content
stringlengths 0
1.88M
| url
stringlengths 0
5.28k
|
---|---|
below.
89. Enter the following width and height coordinates
in the Transform palette then drag the rectangle until
it snaps to the margins in the lower right corner. That
will determine the x and y coordinates of the rectangle.
90. Click the Fill Ink icon in the Toolbox (or bring
up the Inks palette) and in the Color tab click the
black ink tile to apply a black fill to the rectangle.
91. Drag the percentage slider to the left to apply
a 20% tint to the black fill.
Note: We are using the default
pen ink (black) and stroke width (1 point) for this
rectangle.
Click Here To Continue... | https://sketchpad.net/cnvtechdoc3m.htm |
Greta's Goodies: Duck Egg Crème Brulee
There are very few desserts that beat the richness and decadence of a crème brulee. In Greta’s house, it’s a family favorite. Including time in the refrigerator, it’ll take more than 6 hours to craft your own. But it’s well worth the work and wait.
Using Duck Eggs
Once again, Greta is using duck eggs to make a special desert for her family. That’s because one of her little ones is allergic to a protein found in chicken eggs. Plus, the duck eggs add extra richness to the treat. This recipe can use either duck or chicken eggs. Just be sure to measure your egg yolks in a measuring cup.
Ingredients
- 4 cups heavy cream (chilled)
- 2/3 cup granulated sugar
- 1 vanilla bean (halved lengthwise)
- ¾ cup large egg yolks (we used duck eggs)
- ¼ cup turbinado sugar
- Pinch salt
Coastal tip: Save the egg whites to create Greta’s Light and Airy Angel Food Cake. You can store them safely in the refrigerator for up to a week.
Directions:
Preheat the oven to 300º F and place the rack on the lower-middle position.
Next, start a kettle of water to boil. Then cover the inside bottom of a baking pan with a dish towel and place eight 6-ounce ramekins into the pan so they do not touch.
In a medium saucepan, combine 2 cups of cream, 2/3 cups granulated sugar and the salt. Now, remove the seeds from your vanilla bean and add those to the saucepan.
Bring the mixture to a boil, stirring to dissolve the sugar. Take it off the heat and allow it to sit for 15 minutes. Finally, stir in the remaining 2 cups of cream.
In another bowl, slowly whisk the egg yolks and 1 cup of your cream mixture until smooth. Whisk in remaining mixture and combine thoroughly.
Now, pour your mixture through a fine-mesh strainer into a large measuring cup. You now have your crème brulee custard.
Pour that custard evenly into your ramekins.Carefully pour boiling water into the pan until you reach 2/3 of the way up the side of the ramekins.
Bake until the top of the custard is barely set. This should take about 35 minutes.
Take the ramekins out of the baking pan and place on cooling racks for 2 hours. Then, cover each with plastic wrap and refrigerate for at least 4 hours.
When you’re ready to serve, take out of the fridge, blot the moisture from the top, and sprinkle each with turbinado sugar.Using a torch, caramelize the sugar on the top of each dessert.
Finally, refrigerate again for 30 minutes and serve.
Find Everything You Need at Coastal
Your Northwest owned and operated Coastal has everything the country needs, including canning supplies, camping gear, feed for your livestock and pets, as well as tools, clothing, gardening supplies, and so much more. Come on by and check out every aisle while you wait for your crème brulee to cool.
Frequently asked Questions:
What is crème brulee?
Crème brulee is a French custard-based dessert topped with a layer of caramelized sugar.
What ingredients are in crème brulee?
There are essentially 6 ingredients in crème brulee. They are: heavy cream, granulated sugar, vanilla bean, eggs, turbinado sugar, and salt.
Can you freeze crème brulee?
Once you’ve made your crème brulee and allowed it to cool to room temperature, it is possible to cover each ramekin tightly and freeze the contents safely for up to 1 month.
Is crème brulee served cold?
Yes. Once you’ve caramelized the sugar on top of the dessert, the recipe calls for you to refrigerate for 30 minutes before serving. | https://www.coastalcountry.com/resource/blog-posts/country-kitchen/gretas-goodies-duck-egg-creme-brulee |
Q:
Problem with solving a complicated Integral
I need to determine the $ \int \frac{\sin^3(x)}{8-\cos^3(x)} dx$. It's an indefinite integral.
A:
Hint: $\sin^3(x) = \sin(x)(\sin^2(x)) = \sin(x)(1-\cos^2(x))$
Take $u = \cos(x) \Rightarrow du = -\sin(x) \ dx$
So we have, $- \int \frac{1-u^2}{8-u^3} du = -\int \frac{1}{8-u^3} du - \int \frac{u^2}{8-u^3} du $
| |
Devices for placing bearing jewels, bearing sleeves, or the like in position {(fixing jewels A44C 17/04; tools for assembling and taking apart gear wheels and bearing components B25B; machines for the manufacture of bearing jewels and components G04D 3/0002)} [2013-01]
Timing devices for clocks or watches for comparing the rate of the oscillating member with a standard {(supporting devices for clocks with built-in recording apparatus G04D 1/063; measuring short time intervals G04F 10/00; frequency measuring in general H04B, G01R)} [2013-01]
G04D 7/1207
. .
{only for measuring} [2013-01]
G04D 7/1214
. . .
{for complete clockworks} [2013-01]
G04D 7/1221
. . . .
{with recording, e.g. vibrograph} [2013-01]
G04D 7/1228
. . . . .
{Devices for facilitating the reading or the interpretation of the recording} [2013-01]
G04D 7/1235
. . .
{for the control mechanism only (found from outside the clockwork)} [2013-01]
G04D 7/1242
. . . .
{for measuring amplitude} [2013-01]
G04D 7/125
. . . .
{for measuring frequency} [2013-01]
G04D 7/1257
. .
{wherein further adjustment devices are present} [2013-01]
G04D 7/1264
. . .
{for complete clockworks} [2013-01]
G04D 7/1271
. . .
{for the control mechanism only (from outside the clockwork)} [2013-01]
G04D 7/1278
. . . .
{whereby the adjustment device works on the compass} [2013-01]
G04D 7/1285
. . . .
{whereby the adjustment device works on the mainspring} [2013-01]
G04D 7/1292
. . . .
{whereby the adjustment device works on the balance wheel} [2013-01]
G04D 9/00
Demagnetising devices [2016-05]
G04D 99/00
Subject matter not provided for in other groups of this subclass [2013-01]
| |
This crumb-topped butternut squash casserole is made with a combination of sliced butternut squash and apples. The apples complement the squash perfectly and the simple crumble topping—lightly spiced with cinnamon and nutmeg—is the perfect finishing touch.
This is an excellent side dish for any fall meal and it would be a perfect holiday dinner casserole.
Pecans would be good in the topping as well or use chopped walnuts. It's a good lower carb alternative to a crumb-topped sweet potato casserole, too. Or add it to your menu along with a sweet potato dish.
You can make this casserole with other types of winter squash as well. Hubbard squash, acorn squash, and sugar pumpkins can be used as a replacement for butternut squash in any recipe.
Ingredients
-
1 (2- to 2 1/2-pound) butternut squash
-
2 tart apples, such as Granny Smith
-
1/2 cup dark brown sugar, firmly packed
-
4 tablespoons (2 ounces) unsalted butter, chilled
-
1 tablespoon all-purpose flour
-
1 teaspoon salt
-
1/4 teaspoon ground cinnamon
-
1/4 teaspoon ground nutmeg
Steps to Make It
-
Gather the ingredients.
-
Preheat the oven to 350 F / 180 C / Gas 4.
-
Butter a 2- to 2 1/2-quart baking dish.
-
Peel, seed, and cut squash into small slices. Core the apples, peel, and cut into thin slices. Toss squash and apples together. Transfer squash and apple slices to the prepared baking dish.
-
Combine brown sugar, flour, salt, cinnamon, and nutmeg; cut the butter in with a fork or pastry cutter until crumbly. Sprinkle crumbs evenly over sliced squash and apples. Cover the casserole dish tightly with foil and bake in the preheated oven for 50 to 60 minutes, or until the squash is tender.
-
Serve and enjoy!
Tip
- To peel a butternut squash, use a sharp chef's knife to cut off the ends of the squash. Hold the squash in one hand and use a sharp vegetable peeler to peel the squash. Place the squash on the cutting board on its flat bottom. Starting at the top, carefully slice it in half with your chef's knife. Scoop out the seeds and scrape out the loose stringy pulp. Slice each half in half again (lengthwise) and then slice each piece crosswise.
Recipe Variations
- Add chopped pecans or walnuts to the crumb mixture.
- Substitute sliced pears for the apples.
Recipe Tags: | https://www.thespruceeats.com/butternut-squash-and-apple-casserole-3062215 |
PURPOSE
HISTORY
DESCRIPTION OF THE INVENTION
BRIEF DESCRIPTION OF THE DRAWINGS
DESCRIPTION OF A PREFERRED PERFORMANCE
The purpose to which the invention protected by this Patent refers consists of a "Posterior vertebral body fastening device in the lumbar region".
This is made up of a set of mechanical means the structure of which has been designed with an arrangement that permits, by means of fastening some of its component elements with screws to the vertebra, obtaining stabilization of a vertebral level of the lumbar column.
The screwed posterior fastenings presently used on the lumbar column are transpedicular. The screws penetrate the two pedancles, made up of a type of osseous cylinders beginning at the back part of the vertebral body to surround and protect the spinal cord.
The transpedicular fastenings presently constitute optimum performance of the instrumentation for the vertebral column and, therefore, are used in almost all surgical techniques, including those in which it would be more suitable to consider another type of fastening.
The Posterior Lumbar Interbody Fusion (PLIF) consists in the bone fusion of two adjoining vertebral bodies through the intermediate space between them, known as the discal space as it is occupied by the intervertebral disc in normal conditions. Usually a bone graft has been used to occupy this space and favor the fusion, although in the last years the use of prefabricated boxes to increase the resistance of this type of graft has grown, whilst the use of transpedicular fastening is generalized when only grafts are made.
The use of grafts of prefabricated boxes in PLIF is accompanied by a posterior fastening using transpedicular screws.
The PLIF is an operation during which numerous anatomic structures are removed: the articular apophyses, one or more laminas and in some cases part of the spine apophyses. Therefore, it would seen logical to take advantage of the removal of these structures to apply the necessary posterior fastening. But the transpedicular fastening is made through the pedancles, precisely one of the few structures the PLIF keeps intact. In other words, an operation that is difficult in itself, meaning that the manipulating and removal of numerous anatomic structures have to be completed by another completely different operation which, in turn, manipulates other anatomic sectors. This does not seem to be a suitable way of complying with the "minimum invasion" principle recommended in any other operation.
The transpedicular technique includes the placing of bars joining the screws, adjustment of a blocking system of the bars to the screws, placing connecting between bars... In short, a costly and long operation added to the operation of the PLIF.
The danger always associated to transpedicular fastening must be added to this: the screw that has to be "blindly" inserted through the narrow osseous cylinder that is the pedancle, helped by anatomic references not always the same in all individuals. Therefore, constant radiological verification of the path of the screw through the pedancle is necessary, as a deviation could cause serious damage to the spinal cord.
The purpose of the invention object of this Patent consists in the elimination of the inconveniences proper of posterior fastenings existing to date and has been conceived and designed with this purpose in mind.
Four vertebral screws to be inserted into the posterior part of the vertebral bodies of the instrumented level, on both side of the spinal cord
Two identical plates through the orifices of which said screws will be inserted, in such a way that the plate between the two vertebral bodies transmits part of the stresses to which the discal space is submitted
In accordance with this, the structure of said invention has been designed and includes the following elements as a minimum:
The described structure corresponds to minimum efficiency, as the form and size of the elements can be varied, as well as the way of performing the coupling between plate and screws. It is even possible to place one plate only instead of two on each side if the surgeon considers this convenient. It is also possible the plate includes a PLIF intersomatic box in its structure instead of being placed separately.
Instead of using transpedicular screws for the required posterior fastening accompanying the intersomatic boxes or the graft, the application technique of the claimed device uses a plate and non-transpedicular screws. The plate is located on the posterior part and next to the vertebral bodies, underneath the nervous root corresponding to the instrumented level. This is reached after a laminectomy, which is obtained thanks to the manipulation of the spinal cord, an operation only possible in the lumbar region.
The screws are inserted into the plate orifices located on the posterior part of the vertebral bodies and, therefore, the insertion of transpedicular screws is not necessary. This plate uses the removal of the lamina, which has to be done during the PLIF operation, and needs no further manipulation or anatomic removals with the result its use is much simpler and shorter than the transpedicular screws. The posterior fastening function required by the PLIF is now no longer a costly and dangerous addition to the operation.
To complement the description of the invention and facilitate the interpretation of the formal, structural and functional characteristics of its purpose, attached are drawings in which different aspects of a preferred performance of the "Anterior cervical fastening device", constituting the purpose of this Patent, are schematically represented.
Figure 1 is a longitudinal semi-section showing the place where the implantation in the lumbar column is made
Figure 2 is a transversal section showing the place where the implantation in the lumbar column is made
Figure 3 represents a perspective view of the overall performance of the device
Figure 4 represents a perspective view of a performance of the plate
Figure 5 is a perspective view of a performance of the vertebral screw
Figure 6 is a perspective view of a performance of the blocking screw
Figure 7 is a longitudinal section of a performance of the vertebral screw cut by a plane the design of which is represented in Figure 5 as A-A
Figure 8 is a longitudinal section of a performance of the plate cut by a plane the design of which is represented in Figure 4 as B-B
Figure 9 is a perspective view of the partial performance of the device
Figure 9' is a longitudinal section of a partial performance of the device cut by a plane the design of which is represented in Figure 9 as C-C
Figure 10 is a front elevation of a variant of the overall device performance
Figure 10' is a longitudinal section of the device performance cut by a plane the design of which is represented in Figure 10 as D-D
Figure 11 is a front elevation of a variant of the plate performance
Figure 12 represents a perspective view of the overall device performance
Figure 12' is a longitudinal section of the device performance cut by a plane the design of which is represented in Figure 12 as E-E
Figure 13 represents a side elevation of the overall device performance
Figure 14 is a front elevation of the vertebral screw performance
Figure 15 is a longitudinal section showing the place where a performance of the lumbar column implantation is positioned
Figure 16 represents a side view of the overall device performance with the intersomatic box
Figure 17 represents a perspective view of the overall device performance with the box shown in Figure 16
Figure 18 is a perspective view of the overall device performance variant
Figure 18' is a longitudinal section showing the insertion path of the vertebral screw during the device performance in Figure 18, cut by a plane the design of which is represented as H-H in said Figure 18
Figure 18" is a longitudinal section showing the insertion path of the vertebral screw during the device performance of Figure 18, cut by a plane the design of which is represented in Figure 18 as H-H
In said drawings:
To clearly show the nature and scope of the advantageous application of the "Posterior vertebral body fastening device in the lumbar region", purpose of the claimed invention, the following is a description of its structure and the characteristics of its component elements, making reference to the drawings which, on representing a preferred performance of said purpose for information, must be considered in the widest sense and not limiting of the application and content of the claimed invention.
Two identical plates (1) with two end orifices (2) each one made up of a spherical cavity (5) and two drill holes (7)-(9) with different diameters
Four vertebral screws (3), two for each plate, the heads of which have a spherical shape (4) to adjust to the cavities (5) of the plate orifices and grooves (6) that make the head flexible so that it is possible to insert it into the plate orifice, in spite of the fact its diameter is slightly larger than the diameter of the upper drill hole (7) of the orifice. Meanwhile, before reaching the thread, the screw has a cylindrical part (8) that adjusts to the lower drill hole (9) of the plate orifice preventing it from moving inside the latter and the head of the screws has a conical cavity (10) ending up in a screwed drill hole (11) to insert both blocking screws. The screw spire (12) has the necessary depth to permit sufficient fastening to the spongy bone with a Roman and non self-screwing point (13) so that it cannot pass through the anterior cortical surface of the vertebral body.
Four blocking screws (4), one for each vertebral screw (3), screwed into the cavity of their heads. The head of the blocking screws has a conical shape (14) to press on to the cavity walls (10) of the vertebral screw head whilst being inserted and thus increase its diameter thanks to the grooves (6) that make said head flexible so that it becomes blocked in the plate orifice (2)
The minimum efficient structure of the "Posterior vertebral body fastening device in the lumbar region" is composed of:
Setting of the crews (3) in the plate (1) can be done in various ways, such as: screwing the head (15) on to one of the two screwed orifices (16) of the plate (see Figures 9 and 9'); the use of lids (17) that prevent the screw from leaving its housing (see Figures 10 and 10'); or else trunk-conical shaping of the plate orifices (18) and the heads (19) of the vertebral screws, with the same conical shape (see Figures 12 and 12').
Transmission of axial stresses to the graft or intersomatic box carried out by the PLIF can be made easier by replacing the orifices (2) of the plate (1) with a groove (21) (see Figure 11) that permits vertical movement of the screws; or else by a reduction (23) in the upper part of the vertebral screws that permits nodding (24) of the screws (3) inside their respective housings in the plates (1) (see Figures 13 and 14).
The device can include a self-compressing system (20) as, when the vertebral screws (3) are inserted into the orifices in which they are housed, the discal space is compressed and, therefore, the graft or the intersomatic box interposed therein (see Figures 18, 18' and 18").
The device can include a prefabricated PLIF intersomatic box (22), located in the center of the plate (1) so that the whole set is inserted in the same operation instead of placing the prefabricated box first and then the plate (1) and screws (3) on the instrumented vertebral bodies (see Figures 15, 16 and 17).
According to the above, the basic structure of the device admits slight variants as regards certain partial aspects. These do not change or impair its essentiality and thus constitute "a group of interrelated inventions resulting in a unique general inventive concept". Therefore, in view of Article 24.1 of the Patent Law, they are included in this request. | |
Page 55 : My Generation
Oops, had it wrong, that Specials concert is tonight, therefore I’m still able to get my words straight.
On today’s page, I’ve pictured the great Da Capo record store, the best record shop in the Netherlands, as I find and conveniently, in the close neighbourhood of my studio. In the time that i have worked on the page, Michel Terstegen, the founder and heart and soul of the store, still lived, I brought him a copy of the page, he was overjoyed and immediately pinned it to all the other memorabilia on the wall behind him. This summer, the good Michel died. And we and Utrecht miss him very much. Luckily, the store will continue to operate, so if you’re nearby, check it out. A true treasure chest! Here is a beautiful tribute to Michel by Brian Kotz. | http://www.fahrradmod.de/en/comics-en/page-55-my-generation |
Here is one of the most popular publications available today dedicated to the knots and splicing. This excellent volume contains absolutely all essential knots the readers shall be aware of. The text of the book is full of very useful and easily understandable splicing instructions and all of them are supplemented with the instructional images and color diagrams making the process very funny.
According to the many reviews provided by the interested readers from all parts of the planet, they do not have any problems with making knots any more. There is the introductory section in the volume describing various types of ropes and the process of their manufacturing, telling readers how to care and handle the ropes, and also how they should make a proper choice and particular knot.
The readers will find easy and short ways to the proper use of knots in the pages of the present volume. Each of the knots addressed in the book has been provided with the short yet quite informative description and a diagram stepping the reader through the twists that shall be made in order to make this knot done. All of the knots have been grouped in several sections. In short, this is a really great instructional guide...
The "Read Later" function allows you to add material to this block with just one click. Just click on the icon and read the articles that interest you at any convenient time. | https://www.libramar.net/news/knots_more_than_fifty_of_the_most_useful_knots_for_camping_sailing_fishing_and_climbing/2017-07-19-1036 |
Technical field
State of the art
Objects and summary of the invention
Brief description of the drawings
Detailed description of the preferred embodiment of the invention
The present invention relates to a device for dry-forming a web of fibers, of the type comprising: a fiber distribution head; a forming wire movable under said head; a suction box located on the opposite side of said forming wire to said head and connected to a suction system.
More particularly, the invention relates to a novel form of suction box for a device of this type.
According to a different aspect, the invention relates to a method for dry-forming a web of fibers.
According to a further aspect, the invention relates to a suction box for a device for dry-forming webs of fibers.
For the production of webs or sheets of fibrous material, in particular paper, absorbent paper or tissue paper, usually methods and machinery are used where a slurry of cellulose fibers is distributed on a forming wire in order to form a thin web. This web is then dried by means of suction of the water and subsequent passing over a heated roller or other drying device.
More recently a new method for the production of paper, in particular absorbent paper of considerable thickness, for example for the production of the hygienic particles, such as baby diapers or sanitary napkins for women, has been introduced. This method envisages the distribution, onto a forming wire or mesh, of a web of fibers supplied by means of an air flow. The method is referred to as an "airlaid" method.
In order to implement the dry-forming method, devices of various types have been designed in order to obtain as uniform as possible a distribution of the fibers and overcome the many drawbacks and problems which this new technique involves.
