calibration scan Sca or Sca is executed includes the scan range of the subject at the time that the imaging scan IS is executed.
FIG. 17
2
3
1
12
11
1
3
1
11
3
6
Referring to , “the condition ” and “the condition ” are satisfied but “the condition ” is not satisfied in the case of the scan condition for the calibration scan Sca. In the scan condition for the calibration scan Sca, however, all of the three “condition ” through “condition ” are satisfied. It is thus judged that the calibration data CAL acquired by the calibration scan Sca can be used for the correction of the image data acquired by the imaging scan IS. The processing flow is returned to Step S.
6
3
3
1
8
14
1
3
7
FIG. 11
At Step S, the imaging scan IS is performed. At the imaging scan IS, the magnetic resonance signals of the slices K″ through Kn″ are received using the combination Set of the coil elements in accordance with the condition set by the operator . Thereafter, image data is generated based on the received magnetic resonance signals, and the generated image data is corrected using the calibration data CAL (refer to ). It is thus possible to obtain a high-quality MR image. After the imaging scan IS has been executed, the processing flow proceeds to Step S.
7
1
3
FIG. 8
It is determined at Step S whether all the imaging scans are executed. In the first embodiment, it is necessary to perform the three imaging scans IS through IS (refer to ). The three imaging scans have already been performed. Accordingly, the processing flow is terminated.
14
14
In the first embodiment as mentioned above, since the scan condition for each calibration scan is automatically set, the operator needs not to set the scan condition for the calibration scan manually, and the burden on the operator is hence lightened.
1
11
1
1
1
1
1
1
3
3
1
1
3
1
3
10
4
5
3
1
1
1
11
2
2
12
FIG. 10
FIG. 17
FIG. 17
Incidentally, in the first embodiment, the scan range V has been adopted as the scan range for the calibration scan Sca without using the scan range V′ (refer to ). The scan range V′ may however be adopted instead of the scan range V. The scan range V′ is also shown in in addition to the scan range V. The scan range V′, however, becomes narrower than the scan range SR at the imaging scan IS as shown in . Thus, when the scan range V′ is adopted instead of the scan range V, the “condition ” of the above three conditions “condition ” through “condition ” is not satisfied. In this case, it is determined at Step S that the usable calibration data does not exist. Therefore, the processing flow is returned to Steps S and S, where it is necessary to perform the calibration scan again, so that the imaging time becomes longer. On the other hand, since the above “condition ” is satisfied if the scan range V is adopted, the execution of the calibration scan becomes unnecessary, thus making it possible to shorten the imaging time. Accordingly, the scan range V that covers a range wider than the scan range V′ is preferably adopted as the scan range for the calibration scan Sca. Due to the similar reason, the scan range V that covers a range wider than the scan range V′ is preferably adopted even as for the scan range for the calibration scan Sca.
1
3
24
2
4
FIG. 1
Incidentally, in the first embodiment, although the imaging scans IS through IS are respectively taken as the imaging method using the parallel imaging technique, they do not necessarily have to be the imaging method using the parallel imaging technique. For example, an imaging method using a PURE (Phased array UnifoRmity Enhancement) technique may be adopted. When the PURE technique is used, magnetic resonance signals may be received from the subject upon a calibration scan using the RF coil (refer to ) built in the magnetic field generator as well as the coil elements embedded in the cradle to thereby generate calibration data.
41
4
The first embodiment has explained the example using the coil device installed to the predetermined position with respect to the cradle . A second embodiment will explain an example using a floating coil installable to an arbitrary position with respect to the cradle.
20
The second embodiment is equipped with the floating coil capable of being mounted to the arbitrary position with respect to the cradle.
FIG. 18
20
is a diagram showing the floating coil employed in the second embodiment.
20
20
20
20
20
a
d
a
d
The floating coil has four coil elements through . The four coil elements through are of, for example, loop coil elements, figure-of-eight coil elements or the like.
13
13
20
20
20
20
20
a
d
a
d
In the second embodiment, when magnetic resonance signals are received from a subject , a combination of coil elements suited to receiving magnetic resonance signals in a scan range of the subject is selected out of the four coil elements through of the floating coil . However, the combinations of the coil elements selectable out of the four coil elements through have been determined in advance. The combinations of the selectable coil elements will be explained below.
FIG. 19
is a diagram for explaining the combinations of the selectable coil elements.
21
23
21
20
20
22
20
20
23
20
20
a
b
c
d
a
d.
In the second embodiment, three combinations Set through Set are prepared as the combinations of the selectable coil elements. The combination Set includes the two coil elements and , and the combination Set includes the two coil elements and . The combination Set includes the four coil elements through
21
22
23
A description will next be made of sensitive regions of the combinations Set, Set and Set.
FIGS. 20A through 20C
21
22
23
are diagrams for describing the sensitive regions of the combinations Set, Set and Set.
FIGS. 20A
20
20
21
22
23
21
22
23
, B, and C respectively show the sensitive regions CR, CR and CR of the combinations Set, Set and Set.
20
4
21
22
23
21
22
23
21
22
23
Since the floating coil is installed to the arbitrary position with respect to the cradle , it is different from the coil device employed in the first embodiment. It is not possible to store information about the positions of the sensitive regions CR, CR and CR. In the second embodiment, however, z-direction lengths L, L and L of the sensitive regions CR, CR and CR have been stored.
FIGS. 21 and 22
A procedure for imaging a subject in the second embodiment will be explained below referring to .
14
20
1
FIG. 21
The operator first mounts the floating coil onto the subject and sets slices K through Kn taken where an imaging scan is executed (refer to ).
FIG. 21
20
1
is a diagram showing a relationship in position between the floating coil and the slices K through Kn where the imaging scan is executed.
1
1
14
1
21
23
23
A range surrounded by the slices K through Kn becomes a scan range SR at the imaging scan. The operator selects the corresponding combination of coil elements for receiving magnetic resonance signals of the slices K through Kn out of the combinations Set through Set of the coil elements. In the second embodiment, the combination Set of the coil elements is assumed to have been selected.
10
1
1
FIG. 22
The central processing unit determines the center line of the scan range SR surrounded by the slices K through Kn (refer to ).
FIG. 22
1
is a diagram showing the center line LC of the scan range SR.
1
1
23
23
23
1
23
23
1
1
23
The center line LC of the scan range SR is of a straight line that passes through the center point O of the scan range SR and extends in a y direction. In the second embodiment, the sensitive region CR is positioned in such a manner that the z-direction length L of the sensitive region CR is divided into two equal parts by the center line LC of the scan range SR. It is thus possible to determine the position of the sensitive region CR. After the sensitive region CR has been positioned, a scan range V for a calibration scan is determined so as to include both of the scan range SR and the sensitive region CR.
20
4
1
1
Even where the floating coil installable to the arbitrary position with respect to the cradle is used as described above, the scan range V for the calibration scan can be determined After the scan range V for the calibration scan has been determined, the calibration scan is executed, followed by execution of the imaging scan, whereby imaging is brought to completion.
21
22
23
21
22
23
21
22
23
Since the z-direction lengths L, L and L of the sensitive regions CR, CR and CR have been stored as described above in the second embodiment, each of the sensitive regions CR, CR and CR can be positioned. It is thus possible to decide the scan range for the calibration scan.
23
23
1
1
23
23
1
Incidentally, in the second embodiment, the z-direction length L of the sensitive region CR is divided into the two equal parts by the center line LC of the scan range SR. However, another line different from the center line LC is defined in the scan range SR, and the z-direction length L of the sensitive region CR may be defined so as to be divided into two equal parts by another line defined in the scan range SR.
23
23
1
23
23
1
The z-direction length L of the sensitive region CR is not necessarily required to be divided into the two equal parts by the center line LC of the scan range SR. It is also possible to divide the z-direction length L of the sensitive region CR in, for example, a ratio of 1:2 at the center line LC of the scan range SR.
Many widely different embodiments of the invention may be configured without departing from the spirit and the scope of the present invention. It should be understood that the present invention is not limited to the specific embodiments described in the specification, except as defined in the appended claims.
BRIEF DESCRIPTION OF THE DRAWINGS
FIG. 1
shows a magnetic resonance imaging apparatus according to a first embodiment of the invention.
FIG. 2
is a diagram for describing combinations of selectable coil elements.
FIG. 3A
FIG. 3D
1
4
through are diagrams for describing sensitive regions of the combinations Set through Set of the coil elements.
FIG. 4A
FIG. 4D
5
8
through are diagrams for describing sensitive regions of the combinations Set through Set of the coil elements.
FIG. 5A
FIG. 5B
9
10
and are diagrams for describing sensitive regions of the combinations Set and Set of the coil elements.
FIG. 6
1
13
is a diagram showing a processing flow of the MRI apparatus when a subject is imaged.
FIG. 7
13
is a diagram illustrating the manner in which the subject is placed on a cradle.
FIG. 8
is a diagram depicting one example of a display screen when a scan plan is developed.
FIG. 9A
FIG. 9H
13
2
through are diagrams showing patterns of orientations and postures of the subject , each of which is represented in an orientation/posture set button D.
FIG. 10
11
is a diagram illustrating a scan range of a calibration scan Sca.
FIG. 11
1
is a diagram schematically showing the manner in which calibration data CAL and information (1) through (3) are associated with one another.
FIG. 12
2
is a diagram depicting one example of a display screen when a scan plan at an imaging scan IS is developed.
FIG. 13
11
2
is a diagram in which a scan condition at the calibration scan Sca and a scan condition at the imaging scan IS are compared with each other.
FIG. 14
12
is a diagram illustrating a scan range for a calibration scan Sca.
FIG. 15
2
is a diagram schematically showing the manner in which calibration data CAL and information (1) through (3) are associated with one another.
FIG. 16
3
is a diagram illustrating one example of a display screen when a scan plan at an imaging scan IS is developed.
FIG. 17
11
12
3
is a diagram in which scan conditions at calibration scans Sca and Sca and a scan condition at an imaging scan IS are compared with each other.
FIG. 18
20
is a diagram illustrating a floating coil employed in a second embodiment.
FIG. 19
is a diagram for explaining combinations of selectable coil elements.
FIG. 20A
FIG. 20C
21
22
23
through are diagrams for explaining sensitive regions of the combinations Set, Set and Set of the coil elements.
FIG. 21
20
1
is a diagram showing a relationship in position between the floating coil and slices K through Kn where imaging scans are executed.
FIG. 22
1
is a diagram illustrating a center line LC of a scan range SR. | |
In the pharmaceutical industry, stability testing is conducted as part of product development to test the quality of pharmaceutical formulations. Stability of a pharmaceutical product can be defined as the capability of a particular formulation in a specific container/closure system to remain within its physical, chemical, and/or microbiological specifications. In particular, stability of a pharmaceutical product determines the extent to which the product retains the expected properties from packaging and throughout its period of storage and use. Stability testing thus evaluates, often repeatedly over time, the effect of the formulation and environmental factors on the quality of the product, thereby predicting its shelf life. Other industrial sectors also use stability testing, such as the food, beverage and cosmetics industries, to evaluate product robustness over time.
Traditionally, when performing stability testing, all possible combinations of factors involved need to be tested, which necessitates a large number of experimental trials that can be costly and time-consuming. Using the biopharmaceutical industry as an example, a user can complete a stability study by testing all combinations of various factors involved in a formulation, including buffers (4 levels), pH (4 levels), preservatives (3 levels) and concentration of active pharmaceutical ingredient (API) (3 levels), thus yielding 144 trial formulations (4*4*3*3). In addition, the trials can be conducted at multiple points in time, such as at 0, 1, 3, 6, 9, 12, 18, 24 and 36 months and with two or three different analytical methods. The cost of testing each trial formulation can be from $1,000 to $5,000 USD. Therefore, the overall testing expense can be quite high, especially if all 144 trial formulations are tested at each time point with several different analytical methods.
Product characteristic testing is used in various industries, not limited to the biopharmaceutical industry. Moreover, testing can be conducted in relation to various product characteristics, including characteristics associated with the product itself, a process for developing the product, or a procedure related to the product. In general, an experimental design for testing a product characteristic can be created based on (i) one or more factors, each factor specifies a parameter for testing the product characteristic, (ii) one or more levels for each factor, where each level specifies a different setting (e.g., value) for the corresponding factor and (iii) one or more partitions (e.g., points in time) at which the testing needs to be conducted.
As an example, in the field of mass spectrometry (MS), a scientist needs to routinely optimize and adjust a MS system to deliver strong and stable signals for selected peaks and low signals for interfering peaks. Such an MS system has multiple factors, each can be adjusted at 6 to 10 different levels. At minimum, assuming there are 4 factors and each factor has 6 levels, the number of combinations to investigate per time point is 1296 (6^4). As another example, in the field of market research, responses of people in five age groups can be evaluated with respect to a variety of factors related to product advertisement, including product packaging (fancy, standard, or environmental), pricing ($10, $12, or $14 USD), and branding (generic or sophisticated). Hence, 90 trials need to be conducted to investigate all combinations of the different levels of the various factors involved. In many cases, it may not be feasible to perform all 90 trials. Therefore, 30 trials may be conducted to study the main features and their potential synergies (e.g., interactions). However, because the cost involved with conducting the 30 trials per time point is still high, there is a desire to reduce the number of trials even further while capturing the main features.
Traditional methods for reducing the number of experiments used to test a product characteristic usually only work with systems involving factors having 2 different levels. Hence, there exists a market demand for algorithms that can efficiently handle problems involving multilevel factors (i.e. factors with more than 2 levels). There are several challenges to creating such an algorithm. For example, experimental designs that provide optimal statistical conditions for a series of trials in an investigation are often of the orthogonal array type. While orthogonal arrays are relatively straightforward to apply, they can only be used in very limited cases for certain sets of factors and certain number of trial runs due to their mathematical properties. It cannot be guaranteed that for a given set of factors, levels and runs an orthogonal array can be defined and used for the purpose of creating a test plan.
| |
Please use this identifier to cite or link to this item:
http://hdl.handle.net/20.500.12358/21321
|Title||Risk Assessment for Universities and Hospitals Restaurants in Gaza– Palestine|
|Title in Arabic||تقييم المخاطر لمطاعم جامعات و مستشفيات قطاع غزة- فلسطين|
|Abstract||
|
Risk assessment process is a systematic method which was considered the start of the health and safety management approach. It is a dynamic process that allows enterprises and organizations to put in place a proactive policy of managing, although its importance for managers in ranking priorities and best using for available resources, but there is a distinct lack of scientific studies in risk assessment in restaurants. A descriptive cross sectional analytic method was used to assess health and safety risks that really matter in restaurants of universities and hospitals in Gaza strip and affect on workers, customers and others. On May 2012 forty structured self reported questionnaire were filled by workers in all universities and governmental hospitals restaurants in Gaza strip. Another 30 questionnaire were filled by universities students, in addition to 40 checklist and 40 personal meeting were conducted by the researcher. The collected data have been analyzed by risk score matrix to detect the risk level ( low, medium, high and very high) for each risk factor. In general universities and hospitals restaurants were the same of being at risk, but the details different; the universities questionnaires results showed 22.7% of physical and electrical risk factor was very high risk level. It was found that 50.0% of cleanliness of place and equipment risk factor was high, and 60.0% of machinery and equipment risk factor was moderate risk level, and the most frequent risk factor was workers, customers safety and health. On hospitals restaurants results showed 75% were moderate, and the same percentage high levels on physical and electrical risk factor and machinery and equipment risk factor respectively. The most frequent risk factor was slips and falls. Significant differences between universities and hospitals restaurants were found in machinery and equipment, and food deliveries risk factors. Only half of universities restaurants workers (10) doing regular medical examination for infectious diseases, and 41.6% of them used the same oil for frying 6 times and more. Specialized companies in hospitals restaurants controls insects and rodents while restaurant workers in universities do that. Workers in 100%, 25.0% in hospitals and universities restaurants respectively were wearing uniform. Universities students mentioned lack of appropriate places of receipt meals and discomfort of their bodies there as very high, narrow corridors between tables in restaurants as high risk levels and represents 66.7%, 68.8% respectively. Special and clear form for restaurants risk assessment in Gaza should be prepared to be used regularly. Develop and implement plan with specific mitigation measures is necessary to address the identified risks. | https://iugspace.iugaza.edu.ps/handle/20.500.12358/21321 |
Exaggerated proportions, unexpected curves, and matte lacquer finish give this Early American form an updated, sophisticated charm. Constructed of solid pine and maple, the bench features hand carved seat and crest. All turnings are hand lathed and legs are set with traditional through tenon joinery for increased stability.
54"L x 19.5"D x 31"H
Seat height: 18"
CONTACT THE STUDIO for more information. | http://www.mvngmtns.com/windsor-bench |
FIELD OF THE INVENTION
BACKGROUND OF THE INVENTION
SUMMARY OF THE INVENTION
The invention relates to the field of computations, and, more particularly, to a modular computation according to the Montgomery method.
n
n
Modular computations according to the Montgomery method are performed in a finite field, or Galois field, denoted as GF(2). Conventionally, modular operations on GF(2) are used in cryptography for applications, such as the authentication of messages, the identification of a user, and the exchange of cryptographic keys. Exemplary applications are described, for example, in the French Patent Application FR-A 2,679,054.
There are commercially available integrated circuits dedicated to such applications. These include, for example, the product referenced as ST16CF54, which is manufactured by SGS-THOMSON MICROELECTRONICS S.A. This product is built around a central processing unit and an arithmetic coprocessor, and is dedicated for performing modular computations. The coprocessor enables processing of modular multiplication operations using the Montgomery method, which is disclosed in U.S. Pat. No. 5,513,133.
field
N
N
−n
The basic operation, called a Poperation, includes generation of a binary data element denoted as P(A, B)and encoded on n bits, such that P(A, B)=A*B*I mod N, with I=2mod N. The generation of the binary data element is based on three binary data elements A (multiplicand), B (multiplier) and N (modulus) encoded on a whole number of n bits. For this purpose, it is assumed that the data elements are encoded on m words of k bits, with m*k=n, and the words of A and B are provided to a multiplication circuit having a series input, a parallel input, and a series output.
FIG. 1
10
11
12
10
12
13
10
10
14
11
For the coprocessor described in the referenced U.S. patent application, k=32 and m=8 or 16. shows the modular arithmetic coprocessor disclosed in the referenced U.S. patent application. This coprocessor has the following elements. Three m*k bit shift registers , and , including one series input and one series output. These shift registers - receive respectively the multiplier B, the result S and the modulus N. A multiplexer with three series inputs includes one series output connected to the input of the register . A first input is connected to a first input terminal, and a second input is connected to the output of the register . A multiplexer with two series inputs has one series output connected to the input of the register . A first input is connected to a logic 0.
15
12
12
16
17
18
16
18
17
19
20
21
22
21
16
21
19
22
20
0
0
The coprocessor further includes a multiplexer having three series inputs and one series output connected to the input of the register . A first input is connected to a second input terminal, and a second input is connected to the output of the register . Three k-bit shift registers , and have one series input and one parallel output. These registers - receive respectively k bits of the multiplicand A, a computation parameter referenced J, and an intermediate result referenced Y. The input of the register is connected to a third input terminal. Two multiplication circuits and each have a series input, a k-bit parallel input and a series output. Two k-bit registers and have a parallel input and a parallel output. The input of the register is connected to the output of the register . The output of the register is connected to the input of the multiplication circuit . The output of the register is connected to the input of the multiplication circuit .
23
23
17
23
18
23
22
24
25
24
16
24
25
19
25
Furthermore, the coprocessor includes a multiplexer with two parallel inputs and one parallel output. A first input of the multiplexer is connected to the output of the register . A second input of the multiplexer is connected to the output of the register . The output of the multiplexer is connected to the input of the register . Two multiplexers , each have two series inputs and one series output. The output of the multiplexer is connected to the input of the register . A first input of the multiplexer is connected to a fourth input terminal. The output of the multiplexer is connected to the series input of the multiplication circuit . A first input of the multiplexer is connected to a logic 0.
26
20
27
28
29
27
10
27
24
25
28
11
30
31
30
28
30
19
30
26
29
14
13
15
A multiplexer has three series inputs and one output. The output is connected to the series input of the multiplication circuit , and a first input is connected to a logic 0. Three subtraction circuits , and each include two series inputs and one series output. The first input of the circuit is connected to the output of the register . The output of the circuit is connected to each of the second inputs of the multiplexers and and also to an output terminal. The first input of the circuit is connected to the output of the register . Two addition circuits and each have two series inputs and one series output. The first input of the circuit is connected to the output of the circuit . The second input of the circuit is connected to the output of the circuit . The output of the circuit is connected to a second input of the multiplexer . The output of the circuit is connected to a first input of the circuit , and to a second input of the multiplexer , and to each of the third inputs of the multiplexers and .
32
33
34
32
26
33
33
29
34
30
34
31
35
31
29
Three delay cells , and , which are actually k-bit shift registers, have a series input and a series output. The output of the cell is connected firstly to a third input of the multiplexer and secondly to the input of the cell . The output of the cell is connected to a second input of the circuit . The input of the cell is connected to the output of the circuit . The output of the cell is connected to a first input of the circuit . A comparison circuit has two series inputs and two outputs. A first input is connected to the output of the circuit . A second input is connected to the output of the circuit .
36
37
35
36
27
37
28
38
12
32
36
37
39
20
18
31
Two multiplexers and each have two series inputs, one selection input, and one output. Each of the first series inputs is connected to a logic 0. Each of the selection inputs is connected to one of the outputs of the circuit . The output of the multiplexer is connected to a second input of the circuit . The output of the multiplexer is connected to a second input of the circuit . A multiplexer has two inputs and one output. A first input is connected to a logic 1. A second input is connected to the output of the register . The output is connected firstly to the input of the cell , and secondly to the second inputs of the multiplexers and . A demultiplexer has one input and two outputs. The input is connected to the output of the circuit . A first output is connected to the input of the register . A second output is connected to a second input of the circuit .
Field
Field
N
−m*k
For further details on forming certain elements, reference may be made to the previously referenced U.S. patent. To carry out an elementary operation known as a Poperation of the type P(A, B)=A*B*I mod N, with A and B encoded on m words of k bits, and I is an error equal to 2, iteration of the following loop is performed m times with i as an index varying from 1 to m:
<PTEXT><PDAT>X=S(i)+A</PDAT><HIL><SB><PDAT>i−1</PDAT></SB></HIL><PDAT>*B,</PDAT></PTEXT>
<PTEXT><PDAT>Y</PDAT><HIL><SB><PDAT>0</PDAT></SB></HIL><PDAT>=(X*J</PDAT><HIL><SB><PDAT>0</PDAT></SB></HIL><PDAT>)mod2</PDAT><HIL><SP><PDAT>k,</PDAT></SP></HIL></PTEXT>
<PTEXT><PDAT>Z=X+(N*Y</PDAT><HIL><SB><PDAT>0</PDAT></SB></HIL><PDAT>),</PDAT></PTEXT>
k
k
i
0
0
S(i)=Z\2\ is an integer division, if S(i) is greater than N, then N is subtracted from S at the next iteration, with S(0)=0, Ais the k bit word with the significance i, Jis a k bit word defined by the equation ((N*J)+1) mod 2=0.
FIG. 1
10
12
12
21
17
21
i
0
Field
N
i
The coprocessor of enables the performance of a full iteration by a simultaneous shift of m*k bits of the registers - respectively containing B, S(i−1) and N. This is followed by a 2*k bit shift of the register to store S(i). The word Ais loaded into the register and the word Jis loaded into the register . To perform the full computation of P(A, B), it is enough to repeat each iteration m times by changing the word Acontained in the register during each iteration.
i
0
0
o
0
0
0
19
30
20
22
18
32
34
22
20
31
29
33
35
28
k
k
The operation X=S(i−1)+A*B is performed by the multiplication circuit and the addition circuit . The operation Y+(X*J) mod 2is performed during the k first shifts in the multiplication circuit . Care is taken to store Jin the register . The result Yis stored in the register . The operation Z=X+(N*Y), with N and X having been delayed by k bits in the delay cells and and Yhaving been placed in the register , is performed by the multiplication circuit and addition circuit . The operation S(i)=Z\2is performed by a k bit shift The comparison of S(i) with N is performed by the subtraction of N from S(i) in the subtraction circuit . N is delayed by k bits in the cell . Any overflow is detected and stored in the comparison circuit to find out the result of the comparison. The subtraction of N from S(i) is done during the following iteration in the subtraction circuit .
field
N
The coprocessor described in the referenced U.S. patent has the drawback of carrying out computations in a fixed manner on a number either of 256 bits or of 512 bits. A first improvement disclosed in U.S. Pat. No. 5,745,398 seeks to provide greater flexibility in use by enabling the performance of P(A, B)operations with A having a variable size.
A second improvement disclosed in a referenced European Patent Application EP-A 784,262 seeks to reduce the exchanges of data between the coprocessor and external to the coprocessor during the performance of modular operations. This is achieved by the addition of an additional register of m*k bits to store A integrally when A has a size smaller than m*k bits.
Furthermore, there are known m*k bit shift registers organized in banks of m k-bit sub-registers for reducing the use of the registers. The use is reduced for, at most, by 2*k storage cells which are used simultaneously. For a more detailed disclosure on these registers, those skilled in the art are directed to the French Patent Application filed on Jul. 4, 1997, under number 9,708,516. This French Patent Application corresponds to the U.S. Patent Application, filed Jun. 26, 1997 having Ser. No. 09/105,560. One drawback of the registers organized in banks of sub-registers is that they occupy a greater silicon surface area of an integrated circuit than standard registers.
32
34
An object of the invention is to reduce the size of the circuit, while at the same time using the registers organized in banks of sub-registers. The invention eliminates the delay cells and to increase surface area through a new sequencing of the coprocessor.
field
An object of the invention is to provide a method for the implementation of an elementary operation, called a Pfield operation, defined according to the Montgomery method by P(A, B)N=A*B*I mod N, where A, B and N are integers encoded respectively on &agr;, b and n words of k bits. N is an odd-parity number, b and n are non-zero integers smaller than or equal to an integer m, and &agr; and m are non-zero integers.
i−1
0
0
i−1
−1
k
k
The method implements a first k-bit register designed to successively receive words Aof k bits of A. A second m*k bit shift register is designed to store B. A third m*k bit shift register is designed to store an updated result referenced S(i). A fourth m*k bit shift register is designed to store N. The second to fourth registers are organized in banks of m sub-registers for enabling shifts by k bit words. First, there is a k-bit shift of the least significant words of the second to fourth registers using computation means for the serial production of an intermediate data element Y+((−Nmod 2)*(B*A+S(i−1)) mod 2that is stored in a fifth k bit register. Then there is a second n*k bit shift of the total words B, S(i−1) and N contained in the second to fourth registers using computation means for the serial production of the updated data element S(i).
Preferably, the following steps E1 to E3 are repeated &agr; times, where i is an integer index varying from 1 to &agr; that is incremented following each repetition of steps:
i−1
0
0
0
i
0
0
−1
k
Step E1: Computation of Yo, where a k-bit shift is made in the least significant words of B, S(i−1) and N respectively contained in the second to third registers. Each of these registers has its input connected to its output to keep the k-bit word in one and the same sub-register after having provided it. During the shifts, A*Bis produced in a first multiplication circuit. Nis subtracted from S(i−1)in a first subtraction circuit if S(i−1) is greater than N. The k least significant bits of X=S(i−1)+A*B are produced in a first addition circuit by adding up the output result from the first multiplication circuit with the output result from the first subtraction circuit. Yis produced by multiplying the k least significant bits of X by −Nmod 2in a second multiplication circuit. The output result of the multiplication circuit is stored in the fifth register.
i−1
i
0
0
1
11
Step E2: Computation of S(i) by a simultaneous shift of n*k bits is performed on the contents of the second to fourth registers. The first multiplication circuit performs the multiplication B*A. N is subtracted from S(i−1) in the first subtraction circuit if S(i−1) is greater than N. X=S(i−1)+A*B is produced in the first addition circuit by adding up the output result from the first multiplication circuit with the output result from the first subtraction circuit. X*Yis produced in the second multiplication circuit. Z=X+(N*Y) is produced in a second addition circuit by adding up the output result from the first multiplication circuit with the output result from the first addition circuit. The k first output bits from the second addition circuit are overlooked. The new updated result S(i) is stored in the third register . The k-bit word Zcorresponds to the second least significant word of Z, which becomes the least significant word of the updated result S(i).
Step E3: Comparison of S(i) with N, where S(i) is compared with N and the result of the comparison is stored by using comparison means. The result of the comparison of N with S(i) is to be taken into account during repetition of the steps E1 and E2.
BRIEF DESCRIPTION OF THE DRAWINGS
Other objects, features and advantages of the present invention will become apparent from the detailed description of the invention which follows, when considered in light of the accompanying drawings in which:
FIG. 1
shows a coprocessor according to the prior art; and
FIGS. 2 and 3
show coprocessors according to the present invention.
DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS
The present invention will now be described more fully hereinafter with reference to the accompanying drawings, in which preferred embodiments of the invention are shown. This invention may, however, be embodied in many different forms and should not be construed as limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the invention to those skilled in the art. Like numbers refer to like elements throughout.
FIG. 2
10
11
12
11
12
10
1
10
11
1
11
12
1
12
10
11
12
10
1
10
11
1
11
12
1
12
100
110
120
100
110
120
10
12
m
m
m
m
m
m
The drawing of shows a coprocessor according to the present invention. The coprocessor includes three m*k bit shift registers , and each having one series input and one series output. These shift registers - are designed to receive respectively the multiplier B, the result S and the modulus N. Each of the registers is organized in banks of m k-bit sub-registers referenced - to -, - to -and - to -whose inputs are grouped together to form the input respectively of the registers , and . The outputs of the subregisters - to -, - to -and - to -are connected respectively to three m-input multiplexers , and . The output of each multiplexer , and forms the output of each of the registers -.
13
15
13
15
13
15
13
15
10
12
13
15
10
12
16
17
18
17
19
20
21
22
21
16
21
19
22
20
0
0
Three multiplexers - include four series inputs and one series output. A first input of each of the multiplexers - is connected to an input terminal Din. A second input of each of the multiplexers - receive a logic 0. A third input of each of the multiplexers - is connected respectively to the output of each of the registers -. The output of each of the multiplexers - are connected respectively to the input of each of the registers -. Three k-bit shift registers , and , having one series input and one parallel output, are designed to receive respectively k bits of the multiplicand A, a computation parameter referenced J, an intermediate result referenced Y. The input of the register is connected to a third input terminal. Two multiplication circuits and each have a series input, a k-bit parallel input and a series output. Two k-bit registers and have a parallel input and a parallel output. The input of the register is connected to the output of the register . The output of the register is connected to the input of the multiplication circuit . The output of the register is connected to the input of the multiplication circuit .
23
23
17
23
18
23
22
24
25
24
16
24
25
19
25
26
20
27
28
29
27
10
27
24
25
28
11
A multiplexer includes two parallel inputs and one parallel output. A first input of the multiplexer is connected to the output of the register . A second input of the multiplexer is connected to the output of the register . The output of the multiplexer is connected to the input of the register . Two multiplexers , each have two series inputs and one series output. The output of the multiplexer is connected to the input of the register . A first input of the multiplexer is connected to a fourth input terminal. The output of the multiplexer is connected to the series input of the multiplication circuit . A first input of the multiplexer is connected to a logic 0. A multiplexer has three series inputs and one output. The output is connected to the series input of the multiplication circuit . A first input is connected to a logic 0. Three subtraction circuits , and each comprises two series inputs and one series output. The first input of the circuit is connected to the output of the register . The output of the circuit is connected to the second inputs of the multiplexers and and also to an output terminal Dout. The first input of the circuit is connected to the output of the register .
30
31
30
28
30
19
30
26
31
31
29
13
14
15
33
33
29
35
31
29
36
37
36
37
35
36
27
37
28
38
12
33
36
37
26
39
20
18
31
Two addition circuits and , each have two series inputs and one series output. The first input of the circuit is connected to the output of the circuit . The second input of the circuit is connected to the output of the circuit . The output of the circuit is connected to a second input of the multiplexer and to a first input of the circuit . The output of the circuit is connected to a first input of the circuit and to the fourth inputs of the multiplexers , and . A delay cell that is actually a k-bit shift register, has one series input and one series output. The output of the cell is connected a second input of the circuit . A comparison circuit has two series inputs and two outputs. A first input is connected to the output of the circuit . A second input is connected to the output of the circuit . Two multiplexers and each have two series inputs and one output. Each of the first series inputs are connected to a logic 0. Each of the multiplexers and are controlled by one the outputs of the circuit (not shown in the drawing). The output of the multiplexer is connected to a second input of the circuit . The output of the multiplexer is connected to a second input of the circuit . A multiplexer has two series inputs and one series output. A first input is connected to a logic 1. A second input is connected to the output of the register . The output is connected to the input of the cell and to the second inputs of the multiplexers and and to a third input of the multiplexer . A demultiplexer has one input and two outputs. The input is connected to the output of the circuit . A first output is connected to the input of the register . A second output is connected to a second input of the circuit .
FIG. 2
10
11
12
16
17
10
11
12
16
17
Field
N
For the coprocessor of , a single input terminal is used to load the data elements into the registers , , , and . It is possible to use five input terminals if it is desired to carry out the simultaneous loading of all the data elements in all the registers , , , and . To explain operation of such a circuit for implementing the P(A, B)=A*B*I mod N type, it is appropriate to assume that A is an integer encoded on &agr; words of k bits, B is an integer encoded on b words of k bits, N is an odd-parity integer encoded on n words of k bits. In addition, &agr;, b and n are positive integers, with b and n being smaller than or equal to m. Furthermore, b is necessarily smaller than or equal to n.
10
10
1
12
12
1
11
17
36
37
16
0
0
0
0
−1
k
The circuit must first of all be initialized. Initialization is performed as follows. B is loaded into the register , the least significant word of B is, for example,in the sub-register -. N is loaded into the register , the least significant word of N is, for example, in the sub-register -. The register is initialized at logic 0. The contents are called S(0) and are encoded on n words of k bits. A computation parameter Jis loaded into the register . Jis computed beforehand and is equal to −Nmod 2. The comparison circuit is initialized so that the multiplexers and have their outputs which provide a logic 0. The word A, corresponding to the least significant k-bit word of A, is loaded into the register . The initialization of the circuit can be done only partially. At the end of a computation, the coprocessor contains data elements that may be re-used and are already in the right register.
Field
1
6
In order to implement the elementary Poperation, the following steps - are repeated &agr; times, wherein i is an integer index varying from 1 to &agr; that is incremented at the end of each repetition of steps:
i−1
0
21
22
30
31
27
29
19
20
Step 1: Ais loaded into the register and Jis loaded into the register . The addition circuits and , subtraction circuits - and the multiplication circuits and are initialized.
0
i-1
0
0
0
i
0
0
10
1
11
1
12
1
10
1
11
1
12
1
19
28
30
19
28
20
20
18
Step 2: Computation of Yis performed. A k-bit shift is made in the contents of the sub-registers -, - and - corresponding to the least significant word of respectively B, S(i−1) and N. Each of these registers has its input connected to its output to keep the k-bit word in the same sub-register -, - and - after having provided the word. During the shifts, A*Bis produced in the multiplication circuit . Nis subtracted from S(i−1)in the subtraction circuit if S(i−1) is greater than N. The k least significant bits of X=S(i−1)+A*B are produced in the addition circuit by adding the output result from the multiplication circuit with the output result from the subtraction circuit . Yis produced by multiplying the k least significant bits of X by Jin the multiplication circuit . The output result from the multiplication circuit is stored in the register .
0
22
30
31
27
29
19
20
Step 3: Yis loaded into the register . The addition circuits and , subtraction circuits to and the multiplication circuits and are initialized.
10
11
12
19
28
30
19
28
20
31
20
30
31
11
11
1
i−1
i
0
0
1
Step 4: Computation of S(i) is performed. A simultaneous shift by n*k bits is made in the contents of the registers , and . The multiplication circuit performs the multiplication B*A. N is subtracted from S(i−1) in the subtraction circuit if S(i−1) is greater than N. X=S(i−1)+A*B is produced in the addition circuit by adding the output result from the multiplication circuit with the output result from the subtraction circuit . X*Yis produced in the multiplication circuit . Z=X+(N*Y) is produced in the addition circuit by adding the output result from the multiplication circuit with the output result from the addition circuit . The k first output bits from the addition circuit are overlooked. S(i) is stored in the register . The k-bit word Zcorresponding to the second least significant word of Z becomes the least significant word of S(i) stored in the sub-register -.
31
29
35
29
Step 5: Comparison of S(i) with N is performed. N is delayed by k bits and is subtracted from the output result of the addition circuit in the subtraction circuit . The comparison circuit controls and stores the state of the carry value of the subtraction circuit . The carry value corresponding to the result of the comparison of N with S(i) has to be taken into account during the next repetition of the steps 2 and 4.
i
16
Step 6: During execution of the steps 2 to 5, the word Ais loaded into the register .
11
12
10
10
11
12
−a*k
To obtain the final result, the contents of the registers and are shifted and N is subtracted from S(a) if S(a) is greater than or equal to N. The result is then stored in the register to bring it out of the coprocessor or is stored in the register , or if it is desired to use it in a following computation. For the method described, the error I is equal to 2.
0
0
0
0
0
0
0
0
It may be further noted that, in the method of the invention, the word Xis produced twice consecutively. The double production of the word Xenables the elimination of the delay cell whose function was to delay X for a duration equal to the computation of Y. This results in a first savings of k elementary register cells. This is also the case for the double output of the word Nused for the first time to compute Xand Yand for the second time to compute X and Z. The double output of the word Nenables the elimination of the delay cell whose function was to delay N for a duration equal to the computation of Y. This results in a second savings of k elementary register cells.
FIG. 3
FIG. 3
FIG. 2
FIG. 3
28
30
Alternative embodiments of the coprocessor are possible. The diagram of implements a few possible improvements. In the coprocessor of , the output of the subtraction circuit is no longer directly connected to the first input of the addition circuit . The other elements of the coprocessor of remain unchanged. The coprocessor of furthermore comprises the following multiplexers and shift registers as described in the following paragraphs.
40
40
40
1
40
40
40
1
40
400
400
40
m
m
An m*k bit shift register has one series input and one series output and is designed to receive the data element A. The register is organized in banks of m shift sub-registers of k bits - to -whose inputs are grouped together to form the input of the shift register . The outputs of the subregisters - to -are connected to an m input multiplexer . The output of the multiplexer forms the output of the register .
41
40
31
40
A multiplexer includes four series inputs and one series output. A first input is connected to an input terminal Din. A second input is for receiving a logic 0. A third input is connected to the output of the register . The fourth input is connected to the output of the addition circuit , and the output is connected to the input of the register .
42
28
30
A multiplexer has two series inputs and one series output. A first input is connected to the output of the subtraction circuit . The second input is for receiving a logic 0. The output is connected to the first input of the addition circuit .
