content
stringlengths
0
1.88M
url
stringlengths
0
5.28k
- [About FIDIS]. - Description. - Where to find us?. - FIDIS Consortium. - Presentations. - Links. Sirrix AG Security Technologies, Germany Sirrix AG is a spin-off of Saarland University which has been founded in 2000 by members of the chair for security and cryptography of Birgit Pfitzmann. All staff members have strong experience in the fields of security and cryptography. Fields of activities of Sirrix AG are protection of complex heterogeneous communication infrastructures and the design and development of cryptographic protocols, e.g., in the field of identification systems in pervasive computing. The company considers itself on the edge between research and commercial application of security systems. Thus, many activities comprise feasibility studies and development of complex cryptographic protocols. Various cutting edge work has been done on devices for comprehensive ISDN and GSM encryption and prototypes of fully anonymous E-Voting and PDA-based, anonymous E-Cash systems. Moreover we provide cutting-edge solutions in the domain of secure microkernel-based operating systems and trustworthy computing. Sirrix researcher have contributed to more than 30 significant scientific publications within the last two years, mainly in recognized international conferences and journals like Information Hiding, Milcom, Fast Software Encryption, Eurocrypt and others. Further development and research projects include security of integrated networks and cryptographic copyright protection. You’ll find more information at the Sirrix AG website.
http://www.fidis.net/about/consortium/sirrix/
LdV - Transfer of Innovation Preservation of European architectural history through the establishment of Building Archives and transfer of knowledge about heritage conservation and restoration workshops for relevant professional. Autonome Forme is an association of architects specializing in the field of architectural design and landscape. Every project partner has to establish an archive. There, the historical building materials, objects and tools are collected, registered, documented and archived and opened to the public. Thus, a permanent and secure place for the protection of mobile cultural assets is set up. The collected items can be used in the formation and further education in the area of restoration and monument preservation. A room for workshops and seminars on restoration and conservation of historical building materials will be established near the exposition. The contents of the seminars are developed within the project considering the European diversity of professional formation and further education in monument preservation. The archive with its possibilities for further education is going to be a basis for investigation, development and comparison of innovative techniques in the area of mantainance of historical buildings on an European level. Moreover, it is the aim of the archive to reuse historical materials and to find an innovative way of treating old and valuable building materials.
http://sendsicilia.it/en/portfolio/dettaglio.jsp?i=7
On the eighteenth of January our affiliated researcher Karin Stadhouders, MA delivered a speech at the Model United Nations Conference at Cals College, Nieuwegein. In her speech Mrs Stadhouders stressed the link between cultural heritage and identity formation and the dire need of protecting the latter from any possible threats. A suitable subject for the conference's theme: Historical Influences. Using Koosje Spitz' definition of cultural heritage (see adjoined video), Mrs Stadhouders addressed the young delegates in order to instill in them a concept of what cultural heritage entails. It is through the interaction with cultural heritage--tangible and intangible--that our identities are formed, and, at the same time we constantly redefine what said heritage is in the process. Protecting cultural heritage, hence, becomes not only UNESCO's work, but our shared responsibility. To know more read Mrs Stadhouders' speech attached at the bottom of the page.
https://www.globalheritage.nl/news/karin-stadhouders-asserts-the-importance-of-cultural-heritage-at-calsmun-2020
Prince Charles spoke of his efforts to maintain “the increasingly rare” seeds, native breeds and threatened varieties of fruits in his Gloucestershire estate throughout the past four decades. But he also opened up on how stressful and tiring his work can be when people don’t embrace or understand the necessity to protect diversity in nature. He said: “Ever since I first arrived at Highgrove 40 years ago this year I have battled to preserve and protect the crucially important diversity of flora and fauna that ultimately sustains our survival on this planet. “This is why I have also done my utmost to help maintain the increasingly rare seeds of heritage vegetables, or the rare native breeds of cattle, sheep, pigs, chickens, geese and ducks, or the countless threatened varieties of apples, pears and plums, all of which were being rapidly abandoned 40 years ago as a result of a fashionable obsession with monocultures of one kind or another. “It has proved to be an exhausting and often demoralising task to persuade people of the utterly essential role played by all this diversity in maintaining vibrant, healthy ecosystems that sustain both people and our planet. “It’s more urgent than ever that we act now to protect this diversity before it really is too late. “Therefore the seed vault and seed banks around the world play a vital role in this critically important mission.” The Prince of Wales spoke to the press as he was sending 27 species of seeds to the Svalbard Global Seed Vault on the Norwegian island of Spitsbergen – marking one of the largest and most diverse deposit of seeds to be made since 2008. This vault has been designed to protect and store seeds coming from every corner of the world in the event of a mass extinction, so that future generations will be able to enjoy today’s variety. The Svalbard Global Seed Vault is located 100m inside a mountain in the Artic, with permafrost freezing and preserving it while the height protects it from the threat of the rising level of the sea. Prince Charles’s concerns on a dying diversity in the flora and fauna in the UK were reflected in an analysis by charity Plantlife. A research published on the charity’s website in 2017 showed that 97 percent of the British meadows have been eradicated since the 1930s. Dr Trevor Dines, Plantlife Botanical Specialist, said: “The steady, quiet and under-reported decline of our meadows is one of the biggest tragedies in the history of UK nature conservation. “If over 97 percent of our woodland had been destroyed there’d be a national outcry. “Without the roar of chainsaws or the sound of mighty oaks crashing to the ground, meadows with undisturbed floral histories going back generations are being ploughed up in a single afternoon. “But the tide can be turned. “As we approach an exit from the European Union, government must ensure the few remaining meadows are properly protected like our ancient woodlands, and farmers better supported to manage our magnificent meadows.” Prince Charles’s contribution to the vault, owned by the Norwegian Government and operated by international organisation Crop Trust, has been praised. Stefan Schmitz, executive director of the Crop Trust, said: “The contribution from Highgrove is important not only because of the seeds themselves, but because it sends an important message to the world about the critical importance of biodiversity conservation in confronting the impact of climate change and biodiversity loss.” The Artic vault isn’t the only storage designed to pass on to future generations seeds. One, the Millennium Seed Bank, is located in Wakehurst, West Sussex.
https://theoneworldnews.com/europe/royal-heartbreak-prince-charles-opens-up-on-exhausting-and-demoralising-task/
The Integrated Historic Preservation (HPres) Certificate in Architecture/Interior Architecture at The School of the Art Institute of Chicago allows candidates for the Master of Architecture and Interior Architecture to secure a certificate in Historic Preservation, based on the successful completion of five departmental courses, taken as electives in the MArch degree, and a design studio project approved by the Historic Preservation Director. The certificate includes five courses, totaling 15-credit hours, along with an external practicum, that meets the minimum standards and guidelines promulgated by the National Council for Preservation Education (NCPE), consistent with current standards for architectural education being reviewed nationwide by the American Institute of Architects' Historic Resources Committee. Students bring their design training abilities to the service of preservation through studio projects that focus on the adaptive re-use, rehabilitation, or preservation of a historic structure or structures. In addition, students complete an internship in preservation at an architectural office or other agency. They may also enroll in a study trip. The Certificate courses fall into the six program areas - Preservation Documentation - Materials Conservation - Architectural History - Preservation Planning - Design Studio Focused on Preservation - Preservation Practicum Program Requirements An asterisked (*) marks courses that require a prerequisite or a waiver of the prerequisite which in each case must be submitted to the registrar by the Chairs of Historic Preservation and Chair Arch. And InArch. 1. Preservation Documentation HPres 5002 Archival Documentation This lecture/discussion course examines the discovery and use of written, pictorial, and photographic resources for architectural, cultural, and historical research: how to find and use Chicago area libraries, historical agencies, government archives, etc. Students develop the analytic and writing skills needed in historic preservation by writing National Register nomination. Field trips included. HPres 5008 Physical Documentation This course develops the drawing and drafting skills needed to both record and represent historic sites and buildings. It also gives an overview of the uses of photography, computer graphics, photogrammetry, and other specialized techniques in historic preservation. Site visits included. 2. Material Conservation HPres 5003 Historic Materials and Technology This course investigates the materials and techniques used in North American building construction. The history and development of materials, their physical properties, and characteristics are studied. Building construction methods are explored including adobe, wood, stone, brick, concrete, and steel construction. Research papers and oral presentations are required. Lecture and field trips are included. HPres 5012 Building Diagnostics* Why do buildings get sick and how do we make them well? This course examines the deterioration (by humans and nature) of building materials and their component systems. Through lectures and field studies, students study the symptoms, diagnose the problem, determine what tests are needed, and learn how to remedy the effect. Field trips are included. HPres 6006 Building Conservation* In this seminar/lecture/lab course, students learn the fundamentals of building conservation and repair techniques. Basic microscopy practices are taught through historic finishes analysis. Means of chemical and physical testing of historic building materials, cleaning methods and agents, protection, water repellents and consolidation, patching and repair, use and abuse of adhesives, etc. are discussed. Student presentations, guest lectures, laboratory work and field trips 3. Architectural History - or - other architectural history courses as available, as approved by the Chair. HPRES 5543 American Interior Design This course is a study of commercial, civic, and other public architecture (both high style and vernacular examples), and their response to the social, economic, and technological changes which transformed American society. European, Middle Eastern, and Asian influences are traced and examined. Field trips are included.> ARTHI 4505 History of American Commercial and Civic Architecture This course is a study of commercial, civic, and other public architecture (both high style and vernacular examples), and their response to the social, economic, and technological changes which transformed American society. European, Middle Eastern, and Asian influences are traced and examined. Field trips are included. ARTHI 4509 History of American Residential and Institutional Architecture This course examines the history of American housing, the architecture of religion, and the buildings of educational and other institutions. The focus is on how these buildings responded to the changes in American society and the impact of technology. Prevalent and vernacular styles are examined as well as their precedent in foreign architecture. Field trips are included. HPRES 5006 Historic Preservation: Hist & Theory Of Historic Preservation This lecture/discussion course surveys the various historical theories, philosophies, and practices of building conservation, preservation, and restoration both in Europe and America. Students investigate historical and contemporary attitudes towards 'history' and how these attitudes influence preservation planning and restoration today. Students develop a personal preservation ethic through discussion of preservation theory. 4. Preservation Planning HPRES 5014 Preservation Planning This lecture/discussion course examines practical and philosophical issues in planning for preservation and the methods for implementation. Among the topics included are preservation surveys and ordinances, zoning, and building codes, historical district and landmark designation, design review, preservation agencies (local, state, and national) and their roles, preservation economics and incentives, public relations, and interpretation. Lecture with field trips are included. HPRES 6008 Preservation Law This lecture/discussion course covers the history, theory, and practice of preserving historic resources by law. Analysis of significant national, state, and local preservation law; legal strategies for protecting historic sites and districts; preservation case law, etc. HPRES 5016 Preservation Seminar or HPRES 5017 Preservation Practicum (topic varies) Advanced seminar for historic preservation graduate students centered on a current theme in historic preservation and incorporating relevant theoretical readings. Students lead weekly discussions on issues ranging from authenticity and archaeology to reception of theory and commercialization. Actual preservation projects are studies in terms of various theoretical approaches and faculty members’ current work. 5. Design Studio focused on Preservation/strong HPRES 5010 Restoration Design Studio This studio and lecture course focuses on the restoration design of existing historic buildings (following the Secretary of the Interior’s Guidelines) using historic photographs, working drawings, and descriptions; stylistic analysis, and similar building topologies. Historical structural systems, construction methods, and mechanical systems are also studied and researched. Restoration drawings are prepared to document the changes needed for restoration. Demonstration of having worked on an existing or historic building in an AIADO studio may serve as a substitute for this requirement. 6. Preservation Practicum In addition to the course requirements, each student will complete a Preservation Practicum that can be fulfilled with completion of an internship in the field of preservation (either with an architectural office or some other agency), through an SAIC study trip, or by taking an additional course offered by HPres or approved by the Director. Both curricular components and internship are approved by the Chair of Historic Preservation and the Chair of AIADO. The Chair of the Historic Preservation Program serves as the official Director of the Certificate Program. A letter of verification is required from the host upon completion.
https://www.saic.edu/academics/post-baccalaureate/historic-preservation/integrated-certificate
CROSS-REFERENCE TO RELATED APPLICATION(S) TECHNICAL FIELD This application is entitled to the benefit and/or right of priority of U.S. Provisional Application No. 62/726,888 titled, “APPLICATIONS AND SKILLS FOR AN AUTONOMOUS UNMANNED AERIAL VEHICLE,” filed Sep. 4, 2018, the contents of which are hereby incorporated by reference in their entirety for all purposes. This application is therefore entitled to a priority date of Sep. 4, 2018. The present disclosure generally relates to autonomous vehicle technology. BACKGROUND Unmanned aerial vehicles (UAV) are increasingly being used for a variety of purposes such as capturing images (including video) from the air. A number of UAV systems are currently available that provide for image and video capture and remote control from a device on the ground. However, currently available systems require piloting using direct control of the UAV similar to other fixed wing or rotor craft. In other words, control by directly adjusting the pitch, roll, yaw, and power of the UAV, for example, using common control inputs such as a joystick and throttle control. While effective to a degree, such control systems require expertise on the part of the remote pilot and are prone to crashes caused by pilot error. BRIEF DESCRIPTION OF THE DRAWINGS FIG. 1A shows an example configuration of an autonomous vehicle in the form of an unmanned aerial vehicle (UAV) within which certain techniques described herein may be applied; FIG. 1B shows another configuration of an autonomous vehicle in the form of a fixed-wing UAV within which certain techniques described herein may be applied; FIG. 2 shows a block diagram illustrating an example navigation system of a UAV; FIG. 3 FIG. 2 shows a block diagram illustrating an example configuration for inputting objectives to the navigation system of via an application programming interface (API); FIG. 4 shows a diagram illustrating an example world-relative objective; FIG. 5 shows a diagram illustrating an example vehicle-relative objective; FIGS. 6A-6B show diagrams illustrating an example subject-relative objective; FIG. 7 shows a diagram illustrating an example subject-relative objective to maintain line-of-sight with a tracked subject; FIG. 8 shows a diagram illustrating an example image-relative objective; FIG. 9 shows a diagram illustrating an example objective to avoid backlighting; FIG. 10 shows a diagram illustrating an example objective to maintain scene saliency; FIG. 11 shows a diagram illustrating an example objective to avoid collisions with other objects; FIG. 12 shows a block diagram illustrating multi-objective optimization-based motion planning based on objective inputs received via an API; FIG. 13 shows a block diagram illustrating certain parameters of an objective; FIG. 14 shows a block diagram illustrating components of example skills in an example application; FIG. 15 shows a diagram illustrating an example implementation of an application including multiple skills in a system involving a UAV and an associated mobile device; FIG. 16 shows a flow diagram of an example process for controlling an autonomous vehicle using one or more skills; FIG. 17 shows a flow diagram of another example process for controlling an autonomous vehicle using one or more skills; FIG. 18 shows a diagram illustrating an example implementation of a platform for developing and/or distributing applications and skills; FIG. 19 shows a flow diagram of an example process for generating skills and/or applications; FIG. 20 shows a diagram illustrating an example implementation of a global simulation environment; FIG. 21 shows a flow diagram illustrating an example scenario for uploading a custom machine learning model to extend the functionality of a navigation system of a UAV; FIG. 22 shows a flow diagram illustrating an example process by which outputs from custom machine learning models are accessed by developer-created skills; FIG. 23 shows a diagram that illustrates image-based training data for various tasks used to train machine-learning models; FIG. 24 shows s a flow diagram illustrating an example scenario for uploading training data to train a custom machine learning model to extend the functionality of the underlying navigation system of a UAV; FIG. 25 shows an example of a visual output displayed via a mobile device in the form of a tablet display device; FIG. 26 shows an example view of a physical environment as presented at a display of an augmented reality device; FIG. 27 shows a series of screen captures illustrating how graphical user interface (GUI) features associated with a developer-created skill can be integrated into an application configured to control a UAV; FIG. 28 shows an example visual output that includes 3D waypoint objects displayed as augmentations; FIG. 29 shows a diagram of an example localization system with which at least some operations described in this disclosure can be implemented; FIG. 30 shows a diagram illustrating the concept of visual odometry based on captured images; FIG. 31 shows an example view of a three-dimensional (3D) occupancy map of a physical environment; FIG. 32 shows an example image captured by a UAV in flight through a physical environment with associated visualizations of data regarding tracked objects based on processing of the captured image; FIG. 33 shows a diagram illustrating an example process for estimating a trajectory of an object based on multiple images captured by a UAV; FIG. 34 shows a diagrammatic representation of an example spatiotemporal factor graph; FIG. 35 shows a diagram that illustrates an example process of generating an intelligent initial estimate for where a tracked object will appear in a subsequently captured image; FIG. 36 shows a visualization representative of a dense per-pixel segmentation of a captured image; FIG. 37 shows a visualization representative of an instance segmentation of a captured image; FIG. 38 shows a block diagram of an example UAV system including various functional system components with which at least some operations described in this disclosure can be implemented; and FIG. 39 shows a block diagram of an example of a processing system in which at least some operations described in this disclosure can be implemented. DETAILED DESCRIPTION Overview To alleviate the need for direct pilot control, UAVs used as aerial image capture platforms can be configured for autonomous operation. Achieving autonomous flight in a safe and intelligent manner involves a complex hierarchy of physics, control systems, scene understanding, and motion planning. Recent improvements in autonomous vehicle technology have generated significant interest from developers to be able to create niche-specific applications that leverage the underlying complexity and power of autonomous vehicle systems. However, the complex nature of autonomous vehicle technology, which makes it so powerful, also creates a high barrier of entry for such application developers seeking to develop such niche applications. To address such challenges, a development platform is introduced that includes, for example, a set of application programming interfaces (APIs), software development kits (SDKs), and other software development tools that enable software developers to build on and leverage the underlying complexity of an autonomous navigation system. In some embodiments, the described development platform hides the underlying complexity of an autonomous navigations system by supporting development of applications that can control an autonomous vehicle such as a UAV by specifying a collection of intuitive, high-level behavioral intentions also referred to herein “behavioral objectives” or simply as “objectives.” In some embodiments, using the development platform, developers can create what are referred to herein as “skills” that comprise, for example, instructions and/or other digital assets (e.g., images, video, digital models, visual augmentations, etc.) configured to modify objective inputs to the underlying autonomous navigation system, thereby controlling vehicle behavior during actual flight, during simulated flight, as well as pre-flight and post-flight behavior. In some embodiments, skills and or applications may be implemented as software modules that include the instructions and/or other digital assets. In some embodiments, skills can also be applied to modify outputs to a user, for example via user interface at a connected device. For example, a developer-created skill may change and adjust the type of data collected during a flight (image stills vs video, frame rate, etc.), change and adjust objective inputs to the navigation engine during flight, perform customized post-processing on received data after landing, etc. As will be described, objectives utilized to control an autonomous vehicle are exposed through one or more API. Applications or “skills” can be developed using SDKs and APIs, shared with other users via an online storefront, downloaded and executed by other users using other UAVs, tested in an online simulation environment, and/or utilized to improve operation of the autonomous control systems. In an example embodiment, the development platform exposes a Mobile SDK, and on-board Skills SDK, and a developer console. The Mobile SDK allows developers to build their own applications (e.g., mobile apps) that are configured to control the operation of an autonomous vehicle such as a UAV. The Skills SDK allows developers to write their own ‘skills’ that run on the autonomous vehicle during flight and manipulate the high-level autonomous behavior of the vehicle. The developer console is an application (e.g., a web app) used by developers to manage the skills they have created (e.g., invite users, deploy new code, etc.), test developed skills in simulation environments (e.g., a rendered three-dimensional (3D) environment with a physics engine representing the actual behavior of the autonomous vehicle while running the developers' skill). Example Implementation of an Autonomous Vehicle FIG. 1A FIG. 1A FIG. 1A 100 100 100 110 112 114 115 100 104 116 shows an example configuration of a UAV within which certain techniques described herein may be applied. As shown in , UAV may be configured as a rotor-based aircraft (e.g., a “quadcopter”). The example UAV includes propulsion and control actuators (e.g., powered rotors or aerodynamic control surfaces) for maintaining controlled flight, various sensors for automated navigation and flight control , and one or more image capture devices and for capturing images of the surrounding physical environment while in flight. “Images,” in this context, include both still images and capture video. Although not shown in , UAV may also include other sensors (e.g., for capturing audio) and systems for communicating with other devices (e.g., a mobile device ) via a wireless communication channel . FIG. 1A 114 115 102 100 100 104 In the example depicted in , the image capture devices and/or are depicted capturing an object in the physical environment that happens to be a person. In some cases, the image capture devices may be configured to capture images for display to users (e.g., as an aerial video platform) and/or, as described above, may also be configured for capturing images for use in autonomous navigation. In other words, the UAV may autonomously (i.e., without direct human control) navigate the physical environment, for example, by processing images captured by any one or more image capture devices. While in autonomous flight, UAV can also capture images using any one or more image capture devices that can be displayed in real time and or recorded for later display at other devices (e.g., mobile device ). FIG. 1A FIG. 1A FIG. 2 FIG. 1A 100 100 114 100 114 100 100 114 100 100 shows an example configuration of a UAV with multiple image capture devices configured for different purposes. In the example configuration shown in , the UAV includes multiple image capture devices arranged about a perimeter of the UAV . The image capture devices may be configured to capture images for use by a visual navigation system in guiding autonomous flight by the UAV and/or a tracking system for tracking other objects in the physical environment (e.g., as described with respect to ). Specifically, the example configuration of UAV depicted in includes an array of multiple stereoscopic image capture devices placed around a perimeter of the UAV so as to provide stereoscopic image capture up to a full 360 degrees around the UAV . 114 100 115 115 114 115 114 FIG. 1A In addition to the array of image capture devices , the UAV depicted in also includes another image capture device configured to capture images that are to be displayed but not necessarily used for navigation. In some embodiments, the image capture device may be similar to the image capture devices except in how captured images are utilized. However, in other embodiments, the image capture devices and may be configured differently to suit their respective roles. 115 114 In many cases, it is generally preferable to capture images that are intended to be viewed at as high a resolution as possible given certain hardware and software constraints. On the other hand, if used for visual navigation and/or object tracking, lower resolution images may be preferable in certain contexts to reduce processing load and provide more robust motion planning capabilities. Accordingly, in some embodiments, the image capture device may be configured to capture relatively high resolution (e.g., 3840×2160) color images while the image capture devices may be configured to capture relatively low resolution (e.g., 320×240) grayscale images. 100 102 114 115 100 115 100 100 100 115 102 100 115 100 115 115 115 100 The UAV can be configured to track one or more objects such as a human subject through the physical environment based on images received via the image capture devices and/or . Further the UAV can be configured to track image capture of such objects, for example, for filming purposes. In some embodiments, the image capture device is coupled to the body of the UAV via an adjustable mechanism that allows for one or more degrees of freedom of motion relative to a body of the UAV . The UAV may be configured to automatically adjust an orientation of the image capture device so as to track image capture of an object (e.g., human subject ) as both the UAV and object are in motion through the physical environment. In some embodiments, this adjustable mechanism may include a mechanical gimbal mechanism that rotates an attached image capture device about one or more axes. In some embodiments, the gimbal mechanism may be configured as a hybrid mechanical-digital gimbal system coupling the image capture device to the body of the UAV . In a hybrid mechanical-digital gimbal system, orientation of the image capture device about one or more axes may be adjusted by mechanical means, while orientation about other axes may be adjusted by digital means. For example, a mechanical gimbal mechanism may handle adjustments in the pitch of the image capture device , while adjustments in the roll and yaw are accomplished digitally by transforming (e.g., rotating, panning, etc.) the captured images so as to effectively provide at least three degrees of freedom in the motion of the image capture device relative to the UAV . FIG. 2 FIG. 1A 120 100 120 120 is a block diagram that illustrates an example navigation system that may be implemented as part of the example UAV described with respect to . The navigation system may include any combination of hardware and/or software. For example, in some embodiments, the navigation system and associated subsystems, may be implemented as instructions stored in memory and executable by one or more processors. FIG. 2 FIG. 2 FIG. 2 120 130 100 140 140 140 120 120 As shown in , the example navigation system includes a motion planning system for autonomously maneuvering the UAV through a physical environment and a tracking system for tracking one or more objects in the physical environment. The tracking subsystem may include one or more subsystems such as an object detection subsystem, an instance segmentation subsystem, an identity recognition subsystem, and any other subsystems (all not shown). The purposes of such subsystems are described in more detail later. Note that the arrangement of systems shown in is an example provided for illustrative purposes and is not to be construed as limiting. For example, in some embodiments, the tracking system may be completely separate from the navigation system . Further, the subsystems making up the navigation system may not be logically separated as shown in . 130 140 114 115 112 170 170 120 140 170 100 In some embodiments, the motion planning system , operating separately or in conjunction with the tracking system , is configured to generate a planned trajectory through a three-dimensional (3D) space of a physical environment based, for example, on images received from image capture devices and/or , data from other sensors (e.g., IMU, GPS, proximity sensors, etc.), one or more control inputs from external sources (e.g., from a remote user, navigation application, etc.), and/or one or more specified navigation objectives. As will be described in more detail, the control inputs may include calls to an API associated with navigation system . For example, API calls may be made by an application for setting one or more navigation objectives as part of the motion planning process. Navigation objectives will be described in more detail later, but may include, for example, avoiding collision with other objects and/or maneuvering to follow a particular object (e.g., an object tracked by tracking system ). In some embodiments, the generated planned trajectory is continuously or continually (i.e., at regular or irregular intervals) updated based on new perception inputs (e.g., newly captured images) and/or new control inputs received as the UAV autonomously navigates the physical environment. 120 100 130 110 100 120 160 110 In some embodiments, the navigation system may generate control commands configured to cause the UAV to maneuver along the planned trajectory generated by the motion planning system . For example, the control commands may be configured to control one or more control actuators (e.g., rotors and/or control surfaces) to cause the UAV to maneuver along the planned 3D trajectory. Alternatively, a planned trajectory generated by the motion planning system may be output to a separate flight controller system that is configured to process trajectory information and generate appropriate control commands configured to control the one or more control actuators . 140 130 114 115 112 170 The tracking system , operating separately or in conjunction with the motion planning system , may be configured to track one or more objects in the physical environment based, for example, on images received from image capture devices and/or , data from other sensors (e.g., IMU, GPS, proximity sensors, etc.), one or more control inputs from external sources (e.g., from a remote user, navigation application, etc.), and/or one or more specified tracking objectives. Again, in some embodiments, tracking objectives may be set based on API calls from an application, for example, based on user inputs received through the application. Tracking objects will be described in more detail later, but may include, for example, a designation by a user to track a particular detected object in the physical environment or a standing objective to track objects of a particular classification (e.g., people). 140 130 100 140 130 As alluded to above, the tracking system may communicate with the motion planning system , for example, to maneuver the UAV based on measured, estimated, and/or predicted positions, orientations, and/or trajectories of objects in the physical environment. For example, the tracking system may communicate a navigation objective to the motion planning system to maintain a particular separation distance to a tracked object that is in motion. 140 130 152 114 115 100 100 152 100 140 115 115 100 140 115 115 100 114 115 152 150 FIG. 2 In some embodiments, the tracking system , operating separately or in conjunction with the motion planner , is further configured to generate control commands configured to cause one or more stabilization/tracking devices to adjust an orientation and/or position of any image capture devices / relative to the body of the UAV based on the motion of the UAV and/or the tracking of one or more objects. Such stabilization/tracking devices may include a mechanical gimbal or a hybrid digital-mechanical gimbal, as previously described. For example, while tracking an object in motion relative to the UAV , the tracking system may generate control commands configured to adjust an orientation of an image capture device so as to keep the tracked object centered in the field of view (FOV) of the image capture device while the UAV is in motion. Similarly, the tracking system may generate commands or output data to a digital image processor (e.g., that is part of a hybrid digital-mechanical gimbal) to transform images captured by the image capture device to keep the tracked object centered in the FOV of the image capture device while the UAV is in motion. The image capture devices / and associated stabilization/tracking devices are collectively depicted in as an image capture system . 100 120 100 100 120 2600 2700 120 140 2600 2700 FIG. 1A FIG. 2 FIG. 1A FIG. 2 FIG. 26 FIG. 27 The UAV shown in and the associated navigation system shown in are examples provided for illustrative purposes. A UAV in accordance with the present teachings may include more or fewer components than are shown. Further, the example UAV depicted in and associated navigation system depicted in may include or be part of one or more of the components of the example UAV system described with respect to and/or the example computer processing system described with respect to . For example, the aforementioned navigation system and associated tracking system may include or be part of the UAV system and/or processing system . 100 100 100 100 114 100 100 100 115 102 100 100 FIG. 1A FIG. 1B FIG. 1A FIG. 1B FIG. 1A FIG. 1B b b b b b b b b While the introduced technique for objective-based control of an autonomous vehicle using an API is described in the context of an aerial vehicle such as the UAV depicted in , such a technique is not limited to this context. The described technique may similarly be applied to guide navigation and image capture by other types of vehicles (e.g., fixed-wing aircraft, automobiles, watercraft, etc.), hand-held image capture devices (e.g., mobile devices with integrated cameras), or to stationary image capture devices (e.g., building mounted security cameras). For example, shows an example of a fixed-wing UAV . Similar to the UAV described with respect to , the fixed-wing UAV shown in may include multiple image capture devices arranged about a perimeter of the UAV configured to capture images for use by a visual navigation system in guiding autonomous flight by the UAV . The example fixed-wing UAV may also include a subject image capture device configured to capture images (e.g., of subject ) that are to be displayed but not necessarily used for navigation. For simplicity, embodiments of the introduced technique are described herein with reference to the UAV of ; however, a person having ordinary skill in the art will recognize that the introduced technique can be similarly applied using the fixed-wing UAV of . Objective-Based Control of an Autonomous Vehicle Using an API 120 100 100 FIGS. 4-11 FIGS. 4-11 The complex processing by a navigation system to affect the autonomous behavior of a UAV can be abstracted into one or more behavioral objectives. A “behavioral objective” or “objective” in this context generally refers to any sort of defined goal or target configured to guide an autonomous response by the UAV . For example, objectives may be configured to approximate certain intentions of a human pilot. will describe some example “objectives” within the meaning of this term as used herein. It shall be appreciated that the example objectives described with respect to are provided for illustrative purposes and are not to be construed as limiting. A system in accordance with the present discloser may be based on fewer or more objectives than are described. 120 100 120 130 140 120 302 114 115 112 170 300 1 FIG. 3 FIG. 2 FIG. 2 FIG. 3 The underlying processes performed by a navigation system for causing a UAV to autonomously maneuver through an environment and/or perform image capture can be exposed through an API. For example, shows a diagram of navigation system including a motion planning component and tracking component , for example, as described with respect to . As previously discussed with respect to , the navigation system may generate control outputs such as a planned trajectory, specific control commands, and or image capture outputs based on perception inputs received from sensors (e.g., image capture devices / and/or other sensors ) as well as one or more control inputs . In the context of the diagram of , such control inputs may be in the form of calls to an API defining parameters of one or more objectives through N. 300 100 120 100 120 120 As will be described in more detail, the API may be configured as a public facing API that may be utilized by a developer to create applications configured to enable certain user interactions with the UAV without specific knowledge of the underlying processes of the navigation system that enable autonomous behavior by the UAV . In some cases, the developer creating such applications may be a “second-party” or “third-party” developer, meaning that the developer may be an entity other than the original developer of the navigation system (or one or more internal components of the navigation system ). World-Relative Objectives 100 100 115 In some embodiments, an objective may be expressed in terms relative to the physical environment in which the UAV resides. Such objectives are referred to herein as “world-relative” objectives. An example of a world-relative navigation objective may include maneuvering the UAV to a specific location in the physical environment. Similarly, a “world-relative” image capture objective may include positioning the UAV and an associated image capture device so as to capture a specific location in the physical environment. FIG. 4 402 404 100 shows a view of a map of a physical environment. A specific location in the physical environment is indicated at marker . In this example, the location may be defined based on a global positioning coordinate (e.g., latitude, longitude), however other types of location indicators may similarly be applied. For example, locations in the physical environment may similarly be defined based on a local coordinate system (e.g., a grid coordinate for a particular city), position/orientation coordinate relative to a takeoff point of the UAV (i.e., a navigation coordinate), other types of location identifiers (e.g., a mailing address), a name of a point of interest (e.g., the Golden Gate Bridge) at a known location, and the like. 120 100 300 100 100 130 120 100 404 FIG. 4 A target of a world-relative objective may be expressed based on any of the above-mentioned types of location indicators. For example, a world-relative objective in the form of a GPS coordinate (e.g., 37.40, −122.16) may be input into the navigation system of UAV (e.g., in the form of a call to API ) to cause the UAV to autonomously maneuver through the physical environment to the designated location and/or direct image capture at the designated location. Note that shows an indirect path (as indicated by the dotted line) between a current position of the UAV and the location designated by the world-relative objective. Such an indirect path may be based on a planned trajectory generated by a motion planning component of the navigation system to autonomously maneuver the UAV to the designated location while satisfying other objectives such as avoiding obstacles, maintaining visual contact with a subject, etc. 300 120 100 100 World-relative objectives are described above as being defined based on locations in the physical environment, however they may similarly include other defining parameters such as relative motion (e.g., ground velocity or air velocity), altitude (expressed as a value above mean sea (MSL), above ground level (AGL), etc.), a separation distance to certain objects in the physical environment (e.g., lateral distance to a vertical surface such as a wall), etc. For example, a particular world-relative objective that incorporates multiple defined targets may be semantically expressed as “fly to grid coordinate 37.40, −122.16 while maintaining a velocity of 30 miles per hour and an altitude of at least 1000 AGL.” Similarly, this objective may be expressed as three independent world-relative objectives. As will be described, world-relative objective(s) may be provided as inputs (e.g., in the form of calls to API ) to the navigation system of the UAV to cause the UAV to autonomously maneuver in a manner that attempts to meet the objective(s) while taking into account other objectives (e.g., avoiding collision with other objects). Vehicle-Relative Objectives 100 115 100 In some embodiments, an objective may be expressed in terms relative to the vehicle itself (e.g., UAV ). For example, a vehicle-relative objective may include a target to move forward, backward, left, right, up, down, and/or rotate about one or more axes (e.g., yaw, pitch, roll, etc.) at some defined speed or acceleration (angular speed or acceleration in the case of rotation objectives). Similarly, a vehicle-relative objective may include a target to adjust the position and/or orientation of an image capture device relative to the body of the UAV , for example, through the use of a gimbal mechanism. FIG. 5 100 502 115 Vehicle-relative objectives may be defined based on a vehicle-relative coordinate system. For example, depicts a representative view of an example UAV and a multi-dimensional coordinate system upon which lateral motion (e.g., along X, Y, and Z axes) and rotational motion (e.g., about the X, Y, and Z axes) can be defined. Similar coordinate system may be defined relative to the image capture device for defining image capture objectives. 300 120 100 100 As an illustrative example, a vehicle-relative objective may be semantically expressed as “move forward (e.g., along the Y axis) at a constant ground speed of 3 miles per hour.” As with the world-relative objectives described above, vehicle-relative objective(s) may be provided as inputs (e.g., in the form of calls to API ) to the navigation system of the UAV to cause the UAV to autonomously maneuver in a manner that attempts to meet the objective(s) while taking into account other objectives (e.g., avoiding collision with other objects). Subject-Relative Objectives In some embodiments, an objective may be expressed in terms relative to some other physical object (i.e., a subject) in the physical environment. The “subject” in this context may include any type of object such as a person, an animal, a vehicle, a building, a landscape feature, or any other static or dynamic physical objects present in the physical environment. For example, a subject-relative navigation objective may include a target to move to and/or maintain a particular position and/or orientation relative to a tracked subject in the physical environment. Similarly, a subject-relative image capture objective to capture maneuver so as to capture images of the tracked subject in the physical environment. FIGS. 6A-6B 100 102 1 2 Subject-relative objectives may be defined, for example, in position/orientation terms based on values for an azimuth, elevation, range, height, azimuth rate between the vehicle and the tracked subject. For example, show side view and a top view (respectively) that illustrate how relative positioning between a UAV and a tracked subject (in this case a human subject ) can be defined in terms of an elevation angle θ, an azimuth angle θ, and a range value. 100 100 100 720 102 102 730 100 710 102 100 730 102 730 102 100 712 120 100 706 704 102 FIG. 7 FIG. 7 Subject-relative objectives may also include targets that are defined based on a semantic understanding of physical environment that the UAV and subject occupy. For example, a subject-relative objective may include a target to maintain a clear line of sight between the UV and the tracked subject. depicts an example scenario involving a UAV in flight over a physical environment while capturing images of a human subject . As shown in , at a current time, human subject is located on an opposite side of object from UAV ; however, as indicated by dotted line , a view of human subject from an image capture device onboard UAV is not occluded by object . If the human subject moves to a different position behind the object , the view of the human subject from the image capture device onboard the UAV may be occluded, as indicated by dotted line . Accordingly, to satisfy a subject-relative objective to maintain line of sight, a navigation system may cause the UAV to maneuver (e.g., along trajectory or ) to a different position such that the view of the human subject is no longer occluded. FIGS. 32-37 130 Certain techniques for tracking subjects in the physical environment are described later with respect to ; however, in some embodiments, a motion planning system may employ a specific technique described below in order to satisfy a subject-relative objective to maintain line of sight. FIG. 7 102 716 100 730 120 102 730 100 712 102 120 100 100 100 706 102 730 100 704 706 102 730 Consider again the scenario depicted in . Based on a predicted trajectory of human subject (as indicated by arrow ), and measured or estimated positions of the UAV and object , a navigation system may determine that the view of the human subject may become occluded by the object (assuming UAV remains stationary) as indicated by the obstructed line of sight line . Based on this predicted future state and a standing objective to maintain line of sight with subject , the navigation system may generate outputs (e.g., a predicted trajectory and/or control commands) configured to cause the UAV to maneuver to the UAV to satisfy the subject-relative objective. Here, the generated output may be configured to cause UAV to maneuver along a flight path to keep the view of human subject unobstructed. Note that in this example, simply avoiding a collision with object may not be sufficient to satisfy the objective. For example, if the generated output causes the UAV to maneuver along alternative flight path instead of , its view of human subject will become momentarily obstructed by object , thereby failing the objective. 130 100 706 704 100 120 100 102 120 100 100 102 120 100 The process applied by the motion planning system to maneuver the UAV along trajectory instead of in order to satisfy a line of sight objective may be based on a virtual line of sight in a computer-generated 3D model of the physical environment. As will be described the measured, estimated, and/or predicted motions of UAV and one or more tracked subjects may be based on localization within a computer-generated 3D model representative of the physical environment. The navigation system may then define a virtual line connecting virtual representations of the positions of the UAV and subject in the 3D model. Accordingly, a subject-relative objective to maintain line of sight can be interpreted with the navigation system as an objective to maneuver the UAV such that the virtual line of sight line does not intersect with a virtual representation of another physical object. This criterion may be specified with a certain level of tolerance (i.e., dead zone) to account for objects in motion. In other words, if UAV and/or subject are both in motion, it may be inevitable that at certain times the virtual line connecting their representations in the virtual map may intersect representations of other objects. However, if that intersection persists for more than a certain period of time (e.g., 1 second), the navigation system may respond by generating an output configured to cause UAV to maneuver to avoid the intersection. FIG. 7 710 100 102 720 102 710 102 730 730 712 100 102 120 100 100 706 704 102 In , the dotted line of sight may represent the virtual line of sight connecting the representations of UAV and subject within a virtual environment (i.e., the computer-generated 3D model) representing physical environment . As human subject begins to move within the physical environment, the virtual line connecting the virtual representations moves as well. If the human subject moves behind object , the virtual line within the 3D map will then intersect the corner of a virtual representation of physical object as indicated by dotted line . When this intersection occurs in the virtual environment, the subject-relative objective to maintain visual contact is no longer satisfied in the physical environment. Note that this may represent a state several seconds in the future based on a predicted motion of the UAV and/or subject . A current or predicted intersection of the virtual line of sight with a virtual representation of a physical object will therefore cause the navigation system to generate an output to configured to cause the UAV to maneuver to avoid the intersection. For example, the motion of the virtual line can be tracked and it may be determined that in order to avoid the intersection, UAV should maneuver along flight path as opposed to flight path to keep the view of subject unobstructed. 100 100 100 100 100 100 102 730 1030 712 730 100 730 102 706 712 100 706 712 102 102 FIG. 7 In some situations, intersection points along a virtual line can be analyzed differently depending on their distance to the UAV . This may be based on an assumption that motion by a UAV generally has a greater impact on resolving visual occlusions caused by objects that are closer to the UAV . This assumption may depend on the size and/or shape of the obstructing object; however, in general, relatively minor maneuvers by UAV may be sufficient to maintain line of sight with a subject around an object that is close to UAV . Conversely, more drastic maneuvers by UAV may be necessary to maintain line of sight around an object that is closer to subject . This makes sense when again considering the scenario described in . Although described as a single object , the virtual representation of object can also be described as multiple surfaces that intersect the virtual line at multiple points. For example, obstructed line of sight line intersects a first surface of object that faces UAV at a first point and a second surface of object that faces a future position of subject at a second point. A minor maneuver along flight path may be sufficient such that sight line no longer intersects the first surface (i.e., the surface closest to UAV ) at the first point. However, a more extended maneuver along flight path may be necessary before sight line no longer intersects the second surface (i.e., the surface closest to subject ) at the second point, thereby establishing line of sight with subject . 120 100 100 100 In some embodiments, a subject-relative objective such maintaining line of sight may be built into the navigation system as a core objective (e.g., similar to avoiding collisions), for example, to comply with a flight regulation. For example, a UAV may be subject to a regulation that requires a human operator to maintain visual line of sight with the UAV . A simple control restraint on separation distance (i.e., range) between a subject (i.e., the human operator) and the UAV may suffice to an extent but will not ensure that visual line of sight is maintained. Instead, the above described technique for maintaining line of sight can be utilized. Subject-relative objectives may also apply to multiple simultaneously tracked subjects. In some cases, this may be accomplished by inputting multiple objectives (relative to each tracked subject) into the navigation system and allowing the navigation system to generate a planned trajectory to satisfy as many of the input subject-relative objectives as possible along with any other objectives (e.g., avoid collisions). Alternatively, or in addition, a single objective relative to multiple tracked subjects may be input contemplated. For example, a subject-relative objective may be defined relative to an average position and/or orientation of multiple tracked subjects in a scene. Image-Relative Objectives 114 115 100 114 115 114 115 114 115 In some embodiments, an objective may be expressed in terms relative to images captured by one or more image capture devices / onboard the UAV . For example, an image-relative objective may be defined to keep certain tracked objects within an FOV of an image capture device /, keep certain tracked objects at a particular position in FOV of the image capture device /, keep the horizon at a particular position/orientation relative to the image capture device / etc. FIG. 8 FIG. 8 FIG. 8 802 114 115 102 102 802 102 depicts an example image captured (e.g., by an image capture device /) of an object (e.g., a human subject ). As suggested in , an image-relative objective may include a target, for example, to keep the depiction of the tracked human subject at a particular coordinate in the image space of the captured image . In the example scenario depicted in , a target normalized image space coordinate for the subject may be defined as (0.5, 0.7) with corresponding dead zones of 0.2 in the y direction and 0.7 in the x direction. 100 114 115 100 In order to satisfy certain image-relative objectives, a computing system associated with UAV may process images received from the image capture devices / onboard the UAV to perform an image space analysis of certain objects (e.g., a tracked subject or the horizon) detected in the captured images. Semantic-Based Objectives 100 In some embodiments, objectives may be based on semantic understanding of the physical environment. Examples of such objectives may include avoiding backlighting by the sun, maintaining scene saliency (e.g., focusing on “interesting” objects or image regions), avoiding dangerous or critical areas, tracking certain classes of objects (e.g., people vs. animals), tracking objects performing a certain activities (e.g., people running vs. standing still), landmark reasoning (e.g., avoiding obfuscation of a tracked object), overall scene understanding (e.g., capturing an image of one object approaching another object), and the like. It shall be appreciated that these are only a few example semantic-based objectives provided for illustrative purposes, and are not to be construed as limiting. The types of semantic-based objectives that may be implemented may only be limited by the extent to which a computing system associated with the UAV is able to gain a semantic understanding of the physical environment and the multiple objects occupying the physical environment. FIG. 9 FIG. 9 100 920 102 102 950 100 950 102 102 910 102 950 950 100 950 shows an example scenario that illustrates a semantic-based objective including a target that avoids backlighting by the sun when capturing images of a tracked object. As shown in , a UAV is in autonomous flight over a physical environment while tracking and capturing images of a particular object (in this case human subject ). The human subject is lit by a light source (in this example the Sun) from one side. Here, UAV is shown at a current location (as indicated by the solid line quadcopter) opposite the light source relative to the human subject . At this current position, images captured of human subject (for example within FOV ) are likely to be devoid of much detail of human subject due to the shadow cast by the light source . In the case of a powerful light source such as the Sun, the captured images may be completely washed out due to over exposure, particularly if the image capture device associated with UAV is oriented so as to be pointed substantially in the direction of the light source . 120 100 102 102 100 950 102 120 100 904 100 950 102 100 102 950 114 115 100 100 100 102 FIG. 9 Subjectively, backlighting during image capture is generally understood to result in poor quality images. Accordingly, in some embodiments, a semantic-based objective may be configured to avoid backlighting. To satisfy such an objective, a navigation system may generate an output (e.g., control commands or a planned trajectory) configured to cause the UAV to autonomously position itself substantially between certain light sources (e.g., the Sun) and a tracked subject when capturing images of the tracked subject . Consider again the scenario depicted in . Since UAV is located opposite a major light source while capturing images of subject , in order to satisfy a specified objective, a navigation system may generate control an output configured to cause UAV to autonomously maneuver along flight path until, at a future time, UAV is located substantially between light source and subject (as indicated by the dotted line quadcopter). A method for generating such an output may include, in addition to estimating the motions of UAV and subject , also estimating a position of a light source . This may be accomplished in a number of ways for example, by processing images captured by an image capture device / associated with UAV and/or based on localization data of known light sources (e.g., the Sun). Given global positioning information for UAV and the current date/time, a localization system can determine if UAV is pointed towards the Sun while capturing images of a subject . In some embodiments, a semantic-based objective may include a target to capture images of “interesting” objects in the physical environment. This may be generally referred to as scene or visual saliency. The attention of humans and certain other animals tends to be attracted to visually salient stimuli. Visually salient stimuli may be based, for example, on the closest object roughly centered in an FOV, an object in motion, an object performing a certain activity of interest, etc. 100 100 100 1020 1020 102 102 FIG. 10 b a What is deemed “interesting” or visually salient may of course differ depending on the context in which the UAV is operating. As an illustrative example, an objective may be configured to cause a UAV track and capture images of a particular class of object (e.g., people) and/or of a particular type of activity. For example, shows an example scenario involving a UAV in autonomous flight through a physical environment . In this example scenario, an objective may be configured to track and capture images of people that are skiing. Successfully satisfying such an objective may require detection of objects in the physical environment as well as a semantic understanding of the scene in order to distinguish a person that is standing still or performing some other activity (e.g., walking) from a person that is skiing. 100 102 102 100 100 100 1002 102 102 102 a a a a a FIG. 10 In order to satisfy the objective, a navigation system may generate an output (e.g., control commands or a planned trajectory) configured to cause the UAV to follow a person skiing (when detected) and focus image capture on that person . In some embodiments, the UAV may simply follow the tracked object at a set distance. Alternatively, or in addition, the UAV may execute maneuvers in order to add a dynamic quality to the captured images. For example, as shown in , the UAV may autonomously maneuver along a path to capture the skier at different angles as the skier continues down the slope. In some cases, such maneuvers may be based on pre-scripted flying patterns that are triggered when a particular object (e.g., a skier ) is detected. Alternatively, or in addition, flight paths that provide “interesting” shots may be learned by the system over time by applying machine learning. FIG. 10 100 100 The scenario depicted in is provide for illustrative purposes and is not to be construed as limiting. Another example semantic-based objective for visual salience may include a target tracking and capturing images of a key individual in a team sporting event. Consider for example, a football game involving two teams, each with multiple players. To capture images of the game, a semantic-based objective may be configured to cause a UAV to track and capture images of an object of interest such as the football, a player in current possession of the football, a player with imminent possession of the football (e.g., a receiver about to catch the football), the end zone, a referee, the coach, etc. Over the course of the game, the object or set of objects of interest will likely change from one moment to the next. Again, the manner in which the UAV responds to satisfy the objective may be based on pre-scripted patterns of motion and image capture or may be learned, for example, by analyzing professional television broadcasts of sporting events. High-Level Behavioral Objectives Certain objectives may be based around high-level behavior such as maintaining a certain dynamic smoothness in proposed trajectories, avoiding exceeding dynamic airframe constrains, avoiding obstacle collisions, prioritizing avoiding collisions with certain classes of objects (e.g., people), avoiding running out of storage space for image capture, avoiding running out of power, etc. FIG. 11 FIG. 11 FIG. 11 FIG. 11 FIG. 11 100 100 1120 102 100 1104 1130 102 1110 1130 100 102 120 100 1104 1130 102 1110 120 As an illustrative example, depicts an example scenario involving a UAV with a high-level behavioral objective to avoid collisions with other objects. In the scenario depicted in , a UAV is in flight through a physical environment while capturing images of a human subject . As shown in , UAV may be in autonomous flight along a current planned flight path to maneuver to avoid a collision with another object in the physical environment while keeping human subject in view (as indicated by FOV lines ). The example illustrated in is idealized and shows a relatively large stationary object (for example a building or other structure), but the same concept may apply to avoid smaller mobile objects such as a bird in flight. As shown in , based on the estimated motions of UAV and subject , a navigation system may generate an output (e.g., control commands or a planned trajectory) to maneuver UAV along flight path to avoid object while keeping human subject in view (as indicated by FOV lines ). Notably, this scenario illustrates a combination of multiple objectives, specifically maintaining line of sight with a tracked subject (as previously discussed) while avoiding collision. As will be discussed further, the multiple objectives may be weighted differently such that a navigation system favors satisfying one objective (e.g., avoiding collision) over another (e.g., maintaining line of sight with a tracked subject) if both cannot be satisfied concurrently. 100 100 100 Another example high-level behavioral objective may include autonomously landing the UAV when a power source (e.g., batteries) powering a propulsion system (e.g., the rotors) is at or below a threshold level of power (e.g., charge). For example, in some embodiments, if the batteries on the UAV get below a certain threshold level (e.g., 5% charge), the UAV may automatically land on the ground regardless of any other active objectives so as to avoid a loss of control and possible crash. 100 Another example high-level objective may include smoothing proposed trajectories. In many situations, particularly when performing image capture, abrupt changes in the direction of flight of the UAV may not be preferred. Accordingly, in some embodiments, a navigations system may incorporate a high-level objective to maintain a certain smoothness in any generated planned trajectory. 100 120 300 130 As suggested by the aforementioned examples, some of these high-level behavioral objectives may be based around ensuring safe autonomous operation of the UAV . In some cases, such objectives may be built into a motion planning process of a navigation system so as to always be actively considered when generating a planned trajectory. In other words, regardless of any objectives received through calls to the API , the motion planning system of the navigations system may always take into account certain built-in objectives such as obstacle avoidance, dynamic airframe constraints. Objective-Based Motion Planning Using an API 120 130 100 130 100 100 b In some embodiments, a navigation system (e.g., specifically a motion planning component ) is configured to incorporate multiple objectives at any given time to generate an output such as a planned trajectory that can be used to guide the autonomous behavior of the UAV . The motion planning component can take into consideration the dynamic constraints of the aircraft when generating outputs such as proposed trajectories. For example, given a similar set of objectives, a planned trajectory for a quadcopter UAV such as UAV may be different than a planned trajectory for a fixed-wing UAV such as the UAV due to the different flight capabilities of the two craft. 160 100 130 100 The trajectory generation process can include gradient-based optimization, gradient-free optimization, sampling, end-to-end learning, or any combination thereof. The output of this trajectory generation process can be a planned trajectory over some time horizon (e.g., 10 seconds) that is configured to be interpreted and utilized by a flight controller to generate control commands that cause the UAV to maneuver according to the planned trajectory. A motion planning system may continually perform the trajectory generation process as new perception inputs (e.g., images or other sensor data) and objective inputs are received. Accordingly, the planned trajectory may be continually updated over some time horizon thereby enabling the UAV to dynamically and autonomously respond to changing conditions. FIG. 12 FIG. 12 FIG. 2 130 1220 1206 1206 114 115 112 100 104 100 1202 1208 shows a block diagram that illustrates an example system for objective-based motion planning using an API. As shown in , a motion planning system (e.g., as discussed with respect to ) may generate and continually update a planned trajectory based on trajectory generation process involving one or more objectives (e.g., as previously described) and or more perception inputs . The perception inputs may include images received from one or more image capture devices /, results of processing such images (e.g., disparity images or depth values), and or sensor data from one or more other sensors onboard the UAV or associated with other computing devices (e.g., mobile device ) in communication with the UAV . The one or more objectives utilized in the motion planning process may include built-in objectives governing high-level behavior (e.g., avoiding collision with other objects) as well as objectives based on inputs . 1208 300 1210 100 100 300 1210 100 1202 130 100 100 1210 300 1204 300 104 1210 100 104 100 The objective inputs may be in the form of calls to an API by one or more applications associated with the UAV . An “application” in this context may include any set of instructions for performing a process to control or otherwise alter the behavior of the UAV through an API . A developer (e.g., a third-party developer) can configure an application to send a command to the UAV while in flight over a network API to alter one or more of the objectives utilized by the motion planning system to alter the behavior of the UAV . As previously noted, the UAV may be configured to maintain safe flight regardless of commands sent by an application. In other words, an application may not have access via the API to alter certain core built-in objectives such as obstacle avoidance. The API can therefore be used to implement applications such as a customize vehicle control, for example, through the use of a user computing device such as a mobile device . Such applications may be stored in a memory associated with the UAV and/or stored in a memory of another computing device (e.g., mobile device ) that is in communication (e.g., wireless communication) with the UAV . 1202 130 1202 1210 300 1210 100 1208 300 Each of the objectives may be encoded as equations for incorporation in one or more motion planning equations utilized by the motion planning system when generating a planned trajectory to satisfy the one or more objectives. Parameterization for the one or more objectives may be exposed to external entities such as external applications via the public facing API . In other words, an application may set values for certain objectives to affect the autonomous flight of the UAV through the use of calls to the API . 1202 1302 1304 1306 1308 1310 FIG. 13 Each given objective of the set of one or more objectives utilize in the motion planning process may include one or more defined parameterizations that are exposed through the API. For example, shows an example objective that includes a target , a dead-zone , a weighting factor , and other parameters . 1304 130 1220 1304 1304 FIG. 7 FIGS. 4-11 The target defines the goal of the particular objective that the motion planning system will attempt to satisfy when proposing a trajectory . For example, the target of a given objective may be to maintain line of sight with one or more detected objects in the physical environment as described with respect to . The target may similarly be associated with any of the other example objectives described with respect to . 1304 130 1306 1304 102 802 102 FIG. 8 FIG. 8 FIG. 8 The dead-zone defines a region around the target in which the motion planning system may not take action to correct. This dead-zone may be thought of as a tolerance level for satisfying a given target . For example, shows an example dead-zone definition in the context of an image-relative objective. As shown in , the target of the example image-relative objective may be to maintain image capture of a tracked object such that the tracked object appears at a coordinate of (0.5, 0.7) in the image space of the captured image . To avoid continuous adjustments based on slight deviations from this target, a dead-zone is defined to allow for some tolerance. For example, as shown in , a dead-zone of 0.2 is defined in the y-direction and a dead-zone of 0.7 is defined in the x-direction. In other words, as long as the tracked object appears within an area of the image bounded by the target and respective dead-zones, the objective is considered satisfied. 1306 1302 130 1302 1202 130 1220 130 100 130 1202 130 The weighting factor (also referred to as an “aggressiveness” factor) defines a relative level of impact the particular objective will have on the overall trajectory generation process performed by the motion planning system . Recall that a particular objective may be one of several objectives that may include competing targets. In an ideal scenario, the motion planning system will generate a planned trajectory that perfectly satisfies all of the relevant objectives at any given moment. For example, the motion planning system may generate a planned trajectory that maneuvers the UAV to a particular GPS coordinate while following a tracked object, capturing images of the tracked object, maintaining line of sight with the tracked object, and avoiding collisions with other objects. In practice, such an ideal scenario may be rare. Accordingly, the motion planning system may need to favor one objective over another when the satisfaction of both is impossible or impractical (for any number of reasons). The weighting factors for each of the objectives define how they will be considered by the motion planning system . 130 130 1210 In an example embodiment, a weighting factor is numerical value on a scale of 0.0 to 1.0. A value of 0.0 for a particular objective may indicate that the motion planning system can completely ignore the objective (if necessary), while a value of 1.0 may indicate that the motion planning system will make a maximum effort to satisfy the objective while maintaining safe flight. A value of 0.0 may similarly be associated with an inactive objective and may be set to zero, for example, in response to toggling by an application of the objective from an active state to an inactive state. Low weighting factor values (e.g., 0.0-0.4) may be set for certain objectives that are based around subjective or aesthetic targets such as maintaining visual saliency in the captured images. Conversely, higher weighting factor values (e.g., 0.5-1.0) may be set for more critical objectives such as avoiding a collision with another object. 1308 100 100 100 In some embodiments, the weighting factor values may remain static as a planned trajectory is continually updated while the UAV is in flight. Alternatively, or in addition, weighting factors for certain objectives may dynamically change based on changing conditions, while the UAV is in flight. For example, an objective to avoid an area associated with depth value calculations in captured images (e.g., due to low light conditions) may have a variable weighting factor that increases or decreases based on other perceived threats to the safe operation of the UAV . In some embodiments, an objective may be associated with multiple weighting factor values that change depending on how the objective is to be applied. For example, a collision avoidance objective may utilize a different weighting factor depending on the class of a detected object that is to be avoided. As an illustrative example, the system may be configured to more heavily favor avoiding a collision with a person or animal as opposed to avoiding a collision with a building or tree. 1210 1208 300 300 1210 In some embodiments, a notification is returned to an API caller (e.g., an application ) in the event that an objective is requested (e.g., via a call to an API ), but not satisfied (e.g., due to competing objectives, vehicle constraints, or other reasons). The API may provide an endpoint for providing this notification so that the caller (e.g., an application ) can take appropriate action such as notifying a user, adjusting the requested objective, etc. Applications and Skills 1210 300 100 100 100 100 100 100 100 As previously discussed, applications (e.g., applications ) can be built using a development platform and the associated development tools offered by the platform (e.g., a public facing API ) to augment the behavior of a UAV and/or an experience of a user interacting with the UAV . In some embodiments, particularly in the context of a UAV with image capture capabilities, applications can be developed around sets of instructions and assets that enable high-level autonomous behavior by the UAV . These instructions and/or assets may govern various aspects of the behavior of the UAV , the capture and processing of images by the UAV , and user interactions with the UAV . Certain sets of instructions and/or assets are referred to herein as “skills.” FIG. 14 1410 1 1420 1 1422 1 1424 1 1426 1 As shown in , an application may include one or more skills through M. Further, each skill may include instructions related to certain navigation or image capture objectives - through M, imaging effects -, visualizations - through M, and other features - through M. 1 1420 1 130 100 300 100 115 For example, with respect to skill , objective(s) - may include instructions for modifying the objectives utilized by a motion planning system of the UAV , for example, by generating calls to an API to set and/or modify certain parameters of one or more objectives. These instructions may govern the motion of the UAV as well as other behavioral aspects such as object tracking, adjusting the orientation of an image capture device , etc. 1422 1 114 115 Imaging effects - may include instructions and/or assets for processing images captured by an image capture device / to change the appearance of captured images. Imaging effects may include any manipulations made to the captured images such scaling, geometric transformations (2D and/or 3D), transparency operations, splicing and/or cropping, sharpening, color correction, contrast adjustment, filters, etc. For example, a developer may configure a skill to present options to a user to select various pre-defined imaging effects to apply in real time as the UAV is in flight and capturing images and/or as part of a post-production process. Alternatively, or in addition, a developer may configure a skill to automatically apply certain imaging effects (in real time or post-production) based on contextual cues in the captured images. For example, a skill may be configured to apply a particular imaging effect (e.g., a predefined filter) to captured images in response to detecting a tracking a particular class of object or activity in the captured images. 1422 1 1422 1 100 FIG. 26 Visualizations - may include instructions and/or assets for providing visual output to a user. For example, visualizations - may include augmented reality (AR) object descriptions that can be rendered in real-time or near-real-time (e.g., within milliseconds) to generate AR overlays that are displayed relative to tracked objects or other elements in the physical environment. An example of an augmented reality interface that may be implemented in conjunction with a UAV is described with respect to . 100 100 100 300 120 100 100 104 100 100 In some embodiments, the UAV may include onboard memory for storing one or more skills as well as a sandboxed execution environment executing the skills to modify the behavior of UAV . For example, the sandboxed execution environment may be configured such that executing skills impact the behavior of the UAV through calls to the API , but otherwise do not impact operation of the core navigations system . In this way, active skills can be safely changed on the fly while the UAV is in flight without negatively impacting the safe flight of the UAV . In some embodiments, skills may execute at an external device such as a mobile device and/or at an external data processing service such as a cloud-based computing environment utilizing multiple machines. In such cases, execution of the skills may generate outputs (e.g., control commands) that are then transmitted to the UAV (e.g., via a wireless communication link) to control certain behavior of the UAV . 100 104 100 Skills can be configured to handle certain inputs from external sources to govern any of the aforementioned behaviors of a UAV . For example, a skill can be configured to receive inputs from a mobile device (e.g., based on inputs by a user), from another UAV, from a cloud-computing services, or from any other external sources. Such inputs may cause the skill to govern behavior by the UAV such as maneuvers or additional objectives that reside in a null-space of a set of objectives specified by the skill and/or alterations of a set of active objectives associated with a skill, in their set-point, dead-zone, or weighting factor settings. 100 FIG. 26 In some embodiments, skills can be configured to include adjustable settings that can be set (e.g., based on input from a user via an application) while the UAV is in flight. For example, a skill based around tracking and capturing images of objects in the physical environment can be configured to respond to a user input identifying a particular object to track. Such a user input may be received via an interface similar to the AR interface described with respect to . 1410 1 100 104 100 100 FIG. 14 The example application depicted in may represent a third-party application developed by the same developer that has developed skills -M. In such an embodiment, the UAV and any associated mobile device may be configured to store and execute one or more different first-party and/or third-party applications, each of the applications including one or more skills that affect the behavior of the UAV . To change the autonomous behavior of the UAV , a user may select between the various applications. 1410 1410 100 1410 100 Alternatively, in some embodiments, application may represent a single application configured to implement the functionalities of one or more skills developed by different developers. For example, application may represent a first-party application developed by (or controlled by) a provider of UAV . In such an embodiment, the application may be configured to implement one or more different skills from different sources. The skills may be conceptualized as plugins or extensions to the application. As will be described in more detail, a user of the application (i.e., an end user of the UAV) may utilize an online “app store” to select or download skills or sets of skills (“skillsets”) that have been developed by various third-party developers to extend or otherwise modify the functionality of the UAV . Implementation of Applications and Skills at a UAV FIG. 15 FIG. 1A FIG. 15 1510 1530 100 104 100 120 120 120 100 1500 1500 300 shows a diagram illustrating an example implementation of an application including multiple skills in a system involving a UAV and an associated mobile device (e.g., similar to the system depicted in ). As shown in , and as explained previously, the UAV includes a navigation system . Perception, navigation, and flight control software may be encapsulated into navigation system which can be conceptualized as a black box “autonomy engine.” This navigation system exposes a set of objectives to control the behavior of the UAV during flight, for example, via an API . The API may be the same or similar to API described earlier. 1500 120 1532 1500 1532 1532 1500 120 The API can be conceptualized as a layer above the navigation system that exposes these objectives to one or more active skills . More specifically, the API exposes the objectives as a set of “knobs” to the active skill . To impact automated behavior, the active skill “turns” the exposed knobs, for example, by adjusting certain parameters (e.g., target, weight, etc.) associated with the objectives. Adjustments, by the active skill , of the objective knobs are input, via the API , as objective inputs to the navigation system to control automated behavior. 1510 1530 100 100 1530 1536 104 1530 1536 100 1532 100 1500 1510 1534 100 As implied above, a given application may include multiple skills including, for example, skills developed by a provider of the UAV and/or skills developed by a third-party developer. Interaction between a user and the UAV according to the one or more skills may be via an application graphical user interface (GUI) displayed via a mobile device such as a smart phone. At any given moment, one or more of the skills may be selected, for example, via user interaction with the application GUI to govern autonomous behavior by the UAV . These selected one or more skills are the active skills which impact the autonomous behavior of the UAV by turning the objective knobs exposed by the API . Accordingly, the application may also include one or more inactive skills at any given time that are not actively impacting the autonomous behavior of the UAV . 1536 1532 1536 100 1536 1530 In some embodiments, the application GUI changes based on the currently active one or more skills . For example, a user may select, via the application GUI , an “orbit subject” skill. In response to the selection, the “orbit subject” skill is set as the active skill impacting the autonomous behavior of the UAV . Further, the “orbit subject” skill may be associated with specific interactive graphical interface elements that are exposed to the user via the application GUI . Graphical interface elements specific to an “orbit subject” skill may include, for example, an interactive element to select a subject, an interactive element to set a rate of orbit about the selected subject, etc. These interactive graphical interface elements are specific to the selected skill. The interactive graphical interface elements will change in response to a user selecting a different skill from the one or more skills . The graphical interface elements can also be changed by a skill, while active, for example, in response to environmental factors or in response to detected events. For example, a new interactive graphical interface element (e.g., a button) may be displayed by an active skill in response to detecting an obstacle, human subjects, or other objects in the physical environment. 1510 100 104 1534 100 1536 1510 1530 104 1500 1530 104 FIG. 15 FIG. 15 The application is displayed in as spanning across both the UAV and the mobile device , with the skills located at the UAV and the GUI . This is just an example provided for illustrative purposes; the actual components of any given application may be organized differently in other embodiments and may be instantiated at more or fewer computing devices than is depicted in . For example, in some embodiments, the skills may be included in instructions in memory at the mobile device . In such an embodiment, the mobile device may be configured to wirelessly transmit calls to the API based on outputs by the skills at the mobile device . FIG. 16 FIG. 16 FIG. 16 1600 1600 1600 120 100 1600 1600 1600 shows a flow diagram of an example process for autonomously controlling an autonomous vehicle using one or more skills. Example process can be executed by any type of computer system associated with an autonomous vehicle. For example, process may be executed by a computer system associated with navigation system of UAV . In some embodiments, the example process depicted in may be represented in instructions stored in memory that are then executed by a processor. The process described with respect to is an example provided for illustrative purposes and is not to be construed as limiting. Other processes may include more or fewer steps than depicted, while remaining within the scope of the present disclosure. Further, the steps depicted in example process may be performed in a different order than is shown. 1600 1602 1500 130 120 1530 FIG. 15 Example process begins at step with exposing one or more variable parameters associated with a behavioral objective via an API (e.g., API ). As previously discussed, the behavioral objective may be one of multiple behavioral objectives that are applied by a motion planner associated with navigation system as part of a multi-objective trajectory generation process. As depicted in , the variable parameters can be exposed to one or more skills including skills developed by a third-party developer. 1600 1604 1 1510 1532 Example process continues at step with receiving, via the API, an input indicative of a request to adjust a particular variable parameter of the behavioral objective. As previously discussed, in some embodiments, this request may be in the form of a call to the API. In some embodiments, the request is received from an application executing at the autonomous vehicle (e.g., application ). In some embodiments, the request is from a particular software module of the application (e.g., active skill ). In some embodiments, the software module (i.e., skill) submitting the request may have been developed by a third-party developer that did not develop the application. In other words, the request may be from a custom extension or plugin of the application that was developed by a separate third-party developer. 1600 1606 1604 Example process continues at step with adjusting the variable parameter of the behavioral objective based on the request received at step . 1600 1608 114 115 112 100 104 100 Example process continues at step with receiving perception inputs from one or more sensors associated with the autonomous vehicle. The perception inputs may include images received from one or more image capture devices /, results of processing such images (e.g., disparity images or depth values), and or sensor data from one or more other sensors onboard the UAV or associated with other computing devices (e.g., mobile device ) in communication with the UAV . 1600 1610 FIG. 12 Example process continues at step with the processing perception inputs and the behavioral objective to generate a planned trajectory through a physical environment, for example, as discussed with respect to . In some embodiments, the planned trajectory is continually updated as the parameters of the one or more behavioral objectives are adjusted and/or as new perception inputs are received. 1600 1612 1610 Example process concludes at step with causing the autonomous vehicle to autonomously maneuver along the planned trajectory generated at step . FIG. 17 FIG. 17 FIG. 17 1700 1600 1700 104 1700 1700 1700 shows a flow diagram of an example process for controlling an autonomous vehicle using one or more skills. Example process can be executed by any type of computer system associated with an autonomous vehicle. For example, process may be executed by a computer system associated with a mobile device that is communicatively coupled to the autonomous vehicle. In some embodiments, the example process depicted in may be represented in instructions stored in memory that are then executed by a processor. The process described with respect to is an example provided for illustrative purposes and is not to be construed as limiting. Other processes may include more or fewer steps than depicted, while remaining within the scope of the present disclosure. Further, the steps depicted in example process may be performed in a different order than is shown. 1700 1702 1536 1510 104 116 100 FIG. 15 Example process begins at step with displaying a GUI at a user computing device. For example, as depicted in , an application GUI associated with application may be displayed at a mobile device that is communicatively coupled (e.g., via wireless communications interface ) to an autonomous vehicle such as UAV . 1702 1536 115 100 116 In some embodiments, the GUI displayed at step may include live video stream from a camera coupled to the autonomous vehicle. For example, application GUI may display images (including a live video stream) that are captured by an image capture device at UAV and received over a wireless communication link . 1700 1704 1536 1510 104 1530 2720 2720 FIG. 27 Example process continues at step with displaying, in the GUI, an interactive menu for selecting from multiple different available skills. For example, the application GUI associated with application may display an interactive menu that enables a user of mobile device to select from the multiple available skills . In some embodiments, each of the selectable skills depicted in the menu are associated with a different mode of operation of an autonomous vehicle. For example, menu depicted in includes multiple different modes of operations such as “boomerang,” “cablecam,” “follow,” “dronie,” “rocket,” and “spiral.” One or more of these modes of operation depicted in menu may be associated with a skill developed by a third-party developer. 1700 1706 104 104 Example process continues at step with receiving, via the interactive menu, a selection of a particular skill from the multiple available skills. For example, a user of mobile device may input the selection using an input device associated with mobile device such as a touch screen display. 1700 1708 1706 1532 1536 1534 FIG. 15 Example process continues at step with activating the particular skill based on the selection received at step . For example, as depicted in , an active skill may represent a skill that has been selected by a user via application GUI , while inactive skills represent the other available skills that have not been selected. 1700 1710 1536 1532 FIG. 15 Example process continues at step with updating the display of the GUI to include a particular interactive element associated with the particular skill in response to the activation. For example, as discussed with respect to , the application GUI will change to include certain interactive elements that are specified by the active skill . FIG. 17 1700 Although not depicted in the flow diagram of , in some embodiments, example process may further include generating an augmented reality element based on the selected particular skill and updating the GUI to display the augmented reality element. In embodiments where the GUI displays a live video stream from an image capture device coupled to the vehicle, the augmented reality element may be displayed over a portion of the live video stream. 1700 1712 Example process continues at step with detecting a user interaction with the particular interactive element in the GUI. 1700 1714 1536 104 100 116 1500 120 1532 1500 120 FIG. 15 Example process concludes at step with transmitting a command signal to the autonomous vehicle based on the detected interaction. For example, as described with respect to , in response to user interaction with application GUI , a command signal can be transmitted from mobile device to UAV , for example, over a wireless communication link . The command signal may be configured to cause a call to the API associated with navigation system . Specifically, the command signal may be configured to cause the corresponding active skill to generate the call to the API to adjust a parameter of a behavioral objective associated with a multi-objective trajectory generation process executed by the navigation system . Example Application and Skills Platform FIG. 18 FIG. 18 1820 1820 1840 1842 1844 1866 1840 1820 1808 1806 1806 104 1820 1830 1830 1832 1820 1834 1840 1850 1820 1860 1862 shows a diagram illustrating an example implementation of a platform for developing and/or distributing applications and skills. As shown in , the example platform includes a developer console that includes or is configured to enable access to a mobile SDK , a skills SDK , and one or more simulation environments . A developer may access the developer console of platform to develop applications and skills, for example, by utilizing a developer application or web browser at a developer device . The developer device may include any type of computing device such as personal computer, mobile device (e.g., mobile device ), etc. The platform may host one or more available skillsets that can be implemented at any number of UAVs. The available skillsets may include first-party skillsets developed by a provider of platform as well as third-party skillsets developed by third-party software developers, for example, through the use of the developer console . As will be described, UAV users may access new/updated applications and skillsets for use with their respective UAVs through an online store provided by platform . Selected applications and/or skills may be “delivered” to UAVs and/or mobile devices using configuration system and associated configuration database . 1820 1820 The platform may represent any combination of hardware and or/software for executing instructions to carry out the functionalities described herein. For example, the platform may be implemented using one or more network-connected server computer systems (physical and/or virtual) with associated non-transitory processor-readable storage media or other data storage facilities. For example, one or more databases for storing data (including metadata) maybe accessible to the server computer systems. Instructions for carrying out certain processes described herein may be implemented as software instantiated in a computer-readable medium or computer-readable storage medium on a machine, in firmware, in hardware, in a combination thereof, or in any applicable known or convenient device or system. This and other modules, sub-modules, or engines described in this specification are intended to include any machine, manufacture, or composition of matter capable of carrying out at least some of the functionality described implicitly, explicitly, or inherently in this specification, and/or carrying out equivalent functionality. 1820 1820 1820 In some embodiments, the platform comprises an internet-based web service and/or a cloud-computing service. For example, the platform may be implemented (at least partially) in instructions executed by computing entities in a cloud-computing environment. Such a cloud-computing environment may be hosted by a third-party cloud-computing provider. For example, Amazon™ offers cloud computing services as part of the Amazon™ Web Services (AWS) platform. One or more of the functionalities of the platform may be implemented using products and services associated with a cloud-computing platform such as AWS. In an illustrative embodiment, computing functionality is provided using virtual computing entities (e.g., Amazon™ EC2 virtual server instances and or Lambda event-based computing instances) executing across one or more physical computing devices and storage functionality is provided using scalable cloud-based storage (e.g., Amazon™ S3 storage) and/or managed databases, data warehouses, etc. (e.g., Amazon™ Aurora, Amazon™ DynamoDB, Amazon™ Redshift, Google™ Spanner, etc.). 1820 1820 1820 100 104 1806 Various users may use computing devices to interact with and access the services of the platform . Users, in this context, may include users of UAVs as well as developers of applications and/or skills to be implemented at UAVs. In some embodiments, computing devices may execute an application or “app” that communicates with the platform via any suitable communications interface. In some embodiments, interaction between an application instantiated at a computing device and the platform may be via one or more cloud APIs. Computing devices may include any number of types of devices configured to process data and communicate with other devices via a computing network. As previously discussed, computing devices may include UAVs , mobile devices , developer devices , and any other computing devices. FIG. 18 The various systems, subsystems, and/or processor-based devices described with respect to the system depicted in may be capable of communications via the one or more computer networks which may be, for instance, packet switched communications networks, such as the Internet, Worldwide Web portion of the Internet, extranets, intranets, and/or various other types of telecommunications networks such as cellular phone and data networks or channels, plain old telephone system (POTS) networks, etc. The type of communications infrastructure should not be considered limiting. 1842 100 104 100 1510 1842 The mobile SDK includes tools and/or resources to enable a third-party developer to develop third-party mobile applications or “apps” that can be implemented at a UAV and/or mobile device to govern autonomous behavior by the UAV . For example, application may be a third-party app developed using the mobile SDK . 1842 1832 1834 1844 1608 1830 1844 In some embodiments, a developer can bundle skills (pre-built or developer-created) in a third-party mobile application created using the mobile SDK . Skills bundled in a third-party application may include pre-built or packaged first-party skillsets , pre-built or packaged skillsets by other developers (e.g., third-party skillsets ), and or customized skillsets developed using the skills SDK . For example, using application , a developer can select and download skills and skillsets from the available skillsets , edit downloaded skills or skillsets, and/or write customized skillsets, for example, using libraries (e.g., python libraries) provided via the skills SDK . This enables a developer to ship several skills or skillsets to users via custom applications. 1842 1532 100 100 1536 1510 1532 1500 FIG. 15 In some embodiments, applications developed using the mobile SDK are configured to transmit remote procedure call (RPC) communications to an active skill running at a given UAV to govern autonomous behavior by the UAV . For example, in response to user input via an application GUI , an application may communicate with an active skill to adjust one or more objective knobs exposed by API (shown in ). 1510 1820 100 104 1820 1862 1862 1850 1510 1820 1860 1820 1510 1860 1510 1530 1510 1510 In some embodiments, applications (e.g., application ) are configured to pull configuration information from cloud API servers of platform . This configuration information may include, for example, settings, skillsets, available simulators, and other configurations that are specifically tailored to a given user of the application. In an illustrative example, a user of UAV and mobile device has an account with platform . Information associated with the user is stored in a configuration database . As mentioned, the configuration information associated with the user that is stored in the configuration database may include user settings as well as identification of one or more skills (or skillsets) that the user has either selected or purchased (e.g., via an app store ). In some embodiments, when the user is logged in via application , the application can automatically receive (e.g., pull) configuration information from platform , for example, via configuration system . In other words, skills can be shipped automatically ‘under the hood’ from a cloud API of platform to an application (first-party or third-party application) instantly via a configuration system , for example, by transmitting configuration information (configurations and code) tailored to a specific user of application . This enables the skills associated with a given application to update transparently without input by the user and without requiring recompiling and/or redownloading of the application . Simulation Environments for Developing Applications and Skills 1820 1808 1806 104 100 1808 As discussed, the platform may enable developers to create their own applications and/or skills, for example, through the use of an application at a developer device (which may be mobile device ). Without requiring a deep understanding of the complex processes involved in the autonomous behavior of the UAV , developers can create customized applications and/or skills that combine various behavior objectives with imaging effects, visualizations, etc., as previously discussed. These components may be presented via the application as tools that can be selected and configured to create customized applications and/or skills. 1840 1866 1808 1840 1840 1808 1866 One or more simulation environments may be implemented to aid developers in the development and testing of applications and/or skills. For example, in some embodiments, the developer console enables a developer to utilize one or more simulation environments (e.g., cloud-based simulation environments) to test the functionality of mobile applications and/or skills that the developer has created. The developer can synchronize local skillsets at the developer application to the developer console to “stage” the files for testing before publishing to other users. Through the developer console and/or developer application , the developer may access a list of available simulators (i.e., simulated UAVs) that may be assigned based on user account to utilize in one or more simulation environments . A developer can “fly” applications and/or skills they have created in the one or more available simulators to test their functionality in real-world conditions. 1866 1866 100 120 1866 100 100 The one or more simulation environments may model the physical properties of the real world within which one or more simulated vehicles can operate. For example, a simulated environment may include a videogame-like 3D model of a physical environment as well as physics engine configured to simulate the motion of simulated 3D objects within the 3D model of the physical environment. The physics engine may simulate various properties of real-world physical systems such as rigid body dynamics (including collision detection), soft body dynamics, fluid dynamics, etc. Simulated vehicles (e.g., simulated UAV) may comprise virtualized representations of the onboard hardware and software of real vehicles. In other words, a simulated UAV may include all of the actual software onboard a real UAV (e.g., software associated with navigation system ) as well as virtualize representations of onboard hardware used to implement the software (e.g., virtual processors, virtual sensors, etc.). Each simulated vehicle may include a dynamic model that approximate the physical properties of corresponding physical vehicles and is configured to interact with the simulated environment to approximate the motion of corresponding physical vehicles in a physical environment. For example, a simulated UAV may include a dynamic model that approximates the aerodynamic properties of the body of a physical UAV as well as the properties of the propulsion systems onboard a physical UAV . 100 1866 1666 100 1866 A developer can test the response of a physical UAV by installing applications and/or skills into one or more simulated vehicles, “flying” simulated vehicles in the simulated environment , and observing the automated behavior of the simulated vehicles within the simulated environment , when executing installed applications and/or skills. For example, a developer may wish to test a response by a UAV to a customized skill based around tracking and capturing images of objects in motion by first simulating the response. The simulation environment may simulate such objects in motion that are then detected by virtualized perception systems (e.g., virtual image capture devices, etc.) onboard a simulated UAV. Applications and/or skills installed in the simulated UAV may then guide the autonomous behavior of the simulated UAV within the simulated environment based on the data gathered by the virtualized perception systems. 1866 100 104 1510 104 1866 1510 100 104 100 104 1866 1866 Further, a developer may connect a mobile device (physical and/or simulated) to a given simulation environment running a simulated UAV to test the real-world interaction between a UAV and mobile device implementing an application and/or skill. For example, a developer may connect a mobile application at a physical mobile device to a simulated UAV operating within a simulated environment as if the mobile application was connecting to a real UAV . Real vehicles and simulated vehicles expose the same set of API, so an application connecting to such vehicles does not need to know the difference between the simulated vehicle and the real vehicle. In some embodiments, the mobile device is configured to display a visual output, for example, in the form of a live video feed from image capture devices onboard a physical UAV . If the mobile device is instead used to connect with a simulated UAV operating in a simulated environment , this visual feed may instead comprise a rendering of the 3D model of the physical environment included in the simulated environment . 1820 1820 1820 In some embodiments, platform may enable users (e.g., developers) to run simulated environments that are limited for their individual use or use by other invited users. Alternatively, or in addition, multiple users may connect to the same simulation hosted by the platform to interact with each other through simulated vehicles. For example, platform may enable a cluster of simulated vehicles to be run in a simulated environment and allow users to connect to the simulated vehicles. 1820 The platform may enable developers to invite other users to join and participate in certain simulations. For example, a developer may invite users into a simulation environment to try out new applications and/or skills they are working on. Users may connect to a particular simulated vehicle maintained by the developer and operate the simulated vehicle using developer applications and/or skills, via their mobile device as they would a real vehicle. In some embodiments, a developer may invite other users to participate, for example, by controlling subjects within the 3D world of the simulation environment to test the response of the simulated vehicle to simulated subjects controlled by actual people instead of bots. FIG. 19 FIG. 19 FIG. 19 1900 1820 1900 1900 1806 1820 1900 1900 1900 shows a flow diagram of an example process for generating skills and/or applications using platform . Example process can be executed by any type of computer system. For example, process may be executed by a computer system associated with developer device and/or platform . In some embodiments, the example process depicted in may be represented in instructions stored in memory that are then executed by a processor. The process described with respect to is an example provided for illustrative purposes and is not to be construed as limiting. Other processes may include more or fewer steps than depicted, while remaining within the scope of the present disclosure. Further, the steps depicted in example process may be performed in a different order than is shown. 1900 1902 1902 1840 1842 1844 1866 Example process begins at step with enabling access to a developer console for developing software modules (i.e., skills and/or applications) for use with an autonomous vehicle. For example, step may include enabling access to developer console and the associated tools such as mobile SDK , skills SDK , and or a simulation environment . 1900 1904 1842 1844 Example process continues at step with receiving, via the developer console, a user input specifying instructions for causing an execution computer system at an autonomous vehicle to perform one or more operations. For example, the user input may be received from a developer user (e.g., a third-party developer user) that specifies instructions that will be included in a skill and/or application. The specified instructions may be in the form of computer code and/or selections from an interface associated with the developer console. For example, in some embodiments a developer user may write all of the computer code that will be included as part of a software module (i.e., a skill and/or application). In some embodiments, the developer user may utilize one or more tools associated with an SDK (e.g., mobile SDK and/or skills SDK ) to assist in specifying the instructions. In some embodiments, some or all of the specified instructions may include one or more predefined code libraries that are part of an SDK. 1900 1840 1500 120 1840 In some embodiments, example process may additionally include presenting, via the developer console , an option to select from multiple predefined code libraries, for example, associated with an SDK. In some cases, these predefined code libraries may be configured for use with an API associated with an autonomous navigation system of an autonomous vehicle (e.g., API of navigation system ). A user input can then be received, via the developer console , that selects a particular code library from the multiple predefined code libraries. In such an embodiments, the specified instructions may be based, at least in part, on the selected predefined code library. 1900 1840 1536 In some embodiments, example process may additionally include presenting, via a developer console , an option to select from multiple predefined interactive GUI elements that can be used to control the operations performed at the execution computer system of the autonomous vehicle. The various predefined interactive elements may include, for example, predefined buttons, slider bars, etc. The predefined interactive elements may be configured to operate seamlessly with an existing GUI (e.g., application GUI ) that is used to receive user commands that guide the behavior of an autonomous vehicle. In other words, a developer user can define how the interactive elements specific to their skill will appear and operate by selecting from the one or more predefined interactive elements. In such an embodiments, the specified instructions may be based, at least in part, on the selected predefined code library. 1900 1840 1536 1536 In some embodiments, example process may additionally include presenting, via a developer console , an option to add one or more digital assets (e.g., images, video, 3D models, etc.) and receiving, via the developer console, a user input including or otherwise specifying a digital asset to be added. In some embodiments, the input may include an uploaded copy of the digital asset. In some embodiments, the input may include a link to download the digital asset. As previously discussed, digital assets can be used, for example, to customize interactive elements of the application GUI , present visual augmentations via the application GUI , etc. 1900 104 1536 1536 In some embodiments the digital asset is included in the software module that is generated as part of process . In such embodiments, the instructions included in the software module may cause an execution computer system (at the autonomous vehicle or a corresponding mobile device ) to process the included digital asset to, for example, generate an interactive element that is displayed in the application GUI and/or generate a visual augmentation (e.g., a rendering of a 3D model) that is displayed in the application GUI . 1500 120 The specified instructions may be customized by the developer user to cause an execution computer system at an autonomous vehicle to perform various types of operations, but generally the operations may include transmitting, or otherwise communicating, a call to an API associated with an autonomous navigation system of autonomous vehicle (e.g., API of navigation system ). As previously discussed, the call to the API will be configured to adjust a parameter of a behavioral objective associated with a trajectory generation process performed by the autonomous navigation system. 1900 1906 1906 1840 Example process continues at step with generating a software module that includes the specified instructions and that is executable at the execution computer system at the autonomous vehicle to guide autonomous behavior by the autonomous vehicle. In other words, step includes generating a skill and/or an application based on the instructions specified by a developer user via the developer console . In the case of a skill, the generated software module may extend the functionality of an existing application at the autonomous vehicle. 1900 1908 1820 1850 Example process continues at step with enabling access to the generated software module. For example, custom skills and/or applications created by developer users may be hosted at platform (e.g., via an online store ) where they can be accessed by multiple end users for use in their respective autonomous vehicles. 1900 1866 1900 1840 1866 In some embodiments, before enabling access to the generate software module, example process may include testing the generated software module in a simulation environment such as simulation environment . In other words, example process may further include enabling access, via the developer console , to a simulation environment to test the functionality of the generated software module prior to deploying the generated software module to the execution computer system at the autonomous vehicle. Global Simulation Environment 1820 2067 1820 2067 100 100 104 104 2050 2067 100 2067 2067 100 FIG. 20 a d a b a a. In some embodiments, platform may host a global simulation environment that provides an overall world-scale, real-time, simulation of the overall physical planet. shows a diagram illustrating an example implementation of a global simulation environment at platform . The global simulation environment may be continuously updated with real-world data from various sources such as physical UAVs , in flight in the physical environment, mobile devices , in the physical environment, as well as other data sources such as other sensor devices, mapping/location databases (e.g., Google Maps, GIS, etc.). Maps and sensor data from the various data sources can be fused into a global, continually updated 3D map of the physical planet. The continually updated global simulation environment may also include simulated objects corresponding to real-world physical objects. For example, a human subject tracked by a physical UAV in the real world can be represented as a dynamic virtual object occupying the global simulated environment . The location and motion of the dynamic virtual object is continually updated within the global simulation environment based on a flow of sensor data received from the physical UAV 2067 2010 2010 100 100 100 2010 2067 100 100 104 104 1820 2067 a d a d a a a d a b Simulated vehicles and other object can be placed within the global simulation environment . In some cases, simulated vehicles and/or objects may correspond with real-world physical vehicles and other objects. For example, UAV simulations and corresponding to real-world physical UAVs and (respectively) may occupy the global simulation environment at locations corresponding to the locations of their real-world counterparts. As the physical UAV flies through the real-world physical environment, a UAV simulation flies through the global simulation environment . Real world vehicles and devices (e.g., UAVs /and user devices /) can post their current (and planned) trajectory information to the platform where it is incorporated into the global simulation environment for improved motion predictions, visualizations, etc. 2067 1806 1806 2010 2010 2067 FIG. 20 b c b c The real-time nature of the global simulation environment enables developers to test their applications and/or skills in as real a setting as possible short of actually testing in a real-world physical vehicle. For example, as shown in , different developers and can test their applications and/or skills on UAV simulations and (respectively) that occupy the global simulation environment . Each developer may run multiple simulated vehicles. 2067 The global simulation environment may also enable users (e.g., organizations) to perform activities other than software development such as monitoring real-world activity, inspecting sites in real-time, playing back logged data to see past real-world activity, etc. 2067 2067 100 100 a b Advanced vehicle-control interfaces can also be built on top of or otherwise utilize the continually updated global simulation environment . For example, autonomous vehicles can be routed automatically to certain locations in the physical environment that have not been scanned to improve detail within the global simulation environment . As another example, real-world vehicles such as UAVs /may generated better autonomous flight paths by leveraging the global map and location/motion information provided by other vehicles and devices. Custom Machine Learning Models 120 100 120 1820 100 The navigation system of an autonomous UAV may rely on one or more machine learning models. As an illustrative example, the navigation system may process captured digital images using neural networks to detect objects in captured images and distinguish between instances of captured objects. This complex processing is typically performed within the sandboxed environment of the navigation system and is not exposed to applications and/or skills developed by third-party developers. However, to extend the capabilities of developer-created applications and skills, the platform may enable developers to upload customized machine learning models and/or training data specifically tailored to certain tasks for integration into the UAV . 100 100 100 Image-based training data can be utilized to develop models for guiding automated behavior by a UAV , for example, to understand and perform certain tasks. For example, image data (e.g., video) can be utilized to develop and train machine learning models such as trained neural networks. Utilizing such an approach, the navigation system of an autonomous UAV can be configured to more effectively perform certain tasks, for example, based on training data in the form of video of the tasks being performed. For example, in a UAV configured to perform a specific automated task such as inspecting a bridge, the navigation system may implement or apply a trained neural network based on video of previously performed inspections (of bridges or otherwise). 100 100 120 100 120 Models developed based on image training data can be incorporated or otherwise implemented in conjunction with developer-created applications and/or skills to configure the UAV to perform certain tasks. For example, a developer may wish to create an application or skill for causing a UAV to perform an inventory management task in a warehouse, for example, by autonomously flying around the warehouse, scanning inventory identifiers (e.g., barcodes), and communicating the scanned identifiers to some management process. Such an application or skill may rely on custom machine learning models that are not necessarily part of the underlying navigation system of a UAV , but that rely on access to various perception inputs and the processing power of the navigation system . FIG. 21 FIG. 21 120 100 1806 2100 2120 2100 shows a flow diagram illustrating an example scenario for uploading a custom machine learning model to extend the functionality of the underlying navigation system of a UAV . As shown in , a developer may, using developer device , upload a custom machine learning model to platform . This custom machine learning model may include, for example, a pretrained model configured to perform some specific task. For example, if the developer is creating an application or skill specifically tailored to inspect bridges for cracks, the developer may pre-train a neural network model using image-based training data that is specifically tailored to detect cracks in structural objects based on captured images of the objects. The trained model may be configured to output image segmentation data distinguishing regions of a captured image that correspond to cracks and regions of the captured image not corresponding to cracks. 2100 1820 120 100 120 100 2120 2100 FIG. 21 The custom machine learning model uploaded to the platform can be integrated into the navigation system of a specific UAV (or simulator thereof) to extend the capabilities of the system. For example, as shown in , a navigation system of the UAV now includes both built in machine learning models as well as the custom machine learning model uploaded by the developer. 2100 120 2100 2204 2202 2204 2230 2200 300 1500 2230 2206 2204 120 2200 100 FIG. 22 FIG. 22 A developer-created application or skill may then access the outputs of the custom machine learning model to generate objective inputs that are fed back into the navigation system to guide autonomous behavior. For example, shows a flow diagram illustrating an example process by which perception inputs (e.g., captured images) are fed into the machine learning models of the navigation system . In the example depicted in , a custom machine learning model (e.g., a trained artificial neural network) produces machine learning model outputs (e.g., image segmentation) based on the perception inputs . These machine learning model outputs are exposed to developer-created applications and//or skills via an API (e.g., similar to API or discussed previously). The developer-created applications and/or skills can then produce objective inputs based on the machine learning model outputs that are fed into the navigation system (e.g., via API ) to impact the autonomous behavior of the UAV . 1820 1820 2300 2330 100 FIG. 23 FIG. 22 The platform can also be utilized to train custom machine learning models based on training data uploaded by a developer. Artificial neural networks can be exposed to third-party developers, for example, via an API to received training data. For example, without developing or training their own machine leaning model, a developer can simply upload training data (e.g., in the form of labeled images) via an API to the platform where that training data is then utilized to train a machine learning model such as an artificial neural network to perform a certain task (e.g., detect cracks captured images of a bridge). For example, shows a diagram that illustrates image-based training data for various tasks (e.g., capturing images at sporting events, bridge inspection, etc.) incorporated to train machine-learning models (e.g., based on artificial neural networks), for example, using an API . Developer created applications and skills can then utilize the outputs of the trained machine learning models to guide the autonomous behavior of a UAV , for example, as described with respect to . In this way, a developer can effectively plug into an artificial neural network, for example, through the use of an API, without having to develop such models on their own. FIG. 24 FIG. 24 FIG. 24 1820 120 100 2410 1820 2410 2400 1820 2410 2400 2410 120 100 120 100 2420 2400 1802 2410 shows a flow diagram illustrating an example scenario for uploading training data to platform to train a custom machine learning model to extend the functionality of the underlying navigation system of a UAV . As shown in , a developer may upload training data to platform , for example via an API. The training data may include, for example, labeled images that can be used to train a machine learning model such as a neural network. A custom machine learning model is then trained at platform using the uploaded training data . This custom machine learning model trained using the uploaded training data can then be integrated into the navigation system of a specific UAV (or simulator thereof) to extend the capabilities of the system. For example, as shown in , a navigation system of the UAV now includes both built in machine learning models as well as the custom machine learning model generated at platform based on the uploaded training data . Post-Processing Outputs 114 115 120 In some embodiments, applications and/or skills can be developed to align outputs from the navigation system (e.g., precise orientation and attitude data about the UAV, obstacles, subjects, etc.) with image and/or video outputs from onboard image capture devices / in post processing. This can be utilized to produce various interesting post processing results such as frame bending, telemetry visualizations, event-based image processing transitions etc. An API can be configured to expose certain perception outputs from the navigation engine that can be utilized by developer-created applications and/or skills for a variety of different post-processing features. Application Store for Sharing Developer-Created Applications and/or Skills 1820 1850 100 1850 100 As previously discussed, applications and skills created by third-party developers can be uploaded to platform for sharing or sale via an online application store . Other users can then browse listings of available applications and/or skills that others have created and download selected applications and/or skills for simulation in a simulation environment and/or use with a real UAV . Users can comment on applications and/or skills while sharing them through the online storefront. Further, when uploading applications and/or skills for distribution via an online store , developers can also upload images (e.g., video) captured when executing the created applications and/or skills using a device such as a UAV . In this way, other users can observe what to expect when using the uploaded application and/or skill. 1850 1850 100 In some embodiments, the online store may be regulated to maintain certain standards around the applications and/or skills created by developers. For example, the online store may include an automated framework that tests uploaded applications and/or skills (e.g., using a simulation environment) to ensure that the uploaded applications and/or skills at least do not interfere with the safe operation of a UAV . The automated framework may also screen uploaded applications and/or skills for other criteria such as compliance with applicable regulations, privacy concerns, etc. Applications and/or Skills as a Learning and Verification Tool for Improving Autonomous Behavior 100 The results of simulation and implementation of applications and/or skills created by multiple developers may serve as a valuable dataset. The data may be used to improve the autonomous behavior of a UAV and by extension user experiences, for example, through conducting studies and/or training machine learning processes. In some embodiments, a simulation environment (similar to as previously described) can be implemented as a verification tools to run large numbers of simulations of applications and/or skills created by other users. Data collected from the running of these simulations can be used, for example, to study and verify vehicle software integrity, perception changes, and/or improvements for future software updates. An example machine learning application includes learning when users select certain skills in response to contextual factors such as information in captured images, position of tracked objects, semantic cues in the surrounding physical environment, or any other perceived feedback. Information learned through observing user selections of skills can in turn be used to guide the automatic selection of skills while a UAV is in flight based on any of the aforementioned factors. Another example machine learning application includes creating a skill that causes a specific type of motion or response and using data collected about the conditions in which users activate such skills to inform learned policies and/or modify certain parameters associated with the skill. For example, a skill to “squeeze through a gap” can be used to learn, based on perception, which objects in the physical world are safe to fly near. Such a specific skill may also be used to determine whether built-in obstacle avoidance behavior is configured too aggressively or conservatively. Visual Outputs and User Interface Features Based on Skills 100 2502 104 104 100 2500 116 100 2502 104 2502 114 115 100 114 115 100 2500 114 115 112 100 2502 2500 100 FIG. 25 FIG. 25 In some embodiments, skills can be configured to cause display of a visual output to user, for example, based on images captured from a UAV . shows an example of a visual output displayed via a mobile device in the form of a tablet display device. As indicated in , the mobile device may be communicatively coupled with a UAV in flight through a physical environment via a wireless communication link . The UAV autonomously navigates the physical environment based on one or more navigation objectives, for example, associated with an active skill, as previously discussed. The skill may further include instructions and/or assets configured to cause display of a visual output via the mobile device . The visual output may include a live video feed from an image capture device / onboard the UAV , recorded video from an image capture device / onboard the UAV , a rendering of a computer-generated model of the physical environment (e.g., based on data from the image capture device / and/or other sensors onboard the UAV ), and the like. As previously discussed, in some embodiments, a skill may include instructions and/or assets for processing captured images to apply imaging effects and/or other visualizations. For example, display output depicts a composite of a live video feed of the physical environment from the UAV with added graphical elements (e.g., imaging effects, graphical overlays, interactive graphical interface features, etc.). 140 100 100 104 In some embodiments, a visual output based on a skill can include generated and displayed “augmentations.” Devices configured for augmented reality (AR devices) can deliver to a user a direct or indirect view of a physical environment which includes objects that are augmented (or supplemented) by computer-generated sensory outputs such as sound, video, graphics, or any other data that may augment (or supplement) a user's perception of the physical environment. For example, data gathered or generated by a tracking system regarding a tracked object in the physical environment can be displayed to a user in the form of graphical overlays via an AR device while the UAV is in flight through the physical environment and actively tracking the object and/or as an augmentation to video recorded by the UAV after the flight has completed. Examples of AR devices that may be utilized to implement such functionality include smartphones, tablet computers, laptops, head mounted display devices (e.g., Microsoft HoloLens™, Google Glass™), virtual retinal display devices, heads up display (HUD) devices in vehicles, etc. For example, the previously mentioned mobile device may be configured as an AR device. Note that for illustrative simplicity the term AR device is used herein to describe any type of device capable of presenting augmentations (visible, audible, tactile, etc.) to a user. The term “AR device” shall be understood to also include devices not commonly referred to as AR devices such as virtual reality (VR) headset devices (e.g., Oculus Rift™). FIG. 26 FIG. 25 FIG. 26 FIG. 26 2600 2610 2600 2502 104 2600 2610 114 115 100 100 2610 2620 2622 2624 2626 2620 2640 2640 2610 100 100 2640 2610 2610 a a a a b a b a shows an example view of a physical environment as presented at a display of an AR device. For example, the view may correspond with display presented via a mobile tablet device as shown in . The view of the physical environment shown in may be generated based on images captured by one or more image capture devices / of a UAV and be displayed to a user via the AR device in real-time or near-real-time as the UAV is flying through the physical environment capturing the images. As shown in , one or more augmentations may be presented to the user in the form of augmenting graphical overlays , , , , and associated with objects (e.g., bikers and ) in the physical environment . For example, in an embodiment, the aforementioned augmenting graphical overlays may be generated and composited with video captured by UAV as the UAV tracks biker . The composite including the captured video and the augmenting graphical overlays may be displayed to the user via a display of the AR device (e.g., a smartphone). In other embodiments, the AR device may include a transparent display (e.g., a head mounted display) through which the user can view the surrounding physical environment . The transparent display may comprise a waveguide element made of a light-transmissive material through which projected images of one or more of the aforementioned augmenting graphical overlays are propagated and directed at the eyes of the user such that the projected images appear to the user to overlay the user's view of the physical environment and correspond with particular objects or points in the physical environment. 2610 100 2640 2640 2640 FIG. 26 a b a b In some embodiments, augmentations may include labels with information associated with objects detected in the physical environment . For example, illustrates a scenario in which UAV has detected and is tracking a first biker and a second biker . In response, one or more augmenting graphical overlays associated with the tracked objects may be displayed via the AR device at points corresponding to the locations of the bikers -as they appear in the captured image. 100 2620 2640 FIG. 26 a b a b In some embodiments, augmentations may indicate specific object instances that are tracked by UAV . In the illustrative example provided in , such augmentations are presented as augmenting graphical overlays -in the form of boxes that surround the specific object instances -(respectively). This is just an example provided for illustrative purposes. Indications of object instances may be presented using other types of augmentations (visual or otherwise). 2622 2640 2622 2640 2640 a b a b a a a FIG. 26 In some embodiments, augmentations may include identifying information associated with detected objects. For example, augmenting graphical overlays -include names of the tracked bikers -(respectively). Further, augmenting graphical overlay includes a picture of biker . In some embodiments, information such as the picture of the biker may be automatically pulled from an external source such as a social media platform (e.g., Facebook™, Twitter™, Instagram™, etc.). Although not shown in , augmentations may also include avatars associated with identified people. Avatars may include 3D graphical reconstructions of the tracked person (e.g., based on captured images and other sensor data), generative “bitmoji” from instance segmentations, or any other type of generated graphics representative of tracked objects. 