content
stringlengths 0
1.88M
| url
stringlengths 0
5.28k
|
---|---|
Kim, Jaeuk conceptually visualizes relationships and humanism through mixed media art. He reinterprets the idea that the essential human experience is ultimately standardized from start to finish a..
Kim Seola traces her thoughts and observations through forms unseen to the naked eye. With her keen interest in small existences, she casts her gaze at lifeless things such as burnt remains of fire..
Seoul Kim’s painting is a serious critique of the basic elements and points of painting. His discovery and realization through the history of visual art from classical to contemporary times are rec..
Kim Sang-duk Makes Different Works such as drawing and abstract painting. There’s two things He’ve created a Messed up reality and another rough world. He’ve openly announced that all those objects..
Minouk Lim as an artist seeks to find ways to examine objects embedded with performativity, different methods of performance and imaginative modes of creating records. Her inclusive approach embrac..
Hun Kyu Kim (b. 1986 in Seoul, South Korea, lives and works in London, England) crafts poignant allegorical pictures employing an almost limitless range of historical inquiry. Vast..
Seung-taek Lee (b. 1932) is highly regarded as a leader of Korea’s avant-garde via his practice of “non-sculpture” that disrupts conventional artistic notions and questions established political an..
Kang Seung Lee is a multidisciplinary artist who was born in South Korea and now lives and works in Los Angeles. Lee’s work places emphasis on marginalized individual experiences and personal histo..
Kim Tschang-Yeul has been working on waterdrop painting for a long time. Kim’s water droplets painting appear to seep out of the fabric of the canvas. The painting utilizes a true trompe l’oeil tec..
MINJUNG KIM has been exploring the artistic movements of the East and the West, using black ink to draw lines or create spontaneous strokes and repeatedly pasting the layers of Korean Hanji paper w..
Im Suniy creates landscape. She has "represented people's trembling and anxious sight and unique landscape images, which are recognized and perceived from such a perspective, through photographs an..
ByungHo Lee sculpts 'emptiness' and 'empty substance.' He reasons invisible substance that is not present and cannot be sensed - immaterial beings, and then presents sculpted human body in a tradit.. | https://www.theartro.kr/eng/people/?Page=9&b_code=30&r_b_ex1=&r_b_ex2=&searchColumn=&searchKeyword=&pagesize=12&order1=&r_b_ex3= |
You commonly hear terms like sprain, strain, broken bone, fracture, tendonitis, and bursitis, but do you know what they mean? We’re going to break down some common diagnoses so if your doctor tells you that you strained your hamstring, sprained your ankle, or your child broke their arm, you know a little more about what exactly that means.
Strain vs. Sprain
STRAINS are the overstretching or tearing of muscles or tendons (tendons are the dense tissue that connects bones to muscle). For example, if you're carrying something very heavy with poor form and injure your back, it may be a muscle strain in muscles of your back.
SPRAINS are the overstretching or tearing of ligaments (the bands of tissue that connect bones together in a joint). A common sprain you've probably heard of is an ACL tear or sprain (ligament in the knee joint), or an ankle sprain (most commonly in ankle sprains the anterior talofibular ligament on the outside of the ankle is overstretched when the foot rotates inward).
Both strains and strains can be debilitating depending on the severity of the tear/stretch. Both can lead to swelling, pain, and limited flexibility.
Fracture vs. Break
Fractures and broken bones are the same thing. There are many different types of fractures, but all involve trauma to a bone due to the stress on the bone being greater the the strength of the bone.
This stress on the bone that causes is to "break" (fracture) can be caused by different circumstances:
Tendonitis vs Bursitis
Tendinitis is the inflammation of the tendon (like we talked about earlier, the tendon connects the muscle to bone and is tissue making up a chord-like structure). You've probably heard of rotator cuff tendinitis (inflammation of the tendons that make up the rotator cuff).
Bursitis is inflammation of the bursae, which is a fluid-filled sacs that cushions bones and tendons/muscles to reduce friction.
Bursas and tendons are located near each other, and tendinitis and bursitis share some common symptoms. Often tendinitis and bursitis often occur concurrently at a given joint. These similarities cause the two terms to be assigned incorrectly when there's pain and swelling at a joint.
If you are suffering from a sprain, strain, fracture, or other musculoskeletal injury and live in the Hudsonville, Jenison, Grandville, or West Michigan area and need physical therapy, give us a call! These types of injuries are our specialty and it's our goal to get you better efficiently so you can get back to your favorite activities this Spring!
By: Lisa Pfotenhauer,
Cert. Exercise Physiologist
Leave a Reply. | http://www.hudsonvillephysicaltherapy.com/blog/april-24th-2019 |
- Does Tolkien write women “well”?
- Medieval tropes
- the virgin/the witch/the mother
- the confined/obedient vs unconfined/troublesome women?
- Are they complex and realistic in their actions and experiences?
- Is he guilty of the “Valkyrie Reflex?”
- Medieval tropes
- What gender roles do we see/not see in these books?
- Katherine Hasser notes an interesting lack of gender roles in Hobbit society
- Eowyn goes against the traditional female role
- What theological ideas do we see through the women of LOTR?
- Biblical allusions/metaphors
- Overarching themes centered around them? | http://www.christianhumanist.org/2021/10/the-christian-feminist-podcast-153-the-women-of-the-lord-of-the-rings/ |
Can Harvard's New Innovation Lab Crank Out Entrepreneurs?
The lab of fresh ideas and collaboration is set to open this fall.
It looks like Harvard is taking its goal of producing the next Mark Zuckerberg pretty seriously. The university is moving full-steam ahead with plans for the Harvard Innovation Lab, a school-wide incubator of fresh thinking and entrepreneurship that's set to launch later this year. The goal is to "foster team-based and entrepreneurial activities and deepen interactions among students, faculty, entrepreneurs, and members" of the greater Boston community.
While one of the keys to the i-lab is collaboration across disciplines, it's equally critical to get students involved with the real world. To that end, the i-lab "will also support the local business community by providing public areas, meeting rooms, and business development resources for businesses, nonprofits, entrepreneurs, and others" in and around Boston.
Since the i-lab is still in the development stage, Director Gordon S. Jones has been busy figuring out how to structure programming so that it becomes a genuine hub of activity. He recently wrote on the lab's blog that he's in a listening phase so that he can determine what local businesses, faculty, and students all want to get out of the lab.
While the impact won't be evident until it opens this fall, it certainly seems like the idea of creating a regional innovation hub—one that can drive new ideas, connect students to businesses, and potentially spur job creation—is one that other universities would be smart to emulate. | https://www.good.is/articles/can-harvard-s-new-innovation-lab-crank-out-entrepreneurs |
ABSTRACT: Statistically significant differences exist among the major algal and cyanobacterial taxa in the catalytic efficiency of Ribulose-1,5 bisphosphate carboxylase/oxygenase (RubisCO)the rate limiting carboxylase in C-fixation. With the notable exception of the red algae, a comparison of the kinetic properties of RubisCO among phytoplankton of different geological ages suggests that the enzyme has evolved towards higher CO2 affinity in response to decreasing atmospheric CO2/O2 ratios over geological time. Taxonomic differences in the kinetic properties of RubisCO influence the mechanisms of C acquisition among phytoplankton groups. A significant negative correlation exists between the CO2 specificity factor of RubisCO and the capacity of cells to concentrate inorganic C through active uptake mechanisms. Differential resource requirements associated with C acquisition could affect the relative fitness of phytoplankton groups and thus their ecological interactions. I argue that inorganic C may play a more important role in phytoplankton productivity and community ecology than has been previously recognized and highlight some outstanding questions for future research. | http://aslo.org/lo/toc/vol_45/issue_3/0744.html |
MS GIS Senior Lecturer Jonathan Resop presented in two summer online conferences: the Society for Conservation GIS (SCGIS) national conference and the Towson University GIS (TUGIS) regional conference. For both conferences, Dr. Resop presented research on the use of drone laser scanning for estimating riverscape vegetation metrics (such as roughness, vegetation density, and vegetation height), for use in ecological and hydraulic models. The research is being done through collaboration with the Department of Biological Systems Engineering StREAM Lab at Virginia Tech.
Information about the presentation can be found on the TUGIS website.
Quantifying Riverscape Vegetation Change using Drone Laser Scanning
Drone laser scanning (DLS), or UAV-based lidar, provides ultra-high-resolution point clouds (greater than 400 points per square meter) of the environment, which allows scientists and engineers to collect detailed information about both the topography and vegetation. For this study, six DLS surveys were conducted over a two-year period (2017 to 2019) for a reach of Stroubles Creek, located downstream of Virginia Tech's main campus in Blacksburg, VA. This reach underwent a stream restoration in 2010 and is continuing to evolve and change since having its streambanks reshaped and floodplain vegetation planted. Three lidar metrics were generated to represent different aspects of the floodplain vegetation: height, roughness, and density. The change in these metrics both seasonally and annually were then quantified by calculating DEMs of difference. Simple data processing pipelines using ArcGIS and Python scripting were used to help automate these workflows.
More information can be found in the publication. | https://geog.umd.edu/news/dr.-resop-presents-drone-lidar-research-online-summer-conferences-scgis-and-tugis |
It is common for teen abusers to use stalking behaviors to monitor their dating partner's activities while still dating or after the partner has tried to end the relationship. Stalking behaviors may not look dangerous to others, but they are intended to be threats to the partner to stay in the relationship and remain under the control of the abuser. One example of this would be if the abuser sends flowers or gifts to the partner with a carefully worded apology designed to coerce her to not leave the relationship.
Stalking is illegal in Michigan. The Michigan statute defines stalking as "a willful course of conduct involving repeated or continuing harassment of another individual that would case a reasonable person to feel terrorized, frightened, intimidated, threatened, harassed or molested" (MCLA 750.411h).
Stalking can take many forms, such as:
-
Following or appearing within sight of the targeted victim.
-
Approaching or confronting the targeted victim in a public or private place.
-
Appearing at the workplace or the home of the targeted victim.
-
Entering or remaining on the targeted victim's property.
-
Contacting the targeted victim by telephone over and over again.
-
Sending repeated mail or email to the targeted victim.
-
Using cell phones, computers or surveillance equipment to keep tabs on the targeted victim.
-
Using the Internet or other electronic means to stalk someone. This is commonly known as CYBERSTALKING. The stalker may use search engines, bulletin and discussion boards, online forums, chat rooms as well as online communities like MySpace, Facebook, Friendster and Indymedia to stalk the victim, sometimes without the victim even knowing it. Learn more about cyberstalking by visiting Feel Safe Again, Inc - Cyberstalking and Working to Halt Online Abuse Kid/Teen Division.
For more information about stalking, please visit the National Stalking Resource Center or the Stalking Teen Victim Project. If you or a friend are being stalked, you can get free help. Use the Domestic Violence Resource Directory to find several resources to locate help closest to you. | http://www.michigan.gov/datingviolence/0,1607,7-233-47209---,00.html |
As part of FoodForward SA’s five-year scaling plan to reach 1 million people daily, we have successfully opened up our newest branch in Bloemfontein, Free State. Up until September 2021, our food heroes from our Durban branch have been doing monthly inter-branch transfers of nutritious food provisions to our beneficiary organisations (BOs) located in Bloemfontein, Harrismith and Welkom in the Free State.
With the opening of the new branch, these BOs will now be served by our Free State branch, with the distally-located Harrismith and Welkom BOs being served through our mobile rural depot (MRD) programme. This means that on a monthly basis, our 8-ton refrigerated truck will make its way to these BOs instead of them needing to travel long distances to fetch their food provisions from our Bloemfontein warehouse.
The new FFSA branch in Bloemfontein currently reaches just over 25,000 beneficiaries, through a network of 25 BOs. This number will rise steeply in the coming months.
FoodForward SA has been on a rapid expansion programme which is seeing our impact deepening across all nine provinces as we pursue addressing food insecurity at scale. This expansion programme brings the number of FFSA branches to seven, while we will continue to service the Mpumalanga and Northern Cape Provinces via our Johannesburg branch until the beginning of 2022. | https://foodforwardsa.org/news/launch-of-our-seventh-branch-in-bloemfontein-free-state/ |
LOWELL — A $20 million infrastructure project, which will not cost taxpayers but could save the city $40 million in energy costs in the next two decades, is slated to begin construction next year.
In late 2008, after entertaining proposals from six firms, City Manager Bernie Lynch entered into a 20-year performance contract with Ameresco, a Framingham-based energy-services company that guarantees more than $300 million in annual energy savings to clients.
Under the agreement, Ameresco conducts an energy audit of all municipal buildings to identify inefficiencies and propose improvements. The improvements are paid for through bonds secured by Ameresco, which are then paid off by the energy savings the upgrades bring.
Energy savings are guaranteed under the contract. If they are not realized Ameresco pays the difference.
Lynch said cities and other public agencies that have used such performance contracting have seen as much as a 25 percent savings in energy costs.
The Lowell Housing Authority entered into a similar contract with Ameresco nearly three years ago and since that time has seen its energy bills drop about $1 million per year. The LHA plan included replacing aging boiler and hot-water systems, adding insulation and upgrading lighting fixtures to the authority’s 1,600 housing units.
Ameresco recently completed comprehensive energy audits of 50 city-owned buildings, including most public schools, City Hall, the Lowell Memorial Auditorium, J.F.K. Civic Center, Cawley Stadium and the city’s fire stations.
Recommendations range from boiler, roof and window replacements to lighting improvements and solar-panel installation.
“We are in this for the long term — we don’t just build, get our last check and leave,” Ameresco Business Development Manager Hal Meyer told the City Council this week. “We are in this with you for the next 20 years.”
Meyer explained that after the physical work of constructing improvements, the company will continue to monitor the city’s financial savings, as well as the impact of improvements to the environment. He added the company is also interested in working with science students in city schools to help them understand the technology.
Meyer said the construction process will be “completely transparent,” with all jobs going out to bid and local contractors used as much as possible.
Ameresco is looking at grants that could be used to partially finance the improvements, as well as securing utility rebates. It recently applied for $1 million in energy rebates from National Grid, which Meyer said “has the most robust rebate program we have seen.”
Jim Walker, Ameresco’s director of solar grid-tie projects, said the recent audit identified five city-owned buildings that are optimal for installing solar panels: the Reilly, Shaughnessy and Pawtucketville Memorial Elementary schools, the Butler Middle School and the Lowell Memorial Auditorium.
“The advantage of renewable energy is that unlike fossil fuels, the price doesn’t go up and down with the commodities market,” Walker said. “With renewable energy, you don’t face those budget surprises.”
Solar panels on those buildings are expected to generate 429,000 kilowatt hours of electricity annually, Walker said. He said the city was “very lucky” to be chosen to receive one of the last Mass Commonwealth Solar Rebates awarded by the state. The city is expected to receive a $1.19 million rebate under the now-defunct program.
Once the solar panels are installed, they will be maintained, owned and operated by Ameresco.
“By using the performance contract approach with Ameresco, we are able to address several important city priorities of improving our facilities, saving money and being environmentally proactive in reducing the use of energy,” Lynch said. “The benefit of this approach is that these can be achieved without our direct expenditure of funds. Ameresco will finance the whole project and be repaid through energy-cost savings plus we get their vast experience.”
Join the Conversation
We invite you to use our commenting platform to engage in insightful conversations about issues in our community. We reserve the right at all times to remove any information or materials that are unlawful, threatening, abusive, libelous, defamatory, obscene, vulgar, pornographic, profane, indecent or otherwise objectionable to us, and to disclose any information necessary to satisfy the law, regulation, or government request. We might permanently block any user who abuses these conditions. | https://www.lowellsun.com/2009/11/27/city-eyes-40m-in-energy-savings/ |
Chapter I. Emma Lou Diemer, currently Professor of Composition at the University of California at Santa Barbara, is an excellent representative of the mainstream of twentieth- century American music. Born in 1927 in Kansas City, Missouri, she began composing at an early age, motivated by her improvisations at the piano. She received a Bachelor of Music and a Master of Music from Yale and a Doctor of Philosophy from Eastman, all in composition.Diemer's career has encompassed teaching in the public schools and at the university level, working as a church organist, and performing publically on all of her keyboard instruments. Her compositional output reflects this diversity. In 1959, she was the only woman in the first group of young composers to be awarded Ford Foundation Grants, for which she was assigned to the secondary schools of Arlington, Virginia. During this time, the simpler works for the bands and choirs resulted in requests from publishers and commissions from many sources, for choral works in particular. These have since become her largest category of compositions. However, she has also written some twenty-six chamber and solo works for piano. This body of music, which reflects both her many influences and her unique style, constitutes an outstanding contributionto her art.Chapter II. Her earliest works reflected her stated models, Rachmaninoff, Debussy, and Gershwin, in their programmatic titles, energetic rhythms, and full keyboard sound. In them one can see her affection for low sustained resonant tones and for Prokofiev-like brilliant high register sounds. She frequently used chord structures in thirds, but employed a deliberately atonal harmonic framework.Chapter III. At Yale, she fell under the neoclassic influence of Hindemith. Her forms tightened and her harmonic language centered on tonics and key schemes resembling traditional modes. Features seen in the early works became pervasive: motivic melodic construction, ametric and syncopated rhythms in a strongly metric context, ostinatos in all registers, imitative textures, structured fugues, and a Bartokian control of harmony by intervals, particularly the fourth and fifth.Chapter IV. With the solo piano works, she melded the neoclassic structured language with her earlier romantic style. Ideas once again flowed directly from improvisations, while she also wrote her first large twelve-tone work.Chapter V. In the 1970's, she combined the sonorities of the electronic world with intrinsically pianistic techniques, including the new sounds of the avant-garde. Rhythm returned as pulsing beats, contrasted with free and aleatoric sections. Neoclassic motivic development generated dramatic forms.Chapter VI. Diemer integrates many techniques, new and old, into a highly successful and personal style, one which places ultimate value on expression and communication. Retaining a strong tie to the past, she is a cautious explorer, rarely breaking new ground, but eventually encompassing even the most advanced trends into wonderfully effective works. | http://cardinalscholar.bsu.edu/handle/handle/179292 |
Cystine can not only eliminate free radicals, but also improve human immunity. Glutathione is healthy, anti-aging, and plays a more important role in the aging cells than the younger ones.
Glutathione can also protect hemoglobin from hydrogen peroxide oxidation, free radicals and other oxidation, so that it can continue to play a normal role in oxygen transport.
Under the action of oxidants such as hydrogen peroxide, part of hemoglobin in red blood cells is oxidized from divalent iron to trivalent iron, which changes hemoglobin into methemoglobin, thus losing the ability of carrying oxygen. Reduced glutathione can not only directly combine with oxidants such as hydrogen peroxide to produce water and oxidized glutathione, but also reduce methemoglobin to hemoglobin.
There are a lot of glutathione in human red blood cells, which is of great significance to protect the sulfhydryl group of protein on red blood cell membrane from being reduced and prevent hemolysis. | http://comeboard.com/Cosmetic%20Ingredient/2020/1208/45.html |
Evidence of Repurposing Drugs and Identifying Contraindications from Real World Study in Parkinson's Disease.
There is great unmet need in discovering novel treatment for Parkinson's disease (PD) and identifying the new agents potentially causing drug-induced parkinsonism. New indications and contraindications of drugs are typically approved following rigorous randomized controlled trial (RCT) evaluation. However, RCTs have their inherent limitations, since they are usually conducted in ideal conditions, with high cost and limited follow-up periods. In the past decade, large cohort studies with long follow-up outcome data was derived from a PD database in a real-world setting. Studies based on real world data (RWD) can help to augment and extrapolate data obtained in RCTs and provide information about the safety and effectiveness of a medication in heterogeneous, large populations. In the present review, we focus on the published real world studies designed to develop new treatment strategies for repurposing drugs and identifying contraindications for PD. We also outline the challenges and limitations in these studies. Subsequently we introduce PaWei app platform, which hopefully can facilitate PD management and address real-world problems associated with PD. Better understanding of RWD collection and analysis is needed if RWD is to achieve its full potential.
| |
Marvel Comics ? where Spider-man and Wolverine hail from ?has a long history of injecting science fiction into stories, especially withintheir line of comic books that take place in the far reaches of space.
In Marvel's latest creation "Realm of Kings," ahero composed purely of energy ventures through a tear in space-time to anotherreality. But what are the science facts behind this epiccosmic storyline?
Quantum energy
The one-time Avenger known as Quasar has become one with thequantum bands, which transformed him into "pure quantum energy."
As Einstein discovered more than a century ago, mass can getconvertedto energy, and vice versa. A single gram of matter holds an extraordinaryamount of energy ? more than 20,000 tons of TNT, more than the bomb dropped onHiroshima ? and anyone wielding that much energy could certainly be capable ofacts of cosmic heroism.
According to quantum physics, all forms of radiant energycome in packets known as quanta, so "quantum energy" might refer toany of them. A truly bizarreform of energy that quantum physics suggests exists is vacuum energy ? theenergy that exists in space even when devoid of matter.
Under the uncertainty principle, one can never preciselyknow both the position and velocity of a particle, so one can say countless"virtual particles" constantly pop in and out of existence in vacuum,each of which could exert force.
Evidence for both virtual particles and vacuum energy hasbeen detected over the years. Some physicists have suggested there is enoughenergy in a coffee mug's worth of vacuum to boil all the oceans on Earth.Others more conservatively estimate it at roughly 350 trillionths of an erg,less than a thousandth of the mass-energy of an electron at rest.
Other universes, space-time tears
One consequence of quantum physics is the 'many-worldsinterpretation,' which suggests a virtually infinite number of universes exist,altogether comprising every possible outcome to every event ? including,perhaps, the truly horrifying possibilities seen in "Realm of Kings."
But how would one adventure to another universe? The answercould be increasingly familiar tears in the space-time continuum known aswormholes. Einstein proposed that mass and energy curve space-time, creatingthe force we know as gravity. One consequence of his theories is that enoughmass or energy concentrated in one place can warp space-time enough to createdistortions allowing shortcuts in space, travel back in time and even voyagesto other universes.
The main problem with any concept involving wormhole iskeeping them open enough for travel, as they naturally want to slam closed andform black holes. However, physicists speculate that bizarre phenomena such as exoticmatter or phantom energy could render wormholes traversable. Exotic mattermoves in the opposite direction of normal matter when pushed, while phantomenergy might be driving the accelerating expansion of the universe, potentiallyone day tearing apart galaxies, stars, planets and even atoms in a "BigRip."
As unfathomable as exotic matter and phantom energy seem,they are both currently theoretically possible ? another fantasticpotential element in the cosmos-spanning "Realm of Kings." | https://www.space.com/7596-science-marvel-comics-cosmic-tale.html |
“It’s never too late to achieve your dreams.”
Please introduce yourself to our readers.
My name is Fareah AlWagayan. I’m an auditor in State Audit Bureau of Kuwait and I’m an endurance horse rider.
Tell us about your education.
I have an accounting Bachelor’s degree from Kuwait University.
Tell us about your career journey.
My entire journey was full of difficulties, especially as the sport is not supported by the government. I had to work very hard to let my country and people know me and had to practice in private stables and the desert, training for long hours. It was very difficult to manage time between my job and my horse riding training. Alhamdulillah, I overcame all of these difficulties and won many regional and international races. I am now an international rider having participated all over the world.
How do you manage your time? Describe your average day.
I work from 8:00am to 2:30pm then I hit the road for an hour and a half to Wafra Desert and I practice until 6pm. I arrive home at 8pm. It’s a long and busy day and exhausting but when we love something we do what we have to do to achieve our dreams.
What is your biggest strength?
Passion and surviving.
Do you have any weaknesses?
The fear of losing someone I love.
Have you made any mistakes that have made you stronger?
I’ve made some wrong decisions but I learned to be who I am right now.
What have been the biggest challenges you’ve faced during your career?
I have faced many challenges like riding for long distances (eg.100km, 120km, 160 km). In addition, most endurance horse riders in Kuwait are men so being a woman in this field is so hard. There is no support from the competent authorities.
How do you stay motivated during challenging times?
By winning the race and representing my country. This is my biggest motivation.
What do you do to relax?
Horseback riding.
What has been your proudest moment so far?
Winning the world ladies cup in Verona Italy at 120 km.
3rd place in SH. Mohamad Bin Rashad 100km race (the only girl among 140 male riders)
What is your biggest fear?
Losing someone I love.
What is your favourite quote?
“It’s never too late to achieve your dreams.”
Name one item in life you can’t do without.
Coffee.
Best advice you have ever taken?
Don’t be afraid to fail, just keep trying.
Share three books on your nightstand.
المراة الكاملة
السجينة
الجريمة و العقاب
In your opinion, what are the three keys to success?
Confidence, courage and determination.
What is next for you? What would you still like to achieve?
Participating in the World Champion Cup at 160km.
What advice would you give to young women starting out in their career?
Follow your dreams no matter what difficulties you face in your life.
How does it feel to be a CP Woman of Substance?
First, I’d like to thank CP Magazine for the appreciation. It’s my pleasure to be a part of the event, especially on an important day for all women in the world. Big thanks!
Your message for the team at CP magazine:
Big thanks to CP Magazine for the trust and appreciation. | https://cpmagazine.net/fareah-al-wagayan/ |
High-rise flat residents to have say on strengthening fire safety
PEOPLE who live in high-rise flats are being asked to give their views in a public consultation on strengthening fire safety in the buildings.
To comply with recommendations made following the Grenfell Tower tragedy, the Scottish Government plans to simplify guidance to highrise flat residents and those responsible for fire safety there.
Ministers also propose holding a campaign to raise awareness of the dangers of dumping rubbish or unwanted items in common areas in the flats.
The recommendations made by a ministerial working group set up following the Grenfell Tower fire in 2017 include creating a consistent position regarding the storage, removal and enforced prohibition of combustible materials in common areas and the introduction of Scottish guidance on fire risk assessments, as well as the safety campaign and streamlining guidance.
Community Safety Minister Ash Denham said: “The tragic events at Grenfell Tower emphasised how important building and fire safety is.
“In Scotland we have stringent regulations but are committed to further improving the safety of those living in high-rise flats.
“We want everyone who is responsible for fire safety in high rise domestic buildings to have easy access to guidance that is relevant, informative and will work in practice.
“The public’s views, particularly people and families living in high-rise flats, are vital in this process and I would encourage everyone with an interest to respond to our consultation and ensure their voice is heard.”
Scottish Fire and Rescue Service Assistant Chief Officer Ross Haggart said: “We are fully supportive of this consultation and any efforts to enhance the safety of residents within high rise premises.
“I would like to take this opportunity to remind communities across Scotland that we are here to support them to stay safe, most notably through our free Home Fire Safety Visits where firefighters will provide safety advice and guidance on what to do in the event of an emergency.”
He said high-rise safety information is available on the service’s website and added: “We will meanwhile continue to routinely carry out operational assurance visits at high rise premises for the purposes of checking facilities and arrangements for firefighting and firefighter safety.”
The consultation closes on July 17. | https://www.pressreader.com/uk/evening-times/20190424/281569472136103 |
Any Nation wishing to intervene in a matter before the courts involving children involved in the child welfare process, a Nation used to be able to bring an application to intervene in accordance with the test set out at common law. However, recent changes to the Child Youth and Family Enhancement Act legislation (“CYFEA”) now potentially restrict the right of First Nations to apply to intervene only on the first appearance, if it is post-Permanent Guardianship Order (“PGO”).
The right to intervene is not guaranteed if the child is not the subject of a PGO as the legislation only speaks to planning and not Band Participation. Under the current legal regime in Alberta, when a First Nation child becomes the subject of child welfare proceedings under the CYFEA, the Nation to which the child belongs does not have a guaranteed right to be involved in the court process.
The law that provides the right for a band to participate does not apply in all circumstances and has gaps that allow for some circumstances that prevent First Nations and Indigenous Groups from having a guaranteed right to be involved in legal proceedings relating to their own children.
At Mincher Koeman, we are aware of the obstacles that the law has put in place, and the gaps in the law when it comes to protecting Aboriginal children and their cultural safety. In confronting this, we work with First Nations groups to take all steps necessary to place them before the court, to make certain that the court and all parties are aware of fully informed about those issues that are most critical to Aboriginal Children. Whether this is simply ensuring that the rights guaranteed under the CYFEA are upheld and adhered to, or by bringing applications to allow an Aboriginal Groups to intervene in a matter where there is no guaranteed right under the law, the lawyers at Mincher Koeman are committed and focused on advancing the right of our Aboriginal clients in being involved in matters engaging their own children.
Under the CYFEA, if a child who is the subject of an application for guardianship by a private individual is a First Nation individual or a member of a First Nation, the person applying for guardianship of the child must serve the child’s Nation with a copy of the guardianship application. This requirement of notice to be served upon the child’s Nation is required regardless of whether the child is a registered member of the Nation or is even just entitled to be a member of the Nation.
However, this right of being provided notice is not absolute. Under this same legal framework, the court may, if it considers it appropriate to do so, do away with the requirement of notice upon a First Nation or Indigenous Group. Nor is the right of a First Nation or Indigenous Group to participate in the legal process absolute or guaranteed. This is because once notice of a private guardianship application is given, the Nation or Indigenous Group only has the right to appear at that first hearing and make submissions to the court as to why they should be permitted to participate in the proceedings. The court has the right and the authority to deny any First Nation or Indigenous Group the right to participate in an application regarding one of their own children.
In cases where a First Nations child is receiving services from the Child Welfare authorities in Alberta, if that child is a registered member of a Nation, then under the CYFEA, the Director of Children’s Services is required to involve a person designated by the council of the Nation in planning for the services to be provided to the child. While this is a mandatory requirement, unlike in the case of private guardianship, this obligation is only triggered if a child is actually registered as a member of a Nation. If the child is entitled to be registered but is not at the time child welfare authorities become involved, then the Director has no obligation to involve a First Nation in helping to plan the most culturally appropriate services for one of their children. Further, even in cases where a Nation is “involved” by the Director in planning for services to be provided to a First Nation child, there are no specific guidelines in place. The rights and authority a Nation has to determine the services for a child once they are involved are not clear, nor is it clear if the Director maintains complete authority and discretion, notwithstanding a Nation’s involvement.
The Canadian Government recently passed Bill C92: An Act respecting First Nations, Inuit and Métis children, youth and families. This Bill seeks to enact laws that grant greater rights of involvement and representation for First Nations and Indigenous Groups when their children are caught up in the child welfare system. Unlike the CYFEA, Bill C92 does not appear to require that a child be registered with any Nation or Indigenous Group, but merely that they are an Aboriginal Person. In all cases, under Bill C92, where child welfare services are being provided to child and the matter goes before a court, the child’s First Nation or Indigenous Group is automatically entitled to be part of such a process and provide representations to the court.
Unfortunately, while Bill C92 has passed and received Royal Assent, it has not yet been determined when the Bill will actually come into force as a federal law. Further, the Bill only provides for the right of First Nations Groups and Indigenous Groups to make representations and does not guarantee such groups the right to provide evidence or call witnesses.
At Mincher Koeman our lawyers have a wealth of experience in assisting First Nations groups in ensuring that their rights under the CYFEA are upheld. We are aware of the limitations that the law imposes on the opportunity for First Nations groups to be involved and ensure that their children are culturally secure and safe. We are aware of the strict timelines that have to be complied with to ensure that any group can intervene under the CYFEA and when those requirements apply.
We act to ensure that Indigenous and First Nations groups are not only heard by the courts but remain involved throughout the process, having the chance to remain engaged in the legal process and provide critical information and evidence to the courts and the parties involved so that the best interests of the child are truly considered from culturally relevant perspectives. In those cases where First Nations and Indigenous groups are not given the right, under the legislation, to attend court and speak to matters involving their own children, our lawyers will act to have the children’s Indigenous or First Nations groups intervene in the legal proceedings outside of the legislation, ensuring that the courts and the parties are aware of the critical and unique information that the Aboriginal Group is able to provide.
Mincher Koeman’s lawyers are incredibly knowledgeable about the Alberta child welfare process, and the unique factors that apply when Indigenous or First Nation children are involved. Our firm is committed to providing assistance to communities seeking to provide guidance and cultural information that is extremely relevant to child welfare investigations and guardianship applications. Please contact our office to make an appointment to discuss your matter with one of our lawyers today by calling us at 403-910-3000 or by contacting us online.
707 7 Ave SW #1300,
Calgary, AB T2P 3H6
© Mincher Koeman LLP 2023. All rights reserved. | https://familylawyerab.com/areas-of-practice/indigenous-family-matters/intervenor-applications/ |
.
These auditions take place the first couple of weeks during regular music classroom time.
* Treble Chorus meets on Wednesdays after school from 3:35 - 4:25pm starting in October *
Concert Choir
is a non-auditioned ensemble open to all students in grades 5-8
.
* Concert Choir meets on Thursday mornings from 8:00 - 8:50 am starting in October *
Click on link below for the current rehearsal schedule
Call time for students is 6:45pm
~Daytime assemblies @ 9:50 am & 1:55pm~
*Concert Attire*
Black & White
Boys:
Black Pants, White Shirt, & Shoes
Girls: | https://www.bedminsterschool.org/olc/13/page/460 |
My Approach to Helping
*Now accepting new clients** - including telehealth appointments. We are a holistic based practice that is focused on women's wellness, healing, and self-compassion. We strive to support individuals to be well, live authentically, and show up as their best self. We provide a safe and welcoming environment to promote self discovery, healing, and growth. We are dedicated to providing a space for you that is comforting and free from judgment, inviting you to work on living a life of happiness and wellness. We currently serve teens and adults through individual counseling sessions.
We offer a warm, welcoming, and safe environment to meet you wherever you are in life. Providing you support with finding healing through work on self discovery and helping you to deepen the connection you have with yourself. If you are struggling with a negative mindset, anxiety, depression, or low-self esteem-we are here to help. | https://www.goodtherapy.org/therapists/profile/christa-dicasparro-20201028 |
Abstract: This talk examines gaps in Hebrew passivization, where verbs in certain patterns lack infinitive forms and compensate for it by relying on inflectional paradigms of other patterns. Empty cells in the inflectional system are filled based on inter-paradigmatic relations between verbal patterns, where the relation between them is derivational.
Hebrew infinitives are formed in different patterns based on their verbal pattern (binyan) (hiklid-lehaklid'(to) type'). CuCaC and huCCaC lack infinitive forms (huklad-*lehuklad '(to) be typed') Conceptually, there seems to be no reason for this gap, which is less typical of inflectional paradigms (Booij 1997, Stump&Finkel 2013 and references therein). niCCaC passive verbs have infinitives (nišlax-lehišalax '(to) be sent'). Because niCCaC is not exclusively passive, its infinitive pattern is also available as passive.
A web search reveals cases where speakers use niCCaC infinitive patterns for CuCaC and huCCaC. For example, the infinitive of huklad ('be typed') surfaces as lehikaled despite the lack of such verb in niCCaC(*niklad). This is a relatively rare case of paradigm (binyan) crossing, where empty cells in one inflectional paradigm are filled by relying on another paradigm. Note the relations between the paradigms of each binyan are derivational. The infinitive form could be expressed periphrastically using participle forms of the same paradigm with the verb 'be' (lihyot muklad 'to be typed'), but there is a tendency to express it via one lexeme (see Kiparsky 2005). Speakers compensate for the lack of infinitive patterns and reply on niCCaCas the only passive binyan with infinitives. Despite the low productivity of niCCaC, it is still used for filling empty cells. This shows the importance of paradigm accessibility in both inflection and derivation beyond paradigms of specific patterns. | https://english.biu.ac.il/node/730 |
When children begin to start at a day-care or preschool it is a major change for the child and their family. This is the opening to a whole new beginning for the child. Educators usually choose education as a profession because they love children, but being a teacher is more than that. We need to look at children in the context of their family and the family in the context of the community. Teacher would then need to have a connection with the children, family, and community. In this paper I will discuss theories and concepts that support the child and their family. I will also discuss strategies teachers can use for different behaviors the children may have and what they can suggest to the family to help these behaviors as well.
One very important factor that educators need to know is that all families are different. They have different cultures, races, ethnicity, socioeconomic level, and family structure, which all play into what these families are. We need to be aware of these things. Educators should make these families feel comfortable and they should respect them. They should also take interest in their culture or ethnicity so they will know how to make the child feel comfortable in the classroom setting. Encourage these parents to be involved in the classroom, bring a little bit of what their culture is like to the other classmates attention. Maybe encourage them to read a story about their culture to the class, or let the children try different foods that are normal to them. This can really make the family and the child more comfortable in the classroom. Parents could encourage their child to become familiar with foods, language, attire, whatever it may be, at home. This way the child knows about different cultures as well and has no reason to feel left out. All of these things have to deal with the interactions of a child. Urie Bronfenbrenner came up with a theory to support all the interactions a child has, this is called “Bronfenbrenner’s Ecological Theory.” The first layer of Bronfenbrenner’s theory is the microsystem. The microsystem is a child’s closest interactions. These would consist of immediate family, teachers, peers, child care, and the neighborhood play area. The second layer of the theory would be the Mesosystem. The mesosystem is the interactions that the people in the child’s microsystem have interactions with. Examples of these interactions would be; child care, school, local industry, religious or spiritual groups, neighborhoods, and home. The next layer of Bronfenbrenner’s theory is the Exosystem. The layer is a broader layer that the child can be affected by. This may include; family networks, school board, local government, social welfare, work places, mass media, neighbors, extended family. The last layer of the ecological theory is the macrosystem, which is the largest of all the layers. This would include; values, laws, customs, culture, idieologies. Bronfenbrenner’s theory is very honest and true. These are the interactions that children have and each one of these layers affect the child in some way. Teachers need to understand the influences that these children and their families may have on them.
All educators need to take a family-centered approach to teaching. A family-centered approach takes the individual child and the group of children out of the spotlight and instead focuses on the children within their families. That means that parent involvement isn’t something the teacher does in addition to the program for children, but that the program includes the family as an integral, inseparable, part of the child’s education and socialization. Families, along with their children, are the program.( Gonzalez-Mena 2009) This would mean that families and teachers need to become partners. They will have to compromise and work together to benefit the education the child receives. The child... | http://www.studymode.com/essays/Childrens-Behavior-1302776.html |
Momentum, a space and time distorting exhibition described as a “spatial instrument,” premiered at London’s Barbican Curve Gallery this past February, and included twelve mechanical pendulums that formed an evolutionary composition of light, sound, and movement. As visitors traverse the space, the pendulums were programmed to move in idiosyncratic manners, so that shadows surged across the room and sounds bounced off the chamber walls. It became a unique (and beautifully hypnotic) experience for every visitor.
The Creators Project is detailing some behind-the-scenes photos of the immersive, 90-meter-long audiovisual exhibition. Momentum may need to be experienced in person to fully comprehend how captivating it truly is, but the photos give insight into how much energy and effort was needed to make the piece a truly mesmerizing work. Take a look at the specs and the doc, and get an inside peek into the mind-bending ingenuity.
Info and images courtesy of The Creators Project
See more behind-the-scenes images, here. | http://inspirationist.net/distorting-space-and-time-united-visual-artists-momentum/ |
The Tees Valley School Games is a unique opportunity to inspire young people to take part in competitive school sport. It is an exciting, fully inclusive competition for school children in the Tees Valley drawing on the values and inspiration of the Olympics and Paralympic Games and celebrating the participation and achievements of everyone taking part.
An intra-school competition is a sporting activity taking place between pupils who attend the same school. For example, this can be in the form of an inter-class or house activity. These competitions should culminate in an annual School Games Day, or Sports Day, to celebrate a school’s sporting success.
A local inter-school competition is a sporting activity taking place between schools from the same area either as a one-off fixture or as part of a league. These competitions may act as qualifiers for county finals or can be run as developmental competitions or festival events to meet the needs of a local area.
A county final is a showcase event held either as the culmination of a series of local inter-school competitions or as open entry events, with invitations made by the Local Organising Committee (LOC).
Would you like to know more about the School Games?
Visit the Your Schools Website for more info. | https://www.teesvalleysport.co.uk/young-people/school-games/ |
Vallabhacharya is the founder of the Pushtimarg or Pushti Sect associated with devotion of Lord Vishnu. Here is a collection of quotes and teachings of Shree Vallabhacharya.
You should all be good and religious person – Not a God fearing man but a God loving man. Speak the truth. Be just and honest to all. Treat all persons equally. Have faith in Lord Krishna and surrender yourself to him. Be charitable and never harm the hungry and the weak. Realize that service to men and animals is service to God.
You should believe that Krishna is our God and never slacken your faith in him and then he will surely protect you. You should regard him as the be-all and end-all of your life. Your ultimate good lies in serving him, which should be done with all your heart, mind and soul. Trust in his protection. Remember him always in all thoughts, words and deeds.
Be free from sorrows and anxieties concerning your future, for you are safe in my (Lord Krishna’s) hands. Only you should love me with the love of Gopis. If you do so then you will surely secure liberation. That is the only means of union with Me, by which you will regain your original divine nature. Do not give your thoughts to worldly matters. Be devoted to me and render service to ‘ME’ by all the Means at your disposal. | https://www.hindu-blog.com/2019/02/vallabhacharya-quotes-and-teachings.html |
* Any views expressed in this article are those of the author and not of the partner organisations producing zilient.org.
The past year has provided a stark reminder of the reality we face regarding water-related disasters resulting from a changing climate. The summer and autumn of 2017 saw a string of record-breaking hurricanes engulf the U.S. Gulf Coast, eastern seaboard, Puerto Rico and the Caribbean, with significant devastation experienced by communities living in these areas.
With global temperatures already more than 1 degree Celsius above pre-industrial levels, we’re being faced with environmental changes faster and greater than ever before. Rising sea levels, storm surges and drought are the most immediate concerning results of this, especially given the proportion of the world’s population and economy potentially impacted.
Today, 54 percent of the world’s population lives in urban areas, and this is expected to increase to 66 percent by 2050. Many of these cities and towns are in low-lying coastal locations, meaning flooding threatens human life, as well as the economic, social and environmental values of urban communities. Twenty mega-cities are predicted to be located on the coast or within delta systems by 2030, with a total combined population of over 420 million people.
It is therefore vital for urban areas to consider their resilience to change across the water cycle – both in terms of protecting against water damage but also maintaining the freshwater quality and quantity required for human survival.
Last month I joined scientists, politicians, industry experts and activists to discuss these challenges on “Water Action Day” at COP23 in Bonn. Going into and emerging from the U.N. climate conference, it remains clear that changes to our water environment and our cities are the main ways climate change will be felt by people around the world. And it’s my belief that, unless “water” is properly addressed and considered, then the implementation of any global climate agreement will fail.
There remains, however, no single quick-win answer to protecting cities from changes to the water cycle. Adaptation to sea-level rise, particularly flood risk and storm surge, will require the cooperation of a number of parties across the private and public sectors.
There are a huge range of interventions, which broadly fall into the categories of protect and adapt; accommodate and recover; and retreat.
CITY CHALLENGES
Drought has posed massive challenges to Australia and the West Coast United States in recent years, and is a major headache for Cape Town.
The “protect and adapt” strategy most commonly relies on structural approaches, which are generally designed to reduce the risk of an event by decreasing its probability of occurrence (for example, flood warning, hard or natural flood defences, and adequate water supply).
The “accommodation and recover” strategy reduces the impact of sea-level rise through changes in human behaviour or infrastructure, while maintaining the use of coastal areas (for example, land use planning, building codes and water demand management).
As sea level rises and flood risk increases, evacuation or relocation away from coastal areas is likely to become an increasingly necessary adaption option. Many cities will need to decide to retreat from certain locations or relocate particular assets. For many, a combination of all three will be required. For those cities exposed to water shortages, consideration of short- to long-term actions, including water rationing and desalination, pose their own challenges to citizens.
Cities also shoulder a large responsibility for developing our world’s resilience to water and climate change. While repercussions will be felt around the world, the most immediately vulnerable cities and populations - those who are already highly exposed to extreme climate phenomena - will be the most affected. These are the same people with the least capacity to respond and adapt, and if we don’t act urgently, political and social tensions and conflicts will likely increase.
Water unites us all – our dependency on it and our vulnerability to it. It must be seen as a connecting enabler between policy areas, economic sectors and borders, and as a means to bridge trust between poor and rich countries.
Ultimately, coordinated action is needed now to increase visibility for water within the Global Climate Action Agenda – because, make no mistake, the decisions made today will set the trajectory for generations to come.
Topics
Be the first to weigh in
Log in to leave a comment. | https://www.zilient.org/article/water-has-potential-make-or-break-urban-resilience |
How do we define the transformation of education?
Transformation is a continuous process and an ongoing process. Education indicates the process of transformation of individuals.
The blend of the two terminologies refers to the modification of pedagogic practices. The transformation of education became an integral part of the process in upliftment and empowerment of human beings. Transforming education took us a step further into knowledge, skill, and enlightenment.
Is transforming education crucial?
The transformation process offers a wide range of opportunities for rethinking educational practices. The Convention on the Rights of the Child guides us towards a more child-centred model of teaching and learning, one in which students have active participation, have exceptional thinking skills, and possess problem-solving skills as well.
Learning for life in the 21st century requires not just equipping children with a basic education in literacy and numeracy but also equip them with more advanced, complex skills for living that can serve as the foundation for life. It has been a recent focus on the gap between what is taught and what is learned, and the large numbers of children caught in between.
Education is called a teaching-learning process because it is a complex blend of both.
In an educational process, the learning environment must be transformed into one that is active and child-centered. It must be linked to the developmental level and abilities of the learners. Education should empower children to be able to express their views, thoughts, and ideas. They should be able to express themselves without the fear of their opinions differing from the perceiver. Education must address the fact that children need opportunities for joy and play. They need to be comfortable with themselves and with others, and they should treat and be treated with respect by all.
In such an environment, children develop a sense of self-esteem that, when combined with knowledge, skills, and values, enabling them to make informed decisions throughout life. The teaching approach must take into account factors such as gender, language and culture, economic disparities, and physical and mental disabilities and enable children to deal with them positively and optimistically.
What is the history of Education?
Education is mostly associated with children and schools, but it is much more than that. Education is a teaching and learning process. Education can be thought of as a process of enlightening through the transmission of the values and accumulated knowledge of a society. It is designed to mould behaviour and direct towards social expectations.
The history of education is as old as the existence of human beings themselves. It could be traced back to the primitive culture.
In primitive culture, with the absence of formal education, education was attained through learning from the environment. Learners in [-primitive culture learned by observing and imitating. As societies progressed and grew complex, the need for formal and institutionalized education grew too.
This concentration of learning in a formal atmosphere allows children to learn far more of their culture and attain knowledge of the world, than does mere observation and imitation.
As society gradually attached more and more importance to education, it also tried to formulate the overall objectives, content, organization, and strategies of education.
The curriculum that we are familiarized with, in the present day, used to be entirely based on cultural values, tribal religion, myths, philosophy, history, rituals, and other knowledge. It is quite interesting that all these elements are still present in the existing curriculum. These elements have been embedded in all the domains that are covered in the curriculum.
Initially, for years, children learned and got educated through play and exploration. Anthropologists have reported that hunter-gatherer groups did not distinguish between work and play.
However, with the rise of agricultural society, children became the bearers of the family along with all the other members.
Eventually, with the rise of the industrial sector and a new bourgeoisie class, employers saw schooling as a way of creating better and efficient workers.
As nations became centralized, national leaders saw schooling as a means of creating good patriots, loyal soldiers, and future leaders. So, everyone involved and engaged in the founding and support of schools had a clear vision about the learning of children.
Schooling and educational practices were seen as an inculcation and implantation of certain truths and ways of thinking into children’s minds.
How has education transformed in India?
India is known for being the place of one of the most ancient civilizations in the world. In ancient India, religion was the mainspring of all activities. It majorly consisted of prayer and worship, philosophy, morality, and law.
The period of Guptas and Harsha and their successors is remarkable in Indian history. It was the age of the emergence of the universities of Nalanda and Takshila and the rise of Indian sciences, mathematics, and astronomy. The university at Nalanda housed a population of several thousand teachers and students, who were maintained, out of the revenues from more than 100 villages. The education in these universities covered the Vedas, logic, grammar, astronomy, medicine, psychology, Buddhist philosophy, and Hindu philosophy.
Eventually the Vedic tradition was later followed even during the Mughal as well as the British rule. While during the Mughal rule, the major educational practices were based on the Islamic ideologies, during the British rule, Christian missionary schools were opened.
However during the British rule, the use of English language was emphasized on. During the British rule, the entire mind-set about education changed.
After independence, government set up various educational institutes to ensure quality education for learners from both rural as well as urban areas followed by private institutional set ups of education.
As the country progressed, the education system developed too. However, the major development was marked with the emergence of technology in education as it enabled us to look within as well as beyond.
How has technology transformed education?
Digital Transformation of education plays a major role in the transformation of education. Technology plays a vital role in the 21st century where it is interwoven in every activity of life, including education.
The emergence of technology into education has enabled learners as well as teachers in progressing to the extent that seemed unachievable. Technology has infused classrooms with digital tools that have improved the process of learning. Technology has also enhanced educational productivity and entirely changed the idea of education by reimagining it. Technology gives immense possibilities to learners by providing access to an abundance of information. It has eliminated the limitation of attaining knowledge through one source.
Technology has always been a crucial component in education and technology-aided education has always been considered to be modernized education. Though, the meaning of technology in education changed with the sudden outbreak of Covid-19.
Earlier what was a choice became a necessity, and all educational institutes had to embrace technology and embed it into their system. The whole idea of experiencing education was based on the importance of physical classrooms, changed into virtually experiencing schooling and education.
Digital transformation of education enables providing an online platform for educational collaboration of sharing ideas and resources online. It has also helped the learners in developing valuable research skills at a young age.
Technology has empowered us by preventing the failure of the education system by adopting digital transformation across the country, during the unprecedented arrival of the Corona virus. It has widened the possibilities of being more productive and efficient and developing innovative and enhanced skills.
The digital transformation of education is the future of the educational experience as much as it is the present.
References
Gray, P.(2008, August 20). A Brief History of Education. Retrieved from: https://www.psychologytoday.com/us/blog/freedom-learn/200808/brief-history-education
The Role of Transformation in Learning and Education For Sustainability
W. Filho-S. Raath-B. Lazzarini-V.R. Vargas-L. Souza-R. Anholon-O.L.G. Quelhas-R. Haddad-M. Klavins-V.L. Orlovic – https://www.sciencedirect.com/science/article/pii/S095965261831984X Saxena,S.(2013, October 8). | https://naturenurture.in/blog/transforming-education-system-in-india/ |
I make no particular comment about this chatty stroll through the ways and means of getting an injunction, save to note that it was written by Nigel Tait, a partner at Carter-Ruck and appears on the firm's website:
“
In many cases it is clear to the lawyer, within minutes of taking instructions, whether or not the exercise may be worth while or is likely to be successful and, if it is, it is important to explain to the client:
i. the risks of it going wrong; and
ii. the risks of it going right!