In general, airlaid web production envisages suspending the fibers in an air flow and depositing them on a forming mesh or wire, beneath which a suction is generated so as to convey the fibers supplied from a forming head located above. The fibers are distributed in the air flow using various techniques.
GB-1499687
GB-1559274
US-A-3581706
US-A-4014635
US-A-4157724
US-A-4276248
US-A-4285647
US-4335066
US-A-4351793
US-A-4482308
US-A-4494278
US-A-4627953
US-A-5527171
US-A-5471712
WO-A-9105100
WO-A-9522656
WO-A-9610663
WO-A-9954537
EP-B-616056
A first category of devices envisages the use of a forming head with a screen in the form of a bottom meshwork through which the fibers drawn by a stream of air pass. A forming mesh moves below the meshwork screen which closes the forming head at the bottom and the fibers are deposited thereon so as to form the web. Propellers rotating about a vertical axis, i.e. perpendicular to the forming mesh and to the screen, are arranged above the bottom closing screen of the forming head. The fibers are drawn by an air stream through the closing screen of the head and deposited on the forming mesh. Examples of devices formed in this manner are described in , , , , , , , , , , , , , , , , , and .
EP-A-032772
US-A-4352649
WO-A-8701403
EP-B-188454
A second type of device for distributing the fibers in the air flow which is sucked through the forming wire envisages the use of one or more holed ducts with an axis parallel to the forming mesh. The fibers drawn by the air flow emerge from the holes in the ducts and are deposited on the underlying forming mesh which advances in the feeding direction. In a forming head of this type is described. A pair of pipes with parallel axes is arranged above the forming mesh. The pipes have holed walls through which the fibers, conveyed by an air flow inside the said pipes, emerge. To allow the fibers to emerge more easily and prevent blockage of the holes, rotating shafts having an axis parallel to the axis of the pipes and equipped with radial tips, are arranged. The latter also have the function of breaking up any lumps of fibers which form in the conveying air flow. Devices based essentially on the same principle are described in , and . In these devices the forming head is devoid of the bottom closing screen, and the flow of air and suspended fibers is confined inside the holed-wall ducts, the holed wall having the function of the closing screen of the heads of the first type mentioned above.
US-A-6233787
3 describes a device for dry-forming a web of fibers in which a head which receives an air flow with the suspended fibers is arranged above the forming wire. The head has underneath a series of rotating shafts or rollers with axes parallel to each other and to the forming mesh, extending transversely with respect to the direction of feeding of the forming mesh. The shafts or rollers have radial tips or stems extending such as to close substantially the bottom opening of the head, forming a kind of pervious wall which allows the passage of the fibers drawn by the air stream sucked from below the forming mesh.
EP-A-159618
describes a device for dry-forming a web of fibers comprising a forming head situated above the forming wire through which the air stream which draws the fibers is sucked. The forming head is closed at the bottom by a fixed screen with perforations so as to allow the fibers to pass through. A plurality of rollers with axes parallel to the forming wire and perpendicular to the direction of feeding of the latter are located above the fixed screen. The rollers are equipped with radial tips and are mounted on a continuous conveyor which causes a translatory movement thereof parallel to the direction of feeding of the forming wire.
PCT/IT02/00657, filed on 15 October 2002
A head for forming an airlaid web which is particularly efficient in terms of uniformity of distribution of the fibers is described in the co-pending international patent application number , in the name of the present proprietors.
US-A-4,662,032
An apparatus for dry-forming a web according to the preambles 1 of claims 1, 24 and 33 is disclosed in .
From the above it is clear that hitherto particular attention has been given to the design of the head for distributing the fibers on the forming wire, in order to obtain the desired uniformity of distribution of the fibers in the final product. Much less attention has been directed, on the other hand, to the design of the suction box which is situated below the forming wire, opposite the head from where the fibers are delivered. Usually the suction box has a very simple form, without special measures which allow the quality of the product leaving the device to be improved.
The object of the present invention is to provide a device for the production of a web of fibers, using the so-called airlaid dry technique, which allows particular advantages to be obtained in terms of uniformity of thickness and distribution of the fibers by means of a particularly advantageous form of the suction box.
These and further objects and advantages, which will become clear to experts skilled in the art from reading of the text which follows, are obtained essentially with a device a method and a suction box comprising the features of the characterizing portions of claims 1, 24 and 33.
In this way it is possible to have a degree of suction, i.e. vacuum, variable from section to section with the consequent possibility of optimizing the distribution profile of the fibers in the transverse direction within the end product. For example, it is possible to compensate for a greater or less flow of fibers from the head situated above by increasing or decreasing the suction in the various sections of the box such that the finished product has the same density of fibers or a same thickness or a same basis weight along the whole cross section.
Vice versa, when it is required to obtain a product which has a nonuniform transverse profile of the basis weight, thickness or density, this may still be obtained by means of a suitable adjustment of suction in the various sections into which the suction box is transversely divided.
The various sections into which the suction box is transversely divided may all be connected to a single suction duct, with the arrangement, in between, of shutter valves or gates, i.e. for reducing the suction cross section, in order to modify the suction conditions inside each section of the box. However, according to a preferred embodiment of the invention, each of said longitudinal sections into which the suction box is transversely divided is connected to its own independent suction duct. A corresponding fan may be associated with each of these ducts. The possibility of a more efficient and rapid adjustment of the suction in the various sections, for example using an electronic system for controlling the operating conditions of the various motors actuating the individual fans, is thus obtained. When, on the other hand, each longitudinal section of the box is connected by means of a shutter gate or valve to a single suction duct, each gate or valve may be associated with an actuator interfaced with an electronic actuating and control system.
In both cases it is possible to form a control - i.e. feedback - loop by providing a series of sensors which are arranged downstream of the suction box and the head of the forming device and which detect the parameter(s) to be controlled, for example the thickness or the basis weight of the web. On the basis of the signal generated by the sensor or the sensors and a comparison with preset values of the controlled parameter(s), it is possible to generate a feedback signal for adjusting the shutter valves or gates or the actuating motors of the various fans associated with the longitudinal sections into which the suction box is divided. The possibility is not excluded of combining flow-reducing valves or gates with independent suction ducts and motors for the various fans, by envisaging for example a number of fans and suction ducts less than the overall number of sections into which the box is transversely divided, and of dividing one or more of said suction ducts into sections, each equipped with its own shutter valve or gate having its own operating actuator.
Advantageously, the various suction ducts are connected to the respective longitudinal section of the suction box at the end of the suction box which is downstream with respect to the feeding direction of the forming wire. In this way, as clarified below, optimum operation of the suction box is obtained since the sucked-in air flow has a velocity having a component parallel to the feeding direction of the forming wire.
According to a practical embodiment, the suction box is divided into longitudinal sections by longitudinal dividing walls which extend from the bottom of the box up to a height less than the plane of lie of the forming wire. In this way the risk of the web of fibers having a discontinuity opposite each dividing wall is avoided. The distance between the plane of lie of the wire and the dividing wall is moreover sufficiently small to be able to have different suction conditions in the various longitudinal sections of the suction box.
According to an improved embodiment of the invention, the suction box is further divided into at least two transverse zones arranged one next to the other in the feeding direction of the wire, by means of dividing walls which are transverse (i.e. substantially perpendicular to the feeding direction of the forming wire) and which extend from a zone close to the plane of lie of the forming wire toward the bottom of the suction box, remaining separate from the bottom itself. Moreover, an adjustable shutter member is associated with each of said transverse zones, in order to regulate the flow of air sucked into each of said zones. It is thus possible to increase the efficiency of the entire device.
In fact, considering a single portion of the forming wire, as it passes between the head and the suction box, an increasing quantity of fibers is deposited thereon, said fibers increasing the loss of head in the fiber-conveying gaseous flow (i.e. air stream) which from the inside of the head passes through the wire and is sucked into the suction box, depositing the fibers on the forming wire. In conventional devices this loss of head results in a gradually diminishing efficiency as regards the formation of the web of fibers, since the greater the thickness of the fibers already deposited on the wire, the smaller will be the quantity of fibers which continues to be deposited during the remainder of the movement of the wire through the device. This is the result of the smaller air flow through the forming wire and the web partly already formed thereon, due to the increased loss in head.
Since it is possible to regulate the suction in the transverse sections arranged in succession in the feeding direction of the wire inside the suction box, it is possible to apply a more intense sucking action in the zones of the box situated further downstream with respect to the feeding direction of the forming wire. This gradual increase in the suction compensates for the increased loss of head across the thickness of the fibers which is gradually formed on the forming wire, such that also the final parts of the suction box contribute substantially to the growth of the web of fibers. This allows the speed of feeding of the forming web and, therefore, ultimately, the productivity of the device to be increased.
It is also possible to adopt this measure of increasing the efficiency of the suction box (by means of division of the box itself into transverse zones) as a sole measure, independently of the division of the box into longitudinal sections. This excludes the advantage of being able to adjust the transverse profile of the basis weight or thickness, but nevertheless there will be an increase in the efficiency of the device in terms of productivity. When the box is divided only by means of the transverse walls into sections or zones arranged in succession in the feeding direction of the forming wire, these transverse dividing walls may also extend as far as the bottom of the box, in which case separate suction ducts will be envisaged for each transverse zone into which the box is divided. In this case it may also be envisaged that the shutter means or members are formed by valves arranged on the suction ducts or independent fans could be envisaged for each transverse zone. An automatic regulating system is, however, not necessary in this case since manual adjustment of the suction conditions in each section or transverse zone of the box at the start of production is sufficient.
In a possible embodiment of the invention, the flow-reducing members associated with the transverse zones into which the suction box is divided each comprise a wall oscillating about a transverse oscillating axis and divided into a number of portions corresponding to the number of longitudinal sections into which the suction box is divided.
Adjustment may be obtained by means of a lever which is associated with each oscillating wall, with locking means for fixing the wall in the desired position.
In a manner known per se, the suction box may have a plurality of transverse profiled parts on which the forming wire rests. These profiled parts may advantageously be interchangeable so that they can be replaced in the event of wear. They may be arranged approximately in correspondence of the transverse dividing walls which divide the box into transverse zones.
Advantageously it is possible to envisage that an auxiliary suction box is arranged downstream of the suction box, with respect to the feeding direction of the forming wire. Whereas the main suction box extends, in the feeding direction of the forming wire, over a length corresponding to the dimension in this direction of the head of the device, the auxiliary suction box extends beyond the zone acted on by the head of the device and has mainly the function of retaining the web of fibers formed on the forming wire until the web enters into a following station of the production line. The latter may consist of a station for consolidating the fibers or a new fiber distribution device, for forming a second layer of fibers on the web.
The auxiliary suction box may also be divided transversely into longitudinal sections, in a similar manner to that already envisaged for the main suction box. Each of these sections, which may be defined by a respective suction mouth, may have associated with it a suction regulating member for regulating the suction in an independent manner for the various mouths and therefore for the various longitudinal sections into which this auxiliary box is divided.
generating fibers suspended in a gaseous flow, typically air;
generating suction of said gaseous flow across a forming wire onto which said fibers are deposited, forming the web.
According to a different aspect, the invention envisages a method for dry-forming a web of fibers, comprising the steps of:
Characteristically, according to the invention, it is envisaged to divide up the suction transversely with respect to the feeding direction into longitudinal sections extending parallel to the feeding direction of the forming wire and regulating the suction in each of said longitudinal sections in an independent manner with respect to the other longitudinal sections.
Further advantageous features and embodiments of the device and the method according to the invention are indicated in the accompanying dependent claims.
The invention also relates to a suction box for a device for dry-forming a web of fibers, comprising a forming wire advancing in a machine direction, characterized in that it is divided up transversely with respect to the machine direction into at least two longitudinal sections, extending in the machine direction; and in that control members are envisaged for controlling the suction in each of said longitudinal sections in an independent manner with respect to the other longitudinal sections.
Figure 1
shows a side view of the device;
Figure 2
Figure 3
shows a longitudinal section, along II-II of , through the main suction box and the auxiliary suction box;
Figure 3
shows a perspective view of the suction box with the forming wire partly removed;
Figure 4
Figure 2
shows a front view along IV-IV of ;
Figure 5
Figure 2
shows a cross section along V-V of ;
Figure 6
Figure 5
shows an enlargement of the detail indicated by VI in ;
Figure 7
Figure 6
shows a section along VII-VII in ;
Figure 8
Figure 4
shows a section along VIII-VIII in ;
Figure 9
Figure 5
shows a local section along IX-IX of ; and
Figure 10
Figure 5
shows a local section along X-X of .
The invention will be better understood with reference to the description and the attached drawing which shows a practical non-limiting embodiment of the invention. In particular, in the drawing, where identical numbers indicate identical or corresponding parts:
Figure 1
Fig. 1
shows in its entirety a device for dry-forming (using the so-called airlaid technique) a web of fibers, for example cellulose fibers. The device, denoted overall by 1, comprises an upper part or head, denoted overall by 3, and a bottom part 5 which comprises among other things, as the main element, a suction box 7. A forming wire 9, on which the web of fibers schematically indicated by 11 is formed, passes between the head 3 and the suction box 7 (see ).
Figure 1
The forming wire 9 defines a closed path, of which only a portion delimited by two drive rollers 13 and 15, is shown in . The direction of feeding of the wire along this path is indicated by the arrow f9. The arrow f9 also defines the so-called machine direction, i.e. the direction along which the material being formed advances.
PCT/IT02/000657
The configuration of the forming head 3 may be of any nature and advantageously may be formed as described in the international patent application in the name of the present proprietors. It must however be understood that other configurations of the head are possible since the advantages that the suction head according to the present invention has may be used with equivalent results as regards the increase in the quality of the product and the productivity also in combination with forming heads of the traditional type. Generally the characteristics of the suction box may be combined with heads formed in accordance with various techniques, such that the specific structure of the head 3 is not of relevance in the description of the present invention and consequently will not be illustrated here.
Figures 1
3
The head 3 rests on the structure of the underlying part at four support points 4 (see in particular and ), the height of which may be adjusted by means of motorized jacks 6.
Figure 2
Figure 4
As can be seen in particular in the section according to , the suction box 7 has a bottom which is at least partly inclined from the top downward in the feeding direction of the forming wire 9. At the downstream end (with respect to the feeding direction of the wire 9) the suction box 7 is connected to three suction ducts indicated by 17, 19 and 21. The three suction ducts are connected to three corresponding fans, each equipped with its own motor, shown only schematically in and designated here as 23, 25 and 27. The three motors of the fans 23, 25 and 27 are connected to a central control unit which is schematically indicated by 29, in turn connected to a sensor or to a series of sensors schematically indicated by 31 and arranged downstream of the head 3 of the device 1 along the path of the forming wire 9, for detecting the thickness or basis weight of the web 11 leaving the device. This arrangement allows the device to be controlled in a manner which will be described below. Basically a linear array or matrix of sensors may be envisaged for detecting the progression of the transverse profile (i.e. in a direction perpendicular to the feeding direction of the forming wire 9) of one or more parameters, such as the basis weight, the thickness, the density or another parameter, of the web 11 formed by the device 1.
Figure 2
Figure 5
Each of the three suction ducts 17, 19, 21 is connected to a respective longitudinal section into which the suction box 7 is divided by longitudinal dividing walls 33. As can be seen in particular in the cross section according to and , these dividing walls extend from the bottom of the suction box 7 up to a height which does not reach the plane of lie of the forming wire 9. In this way three longitudinal sections, arranged alongside each other in the transverse direction, i.e. perpendicular to the feeding direction of the forming wire 9, are created inside the suction box 7. In each of the three longitudinal sections it is possible to establish a suction condition which can be regulated independently of the suction conditions in the remaining longitudinal sections, by increasing or reducing the flow rate of the corresponding fan 23, 25 or 27.
When the device is in operation, a flow of air containing, suspended, the fibers intended to form the web on the forming wire 9, is generated between the forming head 3 and the suction box 7. This flow is sucked through the structure of the forming wire 9 owing to the vacuum conditions created inside the suction box 7 and the fibers are deposited on the wire itself. By increasing or reducing the suction inside each of the three longitudinal sections into which the suction box is divided by means of the walls 33, it is possible to increase or reduce the flow rate of this flow and therefore the quantity of fibers which are deposited along three longitudinal sections into which the forming wire is ideally divided opposite the longitudinal sections into which the suction box 7 is divided.
It must be understood that the number of longitudinal sections into which the suction box 7 is divided may also be different from three. For example, it is possible to envisage four, five or more longitudinal sections. It is also possible to envisage a division into only two longitudinal sections. By increasing the number of sections into which the box is divided by means of the longitudinal walls 33, the complexity of the suction box is increased, but on the other hand the possibility of modulating the suction conditions in the transverse direction - and therefore of obtaining with greater precision the desired transverse profile, i.e. the desired progression, in the transverse direction, of the controlled parameter, for example the thickness, the basis weight or the density of the web formed - are also increased.
By means of the thickness or basis weight sensors 31, it is possible to detect the transverse profile, i.e. the progression, in the transverse direction, of the parameter detected (thickness, basis weight or other parameter of the web 11 being formed) and transmit the values detected to the central control unit 29. These values may be compared with preset values of said parameter which may also be modified by the operator. On the basis of an error signal generated from this comparison, it is possible to modify the suction conditions of the fans 23, 25 and 27. In this way it is possible to keep the thickness or the basis weight substantially constant in the transverse direction of the web 11. Alternatively it is possible to produce a web which has a transverse profile with a thickness or basis weight or density which is variable as required, for example a greater thickness or a greater basis weight in one of its longitudinal sections and a smaller thickness or smaller basis weight in a different longitudinal section.
Figure 2
As can be observed in particular in the cross section according to , since the suction ducts 17, 19 and 21 are connected to the suction box 7 at the downstream end of the latter with respect to the feeding direction of the forming wire 9, inside the suction box 7 a sucked air flow which has a component parallel to the direction of feeding f9 of the forming wire is generated. This facilitates the distribution of the fibers contained in the flow and supplied by the head 3.
Figures 9 and 10
Figure 2
In the region of the suction box 7 the forming wire 9 is supported by a plurality of transverse profiled parts 41 shown in detail in the cross sections according to . Each profiled part 41 is supported at its ends by respective blocks 43 screwed by means of screws 45 to the support frame of the suction box 7, two longitudinal beams of which are indicated by 47. As can be seen in the cross section according to , transverse walls 51 are provided in correspondence of four of the profiled parts 41, said walls dividing the suction box 7 into five transverse zones which are arranged in succession in the longitudinal moving direction of the forming wire 9. The four transverse walls 51 are supported by cross-pieces 53 also fastened to the blocks 43. The transverse dividing walls 51 have a downward extension which is relatively limited and extend over an intermediate height, remaining with their bottom edge at a considerable distance from the bottom of the suction box 7. This is so in order to avoid obstruction of the suction through the suction ducts 17, 19, 21.
Figure 2
Parallel to each of the transverse walls 51 and parallel to the vertical transverse portion of the external wall defining the suction box 7, there extend axes 57 for supporting and mounting in an oscillating manner five gates or walls 59 able to assume, rotating about the axis 57, different angular positions ranging between a vertical position illustrated in and a horizontal position. Each wall 59 is formed by three portions aligned along the axis 57. These portions arranged next to each other define slits in the walls 59 at the points corresponding to the longitudinal dividing walls 33 which divide the suction box 7 into the three longitudinal sections.
Depending on the angular position assumed by each wall 59, independently of the other partitions, the suction cross section between two consecutive transverse walls 51 - or between one of the said transverse walls and the external transverse wall of the suction box 7 - may be varied. In this way, the area located underneath the forming wire 9 and corresponding to the suction box 7 is divided into five transverse zones in each of which the suction may be reduced to a greater or lesser degree compared to the other adjacent transverse zones.
The oscillating movement of the walls 59 is controlled by means of levers 61, each of which may be fixed in a predetermined angular position independent of the angular positions in which the remaining levers 61 are fixed. This allows manual adjustment of the flow reduction of each of the transverse zones into which the suction box is divided. Manual adjustment of the flow reduction is sufficient for the purposes for which this adjustment is intended. In fact, contrary to the division into longitudinal sections, which is used to obtain a continuous adjustment, with a feedback loop, of the thickness or the basis weight of the web produced, the division of the suction box 7 into transverse zones has solely the purpose of modulating the suction from the zone further upstream to the zone further downstream of the suction box along the feeding direction of the forming wire 9, in order to compensate for the greater drop in pressure which occurs through the assembly formed by the wire and by the layer of fibers being produced thereon.
Therefore the transverse zone of the suction box 7 further downstream, where there is maximum thickness of the fibers, will be completely open, i.e. the corresponding wall 59 will be normally in the vertical position. The remaining walls of the transverse zones situated in each case further upstream will be gradually more and more closed, i.e. more inclined with respect to the vertical. The wall 59 hinged in the vicinity of the rear external wall of the suction box will be the wall which is normally in the most closed position.
