content
stringlengths 0
1.88M
| url
stringlengths 0
5.28k
|
---|---|
---
abstract: 'We obtain an explicit determinantal formula for the multiplicity of any point on a classical Schubert variety.'
address:
- 'Department of Mathematics, University of Notre Dame, Notre Dame, Indiana 46556'
- 'Northeastern University, Department of Mathematics, Boston, MA 02115'
author:
- Joachim Rosenthal
- Andrei Zelevinsky
date: 'January 14, 1999'
title: Multiplicities of Points on Schubert Varieties in Grassmannians
---
[^1]
Main result
===========
An important invariant of a singular point on an algebraic variety $X$ is its *multiplicity*: the normalized leading coefficient of the Hilbert polynomial of the local ring. The main result of the present note is an explicit determinantal formula for the multiplicities of points on Schubert varieties in Grassmannians. This is a simplification of a formula obtained in [@ro86]. More recently, the recurrence relations for multiplicities of points on more general (partial) flag varieties were obtained in [@la95a; @la90a]. However, to the best of our knowledge the case of Grassmannians remains the only case for which an explicit formula for multiplicities is available.
Fix positive integers $d$ and $n$ with $0 \leq d \leq n$, and consider the Grassmannian $Gr_d (V)$ of $d$-dimensional subspaces in a $n$-dimensional vector space $V$ (over an algebraically closed field of arbitrary characteristic). Recall that Schubert varieties in $Gr_d (V)$ are parameterized by the set $I_{d,n}$ of integer vectors ${\mathbf{i}}= ( i_{1},\ldots ,i_{d})$ such that $1 \leq
i_{1} < \ldots <i_{d} \leq n$. For a given complete flag $\{ 0\}
= V_0 \subset V_{1} \subset \cdots \subset V_{n}= V$, the Schubert variety $X_{\mathbf{i}}$ is defined as follows: $$X_{\mathbf{i}}:= \{W \in Gr_d(V)\mid \dim (W \bigcap V_{i_{k}}) \geq k
\ \mbox{ for } k=1,\ldots ,d\} \ .$$ The Schubert cell $X_{\mathbf{i}}^0$ is an open subset in $X_{\mathbf{i}}$ given by $$X_{\mathbf{i}}^0 := \{ W \in X_{\mathbf{i}}\mid \dim (W \bigcap V_{i_{k}-1}) =
k-1 \mbox{ for } k=1,\ldots ,d\} \ .$$ It is well known that the Schubert variety $X_{\mathbf{i}}$ is the disjoint union of Schubert cells $X_{\mathbf{j}}^0$ for all ${\mathbf{j}}\leq {\mathbf{i}}$ in the componentwise partial order on $I_{d,n}$. The multiplicity of a point $x$ in $X_{\mathbf{i}}$ is constant on each Schubert cell $X_{\mathbf{j}}^0 \subset X_{\mathbf{i}}$, and we denote this multiplicity by $M_{\mathbf{j}}({\mathbf{i}})$.
Our main result is the following explicit formula for $M_{\mathbf{j}}({\mathbf{i}})$ (where the binomial coefficients ${a \choose b}$ are subject to the condition that ${a \choose b} = 0$ for $b < 0$):
\[main\] The multiplicity $M_{\mathbf{j}}({\mathbf{i}})$ of a point $x \in X_{\mathbf{j}}^0 \subset
X_{\mathbf{i}}$ is given by $$\label{main-form}
M_{\mathbf{j}}({\mathbf{i}})=(-1)^{s_1 + \cdots + s_d} \det \left[
\begin{array}{cccc}
{i_1\choose -s_1} & \ldots & \ldots& {i_d \choose -s_d}\\
{i_1\choose 1-s_1} & \ldots & \ldots& {i_d\choose 1-s_d}\\
\vdots & & & \vdots\\
{i_1\choose d-1-s_1} & \ldots & \ldots& {i_d\choose d-1-s_d}
\end{array}
\right] \ ,$$ where $$\label{sij}
s_q := \# \{ j_p \mid i_q < j_p\} \ .$$
The proof of Theorem \[main\] will be given in the next section. Although determinants of matrices formed by binomial coefficients were extensively studied by combinatorialists (see, e.g., [@GV]), the experts whom we consulted did not recognize the determinant in (\[main-form\]). We conclude this section by an example illustrating Theorem \[main\].
\[separated\_ij\] Assume the indices ${\mathbf{i}},{\mathbf{j}}$ satisfy $j_d \leq i_1$. In this situation the numbers $s_1,\ldots,s_d$ attain the smallest possible value: $s_1=\cdots=s_d=0$. Then the $(p,q)$-entry of the determinant in (\[main-form\]) has the form $P_p (i_q)$, where $P_p (t)$ is a polynomial with the leading term $t^{p-1}/(p-1)!$. It follows that $$M_{\mathbf{j}}({\mathbf{i}})= \frac{1}{1!\cdots (d-1)!}V({\mathbf{i}})=
\frac{1}{1!\cdots (d-1)!}\prod_{p>q}(i_p-i_q) \ ,$$ where $V({\mathbf{i}})$ is the Vandermonde determinant $\det
((i_q^{p-1}))$.
Proof of Theorem \[main\]
=========================
Fix two vectors ${\mathbf{j}}\leq {\mathbf{i}}$ from $I_{d,n}$, and let $$\deg ({\mathbf{j}},{\mathbf{i}}):= d-\# \{ i_q \mid i_q \in \{ j_1,\ldots,j_d\}\} \ .$$ For a nonnegative integer vector ${\mathbf{s}}= (s_1, \ldots, s_d)$, we set $$|{\mathbf{s}}|:=s_1+\cdots+s_d \ .$$ As shown in [@ro86] and [@la90a page 202], the multiplicity $M_{\mathbf{j}}({\mathbf{i}})$ satisfies the initial condition $M_{\mathbf{j}}({\mathbf{j}})=1$ and the partial difference equation $$\label{recu}
M_{\mathbf{j}}({\mathbf{i}})=\frac{1}{\deg ({\mathbf{j}},{\mathbf{i}})}\sum_{{\mathbf{k}}} M_{\mathbf{j}}({\mathbf{k}}) \ ,$$ where the sum is over all ${\mathbf{k}}\in I_{d,n}$ such that ${\mathbf{j}}\leq
{\mathbf{k}}< {\mathbf{i}}$, and $|{\mathbf{k}}|=|{\mathbf{i}}|-1$.
To prove[ ]{}, we proceed by induction on $|{\mathbf{i}}|$. The initial step is to verify[ ]{} for ${\mathbf{i}}= {\mathbf{j}}$. In this case the numbers $s_1,\ldots, s_d$ attain their maximum possible value: $s_q=d-q$. It follows that $$(-1)^{|{\mathbf{s}}|}\det\left[
\begin{array}{cccc}
0 & \ldots & 0 & 1\\
\vdots & & 1 & \ast\\
0 &{\raisebox{-1mm}{.}.\raisebox{1mm}{.}}& {\raisebox{-1mm}{.}.\raisebox{1mm}{.}}&\vdots \vspace{3mm}\\
1 & \ast & \ldots & \ast
\end{array}
\right] =1 = M_{\mathbf{j}}({\mathbf{j}})\ ,$$ as required.
For the inductive step, we introduce some notation. To any nonnegative integer vector ${\mathbf{s}}= (s_1, \ldots, s_d)$ we associate a polynomial $P_{\mathbf{s}}({\mathbf{t}}) \in {\mathbb{Q}}[{\mathbf{t}}] = {\mathbb{Q}}[t_1, \ldots, t_d]$ defined by $$\label{poly}
P_{\mathbf{s}}({\mathbf{t}})=(-1)^{|{\mathbf{s}}|} \det \left[
\begin{array}{cccc}
{t_1\choose -s_1} & \ldots & \ldots& {t_d \choose -s_d}\\
{t_1\choose 1-s_1} & \ldots & \ldots& {t_d\choose 1-s_d}\\
\vdots & & & \vdots\\
{t_1\choose d-1-s_1} & \ldots & \ldots& {t_d\choose d-1-s_d}
\end{array}
\right] \ ;$$ here ${t \choose s}$ is the polynomial $t(t-1) \cdots (t-s+1)/s!$ for $s \geq 0$, and ${t \choose s} = 0$ for $s < 0$. Thus our goal is to show that $M_{\mathbf{j}}({\mathbf{i}}) = P_{\mathbf{s}}({\mathbf{i}})$ with ${\mathbf{s}}$ given by (\[sij\]).
For $q = 1, \ldots, d$, let $\Delta_q : {\mathbb{Q}}[{\mathbf{t}}] \to {\mathbb{Q}}[{\mathbf{t}}]$ denote the partial difference operator $\Delta_q P ({\mathbf{t}}) = P({\mathbf{t}})
- P({\mathbf{t}}- e_q)$, where $e_1, \ldots, e_d$ are the unit vectors in ${\mathbb{Q}}^d$. Here is the key lemma.
\[dif\_Euler\] For any nonnegative integer vector ${\mathbf{s}}$, the corresponding polynomial $P_{\mathbf{s}}({\mathbf{t}})$ satisfies the partial difference equation $$\label{dif_eqn}
(\Delta_1 + \cdots + \Delta_d) P = 0 \ .$$
First notice that the Vandermonde determinant $V({\mathbf{t}}) =
\prod_{p>q}(t_p-t_q)$ satisfies (\[dif\_eqn\]) since it is a non-zero skew-symmetric polynomial of minimal possible degree, and the operator $\Delta_1 + \cdots + \Delta_d$ preserves the space of skew-symmetric polynomials. The vector space of solutions of (\[dif\_eqn\]) is also invariant under translations ${\mathbf{t}}\mapsto {\mathbf{t}}+ {\mathbf{k}}$ so it is enough to show that each $P_{\mathbf{s}}({\mathbf{t}})$ is a linear combination of polynomials $V({\mathbf{t}}+ {\mathbf{k}})$. Here is the desired expression: $$\label{main-form2}
P_{\mathbf{s}}({\mathbf{t}}) =
\frac{1}{1!\cdots (d-1)!}\sum_{0 \leq {\mathbf{k}}\leq {\mathbf{s}}}
(-1)^{|{\mathbf{k}}|}{s_1\choose k_1}\cdots {s_d\choose k_d}V({\mathbf{t}}+{\mathbf{k}})\ .$$ Let us prove (\[main-form2\]). The same argument as in Example \[separated\_ij\] above shows that $$\label{V-form}
\frac{1}{1!\cdots (d-1)!} V({\mathbf{t}}+{\mathbf{k}})=
\det \left[
\begin{array}{cccc}
{t_1+k_1\choose 0} & \ldots & \ldots& {t_d+k_d\choose 0}\\
{t_1+k_1\choose 1} & \ldots & \ldots& {t_d+k_d\choose 1}\\
\vdots & & & \vdots\\
{t_1+k_1\choose d-1} & \ldots & \ldots& {t_d+k_d\choose d-1}
\end{array}
\right] \ .$$ Substituting this expression into (\[main-form2\]) and performing the multiple summation, we see that the right hand side becomes the determinant of the $d \times d$ matrix whose $(p,q)$-entry is $$\sum_{k_q=0}^{s_q}(-1)^{k_q}{s_q\choose k_q}{t_q+k_q \choose p-1}=
(-1)^{s_q}{t_q\choose p-1-s_q}$$ (the last equality is a standard binomial identity). This completes the proof of (\[main-form2\]) and Lemma \[dif\_Euler\].
One last piece of preparation before performing the inductive step: the Pascal binomial identity ${t \choose s} = {t-1 \choose
s} + {t-1 \choose s-1}$ implies that $$\label{delta P}
\Delta_q P_{\mathbf{s}}({\mathbf{t}}) = - P_{{\mathbf{s}}+ e_q} ({\mathbf{t}}- e_q)$$ for any nonnegative integer vector ${\mathbf{s}}$ and any $q = 1, \ldots, d$.
To conclude the proof of Theorem \[main\], suppose that ${\mathbf{j}}< {\mathbf{i}}$ and assume by induction that $M_{\mathbf{j}}({\mathbf{k}})$ is given by[ ]{} for any ${\mathbf{k}}\in I_{d,n}$ such that ${\mathbf{j}}\leq {\mathbf{k}}< {\mathbf{i}}$. Let ${\mathbf{s}}$ be the vector given by (\[sij\]). In view of [ ]{}, the desired equality $M_{\mathbf{j}}({\mathbf{i}}) = P_{\mathbf{s}}({\mathbf{i}})$ is a consequence of the following: $$\label{induction}
\deg ({\mathbf{j}},{\mathbf{i}}) P_{\mathbf{s}}({\mathbf{i}}) - \sum_{{\mathbf{k}}} M_{\mathbf{j}}({\mathbf{k}}) = 0 \ ,$$ where the sum is over all ${\mathbf{k}}\in I_{d,n}$ such that ${\mathbf{j}}\leq {\mathbf{k}}< {\mathbf{i}}$, and $|{\mathbf{k}}|=|{\mathbf{i}}|-1$.
We shall deduce [ ]{} from the equality $$\sum_{q=1}^d \Delta_q P_{\mathbf{s}}({\mathbf{i}}) = 0$$ provided by Lemma \[dif\_Euler\]. To do this, we compute $\Delta_q P_{\mathbf{s}}({\mathbf{i}})$ in each of the following mutually exclusive cases (we use the conventions $i_0 = 0$ and $s_0 = d$):
[**Case 1:**]{} $i_q \notin \{j_1, \ldots, j_d\}$, $i_q - 1 > i_{q-1}$. Then ${\mathbf{k}}:= {\mathbf{i}}- e_q$ belongs to $I_{d,n}$, and we have ${\mathbf{j}}\leq {\mathbf{k}}$. Replacing ${\mathbf{i}}$ by ${\mathbf{k}}$ in (\[sij\]) does not change the vector ${\mathbf{s}}$. By our inductive assumption, $P_{\mathbf{s}}({\mathbf{k}}) = M_{\mathbf{j}}({\mathbf{k}})$, and so $\Delta_q
P_{\mathbf{s}}({\mathbf{i}}) = P_{\mathbf{s}}({\mathbf{i}}) - M_{\mathbf{j}}({\mathbf{k}})$.
[**Case 2:**]{} $i_q \notin \{j_1, \ldots, j_d\}$, $i_q - 1 = i_{q-1}$. For such $q$, we have $P_{\mathbf{s}}({\mathbf{i}}- e_q) =
0$ since the corresponding determinant has the $(q-1)$th and $q$th columns equal to each other. Thus $\Delta_q P_{\mathbf{s}}({\mathbf{i}}) = P_{\mathbf{s}}({\mathbf{i}})$.
[**Case 3:**]{} $i_q \in \{j_{q+1}, \ldots, j_d\}$, $i_q - 1 > i_{q-1}$. As in Case 1, we have ${\mathbf{k}}:=
{\mathbf{i}}- e_q \in I_{d,n}$, and ${\mathbf{j}}\leq {\mathbf{k}}$. However now replacing ${\mathbf{i}}$ by ${\mathbf{k}}$ in (\[sij\]) changes ${\mathbf{s}}$ to ${\mathbf{s}}+
e_q$. Combining the inductive assumption with (\[delta P\]), we conclude that $\Delta_q P_{\mathbf{s}}({\mathbf{i}}) = - P_{{\mathbf{s}}+ e_q} ({\mathbf{k}}) = -
M_{\mathbf{j}}({\mathbf{k}})$.
[**Case 4:**]{} $i_q \in \{j_{q+1}, \ldots, j_d\}$, $i_q - 1 = i_{q-1}$. In this case, the $d \times d$ matrix whose determinant is $P_{{\mathbf{s}}+ e_q}({\mathbf{i}}- e_q)$ has the $(q-1)$th and $q$th columns equal to each other, hence $\Delta_q P_{\mathbf{s}}({\mathbf{i}}) = - P_{{\mathbf{s}}+ e_q} ({\mathbf{k}}) = 0$.
[**Case 5:**]{} $i_q = j_q$. Then we have $$s_1 \geq s_2 \geq\cdots\geq s_{q-1}\geq s_q + 1 = d+1-q \ ,$$ and so the $d \times d$ matrix whose determinant is $P_{{\mathbf{s}}+
e_q}({\mathbf{i}}- e_q)$ has a zero $(d+1-q) \times q$ submatrix. As in Case 4, this implies $\Delta_q P_{\mathbf{s}}({\mathbf{i}}) = - P_{{\mathbf{s}}+ e_q} ({\mathbf{k}}) = 0$.
Adding up the contributions $\Delta_q P_{\mathbf{s}}({\mathbf{i}})$ from all these cases, we obtain [ ]{}; this completes the proof of Theorem \[main\].
In [@ro86], the multiplicity $M_{\mathbf{j}}({\mathbf{i}})$ was expressed as a multiple sum given by[ ]{}.
The multiplicity $M_{\mathbf{j}}({\mathbf{i}})$ is by definition a positive integer. The partial difference equation [ ]{} (combined with the initial condition $M_{\mathbf{j}}({\mathbf{j}}) = 1$) makes the positivity of $M_{\mathbf{j}}({\mathbf{i}})$ obvious but the fact that $M_{\mathbf{j}}({\mathbf{i}})$ is an integer becomes rather mysterious. On the other hand, Theorem \[main\] makes it clear that $M_{\mathbf{j}}({\mathbf{i}})$ is an integer but not that $M_{\mathbf{j}}({\mathbf{i}}) > 0$. It would be interesting to find an expression for $M_{\mathbf{j}}({\mathbf{i}})$ that makes obvious both properties.
The space of all polynomial solutions of the partial difference equation[ ]{} can be described as follows. Let ${\mathbf{y}}=
(y_1, \ldots, y_d)$ be an auxiliary set of variables, and let $\varphi: {\mathbb{Q}}[{\mathbf{y}}] \to {\mathbb{Q}}[{\mathbf{t}}]$ be the isomorphism of vectors spaces that sends each monomial $\prod_{q=1}^d y_q^{n_q}$ to $\prod_{q=1}^d t_q (t_q + 1) \cdots (t_q + n_q -1)$. The map $\varphi$ intertwines each $\Delta_q$ with the partial derivative $\frac{\partial}{\partial y_q}$. It follows that the space of solutions of[ ]{} is the image under $\varphi$ of the ${\mathbb{Q}}$-subalgebra in ${\mathbb{Q}}[{\mathbf{y}}]$ generated by all differences $y_p - y_q$.
Jerzy Weyman informed us about the following determinantal formula (unpublished) for the multiplicity $M_{\mathbf{j}}({\mathbf{i}})$ in the special case when ${\mathbf{j}}= (1, 2, \ldots, d)$. Let $\lambda$ be the partition $(i_d - d, \ldots, i_2 - 2, i_1 - 1)$, and let $\lambda = (\alpha_1, \ldots, \alpha_r|\beta_1, \ldots,
\beta_r)$ be the Frobenius notation of $\lambda$ (see [@mac]). According to J. Weyman, $M_{\mathbf{j}}({\mathbf{i}})$ is equal to the determinant of the $r \times r$ matrix whose $(p,q)$-entry is ${\alpha_p + \beta_q \choose \alpha_p}$. It is not immediately clear why this determinantal expression agrees with the one given by[ ]{}.
Acknowledgements {#acknowledgements .unnumbered}
================
We are grateful to V. Lakshmibai who initiated this project by suggesting to one of us (J. R.) to publish the results of his thesis [@ro86]. We thank Sergey Fomin, Ira Gessel and Jerzy Weyman for helpful conversations.
[LW90]{}
I. Gessel and G. X. Viennot, *Binomial determinants, paths, and hooklength formulae*, Adv. Math. **58** (1985), 300–321.
V. Lakshmibai, *Multiplicities of points on a [S]{}chubert variety*, C. R. Acad. Sci. Paris Sér. I Math. **321** (1995), no. 2, 215–218.
V. Lakshmibai and J. Weyman, *Multiplicities of points on a [S]{}chubert variety in a minuscule ${G}/{P}$*, Adv. Math. **84** (1990), 179–208.
I.G. Macdonald, Symmetric functions and Hall polynomials, Second Edition, Clarendon Press, Oxford, 1995.
J. Rosenthal, *[S]{}chubertvarietäten und deren [S]{}ingularitäten*, Diplom thesis, University of Basel, Switzerland, 1986.
[^1]: The authors were partially supported by NSF grants DMS-9610389 and DMS-9625511.
| |
:
math
Posted by
hi
on
Wednesday, November 9, 2011
at 6:07pm.
pls. explain how to get this:
A number x is the harmonic mean of two
numbers a and b if 1/x
is the mean of 1/a
and 1/b.
a) Write an equation to represent the harmonic
mean of a and b.
b) Determine the harmonic mean of 12 and 15.
c) The harmonic mean of 6 and another
number is 1.2. Determine the other number.
Connecting
Problem Solving
Reasoning and Proving
Reflecting
Representing Selecting Tools
Communicating
184 MHR
Answer This Question
First Name:
School Subject:
Answer:
Related Questions
Algebra
- Reposting: The geometric mean and arithmetic mean of the two numbers ...
Allgebra
- The geometric and arithmetic mean of the two numbers are 8 and 17 ...
maths
- find 2 numbers whose arithmetic mean exceeds their geometric mean by 2 ....
math
- In the set of numbers 2,3,5,7,7,8,10 what is a) the arithmatic mean b) ...
math
- Does anyone know how to explain mean, median, mode and range mean?? mean-...
Math
- Find harmonic mean and geometric mean for numbers 120, 130,145
math
- There are 5 numbers in a set of data. There are no repeated numbers. ...
algebra
- One number is 4 times another. If the sum of their reciprocals is 5/36...
algebra
- find five numbers with a mean of 16, a median of 15 a mode of 21 and a...
math
- The mean of four numbers is 5 and the mean deviation is 3.Find the fourth...
More Related Questions
Search
Members
Username
Password
Not yet registered?
Click here to register! | http://www.jiskha.com/display.cgi?id=1320880036 |
Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
Abstract
A system and method of playing an extension game to a lottery game is disclosed. A lottery game player enters a base game and receives a base game entry, and may elect to play a second lottery game in addition to the base game, and if so, selects or has selected for them game indicia therefor. A winning entry for the base game is selected, whereupon the winning game indicia for the second game is selected to be the game indicia selected for the second game on the winning base game entry. Lottery players who won the base game receive a prize, and those lottery players who did not win the base game but that have the winning game indicia for the second game, as well as those lottery players that won the base game and have the have the winning game indicia for the second game, receive a prize.
Description
This application claims the benefit of U.S. Provisional Application No. 60/634,210, Extension To A Lottery Game For Which Winning Indicia Are Set by Selections Made By Winners Of The Base Lottery Game, filed on Dec. 8, 2004, the entirety of which is hereby incorporated herein by this reference.
BACKGROUND OF THE INVENTION
1. Field of the Invention
The invention relates in general to lottery games. More particularly, the invention relates to a lottery game in which winning numbers are determined by an accompanying game.
2. Description of the Related Art
Traditionally a lottery chooses its winner by means that is not affected by action of lottery players. For example, in a raffle game, a winner is chosen by selecting a winning number from a set of numbers, and the selection is not affected by each player's action. Some lotteries have taken a different approach, in which the winning number is indirectly affected by players. An example of this approach is “Darkhorse Wagering” disclosed in U.S. Pat. No. 6,098,797. Darkhorse Wagering permits a player to make selections that affect the outcome of the game, and the least popular player selection is chosen to be the winner. In Darkhorse Wagering the winner is always the least popular player selection, which means that majority of players will not win most of time, and they may lose interest in the game in the long run. Therefore, it is to an extension lottery game in which players who make popular choices may occasionally win that the present invention is primary directed.
SUMMARY OF THE INVENTION
The current invention is an extension to a lottery game. A player participates in an extension game by selecting or having assigned game indicia. Winners are determined for a base game. Thereafter the indicia for the extension game selected by winners of the base game are designated winning indicia for the extension game. Prizes for the extension game are based on matches with these designated winning indicia.
In one embodiment, there is provided a method for playing a lottery game. The method includes the steps of playing a base game and receiving a base game entry, electing to play a second lottery game in addition to the base game and selecting game indicia for said second game, selecting a winning entry for the base game, assigning winning game indicia for the second game to be the game indicia selected for the second game on the winning base game entry, comparing said winning game indicia to the game indicia of additional base game entrants that elected to play the second game so that winners of the second game are determined based on matches with the indicia for the second game on the winning base game entry, and awarding prizes to winners of the base game only, the second game only, and both the base game and the second game.
In another embodiment, there is provided another method for playing a lottery game. The method includes receiving a set of selected digits for an extension game from a player, issuing a game ticket with set of selected digits for a base game to the player, selecting a winning ticket for the base game, determining selected digits associated with the winning ticket, and determining a prize for each game ticket having the selected digits.
In yet another embodiment there is provided a system for playing an extension game to a lottery game. The system includes a plurality of game terminals and a lottery game server. Each terminal is capable of accepting lottery game entries from players and offering a player an opportunity to player the extension game. The lottery game server communicates with the plurality of game terminals, and the lottery game server is capable of receiving a set of selected digits for the extension game from a player, issuing a game ticket with the set of selected digits for the lottery game to the player, selecting a winning ticket for the lottery game, determining selected digits associated with the winning ticket, and determining a prize for each game ticket having the selected digits.
BRIEF DESCRIPTION OF THE DRAWINGS
FIG. 1 is an illustration of a playslip for the inventive lottery game.
FIG. 2 is an illustration of a ticket displaying the digits selected by a lottery game player with a raffle number thereon.
FIG. 3 is an illustration of a ticket that matched the winning raffle number.
FIG. 4 is an illustration of a ticket that did not match the winning raffle number but did match the winning digits.
FIG. 5 is an illustration of a ticket that neither matched the winning raffle number nor the digits.
FIG. 6 is an illustration of a ticket with the winning raffle number.
FIG. 7 is an illustration of a ticket that did not match the winning raffle number but did match the sequence of digits.
FIG. 8 is an illustration of a ticket that matched neither the winning raffle number nor the winning digits.
FIG. 9 is an illustration of an exemplary play slip that incorporates a theme.
FIG. 10 is an illustration of an exemplary ticket that incorporates a theme.
FIG. 11 is an illustration of an exemplary ticket that incorporates a theme.
FIG. 12 is an illustration of an exemplary ticket that incorporates a theme.
FIG. 13 is an illustration of a lottery game that incorporates the current invention.
FIG. 14 is an illustration of a lottery game that incorporates the current invention.
FIG. 15 is an illustration of a lottery game that incorporates the current invention.
FIG. 16 is an illustration of a prize table wherein prizes involve matching a raffle number.
FIG. 17 is an illustration of a prize table that includes prizes based on matching a bonus number.
FIG. 18 illustrates the results of a particular game.
FIG. 19 illustrates the prize table for a particular game.
FIG. 20 illustrates an exemplary ticket.
FIG. 21 illustrates an exemplary ticket.
FIG. 22 illustrates an exemplary ticket
FIG. 23 illustrates an exemplary prize table.
FIG. 24 illustrates an exemplary prize table.
FIG. 25 illustrates an exemplary ticket.
FIG. 26 illustrates an exemplary prize table
FIG. 27 illustrates an exemplary prize table.
FIG. 28 illustrates an exemplary ticket.
FIG. 29 illustrates an exemplary ticket.
FIG. 30 illustrates and exemplary ticket.
FIG. 31 illustrates an exemplary prize table
FIG. 32 illustrates an exemplary prize table.
FIG. 33 illustrates an exemplary ticket.
FIG. 34 illustrates an exemplary ticket.
FIG. 35 illustrates a lottery authority server process.
DETAILED DESCRIPTION OF THE INVENTION
The current invention is an extension game to a lottery game. In addition to the requirements for a base game, the player selects indicia for the extension game. The base game is conducted, and winners are determined for the base game. The indicia for the extension game selected by the winners of the base game are designated as winning indicia for the extension game. Winners for the extension game are determined based on matches with these designated winning indicia. Percentages of the prize fund for the lottery game are reserved for the winners of the extension game. The popularity of the player-selected indicia controls the win frequency and magnitude of the extension prize. Popular player indicia tend to win more often as these indicia are more likely to have been chosen by winners of the base game. However, popular indicia tend to pay less as the pari-mutuel prize fund is more diluted. Conversely, less popular indicia tend to win less often but the prizes tend to be of higher magnitude. In this way, players can strategize as to the win frequency and magnitude of the prizes by gauging the popularity of the indicia they select.
The invention provides a method by which a lottery game incorporates a raffle. The player selects indicia for a lottery game and is assigned a raffle number. The raffle is conducted and a raffle winner determined. At least one of the indicia selected by the raffle winner is conferred winning indicia. Other winning indicia may be determined by a random game process. Prizes are based on the outcome of the raffle and/or matches with the winning indicia.
One embodiment is a variation of a digits game. In a digits game a player selects a permutation of digits and a bet type. For example, a “straight” bet means that the player wins a prize if his selection matches the lottery's in exact order. Prizes are either set or pari-mutuel. Each of these methods has disadvantages. If prizes are set, the payout is volatile. For example, a set prize for a straight bet for a 3-digits game is $500, based on an average 50% payout and a $1 wager. However, “triples” such as 7-7-7 are popular selections. If and when such a triple is drawn, the payout may be exceedingly large and difficult for the lottery to absorb. On the other hand, if prizes are pari-mutuel, the lottery avoids volatility, but some players are at a disadvantage. For example, the pari-mutuel prize fund for a straight bet for a 3-digits game may be 50%. Popular selections are at a disadvantage in that the prize fund is diluted by a large number of winners. In general, a player of 7-7-7 would win less than that of a less popular selection. The current invention can be embodied as a numbers game in such a way that the lottery avoids volatility and the payout is the same for all player selections.
In another embodiment the base game is a raffle and the extension is a numbers game. The player pays $2 and selects 2 digits from 00 to 99. FIG. 1 illustrates a playslip 100 by which a player makes such a selection. In the example of FIG. 1, the player has selected 63 by darkening boxes corresponding to number 63. The player receives a ticket 200 illustrated in FIG. 2 displaying the digits 202 he selected along with a raffle number 204. The raffle is conducted by a lottery authority and a raffle number is randomly selected. The ticket with the winning raffle number is awarded a portion of the sales, for example 10%. The digits selected by the player with the winning raffle ticket are conferred as the winning digits. Winners of the extension game are those tickets that match these winning digits. These winners equally share another portion of the sales, for example 50%. This game is such that, in the given example, the return is 60% for any player selection. This can easily be proved: For example, Let N be the number of tickets sold, x be a selection of digits, and n be the number of players who selected x. The probability that a selected raffle ticket will have x as the player selection is n/N. If x is the digits selection on the winning raffle ticket, the prize for the digits game is 50%×Sales/Number of Winners=50%2N/n. Therefore, the return for the digits game is Prize·Probability/Price=50%2N/n·n/N/$2=50%. As the return for the raffle game is 10%, the return for the raffle and digits game for player selection x is 10%+50%=60%. In short, the win frequency and magnitude of the prizes is determined by the popularity of the player selection, but the return is 60% independent of the player selection. That is, the player may strategize as to whether he would like to win larger prizes, in which case he may attempt to play unpopular digits or he may prefer smaller prizes at a higher win frequency, in which case he would attempt to play more popular numbers. However, in terms of overall return, no set of digits is at an advantage or disadvantage.
Additional examples of the inventive game of this invention are disclosed below:
Example 1: Sales are $6,000 (3,000 tickets). The raffle is conducted and the winning number is 2341. As 10% of the sales are reserved for the raffle, the raffle prize is $600. FIG. 3 illustrates the ticket 300 with the winning raffle number 302. The chosen digits for this entry are 77. Therefore, 77 is the winning outcome for the digits, or extension, game. Suppose that a total of 150 players chose digits 77. As 50% of the sales is reserved for the digits prize and there are 150 winners, the prize for the digits game is 50%×$6,000/150=$20. FIGS. 3-5 illustrate various tickets. FIG. 3 is the ticket that matched the winning raffle number. As this ticket sets the winning digits, it is automatically a digits game winner. This ticket is awarded the raffle prize plus the digits game prize: $600+$20=$620. FIG. 4 illustrates a ticket 400 that did not match the winning raffle number but did match the winning digits. This entry is awarded $20 for the digits game. FIG. 5 illustrates a ticket 500 that neither matched the winning raffle number nor the digits. This entry does not win a prize.
Example 2: Sales are $6,000 (3,000). The winning raffle number is 1948 and the chosen digits for the ticket matching the winning raffle number are 29 as illustrated by ticket 600 in FIG. 6. Therefore, the winning digits are 29. Suppose that 15 players chose number 29. The raffle prize is 10%×$6,000=$600, the same as in Example 1. The digits game prize is 50%×$6,000/15=$200. This ticket is awarded the raffle prize plus the digits game prize: $600+$200=$800 FIG. 7 illustrates a ticket 700 that did not match the winning raffle number but did match the sequence of digits. This ticket is awarded $200. FIG. 8 illustrates a ticket 800 that matched neither the winning raffle number nor the winning digits. This ticket does not win any prize. Note that by selecting a less popular number combination for the digits game, the player game winnings are greater per player than with the more popular number combination of Example 1.
In the above examples, the prize for the base game (i.e., the raffle) is a cash prize. However, the game could easily be embodied as to award merchandise, rather than cash, as the raffle prize. For example, 10% of sales could be allotted for a raffle prize fund as illustrated for several examples below.
In Example 3, the invention can be embodied such that the game indicia are symbols. For example, the invention could be embodied based on an animal theme. The player selects an “animal” via a playslip 900 as in FIG. 9, where the player has marked “ELEPHANT.” His selection is memorialized on a ticket 1000 as in FIG. 10 with an image labeled “ELEPHANT.” He is also assigned a raffle number 5273648. For each game, exactly one raffle number is drawn. The winning symbol is defined to be that which the raffle winner has selected. The winning raffle play wins the raffle prize. The raffle prize is financed by a fund, for example, comprising 10% of the sales. If the sales for a given draw cannot be predicted, it is prudent to purchase the raffle prize from existing funds. Plays that match the winning symbol may, for example, equally divide 50% of the sales. For example, suppose that 5,000 tickets ($10,000 sales at a price of $2 per ticket) are purchased and for 500 of these tickets ELEPHANT was selected as the symbol. Furthermore, suppose that the number 5273648 is drawn, conferring the ticket in FIG. 10 the raffle winner. The raffle winner receives a prize, such as a vacation package. As the symbol accompanying the winning raffle ticket is ELEPHANT, the winning symbol is ELEPHANT. A share would be worth 50%×$10,000/500=$10. For example, the ticket 1000 in FIG. 10 wins the raffle prize for matching the raffle number (5273648) plus a share of the 50% pool ($10) for having an ELEPHANT as his symbol (the raffle winner always has the winning symbol by definition). The ticket 1100 in FIG. 11 does not have the winning raffle number; however, it does have the winning symbol (ELEPHANT). Therefore, it wins a share, $10. The ticket 1200 in FIG. 12 wins nothing as it neither matches the winning raffle number, nor matches the winning symbol.
In Example 4, the current invention can be combined with a standard lottery game wherein a set of winning numbers is randomly determined by the lottery authority and prizes are based on the number of matches between a play's and the winning numbers. In addition to his play comprising a set of numbers, the player selects a “bonus number” from a field of numbers, for example, from the 10 digits 0 to 9. He is also assigned a raffle number. FIG. 13 illustrates a ticket 1300 for this embodiment: The numbers for the base game selected by the player are 7, 8, 15, 22, 34, 48, and the “bonus number” selected by the player is 8. The lottery assigns to the play a raffle number 82901440. The event of the draw consists of the lottery drawing 6 numbers out of 48 and a raffle number, for which there is exactly one corresponding ticket. The “winning bonus number” is decided by the winning raffle ticket: it is defined to be the bonus number selected (or quick-picked) by the raffle winner.
The prizes for example 4 are determined by two tables illustrated in FIG. 16 and FIG. 17. The play is awarded the sum of the two. The prizes related to the raffle number 1300 are in FIG. 16. For each draw there is exactly one raffle winner. The raffle prize is awarded to the play with the drawn raffle number. The raffle prize may be merchandise (e.g., a motor vehicle) or cash. The raffle prizes may be funded, for example, by 5% sales and may vary in magnitude, depending on available funds. There is also a Jackpot prize. In this example, it is pari-mutuel and progressive. As indicated in FIG. 16, if the play matches the raffle number and 3 or more matches in the base game (i.e., the standard 6 out of 48 matrix game), it is awarded the raffle prize and the Jackpot.
The prize table 1700 in FIG. 17 illustrates an example of prizes based on the number of matches in the base game and whether or not the player matches the bonus number. The prize for matching all 6 numbers is the Jackpot. This is the same Jackpot as that for the prize table 1600 in FIG. 16. That is, there are two ways of winning the Jackpot, by matching the raffle number and 3 or more matches in the base game (in which case, the play would also win the raffle prize), or by matching 6 in the base game. The magnitude, funding and management of the Jackpot are flexible. For purposes of this example, it is funded by 23% of the sales, with the Jackpot starting at $500,000 and incrementing a minimum of $100,000 each draw. Such a Jackpot scheme would require a minimum level of sales. For example, $600,000 per draw would be sufficient.
Following the Jackpot prize for matching 6 numbers, prizes for various matches in the base game with and without the bonus number are illustrated in FIG. 17. The prizes for matches in the base game without matching the bonus number are set ($5,000, $100, and $5, for matching 5, 4, and 3 respectively). The “bonus number prizes” for matches in the base game and matching the bonus number are indicated with a “+,” meaning the indicated prize is more than that for matching without the bonus number. The exact bonus number prizes will vary from game to game, depending on factors such as sales and the number of winners in each category. There is also a “bonus number prize” for matching 2 in the base game and the bonus prize, whereas there is no prize for matching 2 in the base game and not matching the bonus number. It will be described below a method for assigning prizes for the bonus number.
First, a set percentage of the sales is allocated exclusively for “bonus number prizes,” i.e. prizes added to base game prizes for also matching the bonus number. In this exemplary embodiment, 19% of sales is set aside for these prizes. The 19% is subdivided into 4 allocations corresponding to matching 5, 4, 3, or 2 in the base game and matching the bonus number: 1% for matching 5, 2% for matching 4, 4% for matching 3 and 12% for matching 2. Furthermore, if there are no bonus number winners corresponding to one of theses allocations, then that percentage is rolled down to the next level. For example, if there are no plays that both matched 5 in the base game and matched the bonus number, then the 1% allocated for that level is rolled down to the matching 4 level. The percentage for matching 4 in the base game and the bonus number would then be 2%+1%=3%.
Shares are computed for each level (i.e., matching 5, 4, 3, or 2 in the base game) and a play is awarded a share for the highest level for which he qualifies and each lower level. A Type 5 share is computed by dividing the percentage corresponding to matching 5 by the number of winners that both matched 5 in the base game and matched the bonus number. A Type 4 share is computed by dividing the percentage corresponding to matching 4 by the number of winners that both matched 4 or 5 in the base game and matched the bonus number. A Type 3 share is computed by dividing the percentage corresponding to matching 3 by the number of plays that both matched 3, 4 or 5 in the base game and matched the bonus number. A Type 2 share is computed by dividing the percentage corresponding to matching 2 by the number of plays that both matched 2, 3, 4, or 5 in the base game and matched the bonus number.
A play that matches 2 in the base game and matches the bonus number is awarded a Type 2 share. A play that matches 3 in the base game and matches the bonus number is awarded a Type 2 share plus a Type 3 share. A play that matches 4 in the base game and matches the bonus number is awarded a Type 2 share plus a Type 3 share plus a Type 4 share. A play that matches 5 in the base game and matches the bonus number is awarded a Type 2 share plus a Type 3 share plus a Type 4 share plus a Type 5 share. Note that this way of awarding multiple shares ensures that plays at higher levels win higher prizes. For example, a play that matches 5 in the base game and matches the bonus number would necessarily have at least as high a prize as a play that matched 4 in the base game and matched the bonus number.
To illustrate this method of assigning “bonus number prizes,” suppose that sales for a particular draw of this game are $200,000 (100,000 plays) and suppose that 30,000 plays have 7 selected as the bonus number. Furthermore, suppose that the raffle winner selected 7 as the bonus number. This sets the winning bonus number as 7. Suppose the results of the game are as those illustrated in FIG. 18. For example, the number of winners that matched 4 and did not match the bonus number is 50. The number of winners that matched 4 and matched the bonus number is 20. A total of 19% is allocated for prizes matching the bonus number. The 19% is partitioned into 1%, 2%, 4%, and 12% corresponding to matching 5, 4, 3, and 2 in the base game. It is observed that there are no winners in the matching 5 and the bonus number category. Therefore, the 1% for matching 5 and the bonus number is rolled to the level for matching 4, so that the percentage corresponding to matching 4 is 1%+2%=3%. In other words, in light of the fact that there are winners matching the bonus number at the matching 5 level, the partitioning of 19% is revised: 3%, 4%, and 12% corresponding to matching 4, 3, or 2 in the base game. Shares corresponding to each category are now determined. A Type 2 share is computed by dividing 12% of sales by the number of plays that both match 2, 3, 4 or 5 in the base game and match the bonus number: 12%×$200,000/(3,600+380+20)=$6. Similarly, a Type 3 share is 4%×$200,000/(380+20)=$20. And a Type 4 is 3%×$200,000/20=$300. The bonus number prizes are determined by adding these amounts to $5,000, $100, $5 or $0 corresponding to matching 5, 4, 3, or 2 in the base game. Prizes are summarized in FIG. 19. For example, a player matching 4 and not matching the bonus number is awarded a set $100. A player match 4 and the bonus number wins $100 plus a Type 4 share plus a Type 3 share plus a Type 2 share=$100+$300+$20+$6=$426.
For example, if the drawn numbers are 10, 15, 27, 29, 33, 34 and the drawn raffle number is 82901440, then the ticket 1300 in FIG. 13 is the raffle winner. This play wins the raffle prize. Also, it sets the winning bonus digit as 8. Also, it wins $6 for matching 2 and the bonus digit as indicated in FIG. 19. The ticket 1400 in FIG. 14 matches 3 but does not match the bonus number. It wins $5 as indicated in FIG. 19. The ticket 1500 in FIG. 15 wins $31 for matching 3 in the base game and matching the bonus number.
Those skilled in the art of Mathematics can verify that the return for this game is 23.0% (Jackpot)+5.0% (raffle prize)+15.1% (base game prizes for matching 3, 4, or 5)+19.0% (added to base game prizes for bonus number prizes)=62.1%.
In Example 5, another embodiment presents a play with 3 components: a digit from 0 to 9, a symbol selected from a set (in this case, based on an animal theme), and a raffle number. In this example, each play costs $5. The player may choose the number and/or the symbol, and the ticket is assigned a raffle number. An exemplary ticket 2000 is in FIG. 20. The player has selected the digit 7, the symbol ELEPHANT and the ticket is assigned the raffle number 436765. The draw consists of the lottery authority randomly choosing exactly one of the raffle numbers and randomly drawing a number between 0 to 9. The winning symbol is defined to be that selected by the raffle winner. For example, if the raffle number is 436765, the winning symbol is ELEPHANT as that is symbol accompanying the winning raffle number (FIG. 20). The prize tables are illustrated in FIG. 23 and FIG. 24. The play is awarded the sum of the 2 prizes. The prize table in FIG. 23 pertains to the raffle component. A play is awarded the raffle prize if it matches the raffle number. The raffle prize is paid for by a fund that comprises 10% of sales. If the play matches the raffle number and matches the digit, it wins the raffle prize and the Jackpot. The Jackpot is funded by 10% of sales and is progressive and pari-mutuel. More prizes are indicated in FIG. 24. If a play matches the winning digit but does not match the winning symbol it is awarded $10. If the play matches the winning digit and matches the winning symbol the play wins more than $10. The exact amount is computed as follows. First observe that awarding $10 to prizes that match the winning digit comprises a 20% payout ( 1/10×$10/$5=20%). An additional 20% of the sales is divided equally among plays that both match the winning digit and the symbol. For example, suppose sales are $500,000 (100,000 plays) of which 10,000 plays have the number 5 selected. Of those 10,000, suppose 500 have ELEPHANT as the selected symbol. Suppose that the winning raffle number is 436765. This means that the winning ticket is that in FIG. 20. Since ELEPHANT is the accompanying symbol, ELEPHANT is conferred as the winning symbol. Also, suppose that the winning digit is 5 (randomly drawn by the lottery). A play that matches both the 5 and ELEPHANT it is awarded $10+20%×$500,000/500=$210. For example, the ticket in FIG. 20 would win the raffle prize for matching the raffle number. However, the play does not win any other prizes as it does not match the winning digit. The ticket 2100 in FIG. 21 does not match the raffle number nor the winning symbol, but does match the winning digit. It is awarded $10. The ticket 2200 in FIG. 22 does not match the winning raffle number, but does match the winning digit and the winning symbol. It is awarded $210. The payout for this game is 10% for the raffle prize plus 10% for the Jackpot plus 20% (matching winning digit) plus 20% (matching the winning digit and the winning symbol) for a total of 60%.
In Example 6, an alternative embodiment is similar to that of Example 5. This embodiment presents a play with 3 components: a symbol selected by the player from a set of symbols, a set of 10 2-digit numbers assigned by the lottery, and a raffle number assigned by the lottery authority. Again in this example, the ticket price is set to $5. An exemplary ticket 2500 is in FIG. 25. For each game, a 2-digit number and a raffle number are randomly drawn by the lottery. The winning symbol is defined to be the symbol accompanies the winning raffle number. For example, if 4367652 is drawn as the raffle number, then that would confer the ticket 2500 in FIG. 25 as the winning raffle ticket. The winning symbol would be ELEPHANT as that is the symbol selected by the raffle winner. Prize tables are illustrates in FIG. 26 and FIG. 27. As indicated in FIG. 26, the ticket that matches the winning raffle number wins the raffle prize (funded by 5% of sales). If the raffle winner also matches one of his 10 2-digit number to the drawn 2-digit number, he also wins the Jackpot (funded by 10% of the sales). Additional prizes are indicated in FIG. 27. A prize of $10 is awarded for matching one the play's 10 2-digit numbers to the winning 2-digit number and not matching the winning symbol. A prize of more than $10 is awarded for matching one of the play's 10 2-digit number to the winning 2-digit number and matching the winning symbol. This additional amount is determined by dividing 20% of sales by the number of plays that matched the winning 2-digit number and the winning symbol. The payout for this game is 5% (raffle prize)+10% (Jackpot)+20% (matching the winning digit)+20% (matching the winning digit plus the winning symbol)=55%. For example, if winning raffle number 4367652, and the winning 2-digit number is 80, then the ticket 2500 in FIG. 25 wins the raffle prize and the Jackpot, as indicated by the prize table in FIG. 26. Plus, ELEPHANT is conferred the winning symbol as that is the symbol that accompanies the winning raffle ticket. Suppose that sales are $100,000 and there are 5,000 plays for which the symbol is ELEPHANT. The ticket 2800 in FIG. 28 matches the winning 2-digit number and the winning symbol. By the prize table in FIG. 27, it wins $10+20%*$100,000/5,000=$14. The ticket 2900 in FIG. 29 matches the winning 2-digit number but does not match the winning symbol. By the prize table in FIG. 27, it wins $10.
In Example 7, an embodiment of the current invention is combined with a standard lottery game. The price is $5 and an exemplary ticket 3000 is shown in FIG. 30. The “base game” involves, for example, the lottery authority drawing 6 numbers out of 48 and the player matching numbers in his play to the drawn numbers. There are 5 lines for the “base game” on the ticket. A player wins prizes per line and is awarded the sum of these prizes. The prizes for the base game are illustrated in FIG. 31. There is an additional prize table in FIG. 32 based on cumulative matches and the raffle number. If the play matches the winning raffle number, then the play wins the raffle prize (5% sales). Also, the symbol accompanying the winning raffle number is conferred as the winning symbol. If the play matches the winning raffle number and attains 6 or more cumulative matches (i.e. the total attained by adding the number of matches for the 5 individual lines), then the play wins the raffle prize and the Jackpot (funded by 10% sales). If the play matches the winning symbol and attains 6 or more cumulative matches, the play wins a share of 10% of the sales divided equally by the number of such winners. For example, suppose that the drawn numbers are 12, 25, 31, 38, 43, and 47 and that the winning raffle number is 4367654. The ticket with the winning raffle number is illustrated in FIG. 30. This play wins the raffle prize. Also, as the accompanying symbol is BUTTERFLY, BUTTERFLY is conferred the winning symbol. However, this ticket has only 5 cumulative matches and as such does not win the Jackpot. The ticket 3300 in FIG. 33 wins $7 for matching 3 on the 4th line, but does not win the Raffle prize or the Jackpot as it does not match the raffle number. Also, it wins a share of the said $10 of the sales as it matches the winning symbol (BUTTERFLY) and at least 6 cumulative matches. The ticket 3400 in FIG. 34 wins $7 for matching 3 on the 2nd line and $5,000 for matching 5 on the 5th line for a total of $5,007, but does not win the Raffle prize or the Jackpot as it does not match the raffle number. Nor does it win a share of the said 10% as it does not match the winning symbol. Those skilled in the art of Mathematics can verify that the return for this game is 38.0% (base game)+5% (raffle prize)+10% (Jackpot)+10% (matching symbol+6 or more cumulative matches)=63%.
Unlike Darkhorse Wagering disclosed in U.S. Pat. No. 6,098,797, in the current invention, the outcome is not determined explicitly by the popularity of a selection, but rather by an outside mechanism: the outcome of another game. That is, in Darkhorse Wagering, based only on the player selections, a winner is determined: the least popular selection. In the current invention, based on the player selections, probabilities can be assigned to outcomes, but the winner is not determined. It is still possible for any selection to win.
Another difference from Darkhorse Wagering is that in the current invention the return to the player is independent of the popularity of a selection. The more popular a selection, the greater probability of winning, but the less the magnitude of the prize. In terms of the return to the player, there is no advantage or disadvantage based on the popularity of a selection. Some players may prefer to play popular numbers with a greater probability of winning, and some players may prefer to play unpopular numbers for larger prizes, and so on. In contrast, in Darkhorse Wagering, it is always to the player's advantage to try to make an unpopular selection.
The fact that the return is independent of the popularity of a selection is an advantage of this invention over Darkhorse Wagering in that the current invention does not involve skill. The lottery may prefer, or it may be a matter of law, that a lottery game does not involve skill. In Darkhorse Wagering, if information about players' selections is available, for the current game or in the form of historical data, a player could potentially use this to his advantage. There would necessarily be some historical data as winning selections are publicly disclosed. Thus, in Darkhorse Wagering there is an element of skill involved.
FIG. 35 illustrates a lottery authority server process 3500. A player can elect to play a combination game that includes an extension (secondary) game and a base game, such as a raffle game. The player can purchase a base game ticket at a lottery terminal or a kiosk connected to a lottery authority server, and the lottery authority server offers the player the opportunity to play the extension game. If the player decides to play the extension game, he can select a set of digits or an animal at the lottery terminal or kiosk. The selected digits are transmitted to and received by the lottery authority server, step 3502. After the selected digits are received and payment received, the server issues a base game ticket with the selected digits, step 3504. The actual tickets may be printed at the lottery terminal with the information received from the lottery server.
At a predetermined time, the lottery authority selects a base game winner, step 3506. The base game winner can be selected through traditional methods, such as drawing a winning ticket from a barrel or obtaining numbered balls from different ball machines. Alternatively, the winner can also be determined by the lottery authority server. After the base game winner is determined, the lottery authority can identify the winning number of the extension game, step 3508. Once the winner number of the extension game is determined, the lottery authority server can easily check its record and determine winners of the extension game, step 3510, and calculate the prize for each extension game winner, step 3512. The prize for each extension game winner will be announced and the lottery authority can then pay prizes for each winner, step 3514. The prize can also be paid at the each lottery terminal upon presentation of a ticket with the winning extension game number.
Although several preferred embodiments of the invention have been disclosed in the foregoing specification, it is understood by those skilled in the art that many modifications and other embodiments of the invention will come to mind to which the invention pertains, having the benefit of the teaching presented in the foregoing description and associated drawings. It is thus understood that the invention is not limited to the specific embodiments disclosed herein, and that many modifications and other embodiments of the inventions are intended to be included within the scope of the appended claims. Moreover, although specific terms are employed herein, as well as in the claims, they are used in a generic and descriptive sense only, and not for the purposes of limiting the described invention, nor the claims which follow below.
Claims (23)
1. A method of playing a lottery game, said method comprising the steps of:
playing a base game and receiving a base game entry, the base game having a plurality of entrants;
electing to play a second lottery game in addition to the base game and selecting game indicia for said second game;
selecting a winning entry for the base game;
selecting a winning game indicia for the second game to be the game indicia selected for the second game on the winning base game entry;
comparing said winning game indicia to the game indicia of additional base game entrants that elected to play the second game so that winners of the second game are determined based on matches with the indicia for the second game on the winning base game entry; and
awarding prizes to winners of the base game only, the second game only, and both the base game and the second game.
2. The method of claim 1, further comprising the step of a lottery player selecting the second game indicia.
3. The method of claim 1, further comprising the step of the second game indicia being selected for a lottery player electing to play the second game.
4. The method of claim 1, the base game comprising a raffle for which there is exactly one winner.
5. The method of claim 4, the second game comprising a selecting an object from a set of objects.
6. The method of claim 5 wherein the said selecting an object from a set of objects comprises a digits game.
7. The method of claim 4, further comprising the step of forming a pari-mutuel pool to award prizes in the second game based on the number of base game entrants electing to play the second game.
8. A method for playing a lottery game, comprising the steps of:
receiving a set of game indicia for an extension game to a base game from a player;
issuing a game ticket for the base game to the player, the game ticket having the set of game indicia;
selecting a winning ticket for the base game;
assigning winning indicia for the extension game as that associated with the winning ticket for the base game; and
determining a prize for each game ticket having the said winning game indicia.
9. The method of claim 8, further comprising the step of offering the player an opportunity to play the extension game.
10. The method of claim 8, further comprising the step of issuing a payment for each game ticket having the said winning game indicia.
11. The method of claim 8, wherein the step of determining a prize for each game ticket further comprising the step of forming a pari-mutuel pool based on the number of base game entrants electing to play the extension game.
12. The method of claim 8, wherein the said extension game comprises selecting a symbol from a set of symbols..
13. The method of claim 12, the said selecting an object from a set of objects comprises a digits game..
14. A system for playing an extension game to a lottery game, comprising:
a plurality of game terminals, each terminal being capable of accepting lottery game entries from players and offering a player an opportunity to play an extension game to the lottery game; and
a lottery game server in communication with the plurality of game terminals, the lottery game server being capable of:
receiving a set of game indicia for the extension game from a player;
issuing a game ticket for the lottery game to the player, the game ticket having the set of selected game indicia;
selecting a winning ticket for the lottery game;
assigning winning indicia for the extension game as that associated with the winning ticket for the base game;
determining a prize for each game ticket having the said winning game indicia.
15. A method for playing a combination game, comprising the steps of:
receiving a first set of game indicia for a base game from a player;
receiving a second set of game indicia for an extension game to the base game from the player;
issuing a game ticket for the base game to the player, the game ticket having the first set of game indicia, the second set of game indicia, and an automatically generated raffle number;
selecting a winning ticket based on a randomly selected raffle number;
determining an outcome for the base game;
assigning winning indicia for the second game as that associated with a winning ticket that has the selected raffle number; and
determining a prize for each game ticket having the said winning game indicia.
16. The method of claim 15, further comprising the step of determining a prize for each ticket according to the outcome of the base game.
17. The method of claim 15, further comprising the step of offering the player an opportunity to play the extension game.
18. The method of claim 15, further comprising the step of issuing a payment for each game ticket having the said winning game indicia.
19. The method of claim 15, wherein the step of determining a prize for each game ticket further comprising the step of forming a pari-mutuel pool based on the number of base game entrants electing to play the extension game.
20. The method of claim 15, wherein the extension game comprises selecting an object from a set of objects.
21. The method of claim 20 wherein the extension game the selecting an object from a set of objects comprises a digits game.
22. The method of claim 15, wherein the base game is a standard lottery game.
23. The method of claim 22 wherein prizes for the base game are enhanced based on whether or not the player also won the extension game.
US112960642004-12-082005-12-07Extension to a lottery game for which winning indicia are set by selections made by winners of a base lottery game
ActiveUS7213811B2
(en)
| |
# Land Rover Group
Land Rover Group (LRG) was a division of British Leyland (BL) and later the Rover Group that was in existence between 1981 and 1987. LRG brought British Leyland's light commercial vehicle production under one management, consisting of the Land Rover utility 4x4 range, the Range Rover luxury 4x4 and the former Leyland Sherpa van range (re-branded Freight Rover to match the other group members in 1984). LRG operated two factories in the Birmingham area- the Solihull plant and the Freight Rover plant at Washwood Heath.
## Formation
The group was formed to produce a more logical management structure within the BL group – prior to the creation of LRG the Land Rover business was part of the Jaguar Rover Triumph or specialist division, makers of luxury cars, whilst the Sherpa van was part of the Leyland Truck & Bus division and the only light commercial product in a range otherwise made up of full-size commercial vehicles. Land Rover had already been detached from the Specialist Division in 1978 when a new BL subsidiary called "Land Rover Ltd" was created, that consisted of the Solihull assembly plant, and its satellites - along with the production and development of both the Series Land Rover and Range Rover. The second phase of these reforms would be to move Rover passenger car production out of Solihull - in 1981 production of the Rover SD1 was moved to Cowley, where all future large Rover cars would be produced until the break-up of the Rover Group (as BL was by then called), but its owners BMW in 2000.
## Development
The Land Rover part of the group saw the most product development in an (ultimately successful) attempt to turn around a severe decline in Land Rover sales in the early 1980s (a 25% fall between 1980 and 1981 alone). A modernised and improved Land Rover model range was launched in stages between 1983 and 1985 (the Land Rover Ninety/One Ten/127 range, with new engines, transmissions, suspension and interiors. The Range Rover was gradually pushed up-market into the luxury car sector with a facelift and with more powerful engines, an automatic gearbox, 5 doors and new interior features such as leather seats and air conditioning. Throughout the mid 1980s new engines were added to the Land Rover line-up, including more powerful V8 petrol engines and a turbodiesel model.
The Sherpa van was given an immediate facelift in 1981, creating the 'K2' series, which was only available for a few years before the Freight Rover business was expanded to a two-model range. The original narrow-body Sherpa became the Freight Rover 200-series, whilst a new wider-bodied model with a heavier payload was introduced in 1984 called the Freight Rover 300-series. The 300-series came in a range of wheelbases and body styles. The 300-series also brought with it a new look for the Freight Rover products with square headlights and a new grille which was also applied to the 200 Series (although the smaller model retained its round lights). The new model used adapted versions of the new 2.5-litre diesel engine from Land Rover, but the 200-series retained the venerable 1.8-litre B-Series diesel, although from 1985 the V8 petrol engine and gearbox combination from the Land Rover range was available as a high-power option. A logical new addition to the Freight Rover range was a 4x4 version of the 200-series van using Land Rover axles and transmission units. This model was only available as a special order to fleet and military buyers- whilst popular with utility companies and contractors it was never offered for general sale because it risked taking sales from the Land Rover One Ten and 127.
## Merger and break-up
In 1986 British Leyland was renamed the Rover Group in preparation for privatisation. This saw LRG, Leyland Trucks and Leyland Bus re-united into the Land Rover Leyland Group, but with each division remaining operationally separate.
This was a short-lived arrangement. In 1986 Leyland Bus became a private company, the subject of a management buy-out, later being acquired by Volvo. In 1987 the Leyland Trucks division and the Freight Rover van making interests merged with the Dutch DAF Trucks company to form DAF NV, with Leyland DAF as a UK-based manufacturing and sales division. DAF NV was later floated on the Dutch stock exchange. Land Rover was retained by the Rover Group and the latter was sold to British Aerospace in 1988.
## Products
Land Rover
Land Rover Series III (1981—1985) Land Rover Ninety/One Ten/127 (1983—1987)
Range Rover
Range Rover (1981—1987)
Freight Rover
Leyland Sherpa (1981—1982) Leyland Sherpa K2 (1982—1984) Freight Rover 200 (1984—1987) Freight Rover 300 (1984—1987) | https://en.wikipedia.org/wiki/Land_Rover_Group |
Titan Pride Choral Members and Families:
Our fall choral concert is Monday evening, October 14 at 6:00 PM and 7:30 PM in the LSW PAC. In order to accommodate the large number of people who attend our choral events, there are some changes in the way the concert is organized this year. Please see below for specific information on the arrival and performance times for your student.
5:20 PM: Freshman Women’s Choir on stage
5:30 PM: Men’s Choir, Una Voce and Concert Choir in the choir room
6:00 – 7:00 PM: Concert A Performance. Parents, family, friends, and guests of Men’s Choir and Freshman Women’s choir should attend concert A.
6:45 PM: Women’s Choir in choir room
7:00 – 7:20 PM: Clash of the Titans. Debbie Katzfey will present a final “Clash of the Titans” eligibility presentation to those who have not
completed it. EVERY CHOIR MEMBER MUST HAVE THIS COMPLETED next week. If you have already completed this for a Fall sport, you will not need to attend Clash of the Titans.
7:30 – 8:30 PM: Concert B Performance. Parents, family, friends, and guests of Women’s Choir, Concert Choir, and Una Voce should attend concert B.
Additional Information:
Students should arrive to LSW dressed in their assigned performance attire. Performance attire been discussed with the students in class, and can also be found on www.titanmusic.org in the class syllabus. Performances are a graded component of our choir classes.
Thank you in advance for your flexibility with this new format. Our hope is to have more space for families to invite guests, and have a more comfortable atmosphere by allowing more seating. The kids have been working really hard and have a great evening of choral music prepared for you! We are looking forward to seeing you Monday evening! | https://titanmusic.lsr7.org/2013/10/14/choir-concert/ |
Q:
Calculating the norm of a specific bounded linear functional
Let $L_1([0,1], m)$ be the Banach space of $\mathbb{K}$-valued (i.e. $\mathbb{C}$ or $\mathbb{R}$-valued) Lebesgue-integrable functions, where $m$ is the Lebesgue measure, be equipped with the norm $‖f‖_1=\int_{[0,1]}|f|\,dm$ for $f \in L_1([0,1], m)$. For $n \geq 1$ define $g_n(x) =n\sin(n^2x)$, for $x \in [0,1]$.
Furthermore, let $\phi_n(f)=\int_{[0,1]} f g_n \, dm$.
I'm then asked to show that $\phi_n(f)$ defines a bounded linear map (which I've done) and to show $‖\phi_n‖=n$ for $n \geq 2$. What I've done is that I have shown $‖\phi_n‖\leq n$. If I could find a function $f \in L_1([0,1], m)$ such that $|\phi_n(f)|=n$ and $‖f‖_1=1$, then I would have shown equality. How can I find such a function?
The problem also asks whether I can find a function $f \in L_1([0,1], m)$ such that $\lim_{n \rightarrow \infty} |\phi_n(f)|=\infty$ (perhaps I could use the same function as above?)
A:
It is a general fact that if $g$ is a bounded function, then the norm of the linear functional $L\colon \mathbb L^1\to\mathbb R$ defined by $L(f)=\int_{(0,1)}g(x)f(x)\mathrm d\lambda(x)$ is $\left\lVert g\right\rVert_\infty$. Indeed, fix a positive $\varepsilon<\left\lVert g\right\rVert_\infty$ and define the sets $A^+:=\left\{x\in (0,1), g(x)\gt \left\lVert g\right\rVert_\infty-\varepsilon\right\}$ and $A^-:=\left\{x\in (0,1), -g(x)\gt \left\lVert g\right\rVert_\infty-\varepsilon\right\}$. Then
$$
\max\left\{L\left(\frac 1{\lambda\left(A^+\right)}\mathbf 1_{A^+}\right),L\left(\frac 1{\lambda\left(A^-\right)}\mathbf 1_{A^-}\right) \right\}\geqslant \left\lVert g\right\rVert_\infty-\varepsilon
$$
and (at least one of) the involved function are well-defined and their $L^1$-norm is $1$.
For the other question, look at one of the functions $x\mapsto \pm x^{-\alpha}$ for $1/2\lt\alpha\lt 1$.
| |
Q:
Proof that a ODE system admits symmetric solutions
I have a ODE system of the form $\dot{x} = f(x)$ with $x \in \mathbb{R}^3$. Now it is claimed that if $(x_1,x_2,x_3)$ is a solution to the system that also $(-x_1,-x_2,-x_3)$ is a solution.
How can I show that this holds, I'm namely not sure how to deal with this? I first thought that I would just show that $-f(x) = f(-x)$ but when computing I saw I wasn't getting anywhere.
ps. If you are wondering why I did not post the ODE system itself, it is because I want to try it for myself.
-edit-
Since I am not really getting response the ODE about which it is about it is
$$\dot{x}_1 = -a_1 x_1 + b_1 x_2 \\
\dot{x}_2 = -a_2 x_2 + b_2 x_1 x_3 \\
\dot{x}_3 = -a_3(x_3 - \lambda) - b_3 x_1 x_2
$$
-edit 2-
A friend of mine told me that if I would calculate the fixed points of the system with $(-x_1,-x_2,-x_3)$ that they give the same fixed points as $(x_1,x_2,x_3)$ and that it would imply that the solutions are the same? But I cannot see how this would imply that.
-edit 3- apparently there was a error in the exercise that I had. I had to proof that if $(x_1,x_2,x_3)$ then $(-x_1,-x_2,x_3)$ was also a solution and not $-x_3$. Subsituting then these variables then in the system delivers the same state space system.
A:
If $x$ and $-x$ are both solutions, $\dot{x} = f(x)$ while $\dfrac{d}{dt}(-x) = -\dot{x} = f(-x)$, so it must be true that $f(-x) = -f(x)$.
| |
Q:
Random Forest and Decision Tree Algorithm
A random forest is a collection of decision trees following the bagging concept. When we move from one decision tree to the next decision tree then how does the information learned by last decision tree move forward to the next?
Because, as per my understanding, there is nothing like a trained model which gets created for every decision tree and then loaded before the next decision tree starts learning from the misclassified error.
So how does it work?
A:
No information is passed between trees. In a random forest, all of the trees are identically distributed, because trees are grown using the same randomization strategy for all trees. First, take a bootstrap sample of the data, and then grow the tree using splits from a randomly-chosen subset of features. This happens for each tree individually without attention to any other trees in the ensemble. However, the trees are correlated purely by virtue of each tree being trained on a sample from a common pool of training data; multiple samples from the same data set will tend to be similar, so the trees will encode some of that similarity.
You might find it helpful to read an introduction to random forests from a high-quality text. One is "Random Forests" by Leo Breiman. There's also a chapter in Elements of Statistical Learning by Hastie et al.
It's possible that you've confused random forests with boosting methods such as AdaBoost or gradient-boosted trees. Boosting methods are not the same, because they use information about misfit from previous boosting rounds to inform the next boosting round. See: Is random forest a boosting algorithm?
A:
The random forests is a collection of multiple decision trees which are trained independently of one another. So there is no notion of sequentially dependent training (which is the case in boosting algorithms). As a result of this, as mentioned in another answer, it is possible to do parallel training of the trees.
You might like to know where the "random" in random forest comes from: there are two ways with which randomness is injected into the process of learning the trees. First is the random selection of data points used for training each of the trees, and second is the random selection of features used in building each tree. As a single decision tree usually tends to overfit on the data, the injection of randomness in this way results in having a bunch of trees where each one of them have a good accuracy (and possibly overfit) on a different subset of the available training data. Therefore, when we take the average of the predictions made by all the trees, we would observe a reduction in overfitting (compared to the case of training one single decision tree on all the available data).
To better understand this, here is a rough sketch of the training process assuming all the data points are stored in a set denoted by $M$ and the number of trees in the forest is $N$:
$i = 0$
Take a boostrap sample of $M$ (i.e. sampling with replacement and with the same size as $M$) which is denoted by $S_i$.
Train $i$-th tree, denoted as $T_i$, using $S_i$ as input data.
the training process is the same as training a decision tree except with the difference that at each node in the tree only a random selection of features is used for the split in that node.
$i = i + 1$
if $i < N$ go to step 2, otherwise all the trees have been trained, so random forest training is finished.
Note that I described the algorithm as a sequential algorithm, but since training of the trees is not dependent on each other, you can also do this in parallel. Now for prediction step, first make a prediction for every tree (i.e. $T_1$, $T_2$, ..., $T_N$) in the forest and then:
If it is used for a regression task, take the average of predictions as the final prediction of the random forest.
If it is used for a classification task, use soft voting strategy: take the average of the probabilities predicted by the trees for each class, then declare the class with the highest average probability as the final prediction of random forest.
Further, it is worth mentioning that it is possible to train the trees in a sequentially dependent manner and that's exactly what gradient boosted trees algorithm does, which is a totally different method from random forests.
A:
Random forest is a bagging algorithm rather than a boosting algorithm.
Random forest constructs the tree independently using random sample of the data. A parallel implementation is possible.