As to the risks of it going right, a solicitor must explain to the client that if he obtains an injunction it will be necessary to issue proceedings and pursue them vigorously until trial or settlement. Additionally, and most importantly it is necessary to explain the "cross undertaking as to damages" to the client. The position is this. If the client obtains an interim injunction but subsequently the case goes to trial and he fails to obtain a final order the defendant can maintain that he was restrained unjustly and will generally be entitled to damages for any losses that have been sustained. Emphasis added. Sometimes, mind you, it can all go right (ie, you obtain your injunction) and it still goes horribly wrong. | https://www.spectator.co.uk/article/carter-ruck-s-own-goal |
The Playing with Color series introduces students to music making from the start. Colored notation, numbered staves, as well as clear graphic illustrations for the right and left hands are presented in the beginning of each book. Thereafter, theory, rhythm, ear training, improvisation, and sight-reading exercises are gradually introduced so the student has the best possible platform upon which to build. | https://www.justflutes.com/shop/product/playing-colour-book-1-sharon-goodey |
At The King’s College we believe a student’s education is not just about Academics. The aim of education should be to develop an all-rounded student, including all developmental aspects: intellectual, spiritual, social, physical and moral capabilities. We believe a balance in all these aspects will benefit the child and enhance their time at the King’s College.
Studies have shown that students who participate in co-curricular activities have a marked improvement in their grades. This can be attributed to the skills they learn specific to the activity e.g. study clubs, or through their commitment to co-curricular activities, such as better time management to accommodate their hobbies, better organizational skills and a boost in their self-esteem. In all activities students will learn fundamental life skills. Such as leadership skills, teamwork, critical thinking and social skills. For students who may struggle to connect with their peers, we see extracurricular activities as a perfect way to meet and spend time with new people, forming new friendships along the way.
We hope to see all our student’s find a new interest through our program. For some it may just become a hobby, but for others it may provide the platform to build their future career. | https://thekingscollege.wa.edu.au/extracurricular-activities/ |
Sarah has a BA Dramatic Studies from The Royal Conservatoire, Glasgow and a PGDE in teaching as well as qualifications in Teaching English as a Foreign Language and Counselling Skills.
Sarah has lived all over the world including places as far flung as China and Canada. Sarah has taught Drama and Communication Skills for over 20 years and is passionate about helping people become the best they can be.
Fiona MacPherson
Since 2006 Fiona has worked in education helping people master their nerves to communicate to an audience effectively. Fiona has worked with people of different ages, cultures, economic and social backgrounds to direct, guide and coach them towards confident and successful presentations. Fiona is fascinated by behaviour and how to read non verbal signals to assess how people feel and act. She has a BA in Acting with distinction and a PGDE in Education with distinction from Edinburgh University.
Contact [email protected]
We welcome inquiries from higher and further education institutions, corporate entities and social enterprises regarding our bespoke communication workshops. If you’d like to get in touch with us and find out more, please email us at [email protected] and we will respond at our earliest opportunity. We look forward to hearing from you. | https://appliedtheatre.co.uk/the-team/ |
Special Programs and Opportunities
It’s important for you to get out of the classroom — whether that means working through internships, studying off-campus or gathering with fellow students. What you do in your spare time at Hope is up to you — and there’s plenty of options to choose from.
You’ll find that taking part in required and extracurricular activities during your time at Hope enhances your field of study. We offer ample opportunities in research, field work and off-campus studies, which will complement your coursework, and access to student organizations, which gives you meaningful connections that carry with you during your time at Hope.
- FACULTY/STUDENT COLLABORATIVE RESEARCH
-
Student/faculty collaborative research is an integral part of our program. In the past decade, our faculty have been awarded nearly half a million dollars in research grants from the Lilly Endowment, Michigan Department of Education, the Aspen Institute, the Reformed Church in America and several other funding agencies.
We have access to many state-of-the-art facilities and equipment for research, including an electronic library of social science data, a computer-assisted telephone interviewing system (CATI), quantitative and qualitative data analysis software and an optical scanner.
As a sociology or social work major, we encourage you to collaborate with faculty on original research. Students actively publish and present findings, and we send students to the National Conference on Undergraduate Research (NCUR) almost every year.
Topics for research vary by year and faculty member, but have included gender differences in educational attainment, post-traumatic stress and violence, development of grassroots social movements and community health.
Sociology Research
If you’re interested in theory-based research, contact Professor Franzen. For summer research, gender and qualitative projects, contact Professor Swanson. For information about other research opportunities for sociology students, contact Dr. Nemeth.
Social Work Research
Contact Professor Chavis for mentoring opportunities in social work and professors Feaster and Sturtevant for international, qualitative research.
Above: Professor Roger Nemeth's SOC 390 – Advanced Research Methods class took a bike tour of the seven Holland neighborhoods included in their study this semester.
- INTERNSHIPS
-
We offer internships in sociology and field placements in social work.
Sociology
You can pursue a sociology internship as part of your degree program in SOC 499. You’ll have the opportunity for a supervised, practical internship in governmental, private and/or non-profit organizations. Chicago Semester is a great option for all sociology majors, and gives you the benefit of working in an urban setting.
Sociology with Criminal Justice Emphasis
If you’re a sociology major with criminal justice emphasis, your coursework and internship placement through the Chicago Semester are a required part of your degree program, since requirements for field placement are very stringent.
Social Work
Field work is a requirement of the social work degree program. As part of SWK 443 and 446, you’ll spend 220 hours in the field each semester during your senior year. Our social work field experience involves opportunities at over 30 local human service agencies, including schools, hospitals and nonprofit organizations. You might find yourself at the Community Action House in Holland, at Allegan County Family Court in Allegan or at the Career Assessment Center in Holland. Your opportunities are varied and diverse, based on what specialty you’re looking to go into. With prior permission, you may elect to take your senior year internship in Chicago at the Chicago Semester.
These off-campus opportunities give you a chance to work for urban social work agencies in a diverse setting.
- OFF-CAMPUS STUDY
-
Studying off-campus is a great way to gain a broader understanding of human behavior in different contexts get a more diverse understanding of the very nature of people and what’s going on within their environment — an essential practice that we strive to understand as sociology and social work majors. Visit the Fried Center for Global Engagement for information on studying off-campus during the school year, May Term or summer.
May Term Programs
Several of Hope’s May Term programs are perfect for our sociology and social work students. Travel to the Rosebud Native American reservation with the Department of Education to practice social work, healthcare and practical teaching methods with the Lakota Sioux, as well as the Todd County School District. Travel to Northern Ireland to study peace and reconciliation or to Liverpool for courses on the many ways we connect with one another and create community, both with our Department of Communication.
- STUDENT ORGANIZATIONS
- Join our student-run group, the Sociology and Social Work Organization, to promote our disciplines within the community, on-campus and among your peers. Faculty advisors include Pam Koch and Llena Chavis, and 2017–2018 student leaders are Lizzy Van Harn, Emily MacArthur, Emily Dunphy, Keila Mendoza and Ava Massarella.
- SEMESTER PROGRAMS
- We encourage sociology and social work majors to take advantage of off-campus study opportunities. In fact, as a sociology major with criminal justice focus, your coursework and internship placement through the Chicago Semester are a required part of your degree program.
- HONORS PROGRAMS
-
Alpha Kappa Delta
Alpha Kappa Delta (AKD) is the International Sociology Honor Society. It is affiliated with the Association of College Honor Societies and the American Sociological Society.
Alpha Kappa Delta seeks to acknowledge and promote excellence in scholarship in the study of sociology, the research of social problems and such other social and intellectual activities as will lead to improvement in the human condition. Alpha Kappa Delta scholars are dedicated to the ideal of Athropon Katamannthanein Diakonesin or “to investigate humanity for the purpose of service.”
Undergraduates at Hope must meet the following minimum criteria to be eligible to join Alpha Kappa Delta:
- Be an officially declared sociology major or demonstrate a serious interest in sociology within an official program. Sociology minors are eligible. Other majors are eligible so long as they have taken at least four SOC classes and meet all other requirements.
- Be at least a junior (third year).
- Rank in the top 35% of their graduating class in general scholarship. If class rank is not readily available to a chapter representative, in lieu of class rank, students shall have accumulated the equivalent of an overall grade point average of at least 3.3 by a four point scale where: A=4, B=3, C=2, D=1, F=0
- Have maintained the equivalent of a 3.0 GPA in sociology courses taken at Hope prior to initiation.
- Have completed at least four regular courses in sociology at Hope prior to initiation (exclusive of extension of courses graded pass/fail)
The Alpha Kappa Delta faculty advisor is Pam Koch.
Phi Alpha
The purpose of Phi Alpha Honor Society is to provide a closer bond among students of social work and promote humanitarian goals and ideas. Phi Alpha fosters high standards of education for social workers and invites into membership those who have attained excellence in scholarship and achievement in social work.
An undergraduate student is eligible for active membership after achieving the following national minimum requirements and meeting local chapter requirements:
- Declared social work as a major
- Achieved junior status
- Completed nine credit hours of required social work classes
- Rank is the top 35% of their social work cohort
The Social Work Honor Society is advised by Liz Sharda.
- DEPARTMENTAL AWARDS
-
Senior Sociology Student Award
This award is presented to a senior sociology student who shows excellence in academic achievement, demonstrated service and outstanding promise in the field of sociology.
Senior Social Work Student Award
This award is presented to a senior social work student who shows excellence in academic achievement, demonstrated service and outstanding promise in the field of social work.
Jeanette Gustafson Award
This award is presented to the most deserving graduate student of the social work major, chosen on the basis of demonstrating academic achievement, voluntary involvement in organizations aimed at aiding the community and/or the college, and promise for significant contribution to the helping professions. | https://hope.edu/academics/sociology-social-work/special-programs-opportunities.html |
THIS year many of us would be happy to see a cloud on the horizon, however for scientists monitoring research and disaster impacts, a series of cloudy days is a big problem.
A new investment by the Commonwealth Scientific and Industrial Research Organisation (CSIRO) will give Australia access to one of the world’s most sophisticated high-performance satellites, one which can see in the dark.
The $10.45 million agreement was announced today at the International Astronautical Congress in Adelaide.
Costed over seven years, the agreement will give CSIRO a 10 per cent share of the ‘tasking and acquisition’ of the NovaSAR satellite.
Agricultural use
CSIRO Landscape Observation and Simulation Group research leader, Dr Alex Held, said the agreement would be beneficial for agricultural research and rural communities.
“Often it is too cloudy to use the optical satellites which we use for taking biomass measurements such as NDVI,” said Dr Held.
“The NovaSAR satellite is a radar imaging satellite.
“It measures directly the structure and the density of vegetation and crops.
“We will use this data to conduct research into how we can use radar data to track the growth and the biomass of crops.
“A good example is sugarcane, where we can use this to look at the development of the crop as it grows,” he said.
Due for launch later this year, the NovaSAR satellite uses an advanced form of radar technology known as S-band Synthetic Aperture Radar, or S-band SAR.
S-band SAR allow images to be developed based on radar rather then optical cameras.
This allows the images to be captured despite conditions which would stop light waves such as clouds and smoke.
Images can also be captured at night, unlike optical cameras.
The agreement will give CSIRO the right to direct the satellite’s activity over Australia as well as download and process the data in Australia.
Dr Held said while the satellite would primarily be used for research, it may provide an opportunity for proof of concept for commercial use of this technology.
“In the future, this may allow us to bring this experience into other satellites or new satellites we may build in Australia, with more broad scale mapping capabilities,” he said.
Developed by UK-based Surrey Satellite Technology Ltd (SSTL), and with a payload supplied by Airbus UK, S-band SAR technology is considered a significant advancement on current civilian satellite capability.
The satellite can collect data in different spatial resolutions depending on the mode, said Dr Held.
“It can be focused to collect at 6 metres over a small footprint, or up to 30 metres over a bigger swath, depending on what people want to use it for.”
Rural disaster intelligence
The radar will image through cloud or smoke, which will be useful in the case of fires said Dr Held.
“The technology does not detect the heat from the fire, but it will allow us to map the footprint of the fire.”
This will allow for comparison and measurement of impact of fires, he said.
The satellite could also be used in emergency situations such as flood or cyclone damage monitoring.
“The advantage of this agreement is that we are paying for time and the ability to point the satellite where we want it.”
“The data can be downloaded straight into Australian receiving stations, so it is an extremely fast turnaround for people who may need it in emergency situations,” he said.
Space capability investment
Federal Minister for Industry, Innovation and Science, Arthur Sinodinos, said the agreement was a timely investment in Australia’s space capability.
“Australia is one of the largest users of Earth Observation from Space data world-wide, with satellite data underpinning more than 100 state and federal resource mapping and environmental monitoring programs across Australia,” said Minister Sinodinos.
“This agreement will allow CSIRO, via its national facility management capability, to strengthen Australia’s delivery of excellence in science and innovation.
“It will help CSIRO lead our nation’s development in the technical and analytical capability of modelling, monitoring and analysing our natural resource management and approaches to infrastructure.
“This will also lead to better and more informed support for policy and decision-making and, ultimately, our economic development as a nation.” he said.
Dr Dave Williams, Executive Director of Digital, National Facilities and Collections at CSIRO, said the deal represented a significant investment in Australia’s space capability.
“Because we’ll be able to direct the satellite’s activity, it provides significant opportunities to support a wide range of existing research, further develop Australia’s earth observation data analytics expertise, and create new opportunities in the field of remote sensing,” he said. | https://www.farmonline.com.au/story/4945589/better-eye-in-the-sky/?cs=5380 |
The Dash Express (HXD8) is a networked collaborative automotive GPS unit from http://dash.net/ which was developped by Openmoko.
The FCC ID is: EUNHXD8V2. It does have a debug port that is compatible with the Openmoko Debug Board v3. It is fairly hard to get to (for a FR). It sits underneath the screen.
Found DFU: [0x1cd8:0x511a] devnum=13, cfg=0, intf=0, alt=1, name="u-boot"
Found DFU: [0x1cd8:0x511a] devnum=13, cfg=0, intf=0, alt=2, name="u-boot_env"
Found DFU: [0x1cd8:0x511a] devnum=13, cfg=0, intf=0, alt=3, name="config"
Found DFU: [0x1cd8:0x511a] devnum=13, cfg=0, intf=0, alt=4, name="factory"
Found DFU: [0x1cd8:0x511a] devnum=13, cfg=0, intf=0, alt=5, name="splash"
Found DFU: [0x1cd8:0x511a] devnum=13, cfg=0, intf=0, alt=6, name="kernel"
Found DFU: [0x1cd8:0x511a] devnum=13, cfg=0, intf=0, alt=7, name="alt_kernel"
Found DFU: [0x1cd8:0x511a] devnum=13, cfg=0, intf=0, alt=8, name="rootfs"
Found DFU: [0x1cd8:0x511a] devnum=13, cfg=0, intf=0, alt=9, name="alt_rootfs"
Found DFU: [0x1cd8:0x511a] devnum=13, cfg=0, intf=0, alt=10, name="dash_app"
Found Runtime: [0x0a5c:0x2110] devnum=5, cfg=0, intf=3, alt=0, name="UNDEFINED"
The serial interface is available only for u-boot. You can put it into DFU mode, and change the authorized_keys file to log into the unit.
According to https://svn.openmoko.org/trunk/src/target/kernel/patches/s3c2440-nand-disable-hwecc.patch the HXD8 will feature an S3C2440, capable of running up to 400MHz. The features are the same as the S3C2410 plus a camera interface.
According to a currently available hardware patch, the device supports 1 NAND Flash device of up to 4G. (uncertain about what kind of G that is. Could be 4Gb (which makes about 0,5GB), could be 4GB).
The DE has 3G of Flash, and there is no NOR.
Some other patch implies that there is the possibility of connecting 3 NAND Flash chips.
Using same GSM modem on GTA01 and GTA02, TI Calypso with 850/1800/1900 configuration.
The HXD8 features either an SD, miniSD or microSD-card slot.
The HXD8 features a 480x272 pixel LCD (which is a widescreen (16:9) ratio) with PWM-controlled backlight.
The HXD8 features a light sensor by TAOS Inc. (Texas Advanced Optoelectronic Solutions). It's either a TLS2560 or a TLS2561. This light sensor will be included to measure ambient illuminance to control the LCM backlight illumination, or for exposure control for the camera (depends on location of the chip).
A Philips PCF50606 is used for power management.
Connected to: S3C2440 via I2C.
HXD8 features an SPI-connected Marvell 8686 based WiFi module.
This page was last modified on 10 November 2008, at 16:08.
This page has been accessed 29,844 times. | http://wiki.openmoko.org/index.php?title=DashExpress&redirect=no |
NH hospitals struggle to return to pre-COVID status
Wednesday
New Hampshire hospitals took great steps to prepare for COVID-19 cases, and some of those decisions, while necessary, have resulted in great financial strain.
The decision to defer elective procedures and surgeries for infection control and to assure there were enough beds and personal protective equipment to handle an anticipated influx of patient cost hospitals millions in lost revenue.
Another consequence of COVID-19 is that many people who now should be going to the hospital for treatment are choosing not to out of fear of the coronavirus. Hospital administrators and physicians say that fear is unwarranted as hospitals are taking extraordinary steps to keep COVID-19 patients isolated.
According to an Associated Press story, Kathy Bizarro-Thunberg, executive vice president of the New Hampshire Hospital Association, said the state’s hospitals collectively lost $575 million in revenue between March and July. The group estimates hospitals will lose $700 million by year’s end.
Dawn Fernald, director of communications for Wentworth-Douglass Hospital in Dover, said the hospital experienced a multi-million-dollar loss due to COVID-19, adding it worked hard to quickly recover services to be open for patients.
"We did not experience any furloughs or layoffs attributed to the COVID situation," Fernald said. "We commend all of our staff for stepping up and doing whatever was necessary to prepare for a COVID outbreak this spring. We prepared for the worst but hoped for the best."
WDH began its recovery phase to reopen services May 4. All services were reopened at or near full capacity by July 1.
"Patients that may be fearful to come back for treatment or other healthcare services should know that we have put many extra precautionary measures into place and continue to watch this situation closely," Fernald said. "Patients should know that it is safe to come back and we are happy to talk with anyone that wants to know what measures we have put in place."
Delaying care is not something patients should do, Fernald added. "Waiting can exacerbate medical conditions that could otherwise have been treated sooner."
"We recognize the worry that this pandemic may have created for patients and their loved ones," she said. "The health and safety of our patients, caregivers and communities remains our top priority. Portsmouth Regional Hospital’s access to resources and our commitment to safety protocols has us uniquely prepared to continue meeting your care needs."
"While many of these decisions have not been simple or easy to implement, we have applied them consistently while respecting our mission and patient-first culture and recognizing the intrinsic value of each colleague," she said.
Parent organization HCA Healthcare, and specifically Portsmouth Regional, have not laid off or furloughed any colleague due to the pandemic.
"Since the onset of the pandemic, we have focused on two main objectives," Robbins said. "The first was to protect our people – keep them safe and keep them employed. The second was to protect our hospital – preserve our financial position so we can serve our communities well into the future. These priorities continue to guide our daily decisions and they allow us to provide the care our patients deserve."
"We began preparing for the crisis months ago with increased PPE, equipment allocation, specialized workforce accommodations and surge planning while we continued to monitor and escalate our response daily as the pandemic expanded throughout the state," she said. "While the state continues its phased reopening, it is important that we remain prepared to care for new COVID-19 patients and the potential for increased hospitalizations resulting from this pandemic."
New Hampshire continues to see high numbers of unemployed and uninsured patients, which can deter patients from seeking treatment, she said.
Robbins said PRH, working with HCA Healthcare, launched an uninsured hotline – (833) 541-5757 – that helps those who have lost health insurance understand their options for coverage. They also are advocating at the federal and state level for additional support and resources for the uninsured.
Robbins said PRH, as part of HCA Healthcare, recommends the state continue to allocate federal CARES Act funding for expenditures related to COVID-19.
Rick Adams, a spokesperson for Dartmouth-Hitchcock Medical Center, said Dartmouth-Hitchcock Health is responding to significant operational and financial challenges relating to the pandemic.
Adams said through the first nine months of fiscal year 2020 (ending March 31) D-HH produced a loss from operations of $46.2 million, with approximately $34.6 million lost in March alone.
"The major driver of that loss was the steep decline in patient volume caused by the postponement in mid-March of non-emergent surgeries, procedures and clinic visits," he said. "Since beginning the recovery phase of our response, in May, D-HH has begun to recover a significant amount of that patient volume through the rescheduling of appropriate and safe surgeries, procedures and office visits. We have had no layoffs or furloughs."
D-HH has benefited from the receipt of more than $325 million in CARES Act and Centers for Medicare & Medicaid Services prepayment funds, received in April and May.
"We continue to be open, safe and ready to provide the care that the people of our region have come to expect of us," Adams said.
Never miss a story
Choose the plan that's right for you.
Digital access or digital and print delivery. | |
WHO calls for delay of non-urgent dental care in areas with high SARS-CoV-2 transmission
GENEVA, Switzerland: The World Health Organization (WHO) has warned that dental settings may pose an even greater risk for the spread of SARS-CoV-2 than was previously thought, owing to the spread of the virus through airborne microparticles. It said that routine dental check-ups should be delayed until SARS-CoV-2 community transmission rates can be brought under control in order to protect dental patients and staff; however, dental associations disagree.
“WHO guidance recommends in case of community transmission to give priority to urgent or emergency oral cases, to avoid or minimise procedures that may generate aerosol, prioritise a set of clinical interventions that are performed using an instrument and of course to delay routine non-essential oral healthcare,” Dr Benoit Varenne, a WHO dental officer, told a news briefing on 12 August.
Varenne explained that the likelihood of SARS-CoV-2 being transmitted through aerosol, microparticles or airborne particles was unknown: “It’s open to question, at least. This means that more research is needed.”
The recommendation to delay non-essential care “until there has been sufficient reduction in COVID-19 transmission rates from community transmission” is part of new interim guidance from WHO, which also says that dental clinics must have adequate ventilation in order to reduce the risk of the virus spreading in indoor spaces. The new guidance was released after the health body was prompted by a letter from the scientific community to reconsider how SARS-CoV-2 spreads, and its call for adequate ventilation appears to be a capitulation to the scientists’ argument that the threat of airborne transmission should be met with preventive measures, including adequate ventilation and the use of air sanitisers.
A WHO spokesperson told Dental Tribune International that the guidance aims to protect dental patients and staff: “During the COVID-19 pandemic, many of us have needed, or will need, dental care. Given that oral healthcare providers involve face-to-face communication, use equipment that generate aerosols and are by consequence exposed to saliva, blood, and other body fluids, they are at high risk of being infected with COVID-19 or passing the infection to patients.”
The spokesperson continued: “The guidance, issued on 3 August, addresses specific needs and considerations for essential oral health services in the context of COVID-19 in accordance with WHO operational guidance on maintaining essential health services.”
Dental associations disagree with WHO advice
Dental associations in the US and Germany have said that dentists in those countries should ignore the WHO’s recommendation and continue seeing patients for elective and routine care.
“The American Dental Association (ADA) respectfully yet strongly disagrees with the [WHO’s] recommendation to delay ‘routine’ dental care in certain situations due to COVID-19,” the association said in a press release. ADA President Dr Chad P. Gehani explained: “Oral health is integral to overall health. Dentistry is essential healthcare because of its role in evaluating, diagnosing, preventing or treating oral diseases, which can affect systemic health.”
“Millions of patients have safely visited their dentists in the past few months for the full range of dental services”
– Dr Chad P. Gehani, ADA President
The ADA said that its current safety guidance to US dentists—which recommends using a high level of PPE—was adequate to keep staff and patients safe.
“Millions of patients have safely visited their dentists in the past few months for the full range of dental services. With appropriate PPE, dental care should continue to be delivered during global pandemics or other disaster situations,” Gehani added.
According to various dental associations in Germany, the WHO’s recommendation does not apply to dentists in all countries. SARS-CoV-2 infection rates in Germany were still low in comparison with countries such as Brazil and the US, the Zahnärztekammer Berlin (Berlin dental association) said in a press release. It cited studies from China, Italy, South Korea and Germany, which it said showed that there was no increased risk of infection in dental practices if the correct PPE was used.
President of the Zahnärztekammer Berlin Dr Karsten Heegewaldt said in the press release: “Due to the high standard of hygiene in our practices, visits to the dentist are still possible. Dentist appointments should be kept at all costs and not postponed owing to the importance of oral health for general health.”
Heegewaldt appealed to dental patients not to be unsettled by the WHO’s advice, which it referred to as a “blanket, non-country-specific recommendation at the expense of oral health”.
Editorial note: This report was updated after publishing to include direct mention of transmission rates in the headline.
3 Comments
-
It is obvious that a dental clinic environment is problematic during the covid-19 pandemic. Dentists and their staff are at high risk of contracting the corona virus during patient treatment, even if all the precautions are taken, if the patient is a virus carrier. It is also obvious that delaying routine dental treatment for more than a few months is detrimental to the long term health of the public. Both sides of this argument are true. So what is the solution? This covid pandemic is not going away quickly. It could be with us for another year or more. The answer is testing. All dental patients need to be tested for the virus prior to treatment. Low cost very accurate quick corona virus tests are in development and will be available within months. All jurisdictions should adopt policies that require testing a day or two prior to dental treatment, including examinations. Only virus free individuals will be permitted to receive dental treatment. The dental staff will also need to be tested regularly.
-
I agree with Dr. Cheifetz’s opinion. Without testing dental clinics are not safe for staff or patients. I’m a dental hygienist and will not be returning to clinic until we have instant, accurate testing for the virus.
The Finn’s breathalyzer 2 minute test or something like it could be performed when a patient arrives for their appontment. Negatives could proceed to the operatory, and positives put in a system of quarantine and contact tracing.
-
Dental offices are the safest places to go right now. Dentists are very knowledgeable in all the required procedures for sterilization and disinfection to protect their patients and themselves. They will apply all of them. | https://www.dental-tribune.com/news/who-calls-for-delay-of-all-non-urgent-dental-care/ |
Pica is an eating disorder in which patients deliberately eat substances not culturally defined as food, such as dirt, hair or paper.
Although it’s generally considered a minor condition compared to others, extreme cases have resulted in low body weight, various nutritional deficiencies and a multitude of dangerous health complications. For this reason, it’s considered an important public health issue, especially where it concerns children.
Pica is not like other eating disorders. It has nothing to do with eating too little or too much, but rather with eating things that aren’t food at all.
Pica has compelled some people to eat strange objects like pens and pencils, as well as substances most would consider revolting, such as human or animal feces.
Although some pica behaviors do involve substances that are considered foods, they’re not usually eaten alone or in such large quantities.
Pica Diagnosis
To avoid an incorrect diagnosis based on one or two incidents, pica is described as the persistent consumption of non-nutritive substances for a period of one month or more.
Some cases are benign and easily remedied, but others can have life-threatening consequences.
Even if it does go away, it can still reemerge and may continue to be a problem if not properly treated. Pica may also be a symptom of an underlying nutritional deficiency, such as a lack of iron in the diet.
If it is associated with a nutritional deficiency, it may actually clear up when the missing nutrient is added to the person’s diet. In other cases, it has also been known to end spontaneously.
Pica can be a factor in accidental ingestion of poisons, particularly in lead poisoning. This makes it particularly dangerous for young children, who are already curious by nature and prone to putting inappropriate items into their mouths.
It can result in various gastrointestinal problems including obstructions, perforations, ulceration and constipation.
Is Pica Common?
Pica can occur in individuals who suffer from autism, developmental disabilities, mental health challenges and intellectual disabilities.
See Also: Causes of Eating Disorders and Obesity.
It’s the most common eating disorder among individuals with mental retardation and has been observed in ethnic groups worldwide. It has also been known to occur alongside more severe mental illnesses, such as schizophrenia.
Although pica has been found among both genders and in all age groups, it’s found more frequently in children and pregnant women with nutritional deficiencies (especially iron, zinc and calcium).
It has also been included as a symptom of other eating disorders, including anorexia nervosa and bulimia. In certain cultures, it’s actually considered an acceptable practice.
According to statistics from the National Institutes of Health, up to 32 percent of children between the ages of 1 and 6 have been known to eat substances that aren’t actually food.
The condition is most likely to start when a child is 18 to 24 months old and is more likely to occur in children with other developmental problems.
Pica is actually not a newly recognized phenomenon, but rather one that has been recognized for centuries. | https://ercare24.com/what-is-pica/ |
I have to say, I've been really appreciative of the opportunity to participate in the organization of Connected Educator Month, and while the kickoff days and preparation for the virtual Learning 2.0 Conference (next week!) have consumed a lot of my attention, I want to make sure you don't miss out on the six open forum discussions where you can ask questions or weigh in on some really great topics.
What are the key to-dos to get 2012–13 off to a great start in the classroom, and how can educators stay on top of and successfully manage all the competing demands involved? How can being connected help?
What is your favorite first day activity, and why? Are there certain things that should be done or not done on the first day of school? What is mission critical?
What are your 3 must have's in the back to school letter?
What are some goals for you, as an educator, for the first 6 weeks of this school year? How can connecting with other educators help you achieve them?
The Big Picture: How can teachers use online communities and networks to help with this most critical period of the new school year for which we’re all planning? How can communities and networks best adapt to changing needs of educators throughout the year?
What are the ways educators can use networks and online communities to effect change in their school, their district, and their profession in the coming school year and beyond?
How can we help administrators, board members, parents, and others recognize the value of educators being connected?
How can we help non-connected educators to become more connected?
How important is is that we start formally recognizing educators' informal learning, and do you have ideas about how we could do that?
What digital literacies do you see as being critical for educators today?
How significantly do you think that the technologies of the Internet have impacted peer professional development?
The Big Picture: How can grassroots networks and distributed leadership shape the future of education? How can decision makers at all levels be informed by and be responsive to expertise these networks enact?
What practical steps can educators take to personalize learning for their students in 2012–13, and how can technology facilitate this?
What does personalized or personal learning mean to you?
How do you see teachers' roles changing?
Where are you in the process of personalizing learning?
Where are the conversations, models, and examples of personalizing learning? Please share.
The Big Picture: How close are we to being able to realize the dream of personalized, differentiated, passion-based learning for educators and students, and what still has to happen to make this fully real?
How can educators best take advantage of big or emerging technological trends (for example, mobile or gaming) in their classrooms this year?
What new technologies hold the most promise for enhancing "Connected Education?"
What are the upsides and downsides to commercial educational products?
Do we focus too much on the "scale" and not enough on the "social" when thinking about educational innovation from the Web?
Is there an easy way to describe the interplay between technology and pedagogy?
Are digital technologies different than previous technologies?
The Big Picture: What innovations and technologies being explored and leveraged outside education today have the greatest potential to be repurposed or extended to create educational value?
What steps should every educator consider taking to become more connected, and what are the key resources that can help?
How has the role of the organization or leader charged with providing professional development shifted?
What and where are the best (social) opportunities for educators to work on and learn for their practice in the coming year?
In this time of 21st learning, what is the educator’s responsibility in seeking out and participating in professional development?
Can Twitter, blogs, webinars and such replace inservices and conference as a means to professional learning? Is there such a thing as DIY PD?
As many states implement the common core, how can teachers virtual learning networks support implementation and bring the student voice into curriculum planning and pedagogy?
The Big Picture: The traditional model of professional development is based on the educational organization identifying and offering professional development opportunities. In this time of 21st learning, what is the educator’s responsibility in seeking out and participating in professional development?
How should educators’ investment in learning to improve their performance and enrich the profession be supported, incentivized, documented, and recognized?
Does your school or district offer any formal recognition or credit for participated in connected learning activities (communities of practice, Twitter, webinars, etc.)?
What ideas do you have for better, more authentic ways to issue credit for professional learning?
Describe any personal experience you have had with Virtual Learning Communities and what aspects of those collaborations that you found effective.
What kind of formal credit for PD is most useful to you in your career?
The Big Picture: More broadly, how can educators be more fully recognized and rewarded for what we contribute to the well-being of society? | https://www.stevehargadon.com/2012/08/six-great-topic-forums-from-connected.html |
Join our team
Come be part of our exceptional team of professionals at Dallas Afterschool! We are always looking for talented leaders with a passion for education and dedication to improving afterschool in Dallas County!
Career opportunities at Dallas Afterschool
Dallas Afterschool is an equal opportunity employer. We are committed to a work environment that supports, inspires, and respects all individuals and in which personnel processes are merit-based and applied without discrimination based on race, color, religion, sex, sexual orientation, gender identity, marital status, age, disability, national or ethnic origin, military service status, citizenship, or other protected characteristic. | https://dallasafterschool.org/dallas-afterschool-careers/ |
Overclocking a computer’s processor or memory causes it to go faster than its factory rated speed. A processor rated at 2.4GHz might be overclocked to 2.5GHz or 2.6GHz, while memory rated at 200MHZ might be pushed to 220MHz or higher. The extra speed results in more work being done by the processor and, or memory in a given time, increasing the overall computing performance of the PC. This article will guide you through each step of overclocking your CPU for faster processing speeds which will increase clock speed of your computer.
You will need:
- Needle-nose pliers
- Computer fans
- Heat sink compound
- Computer
- Screwdriver set
- Computer power supplies
- Processors
- Backup drives
Instructions
- Assemble all the necessary tools and materials listed.
- Verify whether your motherboard can be adjusted in the BIOS setup, with jumpers or not at all.
- Find out clock speed limitations of the motherboard.
- Run all diagnostic applications you have and fix all system problems.
- Create a complete backup of your system, documents and applications you don’t have on CD-ROM. Do not overwrite these copies.
- If you have a BIOS adjustable motherboard, make changes according to your motherboard manual, and skip to Step 15.
- Shut down computer.
- Leave computer plugged into surge protector.
- Disconnects all peripherals from computer.
- Remove the chassis cover.
- Ground yourself to computer with any professional grounding equipment you have. Otherwise, ground yourself by touching a metal part of the chassis.
- If your motherboard has adjustable jumpers, locate the jumpers that control the CPU speed.
- Use needle-nose pliers to change jumper settings. Move jumpers to positions indicated in your motherboard manual for the clock speed you want. Check the internet for recommendations.
- Install a CPU heat sink compound, and a speciality cooling fan, if appropriate and possible.
- Put system back together, and reboot.
- If computer does not boot, and CPU still works, try lowering the clock speed. If that doesn’t work, restore the original configuration.
- Check all functions, and run a CPU-intensive program.
Tips and warnings
- CPUs have rated maximum speeds. Exceeding the maximum speed is far more likely to cause problems than more conservative adjustments.
- Overclocking an Intel processor explicitly voids its warranty. Other manufacturers have similar exclusions. Intel prevents overclocking of some CPUs by disabling higher multiplier settings.
- Expect a shorter life for an overclocked processor, including the possibility of its immediate failure.
- Prepare to deal with seemingly unrelated problems that can be caused by overclocking: destruction of other internal component, loss of data, system and application crashes, and an inability to boot the system. These problems may occur randomly or materialise well after you have altered your motherboard.
- Advertisement -
Also read on: Should I Fix My Computer On My Own? | https://wptidbits.com/technology/increase-clock-speed-computer/ |
Friendship can be a beautiful thing if done right. Letting go of a friend can be harder than ending an intimate relationship, but sometimes there are friendships that are better to let go of than continue. When you have a friend that has the potential to affect your life in a negative way, it might be time to finally let that friend go.
When you first get negative feelings about certain friendships in your life, it can be difficult to cope with those feelings. Those in recovery should know that the people you spend the most time with influence you the most, so spending a large amount of time with friends that are engaging in negative behaviors can bring you down. Unfortunately, learning to let go of friendships is part of the process.
Friendships can be a blessing, yet staying friends with someone who is hurting you can be a downright curse. However, if you put yourself above others and understand what your needs are, you will know when it is time to cut a person out of your life for good.
Still, how do you know for sure? Below are seven signs that it could be time to end a friendship:
- They Complain About Everything
Negativity is never healthy. Even if you are having your best day ever, this person will find something to complain about. Maintaining optimism is very important, so being around someone that brings your down is definitely unhealthy.
Of course, it is always a good idea to talk about your concerns regarding their negativity, however if you find they are too stuck in their ways, it might be time to cease that friendship altogether.
- They Are Judgmental
We all pass judgments. Judgments are necessary to make decisions in our lives. However, when we make judgments about things we know nothing about, that often leads to more harm than good. Judgments can come across very ignorant and rude.
A friend who is overly judgmental may judge your behavior or even mock you for wanting to make a positive change. When you are making a huge change in your life, you need encouragement, not judgment. If your friend can not stop passing judgment, that is a sign to let that friendship go.
- They Don’t Listen
Listening is one of the most important characteristics a friend can have. You need to have someone who will listen to you when you are feeling down or just need to vent. Friends who do not listen tune you out, and churn at rapid rates when you tell them something.
If you have a friend who is more focused on themselves than they are on you that is a major red flag. Friendship is a two-way street, not a one-way street. A friend who only cares about themselves will only be interested in you if it pertains to them, or offers them some sort of benefit. Any friend like this is not a true friend at all.
- They’re Overly Critical
I am all for constructive criticism but being overly critical is a huge no-no. A friend who attacks or expresses disapproval can be extremely discouraging. You may feel insecure about talking about your struggles with that person.
There is a fine line between a friend who is trying to help you improve and a friend who simply wants to belittle your progress. Knowing the difference is the key. Once you acknowledge that your friend’s criticism is more destructive than constructive, it could be time to focus on friends who offer you more compassion and support.
- They Are Always The Victim
Friends that tend to blame the outside world for their own problems are not the healthiest to have around. In recovery, you learn to take control of your life and work on taking responsibility for your behaviors. Hanging around people who refuse to acknowledge their faults can be negative in your progress.
Friends who constantly complain about not having enough time or being “the victim” are not ideal to be around. Focus on friends who are proactive and goal-oriented. Your motivation is influenced by the inspiration you have around you. Surround yourself with inspiring people.
- They Are Not Trustworthy
Do you have a friend you would not tell a secret to? That could be a sign to drop the friendship. Trust is a major component of friendship. If you have a friend who gossips a lot or tells secrets, it can be hard to trust them. Friends who are untrustworthy are a huge red flag. Let go of friendships that are disingenuous and focus on friendships that better suit your needs.
Friendship is a beautiful thing, and good friends can transform you in the healing process. However, knowing when to let a friendship go is one of the most useful tools you can have. After all, you come first and your mental and physical health is of utmost importance. Remember, you can always reach out to someone if you need help overcoming challenges in your recovery. If you or someone you love is struggling with substance abuse or addiction, please call toll-free 1-800-951-6135. | https://www.palmpartners.com/6-signs-its-time-to-let-a-friendship-go/ |
Air traffic between Turkmenistan and EU to be expanded
At a working video meeting held on October 14, the chairperson/CEO of Turkmenistan Airlines D. Saburov, informed the President of Turkmenistan of the results of the monitoring conducted by the European Aviation Security Agency (EACA).
It was reported that according to the results of inspections, the main “air gate” of the country – Ashgabat International Airport – was recognized as an exemplary complex in all respects in the transport segment of Turkmenistan, which has considerable reserves to ensure growing volumes of freight and passengers.
Turkmenistan fulfills all its obligations under international conventions governing activities in the field of civil aviation, strictly complies with international standards for the safety of airports and aircraft flights, the formation of crews and ground personnel.
Information was also provided on cooperation with ICAO, the International Civil Aviation Organization, a specialized agency of the United Nations. Together with its specialists, work continues on all components of airport and air traffic control. Meetings and consultations are held on a planned basis on international best practice of applying aviation security standards, introducing modern technologies, etc.
As the head of the agency reported, EACA experts gave a good assessment of the work being carried out in our country to ensure the safety of flights operated by Turkmen airlines and the equipment of the country’s airports. Apart from domestic flights, Turkmenistan Airlines’ liners carry out regular flights to various foreign cities, constantly expanding the number of air routes.
As regards services as a whole, the Ashgabat International Airport intends to compete with universally recognized world leaders through the introduction of new technologies in the development of air navigation infrastructure and in improving the quality of passenger service. He is able to receive aircraft of any type and carrying capacity, while providing service at the level of international standards.
According to modern requirements, the work of the border, customs and migration services has been established here. An integrated approach was implemented to ensure all safety criteria and regulations in the system of organization and management, ground movement of aircraft in accordance with high international standards.
One of the main activities for Turkmenistan Airlines includes air cargo and the modernization of its ground handling. The presence of its own production base allows the engineering service of Turkmen airlines to independently carry out laborious maintenance, current and overhaul of Boeing passenger liners of the national park, as well as provide services for aircraft of foreign airlines.
A vital element of safe flying is air traffic control (ATC). A powerful automated system for monitoring weather conditions provides complete control over the movement of aircraft in the airport’s area of responsibility. Great importance is attached to the preparation of the flight crew.
In continuation of the report, Mr. Saburov reported that monitoring conducted by EACA experts confirmed the compliance of Ashgabat International Airport with international aviation security standards, which allows expanding the multifaceted cooperation of Turkmenistan in the field of civil aviation with other states and international organizations.
In this regard, Mr. Berdimuhamedov emphasized that the positive results of inspections by the EACA experts of the activities of the relevant aviation services and the Ashgabat International Airport indicate the high level and quality of domestic air transport, which allows arranging passenger traffic in the European direction.
Considering that Turkmenistan Airlines operates on a self-supporting basis, the President instructed Deputy Prime Minister B. Ovezov to comprehensively study the issue of establishing air links with cities of the European Union countries. In this regard, it is necessary to determine the most popular areas, based on the calculation of market prices, considering all future expenses and income.
Having decided within two months to comprehensively study the issue of flights to European countries, the President instructed the CEO of Turkmenistan Airlines to prepare an appropriate plan. Moreover, the emphasis was placed on creating comfortable conditions for passengers. | http://caan.asia/en/2019/10/15/air-traffic-between-turkmenistan-and-eu-to-be-expanded/ |
Businesses call on Government to put net zero and nature at the heart of planning system
More than 100 prominent business leaders have written to the Prime Minister calling for the net zero transition, nature’s recovery, and climate resilience to be at the heart of the UK’s new planning system.
The letter, which has been co-ordinated by the UK Green Building Council(UKGBC) and the Aldersgate Group, welcomes the government’s commitments to addressing the housing crisis and reaching net zero by 2050. To ensure it meets its housing targets and environmental commitments, it is vital that the Planning Bill drives a strategic approach to the net zero transition, ensuring that development which is resilient to the impacts of climate change, and that nature can be supported and restored.
The signatories therefore call on the Prime Minister to ensure the new Planning Bill directly aligns with the obligations under the Climate Change Act and plans to reverse nature’s decline in the Environment Bill. The letter highlights how planning can play a fundamental role in meeting the Government’s new homes target, achieving its environmental goals, and delivering the infrastructure that is needed for the transition to a decarbonised, climate-resilient economy.
The letter calls for:
- The new Planning Bill to align directly with, and support, the UK’s net zero target and ambitions for nature set out in the Environment Bill.
- Clarity on how land allocated for ‘growth’ will be compatible with achieving net zero, securing nature’s recovery and delivering development resilient to the impacts of climate change.
- Genuinely enhanced levels of protection in planning for designations in the Environment Bill intended to support nature’s recovery.
- Increased resourcing and skills support for local planning authorities, in order to support their ability to set local targets, and deliver across multiple objectives in their local areas.
The letter has been sent to the Prime Minister, alongside Secretaries of State Rt Hon Robert Jenrick MP, Rt Hon George Eustice MP and the Chancellor of the Duchy of Lancaster the Rt Hon Michael Gove MP.
Julie Hirigoyen, Chief Executive at UKGBC:
“The upcoming Planning Bill has been earmarked as the biggest planning shake up since World War II and represents a critical opportunity to embed a strategic vision for a decarbonised and climate resilient economy, as well as reversing biodiversity decline. Planning is part of a wider system that is currently failing to deliver both the quality and quantity of homes needed to tackle the environmental and social challenges we face, and the upcoming reforms must form part of a coherent, long term commitment by the Government to environmental protection; one that gives developers clarity around low carbon, nature friendly investment.
“The number of businesses coming together to support this letter today shows clear demand for climate change to be at the heart of our planning system, and I urge government to listen to industry and match the level of ambition set out in this letter.”
Signe Norberg, Head of Public Affairs and Communication, at Aldersgate Group:
“Reforms to the planning system present an opportunity for Government to not only tackle one of the most significant social challenges facing the country – the housing crisis – but also to ensure that our planning framework actively supports the UK’s climate and environmental ambitions. To reach net zero emissions by 2050 and reverse the decline of the natural environment, it will be essential that the planning system fully integrates these issues at the heart of the new legislation. By setting forward a strategic approach to planning in line with this, Government can unlock private sector investment, create jobs, generate vital low carbon skills, and build homes that are fit for the future.”
About UKGBC
UKGBC is an industry-led network with a mission to radically improve the sustainability of the built environment. A charity with over 500 member organisations spanning the entire value chain, we represent the voice of the industry’s current and future leaders who are striving for transformational change. We inspire, challenge and empower our members, helping them to identify and adopt the most sustainable, viable solutions. We also engage our members in advocating a progressive message to government, informing and influencing policy.
Together for a better built environment www.ukgbc.org
About Aldersgate Group
The Aldersgate Group is an alliance of leaders from business, politics and civil society that drives action for a sustainable economy. Our members include some of the largest businesses in the UK with a collective global turnover of nearly £600bn, leading NGOs, professional institutes, public sector bodies, trade associations and politicians from across the political spectrum. Our mission is to trigger the change in policy required to address environmental challenges effectively and secure economic benefits for the UK in doing so. | https://specifierreview.com/2021/06/14/planning-system-letter/ |
Testing Oml
Here at the Hammer Lab we have a well documented focus on testing as an important component of good software engineering. For our open source projects, we selfishly want to encourage test writing because it helps with adoption. Oml is no different but presented some novel challenges and experiences that we’d like to share.
Challenges
Writing a test suite for a general numerical library poses a set of unique questions.
How do you make your tests comprehensive?
One unit test matching a specific input to a specific output is fine, but writing a sufficient number of such cases will not scale. Furthermore, the actual input domain, which is usually the set of float s, is huge and contains such special cases as nan , infinity and neg_infinity .
A natural solution is to use property-based testing like QuickCheck. But choosing appropriate properties for algorithms that essentially encode non-linear functions is not trivial. Specifically, fixed points limit the range of values that you test. Furthermore, testing higher-order relationships between functions can require more complex algorithms than the functions to be tested, and hence introduce another source of error.
Within these tests one wants to avoid probabilistic failures due to floating point computations.
Example
To make the example concrete, consider testing a univariate linear regression algorithm. Regression takes as input two arrays of floats: the independent and dependent variables. We can write a specific unit test:
module U = Regression.Univarite;; let independent = [| 1.0; 2.0; 3.0 |] ;; let dependent = [| 2.0; 4.0; 6.0 |] ;; let r = U.regress None ~pred:independent ~resp:dependent ;; assert (U.alpha r = 0. && U.beta r = 2.0) ;;
This is the solution that will not scale. We can think of specific independent/dependent array pairs where we know the generating linear model:
let p = 3.0 (* Some well behaved float that we know. *) ;; let independent = [| 1.0; 2.0; 3.0 |] ;; let dependent = Array.map (( *. ) p) independent ;; let r = U.regress None ~pred:independent ~resp:dependent ;; assert (U.alpha r = 0. && U.beta r = p) ;;
But this solution isn’t much better because it doesn’t challenge the realm of possible use cases for these methods. We can try and test a “higher-order” relationship:
let independent = [| 1.0; 2.0; 3.0 |] ;; let dependent = [| 2.0; 4.0; 6.0 |] ;; let r = U.regress None ~pred:independent ~resp:dependent ;; let t = 2.0 (* Some well behaved float that we know. *) ;; let independent2 = Array.map (( *. ) t) [| 1.0; 2.0; 3.0 |] ;; let dependent2 = Array.map (( *. ) t) [| 2.0; 4.0; 6.0 |] ;; let r2 = U.regress None ~pred:independent ~resp:dependent ;; assert (U.alpha r = U.alpha r2 && U.beta r = U.beta r2) ;;
But finding these relationships isn’t always obvious and isn’t necessarily better than trying to test the algorithm directly:
let independent = Array.init 100 (fun _ -> Random.float 1e3) ;; let alpha = Random.float 1e3 ;; let beta = Random.float 1e3 ;; let dependent = Array.map (fun x -> beta *. x +. alpha) independent ;; let r = U.regress None ~pred:independent ~resp:dependent ;; assert (U.alpha r = alpha && U.beta r = beta) ;;
But this simple example will most probably not pass because there is no guarantee that our inputs are “well behaved” and there are no rounding errors. This leads to one of the main problems that our test suite will deal with: imprecise floating point calculations.
How do you express floating point dependencies between functions?
How do you order the testing and convey that if a function has certain properties, then functions that depend on it will have derived properties? For example, it is well known that Newton’s method has quadratic convergence; it doubles the number of computed significant digits at each iteration. If we were to use this solver to compute a special irrational constant (for example the Golden Ratio, a root of x^2 - x - 1 ), that accuracy of the constant would dependent quadratically on the number of iterations. This would change if we were to use a different method.
Furthermore, what if the point of the algorithm is to test specific, refined behavior such as faster convergence or more precision per operation? For example, the module that measures means and standard deviations has different performance characteristics than the online versions.
How do the tests fit into the codebase?
Although this question is common to all software projects, it posed interesting concerns. We want the tests to be distributed with the source code, but obviously not built with the library. At the same time we want flexibility. A test could target any part of the code, specifically, internal private functions that may not be exposed as a part of the public interface, but might be the crux of the algorithm that we want to test.
Choosing a framework
We surveyed the available options for testing in OCaml and assembled some brief notes:
OUnit: assertion-based testing along the lines of JUnit. Pro: Lots of different assert logic. There are included frameworks for logging, configurations, runners, and setting up and tearing down. Pro: API Documentation. Pro: Mature product, on to the 2.0 release and still being updated. Con: No driver utility; tests have to be compiled into separate executable. Con: No property-based testing.
iTeML: formerly known as qtest, provides inline (inside comments) tests via a command line tool that extracts those tests. Pro: Different pragmas to support different styles (assertion-based, property-based). Pro: Used by the Batteries project. Pro: Pretty good documentation. Con: Code in comments. Our tests would be pretty long and this would impact readability. Etc: The command line tool does some of the work of a driver, but one still has to compile the tests to a separate executable.
Kaputt: broad range of testing abilities. Pro: Lightweight assert and property based testing. Pro: Some driver capabilities via camlp4 to combine modules. Pro: Best documentation. Con: Camlp4 dependency. Con: Hasn’t been touched in about 2-3 years.