Manual setting of these different degrees of flow reduction is normally sufficient, although it is possible to envisage the possibility of modifying these flow reduction conditions for example when the type of fiber used changes. It is moreover possible to provide automatic or in any case servo-assisted adjustment of the flow reduction of the transverse zones of the box.
Figures 7
9 and 10
As can be seen in particular in the cross sections according to , , the configuration of the blocks 43 for supporting the profiled parts 41 and for locking the axes 57, as well as of the cross-pieces 53 supporting the walls 59 and the transverse walls 51, is such that replacement of the worn profiled parts 41 may be performed without disassembling the walls 51 and the walls 59. It is in fact sufficient to unscrew the screws 45 which lock the corresponding block 43 onto one of the two sides of the suction box and extract the block itself so as to allow removal of the worn profiled part 41 and its replacement with a new profiled part which will be rocked in position by means of reinsertion of the block 43.
In addition to the blocks 43 and in alternate positions with respect to the latter, inserts 44 are also fastened onto the longitudinal beams 47. The inserts 44 and the blocks 43 form respective continuous longitudinal surfaces on the two sides of the suction box 7 onto which a steel plate 67 is fixed, on which plate the forming wire 9 rests and slides with its longitudinal edges. These plates can be interchanged without disassembling the remaining parts of the structure and in any case have a limited degree of wear owing to the hardness of the material from which they are made.
Figure 3
An auxiliary suction box, which is denoted overall by 81, is arranged downstream of the suction box 7, in the feeding direction of the forming wire 9. As can be seen in particular in the perspective view according to , on the downstream side, with respect to the direction of feeding of the forming wire 9, in the auxiliary suction box 81 three suction mouths 83 emerge, arranged next to each other in the transverse direction, i.e. perpendicularly with respect to the direction of feeding of the forming wire 9. The interior of the auxiliary suction box 81 is not divided into longitudinal sections by dividing walls, as envisaged - vice versa - for the main suction box 7. However, the presence of three suction mouths arranged alongside each other allows (by varying the suction conditions in each of the said mouths) to have suction conditions which are variable in the transverse direction of the chamber.
Figures 3
4
The three suction mouths 83 are connected to a single suction duct 85 by means of three shutter valves or gates, schematically indicated by 87 (see in particular and ). The valves 87 may be adjusted manually or automatical. Also, in the auxiliary suction box 81, the forming wire 9 is supported by profiled parts 41 in a similar manner to that envisaged in the main suction box 7.
It is understood that the drawing shows only one possible embodiment of the invention, the forms and arrangements of which may vary without thereby departing from the idea forming the basis of the invention. The presence of any reference numbers in the accompanying claims has solely the purpose of facilitating reading thereof in the light of the preceding description and the accompanying drawings and does not limit in any way the protective scope thereof. | |
Amazing grace, a term made famous by John Newton’s hymn. A movie and a Christian contemporary song shared the same name.
Gospel of John
Looking for songs, lyrics and meditations from the Gospel of John?
Finished Lyrics and Chords
Find Finished lyrics and chords here. Jesus cried out “It is finished”. What is finished?
Grace Revolution Lyrics and Chords
The Grace Revolution lyrics remind an “old” Christian like me how revolutionary Jesus love is.
3 Light Of The World Verse and Their Significance
The Light of the World verse appears in the bible at John 8:12, John 9:5, and Matthew 5:14. Let’s study the context and significance.
7 Blessed Benefits of Tithing
What are the benefits of tithing? Is it just a responsibility we have as Christians? Or is there something more?
Who is The Disciple Whom Jesus Loved?
The disciple whom Jesus loved was mentioned 5 times in the Gospel of John. Who do you think it is?
Sons and Daughters Lyrics
The Sons and Daughters lyrics is written by the New Creation Worship team. “Favour as the rising sun, shine upon us, sons and daughters of Your house, one with Jesus”. | https://my-filing-cabinet.com/gospel-of-john/ |
October is the ideal time for a number of last-minute, pre ‘cold snap’ garden activities, so while you still have time, prepare for the coming autumnal season with the following four P’s.
Planting
If you are looking to add a little more green to your garden and introduce flora that will add something special to your outdoor spaces, then remember that planting season for many trees and hedgerows is October to April. However, as waterlogged or frozen ground can hinder such activities there are just few months during this period when you can safely get to work digging and planting. Newly planted trees can be damaged by an excess of water or extreme temperatures so do keep this in mind when choosing when to plant them. Once they are in place, make sure they have adequate water (as too little water can harm them as well), weed the area to remove competition that may steal vital nutrients and water from the soil, mulch to protect from the winter chill, and keep an eye on them throughout the winter to make sure they establish themselves well enough.
Pruning
Some last-minute pruning can be done to trees with canopies that are too full which you fear may act as a sail in a winter storm and increase the tree’s risk of falling, and it’s your last chance to trim your hedges. Established hedges can be trimmed once or twice a year – the summer months being best for this – but October really is your last chance to trim deciduous hedges before winter sets in. While you may choose to tackle this job yourself there are two important factors to consider: 1) if your hedge is too large for hand-held shears then you’ll have to use a proper trimmer and there are safety issues associated with this, and 2) it is incredibly difficult to trim in a straight line. So if you don’t want wonky hedges and you’re happy with the number of limbs you currently possess, do consider asking a professional to some guidance or to manage the job themselves.
Preparation
Winter can be a time of extremes of wind, cold and rain, so it is important to check any supporting stakes and ties to ensure that they are secure. Also, don’t forget to pick up the gold and red debris of autumn, the leaf fall, and place all ‘healthy’ leaves onto your compost heap. It is important to be able to identify unhealthy leaves as adding those containing infestations (insects) and disease (fungi) to your compose heap will offer them a safe haven to spread and infest or infect other trees and plants in your garden and your neighbour’s.
Pest control
Already touched on above was the blight of insects and fungal infection, which is why it’s so important to identify and deal with any such pests. All infected or infested leaves and fruits should be removed from the garden. Honey fungus thrives in the September and October months so carefully remove these as well as others like powdery mildew and grey mould or these could also spread and harm your trees.
To ask an expert to help you prepare for autumn and the winter to come, call us on 0208 292 8992. | https://www.thorstrees.co.uk/blog/tips-and-learning/the-4-ps-to-remember-for-autumn/ |
While the adventure of solving crimes may tempt you to consider a career as a criminal profiler, keep in mind that the job is detail-oriented, involving methodical examination of often distasteful, violent materials. Profilers apply the scientific method to crime scene evidence to make hypotheses about a criminal's physical characteristics, habits and psychological traits. A thirst for adventure alone will not make you a good profiler -- you also have to be methodical, diligent, persistent and reliable.
Wise -- Like an Owl
Profilers must have a drive to acquire knowledge, the discipline to complete an advanced degree and the curiosity necessary to learn new subject areas as the situation dictates. The Federal Bureau of Investigation typically looks for profilers who have earned degrees in psychology, sociology and criminology. In addition to knowing the intricacies of the criminal mind, a profiler must understand the criminal justice system, know how to apply the scientific method to criminal investigation and understand evidence collection and processing methods.
Industrious -- Like an Ant
Often a profiler receives an old case, after traditional crime-solving techniques have failed, according to The Pat Brown Criminal Profiling Agency. You might have to start from scratch, carefully reading and rereading police reports and examining every detail of crime-scene photos. There are seldom easy answers and you'll need the determination and persistence to spend months and even years on a case that others have been unable to solve. You'll need to painstakingly apply the scientific method and logic, questioning others conclusions and testing new theories, often one at a time.
Independent -- Like a Cat
Although criminal profilers have received years of mentoring during their training and education, much of their day-to-day work is alone, especially if your employer is a small detective agency. Because so much of their work involves questioning colleagues, identifying liars and uncovering fraud, good profilers have a thick skin, maintaining a degree of authority and objectivity, even while they work with colleagues. In addition to your day-to-day autonomy, many positions require frequent travel, so you have to be willing to be away from your family for work.
Organized -- Like a Beaver
Examining a large volume of data requires an organized, logical mind. You have to be able to organize and re-categorize data based on different characteristics such as location, age of the victims or season in which the crimes occurred. Because a profiler is sometimes required to testify in court, you'll have to write your results in a concise, clear fashion, be able to present these thoughts and theories logically to both laypersons and peers and be able to spontaneously answer questions.
Related Articles
How Much Money Does a Criminal Profiler Make?→
Information on Criminal Investigative Psychology as a Career→
What Qualifications Are Needed to Be a Forensic Psychologist?→
Qualifications for Becoming a Police Detective→
Physical Requirements to Become a Crime Scene Investigator→
What Are the Working Conditions for a Homicide Detective?→
References
Writer Bio
Brenda Scottsdale is a licensed psychologist, a six sigma master black belt and a certified aerobics instructor. She has been writing professionally for more than 15 years in scientific journals, including the "Journal of Criminal Justice and Behavior" and various websites. | https://careertrend.com/traits-good-profiler-30589.html |
- Moderators:
- Coordinates: 9/08/2019, 09:45 - 18:00, Exhibit Hall
-
30512
+
P1.01-56 - Increased ROS1 and RET Transcripts in Fusion-Negative NSCLC Patients (ID 2477)
09:45 - 18:00 | Author(s): Ruth Román
- Abstract
Background
Fusion involving anaplastic lymphoma kinase (ALK), RET proto-oncogene (RET) or v-ros UR2 sarcoma virus oncogene homolog 1 (ROS1) occur in non-small cell lung cancers (NSCLC) and are important biomarkers for targeted therapies. However, little is known about the RNA expression levels of these genes regardless of fusions.Method
We used a custom nCounter panel (NanoString Technologies) designed to detect several genetic alterations, including fusions and mRNA expression levels of ALK, ROS1 and RET in formalin-fixed paraffin embedded (FFPE) samples. RNA was purified from NSCLC tumor samples and analyzed with the custom panel. The counts corresponding to the 3’ probes were normalized using the geometrical mean of the housekeeping genes and then added to evaluate total mRNA expression levels. Cut-off values for overexpression were established as the average counts for each gene plus two times the standard deviation.Result
A total of 400 stage III-IV NSCLC patients (p) from two different institutions were retrospectively analyzed. Overexpression of ALK was found in 55 p (13.8%). Of them, 48 (87%) were also positive for EML4-ALK fusions. One ALK-translocated patient with low levels of ALK mRNA expression did not respond to therapy. Fifteen p (3.8%) showed ROS1 overexpression. In contrast with ALK, only three of them (15%) had a concomitant ROS1 fusion. Among the remaining 12 patients overexpressing ROS1, four were ALK positive, five harbored mutations in EGFR and three were non-smoker females with no known drivers. Regarding RET, high expression levels were found in 14 p (3.5%) and only one of them showed a RET fusion (7%). Among the remaining 13 p, three presented neuroendocrine features and seven were smoker or ex-smoker without other known drivers.Conclusion
Overexpression of ALK mRNA in NSCLC is associated with EML4-ALK translocations. In contrast, a significant number of fusion negative patients show high ROS1 or RET mRNA levels. Further research is warranted to determine the clinical relevance of this finding.
-
30601
+
P2.01 - Advanced NSCLC (ID 159)
- Event: WCLC 2019
- Type: Poster Viewing in the Exhibit Hall
- Track: Advanced NSCLC
- Presentations: 1
- Moderators:
- Coordinates: 9/09/2019, 10:15 - 18:15, Exhibit Hall
-
30662
+
P2.01-56 - Copy Number Gains (CNGs) of Clinically Relevant Genes in Advanced NSCLC Patients (ID 2519)
10:15 - 18:15 | Author(s): Ruth Román
- Abstract
Background
Somatic copy number variations (CNV; i.e. amplifications and deletions) have been implicated in the origin and development of multiple cancers and some of these aberrations are designated targets for therapies, such as amplified ERBB2 in breast cancer. In the case of NSCLC patients, MET alterations are receiving increasing attention as targets in precision medicine, and several clinical trials of anti-MET agents are ongoing. Routine testing for these potential targets on formalin-fixed paraffin embedded (FFPE) samples is mainly carried out by in-situ hybridization (FISH) approaches covering only a single gene of interest. Although this methodology is still the gold standard of CNV detection, it presents several drawbacks. Here we aimed to determine the potential of next generation sequencing (NGS) to simultaneously determine CNGs across many in FFPE samplesMethod
FFPE biopsies from 140 stage IIIb-IV NSCLC patients (p) of our institution were prospective tested. Of them, 110 corresponded to samples at diagnostic and 30 after progression to targeted therapies. DNA was purified submitted to NGS using the 16-gene QIAact Lung Panel (Genereader®, Qiagen). Coverages for the genes analyzed were normalized using the total coverage of the panel. Cut-off values for CNVs were established as the average normalized coverage for each gene plus two times the standard deviation. Representative samples were analyzed by FISHResult
Validation analyses in 8 cell lines showed 100% concordance between FISH and NGS for detection of EGFR, MET and ERBB2 amplifications. Among the 140 NSCLC p, MET was the gene showing a higher frequency of CNGs, followed by PIK3CA, NRAS, EGFR and KRAS (Table 1). In contrast, only one p was found to harbor a ROS1 CNG. Among the 17 samples with MET CNG (12%), 6 corresponded to p progressing to targeted therapies. In addition, 8 of the 17 samples with MET CNGs were submitted to FISH, 6 of them were positive and the remaining 2 samples had copy numbers higher than 3.5 by this technique. In the case of EGFR, CNGs were associated with sensitizing mutations, with 5 samples showing both alterations concomitantly. In contrast, PIK3CA, NRAS, ALK, BRAF, HER2, PDGFRA, KIT and MET CNGs were not associated with mutations (Table 1).
n CNG
%
n MUTANT
MET
17
12.1
0
PIK3CA
12
8.6
0
NRAS
10
7.1
0
EGFR
10
7.1
5
KRAS
10
7.1
2
ALK
8
5.7
0
BRAF
8
5.7
0
ERBB2
8
5.7
0
PDGFRA
6
4.3
0
KIT
6
4.3
0
ROS1
1
0.7
0
CNGs in clinically relevant genes are present in a significant percentage of advanced NSCLC patients and, except in the case of EGFR, are not associated with driver mutations. Further research is warranted to determine the clinical implications of this finding. | https://library.iaslc.org/search-speaker?search_speaker=76868 |
This invention relates generally to insecticidal protective tags for non-human domestic animals and, in particular, to a tag formed from a polyurethane polymer having an ectoparasiticidal active compound within the polymer matrix.
BACKGROUND OF THE INVENTION
It has long been known that ear tags impregnated with insecticide are an effective means for providing control of horn flies and other insects on domestic livestock, particularly cattle. The most common material for formulating insecticidal animal tags has heretofore been polyvinyl chloride. In recent years, concern from ecological and human safety viewpoints have been raised with regard to utilizing plasticized polyvinyl chloride on animals intended for human consumption. Also, since polyvinyl chloride must be plasticized to perform satisfactorily as a tag, the quantity of active insecticide which can be incorporated into the product is reduced in direct proportion to the quantity of plasticizer required.
Another disadvantage of present insecticidal tag formulating techniques is that the high loadings of plasticizer and insecticide cause the completed product to "bleed" (exude) insecticide. This makes an unacceptable commercial product which requires special packaging to accommodate a relatively long shelf life, necessitates avoiding high temperatures in transport and storage, and demands special handling requirements when the product is removed from the package for application to an animal.
It has also been previously known to utilize polyurethane resins for forming identification (I.D.) tags for animals. It is also known to use polyurethane I.D. tags and attach to same a porous or semi- permeable membrane in the form of a cell for holding a reservoir of insecticide. These membranes are made of a variety of different polymers including polyurethane. Their construction is shown and described in U.S. Pat. No. 4,562,794. The purported advantage to utilizing such a membrane is to provide greater control over the uniformity of release rate of the insecticide and higher insecticide depletion than can be obtained when the insecticide is within the polymer matrix. Some of the polymer which have heretofore been utilized for tags of the type contemplated by the referenced patent would not, however, permit sufficiently high loadings of insecticide to achieve a satisfactory tag by blending directly with an ectoparasiticidal compound. Inherently, this known construction is costly to manufacture because of the complicated steps of forming and filling the cell as well as making the mechanical fastener for joining the cell to the tag. Also, there is a higher than desirable incidence of product failure because of the membranes being punctured while in use on animals.
The polyurethane resins which are useful in the present invention are polyurethane aromatic polyether elastomers, specifically the polymers which are the reaction product of 4,4'-diphenylmethane diisocyanate, polytetramethylene glycol and 1,4-butanediol. These resins generally conform to Chemical Abstracts Service Registry Number CAS 9018- 04-6.
OBJECTS AND SUMMARY OF THE PRESENT INVENTION
It is therefore an object of the present invention to provide an insecticidal animal protective tag which will accommodate a higher degree of loading of the insecticidal compound than previously known tags, thereby enhancing the effectiveness of the tag and extending its useful life.
Another objective of this invention is to provide an insecticidal animal protective tag and method of preparing same which minimizes insecticide bleeding, thereby improving the shelf life of the product while reducing the risk of contamination by humans handling the ear tags.
Another one of the objectives of this invention is to minimize environmental and health concerns regarding insecticidal tag devices by utilizing a polymeric matrix which is generally recognized as being environmentally safe and non-threatening to humans and does not require the addition of potentially dangerous plasticizers.
It is also an object of this invention to provide a method of protecting animals from insects, which is more environmentally safe and presents fewer health risks than existing practices.
As a corollary to the foregoing object, it is an important aim of this invention to provide an insecticide ear tag which is as effective as two prior art tags using the same active compound.
These and other objects of the invention will be made clear or become apparent from the following specification and claims.
The foregoing objects are achieved by an insecticidal tag-like device comprising an ectoparasiticidal active compound, preferably an organophosphate, that is blended with a polymer which is the reaction product of 4,4'-diphenylmethane diisocyanate, polytetramethylene glycol and 1,4-butanediol. The invention also encompasses a method of preparing such a device by combining the ectoparasiticidal composition with the afore-described polymer.
Lastly, the invention encompasses a method of protecting non- human domestic animals from ectoparasites by attaching to the animal a device, such as an ear tag, formed from a polymer which is the reaction product of 4,4'-diphenylmethane diisocyanate, polytetramethylene glycol and 1,4- butanediol, the ectoparasiticidal active compound preferably being an organophosphate present in a quantity of up to 70% by weight of the total weight of the article.
DETAILED DESCRIPTION OF THE INVENTION
The polymers useful in this invention are formed by polymerization of the diisocyanate with glycol according to the following reactions: ##STR1##
the moieties of the polymerization reaction will generally be present within the ranges of 20% to 40% diisocyanate, 50% to 70% glycol, and 2% to 10% butanediol (all by weight). It should be understood that the invention is not limited to ear tags and could take the form of a tail tag, ear clip, leg bracelet, collar, horse strip, medallion, chain tag or other device which could be attached to an animal, The final polymer will have a Shore hardness of 70-90 A units, a number average molecular weight which is not less than about 90000, and a melting range within about 70. degree. C. to 190° C. The following commercial resin products, all meeting the foregoing criteria, have been confirmed as satisfying the objectives of the invention and will be referred to hereinafter by the reference letters A through F:
______________________________________
Reference
Letter Trademark Manufacturer
______________________________________
A Texin 985 A Mobay Chemical
Pittsburgh, PA USA
B Morthane PE-90 Morton Thiokol, Inc.
Chicago, IL USA
C Estane 98315 B. F. Goodrich Co.
Cleveland, OH USA
D Morthane PE-50 Morton Thiokol, Inc.
Chicago, IL USA
E Elastollan 1180A
BASF Corp.
Parsippany, NJ USA
F Pellethane 2103-80
Dow Chemical
Midland, MI USA
______________________________________
Various insecticidal compositions, both liquids and solids, can be employed although preferably an ectoparasiticidal active compound which is an organophosphate will be the active component. Suitable insecticides include O,O-diethyl-O-2-isopropyl-6-methyl-6-pyrimidin-4-yl phosphorothioate, sold under the trademark Diazinon (Ciba-Geigy), S-[1,2- bis(ethoxycarbonyl) ethyl]0,O-dimethyl phosphorodithioate, commonly known as malathion, 0,0-dimethyl-0-4-nitro-m-tolyl phosphorothioate, sold under the trademark Sumithion by Sumitomo Chemical Co. Ltd, and 0,0, 0',0'- tetraethyl-S,S'-methylene bis(phosphorodithioate), commonly known as ethion and sold by FMC, Inc.
The ectoparasiticidal active compound should be present in an ectoparasiticidal effective quantity, normally at least approximately 20% by weight (based on final product) with levels up to approximately 70% by weight being acceptable. Thus, the polymer component will be present from 30% to 80% by weight of the final product. The ectoparasiticidal active compound, if liquid, may be introduced into the resin by a heating, absorption process, or if solid, it may first be dissolved in a volatile solvent followed by soaking in the polymer and removal of the solvent. Generally a blending time of thirty minutes in a high intensity mixer will produce a homogeneous, free flowing, polymer/insecticide mixture (called a "dry blend").