You might like to check out gradient boosting where trees are built sequentially where new tree tries to correct the mistake previously made.
| |
Sherlock has finally caught Jim Moriarty in his own trap. Jim had called Sherlock to the amusement park to play one of his mind games, but he wasn't aware that the Sherlock had beforehand bugged the whole place with his newly invented device, which tells Sherlock the chances of Moriarty being at a particular place in the park. The design of the Amusement park if plotted on a graph is in the form of a tree having no self-loops or multiple edges of $N$ vertices and rooted at index $1$. Sherlock's device returns an array of length $N$ consisting of integers. The Higher the value of integer at $ith$ index the higher is the probability of Moriarty being at Vertex $i$. Let the array be denoted by $K$. Sherlock knows that Jim Moriarty is no fool and he can't just go to each vertex in search of Moriarity as he might run away. He devises a plan of selecting a subset of the nodes in the tree and visiting all vertices of the subset. He wants to select nodes for the subset such that he has the highest chance of catching Moriarty without alerting him. For not alerting Moriarty he says that if he visits a vertex $i$ he would not visit next $J$ levels directly below the vertex $i$. $J$ is calculated by taking the $xor( ⊕ )$ of all the values $K[a]$ where $a$ denotes the index of all the selected ancestors of $i$ and $i$ as well. let's say sherlock selected some vertices from the tree by keeping the above condition in mind, then the total value of the subset would be $∑ K[v]$ where $v$ denotes all the selected vertices. You know Sherlock is Damn smart and he can find the optimal subset without your help, but for that, Sherlock would have to use his special medicines(You know what I mean) to check all the valid Combinations and chose the best subset of vertices. But as he has promised his friend Dr Watson of not taking these drugs(oops I said that) ever again, he has asked for your help. Help Sherlock maximise the total value. $MISS$ $ME!!!!$ $Note$- $1.)$ if $i$ node is chosen and no ancestors of $i$ are part of the subset of selected vertices, then the value of $J$ at node $i$ will be just $K[i]$. $2.)$ the subset of selected vertices should follow Sherlock's strategy, i.e no node should be present in the subset which violates the given condition. ###Input: - First line will contain an integer $N$ denoting the no. of vertices in the tree. - Second line will contain an array $K$ of length $N$ containing the values returned by the special device. Then $N-1$ lines follow denoting the Connections in the Tree. - Each line consists of a single line of input, two integers $X, Y$, denoting a connection between $V$$X$ and $V$$Y$. ###Output: Output a single line containing the maximum possible sum by selecting some/all(if possible) vertices from the tree keeping the above conditions in mind. ###Constraints - $1 \leq N \leq 1000$ - $0 \leq K[i] \leq 1023$ $where$ $K[i]$ $denotes$ $the$ $value$ $at$ $vertex$ $i$ ###Sample Input: 8 1 1 1 1 1 1 1 1 1 2 2 3 2 4 3 5 3 6 4 7 4 8 ###Sample Output: 7 ###EXPLANATION: If we select vertices $2,5,6,7,8$ then we get a total of 5. See that the given set does not violate the required condition. If we select vertices $1,3,4,5,6,7,8$ then we get a total of 7. See that even this set does not violate the required condition. the J in this case for vertex 1=1 , vertex 3= 0(1 xor 1), vertex 4=0(1xor1) Vertex 3 and vertex 4 have J=0 because 1 is their ancestor. So the maximum answer is 7. | https://www.codechef.com/problems/MISSME |
Q:
Euler gamma function differential
Do you have any piece of advice on how to calculate a differential of an Euler Gamma function for $ x \in R- Z $?Thank you for all your answers.
A:
Since $\Gamma(x)$ is a convex function of $x$,
$$
\small\overbrace{\frac{\log(\Gamma(x+n))-\log(\Gamma(x+n-1))}{(x+n)-(x+n-1)}}^{\large\log(x+n-1)}
\le\overbrace{\frac{\Gamma'(x+n)}{\Gamma(x+n)}}^{\large\frac{\mathrm{d}}{\mathrm{d}x}\log(\Gamma(x+n))}
\le\overbrace{\frac{\log(\Gamma(x+n+1))-\log(\Gamma(x+n))}{(x+n+1)-(x+n)}}^{\large\log(x+n)}\tag{1}
$$
Thus, for a fixed $x$, $(1)$ says
$$
\frac{\Gamma'(x+n)}{\Gamma(x+n)}=\log(n)+O\!\left(\frac1n\right)\tag{2}
$$
The recursion for $\Gamma(x)$ yields
$$
\begin{align}
\Gamma(x+n)&=(x+n-1)(x+n-2)\cdots x\,\Gamma(x)\tag{3}\\[6pt]
\log(\Gamma(x+n))&=\log(x+n-1)+\log(x+n-2)+\cdots+\log(x)+\log(\Gamma(x))\tag{4}\\
\frac{\Gamma'(x+n)}{\Gamma(x+n)}&=\frac1{x+n-1}+\frac1{x+n-2}+\cdots+\frac1x+\frac{\Gamma'(x)}{\Gamma(x)}\tag{5}
\end{align}
$$
Rewriting $(5)$ and applying $(2)$, we get
$$
\begin{align}
\frac{\Gamma'(x)}{\Gamma(x)}
&=\frac{\Gamma'(x+n)}{\Gamma(x+n)}-\left(\frac1x+\frac1{x+1}+\cdots+\frac1{x+n-1}\right)\tag{6}\\
&=\log(n)+O\!\left(\frac1n\right)-\left(\frac11+\frac12+\cdots+\frac1n\right)\tag{7}\\
&+\left(\frac11+\frac12+\cdots+\frac1n\right)-\left(\frac1x+\frac1{x+1}+\cdots+\frac1{x+n-1}\right)\tag{8}\\
&=-\gamma+O\!\left(\frac1n\right)+\sum_{k=0}^{n-1}\left(\frac1{k+1}-\frac1{k+x}\right)\tag{9}\\
&=-\gamma+\sum_{k=0}^\infty\left(\frac1{k+1}-\frac1{k+x}\right)\tag{10}
\end{align}
$$
| |
Q:
Draw a bowling formation
Your goal is to display ASCII art of a formation in ten-pin bowling where only some of the pins remain. Fewest bytes wins.
The tens pins are in a triangular formation:
O O O O
O O O
O O
O
Pins are labelled from 1 to 10 as:
7 8 9 10
4 5 6
2 3
1
Drawing pins as O and missing pins as ., the formation 1 3 5 6 9 10 is:
. . O O
. O O
. O
O
Input:
A space-separated string that lists a nonempty subset of the numbers 1 though 10 in order.
Output:
Print the corresponding formation or output it as a string with linebreaks.
The formation should be flush with the left of the screen. Any whitespace is fine as long as the visible image is correct. Empty lines before and after are fine too.
Test cases:
>> 1 2 3 4 5 6 7 8 9 10
>> 7 10
O . . O
. . .
. .
.
>> 3 5 7 9 10
O . O O
. O .
. O
.
>> 1
. . . .
. . .
. .
O
A:
brainfuck - 617 616 604 bytes
+>>>>,[>++++[<-------->-]<[>>>>],]<<<<[>+<<+<+>>-]<[>+<-]+<+<<[>+>-<<-]>[<+>-]>[,+++++[>+++++<-]>>[<->-]<[>>>>>[>>>>]+[<<<<]<-]>>[<+>-]<<<]>[>>[,<]<<+++++++++<]<<<[-[+>>-<]>[>>[<+<+>>-]<<<<[>+>-<<-]>[<+>-]>[<<[<<<<]>>>>[[<<<<+>>>>-]>>>>]<<<<+>>-]>[>+<-]]<<<[-[+>]+<<<<]>>>>-<<<<<]>>>>>+++++[>----<-]>->[<+>>+<-]<[<<<[<<<<]+[>>>>]<-]>>[<+>-]<[<<<<]>>>++++[<-------->-]>[-[,+++>]+>>>[<<<->>]>]<<<<<[>-]>[>>]>>+[<++++[<++++++++>-]<]>>[+++++++++++++>>>>]<<<<----<+++[<<+<<[<<+<<]+[>>>>]<<<<-]<<<<[-<<<<]>[.,>>]<<<<<[<<<<]<++++++++++<<.<+<<+<<+<<+<<+<[.,>>]<<<<<[<<]>++++++++++<+<<+<<+<..<+<[.,>>]<[<<]<...<<.
This took me the better part of two days. I think it was worth it. There's probably parts that can be golfed more by changing what cell something is stored in or whatever, but right now I'm just happy I got it working.
This program would have to be completely different if the question didn't specify that the input would be sorted. The way this works is by constructing a list of 10 pins around the ones that are input. That's kind of confusing but maybe this will explain it better:
If you input these pins: [2, 3, 6, 8, 9]
First, the program does this: [2, 3, 6, 8, 9] + [10]
Then this: [2, 3, 6] + [7] + [8, 9, 10]
Then this: [2, 3] + [4, 5] + [6, 7, 8, 9, 10]
Finally, this: [1] + [2, 3, 4, 5, 6, 7, 8, 9, 10]
To build this: [1, 2, 3, 4, 5, 6, 7, 8, 9, 10]
While it's doing that, it remembers which of the pins the user put there and which ones it put there. This strategy would be very difficult to use if the input wasn't sorted.
Another thing that the sorting make easier is detection of the number 10. Since brainfuck deals with individual bytes, not "numbers" per se, it could have been a pain in the ass, but the sorted input made it much easier for me to deal with. The reason for that has to do with how I stored data in the program. I take the input one character at time and subtract 32 from the result. If the cell is non-zero after that, I move forward 4 cells. before repeating. This means that I get a non-space byte of input every 4 cells, and I effectively store pins as their number + 16. However, 10 takes two bytes to type, so I had to special case it. If the input wasn't sorted, I'd have to look through the pins, but since it is sorted it will always be the last pin if it appears. I check if the (last byte of input + 1) == (the second last byte of input) and if so, it must be 10. I get rid of the last byte and set the second last one to what my system understands as "10". The characters '1' and '0' don't fit in a single byte, but the number 26 sure does!
Coming up with tricks just to make something work at all is my favourite part of using this language. :)
If you're interested in how this program works in more detail, you can see the program with the comments I used while writing it to make sure I remembered what everything did. Even writing comments in brainfuck is hard, since there's no comment syntax. Instead, every character except those in <[+.,-]> are no-ops. It's easy to introduce bugs by accidentally including . or , in your comments! That's why the grammar is so wonky and semicolons are everywhere.
EDIT: As an example of how easy this is to screw up: I used "non-space" in one of the comments! When I stripped all the non-bf characters from the source, the program I used to do that kept in the -. Luckily it didn't break anything, but now I've removed it to save a byte. :)
EDIT II: It's been a while since I touched this one, haha. In another brainfuck answer on this site, I noticed that I accidentally used a comma in the commented version. Since the input had already been exhausted, it set the current cell to 0 (this is implementation dependant, but in my experience it's the most common behaviour). I fixed the bug, but it got me thinking. The idiomatic way to set a cell to 0 is [-] (roughly while (*p) { *p--; }), which is two bytes longer. Any time all the input has been read, I can use , instead. This saved me 2 bytes in that answer, and 12 in this one!
one flag at the very left; will be important later
+>>>>
all nonspace bytes of input separated by 3 empty cells; pin number `n` stored with value `n` plus 16
,[>++++[<-------->-]<[>>>>],]<<<<
test if last pin is 10
[>+<<+<+>>-]<[>+<-]+<+<<[>+>-<<-]>[<+>-]>
[
if not: find 10 minus the number it is; put that many placeholder pins (cells with value 1) at the end
,+++++[>+++++<-]>>[<->-]<[>>>>>[>>>>]+[<<<<]<-]>>[<+>-]<<<
]>
[
if so: get rid of '0' byte; convert '1' byte to 26 (10 plus 16)
>>[,<]<<+++++++++<
]<<<
pointer now sitting on the cell with the second greatest pin that was inputted (ie not a placeholder)
;;;;;;;
[
check for flag placed at the very beginning of the program; if present: break
-[+>>-<]>
[
find ((pin to our right) minus 1) minus pin to our left
move all pins left of us 4*(that value) cells and insert placeholder pins
>>[<+<+>>-]<<<<[>+>-<<-]>[<+>-]>[<<[<<<<]>>>>[[<<<<+>>>>-]>>>>]<<<<+>>-]>[>+<-]
]
find first non placeholder pin to our left
there has to be one because we haven't hit the flag yet
<<<[-[+>]+<<<<]>>>>-<<<<<
]>>>>>+
we have now added placeholder pins at the end and in the middle; all that's left is the beginning
subtract 17 from lowest pin and put that many placeholders to the left
++++[>----<-]>->[<+>>+<-]<[<<<[<<<<]+[>>>>]<-]>>[<+>-]
subtract 32 from an empty cell 2 to the left of the lowest pin; will be useful later
<[<<<<]>>>++++[<-------->-]>
placeholder pins have the value 1; real pins have a value somewhere between 17 and 26
normalize it by stepping through and setting every pin with value != 1 to 3 (0's ascii code is 2 higher than period so this will make it easier to print later)
[-[,+++>]+>>>[<<<->>]>]<<<<<[>-]>[>>]>>
start writing 32s across the board; hitting every second cell
that's every pin and the cell 2 to the right of each pin
this is done in such a way that it will only halt if adding 32 to a cell sets it to 0; which is why we subtracted 0 from an empty cell earlier
it will catch us and prevent an infinite loop
+[<++++[<++++++++>-]<]
now write 13 to each pin; this adds up to 46 or 48; which are exactly the ascii values we want
>>[+++++++++++++>>>>]
we happen to have made a 14; turn it into a 10 for a newline
<<<<----
we're so close now; i can taste it
we have a list of 10 pins; each one with the ascii value that needs to be written
we have 32 everywhere because we'll need spaces
we even have a newline
the only problem now is that our list looks like this:
;;;;;;;;;;;;;;;;;;;;;;;;
;;1 2 3 4 5 6 7 8 9 10;;
;;;;;;;;;;;;;;;;;;;;;;;;
and we need to print in this order:
;;;;;;;;;;;;;;;;;;;;;;;;
;;7 8 9 10 4 5 6 2 3 1;;
;;;;;;;;;;;;;;;;;;;;;;;;
it's a pretty simple fix
once we print a pin we obviously don't need to remember it any more
so we simply print the last 4 pins on the list; destroying them on the way
then we print the last 3; which have become the ones we want
then two; then one
<+++[<<+<<[<<+<<]+[>>>>]<<<<-]<<<<[-<<<<]
print pins 7 8 9 10
>[.,>>]
print pins 4 5 6
<<<<<[<<<<]<++++++++++<<.<+<<+<<+<<+<<+<[.,>>]
print pins 3 2
<<<<<[<<]>++++++++++<+<<+<<+<..<+<[.,>>]
print the final pin!! :)
<[<<]<...<<.
A:
Python 2, 108 bytes
def f(x):
for i in 4,3,2,1:print" "*(4-i)+" ".join(".O"[i*~-i/2-~z in map(int,x.split())]for z in range(i))
Call with f("3 5 7 9 10").
i is the row number, with 4 being the first row and 1 being the last. z is the nth pin on that row, with 0 meaning it's the first pin in the row and i-1 meaning it's the last pin in the row.
The main hack is i*~-i/2-~z, which converts (i, z) -> pin number. For example, (4, 0) -> 7 as pin 7 is the first pin on row 4 (the first row). The derivation goes like this:
We want a function taking i to the first pin on row i, i.e. 4 -> 7, 3 -> 4, 2 -> 2, 1 -> 1. This is satisfied by (i**2-i)/2 + 1, and thus (i**2-i)/2 + 1 + z gives the correct pin number for input (i, z)
Then simplify:
(i**2-i)/2 + 1 + z
= (i*(i-1))/2 + 1 + z
= i*~-i/2 + 1 + z
= i*~-i/2-~z
Pyth, 33 bytes
V4~Z-4N+*dNjdm@".O"}+d-11Zrz7U-4N
Try it online.
The program roughly translates to:
z = input()
Z = 0
for N in range(4):
Z += 4-N
print(" "*N + " ".join(".O"[d+11-Z in map(int, z.split())] for d in range(4-N)))
(Thanks to isaacg for tips)
A:
Pyth, 31
V4+*dNjdm?\O}+7+dZrz7\.rN4~Z-N4
Try it here.
V4 sets up a for loop, with N as the variable over [0,1,2,3].
*dN provides the initial spaces, because d is space.
To find the pin locations, it uses +7+dZ - 7 + d + Z.
d is:
0 1 2 3
1 2 3
2 3
3
while Z is 0 in the first line, -4 in the second, -7 in the third and -9 in the forth. This is becasue Z starts as 0, and ~Z-N4 decrements Z by 4, then 3, then 2.
Then, it checks if the pin location is in the input, using }+7+dZrz7. rz7 is the desired pins in list-of-int form.
Then, it creates an O if it was present, and . otherwise. This is space separated, with jd, and printed implicitly.
| |
Guava contains the simple, yet very useful class
Strings, with some useful methods to help you work with strings. Notable among them are:
nullToEmpty: given a String, returns it if it’s not
nulland the empty string
""otherwise. Useful to sanitize inputs when you don’t know whether the caller will use empty strings or null.
isNullOrEmpty: given a String, returns true if it is
nullor the empty string
"".
Some other useful methods are:
padStartand
padEnd, which can be used to ensure that a given string has a minimum length by adding characters to them.
commonPrefixand
commonSuffix, which return the longest common prefix or suffix of two strings.
repeat, which simply returns n copies of the given string.
Here are some (pretty trivial) examples: | https://andreabergia.com/guava-tips-strings/ |
Taekwondo, Tae Kwon Do or Taekwon-Do is a Korean martial art, characterized by its emphasis on head-height kicks, jumping spinning kicks and fast kicking techniques with kicks and striking being above waist height only.
Promotion to a Black Belt is about three main criteria: Knowledge, Skill & Character.
In Taekwondo, it would take a dedicated student approximately 3-5 years to attain a 1st Degree Black Belt.
We Offer A Great Range Of: | https://www.shogunmartialarts.com.au/tae-kwon-do |
› Budget Menu & Dirt Cheap Recipes › General Recipes › 30-Minute Mini Meat Loaves
- This topic has 1 reply, 1 voice, and was last updated August 26, 2009 at 12:34 am by .
- AuthorPosts
- August 26, 2009 at 12:34 am #275573
Prep Time: 10 min
Total Time: 30 min
Makes: 6 servings (2 loaves each)
1/2 cup ketchup
2 tablespoons packed brown sugar
1 lb lean (at least 80%) ground beef
1/2 lb ground pork
1/2 cup Original Bisquick® mix
1/4 teaspoon pepper
1 small onion, finely chopped (1/4 cup)
1 egg
1. Heat oven to 450°F. In small bowl, stir ketchup and brown sugar until mixed; reserve 1/4 cup for topping.
In large bowl, stir remaining ingredients and remaining ketchup mixture until well mixed.
2. Spray 13×9-inch pan with cooking spray. Place meat mixture in pan; pat into 12×4-inch rectangle.
Cut lengthwise down center and then crosswise into sixths to form 12 loaves. Separate loaves, using spatula, so no edges are touching. Brush loaves with reserved 1/4 cup ketchup mixture.
3.
Bake 18 to 20 minutes or until loaves are no longer pink in center and meat thermometer inserted in center of loaves reads 160°F.
Substitution
While the mixture of ground beef and pork gives these little loaves a unique flavor, you can also use 1 1/2 pounds of ground beef instead of the mixture.
Serve With
Serve these loaves alongside cooked baby-cut carrots and mashed potatoes. Apple or cherry crisp is a sweet way to end the meal.
Nutrition Information:
1 Serving: Calories 300 (Calories from Fat 140); Total Fat 16g (Saturated Fat 6g, Trans Fat 1g); Cholesterol 105mg; Sodium 440mg; Total Carbohydrate 17g (Dietary Fiber 0g, Sugars 11g); Protein 22g Percent Daily Value*: Vitamin A 8%; Vitamin C 4%; Calcium 4%; Iron 15% Exchanges: 1 Starch; 0 Other Carbohydrate; 0 Vegetable; 3 Medium-Fat Meat; 1/2 Fat Carbohydrate Choices: 1
*Percent Daily Values are based on a 2,000 calorie diet.
- AuthorPosts
- You must be logged in to reply to this topic. | https://www.budget101.com/community/topic/30-minute-mini-meat-loaves/ |
et·y·mol·o·gy (ĕt'ə-m�?l'ə-jē) pronunciation
n., pl. -gies.
- The origin and historical development of a linguistic form as shown by determining its basic elements, earliest known use, and changes in form and meaning, tracing its transmission from one language to another, identifying its cognates in other languages, and reconstructing its ancestral form where possible.
- The branch of linguistics that deals with etymologies.
[Middle English etimologie, from Old French ethimologie, from Medieval Latin ethimologia, from Latin etymologia, from Greek etumologi�? : etumon, true sense of a word; see etymon + -logi�?, -logy.]
Lets look at some Etymological roots of some familiar words:
- Want (and the word "Vacant" come from the same root) which is to be empty
- Anxiety (and Worry come from a smiliar root) which is associated with choking, asphixating the breath
- Appetite (and desire)
- "to be" comes from an Indo-European root which evidently meant becoming lost in the woods. | https://wiki.s23.org/wiki/Etymology |
Meal Times, Intermittent Fasting, and Caloric Restriction Excerpt
Let’s get back to the crux of the matter – can how many meals you eat influence your total caloric intake? During the fasting month of Ramadan Muslims abstain from food and drink from dawn until sunset. Numerous studies demonstrate that this dietary pattern causes a spontaneous reduction in the caloric intake and a slight weight loss. To date, no clinical studies have examined how a single large evening meal influences weight over the long term – say 6 months or longer. The consumption of a single daily meal is a form of intermittent fasting which in animal models causes them to spontaneously reduce their caloric intake by 30%. Additionally, intermittent fasting reduces blood pressure, improves insulin sensitivity, improves kidney function, and increases resistance to disease and cancer. | https://thepaleodiet.com/meal-times-intermittent-fasting-caloric-restriction/ |
Ah, the warm, sweet, oaky smell of bourbon whiskey. If you’re a lover of craft/specialty coffees, chances are good th...
Feb 24, 2017
Press Release: New Rural-Urban Business Partnership Formed to Advance Speciality Coffee in Iowa
[2018 Update: While RSR & Brewhemia still have a great relationship together, their shares of RSR were sold back...
Feb 17, 2017
Gear Review: The Handground manual coffee grinder
The story of the Handground coffee grinder and my relationship to it is an interesting one. Unlike most pieces of co...
Oct 23, 2016
Relationships Matter: Year 2 with Gold Mountain Coffee Growers
At this time last year, we were just over a month old in terms of our being state inspected & licensed to ... | https://www.rossstreetroasting.com/blogs/roasters-blog/tagged/coffee-roasting |
Increasing interest in oceanography and marine biology and its relevance to global environmental issues continues to create a demand for authoritative reviews summarizing recent research. Now in its 49th volume, Oceanography and Marine Biology has addressed this demand for almost 50 years. This annual review considers the basics of marine research, special topics, and emerging new areas. Regarding the marine sciences as a unified field, the text features contributors who are actively engaged in biological, chemical, geological, and physical aspects of marine science. This year’s chapters include, "The marine invasive alien species in European Seas that have the most impact," "Threats to the diversity of coral-dwelling invertebrates due to climate change and induced coral bleaching," and "Burrowing shrimps as ecosystem engineers," among others. Including color inserts and extensive reference lists, this series is essential for researchers and students in all fields of marine science.
Impact of Ocean Warming and Ocean Acidification on Marine Invertebrate Life History Stages: Vulnerabilities and Potential for Persistence in a Changing Ocean, Maria Byrne
Coral-Associated Invertebrates: Diversity, Ecological Importance and Vulnerability to Disturbance, Jessica S. Stella, Morgan S. Pratchett, Pat A. Hutchings & Geoffrey P. Jones
From Microbes to People: Tractable Benefits of No-Take Areas for Coral Reefs, Nicholas A.J. Graham, Tracy D. Ainsworth, Andrew H. Baird, Natalie C. Ban, Line K. Bay, Joshua E. Cinner, Debora M. De Freitas, Guillermo Diaz-Pulido, Maria Dornelas, Simon R. Dunn, Pedro I.J. Fidelman, Sylvain Foret, Tatjana C. Good, Johnathan Kool, Jennie Mallela, Lucie Penin, Morgan S. Pratchett & David H. Williamson
Bioengineering Effects of Burrowing Thalassinidean Shrimps on Marine Soft-Bottom Ecosystems, Deena Pillay & George M. Branch
Estimating Connectivity in Marine Fish Populations: What Works Best? Jeffrey M. Leis, Lynne Van Herwerden & Heather M. Patterson
The Use of Sediment Profile Imaging (SPI) for Environmental Impact Assessments and Monitoring Studies: Lessons Learned From the Past Four Decades, Joseph D. Germano, Donald C. Rhoads, Raymond M. Valente, Drew A. Carey & Martin Solan
We provide complimentary e-inspection copies of primary textbooks to instructors considering our books for course adoption. | https://www.crcpress.com/Oceanography-and-Marine-Biology-An-Annual-Review-Volume-49/Gibson-Atkinson-Gordon/p/book/9781439853641 |
Use this Digital Object Identifier when citing or linking to this resource.
Abstract
Non-Hodgkin lymphoma is a heterogeneous group of malignancies characterised by various behaviours and prognoses. Two of the most common subtypes are diffuse large B-cell lymphoma and follicular lymphoma, where patients with either can have markedly different health outcomes. Survival probability is commonly used to measure the performance of a healthcare system in managing cancer patient health outcomes in a population, such as England. In England, the National Health Service is responsible for the care and management of patients and their health outcomes, and is committed to providing equal access to healthcare regardless of the patient’s underlying characteristics. However, although cancer patients are now more likely to live to 5 years after diagnosis, there are vast inequalities in survival between patient characteristics. Socioeconomic inequalities in survival, for all cancers, have narrowed since the late 20th century but these socioeconomic-gaps in survival persist. Comorbidity, the presence of a chronic disease unrelated to the cancer, is more prevalent amongst individuals living in more deprived areas. These socioeconomic gaps in survival may be explained by the presence of comorbid conditions or by the interaction between patients and the healthcare system. The aim of this PhD is to investigate the inequalities in survival of patients with non- Hodgkin lymphoma in England using population-based cancer registry data linked to other population-based health outcomes databases. This thesis includes one paper investigating the association between patient and healthcare pathway characteristics and long-term survival probabilities, another paper that focuses on inequalities in short-term survival probability, and a final paper on inequalities in diagnostic delay. An additional paper was written concurrently to this thesis that provides a tutorial on the methods, amongst others, that were used for the paper investigating short-term survival. | https://researchonline.lshtm.ac.uk/id/eprint/4663979/ |
What is a financial statement? In layman’s term, financial statement shows you where a company’s money came from, where it went and where it is now. Reading a financial statement can be hard to some people but once you learned the basics of financial statement, it will be easy just like reading an electricity, credit card bill or bank statement of account.
In reality, it is not complicated. You can understand financial statement of a company since you know how to read a billing statement of a bank account or from utility companies. It only requires little perseverance when you want to know the basic of financial statement.
So the question is: Why do you need to study financial statement? A financial statement is a documentation of the company’s financial status or condition. It is very helpful for an investor because it will determine if a company is a good investment or not.
A financial statement will give you the financial information about the company such as its liabilities, earnings, cash flows and assets. It is an important tool to determine if the company is increasing its earnings or losing money and it can be simply understand by the readers. It is a simple report which is usually in tabulated form.
A financial statement can be divided into four parts: balance sheets, income statements, statements of shareholder’s equity and cash flow statements. Balance sheets give details what are company’s liabilities and assets in a particular period. Income statement, on the other hand, shows how the company’s revenue is transformed into the net income.
In a financial statement, a cash flow statement details how cash comes in and out in the balance sheet and income of the company and shows the investing and financing activities of the company. The fourth part is the statement of shareholder’s equity that gives the changes on the company’s shareholders over the time.
In conclusion, a financial statement is a good tool to evaluate the profitability of a company when someone want to buy its stock. It details the performance of the company and gives the present condition of the company’s financial status. | http://ihatehartford.info/?paged=2 |
After 46 years of successful programming and growth, the Thunder Bay Art Gallery is embarking on an exciting new development - a beautiful new facility on the shore of Lake Superior at Thunder Bay's waterfront.
Due to open in 2025, the new building will feature twice the space for exhibitions and education programming and will include a cafe, event spaces, outdoor art and gathering places, and a connection to the waterfront trail. Influenced by a strong Indigenous narrative, the building will embrace the surrounding landscape with spectacular views of Lake Superior and Nanabijou.
A bold project called Madaabii has been supported through the Canada Council New Chapter Program in celebration of the new facility. Madaabii translates in Anishnaabemowin as s/he/they goes down to shore.
This ambitious, large-scale multidisciplinary art project draws inspiration from Gichigami (Lake Superior), one of the world's largest sources of freshwater. The project has engaged 27 artists to create works inspired by the cultural and industrial history, ecology, and sacredness of this living body of water. These works will form the first exhibition when the Thunder Bay Art Gallery goes down to the water's edge to open its new facility.
THE POSITION
Thunder Bay Art Gallery (the Gallery) is seeking a dynamic Executive Director to lead the organization into its bold and exciting new era. The successful applicant will assume responsibility for the strategic and financial direction and overall management of the Thunder Bay Art Gallery and will bring a vision for community engagement, inclusivity, and a desire to amplify the voices of artists in Northwestern Ontario and Indigenous artists from across Turtle Island.
The Executive Director (ED) of the Gallery is responsible to the Board for the fulfillment of the Gallery's mission and strategic goals by providing artistic and administrative management and leadership of all aspects of the Gallery's operations.
This coming summer, current Executive Director Sharon Godwin will step aside to oversee the construction of the new facility and to allow the new Executive Director to manage the current facility and to focus on developing the strategy for the long-term operation of the new building. The new ED will then transition and assume leadership of the new gallery once built.
RESPONSIBILITIES
Strategic Leadership
- Accountable for Thunder Bay Art Gallery's strategic direction, work closely with staff and Board to ensure the institution's vision, values, and policy statements are developed ambitiously and embodied compellingly.
- Realize the Gallery's strategic goals through comprehensive and effective business planning.
- Develop the Gallery's institutional and artistic identity through oversight of all curatorial, communications, and development activities.
- Develop and implement appropriate strategies for engaging with and growing diverse audiences including First Nation (Anishinabe, Mushkeygo, Haudenosaunee) and Metis communities.
Gallery Operations
- Oversee the development and implementation of a balanced exhibition and education program including public and outreach programming, publishing, and original touring exhibitions, ensuring that programs reflect the Gallery's mandate and strategic plan.
- Provide guidance and direction to the Curator and Curatorial team to ensure exhibitions meet the Gallery's goals. Oversee management and growth of the permanent collection.
- Develop, implement, and monitor policies, procedures, and guidelines for all areas of Gallery operations.
- Set and achieve earned revenue targets through memberships, donations, sponsorships, fundraising activities and special events, and retail functions.
- Lead in the development and stewardship of fundraising strategies including funders, donors, sponsors, agencies, foundations, etc., including the development of strategic partnerships and submission of government and other funding applications.
- Lead by example and ensure adherence by staff, volunteers and Board Members to professional and ethical standards.
- Foster and maintain professional contact with members of the arts community, local businesses and non-profit groups, government agencies, funders, financial institutions, service providers and the general public.
- Liaise with and create community partnerships with a special emphasis on regional and Indigenous people, groups, and organizations.
- Focus on the work of contemporary Indigenous and Northwestern Ontario artists; advance the relationship between artists, their art and the public, and nurture a life-long appreciation of the contemporary visual arts among residents of and visitors to Thunder Bay.
- Serve as the ambassador and spokesperson of the Gallery, liaise with local media. and actively participate in external events to enhance the Gallery's profile within the community.
- Oversee social media, website, promotional and communication materials.
Human Resources
- Manage the Gallery's human resources (recruitment/hiring, training/development, health and safety, performance management and discipline).
- Develop and implement human resources policies and practices including establishing job descriptions for all staff.
- Establish and maintain a performance management process for all staff; including monitoring performance on an ongoing basis and conducting, at minimum, annual performance reviews; coach and mentor staff.
- Responsible for determining staffing requirements, hiring and retention of competent and qualified staff, and maintaining a strong organizational culture and work climate to attract and retain staff.
Financial & Risk Management
- Responsible for fiscal integrity of the organization, ensuring that the Gallery operates within approved budget guidelines, maximizes resource utilization, and maintains a positive financial position.
- Lead the development and preparation of the annual operating and capital budgets and long-term financial plans, as well as accurate monthly financial statements.
- Provide leadership in developing and implementing strategic fundraising plans to ensure the Gallery's long-range financial viability. Identify and pursue all revenue sources, including private and government, and ensure all grant applications are completed.
- Identify and evaluate risks to the Gallery's people (clients, staff, management, and volunteers), property, finances, goodwill, and image; implement measures to appropriately manage risks.
- Ensure that effective internal controls are in place, and that legal and regulatory reporting requirements are met.
- Oversee the planning, implementation, and execution of special and capital projects.
Board Relations
- Participates with the Board of Directors to develop a vision and strategic plan, establish and implement policies and procedures to guide the organization.
- Provides leadership in implementing strategic objectives; plans, implements and evaluates programs and services ensuring they align with the Gallery's mandate.
- Communicates effectively with the Board and provides, in a timely and accurate manner, all information necessary for the Board to function properly and to make informed decisions.
Waterfront Gallery Construction and Opening
- Collaborates with the Waterfront Project Lead on construction of the new Gallery.
- Collaborates with the AWE Campaign Committee and Waterfront Project Lead to develop and implement a capital fundraising campaign.
- Develops a plan for the opening and sustainable operation of the Waterfront Gallery for approval of the Board.
- Reviews and provides reports to the Board when required.
CANDIDATE QUALIFICATIONS
- A University degree in Arts Administration, Art History, or related discipline, preferably at the graduate level together with five years' experience in a management role, in a non-profit visual arts organization.
- Excellent organizational, administration, time management, and communication skills. Proven leadership ability and financial management skills.
- A proven ability to work effectively with a Board of Directors, professional staff, volunteers, artists, members of the community and community-based organizations.
- Experience writing grant applications to funding agencies, foundations, and government bodies.
- A strong relationship-builder with excellent donor relations skills who connects with the community.
- A track record of successfully generating new revenue streams and improving financial results.
- Ability to collaborate with a wide range of stakeholders, many of whom include diverse groups and cultures.
- Familiarity with Anishinabe, Mushkeygo, Haudenosaunee and Metis community and cultural norms would be an asset.
- Demonstrated leadership and mentorship skills, and ability to plan work and direct employees in a manner that promotes a team environment.
- Proven track record of managing people, developing high-performance teams, managing budgets, and achieving goals.
- Excellent verbal and written communication skills; comfortable speaking in public and communicating passion and excitement for the organization's mission in public messages.
- Ability to think and act strategically, including the ability to conceptualize and implement change strategies.
- Lead by example demonstrating Gallery values in an enthusiastic manner to achieve results individually and through team participation.
- Maintain appropriate professional memberships in the Canadian Art Museum Directors Organization, Galeries Ontario/Ontario Galleries, and others as the representative of the Thunder Bay Art Gallery.
- A commitment to Equity, Indigeneity, Diversity, and Inclusion.
- Available to carry out activities outside of normal working hours.
COMPENSATION
A competitive compensation package will be offered, complete with salary (range between $80,000 to $100,000) and benefits.
|Salary||Between $80,000 To $100,000 per year|
|Languages||English|
|How To Apply||Click Apply Now!|
Please apply by email with your cover letter and resume by no later than February 26th, 2023. Send to: [email protected]
Thunder Bay Art Gallery is committed to employment equity and to fostering a positive and diverse workforce that reflects the community. We welcome applications from individuals of all backgrounds and abilities. Given the Gallery's mandate and location, we particularly welcome applications by individuals who are Indigenous.
Upon request, suitable accommodations are available under the Accessibility for Ontarians with Disability Act (AODA) to applicants invited to an interview.
We thank all applicants for their interest; however, only those being considered for interviews will be contacted by Searchlight Partners. | https://careers.indigenous.link/viewjob?jobname=78-F4-3C-7E-18-BF |
There are total 8 letters in Zombiism, Starting with Z and ending with M.
Zombiism is a scrabble word? Yes (23 Points) Zombiism has worth 23 Scrabble points. Each letter point as below.
An Anagram is collection of word or phrase made out by rearranging the letters of the word. All Anagram words must be valid and actual words.
Browse more words to see how anagram are made out of given word.
In Zombiism Z is 26th, O is 15th, M is 13th, B is 2nd, I is 9th, S is 19th letters in Alphabet Series. | http://wordcreation.info/how-many-words-made-out-of-zombiism.html |
Spinach is a leafy green flowering plant that can be consumed in both raw and cooked forms. While consuming spinach in its raw state can often make it difficult to digest, the nutrients and vitamins that are preserved in this raw vegetable can actually help improve digestion in the long run. According to the University of Tokushima School of Medicine, glycoglycerolipids found in spinach can help protect the lining of the digestive tract.
Chewing
Individuals who do not adequately chew the spinach they consume will often have trouble digesting and excreting the foliage. During the act of chewing, enzymes are released through your saliva which helps in the breakdown of spinach. While over-chewing your food will leave it tasteless, chewing spinach particles until they break down into smaller pieces will aid digestion. According to registered holistic nutritionist Kelly Reith, chewing food into small pieces makes it easier for the digestive juices in your stomach to fully coat the food, improving digestion and overall colon health.
Blending
Whether spinach is a food you have a tough time chewing, or you simply cannot stand the taste of it, combining spinach with other food items through blending is a more palatable way to consume it. Since the first step of digestion begins with chewing, blending and chopping up spinach eliminates this step in your chain of consumption. If you do not like the taste of spinach, placing milk, ice, fruit and berries into a blender with the spinach will help you make a smoothie that masks the taste of the spinach. In addition to masking the taste, it fundamentally changes the texture of the spinach, making it easier to swallow and for your stomach to digest. In addition to smoothies, you can blend it with basil, pine nuts and olive oil to make a pesto that can be spread on other items you eat.
Cooking
While cooking spinach can potentially reduce the vitamin C levels in the plant, the act of steaming or boiling spinach can actually help preserve its antioxidants. If you do not like chewing and swallowing raw spinach, steaming and boiling the vegetable will soften the texture, making it easier to both chew and swallow, as well as naturally lubricate the vegetable through condensation. Frying or cooking your spinach in any substance, such as olive or cooking oil, will change the health benefits of the vegetable as well as alter the way in which your body digests the food. Adding fat and unhealthy oils to your spinach will only make it more difficult for your stomach to digest and process.
Repetition
According to the Hygiene Library Catalogue, making spinach a regular part of your diet will improve your body's ability to process and digest the foliage. If you are an individual who initially has trouble digesting raw spinach, try integrating it into meals several times a week. As your body adjusts to the unique texture and chemical makeup you will find a reduction in symptoms with respect to digesting and passing spinach. In addition, keeping spinach a regular part of your diet will help your digestive track get the full benefit of the glycoglycerolipids found in spinach. | https://www.livestrong.com/article/552886-making-spinach-more-digestible/ |
At the University of Twente, we are pioneers infusing technology, science and engineering with social sciences to impact the world around us. Our driving force as students, scientists and educators is a deep sense of connection with people who share a curious, entrepreneurial spirit.
The challenges of our time are greater than before: global resilience, the digitalization of society, the improvement and personalization of healthcare, the reshaping of the world with smart materials and intelligent manufacturing. Technology has a leading role to play in providing solutions for complex societal challenges worldwide - and only people can enable it to shine in that role. In our passion for understanding our planet and improving life for everyone on it, we celebrate the bonds between mankind and technology, knowing that neither could exist, let alone flourish, without the other.
All of our research and education is aimed at making a difference in today’s society, while setting up the next generation for the future. In this pursuit, the entrepreneurial mind-set and global awareness of our many talented scientists, educators and students lead us to move beyond differences, disciplines, borders. The cross-disciplinary way of working that characterizes our university opens up unexpected possibilities - especially in combination with creativity and excellence in scientific disciplines. Our distinctive educational model, engineering approach and open culture generate new ideas, new energy, new ways forward.
A LIVING SMART CAMPUS WHERE CHANGE BEGINS
Since the University of Twente’s founding in 1961, we have been deeply connected with the rich industrial heritage of our region and the well- being of its population. We proudly carry that forward, both at home and internationally. Today we are a catalyst to many high-tech communities and sectors with strong partnerships in a wide range of industries and societal domains. We participate in ground-breaking, globe-spanning networks and programmes. We maintain lifelong connections with more than 50,000 alumni worldwide.
The University of Twente is a multicultural community of talented, ambitious people that offers students, scientists and educators from around the world the best possible conditions:
An innovative and vibrant campus with world-class facilities for crossing boundaries and solving complex problems – including state-of-the-art facilities, such as our world-renowned NanoLab, our newly formed Designlab and a new Technical Medical Centre currently.
An engineering approach to societal challenges, merging fundamental technological and social science research with systematic solution designing.
Core technologies, among the world’s best, in fields such as nanotechnology and biomedical engineering, IT, robotics and geo-information science.
Highly personal education, applying student-driven learning and project-based teamwork to foster synergy, (self-)discovery and out of the box problem-solving.
An outstanding track record in value creation, starting up and spinning off new businesses (with some 1,000 successful ventures to date) and giving shape to new expressions of social and industrial engagement.
Over time, inspiring, curious people have combined their experience in technology, science and engineering with social sciences to initiate change, progress, renewal.
We call this ‘high tech human touch’. And we believe it is more relevant today than ever before.
SOCIETY IN 2030: CONTRIBUTING TO A FAIR, SUSTAINABLE AND DIGITAL SOCIETY
In the spirit of this mission, we envision a society in 2030 in which we seize the technological opportunities of our time with confidence and wisdom. In the coming decade, society will face many challenges. It can only hope to overcome these with the full engagement of the scientific community. The UT believes in a focused ambition that involves setting clear priorities in education, research and innovation at the touchpoints between these challenges and our own identity. Given the UT’s mission to be a university of technology that puts people first, we direct special attention to three societal themes and the challenges they pose; these can all be framed in a single question: how can we contribute to the development of a digital, fair, and sustainable society between now and 2030?
A FAIR SOCIETY IN 2030: MAKING HUMANS MORE HUMANE
Putting ‘people first’ includes all people. We will do whatever is necessary to eliminate societal divides that bar certain individuals, or groups, from access to new technologies, the skills to use them, equality of opportunity, inclusiveness, health and well-being. Technologies have a proven capacity to widen divides, so for a fair society we counteract this tendency. Together with society, we design technologies wisely, so that they add value to people’s lives, and empower them. In the way in which we organise our research and education, we stimulate a culture of personal development, enabling staff and students to make a valuable contribution to society. Through our work, we foster both ambition and social equality.
A SUSTAINABLE SOCIETY IN 2030: WELLBEING WITHIN THE ECOSYSTEM
In an era in which unsustainable ways of living have become the biggest threat to humanity, we create viable solutions. It is our mission to respond to societal needs by developing sustainable, proactive measures to support our planet and the people to which it is home. As a university, we lead by example. We consider sustainability to be a precondition for everything we do, while our diversity nurtures adaptability and resilience. Our recognition of the value of human capital is the single most important key to the long-term well-being of our students and staff, and to the effectiveness of our organisation. Our education, research, innovation and organisation are centred around environmental, social and economic sustainability. This gives us the kind of edge that does not eclipse others, but includes them: an authority that speaks for the good of all. Society welcomes the difference we make through our work, and eagerly joins us in our efforts to create a liveable world for future generations.
A DIGITAL SOCIETY IN 2030: CONTRIBUTING AND BENEFITTING
The Digital Revolution has been the most life-changing technological development of our era. At this very moment, machine learning and artificial intelligence are transforming the way innovations emerge. Given these developments, society has already had to reinvent itself, and so have universities. Our university aims to contribute in two ways to this ongoing transformation. First, our scientific community will contribute by providing revolutionary digital innovations, with special consideration of their long-term implications for all that we value as a ‘people-first’ university of technology. Society can only fulfil its true potential by adopting new ways of appropriating and interacting with technology. Part of our role in this is to develop technologies that match society’s needs, and to monitor the growth of technological intelligence among different population groups. Second, we will benefit from these technologies as well: digital innovations continually shape and reshape our research and education. As digitalization progresses, people will need skills tomorrow that do not yet exist today – basic coping skills, as well as skills that can continue to evolve. Therefore, our educational programmes prepare students for ongoing re-education, while also laying a foundation of skills for professional adaptability and personal development, such as critical thinking, creativity, communication and resourcefulness. Our researchers embody the value of lifelong learning. We invite and equip professionals to keep in step – or to keep ahead of – developments, becoming confident, balanced, digital citizens.
OUR UNIVERSITY IN 2030: WHAT IT WILL LOOK LIKE
In order to have maximum impact on society in 2030, we must become an entrepreneurial, inclusive and open ecosystem with a signature style of working. In pursuit of this ambition for 2030, we can build on the work carried out in the context of our Vision for 2020. Back then, we identified four core values that we still cherish today: internationalization, impact, synergy, and entrepreneurship. We have achieved many of the goals we set ourselves with these values. Looking ahead, we will continue in what we have already mastered, and stretch ourselves where we need to adapt. Here is an impression of what this will look like.
In 2030, we will be living in a digitally mature society – an open world that continues to change. Those involved in creating and managing technologies will have new responsibilities, serving society sustainably as developers, analysts and improvers. We will have grown in our role of helping society to deal wisely with technology. We will be open, and actively engaged in dialogue on the origins and effects of technology and digitalization. We will be collaborating in networks designed to bring out the best in people. Our own people – scientists, students and facilitators alike – will be problem solvers with a recognizable way of working. They will spend their time wisely. They will be able to quickly adjust to a rapidly changing, and often unpredictable, environment. They will be confident, considerate, and driven by curiosity to explore new ways of developing, harnessing and collaborating with the best technologies. Many people will come to us for guidance: to learn what the future of technology means for society, and what the future of mankind requires from technology. Our community will be inclusive and diverse, comprised of people with a rich variety of experiences, backgrounds and identities. At all levels, we will be actively and structurally engaged in personal development towards social sustainability.
The shape and form of our university by the end of the decade will be the result of much experimenting between now and 2030. During this time, we will have learned what it means to continuously reinvent ourselves, our research, our teaching, and the very nature of entrepreneurship and innovation.
Our campus, including both virtual and physical locations, will be a network of living labs and meeting places - places where students have reliable and transformative learning experiences. In 2030, our physical locations will not be limited to our campus in Twente: we will be present at multiple strategic sites. These will all be centres of innovation, social exchange and networking, offering a safe and open environment to those who study, work, gather and live there. With new types of students as well as public and private organisations populating these places, our infrastructure will provide flexible spaces for new ways of collaborative working.
GETTING IN SHAPE: OUR ENTREPRENEURIAL, INCLUSIVE AND OPEN MINDSET
We will set clear priorities and merge our core values into a mind-set that encompasses all that we believe is important for realising our vision for 2030. In every area, we must distinguish what matters most in actualizing our ambition and rising above our current selves. For one thing, this means we must centre our entire organisation more emphatically on our significant strengths. At the same time, we must have the courage to make bold revisions where needed, to develop latent strengths, and to explore new territory. This is part of what it means to live in a transformational epoch: we are part of it, whether we like it or not, and the choice we have is to be either the/a pilot or a passenger. We can make choices that influence the transformation of society. In order to do this, we must cultivate a mind-set and attitudes that enable us to reach for new heights in entrepreneurialism, inclusiveness and openness.
ENTREPRENEURIAL: COURAGE OVER COMFORT
Big challenges call for courageous solutions from wise leaders. We believe these bold answers can be found by leaders through experimenting, pioneering, innovating, risk-taking and venturing. With this in mind, we are out to redefine the essence of entrepreneurial thinking and acting. It is our ambition to inspire new generations of students and researchers by pushing our university’s renowned entrepreneurial attitude to new levels – all with a view to inspiring and guiding our high-tech society. We set new standards for industrial and societal collaboration with maximum student involvement. We pioneer new forms of education that, in turn, inspire and empower students and staff to experiment. We constantly test the limits of technology, science and design through new synergies between scientists, designers, industries, R&D, universities, governments and citizens.
INCLUSIVE: STUDENT OVER SYSTEM
Everyone in our community is learning and is therefore a student. This thriving, talented community of unique individuals is our most crucial asset in serving society. Recognizing, attracting, developing and retaining talent will be an important, even fundamental, requirement. We do not strive to grow in numbers, but in quality. This means raising the bar not only for our services and support, but also for our students and staff as talented individuals who embody an inclusive mind-set and serve society. It also means we will seriously invest in individual well-being, talent development and transformational leadership among our students, staff and teams. Bearing in mind that each talent is unique, we will develop a highly personalized way of giving each talent the best possible support and input, empowering students to reach their potential, and to lead active lives on and off campus. Rules, structures and regulations are helpful means, but not ends in themselves. Personal empowerment means made-to-measure conditions for everyone: conditions designed to help us all grow throughout our lives, while recognizing, developing and rewarding individual talents. We will optimize all conditions within our networks so that talented individuals of all ages and backgrounds can drive their own development, as well as that of their peers.
OPEN: COMMUNITY OVER CAMPUS
True collaboration is essential for the fulfilment of our mission as the ultimate ‘people-first’ university of technology. Being a networked organisation enables us to maximize our impact and reach our goals. We are reliable and ambitious partners in dedicated networks. Science is teamwork, so we engage in connected communities. Be it locally or globally, physically or virtually, we strive to connect with people and their needs and wishes. We cherish the power of our alumni network, leveraging it for the advancement of science, and for addressing societal challenges. We continuously accelerate the development of the Twente region, the Dutch-German borderland, and beyond.
The campus remains our hub, but we reach out far beyond. Together with local communities and partners, we assess societal needs and interests, and use the resulting insights to build our programmes. Our people are part of a major, thriving and open ecosystem, in which we connect across geographical and other boundaries, guided by shared standards of excellence and responsibility,. Our university is a socially, economically, and environmentally sustainable partner.
A crucial factor in this openness is our trustworthiness. We believe trust makes us adaptive, sustainable and resilient. We guard our compliance with the highest standards of integrity, seeking always to honour the trust given to us. We are responsible partners, transparent, and geared to continuous improvement. In our way of working, we seek to minimize control and to maximize trust.
The UT is all about people: people first, as we call it. Everything we do focuses on people, in line with the High Tech Human Touch philosophy of our university. From research and education to personnel management, campus management and the use of new technologies. With Shaping2030 we have committed ourselves to an ambitious vision of the future. In doing so, we are steadily building on the course we have set, we learn anew every day and we inspire and motivate each other to move forward and increase our social impact.
THE POWER OF SHARING
In the coming period, we will be sharing two stories every week. Scientists, support staff, students; in this series they will all tell about what inspires them and how their daily work can be a source of inspiration for others.
History
Fifty years of High Tech Human Touch: the University of Twente, which at its founding in 1961 was still called the Twente Technological University of Applied Sciences (in Dutch: THT Technische Hogeschool Twente), managed to distinguish itself early on by integrating technology with the social sciences. In addition, the 'third technical university of applied sciences' also distinguished itself with her campus terrain and approach to education.
In 1961, the House of Representatives agreed to the establishment of a third technical university of applied sciences in Enschede. Enschede was selected to be the location over Alkmaar and Deventer. The existence of a strong manufacturing industry (textiles, metal, electrical engineering, chemicals), the necessity for innovation of the textile industry and the firm lobby of that textile industry together with the Eastern government agencies, probably were important factors in making this decision. Just as the fact that the municipality of Enschede made the Drienerlo estate available for the first campus University of the Netherlands, this probably was an important factor in making this decision.
Construction started in September 1962. The assignment given to the architects ir. W. van Tijen and ir. S.J. van Embden, was as follows: create a great technical university of applied sciences. The severe winter halted construction for a long time. The University of Twente, then still called the THT, was officially opened by Her Majesty Queen Juliana on 14 September 1964. The first class consisted of two hundred students, including four girls. It wasn't until the summer of 1986 that the university received her current name: the University of Twente. This was the result of the changes in the Dutch Academic Education Act in 1984, as a result of which Dutch HBO schools could take the name University of applied sciences. It was decided to change the name in order to prevent confusion. In 2011 the university celebrated her 50th Dies Natalis in the company of Queen Beatrix.
UNIVERSITY OF TWENTE CANON
On 14 September 1964, three years after the institute was founded, a cohort of around 200 students began their studies at “Technische Hogeschool Twente” (Twente Technical College).
56 years and 51,000 students later, we have a rich history to look back on. Administrative decisions, developments in the community, memorable events and the efforts of a lot of different key persons are the building blocks that have made the University of Twente into an entrepreneurial university that’s not just High Tech, but that also makes room for the Human Touch. We’ve selected the most relevant building blocks to add to the University of Twente canon as ‘windows’ into our back story.
The canon is constantly evolving and is open to debate and discussion. Is there an event, feature or key person you think should be included?
UNIVERSITY OF TWENTE
DRIENERLOLAAN 5
7522 NB ENSCHEDE
0031 53 489 9111
[email protected]
Route
The University of Twente (UT) offers prestigious KIPAJI scholarships to brilliant students from the Least Developed Countries (DAC) or countries with upcoming economies like in South America, Africa, and Asia to provide them the means to pursue their master’s education at the University of Twente. Kipaji Scholarship support students who also receive a University of Twente Scholarship (UTS).
To be eligible for Kipaji Scholarship, candidates should fulfill all requirements of the University of Twente Scholarship. Additionally, applicants must:
The relevant faculty of the program nominates you for a Kipaji Scholarship. Upon request from the faculty, you may need to submit a motivation letter indicating how you intend to use your studies at the University of Twinge. Please indicate in your motivation letter that you apply for Kipaji Scholarship.
For further details regarding this scholarship and full details of the requirements wholly, you may need to go through the official link. | https://afghankarobar.com/views/schol-detail.php?id=7201 |
At Birth, Humans Associate "Few" with Left and "Many" with Right.
Humans use spatial representations to structure abstract concepts [1]. One of the most well-known examples is the "mental number line"-the propensity to imagine numbers oriented in space [2, 3]. Human infants [4, 5], children [6, 7], adults [8], and nonhuman animals [9, 10] associate small numbers with the left side of space and large numbers with the right. In humans, cultural artifacts, such as the direction of reading and writing, modulate the directionality of this representation, with right-to-left reading cultures associating small numbers with right and large numbers with left [11], whereas the opposite association permeates left-to-right reading cultures [8]. Number-space mapping plays a central role in human mathematical concepts [12], but its origins remain unclear: is it the result of an innate bias or does it develop after birth? Infant humans are passively exposed to a spatially coded environment, so experience and culture could underlie the mental number line. To rule out this possibility, we tested neonates' responses to small or large auditory quantities paired with geometric figures presented on either the left or right sides of the screen. We show that 0- to 3-day-old neonates associate a small quantity with the left and a large quantity with the right when the multidimensional stimulus contains discrete numerical information, providing evidence that representations of number are associated to an oriented space at the start of postnatal life, prior to experience with language, culture, or with culture-specific biases.
| |
They were arguing about which of the sports requires the most fitness, swimming or running. Then an article came out about a Belgian cyclist, Eddy Mercx, having the highest oxygen uptake. Nobody had really done the bike race before so a man named John Collins decided to shave off 3 miles of the race and make it go counter-clockwise around the route and they came to an agreement.
The race day was on the 18th of February, 1978 and Gordon Haller was the first man to finish the race in the time of 11 hours, 46 minutes and 58 seconds earning the title of “Ironman.”
The Fastest Ironman race ever was by Timothy Philip Don aka Tim Don from the UK at the Ironman South American Championship in Florianopolis, Brazil on the 28th of May 2017. He completed a 3.8km Swim, 180km Cycle Ride and 42km Run in an astonishing 7 hours 40 minutes and 23 seconds. | https://raceconnections.com/ironman/ |
The Milton Hildebrand Collection at the MVZ is a special collection of unusual specimen preparations, including freeze-dried displays of muscles, feet, tongues, and other anatomical parts. This collection was created by Milton Hildebrand, Professor Emeritus, University of California at Davis, and a former MVZ graduate student. Hildebrand developed or perfected most of the anatomical techniques used in his specimen preparations, and many items in the collection are cross-referenced to laboratory exercises in vertebrate functional morphology that he designed. The unique and often delicate nature of these anatomical preparations makes them especially valuable for teaching, but also prohibits their availability for loans.
Data Records
The data in this occurrence resource has been published as a Darwin Core Archive (DwC-A), which is a standardized format for sharing biodiversity data as a set of one or more data tables. The core data table contains 658 records. 1 extension data tables also exist. An extension record supplies extra information about a core record. The number of records in each extension data table is illustrated below.
- Occurrence (core)
658
- Multimedia
0
This IPT archives the data and thus serves as the data repository. The data and resource metadata are available for download in the downloads section. The versions table lists other versions of the resource that have been made publicly available and allows tracking changes made to the resource over time.
Downloads
Download the latest version of this resource data as a Darwin Core Archive (DwC-A) or the resource metadata as EML or RTF:
|Data as a DwC-A file||download 658 records in English (81 KB) - Update frequency: unknown|
|Metadata as an EML file||download in English (12 KB)|
|Metadata as an RTF file||download in English (8 KB)|
Versions
The table below shows only published versions of the resource that are publicly accessible.
How to cite
Researchers should cite this work as follows:
Museum of Vertebrate Zoology (MVZ), University of California, Berkeley
Rights
Researchers should respect the following rights statement:
The publisher and rights holder of this work is Museum of Vertebrate Zoology. To the extent possible under law, the publisher has waived all rights to these data and has dedicated them to the Public Domain (CC0 1.0). Users may copy, modify, distribute and use the work, including for commercial purposes, without restriction.
GBIF Registration
This resource has been registered with GBIF, and assigned the following GBIF UUID: 423d9318-4dd4-4d31-81cb-27778c44a3bc. Museum of Vertebrate Zoology publishes this resource, and is itself registered in GBIF as a data publisher endorsed by U.S. Geological Survey.
Keywords
Occurrence; Specimen
Contacts
Who created the resource:
Who can answer questions about the resource:
Who filled in the metadata:
Who else was associated with the resource:
Geographic Coverage
The Milton Hildebrand collection is global, with specimens from all continents.
|Bounding Coordinates||South West [-90, -180], North East [90, 180]|
Taxonomic Coverage
Mammalia, Reptilia, Aves, Chondrichthyes, Osteichthyes, Amphibia, Actinopterygii, Agnatha, Enteropneusta, Ascidiacea, Placodermi, Ascidea, Acanthodii. | http://ipt.vertnet.org:8080/ipt/resource?r=mvz_hild |
Abstract
As species colonize new habitats they must adapt to the local environment. Much of this adaptation is thought to occur at the regulatory level; however, the relationships among genetic polymorphism, expression variation and adaptation are poorly understood. Drosophila melanogaster, which expanded from an ancestral range in sub-Saharan Africa around 15 000 years ago, represents an excellent model system for studying regulatory evolution. Here, we focus on the gene CG9509, which differs in expression between an African and a European population of D. melanogaster. The expression difference is caused by variation within a transcriptional enhancer adjacent to the CG9509 coding sequence. Patterns of sequence variation indicate that this enhancer was the target of recent positive selection, suggesting that the expression difference is adaptive. Analysis of the CG9509 enhancer in new population samples from Europe, Asia, northern Africa and sub-Saharan Africa revealed that sequence polymorphism is greatly reduced outside the ancestral range. A derived haplotype absent in sub-Saharan Africa is at high frequency in all other populations. These observations are consistent with a selective sweep accompanying the range expansion of the species. The new data help identify the sequence changes responsible for the difference in enhancer activity.
1. Introduction
(a) The importance of gene regulation in adaptation
Differences in gene expression are thought to underlie many of the phenotypic differences between species and populations [1–3]. With the advent of transcriptomic technologies, such as microarrays and high-throughput RNA sequencing (RNA-seq), it has become possible to identify the genes that differ in expression between species or vary in expression among individuals of the same species. Such studies have revealed that there is considerable expression divergence between closely related species (e.g. human and chimpanzee [4] or Drosophila melanogaster and Drosophila simulans [5]) as well as abundant expression variation within species (e.g. human [4,6,7], mouse [8], Drosophila [9,10], yeast [11–13] and fish [14–16]). A current challenge in evolutionary genetics is to identify the specific genetic changes responsible for differences in gene expression and to determine how these changes impact an organism's fitness. In this context, much attention has been paid to cis-regulatory elements, such as transcriptional enhancers, as they are known to play a key role in regulatory evolution [17]. It has been argued that cis-regulatory evolution is the major driver of adaptive divergence between species, especially at the level of morphology [17–19]. However, the importance of cis-regulatory divergence in relation to other types of genetic changes (e.g. amino acid replacements within proteins) in adaptation is still a topic of debate [20].
A well-known example of adaptive cis-regulatory evolution in humans involves the lactase gene (LCT), where single-nucleotide polymorphisms (SNPs) in an upstream regulatory element are associated with persistent expression of LCT in adults and enable them to digest the milk sugar lactose [21]. Patterns of DNA sequence polymorphism in the LCT region suggest that it has been the target of recent positive selection within northern European populations [22]. Furthermore, the discovery of different, independently derived SNPs in this region of the genome that are associated with lactase persistence in African pastoralist populations is indicative of convergent adaptive evolution [23]. In D. melanogaster, polymorphism in the expression of the cytochrome P450 gene Cyp6g1 is associated with the insertion of an Accord transposable element into its upstream regulatory region [24]. Overexpression of Cyp6g1 owing to the Accord insertion confers resistance to the insecticide DDT [25], a trait that is in high frequency in non-African populations [26]. Patterns of DNA sequence polymorphism are consistent with recent positive selection favouring the high-expression allele [26]. The Cyp6g1 example illustrates how the powerful genetic resources available for D. melanogaster can be used to identify adaptive changes in gene expression.
(b) The demographic history of Drosophila melanogaster
Drosophila melanogaster is currently a cosmopolitan species with a worldwide distribution [27]. However, the global spread of the species from its ancestral range in sub-Saharan Africa is thought to have occurred relatively recently [27,28]. Genome-scale analyses of DNA sequence variation in multiple African and non-African populations have resulted in our current understanding of the species’ biogeographic and demographic history [29–33]. A general pattern that has been observed is that DNA sequence polymorphism is greater among individuals from sub-Saharan Africa than among individuals from other worldwide locations [29,34–36], which is consistent with an Afrotropical origin of the species. Populations from southern-central Africa (e.g. Zambia and Zimbabwe) show the highest genetic diversity, suggesting that they best represent the centre of origin [32]. It is hypothesized that the initial expansion of D. melanogaster from its ancestral range occurred around 15 000 years ago with the colonization of human settlements in the Middle East [31]. The colonization of Europe and Asia from this original non-African source population is thought to have occurred more recently, within the past 2500–5000 years and been concomitant with the spread of human populations and agriculture [31]. Finally, the colonization of North America is documented to have occurred within the past 200 years [37] and appears to have involved the admixture of European and African D. melanogaster [33]. There is also evidence for recent non-African gene flow into sub-Saharan Africa, with the extent of admixture varying among African populations [32].
Its successful colonization of non-African territories suggests that D. melanogaster has undergone adaptation to new environmental conditions. Given our extensive knowledge of the D. melanogaster genome and its tractability as a model organism, there has been considerable interest in finding the genes and genetic changes that underlie this adaptation. One approach has been to look for regions of the genome that show patterns of sequence polymorphism indicative of recent positive selection [38,39]. These studies have identified genes or regions of the genome that are candidates for adaptive evolution [29,30,32,40], but in most cases it has been difficult to link genetic variants with functional or phenotypic differences between populations. Another approach has been to look for genes that differ in expression between African and non-African flies. This approach focuses on regulatory divergence. To date, such expression studies have been carried out using whole adult males [9,41], whole adult females [42] and the dissected brains of both sexes [43]. In all of these cases, hundreds of genes differing in expression between populations were identified. However, the overlap among the differentially expressed genes identified by each study was small, suggesting that regulatory evolution often occurs in a sex- and tissue-dependent fashion [42,43].
(d) Population genetics and expression of CG9509
One gene that shows a large and consistent expression difference between African and non-African flies of both sexes is CG9509 [9,41,44]. The specific function of this gene in D. melanogaster is unknown, although sequence homology has led to it being annotated as a choline dehydrogenase [45]. In addition, its highly enriched expression in the Malpighian tubules [46] suggests that it may play a metabolic role in detoxification. The sequence and expression of CG9509 have been studied in detail in population samples from Europe (The Netherlands) and Africa (Zimbabwe), revealing three major features [44]. First, CG9509 shows two to three times higher expression in the European population than in the African population (figure 1). Second, sequence polymorphism in the CG9509 region is greatly reduced in the European population, especially in the intergenic region just upstream of the CG9509 coding sequence, which is consistent with a recent selective sweep. Third, this intergenic region (here denoted as the CG9509 enhancer) is sufficient to drive differences in reporter gene expression equal to those observed for the CG9509 gene in natural populations (figure 1). Taken together, these results provide strong evidence that positive selection has acted on the CG9509 enhancer to increase expression in the European population. To better understand the timing and geographical scale of this positive selection, we extended the analysis of the CG9509 enhancer to new population samples from Europe, Asia, northern Africa and sub-Saharan Africa. We find that sequence polymorphism is very low in all populations outside the ancestral range, but much higher within sub-Saharan Africa. Furthermore, a derived haplotype associated with elevated CG9509 expression is at high frequency in all populations outside sub-Saharan Africa but was not detected within the ancestral range. These results suggest that selection for increased expression of CG9509 occurred during or soon after the out-of-Africa expansion of the species, before its spread into Europe and Asia.
Expression of CG9509 in a European (The Netherlands) and a sub-Saharan African (Zimbabwe) population. Shown are the relative expression levels in adult males as determined by microarrays or qRT-PCR. The ‘reporter gene’ comparison is for lacZ transgene expression driven by either the European or the African version of the CG9509 enhancer. Error bars indicate ±1 s.e. of the mean.
2. Material and methods
(a) Population samples
Sequence polymorphism was surveyed in the following six D. melanogaster populations samples: 12 isofemale lines from The Netherlands (Leiden), 11 isofemale lines from Germany (Munich), 11 isofemale lines from Malaysia (Kuala Lumpur), 12 isofemale lines from Egypt (Cairo), 10 isofemale lines from Zambia (Siavonga) and 12 isofemale lines from Zimbabwe (Lake Kariba). The Zimbabwe and The Netherlands populations were used in a previous study of sequence and expression variation associated with the CG9509 enhancer region [44], as well as in previous genome-wide studies [29,35,36,47]. The Malaysian population also was used in previous genome-wide demographic studies [31,48]. At least six strains from each population were used for quantitative reverse-transcription PCR (qRT-PCR) analysis. Flies from all populations were maintained as inbred, isofemale lines under standard conditions (22°C, 14 L : 10 D cycle, cornmeal-molasses medium) for at least 10 generations prior to expression analyses.
(b) DNA sequencing
New sequences of the CG9509 intergenic region were obtained from isofemale lines of the German, Malaysian, Egyptian and Zambian populations. For each line, DNA was extracted from a single male fly using the MasterPure DNA Purification Kit (Epicentre). PCR was performed under standard conditions using four primer pairs published in Saminadin-Peter et al. [44] and one additional reverse primer (5′-AGCTGCAAGCAGAACCGTAT-3′). The amplified region consisted of 1.2 kb of intergenic sequence, ranging from the stop codon of CG14406 to the start codon of CG9509. PCR products were purified with ExoSAP-IT (USB) and sequenced using BigDye chemistry on a 3730 automated sequencer (Applied Biosystems). Both strands of DNA were sequenced using the PCR primers as sequencing primers. Trace files were edited using SeqTrace [49] and a multiple sequence alignment was generated with SeaView (v. 4) [50] using the ClustalW2 algorithm. All sequences have been submitted to the GenBank/EMBL database under the accession numbers HF913659–HF913726.
(c) Population genetic analyses
The following summary statistics were calculated using DnaSP v. 5.10.1 [51]: mean pairwise nucleotide diversity (π), Watterson's estimate of nucleotide diversity (θ) [52], number of segregating sites, haplotype number, haplotype diversity, Fst and Dxy (average pairwise differences between populations). Within each population, the 95% CIs of π and θ were estimated from 10 000 coalescent simulations. A neighbour-joining tree of all sequences was constructed using MEGA v. 5.05 [53]. For this, the evolutionary distances were calculated using the maximum composite likelihood method. Clade support was assessed from 1000 bootstrap replicates.
To determine whether the observed features (number of segregating sites, number of haplotypes and number of fixed, derived variants) in the populations outside sub-Saharan Africa could be explained solely by an out-of-Africa bottleneck, we performed coalescent simulations with ms [54], using bottleneck parameters inferred previously for the X chromosome [31,55]. To match the structure of our observed data, we simulated samples from two present-day populations of sizes N and 0.34N, with sample sizes of 22 and 46 sequences, respectively. The larger sample was drawn from a population that experienced a bottleneck approximately 15 000 years ago, which reduced the population to 0.5% of its ancestral size. The smaller sample was drawn from a population that maintained a constant population size. Prior to the bottleneck, the two populations were assumed to be part of a single panmictic population of size N. Simulations were conditioned on the observed number of segregating sites in the total sample with a local recombination rate of 3.47 cM/Mb [56]. A total of 100 000 simulations were performed and the p-value was determined as the proportion of simulated datasets in which one of the above features in the bottlenecked population (46 sequences) was equal to (or more extreme than) the observed value in the combined non-sub-Saharan African populations.
(d) Expression analysis
Total RNA was extracted from 10 to 15 adult males (aged 4–6 days) and DNAse I digestion was performed using the MasterPure RNA Purification Kit (Epicentre). For each strain, at least two biological replicates were performed. For each replicate, 3 µg total RNA was reverse-transcribed using random hexamer primers and Superscript II reverse transcriptase (Invitrogen) following the manufacturer's protocol. A TaqMan Gene Expression Assay (Invitrogen) was then performed on the resulting cDNA using a probe specific to CG9509 (Dm01838873_g1) as well as a probe specific to the ribosomal protein gene RpL32 (Dm02151827_g1), which was used as an endogenous control. Since the amplification efficiencies of the two probes were nearly identical (within the range 96–99%), the ΔΔCt method was used to calculate normalized gene expression [57]. Briefly, the average threshold cycle (Ct) was determined for two technical replicates per biological replicate and ΔCt was calculated as the mean Ct difference between the CG9509 and RpL32 probes. The fold-change difference in expression for each biological replicate relative to the Zimbabwe population was then calculated as 2–(ΔCtB–ΔCtZK), where ΔCtB is the mean ΔCt value for each biological replicate and ΔCtZK is the mean ΔCt value of the Zimbabwe strains. In order to ensure a balanced design, a total of six strains per population, each with two biological replicates, was used. For strains where more than two biological replicates were performed, the two replicates with ΔCt closest to the median were used.
3. Results
(a) Sequence polymorphism in the CG9509 enhancer
A previous population genetic analysis of the CG9509 enhancer examined only one population from Europe (The Netherlands) and one population from sub-Saharan Africa (Zimbabwe) [44]. To obtain a broader view of genetic variation, we sequenced the 1.2 kb intergenic region between CG9509 and CG14406 (figure 2) in new populations samples from Europe (Germany), Asia (Malaysia), northern Africa (Egypt) and sub-Saharan Africa (Zambia). In the following, we refer to the populations from outside sub-Saharan Africa as ‘cosmopolitan’. Overall, we find that nucleotide diversity is very low in all the cosmopolitan populations (mean θ of 0.07%), with many individuals sharing the same haplotype (table 1). By contrast, nucleotide diversity is at least 12-fold higher in the Zambia and Zimbabwe populations (θ of 1.3% and 1.1%, respectively), where each individual has a unique haplotype (table 1).