Pa_test: inline testing macros. Pro: Used in production. Con: Setup? Is there a driver? No documentation.
Qcheck: property-based testing library for OCaml. Pro: Active development. Con: No assert. Con: No driver. Con: Limited to testing the exposed API; what if you want your test to access internal functions?
There are other pieces of software available but they either did not seem like full-fledged libraries that could satisfy our demands, or they were not available when we had to make a decision: ppx_test Broken OCaml-Quickcheck
Property-based testing, as previously described, is a natural fit for many of the tests of the functionality of this library; this requirement eliminated Pa_test and OUnit. While powerful, coding with inline commented pragmas seemed an inflexible solution, so iTeml was eliminated. QCheck seemed like it would be simple to use but the lack of documentation and examples was concerning. The blending of both property-based checking with simple assert logic into one framework led us to choose Kaputt.
Setup
Setting up the testing proved to be interesting to say the least; our solution is a local maxima constrained by ocamlbuild idiosyncrasies and developer patience.
The Kaputt documentation recommends that a separate foo.mlt file is kept with test code for foo.ml . The test is afterwards concatenated to the original source code via a preprocessing step. This seems like a flexible solution to writing both original and testing code.
To control whether we’re building a test or the regular library we added a .test target to ocamlbuild via a plugin. The plugin makes sure that the .mlt test files are copied over to the ‘sanitized’ build directory of ocamlbuild.
We changed Kaputt’s default preprocessor to modify the original .ml file in place via joiner.ml so that our code coverage would pick up the right filename. The joiner also utilizes an OCaml directive to separate the original source code from the testing source code: starting a line with # 1 "new_name.ml" changes the lexing buffer to new_name.ml . This ensures that compilation errors are correctly traced back to the test .mlt file.
We also wrap the test with bisect ignore comments (*BISECT-IGNORE-BEGIN*) and (*BISECT-IGNORE-END*) to have accurate measures of code coverage.
Lessons learned
Effectively testing this library has been a learning experience.
| |
Welcome to our guide about standard refrigerator dimensions for a variety of types, including how to measure so you get the right one for your kitchen space.
If you are buying a new refrigerator for your kitchen, it’s best you consider the different types of refrigerator dimensions that are available.
Depending on the size of your kitchen, you may find that you have space for a standard type or bigger sized refrigerator. If you have a small kitchen however, if you are in a condo or apartment, and you don’t feel like remodeling to gain more space you might need to get a smaller refrigerator.
Standard Refrigerator Dimensions
The standard refrigerator dimensions are about 29 to 36 inches wide, 67-70 inches high, and 29-35 inches deep. You should also check the interior dimensions which should provide you with space of about 14-20 cubic feet to store your food.
How to Measure For Your Refrigerator
There are two ways to figure out the proper refrigerator dimensions for your kitchen. Either measure your existing refrigerator, or measure the space that you intend to place the refrigerator in.
If you have an existing refrigerator and you just want to get a replacement, just measure the width, height, and depth of it, write it down and look for a new refrigerator with the exact same dimensions. Or, if you want it a little bigger or smaller, just add or subtract a few inches.
Keep in mind, however, that you need to keep some space around your refrigerator for it to function well. You shouldn’t cram it in between the kitchen countertops or the ceiling. There should be a ½ inch space on the sides and the top of your refrigerator and anything surrounding it.
Also, make sure that you measure the space in front and the sides of where your fridge doors will swing. Leave 2.5 inches of space between the nearest wall and the hinge sides of your fridge door to allow them to swing open.
If you don’t have a refrigerator – if you’re furnishing a totally new space – or if you just want to know the maximum or minimum sized refrigerator you can get, measure the area where you are planning to place the refrigerator.
First, determine the proper refrigerator height for your kitchen. To do this, measure the space from the floor to the top of the ceiling. This will give you the maximum height of the refrigerator you can get. Don’t forget about leaving a ½ inch of space between your refrigerator’s top and whatever will be above it – be it the ceiling or some other kitchen feature such as overhead cabinets or cupboards.
Secondly, get the width measurement of the space that you want your refrigerator to occupy. Measure the space from wall to wall or wall to cabinet or cupboard or cabinet. From that measurement, don’t forget to minus the ½ inch of breathing space that your fridge will need. The final number will be the width measurement of your refrigerator.
Counter Depth Refrigerator Dimensions
A counter-depth refrigerator is one where the refrigerator doesn’t stick out or go beyond the edge of the surrounding counters. So it sits in a space that’s kind of sunken between the counters.
When it comes to height and width, a counter-depth refrigerator has pretty standard dimensions. The difference comes when we are talking about the depth measurement. Because a counter-depth refrigerator isn’t supposed to stick out beyond the surrounding counters they are usually around 24 inches deep.
If you want a counter-depth refrigerator, you need to know your counter depth. Take a tape measure and measure the space from your kitchen wall to the kitchen counter edge. When you look for a refrigerator, make sure that you get a fridge that is appropriately deep. Read more about kitchen countertop measurements here.
Cabinet Depth Refrigerator Dimensions
A cabinet-depth refrigerator is a refrigerator that is placed so it is surrounded by cabinets. Some kitchens have a cabinet cutout area. This is a sunken space deliberately left by builders for a fridge that is surrounded by cabinets. There might even be a cabinet or cupboard placed on top of the space.
If your kitchen has a cabinet cutout, you need to measure the dimensions of the space and get a refrigerator that will fit. Don’t forget that you need to leave ½ inch of breathing space between your refrigerator and the surrounding cabinets.
Undercounter Refrigerator Dimensions
An undercounter refrigerator is a small, compact fridge, about half the size of a normal kitchen refrigerator that is designed to fit under a counter. Those minibar fridges in hotels, those are undercounter refrigerators.
A undercounter refrigerator is only 34 inches high at the most. You can get an undercounter refrigerator that ranges from 20-24 inches wide and depths of 18- 26 inches. When measuring the area your undercounter fridge will go, don’t forget to ½ inch of breathing space.
French Door Refrigerator Dimensions
A French door style refrigerator generally has two vertical doors on top and a drawer below. The vertical doors cover one large refrigerator compartment for fresh foods. The drawer is the freezer space designed for frozen food.
A standard French door refrigerator has the following dimensions, 67-70 inches of height, 30-36 inches wide, and 29-35 inches of depth.
Side by Side Refrigerator Dimensions
A side-by-side refrigerator is one that has two food compartments, covered by two vertical doors, placed side-by-side. One side is the freezer – where you keep food that need to be frozen. The other side is a standard fresh food compartment where you keep food that needs to be kept chilled but not necessarily frozen.
The standard measurements for a side-by-side refrigerator unit is 30-36 inches wide, 67-72 inches high, and 29-35 inches deep.
Bottom/Top Freezer Refrigerator Dimensions
For the standard bottom or top freezer refrigerator the dimensions will generally be close to the same. The standard dimensions for a bottom/top freezer refrigerator is 23-36 inches wide, 65-69 inches high and 24-33 inches depth.
Apartment Size Refrigerator Dimensions
An apartment size refrigerator is designed to be a little slimmer than a standard refrigerator. It is meant to fit into and maximize the smaller kitchen space that is often found in apartment and condominiums. They can come in many styles, such as French door or side-by-side.
In general, an apartment sized refrigerator is about 18 to 24 inches wide, anything bigger than that is not considered “apartment sized”. Other than that, most apartment sized refrigerators follow the standard refrigerator dimensions for height and depth.
For help with designing your kitchen layout there are a many kitchen design programs that can help. These can help you visualize your kitchen space and position appliances and cabinets to get the look you want. | https://designingidea.com/refrigerator-dimensions/ |
PTC-209 is a Specific BMI-1 Inhibitor and Impairs the Tumor Microenvironment
Glioblastoma multiforme (GBM) is the most common and aggressive brain tumor and refractory to existing therapies. BMI-1 is part of the polycomb repressive complex 1 (PRC1). There is a statistically significant correlation between the high frequency of BMI-1-positive tumor cells and poor prognosis of patients according to the data...
Trilaciclib is an Orally Active CDK4 and CDK6 Inhibitor
The cell cycle is a highly conserved process. Additionally, this process must maintain genomic integrity and replicative capacity for proper cell maintenance and proliferation. The cell cycle consists of four distinct phases: G1 or Gap1 phase, G2 or Gap2 phase, and M phase. As we all know, the G1...
SHP394 is an Orally Active and Selective Inhibitor of SHP2
SH2 containing protein tyrosine phosphatase-2 (SHP2) is an oncogenic phosphatase. SHP2 facilitates growth and survival signaling downstream of numerous receptor inputs. In addition, higher levels of SHP2 phosphorylation associate with decreased survival of breast cancer patients. Especially, SHP394 is an orally active and selective inhibitor of SHP2. Pharmacological inhibition...
Rineterkib is an Orally Active RAF and ERK1/2 Inhibitor
ERK1 and ERK2 are related protein-serine/threonine kinases that participate in the Ras-Raf-MEK-ERK signal transduction cascade. This cascade participates in the regulation of a large variety of processes. It includes cell adhesion, cell cycle progression, cell migration, cell survival, differentiation, metabolism, proliferation, and transcription. MEK1/2 catalyze the phosphorylation of human...
Elimusertib is an Orally Available and Selective ATR Inhibitor
TM serine/threonine kinase (ATM) is a serine/threonine-protein kinase and can be recruited and activated by DNA double-strand breaks. Specifically, ATM phosphorylates several key proteins. These proteins initiate the activation of DNA damage checkpoints, leading to cell cycle arrest, DNA repair, or apoptosis. Besides, ATM belongs to the superfamily of...
PR-619 is a Broad-Range DUB Inhibitor
Ubiquitination is a post-translational modification where the polypeptide ubiquitin is attached to lysine residues of substrate proteins. This process is reversible, and ubiquitin removal is orchestrated by a large family of deubiquitinating enzymes (DUBs). DUBs fall into six subfamilies based on sequence and domain similarity. Ubiquitination and deubiquitination together...
PF 477736 is a Selective and ATP-Competitive Inhibitor of Chk1
Cancer is a multiplicity of diseases characterized by a range of molecular defects leading to unregulated, aberrant cell growth. Checkpoints are present in all phases of the cell cycle. Checkpoints act as gatekeepers maintaining the integrity of the genome. Researchers use anti-tumor agents to treat cancer by imparting damage... | https://www.cancer-research-network.com/category/colorectal-cancer-2/ |
From the start we wanted Pawtato to be a force for good.
So thanks to our customers, we are able to make donations to organisations that help to revive and maintain the environment.
JuST ONe TrEE
Because together we make a difference.
JUST ONE Tree are a UK based organisation that fund reforestation organisations around the globe, focusing on areas severely affected by mass deforestation.
Their partners work with communities that are committed to restoring their forests.
Through training, education and employment they are lifted out of poverty, whilst simultaneously improving the environment.
Removing approximately 1.13 tonnes from the atmosphere per year
(28.34 tonnes over the next 25 years)
PLANTiNG TrEES
HEALtHY SEAS
Healthy Seas is an initiative of a non-governmental organization and businesses that share a common mission: Clean the seas of marine litter.
Approximately 640,000 tons of fishing gear are lost or abandoned in the ocean each year.
Every year, millions of animals – including whales, seals, turtles and birds – are injured and killed by ghost nets.
Since 2013, the Healthy Seas initiative has recovered 453 tons of fishing nets – equal to the weight of 3 blue whales.
The recovered nets are transformed into regenerated nylon. | https://www.pawtatochews.co.uk/our-projects/ |
[photopress:ShanghaiRealEstate_monopoly.gif,full,alignright]Beijing’s municipal government is to try and push for affordable homes in the capital. The Beijing construction commission and Beijing land and resources bureau said construction firms would be invited to tender for the rights to build a range of low-cost properties in the Songjiazhuang residential area of Fengtai district.
Beijing Youth Daily reported that city officials said the bidding system was being introduced in an effort to improve the quality of homes in the city and also to bring down prices.
According to a website affiliated with the commission, more than half of all the new apartments sold last August were priced in excess of RMB9,000 per sq m. The new homes, which will have a maximum floor area of 90 sq m, are targeted at medium and low-income families.
More than 4,250 affordable homes are to be built in Songjiazhuang, comprising 3,600 houses and 650 apartments. In its Housing Construction Plan for 2006-10, the capital’s municipal government said it would build 110,000 affordable homes with a combined floor space of 8 million sq m before the end of next year.
A recent survey by the Beijing Statistics Bureau showed that in 2006, people in the capital spent an average of RMB1,213 (US$155.51) on housing — including payments for water, electricity and gas — twice the figure recorded in 2000. | https://chinaeconomicreview.com/bids-invited-for-low-cost-properties-in-beijing/ |
You are here:
You are here
Home
»
IMIS
log in
IMIS
Publications
|
Institutes
|
Persons
|
Datasets
|
Projects
|
Maps
[ report an error in this record ]
basket (0):
add
|
show
Culverts alone do not reduce road mortality in anurans
Cunnington, G.M.; Garrah, E.; Eberhardt, E.; Fahrig, L.
(2014). Culverts alone do not reduce road mortality in anurans.
Ecoscience 21(1)
: 69-78.
https://hdl.handle.net/10.2980/21-1-3673
In:
Ecoscience. Université Laval: Sainte-Foy, Québec. ISSN 1195-6860; e-ISSN 2376-7626,
more
Available in
Authors
VLIZ
:
Non-open access 308143
[
request
]
Author keywords
amphibian, BACI, ecopassage, fragmentation, mitigation, roadkill, amphibien, atténuation des impacts, BACI, corridor écologique, fragmentation, mortalité sur la route
Authors
Top
Cunnington, G.M.
Garrah, E.
Eberhardt, E.
Fahrig, L.
Abstract
Roads are linked to population declines in amphibians, primarily due to road mortality. Culvert-type ecopassages, along with fencing to direct animals to the passage, have been used to mitigate these impacts. However, the effectiveness of the ecopassage itself, independent of the associated mitigation fencing, is largely untested. In regions with heavy snowfall, long-term maintenance of amphibian-proof fencing is extremely costly. Therefore, it is important to know whether ecopassages alone (without fencing) mitigate amphibian mortality. We used a Before-After-Control-Impact design to experimentally test the hypothesis that pre-existing drainage culverts of the type typically used to mitigate road effects on herptiles mitigate anuran road mortality. Grates were installed at both ends of 6 culverts to exclude anurans from the culverts. At an additional 4 sites fencing was installed on either side of culverts on both sides of the road, to keep anurans off the road. Ten control culverts were left un-manipulated. Roadkill surveys were conducted 1 y before treatments were installed and in each of 2 y after. We predicted that, if culverts alone mitigate mortality, road kill should increase following installation of the grates. If fencing is effective for mitigation, road kill should decrease following installation of fences. We found no evidence for the first prediction: culverts alone did not mitigate road kill effects. In contrast, there was a large decrease in mortality at fenced sites, relative to control sites, indicating that fencing is effective at mitigating road mortality. These results suggest that culverts alone do not reduce anuran mortality; to reduce mortality, animals must be excluded from the road surface. | http://www.vliz.be/en/imis?module=ref&refid=290122 |
The Disaster Services Unit (DSU) leads the agency’s engagement across the disaster services cycle with federal, state, local, nonprofit, and other partners. The DSU’s role as the central hub for the agency’s disaster-related activities ensures that AmeriCorps engagement in this area is appropriate, consistent, and coordinated. The DSU also provides technical assistance before, during, and after a disaster. This includes but is not limited to national service roles and functions in the disaster cycle, accessing national service support, volunteer and donations management, disaster response and recovery planning, disaster partnership building; and training support.
Recent and active responses
How AmeriCorps Responds
1. National Response Framework (NRF)
AmeriCorps, through the DSU, is part of the NRF. The NRF is a guide to how the nation responds to all types of disasters and emergencies. It is built on scalable, flexible, and adaptable concepts identified in the National Incident Management System to align key roles and responsibilities across the nation. This Framework describes specific authorities and best practices for managing incidents that range from the serious but purely local to large-scale terrorist attacks or catastrophic natural disasters. The National Response Framework describes the principles, roles, responsibilities, and coordinating structures for responding to an incident and how response efforts integrate with those of the other mission areas.
2. National Disaster Recovery Framework (NDRF)
As the NRF serves as the national guide for disaster response, the NDRF serves as the guide for long-term recovery and is supported by the continual development of detailed field guidance, and training tools. The NDRF describes the concepts and principles that promote effective federal recovery assistance. AmeriCorps provides a support to the NDRF through the Recovery Support Functions. The NDRF captures resources, capabilities, and best practices for recovering from a disaster. It recognizes that significant challenges confront all recovery efforts, from a relatively localized incident to a large-scale disaster that demands substantial allocation of resources. Importantly, the NDRF is intended to address of all kinds of disasters, both big and small, whether it is Presidentially declared or not. Through its connection with the National Planning Frameworks, including the National Response Framework and the National Disaster Recovery Framework, AmeriCorps is positioned to be a leader in the disaster community.
3. FEMA Mission Assignment Development
In a federally declared disaster, the DSU will work with state and federal partners to identify unmet needs. In developing a Mission Assignment, the DSU will identify unmet needs, develop a timeframe for response, and provide technical assistance to both State and FEMA partners.
4. AmeriCorps Disaster Response Teams (A-DRTs)
ADRTs are AmeriCorps programs that have a heightened focus and commitment to disaster response and recovery. A-DRTs engage in activities and trainings year-round, are a nationally deployable resource, and are recognized in the emergency management community as leaders in volunteer management.
5. AmeriCorps Members and AmeriCorps Seniors Volunteers
One of our key areas is disaster response and recovery and our programs have long since been the first to respond and the last the leave. AmeriCorps NCCC FEMA Corps is a disaster-assistance focused track of AmeriCorps NCCC that is directly deployable by the Federal Emergency Management Agency (FEMA). AmeriCorps Seniors RSVP engages 55 and over volunteers in each stage of disaster response.
Interested in disaster response service with AmeriCorps?
|
|
Resource
|
|
Capabilities
|AmeriCorps Disaster Response Teams (A-DRTs)||A-DRTs are current AmeriCorps programs that have focus on disaster services and serve as nationally deployable resources. The DSU oversees and implements the A-DRT program. All A-DRTs follow a standard, established protocol in the field when deployed by the DSU and are under the management of the AmeriCorps Incident Command System. These members can deploy to nearly any disaster and provide:
|
|AmeriCorps State and National||Programs often respond to disasters as part of their ongoing grant program, and also as a result of cooperative agreements with AmeriCorps. AmeriCorps members engage in preparedness, response, and recovery. Programs with service that is interrupted by disaster may temporarily be redirected to disaster response activities. These programs provide support to their community by engaging in:
|
|AmeriCorps NCCC||Members engage in a variety of projects related to disaster response and other phases of disaster (preparedness, recovery, and mitigation).
|
|AmeriCorps NCCC FEMA Corps||FEMA Corps members deploy with Federal Emergency Management Agency (FEMA) during a disaster. They will most often serve at the Joint Field Office engaged in a variety of activities including:
|
|AmeriCorps VISTA||Members may serve with partner organizations that are responding to the disaster, or working with local organizations in the community. Programs with service that is interrupted by disaster may temporarily be redirected to disaster response activities, such as volunteer coordination, donations management, or call center coordination.|
|AmeriCorps Seniors RSVP||RSVP volunteers serve with organizations that play a role in the disaster response efforts. RSVP volunteers are serving in their own communities and have their own networks prior to and after the disaster event. RSVP can serve in a variety of capacities, including feeding, donations management, call center support, and Volunteer Reception Center support.|
|Disaster Cadre||The AmeriCorps Disaster Cadre is a specialized group of federal staff members from across the agency who, when listed as available, can deploy to perform disaster field activities directly related to specific disasters, special projects, activities related to sustaining partnerships, and preparedness efforts within the disaster and emergency management field. The Cadre supports the Disaster Services Unit.|
The above video may include external links to YouTube’s video platform. YouTube’s privacy and security practices and policies may differ from AmeriCorps'. AmeriCorps is not responsible for these links nor does it endorse the content of the third-party website. Find out more.
A closer look at A-DRTs
A-DRTs Basics
A-DRT deployments are managed by the Disaster Services Unit. An Incident Command System (ICS) structure is used on deployments, adjusting the structure to align with the size of the operation. When established, all deployed programs are managed under the AmeriCorps Incident Command Team (ACT).
- A-DRTs are trained in disaster services functions to include ICS 100/200/300; NIMs 700/800; EMT; CPR/First Aid; Volunteer and Donations Management; Mass Care/Family Services; Shelter Operations; OSHA certified Chainsaw Training; Hazmat certification.
- Can deploy under very short notice, within hours in some cases.
- Ability to deploy, serve, and subsist under harsh conditions with little infrastructure; can be self-sufficient in early disaster response to house and feed independently; bring own tools and vehicles.
Capabilities
Individual Assistance Distribution of Life-Sustaining Supplies; Support for Mass Care: Sheltering; Feeding; Health and Wellness Checks; Mucking and Gutting; Debris clean-up; Emergency Roof Tarping; Emergency Home Repair; Mold Suppression; Hazard Tree Removal/Chainsaw; Minor home repair. Public Assistance Critical Debris Removal; Flood Fighting (Sandbagging, etc.); Dispatch and Tracking of Donated Equipment; Park and Public Lands Restoration.
Volunteer and Donations Management Volunteer Reception Center: Establish and Manage Operations; Database Management (homeowner intake and volunteers); Damage assessments; Track Volunteer Hours (can be used for State soft match); Field Leadership for Volunteer Engagement: Deliver training in safety and tasks; Support volunteer housing/logistics; Warehousing Support; Points of Distribution (PODs), and Donations Tracking.
Community Outreach Damage and Other Needs Assessment; Support to 2-1-1 or Other Call Centers; Client Intake and Tracking; Public Situational Awareness; Case Management; Support for Multi Agency Resource Centers (MARCs); Transportation; Staffing for Staging Areas and Logistics; Canvassing. Capacity Building Support to Emergency Management; Support to Voluntary Organizations Active in Disaster (VOADs), Community Organizations Active in Disaster (COADs), and Long-Term Recovery Committees (LTRCs); Inter-agency Facilitation; Surge Capacity for Staffing; Support for Emergency Farm and Animal Care.
A-DRT Programs
|American Conservation Experience||Conservation Corps North Carolina (Conservation Legacy)||Rocky Mountain Youth Corps Taos, New Mexico|
|AmeriCorps National Civilian Community Corps (NCCC)||Conservation Trust for North Carolina||Serve Kentucky|
|AmeriCorps St. Louis ERT/Safety Corps||Florida Conservation Corps||Serve Wisconsin|
|Appalachian Conservation Corps (Conservation Legacy)||Iowa Commission on Volunteer Service (Volunteer Iowa)||Southwest Conservation Corps (Conservation Legacy)|
|Arizona Conservation Corps (Conservation Legacy)||Louisiana Conservation Corps (American YouthWorks)||Texas Conservation Corps (American YouthWorks)|
|California Conservation Corps||Montana Conservation Corps||Utah Conservation Corps|
|Conservation Corps of Minnesota and Iowa||Rocky Mountain Youth Corps Steamboat Springs, Colorado||Washington Conservation Corps|
|Conservation Corps New Mexico (Conservation Legacy)||SBP||Southeast Conservation Corps|
Are you a current AmeriCorps grantee? Check out Disaster Services Unit resources designed for you.
Featured Resources
At a Glance - National Service Disaster Assets
Managing Spontaneous Volunteers in Times of Disaster
This collection of resources contains everything needed for a full-day classroom training on managing spontaneous volunteers in times of disaster, including participant materials, trainer guide, PowerPoint presentation, and forms and instructions for the Volunteer Reception Centers exercise. Training objectives are to: understand spontaneous volunteers and the benefits and burden they can bring; identify the fundamentals of volunteer management in disaster response setting; identify stakeholders in spontaneous volunteer management; learn and use the vocabulary and concepts of disaster and disaster management; understand the role of VOADs/COADs; recognize the importance of public messaging; understand the principles for managing donated goods; understand the various roles involved in staffing a Volunteer Reception Center; and understand the role of technology and social media in managing spontaneous volunteers in times of disaster.
Online Courses
For information on how to login to Litmos (online training library), review this document.
Performance Measures and Sample Documents
Disaster Service Performance Measures (PDF)
Disaster Service Performance Measures (Video)
Sample Language for State Service Commissions Engaged in Disaster Services
This collection of documents from the Iowa Commission on Volunteer Service (ICVS) is intended to help state commissions write language/agreements with their AmeriCorps programs to engage in disaster-related activities. Includes:
- Exhibit I Disaster Cadre – this is an agreement between ICVS and any Iowa AmeriCorps program that provides disaster services.
- Program Director Manual: Disaster Preparedness and Response – this section of the program director manual provides some information about ICVS and AmeriCorps expectations for disaster response.
- AmeriCorps Program Handbook: Disaster Language – shared by an ICVS program that uses members to deploy for disasters (local, state, and federally declared). | https://www.americorps.gov/about/what-we-do/disaster-services-unit |
Typhoid fever is a bacterial infection that may become life-threatening if not treated on time. In many cases, typhoid fever affects many people in developing nations. However, the disease may occur anywhere, even in developed countries, such as the US.
Contaminated food and water or close contact with an infected person cause typhoid fever. A patient with typhoid is likely to experience headaches, high fever, constipation, stomach pain or diarrhoea.
Many patients with typhoid fever are likely to feel better within a few days after proper antibiotic treatment. However, a small number of people may die out of complications. Therefore, it is important to know the typhoid fever reason and its cure.
Causes of Typhoid Fever
Typhoid fever is majorly caused by bacteria known as Salmonella Typhi. It is not the same bacteria that lead to salmonella food poisoning. But both are related to each other.
It can even occur due to Salmonella Paratyphi, a related bacterium leading to severe illness. The bacteria often deposit in food or water by a human carrier and further spread to other humans in the surrounding area.
How the Infection Spreads
The Salmonella Typhi is usually found in the stools of the infected person after they’ve been to a toilet. If they do not wash their hands properly after going to the toilet, they can easily contaminate the food or water they touch. If anyone eats the contaminated food, they are likely to be infected with the disease.
The Salmonella Typhi, however, is less likely to be passed through an infected person’s urine. But still, they need to wash their hands thoroughly after peeing; otherwise, there can be the risk of contamination.
Other ways to contact typhoid fever include:
- Eating seafood from the contaminated water source
- Using a toilet that’s contaminated by bacteria and touching the mouth without washing hands
- Eating raw vegetables that were fertilised with contaminated human waste
- Having anal or oral sex with the carrier of Salmonella Typhi bacteria
- Having contaminated milk products
Carriers of Typhoid
Around 1 in 20 people who have survived typhoid fever without treatment are the carriers of this infection. It means that the bacteria continue to live in the body of the carrier and can easily spread via stool or urine. However, sometimes the carrier may not have any visible symptoms of this condition.
How the Bacteria Affects the Body
After having contaminated food or water, Salmonella Typhi bacteria will move down to the digestive system and begin to grow. This will trigger high temperature or fever, constipation, diarrhoea and stomach pain in the patient.
You may also like: Habits Can Prevent Your Digestive Disorders
If not treated, the bacteria can even get into one’s bloodstream and spread to other body parts. It can further lead to serious complications like internal bleeding or bowel splitting open.
Symptoms of Typhoid Fever
Early stages of typhoid include fever, abdominal pain and illness. If the condition gets worse, the symptoms may include:
- Headaches
- High fever (around 104 degrees Fahrenheit)
- Constipation
- Abdominal pain
- Red spots on chest or abdomen
- Loss of appetite
- Weakness
Other typhoid fever’s symptoms include:
- Bloody stools
- Body aches
- Chills
- Difficulty in paying attention
- Severe fatigue
- Confusion
- Agitation
- Hallucinations
How Is Typhoid Fever Diagnosed?
Typhoid is diagnosed by a simple stool test or blood test. The test identifies the existence of Salmonella Typhi in stool and blood samples. When being diagnosed, a patient even needs to tell a doctor about the areas they travelled to, as those regions could be contaminated with the bacteria.
How Is Typhoid Fever Treated?
Generally, antibiotics are prescribed to patients with typhoid fever. These medications are used for killing bacteria that lead to infection. There are various types of antibiotics used to treat typhoid fever.
In most cases, typhoid is treated with cotrimoxazole (Bactrim), ampicillin or chloramphenicol. Your doctor may even prescribe you fluoroquinolones, azithromycin or cephalosporins, including Cefepime.
The typhoid vaccine is likely to be effective around 50 to 80%. Some popular vaccines are:
- Inactivated Typhoid Vaccine: It is given via a one-dose injection. This is not given to kids younger than the age of 2. It takes around two weeks to be effective and given every two years.
- Live Typhoid Vaccine: It is not given to patients under the age of 6. This is an oral vaccine that’s administered in four doses after two days gap. It will take a week after the last dose to see its effect. The booster dose must be given every five years.
Conclusion
If not treated on time, typhoid fever could become a serious or life-threatening disease. Worldwide, there are around 200,000 deaths per year due to typhoid-related conditions.
With proper treatment, many people can begin to improve their health in three to five days. Almost every patient that receives the treatment is likely to recover from this illness. Consult your doctor as soon as you notice the symptoms of typhoid. | https://bloggercounty.com/typhoid-fever-causes-symptoms-and-treatment/ |
- To generate employment opportunities in rural as well as urban areas through setting up of self employment ventures.
- To provide continuous and sustainable employment to a large segment of traditional and prospective artisans and unemployed youth, so as to help arrest migration of rural youth to urban areas. Scope
- The scheme is applicable to all viable (technically as well as economically) projects in rural as well as urban areas, under Micro enterprises sector.
- The maximum cost of the project admissible under manufacturing sector is Rs.25 lakhs and business/services sector is RS.10 lakhs.
- Only one person from family is eligible for obtaining financial assistance under the scheme.
- Assistance under the Scheme is available only for new projects.
- The assistance under the scheme will not be available to activities indicated in the negative list under the scheme. | http://caonnet.com/consultancy/pmegp-loan-consultants/ |
AAAS makes rare policy intervention urging US to act swiftly to reduce carbon emissions and lower risks of climate catastrophe
This article is more than 6 years old
This article is more than 6 years old
The world is at growing risk of “abrupt, unpredictable and potentially irreversible changes” because of a warming climate, America’s premier scientific society warned on Tuesday.
In a rare intervention into a policy debate, the American Association for the Advancement of Science urged Americans to act swiftly to reduce greenhouse gas emissions – and lower the risks of leaving a climate catastrophe for future generations.
“As scientists, it is not our role to tell people what they should do,” the AAAS said in a new report, What we know.
“But we consider it our responsibility as professionals to ensure, to the best of our ability, that people understand what we know: human-caused climate change is happening, we face risks of abrupt, unpredictable and potentially irreversible changes, and responding now will lower the risks and costs of taking action.”
Facebook Twitter Pinterest AAAS film on climate risks: ‘We manage risks every day. We take precautions — like wearing our seat belts and bike helmets — with hardly a thought. Here’s a way to better understand the risks that climate change might present.’
The United Nations’ climate science panel, the IPCC, will gather in Yokohama, Japan next week to release the second in a series of blockbuster reports, this time outlining how a changing climate is affecting rainfall and heat waves, sea level and the oceans, fisheries and food security.
But the AAAS scientists said they were releasing their own assessment ahead of time because they were concerned that Americans still failed to appreciate the gravity of climate change.
Despite “overwhelming evidence”, the AAAS said Americans had failed to appreciate the seriousness of the risks posed by climate change, and had yet to mobilise at a pace and scale needed to avoid a climate catastrophe.
The scientists said they were hoping to persuade Americans to look at climate change as an issue of risk management. The society said it plans to send out scientists on speaking tours to try to begin a debate on managing those risks.
The report noted the climate is warming at almost unprecedented pace.
“The rate of climate change now may be as fast as any extended warming period over the past 65 million years, and it is projected to accelerate in the coming decades,”
An 8F rise – among the most likely scenarios could make once rare extreme weather events – 100-year floods, droughts and heat waves – almost annual occurrences, the scientists said.
Other sudden systemic changes could lie ahead – such as large scale collapse of the Antarctic and Greenland ice sheets, collapse of part of the Gulf Stream, loss of the Amazon rain forest, die-off of coral reefs, and mass extinctions.
“There is a risk of abrupt, unpredictable and potentially irreversible changes in the earth’s climate system with massively disruptive impacts,” the report said.
The risks of such catastrophes would only grow over time – unless there was action to cut emissions, the scientists said.
“The sooner we make a concerted effort to curtail the burning of fossil fuels as our primary energy source and releasing the C02 to the air, the lower our risk and cost will be.”
| |
This chapter outlines the responsibilities for training within the U.S. Geological Survey (USGS) and provides general information concerning the employee development function.
3/9/87
OPR: Admin/Office of Personnel
1. Purpose. This chapter outlines the responsibilities for training within the U.S. Geological Survey (USGS) and provides general information concerning the employee development function.
2. Policy. It is USGS policy to provide employees with needed training and development that will maintain or improve job performance and keep them abreast of scientific, technical, managerial, and administrative advances in their field.
3. Authority. 5 USC 41 authorizes training in Government and non-Government facilities and the acceptance of funds by employees for training from certain non-Government organizations. Executive Order 11348, dated April 20, 1967, provides additional direction on the manner in which the general statutory authority is to be used.
4. Definitions.
A. Training. The Government Employees Training Act defines training as "the process of providing for and making available to an employee, and placing or enrolling the employee in a planned, prepared, and coordinated program, course, curriculum, subject, system, or routine of instruction or education, in scientific, professional, technical, mechanical, trade, clerical, fiscal, administrative, or other fields which are or will be directly related to the performance by the employee of official duties (see definition below) for the Government, in order to increase the knowledge, proficiency, ability, skill, and qualifications of the employee in the performance of official duties." The training may be full-time or part-time, on or off duty, day or evening, or any other combination thereof. It may be given by the Department of the Interior, another Government agency, an educational institute, a manufacturer, a professional association, or by competent individuals or groups in or out of Government. It may be accomplished through correspondence, classroom work, conferences, workshops, supervised practice or other methods or combinations of methods.
(1) Standard Training. Standard training is general "off-the-shelf" training that is not specifically developed or tailored to the needs of the USGS.
(2) Nonstandard Training. Nonstandard training is specifically developed or tailored to the needs of the USGS.
B. Single Program. Instances of training which have a common purpose and which are authorized at the same time would normally be treated collectively as training within a single program. Two or more courses at an academic institution having a common purpose and occurring during the same term (quarter or semester) would normally be treated as training within a single program. Two courses of academic instruction taken during successive terms would not be treated collectively as training within a single program because each such course would normally be approved separately the employee's accomplishment in the first frequently being used as a factor in the decision whether to approve the second course. The foregoing statements about academic courses are not to be construed as authorizing an artificial fragmentation of what is essentially a single program in order to take advantage of an exception such as the one described above.
C. Official Duties. Official duties are approved duties which the employee is doing now or can be reasonably expected to do in the future. Future duties may be in the employee's current agency or in another agency if the employee will be separated under conditions entitling the employee to severance pay. The future duties may also be at the same or higher level and in a different job or occupation. For training related to future duties within the USGS, the training is authorized only if the employee is considered by the supervisor to have the potential to perform the duties of this type of job and if the USGS has a definite need for a trained person in such a job. Merit selection procedures must be used when applicable. (See SM 370.410.3.3A.) (The phrases "reasonably expected to do in the future" and "at the same or higher level and in a different job or occupation" apply to positions within the career ladder of the employee's current position, to a position for which the employee is already qualified, or to a position whose career ladder is no higher than the employee's current position.)
D. Training Through a Government Facility is training provided by, in, or through a Federal department, agency, or independent establishment for Federal employees. For purposes of coding Source of Training on the SF 182 (Request, Authorization, Agreement, and Certification of Training), this includes a non-Government vendor conducting training for Federal employees using Federal facilities. However, training conducted by non-Government vendors is still subject to the limitations described in SM 370.410.4.4 regardless of where training is held.
E. Training Through a Non-Government Facility. All training not meeting the above definition is "training by, in, or through non-Government facilities."
F. Individual Training Needs are developmental needs determined jointly by supervisors and employees at least annually based on the employees' performance of their duties. (See SM 370.410.2.4.)
G. Organizational Training Needs are needs covering a group of employees such as those resulting from anticipated technological changes, major equipment purchases, or attrition which will impact current skill levels within the organization. (See SM 370.410.2.5.)
H. Completed Training. Training is completed when the employee receives a certificate of completion, a grade for the course, or other satisfactory document and submits a copy to the supervisor. In those cases where none of the above is received, it is the supervisor's responsibility to determine that the training has been completed.
5. Responsibilities.
A. Training Committee - Headquarters and Field (see SM 308.12 for composition). Training Committee Representatives should be at a level high enough to be able to effectively communicate with and encourage top management to be responsive and receptive to planning and implementing training programs. Training Committee Representatives serve as a point of contact for the personnel office on all training activities for their respective organizations and are responsible for:
(1) Providing the necessary coordination within the organization for all training activities.
(2) Assisting supervisors and managers to identify training needs of their employees.
(3) Assuring that division/office supervisors have counseled their employees in accordance with this chapter.
(4) Consolidating and reporting to the appropriate personnel office all training needs identified within the organization. (See SM 370.410.2.2.)
(5) Providing information to the appropriate personnel office to assist in the development of bureauwide and/or regionwide training policies and procedures applicable to all divisions/offices.
B. Personnel Offices. The Headquarters Personnel Office and Field Personnel Offices:
(1) Interpret Office of Personnel Management, departmental, and USGS training regulations, policies, and procedures.
(2) Coordinate USGS training policies, procedures, and activities within their servicing area.
(3) Assist supervisors, managers, and Training Committee Representatives in the identification of training needs.
(4) Develop Headquarters or servicing area training plans based on identified training needs.
(5) Identify internal, Government, and non-Government sources of training to meet training needs and make arrangements to schedule such training with these sources.
(6) Approve all group training conducted in Headquarters or region/area including training conducted by other Government agencies and non-Government organizations. (Divisions may make contact with non-Government facilities only after they have consulted with the appropriate personnel office.)
(7) Approve training as appropriate. (See Appendix A.)
(8) Review and endorse requests for training requiring approval by the Bureau Personnel Officer.
(9) Maintain official training files including SF 182s, Request, Authorization, Agreement and Certification of Training; Individual Development Plans, 9-1688, as appropriate (e.g., Upward Mobility, Veteran's Readjustment Appointment, etc.); Survey of Employee Training Needs, 9-1893; training course evaluations; and training course announcements and catalogs.
(10) Prepare reports on training activities.
(11) Review all SF 182s for regulatory compliance and appropriateness of training.
(12) Assess the effectiveness of training programs during PMEs.
(13) Provide staff advice and assistance to the Training Committee and USGS management on all training matters.
C. Supervisors and Managers. Providing the opportunity for training is a basic responsibility of all management levels from first line supervisors to executive level managers. Supervisors and managers are responsible for:
(1) Assuring that all training they approve relates to organizational objectives.
(2) Assuring that all employees are trained effectively in order to perform their jobs satisfactorily.
(3) Developing their employees' career potential.
(4) Encouraging and giving recognition to self-development.
(5) Assuring that employees assigned to training are aware that they are required to attend and complete their training assignments as they are any other official assignment, and that they are held accountable for failure to complete the training assignment successfully.
(6) Assuring that when employees are selected for training which is required for promotion, the selections are made in accordance with merit promotion procedures. (See SM 370.410.3.3A(2).)
(7) Assuring that the progress of employees engaged in extended training is monitored or periodically reviewed.
(8) Assuring that employees returning to duty following a training assignment provide an account of that training.
(9) Complying with the training provisions of negotiated contracts of labor unions which represent their units.
(10) Counseling employees on career objectives and training needs at least annually in conjunction with their performance appraisal and assuring that information on self-development opportunities is distributed to them on a regular basis. (It should be emphasized that while the determination of the employees' training needs is a joint effort between employee and supervisor, the supervisor makes the final decision on the training needs determination.)
(11) Meeting with probationary period supervisors and managers not later than 30 days after the effective date of their entrance on duty to identify and document their training needs and plans.
(12) Using training needs identification to support requests for training funds.
(13) Assuring that SF 182s are submitted to the appropriate personnel office in advance of the beginning date of training. Where personnel office approval is required (training over 80 hours), SF 182s should reach the appropriate personnel office at least 1 week before the training begins.
(14) Assuring that cases in which training is not satisfactorily completed are reviewed to determine appropriate management action.
(15) Assuring that continued service agreements for employees assigned to training through non-Government facilities are properly executed and administered in accordance with SM 370.410.4.6.
D. Employees. The responsibility of employees for their own self-development must be clearly stressed. Employees must develop the ability to perform the current tasks of their positions competently and, through self-development, prepare themselves for advancement and possible reassignment. The procedure for the recording of self-development training is outlined in the 370.410-H, Training Handbook.
6. Failure to Complete Training. Employees who fail to complete approved training (Government or non-Government) should immediately notify their supervisors in writing of the specific circumstances and reasons. The supervisor will submit the employee's statement with his or her comments and recommendation through division/office channels to the servicing personnel officer, who will then determine what action is necessary, including recovery of all or part of the expenses of the training. Established procedures for the recovery of funds will be followed. (See SM 338.4.) Failure to complete Government training without official authorization may be cause for disciplinary action.
7. Computing Length of Training Time.
A. Full-time Training. Employees assigned to full-time training are counted as being in training the same number of hours they are in pay status or leave without pay (LWOP) status, up to a maximum of 8 hours a day or 40 hours a week, regardless of the number of hours spent in actual training. If the employee is part-time or intermittent and full-time training is directed by the USGS, the employee is in pay status for the time spent in training during duty hours up to a maximum of 8 hours a day or 40 hours a week.
B. Part-time and After-hours Training. When employees are assigned to training on less than a full-time basis, or attend training after work, their training hours are equal to the number of hours they spend in class or with the instructor in the facility, e.g., an employee who attends a course which lasts 3 hours a week for 20 weeks could be counted as receiving 60 hours of training.
C. Correspondence Courses. Time spent in correspondence courses that employees take on their own time is not counted in computing training time. Only the time, if any, employees spend on correspondence courses during duty hours is counted as training time. Employees must have approval from their supervisors to spend time on correspondence courses during duty hours.
D. Union-Sponsored Training. Administrative leave may be granted to individuals for the purpose of attending union-sponsored training. The length of time and the circumstances must meet the criteria specified in the governing labor agreement or the criteria specified in Part 370.711.1.7B of the Survey Manual.
8. Training by Foreign Governments or International Organizations. Requests for employees to attend training outside the United States require clearance by the Department of State. Divisions/Offices and field personnel offices will submit requests to the Headquarters Personnel Office at least 6 weeks in advance of the training. Requests should not be submitted directly to the Department of State or the Department of the Interior. | https://www.usgs.gov/about/organization/science-support/survey-manual/3704101-training-general-provision |
Even the quietest shy people make an impact every day. We watch them and think about their thoughts and actions. I’ve known friends who desperately try not to make an impact on anyone else, in an almost rebellious “the world can’t make me” way. Guess what? They still do. Just think for a moment about the people that have made an impact on you? Was it intentional or accidental and positive or negative? We assume that it’s only the teachers, pastors, coaches, and parents that help to impact our lives, but it is so much bigger than that. In my experience, the most profound impacts are much less intentional, and almost accidental.
Last October a family of four and their dog took over our basement. Literally on their last few dimes, I saw no other option than to ask them to come stay with my husband and me. The next 10 months were stressful in ways I could not have anticipated, and beautifully impactful in ways I will still be unpacking for years to come. Watching their grace and love under immense pressure, renewed my faith in the love between spouses. We shared meals, holidays, and quiet chats over cheap, boxed wine, and it was a slice of paradise. They are eternally thankful for our hospitality, but we had been blessed so much in the sharing of our lives and the building of relationships that will last a lifetime. They made a lasting impact on me.
What positive improvement in the lives of the people around you will you make on your path to growth?
Consider how you impact the people around you. Is it in the way you choose to impact them? Or like many of us, are there ways you impact people that you would like to change? Find one of those less than fabulous ways and do two things with it. First, stop it. Using our process for personal growth, eliminate that negative behavior from your personal profile. Secondly, find a way to turn that old trait into a positive way to impact people around you. In my former life, I hid behind a veil of social intolerance, but now I actively teach others about the value of social openness which hopefully reduces the collective burden on people who are victimized by intolerance overall.
This blog is part of a series from the book Discover Your Best Life by Mike Hintz. His personal, professional, and spiritual growth tools are also featured in Northlink Retreats. If this topic resonates with you consider reading the book or attending one of the upcoming Discover Your Best Life Retreats. | https://www.northlinkconsulting.com/blog/best-life-i-words-impactful |
Under the supervision and direction of the Rector of St. Mary’s Episcopal Church, the Music and Choir Director will:
With the approval of the Rector of St. Mary’s, or his or her designee, choose Sunday and special service music for the St. Mary’s Choir, in cooperation with the organist or accompanist. (1.0)
As above, select appropriate choir anthem or soloist / duets pieces for the choir (.5)
Recruit and equip choir members, section leaders, and vocalist leads, rehearse the choir 1.5 hours weekly, and provide support to individual section leaders, choir members and musicians as needed. (3.5)
Serve as music coordinator and/or choir director for the St. Mary’s Choir during 9am Sunday morning (10AM in the immediate post-COVID period or 10AM in the summer) and special worship services. (1.5)
Provide for special vocal support or performance as needed for the 9/10 AM service or special services.
Maintain proper care and organization of the music collection, bells, piano, etc. Arrange tunings of instruments as needed, in consultation with the rector. (.25)
Represent the choir at the Annual Ministry Fair (in the Fall) and write the Annual report for the St. Mary’s 9/10 AM Service.
Communicate weekly to the choir using e-mail, etc., to keep the choir motivated and appraised of upcoming opportunities, programs, and plans. Assist with recruiting new members into the choir. (.25)
Assist with special liturgical services (including services of Christmas, Epiphany, Ash Wednesday Holy Week, and Thanksgiving) or other special events such as retreats requiring music, as needed. (.25)
Arrange for and schedule guest musicians, soloists, duets, or other appropriate special music for summer services, or services at which the choir is unable to be present in full strength. (.5)
In cooperation with the Rector or his or her designee, facilitate the recruitment, selection, and/or utilization of contemporary musicians and music as needed to supplement the usual traditional musical offerings of St. Mary’s for Sunday or special services.
Report all paid employee’s hours worked and rehearsals/worship services attended to the Operations Manager and Administrator.
Attend one worship committee meeting per month, and St. Mary’s staff meeting as needed. (2 per mo. = .5/wk)
Assist with Children’s Music programs, or other music needs of St. Mary’s as needed.
Write an occasional piece for the St. Mary’s weekly newsletter, website, or social media, and submit regular announcements of upcoming music-program or choir related events. (.5)
Arrange for the hosting or organization of an annual choir Christmas party for the choir.
Communicate pastoral care needs within the choir to church staff.
Maintain a welcoming, supportive, and inclusive spirit within the music department and choir, and support the overall mission of St. Mary’s Episcopal Church with whole-hearted dedication, commitment, good humor, and passion.
Nurture and maintain a cooperative and life-giving professional relationship with the musicians, clergy, and Rector of St. Mary’s.
Compensation is $10,631.75 per year
This position is salaried. The average monthly workload is estimated to be approximately 37.75 hours (~8.75 hrs. / wk.) from Sept 1st – May 30th. Summer workload is estimated to be 18 hrs. per month. Yearly average is estimated to be 394 hours/ year, or the approximate equivalent of 7.6 hrs. per week Jan – Dec. Equivalent hourly rate is $27/hr. Averaged throughout the year, this is approx. $205/week.
The usual yearly work schedule is Sept 1st – May 31st, and approximately 6-9 services during the months of June, July, and August, as scheduled by the rector. Other than scheduled Sundays off according to the summer schedule, it is expected that the Music Director will have scheduling or travel conflicts on occasion, and up to an additional 4 Sunday services per year may be taken off, at a compensation reduction of $200 per Sunday. The organist/ Music director will make arrangements for a substitute musician in their absence.
St. Mary’s Episcopal Church is a vibrant, welcoming, and inclusive church community that does not discriminate due to age, race, disability, sexual orientation, gender or gender identity.
Under the supervision and direction of the Rector of St. Mary’s Episcopal Church, the Music and Choir Director will: | https://www.idealist.org/pt/ong-emprego/5d7f103c811c4361ae05d942fe6f3a2f-music-and-choir-director-st-marys-episcopal-church-anchorage-ak-anchorage |
You are not permitted to download, save or email this image. Visit image gallery to purchase the image.
The polytechnic wants to set up a base in Dunedin’s central city and is in the planning stages for a "work-based learning facility" with the working title Dunedin School of Games.
Chief executive Megan Gibbons said the scale of the project would depend on ongoing talks with the school’s partners.
But the plan was for students to be immersed in Dunedin’s growing gaming sector.
The new off-campus base could be developed near the New Zealand Centre of Digital Excellence (Code), which at present was in Stafford St, Dr Gibbons said.
It would need to be a "multi-player game", but planning remained highly fluid and so the size of the facility would depend on the ongoing discussions, she said.
The polytechnic has approached Dunedin City Council for help to both find and fund its new base.
It asked for $300,000 from the council in a submission to its long-term planning process.
There was some urgency because the University of Canterbury was doing something "very similar" in a bid to make Christchurch the city for gaming development, Dr Gibbons said.
At present, no other polytechnics, or institutes of technology, in New Zealand had established such a high level of integration with the gaming industry.
This was a clear opportunity for the polytechnic to take a leadership role and provide an "incubator environment" for local independent game development, she said.
"Learners would graduate not only with the wider skills and knowledge within [the polytechnic’s] degree programmes, but also be armed with a more specific portfolio of skills and experience tailored to the games industry."
The polytechnic would bolster its degree offerings and add a level 4 certificate in digital media and design, she said.
Because the project was in its early stages, Dr Gibbons could not give a timeline for its completion. | https://www.odt.co.nz/news/dunedin/campus/school-video-games-proposed-city |
Gaseous planet challenges assumption that Earth-mass planets should be rocky.
Astronomers have discovered an extrasolar planet with the same mass as Earth, but the resemblance ends there. Not only is the planet too warm for liquid water to exist on its surface, but it also has a radius 60% larger than Earth, suggesting a vast, puffy atmosphere of hydrogen and helium.
“You’ve got a very small planet that is probably not rocky at all, and that’s frightening,” says Jacob Bean, an astrophysicist at the University of Chicago in Illinois.