40
42
42
11
3
30
31
27
29
FIGS. 2
The register is used to store A to prevent exchanges of data external to the coprocessor when a is smaller than or equal to m. The addition does not change execution of the steps implemented above, but they are necessary to provide for the preliminary loading of this register. The multiplexer is used to send logic 0 values during the first implementation of the steps 1-6. The use of this multiplexer makes it possible to prevent the need to initialize the register . Other functions may be implemented in the coprocessor of or . The implementation may be expressed by the addition of additional circuits on the data paths shown. The added elements enable the implementation of the method described above. Furthermore, those skilled in the art realize that the addition circuits and and subtraction circuits - cause delays which have not been taken into account in the present description. Elementary delay cells must therefore be planned, as was the case with prior art circuits to ensure the efficient synchronization of the data paths with one another.
11
12
13
40
Variations are possible with respect to the formats of the data elements. The registers , , and are m*k bit registers that can be configured into registers with a size that is a multiple of k bits. It is possible to permanently fix the size of these registers at the maximum size. This would lead to a loss of time, but simplifies the sequencing to be done. If a fixed size is used, the unused most significant words of the different operands are filled with logic 0 values.
Modifications and other embodiments of the invention exist based upon the foregoing descriptions and the associated drawings. Therefore, it is to be understood that the invention is not to be limited to the specific embodiments disclosed. | |
Superhumans first mission
Superhumans started out as a group of four inspired people, wanting to make an impact on the world we live in. We were all witnessing the pace of today’s technological development, not always reassured that it was dealt with in an optimal manner. That’s why we decided to take matters in our own hands and actually try to make sure it develops in the direction we envision it to.
As stated earlier, we see a world where anyone can be a superhuman. With the support of smart techonlogy, we can become our best selves both in our work and private life.
With that in mind, our first mission became to support warehouse pickers during their day to day work, with the aim to guide, support and offload the workers cognitive demands in their worktask.
Warehouse pickers can often be subject to a lot of efficiency activities prompted by management. If the pickers are more time effective and less error prone in their work, the company can save a lot of money. In this process it is easily forgotten that pickers are not machines, but humans. In order to make the workers more effective the focus have to lie on the aspects of how to improve ourseleves as humans, not how to become more like machines.
It is of vast importance to focus on those (super)human aspects, something our team at Superhumans are in the midst of doing right now! | https://superhumans.se/blog/superhumans/2018/10/01/superhumans-first-mission/ |
The Egg represents symbolically the Egg as a concept!
The use of an egg as a symbol of the essential many layered aspects of the cosmos is prevalent in Russia, Sweden, ancient Egypt, Greece, China, India plus many other countries. The Alchemists also used the symbol of an egg as did the Druids.
The egg as a symbol is quite apt, as the shell represents the 'physical' whilst the internal white of the egg or albumen is the soft spiritual centre. The yolk is then the Ultimate Intelligence.
An illustration on a papyrus, in the Oedipus Aegyptiacus of Kirchner shows an image of an egg floating above a mummy.
In Indian cosmology, Brahma burst forth from a golden egg and Pythagoras used a circle with a central point or hole to represent the egg shape.
Anything which lays an Egg is thus special – a bird or a turtle for example. | https://allaboutheaven.org/symbols/egg-as-symbol/123 |
Bit Space Development Ltd. is an interactive digital media studio that specializes in creating innovative learning experiences for the classroom and workplace. We work with educators and industry professionals from around the world to develop effective solutions for education and training using cutting edge digital media technologies.
BSD firmly believes in supporting the community to grow the IDM industry in Manitoba. We work closely with organizations that provide resources for entrepreneurs in this space, including fostering a partnership with North Forge to create the Advanced ICT Lab and Red River College to develop the ACE Project Space. We also regularly share our work with kids to help inspire the next generation of IDM innovators.
BSD is driven to create the most compelling interactive learning experiences possible using the latest and greatest interactive digital media technology available today. We’re always learning and pushing our boundaries to ensure we stay ahead of the curve. | https://newmediamanitoba.com/member-profile-bit-space-development/ |
Q:
refactoring the same function with different items
I have the following
public static carthographicLerp(v1: Cartographic, v2: Cartographic, t: number): Cartographic {
Math.min(Math.max(t, 0), 1);
const result = new Cesium.Cartographic();
result.longitude = v1.longitude + (v2.longitude - v1.longitude) * t;
result.latitude = v1.latitude + (v2.latitude - v1.latitude) * t;
result.height = v1.height + (v2.height - v1.height) * t;
return result;
}
public static cartesianLerp(v1: Cartesian3, v2: Cartesian3, t: number): Cartesian3 {
Math.min(Math.max(t, 0), 1);
const result = new Cesium.Cartesian3();
result.x = v1.x + (v2.x - v1.x) * t;
result.y = v1.y + (v2.y - v1.y) * t;
result.z = v1.z + (v2.z - v1.z) * t;
return result;
}
public static headingPitchRollLerp(v1: HeadingPitchRoll, v2: HeadingPitchRoll, t: number): HeadingPitchRoll {
Math.min(Math.max(t, 0), 1);
const result = new Cesium.HeadingPitchRoll();
result.heading = v1.heading + (v2.heading - v1.heading) * t;
result.pitch = v1.pitch + (v2.pitch - v1.pitch) * t;
result.roll = v1.roll + (v2.roll - v1.roll) * t;
return result;
}
the code is exactly the same, but the object are differents.
Is it possible to make a single function from this, that is not to ugly and to call it simply lerp?
A:
I don't have your Cesium library anywhere, so I'm going to assume we have this minimum set of definitions:
interface Cartographic {
longitude: number;
latitude: number;
height: number;
}
interface Cartesian3 {
x: number;
y: number;
z: number;
}
interface HeadingPitchRoll {
heading: number;
pitch: number;
roll: number;
}
const Cesium = {
Cartographic: ((() => ({})) as any) as new () => Cartographic,
Cartesian3: ((() => ({})) as any) as new () => Cartesian3,
HeadingPitchRoll: ((() => ({})) as any) as new () => HeadingPitchRoll
};
Here's one way to generalize your *Lerp() functions into a single curried function that takes a constructor and set of keys and returns a function specialized for those types:
type CesiumTypes = Cartographic | Cartesian3 | HeadingPitchRoll;
const genericLerp = <K extends keyof T, T extends Record<K, number>>(
ctor: new () => T,
keys: K[]
) => (v1: T, v2: T, t: number): T => {
Math.min(Math.max(t, 0), 1);
const result = new ctor();
for (let k of keys) {
(result[k] as number) = v1[k] + (v2[k] - v1[k]) * t; // assertion here
}
return result;
};
Note that I had to use a type assertion in result[t] as number = .... That's because the assignment is technically not safe. If the type T has any numeric properties at keys K that are narrower than number, like {foo: -1 | 0 | 1}, then it would be a mistake to do result.foo = v1.foo + (v2.foo - v1.foo) * t, since there'd be no guarantee that such a calculation would result in the -1 | 0 | 1 type. I'm going to just assume you're not going to use types like that when you call genericLerp(). If one wanted they could harden genericLerp() to prevent being called with such pathological types, but it's probably not worth it.
Anyway, now you can write your original three functions by calling genericLerp():
const carthographicLerp = genericLerp(Cesium.Cartographic, [
"latitude",
"longitude",
"height"
]);
const cartesianLerp = genericLerp(Cesium.Cartesian3, ["x", "y", "z"]);
const headingPitchRollLerp = genericLerp(Cesium.HeadingPitchRoll, [
"heading",
"pitch",
"roll"
]);
That's probably as far as I'd want to go here. It's harder to make a single function which acts like all of those. At compile time you can make a single overloaded function that matches all the signatures of your three separate functions, but you'd still need to inspect the values at runtime to determine which of those three functions to use (that is, which constructor and which set of keys). There's no getting around implementing tests, which is why I think this is probably not worth it. For completeness, here's how one might do it.
First let's create some type guard functions to show the compiler that we intend to take a value and check which concrete type it belongs to. I'll do it just by checking for the presence of certain keys:
// Type guards to figure out what the value is
function isCartographic(x: CesiumTypes): x is Cartographic {
return "longitude" in x;
}
function isCartesian3(x: CesiumTypes): x is Cartesian3 {
return "x" in x;
}
function isHeadingPitchRoll(x: CesiumTypes): x is HeadingPitchRoll {
return "heading" in x;
}
Now we can make a single overloaded function, which inspects values and dispatches to the other implementations:
const lerp = ((v1: CesiumTypes, v2: CesiumTypes, t: number): CesiumTypes => {
if (isCartographic(v1) && isCartographic(v2)) {
return carthographicLerp(v1, v2, t);
}
if (isCartesian3(v1) && isCartesian3(v2)) {
return cartesianLerp(v1, v2, t);
}
if (isHeadingPitchRoll(v1) && isHeadingPitchRoll(v2)) {
return headingPitchRollLerp(v1, v2, t);
}
throw new Error("arguments don't match");
}) as typeof carthographicLerp &
typeof cartesianLerp &
typeof headingPitchRollLerp;
Okay, hope that helps. Good luck!
Link to code
| |
The Socialist Bailout of Wall StreetPolitics / Credit Crisis Bailouts Jun 02, 2009 - 05:08 PM GMT
Jacob G. Hornberger writes: The massive federal bailout of U.S. financial firms reflects everything that’s wrong with the economic system of welfare and interventionism under which the United States has operated since at least the 1930s. There are critically important lessons in the bailout that the American people ignore at their peril. While most politicians and mainstream pundits are viewing the bailout as a necessary “reform,” it is imperative that we place this “reform” in a much wider and deeper context. In doing so, we need to return to first principles.
Our nation was founded on the most unusual set of economic principles in history. It is impossible to overstate the radical, even extreme, nature of America’s economic system from the founding of the republic to the early 20th century.
Imagine: No income tax, no capital-gains tax, and no estate tax. For the first time in history, people were free to accumulate unlimited amounts of wealth, and there was nothing the federal government could do to prevent it. People were going from rags to riches in one or two generations.
Imagine: No economic regulations. People were free to pursue occupations and trades and enter into mutually beneficial economic transactions without any government supervision, control, or regulation. What was meant by the terms “free enterprise” and “free market” was that economic activity – enterprise and markets – was free of government supervision, control, or regulation.
Imagine: No welfare. No Social Security, Medicare, Medicaid, or education grants. Charity was voluntary. If people wanted to help others, they were free to do so. But people also understood that freedom entailed the right to say, “No.” Thus, government did not wield the power to take money from people in order to give it to other people.
Imagine: No immigration controls. People from all over the world were free to come to the United States. With the exception of a cursory health inspection for such things as tuberculosis, no one was denied admission, no matter how poor, illiterate, or uneducated.
Imagine: No systems of public (i.e., government) schooling. No compulsory-attendance laws and no school taxes. Education was left to the free choices of families and individuals.
Imagine: No Federal Reserve System. Banks were privately owned and there was no government central monitoring authority.
Imagine: No paper money. People believed in sound money, which is why they used the Constitution to establish a gold standard. People transacted their business with gold and silver coins.
I’m not suggesting that there weren’t exceptions to these principles from time to time in the 1800s and early 1900s. Perfection is impossible to attain, but, by and large, these were the overall principles of the paradigm known as “economic liberty” to which our American ancestors subscribed and under which they lived.
Let’s examine the economic system under which Americans live today.
First, extremely burdensome progressive income taxes, capital-gains taxes, and estate taxes.
Second, an enormous regulatory scheme in which government bureaucrats have the power to supervise, monitor, and control people’s financial and economic activities.
Third, a massive welfare system, including Social Security, Medicare, Medicaid, farm subsidies, education grants, federal deposit insurance, and much, much more.
Fourth, an enormous and complex plan for immigration. The plan entails restrictions on the ability of people to freely enter the United States, with an enforcement mechanism that grows ever more severe.
Fifth, a nationwide system of government education systems, which involve government planning, direction, and control of what is taught to the children of America. While the public-school systems are run by state and local governments, what is taught is strongly influenced by federal officials as a result of federal aid to education.
Sixth, a monetary system in which the federal government has the authority to print unlimited amounts of paper money. The government also closely regulates, supervises, and monitors banks across the United States.
Seventh, paper money. The gold standard is nonexistent and people now transact their business with nonredeemable paper money, whose value has steadily diminished over the decades.
The life of the lie and unreality
Do you notice any differences between the economic system under which our American ancestors lived and the economic system under which today’s Americans live?
Why is that important? Two reasons.
First, throughout the financial crisis mainstream commentators, both liberal and conservative, have been claiming that the crisis reflects a failure of “free enterprise” and, therefore, that government intervention is needed to fix the crisis.
Second, this crisis provides the opportunity for libertarians to raise people’s vision to a much higher level than some “reform” plan, a level that brings to an end the economic system under which we’ve all been born and raised and that restores and builds upon the economic system to which our American ancestors subscribed.
Throughout the bailout controversy, there have been those who have railed against unfettered capitalism, free markets, deregulation, free enterprise, self-interest, and greed. The crisis, they argue, is proof positive that America’s much-vaunted free-enterprise system has failed and, therefore, that it’s necessary for government to step in and save the system.
This mindset is what might be called the “life of the lie” or the “life of unreality.” After all, when we compare the principles that guided the paradigm of economic liberty on which our nation was founded with the principles of today, we find completely opposite principles. If the economic paradigm under which we are living is capitalism and free enterprise, then what was the economic paradigm under which our American ancestors lived?
The key to this life of the lie and life of unreality lies with a monumental event in the life of the republic – the Great Depression, which began with an enormous stock-market crash in 1929 and lasted for more than 10 years. Although the event took place long before most of us were born, it is impossible to overstate the impact that it continues to have on most Americans.
The role of government schools
An important digression is in order at this point. There is a reason that so many mainstream pundits believe (perhaps honestly) that the current financial crisis reflects a failure of free enterprise. The reason is rooted in the Great Depression or, to be more precise, what these pundits have learned about the Great Depression. Here is where the government program known as public schooling plays a critically important role in people’s understanding of what is happening today.
While most people believe that the primary purpose of public schooling is to ensure that everyone receives an education, nothing could be further from the truth. The reason that governments everywhere force the children of the nation into these government facilities is to mold their minds. Long ago, government officials learned that if they could control what children learn every day from the age of 6 through 18, over a course of 12 years they could indoctrinate them into accepting officially approved interpretations of historical events.
No better example of this phenomenon could be found than that relating to the Great Depression. If one conducted a poll of Americans asking whether the Great Depression reflected a failure of America’s free-enterprise system, my hunch is that the overwhelming majority of them would answer, “Yes.” They would also respond that President Roosevelt’s response to the crisis – the New Deal – saved America’s free-enterprise system.
Now, ask yourself: How is it that so many Americans have arrived at the same conclusion about the Great Depression? It’s not a coincidence. It is what American students are taught in public schools and, for that matter, in government-approved private schools. In fact, it is also what most American college and university students are taught in state-supported universities and colleges.
There is just one big problem with what Americans have been taught about the Great Depression and the New Deal. It’s all a lie. It’s that simple. All those years of state indoctrination produced mindsets that are filled with lies and deceptions.
The truth is that the Great Depression reflected not the failure of America’s free-enterprise system but rather the failure of the system that replaced America’s free-enterprise system. And contrary to popular belief, Franklin Roosevelt’s New Deal programs didn’t save free enterprise; they instead fully and completely rejected and abandoned the free-enterprise system that America had embraced since our nation’s founding and replaced it with a system in which the federal government’s primary purpose became to confiscate and redistribute wealth and control and regulate economic activity.
Economic liberty versus socialism
There have been economists who have pointed out this uncomfortable truth. They include Ludwig von Mises, Friedrich Hayek, and Milton Friedman. Mises and Hayek were members of the so-called Austrian school of economics, a school of economic thought that advances free-market principles. Friedman was an economist in what became known as the Chicago School. Hayek and Friedman were winners of the Nobel Prize.
All three of these economists, along with countless of their students and successors, have long maintained that what failed in the Great Depression was not free enterprise but rather government intervention. They have also long pointed out that Roosevelt’s New Deal programs, based on socialist and fascist principles, actually prolonged the Great Depression. Finally, they have long pointed out that the economic system under which Americans of today were born and raised isn’t free enterprise but rather welfare-state socialism and regulatory interventionism.
Obviously, what Mises, Hayek, and the Austrians, as well as Friedman and the Chicago School, were saying for decades hasn’t sat well with liberals, conservatives, or mainstream pundits. Thus, it shouldn’t surprise anyone that their ideas, philosophy, and policy prescriptions were not likely to be discussed in any history or economics textbook or lectures in government schools or even government-approved private schools.
What is of paramount importance, from the standpoint of those who subscribe to the status quo, is that the indoctrination of America’s young people continue as usual, no matter how false or fallacious. The last thing that federal officials wanted in the 1930s was for people to figure out that the federal government was responsible for the Great Depression. It’s also the last thing they want people to discover today.
While Roosevelt’s New Deal constituted a wholesale rejection of free-enterprise principles, the rejection of economic liberty had actually begun years before. The intellectual battle began in the late 1800s, with economic libertarians on the one side and advocates of government control over enterprise on the other. Slowly but surely, the supporters of socialism and interventionism began making headway with their ideas.
For example, there was the Sherman Antitrust Act in 1890, a federal law that criminalized voluntary mergers or combinations between businesses. It was the first of many economic crimes that would later be enacted by federal officials. There was also a growing push at the state level for economic regulation, for example, occupational licensure, minimum-wage laws, and inspections of businesses. The movement toward increased government involvement in American economic life was manifested by the Progressive movement, the socialist and interventionist philosophy and ideas of which would later be embraced by both Republicans and Democrats.
Two of the most significant changes in American life took place in 1913. In that year, the Sixteenth Amendment was adopted, which reflected the national urge to permit the federal government to impose taxes on income, something that earlier Americans had abhorred. The Congress also established the Federal Reserve System, a central bank that had the monopoly power to expand and contract money and credit, another program that early Americans had rejected.
As Mises, Hayek, and Friedman pointed out, throughout the 1920s the Federal Reserve was artificially expanding credit. Have you heard the phrase “the Roaring Twenties”? One of the reasons the decade was roaring was that the Fed, through the expansion of credit, was making the economy “roar.”
As prices started to rise, however, in response to the Fed’s inflationary policy, the Fed moved in the opposite direction – contraction of the money supply. The Fed over-contracted, however, sucking massive amounts of money out of the system, which produced a massive recession.
Rather than simply letting things sort themselves out, Roosevelt convinced people that what was actually needed was a major transformation of America’s economic system – a “new deal” in which the primary mission of the federal government would be to tax and redistribute wealth and regulate economic activity.
Here are the roots of Social Security, Medicare, Medicaid, FDIC, and the rest of the welfare state. Here are the roots of the SEC, the departments of Labor, Agriculture, and Commerce, a multitude of regulatory agencies, and a never-ending stream of tax, banking, labor, economic, and commercial regulations. Here are the roots of America’s 20th-century and 21st-century experiment with socialism and interventionism.
Roosevelt’s political brilliance was not just in bringing about a revolutionary change in America’s economic system. His political acumen was also reflected in how he sold his revolution – as a free-enterprise reform designed to save America’s free-enterprise system.
What could be more brilliant than that? After all, the last thing most Americans wanted was to be called socialists or interventionists. They wanted to be considered as pro–free enterprise as their predecessors. So Roosevelt made them feel good about what he was doing – adopting a paternalistic welfare, regulatory state, but continuing to call it “free enterprise.”
It was important, for both Roosevelt and the American people, that the lie be maintained. It was important that people continued believing that everything was the same as before. So what if early Americans rejected income taxes, welfare, economic regulations, a central bank, drug laws, paper money, and public schooling? So what if their successors embraced all those things? What mattered was that the lie and the myth be maintained, at all costs.
Now do you see why so many modern-day commentators, both liberal and conservative, are maintaining that the current financial crisis constitutes a failure of America’s free-enterprise system? Ever since they were children, they have lived in a system whose economic principles are totally contrary to those of our ancestors, but their minds have been molded into believing that opposites are the same.
Where do libertarians fit in all this? We are the advocates of the principles of economic liberty to which our ancestors subscribed. Is it any surprise that we make government officials and mainstream pundits so uncomfortable? Is it any surprise that they do everything they can to ignore or shun what libertarians are saying? Is it any surprise that they erect mountains of electoral barriers to candidates with libertarian perspectives?
We expose their life of the lie. We cause them to confront reality. We remind them of what they have done. We put their abandonment of principle on display. We show them how they’ve been indoctrinated. That’s not a pleasant experience for someone whose life is dedicated to socialism and interventionism but whose mind has been molded into thinking that he’s an advocate of the free market.
During the recent presidential race, Republican John McCain accused Democrat Barack Obama of being a socialist, owing to Obama’s belief in using the federal government to “spread the wealth.” Obama, for his part, expressed surprise at being accused of being a socialist. Apparently, he’s always believed that he’s a strong supporter of America’s “free-enterprise” system.
The irony is that McCain called Obama a socialist during the very time that McCain was supporting the federal bailout of U.S. financial firms, banks, and insurance companies. What better example of socialistic redistribution of wealth than that? Equally ironic was the fact that the bailout plan entailed the federal government’s taking partial ownership of banks and insurance companies.
While pure socialism entails complete government ownership of the means of production, there are important markers of socialist activity. They include: (1) the government takes money from one group of people and gives it to another group; (2) the government centrally plans economic activity; and (3) the government owns and operates business enterprises.
Don’t those three tenets describe perfectly some of the primary functions of the U.S. government ever since the New Deal in the 1930s? Isn’t the welfare state a good example of government’s taking money from some in order to give it to others?
An example of central planning is the Federal Reserve System, which plans the monetary affairs of the United States.
Examples of public ownership of business enterprises include Amtrak and the Tennessee Valley Authority.
Socialism is not the only economic philosophy that has guided the United States for the last 80 years. There is also an economic philosophy known as interventionism. Under interventionism the government intervenes in private economic activity with rules, regulations, subsidies, or tax benefits. That’s what the SEC is all about, along with the Federal Reserve, the departments of Agriculture, Labor, and Commerce, and multitudes of regulatory agencies. Interventionism leaves the means of production in private hands but controls, manipulates, and regulates economic activity.
It would be difficult to find a better example of both socialist central planning and interventionism than the U.S. housing market, that sector of the economy that ignited the financial firestorm that has engulfed the world.
Here is what federal central planners and interventionists did. Primarily through the U.S. Department of Housing and Urban Development (HUD), they came up with a plan that would ensure home ownership for almost every American. Home ownership is the American dream, or so they said. The problem with a free market, the planners thought, is that banks and financial institutions are ordinarily resistant to lending money to high-risk customers. The inability of many poor and middle-class people to borrow money to purchase a home is a flaw in the free market, the planners felt, so they came up with a plan that would solve the problem.
In 1977, Congress enacted the Community Reinvestment Act, which prohibited banks from discriminating against poorer-risk customers, including those who lived in poorer parts of town. However, the banks didn’t actually have to assume the risk of the loans. That’s where Fannie Mae and Freddie Mac came into the picture. They are quasi-government agencies that would purchase the mortgage loans from the banks, thereby relieving the banks of the risk of default.
Fannie Mae and Freddie Mac would then package the mortgages into collateral for debt instruments issued by them. The reason that investors all over the world purchased those debt instruments as investments is that the U.S. government was serving as an implicit guarantor of mortgage-backed securities. The idea was that if borrowers defaulted in payments on their loans, investors wouldn’t lose their money because the federal government would cover the losses.
Ultimately, the entire house of cards came crashing down, as socialist central plans are apt to do. Large numbers of people began defaulting on their home-mortgage payments and investors were facing massive losses on their investments. As expected, the federal government entered the picture and began covering the enormous losses that institutions were suffering as a result of the home-loan scheme.
Free enterprise or interventionism?
Does any of that sound like “free enterprise”? Free enterprise means enterprise that is free of government intervention and manipulation. Here you have massive government intervention in the form of mandatory rules requiring the funding of high-risk loans, government purchase of those loans, government selling of those loans, and government guarantee of those loans, all pursuant to a socialist central plan to help people buy homes.
Yet throughout the crisis there have been those, including McCain and Obama, who have steadfastly maintained that the problem was “free enterprise” itself and, therefore, that the only solution was the heavy hand of government to “save free enterprise.”
Obviously, history was repeating itself. Isn’t that exactly what Franklin Roosevelt and the New Dealers said? Didn’t they claim that the Great Depression reflected the failure of free enterprise when in fact it reflected the failure of monetary central planning and interventionism, as Ludwig von Mises, Friedrich Hayek, Milton Friedman, and other economists have shown?
Why were both McCain and Obama and so many others claiming that “free enterprise” was the culprit in the current economic crisis?
One possibility is that they truly believe that the United States has a free-enterprise system. If a person honestly believes that, then it’s entirely logical for him to conclude that “free enterprise” has produced the current financial crisis.
And why would anyone honestly believe that America is a “free-enterprise” country, when it’s obvious that Americans rejected and abandoned the principles of economic liberty during the 1930s in favor of socialism and interventionism? Because many of these people have absolutely no idea that that is what happened. From the first grade on up, government-approved schoolteachers have ingrained into students’ minds that America has always had the same type of economic system – a “free-enterprise system,” which failed and produced the Great Depression, and which was saved by the New Deal’s welfare state and centrally planned and regulated economy.
But there’s another possible explanation for why some people – extremely intelligent people who should know better – are blaming the financial crisis on “free enterprise.” They know that the crisis goes to the very heart of the socialist-interventionist paradigm under which America has operated since the 1930s. Equally important, they know that libertarians know the truth and are speaking the truth about this entire charade. The last thing they want is for ordinary Americans to begin questioning the myths and lies with which America has been living for almost a century. That could bring down the entire socialist and interventionist paradigm under which America has been operating and bring about the restoration of economic liberty to our land.
Conservatives and libertarians
In blaming the financial crisis on “free enterprise,” socialists and interventionists often level their criticisms at both conservatives and libertarians. In doing so, they oftentimes pretend that libertarianism is nothing more than a subset of conservatism. Since conservatives and libertarians both favor free markets and detest socialism and regulation, the argument goes, what has failed is the free-market policies of conservatives and libertarians.
The criticism is valid insofar as conservatives are concerned but not libertarians. Long ago, most conservatives abandoned opposition to the welfare state and the regulated economy and have devoted their efforts to gaining control over it and running it. Most libertarians, on the other hand, have maintained a steadfast opposition to all socialist and interventionist programs and continue to call for their repeal.
For example, do conservatives call for the eradication, rather than the reform, of such things as the income tax; the Federal Reserve System; paper money; the SEC; the departments of Labor, Agriculture, Commerce, Education, and HUD; Social Security, Medicare, and Medicaid; education grants; welfare; regulation; and trade restrictions?
No, they don’t. The most they do is call for “reform” and getting rid of “waste, fraud, and abuse.” But libertarians do oppose all these programs and call for their eradication, not their reform.
Thus, when socialists and interventionists claim that “free enterprise” has brought the financial crisis, they’re obviously referring to how conservatives view “free enterprise” – that is, as a warmed-over, reformed welfare state and regulated economy. They are not referring to libertarianism, a philosophy in which there would be no welfare-state or regulatory laws, rules, regulations, departments, or agencies.
Would businesses fail in the unhampered market economy that libertarians seek? Would people’s investments go down from time to time? Would banks go under? Some undoubtedly would. But at the same time, the risk of failure nurtures important values, such as responsibility and prudence.
Like it or not, life is insecure. The socialist illusion is that by surrendering economic liberty, the government can make life secure. It does not and cannot. As the Founding Fathers pointed out, those who trade liberty for security gain neither – and deserve neither.
In his book The Critique of Interventionism, Ludwig von Mises pointed out that government interventions into economic activity will inevitably lead to more interventions. The reason is that the initial intervention inevitably produces chaos and crises which cause people to call for new interventions to solve the problems of the previous interventions. At the end of the interventionist road is the totally controlled economy – omnipotent government.
In the current crisis, that’s what the socialist bailout of financial firms, partial nationalization of banks and insurance companies, a moratorium on foreclosures, proposals for the government to purchase mortgages, and increases in deposit insurance are all about. They are all socialist and interventionist measures that purport to solve the chaos and crises arising from previous interventions. They lead in but one direction: bankruptcy, inflation, chaos, crises, omnipotent government, tyranny, and the loss of liberty.
June 2, 2009
Jacob Hornberger [send him mail] is founder and president of The Future of Freedom Foundation.
Copyright © 2009 Future of Freedom Foundation
© 2009 Copyright LewRockwell / Jacob G. Hornberger - All Rights Reserved
Disclaimer: The above is a matter of opinion provided for general information purposes only and is not intended as investment advice. Information and analysis above are derived from sources and utilising methods believed to be reliable, but we cannot accept responsibility for any losses you may incur as a result of this analysis. Individuals should consult with their personal financial advisors.
© 2005-2019 http://www.MarketOracle.co.uk - The Market Oracle is a FREE Daily Financial Markets Analysis & Forecasting online publication. | http://www.marketoracle.co.uk/Article11057.html |
We frequently assist clients in the formation of Omani companies. Clients who are not accustomed to doing business in Oman tend to have quite a few questions regarding the company formation process, on everything from complex subjects like corporate governance to more mundane - but important – things like naming the Omani entity. From time to time we publish such ‘frequently asked questions in the Client Alert for the benefit of all of our readers.
What name should we give to our Omani company?
For many of the clients that we help to form an Omani corporate entity, one of their first questions is what name they should give to the new company. Many wish to include the word “Oman” in the name, as in “Acme Widget Company (Oman) LLC”. However, due to internal regulations of the Ministry of Commerce and Industry, an Omani company must have a minimum capitalization of 500,000 Omani Rials (approximately US$1,300,000) in order to carry “Oman” in its name. This is significantly higher than the 150,000 Omani Rials (approximately US$400,000) capitalization that is normally required for Omani companies with foreign ownership. As a result, many of our clients choose names for their Omani entitiy that reference the region rather than the country, such as “Acme Widget Company (Gulf) LLC” or “Acme Widget Company (Middle East) LLC”.
How long does it take to form an Omani company?
We normally estimate that it takes one to two weeks to set up an Omani company once all of the appropriate corporate paperwork has been arranged, although the formation process can sometimes take as little as a few days depending on the availability of government authorities. Careful planning is the key to maximizing the speed of the process and minimizing headaches, and professional advisors can play a helpful role in determining which documents are necessary and how to prepare and/or obtain them most efficiently.
Monday, March 21, 2011
Company Formation FAQ’s
We frequently assist clients in the formation of Omani companies. Clients who are not accustomed to doing business in Oman tend to have quite a few questions regarding the company formation process, on everything from complex subjects like corporate governance to more mundane - but important – things like naming the Omani entity. From time to time we publish such ‘frequently asked questions in the Client Alert for the benefit of all of our readers.
Tuesday, March 15, 2011
Focus on Litigation: The Enforceability of Omani Court Judgments
The enforceability of Omani court judgments is an issue which can cause concerns.
A Primary Court judgment is not enforceable, provided an appeal is filed with the Appeal Court no more than 30 days after the oral pronouncement by the Primary Court of its judgment.
However, an Appeal Court judgment is, prima facie, enforceable – even though an Appeal Court judgment can be appealed to Oman’s third and final tier of justice, the Supreme Court. As a result, the loser of an Appeal Court case is best advised to file an appeal to the Supreme Court, and also file an application with the Supreme Court, requesting the suspension of any enforcement of the Appeal Court judgment.
These scenarios are intricate and somewhat complex, so we recommend that detailed legal advice is sought as early as possible in order that rights are best protected.
Thursday, March 10, 2011
The Basic Law of Oman: Principles for Business
The Basic Law of the Sultanate of Oman, promulgated as Royal Decree 101 of 1996, holds a unique place in Oman’s pantheon of laws.
All other royal decrees are statutes that govern a particular area of law, setting out specific rules and providing guidance for governmental authorities to enact further regulations.
The Basic Law is different. It forms the bedrock of all Omani law. As its name suggests, the Basic Law is a foundational document that is very broad in scope. Although the Basic Law does contain specific directives, such as on succession procedures for the position of Sultan, it mainly addresses the overall structure of Omani government, including the legislative and judicial framework. The Basic Law enshrines the fundamental rights of the citizens and the guiding principles of the State.
Several of these principles, in particular, can be illuminating to companies that seek to do business in Oman:
“The basis of the national economy is justice and the principles of a free economy … constructive, fruitful co-operation between public and private activity … to achieve economic and social development that will lead to increased production and a higher standard of living for citizens ….”
The above-quoted text, from the first of the Economic Principles listed in Article 11 of the Basic Law, is perhaps the most important to companies, because it embodies the Sultanate’s economic approach. The Omani government views foreign investment and cooperation between the public and private sectors as key to increasing the nation’s workforce skills, economic development and living standards. As we have seen in our own work, most Omani businessmen and government officials are very welcoming, professional and helpful because they truly want Oman to be ‘Open for Business’.
“Freedom of economic activity is guaranteed within the limits of the Law and the public interest, in a manner that will ensure the well-being of the national economy.”
This principle sums up another key feature of the Sultanate’s approach to business: Oman has not let its zeal for further economic development cause it to abandon prudent and upstanding business practices. We have often heard Omani businessmen and government officials make clear that they want long-term, responsible development, not the ‘fast buck’ or ‘hit-and-run profits’. Oman is most interested in long-term, conservative and sustainable business.
“The State encourages saving and oversees the regulation of credit.”
This principle, in some ways, may be the best sign of all for companies seeking to do business in Oman. It reflects Oman’s culture of financial conservatism, which has helped the Sultanate avoid the excesses that have put some of its neighbors under severe stress. Omanis plan carefully not just to be open for business today, but for generations to come.
Monday, March 7, 2011
Legal Developments in Oman - March 7, 2011
Guarantees and Indemnities
Guarantees and indemnities are both forms of what is known in legal terminology as ‘suretyship’. Suretyship refers to a promise by one person to be liable for the payment of another person’s debts or the performance of another person’s obligations in the event of that person’s failure to pay or perform (or a failure in relation to some other condition).
Guarantees and indemnities are often confused, but there are important distinctions between them.
Guarantees
A guarantee is a promise by the guarantor to a third party that a principal will meet its obligations to the third party – whether by the payment of a debt or by the performance of a duty. In essence, the guarantor says to the third party, “if the principal fails to pay you or perform for you, I will do so.”
Indemnities
An indemnity is a promise to be responsible for another party’s loss and to compensate them for that loss on an agreed basis. For example, the indemnifying party might say, “if it costs more than $100 to repair your car, I will reimburse you for any amounts over $100.”
Guarantees vs. Indemnities
The key distinction between a guarantee and an indemnity is that a guarantee presupposes an original contract, while a contract of indemnity is original and independent.
A guarantor cannot be liable for anything more than what was promised by the principal. The concept is that the obligations of the guarantor stand behind those of the principal and only come to the fore once the principal is in breach of its obligations. The guarantee can therefore be seen to be an accessory contract to the principal’s main contract.
An indemnity, in contrast, provides for concurrent primary liability with the principal to answer for a third party’s loss.
Whether the contracting parties choose to use a guarantee or an indemnity, it is important to record all important contractual promises in writing.
Thursday, March 3, 2011
Legal Developments in Oman - March 2, 2011
Audit Committees
The Commercial Companies Law requires the board of directors of an Omani joint-stock company to form various committees from among its members to discharge some of the board’s delegated functions.
One such committee is the audit committee, which a publicly listed joint-stock company (an “SAOG”) is required to have. The composition and functions of an SAOG’s audit committee are prescribed by the ‘Rules on the Constitution of Audit Committee’ published by the Capital Markets Authority.
Composition and Purpose of the Audit Committee
The audit committee must consist of at least three non-executive members of the company’s board of directors – i.e., directors who are not salaried employees of the company. A majority of the audit committee members, including the chairman of the audit committee, must be independent directors – i.e, they and their first-degree relatives must not have occupied a senior post in the company (such as Chief Executive Officer or General Manager) over the past two years. At least one member of the audit committee must have financial and accounting expertise.
The purpose of the audit committee is to assist the board in ensuring the:
• reliability of financial reporting;
• effectiveness of internal controls; and
• legal and regulatory compliance.
The board decision appointing the audit committee should, inter alia, specify the terms of reference for the committee’s functioning, the location and quorum requirements for the committee’s meetings, and the methodology for the committee’s execution of its responsibilities.
The audit committee should specify in its charter for the board’s approval its objectives, membership, powers, responsibilities and liabilities, and the remuneration of its members.
Functions of the Audit Committee
An audit committee’s predominant function is the oversight of financial reporting and internal disclosure mechanisms within the company. This is why the Capital Market Authority requires audit committee members to be non-executive (and majority-independent) directors: an independent audit committee significantly enhances internal controls, the financial reporting process and corporate governance.
Additionally, the audit committee may also carry out related functions such as supervising the company’s regulatory compliance and business ethics, and developing independent reporting mechanisms that help the company detect and combat fraud and financial irregularities.
As described below, the CMA Rules delineate the functions for an audit committee and the specific responsibilities within each function.
External audit functions include:
• Recommending external auditors and overseeing their terms of engagement, independence, qualifications, and performance; and
• Reviewing the external audit plan and ensuring for the external auditors the accuracy and completeness of, and access to, documentation.
Internal audit functions include:
• Oversight of the internal audit plan and the performance of internal audit function and its efficacy; and
• Monitoring the adequacy of internal control mechanisms by analysing periodic reports generated by the auditors.
Financing reporting functions include:
• Developing a financial reporting system to detect financial irregularities and fraud based on best practices in accounting policies and principles;
• Monitoring any change in accounting policies and any significant departure from international accounting standards or non-compliance with the disclosure requirements prescribed by the CMA;
• Ensuring the accuracy of financial reporting generally and the accounting principles adopted; and
• Reviewing quarterly and annual financial reports and, in particular, the qualifications in the draft reports.
Corporate governance functions include:
• Serving as the liaison among the board of directors, external auditors and internal auditors and financial management;
• Reviewing risk management policies and practices;
• Reviewing proposed related party transactions and making appropriate recommendations to the board; and
• Formulating rules for small value-related party transactions without requiring the prior approval of the board or the audit committee.
Finally, many private companies also have audit committees that perform many of the same functions as public company audit committees. Although the Capital Market Authority’s ‘Rules on the Constitution of Audit Committee’ are not mandatory for companies that are not publicly listed, these rules represent the type of robust audit framework that every company should have to ensure strong and effective internal controls and financial integrity. | https://omanlawblog.curtis.com/2011/03/ |
Of particular interest for cybercriminals is the Domain Name System, which plays a central role in orchestrating all Internet and application traffic.
Are you in the 26% of people who use one of these PIN codes to unlock their phones? The post You’d better change your birthday…
Threat actors increasingly using malicious URLs, HTTPS domains, file-sharing sites in email attacks, FireEye says. | https://accentconsulting.com/blog/category/security/ |
Introduction
============
The clock-drawing test (CDT) is important for evaluating mental status in both neurological and psychiatric populations ([@B23]). It is applied widely for Alzheimer's disease (AD) and related dementias, along with many other neurocognitive disorders such as Huntington's disease and Parkinson's disease ([@B64]; [@B71]; [@B87]; [@B57]). Although simple and easy to administer, performance of the CDT depends on successfully engaging multiple cognitive functions including visuospatial processing, executive function, semantic memory, and planning ([@B64]; [@B23]; [@B65], [@B66]; [@B71]; [@B55]). Due to the multi-domain nature of the task, it has proven to be an effective screening tool for AD and dementia with a sensitivity range of 76--87% and specificity range of 78--87% depending on the scoring method employed ([@B85]; [@B2]; [@B35]; [@B49]; [@B84]).