Map of the CG9509 region of D. melanogaster. Transcriptional units are indicated by boxes, with coding regions in black, introns in white and untranslated regions in grey. The arrows indicate the direction of transcription. The intergenic region between the stop codon of CG14406 and the start codon of CG9509 was used for the population genetic analysis. This region has been shown to contain the transcriptional enhancer responsible for the expression difference between European and African alleles.
To determine whether the reduction in polymorphism observed in the cosmopolitan populations could be explained solely by an out-of-Africa bottleneck, we performed coalescent simulations using a demographic model inferred from X chromosome-wide polymorphism data [31,55]. Of 100 000 simulated datasets, none showed a reduction in θ as great as that observed in the real data, indicating that the probability of it being caused by a bottleneck alone is less than 0.00001. Two other features of the observed data, the number of haplotypes and the number of derived variants fixed in the cosmopolitan populations, were also highly unlikely to have been caused by a bottleneck alone (p < 0.00001).
(b) Sequence divergence between populations
For the cosmopolitan populations, there is not only low sequence diversity within each population, but also very little sequence divergence between populations. On average, Fst is 0.09 among these populations, while the average pairwise nucleotide divergence between populations (Dxy) is 0.08% (see electronic supplementary material, table S1). By contrast, these populations show much greater sequence divergence than the sub-Saharan African populations, with Fst averaging 0.46 and Dxy averaging 1.12%. There is little sign of population structure between the Zambia and Zimbabwe populations, where Fst is 0.001. The above features are also evident in a neighbour-joining tree, where the cosmopolitan sequences form an exclusive clade with very short branch lengths (figure 3), suggesting that they descend from a very recent common ancestor. By contrast, the Zambian and Zimbabwean sequences are separated by longer branches, which is consistent with an older age of these alleles (figure 3).
Neighbour-joining tree of all intergenic region sequences. The population abbreviations are as follows: The Netherlands (NL), Germany (MU), Malaysia (KL), Egypt (EG), Zambia (ZI) and Zimbabwe (ZK). Drosophila sechellia (Sec) was used as an outgroup. The branch lengths are proportional to the sequence distances, with the exception of the D. sechellia branch, which is shown at 20% of its actual length. Bootstrap values are shown for nodes with greater than 60% support. (Online version in colour.)
Experiments using a transgenic reporter gene have shown that the twofold to threefold CG9509 expression difference observed between flies from The Netherlands and Zimbabwe is caused by sequence variation in a 1.2-kb enhancer located just upstream of the CG9509 coding region (figure 1) [44]. Within this region, there are nine sites that show a fixed or nearly fixed difference between the cosmopolitan and the sub-Saharan African populations (figure 4). These include eight SNPs and one insertion/deletion (indel) polymorphism. Using D. simulans, Drosophila sechellia and Drosophila yakuba as outgroup species, the ancestral state could be inferred for all eight SNPs (figure 4). In all cases, the sub-Saharan African variant was the ancestral form, indicating that new mutations have risen to high frequency in the other populations. For the indel polymorphism, it was not possible to determine the ancestral state, as multiple, large indels have occurred across this region in the outgroup species. However, the tight linkage of this indel polymorphism with the surrounding SNPs suggests that it represents a deletion mutation and that a common derived haplotype is present in all cosmopolitan populations. One strain from Zambia has a deletion similar to the one observed outside sub-Saharan Africa (figure 4). However, this may represent an independent mutational event, as there is also a unique SNP directly adjacent to the deletion in this strain (figure 4). Consistent with this interpretation, the deletion in the Zambia strain is not linked to any of the derived SNPs found at high frequency in the cosmopolitan populations (figure 4).
Fixed and nearly fixed differences in the CG9509 enhancer region between cosmopolitan and sub-Saharan African populations. Cosmopolitan variants are indicated by light shading and sub-Saharan African variants by dark shading. Ambiguous variants are shown in white. The reference sequence (Ref.) was obtained from FlyBase release 5.48 [45] and the ancestral (Anc.) state was inferred from alignments with D. simulans, D. sechellia and D. yakuba. (Online version in colour.)
(d) Expression differences between populations
It was shown previously that CG9509 has higher expression in a cosmopolitan population (The Netherlands) than in a sub-Saharan African population (Zimbabwe; figure 1) [41,44]. Using qRT-PCR, we were able to confirm this result and extend it to three new cosmopolitan populations (Germany, Malaysia and Egypt) and a new sub-Saharan African population (Zambia). On average, the cosmopolitan strains showed nearly threefold higher expression than the sub-Saharan African strains, which was highly significant (figure 5). We also compared CG9509 expression in each cosmopolitan population to that in sub-Saharan Africa. Since the Zambian and Zimbabwean populations showed no evidence of population structure (see electronic supplementary material, table S1) and had very similar CG9509 expression (figure 5), they were pooled for comparison with the cosmopolitan populations. Individually, the populations from The Netherlands, Malaysia and Egypt each had significantly higher CG9509 expression than the pooled sub-Saharan African populations (figure 5). The German population showed, on average, 1.6-fold higher CG9509 expression than the pooled sub-Saharan African populations, but this difference was not significant (figure 5).
(e) Association between sequence variants and expression
To determine whether particular sites within the CG9509 enhancer that show a fixed or nearly fixed difference between cosmopolitan and sub-Saharan African populations (figure 4) were associated with the observed difference in expression, we examined the expression of CG9509 in additional strains from Zambia. However, we could not establish a clear link between any individual sequence variant and the expression difference. For example, Zambia strain ZI273, which is the only sub-Saharan African strain with the 5-bp deletion at positions 821–817 before the CG9509 start codon (figure 4), did not show higher expression than the other sub-Saharan strains (see electronic supplementary material, figure S1). Similarly, strain ZI112, which has cosmopolitan variants at positions 1180, 1174 and 1155, and strain ZI254, which has cosmopolitan variants at positions 748 and 718 (figure 4), did not show unusually high expression relative to other Zambian strains (see electronic supplementary material, figure S1).
Although the German population showed lower average CG9509 expression than the other cosmopolitan populations (figure 5), this difference was not caused solely by strains MU10 and MU11, which were the only ones with the sub-Saharan variant (G) at position 167 (figure 4 and electronic supplementary material, figure S1). Within the cosmopolitan populations, there is a SNP (a G/C polymorphism 67 bp before the CG9509 start codon) segregating at intermediate frequency (32%; see electronic supplementary material, figure S2). The derived variant (G) is associated with a 1.5-fold increase in CG9509 expression within cosmopolitan populations (t-test; p = 0.016; see electronic supplementary material, figure S3). While this variant can account for some of the CG9509 expression variation among cosmopolitan strains, it cannot account for the large expression difference between cosmopolitan and sub-Saharan African strains, as cosmopolitan strains with the sub-Saharan African variant (C) still have over twofold higher expression than sub-Saharan African strains (t-test; p < 10–3; see electronic supplementary material, figure S3).
4. Discussion
(a) Evidence for adaptive evolution of CG9509 at the level of expression
Several lines of evidence suggest that CG9509 has undergone adaptive regulatory evolution within the past 5000–15 000 years. First, this gene shows a large and consistent expression difference between cosmopolitan and sub-Saharan African populations (figure 5) [9,41,44]. Second, within cosmopolitan populations, DNA sequence polymorphism is greatly reduced in the intergenic region immediately upstream of the CG9509 coding sequence (table 1), which is consistent with a selective sweep in this region of the genome [44]. Third, sequence variation within this intergenic region (designated as the CG9509 enhancer) has been shown to account for the difference in expression between cosmopolitan and sub-Saharan African strains [44]. Finally, within the CG9509 enhancer, there is a derived haplotype that is in high frequency in cosmopolitan populations, but is absent in sub-Saharan Africa (figure 4).
The CG9509 enhancer also shows evidence for long-term adaptive evolution over the past 2–3 Myr (since the divergence of D. melanogaster and species of the D. simulans clade). Application of the McDonald-Kreitman (MK) test [58] to data on polymorphism within D. melanogaster and divergence between D. melanogaster and D. sechellia found a significant excess of between-species divergence in the enhancer compared to synonymous sites in the CG9509 coding region [44]. Although the previous analysis did not polarize divergence to the D. melanogaster lineage, a re-analysis of the data using D. yakuba as an outgroup to polarize changes indicated that a significant excess of substitutions in the enhancer occurred on the D. melanogaster lineage (see electronic supplementary material, table S2). This suggests that there have been recurrent selective sweeps within the D. melanogaster CG9509 enhancer since its divergence from D. sechellia.
(b) Evidence for adaptive evolution of CG9509 at the level of protein sequence
In addition to showing evidence for adaptive regulatory evolution, CG9509 also shows evidence for having undergone adaptive protein evolution within the past 2–3 Myr. A comparison of polymorphism and divergence within the CG9509 coding region using the MK test revealed a significant excess of non-synonymous divergence between species [44], which is indicative of recurrent selection for amino acid replacements. A recent genome-wide study of polymorphism also identified CG9509 as a target of positive selection using MK tests polarized to the D. melanogaster lineage [59]. Indeed, CG9509 was ranked among the top 10 genes in the genome that showed evidence for adaptive protein evolution on the D. melanogaster lineage [59].
(c) CG9509 sequence and expression variation within North America
Drosophila melanogaster is believed to have colonized North America within the past 200 years [37]. This colonization appears to be the result of admixture between European and African source populations, with the estimated proportion of European and African ancestry being 85% and 15%, respectively [33]. The Drosophila Genetic Reference Panel (DGRP) [60], consisting of 192 inbred, isofemale lines derived from a single outbred population from Raleigh, North Carolina, is an excellent resource for examining naturally occurring variation within a North American D. melanogaster population. Consistent with the inferred proportion of admixture in North America [33], the cosmopolitan variants at the sites showing fixed or nearly fixed differences between cosmopolitan and sub-Saharan African populations in the CG9509 enhancer (figure 4) are present in approximately 75–85% of the DGRP lines [60], while the private cosmopolitan variant (G 67 bp before the start codon; see electronic supplementary material, figure S2) is present in 31%.
The results of an association study of sequence and expression variation in a subset of 39 DGRP lines [61] are consistent with some of the major features of CG9509 sequence and expression variation identified in our study. First, in some DGRP lines the CG9509 enhancer region shows greatly reduced variant density in comparison to the surrounding regions [61], which is similar to the greatly reduced sequence polymorphism observed in our cosmopolitan strains (table 1). Second, DGRP lines showing this low variant density correspond to cosmopolitan haplotypes of the CG9509 enhancer that are associated with increased expression [44,61]. Third, the presence of cosmopolitan variants within the CG9509 enhancer region in particular DGRP lines appears to be associated with a general increase of CG9509 expression in these lines [61]. Analysis of the DGRP lines revealed an expression quantitative trait locus (eQTL) associated with CG9509 expression within the CG9509 enhancer region [61]. This eQTL corresponds to the segregating site 67 bp before the start codon (see electronic supplementary material, figure S2) that we found to be associated with CG9509 expression variation within cosmopolitan populations (see electronic supplementary material, figure S3). The direction and magnitude of the expression change [61] agree well with our finding that the G variant at this site is associated with a 1.5-fold increase in expression within cosmopolitan populations (see electronic supplementary material, figure S3). However, none of the fixed or nearly fixed differences between cosmopolitan and sub-Saharan African populations (figure 4) showed a significant association with CG9509 expression within the DGRP lines [61]. This may be due to the fact that the analysis was performed on a single North American population in which sub-Saharan African variants were present only at low frequency, which reduces the statistical power to detect associations in genome-wide analyses.
(d) Possible functions of CG9509
At present, the specific function of CG9509 in D. melanogaster and the effect that variation in its expression has on phenotypic differences between individuals are unknown. CG9509 is predicted to encode a choline dehydrogenase with highly enriched expression in the Malpighian tubules [45,46], which is functionally analogous to the kidney of mammals. This suggests that CG9509 may play a role in detoxification. Variation in other genes involved in choline metabolism, namely choline kinases, has been implicated in insecticide resistance, with resistant alleles being present at high frequency in cosmopolitan D. melanogaster populations [43,62]. Unlike CG9509, these choline kinases show reduced expression (or loss of function) outside sub-Saharan Africa [43,59]. By contrast, resistance to DDT is conferred by overexpression of the cytochrome P450 gene Cyp6g1 [24], which also shows highest expression in the Malpighian tubules [46]. CG9509's similarity in function and expression to these other insecticide resistance genes, as well as the strong signal for adaptive evolution outside sub-Saharan Africa, suggest that it may also play a role in the detoxification of insecticides or other chemicals present outside D. melanogaster's ancestral home range.
It is also possible that CG9509 plays a role in adaptation to temperature or humidity. For example, it has been shown in Drosophila that the ratio of phosphatidylcholine to phosphatidyethanolamine decreases during cold acclimation [63], suggesting that choline metabolism might be linked to cold tolerance. Additionally, choline dehydrogenases are known to catalyse the conversion of choline into betaine [64], which has been reported to play an osmoprotectant role in mammals [65] and has also been found in insects [66]. CG9509's very high expression in the Malpighian tubules (and lower expression in the gut) is consistent with a role in osmoregulation, which is a critical process for environmental adaptation. A QTL study of D. melanogaster did not find CG9509 to be among the major QTLs affecting desiccation resistance [67]. However, this study was carried out using recombinant inbred lines derived from two isofemale lines of a single North American (California) population and, thus, did not include genetic variation from sub-Saharan Africa.
Finally, knockout of the choline dehydrogenase gene (Chdh) in mice has been shown to decrease sperm motility [68]. Similarly, polymorphism in the human Chdh gene also is associated with variation in sperm motility [69]. Furthermore, dietary choline is required for proper sperm motility and reproductive behaviour in Drosophila [70]. Thus, it is possible that expression variation in the Drosophila CG9509 gene affects male fertility and/or sperm competition. Genes expressed in the testes, especially those that are X-linked, tend to show the greatest signal of adaptive evolution in Drosophila [71]. However, CG9509 shows only very low levels of expression in the testes that are several hundred-fold lower than those in the Malpighian tubules [46], making a role in male fertility unlikely.
5. Conclusion
Our finding that the selective sweep encompassing the CG9509 enhancer extends to populations from Asia and northern Africa has three important implications. First, it indicates that the sweep is not restricted to a local population or region. Second, it helps to establish the timing of the sweep, which must have occurred after the out-of-Africa migration of the species, but before the divergence of the European and Asian populations (i.e. 5000–15 000 years ago). Third, it suggests that the sweep was not caused by adaptation to a temperate environment per se, as it spans populations from tropical and temperate latitudes. In this respect, the CG9509 example differs from other well-studied polymorphisms in D. melanogaster that show latitudinal clines in frequency and are thought to reflect climatic adaptation [72–74]. Instead, the CG9509 sweep may be the result of adaptation to human commensalism or agriculture, which is consistent with the inferred role of CG9509 in detoxification. The sequence variants differing in frequency between the cosmopolitan and sub-Saharan African populations represent candidates for the specific target(s) of selection and future studies that examine their functional effect on CG9509 expression will help elucidate the molecular mechanism of gene regulatory evolution.
Funding statement
This work was carried out as part of the research unit ‘Natural selection in structured populations’ (FOR 1078) funded by Deutsche Forschungsgemeinschaft grant PA 903/5.
Acknowledgements
We thank John Baines, Sonja Grath, Francesco Paparazzo, Aparup Das, Korbinian von Heckel and John Pool for providing Drosophila stocks. We also thank Andreas Massouras and Bart Deplancke for access to polymorphism and eQTL association data for the DGRP lines. Hedwig Gebhart and Hilde Lainer provided excellent technical assistance in the laboratory.
. 2008A metabonomic analysis of insect development: 1H-NMR spectroscopic characterization of changes in the composition of the haemolymph of larvae and pupae of the tobacco hornworm, Manduca sexta. ScienceAsia34, 279–286. (doi:10.2306/scienceasia1513-1874.2008.34.279)
| |
Tim Berners Lee Wins A.M Turing Award
Keynote speaker Tim Berners-Lee, the inventor of the World Wide Web is this year's recipient of the A.M Turing Award.
The award, which is dubbed computing's version of the Nobel Prize is bestowed upon those who have made a significant contribution of lasting importance to computing.
The prize is named after Alan Turing, the mathematician who's Turin machine, the forerunner to all modern computers, helped crack the Enigma machine during World War Two. | https://www.speakerscorner.co.uk/blog/tim-berners-lee-wins-a-m-turing-award |
Stobs Camp was home to 4,500 German prisoners during the First World War, having previously been the main training base for British soldiers in Scotland at the turn of the 20th century.
Now, a project, launched as part of Scotland’s year of history, heritage and archaeology, and led by Archaeology Scotland, aims to reveal the camp’s remaining secrets.
“Not only is this an internationally significant site that has been crying out for recognition and interpretation for years, but it will provide yet another reason to visit historical Hawick and its beautiful surrounding valleys,” said Simon Lynch, a facilitator with the Scottish Border Council Leader project team helping fund the work.
Most Popular
Council archaeologist Chris Bowles started putting together a project proposal several years ago, having identified the potential of the site, and after securing the support of Archaeology Scotland and Historic Environment Scotland, it has now come to fruition.
He said: “This really is a huge project and will be one of the biggest archaeology projects in Scotland.
“Stobs Camp is of international significance because of the excellent state of preservation of some of its infrastructure. It is the best preserved First World War internment camp in the world and was the headquarters of the prisoner-of-war camp system in Scotland.
“This project is important as, without it, there is a real danger that the story of Stobs will be lost and the buildings that remain will deteriorate further.
“Our aim is to develop a management plan for the site, improve access for visitors and create the necessary interpretation materials, including an app, to make sure the important role this site played during the First World War is remembered. The site has quite a few stories to tell.”
The site was acquired by the UK Government from the owners of the Stobs Castle Estate in 1902, and the following year it was established as the main training base for British soldiers in Scotland, hosting 20,000 troops in its first full year.
A new siding off the former Waverley Line enabled supplies to be brought into camp and soldiers to disembark.
Over the course of the following decade, the camp became less busy due to lack of space to carry out all necessary training, and it ended up only being used by the Army during the summer.
That threw its future into doubt, but after the outbreak of war in 1914, its infrastructure made it an obvious choice to hold prisoners of war.
Initially, the camp was home to German civilians living in the UK who either voluntarily gave up their liberty or were arrested.
They were followed by an influx of German military and naval prisoners.
After the camp got too crowded, the original civilian internees were moved to the Isle of Man.
Evidence exists of prisoners putting on plays and recitals, and they were allowed to produce a newsletter and send it back to their families.
They were also permitted to establish camp businesses, and many of the prisoners made decorative domestic objects sold in Hawick town centre.
Archaeology Scotland project officer Andrew Jepson said: “Stobs Camp has a fascinating story to tell and, so far, we have only just scratched the surface.
“In some respects, this is relatively recent history we are dealing with, so, as part of the project, we will be gathering and recording oral stories of the camp as they passed from one generation to the next.
“We are also fortunate in that there are some amazing photographs of the camp and its infrastructure. These will be invaluable for providing an insight into camp life.”
Dianne Swift, Archaeology Scotland’s project manager, added: “We are now able to take the project forward to record, for the first time, a full story of Stobs Camp.
“We also aim to establish a management plan that will ensure the remains are appropriately protected and maintained and accessible to a wider audience. | https://www.thesouthernreporter.co.uk/news/prison-camp-project-set-to-yield-tourism-boost-for-hawick-855842 |
Points for each risk factor below were added up to calculate your score. For example, if you answered yes to the question “Do you have a mother, father, sister, or brother with diabetes?” you scored 1 point for Family History. If you answered no to the question “Have you ever been diagnosed with high blood pressure?” you scored 0 points for High Blood Pressure, and so on for all the risk factors. A total of 5 points or higher is considered high risk for having prediabetes.
Yes: 1 point
No: 0 points
There’s a link between family history and type 2 diabetes, but not only because family members are related. Sometimes they share certain habits that can increase their risk.
Yes: 1 point
No: 0 points
High blood pressure raises your risk for type 2 diabetes. It can also increase your risk for heart disease, eye problems, and kidney disease or make them worse.
Less than 40 years: 0 points
40–49 years: 1 point
50–59 years: 2 points
60 years or older: 3 points
The older you are, the higher your risk for type 2 diabetes. Risk starts to increase at around age 45 and increases sharply after age 65.
African Americans, Hispanic/Latino Americans, American Indians, Asian Americans, and Pacific Islanders are at higher risk for type 2 diabetes. Asian Americans are at higher risk for type 2 diabetes at lower weights than other ethnicities.
Yes: 0 points
No: 1 point
Being inactive is a known risk factor for type 2 diabetes. One reason is that your body can’t use insulin as well when you don’t get regular physical activity. Insulin helps keep blood sugar levels from getting too high.
Man: 1 point
Woman: 0 points
Woman who has had gestational diabetes: 1 point
More men than women have undiagnosed diabetes, possibly because men are less likely to see their doctor regularly. Gestational diabetes (diabetes while pregnant) goes away after the baby is born, but increases a woman’s risk of developing type 2 diabetes later in life.
< 25 (< 23 if Asian): 0 points
25–29 (23–29 if Asian): 1 point
30–39: 2 points
40+: 3 points
Body mass index or BMI is a measure of height compared to weight. For example, a person who is 5’3” and weighs 120 pounds has a BMI of 21 and is in the normal range:
|Weight status||BMI|
|Normal||18.5-24.9|
|Overweight||25-29.9|
|Obese||30 or greater|
People with higher BMIs have a higher risk for type 2 diabetes. | https://www.cdc.gov/diabetes/widgets/risktest/how-your-test-is-scored.html |
Free software and accessibility
This includes adding features and building tools, including screen readers, keyboard shortcuts, and more, to increase access to software programs.
Accessibility features are key to making free software work for more people and to helping people escape particularly heinous kinds of proprietary software abuse, where companies who produce proprietary assistive technology hold immense amounts of power over people's lives because of the lack of other options.
Ways to help
- The GNU Project discusses accessibility at length and recommends that developers learn to use the accessibility features of the integrated development environment or toolkit they use to build their user interface.
- Web developers should follow the W3C accessibility guidelines -- there is also a concurrent guide to applying the guidelines to non-web technologies.
- Check out the LibrePlanet Accessibility group if you want to discuss accessibility needs in free software.
We will be updating this page in the future with more specific project suggestions in this area. Please email any suggestions to [email protected].
This is just one item on the Free Software Foundation's High Priority Projects list. | https://www.fsf.org/campaigns/priority-projects/accessibility |
A Brown study has revealed how a brain imaging technique can be used to understand how drugs affect the brain within minutes to hours of being taken. Research was conducted by Tara White, assistant professor of behavioral and sciences, and PhD student Meghan Gonsalves. Read More.
Resuming Research
The University will consider requests to host short and long-term visitors for essential research at Brown. It has also issued updated principles and procedures for requests to resume research in a research lab and for field research.
Office of Sponsored Projects
Robin Eubank named Assistant Director of Post-Award Services
<![if !mso]>Proposal Submission Deadlines<![endif]>
Year in Review: FY2020 Annual Report for Brown Technology Innovations
Brown signs MSRA with Social Media Company On Augmented Reality
Patent awards This Month
NIH vs NSF: Proposal Submission Differences
Identify Collaborators in RI and Beyond
Research Development and Grant Writing Newsletter
Subscribe to the RAIS Newsletter (eRAF)
Office of Research Integrity
IACUC Policy Updates
IACUC Reminder - AVMA Guidelines Updated
New Child Assent Templates (7-12 and 13-17) and Guidance
Human Subjects Research Education Workshops
Visit the CIS Software Catalog
Responsible Conduct of Research (RCR) Training Options for 2020/21
Meeting Dates & Submission Deadlines
<![if !mso]>COVID-19 EXTERNAL FUNDING OPPORTUNITIES<![endif]>
Apply for OVPR Salomon Research Awards
Diversity, Equity & Inclusion Funding Opportunities
Limited Submission Funding Opportunities
Conferences & Training
Free 12 Week Grant Writing Workshop
OSP Trainings are Going Virtual
Fall 2020 NSF Grants Conference - going virtual
NIH Virtual Seminar on Program Funding and Grants Administration
Impact: Research at Brown
Brown’s first magazine devoted to the University’s research. Read the magazine for stories of groundbreaking discovery and scholarship, and of our commitment to making a difference in the world. | http://createsend.com/t/r-8A560C0C452E36172540EF23F30FEDED |
Finally, the chapter has presented some evidence that using this kind of rubric helps teachers teach and students learn, and it has invited you to pursue your own evidence, in your specific classroom and school context.
The main point about criteria is that they should be about learning outcomes, not aspects of the task itself. Several studies of student-generated criteria demonstrate that students can participate in defining and describing the qualities their work should have. Historicizing Writing Assessment as a Rhetorical Act," Kathleen Blake Yancey offers a history of writing assessment by tracing three major shifts in methods used in assessing writing.
Requires less time to achieve inter-rater reliability. Task-specific rubrics do not take advantage of the most powerful aspects of rubrics—their usefulness in helping students to conceptualize their learning targets and to monitor their own progress.
The instructors were interested in finding out whether the information students gained from peer evaluation was accurate, whether it matched teacher input, and whether this accuracy was consistent across different years and classes. These sets of tasks all indicate important knowledge and skills, however, and they develop over time and with practice.
Students were learning to solve geography problems using global information systems GIS software, so the learning goals were about both accurate use of the software and applying it to real-world geography problems, including being able to explain their problem-solving strategies.
Do not need to be rewritten for every assignment. One or Several Judgments.
That in itself is one good reason not to use them except for special purposes. Rubrics help with clarity of both content and outcomes. Similarly, it is easier for teachers to apply task-specific rubrics consistently with a minimum of practice.
Good for summative assessment. They tackle the work, receive feedback, practice, revise or do another task, continue to practice, and ultimately receive a grade—all using the same rubric as their description of the criteria and the quality levels that will demonstrate learning.
Ross and Starling used the same four-component self-assessment training, based on criteria, with secondary students in a 9th grade geography class.
One classroom purpose for which holistic rubrics are better than analytic rubrics is the situation in which students will not see the results of a final summative assessment and you will not really use the information for anything except a grade.
For the study, the same rubric was used for a required course assignment three years in a row.
Originally the rubric was developed and then modified with discussion and involvement of students. In addition to the classroom and programmatic levels, writing assessment is also hugely influential on writing centers for writing center assessmentand similar academic support centers.
Rubrics help teachers teach To write or select rubrics, teachers need to focus on the criteria by which learning will be assessed. Before we leave holistic rubrics, however, I want to reemphasize the important point that all the criteria are used in holistic rubrics.
Holistic rubrics describe the work by applying all the criteria at the same time and enabling an overall judgment about the quality of the work. iRubric N4AA Use this rubric for grading student responses that are part of a test or quiz that include other types of questions as well.
Can be customized for any subject. Free rubric builder and assessment tools. Writing assessment refers to an area of study that contains theories and practices that guide the evaluation of a writer's performance or potential through a writing task.
As writing teachers began designing local assessments, the methods of assessment began to diversify, resulting in timed essay tests, locally designed rubrics.
An “A” essay: Answers the specific central question that was asked; Incorporates pertinent and detailed information from both class discussion and assigned readings. Rubric for Grading Answers on an Essay Exam Claudia Stanny Director Center for University Teaching, Learning, and Assessment University of West Florida.
Using Rubrics to Measure and. Enhance Student Performance.
Sharon Karkehabadi, douglasishere.com • Rubrics help students understand your expectations. Essay, File response, short answer • Blogs and Journals • Wikis • Discussion Board threads and forums 1.
Classroom Tests: Writing and Scoring Essay and Short-Answer Questions (continued on page two) Page 2 November The Learning Link is a quarterly newsletter published by the University of Wisconsin-Madison Teaching Academy. | https://zazehimofupacaq.douglasishere.com/rubrics-for-essay-tests-7279ay.html |
Q:
Criteria of the holomorphic subbundle
Note that $\mathcal{E} = (E, \bar{\partial}_{\mathcal{E}})$ is a holomorphic vector bundle over complex manifold $X$, where $\bar{\partial}_{\mathcal{E}}$ is a integrable Dolbeault operator on $E$.
Now, I consider a $h_0$-orthogonal projection $\pi \in C^{\infty}(End(E))$, that is $\pi^\ast = \pi = \pi^2$, where $h_0$ is a Hermitian metric on $\mathcal{E}$.
Why the following statement is true: if $\pi$ satisfies
$$(Id_{\mathcal{E}} - \pi) \circ \bar{\partial}_{\mathcal{E}} \circ \pi = 0,$$
then $F := im(\pi)$ is a holomorphic subbundle on $\mathcal{E}$?
A:
Here's a sketch of the proof. Of course, it's a local question to see that $F$ has a holomorphic structure. Start with an adapted $h_0$-unitary frame $e_1,\dots,e_k,e_{k+1},\dots,e_m$ for $\mathcal E$ over an open subset $U\subset X$, where $e_1,\dots,e_k$ give a frame for $F$ and $e_{k+1},\dots,e_m$ give a frame for $F^\perp$. Note, first of all, that if $F$ is indeed a holomorphic subbundle, we can choose a holomorphic frame $Z_1,\dots,Z_k$ and write $e_\alpha = \sum a_\alpha^\beta Z_\beta$ for some smooth functions $a_\alpha^\beta$, $1\le \alpha,\beta\le k$. Then $\bar\partial_{\mathcal E} e_\alpha = \sum \bar\partial a_\alpha^\beta\otimes Z_\beta$ (since $\bar\partial_{\mathcal E} Z_\beta = 0$ by hypothesis). This means, in particular, that the projection of $\bar\partial_{\mathcal E}e_\alpha$ into $F^\perp$ is $0$, in agreement with the criterion.
To prove the desired result, we suppose that for $1\le \alpha \le k$ we have $\bar\partial_{\mathcal E} e_\alpha = 0 \pmod F$. This means that there are $(0,1)$-forms $\phi_\alpha^\beta$ so that
$$\bar\partial_{\mathcal E} e_\alpha = \sum \phi_\alpha^\beta e_\beta.$$
We want to show that we can find smooth functions $f_\alpha^\beta$ so that the $Z_\alpha = \sum f_\alpha^\beta e_\beta$ are holomorphic. That is, we want to solve
$$0 = \bar\partial_{\mathcal E} Z_\alpha = \sum_\beta\left(\bar\partial f_\alpha^\beta + \sum_\gamma f_\alpha^\gamma\phi_\gamma^\beta\right) e_\beta.$$
That is, given the $(0,1)$-forms $\phi_\alpha^\beta$, we want to solve $$\bar\partial f_\alpha^\beta + \sum_\gamma f_\alpha^\gamma\phi_\gamma^\beta = 0 \quad\text{for all } \alpha,\beta = 1,\dots,k.\tag{$\star$}$$
Now, as usually happens in differential geometry, the matrix $\phi = (\phi_\alpha^\beta)$ is not completely arbitrary. It must satisfy an integrability condition. Because $\bar\partial_{\mathcal E}^2 = 0$, it follows that $\bar\partial\phi - \phi\wedge\phi = 0$, and so
$$d\phi - \phi\wedge\phi = \Phi$$
is a $k\times k$ matrix of $(1,1)$-forms. This, in turn, is the integrability condition needed to solve ($\star$).
With thanks to Robert Bryant for helping, here's roughly how this goes. By a clever trick, we can turn the $\bar\partial$-system of differential equations into a usual $d$ differential system. Let $(z^1,\dots,z^n)$ be holomorphic coordinates on $U\subset X$ and let $w^1,\dots,w^k$ be coordinates on $\Bbb C^k$.
Consider the ideal $\mathscr I$ of complex differential forms on $U\times\Bbb C^k$ generated by the $1$-forms $dz^1,\dots,dz^n$ and $\omega^\beta = dw^\beta + \sum w^\gamma\phi_\gamma^\beta$. Well, of course, $d(dz^j)=0$. Next, switching to matrix notation, thinking of $w=(w^1,\dots,w^k)$ as a row vector, we can rewrite this as $\omega = dw + w\phi$. Now, differentiating, we have
\begin{align*}
d\omega &= dw\wedge\phi + w\,d\phi = (\omega- w\phi)\wedge\phi + w(\phi\wedge\phi+\Phi) \\
&=\omega\wedge\phi + w\Phi = 0 \pmod{\mathscr I}
\end{align*}
inasmuch as $\Phi$, being a matrix of $(1,1)$-forms on $U$, is in the ideal generated by the $dz^j$. In summary, $d\mathscr I\subset\mathscr I$. We can now apply Nirenberg's complex Frobenius theorem: Since, moreover, $\mathscr I\cap\overline{\mathscr I} = \{0\}$, it follows that there are complex coordinates $x^1,\dots,x^{n+k}$ on a neighborhood $W\subset U\times\Bbb C^k$ of our starting point so that $\mathscr I$ is generated by $dx^1,\dots,dx^{n+k}$. This now endows $W$ with a (different) complex structure. Since projection $W\to U$ is a holomorphic submersion, we can suppose $x^j = z^j$ for $j=1,\dots,n$. Moreover, we can (shrinking open sets if necessary) choose $m$ independent holomorphic sections $s^\beta$ of this projection and write $s^\beta(z) = (z,f^\beta(z))$ for smooth functions $f^\beta\colon \tilde U\to\Bbb C^k$.
Since the $\omega^\beta$ are in the ideal generated by the $dx^i$, it follows that $df^\beta + \sum f^\gamma\phi_\gamma^\beta$ are in the ideal generated by $dz^1,\dots, dz^n$, which tells us that, indeed, $\bar\partial f^\beta + \sum f^\gamma\phi_\gamma^\beta = 0$, as desired.
| |
The library was opened in the year 1430 AH consisting of two floors with an area of 100 square meters, currently contains 4,500 thousand books, 150 medical periodicals specialized in dentistry, 11 computers, 10 retreats for students, 220 university theses, 260 CD, color printer.
Office services:
Borrowing books, printing, viewing the periodicals available in the library, places for group and individual study, internet services, assisting faculty and students in searching databases
Library map:
First round:
Book shelves, computers, printers, group study places.
second floor:
Periodical shelves, retreats for individual study, university theses and scientific references.
contact numbers:
|Phone||8055459|
|[email protected]|
Worktime:
|Sunday - Thursday||7:00 AM - 3:00 PM|
|Friday and Saturday||closed|
Pictures ofthe library: | https://library.ksu.edu.sa/en/node/2126 |
Systematic, comprehensive exploration of the links between philosophy, religion, and the horror genre.
CATEGORIZED IN
Our contemporary horror stories are written in a world where there seems little faith, lost hope, and no salvation. All that remains is the fragmentary and occasionally lyrical testimony of the human being struggling to confront its lack of reason for being in the vast cosmos. This is the terrain of the horror genre.
Eugene Thacker explores this situation in Tentacles Longer Than Night. Extending the ideas presented in his book In The Dust of This Planet, Thacker considers the relationship between philosophy and the horror genre. But instead of taking fiction as the mere illustration of ideas, Thacker reads horror stories as if they themselves were works of philosophy, driven by a speculative urge to question human knowledge and the human-centric view of the world, ultimately leading to the limit of the human - thought undermining itself, in thought.
Tentacles Longer Than Night is the third volume of the "horror of philosophy" trilogy, together with the first volume, In The Dust of This Planet, and the second volume, Starry Speculative Corpse.
"In showing that it can sustain a lucid conversation with philosophy, Thacker's writing also treats horror literature as literature. Students of both philosophy and horror will find surprising inter-illuminations in these three books." Michael Cisco, author of The Divinity Student ~ Michael Cisco
In the Dust of This Planet
Eugene Thacker
Supernatural horror defined as the thought of the unthinkable. In this bestselling book, Eugene Thacker suggests that we look to the genre of horror as offering a way of thinking about the unthinkable world.
Starry Speculative Corpse
Eugene Thacker
Philosophy meets horror against the backdrop of an indifferent, unhuman cosmos.
Weird Realism
Graham Harman
As Hölderlin was to Martin Heidegger and Mallarmé to Jacques Derrida, so is H.P. Lovecraft to the Speculative Realist philosophers.
Levinas Unhinged
Tom Sparrow
Levinas Unhinged presents philosopher Emmanuel Levinas as a metaphysician racked by the sensuous, and often terrifying, materiality of existence.
World of Failing Machines, The
Grant Hamilton
How speculative realism impacts the art of literary criticism.
Look at the Bunny
Dominic Pettman
An essential guide to those technological totems and taboos which help us navigate the chaotic terrain of today's mediascape.
Anthropology of Nothing in Particular, An
Martin Demant Frederiksen
A journey into the social lives of meaninglessness.
Hontology
Mark Payne
Is shame the route by which we access the capabilities for living that are abrogated in modernity?
Angels and Demons: A Radical Anthology of Political Lives
Tony McKenna
A Marxist analysis of key political and historical figures including Hugo Chavez and Jeremy Corbyn, Hillary Clinton and Donald Trump.
Twilight Symbols, The
Julie-Anne Sykley
Bites deep into the symbolic magic of the Twilight Saga.
- SHARE THIS:
- BOOKS:
- SEE ALSO: | http://www.zero-books.net/books/tentacles-longer-night |
About PTA.
PTA is a non-profit organization that provides educational enrichment, events and programs for your children. PTA parters with the school administration to provide opportunities that enhance our students' experience through additional community events and quality programs outside of state and local funding.
2019-2020 Mohr PTA Executive Board Members
Click here to see job descriptions of the leadership positions available to parent volunteers at Mohr through the PTA. If you would like to volunteer to help on any of these committees, please e-mail [email protected].
|
|
Shilpa Panech
|
|
Jeanah Cho
|
|
Erin Stewart
|
|
Minal Doshi
|
|
A Mohr parent for the 5th year, Nikki has seen the huge impact PTA has on the school community here and is looking forward to helping plan and implement all of the exciting programs PTA has in store. This year, Nikki is especially excited about heading up Mohr's Sprit Fridays helping foster our school spirit!
|
|
Susanne has two Mohr Eagles this year and is so excited to bring her passions to the school. Susanne has been integral in bringing "green" initiatives to Mohr - expanding the Garden Club, initiating the "Go Green" initiative and heading the walk-and-roll program. This mom is a power-house of energy and ideas and can't wait to meet your families!
|
|
As both a mom and staff member at Mohr, Tennille brings a unique perspective to our board this year. She is excited to find news ways to support our Mohr community by being an important part of PTA initiatives. As financial secretary, Tennille hopes to help manage the administrative going-ons of our many PTA programs.
|
|
Lisa Barker
|
|
Julie Berglin
|
|
Ritu Kapoor
|
|
Lisa has been working at Mohr for 14 years, teaching second grade. Both her sons attended Mohr. For this school year, serving as our Parliamentarian, Lisa is looking forward to building a successful bond between the teachers and the parent community.
|
|
Julie earned her B.S. from UC Davis, Masters of Leadership from St. Mary’s, and Administrative Credential from Cal State East Bay. She is the proud mother of three kids. One of Julie’s greatest joys is working with the Mohr community to foster positive partnerships that impact student learning and growth. | https://www.mohrpta.org/about-pta.html |
This year the drought gave up the hopes of the country's farmers to break the records of previous years in grain harvesting as a bad job. The weather factor has hit all crops without exception - from wheat to corn and sunflower. The harvest of the latter is expected to be 1 million tons less than last year.
Business Lead & CEO of Potato Agro Konstantin Sarnatsky has stated that Ukraine should be more concerned with protectionism of the interests of its own potato producers instead of importing goods in significant volumes. “Last marketing year, Ukraine imported potatoes worth UAH 3 billion from Russia.
The losses of winter crops due to drought in Ukraine in the entire country are estimated at 234,000 ha, which is 2.6% of all areas with winter crops, the Ministry for Economic Development, Trade and Agriculture has told Interfax-Ukraine. According to the ministry, the most affected by the drought are winter rape crops – 103,000 ha, wheat – 74,000 ha, barley – 53,000 ha, and peas – 1,300 0 ha.
The onion market in Europe has gone through some difficult years. The record heat and drought in the summer of 2018 resulted in an enormous shortage at the beginning of last year. While the situation in large parts of the continent stabilised again this year, nature again put onion and vegetable cultivation in Ukraine to a hard test last year.
The fruit and berry harvest in Ukraine this season could fall by 25% compared with last year due to unfavorable weather conditions. Manufacturers complain of the rainy spring, dry summer, hail due to rapid temperature changes. There are still two months ahead, which, due to weather conditions, will be, like a lottery, for producers of pome crops.
Floods in the central regions of Serbia led to huge losses for farmers growing vegetables, fruits and berries. Due to bad weather, the supply of products has drastically reduced, and statements about the risk of losing 80% of the raspberry harvest, which initially was considered overstated, no longer seem too unrealistic.
The sudden unseasonal rainfall in the last week of February has dealt a serious blow to farmers in Barguna and Patuakhali. According to estimates by officials of Department of Agricultural Extension (DAE), the heavy rain has caused at least Tk 3.6 crore worth of damage to crops in the two districts. | https://agroinsurance.com/en/ukraine/ |
Washington — A congressional deal to finance the government chips away at some Obama administration energy and environmental programs, but leaves largely intact the president's plans on global warming — at least until Republicans take control of Congress next month.
Democrats successfully blocked measures to prohibit the government from regulating heat-trapping carbon dioxide from power plants for the first time and to throw out rules by the Environmental Protection Agency that expand the number of waterways that can be protected from pollution. Both efforts are likely to come back next year when Republicans are in charge.
"There are a number of riders we may not be able to hold off in future years," said Rep. Jim Moran, D-Va., the top Democrat on the subcommittee overseeing the budget for environmental programs. "But for this year, this is as good as we could have hoped for."
Even a $61 million cut to EPA's budget that leaves the agency with the smallest staff in 25 years amounted to $250 million more than what Obama asked for in March.
House Republicans did manage to attach measures to the $1.1 trillion spending bill to delay a ban on energy-sucking incandescent light bulbs, to bar the Environmental Protection Agency from regulating greenhouse gases belched from livestock, and to block any money from going into a global fund to help poor countries prepare for global warming that Obama pledged $3 billion to last month.
They said the provisions would help "rein in harmful regulatory overreach" that has tied up businesses and hindered economic growth.
Yet the EPA has repeatedly stated it has no plans to regulate the methane gas released when cows burp, and the White House's plans for the so-called Green Climate Fund did not bank on money from this fiscal year.
"There is not a lot of trust between members of Congress and what the intentions of the EPA may or may not be," said Rep. Ken Calvert, R-Calif., the head of the budget subcommittee that oversees environment.
On other matters, the GOP made some headway that angered environmental groups. The deal bars the EPA from regulating lead in ammunition, and boosts money to fight wildfires, including a $21-million boost to programs aimed at clearing areas of forest that pose a wildfire risks.
Another measure delays protections for the greater sage grouse, a wide-ranging Western bird that's been on a collision course with the oil and gas industry.
The Obama administration faced a September 2015 deadline to propose protections for greater sage grouse, but the provision bars the government from spending money working on the issue until the deadline, likely pushing back the decision.
"It's alarming that some members are using this major appropriation process to attack America's bedrock laws protecting our clean air and water, wildlife habitat and healthy forests," said Alan Rowsome, senior director of government relations for lands at The Wilderness Society. "These last-minute riders have not seen the light of day and have not been properly vetted by the committees who oversee these critical public lands issues." | https://www.manufacturing.net/operations/news/13201949/budget-deal-targets-but-misses-climate-regulations |
The list below includes the cities that the US Post Office accepts for ZIP code 93962. The preferred city may not be the city in which the ZIP is located. The city for 93962 is usually the name of the main post office. When mailing your package or letter, always include the preferred or acceptable cities. Using any city in the list of unacceptable cities may result in delays.
ZIP code 93962 is located in western California and covers a slightly less than average land area compared to other ZIP codes in the United States. It also has a large population density.
The people living in ZIP code 93962 are primarily white. The number of middle aged adults is extremely large while the number of people in their late 20s to early 40s is extremely large. There are also a small number of single adults and a slightly higher than average number of families. The percentage of children under 18 living in the 93962 ZIP code is slightly higher than average compared to other areas of the country.
ZIP code 93962 has a small percentage of vacancies.
The majority of household are owned or have a mortgage. Homes in ZIP code 93962 were primarily built in 1939 or earlier. Looking at 93962 real estate data, the median home value of $533,200 is extremely high compared to the rest of the country. Rentals in 93962 are most commonly 1 bedrooms. The rent for 1 bedrooms is normally $300-$499/month including utilities. Prices for rental property include ZIP code 93962 apartments, townhouses, and homes that are primary residences.
For more information, see Spreckels, CA home prices.
The median household income of $81,500 is compared to the rest of the country.
As with most parts of the country, vehicles are the most common form of transportation to places of employment. Pedestrians and cyclists beware. The area has some of lowest percentages of commutes without a vehicle in the country. A higher percentage of people in 93962 than almost anywhere in the country avoid a commute altogether by working at home. In most parts of the country, the majority of commuters get to work in under half an hour. A slightly higher than average number of commuters in 93962 can expect to fall in that range. There are a slightly smaller percentage of employees that have to travel over 45 minutes to reach their place of employment.
ZIP Code 93962 is in the Spreckels Union Elementary School District. There are 1 different elementary schools and high schools with mailing addresses in ZIP code 93962. | https://www.unitedstateszipcodes.org/93962/ |
Full Idea: In every true affirmative proposition, necessary or contingent, universal or particular, the concept of the predicate is in a sense included in that of the subject; the predicate is present in the subject; or else I do not know what truth is.
A reaction: Why did he qualify this with "in a sense"? This is referred to as the 'concept containment theory of truth'. This is an odd view of the subject. If the truth is 'Peter fell down stairs', we don't usually think the concept of Peter contains such things.
Full Idea: For individuation, substance needs three properties: independence, to separate it from other things; unity, to call it one thing, rather than an aggregate; and permanence or stability over time. Its other role is as subject for predicates.
A reaction: Perkins is describing the Aristotelian view, which is taken up by Leibniz. 'Substance' is not a controversial idea, if we see that it only means that the world is full of 'things'. It is an unusual philosopher wholly totally denies that. | http://philosophyideas.com/search/response_philosopherTh.asp?era_no=A&era=Perkins&visit=list&order=alpha&PN=3874&expand=yes |
Q:
Basic Statistics Question (sample, normal distribution)
I am working on a question for an econometrics class that involves using the program Stata. It is as follows
Suppose $X_i$, $i=1,2,...,n$ are i.i.d random variables, each distributed $N$($19,9$). Define $\bar{X}$ to be the mean value of the $n$ random variables. Find $Pr(19.5 \leq \bar{X} \leq 20)$ for $n=25$, $n=100$, $n=500$, and $n=1000$. What do you expect the value of $Pr(19.5 \leq \bar{X} \leq 20)$ would approach if $n$ were to approach infinity? How is this result related to the Law of Large Numbers?
We are to use the normal() function in Stata to compute the probability. I want to check to see if my approach is correct.
I believe that I use
$$Z= \frac{\bar{X} - \mu}{\sigma /\sqrt{n}} $$
to standardize, with $\mu = 19$ and $\sigma = \sqrt{9}=3$. So, for the question, with $n=25$, I would use
$$Pr(\frac{\bar{X} - \mu}{\sigma /\sqrt{n}} \leq \bar{X} \leq \frac{\bar{X} - \mu}{\sigma /\sqrt{n}})$$
$$Pr(\frac{19.5 - 19}{3 /\sqrt{25}} \leq \bar{X} \leq \frac{20 - 19}{3 /\sqrt{25}})$$
I would then repeat for the other values of $n$. Then I simply use the standardized values to find the probabilities with Stata's normal() function. This just involves putting a value in the brackets, for instance normal(1), which returns a value $.84134475$.
I would expect the value of $Pr(19.5 \leq \bar{X} \leq 20)$ to approach $0$ as $n$ approaches infinity, because the sample mean should approach the population mean of 19.
A:
Yes, $Z$ is a standardization of $\bar{X}_n$ (I put an index on your $\bar{X}$), i.e. $Z\sim\mathcal{N}(0,1)$, and so
$$
P(a\leq \bar{X}_n\leq b)=P\left(\frac{a-\mu}{\sigma/\sqrt{n}}\leq Z\leq \frac{b-\mu}{\sigma/\sqrt{n}}\right)=\Phi\left(\frac{b-\mu}{\sigma/\sqrt{n}}\right)-\Phi\left(\frac{a-\mu}{\sigma/\sqrt{n}}\right),
$$
where $\Phi$ is the cumulative distribution function for an $\mathcal{N}(0,1)$ distribution. So you're looking to compute
$$
P(n):=P(19.5\leq \bar{X}_n\leq 20)=\Phi\left(\frac{20-19}{3/\sqrt{n}}\right)-\Phi\left(\frac{19.5-19}{3/\sqrt{n}}\right).
$$
The Stata function normal() is exactly the $\Phi$ from above. The following expression in Stata yields the correct result for me.
disp normal((20-19)/(3/sqrt(100)))-normal((19.5-19)/(3/sqrt(100)))
Your prediction about the probability tending to $0$ is correct.
| |
We promote child-friendly justice systems, which recognise the right of children to special protection, have a minimum age of criminal responsibility of 12 or higher, abolish status offences and use detention only as a measure of last resort, diverting children away from criminal justice systems wherever possible.
We advocate for child-friendly justice systems. Such systems prioritise crime prevention; increase the age of criminal responsibility; set up a separate criminal justice system for children with trained staff; abolish status offences; divert children from formal criminal justice systems wherever possible and use detention only as a last resort; focus on reintegration and rehabilitation programmes; and prohibit all forms of violence against children in conflict with the law. See our 10-point plan for fair and effective criminal justice for children.
We publish research and recommendations for reform, and develop resources for policy-makers, prison authorities, judges, members of inspection committees, prison staff, as well as social and probation workers who work with children in contact with the law.
We work to prevent and address violence against children in all detention facilities, with a specific focus on police and pre-trial detention.
We promote independent monitoring of places where children are detained.
We work with partners to pilot rehabilitation and reintegration projects for children to prevent reoffending.
We advocate at regional and international forums, such as the UN and the African Committee of Experts on the Rights and Welfare of the Child, to highlight the needs of children whose parents are in conflict with the law. | https://www.penalreform.org/priorities/justice-for-children/what-were-doing/ |
Human rights ignored in Belarusian elections
MOSCOW, March 14 (JTA) — Belarusian President Alexander Lukashenko, a former Soviet collective farm manager, has been tightening the screws on dissent before a presidential vote in his country next week. Lukashenko’s regime, routinely referred to in the West as Europe’s last dictatorship, is facing two opposition candidates as he campaigns for his third term in office. Support for the opposition among Belarusian Jews is especially strong among younger and more educated voters, as well as in the capital of Minsk, home to many of the country’s estimated 20,000 to 30,000 Jews. Jewish leaders in the past have shown a certain degree of independence from the authorities and have at times criticized the official line on issues of concern for the community. But the leaders of the community are refraining from making any predictions regarding Sunday’s vote — apparently fearing a possible backlash. The authorities are afraid of a repeat of what happened in Ukraine and Georgia, where regime changes occurred as a result of pro-democracy protests that took place after rigged elections. As a result, opposition activists are being detained in Belarus and even one of the two opposition candidates was briefly arrested for holding a rally that had not been sanctioned. New amendments introduced to the criminal code will allow the regime to further clamp down on political dissent, civil rights groups fear. The opposition candidates have been all but barred from media and their rallies have been broken up by force. More recently, opposition activists in many areas of Belarus had to resort to home visits as the only way to distribute campaign materials and talk to voters. The main opposition candidate, Alexander Milinkevich, a 58-year-old professor of physics, believes that he and Lukashenko both share one-quarter of popular support each, with about one-half of the electorate still undecided or afraid of showing their support to the opposition. But most observers believe Lukashenko will not allow himself to lose the vote. Lukashenko is backed by the Kremlin in Moscow, but even Russian experts helping Lukashenko in his campaign usually refrain from calling the election process in Belarus democratic. Lukashenko, still popular with many Belarusians, has maintained a strict, state-controlled economy, and has capitalized on low unemployment and stable, if meager, living standards. But at least a few Belarusians apparently have other ideas. Last week, the chief of Belarus’s KGB security service accused an allegedly foreign-funded opposition group of planning to stage an election-day coup after publishing false voting results. Opposition leaders deny the allegations, and Milinkevich has called for peaceful protests if vote-rigging occurs.
| |
The Australian Health Policy Collaboration at Victoria University has urged the Federal Government to address the strong link between chronic physical and mental ill health.
Its latest paper Beyond the Fragments: Preventing the Costs and Consequences of Chronic Physical and Mental Diseases calls for mental illness to be front of mind when developing strategies for chronic disease prevention.
AHPC Director Rosemary Calder says people with two or more chronic conditions have complex needs – with many also suffering from depression and anxiety – but the delivery of health care is shaped around single diseases.
“Evidence suggests that many receive poorer quality care than those with a single condition while outcomes for people with severe mental illness are particularly poor,” Calder says.
“Current health services fall short in providing prevention or early intervention and we urgently need to adjust policy and practice to address this.”
Chronic diseases – many of which are preventable – are now responsible for nine out of ten deaths in Australia. The number of people with two or more chronic illnesses continues to grow rapidly.
Australian Bureau of Statistics figures show almost 12% of Australians aged between 16 and 85 years – an estimated 1.9 million people – have both a mental disorder and a physical condition.
People with two or more chronic conditions are also more likely to be admitted to hospital, have longer stays and die prematurely.
Calder called for an urgent measured and integrated approach to the prevention, treatment and management of chronic physical and mental conditions.
The paper is the latest in a series of AHPC reports to identify ways to reduce the risk of preventable chronic diseases.
More than 70 leading health experts contributed to the AHPC’s first report Targets and Indicators for Chronic Disease Prevention in Australia which produced a blueprint to control risk factors for preventable chronic diseases including cutting down on salt, drinking less and moving more. | https://ajp.com.au/news/chronic-physical-and-mental-ill-health-link-needs-attention/ |
Henry County, along with its research partners at the Georgia Institute of Technology and Clayton State University, will develop the Henry County Smart Resilience Decision Support Tool, in short “DST”. The DST will be an interactive web-based tool designed to assist the county planners, policy makers, and county officials assess and explore the impact and potential of new greenspace, warehousing, and freight-related infrastructure projects. It will be designed with the following question in mind: How can Henry County reconcile its community objectives with regard to economic development, quality of life, and energy resilience? This Tool will primarily pursue its objectives in the two following brackets:
Smart Sustainability: Explore the interaction of proposed developments with quality-of-life indicators such as environmental impact, health and equity to create a comprehensive case for future resilience and inclusive innovation. Mapping the loss of carbon sequestration through greenspace inventorying could be a potential functionality.
Smart Energy: Map and monitor the potential for new growth in public services and buildings while simultaneously exploring their potential to serve as intelligent energy infrastructure. For instance, modelling warehouse growth can provide the opportunity to assess roof-based solar harvesting potential while the development of new roadways can create piezoelectric energy potential for renewable energy generation.
“We are so excited and honored that Henry County has been chosen to receive the Georgia Smart Award. We continue to look for ways to improve and enhance transportation for Henry County residents and this continued partnership with Georgia Smart allows us to do just that.” – Carlotta Harrell, Chair, Henry County Board of Commissioners
The DST in these two facets of sustainability and energy will provide a support tool to facilitate decision makers in assessing growth options that rephrase the narrative of development to include multidimensional and smart assessments. Henry County can capitalize on its economic strength in logistics and control development to champion sustainable objectives thereby furthering the community’s aspirations of proactive growth. | https://pingeorgia.org/all_initiatives/henry-county/ |
Rapid decreases in salinity, but not increases, lead to immune dysregulation in Nile tilapia, Oreochromis niloticus (L.).
Rapid changes in salinity, as with other environmental stressors, can have detrimental effects on fish and may trigger increased susceptibility to disease. However, the precise mechanisms of these effects are not well understood. We examined the effects of sudden increases or decreases in salinity on teleost immune function using Nile tilapia, Oreochromis niloticus (L.), as the fish model in a battery of bioassays of increasing immune system specificity. Two different salinity experiments were performed: one of increasing salinity (0 to 5, 10 and 20 g L(-1) ) and one of decreasing salinity (20 to 15, 10 and 5 g L(-1) ). Histopathology of anterior kidney, gills, gonads, intestines and liver of exposed fish was performed, but no remarkable lesions were found that were attributable to the salinity treatment regimes. The spleen was removed from each fish for analysis of cytokine expression, and peripheral blood was used for haematology, cortisol and phagocytosis assays. In the increasing salinity experiments, no significant changes were observed in any immune system assays. However, in the decreasing salinity experiments, lymphopenia, neutrophilia and monocytosis were observed in the peripheral blood without modification of the packed cell volume, plasma protein or plasma cortisol levels. Phagocytosis was increased in response to decreases in salinity from 20 g L(-1) to 15 g L(-1) , 10 g L(-1) and 5 g L(-1) , whereas phagocytic index was not significantly altered. Transforming growth factor-β (TGF-β) transcription increased during the same decreases in salinity. However, the TGF-β value at 5 g L(-1) was less than those in the 15 and 10 g L(-1) salinity treatments. Interleukin-1β (IL-1β) transcription did not significantly respond to either salinity regime. In total, acute salinity changes appeared to trigger reactive dysregulation of the immune response in tilapia, a situation which, when combined with additional co-occurring stressors such as sudden changes in temperature and/or dissolved oxygen, could make fish more susceptible to infectious diseases. Accordingly, these findings may help to explain how sudden environmental changes may initiate disease outbreaks and lead to critical declines in cultured or wild fish populations.
| |
[Primary immunodeficiencies and hematological malignancies].
Primary immunodeficiency disease (PID) is characterized by an impaired immune system along with recurrent and severe and/or opportunistic infections; these infections are frequently associated with malignancies and autoimmune disorders. Dysregulation of the adaptive immune system leads to an increased risk of malignancies. Various mechanisms contribute to increased tumor susceptibility in patients with PIDs, which are as follows: defective cell-mediated tumor surveillance, defective apoptosis, specific susceptibility to carcinogens, decreased pathogen clearance and over-active inflammatory responses, defects in cytokinesis, impaired control of virus-infected cells, defects in cell cycle control, and impaired cellular response to genotoxic agents. Moreover, some malignancies might arise owing to germline mutations in PID-causative genes. Here, we describe the close association between PIDs and malignancies, particularly hematopoietic malignancies.
| |
Nowadays learning solutions have to be accountable. It becomes important to point out the return on investment. There are several ways to measure the ROI of immersive learning.
Research shows experiential learning is more effective than any other form of learning. Learner’s typically remember 90 percent of what they experience. This is because the learner is actively engaged in the learning experience. But, if experiential learning is not possible, simulating the same experience is the second most effective option.
However, in real world settings, measuring experiential learning and behavioural change can be difficult. Often, training methods are contingent on an instructor or mentor’s expertise and methodology. This can be an unreliable and highly subjective measure of performance.
Immersive learning can provide structure and enforce consistent standards for learners, as well as provide meaningful information on ROI.
Standard measurements provided in all immersive learning applications are Level 1 Satisfaction (did the learners enjoy the training?) and Level 2 Learning (did knowledge transfer occur?). Level 3 Impact (did the learners behaviour change as a result of the training?) and Level 4 Results (did the training have a measurable impact on performance?) are more case specific. These levels can best be measured by qualitative (ie. interviews) and/or quantitative data (ie. performance metrics, sales numbers, customer satisfaction). Level 5 ROI (did the training investment provide a positive return on investment?) can be measured by comparing the upfront development cost of the immersive learning application against the Level 3 Impact and Level 4 Results. | http://edossier.tinqwise.nl/expert/measuring-the-roi-immersive-learning/ |
Measuring the ROI of Online Public RelationsWednesday, July 1st, 2009
Measuring the return on investment from online marketing and PR efforts is essential as an indication of success as well as a feedback mechanism to guide subsequent efforts.
Determining the effectiveness of SEO for Public Relations starts with clearly identified objectives. Matching the purpose for the effort with specific metrics is essential. For example, if improving brand visibility is a goal, then documenting brand mentions in connection with news & PR content at regular intervals can demonstrate the effect of content promotion and link building.
Online PR metrics and tools often include: | http://www.mediarelationsblog.com/category/pr-measurement/ |
TECHNICAL FIELD
BACKGROUND
SUMMARY
DETAILED DESCRIPTION
The present disclosure is generally related to neurosurgical or medical procedures, and more specifically to a system and method for providing a contour video with a 3D surface in a medical navigation system.
In the field of medicine, imaging and image guidance are a significant component of clinical care. From diagnosis and monitoring of disease, to planning of the surgical approach, to guidance during procedures and follow-up after the procedure is complete, imaging and image guidance provides effective and multifaceted treatment approaches, for a variety of procedures, including surgery and radiation therapy. Targeted stem cell delivery, adaptive chemotherapy regimes, and radiation therapy are only a few examples of procedures utilizing imaging guidance in the medical field.
Advanced imaging modalities such as Magnetic Resonance Imaging (“MRI”) have led to improved rates and accuracy of detection, diagnosis and staging in several fields of medicine including neurology, where imaging of diseases such as brain cancer, stroke, Intra-Cerebral Hemorrhage (“ICH”), and neurodegenerative diseases, such as Parkinson's and Alzheimer's, are performed. As an imaging modality, MRI enables three-dimensional visualization of tissue with high contrast in soft tissue without the use of ionizing radiation. This modality is often used in conjunction with other modalities such as Ultrasound (“US”), Positron Emission Tomography (“PET”) and Computed X-ray Tomography (“CT”), by examining the same tissue using the different physical principals available with each modality. CT is often used to visualize boney structures and blood vessels when used in conjunction with an intra-venous agent such as an iodinated contrast agent. MRI may also be performed using a similar contrast agent, such as an intra-venous gadolinium based contrast agent which has pharmaco-kinetic properties that enable visualization of tumors and break-down of the blood brain barrier. These multi-modality solutions can provide varying degrees of contrast between different tissue types, tissue function, and disease states. Imaging modalities can be used in isolation, or in combination to better differentiate and diagnose disease.
In neurosurgery, for example, brain tumors are typically excised through an open craniotomy approach guided by imaging. The data collected in these solutions typically consists of CT scans with an associated contrast agent, such as iodinated contrast agent, as well as MRI scans with an associated contrast agent, such as gadolinium contrast agent. Also, optical imaging is often used in the form of a microscope to differentiate the boundaries of the tumor from healthy tissue, known as the peripheral zone. Tracking of instruments relative to the patient and the associated imaging data is also often achieved by way of external hardware systems such as mechanical arms, or radiofrequency or optical tracking devices. As a set, these devices are commonly referred to as surgical navigation systems.
Three dimensional (3D) sensor systems are increasingly being used in a wide array of applications, including medical procedures. These sensor systems determine the shape and/or features of an object positioned in a scene of the sensor system's view. In recent years, many methods have been proposed for implementing 3D modeling systems that are capable of acquiring fast and accurate high resolution 3D images of objects for various applications.
Triangulation based 3D sensor systems and methods typically have one or more projectors as a light source for projecting onto a surface and one or more cameras at a defined, typically rectified relative position from the projector for imaging the lighted surface. The camera and the projector therefore have different optical paths, and the distance between them is referred to as the baseline. Through knowledge of the baseline distance as well as projection and imaging angles, known geometric/triangulation equations are utilized to determine distance to the imaged object. The main differences among the various triangulation methods known in the art lie in the method of projection as well as the type of light projected, typically structured light, and in the process of image decoding to obtain three dimensional data.
A 3D sensor system may be contemplated as a novel extension of a surgical navigation system. One popular triangulation based 3D sensor system is created by Mantis Vision, which utilizes a single frame structured light active triangulation system to project infrared light patterns onto an environment. To capture 3D information, a projector overlays an infrared light pattern onto the scanning target. Then a digital camera and a depth sensor, synched to the projector, captures the scene with the light reflected by the object. The technology works even in complete darkness, since it includes its own illumination; in bright environments the quality of the resulting image depends on the hardware used.
Video streams, such as from an exoscope, do not provide 3D depth information. Conventional stereo solutions require multiple camera sensors, one for each eye. This approach has a number of limitations, including cost since twice the optical hardware is needed, difficulty in applying such solutions down a restricted aperture such as the port because of physical size, only being visualized with a stereo display such as goggles, and a failure to provide any absolute depth measurement information.
Therefore, there is a need for an improved system and method for providing 3D visualization of patient tissue during a medical procedure.
One aspect of the present disclosure provides a medical navigation system for displaying a three dimensional (3D) surface video of a target. The medical navigation system comprises a 3D imaging device, a camera, a display, and a controller electrically coupled to the 3D imaging device, the camera, and the display. The controller has a processor coupled to a memory. The controller is configured to perform calibration of input devices; acquire 3D depth data of the target from a signal generated by the 3D imaging device; construct a 3D surface contour of the target based on the 3D depth data; acquire a video stream of the target from a signal generated by the camera; generate a 3D surface video based on the 3D surface contour and the video stream; and display the 3D surface video on the display.
Another aspect of the present disclosure provides a method for displaying a three dimensional (3D) surface video of a target in a system having a 3D imaging device, a camera, a display, and a controller electrically coupled to the 3D imaging device, the camera, and the display. The method comprises performing calibration of input devices; acquiring 3D depth data of the target from a signal generated by the 3D imaging device; constructing a 3D surface contour of the target based on the 3D depth data; acquiring a video stream of the target from a signal generated by the camera; generating a 3D surface video based on the 3D surface contour and the video stream; and displaying the 3D surface video on the display.
A further understanding of the functional and advantageous aspects of the disclosure can be realized by reference to the following detailed description and drawings.
Various embodiments and aspects of the disclosure will be described with reference to details discussed below. The following description and drawings are illustrative of the disclosure and are not to be construed as limiting the disclosure. Numerous specific details are described to provide a thorough understanding of various embodiments of the present disclosure. However, in certain instances, well-known or conventional details are not described in order to provide a concise discussion of embodiments of the present disclosure.
As used herein, the terms, “comprises” and “comprising” are to be construed as being inclusive and open ended, and not exclusive. Specifically, when used in the specification and claims, the terms, “comprises” and “comprising” and variations thereof mean the specified features, steps or components are included. These terms are not to be interpreted to exclude the presence of other features, steps or components.
As used herein, the term “exemplary” means “serving as an example, instance, or illustration,” and should not be construed as preferred or advantageous over other configurations disclosed herein.
As used herein, the terms “about”, “approximately”, and “substantially” are meant to cover variations that may exist in the upper and lower limits of the ranges of values, such as variations in properties, parameters, and dimensions. In one non-limiting example, the terms “about”, “approximately”, and “substantially” mean plus or minus 10 percent or less.
Unless defined otherwise, all technical and scientific terms used herein are intended to have the same meaning as commonly understood by one of ordinary skill in the art. Unless otherwise indicated, such as through context, as used herein, the following terms are intended to have the following meanings:
As used herein, the phrase “access port” refers to a cannula, conduit, sheath, port, tube, or other structure that is insertable into a subject, in order to provide access to internal tissue, organs, or other biological substances. In some embodiments, an access port may directly expose internal tissue, for example, via an opening or aperture at a distal end thereof, and/or via an opening or aperture at an intermediate location along a length thereof. In other embodiments, an access port may provide indirect access, via one or more surfaces that are transparent, or partially transparent, to one or more forms of energy or radiation, such as, but not limited to, electromagnetic waves and acoustic waves.
As used herein the phrase “intraoperative” refers to an action, process, method, event or step that occurs or is carried out during at least a portion of a medical procedure. Intraoperative, as defined herein, is not limited to surgical procedures, and may refer to other types of medical procedures, such as diagnostic and therapeutic procedures.
Embodiments of the present disclosure provide imaging devices that are insertable into a subject or patient for imaging internal tissues, and methods of use thereof. Some embodiments of the present disclosure relate to minimally invasive medical procedures that are performed via an access port, whereby surgery, diagnostic imaging, therapy, or other medical procedures (e.g. minimally invasive medical procedures) are performed based on access to internal tissue through the access port.
The present disclosure is generally related to medical procedures, neurosurgery, and minimally invasive port-based surgery in specific.
In the example of a port-based surgery, a surgeon or robotic surgical system may perform a surgical procedure involving tumor resection in which the residual tumor remaining after is minimized, while also minimizing the trauma to the healthy white and grey matter of the brain. In such procedures, trauma may occur, for example, due to contact with the access port, stress to the brain matter, unintentional impact with surgical devices, and/or accidental resection of healthy tissue. A key to minimizing trauma is ensuring that the spatial location of the patient as understood by the surgeon and the surgical system is as accurate as possible.
One aspect of the present disclosure provides combining surface contour information with a video stream allowing the video image to be perceived in 3D. This enables a number of display options, including: (a) contour topography can be tipped obliquely giving 3D surface information of the video without need for goggles to view; (b) contour topography can be tipped and rotated dynamically showing the video projected onto the surfaces from any view angle; specific depth measurements (e.g., in millimeters) can be assessed and displayed; and when viewed with 3D goggles the display may show the 3D video with each point at a specified depth.
FIG. 1
FIG. 1
12
10
12
illustrates the insertion of an access port into a human brain, for providing access to internal brain tissue during a medical procedure. In , access port is inserted into a human brain , providing access to internal brain tissue. Access port may include instruments such as catheters, surgical probes, or cylindrical ports such as the NICO BrainPath. Surgical tools and instruments may then be inserted within the lumen of the access port in order to perform surgical, diagnostic or therapeutic procedures, such as resecting tumors as necessary. The present disclosure applies equally well to catheters, DBS needles, a biopsy procedure, and also to biopsies and/or catheters in other medical procedures performed on other parts of the body where head immobilization is needed.
12
12
In the example of a port-based surgery, a straight or linear access port is typically guided down a sulci path of the brain. Surgical instruments would then be inserted down the access port .
Optical tracking systems, which may be used in the medical procedure, track the position of a part of the instrument that is within line-of-site of the optical tracking camera. These optical tracking systems also require a reference to the patient to know where the instrument is relative to the target (e.g., a tumor) of the medical procedure. These optical tracking systems require a knowledge of the dimensions of the instrument being tracked so that, for example, the optical tracking system knows the position in space of a tip of a medical instrument relative to the tracking markers being tracked.