What is scary, he says, is how the finding challenges the assumption that an Earth-mass exoplanet would have an Earth-like composition. With its thick atmosphere, the exoplanet is more like a scaled-down Neptune or Uranus, he notes. Its surprising density suggests that it will be even more important in future campaigns to measure both the size and the mass of exoplanets. Density, the ratio of mass and size, is known for only about 150 of the more than 3,000 known exoplanets.
“We can’t be sure that we have Earth 2.0 until we have both pieces of information,” says astronomer David Kipping of the Harvard‒Smithsonian Center for Astrophysics in Cambridge, Massachusetts, who announced the finding on 6 January at a meeting of the American Astronomical Society near Washington DC.
Kipping and his colleagues used NASA’s Kepler spacecraft to detect the planet, one of three orbs that closely circle a dim, red dwarf star some 60 parsecs (200 light-years) from Earth. Kepler normally measures only the size of a planet, which can be inferred by the amount of light it blocks each time it transits, or passes, in front of its parent star. But the planet, dubbed KOI-314c, orbits so close to one of its siblings, KOI-314b, that the gravitational tug of the two bodies periodically delays or advances the moment of their transit. These timing variations can be used to calculate mass.
KOI-314c, with an estimated surface temperature of 104 °C, circles its red-dwarf parent every 23 days. Its sibling, KOI-314b, is even hotter and has a closer-in orbit 14 days long. KOI-314b has a similar size to the Earth-mass planet but is about four times heavier.
But KOI-314c is the enigma. It is surprising how a planet only as massive as Earth could have enough gravity to retain such a vast atmosphere, something that disturbs Sara Seager, a theoretical physicist at the Massachusetts Institute of Technology in Cambridge. “I would want more precise measurements before having to accept the interpretation,” she adds. Because light from the parent star can filter through the planet's thick atmosphere every 23 days, its composition should be ripe for study with the James Webb Space Telescope, scheduled to launch in 2018, says Kipping.
Kepler’s planet-hunting mission ended in May when its telescope could no longer be aimed precisely. Kepler researchers are now awaiting NASA’s decision on other uses for the craft (See “NASA ponders Kepler's future”). A final verdict is expected in June.
Related links
Related links
Related links in Nature Research
Cloudy skies on nearby super-Earth 2013-Dec-31
Distant planet weighed using clues from starlight 2013-Dec-19
NASA ponders Kepler’s future 2013-Sep-04
Related external links
Rights and permissions
About this article
Cite this article
Cowen, R. Earth-mass exoplanet is no Earth twin. Nature (2014). https://doi.org/10.1038/nature.2014.14477
Published: | https://www.nature.com/articles/nature.2014.14477?error=cookies_not_supported&code=25c0a7ca-c7c3-4f9b-850f-6991cd8640ef |
The Hawaiian culture is truly our host. And what a welcoming and open host they have been for well over two hundreds years. We believe that the best and most valuable visitor experiences are built upon respect and understanding of our Host Culture.
We do not claim to be experts or even a resource for Hawaiian history or culture. But we do believe that it’s important for visitors to know that much of their understanding of Hawaiian culture and the history of Hawaii is likely as was told by the people who largely misunderstood and even actively destroyed it. Many visitors come unaware that Hawaii has sensitivities that are quite alive in the people who still have strong ties to their ancestors way of life.
Much authentic culture is available for those who choose to see and experience it. MauiGuidebook.com takes every opportunity we see to tie our information in to the Host Culture, to bring you in to connection with the people who are truly among the most gracious and welcoming hosts this world has ever known.
Understanding that the Hawaiian people and their culture are our Hosts is something simple, yet deeply meaningful, that you can do. I promise you that point of view will deepen every experience you have on our remarkable island. | https://mauiguidebook.com/things-to-do/host-culture/ |
Don’t be afraid to mix textures in a room. Try adding a wicker chair to the living room along with some metal fixtures. Or add a brass lamp along with some plants to add a pop of green. Don’t have a green thumb? Try these 10 indoor plants you probably can’t kill.
lakov Filimonov/Shutterstock
Know the Right Way to Hang Artwork
Before you start putting nails in the wall to hang your artwork, do a little prep work. Most art looks best hung at eye level (between 57 and 60 inches). Once you find the correct level, sketch out a grid on paper before you start pounding in nails. Follow these tips when hanging a gallery wall.
OLEKSANDR ROZDOBUDKO/Shutterstock
Stick to the Rule of Threes
The rule of threes is a classic design concept that says odd-numbered groupings create more visual interest than even numbers. Try adding three throw pillows or group a set of three vases in varying sizes. Make your home look more expensive with these 52 tips. | https://www.familyhandyman.com/diy-advice/11-design-rules-you-should-never-break/7/ |
Q:
What is the best way to represent a type-safe property bag in a class?
I have a 3rd party application that provides an object with many "attributes", which are simply pairs of (string) keys and values. The value types can be either strings, DateTime, Int32 or Int64.
I need to create my own class to represent this object, in a convenient way. I'm creating a WCF service that provides this object to clients, so I need it to be very easy and clean.
The keys of the attributes will be presented as an Enum for the clients (to hide the information of the specific key strings of the 3rd party application). However, I'm not sure how to represent the values. Here are some of the options:
Option 1: Have different collection per attribute values, seems ugly but will be very easy for clients to use
public class MyObject
{
public Dictionary<MyTextAttributeKeysEnum, string> TextAttributes { get; set; }
public Dictionary<MyDateAttributeKeysEnum, DateTime> DateAttributes { get; set; }
public Dictionary<MyNumAttributeKeysEnum, long> NumericAttributes { get; set; }
public string Name { get; set; }
public string Id{ get; set; }
Option 2: Convert all of the attributes to strings
public class MyObject
{
public Dictionary<MyAttributeKeysEnum, string> MyAttributes { get; set; }
public string Name { get; set; }
public string Id{ get; set; }
Option 3: Keep them as objects, let the clients bother with casting and converting
public class MyObject
{
public Dictionary<MyAttributeKeysEnum, object> MyAttributes { get; set; }
public string Name { get; set; }
public string Id{ get; set; }
A:
Using several dictionaries just doesn't look nice :) But might work in some scenarios.
If you are absolutely sure that string is enough for all - go with strings. But if some other code would need to parse it - that's going to be expensive.
If you want a really simple straightforward solution - just go with objects. Even though it would introduce boxing/unboxing for value types (forget it if you don't operate thousands of objects) and you'd lose type information on values this solution might still work just fine.
Also you might consider introducing an intermediate class for a value. Something like
public Dictionary<MyAttributeKeysEnum, PropertyBagValue> MyAttributes { get; set; }
public class PropertyBagValue
{
public object AsObject { get; set; }
public string AsString { get; set; }
public int AsInt { get; set; }
// ...
}
Internally you could store your value in a variable of the original type (int in an int variable, string in a string variable, etc., i.e. have a separate variable for each type) and then you can avoid type conversion. Also you could wrap your dictionary in another class, add some usefull accessors and make it look nicer. I don't know how does this fit into your infrastructure though.
| |
Timetable information in the Course Catalogue may be subject to change.
University Homepage
DRPS Homepage
DRPS Search
DRPS Contact
DRPS
: Course Catalogue :
School of Divinity
:
Divinity
Postgraduate Course: Intermediate Biblical Hebrew (PG) (BIST11024)
Course Outline
School
School of Divinity
College
College of Arts, Humanities and Social Sciences
Credit level (Normal year taken)
SCQF Level 11 (Postgraduate)
Availability
Available to all students
SCQF Credits
20
ECTS Credits
10
Summary
This course strengthens students¿ biblical Hebrew language skills at an intermediate level. It offers a structured consolidation of grammar and vocabulary, and focusses on using the language to translate, analyse, and explore texts from the Hebrew Bible.
Course description
Academic Description:
This course builds on the biblical Hebrew language skills acquired in ¿Introducing Biblical Hebrew¿ (or equivalent course), strengthening them at an intermediate level. It is intended to consolidate and develop students¿ grammar and vocabulary proficiency, and to put these skills to use. It achieves this through close analysis of texts from the Hebrew Bible. Students read, translate, and explore various set texts, considering their textual, historical, and literary dimensions.
Syllabus/Outline Content:
The precise content of the course varies from year to year. It always includes a review of grammar and close reading of several set texts, of varied character and difficulty. These texts will primarily be prose narratives, such as the creation accounts (Gen 1-3); the book of Jonah; the book of Ruth; or the prose framework of Job (Job 1-2, 42). Poetry may also be introduced towards the end of the course, such as a selection of Psalms, or excerpts from the prophets. The set texts will be read, translated, and analysed in depth.
Student Learning Experience Information:
Students have two hours of class time per week. In advance of most classes, they will be expected to read, translate, and analyse a short portion of the set text. In class, students will discuss their translations and consolidate any grammatical issues that emerge. They will use their language skills for exegetical purposes, and explore together what new light the original language might shed on our interpretation of the text. In-class assessment provides students a useful way to track their progress, and an essay gives them further opportunity to practice their language skills.
Entry Requirements (not applicable to Visiting Students)
Pre-requisites
Co-requisites
Prohibited Combinations
Other requirements
None
Information for Visiting Students
Pre-requisites
None
High Demand Course?
Yes
Course Delivery Information
Academic year 2022/23, Available to all students (SV1)
Quota: None
Course Start
Full Year
Timetable
Timetable
Learning and Teaching activities
(Further Info)
Total Hours: 200 ( Lecture Hours 44, Formative Assessment Hours 1, Programme Level Learning and Teaching Hours 4, Directed Learning and Independent Learning Hours 151 )
Assessment
(Further Info)
Written Exam 40 %, Coursework 20 %, Practical Exam 40 %
Additional Information (Assessment)
40% - In-class assessment (written and/or oral format)
20% - Language skills Essay (1500 words)
40% - Final Exam
Feedback
Students receive frequent oral feedback in class from the teaching staff. They also receive written comments on submitted work, such as in-class assessments, homework assignments, and their essay.
Exam Information
Exam Diet
Paper Name
Hours & Minutes
Main Exam Diet S2 (April/May)
3:00
Learning Outcomes
On completion of this course, the student will be able to:
Explain complex features of biblical Hebrew grammar and syntax.
Accurately parse regular and irregular forms of the verb in all conjugations.
Understand a wide range of biblical Hebrew vocabulary.
Translate varied biblical Hebrew texts into English, including 'unseen' texts.
Use biblical Hebrew to exegete texts from the Hebrew Bible, considered in their textual, historical, and literary dimensions.
Reading List
Biblia Hebraica Stuttgartensia, 5th ed (Stuttgart: Deutsche Bibelgesellschaft, 1997). ISBN 3438052229.
Recommended resources:
Bill T. Arnold and Choi, John H. A Guide to Biblical Hebrew Syntax (Cambridge, 2003).
W. R. Scott, A Simplified Guide to BHS. Critical Apparatus, Masora, Accents, Unusual Letters & Other Markings 3rd ed. (N. Richland Hills, TX: Bibal, 1995).
E. Würthwein, The Text of the OT: An Introduction to the Biblia Hebraica (3rd edition, Grand Rapids, MI: Eerdmans, 2014).
Additional Information
Graduate Attributes and Skills
Not entered
Keywords
biblical studies,tanak,ancient languages
Contacts
Course organiser
Dr Suzanna Millar
Tel:
(0131 6)50 8904
Email:
[email protected]
Course secretary
Miss Rachel Dutton
Tel:
(0131 6)50 7227
Email: | http://www.drps.ed.ac.uk/22-23/dpt/cxbist11024.htm |
EDITOR’S NOTE: This is the first in a multi-part series about preparing for auditor investigations
It’s 7 p.m. on a Thursday night. A coder is playing with her kids when there is a knock on the door. She looks outside and sees a black Crown Victoria in the driveway and two well-dressed fellows with short hair at her door. They are with the OIG (the U.S. Department of Health and Human Service’s Office of Inspector General, the investigative arm for Medicare) and want to ask a few questions about her job.
If you think this can’t happen to you, you’re wrong. Odds are that more than one recipient of this e-newsletter will experience such a visit during the next year. Because investigations are so common, you should make sure all of your colleagues are prepared so they know how to react. This is the first piece in a series of articles addressing preparation for audits and investigations.
Some investigations begin with an administrative subpoena for documents. However, in many cases the first indication of an investigation is agents appearing at the home of one or more employees (or ex-employees). The agents prefer to conduct the visits here for the same reason that a lion hunts at the rear of the pack; an employee at home is isolated and less able to seek help from a friend. Because employees will face the agents alone and with no advance warning, you need to prepare them to handle the situation. These visits put tremendous pressure on employees, who may worry (usually needlessly) about their personal liability or about losing their jobs. In fact, part of the preparation is explaining to employees that in the event of an investigation, employers will provide legal assistance for employees.
Handling Unexpected Visits
It is essential that everyone in your organization understand how to handle these unexpected visits, because although investigations often are completed with no penalties imposed, the mere investigation itself is a major burden. A staff member’s panicked response to agents visiting his or her home can prolong an investigation even if no laws have been violated.
With that in mind, again, it’s critical that everyone in the organization be trained on how to handle contact from the government. Depending on the nature of the investigation, agents may contact administrators, medical professionals, billing staff or receptionists. Since you cannot anticipate who will be contacted, you need to make sure that all staff receive instructions on how to deal with investigators.
You may worry that raising the specter of a potential investigation will cause undue fear or suggest that the organization is doing something wrong. But if the topic is discussed in a light and casual fashion, it doesn’t have to be scary—and it’s much less scary than having an agent visit your home when you’re not prepared for the visit.
The training should cover the following topics:
The basics of OIG investigations.
Inform the staff that the odds of an OIG visit are poor, but that such visits are now the norm in the healthcare industry, so it’s important to be prepared for the possibility. It is good to emphasize that many of these investigations end without any penalties; the fact that the government is investigating does not mean that anyone has done something wrong or that anyone will be in trouble.
As you well know, the laws governing medical practices are complex. The Stark Law, an anti-kickback statute, and a myriad of billing rules can tend to puzzle you, government agents and potential whistleblowers. Because the rules are so complex, some investigations are sparked when someone involved misunderstands a rule. However, when an investigation starts, you never know whether the government is mistaken, or you are. Until you know, it is best to prepare for the worst but hope for the best. It is also best to stay quiet.
They may not be who they say they are.
I have come across three situations in which someone claimed to be a government agent, but wasn’t. If someone asserts that he or she is a government agent, ask for identification. Feel free to call the relevant agency and confirm that the person is an agent. (If you are doing that, be sure you find the number in a phone directory; don’t just call a number given to you by the agent. If the person is really an impostor, they likely will give you a false number.)
They have ways of making you talk.
Agents don’t use bright lights or rubber hoses. Instead, they are very skilled at persuasion. In some cases, agents use fear to encourage cooperation. They might appeal to the employee’s sense of civic duty, arguing that the employee should help root out any wrongdoing. They might appeal to self-interest, arguing that unless the employee agrees to an interview, he or she will face prosecution. Agents typically will try to drive a wedge between the organization and the employee by telling employees that the organization will try to blame them for the problem – so they might as well “tell the truth” by turning on the organization first.
In other situations, agents will minimize the situation; for example, they may suggest that the visit is just routine, or not a big deal. These kinds of statements invariably are at least white lies; if it wasn’t a big deal, the agents wouldn’t be taking time out of their evening to conduct the visit. If your staff members have been trained to anticipate the arguments the agents will use and understand why they are using them, it is less likely that their arguments will be effective. Do some role-playing to help staff practice how to respond to potentially intimidating interview techniques.
How an interview can go wrong.
Underscore the consequences of talking with an agent during an unexpected visit by talking about things that can go wrong in an interview with government agents.
First, a minor misstatement of the facts can cause major problems for both the employee and the practice, even if it is inadvertent. Such an error may cause an agent to doubt the credibility of every other statement, greatly prolonging the investigation. In some cases, the agent may accuse an employee of making a false statement, and that is a crime.
Second, it is common for an agent to misunderstand something an employee might think is clear. For example, in one investigation an employee was explaining how physician assistants examined a patient, but the bill was submitted under the supervision physician’s number. The employee thought nothing of it; it was typical of incident-to billing. The agent, however, interpreted this as a suggestion that the physician was inappropriately billing for work she didn’t do.
Third, either the employee or the agent may have a poor understanding of the law. In one such situation of which we are aware, an agent mischaracterized the law, claiming that perfectly legal activities were illegal. The employee in this case, naively trusting that a government agent’s characterization of the law would be correct, concluded that he had broken the law. He then “confessed” to activities that were perfectly legal. However, the way the agent worded the “confession” made it sound as if the employee knowingly had broken a law. It can be very, very difficult to reverse the impact of this type of scenario, even if you have done nothing wrong.
The need for legal counsel.
For all of the reasons noted above, it is prudent for any staff member to seek legal advice before engaging in any interview with a government agent. This message should be clear: Once the OIG shows up, contact legal counsel. These agents are very good at implying that if you exercise your right to remain silent or to consult with legal counsel, you are admitting that you have done something wrong. There is a reason that government agents don’t want people to have legal representation: Individuals with legal representation are much less likely to wind up getting into trouble. Nearly everyone instinctively believes that declining to talk to an agent will cause the investigation to drag on and become a big deal, and that talking to the agent will help prove that there were no problems. That instinct is understandable—but wrong.
Make sure employees understand that unless the agent produces a search warrant, the government cannot make you do anything before you contact your legal counsel. On most visits, OIG agents will not have a subpoena or any other written document; they simply will ask you to talk voluntarily. Even if the agent does have a document, such as a civil investigative demand or a grand jury subpoena, it does not require you to do anything before you have time to contact legal counsel. In fact, while the OIG does have the right to “immediate access” to records, the law defines “immediate access” as within 24 hours.
In the unlikely event that an agent has a search warrant, he or she is entitled to take documents. Otherwise, it is entirely permissible to send the agent away. Before doing so, however, be sure to get the agent’s business card. You will want to know who is conducting the investigation.
An emergency response plan.
If one of your employees is contacted, there is a very real possibility that other employees are being contacted around the same time. Make sure employees know who to call if they are contacted. Because there may be other visits set to occur at or around the same time, the call should be made within minutes, rather than hours. Then, make certain that your contact person has a plan for reaching your legal counsel and other employees on very short notice. Employees should know that the organization will provide a lawyer at no cost to them.
Also make sure your employees have a number of contact options if one or more people are unavailable. Everyone should understand that a visit from an OIG agent merits an emergent response, even if polite or shaken employees are reluctant to bother a colleague at home.
Informing the employer.
It is particularly important that staff members understand that it is permissible for them to notify their organization if they are contacted by an agent. Some agents will close an interview by asking the subject to keep the visit confidential. The agent may say something like “It will make it more difficult for me to conduct my investigation if people learn of it.” That implies that it might amount to obstruction of justice to disclose the contact. It isn’t, though; it is perfectly legal for someone to reveal to an employer that he or she has been contacted by the government. If employees don’t know this, however, they may be scared to tell you. As a result, you may not learn of an investigation for weeks or even months.
I recently was aware of a physician who received a subpoena stating that “The United States Attorney requests that you do not disclose the existence of this subpoena. Any such disclosure would impede the investigation being conducted and thereby interfere with the enforcement of the law.” There is a good argument that this text is unethical; it is improper for the government to suggest that a person is legally required to keep a contact secret. Unfortunately, even if employees have been well-trained, such language may cause them to believe that it is improper to notify anyone about a subpoena. I would recommend using this language as an example, and making certain employees understand that it is always permissible for them to contact the company’s legal counsel if they are contacted by any government agent.
A final word of advice: revisit this topic frequently. Many organizations train staff on how to handle contact with a government agent once, but then don’t repeat the training for years. In addition to the need to train new employees regarding these procedures, keep in mind that the pressure of an actual investigative visit can make it very hard for employees to follow the guidance, even when the training is fresh. If the training occurred many months before an OIG agent’s visit, it is quite possible that employees won’t recall all the points that were covered.
Many complex factors go into determining how best to respond to an investigation, including the nature of the investigation (civil or criminal), the relative culpability (or lack thereof) of the client, and the nature and quality of the evidence. The initial contact is often critical. When clients undertake the initial communications directly with the OIG without adequate preparation or understanding of the legal issues, the results can be disastrous. An experienced advisor should guide the client through the process, including development of an appropriate communication strategy, analysis of the evidence, determination of how to structure relations with employees and other relevant parties in the investigation, and whether to pursue early negotiations or articulate grounds for the government to decline prosecution.
There is no way that a surprise government visit can be viewed as a good thing, but with careful preparation, you can minimize its impact.
About the Author
David Glaser is a shareholder in Fredrikson & Byron’s Health Law Group and helped establish its Health Care Fraud & Compliance Group. David helps healthcare entities negotiate the maze of healthcare regulations, providing advice about risk management, reimbursement and business planning issues. He has considerable experience in healthcare regulation and litigation, including compliance, criminal and civil fraud investigations, and reimbursement disputes.
Contact the Author
To comment on this article please go to [email protected] or post on our blog here.
Medicare Readmissions Reduction Program: What’s a Readmission? | https://racmonitor.com/mom-why-is-there-a-crown-victoria-in-the-driveway/ |
Florida. Governor (1955-1961 : Collins)
Found in 6 Collections and/or Records:
Doak S. Campbell Papers, 1935-1972
Evelyn Whitfield Henry Scrapbooks
This collection consists of two scrapbooks covering Tallahassee and Florida history for over a century, 1861-1961. The first scrapbook, "Chronology of Tallahassee and Florida History," consists of newspaper clippings and original documents including an aerial photograph of the Florida Capitol, the by-laws of the United Confederate Veterans, photographs of St. Johns Episcopal Church, and a pen and ink drawing of Wakulla Springs. The second scrapbook contains newspaper clippings and original documents such as inaugural programs. This second scrapbook deals with Florida governors, U.S. Presidents, and local Tallahassee history.
LeRoy Collins Letters
This collection consists of letters from LeRoy Collins to Dr. Daisy Parker. Among the subjects mentioned are Judge Taylor and Parker's campaign assistance. The fifth item in the collection is a copy of a letter to Malcolm Johnson that was enclosed in a 1968 letter to Dr. Parker.
Robert A. Gray Scrapbooks
This collection is comprised of fourteen scrapbooks assembled by Robert A. Gray and includes a typewritten introduction. Most of the scrapbooks consist of miscellaneous items such as photographs, clippings and letters pertaining to Gray's public and private life arranged in no discernible order with handwritten or typed commentary. Also known as MSS 0-131.
The Martin Dyckman Leroy Collins Research Collection
This collection contains research materials used by Martin Dyckman for his 2006 book about former Governor Leroy Collins titled Floridian of His Century. Research materials include speeches from Leroy Collins before he became governor; an interview transcript with Premier Khrushchev during Collins' trip to the Soviet Union; newspaper columns written by Collins for the St. Peterburg Times and transcripts and audio recordings of interviews conducted by Dyckman. | https://archives.lib.fsu.edu/subjects/532 |
What is Toxicology Testing?
Toxicology testing is a type of medical testing used to analyze the presence of a toxic chemical in the body. The blood or urine may be examined during this type of test. Most commonly, the test is used to look for drugs in the system. For this reason, drug testing is sometimes interchanged with this term. There can be a variety of reasons for which this type of testing may be necessary.
If an individual is suspected of a drug overdose, toxicology testing may be done to make an accurate diagnosis. Health care officials may choose to collect either the person's urine or blood for an analysis. Commonly, the urine is more preferred over blood. This is generally because urine tests are quicker and may provide more information. For instance, some drugs may show up in the urine which fail to in the blood.
A previous drug user in some type of rehabilitation program may undergo toxicology tests to ensure that drug usage has been discontinued. Toxicology testing can also have a place in the judicial system. Sometimes, an individual convicted of illegal drug use on probation will be subjected to periodic testing. The outcome of the test can be the difference between remaining on probation or being jailed. For this reason, toxicology tests are generally an important matter.
Generally, illegal drug use to any degree is a serious violation in most professional sports. This includes the use of performance enhancing drugs. In the event that an athlete is suspected of drug use, he or she may be subjected to toxicology testing. Although, in most areas of professional sports, it is common for periodic drug testing to be a common practice. Usually, this is done to ensure that athletes remain drug-free.
Another common occurrence for toxicology testing is when someone goes to apply for a job. The testing will generally be done as part of the interview phase. Typically, the individual will report to a toxicology lab and submit a blood test or urine sample. In most cases, the results of the test may not be given to the person, as they are commonly reported back to the job site requesting the test. Advancement in the interview phase may greatly depend on the test results.
In some circumstances, a person may be given a toxicology test if he or she exhibits unexplained symptoms. This may happen if an individual comes into a doctor's office or hospital with symptoms similar to someone who may be using drugs. The doctor may order the test as a precaution. In any event, it is important for an individual to let it be known if he or she is taking any prescription medications prior to toxicology testing, as they can interfere with the results, even if no illegal consumptions are being made. | https://www.wisegeek.net/what-is-toxicology-testing.htm |
Reviewby Theron Martin,
I've Always Liked You
- Confess Your Love Comittee -
|Synopsis:|
|
|
Yu and Natsuki are childhood friends who have lived next door to each other for years. Now in high school, Natsuki confesses to Yu out of the blue one afternoon – but then, in her embarrassment, insists that it's only for practice. She's not the only one nervous about her feelings either. Natsuki's friend Miou has an oddly romantic relationship with Natsuki's friend Haruki, though neither has ever really confirmed that they're dating. Meanwhile, timid Sota Mochizuki has his heart set on Natsuki's other friend Akari, who's not even sure if she likes anyone, and Sota's friend Koyuki has remade his image with the ambition of confessing to Natsuki. Natsuki's brother Kotaro also has eyes only for Yu's sister Hina, while she is interested in Koyuki. As the days pass, hormones rage and the potential for relationships reaches its boiling point.
|Review:|
|
|
This 63 minute movie, which debuted in Japanese theaters in April and is now streaming on Crunchyroll, has a somewhat unusual pedigree. It's based on a song and light novel project by the artistic group HoneyWorks (aka Haniwa), which specializes in vocaloid creations, though not the slightest hint of association with vocaloids actually appears anywhere in the movie (although two characters go to see a HoneyWorks concert at one point.) While not a musical in the sense that Western viewers would normally classify it, the movie's volume of insert songs would rival that of an idol series, whose lyrics define or frame the feelings of the focal point characters at any given time and even help one character accept her true feelings and what she should do about them.
That's not to say that this is some radically different or stylistically innovative production, however. On the contrary, this is about as typical as anime romance gets. The only difference is the breadth of characters and their feelings, which the movie touches on over the brief hour. While Natsuki and (to a lesser extent) Yu are technically the leads, the movie spends the bulk of its time bouncing around between the viewpoints of four girls and guys who are all related in some way by either blood or long-time friendship (although Hina gets decidedly less attention than the others). Though the relationship triangles don't approach a Rumiko Takahashi level of complexity, drawing out a relationship chart while watching the movie is nonetheless highly recommended.
Out of all of these potential romantic pairings, some come to fruition by the end of the movie and some don't, whether because they are cut off by other relationships or simply don't get enough attention to develop that far. (One potential relationship actually gets detailed quite more in various still shots shown in the credits, which seem to progress things to a point of tearful reunion beyond the group's high school years.) The scenes which build these relationships are nothing unusual by anime romance standards: full of rampant emotions and occasional mild comedy, with lots of blushing on every side. As annoying as this could have been, it all plays out with a remarkable level of care and skill, especially considering that director Tetsuya Yanagisawa is much better-known for directing trashy fanservice fare like High School DxD and Daimidaler.
The movie is animated by Qualia Animation, a newer studio about which I could find no detailed information in English. Whoever they are, they've apparently hired some highly-talented people for this project, since the production quality is unusually high. All of the character designs are attractive and highly distinctive, especially the slightly untraditional (for anime) beauty of the lanky, sweatpants-sporting Natsuki. The animation is also more robust that you might normally expect for an anime with little to no action component, with particular emphasis paid to subtleties of facial expression and background movement.
The musical score is mostly a light but effective selection of gentle or jazzy piano numbers. All of the various opening/closing themes and insert songs are done by HoneyWorks in association with a rotating collection of singers. The talented Japanese vocal cast includes the likes of Haruka Tomatsu (Asuna in Sword Art Online), Yuuki Kaji (Eren Jaeger in Attack on Titan), and Hiroshi Kamiya (Izaya Durarara!!, Levi in Attack on Titan) who all do fine jobs – though admittedly, none of the characters in this movie present terribly challenging roles.
What's ultimately most important in a romance production is whether or not the romantic resolutions are satisfying, and on that front the movie should not disappoint. It does its job well enough to make the viewer happy to see certain characters finally getting together. For those disappointed that Hina did not get enough attention, a second movie coming in December 2016, presumably based on one of the other two light novels in the originating project, will apparently focus more on her. For now though, this is the kind of clean, enjoyable movie that can leave you with a warm fuzzy feeling in the end. Just be sure to watch it all the way through past the credits. | https://www.animenewsnetwork.com/review/ive-always-liked-you/confess-your-love-comittee/.107286 |
TECHNICAL FIELD
BACKGROUND
SUMMARY
BRIEF DESCRIPTION OF DRAWINGS
DETAILED DESCRIPTION
The disclosure generally relates to a delivery catheter for delivering an implantable medical lead or other implantable element to an electrical stimulation site.
Specialized groups of cardiac cells that form the cardiac conduction system control the frequency, pathway of conduction, and rate of propagation of action potentials through the heart, which cause the heart to beat in an efficient manner. This special conduction system includes the sinoatrial node (SA node), the atrial internodal tracts, the atrioventricular node (AV node), the His bundle, and the right and left bundle branches.
The SA node, located at the junction of the superior vena cava and right atrium, normally acts as the natural pacemaker, generating action potentials, which are conducted through the rest of the heart. When normal conduction pathways are intact, an action potential generated in the SA node is conducted through the atria and to the AV node via the atrial internodal tracts. The conduction through the AV nodal tissue takes longer than through the atrial tissue, resulting in a delay between atrial contraction and the start of ventricular contraction.
The AV node, located in the central fibrous body, conducts the action potential to the His bundle, located under the annulus of the tricuspid valve. The His bundle splits into the left and right bundle branches, which conduct the action potential to specialized fibers called "Purkinje fibers." The bundle branches rapidly conduct the action potential down the ventricular septum, where the Purkinje fibers spread the depolarization wavefront quickly to the remaining ventricular myocardium, producing a coordinated contraction of the ventricular muscle mass.
Conduction abnormalities may cause slowed or disrupted conduction anywhere along this conduction pathway. For example, the SA node may not generate action potentials at a fast enough rate resulting in too slow of heart rate, or bradycardia. AV block may prevent conduction of the action potential from the atria to the ventricles. A left and right bundle branch block, or other conduction abnormalities in the Purkinje fibers or ventricular myocardium, may cause the contraction of the right and left ventricles to be asynchronous. These and other conduction abnormalities may be treated by an external or implantable pacemaker.
Pacemakers are typically coupled to the heart via one or more implantable leads, each carrying one or more electrodes for stimulating the heart and for sensing the intrinsic electrical signals associated with a conducted action potential. Electrodes are commonly placed on the endocardial surface using a transvenous approach. For example, a right ventricular lead may be advanced into the right ventricle and placed such that an electrode is positioned at or near the right ventricular apex. Low capture thresholds and stable lead positioning have made the right ventricular apex a preferred ventricular stimulation site.
However, ventricular pacing at the location of the right ventricular apex does not mimic the normal ventricular conduction pathway. Both experimental and clinical studies have shown that septal pacing can improve various indices of cardiac function compared to apical pacing. Direct myocardial stimulation, as occurs in apical pacing, can cause remodeling of the ventricular myocardium, including myofibrilar disarray and local hypertrophy away from the electrode.
The most normal physiological approach to pacing the ventricles when normal AV nodal conduction fails may be to deliver electrical stimulation pulses directly to the His bundle. Depolarization of the His bundle tissue may be conducted normally through the ventricular conduction pathway, down the left and right bundle branches and to the remainder of the ventricular myocardium. The resulting ventricular contraction, which is more rapid and results in a narrow QRS complex and a more vigorous, normal contraction, may produce a better-coordinated ventricle contraction for achieving efficient heart pumping action.
In some cases, left ventricular (LV) pacing/sensing may be desired instead of, or in addition to right ventricular (RV) pacing/sensing. For example, RV and LV pacing may be provided in a time coordinated fashion to resynchronize the contraction of the ventricles, e.g., provide cardiac resynchronization therapy (CRT), which may be indicated for cardimyopathy or other ventricular conduction abnormalities. For LV pacing/sensing, a lead may be transvenously advanced through the right ventricle, into the coronary sinus and, in some cases, a coronary vein branching from the coronary sinus, to place electrodes near the myocardium of the left ventricle.
Leads may also be transvenously implanted in one or both atria. Furthermore, in some cases, cardiac pacing/sensing leads cannot be, or for some other reason are not implanted transvenously. In such cases, a lead may be epicardially implanted by fixing an electrode at the distal tip of the lead to the myocardium through an incision or puncture in the pericardium.
In general, the disclosure is directed to a delivery catheter configured to facilitate identification of a desired location for implantation of a medical lead, and implantation of the lead at the desired location, as well as methods for using the delivery catheter to identify the desired location and implant a medical lead at the desired location. As one example, a delivery catheter may facilitate delivering a stimulation lead to a desired location proximate the His bundle for His bundle pacing. The delivery catheter may include a plurality of electrodes, a delivery lumen, and a side port. The electrodes may be electrically coupled to sensing circuitry, e.g., for sensing an electrocardiogram (ECG). The electrodes may be used to determine a desired implantation location, such as, for example, a desired stimulation location. Once the desired location is determined, a lead may be advanced through the delivery lumen and out the side port to the desired location.
The invention provides a system as defined in claim 1.
In another embodiment, the disclosure is directed to kit including a delivery catheter and an implantable element for at least one of therapy delivery or sensing. The delivery catheter may include a catheter body, a side port, a first electrode, and a second electrode. The catheter body may comprise a proximal end, a distal end, and a perimeter surface. Further, the catheter body defines a delivery lumen extending longitudinally within the catheter body. The side port is defined in the perimeter surface of the catheter body proximate the distal end and in communication with the delivery lumen. Each of the first and second electrodes is adjacent to and spaced from the side port.
In yet another embodiment, the disclosure is directed to a method that comprises advancing a delivery catheter toward a desired location within a patient. The delivery catheter comprises a catheter body including a proximal end, a distal end and a perimeter surface. The catheter body defines a delivery lumen extending longitudinally within the catheter body. The delivery catheter also includes a side port defined in the perimeter surface of the catheter body proximate the distal end and in communication with the delivery lumen. The delivery catheter further includes a first electrode and a second electrode. Each of the first and second electrodes is adjacent to and spaced from the side port. The method also includes identifying the desired location with the first electrode and the second electrode, advancing an implantable element for at least one of therapy delivery or sensing through the delivery lumen and out the side port to the desired location, and withdrawing the delivery catheter from patient.
FIG. 1
is a schematic diagram illustrating a right side of a heart and includes an example delivery catheter inserted through the superior vena cava and right atrium into the right ventricle.
FIG. 2A
FIG 1
is a side view illustrating the example delivery catheter of and a lead exiting the catheter and attached to a surface.
FIG. 2B
FIG 2A
is a cross-sectional view of the delivery catheter of taken along line 2B.
FIG. 3
is a side view illustrating another example delivery catheter.
FIG 4
is a cross-sectional side view illustrating another example delivery catheter including a guide wire lumen.
FIG 5
is a cross-sectional side view illustrating another example delivery catheter including a movable deflection member and a guide wire disposed in the catheter.
FIG 6
FIG. 5
is a cross-sectional side view illustrating the delivery catheter including the movable deflection member of and a lead advanced through the catheter.
FIG 7
is a schematic side view illustrating an example delivery catheter in a patient lumen and a lead exiting a side port and entering a second patient lumen.
FIG. 8
is a flow diagram illustrating an example method of delivering a medical lead to a desired location using a delivery catheter.
FIG. 9
is a flow diagram illustrating an example method of delivering a medical lead to a desired location using a delivery catheter and a guide wire.
In general, the present disclosure is directed to a delivery catheter and methods of using the delivery catheter. The delivery catheter may be used to deliver a sensing lead, stimulation lead or drug delivery catheter to a desired location within a patient. In general, the patient may be a human patient. However, in other embodiments, the patient may be a non-human patient. The desired location may generally include any site within the patient where stimulation, sensing, or drug delivery is desired. In some embodiments, the desired location includes a His bundle, a coronary vein, or tissue suitable for pacing, which is not dead, damaged, or otherwise not operating within general anatomical norms.
The delivery catheter may include features that facilitate determination of the desired location. For example, the delivery catheter may include at least two electrodes for sensing a waveform, such as an ECG. The desired location may be determined based on a characteristic of the waveform, such as the amplitude or the presence of certain waveform features.
The delivery catheter may also include features that facilitate delivery of the lead or drug delivery catheter at an angle to the longitudinal axis of the delivery catheter. For example, the delivery catheter may include a side port defined in a perimeter surface of the catheter, through which the lead or drug delivery catheter exits a lumen of the delivery catheter. In some embodiments, the delivery catheter may include a deflection member which deflects the lead or drug delivery catheter out of the side port.
In this disclosure, the delivery catheter will be primarily described with reference to delivering a stimulation lead to a location proximate a His bundle in a heart. However, it will be understood that delivery catheters of the present disclosure are not limited to delivering stimulation leads to a His bundle. For example, delivery catheters described herein may be used to deliver leads to a coronary vein, to epicardial tissue, or other locations. Additionally, delivery catheters described herein may be used to deliver leads for neurostimulation therapy (e.g., spinal cord stimulation), deep brain stimulation, stimulation of one or more muscles, muscle groups or organs, and, generally, stimulation of tissue of a patient. Further, in some embodiments the delivery catheters described herein can be used to deliver catheters for dispensing a drug or other beneficial agent from an implanted or external drug delivery device. In short, the delivery catheters described herein can find useful application in delivery of a wide variety of leads or catheters for delivery of therapy to a patient or patient sensing. As such, the delivery catheter may comprise part of a system that includes other elements such as an implantable element delivered via the delivery catheter or an external device for processing one or more signals obtained by electrodes of the delivery catheter. In some instances, one or more elements of the system may be packaged as a kit. For example, the kit may include the delivery catheter and an implantable element that is sized for delivery via the delivery catheter.
FIG. 1
FIG. 1
is a schematic diagram of a right side of a heart 14 having an anterior-lateral wall peeled back to present a portion of the heart's intrinsic conduction system and chambers of a right atrium (RA) 10 and a right ventricle (RV) 6. Pertinent elements of the heart's intrinsic conduction system, illustrated in , include a sinoatrial (SA) node 1, an atrioventricular (AV) node 2, a His bundle 3, a right bundle branch 4, and Purkinje fibers 5. SA node 1 is shown near the superior vena cava (SVC) 12 in the RA 10. An electrical impulse starting at the SA node 1 travels rapidly through tissue of RA 10 and tissue of a left atrium (not shown) to AV node 2. At AV node 2, the impulse slows to create a delay before passing on through His bundle 3, which branches, in an interventricular septum 7, into a right bundle branch 4 and a left bundle branch (not shown) and then, near RV apex 16, into Purkinje fibers 5. Flow of the electrical impulse creates an orderly sequence of atrial and ventricular contraction and relaxation to efficiently pump blood through heart 14.
Due to disease, injury, or natural defects, the intrinsic conduction system of heart 14 may no longer operate within general anatomical norms. Consequently, a cardiac pacemaker system can be implanted into a patient such that electrodes carried by an implantable medical lead are placed in an atrial appendage 15. The electrodes stimulate RA 10 downstream of SA node 1 and the stimulating pulse travels on to AV node 2, His bundle 3, and Purkinje fibers 5 to restore physiological contraction of the heart. However, if a patient has a defective AV node 2, pacing in atrial appendage 15 will not be effective, since the pacing site is upstream of AV node 2. Such a patient may have a cardiac pacemaker system implanted such that lead electrodes are placed in an RV apex 16. RV apex 16 has been an accepted site for pacing since it is a relatively easy to engage lead electrodes at this site, and pacing from this site has been demonstrated safe and effective. Due to questions raised by recent studies looking into long-term effects of pacing from RV apex 16, as previously described, there is a great deal of interest in more physiologically correct pacing.
One site for more physiologically correct pacing is the His bundle 3. As described above, the His bundle 3 forms part of the intrinsic conduction system of heart 14, and any pacing applied from the His bundle 3 will conduct through the His bundle 3 to the Purkinje fibers 5 and throughout the right ventricle 6 and left ventricle (not shown). However, determining the location of the His bundle 3 and attaching a lead proximate to the His bundle 3 may be difficult.
For example, one preferred location from which the His bundle 3 may be paced is proximate to and under the tricuspid valve. This location may be accessed from the right ventricle, and may be difficult to reach using a distal port delivery catheter. Further, once this location is reached, it may be challenging to maintain a distal port delivery catheter in position as the lead is fixed to the His bundle 3 or tissue proximate the His bundle 3. Additionally, locating the His bundle 3 may be difficult in at least some hearts, because the His bundle 3 may not be reliably locatable in some patients using imaging techniques.
FIG. 1
FIG. 2B
FIG. 1
illustrates a portion of an example delivery catheter 8, which includes features that may facilitate locating His bundle 3, delivering a lead to His bundle 3 or tissue adjacent His bundle 3, and fixing the lead to His bundle 3 or the adjacent tissue. For example, the delivery catheter 8 includes a side port 9 located proximate to a distal end 11 of the catheter 8 and in communication with an internal lumen 22 of delivery catheter 8 (). Delivery catheter 8 also includes electrodes 27 located adjacent to and spaced from side port 9. The proximal end of delivery catheter 8 is not shown in .
Delivery catheter 8 may be inserted into the heart using a transvenous approach through the SVC 12 into the right atrium 10 and may be directed through the tricuspid valve 13 to RV 6. In some embodiments, delivery catheter 8 is a steerable catheter. That is, in some embodiments, the delivery catheter 8 includes features that allow it to effectively transfer force applied to a proximal end, e.g., handle, of the delivery catheter 8 into motion of a distal end of delivery catheter 8. In other embodiments, delivery catheter 8 is a guidable catheter and includes a lumen for receiving a guide wire to assist with advancing the catheter 8 into a desired position within the heart.
Delivery catheter 8 may comprise a flexible, biocompatible material such as, for example, silicone or polyurethane. In some embodiments, delivery catheter 8 may further include a radiopaque marker to facilitate fluoroscopic or other visualization of the catheter, e.g., for steering and/or orienting the catheter, as it is being delivered to the target tissue site. A length of delivery catheter 8 may vary, but may be between about 30 and 60 centimeters, with an outer diameter of less than about 10 French, or about 0.131 inches (3.2095 mm).
FIG. 1
As illustrated in , a curve, multiple curves, or any other shape may be formed in a distal portion 18 of the catheter 8 proximate distal end 11 and to assist in bringing distal end 11 into contact with His bundle 3 or tissue proximate His bundle 3. In some embodiments, the curve(s) or other shape may be formed in catheter 8 through use of a guide wire (not shown) that includes the desired curve or shape, or an actuation member at a proximal end of the delivery catheter 8 that can be manipulated to induce the desired curve(s) or shape in distal portion 18. For example, in some embodiments the actuation member (not shown) may be a rotatable thumb wheel coupled to one or more pull wires attached to an off-axis attachment point near distal end 11. By actuating the rotatable thumb wheel, the pull wire(s) may be tightened, which may cause distal end 11 to deflect and induce the desired shape in distal portion 18.
In other embodiments, such as, for example, when the delivery catheter 8 is a steerable catheter, the catheter 8 may include a pre-formed curve or shape. Delivery catheter 8 may be flexible to facilitate advancement of the catheter 8 through the circulatory system (including SVC 12). Upon advancing into RA 10, catheter 8 may begin to regain its pre-formed curve or shape. The catheter 8 may then be advanced through the tricuspid valve 13 and into the right ventricle 6, where distal end 11 of catheter 8 is directed into contact with endocardial tissue proximate to His bundle 3.
FIG. 2A
Side port 9 is located on a perimeter surface 17 () of delivery catheter 8 proximate to distal end 11. In some embodiments, side port 9 may be located on a portion of the perimeter surface 17 that is inwardly oriented when the pre-formed curve of the distal portion 18 of catheter 8 is present. In other embodiments, delivery catheter 8 may be manipulated (e.g., rotated or twisted) to inwardly or outwardly orient side port 9.
Because side port 9 forms the exit through which lead 23 is advanced, in some embodiments the distal end 11 of lead may be a blind end. That is, distal end 11 may not include an orifice in communication with the internal lumen 22 of catheter 8. In other embodiments, internal lumen 22 may extend fully from proximal end of delivery catheter 8 to distal end 11 of catheter 8.
FIG. 2A
FIG 2B
FIG 2A
FIG. 2A
FIG. 2B
is a side view illustrating distal portion 18 of delivery catheter 8 and a lead 23 exiting the catheter and attached to a surface. is a cross-sectional view of the delivery catheter 8 taken along line 2B, which is illustrated in. As shown in , the side port 9 may be manipulated to be proximate to surface 21 of tissue 29, which may be tissue of His bundle 3, or endocardial tissue near His bundle 3. Side port 9 provides an exit orifice through which lead 23 may exit delivery catheter 8 to be fixed to tissue 29 by fixation element 25. The side port 9 may be in communication with an internal lumen 22 (see ) defined within delivery catheter 8. Lead 23 may be advanced through the internal lumen 22 from a proximal end (not shown) of delivery catheter 8 to the distal end 11 of catheter 8 and exit through side port 9.
FIG. 2A and FIG. 2B
FIGS. 2A and 2B
In the embodiment illustrated in , the fixation element 25 is a helical fixation element, which, in some embodiments, may also function as a sensing or stimulation electrode. In other embodiments, however, another type of fixation element 25 may be used, and fixation element 25 and the electrode may be separate structures. For example, fixation element 25 may comprise a hook, a barb, an expandable fixation element, an adhesive, a tissue ingrowth element such as a mesh fiber, or a combination of more than one element. In the embodiment illustrated in , once the lead 23 exits through side port 9 and contacts surface 21, the lead body is rotated to advance the fixation element 25 through surface 21 and into the tissue 29. In other embodiments, lead 23 may be manipulated appropriately to cause fixation element 25 to attach lead 23 to tissue 29.
FIGS. 2A and 2B
Delivery catheter 8 also includes a first electrode 27a and a second electrode 27b (collectively "electrodes 27"). Electrodes 27 are each located adjacent to and spaced from side port 9. In the embodiment shown in , first electrode 27a is distal from side port 9 and second electrode 27b is proximal from side port 9. In other embodiments, as described below, both electrodes 27 may be proximal or distal from side port 9. In some embodiments, each of electrodes 27 is spaced at least about 2 millimeters from an adjacent edge of side port 9.
In some embodiments, delivery catheter 8 may include conductors (not shown) that electrically couple electrodes 27 to an external device (not shown), e.g., via a connector (not shown) comprising electrical contacts on a proximal portion of catheter 8. The external device may include circuitry for receiving and conditioning physiological signals of a patient via electrodes 27. In some embodiments, the external device may include a user interface, which may comprise a display for displaying the physiological signals. In some embodiments, the external device may include circuitry, such as digital signal processor (DSP), microprocessor, application specific integrated circuit (ASIC), or other processor or processing circuitry, for processing the signal, e.g., for automatically detecting features in the signal.
In some embodiments, the physiological signal is an electrocardiogram (ECG). The external device or a user, e.g., physician, may detect the location of His bundle 3 based on the ECG waveform. For example, when the electrodes 27 are located adjacent His bundle 3, the ECG waveform may include the atrial P-wave, ventricular QRS signature, and a His spike between the P-wave and QRS signature. Thus, translating the catheter 8 along surface 21 while collecting an ECG may allow determination of a location of His bundle 3.
As an example of an embodiment in which the external device comprises a processor capable of detecting features within a physiological signal, the processor may be capable of detecting an electrical potential waveform indicative of the His bundle 3. For example, the His bundle 3 has a signature waveform with a frequency of about 200 Hz, which may be detectable by the processor.
Further, in some embodiments, the ECG may be used to differentiate between viable tissue suitable for pacing and dead (ischemic) or damaged tissue unsuitable for pacing. For example, the ECG may include a lower voltage amplitude when electrodes 27 are adjacent dead or damaged tissue compared to when electrodes 27 are adjacent viable tissue.
In some embodiments, the conductors may electrically couple the electrodes 27 to an electrical energy source, which may be part of the same external device used for signal monitoring, or a different external device. The electrical energy source may apply a voltage or current between the first electrode 27a and second electrode 27b. When electrodes 27 are in contact with surface 21 of tissue 29, the electrical energy travels through the tissue 29 and an impedance of the tissue 29 may be determined by measuring the electrical current or voltage, and calculating impedance based on the measured value and the applied voltage or current. By scanning the lead across the tissue and monitoring the impedance, the location of the His bundle 3 may be determined. Specifically, tissue comprising the His bundle 3 may exhibit a lower impedance than an impedance of adjacent endocardial tissue. In fact, an impedance of tissue of the His bundle 3 may be about 50% lower than an impedance of adjacent endocardial tissue.
In some embodiments, delivery catheter 8 also includes a feature 24 which may facilitate withdrawal of the delivery catheter 8 once lead 23 is in the desired position. For example, the feature 24 may comprise a thin silver strip which allows a physician to cut delivery catheter 8 more easily. In other embodiments, the feature 24 may comprise a thin groove or perforation that enables a physician to tear catheter, or a substantially longitudinally-oriented tear strip that a physician may use to tear catheter 8. In some embodiments, delivery catheter does not include such a feature 24.
FIG. 3
illustrates another example delivery catheter 30, which includes a single delivery lumen 32. The delivery lumen 32 is defined by the catheter body 34 and extends substantially longitudinally within catheter body 34 from catheter proximal end 36 to catheter distal end 38. The delivery catheter 30 further includes a side port 40 defined in perimeter surface 42, a first electrode 44a and a second electrode 44b (collectively "electrodes 44").
FIG. 3
Delivery lumen 32 is in communication with side port 40. In the embodiment illustrated in , the delivery catheter 30 includes a deflection member 46, which is shaped to deflect a lead (e.g., lead 25) advancing substantially longitudinally through lumen 32 to extend out through side port 40.
In some embodiments, deflection member 46 may be shaped such that the lead exits side port 40 about orthogonal to the longitudinal axis 48 of the catheter 30. In other embodiments, deflection member 46 may be shaped such that the lead exits side port 40 at a non-orthogonal angle to longitudinal axis 48 of catheter 30.