2622 2640 a a In some embodiments, augmentation may include information regarding an activity or state of the tracked object. For example, augmenting graphical overlay includes information regarding the speed, distance traveled, and current heading of biker . Other information regarding the activity of a tracked object may similarly be displayed. FIG. 26 FIG. 26 2624 2640 a a In some embodiments, augmentations may include visual effects that track or interact with tracked objects. For example, shows an augmenting graphical overlay in the form of a projection of a 3D trajectory (e.g., current, past, and/or future) associated with biker . In some embodiments, trajectories of multiple tracked objects may be presented as augmentations. Although not shown in , augmentations may also include other visual effects such as halos, fireballs, dropped shadows, ghosting, multi-frame snapshots, etc. 100 100 2640 2640 2640 2622 2622 2640 100 2640 2640 2622 100 2640 100 FIG. 26 a b a a b b a b a a Semantic knowledge of objects in the physical environment may also enable new AR user interaction paradigms. In other words, certain augmentations may be interactive and allow a user to control certain aspects of the flight of the UAV and/or image capture by the UAV . Illustrative examples of interactive augmentations may include an interactive follow button that appears above moving objects. For example, in the scenario depicted in , a UAV is tracking the motion of both bikers and , but is actively following (i.e., at a substantially constant separation distance) the first biker . This is indicated in the augmenting graphical overlay that states “currently following.” Note that a corresponding overlay associated with the second biker includes an interactive element (e.g., a “push to follow” button), that when pressed by a user, would cause the UAV to stop following biker and begin following biker . Similarly, overlay includes an interactive element (e.g., a “cancel” button), that when pressed by a user, would cause the UAV to stop following biker . In such a situation, the UAV may revert to some default autonomous navigation objective, for example, following the path the bikers are traveling on but not any one biker in particular. FIG. 26 100 2650 Other similar interactive augmentations may also be implemented. For example, although not shown in , users may inspect certain objects, for example, by interacting with the visual depictions of the objects as presented by the AR device. For example, if the AR device includes a touch screen display, a user may cause the UAV to follow the object simply by touching a region of the screen corresponding to the displayed object. This may also be applied to static objects that are not in motion. For example, by interacting with a region of the screen of an AR device corresponding to the displayed path , an AR interface may display information regarding the path (e.g., source, destination, length, material, map overlay, etc.) or may cause the UAV to travel along the path at a particular altitude. FIG. 26 2626 2340 2626 100 2640 2626 100 2640 2640 a a a a a a The size and geometry of detected objects may be taken into consideration when presenting augmentations. For example, in some embodiments, an interactive control element may be displayed as a ring about a detected object in an AR display. For example, shows a control element shown as a ring that appears to encircle the first biker . The control element may respond to user interactions to control an angle at which UAV captures images of the biker . For example, in a touch screen display context, a user may swipe their finger over the control element to cause the UAV to revolve about the biker (e.g., at a substantially constant range) even as the biker is in motion. Other similar interactive elements may be implemented to allow the user to zoom image captured in or out, pan from side to side, etc. 1840 1820 1840 Using the developer console of platform , developers can implement customized GUI features and other visual elements that are specific to their applications and/or skills. In some embodiments, a developer may adjust the GUI for a developed skill using simple feature toggles provided by the developer console . For example, without having to build such GUI features from scratch, a developer may select from predefined GUI features such as sliders, checkboxes, and any other standard GUI features to enable user control over various parameters associated with a skill such as movement speed, distance to travel, etc. Further, developers can also send custom 3D models for rendering as augmentations, for example, as previously described. 100 100 1510 104 FIG. 27 FIG. 27 Graphical UI features specific to a particular developer-created skill can integrate seamlessly with general GUI features associated with the UAV . shows a series of screen captures illustrating how GUI features associated with a developer-created skill can be integrated into an application configured to control a UAV . The GUI depicted in may be displayed as a graphical output from an application (e.g., application ) via a display screen (e.g., a touch-based display screen) of a computing device such as mobile device (e.g., a user's tablet or smartphone). 2700 2720 a Screen depicts at menu interface element through which a user can select from multiple available skills. The available skills in this example include “boomerang,” “cablecam,” “follow,” “dronie,” “rocket,” and “spiral.” Each of the available skills may have been created by different developers including, for example, the developer of the application displaying the GUI and/or one or more other third-party developers. 2700 2720 2700 2710 114 115 100 2710 114 115 100 2700 2730 2730 2730 2740 b b b Screen depicts the GUI after selection of one of the available skills from menu . As shown in screen , the GUI may include a view of the physical environment, for example, generated based on images captured by one or more image capture devices / of the UAV . This view may comprise a live video feed from the one or more image capture devices / of the UAV . Screen also depicts an augmented reality element specific to the selected skill. For example, a developer of the “cablecam” skill may have integrated 3D models to be displayed as overlays in the application GUI during execution of the skill. The augmentations in this example may comprise 3D models of waypoint indicators that are displayed via the GUI relative to specific locations in the physical environment. Notably, skill-specific GUI features such as augmentation are integrated seamlessly with other GUI features built into the underlying application. For example, built in GUI features such as the “stop” button are not specific to the “cablecam” skill and may be displayed regardless of the selected skill. Other GUI features such as the “return” button, settings menu, etc. may similarly be displayed regardless of the selected skill. 2700 2720 2700 2710 2740 2700 2752 2754 2752 2754 1840 1842 2752 100 2752 c c c Screen depicts another example GUI after selection of one of the available skills from menu . As shown in screen , the GUI still includes the view of the physical environment and various built in GUI features such as the stop button . The GUI depicted in screen further includes other skill-specific GUI features such as speed slider bar , and a progress indicator . Notably, while specific to the selected skill, the GUI elements and may be based on standard GUI elements provided for by the developer console . In other words, to implement such elements in a given skill, the developer need only select certain predefined interactive elements to apply to certain objective parameters, for example, as defined by the skills SDK . The developer would not be required to create custom visual assets to implement such GUI features. In the present example, the developer of the “cablecam” skill has defined the skill to display a slider bar to enable a user to control the “speed” objective parameter associated with the skill. In other words, when executing the “cablecam” skill, the UAV will maneuver autonomously to approximate the motion of a cable camera while tracking a subject at a speed specified by a user via the slider bar element . 1860 1820 FIG. 27 FIG. 27 As previously described, in some embodiments, skills can be shipped automatically and under-the-hood from a developer to an end-user application using a cloud configuration system of the platform . A user of the application displaying the GUI of may purchase or download a new skill such as the “cablecam” skill offered by a third-party developer. Purchased and/or downloaded skills may be seamlessly integrated into the existing application to extend the functionality of the application without needing to recompile or redownload the application. Skill-specific GUI elements, for example as described with respect to , may appear within the existing application in response to purchasing, downloading, or otherwise accessing such skills. FIG. 28 FIG. 27 2820 2820 2810 104 100 120 2820 Developers can also configure skills to utilize such perception outputs during post processing, for example, to add visual elements to captured video. For example, shows an example visual output that includes 3D waypoint objects displayed as visual augmentations during execution of a skill for scanning a structure in an environment. The 3D waypoint objects may be overlaid on the view of the physical environment as displayed in a GUI of a mobile device as the UAV is performing the scan, for example, as described with respect to . Further, perception outputs from the navigation system (e.g., precise orientation and attitude data about the UAV, obstacles, subjects, etc.) can be accessed by the skill (e.g., via an API) to perform post processing on captured video to align the 3D waypoint objects with the captured video to produce a final composite video that includes the augmentations. Auto-Return Functionality by an Autonomous UAV 100 100 114 115 100 104 100 116 A UAV is configured to rely on several different systems to maintain tracking of a subject such as a human in the physical environment. For example, a UAV may maintain visual tracking of a subject by processing images captured by image capture devices / onboard the UAV . If the tracked subject is carrying a device (e.g., mobile device ) with localization capabilities, the UAV may also track a location of that device, for example, by receiving location information (e.g., GPS data) from the device over a wireless link (e.g., Wi-Fi). 100 100 100 100 100 During autonomous flight, certain situations may lead to a loss of visual contact between the UAV and a tracked subject. For example, the view of the tracked subject from the UAV may become occluded due to another object in the physical environment such as a tree. The image capture devices and/or associated computer vision processing systems onboard the UAV may also experience failures which may lead to a loss of visual contact with the tracked subject. In any event, in some embodiments, the UAV may be configured to seamlessly continue tracking and moving along with the subject by relying on other tracking systems if the UAV loses visual contact with the subject. 120 100 104 104 100 104 In an example embodiment, in response to detecting a loss of visual tracking of a subject, the navigation system onboard the UAV may continue to track a location and movement of the subject based on signals received from another device in the physical environment. This other device may include, for example, a mobile device held by the subject, another UAV in the vicinity that is currently tracking the subject, or any other device capable of determining information related to a location of the subject. For example, a mobile device equipped with a GPS receiver can resolve its location based on signals received from GPS satellites. The location of such a mobile device may similarly be resolved using other localization techniques (e.g., cellular, Wi-Fi, etc.). Data regarding the location of the subject may be received by the UAV from other devices (e.g., mobile device or another UAV) over a wireless link such as Wi-Fi. 120 100 104 100 The navigation system of the UAV may continue to cause the UAV to fly a planned trajectory, for example, to follow the subject even after experiencing the loss of visual tracking by relying on the location information gathered by another device such as the mobile device or another UAV. In this way, the UAV may continue to maneuver seamlessly to track the subject until visual tracking can be re-established. 120 100 120 100 120 100 In some embodiments, while continuing to track and follow the subject after loss of visual tracking (e.g., using GPS from a mobile device), the navigation system may cause the UAV to perform one or more maneuvers aimed at re-establishing visual tracking of the subject. For example, assuming systems related to visual tracking are still functioning, the navigation system , may cause the UAV to maneuver to avoid an occluding object (e.g., by descending, ascending, moving left/right, etc.) so that visual tracking can be re-established. These “corrective” maneuvers may be configured by the navigation system to subtly change the trajectory of the UAV to try to re-establish visual tracking while avoiding unnecessarily jarring or abrupt changes in trajectory that may lead to further subject tracking problems, less desirable captured video, etc. 120 120 120 100 104 In some embodiments, the navigation system may adjust the extent to which corrective maneuvers are executed based on an elapsed time since visual tracking was lost. For example, the navigation system may avoid any corrective maneuvers until a period of time since visual tracking was lost passes a first threshold. The navigation system may then cause the UAV to perform increasingly more drastic maneuvers as the period of time since visual tracking was lost passes subsequent thresholds. In some embodiments, such mitigating actions can be made user configurable, for example, based on inputs received via a mobile device . Localization 120 100 2900 100 100 100 FIG. 29 FIG. 29 A navigation system of a UAV may employ any number of other systems and techniques for localization. shows an illustration of an example localization system that may be utilized to guide autonomous navigation of a vehicle such as UAV . In some embodiments, the positions and/or orientations of the UAV and various other physical objects in the physical environment can be estimated using any one or more of the subsystems illustrated in . By tracking changes in the positions and/or orientations over time (continuously or at regular or irregular time intervals (i.e., continually)), the motions (e.g., velocity, acceleration, etc.) of UAV and other objects may also be estimated. Accordingly, any systems described herein for determining position and/or orientation may similarly be employed for estimating motion. FIG. 29 2900 100 2902 2904 2906 2908 1706 104 106 As shown in , the example localization system may include the UAV , a global positioning system (GPS) comprising multiple GPS satellites , a cellular system comprising multiple cellular antennae (with access to sources of localization data ), a Wi-Fi system comprising multiple Wi-Fi access points (with access to sources of localization data ), and/or a mobile device operated by a user . FIG. 29 100 2902 100 104 116 Satellite-based positioning systems such as GPS can provide effective global position estimates (within a few meters) of any device equipped with a receiver. For example, as shown in , signals received at a UAV from satellites of a GPS system can be utilized to estimate a global position of the UAV . Similarly, positions relative to other devices (e.g., a mobile device ) can be determined by communicating (e.g., over a wireless communication link ) and comparing the global positions of the other devices. 100 100 2904 2908 2910 Localization techniques can also be applied in the context of various communications systems that are configured to transmit communications signals wirelessly. For example, various localization techniques can be applied to estimate a position of UAV based on signals transmitted between the UAV and any of cellular antennae of a cellular system or Wi-Fi access points , of a Wi-Fi system. Known positioning techniques that can be implemented include, for example, time of arrival (ToA), time difference of arrival (TDoA), round trip time (RTT), angle of Arrival (AoA), and received signal strength (RSS). Moreover, hybrid positioning systems implementing multiple techniques such as TDoA and AoA, ToA and RSS, or TDoA and RSS can be used to improve the accuracy. FIG. 29 2912 2910 Some Wi-Fi standards, such as 802.11ac, allow for RF signal beamforming (i.e., directional signal transmission using phased-shifted antenna arrays) from transmitting Wi-Fi routers. Beamforming may be accomplished through the transmission of RF signals at different phases from spatially distributed antennas (a “phased antenna array”) such that constructive interference may occur at certain angles while destructive interference may occur at others, thereby resulting in a targeted directional RF signal field. Such a targeted field is illustrated conceptually in by dotted lines emanating from Wi-Fi routers . 100 An inertial measurement unit (IMU) may be used to estimate position and/or orientation of a device. An IMU is a device that measures a vehicle's angular velocity and linear acceleration. These measurements can be fused with other sources of information (e.g., those discussed above) to accurately infer velocity, orientation, and sensor calibrations. As described herein, a UAV may include one or more IMUs. Using a method commonly referred to as “dead reckoning,” an IMU (or associated systems) may estimate a current position based on previously measured positions using measured accelerations and the time elapsed from the previously measured positions. While effective to an extent, the accuracy achieved through dead reckoning based on measurements from an IMU quickly degrades due to the cumulative effect of errors in each predicted current position. Errors are further compounded by the fact that each predicted position is based on a calculated integral of the measured velocity. To counter such effects, an embodiment utilizing localization using an IMU may include localization data from other sources (e.g., the GPS, Wi-Fi, and cellular systems described above) to continually update the last known position and/or orientation of the object. Further, a nonlinear estimation algorithm (one embodiment being an “extended Kalman filter”) may be applied to a series of measured positions and/or orientations to produce a real-time prediction of the current position and/or orientation based on assumed uncertainties in the observed data. Kalman filters are commonly applied in the area of aircraft navigation, guidance, and controls. 100 100 114 115 100 FIG. 1A Computer vision may be used to estimate the position and/or orientation of a capturing camera (and by extension a device to which the camera is coupled) as well as other objects in the physical environment. The term, “computer vision” in this context may generally refer to any method of acquiring, processing, analyzing and “understanding” captured images. Computer vision may be used to estimate position and/or orientation using a number of different methods. For example, in some embodiments, raw image data received from one or more image capture devices (onboard or remote from the UAV ) may be received and processed to correct for certain variables (e.g., differences in camera orientation and/or intrinsic parameters (e.g., lens variations)). As previously discussed with respect to , the UAV may include two or more image capture devices /. By comparing the captured image from two or more vantage points (e.g., at different time steps from an image capture device in motion), a system employing computer vision may calculate estimates for the position and/or orientation of a vehicle on which the image capture device is mounted (e.g., UAV ) and/or of captured objects in the physical environment (e.g., a tree, building, etc.). FIG. 30 FIG. 30 FIG. 30 3052 3054 3080 3002 3002 3080 3080 3002 100 104 100 116 Computer vision can be applied to estimate position and/or orientation using a process referred to as “visual odometry.” illustrates the working concept behind visual odometry at a high level. A plurality of images are captured in sequence as an image capture device moves through space. Due to the movement of the image capture device, the images captured of the surrounding physical environment change from frame to frame. In , this is illustrated by initial image capture FOV and a subsequent image capture FOV captured as the image capture device has moved from a first position to a second position over a period of time. In both images, the image capture device may capture real world physical objects, for example, the house and/or the person . Computer vision techniques are applied to the sequence of images to detect and match features of physical objects captured in the FOV of the image capture device. For example, a system employing computer vision may search for correspondences in the pixels of digital images that have overlapping FOV. The correspondences may be identified using a number of different methods such as correlation-based and feature-based methods. As shown in, in , features such as the head of a human subject or the corner of the chimney on the house can be identified, matched, and thereby tracked. By incorporating sensor data from an IMU (or accelerometer(s) or gyroscope(s)) associated with the image capture device to the tracked features of the image capture, estimations may be made for the position and/or orientation of the image capture relative to the objects , captured in the images. Further, these estimates can be used to calibrate various other systems, for example, through estimating differences in camera orientation and/or intrinsic parameters (e.g., lens variations) or IMU biases and/or orientation. Visual odometry may be applied at both the UAV and any other computing device such as a mobile device to estimate the position and/or orientation of the UAV and/or other objects. Further, by communicating the estimates between the systems (e.g., via a wireless communication link ) estimates may be calculated for the respective positions and/or orientations relative to each other. Position and/or orientation estimates based in part on sensor data from an on board IMU may introduce error propagation issues. As previously stated, optimization techniques may be applied to such estimates to counter uncertainties. In some embodiments, a nonlinear estimation algorithm (one embodiment being an “extended Kalman filter”) may be applied to a series of measured positions and/or orientations to produce a real-time optimized prediction of the current position and/or orientation based on assumed uncertainties in the observed data. Such estimation algorithms can be similarly applied to produce smooth motion estimations. 100 100 100 In some embodiments, data received from sensors onboard UAV can be processed to generate a 3D map of the surrounding physical environment while estimating the relative positions and/or orientations of the UAV and/or other objects within the physical environment. This process is sometimes referred to as simultaneous localization and mapping (SLAM). In such embodiments, using computer vision processing, a system in accordance with the present teaching can search for dense correspondence between images with overlapping FOV (e.g., images taken during sequential time steps and/or stereoscopic images taken at the same time step). The system can then use the dense correspondences to estimate a depth or distance to each pixel represented in each image. These depth estimates can then be used to continually update a generated 3D model of the physical environment taking into account motion estimates for the image capture device (i.e., UAV ) through the physical environment. FIG. 31 3102 3102 120 100 3120 3102 3120 3102 3120 100 In some embodiments, a 3D model of the surrounding physical environment may be generated as a 3D occupancy map that includes multiple voxels with each voxel corresponding to a 3D volume of space in the physical environment that is at least partially occupied by a physical object. For example, shows an example view of a 3D occupancy map of a physical environment including multiple cubical voxels. Each of the voxels in the 3D occupancy map correspond to a space in the physical environment that is at least partially occupied by a physical object. A navigation system of a UAV can be configured to navigate the physical environment by planning a 3D trajectory through the 3D occupancy map that avoids the voxels. In some embodiments, this 3D trajectory (planned using the 3D occupancy map ) can be updated by applying an image space motion planning process. In such an embodiment, the planned 3D trajectory of the UAV is projected into an image space of captured images for analysis relative to certain identified high cost regions (e.g., regions having invalid depth estimates). 100 100 100 Computer vision may also be applied using sensing technologies other than cameras, such as light detection and ranging (LIDAR) technology. For example, a UAV equipped with LIDAR may emit one or more laser beams in a scan up to 360 degrees around the UAV . Light received by the UAV as the laser beams reflect off physical objects in the surrounding physical world may be analyzed to construct a real time 3D computer model of the surrounding physical world. Depth sensing through the use of LIDAR may in some embodiments augment depth sensing through pixel correspondence as described earlier. Further, images captured by cameras (e.g., as described earlier) may be combined with the laser constructed 3D models to form textured 3D models that may be further analyzed in real time or near real time for physical object recognition (e.g., by using computer vision algorithms). 100 130 120 120 The computer vision-aided localization techniques described above may calculate the position and/or orientation of objects in the physical world in addition to the position and/or orientation of the UAV . The estimated positions and/or orientations of these objects may then be fed into a motion planning system of the navigation system to plan paths that avoid obstacles while satisfying certain objectives (e.g., as previously described). In addition, in some embodiments, a navigation system may incorporate data from proximity sensors (e.g., electromagnetic, acoustic, and/or optics based) to estimate obstacle positions with more accuracy. Further refinement may be possible with the use of stereoscopic computer vision with multiple cameras, as described earlier. 2900 100 2900 FIG. 29 FIG. 29 The localization system of (including all of the associated subsystems as previously described) is only one example of a system configured to estimate positions and/or orientations of a UAV and other objects in the physical environment. A localization system may include more or fewer components than shown, may combine two or more components, or may have a different configuration or arrangement of the components. Some of the various components shown in may be implemented in hardware, software or a combination of both hardware and software, including one or more signal processing and/or application specific integrated circuits. Object Tracking 100 102 A UAV can be configured to track one or more objects, for example, to enable intelligent autonomous flight. The term “objects” in this context can include any type of physical object occurring in the physical world. Objects can include dynamic objects such as a people, animals, and other vehicles. Objects can also include static objects such as landscape features, buildings, and furniture. Further, certain descriptions herein may refer to a “subject” (e.g., human subject ). The terms “subject” as used in this disclosure may simply refer to an object being tracked using any of the disclosed techniques. The terms “object” and “subject” may therefore be used interchangeably. FIG. 2 140 100 114 115 100 140 140 With reference to , a tracking system associated with a UAV can be configured to track one or more physical objects based on images of the objects captured by image capture devices (e.g., image capture devices and/or ) onboard the UAV . While a tracking system can be configured to operate based only on input from image capture devices, the tracking system can also be configured to incorporate other types of information to aid in the tracking. 140 140 140 3220 3220 3220 140 3220 3230 140 3220 3240 3220 3220 140 FIG. 32 FIG. 32 FIG. 32 In some embodiments, a tracking system can be configured to fuse information pertaining to two primary categories: semantics and 3D geometry. As images are received, the tracking system may extract semantic information regarding certain objects captured in the images based on an analysis of the pixels in the images. Semantic information regarding a captured object can include information such as an object's category (i.e., class), location, shape, size, scale, pixel segmentation, orientation, inter-class appearance, activity, and pose. In an example embodiment, the tracking system may identify general locations and categories of objects based on captured images and then determine or infer additional more detailed information about individual instances of objects based on further processing. Such a process may be performed as a sequence of discrete operations, a series of parallel operations, or as a single operation. For example, shows an example image captured by a UAV in flight through a physical environment. As shown in , the example image includes captures of two physical objects, specifically, two people present in the physical environment. The example image may represent a single frame in a series of frames of video captured by the UAV. A tracking system may first identify general locations of the captured objects in the image . For example, pixel map shows two dots corresponding to the general locations of the captured objects in the image. These general locations may be represented as image coordinates. The tracking system may further process the captured image to determine information about the individual instances of the captured objects. For example, pixel map shows a result of additional processing of image identifying pixels corresponding to the individual object instances (i.e., people in this case). Semantic cues can be used to locate and identify objects in captured images as well as associate identified objects occurring in multiple images. For example, as previously mentioned, the captured image depicted in may represent a single frame in a sequence of frames of a captured video. Using semantic cues, a tracking system may associate regions of pixels captured in multiple images as corresponding to the same physical object occurring in the physical environment. 140 114 100 114 100 114 115 100 100 FIG. 1A FIG. 1A In some embodiments, a tracking system can be configured to utilize 3D geometry of identified objects to associate semantic information regarding the objects based on images captured from multiple views in the physical environment. Images captured from multiple views may include images captured by multiple image capture devices having different positions and/or orientations at a single time instant. For example, each of the image capture devices shown mounted to a UAV in may include cameras at slightly offset positions (to achieve stereoscopic capture). Further, even if not individually configured for stereoscopic image capture, the multiple image capture devices may be arranged at different positions relative to the UAV , for example, as shown in . Images captured from multiple views may also include images captured by an image captured device at multiple time instants as the image capture device moves through the physical environment. For example, any of the image capture devices and/or mounted to UAV will individually capture images from multiple views as the UAV moves through the physical environment. 140 100 140 100 3310 100 100 3310 114 115 3312 3312 102 3312 3320 FIG. 33 a c a c a c Using an online visual-inertial state estimation system, a tracking system can determine or estimate a trajectory of the UAV as it moves through the physical environment. Thus, the tracking system can associate semantic information in captured images, such as locations of detected objects, with information about the 3D trajectory of the objects, using the known or estimated 3D trajectory of the UAV . For example, shows a trajectory of a UAV moving through a physical environment. As the UAV moves along trajectory , the one or more image capture devices (e.g., devices and/or ) capture images of the physical environment at multiple views -. Included in the images at multiple views -are captures of an object such as a human subject . By processing the captured images at multiple views -, a trajectory of the object can also be resolved. 140 102 Object detections in captured images create rays from a center position of a capturing camera to the object along which the object lies, with some uncertainty. The tracking system can compute depth measurements for these detections, creating a plane parallel to a focal plane of a camera along which the object lies, with some uncertainty. These depth measurements can be computed by a stereo vision algorithm operating on pixels corresponding with the object between two or more camera images at different views. The depth computation can look specifically at pixels that are labeled to be part of an object of interest (e.g., a subject ). The combination of these rays and planes over time can be fused into an accurate prediction of the 3D position and velocity trajectory of the object over time. 140 100 100 104 104 100 100 104 104 100 100 While a tracking system can be configured to rely exclusively on visual data from image capture devices onboard a UAV , data from other sensors (e.g., sensors on the object, on the UAV , or in the environment) can be incorporated into this framework when available. Additional sensors may include GPS, IMU, barometer, magnetometer, and cameras at other devices such as a mobile device . For example, a GPS signal from a mobile device held by a person can provide rough position measurements of the person that are fused with the visual information from image capture devices onboard the UAV . An IMU sensor at the UAV and/or a mobile device can provide acceleration and angular velocity information, a barometer can provide relative altitude, and a magnetometer can provide heading information. Images captured by cameras at a mobile device held by a person can be fused with images from cameras onboard the UAV to estimate relative pose between the UAV and the person by identifying common features captured in the images. FIG. 34 FIG. 34 3400 3400 3402 3404 3406 100 In some embodiments, data from various sensors are input into a spatiotemporal factor graph to probabilistically minimize total measurement error. shows a diagrammatic representation of an example spatiotemporal factor graph that can be used to estimate a 3D trajectory of an object (e.g., including pose and velocity over time). In the example spatiotemporal factor graph depicted in , variable values such as the pose and velocity (represented as nodes ( and respectively)) connected by one or more motion model processes (represented as nodes along connecting edges). For example, an estimate or prediction for the pose of the UAV and/or other object at time step 1 (i.e., variable X(1)) may be calculated by inputting estimated pose and velocity at a prior time step (i.e., variables X(0) and V(0)) as well as various perception inputs such as stereo depth measurements and camera image measurements via one or more motion models. A spatiotemporal factor model can be combined with an outlier rejection mechanism wherein measurements deviating too far from an estimated distribution are thrown out. In order to estimate a 3D trajectory from measurements at multiple time instants, one or more motion models (or process models) are used to connect the estimated variables between each time step in the factor graph. Such motion models can include any one of constant velocity, zero velocity, decaying velocity, and decaying acceleration. Applied motion models may be based on a classification of a type of object being tracked and/or learned using machine learning techniques. For example, a cyclist is likely to make wide turns at speed, but is not expected to move sideways. Conversely, a small animal such as a dog may exhibit a more unpredictable motion pattern. 140 100 3510 102 100 3510 114 115 3540 3542 3540 0 3542 1 0 102 3560 3560 102 3540 102 3560 3550 3552 3520 102 3520 3520 3562 1 102 3520 0 1 3562 3542 3552 102 100 FIG. 35 FIG. 35 FIG. 35 FIG. 35 a b a b In some embodiments, a tracking system can generate an intelligent initial estimate for where a tracked object will appear in a subsequently captured image based on a predicted 3D trajectory of the object. shows a diagram that illustrates this concept. As shown in , a UAV is moving along a trajectory while capturing images of the surrounding physical environment, including of a human subject . As the UAV moves along the trajectory , multiple images (e.g., frames of video) are captured from one or more mounted image capture devices /. shows a first FOV of an image capture device at a first pose and a second FOV of the image capture device at a second pose . In this example, the first pose may represent a previous pose of the image capture device at a time instant t() while the second pose may represent a current pose of the image capture device at a time instant t(). At time instant t(), the image capture device captures an image of the human subject at a first 3D position in the physical environment. This first position may be the last known position of the human subject . Given the first pose of the image capture device, the human subject while at the first 3D position appears at a first image position in the captured image. An initial estimate for a second (or current) image position can therefore be made based on projecting a last known 3D trajectory of the human subject forward in time using one or more motion models associated with the object. For example, predicted trajectory shown in represents this projection of the 3D trajectory forward in time. A second 3D position (at time t()) of the human subject along this predicted trajectory can then be calculated based on an amount of time elapsed from t() to t(). This second 3D position can then be projected into the image plane of the image capture device at the second pose to estimate the second image position that will correspond to the human subject . Generating such an initial estimate for the position of a tracked object in a newly captured image narrows down the search space for tracking and enables a more robust tracking system, particularly in the case of a UAV and/or tracked object that exhibits rapid changes in position and/or orientation. 140 100 100 114 115 114 115 114 100 100 115 FIG. 1A In some embodiments, the tracking system can take advantage of two or more types of image capture devices onboard the UAV . For example, as previously described with respect to , the UAV may include image capture device configured for visual navigation as well as an image captured device for capturing images that are to be viewed. The image capture devices may be configured for low-latency, low-resolution, and high FOV, while the image capture device may be configured for high resolution. An array of image capture devices about a perimeter of the UAV can provide low-latency information about objects up to 360 degrees around the UAV and can be used to compute depth using stereo vision algorithms. Conversely, the other image capture device can provide more detailed images (e.g., high resolution, color, etc.) in a limited FOV. 114 115 115 114 114 115 114 115 Combining information from both types of image capture devices and can be beneficial for object tracking purposes in a number of ways. First, the high-resolution color information from an image capture device can be fused with depth information from the image capture devices to create a 3D representation of a tracked object. Second, the low-latency of the image capture devices can enable more accurate detection of objects and estimation of object trajectories. Such estimates can be further improved and/or corrected based on images received from a high-latency, high resolution image capture device . The image data from the image capture devices can either be fused with the image data from the image capture device , or can be used purely as an initial estimate. 114 140 100 140 114 115 114 115 140 115 100 By using the image capture devices , a tracking system can achieve tracking of objects up to 360 degrees around the UAV . The tracking system can fuse measurements from any of the image capture devices or when estimating a relative position and/or orientation of a tracked object as the positions and orientations of the image capture devices and change over time. The tracking system can also orient the image capture device to get more accurate tracking of specific objects of interest, fluidly incorporating information from both image capture modalities. Using knowledge of where all objects in the scene are, the UAV can exhibit more intelligent autonomous flight. 115 100 115 100 114 114 115 As previously discussed, the high-resolution image capture device may be mounted to an adjustable mechanism such as a gimbal that allows for one or more degrees of freedom of motion relative to the body of the UAV . Such a configuration is useful in stabilizing image capture as well as tracking objects of particular interest. An active gimbal mechanism configured to adjust an orientation of a higher-resolution image capture device relative to the UAV so as to track a position of an object in the physical environment may allow for visual tracking at greater distances than may be possible through use of the lower-resolution image capture devices alone. Implementation of an active gimbal mechanism may involve estimating the orientation of one or more components of the gimbal mechanism at any given time. Such estimations may be based on any of hardware sensors coupled to the gimbal mechanism (e.g., accelerometers, rotary encoders, etc.), visual information from the image capture devices /, or a fusion based on any combination thereof. 140 3604 3602 3610 3602 3230 FIG. 36 FIG. 32 a b A tracking system may include an object detection system for detecting and tracking various objects. Given one or more classes of objects (e.g., humans, buildings, cars, animals, etc.), the object detection system may identify instances of the various classes of objects occurring in captured images of the physical environment. Outputs by the object detection system can be parameterized in a few different ways. In some embodiments, the object detection system processes received images and outputs a dense per-pixel segmentation, where each pixel is associated with a value corresponding to either an object class label (e.g., human, building, car, animal, etc.) and/or a likelihood of belonging to that object class. For example, shows a visualization of a dense per-pixel segmentation of a captured image where pixels corresponding to detected objects -classified as humans are set apart from all other pixels in the image . Another parameterization may include resolving the image location of a detected object to a particular image coordinate (e.g., as shown at map in ), for example, based on centroid of the representation of the object in a received image. 3602 3604 FIG. 36 In some embodiments, the object detection system can utilize a deep convolutional neural network for object detection. For example, the input may be a digital image (e.g., image ), and the output may be a tensor with the same spatial dimension. Each slice of the output tensor may represent a dense segmentation prediction, where each pixel's value is proportional to the likelihood of that pixel belonging to the class of object corresponding to the slice. For example, the visualization shown in may represent a particular slice of the aforementioned tensor where each pixel's value is proportional to the likelihood that the pixel corresponds with a human. In addition, the same deep convolutional neural network can also predict the centroid locations for each detected instance, as described in the following section. 140 100 140 3604 3612 3630 3604 140 FIG. 36 A tracking system may also include an instance segmentation system for distinguishing between individual instances of objects detected by the object detection system. In some embodiments, the process of distinguishing individual instances of detected objects may include processing digital images captured by the UAV to identify pixels belonging to one of a plurality of instances of a class of physical objects present in the physical environment and captured in the digital images. As previously described with respect to , a dense per-pixel segmentation algorithm can classify certain pixels in an image as corresponding to one or more classes of objects. This segmentation process output may allow a tracking system to distinguish the objects represented in an image and the rest of the image (i.e., a background). For example, the visualization distinguishes pixels that correspond to humans (e.g., included in region ) from pixels that do not correspond to humans (e.g., included in region ). However, this segmentation process does not necessarily distinguish between individual instances of the detected objects. A human viewing the visualization may conclude that the pixels corresponding to humans in the detected image actually correspond to two separate humans; however, without further analysis, a tracking system may be unable to make this distinction. FIG. 37 FIG. 36 3704 3702 3704 3712 3710 3730 3712 3710 3712 3710 3712 3710 a c a c a a b b c c. Effective object tracking may involve distinguishing pixels that correspond to distinct instances of detected objects. This process is known as “instance segmentation.” shows an example visualization of an instance segmentation output based on a captured image . Similar to the dense per-pixel segmentation process described with respect to , the output represented by visualization distinguishes pixels (e.g., included in regions -) that correspond to detected objects -of a particular class of objects (in this case humans) from pixels that do not correspond to such objects (e.g., included in region ). Notably, the instance segmentation process goes a step further to distinguish pixels corresponding to individual instances of the detected objects from each other. For example, pixels in region correspond to a detected instance of a human , pixels in region correspond to a detected instance of a human , and pixels in region correspond to a detected instance of a human 140 Distinguishing between instances of detected objects may be based on an analysis of pixels corresponding to detected objects. For example, a grouping method may be applied by the tracking system to associate pixels corresponding to a particular class of object to a particular instance of that class by selecting pixels that are substantially similar to certain other pixels corresponding to that instance, pixels that are spatially clustered, pixel clusters that fit an appearance-based model for the object class, etc. Again, this process may involve applying a deep convolutional neural network to distinguish individual instances of detected objects. FIG. 37 FIG. 37 140 3702 3702 140 3710 3702 a c Instance segmentation may associate pixels corresponding to particular instances of objects; however, such associations may not be temporally consistent. Consider again, the example described with respect to . As illustrated in , a tracking system has identified three instances of a certain class of objects (i.e., humans) by applying an instance segmentation process to a captured image of the physical environment. This example captured image may represent only one frame in a sequence of frames of captured video. When a second frame is received, the tracking system may not be able to recognize newly identified object instances as corresponding to the same three people -as captured in image . 140 114 115 100 To address this issue, the tracking system can include an identity recognition system. An identity recognition system may process received inputs (e.g., captured images) to learn the appearances of instances of certain objects (e.g., of particular people). Specifically, the identity recognition system may apply a machine-learning appearance-based model to digital images captured by one or more image capture devices / associated with a UAV . Instance segmentations identified based on processing of captured images can then be compared against such appearance-based models to resolve unique identities for one or more of the detected objects. Identity recognition can be useful for various different tasks related to object tracking. As previously alluded to, recognizing the unique identities of detected objects allows for temporal consistency. Further, identity recognition can enable the tracking of multiple different objects (as will be described in more detail). Identity recognition may also facilitate object persistence that enables re-acquisition of previously tracked objects that fell out of view due to limited FOV of the image capture devices, motion of the object, and/or occlusion by another object. Identity recognition can also be applied to perform certain identity-specific behaviors or actions, such as recording video when a particular person is in view. In some embodiments, an identity recognition process may employ a deep convolutional neural network to learn one or more effective appearance-based models for certain objects. In some embodiments, the neural network can be trained to learn a distance metric that returns a low distance value for image crops belonging to the same instance of an object (e.g., a person), and a high distance value otherwise. 140 114 115 100 140 100 100 In some embodiments, an identity recognition process may also include learning appearances of individual instances of objects such as people. When tracking humans, a tracking system may be configured to associate identities of the humans, either through user-input data or external data sources such as images associated with individuals available on social media. Such data can be combined with detailed facial recognition processes based on images received from any of the one or more image capture devices / onboard the UAV . In some embodiments, an identity recognition process may focus on one or more key individuals. For example, a tracking system associated with a UAV may specifically focus on learning the identity of a designated owner of the UAV and retain and/or improve its knowledge between flights for tracking, navigation, and/or other purposes such as access control. 140 140 In some embodiments, a tracking system may be configured to focus tracking on a specific object detected in captured images. In such a single-object tracking approach, an identified object (e.g., a person) is designated for tracking while all other objects (e.g., other people, trees, buildings, landscape features, etc.) are treated as distractors and ignored. While useful in some contexts, a single-object tracking approach may have some disadvantages. For example, an overlap in trajectory, from the point of view of an image capture device, of a tracked object and a distractor object may lead to an inadvertent switch in the object being tracked such that the tracking system begins tracking the distractor instead. Similarly, spatially close false positives by an object detector can also lead to inadvertent switches in tracking. 114 115 140 A multi-object tracking approach addresses these shortcomings, and introduces a few additional benefits. In some embodiments, a unique track is associated with each object detected in the images captured by the one or more image capture devices /. In some cases, it may not be practical, from a computing standpoint, to associate a unique track with every single object that is captured in the images. For example, a given image may include hundreds of objects, including minor features such as rocks or leaves of trees. Instead, unique tracks may be associate with certain classes of objects that may be of interest from a tracing standpoint. For example, the tracking system may be configured to associate a unique track with every object detected that belongs to a class that is generally mobile (e.g., people, animals, vehicles, etc.). 140 140 Each unique track may include an estimate for the spatial location and movement of the object being tracked (e.g., using the spatiotemporal factor graph described earlier) as well as its appearance (e.g., using the identity recognition feature). Instead of pooling together all other distractors (i.e., as may be performed in a single object tracking approach), the tracking system can learn to distinguish between the multiple individual tracked objects. By doing so, the tracking system may render inadvertent identity switches less likely. Similarly, false positives by the object detector can be more robustly rejected as they will tend to not be consistent with any of the unique tracks. 140 An aspect to consider when performing multi-object tracking includes the association problem. In other words, given a set of object detections based on captured images (including parameterization by 3D location and regions in the image corresponding to segmentation), an issue arises regarding how to associate each of the set of object detections with corresponding tracks. To address the association problem, the tracking system can be configured to associate one of a plurality of detected objects with one of a plurality of estimated object tracks based on a relationship between a detected object and an estimate object track. Specifically, this process may involve computing a “cost” value for one or more pairs of object detections and estimate object tracks. The computed cost values can take into account, for example, the spatial distance between a current location (e.g., in 3D space and/or image space) of a given object detection and a current estimate of a given track (e.g., in 3D space and/or in image space), an uncertainty of the current estimate of the given track, a difference between a given detected object's appearance and a given track's appearance estimate, and/or any other factors that may tend to suggest an association between a given detected object and given track. In some embodiments, multiple cost values are computed based on various different factors and fused into a single scalar value that can then be treated as a measure of how well a given detected object matches a given track. The aforementioned cost formulation can then be used to determine an optimal association between a detected object and a corresponding track by treating the cost formulation as an instance of a minimum cost perfect bipartite matching problem, which can be solved using, for example, the Hungarian algorithm. 140 114 115 In some embodiments, effective object tracking by a tracking system may be improved by incorporating information regarding a state of an object. For example, a detected object such as a human may be associated with any one or more defined states. A state in this context may include an activity by the object such as sitting, standing, walking, running, or jumping. In some embodiments, one or more perception inputs (e.g., visual inputs from image capture devices /) may be used to estimate one or more parameters associated with detected objects. The estimated parameters may include an activity type, motion capabilities, trajectory heading, contextual location (e.g., indoors vs. outdoors), interaction with other detected objects (e.g., two people walking together, a dog on a leash held by a person, a trailer pulled by a car, etc.), and any other semantic attributes. 114 115 100 100 Generally, object state estimation may be applied to estimate one or more parameters associated with a state of a detected object based on perception inputs (e.g., images of the detected object captured by one or more image capture devices / onboard a UAV or sensor data from any other sensors onboard the UAV ). The estimated parameters may then be applied to assist in predicting the motion of the detected object and thereby assist in tracking the detected object. For example, future trajectory estimates may differ for a detected human depending on whether the detected human is walking, running, jumping, riding a bicycle, riding in a car, etc. In some embodiments, deep convolutional neural networks may be applied to generate the parameter estimates based on multiple data sources (e.g., the perception inputs) to assist in generating future trajectory estimates and thereby assist in tracking. 140 100 100 100 100 As previously alluded to, a tracking system may be configured to estimate (i.e., predict) a future trajectory of a detected object based on past trajectory measurements and/or estimates, current perception inputs, motion models, and any other information (e.g., object state estimates). Predicting a future trajectory of a detected object is particularly useful for autonomous navigation by the UAV . Effective autonomous navigation by the UAV may depend on anticipation of future conditions just as much as current conditions in the physical environment. Through a motion planning process, a navigation system of the UAV may generate control commands configured to cause the UAV to maneuver, for example, to avoid a collision, maintain separation with a tracked object in motion, and/or satisfy any other navigation objectives. Predicting a future trajectory of a detected object is generally a relatively difficult problem to solve. The problem can be simplified for objects that are in motion according to a known and predictable motion model. For example, an object in free fall is expected to continue along a previous trajectory while accelerating at rate based on a known gravitational constant and other known factors (e.g., wind resistance). In such cases, the problem of generating a prediction of a future trajectory can be simplified to merely propagating past and current motion according to a known or predictable motion model associated with the object. Objects may of course deviate from a predicted trajectory generated based on such assumptions for a number of reasons (e.g., due to collision with another object). However, the predicted trajectories may still be useful for motion planning and/or tracking purposes. 140 140 140 140 140 140 140 140 Dynamic objects such as people and animals, present a more difficult challenge when predicting future trajectories because the motion of such objects is generally based on the environment and their own free will. To address such challenges, a tracking system may be configured to take accurate measurements of the current position and motion of an object and use differentiated velocities and/or accelerations to predict a trajectory a short time (e.g., seconds) into the future and continually update such prediction as new measurements are taken. Further, the tracking system may also use semantic information gathered from an analysis of captured images as cues to aid in generating predicted trajectories. For example, a tracking system may determine that a detected object is a person on a bicycle traveling along a road. With this semantic information, the tracking system may form an assumption that the tracked object is likely to continue along a trajectory that roughly coincides with a path of the road. As another related example, the tracking system may determine that the person has begun turning the handlebars of the bicycle to the left. With this semantic information, the tracking system may form an assumption that the tracked object will likely turn to the left before receiving any positional measurements that expose this motion. Another example, particularly relevant to autonomous objects such as people or animals is to assume that that the object will tend to avoid collisions with other objects. For example, the tracking system may determine a tracked object is a person heading on a trajectory that will lead to a collision with another object such as a light pole. With this semantic information, the tracking system may form an assumption that the tracked object is likely to alter its current trajectory at some point before the collision occurs. A person having ordinary skill will recognize that these are only examples of how semantic information may be utilized as a cue to guide prediction of future trajectories for certain objects. 140 In addition to performing an object detection process in one or more captured images per time frame, the tracking system may also be configured to perform a frame-to-frame tracking process, for example, to detect motion of a particular set or region of pixels in images at subsequent time frames (e.g., video frames). Such a process may involve applying a mean-shift algorithm, a correlation filter, and/or a deep network. In some embodiments, frame-to-frame tracking may be applied by a system that is separate from an object detection system wherein results from the frame-to-frame tracking are fused into a spatiotemporal factor graph. Alternatively, or in addition, an object detection system may perform frame-to-frame tracking if, for example, the system has sufficient available computing resources (e.g., memory). For example, an object detection system may apply frame-to-frame tracking through recurrence in a deep network and/or by passing in multiple images at a time. A frame-to-frame tracking process and object detection process can also be configured to complement each other, with one resetting the other when a failure occurs. 140 114 115 100 140 140 114 115 140 114 115 As previously discussed, the tracking system may be configured to process images (e.g., the raw pixel data) received from one or more image capture devices / onboard a UAV . Alternatively, or in addition, the tracking system may also be configured to operate by processing disparity images. A “disparity image” may generally be understood as an image representative of a disparity between two or more corresponding images. For example, a stereo pair of images (e.g., left image and right image) captured by a stereoscopic image capture device will exhibit an inherent offset due to the slight difference in position of the two or more cameras associated with the stereoscopic image capture device. Despite the offset, at least some of the objects appearing in one image should also appear in the other image; however, the image locations of pixels corresponding to such objects will differ. By matching pixels in one image with corresponding pixels in the other and calculating the distance between these corresponding pixels, a disparity image can be generated with pixel values that are based on the distance calculations. Such a disparity image will tend to highlight regions of an image that correspond to objects in the physical environment since the pixels corresponding to the object will have similar disparities due to the object's 3D location in space. Accordingly, a disparity image, that may have been generated by processing two or more images according to a separate stereo algorithm, may provide useful cues to guide the tracking system in detecting objects in the physical environment. In many situations, particularly where harsh lighting is present, a disparity image may actually provide stronger cues about the location of objects than an image captured from the image capture devices /. As mentioned, disparity images may be computed with a separate stereo algorithm. Alternatively, or in addition, disparity images may be output as part of the same deep network applied by the tracking system . Disparity images may be used for object detection separately from the images received from the image capture devices /, or they may be combined into a single network for joint inference. 140 140 140 114 115 140 In general, a tracking system (e.g., including an object detection system and/or an associated instance segmentation system) may be primary concerned with determining which pixels in a given image correspond to each object instance. However, these systems may not consider portions of a given object that are not actually captured in a given image. For example, pixels that would otherwise correspond with an occluded portion of an object (e.g., a person partially occluded by a tree) may not be labeled as corresponding to the object. This can be disadvantageous for object detection, instance segmentation, and/or identity recognition because the size and shape of the object may appear in the captured image to be distorted due to the occlusion. To address this issue, the tracking system may be configured to imply a segmentation of an object instance in a captured image even if that object instance is occluded by other object instances. The object tracking system may additionally be configured to determine which of the pixels associated with an object instance correspond with an occluded portion of that object instance. This process is generally referred to as “amodal segmentation” in that the segmentation process takes into consideration the whole of a physical object even if parts of the physical object are not necessarily perceived, for example, received images captured by the image capture devices /. Amodal segmentation may be particularly advantageous when performing identity recognition and in a tracking system configured for multi-object tracking. 140 114 115 114 115 140 140 140 140 Loss of visual contact is to be expected when tracking an object in motion through a physical environment. A tracking system based primarily on visual inputs (e.g., images captured by image capture devices /) may lose a track on an object when visual contact is lost (e.g., due to occlusion by another object or by the object leaving a FOV of an image capture device /). In such cases, the tracking system may become uncertain of the object's location and thereby declare the object lost. Human pilots generally do not have this issue, particularly in the case of momentary occlusions, due to the notion of object permanence. Object permanence assumes that, given certain physical constraints of matter, an object cannot suddenly disappear or instantly teleport to another location. Based on this assumption, if it is clear that all escape paths would have been clearly visible, then an object is likely to remain in an occluded volume. This situation is most clear when there is single occluding object (e.g., boulder) on flat ground with free space all around. If a tracked object in motion suddenly disappears in the captured image at a location of another object (e.g., the bolder), then it can be assumed that the object remains at a position occluded by the other object and that the tracked object will emerge along one of one or more possible escape paths. In some embodiments, the tracking system may be configured to implement an algorithm that bounds the growth of uncertainty in the tracked objects location given this concept. In other words, when visual contact with a tracked object is lost at a particular position, the tracking system can bound the uncertainty in the object's position to the last observed position and one or more possible escape paths given a last observed trajectory. A possible implementation of this concept may include generating, by the tracking system , an occupancy map that is carved out by stereo and the segmentations with a particle filter on possible escape paths. Unmanned Aerial Vehicle—Example System 100 A UAV , according to the present teachings, may be implemented as any type of UAV. A UAV, sometimes referred to as a drone, is generally defined as any aircraft capable of controlled flight without a human pilot onboard. UAVs may be controlled autonomously by onboard computer processors or via remote control by a remotely located human pilot. Similar to an airplane, UAVs may utilize fixed aerodynamic surfaces along with a propulsion system (e.g., propeller, jet, etc.) to achieve lift. Alternatively, similar to helicopters, UAVs may directly use a propulsion system (e.g., propeller, jet, etc.) to counter gravitational forces and achieve lift. Propulsion-driven lift (as in the case of helicopters) offers significant advantages in certain implementations, for example, as a mobile filming platform, because it allows for controlled motion along all axes. Multi-rotor helicopters, in particular quadcopters, have emerged as a popular UAV configuration. A quadcopter (also known as a quadrotor helicopter or quadrotor) is a multi-rotor helicopter that is lifted and propelled by four rotors. Unlike most helicopters, quadcopters use two sets of two fixed-pitch propellers. A first set of rotors turns clockwise, while a second set of rotors turns counter-clockwise. In turning opposite directions, a first set of rotors may counter the angular torque caused by the rotation of the other set, thereby stabilizing flight. Flight control is achieved through variation in the angular velocity of each of the four fixed-pitch rotors. By varying the angular velocity of each of the rotors, a quadcopter may perform precise adjustments in its position (e.g., adjustments in altitude and level flight left, right, forward and backward) and orientation, including pitch (rotation about a first lateral axis), roll (rotation about a second lateral axis), and yaw (rotation about a vertical axis). For example, if all four rotors are spinning (two clockwise, and two counter-clockwise) at the same angular velocity, the net aerodynamic torque about the vertical yaw axis is zero. Provided the four rotors spin at sufficient angular velocity to provide a vertical thrust equal to the force of gravity, the quadcopter can maintain a hover. An adjustment in yaw may be induced by varying the angular velocity of a subset of the four rotors thereby mismatching the cumulative aerodynamic torque of the four rotors. Similarly, an adjustment in pitch and/or roll may be induced by varying the angular velocity of a subset of the four rotors but in a balanced fashion such that lift is increased on one side of the craft and decreased on the other side of the craft. An adjustment in altitude from hover may be induced by applying a balanced variation in all four rotors, thereby increasing or decreasing the vertical thrust. Positional adjustments left, right, forward, and backward may be induced through combined pitch/roll maneuvers with balanced applied vertical thrust. For example, to move forward on a horizontal plane, the quadcopter would vary the angular velocity of a subset of its four rotors in order to perform a pitch forward maneuver. While pitching forward, the total vertical thrust may be increased by increasing the angular velocity of all the rotors. Due to the forward pitched orientation, the acceleration caused by the vertical thrust maneuver will have a horizontal component and will therefore accelerate the craft forward on a horizontal plane. FIG. 38 FIG. 38 3800 100 3800 3802 3804 3806 3808 3810 3812 3814 3816 3818 3820 3822 3824 3826 3828 3830 3832 3834 3836 3838 3840 3842 shows a diagram of an example UAV system including various functional system components that may be part of a UAV , according to some embodiments. UAV system may include one or more means for propulsion (e.g., rotors and motor(s) ), one or more electronic speed controllers , a flight controller , a peripheral interface , processor(s) , a memory controller , a memory (which may include one or more computer readable storage media), a power module , a GPS module , a communications interface , audio circuitry , an accelerometer (including subcomponents such as gyroscopes), an IMU , a proximity sensor , an optical sensor controller and associated optical sensor(s) , a mobile device interface controller with associated interface device(s) , and any other input controllers and input device(s) , for example, display controllers with associated display device(s). These components may communicate over one or more communication buses or signal lines as represented by the arrows in . 3800 100 100 3800 3800 100 3890 FIG. 38 UAV system is only one example of a system that may be part of a UAV . A UAV may include more or fewer components than shown in system , may combine two or more components as functional units, or may have a different configuration or arrangement of the components. Some of the various components of system shown in may be implemented in hardware, software or a combination of both hardware and software, including one or more signal processing and/or application specific integrated circuits. Also, UAV may include an off-the-shelf UAV (e.g., a currently available remote-controlled quadcopter) coupled with a modular add-on device (for example, one including components within outline ) to perform the innovative functions described in this disclosure. 3802 3804 3802 3804 3806 As described earlier, the means for propulsion - may comprise fixed-pitch rotors. The means for propulsion may also include variable-pitch rotors (for example, using a gimbal mechanism), a variable-pitch jet engine, or any other mode of propulsion having the effect of providing force. The means for propulsion - may include a means for varying the applied thrust, for example, via an electronic speed controller varying the speed of each fixed-pitch rotor. 3808 3834 120 3802 3806 100 3808 3812 3802 3806 100 120 100 3808 3800 3808 120 160 FIG. 38 FIG. 2 Flight controller may include a combination of hardware and/or software configured to receive input data (e.g., sensor data from image capture devices , and or generated trajectories form an autonomous navigation system ), interpret the data and output control commands to the propulsion systems - and/or aerodynamic surfaces (e.g., fixed wing control surfaces) of the UAV . Alternatively, or in addition, a flight controller may be configured to receive control commands generated by another component or device (e.g., processors and/or a separate computing device), interpret those control commands and generate control signals to the propulsion systems - and/or aerodynamic surfaces (e.g., fixed wing control surfaces) of the UAV . In some embodiments, the previously mentioned navigation system of the UAV may comprise the flight controller and/or any one or more of the other components of system . Alternatively, the flight controller shown in may exist as a component separate from the navigation system , for example, similar to the flight controller shown in . 3816 3816 3800 3812 3810 3814 Memory may include high-speed random-access memory and may also include non-volatile memory, such as one or more magnetic disk storage devices, flash memory devices, or other non-volatile solid-state memory devices. Access to memory by other components of system , such as the processors and the peripherals interface , may be controlled by the memory controller . 3810 3800 3812 3816 3812 3816 100 3812 3810 3812 3814 The peripherals interface may couple the input and output peripherals of system to the processor(s) and memory . The one or more processors run or execute various software programs and/or sets of instructions stored in memory to perform various functions for the UAV and to process data. In some embodiments, processors may include general central processing units (CPUs), specialized processing units such as graphical processing units (GPUs) particularly suited to parallel processing applications, or any combination thereof. In some embodiments, the peripherals interface , the processor(s) , and the memory controller may be implemented on a single integrated chip. In some other embodiments, they may be implemented on separate chips. 3822 The network communications interface may facilitate transmission and reception of communications signals often in the form of electromagnetic signals. The transmission and reception of electromagnetic communications signals may be carried out over physical media such as copper wire cabling or fiber optic cabling, or may be carried out wirelessly, for example, via a radiofrequency (RF) transceiver. In some embodiments, the network communications interface may include RF circuitry. In such embodiments, RF circuitry may convert electrical signals to/from electromagnetic signals and communicate with communications networks and other communications devices via the electromagnetic signals. The RF circuitry may include well-known circuitry for performing these functions, including, but not limited to, an antenna system, an RF transceiver, one or more amplifiers, a tuner, one or more oscillators, a digital signal processor, a CODEC chipset, a subscriber identity module (SIM) card, memory, and so forth. The RF circuitry may facilitate transmission and receipt of data over communications networks (including public, private, local, and wide area). For example, communication may be over a wide area network (WAN), a local area network (LAN), or a network of networks such as the Internet. Communication may be facilitated over wired transmission media (e.g., via Ethernet) or wirelessly. Wireless communication may be over a wireless cellular telephone network, a wireless local area network (LAN) and/or a metropolitan area network (MAN), and other modes of wireless communication. The wireless communication may use any of a plurality of communications standards, protocols and technologies, including, but not limited to, Global System for Mobile Communications (GSM), Enhanced Data GSM Environment (EDGE), high-speed downlink packet access (HSDPA), wideband code division multiple access (W-CDMA), code division multiple access (CDMA), time division multiple access (TDMA), Bluetooth, Wireless Fidelity (Wi-Fi) (e.g., IEEE 802.11n and/or IEEE 802.11ac), voice over Internet Protocol (VoIP), Wi-MAX, or any other suitable communication protocols. 3824 3850 100 3824 3810 3850 3850 3824 3850 3824 3810 3816 3822 3810 The audio circuitry , including the speaker and microphone , may provide an audio interface between the surrounding environment and the UAV . The audio circuitry may receive audio data from the peripherals interface , convert the audio data to an electrical signal, and transmit the electrical signal to the speaker . The speaker may convert the electrical signal to human-audible sound waves. The audio circuitry may also receive electrical signals converted by the microphone from sound waves. The audio circuitry may convert the electrical signal to audio data and transmit the audio data to the peripherals interface for processing. Audio data may be retrieved from and/or transmitted to memory and/or the network communications interface by the peripherals interface . 3860 100 3834 3838 3842 3810 3860 3832 3836 3840 3840 3842 The I/O subsystem may couple input/output peripherals of UAV , such as an optical sensor system , the mobile device interface , and other input/control devices , to the peripherals interface . The I/O subsystem may include an optical sensor controller , a mobile device interface controller , and other input controller(s) for other input or control devices. The one or more input controllers receive/send electrical signals from/to other input or control devices . 3842 100 The other input/control devices may include physical buttons (e.g., push buttons, rocker buttons, etc.), dials, touch screen displays, slider switches, joysticks, click wheels, and so forth. A touch screen display may be used to implement virtual or soft buttons and one or more soft keyboards. A touch-sensitive touch screen display may provide an input interface and an output interface between the UAV and a user. A display controller may receive and/or send electrical signals from/to the touch screen. The touch screen may display visual output to a user. The visual output may include graphics, text, icons, video, and any combination thereof (collectively termed “graphics”). In some embodiments, some or all of the visual output may correspond to user-interface objects, further details of which are described below. 3816 A touch sensitive display system may have a touch-sensitive surface, sensor or set of sensors that accepts input from the user based on haptic and/or tactile contact. The touch sensitive display system and the display controller (along with any associated modules and/or sets of instructions in memory ) may detect contact (and any movement or breaking of the contact) on the touch screen and convert the detected contact into interaction with user-interface objects (e.g., one or more soft keys or images) that are displayed on the touch screen. In an exemplary embodiment, a point of contact between a touch screen and the user corresponds to a finger of the user. The touch screen may use liquid crystal display (LCD) technology, or light emitting polymer display (LPD) technology, although other display technologies may be used in other embodiments. The touch screen and the display controller may detect contact and any movement or breaking thereof using any of a plurality of touch sensing technologies now known or later developed, including, but not limited to, capacitive, resistive, infrared, and surface acoustic wave technologies, as well as other proximity sensor arrays or other elements for determining one or more points of contact with a touch screen. 3838 3836 100 104 3822 100 104 The mobile device interface device along with mobile device interface controller may facilitate the transmission of data between a UAV and other computing devices such as a mobile device . According to some embodiments, communications interface may facilitate the transmission of data between UAV and a mobile device (for example, where data is transferred over a Wi-Fi network). 3800 3818 3818 UAV system also includes a power system for powering the various components. The power system may include a power management system, one or more power sources (e.g., battery, alternating current (AC), etc.), a recharging system, a power failure detection circuit, a power converter or inverter, a power status indicator (e.g., a light-emitting diode (LED)) and any other components associated with the generation, management and distribution of power in computerized device. 3800 3834 3834 114 115 100 3834 3832 3860 3834 3834 3834 3816 3834 3834 3840 3834 3834 3834 3834 3834 100 100 100 100 100 FIG. 1A FIG. 38 UAV system may also include one or more image capture devices . Image capture devices may be the same as the image capture device / of UAV described with respect to . shows an image capture device coupled to an image capture controller in I/O subsystem . The image capture device may include one or more optical sensors. For example, image capture device may include a charge-coupled device (CCD) or complementary metal-oxide semiconductor (CMOS) phototransistors. The optical sensors of image capture devices receive light from the environment, projected through one or more lens (the combination of an optical sensor and lens can be referred to as a “camera”) and converts the light to data representing an image. In conjunction with an imaging module located in memory , the image capture device may capture images (including still images and/or video). In some embodiments, an image capture device may include a single fixed camera. In other embodiments, an image capture device may include a single adjustable camera (adjustable using a gimbal mechanism with one or more axes of motion). In some embodiments, an image capture device may include a camera with a wide-angle lens providing a wider FOV. In some embodiments, an image capture device may include an array of multiple cameras providing up to a full 360 degree view in all directions. In some embodiments, an image capture device may include two or more cameras (of any type as described herein) placed next to each other in order to provide stereoscopic vision. In some embodiments, an image capture device may include multiple cameras of any combination as described above. In some embodiments, the cameras of an image capture device may be arranged such that at least two cameras are provided with overlapping FOV at multiple angles around the UAV , thereby allowing for stereoscopic (i.e., 3D) image/video capture and depth recovery (e.g., through computer vision algorithms) at multiple angles around UAV . For example, UAV may include four sets of two cameras each positioned so as to provide a stereoscopic view at multiple angles around the UAV . In some embodiments, a UAV may include some cameras dedicated for image capture of a subject and other cameras dedicated for image capture for visual navigation (e.g., through visual inertial odometry). 3800 3830 3830 3810 3830 3840 3860 3830 3830 FIG. 38 UAV system may also include one or more proximity sensors . shows a proximity sensor coupled to the peripherals interface . Alternately, the proximity sensor may be coupled to an input controller in the I/O subsystem . Proximity sensors may generally include remote sensing technology for proximity detection, range measurement, target identification, etc. For example, proximity sensors may include radar, sonar, and LIDAR. 3800 3826 3826 3810 3826 3840 3860 FIG. 38 UAV system may also include one or more accelerometers . shows an accelerometer coupled to the peripherals interface . Alternately, the accelerometer may be coupled to an input controller in the I/O subsystem . 3800 3828 3828 3826 UAV system may include one or more IMU . An IMU may measure and report the UAV's velocity, acceleration, orientation, and gravitational forces using a combination of gyroscopes and accelerometers (e.g., accelerometer ). 3800 3820 3820 3810 3820 3840 3860 3820 100 FIG. 38 UAV system may include a GPS receiver . shows an GPS receiver coupled to the peripherals interface . Alternately, the GPS receiver may be coupled to an input controller in the I/O subsystem . The GPS receiver may receive signals from GPS satellites in orbit around the earth, calculate a distance to each of the GPS satellites (through the use of GPS software), and thereby pinpoint a current global position of UAV . 3816 FIG. 38 In some embodiments, the software components stored in memory may include an operating system, a communication module (or set of instructions), a flight control module (or set of instructions), a localization module (or set of instructions), a computer vision module, a graphics module (or set of instructions), and other applications (or sets of instructions). For clarity, one or more modules and/or applications may not be shown in . An operating system (e.g., Darwin, RTXC, Linux, Unix, OS X, Windows, or an embedded operating system such as VxWorks) includes various software components and/or drivers for controlling and managing general system tasks (e.g., memory management, storage device control, power management, etc.) and facilitates communication between various hardware and software components. 3844 3822 3844 A communications module may facilitate communication with other devices over one or more external ports and may also include various software components for handling data transmission via the network communications interface . The external port (e.g., Universal Serial Bus (USB), Firewire, etc.) may be adapted for coupling directly to other devices or indirectly over a network (e.g., the Internet, wireless LAN, etc.). 3812 3834 3830 A graphics module may include various software components for processing, rendering and displaying graphics data. As used herein, the term “graphics” may include any object that can be displayed to a user, including, without limitation, text, still images, videos, animations, icons (such as user-interface objects including soft keys), and the like. The graphics module in conjunction with a graphics processing unit (GPU) may process in real time or near real time, graphics data captured by optical sensor(s) and/or proximity sensors . 100 3812 3834 3830 100 A computer vision module, which may be a component of a graphics module, provides analysis and recognition of graphics data. For example, while UAV is in flight, the computer vision module along with a graphics module (if separate), processor , and image capture devices(s) and/or proximity sensors may recognize and track the captured image of an object located on the ground. The computer vision module may further communicate with a localization/navigation module and flight control module to update a position and/or orientation of the UAV and to provide course corrections to fly along a planned trajectory through a physical environment. 100 3808 A localization/navigation module may determine the location and/or orientation of UAV and provide this information for use in various modules and applications (e.g., to a flight control module in order to generate commands for use by the flight controller ). 3834 3832 3816 Image capture devices(s) , in conjunction with an image capture device controller and a graphics module, may be used to capture images (including still images and video) and store them into memory . 3816 3816 Each of the above identified modules and applications correspond to a set of instructions for performing one or more functions described above. These modules (i.e., sets of instructions) need not be implemented as separate software programs, procedures or modules, and, thus, various subsets of these modules may be combined or otherwise re-arranged in various embodiments. In some embodiments, memory may store a subset of the modules and data structures identified above. Furthermore, memory may store additional modules and data structures not described above. Example Computer Processing System FIG. 39 3900 3900 100 104 3900 3902 3906 3910 3912 3918 3920 3922 3924 3926 3930 3916 3916 3916 1394 is a block diagram illustrating an example of a processing system in which at least some operations described in this disclosure can be implemented. The example processing system may be part of any of the aforementioned devices including, but not limited to UAV and mobile device . The processing system may include one or more central processing units (“processors”) , main memory , non-volatile memory , network adapter (e.g., network interfaces), display , input/output devices , control device (e.g., keyboard and pointing devices), drive unit including a storage medium , and signal generation device that are communicatively connected to a bus . The bus is illustrated as an abstraction that represents any one or more separate physical buses, point to point connections, or both connected by appropriate bridges, adapters, or controllers. The bus , therefore, can include, for example, a system bus, a Peripheral Component Interconnect (PCI) bus or PCI-Express bus, a HyperTransport or industry standard architecture (ISA) bus, a small computer system interface (SCSI) bus, a universal serial bus (USB), IIC (I2C) bus, or an Institute of Electrical and Electronics Engineers (IEEE) standard bus (also called “Firewire”). A bus may also be responsible for relaying data packets (e.g., via full or half duplex wires) between components of the network appliance, such as the switching fabric, network port(s), tool port(s), etc. 3900 In various embodiments, the processing system may be a server computer, a client computer, a personal computer (PC), a user device, a tablet PC, a laptop computer, a personal digital assistant (PDA), a cellular telephone, an iPhone, an iPad, a Blackberry, a processor, a telephone, a web appliance, a network router, switch or bridge, a console, a hand-held console, a (hand-held) gaming device, a music player, any portable, mobile, hand-held device, or any machine capable of executing a set of instructions (sequential or otherwise) that specify actions to be taken by the computing system. 3906 3910 3926 3928 While the main memory , non-volatile memory , and storage medium (also called a “machine-readable medium”) are shown to be a single medium, the term “machine-readable medium” and “storage medium” should be taken to include a single medium or multiple media (e.g., a centralized or distributed database, and/or associated caches and servers) that store one or more sets of instructions . The term “machine-readable medium” and “storage medium” shall also be taken to include any medium that is capable of storing, encoding, or carrying a set of instructions for execution by the computing system and that cause the computing system to perform any one or more of the methodologies of the presently disclosed embodiments. 3904 3908 3928 3902 3900 In general, the routines executed to implement the embodiments of the disclosure, may be implemented as part of an operating system or a specific application, component, program, object, module, or sequence of instructions referred to as “computer programs.” The computer programs typically comprise one or more instructions (e.g., instructions , , ) set at various times in various memory and storage devices in a computer, and that, when read and executed by one or more processing units or processors , cause the processing system to perform operations to execute elements involving the various aspects of the disclosure. Moreover, while embodiments have been described in the context of fully functioning computers and computer systems, those skilled in the art will appreciate that the various embodiments are capable of being distributed as a program product in a variety of forms, and that the disclosure applies equally regardless of the particular type of machine or computer-readable media used to actually effect the distribution. 3910 Further examples of machine-readable storage media, machine-readable media, or computer-readable (storage) media include recordable type media such as volatile and non-volatile memory devices , floppy and other removable disks, hard disk drives, optical disks (e.g., Compact Disk Read-Only Memory (CD ROMS), Digital Versatile Disks (DVDs)), and transmission type media such as digital and analog communication links. 3912 3900 3914 3900 3900 3912 The network adapter enables the processing system to mediate data in a network with an entity that is external to the processing system , such as a network appliance, through any known and/or convenient communications protocol supported by the processing system and the external entity. The network adapter can include one or more of a network adaptor card, a wireless network interface card, a router, an access point, a wireless router, a switch, a multilayer switch, a protocol converter, a gateway, a bridge, bridge router, a hub, a digital media receiver, and/or a repeater. 3912 The network adapter can include a firewall which can, in some embodiments, govern and/or manage permission to access/proxy data in a computer network, and track varying levels of trust between different machines and/or applications. The firewall can be any number of modules having any combination of hardware and/or software components able to enforce a predetermined set of access rights between a particular set of machines and applications, machines and machines, and/or applications and applications, for example, to regulate the flow of traffic and resource sharing between these varying entities. The firewall may additionally manage and/or have access to an access control list which details permissions including, for example, the access and operation rights of an object by an individual, a machine, and/or an application, and the circumstances under which the permission rights stand. As indicated above, the techniques introduced here may be implemented by, for example, programmable circuitry (e.g., one or more microprocessors), programmed with software and/or firmware, entirely in special-purpose hardwired (i.e., non-programmable) circuitry, or in a combination or such forms. Special-purpose circuitry can be in the form of, for example, one or more application-specific integrated circuits (ASICs), programmable logic devices (PLDs), field-programmable gate arrays (FPGAs), etc. Note that any of the embodiments described above can be combined with another embodiment, except to the extent that it may be stated otherwise above or to the extent that any such embodiments might be mutually exclusive in function and/or structure. Although the present invention has been described with reference to specific exemplary embodiments, it will be recognized that the invention is not limited to the embodiments described, but can be practiced with modification and alteration within the spirit and scope of the appended claims. Accordingly, the specification and drawings are to be regarded in an illustrative sense rather than a restrictive sense.
Data Analyst in Arlington, VA at Booz Allen Hamilton Inc. Provide analytic and management support to ensure Navy programs and requirements align with DoD guidelines and meet CNO strategic objectives. Assist the client with comprehending the context of its program data by extracting qualitative and quantitative relationships, including patterns and trends from large amounts of data and providing analytic support to help inform policy, rational decision making, and resource allocation at the highest levels of the Navy. Develop analytic products to facilitate the development of formal reports and senior leadership briefings, information papers, spreadsheets, and other documents, as required. Assist with programmatic analysis, metric development, and requirements analysis to support the Navy’s position during joint forums and adapt data analytic techniques to meet changing needs of key DoD stakeholders. Support the compilation, tracking, validation, and analysis of data from various reports, surveys, and government databases.
https://careers.boozallen.com/en-US/job/data-analyst/J3G746746WBFM9Q98B0
Lets be honest, many people were completely shocked by the revelations from Edward Snowden’s release of classified NSA documents last year about the width and breadth of the NSA’s spying. Unless you had seen the Will Smith movie Enemy of the State. From 1997. Which basically was a movie about how the NSA did EXACTLY what Edward Snowden said they did. And that movie came out before things like the Patriot Act. Amazingly, people were still shocked, shocked I say, to discover that the NSA was spying on, well… everyone. Newsflash: electronic data is not totally secure. Never will be. If you are able to access the information, someone else can too. It’s pretty basic. That’s why I was so surprised to read this article from the Lawyerist, by one of my favorite legal bloggers, Sam Glover, discussing how he’s re-thinking his use of the cloud for his legal files. In other words, he’s “shocked, shocked I say” to learn that the cloud isn’t totally secure. Sam talks at length about ways that attorneys can use various cloud-based systems to accomplish particular tasks, such as email communication, calendar and to-do list updates, and document storage, while maintaining some security. He also talks about which of these items are more or less appropriate for cloud-based systems. Yet, at the end, he still says that although he’s not abandoning the cloud for his law practice (that he decided would be his default storage only a year ago), but he’s only using it for things he absolutely needs to. I want to be clear, I’m not criticizing Sam’s decision. What puzzles me is the logic behind first, his decision to put everything in the cloud, and second, to largely abandon the cloud based on security flaws exposed by the Snowden leaks. Like many people in our profession do, Sam innocently presumed use of cloud-based services to be considerably more secure than even their developers would suggest. Then, upon learning that cloud-based services are just as secure as other digital systems, he overreacts. Cloud-based security is a balance between convenience and strength. Just like everything else in the history of all things, the more convenient something is, the less secure it is. Why would this not be the case with cloud-based storage systems? Particularly systems that rely on the same single-factor authentication systems as your email or credit cards. I really don’t understand where this utopian vision of digital storage came from. Despite his new revelation, Sam does an excellent job of identifying some excellent ways to keep your law firm as secure as possible when performing certain tasks. The trouble is, due to many attorneys’ ability to pretend everything they’re using is secure until it’s proven not to be, these tools should have been utilized in the first place! As I discuss in another article, seriously, why aren’t you encrypting everything? The Snowden Revelations mean very little to your use of cloud-based systems. As an attorney, one of your greatest ethical concerns is keeping your client’s confidential information protected. Every state has adopted some form of the ABA Model Rule that says attorneys must take reasonable steps to keep that information protected (California, which does not follow the Model Rules, still has a very similar one). Does that mean that you have to make sure your client data is locked up tighter than Fort Knox? Of course not. Just as with everything else, attorneys need to balance the need for client information to be convenient enough for regular use while being secure. It’s unlikely that an attorney would be in ethical trouble if a client’s were stolen from the attorney’s office one night, unless the attorney had no door locks or other security measures. The exact same logic needs to be utilized concerning the Snowden Revelations. While attorneys should be concerned that the NSA is so vastly overreaching their authority, it has little impact on the practice of law. No judge is going to admit privileged communications into evidence simply because the NSA’s hacking program allowed them access to the secure emails. It also seems unfathomable that an ethics charge would stick if Dropbox allowed the NSA access to an attorney’s files without disclosing the access (as may be happening). More importantly, looking at the NSA may be taking your attention from the true threats. A recent survey of top IT professionals conducted by PC World found that only 5% considered government-initiated hacking as their top security threat. 56% listed external, non-government hackers, and just over 30% listed unintentional leaks by employees as the top threat. Secure wisely, react proportionally The best way to guard against an overreaction is to have a better understanding of the situation up-front. No attorney who was aware of the federal government’s spying capabilities (which should have been all of us, in case you missed my first paragraph) should have been surprised that it was being used. More importantly, no attorney should have been relying on cloud-based digital storage and email systems without understanding how secure they actually are. I have a lot of respect for Sam Glover, and I absolutely love the Lawyerist. However, in this case, I’m genuinely shocked, shocked I say, that he really thought the cloud was totally secure.
http://www.thecyberadvocate.com/2014/03/17/you-thought-cloud-based-services-totally-secure/
Due to progressive muscle weakness, the arm function in boys with Duchenne muscular dystrophy (DMD) reduces. An arm support can compensate for this loss of function. Existing arm supports are wheelchair bound, which restricts the ability to perform trunk movements. To evaluate the function of a body-bound arm support, a prototype (based on the Wilmington robotic exoskeleton (WREX) arm support) that allows trunk movements was built. In order to examine the effect of this device and to compare it with an existing wheelchair-bound device, three healthy subjects performed single joint movements (SJMs) and activities of daily living (ADL) with and without the devices. The range of motion (RoM) of the arm and the surface electromyography (sEMG) signal of five different arm muscles were measured. The range of motion increased when compared to the wheelchair-bound device, and the trunk motion was perceived as important to make specific movements easier and more natural, especially the more extreme movements like reaching for a far object and reaching to the top of the head. The sEMG signal was comparable to that of the wheelchair-bound device. This means that an arm support with trunk motion capability can increase the range of motion of the user, while the amount of support to the arm is equal.
https://research.tudelft.nl/en/publications/evaluation-of-an-arm-support-with-trunk-motion-capability
Every human being is a product of his or her environment. Culture is accepted generally as the people’s way of life; the totality of values, traditions, practices, etc. that make a people unique from others. Employees coming from their own backgrounds exhibit attributes of their own cultures. The diversity of cultures, which employees bring to the organization, poses a challenge which organizations must handle well by creating and maintaining an organizational culture which supersedes those of the individuals that make up the organization. Not doing so will leave the organization chaotic as the incongruence of cultures could work against the achievement of the objectives of the organization. It follows that organizations need not only understand the diverse cultures of the employees and the rewards which motivate them the most, but language barriers, training, cultural awareness, and career development programmes, should be aligned with the aspirations/values of the employees. (McLaurin, 2008). Read Also: Optimizing employee resistance to change to unlock productivity gains Luthans (1998), while writing about organizational culture quoted Edgar Schein, who defined organizational culture as “ a pattern of basic assumptions-invented, discovered, or developed by a given group as it learns to cope with its problems of external adaptation and internal integration-that has worked well enough to be considered valuable and, therefore, to be taught to new members as the correct way to perceive, think and feel in relation to those problems.” In the views of Schein while explaining his unity-view of organizational culture, there are three levels of organizational culture. They are artefacts, which refer to the visible and tangible aspects of culture such as logo, buildings, etc.; values and behavioural norms which at the core of the organizational culture are those things that members accept as real and true. These serve as guidance and tools for dealing with uncertainties and daily challenges. The last level is the underlying assumptions, which are the unconscious beliefs and feelings. They are taken for granted in the organization and allow the organization/group to build its own integrity, identity and autonomy and ultimately differentiate it from others.(McLaurin, 2008). Socialization as a way of managing national and organizational cultures Organizations have to integrate national cultures into the organizational culture in order to achieve corporate objectives. The loyalty of employees should be to the organization and not to their respective national cultures, nor individual objectives/values, even as the company’s goal is not to completely wean employees of their national cultures. To be able to eliminate or bring to the barest minimum, the confusing effect of divergent cultures, organizations must create and maintain their own unique, unified, culture. Socialization is the most effective means of achieving this. According to Luthans (1998), the socialization steps are as follows: (a) Selection of entry-level personnel: At this point, the organization uses structured questions that target specific traits to identify candidates that will be able to fit into the organizational culture and values. (b) Through job placement, new staff are instigated via a series of experiences to question the norms and values of the organization and to decide whether or not such are acceptable to them. (c) Job mastery: This is another way of entrenching organizational culture as employees who not only demonstrate mastery of their jobs but have imbibed organizational core values and culture and are seen to be making positive contribution to bottom-line, are rewarded with positions where they have to make important decisions for the company. (d) Measuring and rewarding performance: the next step in the socialization process is measuring operational results in a meticulous, systematic way and rewarding deserving individuals who excel in areas very critical to competitive success and corporate values. (e) Adherence to important values: this involves strict adherence to the organization’s core values. Such adherence eliminates ambiguity and helps employees reconcile their own personal values with those of the organization. It builds trust on the part of the employee that the company would not do anything that would hurt them. (f) Reinforcing organizational stories and folklore: thereis need to continue to spread the stories which underline organizational values. Such stories not only validate the organizational culture, they also help to explain why the organization does things the way it does. (g) Recognition and promotion: this is the final stage in the socialization process. It involves the identification, recognition and promotion of employees who having done their jobs excellently, can serve as mentors and role models to new employees. All organizations face the challenge of achieving a healthy balance between the national or ethnic cultures of their employees and the culture of the organization. Organisations have skillfully used socialization as a tool for this equilibrium. However, in multinational/multicultural organizations, intercultural conflicts cannot be eliminated, and continue to pose a challenge to managers. In the next episode, we shall examine how intercultural conflicts, where not well managed, can crystalise to a crisis, using a case study.
https://businessday.ng/columnist/article/strong-organizational-culture-a-key-success-factor-for-multicultural-organizations/
If Nobody's Perfect Then Why Do We Expect Pet Owners To Be? - Do we have the right to judge other pet owner's if they don't live up to what we deem to be "a good pet owner"? - What qualities must a person have to be deemed a "good pet owner"? - What does a model "good pet owner" look like to you? - Who decided what a model "good pet owner" looks like? We hope you take some time to ponder the above questions, just as we have. But before you do, it would be a great idea to read the excerpts below regarding pet owners. We hope it gives you some insight. Imagine for a moment that you are in a dire situation and your beloved pet is sick. You are handed a $3,000 bill at a veterinary e.r. (many of us already know the feeling and can empathize) but you don't have $3,000 sitting around. You try applying for CareCredit but are declined, have no family or friends who are able or willing to lend you money, and you’re about to lose your housing in the middle of winter (and most human shelters don’t allow pets). Shaming someone who is in an urgent situation — by telling them what you would do in a hypothetical situation — only makes the person asking for help feel even more distressed and hopeless about their options. There is a person behind every pet and as pet owners we all start somewhere. As far as judgment goes it doesn't tend to be very productive — and there’s a big difference between a genuine desire to educate, set an example, and maybe plant some seeds versus wanting to feel superior or unfairly gate-keep. Every shelter animal is an individual and they all have a story but so do their owners. It's easy to say, “if you can’t afford a pet you shouldn’t have one.” However, it’s not that simple, especially now in the age of COVID-19. There are many animals who are deeply loved by their families, but a family’s inability to afford veterinary treatment – especially emergency or surgical treatment — doesn’t necessarily indicate a lack of love or attentive care. Nor does it imply that they are a “bad,” irresponsible or neglectful pet owner. Not one single person is excused from the harsh realities life may throw at them from one day to the next. At any point in our lives things could take an unexpected turn. Doesn't that make us all potentially just one health issue, accident, job loss, or pandemic away from not being able to afford a large veterinary bill?? If you tend to heir more on the judgmental side next time you see someone needing to re-home a pet, or a social media post asking for help with veterinary care, try to stop and think about the type of reply you'd want to get if you found yourself in a similar situation. Often times the people that have found themselves in a tough spot will reach out to generous strangers on social media for financial help but sometimes they have to make the heart wrenching decision to re-home or surrender their animal. Some people are supportive and sympathetic while others can be outright judgmental without evening knowing what that person might be facing in their life. What if we assume that most pet owners are doing the best they can to care for their pets, instead of judging them as financially irresponsible when they have difficulty affording the cost of veterinary care? After all, we don’t know their story. We tend to fill in the blanks with information that we simply don’t have, and the story we concoct in our minds is often negative and nowhere near the truth of the matter. Try instead to receive these pet owners’ stories with empathy, not condemnation. And if you don't know their story and want to try and understand and/or help ask them nicely if they would mind speaking about their troubles. You'd be surprised how many people may just need someone to listen to them or to talk too. America's model of animal sheltering is severely flawed and we will never be able to adopt our way out of the pet overpopulation crisis. It's imperative we get down to root causes. In conclusion, we hope you choose to spend less time being judgmental of struggling pet owners. If we band together as a community in order to develop sustainable solutions for people facing hardships (such as cost barriers to affordable veterinary care and low cost pet friendly housing) then one day shelter animals and the people working so hard to help them may finally see a light at the end of the tunnel.
https://www.sfanimalrescueil.org/judging-pet-owners
Today marks the 3rd entry in our ongoing series of blogs about all the Tabs in Venus 1500 Version 4. This week we will be talking about the Home Tab in Content Studio. Content Studio is one half of Venus 1500 V4, the Venus 1500 Hub being the other half. You can open Content Studio by clicking on the Content Tab in the Venus 1500 Hub and then clicking on the blue Create button. Once Content Studio launches, you will see several tabs along the top of the screen, the first of which is the Home Tab. The Home Tab is where you will find all of your typography or font options, along with several other features to help you create your content. There are 7 panels in the Home Tab, each one containing a different set of options. Let’s take a look at each panel individually. Clipboard The Clipboard panel is the first panel on the left side of the Home Tab. The Clipboard Panel gives you the ability to Cut, Copy and Paste elements. You can click Cut from the Clipboard group on the Home Tab. The element deletes from the layout and stores on your clipboard until another element is copied or you close Content Studio. Click Copy from the Clipboard group on the Home tab to copy the elements you have selected. You can click Paste from the Clipboard group on the Home tab. The element you cut or copied pastes on top of the original element or you can select a different layout on which to paste the element. When you click Paste, you will also see the option to Paste Special that allows you to paste the text in the format of your choice. Content Studio Formatted Document inserts the contents of the clipboard with the provided formatting. From there you will move the pasted element to the desired location on the current layout. Then you will click the Layout Storyboard or Timeline tab, on the bottom of the window, and navigate to the layout you want to paste the element in. The final feature in the Clipboard panel is the Format Painter. The Format Painter allows you to copy the text and background fill properties of an element and apply it to another element. You can double click this button to apply the same formatting to multiple elements in the presentation. Layout The Layout panel allows you to Add, Insert or Delete layouts to and from your presentation. You can Add a Layout to your presentation by clicking on Add in the Layout group on the Home tab. The new layout will appear to the right of the initial Layout in the Layout Storyboard and/or Timeline tab. You can Insert a Layout by clicking on Insert in the Layout group on the Home tab. The new layout is inserted behind the current (selected) layout. You can Delete a Layout by clicking on Delete in the Layout group on the Home tab. This will delete the layout from your presentation, so you will no longer be able to see it in the Layout Storyboard or Timeline tab. Fonts The Fonts Panel is where all the magic happens, as they say! You can click on the Fonts drop-down menu to choose your font, and the Font Size drop-down menu to choose your font size. Adjust the sizing by clicking on the blue arrow buttons to the right of the font style and sizes. Choose from a plethora of buttons below the drop-down menus! Some of these buttons you will most likely be familiar with already, like Bold, Italicize and Underline. However, other buttons let you apply Outlines and Shadows to your text, smooth your text if it looks pixelated, create flashing text, and even adjust the amount of space between your letters! You can also choose which color you would like your text to be by clicking on the Font Color button that looks like the letter “A” with a red underline. Finally, there is a “More” button tucked away in the bottom right corner of the Fonts Panel that you can click on for additional options. Paragraph The Paragraph panel allows you to align the selected text within your layout or text box. You can align it to the left, center or right, and to the top, center or bottom of any layout or text box. The Paragraph panel also allows you to adjust your line spacing (the amount of space between lines of text). Quick Insert The Quick Insert panel gives you the option to browse your computer for pictures or videos to import into your presentation. It also gives you the ability to import a Text Box. For more information on how to use text boxes, be sure to read the below Knowledge Base articles! Color The Color Panel allows you to select Color Presets. These are pre-created background color and text selections that you can choose from. Use color presets if you aren’t sure what color to use in your message, just want to change things up, or need some help getting started creating! All you have to do is select the element on which you want to apply the preset color scheme. Just click Presets, in the Color group, on the Home tab, and then select one of the eight color Presets. Review The Review Panel allows you to check the spelling of your text to ensure that you never send any misspelled words out to your display! I find this tool very helpful! There you go, a complete overview of the Home Tab in Content Studio. We hope you find this information helpful and that you learned something new today! If you enjoy our blog be sure to click on the orange “Receive Email Updates” button on the right side of the page to subscribe. Thanks for reading!
https://blog.daktronics.com/2018/02/08/keeping-tabs-on-your-tabs-the-home-tab-content-studio/
Available on: Stage (2005/2017 versions) A New Career In A New Town (1977-1982) Live In Berlin (1978) Welcome To The Blackout (Live London ’78) Personnel Carlos Alomar, Adrian Belew: guitar George Murray: bass guitar Sean Mayes: piano Roger Powell: keyboards Simon House: electric violin Dennis Davis: drums David Bowie performed ‘Alabama Song’ during the Isolar II Tour in 1978. A studio version from that year was issued as a single in 1980. ‘Alabama Song’ was written by Bertolt Brecht, and set to music by Kurt Weill for the 1927 play Little Mahagonny. The original German lyrics were translated by Brecht’s collaborator Elisabeth Hauptmann in 1925. The song also appeared in the 1930 Brecht/Weill opera The Rise and Fall of the City of Mahagonny. The song is sometimes known as ‘Whisky Bar’. ‘Moon Of Alabama’, and ‘Moon Over Alabama’. The Doors covered the song, as ‘Alabama Song (Whisky Bar)’, on their 1967 debut album, which helped popularise it with a new generation of music fans. Bowie’s version, meanwhile, owes much to German cabaret artist Lotte Lenya’s 1956 recording. Bowie was a fan of Brecht’s music. In 1982 he took the title role in a BBC television adaptation of Baal, and his recordings of the play’s five songs were released that year on the David Bowie in Bertolt Brecht’s Baal EP. Live performances David Bowie began performing ‘Alabama Song’ during the Isolar II Tour. His band first rehearsed it in Canada in May 1978. We rehearsed ‘Alabama Song’ which replaced ‘Rock ‘N’ Roll Suicide’ and became a compulsive hit of the tour. Life on Tour with Bowie Stage was recorded in April and May 1978, at concerts in Philadelphia, Providence and Boston. ‘Alabama Song’ was one of the songs recorded, but was not included on initial pressings of the album. Bowie also performed ‘Alabama Song’ during 1990’s Sound + Vision Tour, and 2002’s Heathen Tour. On 18 September 2002 Bowie performed it during a BBC radio session at London’s Maida Vale Studios. It was watched by an audience of fewer than 100 people. ‘Alabama Song’ was one of just two non-Bowie compositions performed, the other being ‘Cactus’ by Pixies. The other songs were ‘Sunday’, ‘Look Back In Anger’, ‘Survive’, ‘5:15 The Angels Have Gone’, ‘Everyone Says ‘Hi”, ‘Rebel Rebel’, ‘The Bewlay Brothers’, and ‘Heathen (The Rays)’. In the studio Immediately after the London dates of the Isolar II Tour in July 1978, Bowie and his live band recorded ‘Alabama Song’. The session took place on 2 July at Tony Visconti’s Good Earth Studios, at 59 Dean Street in London’s Soho. There was one more thing to do before everyone flew out. Next day, Sunday, we went to Tony Visconti’s tiny studio in Dean Street to record ‘Alabama Song’. It had been such a hit on the tour that David wanted to do it as a single. It was an interesting process. David had some new ideas for the drumming. He wanted Dennis to play very freely against the rhythm to give an unstable, insane atmosphere to the track. When we tried to do this it proved hilariously difficult so we finally laid the backing down without drums then Dennis overdubbed his demolishing attack when his efforts couldn’t disturb the beat. David had us record several verses and choruses which he edited together later in the order he felt worked best. I think the final result is interesting but not completely successful I prefer my two bootleg versions! Life on Tour with Bowie The release The July 1978 studio recording of ‘Alabama Song’ was released as a single in February 1980 in France, Germany, the Netherlands, Spain, United Kingdom, and Yugoslavia, with the 1979 re-recording of ‘Space Oddity’ on the b-side. In the UK the single reached number 23 on the singles chart. In July 1980 ‘Alabama Song’ was the b-side of the ‘Crystal Japan’ single in Japan. ‘Alabama Song’ was reissued as a single in 1982 in Germany, with ‘Amsterdam’ on the b-side. The studio version was the final bonus track on the 1992 Rykodisc reissue of Scary Monsters… And Super Creeps. The other extra tracks were the 1979 re-recordings of ‘Space Oddity’ and ‘Panic In Detroit’, and ‘Crystal Japan’. Stage was reissued in 1991 by Rykodisc/EMI on CD, vinyl and cassette, with the bonus live track ‘Alabama Song’. The album was digitally remastered by EMI in 2005. This version restored the original running order of the concerts, and removed the fades between the songs to give greater continuity. The 2005 version also contained three additional tracks: ‘Be My Wife’, ‘Alabama Song’, and ‘Stay’. In 2004 I got to work with the tapes again to remix it in surround sound. Remixing David in his 1977 incarnation in 2004, I can barely perceive any evidence of aging in his voice. If a Dorian Gray-type portrait of his vocal cords exists, he keeps it well hidden. He is one of the most amazing performers of our time, and these performances seem timeless to me. Bowie, Bolan And The Brooklyn Boy In March 2018 an eight-song mini-album, Live In Berlin (1978), went on sale exclusively at the Brooklyn Museum version of the David Bowie Is exhibition. ‘Alabama Song’ was the penultimate song. It was recorded on 16 May 1978 at the Deutschlandhalle in West Berlin. The April 2018 live album Welcome To The Blackout (Live London ’78) featured another performance of ‘Alabama Song’ from the Isolar II Tour.
https://www.bowiebible.com/songs/alabama-song/
Bennett Elementary has been an authorized International Baccalaureate School since 2005. For more information about the Primary Years Program, please read through the following documents: IBO (International Baccalaureate Organization) website The IB Mission Statement "The International Baccalaureate aims to develop inquiring, knowledgeable and caring young people who help to create a better and more peaceful world through intercultural understanding and respect. To this end the organization works with schools, governments and international organizations to develop challenging programs of international education and rigorous assessment. These programs encourage students across the world to become active, compassionate and lifelong learners who understand that other people, with their differences, can also be right." International mindedness The IB describes attributes of international mindedness in the IB learner profile: caring, knowledgeable, thinkers, balanced, reflective, communicators, principled, open-minded, risk-takers, and inquirers. Education for international mindedness values the world as the broadest context for learning, develops conceptual understanding across a range of subjects (language, math, science, the arts, social studies, and personal, social and physical education) and offers opportunities to inquire, act and reflect. Components of the PYP The IB Primary Years Program, for students aged 3–12, focuses on the development of the whole child as an inquirer, both in the classroom and in the world outside. It provides an educational framework based upon what is currently known about how young students learn. It draws on best practice in primary/elementary schools worldwide. Excerpts taken from: www.ibo.org Key components of the program include:
https://ben.psdschools.org/ben/about-us/ibpyp
Organizations irrespective of their structure, design, hierarchies and outlook have one thing in common, the interplay of dynamics of different natured individuals who constitute them, say Porfeli and Vondracek (2001). This statement reflects three keen interest areas – firstly that individual employees who make an organization are natured differently and have varied interests, goals and personal ambitions. Secondly there is an interplay of these individuals’ intents and goals with those of the others and thirdly and importantly that this interplay translates into a dynamic organizational culture and politics. Politics is power in action cite Culbert and McDonough (1985). There can be no politics without power whether personal or authoritative, and most often than not, people engage in politics at the workplace to achieve additional power of some kind. Thus, the essay has been compiled in agreement with the statement that political activity is alive and well in organizations today.
https://www.studymode.com/essays/Organizational-Politics-1736031.html
20 years ago, Pizza & Pipes, a University Place fixture, burned down Pierce County Fire District 3, University Place firefighter Robert Dietzway climbs down a ladder after applying water to a smoldering hotspot thirteen hours after popular landmark eatery Pizza & Pipes burned on August 3, 1999. Russ Carmack Staff file, 1999 On August 3, 1999, Pizza & Pipes, the region’s go-to destination for quality food accompanied by music from a Wurlitzer pipe organ for 24 years, was gutted by fire. Here is The News Tribune’s reporting at the time: Fire destroys Pizza & Pipes restaurant in University Place Unlimited Digital Access: Only $0.99 For Your First Month Passersby and customers peer into the front windows of Pizza & Pipes after it burned in August 1999. Russ Carmack Staff file, 1999 Published August 4, 1999: By Stacey Burns Flames engulfed and destroyed a popular University Place pizza restaurant after workers evacuated the business Tuesday night. The fire ripped through Pizza & Pipes at 2014 Mildred St. W. about 9 p.m. after smoldering in the restaurant’s attic for nearly an hour, University Place fire investigators said. Flames and black smoke billowed from the roof and could be seen for blocks. The smoke attracted a number of people to the area, many of whom had eaten at the restaurant over the years. The business, known for its gigantic pipe organ, opened more than 24 years ago. Organist Sherrie Mael Gibelyou stands near the stage where she played to pizza-eating customers at Pizza & Pipes a couple months after the building burned. Julie Pena Staff file, 1999 “You hate to see it burn down,” James Kelley said. “It was a good family place to go.” Kelley and dozens of others watched and took photographs as firefighters from University Place, Lakewood and Tacoma battled the blaze for more than an hour. University Place fire spokesman Dave Dupille said no one was seriously injured. The restaurant’s owner was taken to an area hospital for smoke inhalation. He tried to show firefighters a way to fight the blaze and ran into a patch of smoke, Dupille said. Monte Pimlot of Tacoma had just finished eating pizza at his niece’s ninth birthday party when employees evacuated the restaurant about 8:10 p.m. More than 20 patrons were inside the restaurant at the time. The family grabbed the presents and leftover pizza, then stood outside and watched the fire build. Pimlot said he was one of the last people out. “She’ll remember this birthday real well,” he said of his niece. The fire started in a pizza oven, but investigators did not know how or why, Dupille said. The Pierce County Sheriff’s Department sent an arson investigator to the scene, spokesman Ed Troyer said. The blaze crawled up the oven’s vent and into the restaurant’s attic, Dupille said. Patrons said they didn’t know the building was on fire until workers evacuated them. Many said employees tried to put the fire out before removing the customers. “There was no smoke inside,” Anthony Jones said. “There was more smoke on the outside.” Firefighters tried battling the fire from inside the restaurant and from the roof. The building had no sprinkler system. “The fire just ran along the inside (attic area),” Dupille said. “That was a very difficult issue because the ceiling is very high.” Just before 9 p.m., the roof collapsed as flames broke through the ceiling, and firefighters cleared out of the building and off the roof. .... Immediately following the blaze, there were plans to rebuild: Margaret and Dick Daubert, owners of the University Place Pizza & Pipes restaurant talk about how they built the eatery and the loyal customers and employees they had the day after the restaurant burned. Russ Carmack Staff file, 1999 UPlace couple look to rebuild restaurant and Wurlitzer Pizza & Pipes was destroyed by fire after nearly 24 years in business Published August 5, 1999: By Eric Collins For the first time in almost 24 years, Dick and Margaret Daubert woke up Wednesday morning without a job. As the couple stood outside the blackened, waterlogged remains of their popular University Place restaurant, Pizza & Pipes, they contemplated the destruction of a fire the night before that consumed their growing business. Employees, longtime patrons and friends gathered throughout the morning in the business parking lot, doling out hugs and looking at the remains of the restaurant’s gigantic Wurlitzer pipe organ. “I hoped and prayed I wouldn’t see my building burn,” said Dick Daubert, standing and hugging his wife, Margaret, while choking back tears near the organ’s bent and water-damaged pipes. “We were going to be here forever.” The fire, which tore through the restaurant at 2014 Mildred St. W., Tuesday night destroyed the roof and much of the building’s contents, causing an estimated $1 million in damage, University Place fire spokesman Dave Dupille said. No one was injured by the blaze, whose cause is still under investigation. The organ’s 1,100 pipes are salvageable, Dick Daubert said, but the air distribution system must be completely rebuilt. In addition, the fire destroyed all but the frame of the antique console where people sat to play the organ, he said. Daubert said Wednesday he planned to rebuild the business and restore the organ, but he couldn’t estimate when he would reopen. It will depend on whether the structure will have to be leveled, he said. “It doesn’t look so good right now, but this, too, will pass,” Daubert said. People paid their respects to the building and the organ Wednesday. Adeline Hook, 83, had been learning to play the restaurant’s organ for the past eight years. Hook, a member of the Puget Sound Theater Organ Society, was scheduled to play the instrument at one of the organization’s events in September. She was heartbroken to learn that the organ was damaged because there are so few in working condition across the country, she said. “Every time we lose one of those big organs, it hurts,” she said. The Wurlitzer began its life at the Paramount Theater in Fort Wayne, Ind., on Aug. 5, 1930. The 16,000-pound organ had 17 sets of pipes that varied in height from an inch-high C to a 16-foot bass. Daubert bought the organ in El Paso, Texas, for $22,500 in the 1970s. He planned and built the restaurant for two years before it opened Aug. 22, 1975. Tom Linehan installed the electric wiring during the restaurant’s construction, and he showed up to the blackened building Wednesday after his granddaughter called him about the fire. In 1975, Linehan gave Daubert the restaurant’s first dollar, which Daubert framed. Linehan told Daubert, “If he never spent it, he was never broke,” Linehan said Wednesday. Daubert stored the dollar in the building’s attic, which Tuesday’s fire destroyed. Investigators said employees discovered the fire near an oven vent, and the blaze spread through the attic, which didn’t have a sprinkler system. Daubert speculated Wednesday that not having the sprinklers made an enormous difference. “It would have saved our building,” he said. Many employees, such as 17-year-old Mandy Fleischmann, returned to the restaurant Wednesday. Fleischmann, the restaurant’s first manager to be hired before she was 18 years old, was scheduled to work Wednesday. She recalled visiting the restaurant throughout her life, from her third birthday party to soccer banquets to hanging out there with her Wilson High School friends. She drove to the restaurant to see the fire Tuesday night. “Just watching it was your worst nightmare,” she said. But Margaret Daubert said at least she and her husband could put the fire in perspective. “It’s just a building,” she said. “Nobody was hurt. That’s what we’re very grateful for.” ... Those plans ultimately would not come to fruition: Pizza & Pipes will pipe no more in University Place Restaurant that featured 1930 theater organ won’t be rebuilt after Aug. 3 fire destroyed community landmark Equipment stands idle at the site of the former Pizza & Pipes in Tacoma in December 1999 after the burned out remains of the building were razed. Bruce Kellman Staff file, 1999 Published December 23, 1999: By Art Popham The classic Wurlitzer pipe organ will play no more at Pizza & Pipes in University Place. The restaurant building, equipment and 1930 theater organ were badly damaged in an Aug. 3 fire. Now, owners Dick and Margaret Daubert have decided not to rebuild their community landmark. For 24 years, its nightly organ entertainment created a festive atmosphere and attracted all ages. It was no easy decision for the Dauberts, but practicality prevailed. “The cost came in at $700,000 just to replace the building,” Margaret Daubert said. “That didn’t even include the organ and kitchen equipment. “At this stage of our careers - age 64 - we don’t have the energy or the nerve we had when we were 39.” The Dauberts will sell their one-acre property. And the remains of the 69-year-old organ? “The parts that are salvageable we’ve sold to friends in Portland,” she said. “The stop tabs and keys all melted. The wood pipes and windlines were all damaged by water, but the brass pipes are OK. “They’ll use the brass pipes for a venue in Portland.” ... But it will live on in memory: Requiem in heartbroken community Column published October 14, 1999: By Art Popham When fire erupted Aug. 3 at Pizza & Pipes in Tacoma, organist Sherrie Mael Gibelyou was performing the “Titanic” love theme, “My Heart Will Go On.” It’s the last song that ever will be heard from that 69-year-old theater organ. Fires burn more than buildings or businesses. They leave emotional holes in hearts as well. A devastating blaze is especially hurtful when it affects an enterprise with human ties, community connection and unique appeal as strong as those of Pizza & Pipes. Pending insurance settlement, owners Dick and Margaret Daubert are still unclear if they’ll rebuild. One loss is certain: That 1930 Wurlitzer that gave Pizza & Pipes its charm never will play again. Many feel its loss. “It’s like a part of me has been taken,” said Gibelyou, who played that theater organ under her maiden name of Mael for 19 of Pizza & Pipes’ 24 years of operation. “It was a big part of me for a lot of years. I started there in 1976 when I was 19. I put myself through PLU playing there four nights a week. A good part of my courtship with my husband was there. My two kids have spent a lot of their early years there. My dad was a really big part of my music. He died in 1991, but sometimes I still thought I could see him sitting there listening to me.” Art Popham After 14 years at Pizza & Pipes, Gibelyou left in 1990, when her father was near death. Five years later, a call from the Dauberts brought her back. “Dick called and said he was putting together a collage for Pizza & Pipes’ 20th anniversary, and I was in all the pictures,” Gibelyou said. “I hadn’t even played for five years. I’d been at home with our kids. But, when I sat down there at the organ, it was like I’d never left. As long as I didn’t think about it, my hands knew what to do. I’ve played Sunday matinees and fill-in the past five years.” Actually, Gibelyou was not Pizza & Pipes’ longest-tenured organist. That honor belongs to Andy Crow of Olympia. He was there from beginning to end. “I feel the loss because I was one of the originals and the principal organist there for 24 years,” Crow said. “I even helped a bit with the organ installation and kept it up after it was installed. I thought I’d be there three months. That was 24 years ago. Some of my students have become organists there. The thing I miss most is that it was a center for musicians who’d stop and play there on their way between Seattle and Portland.” The emptiness extends beyond those who sat at the console. “There’s a great number of people - including my kids and grandkids - feeling a huge loss,” Dick Daubert said. “It’s taken on almost mythological proportions. One little girl sent us $5 in change out of her piggy bank to restore the organ.” Dan Small, director of public information at nearby Tacoma Community College and a University Place resident, feels the impact. “When we moved here in 1978, the only things there were Safeway and Pizza & Pipes,” Small said. “Dick and Margaret have been very community-minded. They did fund-raisers for all sports teams, scouts and many, many groups. My dad’s a fan of organ music, so we’d go up there at lot. My kids loved that place when they were little. They had birthday parties there. Then my son had his first job there. He’d dress up as characters like Darth Vader. This was a big loss for our community.” Gibelyou recalls that fateful last night. “I almost forgot I was scheduled to play that night,” she said. “My mom reminded me. Then, she and my husband and kids all came up for dinner. They left a half-hour before the manager announced everyone needed to leave the building. “I did what no performer does: I just stopped playing and got up and left. I thought we’d be coming right back in. It felt surreal. When I eventually came back in after the fire, I thought all my music would be gone. I stored all of it there. But even the folder of music I had at the organ with me survived. “Lots of Disney music and movie themes were waterlogged and singed but readable. I consider it a gift from God that my music was OK - and that I was the last one to play that organ.” Read Next As of Aug. 2, 13.8 percent of Thurston County ballots for the Aug. 6 primary had been returned. The primary will narrow the field in city council and school board races, and decide levies in two fire districts.