FIG. 2
FIG. 2
200
201
202
205
201
203
205
Referring to , an exemplary navigation system environment is shown, which may be used to support navigated image-guided surgery. As shown in , surgeon conducts a surgery on a patient in an operating room (OR) environment. A medical navigation system comprising an equipment tower, tracking system, displays and tracked instruments assist the surgeon during his procedure. An operator is also present to operate, control and provide assistance for the medical navigation system .
FIG. 3
FIG. 2
FIG. 3
FIG. 3
FIG. 3
300
205
300
302
304
306
308
310
312
300
321
342
344
342
342
350
360
352
360
342
354
356
342
342
Referring to , a block diagram is shown illustrating a control and processing system that may be used in the medical navigation system shown in (e.g., as part of the equipment tower). As shown in , in one example, control and processing system may include one or more processors , a memory , a system bus , one or more input/output interfaces , a communications interface , and storage device . Control and processing system may be interfaced with other external devices, such as tracking system , data storage , and external user input and output devices , which may include, for example, one or more of a display, keyboard, mouse, sensors attached to medical equipment, foot pedal, and microphone and speaker. Data storage may be any suitable data storage device, such as a local or remote computing device (e.g. a computer, hard drive, digital media device, or server) having a database stored thereon. In the example shown in , data storage device includes identification data for identifying one or more medical instruments and configuration data that associates customized configuration parameters with one or more medical instruments . Data storage device may also include preoperative image data and/or medical procedure planning data . Although data storage device is shown as a single device in , it will be understood that in other embodiments, data storage device may be provided as multiple storage devices.
360
300
360
300
360
300
321
360
360
307
307
360
300
Medical instruments are identifiable by control and processing unit . Medical instruments may be connected to and controlled by control and processing unit , or medical instruments may be operated or otherwise employed independent of control and processing unit . Tracking system may be employed to track one or more of medical instruments and spatially register the one or more tracked medical instruments to an intraoperative reference frame. For example, medical instruments may include tracking markers such as tracking spheres that may be recognizable by a tracking camera . In one example, the tracking camera may be an infrared (IR) tracking camera. In another example, as sheath placed over a medical instrument may be connected to and controlled by control and processing unit .
300
352
320
322
324
305
328
309
311
FIG. 3
Control and processing unit may also interface with a number of configurable devices, and may intraoperatively reconfigure one or more of such devices based on configuration parameters obtained from configuration data . Examples of devices , as shown in , include one or more external imaging devices , one or more illumination devices , a robotic arm , one or more projection devices , a 3D scanner , and one or more displays .
302
304
302
304
370
372
374
376
378
380
382
384
386
370
304
370
FIG. 3
Exemplary aspects of the disclosure can be implemented via processor(s) and/or memory . For example, the functionalities described herein can be partially implemented via hardware logic in processor and partially using the instructions stored in memory , as one or more processing modules or engines . Example processing modules include, but are not limited to, user interface engine , tracking module , motor controller , image processing engine , image registration engine , procedure planning engine , navigation engine , and context analysis module . While the example processing modules are shown separately in , in one example the processing modules may be stored in the memory and the processing modules may be collectively referred to as processing modules .
FIG. 3
300
384
300
It is to be understood that the system is not intended to be limited to the components shown in . One or more components of the control and processing system may be provided as an external component or device. In one example, navigation module may be provided as an external navigation system that is integrated with control and processing system .
302
304
304
Some embodiments may be implemented using processor without additional instructions stored in memory . Some embodiments may be implemented using the instructions stored in memory for execution by one or more general purpose microprocessors. Thus, the disclosure is not limited to a specific configuration of hardware and/or software.
While some embodiments can be implemented in fully functioning computers and computer systems, various embodiments are capable of being distributed as a computing product in a variety of forms and are capable of being applied regardless of the particular type of machine or computer readable media used to actually effect the distribution.
205
300
205
According to one aspect of the present application, one purpose of the navigation system , which may include control and processing unit , is to provide tools to the neurosurgeon that will lead to the most informed, least damaging neurosurgical operations. In addition to removal of brain tumors and intracranial hemorrhages (ICH), the navigation system can also be applied to a brain biopsy, a functional/deep-brain stimulation, a catheter/shunt placement procedure, open craniotomies, endonasal/skull-based/ENT, spine procedures, and other parts of the body such as breast biopsies, liver biopsies, etc. While several examples have been provided, aspects of the present disclosure may be applied to any suitable medical procedure.
205
While one example of a navigation system is provided that may be used with aspects of the present application, any suitable navigation system may be used, such as a navigation system using optical tracking instead of infrared cameras.
FIG. 4A
FIG. 2
400
205
402
Referring to , a flow chart is shown illustrating a method of performing a port-based surgical procedure using a navigation system, such as the medical navigation system described in relation to . At a first block , the port-based surgical plan is imported. A detailed description of the process to create and select a surgical plan is outlined in international publication WO/2014/139024, entitled “PLANNING, NAVIGATION AND SIMULATION SYSTEMS AND METHODS FOR MINIMALLY INVASIVE THERAPY”, which claims priority to U.S. Provisional Patent Application Ser. Nos. 61/800,155 and 61/924,993, which are all hereby incorporated by reference in their entirety.
402
404
Once the plan has been imported into the navigation system at the block , the patient is placed on a surgical bed. The head position is confirmed with the patient plan in the navigation system (block ), which in one example may be implemented by a computer or controller forming part of the equipment tower.
406
Next, registration of the patient is initiated (block ). The phrase “registration” or “image registration” refers to the process of transforming different sets of data into one coordinate system. Data may include multiple photographs, data from different sensors, times, depths, or viewpoints. The process of “registration” is used in the present application for medical imaging in which images from different imaging modalities are co-registered. Registration is used in order to be able to compare or integrate the data obtained from these different modalities to the patient in physical space.
Those skilled in the relevant arts will appreciate that there are numerous registration techniques available and one or more of the techniques may be applied to the present example. Non-limiting examples include intensity-based methods that compare intensity patterns in images via correlation metrics, while feature-based methods find correspondence between image features such as points, lines, and contours. Image registration methods may also be classified according to the transformation models they use to relate the target image space to the reference image space. Another classification can be made between single-modality and multi-modality methods. Single-modality methods typically register images in the same modality acquired by the same scanner or sensor type, for example, a series of magnetic resonance (MR) images may be co-registered, while multi-modality registration methods are used to register images acquired by different scanner or sensor types, for example in magnetic resonance imaging (MRI) and positron emission tomography (PET). In the present disclosure, multi-modality registration methods may be used in medical imaging of the head and/or brain as images of a subject are frequently obtained from different scanners. Examples include registration of brain computerized tomography (CT)/MRI images or PET/CT images for tumor localization, registration of contrast-enhanced CT images against non-contrast-enhanced CT images, and registration of ultrasound and CT to patient in physical space.
FIG. 4B
FIG. 4A
406
440
442
444
446
Referring now to , a flow chart is shown illustrating a method involved in registration block as outlined in , in greater detail. If the use of fiducial touch points () is contemplated, the method involves first identifying fiducials on images (block ), then touching the touch points with a tracked instrument (block ). Next, the navigation system computes the registration to reference markers (block ).
450
450
452
454
456
Alternately, registration can also be completed by conducting a surface scan procedure (block ), which may be applied to aspects of the present disclosure. The block is presented to show an alternative approach. First, the face is scanned using a 3D scanner (block ). Next, the face surface is extracted from MR/CT data (block ). Finally, surfaces are matched to determine registration data points (block ).
440
450
408
FIG. 4A
Upon completion of either the fiducial touch points () or surface scan () procedures, the data extracted is computed and used to confirm registration at block , shown in .
FIG. 4A
408
410
Referring back to , once registration is confirmed (block ), the patient is draped (block ). Typically, draping involves covering the patient and surrounding areas with a sterile barrier to create and maintain a sterile field during the surgical procedure. The purpose of draping is to eliminate the passage of microorganisms (e.g., bacteria) between non-sterile and sterile areas. At this point, conventional navigation systems require that the non-sterile patient reference is replaced with a sterile patient reference of identical geometry location and orientation. Numerous mechanical methods may be used to minimize the displacement of the new sterile patient reference relative to the non-sterile one that was used for registration but it is inevitable that some error will exist. This error directly translates into registration error between the surgical field and pre-surgical images. In fact, the further away points of interest are from the patient reference, the worse the error will be.
410
412
414
Upon completion of draping (block ), the patient engagement points are confirmed (block ) and then the craniotomy is prepared and planned (block ).
414
416
422
Upon completion of the preparation and planning of the craniotomy (block ), the craniotomy is cut and a bone flap is temporarily removed from the skull to access the brain (block ). Registration data is updated with the navigation system at this point (block ).
418
420
Next, the engagement within craniotomy and the motion range are confirmed (block ). Next, the procedure advances to cutting the dura at the engagement points and identifying the sulcus (block ).
424
420
432
434
424
Thereafter, the cannulation process is initiated (block ). Cannulation involves inserting a port into the brain, typically along a sulci path as identified at , along a trajectory plan. Cannulation is typically an iterative process that involves repeating the steps of aligning the port on engagement and setting the planned trajectory (block ) and then cannulating to the target depth (block ) until the complete trajectory plan is executed (block ).
426
428
430
428
420
434
FIG. 4A
Once cannulation is complete, the surgeon then performs resection (block ) to remove part of the brain and/or tumor of interest. The surgeon then decannulates (block ) by removing the port and any tracking instruments from the brain. Finally, the surgeon closes the dura and completes the craniotomy (block ). Some aspects of are specific to port-based surgery, such as portions of blocks , , and , but the appropriate portions of these blocks may be skipped or suitably modified when performing non-port based surgery.
307
309
With a video camera input, such as from a video camera , which in one example may be an exoscope, and a calibrated point cloud or 3D surface contour generated using a 3D scanner, such as 3D scanner , depth information for each pixel in the camera image can be obtained. This representation can be viewed directly as a 3D point cloud, with each point's colour determined by the matched video image colour. Further, the point cloud may be used to generate a continuous surface representation and the video image may be mapped onto this surface through methods that are known in computer graphics, such as texture mapping. Either of these representations may be used, as discussed in more detail below, and are generally referred to as a 3D surface image or 3D surface video. Further, the image input may be a continuous video stream and the point cloud or surface representation may update continuously to provide a live streaming 3D surface video stream. Finally, the point cloud may be an accumulation of data from multiple 3D distance sensors at multiple viewing angles, providing more detailed depth information, such as filling in detail for surface areas that are occluded to one sensor.
Depth information can be directly visualized from the generated 3D surface images or video streams. This can be achieved in a number of ways. In one example, the contour topography can be tipped obliquely to the user's view position, giving 3D surface information of the image. The view can also be dynamically rotated about any axes, allowing the data to be viewed from all angles, giving a sense of the 3D geometry of the image or video stream data.
205
Further, since the 3D scanner or imaging device provides measurable depth information at each point, the generated live 3D surface image or video stream can also provide directly measurable depth information to the traditionally flat image or video representations. Direct or relative depth measurements can be made from the surface or point cloud data, allowing, for example, a display of the Euclidean distance including depth between any 2 points in the image data. In a further example, when combined with a medical navigation system, such as the medical navigation system that may have a registered optical or electromagnetic tracking system, a display of the distance from the tip of a tracked surgical instrument, along the tool normal direction, to the surface image data may be provided. Alternatively, a distance from the instrument tip along a transverse direction can display the lateral distance of the tool relative to the surface, which can be, for example, the side of a body cavity or retraction device.
Finally, any of these representations can also be viewed with a stereo display system, such as active or passive stereo 3D glasses, to allow for a true 3D perception of the surface image or video stream. A stereo display is made possible without the need for 2 image acquisition devices, which reduces cost and bulk of the system. Further, in cases where the line of site is limited, such as through a surgical port or through an endoscope, it may not be possible to get a good view of the surface with stereo imaging sensors separated by sufficient distance to provide proper stereo perception.
FIG. 5
500
500
205
300
309
307
311
302
Referring now to , a flow chart is shown illustrating a method for displaying a three dimensional (3D) surface video of a target. The method may be applied in a system, such as the medical navigation system having control and processing unit , which includes a 3D imaging device (e.g., 3D scanner ), a video camera (e.g., camera ), a display (e.g., display ), and a controller (e.g., the processor ) electrically coupled to the 3D imaging device, the video camera, and the display. While a video camera is used as an example, any suitable type of camera may be used such as a video camera, an infrared camera, a visible light camera, or a non-visible light camera.
502
307
309
321
309
307
500
500
309
307
At a first block , calibration of input devices is performed. The video camera and the 3D scanner may be configured to remain in a known, calibrated position relative to one another. In some embodiments, calibration may also involve the tracking system . In one example, the calibration of the 3D scanner with the video camera may be done before the method is executed or at the beginning of the method since the spatial relation of the 3D scanner with the video camera needs to be known before a 3D surface video can be created. In one example, the video camera may be an RGB video camera.
500
309
307
321
500
In one example, calibration may be used to accurately map information from one coordinate system to another. In method , the spatial relationship between the 3D scanner , video camera , and optionally, the tracking system may be determined through a multistep calibration process including: (1) depth calibration, (2) video camera calibration, (3) IR (e.g., infrared tracking system) to video camera calibration, (4) IR to optical camera calibration, where an optical tracking system is used, and (5) multiple IR camera registration and synchronization. These processes may carried out a single time prior to or at the beginning of the method . These components of the calibration process are described in more detail below.
309
Depth calibration: Depth calibration involves determining the correspondence between features of a particular pattern projected by a laser emitter of the 3D scanner (e.g., that appear along pre-determined epipolar lines) and the points in space from which the features are reflected. For more information, refer to Golrdon, Eyal, and Gur Arie Bittan. “3D geometric modeling and motion capture using both single and dual imaging.” U.S. Pat. No. 8,090,194. 3 Jan. 2012, the entirety of which is hereby incorporated by reference.
x
y
x
y
1
2
3
1
2
Video camera and IR camera (e.g., infrared tracking system) calibration: This step involves performing camera resectioning, often called camera calibration, for both the IR camera and the video camera to identify the camera intrinsic and extrinsic parameters (respectively, focal lengths/principal points (f, f, c, c) and [R T]) as well as lens distortion coefficients (k, k, k, p, p). There are many different approaches to camera resectioning including, but not limited to, direct linear transformation (DLT), Tsai's method, as detailed in Tsai, Roger Y. “A versatile camera calibration technique for high-accuracy 3D machine vision metrology using off-the-shelf TV cameras and lenses.” Robotics and Automation, IEEE Journal of 3.4 (1987): 323-344, the entirety of which is hereby incorporated by reference, and Zhang's method, detailed by Zhang, Zhengyou. “A flexible new technique for camera calibration.” Pattern Analysis and Machine Intelligence, IEEE Transactions on 22.11 (2000): 1330-1334, the entirety of which is hereby incorporated by reference.
RGB
optical tracker
−1
optical tracker
T
T
T
IR
RGB
IR
Video camera (e.g., an RGB camera) to IR camera calibration: Calibrating the video camera to IR camera can be achieved via either of the following methods: (a) if both the video camera and the IR camera are tracked by an optical tracker (e.g., a set of reference markers known as dynamic reference body (DRB) are attached to their rigid bodies), the relationship between two cameras can be easily computed:
=×
Assuming that both the video camera and the IR camera (e.g., infrared tracking system) can be approximated by the pinhole camera model and that their relative geometry does not vary through the course of procedure, the spatial relationship between the video camera and the IR camera coordinate systems can be determined from the projections of corresponding points in the two cameras. This process is similar to stereo camera calibration explained extensively in the literature Faugeras, Olivier D. “What can be seen in three dimensions with an uncalibrated stereo rig?.” Computer Vision-ECCV'92. Springer Berlin Heidelberg, 1992, the entirety of which is hereby incorporated by reference.
309
3D scanner IR camera to optical tracking camera calibration may be completed as described in PCT Patent Application No. PCT/CA2015/050573, which is hereby incorporated by reference in its entirety.
Multiple IR camera registration and synchronization: The 3D point clouds obtained by two or more IR cameras (e.g., where the 3D imaging device or scanner uses IR technology) can be registered together using a number of 3D-to-3D registration techniques such as an iterative closest point (ICP) algorithm. To this end, scanners are temporally synchronized, circumventing an overlap between multiple patterns. Synchronization may be done by simply sharing the timestamp through a wireless communication between cameras.
502
In one example, performing the calibration of the input devices at the block includes mapping coordinates of the 3D imaging device, the video camera, and a tracking system of the medical navigation system into a common coordinate system and may include any of the aspects described above, but not necessarily all of them.
500
504
205
3050
Once calibration has been completed, the method proceeds to a block where 3D depth data of the target is acquired from a signal generated by the 3D imaging device. The target may include human tissue, such as a portion of a human that is the subject of a medical procedure, for example brain tissue. The 3D imaging device may be any of a 3D surface scanner, a structured light scanner, an optical coherence tomography (OCT) scanner, a rangefinder, and a focused light beam, or any other suitable 3D imaging device. In the example of a 3D surface scanner, the 3D depth data may be acquired by a user or technician performing a scan of the surface of the target. Alternatively, the medical navigation system may have an automated arm (e.g., robotic arm that automatically performs the scan.
3D surface scanners, or 3D Scanners, are a class of optical imaging devices that are capable of collecting depth or distance information of objects in its scanning range such that the scanned object's 3D coordinate data can be acquired. These scanners operate through a wide variety of technologies and methods that recover the distance information from scanned objects though analysis of their acquired images. This includes, but is not limited to passive sensor technologies that work by photogrammic analysis of features in the images, or active sensor technologies that may operate through projection and analysis of light with known properties (e.g., by illuminating an object with laser light for point-based triangulation and holographic reconstruction, or through projection of structured light for analysis of pattern deformations).
309
Of the aforementioned technologies used in hand-held 3D scanners, structured light scanners are among the most common type. Structured light scanning technology uses a projector to project light of a known structure, or pattern, onto objects of interest, such as the target of concern in the present description. The patterned light can be projected using either incoherent or coherent light emitters, depending on the design criteria of a particular application. One or more cameras would then be used to acquire images of the objects illuminated by the projected light, and the distorted pattern from these images is analyzed to reconstruct the 3D surface contour. In the present description, the 3D scanner includes both the projector and the one or more cameras. The projected structured light can vary from simple geometric forms to more complex 2D coded patterns that may or may not vary spatially or temporally. These patterns may be designed with codified features to disambiguate their locations and to improve scanning accuracy. The types of electromagnetic radiation used for structured light scanning can also range from visible to infra-red light or a mix thereof.
There are several methods of detecting surface contours of tissues. These methods are described as examples only and are not meant to limit the scope of the application.
Optical Coherence Tomography (OCT) is an optical imaging technique that enables visualization of tissue in one, two or three dimensions through the use of optical interferometry. OCT is an optical analog of ultrasound imaging in that it measures the amplitude of the backscattered light (e.g., echoes) returning from a tissue sample as a function of delay. Through scanning the probe beam across the tissue surface and detecting the corresponding echoes from each tissue location, a multi-dimensional image of the tissue structure may be obtained. By extracting the top layer of the tissue in an OCT image through image segmentation, a surface contour of tissue may be obtained. In general, OCT can provide surface contour of an area of a few centimeters by a few centimeters with sub-millimeter resolution.
OCT described here includes, but is not limited to, time domain OCT, frequency domain OCT, spectral domain OCT, swept source OCT, common path OCT, polarization sensitive OCT and full field OCT. In addition, OCT described here includes, but is not limited to, free space based OCT systems, fiber optic based OCT systems and any combination of the two (e.g., free space or fiber hybrid optical systems). The probe beam could be scanned by using, but not limited to, galvanometer or MEMS mirrors.
In another example, tissue contour may be obtained using one or more rangefinders. Rangefinders use electromagnetic waves (e.g., light) pulses to determine the distance of the tissue through time-of-flight techniques. Time-of-flight techniques measure the time taken by the pulse to be reflected off the tissue and return to the sender. By using the propagation speed of the pulse and the measured time, distance of the tissue at the location where the light pulse hits may be calculated. By scanning or projecting light pulses across the tissue surface, a surface contour may be obtained through mapping the calculated distance information spatially.
Instead of using a time-of-flight technique, tissue distance may also be obtained using one or more focused light beams. A focused light beam uses a minimum spot size that is at a fixed distance away from the light source and the lens that focused the beam. Through moving the light source and the lens closer or further away from the tissue while fixing the distance between the light source and the lens, the minimum beam spot may be observed from the tissue. By mapping the positions of the light sources or lens at which the minimum beam spot is observed from each location of the tissue, a surface contour of the tissue may be obtained. Scanning of the light source across of the tissue may be achieved using galvanometers or MEMS mirrors. Multiple light sources and lenses may also be used including but not limiting to the use of microlens array for simultaneous measurement of an area of tissue. An electronically tunable lens could also be used to speed up measurement time.
504
500
506
504
506
506
Once block has been completed, the method proceeds to a block where a 3D surface contour of the target is constructed based on the 3D depth data. In one example, constructing a 3D surface contour includes generating a 3D point cloud of the target based on the 3D depth data. In the example where a structured light 3D scanner is used, the reconstruction of the object's 3D surface contour from a structured light scan may be a multistep process. The desired pattern of the structured light is first projected onto the objects of interest, such as the target. Images of the structured light illuminated objects are acquired by a camera (e.g. at the block ), and known features contained in the patterned light are extracted. The extracted pattern features from the camera image are then matched to their homologs in the projected image. By measuring the changes in position of the features and accounting for the model parameters of both the camera and the projector with their epipolar geometry, the 3D coordinates on the surface of the objects can be computed (e.g., at the block ). Adding additional cameras in this process can help improve accuracy of the recovered 3D coordinates. At the block , using the 3D coordinates recovered from the scanning the object, the target's surface contour may be reconstructed through a wide variety of methods including those based on point triangulation or globally and locally defined surface fitting methods.
FIG. 6
600
602
602
602
600
600
Referring to , a diagram is shown illustrating an exemplary surface contour including a target showing the surface contour of the target . In one example, the target may be human tissue. In one example, the surface contour may be illustrated as a black and white or grayscale collection of points or point cloud. However, the points in the point cloud may also be coloured, according to the design criteria of a particular application.
FIG. 5
506
600
500
508
307
Returning back to , once block has been completed and the surface contour has been constructed, the method proceeds to a block where a 2D video stream of the target is acquired, for example using the video camera .
500
510
506
508
512
311
Next, the method proceeds to a block where a 3D surface video is generated using the 3D surface contour constructed at the block and the 2D video stream acquired at the block . The generated 3D surface video is then displayed at the block , for example on the display . In one example, generating the 3D surface video includes colouring each point of the 3D surface contour or point cloud using colour provided by the video stream.
307
In one example, the 3D surface video displayed on the display shows a 3D video that is dynamically rotatable about any axis. The display may include a two dimensional video display, a stereo display system, stereo goggles, or any other suitable display for showing a 3D image or video.
500
The present system and method may perceive and combine certain visual cues to have an overall estimate of depth. Among them, occlusion, or partial blockage of one object's view by another object, is one of the strongest cue in perceiving the relative proximity between objects. In natural images, these cues are compatible, and therefore any conflicting information may cause visual fatigue and degrade the perception. This phenomenon, known as depth misperception, can dramatically affect the outcome of augmented-reality (AR), and particularly surgical AR environments. In such environments, if not handled properly, the occlusion of an operators' hands or medical devices by virtual images can result in conflicting depth cues with incorrect visualization of the medical images. Occlusion handling is a method by which the method may detect and therefore resolve such incompatibility between real and virtual information in AR environments.
500
309
A number of conventional solutions have been proposed to handle occlusion in medical AR environments. For instance, hue-based thresholding can be employed to locate and thus mask the surgical gloves worn by the medical practitioner. This technique can be even further optimized by making use of tracking information, whether optical, magnetic, or marker-based, to track surgical tools and thereby optimize the detection process. Another approach is to use visual information such as real-time video captured from two or even multiple cameras and apply techniques such as visual hull or graph-cut to distinguish the foreground from the background, creating different levels of depth (e.g., a depth map). In one example, the method may involve generating the depth map using the data provided by 3D scanner . Assuming that the 3D scanner and the tracking system are in the same coordinate space (e.g., registered), having the depth map will provide enough information regarding the location of objects in the 3D space. Therefore, occlusion can be handled by masking out the virtual information at the locations where real objects are detected in between the camera and the surgical site, onto which the virtual images are superimposed.
309
307
In one example, occlusion events may be excluded using the 3D surface contour such that an object passing between the target and at least one of the 3D imaging device and the video camera is not visible in the 3D surface video. In one example, this may be achieved such that objects having a depth that is a beyond a threshold distance outside of the 3D surface contour are not shown in the 3D surface video.
FIG. 8
FIG. 9
FIG. 8
FIG. 9
FIGS. 8 and 9
800
900
500
500
Referring to and , two images and respectively are shown that provide examples of occlusion handling that may be performed by aspects of the system and method described herein. A white head phantom is imaged that is occluded by a hand and then the hand is removed. The hand was differentiated from the head during the scan and can be removed, for example in the method . shows the scanned image from a direction approximately perpendicular to the scan direction. shows the hand and head from a direction slightly offset from the scan direction. As shown in , the head surface is not affected by occlusion by the hand since the hand may be identified by method as not part of the head.
FIG. 7
700
702
Referring now to , is screen shot is shown illustrating an exemplary frame of a 3D surface video , showing the target.
512
In one example, the block may provide for augmenting the generated 3D surface video onto pre-operative images, which in one example may be 3 dimensional. In one example, displaying the 3D surface video on the display includes overlaying the 3D surface video onto a corresponding portion of pre-operative images displayed on the display. As the surgeon moves around the surgical site of interest and therefore shifts the focus of the video camera, the 3D surface video may also move such that the 3D surface video remains overlaid on the portion of the pre-operative images that corresponds to the 3D surface video, therefore guiding the surgeon to the appropriate surgical site of interest (e.g., a tumour to be removed).
Explained another way, in the present example the video captured from the video camera may be first projected on the 3D surface of the tissue and then snapped onto the 3D pre-op images of the patient (e.g., either MR or CT images). This visualization approach can be very useful as it allows surgeons to spatially correlate the real-time video feed with the pre-op images, providing high situational awareness, especially when the user starts interacting with the volume. This is similar to an augmented reality approach but instead of overlaying virtual data on real time video, the video is overlaid on the virtual data, commonly known as augmented virtuality.
205
305
300
309
307
In another example, the medical navigation system further has a positioning device having a positioning arm (e.g., the robotic arm ) with an end effector at the end of the positioning arm. The positioning device is electrically coupled to the controller, such as control and processing unit , and at least one of the 3D imaging device and the video camera is mountable on the end effector. With this configuration, the 3D scanning and video stream acquisition may be automatic and not need human direction.
500
205
300
205
309
307
311
302
304
502
504
506
508
510
512
500
The method may be implemented in a medical navigation system, such as the medical navigation system having control and processing unit . The medical navigation system includes a 3D imaging device, such as 3D scanner , a video camera, such as video camera , a display, such as display , and a controller electrically coupled to the 3D imaging device, the video camera, and the display. The controller has a processor (e.g., processor ) coupled to a memory (e.g., memory ). The controller is configured to perform one or more of the blocks , , , , , and of the method .
The specific embodiments described above have been shown by way of example, and it should be understood that these embodiments may be susceptible to various modifications and alternative forms. It should be further understood that the claims are not intended to be limited to the particular forms disclosed, but rather to cover modifications, equivalents, and alternatives falling within the spirit and scope of this disclosure.
BRIEF DESCRIPTION OF THE DRAWINGS
Embodiments will now be described, by way of example only, with reference to the drawings, in which:
FIG. 1
illustrates the insertion of an access port into a human brain, for providing access to internal brain tissue during a medical procedure;
FIG. 2
shows an exemplary navigation system to support minimally invasive access port-based surgery;
FIG. 3
FIG. 2
is a block diagram illustrating a control and processing system that may be used in the navigation system shown in ;
FIG. 4A
FIG. 2
is a flow chart illustrating a method involved in a surgical procedure using the navigation system of ;
FIG. 4B
FIG. 4A
is a flow chart illustrating a method of registering a patient for a surgical procedure as outlined in ;
FIG. 5
illustrates a flow chart showing a method for displaying a three dimensional surface video of a target;
FIG. 6
is a drawing illustrating an exemplary 3D surface contour of a target;
FIG. 7
is screen shot illustrating an exemplary frame of a 3D surface video;
FIG. 8
is screen shot illustrating occlusion handling; and
FIG. 9
is another screen shot illustrating occlusion handling. | |
The Hoysala dynasty of Karnataka built several artistically magnificent temples in the Vesara style, which have ornate sculptures and reliefs depicting the trinity (Shiva, Vishnu and Bramha), several divine figures and scenes from ordinary life from the medieval period. Detailed study of these sculptures and reliefs shows that an entire legacy of visual art dedicated to the feminine principle or Shakti, have also been artistically rendered by the sculptors of that era. Though many temples are dedicated to Vishnu or Keshava and Shiva or Hoysaleshwara, both the outer walls and the inner mandapas are carved with many sculptures and reliefs of dancing Shaktis, apsaras, yoginis and common folk shown in nritya or dancing postures. This unique contribution and its iconography will be discussed and highlighted in the paper in the light of sacred and secular aspects with reference to natya and Shilpa shastras. The focus of this paper will be to examine the different aspects of sacred and secular in the dance sculptures of the feminine representations in the Hoysala temples and their placement in the architecture of the temple. The placement of the sculptures and their size also determines the narrative and philosophical import of divine ‘feminine’. The objective of the paper is to bring attention to the use of movement by the sculptors to explicate the cosmic plan of the temple and the philosophical canons of the period. The research was carried out in field visits to the temples, and studying both the qualitative and quantitative aspects of the sculptures under study in the larger architectural ‘plan’ or Vaastu of the Hoysala temples. This paper will consist of research findings about the dancing goddesses (Lakshmi, Saraswati, Parvati), the myths of dancing Lord Vishnu’s in his feminine aspect as Mohini and other dancing female depictions in sculptures and reliefs of Hoysala temples.
Brief note on the history and structure of Halebidu and Belur temples
1. Halebidu
History
In the medieval period, between the 10th and the 14th c. AD, the Hoysala rulers of Karnataka built many beautiful temples in and around Halebidu in Karnataka. This area has been known historically as Dvarasamudra or Dorasamudra. The Hoysaleshvara temple, though partially ruined, stands as a splendid specimen reflecting the art and architectural style of the Hoysalas. Daily rituals to the deity Shiva have resumed only recently, and the temple is still largely known for its economic value as a major tourist attraction. The Karnataka government’s archaeological department now maintains the temple. An inscription in a nearby village states that this temple was constructed for the Hoysala King Vishnuvardhana by his army chief Ketamalla, and he in turn granted some lands for the temple in 1121 AD. The Hoysaleshvara temple has several folk tales or dantakathas associated with it. The best known story is as follows. Indra, the king of the Gods, became very jealous of the fact that Dorasamudra, the Hoysala capital, was more beautiful than his capital Amaravati. He realized that this was because of the perfect construction of the Hoysaleshvara Shiva temple. So he decided to mar its perfection by carrying away its vimanas or towers. There are minor variations to this tale, which recurs in local tourist literature.
Structure
The Hoysaleshvara temple is a dvikuta structure or a temple with two central shrines, and is constructed in the Vesara style. The Vesara style combines elements of nagara or northern and the dravida or southern styles of traditional architecture. The outer walls of the temple are carved in an ornate and intricate pattern which is a characteristic style of Hoysala temples. The temple stands on a jagati or platform and there are bands (pattikas) of decorative motifs, gajas (elephants), hamsas (swans) and other scenes of human endeavour carved in exquisite detail on the lower levels. The middle section of the temple is where the prominently carved sculptures find a place of honour. Each projection or recession has one large sculpture placed in the middle section of the temple wall. Some of these are of individual deities and some sculptures have deities with their consorts (for e.g. Lakshmi with Narasimha or Varaha with Bhudevi).
2. Belur
History
Very little is known about Belur before the advent of the Hoysala dynasty. In c.1100 AD with the Hoysala king Ballala I, Belur grew in importance and it continued to prosper under his brother and successor, Vishnuvardhana. In some of the inscriptions it is known as earthly Vaikuntha or the abode of the God Vishnu and is also referred to asdakshina Varanasi. In commemoration of his victory against the Cholas in Talakadu in 1116 AD, Vishnuvardhana built several temples and the most famous among them was the Chennakeshava temple at Belur, which was consecrated in 1117 AD. An inscription records the event of consecration of the temple by Vishnuvardhana, and even today the hymn in praise of the presiding deity Chennakeshava has the words “the one who is worshipped by Vishnuvardhana” or Vishnuvardhanapujita. Ever since the temple of the Chennakeshava was built at Belur, the fortunes of the temple and the town have been indivisible.
With the fall of the Hoysala kingdom in the fourteenth century, Belur, which had gained the status of a pilgrimage centre until then under the Hoysalas, lost its importance. Later it regained some of its glory under the Mysore Wodeyars rulers in the seventeenth century. In the intervening period in the fourteenth century Halebidu, a sister town, also known as Dorasamudra (Dvarasamudra) was destroyed by the Vijayanagara invasion, and in the process Belur which was included in the province of Balam was given to the Vijayanagara kings. The fifteenth century saw Belur pass through the hands of the Vijayanagara King Sriranga Raya III to the Ikkeri dynasty. Later Belur was taken in 1690 AD by the Mysore Wodeyar ruler and fell under his jurisdiction till India became independent in 1947.
Structure
The Belur main temple is built in Hoysala style with chlorite schist, which is favorable for delicate carving, detailed work, and also takes polish and lots of modulations. As is characteristic of many Hoysala temples it stands on a raised platform (3ft in height) measuring 178 ft by 156 ft. The platform is wide and follows a star shaped pattern. It serves as a pradakshina patha around the temple as there is no place for pradakshina around the garbhagriha within the temple.
The main temple that stands above this platform can be divided into two major sections. The front section which one encounters first on entering includes the navaranga and the mandapa , and the second section includes the vestibule or sukhanasi and the sanctum or garbhagriha
Aspects of the feminine represented through dance at Belur and Halebidu – divine and secular
I will begin my discussion with the Belur Chennakeshava temple and there are various legends associated with the temple. One of the purana/legend/myth is connected with dance and the other legend is that of the sculptor who was associated with the building of the temple. In this paper I will focus on the dance aspects of the sthala puranas.
The Mohini legend
The presiding deity in the temple is Vishnuwho is said to be in his incarnation as a beautiful divine female – Mohini and hence he is called Chennakeshava or the beautiful Keshava. The myth is described in Sivalilamrita as follows:
Shiva blessed Bhasmasura, with the ability to burn anybody on whose head he placed his hand. Bhasmasura in his arrogance proceeded to try the boon on Shiva himself. Shiva then ran fearing for his safety. Vishnu in the guise of Mohini then intervened. Mohini places herself in the path of the demon and he gets enchanted by her beauty. He asks her to marry him. Mohini refuses and says she would marry the man who could defeat her in a dance contest. Bhasmasura agrees and the contest begins, with Bhasmasura mimicking Mohini’s movements. Mohini cleverly takes a pose in which she places her hand on her head. Bhasmasura does the same and falls prey to his own powers, and he is burnt to ashes. As part of the utsavas or festivals conducted in the temple in the month of April, the legend of Mohini Bhasmasura is reenacted even today in the north – west corner of the temple, with the Keshava image dressed as Mohini.
This festival is called the Mohinialankarotsavaor the festival where the God in his Mohini decoration or alankara is worshipped. In this the Keshava utsavamurti (the image used for such festivals) is dressed up as Mohini. A symbolic statue of Bhasmasura, is burnt, in the evening and while burning the Bhasmasura statue the Mohini statue is made to sway. The festival begins with a shloka which praises Keshava as bhasmasuradhvamsakam.
This festival over the years has been combined with the festival of Manmatha which occurs at the same time. There is a parallel between the two legends- with the main protagonists being burnt to ashes. But the similarity ends here. In this festival called Kamanahabba and an effigy of Manmatha is burnt and it is celebrated all over Karnataka. The effigy that is constructed out of old wood and other objects stolen from houses in the neighborhood by young children is then burnt. The priests in the temple call the same festival Mohini alankarotsava and the local people call it Kamanahabba. One of the reasons for this might be that the legend of Mohini- Bhasmasura lost its importance and the more popular festival of Manmatha came to be celebrated. How does this translate into the shilpas carved on the temple walls? Here the topic of the famous madanikas or shalabhanjikas of Belur is of importance.
(The bracket figures or the madanikais of Belur have long been the topic of scholarly discussion and interest. It is interesting to note that there is one theory that they were added to the temple after its completion (Collyer, 1990). However, there are no epigraphic records to substantiate this view, but the analysis is based on stylistic grounds as these images bear close resemblance to the sculptures at Halebidu which were carved later (c.1127 AD). On close observation I found smaller bracket figures, which seemed to be the original bracket figures. These are shorter in height and not carved in the round and even the craftsmanship is very poor. The now famous madanikais are placed over these older figures and conceal them. However, in places where the madanikais are stolen or lost the older bracket figures can be seen. So I would tend to agree with Collyer’s view that the newer madanikai figures were added much later, and are probably closer in terms of style to the Halebidu figures. )
Many of these madanikais have the name of the sculptor signed at the bottom of the figure and all of them are approximately three feet in height, which is a very important part of the Hoyasala legacy. There are forty bracket figures supporting the eave on the outside and four bracket figures inside. The four additional madanikaismadanikai figures are placed in the mandapa of the temple. Collyer (1990) says that since they were placed in a less significant part of the temple they were not bound by the strict representational rules of iconography and hence the figures are a result of the individual sculptor’s imagination and style. Sastri (1965), however, says that the stambhas (pillars or columns) in a temple represent the stambha purusha who carries the vimana on his head. By this statement he means that the pillar is visualized as a human who is carrying the tower of the temple. The madanikais on the sthambas touching the vimana represent the presiding deity. Though some are secular in nature they represent mandalarahasya (Sastri, 1965). This argument is substantiated by the sthala purana. According to the sthalapurana, Vishnu took the form of Mohini in Belur and hence Vishnu’s kanyarupa is seen in the madanikai images.
The different types of bracket figures are given below. Many of the motifs are repeated.
I find three different categories of figures, and they are:
Type I – consisting of popular visual motifs such as lady admiring herself in the mirror etc.
Type II -– consisting of dancers and musicians who are also shown dancing
Type III -– consisting of divine figures.
For this paper I will refer only to those that are specifically in dancing postures.
In the categories mentioned above the shalabhanjika nartaki – the dancer, falls in type II. This damsel has extended her right hand above her head with her left hand held at her waist. Her left leg is raised with her right leg bent slightly to take her body weight. She is accompanied by drummers. There are two more bracket figures of dancers in different poses. One of the dancers is accompanied by a lady who is also singing and dancing. The artist Chavana, son of Dashoja has carved this sculpture. The third figure of a dancer has an inscription identifying the sculptor as one Nagoja of Gadag. The inscription is as follows,
Srimatugaduginasvyambhutrikuteshvaradevaravidyavantasujanajanamanoranjanasaraswatipadmabhojaruvarijagadalakatojanaputranagojanahastaikaushalamangalamahashri
The inscription describes Nagoja son of Katoja of Gadag who was the artist of the God Svayambhu Trikuteshvara of Gadag.
This figure because of the pose of one hand being held above the head is often referred to as the Mohini shalabhanjika, though the inscription does not mention any name for the sculpture, and there are no images of Bhasmasura shown next to this sculpture. So the myth of dance remains an oral tradition and is not seen in any of the sculptural reliefs around the temple. This dancer (fig 1) has been described as having the nupurapadikachari and uromandalahasta by Vatsyayan (1968). This same gesture is referred to as urdhvajanu pose by Nadig (1990). The nupurapadikachari is described as one where the foot with the toes raised or ancita foot is lifted up, taken behind another foot and then made to fall on the ground. Vatsyayan obviously sees this figure as the first part of the chaari, whereas Nadig assumes that this leg movement is the beginning of the urdhvajanu movement in which the leg moves higher. The nartaki is accompanied by a male dancing drummer to the right and a flautist and cymbalist on the left.
FIG 1
The next sculpture (fig 2) has the ayatasthana, that is specified for women in the Natyashastra. Unlike the many other examples this figure does not hold any instrument. The fact that the same positions of the feet are used both when playing on an instrument and when a dancer is shown is significant. This confirms that the stance was not merely used as a stylized pose for musicians, but was also used to represent a regular dance movement or posture. The musicians shown earlier in this posture can also be considered as dancing figures.
FIG 2
The left hand is lifted above the head in patakahasta and the right is in dolahasta. Accompanying the nartaki is a dancing male drummer and a seated male cymbalist.
Halebidu
Now I will consider examples of female dance figures found in the band of narrative friezes at Halebidu. I have selected examples based on location and movement, in addition to some which illustrate the position and movement of the female figures with respect to their neighboring figures. Some dance figures are located in recessions, in manner similar to the larger figures in the upper sections. This does not seem to have made a difference in the nature of movement depicted, but the sculptor has used the corners to show interaction between the musicians and dancers. For example to the left of fig 3, a drummer is placed facing the dancer, which uses the recession to increase the interaction between the drummer and dancer. Similarly, to the extreme right a spectator is placed facing the cymbalist and drummer accompanying the dancer.
FIG 3
Fig 4 shows three ensembles placed in series.
FIG 4
Beginning at the left two drummers look on as a dancer performs to the accompaniment of a flautist and a cymbal player. The next ensemble has a vina player, flautist, a drummer and a cymbalist accompanying the dancer. They all are shown looking at the dancer. The third corner has a dancer accompanied by a drummer, cymbalist and flautist. The dancers are shown in different poses which in addition to affording relief to the eye also makes sculptures appear mobile. The movements are the familiar urdhvajanu position and ayatasthana with bent knees. The hands of all three are raised in the alapallava gesture or the vismaya hasta and the other hand is held out in the lata hasta or dola hasta. These poses have been seen in earlier in the larger figures in upper sections. It appears as though the sculptors at Halebidu have limited themselves to few variations in dance movements. The oft repeated movement is the urdhvajanu position and the other stance is the ayatasthana.
Taking the urdhvajanu position of the central figure, I will now consider other examples at Halebidu, which show variations in the same movement. Fig 5 shows a dancer in a similar position accompanied by dancing musicians.
FIG 5
In fig 6, the dancer has lifted her leg higher and has added a bend to her torso and head, which makes the pose more graceful than the more static nature of the earlier figures.
FIG 6
Fig 7 provides a new hand position.
FIG 7
The hand is held above the head, and the fingers appear to be held in a hasta which is unclear because of the badly weathered stone. Another variation of hands is seen in the next image (fig 8).
FIG 8
The left hand is held near the waist with the palm facing upwards. Another figure (fig 9) shows the hand held gracefully at waist with the wrist bent and fingers pointing to the ground.
FIG 9
The next category of dancing figures is are the dancing divinities which fall in the Type III classification mentioned earlier.
Belur
Among the shalabhanjika figures there is a dancing Durga (This is the popular name for the figure which is obviously a Shaivite divinity) (Fig 10). Here the dancing goddess has a skull and a trident in her hands accompanied by two drummers . There is an inscription below this
BalligaameyaruvariSashojamaadidasalabhanjike
which translates as the shalabhanjika made by the artist Dasoja from Balligame. It is interesting that the only place where the madanikai figures are identified as shalabhanjikas is an inscription which is etched under the figure of a goddess shown dancing. The goddess, however is shown with a trishula in her hand and Rao (1981) has identified her as Durga. The inscription the sculpture identifies what is obviously a Shaivite goddess as ashalabhanjika.
FIG 10
Halebidu
While studying dance sculptures at Halebidu a startling and fascinating aspect of a band of large sculptures above the jagati and carved on the outer walls surrounding the sukhanasi and grabhagriha of the temple. This is the depiction of dancing Shaktis, which I discovered during my doctoral studies. These dancing Shaktis are carved in intricate detail on the outer wall of the main temple and one can see them when one takes a pradakshinapatha or circumambulatory path around the temple.
During my doctoral studies I was focused on the Vishnu and Shiva dance sculptures, as my thesis aimed at comparing the Vishnu or Chennakeshava shrine at Belur with the Shaiva Hoysaleshwara temple at Halebidu. For a long time the significance of the position and placement of the dancing Shaktis was not apparent. It was only when I studied entire sections of the temple that I realized that the placement of the dancing Shaktis was very important and deliberate. A third interesting feature is that the dancing Shaktis are not just Shaivite figures as one might expect in a Shiva temple. Lakshmi and Saraswati are also depicted in dancing modes next to their consorts.
I realized that these Shaktis were placed near their male counterparts i.e. Parvati near Shiva, Lakshmi near Vishnu , Sarasvati next to Brahma. This is not immediately apparent as the sculptures are carved on sections which are not one flat panel but are on a star pattern in which the sections face in and out. Only when one photographs these sections and sees them laid out on a flat surface the placement of these sculptures becomes evident. What is even more fascinating is the fact that dancing Shaktis are placed next to their consorts, who are often in static position (or samapadasthana) and one also speculates as to why both the deity and his consort were carved on separate sections. As is well known in the Nataraja iconography it is Shiva who is dancing and his consort Shivakamasundari is standing by his side and watching. At Halebidu the dance motif seems to be reversed with the Vishnu, Shiva and Brahma standing and the consorts or Shakti’s, Lakshmi, Parvati and Sarasvati shown dancing. It is interesting that though Halebidu is a temple dedicated to Shiva, there are almost as many images of dancing Goddesses as Shiva himself. We can just speculate based on the religious leanings of that period that that these dancing Shaktis grew to be a very important part of the local religious milieu.
An in-depth study of the many different Shaktis revealed some iconographic patterns. These have been collated below. At Halebidu, we see Goddess Saraswati (fig 11) dancing (NatyaSaraswati) with pasha (noose) , ankusha (elephant goad), japamala (rosary beads), sruva (sacrificial ladle or a spoon), vedas, padma (lotus), vina, venu (flute)and phala (fruit) in her hands. She is usually accompanied by a hamsa (swan) and drummers. The Goddess stands with her feet in the urdhvajanuchari position- in this movement the legs are bent with one leg lifted at the knee.
FIG 11
Goddess Lakshmi (fig 12) is seen dancing with ankusha , pasha ,phala, padma and kamandalu ( vessel for holy water), and the flower – nilotpala. Her hands are in vismaya (surprise) or alapadma and dola or latahasta. She is usually accompanied by Garuda and drummers. Her feet are always in the urdhvajanuchari position.
FIG 12
Goddess Durga (fig 13) who is shown dancing usually holds the sarpa (snake), damaru (small hand drum), patra (bowl), kapala (skull), trishula (trident), padma, phala, nilotpala and khadga (sword). Some unusual objects also are seen , like the khatvanga (club), a castanet like object, and veni (braid). Her hands are held in the vismaya and /or latahasta. She is sometimes accompanied by a mongoose, and always accompanied by devotees and/or bhutaganas who are shown dancing, or drummers. She is shown in urdhvajanuchari position and sometimes in the ayata position which can be described bent knee plié position or a rechita position.
FIG 13
Another interesting sculpture is that of dancing Chamunda (fig 14) who is shown in the ghorarupa or fierce form with a skeletal frame. She is shown holding the khadga, damaru, kapala, trishula, ghanta (bell) and sarpa. She is usually shown shown holding the banahasta or latahasta or vismayahasta. She is always in the urdhvajanuchari position and accompanied by skeletal devotees. This dancing Chamunda sculpture is part of the saptamatrika reliefs in other temples and this emaciated form is usually shown at the end of the saptmatrika panel. It is indeed interesting to see this depicted here at Halebidu, and shows strong influence if tantric shakta traditions.
FIG 14
This repetition of sculptures and reliefs shows that there was a definite iconographic pattern followed by the Hoysala sculptors for depicting the dancing Shaktis. The different sculptures of the three goddesses hold similar attributes and are shown in particular dancing modes.
After close observation and a quantitative analysis of dance sculptures during my doctoral research I found that there are more sculptures/reliefs of dancing Shaktis than those represented either standing or sitting. This could be a visual interpretation of the Goddess representing dynamic creative energy and the temple as a mandala which through its rituals invokes the cosmic mandala within its architectural plan. The religious leanings of the period i.e. Shri Vaishnavism also point to the fact that Lakshmi or Shri in the Shri Vaishnavism of Saint Ramanuja grew in importance during this era, with very well-known historical records of the Jaina King Bittideva at the urging of Sri Ramanuja taking to Sri Vaishnavism and changing his name to Vishnuvardhana. In Saint Ramanuja’s and the Pancharatra philosophy, Shri or Lakshmi is often described as the embodiment of the power of compassion of Lord Vishnu. The mother Goddess was on par or at least next in hierarchy to the Supreme godhead Vishnu. Shri enacted the Shakti or power of Lord Vishnu and there are teachings where Lord Vishnu is viewed as the supreme actor and Sri or Lakshmi is the one doing the acting. Thus, a combination of influences due to the religious leanings also might have prompted the growth of the dancing Shakti iconography. The Hoysala style Lakshmi temple at Doddagadavalli (which is very close to Halebidu), and inscriptional evidence of several other temples, also shows that worship of the Goddess was a very important local tradition. The Goddess as visualized in her dancing image, is perhaps an indication of Shakti being in constant movement, and the oscillatory aspect of the dynamic universe being represented through her dance. The sculptural representations of the dancing Goddess indicate the importance of the Goddess and shows that movement was a very important aspect of the Hoysala sculptural style. The sculptural representation of dancing Saraswati inspired me to conceptualise a solo Bharata Natyam presentation on Goddess Sarasvati titled Sakala Kala Vani which I staged in Mumbai (Mysore Association) and for the Singapore Indian Fine Arts Society ( Singapore). One of the special pieces was an abstraction of the concept of Saraswvati represented through sounds of the veena, and the sounds of the mridangam representing Bramhma who is described in various myths and songs as keeping rhythm or tala. This piece was called Veena –mridangaSamvaada.
In conclusion, there are many more interesting features which come up on further study of these sculptures. I venture to speculate that if one study ies further the positions of these dancing Shaktis in the architecture of the temple, they may be in a pattern which forms the central chakras of the Sri Chakra cycle. Thus the divine feminine power of Shakti in its benign and ghorarupas are depicted in Belur and Halebidu. Discovering these subtle features, like the regular and recurring presence of the dancing Shaktis, makes one wonder about how many more interesting details remain to be unearthed in the glorious history and architecture of the Indian classical arts.
(Note: All Images are taken by the author on site at Belur and Halebidu and are part of the doctoral dissertation)
Selected Bibliography
Davis, Richard H. Ritual in an Oscillating Universe: Worshipping Siva in Medieval India. Princeton University Press, 1991. JSTOR, www.jstor.org/stable/j.ctt7zvz4s.
B Lewis Rice. Mysore : a gazetteer compiled for government
New Delhi : Asian Educational Services, 2001
Siri Rama . Doctoral thesis:Dance Sculptures of the Belur and Halebidu temples. (Submitted to the University of Hong Kong). Banerjea, Jitendra Nath. The development of Hindu iconography. Calcutta : University of Calcutta, 1956.
Brown, Robert L. (Editor). : studies of an Asian god. Albany, N.Y. : State University of New York Press,1991.
Chattopadhyaya, Siddheshwar. in the perspective of ancient Indian drama and dramaturgy . Calcutta : PunthiPustak, 1974.
Collyer, Kelleson. TheHoysala Artists : their identity and styles. Mysore: Directorate of Archaeology and Museums,1990.
Czuma, S.J. ElloraA doctoral thesis submitted to the University of Michigan,1968.
Deva, Chaitanya B. Musical Instruments in Sculpture in Karnataka. Delhi: Motilal Banarsidass and Indian Institute of Advanced Study (Simla), 1989.
Govindarajan, Hema. Dance Sculptures in Karnataka. A doctoral thesis submitted to Mysore University,1990.
Gupte, Ramesh Shankar. Iconography of the Hindus, Buddhists, and Jains. Bombay : Taraporevala, 1980.(2nd ed.)
Kalidos, Raju. ’s Mohini Incarnation : an iconographical and sexological study. East and West, Vol 36, No.1-3,1986, pp.183 -204.
Kinsley, David.
__________________Hindu Goddesses: Visions of the Divine Feminine in the Hindu Religious Tradition. Delhi: Motilal Banarsidass Publishers,1987.
__________________The divine player : a study of Krsnalila . Delhi : Motilal Banarsidass, 1979.
Mani, Vettam. Puranic Encyclopaedia. Delhi: Motilal Banarsidass Publishers, 1993 (Reprint)
Nandagopal, Choodamani. Dance and Music in the Temple Architecture. Delhi: Agam Prakashan,1990.
Natarajan,B. Tillai and Nataraja. Madras : Mudgala Trust, 1994.
Raghavan,V. Bhoja’sSringaraPrakasha. Madras : Raghavan, 1978.
Rao, Gopinatha. Elements of Hindu Iconography.(Vol 1-4) Delhi: Motilal Banarsidass Publishers, 1993 (First published in 1914).
Rao, Ramachandra S.K.
_______________Art and Architecture of Indian Temples (Vol I) . Bangalore: Kalpatharu Research Academy,1993.
_______________Art and Architecture of Indian Temples (Vol III) . Bangalore: Kalpatharu Research Academy,1995.
Rele, Kanak. MohiniAttam, the lyrical dance. Bombay, India : Nalanda Dance Research Centre, 1992
Tarlekar,G.H and Tarlekar, Nalini. Musical instruments in Indian Sculpture. Pune: Pune Vidyarthi Griha Prakashan,1972.
Vatsyayan, Kapila. Classical Indian Dance in Literature and the Arts. Delhi: Sangeet Natak Akademi,1968.
EpigraphicaCarnatica Vol I,II,III and V (OS) (1886-1903)
Published by Motilal Banarasidass
Varaha Purana (1985)
Padma Purana (1988-1992)
Siva Purana (1970)
Kurma Purana (1981-82)
Bhagavata Purana ( 1976-78)
Agni Purana (1983)
Feature Image Credit: newindianexpress.com
Watch video presentation of the above paper here:
Disclaimer: The opinions expressed in this article belong to the author. Indic Today is neither responsible nor liable for the accuracy, completeness, suitability, or validity of any information in the article. | https://www.indica.today/research/conference/dancing-shaktis-depictions-of-the-sacred-and-secular-feminine-principles-through-dance-in-hoysala-sculptures/ |
Under the heading HEREAFTER, Sonic Acts Festival 2019 aims to explore the genesis of our current crisis – and what happens hereafter – by reflecting on the issues we are forced to confront on a daily basis: that is, the gooey mesh of global capitalism.
Conference and film programme
The inequalities caused by colonisation and geostrategic manoeuvring, the challenges posed by the climate crisis and immigration, the ever-present exploitation and precarity of the work force, and the way technological advancements disrupt and not emancipate: the origins of our current crisis, and what will happen next, (hereafter) is central to this year's conference, film program and exhibition of Sonic Acts.
For the festival’s three-day conference and film programme Sonic Acts invites a diverse group of artists and theorists – philosopher and feminist theoretician Rosi Braidotti, activist art writer Gregory Sholette, researcher Ramon Amaro, filmmaker and DJ Ephraim Asili, media analyst and cultural critic Flavia Dzodan, curator Annie Fletcher, and artists The Otolith Group, Tony Cokes, Emma Wolukau-Wanambwa, to mention only a few. Collectively, they share a sensitivity towards the problematic ‘legacies’ of our past and are actively engaged in addressing these important topics through nuanced voices. Now more than ever we need their alternative interpretations, readings, proposals, and visions to activate and prepare us for what comes hereafter.
This year’s film programme, running parallel to the conference, offers several speakers the possibility to expand their lectures with moving images. | https://www.brakkegrond.nl/en/agenda/sonic-acts |
During this web seminar and in the accompanying white paper, we will be looking at the nuances of cloud security including: the important changes in GDPR and how they affect the cloud, what cloud vendors are doing to comply with GDPR and more!
DevOps has become an inescapable word in technology circles recently with many firms wanting to reap the benefits of bringing developers and operations together. This conference will bring senior IT decision-makers to discuss the latest strategies for DevOps implementation.
With GDPR coming into effect in less than a year, businesses have to decide how they are going to secure their processes. This eGuide explains basic and advanced methods to keep your documents safe from threats as well as inadvertent leaks of information. Download now to find out more.
A network of nineteen first-class independent schools, nurseries and sixth form colleges embarked on the employment of managed services in 2004. This case study looks at the success of their operational efficiency and how their partnership with a leading managed services outsourcer ensured the company's rapid and on-going growth.
Coldroot Trojan has been in circulation for at least a year - possibly longer
Security researchers have warned users that they could fall victim to a Trojan capable of compromising anti-virus software that targets MacOS-based devices.
According to Digita Security chief technology officer Patrick Wardle, anti-virus software vendors have failed to include signatures to detect a potent Trojan that has been increasing in complexity for years.
He said that the Coldroot RAT (remote access trojan) has been compromising devices for years but that security software vendors do not appear to have been unaware of the danger it presented.
The Trojan is predominantly targeting MacOS devices, although Wardle warned that it could potentially be used against other operating systems too.
The Trojan can be used to install keystroke-loggers on MacOS systems in a bid to obtain passwords and banking details, particularly credit-card numbers.
Wardle published his findings in a technical post on Saturday. He believes that cyber criminals have been selling access to the malware since January 2017.
There is also evidence indicating that some versions of the malware have been circulating on GitHub for two years, meaning that not only is it widely known about, but that the anti-virus software vendors could have incorporated signatures into their security suites.
In his report, Wardle spoke about a "a vulnerability I found in all recent versions of MacOS that allowed unprivileged code to interact with any UI component including 'protected' security dialogs".
He continued: "Though reported and now patched, it allowed one to do things like dump passwords from the keychain or bypass High Sierra's 'Secure Kext Loading' - in a manner that was invisible to the user."
Wardle added that attackers have been using the Trojan to tweak the operating system's privacy database. By doing this, they were able to alter the accessibility rights.
"With such rights, applications can then interact with system UIs, other applications, and even intercept key events (i.e. keylogging)," he said.
"By directly modifying the database, one could avoid the obnoxious system alert that is normally presented to the user."
The Trojan was also able to change the TCC.db database, which could hand even more rights to an attacker.
However, MacOS High Sierra has protections in place to prevent this, meaning that older versions of MacOS are most at risk.
He added: "Behind the scenes, the application will automatically beacon out to a server.
"While creating a network connection is itself not inherently malicious, it is a common tactic used by malware - specifically to check in with a command and control server for tasking," Wardle notes.
"When the malware receives a command from the server to start a remote desktop session, it spawns a new thread named: ‘REMOTEDESKTOPTHREAD'.
"This basically sits in a while loop (until the ‘stop remote desktop' command is issued), taking and ‘streaming' screen captures of the user's desktop to the remote attacker." | |
New York, Jul 11: Sanjay Jha, a journalist working with Canada-based news website NowPublic, is the first Indian to win the prestigious Loeb Award - one of the highest honours in American business journalism.
Jha, NowPublic's South Asia Bureau Chief, won the award for the television programme 'India's Promise'.
"It is a tremendous honour to be the first Indian recipient of the Loeb Award," Jha said.
"It is my privilege to provide a first-hand account of breaking Indian and South Asian news to readers and journalists," he added.
"Sanjay has proven himself as an extremely accomplished journalist in just a short time," said Leonard Brody, CEO of NowPublic.
"We're extremely proud and cannot think of a more deserving candidate," he added.
The Loeb Awards were established in 1957 by Gerald Loeb, to encourage quality reporting in business, finance and the economy.
Disclaimer:
Please write your correct name and email address. Kindly do not post any personal, abusive, defamatory, infringing, obscene, indecent, discriminatory or unlawful or similar comments. Daijiworld.com will not be responsible for any defamatory message posted under this article.
Please note that sending false messages to insult, defame, intimidate, mislead or deceive people or to intentionally cause public disorder is punishable under law. It is obligatory on Daijiworld to provide the IP address and other details of senders of such comments, to the authority concerned upon request.
Hence, sending offensive comments using daijiworld will be purely at your own risk, and in no way will Daijiworld.com be held responsible. | https://www.daijiworld.com/news/newsDisplay?newsID=48589 |
Recently, I cooked with a two star Michelin, a cooking class, and we prepared a medallion of pork rolled with herbs from his garden. The menu was superb and the raw materials, as fresh and aromatic as possible; pineapple herbs, lemon, sage, etc, a garden extraordinaire. We talked about sous vides, a technique is doesn’t really use for such a preparation and I understand why. It was his intention to get the juices of the pork’s rendering of the fats instead of even cooking and his secret ingredient.
Sous vides techniques aren’t the only means to cook but the worst thing you can do is over cook a good piece of meat. Too often, in my travels, I try to explain the idea of heat transfer and energy in cooking, though I am not a scientist. Chefs often believe that their techniques work best. Their old ways – don’t bend easily.
It is basically very simple to understand what happens when you cook meat in a skillet; the upper-side of the meat’s surface when cooking is exposed to the air, while the lower side, making direct contact is heating up. By the time you flip the meat, the upper surface is cold, and by the time it heats up (once flipped) the other surface begins to cool and the heat doesn’t penetrate the meat sufficiently.
Now what was the chef’s secret ingredient? I figure that he had a few and without understanding the science, and out of habit he cooks that way, so there is no real secret, except he uses a Culatello Zibello sliced thinly to add some fat.
Given the chef used butter and butter consists of butterfat, milk proteins and water, he had a enough fat and vapor that you otherwise wouldn’t get from using olive oil in a shallow skillet.
His cookery was a heavy cast iron pot with very high sides and he crowded the meat to keep the sides warm. When I tried to turn the meat over, he gently touched my hand and said, slowly.
I am not sure he had it 100%, but the technique “kind of worked” and the dish was tasty and successful. The key was, the butter and the sauce he made which covered the pink center. | https://mesubim.com/2012/11/08/michelin-cuisine-techniques/ |
That the report e NOTED and FILED.
Background
Investing in Canada Infrastructure Program – Public Transit Stream
At the February 27, 2019 meeting, the Commission approved in principle the Strategic Assessment of LTC Facility Needs and Path Forward report, and directed administration to utilize the Path Forward as input into the preparation of multi-year Operating and Capital budgets covering the period 2020-2023. The report was prepared in light of the then-approved BRT corridors coupled with the growth plans for the remainder of the conventional service, which would result in the eventual need for additional bus maintenance and storage space. The Highbury Facility project was placed on the Commission’s 10 year Capital Budget program as a place holder noting at the time there were no available sources of funding identified.
In the month following, Municipal Council directed civic administration to submit 10 projects to the Investing in Canada Infrastructure Program Public Transit Stream (ICIP-PTS) noting the program uses a cost-sharing formula of 40% Federal-33% Provincial-27% Municipal dollars to fund capital projects that:
- improve the capacity of public transit infrastructure;
- improve the quality and/or safety of existing or future transit systems;
- improve access to a public transit system; and,
- improve capacity and/or quality of pathways and/or active transportation.
Municipal Council approved the following ten public transit and active transportation infrastructure projects for submission for funding consideration under the ICIP-PTS program:
- Downtown Loop
- East London Link
- Wellington Gateway
- Expansion Buses
- Bus Stop Amenities
- Intelligent Traffic Signals
- Adelaide Street Underpass Active Transportation Connections
- Dundas Place Thames Valley Parkway Active Transportation Connection
- Dundas Street Old East Village Streetscape Improvements
- Oxford Street / Wharncliffe Road Intersection Improvements
At the time of submission, the Highbury Facility project was not deemed as high a priority as other projects and as such was not included in the project submission. In June 2019, the Province pledged $103.2 million for these projects and, in August 2019, the Government of Canada announced $123.8 million in funding. The City of London contribution was $79.9 million. After this process, London had an available total allocation of $148.6 million in funding. $119.3 million of the remaining funding had been associated with the planned North and West corridors of the rapid transit system; however those projects were not submitted to ICIP-PTS for consideration. The remaining $29.3 million was not associated with a specific project.
After receiving approval for the 2019 projects as well as a suite of active transportation projects in January 2022, London has $119.3 million in remaining allocated Federal and Provincial funding, allowing for the delivery of at least $163.4 million in capital works based on the contribution formula.
The Federal Budget 2022 made changes to the schedules for both the submission and completion of projects under the ICIP-PTS program. The previous submission deadline of March 28, 2024 was accelerated to March 31, 2023, while the deadline for project completion was extended from October 2027 to October 2033. As a result, civic administration recommended reallocating London’s remaining ICIP-PTS funding to the construction of the new LTC Highbury Avenue Facility as this project could meet both the revised submission and construction schedules. On August 2, 2022, Municipal Council approved the following:
That, on the recommendation of the Deputy City Manager, Finance Supports and the Deputy City Manager, Environment and Infrastructure Civic Administration BE DIRECTED to work with London Transit Commission staff to develop a joint application to the Investing in Canada Infrastructure Program Public Transit Stream (ICIP-PTS) for a new LTC facility on Highbury Avenue to accommodate transit service growth and the conversion of the LTC fleet to zero-emission buses.
In response to this direction, administration retained the consultant that completed the original Facility Assessment (Arcadis IBI Group) to update the document to include consideration for the transition to a zero-emission bus fleet as well as to provide a more comprehensive costing estimate that could be utilized for the funding application (see Enclosure I for Commissioners only).
At the meeting of December 13, 2022, Municipal Council approved the following:
That, on the recommendation of the Deputy City Manager, Finance Supports and the Deputy City Manager, Environment and Infrastructure with the concurrence of the General Manager, London Transit Commission Civic Administration
- BE DIRECTED to submit London Transit Commission (LTC) Highbury Avenue Facility Demolition and Rebuild – Project 1 to the Investing in Canada Infrastructure Program Public Transit Stream (ICIP-PTS);
- The budget for the project BE APPROVED in accordance with the Source of Financing Report attached hereto as Appendix “A”; and,
- Civic Administration BE AUTHORIZED to carry out all budget adjustments required to establish the budget for the LTC Highbury Avenue Facility Demolition and Rebuild.
Highbury Avenue Facility Rebuild Business Case
In February 2019 the London Transit Commission approved in principle the Strategic Assessment of LTC Facility Needs and Path Forward completed by the IBI Group. The Strategic Assessment of LTC Facility Needs study report confirmed the LTC’s future facility needs based on projections of service, fleet and employee growth, and assessed options for replacing the Highbury facility including the option of a new site.
The first aspect of the review was an assessment of the Highbury facility; a number of the key findings are set out below:
- The main buildings were then 70 years of age and well past their economic and design life;
- The building materials and, particularly, the concrete floors in the maintenance and storage areas, were in poor condition and deteriorating;
- The workplace areas and environment are sub-standard to current, modern facilities; and
- The existing buildings were energy inefficient and the interior layout, particularly in the maintenance and storage areas, presents on-going operational challenges.
Modifications and additions undertaken in 1990/91, 1993/94 and 2002/03 increased vehicle storage space, servicing and maintenance capacity as well as administrative office space. However, because of the design of the original structure, particularly with respect to roof height, spacing of column supports within the building and the office layout, the use of the building as a bus garage has involved compromises in the location of the vehicle maintenance, storage, servicing functions and in the layout of the parts repair, stockroom and office areas. As well, the location and orientation of the original building on the site has required separate buildings to be constructed to accommodate added vehicle storage and servicing and maintenance requirements rather than having these functions conveniently grouped together.
The next step in the review involved determining the future facility needs with respect to the number of buses and employees anticipated to be operating out of each facility. Future growth plans, including the implementation of bus rapid transit corridors were included as part of this consideration. The fleet size estimates for various horizon years were estimated on an order of magnitude basis giving consideration for known plans at the time, noting any expansion will be subject to the availability of operating and capital funding requirements. Fleet size and total employee estimates were utilized to determine the size of facility that would be required to meet future needs.
Once the size of the facility was determined, the next step in the process was to identify options to meet the need. Two options were identified for assessment; rebuild a facility on the current location or build a new facility at a new location and sell the existing facility upon completion. Given the site size requirement of 7.2 hectares, identifying vacant sites in London was challenging. The review identified two sites in southwest London, and also conducted an assessment for comparative purposes on a theoretical site in the vicinity of Oxford Street and Veterans Memorial Parkway.
Based on the identified site locations, an analysis was undertaken with respect to the “deadhead” costs (the operating costs associated with buses travelling to the start of service and back to the garage when they are not in revenue service) of operating out of each of the identified locations. The southwest location as compared to the existing Highbury location would result in an annual operating premium of approximately $633,000 based on current service levels, increasing to $867,800 by 2047. A northeast location would have a higher annual operating cost premium of $996,300 today, increasing to $1,378,000 by 2047. The difference between the southwest and northeast locations reflects the fact that a northeast location would be more remote from the centre of the LTC’s service area requiring buses to travel further. Extending these estimates over the horizon period to 2047 resulted in an estimated additional operating expenditure of $18 million for the southwest location and $28 million for the northeast location.
Given the significant incremental costs associated with moving the facility, a detailed assessment of the feasibility of constructing a new facility at the existing Highbury location was undertaken. The complicating factor with respect to this option was the need to continue to be able to service and maintain a significant portion of the fleet while construction is ongoing. A number of options were considered during this assessment phase, with the final recommended strategy being to rebuild on the Highbury site in a phased manner, providing the ability to continue to service and maintain buses while construction is ongoing. The phasing plan would require the relocation of employee parking as well as the need to secure an indoor heated facility to park buses overnight for an extended period of time. This plan would also require a number of the buses currently operating out of the Highbury facility to be transferred to the Wonderland facility during the construction period.
In preparation for the submission of an ICIP-PTS funding application for this project in response to direction from Municipal Council, the consultant was retained to undertake an update to the 2019 study which included:
- Confirmation of facility needs and new facility layout;
- Consideration of the transition to a zero-emission bus fleet;
- Class D costing estimate of the project; and
- Cost estimates for the required off-site bus storage and employee parking, detailed design of the new facility and consulting/engineering fees to get to the tender phase of the project
During the report update process, administration undertook a tour with the consultants of the recently completed bus maintenance facility in Waterloo Region, which is similar to scope and size of the planned Highbury facility. The updated report, which has been prepared as a Business Case, confirmed the facility needs identified in the 2019 study remain accurate, noting that accommodation of the charging infrastructure associated with electric buses would not impact the capacity of the completed facility. The design concepts were modified to ensure the appropriate servicing bays, hoists and cranes for servicing electric buses could be accommodated within the proposed footprint.