It is, of course, to be understood that ultraviolet light stabilizers such as 2-(2'-hydroxy-5'-methyl phenyl)-benzotriazole, fillers, lubricants, dyes, antioxidants such as octadecyl 3,5-di-tert- butyl-4- hydroxy-hydrocinnamate, pigments, and other inert ingredients may be incorporated into the formulation from zero to 2% by weight of the final product for serving their accepted functions which are well known to those skilled in the art. It has been found preferable to utilize up to 20% by weight polyvinyl chloride as a processing component to facilitate production of a free flowing dry blend. All of the foregoing optional substituents are generally added after the insecticide has been absorbed into the polymer. High intensity mixing for approximately five minutes is adequate to provide a homogeneous mixture incorporating the optional components.
The previously compounded dry blend may be formed into an acceptable shape, such as an ear tag, for attaching to an animal by various techniques well known to those skilled in the art. Extrusion, injection, and compression molding are all well known techniques, with injection molding being the preferred method of forming the preferred form of the device, namely, ear tags.
A preferred range for polymer and insecticide is 40% to 60% by weight polymer and 30% to 60% ectoparasiticidal active compound with the balance comprising polyvinyl chloride (up to 20% by weight) and up to 2% by weight inert ingredients such as antioxidants, ultraviolet light stabilizers and pigments, all well known to those skilled in the art (all weight percents based on final product).
The following examples are illustrative of some of the possible variations which are contemplated as being within the scope of the invention.
EXAMPLE 1
Various polymer compositions incorporating Diazinon insecticide were prepared according to the absorption procedure previously described utilizing technical grade (88% purity by weight) Diazinon and quantities within the preferred range. Ear tags were formed from the dry blend by injection molding.
Table I summarizes the composition formulations of the ear tags made according to this example.
TABLE I
______________________________________
Polyurethane Tags Made With Varying
Quantities of Resin C and Insecticide
Composition, wt. %
Lot No. 1 2 3 4 5 6
(minimum 200 tags)
______________________________________
Resin C 49.4 51.3 50.8 48.8 52.6 48.5
Diazinon (88%)
38.3 46.1 43.1 43.9 46.0 43.7
PVC 12.3 2.6 5.1 6.1 0 6.0
UV and antioxidant
-- -- -- 0.7 0.8 1.0
Stabilizers
(approx. 1:1
by weight)
Colorants, Pigments
-- -- 1.0 0.5 0.6 0.8
Average Tag 14.69 14.43 14.56
14.00 15.83
13.88
Weight (g)
______________________________________
Table II provides a summary of the insecticide released during field trials utilizing the tags identified in Table I.
TABLE II
_________________________________________________________________________ _
Field Trials
Average Release Rate of Diazinon
For Tags From Table I
Lot No. 1 2 3 4 5 6
Location
#1 #2 #1 #3 #2 #1 #1 #4 #2 #3 #1 #1
_________________________________________________________________________ _
Application
1-9-90
5-15-90
1-20-90
3-30-90
5-15-90
3-30-90
3-30-90
5-17-90
6-27-90
7-26-90
11-12-90
11-15- 90
Date
Removal Date
7-20-90
10-11-90
7-28-90
8-29-90
11-26-90
9-14-90
10-20-90
10-3-90
10-30-90
11-11-90
3-30-91
4-3-91
Days on Cattle
191 149 189 151 196 168 204 140 126 108 137 138
Total Diazinon
2.757
3.604
4.162
4.359
4.259
4.083
3.812
3.920
3.289
2.696
3.191
2.471
Released (g)
Average 14.4
24.2 22.0
28.9
21.7 24.3
18.7 28.0
26.1 25.0 23.3 17.9
Release Rate
mg/day
_________________________________________________________________________ _
EXAMPLE 2
Various polymer compositions incorporating Diazinon insecticide were prepared according to the absorption procedure using technical grade (88% pure by weight) Diazinon and a dry blend was obtained. Ear tags were formed by injection molding. Table III summarizes the composition formulations of ear tags made according to this example and Table IV provides release rate data on these same tags.
TABLE III
______________________________________
Polyurethane Tags Made With Varying Quantities of
Resins B, D, and F and Insecticide
Composition, wt. %
Log No. (minimum 200 tags)
1 2 3 4 5
______________________________________
Resin D 53.9 42.4 51.7 -- --
Resin B -- -- -- 48.8 --
Resin F -- -- -- -- 48.4
Diazinon (88%) 45.8 57.3 46.5 43.9 43.5
PVC -- -- -- 6.1 6.0
Stabilizers -- -- 0.7 0.7 1.0
Colorants, Pigments
0.3 0.3 1.1 0.5 1.1
Average Tag Weight (g)
14.28 14.31 13.64 13.87
13.85
______________________________________
TABLE IV
_________________________________________________________________________ _
Field Trials
Average Release Rate Of Diazinon
For Tags From Table III
Lot No. 1 2 3 4 5
Location
#1 #1 #2 #3 #3 #2 #3 #2 #3 #4 #2 #1
_________________________________________________________________________ _
Application
3-31-90
3-30-90
3-23-90
5-15-90
5-15-90
3-27-90
6-27-90
7-26-90
6-27-90
5-25-90
6-23-90
11-10- 90
Date
Removal Date
7-21-90
9-15-90
8-29-90
10-31-90
10-1-90
8-29-90
10-30-90
11-11-90
10-30-90
10-29-90
12-01-90
4-01- 90
Days on Cattle
112 169 159 168 140 155 126 108 126 157 161 141
Total Diazinon
2.393
3.177
3.383
3.308
4.860
4.730
2.758
2.807
3.327
4.067
4.061
2.252
Released (g)
Average 21.4
18.8
21.3
19.7 34.7
30.5
21.9 26.0 26.4 25.9 25.2 16.0
Release
Rate mg/day
_________________________________________________________________________ _
EXAMPLE 3
Ear tags from Lot 4 of Example 1 (Tables I and II) and from Lot 2 of Example 2 (Tables III and IV) were attached to the ears of cattle in herds located in New Mexico and Texas. One tag per animal was used to determine the efficacy against horn flies. In both trials, an untreated cattle herd was located within the vicinity of the tagged herd. On the application day, and weekly thereafter, horn fly counts were taken on at least ten randomly selected tagged and untagged animals. The results are summarized in Table V.
From this data it is evident that a surprising long term efficacy can be achieved with only one tag of the present composition, even under very high fly populations (infestation) for a period of at least six months.
TABLE V
_________________________________________________________________________ _
Efficacy Trials - Control of Horn Flies
Lot 4, Example 1; Lot 2, Example 2
Location:
#1 #2
Treatment Date:
5-17-90 4-7-90
Average # of Flies
Average # of Flies
per animal per animal
Lot 4
Untagged Lot 2
Untagged
Ex. 1
Control
% Reduction
Ex. 2
Control
% Reduction
_________________________________________________________________________ _
# of Animals
22 50
35 50
Pretreatment
268 440 800 800
Count
# of Weeks
1 22 498 96 90 800 89
2 14 484 97 150 800 81
3 4 668 99 100 900 89
4 5 630 99 20 750 97
5 9 618 99 12 500 98
6 4 396 99 10 500 98
7 3 452 99 10 400 98
8 6 602 99 6 300 98
9 30 750 96 10 200 95
10 26 1126 98 5 200 98
11 20 1166 98 6 200 97
12 22 1384 98 7 250 97
13 48 1038 95 -- -- 97
14 64 984 93 20 250 92
15 38 1420 97 30 300 90
16 34 1106 97 10 300 97
17 5 706 99 40 300 87
18 24 594 96 14 350 96
19 36 610 94 20 300 93
20 164 540 70 30 300 90
21 20 300 93
22 25 300 92
23 35 300 88
24 30 200 85
25 24 250 90
_________________________________________________________________________ _
EXAMPLE 4
Ear tags containing 46 wt. % of a polyurethane resin, 46 wt. % of technical grade Diazinon, 6 wt. % of PVC resin and 2 wt. % total of stabilizers, dyes, and pigments were prepared using the following resins previously identified:
______________________________________
Tag
Lot No.
Resin
______________________________________
1 A
2 B
3 C
4 D
5 E
6 F
______________________________________
An efficacy trial with all tags was conducted in Alabama. As in Example 3, only one tag per animal head was employed, and an untagged control herd was kept in the vicinity of the tagged herds. An average number of horn flies from at least ten randomly selected animals in each herd, taken on the application date and every two weeks thereafter, are listed in Table VI.
TABLE VI
______________________________________
Efficacy Trials - Control of Horn Flies
Average Number of Horn Flies Per Animal
Untagged
Lot No. 1 2 3 4 5 6 Control
______________________________________
# of Animals
30 32 63 40 40 35 25
Pretreatment
156 162 167 151 148 141 156
Fly Count
treatment date
4-25-91
# of Weeks
Post Treatment Count
2 4.1 0.0 0.4 11.0 3.4 11.0 189
4 1.1 2.5 0.0 9.0 0.0 6.9 240
6 0.3 0.0 0.1 5.0 0.0 2.8 289
8 0.2 0.0 0.0 0.0 0.0 0.0 278
10 0.6 0.2 2.4 0.6 0.7 2.3 243
12 0.3 0.0 0.1 2.6 0.0 8.6 254
15 1.1 0.0 0.0 0.1 0.1 14.0 270
17 3.9 0.2 2.1 13.0 2.6 57.0 270
______________________________________
The method of preparing a device for protecting animals from insects according to the present invention comprises combining an ectoparasiticidal active compound with a polymer which is the reaction product of 4,4'-diphenylmethane diisocyanate, polytetramethylene glycol and 1,4-butanediol, and then forming the combination into a device which is attachable to an animal, such as an ear tag. The resin and ectoparasiticidal compound are preferably combined by utilizing 30% to 80% by weight polymer and 20% to 70% by weight of the compound. The most preferred method utilizes approximately 30% to 60% by weight of the ectoparasiticidal compound, 40% to 60% by weight polymer, and up to about 20% by weight polyvinyl chloride with up to 2% by weight inert ingredients, such as anti-oxidants, UV stabilizers, and pigment.
Lastly, the invention encompasses a method of protecting non- human domestic animals from ectoparasites which comprises attaching to the animal a device formed from a polymer which is the reaction product of 4, 4'-diphenylmethane diisocyanate, polytetramethylene glycol and 1,4- butanediol, which polymer has been mixed with up to 70% by weight of an ectoparasiticidal active compound. The preferred method utilizes the percent by weight ranges previously specified for the method of preparing the device according to the invention. All percentages are by weight based on the final product.
From the foregoing it is apparent that the device and methods of the present invention provide for a highly effective way of protecting domestic animals from insects such as horn flies for a prolonged period of time. The devices according to the present invention are able to support surprisingly high loadings of organophosphate insecticides. Equally surprising is the fact that the devices remain dry without exudation of insecticide, even after prolonged storage at elevated temperatures. Also, notwithstanding the unusually high loading of insecticide, the tags remain flexible and strong for long retention on the animals being protected. | |
Background and Objective:The use of new communication technologies, especially social networks in recent decades, has entered a new era and society; the society that Daniel Bell calls the post-industrial society; Tada Omsu, the network society; and Manuel Castell, the information society. The increasing development of electronic communication technologies such as satellite and Internet networks and their impact on many social, cultural, political and economic aspects, society has undergone such fundamental changes that some experts in virtual social networks called the virtual social media the new dimension of power in the 21st century. While we are witnessing a growing trend of users and members of Internet social networks, it is essential to know the various dimensions of networks and be aware of their effects. With the arrival of technology into the countries, we must always witness its ups and downs. The use of new technologies, in addition to creating opportunities, also becomes a threat. The purpose of this study was predicted the academic procrastination based on use of social networks with the intermediate role of self-regulation learning strategies among high school students.
Methods: The research method is applied research in terms of aim and is correlation in terms of the natures of subject. The statistical population includes all secondary school students in Hashtrood city. The sample size was 309 people based on the Morgan table and were selected randomly by multi-stage cluster sampling. Social networking questionnaire, self-regulation learning and academic procrastination were used to collect data. The opinions of related experts were used to determine the validity of the questionnaires and their reliability was determined by the coefficient of Cronbach's alpha (virtual networks, 0.88, self-regulatory learning strategy, 0.79; Academic procrastination, 0.80.
Findings: The results showed that the questionnaire had a good reliability. SPSS and Lisrel software were used to analyze data, Pearson correlation coefficient to examine the relationship between variables and the path analysis method to investigate the effect of variables. Conclusion: The results showed that there is a relationship between social networks with academic procrastination and student self-regulation learning strategies, and has an indirect effect on student’s procrastination. Based on the results, the following suggestions are given: the national media should consider a program as informal education to inform about the harmful consequences of improper use of social networks. The country's Educational Research and Planning Organization and institutions related to the production of curriculum content, should develop content to raise students' awareness of how to properly use social networks. School principals should hold educational workshops to raise awareness of the student community so that students become aware of the disadvantages and advantages of virtual networks and can use social networks to promote education. School principals need to keep in touch with students' parents and keep them informed of students' behaviors and practices so that parents can contribute to students' academic lives. - Teachers should inform students about their educational status in order to eliminate students' negligence. Principals, teachers and parents of students should cooperate in order to control the optimal use of social networks by students. Teachers inform students about the benefits and goals of using self-regulated learning strategies. Teachers should teach students how to use self-regulated learning strategies in the learning process in appropriate opportunities such as extracurricular activities.
Keywords
Main Subjects
COPYRIGHTS
©2020 The author(s). This is an open access article distributed under the terms of the Creative Commons Attribution (CC BY 4.0), which permits unrestricted use, distribution, and reproduction in any medium, as long as the original authors and source are cited. No permission is required from the authors or the publishers. | https://jte.sru.ac.ir/article_970.html?lang=en |
:
Mythic Study - The Empress
View Single Post
wizzle
Citizen
Join Date: 23 May 2005
Location: Washington State, USA
Posts: 1,398
wizzle
no reversals
I don't use reversals because:
1. I started with the Thoth deck which does not use reversals
2. I bought the Mythic deck because I am very much influenced by Liz Greene and her thoughts on astrology.
This last influence is probably paramount for me. Astrologers can't "reverse" planets. Instead, each planet holds the sum positive and negative meanings for the archetype as a whole. There is no need for reversals if this same theory is applied to tarot cards. Each card shows both the up- and down-sides of the archetype. I use the adjoining cards to determine whether the card is more positive or negative.
I guess the Thoth folks did that too, with the dignities. It just seemed natural to me.
The book which accompanies the Mythic deck reads very much like Liz Greene's astro texts. No card is exclusively good or bad. | http://tarotforum.net/showpost.php?s=f2cffc9f0f1f55944fd43efe3201fcbd&p=542876&postcount=7 |
Servings:
Calories: 140 kcal
- 1 can (8 ounces) crushed pineapple, in it’s own juice
- 1 package (3 ounces) raspberry flavored gelatin
- 1 can (14 ounces) whole berry cranberry sauce
- 1/4 cup chopped celery
- 1/4 cup chopped nuts
Instructions
- Drain pineapple, saving the juice. Add enough water to the juice to total 1-1/4 cups of liquid. In a saucepan, bring the liquid to a boil.
- Remove from the heat and stir in the gelatin until it’s dissolved.
- Break up the cranberry sauce with a fork and stir it into the gelatin mixture.
- Cool until the mixture begins to thicken and then stir in the crushed pineapple, celery and nuts.
- Pour into a mold and chill until set.
Recipe Notes
Just saw a Jello salad recipe variation that includes 2 cans (6-ounces each) mandarin oranges, drained and skips the celery. May try this next time. *3 Weight Watchers PointsPlus *8 Weight Watchers SmartPoints
Nutrition Facts
Weight Watchers Cranberry Jell-O Salad Recipe
Amount Per Serving (1 /8th recipe)
Calories 140Calories from Fat 9
% Daily Value*
Total Fat 1g2%
Total Carbohydrates 24g8%
Dietary Fiber 1g4%
Protein 1g2%
* Percent Daily Values are based on a 2000 calorie diet. | http://tastyrecipes01.com/molded-cranberry-jello-salad/ |
PROBLEM TO BE SOLVED: To improve the grass dividing capability and to improve the working efficiency by attaching a rotary cutting blade for cutting crop culms before grass dividing at the distal end of a grass divider.
SOLUTION: The universal combine harvester includes: a pair of right and left grass dividers (3R and 3L), a raking reel (5) for raking the culms introduced into an introduction pathway between the right and left grass dividers (3R and 3L) rearward; a hair-clipper type reaping device (6) for reaping the raked culms from the roots; and a pre-reaping part (9) having a raking auger (8) for raking the reaped culms rearward and conveying the culms in the lateral direction. In the universal combine harvester, the rotary cutting blade (12) for cutting the culms before grass dividing is disposed at the distal end of the grass divider (3L) located on the unreaped side of the right and left grass dividers (3R and 3L).
COPYRIGHT: (C)2012,JPO&INPIT | |
Every year, prior to the big event in Davos Switzerland where movers and shakers from around the world get together, the World Economic Forum produces a Global Risks Report. The report includes a survey of around one thousand members of their “multistakeholder communities.” The results reported are worth the attention of executives that participate in programs to assess and manage supply chain risks.
The top 5 global risks in terms of likelihood are:
- Extreme weather conditions
- Failure of climate-change mitigation and adaptation
- Natural disasters
- Data fraud or theft
- Cyber-attacks
The top 5 risks in terms of impact include:
- Weapons of mass destruction
- Failure of climate-change mitigation and adaptation
- Extreme weather events
- Water crises
- Natural disasters
Global risks were defined as uncertain events that if they occurred, could cause significant negative impact within the next ten years.
Environmental risks dominate the list for the third year in a row. Environmental risks account for three of the top five risks by likelihood and four of the top five by impact.
In terms of short-term supply chain risks, a list of risks expected to increase in 2019 was published. Many of the risks mentioned will require changing national attitudes, new laws, or better multilateral cooperation. Those risks are not listed below. Only the risks a supply chain risks an operations team could create contingency plans for are listed.
Percentage of Respondents Expecting Risks to Increase in 2019:
Economic confrontations/frictions between major powers 91%
Erosion of multilateral trading rules and agreements 90%
Political confrontations/frictions between major powers 85%
Cyber-attacks: Theft of data or money 82%
Cyber-attacks: disruption of operations and infrastructure 80%
Personal identity theft 64%
Loss of privacy (to companies) 63%
Regional conflicts drawing in major powers 62%
Destruction of natural ecosystems 62%
Protectionism against foreign workers 62%
Water crisis 58%
Protectionism regarding trade and investment 54%
Air pollution 52%
Weak economic growth 51%
Authoritarian leadership 51%
Concentration of corporate power 51%
High levels of crisis-driven or economic migration 50%
Debt defaults (public or private) 48%
State-on-state military conflict or incursion 44%
Erosion of constitutional and civil society checks on gov’t 44%
Civil unrest (including strikes and riots) 44%
Bubbles in stock or other asset prices 40%
Currency crisis 35%
Deep or corrupt ties between business and government 35%
Violent crime 30%
Terrorist attacks 20%
It is a sobering list. What companies can do about supply chain risks depends upon the type of risk. Risk mitigation can include changing where factories and other facilities are located, which ports goods and raw materials flow through, where companies choose to invest in growth, hardening IT systems, and many other things.
Companies also need to know more than just that a certain type of risk has increased, they also need to know where that risk is likely to occur.
Risks can be interconnected, mitigating against one type of risk can also mitigate against similar risks. But sometimes choosing to mitigate one risk can increase a different type of risk. In short, risk trade-offs need to be considered. Finally, not all risks can or should be mitigated.
Still, as companies go through their annual strategic planning process, and update their supply chain risks strategies, this report can be a good brainstorming tool. I just wish the report came out in October or November, when most companies are going through strategic planning, rather than in January, when the process is done for the year. | https://logisticsviewpoints.com/tag/strategic-planning/ |
Wooden Dolls - The Sunny Family
This modern doll family is the perfect size for on the go imaginative play and is scaled to fit a dolls house.
Beautifully hand painted with non toxic, child safe paints, these solid wood dolls are presented in a pretty window box.
Approximate dimensions: 10 x 5 x 3.5cm
Suitable for children 3 years +
Country of origin: Indonesia
Due to the nature of handcrafted products by small business artisans, stock is limited and variations may occur.
This section doesn’t currently include any content. Add content to this section using the sidebar. | https://fairplay.nz/products/wooden-dolls-the-sunny-family |
Here are some information about the height of Prince William.
Prince William's height is 6ft 3in or 191cm while I am 5ft 10in or 177cm. I am shorter compared to him. To find out how much shorter I am, we would have to subtract my height from Prince William's height. Therefore I am shorter to him for about 14cm.
And see your physical height difference with Prince William.
Do you feel that this height information for Prince William is incorrect?