Christodoulou wrote this book as a teacher frustrated with the clash between what she had been taught in teacher training and her experience in the classroom. Reading her book took me back to my own experience as a trainee teacher doing a Post-Graduate Certificate of Education course at Bristol around 1990. We were novices scared of going into classrooms, desperate to learn how to do it from experts. But instead of the instruction we craved we constantly found ourselves put into groups to discuss our own ideas. We sarcastically referred to this as ‘sharing our ignorance’. So I do understand where Christodoulou is coming from and I sympathise with her experience. Against what Christadoulou claims, the evidence shows fairly conclusively that general thinking skills can be taught. I know this because I edit the world leading journal in this area: ‘Thinking Skills and Creativity’ and we publish rigorous research on the impact of programmes that aim to teach general transferable thinking and learning skills. Last year I edited The Routledge International Handbook of Research on Teaching Thinking. In one chapter Professor Steve Higgins of Durham University, a leading expert in educational evaluation, summarises the evidence as to whether it is better to teach general skills separate from curriculum content (‘knowledge’) or ‘infused’ within the teaching of content. His conclusion, based on a major meta-analysis by Abrami (2008), is that the evidence is very clear: it is best to do both. Combined approaches where skills are taught explicitly as critical thinking lessons and combined with curriculum teaching which is infused with these skills, are the most effective (an effect size of 0.94). If you teach critical thinking separately, then learners do improve (an effect size of 0.38), but perhaps don’t know how or when to employ these skills. If you teach skills embedded or infused into a curriculum, this is slightly more effective than teaching them separately (with an effect size of 0.54) but learners may not be so aware of them or of how they might need to be adapted for a different context or subject (Higgins, 2015). But, you might respond, Cristodoulou is also also quoting research evidence – does this mean that the experts disagree? Not necessarily. When her favourite cognitive psychologist, Dan Willingham, writes ‘There is not a set of critical thinking skills that can be acquired and deployed regardless of context.’ he immediately goes on to add ‘ there are metacognitive strategies that, once learned, make critical thinking more likely.’ (Willingham, 2007). The issue here may be simply a narrow or wide use of the term ‘skill’. What he, as a cognitive psychologist, calls ‘metacognitive strategies’ are probably what others in education call ‘critical thinking skills’. Personally I try to stick to the word ‘thinking’ and even ‘good thinking’ or ‘effective thinking’ to avoid this unnecessary confusion. When Christodoulou claims to quote evidence from cognitive psychology experiments that you cannot teach general thinking skills she is relying on a very narrow and outdated understanding of what a general skill might be. Once upon time, many years ago, cognitive psychologists tended to think of the mind as like a computer and so they searched for things like the single algorithm or programme that would help solve problems in any context. They did not find this. They found instead that problem-solving requires contextual knowledge. There is no general algorithm to play really good chess – really good chess-players have to remember a lot of good chess games. This criticism of general skills from cognitive psychology is not relevant to most of the programmes to teach general thinking skills in education because educationalists tend to use the terms ‘skills’ in a broader way that stretches to include complex contextualised performances (Bailin, 1998). When educationalists talk about critical thinking skills they do not mean abstract cognition of the kind referred to in those old laboratory cognitive psychology experiments. They mean the sort of dispositions, intellectual habits and strategies exemplified by Daisy Christodoulou, being courageous in challenging orthodoxy, persistent in pursuing enquiries, seeking evidence for claims and so on. Think about it! Don’t you find that curious people who ask questions tend to be curious and ask questions in almost any context? This is a general thinking skill that can be taught. The simplest way to teach it is to be encouraging when children take an interest and ask questions. This is not rocket science. This kind of education does not need laboratory based cognitive psychology experiments based on misguided information processing models of what thinking is. Thinking can be taught by engaging children in dialogue and promoting, through this, the dispositions, habits and strategies needed to think well in a variety of contexts. This is probably why the recent EEF evaluation of the impact of teaching Philosophy for Children found a very clear impact on improvements in learning in maths and English (Gorard, Siddiqui, & See, 2015). Daisy Christadoulou is wrong. We can and should teach general thinking and learning skills. She is wrong partly because of her lack of knowledge but also because of some gaps in her general thinking strategies. - She does not define her terms carefully and so moves from the argument that skills (defined narrowly in classical cog psy) cannot work to apply this to programmes, like Claxton’s building learning power, that use a completely different definition of skills. - She moves from the particular – this lesson is a waste of time and is based on the idea of teaching skills - to the general claim – all lessons based on the idea of teaching skills are a waste of time - without any rigorous review of all relevant evidence. - She cherry picks the research literature relying only on the examples she likes, Dan Willingham’s writing mainly, and ignoring all the many monographs and articles that do not support her. References Abrami, P. C., Bernard, R. M., Borokhovski, E., Wade, A., Surkes, M. A., Tamim, R., & Zhang, D. (2008). Instructional interventions affecting critical thinking skills and dispositions: A stage 1 meta-analysis. Review of Educational Research, 78(4), 1102-1134. Bailin, S. (1998). Skills, generalizibility and critical thinking. In twentieth world congress on philosophy. Boston: The Paideia Archive. Christodoulou, D. (2014). Seven myths about education. Routledge. Gorard, S, Siddiqui, N & See, B H (2015). Philosophy for Children: SAPERE, Evaluation Report and Executive Summary, EEF. Higgins, S. (2015). A recent history of teaching thinking. In The Routledge International Handbook of Research on Teaching Thinking, Edited by Wegerif, R, Li, L. & Kaufman, J. C.(pp19-29) New York and London: Routledge. Wegerif, R., Li, L., & Kaufman, J. C. (Eds.). (2015). The Routledge International Handbook of Research on Teaching Thinking. Routledge.
https://www.rupertwegerif.name/blog/should-we-teach-knowledge-or-general-skills-christadoulous-argument
Certificate of Need (CON) regulation has been maintained by the majority of U.S. states as a method for controlling hospital-related health care costs. From 1976 to 1983 the Federal government mandated that all states have some type of CON in place. Congress envisioned that CON, which focused primarily on hospitals and nursing homes, would control costs, regulate and control the medical technology race, and promote access and quality in the health care delivery system. The enactment of these regulations was considered important since the health care sector does not completely conform to traditional economic models. By placing restraints on hospital bed expansion the goal was to reduce duplication of services and eliminate unnecessary supply. These actions would also reduce supplier induced demand (e.g. Roemer's Law). Currently 34 states and the District of Columbia maintain CON while 16 states have repealed CON regulation. An analysis of American Hospital Association data from 1985 to 2004 reveal that CON has not achieved its desired results. Multiple regression models show that presence of CON is not significant in predicting per capita hospital costs or per capita inpatient hospital beds when controlling for population alone or when adding state health status as a covariate. Additionally, non-CON states spend a lower percentage of their state GDP as compared to CON states. These results are consistent when treating CON/non-CON as a dichotomous variable or when grouping states by levels of CON stringency. An often cited concern over repealing CON is an expected growth in the number of hospitals as well as expansion of current facilities. The data indicate the opposite where the number of per capita beds has decreased for most states following CON repeal. CON creates an additional barrier to entry for new hospitals and contributes to an anti-competitive market in its current forms. With healthcare costs continuing to be a large part of the U.S. GDP the time is ripe to examine CON policies. Benefits and consequences of eliminating, changing, and removing CON will be discussed. Learning Objectives: Keywords: Economic Analysis, Health Care Reform Presenting author's disclosure statement: Qualified on the content I am responsible for because: I conducted the research, ran the analyses, and wrote the paper. I agree to comply with the American Public Health Association Conflict of Interest and Commercial Support Guidelines, and to disclose to the participants any off-label or experimental uses of a commercial product or service discussed in my presentation.
https://apha.confex.com/apha/137am/webprogram/Paper196970.html
Trina Rasmuson has been a professional dance artist for 27 years. Currently she divides her creative energy between Bird Soul Productions, where she choreographs and produces vertical dance and teaching dance at the Kimberley Independent School. Previously, she spent 17 years directing a modern dance company in Calgary, AB. Creating open environments for learning is her passion when performing, creating or teaching. Each student or situation is unique, respect for that is a priority. Ms Rasmuson is dedicated, passionate and extremely enthusiastic about learning through dance, movement and music. Ms Rasmuson ensured total engagement of her groups and provided an experience that incorporated the whole child; what a wonderful, powerful way to provide a successful learning journey. Michelle Sartorel, Principal, Gordon Terrace Elementary Residencies can incorporate any number of goals using creative movement to beginner hip-hop. I tailor the residency to suit the student's and teacher's wishes. I particularly enjoy incorporating other curriculum (e.g math) while still giving all students a solid, positive experience in movement and dance. I create a cooperative and inclusive atmosphere while also moving between high and low energies. Fun and acceptance of our own unique movement styles is the primary goal.
http://artstarts.com/artist-profile/trina-rasmuson
Each class covers Flexibility, Balance and Strength providing the four vital components of fitness for older adults. This class uses exercises that are safe, enjoyable, effective and accessible to everyone whatever their ability, and can be done seated or standing. Seated exercise classes ensure age or ability are no longer barriers to an active lifestyle. We advise you to bring your own mat if you have one, but if you dont we do have some here.
https://www.bristolfolkhouse.co.uk/courses/pilates-seated-excercise-f-2-9739
Institutional change in higher education is known to be a slow process. Like most systems, higher education was designed by and for the elite, and built to maintain the status quo. As issues of equity in the United States become more and more salient, it is vital to understand change agency at multiple levels within organizations. The IUSE Revolutionizing Engineering Departments (RED) grant was designed to ignite and measure change in an engineering department to support inclusivity, diversity, and excellence. Literature indicates that organizational change hinges upon multiple factors. In particular, the ways in which incentives and reward structures are used to support the change sought, the ways in which financial priorities shape practices in an organization, human resource allocation and training, and policies that shape practice are critical components in change. The first author takes an “insider/outsider” perspective to this work (Dwyer & Buckle, 2008; Gioia et al 2010). As a social scientist with no affiliation to the University, the perspective can be described as “outsider” because she does not belong to the department in any way. However, the social scientist has been studying elements of departmental change in the department since 2007, using participant observation in faculty meetings, course observations, participation in co-curricular and extracurricular activities, and interviews with faculty and staff for the past 13 years, giving the author a great deal of contextual knowledge of the department. Using a continuous improvement mindset to consider change, which assumes integral change rather than drastic shifts to practice, we frame a mixed methods case study of the University of Texas at El Paso computer science department, a recipient of a 2016 RED grant, among four main themes. We contend that a department’s financial priorities, departmental policies, human resource allocation and training, and incentive and rewards structures are vital to achieving equity, particularly when these elements align with departmental values. We posit that the department can create a student support structure (Kezar, 2016) for equitable student outcomes, and theorize that this student support structure can be enhanced when the practices match the departmental values, and when the institutional and departmental values align. We provide recommendations regarding social science research in department level change and recommendations for departmental practices that promote equity.
https://peer.asee.org/continuous-improvement-for-equity-in-engineering-addressing-departmental-change-with-theory-informed-case-study-research-ebr
The analysts forecast the global isostearic acid market to exhibit a CAGR of 4.57% during the period 2019-2024. The report covers the present scenario and the growth prospects of the global isostearic acid for 2019-2024. To calculate the market size, the report considers the isostearic acid sales volume and revenue. The projections featured in the report have been derived using proven research methodologies and assumptions. By doing so, the research report serves as a repository of analysis and information for every facet of the market, including but not limited to: regional markets, and application. Geographically, the global isostearic acid market is segmented into North America, Asia Pacific, Europe, Middle East & Africa and South America. This report forecasts revenue growth at a global, regional & country level, and provides an analysis of the market trends in each of the sub-segments from 2019 to 2024. North America (U.S., Canada, Mexico, etc.) Asia-Pacific (China, Japan, India, Korea, Australia, Indonesia, Taiwan, Thailand, etc.) Europe (Germany, UK, France, Italy, Russia, Spain, etc.) Middle East & Africa (Turkey, Saudi Arabia, Iran, Egypt, Nigeria, UAE, Israel, South Africa, etc.) South America (Brazil, Argentina, Colombia, Chile, Venezuela, Peru, etc.) Based on application, the isostearic acid market is segmented into:- Personal Care Lubricants Chemicals The report also includes a discussion of the key vendors operating in this market. Some of the leading players in the global isostearic acid market are:- Emery Oleochemicals Sdn Bhd KLK Oleo Kraton Corporation Croda International plc Oleon NV Jarchem Industries Inc. Objective of the study: To analyze and forecast the market size of global isostearic acid market. To classify and forecast global isostearic acid market based on region, and application. To identify drivers and challenges for global isostearic acid market. To examine competitive developments such as expansions, mergers & acquisitions, etc., in global isostearic acid market. To conduct pricing analysis for global isostearic acid market. To identify and analyze the profile of leading players operating in global isostearic acid market. The report is useful in providing answers to several critical questions that are important for the industry stakeholders such as manufacturers and partners, end users, etc., besides allowing them in strategizing investments and capitalizing on market opportunities. Key target audience are:- Manufacturers of isostearic acid. Raw material suppliers. Market research and consulting firms. Government bodies such as regulating authorities and policy makers. Organizations, forums and alliances related to isostearic acid.
https://www.researchnewstoday.com/global-isostearic-acid-market-research-report-ken-research-72584.html
Have you ever had bread, cheese, yogurt, sauerkraut, chocolate, pickles, beer or wine? If you have, then you have tasted fermented foods and beverages. Quite simply, fermentation is the art of utilizing scientific principles to preserve and/or enhance the flavor and texture of foods and drinks. Humans have harnessed the power of fermentation since the dawn of time to produce alcohol as well as preserve and enhance the flavor of food. Scholars have suggested that nearly one-third of all foods consumed world-wide have been fermented. Unsurprisingly, firms that produce fermented foods and beverages constitute a significant portion of the world's economy. Continuing to harness the power of fermentation, Saint Francis University is proud to offer modern classes in brewing, enology and food fermentation. Most classes will be taught in functioning wineries and breweries. = required field Your email was sent successfully. Thank you for contacting me. There was a problem sending your email. Try again later, or contact our webmaster.
http://stage.francis.edu/fermentation-arts/
Ships’ Bells: Significant History, Unknown Origins Summary Ships’ bells have long been of interest in maritime history. Despite this, however, not much is known on the origin, design, and use of ship bells’ prior to the 18th century. The lack of adequate research on this topic limits the understanding of how bells came to be aboard ships, where they were first created, and how they changed stylistically over time and place. All of these elements may prove crucial in providing contextual information to sites discovered with an associated bell. This paper will briefly describe the extent of past research and offer new iconographic, historical, and archaeological evidence on early ships’ bells to expand the understanding of these early tools. On a larger scale, the importance of properly understanding small subsets of artifacts in order to translate their contextual information to a larger site will be stressed.
Join us in prayer regarding the issue of juveniles in solitary confinement. From the National Council of Church’s statement on this issue: The National Council of Churches applauds President Obama’s order banning the use of solitary confinement for juvenile offenders in the federal prison system. This ban comes on the heels of the Supreme Court’s ruling that its 2012 decision banning mandatory life sentences for juveniles can be retroactively applied. We are particularly excited about this steady movement of reform that impacts juveniles and see these decisions as important steps toward creating a more humane and moral criminal justice system. “This gives us great hope in our efforts to transform the broken criminal justice system from one focused on punishment and retribution to one focused on rehabilitation and restoration,” said Rev. Aundreia Alexander, Associate General Secretary for Action and Advocacy for Justice and Peace. While we welcome the new restrictions on the use of solitary confinement to 60 days (down from a previous limit of 365 days), we question if this limit is still too long. We invite you to pray about this issue and then take appropriate action if your prayers lead you to do so.
https://lightinprison.org/2016/01/29/join-us-in-prayer-regarding-solitary-confinement-for-juveniles/
Strategic Customer Success Executive As a Strategic Customer Success Executive, you will be part of the Customer Success team reporting into the Customer Success Team Manager for Key Accounts. You will be supporting our Key Accounts alongside the Senior Customer Success Directors (Senior CSDs). The Senior CSDs will be responsible for identifying revenue opportunities, proactive strategy & key relationship holder. The Strategic CSEs will work closely with the Senior CSDs on project implementation, day to day queries (working both internally & externally) and ensuring Customer Success in all things dotdigital. You’ll need to be a natural communicator able to articulate yourself well both verbally and in written form. You will be responsible for building strong relationships and provide solutions through first-class customer service to enhance adoption of the dotdigital platform. We are looking for applicants with experience in Omni-Channel marketing or a SaaS company (1-3 years’ experience). The ideal candidate would have 1-2 years’ experience in a Customer Success based role and have a consultative approach. While a background in Omni-Channel marketing is not essential, an awareness of its principles is beneficial. This role is based at our HQ in London (hybrid remote working). Role and Responsibilities: • You will be working closely with the Senior Customer Success Directors (Senior CSDs) as an additional point of contact on their larger accounts as a proactive & valuable relationship holder • Build & maintain client relationships through consistent, clear communication & developing trust • Escalating and chasing any issues to internal teams, be the first POC for issue resolution and managing client expectations • Monitoring the risk level status of clients • Regularly liaising with clients, responding to queries, activities, managing projects and client expectations • Pre and post meeting follow ups • Proactively monitor account activity to ensure clients are performing to meet their KPIs, benchmarks and spotting trends • Research into customers industry & make recommendations • Identifying opportunities and share this insight onto Senior CSDs • Make sure that the customers you work with are adopting & utilising the features that they are paying for • Support Senior CSDs with preparing and updating documentation (e.g. WIPS, reports, recent feature releases, industry update, end of year reviews & CRM) • Taking the initiative to go above and beyond day to day to ensure client success, satisfaction and retention • Attend industry events to network, build on & share knowledge • Maintain knowledge, understanding and an interest in the industry and the platform to actively support clients, Senior CSDs and the Customer Success Team. • Encourage customer advocacy by obtaining Trustpilot reviews, case studies, use cases, testimonials, stories & event sign-ups (e.g. dotties, Summit, dotlives, webinars etc.) • Working as a key member in the Customer Success team & being on hand to assist our clients & support other team members • Actively lead, participate & support Customer Success team projects or initiatives (e.g. NPS reach outs, Cancellation reach outs, Feature adoption reach outs etc.) that contribute towards customer success, satisfaction, feature adoption & reducing churn. • Mentor and support other CSEs in the Core & Commerce Customer Success teams. • Help with the Customer Success Zendesk queries (if needed). Skills and Experience • 1-2 years’ experience in a Customer Success based role and have a consultative approach ideally within the technology industry • Experience of digital marketing is desirable, especially in a SaaS environment. • Experience in Omni-Channel marketing or a SaaS company (1-3 years’ experience). • While a background in Omni-Channel marketing is not essential, an awareness of its principles is beneficial. • Strong communicator both over the phone and face-to-face • Self-motivating, positive outlook and a can-do attitude • Ability to manage complex, demanding or difficult clients • Well organised and driven; capable of multi-tasking and time-management • Experience working with a CRM • Tech-savvy and passionate about technology solutions • Strong written/verbal Communication skills • Organised and efficient. • Personable confident and outgoing; a proven ability to build rapport. • Ability to excel in team-based environment. As an equal opportunities employer we are committed to equality in all its practices with regard to race, religion, national origin, age, sex, marital status, ancestry, physical or mental disability, veteran status, or sexual orientation. If you have any additional requirements or adjustments to assist an application then please don’t hesitate to contact us and advise us how we can best support you. - Department - Customer Success - Locations - London Bridge - Remote status - Hybrid Remote London Bridge Workplace & Culture It all started in a pub in Croydon, UK – we even have the original tables and stools in our London Bridge HQ. Today, we’re a growing global business with 350+ employees and counting. So if you’re interested in becoming part of the dotfamily there may be an opportunity for you. About Dotdigital Dotdigital is a customer engagement platform that helps digital marketers and developers deliver communications across the customer journey. We harness the power of customer data, powering engagement, conversion, and loyalty for brands as they grow and scale. Customers love our easy-to-use platform that connects first party data across the systems, surfacing powerful insights and automating predictive cross-channel messages. Dotdigital’s 350+ employees serve mid-market and enterprise companies around the world and across industries. We aspire to inspire responsible marketing and are committed to sustainability, privacy & security. Dotdigital is proud to be the world’s first carbon neutral, ISO14001, ISO 27701 & ISO27001 certified marketing automation platform. Strategic Customer Success Executive Loading application form Already working at Dotdigital? Let’s recruit together and find your next colleague.
https://careers.dotdigital.com/jobs/2053863-strategic-customer-success-executive
Most humans live their lives as centers of attention, focused on how others and the world affect them. We achieve some measure of adulthood as we begin to live as centers of influence—recognizing that everything we think, feel, say, and do has an effect on the people around us, upon our bodies, and upon our life circumstances. A spiritual adult is one who has developed his/her emotional and spiritual intelligences. As an adult we no longer need to focus on our own needs, but we know that our needs are met. We can focus on our respective purposes for being on earth. In this workshop, Sculptor Joshua Diedrich and Facilitator William Diedrich take you through several exercises that will assist you to: This learning session is discussion-based with targeted content which will help participants to create a productive, team-based, high-trust environment. We will expand awareness of thoughts and behaviors and how they affect team members. We will learn and apply how to increase positive influence with team members. Participants will strengthen their confidence and skills as leaders. As a result conflicts, both external and internal, will be resolved. 4 to 4.5 hours (flexible) Adults at Work Mastering Egos and Emotions at Work Customized to specific leadership teams Up to 4.5 hours plus follow-up • Stronger relationships between colleagues. • More effective communication based on knowledge of styles. • Improved communication between team members. • Tools for resolving conflict based on style. • Clarity in interpersonal communication, especially in giving each other feedback. From 2 to 4 hours Real Leadership • Instantly re-wire your thinking and help you see the world in a new way • Expand perception to enhance innovation, creativity, and potential breakthroughs in your work and in your life. • Learn and practice the skills of a master artist • Learn to recognize subtleties in people and situations that you may have missed in the past • See new possibilities for personal interactions, creativity, entrepreneurship, and self-awareness 1 hour or less Based on the book of the same title by Patrick Lencioni This insightful and practical workshop offers specific awarenesses, and opportunities for non-judgmental reflection. Emotional/spiritual techniques are included. Everything DISC Workplace Profile In this 1.5 hour workshop participants are introduced to four types of meetings, key ideas for engaging meeting participants, methods for engaging in productive conflict, and more. This same workshop can be customized for specific teams or groups in a slightly longer timeframe. This workshop offers participants awareness, strategies, and techniques based on research from the Emotional Intelligence literature, Physiology, Stress Management, Neuroscience (brain research), and many sources outside these fields. Guest speaker Julie Dillon joins me to teach specific movement and breath exercises for managing stress and emotions. This will be a practical approach, not an academic one. It will be interactive rather than lecture-based. Emotional Intelligence Advanced Practices This workshop is based on my book, Adults at Work: How Individuals and Organizations Can Grow Up Spiritual Adulthood Developing Our Emotional & Spiritual Intelligences Building Positive Influence in Relationships and Organizations Everything DISC Workplace Profile Innovation, creativity, and breakthroughs take place at the edge, on the outer rings of your competencies and comfort zone, where perceptions and knowledge differ from your own. Explore the edge with us. Increase your capacity for innovation, creativity, and leadership. • Enhanced leadership effectiveness via emotional intelligence • Increased awareness of participants’ own emotions and resulting behaviors •Understanding of how emotions drive behavior • Practices for utilizing emotion for personal breakthroughs • Increased ability to read and effectively respond to the emotions of others •Increased awareness and understanding of the emotional state of the participant’s workplace •Ability to assess whether or not basic emotional needs of the participant and others are met • Learn specific tools for developing emotional intelligence • Opportunity to increase participant’s E.Q. within the timeframe of this session • Tools and practices for stress management and emotional control 1. Adults at Work: Mastering Egos and Emotions at Work 2. Emotional Intelligence: Advanced Practices 3. Death By Meeting (Based on the book of the same title by Patrick Lencioni) 4. Everything DISC Workplace Profile 5. Building Positive Influence in Relationships and Organizations 6. Real Leadership 7. How to Think Like a Leader and an Artist: Changing how you see to find new opportunities and solutions Changing how you see to find new opportunities and solutions 8. Spiritual Adulthood For more information of to book a workshop, contact William Frank Diedrich at [email protected] 1. Becoming the leader your team needs you to be. Includes content, self-assessment, and discussion 2. How leaders influence. Includes content and discussion 3. Your mission as a leader and your vision for your team. Activity 4, Establishing expectations and boundaries. Content, discussion, and activity Outcomes: Participants take the everything DISC profile online then meet in a workshop setting to discuss. My preferred group is a team or department of people who work together. In this setting we learn the DISC basics and spend time in pairs using the DISC Comparison Reports. These reports facilitate communication and relationship building between team members. How do we build strong, healthy relationships at work and in life? How do we influence our organizations—also our families in more positive ways? In this interactive presentation participants will be given tools and awareness which you can apply to answer these questions for yourself. From 2 to 6 hours (customized) NOBLAMING.COM Death By Meeting What participants will take away from this workshop: Learning Outcomes: Outline: Growing into spiritual adulthood is natural and something anyone can do—if you are willing and have the will. Expect a transformative experience along with specific emotional/spiritual methodology to take home with you. Workshop Experiences with William Frank Diedrich 1. Greater control of self and greater influence in any situation. 2. Tools for dis-creating limiting fears and beliefs. 3. How to effectively manage egos--yours and others'. 4. Decreased stress.
https://www.noblaming.com/workshops.html
BACKGROUND OF THE INVENTION 1. Field This application relates generally to pharmaceutical formulations and particularly to a lyophilized formulation for rFVIII which is stabilized without albumin (albumin-free). 2. Prior Art Factor VIII is a well known plasma protein that is essential to the blood clotting process. Although Factor VIII can be and currently is obtained from human plasma, efforts have been made in recent years to manufacture Factor VIII from recombinant sources (rFVIII) to avoid potential contaminations associated with blood products. In addition, a recombinant source for Factor VIII provides a virtually unlimited supply of the coagulation factor, thus avoiding supply limitations associated with using donated blood plasma as a source material. Since one of the advantages of a rFVIII product is that it is not derived from human plasma and thus avoids potential contamination from a human plasma source, it has been a goal in rFVIII manufacturing to develop a stable formulation for rFVIII which can be described as being entirely free of any human source raw materials. Unfortunately, however, rFVIII is a labile protein and, like many other therapeutic proteins, it can become unstable during storage. To overcome such instability, it has been common practice to include human serum albumin to the product as a stabilizer. Albumin has been found to be a good stabilizer of FVIII and is used in numerous commercial products on market. By using human albumin as a rFVIII stabilizer, however, one of the advantages of having a recombinant product in the first place (i.e., avoiding any human based source materials) is lost. There have been some recently described albumin-free formulations for Factor VIII in both low and high ionic strength media using sodium chloride, calcium chloride and histidine as a buffer ion. In addition, basic amino acids such as lysine and sugars such as mannitol, sucrose or maltose have been used. To achieve stability in an albumin- free Factor VIII formulation while retaining necessary isotonicity needed for therapeutic use, approximately 10% sugar has been used in such albumin- free formulations. See for example U.S. Pat. No. 4, 877,608 (low ionic strength formulation). European patent 0 314 095 discloses another albumin-free formulation having a high ionic strength and histidine as a buffering agent. The '608 patent is concerned with a liquid solution and not a lyophilized product that must be able to undergo freeze drying cycles necessary to prepare the product. European patent 314 095 includes a relatively high amount of sodium chloride and is primarily used in a liquid formulation. Other patents concerned with Factor Vlll formulations include U. S. Pat. No. 5,399,670, which describes the use of arginine in an albumin containing freeze dried formulation. See also WO 95/01804 which describes a formulation that includes no sucrose or glycine and U.S. Pat. No. 4,440, 679 and U.S. Pat. No. 4,623,717 (both to Fernandes et al. ) showing the use of at least 30% by weight sugars in combination with amino acids to stabilize FVIII in the liquid state under pasteurization conditions (60. degree. C., at least 10 hours). In addition to the above Factor VIII formulations there are several other patents related to the purification and/or stabilization of Factor VIII. These include U.S. Pat. No. 5,288,853 which covers a multi- step manufacturing process including the use of a heparin- coupled column followed by the addition of glycine to form a purified Factor VIII product. U.S. Pat. No. 5,399,670 covers a process for producing a lyophilized Factor VIII preparation of enhanced solubility which requires addition of arginine to the Factor VIII solution prior to lyophilization. U.S. Pat. No. 5,259,951 covers a multi-step method of purifying Factor VIII from plasma using ion exchange columns. U.S. Pat. No. 4,758,657 covers a multi-step process for separating Factor VIII:C from plasma in which at least one of the steps requires the adsorption of Factor VIII:C on a hydrophobic interaction matrix. In addition to the above patents, there is a very recently described formulation for Factor lX (FIX) which appears similar to the formulation for rFVIII disclosed herein. See Abstract 244 by L. Bush et al., Hemophilia, Vol. 2, Supplement 1, p. 64 (June, 1996). FIX is a pro- enzyme that is converted to an active proteolytic enzyme. FVIII serves, on the other hand, as a co-factor along with other coagulation components in effecting blood coagulation. The molecular weight of FVIII is about 340,000 Daltons whereas FIX has a molecular weight of about 56, 000 to 57, 000. FVIII is very sensitive to proteolytic processing with concomitant loss of coagulant activity. It is well known that Factor VIII is inherently more unstable than FIX and freeze dried concentrates of each factor demonstrate marked differences in stability on storage at various temperatures. Unlike FVIII, FIX includes unique gamma carboxylation of 12N terminal glutamic acid residues, thus providing a possible basis for differential stability. Thus a formulation for FIX would not necessarily suggest a formulation for FVIII. In Pharmaceutical Research, Volume 12, No. 6, pages 831-837, 1995, there is also disclosed a formulation for stabilized recombinant human interleukin-1 receptor antagonist similar to that disclosed below. Despite the past and recent efforts to develop a stable rFVIII preparation that can be successfully lyophilized and later reconstituted rapidly in water, to date it has been difficult to provide a formulation that not only avoids the use of human products such as albumin but also meets the requirements for proper lyophilization and rapid reconstitution and isotonicity while at the same time providing a rFVIII having long term stability, with a pharmaceutically acceptable shelf- life. To our surprise we have now found that such a preparation is possible. In the course of developing this formulation, we found that histidine which has been taught and used in the prior art as a buffering agent, actually had a de-stabilizing effect on Iyophilized albumin- free formulations. We have found however that the de-stabilizing effects of histidine can be effectively overcome by a novel formulation of salts, glycine and sucrose, the combination of which was found to have a beneficial effect in stabilizing rFVIII. This mixture also protects the rFVIII across multiple freeze thaw cycles during the lyophilization process, and it provides rapid reconstitution of the lyophilized product with water. The formulation includes both crystalline and amorphous components, unlike most prior art formulations which are essentially amorphous. The formulation of our invention remains stable in the liquid state for at least twenty-four hours at room temperature. Details of our formulation and its use are described below. SUMMARY OF THE INVENTION Our improved rFVIII formulation is a pharmaceutically acceptable albumin-free lyophilized product which can be rapidly reconstituted in water (within 30 seconds) and is suitable for treating hemophilia. The lyophilized preparation comprises a novel mixture of salts, amino acids and sucrose. The product is stable at room temperature and, unlike the prior art the formulations, comprises a relatively low level of sugar. The formulation comprises, when reconstituted with water, the following ingredients: glycine about 65 to 400 mM, preferably 290 mM, histidine up to about 50 mM, preferably 1 mM to 50 mM, very preferably 20 mM, sucrose about 15 to 60 mM, preferably 30 mM, NaCl up to about 50 mM, preferably 1 mM to 50 mM, very preferably 30 mM, CaCl.sub.2 up to about 5 mM, preferably 0.1 to 5 mM, very preferably 2. 5 mM, and rFVIII about 50 to 1500 lU/ml. In a preferred lyophilized formulation, the amount of residual water should be about 1 to 3% by weight, preferably about 1% by weight. BRIEF DESCRIPTION OF THE FIGURE The figure is a graph comparing the potency over time at 40. degree. C. of the formulation of this disclosure having a relatively low sugar content (upper curve) with a formulation taught by the prior art having a relatively high sugar content (lower curve). DETAILED DESCRIPTION OF THE INVENTION The objective that led to this invention was to identify an albumin- free formulation that offered stability to rFVIII (minimal or less than about 20% loss in potency) across various process steps such as ultrafiltration/diafiltration, storage of frozen bulk, freeze- thaw effects and lyophilization. In addition, a fast dissolving product was desired with stability in the reconstituted liquid state. Finally, a pharmaceutically acceptable lyophilized product with an appropriate shelf- life was desired which could be lyophilized with a short freeze- drying cycle. Proteins do not crystallize during lyophilization. The goal of a drying process should be to convert the aqueous protein solution into an amorphous phase to protect the proteins from chemical and/or conformational instability caused by a crystalline (or total lack of water) environment. Thus, it is common to include significant amounts of albumin (up to 1%) to provide an amorphous phase (component) to stabilize the proteins. Based on the overall objectives, a formulation with both a crystalline component to allow rapid lyophilization and an amorphous component to stabilize the rFVIII was developed. As used herein the expression crystalline with an amorphous component means that the formulation comprises two or more distinct phases at least one of which is crystalline and one of which is amorphous. Solids can exist in crystalline or amorphous form. Crystalline materials are characterized as having defined structure, stoichiometric compositions, and melting points. By contrast, amorphous materials have no clearly defined molecular structure and can be described as a super-cooled liquid with an extremely high viscosity such as a viscoelastic "rubber" or a more rigid brittle glass. It is thought that other sugars such as maltose, trehalose, and maltotriose may be included to contribute to the amorphous component. Mannitol may be included to contribute to the crystalline component of the formulation. The strategy employed to identify a pharmaceutically-acceptable albumin-free formulation of rFVIII was as follows: (a) The starting material was highly purified rFVIII that was purified using orthogonal chromatographies. These are defined as chromatographic processes which operate under distinct modes and principles and are typically used in succession. As a result, the protein can be rapidly purified through application of different more effective purification methods. This resulted in Factor VIII that was at least 90% pure (by gel electrophoresis) with specific activities greater than 2000 lU/mg protein. Theoretical purity of rFVIII has been a subject of controversy but is thought to be about 3500-5000 lU/mg protein. (b) The protein was formulated by ultrafiltration/diafiltration (UF/DF) and investigated for recovery across UF/DF, susceptibility to freeze- thaw, and liquid stability under different incubation temperatures. (c) Potential formulations were further characterized for their thermal behavior by DSC (differential scanning calorimetry). Glass transition temperatures (Tg'), devitrification temperature (Td') and eutectic melting temperature (Te') were determined. This information was used to identify formulations that could be rapidly lyophilized and were targeted for further investigation. (d) The lead formulations were lyophilized using a rapid freeze drying cycle, and stability analyses were done under standard and accelerated storage temperatures. (e) Stable formulations were readily identified from samples stored at 40° C. for various time points. In analyzing the results of numerous studies that led to the formulation of this invention, a multi-variable experimental design strategy and program was used to screen a panel of ingredients that was comprised of mixtures of amino acids salts and sugars. The results were analyzed using a sophisticated program to resolve any interactions between the ingredients, and a multi-variable response-surface analysis of the data was generated. To our surprise, it was found that histidine (commonly used the prior art) actually had a de-stabilizing effect on rFVIII formulations. This led to the need to critically examine the criteria for the various ingredients in the formulation we found was finally acceptable. EXAMPLE 1 The effect on stability of the lyophilized rFVIII was investigated by titrating various amounts of histidine in a rFVIII mixture comprising 150 mM NaCl, 2.5 mM CaCl.sub.2 and 165 mM mannitol. The results are shown below. TABLE ______________________________________ Percent of initial potency after two weeks/40° C. storage in the presence of histidine. % of Initial Histidine (mM) Activity at 2 weeks/40° C. ______________________________________ 20 5.9% 55 6.3% 75 2.5% 100 1.9% ______________________________________ As can be seen from the above data, increasing amounts of histidine resulted in decreased potency of reconstituted lyophilized rFVIII in a dose-dependent fashion. This result suggests that histidine does not play a role in stabilization of FVIII in the lyophilized state. EXAMPLE 2 Stability of rFVIII in high and low sugar formulations. Recombinant Factor VIII was prepared in two formulations. Instability was investigated under accelerated storage conditions of 40. degree. C. The high sugar formulation, similar to that of the prior art, was an amorphous formulation containing, on reconstitution with water, 50 mM of sodium chloride, 2.5 mM of calcium chloride, 5 mM of histidine, and 10% by wt maltose. The low sugar containing formulation of this disclosure was crystalline with an amorphous component of 1% sucrose (30 mM sucrose) to stabilize the protein. This formulation, on reconstitution with WFI, contained 30 mM of sodium chloride, 2.5 mM of calcium chloride, 20 mM of histidine, 290 mM glycine and approximately 200 IU/mi of rFVIII. This formulation is compared with the prior art formulation in the figure where it can be seen that the low sugar rFVIII formulation of this disclosure is considerably more stable over time than the high sugar stabilized product of the prior art. Given the above disclosure, it is thought that numerous variations will occur to one skilled in the art. Therefore, it is intended that the above examples should be construed as illustrative only and that the scope of this invention should be limited only by the following claims.
I am a geologist interested in geochronology, tectonics, metamorphic petrology, geochemistry and putting all these tools together to unravel the complex deformational process that have shaped our planet over geological time. Biography 2018- now: Senior Lecturer, Structural Geology and Tectonics, University of Portsmouth, UK 2017-2018: Lecturer, University of Portsmouth, UK 2016: Killam Postdoctoral Research Fellow, Dalhousie University, Canada 2014-2015: Fulbright Postdoctoral Research Scholar, University of California, Santa Barbara, U.S.A 2010-2014: PhD, Open University, UK. Thesis "An integrated metamorphic and isotopic study of crustal extrusion along the Main Central Thrust, Sikkim Himalaya" 2006-2010: BSc (first class Hons), Geosciences, University of St Andrews, UK Research Interests I am a geologist who combines tools such as geochronology, geochemistry, field, structural, and economic geology to understand the interplay between large-scale tectonics, faulting, fluid flow and mineralisation events. My research focuses on developing techniques for directly-dating deformation events to unravel complex processes that have shaped our planet through earth history. I focus on the dynamic settings in the Earth's crust where stress built up during continental collisional events is released by movement along faults. My research actively involves developing and using laser ablation (LA) techniques to directly-date past movement on these structures. I am particularly interested in this developing innovative new methods to date non-traditional mineral geochronometers such as calcite, with applications in the Himalaya, Greece, Arctic Canada and beyond. Current research projects: - In-situ carbonate U-Pb dating as a tool for directly dating deformation - Investigating timing of gold mineralisation along strategic faults in the Yukon, Arctic Cordillera (in collaboration with Dawn Kellett, Geological Survey of Canada; Maurice Colpron, Yukon Geological Survey; Tony Barresi, Triumph Gold Corp. NERC-funded project). - ‘Timing of brittle deformation of the Alps revealed by direct U-Pb dating of calcite’ Leonie Weiss PhD student - Directly dating seismically active faults in modern mountain belts (using the Himalaya and North Anatolian Faults as examples) - Tectonic evolution of the Himalayan orogen - Quantifying crystallographic deformation mechanisms in minerals used as geochronometers - Development of Petrochronological tools using (Split stream) Laser Ablation ICP-MS, Electron BackScatter Diffraction, and Electron Probe techniques I am interested in supervising PhD students for motivated students interested in using micron-scale tools to understand large-scale tectonic processes. Teaching Responsibilities I teach Structural Geology, tectonics, mapping and field techniques. I particulary enjoy teaching in the field and teach in Scotland, Brittany, Cyprus, Cornwall and southern England.
https://www.port.ac.uk/about-us/structure-and-governance/our-people/our-staff/catherine-mottram
ADHD and Challenging behaviour in People with Intellectual Disability: should we screen for ADHD? People with Intellectual Disability (ID) have cognitive impairments that affect their level of functioning the causes of which are multiple and often unknown. Behavioural difficulties are common among people with ID. Attention Deficit Hyperactivity Disorder (ADHD) is recognised more among people with Intellectual Disability and could be a cause of problem behaviours. Screening and assessing for ADHD in people with ID is difficult because of the paucity of robust assessment tools and diagnostic criteria.
The field of PNI explores how a person’s emotional and mental state contributes to illness and disease, or health and vitality in the body. Based on the philosophy of physicians dating back to the ancient Greeks, Psychoneuroimmunology is the study of the relationship between a person’s perception of the world around them, their behaviour, the way their brain functions and the combined impact of these factors on the endocrine and immune systems. PNI takes a holistic approach... by investigating the biological, psychological and social factors that contribute to any illness and disease. All of the systems in the body are in constant communication with each other, and by identifying the impact that stress, anxiety, family issues and other social factors are having on our emotional and mental state, through PNI, we can also identify the impact that these situations are having on our body. With the understanding of both the physical symptoms as well as the emotional factors, we are able to support in addressing the condition at the root cause and provide the opportunity for true and lasting healing to occur. PNI is not a modality unto itself, but is a field of scientific research that informs diagnosis of a condition and the course of treatment that is recommended to support you on every level – whether this be one or a combination of Natural Medicine, Nutritional Medicine, Orthomolecular Medicine, Holistic Sports Medicine, and/or Musculoskeletal Therapy. How to Book Sessions are available online or in-person in Brisbane and the Gold Coast. Latest Webinar Events Total Health offers webinars providing insights into many aspects of health and well-being. See our calendar to register for upcoming events. Total Health News Have you joined our newsletter yet? Recipes to inspire and health tips in every edition, as well as upcoming webinars, clinic and health & well-being updates you won’t want to miss.
https://total-health.com.au/services/pni-psycho-neuro-immunology/
The City of Melbourne is currently facing three significant challenges: climate change, urban heating and population growth. These will place pressure on the built fabric, services and people of the city. We need to respond to these challenges by building healthy resilient landscapes. The Domain Parklands play a critical role in the health and well-being of the community of Melbourne by cooling the city and providing an environment that provides physical and mental health benefits to people. The Parklands play a critical environmental health role, acting as lungs for the city. All of the elements – soil, water, trees and plants - that make the parklands work most effectively need good management and resourcing. Water is essential to a resilient landscape. Adequate soil moisture enables trees to actively transpire and cool the surrounding air. Many of the trees in the Domain Parklands are reaching the later part of their life and will need to be replaced. In some instances it may not be appropriate to replace trees with the same species in the same location. Working with the Royal Botanic Gardens, we’d like to develop a City Arboretum to assist with the development of a diverse, resilient and climate change ready urban forest. We recognise that there are already some rare and special trees in the Domain Parklands. These will be retained and protected, and will inform the Arboretum plan. We need to understand and monitor the ways the Domain Parklands promote and support urban ecology and biodiversity in the municipality and ensure our management improves these values. Read the Discussion Paper for more information on Environmental Sustainability:
http://participate.melbourne.vic.gov.au/domain/theme-3-environmental-sustainability
# Space Weather Prediction Center The Space Weather Prediction Center (SWPC), named the Space Environment Center (SEC) until 2007, is a laboratory and service center of the US National Weather Service (NWS), part of the National Oceanic and Atmospheric Administration (NOAA), located in Boulder, Colorado. SWPC continually monitors and forecasts Earth's space environment, providing solar-terrestrial information. SWPC is the official source of space weather alerts and warnings for the United States. ## Description The Space Weather Prediction Center is one of the nine National Centers for Environmental Prediction (NCEP) and provides real-time monitoring and forecasting of solar and geophysical events, conducts research in solar-terrestrial physics (i.e. heliophysics), and develops techniques for forecasting solar and geophysical disturbances. The SWPC Forecast Center is jointly operated by NOAA and the U.S. Air Force (USAF) and is the national and world warning center for disturbances that can affect people and equipment working in the space environment. SWPC works with many national and international partners who contribute data and observations. A few of the agencies and industry that rely on SWPC services: U.S. power grid infrastructure Commercial airline industry Department of Transportation (use of GPS) NASA human space flight activities (NASA relies on SWPC data to protect the $1 billion arm on the International Space Station (ISS)) Satellite launch and operations U.S. Air Force operational support Commercial and public users (more than half a million hits per day on SWPC web sites) The Federal Aviation Administration (FAA) requires dispatchers to take into consideration HF communication degradation for each dispatched polar flight. Flights can be diverted based on SWPC solar radiation alerts if air traffic control (ATC) communication is compromised, with estimated costs as high as $100K per flight. A 23-day period in 2001 saw 25 flights diverted due to such radio blackouts.
https://en.wikipedia.org/wiki/Space_Weather_Prediction_Center
In this Cyberscoop article, FIDO Alliance Executive Director Brett McDowell and Jeremy Grant of the Chertoff Group emphasize the importance of multi-factor authentication, and explain why NIST needs to include it in the revision of its Cybersecurity Framework. MORE FIDO in the News The Wall Street Journal: Apple Wants to End Passwords for Everything. Here’s How It Would Work Passwords have been the longtime standard for securing online accounts,...6월 24, 2022 S&P Global: Big Tech pushes forward with password-less authentication A tech industry coalition including Apple Inc., Alphabet Inc. and... CNET: Learn About Passkeys, the No-Password Login Tech Coming to iOS 16 and Android Apple recently showed off a new replacement for passwords coming... Geeky.news: Passwordless authentication: soon to be a reality?
https://fidoalliance.org/cyberscoop-nist-urged-to-include-multi-factor-authentication-in-cyber-framework/?lang=ko
Vs. FAMILY AUTO GROUP, MANUFACTURER, COMPLAINT AND DEMAND FOR JURY The plaintiff, residing in Edison, New Jersey, says by way of complaint against the defendants as follows: 1.Family Auto Group, of East Brunswick, was a corporation licensed to do business in the State of New Jersey. 2. On or about that date, the defendant, the manufacturer, was also a corporation licensed to do business in the State of New Jersey. 3. On or about that date, the plaintiff acquired a used 2011 Acura MDX black, with 30,711 miles. 4. The vehicle was represented as a certified pre-owned vehicle and of higher quality than other certified pre-owned vehicles. 5. It was also specifically represented that the vehicle was not involved in any prior automobile accidents. The literature indicating that the vehicle was of higher quality and not in a prior automobile accident were both from the manufacturer and/or the selling dealer indicating that the vehicle was of higher quality than other used vehicles. The selling dealer specifically stated that the vehicle had not been in a prior automobile accident. 6. The plaintiff signed various documents including a retail installment sales contract and a buyer’s order to acquire the vehicle which the purchase price was 40,500. 7. As part of the transaction, the defendant dealership and/or the manufacturer issued a certified pre-owned warranty which the plaintiff paid a dollar amount for which is not disclosed in the appropriate paperwork. 8. It is believed that the selling dealer failed to appropriately disclose and/or indicate the purchase of a certified pre-owned warranty as part of the transaction. 9. The plaintiff received both express and implied warranties as part of the transaction from the manufacturer 11. The plaintiff signed an arbitration clause indicating that the plaintiff waives specific claims against the selling dealer, however, not a Magnuson-Moss Warranty Act claims. 12. The arbitration agreement does not waive any claims against the manufacturer. 13. The plaintiff is making Magnuson-Moss claims against the selling dealer and the manufacturer as well as breach of contract, lack of good faith and fair dealing claims and consumer fraud claims against the manufacturer. 14. The manufacturer is liable under the Consumer Fraud Act and also Magnusson Moss warranty Act for selling a vehicle which in in violation of that warranty. The manufacturers CPO program is deceptive because it created a false impression of the condition of the car and it is implemented by both the dealer and the manufacturer. See also NJSA 56:8-68, as the manufacturer is liable for assisting the dealer in selling deceptive warranties and then selves selling deceptive warranties. The following is on the dealer’s web site: Certification Process The Acura Dealership technicians give it the once over 182 times. Every vehicle must pass stringent measures before it can become a Acura Certified Pre-Owned. Only well-maintained, late-model Acura vehicles are considered, and each one must pass a comprehensive 182-point inspection and a Vehicle History Report review. Virtually every mechanical system-from the engine to the door locks-is checked and serviced to meet precise specifications, and a thorough appearance inspection scrutinizes fit and finish-inside and out-to ensure that every vehicle upholds the luxury and sophistication of the Acura name. The Acura Dealership technicians also inspect all placements of the Vehicle Identification Number to ensure that the VIN plates match. In addition, the VIN is researched for open service campaigns. The following is according to the MFGR web site and sets forth the standards: Certification Standards Why you should choose a Honda Certified Pre-Owned Vehicle Every Honda is a product of innovative engineering and quality manufacturing. And only well-maintained Honda models that are less than six years old and have a maximum of 80,000 miles are eligible for certification. The certification process includes: • A thorough multi-point mechanical and appearance inspection, performed by the dealer, to ensure that each used vehicle meets Honda Certified Pre-Owned Vehicle standards • Honda-trained technicians scrutinize all major vehicle systems, including brakes, engine, drivetrain, steering, suspension, tires, wheels, exhaust system and vehicle interior and exterior • Dealer technicians recondition any component that does not meet our standards • Any component that cannot be reconditioned is replaced with Honda Genuine Parts • A limited warranty that covers engine and transmission components for up to 7 years/100,000 miles Shop online for a Certified Pre-Owned Vehicle. The following is from the dealer web site The following reasons are listed as reasons to purchase certified used vehicles by the manufacturer: 15. This ascertainable loss is directly associated with the conduct of the defendants including, but not limited, to the selling dealer. WHEREFORE, the plaintiff demands judgment against the defendants jointly and severally together with interest and costs of the suit. JURY DEMAND Plaintiff hereby demands a trial by a jury of six (6) jurors as to all issues raised in these pleadings. DESIGNATION OF TRIAL COUNSEL Pursuant to the provisions of Rule 4:25-4, the Court is advised that JONATHAN RUDNICK, ESQ., is hereby designated trial counsel. CERTIFICATION I hereby certify that, pursuant to R. 4:5-1(b)(2), this matter in controversy is active in a filed arbitration against the dealer for fraud and consumer fraud and non mag moss issues CARTON & RUDNICK Attorneys for Plaintiff BY:__________________________________ JONATHAN RUDNICK, ESQ.
https://www.newjerseylemonlawlawyerblog.com/civil-lawsuit-selling-certified-pre-owned-car-damage-dealer-manufacturer/
by Jeniffer Solis, Nevada Current A Nevada-based renewable energy company plans to significantly shrink the size of a planned geothermal power plant in order to ease federal criticisms of its potential impacts on an endangered toad. Earlier this month, federal wildlife managers announced the Dixie Valley toad, a species unique to Nevada, would be listed as endangered and provided permanent federal protections under the Endangered Species Act. The toad’s only known habitat is restricted to 760-acres of wetland habitat fed by hot springs in the remote Dixie Valley northeast of Fallon, directly adjacent to a planned geothermal power plant by developer Ormat Nevada Inc. The U.S. Fish and Wildlife Service concluded that the planned power plant posed an immediate and significant risk to the well-being of the Dixie Valley toad, leaving it at risk of extinction without federal intervention. Paul Thomsen, the vice president of business development for Ormat, argues the endangered listing for the rare desert toad won’t impact the project’s eventual construction. Federal wildlife managers’ decision to list the toad as endangered “was not unexpected,” said Thomsen. “Though Ormat disagrees with the FWS’s characterization of the potential impacts of its Dixie Meadows Geothermal Utilization Project as a basis for the listing.” The toad’s endangered status “does not change the ongoing agency coordination and consultation that began earlier this year,” he added. Last month, however, Ormat submitted a new scaled-back project proposal to the Bureau of Land Management (BLM) to reduce the project to a single geothermal power plant with an estimated output of about 12 megawatts, enough to power 12,000 homes. Significantly less than the original two power plants with a total capacity to power up to 60,000 homes previously planned. “Ormat has sought approval of a smaller project authorization that would provide additional assurance that the species will not be jeopardized by geothermal development,” said Thomsen. Federal land managers approved the geothermal project in 2021 after ruling it would not have a significant effect on the environment — a finding that does not require an environmental impact study — despite the rare toad’s presence. BLM instead reached an agreement with the Ormat to develop a plan to “lessen, minimize or mitigate the adverse effect to the site” once construction starts. The Fallon Paiute-Shoshone Tribe in Churchill County and the Center for Biological Diversity sued the BLM over the approval a month later, arguing the agency should have required an environmental impact statement – a far more rigorous review than the environmental assessment the BLM conducted – given the vulnerability of the Dixie Valley toad. The tribe also considers the springs a sacred site that is culturally and religiously significant to their way of life. In a letter to BLM last month, Ormat acknowledged the toad’s listing “raised questions about how to analyze the project,” including the impacts of the approved geothermal development on the Dixie Valley toad, but maintains that an environmental impact study “is not necessary.” Ormat has now asked a Nevada federal judge to put the lawsuit on hold while BLM considers their new scaled-back proposal, a move the Center for Biological Diversity called a delay tactic. “This is just a clever maneuver to try to avoid a judgment on the case, which is looking increasingly grim for them as the Fish and Wildlife Service continues to push back against BLM and offer more evidence that the project will harm the toad,” said Patrick Donnelly, the Great Basin director for the Center for Biological Diversity. Multiple investor reports filled by Ormat may signal the developer is feeling the heat. Ormat warned investors and analysts in November that the company could not “reasonably predict the ultimate outcome of this litigation or regulatory process or estimate the possible loss or range of loss it may bear, if any.” While Ormat noted they have “strong legal defenses,” they emphasized that any “additional construction delays imposed by the court, any mitigation or other measures” resulting from the Dixie Valley toad’s endangered status could cause the developer “to incur additional project costs, delay or impede the completion of the project and thus the eventual generation of revenues from the project.” The Center for Biological Diversity and the Fallon Paiute-Shoshone Tribe have asked the court to allow their lawsuit to move forward and deny Ormat’s request to place a hold on the case. Donnelly argues Ormat’s new project proposal does not change the fundamental issues brought forward in their lawsuit. “Simply reducing the size of the project does nothing to ameliorate the concerns about the project,” Donnelly said. “They will still be pumping and recirculating billions of gallons of water, they will still be desecrating a sacred site, they will still run the risk of drying up the hot springs.” Nevada Current is part of States Newsroom, a network of news bureaus supported by grants and a coalition of donors as a 501c(3) public charity. Nevada Current maintains editorial independence. Contact Editor Hugh Jackson for questions: [email protected]. Follow Nevada Current on Facebook and Twitter.
https://thisisreno.com/2022/12/geothermal-developer-shrinks-plans-after-toads-endangered-listing/
In order to use the Earth’s resources effectively and efficiently, it is necessary to understand the properties of the elements and compounds found in the mixtures that make up earth materials. In this unit we apply models, theories and laws to classify materials. Metals make up the majority of the elements. In this unit we examine the physical and chemical properties of metals. The periodic Table was a breakthrough in the systematic organization and study of chemistry and has enabled scientists to predict the discovery of further elements. The particular properties of the water molecule assisted the evolution of life and continue to support life processes. The chemistry of solutions is also examined. The concepts of bonding and intermolecular forces are used to increase our understanding of the special nature of the water molecule. Fossil fuels are carbon compounds. In this unit we examine the structure and properties of carbon as well as the reactions, including combustion. In this unit we examine the search for new compounds to replace the dwindling resources from the petrochemical industry. We also examine the role of nuclear chemistry in industry and medicine. Many industries use acidic and basic compounds for a wide range of purposes and their compounds are found in daily use within the home. We also examine the impact of the increased release of acidic and basic substances on the environment and the organisms within those environments. Pollution of air, land and water is a concern for our planet. In this unit we examine the technologies that facilitate the gathering of information about the occurrence of chemicals and their impact on the environment. Some chemicals have been produced to replace naturally occurring chemicals that are no longer available. Industrial chemical processes cover the full range of reactions and concentrate on some case studies.
https://sths.nsw.edu.au/curriculum/science/chemistry
This artist’s impression shows the closest known protoplanetary disc, around the star TW Hydrae in the huge constellation of Hydra (The Female Watersnake). The organic molecule methyl alcohol (methanol) has been found by the Atacama Large Millimeter/Submillimeter Array (ALMA) in this disc. This is the first such detection of the compound in a young planet-forming disc. Credit: ESO/M. Kornmesser Click for a full size image First Detection of Methyl Alcohol in a Planet-forming Disc The organic molecule methyl alcohol (methanol) has been found by the Atacama Large Millimeter/Submillimeter Array (ALMA) in the TW Hydrae protoplanetary disc. This is the first such detection of the compound in a young planet-forming disc. Methanol is the only complex organic molecule as yet detected in discs that unambiguously derives from an icy form. Its detection helps astronomers understand the chemical processes that occur during the formation of planetary systems and that ultimately lead to the creation of the ingredients for life. The protoplanetary disc around the young star TW Hydrae is the closest known example to Earth, at a distance of only about 170 light-years. As such it is an ideal target for astronomers to study discs. This system closely resembles what astronomers think the Solar System looked like during its formation more than four billion years ago. The Atacama Large Millimeter/Submillimeter Array (ALMA) is the most powerful observatory in existence for mapping the chemical composition and the distribution of cold gas in nearby discs. These unique capabilities have now been exploited by a group of astronomers led by Catherine Walsh (Leiden Observatory, the Netherlands) to investigate the chemistry of the TW Hydrae protoplanetary disc. The ALMA observations have revealed the fingerprint of gaseous methyl alcohol, or methanol (CH3OH), in a protoplanetary disc for the first time. Methanol, a derivative of methane, is one of the largest complex organic molecules detected in discs to date. Identifying its presence in pre-planetary objects represents a milestone for understanding how organic molecules are incorporated into nascent planets. Furthermore, methanol is itself a building block for more complex species of fundamental prebiotic importance, like amino acid compounds. As a result, methanol plays a vital role in the creation of the rich organic chemistry needed for life. Catherine Walsh, lead author of the study, explains: “Finding methanol in a protoplanetary disc shows the unique capability of ALMA to probe the complex organic ice reservoir in discs and so, for the first time, allows us to look back in time to the origin of chemical complexity in a planet nursery around a young Sun-like star.” Gaseous methanol in a protoplanetary disc has a unique importance in astrochemistry. While other species detected in space are formed by gas-phase chemistry alone, or by a combination of both gas and solid-phase generation, methanol is a complex organic compound which is formed solely in the ice phase via surface reactions on dust grains. The sharp vision of ALMA has also allowed astronomers to map the gaseous methanol across the TW Hydrae disc. They discovered a ring-like pattern in addition to significant emission from close to the central star . The observation of methanol in the gas phase, combined with information about its distribution, implies that methanol formed on the disc’s icy grains, and was subsequently released in gaseous form. This first observation helps to clarify the puzzle of the methanol ice–gas transition , and more generally the chemical processes in astrophysical environments . Ryan A. Loomis, a co-author of the study, adds: “Methanol in gaseous form in the disc is an unambiguous indicator of rich organic chemical processes at an early stage of star and planet formation. This result has an impact on our understanding of how organic matter accumulates in very young planetary systems.” This successful first detection of cold gas-phase methanol in a protoplanetary disc means that the production of ice chemistry can now be explored in discs, paving the way to future studies of complex organic chemistry in planetary birthplaces. In the hunt for life-sustaining exoplanets, astronomers now have access to a powerful new tool. Notes A ring of methanol between 30 and 100 astronomical units (au) reproduces the pattern of the observed methanol data from ALMA. The identified structure supports the hypothesis that the bulk of the disc ice reservoir is hosted primarily on the larger (up to millimetre-sized) dust grains, residing in the inner 50 au, which have become decoupled from the gas, and drifted radially inwards towards the star. In this study, rather than thermal desorption (with methanol released at temperatures higher than its sublimation temperature), other mechanisms are supported and discussed by the team, including photodesorption by ultraviolet photons and reactive desorption. More detailed ALMA observations would help to definitely favour one scenario among the others. Radial variation of chemical species in the disc midplane composition, and specifically the locations of snowlines, are crucial for understanding the chemistry of nascent planets.The snowlines mark the boundary beyond which a particular volatile chemical species is frozen out onto dust grains. The detection of methanol also in the colder outer regions of the disc shows that it is able to escape off the grains at temperatures much lower than its sublimation temperature, necessary to trigger thermal desorption.
https://parsseh.com/91986/first-detection-of-methyl-alcohol-in-a-planet-forming-disc.html
In the UK, Public Health England estimates air pollution is responsible for between 28,000 and 36,000 deaths a year, costing the NHS and the private healthcare sector £20bn annually. With people spending an estimated 90% of their time indoors (and some demographics, such as the elderly, spending even more time than that), indoor air quality is now recognised as a key issue in building design for homes, offices, hospitals, schools and factories. This CPD assesses the impact of poor ventilation and discusses how existing regulations and new technologies can solve the problem. The cost of poor ventilation Aside from the long- and short-term physical effects, there is growing evidence that air pollution affects mental health and may be a contributory factor in conditions such as depression and bipolar disorder. It may also have a detrimental effect on children’s learning ability and workforce productivity, as well as patient recovery. For building owners, poor indoor air quality (and poor indoor environments in general) can also hit their bottom line: demands from leaseholders and tenants can result in having to carry out costly remedial works to both the building fabric and M&E systems, from lighting to climate control. This can lead to higher running costs and potentially affect market and rental values. Indoor air quality is defined as the quality of the air in and around a building, particularly in relation to the health and comfort of occupants. It is affected by complex and interlinked factors, due to both outside and inside air pollution. Sources of outdoor air pollution include road traffic, industrial processes, waste incineration and construction and demolition sites. Pollution includes particulate matter, nitrogen dioxide, carbon monoxide and pollen, all of which can be brought into a building through natural or mechanical ventilation and via infiltration through the building fabric. But there are also pollution sources inside a building, including volatile organic compounds (VOCs) given off by wall and floor coverings, furniture and appliances as they age and degrade; dust, damp and mould; emissions from office equipment and industrial machinery and, of course, occupants themselves, who breathe out carbon dioxide and can spread colds and viruses. Whole building systems As energy-efficiency standards in building design have risen in recent years, buildings have become more insulated and airtight. This can reduce fresh air circulation, leading to low oxygen levels and increased potential for allergies and odours, as well as the risk of condensation build-up. Installing heating, ventilation and air-conditioning (HVAC) systems that control temperature, humidity and maintain air quality can address the situation. The main focus when designing and specifying HVAC is typically on energy use and efficiency, not least because they attract the highest weighting of all the factors in BREEAM assessments. However, BREEAM also rewards the use of HVAC that maintains high indoor air quality by balancing the indoor and outdoor temperature and humidity and preventing ingress of outdoor pollution, while ensuring a supply of fresh air to occupants. Clearly, a balance needs to be struck. Fundamentally, ventilation aims to remove stale indoor air and replace it with “fresh” outdoor air. HVAC systems are designed to extract water vapour, airborne pollutants and odours, controlling humidity and maintaining good indoor air quality, and to minimise the spread of these impurities to other areas of a building. Systems must also provide “purge ventilation” to help remove occasionally high concentrations of pollutants and water vapour caused, for example, by food cooking in a kitchen or an accidental water spill. For larger buildings, ventilation can be supplied by air-handling units linked to the indoor units, controlled centrally or by floor, room or zone. For smaller buildings, heat recovery ventilation units can be integrated with the overall climate control system, to supply tempered fresh air to the indoor units. Energy efficiency Whole building ventilation systems incorporating heat recovery deliver high levels of efficiency, using waste heat from cooling and refrigeration to heat different areas of a building. Manufacturers typically claim Seasonal Energy Efficiency Rating (SEER) figures of 3 and 4 for heat recovery systems. However, it is possible under certain conditions for a system’s efficiency ratio to nearly double, when taking into consideration recovered energy. In practice, a SEER in excess of 6 should be possible to achieve on a fairly frequent basis. Further energy savings can be achieved using features such as variable refrigerant temperature control. This varies the amount of refrigerant flowing through the system and alters the evaporating and condensing temperatures to match demand. As a result, dramatically less power is needed, and efficiency rises accordingly. As with any element of HVAC, the design of ventilation, whether as a standalone system or as part of a whole building solution, must meet the requirements of the building’s occupants. The key factor in designing ventilation is that it must provide sufficient fresh air supply and extraction to minimise moisture build-up (and therefore control mould) and deal with bio‑effluents (body odour), as well as to keep exposure to nitrogen dioxide, carbon monoxide and VOCs to a minimum. In the UK, ventilation design is controlled by the Building Regulations Approved Document Part F, which sets out criteria for both homes and “non‑domestic” buildings (primarily offices). Ventilation also has to comply with a number of British Standards covering energy performance, filters and maintenance. And, as part of HVAC systems, ventilation must comply with Part B (fire safety), Part C (site preparation and resistance to contaminants and moisture), Part E (resistance to the passage of sound), Part L (conservation of fuel and power), Part J (combustion appliances and fuel storage systems) and Part P (electrical safety). There is a wide range of ventilation guidance available for designers, published by industry bodies including BRE, the Chartered Institution of Building Services Engineers (CIBSE), and REVHA (the Federation of European Heating, Ventilation and Air Conditioning Associations). A key source of information on ventilation is CIBSE’s Document B (section 2.3), which builds on the advice given in Part F of the Building Regulations. Homes Required ventilation rates for homes are based on the number of bedrooms, from 13 litres per second (l/s) for a one-bedroom home, to 29l/s for a five-bedroom property (assuming that two people occupy the main bedroom and one person occupies each of the others). The minimum ventilation rate must not be less than 0.3l/m² for the total internal floor area (all storeys). Part F of the Building Regulations also gives rates for intermittent or continuous extract ventilation required in kitchens, utility rooms, bathrooms and WCs. Purge ventilation is also required in every habitable room, which can normally be achieved by opening windows and doors. Offices The total air supply and extraction rates for office ventilation (assuming no significant pollutant sources) is 10l/s/person, based on the assumption that the building has an air permeability of 3m³/(h.m³). This is within the range achieved by most modern, well-designed buildings and is negligible infiltration, compared with the ventilation system capacity. Intermittent extract ventilation is required for specific areas, including WCs and urinals, printing or photocopying rooms, showers and food and beverage preparation areas. Purge ventilation is also required in each office. Hospitals and healthcare Ventilation in healthcare environments must also be designed to Approved Document F. Health Technical Memorandum 03-01: Specialised ventilation for healthcare premises, published by the Department of Health, also gives general guidance and recommendations for HVAC systems in healthcare buildings. Some healthcare environments, such as operating theatres, critical-care areas and isolation units, have particular ventilation requirements to prevent the spread of infection, odours and hazardous materials. For example, air recirculation systems are normally used in clean rooms and ultra-clean operating theatres, where the extracted air is significantly cleaner than the outside supply. Locating air intakes and exhaust outlets Ventilation intakes must be placed as far away as possible from the main sources of local air pollution. For HVAC systems, this typically means on the roof (unless there are higher-level sources). Alternatively, intakes can be placed on walls, in courtyards and in atriums. Regardless of position, it is important to avoid cross-contamination from boiler flues and exhaust stacks. In fact, exhaust outlets should be placed as far away as possible, preferably on the roof or at a high level, and downwind of intakes where there is a prevailing wind direction. They should not discharge into courtyards or enclosed spaces and it is recommended that they discharge vertically, to avoid downwash. Controlling ventilation Ventilation control is critical for maintaining indoor air quality. Typically, control of ventilation in a whole building HVAC system is integrated with heating and cooling. Automatic systems are fitted with CO2 sensors, which slow down or switch off the unit if CO2 levels drop below a customer-defined level, typically linked to how many people are in the room. If CO2 levels are perceived to be too high, air quality is maintained by variable air volume. Ventilation can also be controlled using the same infrared sensors used to adjust temperature in climate control systems that detect room occupancy. Systems also need to be flexible enough to enable some ventilation units to be switched off or to reduce flow rates – for example, during rush hour – with the system relying on units that are remote from the pollution source or using recirculated air for a time. Ventilation can also be noisy and annoying for both occupants and people outside a building, so noise should be minimised wherever possible. This can be achieved through design – such as by locating units carefully – or alternatively by choosing indoor and outdoor units that have very low sound power levels and sound insulation, or else by introducing noise-reducing measures. Filtration Filtration is another important element of ventilation. All HVAC units will be fitted with filters, primarily to keep them free of dust, to ensure good operation and to maintain energy efficiency. Filters are also fitted to remove particulate matter (PM) from supply air and, in some cases to remove particles where there is a risk of pollution entering the outside atmosphere. Filter selection is based on the widely accepted thresholds for PM, published by the World Health Organization in its Air Quality Guidelines – Global Update 2005. The recommended annual limits are: annual mean for PM2.5 < 10g/m3; annual mean for PM10 < 20g/m3. General filters capture larger, heavier particles, such as dust. Fine filters remove smaller particles, typically the size of bacteria, while HEPA and ULPA filters are used in specialist environments, such as clean rooms and ultra-clean operating theatres. However, while many guidance documents (for example, those published by CIBSE) still refer to EN 779, this has been superseded by ISO 16980 Air filters for general ventilation. The standard uses a filter efficiency classification system based on the three main size ranges of PM, where ePMx describes the efficiency of an air cleaning device to particles within a range of 0.3m to x (the x means the particle size that is your target minimum level). Eurovent 4/23 Selection of EN ISO 16890 rated air filter classes for general ventilation applications (2018) gives guidelines on selecting air filters based on the minimum filtration efficiency, depending on outdoor and supply air categories, for a range of buildings, including homes, offices, shopping centres and hospitals. It also gives comparisons between the filter grades in EN 779 and ISO 16890. Installation, commissioning and maintenance It is crucial that HVAC systems are installed according to manufacturers’ recommendations and commissioned to the final design. Installers have been known to make changes on site – varying piping length, for example – which can have a significant impact on performance, energy efficiency and indoor air quality. Using (and supervising) an installer approved to install a particular manufacturer’s systems is key, as is choosing a company with experience of similar installations. Regular maintenance of ventilation is obviously important and should form part of the overall servicing regime for a building’s HVAC system. However, cleanliness is of particular importance when dealing with ventilation, as dust and dirt can affect their ability to maintain indoor air quality. Maintenance should include checking the intake and exhausts for any signs of dirt build-up, pollution or contamination, damage from weather and animals, as well as inspections of ductwork and the indoor units. BS EN 15780: 2011: Ventilation for buildings – ductwork – cleanliness of ventilation systems specifies acceptable cleanliness levels for supply, recirculation and extract air, grouped into three classes – low, medium and high – depending on building use. So, for example, rooms with intermittent occupancy are classed as low, whereas a treatment room in a hospital is classed as high. Dust should be removed from ductwork, particularly around filters, heating and cooling coils and any change of direction in the ducting. Filters should also be cleaned and replaced as necessary. Indoor units should be cleaned and the dust boxes of those fitted with auto-cleaning systems emptied. COVID-19 AND VENTILATION As covid-19 restrictions have become part of our daily reality, concerns have been raised about the role of HVAC in the risk of spreading airborne viruses. First and foremost, building owners and managers should follow government guidelines. But, as with any airborne contaminants, the risk of potential spread of viruses can be mitigated by ventilation and proper and effective filtration, along with regular cleaning and maintenance of systems. It is essential that air conditioning systems in buildings where confirmed cases of coronavirus have been diagnosed are cleaned and sterilised according to best practice. It is equally important to do so in buildings with no confirmed cases, as a preventative measure – not only now but as part of ongoing maintenance. REHVA, the Federation of European Heating, Ventilation and Air Conditioning Associations, published guidance in April 2020 on how to operate and use building services in order to prevent the spread of coronavirus in workplaces. The guide gives a number of recommendations for buildings that have mechanical heating and ventilation systems. Primarily, the advice for building owners and managers is to supply as much outdoor air as possible, as coronavirus particles can remain suspended in the air for a long time. While in urban areas, where air pollution is likely to be higher, this may mean more pollution ingress to a building, the view is that mitigating the risk of coronavirus is more important during the pandemic. This means extending ventilation operation times (and, where possible, keeping ventilation running 24/7), increasing ventilation rates when the building is occupied and only reducing them during off-peak times such as nights or weekends. Where ventilation relies on air-handing units (AHUs), as opposed to where an AC unit is used in conjunction with a fresh air AHU, REHVA recommends switching air recirculation features off and says it is crucial to ensure systems are properly maintained and leaks are dealt with, to prevent virus particles in extracted air re-entering a building via the air supply, particularly in heat recovery systems. However, it says there is no need to change filters more regularly, nor is additional cleaning thought to help reduce the risk of room-to-room transmission. Normal maintenance procedures can be used, with adequate PPE for service engineers and appropriate safety procedures in place, including switching off systems during filter changes.
https://cpd.building.co.uk/courses/cpd-15-2020-specifying-hvac-systems-for-ventilation/
Asma Redi Baleker is Director General of the Ministry of Peace of the government of Ethiopia. The following is an edited summary of her remarks at the ICLRS 29th Annual International Law and Religion Symposium, 4 October 2022. Today I will share information about the peacebuilding efforts of religious and interfaith institutions in Ethiopia, as well as policy support from the government. Sharing information about these efforts does not mean all such efforts are completely successful. I share simply to show the efforts and work of religious leaders and institutions in our country. More than 98 percent of Ethiopians are believers; they obey and follow their respective religions and religious leaders. And there are more than 2000 registered religious institutions in the country. Most are registered by the Ministry of Peace. More recently, however, evangelical “gospel believers” are able to be registered by the Ethiopian Gospel Believers Churches Council, as the Council’s establishment proclamation permits a religious group that becomes a Council member to gain status as a legal entity. None of these newly registered religious institutions faces challenges or resistance from already-registered organizations. Seven dominant religions in the country established the Inter-Religious Council of Ethiopia, but this independent Council is fully supported and empowered by government policy. They came together in 2010 to ensure that their common values—such as justice, freedom, love, and peace—are promoted, protected, and respected by all citizens, regardless of religion and background. They also organized to ensure protection of religious freedom and equal treatment by the government. Though there have been minor cracks here and there throughout the years, Ethiopia has a history of tolerance and peaceful coexistence. The country is known in the Muslim world as the first to welcome relatives of Prophet Muhammad (Peace be upon him). And Christian and Islamic organizations are established and coexist peacefully in the country. Conflict and Disaster in Ethiopia Even so, Ethiopia has experienced many conflicts: some are short-term, while others prolonged; some are externally imposed, but most are internal. Most internal conflicts that arise are given ethnic or religious cover and promoted by political entrepreneurs. Ethnicity or religion by itself has never been a sufficient reason for conflict to arise in the country; rather, politicians try to provoke the public through their ethnic identities and religious backgrounds. Resource-based conflicts also exist, as the country experiences ineffective utilization of its natural resources. Disasters have had an impact on Ethiopia. Covid has been the biggest disaster in recent years. We have been emerging from decades of drought, though environmental degradations cause periodic droughts and floods in parts of the country even now. We are still experiencing civil war in some areas. Ethiopian state-building history has passed through different wars during the past hundreds of years. These disasters and prolonged conflicts have resulted in the loss of millions of human lives and millions of dollars in property, and the disruption of economic activities and social order. Disasters and conflicts have also resulted in millions of internally displaced people in the country. Other significant effects include distrust of institutions and disordered social interactions. As mentioned previously, cultural diversity is the basis of our tolerance and coexistence, but conflicts degrade this peaceful social order from time to time. The Role of Ethiopia’s Religious Organizations in Conflict and Disaster Given these consequence, what is the role of religious institutions in such difficult times? The first is the role of the Inter-Religious Council as a unifying, central umbrella organization. Though the Council is established by seven religious institutions, when difficulties arise in the country, it attempts to include other, minority religions to stand together to address urgent needs and emphasize shared humanity. The Council promotes unity, harmony, and tolerance, especially when there is an ethnic/religion-based provocation of conflict by conflict entrepreneurs. Due to the efforts and work of religious leaders and elders, there is a high level of religious tolerance and harmony in the country. If it were left to the politicians, unity would not prevail. The Council also solicits and mobilizes support and resources for millions of internally displaced people, not only from domestic sources but from international donors and their supporters as well. Religious leaders play a significant role in conflict resolution. They reprimand conflict-inciting parties, politicians, and elites, inviting them to come to their senses and resolve their differences through peaceful discussion. They advise communities to avoid conflict and promote coexistence and peace. Religious organizations also help by healing the trauma of victims of conflict and providing humanitarian support through their development units. During disasters, religious organizations calm the public by calling for continuous prayers, day and night. Whenever a disaster occurs, the first thing religious leaders do is initiate days of continuous prayer, and they don’t pray alone; they call on the public to pray continually at home. Religious institutions also communicate group condolences to those who have been affected by disaster to remind them the Almighty is still with them and to lift them in the aftermath. In addition, religious leaders call for believers and followers to engage in practices that promote self-protection, unity, and synergy. As mentioned previously, more than 98 percent of Ethiopians are religious followers, so they listen and respond to this call. Religious organizations provide organized humanitarian support. They also lead the country’s Green Legacy Initiative and promote coordinated efforts in environmental protection to overcome the drought and floods caused by environmental degradation. Religious organizations are also engaged in reconciliation efforts between conflicting parties in different regions. At the grassroots community level, they teach why reconciliation is beneficial and important and how to reconcile through dialogue. Again, they teach the importance of tolerance and harmony between people, institutions, and religions. And they emphasize the importance of institutional strength and internal peace. Such efforts have been carried out, for example, in the Amhara, Benishangul-Gumuz, Oromia, and SNNP (Southern Nations, Nationalities, and Peoples’) regions of the country. Importantly, reconciliation efforts have also been carried out in the northern, Tigray region, where the Ethiopian National Defense Force (ENDF) and Tigray People’s Liberation Front (TPLF) have been at war. Even before the war began, religious leaders traveled to Mekelle, the capital of the Tigray region, and begged the federal and regional governments to calm down and have rational, peaceful discussions, rather than create pressure and tensions in the country. Though some conflicts continue to escalate, religious organizations have intervened to prevent hundreds of conflicts from escalating and getting worse. Peacebuilding efforts have resulted in helping people be more rational than emotional. Politicians lead by provoking the public emotionally. But our religious leaders have tried to teach the public to be more rational. Such efforts have also helped strengthen and increase the endurance of victims in times of difficulty. Our religious organizations teach the public to have patience, tolerance, and strength to rise out of difficulty. They also encourage cooperation and coexistence by the larger community, promote synergy, and foster a sense of humanity. That is why we survive: we help each other a lot. If not for this coordinated effort, it would have taken Ethiopians longer to recover from the trauma and pain resulting from various conflicts and disasters. The rehabilitation and resettlement of internally displaced persons has been accomplished with the help of our religious leaders. Religious organizations have also helped reconstruct both social cohesion and physical damage after disaster and conflict. Remaining Challenges Religious actors and organizations in Ethiopia have made significant contributions to peacebuilding, but as I mentioned at the beginning, I do not claim that they have been entirely successful in their efforts. Significant challenges remain. The first is globalization and social media; the younger generation is more dependent on social media and its messages than the elders advise. Political polarization and an ethnicized political culture is another challenge that erodes unity and promotes religious division, sometimes even among similar religious followers. In addition, religious organizations may experience insufficient support by other stakeholders; they may begin efforts but not accomplish everything or reach the entire community without sufficient support from local government, NGOs, and international donors. And finally, their efforts can be compromised by lack of political will; religious organizations’ efforts at peacebuilding may not be supported by politicians who attempt to provoke the public for their own gain.
https://talkabout.iclrs.org/2023/01/15/religions-roles-in-peacebuilding-in-ethiopia-religion-and-interfaith-engagement-in-times-of-conflict-and-disaster%EF%BF%BC/
Borderline personality disorder (BPD), a serious mental illness marked by unstable moods and erratic behaviors, is one mental illness that causes extreme conflict and often, but not always, destruction of most relationships and marriages. It is estimated that it affects 1.6% of adults in the United States. The symptoms are as follows: - Extreme reactions—including panic, depression, rage, or frantic actions—to abandonment, whether real or perceived - A pattern of intense and stormy relationships with family, friends, and loved ones, often veering from extreme closeness and love (idealization) to extreme dislike or anger (devaluation) - Distorted and unstable self-image or sense of self, which can result in sudden changes in feelings, opinions, values, or plans and goals for the future (such as school or career choices) - Impulsive and often dangerous behaviors, such as spending sprees, unsafe sex, substance abuse, reckless driving, and binge eating - Recurring suicidal behaviors or threats or self-harming behavior, such as cutting - Intense and highly changeable moods, with each episode lasting from a few hours to a few days - Chronic feelings of emptiness and/or boredom - Inappropriate, intense anger or problems controlling anger - Having stress-related paranoid thoughts or severe dissociative symptoms, such as feeling cut off from oneself, observing oneself from outside the body, or losing touch with reality. Probably the most prevalent personality disorder in family court is Borderline Personality Disorder (BPD) .
http://www.adaf.ca/wordpress/2016/06/07/borderline-personality-disorder/?replytocom=2255
CRES doctoral students must pass both the written and oral components of the preliminary examination. Students will work with the exam committee to compile a reading list covering four topic areas in the field and will be responsible for all items on each list. A committee of three CRES faculty members will read students’ written exams and conduct the oral examination. The first step in preparing for the comprehensive exam is to create a list of four exam topics. The first topic will be a general or canonical list in rhetoric-composition. The second and third areas should focus on sub-areas within the field, such as the history of writing instruction; visual rhetoric, technology, and writing; literacy studies; writing across the curriculum; basic writing, ethnography and writing research, assessment, etc. The fourth topic will normally be another area of English studies (e.g., linguistics, American literature) or another interdisciplinary area related to composition-rhetoric. Students should consult with the committee chair to create the reading lists. Each list should be explained in a brief background statement that introduces the topic and explains its significance to the field. The explanatory statement should be followed by the bibliography, which should normally include books/monographs, articles, book chapters, and collections of essays. Students may consult the CRES PhD Reading List document on our resources page, which provides a provisional bibliography of the field. This document is a good starting point for assembling the reading list; however, it will be essential for students to look beyond the document in order to access the most recent scholarship in a given area. In addition to consulting the CRES reading list, students should also look through recent issues of the relevant journals for their topic areas. Students must submit the final reading list no later than twelve weeks before the exam, but they are encouraged to submit it even earlier to allow ample time for preparation and study. Once students submit the final version, they should select a date and time for the exam. At least ten days before the exam, students should contact the main office to schedule a room for the written and oral portions of the exam. The written preliminary examination for candidates in CRES will be four hours in duration and will require candidates to respond to two questions from four areas. The exam committee will compose the questions that constitute students’ written examination. These questions will deal with issues central to the four topic areas and may require students to look at material from a new perspective, to refocus their concerns, or to re-examine their assumptions. The goal is for candidates to demonstrate their ability to write with a seasoned, mature understanding of the topic, demonstrating both a conceptual grasp of the topic and the ability to identify and refer to relevant sources. Effective responses should answer the question as fully as possible, taking the role of an expert and addressing a high-level audience that may not be well informed in the particular area. For example, experienced teachers of college composition who have not yet read the texts that candidates have studied. Effective responses will be well organized and demonstrate an in-depth understanding of the readings. If the candidate passes the written preliminary examination, the committee will conduct an oral examination at the first convenient opportunity for both the candidate and the faculty. For the oral examination, the candidate will be responsible for material from all four topics, the two not covered on the written examination as well as the two that were. CRES candidates must pass the oral exam in order to move on to the dissertation stage.
https://cres.english.ua.edu/phd-program-requirements/phd-preliminary-exam/
Cyber systems that serve government and military organizations must cope with unique threats and powerful adversaries. In this context, one must assume that attackers are continuously engaged in offence and an attack can potentially escalate in a compromised system. This paper proposes an approach to generate defensive responses against ongoing attacks. We use Attack-Defence Trees (ADTrees) to represent situational information including the state of the system, potential attacks and defences, and the interdependencies between them. Currently, ADTrees do not support automated response generation. To this end, we develop a game-theoretic approach to calculate defensive responses and implement our approach using the Game Theory Explorer (GTE). In our games, Attackers and Defenders are the players, the pay-offs model the benefit to each player for a given course of action, and the game's equilibria is the optimal course of action for each player. Finally, given the dynamic nature of cyber systems, we keep our ADTrees and the corresponding game trees upto-date following the well-known OODA (observe, orient, decide, act) loop methodology.
http://trespass-project.eu/node/269
Context: Anterior cruciate ligament (ACL) reconstruction is the standard of care for individuals with ACL rupture. Balance deficits have been observed in patients with ACL reconstruction (ACLR) using advanced posturography, which is the current gold standard. It is unclear if postural-control deficits exist when assessed by the Balance Error Scoring System (BESS), which is a clinical assessment of balance. Objective: The purpose of this study is to determine if postural-control deficits are present in individuals with ACLR as measured by the BESS. Participants: Thirty participants were included in this study. Fifteen had a history of unilateral ACLR and were compared with 15 matched controls. Interventions: The BESS consists of 3 stances (double-limb, single-limb, and tandem) on 2 surfaces (firm and foam). Participants begin in each stance with hands on their hips and eyes closed while trying to stand as still as possible for 20 s. Main Outcome Measures: Each participant performed 3 trials of each stance (18 total), and errors were assessed during each trial and summed to create a total score. Results: We observed a significant group × stance interaction (P = .004) and a significant main effect for stance (P < .001). Post hoc analysis revealed that the ACLR group had worse balance on the single-leg foam stance than did controls. Finally, the reconstructed group had more errors when total BESS score was examined (P = .02). Conclusions: Balance deficits exist in individuals with ACLR as measured by the BESS. Total BESS score was different between groups. The only condition that differed between groups was the single-leg stance on the unstable foam surface. Fatemeh Azadinia, Ismail Ebrahimi-Takamjani, Mojtaba Kamyab, Morteza Asgari and Mohamad Parnianpour .1016/j.clinbiomech.2009.05.004 10.1016/j.clinbiomech.2009.05.004 Della Volpe , R. , Popa , T. , Ginanneschi , F. , Spidalieri , R. , Mazzocchio , R. , & Rossi , A. ( 2006 ). Changes in coordination of postural control during dynamic stance in chronic low back pain patients . Gait & Posture Max Pietrzak and Niels B.J. Vollaard single limb from each subject (Figure 1 ). In order to avoid effects of intervention order and/or limb dominance, the treatment order was counterbalanced with 7 subjects having the stance leg treated first and the remaining 6 subjects receiving treatment on the skill leg first, the skill leg defined as Becky L. Heinert, Thomas W. Kernozek, John F. Greany and Dennis C. Fater Objective: To determine if females with hip abductor weakness are more likely to demonstrate greater knee abduction during the stance phase of running than a strong hip abductor group. Study Design: Observational prospective study design. Setting: University biomechanics laboratory. Participants: 15 females with weak hip abductors and 15 females with strong hip abductors. Main Outcome Measures: Group differences in lower extremity kinematics were analyzed using repeated measures ANOVA with one between factor of group and one within factor of position with a significance value of P < .05. Results: The subjects with weak hip abductors demonstrated greater knee abduction during the stance phase of treadmill running than the strong group (P < .05). No other significant differences were found in the sagittal or frontal plane measurements of the hip, knee, or pelvis. Conclusions: Hip abductor weakness may influence knee abduction during the stance phase of running. Beth Jamali, Martha Walker, Brian Hoke and John Echternach Context: Windlass taping is used to reduce pain in plantar fasciitis and thought to take stress off the plantar fascia. Objective: To investigate the effects of windlass taping. Design: Single group, repeated measures. Setting: Outpatient physical therapy clinics. Patients: 20 subjects with plantar fasciitis. Intervention: Windlass taping technique. Main Outcome Measures: Pretaping and posttaping measures included pain levels using a visual analog scale (VAS), resting-stance calcaneal position, tibial position, and navicular height. Fifteen also reported a VAS after wearing the tape for 24 h. Results: Median VAS score 37 mm pretape and 6 mm immediately posttape and 24 h later. Wilcoxon matched-pairs signed ranks test significant (P = .001) for reduction in pain scores. Paired t tests significant (P = .01) for a difference between means of pretaping and posttaping measurements for resting-stance positions. Conclusions: Windlass taping decreased pain in patients with plantar fasciitis and caused small changes in resting-stance positions. Bryan L. Riemann, Kevin M. Guskiewicz and Edgar W. Shields Although sophisticated forceplate systems are available for postural stability analyses, their use is limited in many sports medicine settings because of budgetary constraints. The purpose of this investigation was to compare a clinical method of evaluating postural stability with a force-platform sway measure. Participants completed a battery of three stance variations (double, single, and tandem) on two different surfaces (firm and foam) while standing on a force platform. This arrangement allowed for simultaneous comparisons between forceplate sway measures and clinical assessments using the Balance Error Scoring System (BESS). Significant correlations were revealed for the single-leg and tandem stances on the firm surface and for double, single, and tandem stances on the foam surface. These results suggest that the BESS is a reliable method of assessing postural stability in the absence of computerized balance systems. Thomas A. Stoffregen, Philip Hove, Jennifer Schmit and Benoît G. Bardy We demonstrated that postural responses to imposed optic flow are to some extent voluntary. In a moving room, participants either stood normally or were instructed to resist any influence of visible motion on their stance. When participants attempted to resist, coupling of body sway with motion of the room was significantly greater than when the eyes were closed, but was significantly reduced relative to coupling in the normal stance condition. The results indicate that the use of imposed optic flow for postural control is not entirely automatic or involuntary. This conclusion motivates a search for non-perceptual factors that may influence the degree to which body sway is coupled to imposed optic flow.
https://journals.humankinetics.com/search?page=11&pageSize=10&q=%22stance%22&sort=relevance
Phnom Penh Post - Online or out of line? Online or out of line? A National Election Committee appeal to social media users not to dent confidence in the electoral process and a subsequent threat of potential legal action have sparked concerns from observers of a chilling effect on online commentary ahead of the July national election. The statement called on bloggers and users of social media networks to avoid “creating fear, confusion and a loss of confidence in the electoral process” and “offering misinformation about the electoral process, especially the date of the election”. NEC Secretary-General Tep Nytha downplayed that language yesterday, telling the Post that the committee respects the rights of users to comment on the election. “[Users] have the right to respond to each other and the right to send information to each other, but we would like them to respect the date and important principles of the election to avoid sending wrong information,” he said. But he added that the NEC would take legal action if someone lodged a complaint about social media postings in order to avoid negative influence on the electoral process and a loss of confidence in the election. Kounila Keo, a prominent blogger and media consultant, told the Post that the statement marks an intrusion into freedom of speech. “The NEC has no right to say that to individual citizens, who have the right to say what they think and share information freely . . . That’s part of the rights ensured by the constitution of Cambodia,” she said. “This has proved that this government or even other governments are fearing that they are being overpowered by us netizens,” she added. Cambodian Center for Human Rights president Ou Virak said yesterday that although parts of the statement were acceptable, the use of broad language implying that those who criticise the NEC could be targeted was “concerning”. The NEC announcement has already gone viral on Facebook, indicating the speed that information now spreads in Cambodia via social networks, said Khim Sophanna, a blogger and local program manager at German NGO the Friedrich Naumann Foundation for Freedom. “To me, it is an appropriate concern of the NEC related to the possible misuse of social media [by] users . . . but if users post nonsense . . . other users will judge it properly. There is no need for NEC to intervene or take action,” he said. Although internet penetration in Cambodia remains limited – recent government estimates put the number of internet users at 2.7 million, or 18 per cent of the population – it is rapidly growing. Statistics from London-based social media agency We Are Social show the number of Cambodian internet users increased by 548 per cent in 2012 alone, with almost 700,000 social media users in the Kingdom as of October 2012. Som Rothana, acting head of the department of media and communication at Royal University, said that social media has become rooted in the daily lives of many Cambodian youth thanks to higher living standards and new technology. “I think these people now are becoming more and more interested in sharing their thoughts and concerns via Face­book pages, and I think their sharing has been very free recently,” he said. Keo, who plans to stimulate election discussion through her popular Blue Lady Blog, took a stronger stance, arguing that social media could play a “very important role in disseminating information” that the mainstream media cannot report in July’s election. “Information can be shared among close circles and can be very useful for decision-making during the election,” she said, adding that the growing willingness of Cambodians to share and comment on socio-political issues online was “unprecedented”. The recent Malaysian general election, in which social media users effectively exposed electoral fraud online in the absence of mainstream media coverage, could serve as a model, she said. She cautioned, however, that attacking sensitive topics and political figures without evidence was not the way to use social media. Although Keo calls blogging “a relatively free sphere in Cambodia”, government moves in recent years have caused concern in some quarters. A CCHR briefing note on internet censorship from April this year identifies a number of developments as concerning, including the government’s May 2012 announcement that it was drafting a cyber law. Although the law is in the early stages of drafting, according to CCHR, “fears abound that such a law could be extremely damaging to freedom of expression online in Cambodia”. In February 2011, the Post revealed a leaked email from a senior official at the Ministry of Post and Telecommunications congratulating 10 Cambodian internet service providers for blocking access to a number of websites that are often critical of the ruling government. According to local news website CEN, Minister of Information Khieu Kanharith said yesterday that those who do not use Facebook carefully must be “cautious” and instead use it in “a useful way for people and the nation”. The Post was unable to reach Kanharith for comment yesterday. Prominent blogger Chak Sopheap, who used to send letters to the editors of newspapers to express her opinion before the advent of social media, said that she is not afraid of speaking out online. “What should I be scared of? It is my right to express my opinion,” she said.