FIG. 3
FIG. 3
FIG. 3
also illustrates electrodes 44 both located adjacent to and separated from side port 40. In , each of electrodes 44 is located distal from port 40, and is electrically coupled to a respective one of conductors 50, which extend to proximal end 36 of delivery catheter 36. While not shown in , conductors 50 may include, at their proximal ends, connectors for electrically connecting to an external device, such as a monitor, display, ECG machine, voltage source or waveform detector, as described above.
FIG. 4
FIGS. 1
2
3
FIG. 4
illustrates a cross-sectional view of another example embodiment of a delivery catheter 60. Certain aspects of catheter 60 are similar to catheter 8 and catheter 30 of , and . For example, delivery catheter 60 includes a catheter body 64, which defines a delivery lumen 62 extending substantially longitudinally within catheter body 64 from a catheter proximal end 66 substantially to a catheter distal end 68. Delivery catheter 60 further includes a side port 70, defined in perimeter surface 72, in communication with delivery lumen 62. Catheter body 64 also includes a deflection member 76, which in the embodiment illustrated in , is a sloped surface connecting distal periphery 70a of side port 70 with a catheter lumen wall 62a. Deflection member 76 may deflect a lead advanced through delivery lumen 62 out through side port 70.
Delivery catheter 60 further includes a guide wire lumen 80 defined by catheter body 64 and extending substantially longitudinally from catheter proximal end 66 to catheter distal end 68. Guide wire lumen 80 may receive a guide wire for guiding the delivery catheter 60 into a desired position, such as into a desired position in a right ventricle of a heart.
FIGS. 5 and 6
illustrate an example delivery catheter 90 including a single delivery lumen 92 defined in catheter body 94. Delivery lumen 92 extends fully from catheter proximal end 104 to catheter distal end 98. The delivery catheter 90 further includes a deflection member comprising a movable flap 100. Movable flap 100 may be used to provide a single lumen delivery catheter 90 that is capable of receiving a guide wire 102.
FIGS. 5 and 6
FIG. 5
In the embodiment illustrated in , the guide wire 102 may first be advanced to proximate the desired location for introduction of a lead 104 or drug delivery catheter. Once the guide wire 102 is proximate the desired location, the delivery catheter 90 may be advanced over guide wire 102, with guide wire 102 disposed in delivery lumen 92. As the distal end 98 of catheter 90 is advanced over guide wire 102, the movable flap 100 deforms and moves to an up or open position, as shown in . Delivery catheter 90 may be advanced over guide wire 102 until side port 96 is proximate the desired location. In some embodiments, catheter 90 includes at least two electrodes for determining the desired location, as described above. Once the delivery catheter 90 (e.g., side port 96) is located in the desired position, the guide wire 102 may be withdrawn through distal end 104 of the catheter 90.
FIG. 6
FIG. 6
When guide wire 102 is withdrawn from delivery lumen 92, the movable flap 100 is no longer being deformed, and returns to a down or closed position, as shown in . In the closed configuration, the movable flap 100 forms a deflection surface which can deflect a lead 104 advanced through delivery lumen 92 out side port 96, as shown in .
FIG. 4
A delivery catheter 90 including a single delivery lumen 92 and a movable flap 100 may provide a delivery catheter with a smaller outer diameter compared to a delivery catheter with both a delivery lumen and a guide wire lumen, such as catheter 60 of , while still permitting the use of a guide wire 102 during advancement of the catheter to a desired location within a patient. In embodiments where the lead 104 is to be delivered to a small diameter lumen, such as a small artery or vein, it may be desirable to form the delivery catheter 90 with as small an outer diameter as possible.
FIG. 7
FIG. 7
While the disclosure hereinabove has been generally directed to delivery catheters for transvenous introduction of a stimulation lead to a location proximate the His bundle, delivery catheters according to this disclosure may find applicability in other situations. For example, as illustrated in , a delivery catheter 110 may be used to deliver a lead 112 to a location through the coronary sinus. In many cases, it is desired that the lead 112 be advanced through coronary sinus 114 and into a coronary vein 116. Some of the most desirable coronary veins 116 branch off coronary sinus 114 substantially perpendicularly. It may be difficult to direct the lead 112 or a conventional catheter from the coronary sinus 114 to the coronary vein 116 when the angle is substantially perpendicular. However, delivery catheter 110, which includes side port 118, facilitates the advancement of the lead 112 into coronary vein 116, as shown in .
Additionally, delivery catheter 110 includes a first electrode 120a distal from side port 118 and a second electrode 120b proximal from side port 118. In some embodiments, an ECG detected by electrodes 120a and 120b may be used to detect when catheter 110 is located within coronary sinus 114 proximate to coronary vein 116. For example, the presence of a relative large atrial depolarization wave, or P-wave, and a relatively small R-wave may indicate that catheter 110 is within coronary sinus 114 rather than RV 6. The physician may identify the opening into vein 116 and advance lead 112 into the vein by feel, utilizing fluoroscopy or other visualization techniques, or any other technique known in the art.
Additionally, the configuration of electrodes 120a and 120b may enable the detection of the location of coronary vein 116. For example, a voltage or current may be applied between first electrode 120a and second electrode 120b as the catheter is advanced through first coronary vein 114, and the impedance of vein wall 122 may be detected. When first electrode 120a is advanced adjacent the orifice 124 of second coronary vein 116, the detected impedance will change, indicating that an electrode is adjacent an orifice. In some embodiments, the delivery catheter 110 may be advanced further, until the impedance returns to a value indicating both electrodes are adjacent a vein wall 122. The lead 112 may them be advanced through a delivery lumen (not shown) in catheter 110, out side port 118, and into second coronary vein 116.
In another embodiment, a delivery catheter may be used to insert an epicardial lead through a minimally invasive substernal incision. For example, an incision may be made in the pericardium and the catheter may be advanced through the incision. In some embodiments, the catheter may be advanced over a guide wire and/or through a sheath that is positioned within and maintains an opening at the pericardial incision.
The delivery catheter may again include a first electrode, a second electrode, and a side port. The electrodes may be used to detect the ECG. The amplitude of the ECG may be used to distinguish epicardial and myocardial tissue unsuitable for pacing, e.g., ischemic or otherwise damaged or defective tissue, from epicardial and myocardial tissue which is suitable for pacing. In particular, the amplitude of the ECG will be discernibly lower when the electrodes are over or contacting unsuitable epicardial and myocardial tissue.
The electrodes may additionally or alternatively be used to detect impedance of the epicardial tissue with which the electrodes are in contact, which may additionally or alternatively be used to distinguish unsuitable, e.g., ischemic, epicardial and myocardial tissue unsuitable for pacing from living epicardial and myocardial tissue which is suitable for pacing. In particular, unsuitable tissue may have a higher impedance than viable tissue.
In either case, once a desired location for pacing is determined, a lead may be advanced through a delivery lumen defined in the catheter body and out of the side port. The lead may be attached to the epicardial tissue and the catheter withdrawn from the delivery site through the pericardial incision.
In some embodiments, the delivery catheter may include a pre-formed curvature similar to the natural curvature of the epicardium. Additionally, in some embodiments, the side port may be defined in a perimeter surface of the catheter which is disposed toward the epicardium when the catheter is allowed to relax towards its pre-formed curvature.
Further, delivery catheters described herein may find application delivering leads to other locations within a patient. For example, the delivery catheters described herein may be used to deliver leads for neurostimulation therapy (e.g., spinal cord stimulation), deep brain stimulation, stimulation of one or more muscles, muscle groups or organs, and, generally, stimulation of tissue of a patient. In other applications, the delivery catheters described herein can be used to deliver leads which provide muscular stimulation therapy, gastric system stimulation, nerve stimulation, lower colon stimulation, recording or monitoring, gene therapy, or the like.
Additionally, in some embodiments the delivery catheters described herein can be used to deliver catheters for dispensing a drug or other beneficial agent from an implanted or external drug delivery device. In short, the delivery catheters described herein can find useful application in delivery of a wide variety of leads or catheters for delivery of therapy to a patient or for patient sensing. The patient may be a human patient. In some cases, however, the delivery catheters described herein may be applied deliver leads or catheters to non-human patients.
FIG. 8
FIGS. 1
2
is a flow diagram that illustrates an example method of introducing a lead into a patient using a delivery catheter of the present disclosure, which, while any of the described catheters may be used, will be described with reference to the delivery catheter 8 and lead 25 of and .
First, the delivery catheter 8 is advanced proximate a desired location (130). In some embodiments, the delivery catheter 8 may be advanced transvenously through a SVC 12, into a right atrium 10, through a tricuspid valve 13 and into RV 6. In other embodiments, the delivery catheter 8 may be inserted into a torso through an incision and advanced through an incision in a pericardium to a location adjacent epicardial tissue. In yet other embodiments, the delivery catheter 8 may be advanced transvenously into a coronary vein. In some embodiments, the desired location may include a His bundle 3. In other embodiments, the desired location may include another coronary vein, an epicardial tissue which is not damaged or defective, or an endocardial tissue which is not damaged or defective.
Once the catheter 8 is proximate the desired location, electrodes 27 are used to determine the desired location (132). The desired location may be determined by detecting characteristics of a physiological waveform, e.g., a His spike within an ECG, or an impedance of tissue 29 adjacent electrodes 27.
After the desired location is determined, a lead 25 may be advanced within a delivery lumen (e.g., internal lumen 22), out of side port 9 and to the desired location (134). The lead 25 may then optionally be attached to the desired location, when the desired location comprises tissue 29, or the lead 25 may be advanced further, when the desired location comprises a second lumen.
Finally, the delivery catheter 8 is withdrawn from the patient (136). As described briefly above, in some embodiments the delivery catheter 8 may comprise a feature 24 oriented substantially longitudinally along perimeter surface 17 which enables delivery catheter 8 to be easily removed over lead 25 by, for example, tearing the catheter. In other embodiments, the catheter 8 may simply be withdrawn over a proximal end of lead 25.
FIG. 9
FIG. 9
FIGS. 5 and 6
FIG. 8
is a flow diagram that illustrates another example method of delivering a lead to a desired location in a patient using a delivery catheter. The method of will be described with reference to delivery catheter 90 of . Similar to the embodiment illustrated in , the delivery catheter 90, which includes a guide wire 102 disposed in delivery lumen 92, is advanced over the guide wire until it is proximate to a desired location (140). Guide wire 102 may have been previously advanced to the desired location, prior to advancing catheter 90 over the guide wire. Again, the desired location may be a His bundle, a coronary vein, an epicardial tissue which is not damaged or defective, or an endocardial tissue which is not damaged or defective.
FIG. 9
FIG. 5
FIG. 6
The desired location is then determined using a first electrode and a second electrode (142). In the embodiment illustrated in , the guide wire 102 is then withdrawn (144) from delivery lumen 92. As the guide wire 102 is withdrawn, the movable flap 100 moves from an open position, shown in , to a closed position, shown in . This provides a deflection surface which can deflect a lead 104 out of side port 96.
A lead 104 is then advanced through delivery lumen 92 from a proximal end of delivery catheter 90. As the lead 104 is advanced and reaches movable flap 100, movable flap 100 deflects lead 104 out of side port 96 and to the desired location (146). The lead 104 may then optionally be attached to the desired location, when the desired location comprises tissue, or the lead 104 may be advanced further, when the desired location comprises a second lumen.
Finally, the delivery catheter 90 is withdrawn from the patient (148). As described briefly above, in some embodiments the delivery catheter 90 may comprise a feature (e.g., feature 24) oriented substantially longitudinally along a perimeter surface of catheter 90 which enables delivery catheter 90 to be easily removed over lead 104. In other embodiments, the catheter 90 may simply be withdrawn over a proximal end of lead 104.
Various embodiments have been described. However, one of ordinary skill in the art will appreciate that various modifications may be made to the described embodiments. For example, although described above with reference to embodiments in which a delivery catheter includes two electrodes proximate to the side port, the disclosure is not so limited. For example, delivery catheter embodiments according to the disclosure may include three or more electrodes, or may include a single electrode used with a remote and/or indifferent electrode for any of the detection purposes described herein.
Additionally, although described primarily with reference to embodiments in which a cardiac pacing/sensing or other electrical implantable medical lead is delivered using a delivery catheter, the disclosure is not so limited. Delivery catheters according to the present disclosure may be used to deliver other catheters used for delivery of drugs or agents, sensing, shunting, or any other medical purpose. Delivery catheters according to the present disclosure may additionally or alternatively be used to deliver microstimulators, sensors, or any other sensing and/or therapeutic device or element that is implantable within a patient. Such medical devices or elements may have any configuration known in the art. For example, implantable medical leads may have any number or type of electrodes coupled to one or more proximal connectors by one or more conductors within a flexible lead body. | |
Why are right hand turns harder on a motorcycle?
In theory, turns on a cycle should be equally strenuous. However, you are most-likely right handed. This means that your right arm is probably a bit stronger than your left arm, so pushing the handlebar forward with your right arm might be a bit easier than with your left.
What are the 5 skills every motorcycle needs to achieve?
SLOW SPEED RIDING (WALKING PACE)
- SLOW SPEED RIDING (WALKING PACE)
- Riding at slow speeds is used in city traffic, moving off from a stop, turning around in parking lots, turning around on a road/highway to change direction; bumper to bumper highway traffic to name a few. …
- SHARP RIGHT TURN FROM A STOP.
Are heavier motorcycles harder to ride?
Even though heavier motorcycles provide many safety advantages compared to lighter bikes, they are harder to ride if you’re a beginning motorcyclist. Heavier motorcycles require much more attention and concentration since you are handling more weight.
Why does my motorcycle wobble at high speeds?
A speed wobble typically starts when the front wheel elevates from the ground when you accelerate, do a wheelie, or run into a pothole. If the front wheels of your bike settle back on the road at an angle, the wheel is supposed to get back into a straight line.
What is the death wobble on a motorcycle?
The death wobble is a shimmying, shaking or oscillation that occurs when a mechanical or rider induced irregularity occurs with the front tire or steering component(s) of the motorcycle. This causes the front of the motorcycle to shake from side to side violently.
Why is my motorcycle so bumpy?
Loose steering head, swingarm, or wheel bearings could also be the culprit. … Check your tires for bulges or damage and spin your wheels to see if they’re still straight. Next up, ride quality. If your bike has gotten more sensitive to bumps and is feeling harsh, your suspension may be binding.
When negotiating a motorcycle should you lean?
First is to look in the direction you want to go. Second is to push the handgrip forward on the side you are turning towards (so right turn, push forward on right hand). Third is to try to stay vertical with the bike which means you will be leaning right on a right curve. | https://powermanmalaysia.com/motorcycle/your-question-why-is-it-harder-to-turn-right-on-a-motorcycle.html |
Chinese sports authorities unveiled new anti-doping regulations in sports in accordance with the World Anti-Doping Code that goes into effect on January 1, 2015.
Coming along with the Anti-Doping Administrative Regulations on Wednesday was the Anti-Doping General Principles, which is also effective on January 1 next year.
The anti-doping head in China's sports administrative department said the Principles were basically a Chinese version of the World Anti-Doping Code while the Regulations served as general guidelines and sought out executive measures.
"The Regulations can stay relatively stable while the Principles will closely follow the changing World Anti-Doping Code," said Jiang Zhixue on Thursday.
The Regulations, replacing a 17-year-old First Order published by the sports authorities, were both comprehensive and detailed, covering fields including anti-doping responsibilities, education, tests, result management, non-registered athletes management, nutritional supplements as well as punishments.
"We put in the measures to deal with problems that we expect in the future and encountered in the past," Jiang said.
According to Jiang, one of the major problems is how to control the executive level as well instead of punishing the rule-breaking athletes alone.
"It has been universally agreed that athletes are mostly influenced by coaches and doctors when it comes to doping," Jiang said. "The indulgence of the executive level also plays a part in it."
"Normally the athletes are the ones to be punished but we need to also crack down on those behind the scenes," he said.
The regulations ruled that civil servants, if found involved in doping, could receive warnings, get demerits or be fired. | http://mobile.ytsports.cn/news-147.html |
My intention was to create a simple, modern and recognizable logo that would represent CityTech library the best. The library is located right next to one of the iconic structures in New York City and I felt that the simplified shape of the Brooklyn Bridge could be a good component of the visual solution for the logo. Additionally, the bridge is a symbol representing the library as a bridge to knowledge and CUNY as a bridge to professional life. Another important element is uncomplicated shapes of books which are a good representation of a library. I think combining the Brooklyn Bridge and books silhouettes looks very eye-catching and at the same time, it represents the CityTech Library in a simple and modern manner. | https://www.adgirljulia.com/bridge-to-knowledge |
Mobility of Animal Genetic Materials: Policy Brief 10 (2019)The policy brief stipulates that animal mobility is a system of resilience of animals and livestock keepers, and Regional AnGR transboundary agreements and frameworks can ensure conservation programmes for animal genetic ...
-
OAU/AU 50 Anniversary: Pan-Africanism and the African Renaissance (2013)A pamphlet highlighting the celebration of the 50th Anniversary of the OAU-AU held in Nairobi Kenya in 2013.
-
Promotion of Indigenous Animal Resources and Their Products in Africa: Policy Brief 13 (2019)Key messages highlighted in this brief include: • Development of new and existing niche markets or marketing strategies can help overcome the continual state of decline of indigenous AnGR breeds by raising their visibility ...
-
Promotion of Regional Cooperation for the Sustainable Genetic Resources in Africa: Policy Brief 14 (2019)The policy brief highlights that: (i) Given the public-good of animal genetic resources, policy related issues require regional coordination and partnerships; (ii) In Africa, regional cooperation for animal genetic resources ...
-
Promotion of Traditional Knowledge to Achieve Socio-Economic and Environmentally Sustainable Gains in the Management of Animal Genetic Resources: Policy Brief 15 (2019)The policy brief highlights the key aim of recognizing, enhancing and promoting the use of knowledge, practices and innovations of indigenous and local communities is a way to ensure human well-being and food security ...
-
Socio-economic Benefits of Rinderpest Eradication from Ethiopia and Kenya (2010-03)This study sought to evaluate the costs and benefits of rinderpest eradication from Ethiopia and Kenya. The study used primary data collected through interviews with key informants in Ethiopia and Kenya. Secondary data ...
-
Standard Methods and Procedures (SMPs) for Containment of Rinderpest (RP) in the Greater Horn of Africa (2015)This booklet presents the Standard Methods and Procedures (SMPs) for Rinderpest (RP), and deals with specific considerations in the post Rinderpest eradication era. | http://repository.au-ibar.org/handle/123456789/399/browse?rpp=20&sort_by=1&type=title&offset=20&etal=-1&order=ASC |
CROSS-REFERENCE TO RELATED APPLICATIONS
FIELD OF THE INVENTION
BACKGROUND OF THE INVENTION
SUMMARY OF THE INVENTION
DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS
Core Materials
Shell Material
Processing Aids
Structure of Microcapsules
Processes
Uses
Examples
Example 1
Multicore Microcapsules Prepared by One-Step Process for Comparison (both First and Second Shells having the Same Composition of Gelatine and Polyphosphate)
Example 2
Example 3
A Two-Step Process having Gelatine and Alginate in the Second Shell
Example 4
A Three-Step Process to Incorporate Wax and Alginate in the Second Shell and Alginate in the Third Shell
Example 5
A Two-Step Process of Multicore Microcapsules having Wax and Alginate in the Second Shell
Example 6
Evaluation of Microcapsules
This application claims the benefit of U.S. Provisional Patent Application No. 60/423,363 filed Nov. 4, 2002, which is incorporated by reference herein in its entirety.
This invention relates to microcapsules having multiple shells, to methods of preparing microcapsules and to their use.
Microcapsules are small particles of solids, or droplets of liquids, inside a thin coating of a shell material such as starch, gelatine, lipids, polysaccharides, wax or polyacrylic acids. They are used, for example, to prepare liquids as free-flowing powders or compressed solids, to separate reactive materials, to reduce toxicity, to protect against oxidation and/or to control the rate of release of a substance such as an enzyme, flavour, a nutrient, a drug, etc.
Ideally, a microcapsule would have good mechanical strength (e.g. resistance to rupture) and the microcapsule shell would provide a good barrier to oxidation, etc.
A typical approach to meeting these requirements is to increase the thickness of the microcapsule wall. But this results in an undesirable reduction in the loading capacity of the microcapsule. That is, the “payload” of the microcapsule, being the mass of the loading substance encapsulated in the microcapsule divided by the total mass of the microcapsule, is low. The typical payload of such “single-core” microcapsules made by spray drying an emulsion is in the range of about 25-50%.
FIG. 1
FIG. 1
10
12
12
14
12
16
Another approach to the problem has been to create what are known as “multi-core” microcapsules. These microcapsules are usually formed by spray drying an emulsion of core material such that the shell material coats individual particles of core material, which then aggregate and form a cluster. A typical multi-core microcapsule is depicted in prior art . Multi-core microcapsule contains a plurality of cores . The cores take the form of entrapped particles of solids or of liquid droplets dispersed throughout a relatively continuous matrix of shell material . As a result, there is a high ratio of shell material to loading material and the payload of the multi-core microcapsule is therefore low. Moreover, despite the high ratio of shell material to loading substance in such microcapsules, the shell material is poorly distributed. As shown in prior art , many of the cores are very close to the surface of the microcapsule. The cores at the surface are therefore not well protected against rupture or from oxidation.
Known microcapsules therefore either have a poor payload, or fail to adequately contain and protect the loading substance deposited therein. Moreover, because these microcapsules are generally prepared in a single step, it is difficult to incorporate multiple functionalities, such as oxidation resistance, moisture resistance and taste masking into a single microcapsule.
In one aspect, the invention provides a multi-core microcapsule comprising: (a) an agglomeration of primary microcapsules, each primary microcapsule comprising a core and a first shell surrounding the core; (b) a second shell surrounding the agglomeration; and (c) a third shell surrounding the second shell; at least one of the first, second and third shells comprising a complex coacervate.
In another aspect, the invention provides a single-core microcapsule comprising: (a) a core; (b) a first shell surrounding the core; and (c) a second shell surrounding the first shell; at least one of the first and second shells comprising a complex coacervate.
In the case of either the multi-core or single-core microcapsules, it is preferred that all of the shells comprise a complex coacervate, which may be the same or different for each of the shells. Additional shells, e.g. from 1 to 20, may be added to further strengthen the microcapsule.
(i) a multi-core microcapsule comprising: an agglomeration of primary microcapsules, each primary microcapsule comprising a core and a first shell surrounding the core; and a second shell surrounding said agglomeration; and
(ii) a single-core microcapsule comprising: a core; and a first shell surrounding the core;
(a) providing a microcapsule selected from the group consisting of:
(b) mixing the microcapsule with first and second polymer components of shell material in aqueous solution;
(c) adjusting at least one of pH, temperature, concentration and mixing speed to form shell material comprising the first and second polymer components, the shell material forming an additional shell enveloping the microcapsule;
wherein at least one of the first shell, the second shell and the additional shell comprises a complex coacervate.
In another aspect, the invention provides a process for making a microcapsule having a plurality of shells, the process comprising:
Any core material that may be encapsulated in microcapsules is useful in the invention. Indeed, in certain embodiments, commercially available microcapsules may be obtained and then further processed according to the processes of the invention.
1
30
2
30
3
30
1
6
When the initial multi-core microcapsules are prepared according to processes as described herein involving an aqueous solution, the core material may be virtually any substance that is not entirely soluble in the aqueous solution. Preferably, the core is a solid, a hydrophobic liquid, or a mixture of a solid and a hydrophobic liquid. The core is more preferably a hydrophobic liquid, such as grease, oil or a mixture thereof. Typical oils may be fish oils, vegetable oils, mineral oils, derivatives thereof or mixtures thereof. The loading substance may comprise a purified or partially purified oily substance such as a fatty acid, a triglyceride or a mixture thereof. Omega-3 fatty acids, such as o-linolenic acid (18:3n3), octadecatetraenoic acid (18:4n3), eicosapentaenoic acid (20:5n3) (EPA) and docosahexaenoic acid (22:6n3) (DHA), and derivatives thereof and mixtures thereof, are preferred. Many types of derivatives are well known to one skilled in the art. Examples of suitable derivatives are esters, such as phytosterol esters, branched or unbranched C-Calkyl esters, branched or unbranched C-Calkenyl esters or branched or unbranched C-Ccycloalkyl esters, in particular phytosterol esters and C-Calkyl esters. Preferred sources of oils are oils derived from aquatic organisms (e.g. anchovies, capelin, Atlantic cod, Atlantic herring, Atlantic mackerel, Atlantic menhaden, salmonids, sardines, shark, tuna, etc) and plants (e.g. flax, vegetables, algae, etc).
While the core may or may not be a biologically active substance such as a tocopherol, antioxidant or vitamin, the microcapsules of the present invention are particularly suited for biologically active substances, for example, drugs, nutritional supplements, flavours, antioxidants or mixtures thereof.
Coacervation is a phase separation phenomenon, in which a homogenous polymer solution is converted into two phases. One is a polymer-rich phase, called a coacervate. The other is a polymer-poor phase, i.e., solvent. Complex coacervation is caused by the interaction of two oppositely charged polymers.
Preferably, a positively charged polymer component “A” interacts with a negatively charged polymer component “B”. For example, positively charged type A gelatine (“component A”) forms complex coacervates with negatively charged polyphosphate (“component B”). Other systems that have been studied are gelatine/gum Acacia, gelatine/pectin, gelatine/carboxymethyl guar gum and whey protein/gum arabic.
Component A is preferably gelatine type A, chitosan, etc., although other polymers are also contemplated as component A. Component B is preferably gelatine type B, polyphosphate, gum arabic, alginate, carrageenan, pectin, carboxymethylcellulose, or a mixture thereof.
J. Microencapsulation,
In addition to the charge density of the two polymer components, complex coacervation depends on other factors such as molecular weight of the polymers and their ratio, ionic strength, pH and temperature of the medium (2003, Vol. 20, No. 2: 203-210).
The molar ratio of component A:component B that is used depends on the type of components but is typically from 1:5 to 15:1. For example, when gelatine type A and polyphosphate are used as components A and B respectively, the molar ratio of component A:component B is preferably 8:1 to 12:1; when gelatine type A and gelatine type B are used as components A and B respectively, the molar ratio of component A:component B is preferably 2:1 to 1:2; and when gelatine type A and alginate are used as components A and B respectively, the molar ratio of component A:component B is preferably 3:1 to 5:1.
Ullmann's Encyclopedia of Industrial Chemistry
th
One suitable process of microencapsulation using complex coacervation comprises three steps: 1) dispersing the loading substance into a system of at least one of the polymers for the complex coacervate; 2) forming shells by deposition of coacervates which derive from the polymeric components under controlled conditions of temperature, pH, concentration of colloids, mixing speed etc.; and 3) hardening of the shells by crosslinking of the coacervates deposited on microcapsules (6edition. 2001, Vol. A16. pp. 575-588).
Any shells that do not comprise complex coacervates may be formed of any material that can form an additional shell around the microcapsule. The additional shell material typically comprises at least one polymer component. Examples of polymer components include, but are not limited to, proteins, e.g. gelatines, soy proteins, whey proteins, and milk proteins, polyphosphate, polysaccharides and mixtures thereof. Preferred polymer components are gelatine A, gelatine B, polyphosphate, gum arabic, alginate, chitosan, carrageenan, pectin, cellulose or derivatives of cellulose such as carboxymethylcellulose (CMC) or a mixture thereof. A particularly preferred form of gelatine type A has a Bloom strength of 50-350, more preferably a Bloom strength of about 275.
The shell material can also comprise lipids, such as waxes, fatty acids and oils, etc. to provide desired functionalities. The incorporation of lipids into the shell material improves the impermeability of the shell to water and oxygen. A preferred lipid for this purpose is beeswax. These lipids may be in solid, semi-solid or liquid form.
Processing aids may be included in the shell material. Processing aids may be used for a variety of reasons. For example, they may be used to promote agglomeration of primary microcapsules when forming multi-core microcapsules, control microcapsule size and shape and/or to act as an antioxidant. Antioxidant properties are useful both during the process (e.g. during coacervation and/or spray drying) and in the microcapsules after they are formed (e.g. to extend shelf-life of loading substances which are readily oxidized, etc). Preferably a small number of processing aids that perform a large number of functions are used. For example, ascorbic acid or a salt thereof may be used to promote agglomeration of the primary microcapsules, to control microcapsule size and shape and to act as an antioxidant. The ascorbic acid or salt thereof is preferably used in an amount of about 100 ppm to about 10,000 ppm, more preferably about 1000 ppm to about 5000 ppm relative to the batch size (i.e., the total weight). A salt of ascorbic acid, such as sodium or potassium ascorbate, is particularly preferred in this capacity. Other processing aids include, without limitation, buffering acids and/or their salts such as phosphoric acid, acetic acid, citric acid, and the like.
FIG. 2
FIG. 2
18
20
22
20
24
In one embodiment, microcapsules of the invention have a structure generally as depicted in . depicts a multi-core microcapsule prepared according to a multi-step process of the invention. Primary microcapsules comprise cores (i.e. the loading substance) surrounded by first shells . The primary microcapsules agglomerate and the space between them is usually at least partly filled by additional shell material of same composition as first shell , although there may be voids between some of the primary microcapsules. The agglomeration of primary microcapsules is surrounded by a second shell .
24
22
24
20
24
20
24
Multi-core microcapsules comprising second shell may be prepared according to the processes described herein and exemplified in the examples or by generally the same techniques that are described in Applicant's co-pending U.S. patent application Ser. No. 10/120,621 filed Apr. 11, 2002, corresponding to International Application No. PCT/CA2003/000520 filed Apr. 8, 2003, the disclosures of both of which are incorporated herein by reference. These multi-core microcapsules are particularly useful because the foam-like structure of primary microcapsules, supported by additional shell material in space and surrounded by second shell is an extremely strong, rupture-resistant structure that has a high payload i.e. the ratio of the total mass of the cores to the total mass of the multi-core microcapsule is very high, e.g. at least 50, 55, 60, 65, 70, 75, 80, 85, 90% or higher. This is called a “one-step” process when shells and are of the same composition and formed in a single step. When shells and are of different composition, the process involves two steps.
Commercially available multicore microcapsules may also be used as starting materials. An example is the Driphorm™ Hi-DHA™ microencapsulated tuna oil, manufactured by Nu-Mega Ingredients Pty. Ltd., Queensland, AU.
26
26
24
In accordance with the invention, a three-step process takes place when a third shell is formed on the multi-core microcapsule. Third shell further strengthens the microcapsule and can be advantageously used to provide a shell having properties different from those of shell .
26
26
24
26
24
26
26
FIG. 2
For instance, different polymer components can be incorporated into third shell . In addition, or alternatively, lipids may be incorporated into shell to increase moisture or oxygen impermeability or the like. These properties might instead be incorporated into second shell rather than third shell (or also into second shell as well as into third shell ), depending on the requirements for a particular purpose. Additional shells, not shown in , may be formed around third shell , by the methods and techniques of the invention. For instance, N additional shells could be added, wherein N is an integer from 1 to 20.
20
24
26
20
24
26
20
24
20
26
24
26
20
24
26
At least one of shells , and and of any additional shells comprises a complex coacervate, as described above. Preferably, at least two of the shells comprise a complex coacervate. Even more preferably, all of the shells comprise a complex coacervate. For instance, the following shells may comprise complex coacervates: (a) shell ; (b) shell ; (c) shell ; (d) shells and ; (e) shells and ; (f) shells and ; or (g) shells , and . Additional shells also preferably comprise a complex coacervate.
FIG. 2
18
20
26
Referring again to , the primary microcapsules (i.e. cores surrounded by first shells ) typically have an average diameter of about 40 nm to about 10 μm, more particularly from about 0.1 μm to about 5 μm, even more particularly an average diameter of about 1-2 μm. The finished multi-core microcapsule, i.e. including third shell , usually has an average diameter from about 1 μm to about 2000 μm, more typically from about 20 μm to about 1000 μm, more particularly from about 20 μm to about 100 μm and even more particularly from about 50 μm to about 100 μm.
FIG. 2
FIG. 3
FIG. 3
24
26
24
26
24
26
In , second shell and third shell are depicted as discrete layers. This will be the case if the shells are formed of the different shell materials. In that case, even if they do not differ in appearance, they will have a different composition and can be represented as discrete, distinct layers. But if second shell and third shell are formed of the same shell material, they may, as shown in , merge to form a single, continuous layer, having the combined thickness of second shell and third shell . As shown in , when the second and third shells are of the same composition, there may be no discrete boundary separating them. This would be true also in microcapsules of the invention having fourth or additional shells that are of the same composition as the preceding shell.
FIG. 4
FIG. 4
18
20
24
24
The invention is also useful in the preparation of single-core microcapsules having multiple shells. Single-core microcapsules useful as starting materials are commercially available. Examples include microencapsulated flavours by Givaudan Flavors Corp., Cincinnati, Ohio, USA, and microencapsulated minerals and vitamins by Watson Food Co. Inc., West Haven, Conn., USA. Alternatively, they can be made by complex coacervation processes as described herein, e.g. by preparing primary microcapsules without a further agglomeration step. depicts a single-core microcapsule having multiple shells in accordance with the invention. Core is surrounded by a first shell and a second shell . Additional shells, not shown in , may be formed around second shell , by the methods and techniques of the invention. For instance, N additional shells could be added, wherein N is an integer from 1 to 20.
20
24
20
24
20
24
20
24
As with the multi-core microcapsules, shells and of single-core microcapsules may be of the same or different composition. At least one of shells and and of any additional shells comprises complex coacervates as described above. Preferably, at least two of the shells comprise a complex coacervate. Even more preferably all of the shells comprise a complex coacervate. For instance, the following shells may comprise complex coacervates: (a) shell ; (b) shell ; or (c) shells and . Additional shells also preferably comprise complex coacervates.
24
FIG. 4
Single-core microcapsules may be as large as multi-core microcapsules. For instance, the exterior diameter of second shell in the single-core microcapsule of may be from about 1 μm to about 2000 μm. More typically it will be from about 20 μm to about 1000 μm, more particularly from about 20 μm to about 100 μm and even more particularly from about 50 μm to about 100 μm.
20
24
FIG. 5
When they are of the same composition, first shell and second shell (and any additional shell) of the single-core multicapsule may merge to form a single continuous layer as depicted in . This may be done in a one-step process.
Single or multi-core microcapsules to which additional shells may be added by the processes of the invention may be obtained from commercial sources. In a particularly preferred embodiment, multi-core microcapsules prepared in accordance with applicant's co-pending U.S. patent application Ser. No. 10/120,621 filed Apr. 11, 2002, corresponding to International Application No. PCT/CA2003/000520 filed Apr. 8, 2003, the disclosures of both of which are incorporated herein by reference, are used. Such microcapsules can be prepared e.g. by a one step process as follows.
An aqueous mixture of a loading substance (i.e.
core material) and a polymer component of the shell material is formed. The aqueous mixture may be a mechanical mixture, a suspension or an emulsion. When a liquid loading material is used, particularly a hydrophobic liquid, the aqueous mixture is preferably an emulsion of the loading material and the polymer components.
In a more preferred aspect, a first polymer component is provided in aqueous solution, preferably together with processing aids, such as antioxidants. A loading substance may then be dispersed into the aqueous mixture, for example, by using a homogenizer. If the loading substance is a hydrophobic liquid, an emulsion is formed in which a fraction of the first polymer component begins to deposit around individual droplets of loading substance to begin the formation of primary shells. If the loading substance is a solid particle, a suspension is formed in which a fraction of the first polymer component begins to deposit around individual particles to begin the formation of primary shells. At this point, another aqueous solution of a second polymer component may be added to the aqueous mixture.
Droplets or particles of the loading substance in the aqueous mixture preferably have an average diameter of less than 100 μm, more preferably less than 50 μm, even more preferably less than 25 μm. Droplets or particles of the loading substance having an average diameter less than 10 μm or less than 5 μm or less than 3 μm or less than 1 μm may be used. Particle size may be measured using any typical equipment known in the art, for example, a Coulter™ LS230 Particle Size Analyzer, Miami, Fla., USA.
The amount of the polymer components of the shell material provided in the aqueous mixture is typically sufficient to form both the primary and outer shells of microcapsules. Preferably, the loading substance is provided in an amount of from about 1% to about 15% by weight of the aqueous mixture, more preferably from about 3% to about 8% by weight, and even more preferably about 6% by weight.
If a complex coacervate is desired, the pH, temperature, concentration, mixing speed or a combination thereof is then adjusted to accelerate the formation of the primary shells of complex coacervate around the droplets or particles of the loading substance to form primary microcapsules. In the case of multicore microcapsules, agglomeration of the primary microcapsules will take place to form discrete clumps at desired size and shape.
pH is an expression of the concentration of hydrogen ions in solution. Such ions affect the ionization equilibria of the component A and B polymers involved in complex coacervation and thus the formation of complex coacervates. The pH is adjusted so that the component A polymer will bear a net positive charge and the component B polymer will bear a net negative charge. Hence, the pH adjustment depends on the type of shell material to be used.
For example, when gelatine type A is a polymer component, the gelatine molecules have nearly equal positive and negative charges (i.e. zero net polarity change) at their point of zero charge (pzc) around pH 9-10. Only when the solution pH is lower than the pzc value, will the polymer bear a net positive charge, which interacts with the negatively charged component B (e.g. gum arabic, polyphosphate, alginate, etc.).
In the case of gelatine type A, the pH is preferably adjusted to a value from 3.5-5.0, more preferably from 4.0-5.0. Much outside this range, the gelatine-based complex tends to form gels upon cooling rather than a shell on the microcapsules. If the pH of the mixture starts in the desired range, then little or no pH adjustment is required.
The molar ratio of components A and B is adjusted to favour formation of shells on the microcapsules rather than merely the formation of gel particles in solution. Suitable molar ratios are discussed above under the heading “Shell Material”.
The concentration of components A and B in the aqueous mixture may also affect the formation of complex coacervates and can be adjusted accordingly. Typically, the total concentration of components A and B varies from 1% to 20%, preferably 2-10%, and more preferably 3-6% by weight of the aqueous mixture. For instance, when gelatine type A is used as component A, the concentration of gelatine type A is preferably from 1-15% by weight of the aqueous mixture, more preferably 2-6% by weight and even more preferably 2-4% by weight. Similarly, when polyphosphate is used as component B, its concentration in the aqueous mixture is preferably 0.01-0.65% by weight of the aqueous mixture, more preferably 0.13-0.17% by weight, even more preferably 0.13-0.26% by weight.
The initial temperature of the aqueous mixture is preferably set to a value of from about 40° C. to about 60° C., more preferably at about 50° C.
Mixing speed influences the deposition of complex coacervates on the surface of microcapsules. If the mixing speed is too low, the aqueous mixture is agitated insufficiently and undesirably large microcapsules may be formed. Conversely, if the mixing speed is too high, high shear forces are generated and prevent shell material from forming on the microcapsules. Instead, gel particles form in the solution. The mixing speed is preferably between 100 and 1500 rpm, more preferably between 400 and 1000 rpm and even more preferably between 600 and 800 rpm. Particular mixing parameters depend on the type of equipment being used. Any of a variety of types of mixing equipment known in the art may be used. Particularly useful is an axial flow impeller, such as Lightnin™ A310 or A510.
At this time, materials for outer shell are added into the mixture, and the aqueous mixture may then be cooled under controlled cooling rate and mixing parameters to permit coating of the primary microcapsules to form outer shells. It is advantageous to control the formation of the outer shell at a temperature above the gel point of the shell material. It is also possible at this stage to further add more polymer components, either of the same kind or a different kind, in order to thicken the outer shell and/or produce microcapsules having different layers of shells to provide desired functionalities. The temperature is preferably lowered at a rate of about 1° C./10 minutes until it reaches a temperature of from about 5° C. to about 10° C., preferably about 5° C. The outer shell encapsulates the primary microcapsules or clumps to form a rigid encapsulated agglomeration of microcapsules.
At this stage, a cross-linker may be added to further increase the rigidity of the microcapsules by cross-linking the shell material in both the outer and primary shells and to make the shells insoluble in both aqueous and non-aqueous (e.g., oil) media. Any suitable cross-linker may be used and the choice of cross-linker depends somewhat on the choice of shell material. Preferred cross-linkers are enzymatic cross-linkers (e.g. transglutaminase), aldehydes (e.g. formaldehyde or gluteraldehyde), tannic acid, alum, organic or inorganic calcium or potassium salt, or a mixture thereof. When the microcapsules are to be used to deliver a biologically active substance to an organism, the cross-linkers are preferably non-toxic or of sufficiently low toxicity. The type and the amount of cross-linker used depend on the type of shell material and may be adjusted to provide more or less structural rigidity as desired. For example, when gelatine type A is used in the shell material, transglutaminase may be conveniently used in an amount of about 0.2% to about 2.0%, preferably about 1.0%, by weight of microcapsule suspension. In general, one skilled in the art may routinely determine the desired amount in any given case by simple experimentation.
At this stage, multi-core microcapsules have been produced. These microcapsules or other microcapsules may then be processed in accordance with the invention to add additional shell layers as described above. Preferably, additional shells are added after the formation of the outer shell of the microcapsule or before the cross-linking step. More particularly, first and second polymer components of shell material are dissolved in aqueous solution e.g. at 40 to 60° C., more preferably around 50° C. pH may be controlled or adjusted at this stage. The microcapsules previously prepared are then combined with this mixture. Alternatively, the microcapsules may be combined with an aqueous solution of the first polymer component of shell material and then a second aqueous solution of the second polymer component of shell material may be added. pH, temperature, concentration, mixing speed or a combination thereof can then be adjusted as described above so that the polymer components of shell material form a complex coacervate surrounding and coating the microcapsules with an additional shell. As discussed above, processing aids may be incorporated as may be hydrophobic materials such as oils, waxes, resins or fats. The new outer shell may be then cross-linked as described above. These additional steps of forming additional shell layers may be repeated as desired to build up a suitable number of further shells on the microcapsule.
th
Finally, the microcapsules may be washed with water and/or dried to provide a free-flowing powder. Drying may be accomplished by a number of methods known in the art, such as freeze drying, drying with ethanol or spray drying. Spray drying is a particularly preferred method for drying the microcapsules. Spray drying techniques are disclosed in “Spray Drying Handbook”, K. Masters, 5edition, Longman Scientific Technical UK, 1991, the disclosure of which is hereby incorporated by reference.
The microcapsules produced by the processes of the present invention may be used to prepare liquids as free-flowing powders or compressed solids, to store a substance, to separate reactive substances, to reduce toxicity of a substance, to protect a substance against oxidation, to deliver a substance to a specified environment and/or to control the rate of release of a substance. In particular, the microcapsules may be used to deliver a biologically active substance to an organism for nutritional or medical purposes. The biologically active substance may be, for example, a nutritional supplement, a flavour, a drug and/or an enzyme. The organism is preferably a mammal, more preferably a human. Microcapsules containing the biologically active substance may be included, for example, in foods or beverages or in drug delivery systems. Use of the microcapsules of the present invention for formulating a nutritional supplement into human food is particularly preferred.
Microcapsules of the present invention have good rupture strength to help reduce or prevent breaking of the microcapsules during incorporation into food or other formulations. Furthermore, the microcapsules' shells can be formulated to be insoluble in both aqueous and non-aqueous (e.g., oil) media, and help reduce or prevent oxidation and/or deterioration of the loading substance during preparation of the microcapsules, during long-term storage, and/or during incorporation of the microcapsules into a formulation vehicle, for example, into foods, beverages, nutraceutical formulations or pharmaceutical formulations.
The invention will now be further illustrated by the following non-limiting examples.
54.5 grams gelatine 275 Bloom type A (isoelectric point of about 9) was mixed with 600 grams of deionized water containing 0.5% sodium ascorbate under agitation at 50° C. until completely dissolved. 5.45 grams of sodium polyphosphate was dissolved in 104 grams of deionized water containing 0.5% sodium ascorbate. 90 grams of a fish oil concentrate containing 30% eicosapentaenoic acid ethyl ester (EPA) and 20% docosahexaenoic acid ethyl ester (DHA) (available from Ocean Nutrition Canada Ltd.) was dispersed with 1.0% of an antioxidant (mixed natural tocopherols) into the gelatine solution with a high speed Polytron™ homogenizer at 5,500 rpm for 6 minutes. An oil-in-water emulsion was formed. The oil droplet size had a narrow distribution with an average size of about 1 μm measured by Coulter™ LS230 Particle Size Analyzer. The emulsion was diluted with 700 grams of deionized water containing 0.5% sodium ascorbate at 50° C. The sodium polyphosphate solution was then added into the emulsion and mixed with a Lightnin™ agitator at 600 rpm. The pH was then adjusted to 4.5 with a 10% aqueous acetic acid solution. During pH adjustment and the cooling step that followed pH adjustment, a coacervate formed from the gelatine and polyphosphate coated onto the oil droplets to form primary microcapsules. Cooling was carried out to above the gel point of the gelatine and polyphosphate and the primary microcapsules started to agglomerate to form lumps under agitation. Upon further cooling of the mixture, polymer remaining in the aqueous phase further coated the lumps of primary microcapsules to form an encapsulated agglomeration of microcapsules having an outer shell and having an average size of 50 μm. Once the temperature had been cooled to 5° C., 2.7 grams of 50% gluteraldehyde was added into the mixture to further strengthen the shell. The mixture was then warmed to room temperature and kept stirring for 12 hours. Finally, the microcapsule suspension was washed with water. The washed suspension was then spray dried to obtain a free-flowing powder. A payload of 62% was obtained.
A Two-Step Process with Gelatine and Polyphosphate in both First and Second Shells, but having Different Compositions
Step A: 15.6 grams gelatine 275 Bloom type A (isoelectric point of about 9) was mixed with 172 grams of deionized water containing 0.5% sodium ascorbate under agitation at 50° C. until completely dissolved. 1.56 grams of sodium polyphosphate was dissolved in 29.7 grams of deionized water containing 0.5% sodium ascorbate. 69 grams of a fish oil concentrate containing 30% eicosapentaenoic acid ethyl ester (EPA) and 20% docosahexaenoic acid ethyl ester (DHA) (available from Ocean Nutrition Canada Ltd.) was dispersed with 1.0% of an antioxidant (mixed natural tocopherols) into the gelatine solution with a high speed Polytron™ homogenizer at 6,100 rpm for 4 minutes. An oil-in-water emulsion was formed. The oil droplet size had a narrow distribution with an average size of about 1 μm measured by Coulter™ LS230 Particle Size Analyzer. The emulsion was diluted with 319 grams of deionized water containing 0.5% sodium ascorbate at 50° C. The sodium polyphosphate solution was then added into the emulsion and mixed with a Lightnin™ agitator at 600 rpm. The pH was then adjusted to 4.5 with a 10% aqueous phosphoric acid solution. During pH adjustment and the cooling step that followed pH adjustment, a coacervate formed from the gelatine and polyphosphate coated onto the oil droplets to form primary microcapsules, and then the primary microcapsules started to agglomerate to form lumps under agitation. A payload of 80% was obtained at this step.
Step B: A gelatine solution was prepared by dissolving 41.8 grams of gelatine 275 Bloom type A (isoelectric point of about 9) in 460 grams of deionized water containing 0.5% sodium ascorbate under agitation at 50° C. until completely dissolved. A sodium polyphosphate solution was prepared by dissolving 4.18 grams of sodium polyphosphate in 79.5 grams of deionized water containing 0.5% sodium ascorbate. The gelatine and polyphosphate solutions were combined to form a mixture, and pH of the mixture was adjusted to 4.7 with 10% aqueous phosphoric acid.
Step C: The mixture from Step B was added to the mixture with lumps formed in step A. Cooling was carried out under agitation to cause the gelatine and polyphosphate to form coacervates and to coat the lumps formed in Step A to form an outer shell. The microcapsules thus formed had an average size of 60 μm. Once the temperature had been cooled to 5° C., 2.1 grams of 50% gluteraldehyde was added into the mixture to further strengthen the shell. The mixture was then warmed to room temperature and stirred continuously for 12 hours. Finally, the microcapsule suspension was washed with water. The washed suspension was then spray dried to obtain a free-flowing powder. A payload of 59% was obtained.
Step A: Same as Step A in Example 2.
Step B: A gelatine solution was prepared by dissolving 23.0 grams of gelatine 275 Bloom type A (isoelectric point of about 9) in 371 grams of deionized water under' agitation at 50° C. until completely dissolved. A sodium alginate (ISP Alginates) solution was prepared by dissolving 3.00 grams of sodium alginate in 503.8 grams of deionized water. The gelatine and sodium alginate solutions were combined to form a mixture. The pH of the mixture was adjusted to 5.00 with 10% aqueous phosphoric acid.
Step C: The mixture from Step B was added to the mixture with lumps formed in step A. Cooling was carried out under agitation to cause gelatine and alginate to form coacervates and coat the lumps formed in Step A to form an outer shell. The microcapsules thus formed had an average size of around 80 μm. Once the temperature had been cooled to 5° C., 2.1 grams of 50% gluteraldehyde was added into the mixture to further strengthen the shell. The mixture was then warmed to room temperature and stirred continuously for 12 hours. Finally, the microcapsule suspension was washed with water. The washed suspension was then spray dried to obtain a free-flowing powder. A payload of 53% was obtained.
Step A: 20.0 grams gelatine 275 Bloom type A (isoelectric point of about 9) was mixed with 220.1 grams of deionized water containing 0.5% sodium ascorbate under agitation at 50° C. until completely dissolved. 2.00 grams of sodium polyphosphate was dissolved in 38.0 grams of deionized water. 88.0 grams of a fish oil concentrate containing 30% eicosapentaenoic acid ethyl ester (EPA) and 20% docosahexaenoic acid ethyl ester (DHA) (available from Ocean Nutrition Canada Ltd.) was dispersed with 1.0% of an antioxidant (mixed natural tocopherols) into the gelatine solution with a high speed Polytron™ homogenizer at 6,100 rpm for 4 minutes. An oil-in-water emulsion was formed. The oil droplet size had a narrow distribution with an average size of about 1 μm measured by Coulter™ LS230 Particle Size Analyzer. The emulsion was diluted with 408.6 grams of deionized water at 50° C. The sodium polyphosphate solution was then added into the emulsion and mixed with a Lightnin™ agitator at 600 rpm. The pH was then adjusted to 4.5 with a 10% aqueous phosphoric acid solution. During pH adjustment and the cooling step that followed pH adjustment, a coacervate formed from the gelatine and polyphosphate coated onto the oil droplets to form primary microcapsules, and then the primary microcapsules started to agglomerate to form lumps under agitation. A payload of 80% was obtained at this step.