What is your suggestion about the height of Prince William? | http://www.allheight.com/2013/05/prince-william-height-how-tall.html |
Sri Aurobindo explains that our spiritual perception of the Absolute has translated in our consciousness in two psychological experiences:
(a) The dimension of indeterminability expresses through "fundamental negating positives" that culminate in the Nirguna Brahman - the Eternal without qualities, the Impersonal, the Non-being, the Void.(Ibid)
(b) The dimension of determinations as an dynamic essentiality expresses though "fundamental affirming positives" that culminate in the concept of Saguna Brahman - the Infinite with Eternal qualities, the Infinite Person who is the source and foundation of all persons and personalities.(ibid)
In the supramental cognition both the perspectives have to be considered as existing in each other for "their co-existence or one-existence is eternal and their powers sustaining each other found the self-manifestation of the Infinite." (Ibid) Yet their separate consideration is not an illusion or "error of Ignorance" but has its own unique validity of spiritual experience.
Ordinarily, we can have spiritual experiences at three levels:
(a) At the spiritual end where the manifestation is programmed,
(b) At the material end where the manifestation is perceived,
(c) At the Inconscience where the Descent of Consciousness culminates and the evolutionary Ascent of Consciousness initiates its trajectory.
At each of these levels the Nirguna Brahman and the Saguna Brahman can be experienced:
At the spiritual end the indeterminability of the Nirguna Brahman and the primary power of determination of the Saguna Brahman can be considered as fundamental spiritual determinates or indeterminates.
At the material and inconscient planes, the same qualities of indeterminability and power of determinations can be considered as general determinates or generic indeterminates.
An experience of the Nirguna Brahman frees the Infinite from limitations by its own determinations so that the spirit is liberated and no longer bound by the determinations and creations of Nature.
An experience of the Saguna Brahman gives the Infinite the freedom "to create a world of determinations without being bound by it: it enables it also to withdraw from what it has created and re-create in a higher truth-formula." (Ibid, pg.332)
Freedom in different denouements is thus the key-word in the experience of the Absolute whether in its poise of indeterminability or as generator of determinants. "It is on this freedom that is based the spirit's power of infinite variation of the truth-possibilities of existence and also its capacity to create, without tying itself to its workings, any and every form of Necessity or system of order: the individual being too by experience of these negating absolutes can participate in that dynamic liberty, can pass from one order of self-formulation to a higher order." (Ibid)
In fact, at a certain stage of spiritual progress towards the Supramental consciousness, a period of Silence of the Spirit - a "Nirvana of mentality and mental ego" (Ibid) is indispensable. No wonder, an experience of the pure and featureless Self is needed to appreciate how that Silence supports the world of manifestation. "In any case, a realisation of the pure Self must always precede the transition to that mediating eminence of the consciousness from which a clear vision of the ascending and descending stairs of manifested existence is commanded and the possession of the free power of ascent and descent becomes a spiritual prerogative". (Ibid) This means that one can reach the stage where a subject after liberation can invoke the descent of the higher planes of consciousness in one's being so as to make them operable in terrestrial consciousness. That would signify the Jivanmukta in a dynamic mode.
Thus an identification with different poises of the Absolute, with its indeterminability as well as its different determinants is necessary for an integral comprehension of the Reality. If the inalienable unity of the Absolute is a Supramental experience, an identity with each of the primal aspects and powers of the Absolute is experienced at the global cognitive field of the Overmind without losing the sense of underlying unity.
It is only at the level of the Mind that the sense of underlying unity is lost and each power of the Absolute becomes an unique and separate affirmation. Yet all is not lost for even in the Mind's ignorance, a subliminal memory of the totality remains and can be recovered by a profound intuition of "an underlying truth of integral oneness".(Ibid, pg.333) If the aspirant progresses from the usual cognitive matrix of the ordinary mind to the domain of a higher spiritual mind, the sense of underlying unity behind all separate affirmations becomes an "ever-present experience". (Ibid)
Fundamental Truths in Omnipresent Reality
If the underlying unity of the multiplicity is a fundamental truth then all the unique and independent integers of the multiplicity also represent a fundamental truth of Reality. Sri Aurobindo explains: "All aspects of the omnipresent Reality have their fundamental truth in the Supreme Existence." (Ibid) This is best exemplified in the way the Inconscience is produced by the plunging of the Superconscience into the abyss through the process of self-involution that precedes the evolution. Whatever evolves is not from a vacuum but from the Inconscience where all that would evolve are involved as dormant potentialities. During the descent of the Superconscience into the abyss of "trance-sleep", all its values change into their nether opposites through a graded process of self-oblivion of the Spirit. That is how Life changes into Death, Truth changes into Falsehood, Knowledge changes into Ignorance, Joy changes into Suffering. These limited and opposing terms represents "the play of a secret all-being" with rules of "self-oblivion, self-opposition, self-limitation". (ibid) "This is the Inconscience and Ignorance that we see at work in the material universe. It is not a denial, it is one term, one formula of the infinite and eternal Existence". (Ibid)
Cognition of cosmic being
The Inconscience is therefore not a false imposition or unreal creation but inherent in the total cognition of cosmic being which has its assigned place in the spiritual economy (Ibid) of the universe. If all our experiences are considered to be unreal or false impositions, both cosmic and individual existence would be false and the sole reality would be the "indeterminable self-awareness of the Absolute"(Ibid). If the entire manifestation is considered to be temporal and a collapsible construction without the support of a timeless eternity, then that would also be a false imposition. "But if all is a manifestation of the Reality... then the awareness of individual being and world-being would be in its spiritual origin and nature a play of the infinite self-knowledge and all-knowledge; ignorance could be only a subordinate movement, a suppressed or restricted cognition or a partial and imperfect knowledge". (Ibid, pg.334)
Even if the entire manifestation is considered to be illusory and temporal, the inevitable consummation would be the return of the spirit, "not out of the cosmos to a sole supracosmic self-awareness but even in the cosmos itself to an integral self-knowledge and all-knowledge". (ibid)
Is there a blank Absolute beyond the Supermind?
The Supermind is the creative consciousness where the unmanifest One is programmed to become the Many. Sachchidananda that is the triune of Existence (Sat), Chit (Consciousness) and Bliss (Ananda) which are inseparable becomes dynamic in the creative matrix of the Supramental Truth Consciousness so as to initiate the beginning of differentiation.
Naturally it can be surmised that beyond the Supermind, the Absolute alone exists - a blank, featureless Absolute of indeterminability. The corollary would be that the components that make up the triune Reality of Sachchidananda would cease to exist in the ineffable Absolute.
Sri Aurobindo differs. He explains that whatever manifests must be pre-existent as a potentiality. Therefore the potentiality of determinations pre-exist in the Absolute as "inherent truths of the supreme being" (Ibid, pg.335) which is thus not truly featureless though it appears to be so. In fact though the Supermind itself is poised between the Overmind and Sachchidananda, it is also present as a potentiality and an inherent power-principle in Sachchidananda and Beyond: "the difference would be that the determinations would not be demarcations, they would be plastic, interfused, each a boundless infinite." (Ibid, pg.334-335)
In other words, the Oneness and the multiplicity, the dimension of indeterminability and the dimension of determinations exist simultaneously for "all is in each and each is in all radically and integrally". (Ibid, pg.335) In this broader spectrum, Knowledge as we know would be a direct action of consciousness upon itself.
"The Absolute is not a mystery of infinite blankness nor a supreme sum of negations; nothing can manifest that is not justified by some self power of the original and omnipresent Reality". (Ibid, pg.335)
Date of Update: | https://iiyp.net/lifedivinechapters151.php |
WHO WE ARE
Intrepid College Prep is a network of free, college preparatory public charter schools located in Antioch, Tennessee. We educate scholars at two campuses: Opportunity Academy Middle School and Independence Academy High School. Our 5-12 model ensures that scholars have the opportunity to engage in a rigorous, college-preparatory education for eight years prior to their transition to college and the professional opportunities that follow. We are an open-enrollment school, which means that our scholars do not have to take an entrance test or pay tuition to enroll.
Intrepid College Prep is committed to ensuring our scholars, educators, and families have the opportunity to unlock an unlimited future. By providing rigorous academic instruction and creating powerful relationships amongst our community’s members, we ignite passion, seek knowledge, and inspire the bravery needed to have a profound impact in our world.
WHAT YOU’LL DO
Our lessons engage students in rigorous, grade-level conceptual understandings and critical thinking skills. We offer rigorous learning material in an equitable environment by planning targeted differentiation and thoughtful scaffolds to best meet the needs of our diverse learners. We communicate high expectations to the young minds in our classrooms, and we deeply believe they can meet those academic expectations.
In order to support, grow and push our Exceptional Education (EE) students, we have a comprehensive model, including co-teaching, data-driven interventions, and individualized accommodations. The Director of Student Supports works with teachers, Principals, and the Support Team (EE teachers) to ensure our students have the academic supports necessary to excel. This position supports both Opportunity and Independence Academy.
Responsibilities:
-Assess overall progress of EE instruction at Intrepid College Prep and improve instructional practices, as needed.
-Monitor progress toward academic and behavior goals, and support teachers in achieving student goals.
-Ensure teachers are utilizing best practices and implementing effective and appropriate curricula.
-Work with the leadership teams to organize professional development workshops regarding delivery ofEE instruction and services.
-Ensure fidelity of accommodations to ensure students have the right amount of scaffolded to reach common learning objectives.
-Work with our EL teachers and Instructional Coaches to support tremendous academic growth for EL students and struggling adolescent readers.
-Collaborate with the Support Teams to ensure that instruction is always meeting the needs of all learners.
-Reflect and grow as an educator by engaging with peers and leaders constantly through frequent observations and implementing feedback.
-Coach, develop, and manager the Support Team teachers, including all EE teachers.
WHO YOU ARE
You are MISSION ALIGNED.
You feel a deep sense of conviction around our mission and are motivated to close both the achievement and wealth gaps in Nashville. You deeply believe that every one of our students can reach the college-ready bar.
You are RESULTS DRIVEN.
You do whatever it takes to produce results for our kids. You use data to make decisions about how to adjust your instruction and approach.
You are a STRONG INSTRUCTOR.
You have a deep love of teaching and a passion for your content area, and that passion comes alive in the classroom. You create a safe, motivating, and rigorous classroom environment and deliver strong instruction aligned to the college-ready bar.
You have a GROWTH MINDSET.
You have a reflective spirit and thrive on constructive feedback.
You are TENACIOUS.
You command your classroom, motivate others, and take action in the face of uncertainty.
You are RESILIENT.
You are adaptable, respond positively to challenges, and learn from your missteps.
Qualifications:
-Tennessee Certification in the appropriate content area, with a track record of data-driven achievement.
-Holds a B.A./B.S. degree with a minimum G.P.A. of 2.5.
-Minimum of two years teaching experience in an urban public school or charter school setting (preferred, but not required).
-Degree in subject area intended to teach (preferred, but not required).
-Speaks Spanish or has experience working with bilingual students (preferred, but not required).
Compensation
We offer a generous compensation package, including health benefits. All staff members are equipped with the tools needed to succeed, including a dedicated work space, laptop computer, email, high-speed internet access, and all necessary supplies. Compensation is highly competitive; teachers are eligible to participate in the MNPS Retirement System.
Commitment to Diversity
Intrepid College Prep is an equal opportunity employer. As an equal opportunity employer, we hire without consideration to race, religion, creed, color, national origin, age, gender, sexual orientation, marital status, veteran status or disability. | https://www.learn4good.com/jobs/nashville/tennessee/education/319908160/e/ |
Ingredients:
- 100g rye flour
- 900g bread flour
- 400g (200g+200g) sesame seeds
- 640g water (at 20ºC)
- 200g sourdough (100% hydrated)
- 8g fresh yeast
- 20g salt
Directions:
- Mix all ingredients in a standing robot, 4 minutes on a low speed and 10 minutes on a higher speed.
- Bulk fermentation 1h at room temperature.
- Cut the dough into 14 parts and shape them like little buns.
- Cover them with a towel and let them sit on the bench for 15 minutes.
- On a baking sheet, combine 7 parts into a daisy shape, putting one in the middle and 6 around it. Use some sprinkled water to stick them together. Repeat the same for the second daisy bread.
- Optionally you can put some sesame or sunflower seeds to decorate the breads. Again, use some sprinkled water to make the seeds to stick on the surface of breads.
- Cover with a towel and do the final fermentation for 1h30 at 24ºC.
- Preheat the oven at 260ºC with the baking stone inside.
- Slide the breads on the hot making stone and bake with steam in the first 15 minutes at 260ºC . After that, continue to bake for another 25 minutes reducing the temperature to 240ºC.
This recipe was inspired from Le Larousse du pain - Eric Kayser, page 248. | http://www.hungryshots.com/2015/03/ardeche-daisy-bread.html |
The 15 or so employees on Jeanne Logozzo’s marketing team at software maker Optika rely on a detailed communications plan to reach their boss in an emergency.
Logozzo, who splits her time between her home office in Boston and corporate headquarters in Colorado Springs, Colo., drafted the plan to reassure her employees that she was always available. The plan requires employees to page Logozzo if it’s an urgent matter but to use voice mail or e-mail if the issue can wait.
“You need to set up lines of communication that are reliable and then be extremely responsive,” said Logozzo, who spent about 80% of the last six months on the road. “You need to have a code with them, like, ‘If you mark something urgent, I’ll get back to you within so many hours.’ ”
Logozzo, Optika’s vice president of marketing, works remotely as both a manager and an employee. Her situation is hardly unique. The number of telecommuters in the U.S. more than tripled from 3.6 million in 1990 to 11.1 million in 1997, according to New York-based market research firm Cyber Dialogue.
As this number increases, so do the number of managers who are trying to manage and mentor employees who work remotely. Although telecommuting is maturing as a concept, managers confront the same issues today that they did a decade or so ago when the work style burst onto the national scene as an effective way to retain employees and save money.
Among the most popular concerns are: “How can I trust an employee who I can’t see to get his or her job done?” and “How can I as an employee combat isolation that accompanies working from home?”
Also considered challenges are technical support issues and the tendency of some employees to overdo it, said Nancy Kurland, assistant professor of management and organizations at USC’s Marshall School of Business. “They tend to work longer hours because they feel [telecommuting is] a privilege and they want to make sure it’s not taken away.”
A search by organizations to more effectively lead telecommuters has spawned an industry of consultants who are in great demand--even at organizations that have well-known telecommunications programs, Kurland said.
These experts say the most pressing concerns facing managers who have responsibility for telecommuters are setting job parameters for remote workers and fostering their career development.
Managers can avoid misunderstandings about a telecommuter’s responsibilities by drafting a generic agreement that is designed to be used by everyone in the company who wants to work outside the office. This agreement should be signed by the employee and the manager before the employee starts to telecommute.
Such an agreement, written by Monmouth Junction, N.J.-based telecommuting consultant Gil Gordon, is available online at https://www.gilgordon.com. It discusses how the employee should report hours worked, what equipment the company will provide for a home office, the reimbursement policy for utility costs, and the employee’s responsibility for income tax issues, among other things.
While many items in the agreement may seem obvious, Gordon says being extremely specific is a proactive way to head off potential problems and make the telecommuter more productive.
“It certainly takes away a lot of the potential problems because it spells out the expectations in advance,” Gordon said. “The other thing it does is to make it clear to telecommuters what their responsibilities are.”
Managers and employees can also use the parameters in the agreement to determine if an employee’s personality and work habits, as well as job responsibilities, lend themselves to a telecommuting arrangement.
Once an employee and a manager have set up a telecommuting agreement, they should sit down with the telecommuter’s colleagues to address their concerns about having one of their team members working off-site, Kurland said.
Another challenge confronting managers is how to measure a telecommuter’s performance. IBM requires telecommuters to draft a goals statement that they revisit with their manager several times a year, said Bob Egan, IBM’s project director for mobility.
Regular evaluations are crucial to allay managers’ fears that telecommuters are taking it easy at home, Egan said.
“On a regular basis, you are reviewing those objectives,” he said. “It’s important because if it’s a subjective environment, you’ll have a hard time pinning down if they’re doing what they’re supposed to do since they aren’t in the office.”
Communication is also key. Remote managers often find that employees are shy about calling them at home. Michelle Schwantes, manager of advanced technology information at Nortel in Nashville, holds a weekly conference call with her team to discuss “what we’re working on and whether or not issues need to be green-, yellow- or red-flagged.”
Structured communication also gives employees more freedom to make decisions on their own.
“Telecommuting empowers me to do the right thing because it allows me the flexibility to make decisions and to move quicker, which is really nice,” said Deborah Lis, a senior client representative at IBM. “We’re all expected to be professionals and to do the right thing for the customer.”
These goal statements might also spell out what kind of training an employee needs to complete new projects. Training for virtual workers is emerging as a key issue as more employees work from home, experts say.
Although career development responsibilities are shifting away from the employer to the employee, managers need to provide resources to telecommuters, said Chip Bell, senior partner at Performance Research Associates and author of “Managers as Mentors: Building Partnerships for Learning” (Berrett-Koehler, 1996).
Bell recommends that employers devise a “buddy system” that pairs employees with peers who have similar interests, learning needs and goals to ease feelings of loneliness and to promote learning.
Bell also advises companies to make “learning care packages” for telecommuters that include useful learning tools and funny knickknacks. Such packages remind telecommuters that co-workers haven’t forgotten about them, Bell said.
These techniques help managers feel more comfortable about the progress virtual employees are making, he adds. | https://www.latimes.com/archives/la-xpm-1998-jun-08-fi-57764-story.html |
Lead poisoning has been a constant public health concern because children absorb more lead compared to adults. The resulting health effects are irreversible and include decreased cognitive functions development and death. Lead exposure to children is in various ways and one of the ways is use of toys contaminated with lead. The allowable international standards for Lead in plastic toys is 90 ppm and this study established levels ranged from 0.001 to 2,100 ppm. The study used an analytical cross-sectional design in which 108 toys were collected from 18 randomly selected stores in Lusaka City. The toys were subjected to X-ray Fluorescence using Nilton gun machine to determine lead concentration. Stata version 12.0 was used for statistical analysis. Bivariate regression was used to test for association between independent and dependent variables at P < 0.05. Toys with lead levels above the recommended international standard of 90 ppm constituted 18.5% (20) of the total sample while 81.5% (88) toys had lead concentration within the standard. The concentration of lead had a median of 0.001 ppm and (IQR 0.001 – 60.5 ppm). Toys for children above the age of 2 years had higher lead levels of 105 ppm compared to those for children below 2 years with levels of 9.75 ppm. Toys in the midrange cost category of 16 -25 ZMK had higher levels of 232.5 ppm compared to toys in the low and high cost category of 2-15 and 36-190 ZMK. Lead levels were high in multi coloured toys (102 ppm) compared to the mean for single colours Toys of animal shape had higher lead levels of 105.5 ppm compared to toys in the miscellaneous and repetitive shape categories which had 90 and 0.001 ppm respectively. However, the association between these factors (colour, type, cost, child age category of the toy) and the concentration of lead in the toys was not statistically significant with P > 0.05. This study established that 18.5% of the toys were above the acceptable limit of lead, with some toys having lead levels 23 times higher than the internationally acceptable standard of 90ppm. There is therefore urgent need for regulatory bodies (ZEMA and ZABS) to develop standards and policy on lead in toys to ensure protection of children from lead poisoning. | http://palevel.unza.zm/handle/123456789/5826 |
We’re pleased to build some of our region’s most beautiful outdoor spaces. We recently celebrated with the Missionaries of the Precious Blood as they dedicated a reconciliation labyrinth and reflection pool at their spiritual Renewal Center in Liberty, Mo. Open to the public, guests may journey along 1,000 feet of walking paths, experience a natural stone walking labyrinth with reflection pool (this work was recently featured in an Aug. 3 article published in The Kansas City Star), or peacefully meditate lakeside on the stone dock. Congratulations and thank you for the opportunity to construct such a unique treasure for our Northland community!
About Precious Blood:
The Missionaries of the Precious Blood is a fraternal community of priests and brothers founded by St. Gaspar in 1815. The Kansas City Province are missionaries of these times with diverse gifts and ministries. In a spirit of joy, together with Precious Blood Companions, they strive to serve all people – especially the poor – with care and compassion, hope and hospitality.
The Precious Blood Renewal Center welcomes everyone to join them at the Center for retreats, days of reflections, to walk the labyrinth and any activity that renews and reenergizes you. Group functions and individuals are welcome! | https://www.bythebladekc.com/2016/08/precious-blood-project-update/ |
New 'Beauty Baryon' Particle Discovered at World's Largest Atom Smasher
A never-before-seen subatomic particle has popped into existence inside the world's largest atom smasher, bringing physicists a step closer to unraveling the mystery of how matter is put together in the universe.
After crashing particles together about 530 trillion times, scientists working on the CMS experiment at Switzerland's Large Hadron Collider (LHC) saw unmistakable evidence for a new type of "beauty baryon."