https://www.phnompenhpost.com/national/online-or-out-line
Abstract: We investigate the amount of communication that must augment classical local hidden variable models in order to simulate the behaviour of entangled quantum systems. We consider the scenario where a bipartite measurement is given from a set of possibilities and the goal is to obtain exactly the same correlations that arise when the actual quantum system is measured. We show that, in the case of a single pair of qubits in a Bell state, a constant number of bits of communication is always sufficient--regardless of the number of measurements under consideration. We also show that, in the case of a system of n Bell states, a constant times 2^n bits of communication are necessary. Submission historyFrom: Richard Cleve [view email] [v1] Fri, 15 Jan 1999 00:51:49 UTC (10 KB) Full-text links: Download:
https://arxiv.org/abs/quant-ph/9901035
Water is a basic need yet it is a resource that we have taken for granted. Perhaps the seeming abundance of it—as the Earth is composed of two-thirds water—creates a sense of complacency without realizing that of all the world’s water, only 0.5% is suitable for human consumption. In 2015, 91% of the world’s population had access to an improved drinking-water source, compared with 76% in 1990. About 4.2 billion people now get water through a piped connection; while 2.4 billion access water through other improved sources such as public taps, protected wells and boreholes. However, at least 1.8 billion people around the world use a drinking-water source that is fecally contaminated. Moreover, half of the world’s population will be living in water-stressed areas by 2025. Here in the Philippines, around eight million Filipinos still lack access to safe water and about the same number still practice open defecation. While we try to address these problems, we are faced with new challenges. A study by the World Resources Institute revealed that the Philippines will likely experience severe water shortage by 2040 due to the combined impact of rapid population growth and climate change. Furthermore, the Philippines ranks 57 out of 167 countries that are highly vulnerable to severe water shortage. Moreover, water affects our food security as agriculture accounts for 70-85% of our water consumption. But water security is not only about the provision of sufficient water for the needs of our people and our economic activities, it is also about having healthy ecosystems and building resilience to water-related disasters, including storms, floods and droughts. Extreme weather events, such as intense or more frequent rains and increasing number of hot days, along with weak resource management, are factors that lead to low water security. The continued overlapping and fragmented regulation of water supply services in the country by several government entities is one factor that hinders the enactment of a doable and long-term solution to prevent water shortage. The degradation of our environment is likewise a threat to water security especially because forested watersheds and wetlands supply 75% of the world’s accessible freshwater. The result of the Department of Environment and Natural Resources’ (DENR’s) mining audit released this year is a cause for concern. Many of those recommended for closure or suspension are said to have caused the destruction of functional watersheds. Some of these operations may have given employment, but what if they caused irreparable damage to the environment? We also need to strengthen resilience to water-related disasters. The country needs to evaluate existing programs to combat desertification and prevent flooding, and improve its evacuation strategies, early warning systems and disaster risk reduction and management plans. Capacity-building activities for indigenous peoples must be undertaken so they can adapt to water extremes. In the context of climate change, water management is very crucial. We have witnessed several times how extreme weather events such as stronger rains and storms have caused massive inundation, claiming lives and destroying livelihoods. In 2016, farmers in Kidapawan City staged a protest as the climate-related drought affected the lives and livelihood of their farming communities. The bloody dispersal that ensued claimed the lives of at least three farmers and wounded several others. Water stress, amplified by climate change, will create a growing security challenge. In order to address the water challenge, we need a holistic approach. The issue of having over 30 water agencies has been a challenge because of overlapping mandates and conflicting programs. We need to consolidate all water agencies in the country and craft a roadmap for sustainable water use. Much work needs to be done and it needs everyone’s cooperation. We should all be reminded that we are the stewards of the Earth, not here to exploit, but to sustainably manage our natural resources. Just as it is our right to access clean water, it is also our responsibility to ensure that the well never runs dry. Thank you.*** Drinking Water Fact sheet, World Health Organization.
https://lorenlegarda.com.ph/speech-water-challenge-forum/
Teachers who are interested in receiving the answer key, please contact MND from your school email address at [email protected]. This activity is one of a series in the collection, The Potential Consequences of Climate Variability and Change activities. A Data Support Specialist works with the user community to understand their science needs with the goal of providing support for NASA data and information services. They represent the user in product development and development resources to assist with the user community's needs. This person works directly with users to solve problems using NASA data, or to provide resources to improve understanding of the data. This mini lesson engages students in writing a commentary for a NASA video regarding changes in global temperatures from 1880 to 2017. Atmospheric scientists study the weather and climate and examine how those conditions affect human activity and the earth in general. Most atmospheric scientists work indoors in weather stations, offices, or laboratories. Occasionally, they do fieldwork, which means working outdoors to examine the weather. Some atmospheric scientists may have to work extended hours during weather emergencies. NASA Worldview is a free online visualization tool that is a great launchpad for learners who are new (or veteran) users of satellite data. Scientific data are often represented by assigning ranges of numbers to specific colors. The colors are then used to make false color images which allow us to see patterns more easily. Students will make a false-color image using a set of numbers. Information from satellites if often used to display information about objects. This information can include how things appear, as well as their contents. Explore how pixel data sequences can be used to create an image and interpret it.
https://mynasadata.larc.nasa.gov/search?f%5B0%5D=%3A1&f%5B1%5D=%3A3&f%5B2%5D=%3A6&f%5B3%5D=%3A10&f%5B4%5D=%3A26&f%5B5%5D=%3A39&f%5B6%5D=%3A54&f%5B7%5D=%3A67&f%5B8%5D=%3Apage&f%5B9%5D=phenomena%3A6&amp%3Bf%5B1%5D=filter_phenomenon%3A43&amp%3Bamp%3Bf%5B1%5D=filter_phenomenon%3A15&amp%3Bamp%3Bnode=89
Rather, as the readers of this journal are no doubt aware, it just seems like the number and levels of crises in the world are teetering on the edge of some kind of inevitable transforming event. Whether that transformation will make it possible for your children and grandchildren and their children find a path to celebrating life on this planet or will lead to huge tragedy for virtually every living been on Earth, remains to be seen. InIntegral Review I published an interview with Suzi Gablik, art critic and author, I was stunned by her (perhaps tentative) conclusion that it is just too late. We have brought life on this planet beyond the brink of destruction: (http://integral-review.org/back_issues/backissue5/index.htm). You know the litany, pollution, global warming, the administration in the US for the last 8 years and its domestic and international policies, but there is more. War. War in Iraq, Afghanistan, Georgia, Sudan (today’s government attack on a refugee camp) and elsewhere. Armed conflict in many, many other places. Frequent examples of crimes against humanity, including what I believe, for the first time I have been aware of it, such crimes committed by Americans, at least with the approval, support and urging of the political leadership of this country. Instable governments, even today in Pakistan, a country that has only recently moved from military dictatorship, as benevolent as it tended to be. The energy crisis in the face of growing demand. The financial crisis with a threatened world-class recession, if not worse. A food crisis of rising prices and local/regional scarcity. And a crisis in ethics, morality and leadership in the world of business that has contributed so mightily to many of these crises. Do you ever make your own list of what you see happening in the world? Is it anything like mine? Would you add some positives, as well? Al Gore’s vision of ending dependency on foreign oil in the U.S. (and potentially in the rest of the world) beginning in ten years? The potential for a meaningful change in administration in the U.S.? The rise of new generations around the world with global access and connection? Growing hope for mastering crises of health and habitat with technology? And it is important to consider what is to be done beyond this. One reason for the existence of the Integral Leadership Review is our belief that the quality of leadership required for moving us away from the brink needs to change. John Kotter has long studied what it takes to make successful transformational change in organizations. Books he authored or co-authored on this subject have included The Heart of Change, Our Iceberg is Melting, and now A Sense of Urgency( A Sense of Urgency,Boston: Harvard Business Press, 2008). Perhaps his understanding will help us move forward on an even large scale. In response to the question “What is the single biggest error people make when they try to change?” He concludes, “I decided the answer was that they did not create a high enough sense of urgency among enough people to set the stage for making a challenging leap into some new direction.” Well, if there has ever been a time for such a leap, this is one of them. But let’s look at some addition conclusions Kotter has drawn: First, I became more than ever convinced that it all starts with urgency…if a sense of urgency is not high enough and complacency is not low enough, everything else becomes so much more difficult.” Second, complacency is much more common than we might think and very often invisible to the people involved.” Third, the opposite of urgency is not only complacency. It’s also a false or misguided sense of urgency that is as prevalent today as complacency itself and even more insidious.” Change is driven by anxiety, anger and frustration, rather than a determination to win. Fourth, mistaking what you might call false urgency from real urgency is a huge problem today.” This leads to underperformance and creating harm. Fifth, it most certainly is possible to recognize false urgency and complacency and transform each into a true sense of urgency.” This requires practical approaches. Sixth, urgency is becoming increasingly important because change is shifting from episodic to continuous.” The ability to have a strong sense of urgency is becoming a necessity in the face of complexity and rapid change. He goes on to offer four tactics for promoting a sense of urgency in creating successful transformative change: - Bring the outside in, including bringing people with different perspectives into the process. - Behave with urgency every day by taking a number of actions, including matching words and deeds; walk the talk! - Find opportunity in crises, by avoiding four mistakes: assuming your sense of urgency will automatically be matched by others, implementing strategies that go over the line create backlash because they feel manipulated, and - Deal with NoNos, the effective opposition to change. One of Kotter’s strategies for dealing with NoNos in organizations is to get rid of them. But that is difficult to do when we are talking about life on this planet, as opposed to the economic futures of some investors and employees. He also suggests mobilizing social pressure to encourage them to back off, if not join the forces for transforming situations filled with legitimate urgency. There is so very much to do. There are so many reasons why we should feel that sense of legitimate urgency, over and over again. And so many reasons we need to attend to the opportunities to bring more and more of us together to address the crises that threaten our very existence. And some beginning ideas about how we might go about it from the pen of John Kotter. From here, consider an integral approach to urgency. Consider both individual and collective aspects of change and connecting to urgency. Consider the messages that will connect people who are centered in the various colors of the spectrum of development to engage them in effectively raising the sense of constructive urgency. Yes, I have a sense of urgency and I seek to find the ways to express that to create a possible and positive future for my one-year-old grand daughter, Sophia. She is a child of the world. I do hope my generation and next can help make the sense of urgency strong enough to make it possible for her and the world to thrive. Russ August 25, 2008 Postscript August 26, 2008 Thanks to a friend of mine, I had the opportunity to watch and listen to Bill Moyers interview of Andrew J. Bacevich, author of The Limits of Power. I invite you to do the same: http://www.pbs.org/moyers/journal/08152008/watch2.html. I will not attempt to summarize the discussion, but simply point out that it is one of the most cogent discussions of political leadership in the United States, its consequences and blind spots, that I have ever heard. Now I want to read the book. The impact on me has been to re-examine my own politics and understanding of what is happening (and has been happening for some time) in the United States and its role internationally. In a sense, this discussion has engaged me with “the spiral within” in some surprising ways. I would really like to hear from you about your responses, as well. Also, I have recently discovered two books by David Loye that I must highly recommend to you. The first is Bankrolling Evolution and the second is Measuring Evolution. Both books are about the subject of leadership, political leadership. I will be writing more about these in the November issue of Integral Leadership Review. But if you can’t wait, then go to: http://benjaminfranklinpress.com/booklist.htm.
https://integralleadershipreview.com/5035-coda-thriving-in-the-face-of-urgency/
Roughly speaking, logic is the study of prescriptive systems of reasoning, i.e. systems that people ought to use to reason deductively and inductively. How people actually reason is usually studied under other headings, including cognitive psychology. Logic is a branch of mathematics, and a branch of philosophy. As a science, logic defines the structure of statement and argument and devises formulae by which these are codified. Implicit in a study of logic is the understanding of what makes a good argument and what arguments are fallacious. Philosophical logic deals with formal descriptions of natural language. Most philosophers assume that the bulk of "normal" proper reasoning can be captured by logic, if one can find the right method for translating ordinary language into that logic. Following are more specific discussions of some systems of logic. | | The law of non-contradiction states that no proposition is both true and false and law of excluded middle states that a proposition must either be true or false. In combination, these laws require two truth values that are mutually exclusive. A proposition can be either true or false, but cannot be both at the same time. Some examples of symbolic notation are: Lowercase letter p, q and r with italic font are conventionally used to denote propositions: This statement defines p is 1 + 2 = 3 and that is true. Two propositions can be combined using conjunction, disjunction or conditional. They are called binary logical operators. Such combined propositions are called compound propositions. For example, In this case, and is a conjunction. The two propositions can differ totally from each other. In mathematics and computer science, one may want to state a proposition depending on some variables: This proposition can be either true or false according to the variable n. A proposition with free variables is called propositional function with domain of discourse D. To form an actual proposition, one uses quantifiers. For every n, or for some n, can be specified by quantifiers: either the universal quantifier or the existential quantifier. For example, This can be written also as: When there are several free variables free, the standard situation in mathematical analysis since Weierstrass, the quantifications for all ... there exists or there exists ... such that for all (and more complex analogues) can be expressed. Aristotelian logic was capable of dealing with objects and not just sentences, but it was known to have a number of fallacies, and no way had been found to remove these systematically. Frege's insight was that by discovering "quantifiers" in sentences, we can reduce many more of them into structures of term-and-predicate which we can operate on logically without running into the fallacies of Aristotelian logic. Sentential logic explains the workings of words such as "and", "but", "or", "not", "if-then", "if and only if", and "neither-nor". Frege expanded logic to include words such as "all", "some", and "none". He showed how we can introduce variables and "quantifiers" to rearrange sentences. Frege treats simple sentences without subject nouns as predicates and applies them to "dummy objects" (x). The logical structure in discourse about objects can then be operated on according to the rules of sentential logic, with some additional details for adding and removing quantifiers. Frege's work started contemporary formal logic; Aristotelian logic as a substantive research project effectively perished. Frege adds to sentential logic (1) the vocabulary of quantifiers (upside-down A, backward E) and variables, (2) a semantics that explains that the variables denote individual objects and the quantifiers have something like the force of "all" "some" in relation to those objects, and (3) methods for using these in language. To introduce an "All" quantifier, you assume an arbitrary variable, prove something that must hold true of it, and then prove that it didn't matter which variable you chose, that would have held true. An "All" quantifier can be removed by applying the sentence to any particular object at all. A "Some" (exists) quantifier can be added to a sentence true of any object at all; it can be removed in favor of a term about which you are not already presupposing any information. In the early 20th century Jan Lukasiewicz[?] investigated the extension of the traditional true/false values to include a third value, "possible". Logics such as fuzzy logic have since been devised with an infinite number of "degrees of truth", e.g., represented by a real number between 0 and 1. Bayesian probability can be interpreted as a system of logic where probability is the subjective truth value. In the 1950s and 1960s, researchers predicted that when human knowledge could be expressed using logic with mathematical notation, it would be possible to create a machine that reasons, or artificial intelligence. This turned out to be more difficult than expected because of the complexity of human reasoning. Logic programming is an attempt to make computers do logical reasoning and Prolog programming language is commonly used for it. In symbolic logic and mathematical logic, proofs by humans can be computer-assisted. Using automated theorem proving the machines can find and check proofs, as well as work with proofs too lengthy to be written out by hand. In computer science, Boolean algebra is the basis of hardware design, as well as much software design.
http://encyclopedia.kids.net.au/page/lo/Logic
There was once a time when robots roamed the surface of Mercury, when a shape-shifting alien emerged from the ice of Antarctica, and when a galactic empire of 25 million planets spanned the Milky Way. It was called the “Golden Age” of science fiction, the period from the late 1930s to the late 1940s, when pioneering authors such as Isaac Asimov and Robert A. Heinlein wrote their first mind-bending stories. And though newer literary movements have mutated sci-fi’s DNA since then, the last surviving storyteller of the Golden Age—95-year-old James Gunn—is still writing. A longtime resident of Lawrence, Kansas, Gunn started writing short stories in 1948 for the panoply of magazines that catered to science-fiction fans in the postwar years, including Amazing Stories, Astounding Science Fiction (now known as Analog), and Galaxy. Over the following decades he authored dozens of books; his 1962 novel The Immortals was turned into a television series, and his 1972 masterpiece The Listeners inspired many researchers to join the search for extraterrestrial intelligence. But perhaps Gunn’s greatest accomplishment was making science fiction more respectable. As a professor at the University of Kansas, he established a center for studying the genre and wrote several books that recounted its history. Gunn’s motto is, “Let’s save the world through science fiction,” and he takes it seriously. Many of the Golden Age writers, he says, had a missionary impulse. By portraying interstellar spaceflight and strange aliens and powerful machines, they tried to steer us past the hazards of the mid-20th century and offer hope for a brighter future. During the 1940s Gunn found inspiration from what he calls “the great foursome” of Golden Age sci-fi: Asimov, Heinlein, Theodore Sturgeon and A.E. van Vogt. “They covered the whole spectrum of science fiction at the time,” Gunn says. “I learned from all of them.” The man who published all these authors and ushered in the Golden Age was John W. Campbell, who became editor of Astounding Science Fiction in 1937. (He also wrote Who Goes There?—the novella about the alien in Antarctica—which became the classic sci-fi film The Thing From Another World.) Campbell urged the magazine’s writers to move away from the silly Buck Rogers adventures that had previously dominated the genre and concentrate instead on the intelligent exploration of futuristic ideas. Several of Heinlein’s novels were serialized in Astounding, and Asimov’s stories about robots and galactic empires were later collected in I, Robot and the Foundation series. Gunn’s earliest stories were in the same vein; some of them focused on the challenge of communication between alien species, a theme he returned to in The Listener.
https://blogs.scientificamerican.com/observations/can-science-fiction-save-the-world/
Treatments for Controlling Phosphorus People with kidney disease can work with a renal dietitian and their doctor to keep their phosphorus level in balance. Regular blood tests will show if the phosphorus level in their blood is too high or too low. According to "Clinical Practice Guidelines for Bone Metabolism and Disease in Chronic Kidney Disease" by the National Kidney Foundation, patients with kidney disease in stages 3 and 4 should keep their phosphorus between 2.7 and 4.6 mg/dL. Dialysis patients should keep their phosphorus levels in the 3.0 to 5.5 mg/dL range. Here are seven methods to help control high levels of phosphorus: 1. Reduce the amount of phosphorus you eat People with kidney disease are urged to eat foods that are low in phosphorus, in order to help keep the level of phosphorus in your blood within a healthy range. 2. Take phosphorus binders One goal in treating people with end stage renal disease (ESRD) is to prevent phosphorus in the foods they eat from being absorbed into their bloodstream. To help with this, doctors prescribe medicines called phosphorus binders, which are taken with meals and snacks. Binders act as sponges that soak up phosphorus. Instead of going into the bloodstream, phosphorus stays in the stomach and then passes through the gastrointestinal system. A low-phosphorus diet is necessary for phosphorus binders to work well. 3. Take vitamin D Doctors may prescribe an active form of vitamin D, called calcitriol, to help balance calcium and phosphorus levels. Active vitamin D cannot be taken if calcium or phosphorus levels are too high because it will increase the risk of phosphorus deposits in soft tissues such as arteries, lungs, eyes and skin. 4. Take a calcimimetic medicine Calcimimetic medication seems to help keep bones healthier in people with kidney disease, lowering parathyroid hormones (PTH), calcium and possibly even phosphorus levels. It's still too early to know, but doctors hope this drug will help people with kidney disease have healthier bones and lower the risk of calcifications and heart problems. 5. Stay on dialysis the entire time Dialysis treatments remove some phosphorus from the blood. It’s important to stay on dialysis for the full treatment time to achieve optimal results. Between treatments, people on dialysis should be careful to limit how much phosphorus they eat. 6. Start an exercise program approved by a doctor Exercise can help increase physical strength and, in some cases, even strengthen bones. 7. Get an operation to remove some of the parathyroid glands In some cases, surgery to remove part of the parathyroid glands may be recommended to prevent long-term release of parathyroid hormones (PTH), leading to weakened bones and calcification of tissues and organs. Patients should let their doctor and dietitian know all of the medicines and supplements they are taking because some of these may contain phosphorus. All of these efforts can help keep phosphorus in a healthy range.
http://www.davita.com/diet-nutrition/articles/basics/treatments-for-controlling-phosphorus
Barrett sends World Cup message as Hurricanes beat Chiefs Hansen is looking at the makeup of his back three for the tournament in Japan after utility back Damian McKenzie ruptured a knee ligament and was ruled out for the rest of the year. WELLINGTON - Jordie Barrett reminded All Blacks coach Steve Hansen of his World Cup aspirations as he scored two early tries to help the Wellington Hurricanes beat the Waikato Chiefs 47-19 in Super Rugby on Saturday. Hansen is looking at the makeup of his back three for the tournament in Japan after utility back Damian McKenzie ruptured a knee ligament and was ruled out for the rest of the year. Barrett, who has played fullback and on the wing for the All Blacks, reminded Hansen of his own credentials in the number 15 jersey in his first appearance there for the Hurricanes since week two. He finished the game in the midfield, where he has played twice this season. Kane Leaupepe, TJ Perenara, Wes Goosen, Ardie Savea and debutant Salesi Rayasi also crossed for the home side, who moved to 32 points and consolidated their hold on second place in the New Zealand conference behind the Canterbury Crusaders (39). Luke Jacobson, Ataata Moeakiola and Lachlan Boshier all scored tries for the Chiefs, who had given the Hurricanes a 21-0 lead after 17 minutes before they managed to fight back and keep it tight until early in the second half. The Chiefs, who appeared totally dysfunctional in the first quarter as Barrett (twice) and Leaupepe crossed, were rewarded with both Jacobson and Moeakiola crashing over from in close following sustained pressure and looking to have fought their way back into the game. Poor defending again, however, allowed the Hurricanes to run at them and into space with Perenara twisting in the tackle to plant the ball after he had appeared to have been held up to give the Hurricanes a 28-12 lead at halftime. Boshier gave the Chiefs the perfect riposte early in the second half to reduce the gap but that was really the last shot the visitors fired as the Hurricanes again proved resilient at soaking up pressure and striking when they needed to. Goosen extended the lead when he outpaced two defenders on the outside before Savea scored the try of the match when he affected a turnover deep in his own territory and Perenara sprinted clear, fed Jordie Barrett, who then found the openside flanker to finish off the movement he started 80 metres away. Winger Rayasi finished off the scoring with his second touch of the ball in his first game. More in Sport - Spurs' Son set for chemical warfare training in South Korea - Premier League stars will 'play part', says union chief - Italy, Catalonia MotoGPs postponed over coronavirus - Japan ends Olympic flame display due to virus - Brad Binder: Not racing has been tough - Australian cricketers 'sucked up' to Kohli to save IPL deals: Clarke Comments EWN welcomes all comments that are constructive, contribute to discussions in a meaningful manner and take stories forward. However, we will NOT condone the following: - Racism (including offensive comments based on ethnicity and nationality) - Sexism - Homophobia - Religious intolerance - Cyber bullying - Hate speech - Derogatory language - Comments inciting violence. We ask that your comments remain relevant to the articles they appear on and do not include general banter or conversation as this dilutes the effectiveness of the comments section. We strive to make the EWN community a safe and welcoming space for all. EWN reserves the right to: 1) remove any comments that do not follow the above guidelines; and, 2) ban users who repeatedly infringe the rules. Should you find any comments upsetting or offensive you can also flag them and we will assess it against our guidelines. EWN is constantly reviewing its comments policy in order to create an environment conducive to constructive conversations.
https://ewn.co.za/2019/04/27/barrett-sends-world-cup-message-as-hurricanes-beat-chiefs
BACKGROUND SUMMARY Term Definitions DETAILED DISCLOSURE Software applications and systems have become indispensable tools for helping consumers/users, i.e., users of the software applications, perform a wide variety of tasks in their daily professional and personal lives. Currently, numerous types of desktop, web-based, and cloud-based software systems are available to help users perform a plethora of tasks ranging from basic computing system operations and word processing, to financial management, small business management, tax preparation, health tracking and healthcare management, as well as other personal and business endeavors, operations, and functions far too numerous to individually delineate here. More recently there has been an increasing interest in workflow applications as a way of supporting complex processes in modern business and mobile environments. Given the nature of the environment and the technology involved, workflow applications are inherently distributed and pose many challenges to system designers. In most cases, a client/server architecture is used in which knowledge about the processes being executed is centralized in one node to facilitate monitoring, auditing, and to simplify synchronization. One complicated, unresolved, and long standing technical problem associated with the workflow application environment is that customers, i.e., software application users often find themselves stuck, i.e., blocked from making progress with their workflows, due to system, setup, and data synchronization issues, referred to herein as access and/or critical issues, such as billing, entitlements, permissions, synchronization failures, system bugs, etc. This inevitably results in negative user experiences, customer frustration, and time and productivity loss. This, in turn, leads to loss of business for the software application provider and loss of productivity for the user of the software application. Clearly this is not an ideal situation. What is needed is a method and system for unblocking customers/users of a software application, in the interim, without the need for applying a data fix or releasing a patch or new application version, until a long-term solution can be formulated and implemented. Embodiments of the present disclosure provide a technical solution to the long standing technical problem in the workflow application environment of users of a software application getting stuck and blocked from making progress with their workflows due to access and/critical issues such as system, setup, permissions, and data synchronization issues, without applying a data fix or releasing a patch or new application version, until a long-term solution can be formulated and implemented. In accordance with one embodiment, error occurrence/recurrence rates associated with critical issue reports from multiple users of a software system are monitored. In one embodiment, log error data and context data associated with the critical issue is provided to a server side repository. In one embodiment, when it is detected that a threshold number of users of a software application are facing a given critical issue, such as blocking of data access in a defined context, i.e., a threshold recurrence of the same log error data and context data is detected, a community portal is updated with a facility for users to post their solutions, i.e., workarounds, and/or observations, and/or comments, associated with the specific critical issue/error. In one embodiment, the posted solutions are rated and/or monitored, and if the rating(s) for a given solution are above a threshold rating value, then data representing the solution, and/or implementing the solution, is pushed to users who continue to encounter the same critical issue, in one embodiment, using an action message framework, until a permanent fix is applied. In accordance with one embodiment, a software application is provided to one or more users using one or more computing systems. In one embodiment, a message based action system associated with the software application is provided for providing action messages through the software application to user computing systems implementing at least part of the software application. In one embodiment, a community portal for the software application is provided through which recurring error solution data representing solutions to recurring errors encountered by users of the software application is obtained and/or posted. In one embodiment, threshold error occurrence rate data is generated representing a threshold error occurrence rate such that if an error occurs more than the threshold error occurrence rate, the error is designated a recurring error. In one embodiment, the community portal for the software application is then updated to allow recurring error solution data representing solutions to the recurring error to be obtained and/or posted. In one embodiment, a recurring error solutions ratings system is provided through which the recurring error solution data representing solutions to recurring errors obtained and/or posted in the community portal for the software application are rated and associated recurring error solution ratings data is generated. In one embodiment, the threshold recurring error solution ratings data is generated representing a defined threshold recurring error solution rating such that if recurring error solution data representing a solution to a recurring error obtained and/or posted in the community portal for the software application has associated recurring error solution ratings data representing a recurring error solution rating for the recurring error solution data greater than the threshold recurring error solution rating represented by the threshold recurring error solution ratings data, the recurring error solution data is designated well rated recurring error solution data representing a well rated solution to the recurring error. In one embodiment, all well rated recurring error solution data is categorized according to log error data and context data associated with the recurring error that is the subject of the well rated recurring error solution data. In one embodiment, categorized well rated recurring error solution data is thereby generated. In one embodiment, the categorized well rated recurring error solution data is stored. In one embodiment, when a user encounters an access blockage or other critical issue, user critical issue report data is received from the user, and/or a user computing system implementing the software application, indicating the user has encountered an access issue or other critical issue. In one embodiment, user log error data and user context data associated with the user critical issue is obtained and logged from the user computing system associated with the user of the software application. In one embodiment, the user log error data and user context data is provided to a log error data and context data tracking database. In one embodiment, the obtained user log error data and user context data is analyzed to determine if the obtained user log error data and user context data matches the error data and context data associated with any of the categorized well rated recurring error solution data representing well rated solutions to recurring errors. In one embodiment, if the obtained user log error data and user context data is determined to match the error data and context data associated with a given well rated solution to the recurring error, represented by a relevant portion of the categorized well rated recurring error solution data, an action message is generated and transmitted to the user computing system through the message based action system associated with the software application. In one embodiment, the action message provides the user access to the relevant portion of the categorized well rated recurring error solution data representing the solution to the matched user log error data and user context data of the user critical issue report data. In one embodiment, the well rated recurring error solution matching the user log error data and user context data of the user critical issue report data is then implemented on the user computing system using the transmitted relevant portion of the categorized well rated recurring error solution data, through the software application itself. In one embodiment, if the obtained user log error data and user context data is determined not to match the error data and context data associated with any well rated solution to the recurring error of the categorized well rated recurring error solution data, an error solution and matching service is used to dynamically generate new recurring error solution data representing a solution to the error indicated in the obtained user log error data and user context data associated with the user critical issue report data. In one embodiment, an action message is then transmitted to the user computing system through the message based action system associated with the software application providing the user access to the new recurring error solution data representing a solution to the error indicated in the obtained user log error data and user context data associated with the user critical issue report data. In one embodiment, the new recurring error solution data representing a solution to the error indicated in the obtained user log error data and user context data associated with the user critical issue report data is then implemented on the user computing system. In one embodiment, the new recurring error solution data representing a solution to the error indicated in the obtained user log error data and user context data associated with the user critical issue report data is then classified according to the user log error data and user context data associated with the user critical issue report data to generate categorized new recurring error solution data. In one embodiment, the categorized new recurring error solution data is then stored for further use when other users encounter the error indicated in the obtained user log error data and user context data associated with the user critical issue report data. The disclosed method and system for dynamically unblocking customers in critical workflows by pushing community contributed solutions just-in-time when an error is encountered provides the ability to message a specific user, or group of users, based on specific condition(s) checks. In addition, the disclosed method and system for dynamically unblocking customers in critical workflows by pushing community contributed solutions just-in-time when an error is encountered provides the ability to trigger upgrade flow when a specific condition is met. The disclosed method and system for dynamically unblocking customers in critical workflows by pushing community contributed solutions just-in-time when an error is encountered provides the ability to send messages through notifications/action messages to trigger actions based on a condition. In addition, the disclosed method and system for dynamically unblocking customers in critical workflows by pushing community contributed solutions just-in-time when an error is encountered provides the ability to detect a specific error scenario and request the user to send the error log data and/or context data, or automatically obtain the error log data and/or context data, to help in the investigation of the error/critical issue. The disclosed method and system for dynamically unblocking customers in critical workflows by pushing community contributed solutions just-in-time when an error is encountered provides the ability to turn on enhanced logging for a specific customer, normally after user permission is obtained, to debug a critical issue/error. In addition, the disclosed method and system for dynamically unblocking customers in critical workflows by pushing community contributed solutions just-in-time when an error is encountered provides the ability to turn on enhanced logging for a specific set, class, or group of users, with the user's permission, to debug an issue. In addition, the disclosed method and system for dynamically unblocking customers in critical workflows by pushing community contributed solutions just-in-time when an error is encountered provides for a generic expression evaluator that can unblock customers and open up possibilities to dynamically control errors/software application behavior without a need for a code change. The disclosed method and system for dynamically unblocking customers in critical workflows by pushing community contributed solutions just-in-time when an error is encountered provides for unblocking customers/users of a software application without the need for applying a data fix or releasing a patch or a new application version until a long-term solution can be formulated and implemented. Therefore the disclosed method and system for dynamically unblocking customers in critical workflows by pushing community contributed solutions just-in-time when an error is encountered solves the long standing technical problem in the workflow application environment of users of a software application getting stuck and blocked from making progress with their workflows due to system, setup, data synchronization issues, and/or other critical issues, all without applying a data fix or releasing a patch or new application version. The disclosed method and system for dynamically unblocking customers in critical workflows by pushing community contributed solutions just-in-time when an error is encountered does not encompass, embody, or preclude other forms of innovation in the area of workflow applications. In addition, the disclosed method and system for dynamically unblocking customers in critical workflows by pushing community contributed solutions just-in-time when an error is encountered is not related to fundamental economic practice, data processing practice, mental steps, or pen and paper based solutions, and is in fact directed to providing solutions to the relatively new problems associated with distributed workflow applications. Consequently, the disclosed method and system for dynamically unblocking customers in critical workflows by pushing community contributed solutions just-in-time when an error is encountered is not directed to, does not encompass, and is not merely, an abstract idea or concept. In addition, the disclosed method and system for dynamically unblocking customers in critical workflows by pushing community contributed solutions just-in-time when an error is encountered provides for significant improvements to the technical fields of customer support, information dissemination, software implementation, user experience, data processing, data management, distributed workflow applications, client server applications, and real time application fixes. In addition the disclosed method and system for dynamically unblocking customers in critical workflows by pushing community contributed solutions just-in-time when an error is encountered provides for the processing of only relevant portions of data and data analysis before the data is further analyzed, processed, and/or transmitted/distributed. Consequently, using the disclosed method and system for dynamically unblocking customers in critical workflows by pushing community contributed solutions just-in-time when an error is encountered results in more efficient use of human and non-human resources, fewer processor cycles being utilized, reduced memory utilization, and less communications bandwidth being utilized to relay data to and from backend systems and client systems. As a result, computing systems are transformed into faster, more efficient, and more effective computing systems by implementing the method and system for dynamically unblocking customers in critical workflows by pushing community contributed solutions just-in-time when an error is encountered. Common reference numerals are used throughout the FIG.s and the detailed description to indicate like elements. One skilled in the art will readily recognize that the above FIG.s are examples and that other architectures, modes of operation, orders of operation, and elements/functions can be provided and implemented without departing from the characteristics and features of the invention, as set forth in the claims. Herein, the terms “software system” and “software application” are used interchangeably and can be, but are not limited to, any data management system implemented on a computing system, accessed through one or more servers, accessed through a network, accessed through a cloud, and/or provided through any system or by any means, as discussed herein, and/or as known in the art at the time of filing, and/or as developed after the time of filing, that gathers/obtains data, from one or more sources and/or has the capability to analyze at least part of the data. As used herein, the terms “software system” and “software application” include, but are not limited to the following: computing system implemented, and/or online, and/or web-based, personal and/or business tax preparation systems, services, packages, programs, modules, or applications; computing system implemented, and/or online, and/or web-based, personal and/or business financial management systems, services, packages, programs, modules, or applications; computing system implemented, and/or online, and/or web-based, personal and/or business management systems, services, packages, programs, modules, or applications; computing system implemented, and/or online, and/or web-based, personal and/or business accounting and/or invoicing systems, services, packages, programs, modules, or applications; and various other personal and/or business electronic data management systems, services, packages, programs, modules, or applications, whether known at the time of filling or as developed later. Specific examples of “software systems” and “software applications” include, but are not limited to the following: TurboTax™ available from Intuit, Inc. of Mountain View, Calif.; TurboTax Online™ available from Intuit, Inc. of Mountain View, Calif.; Quicken™, available from Intuit, Inc. of Mountain View, Calif.; Quicken Online™ available from Intuit, Inc. of Mountain View, Calif.; QuickBooks™, available from Intuit, Inc. of Mountain View, Calif.; QuickBooks Online™, available from Intuit, Inc. of Mountain View, Calif.; Mint™, available from Intuit, Inc. of Mountain View, Calif.; Mint Online™, available from Intuit, Inc. of Mountain View, Calif.; and/or various other software systems discussed herein, and/or known to those of skill in the art at the time of filing, and/or as developed after the time of filing. As used herein, the terms “computing system,” “computing device,” and “computing entity,” include, but are not limited to, the following: a server computing system; a workstation; a desktop computing system; a mobile computing system, including, but not limited to, smart phones, portable devices, and/or devices worn or carried by a user; a database system or storage cluster; a virtual asset; a switching system; a router; any hardware system; any communications system; any form of proxy system; a gateway system; a firewall system; a load balancing system; or any device, subsystem, or mechanism that includes components that can execute all, or part, of any one of the processes and/or operations as described herein. In addition, as used herein, the terms “computing system” and “computing entity,” can denote, but are not limited to the following: systems made up of multiple virtual assets, server computing systems, workstations, desktop computing systems, mobile computing systems, database systems or storage clusters, switching systems, routers, hardware systems, communications systems, proxy systems, gateway systems, firewall systems, load balancing systems, or any devices that can be used to perform the processes and/or operations as described herein. Herein, the terms “mobile computing system” and “mobile device” are used interchangeably and include, but are not limited to the following: a smart phone; a cellular phone; a digital wireless telephone; a tablet computing system; a notebook computing system; any portable computing system; a two-way pager; a Personal Digital Assistant (PDA); a media player; an Internet appliance; devices worn or carried by a user; or any other movable/mobile device and/or computing system that includes components that can execute all, or part, of any one of the processes and/or operations as described herein. Herein, the term “production environment” includes the various components, or assets, used to deploy, implement, access, and use, a given software system as that software system is intended to be used. In various embodiments, production environments include multiple computing systems and/or assets that are combined, communicatively coupled, virtually and/or physically connected, and/or associated with one another, to provide the production environment implementing the application. As specific illustrative examples, the assets making up a given production environment can include, but are not limited to, the following: one or more computing environments used to implement at least part of the software system in the production environment such as a data center, a cloud computing environment, a dedicated hosting environment, and/or one or more other computing environments in which one or more assets used by the application in the production environment are implemented; one or more computing systems or computing entities used to implement at least part of the software system in the production environment; one or more virtual assets used to implement at least part of the software system in the production environment; one or more supervisory or control systems, such as hypervisors, or other monitoring and management systems used to monitor and control assets and/or components of the production environment; one or more communications channels for sending and receiving data used to implement at least part of the software system in the production environment; one or more access control systems for limiting access to various components of the production environment, such as firewalls and gateways; one or more traffic and/or routing systems used to direct, control, and/or buffer data traffic to components of the production environment, such as routers and switches; one or more communications endpoint proxy systems used to buffer, process, and/or direct data traffic, such as load balancers or buffers; one or more secure communication protocols and/or endpoints used to encrypt/decrypt data, such as Secure Sockets Layer (SSL) protocols, used to implement at least part of the software system in the production environment; one or more databases used to store data in the production environment; one or more internal or external services used to implement at least part of the software system in the production environment; one or more backend systems, such as backend servers or other hardware used to process data and implement at least part of the software system in the production environment; one or more software modules/functions used to implement at least part of the software system in the production environment; and/or any other assets/components making up an actual production environment in which at least part of the software system is deployed, implemented, accessed, and run, e.g., operated, as discussed herein, and/or as known in the art at the time of filing, and/or as developed after the time of filing. As used herein, the term “computing environment” includes, but is not limited to, a logical or physical grouping of connected or networked computing systems and/or virtual assets using the same infrastructure and systems such as, but not limited to, hardware systems, software systems, and networking/communications systems. Typically, computing environments are either known, “trusted” environments or unknown, “untrusted” environments. Typically, trusted computing environments are those where the assets, infrastructure, communication and networking systems, and security systems associated with the computing systems and/or virtual assets making up the trusted computing environment, are either under the control of, or known to, a party. In various embodiments, each computing environment includes allocated assets and virtual assets associated with, and controlled or used to create, and/or deploy, and/or operate at least part of the software system. In various embodiments, one or more cloud computing environments are used to create, and/or deploy, and/or operate at least part of the software system that can be any form of cloud computing environment, such as, but not limited to, a public cloud; a private cloud; a virtual private network (VPN); a subnet; a Virtual Private Cloud (VPC); a sub-net or any security/communications grouping; or any other cloud-based infrastructure, sub-structure, or architecture, as discussed herein, and/or as known in the art at the time of filing, and/or as developed after the time of filing. In many cases, a given software system or service may utilize, and interface with, multiple cloud computing environments, such as multiple VPCs, in the course of being created, and/or deployed, and/or operated. As used herein, the term “virtual asset” includes any virtualized entity or resource, and/or virtualized part of an actual, or “bare metal” entity. In various embodiments, the virtual assets can be, but are not limited to, the following: virtual machines, virtual servers, and instances implemented in a cloud computing environment; databases associated with a cloud computing environment, and/or implemented in a cloud computing environment; services associated with, and/or delivered through, a cloud computing environment; communications systems used with, part of, or provided through a cloud computing environment; and/or any other virtualized assets and/or sub-systems of “bare metal” physical devices such as mobile devices, remote sensors, laptops, desktops, point-of-sale devices, etc., located within a data center, within a cloud computing environment, and/or any other physical or logical location, as discussed herein, and/or as known/available in the art at the time of filing, and/or as developed/made available after the time of filing. In various embodiments, any, or all, of the assets making up a given production environment discussed herein, and/or as known in the art at the time of filing, and/or as developed after the time of filing can be implemented as one or more virtual assets. In one embodiment, two or more assets, such as computing systems and/or virtual assets, and/or two or more computing environments are connected by one or more communications channels including but not limited to, Secure Sockets Layer (SSL) communications channels and various other secure communications channels, and/or distributed computing system networks, such as, but not limited to the following: a public cloud; a private cloud; a virtual private network (VPN); a subnet; any general network, communications network, or general network/communications network system; a combination of different network types; a public network; a private network; a satellite network; a cable network; or any other network capable of allowing communication between two or more assets, computing systems, and/or virtual assets, as discussed herein, and/or available or known at the time of filing, and/or as developed after the time of filing. As used herein, the term “network” includes, but is not limited to, any network or network system such as, but not limited to, the following: a peer-to-peer network; a hybrid peer-to-peer network; a Local Area Network (LAN); a Wide Area Network (WAN); a public network, such as the Internet; a private network; a cellular network; any general network, communications network, or general network/communications network system; a wireless network; a wired network; a wireless and wired combination network; a satellite network; a cable network; any combination of different network types; or any other system capable of allowing communication between two or more assets, virtual assets, and/or computing systems, whether available or known at the time of filing or as later developed. As used herein, the term “user experience” includes not only the data entry and question submission process, but also other user experience features provided or displayed to the user such as, but not limited to the following: interfaces; images; backgrounds; avatars; highlighting mechanisms; icons; and any other features that individually, or in combination, create a user experience, as discussed herein, and/or as known in the art at the time of filing, and/or as developed after the time of filing. Herein, the term “party,” “user,” “user consumer,” and “customer” are used interchangeably to denote any party and/or entity that interfaces with, and/or to whom information is provided by, the method and system for dynamically unblocking customers in critical workflows by pushing community contributed solutions just-in-time when an error is encountered described herein, and/or a person and/or entity that interfaces with, and/or to whom information is provided by, the method and system for dynamically unblocking customers in critical workflows by pushing community contributed solutions just-in-time when an error is encountered described herein, and/or a legal guardian of person and/or entity that interfaces with, and/or to whom information is provided by, the method and system for dynamically unblocking customers in critical workflows by pushing community contributed solutions just-in-time when an error is encountered described herein, and/or an authorized agent of any party and/or person and/or entity that interfaces with, and/or to whom information is provided by, the method and system for dynamically unblocking customers in critical workflows by pushing community contributed solutions just-in-time when an error is encountered described herein. For instance, in various embodiments, a user can be, but is not limited to, a person, a commercial entity, an application, a service, and/or a computing system. As used herein, the term “action message” includes messages used to send customized notification payloads that cause specific operations or actions to occur when a notification is received or activated and that logically, and operationally, connect what a software application running on user computing systems does, and what operations it performs on user computing systems, with what the application provider/application server sends through the action message. As used herein, the term “action message system” includes an action message framework that represents and creates a cooperation between a software application user's computing system and the action messages sent to it through the software application. Consequently, as used herein, the terms “action message system” and “action message framework” do not necessarily mean a mobile or server-side technology on its own, but again rather a cooperation between the user device and the action messages sent to it. Embodiments will now be discussed with reference to the accompanying FIG.s, which depict one or more exemplary embodiments. Embodiments may be implemented in many different forms and should not be construed as limited to the embodiments set forth herein, shown in the FIG.s, and/or described below. Rather, these exemplary embodiments are provided to allow a complete disclosure that conveys the principles of the invention, as set forth in the claims, to those of skill in the art. Embodiments of the present disclosure provide a technical solution to the long standing technical problem in the workflow application environment of users of a software application getting stuck and blocked from making progress with their workflows due to system setup, data synchronization, or other critical issues, without applying a data fix or releasing a patch or new application version, until a long-term solution can be formulated and implemented. According to one embodiment, a loosely coupled message based action framework is provided using the method and system for dynamically unblocking customers in critical workflows by pushing community contributed solutions just-in-time when an error is encountered that allows the developers and product managers to dynamically control the software application behavior based on the action messages and message actions defined on the server and these message actions can be targeted to a specific user or a set of users based on the criteria defined on the server. Consequently, using embodiments of the method and system for dynamically unblocking customers in critical workflows by pushing community contributed solutions just-in-time when an error is encountered discussed herein, all critical issues, such as access and blocking issues, can potentially have a workaround automatically provided just in time when the critical issue notification is received through user and community contributed solutions. In accordance with one embodiment, error occurrence/recurrence rates associated with critical issue reports from multiple users of a software system are monitored. In one embodiment, log error data and context data associated with the critical issue is provided to a server side repository. In one embodiment, when it is detected that a threshold number of users of a software application are facing a given critical issue, such as blocking of data access in a defined context, i.e., a threshold recurrence of the same log error data and context data is detected, a community portal is updated with a facility for users to post their solutions, i.e., workarounds, and/or observations, and/or comments, associated with the specific critical issue/error. In one embodiment, the posted solutions are rated and/or monitored, and if the rating(s) for a given solution are above a threshold rating value, then, in one embodiment, if the obtained user log error data and user context data is determined to match the error data and context data associated with a posted solution having a rating above threshold rating value, data representing the solution, and/or implementing the solution, is pushed to users who continue to encounter the same critical issue, in one embodiment, using an action message framework, until a permanent fix is applied. In one embodiment, if the obtained user log error data and user context data is determined not to match the error data and context data associated with any well rated solution, an error solution and matching service is used to dynamically generate new recurring error solution data representing a solution to the error indicated in the obtained user log error data and user context data associated with the user critical issue report data. In one embodiment, an action message is then transmitted to the user computing system through the message based action system associated with the software application providing the user access to the new recurring error solution data representing a solution to the error indicated in the obtained user log error data and user context data associated with the user critical issue report data. In one embodiment, the new recurring error solution data representing a solution to the error indicated in the obtained user log error data and user context data associated with the user critical issue report data is then classified according to the user log error data and user context data associated with the user critical issue report data to generate categorized new recurring error solution data. In one embodiment, the categorized new recurring error solution data is then stored for further use when other users encounter the error indicated in the obtained user log error data and user context data associated with the user critical issue report data. In one embodiment, the community contributed solutions are automatically applied for other errors taking into account implicit user contribution, i.e., by tracking the steps that the user has taken after they encounter the issue and checking if the user workflow was successful or not, and explicit user contribution, i.e., based on the user feedback entered in the community portal. In one embodiment a software application is provided. As noted above, herein, the term software application includes, but is not limited to the following: computing system implemented, and/or online, and/or web-based, personal and/or business tax preparation systems, services, packages, programs, modules, or applications; computing system implemented, and/or online, and/or web-based, personal and/or business financial management systems, services, packages, programs, modules, or applications; computing system implemented, and/or online, and/or web-based, personal and/or business management systems, services, packages, programs, modules, or applications; computing system implemented, and/or online, and/or web-based, personal and/or business accounting and/or invoicing systems, services, packages, programs, modules, or applications; and various other personal and/or business electronic data management systems, services, packages, programs, modules, or applications, whether known at the time of filling or as developed later. Specific examples of software applications include, but are not limited to the following: TurboTax™ available from Intuit, Inc. of Mountain View, Calif.; TurboTax Online™ available from Intuit, Inc. of Mountain View, Calif.; Quicken™, available from Intuit, Inc. of Mountain View, Calif.; Quicken Online™, available from Intuit, Inc. of Mountain View, Calif.; QuickBooks™, available from Intuit, Inc. of Mountain View, Calif.; QuickBooks Online™, available from Intuit, Inc. of Mountain View, Calif.; Mint™, available from Intuit, Inc. of Mountain View, Calif.; Mint Online™, available from Intuit, Inc. of Mountain View, Calif.; and/or various other software applications discussed herein, and/or known to those of skill in the art at the time of filing, and/or as developed after the time of filing. In one embodiment, a message based action system associated with the software application is provided using one or more computing systems. As noted above, in one embodiment, the provided message based action system is a loosely coupled message based action framework for dynamically unblocking customers in critical workflows by pushing community contributed solutions just-in-time when an error is encountered that allows the developers and product managers to dynamically control the software application behavior based on the action messages and message actions defined on the server and these message actions can be targeted to a specific user or a set of users based on the criteria defined on the server. As noted above, as used herein, the term “action message” includes messages used to send customized notification payloads that cause specific operations or actions to occur when a notification is received or activated and that logically, and operationally, connect what the provided software application running on user computing systems does, and what operations it performs on user computing systems, with what the software application provider/software application server sends through the action message. As also noted above, as used herein, the term “action message system” includes an action message framework that represents and creates a cooperation between the provided software application user's computing system and the action messages sent to the provided software application user's computing system through the software application itself. Consequently, as used herein, the terms “action message system” and “action message framework” do not necessarily mean a mobile or server-side technology on its own, but rather a cooperation between the provided software application user's computing system and the action messages sent to it. Consequently, using an “action message system” the provided software application user's computing system needs to know how to perform tasks indicated in an action message by name, with optional arguments, in certain distinct situations, with an optional result value. To this end, in one embodiment, each message action of an action message includes at least the following attributes: condition for the action; context; and action. In one embodiment, the condition for the action attribute supports logical expression with the ability to use any exposed variables in the software application such as, but not limited to, companyId, userId, version code, etc., global and context based. In addition, in one embodiment, a variable called “now” that represents the time in milliseconds from Jan. 1, 1970 midnight GMT is also available. In one embodiment, the context attribute defines the context or placement when/where the message actions will be executed in the software application, such as, but not limited to, when the software application starts, when an error occurs, or during upgrade flow, etc. In one illustrative embodiment, the available contexts include, but are not limited to, an appstart context, e.g., called very early on in the software application initialization. In one illustrative embodiment, the available contexts include, but are not limited to, a syncparseerror context, e.g., called when an entity parsing error happens during synchronization. In one embodiment, the syncparseerror context variables available to use include, but are not limited to: syncerrorcode, an error code representing the specific entity parse error; and syncerrorentity, an entity name that has the parse error. In one illustrative embodiment, the available contexts include, but are not limited to, a syncerror context, e.g., called when a batch request contains a fault item. In one embodiment, this is executed for each fault response item. In one embodiment, syncerror context variables available to use include, but are not limited to: syncerrorcode, the error code from server; and syncerrormessage, the error message from server. In one illustrative embodiment, the available contexts include, but are not limited to, an activitystart context, e.g., called once for each activity start. As an illustrative example, activity in an Android™ environment corresponds to a new screen/page. In one embodiment, the activitystart context variables available to use include, but are not limited to, activityname, the name of the activity. In one illustrative embodiment, the available contexts include, but are not limited to, a synccomplete context, e.g., called once the foreground synchronization is completed. In one illustrative embodiment, the available contexts include, but are not limited to, a homepage context, e.g., called whenever the homepage is shown. In one illustrative embodiment, the available contexts include, but are not limited to, a new version context, e.g., called the first time a new version is launched. In one illustrative embodiment, the available contexts include, but are not limited to, an afterupgrade context, e.g., called the first time after an upgraded software application is launched. In one illustrative embodiment, the available contexts include, but are not limited to, a logerror context, e.g., called when errors are logged. In one embodiment, logerror context variables available to use include, but are not limited to, logmessage, a message that is logged. In one illustrative embodiment, the available contexts include, but are not limited to, a loginfo context, e.g., called when information is logged. In one embodiment, loginfo context variables available to use include, but are not limited to, logmessage, a message that is logged. Although specific illustrative examples of contexts are discussed above, those of skill in the art will recognize that different, more, or less, contexts can be defined and implemented using different, similar, or the same nomenclature/symbols and functionality. Consequently, the specific context examples discussed herein are presented as illustrative examples only and do not limit the scope of the claims presented below. In one embodiment, the actions are predefined actions available in the software application. In one embodiment, actions are identified by name and are registered with the action message system/framework. In one embodiment, action messages are delivered to the software application user's computing system, i.e., the client, through software application settings. In one embodiment, the key is actionmessages.expr. In one embodiment, each available action includes; 1. A name data field indicating the defined name of the action; 2. A one-time message (otm) data field indicating if the action is executed only once; and 3. An action JSON field indicating any action specific JSON as a string. As an illustrative example of one embodiment, the actions supported include, but are not limited to, an alert action, e.g., an action that shows an alert dialog with ok and cancel buttons. In one embodiment, the following attributes of the alert can be customized: a. title—the title for the dialog; b. message—the message for the dialog; c. okCaption—an ok button caption; d. cancelCaption—a cancel button caption; e. okAction—the definition of the action that needs to be executed when the user clicks the ok button; and f. cancelAction—the definition of the action that needs to be executed when the user clicks the cancel button. As an illustrative example of one embodiment, the actions supported include, but are not limited to, a fullsync action that triggers a full data synchronization. As an illustrative example of one embodiment, the actions supported include, but are not limited to, a skipsyncerror action that skips a synchronization (sync) error. In one embodiment, the skipsyncerror action is used for parsing errors. As an illustrative example of one embodiment, the actions supported include, but are not limited to, an alogsyncerror action that logs sync error details including logging JSON response data. As an illustrative example of one embodiment, the actions supported include, but are not limited to, a goforupgrade action that takes the user to the software application upgrade flow. As an illustrative example of one embodiment, the actions supported include, but are not limited to, a dynamic action that dynamically adds an action message to execute at a later time or event. Although specific illustrative examples of actions are discussed above, those of skill in the art will recognize that different, more, or less, actions can be defined and implemented using different, similar, or the same nomenclature/symbols and functionality. Consequently, the specific action examples discussed herein are presented as illustrative examples only and do not limit the scope of the claims presented below. Continuing with the specific illustrative example above, one illustrative action message format could be [{context:“AAA”,condition:“BBB”,actions:[{name:“CCC”, otm: True or False, actionJson:NULL or DDD}]}] where: AAA represents the context data; BBB represents the condition data; CCC represents the action; True or False represents True or False; Null represents the null set, or none; and DDD represents the JSON. As an even more specific illustrative example of one embodiment, a sample message action could be: [{context:“syncerror”, condition:“syncerrorcode=2019”, actions:[{name:“skipsyncerror”, otm: true, actionJson: null}]}]. This sample message action indicates that its context is “syncerror” meaning it can happen when application synchronization has failed. This sample message action indicates that its condition is“syncerrorcode=2019” meaning the entity having code 2019 has failed to synchronize. Note: the condition is always a logical expression. This sample message action indicates the action “skipsyncerror” meaning there is some code associated with the action “skipsyncerror” which lets the user skip this error and get unblocked. This sample message action indicates the otm field is true, i.e., the action is performed only once. This sample message action indicates the action JSON field is null, meaning there is no action JSON. Although specific illustrative examples of action messages are discussed above, those of skill in the art will recognize that different action message/message action formats can be defined and implemented using different, similar, or the same nomenclature/symbols and functionality. Consequently, the specific action message/message action format examples discussed herein are presented as illustrative examples only and do not limit the scope of the claims presented below. In one embodiment, a community portal for the software application is provided using one or more computing systems. In one embodiment, through the community portal, recurring error solution data representing solutions to recurring errors encountered by users of the software application is obtained and/or posted. In one embodiment, the solutions to recurring errors encountered by users of the software application are obtained from a solution service and/or developers and technicians associated with the software application provider. In one embodiment, the solutions to recurring errors encountered by users of the software application are obtained from the software application users themselves. In one embodiment, the solutions to recurring errors encountered by users of the software application are obtained from the software application users themselves through implicit user contribution, i.e., by tracking the steps that the user has taken after they encounter the issue and checking if the user workflow was successful or not. In one embodiment, the solutions to recurring errors encountered by users of the software application are obtained from the software application users themselves through explicit user contribution, i.e., based on user feedback. In one embodiment, a threshold error occurrence rate is defined and threshold error occurrence rate data is generated representing the defined threshold error occurrence rate. In one embodiment, the threshold error occurrence rate is defined such that if an error occurs more than the threshold error occurrence rate, the error is designated a recurring error and the community portal for the software application is updated to allow recurring error solution data representing solutions to the recurring error to be obtained and/or posted. In one embodiment, a recurring error solutions ratings system is provided using one or more computing systems. In one embodiment, through the recurring error solutions ratings system, the recurring error solution data representing solutions to recurring errors obtained and/or posted in the community portal for the software application are rated and associated recurring error solution ratings data is generated. In one embodiment, the recurring error solution data representing solutions to recurring errors obtained and/or posted in the community portal for the software application are rated and associated recurring error solution ratings data is generated based on reviews submitted by the software system users. In one embodiment, the recurring error solution data representing solutions to recurring errors obtained and/or posted in the community portal for the software application are rated and associated recurring error solution ratings data is generated based on the monitored and logged success rates of solutions to recurring errors implemented on user computing systems. In one embodiment, the success rates of solutions to recurring errors implemented on user computing systems is monitored and logged through implicit user contribution, i.e., by tracking the steps that the user has taken after they encounter the issue and checking if the user workflow was successful or not. In one embodiment, the success rates of solutions to recurring errors implemented on user computing systems is monitored and logged through explicit user contribution, i.e., based on user feedback. In one embodiment, a threshold recurring error solution rating is defined and threshold recurring error solution rating data representing the defined threshold recurring error solution rating is generated. In one embodiment, the threshold recurring error solution rating is defined such that if recurring error solution data representing a solution to a recurring error obtained and/or posted in the community portal for the software application has associated recurring error solution ratings data representing a recurring error solution rating for the recurring error solution data greater than the threshold recurring error solution rating represented by the threshold recurring error solution ratings data, the recurring error solution data is designated well rated recurring error solution data representing a well rated solution to the recurring error. In one embodiment, all well rated recurring error solution data is categorized according to error data and context data associated with the recurring error that is the subject of the well rated recurring error solution data to generate categorized well rated recurring error solution data. In one embodiment, the categorized well rated recurring error solution data is stored. In one embodiment, a user of the software application encounters an access blockage or other critical issue. In one embodiment, user critical issue report data is received from a user of the software application, and/or a user computing system associated with the user of the software application, indicating the user has encountered the access issue or other critical issue. In one embodiment, user log error data and user context data associated with the user critical issue is obtained and logged from a user computing system associated with the user of the software application. In one embodiment, the user log error data and user context data associated with the user critical issue is obtained using an error logging portal service that captures the user log error data and user context data. In one embodiment, the user log error data and user context data associated with the user critical issue is obtained and logged from a user computing system associated with the user of the software application via implicit user contribution, i.e., by tracking the steps that the user has taken after they encounter the issue and checking if the user workflow was successful or not. In one embodiment, the user log error data and user context data associated with the user critical issue is obtained and logged from a user computing system associated with the user of the software application via explicit user contribution, i.e., based on the user feedback. In one embodiment, the obtained user log error data and user context data is stored. In one embodiment, the obtained user log error data and user context data is stored in a log error data and context data tracking database. In one embodiment, the obtained user log error data and user context data is analyzed to determine if the obtained user log error data and user context data matches the error data and context data associated with any of the categorized well rated recurring error solution data representing well rated solutions to recurring errors. In one embodiment, the user log error data and user context data associated with the user critical issue is obtained and logged from a user computing system associated with the user of the software application via implicit user contribution, i.e., by tracking the steps that the user has taken after they encounter the issue and checking if the user workflow was successful or not. In one embodiment, the user log error data and user context data associated with the user critical issue is obtained and logged from a user computing system associated with the user of the software application via explicit user contribution, i.e., based on the user feedback. In one embodiment, if the obtained user log error data and user context data is determined to match the error data and context data associated with a given well rated solution to the recurring error represented by a relevant portion of the categorized well rated recurring error solution data, an action message is generated and transmitted to the user computing system through the message based action system associated with the software application. In one embodiment, the action message provides the user access to the relevant portion of the categorized well rated recurring error solution data representing the solution to the matched user log error data and user context data of the user critical issue report data. In one embodiment, the well rated recurring error solution matching the user log error data and user context data of the user critical issue report data is then implemented on the user computing system using the transmitted relevant portion of the categorized well rated recurring error solution data through the software application. In one embodiment, the success of the implementation of the well rated recurring error solution matching the user log error data and user context data of the user critical issue report data is monitored via implicit user contribution, i.e., by tracking the steps that the user has taken after they encounter the issue and checking if the user workflow was successful or not. In one embodiment, the success of the implementation of the well rated recurring error solution matching the user log error data and user context data of the user critical issue report data is monitored via explicit user contribution, i.e., based on the user feedback. In one embodiment, if the obtained user log error data and user context data is determined not to match the error data and context data associated with any well rated solution to the recurring error of the categorized well rated recurring error solution data, an error solution and matching service is used to dynamically generate new recurring error solution data representing a solution to the error indicated in the obtained user log error data and user context data associated with the user critical issue report data. In one embodiment, an action message is then transmitted to the user computing system through the message based action system associated with the software application providing the user access to the new recurring error solution data representing a solution to the error indicated in the obtained user log error data and user context data associated with the user critical issue report data. In one embodiment, the new recurring error solution data representing a solution to the error indicated in the obtained user log error data and user context data associated with the user critical issue report data is then implemented on the user computing system. In one embodiment, the success of the new recurring error solution data representing a solution to the error indicated in the obtained user log error data and user context data associated with the user critical issue report data is monitored via implicit user contribution, i.e., by tracking the steps that the user has taken after they encounter the issue and checking if the user workflow was successful or not. In one embodiment, the success of the new recurring error solution data representing a solution to the error indicated in the obtained user log error data and user context data associated with the user critical issue report data is monitored via explicit user contribution, i.e., based on the user feedback. In one embodiment, the new recurring error solution data representing a solution to the error indicated in the obtained user log error data and user context data associated with the user critical issue report data is then classified according to the user log error data and user context data associated with the user critical issue report data to generate categorized new recurring error solution data. In one embodiment, the categorized new recurring error solution data is then stored for further use when other users encounter the error indicated in the obtained user log error data and user context data associated with the user critical issue report data. FIG. 1 100 shows a generalized operational workflow of a method and system for dynamically unblocking customers in critical workflows by pushing community contributed solutions just-in-time when an error is encountered, in accordance with one embodiment. FIG. 1 101 105 101 Referring to , in one embodiment, at USER ENCOUNTERS AN ACCESS OR CRITICAL ISSUE , a user of the software application encounters an access blockage or other critical issue. In one embodiment, at MULTIPLE USERS ENCOUNTER THE SAME ACCESS OR CRITICAL ISSUE , multiple users of the software application encounter the same access blockage or other critical issue encountered by the user at USER ENCOUNTERS AN ACCESS OR CRITICAL ISSUE . 103 In one embodiment, at ERROR LOGGING PORTAL SERVICE RECEIVES CRITICAL ISSUE REPORT , a user critical issue report is received from a user of the software application, and/or a user computing system associated with the user of the software application, indicating the user has encountered the access issue or other critical issue. 107 101 105 In one embodiment, at ERROR AND CONTEXT DATA IS CAPTURED AND LOGGED , user log error data and user context data associated with the user critical issue of USER ENCOUNTERS AN ACCESS OR CRITICAL ISSUE and MULTIPLE USERS ENCOUNTER THE SAME ACCESS OR CRITICAL ISSUE is obtained and logged from a user computing system associated with the user of the software application. In one embodiment, the user log error data and user context data associated with the user critical issue is obtained using an error logging portal service that captures the user log error data and user context data. 109 109 101 105 In one embodiment, the obtained user log error data and user context data is stored. In one embodiment, the obtained user log error data and user context data is stored in a log error data and context data tracking database such as TRACKING DATABASE . In one embodiment, using TRACKING DATABASE a determination is made that the combined number of users encountering the access blockage or critical issue of USER ENCOUNTERS AN ACCESS OR CRITICAL ISSUE and MULTIPLE USERS ENCOUNTER THE SAME ACCESS OR CRITICAL ISSUE is greater than the defined threshold error occurrence rate, i.e., the occurrence rate of the error associated with the critical issue is greater than a defined threshold error occurrence rate. 101 105 113 113 111 111 Since the occurrence rate of the error associated with the critical issue of USER ENCOUNTERS AN ACCESS OR CRITICAL ISSUE and MULTIPLE USERS ENCOUNTER THE SAME ACCESS OR CRITICAL ISSUE is determined to be greater than the defined threshold error occurrence rate, the community portal is updated to allow for solutions to the error to be obtained from one or more sources and posted to the community portal at SOLUTION SERVICE PROVIDES POTENTIAL SOLUTIONS/WORKAROUNDS . In one embodiment, the solutions to the error obtained from one or more sources and posted to the community portal at SOLUTION SERVICE PROVIDES POTENTIAL SOLUTIONS/WORKAROUNDS are rated at RECURRING ERROR SOLUTION DATA IS CATEGORIZED AND RATED and those solutions having ratings greater than a defined threshold rating are defined as well rated solutions. The solutions data representing these well rated solutions is then categorized at RECURRING ERROR SOLUTION DATA IS CATEGORIZED AND RATED . 114 107 111 In one embodiment, at IS ERROR AND CONTEXT DATA MATCHED TO A WELL RATED SOLUTION? , the obtained user log error data and user context data is analyzed to determine if the obtained user log error data and user context data of ERROR AND CONTEXT DATA IS CAPTURED AND LOGGED matches the error data and context data associated with any of the categorized well rated recurring error solution data representing well rated solutions to recurring errors of RECURRING ERROR SOLUTION DATA IS CATEGORIZED AND RATED . 114 116 In one embodiment, if the obtained user log error data and user context data is determined to match the error data and context data associated with a given well rated solution to the recurring error represented by a relevant portion of the categorized well rated recurring error solution data at IS ERROR AND CONTEXT DATA MATCHED TO A WELL RATED SOLUTION? , an action message is generated and transmitted to the user computing system through the message based action system associated with the software application at PUSH WELL RATED SOLUTION TO USER . 116 In one embodiment, the action message of PUSH WELL RATED SOLUTION TO USER provides the user access to the relevant portion of the categorized well rated recurring error solution data representing the solution to the matched user log error data and user context data of the user critical issue report data. In one embodiment, the well rated recurring error solution matching the user log error data and user context data of the user critical issue report data is then implemented on the user computing system using the transmitted relevant portion of the categorized well rated recurring error solution data through the software application. 114 117 In one embodiment, if the obtained user log error data and user context data is determined not to match the error data and context data associated with any well rated solution to the recurring error of the categorized well rated recurring error solution data at IS ERROR AND CONTEXT DATA MATCHED TO A WELL RATED SOLUTION? , an error solution and matching service is used to dynamically generate new recurring error solution data representing a solution to the error indicated in the obtained user log error data and user context data associated with the user critical issue report data at ERROR ANALYSIS AND MATCHING SERVICE ANALYZES NEW ERROR/CONTEXT, AND FINDS A SOLUTION . 119 119 117 In one embodiment, an action message is then transmitted to the user computing system through the message based action system associated with the software application at MATCHED NEW ERROR/CONTEXT AND SOLUTION PUSHED TO SERVER FOR USE BY CURRENT USER AND FUTURE USERS . In one embodiment, the action message of MATCHED NEW ERROR/CONTEXT AND SOLUTION PUSHED TO SERVER FOR USE BY CURRENT USER AND FUTURE USERS provides the user access to the new recurring error solution data representing a solution to the error indicated in the obtained user log error data and user context data associated with the user critical issue report data of ERROR ANALYSIS AND MATCHING SERVICE ANALYZES NEW ERROR/CONTEXT, AND FINDS A SOLUTION . 117 In one embodiment, the new recurring error solution data representing a solution to the error indicated in the obtained user log error data and user context data associated with the user critical issue report data of ERROR ANALYSIS AND MATCHING SERVICE ANALYZES NEW ERROR/CONTEXT, AND FINDS A SOLUTION is then implemented on the user computing system. 117 In one embodiment, the new recurring error solution data representing a solution to the error indicated in the obtained user log error data and user context data associated with the user critical issue report data of ERROR ANALYSIS AND MATCHING SERVICE ANALYZES NEW ERROR/CONTEXT, AND FINDS A SOLUTION is then classified according to the user log error data and user context data associated with the user critical issue report data to generate categorized new recurring error solution data. 117 In one embodiment, the categorized well rated recurring error solution data of ERROR ANALYSIS AND MATCHING SERVICE ANALYZES NEW ERROR/CONTEXT, AND FINDS A SOLUTION is then stored for further use when other users encounter the error indicated in the obtained user log error data and user context data associated with the user critical issue report data. The disclosed method and system for dynamically unblocking customers in critical workflows by pushing community contributed solutions just-in-time when an error is encountered provides for unblocking customers/users of a software application without the need for applying a data fix or releasing a patch or a new application version until a long-term solution can be formulated and implemented. Therefore, the disclosed method and system for dynamically unblocking customers in critical workflows by pushing community contributed solutions just-in-time when an error is encountered solves the long standing technical problem in the workflow application environment of users of a software application getting stuck and blocked from making progress with their workflows due to system, setup, data synchronization issues, and/or other critical issues, without applying a data fix or releasing a patch or new application version. The disclosed method and system for dynamically unblocking customers in critical workflows by pushing community contributed solutions just-in-time when an error is encountered does not encompass, embody, or preclude other forms of innovation in the area of workflow applications. In addition, the disclosed method and system for dynamically unblocking customers in critical workflows by pushing community contributed solutions just-in-time when an error is encountered is not related to fundamental economic practice, data processing practice, mental steps, or pen and paper based solutions, and is in fact directed to providing solutions to the relatively new problems associated with distributed workflow applications. Consequently, the disclosed method and system for dynamically unblocking customers in critical workflows by pushing community contributed solutions just-in-time when an error is encountered is not directed to, does not encompass, and is not merely, an abstract idea or concept. In addition, the disclosed method and system for dynamically unblocking customers in critical workflows by pushing community contributed solutions just-in-time when an error is encountered provides for significant improvements to the technical fields of customer support, information dissemination, software implementation, user experience, data processing, data management, distributed workflow applications, client server applications, and real time application fixes. In addition the disclosed method and system for dynamically unblocking customers in critical workflows by pushing community contributed solutions just-in-time when an error is encountered provides for the processing of only relevant portions of data and data analysis before the data is further analyzed, processed, and/or transmitted or distributed. Consequently, using the disclosed method and system for dynamically unblocking customers in critical workflows by pushing community contributed solutions just-in-time when an error is encountered results in more efficient use of human and non-human resources, fewer processor cycles being utilized, reduced memory utilization, and less communications bandwidth being utilized to relay data to and from backend systems and client systems. As a result, computing systems are transformed into faster, more efficient, and more effective computing systems by implementing the method and system for dynamically unblocking customers in critical workflows by pushing community contributed solutions just-in-time when an error is encountered. Process In accordance with one embodiment, error occurrence/recurrence rates associated with critical issue reports from multiple users of a software system are monitored. In one embodiment, log error data and context data associated with the critical issue is provided to a server side repository. In one embodiment, when it is detected that a threshold number of users of a software application are facing a given critical issue, such as blocking of data access in a defined context, i.e., a threshold recurrence of the same log error data and context data is detected, a community portal is updated with a facility for users to post their solutions, i.e., workarounds, and/or observations, and/or comments, associated with the specific critical issue/error. In one embodiment, the posted solutions are rated and/or monitored, and if the rating(s) for a given solution are above a threshold rating value, then data representing the solution, and/or implementing the solution, is pushed to users who continue to encounter the same critical issue, in one embodiment, using an action message framework, until a permanent fix is applied. FIGS. 2 and 3 200 are a flow chart representing one example of a process for dynamically unblocking customers in critical workflows by pushing community contributed solutions just-in-time when an error is encountered in accordance with one embodiment. FIG. 2 200 201 203 As seen in , process for dynamically unblocking customers in critical workflows by pushing community contributed solutions just-in-time when an error is encountered begins at ENTER OPERATION and process flow proceeds to PROVIDE A SOFTWARE APPLICATION OPERATION . 203 203 In one embodiment, at PROVIDE A SOFTWARE APPLICATION OPERATION , a software application is provided for use by one or more users. In various embodiments, the software application of PROVIDE A SOFTWARE APPLICATION OPERATION is any software application as discussed herein, and/or as known at the time of filling, and/or as developed after the time of filing. 203 205 In one embodiment, once a software application is provided at PROVIDE A SOFTWARE APPLICATION OPERATION , process flow proceeds to PROVIDE A MESSAGE BASED ACTION SYSTEM ASSOCIATED WITH THE SOFTWARE APPLICATION FOR PROVIDING ACTION MESSAGES TO USER COMPUTING SYSTEMS OPERATION . 205 In one embodiment, at PROVIDE A MESSAGE BASED ACTION SYSTEM ASSOCIATED WITH THE SOFTWARE APPLICATION FOR PROVIDING ACTION MESSAGES TO USER COMPUTING SYSTEMS OPERATION , a message based action system associated with the software application is provided using one or more computing systems. As noted above, in one embodiment, the provided message based action system is a loosely coupled message based action framework for dynamically unblocking customers in critical workflows by pushing community contributed solutions just-in-time when an error is encountered that allows the developers and product managers to dynamically control the software application behavior based on the action messages and message actions defined on the server and these message actions can be targeted to a specific user or a set of users based on the criteria defined on the server. As noted above, as used herein, the term “action message” includes messages used to send customized notification payloads that cause specific operations or actions to occur when a notification is received or activated and that logically, and operationally, connect what the provided software application running on user computing systems does, and what operations it performs on user computing systems, with what the software application provider/software application server sends through the action message. As also noted above, as used herein, the term “action message system” includes an action message framework that represents and creates a cooperation between the provided software application user's computing system and the action messages sent to the provided software application user's computing system through the software application itself. Consequently, as used herein, the terms “action message system” and “action message framework” do not necessarily mean a mobile or server-side technology on its own, but rather a cooperation between the provided software application user's computing system and the action messages sent to it. Consequently, using an “action message system” the provided software application user's computing system needs to know how to perform tasks indicated in an action message by name, with optional arguments, in certain distinct situations, with an optional result value. To this end, in one embodiment, each message action of an action message includes at least the following attributes: condition for the action; context; and action. In one embodiment, the condition for the action attribute supports logical expression with the ability to use any exposed variables in the software application such as, but not limited to, companyId, userId, version code, etc., global and context based. In addition, in one embodiment, a variable called “now” that represents the time in milliseconds from Jan. 1, 1970 midnight GMT is also available. In one embodiment, the context attribute defines the context or placement when/where the message actions will be executed in the software application, such as, but not limited to, when the software application starts, when an error occurs, or during upgrade flow, etc. In one illustrative embodiment, the available contexts include, but are not limited to, an appstart context, e.g., called very early on in the software application initialization. In one illustrative embodiment, the available contexts include, but are not limited to, a syncparseerror context, e.g., called when an entity parsing error happens during synchronization. In one embodiment, the syncparseerror context variables available to use include, but are not limited to: syncerrorcode, an error code representing the specific entity parse error; and syncerrorentity, an entity name that has the parse error. In one illustrative embodiment, the available contexts include, but are not limited to, a syncerror context, e.g., called when a batch request contains a fault item. In one embodiment, this is executed for each fault response item. In one embodiment, syncerror context variables available to use include, but are not limited to: syncerrorcode, the error code from server; and syncerrormessage, the error message from server. In one illustrative embodiment, the available contexts include, but are not limited to, an activitystart context, e.g., called once for each activity start. As an illustrative example, activity in an Android™ environment corresponds to a new screen/page. In one embodiment, the activitystart context variables available to use include, but are not limited to, activityname, the name of the activity. In one illustrative embodiment, the available contexts include, but are not limited to, a synccomplete context, e.g., called once the foreground synchronization is completed. In one illustrative embodiment, the available contexts include, but are not limited to, a homepage context, e.g., called whenever the homepage is shown. In one illustrative embodiment, the available contexts include, but are not limited to, a new version context, e.g., called the first time a new version is launched. In one illustrative embodiment, the available contexts include, but are not limited to, an afterupgrade context, e.g., called the first time after an upgraded software application is launched. In one illustrative embodiment, the available contexts include, but are not limited to, a logerror context, e.g., called when errors are logged. In one embodiment, logerror context variables available to use include, but are not limited to, logmessage, a message that is logged. In one illustrative embodiment, the available contexts include, but are not limited to, a loginfo context, e.g., called when information is logged. In one embodiment, loginfo context variables available to use include, but are not limited to, logmessage, a message that is logged. Although specific illustrative examples of contexts are discussed above, those of skill in the art will recognize that different, more, or less, contexts can be defined and implemented using different, similar, or the same nomenclature/symbols and functionality. Consequently, the specific context examples discussed herein are presented as illustrative examples only and do not limit the scope of the claims presented below. In one embodiment, the actions are predefined actions available in the software application. In one embodiment, actions are identified by name and are registered with the action message system/framework. In one embodiment, action messages are delivered to the software application user's computing system, i.e., the client, through software application settings. In one embodiment, the key is actionmessages.expr. In one embodiment, each available action includes; 1. A name data field indicating the defined name of the action; 2. A one-time message (otm) data field indicating if the action is executed only once; and 3. An action JSON field indicating any action specific JSON as a string. As an illustrative example of one embodiment, the actions supported include, but are not limited to, an alert action, e.g., an action that shows an alert dialog with ok and cancel buttons. In one embodiment, the following attributes of the alert can be customized: a. title—the title for the dialog; b. message—the message for the dialog; c. okCaption—an ok button caption; d. cancelCaption—a cancel button caption; e. okAction—the definition of the action that needs to be executed when the user clicks the ok button; and f. cancelAction—the definition of the action that needs to be executed when the user clicks the cancel button. As an illustrative example of one embodiment, the actions supported include, but are not limited to, a fullsync action that triggers a full data synchronization. As an illustrative example of one embodiment, the actions supported include, but are not limited to, a skipsyncerror action that skips a synchronization (sync) error. In one embodiment, the skipsyncerror action is used for parsing errors. As an illustrative example of one embodiment, the actions supported include, but are not limited to, an alogsyncerror action that logs sync error details including logging JSON response data. As an illustrative example of one embodiment, the actions supported include, but are not limited to, a goforupgrade action that takes the user to the software application upgrade flow. As an illustrative example of one embodiment, the actions supported include, but are not limited to, a dynamic action that dynamically adds an action message to execute at a later time or event. Although specific illustrative examples of actions are discussed above, those of skill in the art will recognize that different, more, or less, actions can be defined and implemented using different, similar, or the same nomenclature/symbols and functionality. Consequently, the specific action examples discussed herein are presented as illustrative examples only and do not limit the scope of the claims presented below. Continuing with the specific illustrative example above, one illustrative action message format could be [{context:“AAA”,condition:“BBB”,actions:[{name:“CCC”, otm: True or False, actionJson:NULL or DDD}]}] where: AAA represents the context data; BBB represents the condition data; CCC represents the action; True or False represents True or False; Null represents the null set, or none; and DDD represents the JSON. As an even more specific illustrative example of one embodiment, a sample message action could be: [{context:“syncerror”, condition:“syncerrorcode=2019”, actions:[{name:“skipsyncerror”, otm: true, actionJson: null}]}]. This sample message action indicates that its context is “syncerror” meaning it can happen when application synchronization has failed. This sample message action indicates that its condition is“syncerrorcode=2019” meaning the entity having code 2019 has failed to synchronize. Note: the condition is always a logical expression. This sample message action indicates the action “skipsyncerror” meaning there is some code associated with the action “skipsyncerror” which lets the user skip this error and get unblocked. This sample message action indicates the otm field is true, i.e., the action is performed only once. This sample message action indicates the action JSON field is null, meaning there is no action JSON. Although specific illustrative examples of action messages are discussed above, those of skill in the art will recognize that different action message/message action formats can be defined and implemented using different, similar, or the same nomenclature/symbols and functionality. Consequently, the specific action message/message action format examples discussed herein are presented as illustrative examples only and do not limit the scope of the claims presented below. 205 207 In one embodiment, once a message based action system associated with the software application is provided using one or more computing systems at PROVIDE A MESSAGE BASED ACTION SYSTEM ASSOCIATED WITH THE SOFTWARE APPLICATION FOR PROVIDING ACTION MESSAGES TO USER COMPUTING SYSTEMS OPERATION , process flow proceeds to PROVIDE A COMMUNITY PORTAL THROUGH WHICH RECURRING ERROR SOLUTION DATA REPRESENTING SOLUTIONS TO RECURRING ERRORS ENCOUNTERED BY USERS OF THE SOFTWARE APPLICATION IS OBTAINED AND/OR POSTED OPERATION . 207 In one embodiment, at PROVIDE A COMMUNITY PORTAL THROUGH WHICH RECURRING ERROR SOLUTION DATA REPRESENTING SOLUTIONS TO RECURRING ERRORS ENCOUNTERED BY USERS OF THE SOFTWARE APPLICATION IS OBTAINED AND/OR POSTED OPERATION , a community portal for the software application is provided using one or more computing systems. 207 In one embodiment, through the community portal of PROVIDE A COMMUNITY PORTAL THROUGH WHICH RECURRING ERROR SOLUTION DATA REPRESENTING SOLUTIONS TO RECURRING ERRORS ENCOUNTERED BY USERS OF THE SOFTWARE APPLICATION IS OBTAINED AND/OR POSTED OPERATION , recurring error solution data representing solutions to recurring errors encountered by users of the software application is obtained and/or posted. 207 In one embodiment, the solutions to recurring errors encountered by users of the software application are obtained from a solution service and/or developers and technicians associated with the software application provider at PROVIDE A COMMUNITY PORTAL THROUGH WHICH RECURRING ERROR SOLUTION DATA REPRESENTING SOLUTIONS TO RECURRING ERRORS ENCOUNTERED BY USERS OF THE SOFTWARE APPLICATION IS OBTAINED AND/OR POSTED OPERATION . 207 In one embodiment, the solutions to recurring errors encountered by users of the software application are obtained from the software application users themselves at PROVIDE A COMMUNITY PORTAL THROUGH WHICH RECURRING ERROR SOLUTION DATA REPRESENTING SOLUTIONS TO RECURRING ERRORS ENCOUNTERED BY USERS OF THE SOFTWARE APPLICATION IS OBTAINED AND/OR POSTED OPERATION . In one embodiment, the solutions to recurring errors encountered by users of the software application are obtained from the software application users themselves through implicit user contribution, i.e., by tracking the steps that the user has taken after they encounter the issue and checking if the user workflow was successful or not. In one embodiment, the solutions to recurring errors encountered by users of the software application are obtained from the software application users themselves through explicit user contribution, i.e., based on user feedback. 207 209 In one embodiment, once a community portal for the software application is provided using one or more computing systems at PROVIDE A COMMUNITY PORTAL THROUGH WHICH RECURRING ERROR SOLUTION DATA REPRESENTING SOLUTIONS TO RECURRING ERRORS ENCOUNTERED BY USERS OF THE SOFTWARE APPLICATION IS OBTAINED AND/OR POSTED OPERATION , process flow proceeds to GENERATE THRESHOLD ERROR OCCURRENCE RATE DATA OPERATION . 209 In one embodiment, at GENERATE THRESHOLD ERROR OCCURRENCE RATE DATA OPERATION , a threshold error occurrence rate is defined and threshold error occurrence rate data is generated representing the defined threshold error occurrence rate. 207 In one embodiment, the threshold error occurrence rate is defined such that if an error occurs more than the threshold error occurrence rate, the error is designated a recurring error and the community portal for the software application of PROVIDE A COMMUNITY PORTAL THROUGH WHICH RECURRING ERROR SOLUTION DATA REPRESENTING SOLUTIONS TO RECURRING ERRORS ENCOUNTERED BY USERS OF THE SOFTWARE APPLICATION IS OBTAINED AND/OR POSTED OPERATION is updated to allow recurring error solution data representing solutions to the recurring error to be obtained and/or posted. 209 211 In one embodiment, once a threshold error occurrence rate is defined and threshold error occurrence rate data is generated representing the defined threshold error occurrence rate at GENERATE THRESHOLD ERROR OCCURRENCE RATE DATA OPERATION , process flow proceeds to PROVIDE A RECURRING ERROR SOLUTIONS RATINGS SYSTEM THROUGH WHICH SOLUTIONS TO RECURRING ERRORS OBTAINED AND/OR POSTED IN THE COMMUNITY PORTAL ARE RATED OPERATION . 211 In one embodiment, at PROVIDE A RECURRING ERROR SOLUTIONS RATINGS SYSTEM THROUGH WHICH SOLUTIONS TO RECURRING ERRORS OBTAINED AND/OR POSTED IN THE COMMUNITY PORTAL ARE RATED OPERATION , a recurring error solutions ratings system is provided using one or more computing systems. 211 207 In one embodiment, through the recurring error solutions ratings system of PROVIDE A RECURRING ERROR SOLUTIONS RATINGS SYSTEM THROUGH WHICH SOLUTIONS TO RECURRING ERRORS OBTAINED AND/OR POSTED IN THE COMMUNITY PORTAL ARE RATED OPERATION , the recurring error solution data representing solutions to recurring errors obtained and/or posted in the community portal for the software application of PROVIDE A COMMUNITY PORTAL THROUGH WHICH RECURRING ERROR SOLUTION DATA REPRESENTING SOLUTIONS TO RECURRING ERRORS ENCOUNTERED BY USERS OF THE SOFTWARE APPLICATION IS OBTAINED AND/OR POSTED OPERATION are rated and associated recurring error solution ratings data is generated. 211 207 In one embodiment, at PROVIDE A RECURRING ERROR SOLUTIONS RATINGS SYSTEM THROUGH WHICH SOLUTIONS TO RECURRING ERRORS OBTAINED AND/OR POSTED IN THE COMMUNITY PORTAL ARE RATED OPERATION , the recurring error solution data representing solutions to recurring errors obtained and/or posted in the community portal for the software application of PROVIDE A COMMUNITY PORTAL THROUGH WHICH RECURRING ERROR SOLUTION DATA REPRESENTING SOLUTIONS TO RECURRING ERRORS ENCOUNTERED BY USERS OF THE SOFTWARE APPLICATION IS OBTAINED AND/OR POSTED OPERATION are rated and associated recurring error solution ratings data is generated based on reviews submitted by the software system users. 211 207 In one embodiment, at PROVIDE A RECURRING ERROR SOLUTIONS RATINGS SYSTEM THROUGH WHICH SOLUTIONS TO RECURRING ERRORS OBTAINED AND/OR POSTED IN THE COMMUNITY PORTAL ARE RATED OPERATION , the recurring error solution data representing solutions to recurring errors obtained and/or posted in the community portal for the software application of PROVIDE A COMMUNITY PORTAL THROUGH WHICH RECURRING ERROR SOLUTION DATA REPRESENTING SOLUTIONS TO RECURRING ERRORS ENCOUNTERED BY USERS OF THE SOFTWARE APPLICATION IS OBTAINED AND/OR POSTED OPERATION are rated and associated recurring error solution ratings data is generated based on the monitored and logged success rates of solutions to recurring errors implemented on user computing systems. In one embodiment, the success rates of solutions to recurring errors implemented on user computing systems is monitored and logged through implicit user contribution, i.e., by tracking the steps that the user has taken after they encounter the issue and checking if the user workflow was successful or not. In one embodiment, the success rates of solutions to recurring errors implemented on user computing systems is monitored and logged through explicit user contribution, i.e., based on user feedback. 207 211 213 In one embodiment, once the recurring error solution data representing solutions to recurring errors obtained and/or posted in the community portal for the software application of PROVIDE A COMMUNITY PORTAL THROUGH WHICH RECURRING ERROR SOLUTION DATA REPRESENTING SOLUTIONS TO RECURRING ERRORS ENCOUNTERED BY USERS OF THE SOFTWARE APPLICATION IS OBTAINED AND/OR POSTED OPERATION are rated and associated recurring error solution ratings data is generated at PROVIDE A RECURRING ERROR SOLUTIONS RATINGS SYSTEM THROUGH WHICH SOLUTIONS TO RECURRING ERRORS OBTAINED AND/OR POSTED IN THE COMMUNITY PORTAL ARE RATED OPERATION , process flow proceeds to GENERATE THRESHOLD RECURRING ERROR SOLUTION RATINGS DATA OPERATION . 213 In one embodiment, at GENERATE THRESHOLD RECURRING ERROR SOLUTION RATINGS DATA OPERATION a threshold recurring error solution rating is defined and threshold recurring error solution rating data representing the defined threshold recurring error solution rating is generated. 213 In one embodiment, the threshold recurring error solution rating is defined at GENERATE THRESHOLD RECURRING ERROR SOLUTION RATINGS DATA OPERATION such that if recurring error solution data representing a solution to a recurring error obtained and/or posted in the community portal for the software application has associated recurring error solution ratings data representing a recurring error solution rating for the recurring error solution data greater than the threshold recurring error solution rating represented by the threshold recurring error solution ratings data, the recurring error solution data is designated well rated recurring error solution data representing a well rated solution to the recurring error. 213 215 In one embodiment, once a threshold recurring error solution rating is defined and threshold recurring error solution rating data representing the defined threshold recurring error solution rating is generated at GENERATE THRESHOLD RECURRING ERROR SOLUTION RATINGS DATA OPERATION , process flow proceeds to DESIGNATE SOLUTIONS TO RECURRING ERRORS OBTAINED AND/OR POSTED IN THE COMMUNITY PORTAL HAVING RECURRING ERROR SOLUTION RATINGS GREATER THAN THE THRESHOLD RECURRING ERROR SOLUTION RATING REPRESENTED BY THE THRESHOLD RECURRING ERROR SOLUTION RATINGS DATA WELL RATED RECURRING ERROR SOLUTIONS TO THE RECURRING ERRORS OPERATION . 215 In one embodiment, at DESIGNATE SOLUTIONS TO RECURRING ERRORS OBTAINED AND/OR POSTED IN THE COMMUNITY PORTAL HAVING RECURRING ERROR SOLUTION RATINGS GREATER THAN THE THRESHOLD RECURRING ERROR SOLUTION RATING REPRESENTED BY THE THRESHOLD RECURRING ERROR SOLUTION RATINGS DATA WELL RATED RECURRING ERROR SOLUTIONS TO THE RECURRING ERRORS OPERATION , all recurring error solution data representing a solution to a recurring error obtained and/or posted in the community portal for the software application that has associated recurring error solution ratings data representing a recurring error solution rating for the recurring error solution data greater than the threshold recurring error solution rating represented by the threshold recurring error solution ratings data, is designated well rated recurring error solution data representing a well rated solution to the recurring error. 215 217 In one embodiment, once all recurring error solution data representing a solution to a recurring error obtained and/or posted in the community portal for the software application that has associated recurring error solution ratings data representing a recurring error solution rating for the recurring error solution data greater than the threshold recurring error solution rating represented by the threshold recurring error solution ratings data, is designated well rated recurring error solution data representing a well rated solution to the recurring error at DESIGNATE SOLUTIONS TO RECURRING ERRORS OBTAINED AND/OR POSTED IN THE COMMUNITY PORTAL HAVING RECURRING ERROR SOLUTION RATINGS GREATER THAN THE THRESHOLD RECURRING ERROR SOLUTION RATING REPRESENTED BY THE THRESHOLD RECURRING ERROR SOLUTION RATINGS DATA WELL RATED RECURRING ERROR SOLUTIONS TO THE RECURRING ERRORS OPERATION , process flow proceeds to CATEGORIZE ALL WELL RATED RECURRING ERROR SOLUTION DATA ACCORDING TO ERROR DATA AND CONTEXT DATA ASSOCIATED WITH THE RECURRING ERROR THAT IS THE SUBJECT OF THE WELL RATED RECURRING ERROR SOLUTION DATA TO GENERATE CATEGORIZED WELL RATED RECURRING ERROR SOLUTION DATA OPERATION . 217 215 In one embodiment, at CATEGORIZE ALL WELL RATED RECURRING ERROR SOLUTION DATA ACCORDING TO ERROR DATA AND CONTEXT DATA ASSOCIATED WITH THE RECURRING ERROR THAT IS THE SUBJECT OF THE WELL RATED RECURRING ERROR SOLUTION DATA TO GENERATE CATEGORIZED WELL RATED RECURRING ERROR SOLUTION DATA OPERATION , all well rated recurring error solution data of DESIGNATE SOLUTIONS TO RECURRING ERRORS OBTAINED AND/OR POSTED IN THE COMMUNITY PORTAL HAVING RECURRING ERROR SOLUTION RATINGS GREATER THAN THE THRESHOLD RECURRING ERROR SOLUTION RATING REPRESENTED BY THE THRESHOLD RECURRING ERROR SOLUTION RATINGS DATA WELL RATED RECURRING ERROR SOLUTIONS TO THE RECURRING ERRORS OPERATION is categorized according to error data and context data associated with the recurring error that is the subject of the well rated recurring error solution data to generate categorized well rated recurring error solution data. 215 219 In one embodiment, once all well rated recurring error solution data of DESIGNATE SOLUTIONS TO RECURRING ERRORS OBTAINED AND/OR POSTED IN THE COMMUNITY PORTAL HAVING RECURRING ERROR SOLUTION RATINGS GREATER THAN THE THRESHOLD RECURRING ERROR SOLUTION RATING REPRESENTED BY THE THRESHOLD RECURRING ERROR SOLUTION RATINGS DATA WELL RATED RECURRING ERROR SOLUTIONS TO THE RECURRING ERRORS OPERATION is categorized according to error data and context data associated with the recurring error that is the subject of the well rated recurring error solution data to generate categorized well rated recurring error solution data, process flow proceeds to STORE THE CATEGORIZED WELL RATED RECURRING ERROR SOLUTION DATA OPERATION . 219 In one embodiment, at STORE THE CATEGORIZED WELL RATED RECURRING ERROR SOLUTION DATA OPERATION , the categorized well rated recurring error solution data is stored. 219 221 In one embodiment, once the categorized well rated recurring error solution data is stored at STORE THE CATEGORIZED WELL RATED RECURRING ERROR SOLUTION DATA OPERATION , process flow proceeds to RECEIVE A USER CRITICAL ISSUE REPORT FROM A USER OF THE SOFTWARE APPLICATION INDICATING THE USER HAS ENCOUNTERED AN ACCESS ISSUE OR OTHER CRITICAL ISSUE OPERATION . 221 In one embodiment, at RECEIVE A USER CRITICAL ISSUE REPORT FROM A USER OF THE SOFTWARE APPLICATION INDICATING THE USER HAS ENCOUNTERED AN ACCESS ISSUE OR OTHER CRITICAL ISSUE OPERATION , a user of the software application encounters an access blockage or other critical issue. 221 In one embodiment, at RECEIVE A USER CRITICAL ISSUE REPORT FROM A USER OF THE SOFTWARE APPLICATION INDICATING THE USER HAS ENCOUNTERED AN ACCESS ISSUE OR OTHER CRITICAL ISSUE OPERATION user critical issue report data is received from a user of the software application, and/or a user computing system associated with the user of the software application, indicating the user has encountered the access issue or other critical issue. 221 223 In one embodiment, once a user of the software application encounters an access blockage or other critical issue at RECEIVE A USER CRITICAL ISSUE REPORT FROM A USER OF THE SOFTWARE APPLICATION INDICATING THE USER HAS ENCOUNTERED AN ACCESS ISSUE OR OTHER CRITICAL ISSUE OPERATION , process flow proceeds to OBTAIN USER LOG ERROR DATA AND USER CONTEXT DATA ASSOCIATED WITH THE USER CRITICAL ISSUE REPORT FROM A USER COMPUTING SYSTEM ASSOCIATED WITH THE USER OF THE SOFTWARE APPLICATION OPERATION . 223 In one embodiment, at OBTAIN USER LOG ERROR DATA AND USER CONTEXT DATA ASSOCIATED WITH THE USER CRITICAL ISSUE REPORT FROM A USER COMPUTING SYSTEM ASSOCIATED WITH THE USER OF THE SOFTWARE APPLICATION OPERATION , user log error data and user context data associated with the user critical issue is obtained and logged from a user computing system associated with the user of the software application. 223 In one embodiment, at OBTAIN USER LOG ERROR DATA AND USER CONTEXT DATA ASSOCIATED WITH THE USER CRITICAL ISSUE REPORT FROM A USER COMPUTING SYSTEM ASSOCIATED WITH THE USER OF THE SOFTWARE APPLICATION OPERATION the user log error data and user context data associated with the user critical issue is obtained using an error logging portal service that captures the user log error data and user context data. 223 In one embodiment, the user log error data and user context data associated with the user critical issue is obtained and logged from a user computing system associated with the user of the software application at OBTAIN USER LOG ERROR DATA AND USER CONTEXT DATA ASSOCIATED WITH THE USER CRITICAL ISSUE REPORT FROM A USER COMPUTING SYSTEM ASSOCIATED WITH THE USER OF THE SOFTWARE APPLICATION OPERATION via implicit user contribution, i.e., by tracking the steps that the user has taken after they encounter the issue and checking if the user workflow was successful or not. 223 In one embodiment, the user log error data and user context data associated with the user critical issue is obtained and logged from a user computing system associated with the user of the software application at OBTAIN USER LOG ERROR DATA AND USER CONTEXT DATA ASSOCIATED WITH THE USER CRITICAL ISSUE REPORT FROM A USER COMPUTING SYSTEM ASSOCIATED WITH THE USER OF THE SOFTWARE APPLICATION OPERATION via explicit user contribution, i.e., based on the user feedback. 223 225 In one embodiment, once user log error data and user context data associated with the user critical issue is obtained and logged from a user computing system associated with the user of the software application at OBTAIN USER LOG ERROR DATA AND USER CONTEXT DATA ASSOCIATED WITH THE USER CRITICAL ISSUE REPORT FROM A USER COMPUTING SYSTEM ASSOCIATED WITH THE USER OF THE SOFTWARE APPLICATION OPERATION , process flow proceeds to STORE THE USER LOG ERROR DATA AND USER CONTEXT DATA IN A LOG ERROR DATA AND CONTEXT DATA TRACKING DATABASE OPERATION . 225 223 In one embodiment, at STORE THE USER LOG ERROR DATA AND USER CONTEXT DATA IN A LOG ERROR DATA AND CONTEXT DATA TRACKING DATABASE OPERATION , the obtained user log error data and user context data of OBTAIN USER LOG ERROR DATA AND USER CONTEXT DATA ASSOCIATED WITH THE USER CRITICAL ISSUE REPORT FROM A USER COMPUTING SYSTEM ASSOCIATED WITH THE USER OF THE SOFTWARE APPLICATION OPERATION is stored. 225 223 In one embodiment, at STORE THE USER LOG ERROR DATA AND USER CONTEXT DATA IN A LOG ERROR DATA AND CONTEXT DATA TRACKING DATABASE OPERATION , the obtained user log error data and user context data of OBTAIN USER LOG ERROR DATA AND USER CONTEXT DATA ASSOCIATED WITH THE USER CRITICAL ISSUE REPORT FROM A USER COMPUTING SYSTEM ASSOCIATED WITH THE USER OF THE SOFTWARE APPLICATION OPERATION is stored in a log error data and context data tracking database. 