Many studies have evaluated the efficacy of the CDT as a clinical assessment ([@B36]; [@B71]; [@B87]; [@B57]; [@B17]), but very little has been reported on the neuroanatomical underpinnings of successful CDT performance in healthy individuals and patients. Given the widespread use of the CDT as a neuropsychological assessment tool, it is essential to determine which brain regions are involved in this test in a healthy older population in order to identify brain areas in which pathological aging may lead to impaired CDT performance. A critical area of healthy aging is the transition from older middle age to \>80 years of age, as this is when the prevalence of dementia substantially increases ([@B52]; [@B83]). Research has shown a relationship between CDT scores and age, with performance declining in the elderly population ([@B36]; [@B53]; [@B32]).
Early neuroimaging work has been done to investigate the neural correlates of the CDT ([@B82]; [@B33]; [@B37]; [@B78]; [@B79]; [@B42], [@B41]). Researchers have used single photo emission computed tomography (SPECT) to correlate resting regional cerebral blood flow with CDT score and found significant relationships with the bilateral parietal and posterior temporal lobes, right middle frontal gyrus and right occipital lobe ([@B82]; [@B41]). Other studies have implicated the bilateral temporal lobes, right parietal lobe, and the frontal cortex using magnetic resonance imaging (MRI) to measure the correlation between gray matter density and CDT score ([@B5]; [@B78]; [@B42]).
Beyond these methods, functional MRI (fMRI) provides a tool capable of identifying networks of activity throughout the whole brain during CDT performance, based on the blood oxygenation level-dependent (BOLD) signal contrast mechanism ([@B50]). Despite the heavy usage of fMRI in neuroscience, there are special ergonomic and engineering challenges associated with realistically implementing the CDT in such imaging studies, because the test requires individuals to communicate in writing while lying in the magnet bore ([@B77]). Only one previous task-based fMRI study has reported brain activity during a modified version of the CDT ([@B33]), in which participants traced clock hands using their finger on a plastic board after receiving auditory instructions. The participants did not complete the entire clock drawing task, used their finger to draw and had no visual feedback of their actions- all of which may contribute to substantially different task demands and underlying brain regions compared to the CDT, limiting interpretation of the fMRI results. [@B70] used multichannel near-infrared spectroscopy (NIRS) to overcome the limitations of an MRI environment and measure hemoglobin concentration changes during a traditional version of the CDT ([@B70]). However, the study only measured hemoglobin changes in the bilateral prefrontal and superior temporal cortical surface regions, providing limited information about the whole-brain response during CDT performance.
The present study extends prior research by employing novel fMRI-compatible touch-sensitive tablet technology with real-time visual feedback of hand and stylus position ([@B34]), to investigate performance and neural correlates associated with the CDT in a much more realistic testing environment. This initial work aimed to examine the underlying neural correlates of the CDT in a healthy older aging population, hypothesizing that (1) the test engages extensive areas of the brain including the bilateral frontal and parietal lobes; and that (2) decreases in task-related activity in key frontal and parietal areas are associated with age-related reductions in task performance.
Materials and Methods {#s1}
=====================
Participants
------------
Thirty-seven (*n* = 37) cognitively healthy older participants aged 52--85 were recruited into the study from the local community. All participants had to meet MRI screening criteria, which ensured they had no metal in their body or any other safety hazards that would pose a threat during the MRI scanning procedure. Participants were excluded if they had a history of any of the following: stroke, traumatic brain injury, brain tumor, seizure, any neurological condition (e.g., Parkinson's disease, Alzheimer's disease, multiple sclerosis), any psychiatric condition (e.g., bipolar disorder, schizophrenia), a gross movement disorder or impairment or substance abuse. No participants had any visual abnormalities that were not corrected with lenses or significant hearing loss. All participants were right handed based on the Edinburgh Handedness Inventory ([@B51]) and were fluent in English. All provided written informed consent to participate in the study, which was approved by the Research Ethics Board at St. Michael's Hospital, Toronto, Canada. Four participants were excluded from the analysis: one had an outlying Montreal Cognitive Assessment (MoCA) score (see section Analysis of Behavioral Measures); one was unable to follow instructions; one had non-reproducible brain activity; and one had significantly elevated head motion (see section fMRI Preprocessing and Analysis).
Psychometric Testing
--------------------
The cognitive abilities of the participants were assessed prior to the MRI session using the MoCA ([@B48]), which is a commonly used cognitive assessment battery, and the CDT. This work was conducted in the context of a larger fMRI study that included other neurocognitive tests (i.e., letter cancelation test, trail-making test, mazes), which were administered at this time to provide validation for the tablet versions of these tests. All tests were led by an experienced test administrator (MH, NT). For the CDT, participants were given a blank piece of paper and a pen, and instructed to "draw a large circle, put all the numbers in to make it look like the face of a clock, draw the hands of the clock to show 10 min after 11 and to stop when completed." The time to complete the entire CDT was recorded with no maximum time allotted. After the fMRI session, the participants completed the post-experimental tablet questionnaire, which provided self-reported ratings on task performance and comfort during the MRI session, and the Edinburgh Handedness Inventory.
Magnetic Resonance Imaging
--------------------------
Participants were imaged at St. Michael's Hospital using a 3.0 Tesla MRI system with the standard 20-channel head coil (Magnetom Skyra, Siemens Healthineers, Erlangen, Germany). Structural images were acquired using a three-dimensional T1-weighted Magnetization Prepared Rapid Acquisition Gradient Echo protocol (MPRAGE: inversion time (T1)/echo time (TE)/repetition time (TR) = 1090/3.55/2300 ms, flip angle (FA) = 80°, bandwidth (BW) = 200 Hz/px, sagittal orientation with field of view (FOV) = 240 mm by 240 mm by 173 mm, 256 by 256 by 192 acquisition matrix, isotropic voxel dimension = 0.9 mm thickness). The fMRI data were acquired during CDT performance using two-dimensional multi-slice T2^∗^-weighted echo planar imaging (EPI: TE/TR = 30/2000 ms, FA = 70°, BW = 2298 Hz/px, oblique-axial, slices interleaved ascending, with FOV = 200 by 200 mm, 64 by 64 acquisition matrix, 32 slices with 4.0 mm thickness and 0.5 mm gap, voxels = 3.125 mm by 3.125 mm by 4.0 mm).
fMRI-Compatible Tablet Technology
---------------------------------
The MRI-compatible tablet has a touch screen and stylus to provide a realistic approximation of pen and paper conditions, as well as an augmented reality system providing visual feedback of hand and stylus position for fine motor control ([@B34]). During imaging, participants lay supine with an adjustable mount over their waist to hold the tablet and camera in place, which enabled them to make precise tablet interactions with their arm supported. A mirror was angled at the top of the head coil enabling participants to view task instructions and their tablet interactions on a display screen that was illuminated by an MR-compatible projector (Avotec, Stuart, FL, United States). A picture of the set-up is shown in [Figure 1](#F1){ref-type="fig"}. Participants were provided with pads underneath their elbows for comfort when performing tablet interactions. fMRI-compatible prescription glasses (MediGlasses for fMRI, Cambridge Research Systems, Kent, United Kingdom) were provided for participants as necessary.
{#F1}
fMRI of the CDT
---------------
The tablet-based CDT was presented to participants using commercially available software for behavioral testing (E-Prime Version 2.0, Psychology Software Tools, Inc., Sharpsburg, PA) run on a personal computer. The CDT was designed by adapting the Ministry of Transport Ontario (MTO) version of the task ([@B47]). Before beginning, the participants were briefed on the experimental set-up and performed a training session to familiarize them with the tablet. Participants also completed a practice session in the magnet bore where they performed simple tasks (write your name, trace a flower, etc.) and were qualitatively assessed to ensure they were able to manipulate the stylus.
The tablet-based cognitive testing involved a battery of different tasks, which were presented in a randomized order. The CDT was one of the tasks in this battery. The tablet-based CDT protocol consisted of two "runs" (total time duration = 14 min). There were approximately 12 min of other cognitive tasks interleaved between the two CDT runs. The task design for each CDT run is depicted in [Figure 2](#F2){ref-type="fig"} and consisted of three condition blocks: the clock-drawing test (CDT), a circle tracing condition and a fixation condition. The order of the three conditions (CDT, circle tracing and fixation) was fixed in order to provide periods of rest (visual fixation) between each of the CDT and circle tracing blocks. For the CDT, participants were instructed by a text display to "draw a large circle. Put all the numbers in to make it look like the face of a clock. Draw in the hands of the clock to set the time to the time specified. Stop when completed." Participants were then given 90s to comply with the instructions. Over the two runs, participants performed five trials of the CDT while setting the time to 3 o'clock, 20 min to 4, 10 min after 11, 45 min after 10, and 5 min after 6. Multiple clock times were chosen to minimize practice effects between blocks, with the first time condition (3 o'clock) selected as a simple instruction to help participants adjust to the task. The order of the five CDT time conditions was held fixed. For the circle tracing condition, participants were instructed to continuously trace a circle. They were presented with a pre-drawn circle on the display and continuously traced the outline of the circle for a total of 30 s, as quickly as possible while maintaining accuracy. During the fixation task, participants were asked to fixate their attention on a black cross in the middle of the display for 16 s.
{#F2}
Analysis of Behavioral Measures
-------------------------------
Two different metrics were used to evaluate in-scanner performance on the CDT: score and time to complete. The CDT results were scored using the method outlined by [@B64], which is a semi-qualitative scoring method that consists of three components: R1, used to assess the integrity of the clock face, maximum score = 2; R2, used to assess the presence, sequencing and spatial arrangement of the numbers within the clock, maximum score = 4; and R3, used to assess the presence and placement of the clock hands, maximum score = 4. Higher scores indicate better performance on the task, for example a R1 score of 0 would indicate an inappropriate depiction of a clock face, whereas a score of 2 would indicate a present clock face without gross distortion. This scoring method allows measurement of performance on each individual component of the task, providing more detail on what types of errors are being made. The Rouleau method is commonly used in CDT research, particularly in groups with older populations and dementia because it measures error types ([@B8]; [@B17]; [@B72]; [@B74]). The total score (sum of R1, R2, and R3) was also calculated. Each clock was scored separately by two different individuals to ensure reliability of the scoring method. In the rare event of discrepancy in the score between the two raters (16% of the time), the average of the two scores was used for analysis. In addition, Cohen's Kappa inter-reliability was used to quantify the level of agreement between the two individuals who scored the CDT for each score (R1, R2, R3, and total). The time to complete metric for the CDT consists of the drawing durations of each clock component as well as the completion time for the whole clock. The behavioral measures, including CDT scores and time to complete the clock components and total, were averaged for each participant using data from both CDT runs during fMRI. Therefore, the average performance for each participant included data from all five tablet-based clock conditions (3 o'clock, 20 min to 4, 10 min after 11, 45 min after 10, and 5 min after 6). Average performance was correlated with age using a Spearman's rank correlation. Outliers were determined using the MoCA score to prevent significant cognitive impairment or enhancement from skewing the neurocognitive results for the group. Outliers were classified as MoCA scores that were 2.5 standard deviations outside of the group mean MoCA score. The upper limit exceeded the maximum achievable score on the MoCA. One subject had an outlying MoCA score that was below the lower limit (15, p ∼ 0.01, Normal distribution, 2-tailed). The analogous scores were generated for performance of the standard pen-and-paper CDT. The results for each score (R1, R2, R3, and total) were then compared to the tablet-based CDT results using a Spearman's rank correlation to assess convergent validity. Only the performance of the third tablet-based CDT trial was used in the comparison, so that the time instructions were matched (i.e., "ten past eleven").
fMRI Preprocessing and Analysis
-------------------------------
The fMRI data and structural scans were manually inspected for any visual abnormalities. With none found, data preprocessing and analysis were then performed using a hybrid pipeline, which included tools from the Analysis of Functional Neuroimages (AFNI)^[1](#fn01){ref-type="fn"}^ package ([@B11]), the FMRIB Software Library (FSL)^[2](#fn02){ref-type="fn"}^ package ([@B73]) and algorithms custom-written in the laboratory. The preprocessing pipeline incorporated slice-timing correction (AFNI *3dTshift*), rigid-body motion correction (AFNI *3dvolreg*), spatial smoothing (AFNI *3dmerge*), removal of outlier scan volumes via SPIKECOR ([@B6]), and regression of motion parameters and linear-quadratic trends as nuisance covariates. To control for physiological noise, a) PHYCAA+ ([@B9]) was used to perform data-driven down-weighting of regions other than gray matter, without the need to acquire cardiac or respiratory waveforms during imaging; and b) seed-based regression of white matter and CSF was performed using regions of interest in the left and right corona radiata and the left and right lateral ventricles. The resulting data were transformed into a common neuroanatomical template space as follows: the FSL *flirt* algorithm was used to calculate the rigid-body transform of the mean fMRI volume to the T1-weighted anatomical image, and the affine warp of the T1 anatomical image to the MNI152 (Montreal Neurological Institute) template ([@B43]) for each participant. The net transformation matrices were applied to the fMRI data, which were resampled at an isotropic spatial resolution of 3 mm. Due to the variability in brain size among participants \>80 years old, the anatomical transformation was improved by manual inspection and manual segmentation of the brains, if required.
Analysis of the preprocessed imaging data at the individual subject level (first level) was completed by fitting the task conditions (CDT, circle tracing and fixation) in an ordinary least squares general linear model (GLM), to measure the contrast of CDT performance vs. fixation. Activation during all tasks (CDT, circle tracing and fixation) in both runs was used in the analysis, therefore activity during all five CDT conditions (3 o'clock, 20 min to 4, 10 min after 11, 45 min after 10, and 5 min after 6) was considered. The circle tracing task involves fine motor and visuospatial abilities, making it a challenging task that is not an appropriate control for clock-drawing, therefore the CDT vs. circle tracing contrast was not analyzed in this study. The analysis was done in the NPAIRS ([@B76]) analysis framework, with regression coefficient maps of runs 1 and 2 calculated separately, before combining to obtain a reproducible, Z-scored map of activation, along with a measure of between-run reproducibility (i.e., Pearson correlation of the pairwise voxel values). To ensure that results are not influenced by subjects with excess head motion or poor BOLD signal in this older cohort, two tests were performed on fMRI data. The first test used the motion parameters derived from motion correction, measuring median absolute displacement on each of the 6 rigid-body motion axes for every subject. We then fit a gamma distribution to each parameter and identified any subjects with significantly elevated displacement at *p \<* 0.05 (Bonferroni adjusted). One subject had outlying head motion on the yaw axis (0.75°; group median \[interquartile range (IQR) = 0.19° (0.09°); gamma test, *p* \< 0.001\]. The second test examined between-run reproducibility values and identified any subjects with reproducibility below zero, indicating that CDT-related brain activity was non-reproducible between runs. One subject had non-reproducible brain activity between runs \[Pearson correlation = -0.07; group median (IQR) = 0.50(0.26)\].
Non-parametric group-level (second level) analysis was then done by performing 1-sample bootstrap analyses on the z-scored participant maps for the whole group with effect size on the regression coefficients based on bootstrap resampling and adjusting for multiple comparisons using a cluster size threshold (*p* \< 0.005, cluster size = 20). Covariate analysis was completed using a GLM that included both age and total score as regression coefficients to determine the effect of each variable on the task-related activation.
Results
=======
Participants
------------
Thirty-three participants were included in the final analysis. Demographic and neuropsychological data are summarized in [Table 1](#T1){ref-type="table"}.
######
Demographic and neuropsychological assessment scores of the group.
Median (IQR) Quartile 1 Quartile 3
---------------------------- -------------- ------------ ------------
Age 71.0 (15.0) 65.0 80.0
Gender (female), (%) 19.0 (57.6%)
Years of education 16.0 (3.0) 14.0 17.0
MoCA score 27.0 (2.0) 26.0 28.0
**Paper-Based CDT**
R1 score 2.0 (0) 2.0 2.0
R2 score 4.0 (0.5) 3.5 4.0
R3 score 4.0 (0.5) 3.5 4.0
Total score 9.5 (1.0) 9.0 10.0
Time to complete (seconds) 30.0 (13.0) 23.5 36.4
Values reported in median (interquartile range) format unless otherwise stated. N, number of observations; MoCA, Montreal Cognitive Assessment; CDT, clock-drawing test; R1, clock face drawing component; R2, clock number drawing component; R3, clock hand drawing component.
Behavioral Results
------------------
During fMRI, a statistically significant correlation was found between age and CDT score on all components of the task except R1, the clock-face drawing component ([Table 2](#T2){ref-type="table"}). There was a significant negative correlation between age and drawing the numbers (R2; rho = -0.549, *p* \< 0.001), setting the hands to the correct time (R3; rho = -0.502, *p* = 0.003) and overall CDT score (rho = -0.621, *p* \< 0.001). On the paper version of the task, there was a negative correlation between age and CDT score on all components of the task, however, only the correlation between total score and age was statistically significant (rho = -0.35, *p* = 0.04) ([Table 2](#T2){ref-type="table"}). For both the tablet and paper-based CDT, there was a positive correlation between time to complete the task and age, but without statistical significance ([Table 2](#T2){ref-type="table"}). The Cohen's Kappa value for inter-rater reliability between the two individuals who scored the tablet-based CDT was 0.82, which is classified as almost perfect ([@B10]). There was a strong correlation between scores on the paper-based CDT and the tablet-based CDT (rho = 0.884, *p* \< 0.001), which suggests good convergent validity between the two versions of the task. Post-experimental questionnaires were completed by 18 participants and showed average self-reporting ratings of good performance on the task with no difference in performance between paper-based CDT and tablet-based CDT. Participants reported comfort with the in-scanner set-up and no adverse physiological symptoms during or after the MRI session.
######
Analysis of the effect of age on the performance of the paper-based and tablet-based CDT.
Median (IQR) Rho *p*-value 95% CI
---------------------- -------------- ------- ----------- -------- -------
**Paper-Based CDT**
R1 Score 2.0 (0) -0.11 0.55 -0.44 0.24
R2 Score 4.0 (0.5) -0.18 0.32 -0.49 0.17
R3 Score 4.0 (0.5) -0.21 0.23 -0.52 0.14
Total Score 9.5 (1.0) -0.35 0.04 -0.62 -0.01
Total Time (seconds) 30.0 (13.0) 0.33 0.06 -0.02 0.60
**Tablet-Based CDT**
R1 Score 2.0 (0.1) 0.32 0.07 -0.03 0.59
R2 Score 3.6 (0.8) -0.55 \<0.001 -0.75 -0.25
R3 Score 3.1 (0.7) -0.50 0.003 -0.72 -0.19
Total Score 8.8 (1.4) -0.62 \<0.001 -0.79 -0.35
R1 Time (seconds) 4.8 (2.1) 0.10 0.58 -0.25 0.43
R2 Time (seconds) 22.3 (6.6) 0.26 0.14 -0.09 0.56
R3 Time (seconds) 10.9 (7.2) 0.34 0.054 -0.01 0.61
Total time (seconds) 38.6 (15.3) 0.33 0.06 -0.01 0.61
Data for the tablet-based CDT averaged across all 5 trials. Data for the paper-based CDT consists of only one trial. Values reported in median (interquartile range) format. n, number of observations; rho, Spearman's rank correlation of the CDT performance and age; CI, confidence interval; CDT, clock-drawing test; R1, clock-face drawing component; R2, clock number drawing component; R3, clock hand drawing component.
fMRI Results
------------
[Figure 3A](#F3){ref-type="fig"} shows that across all participants, an extensive pattern of positive activation (increased activity during CDT performance compared to fixation) was observed in the bilateral frontal cortex, occipital cortex, parietal cortex, inferior temporal cortex, cerebellum, insula, supplementary motor area, middle cingulate gyri, precentral gyri and the left post-central gyrus. Negative activation (decreased activity during CDT performance compared to fixation) was observed in the bilateral insula, temporal cortex, hippocampus, parahippocampal gyri, cerebellum, fusiform gyri, precuneus, cuneus, angular gyri, posterior cingulate gyri and middle cingulate gyri ([Figure 3A](#F3){ref-type="fig"}).
{#F3}
A sparse pattern of brain areas showed reliable effects of age on task-related activation ([Figure 3B](#F3){ref-type="fig"}). All the regions identified showed a negative correlation (decreased task-related activity with increased age) including the right calcarine sulcus, right inferior temporal lobe, left occipital lobe, right insula, right superior temporal lobe, right supramarginal gyrus, right precentral gyrus, left superior parietal lobe and right supplementary motor area.
A similarly, sparse set of brain regions showed effects of total CDT score on task-related activation ([Figure 3C](#F3){ref-type="fig"}). The association was positive (increased task-related activity with increasing total score) in the right caudate nucleus, whereas negative association (decreased task-related activity with increasing total score) was observed in the left cerebellum, right hippocampus, bilateral temporal lobes, bilateral thalamus, right insula, left putamen, right supramarginal gyrus, bilateral middle cingulate gyri, right supplementary motor area and left paracentral lobe. Clusters of activation for [Figure 3](#F3){ref-type="fig"} are listed in [Table 3](#T3){ref-type="table"}.
######
Clusters of activation during completion of the clock-drawing test.
Cluster number Cluster size (voxels) Coordinates of center (x,y,z) Peak value Anatomical region
--------------------------------------------------------------------- ----------------------- ------------------------------- ------------ ------------------- ------- ---------------------------------
**CDT Performance vs. Fixation ([Figure 3A](#F3){ref-type="fig"})**
1 22,727 12, -39, 9 -0.97 Right posterior cingulate gyrus
2 263 -51, -63, 3 -5.11 Left middle temporal gyrus
3 196 0, 39, -15 -4.51 Left gyrus rectus
4 189 51, -57, 27 -4.79 Right angular gyrus
**Covariance with age ([Figure 3B](#F3){ref-type="fig"})**
1 136 27, -18, 57 -4.91 Right precentral gyrus
2 84 54, -30, 18 -5.19 Right superior temporal gyrus
3 72 12, 0, 60 -4.65 Right supplementary motor area
4 51 42, -3, 9 -5.17 Right insula
5 50 15, -102, 0 -4.59 Right calcarine sulcus
6 38 42, -66, 0 -4.11 Right middle temporal gyrus
7 38 18, -48, 66 -4.14 Right superior parietal lobe
8 37 -33, -93, 12 -4.05 Left middle occipital gyrus
9 24 30, -66, -60 -4.16 Right lobe VIII of cerebellum
10 24 -27, -78, 45 -4.05 Left superior parietal lobe
**Covariance with performance ([Figure 3C](#F3){ref-type="fig"})**
1 838 42, -21, 6 -8.15 Right transverse temporal gyrus
2 219 0, -33, 48 -4.62 Left middle cingulate gyrus
3 93 -57, -36, 0 -4.76 Left middle temporal gyrus
4 86 -33, -18, 6 -4.52 Left insula
5 47 9, 0, 63 -4.76 Right supplementary motor area
6 41 -15, -27, -12 -4.40 Left parahippocampal gyrus
7 39 12, -87, -27 -4.57 Right crus II of cerebellum
8 35 24, -30, 63 -3.73 Right post-central gyrus
9 30 18, -3, 24 4.97 Right caudate nucleus
10 23 -9, -54, -33 -3.54 Left lobe IX of cerebellum
Active clusters of brain areas identified for the clock--drawing test vs. fixation contrast, covariance with age and covariance with performance. Spatial locations of the center of the cluster reported in Montreal Neurological Institute (MNI) coordinates.
Discussion
==========
This is the first fMRI study to characterize brain activity during CDT performance for healthy elderly individuals. The study was made possible by the use of novel tablet technology that permitted naturalistic CDT performance during imaging. In contrast with visual fixation, extensive patterns of positive CDT-related activation were observed in the bilateral occipital, parietal, frontal and inferior temporal lobes as well as the bilateral cerebellum, supplementary motor area, precentral gyri and left post-central gyrus. Healthy aging in an older adult population had a significant effect on CDT performance with older adults exhibiting both reduced task-related brain activity and lower behavioral scores.
The positive CDT-related activation results are consistent with our current understanding of the neural correlates of the test ([@B33]; [@B78]; [@B79]; [@B41]), supporting the importance of these brain regions in successful completion of the task. Regarding the visual processing aspects of the CDT, a recent SPECT study reported an association between the hand drawing score (R3) and activation levels in the occipital lobe ([@B41]). In addition, parietal regions involved in visual and spatial perception, such as the supramarginal gyrus, have been linked to CDT performance in patients with brain lesions ([@B79]). The executive function requirements of the test ([@B66]), critical for controlling and coordinating all elements of the task through to completion, are known to localize in the frontal lobe and more specifically the prefrontal cortex ([@B63]; [@B1]). The prefrontal cortex was implicated in a NIRS study of the CDT, which reported a significant negative association between task completion time and hemoglobin concentration changes in the prefrontal cortex ([@B70]). The scaffolding theory put forward by [@B54] suggests that with age, the brain develops alternative neural pathways to preserve cognitive functions in older adults despite age-related changes in brain structure ([@B54]). This effect has been localized to the prefrontal cortex, which has shown consistent over-activation in older adults, suggesting that increased activity of this brain area compensates for the decline in structure and function in other brain regions ([@B3]; [@B54]). The extensive frontal activation during CDT seen in this study is consistent with this theory and implies that recruitment of the frontal lobe allows older adults to complete the task despite changes in neural activity in posterior brain areas. The cerebellum has been associated with higher-level cognitive functions including working memory tasks ([@B38]; [@B14]), such as the CDT, and was activated in a previous fMRI study that used a less naturalistic implementation of the test ([@B33]). Finally, the supplementary motor area, precentral gyri and left post-central gyrus were all activated as expected, given their established role in motor performance ([@B58]; [@B88]; [@B56]). Interestingly, the former two areas were activated bilaterally, as often observed for motor tasks with high cognitive demands ([@B59]; [@B69]; [@B12]). The left lateralization of the post-central gyrus is consistent with the contralateral somatosensory processing component of tablet and stylus interactions made by the test participants, all of whom were right-handed.
In addition to the aforementioned areas, CDT-related activation was observed in the bilateral middle cingulate gyri and insula. The anterior portion of middle cingulate has been implicated in connections with the dorsal prefrontal cortex that are involved in cognition ([@B75]; [@B89]), suggesting that this region may play a role in the executive functioning pathway used during the CDT. The insula and the anterior cingulate cortex are both primary components of the salience network, which functions to recruit and coordinate various brain regions and their behavioral responses to salient stimuli ([@B45]; [@B86]).
This study has provided new information revealing brain areas with reduced activation during the CDT. Negative CDT-related activation was observed in the bilateral insula, hippocampus, parahippocampus, cerebellum, angular gyri, posterior and middle cingulate cortex as well as areas in the temporal and occipital lobes. Many of these regions are involved in the default mode network ([@B28], [@B29]; [@B22]), which is commonly active during wakeful rest or stimulus-independent thought ([@B40]) and therefore would be suppressed during a completion of a complex task, such as the CDT. Sub-regions of the insula, middle cingulate gyrus and cerebellum showed contrasting patterns of activation during completion of the CDT. A given brain structure may be responsible for multiple cognitive functions that are localized to distinct sub-regions leading to different levels of activity. For example, the anterior part of the insula is a component of the salience network and was positively activated during task completion ([@B45]; [@B81]).
Activity in the bilateral occipital and parietal lobes was observed to decrease as a function of participant age. Furthermore, a significant negative correlation was found between test performance and age, such that younger adults had better CDT scores (R2, R3, total score) than the older adults. Taken together, these two findings suggest that the reductions in brain activity in the regions identified may be primarily responsible for the CDT performance decrements that occur in old age. Studies investigating changes in cognition due to healthy aging have shown impaired attention, visual scanning and processing, executive function and visuospatial perception in older groups ([@B27]; [@B19]; [@B30]; [@B46]). All of these elements are required for successful CDT performance. Furthermore, numerous imaging studies have identified age-related changes in the structure and function of the occipital and parietal lobes ([@B27]; [@B61]; [@B60]; [@B13]; [@B21]).
Increased activation was observed in the right caudate nucleus as a function of participant total CDT score. The caudate nucleus has been implicated in the frontal subcortical circuit for mediating executive function ([@B44]; [@B20]; [@B24]), and previous anatomical imaging studies have reported correlations between caudate atrophy and impaired CDT performance ([@B31]; [@B68]). Collectively, the present work and prior literature suggest that the caudate nucleus plays an important role in successful test completion. Increased CDT score was also correlated with decreased CDT-related activation in various areas. Previous imaging studies have shown that increased cognitive performance can lead to more efficient brain functioning ([@B7]; [@B67]; [@B26]), suggesting that the negatively correlated areas are less active in more skilled participants due to neural efficiency.
The behavioral performance on the tablet-based CDT showed reasonable convergent validity with the standard version of the test as scored by the Rouleau method ([@B64]). Multiple scoring systems have been devised for the CDT, but the Rouleau method was used here because of its popularity in research studies, especially those involving elderly populations ([@B87]; [@B8]; [@B18]; [@B72]; [@B74]). Our results agree with normative Rouleau scores for an elderly aging group ([@B4]; [@B80]). Future studies could use a more detailed scoring system, but there is currently no strong consensus regarding an optimal scoring system for this task ([@B62]; [@B57]; [@B16]; [@B39]).
Although this study used novel technology to provide important insight into brain activation patterns of older adults during the CDT, there are a few methodological limitations that are important to note. fMRI is a highly useful tool for studying brain activity, however, the age effect on BOLD signal and low temporal resolution can limit the neuroimaging results of the study. There are physiological effects of aging on the biophysical parameters that are responsible for the BOLD signal contrast mechanism -- irrespective of changes in neural activity and this is a limitation commonly seen in fMRI studies with older cohorts ([@B15]; [@B25]). Future studies will be required to corroborate the present initial results, with the inclusion of appropriate physiological imaging measure to provide control data. fMRI provides precise spatial localization of brain activity at the expense of reduced temporal resolution. Other imaging modalities, such as electroencephalogram (EEG), with higher temporal resolution may provide more information about dynamic changes in brain activity during CDT, at the expense of reduced spatial localization. Future studies should ideally combine EEG with fMRI to provide a more comprehensive characterization of CDT-related brain activity. These concerns notwithstanding, the agreement of the present results with the existing literature on the neural correlates of the CDT, including studies involving different imaging modalities, suggests that both the physiological confounds due to aging and the low temporal resolution of fMRI are not having a major impact on the interpretation of the research outcomes.
The five time conditions of the CDT were presented in a fixed order, which is another limitation to the current study. Future studies should randomize the order of the times to counter-balance for practice effects. The cohort of this study was an older aging population between the ages of 52 and 85. The age-related changes that occur along this range have significant importance in both healthy and pathological populations, therefore studying the effect of age on CDT-related brain activity in this group provides valuable insight for both researchers and clinicians. However, it is necessary to conduct further investigations, which explore brain activity during the CDT across a larger age span to more comprehensively characterize the effect of healthy aging.
Conclusion
==========
This study used novel tablet technology and fMRI to determine the underlying neural correlates of the CDT in a healthy older aging population, providing new insights into the neural mechanisms of the test and their relationship with age and test performance. Across the aging group, positive task-related activity was observed in the bilateral frontal, occipital, parietal and inferior temporal lobes as well as the bilateral cerebellum and key motor areas. There was a significant negative correlation between both performance and task-related activity with age. Decreased activity with older age was seen in the bilateral occipital and parietal lobes, suggesting that function of these areas is affected by normal aging, potentially leading to poorer CDT performance. The CDT is sensitive to cognitive changes due to healthy aging in an older population, which raises questions on its validity as a screening tool for pathological impairment in elderly populations. Further research on this topic is critical because of the widespread use of the CDT as a clinical assessment in older populations. It is necessary to conduct future studies, which compare neural activity during the CDT in a healthy aging and cognitively impaired population to help inform the use of the CDT as a clinical screening tool.
Ethics Statement
================
This study was carried out in accordance with the recommendations of the Tri-Council Policy Statement: Ethical Conduct for Research Involving Humans, Canadian Institutes of Health Research, Natural Sciences and Engineering Council of Canada, and Social Sciences and Humanities Research Council of Canada with written informed consent from all subjects. All subjects gave written informed consent in accordance with the Declaration of Helsinki. The protocol was approved by the Research Ethics Board at St. Michael's Hospital, Toronto, Canada.
Author Contributions
====================
NT, MH, and IP performed the experiments. NT, MH, IP, CF, and TS were involved in participant recruitment. MH, NC, FT, SG, and TS conceived and designed the experiments. SG, FT, NC, and TS designed the tablet technology. NT, NC, TS, and SG analyzed the data. NT, NC, MH, IP, FT, CF, SG, and TS wrote the manuscript. The authors have not published or submitted any previous papers based on this study and declare no conflicts of interest.
Conflict of Interest Statement
==============================
The authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.
**Funding.** This work was supported by funding from the Ministry of Transportation Ontario through the Road Safety Community Partnership Program and an Alzheimer's Association Research Grant (AARG-16-442685). The sponsors of this study had no involvement in the research or preparation of this paper.
<https://afni.nimh.nih.gov>
<https://www.fmrib.ox.ac.uk/fsl>
CDT
: clock-drawing test
MoCA
: Montreal Cognitive Assessment
R1
: clock face drawing component
R2
: clock number drawing component
R3
: clock hand drawing component
[^1]: Edited by: Arun Bokde, Trinity College Dublin, Ireland
[^2]: Reviewed by: Federica Piras, Fondazione Santa Lucia (IRCCS), Italy; Derya Durusu Emek-Savaş, Dokuz Eylül University, Turkey; Görsev Yener, Dokuz Eylül University, Turkey
| |
When Heath Evans was growing up, his ex-Marine father was open and honest with his son about choices in life he regretted, hoping to pass on the lessons he had learned. Heath took his father’s advice to heart.
He faced his own struggles as well. School was challenging because he suffered from ADHD and dyslexia. His parents did everything they could to help him, hiring tutors and encouraging his progress even when he struggled to get a passing grade.
By the time he got to college, Heath had developed strong study skills and did well. However, it was difficult to be away from home. With his father’s warnings embedded in his head, he resisted many of the usual temptations, such as drugs and alcohol. But he had a harder time when it came to women.
He met a pretty girl on the first day of college. He tried to meet his own high moral standards, but soon went further with her sexually than he wanted. Feeling guilty, he turned to God and asked for forgiveness. He found tremendous comfort in his faith.
Heath was determined to do better next time. But he couldn’t imagine that the next woman he fell in love with would change his life forever, opening his heart and mind to a mission of helping suffering children.
When Heath met Beth Ann, he knew she was special. On their first date, he told her “I’m going to marry you.” They quickly grew close. But sometimes Beth Ann seemed sad and withdrawn. One day she finally opened up and shared some painful memories. When she was in third grade, she had been repeatedly sexually abused by an older classmate. When Heath heard her story, he was filled with compassion.
Soon, Heath and Beth Ann married, and together they started The Heath Evans Foundation, which is dedicated to fostering hope and healing in the lives of children and families affected by sexual abuse. Every time Heath hears the stories of the children who are helped by this foundation, he is motivated even more to publicize this difficult issue.
Heath is determined to raise the awareness of sexual abuse even though he knows some people prefer not to talk about it. He wants parents to prepare their kids by teaching them values, and by saying “no,” on a regular basis.
Heath believes there are elements in American culture, including the pornography industry, which contributes to the problem. He encourages people to turn away from such vices, because they are more dangerous than they may seem.
Heath knows that he is not perfect – that he struggles with weakness and temptation as much as the next person. He finds that it helps to have a trusted friend with whom he can share honestly.
“When we keep these little secrets in our life, we want to bury the stuff… [but] it’s going to affect your marriage. It’s going to affect your parenthood. It’s going to affect everything about you.”
Heath has fears and insecurities just like everybody else. Sometimes he fears being inadequate for his family. Sometimes he fears the linebackers he goes up against. But Heath knows that he has been able to overcome fears and insecurities in the past, and that with support from those close to him he can overcome almost anything.
New Orleans Saints coach Sean Payton recognizes Heath’s leadership skills. Even after Heath suffered a season-ending injury, Coach Payton asked him to stay involved to support his teammates.
Sometimes Heath worries about how his injury might affect his long-term career. But he turns to his Christian faith for guidance, and it helps him keep everything in perspective.
“You know, God’s got a plan and I trust that plan… I believe that he uses things to strengthen us… so that we can comfort others.
Every morning when Heath gets up he tells himself that this day is not about him. He’ll ask himself if there is someone he can encourage, or if he can help Beth Ann around the house. He aims to be a good Christian person not only when circumstances are blessed and prosperous, but also when things are tough and hard.
Instant replay of Heath’s guiding principles
Listen to the lessons that others have to teach.
Don’t be afraid to speak out.
Don’t keep secrets.
Trust that God has a plan for you.
Live your values even when times are tough.
Love your family through tough times.
Create and follow through on a plan to reach your goals.
Surround yourself with people that will help you reach your goals.
Find a confidant to share it all.
Ask yourself every day if you are honoring your priorities.
The Insightful Player® series is brought to you by Coach Chrissy Carew, Hall of Fame Master Certified Personal and Business Coach and Author of her newly released book, INSIGHTFUL PLAYER: Football Pros Lead A Bold Movement of Hope. Chrissy has been deeply inspired by her father, the late Coach Walter Carew, Sr. Her father is in several Halls of Fame as a high school football coach and baseball coach (as well as high school and college athlete). He used sports to help kids build strong character and teach them valuable life skills. The Insightful Player® initiative was created to help make our world a much better place by inspiring youth. To contact Chrissy Carew visit http://www.insightfulplayer.com or call 603-897-0610.
©2010 Insightful Player, LLC
Heath Evans is a valued member of the Insightful Player® team. To be named to this team, one must be a person of integrity, such as a current or former NFL player, who shares their personal message of hope for the sole purpose of lifting the spirits of all, especially children. | https://www.theinsightfulplayer.com/post/heath-evans |
Most people who've developed a sensible backup strategy did it the hard way, after losing precious data to a disk crash or a power surge, or losing an entire data-filled PC to a thief or in a natural disaster like a fire or flood. That sinking feeling as you realize you'll never see those files again is painful and unforgettable.
The natural response to that sort of loss is to resolve to never let it happen again. But devising an effective backup strategy, one that works without requiring a lot of extra effort, takes organization, planning, and forethought.
Where do you start? It's a four-step process.
In my experience, you have three backup strategies to choose from. Which one you choose involves equal parts personal preference and practicality. The biggest factor to consider is whether the data you need to back up is work-related or strictly personal.
This approach is for people whose PC is primarily for casual personal use. If your IT department takes care of managing your work laptop and backing up work-related files to your company's network, you only need to worry about personal files: photos, home movies, and important documents. Backing up those crucial files to your preferred cloud service is the most logical solution.
If your system drive has a catastrophic failure, you'll have to reinstall your operating system and apps, but you don't have to worry about losing those important files, which are safely tucked away in the cloud.