Baryons are particles made of three quarks (the building blocks of the protons and neutrons that populate the nuclei of atoms). Beauty baryons are baryons that contain at least one beauty quark (also known as a bottom quark). The new specimen is a particular type of excited beauty baryon called Xi(b)*, pronounced "csai–bee-star."
The discovery was announced Friday (April 27) in a paper released by the CMS collaboration (CMS stands for Compact Muon Solenoid, one of a handful of detectors built into the 17-mile, or 27-kilometer, underground loop of the LHC machine).
"It's very rewarding,"Vincenzo Chiochia, a University of Zurich physicist working on the CMS experiment, told LiveScience. "We work for projects that run for several years — from conception to data taking, it can take more than 10 years — so when you actually come up with a discovery, and you know this experiment is the only one that can produce it, it's extremely exciting."
It's just the second new particle to be discovered at the atom smasher, which opened at the CERN physics laboratory in Geneva in 2008. [Wacky Physics: The Coolest Little Particles in Nature]
The Xi(b)* particle had been predicted by a physics theory called quantum chromodynamics, which predicts how quarks bind together to form heavy particles, but had never before been observed.
"It was expected to be more or less where it was found," Chiochia said. "Not all of those heavy states have been discovered, so you have to look for all those particles. It may well be that the theory is not complete. In this particular case it was expected, but we have to keep looking for things that are unexpected."
And the researchers hope that with a little more time on the LHC, even more of these unseen particles will be found.
Exotic bits of matter like Xi(b)* are very unstable, and only exist for fractions of a second. They burst into being out of the abundance of energy released when two protons slam into each other head on inside the collider. Almost immediately, though, they decay into other particles, and some of these things are what physicists see inside the detectors.
The CMS researchers analyzed the results of trillions of collisions to find the signatures of the descendants of Xi(b)*.
"The collisions produce an enormous amount of tracks," Chiochia said. "To join the dots and find exactly which particle comes from which decay is actually not easy. What makes me confident is that if we can find this complicated chain of reactions at the LHC, then we must be in a really good position to find [other] heavy particles."
In addition to the other missing particles predicted by quantum chromodynamics, the LHC researchers are eagerly chasing another elusive quarry — the Higgs boson. This rumored particle is thought to explain why all particles have mass. Many scientists at CMS and one of the LHC's other experiments, ATLAS, say the particle is in their sights, and they hope to be able to claim a discovery of the Higgs boson by the end of this year.
You can follow LiveScience senior writer Clara Moskowitz on Twitter @ClaraMoskowitz. Follow LiveScience for the latest in science news and discoveries on Twitter @livescience and on Facebook.
Copyright 2012 LiveScience, a TechMediaNetwork company. All rights reserved. This material may not be published, broadcast, rewritten or redistributed. | https://www.foxnews.com/science/new-beauty-baryon-particle-discovered-at-worlds-largest-atom-smasher |
TECHNICAL FIELD
BACKGROUND ART
DISCLOSURE
Technical Problem
Technical Solution
Advantageous Effects
BEST MODE
EXAMPLE 1
Preparation of 2-ethoxy-4-phenyl-6-p-methylphenyl-1,2-oxaphosphorin 2-oxide
EXAMPLE 2
Preparation of 2-ethoxy-4-phenyl-6-1-cyclohexenyl-1,2-oxaphosphorin 2-oxide
EXAMPLE 3
Preparation of ethyl 3-phenylprop-1-en-2-yl phenylethynylphosphonate
EXAMPLE 4
Preparation of 2-ethoxy-4-phenyl-6-benzyl-1,2-oxaphosphorin 2-oxide
EXAMPLE 5
Preparation of ethyl 5-Phenylpent-1-en-2-yl phenylethynylphosphonate
EXAMPLE 6
Preparation of 2-ethoxy-4-phenyl-6-3-phenylpropyl-1,2-oxaphosphorin 2-oxide
EXAMPLE 7
Preparation of 2-ethoxy-4-phenyl-6-n-butyl-1,2-oxaphosphorin 2-oxide
EXAMPLE 8
Preparation of 2-ethoxy-4-p-tolyl-6-n-butyl-1,2-oxaphosphorin 2-oxide
EXAMPLE 9
Preparation of ethyl 5-chloropent-1-en-2-yl p-tolylethynylphosphonate
EXAMPLE 10
Preparation of 2-ethoxy-4-p-tolyl-6-chloropropyl-1,2-oxaphosphorin 2-oxide
EXAMPLE 11
Preparation of (2-ethoxy-4-p-tolyl-1,2-oxaphosphorin 2-oxide-6-yl)methyl acetate
EXAMPLE 12
Preparation of 2-ethoxy-4-p-tolyl-6-(cyclohexylmethyl)-1,2-oxaphosphorin 2-oxide
EXAMPLE 13
Preparation of 2-ethoxy-4-p-trifluoromethylphenyl-6-pentyl-1,2-oxaphosphorin 2-oxide
EXAMPLE 14
Preparation of 2-ethoxy-4-p-trifluoromethylphenyl-6-phenethyl-1,2-oxaphosphorin 2-oxide
EXAMPLE 15
Preparation of 2-ethoxy-4-n-butyl-6-cyclohexyl-1,2-oxaphosphorin 2-oxide
EXAMPLE 16
Preparation of 2-ethoxy-4-n-butyl-6-n-butyl-1,2-oxaphosphorin 2-oxide
EXAMPLE 17
Preparation of 5-chloropent-1-en-2yl ethylhex-1-ynylphosphonate
EXAMPLE 18
Preparation of 2-ethoxy-4-n-butyl-6-3-chlorpropyl-1,2-oxaphosphorin 2-oxide
EXAMPLE 19
Preparation of 2-ethoxy-4-n-butyl-6-phenethyl-1,2-oxaphosphorin 2-oxide
EXAMPLE 20
Preparation of 2-ethoxy-4-n-butyl-6-3-phenylpropyl-1,2-oxaphosphorin 2-oxide
EXAMPLE 21
Preparation of 2-ethoxy-4-p-chlorophenyl-6-n-butyl-1,2-oxaphosphorin 2-oxide
EXAMPLE 22
Preparation of 2-ethoxy-4-p-chlorophenyl-6-(3-chloropropyl)-1,2-oxaphosphorin 2-oxide
EXAMPLE 23
Preparation of ethyl 5-phenylpent-1-en-2-yl 2-(4-chlorophenyl)ethynylphosphonate
EXAMPLE 24
Preparation of 2-ethoxy-4-p-chlorophenyl-6-3-phenylpropyl-1,2-oxaphosphorin 2-oxide
The present invention relates to a novel phosphorus 2-pyrone derivative and a preparation method thereof, and more specifically, to a method of efficiently synthesizing a phosphorus 2-pyrone derivative by treating an alkyl hydrogen alkynylphosphonate derivative and an alkyne derivative with a minimal amount of a gold (Au) catalyst.
2-pyrone is a natural material used as a synthetic intermediate for various materials and having biological activity. It has recently become known that 2-pyrone derivatives have an HIV-inhibiting activity and as a result, 2-pyrone derivatives are receiving a lot of attention.
Org. Lett.
Phosphorus 2-pyrone derivatives are similar to the 2-pyrone derivatives in view of a structure of the biological properties. However, there are only 4 known methods of synthesizing the phosphorus 2-pyrone derivatives so far, and known structures of the derivatives are also extremely limited (2005, 7, 3299). Accordingly, in order to develop a reaction for efficiently synthesizing various phosphorus 2-pyrone derivatives, the present inventors developed a catalytic reaction using a gold (Au) catalyst to efficiently synthesize the phosphorus 2-pyrone derivatives including various structures.
An object of the present invention is to provide a novel phosphorus 2-pyrone derivative and a preparation method thereof.
In addition, another object of the present invention is to provide an intermediate compound for preparing the phosphorus 2-pyrone derivative and a preparation method thereof.
In one general aspect, there are provided a novel phosphorus 2-pyrone derivative represented by the following Chemical Formula 1, and a preparation method thereof:
In another general aspect, there are provided an alkyl alkenyl alkynyl phosphonate derivative represented by the following Chemical Formula 2 which is an intermediate compound for preparing the phosphorus 2-pyrone derivative, and a preparation method thereof:
Hereinafter, the present invention will be described in detail.
Here, unless technical and scientific terms used herein are defined otherwise, they have meanings generally understood by those skilled in the art to which the present invention pertains. In addition, repeated descriptions for technical constitution and function as the same as the related art will be omitted.
The present invention provides a phosphorus 2-pyrone derivative represented by the following Chemical Formula 1:
1
2
Ris (C1-C7)alkyl, (C3-C12)cycloalkyl, (C6-C20)aryl, (C3-C12)cycloalkenyl or (C6-C20)ar(C1-C7)alkyl;
3
Ris (C1-C7)alkyl; and
1
2
the alkyl and the aryl of Rand Rmay be further substituted with one or more selected from the group consisting of halogen, (C1-C7)alkyl, halo(C1-C7)alkyl, (C3-C12)cycloalkyl and (C1-C7)alkylcarbonyloxy.
in Chemical Formula 1, Ris (C1-C7)alkyl or (C6-C20)aryl;
In Chemical Formula 1 above, the ‘alkyl’ includes all of the linear or branched carbon chains, and examples of the ‘aryl’ may include phenyl, biphenyl, naphthyl, anthryl, and the like.
1
2
3
Specifically, in Chemical Formula 1 above, Ris n-butyl, n-pentyl, phenyl, 4-methylphenyl, 4-chlorophenyl or 4-trifluoromethylphenyl; Ris n-butyl, n-pentyl, 1-bromoethyl, 1-chloropropyl, cyclohexyl, cyclohexenyl, phenyl, 4-methylphenyl, 4-chlorophenyl, 4-trifluoromethylphenyl, 1-phenylethyl, 1-phenylpropyl, methylcarbonyloxymethyl, benzyl or cyclohexylmethyl; and Ris methyl, ethyl, propyl, butyl, pentyl, hexyl or heptyl.
More specifically, the phosphorus 2-pyrone derivative represented by Chemical Formula 1 above may be selected from the following compounds:
In addition, the present invention provides an alkyl alkenyl alkynyl phosphonate derivative represented by the following Chemical Formula 2, wherein the alkyl alkenyl alkynyl phosphonate derivative represented by the following Chemical Formula 2 is an intermediate for preparing the phosphorus 2-pyrone derivative represented by Chemical Formula 1:
1
2
Ris (C1-C7)alkyl, (C3-C12)cycloalkyl, (C6-C20)aryl, (C3-C12)cycloalkenyl or (C6-C20)ar(C1-C7)alkyl;
3
Ris a (C1-C7)alkyl; and
1
2
the alkyl and the aryl of Rand Rmay be further substituted with one or more selected from the group consisting of halogen, (C1-C7)alkyl, halo(C1-C7)alkyl, (C3-C12)cycloalkyl and (C1-C7)alkylcarbonyloxy.
in Chemical Formula 2, Ris (C1-C7)alkyl or (C6-C20)aryl;
1
2
3
Specifically, in Chemical Formula 2 above, Ris n-butyl, n-pentyl, phenyl, 4-methylphenyl, 4-chlorophenyl or 4-trifluoromethylphenyl; Ris n-butyl, n-pentyl, 1-bromoethyl, 1-chloropropyl, cyclohexyl, cyclohexenyl, phenyl, 4-methylphenyl, 4-chlorophenyl, 4-trifluoromethylphenyl, 1-phenylethyl, 1-phenylpropyl, methylcarbonyloxymethyl, benzyl or cyclohexylmethyl; and Ris methyl, ethyl, propyl, butyl, pentyl, hexyl or heptyl.
More specifically, the alkyl alkenyl alkynylphosphonate derivative may be selected from the following compounds:
Further, the present invention provides a preparation method of a phosphorus 2-pyrone derivative represented by the following Chemical Formula 1 by reacting an alkyl hydrogen alkynyl phosphonate derivative represented by the following Chemical Formula 3 and an alkyne derivative represented by the following Chemical Formula 4 in the presence of a gold catalyst:
1
2
Ris (C1-C7)alkyl, (C3-C12)cycloalkyl, (C6-C20)aryl, (C3-C12)cycloalkenyl or (C6-C20)ar(C1-C7)alkyl;
3
Ris a (C1-C7)alkyl; and
1
2
the alkyl and the aryl of Rand Rmay be further substituted with one or more selected from the group consisting of halogen, (C1-C7)alkyl, halo(C1-C7)alkyl, (C3-C12)cycloalkyl and (C1-C7)alkylcarbonyloxy.
in Chemical Formulas 1, 3 and 4, Ris (C1-C7)alkyl or (C6-C20)aryl;
More specifically, the phosphorus 2-pyrone derivative represented by Chemical Formula 1 above may be prepared through the intermediate represented by Chemical Formula 2 by reacting various alkyl hydrogen alkynyl phosphonate derivatives represented by the following Chemical Formula 3 and the alkyne derivative represented by the following Chemical Formula 4 in the presence of the gold catalyst: (Reaction Formula 1)
In addition, the phosphorus 2-pyrone derivative represented by Chemical Formula 1 above may be prepared by 1) a step of reacting the alkyl hydrogen alkynyl phosphonate derivative represented by Chemical Formula 3 above and the alkyne derivative represented by Chemical Formula 4 above in the presence of the gold catalyst and a base to prepare the alkyl alkenyl alkynyl phosphonate derivative represented by Chemical Formula 2 above; and 2) a step of performing an intramolecular cyclization reaction on the prepared alkyl alkenyl alkynyl phosphonate derivative represented by Chemical Formula 2 above in the presence of the gold catalyst to prepare the phosphorus 2-pyrone derivative represented by Chemical Formula 1 above: (Reaction Formula 2)
As a reaction container used in the preparation method of the present invention, a v-bial, a test tube, or a round flask may be used.
3
3
6
5
3
3
6
4
3
3
6
3
6
+
+
The gold (Au) catalyst used in the preparation method of the present invention may be one or more selected from the group consisting of AuCl, AuBr, AuCl, PhPAuCl, (CF)PAuCl, (4-CF—CH)PAuCl, IMesAuCl [IMes: 1,3-bis(2,4,6-trimethylphenyl)imidazol-2-ylidene], IPrAuCl [IPr: 1,3-bis(2,6-diisopropylphenyl)imidazol-2-ylidene], Au(JohnPhos)Cl [JohnPhos:(2-biphenyl)di-tert-butylphosphine] and {[Au(JohnPhos)NCCH]SbF—}, and {[Au(JohnPhos)NCCH]SbF—} is the most preferred. The gold (Au) catalyst used in the preparation method of the present invention may be preferably used in 0.01 to 0.1 mol, and the most preferably, in 0.05 mol, based on 1 mol of the alkyl hydrogen alkynyl phosphonate derivative represented by Chemical Formula 3 above. In addition, the gold (Au) catalyst used in step 2) of Reaction Formula 2 above may be preferably used in 0.01 to 0.1 mol, and the most preferably, in 0.05 mol, based on 1 mol of the alkyl alkenyl alkynyl phosphonate derivative represented by Chemical Formula 2 above.
The solvent used in the preparation method (Reaction Formulas 1 and 2) of the present invention is general organic solvents. Preferably, at least one kind selected from the group consisting of dichloromethane (DCM), dichloroethane (DCE), toluene, acetonitrile (MeCN), nitromethane, tetrahydrofuran (THF), N,N-dimethylformamide (DMF) and N,N-dimethylacetamide (DMA) may be used as the solvent, and more preferably, dichloroethane (DCE) may be used as the solvent.
The reaction may be performed at a reaction temperature ranging from 20 to 40° C., or may be performed at room temperature to 30° C. The reaction time may be different according to reaction materials, kinds of catalysts, and an amount of starting materials. The reaction is allowed to be completed after confirming complete consumption of the alkyl hydrogen alkynyl phosphonate derivative which is a starting material, by TLC, or the like. When the reaction is completed, an extraction process is performed, then the solvent is distilled under reduced pressure, and a target material may be separated and purified by general methods such as column chromatography, and the like.
Phosphorus 2-pyrone derivatives according to the present invention may be used as a basic framework of natural materials having biological activity and may be developed as new types of drug or various pharmaceutical products.
In addition, with a preparation method of the phosphorus 2-pyrone derivative according to the present invention, the phosphorus 2-pyrone derivative may be efficiently prepared by an intermolecular addition reaction and a subsequent intramolecular cyclization reaction between a alkyl hydrogen alkynyl phosphonate derivative and an alkyne derivative in the presence of a gold (Au) catalyst.
Hereinafter, the present invention will be described in detail with reference to examples. These examples are provided to help understand the present invention, and the scope of the present invention is not construed to be limited to these examples.
3
6
+
A gold (Ag(I)) catalyst {[Au(JohnPhos)NCCH]SbF—} [JohnPhos:(2-biphenyl)di-tert-butylphosphine] (11.3 mg, 0.015 mmol) was put into a reaction container, and dichloroethane (0.4 mL) was added thereto. After stirring at room temperature for 5 minutes, ethyl hydrogen phenylethynylphosphonate (63.0 mg, 0.3 mmol) diluted with 0.5 mL of dichloroethane was added thereto. Then 1-ethynyl-4-methylbenzene (174 mg, 1.5 mmol) was put thereinto, followed by stirring at 30° C. for 16 hours, and when all of the starting materials disappeared in the TLC, the reaction was allowed to be completed. After the solvent was removed under low atmospheric pressure, the product was separated by chromatography to obtain 2-ethoxy-4-phenyl-6-p-methylphenyl-1,2-oxaphosphorin 2-oxide (33.2 mg, 34%) which is a title compound.
1
3
H NMR (400 MHz, CDCl) δ 7.69 (d, J=8.3 Hz, 2H), 7.57-7.54 (m, 2H), 7.46-7.44 (m, 3H), 7.24 (d, J=17.6 Hz, 2H), 6.54 (s, 1H), 6.04 (d, J=17.6 Hz, 1H), 4.26-4.22 (m, 2H), 2.40 (s, 3H), 1.39 (t, J=7.0 Hz, 3H).
3
6
+
A gold (Ag(I)) catalyst {[Au(JohnPhos)NCCH]SbF—} [JohnPhos:(2-biphenyl)di-tert-butylphosphine] (11.3 mg, 0.015 mmol) was put into a reaction container, and dichloroethane (0.4 mL) was added thereto. After stirring at room temperature for 5 minutes, ethyl hydrogen phenylethynylphosphonate (63.0 mg, 0.3 mmol) diluted with 0.5 mL of dichloroethane was added thereto. Then 1-ethynylcyclohex-1-ene (63.6 mg, 0.6 mmol) was put thereinto, followed by stirring at 30° C. for 18 hours, and when all of the starting materials disappeared in the TLC, the reaction was allowed to be completed. After the solvent was removed under low atmospheric pressure, the product was separated by chromatography to obtain 2-ethoxy-4-phenyl-6-1-cyclohexenyl-1,2-oxaphosphorin 2-oxide (58.8 mg, 62%) which is a title compound.
1
3
H NMR (400 MHz, CDCl) δ 7.50-7.43 (m, 2H), 7.43-7.41 (m, 3H), 6.73 (s, 1H), 5.98 (d, J=17.2 Hz, 1H), 5.92 (s, 1H), 4.23-4.15 (m, 2H), 2.26-2.21 (m, 4H), 1.75-1.62 (m, 4H), 1.38 (t, J=7.1 Hz, 3H).
3
6
3
+
A gold (Ag(I)) catalyst {[Au(JohnPhos)NCCH]SbF—} [JohnPhos:(2-biphenyl)di-tert-butylphosphine] (11.3 mg, 0.015 mmol) and triethylamine (EtN) (3.0 mg, 0.03 mmol) were put into a reaction container, and dichloroethane (0.4 mL) was put thereinto. After stirring at room temperature for 5 minutes, ethyl hydrogen phenylethynylphosphonate (63.0 mg, 0.3 mmol) diluted with 0.5 mL of dichloroethane was added thereto, and finally, prop-2-ynylbenzene (70 mg, 0.6 mmol) was put thereinto. Then, when all of the starting materials disappeared in the TLC, the reaction was allowed to be completed. After the solvent was removed under low atmospheric pressure, the product was separated by chromatography to obtain ethyl 3-phenylprop-1-en-2-yl phenylethynylphosphonate (68.9 mg, 71%) which is a title compound.
1
3
H NMR (400 MHz, CDCl) δ 7.54 (d, J=7.1 Hz, 2H), 7.54-7.45 (m, 1H), 7.40-7.29 (m, 2H), 7.28-7.24 (m, 5H), 5.06 (t, J=2.2 Hz, 1H), 4.56 (s, 1H), 4.21-4.13 (m, 2H), 3.58 (s, 2H), 1.36(t, J=7.0 Hz, 3H).