Step B: A gelatine solution was prepared by dissolving 8.6 grams of gelatine 275 Bloom type A (isoelectric point of about 9) in 94.5 grams of deionized water under agitation at 65° C. until completely dissolved. 25.8 grams of beeswax melted at 65° C. was emulsified in the gelatine solution with a high speed Polytron™ homogenizer at 6,100 rpm for 4 minutes. A wax-in-water emulsion was formed. An alginate solution was prepared by dissolving 2.3 grams of sodium alginate in 192 grams of deionized water was added to the emulsion, and pH of the mixture was adjusted to 4.7 with 10% aqueous phosphoric acid. The mixture was then added into lump mixtures in step A under agitation at 800 rpm, and cooling was carried out to cause the gelatine-alginate-wax composite material to form a coating onto the lumps formed in Step A to form microcapsules. A payload of 60% was obtained at this step.
Step C: A solution was prepared by dissolving 23.1 grams of gelatine and 2.3 grams of sodium alginate in 384.9 grams of deionized water under agitation at 50° C. until completely dissolved. pH of the mixture was adjusted to 4.5 with 10% aqueous phosphoric acid, and the mixture was then added into microcapsule mixtures formed in step B under agitation at 800 rpm. Cooling was carried out to cause the gelatine-alginate material to form a coating onto the microcapsules that formed in Step B. Once the temperature had been cooled to 5° C., 1.5 grams of transglutaminase was added into the mixture to cross-link the shell. The mixture was then warmed to room temperature and kept stirring for 12 hours. Finally, the microcapsule suspension was spray dried to obtain a free-flowing powder. A final payload of 52% was obtained.
Step A: 13.0 grams of gelatine 275 Bloom type A (isoelectric point of about 9) was mixed with 143.0 grams of deionized water containing 0.5% sodium ascorbate under agitation at 50° C. until completely dissolved. 1.3 grams of sodium polyphosphate was dissolved in 24.7 grams of deionized water. 57.2 grams of fish oil containing 18% eicosapentaenoic acid (EPA) and 12% docosahexaenoic acid (DHA) (available from Ocean Nutrition Canada Ltd.) was dispersed with 1.0% of an antioxidant (mixed natural tocopherols) into the gelatine solution with a high speed Polytron™ homogenizer at 8,000 rpm for 4 minutes. An oil-in-water emulsion was formed. The oil droplet size had a narrow distribution with an average size of about 1 μm measured by Coulter™ LS230 Particle Size Analyzer. The emulsion was diluted with 266.0 grams of deionized water at 50° C. The sodium polyphosphate solution was then added into the emulsion and mixed with a Lightnin™ agitator at 350 rpm. The pH was then adjusted to 4.4 with a 10% aqueous phosphoric acid solution. During pH adjustment and the cooling step that followed pH adjustment, a coacervate formed from the gelatine and polyphosphate coated onto the oil droplets to form primary microcapsules, and then the primary microcapsules started to agglomerate to form lumps under agitation. A payload of 80% was obtained at this step.
Step B: A gelatine solution was prepared by dissolving 7.05 grams of gelatine 275 Bloom type A (isoelectric point of about 9) in 77.9 grams of deionized water under agitation at 70° C. until completely dissolved. 7.05 grams of beeswax melted at 70° C. was emulsified in the gelatine solution with a high speed Polytron™ homogenizer at 8,000 rpm for 4 minutes. A wax-in-water emulsion was formed. An alginate solution (45 ° C.) was prepared by dissolving 7.62 grams of sodium alginate in 630 grams of deionized water was added to the emulsion, and pH of the mixture was adjusted to 5.3 with 10% aqueous phosphoric acid. The mixture was then added into lump mixtures in step A under agitation at 450 rpm followed by adjusting the pH value of the mixture to 4.9, and cooling was carried out to cause the gelatine-alginate-wax composite material to form a coating onto the lumps formed in Step A to form microcapsules. Once the temperature had been lowered to 5° C., 3.8 grams of transglutaminase was added into the mixture to cross-link the shells. The mixture was then warmed up to room temperature and stirred at 600 rpm for 12 hours. Finally, the microcapsule suspension was spray dried to obtain a free-flowing powder. A final payload of 57% was obtained.
FIG. 6
FIG. 10
FIG. 7
FIG. 6
FIG. 9
Images of microcapsules of Examples 1-5 are shown in to , respectively. It can be seen clearly that at approximately the same payload (60%) the microcapsules prepared with a two step process () have much thicker outer shells than those prepared with one step process (). The microcapsules prepared with a three step process having a composite shell containing lipids () clearly show the lipid droplets incorporated in the second shell and near the agglomerated oil core.
Accelerated oxidative stability in dry state was evaluated by placing the prepared microcapsule powders from each of Examples 1-4 in an oxygen bomb (Oxipres™, MIKROLAB AARHUS A/S, Denmark) with an initial oxygen pressure of 5 bar at a constant temperature of 65° C. When the encapsulated fish oil started to oxidize, the oxygen pressure dropped, and an induction period or time was determined. A longer induction period means that the contents of the microcapsules are better protected towards oxidation.
Induction periods are shown in Table 1. The microcapsules made from a two-step process in accordance with the invention have higher induction period (50-56 hours) than those made from a one-step process (41 hours). This translates to 22.0% to 37.6% increase in oxidative stability.
TABLE I
Comparison of the microcapsules described in Examples 1-5.
Induction
Loading
period
Example #
Figure #
Description
(%)
(hr)
1
6
Multicore one-step
62
41
process for
comparison
2
7
Two-step process
59
50
with gelatine and
polyphosphate in
outer shell
3
8
Two-step process
53
55
with alginate in
outer shell
4
9
Three-step process
52
44
incorporating wax
and alginate in
the second shell
and gelatine and
polyphosphate in
the third shell
5
10
Two-step process
57
56
incorporating wax
and alginate in
the shell
All publications cited in this specification are herein incorporated by reference as if each individual publication were specifically and individually indicated to be incorporated by reference. The citation of any publication should not be construed as an admission that such publication is prior art.
Although the foregoing invention has been described in some detail by way of illustration and example for purposes of clarity of understanding, it is readily apparent to those of ordinary skill in the art in light of the teachings of this specification that certain changes or modifications may be made thereto without departing from the spirit or scope of the appended claims.
BRIEF DESCRIPTION OF THE DRAWINGS
FIG. 1
depicts a typical prior art multi-core microcapsule.
FIGS. 2 and 3
depict embodiments of the invention in which multi-core microcapsules are provided having multiple shells.
FIGS. 4 and 5
depict embodiments of the invention in which single-core microcapsules are provided having multiple shells.
FIG. 6
is a photomicrograph of multi-core microcapsules prepared with a one-step process (62% payload), prepared for purposes of comparison.
FIG. 7
is a photomicrograph of multi-core microcapsules prepared with a two-step process in accordance with the invention (59% payload).
FIG. 8
is a photomicrograph of multi-core microcapsules prepared with a two-step process in accordance with the invention in which alginate is incorporated in the outer shell (53% payload).
FIG. 9
is a photomicrograph of multi-core microcapsules prepared with a three-step process in which lipids and alginate are incorporated in an inner shell while gelatine and polyphosphate forms an outer shell.
FIG. 10
is a photomicrograph of multi-core microcapsules prepared with a two-step process in which lipids and alginate are incorporated in the second shell. | |
DAF takes account of the environmental impact of trucks during their disposal. Since 2002, DAF has had a recycling policy based on our overall Environmental Policy and the European Directive on End of Life Vehicles. These policies ensure that opportunities for re-use and recycling are part of our product development process. In addition, when assessing the environmental effects of materials, we take the entire life cycle into account. As a result, more than 90% of all materials in a DAF truck can be re-used once it reaches the end of its operational life.
Sorting guides for plastics
DAF promotes the re-use of materials through innovative designs and by providing correct information. Plastics are increasingly used in commercial designs, but there is growing concern about the impact of plastics on the environment. Because plastic parts can be easily recycled as long as they are clearly identified, all plastic parts used in our trucks have a separate code that indicates the type of plastic they are made of. Our sorting guides inform dealers and customers of the types of plastic used in each vehicle type.
Overhaul of parts
DAF has been recycling components since 1970. At our Eindhoven factory, over 40,000 parts per year are overhauled and supplied for re-use. These parts include starter motors, fuel pumps, gearboxes and even complete engines. These re-used parts are similar in quality to new parts. They are literally as good as new. | https://www.daf.com/en/About-DAF/DAF-and-the-Environment/our-Products-and-the-environment/Disposal |
The sights around us can seem unremarkable when we look at them from the same perspectives every day. Visitors to the Lockhart Gallery’s most recent exhibit “From the Permanent Collection: New Acquisitions Part 1” are afforded the rare opportunity to see ordinary scenes from a different, darker perspective thanks to the infrared photography of Joseph Constantino.
Constantino has donated several of his works to Geneseo’s permanent photography and digital collection, including a 2017 donation of a large-scale photograph that is not featured in the gallery currently.
This photograph, though still infrared, is in color, whereas the photos in the “New Acquisitions” display are all only black and white. These black and white photos were donated during the spring and summer of 2018.
Galley director Cynthia Hawkins explained that the infrared photography technique is a way to take photographs in the dark or in murky conditions, and that the type of photograph produced is moody and grim-looking.
“Infrared is supposed to be the new dimension,” Hawkins said. “It’s about the light. The infrared wavelength is longer than visible light, so you can take pictures in the dark, you can shoot fog and still pull out a really clear image.”
The pictures around the gallery feature landscapes, barns and even people. In the second room of the gallery, one piece called “Impressions of Magnolia Lake,” taken in 1994, stands out.
The picture captures a small corner of the Georgian lake that is reflecting a few overhanging trees, providing the observer the feeling of a crouched space despite the lake’s expansive size. The pixilated black and white image becomes almost haunting due to the incorporation of a layer of fog above the water.
“Infrared allows you to change the color on your photographs, where with normal photos you’d have to play around in photoshop,” Hawkins said. “You can get a lot of light play with infrared photos. I think these photographs have a very surreal sort of feel to them.”
Another equally striking image, “Brooklyn Bridge with Hot Dog Stand,” was taken in 2017 and uses more light than the lake piece, but it still gives off a dark and eerie feel because of an intensity in the black shades that Constantino usually avoids.
The white highlights in the photo pop out to make the familiar New York City bridge look more ancient and decrepit than it really is; the hot dog stand looks tiny and lonely in comparison to the massive structure.
The photos will be moved from the exhibit to Brodie’s art storage room, as Geneseo is fortunate enough to keep the art on-campus. Hawkins noted that several more exhibits are set to follow Constantino’s in the Lockhart Gallery.
“It’s a pretty intense year,” Hawkins said. “There’s going to be one more exhibit in the Lockhart Gallery this semester, and two more exhibits in this gallery in the spring.”
The Lockhart Gallery is open from 1 p.m. to 4 p.m. on Wednesdays and Thursdays, and 1 p.m. to 5 p.m. on Fridays and Saturdays. “New Acquisitions” will be on display until Oct. 13.
In the spring, there will be a second part to the “New Acquisitions” display. Every gallery opening is free to the public and offers an enriching experience for students and adults alike. | https://www.thelamron.com/posts/2018/9/20/exhibit-showcases-unusual-photos-donated-to-geneseo |
1. Renaissance means “rebirth,” implying a revival of classical culture. How did artists of the Renaissance revive classical art and ideals? How did they move beyond the example of Greek and Roman art?
2. What are the differences in the art of Italy and northern Europe during the Renaissance?
3. Why is the human figure so important to Renaissance art? What ideals were expressed through depictions of the human body?
4. How did Renaissance art differ by city, from Florence to Rome and Venice? What are some reasons for these differences?
5. How did the Protestant Reformation and the Catholic Counter-Reformation affect the arts? | https://disertationhelp.com/2023/01/09/art-history/ |
CROSS-REFERENCE TO RELATED APPLICATIONS
BACKGROUND
Field
Background
SUMMARY
BRIEF DESCRIPTION OF THE DRAWINGS
DETAILED DESCRIPTION
15/422,050
This application claims priority to and the benefit of Non-Provisional Application No. filed in the U.S. Patent and Trademark Office on February 1, 2017.
Aspects of the present disclosure relate generally to receivers, and more particularly to clock data recovery in receivers.
A clock and data recovery (CDR) circuit is used in a receiver to recover a clock signal from a data signal. The recovered clock signal is used to sample the data signal to recover data in the data signal. Clock data recovery may be used, for example, to recover data in a data signal (e.g., high-speed serial data signal) that is received at the receiver without an accompanying clock signal.
US 9 036 764 B1
Attention is drawn to providing a clock recovery circuit having a phase-locked loop (PLL) with two-point modulation. A binary phase-error signal controls a variable frequency oscillator's (VFO's) feedback path, while a linear phase-error signal controls the PLL outside of that feedback path. The linear phase-error signal is injected using an ultra-low latency delay path. While the binary phase-error signal sets the lock-point of the PLL, the linear phase-error path dominates at high frequencies and also helps reduce dither jitter. Other optional features include an area-efficient hybrid phase detector that generates both the binary and linear phase-error signals, use of a phase interpolator inside the PLL to further smooth dither jitter, recovered clock update filtering for specific data transitions, and support for multi-PAM signaling.
PAVAN KUMAR HANUMOLU et al, entitled "A Wide-Tracking Range Clock and Data Recovery Circuit", IEEE JOURNAL OF SOLID-STATE CIRCUITS, IEEE SERVICE CENTER, PISCATAWAY, NJ, USA, (20080201), vol. 43, no. 2, doi:10.1109/JSSC.2007.914290, ISSN 0018-9200
Attention is further drawn to a paper by . A hybrid analog-digital quarter-rate clock and data recovery circuit (CDR) that achieves a wide-tracking range and excellent frequency and phase tracking resolution is presented in this paper. A split-tuned analog phase-locked loop (PLL) provides eight equally spaced phases needed for quarter-rate data recovery and the digital CDR loop adjusts the phase of the PLL output clocks in a precise manner to facilitate plesiochronous clocking. The CDR employs a second-order digital loop filter and combines delta-sigma modulation with the analog PLL to achieve sub-picosecond phase resolution and better than 2 ppm frequency resolution. A test chip fabricated in a 0.18 mum CMOS process achieves BER <10 -12 and consumes 14 mW power while operating at 2 Gb/s. The tracking range is greater than plusmn5000 ppm and plusmn2500 ppm at 10 kHz and 20 kHz modulation frequencies, respectively, making this CDR suitable for systems employing spread-spectrum clocking.
The present invention is set forth in the independent claims, respectively. Preferred embodiments of the invention are described in the dependent claims.
The following presents a simplified summary of one or more embodiments in order to provide a basic understanding of such embodiments. This summary is not an extensive overview of all contemplated embodiments, and is intended to neither identify key or critical elements of all embodiments nor delineate the scope of any or all embodiments. Its sole purpose is to present some concepts of one or more embodiments in a simplified form as a prelude to the more detailed description that is presented later.
A first aspect relates to a method for adjusting a phase step size of a clock data recovery (CDR) circuit according to appended claim 1.
A second aspect relates to an apparatus according to appended claim 9.
To the accomplishment of the foregoing and related ends, the one or more embodiments include the features hereinafter fully described and particularly pointed out in the claims. The following description and the annexed drawings set forth in detail certain illustrative aspects of the one or more embodiments. These aspects are indicative, however, of but a few of the various ways in which the principles of various embodiments may be employed.
FIG. 1
shows an example of a clock data recovery (CDR) circuit according to certain aspects of the present disclosure.
FIG. 2A
is a timing diagram showing an example of a data signal and clock signals according to certain aspects of the present disclosure.
FIG. 2B
is a timing diagram showing an example of the data signal and clock signals in which the clock signals are early according to certain aspects of the present disclosure.
FIG. 2C
is a timing diagram showing an example of the data signal and clock signals in which the clock signals are late according to certain aspects of the present disclosure.
FIG. 3
is a table showing logical functions of a phase detector according to certain aspects of the present disclosure.
FIG. 4
shows an example of a phase step adjuster and a phase step controller according to certain aspects of the present disclosure.
FIG. 5
shows an example of a comparison circuit according to certain aspects of the present disclosure.
FIG. 6
shows an example of a sigma-delta modulator according to certain aspects of the present disclosure.
FIG. 7
shows an example of a phase detector according to certain aspects of the present disclosure.
FIG. 8
is a flowchart showing a method for adjusting a phase step size of a clock data recovery (CDR) circuit according to certain aspects of the present disclosure.
The detailed description set forth below, in connection with the appended drawings, is intended as a description of various configurations and is not intended to represent the only configurations in which the concepts described herein may be practiced. The detailed description includes specific details for the purpose of providing a thorough understanding of the various concepts. However, it will be apparent to those skilled in the art that these concepts may be practiced without these specific details. In some instances, well-known structures and components are shown in block diagram form in order to avoid obscuring such concepts.
FIG. 1
shows an example of a clock data recovery (CDR) circuit 110 according to certain aspects of the present disclosure. The CDR circuit 110 includes a sampler 115, a phase detector 125, a loop filter 135, an integrator 164, and a phase interpolator 170. The CDR circuit 110 may be used in a receiver to recover a clock signal from a data signal received by the receiver, and to sample the data signal using the recovered clock signal to recover data (e.g. data bits) from the data signal. The recovered data may be output to another component (not shown) in the receiver for further processing.
The sampler 115 receives the data signal at the receiver (e.g., from a high-speed serial data link or another type of data link). The data signal may undergo preprocessing (e.g., equalization, amplification, filtering, etc.) at the receiver before being input to the sampler 115. The sampler 115 also receives a set of clock signals 172 from the phase interpolator 170. The sampler 115 uses the set of clock signals 172 to sample the data signal to obtain data samples and phase samples, as discussed further below.
FIG. 2A
FIG. 2A
In certain aspects, the set of clock signals 172 includes multiple clock signals that are evenly spaced apart in phase. In this regard, shows an example in which the set of clock signals 172 from the phase interpolator 170 includes four clock signals labeled "Clk_0°", "Clk_90°", "Clk_180°" and "Clk_270°". In this example, the four clock signals are spaced 90 degrees apart and each of the four clock signals has a clock period approximately equal to one data unit interval (UI). The sampler 115 samples the data signal on the rising edges of clock signals Clk_0° and Clk_180° to obtain data samples of the data signal (labeled "idata[ ]" in ). The data samples provide the data bits recovered from the data signal.
FIG. 2A
The sampler 115 also samples the data signal on the rising edges of clock signals "Clk_90°" and "Clk_270°" to obtain phase samples of the data signal (labeled "qdata[ ]" in ). The phase detector 125 uses the phase samples to detect phase errors between the data signal and the clock signals Clk_0°, Clk_90°, Clk_180° and Clk_270°, as discussed further below.
FIG. 2A
FIG. 2B
FIG. 2C
shows an ideal case in which the clock signals Clk_0°, Clk_90°, Clk_180° and Clk_270° are aligned with the data signal. In the ideal case, the rising edges of clock signals Clk_0° and Clk_180° are approximately centered with the data eyes of the data signal, and the rising edges of clock signals Clk_90° and Clk_270° are approximately centered with the transitions of the data signal. shows an example in which the clock signals are early with respect to the data signal and shows an example in which the clock signals are late with respect to the data signal, as discussed further below.
FIG. 3
The sampler 115 outputs the data samples and the phase samples 120 to the phase detector 125. The phase detector 125 is configured to detect phase errors between the data signal and the clock signals using the data samples and the phase samples 120. In one example, the phase detector 125 determines a phase error based on the logic values of two adjacent data samples and the logic value of the phase sample between the two adjacent data samples. In this regard, the table in illustrates logical functions of the phase detector 125 according to one example, in which the two adjacent data samples are labeled idata[n-1] and idata[n] and the phase sample is labeled qdata[n]. In this example, the phase detector 125 needs a data transition to determine a phase error. In other words, the logic values of data samples idata[n-1] and idata[n] need to be different for the phase detector 125 to determine the phase error. Also, in this example, the first data sample idata[n-1] is the data sample immediately preceding the phase sample qdata[n], and the second data sample idata[n] is the data sample immediately following the phase sample qdata[n].
FIG. 2A
FIG. 2B
If the logic value of the first data sample idata[n-1] is the same as the logic value of the phase sample qdata[n] and different from the logic value of the second data sample idata[n], then the phase detector 125 determines that the phases of the clock signals are early relative to the phases of the clock signals in the ideal case shown in . An example of this is shown in , in which the first data sample idata[n-1] and the phase sample qdata[n] correspond to the same value of the data signal, and the phase sample qdata[n] is taken before the data transition between the first and second data samples. In this case, the phase detector 125 may generate a phase error value of negative one indicating that the phases of the clock signals are early.
FIG. 2A
FIG. 2C
If the logic value of the second data sample idata[n] is the same as the logic value of the phase sample qdata[n] and different from the logic value of the first data sample idata[n-1], then the phase detector 125 determines that the phases of the clock signals are late relative to the phases of the clock signals in the ideal case shown in . An example of this is shown in , in which the second data sample idata[n] and the phase sample qdata[n] correspond to the same value of the data signal, and the phase sample qdata[n] is taken after the data transition between the first and second data samples. In this case, the phase detector 125 may generate a phase error value of positive one indicating that the phases of the clock signals are late.
If the logic values of the first and second data samples idata[n] and idata[n-1] are the same, then the phase detector 125 may generate a zero indicating a hold condition. In this case, the phase detector 125 does not have enough information to determine the phase error.
In certain aspects, the phase detector 125 outputs phase error values 130 at an update rate of one output phase error value for every N periods (cycles) of the data signal, where N is an integer. In one example, the phase detector 125 may generate N phase error values for each output phase error value 130, and generate the output phase error value 130 based on a majority vote of the N phase error values. An output phase error value may have a value of one indicating that the clock signals are late, a value of negative one indicating that the clock signals are early, or a value of zero indicating a hold condition.
FIG. 1
The output phase error value 130 of the phase detector 125 is input to the loop filter 135. The loop filter 135 includes a proportional path 140 and an integration path 150, as shown in . The proportional path 140 includes a proportional gain device 142 with a proportional gain of phg. The integration path 150 includes an integration gain device 152 with an integration gain of frg, and an integrator 154. The integration path 150 provides frequency tracking for the CDR circuit 110. The proportional gain phg is greater than the integration gain frg to provide an adequate damping factor for loop stability.
The loop filter 135 also includes a summer 160 that combines the output signal 146 of the proportional path 140 and the output signal 156 of the integration path 150 to produce a combined signal 162. The integrator 164 integrates the combined signal 162 to produce a phase interpolator (PI) code, which is input to the phase interpolator 170.
The phase interpolator 170 adjusts the phases of the clock signals Clk_0°, Clk_90°, Clk_180° and Clk_270° based on the PI code. More particularly, the phase interpolator 170 shifts the phases of the clock signals Clk_0°, Clk_90°, Clk_180° and Clk_270° by the same amount based on the PI code. The phase interpolator 170 uses phase interpolation to generate the clock signals Clk_0°, Clk_90°, Clk_180° and Clk_270° from multiple input clock signals and to adjust the phases of the clock signals Clk_0°, Clk_90°, Clk_180° and Clk_270° based on the PI code.
FIG. 1
FIG. 2A
<msub><mi>K</mi><mi mathvariant="italic">PD</mi></msub><mfenced><mfrac><msub><mi>K</mi><mi mathvariant="italic">PI</mi></msub><mrow><mn>1</mn><mo>−</mo><msup><mi>z</mi><mrow><mo>−</mo><mn>1</mn></mrow></msup></mrow></mfrac></mfenced><mfenced separators=""><mi mathvariant="italic">phg</mi><mo>+</mo><mfrac><mi mathvariant="italic">frg</mi><mrow><mn>1</mn><mo>−</mo><msup><mi>z</mi><mrow><mo>−</mo><mn>1</mn></mrow></msup></mrow></mfrac></mfenced>
PD
K
PI
K
In the example shown in , the CDR circuit 110 implements a second-order digital phase locked loop (PLL) with a loop gain given by: where is the gain of the phase detector 125 and is the gain of the phase interpolator 170. The loop provides negative feedback that adjusts the phases of the clock signals Clk_0°, Clk_90°, Clk_180° and Clk_270° in a direction that decreases the phase error between the data signal and the clock signals Clk_0°, Clk_90°, Clk_180° and Clk_270°. The phase error corresponds to the deviation of the phases of the clock signals from the phases of the clock signals in the ideal case shown in . For the case of clock signals Clk_0° and Clk_180° used to obtain the data samples, the phase error may correspond to deviation of the rising edges of clock signals Clk_0° and Clk_180° from the centers of the data eyes of the data signal. For the case of clock signals Clk_90° and Clk_270° used to obtain the phase samples, the phase error may correspond to deviation of the rising edges of clock signals Clk_90° and Clk_270° from the centers of the transitions of the data signal.
In the example discussed above, the phase detector 125 outputs a phase error value indicating the direction of the phase error (i.e., early or late). However, it is to be appreciated that the present disclosure is not limited to this example, and that the phase detector 125 may output a phase error value that also indicates the magnitude of the phase error.
Various standards for high-speed data signaling (e.g., USB3.1) require that the CDR circuit 110 meet a certain frequency tracking range. The tracking range may be defined as phase step size/phase update period. The phase update period may be given in unit intervals (UI), in which one UI corresponds to one period (cycle) of the data signal. For example, a phase update period of 4 UI indicates that the CDR circuit 110 updates phase every fourth period of the data signal.
The phase step size is also given in unit intervals (UI). For example, a phase step size of 2/64 UI corresponds to a phase step size of 2/64 of a period of the data signal.
For 5Gbs operation, a phase update period of 4 UI and a phase step size of 2/64 UI results in a maximum tracking range of 2/64/4 = 7.8Kppm. This is large enough to meet the USB3.1 specification.
If the frequency of the data signal is increased from 5Gbs to 10Gbs (i.e., the frequency of the data signal is doubled), then the CDR circuit 110 needs to operate at twice the frequency in order to keep the phase update period at 4 UI. In this case, the frequency at which the CDR circuit 110 needs to update the phase increases from 1.25GHz (i.e., 5GHz/4) to 2.5GHz (i.e., 10GHz/4). The increased frequency makes it harder for the CDR circuit 110 to meet timing requirement and increases power consumption.
One approach to address the above problem is to increase the phase update period. This slows down the phase update rate, making it easier for the CDR circuit 110 to meet timing. For example, the phase update period may be increased from 4 UI to 6 UI. However, a problem with this approach is that the tracking range is reduced. In this example, the tracking range is reduced to 2/64/6 = 5.2Kppm, which does not meet the USB3.1 specification. The tracking range may be increased to meet the specification by increasing the phase step size. However, increasing the phase step size increases phase quantization error.
FIG. 4
FIG. 4
FIG. 1
FIG. 4
FIG. 1
shows an example of a CDR circuit 410 according to certain aspects of the present disclosure. In the example in , the CDR circuit 410 includes the components of the CDR circuit 110 shown in . The components common to both CDR circuits 410 and 110 are shown in with the same reference numbers as shown in . For brevity, the descriptions of the common components are not repeated here.
FIG. 4
The CDR circuit 410 also includes a phase step adjuster 412, and a phase step controller 440. The phase step adjuster 412 is configured to adjust the phase step size of the CDR circuit 410 under the control of the phase step controller 440. In the example shown in , the phase step adjuster 412 is placed in the feedback loop of the CDR circuit 410 between the loop filter 135 and the integrator 164. The phase step controller 440 is configured to sense a frequency offset of the CDR circuit 410 from the output 156 of the integration path 150 of the loop filter 135, and to control the phase step adjuster 412 (and hence the phase step size of the CDR circuit 410) based on the sensed frequency offset, as discussed further below.
FIG. 4
FIG. 4
In the example in , the phase step adjuster 412 includes a first phase step path 415, a second phase step path 420, and a multiplexer 430. The multiplexer 430 has a first input (labeled "0") coupled to the first phase step path 415, a second input (labeled "1") coupled to the second phase step path 420, and an output 432 coupled to the integrator 164. The multiplexer 430 also has a select input 434 that receives a control signal from the phase step controller 440. The multiplexer 430 is configured to select one of the phase step paths 415 and 420 at a time based on the control signal from the phase step controller 440, and to couple the selected path to the output 432 of the multiplexer 430. In the example in , the multiplexer 430 selects the first phase step path 415 when the control signal is zero, and selects the second phase step path 420 when the control signal is one.
FIG. 4
In the example in , the second phase step path 420 includes a phase step gain unit 422 with a gain of two. The gain of two doubles the phase step size of the CDR circuit 410 when the second phase step path 420 is selected compared to the phase step size of the CDR circuit 410 when the first phase step path 415 is selected. For example, if the CDR circuit 410 has a phase step size of 2/32 UI when the first phase step path 415 is selected, then the CDR circuit 410 has a phase step size of 2/16 UI when the second phase step path 420 is selected.
The phase step controller 440 includes a comparison circuit 450 and a sigma-delta modulator 460. The comparison circuit 450 has an input 452 coupled to the output 156 of the integration path 150 of the loop filter 135, and an output 454. Because the integration path 150 provides frequency tracking for the CDR circuit 410, the signal level at the output of the integration path 150 represents the frequency offset of the CDR circuit 410. The sigma-delta modulator 460 has an input 462 coupled to the output 454 of the comparison circuit 450 and an output 464 coupled to the select input 434 of the multiplexer 430. The sigma-delta modulator 460 performs sigma-delta modulation on the output signal 454 of the comparison circuit 450 to generate the control signal 464 (e.g., output bit stream) that is input to the select input 434 of the multiplexer 430, as discussed further below.
In operation, the comparison circuit 450 compares the frequency offset from the output 156 of the integration path 150 with a threshold. The comparison circuit 450 outputs a value of G to the sigma-delta modulator 460 if the frequency offset is above the threshold and outputs a value of 0 to the sigma-delta modulator 460 if the frequency offset is equal to or below the threshold, where G is a multi-bit value. As discussed above, the frequency offset may be given by the signal level at the output 156 of the integration path 150.
FIG. 1
Thus, when the frequency offset is equal to or below the threshold, the comparison circuit 450 outputs a value of 0 to the sigma-delta modulator 460. In certain aspects, the sigma-delta modulator 460 outputs a bit steam of zeros, which is input to the select input 434 of the multiplexer 430. This causes the multiplexer 430 to select the first phase step path 415. Therefore, when the frequency offset is equal to or below the threshold, the phase step size of the CDR circuit 410 is the same as the CDR circuit 110 in . The value of the threshold may be set such that the phase step size provided by the first phase step path 415 provides a sufficient frequency tracking range for the CDR circuit 410 when the frequency offset of the CDR circuit 410 is equal to or below the threshold.
When the frequency offset is above the threshold, the comparison circuit 450 outputs a value of G to the sigma-delta modulator 460. In certain aspects, the sigma-delta modulator 460 performs sigma-delta modulation on the input value of G to convert the value of G into an output bit steam of ones and zeros, which is input to the select input 434 of the multiplexer 430. This causes the multiplexer 430 to dynamically switch between the first phase step path 415 and the second phase step path 420.
The density of ones in the output bit stream of the sigma-delta modulator 460 depends on the value of G, in which the density of ones is the proportion of ones in the output bit stream relative to the proportion of zeros in the output bit stream. The larger the value of G, the greater the density of ones in the output bit stream, and therefore, the greater the percentage of the time that the multiplexer 430 selects the second phase step path 420. The smaller the value of G, the lower the density of ones in the output bit stream, and therefore, the smaller the percentage of the time that the multiplexer 430 selects the second phase step path 420.
In certain aspects, the ones and zeros in the output bit stream are non-uniform. In other words, the ones and zeros are not uniformly distributed in the output bit stream. For example, if the output bit stream has equal numbers of ones and zeros, then the output bit stream does not include a one for every other bit or a zero for every other bit (i.e., two or more consecutive bits may be all ones or all zeros).
The time-average phase step size of the CDR circuit 410 during dynamic switching depends on the percentage of the time that the multiplexer 430 selects the second phase step path 420, which, in turn, depends on the density of ones in the output bit stream of the sigma-delta modulator 460. The higher the density of ones in the output bit stream, the greater the percentage of the time that the multiplexer 430 selects the second phase step path 420, and therefore, the larger the time-average phase step size of the CDR circuit 410. Because the density of ones in the output bit stream depends on the value of G output by the comparison circuit 450, the time-average phase step size of the CDR circuit 410 also depends on the value of G. The larger the value of G, the larger the time-average phase step size of the CDR circuit 410. Thus, the value of G may be used to control the time-average phase step size of the CDR circuit 410 during dynamic switching.
FIG. 4
The time-average phase step size is between the phase step size provided by the first phase step path 415 and the phase step size provided by the second phase step path 420. Therefore, for the example shown in in which the second phase step path 420 has a phase step gain of two, the time-average phase step size is M times the phase step size provided by the first phase step path 415, where M is a number between one and two. As the value of G is increased, the time-average phase step size of the CDR circuit 410 approaches two times the phase step size provided by the first phase step path 415 since the second phase step path 420 is selected more often.
The time-average phase step size of the CDR circuit 410 discussed above may be the time-average of the phase step size of the CDR circuit 410 over a period of time equal to one phase error update period or multiple phase error update periods. In this example, one phase error update period is the period of time between updates of the output phase error values output by the phase detector 125.
FIG. 4
Thus, when the frequency offset exceeds the threshold, the sigma-delta modulator 460 dynamically switches the phase step adjuster 412 between the first phase step path 415 and the second phase step path 420. In other words, the sigma-delta modulator 460 dynamically switches the phase step adjuster 412 between a first phase step size and a second phase step size, in which the first phase step size is the phase step size provided by the first phase step path 415 and the second phase step size is the phase step size provided by the second phase step path 420. In the example shown in , the second phase step size is twice the first phase step size. The switching generates a time-average phase step size that is between the first phase step size and the second phase step size, in which the time-average phase step size depends on the value of G output by the comparison circuit 450.
The time-average phase step size is larger than the first phase step size (assuming the second phase step path 420 is selected at least some of the time), and therefore increases the frequency tracking range of the CDR circuit 410. The larger the time-average phase step size, the larger the increase in the frequency tracking range. Thus, when the frequency offset of the CDR circuit 410 exceeds the threshold, the phase step adjuster 412 and phase step controller 440 increase the frequency tracking range of the CDR circuit 410.
The increase in the frequency tracking range of the CDR circuit 410 when the frequency offset exceeds the threshold depends on the time-average phase step size, which, in turn, depends on the value of G. In this regard, the value of G may be set such that the increased frequency tracking range of CDR circuit 410 meets (satisfies) a frequency tracking range specified by a standard (e.g., USB3.1 specification). For example, if a phase step size that is 1.5 times the first phase step size achieves a frequency tracking range specified by the standard, then the value of G may be set to a value that results in a time-average phase step size of approximately 1.5 times the first phase step size.
In certain aspects, the sigma-delta modulator 460 pushes (shapes) quantization noise to frequencies that are higher than the bandwidth of the CDR loop. As a result, the quantization noise pushed out to the higher frequencies is filtered out by the CDR loop, thereby reducing quantization noise. Thus, the sigma-delta modulator 460 allows the phase step size to be increased for increased tracking range when the frequency offset exceeds the threshold while reducing the quantization noise.
Although embodiments of the present disclosure are discussed above using the example of a phase step gain of two for the second phase step path 420, it is to be understood that embodiments of the present disclosure are not limited to this example. Accordingly, it is to be understood that the phase step gain unit 422 in the second phase step path 420 may have a phase step gain other than two (e.g., a phase step gain of four).
Although sigma-delta modulation is used to convert the output signal 454 of the comparison circuit 450 into the control signal 464 for the multiplexer 430 in the above examples, it is to be appreciated that the present disclosure is not limited to sigma-delta modulation. Accordingly, it is to be understood that the phase step controller 440 may include another type of modulator to convert the output signal 454 of the comparison circuit 450 into the control signal 464 for the multiplexer 430. This modulator may employ a modulation scheme that pushes quantization noise to frequencies that are higher than the bandwidth of the CDR loop to reduce quantization noise.
FIG. 5
FIG. 5
shows an exemplary implementation of the comparison circuit 450 according to certain aspects of the present disclosure. In this example, the comparison circuit 450 includes a comparator 510 and a gain unit 530. The comparator 510 has a first input (labeled "A") that receives the frequency offset from the integration path 150 of the loop filter 135 (not shown in ), a second input (labeled "B") that receives the threshold, and an output (labeled "Q"). The threshold may be a multi-bit value stored in a register 520 coupled to the second input of the comparator 510. The gain unit 530 has an input 532 coupled to the output of the comparator 510, and an output 534 coupled to the output 454 of the comparison circuit 450. The gain unit 530 is configured to apply a gain of G to the output of the comparator 510.
In operation, the comparator 510 is configured to compare the frequency offset at the first input of the comparator with the threshold at the second input of the comparator. If the frequency offset is equal to or less than the threshold, then the comparator 510 outputs zero to the gain unit 530 (i.e., Q = 0). In this case, the gain unit 530 outputs a value of 0 to the output 454 of the comparison circuit 450 and the multiplexer 430 selects the first path 415. If the frequency offset is above the threshold, then the comparator 510 outputs a positive one to the gain unit 530 (i.e., Q = 1). In this case, the gain unit 530 outputs a value of G to the output 454 of the comparison circuit 450. The value G is converted to a sequence of zeros and ones by the sigma-delta modulator 460. The multiplexer 430 is dynamically controlled by the sequence at the output 464 of the sigma-delta modulator 460.
FIG. 6
shows an exemplary implementation of the sigma-delta modulator 460 according to certain aspects of the present disclosure. In this example, the sigma-delta modulator 460 includes a subtractor 610, an integrator 620, a comparator 650, and a digital-to-digital converter (DDC) 660.
In operation, the DDC 660 receives the output signal 464 (e.g., output bit stream) of the sigma-delta modulator 460, and performs digital-to-digital conversion on the output signal 464 to convert values (e.g., bit values) of the output signal 464 into respective feedback values that are fed back to the subtractor 610. Each feedback value may have one of two values depending on the respective value of the output signal (e.g., one or zero). Each feedback value may be a single-bit or a multi-bit value. The subtractor 610 subtracts each feedback value from the input signal 452 of the sigma-delta modulator 460 to obtain a difference value.
FIG. 6
The integrator 620 integrates difference values from the subtractor 610, and outputs the resulting integration values to the comparator 650. In the example in , the integrator 620 includes a summer 630 and a flip-flop 640. The flip-flop 640 has a data input (labeled "D"), an output (labeled "Q"), and a clock input 642 coupled to a sigma-delta clock signal. The flip-flop 640 is configured to latch the value at the data input of the flip-flop 640 on each rising edge of the sigma-delta clock signal, and to output the latched value at the output of the flip-flop 640. The summer 630 is configured to sum the output of the flip-flop 640 with the output of the subtractor 610, and to output the resulting sum to the data input of the flip-flop 640. This configuration causes the summer 630 and the flip-flop 640 to accumulate the difference values from the subtractor 610 at the frequency of the sigma-delta clock signal. As a result, the integrator 620 updates the integration value to the comparator 650 at a rate of one integration value per period (cycle) of the sigma-delta clock signal.
The comparator 650 compares each integration value from the integrator 620 with a sigma-delta threshold (not to be confused with the threshold of the comparison circuit 450). If the integration value is below the sigma-delta threshold, then the comparator 650 outputs a zero to the output 464 of the sigma-delta modulator 460. If the integration value is equal to or above the sigma-delta threshold, then the comparator 650 outputs a one to the output 464 of the sigma-delta modulator 460. The sigma-delta threshold may be a single-bit value or a multi-bit value. Since the integration value from the integrator 620 is updated at a rate of one integration value per period (cycle) of the sigma-delta clock signal, the output of the comparator 650 (and hence the output of the sigma-delta modulator 460) is updated at a rate of one output value per period (cycle) of the sigma-delta clock signal.
FIG. 6
As discussed above, the density of ones in the output bit stream of the sigma-delta modulator 460 during dynamic switching of the phase step adjuster 412 depends on the value of G output by the comparison circuit 450. In the example shown in , the density of ones in the output bit stream of the sigma-delta modulator 460 during dynamic switching of the phase step adjuster 412 also depends on the sigma-delta threshold used by the comparator 650. More particularly, the density of ones in the output bit stream depends on the ratio of the value of G over the value of the sigma-delta threshold. The larger the ratio, the greater the density of ones in the output bit stream, and, the lower the ratio, the smaller the density of ones in the output bit stream. Thus, in this example, the time-average phase step size of the CDR circuit 410 during dynamic switching of the phase step adjuster 412 may be set to a desired value by setting the ratio of the value of G over the value of the sigma-delta threshold accordingly.
FIG. 6
shows an example in which the sigma-delta modulator 460 is implemented with a single-order sigma-delta modulator. However, it is to be understood that the sigma-delta modulator 460 is not limited to this example, and may be implemented with a higher-order sigma-delta modulator that includes two or more integrators.
FIG. 7
FIG. 7
shows an exemplary implementation of the phase detector 125 according to certain aspects of the present disclosure. In this example, the phase detector 125 includes a bank of phase detectors 710, and a majority vote circuit 720. Each of the phase detectors 710 may be a bang-bang phase detector (labeled "!!Phase Detector" in ) or another type of phase detector.
FIG. 3
In operation, the phase detectors 710 receive data samples and phase samples from the sampler 115, and output multiple phase error values to the majority vote circuit 720. For example, for each update period of the output phase error value 130, the phase detectors 710 may generate N phase error values in parallel, and output the N phase error values to the majority vote circuit 720. The majority vote circuit 720 may then perform majority voting on the N phase error values to generate the output phase error value 130. In this example, the N phase error values may be based on N consecutive phase samples, in which each of the phase detectors 710 generates a respective one of the N phase errors using a respective one of the N consecutive phase samples. Each of the phase detectors 710 may generate the respective phase error value using the respective phase sample, the data sample immediately preceding the respective phase sample, and the data sample immediately following the respective phase sample (e.g., according to the Table shown in ).
FIG. 8
is a flowchart illustrating a method 800 for adjusting a phase step size of a clock data recovery (CDR) circuit according to certain aspects of the present disclosure. The method 800 may be performed by the phase step adjuster 412 and the phase step controller 440.
At step 810, a frequency offset of the CDR circuit is sensed. For example, sensing the frequency offset may include sensing a signal level on an integration path (e.g., integration path 150) of a loop filter (e.g., loop filter 135) of the CDR circuit.
At step 820, the phase step size of the CDR circuit is adjusted based on the sensed frequency offset. For example, adjusting the phase step size may include switching the CDR circuit between a first phase step size and a second phase step size based on the sensed frequency offset using a modulator (e.g., sigma-delta modulator 460).
In certain aspects, adjusting the phase step size at step 820 may include comparing the sensed frequency offset with a threshold, generating an input signal (e.g., signal 454) based on the comparison, modulating the input signal with the modulator to generate a control signal (e.g., signal 464), and switching the CDR circuit between the first phase step size and the second phase step size based on the control signal. For example, the input signal may have a first input value (e.g., G) if the sensed frequency offset is greater than the threshold, and a second input value (e.g., 0) if the sensed frequency offset is less than the threshold. The modulation may include sigma-delta modulation or another type of modulation.
Within the present disclosure, the word "exemplary" is used to mean "serving as an example, instance, or illustration." Any implementation or aspect described herein as "exemplary" is not necessarily to be construed as preferred or advantageous over other aspects of the disclosure. Likewise, the term "aspects" does not require that all aspects of the disclosure include the discussed feature, advantage or mode of operation. The term "coupled" is used herein to refer to the direct or indirect coupling between two components. The term "circuit" is used broadly, and intended to cover hardware implementations of electrical devices and conductors that, when connected and configured, enable the performance of the functions described in the present disclosure. The term "circuit" is also intended to cover software implementations, in which a processor performs the functions described herein by executing software comprising code for performing the functions. The software may be stored on a computer-readable storage medium, such as a RAM, a ROM, an EEPROM, an optical disk, and/or a magnetic disk.
It is to be understood that present disclosure is not limited to the specific order or hierarchy of steps in the methods disclosed herein. Based upon design preferences, it is understood that the specific order or hierarchy of steps in the methods may be rearranged. The accompanying method claims present elements of the various steps in a sample order, and are not meant to be limited to the specific order or hierarchy presented unless specifically recited therein.
The previous description of the disclosure is provided to enable any person skilled in the art to make or use the disclosure. Various modifications to the disclosure will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other variations without departing from the scope of the disclosure. Thus, the disclosure is not intended to be limited to the examples described herein but is to be accorded the widest scope consistent with the principles and novel features disclosed in the appended claims. | |
Unknown after Ian Hamilton, Portrait of Mrs Ellen Agnes Neame, date unknown. Collection of the Sarjeant Gallery Te Whare o Rehua Whanganui. Gift of Ellen Agnes Neame, 1942.
As part of the redevelopment of the Sarjeant Gallery, each and every item in the collection is currently being inventoried and packed in preparation for its journey to Taupō Quay. Among the many interesting works that I have encountered in the past three months are two small watercolours – one depicting a street in the Italian town of San Remo, and the other a still life with white daisies in a cloisonné enamel vase. What caught my attention in both of these cases was the name of the artist, Ellen Agnes Neame. As the wife of our founding patron Henry Sarjeant, Ellen’s name is often mentioned in accounts of the Gallery’s history but I was surprised to discover she was a painter in her own right. My curiosity piqued, I wanted to know more. Who was Ellen Neame and what do we know about her as an artist?
Ellen Agnes Neame, The Cloisonné Jar, date unknown. Collection of the Sarjeant Gallery Te Whare o Rehua Whanganui.
Born in Foxton in 1868, Ellen was the eldest daughter of John Tiffin Stewart, a prominent civil engineer, and his wife Frances Ann. In 1889, the family moved from Foxton to a 17-acre property at Aramoho in Whanganui. Three years later, at the age of 22, Ellen married Henry Sarjeant at Christ Church. After completing a two year tour of England and the Continent, the couple subsequently moved from Henry’s estate at Fordell to a residence on Bell Street. From this central location, Ellen became involved in a number of public activities, serving for a time as president of the local Plunket Society and, after 1901, on the committee of the newly established Wanganui Arts and Crafts Society.
In February 1912 Henry passed away. In his will he bequeathed property valued at £30,000 in trust to the Wanganui Borough Council for the purpose of building and maintaining an art gallery. Taking an active role in seeing his vision fulfilled, Ellen took her place on the governing committee that oversaw the design and construction of the gallery building and, following its completion in 1919, acted as an advisor regarding the display of the fledgling collection in the galleries.
Ellen Agnes Neame, A Street in San Remo, date unknown (post 1913). Collection of the Sarjeant Gallery Te Whare o Rehua Whanganui. Gift of Lenore Stewart.
Alongside her second husband, John Armstrong Neame whom she married in April 1913, Ellen also played a key role in acquiring artworks to fill these spaces. In addition to advising the committee on potential acquisitions, the couple made two trips to Europe between 1914 and 1921, sourcing works from artists and collectors in England, France, Italy, and Sicily.
In contrast to Ellen’s role as a patron of the arts, relatively little is known about the work that she produced as an artist. An early influence may have been her father John who, in addition to being a skilled draughtsman, produced sketches in watercolours of many of the places that he visited on his travels.
The earliest known reference to her own work dates to 1903, when some of her sketches were shown as part of the third annual exhibition of the Wanganui Society of Arts and Crafts. In December 1935 her work was showcased at Walker’s Galleries in New Bond Street, London. A contemporary press report records that this show included landscapes in watercolours that she and John had made whilst travelling in Europe and a collection of small flower paintings, among which were depictions of wild blooms from New Zealand, Australia and Italy. It is eloquent that both of these genres are represented in the Sarjeant collection today. | http://www.sarjeant.org.nz/gallery/ellen-neame/ |
The recent visitors block is disabled and is not being shown to other users.
-
Print layout on different size paper
PPRGLLC posted a topic in General Q & AI usually print layouts on 24"x 36" paper so that is what my layout template is set up to do. A client wants to print on 11"x 17". When I change the size of the drawing sheet, it changes the paper size without adjusting the title boxes, notes, etc. Is there a way to resize the entire layout without creating a new layout template for 11" x 17" paper?
-
PPRGLLC started following Square footage calculator
-
Square footage calculator
PPRGLLC posted a topic in General Q & AIs there a way to change how square footage is calculated? Our appraisers calculate square footage based on exterior dimensions, so the living area square footage that shows below each plan is significantly less than the total square footage. I know I can change rooms such as garage, open below, etc. to be included rather than excluded from the living area calculation. However, even including all rooms, the living area will still be less because of wall space. I am using Chief Architect Premier X11 on a PC computer.
-
Stair Riser/Trim Material
PPRGLLC posted a topic in General Q & AI'm trying to change the material for the trim alongside my stairs independent of the riser material. I want the trim to match the baseboards in the rest of the house and the riser to match the tread. Is it possible to separate the trim and the riser material in the stair definition dialog? | https://chieftalk.chiefarchitect.com/profile/26929-pprgllc/ |
When the temperatures fall, bugs and wildlife navigate to warmer areas, such as Florida. Here are some common winter pests in to be on the lookout for in your home:
- Cockroaches. More cockroaches invade homes during the winter due to the increase in holiday events. Because of the many parties thrown in homes, more food is present. This is an attractive reason for the cockroach to move in to new territory. A second reason is that Florida does not get very cold during the Winter. Since the cockroach is cold-blooded, it seeks out warm weather, thus migrating to Florida homes. Not only are cockroaches an annoying creature that multiply very quickly, they carry harmful bacteria and diseases.
- Rodents. Like the cockroach, rodents migrate to warmer weather in the Winter. These animals do not hibernate and can get inside walls to damage the drywall and possibly start electrical fires.
- Silverfish. A wingless silvery-blue insect, Winter is when this pest is commonly seen. They enjoy being near moisture, so be sure to keep your home dry. Though they are not harmful, they can do damage to documents and other important papers.
If you see any of these pests in your home this winter, contact us! As part of our homewatch services, we protect your home from bugs and other creatures. | http://www.argoshomewatch.com/2016/02/common-winter-pests-in-florida/ |
Getting South Africans vaccinated against Covid is frustrating work. But it’s vital, life-saving work.
In the midst of so much uncertainty, the terrain is complex enough as it is. But the detection last week of Omicron — a new, potentially more infectious variant — signals yet another obstacle in the fight to get the pandemic under control, particularly given the lack of knowledge about its form and impact.
And so, as SA prepares for another rapid rise in new Covid cases — particularly among young, unvaccinated people — the need for effective and credible communication about the public health consequences of low vaccine uptake has never been greater.
Sadly, in SA, the initial fizz about vaccination has started to fade. Even though almost 14-million South Africans were fully vaccinated by the end of November 2021, this accounts for only 23.5% of the population.
Of course, vaccine hesitancy is not unique to SA. A survey across 15 countries by the Africa Centre for Disease Control, for example, found that vaccine hesitancy ranged from 4% to 38%, severely hampering the successful rollout of vaccines. Namibia, Zimbabwe, Mozambique and Malawi have, like SA, asked vaccine manufacturers to hold off on sending more vaccines because they can’t use the supplies they have, largely due to hesitancy.