On a PC that you (and possibly other family members) use for work, school, and personal tasks, you might want to ensure that every data file for every user account is backed up for quick recovery in the event of a problem. You can back up everything (except the operating system, apps, and saved settings) to the cloud, a local drive, or both.
This option lets you recover older versions of a file or folder after accidentally deleting it. It also allows you to retrieve an older version of a document that's been overwritten by more recent work. And it gives you the option to recover all data for all users if you migrate to a new PC, replace your primary storage, or reinstall your operating system from scratch.
This option is the one to choose if business continuity matters more than anything else. It's labor-intensive initially, and it can require intermediate-to-advanced technical skills, but it will save you a tremendous amount of time if you need to recover quickly from a crash or upgrade to a new PC or Mac with the absolute minimum of downtime.
A system image includes everything on the target drive: Hidden configuration files, installed programs, settings, and data files. Typically, the image file is saved on an external drive, connected via USB; with the right software, you can save an image file to another PC or server on a local network or in the cloud.
Done right, a backup image is a perfect clone of the system configuration at the time it was taken. That means, of course, that you have to find a way to back up data files and other system changes you make after that image is created.
Both Macs and Windows 10 PCs include built-in software that can help with this task. MacOS has Time Machine, which can be used to do a full system restore. Windows 10 has a pair of utilities: the legacy Windows Backup client, which does image backups, and File History, which handles backups for data files in common locations.
If you choose third-party software, you can choose fairly sophisticated routines that capture occasional full images along with differential or incremental backups to keep you covered.
What do you have to lose?
Everyone has a collection of personal files they would absolutely hate to lose. That video of your firstborn taking his first steps? The PDF copies of your tax returns for the last five years that the bank wants before they can process your mortgage application? The CV or résumé you need to send to the recruiter offering you the job of your dreams?
That's not to mention all your other personal photos and videos, plus digital music and media files that you bought or downloaded long ago that aren't available on streaming services, as well as folders full of work, school, and personal documents that aren't on anyone else's server.
Oh, and don't forget program installers, product keys, license info, and other digital details you'll need when you're restoring apps after a crash.
Many of these files can be re-created from online sources, although that can be an extremely tedious process. But some of the items on that list are absolutely irreplaceable, and keeping your only copy on a hard disk that is one cosmic ray (or spilled cup of coffee) away from an unrecoverable crash is foolhardy, to say the least.
So, what do you have to lose? Answering this question means identifying the files and folders that mean the most to you and then organizing them into a handful of known locations that you can target for backup. That last step is key: The more your important files are scattered across multiple locations, the more likely you are to end up with an incomplete backup.
And even though you might prefer an idiosyncratic organizational structure, I recommend that you keep everything in well-known folders managed by the operating system: Documents, Downloads, Photos, Videos, and so on. For Windows 10 PCs, that's your user profile folder. On a Mac, it's the Home folder for your user account.
Which backup destination is right for you? This one's a multiple-choice question, with the available answers being:
As far as I'm concerned, copying your most important files to the cloud and then syncing them to multiple local devices is the core of an effective backup strategy.
Putting those files in the cloud means you're not at the mercy of hardware failures. And a catastrophic failure of the cloud provider is a low risk, especially if you store with a provider that has engineered redundancy and fault tolerance into its system and has the financial wherewithal to survive an economic downturn. Microsoft, Google, Amazon, and Dropbox are unlikely to go out of business anytime soon, so having a Plan B is prudent but not quite as urgent as preparing for a local disk crash.
Privacy and security are not trivial concerns here, but depending on your preferences (and your budget) those concerns can be dealt with by choosing your cloud provider wisely.
The bigger problems with the cloud are, of course, the cost of storage and the limitations of bandwidth. Those problems intensify as your cache of data grows larger. Consumer plans like Microsoft 365 give you access to as much as a terabyte of storage for a few dollars per month. But your Internet service provider might have a thing or two to say about that, as upload/download caps can turn the process of backing up and restoring from the cloud into a multi-day activity. And you can be hit with unexpected charges or slowdowns if the total goes over your data cap.
So, a local drive is better than the cloud? Well, yes, at least sometimes, for some tasks.
Storing your backups on a local drive means you have ready access to them and can restore your files as fast as your external hard drive and your storage bus can deliver them, unencumbered by any limitations of your cloud provider or your broadband connection. But those local copies are vulnerable to some of the same risks as the PC containing the original data. If your home or office is destroyed by fire or flood, your local backups are likely to disappear along with the PC they're backing up.
Clearly, the most complete strategy involves a hybrid approach, with important files safely stored in the cloud and copies of that big cloud store synced locally. And maybe another copy in a safe deposit box or other offsite location. Just in case.
A backup you can't restore is worse than no backup at all.
Checking the status of synced cloud data files is fairly simple: Just compare the contents of the remote folder with your synced local copy. Local backup images need more attention.
Good backup software allows you to schedule regular backups and notifies you after each operation runs, giving you a heads-up if it encounters any errors. But that's only half the job. If business continuity is the goal, you need to test your backup image to confirm that it can easily and quickly be restored. You definitely don't want to discover that your image file is damaged or corrupted when you're under the gun to restore it right away.
If you have a spare PC or Mac handy, you can use it as a testbed. Some third-party software allows you to mount a backup image as a virtual drive or restore it to a virtual machine, which greatly simplifies the burden of testing. But whatever you do, don't skip that step.
So, what's in your backup plan? Share your experience and advice with other readers in the comments below. | https://www.zdnet.com/article/pc-and-mac-backup-how-to-protect-your-data-from-disaster/ |
Viktor Frankl and the Sense of Responsibility
A sense of responsibility is the essence of civility and respect for oneself and others. Viktor Frankl, the well-known Austrian psychiatrist and philosopher, warned the world about it in the 1980s. He said we’re failing in this important social competence. Thus, forgetting that being responsible means understanding and applying the basic rules of engagement in daily life.
Winston Churchill said that responsibility is the price of greatness. It’s true that every position, especially a prominent one, requires wisdom and a fine-tuned moral personal responsibility. However, this dimension goes much further and is, in turn, related to the concept of freedom.
Viktor Frankl had the opportunity to reflect during his time in the United States. There, he worked as a lecturer, writer, and teacher at Harvard and Stanford University. Furthermore, he was critical of the values of American society, as well as others in the world.
In particular, he noticed that many believe that being free is having a license to do whatever one pleases. Thus, Frankl understood that we don’t really understand the concept of freedom. We’re overlooking the fact that it always comes along with a sense of responsibility. Thus, one can’t exist without the other.
“Fundamentally, therefore, any man can, even under such circumstances, decide what shall become of him-mentally and spiritually. He may retain his human dignity even in a concentration camp.”
-Viktor Frankl-
The sense of responsibility in modern society
Not understanding that freedom comes with limits, principles, and responsibilities is basically an infringement upon the rights of others. Although most people understand this, individually or collectively, society continues to circumvent this boundary. Even to the point of harming others in unsuspected ways.
For example, although freedom of speech is a basic human right, you shouldn’t use your words to harm others. Everyone is free to choose their destiny and create the reality they want with their effort, creativity, and energy. However, that doesn’t mean it’s okay to sabotage others to achieve a goal. Similarly, a country or a nation doesn’t have the right to subjugate others in order to obtain benefits, regardless of how powerful it may be.
The statute of responsibility
The issue of the misunderstanding of freedom has long preoccupied Viktor Frankl, which is quite evident in works such as Prisoners of Our Thoughts: Viktor Frankl’s Principles for Discovering Meaning in Life and Work by psychologist Elaine Dundon. Such was his concern while seeing where American society was heading in the 1980s and 1990s that he proposed something as striking as it was evocative.
He suggested that, given there’s the Statue of Liberty on the East Coast of New York, then the West Coast needed its own. The twist is this one would represent a sense of responsibility. The project has been in progress ever since and the expected year of completion is 2023.
Learning to be responsible requires awareness
A sense of responsibility implies, above all, common sense, honesty, and social commitment. However, on average, it’s common to instill an excess of individualism and even narcissism when it comes to educating in this value.
Most have learned, for example, to be responsible for their own things, avoid harmful and self-destructive behaviors, and the importance of respecting others.
However, none of these ideas is really in tune with the true sense of responsibility. This is because being responsible is more than just respecting others. It also implies promoting their welfare and having clear principles.
What does a sense of responsibility really mean?
- A sense of responsibility isn’t about acting rightfully at all times. It’s about having an internal need to always do the right thing without expecting a reward or a pat on the back.
- It’s also having a clear and firm position towards the things that happen in your environment and the world itself.
- Also, it means being concerned about how your actions affect others.
- It implies generating changes (however small) that improve the reality in which you live in.
- It’s to be willing to take risks for certain goals and to assume any mistakes you make.
- In turn, it’s about not blaming others for the negative things that may happen to you. You’re responsible for yourself so don’t load your frustration on other people’s shoulders.
- It means being honest, humble, compassionate, and grateful and believing there’s justice.
In conclusion, keep these dimensions in mind. No value is as cherished in modern society as being free and being the master of your destiny, voice, and ability to choose.
Apply a proper sense of responsibility to every step you take. The whole world will benefit from it.It might interest you... | https://exploringyourmind.com/viktor-frankl-and-the-sense-of-responsibility/ |
It is a well-known axiom that for free markets to exist, access must be unencumbered. The more players there are, the more efficient a market will be.
Executive SummaryCommenting on the state of the reinsurance brokerage industry, TigerRisk's Mike Schnur explains why he believes a lack of competition is hurting the industry and advocates that primary carriers demand innovative reinsurance solutions from intermediaries, which recognize each carrier's uniqueness and individual needs.
Unfortunately for those of us in the reinsurance space, we have entered into a period of reduced competition. In fact, many would argue that reinsurance distribution is significantly less efficient than it was only a few years ago.
Why?
There are many reasons, but one reason eclipses all others. Today, 80 percent of reinsurance premium goes through just three big brokers. Economists call this unnatural state of affairs an oligopoly. Oligopolies disrupt the marketplace by limiting competition. When choices are limited, prices go up—and service goes down.
Member Only Content
To continue reading, purchase this article or become a member. | https://www.carriermanagement.com/features/2013/08/14/110572.htm |
The Library of Congress has fashioned an exhibit that will surely be of interest to intellectual historians. The exhibit, “Books That Shaped America,” lists 88 works that the LOC calls “a starting point—a way to spark a national conversation on books and their importance in Americans’ lives, and, indeed, in shaping our nation.” They add (bolds mine):
The titles featured here (by American authors) have had a profound effect on American life, but they are by no means the only influential ones. And they are certainly not a list of the “best” American books, because that, again, is a matter of strong and diverse opinion. Curators and experts from throughout the Library of Congress contributed their choices, but there was much debate—even agony—in having to remove worthy titles from a much larger list in order to accommodate the physical constraints of this exhibition space.
Some of the titles on display have been the source of great controversy, even derision, yet they nevertheless shaped Americans’ views of their world and often the world’s view of the United States. As you go through this exhibition, we hope the books you see will inspire you to think of other “books that shaped America” and that you will share your choices for future lists at www.loc.gov/bookfest. Please tell us how you think your book shaped America.
This online survey adds to the exhibit by asking viewers a few questions, the first of which is as follows: “Which THREE of these books do you think shaped America the most profoundly?”
According to the Chicago Tribune article wherein I learned of the exhibit, it appears most of the press release above was authored by James H. Billington, the thirteenth Librarian of the United States Congress (sworn in September 1987). Billington was trained as a historian (PhD, Oxford Balliol) and taught at both Harvard and Princeton from 1957-1973.
With only a little reflection, the most surprising thing about the list is that it is ahistorical. The list does not specify whether we are to judge these “books that shaped America” based on America today or on the America affected by the book shortly after the publication of each. I assume they mean today—which makes the exercise exceedingly difficult for both the professional historian and the lay person. What intelligent thing(s) are we supposed to say about Uncle Tom’s Cabin, written by Harriet Beecher Stowe and published in 1852, in relation to 2012?
All lists are controlled by space. That is one the things that makes them controversial. That limitation exacerbates perceived poor choices. Limitations give rise to complaints. As such, I wondered why the LOC stopped at 88 books? The press release above notes that “exhibition space controlled the size of their list. Fair enough. To show actual books, one must deal with the material size of the book, exhibit cases, room for text, and room for viewers to maneuver. So those factors probably explain the number 88. But those factors do not absolve one from poor selection criteria—for poor exhibit conception.
Because of these factors I looked at the online survey and threw up my hands in confusion. The selection criteria are not outlined in the obvious parts of the exhibit through which I surfed. Even so, I went ahead gave an answer to the first question in order to see the rest of the survey. I chose The Private Life of the late Benjamin Franklin (more commonly called The Autobiography of Benjamin Franklin—I have no idea why they chose to use the more obscure title), Thoreau’s Walden, and Margaret Wise Brown’s Goodnight Moon (for whimsy’s sake).
Here is question two: “Which ONE of these books had the most impact on YOU, personally, rather than America as a whole.” Here I chose Melville’s Moby Dick. Question three, on this same page, asks “Please describe how this book changed you.” I answered in a brief fashion to move the survey along: “I first read this in high school and it opened my mind to the complexities possible in a novel, in one’s private life, and in the process of chasing our goals.”
Question four asks: “What book that is NOT on our list should be? (Title and author, please.)”
Can anyone predict my answer? … … Again, I chose to have a little fun here:
Mortimer J. Adler’s *How to Read a Book* (1940).
Question five asks: ” Tell us why your nominee should be added to the list.” Here was my off-the-cuff, lightly edited answer (edited more here than there):
—————————————————————————
After its publication in 1940, Adler’s *How to Read a Book* set in motion a chain of events with no conclusion in sight. Indeed, this survey and the
and the “Books That Shaped America” exhibit is a part of that historical chain. How? What are the events to which you are [I am] referring? Here’s how—as briefly as possible:
Adler’s book laid out a plan to improve upon the population’s basic literacy skills. He linked the need for improvement with an imperative for thoughtful citizenship. At the end of the book he provided a list of books (Western in nature) on which one should practice the skills he laid out in *How to Read a Book*. That list, known now as “The Great Books,” inspired thousands of people in the 1940s—diverse in terms of wealth, gender, religion, and race—to set up Great Books reading groups. One of those readers was William Benton, who used his position (i.e. CEO) at Encyclopaedia Britannica to hire Adler (among others) to publish the *The Great Books of the Western World*. That set sold thousands of copies, but Great Books reading groups also proliferated due to the work of the Great Books Foundation (which also lists Adler as a founder). The great books idea has since inspired regular readers (young and old), as well as college students via their professors, to challenge themselves to read the very best books ever published. The great books idea has also undergone renovation. In the wake of a heightened awareness of American diversity that has occurred since the 1950s and 1960s, today the great books idea exists in the form of a plurality of lists about the best books. Even so, readers are still living with the challenge to read the very best books—to obtain the highest form of literacy possible in relation to being both the best thinker and citizen. And the great books idea lives on in college curricula and in library-sponsored reading groups for general citizens outside of education institutions.
I would argue that Adler’s book inspired the creators of this very exhibit. We have been asking ourselves all through the twentieth century how we can navigate, in time with our limited energies and life span, the plethora of books in print. This exhibit and Adler’s list(s) provide starting points for endless revision in relation to our changed historical circumstances.
This is why Adler’s *How to Read a Book* should be on your list. It is “the book” which has challenged [people] since publication to choose the best books for close reading (and rereading). It is the book which linked excellence in reading with excellence in citizenship.
—————————————————————————
So my answer was not that brief. And with it I ended up taking the survey more seriously than I intended. As for the rest of the survey, questions six through eight asked demographic questions: What is your state and/or country? What is your age? What is your gender? | https://www.s-usih.org/2012/07/reflections-on-books-that-shaped/ |
Ph.D. student profile: Solyee Kim
Solyee Kim (MA ’16) is a Ph.D. student interested in diversity, equity and inclusion in public relations and media practices. Her research focuses on the experiences of marginalized communities including immigrants and racial and ethnic minorities in the practices and industries of public relations and media practices.
“Immigrants are some of the marginalized groups in the practices and research of journalism and mass communication,” Kim, a native of South Korea, said of her area of study. “By highlighting these experiences in my research, I would like to share some of the vibrancy and dynamics of those communities that are far from monolithic.”
Last Fall, Kim’s research about how South Korean restaurants promote their restaurants in the U.S. was recognized by the Association for Education in Journalism and Mass Communication. The paper, “Communicating the Culture Through Korean Food Between Authenticity and Adaptation,” won third place in the student paper competition in the Minorities and Communications Division.
“This was my first time attending an academic conference and having my work presented as the first author. The award was a great reminder and encouragement to continue on this path.”
Her research used the Circuit of Culture framework that she learned about in Dr. Acosta-Alzuru’s qualitative research course to examine representation, production, consumption, identity, and regulation of the restaurants. Kim explained that she has always enjoyed exploring food culture.
“Since I first came to the U.S., this became more significant to me because food plays a critical role in understanding the different cultures that make up this country and my identity here. I spend a lot of time on the weekend in areas known for vibrant immigrant communities such as Buford Highway and Duluth to shop for groceries or to eat (although I have not been able to do that as much as I would like to due to COVID-19). In a highly multicultural country such as the United States, those immigrant communities play vital roles by providing economic, political, and cultural structures to many lives. I believe that food is imperative to understand those communities and their relationships with other communities.”
Kim said that it is a team effort to conduct research like this.
“I have so many staff, faculty, colleagues, and students to thank at the College and beyond,” Kim concluded. “It takes a whole village to get a Ph.D. In my case, the village might be a global one. I would also like to share my special thanks to my advisor, Dr. María Len-Ríos, and the advising committee members—Dr. Karen Russell, Dr. Bart Wojdynski, and Dr. Glenna Read—for always encouraging me and providing creative and invaluable insights.”
Before returning to Grady College to pursue her doctorate degree, Kim worked at a public relations firm in Atlanta and interned with a wide range of non-profit organizations including the United Nations Non-Government Liaison Service in New York, the International Rescue Committee in Atlanta, the Korean Federation of UNESCO and the Special Olympics. Prior to working in public relations, she worked as a freelance translator and interpreter traveling to the United States and the Middle East for various companies. | https://grady.uga.edu/ph-d-student-profile-solyee-kim/ |
Pulpit Rock is one of the region’s most visited attractions and one of the most spectacular photo opportunities in Norway. In 2011 Pulpit Rock was voted one of the world’s most spectacular viewpoints by both CNN Go and Lonely Planet.
Pulpit Rock is 604 meters high and juts out like a church pulpit above the fjord. It was formed by glacial movement during the ice ages when the glacier was roughly the same height as the viewing ledge is today. As water froze in the crevices alongside the glacier huge sections of rock were sheared off to create the distinctive shape and towering cliff. It is located in the Stavanger region of Norway
It was identified as a tourist attraction around 1900 when Turneren Thomas Peter Randulff were traveling Lysefjord in the steamship Oscar II. The captain of the ship pointed at the formation and mentioned that it looked like a pulpit or ‘Preikestolen’ in Norwegian. As an athlete and gymnast, Randulf was enthralled and became determined to climb to the spectacular ledge far above the waters of the fjord. His trip was the start of many tourist visits to this geological wonder. Today many thousands of people make the trek to the top of pulpit rock.
The hike up to Pulpit Rock is a round trip of about 8 kilometres. The route is considered relatively simple and it will take between an hour-and-a-half to two hours to reach the lookout ledge. The toughest part of the climb is about 1,9 km from the Pulpit Rock where the trail becomes extremely steep. Once you reach the top of this ridge you will be able to see the views of Lysefjorden.
In 2013 and 2014 Sherpas from Nepal made extensive improvements to the trail with stairs and stone trails. It is recommended to use good footwear although in dry weather good trainers (plimsolls) are generally sufficient. It is not recommended to make the trek in winter as there can be extensive snow and ice causing the trail to become slippery and difficult. The best time to make the trek is from April to October. | https://www.aquiziam.com/pulpit-rock/ |
Anxiety Medication Overview of Elavil
Elavil (known generically as amitriptyline) is a tricyclic antidepressant that was approved by the FDA back in 1961 for treatment of major depression. Tricyclics were some of the first antidepressants available and are still in use today, although the newer SSRIs are now more frequently prescribed for the treatment of depression and anxiety. Amitriptyline is prescribed for a variety of conditions, including depressive and anxiety disorders, ADHD, migraines, eating disorders, nerve pain, and insomnia.
Dosages and Instructions
Comes in a tablet form and is usually taken 1 to 3 times per day, depending on your doctor's instructions. The dosage will also vary depending on the condition being treated and your reaction to the medication but will start low and gradually increase. The drug should be taken at the same time each day and it will take several weeks to reach full effectiveness.
Side Effects and Withdrawal
The most common side effects of Elavil are drowsiness and dry mouth. Other relatively common side effects include weight gain, appetite changes, trouble concentrating, nightmares, nausea, blurred vision, difficulty urinating, changes in sexual function, and headaches. Just as it takes several weeks before Elavil reaches its full effectiveness, it takes time to taper off the drug once you have finished your course of treatment. It is not recommended to stop taking Elavil all at once, as this can cause troublesome withdrawal symptoms. Photo: Pixabay
More Articles
More Articles
Social anxiety disorder, sometimes also called social phobia, is characterized by overwhelming anxiety and self-consciousness in normal social...
No one is immune to anxiety and panic attacks, including celebrities. Actress Amanda Seyfried recently told British Glamour magazine that she is...
The difference between anxiety and depression isn't as clear as one might initially assume. While they are different disorders with different...
Who we spend our time with is just as important as what we spend our time doing; maintaining close relationships is a necessary and wonderful part...
An individual who avoids situations that could cause him or her to experience intense fear may fit the diagnostic criteria for agoraphobia. This... | https://www.livingwithanxiety.com/articles/drugs-and-medication/elavil-for-anxiety |
NEW YORK (January 15, 2009)—On March 11, 2010, Neue Galerie New York will open "Otto Dix," the first one-man museum exhibition of works by German artist Otto Dix ever held in North America. The show will contain over 100 masterpieces from the United States, Canada, and Europe, and will fill all the exhibition spaces in the museum. It will run through August 30 at the Neue Galerie before travelling to the Montreal Museum of Fine Arts, where it will be on view from September 20, 2010, to January 2, 2011.
More than almost any other German painter, Otto Dix and his works have profoundly influenced the popular notion of the Weimar Republic. His paintings were among the most graphic visual representatives of that period, exposing with unsparing and wicked wit the instability and contradictions of the time. This exhibition will include the paintings that Dix is best know for—paintings from the so-called "golden Weimar years"—but to contextualize them, it will also include Dix’s work from the early 1920s, as well as his later more allegorical work, produced as veiled protest against the Third Reich.
The exhibition is organized by Dr. Olaf Peters, Professor of Modern Art History and Art Theory at the Martin-Luther-University Halle-Wittenberg in Germany. Dr. Peters is a distinguished scholar in the field of 20th-century German art, and the author of many books on that subject.
CATALOGUE
A fully illustrated catalogue, published by Prestel, will accompany the exhibition. With new research and fresh interpretations from leading scholars on Dix and the art of the Weimar Republic, the publication will be an indispensable contribution to the study of the Weimar era.
LECTURES
Concurrent with the exhibition, the museum will present a lecture series led by a distinguished group of scholars. Lectures are presented at 6:30 p.m. and are free for Members. $8, regular admission; $5, students and seniors. Tickets are available at the main admissions desk on day of lecture.
Thursday, March 11
Olaf Peters
Curator, Otto Dix
"Intransigent Realism: Otto Dix between the World Wars"
Thursday, March 18
James A. Van Dyke
Visiting Assistant Professor, Modern Art History, Oberlin College
"Otto Dix’s Performance of Painting"
Thursday, March 25
Sabine Rewald
Jacques and Natasha Gelman Curator, Department of 19th-Century, Modern, and Contemporary Art, The Metropolitan Museum of Art
"The Fearless Sitters of Otto Dix"
FILM
Otto Dix was profoundly influenced by his experiences in the First World War. This series, entitled "Battlefields, " includes films that examine war both directly and obliquely, as visceral event and psychological metaphor.
Monday, March 15 and 22
All Quiet on the Western Front, 1930
Directed by Lewis Milestone, 138 minutes
Monday, March 29 and April 5
Berlin Alexanderplatz, 1931
Directed by Phil Jutzi, 90 minutes
Monday, April 12 and 19
Cabaret, 1972
Directed by Bob Fosse, 124 minutes
Monday, April 26 and May 3
The Mother and the Whore, 1973
Directed by Jean Eustache, 210 minutes
Monday, May 10 and 17
From Hell, 2001
Directed by Albert and Allen Hughes, 122 minutes
Films are presented free of charge at 4 p.m. in the Café Fledermaus.
Image: Pulse by Karin Nelson
Press Contact
(212) 628-6200, ext. 409 [email protected]
Neue Galerie New York
1048 Fifth Avenue New York, NY 10028
Hours
Thursday, Friday, Saturday, Sunday, and Monday
11 a.m. to 6 p.m. (closed Tuesday and Wednesday)
Admission
General $15
Students and seniors $10
Children under 12 not admitted; children aged 12-16
must be accompanied by an adult. | http://1995-2015.undo.net/it/mostra/100117 |
Do not miss this moving performance of Vivaldi's Four Seasons among other works in the beautiful and iconic Eglise Saint‐Germain des Prés in Paris.
Program
- Albinoni, Tomaso Giovanni – Adagio
- Vivaldi, Antonio – The Four Seasons – The Four Seasons (excerpts)
- Mozart, Wolfgang Amadeus – The Marriage of Figaro – Overture 'The Marriage of Figaro'
- Massenet, Jules – Thais – Meditation from Thais
- Brahms, Johannes – Danse Hongroise N°5
- Elgar, Edward – Salut d’Amour
- Monti, Vittorio – Czardas
- Schubert, Franz – Ave Maria
- Bach, Johann Sebastian – Ave Maria
Artists
|Conductor:||Rouxel, Glen|
|Orchestra:||Orchestre Hélios|
Customer Reviews
4.0 of 5
-
Eden C, USA
Oct 2019
It was a beautiful evening at Saint Germaine Des Pres. So fabulous! What a magnificent place to see a performance. It will be a forever memory for my mother and I on our trip to Paris celebrating her 80th Birthday. ❤️
-
Annika M, Sweden
Sep 2019
Just terrific performance. Great arrangement in a wonderful place!! I wish it would have been for 4 hours!!! | https://www.classictic.com/en/vivaldis-four-seasons-and-famous-adagios-in-saint-germain-des-pre%CC%81s/68522/?e=1150775 |
CARDIOLOGY is a branch of medicine dealing with disorders of the heart as well as parts of the circulatory system. The field includes medical diagnosis and treatment of congenital heart defects, coronary artery disease, heart failure, valvular heart disease and electrophysiology.
Read More...
ORTHOPEDIC Treatment
ORTHOPEDIC is the branch of surgery concerned with conditions involving the musculoskeletal system. Orthopedic surgeons use both surgical and nonsurgical means to treat musculoskeletal trauma, spine diseases, sports injuries, degenerative diseases, infections, tumors, and congenital disorders.
Read More...
ORGAN TRANSPLANT
ORGAN TRANSPLANT is a medical procedure in which an organ is removed from one body and placed in the body of a recipient, to replace a damaged or missing organ. The donor and recipient may be at the same location, or organs may be transported from a donor site to another location
Read More...
CANCER TREATMENT
CANCER is a group of diseases involving abnormal cell growth with the potential to invade or spread to other parts of the body. Not all tumors are cancerous; benign tumors do not spread to other parts of the body.Possible signs and symptoms include a lump, abnormal bleeding, prolonged cough, unexplained weight loss and a change in bowel movements. While these symptoms may indicate cancer, they may have other causes. Over 100 types of cancers affect humans.
Read More...
COCHLEAR IMPLANT
A COCHLEAR IMPLANT is an electronic medical device that replaces the function of the damaged inner ear. Unlike hearing aids, which make sounds louder, cochlear implants bypass the damaged hair cells of the inner ear (cochlea) to provide sound signals to the brain.
Read More...
IVF TREATMENT / SURROGACY
IVF TREATMENTS begin with a course of hormone therapy to stimulate the development of several follicles in the ovary. These are collected as eggs, which are then fertilised in a test-tube ('in vitro') to create several embryos.involves natural or artificial insemination of a surrogate. If the intended father's sperm is used in the insemination, then the resulting child is genetically related to the intended father and genetically related to the surrogate.
Read More...
GASTROENTEROLOGY
GASTROENTEROLOGY is the study of the normal function and diseases of the esophagus, stomach, small intestine, colon and rectum, pancreas, gallbladder, bile ducts and liver.
Read More...
URO SURGERY
URO SURGERY also known as genitourinary surgery, is the branch of medicine that focuses on surgical and medical diseases of the male and female urinary tract system and the male reproductive organs. The organs under the domain of urology include the kidneys, adrenal glands, ureters, urinary bladder, urethra, and the male reproductive organs (testes, epididymis, vas deferens, seminal vesicles, prostate, and penis)
Read More...
NEURO SURGERY
NEURO SURGERY is the medical specialty concerned with the prevention, diagnosis, surgical treatment, and rehabilitation of disorders which affect any portion of the nervous system including the brain, spinal cord, peripheral nerves, and extra-cranial cerebrovascular system.
Read More... | http://healapp.in/specialities.php |
Don't Wait! Make the Call.
Report Child Abuse and Neglect in Indiana.
If you suspect a child is being abused or neglected, call Indiana's Child Abuse and Neglect Hotline today. It is available 24 hours a day, 7 days a week, 365 days a year. You do not have to be afraid anyone will find out who made the report because you can report abuse and neglect anonymously.
What is the Indiana Child Abuse and Neglect Hotline?
The Indiana Department of Child Services (DCS) established the Indiana Child Abuse and Neglect Hotline (Hotline) to ensure consistent handling of calls alleging child abuse and neglect. The Hotline serves as the central reporting center for all allegations of child abuse or neglect in the State of Indiana. The Hotline is staffed with specially-trained Family Case Managers, know as Intake Specialists, who are professionally trained to take reports of abuse and neglect. These Intake Specialists gather information from callers, determine whether the information provided meets statutory criteria for DCS to conduct an assessment, and if appropriate, route reports directly to DCS local offices for response and assessment.
The centralized Hotline was developed to bring consistency to the way abuse and neglect calls were managed across the state. The Hotline streamlines the Agency’s approach to taking reports, improves the Intake Specialists’ ability to gather information from callers, and expedites the process of preparing comprehensive reports and disseminating those reports to local offices for assessment. The Hotline also allows Family Case Managers in the local offices to spend more time partnering with children and families because they are no longer responsible for handling intake functions. It also allows DCS Intake Specialists to ask more probing questions to obtain comprehensive information about factors that may impact worker safety.
The Hotline’s computerized call system provides DCS with an opportunity for quicker data entry, as well as the ability to track the number of calls received and the timeliness and quality of responses to callers. The state of the art system allows staff the opportunity to listen to individual calls. If specific concerns regarding a particular call are raised, staff can utilize these features to review the call and address any concerns.
The centralized Hotline unit began taking calls January 1, 2010 in Marion County. Throughout 2010 DCS continued a gradual, planned transition of counties to the new system. This transition was completed on August 30, 2010.
Who works at the Hotline?
The Hotline is staffed with trained Intake Specialists and at least one Supervisor every shift, twenty-four hours per day, seven days a week, 365 days per year. The Hotline is comprised of five offices in five different counties: Vanderburgh, Lawrence, Marion, Blackford, and Saint Joseph.
Who is required to report child abuse or neglect?
requires some in certain occupations to do so. These professional reporters are staff members in a medical or other public or private institution, school, facility, or agency. These reporters are legally obligated by their profession to report alleged child abuse or neglect.
Everyone has an important role and responsibility to prevent child abuse and neglect. Children need everyone to stand up for their safety when they may be in harm's way or when families in crisis or turmoil need support from those close to them. By contacting the Indiana Child Abuse and Neglect Hotline if you suspect a child is a victim of abuse or neglect, you can play your part in protecting a child and/or making it possible for a family in crisis to get the help and support they need.
Can the person making the report remain anonymous?
State law requires DCS to protect the identity of those reporting abuse or neglect allegations. DCS keeps the name and contact information of all report sources confidential. While DCS accepts child abuse and neglect allegations from persons who wish to remain anonymous, DCS encourages individuals to provide contact information to Intake Specialists. Providing your contact information is helpful because it allows the Family Case Manager who is assigned the report to follow up with you to ask additional questions or to seek clarification when more information is needed.
What will I need to provide when making a report?
If you call to make a report, an Intake Specialist will ask you for information about the circumstances creating a risk of harm to the child including who was involved, what occurred, when and where it occurred, the extent of any injuries sustained, and any other relevant information.
Even if you are unable to provide all of the information above, please contact the Hotline to make a report if you suspect a child is a victim of abuse or neglect. An Intake Specialist will review the information you are able to provide to determine whether it meets the statutory requirements for DCS to initiate an assessment. Please do not wait for someone else to make the call – your call may be the critical first step in protecting a child.
How is a recommendation on a report determined?
Intake Specialist’s input the information received from the caller into MaGIK.
The Intake Specialist makes a recommendation decision to the local office utilizing the Structured Decision Making (SDM) Tool.
All Intake Specialist’s reports are reviewed for both report quality and decision appropriateness by a Hotline Supervisor. If corrections or clarification is needed, the Hotline Supervisor sends the report back to the worker for corrections and or clarification so the Intake Specialist can make the changes themselves.
Once a report is approved by the Hotline Supervisor, the field office then reviews the report and decides whether to agree or disagree with the Hotline recommendation. The field office may change any Hotline recommendation to assess or screen out as they feel appropriate.
What if I call the Hotline and I have to wait?
There are times when all Intake Specialists are taking calls or entering reports. If you find yourself on hold please be patient and do not hang up. Your call will be answered by the next available Intake Specialist. The Intake Specialists are trained to handle each call as quickly as possible while ensuring quality reports are completed. If you are calling regarding an emergency situation and/or if you believe the victim is in imminent danger please dial 911 immediately.
What if I do not have access to a telephone?
The DCS local office will assist any individual from the community who wishes to make a report in person at the DCS local office. The DCS local office will ensure that the individual has access to a telephone to make their report to the Hotline. For a list of DCS local offices, please click here.
How do Law Enforcement Agents report child abuse or neglect?
Law Enforcement Agents (LEA) should call the Child Abuse and Neglect Hotline especially in cases of emergency. DCS values its partnership with law enforcement and recognize the critical nature of their calls. To ensure law enforcement officials have the highest priority, they have an access code which routes their calls to the front of the call sequence. On average, law enforcement officials utilizing the access code are connected to the hotline within 15 seconds.
LEA may also fax or e-mail reports of abuse or neglect, but DCS strongly suggests LEA call in allegations to the Hotline. | https://www.in.gov/dcs/2971.htm |
Safeguarding is one of the most critically important functions of many organisations in the United Kingdom. From health and social care to education, it’s essential to keeping vulnerable people, both children and adults, safe. There’s a lot to learn when it comes to safeguarding, and it can be difficult for those new to the topic to understand what safeguarding issues are, and what the response would be from those responsible. In this article, we’re going to go through three examples of safeguarding scenarios, looking at three different types of abuse, neglect or harm, which are the main issues safeguarding is designed to prevent. These are not true case studies; they are fictional scenarios, but they are intended to help make the topic clearer. Let’s take a look.
Important: Safeguarding policy can vary significantly between organisations, industries, and under different local authorities. As a result, these examples should not be seen as guides for how cases should be handled; they are simply illustrative.
Children as a group tend to be the most vulnerable, which is why safeguarding is a policy for any type of organisation that deals with them. This of course includes nurseries, schools and other care and educational settings which are responsible for looking after children. These settings are both places in which abuse, harm and neglect must be prevented, and places in which staff can potentially identify these activities happening elsewhere.
In this scenario, we have a child called Tom. Tom regularly attends the nursery, and usually appears as a normal and generally happy child. Similarly, when employees have contact with his single father, he appears to be a typical loving parent too.
However, staff begin to notice that Tom regularly comes in with poor standards of hygiene. He may appear unwashed, and unkempt. Some days he is also wearing clothes that appear to have been worn already for several days, and they are unclean.
It is at this point that employees of the nursery begin to suspect that Tom may be suffering from neglect in some way while he is at home. Good safeguarding policy will insist that records start to be kept. One of the most important aspects of safeguarding is good record keeping, and general organisation and visibility. As a result, those who come into contact with Tom will be asked to record important information, such as the clothes he is wearing, his general cleanliness etc.
From here, it is decided that a senior member of nursery staff needs to have a discussion with Tom’s father. This is always a difficult situation and difficult conversation to have, but is nonetheless an essential one. In some cases, there are mitigating circumstances, and in others, severe cases of neglect and even abuse are uncovered.
In this example, the discussion reveals that Tom’s single parent is struggling with money and having to work lengthy hours in order to cover his outgoings. He is genuinely upset with the situation which is having an impact on his ability to properly care for Tom, but he does not know what he can do. From this point, the nursery get social workers from the local authority involved, and they help determine the best course of action to help both Tom and his father. This may include additional help with care, and also signposting Tom’s father to ensure that he is correctly claiming any financial help available from the government.
We’ve already mentioned that there are three primary issues that safeguarding aims to prevent, which are neglect, abuse and harm. Abuse does not have to be physical; it can and more often is emotional, and in this scenario we’re going to consider financial abuse, which can and does have significant emotional impact too. Safeguarding in care homes frequently involves guarding against this.
Nora is an elderly woman living in a residential home. She is mentally healthy for someone of her age, but she does suffer from certain physical ailments, including moderate arthritis and both sight and hearing loss. As a result, she needs regular care, but she chooses to be as independent as possible.
Nora is cared for very well at the residential home, and the carers that deal with her are attentive and observant. They have however noticed an increase in Nora’s irritability, confusion and occasional anger, which is out of character. One carer decides to sit down with Nora to discuss what she might be unhappy about. Nora regularly feels that certain acquaintances of her are visiting her and asking her for money which isn’t paid back or are telling her that she has already agreed to contribute money to something, making her feel guilty if she doesn’t remember. This is generally making Nora upset and feeling taken advantage of.
One of the most important aspects of safeguarding is giving vulnerable people as much control over how things are handled as possible. They should be able to make decisions as far as is reasonably possible, and everything must be communicated. The carer in question explains to Nora that she is required to keep a record of the conversation and notify her manager, but that Nora will be able to make decisions about how things proceed.
Local authorities will have different setups across the country, and in this case a representative specialist in adult safeguarding issues is asked to come in and speak to Nora. He gives her advice about how the situation can proceed. This could include someone speaking to the acquaintances in question, Nora being given the support she needs to handle the situation herself, or even the police becoming involved.
It’s decided that a council worker will speak to the people in question on Nora’s behalf. Following this, a regular review will be set up to ensure that the discussions have been effective, that Nora has full control over her finances, and she does not feel like anyone is taking advantage of her.
Safeguarding is naturally a huge consideration for not only school leaders, but every employee at the school. There are major responsibilities to think about; schools must be not only places where abuse, harm and neglect cannot take place, but they are also environments at which these issues can be identified when happening elsewhere.