Given the need to continue to operate from the Highbury facility during construction, the initiative has been broken down into two projects, with each project having multiple phases. The project also includes operational expenses associated with the need to store some of the bus fleet off site during the construction period.
Project 1 of the initiative has been submitted for consideration under the ICIP-PTS funding. This project includes the following six phases:
- Phase I – Demolish building and tent at the south end of the property
- Phase II – Build a maintenance area, administration offices and employee parking
- Phase III – Demolish east part of existing bus garage
- Phase IV – Build new service lanes and part of new bus garage
- Phase V – Demolish existing service lanes and administrative offices
- Phase VI – Clean up existing maintenance bay to store buses
The detailed cost estimates for Project 1 are set out in the table below:
Highbury Facility Project 1 Cost Estimates
|Project Component||Cost (millions)|
|1. Demolition and Construction costs – Phases I-IV||$ 173.0|
|2. Design Fees||12.0|
|3. Demolition and construction costs – Phases V-VI||5.0|
|4. Conversion of maintenance area to storage and contingency||4.5|
|5. Temporary site for bus and employee parking (including site prep)||4.0|
|6. Shuttle operating costs (2 years)||1.0|
|Total||$ 199.5|
Completion of Project 1 would result in an improved maintenance operation for all buses at the Highbury facility, and when complete, would have a comparable bus storage space to today. While there is some newly built bus storage associated with this Project, it is limited to 50 buses, and continued transition to zero emission buses will be dependant upon completing Project 2, the estimated costs of which are set out in the table below.
Highbury Facility Project 2 Cost Estimates
|Project Component||Cost (millions)|
|1. Building Cost Phase 7||$ 92.0|
|2. Design Fees||6.0|
|3. Escalation and Phasing (Dependant upon project timing)||30.0|
|5. Temporary site for bus and employee parking (including site prep)||2.5|
|6. Shuttle operating costs (2 years)||0.5|
|Total||$ 131.0|
The primary component of this Project is the demolition of the remainder of the old Highbury facility and the rebuild of the remaining bus storage. There is currently no associated source of funding for Project 2; however it will be included in the next multi-year budget submission for capital projects. Given the phasing approach incorporated into this plan, transit operations could continue to operate with little impact should there be a delay between the two Projects. The most significant impact associated with a long delay between the two Projects will be the ability to continue to transition the conventional transit fleet to zero-emission buses.
The one cost element that has not been incorporated into this business case and related costing is any site remediation that may be required as demolition and reconstruction occur. These impacts are anticipated to occur during Project 2 given the current understanding of where any soil contamination may be located on the site.
Current Project Status
The Business Case and accompanying application documents for funding under the ICIP-PTS program have been submitted to the Province of Ontario for consideration. London Transit and civic administration are liaising with staff from the Ministry of Transportation with respect to any questions they may have regarding the project or the accompanying funding application.The deadline for Provincial approval of the project for their portion of the funding is March 31, 2023. Once this approval has been granted, the application is forwarded to the Federal government for approval. In preparation for Federal consideration, additional work is being undertaken by the consultant to complete the required Climate Lens Assessment.
Subsequent to approval from the Federal Government, a request for proposal will be issued for the detailed design of the new Highbury Facility. This level of design will be required in order to undertake the tendering process for the actual construction work. Depending on approval timelines, it is anticipated the earliest that construction would begin on the Highbury Facility Project 1 is spring of 2025.
Enclosure
I – Highbury Facility Replacement Business Case (Commissioners only)
Recommended by:
Craig Morneau, Director of Fleet & Facilities
Mike Gregor, Director of Finance
Concurred in by: | https://www.londontransit.ca/staff-report-1-highbury-facility-rebuild-2/ |
What is the EU Diplomacy & Diplomatic Skills Training Course?
This three-day interactive course is designed for the participants to learn about EU diplomacy, to share experiences and to improve their diplomatic skills. After giving a general introduction to the EU’s external affairs and to the main changes brought by the creation of the European External Action Service (EEAS), the course will focus on relevant diplomatic skills. Practical sessions and exercises will explain to the participants how to report, communicate and negotiate at international level.
The training programme will assist professionals in grasping the complexities of EU external affairs by combining the study of the institutional setup with the skills required to communicate, report and negotiate across cultures.
High-level experienced professionals lead participants through a curriculum based on the new European diplomatic identity and on the key international diplomatic skills.
Which methodology is used?
The programme combines training sessions on both substance and skills:
- Interactive training sessions examining theoretical and practical aspects of EU Diplomacy;
- Workshops and case studies designed to present and develop essential diplomatic skills;
- Feedback session to consolidate knowledge and encourage debate;
- Debates to promote networking and exchange experiences with lecturers and other participants.
The programme is designed to be as interactive as possible. Active participation is required and networking opportunities are strongly encouraged throughout the course.
Why participate?
Through this programme, participants will have an opportunity to:
- Update and improve their knowledge and understanding of the EU’s external affairs and the diplomatic skills;
- Acquire relevant diplomatic skills;
- Explore the role of the European External Action Service and of EU diplomacy more generally;
- Enjoy a unique opportunity to learn in a multicultural environment and extend their personal and professional networks;
- Receive a certificate from the College of Europe upon successful completion of the course. | https://www.tepsa.eu/autumn-school-9-11-october-eu-diplomacy-diplomatic-skills-coe-bruges/ |
Available under License Creative Commons Attribution.
Download (6MB) | Preview
Abstract
As with other species of great apes, chimpanzee numbers have declined during the past decades. Proper conservation of the remaining chimpanzees requires accurate and frequent data on their distribution and density. In Tanzania, 75% of the chimpanzees live at low densities on land outside national parks and little is known about their distribution, density, behavior or ecology. Given the sheer scale of chimpanzee distribution across western Tanzania (>20,000 km2), we need new methods that are time and cost efficient while providing precise and accurate data across broad spatial scales. Scientists have recently demonstrated the usefulness of drones to detect wildlife, including apes. Whilst direct observation of chimpanzees is unlikely given their elusiveness, we investigated the potential of drones to detect chimpanzee nests in the Issa valley, western Tanzania. Between 2015 and 2016, we tested and compared the capabilities of two fixed-wing drones. We surveyed twenty-two plots (50x500m) in gallery forests and miombo woodlands to compare nest observations from the ground with those from the air. We performed mixed-effects logistic regression models to evaluate the impact of image resolution, seasonality, vegetation type, nest height and color on nest detectability. An average of 10% of the nests spotted from the ground were detected from the air. From the factors tested, only image resolution significantly influenced nest detectability on drone-acquired images. We discuss the potential, but also the limitations of this technology for determining chimpanzee distribution and density and provide guidance for future investigation on the use of drones for ape population surveys. Combining traditional and novel technological methods of surveying allows more accurate collection on animal distribution and habitat connectivity that has important implications for apes conservation in an increasingly anthropogenically disturbed landscape. | http://researchonline.ljmu.ac.uk/id/eprint/8521/ |
image courtesy- NOAA
What is climate change?
The climate of the Earth is changing. Several lines of evidence point to changes in our weather, seas, ecosystems, and other areas. Global climate change refers to long-term average changes throughout the whole planet. Although the phrases “global warming” and “climate change” are sometimes used interchangeably, “global warming” is simply one element of climate change. Warming temperatures and precipitation changes are examples, as are the impacts of global warming, such as:
- Rising sea levels
- Shrinking mountain glaciers
- Ice melting in northern and Sothern hemispheres
- Changes in flower and plant blooming periods
Even before humans were on the scene, the Earth’s climate was continuously shifting. However, scientists have recently noticed unexpected alterations. For example, over the last 150 years, the average temperature of the Earth has risen significantly faster than expected.
Is climate change that serious?
Numbers don’t lie.
- Carbon dioxide (CO2) is a major heat-trapping (greenhouse) gas that is emitted by both human activities like as deforestation and the combustion of fossil fuels, as well as ecosystem functions like respiration and volcanic activities.
Since 1850, human activities have increased CO2 concentrations in the atmosphere by 48 percent above pre-industrial levels. This is greater than what would have occurred organically during a 20,000-year timeframe (from the Last Glacial Maximum to 1850, from 185 ppm to 280 ppm).
- The Earth’s surface continues to warm substantially, with current global temperatures being the warmest in over 2,000 years.
- Since satellite observations began in 1979, the amount of Arctic sea ice has decreased considerably in all months, with Septembers showing the greatest decreases. The lowest values are found in the last 15 Septembers.
- As a result of human-caused global warming, earth’s sea levels are rising at an unprecedented rate in the last 2,000 years.
- Ninety percent of global warming is happening in the ocean, with the last decade and the year 2020 being the warmest.
Our ocean, which covers more than 70% of the Earth’s surface, has a very large heat capacity. It has absorbed 90% of the warmth caused by rising greenhouse gases in recent decades. Heat held in the ocean causes its water to expand, causing one-third to one-half of global sea level increase. The majority of the additional energy is held at the surface, at depths ranging from zero to 700 meters. The previous ten years have been the warmest decade for the ocean since at least the 1800s.
Sea level rise owing to thermal expansion, coral bleaching, faster melting of Earth’s main ice sheets, stronger storms, and changes in ocean health and biochemistry are all impacts of ocean warming.
Is it too late to stop human-caused climate change?
Better Late…Than Never…
Responding to Climate change will require a two-tiered response:
- “Mitigation” – decreasing the flow of greenhouse gases into the atmosphere.
- “Adaptation” – learning to live with and adapt to climate change that has already begun.
The main question is how much carbon dioxide and other pollutants we will emit in the coming years? | https://c4rnhk.org/climate-change-the-earths-central-environmental-threat/ |
The present invention relates to a pool fence construction adapted for use with above ground swimming pools.
In recent years sales of swimming pools has increased dramatically, this trend having been apparently catalysed, in particular, by the development of high quality synthetic pools of the above ground type. Such pools may be erected easily by an unskilled person on at relatively low cost.
Irrespective of the type of pool, a cover or adequate security fencing is required. In particular the fencing must prevent unauthorized admission to the pool. Tragically, unattended pools with no or inadequate fencing have been the sites of numerous drownings in recent years and some municipalities are now enforcing stringent regulations on private pools. In this respect there has been proposed to use fencing surrounding pools. Such fencing requires the erection of the fence in the ground surrounding the pool. Apart from the obvious high cost thereof, such fencing entails wasteful utilization of space and restricts the positioning of above ground pools. There has been little throught given to security fencing which is specifically adapted for attachment to above ground pools. There is, therefore, in view of the ever- increasing popularity of above ground pools, a pressing need for such type security fencing. Further, the above ground pool, like the in ground type, needs to be covered, or capable of being covered, and thus any consideration of fencing in association with the pool must permit this.
It is therefore an object of the present invention to provide fencing means which are strong, inexpensive, easily erected in association with pools which have an upper periphery above the ground, and which does not entail waste of available ground space.
With this object in mind there is provided a pool fence construction comprising at least one fence section having attachment means associated or integral with each end thereof, said fence section further adapted to be connected directly or indirectly to an upper periphery of a pool, wherein said upper periphery is above the ground.
In one version of the invention the fencing section substantially surrounds the pool, following the upper periphery thereof. Obviously this construction is most useful for smaller sizes of pools where the single length of fence section will be manageable. In contrast to the unitary fence in another version of the invention two or more fence sections are present, the attachment means mentioned above facilitating the connection of adjacent sections when placed in end to end relationship.
In a preferred embodiment the attachment means comprise, at one end of a fence section, at least one eyelet, whilst at the other end comprise at least one substantially vertical projection, so that the projection(s) of one end of a first fence section releasably engage the eyelet(s) of one end of a second fence section.
A gate or opening may be provided in the fence construction and in this respect a gate may comprise two laterally spaced upright members defining the gate opening therebetween. Each of the two laterally spaced upright members being adapted to be connected to at least the upper periphery of the pool. In a more preferred embodiment these members may extend to the bottom periphery of the pool and be directly or indirectly connected thereto, which construction considerably strengthens these gate uprights.
For the attachment of the pool fence section to the upper periphery of the pool, two alternate methods may be used. The first alternative is to provide the upper periphery with at least one aperture, perferably of a keyhole shape, same being so positioned to facilitate connection of the fence therein. Alternatively the upper periphery of the pool is provided with at least one mounting bracket. Typically this mounting bracket comprises an affixing portion to facilitate attachment to a portion of the pool, and a receiving portion to which the fence section is connected. One possible shape of the receiving portion is a general U shape which also has an aligned set of apertures to permit the substantially vertical projection of one of the fence sections as discussed above, to pass therethrough. For ease of installation it is also convenient if the mounting bracket is fabricated from material which exhibits some resilience as the fence section would not have projections which would be perfectly aligned with the aforementioned apertures. In yet another preferred configuration of the bracket one of the apertures is provided with a keyway whilst the substantially vertical projection is provided with a horizontal protrusion or tab. With such it is possible to install the fence section on the upper periphery of the pool, the substantially vertical projection located at one end of the fence section being inserted through the set of apertures and eyelets whereafter the fence section is pivoted thereabout which rotates the protrusion away from the keyway effectively preventing upward movement whilst simultaneously moving the other end of the fence section into its operable position above the periphery of the pool.
Referring now specifically to the construction of above ground pools, the same falls into two types, one incorporating the use of struts which support the pool wall, and those which need no bracing, being free- standing. The invention is adaptable for use with either type. When struts are present these form convenient sites for attachment of the mounting bracket, however, when not present the receiving means can be suitably designed for adequate connection to the pool edge.
Further, when in place the fencing of the present invention may be of a shape which facilitates the operation of placing or removing a pool cover. Similarly by using an open grill type fencing construction it is equally easy to carry out normal pool cleaning maintenance. For example the pool filter and pipes can penetrate through the fence. In the same vein replacement of the pool liner which is occasionally necessary may be easily carried out with the aforementioned open construction.
In a further preferred embodiment of the present invention one of the fence sections, not being one immediately adjacent to a gate opening if one exists, is provided with eyelets at each end thereof so that in operation one end is affixed by connection with an adjacent fence section whilst the other end when located above the upper periphery has one or more eyelets aligned with one or more eyelets of the next succeeding fence section thereby permitting connection thereto by installation of a suitable elongated member through all of these aligned eyelets and preferably into the mounting means. With this construction it is possible to have an excess point at any desired position around the pool which allows easy cleaning, etc.
As an alternative construction to that described immediately above one of the fence sections, not being one immediately adjacent a gate opening if present, is provided at one end thereof with at least one shortened substantially vertical projection whilst at least one eyelet is provided at the other end thereof, so that in operation said other end is affixed by connection with an adjacent fence section whilst the said end when located above the upper periphery is adapted to be upwardly deformed thus permitting said shortened substantially vertical projection to engage an eyelet of the next succeeding fence section thereby permitting connection thereto.
Referring specifically to the provisions of a gate, for safety reasons it is preferable to design such to be of the automatic closing and self- latching type. Provision is also made on the gate upright for attachment of a padlock or other locking mechanism. However it is convenient to incorporate a locking means to hold the gate in an open position to facilitate cleaning.
The invention will now be illustrated with reference to the accompanying drawings in which
FIG. 1 is a perspective view of a pool with an assembly of sections according to one preferred aspect of the present invention.
FIG. 2 is a front view of the gate arrangement.
FIG. 3 is a cross-sectional view of one of the gate uprights.
FIG. 4 is an assembly view of the connection between the upright and lower periphery of the pool.
FIG. 5 is a plan view of the upper area of one of the uprights for the gate arrangement of FIG. 2.
FIG. 6 is a perspective view of the upper area of one of the uprights.
FIG. 7 is a segment view of a section connecting means of the present invention.
FIG. 8 shows an assembly breakdown of the connecting means.
FIG. 9 is a view of the upper periphery of the pool with integral connecting means.
FIG. 10 is a perspective view of an additional access position in the pool fence.
FIG. 11 is a segment view of an alternate version of the access position of FIG. 10.
Reference to FIG. 1 reveals an above ground pool having a pool wall 2 with supports 2'. The fencing shown encircles the pool 1 and is coextensive therewith. Gate 7 is provided which is outwardly rotatable about a gate post 12 towards the outside of the fence. Whilst assembly of the pool 1 is well known, in practice support posts 2' may have considerable variance in their distance from adjacent supports 2'. In view of this variation it is preferable to provide section receiving means of resilient nature to allow for this discrepancy. To each support 2' there is attached a section receiving member 3 as depicted in FIGS. 7 and 8. The lower part of receiving means 3 is typically riveted or screwed to support 2' and the upper part of receiving means 3 forms a U shape with aligning holes 11. In this respect the upper aperture 3' is a keyway. An alternative arrangement to the use of this section receiving means is shown in FIG. 9 wherein the keyway 3' is formed integrally in the upper periphery 14 of the pool. Thus sections 4 being provided at one end with hooks 5 and at the other end with apertures 6, interengage and the lower hook 5 of the section 4 penetrates through both apertures and then the section carrying hook 5 is rotated so its other end is in position, i.e. over the periphery of the pool. Accordingly as protrusion 17 is no longer in alignment with keyway 3' no disengagement can occur. This sequence is carried out around the pool until one section width remains and reference to FIG. 6 shows post 12 being provided with a rearwardly projecting aperture 15 to which the remaining free end of that section 4 may be bolted. A similar connection occurs adjacent to the lower extremity of the section 4. Posts 12 are fixed to a pair of supports 2' and extend to the bottom of the pool. As this opening is to house the gate 7 the posts 12 are additionally supported by braces 16' which span between posts 12 and the upper periphery of the pool. As mentioned gate 7 is provided and FIGS. 2, 5 and 6 more clearly illustrate same. Gate 7 has a pair of spaced hooks at one end, the lower end of which is provided with a tab. Post 12 is provided in an upper area thereof with apertured projection 16 whilst in an area below that with a keyhole projection (not shown). As will be appreciated from FIGS. 2, 5 and 6, the gate 7 is attached by holding same at right angles to the fence and inserting said hooks through the apertures provided on the post. As apertured projection 16 is provided with an upstanding section 23 same will not permit the gate to open more than 90° to the fence. In this respect this upstanding section permits the gate 7 to be maintained in the open position in that to effect the maintenance of the gate 7 in the open position, it is rotated until the rail portion of gate 7 contacts projection 23. The gate is then lifted so that the rail portion is passed over the upper extremity of projection 23 and the gate is therefore held open. To close the gate, the gate is elevated to clear projection 23 and rotated towards the right hand post until clear of such projection and allowed to drop thus permitting spring 18 to effect a closing movement of the gate 7. In this respect spring 18 is positioned such that it experiences increasing tension as the gate 7 is opened outwardly.
FIG. 10 shows how a modification to one of the connections of adjacent sections 4 can permit two of these sections to be rotated outwardly. This is useful in a large pool when more than one access section is necessary. In this arrangement lower hook 5' of one of the sections is shortened and is provided with an aperture to receive a padlock 24. In view of the shortening of the hook 5' same can be deflected upwardly and thus spring into engagement with an associated eyelet 6. As an alternative to this modification, FIG. 11 depicts instead of one of the meeting sections having hooks 5' as mentioned, there is provided eyelets 8 and affixing is by means of a separate member 9 which has an end configuration similar to the normal hook 5.
Sections 4 may take on any configuration, however, as shown in the drawings they should be such to reduce unauthorized entry to the pool, and, further, by designing the lower extremity thereof to be distant from the periphery of the pool, easy cleaning and maintenance of the pool 1 is achieved.
Reference to FIGS. 3 and 4 shows that the posts 12 have an angled foot 10 which engages the lower pool periphery 13 by rotation of upright 12 into the vertical position. This arrangement considerably strengthens the post structure together with connecting braces 16' aforementioned.
As previously mentioned any of sections 4 may be adapted for rotatable movement about one end thereof so that the pool can be more accessible.
With the pool fence hereinbefore described it is possible to quickly assemble such on an above ground pool, and by reason of the simplicity in design make it capable of economical manufacture. Such is therefore a viable alternative to normal pool covers and fences generally used as security devices. | |
The United States has one of the highest rates of maternal mortality of any industrialized country, with current rates at 14 maternal deaths per every 100,000 live births. CDC and the World Health Organization define maternal mortality as death related to pregnancy or management of pregnancy, and it is an indicator of a country’s healthcare system. Maternal mortality rates are impacted by maternal morbidity, which includes non-life threatening to potentially fatal incidents for a woman and fetus both during and after pregnancy. The more life threatening form of maternal morbidity is called severe maternal morbidity and affects approximately 50,000 women in the United States annually, and that number continues to grow.
Healthy People 2020 has set a goal to reduce the rates of maternal mortality within the United States by ten percent, to 11.4 deaths per 100,000 live births. Despite this, maternal mortality rates in the United States have increased since this goal was set, with rates reaching as high as 17.8 deaths per 100,000 live births in both 2009 and 2011.
Understanding the troubling trend
Why is there an increase instead of a decrease? Maternal mortality and morbidity rate increases may be attributed to access to care. Minority women and women living at or below the poverty line have the highest rates of maternal mortality and morbidity in the U.S. These women have maternal mortality rates nearly three times higher than white women. It should be noted that the Affordable Care Act has enabled more people to access health insurance, but barriers to medical care still exist including health system navigation, transportation, and paid leave. Lack of appropriate medical care has a correlation with chronic disease, a risk factor for increased maternal mortality. Chronic disease is responsible for seven out of ten deaths in the U.S. each year, according to CDC, with roughly half of all adults having at least one chronic disease. Lack of proper management of such diseases prior to pregnancy can lead to complications during pregnancy, which may lead to death.
Other risk factors for maternal mortality include, but are not limited to:
Helping states address maternal mortality and morbidity
ASTHO is dedicated to ensuring that all women experience safe births and has created a position statement addressing maternal mortality and morbidity. The statement provides recommendations on how to improve pregnancy and birth outcomes at the state, local, and federal level. Other recommendations include collaborating with organizations in order to incorporate social, economic, and health changes to improve maternal access to care, which then allow for increased access to medical care during the life cycle of both the mother and child. Through the Alliance for Innovation on Maternal Health program ASTHO is working with the American Congress of Obstetricians and Gynecologists to help states implement new measures to address maternal mortality and morbidity. The program promotes collaboration between states and birth facilities to implement consistent maternal care to reduce primary cesarean births, reduce racial disparities, and promote postpartum and interconception care.
Eighmey Zeeck, MPH is an intern for maternal and child health at ASTHO. She graduated August 2015 with a Master of Public Health degree from George Washington University with a focus on global health. Zeeck supports ASTHO projects related to access to care for women and children. | https://astho.org/StatePublicHealth/US-Sees-Continued-Rise-in-Maternal-Mortality/5-10-16/ |
Each of our county councillors has an annual locality budget fund of £10,000 that they can use to respond to local needs within any financial year (April to March).
Councillors can, if they wish, make grants to support projects or activities that benefit the communities they represent.
What are we able to fund?
Due to the diverse nature of Devon’s communities, it is not possible to provide an exhaustive list of eligible projects. However, there is some general guidance below.
Locality budget funding is available to projects that are beneficial to local communities and should be in line with the Council’s objectives and priorities. All projects should include some other financial contribution(s) and/or local support.
We are unable to fund:
- retrospective applications for projects or activities that have already completed, or items that have been purchased
- individuals and/or for-private-profit organisations
- projects that are solely for the benefit of animals
- projects that are in support of a single faith
- projects or items that are the responsibility of another public body (e.g. NHS, Church of England). This includes fabric repairs to church buildings (also clock faces, bells), church yards and cemetery walls
- projects that are delegating any acquired funds to third parties
- on-going yearly commitments, unless specifically agreed by the Cabinet in advance
- projects to reinstate funding relating to a reduction in a County Council service or activity arising from an earlier policy decision of the County Council or other public body, with some exceptions
- political activities
- salaries, wages, or expenses of persons employed by a not-for-private-profit organisation
- the costs of an outing, trip, holiday or excursion by an individual or group of people; with some exceptions for groups where learning and development will arise
Who can apply?
Applications are accepted from constituted and not-for-private-profit voluntary, community and social enterprise (VCSE) sector groups and organisations, town and parish councils, charities or businesses (who have an eligible sponsor), or a combination of such groups working together.
Non-constituted groups without their own, separate bank account, small local businesses and individuals may apply but they will need to do so with the support of an accountable constituted organisation acting on their behalf as sponsor/guarantor and as the recipient of the grant. If you fall into this category, organisations that DCC would accept as guarantor or fund holder include:
- town or parish councils
- local community and voluntary services organisation (CVS)
- village hall
- another constituted local voluntary group that qualifies
How to apply
To discuss a locality budget fund application, you should contact your local county councillor in the first instance.
Once your local councillor has confirmed their intent to support your project, please fill out the online application form.
Please note: your local councillor’s pledge is an in principle agreement and should not be regarded as a commitment until such time as the application has been processed and you are notified of the outcome. We will contact you if we require further information regarding your application.
Successful applications may take up to 28 working days to be processed. Applicants are therefore advised to bear this in mind when making an application to the fund.
If you are successful in getting funding for your idea/initiative, we will ask you for some feedback on how your project went by the end of the financial year. We will require:
- details of approximately how many people benefited from the funding and how
- details of the amount of any other match funding you received towards the project
Please note, we may request copies of related invoices and receipts so please retain these for three years. Additionally, if your project does not go ahead we will require any funding to be returned.
Crowdfunding
Is your project suitable for crowdfunding? Crowdfunding is all about promoting your proposal or idea to the wider crowd. Telling the crowd about your proposal, the reasons for it and the amount of funds you are trying to raise, and then seeing if they think your proposal is something that really matters to them, and which they are prepared to back financially.
Explore the possibilities that crowdfunding might open up for your project by visiting Crowdfund Devon for further information and resources to support you with crowdfunding. Crowdfund Devon, is a new crowdfunding site being piloted in partnership with several district/city councils, the Devon & Cornwall Police and Crowdfunder.
Further information
If you need any more information please contact [email protected]. | https://www.devon.gov.uk/democracy/councillors-nav/locality-budgets/ |
Although not all participants might be at the stage to really dive into financing and funding opportunities for their business ideas, it is important for all participants to be made aware of basic information and resources in regards to both. It is valuable for participating mentors to take part in this session in order to also be aware of the opportunities they may be able to recommend the participants.
The session in funding and financing opportunities might be one of the most context-specific sessions and therefore does not have a general tool to use as a resources. Nonetheless, the session would need to address a number of topics, namely: how participants can obtain financial support by banks or loans, what grants or entrepreneurship support schemes exist in their context and relevant to different business ideas, what kind of financial support they could get from public institutions such as employment agencies and chambers of commerce, how alternative financing such as crowdfunding could be used to kick-start the funding of their business and generally what institutions they could turn to for advice or guidance in identifying financing mechanisms.
The topics described above should be addressed by a trainer or facilitator who is aware of and experienced when it comes to identifying and making use of funding opportunities or by a representative of such a financing institution. The latter would give participants the chance to hear first hand from ie. an investment bank representative how they could approach getting a loan and what chances they may have in this regard.
The expected outcome of this input session is that participants are aware of funding opportunities available to them, have the ability to make reasoned and independent choices about what mechanism to turn to for support and can take next steps towards finding financing opportunities for their business idea.
This tool is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License. | https://mentproject.eu/portfolio_page/access-to-funding-and-financing/ |
According to these inventors, while fragrance delivery systems have been developed, there remains a need for fragrances designed to provide a quality spray from them. Thus, this invention relates to a fragrance formulation intended for a scent delivery device.
The formulation is composed of one or more fragrances and an optional carrier, wherein the formulation has a viscosity in the range of 0.0 to 9.0 cPa; a calculated water-octanol partition coefficient (ClogP) in the range of −1.0 to 4.0; and a surface tension in the range of 0.0 to 25.0 mN/m. In certain embodiments, the scent delivery device is a nebulizing scent delivery device. | https://www.perfumerflavorist.com/fragrance/regulatory-research/news/21878666/patent-pick-scent-and-delivery-device |
Non-invasive simply means the body is not invaded or cut open as during surgical investigations or therapeutic surgery. Small amounts of radioactive material are injected intravenously and these tracers are taken up and retained in the heart tissue in proportion to regional blood supply.
Journal Highlights
Cardiac Imaging
Venous Thrombosis
Non-Invasive Imaging
Myocardial perfusion imaging (MPI)
Single-photon emission computed tomography (SPECT)
© 2022, Copyrights Herald Scholarly Open Access. All Rights Reserved! | https://www.heraldopenaccess.us/journals/journal-of-non-invasive-vascular-investigation/highlights/non-invasive-imaging |
Due to construction, the upper parking lot is now closed and will remain unavailable at least through the month of May.
The parking lot at the North-East corner of Olympic & La Cienega Blvd. will NOT be open April 18-19, and during Chol Hamoed. There will be parking available in the garage for those coming to Daily Minyan on these days, but we anticipate that on Friday, April 19, we may not have enough spots to accommodate those attending the Siyyum for the First Born. Please plan accordingly on Friday, and consider finding a spot on the street.
The temporary lot WILL be open for Pesah/Shabbat Morning Services on the first two days and last two days of the Holiday. If you would like to park in the garage on these days, there are a few Handicap Spots, and we will be reserving additional space there for those who need it the most. If you are temporarily restricted in your mobility, please contact Ariana Shane at [email protected] by this FRIDAY with the Service or Event you are attending, and she will be sure that your name is on the list for Garage parking during Passover. These spaces are limited, so only those most in need can be accommodated. | https://www.tbala.org/parking |
San Francisco is carving out a small percentage of its 281,000 on-street parking spots to bolster car-sharing programs in the city as part of an experiment to facilitate greater use of shared cars.
But even reserving 900 parking spots for car share use is likely to invoke the ire of many in the city’s various neighborhoods. Next year, the first 450 spots will be assigned, with the City having the option of reserving another 450 the following year. With each spot, there will likely be some form of neighborhood outreach to help sooth tempers and help people understand how and why they will benefit from the program.
Car share parking will be spread out throughout the City, and companies hoping to capitalize on the parking spots must agree to reserve at least 15 percent of their spaces in the outer reaches of the City. Busy commercial streets will be excluded from the “auction.” Qualifying car-share companies will scour the City and identify spots they want to rent. That list will then go to the MTA for approval.
Read the full story at the San Francisco Chronicle. | https://www.publicceo.com/2013/07/s-f-experiment-to-create-parking-for-car-sharing/ |
Friday evening forecast August 6
Temperatures are cooling down gradually through Monday, with daytime highs likely to drop below average by Sunday. Night to morning cloud cover will persist and expand further inland, prompting morning fog and afternoon sunshine. Temperatures will then gradually warm next week as a ridge of high pressure rebuilds along west coast. Monsoonal flow is also expected next week, creating muggy and warm conditions to some areas.
As the marine layer strengthens clouds and fog are wrapping around the coastal and interior valleys, with mostly cloudy skies tonight into Saturday. The ridge of high pressure is also shifting more easterly allowing for onshore flow to strengthen. Temperatures will cool each day, with daytime highs near the coast in the 60s to 70s and valleys in the 80s to 90s.
High pressure will return next week and expand along the northwest before settling into our region by mid week. This will bring above average temperatures, with valleys and mountains looking at several days of triple digit heat. Heat and humid weather could be a topic into the late half of next week something the First Alert Weather Center will be tracking.
FFF-Video / Video / Weather
Julia Espinoza
Julia Espinoza is the evening weather anchor for NewsChannel 12. To learn more about Julia, click here.
Kelsey Gerckens
Kelsey Gerckens is chief meteorologist for NewsChannel 3-12. To learn more about Kelsey, click here. | |
Developing Consistent Earth System Data Records for the Global Terrestrial Water Cycle
We propose to develop consistent, long-term Earth System Data Records (ESDRs) for the major components (storages and fluxes) of the terrestrial water cycle at a spatial resolution of 0.5 degrees (lat-long) and for the period 1950 to near-present.
The resulting ESDRs are intended to provide a consistent basis for estimating the mean state and variability of the land surface water cycle at the spatial scale of the major global river basins. The ESDRs we propose to include are a) surface meteorology (precipitation, air temperature, humidity and wind), b) surface downward radiation (solar and longwave) and c) derived and/or assimilated fluxes and storages such as surface soil moisture storage, total basin water storage, snow water equivalent, storage in large lakes, reservoirs, and wetlands, evapotranspiration, and surface runoff.
We intend to construct data records for all variables back to 1950, recognizing that the post-satellite data will be of higher quality than pre-satellite (a reasonable compromise given the need for long-term records to define interannual and interdecadal variability of key water cycle variables). A distinguishing feature will be inclusion of two variables that reflect the massive effects of anthropogenic manipulation of the terrestrial water cycle, specifically reservoir storage, and irrigation water use.
The overall goal of the proposed project is to develop long term, consistent ESDRs for terrestrial water cycle states and variables by updating and extending previously funded Pathfinder data set activities to the investigators, and by making available the data set to the scientific community and data users via a state-of-the-art internet web-portal. The ESDRs will utilize algorithms and methods that are well documented in the peer reviewed literature. The proposed ESDRs will merge satellite-derived products with predictions of the same variables by Land Surface Models (LSMs) driven by merged satellite and in situ forcing data sets (most notably precipitation), with the constraint that the merged products will close the surface water budget.
There currently exists no comprehensive effort to integrate data sets from remote-sensing, in-situ and models on global scales, and a major focus of our proposal will be to do so. Such a data set is needed to address NASA's strategic goal 3A, which is to study Earth from space to advance scientific understanding and meet societal needs. In particular, the developed ESDRs will help NASA meet its research outcomes in three areas related to this strategic goal; namely Outcome 3A.2, Weather and extreme weather events, by providing more accurate land states (surface soil moisture and snow extent) from which to initialize weather and seasonal climate prediction models; Outcome 3A.4 Progress in quantifying reservoirs and fluxes in the global water cycle, though improved understanding of water cycle variability obtained from the long-term consistent ESDRs; and Outcome 3A.7 Societal benefits from Earth system science, by providing ESDRs that support determination of drought and flood risks globally and advances the understanding of freshwater sustainability. Furthermore, the project will participate in NASA's Earth Science Data Systems Working Groups (ESDSWG), in the areas of managing distributed data (Standards and Interfaces WG), collaborating for the optimal use of existing tools (Reuse WG), and integrating methods for merging heterogeneous datasets (Technology Infusion WG).
| |
What Mercury retrograde is, what this means for you and how to make the most of this energy.
About Planetary Retrogrades
When a planet is closest to Earth in its orbit around the Sun, it looks like it slows down, turns around and travels backwards, appearing to come back closer to the Earth.
This is an optical illusion due to our relative orbit around the Sun. It is a bit like travelling on the highway and watching the trees on the road alongside you. As you pass them, it seems like the trees are moving backwards.
Apparent retrograde motion occurs when Earth passes slower moving planets further out in orbit. This takes a series of seconds in the sky but from our point of view on Earth, one second is approximately one week in Earth time.
Before a planet appears to retrograde, it is at its furthest point from the Earth in its orbit around the Sun. During the Earth’s passing of the planet, the planet will align with the Earth and Sun and be at its closest point to the Earth so it looks larger in the night sky.
Retrogrades affect us on Earth, because the energy of a retrograde planet “feels” different. Since it appears closer to us than usual, its energy associated with its area of influence is amplified.
A planet’s retrograde energy tends to hinder the areas its energy governs. While it can be frustrating because it seems like you are taking one step forward and then two backward, a retrograde period is a natural cycle, just like the turning of the seasons and the phases of the moon.
It provides a period of time for us to become aware of new possibilities or perhaps shift perspective so that we can make better conscious choices and take more aligned actions.
Ancient astrologers described a retrograde planet as being in “meditation” which is a great analogy because things within its sphere of influence are suspended while energies are brewing that will bring greater clarity.
They also said that the energy of a retrograde planet is five times more powerful for incurring change due to its close proximity to Earth and while making adjustments may be experienced as three times more difficult, you will experience three times the results if you put the required effort in during this phase.
This means some discomfort and keen self-awareness in the respective life area the planet correlates with, but it also means long-lasting change and increased productivity.
A retrograde cycle starts when the planet begins to slow to a halt before travelling “backwards” and ends when the planet returns to the point where it first paused, i.e. stations direct.
The energies of celestial bodies are not only reflected in our daily lives and the workings of our consciousness, but also shed light on patterns of social behaviour around us.
Retrogrades serve us by giving us a “wake-up” call so that we can consciously evaluate the patterns of our actions, desires and underlying motivations associated with the planet in question’s domain.
Complications tend to arise, as well as unexpected twists. For in-depth analyses of these retrograde energies and how they affect you personally, you may want to procure the services of a professional astrologer.
Obviously, life cannot come to a halt because of a planetary retrograde. However, you can prepare for it, schedule around these dates where possible when mapping your year. Try to anticipate where problems are likely to occur and plan for dealing with them in advance.
About Mercury Retrograde
A planet is described as retrograde when it appears to be moving backwards through the zodiac.
This traditional concept arose from an optical illusion due to our relative orbits around the Sun. A parallax view causes it to “reverse” in our sky.
This is a similar phenomenon to when you’re travelling really fast along the highway and it looks like the other slower travelling vehicles are moving backwards. Planets are never actually retrograde or stationary they just appear that way from Earth’s view.
This begins a few days before the actual turning point as Mercury slows, which is referred to as the “shadow period” and lasts a further three weeks or so, until Mercury stations direct again. At this time it halts and begins its return to direct motion through the Zodiac.
As a rule, the effect retrograde planets have on events are related to their sphere of influence. Especially involving the sign in which the retro-gradation occurs. For example, a Mercury retrograde in Virgo presents quite a different set of circumstances from those generated when retrograde in Taurus.
Mercury governs all modes of transport, communication and commerce as well as the people who work in these fields. During retrograde, problems in these areas have the propensity to increase dramatically… Miscommunications in the form of flawed, disrupted or delayed communications, transport and technological breakdowns and anomalies ensue; mostly due to absent vital facts or components.
Mercury also represents our way of thinking, processing information and communicating. During a retrograde these aspects are re-examined and brought to the fore.
The Meaning of Mercury Retrograde
It is a good time for considering how you would like to proceed in accordance with your heart’s desires, what needs refining and what needs releasing.
The main theme is learning how to go with the flow when things don’t go as planned!
Mercury goes retrograde three times a year for three weeks each time. This is the time to clean out the closets, organise your files (paper and on hard drive), throw out the clutter and donate to charities.
BUT it is not a favourable timeframe in which to move, buy a home, start a new job, get married (anything related to signing of legal documents) or buy any hi-tech equipment. Whatever you start in a Mercury retrograde period will probably not be enduring in your life. Make your decisions wisely at this time.
What do you do with it?
A retrograde period is best seen as a cycle, beginning when the planet begins to slow to a halt before travelling backwards through the zodiac and ending when the planet returns to the point where it first paused.
However, during the cycle the planet’s energy is most powerful (and more likely to generate critical events of universal importance) when the planet makes a station thus appearing motionless in the sky.
These stationary periods occur near the beginning of the cycle when the planet first halts as it prepares to “move” backwards and midway through the cycle when the retrograde planet slows to a stop before moving forward again. The “direct station” when the planet halts before moving forward again is the most powerful and the energy can be used for maximum benefit.
Should I be afraid of the shadow zone?
Some astrologers consider the “Mercury Shadow” to begin some three weeks before the actual retro station when Mercury passes the point of direct station for the first time.
I am inclined to agree that noticeable irregularities begin two weeks before and then the really noticeable peculiarities begin when Mercury begins to slow significantly, a week before the retrograde station. Just pay attention to the number of computer and network glitches and smartphone freezes that increase during this time. 😉
The period of “Mercury Shadow” extends to the return date, some three weeks after the direct station, once again in my opinion, most significantly one to two weeks after and operates as an integration period for the insights gleaned during the weeks past.
✶ The planets do not “cause” anything per se; they simply mirror forces that already exist within our consciousness. Explore 12 positives of what to do at Mercury Retrograde to make the most of this energy stream. | http://stellasea.lochness.co.za/mercury-retrograde-meaning/ |
Government urged to give female farmers maximum attention
Wa, (UWR), Aug. 14, GNA - Mr. Ibrahim Akalbila, the Coordinator of the Ghana Trade and Livelihood Coalition has appealed to the government to give the needed attention to female farmers to enable them have adequate access to farm input to improve productivity.
He said female farmers had the potential of improving productivity if they had access to credit facilities, mechanisation services and inputs among others as their male counterparts.
Addressing the media during a press conference to disseminate the 2016 Agro-Policy Performance Barometer (APPB) and Agro Barometer Index (ABI)reports in Wa, Mr. Akalbila stated that there was the need for the government to generate a database of farmers in the country in order to target and support female farmers.
The dissemination of the report in the Greater Accra, Brong Ahafo and Upper West Regions which formed part of activities of GTLC to influence government and private sector policies towards the agricultural sector was supported by the Christian Aid.
He further explained that female small holder farmers had demonstrated proven skills in farming and were more sufficient in the use of farm inputs and other resources to increase productivity.
Mr. Akalbila decried the high cost of ploughing as well as farm inputs such as fertilizer and chemicals among others which had deterred farmers from cultivating large fields to increase food production to help ensure sustainable food security and reduce poverty among small holder farmers.
He also observed that in as much as farmers invested on their farms, poor agronomic practices, lack of improved seeds as well as improper land preparation among others served as barriers to high crop yield.
He lamented government's low investment in the agricultural sector and said only 51 percent of the 2016 budget for the sector was disbursed, which he noted could not help meet government's vision of improving suitable productivity in the sector.
Mr. Emmanuel Wullingdool, the Policy Officer of GTLC indicated that the coalition provided farmers with mechanisation services and capacity building in their quest to help farmers improve production.
He also added that the coalition assisted small holder farmers to establish Village Savings and Loans to help them have access to credit to invest on their farms to increase productivity.
The report which focused on the objectives of the Medium-Term Agriculture Sector Investment Plan (METASIP) project such as ensuring food security and increased productivity centred on tomato, maize and rice production in nine farming communities in the Upper West, Greater Accra, Ashanti, Brong Ahafo, Northern and Volta regions. | |
3 Critical Skills To Seattle Sales Tax Remarkably Well
seattle sales tax – The gathering of taxes goals to increase income to maintain governing or to change prices so influence demand. nations and their functional equivalents through history have used money taken from taxation to perform many functions. Some of these include expenditures on economic infrastructure like road, sanitation,public safety, or healt-care system, defense, science or research, culture and the arts, public works, distribution, data collection and dissemination, public insurance, also the operation of government itself. A government’s ability to increase taxes is named its fiscal capacity.
When expenditures exceed tax revenue, a government raise debt. A portion of taxes may be used to pay past debts. Governments also utilize taxes to fund prosperity and public services. These services could inclusive education systems, pensions for the elderly, unemployment benefits, and public transportation. Energy, water also waste management systems are also common public utilities.
Refer to the supports of the chartalist theory of money creation, taxes are not required for government earning, throughout the government in question is able to issue fiat money. Base on this view, the goal of taxation is to keep the stability of the currency, express public policy concerning the distribution of wealth, subsidizing certain industries or population groups or separating the costs of specific benefits, such as highways or social security. | https://freetaxusa.site/3-critical-skills-to-seattle-sales-tax-remarkably-well/ |
Emile Wegelin
Born in Lyon on December 22, 1875 to wealthy Swiss parents, Emile Wegelin enjoyed a comfortable life and was able to pursue his artistic career without financial constraints.
One of his earliest tutors and mentors was Emile Noirot (1853-1924) a prominent artist from the Loire region. Noirot’s enthusiastic support and encouragement of the young artist greatly assisted Wegelin in gaining early recognition amongst his peers. Wegelin regularly visited and worked with all the leading artists of the Lyon region. In particular he enjoyed the company of Henri Grosjean, Eugene Brouillard and Jules Dervet.
The artist who most influenced Wegelin, however, was Pierre Montezin (1874-1946) with whom he studied and worked for many years. Wegelin and Montezin travelled together on numerous painting expeditions throughout France and on at least one occasion to Venice.
The two artists worked well together, enjoying the close relationship of painting side by side. This close contact with such an inspiring master as Montezin, encouraged Wegelin to produce some of his finest works and this was arguably the happiest period of his life. Sadly Montezin died in 1946 leaving Wegelin to paint alone. Alone or not, he set down his easel in every corner of France and he often travelled abroad to Italy, Switzerland, Germany and Great Britain.
Emile Wegelin was above all a landscape painter and loved to paint nature as he saw it, without any exaggerated interpretation. His paintings were exhibited regularly at the Spring exhibition of the Societe Lyonnaise des Beaux-Arts, where he obtained First Prize in 1930. He also exhibited in Provence, Lausanne and Fribourg.
Being in the fortunate position of not having to sell paintings to pay his way, Emile Wegelin accumulated a number of his favourite works to form his own private collection. The collection was shown in the form of a major retrospective exhibition at the Academy Beaux-Arts at Lyon. Recently some of these, amongst his finest works, have come onto the market in Paris allowing collectors and the public in general to judge for themselves the value of his beautiful paintings. Several extremely poplar public sales have done much to further enhance his reputation as an artist of outstanding talent.
Works Available
Receive JGG Newsletter
Keep up-to-date on all Jonathan Grant Gallery exhibitions, events and artists’ news with our online newsletter. Simply sign up below to receive monthly updates on all events at the Gallery.
Email (required)
Services
Our expert team are qualified to offer collectors advice regarding valuations, research, conservation and framing, collection management and artwork installation. Our art consultancy can be conducted in the Gallery or onsite in your home or office. Please contact us to discuss your requirements.
Delivery
Jonathan Grant Gallery provides a delivery and installation service for works purchased from the Gallery. We provide professional packing and door to door delivery service for national & international clients. We also offer accredited wood packaging accepted by countries worldwide.
| |
✏Latinoam rica Book Summary : Offering a well-organized overview of Latin America's development from pre-Columbian times to the present, this cultural reader is written in straightforward, accessible Spanish depending heavily on cognates "without" compromising the natural flow of a native speaker's discourse. A comprehensive review of the main cultural areas of Latin America, including coverage of the Hispanic countries of the Caribbean and Central America, the Andean region (Ecuador, Peru and Bolivia), and the southern cone (Argentina, Chile, Uruguay and Paraguay). Context-specific coverage of U.S.-Latin American relations explores the role of the United States in Latin American affairs in the context of the different cultural regions, particularly in the case of Central America, Mexico and the Caribbean.
📒Spanish For Health Care ✍ Patricia Rush
✏Spanish for Health Care Book Summary : This communicative, needs-based approach to learning Spanish is designed to help professionals or pre-professionals in one of the many areas of health care. Note: As can be expected for the needs of this profession, this text contains explicit vocabulary and illustrations related to body parts, illnesses, and health issues.
📒La Cultura Latinoamericana En El Espa Ol De Aqu Y All ✍ Bernardo Vallejo Ph.D.
✏La Cultura Latinoamericana En El Espa ol De Aqu Y All Book Summary : The format of this book enables the student in spanish to understand being bilingual on the part of the communicative process; that of being bicultural is an indispensable element. The text tunes the learner, at the advanced level, by introducing the communicative performance taking into consideration the spanish dialectal variations into some cultural aspects of the traditional and contemporary systems of latin american societies. The book applies a practical approach to learning spanish as a foreign language by focusing on most latin american countries culture with specific topics: family, social stratification, politics, religion, the position of women, transportation problems, drugs and trafficking, traditional healers, the concept of time, the social stratification of language, the life of some indigenous cultures in the high Andes and in the deep jungles, students visiting a foreign country, in addition to some other topics of interest. Each chapter starts with an ethnographic description of some cultural aspects of a geographical area and its people. Some cultural aspects are suggested to participate on discussions related to the chapter. The student is asked to translate simple sentences into spanish. The verbal interaction among the people in the described area is reflected in the dialectal variations collected, which leads to questions to measure the students comprehension level. Cultural notes are explained at the end of each chapter.
📒Latinoamerica Su Civilizacion Y Su Cultura ✍ Eugenio Chang-Rodriguez
✏Latinoamerica su civilizacion y su cultura Book Summary : Bring the richness and complexity of Latin American culture to life for your students, with LATINOAMÉRICA. Featuring a thematic organization supported by comprehension questions, expansion questions, timelines, chapter summaries, photos, illustrations, Internet activities, video suggestions, and maps, the text takes students on a 20-chapter tour of the progression of Latin culture-from the pre-Columbia era to Hispanics in the United States today. Important Notice: Media content referenced within the product description or the product text may not be available in the ebook version.
✏Revista de M sica Latinoamericana Book Summary :
📒La Econom A Pol Tica De Lo Posible En Am Rica Latina ✍ Javier Santiso
✏La Econom a Pol tica de Lo Posible en Am rica Latina Book Summary :
📒Investigaciones Alemanas Recientes En Latinoam Rica ✍ Hubert Miller
✏Investigaciones alemanas recientes en Latinoam rica Book Summary :
📒National Development Of Psychology ✍ John Adair
✏National Development of Psychology Book Summary :
📒Am Rica Latina ✍ Leopoldo Zea
✏Am rica Latina Book Summary :
📒Encyclopedia Of Psychology ✍ Raymond J. Corsini
✏Encyclopedia of Psychology Book Summary : "Reference source for psychologists, psychiatrists, social workers, counselors, sociologists, anthropologists, and other professionals who do research in human behavior." With approximately 2,150 entries (1,500 subjects; 650 persons), some twenty-four are on psychology throughout the world, as well as biographical entries of deceased and living contributors to psychology. Encyclopedia may be consulted for ready reference, summary, or textbook information. Entries give name or subject, dates, discussion, cross references, references, and name of author. Volume 4 consists of bibliography of 24,521 items, name index, and subject index. | https://www.booklibrarian.com/pdfepub/latinoamerica-presente-y-pasado/ |
Images of the great Golden Gate Bridge straddling the bay come to mind when thinking of San Francisco. But the city's beauty doesn't stop there. Classic bay-window architecture, steep hills with vintage trams crawling up them, bustling Union Square, the nearby Muir Woods, and the gorgeous harbour are all part of the city's charm.
The Bay City has a history of attracting visionaries and entrepreneurs who are often at the creative cutting edge of their time. Expats moving to San Francisco join a rich tradition of pioneers, from the gold miners who started the first European settlements, to the counter-cultural movements of the 20th century and the venture capitalists of the tech boom. As much as it is known for its history, migrants continue to be drawn to the city for its landmarks and the liberal lifestyle it offers residents.
Living in San Francisco as an expat
San Francisco's diversity and the city’s spirit of progress are likely to shape expats’ experiences of living and working in San Francisco. The largest contributors to the city’s economy are the financial services industry, tourism and of course the high technology of Silicon Valley. A remnant of its role in the California Gold Rush, the city is still one of the largest centres of finance in the United States.
San Francisco’s public transport system is comprehensive and efficient, helped by its compact grid layout. The city’s bus system reaches most areas, while residents can also make use of the Bay Area Rapid Transit rail service.
The healthcare system in San Francisco is one of the best in the country, and the city is one of the few places in the USA where uninsured residents have access to subsidised healthcare. It also has some of the best hospitals in California. Most expats will, however, require medical cover to access these.
Cost of living in San Francisco
In some ways, the city is a victim of its own success and long-time residents often bear the burden. The extremely high cost of living is pushing many residents out of their neighbourhoods which are, in turn, gentrified by wealthier inhabitants. Families are increasingly moving towards San Jose and other parts of the Bay Area.
Expat families and children
Newcomers will have access to a variety of accommodation in the neighbourhoods of San Francisco, from leafy suburbs to gentrified areas with loft apartments. Parents can choose from a variety of quality public, private and international schools. The city also provides a wide selection of options for further education, including the University of California, Berkeley.
It is also a child-friendly city and kids in San Francisco can hardly be bored given all the attractions and activities for the young and the young at heart. Expat families can spend time in a variety of museums, picnic in Golden Gate Park or enjoy weekend shopping at one of the city’s malls and shopping districts.
Climate in San Francisco
With cool to mild weather throughout the year, San Francisco has a pleasant climate. There is little variation in average temperature from season to season. Areas immediately on the coast are the mildest in terms of climate. As one moves inland, the climate becomes more continental with slightly cooler winter temperatures and warmer summer temperatures.
San Francisco has much to offer those who can afford it or are willing to cut costs by commuting and living sustainably. It is a city that hums with cultural vibrancy, where industry meets imagination and people from all walks of life come together. Constantly reinventing itself, expats who move to San Francisco might find themselves a part of history in the making. | https://santafe.expatarrivals.com/americas/usa/san-francisco/moving-san-francisco |
So this is just an idea that I try out, as the title suggests this is a bit of expanded lore of my interpretation (as a result take everything as AU) of the Nasu world and trying to flesh it out. In this case I wanted to work with Foundations, now this is an idea I wanted to do as for what I personally know of foundations (that they vary in strength around the globe, that they are needed to cast certain spells unless one has a magical crest with that spell in it, and that Touko likened Flat casting spells without one which is cited as "... Flat's spells do not use existing magical foundations, but the spells themselves are being used as impromptu foundation which is like making a new CPU for every spell he wants to cast" by Touko. However there are still several questions I have, beyond what a foundation is and how it works, there still are questions.
A handful are; What constitutes the limits of a foundation and why do some foundations vary in strength from place to place? What allows a foundation to form or be created and why do only certain spells work within a foundation (ie. what determines a spell's comparability with given a foundation (and if so could you 'engineer' so to speak certain spells which are partially compatible with a foundation so that they work with it, even if they don't originate from that foundation))? Moreover, how does a foundation work beyond that it acts to allow spells to be cast? What are the mechanics behind their existence?
The purpose of this post is, to hopefully answer that. Mind you, I am not saying this is canon to Nasu's works (if you want what he says a foundation is, then this isn't it). This only applies to the works I have made or posted which are automatically assumed to be AU from Nasu's main world. With that in mind If you like this idea and would like to see more of it, I do have more ideas in this format of world building that I could make, so feel free to comment or critique.
What is a foundation?
A foundation, loosely speaking can be thought of as a system which governs the enactment of spells in exchange for a price of magical energy. However this explanation, while useful is lacking in some aspects, as it neglects an explanation of the idea and role of a foundation and how it is or is not compatible with certain people, concepts, spells, and other foundations. In greater depth a foundation is exactly what it sounds, like a platform of beliefs, ideas, conceptualizations, and understandings about the world, it's mechanics, and more broadly, life and existence itself. A foundation is created from a combination of 3 factors. 1) The circulation of methods associated with it's practice, which determine how it behaves and is used. 2) The dissemination of the existence of said foundation among humanity as to gain a foothold in the collective unconscious and establish root. 3) Lastly the idea of mystery enforcing the power of possibilities or things which humanity knows of, yet can neither affirm or deny.
For example the summoning of spirits and the usage of them to cast spells or interfere with the world is based on the presumption of an the continued existence of the soul after the death of the body, the ability for such spiritual beings to be summoned and influence the world, and the assumption of some manner of conceptual significance of the existence of spirits as the base. This foundation which is very old and may date back as far as the concept of ancestor worship or even before to the idea of conceptualizing forces of the world as spirits and gods (nature as a god) and thus took root in the human collective unconscious giving it a root. Lastly the inability of humanity to disprove this foundation with science or to affirm it, gives it a conceptual power which allows for the enactment of spells of a certain potency (as determined by the weight of the mystery behind the total of the foundation and the spell).
As mentioned before we established the way Foundations form and what they are, but this still doesn't explain why some spells work with foundation they didn't originate from, how crests work, or why some foundations don't seem to get along with one another, or even why a foundation is needed to use a spell.
How do Crests circumvent foundations?
To answer the simplest question first, a crest works by the belief that all spells within it hold weight and value, and the fact that one beliefs in a crest's capability and power to interfere with the world. It is technically speaking a shortcut the crest itself is the foundation for the spells with making it so that instead of being a network of spells from different foundations each spell in the crest is treated as a part of the same foundation which comprises the family crest. As the family crest is added to over the years more spells can be added as the foundation continually grows. One major advantage of this system is that while it restricted to whoever or whatever bears the crest and under most circumstances members of the same bloodline, it suffers no degradation from the culture sphere in which a mystery may be used (a spell originating in Greece in the foundation will be just as strong in Brazil, the only variance is based on who is using the crest, their compatibility with it, and their understanding of the mysteries of the spells within, not the culture sphere).
Due to the requirements for all foundations of a belief in them, their obsession with bloodlines, and the sheer practicality for them they are borderline worshipped by modern mages. In essence a crest allows for an ever growing foundation whose core beliefs comprise mostly of a belief in the crest and bloodline itself rather than beliefs which may cause contradictions and comparability issues with spells of certain mysteries.
Why do we need a Foundation to cast spells?
To explain this question I need to reference what I said earlier "a foundation is exactly that: a platform of beliefs, ideas, conceptualizations, and understandings about the world, it's mechanics, and more broadly, life and existence itself". In essence what was meant by this is that a foundation is a model based on belief, insanity, popular belief, or philosophical and logical deduction (or even modern science) that tries to explain how the world works and how magical energy can be used to influence the world. Back in the days where the root existed side by side with mankind such answers were unneeded (and the root itself acted as a foundation for spells), the link between magecraft and the world was clear, but in modern times with that link lost another explanation must be used to cement the weight and meaning of spells in the world.
Within this explanation a religion could be a foundation for spells (as seen in the church), or a belief in the importance of the concept of electricity and how it interacts with the world and living creatures, or in the case of alchemy the principles of the elements and how through certain means like chemical reactions elements (which compose the world) and compounds can shift and transform into other compounds. However a given in all of this is that the user of the foundation must believe in the foundation. Some deviances are allowed and such deviances are permissible and often lead to the formation of different schools (such as disagreement in the exact meaning of numbers by citing the Bible as evidence created the school of Biblical Numerology which exists as Branch of numerology different say Ismalmic Numerology or traditional Numerology (the original branch)). However what is a given is that all of the schools believe in the basis of numerology that numbers have powerful conceptual and magical meaning which coincides and is synonymous with certain events, beings, places, and/or phenomena. Using numbers a numerologist believes that the world and it's phenomena can be predicted and modeled.
Put simply foundations work on the principle of a form of belief that a law/delusion does holds the weight and power to influence the world, it is a given that you must believe that law/delusion otherwise it won't work as that would mean you believe said law/delusion doesn't hold the weight and power to influence the world. Put bluntly is a person who doesn't have a crest uses a spell in numerology, but doesn't hold these beliefs as true then it simply won't work, no matter how much magical energy they put into the spell. In this way a foundation is a computer and a spell is a program (different branches of a larger foundation (like Biblical numerology) would be specific brands of computer) using a spell without a computer is like trying to execute a program on said computer, when that computer doesn't have an OS installed (as belief in the foundation gives it power thus fundamentally letting the program and computer interface and run like an OS).
While it would be possible to get a program to behave like an OS and thus function as an interface to run itself, it would be exponentially harder and more complicated to do than would make said endeavor justifiable by the eyes of almost anyone and in most cases would not be possible for most people.
In the modern world there do exist beings who do not have to believe in their own foundation to support it, but these are rare (even costs must be believed in to work). Such exceptions are generally mostly not human and include phantasmal beings (who draw on the world as a foundation), counter guardians (who are empowered by Alaya or Gaia as a foundation), heroic spirits (who draw on their legends, their mystery, and human belief as a foundation), planet level spirits/ultimate ones/Aristotles (who draw on themselves and the worlds they represent as a foundation), magic users (who draw on the root as a foundation like people in times past), and divine spirits (who draw on themselves and the faith of humanity as a foundation (sometimes with a bonus of the planet supporting them)).
What is compatibility and how does it relate to spells and foundations?
Finally we come to the last major question about foundation; What determines if a spell or foundation is or is not compatible with each other? Compatibility is what allows for the translation of spells to a foundations they weren't native to (even without crests) as if two foundations have similar thoughts about a subject or are partly or broadly comparable in a dialogue (or don't protest a certain belief, but include it in their musings) then it can be converted over. Now the exact mechanics behind moving a spell from one system to another aren't always precise and even if they go right you might lose a little bit of power or the cost of the spell may increase a bit, however it would allow for that spell to work better in a certain region than it would be in its native foundation.
But be warned, trying to translate spells doesn't always go well, even if the systems are compatible then casting the spell will generate a bit more friction than normal as it isn't native to the system (unlike with a crest or it's native foundation where the system was designed with the spell in mind) than a spell native to the system might. In worse cases, it may behave differently, cause excess burden on your circuits, damage or burst said circuits, improperly manifest, or even have the foundation lose control of the spell after manifesting (or more) all of which could result in injury of varying levels or death.
To explain the idea of comparability the idea is simple, as systems of beliefs some beliefs will mesh with one another, and others will clash, a system which postulates the idea of the 5 classical elements would be open to the idea of an earth elemental magecraft spell which allows for immobilizing others through an imitation of petrification. On the other hand to return to the topic of numerology the concept and mysteries of or associated with the sacred language, the unified language, runes or the language of the gods (except the portions related to numbers which would work slightly better) would be totally incompatible with the numerology as they are based on nameology.
This system of Magecraft is based in the perception or belief that is based in the conceit or belief that names, letters, characters, or languages hold power and meaning which influences the world and it's functioning and form, rather than numbers. As such the two foundations exist in direct conflict and unless you are from a system which believes in a significant importance in both names and numbers, but believes neither to be all encompassing you would not bet them to work in concert (One such example is the church's sacraments (which places an emphasis on the names of saints, angels, and god in his 3 forms, but also has great symbolic meaning around certain numbers as seen in the Bible and the divine) among a few others). The general idea is that with nameology or numerology, you can only believe in one or the other, if you think numbers are all defining with the world, you can't also think the construction of names, letters and characters is also all defining as well. And as mentioned prior it is a given that a person believes in a foundation for it to work. | https://blogs.nrvnqsr.com/entry.php/4164-Moonlight-World-Materials-Foundations?s=cdbcaa98c6393826bc069e1b56d64a10 |
Sort by:
Relevance
Date
6,259
results found
Genetics and Genomics
Comparative genetic screens in human cells reveal new regulatory mechanisms in WNT signaling
Andres M Lebensohn et al.
A systematic genetic analysis comprising seven genome-wide screens in haploid human cells uncovered new regulatory mechanisms at most levels in the WNT signaling pathway.
Genetics and Genomics
Stem Cells and Regenerative Medicine
Multiplex CRISPR/Cas screen in regenerating haploid limbs of chimeric Axolotls
Lucas D Sanor et al.
A novel CRISPR-based genetic screen of candidate regeneration genes in haploid axolotl limbs reveals two genes required for proper regeneration.
Developmental Biology
Human Biology and Medicine
Functional genome-wide siRNA screen identifies
KIAA0586
as mutated in Joubert syndrome
Susanne Roosing et al.
A supervised learning approach on a high-content genome-wide siRNA screen has identified 591 likely candidates for ciliopathies and facilitated in the discovery of
KIAA0586
mutations in individuals with Joubert syndrome.
Developmental Biology
An RNAi screen unravels the complexities of Rho GTPase networks in skin morphogenesis
Melanie Laurin et al.
An unprecedented large-scale screen in mice for morphogenetic regulators of tissue development provides major new insights into the roles of Rho GTPases in diverse array of skin developmental processes.
Neuroscience
Psychophysics: Time is of the essence for auditory scene analysis
Andrew R Dykstra, Alexander Gutschalk
Microbiology and Infectious Disease
A virus-packageable CRISPR screen identifies host factors mediating interferon inhibition of HIV
Molly OhAinle et al.
Host restriction factors that block cross-species transmission also play a role in limiting the replication of highly-adapted HIV-1 in IFN-stimulated cells.
Cell Biology
Human Biology and Medicine
A gene-expression screen identifies a non-toxic sumoylation inhibitor that mimics SUMO-less human LRH-1 in liver
Miyuki Suzawa et al.
The FDA-approved compound and plant extract tannic acid is a non-toxic chemical tool for modulating sumoylation in multiple platforms.
Genetics and Genomics
Microbiology and Infectious Disease
Pyphe
, a python toolbox for assessing microbial growth and cell viability in high-throughput colony screens
Stephan Kamrad et al.
An open-source python package for phenotype analyses provides a versatile, modular and user-friendly solution to determine complementary fitness-related traits from large-scale assays of microbial colonies.
Neuroscience
Image content is more important than Bouma’s Law for scene metamers
Thomas SA Wallis et al.
Peripheral appearance models emphasising pooling processes that depend on retinal eccentricity will instead need to explore input-dependent grouping and segmentation.
Neuroscience
Functional double dissociation within the entorhinal cortex for visual scene-dependent choice behavior
Seung-Woo Yoo, Inah Lee
The medial and lateral subdivisions of the entorhinal cortex are important for deciding "where to go from here" and "what to do to this object" in a visual context, respectively.
Load more
Refine your results by: | https://elifesciences.org/search?for=screen |
Can Calcium Chloride Pounds Be Converted to Relative Humidity Percent?
RH and MVER Tests: Is There a Correlation?
When looking to determine if a concrete slab is dry enough to proceed with a finish, flooring or occupancy, there are several methods commonly specified for testing the relative humidity (or moisture condition) of the slab. A dry slab is never at 0% humidity, but determining the level of moisture still held in the concrete can be the difference between a successful flooring installation and a problem-prone floor system.
The two most frequent test methods specified in the industry today are Moisture Vapor Emission Rate (MVER) testing (with results expressed as pounds/1000 square feet) and relative humidity (RH) testing with in situ probes (with results expressed as a percentage). When faced with the two options, contractors, and other industry professionals often ask, “What is the correlation between RH and MVER?”
Simply stated…there isn’t one.
While it might seem logical that there would be some relationship between the two, the reality is that there is nothing more than an imprecise use of the term “moisture test” that links the two test methods.
Surface Similarities
Beginning around the 1940s, moisture levels were tested by placing an enclosed amount of desiccant on a slab’s surface for a period of time. Calcium chloride, or CaCl, was the most common desiccant used for this type of moisture testing and it is often referred to as the anhydrous calcium chloride test. Any subsequent change to the weight of the desiccant was thought to indicate the amount of water vapor that had left the slab to be absorbed by the desiccant. That weight was represented as a ratio of the total moisture content within the slab, and is referred to as MVER, expressed in terms of “pounds/1000 square feet.”
Extensive research done by the CTLGroup in the 1990s showed several problems with the CaCl test:
- MVER test kits cannot be calibrated.
- The test measures, at most, the top ½ – ¾ inch of the slab, but not deeper.
- Surface treatment, including trowelling practices, curing agents, ambient conditions and more, can skew MVER test results. In fact, calcium chloride testing has been specifically disallowed for lightweight concrete applications because the lightweight aggregate can impact results for false high or low results.
- The limits set for the test (i.e. 3 lbs/1000 sq ft) were somewhat arbitrarily chosen and published.
- There is no scientific backing for the test method as either a qualitative or a quantitative measure of concrete moisture. (1)
The real difficulty of MVER or CaCl testing lies in the fact that it primarily tests only the surface conditions of the slab. Drying concrete tends to have a gradient effect – moisture levels are higher deeper in the slab. As moisture evaporates from the surface of the drying slab, it then allows additional moisture to rise through the natural capillaries of the concrete in a progressive cycle until the moisture content in the slab reaches a balance with conditions around it. MVER is incapable of providing accurate readings of those internal levels.
A traditional “moisture test,” MVER is still regulated by ASTM F1869. Ultimately, though, it has proven to be an unscientific and problematic test method, plagued by subsequent moisture-related flooring problems.
Deep Down Differences
RH testing for concrete, on the other hand, measures internal moisture levels of a concrete slab by placing sensors, or in situ probes, within the concrete slab itself. Testing that had begun in Sweden and elsewhere in the 1990s demonstrated that for slabs that dried from one side, placing the probes at 40% of the slab depth would give a reading that would reflect accurate moisture conditions of the slab if it were sealed (i.e. a floor covering installed) at that point in time. (For slabs drying from two sides, the correct depth is 20% of the slab depth.)
Based on the realities of moisture vapor’s distribution in drying concrete, RH testing can accurately determine the internal moisture levels, or RH, of the concrete.
Understandably, the difference between MVER and RH testing has had a significant impact on the flooring industry, allowing concrete and flooring installers to make informed decisions when choosing products that will tolerate the actual RH levels of the slab, or allowing them to make remediation choices before elevated moisture levels result in flooring problems. As concrete science changes with the additions of admixtures, new aggregates, and a variety of finish options in demand, RH testing continues to provide accurate concrete moisture measurement for industry professionals.
The Rapid RH®
With the solid research in RH testing as its basis, Wagner Meters’ Rapid RH® products stand at the lead in innovative, field-tested RH testing. The Rapid RH® Smart Sensors and companion Total Reader make the Rapid RH® among the fastest, most accurate and cost-effective RH test systems on the market today. Its award-winning innovation and practical design offer flooring experts and concrete professionals the technology to keep fast, experienced and accurate data at their fingertips for all of their business, reporting and scheduling decisions when installing floors that will last a lifetime.
The Rapid RH® is the latest in field-tested, scientifically-backed, industry-proven RH testing for concrete and flooring professionals.
You can learn more about RH testing and the Rapid RH® here, or take a free webinar on RH testing for concrete floors by clicking here.
Footnotes:
Howard Kanare, Concrete Floor Moisture Tests, August 2007. https://www.concreteconstruction.net/flooring/concrete-floor-moisture-tests.aspx
Jason has 20+ years’ experience in sales and sales management in a spectrum of industries and has successfully launched a variety of products to the market, including the original Rapid RH® concrete moisture tests. He currently works with Wagner Meters as our Rapid RH® product sales manager.
2 Comments
-
Mr. Spangler, may I ask you one question ?
Is there any stable correlation between RH (%) and mass water content (%) of the “green” concrete slab ?
Many Russian resin flooring contractors prefer to determine the humidity / water content of the concrete slabs using “electronic meters”. | https://www.wagnermeters.com/concrete-moisture-test/concrete-info/calcium-chloride-pounds-converted-to-rh-percent/ |
This electronics course will focus on the physics of biomolecule detection in terms of three elementary concepts: response time, sensitivity, and selectivity. Students will use potentiometric, amperometric, and cantilever-based mass sensors to illustrate the application of these concepts to specific sensor technologies.
|Teacher:||Muhammad Ashraful Alam|
|Provided by:||edX|
|Course language:||English|
|Fees:||free course|
|Level:||intermediate|
|Certificate possible?||(fee)|
|Format:||MOOC/online course|
How do you like the course 'Principles of Electronic Biosensors'?