3
6
+
Method 1—A gold (Ag(I)) catalyst {[Au(JohnPhos)NCCH]SbF—} [JohnPhos:(2-biphenyl)di-tent-butylphosphine] (11.3 mg, 0.015 mmol) was put into a reaction container, and dichloroethane (0.4 mL) was put thereinto. After stirring at room temperature for 5 minutes, ethyl 3-phenylprop-1en-2-yl phenylethynylphosphonate (example 3, 98 mg, 0.3 mmol) was put thereinto, and when all of the starting materials disappeared in the TLC, the reaction was allowed to be completed. After the solvent was removed under low atmospheric pressure, the product was separated by chromatography to obtain 2-ethoxy-4-phenyl-6-benzyl-1,2-oxaphosphorin 2-oxide (84.1 mg, 86%) which is a title compound.
3
6
+
Method 2—A gold (Ag(I)) catalyst {[Au(JohnPhos)NCCH]SbF—} [JohnPhos:(2-biphenyl)di-tert-butylphosphine] (11.3 mg, 0.015 mmol) was put into a reaction container, and dichloroethane (0.4 mL) was put thereinto. After stirring at room temperature for 5 minutes, ethyl hydrogen phenylethynylphosphonate (63.0 mg, 0.3 mmol) diluted with 0.5 mL of dichloroethane was added thereto, and finally, prop-2-ynylbenzene (70 mg, 0.6 mmol) was put thereinto. Then, when all of the starting materials disappeared in the TLC, the reaction was allowed to be completed. After the solvent was removed under low atmospheric pressure, the product was separated by chromatography to obtain 2-ethoxy-4-phenyl-6-benzyl-1,2-oxaphosphorin 2-oxide (68.5 mg, 70%) which is a title compound.
1
3
H NMR (400 MHz, CDCl) δ 7.43-7.39 (m, 5H), 7.34-7.26 (m, 5H), 5.92 (d, J=17.6 Hz, 1H), 5.84 (s, 1H), 4.03-3.94 (m, 2H), 3.71 (s, 2H), 1.19 (t, J=7.1 Hz, 3H).
3
6
3
|
A gold (Ag(I)) catalyst {[Au(JohnPhos)NCCH]SbF—} [JohnPhos:(2-biphenyl)di-tert-butylphosphine] (11.3 mg, 0.015 mmol) and triethylamine (EtN) (3.0 mg, 0.03 mmol) were put into a reaction container, and dichloroethane (0.4 mL) was put thereinto. After stirring at room temperature for 5 minutes, ethyl hydrogen phenylethynylphosphonate) (63.0 mg, 0.3 mmol) diluted with 0.5 mL of dichloroethane was added thereto, and finally, pent-4-ynylbenzene (86.5 mg, 0.6 mmol) was put thereinto. Then, when all of the starting materials disappeared in the TLC, the reaction was allowed to be completed. After the solvent was removed under low atmospheric pressure, the product was separated by chromatography to obtain ethyl 5-phenylpent-1-en-2-yl phenylethynylphosphonate (78.7 mg, 74%) which is a title compound.
1
3
H NMR (400 MHz, CDCl) δ 7.54-7.52 (m, 2H), 7.47-7.43 (m, 1H), 7.38-7.34 (m, 2H), 7.28-7.24 (m, 2H), 7.19-7.16 (m, 3H), 5.00 (t, J=2.2 Hz, 1H), 4.61-4.60 (m, 1H), 4.31-4.24 (m, 2H), 2.67 (t, J=7.6, 2H), 2.30 (t, J=7.4 Hz, 2H), 1.93-1.86 (m, 2H), 1.42 (t, J=7.0 Hz, 3H).
3
6
+
Method 1—A gold (Ag(I)) catalyst {[Au(JohnPhos)NCCH]SbF—} [JohnPhos:(2-biphenyl)di-tent-butylphosphine] (11.3 mg, 0.015 mmol) was put into a reaction container, and dichloroethane (0.4 mL) was put thereinto. After stirring at room temperature for 5 minutes, ethyl 5-phenylpent-1-en-2-yl phenylethynylphosphonate (Example 5, 106.3 mg, 0.3 mmol) was put thereinto, and when all of the starting materials disappeared in the TLC, the reaction was allowed to be completed. After the solvent was removed under low atmospheric pressure, the product was separated by chromatography to obtain 2-ethoxy-4-phenyl-6-3-phenylpropyl-1,2-oxaphosphorin 2-oxide (89.3 mg, 84%) which is a title compound.
3
6
+
Method 2—A gold (Ag(I)) catalyst {[Au(JohnPhos)NCCH]SbF—} [JohnPhos:(2-biphenyl)di-tert-butylphosphine] (11.3 mg, 0.015 mmol) was put into a reaction container, and dichloroethane (0.4 mL) was put thereinto. After stirring at room temperature for 5 minutes, ethyl hydrogen phenylethynylphosphonate (63.0 mg, 0.3 mmol) diluted with 0.5 mL of dichloroethane was added thereto, and finally, pent-4-ynylbenzene (86.5 mg, 0.6 mmol) was put thereinto. Then, when all of the starting materials disappeared in the TLC, the reaction was allowed to be completed. After the solvent was removed under low atmospheric pressure, the product was separated by chromatography to obtain 2-ethoxy-4-phenyl-6-3-phenylpropyl-1,2-oxaphosphorin 2-oxide (72.3 mg, 68%) which is a title compound.
1
3
H NMR (400 MHz, CDCl) δ 7.48-7.40 (m, 5H), 7.30-7.26 (m, 2H), 7.22-7.18 (m, 3H), 5.93 (d, J=17.6 Hz, 1H), 5.82 (s, 1H), 4.21-4.15 (m, 2H), 2.70 (t, J=7.5 Hz, 2H), 2.46-2.41 (m, 2H), 2.04-1.98 (m, 2H), 1.37 (t, J=7.1 Hz, 3H).
3
6
+
A gold (Ag(I)) catalyst {[Au(JohnPhos)NCCH]SbF—} [JohnPhos:(2-biphenyl)di-tert-butylphosphine] (11.3 mg, 0.015 mmol) was put into a reaction container, and dichloroethane (0.4 mL) was put thereinto. After stirring at room temperature for 5 minutes, ethyl hydrogen phenylethynylphosphonate (63.0 mg, 0.3 mmol) diluted with 0.5 mL of dichloroethane was added thereto, and finally, hex-1-yne (49.2 mg, 0.6 mmol) was put thereinto. Then, when all of the starting materials disappeared in the TLC, the reaction was allowed to be completed. After the solvent was removed under low atmospheric pressure, the product was separated by chromatography to obtain 2-ethoxy-4-phenyl-6-n-butyl-1,2-oxaphosphorin 2-oxide (68.5 mg, 70%) which is a title compound.
1
3
H NMR (400 MHz, CDCl) δ 7.49-7.46 (m, 2H), 7.43-7.41 (m, 3H), 5.92 (d, J=16.4 Hz, 1H), 5.83 (s, 1H), 4.22-4.15 (m, 2H), 2.44-2.39 (m, 2H), 1.66-1.61 (m, 2H), 1.43-1.35 (m, 5H), 0.94 (t, J=7.4 Hz, 3H).
3
6
+
A gold (Ag(I)) catalyst {[Au(JohnPhos)NCCH]SbF—} [JohnPhos:(2-biphenyl)di-tert-butylphosphine] (11.3 mg, 0.015 mmol) was put into a reaction container, and dichloroethane (0.4 mL) was put thereinto. After stirring at room temperature for 5 minutes, ethyl hydrogen p-tolylethynylphosphonate (67.3 mg, 0.3 mmol) diluted with 0.5 mL of dichloroethane was added thereto, and finally, hex-1-yne (49.2 mg, 0.6 mmol) was put thereinto. Then, when all of the starting materials disappeared in the TLC, the reaction was allowed to be completed. After the solvent was removed under low atmospheric pressure, the product was separated by chromatography to obtain 2-ethoxy-4-p-tolyl-6-n-butyl-1,2-oxaphosphorin 2-oxide (68.5 mg, 70%) which is a title compound.
1
3
H NMR (400 MHz, CDCl) δ 7.37 (d, J=8.1 Hz, 2H), 7.22 (d, J=8.1 Hz, 2H), 5.89 (d, J=17.6 Hz, 1H), 5.82 (s, 1H), 4.21-4.13 (m, 2H), 2.43-2.38 (m, 2H), 2.38 (s, 3H), 1.66-1.60 (m, 2H), 1.43-1.34 (m, 5H), 0.94 (t, J=7.3 Hz, 3H).
3
6
3
+
A gold (Ag(I)) catalyst {[Au(JohnPhos)NCCH]SbF—} [JohnPhos:(2-biphenyl)di-tert-butylphosphine] (11.3 mg, 0.015 mmol) and triethylamine (EtN) (3.0 mg, 0.03 mmol) were put into a reaction container, and dichloroethane (0.4 mL) was put thereinto. After stirring at room temperature for 5 minutes, ethyl hydrogen p-tolylethynylphosphonate (67.3 mg, 0.3 mmol) diluted with 0.5 mL of dichloroethane was added thereto, and finally, 5-chloropent-1-yne (61.5 mg, 0.6 mmol) was put thereinto. Then, when all of the starting materials disappeared in the TLC, the reaction was allowed to be completed. After the solvent was removed under low atmospheric pressure, the product was separated by chromatography to obtain ethyl 5-chloropent-1-en-2-yl p-tolylethynylphosphonate (68.5 mg, 70%) which is a title compound.
1
3
H NMR (400 MHz, CDCl) δ 7.56 (d, J=8.1 Hz, 2H), 7.19 (d, J=8.1 Hz, 2H), 5.0 (t, J=2.4 Hz, 1H), 4.66-4.65 (m, 1H), 4.28 (m, 2H), 3.60 (t, J=6.4 Hz, 2H), 2.44 (t, J=7.2 Hz, 2H), 2.39 (s, 3H), 2.07-2.01 (m, 2H), 1.43 (t, J=7.0 Hz, 3H).
3
6
+
Method 1—A gold (Ag(I)) catalyst {[Au(JohnPhos)NCCH]SbF—} [JohnPhos:(2-biphenyl)di-tent-butylphosphine] (11.3 mg, 0.015 mmol) was put into a reaction container, and dichloroethane (0.4 mL) was put thereinto. After stirring at room temperature for 5 minutes, ethyl 5-chloropent-1-en-2-yl p-tolylethynylphosphonate (Example 9, 97.8 mg, 0.3 mmol) diluted with 0.5 mL of dichloroethane was added thereto, and when all of the starting materials disappeared in the TLC, the reaction was allowed to be completed. After the solvent was removed under low atmospheric pressure, the product was separated by chromatography to obtain 2-ethoxy-4-p-tolyl-6-chloropropyl-1,2-oxaphosphorin 2-oxide (76.3 mg, 78%) which is a title compound.
3
6
+
Method 2—A gold (Ag(I)) catalyst {[Au(JohnPhos)NCCH]SbF—} [JohnPhos:(2-biphenyl)di-tent-butylphosphine] (11.3 mg, 0.015 mmol) was put into a reaction container, and dichloroethane (0.4 mL) was put thereinto. After stirring at room temperature for 5 minutes, ethyl hydrogen p-tolylethynylphosphonate (67.3 mg, 0.3 mmol) diluted with 0.5 mL of dichloroethane was added thereto, and finally, 5-chloropent-1-yne (61.5 mg, 0.6 mmol) was put thereinto. Then, when all of the starting materials disappeared in the TLC, the reaction was allowed to be completed. After the solvent was removed under low atmospheric pressure, the product was separated by chromatography to obtain 2-ethoxy-4-p-tolyl-6-chloropropyl-1,2-oxaphosphorin 2-oxide (68.5 mg, 70%) which is a title compound.
1
3
H NMR (400 MHz, CDCl) δ 7.31 (d, J=8.1 Hz, 2H), 7.15 (d, J=8.1 Hz, 2H), 5.86 (d, J=17.1 Hz, 1H), 5.84 (s, 1H), 4.14-4.04 (m, 2H), 3.54 (t, J=6.3 Hz, 2H), 2.54-2.51 (m, 2H), 2.32 (s, 3H), 2.10-2.04 (m, 2H), 1.30 (t, J=7.1 Hz, 3H).
3
6
+
A gold (Ag(I)) catalyst {[Au(JohnPhos)NCCH]SbF—} [JohnPhos:(2-biphenyl)di-tert-butylphosphine] (11.3 mg, 0.015 mmol) was put into a reaction container, and dichloroethane (0.4 mL) was put thereinto. After stirring at room temperature for 5 minutes, ethyl hydrogen p-tolylethynylphosphonate (67.3 mg, 0.3 mmol) diluted with 0.5 mL of dichloroethane was added thereto, and finally, prop-2-ynyl acetate (129 mg, 1.5 mmol) was put thereinto. Then, when all of the starting materials disappeared in the TLC, the reaction was allowed to be completed. After the solvent was removed under low atmospheric pressure, the product was separated by chromatography to obtain (2-ethoxy-4-p-tolyl-1,2-oxaphosphorin 2-oxide-6-yl)methyl acetate (46.4 mg, 48%) which is a title compound.
1
3
H NMR (400 MHz, CDCl) δ 7.31 (d, J=8.1 Hz, 2H), 7.16 (d, J=8.1 Hz, 2H), 6.05 (s, 1H), 5.96 (d, J=17.1 Hz, 1H), 4.70 (s, 2H), 4.17-4.13 (m, 2H), 2.32 (s, 3H), 2.07 (s, 3H), 1.32 (t, J=7.1 Hz, 3H).
3
6
|
A gold (Ag(I)) catalyst {[Au(JohnPhos)NCCH]SbF—} [JohnPhos:(2-biphenyl)di-tert-butylphosphine] (11.3 mg, 0.015 mmol) was put into a reaction container, and dichloroethane (0.4 mL) was put thereinto. After stirring at room temperature for 5 minutes, ethyl hydrogen p-tolylethynylphosphonate (67.3 mg, 0.3 mmol) diluted with 0.5 mL of dichloroethane was added thereto, and finally, prop-2-ynylcyclohexane (73.2 mg, 0.6 mmol) was put thereinto. Then, when all of the starting materials disappeared in the TLC, the reaction was allowed to be completed. After the solvent was removed under low atmospheric pressure, the product was separated by chromatography to obtain 2-ethoxy-4-p-tolyl-6-(cyclohexylmethyl)-1,2-oxaphosphorin 2-oxide (66.5 mg, 64%) which is a title compound.
1
3
H NMR (400 MHz, CDCl) δ 7.37 (d, J=8.2 Hz, 2H), 7.24 (d, J=8.2 Hz, 2H), 5.88 (d, J=17.6 Hz, 1H), 5.80 (s, 1H), 4.21-4.14 (m, 2H), 2.38 (s, 3H), 2.29-2.04 (m, 2H), 1.78-1.69 (m, 7H), 1.37 (t, J=7.1 Hz, 3H), 1.28-1.08 (m, 2H), 1.01-0.91 (m, 2H).
3
6
+
A gold (Ag(I)) catalyst {[Au(JohnPhos)NCCH]SbF—} [JohnPhos:(2-biphenyl)di-tert-butylphosphine] (11.3 mg, 0.015 mmol) was put into a reaction container, and dichloroethane (0.4 mL) was put thereinto. After stirring at room temperature for 5 minutes, ethyl hydrogen (4-(trifluoromethyl)phenyl)ethynylphosphonate (83.5 mg, 0.3 mmol) diluted with 0.5 mL of dichloroethane was added thereto, and finally, hept-1-yne (57.7 mg, 0.6 mmol) was put thereinto. Then, when all of the starting materials disappeared in the TLC, the reaction was allowed to be completed. After the solvent was removed under low atmospheric pressure, the product was separated by chromatography to obtain 2-ethoxy-4-p-trifluoromethylphenyl-6-pentyl-1,2-oxaphosphorin 2-oxide (51.6 mg, 46%) which is a title compound.
1
3
H NMR (400 MHz, CDCl) δ 7.68 (d, J=8.2 Hz, 2H), 7.58 (d, J=8.2 Hz, 2H), 5.95 (d, J=16.8 Hz, 1H), 5.79 (s, 1H), 4.26-4.15 (m, 2H), 2.44-2.39 (m, 2H), 1.69-1.65 (m, 2H), 1.41-1.33 (m, 7H), 0.90 (t, J=7.1 Hz, 3H).
3
6
+
A gold (Ag(I)) catalyst {[Au(JohnPhos)NCCH]SbF—} [JohnPhos:(2-biphenyl)di-tert-butylphosphine] (11.3 mg, 0.015 mmol) was put into a reaction container, and dichloroethane (0.4 mL) was put thereinto. After stirring at room temperature for 5 minutes, ethyl hydrogen (4-(trifluoromethyl)phenyl)ethynylphosphonate (83.5 mg, 0.3 mmol) diluted with 0.5 mL of dichloroethane was added thereto, and finally, but-3-ynylbenzene (195 mg, 1.5 mmol) was put thereinto. Then, when all of the starting materials disappeared in the TLC, the reaction was allowed to be completed. After the solvent was removed under low atmospheric pressure, the product was separated by chromatography to obtain 2-ethoxy-4-p-trifluoromethylphenyl-6-phenethyl-1,2-oxaphosphorin 2-oxide (45.3 mg, 37%) which is a title compound.
1
3
H NMR (400 MHz, CDCl) δ 7.65 (d, J=8.2 Hz, 2H), 7.49 (d, J=8.2 Hz, 2H), 7.33-7.29 (m, 2H), 7.24-7.20 (m, 3H), 5.96 (d, J=17.0 Hz, 1H), 5.70 (s, 1H), 4.27-4.20 (m, 2H), 2.99 (t, J=7.7 Hz, 2H), 2.74-2.70 (m, 2H), 1.40 (t, J=7.1 Hz, 3H).
3
6
|
A gold (Ag(I)) catalyst {[Au(JohnPhos)NCCH]SbF—} [JohnPhos:(2-biphenyl)di-tert-butylphosphine] (11.3 mg, 0.015 mmol) was put into a reaction container, and dichloroethane (0.4 mL) was put thereinto. After stirring at room temperature for 5 minutes, ethyl hydrogen hex-1-ynylphosphonate (57.0 mg, 0.3 mmol) diluted with 0.5 mL of dichloroethane was added thereto, and finally, ethynylcyclohexane (64.9 mg, 0.6 mmol) was put thereinto. Then, when all of the starting materials disappeared in the TLC, the reaction was allowed to be completed. After the solvent was removed under low atmospheric pressure, the product was separated by chromatography to obtain 2-ethoxy-4-n-butyl-6-cyclohexyl-1,2-oxaphosphorin 2-oxide (42.1 mg, 47%) which is a title compound.
1
3
H NMR (400 MHz, CDCl) δ 5.52 (d, J=19.4 Hz, 1H), 5.33 (s, 1H), 4.12-4.04 (m, 2H), 2.25 (t, J=7.5 Hz, 2H), 2.25-2.17 (m, 1H), 1.91-1.79 (m, 5H), 1.51-1.45(m, 2H), 1.37-1.17 (m, 10H), 0.92 (t, J=7.2 Hz, 3H).
3
6
+
A gold (Ag(I)) catalyst {[Au(JohnPhos)NCCH]SbF—} [JohnPhos:(2-biphenyl)di-tert-butylphosphine] (11.3 mg, 0.015 mmol) was put into a reaction container, and dichloroethane (0.4 mL) was put thereinto. After stirring at room temperature for 5 minutes, ethyl hydrogen hex-1-ynylphosphonate) (57.0 mg, 0.3 mmol) diluted with 0.5 mL of dichloroethane was added thereto, and finally, hex-1-yne (49.2 mg, 0.6 mmol) was put thereinto. Then, when all of the starting materials disappeared in the TLC, the reaction was allowed to be completed. After the solvent was removed under low atmospheric pressure, the product was separated by chromatography to obtain 2-ethoxy-4-n-butyl-6-n-butyl-1,2-oxaphosphorin 2-oxide (53.1 mg, 65%) which is a title compound.
1
3
H NMR (400 MHz, CDCl) δ 5.53 (d, J=10.2 Hz, 1H), 5.36 (s, 1H), 4.14-4.06 (m, 2H), 2.34-2.26 (m, 2H), 2.24 (t, J=6.9 Hz, 2H), 1.60-1.47 (m, 4H), 1.39-1.31(m, 7H), 0.94-0.90 (m, 6H).
3
6
3
+
A gold (Ag(I)) catalyst {[Au(JohnPhos)NCCH]SbF—} [JohnPhos:(2-biphenyl)di-tert-butylphosphine] (11.3 mg, 0.015 mmol) and triethylamine (EtN) (3.0 mg, 0.03 mmol) were put into a reaction container, and dichloroethane (0.4 mL) was put thereinto. After stirring at room temperature for 5 minutes, ethyl hydrogen hex-1-ynylphosphonate (57.0 mg, 0.3 mmol) diluted with 0.5 mL of dichloroethane was added thereto, and finally, 5-chloropent-1-yne (61.5 mg, 0.6 mmol) was put thereinto. Then, when all of the starting materials disappeared in the TLC, the reaction was allowed to be completed. After the solvent was removed under low atmospheric pressure, the product was separated by chromatography to obtain 5-chloropent-1-en-2yl ethylhex-1-ynylphosphonate (56.1 mg, 64%) which is a title compound.