The scenario is unfortunately not an uncommon one in modern schools. Bullying remains a problem at most schooling ages and is a major challenge for school leadership. While safeguarding is most often thought of as abuse from an adult to a child, or an adult to a vulnerable adult, peer on peer abuse is equally valid a concern.
In this scenario we have Alice. She is 14 and attends her local state secondary school, which she has done since she was 11. Previously, she has been a happy and healthy student, with no particular problems at home.
However, her parents have recently noticed that Alice is quiet and withdrawn. She is less likely to engage in conversation, she spends a lot of time in her room, and she is unwilling to talk at length about school activities. She has also been late for school regularly; often not arriving until after all of the other students, which has been communicated to her parents via a letter from the school.
Alice’s concerned parents decide that something may be happening at school to cause this, and therefore set up a meeting with a senior member of pastoral staff. They are not aware of any issues she is having during school time, other than occasional lateness, and as a result, Alice’s parents try to sit down again with her to discuss the problems.
It is revealed that Alice is being bullied physically by other children on her way to school. They chase and hit her, and she attempts to avoid them by going to school after everyone else. This is why she is late, and she is regularly very upset.
Alice’s parents take this information to the school. Being responsible for safeguarding issues, the school must now take whatever steps possible to resolve the issue. Headteachers have legal powers and some obligations to ensure that pupils behave outside of school - which includes on the way to and from it. The police can also be brought in if necessary.
A plan is put into place by the school and with Alice and her parent’s consent. This involves giving Alice any support she needs, as well as taking measures to ensure that the This will be regularly reviewed to ensure that Alice is safe.
Here at Virtual College, we’re proud to be specialists in delivering safeguarding training, and have a number of options for those who are looking to learn more about this important principle. Click here to see an example of one of our courses, which is designed for those working in health and social care. | https://www.virtual-college.co.uk/resources/examples-of-safeguarding |
Mechanical Engineering Energy and Thermal Systems Laboratory, National School of Engineers in Monastir St.
Development and environment are interrelated to each other. Improper or uncontrolled development is likely to cause adverse impacts on the environment, and environmental pollution or degradation may become a major obstacle for social and economic development. Nowadays, there is a great concern to eliminate or minimize the environmental impact of energy resources. Even petroleum and gas production countries are seeking different alternatives or “Renewable Energy Resources”. On the other hand, extraction and use of coal ores is still in favor of some countries to use it as main or secondary energy recourse in some industries such as cement and iron steal.
This special issue aims to highlight the most recent researches towards developing new strategies and techniques to fully exploit both of coal and other alternatives including petroleum, gas, solar energy, wind power, PV systems,.., as a source for electricity generation.
Researches, innovations, case studies, new methods, techniques, approaches, models, cost effective methods, ..etc, are welcome to participate in this issue, with focus on environmental and economic studies. Authors can write under one of the following topics by sending scientific papers meeting the Journal format and criteria in any of the following topics. | http://www.sciencepublishinggroup.com/specialissue/specialissueinfo.aspx?journalid=167&specialissueid=167001 |
South African psychiatrists' criteria for predicting dangerousness.
The prediction of dangerousness has emerged as one of the most controversial issues in forensic psychiatry. It is a value-laden and ambiguous concept which has not been adequately defined and operationalized by the law or psychiatry. The validity and reliability of psychiatric predictions of dangerousness have been brought seriously into question in the past few decades. The Booysen Commission appointed in South Africa relates to the problem. An exploratory survey to ascertain the variables which South African psychiatrists perceive as influencing their decisions about dangerousness and to compare these findings with those of previous research was undertaken. One hundred and thirty-eight psychiatrists were included in a survey by means of a questionnaire. Findings that clinicians' decisions were significantly influenced by patients' criminal/violent history were consistent with previous research. The article further evaluates the responses to the questionnaire variables and the degree as well as a study of detained 'dangerous' patients to assess accuracy of evaluations in practice.
| |
The Moran Norris Foundation family is a group of dedicated and committed individuals who have a passion for helping youth progress to higher standards in education and character.
Many communities, such as Houston and its surrounding areas, are plagued with juvenile delinquency, drug and gang violence, poverty, under-funded educational programs, alarming drop-out rates, and many other factors that contribute to the attrition of growth and prosperity of our youth. As a result, many youth do not receive a standard education nor develop into productive citizens. We believe that each child, when given the opportunity, can overcome these obstacles and realize their dreams.
We have created programs that begin with direct and personal communication on how youth can achieve their goals. We then challenge and encourage youth to take advantage of their education and developing great character. Finally, we reward participating students for their efforts.
In collaboration with our Board Members, Houston ISD and other local partners, we strive to provide students, parents, and teachers with programs and resources to combat the challenges associated with various types of behavioral problems. The Foundation’s success in these areas is attributed to programs such as the annual “Follow Me” Football Camp, Shopping for Good Character, Pay Now Play Later, and Athletes for Art.
Our goals include: decreased student dropouts, improved student attendance and conduct, increased awareness of the importance of community and extracurricular involvement, and increased commitments to higher education.
Each year the MNF teams up with four to six partner middle schools in the Houston School District and works with the educational leaders to implement a semester-long academic incentive program. The goal for every school partnership is the same: to motivate and incentivize students to work harder in school, and to support teachers and administrators in their efforts to improve student achievement. Currently, the Foundation works with the following middle schools: Marshall, Cullen, Williams, McReynolds, Woodson K-8 and Dowling.
In 2012 the Houston Independent School District conducted a “Program Impact Evaluation” of the Foundation’s Shopping for Good Character program. The evaluation concluded that over 3,500 students had been impacted by promoting positive identity and positive values. | https://morannorrisfoundation.org/about.php |
Welcome to the IFEAD website.
Your primary source on Enterprise / Security Architecture Information.
The Institute For Enterprise Architecture Developments will stop their EA Research Activities by July 1, 2019.
As a result of that, this Website will be closed by July 1, 2019.
We will thank all contributors for their efforts during the 18 years of our existence.
Our EA Books will be available via internet Book Resellers or directly by our Publisher, Trafford Publishing (https://www.trafford.com). Search for author: Jaap Schekkerman.
This is the website of the Institute For Enterprise Architecture Developments (IFEAD). IFEAD is a not for profit research and information exchange organization working on the future state of Enterprise Architecture. Founded in 2001 by our President Jaap Schekkerman, Thought Leader in Cyber Security-CI/ICS, Business Technology Strategy & Enterprise / Security Architecture.
IFEAD is since 2001 an important source of information related to Enterprise Architecture and working in close relationship with universities and other research organizations. The goals and objectives of IFEAD are doing research & development about the future state of Enterprise Architecture and sharing a continuous flow of relevant information with all interested in the areas of Enterprise / Security Architecture. Many books and publications are developed over the years under the auspices of IFEAD. Several of these books are today standard study books at more than 25 universities all over the world.
This site is our primary source of information about the importance of Enterprise Architecture and Enterprise Architects in the Virtual Digital World of Security, Organizations, Business and Technology and contains several articles, references, standards and methods supporting the Enterprise / Security Architect as well as Best Practices and News about related topics.
This Enterprise Architecture Good Practices Guide is based on IFEAD's well known sets of EA guides that are published over the years and enhanced on feedback from users.
The purpose of this guide is to provide guidance to organization's in initiating, developing, using, and maintaining their enterprise architecture (EA) practice. This guide offers a set of Enterprise Architecture Good Practices that have proven their benefits to organizations and that addresses an end-to-end process to initiate, implement, and sustain an EA program, and describes the necessary roles and associated responsibilities for a successful EA program.
While EA frameworks and models provide valuable guidance on the content of enterprise architectures, there is literally no guidance how to successfully manage the process of creating, changing, and using Enterprise Architecture.
This guidance is crucially important. Without it, it is highly unlikely that an organization can successfully produce a complete and enforceable EA for optimizing its business value and mission performance of its systems. For example, effective development of a complete EA needs a corporate commitment with senior management sponsorship. Enterprise Architecture development should be managed as a formal program by an Enterprise Architecture Department that is held accountable for success.
Ordering this guide directly at the website of the Publisher is the easiest and fastest way of getting this guide.
Cyber and Security problems continue to plague cyber-physical systems. The growth of the Internet of Things and complexity of industrial control systems will lead to more vulnerabilities in hardware systems and critical infrastructures. Connected devices are becoming a greater part of our lives. From exercise-tracking devices to smart watches to sensors for monitoring industrial processes, businesses and consumers are using connected devices, the so called Internet of Things or IoT, to collect information from the world around them and manage their lives and businesses.
Within modern TCP/IP based environments, such as the corporate infrastructure for managing the business that drives operations in a control system, there are technology-related vulnerabilities that need to be addressed. Historically, these issues have been the responsibility of the corporate IT security organization, usually governed by security policies and operating plans that protect vital information assets.
Clearly, the main concern as control systems become part of these large architectures is providing security procedures that cover the control system domain as well. Contemporary network-based communications have security issues that must be addressed in the control system domain, as unique vendor-specific protocols and assumed legacy system security is not adequate to protect mission critical systems.
So a security reference architecture for industrial control systems based on the ISA99 / IEC62443 standard is a must have to better protect and secure critical operations. Read more at the site of the Cyber Research Center - Industrial Control Systems. | http://enterprise-architecture.info/ |
The process of a common migration policy of the European Union goes back to 1980s. It has started with the Single European Act and Schengen Agreement. The migration policy strengthened with further agreements- the Maastricht Treaty and the Amsterdam Treaty. However, these regulations did not create a desirable solution to Syrian refugee crisis. Even though the EU imposed new policies to the crisis such as resettlement and relocation with hotspots, the crisis continued. Therefore a new policy such as the refugee deal was introduced. The deal seems to be an outcome of negotiations of various actors on the same crisis with separate interest. Upon the data taken from ESI, it seems that the deal was successful for following months however future consequences of the deal are not predictable. All these initiatives of the EU for Syrian refugee crisis indicate that the EU has a migration policy that needed to be updated with in accordance with the current crisis. With each crisis, the EU experiences its missing point which led to new policies for further integration for the EU. Syrian refugee crisis would also lead to such an integration process. | https://research.sabanciuniv.edu/id/eprint/34753/ |
The utility model relates to the technical field of intelligent well lids, and provides an intelligent well lid water level detector which comprises a 4G module circuit, an SIM communication module circuit, an intelligent mobile phone APP terminal, a cloud server, a monitoring platform server, a level conversion circuit, a single-chip microcomputer control circuit, a water level acquisition voltage division circuit and an alarm circuit. The water level acquisition voltage division circuit detects underground water level information of a well lid in real time and sends the detection information to the single-chip microcomputer control circuit, the single-chip microcomputer control circuit is connected with the 4G module circuit through the level conversion circuit, and the 4G module circuit is in communication connection with the cloud server through the SIM communication module circuit. The cloud server uploads underground water level information and alarm information of the well lid to the smart phone APP terminal and the monitoring platform server, and the output of the single-chip microcomputer control circuit is connected with and controls the alarm circuit to carry out on-site sound alarm. The well lid solves the problem that underground water level detection alarm information transmission of an existing well lid is limited by the LORA technology and the sending communication distance. | |
What can I do with my degree in Chemistry? - Careers and Employability Service Every year the University of Kent participates in the Destinations of Leavers from Higher Education survey to find out what graduates are doing after finishing their courses. You can access this information here . Please note that this webpage is password protected and only accessible by University of Kent staff and students. The examples shown reflect the destinations of students six months after graduation. The data is collected by UK universities and submitted to the Higher Education Statistics Agency (HESA), which publishes summary reports for all UK Higher Education Institutions. Further information on national graduate destination statistics Engineering Careers: Inspiring Engineering Apprentices and Graduates
Pharmacologist: Job description Pharmacologists investigate how drugs interact with biological systems, undertaking in vitro research (using cells or animal tissues) or in vivo research (using whole animals) to predict what effect the drug might have in humans. Pharmacologists aim to understand how drugs work so they can be used effectively and safely. They also conduct research to aid drug discovery and development. Areas of specialism include: neuropharmacology; cardiovascular pharmacology; in vivo pharmacology; psychopharmacology; veterinary pharmacology. Although pharmacologists are involved in clinical trials, clinical pharmacologists are practising doctors who have specialised in clinical pharmacology. Closely related fields include toxicology, biochemistry and DMPK (drug metabolism and pharmacokinetics). Typical work activities Much of the role is laboratory-based, working as part of a scientific research team, and may include the following duties:
Clinical research associate: Job description A clinical research associate (CRA) runs clinical trials to test drugs for their effectiveness, risks and benefits to ensure they are safe to allow on to the market. They may work on new as well as existing drugs and are usually employed by either a pharmaceutical company or a contract research organisation (CRO) which works on behalf of pharmaceutical companies. The CRA will typically be involved in all stages of the clinical trial, including identifying an investigational site and setting up, initiating, monitoring and closing down the trial. Clinical trials may be carried out at various stages or phases and include trials on healthy humans, trials on patients with a disease, and studies conducted after the launch of a new drug to monitor safety and side effects. Typical work activities Tasks carried out by a CRA vary depending on the employer but will typically include:
Edinburgh Clinical Toxicology - Edinburgh Clinical Toxicology Clinical Care The clinical service treats over 1700 in-patients every year and is involved in the care of many other patients in the hospital's emergency department and critical care units. The unit is staffed by four consultant clinical toxicologists and one emergency medicine consultant with an interest in toxicology; two consultant clinical pharmacologists provide additional cover over weekends. National Poisons Advice The NPIS Edinburgh unit takes part in the national National Poisons Information Service for health care providers in the UK. Research The University's PTT group performs an array of pre-clinical and clinical research. Awards Visitors Edinburgh Clinical Toxicology regularly welcomes visitors to our unit, for days, weeks or months.
Membership and professional community Connect with others Our community brings together scientists, teachers, industry experts and students from across the world. We'll help you tap into a global network that offers endless opportunities to promote and share your work, ideas and expertise. Supporting individuals Keep your professional knowledge up to date through a variety of networks, high quality research, publications, and information services. Take advantage of our specialist career advice and professional development opportunities including practical support and grants. Supporting organisations From schools, colleges and universities through to small and large companies, we can support your organisation by giving you the resources, networks and recognition you need. Engage with us For both individuals and organisations, there are a range of ways to support our activities. Join us Our members make us what we are – a vibrant and diverse worldwide community, advancing excellence in the chemical sciences. Manage my membership
Biology Careers Biology offers a wide range of career options and opportunities for school-leavers, graduates, postgraduates. Whichever stage of your career you're at - from deciding whether to study biology at school, college or university, to working out what to do after you graduate - the Society of Biology is here to help. First of all, there's no such thing as a typical biologist. Entering a career in biology could take you in almost any direction you can think of, and to anywhere in the world. | http://www.pearltrees.com/u/86706497-abpi-careers |
Gyani Maiya Sen with Uday Raj. Photo by Sanjib Chaudhary. Used with permission.
Gyani Maiya Sen Kusunda was not known to many but she was a beacon of hope for linguists who hoped to revive the isolated and dying Kusunda language. She passed away on 25 January 2020 at her home in Kulmor Village of Dang District in western Nepal. She was 85.
She was one of the last two fluent speakers of the Kusunda language, an oral language without any script. Though the 2011 Census puts the population of Kusundas at 273, field studies suggest there are actually only 150 Kusundas living in the western districts of Nepal.
With the demise of Gyani Maiya Kusunda, one of the two fluent speakers of Kusunda language, the language has suffered an irreparable loss. Heartfelt reverence to deceased Gyani Maiya Kusunda.
The Kusundas led a nomadic hunter-gatherer lifestyle until only few decades ago when they began settling down in villages mainly in western nepal. Recently, Gyani Maiya helped researcher Uday Raj Aaley conduct the first phase of Kusunda language classes for a cohort of 20 people interested in learning the language. She has worked not only with Uday for the revival of the language but also with researchers like Brian Houghton Hodgson, Johan Reinhard, David Watters, B.K. Rana and Madhav Prasad Pokharel among others.
The country has lost an invaluable personality. Gyani Maiya Sen Kusunda had amazing linguistic capability. I worked with her on Kusunda language’s diverse aspects, structure, glossary for more than a decade. Having spent most of her life in anonymity, the country recognized her only at the last moment. During this time, although the national and international academics recognized her, the important documents produced working with her needs to be organized well. I appreciate her contribution towards the development of Kusunda language…
“Now there is no one to discuss in Kusunda language,” laments Uday. “But we still have little hope. Her sister Kamala Sen Khatri, 50, is fluent in Kusunda language. We will need to utilize her services to revive the language.”
Support our work
Global Voices stands out as one of the earliest and strongest examples of how media committed to building community and defending human rights can positively influence how people experience events happening beyond their own communities and national borders. | |
FIELD OF THE INVENTION
BACKGROUND OF THE INVENTION
SUMMARY OF THE INVENTION
DESCRIPTION OF EMBODIMENTS
The present invention relates to storage of nanofibres and in particular to transferring of nanofibres from a template substrate to a storage medium.
The ongoing rapid miniaturisation of optoelectronics has led to an increased interest in generation, characterisation and interconnection of optoelectronic elements with characteristic dimensions in the sub-micrometer or nanometer length scale regime. The requirements of the optically active element(s) in a sub-micro- or nanoscale optoelectronic component include such features as an easy optical tunability, a strong luminescence efficiency, flexibility in the molecular basis elements and that light should be generated or propagate in a predefined way. Organic optically active elements may fulfil such requirements.
A difficulty is that normally it is impossible, inconvenient or economically unfeasible to form the organic sub-micro- or nanoscale optically active elements and components directly on a desired substrate.
A solution to this is to form the optically active element on a different substrate—a formation substrate or template—and subsequently transfer the element to the desired substrate.
The published patent application WO 2006/048015 discloses a lift-off procedure for releasing an ensemble of organic nanofibres from a template substrate so that it subsequently may be transferred to a target substrate or a liquid solution.
In the product line of an electronic component incorporating nanoscale or sub-microscale elements as the active elements, different production steps may be performed at different locations, at different production times, in different production runs, etc. In such situations a problem may arise in connection with storage of the nanoscale or sub-microscale elements or components produced at a first substrate, between production of the active element and incorporation of the active element into the electronic component.
The inventors of the present invention have appreciated that an improved way of handling sub-micro- or nanoscale elements is of benefit, and has in consequence devised the present invention.
The present invention seeks to provide an improved means of handling an ensemble of organic nanofibres, and it may be seen as an object of the invention that an ensemble of organic nanofibres may be transferred to a storage medium in a way so that at least one of the following properties of the organic nanofibres: morphology, optical, electronic and/or mechanical are maintained in a substantially unaltered form. It is a further object of the present invention to provide an alternative to the prior art. In particular, it may be seen as an object of the present invention to provide a method of transferring nanofibres from a template substrate to a flexible storage medium that solves the above mentioned or other problems of the prior art.
Preferably, the invention alleviates or mitigates one or more of the above or other disadvantages singly or in any combination. Accordingly there is provided, in a first aspect, a method of transferring nanofibres from a template substrate to a flexible storage medium, the method comprising:
a) providing the template substrate supporting nanofibres and the flexible storage medium;
b) positioning the flexible storage medium so that a first storage area of the flexible storage medium is facing a first support area of the template substrate;
c) pressing the first storage area of the flexible storage medium in contact with the first support area of the template substrate and remove the first storage area of the flexible storage medium from contact with the first support area of the template substrate, thereby transferring the nanofibres from the template substrate to the flexible storage medium and thereby providing a loaded flexible storage medium.
−5
−7
The template substrate may be any type of substrate suitable for supporting an ensemble of nanofibres. The template substrate may be a dielectric substrate, and the substrate may have a polar surface, i.e. a surface which maintains an electrical field. Such substrates may be unstable in ambient conditions and consequently at least one of the steps required in order to provide the template substrate supporting nanofibres, may include preparing the template substrate and growing nanofibres in a vacuum condition, such as in a pressure below 10torr, such as below 10torr, or even lower. The template substrate may be a mica substrate, such as a mica substrate of the muscovite type. However, the template substrate may be any type of polar substrate such as surfaces maintaining a non-zero electrical charge and a non-zero surface dipole moment, e.g. such as surfaces of the {111}-terminated rocksalt crystals, the {0001}-terminated wurtzite crystals, the {110}-terminated fluorite crystals, etc.
The term nanofibres should be construed broadly to include elongated objects or aggregates with at least one characteristic dimension in the nanoscale. Moreover, the prefix nano should be construed broadly and at least to include sub-micrometer sized objects as is common in the field of nanotechnology. Reference is made to nanofibres, this reference is not intended to be limiting and should be construed to include at least rod-like shapes, needle-like shapes, such as any type of elongated or substantially elongated and bent objects.
The nanofibres may be organic nanofibres, e.g. provided as the resulting structure of a growth process, where the nanofibres are build up of individual organic molecules so at to obtain elongated or bent aggregates of molecules. The individual organic molecules may be molecules with a π-electronic configuration. The organic molecules may be of the type of para-phenylene oligomers or functionalised para-phenylene oligomers.
The nanofibres may have a mean lengths in the range of 10 to 100 microns or even longer. The cross-sectional width may be a few hundred nanometers and a cross-sectional height of approximately 100 nanometer. The shape of the cross-sectional area may be generally rectangular or quadratic. However, any cross-sectional shape may be envisioned.
The flexible storage medium may be in the form of a band, such as a plastic band, including a PET band. A plastic band is cheap, ready available and reliable.
Embodiments of the present invention is particularly but not exclusively advantageous for providing a method of storing and handling of nanofibres for commercial implementation into working devices, by providing a solution to problems concerning compact storage of nanofibres for further use.
The method may further comprise the subsequent steps of:
b2) repositioning the flexible storage medium and optionally the template substrate so that at least a second storage area of the flexible storage medium is facing at least a second support area of the template substrate,
c2) pressing the second storage area of the flexible storage medium in contact with the at least second support area of the template substrate and remove the at least second storage area of the flexible storage medium from contact with the at least second support area of the template substrate
or alternatively, the steps of:
a3) providing nanofibres onto the same or other template substrate;
b3) repositioning the flexible storage medium so that at least a second storage area of the flexible storage medium is facing a first support area of the template substrate.
c3) pressing the second storage area of the flexible storage medium in contact with the first support area of the template substrate and remove the at least second storage area of the flexible storage medium from contact with the first support area of the template substrate.
Sequentially loading of a number of areas of the storage medium may thereby be performed, in order to provide a flexible storage medium storing a large number of areas containing nanofibres.
Having loaded the flexible storage medium, the loaded flexible storage medium may be stored, in principle for an indefinite period. For ensuring cleanliness, or for other reasons, the storage of the flexible storage medium may be done in a controlled atmosphere, such as in a nitrogen atmosphere, in a carbon dioxide atmosphere, in a noble gas atmosphere or generally in an inactive atmosphere.
The stored nanofibres may be transferred to a target substrate by the following steps:
d) providing a target substrate; e) positioning the loaded flexible storage medium so that a first storage area of the loaded flexible storage medium is facing a first support area of the target substrate;
f) pressing the first storage area of the loaded flexible storage medium in contact with the first support area of the target substrate and remove the first storage area of the flexible storage medium from contact with the first support area of the target substrate, thereby transferring the nanofibres from the loaded flexible storage medium to the target substrate.
The transfer process may include the steps:
e2) repositioning the loaded flexible storage medium and optionally the target substrate so that at least a second storage area of the loaded flexible storage medium is facing at least a second support area of the target substrate.
f2) pressing the second storage area of the loaded flexible storage medium in contact with the at least second support area of the target substrate and remove the at least second storage area of the loaded flexible storage medium from contact with the at least second support area of the target substrate.
At least some of the process steps of transferring the nanofibres from the flexible storage medium to the target substrate may in some embodiment be similar as to the process steps of transferring the nanofibres from the template substrate to the flexible storage medium, except for the start substrate and the end substrate.
The target substrate may be any desired substrate, such as a semiconductor substrate, e.g. a silicon substrate, a GaAs-substrate, an InP-substrate, etc. However, the target substrate may also be an insulator substrate, such as an alumina substrate, a silica substrate, a glass substrate, etc. The target substrate may also be a metal substrate, an oxide substrate, such as an ITO-substrate, etc. Further processing may be performed on the target substrate, e.g. in order to fabricate a device.
Embodiments of the present invention is particularly but not exclusively advantageous for being able to provide a solution to the problem of local transfer of nanofibres onto an in principle arbitrary, or at least a variety, of target substrates.
In connection with pressing a storage area of the flexible storage medium in contact with a support area of the template substrate or target substrate, the contact may be such contact where short-range atomic or molecular attraction arises between the template substrate and the flexible storage medium or between the flexible storage medium and the target substrate.
The pressing may be done by means of a stamp, pressing from the backside of the flexible storage medium. In an embodiment, the stamping is done by means of compressed air. By applying compressed air, it may be ensured that the entire face of the flexible storage medium is pressed in contact with the desired area of the template substrate or target substrate.
Additional process steps may be performed in between the multiple transfer steps of embodiments of the present invention, such as lithographic steps, deposition steps, etc. In an embodiment, the growth of the nanofibres on the template substrate may be patterned, e.g. so that some regions contain nanofibres and others are void. The patterning may be transferred to the flexible storage medium and the target substrate to provide a given functionality in a resulting device.
The transfer process may prior to the steps a) or a3) above include releasing the nanofibres from the template substrate by first providing a polar liquid to a surface of the template substrate, or to a surface of the flexible storage medium, or to the surface of the template substrate and the surface of the flexible storage medium. The polar liquid is thereby brought into liquid contact with the nanofibres and the surface of the template substrate, either prior to or during contacting the template substrate and the flexible storage medium.
The transfer process may prior to the steps a) or a3) above include releasing the nanofibres from the template substrate by first exposing a surface of the template substrate to a controlled atmosphere comprising a polar vapour, or exposing a surface of the flexible storage medium, or exposing the surface of the template substrate and the surface of the flexible storage medium. The polar vapour is thereby brought into contact with the nanofibres and the surface of the template substrate, either prior to or during contacting the template substrate and the flexible storage medium.
The polar liquid or vapour provided to the surface of the substrate may wet the entire surface, may wet the regions abutting the nanofibres, or may at least provide sufficient polar molecules in an interface region between the nanofibres and the template substrate or the flexible storage medium. The liquid may, but need not to, cover the individual nanofibres. The polar liquid may be such a polar liquid as water or methanol, or any liquid which has a finite dipole moment, such as a dipole moment larger than 1 Debye, larger than 1.5 Debye, larger than 1.75 Debye, larger than 2 Debye or even larger.
The transfer process may comprise supplying energy to the combined system of nanofibres and liquid or nanofibres and vapour, the energy may be provided in the form of ultra-violet light. The energy may also be supplied by acoustic waves such as ultrasound.
In an embodiment, the nanofibres may be provided to the template substrate, by transferring the nanofibres to the template substrate from a liquid solution. Storing nanofibres in a liquid solution may be an intermediate step for redistributing the nanofibres before transferring the nanofibres to the template substrate. The provision of nanofibres to a liquid solution is disclosed in WO 2006/048015, which is hereby included by reference.
The organic nanofibres may be optically active elements, as they may emit light, e.g. by running a current along the fibre or by a fluorescence process following light or electron exposure of the nanofibres. The organic nanofibres may be optically active in the visible or near visible wavelength range, such as in the wavelength range of 300-600 nm, or more specific in the range of 370-500 nm, corresponding substantially to blue light. The organic nanofibres may, however, be optically active in any visible or near visible wavelength range, as determined by the electronic structure of the molecular constituents of the nanofibres.
Having transferred the nanofibres to the storage medium, the nanofibres may bond to the storage medium with sufficient strength, so that during handling and storage of the flexible storage medium, the nanofibres are not released form the storage medium. In order to release the nanofibres from the storage medium it may be necessary to perform at least some of the steps of embodiments of the present invention.
The method of releasing and transferring the nanofibres from a template substrate to a storage medium and optionally to a target substrate as disclosed, ensures that at least one, and possibly more, or even all, physical properties of the individual or ensemble of nanofibres are substantially unaltered in the release and/or transferring process. For example, the optical and morphological properties of individual or an ensemble of nanofibres may be conserved during transfer. However, also electronic and mechanical properties may be conserved in the transfer process. The nanofibres which are provided on the template may be aligned. The alignment of the individual nanofibres may as an example be substantially maintained in the transfer and storage process. An advantage of embodiments of the present invention may be that it ensures controlled aligned transfer of nanofibres.
In accordance with a second aspect of the present invention a flexible storage medium loaded with nanofibres is provided by applying the method of the first aspect.
The invention may be used in connection with the fabrication of devices such as light emitting devices, light sensing devices, light guiding devices, etc., that utilises laid-down nanofibres. The devices may be provided by a fabrication process where nanofibres forming light emitting, sensing or guiding elements have been provided onto a flexible storage medium and transferred to another substrate by the method according to embodiments of the invention.
The method according to the present invention is advantageous for use in the production of optoelectric components or devices since the active elements may be provided on a first substrate enabling growth or production of the nanoscale element and afterwards transferred to a storage medium, before transferred to a production substrate. The method may thereby bridge the gap often seen between specialised research on idealised model systems to commercial products. Further, it may render large-scale production cheap since it facilitates wafer-size production in a simple and reliable manner.
These and other aspects, features and/or advantages of the invention will be apparent from and elucidated with reference to the embodiments described hereinafter.
Embodiments of the present invention relate to the transferring of nanofibres from a template substrate to a flexible storage medium. In a step prior to the transfer process, a template substrate supporting nanofibres as well as the flexible storage medium are provided.
FIGS. 1 and 2
describe embodiments of a possible template substrate and nanofibres in the form of elongate aligned nanofibres of organic molecules grown on a mica substrate.
FIG. 1
2
3
1
schematically illustrates the growth of organic nanofibres , on a template substrate , or more specifically, the growth of phenylene nanofibres on a muscovite mica substrate.
Mica may be prepared so that an electric field is present in the surface, e.g. by cleavage in air and immediate transfer into a vacuum apparatus where it may be outgassed, e.g. at 410 K for 0.5 h or possible longer, or by direct cleavage in vacuum.
4
The nanofibres presented in this section are made up of p-phenylene oligomers (p-nP) which are elongate molecules made of n benzene rings. It is however to be understood that any type of molecules within the scope of the present invention may be used. These molecules may grow in a self-organising way into organic nanofibres. The molecules grow in a direction perpendicular to the molecular axis, i.e. the molecules grow in a direction parallel to the surface plane, as indicated by the arrow marked with reference numeral . The fibres may be provided with a length of up to a few millimetres with a cross-section of a few hundreds nanometers. The size of the nanofibres can be controlled by implying proper conditions during the growth process.
The phenylene oligomers may be provided onto the mica surface at variable surface temperatures such as between 350 and 450 K, and with variable deposition rates, e.g. by means of a resistively heated oven with a nozzle at a deposition rate of ˜0.02-0.5 Å/S. The size of the resulting nanofibres depends very much on the surface temperature. The surface temperature may further be controlled by means of irradiating a focussed low power laser on the surface in the growth region.
FIGS. 2A
20
21
5
−2
6
−2
and B show two microscope images of aligned nanofibres , grown on a mica substrate. The nanofibres were grown at a surface temperature of 356 K in connection with laser irradiation from a 0.5 W laser. The width of the nanofibres is around 200 nm and the density is between 10cmand 10cm. The typical lengths of the nanofibres are indicated by the scale bars provided in the Figures.
FIGS. 3A-3D
31
30
32
schematically illustrate and in a cross-sectional view the transfer process of the nanofibres from the template substrate to the flexible storage medium . The illustration is purely provided for illustrative purposes and does not necessarily represent the physical truth at the interface.
The flexible storage medium may be in the form of a plastic band, such as a PET band.
FIG. 3A
30
31
34
33
In the template substrate supporting nanofibres is exposed to water vapour emitted from a nozzle so that the surface of the template substrate is exposed to an atmosphere of a polar vapour. Also the surface of the flexible storage medium may be, but need not be, or may as an alternative be exposed to the vapour. The nozzle may generate a local ambient with a humidity of 80% for 0.5 to 5 seconds. The nozzle may be in the form of a nebulizer which is capable of creating a controlled flux of cold vapour, however alternative means may be used.
35
32
FIG. 3B
After the exposure a thin film of the liquid has formed on the surface of the template substrate and possible also on the surface of the flexible storage medium , or at least water molecules have interacted with the nanofibres. As disclosed in WO 2006/048015, the interaction between the nanofibres and polar molecules result in a release of the nanofibres from the substrate, or at least in a weakening of the bonding between the nanofibres and the template substrate. This is illustrated in .
FIG. 3C
36
36
In a next step, as illustrated in the flexible storage medium or at least the area to be contacted, is pressed in contact with the surface of the template substrate. The pressing may be done by means of a stamp pressing from the backside of the storage medium, and more specifically as illustrated in the Figure, the pressing may be done by means of a stamp utilizing compressed air for forcing the flexible storage medium into contact with the template substrate and the nanofibres. In an embodiment 20 bar of compressed air may be applied, the pressure may be build up by an increase of 1 bar/sec.
31
32
By contacting the substrate and the storage medium together, the nanofibres form surface bonds to the storage medium and stick thereto. Upon separation, the nanofibres or at least a large fraction of the nanofibres are transferred to the storage medium . The nanofibres are transferred in a way so that both the geometrical orientation of the nanofibres on the template substrate is maintained on the storage medium, also the physical properties of the nanofibres are maintained in the transfer process.
Compact storage of nanofibres for future use is thereby enabled.
FIGS. 4A-4C
FIG. 4A
FIG. 4B
FIG. 3C
31
32
40
40
36
schematically illustrate and in a cross-sectional view the transfer process of the nanofibres from the flexible storage medium to a target substrate . In , the flexible storage medium is positioned so that the flexible storage medium is facing a target substrate , and as illustrated in the flexible storage medium or at least the area to be contacted, is pressed in contact with the surface of the template substrate, in a similar manner as in connection with .
31
40
FIG. 4C
By contacting the storage medium and the target substrate together, the nanofibres are forming surface bonds to the target substrate and stick thereto. Upon separation, the nanofibres or at least a large fraction of the nanofibres are transferred to the target substrate , as illustrated in . Again, the nanofibres are transferred in a way so that both the geometrical orientation of the nanofibres on the template substrate is maintained on the storage medium, Also the physical properties of the nanofibres are maintained in the transfer process.
The target substrate may be any type of substrate, whereby nanofibres can be provided on a substrate on which growth of desired nanofibres may not be possible.
FIGS. 3 and 4
In addition to the process steps as described in connection with , a process step of supplying energy, e.g. in the form of ultra-violet light, to the combined system of nanofibres and liquid or nanofibres and vapour may be applied.
FIGS. 5A and 5B
schematically illustrate the process of loading a flexible storage medium with a number of areas storing nanofibres.
FIG. 5A
30
31
32
51
In a first step, as illustrated in , a template substrate supporting nanofibres and the flexible storage medium are positioned with respect to each other so that a first storage area of the flexible storage medium is facing a first support area of the template substrate. Typically, the first support area of the template substrate is the entire free surface of the template substrate, however the first support area may be a part of the template substrate.
FIG. 3
As disclosed in connection with , the nanofibres are transferred to the flexible storage medium. A typical area of the template substrate is 25×25 mm or 25×75 mm. The size of the template substrate may be dictated by the size of a single domain of nanofibres on the specific template substrate. A single domain of 25×25 mm or 25×75 mm may be achieved for p-nP grown on Mica.
FIG. 5B
30
52
In a next step, as illustrated in , nanofibres are provided onto the same or other template substrate ′. The template substrate may after the prior transfer process be re-cleaved and a new layer of nanofibres may be grown on the substrate. The flexible storage medium is repositioned so that at least a second storage area of the flexible storage medium is facing the support area of the template substrate.
FIG. 3
Again, as disclosed in connection with , the nanofibres are transferred to the flexible storage medium.
This process may then be continued for a number of times, so that the flexible storage medium may be loaded with a number of areas supporting nanofibres.
In other embodiments, the template substrate may comprise two or more areas supporting nanostructures, each area to be transferred separately. In such embodiments, the template substrate may be repositioned before a second or next area of the storage medium is loaded with nanofibres.
FIG. 6
is a schematically illustration of a loaded flexible storage medium in the form of a rolled band. The loaded flexible storage medium may be stored for a period of time, for example in a controlled or protected atmosphere.
FIG. 5
In order to transfer the nanofibres from a loaded storage medium and onto a target substrate, the reverse process of the process disclosed in connection with may be applied.
The transfer of the nanofibres to a target substrate may be a step in a process of fabricating a device. The target substrate may e.g. be a semiconductor substrate, on which lithographic steps can be performed.
Although the present invention has been described in connection with preferred embodiments, it is not intended to be limited to the specific form set forth herein. Rather, the scope of the present invention is limited only by the accompanying claims.
In this section, certain specific details of the disclosed embodiment such as specific substrates, liquids, molecules, preparation conditions, as well as number and order of method steps, etc, are set forth for purposes of explanation rather than limitation, so as to provide a clear and thorough understanding of the present invention. However, it should be understood readily by those skilled in this art, that the present invention may be practised in other embodiments which do not conform exactly to the details set forth herein, without departing significantly from the spirit and scope of this disclosure. Further, in this context, and for the purposes of brevity and clarity, detailed descriptions of well-known apparatus, circuits and methodology have been omitted so as to avoid unnecessary detail and possible confusion.
Although the present invention has been described in connection with the specified embodiments, it should not be construed as being in any way limited to the presented examples. The scope of the present invention is to be interpreted in the light of the accompanying claim set. In the context of the claims, the terms “comprising” or “comprises” do not exclude other possible elements or steps. Also, the mentioning of references such as “a” or “an” etc. should not be construed as excluding a plurality. The use of reference signs in the claims with respect to elements indicated in the figures shall also not be construed as limiting the scope of the invention. Furthermore, individual features mentioned in different claims, may possibly be advantageously combined, and the mentioning of these features in different claims does not exclude that a combination of features is not possible and advantageous.
BRIEF DESCRIPTION OF THE FIGURES
Embodiments of the invention will be described, by way of example only, with reference to the drawings, in which
FIG. 1
schematically illustrates the growth of organic nanofibres on a template substrate;
FIG. 2
shows two microscope images of aligned nanofibres;
FIGS. 3A-3D
schematically illustrate the transfer process of the nanofibres from the template substrate to the flexible storage medium;
FIGS. 4A-4C
schematically illustrate the transfer process of the nanofibres from the flexible storage medium to the target substrate;
FIGS. 5
A and B schematically illustrate the process of loading a flexible storage medium with nanofibres.