This online course series shows how to manage engineering projects and also explores the fundamentals of project finance.The courses are designed to teach key project management...
This series of online courses teaches the skills to build a computer vision system.
This course teaches how to get robots to incorporate uncertainty into estimating and learning from a dynamic and changing world. Specific topics that will be covered include... | https://www.edukatico.org/en/course/principles-of-electronic-biosensors |
As everybody of you maybe already knows, Italian astronaut Luca Parmitano that together with Samantha Cristoforetti is part of the last ESA astronaut class (see our post about Italian Astronauts) has been assigned for a 6 months mission on board ISS that will take place from May to November 2013, as member of Expedition 36. Also Samantha has been already assigned for a six months mission that will take place from November 2014 to May 2015 with the Expedition 42.
The mission training for Luca started already some months ago in NASA and in Russia, and during the week from May 28th to June 1st 2012 Luca e his Commander Fiodor Yurchickhin have been at EAC for their first ATV training week. For both of them it was not the first time they met the “ATV world”. In fact Fiodor did already the ATV training before the ATV1 mission, in 2006, when he was part of Expedition 15 together with Oleg Kotov.
Luca (together with his crewmates, ESA Astronaut Candidates – ASCANS) got already an introduction to ATV in 2010 during their Basic Training. In this picture for example we can see Samantha together with Alexander Gerst and Andreas Morgensen during their ATV Ingress lesson.
During the last training week Luca e Fiodor “refreshed” their knowledge and skills related to ATV operations. In particular they exercised the crew monitoring operations required during ATV rendez-vous and docking, both from the theoretical point of view and from the practical one, with dedicated simulations where the instructor proposes to the crew different scenarios, both nominal and off nominal, of ATV rendez-vous and docking, using the ATV simulator available at EAC. The crew needs to recognize the off nominal situations and react according to the procedures.
As far as the ATV Attached Phase operations, Fiodor and Luca followed the ATV Ingress lesson (including hatch opening, air analysis and installation of on board equipment), the Maintenance lesson (regarding the Removal & Replace procedures used to substitute failed equipment on board), the lesson dedicated to Off Nominal Procedures and the Emergency Procedure lesson.
During this last lesson the Emergency Procedures to be used on board in case of fire or depressurization (eg. caused by a meteoroid impact) when ATV is the affected module have been revised and discussed with the crew. On top of that the crew performed an Emergency Simulation dedicated to exercise those two scenarios where they had to react to the emergency alarm using the correct procedures.
The training week was very satisfactory and now we wait Fiodor and Luca at EAC for the second part of ATV training that will take place the last week of June 2012. This second part will be again dedicated to simulations related to rendez-vous and docking and attached phase operations and on top of that the focus will be also on the ATV Departure procedures.
But we will report to you in detail about that in our next post. | https://www.altecspace.it/en/finestra/atv-training-with-luca-parmitano |
A new series of vulnerabilities have been disclosed (CVE-2017-5753/5715/5754) affecting the most popular computer processors, and leaving millions of devices exposed to exploitation. These vulnerabilities allow users/applications with low level privileges to view data in the memory. Data stored in the memory may include passwords, pictures, texts, and any other types. At first these vulnerabilities were thought to only affect INTEL, however other reports indicate that AMD and ARM processors are affected as well.
Meltdown and Spectre are the two trending names associated to these vulnerabilities. Meltdown implies there are no limits between applications and operating system, in this case, exploitation will allow attacker to access memory data across any running application or processes. Spectre exploit forces/tricks programs/applications to dump memory by causing errors then this memory data can be accessed.
Fig 1. Meltdown POC
Fig 2. Spectre POC Modified from * https://gist.github.com/ErikAugust/724d4a969fb2c6ae1bbd7b2a9e3d4bb6#file-spectre-c-L50
Proof of concept exploitation code suggests, side channel type attack which may require some previous steps before full exploitation (I.E Tricking user to browse page with exploit code, access server transferring code then executing). However this does not minimize the risks of these types of vulnerabilities, as for example a malicious actor could simply create an account in a popular cloud based provider then execute exploit on his/her servers and be able to see others information via memory/application leakage.
It is also very possible that these vulnerabilities will soon be chained to other exploits, enabling them to be executed in a manner that allows more streamlined memory access.
The biggest implication of these vulnerabilities is the number of devices that may be affected. Considering that Intel, AMD, ARM are probably the majority of modern processors, the task of applying mitigations seems very difficult. Some of these devices may not be patchable (Think embedded processors such as Cable Modems, Routers, and many other IoTs), some others may be patched however the current mitigations as of the writing of this blog indicate that more than fixes they are workarounds and these workarounds, come with a price which is reduction in performance and latency. These reductions in performance may be significant enough to discourage patching these devices for some vendors.
Suggested mitigations consists applying patches at the operating system level, as deployed hardware at this point is flawed and unmodifiable. Below a list of detailed technical resources and mitigation information.
U.S Cert
https://www.us-cert.gov/ncas/current-activity/2018/01/03/Meltdown-and-Spectre-Side-Channel-Vulnerabilities
Official Intel
https://security-center.intel.com/advisories.aspx
Official AMD
https://www.amd.com/en/corporate/speculative-execution
Official ARM
https://developer.arm.com/support/security-update
MITRE
CVE-2017-5715
CVE-2017-5753
CVE-2017-5754
Official Vulnerability page with technical POC and Research information
https://www.meltdownattack.com
Mozilla
https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/
Google Chrome
https://support.google.com/chrome/answer/7623121?hl=en
Official Microsoft
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002
Google Project Zero
https://googleprojectzero.blogspot.com/
by Rod Soto
Predicting big events in cyber security can be a tricky task. Attacks seem to have waves of innovation and adaptation then plateau and stay low on the radar, only to come back years later in new forms or adapted to other new exploits. An example of this is the use of encryption and destructive software in malicious ransomware campaigns. Both have been used before but are now repurposed in a much more effective manner. Predicting malicious campaigns or new exploits, is made even more difficult because of new software or hardware with unreleased bugs and vulnerabilities that may drive and shift attack and defense paradigms
With the creation of new technology and development of new software applications, the possibility of abuse and exploitation is always parallel. Hence, predicting these type of events may be linked to the creation or widespread adaptation of new technologies, even though we have seen at times how code that was allegedly a decade old as of 2017 was still very powerful..
Cyber attack trends and the use of weaponized code are also inexorably tied to geopolitical factors, as cyber has become part of warfare. It is known that once such code is disclosed, it will be repurposed and adapted to exploits and known type of attack vectors to make them more effective. Example of that is the addition of EternalBlue to WannaCry ransomware software last year.
The internet is now, more than ever, embedded everywhere, from Personal Area Networks, Home AI, Internet of Things and the corresponding big data distributed backends needed to interconnect and process their information in the cloud. They have blurred the edge and made the internet part of our homes, bringing its risks with them. The adoption of Artificial Intelligence in cyber security is still its infancy and yet to be developed. Just as AI is being used mainly to drive defense technologies, however, it is a matter of time until this technology is adapted as well for malicious purposes. With all these caveats in mind, here is what past and present events suggest may happen this year:
A conflicting issue between usability and security is at the core of single sign on capabilities. The use of single sign on (SSO) is from the perspective of usability, a must have. SSO is required to maintain efficency within a workplace. Modern enterprise users are constantly using multiple applications, accessing, sharing, storing data across multiple file shares, sending, downloading emails, authenticating through VPNs, mobile devices, etc. Without single sign on, each step would inhibit productivity levels. It would be impossible, from the functional view of user interactions and tasks, to require them to authenticate every time they access a resource, read, write or modify a file. It is very clear that SSO is a fundamental need for enterprises.
However SSO represents a single point of failure and a driving factor for credential reuse/extraction attacks. This means attackers can gain access to a variety of resources by simply obtaining and reusing credentials. If organization defense posture is weak, this creates a risk that can come from simply snooping over someone’s shoulder, reading a sticky note, or all the way to a sophisticated targeted phishing, malware execution, social engineering or post exploitation attack, where attackers can obtain user credentials and then proceed to gain access and move laterally across an organization.
There have been significant numbers of breaches and known compromises that started by simply obtaining credentials from users, and even administrators as malicious actors tend to pretext and target them. Weak passwords and policies clearly augment the damage that an attack of this type can cause. In some cases the reuse of passwords, for example, has exposed not only targeted organizations, but partners and even defense service providers.
Credential reuse/extraction attacks, used in post exploitation environments, provide powerful tools to move around the enterprise leveraging SSO technologies. Very popular tools such as Mimikatz are designed to especifically exploit SSO features. Tools like this allow attackers to perform things such as Pass The Hash, Pass The Ticket and other related credential extraction/reuse attacks.
These type of attacks and tools constantly evolve as new ways of abusing/exploiting SSO features are discovered. Recently security researcher Juan Diego found a method to extract NTLM hashes that then can be reused (or cracked) to obtain credentials in a post exploitation environments to then move laterally. In spite of all the attacks already available and upcoming, single sign on cannot be abandoned.
Single sign on can be fortified by using strong password policies and complementing monitoring and detection technologies such as JASK Trident. JASK Trident uses a number of multiple sources of information and contextual indicators to detect abnormal activity and credential reuse attacks, these multi contextual indicators are based in experience security operation center operators along with machine learning models.
The following figures show multi contextual indicators used by JASK Trident, that can indicate credential extraction/reuse.
Fig 1 Shows Lateral Movement activity alert (SMB) Scanning
Fig 2 Shows First Seen Access - SMB Share
JASK Research team has produced a threat advisory outlining a proof of concept of this new attack and specific steps for mitigation. Access the Threat Advisory by clicking here.
Reports earlier today, spread of a widespread infectious worm distributing the well known Ransomware: Petya, targeting the Ukraine infrastructure (Power, Transportation, Finance) and other big companies around the world. It later came to light, that this attack could possibly not be a variant of Petya, but an entirely new kind of ransomware attack, leading to it also being called NotPetya. No matter the name, the findings indicate an ongoing campaign with similar attack vectors as the WannaCry infestation in May 2017, thus leading experts to believe it is the next evolution in a possible series of attacks that will continue to affect companies around the world.
Screenshots of Petya/NotPetya:
Ransomware detection from JASK's product:
Initial reports in the community suggest EternalBlue exploit may be present in some of the researched samples. This would enable the ransomware payload to spread rapidly and aggressively. Further lateral movement would only occur if the targeted environment is not patched.
Other reports indicate that the main attack vector is phishing, a MS office file that proceeds to download malicious payload once user has opened and enabled Macros. Some of the code reported shows a Powershell syntax downloading an executable, there are also other code snippets showing lateral movement using Powershell.
It is important to clarify that even if your systems are patched, some ransomware versions will use compromised user credentials to search, probe, copy, and execute malicious payload based on the rights given to such user. This means spreading and infestation is possible but limited to user's credentials and rights in targeted shares.
These versions of malicious code seem to be using EternalBlue in some cases and in others extracting credentials of compromised systems to move laterally and further infestation. In addition, there are reports of more than one variance of the malicious code currently in play. This makes it more difficult for companies in compromising situations to detect and remediate.
A quick check on BlockChain.info indicates several payments have been made to bitcoin address related to this attack https://blockchain.info/address/1Mz7153HMuxXTuR2R1t78mGSdzaAtNbBWX . The email address referenced in the message hosted on POSTEO has been apparently disabled, preventing the actors behind the attack to receive communications, making it even more difficult to get any type of keys to decrypt.
Current consistent indicators suggest this ransomware campaign is based on the following vectors:
JASK technology already has the capabilities of detecting this type of ransomware attack, as this version uses similar methods as WannaCry. JASK can also detect malicious file download and unusual SMB share access. This attack is more targeted than WannaCry and it seems to specifically target infrastructure companies. This code also more versatile than WannaCry as it checks for EternalBlue or it spreads by SMB rights from compromised user.
Mitigations:
US-Cert Ransomware prevention/mitigation info
US-Cert Petya bulletin
Petya IOCs & Yara Rules
IBM X-Force Snort signatures
JASK Eternal Blue & WannaCry detection
The Ransomware strain "Wanna Decryptor 2.0" aka "WannaCry" is currently on a devastating run, reportedly taking offline several NHS hospital networks in the United Kingdom as well as other major organizations in Europe are reporting ransomware infections.
The JASK Labs team's initial research shows the actors have repurposed the recently (ShadowBrokers) leaked zero-day vulnerability MS17-010 in Microsoft SMB protocol. Remember this vulnerability originated as a purportedly leaked NSA offensive tool "EternalBlue" and has now been completely weaponized by criminal malware gangs for Ransomware campaigns.
Here is a Youtube video displaying the WannaCry ransomware in action:
https://m.youtube.com/watch?feature=youtu.be&v=T062Ke10jpY
If you recall from our earlier blog post, we did a fairly extensive run-down on EternalBlue and already offered coverage in our product for MS17-010, back when those details first emerged. Beginning today JASK added coverage for WannaCry in JASK Trident. ***UPDATE WannaCry is also installing DoublePulsar backdoor as it spreads. ***
So if your wondering how WannaCry is getting into your network and how exactly is it using EternalBlue? See the following detailed breakdown:
The good news is that if you use JASK Trident you have TOR detection and Eternal Blue detections as default content. We detect TOR using advanced network analysis using meta-data, which is a huge upgrade from the typical approach of tracking exit-node IP list's. Our approach is much more accurate and doesn't require updating... this in itself is a huge benefit that most other security products cannot or do not support when detecting TOR!
If you are not currently a JASK user, we recommend you leverage the following Snort/Suricata rule made by the IBM X-force team and observe the below IOC's related to WannaCry.
alert smb $HOME_NET any -> any any (msg:"ET EXPLOIT Possible ETERNALBLUE MS17-010 Echo Response"; flow:from_server,established; content:"|00 00 00 31 ff|SMB|2b 00 00 00 00 98 07 c0|"; depth:16; fast_pattern; content:"|4a 6c 4a 6d 49 68 43 6c 42 73 72 00|"; distance:0; flowbits:isset,ETPRO.ETERNALBLUE; classtype:trojan-activity; sid:2024218; rev:1;)
We also recommend tracking TOR exit node IP's as Threat Intel if thats the only viable way you can track TOR on your network, otherwise reach out to our team to get a JASK sensor setup quickly to ensure coverage here.
The following WannaCry network IOC's were observed in AlienVault's OTX community and deployed to all JASK customers running Trident.
www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
xxlvbrloxvriy2c5.onion
sqjolphimrr7jqw6.onion
gx7ekbenv2riucmf.onion
cwwnhwhlz52maqm7.onion
76jdd2ir2embyv47.onion
57g7spgrzlojinas.onion
If you would like to learn more about WannaCry or JASK, please contact our research team [email protected]
References: | https://jask.ai/author/rodsoto/ |
From our first breath to old age, touch is central and beneficial to our lives.
From our first breath to old age, touch is central and beneficial to our lives. Here’s how the sense of touch works
Touch is our very first sense connection to the world from birth and a fundamental human need throughout our entire life span. Yet, in this digital age, it seems we’re out of touch with this vital non-verbal connection.
Whether we receive a pleasant caress, a pat on the back, a massage or just a handshake, being touched by another human being can evoke positive emotions, healing physical sensations, spiritual growth and powerful cognitive responses. Here, we look at ways we can add positive human contact back into our lives and the benefits it offers.
The Silent Language
“Touch is a powerful form of nourishment that goes right to the core of the parts of ourselves where only that ‘silent’ language can fully express what we’re feeling,” says Cornelia Gerken, psychologist and founder of Core Evolution. “When this happens, the sensation we receive can play a role in putting us back on our feet in terms of trust, relaxation, deep connection, and it opens us up to all the other great things that may not be visible at that moment,” she adds.
But how does the sense of touch work? “When we’re touched, pressure receptors under that area of the skin become more active, and this increase in activity tells the nervous system that there has been contact in a specific skin area,” Cornelia explains. “These signals are then processed through the nervous system and travel along the spinal column, to reach the brain, which interprets the information through its somatosensory cortex.”
In a 2009 study, researchers found that not only are we naturally wired to communicate with touch, but we are also able to send and receive additional emotional signals through tactile communication, compared to facial and vocal expressions of emotion.
In a series of studies at Indiana DePauw University, psychologist Matthew Hertenstein had volunteers attempt to communicate a list of emotions to a blindfolded stranger solely through touch. Participants expressed eight distinct emotions – anger, fear, disgust, love, gratitude, sympathy, happiness, and sadness – with accuracy rates as high as 78 per cent. The results suggest that touch might be necessary for conveying meaning that isn’t communicated through any other modality, and that it is part of the way we express our thoughts, beliefs, knowledge, desires and intentions to another person.
Touch also creates a more embodied experience. “When we’re touched by someone who cares, our mind gravitates towards the feeling we’re experiencing,” says psychotherapist Dr Karen Philip. “As a result, most of our worries or concerns are automatically reduced or lowered.”
Cornelia agrees, in this way, we can feel a deep sense of fullness that leads to spiritual benefits. “This sense of wholeness, which comes through us, opens us up to the flow of life and it allows us to surrender to what is really beautiful within us, which can include sentiments of peace, gratitude and letting go,” she says.
A Little Less Lonely
Consequently, touch can help tackle a modern epidemic – loneliness. Research from University College London showed that affectionate touch can mitigate the harmful effects of loneliness because slow, gentle touch made people feel socially bonded.
“When we live in our heads, we can feel isolated,” confirms Dr Philip. “But, because touch is a felt sensation that represents connectedness, engaging in activities that incorporate tactile elements helps alleviate those feelings of loneliness that many of us [may] feel.
“In turn, once we’re able to connect with people who care for us, this can develop into verbal communication, which can really mitigate the health consequences of loneliness,” she adds.
Take Away The Pain
In healthcare, research from the University of Colorado found that when people experiencing pain held hands with their romantic partner, their heart and respiration rates synched up, resulting in an analgesic, painkilling effect – and communicated empathy between partners, where they understood what they were feeling in a given moment.
“Such an expression of empathy is absolutely vital for human beings to thrive and exist in a more balanced way in the world, with the complexities that we face on a day-to-day basis,” explains Dr Philip.
Research from Brazil, which looked at the effectiveness of therapeutic touch involving 30 elderly patients with chronic pain, concluded that touch was effective to decrease pain intensity and depressive attitudes and symptoms, as well as improve sleep quality.
Meanwhile, research in 2016 confirms that the use of therapeutic touch is a safe method in the management of the physical function, pain, anxiety and nausea in cancer patients.
Positive Powers
“Positive touch contributes towards better cognitive function as it intentionally activates the flow of oxytocin, endorphins, serotonin and dopamine – the quartet of chemical hormones responsible for happiness and wellbeing, which are also found to act as a natural antidepressant,” explains Dr Philip.
“In turn, this reduces cortisol, the stress hormone. In other words, this slows down the cardiovascular stress response – lowering heart rate and blood pressure – and relaxes the activity of the digestive system or gut, also referred to as our ‘second brain’,” adds Cornelia.
THE BEST TYPE OF TOUCH
Slow, loving strokes are thought to be the most beneficial kind of touch as it has a therapeutic quality. It has hormonal benefits, and it’s reciprocal in nature, too.
“When you’re kind to someone you get a reward back, therefore when you touch another with kindness, care and love, you receive the same benefits,” says Dr Philip.
While some people may perceive this as a threat, resorting to what is known as tactile defensiveness – when the light touch receptors in the skin are overly sensitive, triggering a “fight or flight” response – there are ways we can relearn to accept gentle, positive touch or overcome fear from a traumatic experience.
MASSAGE
HUGS
HAVING PETS
According to a 2017 study, for people who lived alone, owning a dog decreased their risk of death by 33 per cent and their risk of cardiovascular-related death by 36 per cent, compared to single people without a pet. The chances of having a heart attack were also 11 per cent lower. Therapy dogs have been shown to alleviate anxiety, loneliness and depression in those with cancer. | https://myreadingroom.online/en/live/parenting/womens-weekly/aNXJebYm/the-power-of-touch |
There are many reasons for implementing surrogate keys in Dimensional Models (enterprise data modeling) such as insulating dimensions from changes to source systems and enabling historical versioning of dimension members. However, query performance in the data warehouse is another primary reason for incorporating surrogate keys into your dimensional models that should not be neglected.
A surrogate key is a non-intelligent, system generated, numeric (integer or smallint) value assigned as the primary key of a dimension. An alternate key (aka natural key) must always be defined as well for dimensions to understand the granularity of the dimension – something vitally important for enabling conformed dimensions across multiple fact tables and areas of analysis in any data warehouse environment.
Some database and DW designers believe that surrogate keys are not needed due to increases in performance capabilities in hardware. However, due to the ever-expanding volume of data, the increasing volume of queries, and the data volumes queried it is important to make query joins as efficient as possible for every application and database management system.
According to a recent OLAP Survey, the most commonly reported problem is poor query performance. Using surrogate keys is the foremost means to optimize dimensional queries on a RDBMS platform. The primary reasons are:
Simplified, High Performance Joins
Using a surrogate key will simplify the join between a fact and dimension table. A single, small numeric value (usually 4 bytes (integer) or 2 bytes (smallint)) is scanned in the fact table or fact table index, rather than a large character value or multiple attributes of mixed data types. Obviously, the join on the single, small numeric value will be faster. It is very common for dimensions to have multi-part natural keys comprised of the business key (attributes that are well known to business users as providing uniqueness in source systems) plus requisite meta data tags (e.g. source system identifier, effective date). The natural key describes the uniqueness and granularity of the dimension table. It is critical that the metadata associated with the natural and surrogate keys be identified and documented.
These multi-part natural keys often consist of character values that can add up to a significant amount of space when your fact tables consist of millions or billions of records. It is very common for a Business Intelligence (BI) query to need to retrieve a very large number of records from the database, even though the results presented to the user are usually summarized.
In dimensional models, it is very common to need to view the state of a dimension member as it appeared as of fact occurrence date. If the Type II Slowly Changing Dimension method is used for handling changes in a dimension, changes to a dimension member will result in the existing record being “deactivated” – e.g. the inactive date is set to the previous date, and the current values are inserted into a new record. Without a surrogate key, an equi-join cannot be performed to accurately join the fact and dimension tables – instead, an inefficient date range operation must be performed.
Example:
select d.col1, d.col2, sum (f.amt)
from dimension d, fact f
where d.col3 = f.col3
and f.tran_date between d.effective_date and d.inactive_date
and d.col4 = “Widgets”
group by d.col1, d.col2
When a surrogate key is used, the task of optimizing queries is reduced – there is only a single possible way to join a fact table to the dimension. A side benefit of this is that users cannot incorrectly join a dimension and fact table. In the above example, if the user forgot to include the range join on the fact transaction date, double counting could result.
Simplifying dimension joins by utilizing a surrogate key will be appreciated by anyone who has to troubleshoot or tune complex analytical queries generated by BI tools. A fact table usually has many associated dimension tables – it would not be unusual to have fifteen (15) dimensions that could join to a fact table. In addition, many dimensions may have multiple relationships (roles) to a fact table. There are usually many types of dates that need to be represented with a fact record – each of which would need to join to the date dimension. For example, on an Order fact table you might have an Order Placed Date, Order Shipped Date, Order Invoice Date, etc.
Reduced I/O Operations
While disk space is (relatively) cheap, usually many fact table rows have to be read into memory to satisfy queries – if the records are not already in memory. Relational databases perform I/O using pages. A page can contain many data or index rows, so if a page contains a row required to satisfy a query, the data page (with all the rows contained in it) is read into memory. Using natural keys increase the width of the fact table, so fewer fact table rows can be stored on a data page. The result is increased I/O operations – usually the main cause of performance bottlenecks.
A significant amount of the time spent during ETL processing can be attributed to index builds. Utilizing surrogate keys will reduce amount of time spent in building and maintaining indexes and will reduce the amount of space allocated for indexes. As a result, the indexes will be more compact and efficient.
Enables RDBMS Optimizations
Using surrogate keys help enable database optimizations developed specifically for use with dimensional models, e.g. bitmap indexing, star transformations.
Some database features developed specifically for Star Schemas require single part foreign keys. Due to the performance impact of enabling Referential Integrity (RI) for a dimensional model, foreign key constraints are usually not enforced in the database. Foreign keys in the fact table, however, usually have a bitmap or b-tree index on the column. Unlike a B-Tree index, most bitmap indices cannot be comprised of multiple columns. Bitmap indices were developed specifically for BI application and can have a dramatic impact on query performance.
In order for a RDBMS query optimizer to execute a query using a Star Transformation, a single part foreign key with a bitmap index is required. Star Transformations will “rewrite” a query to optimize it by using sub-queries that take advantage of the bitmap indices on the foreign keys.
Conclusion
The increases in performance capabilities of hardware and software plus the low cost of DASD may tempt one to forego using surrogate keys. More powerful infrastructure does not negate the need for good data architecture. Using natural keys in dimensional models will usually be a mistake. Use of surrogate keys should be considered the standard for dimensional models, unless there are very specific, valid, and justified reasons. Surrogate keys have significant performance benefits, in addition to other data architecture benefits. | https://www.ewsolutions.com/performance-benefits-surrogate-keys-dimensional-models/ |
The integration of everyday objects into the Internet represents the foundation of the forthcoming Internet of Things (IoT). Such “smart” objects will be the building blocks of the next generation of applications that will exploit interaction between machines to implement enhanced services with minimum or no human intervention in the loop. A crucial factor to enable Machine-to-Machine (M2M) applications is a horizontal service infrastructure that seamlessly integrates existing IoT heterogeneous systems. The authors present BETaaS, a framework that enables horizontal M2M deployments. BETaaS is based on a distributed service infrastructure built on top of an overlay network of gateways that allows seamless integration of existing IoT systems. The platform enables easy deployment of applications by exposing to developers a service oriented interface to access things (the Things-as-a-Service model) regardless of the technology and the physical infrastructure they belong. | http://dsp.tecnalia.com/handle/11556/270 |
The invention relates to a motor vehicle including multiple actuators for performing movements of the chassis.
It is known to introduce movements, i.e., pitching-, rolling- or vertical movements into the chassis of a motor vehicle via so-called active chasses. The purpose of a corresponding movement of the chassis can in particular be to compensate unevenness of the road surface, for which usually vertical movements of the chassis are performed, or to improve the dynamic properties of the motor vehicle for example when driving through curves, for which usually rolling movements of the chassis are performed to cause the motor vehicle to “lean into the curve”.
For performing movements of the chassis the motor vehicle includes a number of actuators. Usually the chassis is caused to perform pitching-, or rolling movements relative to the longitudinal axis of the motor vehicle or vertical movements relative to the vertical axis of the motor vehicle.
Thus such movements of the motor vehicle or changes of the orientation of the chassis, which are based on the control of corresponding actuators for performing pitching-, rolling- and vertical movements of the chassis, are always limited to only one degree of freedom, i.e., the chassis either performs pitching- or rolling- or vertical movements.
The invention is based on the object to set forth a motor vehicle whose chassis can be moved in degrees of freedom at the same time.
The object is solved according to the Invention by a motor vehicle of the aforementioned type, which is characterized in that it includes a control device for determining orientation information, which describes an orientation of the chassis to be performed with regard to at least one target setting, wherein the control device is configured to control the actuators based on the orientation information so that the actuators in combination perform pitching-, rolling- and vertical movements of the chassis in order to orient the chassis according to the orientation described by the orientation information.
The principle according to the invention enables a combined, i.e., simultaneous performance of pitching-, rolling- and vertical movements of the chassis. Thus the chassis can be moved in more than one, in particular three, independent degrees of freedom. Pitching movements are defined as movements of the chassis, in particular rotational movements, about a transverse axis of the motor vehicle, rolling movements are defined as movements of the chassis, in particular rotational movements, about a longitudinal axis of the motor vehicle, vertical movements are defined as movements of the chassis along a vertical axis of the motor vehicle. The longitudinal, transverse and vertical axes of the motor vehicle are perpendicular to each other and form an orthogonal coordinate system whose origin is for example situated in the center of gravity of the motor vehicle.
The actuators of the motor vehicle are controlled via a control device, which communicates with the actuators, or with control devices assigned to the actuators, on the basis of an item of orientation information, which was determined beforehand with regard to a defined target setting of the motor vehicle. In the control device certain algorithms, which may for example be referred to as quality function, can be stored for determining the orientation information and enable determining the orientation information.
The orientation information describes an orientation of the chassis to be performed with regard to at least one target setting. The orientation information thus contains all instructions for controlling the actuators of the motor vehicle, in order to control these actuators so that they perform in combined pitching-, rolling, and vertical movements, in order to orient the chassis in accordance with the orientation described by the orientation information.
Based on a given actual orientation of the chassis, the proportions of the pitching-, rolling, and vertical movements to be performed, that are described by the orientation information are usually different, in order to orient the chassis in accordance with the predetermined or predeterminable target setting, which corresponds to a target orientation of the chassis.
Generally it is not strictly required to always control all actuators for preforming pitching- rolling and vertical movements of the chassis, to orient the chassis in accordance with a defined target setting, rather it may be sufficient to only control individual actuators to perform the combined pitching- rolling and vertical movements of the chassis to be performed.
The target setting may be a setting of the chassis that influences the driving characteristics of the motor vehicle, and according to which the chassis is for example always to be oriented so that a greatest possible comfort for the vehicle occupants is ensured under given driving situations. The target setting can be referred to as target orientation of the chassis. The orientation of the chassis described by the target setting, in particular results in the fact that no or at least decreased longitudinal and transverse forces act on the vehicle occupants under the actual driving conditions of the motor vehicle. According to the invention the chassis is caused to under defined movements and/or tilts by actively controlling corresponding actuators, in order to actively cause a targeted shift of the rotation axis or axes occurring due to the drive, i.e., pitching- rolling and vertical movement axes, so that the drive-related longitudinal and/or transverse forces acting on the vehicle occupants are compensated.
For example based on a given driving situation of the motor vehicle and a resulting actual orientation of the chassis, a change of the orientation of the chassis may be indicated, in order to increase the comfort of the vehicle occupants by reducing or compensating the longitudinal and transverse forces acting on the vehicle occupants. Which new orientation of the chassis leads to an increase of the driving comfort under the given conditions is described by the determined orientation information. Taking the target setting into account, via which a corresponding increase of the comfort based on a reduction or compensation of the longitudinal and transverse forces acting on the vehicle occupants is to be expected, the orientation information describes a change of the orientation of the chassis to be performed based on the actual orientation of the chassis, in order to realize a target orientation of the chassis which corresponds to the target setting.
The orientation of the chassis is thus changed based on the orientation information, i.e., based on the orientation information the control device determines corresponding control commands to the actuators for performing pitching- rolling and vertical movements of the chassis, in order to orient the chassis in correspondence with the orientation described by the orientation information. The actuators are thus controlled on the basis of the orientation information so that the chassis is moved or oriented from the actual orientation into a target orientation. By controlling the actuators a virtual shifting of the axes, i.e., for example a pitching- rolling and vertical axis, about which the vehicle would rotate due to the actual driving situation, can thus be realized. The chassis consequently rotates about the shifted rotation axis or axes, wherein drive-related longitudinal forces and/or transverse forces acting on the vehicle occupants are neutralized.
The orientation information In particular describes a trajectory about which the chassis has to be moved in order to assume the orientation to be performed, and control commands to the actuators regarding pitching- rolling and vertical movements about the trajectory, which are required to move the chassis about the trajectory into the orientation to be performed. The trajectory, which can also be referred to as target axis, projects hereby an in particular three-dimensional spatial axis or spatial curve, which for example extends through the chassis, however, may generally also be located outside the chassis.
The trajectory then projects corresponding axes for the individual movement components of the chassis to be performed for the combined pitching-rolling and vertical movements of the chassis to be performed. For this the orientation information contains corresponding control commands to the actuators for performing pitching- rolling and vertical movements of the chassis, which are required to move the chassis about the trajectory into the orientation to be performed, which corresponds to the target setting of the chassis. As mentioned above it is not strictly required to always control all actuators for performing pitching- rolling and vertical movements of the chassis, to orient the chassis in accordance with a defined target setting, rather the control of only individual actuators may be sufficient for the combined performance of pitching- rolling and vertical movements of the chassis.
Advantageously the control device is configured to take an actual orientation of the chassis into account for the determination of the orientation information. The actual orientation of the chassis can thus serve as a boundary condition to be taken into account for determining the orientation information. When determining the orientation information it is therefore possible, as mentioned, to take an actual orientation of the chassis into account. The actual orientation of the chassis can for example describe by what value (for example percentage or angular) the chassis has changed relative to a reference value, which for example describes the orientation of the chassis when the motor vehicle stands on a horizontal or even ground. Thus for example in case of an uphill drive it can be expected that the actual orientation of the chassis compared to the reference value contains at least a rearward pitching movement because the motor vehicle usually is lowered in the rear region when driving uphill. With regard to a target setting of the chassis, which increases the driving comfort, it is for example possible in the case of uphill drives to control the actuators for performing pitching- rolling and vertical movements of the chassis based on the orientation information so that these movements compensate the actual orientation of the chassis during the uphill drive, i.e., they cause a frontward pitching movement of the chassis. The opposite applies for a downhill drive.
Further, the control device can be configured to take further operating parameters of the motor vehicle, such as actual acceleration of the motor vehicle, in particular in longitudinal transverse and vertical direction, steering wheel angle or yaw angle into account for determining the orientation information. Also the mentioned operating parameters of the motor vehicle can be referred to as boundary conditions. In this way it is for example possible to take steering operations performed during a drive through a curve in the determination of the orientation information into account. The trajectory described by the orientation information is determined in this situation for example by taking the steering movement, and as the case may be further operating parameters of the motor vehicle such as transverse acceleration and yaw angle associated therewith, into account. Corresponding operating parameters of the motor vehicle can be detected via sensors, which communicate with the control device. The operating parameters of the motor vehicle taken into account in the determination of the orientation information may be weighted against each other so that certain operating parameters have a greater influence during the determination of the orientation information than others.
When the motor vehicle is moved toward an obstacle situated ahead of the motor vehicle and is correspondingly decelerated, actual given deceleration values in longitudinal direction of the motor vehicle, i.e., negative acceleration values in longitudinal direction of the motor vehicle, can be taken into account in the determination of the orientation information.
The actuators are for exampled configured for controlling devices for height adjustment of the chassis, at least one drive aggregate, at least one braking device, at least one steering device, at least one driver assistance system for longitudinal and/or transverse guidance. Devices for height adjustment of chasses are known and are for example referred to as “active chassis”. Via corresponding devices for height adjustment of the chassis it is for example possible to adjust the spring mount of a spring damper element, which forms a part of a wheel suspension and is also referred to as shock absorber. Via a targeted adjustment for example of the spring mount of one or multiple spring damper elements, pitching- rolling- or vertical movements can be introduced into the chassis in a targeted manner depending on at which spring damper element a corresponding spring mount is adjusted.
By controlling the drive aggregate in a targeted manner, for example by acceleration or deceleration processes, a virtual shift of the axes, i.e., in particular a pitching axis about which the motor vehicle would rotate as a result of the actual driving situation, can be achieved. For example, acceleration of the vehicle usually results in a pitching movement of the chassis, wherein the rear part of the motor vehicle is lowered. Vice versa, deceleration of the motor vehicle due to actuating braking devices of the motor can lead to a lowering of the front part of the motor vehicle and with this to opposite pitching movements of the chassis.
All acceleration or deceleration movements of the motor vehicle performed on the basis of the orientation information are preferably carried out so as to be not or only slightly perceptible for the vehicle occupants and other road users such as following motor vehicles.
The virtual shifting of a rolling axis of the chassis described above can for example be accomplished by targeted, autonomous steering interventions, i.e., steering operations that are independent of the driver, for example as known for driver assistance systems that support an autonomous transverse guidance of a motor vehicle.
The invention also relates to a method for performing combined pitching-, rolling- and vertical movements of a chassis of a motor vehicle. According to the method, an item of orientation information is determined, which describes an orientation of the vehicle to be performed with regard to at least one target setting. Based on the orientation information, actuators for performing pitching-, rolling- and vertical movements of the chassis are controlled in order to orient the chassis in accordance with the orientation described by the orientation information. As a result of the control of the actuators based on the orientation information, a virtual shift of the rotation axes that occur due to the actual driving situation of the motor vehicle can be performed. Thus a braking process and/or steering intervention caused by actuators in a targeted manner allows achieving a virtual shift of the pitching-, rolling- and vertical axes of the chassis of the motor vehicle in order to compensate or at least reduce the drive-related longitudinal and/or transverse forces acting on the vehicle occupants. Hereby it is conceivable to reduce the forces acting in longitudinal and/or transverse direction on the vehicle occupants or example only to a certain degree. The reduction of the longitudinal and transverse forces acting on the vehicle occupants hereby does not have to be proportionally equal, so that for example the longitudinal forces acting on the vehicle occupants are reduced to a greater degree than the transverse forces acting on the vehicle occupants and vice versa. Depending on the circumstances, an increase of the drive related longitudinal and/or transverse forces acting on the vehicle occupants is also conceivable.
The method according to the invention can be performed independently or parallel to further driver assistance systems, which may influence individual pitching-, rolling- and vertical movements of the chassis, such as a driver assistance system for compensating unevenesses of the road surface.
Generally all explanations set forth in connection with the motor vehicle according to the invention also apply analogously for the method according to the invention.
Thus it is useful that the determined orientation information describes a trajectory, about which the chassis has to be moved in order to assume the orientation to be performed, and control demands to the actuators relating to pitching-, rolling- and vertical movements, which are required to move the chassis about the axis into the orientation to be performed.
Advantageously also a number of input parameters, which may also be referred to as boundary conditions, are taken into account for the determination of the orientation information. This includes for example an actual orientation of the chassis. It is also conceivable in addition or as an alternative to take actual acceleration values of the motor vehicle, in particular in longitudinal, transverse or vertical direction, steering angle and yaw angle into account for the determination of the orientation information.
Within the framework of the method according to the invention, the orientation information is used for controlling corresponding actuators for performing pitching-, rolling- and vertical movements of the chassis, i.e., for controlling actuators that are capable of causing the chassis to undergo pitching-, rolling- and vertical movements in order to cause a virtual shift of the rotation axes occurring as a result of the actual driving situation, i.e., in particular pitching-, rolling- and vertical axes, with the goal to compensate or at least reduce the drive-related longitudinal and/or transverse forces acting on the vehicle occupants. Actuators that may be used include for example actuators for height adjustment of the chassis or devices for height adjustment of the chassis, actuators for controlling at least one drive aggregate, actuators for controlling at least one braking device, actuators for controlling at least one steering device and actuators for controlling at least one driver assistance system for longitudinal and/or transverse guidance of the motor vehicle.
FIG. 1
FIG. 1
1
2
1
shows a schematic representation of a top view onto a motor vehicle according to an exemplary embodiment of the invention. serves in particular to define via which degrees of freedom the chassis of the motor vehicle can be moved by performing combined pitching-, rolling- and vertical movements.
FIG. 1
1
1
1
1
1
2
3
1
2
4
2
2
For this an orthogonal coordinate system is drawn into whose x-axis extends in the direction of the longitudinal axis of the motor vehicle , whose y-axis extends in the direction of the transverse axis of the motor vehicle and whose z-axis extends in the direction of the drawing plane of the motor vehicle . The center of the coordinate system in in the center of gravity of the motor vehicle . Pitching movements of the motor vehicle are rotations of the chassis about the y-axis (see double arrow ), rolling movements of the motor vehicle are rotations of the chassis about the x-axis (see double arrow ) and vertical movements of the chassis are translational movements of the chassis along the z-axis.
2
1
5
5
2
2
For preforming combined pitching-, rolling- and vertical movements of the chassis , the motor vehicle has appropriate actuators . Corresponding actuators for preforming pitching-, rolling- and vertical movements are for example actuators or devices for transverse and/or height adjustment of the chassis as part of an “active chassis” with which it is possible to change for example the spring mount of a spring damper element which forms a part of the wheel suspension and is referred to as shock absorber. Via a targeted adjustment for example of the spring mount of one or multiple spring damper elements, pitching-, rolling- and vertical movements can be introduced into the chassis in a targeted manner depending on at which spring damper element the corresponding spring mount adjustment occurs.
5
1
1
2
1
2
5
5
1
Corresponding actuators for causing pitching movements of the chassis are for example actuators which are configured for controlling a drive aggregate of the motor vehicle and/or braking devices of the motor vehicle . Controlling the drive aggregate in a targeted manner enables for example a targeted (virtual) shift of a pitching axis resulting from the actual driving situation, in x-direction and/or z-direction, about which pitching axis the chassis rotates due to the drive. Vice versa, a targeted control of the braking device of the motor vehicle during driving of the motor vehicle results in a negative acceleration (deceleration) of the motor vehicle , with which also a targeted (virtual) shift of a pitching axis resulting from the actual driving situation, about which pitching axis the chassis rotates due to the drive, in x-direction and/or z-direction, can be achieved. This requires a combined control of corresponding actuators as part of a so-called “active chassis” i.e., actuators that cause a height adjustment in the region of individual wheel suspensions of the motor vehicle . The (virtual) shift of the pitching axis given by the actual driving situation thus occurs in combination with pitching-, rolling- and vertical movements of the “active chassis”.
By controlling multiple drive aggregates in a targeted manner, which are distributed over the motor vehicle and which for example each are provided respectively for driving a defined vehicle wheel, and/or braking devices, which are for example provided for braking a defined vehicle wheel, a (virtual) shift of pitching- and rolling axes can be achieved via the actuators for controlling the drive aggregates or the braking devices of the motor vehicle.
5
2
2
1
1
Further actuators for performing pitching-, rolling- and vertical movements of the chassis , and with this for realizing the aforementioned (virtual) shift of corresponding rotation axes, about which the chassis rotates as a result of the drive, are actuators for controlling a steering device, which interacts with at least one steerable axle of the motor vehicle or actuators for controlling driver assistance systems for longitudinal and/or transverse guidance of the motor vehicle .
5
6
The actuators , which generally can be controlled individually, group-wise or simultaneously, are controlled via a control device , which communicates with the actuators via appropriate communication connections, such as a central vehicle bus (CAN-bus).
5
6
6
2
2
2
5
2
5
2
1
The control of the actuators via the control device occurs on the basis of an item of orientation information determined by the control device . The orientation information describes an orientation of the chassis to be performed starting from its actual orientation with regard to a target orientation of the chassis which corresponds to a target setting or target configuration of the chassis . The orientation information thus describes how and which actuators have to be controlled in order to bring the chassis from its actual orientation into the target orientation defined by the target setting via the (virtual) shifting of corresponding rotation axes such as nick- and/or rolling axes, based on the control of corresponding actuators . The target setting, which is taken into account in the determination of the orientation information, describes for example an orientation of the chassis that increases comfort of the vehicle occupants under the actual operating conditions of the motor vehicle .
5
6
5
The Increase of the comfort for the vehicle occupants is achieved in that the longitudinal and/or transverse forces acting on the vehicle occupants during the drive are compensated or at least reduced. Thus the actuators are controlled via the control device based on the orientation information so that the actuators compensate or at least reduce the longitudinal and/or transverse forces acting on the vehicle occupants during the drive. The reduction of the longitudinal and/or transverse forces acting on the vehicle occupants does hereby not have to be proportional so that for example the longitudinal forces acting on the vehicle occupants are reduced to a greater degree than the transverse forces acting on the vehicle occupants or vice versa.
2
2
The orientation information describes on one hand a trajectory T or an axis about which the chassis has to be moved in order to assume the orientation to be performed in order to reach the target setting. On the other hand the orientation information describes control commands to the actuators regarding the combined pitching-, rolling- and vertical movements about the trajectory T, which are required to actively move the chassis about the trajectory T into the orientation to be performed, i.e., from its actual orientation into the target orientation.
2
6
1
1
1
Beside the mentioned actual orientation of the chassis , the control device also takes actual operating parameters of the motor vehicle into account for the determination of the orientation information, such as actual acceleration values of the motor vehicle detected by appropriate sensors, in particular in longitudinal, transverse or vertical direction, actual steering angle, actual wheel angle of one of multiple vehicle wheels and actual yaw angle of the motor vehicle .
1
FIG. 2-5
In the following the principle according to the invention is described by way of an exemplary driving situation in which the motor vehicle moves along a curve of a road toward a stop sign, a traffic light or other obstacle, which requires braking of the motor vehicle (see also with associated description).
1
1
2
2
6
2
2
2
2
In response to recognizing the stop sign for example the driver or a longitudinally guiding system of the motor vehicle brakes the motor vehicle . The pitch movement induced by the braking or deceleration of the motor vehicle is to be overcompensated in this case, as is also the case for the slanted orientation of the chassis due to the curve drive. The orientation determination of the chassis determined via the control device describes thus a trajectory T about which the chassis has to be moved in order to achieve the target orientation of the chassis described by the orientation information. The target setting can correspond to a slanted position of the chassis relative to a horizontal plane, in order to overcompensate the nick- and rolling movement of the chassis caused by the braking or the curve drive and thereby compensate drive-related longitudinal forces acting on the vehicle occupants and in this way increase the comfort of the vehicle occupants.
6
5
2
1
1
Based on the orientation information, the control device controls appropriate actuators , i.e., in the present case for example the drive aggregate and corresponding height-adjustable components of shock absorbers, which are assigned to respective vehicle wheels, in order to achieve a virtual shift of the pitch axis of the chassis resulting from the drive. Thus the motor vehicle can be slightly accelerated via a control of the drive aggregate to achieve a shift of the pitch axis, wherein overall it is of course still ensured that the motor vehicle brakes with regard to the obstacle ahead.
2
1
Likewise, a height adjustment of the chassis occurs via a control of the devices for height adjustment of the height adjustable components of the shock absorber, for example on the driver side of the motor vehicle , in order to overcompensate the rolling movements with the goal to compensate the drive-related transverse forces acting on the vehicle occupants.
2
2
2
For this a simultaneous control of other devices for height-compensation of the height-adjustable components of further shock absorbers occurs in order to additionally compensate vertical movements into the chassis , which serve for compensating or smoothening all movements induced into the chassis and thereby make these movements almost imperceptible for the vehicle occupants. As a result of the simultaneously performed vertical movements of the chassis it is in particular also possible to compensate possible unevenesses of the road surface.
FIGS. 2-5
FIGS. 2-5
FIGS. 2-4
1
1
1
1
7
2
1
respectively show schematic representations of a motor vehicle according to exemplary embodiments of the invention. illustrate which trajectories T respectively described by the orientation information can be present depending on different operating conditions or driving situations of the motor vehicle . Based on , two exemplary driving situations of the motor vehicle , which is here shown in a perspective rear view, are first illustrated. The motor vehicle moves in the direction of the arrow . The chassis of the motor vehicle is regarded as rigid body.
FIG. 2
1
7
1
1
2
1
2
2
8
7
2
According to the motor vehicle moves according to arrow toward an obstacle, such as a red traffic light. The driver or a driver assistance system for longitudinal guidance of the motor vehicle brakes the motor vehicle . As a result of the deceleration the also schematically shown chassis of the motor vehicle is lowered, i.e., in the region of the front axle, and is raised in the rear, i.e., in the region of the rear axle. The change of the orientation of the chassis relative to is neutral position corresponds to a rotation of the chassis about the y-axis illustrated by the double arrow , in the direction of the arrow , and with this to a frontward pitch movement of the chassis .
2
2
5
2
8
7
2
1
2
2
In order to realize a compensation of the described pitch movement of the chassis the orientation information describes a trajectory T, about which the chassis has to be rotated by controlling corresponding actuators , in order to compensate the longitudinal forces acting on the vehicle occupants due to the deceleration. Correspondingly a rotation of the chassis also about the y-axis opposite to the direction of the double arrow in the opposite direction of the arrow has to be effected. A pitch movement, which is opposite to the pitch movement caused by the deceleration has to be induced into the chassis . This can for example be accomplished by an appropriate upward adjustment of the spring mount of the shock absorber of the front axle, so that the motor vehicle is raised in the region of the front axle. The rotation of the chassis described by the orientation information corresponds in its value not the rotation of the chassis caused by the deceleration but exceeds it. Hereby the trajectory T descried by the orientation information is situated exactly in the y-axis or coincides with the y-axis. The vertical position of the y-axis is here for example the waist height of a vehicle occupant.
1
5
1
2
FIG. 3
Depending on the respective target setting, which as mentioned relates to an increase of the vehicle occupant comfort based on the compensation of longitudinal and/or transverse forces acting on the vehicle occupants, the trajectory T can also have a different vertical position above the y-axis, i.e., it can be shifted in the direction of the z-axis relative to the origin of the coordinate system which lies in the center of gravity of the motor vehicle , and thus may for example be located in the region of the head of a vehicle occupant (see ). In order to realize this by means of the actuators , for example a control of the drive aggregate is conceivable which carries out a temporary short acceleration of the motor vehicle , due to which the chassis is lifted in the region of the front axle.
2
1
1
FIG. 3
It is noted in this context that the trajectory T descried by the orientation information does not strictly have to be located within the chassis . The trajectory T can also be located in peripheral regions of the motor vehicle , i.e., within the front or rear bumper or even completely outside, i.e., positioned behind the motor vehicle by a defined distance (see ).
FIG. 4
1
7
1
2
2
2
5
2
8
1
2
2
5
2
According to the motor vehicle moves in the driving direction indicated by the arrow through a left curve. Due to the centripetal forces acting on the moving motor vehicle the chassis , which is regarded as rigid body, tilts outwardly, which corresponds to a rotation of the chassis about the x-axis and thus corresponds to a rolling movement. Correspondingly a trajectory T, which is located in the x-axis, is determined on the basis of the orientation information and the rotation axis of the chassis resulting from the drive is shifted via a control of corresponding actuators so that the rotation axis coincides with the trajectory T. Correspondingly a rotation of the chassis towards the left (see double arrow ) is caused so that the outward tilt of the motor vehicle caused by the centripetal forces is overcompensated by a rotation of the chassis about the x-axis toward the left, i.e., the rolling movement of the chassis caused by the shifting of the axis is greater than the original rolling movement resulting from the drive. For this, i.e., in order to realize a corresponding shift of the rolling axis, for example actuators situated on the co-driver's side for height adjustment of the chassis , can be controlled, i.e., in particular a height adjustment of the spring mount of the shock absorber arranged on the co-drivers side.
The reduction of the longitudinal forces and transverse forces acting on the vehicle occupants that can be accomplished hereby does not have to be proportional, so that for example the longitudinal forces acting on the vehicle occupants are reduced to a greater degree than the transverse forces acting on the vehicle occupants.
FIG. 5
FIGS. 2-4
1
1
2
1
shows a representation, which illustrates the principle of the invention particularly well. The motor vehicle is in a driving situation, which is a combination of the driving situations shown in . The motor vehicle thus moves in a left curve toward an obstacle such as a red traffic light. The chassis thus undergoes an outward tilting about the x-axis, i.e., a rolling movement, and due to the deceleration in response to the obstacle ahead of the motor vehicle a frontward tilting about the y-axis, i.e. a pitching movement.
FIGS. 2-4
2
The resulting trajectory T described by the orientation information is correspondingly formed by an addition or combination of the trajectories T shown in and extends obliquely through the chassis .
2
The trajectory T includes consequently a portion in order to overcompensate the rolling movement of the chassis caused by the curve drive, and a portion to overcompensate the pitching movement caused by the deceleration.
5
2
2
5
2
1
In other words a targeted (virtual) shifting of the rotation axes resulting from the drive is realized by controlling corresponding actuators , so that the chassis rotates about the trajectory T which leads to an overcompensation of the rolling- and pitching movement of the chassis caused by the curve drive and deceleration. On the basis of the orientation information control commands to appropriate actuators are determined via which thus for example on the side of the co-driver a height adjustment of the spring mount of the shock absorber occurs. In order to overcompensate the rolling movement of the chassis caused by the curve drive via a corresponding active shift of the rotation axes, i.e., to exceed the value of the rolling movement, a targeted steering intervention in correspondingly opposite direction can also be realized based on the orientation information via the control of actuators that interact with the steering wheel. Of course the steering intervention is such that the motor vehicle does not drive off the road and stays within its lane. This can for example be ensured via likewise active appropriate driver assistance systems.
2
2
At the same time the drive aggregate can be actively controlled, in order to overcompensate the mentioned shifting of the rotation axes or rotation movements of eh chassis that are present due to the drive, which additionally or alternatively can also be caused by an adjustment of the spring mount of shock absorbers assigned to the front axle, which leads to raising of the chassis in the region of the front axle.
6
5
1
2
2
2
2
2
1
Thus based on the orientation information determined by the control device and the targeted control of actuators of the motor vehicle based thereon, the motor vehicle or the chassis undergoes targeted introduced combined pitching-, rolling- and vertical movements, i.e., rotation movements about the trajectory T, which is based on a virtual shifting of the actual rotation axis of the chassis occurring as a result of the drive, in correspondence with the orientation information in x- and y-axis and also z-axis. The chassis can thus be moved in a great number of degrees of freedom, in order to overcompensate the movements resulting from the actual driving situation and introduced into the chassis , with regard to the target setting, which in particular describes an orientation of the chassis that relates to an increase of the vehicle occupant comfort by a targeted compensation of the longitudinal and transverse forces acting on the vehicle occupants under the actual operating conditions of the motor vehicle .
Further advantages, features and details of the invention will become apparent form the exemplary embodiments described below and from the drawings. It is shown in
FIG. 1
a schematic representation of a top view onto a motor vehicle according to an exemplary embodiment of the invention; and
FIGS. 2-5
respectively, schematic representations of a motor vehicle according to an exemplary embedment of the invention. | |
Avoiding Holiday Overwhelm
Now we are into December, and the holiday season is officially underway. How can you help you and your quirky kids focus on the enjoyment and minimize the overwhelm that can come with this time of year?
Self Care
The first step begins with parents because if you run out of positive energy, you have nothing to give your children. This might mean different things for different people. In general, I recommend that people keep doing all the things they normally do to help themselves manage stress. If you exercise a few times a week, stick with it. This is when you need it most. If you need eight or more hours of sleep a night (as I do), make that a priority. The same goes for regular meals, and so forth. When you try to keep up your healthy habits, you will set a good example, and likely you will set a good framework for your family.
Maintain Children’s Routines
Most children with ADHD, learning disabilities or Asperger Syndrome do best when they live in a predictable routine. The holidays are full of special occasions that interfere with the routine. Of course, you will want to make some choices—don’t be a total Grinch about this, but consider what changes from routine your child can handle. Mix the joy with the routine. This will help avoid meltdowns due to being over-tired or over-stimulated.
First and foremost routine for children means regular meals and enough sleep. Along with that go time for homework and time to relax at home. Like adults many children really need some down time. You probably know what that looks like for your child. It could be time watching television or playing a video game. For others it could be time to read or just to play quietly. Be aware that if these times disappear for days on end, you could be headed for a meltdown.
Let Your Children in on the Plans
Once you make some decisions about changes in routine, be sure to let your children know. For instance, you’ve decided that the whole family will go to your middle school child’s chorus concert, and this means that the fifth grader will miss his guitar lesson. Be sure he is in on the plan. And if he objects, consider some way to sweeten the deal for him. Some children get anxious about changes in routine even when they very much want to go to the special event. As much as possible let your children know ahead of time about changes to routine so that they have time to and you know how they feel about the circumstances.
Find Out What’s Important
I have been amazed at how very young children will remember events from a year ago very clearly. They may believe that what they remember is the essence of the holiday. It is likely that you do not remember these details. It’s worth finding out what your children look forward to in the holiday. Is it a special food you make or a concert you go to? Perhaps it is a gathering with extended family. You might find out that one child has his heart set on an event that won’t happen this year: Uncle Charlie is going to your cousins’ for the holiday. You can’t change Uncle Charlie’s plans, but it will help if your child knows ahead of time that he won’t see him this year.
Enjoy!
The best holidays happen when all can join in happily. This can mean skipping a community event in order to have time home as a family. After all, aren’t we all looking for moments of connection at the holidays? If you program for it, it is more likely to happen. | https://drcarolynstone.com/avoiding-holiday-overwhelm/ |
BACKGROUND
The currently claimed embodiments of the present invention relate to superconducting quantum mechanical devices, and more specifically, to a quantum-mechanical photon-pair generator.
Single photon generators can be very useful in a variety of quantum information processing applications such as, for example, quantum cryptography, quantum communication, and quantum computing with photons. Superconducting qubits can be used under certain conditions as single-microwave-photon generators. For example, superconducting qubits can be excited to their first excited state and then stimulated on demand to emit their excitation in the form of a microwave photon into a resonator or a transmission line.
In order to construct a non-degenerate parametric device (the Josephson parametric converter (JPC)), which is capable of amplifying and/or mixing microwave signals at the quantum limit, a Josephson ring modulator (JRM) is incorporated into two microwave resonators at an rf-current anti-node of their fundamental eigenmodes. The Josephson ring modulator (JRM) is a nonlinear dispersive element based on Josephson tunnel junctions that can perform three-wave mixing of microwave signals at the quantum limit. The JRM has four nominally identical Josephson junctions arranged in Wheatstone-like bridge configuration. The performance of the JPC including power gain, dynamical bandwidth, and dynamic range, are strongly dependent on the critical current of the Josephson junction of the JRM, the specific realization of the electromagnetic environment (i.e. the microwave resonators), and the coupling between the JRM and the resonators. However, the JPC couples the JRM to only two resonators.
SUMMARY
An aspect of the present invention is to provide a quantum-mechanical photon-pair generator including a first Josephson junction, a second Josephson junction electrically connected to the first Josephson junction, a third Josephson junction electrically connected to the second Josephson junction and a fourth Josephson junction electrically connected to the third Josephson junction and the first Josephson junction such that the first, second, third and fourth Josephson junctions are connected in a bridge circuit having a first resonance eigenmode, a second resonance eigenmode and a third resonance eigenmode. The quantum-mechanical photon-pair generator further includes a source of magnetic flux arranged proximate the bridge circuit, the source of magnetic flux is configured to provide, during operation, a magnetic flux through the bridge circuit to cause coupling between the first, second and third resonance eigenmodes when the third resonance eigenmode is excited. The quantum-mechanical photon-pair generator also includes a first electromagnetic resonator electrically connected to the first and fourth Josephson junctions at a first node therebetween and to the second and third Josephson junctions at a second node therebetween; a second electromagnetic resonator electrically connected to the first and second Josephson junctions at a third node therebetween and to the third and fourth Josephson junctions at a fourth node therebetween; and a third microwave resonator connected to the first and fourth Josephson junctions at the first node therebetween and to the second and third Josephson junctions at the second node therebetween. The first electromagnetic resonator has an eigenmode in resonance with the first resonance eigenmode of the bridge circuit. The second electromagnetic resonator has an eigenmode in resonance with the second resonance eigenmode of the bridge circuit. The third electromagnetic resonator has an eigenmode in resonance with the third resonance eigenmode of the bridge circuit. The third frequency of the third resonance eigenmode is equal to a sum of a first frequency of the first resonance eigenmode plus a second frequency of the second resonance eigenmode such that, during operation, a photon having the third frequency is split into two quantum-mechanically entangled photons having the first and second frequencies, respectively.
In an embodiment, the first electromagnetic resonator, the second electromagnetic resonator and the third electromagnetic resonator are microwave resonators. In an embodiment, the first frequency of the first resonance eigenmode, the second frequency of the second resonance eigenmode, and the third frequency of the third resonance eigenmode are in the microwave frequency range.
c
c
c
c
a
b
In an embodiment, the quantum-mechanical photon-pair generator further includes a first capacitor (C) connected in parallel with the first Josephson junction; a second capacitor (C) connected in parallel with the second Josephson junction; a third capacitor (C) connected in parallel with the third Josephson Junction; and a fourth capacitor (C) connected in parallel with the fourth Josephson junction. In an embodiment, the quantum-mechanical photon-pair generator further includes a fifth capacitor (C) connected in parallel with the bridge circuit at the first node and the second node of the bridge circuit; and a sixth capacitor (C) connected in parallel with the bridge circuit at the third node and the fourth node of the bridge circuit.
a
b
a
b
In an embodiment, the first frequency and the second frequency depend on capacitance values of the fifth capacitor (C) and the sixth capacitor (C) and the first frequency and the second frequency are selected by selecting capacitance values of the fifth capacitor (C) and the sixth capacitor (C), respectively. In an embodiment, a capacitance value of the first capacitor, a capacitance value of the second capacitor, a capacitance value of the third capacitor, and a capacitance value of the fourth capacitor are selected so that the third frequency of the third resonance eigenmode is equal to the sum of the first frequency of the first resonance eigenmode plus the second frequency of the second resonance eigenmode.
cc
ca
cb
cc
In an embodiment, the quantum-mechanical photon-pair generator further includes a seventh capacitor (C) connected to a third resonator feedline coupled to the third resonator and to the first node of the bridge circuit; an eighth capacitor (C) connected to a first resonator feedline coupled to the first resonator and to the first node of the bridge circuit; a ninth capacitor (C) connected to a second resonator feedline coupled to the second resonator and to the third node of the bridge circuit; and a tenth capacitor (C) connected to a third resonator feedline coupled to the third resonator and to the second node of the bridge circuit. The seventh, eighth, ninth and tenth capacitors are selected to satisfy a frequency hierarchy conduction such that: a coupling constant between the first, the second and third eigenmodes is less than decay rates of the first and second eigenmodes to corresponding external feedlines, and the coupling constant between the first, the second and third eigenmodes is greater than a decay rate of the third eigenmode to a corresponding external feedline.
0
In an embodiment, the first, second and third microwave resonators are coplanar strip-line resonators or micro-strip resonators. In an embodiment, the first, second and third microwave resonators are compact lumped-element resonators or three-dimensional cavities. In an embodiment, the source of magnetic flux is a current-carrying element to provide an electromagnetic source of magnetic flux that flux-biases the bridge circuit. In an embodiment, the source of magnetic flux is a magnetic material to provide an electromagnetic source of magnetic flux that flux-biases the bridge circuit. In an embodiment, the source of magnetic flux provides a half of flux quantum (φ/2). In an embodiment, the first frequency, the second frequency and the third frequency are in the microwave frequency range.
c
c
c
c
a
b
Another aspect of the present invention is to provide a quantum-mechanical non-linear circuit including a first Josephson junction; a second Josephson junction electrically connected to the first Josephson junction; a third Josephson junction electrically connected to the second Josephson junction; and a fourth Josephson junction electrically connected to the third Josephson junction and the first Josephson junction, such that the first, second, third and fourth Josephson junctions are connected in a bridge circuit. The quantum-mechanical non-linear circuit further includes a first capacitor (C) connected in parallel with the first Josephson junction; a second capacitor (C) connected in parallel with the second Josephson junction; a third capacitor (C) connected in parallel with the third Josephson Junction; a fourth capacitor (C) connected in parallel with the fourth Josephson junction; a fifth capacitor (C) connected in parallel with the bridge circuit at a first node between the first Josephson junction and the fourth Josephson junction and a second node between the second Josephson junction and the third Josephson junction; and a sixth capacitor (C) connected in parallel with the bridge circuit at the third node between the first Josephson junction and the second Josephson junction and a fourth node between the third Josephson junction and the fourth Josephson junction. The quantum-mechanical non-linear circuit has a first resonance eigenmode, a second resonance eigenmode and a third resonance eigenmode. The third frequency of the third resonance eigenmode is equal to a sum of a first frequency of the first resonance eigenmode plus a second frequency of the second resonance eigenmode such that, during operation, a photon having the third frequency is split into two quantum-mechanically entangled photons having the first and second frequencies, respectively.
a
b
a
b
In an embodiment, when in operation, the first resonance eigenmode, the second resonance eigenmode and the third resonance eigenmode are coupled by applying a magnetic field to generate a magnetic flux through the bridge circuit when the third resonance eigenmode is excited. In an embodiment, the first frequency and the second frequency depend on capacitance values of the fifth capacitor (C) and the sixth capacitor (C), respectively, and the first frequency and the second frequency are selected by selecting capacitance values of the fifth capacitor (C) and the sixth capacitor (C), respectively. In an embodiment, a capacitance value of the first capacitor, a capacitance value of the second capacitor, a capacitance value of the third capacitor, and a capacitance value of the fourth capacitor are selected so that the third frequency of the third resonance eigenmode is equal to the sum of the first frequency of the first resonance eigenmode plus the second frequency of the second resonance eigenmode.
cc
ca
a
cb
b
cc
In an embodiment, the quantum-mechanical non-linear circuit further includes a seventh capacitor (C) connected to the first node of the bridge circuit; an eight capacitor (C) connected to the first node of the bridge circuit and to the fifth capacitor (C); a ninth capacitor (C) connected to the third node of the bridge circuit and to the sixth capacitor (C); and a tenth capacitor (C) connected to the second node of the bridge circuit. The seventh, eighth, ninth and tenth capacitors are selected to satisfy a frequency hierarchy conduction such that: a coupling constant between the first, the second and third eigenmodes is less than decay rates of the first and second eigenmodes to corresponding external feedlines, and the coupling constant between the first, the second and third eigenmodes is greater than a decay rate of the third eigenmode to a corresponding external feedline.
Another aspect of the present invention is to provide a method for generating a quantum-mechanical entangled photon-pair. The method includes inputting an electromagnetic wave at a third frequency into a quantum-mechanical non-linear circuit having a first resonance eigenmode, a second resonance eigenmode and a third resonance eigenmode, the third frequency corresponding to a frequency of the third eigenmode; and applying a magnetic field to generate a magnetic flux in the quantum-mechanical non-linear circuit to couple the first eigenmode, the second eigenmode and the third eigenmode such that, a photon having the third frequency is split into two quantum-mechanically entangled photons having a first frequency of the first eigenmode and a second frequency of the second eigenmode, respectively, the third frequency being equal to a sum of the first frequency plus the second frequency.
In an embodiment, the method further includes selecting the first frequency and the second frequency by selecting capacitance values of first capacitors in the quantum-mechanical non-linear circuit. In an embodiment, the method further includes selecting capacitance values of second capacitors in the quantum-mechanical non-linear circuit so that the third frequency of the third resonance eigenmode is equal to the sum of the first frequency of the first resonance eigenmode plus the second frequency of the second resonance eigenmode. In an embodiment, the method further includes selecting capacitance values of third capacitors in the quantum-mechanical non-linear circuit so as to satisfy a frequency hierarchy conduction such that a coupling constant between the first, the second and third eigenmodes is less than a decay rate of the first eigenmode to a corresponding external feedline and a decay rate of the second eigenmode to a corresponding external feedline, and the coupling constant between the first, the second and third eigenmodes is greater than a decay rate of the third eigenmode to a corresponding external feedline.
The present quantum-mechanical photon-pair generator is based on coupling a bridge circuit to three electromagnetic resonators. quantum-mechanical photon-pair generator is configured to down-convert a higher frequency photon entering one port of the generator into a pair of quantum-mechanical entangled photons having lower frequencies. The pair of quantum-mechanical entangled photons are generated on-demand and thus can be useful in remote quantum-mechanical entanglement of superconducting qubits, quantum communication, quantum cryptography, etc.
BRIEF DESCRIPTION OF THE DRAWINGS
Concepts of the present invention, as well as methods of operation and functions of related elements of structure and combinations of parts and economies of manufacture, will become more apparent upon consideration of the following description and the appended claims with reference to the accompanying drawings, all of which form a part of this specification, wherein like reference numerals designate corresponding parts in the various figures. It is to be expressly understood, however, that the drawings are for the purpose of illustration and description only and are not intended as a definition of the limits of the invention.
FIG. 1
is a schematic diagram of a quantum-mechanical photon-pair generator, according to an embodiment of the present invention;
FIG. 2A-2C
are schematic diagrams of a bridge circuit having a first resonance eigenmode, a second resonance eigenmode and a third resonance eigenmode, according to an embodiment of the present invention;
FIGS. 3A-3C
are circuit diagrams corresponding to the various modes (first resonance eigenmode, second resonance eigenmode, and third resonance eigenmode) and associated resonance frequencies, according to an embodiment of the present invention; and
FIG. 4
is a flow diagram of a method for generating a quantum-mechanical entangled photon-pair, according to an embodiment of the present invention.
DETAILED DESCRIPTION
FIG. 1
100
100
102
104
102
100
106
104
108
106
102
102
104
106
108
110
is a schematic diagram of a quantum-mechanical photon-pair generator , according to an embodiment of the present invention. The quantum-mechanical photon-pair generator includes a first Josephson junction , and a second Josephson junction electrically connected to the first Josephson junction . The quantum-mechanical photon-pair generator also includes a third Josephson junction electrically connected to the second Josephson junction and a fourth Josephson junction electrically connected to the third Josephson junction and the first Josephson junction such that the first Josephson junction , the second Josephson junction , the third Josephson Junction , and the fourth Josephson junction are connected in a bridge circuit having a first resonance eigenmode (X-mode), a second resonance eigenmode (Y-mode) and a third resonance eigenmode (Z-mode).
The term “bridge circuit” as used in this specification is intended to refer to a circuit that has at least four Josephson junctions connected similar to the arrangement of resistors in a Wheatstone bridge circuit. However, the “bridge circuit” as used herein is a quantum mechanical circuit, not a classical electrical circuit.
FIGS. 2A-2C
FIGS. 2A-2C
FIG. 2A
FIG. 2B
FIG. 2C
110
110
110
110
110
110
show a bridge circuit having a first resonance eigenmode, a second resonance eigenmode and a third resonance eigenmode, according to an embodiment of the present invention. show the rf voltage polarity on the bridge nodes corresponding to the first, second, and third eigenmodes. shows the bridge circuit operating in the first eigenmode (X-mode). shows the bridge circuit operating in the second eigenmode (Y-mode). shows the bridge circuit operating in the third eigenmode (Z-mode). In some embodiments, the first, second and third eigenmodes are mutually orthogonal to each other. The bridge circuit which can be a Josephson Ring Modulator (JRM) in some embodiments is a nonlinear dispersive circuit based on Josephson tunnel junctions (e.g., four Josephson junctions) that can perform three-wave mixing of electromagnetic signals (e.g., microwave signals) at the quantum limit. However, the broad concepts of the current invention are not limited to only four Josephson junctions. Additional Josephson junction could be included on one or more of the legs of the bridge circuit according to some embodiments.