In India, vaccine hesitancy sits at about 50% of the population, according to the International Growth Centre, and at 48% in Russia, according to a recent survey by Morning Consult.
But that’s no reason for comfort in SA, particularly as we are entering the “festive season” — characterised by interprovincial travel, large and frequent gatherings, and an accompanying festive and communal spirit — while we are still miles short of the target of 70% vaccination.
This should fill us all with anxiety and concern.
It’s worth remembering where we were a year ago. Infection rates skyrocketed in December 2020, going from 2,295 daily infections reported on December 1 2020, to 8,725 by December 18 and a then record-breaking 11,500 infections on December 26.
Because a rise in death statistics generally lags behind increases in infections, the deadly impact of the December 2020 festive season was only really felt in January 2021: by January 15, for example, deaths reported had almost trebled — from 210 a day to 615.
This must be a cautionary tale as we contemplate warnings of a fourth wave, because even though daily cases and deaths may still be relatively low today, precaution fatigue is setting in. And this December could completely undo the gains that have been made in vaccine access and justice as vaccination, the most powerful tool to control the impact of Covid, is hampered by vaccine hesitancy, fear and misinformation.
The government seems to be doing what it can, where it can. But the response has been disappointing, and perhaps indicates a more serious problem. Some of the interventions — the Vooma Vaccine Weekend once a month, for example, with high-profile involvement from governing party politicians — resulted in a slight, short-term uptake in vaccinations. But there has been nothing like the vaccination increase we need.
Recently, the government has tried initiatives such as the Vaccine Champs project (where vaccinated people are encouraged to sign up and “tell their friends”) and “incentives” such as a R200 shopping voucher, entry in a R2m national lottery or a free Uber ride. The response to these, too, has been underwhelming.
It seems a rethink is needed. But what is to be done?
Covid Comms, a social enterprise formed to help the national effort to communicate about the coronavirus, has gone for a more ground-up approach. We’ve developed a “Community Vaccination Conversations toolkit”, for example, which is used by authentic community leaders in workshops with small groups of young unvaccinated people. Here, we get to grips with the problem of vaccine hesitancy and try to pierce through it by providing facts and figures in mother tongue, using plain language, in the form of conversations rather than lectures.
We developed this tool and community-based methodology because we believe that at the heart of vaccine hesitancy is mistrust of the available information. Social listening tools have confirmed that many people feel Covid vaccinations are shrouded in secrecy and that people with questions are silenced.
In addition, health-care workers are overwhelmed and often too busy to be the trusted ambassadors for vaccination. Government officials, while well-meaning, are not only facing trust deficits with communities but are often not well placed to engage in authentic dialogue that responds to people’s concerns.
Community members, family and friends who are vaccinated thus become the ideal trusted sources with the time and interest to help minimise the fears of those they love and live with. But they do not always have the answers to the questions people ask.
Our Community Vaccination Toolkit empowers those people with researched, plain language information, in all 11 South African languages, that can help them have an informed conversation at home, with friends or with community members.
The results from these sessions, run in partnership with Youth Lab, have been encouraging.
More than 50 Covid-compliant workshops have been held across SA so far, using a grant from the Solidarity Fund, and the turnout has been impressive. By the end of this project, we will have held more than 100 workshops and reached more than 4,000 young people who are able to influence their peers as they move on to become ambassadors for the vaccine within their own communities. And, as communication is Covid Comms’s core function, we’re converting the testimony from these workshops into a series of “vaccine diaries”, which are shared on a multitude of WhatsApp groups and social media platforms and, hopefully, on mainstream media platforms.
The response has been overwhelming, both from people wanting to act as facilitators and from people wanting to attend. There is an appetite for knowledge, we have found, when it is presented face-to-face and in a usable format, by young people who are seen as genuine influencers rather than people who blow R20,000 a night at Konka nightclub.
What these workshops are also reinforcing is the fact that the trust deficit between politicians and their constituencies is increasing rather than decreasing.
It's a toxic mess: a government that needs to convince society it has a credible message, and a society that increasingly seems to doubt its government’s credibility
Local government elections haven’t helped close the trust deficit. The poor voter turnout, the self-interested horse-trading that has ensued, has only increased the distance between young people and their political representatives. Young people who already feel the government has turned its back on them — consigning them to lifelong unemployment, grant dependency, and a profound loss of dignity — have found little in the government’s recent conduct to make them believe. Add to this the lack of visible leadership, or doublespeak on key societal issues affecting the marginalised (such as universal basic income grants), the countless personal protective equipment scandals, the Digital Vibes saga and the lack of accountability for all those involved in profiteering from the pandemic, and you have a toxic mess: a government that needs to be able to convince society that it has a credible message, and a society that increasingly seems to doubt its government’s credibility.
So, to repeat the question: what is to be done?
Civil society, labour, faith-based leaders, worker organisations and cultural organisations may not have the budget that the government has. But they have constituencies, and they have credibility in those constituencies. Maybe it’s time to flip the dial and focus more on engagement. This means ensuring that those who have constituencies — and the credibility to engage with them — have the resources to reach, engage, empower and convince.
This probably means recognising that gimmicks and “bribes” are not having the desired effect. It also means acknowledging the fruitlessness of beautiful yet toothless advertising campaigns that are unconnected to grassroots campaigns. And confronting the reality that politicians swanning about communities in high heels or pointy shoes once a month is unlikely to increase vaccination rates on the scale required.
We need to get real. We need direct engagement with people who do not want to get vaccinated, for whatever reason. We need to hear them, counter their arguments, and persuade them to get vaccinated. And quickly.
• Vick and Dooms are members of Covid Comms, a nonprofit organisation doing public health education about Covid. Details are at covidcomms.org.za
Would you like to comment on this article or view other readers' comments? Register (it’s quick and free) or sign in now.
Please read our Comment Policy before commenting. | https://www.timeslive.co.za/sunday-times/opinion-and-analysis/opinion/2021-12-05-this-is-how-we-are-trying-to-reverse-vaccine-hesitancy/ |
Social Sharing
The Ontario government directed all children's aid societies to stop issuing birth alerts by October 15
Dawn Lavell Harvard, president of the Ontario Native Women's Association, said the Ontario government's directive to end the practice of birth alerts is an important step forward. (CBC News)
The provincial directive to end the "discriminatory practice" of birth alerts is a big step forward to keeping Indigenous and racialized families together, according to advocates in Ontario.
The directive, issued on July 14 by Ontario Associate Minister of Children and Women's Issues Jill Dunlop, ordered children's aid societies to stop issuing birth alerts by mid-October.
"For our community ... for Indigenous women across the province of Ontario ... this is a real sign of recognition of our rights as mothers, our rights as women but also, more importantly, this is going to improve the outcomes for Indigenous children and Indigenous babies across the province," said Dawn Lavell Harvard, president of the Ontario Native Women's Association (ONWA).
She added, "I'm absolutely over-the-moon happy with the current government for taking this all-important step to recognize the autonomy of Indigenous mothers, to recognize their right to mother their own children – something that was taken away with residential schools, were taken away with the Sixties Scoop and has been taken away generation after generation by racist governments."
The practice of birth alerts – where a children's aid society notifies hospitals when they believe a newborn may be in need of protection – has long been reported to disproportionately affect Indigenous families in Ontario.
Its elimination was also a recommendation made by the National Inquiry into Missing and Murdered Indigenous Women and Girls.
Lavell Harvard said the systemic discrimination seen in the practice of birth alerts is reflected more broadly in the child welfare system.
"We know that there are currently more children in the care of the child welfare system than were in the residential schools at the height of the residential school system. And this is a result of poverty, is a result of racism, discrimination and systemic racism within the child welfare system ... where Indigenous mothers and Indigenous families are unfairly targeted."
Child welfare agencies in NWO welcome the decision
"We recognize that in most cases, birth alerts do not support our gaol of protecting children while supporting families to stay together. Every new mother and father need to be treated with respect, not negatively impacted because of an alert that might result in judgement with discriminatory measures," said Thelma Morris, executive director of Tikinagan Child & Family Services, a "community-based" child welfare agency that serves more than 30 First Nations in northern Ontario.
The executive director for the Children's Aid Society of Thunder Bay, Brad Bain, said he sees the directive as a "positive step" made by the provincial government.
Thelma Morris, executive director of Tikinagan Child and Family Services, said in a statement, 'At Tikinagan, we need to respect and honour the traditions and customs of First Nations that are already in place by following the First Nations’ lead when welcoming new children into their families and communities.' (Tikinagan)
Bain acknowledged "the role that the Thunder Bay agency has played certainly, as well as our sector, in contributing to systemic racism and oppression."
He estimated that in recent years, the agency has issued five birth alerts per year, although noted that no birth alerts have been issued in 2020.
"As an organization, we are committed to the elimination of systemic racism and have an internal, anti-oppressive practices committee and we work in concert with our local stakeholders to inform our practices and our policies," Bain added.
More support needed to keep families together
Lavell Harvard said there is a lot more work to be done to keep families together.
"Indigenous-run child welfare organizations are discriminated against in terms ... they're expected to do more to hold families together with significantly less resources and then they are blamed when they have poor outcomes."
She added more "upstream" investment is needed to ensure Indigenous families are supported.
"If one wants to talk bottom line in terms of investments ... we need to be investing in that prevention, investing in providing Indigenous moms and their families with the tools they need to survive and provide for our families." | |
Introduction {#s1}
============
Depression is a common disorder affecting an estimated 350 million people worldwide. Long-lasting depression with moderate or severe intensity is a serious medical condition that can lead to suicide. An estimated 1 million deaths each year are related to suicide. Although treatments for depression are effective, fewer than half of all individuals with depression around the world (in some countries, fewer than 10%) take anti-depressants (WHO, [@B78]). Barriers to effective care include a lack of resources, a lack of trained health care providers, and social stigma associated with mental disorders (WHO EMRO, [@B79]). Inaccurate assessment and incorrect diagnosis of depression in its early stages can also prevent the effective care of individuals with depression. It is commonly believed that depression is a result of the complex interaction of social, psychological, and biological factors. Numerous studies have reported the involvement of abnormal gene expression or single nucleotide polymorphisms (SNPs) of genes in the development of depression (Bufalino et al., [@B10]).
Depression is also the leading cause of disability in young people worldwide. An estimated nine percent of children and adolescents in the US are affected by depression (Dunn et al., [@B21]). Although the diagnostic criteria for children and adolescent depression are no different from those for adults, one epidemiological study showed that there are different risk factors for the onset of depression in young people and in adults (Jaffee et al., [@B39]). For example, depressive adolescents experienced more perinatal insults, caretaker instability, and criminality than adult-onset depressive patients. Also, depressive adolescents have more behavioral and socioemotional problems than the adult-onset patients. In contrast, the adult-onset patients experienced more sexual abuse in their childhood than depressive adolescents (Jaffee et al., [@B39]).
Moreover, studies in neuroscience have demonstrated that adolescence is a special period of development characterized by significant changes in the structure and connectivity of the brain, as well as changes in cognition and behavior (Cousins and Goodyer, [@B17]). These neurological changes may interplay between genes and the environment (Paus, [@B63]). Results from several family and twin studies suggest that etiologic genetics do exist in depression during adolescence (Rice, [@B66]). A few reviews or meta-analyses have also summarized the gene × environment interaction in adolescents with depression (Franić et al., [@B25]; Rice, [@B67]; Dunn et al., [@B21]). However, the age range for adolescence was not accurately defined. Heterogeneity within a group of depressive patients may be problematic for the development of theory, research, and treatment of depressive patients (Jaffee et al., [@B39]). It is therefore necessary to summarize the findings in adolescents with an accurately defined age range: (1) to update the findings on gene expression or polymorphism in adolescent depression and (2) to evaluate the value of all genes as a biomarker of adolescent depression. The WHO defines adolescence as having an age range of 10--19 years old and as a dynamic period with biological, social, and psychological changes (WHO, [@B80]). In this study, the age range of 10--19 years was defined as adolescence while an age range of 20--25 years was defined as young adult for analysis.
The goal of the current review is to systematically analyze studies that tested the role of a gene in the development of depression or as a risk factor of depression in adolescents. We focused specifically on the findings and ultimately provide substantive conclusions on which gene expression or polymorphism could be a biomarker of depression in adolescents.
Methods {#s2}
=======
Eligibility Criteria {#s2-1}
--------------------
A systematic review of original studies on gene expression or genetic polymorphisms in adolescents with depression was conducted. Reports on gene expression or polymorphisms measured in peripheral blood or postmortem studies in adolescents were eligible for review. A study was included in the analysis when: (1) adolescents with depression or depressive symptoms fell into the range of 10--19 years old (WHO, [@B80]) or young adult at an age of 20--25 years and (2) original research with the age range and gene being clearly identified. Studies were excluded if: (1) a study had subjects with age not in the two age ranges; (2) a study only provided a mean age; (3) A study contained anxious adolescents only; (4) studies that were conducted in animals or *in vitro*; or (5) review or studies that were not written in English.
Information Sources {#s2-2}
-------------------
Studies were pulled from the electronic databases of PubMed, Embase, and Web of Science.
Search Strategy {#s2-3}
---------------
The primary search strategy was carried out using both the keywords and test words: "depression" and "adolescent" and "gene"; "depression" and "adolescent" and "polymorphism"; "depression" and "adolescent" and "genetics"; "depression" and "adolescent" and "genetic variants"; and "depression" and "adolescent" and "genotype".
Data Collection Process {#s2-4}
-----------------------
The abstract of each study was screened and the full-text articles of potentially relevant studies were then retrieved and assessed. Data were extracted from the retrieved papers by two authors (LX and SY) independently. Disagreements were resolved by discussion in a meeting that included several experts from within the Department. The study selection process was presented in a flow diagram (Figure [1](#F1){ref-type="fig"}).
{#F1}
Data Items {#s2-5}
----------
Data on age range, study design, demographic characteristics of patients, and control individuals, gene expression or polymorphism, tissue type, and the results were extracted.
Outcomes {#s2-6}
--------
The association of gene expression or polymorphisms with disease risk, severity of depressive symptoms, and treatment outcomes.
Risk of Bias in Individual Studies {#s2-7}
----------------------------------
Risk of bias was assessed by evaluating choice of study design, selection of study population, allocation of control individuals, and quality of assay used.
Data Synthesis {#s2-8}
--------------
Data was summarized for each gene including the main outcomes or conclusion, positive and negative association with depression.
Results {#s3}
=======
The literature search identified 1334 articles from PubMed, EMbase, and Web of Science using the keywords mentioned above after the removal of duplicates. The end date for the search is August 29, 2015. The abstracts of the 1334 articles were screened one by one and articles not written in English, review articles not for depression in adolescents, comments, and articles for animal or *in vitro* studies were excluded from this study. The studies where the gene name could not be identified in the abstract were also excluded from further analysis. A total of 282 studies were finally used for extracting full-length articles. However, only 261 full-length articles were downloaded for careful identification. Full-length articles of screening studies, studies in non-adolescents or with a mixed sample with the age beyond the range of 10--19 years for adolescents or 20--25 years for young adults, studies with only the mean age, studies without clearly identified gene expression or polymorphism, or others was excluded from the analysis. Finally, 47 full-length articles (Eley et al., [@B22]; Mamalakis et al., [@B51]; Burcescu et al., [@B11]; Miraglia del Giudice et al., [@B55]; Sjöberg et al., [@B71]; Geng et al., [@B27]; Hilt et al., [@B37]; Pandey et al., [@B61], [@B62]; Feng et al., [@B24]; Aslund et al., [@B1]; Duncan et al., [@B20]; Goodyer et al., [@B28], [@B29]; Guo and Tillman, [@B31]; Laucht et al., [@B46]; Nilsson et al., [@B57]; Nobile et al., [@B58]; Benjet et al., [@B5]; Brent et al., [@B8]; Mata et al., [@B54]; Nederhof et al., [@B56]; Uddin et al., [@B77], [@B76]; Bouma et al., [@B7]; Hankin et al., [@B34]; Jenness et al., [@B40]; Mata and Gotlib, [@B53]; Thompson et al., [@B74]; Chen et al., [@B13], [@B14]; Petersen et al., [@B64]; Buchmann et al., [@B9]; Bobadilla et al., [@B6]; Comasco et al., [@B16]; Cutuli et al., [@B19]; Kohen et al., [@B45]; Otten and Engels, [@B60]; Oppenheimer et al., [@B59]; Priess-Groben and Hyde, [@B65]; Stavrakakis et al., [@B73]; Banducci et al., [@B4]; Cicchetti and Rogosch, [@B15]; Cruz-Fuentes et al., [@B18]; Little et al., [@B49]; Zhang et al., [@B82]) in adolescents and three studies (Hammen et al., [@B33]; Starr et al., [@B72]; Thompson et al., [@B75]) in young adults were included in this study (Figure [1](#F1){ref-type="fig"}). The 47 studies in adolescence included 20 genes or gene families while the three studies in young adults included three genes (Table [1](#T1){ref-type="table"}).
######
**Summary of literature and outcomes in adolescents**.
Gene Reference Measurement Association with depression
----------------------------------------- ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- ------------------------- -----------------------------
DRD2 Guo and Tillman ([@B31]), Stavrakakis et al. ([@B73]) and Zhang et al. ([@B82]) Polymorphism 1 no/2 yes
DRD4 Guo and Tillman ([@B31]), Bobadilla et al. ([@B6]) and Stavrakakis et al. ([@B73]) Polymorphism 1 no/2 yes
Catechol-O-methyltransferase (COMT) Stavrakakis et al. ([@B73]) Polymorphism no
Serotonin 2A Stavrakakis et al. ([@B73]) Polymorphism no
Monoamine oxidase A (MAOA) Eley et al. ([@B22]) and Stavrakakis et al. ([@B73]) Polymorphism no
Tryptophan hydroxylase gene (TPH1/2) Nobile et al. ([@B58]), Stavrakakis et al. ([@B73]) and Eley et al. ([@B22]) Polymorphism 1 no/2 yes
Serotonin transporter gene (5-HTT) Eley et al. ([@B22]), Sjöberg et al. ([@B71]), Aslund et al. ([@B1]), Goodyer et al. ([@B28]), Goodyer et al. ([@B29]), Laucht et al. ([@B46]), Nobile et al. ([@B58]), Benjet et al. ([@B5]), Uddin et al. ([@B77]), Uddin et al. ([@B76]), Hankin et al. ([@B34]), Jenness et al. ([@B40]), Mata and Gotlib ([@B53]), Petersen et al. ([@B64]), Buchmann et al. ([@B9]), Comasco et al. ([@B16]), Cutuli et al. ([@B19]), Kohen et al. ([@B45]), Oppenheimer et al. ([@B59]), Otten and Engels ([@B60]), Priess-Groben and Hyde ([@B65]), Stavrakakis et al. ([@B73]), Banducci et al. ([@B4]), Cicchetti and Rogosch ([@B15]) and Little et al. ([@B49]) Polymorphism 24 yes/2 no
BDNF Hilt et al. ([@B37]), Duncan et al. ([@B20]), Goodyer et al. ([@B29]), Mata et al. ([@B54]), Nederhof et al. ([@B56]), Chen et al. ([@B13]), Chen et al. ([@B14]), Buchmann et al. ([@B9]), Comasco et al. ([@B16]), Stavrakakis et al. ([@B73]), Cicchetti and Rogosch ([@B15]) and Cruz-Fuentes et al. ([@B18]).
FK506 binding protein 5 (FKBP5) gene Brent et al. ([@B8]) Polymorphism yes
Estrogen receptor α, β Geng et al. ([@B27]) Polymorphism no
Androgen receptor (AR) Geng et al. ([@B27]) Polymorphism no
Glucocorticoid receptor Bouma et al. ([@B7]) Polymorphism no
IL-1β/IL-6/TNF-α Pandey et al. ([@B62]) Expression yes
Neurotrophic tyrosine kinase receptor Feng et al. ([@B24]) Linkage analysis yes
CREB/CREB1 Burcescu et al. ([@B11]) and Pandey et al. ([@B61]) Expression/Polymorphism yes/no
Adipose polyunsaturated fatty acid gene Mamalakis et al. ([@B51]) Expression no
CART Miraglia del Giudice et al. ([@B55]) Polymorphism yes
OXTR Thompson et al. ([@B74]) Polymorphism yes
AP-2β Nilsson et al. ([@B57]) Polymorphism yes
HTR2A/2C Eley et al. ([@B22]) Polymorphism yes
Among the studies in early adolescence, only three articles reported the association between gene expression and depression in adolescents (Mamalakis et al., [@B51]; Pandey et al., [@B61], [@B62]) and one study reported a linkage analysis (Feng et al., [@B24]). 91.5% (43/47) of articles reported the results of nucleotide polymorphism analysis of a gene in adolescents with depressive disease or depressive symptoms (Table [1](#T1){ref-type="table"}). Most studies were related to neurotransmitter receptors and their associated metabolic enzymes, including the dopaminergic system (*DRD2, DRD4*, and *COMT*) and serotonergic system (serotonin 2A, *5-HTT, MAOA*, and *TPH*). *5-HTT* (*5-HTTLPR* polymorphism) is the most frequently examined gene (26 articles) followed by Brain-derived neurotropic factor (BNDF; 12 articles). Thirteen genes were only reported in one article. Seven genes (*COMT*, serotonin 2A, *MAOA*, estrogen receptor α and β, *AR*, glucocorticoid receptor, and adipose polyunsaturated fatty acid gene) showed no association with depression in adolescents. Four genes (*DRD2, DRD4, TPH1/2*, and *CREB/CREB1*) were reported by two or three articles with inconsistencies. The 26 studies on *5-HTTLPR* contained a total of 14,616 samples, and the 12 studies on *BDNF* contained a total of 7646 samples.
Approximately 92.3% (24/26) of studies for the association between *5-HTTLPR* polymorphism and depression in adolescents yielded a positive outcome (Table [2](#T2){ref-type="table"}). Among the 26 studies for *5-HTTLPR* polymorphism, 22 studies analyzed the association between polymorphism and depressive symptoms (two studies showed negative findings), while four studies analyzed the role of *5-HTTLPR* polymorphism in depression. Only one study analyzed the association between *5-HTTLPR* polymorphism and the severity of depressive symptoms. It appears that *5-HTTLPR* polymorphism is associated with both the risk and severity of depression in adolescents. There was no study to compare the role of *5-HTTLPR* polymorphism in anxiety and depression. The association between *5-HTTLPR* polymorphism and different types of depression (i.e., anxiety vs. irritability vs. cognitive dysfunction) was not analyzed in this study because only a few studies analyzed the association between *5-HTTLPR* polymorphism and the cognitive dysfunction and the irritability.
######
**Outcomes of studies on the relationship between 5-HTTLPR and depression in adolescents**.
Reference Sample size Main outcomes or conclusion
--------------------------------- ------------- --------------------------------------------------------------------------------------------------------------------------------------------------------- --
Stavrakakis et al. ([@B73]) 1196 Adolescents' depressive symptoms are not modified by 5-HTTLPR
Nobile et al. ([@B58]) 607 Short alleles were associated with higher affective problems scores
Kohen et al. ([@B45]) 192 The s/l vs. l/l genotype showed greater reduction in depression symptoms
Comasco et al. ([@B16]) 1393 5-HTTLPR interacted with unfavorable environment in relation to depressive symptoms
Cutuli et al. ([@B19]) 267 Positive G × E effects on depression were found
Priess-Groben and Hyde ([@B65]) 309 Short allele confers susceptibility to stress for females with depression
Jenness et al. ([@B40]) 200 5-HTTLPR predict depressive symptoms
Otten and Engels ([@B60]) 310 Cannabis use increases the risk of depression only in the presence of 5-HTTLPR short allele genotype
Uddin et al. ([@B76]) 2574 The sl genotype carriers had*less* higher depressive symptom score
Goodyer et al. ([@B29]) 401 5-HTTLPR short allele modify the risk of a new depressive episode associated with elevated morning salivary cortisol
Benjet et al. ([@B5]) 78 Short alleles confers vulnerability to depressive symptoms in girls
Goodyer et al. ([@B28]) 403 Episode of depression was increased in those with the "s" allele
Laucht et al. ([@B46]) 309 LL genotype of 5-HTTLPR displayed significantly higher rates of depressive disorders and more depressive symptoms
Sjöberg et al. ([@B71]) 200 Females carrying the short 5-HTTLPR allele tend to develop depressive symptoms
Nederhof et al. ([@B56]) 1096 Interaction between 5-HTTLPR polymorphism and childhood adversities did not predict depression score
Cicchetti and Rogosch ([@B15]) 1096 G × E interaction of 5-HTTLPR and maltreatment on depression symptoms
Little et al. ([@B49]) 174 Structural abnormalities in the left hippocampus may be partly responsible for an indirect association between 5-HTTLPR genotype and depressive illness
Banducci et al. ([@B4]) 222 Among girls, but not boys, each copy of the s allele of the 5-HTTLPR was related to increased depressive symptoms
Buchmann et al. ([@B9]) 259 The carriers of the BDNF Met and 5-HTTLPR s allele are susceptible to depressive symptoms
Oppenheimer et al. ([@B59]) 241 Youth with SS genotype of 5-HTTLPR experienced greatest increases in depressive symptoms when exposed to elevations in materal symptoms
Petersen et al. ([@B64]) 436 Stress affect adolescents' likelihood of experiencing depressed symptoms when they have a low serotonin TE (A/Gmodified5-HTTLPR) genotype
Mata et al. ([@B54]) 50 Girls with homozygous for short 5-HTTLPR allele showed stronger association between depressive and bulimic symptoms the long allele
Hankin et al. ([@B34]) 220 5-HTTLPR confers susceptibility to depression via stress reactivity
Uddin et al. ([@B77]) 524 5-HTTLPR sl genotype is a risk of depressive symptom in adolescent male
Aslund et al. ([@B1]) 1482 A GxE interaction effect of 5HTTLPR ss allele was found among girls, not boys
Eley et al. ([@B22]) 377 A significant genotype-environmental risk interaction for 5HTTLPR in the risk of depression in girls only
*BDNF* was the second most frequently studied gene in adolescents. All 12 studies analyzed the association between *BDNF* Val66Met genotype/gene plasticity index and depressive symptoms. Among them, one study investigated the *BDNF* gene plasticity index in adolescents with depressive symptoms without observing any association. Eleven studies (Hilt et al., [@B37]; Duncan et al., [@B20]; Goodyer et al., [@B29]; Mata et al., [@B54]; Chen et al., [@B13], [@B14]; Buchmann et al., [@B9]; Comasco et al., [@B16]; Stavrakakis et al., [@B73]; Cicchetti and Rogosch, [@B15]; Cruz-Fuentes et al., [@B18]) investigated the association between the *BDNF* Val66Met genotype and adolescent depressive symptoms with only one study showing no association (Nederhof et al., [@B56]; Table [3](#T3){ref-type="table"}). However, no study analyzed the association between *BDNF* Val66Met genotype and severity of depressive symptoms. No study compared the role of *BDNF* Val66Met genotype in anxiety and depression. The association between *BDNF* Val66Met genotype and different types of depression was not analyzed in this study because no studies analyzed the *BDNF* Val66Met genotypes and irritability. Only one study investigated the association of *BDNF* Val66Met genotypes with cognitive dysfunction. Two studies reported the association of genetic variants in the dopaminergic system with adolescent depression (Bobadilla et al., [@B6]; Stavrakakis et al., [@B73]; Table [3](#T3){ref-type="table"}).
######
**Outcomes of studies on the relationship between BDNF and dopaminergic pathway and depression in adolescents**.
Reference Sample size Main outcomes or conclusion
-------------------------------- ------------- ------------------------------------------------------------------------------------------------------------------------------
Stavrakakis et al. ([@B73]) 1196 Adolescents' depressive symptoms are not modified by BDNF
Comasco et al. ([@B16]) 1393 Depressive symptoms and depression were more common among carriers of either the Val/Val or Met genotypes
Goodyer et al. ([@B29]) 401 *BDNF* (Val66Met) modify the risk of a new depressive episode associated with elevated morning salivary cortisol
Chen et al. ([@B13]) 780 Interaction between *BDNF* Val66Met polymorphism and environmental stress on depression was observed
Nederhof et al. ([@B56]) 1096 Depression score was not significantly predicted by interaction between BDNF Val66Met polymorphism and childhood adversities
Mata et al. ([@B54]) 82 BDNF met allele moderate the relation between exercise and depressive symptoms
Duncan et al. ([@B20]) 217 Val/Val genotype correlated with higher levels of depression symptoms
Hilt et al. ([@B37]) 100 Val/Val genotype was associated with more depressive symptoms
Cicchetti and Rogosch ([@B15]) 1096 G × G × E interaction of BDNF, *5-HTTLPR/CRHR1* and maltreatment on depression symptoms
Cruz-Fuentes et al. ([@B18]) 246 Possession of BDNF Met allele was statistically linked with a resilient phenotype of major depression disorder
Buchmann et al. ([@B9]) 259 The carriers of the BDNF Met and *5-HTTLPR* s allele are susceptible to depressive symptoms
Chen et al. ([@B14]) 780 *BDNF* Val allele modulates the influence of environmental stress on depression
Stavrakakis et al. ([@B73]) 1196 Adolescents' depressive symptoms are not modified by COMT
Guo and Tillman ([@B31]) 2286 DRD2\*304/178 and DRD4\*379/379 genotype are associated with a level of depressive symptoms
Bobadilla et al. ([@B6]) 1882 DRD4 polymorphism is linked to comorbid marijuana use and depression
Only three studies investigated the gene polymorphism and the risk of depression in young adults at an age range of 20--25 years. Thompson et al. ([@B75]) study found that OXTR (oxytocin receptor gene) polymorphism influences the development of depressive symptoms. Starr et al. ([@B72]) study showed that *5-HTTLPR* S-allele can predict relative increases in probability of depression among boys. Hammen et al. ([@B33]) study revealed that chronic family stress at age 15 predicted higher depression scores at age 20 among females with one or two S alleles of *5-HTT* gene (Table [4](#T4){ref-type="table"}).
######
**Summary of literature and outcomes in young adult**.
Gene Reference Measurement Association with depression
--------- -------------------------- ------------------------- ------------------------------------------------------------------------------------------------------------------------
OXTR Thompson et al. ([@B75]) Polymorphism, *n* = 441 OXTR influences the development of depressive symptoms
5HTTLRP Starr et al. ([@B72]) Polymorphism, *n* = 354 S-allele predicts relative increases in probability of depression among boys with low security
5HTT Hammen et al. ([@B33]) Polymorphism, *n* = 346 Chronic family stress at age 15 predicted higher depression scores at 20 among those females with one or two S alleles
Risk of bias was evaluated for the study design, allocation of control individuals, and quality of assay methods. There was a wide variation in methods and analysis. Most studies did not include age or gender-matched control individuals. Most studies did not provide detailed information about current medical treatment in the full study sample. Most studies did not provide observer-based rating scores of depressive symptom severity.
Discussion {#s4}
==========
Studies in twins, families, and populations have revealed the genetic influences on depression (Rice, [@B66]). Deregulated gene expression and specific functional genetic polymorphisms have been demonstrated to be risk factors of depression or to be associated with the severity of depressive symptoms (Dunn et al., [@B21]). Numerous studies have confirmed the existence of biological etiology in the development and progression of depression during childhood and adolescence (Dunn et al., [@B21]; Paus, [@B63]; Cousins and Goodyer, [@B17]). However, the published reviews did not summarize the up to date biological findings in only adolescents with defined age ranges. Heterogeneity within study subjects is a main concern for the research in depressive patients because the risk factors for the onset of depression in adolescents and in adults are different. Moreover, the depressive adolescents may experience more psychopathology, behavioral and socioemotional problems than adult-depressive patients (Jaffee et al., [@B39]). It is therefore important to summarize the biological findings in depressive patients with a defined age range. This study updated the genetic findings in adolescent depression with an age range of 10--19 years defined by WHO as adolescence and 20--25 years as young adult. This study demonstrated that genetic polymorphism or expression of 13 genes was associated, but seven tested genes were not associated with the risk or severity of depression in early adolescence, while the polymorphism of three genes was associated with the risk of depression in late adolesence. This review highlighted the role of several genes or gene families as risk factors for the development of depression in adolescents. This study improved our understanding of the etiology of adolescent depression, and also identified *5-HTTLPR* and *BDNF* Val66Met polymorphisms as the most studied biomarkers in adolescent depression.
Low serotonin-receptor levels in the brain have been widely recognized to be a key cause of depression. Polymorphisms of the 5-hydroxytryptamine (serotonin) transporter gene-linked polymorphic region (*5-HTTLPR*) have been widely demonstrated to be a risk factor for depression following adverse life experiences. In this review, a total of 26 articles reported an association between *5-HTTLPR* variations and depression in adolescents. About 92.3% of studies (*n* = 24) identified positive associations of 5-HTTLPR polymorphism with the risk for or susceptibility to depression, new depressive episodes, and more severe depressive symptoms. The most commonly examined polymorphism was the *5-HTTLPR* variable number tandem repeat (VNTR), which consists of the s/s, s/l, and l/l genotypes. In most studies, the short (S) allele or heterozygote genotype carriers (s/l) of 5-HTTLPR might experience a greater reduction in depressive symptoms over time compared with adolescents with the *5-HTTLPR* l/l genotype (Table [2](#T2){ref-type="table"}). A recent meta-analysis of the association between the *5-HTTLPR*, stress, and the development of depression contained 81 studies with a mean age from 9--77 years. A significant relationship between the short form of the *5-HTTLPR* and depression was confirmed (*p* = 0.0000009). However, nearly 26% of the 81 studies failed to show any significant association, and four studies even showed opposite results (Sharpley et al., [@B70]). Only two studies investigated the *5-HTTLPR* polymorphism and the risk of depression in young adults at an age range of 20--25 years. These two studies showed a positive association between *5-HTTLPR* S-allele and the increased probability of depression in adolescents (Hammen et al., [@B33]; Starr et al., [@B72]). These findings suggest that *5-HTTLPR* polymorphism is a risk factor for both early onset and late onset depression.
Tryptophan hydroxylase-2 (*TPH2*) gene has been acknowledged for many years as the only form of tryptophan hydroxylase (TPH) responsible for the synthesis of serotonin in the brain and peripheral tissues. A recent report suggested that *TPH2* gene expression in the dorsal raphe nuclei of depressed suicidal patients is upregulated \[14\]. This review included 2 studies on *TPH2* in adolescents (Nobile et al., [@B58]; Stavrakakis et al., [@B73]). However, adolescents' depressive symptoms are not associated with the gene plasticity index of *TPH2* (Stavrakakis et al., [@B73]). Monoamine oxidase A is a monoamine oxidase encoded by the *MAOA* gene that preferentially deaminates norepinephrine, epinephrine, serotonin, and dopamine. Studies in adolescents demonstrated that depressive symptoms are not associated with gene plasticity index of the *MAOA* gene (Stavrakakis et al., [@B73]), whereas gene × environment interaction of the *5-HTTLPR* was further moderated by *MAOA* activity level (Nobile et al., [@B58]).
BDNF is the most abundant neurotrophin in the mammalian central nervous system, and reduced BDNF level in the hippocampus has been revealed to be related to the onset of depression (Bai et al., [@B3]). A single nucleotide polymorphism (SNP) in the *BDNF* gene (Val66Met) has been shown to influence the activity of the BDNF protein and cause subsequent memory impairment and harm avoidance (Jiang et al., [@B41]). A significant interaction between *BDNF* Val66Met and life stress in depression was widely observed in adults (Hosang et al., [@B38]). In this review, the *BDNF* gene is the second most frequently studied gene in adolescents with depression. Two studies on the *BDNF* gene plasticity index and BDNF level showed controversial outcomes. The depressive symptoms were not associated with gene plasticity index of the *BDNF* gene in adolescents (Stavrakakis et al., [@B73]), whereas *BDNF* mRNA level correlated with symptom improvement in adult patients with depression (Cattaneo et al., [@B12]). Seven studies investigated the association between *BDNF* Val66Met polymorphism and adolescent depression. Two studies showed no association between *BDNF* Val66Met polymorphism and depression score, but 10 studies found significant correlations between BDNF polymorphism and adolescent depression. A recent meta-analysis of the interaction between the *BDNF* Val66Met polymorphism and stress in depression contained 22 studies with a mean age range from 8.85--65 years. Results showed that the Met allele of *BDNF* Val66Met significantly moderates the relationship between life stress and depression (*p* = 0.03; Hosang et al., [@B38]). This review only contained three studies with an age range from 9--19 years. Moreover, a meta analysis of genes and suicide in 16 studies showed that hypermethylation of *BDNF* is associated with individuals that died of suicide (Lockwood et al., [@B50]). The involvement of genetic polymorphisms in the *BDNF* gene in peripheral tissues of patients with depression may reflect changes in the BDNF level in their brain. The Val66Met polymorphism has been demonstrated to impair the packaging and secretion of BDNF and subsequently reduces hippocampal volume and impairs memory (Kimpton, [@B43]; Harrisberger et al., [@B35]).
Dopamine is a major neurotransmitter in the central nervous system, and dysregulation of the dopaminergic-system is widely reported in people with depression. The hypofunction of the mesolimbic dopaminergic pathway has been linked to anhedonia, one of the major symptoms of depression (Leggio et al., [@B48]). Studies that directly link genetic polymorphisms in the dopaminergic pathway to depression are abundant but show inconsistent findings (Lawford et al., [@B47]). For example, Lawford et al study demonstrated that patients with *DRD2*\*A1/A2 genotype had significantly higher depression scores compared to those with the *DRD2*\*A2/A2 genotype (Lawford et al., [@B47]). An interaction between *DAT1* polymorphism and perceived maternal rejection can influence the onset of depressive disorder and suicidal ideation (Haeffel et al., [@B32]). A significant association between the 48 bp repeat polymorphism of *DRD4* and depression was reported (Manki et al., [@B52]). In contrast, Frisch et al. ([@B26]) found no association of polymorphisms in *DRD4, DAT1*, and *COMT* with depression. Kirov et al. ([@B44]) found that six dopaminergic genes (*DBH, DAT1, COMT, DRD2, DRD3*, and *DRD5*) played no role in bipolar disorder. However, the roles of genetic polymorphisms in the dopaminergic pathway in adolescent depression have not been summarized. In this study, three studies reported associations between genetic variants in the dopaminergic system and adolescent depression (Bobadilla et al., [@B6]; Stavrakakis et al., [@B73]). Significant associations between *DRD2, DRD4*, and *COMT* polymorphisms and the risk of depression, as well as the severity of depressive symptoms, were reported.
Selective serotonin reuptake inhibitors (SSRIs) are the first line treatment for depression in the clinic. These inhibitors work by increasing serotonin levels in the brain to counteract the low serotonin-receptor levels. A meta-analysis has demonstrated that the *5-HTTLPR* long-allele carriers had higher probability of response than patients with short-allele homozygotes of *5-HTTLPR* with heterogeneity effect (Serretti et al., [@B69]). No study investigated the effect of *5-HTTLPR* polymorphism on the efficacy of SSRIs treatment at an age range from 9--19 years. Rotberg et al. ([@B68]) study in 83 children and adolescents aged 7--18 years showed that the *5-HTTLPR* ss genotype was associated with a poorer clinical response to citalopram with regards to depressive symptoms. A recent meta analysis showed that the BDNF Met carriers had a better response rate to SSRI than Val/Val, while Met/Val carriers had a weak effect of response to SSRIs than Val/Val carriers (Yan et al., [@B81]). Based on the report from Hammen et al. ([@B33]) study that patients younger than 18 years old have an increased risk of suicidal thoughts or behaviors (4% with SSRIs vs. 2% with placebo) with an antidepressant (Gordon and Melvin, [@B30]), FDA suggests that adolescents taking SSRIs must be closely monitored to reduce the risk for suicide. However, the risk is small and the risk hasn't been replicated very well in studies of adolescent depression treated with SSRIs. For example, Hetrick et al. ([@B36]) study showed that no significant increase in suicide-related outcomes was observed in children and adolescents after using individual SSRIs, such as paroxetine, fluoxetine, sertraline, citalopram, and escitalopram.
In conclusion, there are more published positive associations between the genetic polymorphisms in the serotoninergic system, dopaminergic system, and the Val66Met polymorphism of BDNF with adolescent depression. However, some biases should be considered: (1) the publication bias for positive findings; (2) numerous negative findings may be unpublished; (3) a bias for investigations of these three polymorphisms first because of the high profile papers that brought them to attention; and (4) the polymorphisms can be easily genotyped. Although the expression or polymorphism of 18 genes has been reported to be or not be associated with the risk of depression, they were reported by only a few studies. Therefore, further studies are needed to accurately identify their roles in depression in adolescents.
Author Contributions {#s5}
====================
LX: data extraction, data analysis, and manuscript writing. SY: study design, data extraction, data analysis, critical revision of manuscript, and a guarantor of the review.
Funding {#s6}
=======
This study is supported by grants from the National Natural Science Foundation of China (81471384 to SY).
Conflict of Interest Statement {#s7}
==============================
The authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.
[^1]: Edited by: Morten L. Kringelbach, University of Oxford, UK; University of Aarhus, Denmark
[^2]: Reviewed by: Heather Trantham-Davidson, Medical University of South Carolina, USA; Fiona Hollis, École Polytechnique Fédérale de Lausanne, Switzerland
| |
Functional characterization of two low density lipoprotein receptor gene mutations by fluorescence flow cytometric assessment of receptor activity in stimulated human T-lymphocytes.
We report a functional characterization of the W23X and W66G low density lipoprotein (LDL) receptor gene mutations. The authors used two-color fluorescence flow cytometry to measure LDL receptor activity in stimulated T-lymphocytes, prepared from patients heterozygous for the W23X or W66G mutation, and compared the results with measurements of LDL receptor activity in stimulated T-lymphocytes prepared from unrelated healthy control subjects. It was found that the W23X mutation significantly reduced LDL receptor expression and LDL binding and internalization, and that the W66G mutation significantly reduced LDL receptor expression and LDL binding. LDL internalization in patients heterozygous for the W66G mutation was not significantly reduced. The data support the concepts that the W23X mutation prevents production of LDL receptors (class I) and that the W66G mutation produces LDL receptors unable to recycle normally in cells (class V).
| |
Influence of apoE content on receptor binding of large, bouyant LDL in subjects with different LDL subclass phenotypes.
We investigated the influence of apolipoprotein (apo) E-containing particles on LDL receptor binding of large, buoyant LDL subfractions (LDL I) from subjects with predominantly large (phenotype A) and small (phenotype B) LDL particles. Direct binding by human fibroblast LDL receptors was tested at 4 degrees C before and after removal of apoE-containing particles by immunoaffinity chromatography. The binding affinity of total LDL I in phenotype B was greater than that in phenotype A (Kd of 1.83+/-0.3 and 3.43+/-0.9 nmol/L, respectively, P<.05). LDL I from phenotype B subjects had a higher apoE to apoB molar ratio than did that from phenotype A (0.16+/-0.04 versus 0.06+/-0.02, P<.05). Nondenaturing gradient gel electrophoresis of apoE-containing LDL I isolated by immunoaffinity chromatography revealed a substantially larger peak particle diameter than in apoE-free LDL I, and comparison of LDL I composition before and after immunoaffinity chromatography suggested an increase in triglyceride content of apoE-containing particles. After removal of these particles, there was a greater than twofold reduction in LDL receptor affinity of phenotype B LDL (Kd of 1.83+/-0.3 to 3.76+/-0.6, P<.01), whereas in phenotype A no change was observed (Kd of 3.43+/-0.9 to 3.57+/-0.4, respectively). The receptor affinity of apoE-free LDL I from phenotype A and B subjects did not differ. These findings confirm that large, buoyant LDL particles from phenotype B subjects have a higher LDL receptor affinity than does LDL I from phenotype A subjects and suggest that this difference is due to an increased content of large, triglyceride-enriched, apoE-containing lipoproteins. It is possible that the accumulation of these particles reflects abnormalities in the metabolism of remnant lipoproteins that contribute to atherosclerosis risk in phenotype B subjects.
| |
Serve as the central procurement arm
(GPO), for hospitals and government medical centers and other institutions in Israel, public health services, health bureaus, the emergency department of the Ministry of Health and other bodies.
Israel is a leading company in its field, providing under one roof, an extensive basket of medicines, vaccines, medical equipment and instruments, laboratory equipment and complementary services to the health system. The company is owned by the “Association of Public Hospitals for the Public”, which operates for non-profit and only for public purposes.
The company employs about 145 skilled, experienced and multidisciplinary employees.
Activities with state institutions include, but are not limited to:
Equipping and emergency refresh
Public health – vaccines and vaccines
National projects – Israel plans and operates national projects in the field of health, at the request of the Ministry of Health and in full coordination with it, from defining the project content, through collecting and studying regulatory and clinical requirements, to practical implementation and implementation: refreshing emergency supplies and equipment Imports of corneas from humane harvest, swine flu, operation of polio vaccines, characterisation of needs and equipment for protection against Ebola, emergency equipment in time of war, concentration of activities of the professional committees of the Ministry of Health over the years, assistance to medical rescue missions abroad, and more.
Israel capabilities
and accumulated experience in managing medical projects, make it possible to handle innovative projects, even those not carried out in Israel, in collaboration with first-rate professional opinion leaders as required, and without any conflicts of interest, but only for the benefit of the public system.
The extensive experience in the unique
needs of medical buildings, such as emergency rooms, dialysis, women and midwives, operating rooms, etc., combined with many years of knowledge accumulated over many years of work in Israel and abroad – in procurement, logistics and medical needs, allows Israel to provide a full project basket Which includes all the components required for successful execution and operation.
The company meets regulatory requirements and international quality standards, and has approvals from the Ministry of Health such as:
Importer / manufacturer approval for medical preparations, GMP approval and GDP approval, from regulatory bodies such as: ISO 9001 approval.
Israel in emergencies
As part of Israel’s agreement with the Ministry of Health, the company refreshes the Ministry of Health’s emergency department inventory, and conducts the tenders for it in combination with professional advice and guidance. The company supplies the equipment for emergencies directly to the hospitals. Israel is approved as a “salt factory” (emergency farm), and its warehouses are available 24 hours a day during emergencies and wars, to provide a complete response to the needs of the health system with urgent supplies of medicines and medical equipment. | https://or-el.net/2021/01/01/serve-as-the-central-procurement-arm/ |
Updated training modules have been added to the National Institute on Aging’s Toolkit for Trainers, a free resource that can be used to help older adults find reliable online health information on their own. The Toolkit offers free lesson plans, student handouts, glossaries, trainer tools and an introductory video and can be used in libraries, senior centers, community colleges, and retirement communities.
The updates appear in modules 6-8 and reflect recent design changes to MedlinePlus, one of the websites featured in the training. | https://news.nnlm.gov/psr-newsbits/nihseniorhealth-toolkit-for-trainers-updated-modules-now-available/ |
The selection process for Game Warden employment is designed to evaluate an applicant’s suitability for a career with DNR. The Law Enforcement Division (LED) accepts applications throughout the year and will enroll selected Cadet(s) in the Game Warden Academy at the earliest possible date.
Background Investigation
All applicants are subject to a background investigation. An applicant must not have been convicted of any crime, for which the punishment has been imprisonment in a Federal or State prison, nor shall he/she have been convicted of sufficient misdemeanors to establish a pattern of disregard for the law. Each applicant must successfully pass a polygraph examination. The polygraph examination will consist of a series of questions, dealing with substance abuse and/or criminal activity.
Physical Skills
An applicant must pass a physical agility test demonstrating physical skills, which are used in the performance of duties as a Game Warden.
The physical agility test consists of the following events:
- 3/4 mile run in less than 7:42
- 3/4 mile obstacle run in less than 9:17
- 50-yard fully clothed swim
Oral Interview
Each applicant must compete for current vacancies before a panel of experienced Game Wardens. The panel will ask each applicant a series of questions to determine the applicant’s experience and knowledge in the areas of hunting, fishing, boating and related outdoor activities. The applicant’s appearance, demeanor, verbal skills and ability to make sound judgment will also be assessed during the interview.
Medical Evaluation, Drug Screening and Psychological Evaluation
All applicants must successfully pass a thorough medical examination by a licensed physician. All medical standards must be met in the areas of vision, hearing, ENT, cardiovascular, respiratory, gastrointestinal, rectal, hernia, genital/urinary, back and neck, extremities, nervous system, emotional stability and laboratory analysis.
Body Art, Tattoos, Brands, Images, Expressions
Body art, tattoos, brands or images that are visible or may become visible while on duty or in uniform are prohibited.
Body piercing which is visible anytime while on duty and/or in uniform is prohibited.
The display of any unprofessional or offensive image, phrase or other expression, or excessive tattoos shall not be tolerated.
For the purpose of this section, “display” includes:
- May become visible during member’s work activities, and or
- The image, phrase or other expression is found on any clothing item or accessory worn by the member at any time
Unprofessional or offensive shall include but not limited to:
- Depictions of nudity, violence or criminal activity
- Sexually explicit/vulgar art, words, profane language
- Symbols likely to incite a strong negative reaction in any group, i.e. swastikas, etc.
- Initials, symbols or acronyms that represent criminal or historically oppressive organizations or activities e.g. AB, KKK, SS, street gang names, and/or symbols
Illegal Drug Use
Any of the following will disqualify a person from employment in a sworn position with the DNR, LED:
- Current illegal drug use
- Deliberate misrepresentation of illegal drug history in connection with the application and employment process
- Illegal sale, distribution, transporting, possession, or manufacturing (to include growing) of any drug
- Illegal use of any drug while employed in any law enforcement or criminal justice position or while employed in any position which carries a high level of responsibility or public trust
- Deliberate association of a personal nature within the past one (1) year with persons who use or possess illegal drugs in the presence of the applicant
- Deliberate association will be determined by: Number of instances, Circumstances of incident(s), and/or Applicant’s response or lack of response to the incident(s)
- Use or illegal possession of marijuana or any cannabis derivative within three (3) years of the application date
- Any pattern of marijuana, or any cannabis derivative, use or illegal possession that suggests un-rehabilitated substance abuse
- Use or illegal possession of any illegal drug or combination of illegal drugs, other than marijuana or any cannabis derivative, within ten (10) years of the application date
- Use or illegal possession of any illegal drug or combination of illegal drugs, other than marijuana or any cannabis derivative, more than five (5) times
- Any pattern of drug use that suggests un-rehabilitated substance abuse
- Use of any prescription drug prescribed to another will be evaluated by the LED Director
Additional Information
For additional information on becoming a Game Warden, please call the DNR Training Academy in Forsyth, GA at (478) 993-4540 or e-mail the Academy at [email protected]
Written inquiries must be submitted to: | https://gadnrle.org/selection-process |
Statement on Franchise Survey Call
I am writing to clarify my involvement on yesterday's press call related to the Franchise Grade franchisee survey and the official positions of the Coalition of Franchisee Associations (CFA) board, which were not represented. My participation was personal, not as a representative of nor endorsed by the CFA Board of Directors.