FIG. 6
is a schematically illustration of a loaded flexible storage medium in the form of a rolled band. | |
The United States state-specific age-adjusted disability prevalence ranges from 13.6% to 21.8%. A third to half of people with disability have drug therapy problems, 25 to 45% have an adverse drug effect each year, and virtually all regularly experience at least one secondary condition. The purpose of this randomized controlled trial is to test the effectiveness of the eight-week group-session health promotion program Living Well with a Disability (LW) augmented with a cooperative care model of medication management (Pharmaceutical Case Management; PCM). We theorize that the complementary mechanisms of the combined interventions will result in greater reduction in secondary conditions than the Living Well program alone. By reducing symptoms from secondary conditions our overall goal is to improve the health and quality of life of people with activity limitations. This research expands and replicates two promising evidence-based interventions in a broader population than they have previously been studied: we will test the interventions in a population-based sample of 252 adults with activity limitations who may or may not identify themselves as disabled. By combining the two interventions, this research also evaluates a new integrated intervention. Our primary specific aim is to compare the 6 and 12 month mean symptoms of secondary conditions among adults randomized to participate in the Living Well program augmented with PCM with those randomized to the traditional Living Well program and with those randomized to a no- intervention control group. Secondary aims are to compare the medication use quality, attitudes and adverse effects between the study groups. A population-based sample of adults with activity limitations will be identified by mailing a screening questionnaire to an age-stratified random sample of adults (18-44,45- 64, 65+) from the Iowa voters registration list living within 30 miles of the study facilities in three Iowa counties. To be eligible for our study, a person must report: (1) activity limitations according to the two BRFSS disability screening questions; (2) a physical impairment, including an anatomical loss or musculoskeletal, neurological, respiratory, or cardiovascular impairment which results from injury, disease, or congenital disorder; and (3) three or more symptoms from secondary conditions. Those randomized to traditional LW will participate in 8 weekly LVV sessions. The augmented LW group will additionally receive four one-on-one in-person sessions with a study pharmacist to create a medication therapy action plan in cooperation with the subject's primary care physician. Questionnaires will be administered at baseline and 6 and 12 months and will be the source of the primary study outcome variable as well as measures of attitudes and adverse medication effects. Prescription dispensing records and medical records will be the data source for rating medication use quality using standardized guidelines. [unreadable] [unreadable] [unreadable]
| |
What are an Interior Designer's responsibilities under the CDM Regulations 2015?
The Construction (Design and Management) Regulations 2015 (CDM 2015) cover the management of health, safety and welfare in construction projects, including those for domestic clients.
As an interior designer, you have legal duties under CDM 2015 and may have an additional role and duties under the regulations.
What do the CDM regulations require?
CDM 2015 requires those responsible for appointing designers and contractors to ensure the designers and contractors have the skills, knowledge, training and experience to carry out the work in a way that secures health and safety.
The regulations state that for a project where more than one contractor is involved, there must be a principal designer and principal contractor (see below), and the project must have a health and safety file.
If work is scheduled to last longer than 30 working days and have more than 20 workers working simultaneously at any point in the project, or exceed 500 person days, the client must notify HSE (Health and Safety Executive) about the project.
Who are the duty holders under CDM 2015?
Aside from the designer, and the principal designer (see below), those who have duties are:
Clients, that is the organisations or individuals for whom a construction project is carried out. They should make sure other duty holders are appointed and that sufficient time and resources are allocated.
Domestic clients, whose client duties normally pass to the contractor on a single-contractor project, or to the principal contractor for projects with more than one contractor.
Principal contractors appointed by the client to co-ordinate the construction phase of a project that involves more than one contractor.
Contractors who do the construction work – either an individual or a company.
Workers who work for or under the control of contractors on a construction site.
What is a designer under CDM 2015?
A designer is an organisation or individual who prepares or modifies a design for a construction project, or arranges for or instructs someone else to do so.
‘Design’ includes drawings, design details, specifications, bills of quantity and calculations prepared for the purpose of a design.
What are the duties of a designer?
Designers need to:
- Make clients aware of their duties.
- Prepare or modify designs.
- Provide design information.
- Co-operate with other duty holders.
When do a designer’s duties apply?
The duties apply as soon as designs which may be used in construction work in Great Britain are started. This includes concept design, competitions, bids for grants, modification of existing designs and relevant work as part of feasibility studies.
What is the principal designer?
The principal designer (PD) can be an organisation or individual appointed by the client to take control of the pre-consultation phase of any project involving more than one contractor.
Under CDM 2015, the PD may have separate duties as a designer.
The PD must have the right skills, knowledge and experience and, for an organisation, the organisational capability, to carry out all of the functions and responsibilities of a PD for the particular project and be in control of the pre-construction phase.
If you work on the planning and building regulations stages of a project but then cease to be involved, the client has to appoint another PD. You remain responsible for the design decisions taken in preparing the original plans.
What is the role of a principal designer?
The responsibilities of a principal designer are to:
- Plan, manage, monitor and co-ordinate health and safety in the pre-construction phase.
- Help and advise the client in bringing together pre-construction information, and provide the information designers and contractors need to carry out their duties.
- Work with any other designers on the project to eliminate foreseeable health and safety risks to anyone affected by the work and, where that is not possible, take steps to reduce or control those risks.
- Ensure that everyone involved in the pre-construction phase communicates and co-operates, co-ordinating their work wherever required.
- Liaise with the principal contractor, keeping them informed of any risks that need to be controlled during the construction phase.
Does the principal designer have other duties?
As PD you must assist the principal contractor in preparing the construction phase plan.
During the pre-construction phase, as PD you must prepare a health and safety file containing information relating to the project which is likely to be needed during any subsequent project to ensure the health and safety of any person.
You must also ensure that the health and safety file is appropriately reviewed, updated and revised from time to time to take account of the work and any changes that have occurred.
If your appointment as PD were to finish before the end of the project, you would have to pass the health and safety file to the principal contractor.
At the end of the project, as PD you must pass the health and safety file to the client.
Looking for further information? Members can go on to read our detailed guide. You can also access the Construction Industry Training Board's CPD on CDM 2015 here.
The BIID are delighted to announce the release of the new touchstone guide to running projects.
Swatchbox offer a solution to designers wanting to help reduce packaging waste.
We asked the editors to provide the lowdown on how to get published in the leading magazines and websites.
Prize winners for ‘Digital’ and ‘Hand Drawn’ for this inaugural event have been awarded.
Join the BIID for upcoming workshops designed to improve your hand drawing skills
Here’s how the BIID can assist with functions such as human resources, payroll and more. | https://biid.org.uk/resources/what-are-interior-designers-responsibilities-under-cdm-regulations-2015 |
This paper will serve to provide a summarization, review, and critique of Misery as it relates to mental health nursing. In order to explore the topic, the paper addresses the context of the mental health illness as presented in the movie, the observations of the behavior of the mentally ill individual within the movie, and provides the DSM-V diagnosis. Following the presentation of this information a treatment plan, complete with the expected outcome, is detailed along with the thoughts of the researcher regarding the movie as a whole.
Keywords: Misery, movie review, mental health, mental illness, diagnosis, criteria, treatment plan, outcomes
Movie Review: Misery
Introduction
Author Stephen King has made a career out of creating characters that have been described as comparable to individuals that who are known to readers; characters that could be coworkers, family members, or even strangers that they encounter in everyday scenarios. These fictional characters have the same loves, hates, likes and dislikes, problems and issues that the readers and audience members encounter in their daily life. It is the believability of these characters, the reality of these characters, which works to draw the audience in, allowing for the suspension of disbelief necessary to enjoy the tale being woven for them. One of the many characters that Stephen King has penned is Nurse Annie Wilkes, played by Kathy Bates, a central character in the novel Misery, which was turned into a film of the same name by famed screenwriter William Goldman. Goldman’s portrayal of Nurse Annie Wilkes and the subsequent acting of Kathy Bates in that role serves to provide insight into the darker side of mental illness. Through an exploration of her character, it will be possible to identify not only her potential mental health diagnosis, but also how the issues that she experiences contribute to the overall plotline of the story. Additionally, through a diagnosis using DSM-IV criteria, it will be possible to design a treatment plan for this fictional character while at the same time identifying what the likely outcomes would be as a result of the same
Background of Patient and History of Illness
Annie Wilkes is a nurse whose obsession lies in the work of romance novelist Paul Sheldon, an obsession that later extends to his person as well as his work. She is a caretaker who has become obsessed with the attention that she receives from the deaths of infants and other patients who have been entrusted to her care, displaying many of the characteristics of an angel of death. In reviewing the DSM-V, there are several different diagnoses that may be applied to the character of Annie Wilkes. First is that of 297.1 – delusional disorder (American Psychological Association, 2003). Delusional disorder fits with the obsessive compulsions that she displays in her care of others and likewise her affectation for the fictional character, Misery Chastain, the main character in the latest Paul Sheldon works (Reiner, 1990). The secondary diagnoses that would likewise be applied to this character include 300.23 – social phobia, 300.3 – obsessive compulsive disorder, and 301.2 – schizoid personality disorder (American Psychological Association, 2003). The acknowledgement of her obsessive behaviors combined with the lack of evidence presented during her trial for the deaths of the infants that were under her care indicates to the audience that there is great cause for concern when Sheldon gets into her hands; she has already been shown to be wildly cunning and highly dangerous. The argument may be made that Annie Wilkes demonstrates behavior that classify her as an extremely dangerous individual through other, more subtle choices made in her life, such as the choice to live by herself on a farm isolated from the rest of society, a fact that allows her to hold Paul Sheldon hostage for an extended period of time.
Proposed Treatment Plan
Annie Wilkes suffers from major psychological issues, including delusions in addition to the displayed obsessive compulsive behaviors (Findley, 2008). Her need to control a situation, evidenced by the drugging of Paul Sheldon to keep him captive, and the shattering of his ankles with a sledgehammer as a means of displaying her violent tendencies, serve to indicate that Annie will need inpatient treatment in order to effectively address the mental disorders that she experiences. While sometimes outpatient treatment with a licensed, experienced therapist is enough to effectively treat issues, including some of those that Annie Wilkes suffers from, the behaviors displayed within the movie are evidence that institutionalization and a strong medication regimen will be necessary, in conjunction with cognitive behavioral therapy, in order to take the first steps to reverse many of the destructive behavior patterns that she experiences (American Psychological Association, 2003).
If there is marked improvement in Annie Wilkes behaviors and mental cognition following a period of two to three years, or longer, of inpatient therapy, it is possible that she could then be transitioned into an outpatient treatment program, which can include further medication, therapy, and even living in an assisted living facility to ensure that Annie is under observation at all times in case she is confronted with life events that she finds herself incapable of coping with on her own.
Anticipated Outcome
With the above detailed treatment plan in place, it may be safe to hypothesize that, with the cooperation of Annie Wilkes herself, there should not be any reason as to why the treatment for the previously identified mental illnesses could not be successful, allowing Wilkes the tools necessary to be in control of her life once more. The cooperation of the patient, however, is vital to the overall success of the treatment plan (American Psychological Association, 2003). If Annie Wilkes is unwilling to remain compliant with the treatment plan, or if she shows signs of being uncooperative, there is very little hope in the overall success of the treatment plan or her subsequent recovery as a result of the same. Annie Wilkes shows little desire to be compliant, as evidenced in her unwillingness to let go of her fantasies and live in the real world, making such an outcome a bleak one (Reiner, 1990). Still, with the right therapist present, it is possible that Annie may be convinced of the need to seek long-term care for her problems, thus providing her with the tools necessary to get better.
Conclusion
Following the conclusion of the film, it is apparent that the character of Annie Wilkes has some deep-seated issues that will require a great deal of long-term care. At the same time, because of the believability of King’s characters, the skill in which Goldman allowed for those characters to be translated to the silver screen, and the superlative acting skills of Kathy Bates, it is easy to see how a fan obsession could turn down such a dark path in a person with mental illness. The presentation of Bates’ character through the lens of fandom serves to indicate not only a manner in which mental illness may manifest, but also serves to indicate a potential means through which it would be possible for the individual suffering from mental illness to use the literary world as a means of expression. In gaining greater insight to the manifestation of mental illness in Misery, I have been able to identify several books that I could see benefitting individuals with mental illness, using those as a tool not only for expression, but also as a coping mechanism and a means through which it would be possible for them to identify with the physical world once more. I thought Bates’ portrayal of Annie Wilkes was not only graphic, but an accurate representation of the extremes of mental illness, and I will be able to use the information garnered as a result of the same in my continued work with those who experience mental illness.
- American Psychiatric Association. (2003). Diagnostic and Statistical Manual of Mental Disorders: DSM-5. ManMag.
- Findley, M. (2008). The Prisoner, the Pen, and the Number One Fan. In The Films of Stephen King (pp. 91-100). Palgrave Macmillan US.
- Reiner, R. (Director). (1990). Misery [Motion picture on DVD]. United States: Columbia Pictures. | https://mypaperwriter.com/samples/movie-review-misery/ |
U.S. Geological Survey issued new reports stating that cyclical drought areas in California could be relieved by purifying the vast amounts of underground brackish (salty) water.
In its first nationwide assessment in 50 years, the U.S. Geological Survey (USGS) found that the amount of underground brackish groundwater deposits equal more than 800 times the amount of freshwater currently consumed in the United States each year. The assessment found that “brackish groundwater is present at some depth within 3,000 feet below ground beneath parts of every state except New Hampshire and Rhode Island.”
USGS highlighted that 60 huge underground aquifers across the continental United States that contain 35 times the volume of fresh groundwater consumed by the nation could easily be tapped and purified to relieve in cyclically drought periods in states like California.
Unknown to most Americans, U.S. oil drillers produce about 108 million barrels of “production water” in the process of extracting 9 million barrels of oil each day. But the brackish water containing 1,000 to 10,000 milligrams per liter of dissolved minerals ranging from salts to heavy metals and radioactive substances. As the lighter specific gravity oil separates and rises, the production waters are usually just reinjected back into the ground disposal wells.
Since brackish water is far lower in salinity than the 35,000 milligrams per liter of salts in seawater, public drinking-water suppliers and their regulators have been encouraging the use of brackish groundwater to supplement or replace freshwater use. USGS found that use of brackish water has tripled since 2005. Major uses include electric power plant cooling water, aquaculture and oil and gas fracking and enhanced recovery.
Another example is farm animals need around 1 to 1.5 gallons of water per hundred pounds of body weight each day, but farmers and ranchers do not always get enough runoff water to adequately fill the stock ponds. During these conditions depending on the area of the country, dairy and beef cattle, sheep, pigs, and horses can safely drink brackish water with 1,000 to 6,999 milligrams per liter of dissolved salts, according to Beef Magazine.
The USGS found that there were 649 active desalination plants in the United States that can purify and semi-purify up to 402 million gallons of brackish water a year through reverse osmosis processes in 2010. About 67 percent of desalinization was for municipal purposes, 18 percent for industry and 9 percent for power. Of those designed for municipal uses, 49 percent were in Florida, 16 percent in California, 12 percent in Texas.
Because of the extremely high salinity of the ocean, coastal desalinization plants, such as in Santa Barbara, can have a water cost of $2,400 per acre-foot. That compares to around $400 per acre-foot for fresh groundwater. The USGS suggests that advances in desalination technology and increases in demand water non-high-quality water, communities could desalinize brackish groundwater for a fraction of the cost of seawater.
The United States Geological Survey (USGS) is the scientific agency that studies the landscape of the United States, its natural resources, and the natural hazards that threaten it. The organization produces fact-finding research concerning biology, geography, geology, and hydrology. | https://www.breitbart.com/local/2017/04/17/usgs-california-deep-salty-water-aquifers-reduce-drought/ |
Despite new observation methods provided by radar (see incoherent scatter) and satellite instrumentation, optical measurements are still important when studying auroras.
TV- and all-sky-cameras (ASC)
To be written. For the time being, see the information of the All Sky Camera chain of the Finnish Meteorological Institute.
Photometers
Photometers measure the absolute luminous intensity of a light source. Because of the monochromatic nature of the auroral light, photomultiplier tubes with very narrow band filters were used in the measurements. The typical wavelengths that have been measured are:
...
From these emissions one can make estimates of the characteristic energy and energy flux of the auroral particle precipitation, especially when the measurements are made along the field line the particles (in most cases electrons) are coming down. The photometers are, however, often made to operate in two possible modes, i.e., field aligned or scanning. In the scanning mode a moving mirror is used to scan a larger part of the sky, to get a broader view of the auroral distribution. With typical quiet, slowly drifting east-west aligned auroral arcs this gives good results when the scanning is done along the magnetic meridian. For example Doe et al. (1997) have discussed a tomographic method to utilize this kind of optical data.
... | https://wiki.oulu.fi/pages/diffpages.action?originalId=5735217&pageId=31327043 |
Newborns are delicate creatures. Their mums even more so.
Visiting the pair, no matter how closely related or emotionally tight you are with the new mum, requires sensitivity, planning, and adherence to a specific set of rules.
This is not the time to show up unannounced, apologise for your coughing toddler, and request a cup of coffee. If you want to maintain your friendship or family bond — and ever be invited back again — follow these guidelines.
And if you're a new mum worried about your loved ones' historic lack of boundaries, send them this list today!
1. Schedule your visit in advance, and don't push if Mum's not ready for visitors.
Every new mum is different, but most need some one-on-one time with their new addition before they are ready to introduce him or her to the masses. Respect that timeline, whatever it may be, and simply ask if they're ready for visitors. If not, check back a few days or a week later. When the answer's yes, suggest a few times that will work for you and let Mum decide what will work best for her.
2. Work around Mum's schedule and be on time.
New motherhood is an exhausting, sleep-deprived, overwhelming time. If you've been given the green light on a specific time to visit, it's important to remember that time was probably chosen carefully to fit in both Mum and baby's schedule, so be punctual. Not early, not late.
3. Don't stay too long.
Smart mums tell visitors in advance that they are only up for a short visit, but even if you're not given a specific window, you should plan on keeping your visit short and sweet. An hour is probably about right, unless Mum begs you to stay longer.
4. Bring food.
As a new mum, it feels almost impossible to shop, cook, or even feed yourself, so bringing along a meal — home cooked is fine, but a bag of sandwiches from her favourite takeout spot is equally acceptable — is a must. Just make it easy on her by not sending pans or Tupperware that need to be returned.
5. Wash your hands and ask before you pick up the baby.
No matter how irresistible that baby is or how recently you washed your hands before your arrival, just lather up when you get to her house. Also, remember that the baby literally lived inside Mum's body just days before and she's probably still feeling a bit possessive. Be respectful and ask if you can hold the baby. If after a few minutes Mum is looking uncomfortable and itchy to get her back, pass her back immediately.
6. Offer to let Mum take a shower or nap.
If you're close enough to Mum that she'd feel comfortable leaving you unsupervised with the baby, offer to take over for a while. A quick shower or nap can create a world of difference for a new mum. If she declines, however, don't push it.
7. Just say "no" if Mum asks if you want anything to drink or eat.
You are there to help and check in, not to be served. If you're really dying of thirst, get up and get that water yourself.
8. Don't bring your kids, unless they're healthy and you asked in advance.
You'll probably enjoy your visit a lot more if you don't bring your kids and can focus on Mum and baby, but if that's not a possibility, make sure you ask in advance. And if your kid wakes up with a fever or a wicked cough on the morning of your visit, reschedule. Also, remember that while you might be totally comfortable with your 6-year-old holding a newborn, that newborn's mum probably is not. Make sure your kids know and respect boundaries as well.
9. Don't offer unsolicited advice.
If Mum asks questions about breastfeeding, sleep schedules, or postpartum healing, of course, answer with your own experiences and advice, but if not, zip it. This time is about her, not you, so no matter how much her swaddle sucks, keep it to yourself.
This story originally appeared on POPSUGAR Australia, read it here. | http://www.essentialbaby.com.au/baby/baby-health/9-nonnegotiable-rules-of-visiting-a-newborn-20181030-h17amj |
This book series, demonstrates a form of educational inquiry that connects the personal with the political, the theoretical with the practical, and research with social and educational change. The principle aspect of this form of inquiry that distinguishes it from others is that the researcher is not separate from the socio-political and cultural phenomena of the inquiry, the data collected, findings, interpretations, or writing. The purpose of the proposed book series is to draw together work which demonstrates three distinct qualities: personal~ passionate~ participatory with explicit research agendas that focus on equity, equality, and social justice, specific research methodologies that illustrate the participatory process of the inquiries, and positive social and educational change engendered by the inquiries. | https://www.infoagepub.com/series/Research-for-Social-Justice |
- Short Description:
- Color: Brown, Red.
- Ideal For: Men, Women.
- This Rudraksh Mala is of good quality big sized beads which gives it an exquisite and holy look. It is a collection of 5 Mukhi Rudraksha beads.
- 5 Mukhi Rudraksha kantha is blessed by Lord Shiva himself in the form of Kalagni Rudra.
- Creation, preservation, destruction, detachment and obligation are the five deeds we see in everyday life and 5 Mukhi Rudraksha symbolizes these deeds. | https://shrikashiprasadam.com/product/detail/rudraksha-kantha-54-dana-special/bG1UdmNya0dZYU5NS2RqSjRTRVhNQT09 |
Trailer brakes don't always work as they're designed to. When they don't, overall braking forces are reduced and vehicle-stopping distances increased. The Canadian Maintenance Council noted that the loss of braking force on two of five axles (loss of trailer brakes on a five-axle rig) causes “60 mph to 0 mph” stopping distances to increase from about 280 ft. to just over 500 ft. (Discussion Paper, June 2003.)
Such trailer-brake failures cause near-miss incidents, crashes, injuries and deaths. Like me, you may have thought such incidents were rare. After all, advanced dual braking systems have been standard equipment since 1992. But discussions with Zurich's Canadian Fleet Specialist team have alerted us to the “all-too-frequent” occurrence of inadequate or non-existent trailer brake function.
Working with a forensic accident analyst, Zurich determined that one recent fatal truck crash was caused by an air leak that resulted when a trailer air reservoir drain was lost. Although the tractor's air compressor was able to maintain enough pressure to keep the trailer's emergency/spring parking brakes from actuating, the leak prevented the air reservoir from supplying air to a pilot valve, resulting in no air to the service-brake system. This led to a total loss of trailer brakes.
These incidents are often blamed on driver inattention or go undetected altogether. The Maintenance Council notes that a post-crash investigation generally doesn't include a thorough analysis of system functionality unless there's compelling evidence of system failure. The expertise and equipment, such as performance-based brake testing (PBBT) devices, are often unavailable for such in-depth analysis.
Why do trailer brakes fail? There's no simple answer, but contributing conditions include the following:
-
Air reservoir failure;
-
Faulty spring brake control valves;
-
Replacing spring brake control valves improperly;
-
Restricted/pinched trailer service line (e.g., improper routing or pinching at trailer crossmembers);
-
Pressure protection valves sticking due to corrosion.
We routinely check for applied air leaks during periodic or Level I CVSA roadside inspections. We also examine pushrod travel as a way to gauge braking ability. In the situation described earlier, however, these documented failures went undetected — in spite of the fact that the vehicle had been subjected to daily routine inspection practices.
How do we fix this problem? The first step is to bring it to the attention of fleets, and make sure their drivers and technicians know what to do. Industry groups in Canada, for example, are advocating for the development of training standards and maintenance procedures that would require an increased understanding of brake system functionality and the operational differences in critical brake valves and their subcomponents.
Another important step is to move away from pushrod measurement as a surrogate for brake capability. We need to quickly deploy PBBT devices — dynamometers that can accurately measure the braking force applied to each wheel position — for routine brake system inspections. These devices compare actual versus expected braking force, as well as brake balance across all wheel positions. They are uniquely capable of targeting deficiencies in brake drums and linings, relay and control valves, and air supply lines.
Earlier this year, the Federal Motor Carrier Safety Administration (FMCSA) published out-of-service standards for the use of PBBT devices in roadside inspections. Not surprisingly, few states have deployed these devices in the field. In addition, the published standards are somewhat vague, since they specify only minimum combined vehicle braking performance criteria, rather than a more desirable wheel position performance criteria.
For a copy of the June '03 Maintenance Council Discussion Paper, “Improving Trailer Brake Safety,” call Dale Holman at Truck Watch Services, 905-877-2706.
Jim York is the manager of Zurich North America's Risk Engineering Team, based in Schaumburg, IL. | https://www.fleetowner.com/mag/fleet_trailer_brake_failures |
The Arctic Monitoring and Assessment Programme is one of six Working Groups of the Arctic Council.
To monitor and assess the status of the Arctic region with respect to pollution and climate change issues.
To document levels and trends, pathways and processes, and effects on ecosystems and humans, and propose actions to reduce associated threats for consideration by governments.
To produce sound science-based, policy-relevant assessments and public outreach products to inform policy and decision-making processes.
AMAP's work is directed by the Ministers of the Arctic Council and their Senior Arctic Officials, who have requested AMAP to also support international processes that work to reduce the global threats from contaminants and climate change. These include the UN Framework Convention on Climate Change, UNEP's Stockholm Convention on Persistent Organic Pollutants and Minimata Convention on mercury, and the United Nation's Economic Commission for Europe (UN ECE) Convention on Long-range Transboundary Air Pollution.
Since its establishment in 1991, AMAP has produced a series of high quality reports and related communication products that detail the status of the Arctic with respect to climate and pollution issues and that include policy-relevant science-based advice to the Arctic Council and governments. | https://www.amap.no/about |
The SSVP Youth (18 – 36 years) in Lebanon work inside the Conferences and are grouped in a National Committee that aims to animate the Vincentian Youth activities.
Objectives:
*Keep the youth informed about the various activities of the Saint Vincent de Paul Society
*Encourage them to meet – from different Conferences- and carry out joint projects
*Foster the creation of new youth groups in Conferences
*Develop civic awareness and interest of young people to social commitment
*Highlight the social teaching of the church and identify the Vincentian charism
*Promote youth volunteering in the service of the poor and encourage them to visit the poor at home.
Projects:
*Organize spiritual gatherings (day, weekend, ...)
*Conduct mission-camps in target villages
*Hold theme round tables, workshops for deeper studies
*Set up mutual visits to Conferences and foster youth meetings
*Organize events at Christmas and Easter to serve the poor
*Encourage Conferences to work for young people recruitment
*Be part of events organized by the National Council (national day, annual dinner ...)
The Vision of the Society of Saint Vincent de Paul for the Youth:
You who have joy in your heart and who are always ready to serve,
You who still dream and want to change the world and eradicate poverty,
You who seek a chance to experience love and kindness,
You who are willing to dedicate time for success and for a better life,
You who want to stay faithful to your convictions and be responsible,
You who are not afraid of commitment and want to extend your love to others by actions,
The Society of Saint Vincent de Paul is calling you; your presence in its Conferences will decide its future.
Visiting the poor is the core of SSVP action. It is based on the regular long-term commitment of the vincentian and the generosity of benefactors; the new guidelines of the Society in the fight against poverty require much more commitment from you. We need more dedicated young to guide, advise and coordinate the works and projects of the Society of Saint Vincent de Paul.
We rely on you, students, professionals convinced by our Mission.
The SSVP offers the possibility to communicate and exchange in an international network of Charity. This network will allow you to expand your circle of friends, strengthen your convictions, and to share your vision and your experience. Through this structure, you will find a place to live your social commitment to achieve the mission, in hopes of taking over in continuing the Mission and activities of the Society of Saint Vincent de Paul.
Thus, young and old, we will all “Love, Share, Serve”, to change the mourning into joy, to comfort sorrow and give peace and joy. | https://www.stvincent-lb.org/vincent/?page_id=1733 |
Why stay here?
- In the ski resort of Imst-Gurgltal
- Weekends / Short Breaks
- Ski School
- Tennis court
- Sauna
- Family Rooms
- Horse Riding
8.2 Very Good
Average score from 546 Reviews
100% verified reviews on
This friendly, family-run hotel is located in the heart of Imst in Tyrol's Upper Inn Valley, close to the A12 motorway. It offers fine Tyrolean cuisine and a spa area, which is accessible for free.
Important Information
Please inform Hotel Stern in advance of your expected arrival time. You can use the Special Requests box when booking, or contact the property directly with the contact details provided in your confirmation. In response to Coronavirus (COVID-19), additional safety and sanitation measures are in effect at this property. It is not possible to stay at this property for Coronavirus (COVID-19) quarantine purposes. Due to Coronavirus (COVID-19), this property has reduced reception and service operating hours. Late check-in is only possible for an additional charge upon prior confirmation by the property. Contact details are stated in the booking confirmation.
For more information, to check availability, or book a room at Hotel Stern, please click below...Check Info and Availability
Hotel Stern - Room Options
A selection of room types are usually available at Hotel Stern, including;
- Comfort Double Room
- Studio Suite with 1 Bedroom
- Double Room Single Use
- Single Room
- Studio Suite with 2 Bedrooms
Single Room (Sleeps 1, 1 Bedroom)
No extra beds or baby cots available.
Check Availability Room Price : from $70 to $252
Studio Suite with 1 Bedroom (Sleeps 2, 1 Bathroom)
Please note that the room rate is based on 2 guests. Maximum occupancy is 3 guests (see extra beds rates).
Studio Suite with 2 Bedrooms (Sleeps 4, 1 Bathroom)
Suite with a balcony and a minibar.
Double Room Single Use (Sleeps 1, 1 Bedroom)
This double room features a minibar, satellite TV and dining area.
Comfort Double Room (Sleeps 2, 1 Bedroom)
This double room has a cable TV, seating area and dining area.
Hotel Stern Useful Info
- 34 Rooms
Arrival and Departure
- Check In from 15:00 until 21:00
- Check Out from 07:00 to 11:00
Languages
The native language of Hotel Stern is English.
Local staff also speak French and German.
Nearby Ski Resorts
Hotel Stern is in the Austrian ski resort of Imst-Gurgltal and has St. Anton am Arlberg, Sölden, Seefeld and Serfaus-Fiss-Ladis and other ski areas within reach for a days skiing.
Hotel Facilities
Snow Sports
- Ski School
- Ski storage
- Skiing
COVID-19 Precautions
- Cashless payments
- Cleaning chemicals effective against Coronavirus
- Safety Protocols followed
- Social distancing (dining)
Cleaning
- Daily housekeeping
Sanitization
- All tableware sanitized
- Hand sanitizer provided
Sports & Outdoors
- Cycling
- Fishing
- Hiking
- Horse Riding
- Mini Golf
- Squash
- Table Tennis
- Tennis court
Health, Fitness & Wellness
- Fitness/spa locker rooms
- Hammam
- Sauna
- Solarium
Hair, Spa & Beauty
- Spa Facilities
- Spa and wellness centre
- Spa lounge/relaxation area
- Steam room
Leisure & Activities
- Billiards
- Bowling
- Darts
- Sun Terrace
Travel & Transport
- Free Parking
- Public transport tickets
- Shuttle service (additional charge)
- Tour Desk
Business & Internet
- Fax/photocopying
- Free Wifi
- Meeting/banquet facilities
Food & Drink
- Bar
- Packed lunches
- Restaurant
- Special diet menus (on request)
- Vending machine (drinks)
- Wine/champagne
Services
- ATM/cash machine on site
- Express check-in/check-out
- Key access
- Lift
- Lockers
- Luggage storage
- Safety deposit box
- Terrace
Room Facilities
- Family Rooms
- Heating
- Non-smoking rooms
Entertainment
- Bike tours
- Tour or class about local culture
- Walking tours
Outside
- Garden
Hotel
- Non-smoking throughout
- Shared lounge/TV area
- Sun loungers or beach chairs
- Fruits
- Fire extinguishers
- Smoke alarms
- Outdoor furniture
Rating and Reviews
Hotel Stern has been assigned a 4 Star rating by our partner; this is an unofficial rating for ease of comparison, and you should be sure the property suits your needs before booking.
Nearest Ski Hire Shops
Hire Skis in Imst-Gurgltal
Hotel Arzlerhof Skiverleih
2mi*
Hire Skis in HochZeiger
Hotel Arzlerhof Skiverleih
2mi*
You can locate these shops on our Map of Imst-Gurgltal.
*Distances are approximate, straight-line.
Map of Hotels in Imst-Gurgltal
Tap symbols for info. Tap for Full-Screen. +/- Zoom in to find Hotels and Hire Shops. | https://us.j2ski.com/ski_hotels/Austria/Imst_Gurgltal/Hotel_Stern.html |
things afresh has brought a new and exciting chapter for me.
2011 was a key time for me when I joined up with Garreth on a one day workshop to understand my digital camera. That day was a revelation for me and drove my interest in learning more and more about photography in a structured, supported and non competitive environment which is how I like to work. Several workshops and trips later I decided to go full time and, for the last 3 years have devoted my time to photography, learning, sharing and helping others get more from this great pastime. Neither of us knew just where that first day was going to lead and I am thrilled and excited to be joining up with Garreth and Go Explore Photography on a professional level.
As well as leading landscape workshops I will be developing wildlife and avian photography experiences to add to the portfolio. My aim will be to leave every participant a better photographer with happy memories, having had a great day.
Lindsey Bucknor OBE
If your aim is to improve your photography quickly, or have a unique experience with a professional photographer it doesn't get much better than this.
Examples of the photography workshops we provide.
Landscape Photography
Wildlife photography
Beginners courses
Black & white photography
Street Photography
Our years of experience offers the best possible tuition on both the technical and creative aspects of photography,
and our in-depth research provides you with great locations & subjects, So if your photographic preference is Landscapes, Architecture, Holiday & Travel, or even Street photography, We have something for you. | https://www.goexplorephotography.com/section853769.html |
Understanding project-based learning in Second Life with a pedagogy, training, and assessment trio.
Subjects:
Integrating alternative learning and assessment in a course of English for law students.
Subjects:
An exploratory study on the perspectives of prospective computer teachers following project-based learning.
Subjects:
Project-based learning in an internship program: A qualitative study of related roles and their motivational attributes.
Subjects:
Creating a Ripple Effect: Incorporating Multimedia-Assisted Project-Based Learning in Teacher Education.
Subjects:
The contribution of Project-based-learning to high-achievers’ acquisition of technological knowledge and skills.
Subjects:
When high achievers and low achievers work in the same group: The roles of group heterogeneity and processes in project-based learning.
Subjects:
Project-Based Learning.
Subjects: | https://www.nheducatorresources.com/eds?query=Project-based%20Learning%20and%20Assessment&catalog=eds&ff%5B%5D=PublicationYear:2008 |
Are you a Product Designer who loves to bring data to life in engaging ways?
Do you want to work for an award-winning SaaS business that is going from strength to strength?
Look no further than Feefo!
Feefo makes it easy for companies of all sizes to gather comprehensive, authentic insight at each step of the customer journey across all touchpoints to power acquisition, retention, and strategic planning. We provide consumers with product and service reviews they can trust.
As a Product Designer, you will ensure our products and features are valuable for people, easy to use, and of the highest level of craft and execution. You will utilise your entire range of product design, interaction design, and visual design skills.
For this role we are particularly interested in talking to candidates who have data visualization experience and skills and have mapped out customer journeys for reporting and data platforms. | https://site.feefo.com/en/business/about/careers/job/product-designer-data-visualization |
BACKGROUND OF THE INVENTION
SUMMARY OF THE INVENTION
DESCRIPTION OF THE INVENTION
BRIEF DESCRIPTION OF THE DRAWINGS
DETAILED DESCRIPTION OF SPECIFIC EMBODIMENTS
(a) Structure of Specific Embodiments
(b) Operation of Specific Embodiments
1. Field of the Invention
The present invention relates to a method and apparatus for accumulating energy from an oscillating column of water.
2. Description of Related Art
Electrical generators that harness the power of an oscillating water column have been known for at least a number of decades. In general, these generators include a large chamber built at the shoreline of a body of water, the chamber both rising above and submerging below the water level at the shoreline. Such chambers are typically built along steep shorelines, or even into the faces of cliffs, where the difference in height between wave crests and wave troughs is pronounced.
The chamber includes a first opening submerged below water level and a second opening that vents to the atmosphere via a turbine, such that the chamber contains a column of water having a height approximately equal to the water level outside the chamber. As the crests and troughs of waves arrive at the chamber, the level of the water column within the chamber periodically rises and falls, thereby alternately forcing air within the chamber to vent through the turbine into the atmosphere and drawing air from the atmosphere back through the turbine to the chamber.
Although ingenious, these generators suffer from a number of disadvantages. First, the corrosive mixture of salt water and air typically found inside the chamber can cause parts, for example the turbine, to wear prematurely. Second, a turbine, which is a relatively expensive component, is required to harness the energy of each such water column; in other words, if a series of such chambers were constructed side-by-side, each would require its own turbine because of the difficulty of synchronizing the chambers' air-flows so as not to interfere with each other. Third, the bi-directional airflow pumped by the oscillating water column conventionally demands a self-rectifying turbine, typically a Wells turbine, which is generally less efficient than a non-rectifying turbine, particularly under large and small wave conditions.
Accordingly, what is needed therefore is a method and apparatus for accumulating energy from one or more oscillating water columns that is less subject to the above disadvantages.
The present invention is directed to this need.
In very general terms, the present invention accumulates energy from an oscillating water column instead of expending the energy directly. The accumulated energy may subsequently be used to power a machine, for example a turbine-generator-set.
In essence, the water column oscillations are transduced, either to compress a fluid accumulated in a system or to pressurize the system accumulating the fluid should the fluid be incompressible. When the fluid is expelled through decompression or depressurization as the case may be, its kinetic energy can be harnessed to power a machine, for example the turbine-generator-set. Desirably, the fluid may be expelled in a unidirectional flow to power a more efficient turbine than a self-rectifying turbine, such as a Wells turbine.
A number of these transducers may be connected together, for example in series to sum fluid pressure or in parallel to sum fluid volume, to power a single turbine-generator-set.
A machine powered by the accumulated fluid may be located remotely from the transducers and in particular the corrosive environment of a body of saltwater. With the transducers and the machine connected together as a closed system and the accumulated fluid being a fluid other than saltwater or another corrosive, the machine is further protected against wear.
More specifically then, according to one aspect of the present invention, there is provided a method of accumulating energy from an oscillating water column, comprising transducing the water column oscillations to compress a fluid and accumulating the compressed fluid. In this regard, transducing might include transducing when the water column is rising and transducing when the water column is falling.
Transducing and accumulating might include compressing a fluid to a first pressure, accumulating the fluid compressed to the first pressure, compressing the accumulated fluid to a second pressure, and accumulating the fluid compressed to the second pressure. In this regard, transducing and accumulating might include successively compressing and accumulating fluid at higher pressures.
The method might further include turning a turbine with the compressed fluid. The turbine and the fluid might be environmentally isolated from the water column.
According to another aspect of the present invention, there is provided an apparatus for accumulating energy from an oscillating water column, comprising means for transducing the water column oscillations to compress a fluid and means for accumulating the compressed fluid. In this regard, the transducing means might include means for transducing when the water column is rising and means for transducing when the water column is falling.
The transducing means and accumulating means might include first means for compressing a fluid to a first pressure, first means for accumulating the fluid compressed to the first pressure, second means for compressing the fluid from the first pressure to a second pressure, and second means for accumulating the fluid compressed to the second pressure. In this regard, transducing means and the accumulating means might include means for successively compressing and means for successively accumulating fluid at higher pressures.
The apparatus might further include a turbine and means for tuming the turbine with the compressed fluid. The apparatus might further include means for environmentally isolating from the water column at least one of the turbine, the fluid, the accumulating means, and the compressing means.
According to another aspect of the present invention, there is provided an apparatus for accumulating energy from an oscillating water column, comprising a first water-cylinder having a first water piston that slides between a first position and a second position in response to oscillation of the water column; a first fluid-cylinder having a first fluid piston that slides between a first position and a second position in response to the first water piston, the first fluid piston being operable to compress a fluid within the first fluid-cylinder; and a first reservoir connected to the first fluid-cylinder for accumulating compressed fluid. At least one of the water-cylinder and the fluid-cylinder might be double-acting.