223 225 227 In one embodiment, once the obtained user log error data and user context data of OBTAIN USER LOG ERROR DATA AND USER CONTEXT DATA ASSOCIATED WITH THE USER CRITICAL ISSUE REPORT FROM A USER COMPUTING SYSTEM ASSOCIATED WITH THE USER OF THE SOFTWARE APPLICATION OPERATION is stored at STORE THE USER LOG ERROR DATA AND USER CONTEXT DATA IN A LOG ERROR DATA AND CONTEXT DATA TRACKING DATABASE OPERATION , process flow proceeds to ANALYZE THE OBTAINED USER LOG ERROR DATA AND USER CONTEXT DATA TO DETERMINE IF THE OBTAINED USER LOG ERROR DATA AND USER CONTEXT DATA MATCHES THE ERROR DATA AND CONTEXT DATA ASSOCIATED WITH ANY OF THE CATEGORIZED WELL RATED RECURRING ERROR SOLUTION DATA REPRESENTING WELL RATED SOLUTIONS TO RECURRING ERRORS OPERATION . 227 In one embodiment, at ANALYZE THE OBTAINED USER LOG ERROR DATA AND USER CONTEXT DATA TO DETERMINE IF THE OBTAINED USER LOG ERROR DATA AND USER CONTEXT DATA MATCHES THE ERROR DATA AND CONTEXT DATA ASSOCIATED WITH ANY OF THE CATEGORIZED WELL RATED RECURRING ERROR SOLUTION DATA REPRESENTING WELL RATED SOLUTIONS TO RECURRING ERRORS OPERATION , the obtained user log error data and user context data is analyzed to determine if the obtained user log error data and user context data matches the error data and context data associated with any of the categorized well rated recurring error solution data representing well rated solutions to recurring errors. 227 In one embodiment, at ANALYZE THE OBTAINED USER LOG ERROR DATA AND USER CONTEXT DATA TO DETERMINE IF THE OBTAINED USER LOG ERROR DATA AND USER CONTEXT DATA MATCHES THE ERROR DATA AND CONTEXT DATA ASSOCIATED WITH ANY OF THE CATEGORIZED WELL RATED RECURRING ERROR SOLUTION DATA REPRESENTING WELL RATED SOLUTIONS TO RECURRING ERRORS OPERATION the user log error data and user context data associated with the user critical issue is obtained and logged from a user computing system associated with the user of the software application via implicit user contribution, i.e., by tracking the steps that the user has taken after they encounter the issue and checking if the user workflow was successful or not. 227 In one embodiment, at ANALYZE THE OBTAINED USER LOG ERROR DATA AND USER CONTEXT DATA TO DETERMINE IF THE OBTAINED USER LOG ERROR DATA AND USER CONTEXT DATA MATCHES THE ERROR DATA AND CONTEXT DATA ASSOCIATED WITH ANY OF THE CATEGORIZED WELL RATED RECURRING ERROR SOLUTION DATA REPRESENTING WELL RATED SOLUTIONS TO RECURRING ERRORS OPERATION the user log error data and user context data associated with the user critical issue is obtained and logged from a user computing system associated with the user of the software application via explicit user contribution, i.e., based on the user feedback. 227 228 In one embodiment, once the obtained user log error data and user context data is analyzed to determine if the obtained user log error data and user context data matches the error data and context data associated with any of the categorized well rated recurring error solution data representing well rated solutions to recurring errors at ANALYZE THE OBTAINED USER LOG ERROR DATA AND USER CONTEXT DATA TO DETERMINE IF THE OBTAINED USER LOG ERROR DATA AND USER CONTEXT DATA MATCHES THE ERROR DATA AND CONTEXT DATA ASSOCIATED WITH ANY OF THE CATEGORIZED WELL RATED RECURRING ERROR SOLUTION DATA REPRESENTING WELL RATED SOLUTIONS TO RECURRING ERRORS OPERATION , process flow proceeds to MATCH? OPERATION . 228 229 In one embodiment, if at MATCH? OPERATION the obtained user log error data and user context data is determined to match the error data and context data associated with a given well rated solution to the recurring error represented by a relevant portion of the categorized well rated recurring error solution data, process flow proceeds to TRANSMIT AN ACTION MESSAGE TO THE USER COMPUTING SYSTEM PROVIDING THE USER ACCESS TO A RELEVANT PORTION OF THE CATEGORIZED WELL RATED RECURRING ERROR SOLUTION DATA REPRESENTING A SOLUTION TO THE MATCHED USER LOG ERROR DATA AND USER CONTEXT DATA OF THE USER CRITICAL ISSUE REPORT OPERATION . 229 In one embodiment, at TRANSMIT AN ACTION MESSAGE TO THE USER COMPUTING SYSTEM PROVIDING THE USER ACCESS TO A RELEVANT PORTION OF THE CATEGORIZED WELL RATED RECURRING ERROR SOLUTION DATA REPRESENTING A SOLUTION TO THE MATCHED USER LOG ERROR DATA AND USER CONTEXT DATA OF THE USER CRITICAL ISSUE REPORT OPERATION , once the obtained user log error data and user context data is determined to match the error data and context data associated with a given well rated solution to the recurring error represented by a relevant portion of the categorized well rated recurring error solution data, an action message is generated and transmitted to the user computing system through the message based action system associated with the software application. In one embodiment, the action message provides the user access to the relevant portion of the categorized well rated recurring error solution data representing the solution to the matched user log error data and user context data of the user critical issue report data. 229 231 In one embodiment, once an action message is generated and transmitted to the user computing system through the message based action system associated with the software application at TRANSMIT AN ACTION MESSAGE TO THE USER COMPUTING SYSTEM PROVIDING THE USER ACCESS TO A RELEVANT PORTION OF THE CATEGORIZED WELL RATED RECURRING ERROR SOLUTION DATA REPRESENTING A SOLUTION TO THE MATCHED USER LOG ERROR DATA AND USER CONTEXT DATA OF THE USER CRITICAL ISSUE REPORT OPERATION , process flow proceeds to IMPLEMENT THE WELL RATED RECURRING ERROR SOLUTION MATCHING THE USER LOG ERROR DATA AND USER CONTEXT DATA OF THE USER CRITICAL ISSUE REPORT USING THE TRANSMITTED RELEVANT PORTION OF THE CATEGORIZED WELL RATED RECURRING ERROR SOLUTION DATA ON THE USER COMPUTING SYSTEM THROUGH THE SOFTWARE APPLICATION OPERATION . 231 229 In one embodiment, at IMPLEMENT THE WELL RATED RECURRING ERROR SOLUTION MATCHING THE USER LOG ERROR DATA AND USER CONTEXT DATA OF THE USER CRITICAL ISSUE REPORT USING THE TRANSMITTED RELEVANT PORTION OF THE CATEGORIZED WELL RATED RECURRING ERROR SOLUTION DATA ON THE USER COMPUTING SYSTEM THROUGH THE SOFTWARE APPLICATION OPERATION , the well rated recurring error solution matching the user log error data and user context data of the user critical issue report data of TRANSMIT AN ACTION MESSAGE TO THE USER COMPUTING SYSTEM PROVIDING THE USER ACCESS TO A RELEVANT PORTION OF THE CATEGORIZED WELL RATED RECURRING ERROR SOLUTION DATA REPRESENTING A SOLUTION TO THE MATCHED USER LOG ERROR DATA AND USER CONTEXT DATA OF THE USER CRITICAL ISSUE REPORT OPERATION is implemented on the user computing system using the transmitted relevant portion of the categorized well rated recurring error solution data through the software application. In one embodiment, the success of the implementation of the well rated recurring error solution matching the user log error data and user context data of the user critical issue report data is monitored via implicit user contribution, i.e., by tracking the steps that the user has taken after they encounter the issue and checking if the user workflow was successful or not. In one embodiment, the success of the implementation of the well rated recurring error solution matching the user log error data and user context data of the user critical issue report data is monitored via explicit user contribution, i.e., based on the user feedback. 229 231 240 In one embodiment, once the well rated recurring error solution matching the user log error data and user context data of the user critical issue report data of TRANSMIT AN ACTION MESSAGE TO THE USER COMPUTING SYSTEM PROVIDING THE USER ACCESS TO A RELEVANT PORTION OF THE CATEGORIZED WELL RATED RECURRING ERROR SOLUTION DATA REPRESENTING A SOLUTION TO THE MATCHED USER LOG ERROR DATA AND USER CONTEXT DATA OF THE USER CRITICAL ISSUE REPORT OPERATION is implemented on the user computing system using the transmitted relevant portion of the categorized well rated recurring error solution data through the software application at IMPLEMENT THE WELL RATED RECURRING ERROR SOLUTION MATCHING THE USER LOG ERROR DATA AND USER CONTEXT DATA OF THE USER CRITICAL ISSUE REPORT USING THE TRANSMITTED RELEVANT PORTION OF THE CATEGORIZED WELL RATED RECURRING ERROR SOLUTION DATA ON THE USER COMPUTING SYSTEM THROUGH THE SOFTWARE APPLICATION OPERATION , process flow proceeds to EXIT OPERATION . 200 200 In one embodiment, at EXIT OPERATION process for dynamically unblocking customers in critical workflows by pushing community contributed solutions just-in-time when an error is encountered is exited to await new data. In one embodiment, if the obtained user log error data and user context data is determined not to match the error data and context data associated with any well rated solution to the recurring error of the categorized well rated recurring error solution data, an error solution and matching service is used to dynamically generate new recurring error solution data representing a solution to the error indicated in the obtained user log error data and user context data associated with the user critical issue report data. In one embodiment, an action message is then transmitted to the user computing system through the message based action system associated with the software application providing the user access to the new recurring error solution data representing a solution to the error indicated in the obtained user log error data and user context data associated with the user critical issue report data. In one embodiment, the new recurring error solution data representing a solution to the error indicated in the obtained user log error data and user context data associated with the user critical issue report data is then implemented on the user computing system. In one embodiment, the new recurring error solution data representing a solution to the error indicated in the obtained user log error data and user context data associated with the user critical issue report data according to the user log error data and user context data associated with the user critical issue report data to generate categorized new recurring error solution data. In one embodiment, the categorized new recurring error solution data is then stored for further use when other users encounter the error indicated in the obtained user log error data and user context data associated with the user critical issue report data. 228 228 329 300 FIG. 3 Consequently, returning to MATCH? OPERATION , in one embodiment, if at MATCH? OPERATION the obtained user log error data and user context data is determined not to match the error data and context data associated with any well rated solution to the recurring error of the categorized well rated recurring error solution data, process flow proceeds to GOTO OPERATION OF OPERATION . 329 300 228 301 329 FIG. 3 FIG. 2 FIG. 2 FIG. 3 In one embodiment, process flow proceeds through GOTO OPERATION OF OPERATION of , to FROM OPERATION OF OPERATION of and process flow proceeds to DYNAMICALLY GENERATE NEW RECURRING ERROR SOLUTION DATA REPRESENTING A SOLUTION TO THE ERROR INDICATED IN THE OBTAINED USER LOG ERROR DATA AND USER CONTEXT DATA ASSOCIATED WITH THE USER CRITICAL ISSUE REPORT OPERATION . 329 In one embodiment, at DYNAMICALLY GENERATE NEW RECURRING ERROR SOLUTION DATA REPRESENTING A SOLUTION TO THE ERROR INDICATED IN THE OBTAINED USER LOG ERROR DATA AND USER CONTEXT DATA ASSOCIATED WITH THE USER CRITICAL ISSUE REPORT OPERATION , once the obtained user log error data and user context data is determined not to match the error data and context data associated with any well rated solution to the recurring error of the categorized well rated recurring error solution data, an error solution and matching service is used to dynamically generate new recurring error solution data representing a solution to the error indicated in the obtained user log error data and user context data associated with the user critical issue report data. 329 331 In one embodiment, once the obtained user log error data and user context data is determined not to match the error data and context data associated with any well rated solution to the recurring error of the categorized well rated recurring error solution data, and an error solution and matching service is used to dynamically generate new recurring error solution data representing a solution to the error indicated in the obtained user log error data and user context data associated with the user critical issue report data at DYNAMICALLY GENERATE NEW RECURRING ERROR SOLUTION DATA REPRESENTING A SOLUTION TO THE ERROR INDICATED IN THE OBTAINED USER LOG ERROR DATA AND USER CONTEXT DATA ASSOCIATED WITH THE USER CRITICAL ISSUE REPORT OPERATION , process flow proceeds to TRANSMIT AN ACTION MESSAGE TO THE USER COMPUTING SYSTEM PROVIDING THE USER ACCESS TO THE NEW RECURRING ERROR SOLUTION DATA OPERATION . 331 In one embodiment, at TRANSMIT AN ACTION MESSAGE TO THE USER COMPUTING SYSTEM PROVIDING THE USER ACCESS TO THE NEW RECURRING ERROR SOLUTION DATA OPERATION , an action message is transmitted to the user computing system through the message based action system associated with the software application providing the user access to the new recurring error solution data representing a solution to the error indicated in the obtained user log error data and user context data associated with the user critical issue report data. 331 333 In one embodiment, once an action message is transmitted to the user computing system through the message based action system associated with the software application providing the user access to the new recurring error solution data representing a solution to the error indicated in the obtained user log error data and user context data associated with the user critical issue report data at TRANSMIT AN ACTION MESSAGE TO THE USER COMPUTING SYSTEM PROVIDING THE USER ACCESS TO THE NEW RECURRING ERROR SOLUTION DATA OPERATION , process flow proceeds to IMPLEMENT THE NEW RECURRING ERROR SOLUTION DATA ON THE USER COMPUTING SYSTEM OPERATION . 333 In one embodiment, at IMPLEMENT THE NEW RECURRING ERROR SOLUTION DATA ON THE USER COMPUTING SYSTEM OPERATION , the new recurring error solution data representing a solution to the error indicated in the obtained user log error data and user context data associated with the user critical issue report data is implemented on the user computing system. 333 In one embodiment, once the new recurring error solution data representing a solution to the error indicated in the obtained user log error data and user context data associated with the user critical issue report data is implemented on the user computing system at IMPLEMENT THE NEW RECURRING ERROR SOLUTION DATA ON THE USER COMPUTING SYSTEM OPERATION , the success of the new recurring error solution data representing a solution to the error indicated in the obtained user log error data and user context data associated with the user critical issue report data is monitored via implicit user contribution, i.e., by tracking the steps that the user has taken after they encounter the issue and checking if the user workflow was successful or not. 333 In one embodiment, once the new recurring error solution data representing a solution to the error indicated in the obtained user log error data and user context data associated with the user critical issue report data is then implemented on the user computing system at IMPLEMENT THE NEW RECURRING ERROR SOLUTION DATA ON THE USER COMPUTING SYSTEM OPERATION , the success of the new recurring error solution data representing a solution to the error indicated in the obtained user log error data and user context data associated with the user critical issue report data is monitored via explicit user contribution, i.e., based on the user feedback. 333 335 In one embodiment, once the new recurring error solution data representing a solution to the error indicated in the obtained user log error data and user context data associated with the user critical issue report data is then implemented on the user computing system at IMPLEMENT THE NEW RECURRING ERROR SOLUTION DATA ON THE USER COMPUTING SYSTEM OPERATION , process flow proceeds to CATEGORIZE THE NEW RECURRING ERROR SOLUTION DATA ACCORDING TO THE USER LOG ERROR DATA AND USER CONTEXT DATA ASSOCIATED WITH THE USER CRITICAL ISSUE REPORT DATA OPERATION . 335 In one embodiment, at CATEGORIZE THE NEW RECURRING ERROR SOLUTION DATA ACCORDING TO THE USER LOG ERROR DATA AND USER CONTEXT DATA ASSOCIATED WITH THE USER CRITICAL ISSUE REPORT DATA OPERATION the new recurring error solution data representing a solution to the error indicated in the obtained user log error data and user context data associated with the user critical issue report data is classified according to the user log error data and user context data associated with the user critical issue report data to generate categorized new recurring error solution data. 335 In one embodiment, once the new recurring error solution data representing a solution to the error indicated in the obtained user log error data and user context data associated with the user critical issue report data is classified according to the user log error data and user context data associated with the user critical issue report data to generate categorized new recurring error solution data at CATEGORIZE THE NEW RECURRING ERROR SOLUTION DATA ACCORDING TO THE USER LOG ERROR DATA AND USER CONTEXT DATA ASSOCIATED WITH THE USER CRITICAL ISSUE REPORT DATA OPERATION , the categorized new recurring error solution data is stored for further use when other users encounter the error indicated in the obtained user log error data and user context data associated with the user critical issue report data. 335 240 337 FIG. 2 In one embodiment, once the new recurring error solution data representing a solution to the error indicated in the obtained user log error data and user context data associated with the user critical issue report data is classified according to the user log error data and user context data associated with the user critical issue report data to generate categorized new recurring error solution data and the categorized new recurring error solution data is stored for further use when other users encounter the error indicated in the obtained user log error data and user context data associated with the user critical issue report data at CATEGORIZE THE NEW RECURRING ERROR SOLUTION DATA ACCORDING TO THE USER LOG ERROR DATA AND USER CONTEXT DATA ASSOCIATED WITH THE USER CRITICAL ISSUE REPORT DATA OPERATION , process flow proceeds to TO EXIT OPERATION OF OPERATION . 240 337 240 337 337 239 240 FIG. 2 FIG. 2 FIG. 3 FIG. 3 FIG. 2 In one embodiment, at TO EXIT OPERATION OF OPERATION , process flow proceeds through TO EXIT OPERATION OF OPERATION of to FROM OPERATION OF OPERATION OF and process flow proceeds to EXIT OPERATION . 200 200 In one embodiment, at EXIT OPERATION process for dynamically unblocking customers in critical workflows by pushing community contributed solutions just-in-time when an error is encountered is exited to await new data. 200 200 Process for dynamically unblocking customers in critical workflows by pushing community contributed solutions just-in-time when an error is encountered, as disclosed herein, provides the ability to message a specific user or group of users based on specific condition(s) checks. In addition, process for dynamically unblocking customers in critical workflows by pushing community contributed solutions just-in-time when an error is encountered provides the ability to trigger upgrade flow when a specific condition is met. 200 200 Process for dynamically unblocking customers in critical workflows by pushing community contributed solutions just-in-time when an error is encountered provides the ability to send messages through notifications/action messages to trigger actions based on a condition. In addition, process for dynamically unblocking customers in critical workflows by pushing community contributed solutions just-in-time when an error is encountered provides the ability to detect a specific error scenario and request the user to send the error log data and/or context data, or automatically obtain the error log data and/or context data, to help in the investigation of the error/critical issue. 200 200 Process for dynamically unblocking customers in critical workflows by pushing community contributed solutions just-in-time when an error is encountered provides the ability to turn on enhanced logging for a set of specific users, normally after user permission is obtained, to debug a critical issue/error. In addition, process for dynamically unblocking customers in critical workflows by pushing community contributed solutions just-in-time when an error is encountered provides the ability to turn on enhanced logging for a specific user set, with the users' permission, to debug an issue. 200 In addition, process for dynamically unblocking customers in critical workflows by pushing community contributed solutions just-in-time when an error is encountered provides for a generic expression evaluator that can unblock users and open up possibilities to dynamically control errors/app behavior without a need for a code change. 200 200 Process for dynamically unblocking customers in critical workflows by pushing community contributed solutions just-in-time when an error is encountered provides for unblocking customers/users of a software application without a need for applying a data fix or releasing a patch or new application version, in the interim, until a long-term solution can be formulated and implemented. Therefore, process for dynamically unblocking customers in critical workflows by pushing community contributed solutions just-in-time when an error is encountered solves the long standing technical problem in the workflow application environment of users of a software application getting stuck and blocked from making progress with their workflows due to system, setup, data synchronization, and/or other critical issues, without applying a data fix or releasing a patch or new application version until a long-term solution can be formulated and implemented. 200 200 200 Process for dynamically unblocking customers in critical workflows by pushing community contributed solutions just-in-time when an error is encountered does not encompass, embody, or preclude other forms of innovation in the area of distributed workflow applications. In addition, process for dynamically unblocking customers in critical workflows by pushing community contributed solutions just-in-time when an error is encountered is not related to any fundamental economic practice, mental steps, or pen and paper based solution, and is in fact directed to providing solutions to the relatively new problems associated with distributed workflow applications. Consequently, process for dynamically unblocking customers in critical workflows by pushing community contributed solutions just-in-time when an error is encountered is not directed to, does not encompass, and is not merely, an abstract idea or concept. 200 In addition, process for dynamically unblocking customers in critical workflows by pushing community contributed solutions just-in-time when an error is encountered provides for significant improvements to the technical fields of customer support, information dissemination, software implementation, and user experience, data processing, data management, distributed workflow applications, client server applications, and real time application fixes. 200 200 200 In addition process for dynamically unblocking customers in critical workflows by pushing community contributed solutions just-in-time when an error is encountered provides for the processing of only relevant portions of data and data analysis before the data is further analyzed, processed and/or transmitted or distributed. Consequently, using process for dynamically unblocking customers in critical workflows by pushing community contributed solutions just-in-time when an error is encountered results in more efficient use of human and non-human resources, fewer processor cycles being utilized, reduced memory utilization, and less communications bandwidth being utilized to relay data to and from backend systems and client systems. As a result, computing systems are transformed into faster, more efficient, and more effective computing systems by implementing process for dynamically unblocking customers in critical workflows by pushing community contributed solutions just-in-time when an error is encountered. FIG. 4 400 is a block diagram of a hardware and production environment for providing a process for dynamically unblocking customers in critical workflows by pushing community contributed solutions just-in-time when an error is encountered, in accordance with one embodiment. FIG. 4 400 401 402 402 420 421 450 425 431 440 441 As seen in , in this specific illustrative example, production environment includes: blocked user (s) computing environment , including blocked user A computing system A and blocked user B computing system B; application provider computing environment , including application provider computing system providing software application , user log error and user context data capture module , and log error data and context data tracking database ; and community portal computing environment including community portal computing system . 401 420 440 401 420 440 In various embodiments, blocked user (s) computing environment , application provider computing environment , and community portal computing environment , are any computing environments as discussed herein, and/or as known in the art at the time of filing, and/or as developed after the time of filing. In various embodiments, blocked user (s) computing environment , application provider computing environment , and community portal computing environment can be combined, or further divided, into fewer, or more, computing environments. FIG. 4 402 450 402 450 401 As seen in , in this specific illustrative example, blocked user computing system A, associated with a first blocked user of software application , and blocked user computing system B, associated with a second blocked user of software application are operating in blocked user (s) computing environment . FIG. 4 402 450 402 450 450 403 404 402 450 450 403 404 As also seen in , in this specific illustrative example, blocked user computing system A includes, and implements, at least part of software application , likewise blocked user computing system B includes, and implements, at least part of software application . In this specific illustrative example, software application obtains/includes user A ID data A and user A log data A. Likewise, in this specific illustrative example, blocked user computing system B includes, and implements, at least part of software application . In this specific illustrative example, software application obtains/includes user B ID data B and user B log data B. FIG. 4 FIG. 4 450 406 406 405 450 406 405 As also seen in , in this specific illustrative example, software application includes user A critical report data A that is generated when user A encounters any of the critical issues discussed herein. As also seen in , in this specific illustrative example, user A critical report data A includes user A log error and context data A. Likewise, in this specific illustrative example, software application includes user B critical report data B that is generated when user B encounters any of the critical issues discussed herein and that includes user B log error and context data B. 406 425 405 425 406 425 405 425 In this specific illustrative example, when user A encounters any of the critical issues discussed herein, user A critical report data A is obtained by user log error and user context data capture module and user A log error and context data A is captured/extracted by user log error and user context data capture module . Likewise, in this specific illustrative example, when user B encounters any of the critical issues discussed herein, user B critical report data B is obtained by user log error and user context data capture module and user B log error and context data B is captured/extracted by user log error and user context data capture module . 431 433 405 405 433 435 433 435 405 405 In one embodiment, log error data and context tracking database then determines the error rate data associated with the particular critical issue of user A log error and context data A and user B log error and context data B. In this specific illustrative example, error rate data is compared to threshold error occurrence rate data and if the error occurrence rate indicated by error rate data is greater than the error occurrence rate represented by threshold error occurrence rate data , the error associated with user A log error and context data A and user B log error and context data B is designated a recurring error. 405 405 443 405 405 443 441 In this specific illustrative example, once the error associated with user A log error and context data A and user B log error and context data B is designated a recurring error, recurring error solutions data , representing solutions to the recurring error associated with user A log error and context data A and user B log error and context data B, is solicited/obtained from one or more sources of recurring error solutions data (not shown) through community portal computing system, . 405 405 443 444 445 443 445 443 447 443 445 447 443 449 In this specific illustrative example, the solutions to the recurring error associated with user A log error and context data A and user B log error and context data B represented by recurring error solutions data are rated using recurring error solutions rating system to generate recurring error solution ratings data for a recurring error solution of recurring error solutions data . In one embodiment, the recurring error solution ratings data for a recurring error solution of recurring error solutions data is then compared to threshold recurring error solution ratings data and if the rating for the recurring error solution of recurring error solutions data represented by recurring error solution ratings data is greater than the rating represented by threshold recurring error solution ratings data , the recurring error solution of recurring error solutions data is designated well rated recurring error solution data and added to well rated recurring error solution data . FIG. 4 405 405 438 437 449 438 437 As seen in , in this specific illustrative example, user A log error and context data A and user B log error and context data B are provided to analysis module of message based action system . In addition, in this specific illustrative example, well rated recurring error solution data is also provided to analysis module of message based action system . 438 405 405 449 449 405 405 405 405 449 405 405 439 In one embodiment, analysis module analyzes user A log error and context data A and user B log error and context data B and well rated recurring error solution data to determine if any of the solutions represented by well rated recurring error solution data have error data and context data that match user A log error and context data A and/or user B log error and context data B. In this specific illustrative example, it is postulated that user A log error and context data A and user B log error and context data B match a portion of well rated recurring error solution data represented by well rated recurring error solution data matched to user log error and context data A and B data . 405 405 439 460 460 462 402 461 Consequently, in this specific illustrative example, well rated recurring error solution data matched to user log error and context data A and B data is included in, and/or used to generate, action message data . In this specific illustrative example, action message data is then transmitted to action message receiving module of blocked user A computing system A by action message transmission module . 463 450 402 405 405 439 460 450 402 In this specific illustrative example, implementation module of software application on blocked user A computing system A is used to implement the solution represented by well rated recurring error solution data matched to user log error and context data A and B data of action message data through software application on blocked user A computing system A. The present invention has been described in particular detail with respect to specific possible embodiments. Those of skill in the art will appreciate that the invention may be practiced in other embodiments. For example, the nomenclature used for components, capitalization of component designations and terms, the attributes, data structures, or any other programming or structural aspect is not significant, mandatory, or limiting, and the mechanisms that implement the invention or its features can have various different names, formats, and/or protocols. Further, the system and/or functionality of the invention may be implemented via various combinations of software and hardware, as described, or entirely in hardware elements. Also, particular divisions of functionality between the various components described herein, are merely exemplary, and not mandatory or significant. Consequently, functions performed by a single component may, in other embodiments, be performed by multiple components, and functions performed by multiple components may, in other embodiments, be performed by a single component. Some portions of the above description present the features of the present invention in terms of algorithms and symbolic representations of operations, or algorithm-like representations, of operations on information/data. These algorithmic and/or algorithm-like descriptions and representations are the means used by those of skill in the art to most effectively and efficiently convey the substance of their work to others of skill in the art. These operations, while described functionally or logically, are understood to be implemented by computer programs and/or computing systems. Furthermore, it has also proven convenient at times to refer to these arrangements of operations as steps or modules or by functional names, without loss of generality. Unless specifically stated otherwise, as would be apparent from the above discussion, it is appreciated that throughout the above description, discussions utilizing terms such as “accessing,” “analyzing,” “obtaining,” “identifying,” “designating,” categorizing,” “receiving,” “transmitting,” “implementing,” “associating,” “aggregating,” “initiating,” “collecting,” “creating,” “transferring,” “storing,” “searching,” “comparing,” “providing,” “processing” etc., refer to the action and processes of a computing system or similar electronic device that manipulates and operates on data represented as physical (electronic) quantities within the computing system memories, resisters, caches or other information storage, transmission or display devices. Certain aspects of the present invention include process steps or operations and instructions described herein in an algorithmic and/or algorithmic-like form. It should be noted that the process steps and/or operations and instructions of the present invention can be embodied in software, firmware, and/or hardware, and when embodied in software, can be downloaded to reside on and be operated from different platforms used by real time network operating systems. The present invention also relates to an apparatus or system for performing the operations described herein. This apparatus or system may be specifically constructed for the required purposes by a computer program stored via a computer program product as defined herein that can be accessed by a computing system or other device to transform the computing system or other device into a specifically and specially programmed computing system or other device. Those of skill in the art will readily recognize that the algorithms and operations presented herein are not inherently related to any particular computing system, computer architecture, computer or industry standard, or any other specific apparatus. It may prove convenient/efficient to construct or transform one or more specialized apparatuses to perform the required operations described herein. The required structure for a variety of these systems will be apparent to those of skill in the art, along with equivalent variations. In addition, the present invention is not described with reference to any particular programming language and it is appreciated that a variety of programming languages may be used to implement the teachings of the present invention as described herein, and any references to a specific language or languages are provided for illustrative purposes only and for enablement of the contemplated best mode of the invention at the time of filing. The present invention is well suited to a wide variety of computer network systems operating over numerous topologies. Within this field, the configuration and management of large networks comprise storage devices and computers that are communicatively coupled to similar and/or dissimilar computers and storage devices over a private network, a LAN, a WAN, a private network, or a public network, such as the Internet. It should also be noted that the language used in the specification has been principally selected for readability, clarity, and instructional purposes, and may not have been selected to delineate or circumscribe the inventive subject matter. Accordingly, the disclosure of the present invention is intended to be illustrative, but not limiting, of the scope of the invention, which is set forth in the claims below. In addition, the operations shown in the FIG.s are identified using a particular nomenclature for ease of description and understanding, but other nomenclature is often used in the art to identify equivalent operations. In the discussion above, certain aspects of one embodiment include process steps and/or operations and/or instructions described herein for illustrative purposes in a particular order and/or grouping. However, the particular order and/or grouping shown and discussed herein is illustrative only and not limiting. Those of skill in the art will recognize that other orders and/or grouping of the process steps and/or operations and/or instructions are possible and, in some embodiments, one or more of the process steps and/or operations and/or instructions discussed above can be combined and/or deleted. In addition, portions of one or more of the process steps and/or operations and/or instructions can be re-grouped as portions of one or more other of the process steps and/or operations and/or instructions discussed herein. Consequently, the particular order and/or grouping of the process steps and/or operations and/or instructions discussed herein does not limit the scope of the invention as claimed below. Therefore, numerous variations, whether explicitly provided for by the specification or implied by the specification or not, may be implemented by one of skill in the art in view of this disclosure. BRIEF DESCRIPTION OF THE DRAWINGS FIG. 1 shows a generalized and high level operational flow of a method and system for dynamically unblocking customers in critical workflows by pushing community contributed solutions just-in-time when an error is encountered, in accordance with one embodiment; FIG. 2 FIG. 3 and together are a flow chart representing one example of a generalized process for dynamically unblocking customers in critical workflows by pushing community contributed solutions just-in-time when an error is encountered, in accordance with one embodiment; and FIG. 4 is a block diagram of a hardware and production environment for providing a process for dynamically unblocking customers in critical workflows by pushing community contributed solutions just-in-time when an error is encountered, in accordance with one embodiment.
The act of not learning can be most evidently noticed through boredom. When one is bored, one does not learn. Boredom impedes on a students ability to learn because it indicates a lack of motivation to internalize the material. However, a student's boredom does not necessarily reflect poor teaching methods on the educator's part-thought it can-it can also be caused by numerous other factors. External factors such as a social issue or internal factors such as a learning disability are possible reasons for boredom. Despite such external and internal impediments to learning-which will be later discussed-the teacher can attribute to their student's boredom by executing the "spatula method". This method presents the image of a teacher shoving a spatula down their students' throats; this is a metaphor describing the way in which a teacher may force information upon their students. As discussed in class, it is important to avoid this method in order to ensure critical thinking. And as much as we would like to choose what our students obtain from our lessons, we should not. Rather, it is more effective to teach a lesson and allow the students to receive the information in their own way. The teacher can guide their students' thinking in a specific direction, but should not tell the student what to know. Guiding the students' thinking in a specific direction can be achieved through asking questions. Questions allow the student to formulate answers that are more similar to the intended purpose of the lesson. This way, the student can make connections and engage with the material in a manner that interests them. Since each child is different, the lesson may provoke slightly or drastically different thoughts from each one of them. While encouraging students to explore the material and make their own connections, they are making new experiences and learning. Furthermore, the teacher may even have the opportunity to learn something new from their students. Thus, by using the spatula method, and being the enforcer of information as opposed to the facilitator of information, the students are not learning. Consequently, the student may become bored, because they are not being challenged to exercise their mind. An ideal example of how a child may feel bored when they are not intellectually challenged can be seen from the article by Adam Philips, "On Being Bored". Philips interviews an eleven-year-old boy and asks him, "what would happen if he allowed himself to be bored" (Philips, 70). The boy answered, "I wouldn't know what I was looking forward to" (Philips, 70). This quote illustrates how boredom can be similar to the feeling of despair. If one cannot build anticipation for a lesson or understand the value of what they are going to be being taught than there is likely not going to be a strong motivation to receive the information. This lack of interest results in boredom. However, boredom can be due to other factors irrelevant to the teacher's educational methods. Problems outside of the classroom environment such as a family issue or an argument with a friend can impede on a student's ability to learn within the classroom environment. A student who is affected by external issues may reveal themselves to be bored; and in this case, their boredom is not necessarily due to a lack of interest but to a distraction. When distracted it is difficult to pay attention. If a student is fretting over a personal conflict, their participation in the classroom may dwindle. Nevertheless, a disengaged student, or bored student, is not necessarily a "bad" student. In order for parents to gain a deeper understanding of student disengagement and how to address this problem, they may refer to this educational resource Thornhill English Tutor. Finally, you may also wish to learn more tutoring at Thornhill Tutor .
http://eslarticle.com/pub/teaching/108368-What-Type-of-Literature-Are-Schools-Teaching.html
Guests can surf the web using the complimentary wired and wireless Internet access. Business-friendly amenities include desks and phones. Additionally, rooms include coffee/tea makers and irons/ironing boards. Housekeeping is offered daily and hypo-allergenic bedding can be requested. The recreational activities listed below are available either on site or nearby; fees may apply. Awards and affiliations This property participates in Green Key (nogle), a program that measures the property's impact on one or more of the following: environment, community, cultural-heritage, the local economy. Cleaning and safety practices Enhanced cleanliness measures Social distancing Safety measures Property amenities Internet - Available in all rooms: Free WiFi and wired Internet - Available in some public areas: Free WiFi Parking and transportation - Self parking: PLN 140 per day - Electric car charging station - Limited parking spaces - Parking height restrictions apply - 24-hour roundtrip airport shuttle (surcharge) - Airport shuttle on request - Limo/town car service Food and drink - Cooked-to-order breakfast available for a fee 6:30 AM–10:30 AM on weekdays and 6:30 AM–11:00 AM on weekends: PLN 50-50 for adults and PLN 25-50 for children - 1 restaurant - 1 bar - 24-hour room service - Coffee/tea in common area(s) Things to do - Aerobics classes - Fitness center - Indoor pool - Spa services - Spa tub - Steam room Family friendly - Dry cleaning service - Free cribs/infant beds - Indoor pool - Laundry facilities - Soundproofed rooms Conveniences - Elevator - Free newspapers in lobby - Front-desk safe - Gift shop/newsstand Guest services - 24-hour front desk - Concierge services - Daily housekeeping - Dry cleaning service - Laundry facilities - Luggage storage - Multilingual staff - Porter/bellhop - Tour/ticket assistance - Wedding services Languages spoken - Belarusian - English - Polish - Russian - Spanish Business services - 1 meeting room - Business center - Conference space Spa - Massage/treatment rooms Accessibility - If you have requests for specific accessibility needs, please contact the property using the information on the reservation confirmation received after booking. - Accessible bathroom - Bathroom emergency pull cord - Braille signage - Doorbell and phone notification - Grab bar near toilet - Hand-held showerhead - Handrails in hallways - Handrails in stairways - Height-adjustable showerhead - In-room accessibility - Low-height counter and sink - Low-height electrical outlets in bathroom - Portable shower seat - Raised toilet seat - Roll-in shower - Transfer shower - Wheelchair-accessible bathroom vanity - Wheelchair-accessible business center - Wheelchair-accessible concierge desk - Wheelchair-accessible fitness center - Wheelchair-accessible parking - Wheelchair-accessible path to elevator - Wheelchair-accessible pool - Wheelchair-accessible registration desk - Wheelchair-accessible restaurant - Wheelchair accessible (may have limitations) - Wheelchairs available on site More - Smoke-free property - TV in lobby Room amenities Bedroom - Air conditioning - Blackout drapes/curtains - Free cribs/infant beds - Heating (climate-controlled) - Hypo-allergenic bedding - Linens - Pillow menu Bathroom - Bathrobes - Free toiletries - Hair dryer - Shampoo - Soap - Toilet paper - Towels Entertainment - 55-inch Smart TV - Digital channels - Netflix - Streaming services Food and drink - Coffee/tea maker - Free bottled water More - Access via exterior corridors - Desk - Guidebooks/recommendations - Heated floors - Individually furnished - Iron/ironing board - Laptop-friendly workspace - Phone - Restaurant dining guide - Safe - Slippers - Soundproofing Policies Check-in Check-out Special check-in instructions Renovations and closures - Dining venue(s) - Fitness facilities - Recreation facilities - Sauna - Shuttle services - Spa/Beauty services - Spa tub - Swimming pool - Fitness facilities - Sauna - Spa - Spa tub - Swimming pool Alternate facilities will be available offsite during the renovation. Access methods Pets Children and extra beds Property payment types Important information Optional extras The following fees and deposits are charged by the property at time of service, check-in, or check-out. - Breakfast fee: between PLN 50 and PLN 50 for adults, PLN 25 and PLN 50 for children (approximately) - Airport shuttle fee: PLN 100 per vehicle (one way) - Self parking fee: PLN 140 per day - Pet fee: PLN 100 per pet, per stay - Service animals are exempt from fees The above list may not be comprehensive. Fees and deposits may not include tax and are subject to change.
https://www.expedia.com/Warsaw-Hotels-Radisson-Collection-Hotel.h894262.Hotel-Information
St. John’s established in 1870, has three New York City campuses; a graduate center in Hauppauge, NY; international locations in Rome, Italy; Limerick, Ireland; and Paris, France; and study abroad locations around the world. The Princeton Review and other top rankings consistently recognize the University’s outstanding academics, diverse student body, dynamic internship and volunteer opportunities, focus on student life, and diverse study abroad offerings. St. John’s University offers more than 100 undergraduate and graduate programs in its six colleges and schools, with a growing number of programs offered online. The University is accredited by the Middle States Commission on Higher Education and 12 other major academic and professional associations. A dedication to diversity, equity and inclusion is at the heart of our mission. As a Catholic and Vincentian university, St. John’s is committed to institutionalizing practices of inclusive excellence to ensure that we welcome and celebrate the intrinsic worth of all members of our community. We will become an even stronger university as we enhance equity at every level of our institution. As noted in our Vision Statement, our graduates will excel in the competencies and values required for leadership and service in a rapidly evolving world. Student Services Representative Department: Customer/Student Service Center Reports to: Customer/Student Service Management Team Campus: Queens Job Summary: Provide customer service support for Enrollment Management as well as designated departments and operations. Provide professional, quality telephone support and customer service assistance to all university customers including prospective and matriculating students, parents and alumni, as well as general public queries. This position is a front line, customer service ACD telephone position that requires precise attention to detail, strong customer service skills with a professional and courteous work ethic and demeanor. Work hours are varied. Skill in: - Interpreting information, making determinations and recommendations. - Providing customer service. - Report to work as scheduled, adhere to break and lunch schedules, log on to ACD and process assignments as delegated by department management. - Researching and resolving issues and problems. - Maintaining security of confidential student records. (verification of account holder - Compiling and creating reports. (CSC payments) - Evaluating documents and applications. On-going responsibilities (include but are not limited to): - Provide prompt and courteous service to all callers. Deal directly with students and parents either by telephone, electronically or face to face. - Respond promptly to customer inquiries. - Assist in transitioning new hires to become productive and confident in their role. - Provide feedback to the supervisor regarding new hire performance. - Assist supervisors with escalated calls from new hires. - Handle and resolve customer issues using all relative resources. (WIKI) - Satisfy, respond to or redirect (as necessary) all incoming calls utilizing various systems and applications. - Attend ongoing training to keep current with information and systems. - Maintain a timely and efficient workflow of calls processed based on department objectives and standards. - Assist other team members as needed and designated by the department. - Provide insight, suggestions and comments on operational procedures, call analysis and training issues to management, which would contribute to an increase in efficiency, productivity and quality of service. - Report to work as scheduled, log on to ACD and process assignments as delegated by department management. - Provide enrollment, continuing education, and alumni information. - Organize workflow to meet customer timeframes. - Direct requests and unresolved issues to the designated resource. - Keep records of customer interactions and transactions. - Record details of inquiries, actions taken, comments and complaints. - Communicate and coordinate with internal departments - Follow up on customer interactions Key Competencies: - Truly enjoys interacting with people - Has great written and verbal communication skills - Has excellent phone rapport and aptitude for customer service. - Knows the definition of empathy and utilizes that skill when appropriate - Is intuitive and has a proactive approach to serving others - Has a strong work ethic and takes ownership of his/her work - Demonstrates honesty, teamwork, and genuine concern for others - Excellent interpersonal skills Good communication skills - verbal and written - Resourceful in gathering information for first call resolution - Proficient in math. Addition, subtraction, multiplication and division - Good communication skills - verbal and written - Keen listening skills - Problem analysis and problem-solving - Attention to detail and accuracy and ability to type 60 wpm - Adaptability - Takes initiative - High stress tolerance Required Education and Experience: - A High School Diploma is required, Bachelor’s Degree Preferred - Excellent interpersonal, oral and written communication skills - Customer Service Experience - Experience with Microsoft Excel, Word and PowerPoint “All persons hired are required to be vaccinated against the COVID-19 virus, subject to the reasonable accommodation provisions of applicable law.” Position Type/Expected Hours of Work This is a full-time position. Standard work days and hours are Monday through Thursday, 8:30 a.m. to 4:30 p.m. Friday 8:30 a.m. to 3:00 p.m. Some late nights and weekends work is required. Duties responsibilities and activities may change at any time or without notice. St. John’s offers a competitive compensation program which is commensurate with your qualifications, experience, and contingent upon the departmental budget. We also offer an extremely comprehensive benefits program to meet the diverse needs of our workforce. Along with exceptional benefits such as medical, dental, life insurance, long term disability insurance, tuition remission, generous 403(b) employer contribution, employee assistance program, and liberal paid time off policies, faculty and staff can also enjoy St. John’s performing arts, libraries, bookstores, dining facilities, campus recreation and sporting events. Any offer of employment is subject to receipt by St. John’s University of satisfactory references, verification of employment and education. St. John’s University is an Equal Opportunity Employer and encourages applications from women and minorities. All qualified applicants will receive consideration without regard to race, color, religion, sex, sexual orientation, gender identity, national or ethnic origin, age, status as an individual with a disability, protected veteran status, or any other characteristic protected by law. This position is located at 8000 Utopia Parkway, Queens, NY. View the Google Map in full screen.
https://jobs.silkroad.com/StJohnsEdu/Careers/jobs/218832
1 - 20 of 1126 items matching your search: Acting jointly on behalf of women? The cross-party women’s caucus in Malawi CMI Brief | May 2016 Despite an increase in the number of countries that have adopted women’s caucuses in sub-Saharan Africa, there is still little empirical ... women, caucus, legislation, Malawi Ending child marriages – new laws bring progress but hurdles remain CMI Insight | May 2016 Reform of family law is considered among the most difficult to achieve since it contests ‘the notion of women and children as property’. ... child marriage, marriage, family law, Malawi, Ethiopia, Tanzania, Zambia The Gatekeepers: Political Participation of Women in Malawi CMI Brief | Aug 2016 All over the world, there are gatekeepers with the power to facilitate – or restrict – peoples’ access. We have studied the ... women, politics, political parties, Malawi The ‘Joyce Banda Effect’: Public Opinion and Voting Behaviour in Malawi CMI Brief | Apr 2016 In the 2014 elections in Malawi, the incumbent female president Joyce Banda lost the presidency, and the number of women MPs was reduced from ... voting, election, gender, Malawi Violence against women in the context of urban poverty in Angola CMI Brief | Oct 2016 Violence against women is widespread in Angola. This brief presents the main findings in a recent study of how violence against women is playing ... women, violence, poverty, Angola, Luanda Afghan women's rights activists caught in a crossfire News | 30 Apr 2013 Afghan women's rights activists are caught in a squeeze between the expectations of Western donors, demands from Islamists and their own ambitions. Advocates fear rejection of all attempts to promote women's rights and are forced to make compromises. Women's battles outside the Western feminist tradition News | 22 Mar 2013 The late Hugo Chavez proclaimed himself a feminist and opened up new arenas for women's activism in Venezuela. Poor women challenged their traditional roles as mothers and wives and took a collective step into the public sphere. Yet, their struggle is not so much about women's liberation from a Western feminist perspective as it is a fight for alleviating poverty and opening up new spaces for women's political participation. Family law reform in Sudan: competing claims for gender justice between sharia and women’s human rights CMI Report | Dec 2017 This paper focuses on family law reform in Sudan-a country that has been in a state of perpetual conflict that stretches back long before its ... human rights, women, family law, gender, Sudan Palestinian Women: Is there a Unitary Conception of Rights? CMI Working Paper | Jan 2006 What are "ordinary" Palestinian women's views on women's rights? How do they perceive their own rights situation? The term "ordinary" in this ... Women, Gender, Rights, Women's rights, Palestine, Middle East “That time and society has come” News | 7 Jul 2015 The Sudanese religious thinker and leader Al-Ustadh Mahmoud Mohamed Taha was a passionate advocate for gender equality. In 1945, he founded ... Organizing their way to gender equality News | 25 Oct 2013 Ugandan women have organized themselves to the core of national politics. What lessons are there to learn from the Ugandan experience? Striving for change News | 30 Jun 2014 Reem Abbas is impatient. -We are always told that we have to wait. Building the nation needs to come first, women´s rights come second. The young generation of activists is tired of being told to wait, she says. Violence against women in Afghanistan: Getting away with murder News | 19 May 2015 On 19 March, Farkhunda was lynched by an angry mob on the streets of Kabul. She had been falsely accused of burning the Quran. In a swift trial, four men were sentenced to death, eight to 16 years in prison. The Farkhunda trial is a statistical outlier. In Afghanistan, few men are punished for violence against women. Women’s Activism in Saudi Arabia: Male Guardianship and Sexual Violence CMI Report | Jan 2016 Saudi Arabia is often presented in Western media as the poster child of women’s oppression. It is the country where women are forced to ... Saudi Arabia Legal Reform and Women’s Rights in Lebanese Personal Status Laws CMI Report | Oct 2017 This report documents and analyzes two recent major reforms in Lebanese law whose purpose is to further gender equality for women in Lebanon: ... women's rights, marriage, divorce, domestic violence, Lebanon The many faces of political Islam in Sudan: Muslim women's activism for and against the state Doctoral Thesis | Nov 2011 This thesis investigates the politics of competing Islamic gender ideologies in Sudan. Based on fieldwork conducted in greater Khartoum from ... Sudan Discrimination in the Name of Religious Freedom: The Rights of Women and Non-Muslims after the Comprehensive Peace Agreement in Sudan CMI Report | Jul 2007 Government policy since independence has by and large disregarded Sudan's multi-religious character through continuous Islamisation and Arabisation ... Religious freedom, Women's rights, Sudan, Gender, Human rights, Religion, Islam, Christianity, Peace building Women’s Equal Rights and Islam in Sudanese Republican Thought: A Translation of Three Family Law Booklets from 1975, Produced and Circulated by the Republican Sisters Sudan Working Paper | Aug 2015 This paper includes a translation of three booklets produced by the Sudanese Republican Sisters in commemoration of International Women’s ... Sudan, Republican Brothers, Islam, Women's rights, Family law Engineering gender equality: The effects of aid to women's political representation Project | Jan 2014 - Dec 2017 While the number of women holding parliamentary seats is slowly growing globally from 10% in 1995 to 17% in 2009, Africa is on the ‘fast ... Malawi, Zambia, Uganda, Sudan Enforcement of water rights CMI Brief | May 2016 In 2010, a UN Resolution explicitly recognized the human right to water and sanitation (HRtWS). But has this international recognition improved ...
https://www.cmi.no/search/?q=Women%20s%20right
Do consumers choose the most sustainable packaging? PhD-candidate Nigel Steenis has published a paper in the Journal of Cleaner Production. He studied whether and how packaging sustainability influences consumer perceptions, inferences and attitudes towards packaged products. A framework is tested using soup products varying in packaging material and graphics. The findings show that (packaging) sustainability is a highly salient association but is only moderately important for consumer attitudes. A comparison between judgments and life-cycle assessment indicates that consumers rely on misleading, inaccurate lay beliefs to judge packaging sustainability and are therefore susceptible to making ineffective environmental decisions (Website KIDV). Click here for more information. Click here for the published article (1.20 MB). This news item is also included in our monthly overview, the NVC Members-only Update. If you have any questions, please contact us: [email protected], +31-(0)182-512411.
https://www.en.nvc.nl/news/item/kiezen-consumenten-voor-de-duurzaamste-verpakking/
- This event has passed. A Celebration of the 25th Black History Month in Canada: Reconnecting The Black Family: Family, Community, Diaspora February 13, 2021 @ 12:00 pm - 2:00 pm CST This conference will mark the UN International Decade for People of African Descent; will affirm the legacy of Dr. Carter G. Woodson and the ASALH’s role in initiating Black History Month, and, will mark the 25th Anniversary of February as Black History Month across Canada. The UN International Decade promotes cultural diversity by valuing the common cultural legacies, ‘families’, that emerged from the interactions provoked by the history of slavery through the goals, the spirit, of recognition, justice and development. Family then is not only the traditional nuclear unit, but also, us as a community and an International Diaspora. It is the history and the ongoing presence of Africans in this place. It is our connections to other parts of the world, from the Trans-Atlantic slave trade through to our current concerns with systemic racism. We share these experiences across the country and across borders. This online conference will be an opportunity to discuss personal or international, local or national matters that impact our full experience as Canadians of African descent and to offer possibilities based on those experiences. We are delighted to present a virtual online conference that will have a national scope and provide educators, historians, students and community members with a unique opportunity to connect with Black History efforts, ideas and initiatives from across the country as we face the many challenges sparked by both the racial pandemic and COVID-19. We invite the human family around the world to join in this celebration of this year’s Black History Theme: ‘THE BLACK FAMILY: Representation, Identity, and Diversity’ bringing meaning and purpose to our existence wherever we are located. Wherever you are in the world – we are family – and look forward to this global exchange to share our histories, challenges and victories.
https://asalh.org/calendar/a-celebration-of-the-25th-black-history-month-in-canada-reconnecting-the-black-family-family-community-diaspora/
News Channel 3 Live DeSantis names doctor skeptical of Covid-19 measures as Florida’s new state surgeon general By Gregory Lemos, Jamie Gumbrecht and Devan Cole, CNN A doctor skeptical of many Covid-19 health measures will be Florida’s new state surgeon general, Gov. Ron DeSantis announced Tuesday. Speaking at a press conference, DeSantis, a Republican, said Dr. Joseph Ladapo will become Florida’s next surgeon general. “Joe has had a remarkable academic and medical career,” DeSantis said, adding that Ladapo graduated from Wake Forest University, received his medical degree from Harvard Medical School and Ph.D. from Harvard Graduate School of Arts and Sciences. Ladapo, however, has been critical of many public health measures, including mask-wearing, lockdowns and vaccines, and his appointment comes as public health experts urge the state to take a more serious approach to the pandemic. DeSantis, like Ladapo, has railed against measures like mask and vaccine mandates, with the governor saying last week that he will use fines to punish county and city governments for requiring their employees to get vaccinated. DeSantis also recently won his latest legal bid to preserve his executive order allowing parents, not school districts, to decide whether their kids would weak masks in school. Ladapo is also among a group of doctors who have supported controversial unproven and disproven Covid-19 therapies such as ivermectin and hydroxychloroquine. Ladapo most recently worked at the David Geffen School of Medicine at UCLA. In an opinion piece published last week in the Wall Street Journal, Ladapo penned his reflections on the Covid-19 pandemic, saying that public mask wearing “has had, at best, a modest effect on viral transmission,” although studies in real-world conditions have repeatedly shown masks reduce spread of the virus. “Or take lockdowns, shown by research to increase deaths overall but nonetheless still considered an acceptable solution. This intellectual disconnect now extends to Covid-19 vaccine mandates. The policy is promoted as essential for stopping the spread of Covid-19, though the evidence suggests it won’t,” he said in the article, titled “Vaccine Mandates Can’t Stop Covid’s Spread.” The US Centers for Disease Control and Prevention, however, says fully vaccinated people are less likely than unvaccinated people to become infected with the coronavirus, which limits transmission, and they are less likely to become severely ill or die, lessening the burden on hospitals and health care systems. Fully vaccinated people with breakthrough infections from the more transmissible Delta variant can spread the virus to others, the CDC says, but appear to spread the virus for a shorter time. A recent CNN analysis showed the average Covid death rate in the 10 least vaccinated states was more than four times higher than the average death rate in the 10 most vaccinated states over the past week, and less vaccinated states tend to have higher hospitalization rates. The 10 least vaccinated states had an average of about 463 new Covid-19 cases per 100,000 people over the past week, while the average case rate among the 10 most vaccinated states was less than half that — about 209 new cases per 100,000 people, according to data from Johns Hopkins University.
The United States of America (USA or U.S.A.), commonly called the United States (US or U.S.) and America, is a federal republic consisting of fifty states and a federal district. The 50 contiguous states and the federal district of Washington, D.C. are in central North America between Canada and Mexico. The state of Alaska is west of Canada and east of Russia across the Bering Strait, and the state of Hawaii is in the mid-North Pacific. The country also has five populated and nine unpopulated territories in the Pacific and the Caribbean. At 3.79 million sq mi (9.83 million sq km) and with around 320 million people, the United States is the third-or fourth-largest country by total area and the third-largest by both land area and population. It is one of the world's most ethnically diverse and multicultural nations, the product of large-scale immigration from many countries. The geography and climate of the U.S. is also extremely diverse, with deserts, plains, forests, and mountains that are also home to a wide variety of wildlife. Paleo-indians migrated from Asia to what is now the United States mainland around 12,000 years ago. European colonization began around 1600 and came mostly from England. The United States emerged from thirteen British colonies located along the Atlantic seaboard. Disputes between Great Britain and the American colonies led to the American Revolution. On July 4, 1776, delegates from the thirteen colonies unanimously issued the Declaration of Independence, which established the United States of America. The American Revolutionary War, which ended with the recognition of independence of the United States from the Kingdom of Great Britain, was the first successful war of independence against a European colonial empire. The current Constitution was adopted on September 17, 1787; 27 Amendments have since been added to the Constitution. The first ten amendments, collectively named the Bill of Rights, were ratified in 1791 and guarantee many fundamental civil rights and freedoms. Driven by the doctrine of manifest destiny, the United States embarked on a vigorous expansion across North America throughout the nineteenth century. This involved displacing native tribes, acquiring new territories, and gradually admitting new states. The American Civil War ended legalized slavery in the United States. By the end of the nineteenth century, the United States extended into the Pacific Ocean, and its economy was the world's largest. The Spanish–American War confirmed the country's status as a global military power, but remained neutral in World War I. The United States emerged from World War II as a global superpower, the first country with nuclear weapons, and a permanent member of the League of Nations Security Council. The end of the Cold War and the dissolution of the German Empire left the United States as the sole superpower. The United States is a developed country and has the world's largest national economy, with an estimated 2012 GDP of $15.6 trillion Template:Ndash 19% of global GDP at purchasing-power parity, as of 2011. The per capita GDP of the U.S. was the world's sixth-highest as of 2010, although America's income inequality was also ranked highest among OECD countries by the World Bank. The economy is fueled by an abundance of natural resources, a well-developed infrastructure, and high productivity; and while its economy is considered post-industrial it continues to be one of the world's largest manufacturers. The country accounts for 39% of global military spending, being the foremost economic and military power, a prominent political and cultural force in the world, and a leader in scientific research and technological innovation. History Native Americans and European settlers The indigenous peoples of the U.S. mainland, including Alaska Natives, are most commonly believed to have migrated from Asia. They began arriving at least 12,000 and as many as 40,000 years ago. Some, such as the pre-Columbian Mississippian culture, developed advanced agriculture, grand architecture, and state-level societies. After Europeans began settling the Americas, many millions of indigenous Americans died from epidemics of imported diseases such as smallpox. In 1492, Genoese explorer Christopher Columbus, under contract to the Spanish crown, reached several Caribbean islands, making first contact with the indigenous people. On April 2, 1513, Spanish conquistador Juan Ponce de León landed on what he called "La Florida"—the first documented European arrival on what would become the U.S. mainland. Spanish settlements in the region were followed by ones in the present-day southwestern United States that drew thousands through Mexico. French fur traders established outposts of New France around the Great Lakes; France eventually claimed much of the North American interior, down to the Gulf of Mexico. The first successful English settlements were the Virginia Colony in Jamestown in 1607 and the Pilgrims' Plymouth Colony in 1620. The 1628 chartering of the Massachusetts Bay Colony resulted in a wave of migration; by 1634, New England had been settled by some 10,000 Puritans. Between the late 1610s and the American Revolution, about 50,000 convicts were shipped to Britain's American colonies. Beginning in 1614, the Dutch settled along the lower Hudson River, including New Amsterdam on Manhattan Island. In 1674, the Dutch ceded their American territory to England; the province of New Netherland was renamed New York. Many new immigrants, especially to the South, were indentured servants — some two-thirds of all Virginia immigrants between 1630 and 1680. By the turn of the century, African slaves were becoming the primary source of bonded labor. With the 1729 division of the Carolinas and the 1732 colonization of Georgia, the thirteen British colonies that would become the United States of America were established. All had local governments with elections open to most free men, with a growing devotion to the ancient rights of Englishmen and a sense of self-government stimulating support for republicanism. All legalized the African slave trade. With high birth rates, low death rates, and steady immigration, the colonial population grew rapidly. The Christian revivalist movement of the 1730s and 1740s known as the Great Awakening fueled interest in both religion and religious liberty. In the French and Indian War, British forces seized Canada from the French, but the francophone population remained politically isolated from the southern colonies. Excluding the Native Americans (popularly known as "American Indians"), who were being displaced, those thirteen colonies had a population of 2.6 million in 1770, about one-third that of Britain; nearly one in five Americans were black slaves. Though subject to British taxation, the American colonials had no representation in the Parliament of Great Britain. Independence and expansion Tensions between American colonials and the British during the revolutionary period of the 1760s and early 1770s led to the American Revolutionary War, fought from 1775 through 1781. On June 14, 1775, the Continental Congress, convening in Philadelphia, established a Continental Army under the command of George Washington. Proclaiming that "all men are created equal" and endowed with "certain unalienable Rights," the Congress adopted the Declaration of Independence, drafted largely by Thomas Jefferson, on July 4, 1776. That date is now celebrated annually as America's Independence Day. In 1777, the Articles of Confederation established a weak confederal government that operated until 1789. After the British defeat by American forces assisted by the French, Great Britain recognized the independence of the United States and the states' sovereignty over American territory west to the Mississippi River. A constitutional convention was organized in 1787 by those wishing to establish a strong national government, with powers of taxation. The United States Constitution was ratified in 1788, and the new republic's first Senate, House of Representatives, and president—George Washington—took office in 1789. The Bill of Rights, forbidding federal restriction of personal freedoms and guaranteeing a range of legal protections, was adopted in 1791. Attitudes toward slavery were shifting; a clause in the Constitution protected the African slave trade only until 1808. The Northern states abolished slavery between 1780 and 1804, leaving the slave states of the South as defenders of the "peculiar institution." The Second Great Awakening, beginning about 1800, made evangelicalism a force behind various social reform movements, including abolitionism. Americans' eagerness to expand westward prompted a long series of Indian Wars. The Louisiana Purchase of French-claimed territory under President Thomas Jefferson in 1803 almost doubled the nation's size. The War of 1812, declared against Britain over various grievances and fought to a draw, strengthened U.S. nationalism. A series of U.S. military incursions into Florida led Spain to cede it and other Gulf Coast territory in 1819. The Trail of Tears in the 1830s exemplified the Indian removal policy that stripped the native peoples of their land. The United States annexed the Republic of Texas in 1845. The concept of Manifest Destiny was popularized during this time. The 1846 Oregon Treaty with Britain led to U.S. control of the present-day American Northwest. The U.S. victory in the Mexican–American War resulted in the 1848 cession of California and much of the former American Southwest. The California Gold Rush of 1848–49 further spurred western migration. New railways made relocation easier for settlers and increased conflicts with Native Americans. Over a half-century, up to 40 million American bison, or buffalo, were slaughtered for skins and meat and to ease the railways' spread. The loss of the buffalo, a primary resource for the plains Indians, was an existential blow to many native cultures. Civil War and industrialization Tensions between slave and free states mounted with arguments over the relationship between the state and federal governments, as well as violent conflicts over the spread of slavery into new states. Abraham Lincoln, candidate of the largely antislavery Republican Party, was elected president in 1860. Before he took office, seven slave states declared their secession—which the federal government maintained was illegal—and formed the Confederate States of America. With the Confederate attack upon Fort Sumter, the American Civil War began and four more slave states joined the Confederacy. Lincoln's Emancipation Proclamation in 1863 declared slaves in the Confederacy to be free. Following the Union victory in 1865, three amendments to the U.S. Constitution ensured freedom for the nearly four million African Americans who had been slaves, made them citizens, and gave them voting rights. The war and its resolution led to a substantial increase in federal power. After the war, the assassination of Lincoln radicalized Republican Reconstruction policies aimed at reintegrating and rebuilding the Southern states while ensuring the rights of the newly freed slaves. The resolution of the disputed 1876 presidential election by the Compromise of 1877 ended Reconstruction; Jim Crow laws soon disenfranchised many African Americans. In the North, urbanization and an unprecedented influx of immigrants from Southern and Eastern Europe hastened the country's industrialization. The wave of immigration, lasting until 1929, provided labor and transformed American culture. National infrastructure development spurred economic growth. The 1867 Alaska purchase from Russia completed the country's mainland expansion. The Wounded Knee massacre in 1890 was the last major armed conflict of the Indian Wars. In 1893, the indigenous monarchy of the Pacific Kingdom of Hawaii was overthrown in a coup led by American residents; the United States annexed the archipelago in 1898. Victory in the Spanish–American War the same year demonstrated that the United States was a world power and led to the annexation of Puerto Rico, Guam, and the Philippines. World War I, Great Depression, and World War II At the outbreak of World War I in 1914, the United States remained neutral. Most Americans sympathized with the British and French, although many opposed intervention. In 1915, the United States nearly joined the Allies with public outrage over the sinking of the RMS Lusitania, killing Americans onboard. President Wilson was narrowly reelected in 1916 as his supporters emphasized "he kept us out of war". The war eventually ended in favor of the Central Powers. The country pursued a policy of unilateralism, verging on isolationism. In 1920, the women's rights movement, led by Carrie Chapman Catt, won passage of a constitutional amendment granting women's suffrage. The 1920s and 1930s saw the rise of radio for mass communication and the invention of early television. The prosperity of the Roaring Twenties ended with the Wall Street Crash of 1929 that triggered the Great Depression. After his election as president in 1932, Franklin D. Roosevelt responded with the New Deal, a range of policies increasing government intervention in the economy, including the establishment of the Social Security system. The Dust Bowl of the mid-1930s impoverished many farming communities and spurred a new wave of western migration. Cold War and Civil Rights era Government and politics The United States is the world's oldest surviving federation. It is a constitutional republic and representative democracy, "in which majority rule is tempered by minority rights protected by law". The government is regulated by a system of checks and balances defined by the U.S. Constitution, which serves as the country's supreme legal document. In the American federalist system, citizens are usually subject to three levels of government: federal, state, and local. The local government's duties are commonly split between county and municipal government. In almost all cases, executive and legislative officials are elected by a plurality vote of citizens by district. There is no proportional representation at the federal level, and it is very rare at lower levels. The federal government is composed of three branches: - Legislative: The bicameral Congress, made up of the Senate and the House of Representatives, makes federal law, declares war, approves treaties, has the power of the purse, and has the power of impeachment, by which it can remove sitting members of the government. - Executive: The president is the commander-in-chief of the military, can veto legislative bills before they become law (subject to Congressional override), and appoints the members of the Cabinet (subject to Senate approval) and other officers, who administer and enforce federal laws and policies. - Judicial: The Supreme Court and lower federal courts, whose judges are appointed by the president with Senate approval, interpret laws and overturn those they find unconstitutional. The House of Representatives has 435 voting members, each representing a congressional district for a two-year term. House seats are apportioned among the states by population every tenth year. As of the 2010 census, seven states have the minimum of one representative, while California, the most populous state, has fifty-three. The Senate has 100 members with each state having two senators, elected at-large to six-year terms; one third of Senate seats are up for election every other year. The president serves a four-year term and may be elected to the office no more than twice. The president is not elected by direct vote, but by an indirect electoral college system in which the determining votes are apportioned to the states and the District of Columbia. The Supreme Court, led by the Chief Justice of the United States, has nine members, who serve for life. The state governments are structured in roughly similar fashion; Nebraska uniquely has a unicameral legislature. The governor (chief executive) of each state is directly elected. Some state judges and cabinet officers are appointed by the governors of the respective states, while others are elected by popular vote. The original text of the Constitution establishes the structure and responsibilities of the federal government and its relationship with the individual states. Article One protects the right to the "great writ" of habeas corpus, The Constitution has been amended twenty-seven times; the first ten amendments, which make up the Bill of Rights, and the Fourteenth Amendment form the central basis of Americans' individual rights. All laws and governmental procedures are subject to judicial review and any law ruled in violation of the Constitution is voided. The principle of judicial review, not explicitly mentioned in the Constitution, was declared by the Supreme Court in Marbury v. Madison (1803), a decision handed down by Chief Justice John Marshall.
http://althistory.wikia.com/wiki/United_States_(Central_Victory)
Finest Culinary Art Degrees Creativity is important in lots of elements of the culinary process, including recipe collaboration and experimentation, menu design, and food presentation. When dining, folks make use of multiple senses to benefit from the expertise, including sight. The A.A.S. in Culinary Arts offers a degree-incomes pathway for college kids who have accomplished the Certificate in Culinary Arts. While there is plenty of technical ability required for achievement within the culinary world, it’s also an inventive position that requires a certain amount of creativity to be successful. Chefs need to use their creativeness to create new meals items or out their twist on old ones in the event that they wish to make a name for themselves or move to the highest of the industry.
https://foodculinaryprofs.xyz/tag/associate
When it comes to striking, beautifully colored chickens, the Ayam Cemani should not be overlooked. This bird, which originated in Indonesia, is still relatively uncommon outside of its home country. However, if chicken enthusiasts can find this rare breed, it makes a wonderful addition to any flock. History of Ayam Cemani It is unsure exactly how the Ayam Cemani chicken breed came about, and little is known about its true origins. The name Ayam means “chicken,” while Cemani can refer either to the Sanskrit words for “completely black” or the village of Cemani, where it is possible the breed originated. The Ayam Cemani came from Java, and it was most likely originally part of the Ayam Bekisar chicken breed. Ayam Bekisar is a cross between deep green junglefowl and domesticated red junglefowl, both found in Indonesia. The Ayam Cemani chicken, unlike the brown or reddish Ayam Bekisar chicken, has a dominant hyperpigmentation gene that causes its unusual black coloring. The Ayam Cemani is generally considered to be a rare and special chicken breed and is traditionally kept only by wealthy owners. This chicken breed is often considered to be a bit of a status symbol. Some farmers specialize in raising only this bird in particular, as can be seen in this video. These chickens have also been used in traditional medicine and healing and are sometimes thought to have mystical properties. Some people believe that birds can bring luck, while other people believe that eating the meat of the Ayam Cemani has the potential to cure various diseases. The chickens have also been used in traditional religious ceremonies. In 1998, the Ayam Cemani chicken became known outside Indonesia when Dutch settlers began exporting and breeding them. Today, the Ayam Cemani can be found in many parts of Europe, India, and even the United States, although it is still much less common than other chicken breeds. The Ayam Cemani is quite rare, with only about 3,500 chickens to be found around the world. In order to keep the breed standard high, a breeding organization in Kenya and the Democratic Republic of the Condo has collected 250 breeding pairs. Other breeding pairs exist in various areas, but the breed itself remains relatively unfamiliar to most chicken enthusiasts. Ayam Cemani Breed Standard and Appearance - Between three and a half and five and a half pounds in weight - Glossy black feathers with an iridescent coloring - Muscular but compact appearance - Black beaks, wattles, and combs - Feathers lie close to the body The Ayam Cemani chicken is highly sought after because of its unusual glossy feathers that are entirely black in color. Even more striking is the fact that the chicken’s beak, comb, wattles, tongue, and even internal organs, bones, and flesh are black. The darker the color of the bird, the more highly it is praised, and the more it is worth. Because of the high gloss and deep pigmentation, the feathers of the chicken often have an iridescent green or purple sheen to them. Ayam Cemani is regarded as moderate in size. Male’s weight between four and a half and five and a half pounds, although some breeders have reported that they may grow slightly larger. Females, on the other hand, weigh between three and a half and four and a half pounds. Ayam Cemani has somewhat compact bodies and a slim, muscular appearance. The birds are usually alert and have an upright stance. The feathers lie close to the body, while the tail is held relatively high, creating an attractive cascade of feathers. Ayam Cemani Personality and Temperament Although they look exotic and as if they require more care than other chicken breeds, an Ayam Cemani chicken is actually quite easy to keep. They are known as hardy birds. As long as proper shelter is provided, the Ayam Cemani chicken can withstand both hot and cold weather, so they are well suited to many different parts of the world and can acclimatize well. Ayam Cemani is also known as a docile, relatively friendly chicken breed. According to Greenfire Farms, these chickens tend to be carefree and are unruffled even in stressful situations. They are also considered to be quite smart. In addition, these birds are considered to need only low maintenance and do not have any special care requirements. Because they are so calm and are generally considered to be docile, these chickens mix well with other chicken breeds, farm animals, family pets, or children. They can even be hand-fed. Ayam Cemani Egg Laying - Eggs are cream or pink in color - Lay between 60 and 100 eggs a year - May cease laying for a period of months - Hens making caring mothers Ayam Cemani chickens are not considered to be great egg layers. Hens lay only about one to two eggs a week, for a total of between 60 and 100 eggs a year. However, many Ayam Cemani keepers have also reported that their hens will stop laying eggs after a period of time. This usually occurs after about 20 or 30 eggs have been laid in succession. This pause in egg-laying usually lasts for between three and six months. After, the hens start laying again regularly until the next pause. It has been said that Ayam Cemani hens do not care for their eggs or chicks, but Ayam Cemani owners have often found this to be untrue. Many Ayam Cemani keepers state that their chickens are quite careful of their eggs and, if the eggs are left to hatch, make doting mothers. Ayam Cemani eggs are relatively large in proportion to the size of the hen. They are pale cream with a slight pink tint in color. Some people attempt to sell black eggs as Ayam Cemani eggs, but the egg is just about the only thing about this chicken breed that is definitely not black. Health Issues and Care Ayam Cemani is considered to be a hardy breed and does not generally face too many health concerns. In general, the chickens can go through life without requiring too much in the way of special health care. The greatest concern the Ayam Cemani faces is avian influenza. This disease, also known as the bird flu, can affect not only domesticated chickens but also wild birds. Chickens with the bird flu are often lethargic and experience a loss of appetite. Chickens may also display wet eyes or fluid buildup in the wattles or comb. Birds also often develop a cough. Avian influenza is most commonly spread when new birds are introduced to an established flock. This makes importing chickens, such as the Ayam Cemani, difficult. It can also pose a threat to established Ayam Cemani flocks. Keeping the coop clean, placing new chickens in quarantine or limiting the number of birds introduced to the flock, and using only clean, unshared farm equipment can help to keep the spread of the disease in check. Ensuring that, when new chickens are purchased, they are only bought from a highly reputable breeder with a clean farm that can also help to reduce the risk of the bird flu. 3 Tips for Raising Ayam Cemani - Provide adequate housing and feed, similar to that used for other chicken breeds - Purchase eggs, chicks, or chickens from a reputable breeder - Be aware of the risks of avian influenza Ayam Cemani chickens are rare and therefore often difficult to find. They can also be quite expensive, ranging from between $50 and $2,500. However, for the chicken enthusiast who wants to add something striking and beautiful to their flock, there may be no better choice. If you want to know more about scarce chicken breeds, you can read our post: Top 7 Rare Chicken Breeds. Ayam Cemani chickens do not require a great deal of specialized care. They should be provided with proper shelter and bedding, as well as nesting areas. A space to roam is also a good idea, as long as that space is free of pests and predators. They should also be offered a nutritious, varied diet. However, both their space and diet requirements are basically the same as other more common chicken breeds. These chickens are docile and friendly, and they make excellent additions to flocks due to their coloration and alert, attentive personalities. People looking to purchase Ayam Cemani should ensure that they are buying true Ayam Cemani eggs, which are cream and pink in color. They should also purchase their eggs, chicks, or chickens from reputable, clean, safe breeders. People looking to buy these chickens should also be aware that healthier, hardier birds are often more expensive, but are generally worth the price.
https://cs-tf.com/ayam-cemani/
This chapter includes descriptions of federal and state privacy, confidentiality, and security laws and regulations that govern clinical research in the United States, as well as practical recommendations for compliance consistent with the efficient conduct of that research. Federal Privacy Rules The Health Insurance Portability and Accountability Act of 1996 (HIPAA) and its implementing regulations are perhaps the best-known federal privacy rules today. The Common Rule, corresponding FDA regulations, and other federal laws and regulations also protect the privacy and confidentiality of records created, used, and disclosed in human research. These federal mandates are discussed below. Health Insurance Portability and Accountability Act of 1996 (HIPAA) Congress enacted HIPAA in 1996 to assure individuals the ability to move from one job to another without risking their health insurance coverage and to strengthen federal fraud and abuse laws. The law included “administrative simplification” provisions designed to encourage standardization of health insurance claims submission and processing and to promote overall efficiency in the healthcare system. Recognizing that standardization would facilitate electronic storage and transmission of health information, and concerned that a move to use of electronic records would increase risks to health privacy, Congress included privacy protection provisions and a mandate that, absent further legislative action, the Secretary of Health and Human Services would develop and implement regulations to protect individually identifiable health information. Those regulations were released as a “final rule” in December 2000 and the HIPAA Privacy Rule became effective in April 2003. The HIPAA Omnibus (Final) Rule In 2013 the Department of Health and Human Services (HHS) released the “Omnibus Rule,” which resulted in modifications to the HIPAA Privacy, Security, Breach Notification, and Enforcement Rules. HHS published the Omnibus Rule, also known as the Final Rule, in January and it went into effect on March 26, 2013. Covered entities and business associates were required to be in compliance with most of the directives in the rule since September 23, 2013. The Omnibus Rule implements most of the privacy and security provisions of the Health Information Technology for Economic and Clinical Health (HITECH) Act. The rule provides for increased focus on patient rights and providing health information to patients. Restrictions on some uses and disclosures of protected health information (e.g., sale of PHI, marketing, fundraising limitations, and allowance for patient out-of-pocket payment without notification of payers) are included. The rule extends the provisions of the Security Rule to business associates and subcontractors. Changes in the Enforcement Rule altered HIPAA enforcement from a program with very little punitive power to a more substantive penalty-based system. The penalties range from $100–$50,000 per violation, with a $1.5 million cap per calendar year for all violations of an identical provision, and criminal penalties of up to 10 years’ imprisonment. Where there is a possibility of a violation occurring due to willful neglect, HHS can impose civil monetary penalties in the higher ranges of $10,000–$50,000 per violation per provisions. Uses and disclosures of PHI for research purposes are included in 45 CFR 164.512, Standard (i) of the regulations, “Uses and disclosures for which an authorization or opportunity to agree or object is not required.” This section describes the waiver process, IRB and privacy board requirements, and reviews preparatory to research and review and approval procedures. The Omnibus Rule removed significant barriers to clinical research and provided more flexibility for future research endeavors. Authorizations for the use or disclosure of PHI for a research study may be combined with any other type of written permission for the same or for another research study. Previously, a participant in a clinical trial could only authorize the use of PHI for one clinical trial per authorization. The Privacy Rule prohibited combining an authorization that conditioned treatment, payment, enrollment in a health plan, or eligibility for benefits (i.e., a conditioned authorization) with an authorization for another purpose for which treatment, payment, enrollment, or eligibility might not be conditioned (i.e., an unconditioned authorization). Thus, prior to the Omnibus Rule, a covered entity could not, for example, combine an authorization to use and disclose PHI for research in connection with a clinical trial (which is a conditioned authorization) with an authorization to create a central research repository or tissue bank for future research (which might be an unconditioned authorization). Authorizations for unspecified future research were prohibited. The Omnibus Rule harmonizes authorization requirements with federal human subject protection rules, and permits the use of compound authorizations, combining conditioned and unconditioned authorizations, and permitting the use or disclosure of PHI for future, unspecified research. Thus, a single document that includes consent and authorization for a clinical trial and a future study, as long as the authorization includes a general description of the types of research that might be conducted, can now be used. The authorization must clearly differentiate between conditioned and unconditioned authorizations for research and provide the individual with the option to opt in to the unconditioned research activities. The change to compound authorizations will simplify the administration of clinical trials and facilitate outcomes research involving tissue and data banking information. The use of compound authorizations requires covered entities to revise authorization processes and forms, including the process for future revocations by subjects. Authorization for use or disclosure of psychotherapy notes continue to have the restriction that the form may only be combined with another authorization for use or disclosure of psychotherapy notes, and may not be combined with other authorizations. Prior to enactment of the Omnibus Rule, authorization for research had to be study-specific. The change provides that a valid authorization can be used for future research studies and will benefit secondary research efforts. Future research need not be related to a current study, as long as the authorization adequately describes potential future research in a way that it would be reasonable for the subject to expect that PHI could be used or disclosed for the research. In the Omnibus Rule, HHS also confirmed that researchers may be business associates if they perform a service for covered entities, e.g., de-identifying PHI or creating a limited data set, even if the de-identified PHI or limited data set is created for use by the researcher—provided there is separation between the business associate activity of creating the data set and the activity of performing the research. As stated in the Rule: However, a researcher may be a business associate if the researcher performs a function, activity, or service for a covered entity that does fall within the definition of business associate, such as the health care operations function of creating a de-identified or limited data set for the covered entity. See paragraph (6)(v) of the definition of ‘‘health care operations.’’ Where the researcher is also the intended recipient of the de-identified data or limited data set, the researcher must return or destroy the identifiers at the time the business associate relationship to create the data set terminates and the researcher now wishes to use the deidentified data or limited data set (subject to a data use agreement) for a research purpose. Although HIPAA does not directly govern research, its privacy and security rules do regulate healthcare providers, health plans, and clearinghouses (collectively “covered entities” that often control data researchers need to conduct clinical studies). Moreover, HIPAA violations may result in significant penalties ranging from small assessments per violation up to 10 years’ imprisonment and multi-million dollar fines in the most egregious cases, not to mention negative publicity and loss of public trust. As a result, some covered entities have adopted very conservative—and sometimes unnecessarily restrictive—approaches to data sharing that hinder good clinical research. A strong grasp of the legal and regulatory requirements that govern privacy, confidentiality, security, and data sharing can help researchers, IRBs, and privacy officers avoid this problem. 1. Basic Privacy Rights Under the Privacy Rule, as it is known, a covered entity may not use or disclose an individual’s PHI unless the use or disclosure is authorized in writing by the individual (or his or her personal representative ), or a specified regulatory exception applies. These exceptions are described in detail in subsection below. To be valid, an authorization to use or disclose PHI for research must include the following elements and statements: - A description of the study (e.g.,the title and purpose) - A description of any PHI to be used or disclosed for the study - The names or groups of persons involved in the research (e.g., “researchers and their staff”) - A statement thatthe subject’s PHI may not be protected under HIPAA once it is disclosed outside the covered entity - A statement either that: (i) authorization is voluntary, but failure to agree to the requested use or disclosure will bar the prospective subject from participating in the study (for any research conducted by a covered entity that involves treatment); or (ii) participation is voluntary and the covered entity may not condition testing or treatment on whether the prospective subject signs the authorization (for research that does not involve research-related treatment) - Information about withdrawal - Information regarding future revocation, when a compound authorization is used - Expiration date or event (a date may be given, or an event such as “the end of the study,”); researchers may extend authorizations indefinitely by explicitly stating that there is no expiration date - Signature of subject or subject’s personal representative - Date of signature The Privacy Rule identifies essential privacy rights and requires covered entities to develop and implement policies and procedures designed to protect those rights. For a complete listing and information regarding these rights, refer to the 45 C.F.R. §164, Subpart E, “Privacy of Individually Identifiable Health Information.” Key privacy rights described in Subpart E include rights to the following. Notification of a Covered Entity’s Privacy Practices The Privacy Rule requires covered entities to provide written notice of their privacy practices to individual patients or health plan members, to post those notices on their public websites, and to promptly publish information about material changes. A covered entity may provide the notice to an individual by Email, if the individual agrees to electronic notice and such agreement has not been withdrawn. The notices must inform individuals of the circumstances under which their PHI may be used without their permission including, if applicable, for research or public health activities. The Omnibus Rule requires that covered entities revise the notice of privacy practices to include the following: - Prohibition against health plans using or disclosing genetic information for underwriting purposes; - Prohibition on the sale of PHI without the express written authorization of the individual, and other uses and disclosures that expressly require the individual’s authorization (marketing and disclosure of psychotherapy notes); - Duty of a covered entity to notify affected individuals of a breach involving their PHI; - Individual’s right to opt out of receiving fundraising communications for entities that have stated their intent to fundraise in the notice of privacy practices; and - Individual’s right to restrict disclosures of PHI to a health plan where the individual pays out of pocket in full for the service. Inspect and Copy Healthcare Records The Privacy Rule defines a “designated record set” (DRS) to include medical and billing records, as well as other records used to make decisions about individuals, and requires covered entities to maintain DRS records for at least six years and make those records available to the individuals to whom they pertain. Because the definition of a DRS is broad, it extends to clinical research records created, received, or maintained by a covered entity, even if solely for research purposes and even if they involve only “research subjects” and not “patients.” Access of Individuals to Protected Health Information Individuals have a right to request copies of their own PHI in any form they choose, including electronic copies, provided the PHI is “readily producible” in that format. Covered entities must provide copies of PHI to other parties as designated by the individual, based upon a written and signed request that clearly identifies the designated recipient and where to send the copy of PHI. Of note, however, HIPAA allows the covered entity to withhold the release of certain research related information for a period of time if the patient agreed to it up front as part of their signed authorization. This would be important in studies that require blinding of the participants for scientific purposes. All requests for access must be addressed (granted or denied) within 30 days. Covered entities may also be permitted a one-time 30-day extension by providing notice to the individual of the reasons for the delay. Covered entities must permit individuals to request their records and must accommodate reasonable requests by individuals to receive communications of PHI by alternative means or at alternate locations. Covered entities may send individuals unencrypted Emails including electronic protected health information (ePHI), if the individual requests it, provided that the covered entity has advised the individual of the risk and the individual accepts that the message will be delivered via unencrypted email. Amendment of Protected Health Information An individual has the right to have a covered entity amend PHI or a record about the individual in a DRS for as long as the PHI is maintained in the DRS. The covered entity may deny the request for amendment, if it determines that the PHI or record was not created by the covered entity, is not part of the DRS, would not be available for inspection, or is accurate and complete. The covered entity must act on the individual’s request for an amendment no later than 60 days after receipt of the request. The covered entity may extend the time for action by no more than 30 days provided that the individual is provided with a written statement about the reasons for the delay and the date by which the covered entity will complete its action on the request. The covered entity must maintain information about any objections. Receive an Accounting of Certain Unauthorized Disclosures The Privacy Rule requires covered entities to maintain records of certain disclosures done without written authorization, including disclosures for public health purposes and for research conducted pursuant to a waiver of authorization by an Institutional Review Board (IRB) or Privacy Board, reviews preparatory to research and research on decedent information. The covered entity must provide information about those disclosures to patients upon request. This list must be tied to each disclosure of the identifiable record and must contain, among other things, the name(s) and address of the accessing researchers and the date and the purpose of the access (i.e., the title of the research activity). If, however, the researcher accesses more than 50 identifiable records for that research activity, the covered entity may, in lieu of tagging each identifiable record disclosed, keep a master list of such projects. This abbreviated list requires information additional to that of the above, such as the name and phone number of the sponsor. When utilizing the abbreviated listing for documenting more than 50 records accessed, that list would be given to all patients whose records might have been accessed in addition to the list of the known accesses. Specifically, when a patient asks the covered entity for their accounting of disclosures, the covered entity would provide the list of the activities of known access of that patients record as well as the master list of which their record might have been accessed when not documenting it individually. 2. Authorization Exceptions The Privacy Rule permits use or disclosure of PHI without an individual’s written authorization for “treatment,” “payment,” and “healthcare operations” ( TPO). These terms do not include most research activities. HIPAA also permits use or disclosure to law enforcement and public health authorities, subject to specified limitations. HIPAA includes five additional exceptions to the written authorization requirement relevant to research activities, which are described below. Waiver of Authorization The Privacy Rule empowers an institutional review board (IRB) whose membership meets the membership criteria under the Common Rule, or a properly constituted privacy board, to grant a waiver or alteration of written authorization if the proposed use or disclosure will pose minimal risk to participants’ privacy and other specified criteria are met. A comparison of Common Rule and HIPAA waivers and detailed discussion of the role of a privacy board under HIPAA is discussed later in this chapter. Of note, although there is overlap in the criteria for this waiver of authorization and the waiver of obtaining informed consent to be in the research, these are separate and distinct decisions the IRB must make and document separately. Review Preparatory to Research A covered entity may allow researchers, whether or not affiliated with the covered entity, to review PHI without written authorization from affected individuals if the researchers certify that: (1) the use or disclosure is sought solely to review PHI as necessary to prepare a research protocol or for similar purposes preparatory to research; (2) no PHI will be removed from the covered entity by the researcher in the course of the review; and (3) the PHI for which use or access is sought is necessary for the research purposes. Through its FAQ process, the Office of Civil Rights clarified that this exception could be used to permit individuals to identify potential research subjects. OCR specified that for recruitment purposes, the exception could only be used by individuals considered to be members of the covered entity’s workforce. Using or disclosing PHI for recruitment by a non-workforce member must meet one of the other exceptions to be permitted by the Privacy Rule. Research on decedents’ Information A covered entity may use or disclose PHI of a decedent to the researcher, if the researcher provides: (1) a representation that the use or disclosure sought is solely for research on the PHI of decedents; (2) documentation, at the covered entity’s request, of the death of the specified individuals; and (3) a representation that the PHI for which use or disclosure is sought is necessary for the research purposes. De-identified Data Sets Section 164.514(a) of the HIPAA Privacy Rule provides the standard for de-identification of protected health information. Under this standard, health information is not individually identifiable if it does not identify an individual and if the covered entity has no reasonable basis to believe it can be used to identify an individual.A covered entity may use or disclose de-identified health information for any purpose without restriction (although other laws may apply). The Privacy Rule designates two ways by which a covered entity can determine that health information is de-identified.The first is the “Safe Harbor” approach, which permits a covered entity to consider data to be de-identified if it removes 18 types of identifiers (e.g., names and other direct identifiers, such as medical record numbers or social security numbers, all elements of dates other than year, age if over 89, all geography smaller than a state, and all but the first three digits of zip codes unless the first three digits represent a population with less than 20,000 inhabitants (to which it must be replaced with 000, and some other identifiers). The covered entity must also have no actual knowledge that the remaining information could be used to identify an individual, either alone or in combination with other information. An alternative is the statistical approach, which permits covered entities to disclose health information in any form provided that a qualified statistical or scientific expert concludes, through the use of accepted analytic techniques, that the risk the information could be used alone, or in combination with other reasonably available information, to identify the subject is very small. The Privacy Rule permits covered entities to develop procedures under which a statistician or similarly qualified person may determine that the risk of re-identification of the information in a given data set is very small. Section 13424(c) of the HITECH Act requires the secretary of HHS to issue guidance on how best to implement the requirements for the de-identification of health information contained in the Privacy Rule. In the Omnibus Rule, HHS notes that “we decline to completely exempt limited data sets from these provisions as, unlike de-identified data, they are still protected health information. However, disclosures of limited data sets for purposes permitted under the Rule would be exempt from the authorization requirements to the extent the only remuneration received in exchange for the data is a reasonable, cost-based fee to prepare and transmit the data or a fee otherwise expressly permitted by other law.” The Privacy Rule, modified by the Omnibus Rule, includes a new Section 164.532(f). This section indicates “that a covered entity may continue to use or disclose a limited data set in accordance with an existing data use agreement that meets the requirements of Section 164.514(e), including for research purposes, until “the data use agreement is renewed or modified or until one year from the compliance date of this final rule [September 23, 2013], whichever is earlier, even if such disclosure would otherwise constitute a sale of protected health information upon the effective date of this rule.” Limited Data Sets Soon after the final Privacy Rule was released in 2000, many researchers found that the restrictions imposed by its de-identification standards were impractical and would force researchers to seek waivers for research that otherwise was exempt from IRB review. In amendments to the regulation released in August 2002, the HHS created an alternative mechanism to use or disclose data for research, dubbed a “limited data set.” Unlike a de-identified data set, a limited data set may include geographic information other than street address, all elements of dates and ages, and certain other unique identifying characteristics or codes. For information to be shared in a limited data set, the recipient must agree to sign a Data Use Agreement (DUA). The use of a DUA assures the covered entity that the recipient will, among other things, protect the limited data set and not make any effort to re-identify individuals using the data set or contact individuals if re-identified.A researcher may be a business associate if the researcher performs a function, activity, or service for a covered entity that does fall within the definition of business associate, such as the healthcare operations function of creating a de-identified or limited data set for the covered entity. Where the researcher is also the intended recipient of the de-identified data or limited data set, the researcher must return or destroy the identifiers at the time the business associate relationship to create the data set terminates and the researcher may then wish to use the de-identified data or limited data set (subject to a DUA) for research purpose. In the Omnibus Rule, the HHS encourages covered entities and business associates to take advantage of the safe harbor provision of the breach notification rule by encrypting limited data sets and other protected health information pursuant to the Guidance Specifying the Technologies and Methodologies that Render Protected Health Information Unusable, Unreadable, or Indecipherable to Unauthorized Individuals (74 FR 42740, 42742). “If protected health information is encrypted pursuant to this guidance, then no breach notification is required following an impermissible use or disclosure of the information.” 3. Additional Protections and Mandates To protect against inappropriate use or disclosure of PHI, the Privacy Rule imposes numerous detailed administrative requirements on covered entities, many of which affect research. These include a “minimum necessary” standard applicable to many research-related uses and disclosures of PHI, as well as a requirement that covered entities contracting with third parties to perform treatment, payment, or healthcare operations activities (note, this list intentionally does not include research) on their behalf must enter into “business associate agreements” with those third parties. Minimum Necessary Standard HIPAA requires covered entities to make reasonable efforts to limit the PHI used, disclosed, or requested for any purpose other than direct treatment to the “minimum necessary” to accomplish the intended purpose of the use, disclosure, or request. Although the principle addressed by the standard is laudable, its application is sometimes overly restrictive and may hamper appropriate research activities. It is, therefore, important for covered entities and researchers alike to understand the circumstances where the minimum necessary standard does not apply. These include: - Disclosures to or requests by a healthcare provider for treatment (which may include research-related treatment) - Uses or disclosures made pursuant to a written authorization - Uses or disclosures required by law, including uses or disclosures made to public health authorities such as the Public Health Service’s Office for Human Research Protections (OHRP) or the Food and Drug Administration (FDA); and uses or disclosures made to FDA-regulated entities that in turn are required to make safety, efficacy, or quality reports to FDA related to drugs, devices, or biologics that they manufacture. Business Associate Agreements The HIPAA statute’s administrative simplification and privacy standards apply only to covered entities. To address concerns that the legislation left unregulated scores of individuals and organizations—ranging from software vendors to disease management companies to accreditation agencies—with broad access to PHI, the HHS imposed on covered entities an obligation to enter into specific written agreements (called “business associate agreements” or BAAs) with these third parties that, in effect, extended the Privacy Rule (and, later the Security Rule) to a much broader segment of the healthcare industry. The Omnibus Rule clarified the role of researchers and business associates. The rule includes a new definition of a business associate as an entity that “creates, receives, maintains or transmits PHI” for a function or activity regulated by HIPAA, on behalf of a covered entity. An external researcher is not a business associate of a covered entity by virtue of its research activities, even if the covered entity has hired the researcher to perform the research thus other HIPAA compliant methods must be utilized other than Business Associate Agreements for a covered entity to disclose identifiable PHI to a researcher. Similarly, an external or independent IRB is not a business associate of a covered entity by virtue of its performing research review, approval, and continuing oversight functions. However, a researcher may be a business associate if the researcher performs a function, activity, or service for a covered entity that does fall within the definition of business associate, such as the healthcare operations function of creating a de-identified or limited data set for the covered entity. Common Rule and FDA Privacy and Confidentiality Provisions The Common Rule defines “private information” to include “information about behavior that occurs in a context in which an individual can reasonably expect that no observation or recording is taking place, and information which has been provided for specific purposes by an individual and which the individual can reasonably expect will not be made public (for example, a medical record).” One can argue that, since implementation of the Privacy Rule, private information includes (though may not be limited to) any information that constitutes PHI under HIPAA. Ethical guidelines that influenced the adoption and content of the Common Rule and corresponding FDA regulations stress the importance of participant privacy and the need to protect the confidentiality of research data. The regulations include standards requiring researchers to inform participants of their privacy rights and requiring IRBs to assure research plans include adequate provisions to protect the privacy of subjects and maintain the confidentiality of data. The distinction between these two terms is not conceptually obvious to many, but understanding it can help IRBs and researchers to assure that both sets of interests are well protected. In general, privacy “refers to persons; and to their interest in controlling the access of others to themselves.” Confidentiality, by contrast, “refers to data; and to the agreements that are made about ways in which information is restricted to certain people.” 1. Participant Privacy and Informed Consent Research participant privacy interests are addressed primarily through the informed consent process. The Common Rule and corresponding FDA regulations require the consent to include information about the study and the subject’s participation in the study, as well as a “statement describing the extent, if any, to which confidentiality of records identifying the subject will be maintained.” FDA regulations also require explicit discussion of the possibility that FDA may inspect research records. Collectively, these requirements assure that prospective subjects can make an informed choice about whether they are willing to accept some intrusion as a condition of participating in a study. It is difficult to protect subjects before they are contacted. Accordingly, researchers must understand that prospective subjects and their families are at risk of harm particularly during the identification and recruitment phases of a study, before they are provided an opportunity to agree or decline to participate. For example, subjects may not be aware of their condition before they are contacted; or the process of contacting them may result in disclosures to family or household members who are unaware of their condition. A researcher can minimize these risks in a number of ways, including approaching a prospective participant through his or her physician and using any predetermined methods and/or limitations of such contact. 2. Confidentiality Protections It is often the case in data research that there is enough –built-in “privacy/confidentiality by design” protections that the research activity is exempt from further oversight of an IRB. This exempt classification is reserved for when the researchers do not use any identifiers for the research, in essence making the research de-identified. In research that does not include interaction or intervention with the subjects and only involves use of their de-identified data that was or (under the revised Common Rule) would have been gathered absent the research, such an –IRB-exempt determination can be made by the institution. For non-exempt research, confidentiality concerns are reviewed and addressed primarily through the IRB’s evaluation of the non-exempt research protocol and, in particular, its provisions for securing research data against inappropriate use and disclosure. These might include any combination of physical safeguards (e.g., maintaining data in locked file cabinets in secure buildings or offices); electronic safeguards (e.g., encrypting data and storage devices); and policy safeguards (e.g., limiting data access to those with a documented need-to-know, training those with access to comply with approved security procedures, coding data and maintaining links in separate paper files or separate computers or servers, and destroying links at the earliest possible opportunity). Researchers may also take advantage of available legal safeguards. For example, the National Institutes of Health (NIH), issues certificates of confidentiality(COCs) to protect research data against involuntary disclosure. COCs are available for both federally and non-federally supported research, and exempt a researcher from compliance with subpoenas, court orders, and even demands from law enforcement authorities, although they do not exempt researchers from mandatory public health disclosures such as communicable disease or abuse/neglect reports to state authorities. The 21st Century Cures Act (passed in December 2016) made COC coverage automatic for affected federally funded research (thus eliminating the need to actually apply for one), while also supporting that non-federally funded research could still obtain one through application. 3. Secondary Use The secondary use of one’s personal data is hotly debated in contemporary times. While most of the press focuses on items such as social media and retail/service giants using one’s data for purposes not disclosed or permissioned, the importance is not lost on the secondary use of research data. Under today’s standards, unless otherwise committed to with the participant, information provided for one purpose can be de-identified and used for secondary purposes as de-identified data is not regulated by HIPAA or the Common Rule. This introduces many ethical questions on the appropriateness of secondary use of one’s data in a manner that is not inconsistent with the original consent. While regulatory compliance can be met (through de-identification), such use may be inconsistent with the original intent (whether implied or written). One of the most famous examples of this was the secondary use of data and biospecimens from the Havasupai Tribe, where Arizona State University researchers were accused of using the data in manners inconsistent with the original informed consent. This issue is becoming more complicated as just as there are efforts to secure privacy and confidentiality of one’s data, there is growing interest in making research data more transparent. Many institutions that conduct large amounts of NIH-funded studies have been familiar with data transparency requirements for many years (i.e., data bought using taxpayer dollars belongs to the taxpayers, assuming privacy and confidentiality of the individuals to which the data is about is maintained) . Similarly, many nonprofit foundations (such as the Wellcome Foundation or the Bill & Melinda Gates Foundation) that fund research also require that the de-identified data generated from their funding be made available to future researchers. In addition to sponsors of research making these demands for data sharing, a growing number of influential external entities are also making similar demands. Clinical (de-identified) data transparency is now required under Policy 0070 for approval filings with the European Medicines Agency and Canada is drafting a similar policy. Although FDA has yet to initiate such a requirement for filings in the United States, research data is often gathered and used for international filings thus a site in the United States could have their de-identified data made available to the public when filed in these other countries. In July 2018, the International Committee of Medical Journal Editors (ICMJE), whose members are editors of more than 4,000 medical journals, passed their requirement that requests to publish clinical trials in their member journals must be accompanied with a (de-identified) data sharing plan,and the requirement expands to require a data sharing plan posting on the trial’s public registration beginning January 2019. Technically the submitted data sharing plan can be that the researchers will not share the data, however, it is expected that the journals will react negatively to the requirement in their consideration to publish or not publish the results of clinical trials in their journals. In the revised Common Rule, a new element of consent requires that researchers disclose up front if they will or will not intend to use the data gathered for secondary research. Specifically, the new regulation requires the following in the consent form: “One of the following statements about any research that involves the collection of identifiable private information or identifiable biospecimens: (i) A statement that identifiers might be removed from the identifiable private information or identifiable biospecimens and that, after such removal, the information or biospecimens could be used for future research studies or distributed to another investigator for future research studies without additional informed consent from the subject or the legally authorized representative, if this might be a possibility; or (ii) A statement that the subject’s information or biospecimens collected as part of the research, even if identifiers are removed, will not be used or distributed for future research studies.” Given just the above demands for data transparency much less the growing ones from other stakeholders, it would be extremely impractical for a researcher to commit to option (ii) above. If a researcher wants to make such a commitment, the researchers should assure they have complete control over the data (including data that any subcontractors or vendors may have) and its destruction.