Yesterday's call was titled the "Franchise Survey Call". I was a participant only to the extent that I was aware that portions of the survey related to specific provisions of proposed legislation known as AB-525 in California. The CFA is the sponsor of AB-525, and the CFA Board has officially supported the legislation.
CFA's mission is to support and strengthen franchising. It seeks to build strong relationships between responsible franchisees and responsible franchisors and to improve franchising for all stakeholders, including franchisees, franchisors, the public, franchisees' valued employees and future investors in franchising. Franchising is a vital industry employing millions of Americans and providing upward mobility and business ownership opportunities like no other industry.
Media stories have concentrated on me being representative of franchisees joining the fight for $15 with the unions or the We Are Main Street campaign, none of which I support. Any characterizations that I do are false.
CFA's official position has been, and continues to clearly be, that it is against measures such as Seattle’s discriminatory treatment of franchisees being targeted for higher wage mandates than other independently owned businesses, and against franchisees and franchisors being treated as joint employers.
I regret allowing myself to be put in a position of being misinterpreted or be misperceived as speaking on behalf of the board, and this has caused unintentional harm to the association, its members and other stakeholders with whom CFA works in good faith to nobly advance the cause of responsible franchising. | https://www.bluemaumau.org/blog/2015/05/01/statement-franchise-survey-call |
An Inspector General review of the original rollout of Healthcare.gov found the website was set up to fail from the beginning due to poor contract requirements and a lack of oversight.
The IG review examined 60 related contracts, narrowing in on six central agreements, and included interviews with staff from the Centers for Medicare and Medicaid Services (CMS) and Health and Human Services (HHS).
The report notes CMS spent nearly $800 million across all contracts and relied heavily on vendors to plan and build the federal marketplace. Unfortunately, the agency did not ensure those contracts met the necessary requirements and didn't take advantage of existing processes that would have identified problems earlier.
Full Report: Inadequacies in Contract Planning and Procurement
"For example, CMS did not develop an overarching acquisition strategy for the federal marketplace or perform all required oversight activities," the IG found. "Moreover, for a project of this size and importance, CMS missed opportunities to leverage all available acquisition planning tools and contracting approaches to identify and mitigate risks."
The structure of the procurement strategy also restricted the agency's options when it came to vendors.
The IG found that only five of the 60 contracts were actually new awards. The remaining 55 were awarded as task orders under existing contracts. Additionally, for some 20 contracts, CMS only solicited proposals from a single vendor, drastically limiting competition.
"The complexity of the federal marketplace underscored the need for CMS to select the most qualified contractors," the IG wrote.
"CMS did not perform thorough reviews of contractor past performance when awarding two key contracts," the report continues. "CMS also made contracting decisions that may have limited the number of acceptable proposals for much of the key federal marketplace work."
The contracts themselves also put the onus on the agency, largely absolving the contractors when problems arose and creating additional costs to remediate.
The IG offered six recommendations, all of which the agency agreed with:
- CMS ensure that acquisition strategies are completed as required by regulation;
- CMS assess whether to assign a lead systems integrator for complex IT projects;
- CMS ensure that contract actions are properly documented;
- CMS ensure that all contracts subject to oversight review requirements undergo those reviews;
- HHS limit or eliminate regulatory exceptions to acquisition planning requirements; and
- HHS revise its acquisition guidance to include specific standards for conducting past performance reviews.
The HHS IG plans to issue additional reports on the contract management and ultimate performance of Healthcare.gov and the federal marketplace. | https://www.federaltimes.com/smr/acquisition/2015/01/22/ig-contracts-doomed-first-healthcare-gov-site/ |
Designing for Financial Empowerment (http://dfe.nyc) is a cross-sector project that envisions how New York City might challenge the cycle of poverty by holistically examining current public policy and service offerings; understanding the interrelated needs of the City’s most vulnerable populations; and enabling community members to participate in the co-design of the very services that they use, alongside policymakers, advocates and service providers.
Designing for Financial Empowerment is part of Public & Collaborative (http://nyc.pubcollab.org), a multi-project initiative that investigates the role of design in building bridges between city government and its constituents to improve the provision of services for the public good. The initiative has also undertaken design research activities that cover affordable housing, public education, workforce development, and mapping exercises aimed at identifying spaces for public innovation.
Parsons DESIS Lab NYC
Parsons DESIS (Design for Social Innovation and Sustainability) Lab is a research and design laboratory created in 2009 at The New School in New York City (http://www.newschool.edu/desis/). DESIS Lab works at the intersection of design, management, and the social sciences, to develop transdisciplinary methods in problem solving to orient sustainable practice and social innovation in cities.
We are a group of design theorists and practitioners, management scholars, anthropologists and ethnographers, and graduate students who explore the relationship between design and social change. Our goal is to advance the practice and discourse of design-led social innovation to foster more equitable and sustainable cities and civic practices.
In a world facing critical and systemic challenges, the DESIS Lab rethinks assumptions about how communities, economies, and environments are conceived and operate, researching nuanced design approaches drawn from knowledge cultures of all kinds. In the DESIS Lab, design is considered a distributed approach, one that integrates many forms of know-how, action, and expertise. | https://www.desisnetwork.org/2017/05/22/designing-for-financial-empowerment/ |
Multi-Dimension Analytical Query Language, or MAQL for short, is the GoodData's proprietary querying language. It comes with a set of predefined functions that you can use for simple queries such as averages or complex statistical analysis such as skewness or kurtosis.
MAQL is a language that you will use to define metrics - aggregations of the underlying data that produce a number. A metric is essentially a mathematical formula that tells the application how to aggregate the raw data.
No joins or sub-joins as MAQL works on top of logical data models and its queries are context-aware.
Any metric can be immediately used for reporting, reused again or deployed to assemble other metrics.
MAQL makes multidimensional analysis simple by abstracting any data complexities. You do not have to specify the fact or attribute origin as it is done automatically for you.
If you are arriving to MAQL from a SQL background, you will notice a degree of similarity in syntax construction and predefined argument references. However, whereas SQL is a relational database tool, MAQL is multi-dimensional.
MAQL's foundation principles make it a unique and powerful language. If you are new to MAQL we recommend you explore the following sections to get yourself familiar with using it.
Having a SQL background helps to get on board with MAQL, but you will soon discover that MAQL is a more powerful yet streamlined analytical language. For example, there are no joins , you can reuse your MAQL queries and, as you will see, the use of syntax is more efficient , so there is less code to write and less code to maintain.
Multidimensionality and the ability to work with interchangeable dimensions are MAQL's key concepts that set it apart from other data analytics tools.
Because of how our GoodData platform is built, MAQL works with logical instead of physical data models. As a result, MAQL's use of data and metrics is context-aware. You can reuse the metrics as they take clues from the context of the logical data model.
MAQL is a language to define metrics, which are aggregations of underlying data. In other words, a metric is a mathematical formula for aggregating raw data. MAQL also features Advanced Metric Editor, a graphical user interface, that takes away the need to type in the syntax manually.
If you are ready for a deeper dive, take a look at these use cases and tutorials to really get to grips with MAQL. | https://help.gooddata.com/display/doc/MAQL+-+Analytical+Query+Language |
Misc.
Desktop
Misc.
DIY modules
With CV
Instruments, create
remove all
Midi tools
interfaces (1)
Misc. (1)
Sequencers
With midi (1)
With audio (1)
Synthesizers
Misc. (1)
Exhibitor
Modular Systems: Misc.
Synthesizers: Desktop
Effect units: Misc.
DIY / OEM: DIY modules
Sequencers: With CV
Software: Instruments, create
Patchblocks
Programmable modular synthesizers to patch n play. | https://2016.superbooth.com/en/exhibitors-102.html?af_filter%5B4%5D%5B%5D=13&af_filter%5B7%5D%5B%5D=23&af_filter%5B3%5D%5B%5D=7&af_filter%5B2%5D%5B%5D=8&af_filter%5B6%5D%5B%5D=21&af_filter%5B9%5D%5B%5D=31 |
Balances favored the strings in the symphony, a brilliant shimmer in the quieter dynamic range, and a surprisingly warmer sound in the middle and louder volumes than one has heard from Bernard Haitink or Pierre Boulez in recent years. Muti evoked a misterioso atmosphere in the opening moments of the first movement, and honed in on the hairpin turns of mood after the idée fixe makes its appearance without sacrificing structural unity or momentum. The suspenseful portents that opened the second movement ‘Waltz’ yielded to genuinely elegant playing that demolished the ‘muscle orchestra’ stereotype that many still attach to Chicago – the sound surprisingly similar to the Philadelphia Orchestra, which Muti led for some years. ‘Scène aux champs’ was unexpectedly suave – but the rumbles of thunder didn’t have enough bite. ‘March to the Scaffold’ came off with virtuoso panache, as did ‘Dream of a Witches’ Sabbath – particularly the phenomenal balance and build-up of momentum from the beginning of the fugal section. The only disappointment was Muti’s downplaying of Berlioz’s radical orchestration and special effects in this breakthrough work.
If Berlioz had lived in the era of mass communication, particularly cinema, he might have had second thoughts about composing a sequel to Symphonie fantastique. The impetus for Berlioz to compose “Lélio” was the shocking decision of his fiancée, Camille Moke, to break off their engagement and move in with Camille Pleyel. Less than half-a-year after the December 1830 premiere of Symphonie fantastique, Berlioz was well on his way to creating a work that was part-music, part-poetry (by the composer himself and Goethe). Berlioz called the work “the conclusion and complement” to the symphony, and created a central character, Lélio (to be played by a “first-rate dramatic actor”), the embodiment of Berlioz himself.
The biggest problem is that Berlioz’s text – at turns florid, tepid, and rambling – tries to do too much, acting as dramatic structure, aesthetic manifesto, and artistic apologia, and succeeds at none of them. Worst of all, the handful of jokes at the end aren’t all that funny. Gérard Depardieu brought gravitas and sympathy to the role, but nothing can redeem the overwrought monologue. The music is uneven, though it does have its moments. Mario Zeffiri’s slightly reedy voice suited Goethe’s ballad ‘Le pècheur’ quite well. The choral music is not prime Berlioz. Both ‘The Song of the Brigands’ and ‘Fantasy on Shakespeare’s The Tempest’ outstay their welcome, but the Chicago Symphony Chorus brought strong character to both, and, in the former, Kyle Ketelsen sang with dramatic panache.
While I can’t begrudge the opportunity to hear both works together on the same program, “Lélio” still comes across as an anticlimactic dud. But my hat is off to the excellent vocal forces, Depardieu, Muti, and the Chicago Symphony for presenting the work in its context as sequel. | https://www.classicalsource.com/concert/chicago-symphony-orchestra-muti-in-new-york-symphonie-fantastique-lelio/ |
Wednesday, March 6, 2019
The development of a number of countries in Africa through the knowledge and institutional appreciation of its geological resources, beyond the specific studies for the exploitation of minerals and hydrocarbons, which have been so far.
Geological mapping information is the basis for the exploration and exploitation of natural resources of a country, but is also essential for a proper use of its territory.
The development of a geological map, using traditional techniques, is a slow and expensive process, with a large fieldwork and whose results are subject to ongoing review.
The existing geological mapping in these countries or is fragmented or small-scale (1:1000.000). The integration of the existing mapping with free data obtained from satellite, such as Digital Terrain Models (SRTM and ASTER GDEM) and Landsat 8 images allows the development of Previous Geological Mapping (PGM) to scale 1:100,000, using methodologies based on multicriteria analysis.
This paper compiles the methodological development carried out for the development of PGM of 16 sheets 1:100,000 in the SW Angola (provinces of Namibe, Huila and Cunene) from satellite data.
Read more: | http://www.geodim.es/noticia_en.aspx?page=Remote%20sensing%20applications%20in%20Africa%20for%20mining%20and%20geological%20mapping |
Serverless Security- What are the Security Risks & Best Practices?
Since you’ve landed on this blog, you’re either using a serverless architecture or wanting to know about the security of the cloud computing model––Serverless. In fact, many cloud providers offer robust cloud services via this method and also provide impenetrable security features with their services. Regardless of the architectural pattern of data storage, however, there are many instances of security threats in web or software applications.
A recent incident of such a security threat occurred in March’19 at Norsk Hydro. This unfortunate debacle hurt the company with a steep $71 million hit. They had to suddenly switch from automated to manual operations for a certain period and were forced to stop production at 170 plants. Eventually, Microsoft came to their rescue and helped them put the units back in production.
Another example is a DDoS attack reported by Amazon Web Services in February 2020. At 2.3 Tbps, it was the highest in all records—meaning upto 2.3 terabytes per second web traffic witnessed the impact on AWS servers at a time. Thankfully, AWS Shield staff managed to mitigate the risk. The attackers used the hijacked Connection-less Lightweight Directory Access Protocol, also known as CLDAP web servers. According to ZDNet, the client is unidentified, but the event did cause three days of “elevated threat” for the AWS Shield employees.
These examples go to show that it’s part of our due diligence to learn best practices and save our systems from security risks. Of course, the serverless approach lessens the development team’s burden for security concerns, but it doesn’t nullify them altogether. That’s why it’d be best to first know more about its impacts, risks, and best practices before adopting the model.
Here’s what this post will cover:
- How does the serverless model protect an application without a physical server?
- What do we mean by serverless security?
- Who provides function as a service?
- What are some common security risks?
- What are the security best practices one could follow?
Overview: What is Serverless Security?
Though organizations don’t need to worry about infrastructure-related operations in a serverless model, specific security concerns still need to be addressed.
Here’s why serverless architecture/model needs protection:
- The serverless model doesn’t use firewalls or detection system software(IDS tools).
- The architecture doesn’t have instrumentation agents or protection methods like file transfer protocols or keys authentication.
In this architecture, the data requested by a user is stored at the client-side––for example, Twitter. When you load more tweets, the page is refreshed on the client-side. These tweets are cached in the device. It is the client-side that holds this data. That’s why the focus is on permissions, behavioral protection, data security, and strong code that shields applications from coding and library vulnerabilities.
This means that organizations will focus more on…
- Core functionalities of the product
- Development practices,
- Increasing productivity
- Reduction of time to market
- Customer satisfaction
- Improvement in quality
And will focus less on…
- Operating system
- Runtime environment
- Infrastructure operability and complexity
It’s important to assess the security aspect of modern technology in spite of its advanced features. Of course, cloud computing has taken over the entire world of software, mobile, and web apps, but how does it protect your apps?
You might’ve thought of adopting a serverless model and wanted to know more about its impacts and security concerns.
For instance,
- How does the serverless model protect an application without a physical server?
- Who provides this function as a service?
- What are some common security risks?
- What are the security best practices one could follow?
Before we explore these points, however, it’s essential to understand that cloud providers offer serverless models in the form of two distinct services: i). Functions as a Service ii).. Backend as a Service.
For more information on FaaS and BaaS models, please refer to serverless architecture.
Organizations must take precautions to secure serverless apps because this architecture uses an even smaller approach than microservices. It uses independent, miniature pieces of software that interact using multiple APIs that become public upon interaction with cloud providers. This mechanism creates a severe security loophole where attackers could access the APIs and pose challenges for the security of serverless apps like complex enterprise software.
Here’s the graphical representation of how the serverless model works in comparison with traditional virtual machines:
Check How We Helped Our Client, Food Truck Spaces, To Build Secure Angular App on AWS Stack
What are Some Serverless Security Risks & Challenges
- Insecure configuration: Cloud service providers offer multiple out-of-the-box settings and features. These settings should provide reliable, authenticated offerings. And if configurations are left unattended, it may result in big security threats.
- Function permissions: The serverless ecosystem has many independent functions, and each function has its services and responsibilities for a particular task. This interaction among functions is massive, and it may sometimes create a situation where functions become overprivileged with the permissions/rights–– say, a function to send messages to get access to database inventory.
- Event-data Injection– Different types of input from different event sources have an encrypted message format. And hence, multiple parts of these messages may contain untrusted inputs that need a careful assessment.
Here’s how you can avoid this security risk:
- Keep your data separate from commands and queries.
- Make sure that the code is running with minimum permissions required for successful execution.
- Use a safe API to invoke your function, which avoids the use of the interpreter entirely.
Use SELECT LIMIT and other SQL commands (if your function is dealing with SQL database) to prevent mass disclosure of records in case of SQL injection.
SELECT expressions
FROM tables
[WHERE conditions]
[ORDER BY expression [ ASC | DESC ]]
LIMIT number_rows [ OFFSET offset_value ];
- Insecure Storage– Sometimes, developers prefer to keep application secret storage in plain text configuration, making the application storage environment insecure. These tiny flaws sometimes result in bigger threats of insecurity in serverless hosting.
- Function monitoring & logging– Cloud providers may not provide adequate security facilities in logging and monitoring for applications. It may result in risk factors at the application layer.
Here are some of the report examples that you should generate on a regular basis for effective monitoring and logging. It’s recommended by SANS Essential Categories of Log Reports. You can also set alarms on AWS CloudWatch so that suspicious activity on any of the below-mentioned reports is notified to you––
- A report containing all login failures and successes by user, system and business unit
- Login attempts (success & failures) to disabled/service/non-existing/default/suspended accounts
- All logins after office hours or “off” hours
- User authentication failures by the count of unique attempted systems
- VPN authentication and other remote access logins
- Privileged account access
- Multiple login failures followed by success via the same account
- Broken authentication– Unlike traditional applications, your serverless application is accessible for all once it’s published on the cloud. Also, it promotes even smaller design than microservices and, hence, contains thousands of functions. So, you must apply robust authentication for end-users’ access and carefully execute multiple functions.
Below is how you can make sure if every endpoint is authenticated:
Incorporating an extensive authentication system that exercises control and authentication over these APIs is highly critical.
- We store user’s active tokens in the database and authenticate them against every request. This will let you exercise token authentication, invocation count and expiration time limit. If you’re just starting with the serverless architecture, AWS Cognito is an easy solution which will suffice.
- If at all user authentication is not an option, developers are recommended to use secure API keys or SAML assertions.
- Automatic resource allocation– The serverless application doesn’t get blocked or unavailable when bombarded with fake requests as part of a cyber attack. Instead, the application receives automatic scaling of resources by the cloud provider as a part of the “autoscaling” and “pay for what you use” concept. So the situation becomes unlike with traditional architecture where applications stop serving the requests and make services unavailable during such attacks.
- Poor execution of verbose error messages– Sometimes, developers forget to clean the code while moving the applications to production, and the verbose error messages remain as it is. It results in a breach of secret information regarding serverless functions. It must be withheld within the system as confidential data to protect the apps from attackers.
- System complexity: System’s overall complexity increases while handling multiple functions and dealing with third-party dependencies compared to traditional infrastructure. Thus, it is difficult to detect malicious packages because of the inability to apply behavioral security controls.
- Lack of security testing: Standard apps are rather easy to test without the added complexity of serverless architectures. This is because serverless apps deal with third-party integrations of database services, back-end cloud services, and other dependencies. As a result, it falls short in security testing.
- Complex attack surface- Serverless application has an expanded attack surface because of the vast range of event sources and smaller parts of the application. It deals with different functions which are triggered through multiple interactions. It uses API gateway commands, cloud-storage events, and many others. Therefore, the risk elimination of malicious event-data injections becomes difficult.
This is what you do about dependencies in serverless applications:
- Remove unnecessary dependencies, unused features, components, files, and documentation. Continuously monitor versions of frameworks, libraries and their dependencies on client and server-side both, .
- Components should be obtained from official sources with signed packages to reduce the chance of malicious components.
- Create security patches for the older versions of libraries and its components.
Adnan Rahic, developer advocate at Dashbird, says that the practice of serverless security tends to come with time. When you’re young and eager to build new software, security takes a back-seat ride. You build the app and hope you don’t get hacked. As a developer matures, this mindset changes.
The first step is to learn the standard best practices in programming. Validating input is, by far, the most important. Learning that an input to your system can be malicious regardless of who sends it. Parse it correctly, don’t cut corners here.
Once this is done, the following crucial steps are permissions and secrets. Using AWS KMS is a must if you want to manage secrets and keys efficiently while permissions can be managed with ease through IAM Users and Roles. Bear in mind, this is most crucial for S3 buckets. Secure your buckets immediately because they are the most vulnerable part of the whole system.
Once you have these key steps taken care of, the rest is just keeping it all working flawlessly. This is where monitoring tools come into play. You also need to learn how to utilize Dashbird, Cloudwatch, IOPipe, Thundra, or any other similar tool.
AWS Lambda vs Azure Functions vs Google Cloud Functions: Comparing Serverless Providers
Best Practices for Serverless Security & How to Better Secure Serverless Functions
When you go serverless, you don’t need to think about securing a server unlike with a server-hosted application. However, you’re still sharing responsibility with a serverless model to secure your application. And since it’s a serverless architecture, you need to practice the best methods that protect serverless apps and don’t just detect intrusion on firewalls like in server-hosted apps.
These are several best practices organizations undertake to secure their serverless apps:
- Limited access of permissions
The serverless ecosystem is made up of various functions. Organizations may mistakenly grant permissions to functions by giving them the access to multiple parts of the application.. Organizations also need to limit the access of functions among employees working closely on the projects.
So, they’d be setting permissions and limiting access for two entities:
i) Give limited rights to employees about accessing functions:
You have to limit the permissions to specific roles. For example, you are using AWS or Microsoft Azure as your cloud-service vendor. You can set limits or do a role-based setup for accessing features of functions. Organizations have to decide the roles of their function and distribute them among the employees based on their responsibilities.
ii) Give functions limited access to confidential information:
This is about restricting resources per function. Much like limiting access to a team member, you could also regulate what part of your application a serverless function can access.
It sets a barrier for the functions that cause security breaches. It especially helps when attackers succeed in decoding one function but further fail to access the entire system.
When enterprise systems are in danger, this segmentation of functions becomes a safety net that doesn’t let disasters happen. Permissions granted to particular functions influence its performance on runtime; thus, you should consider limiting access to permissions.
How to create roles and segregate functions to avoid these pitfalls?
- Create custom roles as per the needs and apply them to functions and on individual accounts or to a group.
- Set limits for one account or multiple accounts.
- Create identity-based roles and separate permissions for one user or apply a set of permissions for different roles.
Listed below are some of the resources which can come handy for you:
- Serverless “Least Privilege” Plugin by PureSec
- AWS Identity & Access Management Best Practices Guide
- Microsoft Azure Identity Management and Access Control Best Practices Guide
- Leverage principle of least privilege
- Monitoring serverless functions
You should regularly assess all functions. This enhances your visibility into functions by tracing them end-to-end, quickly detects problems, and focuses on actionable insights. Security teams should also focus on taking audits and network logs at regular intervals.
These are some ways you can manage security logs:
- Keep track of the number of failing executions.
- Track the number of functions executed.
- Assess the performance of functions based on the time taken for execution.
- Measure the concurrency based on the number of times a particular function is executed.
- Measure the amount of provisioned concurrency in use.
- Centralize logs from multiple accounts for real-time analysis.
- Automate security controls
Security teams should automate processes for configuration and test-driven checks. Automating these checks saves you from the complexity and a bigger attack-surface of serverless architecture. You can integrate tools for continuous monitoring and access management. For example, there are several dependency scanners like snyk.io. Development teams can also write codes that automate scanning of confidential information and checking of permissions.
Refer to this potential checklist to automate security controls:
- Check if the function permissions are allowing excessive provisions for attackers.
- Involve security analysis in CI/CD pipeline; automate continuous checking for vulnerabilities.
- Educate development teams on moving infrastructure as code.
- Implement audit-logging policy and network configuration to detect compromised functions.
- Third-party dependencies
Developers often derive components from various third-party platforms. It’s a best practice to check the reliability of sources, and whether the links they’re referring to are secure. It saves you from unexpected vulnerabilities. What’s more, remember to check the latest versions of components used from open-source platforms. Because developers mostly use open source components in modern applications, it’s hard to trace vulnerability in code or detect any issue. It’d be best if you can get timely updates and latest versions. It keeps you ahead of time and avoids unplanned threats.
How to do it?
- Regularly check updates on development forums.
- Avoid using third-party software with too many dependencies.
- Use automated dependency scanner tools.
- Handling credentials
It’s recommended to store sensitive credentials like databases in safer places and keep their accesses extremely secure and limited. Furthermore, be extra careful with critical credentials like API keys. Set environment variables to run time-evaluation settings; then, deploy time in configuration files. It could be a nightmare if the same configuration file is used in multiple functions, and you have to redeploy services if variables are set at deployment time.
What are some ideal practices?
- First and foremost, rotate the keys on a regular basis. Even if you’re hacked, this ensures that access to hackers is cut-off.
- Every developer, project, and component should have separate keys.
- Encrypt environments variables and sensitive data using encryption helpers
- Deployment at a specific time
You should see what’s the best time to deploy an application module that creates a bug-free platform for users. Ensure that you deploy modules when users are not engaged with the platform in real-time, and your platform’s experiencing less traffic. To protect applications against attackers, you could restrict the deployment to certain time intervals.
What should be an ideal deployment practice?
- Deploy at idle times.
- Avoid rush hours like Black Friday.
- Avoid huge system updates in real-time; set specific time slots for upgrades.
- Geographic considerations
Developers should keep in mind certain geographic considerations while deploying app modules. Code deployed from different geographic locations could create code-related issues. For example, a developer located in New York uses US-East-1 timezone while a developer from Asia uses a different time zone in deployment settings.
- Use a single region or a suitable time zone for deployment.
- Use Safeguard while handling serverless framework to avoid unexpected problems in contentious development and to manage dependencies of work.
What to do Next?
Serverless architecture introduces a new paradigm of application development. And there’s no denying that new opportunities do have unique challenges. However, it could also mean incredible benefits in return––such as cost-efficiency, scalability, and ease of managing infrastructure.
As this architecture shifts the organization’s focus from infrastructure operations to developing quality code, it also requires people to remain extra careful in giving cloud providers a responsibility to handle your application infrastructure. And thus, one has to play it carefully and sensibly while adopting security best practices for this technology.
What’s more, with companies increasingly going ‘serverless’, cloud providers have become sure to offer exceptional security features from their end. Do you have experience with serverless security and security best practices about this architecture? Share it with me in the comments section or join me on Twitter @RohitAkiwatkar to take the discussion further. | https://www.simform.com/blog/serverless-security/ |
Summer Camp 2013
AUSTIN, TX - The annual NVTO SummerCamp took place recently in Austin, Texas, over the weekend of July 20-21, 2013. More than 40 practitioners representing 7 NVTO-affiliated schools from across the country converged for a weekend filled with 8 hours of hands-on training. Participants engaged in a mix of fighting applications, reflex training, street self-defense, anti-grappling, and refinement of their skills.
Conducting testing at the seminar were Sifu Kenny Felton (4th degree) and Sifu Robert George (4th degree), both of the NVTO HQ. Over the weekend, a total of 25 participants advanced in rank, including Jim Gillentine of the Dallas school and Andrew Lucchesi of Austin, both of whom passed the rigorous test for 2nd Degree Instructor. Additionally, four assistant instructors completed the test for Sg 12 (Gary Mowbray, Avi White, Jason Miller and James Adams). These four will now begin the arduous preparation for the 1st Instructor Degree test.
Of particular interest at this camp were two programs taught by Master Webb: SwiftDefense® which was taught to beginners and Soft Defenses which was taught to the advanced students.
SwiftDefense® is a program that teaches verbal and physical skills for avoiding conflict. While beginners are heavily drilled in basic striking, countering, and anti-grappling; the SwiftDefense® training gives them the possibility of avoiding a physical fight altogether.
As Master Webb explained, "It's common knowledge that street thugs profile their victims, looking for someone who will be an easy mark. SwiftDefense® teaches the student how to 'not fit the profile.' However, physical conflicts can't always be avoided, afterall it's the attacker who ultimately decides whether or not you will have to defend yourself. In those circumstances, a beginner's best defense against an aggressive, larger attacker is to hit them with everything they've got."
The Soft Defenses, on the other hand, utilize techniques and strategies which teach how to subdue an attacker without unnecessary injury. According to Master Webb there are reasons why this mode of training is learned at the advanced student grades, "Generally speaking, most martial arts beginners are not skilled or experienced enough to risk a prolonged encounter with a seasoned street thug. Our NVTO Soft Defenses program is taught to advanced students and also to LEO's (law enforcement officers) with the goal of overcoming and controlling an attacker by less-lethal means. Unfortunately there is a trade off, because what is less-lethal against a combative street thug is less safe for the person defending themselves. Nevertheless, our Soft Defenses program combines the best of both worlds; a less-lethal defense with a high level of effectiveness."
Following the seminar, a very special anniversary was observed. Thirty years ago in June of 1983, Master Webb began his study of martial arts with Japanese Karate. Two years after that he switched to learning Ving Tsun kung fu and has continued ever since. In honor of his 30 years of martial arts, we presented our teacher with a large fold-out card which had been signed by all of the seminar participants. Master Webb was indeed surprised and commented, "It's been a long journey and one which I look forward to continuing. I really appreciate the card, the warm thoughts and the opportunity to make an impact in my students lives." Thus ended another fantastic camp, and on behalf of the students, "Congrats Si-Fu, 30 years and still going strong!!!" | http://vingtsunaz.com/blog/summer-camp-2013/ |
The School of Law, is a part of CHRIST (Deemed to be University), Bangalore a premier educational institution accredited with an A grade in 2016 by NAAC, dedicated to the motto of ‘Excellence and Service’.
About the E-Conference
The world has been grasped by an unprecedented global pandemic. Human rights violations, governmental actions sparking constitutional debates and issues pertaining to environment conservation have been on the rise.
In the light of such predicaments, School of Law, CHRIST proposes its 11th National E-Conference on “Contemporary Legal Issues and Reflections amidst the Pandemic”.
The committee shall also conduct webinars on the themes of the E-Conference to provide expert insights. The E- Conference is in collaboration with EBC & SCC Online as the media partners and Libertatem Magazine as the knowledge partner.
Call for Papers
The E-Conference calls for submissions on the following theme and sub-themes:
Theme I : Challenges to Justice Administration vis-a-vis Human Rights
1. The Rising Gender Based Violence during Lockdown
2. Impact of COVID-19 on the Criminal Trial Procedure
3. Resort to ODR in Resolving Commercial Disputes
4. Balancing between Parole and Prison during COVID 19
Theme II : Impending Constitutional Debates and Discussions
1. E-Pharmacies, Clinical Trials - Contravention of Health Rights?
2. Centralised Control of COVID 19 and Federalism
3. PM CARES Fund : Transparency and Accountability Analysis
4. Imposition of Contact Tracing Apps : A Privacy Perspective
Theme III : Environmental Law and Policy Framework
1. Control and Management of Bio-Medical Waste
2. Regulation of Contagious Virus Genome Editing : An International Perspective
3. Obviating Inhumane Treatment of Animals: A Necessity
4. COVID 19 and the International State Responsibility
Theme IV : Contemporary Legal Predicaments and Developments
1. Farm Acts: A Strike on Socialistic Ideals?
2. Permissibility of “Act of God” excuse to reduce GST Compensation
3. Right to Dissent v. National Security: Freedom of Speech and Expression
4. Examining the impact of Dilution in Labour Laws
The list of afore-mentioned themes is suggestive in nature and meritorious contributions on other sub-themes related to the broad theme are also invited. The authors may also incorporate jurisprudential or international perspectives to their papers based on the area chosen.
Who Can Attend?
Academicians, practitioners, research scholars, and students are invited to submit research abstracts on selection of which the authors shall be required to submit full papers and present the same at the E-Conference.
Important Dates
Abstract Submission November 20, 2020
Communication of Acceptance of Abstract November 25, 2020
Last date for Registration and Payment December 10, 2020
Submission of Full Papers December 27, 2020
Dates of the E - Conference January 22 - 23, 2021
Platform
CISCO WebEx shall be used for paper presentation and conduct of National E-Conference.
Submission Guidelines
The abstract should not exceed 300 words, and must be accompanied with a cover page stating:-
Sub-theme
Title of the Paper
Name of the Author(s)
Name of the Institution
E-mail Address
Postal Address
Contact number
Registration fee
For Students: INR 700/- for single authorship and INR 1000/- for co-authorship.
For Professionals and Academicians: INR 900/- for single authorship and INR 1200/- for co-authorship.
Contact Details
For any further clarifications mail us at [email protected] or, contact the Student Convenors:
Rajveer Singh Gurdatta +91 9292829292 [email protected]
Ann Clara Tomy +91 9606842848 [email protected]
If you would like your event to be published on Bar & Bench, please fill in the form available here. | https://www.barandbench.com/apprentice-lawyer/call-for-papers-school-of-law-christ-deemed-universitys-national-e-conference-submit-by-nov-20 |
Viruses have been found everywhere on Earth. It is believed that viruses outnumber bacteria by 10 to 1. A virus is a small collection of genetic code, either DNA or RNA, which is surrounded by a protein coat. 1 While a virus cannot replicate alone, it must infect cells and use the host cell to multiply further. Recent studies have shown that viruses can copy your genetic code and create new human virus genes.2 Let us understand more about this.
Understanding Viruses
Viruses are microscopic organisms that have two or three components. There is nucleic acid in the inside, which can be RNA or DNA. In either of the cases, the nucleic acid can be single or double-stranded. Surrounding this is a protein coat, in the form of a capsid or small units arranged in a particular manner. Some viruses also have an envelope, which they obtain as they emerge from a cell.
Viruses are continuously changing due to their genetic selection. They keep undergoing subtle changes through mutation when an error is incorporated in the viral genome and major genetic changes through recombination. Recombination occurs when there is an exchange of genetic information between co-infecting viruses, giving rise to a new virus. Recombination of viruses can occur by two mechanisms namely, independent assortment and incomplete linkage. IN any case, it can produce new viral serotypes or viruses with altered virulence.3
Can Viruses Copy Your Genetic Code And Create New Human Virus Genes?
It is known that a virus can infect the host and turn into a factory of producing more copies of itself. Recent findings suggest that several viruses can steal the genetic signals from the host to expand.2
This gives rise to a new concept based on the latest finding that viruses can copy your genetic code and create new human virus genes. In a study published in the journal Cell, the researchers have shown that a large group of viruses can grow their genomes by copying the signals from their hosts.4
It was a cross-disciplinary collaborative study in which a team of expert virologist was involved. It was led by researchers at the Global Health and Emerging Pathogens Institute of Icahn School of Medicine in New York, and at the MRC-University of Glasgow Centre for Virus Research in the UK.2
The team studied the genetic diversity and capability of protein synthesis of a group of viruses. This group which is known as segmented negative-strand RNA viruses (sNSVs) revealed that a variety of pathogens are capable of combining host and viral sequences and could code for new proteins. These viruses include serious pathogens affecting humans and domesticated plants and animals, which included influenza viruses and the Lassa virus that causes Lassa fever.
The ability of the viruses to steal the genetic signals and code new proteins can result in a huge range of unknown, undetected proteins.
Such types of proteins were not known earlier. The researchers named them Upstream Frankenstein Open reading frame proteins (UFO), as they are encoded by stitching together the host and viral sequences.2 These UFO proteins, which were not known earlier can be a great breakthrough in determining ways to treat and prevent viral diseases. They can be exploited for discoveries of vaccines and medicines and help to alter the course of viral infection.
As reported by the researchers, the capacity of a pathogen to overcome host barriers and establish infection is based on the expression of pathogen-derived proteins. To understand how a pathogen antagonizes the host and establishes infection, it is necessary to have a clear understanding of what proteins a pathogen encodes, how they function, and how they contribute to virulence.
Viruses are incapable of making their proteins. Hence, for them to survive, they must catch hold of a host and snatch their cells. The viruses enter the cells, hijack them, and make their way to feed protein-making instructions into the protein-making factory of the host cell. It is believed that viruses do this by a process called cap-snatching. In this, they cut one end of the cell’s protein-encoding messages, which is a messenger RNA or mRNA. The sequence is then extended with a copy of their genes. This makes a hybrid message. The recent stud shows that the host sequence is not silent and the message provided is not solely by the virus. Based on the latest research, it is known that as sNSVs can make mRNAs using their genes, they can make instructions on protein-producing that feature host-derived start codons. This technique is called start snatching.
The researchers further stated that viruses take over their host at the molecular level, and this work identifies a new way in which some viruses can wring every last bit of potential out of the molecular machinery they are exploiting. While the recent findings and work are done here focusses on influenza viruses, it implies that a huge number of viral species can make previously unsuspected genes. They also aim at focusing on the next step, which is to understand the distinct roles that the unsuspected genes play.
This finding that viruses can copy your genetic code and create new human virus genes can pave way for further research and development in the field of healthcare. The researchers can use this knowledge to help disease eradication. A large global effort is required to stop viral epidemics and pandemics, and these new insights may lead to identifying novel ways to stop the infection. | https://www.epainassist.com/articles/can-viruses-copy-your-genetic-code-and-create-new-human-virus-genes |
Vatican City!
Vatican City: Vatican Museums. Go Now!
Vatican City
The smallest country in the world offers the heart of Catholicism and among the
world's finest art collections, including the Sistine Chapel and the Raphael
Rooms (ceiling pictured). Go to Vatican City!
Albania!
Albania: Village of Theth! Go Now!
Albania
Albania is unique in Europe, starting with its Muslim heritage, but expanding to
include food, culture, and even its natural beauty. Explore Albania!
United Kingdom!
United Kingdom: Oxford's Christ Church.
Go Now!
United Kingdom
This country includes England, Wales, Scotland, and Northern Ireland with four distinct
cultures to match. Explore the United Kingdom!
Armenia!
Armenia: Noravank Monastery. Go Now!
Armenia
With a unique language, foods, architecture, and identity, Armenia is a fascinating
country and culture unlike no other in the world. Begin Your Journey!
Latvia!
Latvia: Art Nouveau in Riga. Go Now!
Latvia
Latvia is small, but has a diverse history, foods, and architecture (shown), which
includes aspects from both Eastern and Western Europe. Begin Your
Journey!
Germany!
Germany: Town Hall. Go Now!
Germany
Food, beer, natural beauty, and more create a country that's known for its distinct
culture and history. Go Now!
Iceland
Iceland was named by Floki Vilgerdarson, who spent a winter in Baroastrond and
gave the island the name after regularly viewing ice drifts in the nearby fjords.
Prior to this, the island held many names, including "Snowland" and "Gardarsholmi,"
which was named after Gardar Svavarsson.
Ísland
Introduction:
Iceland has one of the world's shortest histories and it seems likely that people
didn't arrive to the island until the 800 or 900s. However, these first settlers
brought with them a culture and lifestyle that still exists in many forms today.
However, with a changing world landscape, the culture has also rapidly changed in
modern times as foods, clothing, and other items are imported into this small island
nation daily as there is now a reliance on foreign goods for survival.
The first settlers on Iceland were ethnic Norwegian explorers, who arrived during
the Viking Age. These people brought with them a sense of adventure, an ability
to survive harsh conditions, and an almost capitalistic attitude of economic gain
and wealth. However, the people also brought with them political organization, advanced
technology, and more.
Your Guide to Iceland:
● Iceland Page
● Culture & Identity
- Food, Dining,
& Drinks
-
Ethnicity, Language, & Religion
- Social
Life
- Architecture
● History
● Geography, Weather, & Wildlife
● Blogs
For much of Iceland's early history their culture and lifestyle progressed with
Norwegian changes as the people continued to speak a language similar to Norwegian,
they ate foods that were similar, technologies were similar, and communication was
primarily done with other Norwegians. However, their lifestyle was also quite different
and unique. Despite its northerly location, Iceland is a geothermal hot spot, allowing
plants to grow and giving the island a longer growing season than one would expect,
making survival a bit easier, but also altering the lifestyle from the Norwegians
and others.
These changes and the isolation of Iceland helped the Icelandic culture develop
on its own path as the language diverged, foods changed, and other aspects of the
culture grew steadily more diverse. Contact with Norway, and later Denmark continued
though and most of the outside influences to Iceland came from these countries,
including the introduction of Christianity and later Lutheranism. This contact and
foreign rule also led to a stronger Icelandic identity and culture beginning in
about the 1800s.
Today Iceland remains closely tied to Norway, Denmark, and the rest of Europe, but
in terms of culture and lifestyle, the Icelanders are growing more unique. Their
long periods of isolation, their lifestyle on an island, and the recent introduction
of foreign products has continuously altered the culture and people on Iceland as
they at times seem isolated, but at others seem to be on the verge of progress and
growth as they boast a unique architecture and nearly everyone is well educated
as the people look inward for values and identity, but outward for technological
inspiration and advancements.
The shape and location
of the cross on Iceland's flag is modeled after that of Denmark, who previously
controlled the island. The colors are representative of the island itself as the
blue represents the waters around the island, the white represents the snow and
ice, while the red represents the volcanic lava and fires.
Name: Republic of Iceland
Independence: June 17, 1944
Capital: Reykjavik
Currency: Icelandic Krona
Population: 315,281 (2013 estimate)
Ethnicity: Icelandic
Language: Icelandic
Religion: Lutheran Church of Iceland
Travel Planner
Newsletter
Information for Iceland was last updated: March, 2014 ● View our: | http://safaritheglobe.com/iceland/ |
I love your books Mr. Sinek, but with all due respect, your answer on millennials in the workplace was wrong.
Unless you've been without internet for a few weeks, you've seen Simon Sinek's video on the millennial generation in the workplace. The short clip has been viewed more than 50 million times in a couple of weeks. If you missed it, here is the interview.
Obviously, the world is still trying to figure out the "millennial question." While Simon Sinek does make a few great claims, many of his interpretations were wrong. I can go into detail, line by line, but I won't for a reason. There's nothing gained by arguing my opinion about characteristics, behaviors, and tendencies over Mr. Sinek's opinion. After all they are just interpretations.
For the record, I don't only train, coach, and develop millennials, I am one as well. However, according to Mr. Sinek's wrong dates of the millennial generation, I am not a millennial. I have not found any studies citing millennials born starting in 1984, unless you are watching Survivor: Millennials vs. Gen X. Research collectively dates millennials no later than 1982 with a select few suggesting 1983.
Understand the Importance of Why Simon Sinek Was Wrong
It is important to understand why Simon Sinek was wrong. He made a claim about a generation that was completely generalized and isolated to his experiences, conversations, and some research. However, he never cited any research. I would be interested to know what research brought him to this conclusion.
With that said, there's no fault to an interpretation, but you CANNOT generalize an "entire generation," as he said, on an interpretation. You cannot even make the majority claim to most of his interpretations.
Whenever "experts" begin explaining the millennial generation, I want to stop listening. The explanations are an attempt to have an answer. The sense of obligation to have an answer is understandable. From Mr. Sinek's thought-leader position in the business world, he must especially feel the pressure to have an answer. I am sorry though, you cannot answer the "millennial question" in 10 minutes or even 60 minutes. There are too many variables involved impacting the "millennial question." To be clear, there are too many variables to definitively label any generation for that matter. Every individual, regardless of generational alignment, is unique to their experiences, characteristics, and talents. Generational insight can be helpful, but it still doesn't define an "entire generation."
When businesses ask me the "millennial question," I preface my answer with this statement, "I can give some key indicators to give you insight, but by no means does it answer the real question."
The Real Question About Millennials
The real millennial question needs more questions for clarity. Clarity gives more usefulness to the original question.
- Are you needing better employee production?
- Are you struggling to know how to lead millennials?
- Are there communication breakdowns with millennials?
- Are you needing to know how to retain millennials?
- Are you wondering how to train millennials for leadership?
- Are you experiencing a morale challenge with millennials on your team?
- Are you looking to design a program with millennials in mind?
- Are you wanting to know how they like to learn?
These questions can infinitely continue, but until there is more understanding behind the initial question, the world will not have a good answer to the broad millennial question.
The bottom line is you cannot characterize millennials by four factors to determine an entire generation of more than 75 million people. You just cannot do that, it's too restrictive. Admittedly, there are trends and tendencies, but no broad stroke characteristics for an entire millennial generation.
My best advice to people wanting to understand millennials better, get to know them as individuals.
---
Want to know what's true about the millennials? Join me as a guest on a webinar hosted by Skillsoft in February. The focus will be on debunking millennial myths and helping businesses maximize the emerging talent in your workplace. | https://www.huffpost.com/entry/why-simon-sineks-video-on_b_14008492 |
How foreign language teachers are handling remote learning
Three foreign language teachers explain how their class has changed becasue of remote learning.
December 7, 2020
Foreign language is a subject that is usually taught on a daily basis to help students retain knowledge. The COVID-19 pandemic forced teachers to take this everyday learning and morph it into an every-two-or-three-day learning structure. With this new system comes multiple hardships, but also room for creativity, as foreign language teachers try to navigate the bumpy road that is remote learning.
Spanish
Perhaps more important than the fact that teachers cannot teach students in-person is the wrench that remote learning throws into the normal student-teacher dynamic. Spanish teacher Susan Mosby, who has been teaching at Creek for 18 years, is missing her emotional connections with students more than anything else.
“Students come in, we look each other in the eye, we have the smiles,” Mosby said. “Last year there was 100 times more laughter and ease of movement. We had a lot more interactive types of activities that allowed me to talk to students and get to know them better.”
Mosby teared up when discussing how much she misses her students.
“Every day face to face is really what allows me to create a culture in my room where we know that we’re going to learn and we know that we’re going to have fun. I feel like I have not been able to create that this year, there’s just been, I don’t know, a wall between us.”
While she is still trying to communicate with her students, losing the ability to check in on their mental health is another tear-jerking issue for Mosby.
“I can’t see if my students are happy or sad,” Mosby said. “I can’t read their emotions and check in properly. Everyone just seems so neutral and quiet under the mask, and it’s even harder to tell at a distance.”
Foreign language teachers have the unique opportunity to incorporate the rich culture of the countries who speak the language they are teaching into everyday classroom life. Creating a bright and lively environment is as much a part of foreign language teaching as the language itself. This feeling of culture is lacking on Zoom calls and Teams.
“I miss my themed days like Leer lunes, Música Miércoles, and Juego Jueves [Reading Monday, Music Wednesday, and Game Thursday],” Mosby said. “We had March Madness last year… it was a competition between 16 different songs, and we would be listening to them and then voting for them. We made a bracket, and students were competing against each other, then we all got to vote. It’s a great world stage kind of activity that we will not be able to have this year.”
But, there are always creative solutions to be found. The COVID-19 pandemic forced Mosby to scrap many of the activities she would do during a normal year, yet she is still finding ways to teach Spanish culture, such as showing videos to her class.
“I like to use authentic resources such as video from television programs or movies,” Mosby said. “For example, in order to demonstrate the use of the imperfect tense, I used a video of a girl from Spain who was talking about her childhood. I also use literature and poetry to integrate culture.”
French
For French teacher Susan Bowditch, remote learning has brought more than one level of difficulty, but she’s optimistic about what this pandemic is allowing her to discover about the digital aspect of her subject.
“I love learning more about computer-assisted language learning,” Bowditch said. “Through collaboration with my colleagues and some excellent feedback from my students, I am learning how to use technology in language learning more effectively.”
Remote learning has also brought its challenges, of course. In a world language classroom, conversations and interactions among students and teachers is key, and teaching French online makes that nearly impossible for Bowditch.
“I really enjoy the classroom environment, engaging with my students, supporting them as they collaborate with each other, and building a classroom community together,” Bowditch said. “I even miss not being able to greet my students at the door every day as they walk into class.”
However, Bowditch ultimately hopes that the good will outweigh the bad once we get back to school.
“Ultimately, I believe that my students and I will have many more tools for learning. We will all be more adaptable, and we will have a greater appreciation for each other,” Bowditch said.
Latin
As the only Latin teacher at Creek, Amy Rosevear has a lot on her hands teaching all four levels of the language. Remote learning doesn’t seem to be the best replacement for in person learning, but she’s confident that we’ll get through it working beside one another.
“I plan remote lessons for all four levels of Latin pretty much on my own. I have a PLC (Professional Learning Community) with the Smoky Hill Latin teacher, and we meet once a week and support each other. But, I’m doing almost all of the day-to-day lesson planning, grading, and reflecting on my own.”
Rosevear also mentioned that remote learning doesn’t allow for the normal classroom opportunities in-school learning brings.
“In a typical year, our Latin class would involve a lot of collaborative activities and opportunities to get out of your desk, move around the room, and interact with your classmates.”
Nonetheless, remote learning does allow for some alternatives. These substitutes can ease us through the content even though they aren’t as collaborative.
“I know that there are ways to split the class up into breakout rooms on Zoom, but it’s still not the same as face-to-face interaction and the organized chaos of a collaborative activity in the classroom.”
The workload is a lot for both Rosevear and her students, but she believes that everyone is doing what they can even though the actual time spent in a classroom environment is lacking during remote learning. | https://unionstreetjournal.com/2020/12/how-foreign-language-teachers-are-handling-remote-learning/ |
Stas Boukarev <email address hidden> writes:
> I don't think that there's actually any ambiguity anymore.
> "(typep object '(complex type-specifier)) returns true for all complex
> numbers that can result from giving numbers of type type-specifier to
> the function
> complex, plus all other complex numbers of the same specialized
> representation. Both the real and the imaginary parts of any such
> complex number must
> satisfy:
>
> (typep realpart 'type-specifier)
> (typep imagpart 'type-specifier)"
Oh wow, I had completely not seen this on the page for TYPEP. I'd been
assuming that everything I needed was on the System Class COMPLEX page
:-(
> None of the sentences contradict each other, but when you combine them
> all you get a restricted space of (and (typep realpart
> 'type-specifier) (typep imagpart 'type-specifier))
I now think that the two sentences you've quoted above do contradict
each other, except if (upgraded-
Otherwise the upgrading brings in complexes (by the first sentence)
whose components don't match the type specifier (contradicting the
second sentence)
Maybe a trivial upgraded-
wouldn't be the worst outcome, I suppose, but it's not great. I'm
pretty sure the standardizers weren't thinking about exotic values of X
but the text is what it is.
> it was probably worded that way to handle (complex float), and it's
> even stated that array and complex types are handled differently.
> "The small differences between the subtypep specification for the
> array and complex types are necessary because there is no creation
> function for complexes which allows the specification of the resultant
> part type independently of the actual types of the parts."
This is talking about subtypep, not typep. I know they're related... I
agree that the difference looks like it's intending that (complex real)
is OK and means the union of all complexes (and (complex float) is the
union of all floaty complexes). | https://bugs.launchpad.net/sbcl/+bug/1733400/comments/8 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.