The apparatus might further include a second fluid-cylinder having a second is fluid piston that slides between a first position and a second position and is operable to compress a fluid within the second fluid-cylinder; and a second reservoir connected to the second fluid-cylinder for accumulating compressed fluid, wherein the second fluid-cylinder is connected to receive fluid from the first reservoir and to supply the fluid at a higher pressure to the second reservoir.
The second fluid piston might slide between the first position and the second position in response to the first water piston. Alternatively, the apparatus might further include a second water-cylinder having a second water piston that slides between a first position and a second position in response to oscillation of the water column, wherein the second fluid piston slides between the first position and the second position in response to the second water piston.
The apparatus might further include a turbine coupled to the first reservoir to receive compressed fluid for turning the turbine. The water column might be environmentally isolated from at least one of the turbine, the fluid, the first fluid-cylinder, and the first reservoir.
According to another aspect of the present invention, there is provided an apparatus for accumulating energy from an oscillating water column, comprising a water transducer that generates a force in response to oscillation of the water column; a fluid transducer that compresses a fluid in response to the force; and a reservoir connected to the fluid transducer for accumulating compressed fluid.
The apparatus might further include a turbine coupled to the reservoir to receive compressed fluid for turning the turbine. The water column is environmentally isolated from at least one of: the turbine, the fluid, the fluid transducer, and the reservoir.
According to another aspect of the present invention, there is provided a method of using kinetic energy of an oscillating water column, including transducing the kinetic energy into potential energy and accumulating the potential energy. The method might further include converting the accumulated potential energy to power a machine, for example converting the accumulated potential energy into kinetic energy, such as a fluid flow, perhaps a substantially unidirectional fluid flow.
According to another aspect of the present invention, there is provided an apparatus for using kinetic energy of an oscillating water column, including means for transducing the kinetic energy into potential energy and means for accumulating the potential energy. The apparatus might further include means for converting the accumulated potential energy to power a machine, for example means for converting the accumulated potential energy into kinetic energy, such as a fluid flow, perhaps a substantially unidirectional fluid flow. In this regard, the machine might be a turbine, and in particular a non-self-rectifying turbine.
According to another aspect of the present invention, there is provided a method of using kinetic energy of an oscillating water column, including transducing the kinetic energy and powering a machine with the transduced energy. In this regard powering a machine might include powering a turbine, and in particular a non-self-rectifying turbine. Transducing could include creating a fluid flow, perhaps a substantially unidirectional fluid flow. The method might further include accumulating the fluid.
According to another aspect of the present invention, there is provided an apparatus for using kinetic energy of an oscillating water column, including means for transducing the kinetic energy and means for powering a machine with the transduced energy, for example a turbine, and in particular non-self-rectifying turbine. The transducing means could include means for creating a fluid flow, perhaps a substantially unidirectional fluid flow. The apparatus might further include means for accumulating the fluid.
Further aspects and advantages of the present invention will become apparent upon considering the following drawings, description, and claims.
The invention will be more fully illustrated by the following detailed description of non-limiting specific embodiments in conjunction with the accompanying drawing figures. In the figures, similar elements and/or features may have the same reference label. Further, various elements of the same type may be distinguished by following the reference label with a second label that distinguishes among the similar elements. If only the first reference label is identified in a particular passage of the detailed description, then that passage describes any one of the similar elements having the same first reference label irrespective of the second reference label.
FIG. 1
is a schematic view of one embodiment of an apparatus for accumulating energy from an oscillating water column according to one aspect of the present invention, the apparatus having a low-pressure-float, a high-pressure-float, a plurality of transducers connected together in series between the low-pressure-float and the high-pressure-float to compress fluid received from the low-pressure-float and to supply the compressed fluid to the high-pressure-float, and a turbine-generator-set connected between the high-pressure-float and the low-pressure-float such that compressed fluid expelled from the high-pressure-float into the low-pressure-float flows past the turbine, urging the turbine to develop kinetic energy to drive the generator to generate electricity.
FIG. 2
FIG. 1
is a perspective top view of one embodiment of the transducer of , the transducer having a water-cylinder for receiving energy from the oscillating water column and a fluid-cylinder concentric with the water-cylinder for compressing fluid, the concentric cylinders having sufficient spacing between them to allow air to exit to the atmosphere and re-enter from the atmosphere with minimal impediment.
FIG. 3
FIG. 1
is a hidden-line perspective top view of the transducer of .
FIG. 4
FIG. 2
is a perspective top view of the water-cylinder of , the fluid-cylinder being omitted for emphasis.
FIG. 5
FIG. 4
is a perspective bottom view of the water-cylinder of .
FIG. 6
FIG. 4
is a top view of the water-cylinder of .
FIG. 7
FIG. 4
is a bottom view of the water-cylinder of .
FIG. 8
FIG. 4
is a side view of the water-cylinder of .
FIG. 9
FIG. 8
9
9
is a longitudinal-sectional view of the water-cylinder of , viewed along the cutting plane -.
FIG. 10
FIG. 2
is a perspective top view of the fluid-cylinder of , the water-cylinder and water piston being omitted for emphasis.
FIG. 11
FIG. 10
is a perspective bottom view of the fluid-cylinder of .
FIG. 12
FIG. 10
is a hidden-line top view of the fluid-cylinder of .
FIG. 13
FIG. 10
is a hidden-line bottom view of the fluid-cylinder of .
FIG. 14
FIG. 10
is a hidden-line side view of the fluid-cylinder of .
FIG. 15
FIG. 14
15
15
is a longitudinal sectional view of the fluid-cylinder of , viewed along the cutting plane -.
FIG. 16
FIG. 2
is a perspective top view of the fluid-cylinder of and the coupled water piston, the water-cylinder being omitted for emphasis.
FIG. 17
FIG. 16
is a perspective bottom view of the fluid-cylinder and the coupled water piston of .
FIG. 18
FIG. 16
is a hidden-line top view of the fluid-cylinder and the coupled water piston of .
FIG. 19
FIG. 16
is a hidden-line bottom view of the fluid-cylinder and the coupled water piston of .
FIG. 20
FIG. 16
is a side view of the fluid-cylinder and the coupled water piston of .
FIG. 21
FIG. 20
21
21
is a longitudinal sectional view of the fluid-cylinder and the coupled water piston of , viewed along the cutting plane -.
FIG. 22
FIG. 2
is a hidden-line side view of the transducer of .
FIG. 23
FIG. 22
is a top view of the transducer of .
FIG. 24
FIG. 22
24
24
is a cross-sectional view of the transducer of , viewed along the cutting plane -, illustrating the fluid-cylinder concentric with the water-cylinder and connected to a low-pressure input-reservoir and a high-pressure output-reservoir through respective intake and exhaust valves, for example check valves.
FIG. 25
FIG. 22
25
25
is a longitudinal-sectional view of the transducer of , viewed along the cutting plane -, and illustrating the fluid piston coupled to receive kinetic energy from the water piston to compress fluid received from the input-reservoir for supply to the output-reservoir.
The structure of the invention will now be illustrated by explanation of specific, non-limiting, exemplary embodiments shown in the drawing figures and described in greater detail herein.
(i) The Generating System
FIG. 1
10
10
12
14
10
10
12
14
1
10
shows an apparatus for accumulating energy from an oscillating water column according to one embodiment of the present invention, generally illustrated at . The accumulator includes a low-pressure-float and a high-pressure-float that store a fluid at low and high pressures respectively and that are sufficiently buoyant to support the accumulator at a suitable elevation in a body of water. Those skilled in the art will recognize that this buoyancy might be provided by other means or the accumulator might be suitably elevated by a means other than buoyancy, in which case the floats , would function simply S to store the fluid. For example, the accumulator might be constructed directly into a shoreline at a suitable elevation or might be built upon pilings. Floats, however, provide the advantage of constant elevation relative to tides.
10
16
12
14
16
12
16
14
16
16
16
The accumulator further includes at least one, but generally a plurality of, transducers connected in series between the low-pressure-float and the high-pressure-float . The first such transducer is connected to receive fluid at low pressure from the low-pressure-float , to compress the fluid, and to supply the compressed fluid to either the next such transducer in series or the high-pressure-float , in the case of the last such transducer in the series. One desirable structure for the transducers will be detailed below; however, those skilled in the art will appreciate that various types of transducer might be used.
10
18
14
12
18
12
14
Finally, the accumulator might also include a machine powered by compressed fluid, in this embodiment a turbine-generator-set , in which the turbine is connected between the high-pressure-float and the low-pressure-float such that compressed fluid expelled from the high-pressure-float into the low-pressure-float flows so as to urge the turbine to develop kinetic energy to drive the generator to generate electricity. The turbine-generator-set might be supported by the floats , or might be located remotely and connected by piping.
18
12
14
As used herein, the terms “low-pressure” and “high-pressure” and the like are used simply relative to each other, and not in comparison to an external standard. Without limiting the foregoing, it has been found that for the purpose of powering a turbine-generator-set , a suitable pressure for fluid in the low-pressure-float is approximately atmospheric pressure, while a suitable pressure for fluid in the high-pressure-float can be in the many hundreds of pounds per square inch.
Again without limiting the generality of the foregoing, it has been found that gases such as dry air or nitrogen and liquids such as fresh water are suitable for use as the fluid.
Those skilled in the art will recognize that a gas may be compressed, while a liquid, being essentially incompressible, may instead pressurize a closed-system containing it. An example of the latter arrangement would be to pump a volume of liquid into a resilient reservoir, thus stretching the reservoir beyond its natural volume such that the reservoir will resiliently expel the liquid to return to its natural volume when an opportunity presents itself. For the sake of simplicity, the embodiments are described and the invention is claimed in terms of compressing a fluid; however, as used herein, such terms also connote the analogous arrangement of pressurizing a system or part of a system that contains the fluid.
(ii) The Transducer
FIGS. 2 and 3
16
16
20
22
24
22
20
20
22
show one embodiment of the transducer , partially immersed in a body of water W. The transducer includes a water-cylinder , a fluid-cylinder and one or more connectors connecting the fluid-cylinder to the water-cylinder . In this embodiment, the water-cylinder and the fluid-cylinder are desirably concentric to simplify coupling therebetween as will be further described below; however, concentricity is not necessary.
22
26
12
16
28
14
16
The fluid-cylinder includes a unidirectional input-port connectable to receive lower pressure fluid from the low-pressure-float or a previous transducer in the series, as the case may be, and a unidirectional output-port connectable to supply higher pressure fluid to the high-pressure-float or a subsequent transducer in the series, as the case may be.
(iii) The Water-Cylinder
FIGS. 4-9
20
20
20
show that the water-cylinder is open at the end that is submerged below the level of the water W, such that the water so contained within the water-cylinder is free to oscillate as a column as a result of wave activity in the body of water W proximate the water-cylinder .
20
30
20
30
20
30
20
The water-cylinder includes a water-piston adapted to slide longitudinally within the water-cylinder under the urging of the oscillating water column and gravity. This arrangement has certain advantages over simple buoyancy devices more conventionally used for harnessing energy from waves in an open body of water. Most notably, because open-water-floats desirably have high buoyancy for harnessing energy in light-wave conditions, such devices generally only harness energy from the rising of a wave, not the falling. In this regard, half the wave is wasted. The configuration described for the water-cylinder allows for a relatively heavier water-piston that can harness energy from rising waves forced through the water-cylinder and energy from the water-piston being drawing back downward by vacuum or gravity as the water retreats from the water-cylinder .
20
20
30
The water-cylinder may be open, closed or restricted at the end that is above the level of the water W; however, in general it is desirable that the space above the oscillating water column be relatively open to the atmosphere so that air may freely flow in and out of the water-cylinder instead of resisting the oscillations of the water-piston .
(iv) The Fluid-Cylinder
FIGS. 10-15
22
22
32
26
34
28
32
34
22
22
10
show the fluid-cylinder , desirably remote or otherwise environmentally isolated from the water W to resist corrosion. The fluid-cylinder is enveloped by an input-reservoir connected to receive low-pressure fluid from the input-port and an output-reservoir connected to supply higher-pressure fluid through the output-port . The reservoirs , respectively store a supply of low-pressure fluid for supply to the fluid-cylinder and a supply of high-pressure fluid from the fluid-cylinder , to conveniently provide a smooth and continuous flow of fluid in the wider accumulator system.
22
36
22
38
40
22
38
40
22
38
32
22
40
22
34
22
The fluid-cylinder further includes a fluid-piston adapted to slide longitudinally within the fluid-cylinder , between a downstroke-intake-valve -D and an upstroke-exhaust-valve -U toward the top end of the fluid-cylinder and an upstroke-intake-valve -U and a downstroke-exhaust-valve -D toward the bottom end of the fluid-cylinder . In this embodiment, the intake-valves are one-way valves connecting the input-reservoir to the fluid-cylinder and the exhaust-valves are one-way valves connecting the fluid-cylinder to the output-reservoir . So configured, the fluid-cylinder is double-acting.
22
32
34
32
34
22
32
34
22
22
32
34
22
26
28
38
40
Those skilled in the art will recognize that there are many suitable configurations for the fluid-cylinder , both in its own right and in combination with the reservoirs , . For example, either of the reservoirs , might fully circumscribe the fluid-cylinder on it own, in which case the other of the reservoirs , might abut one or both ends of the fluid-cylinder or might itself be circumscribed or otherwise reside within the fluid-cylinder . Either of the reservoirs , might even be located remotely from the fluid-cylinder or might even be omitted. Such different configurations would necessitate different configurations for the ports , and valves , , as are well known in the art.
22
36
22
22
42
36
36
22
Thus, the fluid-cylinder might be single-acting or double-acting and might have a single fluid-piston compressing fluid against either end of the fluid-cylinder or might have a pair of opposing fluid-pistons (not illustrated) alternately compressing fluid against a reservoir (not illustrated) residing in between them within the fluid-cylinder . The connecting-rod might extend from the fluid-piston at only one end, or else it might extend from both ends of the fluid-piston and even pass through both ends of the fluid-cylinder , for example to improve balance.
(iv) The Coupling
FIGS. 16-25
20
22
24
30
36
42
30
36
show the coupling between the water-cylinder and the fluid-cylinder , which are retained relative to each other by the connectors . The water-piston and the fluid-piston are coupled through a linkage, in this embodiment a simple connecting-rod , such that the water-piston may urge the fluid-piston to move in response to the oscillating water column.
With reference now to the Figures, the operation of this specific embodiment of the invention will now be described.
16
20
30
30
As a body of water W crests and troughs in the vicinity of a transducer , it encourages a water-column to oscillate up and down within the confines of the water-cylinder . As it rises, the water-column urges the water-piston upward with it. As it falls, the weight of the water-column urges the water-piston downward with a maximum force that if exceeded would create a vacuum.
42
30
36
36
32
38
22
22
40
34
32
38
22
22
40
34
Acting through the connecting-rod , the oscillating water-piston urges the fluid-piston to oscillate in tandem. On its downward stroke, the fluid-piston draws low-pressure fluid from the input-reservoir through the downstroke-intake-valve -D into the upper portion of the fluid-cylinder and compresses fluid from the lower portion of the fluid-cylinder through the downstroke-exhaust-valve -D into the output-reservoir . Similarly, on its upward stroke, the fluid-piston draws low-pressure fluid from the input-reservoir through the upstroke-intake-valve -U into the lower portion of the fluid-cylinder and compresses fluid from the upper portion of the fluid-cylinder through the upstroke-exhaust-valve -U into the output-reservoir .
32
26
34
28
16
28
16
26
16
16
16
12
14
12
14
The input-reservoir receives fluid through the input-port and the output-reservoir exhausts fluid through the output-port . With a plurality of transducers connected together in series, the output-port of a former transducer is connected to the input-port of a subsequent transducer , each succeeding transducer further compressing the fluid. In this way, a series of transducers connected between the low-pressure-float and the high-pressure-float extract low-pressure fluid from the low-pressure-float and supply high-pressure fluid to the high-pressure-float .
18
14
12
The turbine-generator-set connected to receive high-pressure fluid from the high-pressure-float and to supply low-pressure fluid to the low-pressure-float extracts energy from the expanding fluid as it interacts with the blades of the turbine, urging the turbine to drive the generator to generate electricity.
(c) Further Variations
12
14
32
34
Thus, it will be seen from the foregoing embodiments and examples that there has been described a way to accumulate energy from an oscillating column of water. In this regard, both the floats , and the reservoirs , accumulate compressed fluid as a source of potential energy.
While specific embodiments of the invention have been described and illustrated, such embodiments should be considered illustrative of the invention only and not as limiting the invention as construed in accordance with the accompanying claims. In particular, all quantities described have been determined empirically and those skilled in the art might well expect a wide range of values surrounding those described to provide similarly beneficial results.
It will be understood by those skilled in the art that various changes, modifications and substitutions can be made to the foregoing embodiments without departing from the principle and scope of the invention expressed in the claims made herein.
10
16
16
22
20
42
For example, one might choose to build an accumulator having only one transducer or a group of transducers in parallel, as may be desirable when pressurizing a liquid. As another example, one might drive more than one fluid-cylinder with the same water-cylinder , all sharing the same connecting-rod for example, perhaps to achieve desired fluid properties through series and/or parallel combination of standard cylinders rather than building one or more custom cylinders.
14
18
12
Furthermore, although the advantages of a completely closed system have been described, some applications might be suitably implemented with a system that isn't completely closed, for example a system where the fluid expelled from the high-pressure-float to drive the turbine-generator-set doesn't flow back to the low-pressure-float , which either is omitted or else sources fresh fluid from the environment.
14
900
Although the invention has been described as having particular application for generating electricity, those skilled in the art will recognize it has wider application, for example for driving machines, such as hydraulic or compressed-gas machines, for simply compressing or pumping fluid, or for reverse osmosis filtration, which would suggest a suitable pressure for fluid in the high-pressure-float of approximately pounds per square inch.
30
42
42
Broadly, the water-piston and connecting-rod could be used to power a wide range of machines. For purposes of energy transduction, the connecting-rod might for example move a magnet back and forth through a metal coil to generate electricity or might wind a spring or lift a weight to accumulate potential energy. | |
A bachelor's degree in clinical laboratory science from KU provides a wealth of opportunities and unique flexibility in your career decisions.
The degree in CLS at the University of Kansas is a 2+2 program: students take two years of specified preparatory courses (biological science, chemistry, math and general education) followed by entry into the professional component of the program at the KU Medical Center in Kansas City, Kan.
The degree includes of two concentration options. Until the second semester of the senior year, students in either concentration take the same course work. Also during the senior year, students will rotate through 14-22 weeks of practicum experience at several of the school’s many collaborating affiliates.
Students are required to complete a minimum of 57 prerequisite credit hours. The clinical concentration and molecular biotechnology concentration study plans detail the requirements during the freshman and sophomore years and may be helpful in planning course work. Courses with similar content may be acceptable alternatives.
Successful completion of the clinical concentration, and the awarding of the baccalaureate degree, allows the student to sit for the national certification examination (American Society for Clinical Pathology) and upon passing the exam, be credentialed as an MLS(ASCP)cm. Successful completion of the molecular biotechnology concentration, and the awarding of the baccalaureate degree, allows the student to sit for the national certification examination (American Society for Clinical Pathology) and upon passing the exam be credentialed as an MB(ASCP)cm.
A new course of study, categorical concentration, has been developed for science majors who already hold a baccalaureate degree from an accredited institution and are currently working in a clinical laboratory in hematology, chemistry, or microbiology.
The categorical concentration course of study allows qualified individuals to complete the educational requirements for one specific area of clinical laboratory science. A second baccalaureate degree is NOT awarded to the student, but the courses taken do appear on his or her official KU transcript.
Successful completion of one of the categorical concentrations allows the student to sit for the categorical certification examination in microbiology, hematology, or chemistry offered by the ASCP Board of Certification, and upon passing, be designated as either an H(ASCP)cm, M(ASCP)cm, C(ASCP)cm, depending on which exam is taken.
Students take online courses using the Blackboard learning management system.
Janet Hudzicki, PhD, MLS(ASCP)cm, SM, is chair of the admissions committee for the department. She may be contacted at [email protected] with questions about the curriculum, admission requirements, etc. | http://www.kumc.edu/school-of-health-professions/clinical-laboratory-sciences/bachelors-in-cls/curriculum.html |
Dave McCooey's Hexagonal Chess variant is my favorite chess variant.
Dave's variant is designed to be as equivalent to orthodox chess as possible. It seems perfectly playable and in my opinion, is the closest to orthodox chess of any hexagonal variant. It is not a large chess variant and does not use any unorthodox pieces.
Dave McCooey invented his variant along with Richard Honeycutt around 1978. After some trial and error, they concluded that the 91 hex board, with six hexagons on a side, was the most workable.
The initial setup in McCooey's Hex Chess was designed by Richard Honeycutt. Richard and Dave each designed an initial setup, independent of each other. They independently arrived at the same overall diamond shape with 7 pawns, but after comparing the two setups, they agreed that Richard's was better. The main difference in Dave's setup was that the bishops were in an oblique line rather than "up the middle", and the king was in the corner.
So the net result was Richard's setup on Dave's board.
Dave says that his variant is less drawish than orthodox chess. My experience leads me to concur. Also, attacking seems more likely to succeed.
As one would hope, the hexagonal geometry itself provides some interesting differences between Hex Chess and Orthodox Chess. To begin with, the ability to move diagonally is not as important for a piece, because each color only covers a third of the board. The result is that the Queen and Bishop are reduced in value relative to the other pieces.
Here are Dave's estimates of the relative piece values:
Pawn=1 Bishop =3 Knight=4 Rook=7 Queen=10
There isn't as clear of a distinction between "major" and "minor" pieces as there is in orthodox chess.
In reality, there is an evaluation dilemma between Knight and Bishop, and it seems even more complex than the equivalent question in orthodox chess. For example, the value of a Bishop depends heavily on how many other friendly Bishops are still on the board. In my experience, Zillions of Games seems to favor the Bishops. Dave says that correct play favors the Knights. I have found that a single Knight does indeed seem stronger against a single Bishop, but trying to prove advantage with NBB versus BBB is tough.
The Hexagonal geometry allows Knights to triangulate. They can hop to a new hex without necessarily losing control of a target hex.
Bishops and Rooks gain the ability of moving along a given line while maintaining control of a certain hex that is NOT on that line. This concept doesn't exist for orthodox Bishops and Rooks. In fact, Dave believes it is this ability that makes the Hex Chess Rook closer in power to the Queen. In orthodox chess, only the Queen has this ability, and that's what makes it reign supreme.
The Hex Chess King can "catch up to" a Pawn from behind, by moving diagonally. It appears that endgame play will be altered in the sense that a player cannot depend on certain truths from orthodox chess. However, there are also many new endgame truths to be learned.
There are some sample games on the Variants page:
http://www.chessvariants.com/hexagonal.dir/sample1.html
You can find a Zillions of Games implementation of McCooey chess on the Chess Variants page:
http://www.chessvariants.com/programs.dir/zillions/hexchess.zip, 31k). Various hexagonal chess variants by Jens Markmann.
Go to
McCooey's Hexagonal Chess
Review written by Tim O'Lena.
WWW page created: April 14, 2000. Last modified: July 19, 2001. | https://www.chessvariants.com/r/mccooey.html |
What to do if the laptop is not connecting to WI FI
If Your laptop does not connect to Wifi says limited access or without access to the Internet, you need to understand in more details this problem.
The reasons for the problem there are several:
- inadequate or missing drivers on laptop;
- the failure of most Wifi cards;
- incorrect router configuration, etc.
Looking for the culprit — the laptop or the router
To understand why the laptop is not connected to the Internet via Wifi, consider all sides of this issue.
The first step towards solving the problem – the definition of the perpetrator. Problems with Wifi may be in the laptop and in the router. To find the reason it is important not to make things worse by changing everything in the settings.
To get started, try to connect via Wifi and another device – phone, tablet, laptop. The Wifi button on the router should be green. If other devices connection normal, then the problem is with Your laptop. And if it’s not working is the selected network, then the cause of the problem in the router and its settings.
If the cause is in the router, you still need to verify whether the Internet in General. Connect to laptop or computer cable directly. If everything works, then for sure the problem is in the router settings, and if not – contact your ISP to troubleshoot the problem.
Checking the version of network driver
The common reason for the lack of Wifi in the laptop is improperly installed or outdated network driver. This is evidenced by this icon at the bottom right in the notification bar.
It shows that no connections are available (although they actually are). This often happens when you reinstall the system. The drivers that worked on Windows XP may not work with Windows 7 but Windows 7 may not work on Windows 8.
To check whether the driver and, if so, their version, you need the following:
- open the menu «start»;
- on the «My computer» press the right button of the mouse.
- select the item «Properties»;
- if the system is Windows XP, but in the opened window select the tab «Equipment», and in it click on «device Manager»;
- in the newer system just to the right in the opened window choose this item;
- here is looking the tab «Network adapters/adapters» and your network adapter. It can be called differently, it all depends on Your laptop;
If the device is there, and beside him there is no exclamation marks, then the driver is all right.
To find out the version you need to click edit click on the driver and select «Properties».
In the opened window select «Driver» and see his date of development.
Hardware enabling adapter
The driver for your network devices is working and the network is still there? Or before the Internet was working now no connections are available? This indicates disabling the network adapter on the laptop.
On different models it is different but often you have to press FN + F2 simultaneously or FN + another key with a painted icon Wifi.
Some models have a special button on the body.
Video: How to share wi-fi from laptop
The system can also include a wireless network.
If You have Windows 7, follow these steps:
- open «start»;
- select «control Panel»;
- «Network and Internet»;
- «Control center network and sharing»;
- «Change adapter settings».
If in the dialog the wireless network icon is colorless, this means that the network is inactive and must be enabled by pressing the right mouse button
To do this in Windows 8:
- click «Settings» in the right pane;
- hereinafter – the «Change PC settings»;
- select «Wireless network». It should be included.
You can perform the same operation as that for the 7th operating system to ensure sure that the network is enabled.
In Windows XP delative even easier:
- «Start»;
- «Control panel»;
- «Network connections»;
- enable WLAN by pressing the right mouse button.
The inclusion of the adapter will witness such an icon in the notification bar.
The laptop stops connecting to WiFi
If before the laptop connects to the Wifi network, and then abruptly stopped (no settings changed), the culprit may be a virus. It can corrupt the file or knock down the setup. Even if the antivirus check showed nothing, knock the settings could install some software on the laptop.
Simple removal of this program will not lead to the restoration of the network. Alternatively, you can delete the network connection and recreate it, you can reset the router and connect it with zero, it is possible to search long shot down the setting on the laptop, but the easiest way to restore the system to that level, how the program got into it.
Restore the system
Start this process:
- «Start»;
- All programs;
- «Standard»;
- «Service»;
- «System restore» ;
- «Run system restore»;
- «Next»;
- select a restore point (updating and installing software is written in the registry, because in the opened window, select the desired recovery time);
- Next.
The recovery process will start and after the laptop is restarted. If the problem in a malicious program, then Wifi will work.
Updating your hardware drivers
If when checking the network adapter icon driver in device Manager is there an exclamation mark – click on it, right-click, select ‘Activate’.
The lack of a record of the driver means that it should be installed. Then you need to download it from official website manufacturer. Or use the driver disc that comes included with the laptop.
To know the name of the driver is possible from the information in device Manager, the laptop, or using a special program.
To update the driver, if you click on the right mouse button and choose «Refresh». Or go to its properties and there select the item. Even if the driver everything is in order, it is recommended to download it again and install.
Check connection settings
To check the connection settings:
- «Start»;
- «Control panel»;
- «Network and Internet»;
- go to «control Center network and sharing»;
- «Change adapter settings»;
- on the «Wireless network connection» click the right button of the mouse.
- open «Properties»;
- find «Internet Protocol version 4 (TCP/IPv4)»;
- select it and select «Properties»;
- check below stood a tick on automatic obtaining IP and DSN addresses;
- click «OK» in all Windows.
When trying to connect to the selected Wifi network for the first time, a message appears saying enter password. Next to network it should be auto connect when you turn on the laptop. But if the laptop doesn’t want will automatically connect and every time asks for a password, check the checkbox «Connect automatically» under the network name.
No Internet access or limited in Windows
It happens that, when connected, is identified without access to the Internet via Wifi and near the network icon on the panel appears the yellow triangle:
Also, if you go to «control Center network and sharing».
Log in to the connection properties. If it looks this way in the IPv4 connectivity says «No network access», the problem is incorrect IP addresses or disabled the router’s DHCP server.
Check You forgot to tick the box on the obtain addresses automatically. But if they already are, then try to do the opposite – to write all manually. To obtain the network address in the router settings. But mostly IP address 192.168.1 standard.X, and DNS 192.168.1.1.
If the connection properties show IPv4 connectivity «No Internet access», then an incorrect DNS server address or router settings.
In this case, just manually changing the DNS settings, leaving the IP address automatically.
- 8.8.8.8 is a public DNS server of Google;
- Try accessing 77.88.8.8 – Yandex.
Some errors with the connection
If the laptop will connect to the Internet, but slowly loaded sites, You could stray too far from the coverage area of the router. And if high Wifi signal problem persists, it is likely that You catch a lot of other networks and busy Wifi channel.
This is changed in your router settings. The default is – 6, You try to change it from 1 to 13, and to follow the change of speed. You can try also the option «Auto».
If the laptop connects to Wifi but comes to the Internet, and while programs such as Skype and ICQ are working, check the DNS address. They should be automatic or spelled out, as in the paragraph above.
If the laptop is not connected directly to the Internet:
- click «start»;
- «Control panel»;
- «System and security»;
- «Power supply»;
- «Power button»;
- under «shutdown Settings» uncheck «Turn on fast startup (recommended)» ;
- Save.
It is also recommended to reduce the number of startup programs in the startup.
Windows could not connect to…
Selecting the network and entering the security password to it, suddenly got the error «Windows was unable to connect to…»:
You can try to click «Troubleshoot» and see the written reason. Are still network devices and settings.
Also, this message appears because of an error of the router. Try to restart him and the laptop.
In device Manager, in network adapter properties disable «Allow the computer to turn off this device to save power».
Long authorization process
If after entering the security key for Wifi, while connected to the network, long appears «Obtaining IP address», and then the connection drops and attempts to reconnect, this indicates an error in configuring IP addresses. In this case, the connection properties need to set to automatically obtain an IP address. But if does not help – write them manually.
Attempt authorization may block antivirus and Firewall, so you need to try to turn them off or add Your IP address to the exceptions list.
Unidentified network — what to do
If the laptop is not identificeret network, check whether you have connected the Internet cable to the router. Restart the router and the laptop. You should also check the IP address and DNS server, as it was stated in the above paragraphs.
The reasons for the lack of Wifi on the laptop may be several, the main ones being an incorrectly configured router (see the instructions for setting up Your model), problems with the network adapter (outdated or not installed), incorrectly configured IP address or DNS server. | https://www.eng.comp-web-pro.ru/what-to-do-if-the-laptop-is-not-connected-to-wi-fi.html |
Creative Preschool has always emphasized the importance of PLAY throughout our day. Our teachers design spaces that are attractive and welcoming to our students, rotating toys, games, and supplies based on student curiosities, learning themes, and current events, prioritizing safe learning environments and play opportunities for all. We work hard to develop learning activities that are not only fun, but that practice essential pre-kindergarten skills. Our themes and activities teach art, community awareness, phonological awareness, writing, pre-reading, number sense, mathematics, science, physical movement, and most importantly, social-skills.
Website: creativepreschoolvashon.blogspot.com
Phone: 206-463-2166
Email: [email protected]
Ages: 2-5
Days:
Tuesday – Friday 9a-11:30a (2-3 years old)
Tuesday – Thursday 12:30-3:45 (pre-k)
Cost: $73/month for one day per week, $146/month for 2 days a week, etc. | https://vashonhub.com/portfolio-item/creative-preschool/ |
Cat#:
PTM-725
Ab Type:
P
Applications:
WB, Dot, ELISA
Species:
Human, Mouse, Rat
Price: (100 μl)
¥ 2880.00
Price: (20 μl)
¥ 700.00
The rabbit-derived antibody is purified with protein A-conjugated agarose followed by phosphorylated histone H3 (Thr80)peptide affinity chromatography. It specifically recognizes histone H3 with threonine phosphorylation at Thr80.
?
H3
ELISA, Dot blot, Western blot.
Recommended antibody dilution: WB: 1:2000
WB: 1:2000
For Western blotting, incubate ?membrane with diluted antibody in 5% nonfat milk, 1 x TBS, 0.1% Tween-20 for ?two hours at room temperature with gentle shaking.??
Use at an assay dependent concentration. Optimal ?dilutions/concentrations should be determined by the end user.??
A.Dot blotting analysis?on indicated amount of peptides using histone H3T80ph rabbit pAb. The list of peptides is included in the table on the right.
B.Western blotting analysis?on 30 μg of crude proteins from HeLa whole cell lysates with (right) or without (left) treatment of Okadaic acid (100 nM, 60min) and calyculin A (CA,100 nM, 1hr) using phospho-histone H3 (Thr80) rabbit pAb (1: 2000).
C.Western blotting analysis?on 30 μg of crude proteins from mouse brain, mouse testis whole tissue lysates and MCF-7 whole cell lysates using phospho-histone H3 (Thr80) rabbit pAb (1: 2000).
Histones are subjected to a variety of enzyme catalyzed modifications, including acetylation, methylation, ubiquitylation and newly discovered succinylation, crotonylation and 2-hydroxyisobutyrylation, etc. These modifications have a direct effect on the accessibility of chromatin to transcription factors and, therefore, on gene expression. Histone H3 phosphorylation is specifically phosphorylated during both mitosis and meiosis that is believed to be mainly involved in transcriptional activation requiring chromatin fiber decondensation, and chromosome compaction during cell division. Histone H3 phosphorylation may initiate at different phases of the cell division in different organisms, but metaphase chromosomes are always found to be heavily phosphorylated.
The antibody is kept in PBS with 50% glycerol and 0.01% sodium azide. Upon receipt, please centrifuge the antibody at 12,000 x g for 20 seconds and store the antibody at -20°C. Avoid repeated freeze/thaw cycles. Stable for 12 months from date of receipt. Leave the antibody at room temperature for 2 minutes and gently mixed using pipette before usage. | http://www.meossj.com.cn/prod_view.aspx?TypeId=114&Id=407&FId=t3:114:3 |
Hollywood Master Classes
In several of the initial recording sessions at Synchron Stage Vienna in October 2015, the Synchron Stage Orchestra played famous pieces by John Williams, Alexandre Desplat and Aaron Copland, among others. The sessions were conducted by Conrad Pope and recorded by Dennis S. Sands - two of the most experienced personalities in Hollywood, who approved of the technological, acoustical and musical qualities of the facility and the orchestra.
It’s worth mentioning that all pieces were recorded within one hour each, as a sight-reading test for the musicians. “Fanfare for the Common Man” demonstrates the effect of low percussion in the main hall (Stage A) of Synchron Stage Vienna. | https://www.synchronstage.com/en/projects/hollywood_masterclass |
The „Winter Football School of the Football Association of Serbia”, organized by the instructors’ section for players born in 2006 and in 2007, which was taking place in two shifts, from 1-5 February and 6-10 February 2020 at the FAS Sports Center in Stara Pazova, has now been completed.
In addition to control of existing selection, the camp served as an opportunity for additional selection of players, and the fact is that, for ten days of work and stay at FAS SC, there were more than one hundred boys in the training process.
The Instructors’ Services Co-ordinator Mr Dalibor Zorko and persons who were in charge for technical part of program of the FAS Instructors Services have, in co-operation with FAS Regional and County instructors and with assistance of guest coaches, implemented the plan and program made by the FAS Instructors’ Services.
Plan of Instructors’ Services was to define the Serbian school of football at youth age-categories level, which would be based on Serbian talent, tradition and identity. The goal is to create a unique work methodology to be implemented by the clubs, with an aim to jointly come up to the model of player for the future period, to the purpose of achieving the best results in club and representative football.
The code of representative football has been an integral part of this program, with a focus on raising awareness of the importance of education. The Coaches’ Organization is actively involved in this idea, and the leading clubs have shown openness for cooperation in the implementation of this program.
The camp was ran twice a day, whereby the morning training was General training (coordination, motor skills, speed, ball and no ball technique), and the afternoon training was Specific training based on game spaces and elements (1: 1, 1: 2, 2: 1, 2: 2, 3: 2, 2: 3, 3: 3, 4: 4).
Daily Activities:
– Respect the daily schedule of activities
-Monitoring and diagnosing the development of boys through training exercises and games
-Daily two training sessions of general and specific (situational) content
– Workshop (education and interaction).
In addition to the instructors, specialist coaches (goalkeeper coaches, physical training coaches, technical training, etc.) were involved in the work with the players. The guest of the camp was our former national team player and international player Bojan Jorgačević, who was in charge of work with goalkeepers.
The work of the school was conducted under the supervision of the expert medical team of the FSS.
In addition to football activities, the camp also featured workshops in the form of teaching and educational activities: nutrition of athletes, psychology, a spot quiz on the history of football. The lecture was also delivered by our renowned international referee Milovan Ristić, who tried to explain that we are all on the same mission to make our football game as beautiful and attractive as possible. We can achieve this if players and referees respect and understand each other.
– ‘Serbian football has a beautiful future’ – said Instructors’ Services Coordinator Dalibor Zorko.- A new wave of talented boys is coming, and it is our task to enable them to develop well and help them in their football maturation. Of course, we will not talk about names yet, but Serbia always was, and will be a birth country of talented kids. | https://fss.rs/en/2020-winter-school-of-football-completed-serbia-a-birth-country-of-talented-children/ |
After speculation heading into the 2020 offseason that the New England Patriots could potentially lose several key members of their coaching staff and front-office, they were lucky enough to have only lost one, which was special teams coordinator Joe Judge, who became the head coach of the New York Giants.
But it looks like they may not make it through the offseason without losing at least one more member of their organization.
The Patriots were fortunate to come out of the January hiring cycle largely intact, with OC Josh McDaniels, director of player personnel Nick Caserio and pro scouting director Dave Ziegler all eliciting interest. With them staying put, New England avoided the kind of mass exodus it went through last year. But the Pats won’t make it through this offseason totally unscathed. Highly-regarded college scouting director Monti Ossenfort will likely be on the move in the coming weeks—he was twice requested for, and blocked from, interviews for the Texans GM job over the last two years, and interviewed for the Browns GM job in January. Ossenfort succeeded Falcons GM Thomas Dimitroff in his current role in New England, and has been an integral part of building the second iteration of the Bill Belichick dynasty. For obvious reasons, this figures to be a quieter year for movement in the scouting community (normally, May is when a ton of guys are switching jobs). But in the case of someone like Ossenfort, having an established reputation and relationships should supersede the difficulty teams might have in running a search process amid the circumstances. The Patriots, for their part, weren’t caught off-guard here, with Ossenfort letting his contract expire. They brought former Browns and Packers exec Eliot Wolf aboard in February.