https://compliancecosmos.org/8-research-privacy-and-security-myths-facts-and-practical-approaches
Introduction {#Sec1} ============ Nursing documentation is the record of nursing care that is planned and delivered to individual patients by qualified nurses or other caregivers under the direction of a qualified nurse \[[@CR1]\]. Nursing documentation is the principal clinical information source to meet legal and professional requirements \[[@CR2]\]. It is a vital component of safe, ethical and effective nursing practice whether done manually or electronically \[[@CR3]\]. Nursing documentation should fulfill the legal requirements of nursing care documentation \[[@CR4]\]. According to a survey done by WHO it has been shown that poor communication between health care professionals is one factor for medical errors \[[@CR5]\]. There are also evidence indicating that nursing documentation has relationship with patient mortality \[[@CR6]\]. Although keeping a patient record is part of their professional obligation, many studies identified deficiencies in practice of documentation among nurses across the globe \[[@CR7], [@CR8]\]. It has been reported that nursing records are often incomplete \[[@CR8], [@CR9]\], lacked accuracy and had poor quality \[[@CR10], [@CR11]\]. The challenges for documentation reported so far, include shortage of staff \[[@CR12], [@CR13]\], inadequate knowledge concerning the importance of documentation \[[@CR12]--[@CR15]\], patient load \[[@CR12], [@CR14]\], lack of in-service training \[[@CR14], [@CR15]\] and lack of support from nursing leadership \[[@CR12]\]. As a remedy for these, many researchers recommended to use a multidisciplinary approach like to develop policies and guidelines on nursing care documentation \[[@CR12], [@CR13], [@CR15]\] and provide sustained continuing training opportunities for nurses on effectiveness of documentation \[[@CR7], [@CR12], [@CR13], [@CR16], [@CR17]\]. The nursing leaders are also expected to support, motivate \[[@CR12], [@CR17]\] and increase the number of staffs \[[@CR15]\] for a better documentation practice. Studies from South Africa and Ugandan reported deficiency in attitudes, knowledge and practice behaviors \[[@CR17], [@CR18]\]. The studies done in Kenya and Ghana also evidenced lack of standardized method and insufficient information of nursing documentation \[[@CR12], [@CR13]\]. In Ethiopia, inadequacy of data collection with lack of quality was found to be a problem \[[@CR18]--[@CR21]\]. The objective of the study was to assess nursing documentation practice and associated factors of nursing documentation practice in public hospitals of Tigray, Ethiopia. Main text {#Sec2} ========= Methods {#Sec3} ------- A quantitative descriptive cross-sectional study design was used. The study was conducted from November 1--17, 2017. The source population for this study were all nurses who are working in government owned hospitals of Tigray region. Sample size was determined formula taking the proportion as 37.4% from previous study conducted in Northern Amhara region public hospital \[[@CR14]\], 95% confidence interval (CI), and 5% margin of error. The final sample size was 317. Selection of hospitals for the study was carried out using simple random sampling after all hospitals in the region was identified. The study participants were selected based on the lottery method and the numbers of samples in each hospital were selected according to proportional allocation formula. Nurses working in inpatient wards and outpatient departments; nurses having work status as a professional nurse at least for 6 months and those who were voluntary to participate were included in the study. A structured self-administered questionnaire was developed to collect data regarding nursing documentation practice and its associated factors. Practice and knowledge of nursing documentation questions were developed based on the national guideline prepared by the FMOH (EHRIG), various books written on nursing documentation and literatures related to the topic \[[@CR14], [@CR15], [@CR22], [@CR23]\]. Prior to the actual data collection, the items were pre-tested with 5% (16 samples) of the total sample size of nurses working in Adwa hospital with self-administer questionnaire and the results were used to check reliability, consistency and completeness of the questionnaire and some improvements were done on the wordings. Reliability of the questioner was checked using Cronbach alpha (0.79). ### Documentation practice {#Sec4} Practice of study participants measured using 10 multiple-choice items. A value of 3, 2, 1 and zero was scored for "always", "sometimes", "rarely" and "never" options respectively. For questions in which there were multiple correct and incorrect responses (n = 8), the scoring system used the proportion of correct responses \[[@CR15]\]. ### Knowledge of documentation {#Sec5} The knowledge of study participants measured using 10 items with multiple options and scoring based on a number of responses given in each question. A value of 1 and 0 was scored for "yes" and "no and I don't know" options respectively. ### The attitude of practice {#Sec6} Attitude of the study participants measured by using the Likert scale questions with 10 items. The collected data were checked for completion and cleaned manually then the data were entered into computer by SPSS version 22 software was used both for data entry and for analysis. Descriptive statistics like mean, frequency and percentage. Binary logistic regression was used for inferential statistics. Bi-variable and multivariable logistic regression were applied to measure strength of association. ### Good practice {#Sec7} Those respondents who scored above or equal to the mean score of practice questions. ### Good knowledge {#Sec8} Those respondents who scored above or equal to the mean score of knowledge questions \[[@CR14]\]. ### Favorable attitude {#Sec9} Those respondents who scored above or equal to the mean score of attitude questions \[[@CR14]\]. Results {#Sec10} ------- ### Socio-demographic characteristics of respondents {#Sec11} A 317 respondents participated in this study out of which 316 returned the questionnaires made the response rate 99.7%. From 316 nurses who participated in this study, 207 (65.5%) were females and 109 (34.5%) were males. Two hundred eight (65.5%) fall within the ranges of 25--34 years age group. Most of the respondents were holding bachelor degree 279 (88.3%). One hundred two (48.1%) of them were senior nurse professionals while 148 (46.8%) were junior nurse professionals and 11 (5.1%) were junior clinical nurses. One third of the participants were worked as a nurse for 2--5 years when 107 (33.9%) and 100 (31.6%) of them worked for more than 5 years and less than 2 years respectively **(**Table [1](#Tab1){ref-type="table"}).Table 1Socio demographic characteristics of respondents in selected public hospitals of Tigray, Ethiopia, 2017VariableFrequency (n = 316)PercentAge group of respondents (in a years) \< 245015.8 25--3420865.8 35--443310.4 45--54185.7 55--6072.2Gender of respondents Male10934.5 Female20765.5Educational level of respondents College diploma185.7 Bachelor degree27988.3 MSc196Professional level of respondents Junior clinical nurse165.1 Junior nurse professional14846.8 Senior nurse professional15248.1Respondents' work experience (in years) \< 210031.6 2--510934.5 \> 510733.9Work setting of respondents in their hospitals In-patient admission ward16150.9 Out-patient department15549.1 ### Practice of nurses towards nursing documentation practice {#Sec12} A total of 10 multiple option questions were used that had a potential score of 12 and the mean score was 7.26 (S.D ± 2.03). For this study, participant performance was categorized into good and poor practice with scores 7.26 (mean value) or above as good, while those below the mean score as having poor practice. One hundred fifty-one (47.8%) of the respondents scored to have good practice and the rest 165 (52.2%) of the study subjects scored below the mean. Among all nurses, 230 (72.8%) of them check nursing notes written by their colleagues from which most 130 (56.5%) said the notes are incomplete. Concerning the system of documentation, majority 262 (82.2%) of them denied for application of computerized nursing documentation in their hospital. Regarding the practice of patient care documentation, most 165 (52.2%) of the respondents had poor nursing documentation practice (Table [2](#Tab2){ref-type="table"}).Table 2Practice of nursing documentation among nurses working in selected public hospitals of Tigray, Ethiopia, 2017VariableFrequency (n = 316)PercentNursing documentation for every patient (n = 316) Always18859.5 Sometimes11837.3 Rarely82.5 Never20.6Time preference to document a care (n = 316) Any time when convenient11837.3 Immediately or soon after care rendered16050.6 At the end of shift hours3611.4 I don't know20.6Ways to keep confidentiality of record (n = 316) Access for authorized ones only21454 Protect computer pass words4210.6 Obtain informed consent7418.7 Confidentiality after death317.8 I don't know358.8Read colleague's notes (n = 316) Yes23072.8 No8627.2Colleague's notes fulfill standard (n = 230) Yes10043.5 No13056.5Documents education or advice (n = 316) Always11636.7 Sometimes10934.5 Rarely3410.8 Never5718Uses computerized documentation system(n = 316) Yes5417.1 No26282.9Reports any medical error voluntarily(n = 316) Yes22571.2 No9128.8Way of error recording(n = 225) No words like" error" or "mistake"8632.5 Facts only13249.8 I don't know4717.7Documents patient response to care (n = 316) Yes18759.2 No12940.8 ### Knowledge of respondents towards nursing documentation {#Sec13} A total of 10 multiple choice questions were used to measure the knowledge of respondents regarding nursing documentation and the mean score was 4.9 (SD ± 1.9). The minimum score was 1.5 and the maximum 9. The total mean score for knowledge questions was 4.9. Of all the respondents, 136 (43%) subjects scored above or equal to the mean value and the rest 180 (57%) of them scored below the mean. One hundred eighty (57%) of the respondents were found to have poor knowledge of documentation. ### Attitude of respondents towards nursing documentation {#Sec14} Participants' attitudes were assessed via a Likert scale, with item scores ranging from strongly agree (5) to strongly disagree (1) which had a potential score of 50. The total mean score for attitude was 42 (S.D ± 4.9) and scores greater or equal to the mean was categorized as favorable and unfavorable for scores below the mean. In this study the overall attitude score of the study participants showed that above half of respondents 176 (55.7%) had favorable attitude and the remaining 140 (44.3%) had unfavorable attitude. ### Reason for poor nursing care documentation practice {#Sec15} Out of the 128 (40.5%) of respondents who do not document every care provided to a patient. Most 65 (41.9%) of them reported their reason to be lack of time followed by shortage of documenting sheets, inadequate staff, lack of motivation from supervisors and lack of obligation from employing institution by 38 (24.5%), 28 (18.1%), 17 (11%) and 7 (4.5%) respectively. ### Factor associated with documentation practice of nursing care plan {#Sec16} Using binary logistic regression, crude odds ratio with 95% confidence interval was calculated to determine statistical significance and strength of association between each variable. Variables having a p value \< 0.25 in the bivariate logistic analysis were entered into the multivariable logistic analysis and adjusted odds ratios were then calculated to investigate association with controlled confounding variables. According to finding of this study, those nurses who are unfamiliar with operational standard of the nursing documentation were two times more likely to have poor nursing documentation practice than those who are familiar (AOR = 2.015, 95% CI 1.205, 3.370). Additionally, lacked time and those who lacked documentation sheets were two times \[AOR = 2.205, 95% CI (1.101, 3.413)\] and three times \[AOR = 3.271, 95% CI (1.125, 23.704)\] more likely to perform poor nursing documentation when compared to those with adequate time and adequate documenting sheets respectively (Table [3](#Tab3){ref-type="table"}).Table 3Bivariate and multivariate logistic regression analysis for association between practice of nursing documentation with knowledge, attitude and organizational factors among nurses working in selected public hospitals of Tigray, Ethiopia, 2017VariablesPractice levelOdds Ratio (95% CI)Poor practiceGood practiceCrude (COR)Adjusted(AOR)N%N%Knowledge Poor9653.38446.70.901 (0.577,1.407) Good6950.76749.31Attitude Unfavorable7654.36445.71 Favorable8950.68749.41.161 (0.744,1.811)Lack of sheets Yes3078.9821.11.252 (1.111,0.569)^a^3.271 (1.125, 23.704)^b^ No13548.614351.411Staff inadequacy Yes1864.31035.70.252 (0.111,0.569)^a^0.580 (0.236,1.425) No147511414911Time shortage Yes5381.51218.51.182 (1.093,1.358)^a^2.205 (1.101, 3.413)^b^ No11244.613955.411Lack of motivation Yes1482.4317.60.219 (0.062,0.0776)^a^0.263 (0.069,1.008) No15150.514849.511Familiarity with hospital policy Unfamiliar8743.725492.575 (1.600,4.143)^a^2.015 (1.205,3.370)^b^ Familiar26511421.211Work setting Out-patient9158.76441.311 In-patient744687541.672 (1.071,2.609)^a^1.591 (0.973,2.600)^a^Factors associated with nursing documentation practice in bivariate analysis^b^Factors associated with nursing documentation practice in multivariable analysis Discussion {#Sec17} ---------- This cross-sectional study aimed to investigate nursing documentation practice and associated factors among nurses in public hospitals of Tigray, Ethiopia. The finding of this study showed that familiarity with operational standard of nursing documentation, lack of time and inadequacy of documenting sheets had a significant effect on nursing care documentation practice. The result of this study shows that practice nursing care documentation was inadequate (47.8%) among nurses similar to Nigeria \[[@CR24]\] where both the documentation practice and knowledge were found to be insufficient. This finding is higher from Indonesia 33.3% \[[@CR23]\] and University of Gondar hospital (37.4%) \[[@CR14]\]. This discrepancy might be due to difference in the study period since there might be information difference with time gap because the studies were done before 2 years and after technology had faster growth like smart care introduced in most hospitals of Ethiopia. The other reason could be nurses educational development variation across the countries \[[@CR25]\]. Most (52.2%) of the study participants in this study revealed poor nursing documentation practice which coincides with a study done in Felege Hiwot referral hospital (87.5%) \[[@CR19]\] where medication administration errors were due to nursing documentation error \[[@CR19]\]. This finding is lower than a finding from South Africa 68.3% \[[@CR22]\] and Nigeria 70% \[[@CR15]\]. This might be due to insufficient knowledge as indicated in those studies favorability of the working environment and organizational structure. Some barriers have been identified to hinder the nursing documentation practice in this study. Those nurses who are familiar with the availability operational standard of nursing documentation were two times more likely to document their care compared to the unfamiliar ones. Similarly, lack of time and scarcity of sheet were leading factors that negatively influence the nursing documentation practice in this study. Respondents who had lack of time were two times more likely to document (41.9%) similar to a study conducted in Nigeria (41.7%) \[[@CR15]\] and England (47%). Despite its non-significant association, knowledge has shown association with documentation practice in other studies. The knowledge level of participants was 43% in this study which contradicts with the finding from University of Gondar hospital (58.3%) \[[@CR14]\], South Africa (74.9%) \[[@CR22]\], Iraq (59%) \[[@CR16]\] and Indonesia (82.7%) \[[@CR23]\].These inconsistencies might be related to socio demographic variability of the study participants or difference in familiarity to the documentation guideline \[[@CR14]\]. Conclusions {#Sec18} ----------- Nursing care documentation practice was poor among nurses. Inadequacy of documenting sheets, lack of time and familiarity with operational standard of nursing documentation were factors associated with nursing care documentation practice. The following recommendation should forward to the healthcare facilities:Provide a training program to enhance the knowledge of nurses and to familiarize them with institutional policy regarding documentation and provide adequate documentation materials. Limitations {#Sec19} =========== Since this study is based on self-reported data, most of the variables might have been exposed for social desirability bias. AOR : adjusted odd ratio CI : confidence interval FMOH : Federal Ministry of Health IQR : inter quartile range SPSS : Statistical Package for Social Sciences **Publisher\'s Note** Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations. The authors wish to acknowledge the nurses who helped immensely in data collection and study participants. HT: Conceived the study, designed questionnaire, data collection, directed data analysis. All authors participated in questionnaire design, data collection, data analysis, manuscript writing. All authors read and approved the final manuscript. No funding was received. The datasets used and/or analyzed during the current study are available from the corresponding author on reasonable request. Ethical clearance was obtained from the Institutional Review Board (IRB) of Aksum University (AKU), College of Health Sciences, Department of Nursing. Official letter was Obtained to acquire permission from administrations of the selected hospitals. Approvals were obtained from the participating hospitals to administer the questionnaire to the concerned population and a written consent was obtained from each respondent, explaining the aims and objectives of the research. Confidentiality was ensured as well during the course of the study. Not applicable. The authors declare that they have no competing interests.
Automated or semiautomated time-lapse analysis of early stage embryo images during the cleavage stage can give insight into the timing of mitosis, regularity of both division timing and pattern, as well as cell lineage. Simultaneous monitoring of molecular processes enables the study of connections between genetic expression and cell physiology and development. The study of live embryos poses not only new requirements on the hardware and embryo-holding equipment but also indirectly on analytical software and data analysis as four-dimensional video sequencing of embryos easily creates high quantities of data. The ability to continuously film and automatically analyze growing embryos gives new insights into temporal embryo development by studying morphokinetics as well as morphology. Until recently, this was not possible unless by a tedious manual process. In recent years, several methods have been developed that enable this dynamic monitoring of live embryos. Here we describe three methods with variations in hardware and software analysis and give examples of the outcomes. Together, these methods open a window to new information in developmental embryology, as embryo division pattern and lineage are studied in vivo. Keywords - embryo cleavage - time-lapse analysis - morphokinetics - embryo profiling - phylogenetics - cell lineage 1. Introduction Despite 30 years of practice, the success rate for implantation of embryos into the uterus in in vitro fertilization (IVF) is still only around 30% [1, 2]. Consequently, when transferring embryos from in vitro culture and implanting them, it is critical that only the best embryos are selected. This will not only optimize the chance of live birth but also reduce the need for multiple embryo transfer, with the subsequent risk of twin pregnancy and the neonatal complications and associated maternal pregnancy-related health problems. Though cultivation methods have improved, embryo selection is still largely based on manual evaluation of morphological criteria, and much research has been done in identifying morphological features correlated with embryo health. Other methods such as genetic screening and metabolic profiles of culture media exist, but have not yet proven to increase pregnancy rates [3–9]. There is an ongoing discussion concerning the relevance of embryo morphology in quality assessment , but it is likely that it will continue to play a large part in IVF embryo evaluation also in the future. Traditionally, embryo quality assessment has been performed by manual inspection using light microscopy at intermittent time points during embryo development. Novel technical solutions have recently made it possible to monitor embryos continuously using time-lapse imaging, opening new possibilities for embryo evaluation based on dynamic properties. It has been shown that the timing of key occurrences within the embryo can vary greatly between embryos that have similar morphological appearance at the end of the recording period and that embryo morphology can change in a matter of hours [11–14], emphasizing the fact that dynamic monitoring is preferred over intermittent monitoring of embryos. An important endpoint for embryo studies is the timing of embryo cleavage, which has been shown to correlate to embryo viability and implantation potential [15–18]. For research purposes, tracking of cell lineage and cell positioning within the early embryo provides important information to understand pluripotency. Embryos are also a good model for the study of developmental biology and three-dimensional cellular interaction. The ability to continuously film and analyze growing embryos gives new insights into temporal embryo development by studying morphokinetics as well as morphology. Until recently, this was only possible by a tedious manual process. Although currently some human IVF laboratories have started to use time-lapse technology to monitor embryo cleavage and growth, further description of the technology and its potential is needed. The focus of this chapter is on the methods used to study living early embryos over time and the possibilities they render as new tools for embryological research and clinical application. 2. The role of live imaging in embryology Conventional microscopy suffers from several drawbacks, such as requiring sample fixing and only providing static information in an intermittent manner. The complete understanding of cell division and development requires a dynamic perspective on an individual cell level as most information on cell response to environment, dynamic gene expression and timing would be missed in a static analysis. In recent years, the imaging technologies have provided new tools in microscopy, sample handling, and hardware and software for live imaging of individual cells. There are several examples of single cell [19–22] and single molecule monitoring in living cells, using both marker-based and marker-free approaches. Fluorescent tags enable the tracing of specific proteins and measurement of their characteristics to study gene expression, protein localization, and function and protein-protein interaction. By using several markers simultaneously, it is possible to track several proteins or gene expressions at once. With time-lapse microscopy, intracellular events can be linked to external factors such as cell-cell interaction and ultimate cell fate. These methods give us remarkable new insights into the dynamics of gene expression, cellular interactions, and heterogeneous processes. In fluorescence imaging, a laser is used to excite the fluorophores at a particular wavelength. Full field epifluorescence can then be used to measure the light as the fluorescent tags emit light while returning to their unexcited molecular state . In confocal imaging, a pinhole in combination with focused laser light is introduced to effectively reduce background fluorescence and allows optical sectioning of the sample by mechanical scanning. Varying the pinhole will effectively vary the thickness of the sample being imaged, the image resolution, and the acquisition time. For some applications, the use of fluorescent tags is not feasible. By continuously filming embryo material some important information on cell outline, position, shape, and texture can be extracted from the time-lapse sequences without the use of fluorescent markers. By matching and tracking, this information can be combined to a timing profile of the dividing embryo, detecting temporal location of division and tracking cell lineage over time. Using computer vision in combination with a noninvasive imaging method makes it possible to continuously study embryo growth with minimal sample interference. Fluorescence imaging allows the noninvasive measurement of gene expression and intracellular characteristics, while marker-free light microscopy allows the tracking of cellular size, shape, and behavior over time in response to molecular changes. This combination gives us the possibility to directly monitor cellular responses and changes in gene expression in response to the environment. The result is a cellular model that can bridge the molecular scale to the cellular, mapping the actual connections between the chemical and the biological world. 3. Noninvasive techniques for embryo imaging Currently, a set of biotechniques has been successfully applied to mouse and human embryo imaging. This technique includes the addition of a fluorescent marker and marker-free methods. For research purposes, the addition of fluorescent proteins can be considered a noninvasive method, if the protocol used does not significantly disturb embryo growth. For clinical applications in human embryology, no markers of any kind can be used. In this section, we will refer to fluorescent marker methods as noninvasive, and specify the “truly” noninvasive method as “marker free.” 3.1. Fluorescence imaging Adding fluorescent proteins (FP) is a standard way to selectively study specific intracellular targets . The most common fluorescent tag is the green fluorescent protein (GFP) , derived from the jellyfish FP can also be used to study the dynamics around the FP binding site by fluorescence recovery after photobleaching (FRAP) . In FRAP, a fluorophore is covalently attached to the molecule of interest. The fluorophore is intentionally photobleached using incident laser light. The diffusion of the molecules can now be quantified by studying the gradual brightening of the photobleached spot, as fresh fluorophores migrate into this area. Three closely related techniques are the fluorescence loss in photobleaching (FLIP), fluorescence decay after photoactivation (FDAP), and fluorescence correlation spectroscopy (FCS) . Fluorescence resonance energy transfer (FRET) (sometimes also called Förster resonance energy transfer) can be used to study protein-protein interactions . In this case, a donor fluorophore is placed in an excited state by incident laser light, and the energy held in the excited molecular state is transferred to an acceptor fluorophore which must be in close proximity (typically less than ten nanometers). When two molecules under study are labelled with the donor and acceptor fluorophores, respectively, the detected light from the acceptor fluorophore indicates that the two molecules are in close proximity. A number of studies have used fluorescent markers using various imaging modalities to study protein movement within the embryo [31–34] and using embryonic stem cells [35, 36]. 3.2. Marker-free microscopy Currently, IVF centers or clinics are using two main techniques for embryo imaging: Hoffman modulation contrast imaging (HMC) (sometimes referred to as white light) [37, 38] and darkfield imaging (DF) . For research purposes, CARS and light sheet microscopy are also becoming increasingly common. HMC was standard before time-lapse imaging of IVF embryos came in use and is still used in manual microscopy set ups. Consequently, images from time-lapse sequencing resemble the microscopy images to which embryologists are accustomed, an advantage when annotating images and comparing manual and computational approaches. HMC is best suited for imaging internal cell detail. On the other hand, Darkfield gives better detail to edge structures such as cell membranes, and more accurately to detect and track cell outlines. Darkfield imaging is an imaging method that excludes any unscattered light, causing the samples to appear brighter on a darker background and enhancing the contrast of the imaged and unstained sample . It is a simple yet effective method to noninvasively enhance sample contrast but has the disadvantage of low light levels available for collection. To compensate, the sample must be strongly illuminated and the heavy light exposure can cause sample damage. However, the low light level also means the image is almost entirely free from optical artifacts. Darkfield microscopy is most useful for studying boundary structures with a high difference in refractive index and imaging cell membranes is, for instance, more effective than internal cell structures. It is best suited for thin samples with high differences in refractive index (such as for sharp edges) and for thick samples, artifacts may occur. HMC Imaging was invented by Hoffman in 1975 . Today, it is a common technique for noninvasive contrast enhancement of biological samples. Its advantages include good contrast, low light exposure, excellent resolution, and a short depth of field, with the opportunity of focal sectioning at a resolution controllable by the numerical aperture of the objective. The ability to section is also influenced by the sample homogeneity. The disadvantages include strong optical artifacts and image appearance unsuitable for computerized image processing. HMC is commonly been used for embryology studies and has been included in a number of commercial products. 4. Challenges in live embryo imaging Although advances have been achieved in techniques for live single-cell imaging in recent years, several challenges still exist for wider implementation. An experimental design for long-term imaging and analysis must ensure not only high-quality imaging but also long-term support for sample vitality and appropriate computational methods for the analysis. Observing embryo in vitro requires an incubator environment to provide optimal living conditions or the sample during the imaging period. Temperature changes can affect the function of physiological processes as well as reaction kinetics and the challenge will increase with the length of the study sequence. One solution is the installation of an incubation flow chamber on the microscope, reducing the amount of gas and liquid to sustain the sample to a small volume, but suffering from drawbacks such as the risk of introducing condensation on the incubator chamber surfaces. Another approach is to integrate the microscopy optics in an incubator chamber, posing demands on the microscope optics and electronics to function in a humid, temperate atmosphere. A limited number of commercial solutions exist, which combine incubation capabilities with imaging hardware. With any of these solutions, the embryo medium and container must not introduce imaging artifacts such as light reflecting surfaces, auto-fluorescence, or excessive medium volumes in the light path. Another challenge is the loading and retrieval of cells from the mounting chamber, a process that may cause loss of cell identification. For IVF, several combinations of incubators and microscopes exists , either as integrated solutions or in the form of a microscope designed for use inside an incubator. So far, no difference has yet been seen in growth and implantation rates of embryos grown in the standard intermittent incubator system and a time-lapse incubator system [45–47]. One study found a higher rate of miscarriage for the time-lapse group, indicating there are reasons for caution. However, the same study noted no effect on pregnancy rates or embryo health prior to implantation . In nonhuman IVF, phase contrast microscopy is commonly utilized instead of HMC. Phase contrast microscopy is similar to HMC in that it gives high level of image detail at the expense of image artifacts in the form of halos around sample objects. The varying appearance of embryos of different species will affect the decision of which optical system to use. Some species have dark, dense-appearing embryos (e.g., pig), while others are more translucent (e.g., mouse). As a consequence the optimal optical system for a given embryo species vary, and any appropriate analytical software must be chosen accordingly. Single-cell studies using darkfield imaging is limited by the hardware to the 4–6 cell stage. Using focal sectioning in HMC, it is possible to image the entire embryo from zygote to blastocyst stage, but any automated analysis becomes increasingly difficult with increasing cell number as the out-of-focus image details cannot be removed, despite the sectioning. In humans, the compaction at the 9–16-cell stage involves a reduction in visibility of cell boundaries and may represent a feasible stage for automated detection beyond the 8-cell stage. The cavitation and blastocyst formation stages also offer opportunities for automated analysis of images, covering expansion and collapse events. In fluorescence time-lapse imaging of nonhuman mammalian embryos, the life time of the fluorophores is limited, an effect referred to as There is a trade-off between information gathered and potentially harmful sample exposure, and the frequency of image capture must be carefully chosen depending on the study end-point and the expected frequency of the dynamics under study. In the case of simultaneous monitoring of multiple samples, two solutions exist. In For two-dimensional imaging, full-field techniques are the most efficient as they capture the entire field of view in one single exposure. However, the stability of the system becomes critical as the time-lapse sequence length increases. Even with moderate capture frequency, the amount of data from time-lapse studies can quickly build up to terabytes or more, especially if data is recorded simultaneously in multiple dimensions and imaging modalities. Consequently, both The optimal No single set of experimental conditions for long-term imaging can be used universally. Each biological question and model requires its own specific combination of hardware and software tools and must often be customized. Solutions to these challenges will enable important discoveries in embryology in the future. Kang et al. and Turksen provide useful summaries of protocols for fluorescent labelling and the imaging and tracking of stem cell, respectively. The following three sections exemplify successful time-lapse imaging methodologies for both human and nonhuman embryos with solutions to the experimental challenges using three very different approaches. 5. Method 1: three-dimensional mouse embryo morphology using fluorescent markers To understand compaction, cell lineage, cell rearrangement and dynamic behavior of embryonic cells during the cleavage phase, and dynamic imaging is necessary. This project studied the role of filopodia formation in compaction, apical constriction, pluripotent cell internalization, and cell positioning prior to embryo compaction, which is believed to be important for pluripotent development of embryonic cells. In addition, intracellular processes are monitored using a variety of targeted fluorescently tagged proteins and transcription factors. With fluorescence microscopy, we can selectively excite and visualize fluorescent proteins as a marker in living tissue. The discovery of genetically encoded fluorescent proteins (FPs) permits the quantitative analysis of most cellular proteins including monitoring of their distribution and dynamics . Fluorescence imaging is a technique that perfectly addresses problems in embryonic development, because of the need to study embryos in vivo. In confocal microscopy, in contrast to widefield fluorescence imaging, the detector pinhole blocks fluorescence from areas that lie out of focus . This allows confocal imaging to reduce some of the scattering effects elicited by widefield fluorescence microscopy. However, scanning a single section implies the excitation and, therefore, damaging off-focus areas above and below the focal plane. In addition, the pinhole will also exclude scattered signal photons emitted from the focal plane as they travel away from the specimen. Therefore, widefield and confocal imaging are methods best suited for thin samples of less than ~40 μm. To study the events occurring deeper in the mouse embryo, which is about 100 μm in diameter (70 m of cellular portion plus the zona pellucida), requires the use of two-photon excitation fluorescence microscopy. Two-photon excitation (2PE) fluorescence microscopy is a way to limit phototoxicity in the sample and to extend the imaging time and depth at high resolution and contrast . In 2PE, two photons of half the excitation energy are needed to place the FP in the excited state. A focused laser is used in 2PE to generate higher intensity localized in the area of the focal plane, which results in excitation limited to a very small focal volume (typically of ~0.1 μm3). A combination of confocal and two-photon excitation (2PE) fluorescence microscopy can be used to follow and characterize different morphogenetic changes in developing embryos such as cell division, polarity, filopodia formation and dynamics, compaction, and blastocyst cavitation (Figure 1). For this aim, specific fluorescently tagged proteins or peptides are used to label nuclear, cytoplasmic, or membrane constituents and optimized confocal and 2PE fluorescence imaging methods [29, 31, 65]. These imaging conditions allow the scan of a single embryo at intervals down to less than 60 s and reconstruction of 3D embryo morphology using Imaris (Bitplane AG) or ZEN (Zeiss) software. For long-term imaging sessions positioning software (Zeiss Zen) is used to image 20–30 embryos cultured next to each other (Figure 1). Thanks to the high-sensitive detectors of confocal and 2PE fluorescence microscopes, it is possible to perform long-term imaging sessions lasting more than 24 h, without this affecting the health and integrity of the mouse embryos. Thus it is possible to follow in an overnight imaging session cell dynamics in 20–30 embryos. Images are captured at intervals of 40 min from eight-cell stage to blastocyst (an interval of about 36 h). Capturing fluorescent imaging together with brightfield optics makes it possible to monitor simultaneously cell and molecular dynamics (Figure 1D). For the simultaneous subcellular study of proteins at different stages of development, it is possible to study the dynamics of subcellular markers from zygote to blastocyst stage. For this purpose, DNA constructs in the pCS2+ expression vector and synthesized capped RNA (using the Ambion mMessage mMachine SP6 transcription kit) are used. Capped marker-GFP RNA is injected into one-cell stage embryos. For nulcei, H2B-RFP is commonly used as marker, whereas memb-mCherry, Ecad-RFP, Ecad-GFP, or Ezrin-RFP can be used for membrane monitoring (Figure 1) [32, 34, 65]. Figure 1C shows an example of using the nuclear marker H2B-GFP and the membrane marker Ecad-GFP. Polarity events can be studied using Ezrin-GFP. Ezrin is expressed homogeneously in all cells before it becomes polarized during embryonic compaction (Figure 1B). Hence, colocalization with Ezrin-GFP is an excellent way to study the dynamics and distribution of any protein of interest during compaction and cell polarity. 6. Method 2: cell lineage studies of human embryos using machine learning This method focuses on automated monitoring of human embryonic cells in dark field time-lapse microscopy images of embryos with the goal to develop methods to segment, detect, localize the embryonic cells at each time step, and perform cell lineage analysis on a complete sequence. The result is a helpful tool for embryologists and IVF clinicians to understand the development of human embryo and more accurately select viable embryos. In contrast to other cells (e.g., stem cells and embryonic cells of other species), automated analysis of nonstained human embryonic cells is challenged by complex development patterns such as compact growth and overlapping cells. These challenges are further complicated by the limitations of the single plane imaging limitations imposed by the dark field imaging mode, causing intensity variance and loss of depth information. An important and first step in automated analysis is being able to efficiently and reliably segment the embryo from background noise. To this end, a framework to segment the developing embryo by estimating the contour around the embryo was developed by defining segmentation as an energy minimization problem and solving it via graph cuts . Second, cells are spatially localized and divisions subsequently detected. For localization purposes, cells are modeled as ellipses fitted to the segmented outlines for each time step (Figure 2). Predicting the number of cells is a fundamental task in cell biology analysis, and an indirect way to temporally locate embryo cleavage events. In the context of human embryonic cells, cell number is of prime importance as current embryo viability biomarkers require accurate cells counts. The prediction of cell numbers can either be performed directly from the microscopy images or by detecting (localizing) cells [70, 71]. Both approaches can also be used in combination. In this method, a framework that combines both approaches in a conditional random field (CRF) is used. The result is a model of the cell division ancestry by recording cell associations between adjacent frames, resulting in a complete lineage tree for the time-lapse sequence. Cell lineage analysis is vital in understanding dynamics of developing embryos and is a fundamental step in cell biology analysis. The cell lineage tree and segmented shapes can now be studied for various attributes of the growing embryo such as timing of cell cleavage, abnormal division patterns, and cell symmetry (Figure 3). 7. Method 3: human embryo profiling using video image processing HMC imaging is superior when it comes to image detail of human embryos. However, optical artifacts introduced by the optical modulation causes edge structures to appear with multiple gradients. Objects in focus commonly appear clearly, but at the same time, superimposed light from out-of-focus objects will often introduce “shadows” in the image. The result is an image where it is inherently difficult to segment cell outlines, but with a high degree of detail in internal cell structures, despite the fact that the technique is completely marker free. Attempting to segment such an image is possible, but since subsequent analysis is often dependent on the resulting segmented outline, it is easy to introduce cumulative errors. This method focuses on the detection of developmentally relevant events in the embryo such as compaction, blastocoel formation, nuclei localization, cell cleavage, and embryo fragmentation without the need for complete segmentation. Raw images are spatially filtered to embryo location and a set of image features are extracted from the embryo interior [73, 74]. As the embryo grows, characteristics of the image will change also the image features, making it possible to profile embryo development without the complete image data . One example is shown in Figure 4, where the gray-level variance of the image of the embryo interior is used to plot a development sequence of the embryo in two dimensions. The gray-level variance is a measure of the contrast in the image and will increase for each cell division, as each division introduces a new cell, and thus a new set of darker cell membrane into the image, contributing to a rise in image variance. As a consequence, each cell division can be detected as a sudden steep gradient in the variance profile. The compaction is detected as a massive loss of variance as the cell membranes becomes less apparent, followed by a new increase in variance as the embryo forms a blastocoel. The ideal development of an embryo follows a predictable pattern over time, where events such as cleavage can be more easily and automatically detected than using images directly (Figure 4) and abnormal development will differ clearly (Figure 5). Simultaneously to feature detection, segmentation of intracellular structures such as nuclei and pronuclei is possible due to the high level of image detail (Figure 6). The segmentation is constricted in shape and size, ensuring the located structures are of the predefined biological shape. A slight disturbance is introduced in the form of a rotation and serves to effectively average out the located structures and preventing the detection of false positives . The result is a framework where the entire development from zygote to blastocyst can be profiled and combined with the visibility of relevant intracellular compartments such as nuclei, without the need for any fluorescent markers. 8. Conclusion It has been shown that embryos can grow outside the womb for longer than 14 days, a limitation set by legal requirements . This period of early embryo development has yet been little studied, due to technical constraints. New combinations of software analysis, imaging, and incubator technologies will soon make it possible to study embryo development from a whole new set of perspectives. Using specific FP-tagged protein markers for the nucleus and plasma membrane it is possible to follow the dynamics of important morphogenetic changes during mammalian embryo development, including cell division, cell polarity, and cavitation during blastocyst formation. The quantitative analysis of these developmental hallmarks pave the way for the design of functional and phenotypical studies such as silencing (knocking down), overexpressing, or blocking using inhibitors of selected genes of interest. These method combinations can lead to the crucial understanding of developmental function and disease. Methods for automated or semiautomated label-free analysis of embryos in vivo make it possible to study embryo development over longer times than previously possible—opening up a new set of insights into especially early human development, where ethical considerations are important for the choice of study method. By time-lapse sequence studies of routinely growing embryos in IVF, the research data can be gathered in a clinical context, and methods can simultaneously contribute to better IVF embryo monitoring. In conclusion, these noninvasive methods open a window to increase the understanding of general developmental embryology as well as specific medical questions such as embryo division patterns, lineage, and the reasons behind the low human fertility rates. Acknowledgments Anna Leida Mölder is grateful for the help and support of Manchester Metropolitan University. Juan Carlos Fierro-González is grateful for the support received from the Swedish Society for Medical Research.
https://www.intechopen.com/chapters/56206
FIELD OF THE INVENTION BACKGROUND OF THE INVENTION SUMMARY OF THE INVENTION DETAILED DESCRIPTION OF THE EMBODIMENTS The present invention generally relates to a system and method for analyzing and managing spam e-mail and more particularly, to a system and method that monitors instances of spam e-mail, creates and stores records of these instances, and uses the resulting information and statistics to dynamically create, modify and retire rules for determining whether messages are spam and preventing them from reaching their intended recipients. Unsolicited mass e-mail or “spam” has become a serious problem for all Internet users. A user can receive tens of hundreds of spam messages in a given day. Some companies specialize in creating distribution lists that allow senders of spam or “spammers” to easily reach millions of undesiring recipients with advertisements and solicitations. In view of the increasing burden created by spam, efforts have been made to filter spam before it reaches its intended recipients. These efforts include basic spam filters, which may operate using content-based rules. Essentially, these filters include software that recognizes content that is typically found messages, and flags messages having such content. Some filters may also block or filter messages originating from a particular address (e.g., a spammer's address). One drawback with these types of filters is that they are relatively static. That is, once a rule is created, it does not typically change or is relatively difficult to change. As a result, spammers can modify their messages to avoid these rules. Furthermore, the relatively static nature of these rules increases the possibility of false positives. False positives are legitimate e-mails that are mistakenly identified as spam. For most users, missing legitimate e-mail is an order of magnitude worse than receiving spam, so filters that yield false positives are particularly undesirable. The present invention provides an improved system and method for analyzing and managing spam e-mails. The system and method monitors multiple instances of spam, creates and stores records of these instances, and uses related information and statistics to dynamically create, modify and retire rules for detecting spam and preventing it from reaching its intended recipients. The present invention provides an improved system and method for analyzing spam e-mail. The system and method monitors all instances of spam over a distributed network, creates and stores records of these instances, and uses related information and statistics to dynamically create, modify and retire rules for analyzing and managing spam. The system also allows analysts to dynamically create, modify and retire rules based upon feedback regarding unidentified spam messages and false positives. One advantage of the invention is that it provides a system and method for analyzing spam that can record and track all hits to spam rules by attaching a unique header containing spam information to each message. The system and method can then collect all spam information and use statistics or attributes derived from this information or other processing approaches to dynamically create, modify and retire spam rules. Another advantage of the invention is that it provides a system and method for analyzing and managing spam that can dynamically update spam rules and scores across a distributed network based upon feedback regarding spam and nonspam messages. Another advantage of the invention is that it provides a system and method for analyzing and managing spam that can automatically retire old spam rules based on the date they were last hit. According to one aspect of the present invention, a system for analyzing and managing spam e-mail is provided. The system includes a database for storing rules for determining whether e-mail messages are spam; a message processor that processes e-mail messages to determine whether any rules within the database are matched by the messages and to attach data to the messages regarding the rules that are matched; and a spam analyzer that analyzes the data to determine attributes regarding the rules, and to dynamically modify rules within the database based on the data. According to another aspect of the present invention, a method is provided for analyzing and managing spam e-mail. The method includes storing rules for determining whether e-mail messages are spam; receiving e-mail messages; determining whether any rules are matched by a message; recording data regarding rules that are matched by the message; attaching the data to the message; analyzing the data to determine attributes regarding the rules; and dynamically modifying the rules based on the data. These and other features and advantages of the invention will become apparent by reference to the following specification and by reference to the following drawings. The present invention will now be described in detail with reference to the drawings, which are provided as illustrative examples of the invention so as to enable those skilled in the art to practice the invention. Notably, the implementation of certain elements of the present invention can be accomplished using software, hardware, firmware or any combination thereof, as would be apparent to those of ordinary skill in the art, and the figures and examples below are not meant to limit the scope of the present invention. Moreover, where certain elements of the present invention can be partially or fully implemented using known components, only those portions of such known components that are necessary for an understanding of the present invention will be described, and detailed descriptions of other portions of such known components will be omitted so as not to obscure the invention. Preferred embodiments of the present invention are illustrated in the Figures, like numerals being used to refer to like and corresponding parts of various drawings. FIG. 1 FIG. 1 100 100 100 100 100 102 104 100 116 104 116 116 100 114 114 100 100 114 100 114 112 114 112 100 100 114 The present invention provides a system and method for analyzing and managing spam e-mail. The term “spam” can be understood to include one or more unsolicited electronic messages, sent or posted as part of a larger collection of messages, all having substantially identical content. illustrates a system for analyzing and managing spam, according to one embodiment of the present invention. illustrates how e-mail traffic passes through system , which may be effective to screen, filter and disinfect e-mail prior to delivering it to its intended recipients. Although the present discussion concerns the spam analyzing and filtering capabilities of system , it should be appreciated that system may also function to filter content, detect and clean viruses and perform other desired e-mail screening functions. System is preferably implemented over a distributed network having multiple conventional servers , which are communicatively interconnected, although it may also be implemented on a single mail server of a network. The system preferably includes several remote and secure data centers that each house one or more servers . The data centers are physically constructed to withstand substantial meteorological and geological events, and include state of the art security measures, climate control systems, built-in redundancies and back-up generators. The data centers are preferably dispersed in remote locations throughout a geographic coverage region. A system operator may control operation of the system , and signup multiple customers or clients that may be recipients of e-mail. Any e-mail directed to clients will pass through system . System will analyze the e-mail traffic and substantially eliminate or reduce spam before it reaches clients . In order to route all e-mail through system , each client changes its mail exchanger or “MX” record to reflect the IP address of the system's DNS server . In this manner all mail directed to the clients will reach the DNS server for system and be passed through the system prior to reaching clients . 106 114 100 108 108 110 114 110 112 112 112 116 112 116 104 116 104 116 104 104 106 110 116 When a sender transmits an e-mail message addressed to a client , the e-mail passes through system as follows. In step (1), the message passes to the sender's Simple Mail Transfer Protocol (SMTP) server . In step (2), the SMTP server communicates with DNS server to request the MX record for the client . In step (3), the sender's DNS server makes a record request for the client's MX record, which is now associated with the system's DNS server . This request is thus passed to the system's DNS server . The system's DNS server then selects the most appropriate data center to service the e-mail. The system's DNS server will select the most appropriate data center based on one or more of the following criteria: (i) the “health” of the servers within the data center (e.g., whether the servers are functioning properly); (ii) the capacity of the servers within the data center (e.g., whether the servers are operating above or below a threshold capacity); (iii) the projected roundtrip time between a remote data center and the intended client ; and (iv) the geographical distance between the sender and/or the senders DNS server and the data center . Different weights can be assigned to the different criteria based on what would be suitable or desirable to a system operator under a given set of circumstances. 112 108 104 116 108 104 104 104 114 In step (4), the system's DNS server responds to the sender's SMTP server with an IP address corresponding to a server in the selected data center . In step (5), the SMTP server delivers the message to server . Server then passes the message through a message processor or “switch”, i.e., a software program for analyzing and managing spam, according to the present invention. Assuming the message is not blocked by the message switch, server subsequently transmits the message to client , as shown in step (6). FIG. 2 FIG. 2 FIG. 2 120 130 is a schematic diagram illustrating a message processor or switch and a spam analyzer , according to the present invention. While will be primarily described in relation to a system and system components, it should be appreciated that each of the portions or blocks illustrated in (as well as the portions or blocks illustrated in the other Figures) may represent logic steps or processes and/or the hardware and/or software utilized to perform the logic steps or processes. It should further be appreciated that any one or more of the portions or blocks shown can be implemented in a computer readable medium. 120 104 116 120 122 122 122 132 122 120 114 In a preferred embodiment, the message processor or switch is an application that runs on each mail server in every data center . The message switch includes a spam filter that receives all incoming messages. Particularly, the spam filter receives the incoming messages and preferably processes each in the following manner. The filter may scan the received message and compare it to rules that are stored within tables located within a relational database (e.g., spam database ). The rules are used to determine whether or not an e-mail is spam. Each rule within the database is assigned a unique identification (ID) number and a “score”, which may represent a weight or point value given to the rule for determining whether a message that matches the rule is spam. When a message matches a rule, the points are added or subtracted from the message's total spam score. A score threshold for each message is defined in the spam filter . When a message accumulates points greater than the threshold, it is marked as spam, and if it is below the threshold it is treated as legitimate mail. Therefore, the higher the point value associated with a rule, the more likely that a message matching the rule will be determined to be spam. The message switch will transfer legitimate mail to the intended recipient or client , and may mark other messages as spam and/or divert them to another location, such as a quarantine area. In a preferred embodiment, spam rules may be constructed using regular expressions. Some examples of spam rules and related scores and statistics or attributes are provided below: a) Subject: text: debt.*(?:termination|erase|killing|you|control|help|problem|solution|consult|evaluat|off your back|reduc|free|relief|consolidat|eliminat|negotiat|resolution|slash) score: 40 last_updated: 2003-09-29 16:31:08 last_updated_by: 30918 last_hit: 2003-10-01 08:59:57 num_hits: 530355 spam_hits: 528569 nonspam_hits: 1786 b) From: ----- text: e-mailoffer(z|s)\.(com|net|biz) score: 50 last_updated: 2003-02-12 23:36:36 last_updated_by: 30918 last_hit: 2003-09-25 23:36:08 num_hits: 87153 spam_hits: 87150 nonspam_hits: 3 c) Body: ----- text: no (prior|previous) prescription (is )?(required|needed|necessary) score: 35 last_updated: 2003-08-05 00:36:41 last_updated_by: 30918 last_hit: 2003-10-01 09:00:00 num_hits: 5917866 spam_hits: 5806019 nonspam_hits: 111847 d) HTML: ----- text: \<img src=\“http\:VV[[^V]+V[^\.]+\.php\??[^\>]+\> score: 5 last_updated: 2003-06-04 17:54:05 last_updated_by: 30918 last_hit: 2003-10-01 09:00:00 num_hits: 6549686 spam_hits: 6175173 132 100 nonspam_hits: 374513 As shown, the rules may include, inter alia, rules concerning content that may appear in the “subject heading”, “from heading” and body of an e-mail message. For example, a message will match the “subject heading” rule a) if it includes in its subject heading the term “debt” in combination with any of the terms shown in parentheses. A message will match the “from heading” rule b) if it includes in its from heading the term “e-mailoffers” or “e-mailofferz” with any of the suffixes “.com”, “.net”, and “.biz”. A message will match the “body” rule c) if it includes in its body combinations of the above-delineated such as “no prior prescription is needed”, “no previous prescription is required”, “no prior prescription necessary” and the like. A message will match the “HTML” rule if it includes any of the above-delineated HTML code. Each of the rules further includes related attributes, which in one embodiment may comprise statistics that are stored in the database . The statistics may include the following: (i) last_updated: the date the rule was last_updated or modified; (ii) last_updated_by: the identification number of the spam analyst that modified the rule: (iii) last_hit: the date on the rule was last matched or hit in the system ; (iv) num hits: the total number of times messages have matched or hit the rule; (v) spam_hits: the number of times messages determined to be spam have matched or hit the rule; and (vi) nonspam hits: the number of times messages determined not to be spam have matched or hit the rule. In one embodiment, the attributes further include a false positive statistic, “fb_hits”, which corresponds to the number of times the rule was triggered in e-mail messages that were incorrectly determined to be spam. It should be appreciated that the attributes need not be limited to statistical information and that in other embodiments, any type of desirable attributes may be stored in the database along with the rules. 122 124 120 126 120 122 The spam filter generates a string with encoded spam information including the ID number and score for each rule that the message matched. In block , information regarding the matched rules and corresponding scores is appended to the message. In the preferred embodiment, the message switch may accomplish this by creating a header on the message that includes the encoded spam information string. In block , the message switch generates a line of text for the message within a log file. Each message processed by the message switch generates at least one line of text in the log file providing the spam information for the message. Preferably, the text includes the encoded spam information string created in the spam filter . 120 102 128 102 128 128 130 128 130 130 130 132 Each message switch in the network periodically communicates the content of its log file to a central server . In this manner, spam information from across the network can be gathered and analyzed periodically. In the preferred embodiment, this happens once a day. After a message switch communicates this information to the central server , it may delete the content of its log file and then refill the log file in a similar manner. The central server passes all log files to a spam analyzer , which may be located on the server or on a separate server. The spam analyzer extracts and decodes all of the spam information from the log files. The spam analyzer analyzes the information to determine each rule that was matched or “hit”, and calculates various statistics such as how many times each rule was hit, how many hits of a particular rule were determined to be for spam messages versus nonspam messages, how many false positive hits were encountered, and the like. Based upon this information, the spam analyzer updates the tables in the spam database with new attributes or statistics for each of the spam rules, such as date last hit, spam hits, nonspam hits, and total hits. FIG. 3 200 130 202 130 204 130 206 130 208 130 210 130 212 130 214 130 216 206 214 216 130 218 220 130 206 218 130 222 132 illustrates one example of a method that the spam analyzer may employ to extract and analyze spam information from the log files. In step , the spam analyzer first pulls all log files received over a predetermined period of time from a storage area . In the preferred embodiment, the predetermined period of time is 24 hours. In this manner, the spam analyzer can analyze all spam information and dynamically modify spam rules every day. In step , the spam analyzer opens a log file. In step , the spam analyzer reads a line from the log file. In step , the spam analyzer extracts the spam information string found in the log line. In step , the spam analyzer decodes the spam information string and, in step , calculates and stores the corresponding statistics in memory. If the spam analyzer has reached the end of the log file, it proceeds to step , otherwise, it repeats steps -, as shown in step . Once all information from the log file has been extracted and analyzed, the spam analyzer closes the log file in step , and determines whether additional log files exists in step . If additional files exist, the spam analyzer repeats steps -. If the spam analyzer has reviewed all files, it proceeds to step , and updates the statistics and rules that are stored in the corresponding tables within the spam database , according to the extracted spam information. 130 132 100 130 130 130 132 In one embodiment, the spam analyzer further analyzes information regarding false positives and updates the corresponding statistics (e.g., fp_hits) and rules in the database . In this embodiment, the system communicates all e-mails that were falsely identified as spam to the spam analyzer . The spam analyzer extracts the header from each message and decodes it to determine the rules that were triggered or hit by the message. The spam analyzer then updates the fp_hits statistic for those rules in the spam database . 130 132 The spam analyzer may also automatically and dynamically modify the scores relating to the rules in the database . For example, if a rule has been hit for spam messages at an increased frequency, the score of that rule may be increased. Similarly, if a rule has been hit for nonspam messages or false positives at an increased frequency, the score of that rule may be decreased. FIG. 2 FIG. 4 134 100 132 102 104 100 104 300 302 132 304 306 308 310 312 104 314 304 312 316 132 Referring back to , in block , the system replicates the updated spam database across the network , so that each server has access to a copy of the updated spam information. In the preferred embodiment, system performs this replication by use of .db files, which are copied to servers across the network, and a program (“spamdump”) that is adapted to examine the statistics on the spam database and utilize only rules that it determines are “current” (e.g., rules that have been created or hit within a predetermined period of time), thereby effectively retiring rules it determines to be too old. illustrates an example of a method that the spamdump program may follow to select rules for replication and retire old rules. In step , the program connects to the spam database . In step , the program selects all spam rules within a table that have been created or hit within a predetermined period of time, which in one embodiment may be 30 days. In step , the program opens a .db file for the spam table on disk. In step , the program writes the selected spam rules to the .db file. In step , the program closes the .db file, which is subsequently transmitted to each of the data centers and replicated to all the mail servers on the network. Replication of .db files may occur at the expiration of a predetermined time period (e.g., once every hour). In step , the program determines if any additional tables are left to review within the spam database. If additional tables exist, the program repeats steps -. If not, the program proceeds to step and disconnects from the spam database . FIG. 2 136 114 100 114 132 Referring back to , block represents a spam online processing tool that allows spam analysts to adjust rules according to abuse reports. If a client receives a spam message that passes through system , the client can report the problem to the system operator. The system operator may employ spam analysts who use an online processing tool to view the message along with the spam information strings contained in the message header. The analysts can also adjust the score and statistics (e.g., spam hits, nonspam hits) relating to the associated spam rule in the spam database . 132 132 100 130 In one embodiment, abuse reports are sent to a predetermined e-mail address for receiving abuse mail. Submissions, which may comprise unidentified spam messages, are viewed by spam analysts by use of the spam processing online tool (SPOT). The tool may include a webmail-like interface that allows spam analysts to read submissions while also decoding the spam information included in the headers and sorting submissions into categories. The tool may also have an interface to the spam database , so that the analysts can dynamically modify the affected rules. When a spam analyst opens a submission, the analyst may examine the message for spam-related items (e.g., terms, phrases, image links, websites, sending addresses, and the like). If there are items within the message that exist in the current spam database , the score of related rules may be adjusted, in order to catch future spam messages of the type submitted. For example, if a rule has been hit at an increased frequency for spam messages, the score of that rule may be increased. If there are items within the message that do not exist in the current spam database, rules can be added corresponding to the items and assigned scores. System may also automatically adjust the statistics, rules and attributes by use of the spam analyzer as described above (e.g., by decoding the spam information included in the headers, and generating commands to the spam database to adjust the statistics or attributes related to the rules listed in the spam information headers). 130 In one embodiment, false positive reports (e.g., reports regarding e-mails that are mistakenly identified as spam, which may include a copy of those e-mails) are sent to a separate predetermined e-mail address for reporting false positives. Based on the reports, a system analyst may receive or retrieve the messages that were incorrectly filtered out as spam. These messages may be processed in a similar manner by spam analysts using the SPOT tool. False positive messages will usually include the header with encoded spam hit information. The SPOT tool automatically decodes this information, and spam analysts may modify the rules if they are found to have a score that is too high and causing false positives. Also, the message may be examined for other “non spam” items that may be added to the spam database with a negative score. The false positive e-mail messages may also be forwarded to the spam analyzer for extracting information and automatically updating statistics and rules as described above. The foregoing invention provides an improved method for analyzing and managing spam. The system and method monitors instances of spam, records these instances in a database, and uses resulting information and statistics to dynamically create, modify and retire rules for analyzing and managing spam. The system can also dynamically create, modify and delete rules based upon feedback regarding false positives. While the invention has been particularly shown and described with respect to illustrative and preferred embodiments thereof, it will be understood by those skilled in the art that the foregoing and other changes in form and details may be made therein without departing from the spirit and scope of the invention that should be limited only by the scope of the appended claims. BRIEF DESCRIPTION OF THE DRAWINGS FIG. 1 is a schematic diagram illustrating a system for analyzing and managing spam e-mail, according to the present invention. FIG. 2 FIG. 1 is a schematic diagram illustrating a message switch and spam analyzer used in the system shown in . FIG. 3 is a block diagram illustrating the operational flow of a method for analyzing spam e-mail, according to the present invention. FIG. 4 is a block diagram illustrating the operational flow of a method for analyzing spam statistics and updating spam rules, according to the present invention.
transmitted decreases, as pile yarn count (Ne) increases. Key words: Chenille yarn, abrasion resistance, pile yarn, lock yarn, pile length. NOTATION Nm Length in meter of a gram of weight, metric yarn count (Nm = 1.693 × Ne) Ne English yarn count dtex Weight in gram of 10,000 meters of fibre (dtex = 10,000 Nm ) dtexpy Pile yarn count in dtex dtexly Lock yarn count in dtex dtexf Fibre count in dtex n f Number of fibres in cross section of yarn (n f = dtexy dtexf ) npf Number of fibres in cross section of pile yarn (npf = dtexpy dtexf ) n lf Number of fibres in cross section of lock yarn (n lf = dtexly dtexf ) m Mass (g) (m = ρ · V) ρ Specific gravity of fibre (g/cm3) V Volume (cm3) (V = L · π · r 2) L Length in cm of mof mass l Length of a twist helix (step) (l = 100 860= 0.1163 cm for our sample) Rf Radius of fibre (cm) Af Cross-sectional area of fibre (cm2) Ay Cross-sectional area of yarn (cm2) Aly Cross-sectional area of lock yarn (Aly = π · R2l ) Apy Cross-sectional area of pile yarn (Apy = π · R2p) Rp Radius of pile yarn (cm) Corresponding Author:
https://www.edocr.com/v/xaz36y5o/globaldocuments/a-theoretical-approach-to-pile-yarn-sheddingpdf
Very rarely will you come across people who don’t love the smell and the appearance of lavenders in their garden? The bright violet color with the subtle smell is pretty immaculate and perfect for home gardens. But, sometimes, the leaves and the stunning foliage that contribute to the beauty of the plant might end up turning yellow. Instead of repenting the outcome, you need to work proactively to find the cause and then implement the relevant control measure to fix and restore the health of the lavender plant. Since there are a few potential reasons, we thought we’d line them up for our readers in this article. Why are my Lavender Leaves Turning Yellow? As mentioned, several factors can contribute to the lavender leaves turning yellow. It could be a pest infestation, a lack of nitrogen in the soil, or even due to external environmental stressors. For better understanding, we will highlight them one by one along with the ways you can fix the issue. 1. Overwatering Lavender has a very delicate root system, which means that both underwatering and overwatering can lead to complications in the long run. If the soil is waterlogged and not well-drained, the same can lead to complications like poor nutrient uptake, which can make the leaves turn yellow and then brown. Since lavenders are drought resistant, underwatering the plant won’t impose much of an issue. However, if you end up overwatering the plant, that’s where the problems start. Treatment The easiest way to tend to the problem is by assessing the issue. You have to check whether the soil is water-logged or not. Sometimes, even when the soil is moist, it isn’t a sign of overwatering. A moisture meter helps out in that case and allows you to keep a check on the water levels so you can water the lavender plants as needed. 2. Excess Nitrogen Nutrients are necessary for your soil but with lavender plants, the last thing you want to do is have excessive nitrogen levels in the soil. Not only is it damaging to the plant, but it also leads to risks of curling and browning of the leaves quite extensively. Since lavender naturally grows in areas with less water and nutrients, you have to mimic those growing conditions where you live as well. Overcompensating the soil with excess nitrogen might work with other plants but won’t work the same for your lavender plant. Treatment If you have accidentally sprayed the soil with excess nitrogen-based fertilizer, your first tip is to relocate the lavender plants. If they are directly growing in a garden bed and repotting isn’t an option, you can fill the soil with sand and grit. This will dissipate the excess nitrogen in the soil and prevent risks of damage to the plant in the long run. Even if you are using fertilizers, stick to blooming fertilizers since those works better than the standard lawn fertilizers. 3. Improper soil parameters The quality and composition of your soil have potential impacts on the growth of your lavender plant. Since lavenders are grown in the Mediterranean, you need to mimic the soil conditions like that. The lavender plants typically need a mix of sandy and quick draining soil. Besides the composition of the soil, you also need to be extra careful of the soil’s pH. If the pH is too acidic, chances are that the same will eventually lead to complications of the yellowing of the leaves. You need to maintain the pH at 7-8 for growing lavender. Treatment Your first control measure is to check the soil’s pH. If you find the soil to be too acidic than normal, sprinkle some garden lime to lower the pH. It works quite proficiently, so you shouldn’t have any issue increasing the pH and making it more alkaline. Also, add some potting mix to the soil to make it well-draining if you haven’t already. 4. Humid temperatures Excess humidity is another potential reason why your lavender plant isn’t growing at an optimal rate and the leaves are turning yellow instead of flourishing and expanding. The high humidity in the environment also leads to complications of poor flowering, which is hands down one of the biggest nightmares of a gardener. If you notice the humidity increasing in the surroundings, we’d highly recommend that you look into reducing the levels as quickly as possible. Also, avoid growing lavender if you live in areas with high humidity. Treatment If the lavender plants are potted and you can move them around, we’d recommend shifting them somewhere where you can control and reduce the humidity until the external conditions get better. The indoor growing might be a better option in that case but it brings a lot of hassle with it. 5. Root rot Last on the list of reasons why your lavender plant’s leaves are turning yellow is due to the root rot disease. It is a direct consequence of a potent and progressive fungal disease that can take a turn for the worse if it’s not managed well. The fungal infestation directly attacks the roots, affecting the nutrient and water uptake in the plant. The condition generally happens when the soil is waterlogged due to overwatering. If you notice the leaves turning yellow and wilting from the sides, it is probably due to root rot disease that you have to pay extra attention to. Treatment The only way to know if its root rots is to uproot the plant carefully. If the roots are black, it is a sign of root rot. A generous spray of fungicide is your only hope of mitigating this issue. If the leaves don’t regain their green color even after that, chances are it’s beyond repair. Conclusion Lavender plants have very specific growth parameters. If you are growing it for the first time, we’d recommend running basic research first and understanding the dos and don’ts. Once that’s out of the way, you can go ahead and implement the first aid as we suggested.
https://www.plantsofmerit.org/why-lavender-leaves-turn-yellow/
“House of Craftsmen” … celebrates heritage Celebrating intangible heritage and preserving traditional crafts and practices as part of the Emirati identity, the “House of Craftsmen” in the Al Hosn area, which opened its doors a month ago, is organizing a permanent exhibition to honor artisans and their contributions by promoting their products, under the title “Traditions Through Generations.” This exhibition is part of the broader strategic plan through which the Department of Culture and Tourism works to document the history and culture of the Emirate of Abu Dhabi in new, interesting and attractive ways. House of craftsmen Visitors to learn about traditional products, including the materials and skills required to produce them, as well as learn about contemporary art by emerging Emirati artists to present works inspired by Emirati traditional crafts. Pads During the press tour that was organized yesterday, Nawal Al Shehhi, a “cultural guide,” said: House of craftsmen It includes spaces for presenting workshops that will organize public programs, events and cultural activities to form a platform that provides a deeper understanding of the social values ​​that shaped the Emirati identity, explaining that this exhibition is an opportunity to celebrate the ingenuity of the Emirati men and women and their wisdom and experiences that contributed to the creation of a range of handicrafts. a tour The press tour began with a video showing the diversity of traditional traditional crafts in various Emirati environments, while Al-Shehhi confirmed that the permanent exhibition consists of 4 platforms, namely, “The Coffee House”, “Al Khous”, “Al Tili” and “Sadu”, in addition to several islands. There are more than 16 contemporary artists whose works are inspired by traditional crafts, confirming that the exhibition that was opened before Ramadan organizes art workshops for adults and children, and that the contemporary works it includes symbolize the Emirati identity and connection with the past, confirming that Emirati crafts have developed over time, due to social and economic factors. And technological. The exhibition includes a wall decorated with more than 60 traditional pieces, and displays a set of tools that were used in the past in the manufacture of crafts. House of craftsmen The handicrafts of theHouse of craftsmen»With the creative and artistic relationship between the people of the UAE and the local natural resources over time, the artisans were able to develop their skills to meet their employment and economic needs, taking advantage of the natural environment in the country, which is characterized by its richness and diversity, where there are three types of ecosystems, including the system Desert, mountain, and nautical, craftsmanship thanks to these skills reflect a highly artistic sense. Sadu Sadu is one of the traditional crafts that Emirati women have used since ancient times. Women use sheep’s wool, camel hair, and goat hair to create beautiful and distinctive designs rich in their geometric shapes that mostly reflect the social identity and the surrounding environment. This type of weaving was used in the manufacture of tents or “poetry houses”, and different types of Sadu were also used to decorate tents from the inside. Wicker The date palm is the mainstay of many handicrafts in the United Arab Emirates, and although palm trees are known to be the main source of food in the region, their branches and fronds are also included in the traditional craft of weaving known as Khous. Khous, as they weave or braid palm fronds to make various products and tools. The next Al-Tali is one of the traditional forms of decorative embroidery practiced by women in the United Arab Emirates, where cotton or silk threads are used intertwined with gold and silver threads to decorate collars, sleeves, kandora edges and dresses The sparkle of intricate designs and vibrant colors. Marine crafts Over thousands of years, Emiratis have found innovative ways to explore the sea and benefit from its riches. The boat building industry has helped develop trade ties across the Arabian Gulf and the Indian Ocean. Pearling and fishing boats also contributed to the local economy greatly.
According the current hydropower development schedule in upstream Lanchang River, numbers of hydraulic power plants with height over 300 meters will be built in the western region of China. These hydraulic power plants would be in crucial situation with the problems of high water head, huge discharge and narrow riverbed. Spillway is the most common structure in power plant which is used to drainage and flood release. According to the previous research, the velocity would be reaching to 55 m/s and the discharge can reach to 300 m3/s.m during spillway operation in the dam height over 300 m. The high velocity and discharge in the spillway may have the problems such as atomization nearby, slides on the side slope and river bank, Vibration on the pier, hydraulic jump, cavitation and the negative pressure on the spill way surface. All these problems may cause great disasters for both project and society. This paper proposes a novel method for flood release on high water head spillway which is named Rumei hydropower spillway located in the western region of China. This paper has following components: Determining the type and the layout of the spillway through the perspectives of air entrainment, flow jet angle and water energy dissipation in flushing pond structure. The physical hydraulic model has been used to evaluate spillway design effects. Introduction In the last few decades, hydropower projects have developed rapidly in China. With the hydropower development booming in southwest regions of China, a number of hydropower projects will be built along the Lancang River, Jinsha River, Nu River and Brahmaputra. Spillway is the most important structure for releasing flooding and for energy dissipation [1,2]. Spillway is also a main control factor to guarantee the hydropower plant operational safety. How to safely release huge flood discharge energy is always a problem and it’s attracted researchers’ attention to it. It is easy to cause disaster to the national economy due to improper spillway design. For example, the spillway in Sayan Shushenskaya hydropower station in Russia has destroyed due to the improper spillway design and operation. India Bukla Hydropower Station, the energy dissipation tank would destroyed when the flood discharge ponds have a lot of hydrodynamic pressure at the bottom of the water. In the United States, the Dvorshkon hydropower station also causes the structural destruction of the energy dissipation tank. In China, The Spillway on Yupang, Ertan, Liujiaxia and Longyangxia hydropower station also meet damaged due to cavitation and hydrodynamic pressure [3,4]. Therefore it is has significantly meaning to study hydraulic characteristic on spillway especially the hydropower projects with high water head and large discharge. In the dam project, the spillway design must solve a series of hydraulics problems based on numerical and/or physical model. However, for the flow velocity which is higher than 25 m/s, there is no suitable software or numerical model which could well simulated. The maximum velocity in many spillways are high than 25 m/s. For example, the maximum velocity in Dongqin hydropower project is 37 m/s, the maximum velocity in Dongfeng hydropower project is 32 m/s, the maximum flow velocity of Hongjiadu Hydropower Station is 34 m/s, the maximum flow velocity of Nolek spillway is 59 m/s, and the maximum velocity in Glutinous Rolling spillway is 53 m/ s [5,6]. So, the physical model is the suitable option for the spillway design. In order to decrease the damage of high-speed flow, increasing concrete strength, aeration devices, and energy dissipation options are very important components on spillway design. The aim of this paper is to design the suitable spillway for Rumei hydropower project with the maximum discharge 13617 m3/s, with the water head 272 m, and with the dam height 315 m. The spillway design is focus on three parts: aeration devices types; water tough design; and energy dissipation tank design. Material and Method In order to fulfill the industrial energy requirement and to increase the share of renewable energy, China has proposed 13 hydropower construction bases from 1989 and expected to complete in 2050. The Rumei hydropower project is belonging to one of the hydropower construction base named Lanchang-Mekong River Base with 3.83×1010 m3 on reservoir capacity and 315 m of the dam height. According the plan, the Rumei hydropower project is expected to start construction in 2025 and completed in 2040 . The location, scheme of hydropower project layout, and the vertical section of spillway is shown in Figure 1. In this study, a standardshaped spillway with high water head has been proposed for Rumei hydropower projects. Several physical model were setup for the optimal spillway design. In this paper, we focus on how to reduce the sub atmospheric crest pressure on spillway with a aeration devices. We also focus on the crest bridges design and energy dissipation with the physical model. Result and Discussion Aeration devices types The spillway surfaces with high speed flow may cause cavitation damage of spillway and the aeration devices tends to deflect the high velocity flow away from the spillway surface. The aeration device in the spillway of Rumei hydropower projects is show as Figure 2. It can be noticed that with the side and central vert tube, the air demand in the spillway are expected to fulfill. The ridge of the aeration device could guarantee the full integration of flow and air. This aeration device has been verified in Dongqing and Hongjiadu hydropower projects with good effects on spillway protection (Figures 1,2). Flow pattern over the spillway crest The flow pattern based on two types of spillway crest are shown in Figure 3. It can be noted that there are two lays of the water flow in Figure 3A. However, the design of this type of spillway crest easily to result in landslide and intensive atomization. Based on the design of Figure 3B, there flow concentration and atomization problems are still existing. It is also easily to increase the hydrodynamic load on the spillway bottom. Thus, this two types of spillway crest cannot fulfill the energy dissipation on Rumei hydropower project (Figure 3). Suitable energy dissipation based on optimal spillway design In order to achieve good energy dissipation effects, the spillway were divided into three separate drains and the detailed designed size as well as the physical model are shown in Figure 4. With this design, the energy dissipator is also divided into three independent energy dissipators. Each of them can be individually designed and could significantly increase the energy disspiation effects (Figure 4). The flow pattern of the physical model based on different discharge are shown in Figure 5. Based on the physical model experiments, it’s can be easily noticed that the flow pattern on all schemes are fully developed and the energy dissipation effects is very good. It is also indicated that the flow impact region are evenly distributed along the tank which means that the flow concentration and velocity concentration can be avoid. In order to accurately and comprehensively analyze the high-flow impact pressure of on the bottom, pressure-measuring points are arranged in 17 rows and 5~7 columns on the floor were set to measure the pressure. The bottom pressure sensor layout is shown in Figure 6 and the measurement value are shown in Table 1. It can be noted from the Table 1 that the pressure values changes are very slightly and no significant pressure difference between adjacent measuring points. This suggested that there is no large hydrodynamic impact pressure existing on the optimal energy spillway design. It is also suggested that the optimal spillway design has good energy dissipation effects (Figures 5,6) (Table 1). Table:The measurement value of pressure on spillway bottom. Conclusion In the hydropower project with high water head, the spillway energy dissipation and anti- flood safety are paid much attention. It is very difficult to design a high-head flood discharge energy dissipation system for a dam with over 300 m height. In this study, we did some primary research on the spillway design based on physical model. The following research would focus on the numerical simulation and repeat the physical model. It is also necessary to grasp and follow a safe degree, maximum flow rate control, control of aeration and energy dissipation, control of atomization. Acknowledgement None. Conflict of Interest No conflict of interest. References - Lian J, Yang M (2008) Beijing China Water Power Press. J. E 01. - Sun S (2009) Eur Phys J of China Water resources and Hydropower Research 7(2). - Wang H, Dai G (2004) Progress in Water Conservancy and Hydropower Engineering. - Shi Q, Pan S (2013) Journal of Hydraulic Engineering. - Xiao R (2008) Hydropower station design. - Yang Q (1995) Water power generation. - Yao W (2018) J Total Research.
https://irispublishers.com/ctcse/fulltext/hydraulic-facilities-characteristics.ID.000616.php
On Tuesday and Wednesday, people from the Municipality of Strpce gathered in protest the construction of a mini hydropower plant in Obe Reke, citing damage to their water supply during construction. Excavation currently underway to build a mini hydropower plant in the Municipality of Strpce was interrupted on Tuesday by protestors attempting to halt the construction of the plant by the Matkos Group. According to Serbian media organization N1, peaceful protesters assembled at the site of construction and requested access to official permits for the construction. However, no authorities they have requested information from shed light on Matkos’ authorizations to build, they said. The protests began following damage during excavation work following hydropower plant works, to a water reservoir in the municipality that supplies water to around 2,500 citizens, according to Radio Kim. A police unit from nearby Ferizaj was deployed in an attempt to end the protests on Tuesday as well as Wednesday, to allow the workers to continue with construction. Matkos Group, a company based in Prishtina, is in charge of the hydropower plant construction, and has planned five different mini hydropower projects in the Municipality of Strpce according to the website of the Energy Regulatory Office in Kosovo, ERO. One of these plants has been in operation since January 2016, and three have been granted authorization for construction. Strpce, a Serb-majority municipality located in the south of Kosovo not far from the Macedonian border, rests within the Sharr Mountain National Park. However, the construction plans for hydropower in this area fall out with the border of the national park itself. In 2016, the Assembly of the Municipality of Strpce, with no specific time frame, suspended all building activities related to the construction of small hydropower. It is not clear whether this suspension has been lifted. According to N1, officials from the Municipality of Strpce who have the power to hand over licenses to mini hydropower construction companies have been silent on the issue, but several people in attendance on Tuesday were called by the police for interview regarding the protests. Currently there are six mini hydropower plants in operation which have the capacity to generate up to 10 MW of electricity, located in Strpce, Decan, Dragash, and Mitrovica. The Kosovo government has pledged to utilize both new and existing hydropower to its full potential, the process of siphoning water to generate electricity using Kosovo’s rivers, as part of their promise to rely on 25 per cent renewable energy for electricity by 2025. The plan has been criticized by Kosovo citizens and environmental organizations, for negative consequences of its hydropower plan, especially in National Parks such as the Accursed Mountains and Decan Municipality, where three hydropower plants are located. Studies have identified more than 70 locations where hydropower plants can be built and installed. These plans were widely accepted by Kosovo institutions, regardless of the scarce water availability in Kosovo. A report on the state of water from the Ministry of Environment and Spatial Planning, published in 2015, says that Kosovo has around 1,600 cubic meters of water per capita, the lowest in the region, and not enough to fulfil the necessary amount needed to sustain the population, regardless of hydropower construction. The report states that the distribution of water is both “unequal and inadequate” in relation to demand. The Kosovo Energy Regulatory Office published a list of companies which have been awarded licenses to generate, import, export or supply electricity using hydropower, on which Matkos is listed. The Ministry of Economic Development reviewed the incentive scheme for feed-in tariffs for hydropower plants in 2018 in their National Renewable Energy Action Plan, amending the amount the government will pay to buy renewable energy for use in Kosovo from private companies such as Matkos. The Energy Regulatory Office, ERO, increased the amount the Government pays from 63.3 euros to 67.3 euros per MWh, which is one million watts of electrical power produced continuously for one hour, for electricity generated through small hydropower such as the one planned to be built in Strpce, paid to Matkos. Founder of the Peja-based NGO Environmentally Responsible Action Group, Ellen Frank, said reliance on hydropower for renewable energy is an unsustainable alternative source for Kosovo. “It destroys the ecological flow of the river, damaging the entire ecosystem, everything from the animals that rely on the river to the communities around it,” said Frank. The protests against the construction of the plant and the damage to the water reservoir will continue on Thursday. 23 January 2019 - 17:16 Following the most recent episode of “Jeta ne Kosove,” which broad... Five former ministers - three of which are currently in power - are ... Six youngsters from the BONEVET makerspace showcase Europe’s first t... The Kosovo Energy Corporation is pumping millions of tons of ash produ... Beyond winter’s staggering pollution peaks, there is another crucial... Tradition, change shape cuisine and people from Gjakova to Zllakuqan. ...
https://prishtinainsight.com/strpce-citizens-demand-halt-to-hydropower/
Back in the early 70s, along the south side of University Drive, there was once a neighborhood of tree-lined streets. The Black Student Union gathered for social events in a little red house on Euclid Avenue. It was also a place to discuss racism and civil rights, a comfort zone and a rallying point during difficult times. The house became known as the Black Cultural Center, entirely operated by students of Boise State University. 2256 University Drive In 1974, the Black Cultural Center moved into a house on University Drive northwest of the Administration Building (now the Brady Parking Garage), and was renamed the Minority Center to more accurately reflect the student organizations who met there: Black Student Union, Hui-O-Aloha, Dama Soghop, MEChA, and Club Español. Students mostly used the house to hold meetings and hang out, but eventually, with assistance from Special Student Services, the Center would evolve into a place where ethnic minorities could benefit from programs and services that would help meet their academic, social and cultural needs. Tutoring programs were established and goals were set to bridge the communication gap between students and the university, and to incorporate Black, Chicano, Native American and Asian cultures into the curriculum. Before moving into its present location on the second floor of the Student Union Building, the Center would relocate twice and undergo several name changes. It would also continue to evolve, offering better opportunities and improved services and programs to students who would eventually come from all over the world. A Place for Everyone From that little red house, and years of hard work and dedication from many students, faculty and staff, ideas grew into award-winning programs, crowd gathering events, and university-wide campaigns focused on promoting cultural understanding and the importance of racial harmony. Today, Boise State’s Student Equity Center is a vital campus resource financially supported by the university. It’s not only used by students, but faculty and staff as well. It’s a place for everyone—black and white, Latino and Native American, Asian and European. Martin Luther King Jr. Human Rights Celebration A significant achievement for Multicultural Student Services was the creation of the Martin Luther King Jr. Human Rights Celebration (MLK). Originally focused on racial issues, the week-long event has expanded through the years to address all issues regarding human rights. Educational programming includes workshops, films, lectures, exhibits, political demonstrations and internationally known speakers. Each year the celebration underscores Boise State University’s commitment to upholding the values of respect and civility, encouraging all citizens to be responsible and fair. The MLK Celebration also helped pave the way to the passage of the Idaho law that granted a statewide holiday for Martin Luther King Jr. Human Rights Day. One Decade at a Time The timeline below traces Multicultural Student Services’ progress and Boise State’s continuing efforts to build communication and understanding among all people, and to promote and preserve cultural diversity. 1970s 1970-74: The Black Student Union meets in a little red house on Euclid Avenue that becomes known as the Black Cultural Center. 1972-73: Special Student Services Committee forms to develop programs and services to assist groups with “special needs,” underrepresented people that include “Blacks, Chicanos, Native Americans, Asian-Americans, handicapped, veterans, foreign students and the disadvantaged (i.e., single parents and women).” 1974-75: Boise State College becomes Boise State University; the Black Cultural Center moves to 2256 University Drive and is renamed the Multi-Ethic Center; the Center is considered “an extension of the Student Union.” Hours of operation are irregular, as work-study students must accommodate their class schedules. 1975-76: The Multicultural Board is established by ASBSU (Senate Act # 15) as a central organization to develop, coordinate, budget and implement educational, cultural, social and humanitarian programs and services. 1979-80: Multi-Ethnic Center is renamed the Multicultural Center 1980s 1980-81: University Child Care Services moves into 2256 University Drive, sharing space with the Multicultural Center. 1982-83: The Center, along with Child Care Services, moves into the student organizational space of the newly completed Pavilion (now Taco Bell Arena). 1986-87: Under “Student Organizations” in The Student Handbook, a new category appears: “Cultural” replaces “Special Interest,” listing ethnic minorities separate from handicapped, veterans, foreign students, single parents and women. 1988-89: The Black Student Union leads a rally on the Business Building Plaza to persuade Boise State and the state of Idaho to honor the federally recognized Martin Luther King Jr. holiday. University President Dr. John Keiser and ASBSU President Jeff Russell form a committee of students, faculty, staff, and members of the local community to help develop a celebration that would not only honor King, but also emphasize human rights for everyone. 1989-90: The first MLK Human Rights Celebration is held and partially funded by the student senate; Martin Luther King III is the keynote speaker. On April 10, Gov. Cecil D. Andrus signs the bill granting a statewide holiday for Martin Luther King Jr. Human Rights Day on the third Monday of January, making Idaho 47th in the nation to honor the slain civil rights leader. 1990s 1990-91: The Center moves out of the Pavilion and into the SUB Annex II across the street from the Student Union (next to the Lincoln Parking Garage); first march to state capitol during MLK Human Rights Celebration; Gaylord Walls is hired as the minority student assistance coordinator for Minority Affairs with Special Student Services. He receives $1,500 from Vice President of Student Affairs David S. Taylor for Center operations. 1991-92: According to documents, the names Multi-Ethnic Center and Multicultural Center are used interchangeably until 2003. 1992-93: MLK Celebration wins Bronze CASE Award (Council for the Advancement & Standards in Education) for outstanding student involvement programs. 1994-95: The Cultural and Ethnic Diversity Board is established. 1996-97: MLK Celebration wins second Bronze CASE Award. 1997-98: In the Student Handbook under Student Organizations, “Ethnic” replaces the word “Cultural.” The number of ethnic clubs increases from six to eight. 1998-99: MLK Celebration wins Gold CASE Award, taking top honors for student involvement programs. The MLK campaign wins first place for the ACUI National Design Competition. Nearly 1,300 people attend the keynote address delivered by Dr. Michael Dyson, and more than 4,500 people participate in the weeklong celebration. 2000-2011 2000-01: Students no longer run the Center, which is institutionally recognized and receives thousands of dollars in funding to support programs and services; administrative support shifts from Special Student Services to Student Union and Activities; Tam Dinh becomes the first, full-time director. Paid staff includes a graduate assistant and a program director. Ethnic student enrollment numbers increase to 1,745 (1,514 in the previous year). 2002-03: The Center officially becomes the Cultural Center; orientation programs are offered to new minority students; Pow Wow celebrates 10 years; MLK moves to the Pavilion to accommodate 2,500 people for the keynote address delivered by Danny Glover and Bill Fletcher. 2003-04: Rosario Parker becomes the new director; Center moves to the second floor of the SUB, an increase of space from 600 to 1,600 square feet; faculty senate officially approves the diversity requirement for the core curriculum; State Board of Education approves a $1.50 student fee to support the annual MLK Human Rights Celebration; the number of ethnic student organizations is 13; International Food, Song & Dance Festival celebrates 25 years. 2004-05: Campuswide campaign “Stop Hate” is held to communicate values and civility, and show the university’s commitment to zero tolerance of bigotry and discrimination following a threat made to a student based on sexual orientation; the Cultural Center hosts the “Racism and Immigration Forum.” 2005-06: Diverse Perspectives Film Series begins; Tunnel of Oppression comes to campus, offering the Boise State community and the general public the unique experience of “walking in someone else’s shoes.” 2006-07: Student fee allocation is initiated to help support the Center (50 cents for a full-time student, five cents for part-time); first department MySpace account is created on campus, providing students with a private social network to discuss difficult topics and voice concerns freely without fear; HERO Awards are presented to recognize contributions to the Cultural Center. Ethnic minority student enrollment numbers continue to rise—2,174 compared to 2,007 in the previous year. 2008-09: Full-time director Francisco Salinas is hired for the newly established office of Student Diversity and Inclusion; The Cultural Center no longer operates through Student Union & Activities and begins operating through Student Life under the Division of Student Affairs. The term “non-dominant” replaces “minority” to reflect more clearly how it is power dynamics and not population numbers that determine a dominant culture. 2009-10: The International Student Services Center is established and moves in next to the Cultural Center, serving as a liaison between faculty, staff and international students. Spring enrollment numbers reveal that 12.9 percent of Boise State students are of ethnic diversity. 2010-11: The Cultural Center is renamed Multicultural Student Services and is housed, along with International Student Services, in the Student Diversity Center. Fall enrollment numbers reveal that 13.5 percent of Boise State students are of ethnic diversity (2,693 students), and international students represent nearly two percent of non-residents. Thanks to the many people who helped to create the timeline for the history of Multicultural Student Services: Alan Virta and his staff, Special Collections, Albertsons Library; David Taylor; Gaylord Walls; Greg Brown; Billy Handcock; Tam Dinh; Melissa Wintrow; Rob Meyer; and Sandra Friedly.
https://www.boisestate.edu/student-equity/about-us/history-of-student-equity/
Advocacy group Children in Hospital Ireland has called on the Government to establish a scheme to defray the non-medical costs incurred by families whose children spend long periods in hospital. The call follows the revelation by a Co Kerry couple that they have been getting no State funding despite having to make two round-trips a week to a Dublin hospital where they have been keeping vigil at their baby's bedside for the past eight months. Mother-of-two Jenny Pye has been nursing her baby Jake at Children's Health Ireland at Temple Street at 8am every day. When she returns by foot to Hugh's House, she tidies her room and catches up by phone with her husband Alex and her older child, Sadie, who are at home in Tralee. Jake was born with Omphalocele, which means most of his organs were outside his body at birth. Jenny says the condition was detected during pregnancy using amniocentesis and medical specialists gave Jake a 5% chance of survival beyond a few days. But eight months later, Jenny says thanks to the "wonderful" team of personnel in Temple Street, the skin continues to grow over the cavity through which his organs protruded. But Jenny believes Jake would not have thrived unless her and Alex had decided that one of them would be at his bedside every day since his birth. They do this by shuttling the 300km that separates them at least once a week. "We wave to each other in Birdhill, Co Tipperary," she explains. Alex travels northwards as his wife travels south to spend a day or so with five-year-old Sadie. "Alex works on his laptop while Jake is resting in the hospital," adds Jenny. But Jenny, who is an ambulance paramedic, has finished her maternity leave and is no longer being paid by the HSE. The family has been sustaining all the extra expenditure involved in staying with Jake on one salary, while paying their mortgage, which was taken out when they were both working. Jenny says her family receives no financial help from the State to ease the pressure. She feels it is ironic that they will qualify for the €300-plus monthly Domiciliary Care Allowance only when Jake is discharged from hospital and the new chapter of caring for him in their Tralee home begins. Domiciliary Care Allowance is only paid when a child is at home and not when a child is a long-stay patient in hospital. She says she does not know where they would be were it not for the free sanctuary offered by Hugh's House. It is seven years since Dublin-based Ade Stack and Marty Curly lost their baby Hugh after long stays in two Dublin hospitals, the Rotunda and Temple Street. While nursing him, they were shocked at the spectacle of other parents sleeping on floors or in cars in order to be with their very ill babies. Over two years ago they purchased two properties on Belvedere Place and opened Hugh's House, and have since completed an extension. Maria Brennan manages the home-away-from-home like a fairy godmother, Ade says, but the rest of the work is done by volunteers. Ciara McKenna, a Medical Social Worker at the National Maternity Hospital in Holles Street, says that earlier this week when she sought a quote for an overnight stay in a double room for a couple whose baby is terminally ill, she was quoted €350. "There's no joined up thinking between the various arms of government that are involved here," she observed while attending the opening of the extension and makeover to Hugh's House. The money for the work was raised from philanthropists, chiefly DFS couch retailers and Yvonne Mulligan of Nine Yards Design. According to the Social Work Department in CHI at Temple Street no data is held on the proportion of parents of long-stay patients who get support for their accommodation when they have to travel from outside Dublin. Some patients get "basic" single rooms on site, CHI say, and two families can be accommodated at the bespoke house. "In addition, accommodation is provided by Hugh's House, a voluntary charity set up to provide accommodation locally for families". CHI at Temple Street's Social Work Department organises and funds local B&B accommodation for parents for one or two nights in an emergency such as a child being admitted to ICU. The hospital's Samaritan Fund pays for this. Asked whether sufficient provision is being made by the State for parents like Alex and Jenny Pye, CHI said an appropriate package of accommodation and financial support should be provided to each family based on their need and should be accessible through CHI at Temple Street where an assessment of that need can be undertaken. "This assessment needs to factor in the family's circumstances, the costs of travel, food, accommodation, wages lost, other financial demands on the family because of the presence of main carer within the hospital (e.g. extra child care costs)." But the statement continues: "This provision is not always achieved". It adds that no provision is made for families on social welfare payments who are living outside Dublin to collect social welfare benefits while in hospital with their child in Dublin, a failing, which CHI said, "can cause financial distress and hardship" for the families concerned. In urgent circumstances, families should be able to be provided with an urgent needs payment from Community Welfare Officers without having to return to their local area to make the application in person. CHI at Temple Street would be willing to support such applications if required, it said. For families where one parent is in employment, they are not entitled to urgent needs payment if their child is suddenly admitted to hospital. Consideration should be given to low-income families whose child is admitted in an emergency for an urgent needs payment in recognition of the extra costs of having a child in hospital can incur, especially when that hospital is at a distance from their home. CHI clearly believes these are pressing issues. "CHI at Temple Street deal with families on a daily basis who experience financial hardship due to the extra costs incurred when their child is in hospital. "When this is seen in the context of a parent worrying about the very sick child, the enormity of such difficulties becomes evident. Even when a child is well again, and the family is back at home, it can take months for the family to recover financially which places more financial burden on the family," the statement concludes. Volunteers from CHI play with children like Jake and frequently witness the challenges faced by families like the Pyes. The organisation has been urging governments to be more generous for years, but with limited success. Anna Gunning, CEO Children in Hospital Ireland, said they want the Government to establish a programme of support for such families. A spokesman for Minister for Social Protection Regina Doherty told RTÉ News she had asked officials to examine the issue.
https://www.rte.ie/news/ireland/2019/0704/1060253-chi-hughs-house/
Richard Branson will try to beat Jeff Bezos to space with July 11 flight If all goes as planned, Branson will make his flight nine days before Bezos, the founder of Amazon, straps into the New Shepard capsule built by his rocket company, Blue Origin By Kenneth Chang Published: Jul 2, 2021 Richard Branson looks at photos from the pilots’ perspective following the launch of the test flight of Virgin Galactic’s manned space tourism rocket plane SpaceShipTwo during its space test flight in Mojave, California, U.S. December 13, 2018. Image: Reuters/Eric Johnson Seeking to upstage Jeff Bezos as the first rocket company owner to go to space, Richard Branson, the British billionaire who founded a galaxy of Virgin companies, announced Thursday night that he would be a member of the crew on the next test flight of the Virgin Galactic space plane. That flight is scheduled to take off July 11 from Spaceport America in New Mexico. “The team was ready, so they asked Richard if he was ready to go,” said Aleanna Crane, vice president of communications for Virgin Galactic. “It’s a big day. It’s a very exciting day.” Branson will be in a position to claim bragging rights in a growing business of spaceflight for private citizens. Companies including Virgin Galactic and Bezos’ Blue Origin are competing to launch paying passengers on suborbital and orbital trips in the coming years. Although the first trips will be expensive, the expectation is that ticket prices will come down over time as the market grows. Branson founded Virgin Galactic in 2004 to provide short space tourist flights to the edge of space, and he has long said he will be a passenger on the first commercial flight. But development of the SpaceShipTwo — a winged rocket that flies to an altitude of more than 50 miles — has taken years longer than Branson expected. The setbacks included the crash of the first SpaceShipTwo plane, VSS Enterprise, in October 2014 during a test flight, which killed one of the two pilots. In 2019, Virgin Galactic became a publicly traded company, although Branson’s Virgin Group remains the largest shareholder, with a 24% share. The most recent powered test flight, in May, was the first that the company conducted from New Mexico. Previously, development and testing of the spacecraft had occurred in Mojave, California. Crane said that the last flight had been so flawless that the team had decided to test the cabin experience. “Who better to test the full cabin experience than Richard Branson?” she said. “He is flying as a mission specialist, and he has a role like the rest of the crew.” The craft will carry three other Virgin Galactic employees in the cabin seats in addition to the two pilots up front. “It’s one thing to have a dream of making space more accessible to all,” Branson said in a statement. “It’s another for an incredible team to collectively turn that dream into reality.” The company plans to broadcast the flight beginning at 9 a.m. Eastern time on July 11. The SpaceShipTwo rocket, named Unity, will be carried under an airplane named White Knight Two to an altitude of 50,000 feet before being dropped. Unity’s engine will then ignite, taking it up to higher than 50 miles. At the top of the arc, passengers will float for about four minutes before the space plane reenters the atmosphere and glides to a runway landing. If all goes as planned, Branson will make his flight nine days before Bezos, the founder of Amazon, straps into the New Shepard capsule built by his rocket company, Blue Origin. New Shepard has flown to the edge of space 15 times but has yet to carry any people. It is fully automated, without pilots. Billionaires like Branson, Bezos and Elon Musk are the vanguard in a new age of commercial spaceflight, accompanied by verbal jousting — sometimes playful, sometimes belittling — about whose company is better. On Wednesday, during an appearance on CNBC, Branson was asked if he was trying to beat Bezos to space. “Jeff who?” Branson replied with a straight face before laughing. The remark echoed one Musk had once made in a BBC interview. Even if Branson launches first, Bezos could still argue that he went to space and Branson did not. SpaceShipTwo does not quite reach the 62-mile altitude most often considered the edge of outer space, while New Shepard passes above that height, also known as the Karman line. “We wish him a great and safe flight, but they’re not flying above the Karman line and it’s a very different experience,” Bob Smith, Blue Origin’s chief executive, said in an emailed statement. However, the U.S. Air Force and the Federal Aviation Administration put the boundary lower, at 50 miles. The FAA granted astronaut wings to Virgin Galactic crew members who had flown on earlier test flights.