100
112
110
112
110
The quantum-mechanical photon-pair generator also includes a source of magnetic flux arranged proximate the bridge circuit . The source of magnetic flux is configured to provide, during operation, a magnetic flux through the bridge circuit to cause coupling between the first resonance eigenmode (X-mode), the second resonance eigenmode (Y-mode) and the third resonance eigenmode (Z-mode) when the third resonance eigenmode (Z-mode) is excited.
112
110
112
110
112
0
In an embodiment, the source of magnetic flux is a current-carrying element to provide an electromagnetic source of magnetic flux that flux-biases the bridge circuit . In an embodiment, the source of magnetic flux is a magnetic material to provide an electromagnetic source of magnetic flux that flux-biases the bridge circuit . In an embodiment, the source of magnetic flux provides a half of flux quantum ((φ/2).
100
114
102
108
1
104
106
2
100
116
102
104
3
106
108
4
100
118
102
108
1
104
106
2
114
116
118
114
116
118
114
116
118
114
116
118
114
116
118
114
116
118
FIG. 1
FIG. 3A
FIG. 3B
FIG. 3C
The quantum-mechanical photon-pair generator further includes a first electromagnetic resonator electrically connected to the first Josephson junction and fourth Josephson junction at a first node therebetween and to the second Josephson junction and third Josephson junction at a second node therebetween. The quantum-mechanical photon-pair generator also includes a second electromagnetic resonator electrically connected to the first Josephson junction and the second Josephson junction at a third node therebetween and to the third Josephson junction and the fourth Josephson junction at a fourth node therebetween. The quantum-mechanical photon-pair generator also includes a third electromagnetic resonator connected to the first Josephson junction and the fourth Josephson junction at the first node therebetween and to the second Josephson junction and the third Josephson junction at the second node therebetween. In , for purposes of illustration, the reference numerals , and corresponding to the first, second and third resonators are shown generally pointing to respective external resonator feedlines A, A and A that are coupled to the first electromagnetic resonator , the second electromagnetic resonator and the third electromagnetic resonator . These resonator feedlines A, A and A carry the input and output signals into and out of the respective resonators. However, as it is understood, the first, second and third electromagnetic resonators , and include other elements. For example, the first electromagnetic resonator is represented in by the corresponding mode it generates, the second electromagnetic resonator is represented in by the corresponding mode it generates, and the third resonator is represented in by the corresponding mode it generates, as will be explained further in the following paragraphs.
114
116
118
In an embodiment, the first, second and third electromagnetic resonators , and are coplanar strip-line resonators, micro-strip resonators, lumped-element resonators or three-dimensional cavities.
114
110
116
110
118
110
P
S
I
P
S
I
S
I
P
S
I
P
The first electromagnetic resonator has an eigenmode in resonance with the first resonance eigenmode (X-mode) of the bridge circuit . The second electromagnetic resonator has an eigenmode in resonance with the second resonance eigenmode (Y-mode) of the bridge circuit . The third electromagnetic resonator has an eigenmode in resonance with the third resonance eigenmode (Z-mode) of the bridge circuit . The third frequency fof the third resonance eigenmode (Z-mode) is equal to a sum of a first frequency fof the first resonance eigenmode plus a second frequency fof the second resonance eigenmode such that, during operation, a photon having the third frequency fis split into two quantum-mechanically entangled photons having the first frequency fand the second frequency f, respectively. The first frequency fis sometimes referred to as the signal frequency, the second frequency fis sometimes referred to as the idler frequency, and the third frequency fis sometimes referred to as the pump frequency. In an embodiment, the first frequency f, the second frequency fand the third frequency fare in the microwave frequency range, for example.
114
116
118
114
116
118
In an embodiment, the first electromagnetic resonator , the second electromagnetic resonator and the third electromagnetic resonator are microwave resonators operating in the microwave frequency range. However, as it must be appreciated, the first electromagnetic resonator , the second electromagnetic resonator and the third electromagnetic resonator can also be configured to operate in another frequency range, for example, below or above the microwave frequency range.
100
122
102
124
104
100
126
106
128
108
102
104
106
108
102
104
106
108
102
104
106
108
102
104
106
108
102
104
106
108
c
c
c
c
c
In an embodiment, the quantum-mechanical photon-pair generator further includes a first capacitor (C) connected in parallel with the first Josephson junction , and a second capacitor (C) connected in parallel with the second Josephson junction . In an embodiment, the quantum-mechanical photon-pair generator also includes a third capacitor (C) connected in parallel with the third Josephson Junction , and a fourth capacitor (C) connected in parallel with the fourth Josephson junction . Although one capacitor is shown connected in parallel with each of the Josephson junctions , , and , two or more capacitors can also be connected in parallel with each of the Josephson junctions , , and . For example, the two or more capacitors can be connected in series or in parallel, or both and then connected as whole in parallel with each of the Josephson junctions , , and . In addition, although the capacitors , , and are shown as having a same capacitance C, the capacitors , , and can also have different capacitances and/or each have a different number of capacitors.
100
132
110
1
2
110
134
110
3
4
110
132
134
132
134
a
b
FIG. 1
In an embodiment, the quantum-mechanical photon-pair generator further includes a fifth capacitor (C) connected in parallel with the bridge circuit at the first node and the second node of the bridge circuit , and a sixth capacitor (C) connected in parallel with the bridge circuit at the third node and the fourth node of the bridge circuit . Although the capacitors and are shown in as single capacitors, two or more capacitors can also be used instead of a single capacitor. For example, the two or more capacitors can be connected in series or in parallel, or both and as whole be used as capacitor or capacitor .
S
I
a
b
S
I
a
b
132
134
132
134
In an embodiment, the first frequency fand the second frequency fdepend on capacitance values of the fifth capacitor (C) and the sixth capacitor (C) . In an embodiment, the first frequency fand the second frequency fare selected by selecting capacitance values of the fifth capacitor (C) and the sixth capacitor (C) , respectively.
122
124
126
128
P
I
In an embodiment, a capacitance value of the first capacitor , a capacitance value of the second capacitor , a capacitance value of the third capacitor , and a capacitance value of the fourth capacitor are selected so that the third frequency fof the third resonance eigenmode is equal to the sum of the first frequency of the first resonance eigenmode plus the second frequency fof the second resonance eigenmode.
FIGS. 3A-3C
S
I
P
show the circuits corresponding to the various modes (first resonance eigenmode, second resonance eigenmode, and third resonance eigenmode) and their associated resonance frequencies, according to an embodiment of the present invention. For example, the first frequency of the first resonance mode f, the second frequency fof the second resonance mode, and the third frequency fof the third resonance mode can be expressed as follows:
<math overflow="scroll"><mtable><mtr><mtd><mrow><msub><mi>f</mi><mi>s</mi></msub><mo>=</mo><mfrac><mn>1</mn><mrow><mn>2</mn><mo>⁢</mo><mi>π</mi><mo>⁢</mo><msqrt><mrow><msub><mi>L</mi><mi>j</mi></msub><mo>⁡</mo><mrow><mo>(</mo><mrow><msub><mi>C</mi><mi>c</mi></msub><mo>+</mo><msub><mi>C</mi><mi>a</mi></msub></mrow><mo>)</mo></mrow></mrow></msqrt></mrow></mfrac></mrow></mtd><mtd><mrow><mo>(</mo><mn>1</mn><mo>)</mo></mrow></mtd></mtr><mtr><mtd><mrow><msub><mi>f</mi><mi>I</mi></msub><mo>=</mo><mfrac><mn>1</mn><mrow><mn>2</mn><mo>⁢</mo><mi>π</mi><mo>⁢</mo><msqrt><mrow><msub><mi>L</mi><mi>j</mi></msub><mo>⁡</mo><mrow><mo>(</mo><mrow><msub><mi>C</mi><mi>c</mi></msub><mo>+</mo><msub><mi>C</mi><mi>b</mi></msub></mrow><mo>)</mo></mrow></mrow></msqrt></mrow></mfrac></mrow></mtd><mtd><mrow><mo>(</mo><mn>2</mn><mo>)</mo></mrow></mtd></mtr><mtr><mtd><mrow><msub><mi>f</mi><mi>P</mi></msub><mo>=</mo><mfrac><mn>1</mn><mrow><mn>2</mn><mo>⁢</mo><mi>π</mi><mo>⁢</mo><msqrt><mrow><msub><mi>L</mi><mi>j</mi></msub><mo>⁢</mo><msub><mi>C</mi><mi>c</mi></msub></mrow></msqrt></mrow></mfrac></mrow></mtd><mtd><mrow><mo>(</mo><mn>3</mn><mo>)</mo></mrow></mtd></mtr></mtable></math>
j
j
cc
ca
cb
S
I
P
a
b
c
110
where Lis the inductance of each of the Josephson junctions. In equations (1), (2) and (3), the inductances Lof the Josephson junctions are assumed to be equal. In addition, in equations (1), (2) and (3), the coupling capacitors C, Cand Care ignored for simplicity. They do affect the resonance frequencies to a limited degree, but their effect can be taken into account using common microwave simulation tools. Their main purpose is to couple the different external ports to the corresponding three electromagnetic resonators that include the bridge circuit . As shown in equations, (1), (2) and (3), the frequencies f, f, and f, are inversely proportional to the square root of the capacitances C, C, and C. Therefore, increasing the capacitances will decrease the respective frequencies.
j
3
j
S
I
a
b
a
b
c
P
I
S
100
132
134
132
134
122
124
16
128
In an embodiment, the inductance Lis selected such that the quantum-mechanical photon-pair generator acts as a quantum mechanical device with discrete energy levels that can work at the single photon levels and which increases the coupling constant gbetween the modes. In an embodiment, the inductance Lis selected to be in the range between 5 nH and 30 nH. Given the desired frequencies fand f, one can find the appropriate capacitance values Cand Cof the capacitors and , respectively, which yield these frequencies. In an embodiment, the capacitance values Cand Cof the capacitors and , respectively are selected in the range between 10 fF and 1 pF. The capacitance value Cof the first, second, third and fourth capacitors , , and are selected so that the condition f=f+fis satisfied.
100
142
118
1
110
100
144
114
1
110
100
146
116
3
110
100
143
118
118
118
143
118
118
2
110
143
1
2
cc
ca
cb
cc
cc
cc
In an embodiment, the quantum-mechanical photon-pair generator also includes a seventh capacitor (C) connected to the third resonator feedline A and to the first node of the bridge circuit . In an embodiment, the quantum-mechanical photon-pair generator further includes an eighth capacitor (C) connected to the first resonator feedline A and to the first node of the bridge circuit . In an embodiment, the quantum-mechanical photon-pair generator also includes a ninth capacitor (C) connected to the second resonator feedline A and to the third node of the bridge circuit . In an embodiment, the quantum-mechanical photon-pair generator also includes a tenth capacitor (C) that couples the third resonator feedline A and 180-degree hybrid line B to the third resonator corresponding to the third eigenmode. The tenth capacitor (C) is connected to the third resonator feedline A, to the 180-degree hybrid line B, and to the second node of the bridge circuit . In an embodiment, the tenth capacitor (C) is provided so as to keep a symmetry with respect to nodes and when exciting the third mode (common mode).
cc
ca
cb
142
144
146
3
S
I
3
I
S
1. a coupling constant between the first, the second and the third eigenmodes gis less than decay rates γand γof the first and second eigenmodes, respectively, to corresponding external feedlines (g<γ˜γ); and
3
P
3
P
2. the coupling constant between the first, the second and the third eigenmodes gis greater than a decay rate γof the third eigenmode to a corresponding external feedline (g>γ).
In an embodiment, the seventh capacitor (C) , the eighth capacitor (C) , and the ninth capacitor (C) are selected to satisfy a frequency hierarchy conduction such that:
0
Critical current of the Josephson junctions I=40 nA.
j0
0
0
Inductance of the Josephson junction at zero flux bias L=Φ/I=8 nH.
j
0
0
Inductance of the Josephson junction at half flux quantum L=√{square root over (2)}Φ/I=11.3 nH.
112
ext
0
Magnetic flux generated by the source of magnetic flux , Φ=Φ/2.
s
f=5 GHz.
I
f=6 GHz.
a
s
C=72 fF (selected knowing the desired output photon frequency f).
b
I
C=45 fF (selected knowing the desired output photon frequency f).
P
P
s
I
f=11 GHz (f=f+f).
I
S
γ/2π=γ/2π=100 MHz (decay rates of the first and second eigenmode to corresponding external feedlines).
P
γ/2π=10 MHz (decay rate of the third eigenmode to a corresponding external feedline).
3
g˜50 MHz (coupling constant between the first, the second and the third eigenmodes).
Example Implementation: The following values can be selected to generate a two-photon quantum-mechanical entangled photon-pair.
200
200
102
104
102
106
104
108
106
102
102
104
106
108
110
As it can be understood from the above paragraphs, an aspect of the present invention is also to provide a quantum-mechanical non-linear circuit . The quantum-mechanical non-linear circuit includes the first Josephson junction ; the second Josephson junction electrically connected to the first Josephson junction ; the third Josephson junction electrically connected to the second Josephson junction ; and the fourth Josephson junction electrically connected to the third Josephson junction and the first Josephson junction , such that the first, second, third and fourth Josephson junctions , , and are connected in the bridge circuit .
200
122
102
124
104
126
106
128
108
c
c
c
c
The quantum-mechanical non-linear circuit further includes the first capacitor (C) connected in parallel with the first Josephson junction ; the second capacitor (C) connected in parallel with the second Josephson junction ; the third capacitor (C) connected in parallel with the third Josephson Junction ; and the fourth capacitor (C) connected in parallel with the fourth Josephson junction .
200
132
110
1
102
108
2
104
106
200
134
110
3
102
104
4
106
108
a
b
The quantum-mechanical non-linear circuit also includes the fifth capacitor (C) connected in parallel with the bridge circuit at the first node between the first Josephson junction and the fourth Josephson junction and the second node between the second Josephson junction and the third Josephson junction . The quantum-mechanical non-linear circuit further includes the sixth capacitor (C) connected in parallel with the bridge circuit at the third node between the first Josephson junction and the second Josephson junction and a fourth node between the third Josephson junction and the fourth Josephson junction .
200
P
S
I
P
S
I
The quantum-mechanical non-linear circuit has the first resonance eigenmode, the second resonance eigenmode and the third resonance eigenmode. The third frequency (f) of the third resonance eigenmode is equal to the sum of a first frequency (f) of the first resonance eigenmode plus the second frequency (f) of the second resonance eigenmode such that, during operation, a photon having the third frequency (f) is split into two quantum-mechanically entangled photons having the first frequency (f) and second frequency (f).
112
110
In an embodiment, when in operation, the first resonance eigenmode, the second resonance eigenmode and the third resonance eigenmode are coupled by applying a magnetic field using the source of magnetic flux to generate the magnetic flux through the bridge circuit when the third resonance eigenmode is excited.
S
I
a
b
S
I
a
b
132
134
132
134
In an embodiment, the first frequency (f) and the second frequency (f) depend on capacitance values of the fifth capacitor (C) and the sixth capacitor (C) , respectively, and the first frequency (f) and the second frequency (f) are selected by selecting capacitance values of the fifth capacitor (C) and the sixth capacitor (C) , respectively.
122
124
126
128
P
S
I
In an embodiment, the capacitance value of the first capacitor , a capacitance value of the second capacitor , a capacitance value of the third capacitor , and a capacitance value of the fourth capacitor are selected so that the third frequency (f) of the third resonance eigenmode is equal to the sum of the first frequency (f) of the first resonance eigenmode plus the second frequency (f) of the second resonance eigenmode.
200
142
1
110
144
1
110
144
146
3
110
134
200
143
2
110
cc
ca
a
cb
b
cc
In an embodiment, the quantum-mechanical non-linear circuit further includes a seventh capacitor (C) connected to the first node of the bridge circuit ; an eight capacitor (C) connected to the first node of the bridge circuit and to the fifth capacitor (C) ; and a ninth capacitor (C) connected to the third node of the bridge circuit and to the sixth capacitor (C) . In an embodiment, the quantum-mechanical non-linear circuit also includes a tenth capacitor (C) that is connected to the second node of the bridge circuit .
142
144
146
3
S
I
3
I
S
1. a coupling constant between the first, the second and the third eigenmodes gis less than decay rates γand γof the first and second eigenmodes, respectively, to corresponding external feedlines (g<γ˜γ); and
3
P
3
P
2. the coupling constant between the first, the second and the third eigenmodes gis greater than a decay rate γof the third eigenmode to a corresponding external feedline (g>γ).
The seventh capacitor , the eighth capacitor and ninth capacitor are selected to satisfy a frequency hierarchy conduction such that:
FIG. 4
P
P
P
S
I
P
s
I
200
400
112
200
402
is a flow diagram of a method for generating a quantum-mechanical entangled photon-pair, according to an embodiment of the present invention. The method includes inputting an electromagnetic wave at a third frequency (f) into a quantum-mechanical non-linear circuit (e.g., circuit ) having a first resonance eigenmode, a second resonance eigenmode and a third resonance eigenmode, the third frequency (f) corresponding to a frequency of the third eigenmode, at S. The method also includes applying a magnetic field to generate a magnetic flux (for example, using the source of magnetic flux ) in the quantum-mechanical non-linear circuit (e.g., circuit ) to couple the first eigenmode, the second eigenmode and the third eigenmode such that, a photon having the third frequency (f) is split into two quantum-mechanically entangled photons having a first frequency (f) of the first eigenmode and a second frequency (f) of the second eigenmode, respectively, the third frequency (f) being equal to a sum of the first frequency (f) plus the second frequency (f), at S.
S
I
a
b
a
b
S
I
a
b
S
I
132
134
200
132
134
200
132
134
200
In an embodiment, the method includes selecting the first frequency (f) and the second frequency (f) by selecting capacitance values of capacitors (C) and (C) in the quantum-mechanical non-linear circuit . In an embodiment, the method includes selecting the capacitance values of capacitors (C) and (C) in the quantum-mechanical non-linear circuit given the desired first frequency (f) and second frequency (f) of the two quantum-mechanically entangled photons. In an embodiment, the capacitance values of capacitors (C) and (C) in the quantum-mechanical non-linear circuit can be selected so that the desired first frequency (f) is equal to the second frequency (f).
122
124
126
128
200
P
S
I
P
S
I
In an embodiment, the method further includes selecting capacitance values of capacitors (Cc) , , and in the quantum-mechanical non-linear circuit so that the third frequency (f) of the third resonance eigenmode is equal to the sum of the first frequency (f) of the first resonance eigenmode plus the second frequency (f) of the second resonance eigenmode, i.e., f=f+f.
cc
ca
cb
3
S
I
3
P
142
144
146
200
In an embodiment, the method also includes selecting capacitance values of capacitors C, C and C in the quantum-mechanical non-linear circuit so as to satisfy a frequency hierarchy conduction such that a coupling constant gbetween the first, the second and third eigenmodes is less than a decay rate γof the first eigenmode to a corresponding external feedline and a decay rate γof the second eigenmode to a corresponding external feedline, and the coupling constant gbetween the first, the second and third eigenmodes is greater than a decay rate γof the third eigenmode to a corresponding external feedline.
A quantum-mechanical photon-pair generator that emits quantum-mechanical entangled photon-pairs on demand can be useful in remote quantum entanglement of superconducting qubits, quantum communication, quantum cryptography.
The descriptions of the various embodiments of the present invention have been presented for purposes of illustration, but are not intended to be exhaustive or limited to the embodiments disclosed. Many modifications and variations will be apparent to those of ordinary skill in the art without departing from the scope and spirit of the described embodiments. The terminology used herein was chosen to best explain the principles of the embodiments, the practical application or technical improvement over technologies found in the marketplace, or to enable others of ordinary skill in the art to understand the embodiments disclosed herein. | |
IQD Frequency Products' GPS disciplined OCXOs (oven controlled crystal oscillators) are a range of advanced clock modules that provide electrical timing functionality for distributed network systems. These clock modules use an OCXO in combination with software algorithms that primarily revolve around the 1 PPS (pulse per second) timing synchronization signal produced by a GPS frequency receiver, which is derived from transmitted timing information from GPS satellite systems. Evaluation boards are also available for each of the models.
The main objective of these modules is to maintain the 1 PPS (pulse per second) signal of the GPS system, and they are used in communication network systems to synchronize timing. If the system relies on the GPS signal to maintain accuracy and the GPS signal fails due to loss of lock, bad weather, jamming, or other issues, these clock modules are able to keep the 1 PPS signal maintained until GPS lock is restored, enabling the network system to remain within specification. To fully meet the requirements of some specific telecoms protocols such as LTE, the product will have to maintain accuracy to within ±1.5 μs over 24 hours if the GPS signal is lost. IQD's range of GPS disciplined OCXOs is available with or without a GPS receiver. | https://www.angrandic.com/a/93.html |
New Delhi. 09 August 2016. Extended deterrence is inherently less credible than primary deterrence—deterring an attack on one’s own country. An adversary always has reason to wonder whether a guarantor power would really risk the destruction and casualties of war merely to protect an ally or security client. That credibility is especially uncertain when an adversary has the capability to attack the homeland of the guarantor power, but it is in doubt even with respect to a country like North Korea that does not have that ability.
If the U.S. is committed to deterring a second Korean War, it should make it clear to Pyongyang that any North Korean military offensive would be met with a devastating retaliation with the goal of extinguishing the trouble-making North Korean state.
The prospect of a limited, “tit-for-tat” response could actually encourage the DPRK to test whether the U.S. extended deterrence policy regarding South Korea is real. At the same time, the tit-for-tat approach to an incident always entails the risk of unintended escalation that spirals out of control, producing the larger war that it’s supposedly designed to prevent. It is a strategy that has major drawbacks and almost no benefits.
Analysing the degree to which extended nuclear deterrence will continue to play a role in East Asia in the coming decades; noted experts today said that it would depend largely on the nature of the American presence in the region and the evolution of its alliance commitments with Japan and RoK.
Highlighting the prevailing security dynamics in the region, the experts reflected that the prospects for de-nuclearisation in the East Asian region are bleak.
The experts were speaking at a panel discussion on ‘Republic of Korea & Japan: Questions on Extended Deterrence’, organised by the Indian Pugwash Society on August 9, 2016, in remembrance of the 71st year of the atomic bombing on Hiroshima and Nagasaki.
The panel comprised Distinguished Fellow, Observer Research Foundation, Professor KV Kesavan; former Indian Ambassador to the Republic of Korea, Ambassador Mr Skand Ranjan Tayal and Director, Institute for Chinese Studies, New Delhi, Professor Alka Acharya.
The experts agreed that extended nuclear deterrence has remained a key component of the U.S.–Japanese bilateral security partnership over the past 64 years. They noted that Japan signed the Nuclear Non-Proliferation Treaty in 1970 but ratified it only six years later.
Extended nuclear deterrence has remained a source of stability for Japan. However, keeping in view Japan’s concerns over U.S. intentions in an increasingly multi-polar and uncertain world, Tokyo needs reassurance. The success or failure of this will strongly influence whether Japan continues its traditional anti-nuclear weapons policy (non-production, non-possession and non acquisition) or embarks on a more adventurous course, added the experts, thus highlighting a possible evolution in Japan’s non-proliferation and security policies.
Observing the nuclear dynamics in the Korean peninsula, the experts noted that the United States was the first to nuclearise the region and extended nuclear deterrence remains the centerpiece of the U.S.-RoK Security alliance.
Commenting on the increasing proximity between South Korea and China, the experts noted that Korea is aware of the declining U.S. economic power and it remains to be seen if Korea is willing to eventually entrust its security to China. Some Koreans believe they could be a mediator between China and the United States.
The experts also noted that the Chinese ‘principled’ nuclear policy lacks credibility due to its continued disregard of global non-proliferation norms and its clandestine aid to nuclear and missile programmes in countries such as DPRK and Pakistan. China’s military and technological assistance to DPRK has been a long-standing security concern for Japan & RoK. | https://www.aviation-defence-universe.com/extended-deterrence-north-east-asia-answer/ |
CROSS-REFERENCE TO RELATED APPLICATION
This non-provisional application claims priority under 35 U.S.C. § 119(a) to Patent Application No. 110135700 filed in Taiwan, R.O.C. on Sep. 24, 2021, the entire contents of which are hereby incorporated by reference.
BACKGROUND
Technical Field
Related Art
The present disclosure relates to a transformer, and specifically, to a planar transformer.
Many electrical appliances use a transformer to adjust an inputted voltage to a required voltage. A general transformer includes a high voltage side coil and a low voltage side coil. The high voltage side coil receives an alternating current to generate a magnetic field, the low voltage side coil generates an inductive potential difference in response to the magnetic field, and the transformer obtains, according to a turns ratio of the high voltage side coil to the low voltage side coil, a converted voltage.
Currently, more and more electrical appliances require a small volume, which leads to a decrease in a volume of the transformer. Compared with conventional transformers, a planar transformer has a characteristic of small volume. Therefore, planar transformers are frequently used in an application scenario with limited space.
SUMMARY
In view of this, according to some embodiments, a planar transformer including a printed circuit board is provided. The printed circuit board includes a plurality of winding layers, a first column hole, and a second column hole. Each winding layer includes a first column winding region and a second column winding region. The first column hole passes through the first column winding regions, and the second column hole passes through the second column winding regions. The winding layers include a first layer and a second layer. The first layer includes a first winding and a second winding. The first winding of the first layer is located in the first column winding region of the first layer, surrounds the first column hole, and has a first opening direction; and the second winding of the first layer is located in the second column winding region of the first layer, surrounds the second column hole, and has a second opening direction. The first winding of the first layer is electrically connected to the second winding of the first layer, and the first opening direction of the first layer is different from the second opening direction of the first layer. The second layer includes a first winding and a second winding. The first winding of the second layer is located in the first column winding region of the second layer, surrounds the first column hole, and has a first opening direction; and the second winding of the second layer is located in the second column winding region of the second layer, surrounds the second column hole, and has a second opening direction. The first winding of the second layer is electrically connected to the second winding of the second layer, and the first opening direction of the second layer is different from the second opening direction of the second layer.
According to some embodiments, the first winding of the first layer is located on a first side of the first column hole, and the second winding of the first layer is located on a second side of the second column hole. The first winding of the second layer is located on a second side of the first column hole, and the second winding of the second layer is located on a first side of the second column hole. The first side of the first column hole is opposite to the second side of the first column hole. The first side of the second column hole is opposite to the second side of the second column hole.
According to some embodiments, each winding layer includes a first extending region and a second extending region. The printed circuit board includes a second conductive hole, and the second conductive hole passes through the second extending regions. The first winding of the first layer extends to the first extending region of the first layer, the second winding of the first layer and the second winding of the second layer are electrically connected through the second conductive hole, and the first winding of the second layer extends to the first extending region of the second layer.
According to some embodiments, the winding layers additionally include a third layer. The third layer includes a first winding and a second winding. The first winding of the third layer is located in the first column winding region of the third layer, surrounds the first column hole, and has a first opening direction; and the second winding of the third layer is located in the second column winding region of the third layer, surrounds the second column hole, and has a second opening direction. The first winding of the third layer is electrically connected to the second winding of the third layer. The first opening direction of the third layer is different from the second opening direction of the third layer.
According to some embodiments, the printed circuit board includes a first conductive hole and a second conductive hole. The first conductive hole passes through the first extending regions, and the second conductive hole passes through the second extending regions. The first winding of the first layer extends to the first extending region of the first layer. The second winding of the first layer and the second winding of the second layer are electrically connected through the second conductive hole. The first winding of the second layer and the first winding of the third layer are electrically connected through the first conductive hole, and the second winding of the third layer extends to the second extending region of the third layer.
Based on the above, according to some embodiments, the winding layers of the planar transformer include first windings and second windings connected in series. The first winding and the second winding have different opening directions. A winding direction in which the first winding surrounds the first column hole is opposite to a winding direction in which the second winding surrounds the second column hole. Therefore, a designer may adjust opening directions of windings to cooperate with a high voltage side circuit, a low voltage side circuit, and a circuit layout requirement, to increase the design flexibility. In some embodiments, the conductive hole passes through the extending regions, and the windings of the plurality of winding layers are electrically connected through the conductive hole. Therefore, the conductive hole does not need to be configured in the column winding region, so that circuit layout is more flexible. In some embodiments, the conductive holes are all plated through holes, so that the printed circuit board of the planar transformer has no buried via hole or blind via hole, so that the printed circuit board has lower manufacture costs, a high yield rate, and high reliability.
BRIEF DESCRIPTION OF THE DRAWINGS
1
FIG.
is a three-dimensional exploded view of a planar transformer according to some embodiments;
2
FIG. A
is a top view of two winding layers according to some embodiments;
2
FIG. B
is a top view of a winding layer according to some embodiments;
2
FIG. C
2
FIG. A
2
FIG. B
1
FIG.
2
2
is a cross-sectional view of the winding layers in and applied to magnetic cores and magnetic columns of at a position C-C according to some embodiments;
2
FIG. D
2
FIG. A
2
FIG. B
is a diagram of experimental waves of a printed circuit board including the winding layers in and ;
3
FIG. A
is a top view of three winding layers according to some embodiments;
3
FIG. B
3
FIG. A
2
FIG. B
is a diagram of experimental waves of a printed circuit board including the winding layers in and ;
4
FIG. A
is a top view of three winding layers according to some embodiments;
4
FIG. B
4
FIG. A
2
FIG. B
is a diagram of experimental waves of a printed circuit board including the winding layers in and ;
5
FIG. A
is a top view of a winding layer according to some embodiments;
5
FIG. B
5
FIG. A
2
FIG. B
is a diagram of experimental waves of a printed circuit board including the winding layers in and ;
6
FIG.
is a top view of two winding layers according to some embodiments;
7
FIG.
is a three-dimensional exploded view of a planar transformer according to some embodiments;
8
FIG.
7
FIG.
is a schematic top view of winding layers of a printed circuit board in the embodiment of ;
9
FIG.
7
FIG.
is a circuit functional block diagram of the planar transformer in the embodiment of ;
10
FIG.
is a three-dimensional exploded view of a planar transformer according to some embodiments;
11
FIG.
10
FIG.
is a circuit functional block diagram of the planar transformer in the embodiment of ;
12
FIG.
is a three-dimensional exploded view of a planar transformer according to some embodiments; and
13
FIG.
12
FIG.
is a circuit functional block diagram of the planar transformer in the embodiment of .
DETAILED DESCRIPTION
1
FIG.
2
FIG. A
1
FIG.
2
FIG. A
2
FIG. A
100
100
110
120
150
101
102
110
120
111
121
112
122
101
111
121
102
112
122
Referring to and together, is a three-dimensional exploded view of a planar transformer according to some embodiments, is a top view of two winding layers according to some embodiments, and shows two winding layers vertically stacked in a parallel manner. The planar transformer includes a printed circuit board . The printed circuit board includes a plurality of winding layers , , and , a first column hole , and a second column hole . Each winding layer or includes a first column winding region or and a second column winding region or . The first column hole passes through the first column winding regions and , and the second column hole passes through the second column winding regions and .
2
FIG. A
100
110
120
110
120
110
120
110
116
117
116
110
111
110
101
116
117
110
112
110
102
117
116
110
117
110
116
110
117
110
120
126
127
126
120
121
120
101
126
127
120
122
120
102
127
126
120
127
120
126
120
127
120
a
a
a
a
a
a
a
a
In the embodiment of , the printed circuit board includes two winding layers and . The winding layers and include a first layer and a second layer (which may be also referred to as a first winding layer and a second winding layer respectively throughout this specification). The first layer includes a first winding and a second winding . The first winding of the first layer is located in the first column winding region of the first layer , surrounds the first column hole , and has a first opening direction . The second winding of the first layer is located in the second column winding region of the first layer , surrounds the second column hole , and has a second opening direction . The first winding of the first layer is electrically connected to the second winding of the first layer . The first opening direction of the first layer is different from the second opening direction of the first layer . The second layer includes a first winding and a second winding . The first winding of the second layer is located in the first column winding region of the second layer , surrounds the first column hole , and has a first opening direction . The second winding of the second layer is located in the second column winding region of the second layer , surrounds the second column hole , and has a second opening direction . The first winding of the second layer is electrically connected to the second winding of the second layer , and the first opening direction of the second layer is different from the second opening direction of the second layer .
111
112
121
122
116
117
126
127
111
112
121
122
111
112
121
122
111
112
121
122
101
102
116
117
126
127
101
102
111
112
121
122
116
117
126
127
101
102
2
FIG. A
The column winding regions , , , and are regions provided for the windings , , , and to surround. In the embodiment of , the column winding regions , , , and are in a shape of a rectangle, but the shapes of the column winding regions , , , and are not limited thereto, and the column winding regions , , , and may be alternatively in a circular, ellipsoidal, or irregular shape surrounding the column holes and . The windings , , , and surround the column holes and in the column winding regions , , , and and respectively have an opening. Therefore, angles at which the windings , , , and surround the column holes and may range from 10 degrees to approximately 360 degrees (examples will be provided later), and are determined according to a layout plan requirement. The layout plan requirement includes, but is not limited to, a layout plane requirement of electrical connection between the two winding layers, or a layout plane requirement of electrical connection between the windings and a high voltage side circuit or a low voltage side circuit (details will be described later).
116
116
110
116
116
101
116
116
116
116
116
111
116
116
116
116
116
116
116
117
110
126
120
127
120
a
b
c
b
c
b
c
a
a
a
a
The first opening direction of the first winding of the first layer refers to an opening direction of an arc formed by the first winding . The arc is an arc (also may be referred to as a winding arc) formed by the first winding surrounding the first column hole . The winding arc includes two endpoints and , and the two endpoints and may be intersection points between the first winding and the first column winding region , or may be endpoints of an actual opening of the first winding (which will be explained later). A connecting line between the two endpoints and is a chord of the first winding . The first opening direction of the first winding is a direction that is perpendicular to the chord of the first winding , and faces outward. Meanings of the second opening direction of the first layer , the first opening direction of the second layer , and the second opening direction of the second layer are the same, and details are not described again.
110
120
116
126
117
127
116
110
117
110
126
120
127
120
116
126
117
127
110
120
110
120
116
126
117
127
116
110
117
110
116
110
117
110
126
120
127
120
2
FIG. A
2
FIG. A
For each layer or , a winding direction of the first winding or is opposite to a winding direction of the second winding or . That is, based on that the first winding of the first layer is electrically connected to the second winding of the first layer , and the first winding of the second layer is electrically connected to the second winding of the second layer . Therefore, the first winding or and the second winding or of each layer or are connected in series. If a current is inputted into one end of two ends connected in series, and the current flows out of the other end, for each layer or , the winding direction of the first winding or is opposite to the winding direction of the second winding or . For example, if a current is inputted into the first winding of the first layer and the current is outputted from the second winding of the first layer , the winding direction of the first winding of the first layer is clockwise (based on the viewing angle in ), the winding direction of the second winding of the first layer is anticlockwise (based on the viewing angle in ), and the two winding directions are opposite. Similarly, the winding direction of the first winding of the second layer and the winding direction of the second winding of the second layer are opposite.
2
FIG. A
2
FIG. A
2
FIG. A
2
FIG. A
2
FIG. A
116
110
117
110
126
120
127
120
116
110
117
110
126
120
127
120
a
a
a
a
In the embodiment of , the first opening direction of the first layer approximately faces toward a right side of the viewing angle in , the second opening direction of the first layer approximately faces toward the upper left of the viewing angle in , and the two directions are different. The first opening direction of the second layer approximately faces toward a left side of the viewing angle in , the second opening direction of the second layer approximately faces toward the right side of the viewing angle in , and the two directions are different. In addition, winding arcs respectively formed by the first winding of the first layer , the second winding of the first layer , the first winding of the second layer , and the second winding of the second layer may be designed as required, and lengths of the arcs may be the same or different (details will be described later).
116
110
101
101
117
110
102
102
126
120
101
101
127
120
102
102
101
101
101
101
102
102
102
102
a
b
b
a
a
b
a
b
According to some embodiments, the first winding of the first layer is located on a first side of the first column hole . The second winding of the first layer is located on a second side of the second column hole . The first winding of the second layer is located on a second side of the first column hole . The second winding of the second layer is located on a first side of the second column hole . The first side of the first column hole is opposite to the second side of the first column hole . The first side of the second column hole is opposite to the second side of the second column hole .
110
120
191
192
100
110
191
120
192
110
120
230
240
293
111
112
121
122
116
117
126
127
111
112
121
122
116
117
126
127
116
117
110
191
111
112
110
191
126
127
120
192
121
122
120
192
2
FIG. A
7
FIG.
In some embodiments, each winding layer or is located on a surface of an insulating layer or of the printed circuit board . In the embodiment of , the first layer is located on a surface of a first insulating layer , and the second layer is located on a surface of a second insulating layer . However, the first layer and the second layer are not limited thereto. The first layer and the second layer may be respectively located on an upper surface and a lower surface of the same insulating layer. For example, a third layer and a fourth layer in an embodiment of are respectively located on an upper surface and a lower surface of a third insulating layer (details will be described later). Each column winding region , , , or corresponds to a surface on which the winding , , , or is located (alternatively, each column winding region , , , or is located in a region of a surface on which the winding , , , or is located). For example, the windings and of the first layer are located on the surface of the first insulating layer , so that the column winding regions and of the first layer correspond to the surface of the first insulating layer ; and the windings and of the second layer are located on the surface of the second insulating layer , so that the column winding regions and of the second layer correspond to the surface of the second insulating layer .
1
FIG.
7
FIG.
80
82
84
86
84
86
80
84
80
86
84
86
82
84
82
86
84
86
80
82
80
82
84
84
86
86
84
84
86
86
84
80
86
84
82
86
a
b
a
b
a
b
a
b
a
a
b
b
Still referring to , in some embodiments, the planar transformer includes a first magnetic core , a second magnetic core , a first magnetic column , and a second magnetic column . The first magnetic column and the second magnetic column are respectively connected to the first magnetic core . The first magnetic column , the first magnetic core , and the second magnetic column are three separate components sequentially connected or a single component integrally formed. In some embodiments, the first magnetic column and the second magnetic column are respectively connected to the second magnetic core . The first magnetic column , the second magnetic core , and the second magnetic column are three separate components sequentially connected or a single component integrally formed. In some embodiments, the first magnetic column and the second magnetic column are not connected to the first magnetic core or the second magnetic core (for example, there is a small gap between the components), but are both located between the first magnetic core and the second magnetic core . In some embodiments (referring to ), the planar transformer includes two first sub-magnetic columns and and two second sub-magnetic columns and , where the two first sub-magnetic columns and are substantially configured coaxially, and the two second sub-magnetic columns and are substantially configured coaxially. The first sub-magnetic column , the first magnetic core , and the second sub-magnetic column are three separate components sequentially connected or a single component integrally formed. The first sub-magnetic column , the second magnetic core , and the second sub-magnetic column are three separate components sequentially connected or a single component integrally formed.
110
120
150
113
123
114
124
116
110
113
110
126
120
123
120
100
116
126
113
123
117
110
114
110
127
120
124
120
In some embodiments, each winding layer , , or includes a first extending region or and a second extending region or . The first winding of the first layer extends to the first extending region of the first layer , and the first winding of the second layer extends to the first extending region of the second layer . Based on this, the planar transformer may be electrically connected to the outside of the printed circuit board or an electronic component through the first winding or of the first extending region or . Similarly, the second winding of the first layer extends to the second extending region of the first layer , the second winding of the second layer extends to the second extending region of the second layer , and the purpose thereof are not described again.
101
102
113
114
113
111
112
114
In some embodiments, a connecting line between a center of a circle of the first column hole and a center of a circle of the second column hole passes through the first extending region and the second extending region , and the first extending region , the first column winding region , the second column winding region , and the second extending region are arranged sequentially.
100
107
107
114
124
107
114
124
117
110
127
120
107
117
110
114
110
107
127
120
124
120
107
107
114
124
112
122
114
124
100
117
110
127
120
114
124
107
107
114
124
111
112
121
122
2
FIG. A
2
FIG. A
In some embodiments, the printed circuit board includes a second conductive hole . The second conductive hole passes through the second extending regions and (alternatively, the second conductive hole is located in the second extending regions and ), and the second winding of the first layer and the second winding of the second layer are electrically connected through the second conductive hole . In some embodiments, the second winding of the first layer extends to the second extending region of the first layer to be electrically connected to the second conductive hole , and the second winding of the second layer extends to the second extending region of the second layer to be electrically connected to the second conductive hole (as shown in ). In some embodiments, the second conductive hole is located at an edge (for example, an upper side of a view of ) of the second extending region or adjacent to the second column winding region or or the second extending region or adjacent to the printed circuit board , and the second winding of the first layer and the second winding of the second layer extends to the corresponding second extending regions and according to a position of the second conductive hole . In this embodiment, the second conductive hole is merely located in the second extending regions and , and there is no conductive hole in the column winding regions , , , and .
2
FIG. A
2
FIG. A
116
110
117
110
127
120
126
120
100
116
110
113
110
126
120
123
120
100
According to some embodiments, referring to , the first winding of the first layer , the second winding of the first layer , the second winding of the second layer , and the first winding of the second layer of the printed circuit board are sequentially connected in series. A part of the first winding of the first layer extending to the first extending region of the first layer and a part of the first winding of the second layer extending to the first extending region of the second layer (for example, two arrows shown in the bottom of , and directions of the arrows represent possible directions in which a current flows in and out) may be configured to be electrically connected to the outside of the printed circuit board or the electronic component.
117
110
127
120
107
116
126
101
117
127
102
116
126
117
127
116
110
117
110
107
127
120
126
120
116
110
126
120
117
110
127
120
2
2
84
84
86
86
84
86
84
86
116
117
126
127
88
2
FIG. A
2
FIG. A
2
FIG. A
2
FIG. A
2
FIG. C
2
FIG. C
2
FIG. A
2
FIG. B
1
FIG.
In this embodiment, the second winding of the first layer and the second winding of the second layer are electrically connected through the second conductive hole . The winding directions of the first windings and corresponding to the first column hole are the same, the winding directions of the second windings and corresponding to the second column hole are the same, and the winding direction of the first winding or is opposite to the winding direction of the second winding or . For example, a current is inputted from the first winding of the first layer (an upward large arrow in ), the current sequentially runs through the second winding of the first layer , the second conductive hole , the second winding of the second layer , and the first winding of the second layer (the current is outputted from a downward large arrow in ). As can be seen from (based on the viewing angle of ), the winding direction (clockwise) of the first winding of the first layer is the same as the winding direction (clockwise) of the first winding of the second layer ; and the winding direction (anticlockwise) of the second winding of the first layer is the same as the winding direction (anticlockwise) of the second winding of the second layer . In this way, referring to , is a cross-sectional view of the winding layers in and applied to magnetic cores and magnetic columns of at a position C-C according to some embodiments. A current flows into the page from a left side of the first magnetic column , then flows out of the page between the first magnetic column and the second magnetic column , and flows into the page from a right side of the second magnetic column . According to a design that winding directions corresponding to the same magnetic column or are the same and winding directions corresponding to different magnetic columns and are different, and after currents are inputted into two ends of the windings , , , and that are connected in series, a closed magnetic circuit is formed.
2
FIG. A
2
FIG. A
116
117
110
126
127
120
100
110
120
101
102
116
126
110
120
101
117
127
110
120
102
In addition, as can be seen from , the first winding and the second winding of the first layer are in a first line shape, and the first line shape is substantially presented as an S shape (or a reverse S shape). The first winding and the second winding of the second layer form a second line shape. The second line shape and the first line shape substantially complement each other. The complementary line shapes herein do not require that two electrically connected and stacked windings form a circle, and the stacked windings may alternatively be an arc at a predetermined angle with an opening. The embodiment of is used as an example, in the printed circuit board , if the first layer and the second layer are stacked (the first column hole and the second column hole are plated through holes), the first windings and of the stacked first layer and second layer are substantially a circle surrounding the first column hole , and the second windings and of the stacked first layer and second layer are substantially a circle surrounding the second column hole .
2
FIG. A
2
FIG. B
2
FIG. C
2
FIG. D
2
FIG. B
2
FIG. D
2
FIG. A
2
FIG. B
2
FIG. B
2
FIG. D
2
FIG. D
2
FIG. D
2
FIG. D
2
FIG. D
80
82
84
86
100
100
110
120
190
190
197
197
190
102
117
110
127
120
107
116
117
126
127
110
120
197
190
197
190
th
th
th
th
th
Referring to , , , and together, is a top view of a winding layer according to some embodiments. is a diagram of experimental waves of a printed circuit board including the winding layers in and . According to some embodiments, the planar transformer includes a first magnetic core , a second magnetic core , a first magnetic column , a second magnetic column , and a printed circuit board . Winding layers of the printed circuit board include a first layer , a second layer , and an Nlayer . As can be seen from , the Nlayer includes a second winding , and the second winding of the Nlayer surrounds the second column hole . The second winding of the first layer is electrically connected to the second winding of the second layer through the second conductive hole . Two ends of the windings , , , and of the first layer and the second layer are used as an input end on a high voltage side respectively, and an alternating current represented by using a solid line in is inputted into the input end. The second winding of the Nlayer is used as a low voltage side and an output signal of the second winding of the Nlayer is measured. Through experimental testing, the output signal is an alternating current represented by using a dot-and-dash line in . In , the horizontal axis is time and the unit is second (s), and the vertical axis is voltage and the unit is volt (V). As can be seen from , a peak to peak voltage of an input signal is about 18.96 V, and a peak to peak voltage of the output signal is about 9.7 V. As can be learned from , a turns ratio of the high voltage side to the low voltage side is about 2:1.
3
FIG. A
3
FIG. A
3
FIG. A
100
110
120
130
130
136
137
136
130
131
130
101
136
137
130
132
130
102
137
136
130
137
130
136
130
137
130
a
a
a
a
Referring to , is a top view of three winding layers according to some embodiments, and presents the three winding layers stacked sequentially in a parallel manner. The winding layers of the printed circuit board includes a first layer , a second layer , and a third layer (or may be referred to as a third winding layer). The third layer includes a first winding and a second winding , where the first winding of the third layer is located in the first column winding region of the third layer , surrounds the first column hole , and has a first opening direction , the second winding of the third layer is located in the second column winding region of the third layer , surrounds the second column hole , and has a second opening direction , and the first winding of the third layer is electrically connected to the second winding of the third layer . The first opening direction of the third layer is different from the second opening direction of the third layer .
3
FIG. A
136
130
101
101
137
130
102
102
a
b
In the embodiment of , the first winding of the third layer is located on the first side of the first column hole , and the second winding of the third layer is located on the second side of the second column hole .
100
106
107
106
113
123
133
107
114
124
134
116
110
113
110
117
110
127
120
107
126
120
136
130
106
137
130
134
130
116
110
117
110
127
120
126
120
136
130
137
130
100
In some embodiments, the printed circuit board includes a first conductive hole and a second conductive hole , the first conductive hole passes through the first extending regions , , and , the second conductive hole passes through the second extending regions , , and , the first winding of the first layer extends to the first extending region of the first layer , the second winding of the first layer and the second winding of the second layer are electrically connected through the second conductive hole , the first winding of the second layer and the first winding of the third layer are electrically connected through the first conductive hole , and the second winding of the third layer extends to the second extending region of the third layer . Therefore, the first winding of the first layer , the second winding of the first layer , the second winding of the second layer , the first winding of the second layer , the first winding of the third layer , and the second winding of the third layer of the printed circuit board are sequentially connected in series.
3
FIG. A
126
120
123
120
106
136
130
133
130
106
137
130
134
130
106
107
113
114
123
124
133
134
111
112
121
122
131
132
In some embodiments, referring to , the first winding of the second layer extends to the first extending region of the second layer to be electrically connected to the first conductive hole , and the first winding of the third layer extends to the first extending region of the third layer to be electrically connected to the first conductive hole . The second winding of the third layer extends to the second extending region of the third layer to be electrically connected to an electronic component. In this embodiment, the conductive holes and are plated through holes and are merely located in the extending regions , , , , , and , and there is no conductive hole in the column winding regions , , , , , and .
3
FIG. B
3
FIG. B
3
FIG. A
2
FIG. B
3
FIG. B
3
FIG. B
3
FIG. B
3
FIG. B
7
FIG.
10
FIG.
100
110
120
130
190
116
117
126
127
136
137
110
120
130
197
190
197
190
100
th
th
th
Referring to , is a diagram of experimental waves of a printed circuit board including the winding layers in and . The winding layers of the printed circuit board include a first layer , a second layer , a third layer , and an Nlayer . Two ends of the windings , , , , , and that are connected in series of the first layer , the second layer , and the third layer are used as an input end on a high voltage side respectively, and an alternating current represented by using a solid line in is inputted into the input end. The second winding of the Nlayer is used as a low voltage side and an output signal of the second winding of the Nlayer is measured. Through experimental testing, the output signal is an alternating current represented by using a dot-and-dash line in . As can be seen from , a peak to peak voltage of an input signal is about 21.22 V, and a peak to peak voltage of the output signal is about 7.2 V. As can be learned from , a turns ratio of the high voltage side to the low voltage side is about 3:1. In some embodiments, the printed circuit board includes four or more winding layers, such as an embodiment of or .
106
107
106
107
107
107
106
107
106
107
113
114
123
124
133
134
111
112
121
122
131
132
100
116
117
126
127
136
137
2
FIG. A
3
FIG. A
Each conductive hole or is electrically connected to windings located on different layers and connected to the conductive hole, and each conductive hole or may be a plated through hole, a blind via hole, or a buried via hole. For example, the second conductive hole in and is a plated through hole, and during implementation, the second conductive hole may be a blind via hole. When the conductive holes and are plated through holes, the conductive holes may have a relatively easy manufacturing process, a high yield rate, and lower costs. The conductive holes and are located in the extending regions , , , , , and , and the column winding regions , , , , , and of the printed circuit board are merely provided with windings , , , , , and without any plated through hole, blind via hole, or buried via hole, so that it is more convenient for winding design, and the yield rate is improved.
4
FIG. A
4
FIG. A
4
FIG. A
4
FIG. A
4
FIG. A
4
FIG. A
110
120
130
116
110
117
110
116
116
110
117
117
110
m
m
m
m
m
m
m
a
m
m
a
m
m
Referring to , is a top view of three winding layers according to some embodiments, and presents the three winding layers stacked sequentially in a parallel manner. The winding layers of include a first layer , a second layer , and a third layer . A first winding of the first layer is electrically connected to a second winding of the first layer . A first opening direction of the first winding of the first layer faces toward an upper right of a viewing angle of , a second opening direction of the second winding of the first layer faces toward a lower left of the viewing angle of , and the two opening directions are different.
126
120
127
120
126
126
120
127
127
120
m
m
m
m
a
m
m
a
m
m
4
FIG. A
4
FIG. A
A first winding of the second layer is electrically connected to a second winding of the second layer . A first opening direction of the first winding of the second layer faces toward the lower left of the viewing angle of , a second opening direction of the second winding of the second layer faces toward the upper right of the viewing angle of , and the two opening directions are different.
136
130
137
130
136
136
130
137
137
130
m
m
m
m
a
m
m
a
m
m
4
FIG. A
4
FIG. A
A first winding of the third layer is electrically connected to a second winding of the third layer . A first opening direction of the first winding of the third layer faces toward the upper right of the viewing angle of , a second opening direction of the second winding of the third layer faces toward the lower left of the viewing angle of , and the two opening directions are different.
4
FIG. A
4
FIG. A
113
123
133
114
124
134
101
102
113
123
133
101
114
124
134
102
106
113
123
133
107
114
124
134
116
110
113
110
117
110
127
120
107
126
120
136
130
106
137
130
134
130
116
110
117
110
127
120
126
120
136
130
137
130
106
123
120
133
130
107
114
110
124
120
m
m
m
m
m
m
m
m
m
m
m
m
m
m
m
m
m
m
m
m
m
m
m
m
m
m
m
m
m
m
m
m
m
m
m
m
m
m
m
m
m
m
m
m
m
m
m
m
m
m
m
m
m
m
m
m
m
m
m
m.
Still referring to , in some embodiments, first extending regions , , and and second extending regions , , and are respectively located on two opposite sides of a connecting line between a center of a circle of the first column hole and a center of a circle of the second column hole (left and right sides of a connecting line between centers of a circle of column holes at the viewing angle of ). The first extending regions , , and correspond to the first column hole , and the second extending regions , , and correspond to the second column hole . The first conductive hole passes through the first extending regions , , and , and the second conductive hole passes through the second extending regions , , and . The first winding of the first layer extends to the first extending region of the first layer , the second winding of the first layer and the second winding of the second layer are electrically connected through the second conductive hole , the first winding of the second layer and the first winding of the third layer are electrically connected through the first conductive hole , and the second winding of the third layer extends to the second extending region of the third layer . Therefore, the first winding of the first layer , the second winding of the first layer , the second winding of the second layer , the first winding of the second layer , the first winding of the third layer , and the second winding of the third layer are sequentially connected in series. In this embodiment, the first conductive hole is a blind via hole and is merely located in the first extending region of the second layer and the first extending region of the third layer , and the second conductive hole is a blind via hole and is merely located in the second extending region of the first layer and the second extending region of the second layer
4
FIG. B
4
FIG. B
4
FIG. A
2
FIG. B
4
FIG. B
4
FIG. B
4
FIG. B
4
FIG. B
100
110
120
130
190
116
117
126
127
136
137
110
120
130
197
190
197
190
m
m
m
m
m
m
m
m
m
m
m
m
th
th
th
Referring to , is a diagram of experimental waves of a printed circuit board including the winding layers in and . The winding layers of the printed circuit board include the first layer , the second layer , the third layer , and an Nlayer . Two ends of the windings , , , , , and that are connected in series of the first layer , the second layer , and the third layer are used as an input end on a high voltage side respectively, and an alternating current represented by using a solid line in is inputted into the input end. The second winding of the Nlayer is used as a low voltage side and an output signal of the second winding of the Nlayer is measured. Through experimental testing, the output signal is an alternating current represented by using a dot-and-dash line in . As can be seen from , a peak to peak voltage of an input signal is about 19.97 V, and a peak to peak voltage of the output signal is about 6.82 V. As can be learned from , a turns ratio of the high voltage side to the low voltage side is about 3:1.
3
FIG. A
4
FIG. A
4
FIG. A
3
FIG. A
3
FIG. A
4
FIG. A
2
FIG. B
2
FIG. C
2
FIG. A
4
FIG. A
4
FIG. A
2
FIG. A
197
88
88
113
111
114
112
Total arc lengths (or total arc angles) of surrounding arcs of the windings connected in series in and are compared, and the total arc length (or total arc angle) of the surrounding arcs of the windings connected in series in is greater than the total arc length (or total arc angle) of the surrounding arcs of the windings connected in series in . Then, the windings connected in series in and are respectively used as high voltage side windings, and the second winding in is used as a corresponding low voltage side winding. Through experiments, turns ratios of the high voltage side to the low voltage side among the three parties are both about 3:1. Apparently, the turns ratio is highly correlated to a winding passing through the foregoing closed magnetic circuit (referring to ), and approximately has nothing to do with a total arc length (or total arc angle) of surrounding arcs not passing through the closed magnetic circuit . Through these experiments, a user may design positions of the extending regions flexibly, to match with electronic components of the planar transformer and an electrical connection manner. For example, the first extending region is selectively designed on the left side, the lower side (as shown in ), or the right side (as shown in ) of the first column winding region , and the second extending region is selectively designed on the left side (as shown in ), the upper side (as shown in ), or the right side of the second column winding region . In some embodiments, the extending regions are provided with conductive holes or wires. The conductive holes or wires are electrically connected to a high voltage side circuit, a low voltage side circuit, and circuit layout. Therefore, flexible position configuration of the extending regions makes circuit design more convenient.
5
FIG. A
5
FIG. A
5
FIG. A
5
FIG. A
160
166
167
166
101
166
167
102
167
166
167
166
167
163
161
162
164
163
101
102
164
163
101
164
102
a
a
a
a
Referring to , is a top view of a winding layer according to some embodiments. The winding layer of includes a first winding and a second winding , and the first winding surrounds the first column hole and has a first opening direction . The second winding surrounds the second column hole and has a second opening direction , and the first opening direction is different from the second opening direction . The first winding is electrically connected to the second winding . In some embodiments, the first extending region , the first column winding region , the second column winding region , and the second extending region are sequentially adjacent to each other. The first extending region is located on a connecting line between the first column hole and the second column hole (for example, a connecting line between centers of a circle of the two column holes), and the second extending region is not located on the connecting line. In this embodiment (at a viewing angle of ), the first extending region is located on the lower side of the first column hole , and the second extending region is located on the left side of the second column hole .
5
FIG. B
5
FIG. B
5
FIG. A
2
FIG. B
5
FIG. B
5
FIG. B
5
FIG. B
5
FIG. B
5
FIG. A
5
FIG. A
2
FIG. C
100
110
190
116
117
110
197
190
197
190
166
167
88
101
102
th
th
th
Referring to , is a diagram of experimental waves of a printed circuit board including the winding layers in and . The winding layers of the printed circuit board include the first layer and an Nlayer . Two ends of the windings and that are connected in series of the first layer are used as an input end on a high voltage side respectively, and an alternating current represented by using a solid line in is inputted into the input end. The second winding of the Nlayer is used as a low voltage side and an output signal of the second winding of the Nlayer is measured. Through experimental testing, the output signal is an alternating current represented by using a dot-and-dash line in . As can be seen from , a peak to peak voltage of an input signal is about 10.37 V, and a peak to peak voltage of the output signal is about 9.9 V. As can be learned from , a turns ratio of the high voltage side to the low voltage side is about 1:1. As can be seen from , a total arc length of surrounding arcs of the first winding and the second winding of is greater than one turn, and an experiment result is that the turns ratio is about 1:1. The experiment result proves that the turns ratio is highly correlated to a winding passing through the closed magnetic circuit (referring to ). According to some embodiments, the winding layers of the printed circuit board additionally include a turning region (not shown in the figure), and the turning region is located between the first column winding region and the second column winding region. A winding layer includes a first winding, a connection segment (not shown in the figure), and a second winding that are connected sequentially. This embodiment may be applied to a case that a distance between the first column hole and the second column hole is relatively great.
6
FIG.
6
FIG.
6
FIG.
6
FIG.
6
FIG.
6
FIG.
6
FIG.
110
120
116
110
101
116
117
110
102
117
116
116
116
116
116
116
116
116
116
116
116
117
117
110
116
116
110
r
r
r
r
a
r
r
a
r
b
c
b
c
r
a
r
r
a
r
a
r
r
a
r
r.
In the foregoing embodiments, the winding is a linear conductor such as linear copper foil. However, the winding is not limited thereto, and the winding may be alternatively a sheet conductor such as sheet copper foil. Referring to , is a top view of two winding layers according to some embodiments. presents the two vertically stacked winding layers in a parallel manner, and draws windings such as sheet copper foil in a dotted profile line manner. The winding layers of include a first layer and a second layer . A first winding of the first layer surrounds the first column hole and has a first opening direction , and a second winding of the first layer surrounds the second column hole and has a second opening direction . As described above, a surrounding arc formed by the first winding has two endpoints and (that is, endpoints of an opening of the surrounding arc). A connecting line between the two endpoints and is a chord of the first winding . The first opening direction of the first winding is a direction that is perpendicular to the chord of the first winding , and faces outward. The first opening direction of the first winding faces toward the right side of a viewing angle of . Similarly, the second opening direction of the second winding of the first layer faces toward the left side of the viewing angle of , and is different from the first opening direction of the first winding of the first layer
126
120
101
126
127
120
102
127
126
126
120
127
127
120
126
126
120
r
r
a
r
r
a
a
r
r
a
r
r
a
r
r.
6
FIG.
6
FIG.
A first winding of the second layer surrounds the first column hole and has a first opening direction , and a second winding of the second layer surrounds the second column hole and has a second opening direction . The first opening direction of the first winding of the second layer faces toward the left side of the viewing angle of . Similarly, the second opening direction of the second winding of the second layer faces toward the right side of the viewing angle of , and is different from the first opening direction of the first winding of the second layer
117
110
127
120
107
116
110
117
110
127
120
126
120
107
117
110
127
120
r
r
r
r
r
r
r
r
r
r
r
r
r
r
r
r
6
FIG.
2
FIG. A
6
FIG.
The second winding of the first layer is electrically connected to the second winding of the second layer through a conductive hole . Therefore, in the embodiment of , the first winding of the first layer , the second winding of the first layer , the second winding of the second layer , and the first winding of the second layer are sequentially connected in series. In some embodiments, the conductive hole used for electrically connecting the second winding of the first layer and the second winding of the second layer is a single hole (for example, a single conductive hole shown in ) or a plurality of holes (for example, two rows of conductive holes shown in ).
6
FIG.
6
FIG.
6
FIG.
6
FIG.
116
126
101
117
127
102
116
126
117
127
116
110
126
120
107
116
110
126
120
117
110
127
120
r
r
r
r
r
r
r
r
r
r
r
r
r
r
r
r
r
r
r
r
In the embodiment of , winding directions of the first windings and corresponding to the first column hole are the same, winding directions of the second windings and corresponding to the second column hole are the same, and the winding direction of the first winding or is opposite to the winding direction of the second winding or . As described above, a current is inputted from the first winding of the first layer and the current is outputted from the first winding of the second layer after passing through the second conductive hole (referring to a large arrow shown in the bottom of ). The winding directions of the first winding of the first layer and the first winding of the second layer are clockwise (based on the viewing angle of ), and the winding directions of the second winding of the first layer and the second winding of the second layer are anticlockwise (based on the viewing angle of ).
7
FIG.
7
FIG.
80
82
84
84
86
86
200
200
201
202
84
84
201
86
86
202
200
84
84
86
86
80
82
200
210
220
230
240
291
292
293
200
210
220
230
240
291
210
220
292
220
230
293
230
240
210
220
291
230
240
293
a
b
a
b
a
b
a
b
a
b
a
b
Referring to , is a three-dimensional exploded view of a planar transformer according to some embodiments. The planar transformer includes a first magnetic core , a second magnetic core , two first sub-magnetic columns and , two second sub-magnetic columns and , and a printed circuit board . The printed circuit board is a four-layer board and includes a first column hole and a second column hole . The first sub-magnetic columns and are located in the first column hole , and the second sub-magnetic columns and are located in the second column hole . The printed circuit board , the first sub-magnetic columns and , and the second sub-magnetic columns and are located between the first magnetic core and the second magnetic core . The printed circuit board includes a plurality of winding layers , , , and . In this embodiment, the four-layer board includes three insulating layers, which are respectively a first insulating layer , a second insulating layer , and a third insulating layer . The printed circuit board includes four winding layers, which are respectively a first layer , a second layer , a third layer , and a fourth layer . The first insulating layer is located between the first layer and the second layer , the second insulating layer is located between the second layer and the third layer , and the third insulating layer is located between the third layer and the fourth layer . Therefore, the first layer and the second layer are respectively located on an upper surface and a lower surface of the first insulating layer , and the third layer and the fourth layer are respectively located on an upper surface and a lower surface of the third insulating layer .
7
FIG.
8
FIG.
8
FIG.
7
FIG.
8
FIG.
7
FIG.
8
FIG.
8
FIG.
230
293
240
293
240
230
293
226
220
227
220
236
230
237
230
227
220
237
230
207
226
220
227
220
237
230
236
230
206
206
207
226
236
220
230
206
206
226
236
227
237
220
230
200
a
b
a
b
Referring to and together, is a schematic top view of the winding layers of the printed circuit board in the embodiment of , and presents the vertically stacked four winding layers in a parallel manner (from a top view of ). In the embodiment of , the third layer is located on the upper surface of the third insulating layer , and the fourth layer is located on the lower surface of the third insulating layer . To present the fourth layer better, only the third layer is drawn on the third insulating layer in , and the fourth layer is separately presented in a top view for description together. A first winding of the second layer is electrically connected to a second winding of the second layer . A first winding of the third layer is electrically connected to a second winding of the third layer . The second winding of the second layer and the second winding of the third layer are electrically connected through a second conductive hole . Therefore, the first winding of the second layer , the second winding of the second layer , the second winding of the third layer , and the first winding of the third layer are sequentially connected in series. In some embodiments, first conductive holes and and the second conductive hole are plated through holes. The first windings and of the second layer and the third layer are electrically connected to the first conductive holes and respectively, and based on this, two endpoints of the first windings and and the second windings and that are connected in series of the second layer and the third layer are electrically connected to a surface of the printed circuit board .
216
217
210
201
202
216
210
217
210
216
210
217
210
246
247
240
201
202
246
240
247
240
246
240
247
240
226
227
236
237
220
230
216
217
246
247
210
240
H
L
H
L
9
FIG.
A first winding and a second winding of the first layer respectively surround the first column hole and the second column hole . The first winding of the first layer is not electrically connected to the second winding of the first layer . Therefore, quantities of winding turns of the first winding of the first layer and the second winding of the first layer are substantially one respectively (with a relatively small opening). A first winding and a second winding of the fourth layer respectively surround the first column hole and the second column hole . The first winding of the fourth layer is not electrically connected to the second winding of the fourth layer . Therefore, quantities of winding turns of the first winding of the fourth layer and the second winding of the fourth layer are substantially one respectively (with a relatively small opening). The coils , , , and of the second layer and the third layer are high voltage side coils T(referring to ), and the coils , , , and of the first layer and the fourth layer are low voltage side coils T. Therefore, a turns ratio of the high voltage side coils Tto the low voltage side coils Tis 2:1:1:1:1.
7
FIG.
9
FIG.
9
FIG.
7
FIG.
9
FIG.
90
92
90
94
94
90
94
92
96
92
98
98
98
98
98
98
98
98
216
210
217
210
246
240
247
240
H
H
L
a
b
c
d
a
b
c
d
Referring to and together, is a circuit functional block diagram of the planar transformer in the embodiment of . The planar transformer additionally includes a high voltage side circuit and a low voltage side circuit . The high voltage side circuit is adapted to connect to an input power supply , and the input power supply may be a direct current power supply (as shown in ) or an alternating current power supply. The high voltage side circuit is adapted to convert the input power supply into a predetermined alternating current and then inputs the alternating current into the high voltage side coils T. After the high voltage side coils Treceive the alternating current, an induced current is generated at the low voltage side coils T. The low voltage side circuit rectifies the induced current and then outputs the induced current to a load . The low voltage side circuit includes synchronous rectification circuits , , , and (that is, the foregoing electronic components), and the synchronous rectification circuits , , , and are electrically connected to the corresponding first winding of the first layer , the second winding of the first layer , the first winding of the fourth layer , and the second winding of the fourth layer respectively.
7
FIG.
8
FIG.
9
FIG.
216
217
210
291
98
98
246
247
240
293
98
98
a
b
c
d
In some embodiments, referring to and together, the first winding and the second winding of the first layer are located on the upper surface of the first insulating layer , and are electrically connected to the corresponding synchronous rectification circuits and respectively. The first winding and the second winding of the fourth layer are located on the lower surface of the third insulating layer , and are electrically connected to the corresponding synchronous rectification circuits and respectively. An electrical connection relationship in is formed through the foregoing electrical connections.
7
FIG.
7
FIG.
7
FIG.
98
98
240
98
98
210
200
98
98
98
98
200
200
246
247
240
216
217
210
c
d
a
b
c
d
a
b
In the embodiment of , the two synchronous rectification circuits and corresponding to the fourth layer and the two synchronous rectification circuits and corresponding to the first layer are located on two opposite sides of the printed circuit board , and the embodiments are not limited thereto. In some embodiments, the two synchronous rectification circuits and and the other two synchronous rectification circuits and are located on the same side of the printed circuit board (that is, a left long side of the printed circuit board in ). In this embodiment, opening directions of the first winding and the second winding of the fourth layer and opening directions of the first winding and the second winding of the first layer are the same (facing toward an upper left side of ).
7
FIG.
8
FIG.
2
FIG. C
226
220
227
220
237
230
236
230
88
80
84
84
82
86
86
216
210
217
210
246
240
247
240
96
98
98
98
98
a
b
a
b
a
b
c
d.
Referring to and together again, when a current flows in from the first winding of the second layer , runs through the second winding of the second layer and the second winding of the third layer , and flows out from the first winding of the third layer , a magnetic flux (that is, the foregoing closed magnetic circuit , referring to ) is generated on the first magnetic core , the first sub-magnetic columns and , the second magnetic core , and the two second sub-magnetic columns and , so that the first winding of the first layer , the second winding of the first layer , the first winding of the fourth layer , and the second winding of the fourth layer generate induced currents, and the currents are outputted to the load after being synchronously rectified by the corresponding synchronous rectification circuits , , , and
10
FIG.
11
FIG.
10
FIG.
11
FIG.
10
FIG.
80
82
84
84
86
86
300
300
301
302
84
84
86
86
301
302
300
310
391
320
392
330
393
340
394
350
395
360
396
370
397
380
300
306
306
306
307
307
306
306
306
307
307
306
306
306
307
307
a
b
a
b
a
b
a
b
a
b
c
a
b
a
b
c
a
b
a
b
c
a
b
Referring to and together, is a three-dimensional exploded view of a planar transformer according to some embodiments, and is a circuit functional block diagram of the planar transformer in the embodiment of . The planar transformer includes a first magnetic core , a second magnetic core , two first sub-magnetic columns and , two second sub-magnetic columns and , and a printed circuit board . The printed circuit board is an eight-layer board and includes a first column hole and a second column hole . The first sub-magnetic columns and and the second sub-magnetic columns and are located in the first column hole and the second column hole respectively. The printed circuit board includes seven insulating layers and eight winding layers, which are a first layer (a short name of a first winding layer, and the same below), a first insulating layer , a second layer , a second insulating layer , a third layer , a third insulating layer , a fourth layer , a fourth insulating layer , a fifth layer , a fifth insulating layer , a sixth layer , a sixth insulating layer , a seventh layer , a seventh insulating layer , and an eighth layer sequentially from top to bottom. The printed circuit board includes three first conductive holes , , and , and two second conductive holes and . The first conductive holes , , and run through first extending regions (not shown in the figure), and the second conductive holes and run through second extending regions (not shown in the figure). The first conductive holes are a first sub-conductive hole , a second sub-conductive hole , and a third sub-conductive hole respectively. The second conductive holes are a fourth sub-conductive hole and a fifth sub-conductive hole respectively.
326
320
306
327
320
307
336
330
306
337
330
307
366
360
306
367
360
307
376
370
306
377
370
307
a
a
b
a
b
b
c
b.