Ossenfort, interviewed for Cleveland's GM job once the 2019 season was over. After Vikings assistant GM George Paton withdrew his name from consideration for that job, that left Ossenfort and Philadelphia's vice president of football operations Andrew Berry as the last two candidates the Browns would choose to be their new GM. In the end, Cleveland chose the latter person for the job.
Ossenfort has been the college scouting director for the Patriots for six seasons. Before that he spent time with the organization as the assistant college scouting director and as an area scout. He's been working in the NFL since 2001. | |
Despite several wave energy converters (WECs) having been developed to present, no particular concept has emerged yet. The existing inventions vary significantly in terms of the operation principle and complexity of WECs. The tethered point absorbers (PAs) are among the most known devices that, thanks to their simplicity, appear to be cost-effective and reliable for offshore installation. These devices need to be advanced further and, therefore, new tailored modelling methods are required. Numerical modelling of this type of WEC has been done mainly in one degree of freedom. Existing methods for multi-degrees of freedom analysis lack pragmatism and accuracy. Nevertheless, modelling of multiple degrees of freedom is necessary for correct analysis of the device dynamic response, wave loads and device performance. Therefore, an innovative numerical method for two degrees of freedom analysis of PA WECs, which permits precisely modelling the dynamics of PA for surge and heave motions, is introduced in this paper. The new method allows assessing, in the time-domain, the dynamic response of tethered PAs using regular and irregular sea states. The novel numerical model is explained, proved and empirically validated. | https://pureportal.strath.ac.uk/en/publications/a-novel-2-d-point-absorber-numerical-modelling-method |
I am a Boston, MA based Wedding and Fashion Photographer.
Febian Shah Photography is an award winning & published destination wedding and fashion photographer featured on BBC Travel, WedAwards, Boston Globe, DarkBeautyMag, Boston Voyager. My style of shooting is a mix of documentary and storytelling, where I strive to capture the emotions. I am a strong proponent of capturing true emotions and am often caught clowning around to get clients to relax in front of the camera.
I am always humbled and honored when a client trusts me in capturing their special moments and will go the extra mile to keep them happy. | https://www.febianshah.com/About |
This is part of a series of blog posts examining seven arguments I laid out for limiting Good Ventures funding to the GiveWell top charities. My prior post considered the third through fifth arguments, on influence, access, and independence. In this post, I consider the sixth and seventh arguments:
Argument 6: If no one else is willing to fund a program, then this is evidence that the program should not be funded. Crowding out other donors destroys this source of independent validation.
Argument 7: If Good Ventures fully funds every high-value giving opportunity it finds, this could lead to other donors preemptively abandoning programs the Open Philanthropy Project is looking into, thus substantially reducing the amount of effective giving in the Open Philanthropy Project's perceived current and potential focus areas.
Argument 6 is sometimes an important consideration, but is a poor fit for the GiveWell top charities, to the extent that most donors are already largely moved by GiveWell's recommendations. Argument 7 points to a real problem, and one that reflects poorly on the effective altruism movement, but the problem is not mainly concentrated in the area of funding.
Argument 6: Funders are evidence of effectiveness
The winner's curse is the tendency for the winner of an auction to have overbid. Consider a simplified example where all the bidders have the same preferences and resources, but different information about the item being auctioned. If their information has not been selected through a biased process, and they interpret it correctly, the one willing to bid the highest will be the one overestimating the item's value the most.
For the same reason, if you are a program's only donor, this is evidence that you are overestimating its value. The willingness of other parties to fund a program is evidence of its effectiveness, and crowding them out destroys that information. But this trades off against information scarcity.
For this reason, Good Ventures might reasonably want to avoid crowding out other donors, for programs where it is not exceptionally certain of its judgment, and has no reason to believe that its preferences uniquely favor a program like this. On the other hand, in cases where it is very confident in the value of the program, there is little reason not to crowd out other donors - and substantial reason to want to crowd out small donors, to free up their attention to evaluate smaller or less certain programs.
If other donors have already funded the program, then the confidence threshold is even lower - Good Ventures should feel comfortable crowding out other donors as long as it is confident in its ability to detect a substantial change in a program's value.
Another explanation for being a program's sole supporter is that you have very unusual preferences (or unusual ability to evaluate evidence). If this is the case, there are unlikely to be other donors to crowd out, so the issue is moot.
While these considerations do suggest that a major funder should sometimes avoid crowding out others, GiveWell's top charities seem like a poor fit for this reasoning, since they seem unusually easy to evaluate relative to other Good Ventures grants, recommended by the Open Philanthropy Project. In addition, the presence of other donors adds unusually little information in this case, because they are largely motivated by GiveWell's own recommendations.
Argument 7: Preemptive exit
GiveWell worries that if Good Ventures fully funded giving opportunities, this would lead other potential donors to avoid causes and grants they're interested in:
We do not want to be in the habit of – or gain a reputation for – recommending that Good Ventures fill the entire funding gap of every strong giving opportunity we see. In the long run, we feel this would create incentives for other donors to avoid the causes and grants we’re interested in; this, in turn, could lead to a much lower-than-optimal amount of total donor interest in the things we find most promising.
I've heard two versions of this concern. First, an after-the-fact crowding out effect - if other donors notice that their donations mainly serve to offset Good Ventures's money, then they may withdraw. Second, other donors may preemptively withdraw if they think a charity is likely to become a Good Ventures grantee. Preemptive and after the fact crowding out are different, and I think it's worth addressing the prospect of preemptive exit separately.
If you are trying to cause the most good to be done, a preemptive exit seems like it will always or almost always be counterproductive; early-stage funding is how you leverage later-stage funders. For example, if you expect that a program will motivate Good Ventures to fully fund it once it's been evaluated, this is a strong reason to support it all the way up to that point.
This seems to me like a real problem, because people are ignoring the fact that the Open Philanthropy Project is capacity constrained. I have heard people say "that's on the Open Philanthropy Project's to-do list" as a way of implying "effective altruists have already got this covered," when in fact it means the opposite. The Open Philanthropy Project has a very long to-do list. If something is sitting on their to-do list, that means that someone working at the Open Philanthropy Project believes that the thing ought to be looked into, but no one has actually done so, because they are busy with higher priorities.
This is a form of preemptive crowding out of attention. Attention, unlike money, is obviously a scarce resource on current margins for the Open Philanthropy Project. There is no good reason for effective altruists to do this. Let's do better.
The obvious response to this by the Open Philanthropy Project and Good Ventures would be to treat disclosure, not as a value or obligation, but as a strategic tool for coordination. A recent Open Philanthropy Project blog post indicates that they're moving towards a less comprehensive and more strategic attitude towards transparency, but only in general terms. Here are some specific tactical and strategic reasons for the two organizations to disclose information:
- They are in the process of thinking something through, or rely on a particular model or fact claim, and would benefit from criticism if their current thinking can be improved.
- They are about to make a funding decision in some area, or about to publish research on something, and other people about to consider related investments might want to focus on other things for now, to avoid unnecessary duplication of effort.
- They have learned something that other effective altruists might find helpful.
- They have decided not to pursue an investigation further, because they do not think the program area is promising.
- They have decided not to pursue an investigation soon, because they are poorly positioned to evaluate it or higher priority tasks have come up, so others considering such an investigation should not worry about duplication of effort.
- They have decided not to fund organizations in an otherwise promising area, because they do not think that the kind of funding they are well positioned to provide is the limiting factor, but would encourage EAs with different kinds of resources to contribute (e.g. smaller funders or people who might be interested in starting or joining an organization) to consider it.
Other effective altruists can help by continuing to be willing to look into things even if they're on the Open Philanthropy Project's to-do list, and not being discouraged by the idea that the Project's bigger and more capable than you. They really can't do everything worth doing. You likely have something to offer.
Conclusions from Arguments 6 and 7
The most obvious and harmful type of crowding out happening in effective altruism is that of attention, not money. Effective altruists bear substantial responsibility here for exaggerating GiveWell's and the Open Philanthropy Project's capacity to evaluate programs. (I've written about this previously in the case of GiveWell.) This blog post series is in part an attempt to alleviate that problem by evaluating them as actually existing specific institutions, and contextualizing them by contrasting them with potential alternatives.
The Open Philanthropy Project is compounding this problem by trying to do a little bit of everything. Clearer communication around what it is not doing, and where it has found important tractable problems where funding is not the bottleneck, might somewhat alleviate this. | http://benjaminrosshoffman.com/givewell-case-study-effective-altruism-5/ |
As the COVID-19 pandemic has evolved, so too have OSHA policies, as seen in three recent OSHA announcements affecting the construction industry. OSHA issued new construction industry guidelines to protect workers from coronavirus. The agency also revised its COVID-19-related recordable incident policy. Finally, it released a new enforcement protocol addressing a changing COVID-19 risk.
Construction Industry Guidance
What do the new guidelines say?
Based on existing COVID-19 policies, the new construction guidelines introduce additional measures for workforces operating under continued risks from the disease. The guidelines cover hazard assessment, engineering and administrative controls, safe work practices, and personal protective equipment (PPE). The new policy illustrates construction activities that fall into the existing risk exposure levels—low, medium, high, and very high—to help employers make job hazard analyses. Recommended engineering controls address barrier mechanisms to protect workers who have to operate near known or suspected COVID-19 cases. The policy’s administrative controls tailor earlier guidance to address construction-specific issues and include screening work assignments; updating policies to align with existing CDC, OSHA, and state guidelines; and training workers on social distancing, hygiene, PPE use, and wearing facemasks. Additional safe work practices include using staggered shifts, performing regular workplace cleaning, providing hand-washing stations, and scheduling and screening visitors to minimize contact. The policy clarifies that facemasks do not qualify as PPE so that PPE training requirements do not apply.
What does this all mean?
These industry guidelines seem to compromise a recent dispute regarding emergency temporary standards. The OSH Act authorizes these measures where workers face grave dangers, and OSHA issues them without public input to take effect immediately. Labor groups pushed for these regulations as necessary to protect workers because the current OSHA guidelines do not carry the same force regulations do nor do they target construction industry-specific hazards. Employers, however, countered that the construction industry already changed operations significantly to address COVID-19 risks, making additional regulations unnecessary, especially ones crafted in far too little time to understand the problem properly.
However this debate plays out, it may not change how jobsites run while the pandemic risk persists. Construction industry businesses should follow this new OSHA policy because abiding by these guidelines helps to ensure a safe work environment for employees, which OSHA’s general duty clause requires. Further, many states, including Pennsylvania, have issued specific orders directing COVID-19 safety requirements. Consultation with counsel will help ensure particular jobsite policies and practices comply with these new OSHA guidelines and other existing requirements.
COVID-19 as a Recordable Illness
How has OSHA revised its policy?
An OSHA memorandum revised prior guidance on whether a COVID-19 illness qualified as “workplace related,” which an employer must record on its OSHA safety log (Form 300). Previously, an employer had to record COVID-19 cases as workplace-related only where the employer had reasonably available objective evidence that transmission resulted from the workplace. The old policy allowed employers to “focus their response efforts on implementing good [workplace] hygiene practices . . . , rather than on making difficult work-relatedness decisions.”
Under the new guidelines, an employer must deem a COVID-19 case as work-related where:
- The case is confirmed under CDC requirements, g., at least one respiratory specimen that tests positive for coronavirus, which causes illness
- A work environment event or exposure caused or contributed to the COVID-19 case
- The case results in death, days away from work, restricted work or job transfer, medical treatment beyond first aid, or loss of consciousness
In short, employers need to record a COVID-19 case as work-related if the employer determines that it is more likely than not that workplace exposure “played a causal role” in the COVID-19 case based on a reasonable and good faith inquiry. Whether an employer’s investigation suffices depends on the investigation’s scope and the evidence available to the employer. Investigating COVID-19 cases should include discussions with employees and review of the work environment. Evidence tending to show workplace transmission includes multiple employees who work in close proximity contracting the illness, exposure to a customer or co-worker confirmed to have COVID-19, or work-related frequent and close exposure to the general public in a locality with “ongoing community transmission.” On the other hand, an isolated incident among a group of co-workers with infrequent public contact does not qualify as work-related. Nor does a case involving a worker’s association with a non-co-worker who has COVID-19 during a period of infectiousness.
What does the revised standard mean?
This revised standard broadens the scope of investigation businesses need to conduct when a worker contracts COVID-19. But the new policy provides less guidance for determining whether workplace exposure “more likely than not” “played a causal role” in a COVID-19 case, mainly where potential sources of transmission include workplace and non-workplace exposures, as only one exposure can cause the illness. Determining whether or not an employee, co-worker, or the workplace “played a causal” role in one’s contracting the illness typically falls outside a business’ expertise. Further, although recording a COVID-19 illness does not necessarily mean an OSHA violation occurred, these recorded events could affect aggregate safety data and thus perception of a company’s safety record. That perception has business implications for contracting and hiring. Because this new policy gives rise to plenty of business issues, construction companies should consult their counsel about how best to investigate and record COVID-19 cases among their employees.
OSHA’s Revised Enforcement and Inspection Protocol
As COVID-19 cases have decreased in some parts of the country, OSHA revised its inspection protocol which focused on addressing coronavirus-related workplace safety. In areas where COVID-19’s spread has “significantly decreased,” OSHA will return to pre-pandemic inspection priorities: imminent dangers, fatalities, complaints, and programmed inspections—with some exceptions. OSHA will still prioritize COVID-19 cases and use alternative investigations (phone/fax or rapid response) to deploy its resources efficiently. Where COVID-19 cases remain elevated (or become so), OSHA will continue to focus inspection efforts on protecting against COVID-19, which means prioritizing COVID-19-related fatalities, imminent dangers, high-risk areas, and complaints. | https://agma.glass/an-evolving-new-normal-oshas-recent-covid-19-policy-changes/ |
The Finnish architecture critic Juhani Pallasmaa has said that one of Aalto’s principal design methods was collage. This Avant-garde principle was the principle Aalto used in creating the composition for Villa Mairea, a project which he saw as a prototype for living space for generations to come in the future classless society. In the history of 20th-century architecture the credit for adapting wood to the needs of industrial civilization belongs to Aalto and the tradition he created, a tradition which continues to nourish Finnish architects to this day. Numerous Finnish country houses published on these pages over the 10 years that our magazine has existed are interpretations of Villa Mairea. Nor has the collage method lost its relevance. Mathias Nystrom, for instance, has used seven types of wood for his family house (p. 83), while Pekka Helin has assembled the volume of his house (p 55) from seemingly separate verticals, giving this structure a resemblance to a bundle of firewood.
By using glued wood – plywood bent in a gentle S shape, a curve found in configurations of the border between water and land – Aalto was able to do without metal and glass in the design of his furniture and interiors. Today too his experiments have followers – and not just in Finland (p. 35). However, Aalto could not have imagined that in the second decade of the 21st century CLT (cross-laminated timber) would come into extensive use, allowing architects to start designing skyscrapers made from wood – or that surgically precise cutting (CNC) would enable them to create structures with forms which are remote from how wood looks in its living state and from the way in which wood was interpreted by master carpenters in centuries past.
Aalto’s collage – a combination of various volumes and materials coexisting in the same work and together creating a whole – has today been pushed aside by the hybrid, the latter being a different way of joining parts together whereby the parts lose their individuality within a new structure resembling an amalgam or alloy.
Images which are hybrid (glued-wood) or created by a CNC scalpel produce the illusion of man’s almightiness in his technocratic striving to establish total control over nature and over those who are like him (biopower). Seen against the background of the growing boom in wooden multi-storey construction and the numerous parametric experiments involving wood, a material whose individuality is invisible to the indifferent eye of algorithms and robots, the tradition of Aalto’s ‘organic Modernism’ with its careful use of wood looks conservative or even retrograde. And yet it is Aalto and the principles he established which are responsible for the fact that in Finland, Russia, Scandinavia, and the Baltic region we are seeing considerable numbers of new structures which are distinctive, experimental, and yet on a human scale and which ‘remember’ wood’s forest provenance. The 100th anniversary of independence which Finland celebrates this year is also the centenary of the independence of Finnish architectural thought – thought which created its own version of Modernism centred on the idea of using natural materials and imagery in order to give people a better future. In spite of global changes in the design climate, technological pressure, and the acceleration of information exchange, the Finnish take on wood continues to dominate the surrounding architectural landscape. While looking back at its powerful silhouette, Finland’s neighbours can calmly get on with their own creative quests. So long as these roots continue to nourish the trunk of Aalto’s tradition, there will always be life in our region.
116 Nadezhda Kerimova. Does the city need trees? | http://projectbaltia.com/en/archive-en/13825/ |
The layman's term "jammed finger" often refers to injuries that are incurred around the proximal interphalangeal (PIP) joint of the fingers (see image below). Although imprecise in its diagnostic accuracy, jammed finger aptly describes a constellation of injuries that are related to varying degrees of axial loading across the PIP joint.
(See also the Medscape Reference articles Finger Nail and Tip Injuries [in the Plastic Surgery section], Interphalangeal Dislocations [in the Emergency Medicine section], Mallet Finger and Boutonniere Deformity [in the Orthopedic Surgery section], and Mallet Fracture [in the Sports Medicine section], as well as Assessing the Hands and Wrists in Elderly People on Medscape Education.)
Injury to the PIP joint is common in athletic activities, especially ball-handling sports, but this condition is often minimized by players and coaches. The anatomy of the PIP joint is complex, and several types of injuries can result in permanent disability if they are left undiagnosed or mistreated. The sports medicine practitioner must develop a working knowledge of these common injury patterns so that timely and appropriate treatment can be provided.
For excellent patient education resources, visit eMedicineHealth's First Aid and Injuries Center. Also, see eMedicineHealth's patient education articles Broken Finger, Finger Dislocation, and Finger Injuries.
International
Finger injuries are common (38%) in individuals younger than 5 years. Most of these occur at home (59%), commonly (48%) because of jamming between 2 closeable opposing surfaces and mostly (79%) in doors at home and at school.
The PIP joint is a hinge joint that permits a range of motion (ROM) from 0-120°[2, 3, 4] (see image below). Relatively thick collateral ligaments provide lateral stability. Unlike the metacarpophalangeal (MCP) joint, the tension of these ligaments does not vary during ROM.
The volar plate forms the floor of the joint and separates the joint space from the flexor tendons. The volar plate is ligamentous at its origin on the proximal phalanx and cartilaginous in its insertion onto the middle phalanx.
Dorsally, the central slip of the extensor tendon acts to stabilize the joint and to extend the middle phalanx. The lateral bands, joined by the retinacular ligaments of the intrinsic hand muscles, go around the joint to form the distal extensor tendon and also contribute to joint stability.
The common mechanism of injury at the PIP joint involves the simultaneous application of hyperextension forces with some degree of longitudinal compression.
Volar plate disruption (see image below)
Mild forces may rupture the volar plate at its distal insertion on the middle phalanx; the articular surfaces remain intact. This is a stable injury. Local pain and edema generally produce only short-term disability.
Occasionally, fractures of the middle phalanx at the attachment of the volar plate occur. These fractures usually involve less than 30-40% of the joint surface and are thought to be stable due to maintenance of collateral ligament integrity. (See also the Medscape Reference article Phalangeal Fracture Surgery.)
Dorsal dislocation (see image below)
If the force of injury is great enough, rupture of the volar plate may occur along with longitudinal splitting in the collateral ligament structures, allowing complete dorsal displacement of the middle phalanx. Simple dislocations are readily reduced, often by the player, coach, or trainer on the field. Following reduction, most dorsal dislocations are stable.
Fractures at the base of the middle phalanx also occur in association with dorsal dislocations. If a fracture involves more than 40-50% of the articular surface, collateral ligament support is lost. Combined with the coexistent volar plate disruption, this reduction of collateral ligament support represents a major loss of joint stability. These injuries are often unstable, exhibiting persistent subluxation of the middle phalanx.
See the list below:
Angular forces may cause partial or complete rupture of a collateral ligament. When combined with volar plate rupture, lateral dislocation can occur. Most lateral dislocations are easily reduced and do not demonstrate gross instability.
Because of scar-tissue formation in the healing ligament, these injuries often result in enlargement of the PIP joint ("fat knuckle"). This may be of cosmetic concern to some patients, but good functional recovery can usually be expected.
Boutonniere deformity (see image below)
The term "boutonniere" comes from the French word for "buttonhole." This injury involves a disruption of the central slip of the extensor tendon at its insertion on the middle phalanx. The mechanism of injury is a blow to the dorsum of the PIP joint, such as when an athlete's hand is stepped on. Occasionally, a small fleck fracture of the middle phalanx is seen at the central slip insertion. Volar dislocation of the PIP joint is thought to be a component in many cases.
Little deformity may be noted immediately after an injury that results in a boutonniere deformity. The lateral bands may still act weakly to aid joint extension. Left untreated, the central slip retracts and the lateral bands displace volarly below the axis of rotation, becoming flexors of the PIP joint. Thus, the classic deformity of PIP joint flexion and distal interphalangeal (DIP) joint hyperextension is produced. Once a deformity becomes chronic or fixed, it presents a difficult surgical challenge, with potentially permanent functional deficits.
Because volar dislocations may be reduced spontaneously or before the office visit and because the symptoms and signs of such injuries may be subtle, practitioners must maintain a high index of suspicion for central slip disruption when evaluating any PIP joint injury. Patients may have more pain dorsally, and there is usually weakness or the inability to fully extend the PIP joint.
See the list below:
The athlete typically sustains an axial loading blow to the finger that is combined with hyperextension.
Dorsal trauma produces a volar dislocation force with a concurrent central slip injury.
Radial- or ulnar-directed forces could produce a collateral ligament injury/lateral dislocation.
Inquire about potential dislocations that were reduced on the field. Careful attention to the mechanism of injury may help pinpoint the diagnosis.
See the list below:
Consider obtaining radiographs before physical examination of the affected finger to evaluate for potentially unstable fractures/dislocations.
Document the integrity of the neurovascular status of the affected finger as well as that of the entire hand.
Observe and palpate the affected finger, with attention to focal areas of tenderness and edema.
Assess tendon function and ROM of the affected finger, with particular attention to active extension. Loss of active extension indicates a central slip injury.
Assess the joint stability of the affected finger.
If pain of the affected finger precludes a definitive diagnosis, consider using metacarpal block anesthesia to examine the digit's tendon function and stability.
Mallet Fracture
See the list below:
Laboratory studies are not indicated for the diagnosis of PIP joint injuries.
See the list below:
Obtain anteroposterior, lateral, and oblique radiographs of the injured digit. Radiographic interpretation includes assessing the PIP joint for dislocation, subluxation, and fractures.
Physical Therapy
Volar plate sprain: Treatment of a mild finger hyperextension injury usually requires only 1-2 weeks of protective buddy taping to an adjacent finger in addition to the institution of early ROM exercises. Taping should continue during athletic or at-risk activities until full pain-free ROM is obtained. Volar plate disruptions that involve fractures of the middle phalanx should be treated as dislocations.
Dorsal dislocation: Simple dorsal PIP dislocations, including those with small middle phalanx fractures, are generally stable following reduction. The usual treatment is dorsal splinting with the joint in 10-30° of flexion for 2 weeks. Such an extension block splinting limits further injury to the volar plate (see image below). The stabilizing tape on the middle phalanx can be removed to allow the finger to flex but not for it to fully extend. Place 2 stabilizing tapes on the proximal phalanx to hold the splint in place. Aluminum foam splints are commonly used, and some commercial devices are available; Coban wrapping (3M Health Care, St Paul, Minn) can be used to control swelling. Following the initial treatment period, begin ROM exercises. Continue protective splinting or buddy taping for 4-6 weeks during athletic or at-risk activities.
Collateral ligament injury: Partial collateral ligament tears may be treated with buddy taping and early ROM exercises. Lateral dislocations are also typically treated with dorsal splinting in slight flexion for 2 weeks. Additionally, buddy taping to the digit that is ipsilateral to the injured ligament is recommended to help control joint stability. Initiate ROM exercises after 2 weeks. Continue protective buddy taping of the digit for sports activities until pain-free function returns.
Boutonniere deformity: Treatment of an acute central slip injury consists of splinting the PIP joint in full extension for 6 weeks (see image below); DIP joint ROM exercises are encouraged. Typically, an aluminum foam splint is placed over the dorsum of the joint. Some commercial splints are available, including dynamic spring devices (see image below). After 6 weeks, ROM exercises are initiated. The use of a static splint at night or a dynamic ROM splint device for an additional 2 weeks is often recommended. The use of protective splinting in extension is advised during sports or at-risk activities for 4-6 weeks or until full pain-free function is restored.
See the list below:
Any dislocation that cannot be easily reduced by the usual means may indicate the interposition of soft-tissue structures. This should prompt consultation with an orthopedic surgeon for open reduction.[7, 8, 9, 10]
Fracture-dislocations that are unstable, exhibit persistent subluxation of the middle phalanx, or involve large portions of the articular surface should be referred for surgical fixation.[9, 11, 12]
Grossly unstable collateral ligament injuries may be considered for surgical repair.
Surgical reconstruction is the treatment of choice for chronic boutonniere deformity.[4, 13]
Nonsteroidal anti-inflammatory drugs (NSAIDs) and analgesics are generally used to treat the pain that is associated with a PIP joint injury.
NSAIDs have analgesic, anti-inflammatory, and antipyretic activities. The mechanism of action of these agents is not known, but NSAIDs may inhibit cyclooxygenase activity and prostaglandin synthesis. Other mechanisms may exist as well, such as inhibition of leukotriene synthesis, lysosomal enzyme release, lipoxygenase activity, neutrophil aggregation, and various cell membrane functions.
DOC for patients with mild to moderate pain. Inhibits inflammatory reactions and pain by decreasing prostaglandin synthesis
For the relief of mild to moderate pain and inflammation.
Small dosages are initially indicated in small and elderly patients and in those with renal or liver disease. Doses over 75 mg do not increase therapeutic effects.
Administer high doses with caution and closely observe the patient for response.
For the relief of mild to moderate pain; inhibits inflammatory reactions and pain by decreasing the activity of cyclooxygenase, which results in a decrease of prostaglandin synthesis
Pain control is essential to quality patient care. Analgesics ensure patient comfort, promote pulmonary toilet, and have sedating properties, which are beneficial for patients who have sustained trauma or who have sustained injuries.
For the relief of mild to moderate pain; inhibits inflammatory reactions and pain by decreasing the activity of cyclooxygenase, which results in a decrease of prostaglandin synthesis
Drug combination that is indicated for moderate to severe pain
Drug combination that is indicated for mild to moderate pain
The time frame for an athlete's return to play is dependent on the severity of the finger injury. An athlete with a mild PIP joint sprain without ligamentous disruption may be permitted to return to play after being evaluated on the sideline, provided the finger is properly buddy-taped. Those individuals with more severe sprains or dislocations/fractures may be recommended to remain out of competition for a longer period (2-6 wk). Protective splinting or buddy taping is advised during athletic or at-risk activities until full pain-free function is restored.
Possible complications that follow a PIP joint injury include persistent pain and swelling, stiffness, weakness, instability, and boutonniere deformity.
Most cases of jammed finger injuries are not preventable in sports activities.
The prognosis for a jammed finger is excellent with the proper treatment and protection. | https://emedicine.medscape.com/article/98081-print |
Creating a positive learning environment, ethos and embedding school values is essential if we want our pupils to flourish both as learners and as members of a community.
Great Leighs is a small village school with a largely white British intake, although the school greatly values the contribution from its small ethnic minority groups. School values underpin the way in which the whole school works; respect, understanding and working together enable our community to facilitate the best possible learning environment. In all that we do we aim to establish an understanding of democracy, the need to follow rules in society, respect and tolerance for all through learning about different cultures and traditions and an understanding of the importance of individuality and liberty within a safe environment and structure.
The importance of pupils’ thoughts and opinions are high within the school. Classes vote annually for their School Council representatives and work fortnightly with their representatives in discussing areas for improvement in terms of opportunities and learning. The School Council has been responsible for the introduction of a tuck shop, a new school uniform, Forest School days for KS2 pupils and judging our annual cake competition. Family Captains are also voted for annually by their families and these captains are responsible for arranging/picking teams for the school half termly sporting competitions. All Year 6 pupils have the opportunity of being a School Prefect, whose role includes working with and supervising classes during wet play times, monitoring the corridors at lunch and break and buddying up with our Foundation Stage pupils particularly for reading. Volunteers from Year 6 are trained to be Peer Mentors – and work with children who have play time issues. Volunteers from each class also lead our Keep Healthy Crew who meet regularly with staff, parents and governors to discuss ways of teaching and informing the rest of the school about healthy living.
Through assemblies, annual class/school rule discussions, PSHE sessions and adult role models, pupils at Great Leighs are clear about expected behaviours. Positive behaviour reinforcement is the main path followed by staff and discussion with pupils regarding unacceptable behaviours takes place when appropriate. Children are aware of sanctions used in their class and the use of white and red slips home to parents should they be deemed necessary. Visitors such as our local PCSO and fire brigade and visits such as Year 6 to Crucial Crew, enable our pupils to see the need for rules in society and the consequences of breaking these rules.
Centrally we aim to teach our pupils the importance of respect and tolerance for each other and members of their local, national and world wide community; only through teaching of different cultures, traditions and religions will pupils understand difference. Assemblies, RE teaching, cultural days, a variety of musical, art and dance experiences, visitors from other faiths and visits to a variety of places of worship as well as the study of life in other countries throughout our curriculum enables our pupils to have a broad understanding and tolerance of diversity. Our Multicultural Assembly every Tuesday teaches important celebration and festival days; visits to our local church and to the Hindu Temple at Neasden broaden our pupils’ understanding of a variety of faiths. Pupils in school share their personal faith, traditions and cultures where possible and the school community as a whole has a better understanding of life in other cultures through its partner school in Ghana.
Bullying is not tolerated in school and through PSHE lessons, listening to children’s concerns via the School Council and in some cases parents, issues arising are dealt with quickly and effectively. Annually pupils take part in Anti-Bullying Week and Safer Internet Day when issues around bullying and cyber-bullying are shared and guidance for prevention is given.
Each year our pupils take part in the Chelmsford Junior Music Festival, the Infant Music Festival, the Barnardo’s Carol Service and regular enrichment days with children from our local cluster of schools enabling them to integrate with children from other places and cultures. Within our local community our pupils have the opportunity to take part in the church’s Christingle Service, Medieval Day, and Village Carol Celebrations. In school our School Council suggests charities to support which has included: Chelmsford Homeless (Harvest time), Christmas boxes for Samaritan’s Purse, Farleigh Hospice, the Royal British Legion, Comic Relief and Red Nose Day.
As a British village school certain traditional aspects continue within our school: annual recognition and understanding of Remembrance Day, Christian Festivals of Christmas and Easter (through productions or school assemblies), celebration of Mothering Sunday, traditional maypole dancing in the summer term along with a celebration of music, dance and gymnastics in our Proms in the Playground. Fundamentally as a school we promote the value of kindness to all regardless of background, culture or faith and encourage all to draw out the best from each other.
All about British Life and culture – how much do you know?
British customs and traditions are famous all over the world. The British Life and Culture website will tell you some of the fascinating facts and information about our beautiful country, in a way that is easy to read and to understand. When people think of Britain they often think of people drinking tea, eating fish and chips and wearing bowler hats, but there is more to Britain than just those things. Click here to find out more.
At Great Leighs Primary school we are organised into five very special families. Each child and member of staff is in a family, which is the name of a tree.
We meet twice per term in our family to share ideas and fun activities. We collect family points each week for excellent work, being respectful and good behaviour. A cup is awarded in Achievement Assembly each week for the family that has collected the most points.
Check the foyer display for this week’s winner.
In each family group, the Year 6 children gave a presentation on why they wanted to lead the family and the skills they had to do this. Following the presentations the other family members voted for their leaders.
Positive reinforcement of good behaviours and positive attitudes towards learning are very important at Great Leighs. As part of our marking process positive comments regarding children’s learning are made either by staff or pupils themselves, either verbally or written. Stickers, smiley faces and family points may be given for effort, attainment or progress by members of staff. Family points are also given to pupils for care, kindness, helpfulness or solving friendship issues. Children collect family points in their classes and these are added together weekly and a trophy is awarded to the school family with the highest number of family points.
Many classes also award a ‘Star of the Day’ within their class, again for the person who has either shown an excellent attitude to their learning or put in a great deal of effort or been helpful or kind. Sometimes classes may be offered ‘Golden Time’ as a reward for effort or progress.
Click here to see this week’s stars.
During Achievement Assembly children may also be given certificates for mental maths, musical achievements, sporting competitions and anything achieved in extracurricular activities.
We have high expectations of the behaviour of our pupils both in conduct and in learning. We promote courtesy, respect and manners. We discuss our expectations at the beginning of the academic year so pupils are clear about how they should behave both in school and on the playground. We also discuss with our pupils the learning behaviours they need in order to learn most effectively e.g. looking at adults and children when they are speaking, listening carefully to instructions given so they know what to do and how to work well in group situations.
We reinforce good behaviour and praise pupils who show good behaviours by awarding family points or stickers. Time out is given to those children who need to reflect on their behaviour and we expect apologies to be given where appropriate. Children may be kept in for poor behaviour or poor learning behaviours. White slips are sent home if staff consider that parents need to know about poor behaviour and red slips are sent home for more serious incidents. The red slip indicates a detention when a pupil needs to miss half an hour of their lunch time. Both the white and red slips need to be signed by a parent and returned to school. This enables parents to discuss issues with their child and supports our desire to have good behaviours at all time in school.
The Learning Council are an integral part of our school. They work with staff, governors and their peers in a variety of ways to help continually improve the school. Each class has two Learning Council representatives who speak to their class regularly and report back to the Council with any issues and ideas. The Council representatives then speak to the necessary adults to resolve any problems and put forward new ideas. The Learning Council promote and organise events for different charities throughout the year, for example the Braintree Food Bank, The Poppy Appeal and Children in Need. They are also responsible for promoting healthy lifestyles through assemblies, newsletter articles and displays.
Peer Mentors have completed their training and are now qualified to help their peers and fellow school mates resolve issues.
They have taken over the role of ‘play leaders’ and their duties will include helping to organise and run family sports competitions, develop games and activities at break times and encouraging physical activity across all year groups. | http://greatleighs.essex.sch.uk/school-info/our-vision-and-values/ |
I've been studying and using bodymap correction for over a decade now. I am amazed at how powerful it is. We all have a bodymap. A way that we think about how we move regarding our structure, function and size. When are bodymaps are accurate, movement is good. When our bodymaps are inaccurate, movement is often inefficient, tense and injury producing. One of the most common mismappings I run across is the mapping of the arm. I can watch a person move and pretty much tell right away how they think about how their arm moves or naturally functions.
Below are a few pictures of the arm. Take a look.
I picked these three because they are a general view of how the arm relates to the rest of the torso. The top left picture shows the collarbone and how nerves and blood vessels travel underneath it. The top right picture is a front and back view of the torso. It displays how the collarbone and scapula places the glenohumeral joint out away from the ribs. The bottom photo is a bit to take in. It's a top down view of the collarbone, scapula, ribs and spine. Take notice of how the collarbones and scapula are shaped. Notice how they are curved and in no way straight or flat.
The pictures below are the 2 that I use the most in my office. When I ask a client how many joints make up their arm. Most of them say something like 3 joints. When I ask them to show me where the joints are, they rarely mention the joint at the sternum and collarbone. In my world the joint at the sternum and collarbone is the most important joint of the arm. In fact it's the first joint of the arm.....the arm has 4 joints.
The image of the whole arm to is one of my favorites. It clearly shows the 4 joints of the arm. The sternoclavicular joint, the glenohumeral joint, the elbow joint and the wrist joint. I like to call the sternoclavicular joint the conductor of the arm. For if the muscles of the arm were an orchestra, the joint at the sternum and clavicle would be the conductor.....the one responsible for rhythm and timing. Those of us with correctly mapped arms enjoy ease of motion. Have graceful gestures and don't have nearly the tension or injuries of those who have incorrectly mapped themselves. People with correctly mapped arms don't need to stretch their muscles nearly as often as others because their movements throughout the day are far less tension producing.
In my office, I normally use touch, movement and pictures to discuss and correct body mismappings. Mismappings occur all over the body for a variety of reasons. There are a lot of amazing techniques out there to help people move better with less tension. Over the last, I don't know how many years, I've found that correcting the bodymap makes them all more effective. If you struggle with tension, nagging injuries, regular discomfort or injuries that just won't heal, I encourage you to explore these ideas. They are powerful and worthy of your attention. | http://richroskopflmt.com/blog/2017/8/2/map-yourself-move-better-avoid-injury |
What are the options for dealing with your finances in a divorce?
Any good family law solicitor will always advise you to deal with finances at the same time as the divorce, as otherwise either you or your spouse could make financial claims against the other in the future. The only way to have full and final settlement of finances is with a divorce AND a court order specifying how capital, i.e. property, pensions, savings, and income is to be divided.
Ways in which you can settle finances on divorce:
1. Reach an agreement with your spouse
It is always best to attempt to reach an agreement with your spouse first, in the absence of court proceedings. This can be achieved between you and your spouse directly or through solicitor’s negotiation, mediation or round-table meetings. This is the simplest and most cost effective way of reaching an agreement, although this approach is not suitable for all matters, especially if they are rather complex. If an agreement is reached then this should be recorded in what is known as a consent order as soon as possible and this will need to be ratified by the court.
2. Issue Court proceedings
If agreement is not possible, proceedings will have to be issued in order to get matters to progress or, if for example there is a sudden dissipation of assets by either party or threat of assets disappearing. The court will then put a timetable in place to be followed.
You can continue negotiating with your spouse throughout this process in the hope of avoiding a final hearing to reduce costs which can accrue. However, if you cannot reach an agreement then a final hearing will need to take place for a final order to be made, and the court will have the ultimate decision as to how capital and income is to be divided.
What is the Court process for financial provision proceedings?
First Appointment
Both parties must complete a Form E before this hearing. This form is essentially each parties’ financial statement, disclosing their financial positions. Various documents will need to be disclosed with this statement.
At this hearing each party should set out the issues they would like to be resolved, e.g. valuations of property or jewellery or the requirement of expert opinion as to earning capacity or pensions. The judge will then give directions as to what needs to happen next for the matter to progress.
Financial Dispute Resolution Hearing
This hearing is an opportunity for negotiations between the parties. The parties’ will be aided by their legal representatives and the judge.
Any discussions between the parties at this hearing are “without prejudice” in that what is said in attempt to reach a settlement cannot be used against the other if negotiations fall through.
The judge will make an order if an agreement is reached – this is ideal, and most matters do settle at this stage. However, if an agreement cannot be reached then the matter will proceed to a final hearing.
Final Hearing
At this trial the judge will hear evidence from both parties and any experts and will then make an order dividing capital and income. The judge will ultimately have the final say.
The costs of proceedings will also be assessed at this hearing. The parties will usually bear their own costs, unless one party has been extremely unreasonable throughout proceedings.
Regardless of how an order is made, once it is made, the terms must be implemented and the parties must adhere to the provisions within the order, otherwise there is a risk that the matter could be brought back to court. | https://www.hja.net/expert-comments/blog/family-law/what-are-the-options-for-dealing-with-your-finances-in-a-divorce/ |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.