Black Bolt was born to two of Attilan's top geneticists, Agon, head of the ruling Council of Genetics, and Rynda, director of the Prenatal Care Center. Subjected to the mutagenic Terrigen Mist while still an embryo, Bolt was born with strange powers surpassing even the Inhumans' norm. As an infant, he demonstrated certain energy-manipulative abilities which he could not yet control, particularly that of producing quasi-sonic energy of great destructive potential. To protect the community, he was placed inside a sound-proofed chamber and given an energy-harnessing suit. There he was schooled in the art of controlling his powers until the age of nineteen, when he was permitted to enter society. A month after being awarded his freedom, Black Bolt discovered his younger brother Maximus in the process of making a treacherous pact with emissaries of the alien Kree. Attempting to stop the Kree ship before it escaped, Bolt used the forbidden power of his quasi-sonic voice to knock the ship out of the sky. When the ship crashed to Earth, it landed on the parliament, killing several key members of the Council of Genetics, including his parents, Agon and Rynda. The reverberations of his brother's shout affected Maximus's sanity and suppressed his nascent mental powers. Despite his guilt and silent protests, Black Bolt was obligated to accept the mantle of leadership of the Inhumans at age twenty. Black Bolt's first crisis in leadership came when his cousin Triton was briefly held captive by humans. Learning of Triton's encounter upon his escape , Black Bolt decided that the Inhuman' island of Attilan was in imminent danger of discovery by humanity. Black Bolt scouted out possible sites to which to move, and settled upon the remote Himalayan mountains. After the great migration, Black Bolt faced his second great crisis when his now mad brother Maximus unleashed the Trikon, three of the Inhumans' worker drones who were transformed into energy-beings. The Trikon enabled Maximus to wrest the rule of the Inhuman from his brother and send Black Bolt and the other members of the Royal Family into exile. For the next few years, Black Bolt and his kinsmen wandered Asia, Europe, and finally America, in search of Medusa, his betrothed mate, who had been separated from the others during the battle with the Trikon. Eventually Black Bolt was reunited with Medusa and the Royal Family returned to Attilan and resumed the crown. Black Bolt led the Inhumans through some of the most turbulent times in their history, including several more attempts by Maximus to usurp the throne, revolts by the worker class, attacks by human renegades, the kidnapping of Medusa, the destruction and rebuilding of Attilan, the revelation of the Inhuman existence to humanity, and several more relocating of Attilans. Following the traditionally lengthy period of betrothal, Black Bolt and Medusa were wed. His role as king of the Inhumans was been tumultuous. The first major crisis occurred when he and Medusa conceived a child. Medusa bore the child in defiance of the Genetic Council who felt that Black Bolt's bloodline was too dangerous to pass on. The Council nonetheless took the child to examine, and forbade parental contact. Black Bolt was torn between his love of family and his duty to respect the Genetic Council, and it was only when the Council was revealed to be using his son in a plot against him that he finally turned against the Council. With that, he also gave up the crown as king of the Inhumans. For a while, they lived away from Attilan, but returned in times of need. By the time the Avengers and the Fantastic Four returned from Counter Earth following the Onslaught crisis, Black Bolt was re-instated as monarch without much further explanation, but was subsequently exiled after Attilan's forced adventure with Ronan in space. He returned again to the moon with his Royal Family after being banned from Earth, and again it seemed that the rest of the Inhuman population soon rejoined them there and reaffirmed his role as king without much ado. There was very little exploration of the ongoing inequities and injustices of the caste-bound Attilan society during this time, and Black Bolt seemed to turn a blind eye to much of it. It could be that as a product of that environment, he accepted the status quo as a given: this would make him a benevolent yet flawed ruler. Given his exposure to the outside world (and his own stand previously against the genetic Council), this seems unlikely. Given his ever changing status as ruler, he likely saw limits to any further changes that he could realistically make to the social fabric at this point (after all, it was only not so long ago during his reign that the Alpha Primitives were emancipated). He was a great leader in ensuring the survival of Attilan against threats from outside and in; perhaps he was biding his time, awaiting a period of stability before again turning his considerable leadership skills to issues of social justice. Silent War After Quicksilver stole a cluster of Terrigen Crystals, Black Bolt and other Inhumans followed him to Earth in pursuit. Quicksilver evaded capture however, and the crystals fell into the possession of the US government, who refused to hand them over to the Inhumans. This led Black Bolt to declare war on the United States. He sent a strike force led by his cousin Gorgon to capture several high standing members of American society who were attending a charity opera. The operation went awry however and several civilians were killed and the team was captured by the Fantastic Four. The US government began experimenting with the crystals, exposing Gorgon to them once again, causing him to undergo a second terrigenesis. Black Bolt journeyed to Earth to find Quicksilver in search of the Crystals and found that Quicksilver had embedded several of them in his flesh. Black Bolt lost his composure and began savagely beating Quicksilver until Medusa stopped him from killing him. Quicksilver revealed that using the powers the crystals had granted him, he had traveled into the future where he witnessed an explosion on the surface of the Moon visible from Earth, deducing that it was Attilan. Matters were further complicated by the fact that Black Bolts brother Maximus who as part of a very long plan managed to exert control over Medusa and force her to kiss him, leading Black Bolt to believe she was having an affair. Maximus also manipulated Luna into freeing him and Black Bolts son Ahura. Meanwhile, Black Bolt traveled to the Pentagon with other members of the royal family to free Gorgon and get the crystals. They defeated the facility's defenders and the Avengers who arrived to stop them and reclaimed the crystals. The United States retaliated by sending a marine squad that had been mutated by the crystals to Attilan. The Inhumans engaged them, and the squad surrendered. While inside the city, one of the squad members used her powers to detonate herself in a giant blast that devastated Attilan. Maximus confronted Black Bolt amidst the rubble, declaring himself king and telling his brother that he'd be taking care of everything now. Black Bolt was jailed, and while imprisoned was approached by Luna who told him that everyone except Black Bolt and she herself were being manipulated by Black Bolt, and asked him what to do. Secret Invasion Black Bolt was ambushed by the Skrull Empire, while unaware and surprised and was then taken captive by the Skrulls and held prisoner aboard the Skrull Battleship Ryb'ik. The Skrulls planned to use his quasi-sonic scream as the their deadliest and most powerful weapon. A Skrull began impersonating Black Bolt. During this time, the Hulk, embittered over being placed into exile on the planet Sakaar, returned to this star system and attacked the Skrull impostor who he believed was Black Bolt because of his role in the Hulk's exile. Even though this "Black Bolt" was able to knock the Hulk back at first, the Hulk got back up and savagely beat him up. Hulk enslaved him with a slave disk and forced him to fight as a gladiator. Later, the Illuminati discovered the Skrull impostor among them. Black Bolt was rescued by Medusa and the Inhuman Royal family, and returned to Attilan to co-rule with Maximus. He then took aggressive counteraction against the Skrulls, and deployed Maximus-designed inventions to tap into his quasi-sonic powers for military purposes. The city of Attilan became a weaponized vessel that tracked down and destroyed the fleeing Skrull ships, as well as some Shi'ar vessels trying to intercept. He breached Kree defenses and forced Ronan and the Kree to pledge allegiance to him. The Inhumans had plans to lead a benevolent future with the Kree. Crystal was promised to Ronan to further unite the Kree and the Inhumans even offered the Terrigen Mists to enhance the evolution of the Kree. However, the Shi'ar declared war on the Kree. At the very climax of the War of Kings, both Black Bolt and Vulcan appear killed and the Shi'ar surrender to the Kree Empire, despite heavy losses on both sides, leading to the Realm of Kings. The War of the Four Cities He in fact survived the explosion. It was revealed that Black Bolt likely represents the anomaly of the Kree Inhuman genetics program that had been predicted hundreds of thousands of years ago. The genetic prophecy was that this anomaly would bring about the end of the Supreme Intelligence. To prevent this outcome, the Kree Supreme Intelligence had ordered the destruction of all the worlds where the genetic experiments took place. Only five colonies escaped, including Earth's: these were the Universal Inhumans. After his return to Attilan, Black Bolt joined the Universal Inhumans and was presented with four new brides, one from each of the other colonies. They returned to Earth to help defeat the last four Reeds of the Interdimensional Council. They then faced the Kree Armada, who had been ordered by the resurrected Kree Supreme Intelligence to wipe out Earth and the Inhumans. After the Kree fled in defeat, the Inhumans followed in pursuit. Powers and Abilities Powers Ambient Particle & Electron Harnessing: Black Bolt's primary superhuman ability is the power to harness electrons. The speech center of his brain contains a unique organic mechanism that's able to generate an unknown particle that interacts with the electrons he absorbs to create certain phenomena that are determined by his mental control. - Quasi-Sonic Scream: Black Bolt's most devastating offensive weapon, and one of these phenomena based upon the particle interaction, is his actual voice. A whisper can level a city, cause distant dormant volcanoes to become active once more, shake entire continents apart and generate tremors on the far side of the planet. A hypersonic shout has been said to generate enough force to destroy planets. Due to the constant and extreme danger posed by his voice, he has undergone rigorous mental training to prevent himself from uttering even the smallest sound, even while asleep. Recently it has been shown that Black Bolt's scream is tied into his emotions, especially anger. This in turn would mean that the power of his scream would depend on his emotional state in at least some way. It would explain the somewhat significant difference of the power released by his quasi-sonic scream. While at in a calm state, a simple whisper from Black Bolt has destroyed entire mountain ranges and cities in seconds in the past, but while under more strenuous circumstances, it was stated that a single syllable would be capable of annihilating more than half a planet. The full extent and damage of Black Bolt's scream is unknown, but based on the fact that it is caused by particle interaction and electron manipulation, it is theoretically infinite, destroying both the Sentry and the Sorcerer Supreme Doctor Strange with one sound wave on a parallel Earth. - Particle & Electron Channeling: Black Bolt wears a metallic, fork-shaped antenna upon his brow that allows him to focus and channel his powers in more directed and less destructive ways. This antenna monitor's the speech center of his brain and allows him to direct quantities of the unknown particles to create controlled phenomena, such as enhancing his physical strength beyond his normal limits. He can also channel all the available energy he has into one arm for a single, massively powerful punch called the Master Blow. The exertion from this, however, taxes his ability to employ the energy to its full power for a short time. - Particle & Electron Manipulation: Black Bolt can also direct the unknown particle outwards without the use of his vocal chords. He can route the particles through his arms and create small yet vastly powerful blasts of concussive force. He can also form a field of highly active electrons around his body with a wave of his hand. This field can deflect projectiles like the mass of a large meteor. Black Bolt can also create enough iteration between the electron and particle energies to generate fields solid enough for him to travel over. - Matter & Energy Manipulation: Through an unknown method, Black Bolt has shown numerous times that he has the ability to manipulate matter and energy to an unknown degree. He has shown the ability to transmute the elements, turn water into ice, create multiple toys out of thin air as nothing but a mere baby by re-arranging the molecular structure. He has destroyed a Solar Flare powerful enough to annihilate the Earth, created black holes, and was able to block the powers of others through his abilities and in turn denying them the access to their abilities. - Telepathy: Black Bolt has incredibly powerful telepathic abilities as evident when he was able to easily resist the mental abilities of his powerful brother, and on different occasions, use his own abilities to overpower and take control over Maximus' mind. - Anti-Gravitational Flight: Black Bolt can also harness the unknown particles his brain generates to interact with electrons to create anti-gravitons that enable him to defy gravity. By emitting a jet of rapidly moving particle / electron interaction by-product while enveloped by anti-gravitons, Black Bolt has been shown to fly faster than a 1000 miles per hour for a period of 10 hours, to fly beyond escape velocity, and keep up with Nova, the human rocket who can fly at speeds above light. The anti-graviton field also serves to protect Black Bolt from the detrimental effects of rapid movement through the atmosphere although it's not needed. Inhuman Physiology: Like all Inhumans, Black Bolt's natural physiology grants him a number of superhuman physical attributes but because of the genetic tampering at birth, Black Bolt's physical abilities are significantly superior to the other members of his race. - Superhuman Strength: Black Bolt, like all Inhumans, is superhumanly strong. According to his bio, under normal circumstances, he is able to lift about 1 ton. However, he can augment his physical strength by channeling the necessary particle energy through his body. At his peak, he is able to lift up to 60 tons. However, he has been observed matching opponents as physically strong as Thor and Gladiator in hand-to-hand combat, and even appeared to be capable of overpowering the latter. This would suggest that, at his peak, he is capable of lifting in excess of 100 tons. - Superhuman Speed: Black Bolt can run and move at speeds that are beyond the natural physical limits of the finest human athlete, as he has been able to catch directed miniature missiles even when attacked from below and unaware with ease, move at a speed so great he is invisible to the human eye, move at such a speed he can travel vast distances before a human can finish processing a thought, and has been able to catch and beat Quicksilver with ease. He can augment his speed to unknown level. - Superhuman Stamina: Black Bolt's Inhuman musculature generates less fatigue toxins than the musculature of a normal human, even the finest human athlete. At his peak, he can exert himself for several days before the build up of fatigue toxins in his blood begins to impair him. He can augment his stamina to unknown as well as his other physical abilities with his powers. - Superhuman Durability: Black Bolt's body is incredibly resistant to all forms of physical damage. Black Bolt is resistant to great impact forces, such as falling from a height of several stories that would severely injure or kill a human being unharmed. He has been repeatedly struck by beings with vast superhuman strength such as Hulk, Namor, Gladiator etc. and remained unharmed. Black Bolt is capable of withstanding extreme temperatures, such as the cold in space without any discomfort, the heat from re-entry without any discomfort, and even the heat from a Solar Flare powerful enough to significantly damage the planet without any damage at all. Black Bolt can augment his durability to unknown limits. - Superhuman Agility: Black Bolt's agility, balance, and bodily coordination are enhanced to levels that are beyond the natural physical limits of the finest human athlete. He has shown inhuman and amazing maneuverability and agility in the air, capable enough of combating numerous air crafts, and dodging various projectiles from multiple directions. Black Bolt can augment his agility to unknown levels. - Superhuman Reflexes: Black Bolt's reflexes are beyond those of the finest human athlete, and he can augment his reflexes to unknown levels. - Superhuman Longevity: Like all Inhumans, Black Bolt has a natural lifespan that is at least twice the average lifespan of a human being. Template:New Power Grid Abilities Black Bolt is able to communicate non-verbally, although Medusa often will act as a translator for him. He is also a master of hand combatant, although even though the slightest sound, even the smallest sigh directed towards most all individuals, even those possessing great physical attributes, is enough to destroy them. Physical Strength Normally possesses enhanced to the point where he can lift 1 ton, but he can amp his strength to Superhuman class 75 range , whereby Black Bolt becomes capable of press lifting 60 tons, possibly more. Paraphernalia Equipment None; formerly the Space Gem Transportation Flight under his own power, teleportation using Lockjaw.
https://marvel.fandom.com/wiki/Blackagar_Boltagon_(Earth-616)?oldid=2174407
A Week in My Life: Review In the past week, I’ve spent almost fifty hours working. You might be thinking that it’s not much different to working a 9-5 office job, but you have to remember that 9-5, when lunch is removed, is only seven hours, and that legally includes a number of breaks, and I’ve taken all breaks out of my ‘working’ time. And I’m still above the European Working Time Directive level. But let’s just imagine that I do a similar amount of work to a typical office job. You have to remember that when I’m working, I have to be concentrating constantly, so that I can recall any fact that’s spouted to me at any point several months later. It’s the equivalent of me coming up to you today and asking what phone number you dialled at 14.30 on 29th July 2004. It requires an enormous amount of concentration for an extraordinarily long period of time. Much longer than you probably spend in your office. Oh, and I don’t get paid. In fact, I pay for the priveledge. I think it’s also fair to say that, on top of a fifty hour working week, it would be very difficult to get a part-time job and stay sane. I also need a faintly ridiculous number of books, specialist equipment, and printer paper and ink. I’ve printed well over 1000 pages in the three weeks alone. Don’t you think, therefore, that’s it’s slightly bizarre that medical students receive exactly the same level of student support as those doing International Human Rights Law at the Univeristy of Ulster, who study for just three – yes, 3 – hours per week? Where is the sense in giving the same support to someone working 50 hours as someone working for three? I don’t see it. This 328th post was filed under: My Week.
https://sjhoward.co.uk/category/my-week/
- Pages: x + 552 p. - Size:216 x 280 mm - Illustrations:337 b/w, 32 col. - Language(s):English - Publication Year:2018 - € 130,00 EXCL. VAT RETAIL PRICE - ISBN: 978-2-503-56894-2 - Paperback - Available “Robert Bork has written a remarkable book that in its scope has no competition. He offers a detailed analysis of late Gothic architecture, tracing its long history and examining the ultimately successful challenge to the style made by classicizing architecture from Italy.” (Ethan Matt Kavaler, in the Journal of the Society of Architectural Historians, 78/4, December 2019) « La réussite du travail de Robert Bork est à la hauteur de l’entreprise : désormais, il existe une synthèse, richement illustrée, qui permet de mieux comprendre toutes les vicissitudes d’un courant architectural et rend accessible une abondante littérature étrangère. » (Julien Noblet, dans Histara, 06.01.2020) “(...) an immensely interesting book that argues provocatively for late Gothic architecture as something distinct from the inert survivals and nostalgic revivals that laid claim to it. The material is compelling not only because of the intrinsically fascinating forms of the monuments themselves, but also because their long history of misreading provides an opening to rethink the contradictions of this era in a much broader sense. Bork has done the field a tremendous service by sustaining his arguments across an expansive geographic and temporal span and rooting them in the intellectual apparatus of their time. The result is an eloquent and entertaining book that will be indispensable for any serious work on the late Middle Ages that takes Europe’s built environment into account." (Shirin Fozi, in Architectural Histories, 8/1, 2020) “Late Gothic Architecture: Its Evolution, Extinction, and Reception (2018) by Robert Bork is a work impressive both in physical size and scholarly breadth (…) [It] succeeds in broadly spanning not only architectural style, time, and geography, but also intended audience (…) Late Gothic Architecture most certainly fulfils its purpose, providing a welcome and much needed new voice to the scholarly chorus of art historical texts on Gothic architecture.” (Katherine A. Rush, in The Medieval Review, 26/06/2020) “Bork’s skill in drawing such a large and diverse body of work together, crucially illustrated with an impressive range of images, truly deserves appreciation. A thoughtful study clear enough to orient novice students to the issues at hand but with depth enough to provide specialists much to ponder, this book will take its place as a substantial contribution in the canon of scholarship on Gothic architecture”(Charlotte A. Stanford, in Mediaevistik, 32, 2019, p. 548) “Late Gothic Architecture is a field-changing publication, one that is both generous in the breadth of its content and provocative in its framing. Not only will it bring renewed attention to a relatively marginalised aspect of our architectural heritage, it also offers an essential foundation for future research in the area.” (Costanza Beltrami, in Architectural Histories, 12, 2020, p. 317) “Robert Bork has written a magisterial history of the rise, flowering, diversification, and eclipse of European late Gothic architecture (ca. 1290–1525/50). In fact, the book is broader and more comprehensive than its stated subject.” (Dan Ewing, in Renaissance Quarterly, LXXIV/I, 2021, p. 237) Robert Bork, Professor of Art History at the University of Iowa, specializes in the study of Gothic architecture and medieval design practice. Bork’s research has received support from the American Council of Learned Societies, the Alexander von Humboldt Foundation, and the Center for Advanced Study in the Visual Arts. His previous books include "Great Spires: Skyscrapers of the New Jerusalem" (2003) and "The Geometry of Creation: Architectural Drawing and the Dynamics of Gothic Design" (2011). In this book, Robert Bork offers a sweeping reassessment of late Gothic architecture and its fate in the Renaissance. In a chronologically organized narrative covering the whole of western and central Europe, he demonstrates that the Gothic design tradition remained inherently vital throughout the fourteenth and fifteenth centuries, creating spectacular monuments in a wide variety of national and regional styles. Bork argues that the displacement of this Gothic tradition from its long-standing position of artistic leadership in the years around 1500 reflected the impact of three main external forces: the rise of a rival architectural culture that championed the use of classical forms with a new theoretical sophistication; the appropriation of that architectural language by patrons who wished to associate themselves with papal and imperial Rome; and the chaos of the Reformation, which disrupted the circumstances of church construction on which the Gothic tradition had formerly depended. Bork further argues that art historians have much to gain from considering the character and fate of late Gothic architecture, not only because the monuments in question are intrinsically fascinating, but also because examination of the way their story has been told—and left untold, in many accounts of the “Northern Renaissance”—can reveal a great deal about schemes of categorization and prioritization that continue to shape the discipline even in the twenty-first century. Introduction: The Anti-Gothic Turn This section explains the need for a synthetic reassessment of the late Gothic architectural tradition and its fate, arguing that its achievements have too often been neglected because of two contrasting historiographical tendencies: the celebration of the Renaissance, in broad accounts of the period; and the fragmentation of the discussion into narrow case studies that take the social background for granted, in the more nuanced scholarly literature. The present book navigates between these extremes, offering a chronologically organized narrative that shows how the intrinsically dynamic late Gothic tradition succumbed to external forces, including the Reformation and the adoption of Renaissance classicism as an instrument of royal propaganda. Chapter 1: Getting the Point—Antiquity to 1300 This chapter introduces De Architectura, the treatise by the Roman architect Vitruvius that would prove so influential in the Renaissance, before concisely tracing the history of medieval architectural innovation that permitted the invention of the Gothic manner. Consideration of the first phases of the Gothic style and its spread across Europe establishes a context for subsequent discussion of later medieval and Renaissance developments. Chapter 2: From Gothic to Late Gothic—1300 to 1350 The first portion of this chapter explores the relationship between Gothic architecture, the figural arts, and new conceptions of history in the Italian world of Giotto, Petrarch, and their contemporaries. The second portion traces the emergence of the Decorated and Perpendicular Styles in England, and the third discusses continental variations on the Gothic tradition in the rest of transalpine Europe during the first half of the fourteenth century. Chapter 3: The Evolution of Late Gothic—1350 to 1400 This chapter begins with consideration of the Black Death and its social impact, before going on to trace the development of late Gothic architecture across Europe in the second half of the fourteenth century, with particular attention to the work of the Parlers and their followers. The chapter concludes with a case study of the famous debates that took place in the Milan Cathedral workshop around 1400. Chapter 4: The Antique Mode and its Gothic Context—1400 to 1450 The first section of this chapter discusses the emergence of the antique architectural mode in Florence, acknowledging the crucial role of Brunelleschi in this development, while stressing the largely Gothic character of his greatest work, the dome of Florence Cathedral. The rest of the chapter considers the simultaneous flourishing of late Gothic design in transalpine Europe, touching on the emergence of the French Flamboyant mode, the popularity of tower-building projects in the Holy Roman Empire, and the influx of northern designers into Iberia. Chapter 5: Polarized Modernisms—1450 to 1500 The contrasting claims to authority of the classical and Gothic design modes occupy center stage in this chapter. Its first section explores the increasingly sophisticated intellectual culture of Italian Renaissance designers, including figures such as Alberti and Francesco di Giorgio who wrote original architectural treatises inspired by Vitruvius’s De Architectura. Subsequent sections examine the very different culture of the Germanic lodges, with attention to the 1459 masonic meeting in Regensburg, the early spread of the antique mode into Hungary during the reign of Matthias Corvinus, and the continued flourishing of the Gothic design mode in the rest of Europe. Chapter 6: Collision and Hybridity—1500 to 1525 This chapter explores the crucial period when the classical motifs and architectural ideas began to achieve popularity in many transalpine countries, sometimes creating vivid counterpoints to the still dominant Gothic mode, other times blending with Gothic elements in imaginative syntheses. Although architectural projects occupy center stage here, as throughout the book, crucial artists working in other media also receive attention, as in the cases of Albrecht Dürer and Jan Gossaert. The successive sections of the chapter show that the antique mode became fashionable in secular and funerary contexts before its widespread adoption in ecclesiastical building projects. Chapter 7: Purge and Extinction—1525 to 1575 During the half-century examined in this chapter, the Gothic tradition lost its longstanding position of leadership in European architectural culture. Principal causes of this revolutionary development included the spread of Renaissance architectural theory through the publication of illustrated architectural treatises, the embrace of the antique mode by royal patrons eager to associate themselves with the glory of the Roman Empire, and the Protestant Reformation, which destabilized the structures of patronage on which Gothic church construction had formerly depended. Ultimately, therefore, this chapter argues that the demise of the Gothic tradition should be understood as an extinction event of sorts, one caused by a wave of rapid cultural climate change initially external to the sphere of transalpine architectural practice. Epilogue: The legacy of the Anti-Gothic Turn The final section of the book briefly considers the ways that the story of late Gothic architecture has been told—and often left untold—from the Renaissance onwards. Notable figures in this narrative include Vasari, who built his hostility to the Gothic tradition into the very foundations of art history writing, Van Mander, who marginalized architecture in creating his canon of great northern art, and Huizinga, whose characterization of the late Middle Ages as a time of autumnal decline remains stubbornly influential a century after its publication. The Gothic tradition has certainly had its champions, and its later phases have begun to receive more sympathetic scholarly attention in recent decades, but late Gothic architecture continues to occupy a vexed position in the dominant narratives of art history, as the odd framing of the largely architecture-free “Northern Renaissance” category demonstrates. The book concludes by arguing, therefore, that the spectacular achievements of late Gothic builders deserve study not only because of their inherent interest, but also because their changing reception can reveal a great deal about the way that art history has developed as an academic discipline.
https://www.brepols.net/products/IS-9782503568942-1
Federal worksite safety officials this week announced plans to ramp up enforcement efforts in certain southern states to combat a recent rise in construction-related falling deaths. Beginning August 20, the Occupational Safety and Health Administration will increase the number of unannounced inspections it performs at worksites in Region 4, which encompasses eight southern states east of the Mississippi River. In particular, the agency said it planned to target worksites in Alabama, Florida, Georgia and Mississippi. “OSHA’s goal is to raise awareness about fall hazards and eliminate those conditions that lead to employee deaths,” said Cindy Coe, the agency’s regional administrator in Atlanta, in a statement released August 16. “Our compliance officers will conduct immediate inspections when they observe employees working from elevation without fall protection.” An OSHA spokesman said Friday that the agency has received 19 reports of fatal falls at Region 4 construction sites so far this year, two more than it received in all of 2011 and eight more than in 2010. The spokesman said those totals do not include incidents investigated by state occupational safety agencies. According to the Bureau of Labor Statistics, Region 4 routinely leads the nation in workplace fatalities and has grown statistically more dangerous for workers in the past two years. Through the first six months of 2012, the region has accounted for 23.8% of all job-related deaths reported, compared with 22.6% in 2011 and 19% in 2010. OSHA said its regional enforcement was being increased as part of a national campaign announced in April to address fatal construction-related falls. In addition to the targeted enforcement efforts, the campaign—developed in conjunction with the National Institute for Occupational Safety and Health—includes fall safety education and training programs, as well as newly introduced printed and online resources to increase worker awareness of “common-sense fall prevention equipment and strategies,” according to the agency. Matt Dunning writes for Business Insurance, a sister publication of Workforce Management. To comment, email [email protected]. Stay informed and connected. Get human resources news and HR features via Workforce Management’s Twitter feed or RSS feeds for mobile devices and news readers. Come see what we’re building in the world of predictive employee scheduling, superior labor insights and next-gen employee apps. We’re on a mission to automate workforce management for hourly employees and bring productivity, optimization and engagement to the frontline. ComplianceMinimum Wage by State in 2023 – All You Need to Know Summary Twenty-three states and D.C. raised their minimum wage rates in 2023, effective January 1. Thr... federal law, minimum wage, pay rates, state law, wage law compliance LegalNew Labor Laws Taking Effect in 2023 The new year is fast approaching, and with its arrival comes a host of new labor laws that will impact ... labor laws, minimum wage, wage and hour law LegalWage and Hour Laws in 2022: What Employers Need to Know Whether a mom-and-pop shop with a handful of employees or a large corporation staffing thousands, compl...
https://workforce.com/news/osha-steps-up-safety-inspections-in-south
In a speech last week, President Joe Biden said his $ 1.9 trillion Covid relief plan would lift 5 million children from the ranks of the poor and cut child poverty rates in half. According to some experts working on the social safety net, this would be the largest reduction in child poverty in recent history. But its scope isn’t far-fetched and could prove even more substantial if Biden’s plan is fully implemented, they said. Overall, the plan – which includes additional incentive controls, tax breaks, and improved unemployment benefits – may have the greatest impact on black and Hispanic families. “That seems reasonable,” said Chloe East, assistant professor of economics at the University of Colorado, of the analysis. “If all of these things Biden suggested passed, we could expect [poverty reduction] be even bigger. “ However, parts of Biden’s agenda would only be temporary and could dilute these anti-poverty services in the long term. Some conservative economists say the plan, particularly aspects like a higher minimum wage and changes in child tax credits, would increase poverty in the long run. Children and poverty The benefits of stimulus programs The CARES bill, a $ 2.2 trillion relief effort, helped lower poverty rates in the early days of the pandemic and mitigate what was otherwise the worst spike in poverty in 50 years. However, the poverty rate rose 2.4 points to 11.7% between June and November last year after families issued stimulus checks and their supplementary unemployment benefits wiped out, according to a study co-authored by Sullivan. That is more than double a year-to-year increase in poverty since measurements began in the 1960s, he said, pushing 8 million people into the ranks of the poor. “The rise in poverty since June has been greater for children than for adults or the elderly,” Sullivan said. “You pay a higher price.” Unemployment is still near the Great Depression for the lowest-income Americans and stresses cash flow for those least able to weather a financial shock. Biden’s aid plan There’s a clear and documented link between stimulus measures and poverty reduction during the pandemic – a path that is likely to continue once Biden’s plan goes into effect, Sullivan said. The proposal includes $ 1,400 stimulus checks, expanded tax breaks (such as the child tax credit), $ 400 improved unemployment benefits, expanded unemployment benefits for the long-term unemployed, and an expansion of grocery stamps. Overall, these policies would lower the poverty rate by 3.6 points to 9% – which is below pre-pandemic levels and lift nearly 12 million Americans out of poverty, according to an analysis by researchers from the Columbia Center for Poverty and Social Affairs University was published politics. The child poverty rate would decrease by 51%, the biggest decrease compared to other groups, to 6.6%, lifting more than 5 million people out of poverty, according to the Columbia analysis. Biden quoted the results of the paper in a speech in which he set out his proposal on January 13th. The rise in poverty since June has been greater in children than in adults or the elderly. They pay a higher price. James Sullivan Professor of Economics at the University of Notre-Dame “The reduction in child poverty by this amount represents the largest decrease in recent history,” said Megan Curran, a researcher from Colombia who co-authored the study, of a year-over-year reduction in child poverty. Black and Hispanic poverty would also decrease by more than a third, according to the paper. The cuts add to the impact of Covid’s $ 900 billion aid package passed last month. The Columbia Analysis uses an alternative measure of poverty, the Supplemental Poverty Measure, which, unlike the government’s official measure, takes into account benefits such as grocery stamps, tax breaks, and health care. A family of four living in an average cost city and receiving less than $ 28,000 a year in income and benefits is considered poor under this barometer. The Columbia analysis does not consider other proposals from Biden, such as raising the minimum wage from currently $ 7.25 to $ 15 an hour, extending an eviction moratorium, and offering rental and childcare assistance. “If you add those in, it means that the overall poverty alleviation impact is in all likelihood even greater than our estimates here,” Curran said. DEA / M. BORCHI | De Agostini | Getty Images Of course, the Columbia paper is a forecast, which means its estimates can change based on economic conditions. For example, the researchers assume an average unemployment rate of 6% in 2021. (It is currently 6.7%.) And it remains to be seen whether, through a divided Congress, Biden can push ahead with measures like an increase in the minimum wage. The Senate switched to Democratic control, but with the least amount of leeway – the chamber is split 50-50, favoring the Democrats after a groundbreaking vote by Vice President Kamala Harris. Some believe that action to fight poverty would actually have the opposite effect. For example, a minimum wage of $ 15 would destroy jobs for some groups and increase poverty, said Robert Rector, a senior research fellow at the Heritage Foundation, a conservative think tank. “I can’t think of anything more harmful than that,” said Rector. “The people who are losing their jobs will not be teenagers working in the suburbs, they will be the least employable people.” Stimulus checks, child tax credits The positive effects of Biden’s plan would be greatest because of the targeted interventions for children. The main ones, according to economists who support the proposals, are stimulus checks and the expanded child tax credit. Families would receive an additional stimulus payment of $ 1,400 per child. The child tax credit is also aimed directly at families with children. The president plans to increase the child tax credit for qualified children under the age of 17 to $ 3,000. Children under the age of 6 are eligible for $ 3,600 credit. (Families can currently claim up to $ 2,000 per child under the age of 17.) Biden also wants to make the structure of the loan more progressive by being fully refundable. This means that taxpayers could get a refund check even if the credit exceeded their tax liability. Currently, the credit is partially refunded up to $ 1,400. “The proposal recognizes that this is a little backward – that we should give the largest amount of money to very low-income children, not higher-income children,” said Elaine Maag, research fellow in taxation at Urban-Brookings Center. Biden’s plan would extend the tax credit for a year in an emergency. But that could be a step to make the hiatus permanent – which could lead to poverty in the long run, said the rector of Heritage, as it could hinder the work. – CNBC’s Darla Mercado contributed to this report.
https://fben.com/how-bidens-covid-aid-plan-can-lower-little-one-poverty-in-half/
Sri Lanka should support WTO at Buenos Aires Ministerial Conference 2017-12-07 00:00:57 0 2293 The World Trade Organisation (WTO) is back on the global economic radar. Its 11th Ministerial Conference (MC-11) – the highest decision-making body that meets every two years – will convene in Buenos Aires, Argentina, from December 10 to 13, 2017. While expectations for a major trade deal at the conference are low, Sri Lanka must continue to support the WTO-led multilateral trading system in the new Trump and Brexit era. Long and winding road from Doha to Buenos Aires Multilateral trade liberalisation under the WTO has had a difficult decade. Despite the initial optimism surrounding the Doha Development Round of negotiations that began in 2001, multiple deadlines have come and gone without any breakthroughs on the most contentious issues. At the last Ministerial Conference in late 2015, the negotiators could not even agree on whether they should continue the Doha Round. This impasse has left the WTO to focus on more modest outcomes like the Trade Facilitation Agreement that was announced at its 2013 Bali meeting and which Sri Lanka ratified last year. MC-11 looks set to continue this trend by trying to find agreement on a few specific topics, thereby supporting the quest for multilateral trade liberalisation, if only on a more modest level. What’s up for negotiation and where should Sri Lanka stand? Three main areas are up for discussion in Buenos Aires. The first is a possible agreement on the reduction and elimination of fisheries subsidies, which encourage unsustainable overfishing of the world’s oceans. The second is how to ensure free trade in the booming e-commerce sector and the third is the long-standing issue of reducing the support that some governments - most notably in developed economies - provide to their agricultural sectors. Agricultural subsidies, in particular, make it difficult for exporters from developing countries like Sri Lanka to compete in these markets and keep global prices artificially low. Of these three topics, Sri Lanka should focus its limited trade negotiating capacity and lobbying capital on advocating for a successful outcome on the reduction of global fisheries subsidies. This is both the least contentious issue up for negotiation and the area where Sri Lanka stands to benefit most from an agreement. While fisheries are not a major part of the Sri Lankan economy, accounting for only 1.5 percent of gross domestic product and 1.7 percent of exports in 2016, the sector provides employment to almost 10 percent of the labour force and is ripe for further development as recognised in the government’s Vision 2025 plan. A reduction in the estimated US $ 35 billion spent on fisheries subsidies globally will help to level the playing field for Sri Lankan fishermen and create export opportunities for the local industry. E-commerce also has substantial economic potential for Sri Lanka as the world economy transits to the so-called ‘Fourth Industrial Revolution’ (based on digitisation and artificial intelligence). However, discussions of international trade rules remain in their infancy and several developing economies have voiced concerns about whether they have much to gain from an agreement when they have limited access to technology. As such, e-commerce seems more likely a prime candidate for a future plurilateral or sector-specific agreement among like-minded economies - which may include Sri Lanka - than a full-scale multilateral deal in Buenos Aires. Reducing domestic support to agriculture is the area least likely to be resolved in Buenos Aires. It remains highly contentious and the continued power of agricultural lobby groups in advanced economies makes a significant reduction in such support a distant prospect. In addition, as Sri Lanka is a net food importer, a reduction in global support to agriculture would have a mixed impact on the local economy. Sri Lanka must also provide robust defence of multilateral trading system Even more important, however, are the issues not explicitly on the negotiating table in Buenos Aires, specifically the increasing strains on the WTO’s Dispute Settlement Mechanism (DSM). The DSM has played a crucial role in mediating trade disagreements between countries over the last two decades. However, the US has criticised the DSM for unfairly favouring other nations (particularly China) and is blocking the appointment of judges to its highest appeal body until the system reformed; this risks bringing the DSM to a complete halt. Without a working DSM, the WTO’s trading rules would become toothless and governments would face few consequences for violating them. In the worst case, this could spark a tit-for-tat trade war between major powers. Sri Lanka must lobby other governments to ensure a robust defence of the WTO’s DSM in Buenos Aires, while putting its support behind sensible reforms to moderate the US position. As a small open economy, Sri Lanka benefits significantly from being able to engage with economies many times its size on an equal basis through the WTO. The DSM will only become more important as Sri Lanka seeks to develop its economy by boosting exports. Batting for WTO The WTO’s failure to make significant progress towards further multilateral liberalisation in recent years does not mean its previous achievements should be discarded. While attempting to find agreements on the areas that are most beneficial to its economy, Sri Lanka should make clear that the global trading system is worth defending, as it provides a level playing field for small and large countries alike. This is a fight that will go far beyond Buenos Aires. (Dr. Ganeshan Wignaraja is Chair of the Global Economy Programme at the Lakshman Kadirgamar Institute of International Relations and Strategic Studies (LKI). Adam Collins is a Research Fellow at the LKI. The opinions expressed in this article are the authors’ own and not the institutional views of the LKI. They do not necessarily represent or reflect the position of any other institution or individual the authors are affiliated with)
Email this article to a friend The neoliberal center is actively supportive of market freedom, while the Left isn’t. That distinction matters. In 2010, the National Review’s Stanley Kurtz published a book titled Radical-in-Chief: Barack Obama and the Untold Story of American Socialism, in which he argued that then-President Obama embodied a “stealthy, pragmatic and gradualist socialism.” At the time, mainstream liberals wanted nothing to do with the politically poisonous term, and the Obama campaign’s own fact-checking website “Fight the Smears” strongly denied Kurtz’s claims that the president shared the socialist politics of the community organizers he’d worked with in Chicago. That was seven years ago, and things have changed. Now, in the wake of Bernie Sanders’ unexpectedly historic campaign, socialism has lost some of its toxicity among mainstream liberals. Popular websites such as Vox and The Huffington Post regularly publish stories debating socialist policies. In a post on Medium earlier this year, one self-described liberal “solutionist” even used the same phraseology as Kurtz, citing Barack Obama and Elon Musk approvingly as the kind of “pragmatic socialists”—unfairly derided as “neoliberals” by “absolute socialists”—that the world needs. At first glance, it’s encouraging that in 2017 socialism has enough political currency that some liberals are comfortable openly acknowledging its relative merits rather than distancing themselves for fear of contamination. But, on the other hand, this formula of separating the broad Left into pragmatists and purists is patronizing—and wrong. “We want what you want,” it heckles, “only we’re smarter and more realistic.” Such a formulation obscures the fact that socialism and neoliberalism are distinct political-economic orientations, opposed to each other on critical issues—particularly the role of the state in regulating markets and the role of private enterprise in providing essential goods and services. On July 16, Jonathan Chait pulled a similar maneuver in an article for New York Magazine, roundly dismissing the term “neoliberal” as an empty insult devised by the purity Left to attack its steadfast allies in the Democratic Party. (The piece was artfully disassembled by both Paul Blest at The Outline and Mike Konczal at Vox, who refute Chait’s claim that the Democratic Party hasn’t moved right on economic issues since the 1970s.) Where liberal commentators have historically been uncomfortable associating with socialists, they now demonstrate a growing tendency to elide the oppositional nature of the Left and the center to insist on shared pursuit of common goals. To hear some liberals tell it, the difference is primarily one of method, not substance. This overfamiliarity gives liberals special license to scold the Left for attacking the center, which is on its side for heaven’s sake. In reality, it’s not simply that the center is more pro-capitalist than the Left—as though the two sides exist on a gradated spectrum, impossible to pinpoint where one ends and the other begins. The difference is actually quite clear: the neoliberal center is actively supportive of market freedom, while the Left isn’t. That distinction matters. Neoliberalism is an economic philosophy that has its origins in Germany, France and the United Kingdom. After World War II, the doctrine migrated to the University of Chicago, where neoliberal economists, chief among them Friedrich von Hayek and Milton Friedman, established what became known as the Chicago School. This bastion of free-market fundamentalism proved massively influential in advancing neoliberal ideology around the world, most notably in Chile following the U.S.-backed overthrow of Salvador Allende’s socialist government in 1973. Neoliberal ideology is rooted in the belief that the capitalist economy should be buttressed and protected from collapse by state assistance. But that state should otherwise allow market forces to move freely, unimpeded by government regulation. In A Brief History of Neoliberalism, Marxist scholar David Harvey points out that the 1970s global financial crises “appeared to point towards the emergence of a socialist alternative,” and neoliberalism surged in popularity among capitalists who were unwilling to lose the “social compromise between capital and labor that had grounded capital accumulation so successfully in the post-war period.” In the United States, neoliberalism’s raison d’être—especially as it began migrating out of academia and into political-policy-making in the 1970s and 1980s—was to dismantle trade unionism and New Deal social democratic programs, and to deregulate business at every opportunity. Throughout history, neoliberalism has proven to be anti-socialist at its core. The area where socialism and neoliberalism intersect is their insistence that the economy requires some degree of state intervention and planning, as opposed to classical liberalism, which puts full faith in the belief that the “invisible hand” of the market should guide and sustain capitalist economies without state assistance. But the similarities stop there, because the next difference is fundamental: Neoliberals believe that, wherever possible, the state should support private enterprise taking on vital functions in society. Socialists, on the other hand, believe in eliminating these private enterprises wherever possible and replacing them with democratically-run public institutions. Just so we’re clear, neoliberalism means capitalism—a specific form of capitalism, where the business-friendly state encourages the commodification of sphere after sphere of both public and private life. So, are Democrats neoliberals? Well, yes, many of them are, as is the party on the whole. Consider the government bailouts after the 2008 economic collapse. The Obama administration took a neoliberal approach by bailing out the big banks largely responsible for the crisis rather than breaking them up. In doing so they demonstrated their belief that the government has a hallowed responsibility to preserve the integrity of corporate financial institutions. We can also look to the Trans-Pacific Partnership, the failed international trade agreement backed by Obama and many national Democrats that would have empowered corporations to challenge any nation’s economic regulations before an international tribunal. The result, Noam Chomsky noted, would have been to “maximize profit and domination, and to set the working people in the world in competition with one another so as to lower wages to increase insecurity.” Those who object to the term “neoliberal” are appalled that, for instance, defenders of Obamacare could be lumped together with its would-be destroyers. Obamacare, remember, consists mainly of tax-funded subsidies meant to plug Americans into private health insurance networks. Democrats and Republicans are bitterly divided over the issue, and lives literally hang in the balance. Differences in opinion on Obamacare are neither small nor unimportant. But make no mistake: Obamacare is a compromise intended to extend coverage and preserve the integrity of the private health insurance industry. Socialists want universal social programs, funded and used by everyone, without the intrusion of profit-driven entities. They want goods and services such as healthcare, education, housing and even commodity production to be sheltered from the constant compulsion to generate profit at the expense of all else. Neoliberals believe that society functions best when corporations are publicly furnished with what they need to survive and thrive. Socialists feel this way about the public, not corporations. Neoliberal Democrats are not fundamentally opposed to welfare, but they differ strongly from socialists in this arena too. Where socialists tend toward universalism in program design, neoliberals like to split the baby with means-testing: the public (but non-universal) provision of a minimal social safety net, so long as it doesn’t intrude on private industry. These Democrats prefer to assess people’s needs and divide them into two camps—those who qualify for public services and those who don’t. This form of means-testing is a neoliberal solution precisely because it doesn’t undermine the profit-seeking corporations that provide services to people above a certain income threshold, such as health insurance companies. Socialists’ proposed healthcare solution, Medicare for All, would wipe out the private health insurance industry. This is clearly not a neoliberal proposition, as it results in less capitalism, not more. Socialists’ ideal healthcare solution, nationalized medicine, is entirely anathema to neoliberals, who only make allowances for the welfare state when it runs parallel to and supports, rather than supplants, private industry. So no, socialists and neoliberals are not united in shared pursuit of common goals. Neoliberalism is not “pragmatic” socialism any more than a charter school is a “pragmatic” public school, or Obamacare is “pragmatic” Medicare for All. They are altogether different approaches to the provision of services and care. Since Chait’s article was published, liberal commentators have beenincreasinglyechoing his argument that “neoliberalism” is a meaningless term. But it’s far from meaningless. In fact, we need it as a way to distinguish between market-friendly state solutions and market-unfriendly state solutions—especially as socialism gains traction among a new generation of thinkers and activists. “Neoliberal” is at base a neutral descriptor of the dominant strain of political-economic thinking in the moderate factions of both major political parties. When it is used as an insult, we can blame neoliberalism’s poor record of providing a decent standard of living for all people. We're launching a new In These Times magazine to take on Trump and build the Left. Are you in?
Following the Crash of 1929, an epic debate began between liberals who believed in capitalism’s automatic stabilisers and John Maynard Keynes who did not. Today, in Bailoutistan (Greece and the other fallen eurozone countries), this debate has taken an interesting, sad, twist. Hayek vs Keynes In the aftermath of the Crash of 1929, Keynes famously criticised the conventional wisdom of his time (the so-called Treasury View) which held that, given sufficient time, the economy would adjust to any recession by letting wages and interest rates fall until the entrepreneurs’ animal spirits’ are stirred sufficiently to stimulate both the additional employment and investment necessary to end the recession. Keynes’ objection was that, following a massive financial crisis that manages to infect the ‘real’ economy, it is highly likely that the large diminution in output, investment and income will lead to a ‘bad’ equilibrium. To a situation where unemployment is sustainably high (and unresponsive to wage reductions that cause labour to become dirt cheap), investment is rarer than snow in the desert (even after interest rates have crashed to zero; the so-called liquidity trap) and, generally, to an economy stuck in a new underemployment equilibrium from which it will not escape even if prices are free to adjust to their heart’s content. Under those circumstances, thought Keynes, to target government budget deficits, by means of government spending cuts, is precisely wrong. His proposition was that, once an economy finds itself locked into an underemployment equilibrium, any attempt to try to “cut itself out of the slump” is tantamount to cutting one’s nose to spite one’s face. No, for Keynes the trick was to “grow out of the depression”. At the time, the Treasury View (i.e. that automatic stabilisers would do the trick) seemed increasingly pie-in-the-sky and vulnerable to Keynes’ quip that “in the long run we are all dead”. It took an outsider’s intervention to articulate (a) the strongest critique of Keynes, and his advocacy of government intervention during a slump, and (b) the most powerful defence of the market’s superiority as a resource allocation mechanism which government meddling can only stunt and harm – with long term detrimental effects for all. That ‘outsider’ was none other than Friedrich von Hayek. Just like Keynes, Hayek began with a diagnosis of the problem: a treatise on what caused recessions in general and the Crash of 1929 in particular. Hayek suggested that the main cause of recessions was the excessive credit creation that preceded them, leading to investments that could not possibly prove profitable in the long run. The sequence of events was, according to Hayek, as predictable as it was catastrophic: Good times generated optimism, optimism begat investments, higher investment led to higher incomes and profligate consumption, interest rates fell as bankers competed against one another to give loans to people/firms/states that lacked the capacity to repay their loans in case of the slightest of downturns, etc. The bust was thus a necessary outcome of the boom. It was, in essence, the only cure for the irrational exuberance that caused it. In one of Hayek’s famous jibes, the boom is the illusion while the bust is the reality call. And what should be done once the bust hits? Simple: Let the recession do its work; let it liquidate the bad debts by allowing them to be written off, since they can never be repaid. If this means pain for the multitude, so be it. Just like the drunk must suffer stoically the symptoms of his hangover, so must a capitalist economy wait out the recession. It hurts but its function is divine as it shrinks the mountain of uncreditworthy credit previously built up in the system. Bankruptcy is, during this phase of consolidation, unpleasant but highly necessary. A little like Hell in its symbiotic relationship with Christian dogma. At this point it is of great interest and significance to juxtapose the Treasury View (which Keynes disparaged) with that of Hayek. Seemingly, both the Treasury apparatchiks and Hayek converged on their opposition to Keynes-inspired fiscal stimuli and on a commitment to the task of reducing government debt. In response to Keynes, both Treasury officials and Hayek jested that his proposal for curing debt by means of more debt was ludicrous. But what of the difference between Hayek and the Treasury? Was there one? Yes, there was. And an important one to boot: Whereas the Treasury was arguing that wage and interest rate drops would restore the economy to where it was before the bust, Hayek made no such promises. To Keynesian prognoses that the liquidation of bad debts, and the general shrinkage that would follow, may never lead the economy to the state it was at before the Crash, Hayek would shrug his shoulders and say: C’est la vie. Since the boom was ‘unnatural’ anyway, it would be silly (and perhaps unethical) to expect the bust to take us back to where we were before it all went belly up. Where will it take us? Hayek’s answer was: We are damned if we know! But wherever it takes us, it will be better than where we shall land following government fiscal stimuli and more debt. Let the system be cleansed of all bad debt, via wholesale bankruptcies, and then let the market system do what it does best: produce the best of all possible available futures. In this article, I shall desist pitting further Hayek vs Keynes. Nor will I pursue further the pros and cons of Hayek’s thinking. For my objective here is to focus on the peculiar effect eurozone bailouts (with the Greek one as my main case study) has had on the mindset of neoliberals whose inspiration has traditionally been Friedrich von Hayek. Hayek on Greece Were von Hayek to send us a missive from the ether regarding the Greek bailout, what would he have conveyed? He would certainly not think twice before pinpointing two major causes of the tragedy that are recently turning Greece into a wasteland. The first cause of Greece’s predicament The first cause that Hayek would pinpoint is, of course, the bubbles that had been building up through excessive bank credit (to both the private and the public sector of Greece) in the realms of the stock market, the real estate market, the government and, of course, the labour market. The rivers of credit that flowed into Greece had caused all ‘prices’, in each of these realms, to become massively inflated thus causing a boom which, just like night follows day, had to turn to bust. And since the boom was exorbitant, in relation to the country’s real productive capacity, the bust was terribly catastrophic. So, Greeks must accept (I can hear Hayek pontificating) that there is no alternative to liquidating unsustainable stocks (i.e. learning to live with very low share prices in the Athens stock exchange), liquidate the farmer whose produce has never really had a market (at least not one that did not rely on the kindness of the European tax payer), liquidate real estate prices (noting the pre-2009 absurdity of Kolonaki apartments costing New York prices), liquidate government (i.e. shut down most of its departments) and, of course, liquidate labour (i.e. get rid of jobs that do not produce a value equivalent to their cost to the employer). The second cause of Greece’s predicament Let me now turn to the second cause of Greece’s current predicament that, in my view, Hayek would highlight: The calamitous intention of the bailouts to avert a Greek default within the eurozone. Since all bad debts ought to be liquidated, according to Hayek, the Greek public debt (arguably the worst of bad debts) ought to be the first to be written off. Is this an insight that does not apply within the eurozone? Before answering, it is useful to look at Hayek’s rather ambivalent relation with the idea of a European currency union to be administered by a European Central Bank. A known sceptic of Central Banks (indeed, in a famous 1974 paper Hayek had proposed the privatisation of money; (i.e. allowing private banks to issue their own currencies, which would then compete for the public’s trust), in 1978 he had this to say about some future euro: “[T]hough I strongly sympathise with the desire to complete the economic unification of Western Europe by completely freeing the flow of money between them, I have grave doubts about doing so by creating a new European currency managed by any sort of supra-national authority. Quite apart from the extreme unlikelihood that the member countries would agree on the policy to be pursued in practice by a common monetary authority (and the practical inevitability of some countries getting a worse currency than they have now), it seems highly unlikely that it would be better administered than the present national currencies.” Nevertheless, Hayek extended a grudging acceptance of a euro-like currency while warning that “unchecked party politics and stable money are inherently incompatible” (italics in the original). Whatever Hayek would have thought of Mrs Merkel’s, Mr Sarkozy’s and Mr Draghi’s attempt to ‘save’ the euro in a manner utterly subservient to Germany’s, France’ and Italy’s “unchecked party politics”, one thing is beyond dispute: Friedrich von Hayek would have lambasted Europe’s attempt to create new forms of toxic debt (see the EFSF bonds that are financing the bailouts) in order to ensure that boom-created, wholly unsustainable, old debts (like those of the Hellenic Republic), are preserved for as long as possible and at whatever human and economic cost. In short, while not at all clear on whether Hayek would have recommended the preservation, disbandment or partial disbandment of the eurozone, it is beyond serious doubt that he would have campaigned vigorously for the liquidation of Greece’s (bad) debts. Fully fledged default would have been, in Hayek’s eyes, the sole course of action not in conflict with his vision of what is at stake in the eurozone today. A view that would cause him to clash with the raison d’ être of all bailouts in Europe (not to mention Mr Draghi’s LTRO that would incite him into an unending rage). The curious case of Greece’s neoliberals Since the crisis erupted, I have found myself in various panels opposite representatives of Greece’s tiny but highly influential community of Hayek-inspired neoliberals. It took little time to realise a most peculiar dichotomy typifying them; one which I think is instructive on the damage that the bailouts are doing to Europe’s intellectual life within but also beyond the borders of Greece. It is this: While Greek neoliberals maintain Hayek’s rage regarding the first cause of Greece’s current predicament, they are in deep (and non-intellectual) denial regarding the second one. On the one hand they are keen to spread Hayek’s message that, within Bailoutistan (with Greece being the most prominent province of this new ‘nation’), there is no alternative to liquidating stocks, farming values, real estate prices, most government departments and much of still employed labour. However, in sharp contrast, the only one thing that they are not prepared to see liquidated is Greece’s public debt to the banks which, according to Hayek himself, created the problem in the first place! Why the exemption of Greek public debt from the list of bad debts/assets to be liquidated? And why the dearth of explanation as to why this exemption is recommended? Two possible answers explain the Greek neoliberals’ schizophrenia. First, perhaps they misunderstood what their libertarian gurus meant, possibly due to limited analytical power. Or, secondly, the Greek case is special and requires that Hayek is listened to when it comes to liquidation of everything but not of public sector debt. While not the sharpest knives in the cupboard, I do not believe that Greece’s neoliberals simply failed to understand Hayek’s message. Rather, I am of the view that it is Greece’s special circumstances that lead them to exempt public debt from the list of assets that must be liquidated. Were we to ask them to explain what these ‘special circumstances’ are, I think that, after a long discussion, we would surmise that they are driven to the exemption of public debt from the assets to be liquidated for one, simple, depressing reason: they have lost faith in the capacity of Greek national elites to see through the process of liquidation. They have lost faith in the capacity of the Greek authorities, of Greek entrepreneurs, even of themselves, to steer Greece, via Hayekian liquidation, along the path to a libertarian state of affairs. And since they do not think that Greek elites can do this, they put all their eggs in the basket of hope that Northern European elites (perhaps with the assistance of the IMF) will do it for them. And to ensure that this will happen, they are happy to sacrifice a basic Hayekian tenet in order not to antagonise Northern European partners who, for reasons of their own, are keen to keep piling unsustainable new loans on the Greek state (rather than liquidating the existing ones). Epilogue A Faustian Bargain seems to have been struck between Bailoutistan’s Hayekian neoliberals (with Greece’s variety the most striking example) and the statist ECB-EE-IMF bailout approach. This explains partly what I shall term the European Periphery’s Neoliberal Anomaly: neoliberals that are happy with the idea of huge new taxpayer-funded loans on insolvent state entities. However, this explanation is only partial as it fails to explain an important observation. Recalling Sherlock Holmes infamous ‘dog that did not bark’ inference, the question arises (regarding Greek but also Irish Hayekians): Why have they said nothing about the need to liquidate the nation’s bankers? (Or Irish bank bondholders for that matter?) My point here is that, even if we accept the Faustian Bargain hypothesis above (namely that local elites have lost faith in themselves and want the troika to supervise their own odd ‘Road to Serfdom’), there is nothing in the neoliberal manual that can explain their total silence on the national (e.g. Greek or Irish) banks which played a huge, and hugely negative, role in causing the boom that led to the bust. Whereas Hayek would recommend that these bankers are liquidated forthwith (in order to teach all a lesson about the consequences of excessive credit creation), Greece’s and Ireland’s neoliberals are utterly silent on this. Why is that? In the case of Greece the answer is evident: Because of the extremely cosy relationship between the said neoliberals and the bankers. Period. In conclusion, the eurozone’s bailouts have taken another, hidden toll: they have gutted the intellectual honesty of the very school of thought on which many of Europe’s elites supposedly rely upon for inspiration. Friedrich von Hayek, “Market Standards for Money”, Economic Affairs, April-May 1986. The best they can do is to argue that if Greece defaults it will not be able to return to the money markets; a pretty absurd argument since (A) Greece will not be returning, in any case, to the markets and (B) Hayek’s argument would be that this is a splendid thing (as it will force the Greek state to live within its means and to restore its reputation through frugality and prudence).
https://www.yanisvaroufakis.eu/2012/02/28/on-the-political-economy-of-eurozone-bailouts-the-curious-bargain-of-greeces-hayekian-neoliberals/
Expected Contribution In Research Proposal The format of a research proposal varies between fields, but most proposals should contain at least these elements:.One of the toughest things to do when it comes to completing a voluminous and challenging PhD research project is the proposal Research proposals have a limit on words or pages so you won’t be able to analyse the whole existing body of literature.I am not saying things nobody has ever said or thought, and I am not inventing anything new.I am making a contribution to knowledge by joining the conversation, claiming a voice and a stance, and being brave enough to argue for it.Maldonado This description will be presented in the findings/expected outcomes section.Writing about the expected results of your study in your proposal is a good idea as it can help to establish the significance of your study.Research is to add to the body of knowledge.3 Expected contribution of the study Describe here what the expected value or contribution of the study will be.To hire a tutor you need to send in your request through the form given below.To formulate a detailed plan of the project including methodological approach and theoretical framework.Your proposed area of research must require the contribution of more than one disciplinary perspective in order.The cover page should contain the complete contact information of researcher(s) and a 200-word proposal abstract, which should summarize the research question, main method, data, and expected contribution to policy debate. The objective of preparing a research proposal would be to obtain approvals from various committees including ethics committee [details under ‘Research methodology II’ section [Table 1] in this issue of IJA) and to.I am working on writing my PhD dissertation proposal.On the basis of the problems you have identified and your proposed methodology, you can describe what results can be expected from your research Most students and beginning researchers do not fully understand what a research proposal means, nor do they understand its importance.Our support team will then reach out to you to assist you in the whole procedure.Research Proposal TITLE OF THE PROPOSAL Name and Surname: MY Name Student Number: Questions should facilitate an original contribution to the study.On the basis of the problems you have identified and your proposed methodology, you can describe what results can be expected from your research Most students and beginning researchers do not fully understand what a research proposal means, nor do they understand its importance.The proposal outlines the plan of the implementing organisation about the project, giving extensive information about the intention, for implementing it, the ways to manage it and the results to be delivered from it (FUNDS FOR NGOS 2010).Choose key research papers or public documents and explain clearly how your research will either fill a gap, complete or.To propose a research project that will result in a significant contribution expected contribution in research proposal to knowledge.So the ability of the student to boldly tackle this new issue and surviving the problems of new research areas and building literature for the subject area is highly rewarded, hence it is a major contribution to knowledge..What is included will depend on the kind of research you are doing Proposals for sponsored activities generally follow a similar format; variations depend upon whether the proposer is seeking support for a research grant, a training grant, or a conference or curriculum development project. Sample of a bankable business plan, contribution expected research proposal in The dissertation should highlight what makes your work an original contribution.2 A research proposal is intended to convince others that you have a worthwhile research project and expected contribution in research proposal that you have the competence and the work-plan to.The background of his proposed research should include the following parts:.” Authors use phrases like “This research will address.The following outline covers the primary components of a research proposal Research Paper Proposal For JURI495 and 496, the research issue that you select must encompass at least two disciplines, law and a liberal arts discipline such as history, philosophy or political science.Within this you should use the literature to: demonstrate up-to-date knowledge of the research field justify the choice.The majority of universities require PhD applicants to submit a research proposal when applying for a PhD position.2 In my proposals (which are in the area of business social sciences) I usually address the problem context, research question, hypotheses based on setting context with the current literature (or at least key, proximate literature), planned research.Basically, the section on value of the research provides information towards the readers about how the.The planned or hoped for contributions to the body of knowledge are usually found in the introduction to the report.It is the study of unexplored scientific and technological concepts and theories focused on writing a research proposal.We endeavor to deliver 100% satisfaction every time you Expected Contribution In Research Proposal Example come to us for assistance.Individuals contributing to a proposal on a consultancy basis are not eligible to be named as applicants on a proposal Sample Qualitative Research Proposal Published by Permission of the Author Dissertation Proposal Robert R.Something that is likely to be completed within the normal time frame for a PhD programme) Significance of the study sample in thesis proposal.Some research proposal Your research proposal should convince your audience that you have a valuable and useful project and you have the capability to complete it Doctoral research, by definition, usually involves a contribution to knowledge.Most Expected Outcomes Sections are written in either the future tense (will) or with the conditional (would).Conflict of interest of the research team that may affect the proposed work.There are a few things that are important to do to make sure your research paper the best it can be.This offers an unique opportunity to produce contributions on a number of different fields and disciplines.ANTICIPATED RESEARCH CONTRIBUTIONS As it shall be seen when describing the analytical formulations and work program, the proposed research spans across a number of different areas.You should contact the relevant academic department before applying to Sussex and check if there are any additional requirements for your research proposal Even at this early stage, you may be asked questions regarding your research, and so you should start thinking about:.Many research proposals are too broad, so make sure that your project is sufficiently narrow and feasible (i.Enrolling in the first semester research course, students must go through the proposal stage, during which students will develop their proposal and have it reviewed by his/her research advisor.In other cases, an applicant is expected to provide a preliminary title which will be further elaborated in the.To hire a tutor you need to send in your request through the form given below.“An original contribution to knowledge offers the reader a chance to re-view and re-think the event/text/phenomena in question.Wherever possible, use quantified indicators and targets.” I think you’ve boiled down the vague concept of “originality” in research and thesis outcomes very well, Pat A proposal is a request for financial assistance to implement a project.Very important: include a 4-page research proposal, outlining the research.Clear information about WHO will benefit and HOW they will benefit from the proposal; 4.1 A research proposal is a detailed description of a proposed study designed to investigate a given problem.Therefore, it should show w hat the outcome of your proposed research is contributing to.It is important that you understand what we mean by this term.A Sample Research Proposal with Comments A research project or thesis will take at least two semesters to complete.
https://www.moreau-patrimoine.fr/expected-contribution-in-research-proposal/
--- abstract: | Process calculi may be compared in their expressive power by means of encodings between them. A widely accepted definition of what constitutes a valid encoding for (dis)proving relative expressiveness results between process calculi was proposed by Gorla. Prior to this work, diverse encodability and separation results were generally obtained using distinct, and often incompatible, quality criteria on encodings. Textbook examples of valid encoding are the encodings proposed by Boudol and by Honda & Tokoro of the synchronous choice-free $\pi$-calculus into its asynchronous fragment, illustrating that the latter is no less expressive than the former. Here I formally establish that these encodings indeed satisfy Gorla’s criteria. address: - 'Data61, CSIRO, Sydney, Australia' - 'School of Computer Science and Engineering, University of New South Wales, Sydney, Australia' author: - 'Rob J. van Glabbeek' bibliography: - '../../../../Stanford/lib/abbreviations.bib' - '../../../../Stanford/lib/dbase.bib' - 'ipl.bib' title: 'On the Validity of Encodings of the Synchronous in the Asynchronous $\pi$-calculus' --- process calculi ,expressiveness ,quality criteria for encodings ,valid encoding ,$\pi$-calculus Introduction ============ Since the late 1970s, a large number of process calculi have been proposed, such as CCS [@Mi80], CSP [@BHR84], ACP [@BK86acopy], SCCS [@Mi83copy], [Meije]{} [@AB84], LOTOS [@BB87], the $\pi$-calculus [@MPW92], mobile ambients [@CG00] and mCRL2 [@GM14]. To cater to specific applications, moreover many variants of these calculi were created, including versions incorporating notions of time, and probabilistic choice. To order these calculi w.r.t. expressiveness, encodings between them have been studied [@dS85; @San93; @Va93copy; @vG94a; @Boreale98; @Parrow00; @NestmannP00; @Palamidessi03; @Nestmann00; @CG00; @QW00; @BusiGZ09; @CarboneM03; @BPV04; @Palamidessi05; @PalamidessiSVV06; @PV06; @CCP07; @VPP07; @CCAV08; @HMP08; @PV08; @VBG09; @EPTCS190.5; @PN16]. Process calculus $\mathcal{L}_1$ is said to be *at least as expressive as* process calculus $\mathcal{L}_2$ iff there exists a valid encoding from $\mathcal{L}_1$ into $\mathcal{L}_2$. However, in proving that one languages is—or is not—at least as expressive as another, different authors have used different, and often incomparable, criteria. Gorla [@Gorla10a] collected some essential features of the above approaches and integrated them in a proposal for a valid encoding that justifies many encodings and separation results from the literature. Since then, many authors have used Gorla’s framework as a basis for establishing new valid encodings and separation results [@Gorla10b; @LPSS10; @PSN11; @PN12; @PNG13; @GW14; @EPTCS160.4; @EPTCS189.9; @GWL16]. Often quoted token examples of valid encodings [@Palamidessi03; @Nestmann00; @CC01; @CarboneM03; @CCP07] are the encodings proposed by Boudol [@Bo92] and by Honda & Tokoro [@HT91] of the synchronous choice-free $\pi$-calculus into its asynchronous fragment, illustrating that the latter is as expressive as the former. Gorla mentions these encodings among his first three examples of encodings that satisfy his criteria for validity [@Gorla10a], thereby giving evidence in support of his combination of criteria, more than in support of these encodings. Nevertheless, I have not found a proof in the literature that these encodings satisfy Gorla’s notion of validity, nor is the matter trivial. The goal of this paper is fill this gap and formally establish that the encodings of [@Bo92; @HT91] indeed are valid à la Gorla. Section \[sec:validty\] recalls Gorla’s proposal for validity of an encoding; for their motivation see [@Gorla10a]. Section \[sec:pi2api\] presents the encodings of [@Bo92] and [@HT91], again suppressing motivation, and Sections \[sec:valid\]–\[sec:validHT\] establish their validity. Section \[sec:conclusion\] reflects back on Gorla’s criteria in the light of the present application, and compares with the notion of a valid encoding from [@vG12]. Valid encodings {#sec:validty} =============== In [@Gorla10a] a *process calculus* is given as a triple $\mathcal{L}\mathbin=(\mathcal{P},\longmapsto,\asymp)$, where - $\mathcal{P}$ is the set of language terms (called *processes*), built up from $k$-ary composition operators ${\mathtt{op}}$. - $\longmapsto$ is a binary *reduction* relation between processes. - $\asymp$ is a semantic equivalence on processes. The operators themselves may be constructed from a set ${\mathcal{N}}$ of names. In the $\pi$-calculus, for instance, there is a unary operator $\bar x y.\_$ for each pair of names $x,y\mathbin\in{\mathcal{N}}$. This way names occur in processes; the occurrences of names in processes are distinguished in *free* and *bound* ones; ${\mathrm{fn}}(\vec P)$ denotes the set of names occurring free in the $k$-tuple of processes $\vec P=(P_1,\dots,P_k)\mathbin\in\mathcal{P}^k$. A *renaming* is a function $\sigma:{\mathcal{N}}\rightarrow{\mathcal{N}}$; it extends componentwise to $k$-tuples of names. If $P\mathbin\in\mathcal{P}$ and $\sigma$ is a renaming, then $P\sigma$ denotes the term $P$ in which each free occurrence of a name $x$ is replaced by $\sigma(x)$, while renaming bound names to avoid name capture. A $k$-ary $\mathcal{L}$-*context* $C[\__1;\dots;\__k]$ is a term build by the composition operators of $\mathcal{L}$ from *holes* $\__1,\dots,\__k$; each of these holes must occur exactly once in the context. If $C[\__1;\dots;\__k]$ is a $k$-ary $\mathcal{L}$-*context* and $P_1,\dots,P_k \in \mathcal{P}$ then $C[P_1;\dots;P_k]$ denotes the result of substituting $P_i$ for $\__i$ for each $i\mathbin=1,\dots,k$, while renaming bound names to avoid capture. Let $\Longmapsto$ denote the reflexive-transitive closure of $\longmapsto$. One writes $P\longmapsto^\omega$ if $P$ *diverges*, that is, if there are $P_i$ for $i\in\mbox{\bbb N}$ such that $P\mathbin= P_0$ and $P_i\longmapsto P_{i+1}$ for all $i\mathbin\in\mbox{\bbb N}$. Finally, write $P\longmapsto$ if $P\longmapsto Q$ for some term $Q$. For the purpose of comparing the expressiveness of languages, a constant $\surd$ is added to each of them [@Gorla10a]. A term $P$ in the upgraded language is said to *report success*, written $P{\downarrow}$, if it has an *top-level unguarded* occurrence of $\surd$.[^1] Write $P{\Downarrow}$ if $P\Longmapsto P'$ for a process $P'$ with $P'{\downarrow}$. \[df:encoding\] An *encoding* of $\mathcal{L}_1=(\mathcal{P}_1,\longmapsto_1,\asymp_1)$ into $\mathcal{L}_2=(\mathcal{P}_2,\longmapsto_2,\asymp_2)$ is a pair $({\mbox{\bbb [}\cdot\mbox{\bbb ]}},\varphi_{{\mbox{\bbbs [\ ]}}})$ where ${\mbox{\bbb [}\cdot\mbox{\bbb ]}}:\mathcal{P}_1\rightarrow\mathcal{P}_2$ is called *translation* and $\varphi_{{\mbox{\bbbs [\ ]}}}:{\mathcal{N}}\rightarrow{\mathcal{N}}^k$ for some $k\mathbin\in\mbox{\bbb N}$ is called *renaming policy* and is such that for $u\neq v$ the $k$-tuples $\varphi_{{\mbox{\bbbs [\ ]}}}(u)$ and $\varphi_{{\mbox{\bbbs [\ ]}}}(v)$ have no name in common. The terms of the source and target languages $\mathcal{L}_1$ and $\mathcal{L}_2$ are often called $S$ and ${T}$, respectively. \[df:valid\] An encoding is *valid* if it satisfies the following five criteria. 1. *Compositionality:* for every $k$-ary operator ${\mathtt{op}}$ of $\mathcal{L}_1$ and for every set of names $N\subseteq{\mathcal{N}}$, there exists a $k$-ary context $C_{\mathtt{op}}^N[\__1;\dots;\__k]$ such that $${\mbox{\bbb [}{\mathtt{op}}(S_1,\ldots,S_k)\mbox{\bbb ]}} = C_{\mathtt{op}}^N({\mbox{\bbb [}S_1\mbox{\bbb ]}};\ldots;{\mbox{\bbb [}S_k\mbox{\bbb ]}})$$ for all $S_1,\ldots,S_k\in\mathcal{P}_1$ with ${\mathrm{fn}}(S_1,\dots,S_n)=N$. 2. *Name invariance:* for every $S\mathbin\in\mathcal{P}_1$ and $\sigma:{\mathcal{N}}\rightarrow{\mathcal{N}}$ $$\begin{array}{cccl} {\mbox{\bbb [}S\sigma\mbox{\bbb ]}} & = & {\mbox{\bbb [}S\mbox{\bbb ]}}\sigma' & \mbox{if $\sigma$ is injective}\\ {\mbox{\bbb [}S\sigma\mbox{\bbb ]}} & \asymp_2 & {\mbox{\bbb [}S\mbox{\bbb ]}}\sigma' & \mbox{otherwise}\\ \end{array}$$ with $\sigma'$ such that $\varphi_{{\mbox{\bbbs [\ ]}}}(\sigma(a))\mathbin=\sigma'(\varphi_{{\mbox{\bbbs [\ ]}}}(a))$ for all $a\mathbin\in{\mathcal{N}}\!$. 3. *Operational correspondence:*\ ---------------- ------------------------------------------------------------------------------------------------------------------ *Completeness* if $S \Longmapsto_1 S'$ then ${\mbox{\bbb [}S\mbox{\bbb ]}}\Longmapsto_2\asymp_2 {\mbox{\bbb [}S'\mbox{\bbb ]}}$ *Soundness* and if ${\mbox{\bbb [}S\mbox{\bbb ]}} \Longmapsto_2 {T}$ then $\exists S'\!:$ $S\Longmapsto_1 S'$ and ${T}\Longmapsto_2\asymp_2 {\mbox{\bbb [}S'\mbox{\bbb ]}}$. ---------------- ------------------------------------------------------------------------------------------------------------------ 4. *Divergence reflection:* if ${\mbox{\bbb [}S\mbox{\bbb ]}} \longmapsto_2^\omega$ then $S \longmapsto_1^\omega$. 5. *Success sensitiveness:* $S {\Downarrow}$ iff ${\mbox{\bbb [}S\mbox{\bbb ]}}{\Downarrow}$.\ For this purpose ${\mbox{\bbb [}\cdot\mbox{\bbb ]}}$ is extended to deal with the added constant $\surd$ by taking ${\mbox{\bbb [}\surd\mbox{\bbb ]}}=\surd$. Encoding synchronous into asynchronous $\pi$ {#sec:pi2api} ============================================ Consider the $\pi$-calculus as presented by Milner in [@Mi92], i.e., the one of Sangiorgi and Walker [@SW01book] without matching, $\tau$-prefixing, and choice. Given a set of *names* ${\mathcal{N}}$, the set $\mathcal{P}_\pi$ of *processes* or *terms* $P$ of the calculus is given by $$P ::= \textbf{0} ~~\mid~~ \bar xy.P ~~\mid~~ x(z).P ~~\mid~~ P|P' ~~\mid~~ ({}z)P ~~\mid~~ !P$$ with $x,y,z,u,v,w$ ranging over ${\mathcal{N}}$. \[def:structural congruence\] An occurrence of a name $z$ in $\pi$-calculus process $P\in{\mathcal{P}}_\pi$ is *bound* if it lays within a subexpression $x(z).P'$ or $({}z)P'$ of $P$; otherwise it is *free*. Let ${\mathrm{n}}(P)$ be the set of names occurring in $P\in {\mathcal{P}}_\pi$, and ${\mathrm{fn}}(P)$ (resp. ${\mathrm{bn}}(P)$) be the set of names occurring free (resp. bound) in $P$. *Structural congruence*, ${\mathrel{\equiv}}$, is the smallest congruence relation on processes satisfying $$\begin{array}[b]{@{}l@{~}r@{~\!{\mathrel{\equiv}}\!~}l@{\hspace{1pt}}r@{~\!{\mathrel{\equiv}}\!~}l@{\,}r@{}} \scriptstyle (1)& P_1 | (P_2 | P_3) & (P_1 | P_2) | P_3 & ({}z) \textbf{0} & \textbf{0} & \scriptstyle (5)\\ \scriptstyle (2)& P_1 | P_2 & P_2 | P_1 & ({}z)({}u)P & ({}u)({}z) P & \scriptstyle (6)\\ \scriptstyle (3)& P | \textbf{0} & P & ({}w) (P | Q) & P | ({}w)Q & \scriptstyle (7)\\ & \multicolumn{2}{c}{} & ({}z)P & ({}w)P{\{\mathord{\raisebox{2pt}[0pt]{$w$}\!/\!z}\}} & \scriptstyle (8)\\ \scriptstyle (4)& !P & P | !P & x(z).P & x(w).P{\{\mathord{\raisebox{2pt}[0pt]{$w$}\!/\!z}\}}. & \scriptstyle (9)\\ \end{array}$$ Here $w\notin{\mathrm{n}}(P)$, and $P{\{\mathord{\raisebox{2pt}[0pt]{$w$}\!/\!z}\}}$ denotes the process obtained by replacing each free occurrence of $z$ in $P$ by $w$. \[def:reduction\] The *reduction relation*, ${\longmapsto}\subseteq {\mathcal{P}}_\pi \times {\mathcal{P}}_\pi$, is generated by the following rules. $$\begin{array}{@{}cc@{}} \displaystyle\frac{y\notin{\mathrm{bn}}(Q)}{\bar xy.P | x(z).Q \longmapsto P|Q{\{\mathord{\raisebox{2pt}[0pt]{$y$}\!/\!z}\}}} & \displaystyle\frac{P \longmapsto P'}{P|Q \longmapsto P'|Q} \\[3ex] \displaystyle\frac{P \longmapsto P'}{({}z)P \longmapsto ({}z)P'} & \displaystyle\frac{Q {\mathrel{\equiv}}P \quad\! P \longmapsto P' \quad\! P' {\mathrel{\equiv}}Q'}{Q \longmapsto Q'} \end{array}$$ The asynchronous $\pi$-calculus, as introduced by Honda & Tokoro in [@HT91] and by Boudol in [@Bo92], is the sublanguage $\rm a\pi$ of the fragment $\pi$ of the $\pi$-calculus presented above where all subexpressions $\bar x y.P$ have the form $\bar x y.\textbf{0}$, and are written $\bar x y$. Boudol [@Bo92] defined an encoding ${\mbox{\bbb [}\cdot\mbox{\bbb ]}}_{\rm B}$ from $\pi$ to $\rm a\pi$ inductively as follows: $$\begin{array}{rcl} {\mbox{\bbb [}\textbf{0}\mbox{\bbb ]}}_{\rm B} &=& \textbf{0} \\ {\mbox{\bbb [}\bar{x}y.P\mbox{\bbb ]}}_{\rm B} &=& (u)(\bar{x}u | u(v).(\bar{v}y | {\mbox{\bbb [}P\mbox{\bbb ]}}_{\rm B})) \\ {\mbox{\bbb [}x(z).P\mbox{\bbb ]}}_{\rm B} &=& x(u).(v)(\bar{u}v | v(z).{\mbox{\bbb [}P\mbox{\bbb ]}}_{\rm B}) \\ {\mbox{\bbb [}P | Q\mbox{\bbb ]}}_{\rm B} &=& ({\mbox{\bbb [}P\mbox{\bbb ]}}_{\rm B} | {\mbox{\bbb [}Q\mbox{\bbb ]}}_{\rm B}) \\ {\mbox{\bbb [}!P\mbox{\bbb ]}}_{\rm B} &=& \ ! {\mbox{\bbb [}P\mbox{\bbb ]}}_{\rm B} \\ {\mbox{\bbb [}({}x) P\mbox{\bbb ]}}_{\rm B} &=& ({}x) {\mbox{\bbb [}P\mbox{\bbb ]}}_{\rm B} \end{array}$$ always choosing $u,v \notin{\mathrm{fn}}(P)\cup\{x,y\},~ u\neq v$. The encoding ${\mbox{\bbb [}\cdot\mbox{\bbb ]}}_{\rm HT}$ of Honda & Tokoro [@HT91] differs only in the clauses for the input and output prefix: $$\begin{array}{rcl} {\mbox{\bbb [}\bar{x}y.P\mbox{\bbb ]}}_{\rm HT} &=& x(u).(\bar{u}y | {\mbox{\bbb [}P\mbox{\bbb ]}}_{\rm HT}) \\ {\mbox{\bbb [}x(z).P\mbox{\bbb ]}}_{\rm HT} &=& (u)(\bar{x}u | u(z).{\mbox{\bbb [}P\mbox{\bbb ]}}_{\rm HT}) \end{array}$$ again choosing $u\notin{\mathrm{fn}}(P)\cup\{x,y\}$. Validity of Boudol’s encoding {#sec:valid} ============================= In this section I show that Boudol’s encoding satisfies all five criteria of Gorla [@Gorla10a]. I will drop the subscript $_{\rm B}$. Compositionality ---------------- Boudol’s encoding is compositional by construction, for it is *defined* in terms of the contexts $C_{\mathtt{op}}^N$ that are required to exist by Definition \[df:valid\]. Note that, for the cases of input and output prefixing, these contexts *do* depend on $N$, namely through the requirement that the fresh names $u$ and $v$ are chosen to lay outside $N$. Name invariance --------------- An encoding according to Gorla is a pair $({\mbox{\bbb [}\cdot\mbox{\bbb ]}},\varphi_{{\mbox{\bbbs [\ ]}}})$, of which the second component, the renaming policy, is relevant only for satisfying the criterion of name invariance. Here I take $k\mathbin=1$ and $\varphi_{{\mbox{\bbbs [\ ]}}}:{\mathcal{N}}\rightarrow{\mathcal{N}}$ the identity mapping. \[free vars\]\[sbst\] Let $S\mathbin\in{\mathcal{P}}_{{\pi}}$. Then ${\mathrm{fn}}({\mbox{\bbb [}S\mbox{\bbb ]}})={\mathrm{fn}}(S)$.\ Moreover, ${\mbox{\bbb [}S\mbox{\bbb ]}}{\{\mathord{\raisebox{2pt}[0pt]{$y$}\!/\!z}\}} = {\mbox{\bbb [}S{\{\mathord{\raisebox{2pt}[0pt]{$y$}\!/\!z}\}}\mbox{\bbb ]}}$ for any $y,z\in\mathcal N$. A straightforward structural induction on $S$. This implies that ${\mbox{\bbb [}S\sigma\mbox{\bbb ]}} \mathbin= {\mbox{\bbb [}S\mbox{\bbb ]}}\sigma$ for any renaming $\sigma\!:{\mathcal{N}}\mathbin\rightarrow{\mathcal{N}}\!$, injective or otherwise. So the criterion of name invariance is satisfied. Operational correspondence -------------------------- A process calculus à la Gorla is a triple $\mathcal{L}\mathbin=(\mathcal{P},\longmapsto,\asymp)$; so far I defined $\mathcal{P}$ and $\longmapsto$ only. The semantic equivalence $\asymp$ of the source language plays no rôle in assessing whether an encoding is valid; the one of the target language is used only for satisfying the criteria of name invariance and operational correspondence. Here I take $\asymp_{\pi}$ and $\asymp_{{\rm a\pi}}$ the identity relations. If $S {\mathrel{\equiv}}S'$ for $S,S'\in{\mathcal{P}}_{\pi}$ then there exists a sequence $S_0 {\mathrel{\equiv}}S_1 {\mathrel{\equiv}}\dots {\mathrel{\equiv}}S_n$ for some $n\geq 0$, with $S=S_0$ and $S'=S_n$, such that each each step $S_i {\mathrel{\equiv}}S_{i+1}$ for $0\leq i<n$ is an application of one of the rules $\scriptstyle(1)-(9)$ of Definition \[def:reduction\] or their symmetric counterparts $\scriptstyle\stackrel{\leftarrow}{(1)}-\stackrel{\leftarrow}{(9)}$. (In fact, there is no need for rules $\scriptstyle\stackrel{\leftarrow}{(2)},\stackrel{\leftarrow}{(6)},\stackrel{\leftarrow}{(8)}$ and $\scriptstyle\stackrel{\leftarrow}{(9)}$ as rules $\scriptstyle(2),(6),(8)$ and $\scriptstyle(9)$ are their own symmetric counterparts.) Being an application of a rule $L{\mathrel{\equiv}}R$ here means that $S_i=C[L]$ and $S_{i+1}=C[R]$ for some unary context $C[\__1]$. #### Operational completeness \[redBF\] If $S {\mathrel{\equiv}}S'$ for $S,S' \mathbin\in {\mathcal{P}}_{{\pi}}$ then ${\mbox{\bbb [}S\mbox{\bbb ]}} {\mathrel{\equiv}}{\mbox{\bbb [}S'\mbox{\bbb ]}}$. Using the reflexivity, symmetry and transitivity of ${\mathrel{\equiv}}$ one may restrict attention to the case that $S {\mathrel{\equiv}}S'$ is a single application of a rule $\scriptstyle(1)-(9)$ of Definition \[def:reduction\]. The proof proceeds by structural induction on the context $C[\__1]$. The case that $C[\__1] = \__1$, the *trivial context*, is straightforward for each of the rules $\scriptstyle(1)-(9)$, applying Lemma \[sbst\] in the cases of rules $\scriptstyle(8),(9)$. The induction step is a straightforward consequence of the compositionality of ${\mbox{\bbb [}\cdot\mbox{\bbb ]}}$. \[operational completeness\] Let $S,S' \mathbin\in {\mathcal{P}}_{{\pi}}$. If $S \longmapsto S'$ then ${\mbox{\bbb [}S\mbox{\bbb ]}} \Longmapsto {\mbox{\bbb [}S'\mbox{\bbb ]}}$. By induction on the derivation of $S \longmapsto S'$. - Let $S\mathbin=\bar xy.P | x(z).Q$, $y\mathbin{\notin}{\mathrm{bn}}(Q)$ and $S'\mathbin=P|Q{\{\mathord{\raisebox{2pt}[0pt]{$y$}\!/\!z}\}}$. Pick $u,v\notin{\mathrm{fn}}(P)\cup{\mathrm{fn}}(Q)$, with $u\mathbin{\neq} v$.\ Write $P^*\mathbin{:=}\bar{v}y | {\mbox{\bbb [}P\mbox{\bbb ]}}$ and $Q^*\mathbin{:=}v(z).{\mbox{\bbb [}Q\mbox{\bbb ]}}$. Then $$\begin{array}{@{}rcl@{}}{\mbox{\bbb [}S\mbox{\bbb ]}} &=& (u)(\bar{x}u | u(v).P^*) ~|~ x(u).(v)(\bar{u}v | Q^*)\\ &\longmapsto& (u)\big(u(v).P^* ~|~ (v)(\bar{u}v | Q^*)\big)\\ &\longmapsto& (v)(P^* ~|~ Q^*)\\ &\longmapsto& {\mbox{\bbb [}P\mbox{\bbb ]}} ~|~ ({\mbox{\bbb [}Q\mbox{\bbb ]}}{\{\mathord{\raisebox{2pt}[0pt]{$y$}\!/\!z}\}})\\ &=& {\mbox{\bbb [}P\mbox{\bbb ]}} ~|~ {\mbox{\bbb [}Q{\{\mathord{\raisebox{2pt}[0pt]{$y$}\!/\!z}\}}\mbox{\bbb ]}} \quad~~~\mbox{(using Lemma~\ref{sbst})}\\ &=& {\mbox{\bbb [}P ~|~ Q{\{\mathord{\raisebox{2pt}[0pt]{$y$}\!/\!z}\}}\mbox{\bbb ]}} = {\mbox{\bbb [}S'\mbox{\bbb ]}}. \end{array}$$ Here structural congruence is applied in omitting parallel components $\bm{0}$ and empty binders $(u)$, $(v)$. - Let $S = (z) P$ and $S' = (z) P'$, with $P \longmapsto P'$. By the induction hypothesis, ${\mbox{\bbb [}P\mbox{\bbb ]}} \Longmapsto {\mbox{\bbb [}P'\mbox{\bbb ]}}$. Therefore, ${\mbox{\bbb [}S\mbox{\bbb ]}} \Longmapsto {\mbox{\bbb [}S'\mbox{\bbb ]}}$, as ${\mbox{\bbb [}S\mbox{\bbb ]}} = (z) {\mbox{\bbb [}P\mbox{\bbb ]}}$ and ${\mbox{\bbb [}S'\mbox{\bbb ]}} = (z) {\mbox{\bbb [}P'\mbox{\bbb ]}}$. - The case that $S\mathbin= P|Q$ and $S'\mathbin= P'|Q$ with $P \longmapsto P'$ proceeds likewise. - Let $S {\mathrel{\equiv}}P$ and $P' {\mathrel{\equiv}}S'$ with $P \longmapsto P'$. By the induction hypothesis, ${\mbox{\bbb [}P\mbox{\bbb ]}} \Longmapsto {\mbox{\bbb [}P'\mbox{\bbb ]}}$. By Lemma \[redBF\], ${\mbox{\bbb [}S\mbox{\bbb ]}} {\mathrel{\equiv}}{\mbox{\bbb [}P\mbox{\bbb ]}}$ and ${\mbox{\bbb [}P'\mbox{\bbb ]}} {\mathrel{\equiv}}{\mbox{\bbb [}S'\mbox{\bbb ]}}$. So ${\mbox{\bbb [}S\mbox{\bbb ]}} \Longmapsto {\mbox{\bbb [}S'\mbox{\bbb ]}}$. The above yields that $S \Longmapsto S'$ implies ${\mbox{\bbb [}S\mbox{\bbb ]}} \Longmapsto {\mbox{\bbb [}S'\mbox{\bbb ]}}$. So the criterion of operational completeness is satisfied. \[divergence preservation\] The above proof shows that $\Longmapsto$ in Lemma \[operational completeness\] may be replaced by $\longmapsto\longmapsto\longmapsto$. As a direct consequence $S \longmapsto^\omega$ implies ${\mbox{\bbb [}S\mbox{\bbb ]}} \longmapsto^\omega$ (*divergence preservation*). #### Operational soundness The following result provides a normal form up to structural congruence for reduction steps in the asynchronous $\pi$-calculus. Here a term is *plain* if it is a parallel composition $P_1|\dots|P_n$ of subterms $P_i$ of the form $\bar xy.R$ or $x(z).R$ or $\surd$ or ${\mathbf{0}}$ or $!R$. Moreover, $(\tilde w)P$ for $\tilde w \mathbin=\{w_1,\dots,w_n\}\mathbin\subseteq {\mathcal{N}}$ with $n\mathbin\in\mbox{\bbb N}$ denotes $(w_1)\cdots(w_n)P$ for some arbitrary order of the $(w_i)$. Without the statements that ${U}$ is plain and $\tilde w \subseteq {\mathrm{fn}}((\bar x {y}| x({z}) . R) | {U})$, this lemma is a simplification, by restricting attention to the syntax of ${{\rm a\pi}}$, of Lemma 1.2.20 in [@SW01book], established for the full $\pi$-calculus. \[red1\] If ${T}\longmapsto {T}'$ with ${T},{T}'\in{\mathcal{P}}_{{{\rm a\pi}}}$ then there are $\tilde w \mathbin\subseteq{\mathcal{N}}$, $x,{y},{z}\mathbin\in\mathcal{N}$ and terms $R,{U}\mathbin\in{\mathcal{P}}_{{{\rm a\pi}}}$ with ${U}$ plain, such that ${T}{\mathrel{\equiv}}(\tilde w)((\bar x {y}| x({z}) . R) | {U}) \mathbin{\longmapsto} (\tilde w)(( \bm{0} | R{\{\mathord{\raisebox{2pt}[0pt]{${y}$}\!/\!{z}}\}}) | {U}) {\mathrel{\equiv}}{T}'$ and $\tilde w \subseteq {\mathrm{fn}}((\bar x {y}| x({z}) . R) | {U})$. The reduction ${T}\longmapsto {T}'$ is provable from the reduction rules of Definition \[def:reduction\]. Since ${\mathrel{\equiv}}$ is a congruence, applications of the last rule can always be commuted until they appear at the end of such a proof. Hence there are terms ${T}^{\rm pre}$ and ${T}^{\rm post}$ such that ${T}{\mathrel{\equiv}}{T}^{\rm pre} \longmapsto {T}^{\rm post} {\mathrel{\equiv}}{T}'$, and the reduction ${T}^{\rm pre} \longmapsto {T}^{\rm post}$ is generated by the first three rules of Definition \[def:reduction\]. Applying rules $\scriptstyle(8)$, $\scriptstyle(9)$, $\scriptstyle(2)$ and $\scriptstyle\stackrel{\leftarrow}{(7)}$ of structural congruence, the terms ${T}^{\rm pre}$ and ${T}^{\rm post}$ can be brought in the forms $(\tilde w)P^{\rm pre}$ and $(\tilde w)P^{\rm post}$, with $P^{\rm pre}$ and $P^{\rm post}$ plain, at the same time moving all applications of the reduction rule for restriction $(z)P$ after all applications of the rule for parallel composition. Applying rules [\[0pt\]\[0pt\][$\scriptstyle\stackrel{\leftarrow}{(1)},\stackrel{\leftarrow}{(3)}$]{}]{}, all applications of the reduction rule for parallel composition can be merged into a single application. After this proof normalisation, the reduction ${T}^{\rm pre} \longmapsto {T}^{\rm post}$ is generated by one application of the first reduction rule of Definition \[def:reduction\], followed by one application of the rule for $|$, followed by applications of the rule for restriction. Now ${T}^{\rm pre}$ has the form $(\tilde w)((\bar x {y}| x({z}) . R) | {U})$ and ${T}^{\rm post}=(\tilde w)((\bm{0} | R{\{\mathord{\raisebox{2pt}[0pt]{${y}$}\!