In this embodiment, a first winding of the second layer is electrically connected to the first sub-conductive hole , and a second winding of the second layer is electrically connected to the fourth sub-conductive hole . A first winding of the third layer is electrically connected to the second sub-conductive hole , and a second winding of the third layer is electrically connected to the fourth sub-conductive hole . A first winding of the sixth layer is electrically connected to the second sub-conductive hole , and a second winding of the sixth layer is electrically connected to the fifth sub-conductive hole . A first winding of the seventh layer is electrically connected to the third sub-conductive hole , and a second winding of the seventh layer is electrically connected to the fifth sub-conductive hole
326
320
327
320
307
307
337
330
336
330
306
366
360
367
360
307
307
377
370
376
370
306
306
a
a
b
b
b
a
c
H
H
H
Therefore, the first winding of the second layer , the second winding of the second layer , one (the fourth sub-conductive hole ) of the second conductive holes, the second winding of the third layer , the first winding of the third layer , the second sub-conductive hole , the first winding of the sixth layer , the second winding of the sixth layer , another one (the fifth sub-conductive hole ) of the second conductive holes, the second winding of the seventh layer , and the first winding of the seventh layer are connected in series sequentially to form a high voltage side coil T, and two ends of the high voltage side coil Tare the first sub-conductive hole and the third sub-conductive hole respectively. Therefore, inferring from the foregoing experiments, a total quantity of winding turns of the high voltage side coil Tis about 4.
316
317
310
346
347
340
356
357
350
386
387
380
90
306
306
98
98
98
98
92
391
98
98
98
98
92
397
98
98
98
98
98
98
98
98
316
317
346
347
356
357
386
387
98
98
316
317
310
98
346
340
308
98
347
340
308
98
356
350
308
98
357
350
308
98
98
386
387
380
308
386
380
308
387
380
308
316
310
308
317
310
L
H
L
L
a
c
a
b
c
d
e
f
g
h
a
b
c
d
e
f
g
h
a
b
c
c
d
d
e
e
f
f
g
h
c
d
e
f
First and second windings and of the first layer , first and second windings and of the fourth layer , first and second windings and of the fifth layer , and first and second windings and of the eighth layer are low voltage side coils T, and quantities of winding turns are 1 respectively (with a relatively small opening). Therefore, inferring from the foregoing experiments, a turns ratio of the high voltage side coil Tto the low voltage side coils Tis 4:1:1:1:1:1:1:1:1. A high voltage side circuit is electrically connected to the first sub-conductive hole and the third sub-conductive hole . Four synchronous rectification circuits , , , and of a low voltage side circuit are located on two sides of an upper surface of the first insulating layer respectively, and other four synchronous rectification circuits , , , and of the low voltage side circuit are located on two sides of a lower surface of the seventh insulating layer respectively. The synchronous rectification circuits , , , , , , , and are electrically connected to the corresponding windings , , , , , , , and of the low voltage side coils T. Specifically, the synchronous rectification circuits and are electrically connected to the first and second windings and of the first layer respectively, the synchronous rectification circuit is electrically connected to the first winding of the fourth layer through a conductive hole , the synchronous rectification circuit is electrically connected to the second winding of the fourth layer through a conductive hole , the synchronous rectification circuit is electrically connected to the first winding of the fifth layer through a conductive hole , the synchronous rectification circuit is electrically connected to the second winding of the fifth layer through a conductive hole , and the synchronous rectification circuits and are electrically connected to the first and second windings and of the eighth layer respectively. The conductive hole is not electrically connected to the first winding of the eighth layer , the conductive hole is not electrically connected to the second winding of the eighth layer , the conductive hole is not electrically connected to the first winding of the first layer , and the conductive hole is not electrically connected to the second winding of the first layer .
12
FIG.
13
FIG.
12
FIG.
13
FIG.
12
FIG.
80
82
84
84
86
86
400
400
401
402
84
84
86
86
401
402
400
410
491
420
492
430
493
440
494
450
495
460
496
470
497
480
406
406
406
406
407
407
407
407
406
406
407
407
a
b
a
b
a
b
a
b
a
b
a
b
a
b
a
b
a
b
a
b
Referring to and together, is a three-dimensional exploded view of a planar transformer according to some embodiments, and is a circuit functional block diagram of the planar transformer in the embodiment of . The planar transformer includes a first magnetic core , a second magnetic core , two first sub-magnetic columns and , two second sub-magnetic columns and , and a printed circuit board . The printed circuit board is an eight-layer board and includes a first column hole and a second column hole . The first sub-magnetic columns and and the second sub-magnetic columns and are located in the first column hole and the second column hole respectively. The printed circuit board includes seven insulating layers and eight winding layers, which are a first layer (a short name of a first winding layer, and the same below), a first insulating layer , a second layer , a second insulating layer , a third layer , a third insulating layer , a fourth layer , a fourth insulating layer , a fifth layer , a fifth insulating layer , a sixth layer , a sixth insulating layer , a seventh layer , a seventh insulating layer , and an eighth layer sequentially from top to bottom. The printed circuit board includes two first conductive holes and (which may be referred to as a first sub-conductive hole and a second sub-conductive hole respectively) and two second conductive holes and (which may be referred to as a fourth sub-conductive hole and a fifth sub-conductive hole respectively). The two first conductive holes and run through first extending regions (not shown in the figure), and the two second conductive holes and run through second extending regions (not shown in the figure).
426
420
406
406
427
420
407
407
436
430
406
406
437
430
407
407
466
460
406
406
467
460
407
407
476
470
406
406
477
470
407
407
a
a
a
a
b
b
a
a
a
a
b
b
b
b
b
b
In this embodiment, a first winding of the second layer is electrically connected to one (the first sub-conductive hole ) of the two first conductive holes, and a second winding of the second layer is electrically connected to one (the fourth sub-conductive hole ) of the two second conductive holes. A first winding of the third layer is electrically connected to the other (the second sub-conductive hole ) of the two first conductive holes, and a second winding of the third layer is electrically connected to the one (the fourth sub-conductive hole ) of the two second conductive holes. A first winding of the sixth layer is electrically connected to the one (the first sub-conductive hole ) of the two first conductive holes, and a second winding of the sixth layer is electrically connected to the other (the fifth sub-conductive hole ) of the two second conductive holes. A first winding of the seventh layer is electrically connected to the other (the second sub-conductive hole ) of the two first conductive holes, and a second winding of the seventh layer is electrically connected to the other (the fifth sub-conductive hole ) of the two second conductive holes.
426
420
427
420
407
437
430
436
430
1
1
406
406
1
466
460
467
460
407
477
470
476
470
2
2
406
406
2
1
2
406
406
a
a
b
b
a
b
a
b
H
H
H
H
H
H
H
H
H
Therefore, the first winding of the second layer , the second winding of the second layer , the second conductive hole , the second winding of the third layer , and the first winding of the third layer are electrically connected sequentially to form a first coil T, and two ends of the first coil T are electrically connected to the two first conductive holes and respectively. Therefore, inferring from the foregoing experiments, a total quantity of winding turns of the first coil T is about 2. In addition, the first winding of the sixth layer , the second winding of the sixth layer , the second conductive hole , the second winding of the seventh layer , and the first winding of the seventh layer are electrically connected sequentially to form a second coil T. Two ends of the second coil T are electrically connected to the two first conductive holes and respectively. Therefore, inferring from the foregoing experiments, a total quantity of winding turns of the second coil T is about 2. The first coil T and the second coil T are connected in parallel through the two first conductive holes and to form a high voltage side coil T.
416
417
410
446
447
440
456
457
450
486
487
480
90
406
406
98
98
98
98
92
491
98
98
98
98
92
497
98
98
98
98
98
98
98
98
416
417
446
447
456
457
486
487
98
98
98
98
446
447
456
457
408
408
408
408
L
H
L
L
a
b
a
b
c
d
e
f
g
h
a
b
c
d
e
f
g
h
c
d
e
f
c
d
e
f
10
FIG.
12
FIG.
First and second windings and of the first layer , first and second windings and of the fourth layer , first and second windings and of the fifth layer , and first and second windings and of the eighth layer are low voltage side coils T. Inferring from the foregoing experiments, quantities of winding turns thereof are 1 respectively (with a relatively small opening). Therefore, turns ratios of the high voltage side coils Tto the low voltage side coils Tare 2:1:1:1:1 and 2:1:1:1:1. A high voltage side circuit is electrically connected to the two first conductive holes and . Synchronous rectification circuits , , , and of a low voltage side circuit are located on two sides of an upper surface of the first insulating layer respectively, and other four synchronous rectification circuits , , , and of the low voltage side circuit are located on two sides of a lower surface of the seventh insulating layer respectively. The synchronous rectification circuits , , , , , , , and are electrically connected to the corresponding windings , , , , , , , and of the low voltage side coils T. Similar to the embodiment of , the synchronous rectification circuits , , , and of are electrically connected to the corresponding windings , , , and respectively through , , , and , and details are not described herein again.
116
117
110
126
127
120
116
117
110
126
127
120
136
137
130
116
117
110
126
127
120
136
137
130
166
167
116
117
110
126
127
120
226
227
220
236
237
230
326
327
320
336
337
330
366
367
360
376
377
370
426
427
420
436
437
430
466
467
460
476
477
470
2
FIG. A
2
FIG. A
3
FIG. A
3
FIG. A
3
FIG. A
4
FIG. A
4
FIG. A
4
FIG. A
5
FIG. A
6
FIG.
6
FIG.
7
FIG.
7
FIG.
10
FIG.
10
FIG.
10
FIG.
10
FIG.
12
FIG.
12
FIG.
12
FIG.
12
FIG.
m
m
m
m
m
m
m
m
m
r
r
r
r
r
r
Implementation forms such as the S shape (or reverse S shape) substantially presented by the foregoing first or second line shape include, but are not limited to, the first and second windings and of the first layer in , the first and second windings and of the second layer in , the first and second windings and of the first layer in , the first and second windings and of the second layer in , the first and second windings and of the third layer in , the first and second windings and of the first layer in , the first and second windings and of the second layer in , the first and second windings and of the third layer in , the first and second windings and in , the first and second windings and of the first layer in , the first and second windings and of the second layer in , the first and second windings and of the second layer in , the first and second windings and of the third layer in , the first and second windings and of the second layer in , the first and second windings and of the third layer in , the first and second windings and of the sixth layer in , the first and second windings and of the seventh layer in , the first and second windings and of the second layer in , the first and second windings and of the third layer in , the first and second windings and of the sixth layer in , and the first and second windings and of the seventh layer in . Second, in the foregoing implementation forms, the winding direction of the first winding and the winding direction of the second winding that are on the same layer are opposite.
Based on the above, in some embodiments, a winding layer of the planar transformer include a first winding and a second winding that are connected in series. The first winding and the second winding have different opening directions. A winding direction in which the first winding surrounds the first column hole is opposite to a winding direction in which the second winding surrounds the second column hole. Therefore, a designer may adjust opening directions of windings to cooperate with a high voltage side circuit, a low voltage side circuit, and a circuit layout requirement, to increase the design flexibility. In some embodiments, the conductive holes run through the extending regions, and the windings of the plurality of winding layers are electrically connected through the conductive holes. In this way, the conductive holes do not need to be configured in the column winding region, so that circuit layout is more flexible. In some embodiments, the conductive holes are all plated through holes, so that the printed circuit board of the planar transformer has no buried via hole or blind via hole, so that the printed circuit board has lower manufacture costs, a high yield rate, and high reliability. | |
The state bird of Uttarakhand, and and incredibly beautiful bird. In Chopta and by most temples this is a commonly seen bird that will come up close, and happily eat handouts of rice and other tidbits from visitors and residents alike.
This one is shot in Kedarnath Reserve National Park, and is in wild and natural settings, but on my ascent to Tungnath I encountered many of them roaming the alpine meadows.
The iridescent plumage of the male is mesmerizing and like an explosion of colors in a bland landscape nobody will miss.
It sounds like this: | https://www.ross.no/2018/04/29/himalayan-monal-lophophorus-impejanus-2/ |
Increasing attention is being given to the role of a positive school interpersonal climate in children's school functioning and social-emotional development. Children's perceptions are commonly used to measure the interpersonal school climate, but the individual and contextual characteristics that contribute to variation in children's perceptions remain unclear. This study examines the direct and interactive effects of multiple individual child characteristics and school-level interpersonal climate on elementary schoolchildren's perceptions of negative interpersonal climate and feeling afraid at school. Demographic, social-cognitive, behavioral, and academic characteristics are examined at the individual level. School context variables capturing interpersonal climate include school-level aggregated children's perceptions of negative climate and teacher perceptions of student respect, safety and teacher affiliation. Data come from 4,016 4th graders from 83 public elementary schools. At the child level, results indicate that children's empathy, victimization, and academic competence explained significant variation in at least 1 of the 2 outcomes in the expected direction. Girls also reported feeling more afraid. The associations for Black children between victimization and climate and behavioral problems and climate were weaker. For Hispanic children, the association was weaker between academic competence and feeling afraid and stronger between engagement and feeling afraid. At the school level, aggregated children's perceptions of climate were most strongly associated with both outcomes. Teacher affiliation and teacher-rated student respect-safety moderated the association between engagement and children's perceptions of negative interpersonal climate. These interactions are discussed in relation to existing theory and research, as are implications for policy and future research. | https://nyuscholars.nyu.edu/en/publications/multilevel-view-of-predictors-of-childrens-perceptions-of-school- |
CROSS-REFERENCE TO RELATED APPLICATIONS
TECHNICAL FIELD
BACKGROUND
BRIEF SUMMARY
DETAILED DESCRIPTION OF THE DRAWINGS
Locking the Deadbolt Assembly
Unlocking the Deadbolt Assembly
Low Battery Deadbolt Assembly
Low Battery FOB
Power Up Mode
This application is a continuation of U.S. patent application Ser. No. 15/397,515 filed on Jan. 3, 2017. The above-referenced application is incorporated by reference in its entirety.
The disclosure relates generally to a deadbolt lock assembly with a visual feedback mechanism to communicate the movements of the lock to the user.
As many items being used in everyday life have become enhanced with wireless and remote type communications, the need to communicate effectively with the user the movements of these devices has become more important. For example, if a user has a wireless entry mechanism such as a lock for a door that can be locked and unlocked using a wireless communication device, the lock may unlock or lock without the user physically touching the lock. Without that physical touch, the user may not have confirmation that the lock has successfully locked or unlocked the door. Thus, a lock assembly that can provide visual feedback to a user to effectively communicate the movements of the lock assembly would be beneficial.
Aspects of this disclosure relate a deadbolt lock assembly that includes a latch for locking and unlocking a door in which the deadbolt lock assembly is engaged and an exterior assembly in communication with the latch. The exterior assembly may comprise a face plate, a keyway, and a plurality of LEDs. The plurality of LEDs may be aligned in a horizontal linear array located on the face plate wherein the linear array has a first end furthest from a door jamb and a second end nearest the door jamb. The plurality of LEDs may be arranged in a horizontal linear array and may be oriented substantially parallel to the latch.
Additionally, the deadbolt lock assembly may comprise a processor, wherein the processor is connected to a power source and the plurality of LEDs. The deadbolt lock assembly may further comprise a non-transitory computer readable medium storing computer readable instructions that, when executed by the processor, causes the processor to at least: authenticate a signal from a wireless device to move the latch to a locked position or an unlocked position; instruct the plurality of LEDs to illuminate in a lock sequence when the signal is to move the latch to the locked position; and instruct the plurality of LEDs to illuminate in an unlock sequence when the signal is to move the latch to the unlocked position, wherein the lock sequence is different than the unlock sequence.
1
2
3
The lock sequence may include illuminating the LEDs in a sequence that moves in the same direction as the movement of the latch from the unlocked position to the locked position such that the LED sequence moves toward the door jamb. Further, the lock sequence may include the plurality of LEDs illuminating starting with a first LED nearest the first end illuminates first and then each remaining LED individually and sequentially illuminates starting with the LED immediately next to the first LED after a predetermined time, T, until all of the plurality of LEDs are illuminated. Lastly, the lock sequence may further include wherein upon waiting a predetermined time, T, instruct all of the plurality of LEDs to turn off; and upon waiting a predetermined time, T, instruct a first and a second LED nearest the second end of the horizontal linear array to illuminate.
1
2
3
The unlock sequence may include illuminating the LEDs in a sequence to illuminate in a pattern that moves in the same direction as the movement of the latch from the locked position to the unlocked position such that the LED sequence moves away from the door jamb away from the door jamb. The unlock sequence may further include the plurality of LEDs illuminating starting with a first LED nearest the second end illuminates first and then each remaining LED individually and sequentially illuminates after a predetermined time, T, until all of the plurality of LEDs are illuminated. Lastly, the unlock sequence may further include upon waiting a predetermined time, T, instruct all of the plurality of LEDs to turn off; and upon waiting a predetermined time, T, instruct a first and a second LED nearest first end of the horizontal linear array to illuminate.
In another aspect of the invention, the deadbolt lock assembly may comprise a processor, wherein the processor is connected to a power source and the plurality of LEDs, and a non-transitory computer readable medium storing computer readable instructions that, when executed by the processor, causes the processor to at least: determine when a power level of the power source is below a predetermined threshold limit; and upon determining the power level of the power source is below the predetermined threshold limit, instruct the plurality of LEDs to illuminate in a low power sequence, wherein the low power sequence includes the plurality of LEDs illuminating with the most centrally located LEDs illuminating and remaining illuminated for a predetermined time, T.
In yet another aspect of the invention, the deadbolt lock assembly may comprise a processor, wherein the processor is connected to a power source and the plurality of LEDs, and a non-transitory computer readable medium storing computer readable instructions that, when executed by the processor, causes the processor to at least: determine when a power level of a key fob is below a predetermined threshold limit; and upon determining the power level of the key fob is below a predetermined limit, instruct the outermost located LEDs to illuminate and remain illuminated for a predetermined time, T.
In another aspect of the invention, the deadbolt lock assembly may comprise a processor, wherein the processor is connected to a power source and the plurality of LEDs, and a non-transitory computer readable medium storing computer readable instructions that, when executed by the processor, causes the processor to at least: during a power up phase, instruct all of the plurality of LEDs to illuminate with a first color; after a predetermined time, T, instruct all of the plurality of LEDs to illuminate and change from the first color to a second color different from the first color; and after another predetermined time, T, instruct all of the plurality of LEDs to illuminate and change from the second color to a third color different from the first color and the second color.
In the following description of various example structures according to the invention, reference is made to the accompanying drawings, which form a part hereof, and in which are shown by way of illustration various example devices, systems, and environments in which aspects of the invention may be practiced. It is to be understood that other specific arrangements of parts, example devices, systems, and environments may be utilized and structural and functional modifications may be made without departing from the scope of the present invention.
Also, while the terms “top,” “bottom,” “front,” “back,” “side,” “rear,” and the like may be used in this specification to describe various example features and elements of the invention, these terms are used herein as a matter of convenience, e.g., based on the example orientations shown in the figures or the orientation during typical use. Nothing in this specification should be construed as requiring a specific three dimensional orientation of structures in order to fall within the scope of this invention. The reader is advised that the attached drawings are not necessarily drawn to scale.
The following terms are used in this specification, and unless otherwise noted or clear from the context, these terms have the meanings provided below.
“Plurality,” as used herein, indicates any number greater than one, either disjunctively or conjunctively, as necessary, up to an infinite number.
FIGS. 1A and 1B
FIG. 1A
FIG. 1A
FIG. 1B
100
100
10
102
10
100
102
12
12
102
12
102
12
12
102
102
100
104
102
104
106
110
106
104
108
106
102
108
110
110
112
12
114
12
110
102
102
102
102
110
illustrate exploded views of the exterior of an exemplary deadbolt lock assembly . The deadbolt lock assembly may be used for a door such as an entryway door into a dwelling. The deadbolt lock assembly may comprise a latch for locking and unlocking the door in which the deadbolt lock assembly is engaged. The latch may be oriented substantially perpendicular to a door jamb and be configured to extend away from the door jamb where the latch is extended beyond the door jamb as shown in . illustrates the locked position. Similarly, illustrates the unlocked position where the latch is retracted toward the door jamb and does not extend beyond the door jamb . The latch may be a similar to any deadbolt type latch known to own skilled in the art. The latch may be oriented in a substantially horizontal orientation or alternatively may be oriented in a vertical or angled orientation. The deadbolt lock assembly may further comprise an exterior assembly that is in communication with the latch via a mechanical engagement as known to one skilled in the art. The exterior assembly may also comprise a face plate , and a plurality of LEDs aligned in a horizontal linear array on the face plate . Alternatively, the exterior assembly may further comprise a keyway positioned on the face plate , wherein the latch is independently movable when a matching key is inserted into the keyway and turned. The plurality of LEDs may be evenly spaced apart or alternatively, may not be evenly spaced apart. The plurality of LEDs may be arranged in a linear array having a first end positioned furthest away from the door jamb and a second end positioned nearest to the door jamb . The plurality of LEDs may be oriented substantially parallel to the orientation of the latch and the movement of the latch when the latch moves from an unlocked position to a locked position or alternatively when the latch moves from a locked position to an unlocked position. The plurality of LEDs may comprise any number of LEDs, such as five LEDs as shown in the exemplary embodiment or may comprise 3 LEDs, 4 LEDs, 6 LEDs, 7 LEDs or even more.
FIGS. 1A-1B and 4-9B
110
140
12
112
142
140
12
144
110
146
144
114
148
114
For example, in the exemplary embodiment shown in , the plurality of LEDs comprises five LEDs, arranged horizontally in a linear array. LED is the LED furthest from the door jamb and nearest the first end , LED is positioned next to LED closer to the door jamb , LED is positioned in the center of the plurality of LEDs , LED is next to the center LED moving toward the second end , and lastly LED is nearest the second end .
110
102
110
112
140
112
1
142
140
110
102
12
110
102
110
114
148
114
1
146
148
110
102
12
FIG. 1A
FIG. 1B
In the exemplary embodiment, the plurality of LEDs may be configured such that when the latch is moved from an unlocked position to the locked position shown in , the plurality of LEDs may illuminate in a sequence starting at the first end of the linear array with the LED nearest the first end illuminating first and then each remaining LED individually and sequentially illuminating after a predetermined time, T, starting with the LED immediately next to the first LED until all of the plurality of LEDs are illuminated into a locked position. The plurality of LEDs being illuminated in this sequence visually communicates to the user the movement of the latch away from the door jamb . Similarly, the plurality of LEDs may be configured such that when the latch is moved from the locked position to the unlocked position shown in , the plurality of LEDs may illuminate in a sequence starting at the second end of the linear array with the LED nearest the second end illuminating first and then each remaining LED individually and sequentially illuminating after a predetermined time, T, starting with the LED immediately next to the first LED until all of the plurality of LEDs are illuminated. The plurality of LEDs being illuminated in this sequence visually communicates to the user the movement of the latch toward from the door jamb into an unlocked position.
FIG. 2
100
120
122
124
126
102
120
20
100
In addition, as shown in , the deadbolt assembly may also include a sensor , a processor , a power source or battery , and an electromechanical device configured to move the latch from a locked to an unlocked position. The sensor may be configured to receive a wireless signal from a key fob or other wireless device . The signal may instruct the deadbolt assembly to move from a locked position to an unlocked position or alternatively from an unlocked position to a locked position.
10
104
102
104
102
124
122
122
The deadbolt assembly may also include an interior assembly that may be mounted to the opposite side of the door from the exterior assembly . The interior assembly may connect to the latch as well as connect to the exterior assembly . The interior assembly may further comprise a manual switch to move the latch from a locked position to an unlocked position or alternatively from an unlocked position to a locked position. The interior assembly may further comprise a removable cover that allows the user access to the power source or battery . The processor may be a general-purpose processor, a digital signal processor (DSP), an application-specific integrated circuit (ASIC), a field programmable gate array (FPGA) or other programmable logic device, discrete gate or transistor logic, discrete hardware components, or any combination thereof designed to perform the functions described herein. A general-purpose processor may be a microprocessor, or any conventional processor, controller, microcontroller, or state machine. A processor may also be implemented as a combination of computing devices, e.g., a combination of a DSP and a microprocessor, a plurality of microprocessors, one or more microprocessors in conjunction with a DSP core, or any other such configuration. The one or more implementations described throughout this disclosure may utilize logical blocks, modules, and circuits that may be implemented or performed with a processor .
122
122
122
122
100
The processor may be used to implement various aspects and features described herein. As such, the processor may be configured to execute multiple calculations, in parallel or serial and may execute coordinate transformations, curve smoothing, noise filtering, outlier removal, amplification, and summation processes, and the like. The processor may include a processing unit and system memory to store and execute software instructions. The processor may include a non-transitory computer readable medium that stores computer readable instructions that, when executed by the processor, causes the processor to perform specific functions with the deadbolt assembly .
124
126
102
The power source may be a battery or other type of electrical power source. While the electromechanical device may be any device known to own skilled in the art to convert electrical energy to mechanical movement to extend and retract the latch .
200
110
122
122
126
102
122
110
102
102
122
124
122
110
FIG. 3
The process for illuminating the plurality of LEDs during the locking and unlocking process is shown in . Upon receiving the signal, the processor may determine if there are any errors within the system. If there are no errors, the processor may instruct the electromechanical device to move the latch either to a locked position to an unlocked position or alternatively from an unlocked position to a locked position. In addition, the processor may instruct the plurality of LEDs to illuminate or light up in a directional pattern that moves in the same direction as the latch to indicate the direction the latch moved. If the processor determines any errors within the system, such as a low power remaining within the battery , the processor may instruct the plurality of LEDs to light up in a specific pattern depending upon the error to effectively communicate the error to the user to troubleshoot the system. This will be described in more detail below.
122
122
110
114
112
114
122
While the processor is authenticating the signal from the wireless device, the processor may instruct the plurality of LEDs to illuminate a pair of LEDs in a sweeping motion such that a first and a second LED nearest the second end are illuminated where the first and second LED are adjacent each other, then after a 150 ms delay, the first LED is turned off and a third LED is illuminated, where the third LED is adjacent the second LED. Similarly, after another 150 ms delay, the second LED is turned off while a fourth LED is illuminated, where the fourth LED is adjacent the third LED. This process is repeated until the two LEDs nearest the first end are illuminated. Then, the sweeping motion is reversed where the LEDs that are illuminated move back toward the second end . This process may be repeated as necessary while the processor is authenticating the signal. This LED illumination pattern during the authentication process may communicate to the user that the signal has been received.
122
122
126
102
110
102
12
Once the processor has authenticated the signal to lock the deadbolt assembly, the processor may instruct electromechanical device to extend the latch to a locked position and also instruct the plurality of LEDs to light up or illuminate in a lock sequence that moves in the same direction movement of the extended latch such that the LED sequence moves toward the door jamb .
122
100
122
110
102
12
122
140
1
142
140
140
142
1
144
140
142
144
1
146
140
142
144
146
1
148
140
142
144
146
148
2
3
146
148
114
4
FIGS. 4A-4G
Once the processor has authenticated the signal to lock the deadbolt assembly , the processor may instruct the plurality of LEDs to visually communicate the directional illumination pattern/sequence that the latch moves toward the door jamb as shown in . Starting with all of the LEDs turned off, the processor may instruct LED to be illuminated. Next, after a predetermined amount of time, T, the LED immediately next to LED may be illuminated, such that both LEDs and may be illuminated. Next, again after the predetermined amount of time, T, LED may be illuminated, such that three LEDs , , and are illuminated. Again after a predetermined amount of time, T, LED may be illuminated, such that four LEDs , , , and are illuminated. Lastly, after a predetermined amount of time, T, LED may be illuminated, such that all five LEDs , , , , and are illuminated. In addition to the locking sequence, or as an alternative to the animated locking sequence, after a second predetermined amount of time, T, all of the LEDs may turn off and then after a third predetermined amount of time, T, only the two LEDs , nearest the second end may be illuminated and remain illuminated for a predetermined amount of time, T. Table 1 below shows the time interval, which LEDs may be illuminated, and the corresponding figure for each stage of the lock sequence.
TABLE 1
EXEMPLARY LOCKING SEQUENCE - LOCKING MOVEMENT
LED SEQUENCE
EXEMPLARY
TIME
CORRESPONDING
INTERVAL
LEDs ILLUMINATED
FIG.
—
NONE
FIG. 4A
T0
Single LED 140 furthest from
FIG. 4B
Door Jamb
T1
Two LEDS 140, 142
FIG. 4C
T1
Three LEDS 140, 142, 144
FIG. 4D
T1
Four LEDs 140, 142, 144, 146
FIG. 4E
T1
ALL LEDs 140, 142, 144, 146,
FIG. 4F
148
T2
NONE
FIG. 4A
T3
LEDs 146, 148
FIG. 4G
T4
NONE
FIG. 4A
122
100
122
110
102
12
110
122
140
1
142
140
140
142
1
144
142
144
1
146
144
146
1
148
146
148
2
3
146
148
114
4
Alternatively, once the processor has authenticated the signal to lock the deadbolt assembly , the processor may instruct the plurality of LEDs to visually communicate the directional illumination pattern that the latch moves toward the door jamb with a single LED sweeping motion across the plurality of LEDs . Starting with all of the LEDs turned off, the processor may instruct LED to be illuminated. Next, after a predetermined amount of time, T, the LED immediately next to LED may be illuminated, while turning off LED such that only LED may be illuminated. Next, again after the predetermined amount of time, T, LED may be illuminated, while turning off LED , such that only LEDs may be illuminated. Again after a predetermined amount of time, T, LED may be illuminated, while turning off LED , such that only LED may be illuminated. Lastly, after a predetermined amount of time, T, LED may be illuminated, while turning off LED , such that only LED is illuminated. Similar to described above, after a second predetermined amount of time, T, all of the LEDs may turn off and then after a third predetermined amount of time, T, only the two LEDs , nearest the second end may be illuminated and remain illuminated for a predetermined amount of time, T. Table 2 below shows the time interval and which LEDs may be illuminated for each stage of the lock sequence.
TABLE 2
ALTERNATE LOCKING SEQUENCE - LOCKING MOVEMENT
LED SEQUENCE
EXEMPLARY
TIME INTERVAL
LEDs ILLUMINATED
—
NONE
T0
Single LED 140 furthest from
Door Jamb
T1
LED 142
T1
LED 144
T1
LED 146
T1
LED 148
T2
NONE
T3
LEDs 146, 148
T4
NONE
122
100
122
110
102
12
122
140
1
142
140
140
142
140
142
1
144
140
142
144
1
146
142
144
146
1
148
144
146
148
2
3
146
148
114
4
102
110
As yet another alternate directional illumination pattern for the locking sequence, once the processor has authenticated the signal to lock the deadbolt assembly , the processor may instruct the plurality of LEDs to visually communicate the directional illumination pattern that the latch moves toward the door jamb with a two LED sweeping motion. Starting with all of the LEDs turned off, the processor may instruct LED to be illuminated. Next, after a predetermined amount of time, T, the LED immediately next to LED may be illuminated, such that only LEDs and may be illuminated. (As an alternate option, both LEDs and may be illuminated as the initial step). Next, again after the predetermined amount of time, T, LED may be illuminated, while turning off LED , such that only LEDs and may be illuminated. Again after a predetermined amount of time, T, LED may be illuminated, while turning off LED , such that only LEDs and may be illuminated. Lastly, after a predetermined amount of time, T, LED may be illuminated, while turning off LED , such that only LED and may be illuminated. Similar to described above, after a second predetermined amount of time, T, all of the LEDs may turn off and then after a third predetermined amount of time, T, only the two LEDs , nearest the second end may be illuminated and remain illuminated for a predetermined amount of time, T. Table 3 below shows the time interval and which LEDs may be illuminated for each stage of the lock sequence. Other embodiments of a directional illumination pattern to visually communicate the movement of the latch using a linear array of LEDs from an unlocked position to a locked position may be obvious to one skilled in the art.
TABLE 3
ALTERNATE LOCKING SEQUENCE - LOCKING MOVEMENT
LED SEQUENCE
EXEMPLARY
TIME INTERVAL
LEDs ILLUMINATED
—
NONE
T0
Single LED 140 furthest from
Door Jamb
T1
LEDs 140, 142
T1
LEDs 142, 144
T1
LEDs 144, 146
T1
LEDs 146, 148
T2
NONE
T3
LEDs 146, 148
T4
NONE
0
102
0
1
0
2
3
4
110
1
2
1
2
3
146
148
12
102
12
3
0
1
2
4
146
148
4
1
2
3
4
4
110
100
An exemplary embodiment of the time sequence is described below. The predetermined time, T, may be the amount of time before the first LED illuminates after the processor has authenticated the signal to move the latch to the locked position. T may be approximately 150 ms or within a range of 100 ms to 200 ms. The predetermined time interval, T, may be less than the time intervals T, T, T, and T to give the appearance of motion as the plurality of LEDs illuminate in succession. For example, T may be approximately 100 ms or within a range of 50 ms to 150 ms. T is the time that all of the LEDs remain illuminated after they have been sequentially illuminated and may be greater than the time interval T. For instance, T may be approximately 300 ms or within the range of 200 ms to 400 ms. T is the time that the LEDs remain turned off after sequentially illuminating. An additional signal may be sent so that the two LEDs , closest to the door jamb may be illuminated to give another indication that the latch was moved toward the door jamb to the locked position. The time interval, T, may be greater than T, T, and T and may be approximately 1400 ms or within a range of 800 ms to 2000 ms. Lastly, T is the time that the LEDs , remain illuminated. T may be greater than T, T, and T to give the user the longest visual cue that the latch has been moved to the locked position. T may be approximately 2000 ms or within a range of 1500 ms to 3000 ms. After the time interval T, the LEDs remain turned off until the next interaction of the deadbolt lock assembly with the user.
102
100
122
122
126
102
12
110
12
110
112
12
114
12
The process for visually communicating the unlocking motion of the latch of the deadbolt assembly is similar to the visual communication for the locking motion. Once the processor has authenticated the signal to unlock the deadbolt assembly, the processor may instruct electromechanical device to move the latch in a direction away from the door jamb and also instruct the plurality of LEDs to light up or illuminate in a pattern that moves in the same direction away from the door jamb . As discussed above, the plurality of LEDs may be arranged horizontally in a linear orientation having a first end positioned furthest away from the door jamb and a second end positioned nearest to the door jamb .
104
102
12
122
100
122
110
102
12
110
0
148
1
146
148
148
146
1
144
148
146
144
1
142
148
146
144
142
1
140
148
146
144
142
140
2
3
142
140
112
4
FIGS. 5A-5G
For example, the exemplary embodiment of the exterior assembly shown illustrate the unlock sequence of the plurality of LEDs as they light up to show the movement of the latch away from the door jamb . Once the processor has authenticated the signal to unlock the deadbolt assembly , the processor may instruct the plurality of LEDs to visually communicate the directional illumination pattern/sequence that the latch moves away from the door jamb . Starting with all of the LEDs turned off, after a predetermined time interval, T, the LED may be illuminated. Next after a predetermined amount of time, T, the LED immediately next to LED is illuminated, such that both LEDs and may be illuminated. Next, again after the predetermined amount of time, T, LED may be illuminated, such that three LEDs , , and are illuminated. Again after a predetermined amount of time, T, LED may be illuminated, such that four LEDs , , , and are illuminated. Lastly, after a predetermined amount of time, T, LED may be illuminated, such that all five LEDs , , , , and are illuminated. In addition to the unlocking sequence, or as an alternative to the animated unlocking sequence, after a second predetermined amount of time, T, all of the LEDs may turn off and then after a third predetermined amount of time, T, only the two LEDs , nearest the first end may be illuminated and remain illuminated for a predetermined amount of time, T. Table 4 below shows the time interval, which LEDs are illuminated, and the corresponding figure for each stage in the unlock sequence.
TABLE 4
EXEMPLARY UNLOCKING SEQUENCE - UNLOCKING
MOVEMENT LED SEQUENCE
EXEMPLARY
TIME
CORRESPONDING
INTERVAL
LEDs ILLUMINATED
FIG.
—
NONE
FIG. 5A
T0
Single LED 148 nearest to Door
FIG. 5B
Jamb
T1
Two LEDS 148, 146
FIG. 5C
T1
Three LEDS 148, 146, 144
FIG. 5D
T1
Four LEDs 148, 146, 144, 142
FIG. 5E
T1
ALL LEDs 148, 146, 144, 142,
FIG. 5F
140
T2
NONE
FIG. 5A
T3
LEDs 142, 140
FIG. 5G
T4
NONE
FIG. 5A
122
100
122
110
102
12
110
110
0
148
1
146
148
148
146
1
144
146
144
1
142
144
142
1
140
142
140
2
3
142
140
112
4
Alternatively, once the processor has authenticated the signal to unlock the deadbolt assembly , the processor may instruct the plurality of LEDs to visually communicate the directional pattern/sequence that the latch moves away from the door jamb with a single LED sweeping motion across the plurality of LEDs . Starting with all of the LEDs turned off, after a predetermined time interval, T, the LED may be illuminated. Next after a predetermined amount of time, T, the LED immediately next to LED is illuminated, while turning off LED , such that only LED may be illuminated. Next, again after the predetermined amount of time, T, LED may be illuminated, while turning off LED , such that only LED may be illuminated. Again after a predetermined amount of time, T, LED may be illuminated, while turning off LED , such that only LED may be illuminated. Lastly, after a predetermined amount of time, T, LED may be illuminated, while turning off LED , such that only LEDs may be illuminated. Similarly to described above, after a second predetermined amount of time, T, all of the LEDs may turn off and then after a third predetermined amount of time, T, only the two LEDs , nearest the first end may be illuminated and remain illuminated for a predetermined amount of time, T. Table 5 below shows the time interval and which LEDs are illuminated for each stage in the unlock sequence.
TABLE 5
ALTERNATE UNLOCKING SEQUENCE - UNLOCKING
MOVEMENT LED SEQUENCE
EXEMPLARY
TIME INTERVAL
LEDs ILLUMINATED
—
NONE
T0
Single LED 148 nearest to Door
Jamb
T1
LED 146
T1
LED 144
T1
LED 142
T1
LED 140
T2
NONE
T3
LEDs 142, 140
T4
NONE
122
100
122
110
102
12
122
148
1
146
148
148
146
140
142
1
144
148
146
144
1
142
146
144
142
1
140
144
142
140
2
3
142
140
112
4
102
110
As yet another alternate directional illumination pattern for the unlocking sequence, once the processor has authenticated the signal to lock the deadbolt assembly , the processor may instruct the plurality of LEDs to visually communicate the directional illumination pattern that the latch moves away from the door jamb with a two LED sweeping motion. Starting with all of the LEDs turned off, the processor may instruct LED to be illuminated. Next, after a predetermined amount of time, T, the LED immediately next to LED may be illuminated, such that only LEDs and may be illuminated. (As an alternate option, both LEDs and may be illuminated as the initial step). Next, again after the predetermined amount of time, T, LED may be illuminated, while turning off LED , such that only LEDs and may be illuminated. Again after a predetermined amount of time, T, LED may be illuminated, while turning off LED , such that only LEDs and may be illuminated. Lastly, after a predetermined amount of time, T, LED may be illuminated, while turning off LED , such that only LED and may be illuminated. Similar to described above, after a second predetermined amount of time, T, all of the LEDs may turn off and then after a third predetermined amount of time, T, only the two LEDs , nearest the first end may be illuminated and remain illuminated for a predetermined amount of time, T. Table 6 below shows the time interval and which LEDs may be illuminated for each stage of the lock sequence. Other embodiments of a directional illumination pattern to visually communicate the movement of the latch using a linear array of LEDs from an unlocked position to a locked position may be obvious to one skilled in the art.
TABLE 6
ALTERNATE UNLOCK SEQUENCE - UNLOCKING
MOVEMENT LED SEQUENCE
EXEMPLARY
TIME INTERVAL
LEDs ILLUMINATED
—
NONE
T0
Single LED 148 nearest to Door
Jamb
T1
LEDs 148, 146
T1
LEDs 146, 144
T1
LEDs 144, 142
T1
LEDs 142, 140
T2
NONE
T3
LEDs 142, 140
T4
NONE
0
102
0
1
0
2
3
4
110
1
2
1
2
3
142
140
12
102
12
3
0
1
2
4
142
140
4
1
2
3
4
4
110
100
An exemplary embodiment of the time sequence is described below. The predetermined time, T, may be the amount of time before the first LED illuminates after the processor has authenticated the signal to move the latch to the locked position. T may be approximately 150 ms or within a range of 100 ms to 200 ms. The predetermined time interval, T, may be less than the time intervals T, T, T, and T to give the appearance of motion as the plurality of LEDs illuminate in succession. For example, T may be approximately 100 ms or within a range of 50 ms to 150 ms. T is the time that all of the LEDs remain illuminated after they have been sequentially illuminated and may be greater than the time interval T. For instance, T may be approximately 300 ms or within the range of 200 ms to 400 ms. T is the time that the LEDs remain turned off after sequentially illuminating until an additional signal is given of the two LEDs , closest to the door jamb may be illuminated to give another indication that the latch was moved toward the door jamb to the locked position. The time interval, T, may be greater than T, T, and T and may be approximately 1400 ms or within a range of 800 ms to 2000 ms. Lastly, T is the time that the LEDs , remain illuminated. T may be greater than T, T, and T to give the user the longest visual cue that the latch has been moved to the locked position. T may be approximately 2000 ms or within a range of 1500 ms to 3000 ms. After the time interval T, the LEDs remain turned off until the next interaction of the deadbolt lock assembly with the user.
110
100
100
102
102
110
102
102
110
102
110
102
In addition, or optionally to the visual communication provided by the plurality of LEDs , the deadbolt lock assembly may also provide audible feedback to the user. This audible feedback may be different when communicating the locking motion than when communicating the unlocking motion. For example, the deadbolt lock assembly may produce a single audible tone or “BEEP” to communicate that the latch has been moved from the unlocked position to the locked position or two audible tones or “BEEPS” to communicate that the latch has been moved from the locked position to the unlocked position. As another option, the plurality of LEDs may light up in a different color for displaying the visual feedback for the movement of the latch from an unlocked position to a locked position or for the movement of the latch from a locked position to an unlocked position. For example, the plurality of LEDs may illuminate in an “AMBER” color when visually communicating the movement of the latch from an unlocked position to a locked position and the plurality of LEDs may illuminate in a “GREEN” color when visually communicating the movement of the latch from a locked position to an unlocked position.
102
122
124
100
122
124
122
110
110
5
142
144
146
5
124
5
FIG. 6
In addition to communicating the direction of the latch movement, the plurality of LEDs may also communicate other information to the user. For example, the processor may determine if the power level of the power source in the deadbolt lock assembly is below a predetermined threshold level. If the processor determines the power level of the power source is low, the processor may instruct the plurality of LEDs to illuminate in a low power sequence and a specific pattern such as the most centrally located group of LEDs may illuminate for a predetermined time, T. For example, in the exemplary embodiment shown in , the three central LEDs , , may illuminate for the predetermined time, T, to communicate to the user that the battery is low and needs to be replaced soon. The predetermined time T may be approximately 3000 ms or within a range of 2000 ms to 4000 ms.
120
20
122
110
6
140
148
6
6
FIG. 7
As another example of visually communicating other information to the user, within the signal received by the sensor may be the remaining battery life within the key fob or wireless device . The processor may determine when if power level of a key fob is below a predetermined threshold limit; and then upon determining the power level of the key fob is below a predetermined limit, then instruct the outermost located individual LEDs of the plurality of LEDs to illuminate for a predetermined time, T. For example, in the exemplary embodiment shown in , the two outer LEDs , may illuminate for the predetermined time, T, to communicate to the user that the battery within the key fob is low and needs to be replaced soon. The time T may be approximately 3000 ms or within a range of 2000 ms to 4000 ms.
110
100
124
100
100
100
By providing visual feedback to the user of illuminating the most centrally located or innermost group of LEDs of the linear array, the visual communication of the deadbolt assembly may imply to the user that the battery inside the deadbolt assembly may be low making it easier for the user to troubleshoot a problem compared to the difficulty for the user of remembering various illumination patterns or referring to a manual. Similarly, by visually communicating to the user by illuminating the outermost LEDs of the linear array, the visual communication of the deadbolt assembly may imply to the user that the battery of the key fob, which is outside the deadbolt assembly , may be low making it easier for the user to troubleshoot a problem compared to the difficulty of remembering various illumination patterns or referring to a manual.
110
110
As another option, the plurality of LEDs may light up in a different color when communicating low battery information than for displaying the visual feedback for the locking and unlocking motion. For example, the plurality of LEDs may light up in a “RED” color when communicating low battery information.
100
122
110
7
110
7
7
110
110
7
7
FIG. 8
As another example of communicating other information to the user, during the boot up mode or power up mode of the system , as shown in , the processor may instruct all of plurality of LEDs to illuminate in cycles, such that each cycle lasts for a predetermined time, T, and that during each cycle the LEDs light up in a different color. The plurality of LEDs may illuminate with a first color and after a predetermined time, T, change from the first color to a second color, then after another predetermined time, T, change from the second color to a third color. This cycle may repeat for up to as many seven cycles, with the plurality of LEDs being a different color for each cycle. For example, in the exemplary embodiment, the plurality of LEDs may all light up and cycle from “WHITE,” then “AMBER,” then “RED,” then “MAGENTA,” then “BLUE,” then “GREEN”, then back to “WHITE,” where the plurality of LEDs stay illuminated during each cycle for the predetermined time, T. The predetermined time T may be approximately 350 ms for each color, or within a range of 250 ms to 450 ms for each color.
By providing visual feedback to the user of illuminating all of the LEDs in sequence and cycling through all of the colors during the power up mode visually communicates to the user gives clear visual feedback to the user that the all of the LEDs are working properly.
FIGS. 1 and 4A-8
FIGS. 9A-9B
104
104
104
106
104
110
108
104
It is noted that while the depict an exterior assembly with one desired aesthetic appearance, it is noted that exterior assembly may have any desired shape and/or configuration to achieve any desired aesthetic appearance. For example, show alternate shapes of the exterior assembly . Additionally, the appearance of the faceplate of the exterior assembly may have alternative shapes and configurations as well including but not limited alternative sizes, shapes, and/or relative positions of the LED strip and the keyway . Accordingly, the exterior assembly is not limited to the shapes shown in this disclosure.
While various embodiments have been described, it will be apparent to those of ordinary skill in the art that many more embodiments and implementations are possible that are within the scope of the claims. The various dimensions or time ranges described above are merely exemplary and may be changed as necessary. Accordingly, it will be apparent to those of ordinary skill in the art that many more embodiments and implementations are possible that are within the scope of the claims. Therefore, the embodiments described are only provided to aid in understanding the claims and do not limit the scope of the claims.
BRIEF DESCRIPTION OF THE DRAWINGS
The accompanying drawings are included to provide a further understanding of the claims, are incorporated in, and constitute a part of this specification. The detailed description and illustrated embodiments described serve to explain the principles defined by the claims.
FIGS. 1A and 1B
illustrate an exploded perspective view of an exemplary deadbolt lock assembly as described in this disclosure;
FIG. 2
illustrates a schematic diagram of the deadbolt lock assembly as described in this disclosure;
FIG. 3
illustrates a flowchart of the deadbolt lock assembly process for lighting up the plurality of LEDs during the locking and unlocking process;
FIGS. 4A-4G
FIG. 1
illustrates a perspective view of the exterior assembly of the deadbolt lock assembly of during a locking process;
FIGS. 5A-5G
FIG. 1
illustrates a perspective view of the exterior assembly of the deadbolt lock assembly of during an unlocking process;
FIG. 6
FIG. 1
illustrates a perspective view of the exterior assembly of the deadbolt lock assembly of communicating a low battery in the deadbolt lock assembly;
FIG. 7
FIG. 1
illustrates a perspective view of the exterior assembly of the deadbolt lock assembly of communicating a low battery in a key fob;
FIG. 8
FIG. 1
illustrates a perspective view of the exterior assembly of the deadbolt lock assembly of communicating a boot up sequence; and
FIGS. 9A and 9B
illustrate perspective views of alternate configurations of the exterior assembly. | |
Q:
Could LIGO discovery be due to e.g. earthquakes or have a terrestrial source?
I mean, could it have been earthquakes or anything else?
A:
In very broad language, we don't know (and hear me out before you judge me)! But then what is science? Science is the process of producing models that get us to understand the universe better and make predictions about it. We have a model of gravitational waves that was produced using general relativity. This model predicts a specific signal that we would detect if this model is accurate. The signal is shown in the paper of gravitational waves published yesterday. It compares our model with the signal detected:
(Image from: Observation of Gravitational Waves from a Binary Black Hole Merger by B. P. Abbott et al. (LIGO Scientific Collaboration and Virgo Collaboration) in Phys. Rev. Lett. 116, 061102, doi:10.1103/PhysRevLett.116.061102)
Then after we see this amount of matching, we do the statistical math and calculate, what is the probability of this happening by coincidence in two stations? The probability is measured by how many "sigmas" we're far from our model. Then we make a publication like the one linked above, and we say: We made an observation that is consistent with gravity waves. Then other experiments in the future repeat the measurement again, and again, and again, and every other experiment confirms what we had. If only LIGO would measure gravitational waves, and bigger binary black holes merge in the future and we see nothing, then we start doubting what happened and question whether what we measured is gravitational waves. More experiments reveal more evidence and solid proof. This is how science works.
The big deal about this is that LIGO and Virgo were the first ever to detect such solid evidence like the signals you saw in the pictures. So we're quite certain this is gravitational waves.
A:
I will address this main question:
Could LIGO discovery be due to e.g. earthquakes or have a terrestrial source?
The short answer is , NO. The reason the observation happened in September and the rumors rose just a month ago is because the researchers themselves were double checking all the numbers.
Anybody who watches the presentation given for the press can see in a simplified manner that vibrations from trucks ( :) ), earthquakes etc are isolated by the suspension of the detectors as pendulums, to dampen any high frequency changes. The characteristic signal takes miliseconds, one can barely hear it in the demonstration. This discussion in Motl's blog will help.
Now of course a model is used to identify the signal with two black holes merging, as the other answer says. No competing physical model has been proposed so , if it walks like a duck and it quacks like a duck, why, it IS a duck.
A:
I want to add one very compelling argument which clearly shows that Ligo could not have been because of earthquakes or terrestrial phenomena, or at least their probabilities would be outrageously low.
What was announced yesterday was that two different detectors picked up almost entirely identical signals with a spacing of a few milliseconds difference. The distance between the two detectors in Livingston, Lousiana and Hanford, Washington as the crow flies on the surface of the Earth is about 3042 km.
But gravitational waves would not care about the ATCF distance along the surface of the earth but the actual geodesic distance between the two points which is much smaller (about 3000km).
For an earthquake to travel about 3042km, the minimum time to do so assuming a uniform terrestrial medium between the two detector sites is about 3000km/ (8km/s) (8km/s is a respectable upper bound on the speed of a seismic wave, according to Wikipedia.) which gives us about 375 to 380, assuming that the earthquake is so powerful that it can maintain the same energy density at both the locations. This is already highly unlikely that the seismic wave does not lose energy but we now have definitive proof that the same seismic wave is not reponsible for the events measured on the gravitational detectors 3042km apart.
Finally, what if there was more than 1 such event? The USGS and other earthquake related databases indicate that the strongest possible earthquake which can most probably affect the Hanford detector site is from the faultlines from California which have approximately a 1/50 chance that the next earthquake will be a magnitude 7 earthquake in San Fransisco which is still a good ~1100km from Hanford. The closest possible predictive earthquake chance near Lousiana is a 1/300 chance of a magnitede 8 earthquake in Missouri which is again about 1000km away from Livingston in Lousiana. Now, assuming that one would need really strong earthquakes to contribute to the data (which as @anna mentions, is nearly impossible because the mirrors and the beam sources were suspended from highly sophisticated suspensions), the probability of two earthquakes happening at two different locations simultaneously such that the same energy is felt at two different locations which are over 3000km apart, thereby leading to the same waveform being measured on detectors is almost 0. I don't need to be a geologist to claim that the probably of this happening is a bit more outrageous than the probability of a celestial event which is capable of producing detectable gravitational waves.
Finally, not to mention - If I were doing an experiment which might involve millions/billions of dollars worth of effort, time and equipment over a period of 40 years which in principle could produce false positive data from earth quakes, I would also allow for data analysis and tools which removes any seismic effects from the final data in addition to the intricate suspension technologies. And if I can be wise enough to contemplate this, I'm pretty sure highly experienced scientists and analysts are already so.
| |
Year: 2012Abstract:
Health system strengthening depends on production and use of quality health data and information at all levels of the health system. Routine health information systems (RHIS) are receiving increasing attention as a sustainable strategy towards country-owned, integrated national systems that reduce reliance on parallel, vertical systems. To guide investment decisions on RHIS strengthening, evidence is needed on which types of strategies work and which do not. This paper reviews the literature on the evaluation of RHIS interventions in low- and middle-income countries, on the premise that investments in RHIS could produce greater benefits than they currently do. The paper describes the conceptual literature on the determinants of RHIS performance and its role in improving health systems functioning and performance at the local level, discusses the evidence base on the effectiveness of strategies to improve RHIS performance, provides an overview of RHIS evaluation challenges, and makes suggestions to improve the evidence base that can be used to help ensure that (a) RHIS interventions are appropriately designed and implemented to improve health systems functioning and (b) resulting RHIS information is used more effectively. | https://www.measureevaluation.org/resources/publications/sr-11-65 |
For example, in my case, I have a layer which contains about 240,000 records. I need to set the ???maximum number of records returned by the server??? to be 240,000 to make sure that all the records of the attribute table of the layer can be returned if a particular query is applied.
It will slow the performance of client applications consuming your map service, such as web browsers, and your GIS server.
If that query needs to return all the records, why not just maximize the efficiency of viewing that layer in your map in it's entirety? Is it a point layer or polygon?
For example, have you considered using a view to represent that query, rather than let the tool build the query?
Many thanks guys for the help. your answers are very useful.
Sometimes, for particular query, the returned values are more than 1,000 where the end-user needs to export them as CSV file (from the web mapping application).
My current layer is parcel (polygon layer) which contains 240,000 records.
If performance is down for more than 1000 records returned, I would prefer to keep the number as is.
There are other ways to serve this layer efficiently. I would explore them before you listen to advice that says your site will "probably" crash, with really no evidence given.
At 10.2, if you are licensed, you can publish that parcel layer as it's own service, using it's own site - group of ArcGIS Servers. ( I think that is what they are calling them now ).
*edit: Clusters... is the word I was looking for.
The problem is not with the server being able to handle publishing services with a large amount of data it is with the browser being able to handle a large amount of features. I would pretty much guarentee that trying to display 240,000 features in the attribute table would cause the browser to stop responding, that is if the server can actually manage to return that number of features.
I have not tried to up the minimum features to that sort of figure as doing so would defenatly cause issues.
Of course, if current performance at 1000 records is already doubtful, than increasing it won't help you unless you take additional action to boost your sites performance, network or server hardware.
The problem is not with the server being able to handle publishing services with a large amount of data it is with the browser being able to handle a large amount of features.
You should check before you make that statement.
On a poorly configured map service, running 10.0, and using the SQL hack, I can get 240,000 parcel attributes in about 35 seconds. No crashing.
Ok you have managed to query that amount of records via the rest endpoint but you are not returning any geometry and only one attribute per feature and that took 35 seconds which would not be that acceptable within a web application. Returning more attributes to display in a table and the geometry to draw the features on the map will cause the browser to struggle.
You can not tweek your browser to make ArcGIS server return features or records faster than it does, based on the way it is configured. That is simply wrong advice.
And like I said, you could use a SQL View, index the fields you want to display, deploy a cluster to handle just this map service, etc, etc to make the response much faster. My example was running on a vm, with 4GB of RAM, max of 2 SOC processes, the parcel layer was in a map service with 60+ other layers and the fields were not indexed.
You said the browser would crash. I showed that is not the case. The issue is how long does Jamal want to wait for the response from ArcGIS Server and are there other ways to do the same thing which are faster.
My other question to Jamal would be, can you really see 240,000 polygons in your map, even if the request took 3 seconds? If you just want to return attributes about those polygons, there are faster ways of doing that.
Returning more attributes to display in a table and the geometry to draw the features on the map will cause the browser to struggle.
Does your browser struggle when it downloads the ESRI ISOs? That is a much larger file than 240,000 parcel polygons.
It is not the browser.
Write an ASP or JSP web page that returns all fields of the parcel layer and all records into a datagrid or simply write it out to the browser. It's fast.
If Derek believes the browser is the problem in generating speedy output then we wouldn't be downloading ESRI media using our browsers.
The only way I will concede that the browser can be part of the problem is when it comes to sending large amounts of HTTP headers with every request. However, that rests solely on the API being used to query the data. It's not the browsers fault that it has to send that much info as part of the request.
As I set the �??maximum number of records returned by the server�?� to be 240,000, my Geocortex web mapping application fails to return any value as shown in the screenshot below.
By the way, is there a way to know the maximum number of records a web mapping application can return?
I re-tested a parcel layer of my own. I gave the service a min of 4 SOC processes and a max of 4 SOC processes. I set the maximum number of records to 240,000, and using the REST query inteface, I let it return everything, geometry included.
What I got was a 503 error, after several minutes of processing, which means the server is too busy to render a response in a timely fashion.
As you can see, the resources on the ArcGIS Server are considerable. But the processing takes too long so the webserver returns a 503 HTTP code. The lack of returning a result has nothing to do with the browser, unless you can modify the "Retry-After" request header. Your browser doesn't process the request, it simply renders it.
Your problem of wanting to display 240,000 parcels in a Geocortex web application could be related to these issues or other ones. It's unlikely that you will achieve displaying this many results in your web application in a timely fashion using a third party web app, unless you are willing to break up those 240,000 parcels into meaningful groups of some kind.
"You will find the response time from the server really slow and your application will struggle to handle the results and probably crash"
response time from the server really slow - agree.
your application will struggle to handle the results - disagree, that processing takes place on the ArcGIS Server.
and probably crash - hard to say, every application deals with issues in different ways. It appears Geocortex simply does not process your request.
Note in the third image how long each part of the request/response and content load takes.
I made this request directly to ArcGIS Server on port 8399 and did not route my request through a production web server.
I think a lot of this will depend on what type of service GeoCortex consumes, if it is a map service or wms then I agree with Leo that the server will handle creating the image and should be capable unless the response times out. If GeoCortex takes a feature service then the features will be drawn client side in the browser and I would hazard a guess that this amount of features will cause problems in the browser, I know from experience that this is the case in a flex application even when we are talking 10000 - 20000 features.
I'd recommend to have a gp service which will execute the query, export to a CSV file on the server side and return it by url (or by value, if that is what you want).
I'd not recommend to convert a query result to CSV on the client side especially when a query returns a ton of records. | https://community.esri.com/thread/111993-increasing-the-maximum-number-of-records-returned-by-the-server |
Idiopathic pulmonary fibrosis (IPF) occurs when the lung tissue becomes scarred. This scarring causes the lung tissue to become less elastic and less efficient at gas exchange. As it advances, you will have to breath faster to compensate for reduced lung volumes. This becomes a dangerous cycle as you will need to work harder to breath while at the same time not be able to meet the oxygen demands of your tissues due to damage of the alveoli (tiny air sacs) in the lungs. IPF is the most common form of interstitial lung disease, a group of diseases that affect the tissue between the airways and bloodstream through both lungs.
SYMPTOMS
The most common symptoms of IPF are shortness of breath and a dry, persistent cough. Other symptoms associated with the condition include:
-
Fast, shallow breathing
-
Gradual weight loss
-
Tiredness
-
Aching joints and muscles
-
Clubbing (widening and rounding of the tips of the fingers or toes)
CAUSES
Pulmonary fibrosis is linked to many conditions, but in most cases, the cause is never found. When no cause is known, the condition is called idiopathic pulmonary fibrosis. Researchers are looking into what might cause the disease. Viruses and tobacco smoke are two possible causes. Certain types of the disease seem to run in families. The condition can affect both men and women and is most often diagnosed in patients between the ages of 50 and 70 years old.
DIAGNOSIS
Diagnosis of pulmonary fibrosis begins with a history and physical exam. Additional tests may include:
-
Chest X-ray: This imaging test takes a picture of the heart and lungs. Pulmonary Fibrosis may show as an increased tissue density resulting from areas of inflammation or fibrotic changes.
-
CT scan: This imaging test uses X-rays and computer technology to make horizontal images (called slices) of the body. A CT scan may be ordered if the chest X-ray showed anything that warranted further investigation. CT scans provide more detailed information.
-
Pulmonary function tests: This test can be performed in the office. This test measures several different aspects of the lungs. Pulmonary Fibrosis will often show reduced lung volumes, and if more advanced will additionally show decreased gas exchange.
-
Arterial blood gas: This test can assess how well the lungs get oxygen into the blood stream and carbon dioxide out of the blood stream. As Pulmonary Fibrosis progresses an impairment of gas exchange may be noted in this test.
-
Bronchoscopy: A long, thin, flexible tube (bronchoscope) with a light at the end is put down the throat and into the lungs. This allows the physician to directly view different parts of the lungs. If the physician sees something that warrants further investigation, they can obtain a tissue sample called a biopsy. This sample can then be sent to pathology where it will be tested.
-
Lung biopsy: A small piece of tissue, cells, or fluid from the lungs is taken out and checked under a microscope.
-
Sarcoidosis is often diagnosed when other lung disorders are ruled out.
-
Bronchoalveolar lavage: During a bronchoscopy the physician may use sterile saline to cleanse areas of the lung. This saline is then sucked back out and can be sent for testing. The saline carries out cells from the lower respiratory tract. These cells can be checked under a microscope to help find inflammation and infection. The test can help rule out certain causes.
TREATMENT
There is no cure for Pulmonary Fibrosis. Treatments are geared toward minimizing symptoms. Treatments include:
-
Steroids: Help to reduce inflammation by suppressing the immune system.
-
Oxygen therapy: If your oxygen saturation (SPO2) is low, supplemental oxygen may be prescribed to help get your SPO2 into the normal range.
-
Flu and pneumonia vaccine: Because Pulmonary Fibrosis increases your risk for severe illness, these yearly vaccines are recommended to take preventatively.
-
Reflux treatment: Reflux can cause Pulmonary Fibrosis symptoms to worsen. Treatment with proton pump inhibitors (PPI's) or histamine-2 agonists (H-2 blockers).
-
Pulmonary Rehab: If you have a Pulmonary Fibrosis and symptoms are worsening, you may qualify for pulmonary rehab. Pulmonary rehab takes place in a fitness center/gym setting and is overseen by medical professionals. They will help you determine the proper place to start, in terms of activity and intensity level, and help you make a plan to improve your cardiopulmonary performance. Not only does this help to optimize your lung function while attending, but gives you the tools to maintain that function after it has ended.
-
Lung transplant: This is a consideration for people with end-stage Pulmonary Fibrosis. | https://www.pasadocs.com/pulmonary-fibrosis |
Nonfinancial disclosure alone does not necessarily translate into better sustainability performance, as some companies may tick the boxes without tipping the scales, concludes a new report by The Conference Board.
Conducted in partnership with the Rutgers Center for Corporate Law and Governance, Sustainability Practices: 2018 edition analyzes data on sustainability disclosure and performance among companies in 23 countries, spanning Asia-Pacific, Europe, and North America. In all, data on more than 90 environmental and social practices for over 5,000 companies were analyzed to reveal how they are responding to the increased demand for transparency on their nonfinancial impacts. Practices analyzed in the report include atmospheric emissions, water consumption, waste and raw material consumption levels, board diversity and gender pay equity, and the adoption of policies to safeguard human rights in the supply chain. The report is complemented by the Sustainability Practices Dashboard, a comprehensive database and online benchmarking tool enabling users to segment data by 11 sectors under GICS, the Global Industry Classification Standard, and four company size groups (by annual revenue).
The report finds that nonfinancial disclosure alone has not yet necessarily translated into performance improvements. A case in point is gender diversity in the boardroom, which certain jurisdictions have hoped to foster by mandating more transparency on board composition. In Japan, where such disclosure requirements are in place, 99 percent of publicly traded companies do report the percentage of women on boards, yet women account for only three percent of directors. Similarly, 70 percent of companies in Taiwan report board diversity figures, yet women account for a meager seven percent of directors. More appreciable results can be seen in the United States (where, in addition to mandatory disclosure under SEC rules, large institutional investors such as CalPERS and Vanguard have been instrumental in the more recent progress recorded on this issue: 21 percent of U.S. public company directors are now female, an uptick from only a couple of years ago) and in European countries such as France (where, due to the legislative quota, women hold a median of 40 percent of board seats). For these reasons, existing reporting requirements are more effective when they include due diligence mechanisms to achieve not only greater disclosure but also performance improvements.
“Companies can benefit much more by embracing not only the letter but the spirit of the reporting instruments, mandatory or voluntary, which ultimately are intended to drive improvements in sustainability performance,” said Thomas Singer, principal researcher at The Conference Board. Singer is a co-author of the report with Anuj Saush, senior researcher, The Conference Board Sustainability Center, and Anke Schrader, senior researcher, The Conference Board China Center for Economics and Business.
“There is no doubt that companies are becoming increasingly attuned to the importance of reporting on their non-financial performance,” said Professor Sarah Dadush of Rutgers Law School. “This year’s Sustainability Practices study persuasively documents and confirms this trend. More important, however, it draws attention to the reality that more reporting does not necessarily mean better reporting or indeed better sustainability performance. For reporting requirements (whether mandatory or voluntary) to be effective in terms of generating positive change in sustainability performance, the quality of the reporting requirements must itself be improved.”
Shareholder pressure has been a major driver of transparency on corporate sustainability in the last few years. Increasingly, even mainstream institutional investors are using sustainability data to assess investment options and urge portfolio companies to test the long-term viability of their business strategy. Recent examples include BlackRock’s Larry Fink’s January 2018 letter to CEOs and the October 2018 petition that CalPERS and the New York State Comptroller submitted to the SEC to develop a cohesive ESG reporting framework. Companies’ boards and senior management need to reassert that they are the best suited to set the strategic direction of the firm but should also consider using the rising demand for environmental, social and governance (ESG) information to identify and manage risks and opportunities associated with these practices. Moreover, companies should be aware that, in the current business environment, public communications on sustainability can become an effective tool to strengthen the relationships with key stakeholders.
Other key findings include:
- Driven by mandatory reporting requirements, companies in Japan have the highest overall sustainability disclosure rate – Across the 91 practices examined, companies in Japan had an average disclosure rate of 31 percent. Mandatory environmental reporting requirements have been a clear driver of disclosure in Japan. Since 2006, for example, certain companies in Japan have been required to disclose greenhouse gas (GHG) emissions. The next three countries with the highest disclosure rates-United Kingdom, United States, and Taiwan-all shared an average disclosure rate of 26 percent. Nine countries had average disclosure rates in the single digits. Transparency regarding sustainability practices is particularly low among companies in Malaysia, Indonesia, Poland, and Pakistan, where average disclosure rates were below 5 percent.
- Larger companies, more subject to stakeholder scrutiny, tend to disclose more widely in all regions – Across regions and countries, sustainability disclosure rates generally increase with company size. The largest companies by revenue consistently have higher disclosure rates than companies in lower revenue groups, and in some cases the differences are quite significant. Companies in the largest revenue group (with annual revenues of $5 billion or more) have an average disclosure rate of 29 percent across all the practices examined, double the average disclosure rate of companies in the next-highest revenue group. Large companies are generally more prone to stakeholder scrutiny. In addition, many of the nonfinancial reporting requirements introduced in recent years, including those by stock exchanges, often apply primarily to larger companies.
- Globally, 16 percent of companies opt for external assurance, a figure that is likely to increase as stakeholders put greater demand on the quality and reliability of nonfinancial data – The use of external assurance is most prevalent among companies in Japan and Taiwan, where 42 percent of companies obtain some assurance of their nonfinancial data. Overall, this practice is most common among larger companies. More than two-fifths of companies in the largest revenue group have opted for external assurance of their sustainability reports, compared to 17 percent of companies in the next largest revenue group, and virtually no companies in the smallest revenue group. This finding is likely due in part to the extra cost and resources required to conduct external assurance and verification of nonfinancial data.
- Recognizing potential climate-related business impacts, 1 in 4 companies globally reports having a climate change strategy – This figure is highest in Japan, where 81 percent of companies have such a strategy, followed by companies in Taiwan (62 percent), the US (47 percent), the UK (39 percent), France (37 percent), and China (37 percent). Across the global sample, 21 percent of companies report their GHG emissions. However, more than three-quarters (78 percent) of companies in the UK report GHG emissions, driven largely by the mandatory GHG reporting requirements introduced by the Climate Change Act 2008. The next-highest levels of emissions disclosure were among companies in the US (49 percent) and Taiwan (48 percent).
- Companies in some of the countries with the greatest water risks have some of the lowest disclosure of water use – For countries expected to experience high levels of water stress in the future, such as India, Pakistan, and Spain, the low levels of disclosure related to water consumption could be concerning. In Spain, 16 percent and in India, 8 percent of companies report total water consumption. In Pakistan, only 1 percent of companies report this data. Not all sectors and companies are equally exposed to water risks, and in cases where water is not a material issue, there is little reason to expect companies to report data on their water usage. However, it is unlikely that in Pakistan, for example, water is not a material risk for 99 percent of companies.
- Globally, women fill less than 1 in 5 board seats, prompting efforts in several countries to foster greater female representation in business leadership – Across regions, just under half of companies report data on the gender makeup of their boards. The median percentage of women on boards of companies that report this figure is only 17 percent. The highest median percentage of women on boards is among companies in Europe (25 percent), followed by North America (20 percent). Women’s representation on company boards is lowest among companies in Asia-Pacific, where women account for only 9 percent of director positions. Companies in France have the highest median share of women directors (40 percent), followed by Italy (33 percent), and Belgium (30 percent). The low level of gender diversity on company boards has triggered efforts in several countries to foster female representation on boards. Norway, for example, in 2003 became the first country to pass a quota mandate for women’s representation on corporate boards. Since then, several European countries have followed suit, including Spain, Belgium, France, Italy, the Netherlands, and Germany. In the US, a new California law will require companies “whose principal executive offices” are in California to have at least one woman on their boards by the end of 2019. | https://www.sustainability-reports.com/disclosure-requirements-do-not-always-translate-into-better-corporate-sustainability-performance/ |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.