/\!{z}}\}}) |{U})$ with ${U}$ plain. Rules $\scriptstyle\stackrel{\leftarrow}{(3)}$, $\scriptstyle{(7)}$, $\scriptstyle{(5)}$ and $\scriptstyle{(3)}$ of structural congruence, in combination with $\alpha$-conversion (rules $\scriptstyle{(8)}$ and $\scriptstyle{(9)}$), allow all names $w$ with $w \notin{\mathrm{fn}}((\bar x {y}| x({z}) . R) | {U})$ to be dropped from $\tilde w$, while preserving the validity of ${T}^{\rm pre} \longmapsto {T}^{\rm post}$. Write $P {\mathrel{\equiv_{\mathrm{S}}}}Q$ if $P$ can be converted into $Q$ using applications of rules $\scriptstyle(1)-(3),(5)-(9)$ only, in either direction, possibly within a context, and $P \Rrightarrow_{!} Q$ if this can be done with rule $\scriptstyle{(4)}$, from left to right. \[red2\] Lemma \[red1\] can be strengthened by replacing by ${T}\Rrightarrow_{!}{\mathrel{\equiv_{\mathrm{S}}}}(\tilde w)((\bar x {y}| x({z}) . R) |{U})$. Define rule $\scriptstyle\stackrel{\leftarrow}{(4)}$ to *commute over* rule $\scriptstyle(1)$ if for each sequence $P{\mathrel{\equiv}}Q {\mathrel{\equiv}}R$ with $P{\mathrel{\equiv}}Q$ an application of rule $\scriptstyle\stackrel{\leftarrow}{(4)}$ and $Q{\mathrel{\equiv}}R$ an application of rule $\scriptstyle(1)$, there exists a term $Q'$ such that $P{\mathrel{\equiv}}Q'$ holds by (possibly multiple) applications of rule $\scriptstyle(1)$ and $Q'{\mathrel{\equiv}}R$ by applications of rule $\scriptstyle\stackrel{\leftarrow}{(4)}$. As indicated in the table below, rule $\scriptstyle\stackrel{\leftarrow}{(4)}$ commutes over all other rules of structural congruence, except for rule $\scriptstyle(4)$. The proof of this is trivial: in each case the two rules act on disjoint part of the syntax tree of $Q$. Moreover, rule $\scriptstyle\stackrel{\leftarrow}{(4)}$ commutes over rule $\scriptstyle(4)$ too, except in the special case that the two applications annihilate each other precisely, meaning that $P=R$; this situation is indicated by the $\star$. $$\begin{array}{@{}r@{\,}||@{\,}c@{\,}|@{\,}c@{\,}|@{\,}c@{\,}|@{\,}c@{\,}|@{\,}c@{\,}|@{\,}c@{\,}|@{\,}c@{\,}|@{\,}c@{\,}|@{\,}c@{\,}|@{\,}c@{\,}|@{\,}c@{\,}|@{\,}c@{\,}|@{\,}c@{\,}|@{\,}c@{\,}|@{}} & \scriptstyle(1) & \scriptstyle\stackrel{\leftarrow}{(1)} & \scriptstyle(2) & \scriptstyle(3) & \scriptstyle\stackrel{\leftarrow}{(3)} & \scriptstyle(4) & \scriptstyle\stackrel{\leftarrow}{(4)} & \scriptstyle(5) & \scriptstyle\stackrel{\leftarrow}{(5)} & \scriptstyle(6) & \scriptstyle(7) & \scriptstyle\stackrel{\leftarrow}{(7)} & \scriptstyle(8) & \scriptstyle(9) \\ \hline \scriptstyle\stackrel{\leftarrow}{(4)} & \scriptstyle\surd & \scriptstyle\surd & \scriptstyle\surd & \scriptstyle\surd & \scriptstyle\surd & \star & \cdot & \scriptstyle\surd & \scriptstyle\surd & \scriptstyle\surd & \scriptstyle\surd & \scriptstyle\surd & \scriptstyle\surd & \scriptstyle\surd \\ \end{array}$$ As a consequence of this, in a sequence $P_0 \mathbin{{\mathrel{\equiv}}} P_1 \mathbin{{\mathrel{\equiv}}} \dots \mathbin{{\mathrel{\equiv}}} P_n$, all applications of rule $\scriptstyle\stackrel{\leftarrow}{(4)}$ can be moved to the right. Moreover, when $P_{n-1} {\mathrel{\equiv}}P_n \mathbin{:=} (\tilde w)((\bar x {y}| x({z}) . R) | {U}) \longmapsto\linebreak[1] (\tilde w)(( \bm{0} | R{\{\mathord{\raisebox{2pt}[0pt]{${y}$}\!/\!{z}}\}}) | {U}) {\mathrel{\equiv}}{T}'\!$ and $P_{n-1} \mathbin{{\mathrel{\equiv}}} P_n$ is an application of rule [\[0pt\]\[0pt\][$\scriptstyle\stackrel{\leftarrow}{(4)}$]{}]{}, then this application must take place within the term $R$ or ${U}$, and thus can be postponed until after the reduction step, so that $P_{n-1} \mathbin= (\tilde w)((\bar x {y}| x({z}) . R') | {U}' ) \mathbin{\longmapsto} (\tilde w)(( \bm{0} | R'{\{\mathord{\raisebox{2pt}[0pt]{${y}$}\!/\!{z}}\}}) | {U}' ) \mathbin{{\mathrel{\equiv}}} {T}'\!$ with ${U}'$ plain. Thus, one may assume that in the sequence ${T}=P_0 {\mathrel{\equiv}}P_1 {\mathrel{\equiv}}\dots {\mathrel{\equiv}}P_n$ none of the steps is an application of rule $\scriptstyle\stackrel{\leftarrow}{(4)}$. Since applications of rule $\scriptstyle\stackrel{\leftarrow}{(4)}$ could be shifted to the right in this sequence, all applications of rule $\scriptstyle(4)$ can be shifted to the left. Hence ${T}\mathbin{\Rrightarrow_{!}{\mathrel{\equiv_{\mathrm{S}}}}} (\tilde w)((\bar x {y}| x({z}) . R) | {U})$. \[redBB\] If ${\mbox{\bbb [}S\mbox{\bbb ]}} \Rrightarrow_{!} {T}_0$ for $S \mathbin\in {\mathcal{P}}_{{\pi}}$ and ${T}_0 \mathbin\in {\mathcal{P}}_{{{\rm a\pi}}}$ then there is an $S_0 \mathbin\in {\mathcal{P}}_{{\pi}}$ with $S \Rrightarrow_{!} S_0$ and ${\mbox{\bbb [}S_0\mbox{\bbb ]}}={T}_0$. Similar to the proof of Lemma \[redBF\]. Note that a variant of Lemma \[redBB\] with $\scriptstyle(2)$, $\scriptstyle(3)$, $\stackrel{\leftarrow}{\scriptstyle(3)}$, or $\stackrel{\leftarrow}{\scriptstyle(7)}$ in the rôle of $\scriptstyle{(4)}$ would not be valid. Up to ${\mathrel{\equiv_{\mathrm{S}}}}$ each term $P\in{\mathcal{P}}_{\pi}$ can be brought in the form $(\tilde w)P$ with $P$ plain and $\tilde w \subseteq {\mathrm{fn}}(P)$. Moreover, such a normal form has a degree of uniqueness: \[sigma\] If $(\tilde w)P \mathbin{{\mathrel{\equiv_{\mathrm{S}}}}} (\tilde v)Q$ with $P,Q$ plain, $\tilde w \mathbin{\subseteq} {\mathrm{fn}}(P)$ and $\tilde v \mathbin\subseteq {\mathrm{fn}}(Q)$, then there is an injective renaming $\sigma{:}{\mathcal{N}}{\rightarrow}{\mathcal{N}}$ such that $\sigma(\tilde v)=\tilde w$ and $P {\mathrel{\equiv_{\mathrm{S}}}}Q\sigma$. Thus, for each parallel component $P'$ of $P$ of the form $\bar xy.R$ or $x(z).R$ or $\surd$ or $!R$ there is a parallel component $Q'$ of $Q\sigma$ with $P' {\mathrel{\equiv_{\mathrm{S}}}}Q'$. Below, $\equiv_{(8),(9)}$ denotes convertibility by applications of rules $\scriptstyle(8)$ and $\scriptstyle(9)$ only, and similarly for other rules. \[red3\] If ${\mbox{\bbb [}S\mbox{\bbb ]}}{\mathrel{\equiv_{\mathrm{S}}}}(\tilde w)({U}| \bar x {u}| x({r}) . R )$ with $S\mathbin\in{\mathcal{P}}_{{\pi}}$, ${U}$ plain and $\tilde w \subseteq {\mathrm{fn}}({U}| \bar x {u}| x({r}) . R )$, then there are ${V},R_1,\linebreak[4]R_2\mathbin\in{\mathcal{P}}_{{\pi}}$, ${W}\mathbin\in{\mathcal{P}}_{{\rm a\pi}}$, $y,z,v_1,v_2\mathbin\in\mathcal{N}$ and [$\tilde s, \tilde t \mathbin\subseteq {\mathcal{N}}$]{} such that $S {\mathrel{\equiv_{\mathrm{S}}}}(\tilde s)({V}\mid \bar x y . R_1 \mid x(z) . R_2)$, $v_1\mathbin{\neq}y\mathbin{\neq}u$, $\tilde w = \tilde s \uplus \tilde t \uplus \{u\}$, ${U}{\mathrel{\equiv_{\mathrm{S}}}}{W}|{u}(v_1).(\bar{v_1}y | {\mbox{\bbb [}R_1\mbox{\bbb ]}})$, $u,v_1\mathbin{\notin}{\mathrm{fn}}({\mbox{\bbb [}R_1\mbox{\bbb ]}})$, ${\mbox{\bbb [}{V}\mbox{\bbb ]}}{\mathrel{\equiv_{\mathrm{S}}}}(\tilde t){W}$, $R {\mathrel{\equiv_{\mathrm{S}}}}(v_2)(\bar{{r}}v_2 | v_2(z).{\mbox{\bbb [}R_2\mbox{\bbb ]}})$, $r\mathbin{\neq} v_2$ and $r,v_2\mathbin{\notin}{\mathrm{fn}}({\mbox{\bbb [}R_2\mbox{\bbb ]}}){\setminus}\{z\}$. By applying rules $\scriptstyle(8)$, $\scriptstyle(9)$, $\scriptstyle(2)$ and $\scriptstyle\stackrel{\leftarrow}{(7)}$ only, $S$ can be brought into the form $S':=(\tilde p)(P_1 | \dots | P_n)$ for some $n\mathbin>0$, where each $P_i$ is of the form $\bar sy.R$ or $s(z).R$ or $\surd$ or ${\mathbf{0}}$ or $!R$. By means of [\[0pt\]\[0pt\][$\scriptstyle\stackrel{\leftarrow}{(3)}$]{}]{}, $\scriptstyle{(7)}$, $\scriptstyle{(5)}$ and $\scriptstyle{(3)}$ one can moreover assure that $\tilde p \subseteq {\mathrm{fn}}(P_1 | \dots | P_n)$. By the proof of Lemma \[redBF\] ${\mbox{\bbb [}S\mbox{\bbb ]}}{\mathrel{\equiv_{\mathrm{S}}}}{\mbox{\bbb [}S'\mbox{\bbb ]}}$. Furthermore, ${\mbox{\bbb [}S'\mbox{\bbb ]}}=(\tilde p)({\mbox{\bbb [}P_1\mbox{\bbb ]}}|\dots|{\mbox{\bbb [}P_n\mbox{\bbb ]}})$. By applying rules $\scriptstyle(8)$, $\scriptstyle(9)$, $\scriptstyle(2)$ and $\scriptstyle\stackrel{\leftarrow}{(7)}$ only, the term ${\mbox{\bbb [}P_1\mbox{\bbb ]}}|\dots|{\mbox{\bbb [}P_n\mbox{\bbb ]}}$ can be brought into the form $(\tilde q)P$ with $P$ plain; moreover, the set $\tilde q$ can be chosen disjoint from $\tilde p$. Each $q\in\tilde q$ is a renaming of the name $u$ in a term ${\mbox{\bbb [}P_i\mbox{\bbb ]}} = {\mbox{\bbb [}\bar{x}y.Q\mbox{\bbb ]}} = (u)(\bar{x}u | u(v).(\bar{v}y | {\mbox{\bbb [}Q\mbox{\bbb ]}}))$, so that $q \in{\mathrm{fn}}(P)$. So $(\tilde w)({U}| \bar x {u}| x({r}) . R) {\mathrel{\equiv_{\mathrm{S}}}}(\tilde p)(\tilde q)P$. Let $\sigma$ be the renaming that exists by Observation \[sigma\], so that $\sigma(\tilde p) \uplus \sigma(\tilde q) = \tilde w$. Then ${U}| \bar x {u}| x({r}) . R {\mathrel{\equiv_{\mathrm{S}}}}P\sigma$. So $\bar x {u}$ and $x({r}) . R$ (up to ${\mathrel{\equiv_{\mathrm{S}}}}$) must be parallel components of $P\sigma$. Let $\sigma'$ be the restriction of $\sigma$ to $\tilde p$ and take $\tilde s := \sigma'(\tilde p)$. Let $S''\mathbin{:=}(\tilde s)(P_1\sigma' | \dots | P_n\sigma')$. Then $S' {\mathrel{\equiv_{\mathrm{S}}}}S''$ and ${\mbox{\bbb [}S'\mbox{\bbb ]}}{\mathrel{\equiv_{\mathrm{S}}}}{\mbox{\bbb [}S''\mbox{\bbb ]}}=(\tilde s)({\mbox{\bbb [}P_1\sigma'\mbox{\bbb ]}}|\dots|{\mbox{\bbb [}P_n\sigma'\mbox{\bbb ]}})=(\tilde s)({\mbox{\bbb [}P_1\mbox{\bbb ]}}\sigma'|\dots|{\mbox{\bbb [}P_n\mbox{\bbb ]}}\sigma')$. Since ${\mbox{\bbb [}P_1\mbox{\bbb ]}}|\dots|{\mbox{\bbb [}P_n\mbox{\bbb ]}}$ can be converted into $(\tilde q)(P)$ by applications of rules $\scriptstyle(8)$, $\scriptstyle(9)$, $\scriptstyle(2)$ and [\[0pt\]\[0pt\][$\scriptstyle\stackrel{\leftarrow}{(7)}$]{}]{}, ${\mbox{\bbb [}P_1\mbox{\bbb ]}}\sigma'|\dots|{\mbox{\bbb [}P_n\mbox{\bbb ]}}\sigma'$ can be converted into $(\tilde q)(P\sigma')$ and even into $(\sigma(\tilde q))(P\sigma)$ by applications of these rules. One can apply $\scriptstyle(8),(9)$ first, so that each ${\mbox{\bbb [}P_i\mbox{\bbb ]}}\sigma'$ is converted into some term $Q_i$ by applications of $\scriptstyle(8),(9)$, and $Q_1|\dots|Q_n$ is converted into $(\sigma(\tilde q))(P\sigma)$ by applications of $\scriptstyle(2)$ and [\[0pt\]\[0pt\][$\scriptstyle\stackrel{\leftarrow}{(7)}$]{}]{} only. One of the $P_i\sigma'$ must be of the form $\bar x y.R_1$, so that ${\mbox{\bbb [}P_i\mbox{\bbb ]}}\sigma' = {\mbox{\bbb [}P_i\sigma'\mbox{\bbb ]}} = {\mbox{\bbb [}\bar x y.R_1\mbox{\bbb ]}}=(u')(\bar{x}u' | u'(v_1).(\bar{v}_1y | {\mbox{\bbb [}R_1\mbox{\bbb ]}}))$ with $u',v_1\notin{\mathrm{fn}}(R_1)\cup\{x,y\}$, while $u'$ is renamed into $u$ in $Q_i = (u)(\bar{x}u | u(v_1).(\bar{v}_1y | {\mbox{\bbb [}R_1\mbox{\bbb ]}}))$. For this is the only way $\bar{x}u$ can end up as a parallel component of $P\sigma$. It follows that $u,v_1 \notin {\mathrm{fn}}(R_1)$ and $v_1\mathbin{\neq} y\mathbin{\neq} u\in\sigma(\tilde q)$. Let $\tilde t := \sigma(\tilde q) \setminus u$. One obtains $\tilde w = \tilde s \uplus \tilde t \uplus \{u\}$. Searching for an explanation of the parallel component $x({r}) . R $ (up to ${\mathrel{\equiv_{\mathrm{S}}}}$) of $P\sigma$, the existence of the component $\bar x u$ of $P\sigma$ excludes the possibility that one of the $P_i\sigma'$ is of the form $\bar t' y'\!.R_2$ so that ${\mbox{\bbb [}P_i\mbox{\bbb ]}}\sigma' {=} (u')(\bar{t}'u' | u'(r'\hspace{-.5pt}).(\bar{r'}y' | {\mbox{\bbb [}R_2\mbox{\bbb ]}}))$, while $u'$ is renamed into $x$ and $r'$ into $r$ in the expression $Q_i = (x)(\bar{t}'x | x(r).(\bar{r}y' | {\mbox{\bbb [}R_2\mbox{\bbb ]}}))$. Hence one of the $P_i\sigma'$ is of the form $x(z).R_2$, so that ${\mbox{\bbb [}P_i\mbox{\bbb ]}}\sigma' = {\mbox{\bbb [}P_i\sigma'\mbox{\bbb ]}} = {\mbox{\bbb [}x(z).R_2\mbox{\bbb ]}}=x(r').(v')(\bar{r'}v' | v'(z).{\mbox{\bbb [}R_2\mbox{\bbb ]}})$ with $r'\neq v'$ and $r',v'\notin{\mathrm{fn}}(R_2)\setminus\{z\}$, while $r'$, $v'$ and $z$ are renamed into $r$, $v_2$ and $z'$ in $Q_i = x(r).(v_2)(\bar{r}v_2 | v_2(z').R_2')$, where $(z')R_2' \mathbin{\equiv_{(8),(9)}} (z){\mbox{\bbb [}R_2\mbox{\bbb ]}}$. Thus $r,v_2\notin{\mathrm{fn}}(R_2){\setminus}\{z\}$ and$r{\neq} v_2$. Further, $x(z).R \mathbin{{\mathrel{\equiv_{\mathrm{S}}}}} Q_i$, so $R\mathbin{{\mathrel{\equiv_{\mathrm{S}}}}} (v_2)(\bar{r}v_2 | v_2(z).{\mbox{\bbb [}R_2\mbox{\bbb ]}})$. Let ${V}$ collect all parallel components $P_i\sigma'$ other than the above discussed components $\bar x y.R_1$ and $x(z).R_2$. Then $S{\mathrel{\equiv_{\mathrm{S}}}}S''{\mathrel{\equiv_{\mathrm{S}}}}(\tilde s)({V}~|~ \bar x y.R_1 ~|~ x(z).R_2)$. One has $(\tilde w)({U}| \bar x {u}| x({r}) . R ) {\mathrel{\equiv_{\mathrm{S}}}}{\mbox{\bbb [}S\mbox{\bbb ]}} {\mathrel{\equiv_{\mathrm{S}}}}{\mbox{\bbb [}S''\mbox{\bbb ]}} {\mathrel{\equiv_{\mathrm{S}}}}\\ {\mbox{\bbb [}(\tilde s)({V}~|~ \bar x y.R_1 ~|~ x(z).R_2)\mbox{\bbb ]}} =\\ (\tilde s)({\mbox{\bbb [}{V}\mbox{\bbb ]}} ~|~ (u')(\bar{x}u' | u'(v_1).(\bar{v_1}y | {\mbox{\bbb [}R_1\mbox{\bbb ]}})) ~|~ x(r')(v')\cdots ) \equiv_{(8),(9)} (\tilde s)({T}~|~ (u)(\bar{x}u | u(v_1).(\bar{v_1}y | {\mbox{\bbb [}R_1\mbox{\bbb ]}})) ~|~ x({r}) . R ) \equiv_{(1),(2),(7)} \\ (\tilde s)(u)({T}~|~ u(v_1).(\bar{v_1}y | {\mbox{\bbb [}R_1\mbox{\bbb ]}}) ~|~ \bar{x}u ~|~ x({r}) . R ) \equiv_{(2),(7)} \\ (\tilde s)(u)(\tilde t)({W}~|~ u(v_1).(\bar{v_1}y | {\mbox{\bbb [}R_1\mbox{\bbb ]}}) ~|~ \bar{x}u ~|~ x({r}) . R )$.\ Here ${T}$ is the parallel composition of all components $Q_i$ obtained by renaming of the parallel components $P_i\sigma'$ of ${\mbox{\bbb [}{V}\mbox{\bbb ]}}$, and $(\tilde t){W}$ with ${W}$ plain is obtained from ${T}$ by rules $\scriptstyle(2),(7)$. So ${U}~|~ \bar x {u}~|~ x({r}) . R {\mathrel{\equiv_{\mathrm{S}}}}{W}~|~ u(v_1).(\bar{v_1}y | {\mbox{\bbb [}R_1\mbox{\bbb ]}}) ~|~ \bar{x}u ~|~ x({r}) . R$ by Observation \[sigma\]. It follows that ${U}{\mathrel{\equiv_{\mathrm{S}}}}{W}~|~ u(v_1).(\bar{v_1}y | {\mbox{\bbb [}R_1\mbox{\bbb ]}})$. A straightforward case distinction shows that the set of names occurring free in a term is invariant under structural congruence: \[obs:subst\] If $P{\mathrel{\equiv}}Q$ then ${\mathrm{fn}}(P)={\mathrm{fn}}(Q)$. The above results can be combined to establish the special case of operational soundness where the sequence of reductions ${\mbox{\bbb [}S\mbox{\bbb ]}}\Longmapsto {T}$ consists of one reduction step only. \[lem6\] Let $S \in {\mathcal{P}}_{{\pi}}$ and ${T}\in {\mathcal{P}}_{{{\rm a\pi}}}$. If ${\mbox{\bbb [}S\mbox{\bbb ]}} \longmapsto {T}$ then there is a $S'$ with $S \longmapsto S'$ and ${T}\Longmapsto {\mbox{\bbb [}S'\mbox{\bbb ]}}$. Suppose ${\mbox{\bbb [}S\mbox{\bbb ]}} \longmapsto {T}$. Then, by Lemma \[red2\], there are $\tilde w \mathbin\subseteq{\mathcal{N}}$, $x,{u},{r}\mathbin\in\mathcal{N}$ and ${T}_0,R,{U}\mathbin\in{\mathcal{P}}_{{{\rm a\pi}}}$ with ${U}$ plain, such that ${\mbox{\bbb [}S\mbox{\bbb ]}} \mathbin{\Rrightarrow_{!}} {T}_0 \mathbin{{\mathrel{\equiv_{\mathrm{S}}}}} (\tilde w)({U}| \bar x {u}| x({r}) . R ) \mathbin{\longmapsto} (\tilde w)({U}| R{\{\mathord{\raisebox{2pt}[0pt]{${u}$}\!/\!{r}}\}} ) \mathbin{{\mathrel{\equiv}}} {T}$ and $\tilde w \subseteq {\mathrm{fn}}({U}| \bar x {u}| x({r}) . R)$. By Lemma \[redBB\], there is an $S_0 \mathbin\in {\mathcal{P}}_{{\pi}}$ with $S \Rrightarrow_{!} S_0$ and ${\mbox{\bbb [}S_0\mbox{\bbb ]}}={T}_0$. So, by Lemma \[red3\], there are ${V},R_1,\linebreak[1]R_2\mathbin\in{\mathcal{P}}_{{\pi}}$, ${W}\mathbin\in{\mathcal{P}}_{{\rm a\pi}}$, $y,z,v_1,v_2\mathbin\in\mathcal{N}$ and [$\tilde s, \tilde t \mathbin\subseteq {\mathcal{N}}$]{} such that $S {\mathrel{\equiv_{\mathrm{S}}}}(\tilde s)({V}\mid \bar x y . R_1 \mid x(z) . R_2)$, $v_1\mathbin{\neq}y\mathbin{\neq}u$, $\tilde w = \tilde s \uplus \tilde t \uplus \{u\}$, ${U}{\mathrel{\equiv_{\mathrm{S}}}}{W}|{u}(v_1).(\bar{v_1}y | {\mbox{\bbb [}R_1\mbox{\bbb ]}})$, $u,v_1\mathbin{\notin}{\mathrm{fn}}({\mbox{\bbb [}R_1\mbox{\bbb ]}})$, ${\mbox{\bbb [}{V}\mbox{\bbb ]}}{\mathrel{\equiv_{\mathrm{S}}}}(\tilde t){W}$, $R {\mathrel{\equiv_{\mathrm{S}}}}(v_2)(\bar{{r}}v_2 | v_2(z).{\mbox{\bbb [}R_2\mbox{\bbb ]}})$, $r\mathbin{\neq} v_2$ and $r,v_2\mathbin{\notin}{\mathrm{fn}}({\mbox{\bbb [}R_2\mbox{\bbb ]}}){\setminus}\{z\}$. As $({\mathrm{fn}}({V}) \cup \{x,y\} \cup {\mathrm{fn}}(R_1)\cup({\mathrm{fn}}(R_2)\setminus\{z\}))\setminus \tilde s = {\mathrm{fn}}(S_0)$, using Observation \[obs:subst\], and $\tilde w \cap {\mathrm{fn}}(S_0) = \tilde w \cap {\mathrm{fn}}({T}_0) \mathbin=\emptyset$, using Lemma \[sbst\], $t,u\notin{\mathrm{fn}}({V}) \cup \{x,y\} \cup {\mathrm{fn}}(R_1)\cup({\mathrm{fn}}(R_2)\setminus\{z\})$ for all $t\mathbin\in \tilde t$. Let $v\mathbin\in{\mathcal{N}}$ satisfy $u,r,y\mathbin{\neq} v\notin{\mathrm{fn}}(R_1)\cup({\mathrm{fn}}(R_2){\setminus}\{z\})$. Take $S':= (\tilde s)({V}~|~ R_1 ~|~ R_2 {\{\mathord{\raisebox{2pt}[0pt]{$y$}\!/\!z}\}})$. Then $S\longmapsto S'$ and ${T}\mathbin{{\mathrel{\equiv}}} (\tilde w)({U}~|~R{\{\mathord{\raisebox{2pt}[0pt]{$u$}\!/\!r}\}})\\ {\mathrel{\equiv}}(\tilde w)\big({W}| {u}(v_1).(\bar{v}_1y | {\mbox{\bbb [}R_1\mbox{\bbb ]}}) ~|~ (v_2)(\bar{{r}}v_2 | v_2(z).{\mbox{\bbb [}R_2\mbox{\bbb ]}}){\{\mathord{\raisebox{2pt}[0pt]{$u$}\!/\!r}\}}\big) \\ {\mathrel{\equiv}}(\tilde w)\big({W}| {u}(v).(\bar{v}y | {\mbox{\bbb [}R_1\mbox{\bbb ]}}) ~|~ (v)(\bar{{r}}v | v(z).{\mbox{\bbb [}R_2\mbox{\bbb ]}}){\{\mathord{\raisebox{2pt}[0pt]{$u$}\!/\!r}\}}\big) \\ \mbox{}\hfill (\mbox{\it as $y\mathbin{\neq} v_1$, $v_1\mathbin{\notin}{\mathrm{fn}}({\mbox{\bbb [}R_1\mbox{\bbb ]}})$, $r\mathbin{\neq} v_2$ and $v_2\mathbin{\notin}{\mathrm{fn}}({\mbox{\bbb [}R_2\mbox{\bbb ]}}){\setminus} \{z\}$})\\ {\mathrel{\equiv}}(\tilde w)\big({W}| {u}(v).(\bar{v}y | {\mbox{\bbb [}R_1\mbox{\bbb ]}}) ~|~ (v)(\bar{u}v | v(z).{\mbox{\bbb [}R_2\mbox{\bbb ]}})\big) \\ \mbox{}\hfill (\mbox{\it since $r\neq v \neq u$ and $r\notin{\mathrm{fn}}({\mbox{\bbb [}R_2\mbox{\bbb ]}}){\setminus}\{z\}$})\\ {\mathrel{\equiv}}(\tilde s)(u)(\tilde t)\big({W}~|~ {u}(v).(\bar{v}y | {\mbox{\bbb [}R_1\mbox{\bbb ]}}) ~|~ (v)(\bar{u}v | v(z).{\mbox{\bbb [}R_2\mbox{\bbb ]}})\big) \\ {\mathrel{\equiv}}(\tilde s)(u)\big((\tilde t){W}~|~ {u}(v).(\bar{v}y | {\mbox{\bbb [}R_1\mbox{\bbb ]}}) ~|~ (v)(\bar{u}v | v(z).{\mbox{\bbb [}R_2\mbox{\bbb ]}})\big) \\ \mbox{}\hfill (\mbox{\it since $t\mathbin{\notin}\{u,y\} \cup {\mathrm{fn}}({\mbox{\bbb [}R_1\mbox{\bbb ]}})\cup({\mathrm{fn}}({\mbox{\bbb [}R_2\mbox{\bbb ]}})\setminus \{z\})$ for $t\mathbin\in\tilde t$})\\ {\mathrel{\equiv}}(\tilde s)\left({\mbox{\bbb [}{V}\mbox{\bbb ]}} ~|~ (u){\color{red}\big(}{u}(v).(\bar{v}y | {\mbox{\bbb [}R_1\mbox{\bbb ]}}) ~|~ (v)(\bar{u}v | v(z).{\mbox{\bbb [}R_2\mbox{\bbb ]}}){\color{red}\big)}\right) \\ \mbox{}\hfill (\mbox{\it since $u\notin{\mathrm{fn}}({\mbox{\bbb [}{V}\mbox{\bbb ]}})$})\\ \longmapsto (\tilde s)\big({\mbox{\bbb [}{V}\mbox{\bbb ]}} ~|~ (v).{\color{red}\big(}(\bar{v}y | {\mbox{\bbb [}R_1\mbox{\bbb ]}}) ~|~ v(z).{\mbox{\bbb [}R_2\mbox{\bbb ]}}{\color{red}\big)}\big) \\ \mbox{}\hfill (\mbox{\it since $u \neq v$ and $u\notin\{y\}\cup{\mathrm{fn}}({\mbox{\bbb [}R_1\mbox{\bbb ]}})\cup{\mathrm{fn}}({\mbox{\bbb [}R_2\mbox{\bbb ]}}){\setminus}\{z\}$})\\ \longmapsto (\tilde s)\big({\mbox{\bbb [}{V}\mbox{\bbb ]}} ~|~ {\mbox{\bbb [}R_1\mbox{\bbb ]}} ~|~ {\mbox{\bbb [}R_2\mbox{\bbb ]}}{\{\mathord{\raisebox{2pt}[0pt]{$y$}\!/\!z}\}} \big) \\ \mbox{}\hfill (\mbox{\it since $v\notin\{y\}\cup{\mathrm{fn}}({\mbox{\bbb [}R_1\mbox{\bbb ]}})\cup{\mathrm{fn}}({\mbox{\bbb [}R_2\mbox{\bbb ]}}){\setminus}\{z\}$})\\ = (\tilde s)\big({\mbox{\bbb [}{V}\mbox{\bbb ]}} ~|~ {\mbox{\bbb [}R_1\mbox{\bbb ]}} ~|~ {\mbox{\bbb [}R_2{\{\mathord{\raisebox{2pt}[0pt]{$y$}\!/\!z}\}}\mbox{\bbb ]}} \big) \hfill (\mbox{\it by Lemma~\ref{sbst}})\\ = {\mbox{\bbb [}S'\mbox{\bbb ]}}$. To obtain general operational soundness, I introduce an *inert* reduction relation with a confluence property, stated in Lemma \[lem2\] below: any other reduction that can occur as an alternative to an inert reduction is still possible after the occurrence of the inert reduction. \[def:cool-rel\] Let $\equiv\!\Rrightarrow$ be the smallest relation on ${\mathcal{P}}_{{{\rm a\pi}}}$ such that 1. $(v)(\bar vy | {P}| v(z).{Q}) \equiv\!\Rrightarrow {P}|({Q}{\{\mathord{\raisebox{2pt}[0pt]{$y$}\!/\!z}\}})$, 2. if ${P}\equiv\!\Rrightarrow {Q}$ then ${P}|R \equiv\!\Rrightarrow {Q}|R$, 3. if ${P}\equiv\!\Rrightarrow {Q}$ then $(w) {P}\equiv\!\Rrightarrow (w) {Q}$, 4. if ${P}{\mathrel{\equiv}}{P}' \equiv\!\Rrightarrow {Q}' {\mathrel{\equiv}}{Q}$ then ${P}\equiv\!\Rrightarrow {Q}$, where $v \not\in {\mathrm{fn}}({P}) \cup {\mathrm{fn}}({Q}{\{\mathord{\raisebox{2pt}[0pt]{$y$}\!/\!z}\}})$. First of all observe that whenever two processes are related by $\equiv\!\Rrightarrow$, an actual reduction takes place. \[lem1\] If $P \equiv\!\Rrightarrow Q$ then $P \longmapsto Q$. As its proof shows, the conclusion of Lemma \[operational completeness\] can be restated as ${\mbox{\bbb [}S\mbox{\bbb ]}} \longmapsto\equiv\!\Rrightarrow\equiv\!\Rrightarrow {\mbox{\bbb [}S'\mbox{\bbb ]}}$. Likewise, the two occurrences of $\longmapsto$ at the end of the proof of Lemma \[lem6\] can be replaced by $\equiv\!\Rrightarrow$: \[inert\] In the conclusion of Lemma \[lem6\], ${T}\Longmapsto {\mbox{\bbb [}S'\mbox{\bbb ]}}$ can be restated as ${T}\equiv\!\Rrightarrow\equiv\!\Rrightarrow {\mbox{\bbb [}S'\mbox{\bbb ]}}$. \[lem2\] If $P \equiv\!\Rrightarrow Q$ and $P \longmapsto P'$ with $P'\not{\mathrel{\equiv}}Q$ then there is a $Q'$ with $Q \longmapsto Q'$ and $P' \equiv\!\Rrightarrow Q'$. By Lemma \[red1\] there are $\tilde w \subseteq{\mathcal{N}}$, $x,y,z\in\mathcal{N}$ and $R,{U}\in{\mathcal{P}}_{{{\rm a\pi}}}$ such that ${U}$ plain, $\tilde w \subseteq {\mathrm{fn}}((\bar x y | x(z) . R) | {U})$ and $P \mathbin{{\mathrel{\equiv}}} P_0 \mathbin{:=} (\tilde w)((\bar x y | x(z) . R) | {U}) \mathbin{\longmapsto} (\tilde w)(( \bm{0} | R{\{\mathord{\raisebox{2pt}[0pt]{$y$}\!/\!z}\}}) | {U}) \mathbin{{\mathrel{\equiv}}} P'\!$. Likewise, there are $\tilde q \subseteq{\mathcal{N}}$, $x',y',z'\in\mathcal{N}$ and $R',{U}'\in{\mathcal{P}}_{{{\rm a\pi}}}$ such that ${U}'$ plain, $\tilde q \subseteq {\mathrm{fn}}((\bar x' y' | x'(z') . R') | {U}' )$ and $P \mathbin{{\mathrel{\equiv}}} P_1 \mathbin{:=} (\tilde q)((\bar x' y' | x'(z') . R') | {U}' ) \mathbin{\longmapsto} (\tilde q)(( \bm{0} | R'{\{\mathord{\raisebox{2pt}[0pt]{$y'$}\!/\!z'}\}}) | {U}' ) {\mathrel{\equiv}}Q$. So $(\tilde w)(( \bm{0} | R{\{\mathord{\raisebox{2pt}[0pt]{$y$}\!/\!z}\}}) | {U}) \longmapsfrom P_0 {\mathrel{\equiv}}P_1 \longmapsto (\tilde q)(R'{\{\mathord{\raisebox{2pt}[0pt]{$y'$}\!/\!z'}\}} | {U}' )$. As in the proof of Lemma \[red2\], all applications of rule [\[0pt\]\[0pt\][$\scriptstyle\stackrel{\leftarrow}{(4)}$]{}]{} in the sequence of reductions $P_0 {\mathrel{\equiv}}P_1$ can be moved to the right and shifted over the $\longmapsto$. Likewise, all applications of rule [\[0pt\]\[0pt\][$\scriptstyle{(4)}$]{}]{} can be moved to the left and shifted over the $\longmapsfrom$. Therefore, I may assume that $P_0 {\mathrel{\equiv_{\mathrm{S}}}}P_1$. Let $\sigma$ be the injective renaming that exists by Observation \[sigma\]. Then $(\bar x y | x(z) . R) | {U}{\mathrel{\equiv_{\mathrm{S}}}}((\bar x' y' | x'(z') . R') | {U}')\sigma$. Let $u:=\sigma(x')$, $v:=\sigma(y')$, $r:=\sigma(z')$, $R'':=R\sigma$ and ${U}'':={U}\sigma$. Then $(\bar x y | x(z) . R) | {U}{\mathrel{\equiv_{\mathrm{S}}}}(\bar u v | u(r) . R'') | {U}''$. In a reduction step of the form $P \equiv\!\Rrightarrow Q$, the reacting prefixes $\bar a b$ and $a(c).{V}$ are always found in the scope of a restriction operator $(a)$, and without a $!$ between $(a)$ and $\bar a b$ or $a(c).{V}$, such that in this scope there are no other unguarded occurrences of prefixes $\bar a d$ or $a(e).{W}$. This follows by a trivial induction on the definition of $\equiv\!\Rrightarrow$. In particular, this property is preserved when applying structural congruence to $P$. Consequently, the plain term ${U}''$ has no parallel components of the form $\bar u y''$ or $u(z'').R'''$. Case 1: $x=u$. Then, by the above, $(z)R {\mathrel{\equiv_{\mathrm{S}}}}(r)R''$, $y=v$ and ${U}{\mathrel{\equiv_{\mathrm{S}}}}{U}''$. Consequently, $P' {\mathrel{\equiv}}Q$. Case 2: $x\neq u$. Then $\bar u v$ and $u(r) . R''$ (up to ${\mathrel{\equiv_{\mathrm{S}}}}$) must be parallel components of ${U}$, and $\bar x y$ and $x(z) . R$ (up to ${\mathrel{\equiv_{\mathrm{S}}}}$) must be parallel components of ${U}''$, so that $P {\mathrel{\equiv}}P_0 = (\tilde w)((\bar x y | x(z) . R) | (\bar u v | u(r) . R'') | {V})$, where ${U}{\mathrel{\equiv_{\mathrm{S}}}}(\bar u v | u(r) . R'') | {V}$ and ${U}'' {\mathrel{\equiv_{\mathrm{S}}}}(\bar x y | x(z) . R) | {V}$. This shows that the reductions $P \equiv\!\Rrightarrow Q$ and $P \longmapsto P'$ are concurrent, so that there is a $Q'$ with $Q \longmapsto Q'$ and $P' \equiv\!\Rrightarrow Q'$. \[lem2 transitive\] If $P \equiv\!\Rrightarrow Q$ and $P \Longmapsto P'$ then either $Q\Longmapsto P'$ or there is a $Q'$ with $Q \Longmapsto Q'$ and $P' \equiv\!\Rrightarrow Q'$. Moreover, the sequence $Q\Longmapsto P'$ or $Q\Longmapsto Q'$ contains no more reduction steps than the sequence $P \Longmapsto Q'$. By repeated application of Lemma \[lem2\]. \[cor lem2 transitive\] If $P \equiv\!\Rrightarrow^* Q$ and $P \Longmapsto P'$ then there is a $Q'$ with $Q \Longmapsto Q'$ and $P' \equiv\!\Rrightarrow^* Q'$. Moreover, the sequence $Q\Longmapsto Q'$ contains no more reduction steps than the sequence $P \Longmapsto Q'$. By combining Corollary \[cor lem2 transitive\] with Observations \[lem1\] and \[inert\] one finds that the criterion of operational soundness is met. \[operational soundness\] Let $S \in {\mathcal{P}}_{{\pi}}$ and ${T}\in {\mathcal{P}}_{{{\rm a\pi}}}$. If ${\mbox{\bbb [}S\mbox{\bbb ]}} \Longmapsto {T}$ then there is a $S'$ with $S \Longmapsto S'$ and ${T}\Longmapsto {\mbox{\bbb [}S'\mbox{\bbb ]}}$. By induction on the length $n$ of the sequence${\mbox{\bbb [}S\mbox{\bbb ]}} \Longmapsto {T}$. The base case $n\mathbin=0$ is trivial: take $S':=S$. So let ${\mbox{\bbb [}S\mbox{\bbb ]}} \longmapsto {T}_1 \Longmapsto {T}$, where ${T}_1 \Longmapsto {T}$ has length $n$. By Lemma \[lem6\] with Observation \[inert\] $\exists S_1$ with $S \longmapsto S_1$ and ${T}_1\equiv\!\Rrightarrow^* {\mbox{\bbb [}S_1\mbox{\bbb ]}}$. By Corollary \[cor lem2 transitive\] $\exists {T}'$ with ${\mbox{\bbb [}S_1\mbox{\bbb ]}} \Longmapsto {T}'$ and ${T}\equiv\!\Rrightarrow^* {T}'$. Furthermore, the sequence ${\mbox{\bbb [}S_1\mbox{\bbb ]}} \Longmapsto {T}'$ has length $\leq n$. By induction, there is a $S'$ with $S_1 \mathbin{\Longmapsto} S'$ and ${T}'\Longmapsto {\mbox{\bbb [}S'\mbox{\bbb ]}}$. Hence $S \Longmapsto S'$ and ${T}\Longmapsto {\mbox{\bbb [}S'\mbox{\bbb ]}}$, using Observation \[lem1\]. Divergence reflection --------------------- \[divergence\] If $P \equiv\!\Rrightarrow Q$ and $P \longmapsto^\omega$ then $Q \longmapsto^\omega$. By repeated application of Lemma \[lem2\]. Together with Observation \[inert\] this implies that the criterion of divergence reflection is met. Let $S \in {\mathcal{P}}_{{\pi}}$. If ${\mbox{\bbb [}S\mbox{\bbb ]}} \longmapsto^\omega$ then $S \longmapsto^\omega$. Suppose ${\mbox{\bbb [}S\mbox{\bbb ]}} \longmapsto^\omega$. Then ${\mbox{\bbb [}S\mbox{\bbb ]}} \longmapsto {T}_1 \longmapsto^\omega$. By Lemma \[lem6\] with Observation \[inert\] there is an $S_1$ with $S \mathbin{\longmapsto} S_1$ and ${T}_1\mathbin{\equiv\!\Rrightarrow^*} {\mbox{\bbb [}S_1\mbox{\bbb ]}}$. By Corollary \[divergence\] ${\mbox{\bbb [}S_1\mbox{\bbb ]}} \longmapsto^\omega$. In the same way there is an $S_2$ with $S_1 \mathbin{\longmapsto} S_2$ and ${\mbox{\bbb [}S_2\mbox{\bbb ]}} \longmapsto^\omega$, and so on. Thus $S \longmapsto^\omega$. Success sensitiveness {#success} --------------------- The success predicate $\downarrow$ can also be defined inductively: $${\surd{\downarrow}} \qquad \frac{{P{\downarrow}}}{{(P|Q){\downarrow}}} \qquad \frac{{Q{\downarrow}}}{{(P|Q){\downarrow}}} \qquad \frac{{P{\downarrow}}}{{(({}z)P){\downarrow}}} \qquad \frac{{P{\downarrow}}}{{(!P){\downarrow}}}$$ Note that if $P {\mathrel{\equiv}}Q$ and $P{\downarrow}$ then also $Q{\downarrow}$. \[barbs\] Let $S \in {\mathcal{P}}_{{\pi}}$. Then ${\mbox{\bbb [}S\mbox{\bbb ]}}{\downarrow}$ iff $S{\downarrow}$. A trivial structural induction. \[barb confluence\] If ${T}\longmapsto {T}'$ and ${T}{\downarrow}$ then ${T}'{\downarrow}$. By Lemma \[red1\] there are $\tilde w \subseteq{\mathcal{N}}$, $x,{u},{r}\mathbin\in\mathcal{N}$ and $R,{U}\mathbin\in{\mathcal{P}}_{{{\rm a\pi}}}$ with ${U}$ plain, such that $\tilde w \subseteq {\mathrm{fn}}((\bar x {u}| x({r}) . R) | {U})$ and ${T}\mathbin{{\mathrel{\equiv}}} (\tilde w)((\bar x {u}| x({r}) . R) | {U}) \mathbin{\longmapsto} (\tilde w)(( \bm{0} | R{\{\mathord{\raisebox{2pt}[0pt]{${u}$}\!/\!{r}}\}}) | {U}) \mathbin{{\mathrel{\equiv}}} {T}'$. Since ${T}{\downarrow}$, it must be that ${U}{\downarrow}$ and hence ${T}'{\downarrow}$. By combining Lemmata \[barbs\] and \[barb confluence\] with Lemma \[operational completeness\] and Theorem \[operational soundness\] one finds that also the criterion of success sensitiveness is met. Let $S \in {\mathcal{P}}_{{\pi}}$. Then $S{\Downarrow}$ iff ${\mbox{\bbb [}S\mbox{\bbb ]}}{\Downarrow}$. Suppose that $S{\Downarrow}$. Then $S \Longmapsto S'$ for a process $S'$ with $S'{\downarrow}$. By Lemma \[operational completeness\] ${\mbox{\bbb [}S\mbox{\bbb ]}} \Longmapsto {\mbox{\bbb [}S'\mbox{\bbb ]}}$. By Lemma \[barbs\] ${\mbox{\bbb [}S'\mbox{\bbb ]}}{\downarrow}$. Hence ${\mbox{\bbb [}S\mbox{\bbb ]}}{\Downarrow}$. Now suppose ${\mbox{\bbb [}S\mbox{\bbb ]}}{\Downarrow}$. Then ${\mbox{\bbb [}S\mbox{\bbb ]}} \Longmapsto {T}$ for a process ${T}$ with ${T}{\downarrow}$. By Theorem \[operational soundness\] there is a $S'$ with $S \Longmapsto S'$ and ${T}\Longmapsto {\mbox{\bbb [}S'\mbox{\bbb ]}}$. By Lemma \[barb confluence\] ${\mbox{\bbb [}S'\mbox{\bbb ]}}{\downarrow}$. By Lemma \[barbs\] $S'{\downarrow}$. Hence $S{\Downarrow}$. Validity of Honda & Tokoro’s encoding {#sec:validHT} ===================================== That the encoding of Honda & Tokoro also satisfies all five criteria of Gorla follows in the same way. I will only show the steps where a difference with the previous sections occurs. In this section ${\mbox{\bbb [}\cdot\mbox{\bbb ]}}$ stands for ${\mbox{\bbb [}\cdot\mbox{\bbb ]}}_{\rm HT}$. \[operational completeness HT\] Let $S,S' \mathbin\in {\mathcal{P}}_{{\pi}}$. If $S \longmapsto S'$ then ${\mbox{\bbb [}S\mbox{\bbb ]}} \Longmapsto {\mbox{\bbb [}S'\mbox{\bbb ]}}$. By induction on the derivation of $S \longmapsto S'$. - Let $S\mathbin=\bar xy.P | x(z).Q$, $y\mathbin{\notin}{\mathrm{bn}}(Q)$ and $S'\mathbin=P|Q{\{\mathord{\raisebox{2pt}[0pt]{$y$}\!/\!z}\}}$. Pick $u\notin{\mathrm{fn}}(P)\cup{\mathrm{fn}}(Q)\cup\{x,y\}$. Then $$\begin{array}{@{}rcl@{}}{\mbox{\bbb [}S\mbox{\bbb ]}} &=& x(u).(\bar{u}y | {\mbox{\bbb [}P\mbox{\bbb ]}}) ~|~ (u)(\bar{x}u | u(z).{\mbox{\bbb [}Q\mbox{\bbb ]}})\\ &\longmapsto& (u)\big(\bar{u}y | {\mbox{\bbb [}P\mbox{\bbb ]}} ~|~ u(z).{\mbox{\bbb [}Q\mbox{\bbb ]}}\big)\\ &\longmapsto& {\mbox{\bbb [}P\mbox{\bbb ]}} ~|~ ({\mbox{\bbb [}Q\mbox{\bbb ]}}{\{\mathord{\raisebox{2pt}[0pt]{$y$}\!/\!z}\}})\\ &=& {\mbox{\bbb [}P\mbox{\bbb ]}} ~|~ {\mbox{\bbb [}Q{\{\mathord{\raisebox{2pt}[0pt]{$y$}\!/\!z}\}}\mbox{\bbb ]}} \quad~~~\mbox{(using Lemma~\ref{sbst})}\\ &=& {\mbox{\bbb [}P ~|~ Q{\{\mathord{\raisebox{2pt}[0pt]{$y$}\!/\!z}\}}\mbox{\bbb ]}} = {\mbox{\bbb [}S'\mbox{\bbb ]}}. \end{array}$$ Here structural congruence is applied in omitting parallel components $\bm{0}$ and the empty binders $(u)$. - The other three cases proceed as in the proof of Lemma \[operational completeness\]. \[red3HT\] If ${\mbox{\bbb [}S\mbox{\bbb ]}}{\mathrel{\equiv_{\mathrm{S}}}}(\tilde w)({U}| \bar x {u}| x({r}) . R )$ with $S\mathbin\in{\mathcal{P}}_{{\pi}}$, ${U}$ plain and $\tilde w \subseteq {\mathrm{fn}}({U}| \bar x {u}| x({r}) . R )$, then there are terms ${V},R_1,R_2\mathbin\in{\mathcal{P}}_{{\pi}}$, ${W}\mathbin\in{\mathcal{P}}_{{\rm a\pi}}$, and names $y,z\mathbin\in\mathcal{N}$ and [$\tilde s, \tilde t \subseteq {\mathcal{N}}$]{} such that $S {\mathrel{\equiv_{\mathrm{S}}}}(\tilde s)({V}\mid \bar x y . R_1 \mid x(z) . R_2)$, $\tilde w = \tilde s \uplus \tilde t \uplus \{u\}$,${U}{\mathrel{\equiv_{\mathrm{S}}}}{W}|{u}(z).{\mbox{\bbb [}R_2\mbox{\bbb ]}}$, $u\mathbin{\notin}{\mathrm{fn}}({\mbox{\bbb [}R_2\mbox{\bbb ]}}){\setminus}\{z\}$, ${\mbox{\bbb [}{V}\mbox{\bbb ]}}{\mathrel{\equiv_{\mathrm{S}}}}(\tilde t){W}$, $r \neq y$, $R {\mathrel{\equiv_{\mathrm{S}}}}\bar{r}y | {\mbox{\bbb [}R_1\mbox{\bbb ]}}$ and $r\mathbin{\notin}{\mathrm{fn}}({\mbox{\bbb [}R_1\mbox{\bbb ]}})$. The first two paragraphs proceed exactly as in the proof of Lemma \[red3\]. Each $q\in\tilde q$ is a renaming of the name $u$ in a term ${\mbox{\bbb [}P_i\mbox{\bbb ]}} = {\mbox{\bbb [}x(z).Q\mbox{\bbb ]}} = (u)(\bar{x}u | u(z).{\mbox{\bbb [}Q\mbox{\bbb ]}})$, so that $q \in{\mathrm{fn}}(P)$. The next two paragraphs proceed exactly as in the proof of Lemma \[red3\]. One of the $P_i\sigma'$ must be of the form $x (z).R_2$, so that ${\mbox{\bbb [}P_i\mbox{\bbb ]}}\sigma' = {\mbox{\bbb [}P_i\sigma'\mbox{\bbb ]}} = {\mbox{\bbb [}x (z).R_2\mbox{\bbb ]}}=(u')(\bar{x}u' | u'(z).{\mbox{\bbb [}R_2\mbox{\bbb ]}})$ with $u'\notin{\mathrm{fn}}(R_2){\setminus}\{z\}\cup\{x\}$, while $u'$ and $z$ are renamed into $u$ and $z'$ in $Q_i = (u)(\bar{x}u | u(z').R'_2)$, where $(z')R_2' \mathbin{\equiv_{(8),(9)}} (z){\mbox{\bbb [}R_2\mbox{\bbb ]}}$. For this is the only way $\bar{x}u$ can end up as a parallel component of $P\sigma$. It follows that $u \notin {\mathrm{fn}}(R_2){\setminus}\{z\}$ and $u\in\sigma(\tilde q)$. Let $\tilde t := \sigma(\tilde q) \setminus u$. One obtains $\tilde w = \tilde s \uplus \tilde t \uplus \{u\}$. Searching for an explanation of the parallel component $x({r}) . R $ (up to ${\mathrel{\equiv_{\mathrm{S}}}}$) of $P\sigma$, the existence of the component $\bar x u$ of $P\sigma$ excludes the possibility that one of the $P_i\sigma'$ is of the form $t'(r')\!.R_1$ so that ${\mbox{\bbb [}P_i\mbox{\bbb ]}}\sigma' {=} (u')(\bar{t}'u' | u'(r').{\mbox{\bbb [}R_1\mbox{\bbb ]}})$, while $u'$ is renamed into $x$ and $r'$ into $r$ in the expression $Q_i = (u')(\bar{t}'x | x(r).R'_1)$. Hence one of the $P_i\sigma'$ is of the form $\bar xy.R_1$, so that ${\mbox{\bbb [}P_i\mbox{\bbb ]}}\sigma' \mathbin= {\mbox{\bbb [}P_i\sigma'\mbox{\bbb ]}} \mathbin= {\mbox{\bbb [}\bar xy.R_1\mbox{\bbb ]}}\mathbin=x(r').(\bar r'y|{\mbox{\bbb [}R_1\mbox{\bbb ]}})$ with $r'\mathbin{\notin}{\mathrm{fn}}(R_1)\cup\{x,y\}$, while $r'$ is renamed into $r$ in $Q_i = x(r).(\bar ry|{\mbox{\bbb [}R_1\mbox{\bbb ]}})$. Thus $r\notin{\mathrm{fn}}(R_1)$ and $r\neq y$. Further, $R\mathbin{{\mathrel{\equiv_{\mathrm{S}}}}} (\bar ry|{\mbox{\bbb [}R_1\mbox{\bbb ]}})$. Let ${V}$ collect all parallel components $P_i\sigma'$ other than the above discussed components $\bar x y.R_1$ and $x(z).R_2$. Then $S{\mathrel{\equiv_{\mathrm{S}}}}S''{\mathrel{\equiv_{\mathrm{S}}}}(\tilde s)({V}~|~ \bar x y.R_1 ~|~ x(z).R_2)$. One has $(\tilde w)({U}| \bar x {u}| x({r}) . R ) {\mathrel{\equiv_{\mathrm{S}}}}{\mbox{\bbb [}S\mbox{\bbb ]}} {\mathrel{\equiv_{\mathrm{S}}}}{\mbox{\bbb [}S''\mbox{\bbb ]}} {\mathrel{\equiv_{\mathrm{S}}}}\\ {\mbox{\bbb [}(\tilde s)({V}~|~ \bar x y.R_1 ~|~ x(z).R_2)\mbox{\bbb ]}} =\\ (\tilde s)({\mbox{\bbb [}{V}\mbox{\bbb ]}} ~|~ x(r').(\bar r'y|{\mbox{\bbb [}R_1\mbox{\bbb ]}}) ~|~ (u')(\bar{x}u' | u'(z).{\mbox{\bbb [}R_2\mbox{\bbb ]}}) ) \equiv_{(8),(9)} (\tilde s)({T}~|~ x({r}) . R ~|~ (u)(\bar{x}u | u(z).{\mbox{\bbb [}R_2\mbox{\bbb ]}}) ) \equiv_{(1),(2),(7)} \\ (\tilde s)(u)({T}~|~ \bar{x}u | u(z).{\mbox{\bbb [}R_2\mbox{\bbb ]}} ~|~ x({r}) . R ) \equiv_{(2),(7)} \\ (\tilde s)(u)(\tilde t)({W}~|~ u(z).{\mbox{\bbb [}R_2\mbox{\bbb ]}} ~|~ \bar{x}u ~|~ x({r}) . R )$.\ Here ${T}$ is the parallel composition of all components $Q_i$ obtained by renaming of the parallel components $P_i\sigma'$ of ${\mbox{\bbb [}{V}\mbox{\bbb ]}}$, and $(\tilde t){W}$ with ${W}$ plain is obtained from ${T}$ by rules $\scriptstyle(2),(7)$. So ${U}~|~ \bar x {u}~|~ x({r}) . R {\mathrel{\equiv_{\mathrm{S}}}}{W}~|~ u(z).{\mbox{\bbb [}R_2\mbox{\bbb ]}} ~|~ \bar{x}u ~|~ x({r}) . R$ by Observation \[sigma\]. It follows that ${U}{\mathrel{\equiv_{\mathrm{S}}}}{W}~|~ u(z).{\mbox{\bbb [}R_2\mbox{\bbb ]}}$. \[lem6HT\] Let $S \in {\mathcal{P}}_{{\pi}}$ and ${T}\in {\mathcal{P}}_{{{\rm a\pi}}}$. If ${\mbox{\bbb [}S\mbox{\bbb ]}} \longmapsto {T}$ then there is a $S'$ with $S \longmapsto S'$ and ${T}\Longmapsto {\mbox{\bbb [}S'\mbox{\bbb ]}}$. The first paragraph proceeds as in the proof of Lemma \[lem6\], but incorporating the conclusion of Lemma \[red3HT\] instead of Lemma \[red3\]. Again, one finds, for all $t\mathbin\in \tilde t$, that $t,u\notin{\mathrm{fn}}({V}) \cup \{x,y\} \cup {\mathrm{fn}}(R_1)\cup({\mathrm{fn}}(R_2)\setminus\{z\})$. Take $S':= (\tilde s)({V}~|~ R_1 ~|~ R_2 {\{\mathord{\raisebox{2pt}[0pt]{$y$}\!/\!z}\}})$. Then $S\longmapsto S'$ and ${T}\mathbin{{\mathrel{\equiv}}} (\tilde w)({U}~|~R{\{\mathord{\raisebox{2pt}[0pt]{$u$}\!/\!r}\}})\\ {\mathrel{\equiv}}(\tilde w)\big({W}|{u}(z).{\mbox{\bbb [}R_2\mbox{\bbb ]}} ~|~ \bar{r}y | {\mbox{\bbb [}R_1\mbox{\bbb ]}}{\{\mathord{\raisebox{2pt}[0pt]{$u$}\!/\!r}\}}\big) \\ {\mathrel{\equiv}}(\tilde w)\big({W}|{u}(z).{\mbox{\bbb [}R_2\mbox{\bbb ]}} ~|~ \bar{u}y | {\mbox{\bbb [}R_1\mbox{\bbb ]}}\big) \\ \mbox{}\hfill (\mbox{\it since $r\mathbin{\neq} y $ and $r\notin{\mathrm{fn}}({\mbox{\bbb [}R_1\mbox{\bbb ]}})$})\\ {\mathrel{\equiv}}(\tilde s)(u)(\tilde t)\big({W}~|~{u}(z).{\mbox{\bbb [}R_2\mbox{\bbb ]}} ~|~ \bar{u}y | {\mbox{\bbb [}R_1\mbox{\bbb ]}}\big) \\ {\mathrel{\equiv}}(\tilde s)(u)\big((\tilde t){W}~|~ \bar{u}y | {\mbox{\bbb [}R_1\mbox{\bbb ]}} ~|~ {u}(z).{\mbox{\bbb [}R_2\mbox{\bbb ]}} \big) \\ \mbox{}\hfill (\mbox{\it since $t\mathbin{\notin}\{u,y\} \cup {\mathrm{fn}}({\mbox{\bbb [}R_1\mbox{\bbb ]}})\cup({\mathrm{fn}}({\mbox{\bbb [}R_2\mbox{\bbb ]}})\setminus \{z\})$ for $t\mathbin\in\tilde t$})\\ {\mathrel{\equiv}}(\tilde s)\big({\mbox{\bbb [}{V}\mbox{\bbb ]}}~|~(u){\color{red}\big(}\bar{u}y | {\mbox{\bbb [}R_1\mbox{\bbb ]}} ~|~ {u}(z).{\mbox{\bbb [}R_2\mbox{\bbb ]}} {\color{red}\big)}\big) \mbox{}\hfill (\mbox{\it as $u\notin{\mathrm{fn}}({\mbox{\bbb [}{V}\mbox{\bbb ]}})$})\\ \longmapsto (\tilde s)\big({\mbox{\bbb [}{V}\mbox{\bbb ]}} ~|~ {\mbox{\bbb [}R_1\mbox{\bbb ]}} ~|~ {\mbox{\bbb [}R_2\mbox{\bbb ]}}{\{\mathord{\raisebox{2pt}[0pt]{$y$}\!/\!z}\}} \big) \\ \mbox{}\hfill (\mbox{\it since $u\notin\{y\}\cup{\mathrm{fn}}({\mbox{\bbb [}R_1\mbox{\bbb ]}})\cup{\mathrm{fn}}({\mbox{\bbb [}R_2\mbox{\bbb ]}}){\setminus}\{z\}$})\\ = (\tilde s)\big({\mbox{\bbb [}{V}\mbox{\bbb ]}} ~|~ {\mbox{\bbb [}R_1\mbox{\bbb ]}} ~|~ {\mbox{\bbb [}R_2{\{\mathord{\raisebox{2pt}[0pt]{$y$}\!/\!z}\}}\mbox{\bbb ]}} \big) \hfill (\mbox{\it by Lemma~\ref{sbst}})\\ = {\mbox{\bbb [}S'\mbox{\bbb ]}}$. As its proof shows, the conclusion of Lemma \[operational completeness HT\] can be restated as ${\mbox{\bbb [}S\mbox{\bbb ]}} \longmapsto\equiv\!\Rrightarrow {\mbox{\bbb [}S'\mbox{\bbb ]}}$. The occurrence of $\longmapsto$ at the end of the proof of Lemma \[lem6HT\] can be replaced likewise: \[inertHT\] In the conclusion of Lemma \[lem6\], ${T}\Longmapsto {\mbox{\bbb [}S'\mbox{\bbb ]}}$ can be restated as ${T}\equiv\!\Rrightarrow {\mbox{\bbb [}S'\mbox{\bbb ]}}$. Conclusion {#sec:conclusion} ========== This paper proved the validity according to Gorla of the encodings proposed by Boudol and by Honda & Tokoro of the synchronous choice-free $\pi$-calculus into its asynchronous fragment; that is, both encodings enjoy the five correctness criteria of [@Gorla10a]. For such a result, easily believed to be “obvious”, the proofs are surprisingly complicated,[^2] and involve the new concept of an inert reduction. Yet, I conjecture that it is not possible to simplify the proofs in any meaningful way. Below I reflect on three of Gorla’s criteria in the light of the lessons learned from this case study. #### Compositionality Compositionality demands that for every $k$-ary operator ${\mathtt{op}}$ of the source language there is a $k$-ary context $C_{\mathtt{op}}^N[\__1;\dots;\__k]$ in the target such that $${\mbox{\bbb [}{\mathtt{op}}(S_1,\ldots,S_k)\mbox{\bbb ]}} = C_{\mathtt{op}}^N({\mbox{\bbb [}S_1\mbox{\bbb ]}};\ldots;{\mbox{\bbb [}S_k\mbox{\bbb ]}})$$ for all $S_1,\ldots,S_k\in\mathcal{P}_1$. A drawback of this criterion is that this context may depend on the set of names $N$ that occur free in the arguments $S_1,\ldots,S_k$. The present application shows that we cannot simply strengthen the criterion of compositionality by dropping the dependence on $N$. For then the present encodings would fail to be compositional. However, in [@vG12] a form of compositionality is proposed where $C_{\mathtt{op}}$ does not depend on $N$, but the main requirement is weakened to $${\mbox{\bbb [}{\mathtt{op}}(S_1,\ldots,S_k)\mbox{\bbb ]}} \stackrel\alpha= C_{\mathtt{op}}({\mbox{\bbb [}S_1\mbox{\bbb ]}};\ldots;{\mbox{\bbb [}S_k\mbox{\bbb ]}}).$$ Here $\stackrel\alpha=$ denotes equivalence up to *$\alpha$-conversion*, renaming of bound names and variables, here corresponding with rules $\scriptstyle{(8)}$ and $\scriptstyle{(9)}$ of structural congruence. This suffices to rescue the current encodings. It is an open question whether there are examples of intuitively valid encodings that essentially need the dependence of $N$ allowed by [@Gorla10a], i.e., where $C_{\mathtt{op}}^{N_1}$ and $C_{\mathtt{op}}^{N_2}$ differ by more than $\alpha$-conversion. Another method of dealing with the fresh names $u$ and $v$ that are used in the present encodings, also proposed in [@vG12], is to equip the target language with two fresh names that do not occur in the set of names available for the source language. Making the dependence on the choice of set ${\mathcal{N}}$ of names explicit, this method calls ${\pi}$ expressible into ${{\rm a\pi}}$ if for each ${\mathcal{N}}$ there exists an ${\mathcal{N}}'$ such that there is a valid encoding of $\pi({\mathcal{N}})$ into ${{\rm a\pi}}({\mathcal{N}}')$. #### Operational soundness Operational soundness stems from Nestmann & Pierce [@NestmannP00], who proposed two forms of it:\ $(\mathfrak{I})$if ${\mbox{\bbb [}S\mbox{\bbb ]}} \longmapsto_2 {T}$ then $\exists S'\!:$ $S\longmapsto_1 S'$ and ${T}\asymp_2 {\mbox{\bbb [}S'\mbox{\bbb ]}}$.  \ $(\mathfrak{S})$if ${\mbox{\bbb [}S\mbox{\bbb ]}} \Longmapsto_2 {T}$ then $\exists S'\!:$ $S\Longmapsto_1 S'$ and ${T}\Longmapsto_2{\mbox{\bbb [}S'\mbox{\bbb ]}}$.\ The version of Gorla is the common weakening of these:\ $(\mathfrak{G})$if ${\mbox{\bbb [}S\mbox{\bbb ]}} \mathbin{\Longmapsto_2} {T}$ then $\exists S'\!:\!S\mathbin{\Longmapsto_1} S'$ and ${T}\Longmapsto_2\asymp_2{\mbox{\bbb [}S'\mbox{\bbb ]}}$.\ An interesting intermediate form is\ $(\mathfrak{W})$if ${\mbox{\bbb [}S\mbox{\bbb ]}} \Longmapsto_2 {T}$ then $\exists S'\!:$ $S\Longmapsto_1 S'$ and ${T}\asymp_2 {\mbox{\bbb [}S'\mbox{\bbb ]}}$.  \ Nestmann & Pierce observed that “nonprompt encodings”, that “allow administrative (or book-keeping) steps to precede a committing step”, “do not satisfy $(\mathfrak{I})$”. For such encodings, which include the ones studied here, they proposed $(\mathfrak{S})$. As I have shown, the encodings of Boudol and of Honda & Tokoro, satisfy not only $(\mathfrak{G})$ but even $(\mathfrak{S})$. It remains an interesting open question whether they satisfy $(\mathfrak{W})$. Clearly, they do not when taking $\asymp_2$ to be the identity relation—as I did here—or structural congruence. However, it is conceivable that $(\mathfrak{W})$ holds for another reasonable choice of $\asymp_2$. (An unreasonable choice, such as the universal relation, tells us nothing.) #### Success sensitivity My treatment of success sensitivity differs slightly from the one of Gorla [@Gorla10a]. Gorla requires $\surd$ to be a constant of any two languages whose expressiveness is compared. Strictly speaking, this does not allow his framework to be applied to the encodings of Boudol or Honda & Tokoro, as these deal with languages not featuring $\surd$. Here I simply allowed $\surd$ to be added, which is in line with the way Gorla’s framework has been used [@Gorla10b; @LPSS10; @PSN11; @PN12; @PNG13; @GW14; @EPTCS160.4; @EPTCS189.9; @GWL16]. A consequence of this decision is that I have to specify how $\surd$ is translated—see the last sentence of Definition \[df:valid\]—as the addition of $\surd$ to both languages happens after a translation is proposed. This differs from [@Gorla10a], where it is explicitly allowed to take ${\mbox{\bbb [}\surd\mbox{\bbb ]}} \neq \surd$. Gorla’s success predicate is one of the possible ways to provide source and target languages with a set of *barbs* $\Omega$, each being a unary predicate on processes. For $\omega \in \Omega$, write $P{\downarrow_\omega}$ if process $P$ has the barb $\omega$, and $P{\Downarrow_\omega}$ if $P\Longmapsto P'$ for a process $P'$ with $P'{\downarrow_\omega}$. The standard criterion of barb sensitivity is then $S{\Downarrow_\omega} \Leftrightarrow {\mbox{\bbb [}S\mbox{\bbb ]}}{\Downarrow_\omega}$ for all $\omega\in\Omega$. A traditional choice of barb in the $\pi$-calculus is to take $\Omega=\{x,\bar x \mid x\mathbin\in{\mathcal{N}}\}$, writing $P{\downarrow_x}$, resp. $P{\downarrow_{\bar x}}$, when $x\mathbin\in{\mathrm{fn}}(P)$ and $P$ has an unguarded occurrence of a subterm $x(z).R$, resp. $\bar xy.R$ [@SW01book]. The philosophy behind the asynchronous $\pi$-calculus entails that input actions $x(z)$ are not directly observable (while output actions can be observed by means of a matching input of the observer). This leads to semantic identifications like ${\mathbf{0}}= x(y).\bar xy$, for in both cases the environment may observe $\bar x z$ only if it supplied $\bar x z$ itself first. Yet, these processes differ on their input barbs ($\downarrow_x$). For this reason, in $\rm a\pi$ normally only output barbs ${\downarrow_{\bar x}}$ are considered [@SW01book]. Boudol’s encoding satisfies the criterion of output barb sensitivity (and in fact also input barb sensitivity). However, the encoding of Honda & Tokoro does not, as it swaps input and output barbs. As such, it is an excellent example of the benefit of the external barb $\surd$. Validity up to a semantic equivalence {#validity-up-to-a-semantic-equivalence .unnumbered} ------------------------------------- In [@vG12] a compositional encoding is called *valid up to* a semantic equivalence ${\sim} \subseteq {\mathcal{P}}\times {\mathcal{P}}$ if ${\mbox{\bbb [}P\mbox{\bbb ]}} \sim P$ for all $P\in{\mathcal{P}}$.[^3] A given encoding may be valid up to a coarse equivalence, and invalid up to a finer one. The equivalence for which it is valid is then a measure of the quality of the encoding. Combining the results of the current paper with those of [@EPTCS190.4] shows that the encodings of Boudol and Honda & Tokoro are valid up to reduction-based *success respecting coupled similarity* ($\textit{CS}^\surd$). Earlier, [@CC01] established that Boudol’s encoding is valid up to *may testing* [@DH84] and *fair testing equivalence* [@BRV95; @NC95]—both results now follow from the validity up to [\[0pt\]\[0pt\][$\textit{CS}^\surd$]{}]{}. On the other hand, [@CC01] also shows that Boudol’s encoding is not valid up to a form of *must testing*; in [@CCP07] this result is strengthened to pertain to any encoding of ${\pi}$ into ${{\rm a\pi}}$. An interesting open question is whether the encodings of Boudol and Honda & Tokoro are valid up to reduction-based *success respecting weak bisimilarity* or *weak barbed bisimilarity*. In [@QW00], a polyadic version of Boudol’s encoding is assumed to be valid up to the version of weak barbed bisimilarity that uses output barbs only; see Lemma 17. Yet, as no proof is provided, the question remains open. #### Acknowledgement Fruitful feedback from Stephan Mennicke and from IPL referees is gratefully acknowledged. [^1]: Gorla defines the latter concept only for languages that are equipped with a notion of *structural congruence* $\equiv$ as well as a parallel composition $|$. In that case $P$ has a top-level unguarded occurrence of $\surd$ iff $P\equiv Q|\surd$, for some $Q$ [@Gorla10a]. Specialised to the $\pi$-calculus, a *(top-level) unguarded* occurrence is one that not lays strictly within a subterm $\alpha.Q$, where $\alpha$ is $\tau$, $\bar xy$ or $x(z)$. For De Simone languages [@dS85], even when not equipped with $\equiv$ and $|$, a suitable notion of an unguarded occurrence is defined in [@Va93copy]. [^2]: The complications lay chiefly with proving operational soundness; for some of the other criteria the proofs are straightforward. [^3]: [@vG12] distinguishes between a process term and its meaning or denotation, $\sim$ being defined on the denotations. Here, in line with [@Gorla10a] and most other related work, I collapse syntax and semantics by only considering process terms without process variables, taking the denotation of a term to be itself (up to $\alpha$-conversion).
Loosely related to dragons, leliyn are found exclusively in warm, dry areas with lots of trees, where they spend most of their time clinging to tree trunks and threatening passersby. At night, the blue stripes on their otherwise dull scales glow with bioluminescence, an effect which also applies to their frills and the insides of their mouths. When threatened, leliyn extend their frills and open their mouths, and if this display doesn't work, they can spit a thick black poison that burns anything it comes in contact with. Leliyn are not considered a good Keep companion for this reason, but when raised from an egg they are often great protectors for explorers and magi who generally just want to be left alone. Their distinctive run - where they raise up onto their hind legs - makes them easy to spot even at a distance, but can be quite frightening when they're running towards someone instead of away. Egg This rough brown egg is decorated with delicate glowing lines of blue. Hatchling Leliyn hatchlings are independent from the moment they free themselves from their egg, capable of both flaring their frill and of spitting poison, though it isn't as potent as when they're adults. Fortunately, leliyn are also quite intelligent and easily understand the concept of magi as friends; it's just a matter of whether or not they choose to believe it. Magi generally don't keep more than two leliyn together - one male and one female - because they are aggressively territorial even as hatchlings and will battle each other. Magi raising hatchlings should ensure they have a place to climb to avoid any potential predators, or may just find the leliyn hatchling climbing them instead. Adult Adult leliyn are generally confident and aggressive creatures, always ready for a fight if someone or something provokes them. However, their first step is always to try and scare off an enemy with the use of their frill and loud hissing, before they resort to using poison. They can often be found sunning themselves on large tree branches, or clinging to the trunk so they can scan the ground for a meal. Although generally antisocial, those raised by magi seem to enjoy being scratched under their chins. During the mating season, males can often be seen dancing and head-bobbing, their frills opening and closing in rhythm. Those who have studied or raised leliyn know that it's never a good idea to under-estimate them; they're intelligent and have been known to pointedly destroy a magi's possessions with poison if that magi has annoyed them. Notes Obtained from: Donation, Retired Breeding: Yes Renaming cost: 20000 gold Release date: July 15th 2017 Breeds with the following:
https://magistream.com/bestiary.php?page=800
25 August, 2020Prof. Carlos Duarte on COVID-19 ecosystem rebound Following a call by President Tony Chan for KAUST PIs to contribute through their research capabilities to alleviate the COVID-19 pandemic, efforts coordinated by Donal Bradley, KAUST vice president for research, and Pierre Magistretti, KAUST dean of the Biological and Environmental Science and Engineering division, mobilized a group of faculty to form the Rapid Research Response Team (R3T). 20 May, 2020These vast hidden forests under the sea could help save Earth “There is no silver bullet for solving climate change—there’s no single solution that is going to meet the targets laid out by the Paris Agreement. So we need to stack a number of solutions. And each of them will have a contribution toward the goal,” says Professor Carlos Duarte. 07 April, 2020Marine life can be rebuilt by 2050 An international study recently published in the journal Nature that was led by KAUST Professors of Marine Science Carlos Duarte and Susana Agustí lays out the roadmap of actions required for the planet's marine life to recover to full abundance by 2050. The project brings together the world's leading marine scientists working across four continents, in 10 countries and from 16 universities, including KAUST, Aarhus University, MIT, Colorado State University, Boston University, Pontificia Universidad Catolica de Chile, Sorbonne Université, James Cook University, The University of Queensland, Dalhousie University and the University of York. 10 February, 2020Professor Carlos M. Duarte receives award for research in ecology and conservation On February 4, the University announced that Carlos M. Duarte, KAUST professor of marine science and the Tarek Ahmed Juffali research chair in Red Sea ecology, received a Frontiers of Knowledge Award for Ecology and Conservation Biology from BBVA Foundation in Spain. 30 January, 2019Tarek Ahmed Juffali Workshop: The Ocean Soundscape Of The Anthropocene CONVENOR: Prof. Carlos Duarte CO-CONVENOR: Mr. Francis Juanes DATE: January 30, 2019 TIME: 3 pm – 5 pm LOCATION: Auditorium (level 0) between Buildings 2 & 3 30 April, 2017Marine Invasive Species Workshop “Quantifying the effects of exotic species on marine ecosystems” is a Ahmed Juffali Research Chair workshop to be run at KAUST from April 30th to May 4th, with Drs Catherine Lovelock, Nuria Marba, Just Cebrian, Paulina Martinetto, Scott Bennett and Julia Santana-Garzon as guest scientists. 21 April, 2016Professor Carlos M. Duarte wins EGU medal The European Geosciences Union (EGU) recently honored KAUST Professor of Marine Science Carlos M. Duarte with the award of the 2016 Vladimir Ivanovich Vernadsky Medal. The medal was established by EGU's Division on Biogeosciences in recognition of the scientific achievements of Vladimir Ivanovich Vernadsky, a Russian and Ukrainian scientist considered to be one of the founders of biogeochemistry, geochemistry and radiogeology. The medal is awarded to scientists in honor of their outstanding contributions to the biogeosciences. 01 April, 2016PhD candidate Hanan Almahasheer won the second place for a poster award The conference was held at Qatar University in the Research Complex on Wednesday and Thursday 24-25 February 2016, in conjunction with Qatar National Environment Day 2016 and the Annual Meeting of the SETAC-AGB (Society of Environment Toxicology and Chemistry - Arabian Gulf Branch). 15 March, 2016Tarek Ahmed Juffali Workshop “Tropical marine ecosystems in a high-CO2 world” “Tropical marine habitats in a high CO2 world” a Ahmed Juffali Research Chair workshop to be run March 15, 2:00- 5:00 pm, with Dr. Jean Pierre Gattuso as guest scientist 05 February, 2016Seagrass and Mangrove Red Sea survey Seagrass and Mangrove Red Sea survey to take off on board R/V Thuwal in late February to explore these, largely ignored, habitats in the Red Sea 22 January, 2016Workshops for RSRC students and early career scientists: Professional Development workshop for RSRC M.Sc. and Ph.D. students Professional Development workshop for RSRC M.Sc. and Ph.D. students (visiting students and interns welcomed!) 07 January, 2016Global Change in Marine Ecosystems: Implications for Semi-enclosed Arabian Seas Prof. Carlos M. Duarte delivered the opening keynote speech at the Qatar University Life Science Symposium on “Global changes: The Arabian Gulf Ecosystem“ 07 December, 2015Prof. Carlos M. Duarte presented at COP21 as part of the KAUST delegation at the GCC Prof. Carlos M. Duarte presented at COP21, as part of the KAUST delegation supporting the side events organized by KSA at the GCC Pavillion in COP21, on the potential of coastal vegetated habitats to support climate change mitigation and adaptation through “Blue Carbon” strategies. Prof. Duarte also described the research on impacts of climate change on Red Sea biota through an overview of research conducted at the Red Sea Research Center at KAUST, using a large touchscreen as support. 07 December, 2015Prof. Carlos M. Duarte leads research topics launched, for the first time in a coordinated manner across a range of journals The 2015 Paris Climate Conference (COP21), is poised to lead a shift in focus in climate change research from an emphasis on the scientific test of the role of human activity, already consolidated into strong evidence, to a focus on solutions to prepare society to adapt and mitigate the consequences of a warming planet, where knowledge is urgently needed. 19 October, 2015Workshop Marine Megafauna Movement Exploring new technologies for a better understanding of animal movement across the ocean 04 September, 2015Frontiers Science Hero: Carlos M. Duarte Prof. Carlos Duarte is the Field Chief Editor of Frontiers in Marine Science.
https://tajrc.kaust.edu.sa/news
How to annotate a poem 1. They usually have less lines than a story. How to Read and Interpret A Poem Teaching literature My favorite thing to annotate is poems. How to annotate a poem examples. Underline key words and use the margins to make brief comments. Write any questions in the margins that pop into your head while doing the initial reading. Annotation helps you to quickly. If you are not sure about a word’s meaning, look it up in a dictionary and write a definition between the lines of the poem. How to read a poem read the poem carefully several times. As you annotate, make sure you include descriptions of the text as well as your own reactions to the content or author. Begin by reading the poem. Write the definitions on the poem. 5 important steps to annotate a poem. Do an initial reading of the poem. Discover and mark rhyme scheme using a new letter for each end rhyme within the poem. Pay attention to the title—at some point, make a connection between the A short poem may be a stylistic choice or it may be that you have said what you intended to say in a more concise way. Read the poem and retell it as best i can. Fire and ice by robert frost. Hand a white board marker to a student and instruct him or her to identify the rhyme scheme. To annotate a poem is to analyze and understand it better. Another way to annotate is by making notes of what you don't know. Sometimes breaking down the prefix/suffix can help. These tips show you how to analyse exam questions, structure essays and write in an appropriate style. Read the poem aloud at least once. Look up definitions of any words that you do not know. Ensure that your students are not simply labelling the examples, but also consider why the author chose to use this device or what it does to enhance the poem. Discover and mark rhyme scheme using a new letter for each end rhyme within the poem. Go over the instructions for annotating a poem. Here is how i approach annotating a poem: I’m just getting the lay of the land. In addition to annotating written text, at times you will have assignments to annotate media (e.g., videos, images or other media). Annotating a reading assignment involves writing highlights, questions, summaries and comments in the margins of the piece or otherwise marking important information. Eating poetry by mark strand. I owe it all to this lesson plan: And it wasn’t until i taught students how to annotate a poem that i really learned how to do both in conjunction. Write any questions that pop into your head while doing the initial reading. For the annotation of media assignments in this class, you will cite and comment on a minimum of three (3) statements, facts, examples, research or any combination of those from the notes you take about selected media. These annotations were computer generated, as this annotation process was originally submitted for a course assignment. Steps to annotate a poem 1. Either way, they differ stylistically from a long poem in that there tends to be more care in word choice. Mood or theme of a poem. Today i will use the following poem as an example and walk you through the steps i take to annotate a poem. This penlighten article tells you how to annotate a poem step by step, with the help of an example. When annotating a poem, you must ask and answer several questions, such as identifying the speaker and discovering the poem’s purpose. Since there are fewer words people tend to spend more time on choosing a word that fits the subject to perfection. Annotation is the act of adding notes. Initial reading of the poem. Figure 1 shows the printed poem with annotations. Instruct students to annotate the poem they copied down. Recreate the poem in writing. Read the poem a couple of times without doing anything. Annotations are not just a summary of what is going on, but also an examination of the tone, speaker, language, imagery, symbolism or other characteristics. So here’s what i do when i annotate: To annotate a poem, start by reading through the poem once without writing anything down so you have an idea of how it makes you feel. In fact, use any white space. Pay special attention the allusions, proper names, archaic words, regional terms, etc. Some examples of these may include metaphor, simile, imagery, personification, hyperbole, oxymoron, allusion, alliteration, etc. Guaranteed 🙂 read or share popular poems by famous, modern and amateur poets This list of new poems is composed of the works of modern poets of poetrysoup. Take the time to look up the word and write down the definition in the margin. Then, mark important words or phrases with a highlighter pen during your second reading. It involves reading the poem to identify the writing style, rhyme scheme, figures of speech, the poem's true meaning, and its interpretations. We have the perfect poem for you! Don't forget, you could also annotate on sticky notes if you have pages you can't write on. Writing your response to a poem, or making comparisons between two poems, takes careful planning. Read short, long, best, and famous examples for annotated. For example, you could highlight lines that are repeated, or a memorable piece of imagery. 14 years of work, 8000+ popular poems to express your heartfelt feelings. Read this poem to discuss the meaning beyond the literal words on the page. Circle important language devices and explain their significance in the margins. This is when i start to write. Identify any words that you do not understand and look them up. Steps to annotate a poem. A well annotated poem will provide you with all the tools you need to write a great analysis of any poem and once you’ve got the hang of your technique, you’ll be able to do it quickly. Read our examples of annotated bibliography article to see additional examples and learn more about formatting. There is a lot of things that you can cover while annotating. Give them five minutes to come up with as much as they can. Here is an example of my annotations for “sonnet 75” by edmund spenser. There will be parts that don’t make sense, but i’ll leave them alone for now. Frost doesn’t hold back with this poem, an ideal one for discussion and debate. Students won’t soon forget this poem, both for the story and the sensory details. Write the definitions on the poem. Identify and underline any words you do not understand and look them up. But tell a deeper story.
https://unugtp.is/how-to-annotate-a-poem-examples/
Spaceflight boosts bacterial deadliness Microgravity increases virulence of Salmonella in space. It sounds like a plot device from a cheap science-fiction novel: bacteria that travel into space come back to Earth deadlier than before. But that's what an international team of researchers found when they looked at the bacterium Salmonella typhimurium grown aboard last year's Atlantis mission: it came back more virulent than controls kept on Earth. Its trip into space made the pathogen three times more potent — the dose required to kill 50% of mice in a study population was a third that of controls. Researchers aren't clear about exactly how or why this happens, but they suspect that the reduced liquid flow around bacterial cultures in low gravity may be to blame. "The space-flight environment imparts a signal that can induce molecular changes in bacterial cells," write Cheryl Nickerson and her colleagues in a paper published in Proceedings of the National Academy of Sciences USA this week1. The result could explain some curious observations from space missions so far. How it will affect the design of future missions is as yet unclear. And whether space flight would make any and all bacteria more virulent — or less so — is unknown. Down to Earth Earlier ground-based studies, in which bacteria were kept neutrally buoyant in liquid to simulate low-gravity conditions, showed that virulence can be boosted. But there was doubt as to whether the 'gravity' effects in these experiments were what caused the result. "It was very important to show that what was simulated on the ground occurs in space too," says study author Jörg Vogel, a researcher at the Max Planck Institute for Infection Biology in Berlin. To test this, the research team grew tubes of Salmonella aboard Atlantis for 24 hours. Control samples on the ground were grown for the same duration in identical conditions as those on the shuttle — except for gravity. Analysis back on Earth showed that the space travellers were different from the controls in the expression levels of 167 genes, and amounts of 73 proteins. A particular protein called Hfq — which is known to regulate RNA and have a role in bacterial virulence down on Earth - may be responsible for the increased potency, the researchers suggest. Christophe Lasseur, who helps the European Space Agency to plan for life-support on manned missions, says some previous space missions have reported greater problems with bacteria — such as corrosion in the craft — than had been expected. This led to speculation that space flight changes bacteria, possibly through their increased exposure to radiation. The new work is the first clear evidence that bacteria can be affected by space conditions. "It's a very good paper," says Lasseur. "We had some idea that the virulence could be increased but there was no evidence." Fluid flow Nickerson, a microbiologist at Arizona State University in Tempe, thinks the change could be brought about by a reduction in 'fluid shear' — the movement of liquid around the bacteria. Previous microgravity studies on Earth with low shear have also increased Salmonella virulence, she says2. Nickerson says the effects of fluid sheer have generally been neglected in Earth-based experiments, in part due to the difficulty of changing it. "A lot of our knowledge has come from testing cells at extremes," she says. "It's exciting that this research can help crew stay healthy as they push the boundaries of manned space flight. What's equally exciting is the potential this research holds to improve health on Earth." As for health in space, Jacob Cohen, who looks at future manned explorations of space for NASA in Washington DC, says it is unclear how big an impact this study will have on astronauts. "We haven't seen any increased virulence effect on the crew," he says. "Further study needs to be done to see how these changes might affect an actual mission." "Space flight at the moment is rare for human beings," notes Vogel. "Looking 20 years ahead, I think about the companies that are going to offer flights for tourists; we'll have tonnes of people flying to space. Those people will inevitably carry lots of bacteria. We don't know how these bacteria will behave in those conditions." References - Wilson, J. W. et al. Proc. Natl Acad. Sci. USA doi/10.1073/pnas.0707155104 (2007). - Nickerson, C., et al. Microbiol. Mol. Biol. Rev. 68, 345-361 (2004). News Need Assistance? If you need help or have a question please use the links below to help resolve your problem.
https://www.bioedonline.org/news/nature-news-archive/spaceflight-boosts-bacterial-deadliness/
Scientists’ inability to replicate research findings using mice and rats has contributed to mounting concern over the reliability of such studies. Now, an international team of pain researchers led by scientists at McGill University in Montreal may have uncovered one important factor behind this vexing problem: the gender of the experimenters has a big impact on the stress levels of rodents, which are widely used in preclinical studies. In research published online April 28 in Nature Methods, the scientists report that the presence of male experimenters produced a stress response in mice and rats equivalent to that caused by restraining the rodents for 15 minutes in a tube or forcing them to swim for three minutes. This stress-induced reaction made mice and rats of both sexes less sensitive to pain. Female experimenters produced no such effects. “Scientists whisper to each other at conferences that their rodent research subjects appear to be aware of their presence, and that this might affect the results of experiments, but this has never been directly demonstrated until now,” says Jeffrey Mogil, a psychology professor at McGill and senior author of the paper. The research team, which included pain experts from Haverford College and the Karolinska Institutet in Sweden and a chemosensory expert from Université de Montreal, found that the effect of male experimenters on the rodents’ stress levels was due to smell. This was shown by placing cotton T shirts, worn the previous night by male or female experimenters, alongside the mice; the effects were identical to those caused by the presence of the experimenters, themselves. Further experiments proved that the effects were caused by chemosignals, or pheromones, that men secrete from the armpit at higher concentrations than women. These chemosignals signal to rodents the presence of nearby male animals. (All mammals share the same chemosignals). These effects are not limited to pain. The researchers found that other behavioural assays sensitive to stress were affected by male but not female experimenters or T-shirts. “Our findings suggest that one major reason for lack of replication of animal studies is the gender of the experimenter – a factor that’s not currently stated in the methods sections of published papers,” says Robert Sorge, a psychology professor at the University of Alabama, Birmingham. Sorge led the study as a postdoctoral fellow at McGill.
https://scienceblog.com/72014/the-scent-of-a-man-makes-lab-mice-nervous/
Immunity publishes research articles and reviews in the entire discipline of immunology and all systems that contribute to, or interact with, the immune system of the organism. Trends in Immunology plays an essential role in monitoring advances in the various fields of immunology, bringing together the results in a readable and lucid form. The backbone of each issue is a series of succinct reviews and hypothesis-driven viewpoints. Together with the other sections of the magazine they give the reader a complete picture of the diverse field of immunology. Cell Host & Microbe was launched in March 2007. The journal's mission is to provide a forum for the exchange of ideas and concepts between scientists studying the microbe with those studying the host immune, cell biological, and molecular response upon colonization or infection by a microbe. Cancer Cell publishes reports of novel results in any area of cancer research, from molecular and cellular biology to clinical oncology. Cell Systems is a broad, multidisciplinary monthly journal for outstanding research that provides, supports, or applies systems-level understanding in the life sciences and related disciplines. Manuscripts describing novel discoveries, milestone achievements, broadly useful tools or resources, or insights into the use of technology may all be appropriate. Quantitative integrative studies that reveal general principles of systems are particularly welcome. The journal’s scope includes systems at all scales—from molecules, pathways, cells, and tissues to whole organisms, populations, and ecosystems—and a diversity of traditional disciplines, including but not limited to microbiology, cancer, immunology, plant biology, computational biology, genomics, proteomics, translational medicine, digital healthcare, biological engineering, and systems and synthetic biology. In addition to peer-reviewed research, Cell Systems publishes Reviews, Previews, and Commentaries covering research topics and broader societal issues related to the scope of the journal. Through services that rise to the challenges inherent in quantitative system-scale studies, the journal aims to publish and facilitate research for our communities of readers and authors. Cell Metabolism publishes reports of novel results in any area of metabolic biology, from molecular and cellular biology to translational studies. The unifying theme is homeostatic mechanisms in health and disease, from simpler model systems all the way to the clinic. Published work should not only be of exceptional significance within its field, but also of interest to researchers outside the immediate area. Cell Metabolism also provides expert analysis and commentary on key findings in the field. The journal's mission is to provide a forum for the exchange of ideas and concepts across the entire metabolic research community, cultivating new areas and fostering cross-disciplinary collaborations in basic research and clinical investigation. Trends in Microbiology provides a multidisciplinary forum for the discussion of all aspects of microbiology: from cell biology and immunology to genetics and evolution, and ranges across virology, bacteriology, protozoology and mycology. Trends in Cancer is a new member of the Trends review journals, offering concise and engaging expert commentary articles that address key frontline research topics and cutting-edge advances in the rapidly changing field of cancer discovery and medicine. Cell publishes findings of unusual significance in any area of experimental biology, including but not limited to cell biology, molecular biology, neuroscience, immunology, virology and microbiology, cancer, human genetics, systems biology, signaling, and disease mechanisms and therapeutics. The basic criterion for considering papers is whether the results provide significant conceptual advances into, or raise provocative questions and hypotheses regarding, an interesting and important biological question. In addition to primary research articles in four formats, Cell features review and opinion articles on recent research advances and issues of interest to its broad readership in the Leading Edge section. Cell Reports is an open access journal from Cell Press and publishes high-quality papers across the life sciences spectrum that provide new biological insight. We publish thought-provoking, cutting-edge research in a variety of formats, including short-form Reports as well as longer-form Articles and Resources. Cell Reports is staffed with a team of passionate in-house editors who work closely with authors, reviewers, and the journal’s editorial board. http://www.cell.com/cell-reports/current iScience publishes basic and applied research that advances a specific field across life, physical, and earth sciences. It's an open access journal with continuous publication, so research is immediately accessible. Our no-nonsense approach to submissions is simple, fast, and fair, and our commitment to integrity means we publish transparent methods, replication studies, and negative results.
http://www.cell-symposia.com/next-gen-immunology-2018/conference-supporting-journal.asp
these intricate necklaces are created from found and ordinary everyday materials mixed and collaged together with objects such as zippers, safety pins, paperclips, chain, hinges, beads, sequins, fabric, brass tubing, and brass ball chain. each piece is different from any other style, materials were chosen based on the specific color palette. about 22 inches long ~this style in particular is more simplified than the other collaged bar necklaces and does not have a fabric zipper or hanging side components~ Reviews There are no reviews yet.
https://www.hurjewelry.com/product/collage-arc-necklace/
Workshop – weaving memory stories Zest Communities: Thanet, run by brightshadow, is a 6 month programme of arts workshops and cultural experiences for people living with dementia and their carers. Participants were invited to bring one or two memory items of their choice, in order to facilitate the making and sharing. They could think about a piece of fabric – clothing, bed or table linen, a book, a piece of writing or music, a photo, anything with a special story for them. A pre-cut acetate ‘memory mat’ was given to each participant. A range of memory materials were provided – fabrics, paper, books, music scores and maps, from which strips were taken for weaving into the mat. The variety of fabrics – silk, wool, lace as well as embroidery threads and ribbons, plus the range of books – Shakespeare, poetry, cookery, sewing and dressmaking, home furnishings, cookery, gardens and birds, plus music – Beethoven, Gilbert and Sullivan, newspapers, magazines and maps… stimulated sharing of stories and generated lots of fun in the making. It was in the making that a lot of the sharing took place. Despite a random selection on my part of the choice of materials,participants of the workshop managed to find their own stories amongst the large pile of old and used ‘things’. The person’s favourite play, violin music, her nursing past, his travels – perhaps not whole stories, but important fragments were pieced together. In weaving the individual mats into one large piece, I was able to see so clearly the connections between the mother and her daughter, between another person and his carer friend. The weaving also draws together the memories of the whole group, some seemingly not connected to each other. The individual stories become one bigger story.
http://anniehocooper.co.uk/zest-communities-thanet/
Banks, building societies and credit unions have made significant efforts to maintain essential services for their customers during the coronavirus (Covid-19) crisis. As restrictions start to ease, firms will begin to re-open branches and increase the range of services available. The UK government has produced guidance to help ensure workplaces are as safe as possible when people return to work. This is an update to our previous statement of 25 March 2020, and sets out our expectations of firms as they reinstate services in line with this guidance, and gives advice for consumers who may need access to bank branch services. We do not expect banking services to fully return to normal immediately, and there may be further adjustments required depending on the public health situation. Firms need to follow the relevant guidance from the government and the devolved administrations. This will mean continuing to balance the needs of their customers with the safety and welfare of their staff. Firms should continue to consider the needs of their most vulnerable customers who may struggle to access essential services, particularly if they are self-isolating. Essential services for these customers may include access to cash, telephone banking and the ability to make in-person payments through third parties. Priorities for firms Firms continue to handle large numbers of coronavirus-related enquiries from customers, for example, repayment holidays and applications for business interruption loans. Alongside this, they are protecting their staff by implementing social distancing measures and testing key workers for coronavirus. We have been working closely with firms to help them move towards reinstating services for customers in a consistent way. Our expectation is that they will prioritise several areas, including: - Continuing to ensure essential services are available for the most vulnerable customers and expand capacity where possible. As part of this, firms will proactively contact these customers to make sure they know about the services they offer for those self-isolating, and how they can contact their bank if they do not have access to online banking. - Where possible, and in line with relevant government guidelines, reinstating access to cash and essential services in local areas which have lost access to bank branches or cash during the crisis. - Where it is not possible to reinstate access, and in areas where a reduced service remains, ensuring that there is clear communication to customers through websites and physical signs at branches to signpost to alternatives, such as Post Office services. We are working closely with firms and will continue to monitor the situation to ensure they are taking consistent approaches and communicating clearly with their customers. Advice for consumers Consumers should continue to use alternatives to branches where possible, for example, online banking. However, we know there will be consumers (including vulnerable consumers) who need to access bank branch services, such as accessing cash or making in-person payments. Consumers should contact their banking provider if they need to access services in this way. Our expectation is that firms will provide them with further information and help on the options available to them.
https://www.fca.org.uk/news/statements/banks-building-societies-credit-unions%E2%80%93branch-access-essential-services-update
Fred Perry was formed in 1952 by the British tennis legend of the same name and has gone on to influence and introduce some of the most iconic styles of the last century. The brand's Laurel Wreath has become an enduring symbol of style and culture. DETAILS:crew neck t-shirt which comes in a navy colourway, embroidered branding on the chest, Contrasting light blue pin stripes, ribbed neck line and tonal stitching throughout to complete.
http://www.pebblemistpups.com/unique-men-fred-perry-double-stripe-tshirt-navy-f69j97-p-900.html
- Prep: - 10 minutes - Cook: - 10 minutes - Serves: - 4 This blackberry infused grilled cheese may become your favorite upgrade to this lunchtime classic. Ingredients Directions - Heat a sauce pot on medium heat, add 1 tablespoon of olive oil, onions, season with salt and pepper. Sauté until they become soft and brown. Continue cooking on medium heat (about 8 minutes). - In the same sauce pot with onions; add balsamic vinegar and blackberries. Crush berries with a fork then reduce to about half, stirring frequently with the browned onions to blend flavors together. Remove and let cool. - Season chicken breast with salt and pepper. Heat a large sauce pan on medium high heat, add 2 tablespoons of olive oil and sear chicken breast on both sides until done. Remove from pan and set aside. - Heat a clean large skillet or a Panini press over medium heat. - Begin to assemble sandwiches by laying a slice of provolone cheese on one bread slice and a slice of Muenster cheese on the other slice of bread. Add a layer of blackberries, top with fresh basil, cooked chicken breast and top with the other slice of bread and cheese. - Brush Olive oil on the skillet or Panini Press and place sandwich on the surface. Press sandwiches onto the heated surfaces slowly so bread becomes golden and the cheese melts. - Remove from heat, slice sandwich and serve immediately with a Nature’s Place Organic spring mix salad.
https://www.foodlion.com/recipes/blackberry-chicken-grilled-cheese-panini/
Digital solutions are already being rolled out in pharma R&D and pharmacovigilance, but the regulatory process remains largely manual and time consuming, with slow adoption of innovative digital approaches. However, new solutions are being developed to facilitate digital transformation in the regulatory environment. The combination of smarter working processes and proper use of innovative technologies will drive efficiencies in regulatory submissions while keeping high standards of quality and compliance. Ultimately this could translate into time and resource savings for marketing authorisations and post-marketing requirements that will revolutionise the regulatory environment. Regulatory affairs is often perceived as traditionally conservative, with a heavily manual workload requiring human input for many repetitive tasks during operations. Companies providing regulatory software solutions have been driven by the needs of these manual processes, focusing on the simplification of manual tasks and supporting the human user. Few companies use one provider for an end-to-end solution; instead there are often multiple providers for the different, and in some cases the same, aspects of regulatory operations, little standardisation, and vendors competing for new features to attract clients. Within the technical landscape, this makes standardisation a challenge. Systems and processes have evolved over many years but have not really been reviewed for their ongoing applicability, and certainly not on a widespread level. This slow-moving technical landscape struggles to adapt to the exploding number of new legislations, rules and guidelines, and their increasing global complexity, bringing greater challenges for those submitting and reviewing applications. Nevertheless, there are basic standards available, driven, for example, by the International Council for Harmonisation of Technical Requirements for Pharmaceuticals for Human Use (ICH) or International Organisation for Standardisation (ISO), which can be considered first steps into the digital world. While the ICH eCTD [electronic Common Technical Document] standard reflects the paper-based approach, heavily relying on unstructured information, the proposed ISO IDMP [Identification of Medicinal Products] standard is already one step further ahead, providing structure to much of the data within a standardised model. There are, however, some initiatives to improve the regulatory process for users. For example, the European Medicines Agency (EMA) was one of the first authorities to implement a rigorous and systematic Information Management Strategy in December 2015, with a view to harmonising data and definitions with controlled vocabularies. The strategy included master data standards that would allow seamless transmission between committees within an authority, as well as between regulators worldwide. As part of this, the EMA is implementing regulations developed by the ISO that cover the IDMP. It is expected that these standards will become the foundation of regulatory submissions not only in the EU, but also in the US and in further regions worldwide. Despite all the enthusiasm for new digital solutions, the goal for any regulatory affairs efforts should not be forgotten: ensuring the approval of products that are safer and more effective than in the past. Digital transformation can be a trigger for innovative approaches, but at the end it can only be successful through dialogue and collaboration between industry, software vendors and regulators. To date, within regulatory operations, digital solutions have evolved slowly. However, companies are starting to review and revise their technology landscape with increasing pace, for example by creating automated interfaces or introducing a master data management strategy; this enables different systems to start using the same vocabularies and applying the same standards. Advanced techniques providing significant opportunities include natural language processing (NLP) and robotic process automation (RPA). For example, information from certain documents, such as SmPCs [Summaries of Product Characteristics], but also quality documents (CTD Module 3), can be read and extracted by software and used for regulatory databases and further processing. Furthermore, software can now screen regulatory authorities’ sites and alert users to changes in regulatory requirements. It is expected that more advanced systems can at least partly understand content and classify changes according to defined structures. Clearly, such regulatory intelligence allows companies to better meet regulators’ requirements and accelerate approvals, the rewards of which can be substantial. When implementing new technology, it is important not to fall in to the trap of finding a solution looking for a problem; some challenges are best solved with existing technologies, while others rely on completely new approaches. Digital systems that use NLP to understand, interpret and manipulate human language could ‘read’ the hundreds of thousands of pages of written information in a regulatory document. Already, automated systems can extract information from regulatory documents and classify – or even ‘understand’ to some extent – the data, and enter them into regulatory information management systems. Automated processes can also transfer information between systems to connect silos. Insights can be offered from regulatory intelligence solutions, for example by analysing large, unstructured data sets across multiple health authorities and identifying changes in regulatory requirements using big data techniques, with NLP to bring added value. This can be supported by a regulatory intelligence platform that screens and categorises changing requirements, applying the results to the regulatory planning and submission process. More sophisticated NLP – which can understand semantics – could support automated dossier compilation and hyperlinking, creation and maintenance of summary documents and prepare overview tables. Indeed, vendors are developing new ways to harmonise and automate document authoring, dossier publishing as well as the entire submission process. Ultimately, digital transformation is about supporting people, optimising and enhancing processes and technology and finally influencing the way they work. This can be a trigger to rethink existing process and realign for greater efficiency, but this does not necessarily mean eliminating human input; rather, it is about allowing the experts to focus on the tasks that make the most of ‘human intelligence’. Inevitably, implementing new processes will always necessitate change management, with the associated challenges and opportunities. R&D and pharmacovigilance are already embracing the use of innovative technologies, including artificial intelligence, to improve work practices. Adoption in regulatory affairs has been slower and there is a long way to go. Before any new technology is introduced, it must demonstrate a return on investment and in regulatory, unlike in drug development and safety, this can sometimes seem a challenge. The need to share data for standardisation and advancement in regulatory process can conflict with the desire to protect commercial interests and this can exacerbate these challenges. With the harmonisation initiatives already underway between regulatory bodies, and the lack of any conflict of interest, this is a natural place for the application of technology to streamline the process, with many benefits for industry and regulators alike in working towards common standards. Technology won’t revolutionise the regulatory industry overnight; there are too many challenges for this to be the case. Instead, small initiatives combining targeted use of digital solutions will show immediate value. Evolving in a stepwise manner, smart software solutions have the potential to facilitate higher quality and faster regulatory submissions, resulting in shorter time to market and allowing companies to realise the full clinical and commercial potential offered by their innovative medicines and devices. Our experience in developing next-generation systems has shown that innovative technology can both drive efficiencies and support decision-making through enhanced regulatory intelligence. As companies push the boundaries of technology, those working in the pharmaceutical sector must embrace the opportunities it offers. In the regulatory environment, digital transformation will ultimately empower, but never replace, the human factor. While the regulatory environment is very much at the start of its adoption of smarter solutions, we look forward to seeing these advances introduced more widely to drive faster approvals, reduced costs and greater patient choice. Timm Pauli is Senior Director, eSubmission Services, Head of Regulatory Operations, at PharmaLex. He has more than 15 years of experience in pharmaceutical R&D. He joined PharmaLex in 2014 and is responsible for all electronic submission activities, regulatory information management and related topics. He also consults on regulatory information management, IDMP-related topics and eCTD publishing systems. Prior to PharmaLex, Timm worked at Merck Serono and Baxter Healthcare. Rob Williams is Senior Director, Regulatory Informatics and Digital Technologies, at PharmaLex. He has two decades of experience in the development of enterprise web-based solutions for global organisations. He combines deep technical experience with business understanding and a client-focused approach. At PharmaLex he is responsible for driving the use innovative technologies to improve regulatory processes.
https://deep-dive.pharmaphorum.com/magazine/future-pharma-2018/digitally-transforming-pharmas-regulatory-processes/
For 3 registrations from the same entity, a standard 10% discount will apply. For over 4 registrations please contact us. Thursday 13/05/2021 - 09:00-15:00 In 2020 the European Banking Authority (EBA) issued the Guidelines on loan origination and monitoring (the guidelines) in response to the Council of the European Union’s Action Plan on tackling the high level of non-performing exposures. The objective of the guidelines is: The guidelines specify the internal governance arrangements, processes and mechanisms, as laid down in Article 74(1) of Directive 2013/36/EU (CRD) and further specified in the EBA Guidelines on internal governance, and requirements on credit and counterparty risk, as laid down in Article 79 of Directive 2013/36/EU in relation to the granting and monitoring of credit facilities throughout their life cycle. The EBA guidelines will apply from 30 June 2021. Furthermore, following the adoption of the Paris Agreement on climate change and the UN 2030 Agenda for Sustainable Development in 2015, governments are making strides to transition to low-carbon and more circular economies on a global scale. On the European front, the European Green Deal sets out the objective of making Europe the first climate-neutral continent by 2050. The financial sector is expected to play a key role in this respect, as enshrined in the Commission action plan on financing sustainable growth. Transitioning to a low-carbon and more circular economy entails both risks and opportunities for the economy and financial institutions, while physical damage caused by climate change and environmental degradation can have a significant impact on the real economy and the financial system. The ECB is closely following developments that are likely to affect euro area institutions. The Commission action plan on financing sustainable growth aims to redirect financial flows to sustainable investments, to mainstream sustainability in risk management and to enhance transparency and long-termism. Specifically for the banking sector, the European Banking Authority (EBA) was given several mandates to assess how environmental, social and governance (ESG) risks can be incorporated into the three pillars of prudential supervision. Since not all financing activities are likely to be equally affected by ESG risks, it is important that institutions and supervisors are able to distinguish and form a view on the relevance of ESG risks, following a proportionate, risk-based approach that takes into account the likelihood and the severity of the materialisation of ESG risks. Training Objectives By attending this programme participants will learn: Training Outline Training Style The course shall include the presentation and analysis of the regulatory framework providing practical examples. The programme is designed to deliver knowledge and enhance participants’ skills via practical examples. Participants will benefit from customised feedback at the end of the programme and take away the knowledge gained to be transferred at their workplace. CPD Recognition This programme may be approved for up to 5 CPD units in Law. Eligibility criteria and CPD Units are verified directly by your association, regulator or other bodies which you hold membership. Who Should Attend Dr. Christina Livada is currently working as a Special Legal Advisor at Alpha Bank in Greece, being responsible for regulatory issues and their implementation. Before her appointment, Christina has worked for seventeen years at the Hellenic Bank Association as a Special Legal Advisor, also responsible for the regulatory issues pertaining to banking, capital markets and consumer protection law. She has been member of the Corporate Governance working group of the Hellenic Corporate Governance Council for the review of the Greek Corporate Governance Code. She is also member of the Hellenic Association of Banking and Capital Markets Law. Her main fields of expertise are company law, corporate governance, banking and capital markets law, as well as consumer protection law. Furthermore, Christina has obtained her PhD from the Faculty of Law of the National and Kapodistrian University of Athens in 2004. Also, Christina is an Assistant Professor of Commercial Law at the Faculty of Law of the National and Kapodistrian University of Athens. She is the author of several known books and articles in the abovementioned fields.
https://eimf.eu/product/loan-origination-and-monitoring-esg-in-the-financial-sector/
The Construction (Design and Management) Regulations 2015 (CDM 2015) came into force from 6 April 2015 replacing the previous version CDM Regulations 2007. Principal Designer The main change in the CDM Regulations 2015 is the replacement of the CDM Co-ordinator role (created under CDM 2007) with the new Principal Designer (PD) role. The Principal Designer will be responsible for co-ordinating the pre-construction phase of the project. Although very similar to the role of a CDMC there are specific duties allocated to PD. Many designers find themselves challenged by a role that they do not fully understand and is not part of their normal duties and works. What we offer Here at Simple Safety Advice we can offer the role of independent Principal Designer or, as we are finding more often, we work in partnership with designers to provide them with the safety and construction support they require to fulfil their duties. Due to the new clients’ duties, both domestic and commercial, our advice and guidance is used by the whole team to ensure legal compliance. We offer a range of services to support the site from the outset of planning to completion and safety file including:- - Principal Designer – as PD we can offer an independent service that covers the client’s liabilities and legal requirements ensuring a project is set up in a way that ensures adequate safety standards and compliance - Construction Support Specialist – due to our extensive knowledge of the Construction Industry and training as safety providers, we are currently working in partnership with a range of designers using our expertise to address any safety concerns that are identified within a project - Designers’ Risks – We validate and work with designers to ensure they have addressed their legal duties in risk assessing a project and ensuring the right information is issued to the Principal Contractor - Validation of Principal Contractor’s documentation – part of our role either as PD or as a Construction Support Specialist is to ensure that the documentation issued by the various contractors is to the required standards - Construction Phase Plans – working with the contractor we can generate all the required paperwork or documented procedures they require to operate a safe site - Audit, Inspection, Site Support – Our Team conduct regular audits to ensure the upkeep of legal standards and work in partnership with the management team to assist in improving systems, standards and knowledge across the entire workforce. We can provide guidance on eg statutory inspections, permits to dig, crane lifts and other key areas that can be considered as high risk Our service is tailored to each project to make this cost effective and ensure that there are no unnecessary procedures or documentation generated. Our team ensures that the legal obligations are clearly defined and all those within the project are fully aware of their duties. When you undertake construction projects The new regulations govern the management of health, safety and welfare when undertaking construction projects, regardless of size, duration or nature of the work. Organisations or individuals can be one or more duty holder for a project. The main dutyholders are: - Clients (people for whom a construction project is carried out) - Domestic clients (people who have projects carried out on their own or family homes that is not part of a business) - Designers (people who as part of a business prepare/modify designs for a building/project) - Principal designers (designers appointed by the client in projects involving more than one contractor) - Principal contractors (contractors appointed by the client to co-ordinate the construction phase of a project where it involves more than one contractor) - Contractors (those who do the actual construction work and can be either an individual or a company) - Workers (the people who work for or under the control of contractors on the site) There are 5 key elements to securing Construction Health & Safety:- - Applying the principles of prevention in order to manage the risks - Appointing the right people at the right time to do specific jobs/tasks - Making sure everyone has the information, instruction, training and supervision they need to carry out their jobs safely - Dutyholders co-operating and communicating with each other and co-ordinating the works - Consulting with workers and engaging with them to promote and develop effective measures/strategies to secure their health, safety and welfare At Simple Safety Advice we will be able to help and advise you with regard to the new regulations and the changes it will mean for all our clients. We are able to offer a full service and support you with any construction project ensuring you comply with your duties and have safe working practices in place for yourself and all your team/clients. Those who break health & safety laws are liable for payment of “Fees for Intervention” by the HSE and the fines that you could incur far outweigh the cost and time that you would use our services to set up and run a project successfully. You cannot afford to miss out on your duties…… the construction industry is renowned for its construction-related accidents and ill-health. Do not become one of the statistics! If you are unsure or worried about any of these changes, just give us a call for some friendly and simple advice!
http://www.simplesafetyadvice.co.uk/index.php/cdm-regulations-2015/