1
3
H NMR (400 MHz, CDCl) δ 4.95 (t, J=2.3 Hz, 1H), 4.61 (s, 1H), 4.24-4.16 (m, 2H), 3.59 (t, J=6.3 Hz, 2H), 2.42-2.33 (m, 4H), 2.02-1.99 (m, 2H), 1.60-1.55 (m, 2H), 1.44-1.37 (m, 5H), 0.93(t, J=7.2 Hz, 3H).
3
6
+
Method 1—A gold (Ag(I)) catalyst {[Au(JohnPhos)NCCH]SbF—} [JohnPhos:(2-biphenyl)di-tent-butylphosphine] (11.3 mg, 0.015 mmol) was put into a reaction container, and dichloroethane (0.4 mL) was put thereinto. After stirring at room temperature for 5 minutes, 5-chloropent-1-en-2yl ethylhex-1-ynylphosphonate (Example 17, 87.6 mg, 0.3 mmol) diluted with 0.5 mL of dichloroethane was added thereto, and when all of the starting materials disappeared in the TLC, the reaction was allowed to be completed. After the solvent was removed under low atmospheric pressure, the product was separated by chromatography to obtain 2-ethoxy-4-n-butyl-6-3-chlorpropyl-1,2-oxaphosphorin 2-oxide (82.3 mg, 94%) which is a title compound.
3
6
+
Method 2—A gold (Ag(I)) catalyst {[Au(JohnPhos)NCCH]SbF—} [JohnPhos:(2-biphenyl)di-tent-butylphosphine] (11.3 mg, 0.015 mmol) was put into a reaction container, and dichloroethane (0.4 mL) was put thereinto. After stirring at room temperature for 5 minutes, ethyl hydrogen hex-1-ynylphosphonate (57.0 mg, 0.3 mmol) diluted with 0.5 mL of dichloroethane was added thereto, and finally, 5-chloropent-1-yne (61.5 mg, 0.6 mmol) was put thereinto. Then, when all of the starting materials disappeared in the TLC, the reaction was allowed to be completed. After the solvent was removed under low atmospheric pressure, the product was separated by chromatography to obtain 2-ethoxy-4-n-butyl-6-3-chlorpropyl-1,2-oxaphosphorin 2-oxide (56.1 mg, 64%) which is a title compound.
1
3
H NMR (400 MHz, CDCl) δ 5.57 (d, J=19.5 Hz, 1H), 5.44 (s, 1H), 4.17-4.11 (m, 2H), 3.57 (t, J=7.1 Hz, 2H), 2.55-2.44 (m, 2H), 2.25 (t, J=7.1 Hz, 2H), 2.11-2.04 (m, 2H), 1.53-1.43(m, 2H), 1.41-1.30 (m, 5H), 0.92 (t, J=7.1 Hz, 3H).
3
6
+
A gold (Ag(I)) catalyst {[Au(JohnPhos)NCCH]SbF—} [JohnPhos:(2-biphenyl)di-tert-butylphosphine] (11.3 mg, 0.015 mmol) was put into a reaction container, and dichloroethane (0.4 mL) was put thereinto. After stirring at room temperature for 5 minutes, ethyl hydrogen hex-1-ynylphosphonate (57.0 mg, 0.3 mmol) diluted with 0.5 mL of dichloroethane was added thereto, and finally, but-3-ynylbenzene (78 mg, 0.6 mmol) was put thereinto. Then, when all of the starting materials disappeared in the TLC, the reaction was allowed to be completed. After the solvent was removed under low atmospheric pressure, the product was separated by chromatography to obtain 2-ethoxy-4-n-butyl-6-phenethyl-1,2-oxaphosphorin 2-oxide (64.4 mg, 67%) which is a title compound.
1
3
H NMR (400 MHz, CDCl) δ 7.31-7.26 (m, 2H), 7.22-7.17 (m, 3H), 5.55 (d, J=19.0 Hz, 1H), 5.29 (s, 1H), 4.16-4.08 (m, 2H), 2.92 (t, J=7.7 Hz, 2H), 2.63-2.58 (m, 2H), 2.22-2.18 (m, 2H), 1.47-1.39 (m, 2H), 1.35 (t, J=7.1 Hz, 3H), 1.35-1.25 (m, 2H), 0.90 (t, J=7.2 Hz, 3H).
3
6
+
A gold (Ag(I)) catalyst {[Au(JohnPhos)NCCH]SbF—} [JohnPhos:(2-biphenyl)di-tert-butylphosphine] (11.3 mg, 0.015 mmol) was put into a reaction container, and dichloroethane (0.4 mL) was put thereinto. After stirring at room temperature for 5 minutes, ethyl hydrogen hex-1-ynylphosphonate (57.0 mg, 0.3 mmol) diluted with 0.5 mL of dichloroethane was added thereto, and finally, pent-4-ynylbenzene (86.5 mg, 0.6 mmol) was put thereinto. Then, when all of the starting materials disappeared in the TLC, the reaction was allowed to be completed. After the solvent was removed under low atmospheric pressure, the product was separated by chromatography to obtain 2-ethoxy-4-n-butyl-6-3-phenylpropyl-1,2-oxaphosphorin 2-oxide (67.1 mg, 67%) which is a title compound.
1
3
H NMR (400 MHz, CDCl) δ 7.31-7.27 (m, 2H), 7.21-7.16 (m, 3H), 5.54 (d, J=9.2, 1H), 5.35 (s, 1H), 4.13-4.09 (m, 2H), 2.66(t, J=7.7 Hz, 2H), 2.36-2.30 (m, 2H), 2.26-2.22 (m, 4H), 1.95-1.92 (m, 2H), 1.50-1.46 (m, 2H), 1.37-1.31 (m, 5H), 0.92 (t, J=7.3 Hz, 3H).
3
6
+
A gold (Ag(I)) catalyst {[Au(JohnPhos)NCCH]SbF—} [JohnPhos:(2-biphenyl)di-tert-butylphosphine] (11.3 mg, 0.015 mmol) was put into a reaction container, and dichloroethane (0.4 mL) was put thereinto. After stirring at room temperature for 5 minutes, ethyl hydrogen (4-chlorophenyl)ethynylphosphonate (73.4 mg, 0.3 mmol) diluted with 0.5 mL of dichloroethane was added thereto, and finally, hex-1-yne (49.2 mg, 0.6 mmol) was put thereinto. Then, when all of the starting materials disappeared in the TLC, the reaction was allowed to be completed. After the solvent was removed under low atmospheric pressure, the product was separated by chromatography to obtain 2-ethoxy-4-p-chlorophenyl-6-n-butyl-1,2-oxaphosphorin 2-oxide (41.1 mg, 42%) which is a title compound.
1
3
H NMR (400 MHz, CDCl) δ 7.43-7.38 (m, 4H), 5.89 (d, J=17.1, 1H), 5.78 (s, 1H), 4.22-4.18 (m, 2H), 2.44-2.39(m, 2H), 1.66-1.62 (m, 2H), 1.42-1.36 (m, 5H), 0.94 (t, J=7.3 Hz, 3H).
3
6
+
A gold (Ag(I)) catalyst {[Au(JohnPhos)NCCH]SbF—} [JohnPhos:(2-biphenyl)di-tert-butylphosphine] (11.3 mg, 0.015 mmol) was put into a reaction container, and dichloroethane (0.4 mL) was put thereinto. After stirring at room temperature for 5 minutes, ethyl hydrogen (4-chlorophenyl)ethynylphosphonate (73.4 mg, 0.3 mmol) diluted with 0.5 mL of dichloroethane was added thereto, and finally, 5-chloropent-1-yne (61.5 mg, 0.6 mmol) was put thereinto. Then, when all of the starting materials disappeared in the TLC, the reaction was allowed to be completed. After the solvent was removed under low atmospheric pressure, the product was separated by chromatography to obtain 2-ethoxy-4-p-chlorophenyl-6-(3-chloropropyl)-1,2-oxaphosphorin 2-oxide (51.0 mg, 49%) which is a title compound.
1
3
H NMR (400 MHz, CDCl) δ 7.42-7.38 (m, 4H), 5.94 (d, J=17.1, 1H), 5.86 (s, 1H), 4.24-4.20 (m, 2H), 3.63-3.60 (m, 2H), 2.69-2.54(m, 2H), 2.17-2.11 (m, 2H), 1.39 (t, J=7.1 Hz, 3H).
3
6
3
+
A gold (Ag(I)) catalyst {[Au(JohnPhos)NCCH]SbF—} [JohnPhos:(2-biphenyl)di-tert-butylphosphine] (11.3 mg, 0.015 mmol) and triethylamine (EtN) (3.0 mg, 0.03 mmol) were put into a reaction container, and dichloroethane (0.4 mL) was put thereinto. After stirring at room temperature for 5 minutes, ethyl hydrogen (4-chlorophenyl)ethynylphosphonate (73.4 mg, 0.3 mmol) diluted with 0.5 mL of dichloroethane was added thereto, and finally, pent-4-ynylbenzene (86.5 mg, 0.6 mmol) was put thereinto. Then, when all of the starting materials disappeared in the TLC, the reaction was allowed to be completed. After the solvent was removed under low atmospheric pressure, the product was separated by chromatography to obtain ethyl 5-phenylpent-1-en-2-yl 2-(4-chlorophenyl)ethynylphosphonate (51.2 mg, 44%) which is a title compound.
1
3
H NMR (400 MHz, CDCl) δ 7.44 (d, J=1.8 Hz, 2H), 7.34 (d, J=1.7 Hz, 2H), 7.27-7.25 (m, 2H), 7.19-7.17 (m, 3H), 4.99 (t, J=2.3 Hz, 1H), 4.61 (s, 1H), 4.29-4.25 (m, 2H), 2.69-2.65 (m, 2H), 2.29 (t, J=7.4 Hz, 2H), 1.91-1.75 (m, 2H), 1.40 (t, J=7.1 Hz, 3H).
3
6
+
Method 1—A gold (Ag(I)) catalyst {[Au(JohnPhos)NCCH]SbF—} [JohnPhos:(2-biphenyl)di-tent-butylphosphine] (11.3 mg, 0.015 mmol) was put into a reaction container, and dichloroethane (0.4 mL) was put thereinto. After stirring at room temperature for 5 minutes, ethyl 5-phenylpent-1-en-2-yl 2-(4-chlorophenyl)ethynylphosphonate (Example 23, 116 mg, 0.3 mmol) diluted with 0.5 mL of dichloroethane was added thereto, and when all of the starting materials disappeared in the TLC, the reaction was allowed to be completed. After the solvent was removed under low atmospheric pressure, the product was separated by chromatography to obtain 2-ethoxy-4-p-chlorophenyl-6-3-phenylpropyl-1,2-oxaphosphorin 2-oxide (83.3 mg, 72%) which is a title compound.
3
6
+
Method 2—A gold (Ag(I)) catalyst {[Au(JohnPhos)NCCH]SbF—} [JohnPhos:(2-biphenyl)di-tent-butylphosphine] (11.3 mg, 0.015 mmol) was put into a reaction container, and dichloroethane (0.4 mL) was put thereinto. After stirring at room temperature for 5 minutes, ethyl hydrogen (4-chlorophenyl) ethynylphosphonate (73.4 mg, 0.3 mmol) diluted with 0.5 mL of dichloroethane was added thereto, and finally, pent-4-ynylbenzene (86.5 mg, 0.6 mmol) was put thereinto. Then, when all of the starting materials disappeared in the TLC, the reaction was allowed to be completed. After the solvent was removed under low atmospheric pressure, the product was separated by chromatography to obtain 2-ethoxy-4-p-chlorophenyl-6-3-phenylpropyl-1,2-oxaphosphorin 2-oxide (65.2 mg, 56%) which is a title compound.
1
3
H NMR (400 MHz, CDCl) δ 7.42-7.38 (m, 4H), 7.32-7.27 (m, 2H), 7.22-7.18 (m, 3H), 5.91 (d, J=17.1, 1H), 5.76 (s, 1H), 4.24-4.09 (m, 2H), 2.68(t, J=7.7, 2H), 2.45-2.41 (m, 2H), 2.04-1.96 (m, 2H), 1.37 (t, J=7.0, 3H). | |
This invention relates to a bearing member having a series of arcuate members that lubricate the balls, inner and outer race members and control ball spacing during the operation of.the bearing member.
In airmotors, such as disclosed in U.S. Patent 4,276,006, it is not uncommon for the operational fluid to exceed 400°F. The ball bearings in such airmotors in order to operate properly must be lubricated and the internal ball spacing thereof must be maintained in order that sufficient life expectancy can be obtained. It is common practice to lubricate the ball bearings and maintain the separation through the use of dry lubricant pellet separators or dry lubricant split cage separators. Air Research Corporation of Phoenix, Arizona currently sells a bearing Part. No. 3231801-1 using a pellet separator and a bearing Part. No. 3234285-1 using a split cage separator.
In bearings using dry lubricant pellet separators, a series of cylindrical segments of dry lubricant are inserted between the balls. Each separator has a spherical pocket on both of its extremities that conforms with the ball curvature. The pockets provide adequate contact surface between balls and the separators to enhance transfer of lubricant from the separators to the balls. Each separator has lateral wings for stabilization and to prevent them from being expelled axially from the races of the bearing since their axial movement is restrained by guide washers located on each side of the bearing. In this bearing design, all the balls abut against each side of an adjacent separator except for the last separator where a ball to separator gap develops. As the separator pockets wear, the ball to separator gap increases and after reaching a certain limit, the bearing may fail due to accelerated wear and/or come apart.
In bearings using dry lubricant split cage, a segment of dry lubricant is slitted from a winged cage to create a series of separators. A hole is drilled in each separator to house one ball and provide controlled ball spacing. The ball holes are drilled straight through with the center of the holes passing through the center of the winged cage. The outer diameter and the inner diameter of the winged cage conforms to the outer and inner bearing races, respectively. The wings are incorporated for stabilization and to provide enough material to allow the ball holes to be drilled. The retention of the separators by the balls in races eliminates the need for a guide washer to prevent the separators from being expelled axially from the bearing. In operation, as the bearing rotates, each ball only abuts one side of its separator ball hole. Since ball holes are drilled straight through, the balls have initially only a curved line of contact with the separators and as a result the lubricant transfer from the separators to the balls is very poor at the early stage of the bearing operation. Consequently, bearing wear is accelerated. As the carbon separators wear, better ball to separator contact is established improving lubrication, but by this time the internal bearing friction has increased due to wear and premature failure of the bearing normally occurs shortly thereafter.
In the bearing member disclosed herein a dry lubricant cylinder is machined to create a semi-spherical peripheral surface and a semi-spherical inner surface separated by first and second annular wing members. The peripheral circumference is divided into equal segment points and a hole is drilled with a spherical end mill to provide a semi-spherical pocket on the region where the balls abut the separators. The cylinder is severed at the segment points through the drilled holes to create arcuate sections. The sections are sequentially inserted into a first groove in an outer race. Balls are located between the sections and an inner race is inserted such that the semi-spherical inner surface is located in a second groove hence retaining the separators within the first and second grooves. In this initial condition, the individual sections are separated because of the material removed during the severing operation. As the sections wear, lubricant is deposited on the balls and the inner and outer races. Eventually, the end faces of the arcuate sections touch each other to establish spherical pockets to control the spacing of the balls. The depth of the spherical holes is selected such that the peripheral semi-spherical surface engage the outer race prior to the balls developing any adverse forces on the material adjacent the pockets.
An advantage of this invention occurs through the use of dry lubricant separator sections that initially wear at a higher rate to provide sufficient lubrication at the early stage of the bearing operation, and when sufficient lubrication has been transferred to the bearing elements, the sections abut each other to lower the carbon wear rate and to fix the ball spacing to permit continued use of the bearing without excessive wear or of premature failure.
It is an object of this invention to provide a method of manufacturing and assembling a bearing member whereby a dry lubricant ring is shaped to establish a peripheral rib and an inner rib with annular wings attached thereto. Spherical holes are drilled at spaced intervals and the ring severed at the holes to create arcuate sections with semi-spherical pockets. A first section is located in an outer race with the peripheral rib located in a groove. A ball is initially placed in one of the semi-spherical pockets and sections and balls are sequentially placed in the outer race to reconstruct the dry lubricant ring. Thereafter, an inner race is brought into alignment with the outer race as the inner ribs on the sections move into a groove therein.
These advantages and objects should become apparent from reading this specification in conjunction with the attached drawings.
Figure 1 is a perspective view of a cylinder used to make the separator sections for the bearing member disclosed herein;
Figure 2 is a perspective view of the cylinder of Figure 1 after shaping surfaces thereof.
Figure 3 is a side view of the cylinder of Figure 2 showing radially equally spaced drilled holes therein;
Figure 4 is an enlarged view of a drilled hole of Figure 3 showing the semi-spherical shape at the bottom of the hole;
Figure 5 is a sectional view taken along line 5-5 of Figure 3;
Figure 6 shows the cylinder of Figure 3 severed into equal sections;
Figure 7 is an enlarged view of the end of a semi-spherical pocket of Figure 6 showing the taper on the end thereof;
Figure 8 is an enlarged sectional view of a section of the cylinder of Figure 6;
Figure 9 is a sectional view of an inner race of a bearing;
Figure 10 is a sectional view of an outer race of a bearing;
Figure 11 is a perspective view of the assembly of the sections shown in Figure 8 and balls within the outer race of Figure 10;
Figure 12 is a side view of the bearing assembly; and
Figure 13 is a side view of the bearing assembly after a predetermined period of use.
The invention will now be described with reference to the accompanying drawings wherein:
.
The bearing member 10 made according to this invention and shown in Figure 12 is designed for use in an air motor which derives its power from the exhaust gas of a turbine engine. The temperature of the exhaust gas can often exceed 400F and as a result in order to insure smooth operation of the bearing 10, direct lubrication must be provided to the balls 14,14'...14 therein by wearing of the separator sections 16,16'...16 .
N
The separator sections 16,16'...16 are defined by the critical dimensions in the inner and outer race members 43 and 44 and should be manufactured in the following manner.
1
2
1
2
1
2
A cylinder or ring 18, shown in Figure 1 and, having an outside radius R, and an inside radius R is obtained either by molding or machining a block of carbon or dry lubricant material. Once R and R have been obtained, the ring 18 is transferred to a machine where a first semi-spherical surface or rib 20 is placed on the external periphery and a second semi-spherical surface or rib 22 is placed on the inner periphery as shown in Figure 2. At the same time, annular wings 24 and 26 are formed adjacent to the first and second semi-spherical surfaces. The outer semi-spherical surface 20 extends from Rtoward peripheral cylindrical surfaces 28 and 30 of wings 24 and 26 respectively. The inner semi-spherical surface 22 mirrors the outer semi-spherical surface and extends from R toward the inner cylindrical surfaces 32 and 34 of wings 24 and 26, respectively.
1
N
N
N
N
N
N
After determining the number of balls 14 that the bearing member 10 is to have the circumference of R is divided into equal segment points, 36, 36'...36. Thereafter holes 38, 38'...38 are drilled with a spherical end mill at segment points 36, 36'...36 as shown in Figure 3. As shown in more detail in Figure 4 and 5, each hole 38 has a diameter 40 which is slightly larger than the diameter of the balls 14, 14'...14 and a second diameter 42 which has a radius equal to or slightly larger than the ball radius 14, 14'...14. The depth at which the diameter 42 is located depends on the pitch diameter of bearing member 10 and its internal geometry such that semi-spherical surface 20 engages race 44 prior to the development of any adverse forces that could damage or chip the area adjacent to a third diameter 46. The third diameter section 46 of hole 38 has a dimension of diameter F which is determined to facilitate assembly of the balls 14, 14'...14 in bearing member 10.
N
N
N
After the holes 38, 38'...38 are drilled, the cylinder or ring 18 is severed at each segment point 36, 36'...36 to create sections 16, 16'...16, shown in Figures 6, 7 and 8. The angle is selected such that when the surfaces such as 48 and 48', shown in figure 13, come into contact they will abut each other along the entire slitted surface and thus preventing localized contact stress that could cause the material to chip. The angle for each slit, would be different for each bearing member 10 since it varies as a function of pitch diameter of the bearing member 10 and the thickness (T) defined below while the angle can be calculated by the following formula:
The width of the slit is selected to limit the maximum separator to separator gap (X) as shown in Figure 13. This thickness T is determined by the following formula:
1
2
N
N
N
The difference in the radii R - R is slightly less than the diameter of balls 14, 14'...14 to prevent the sections 16, 16'...16 from being expelled axially from the bearing member 10 and to prevent preloading of sections 16, 16'...16.
After the sections 16, 16'...16 have been obtained it is necessary to reconstruct ring 18 in the races 43 and 44.
N
Race 44 has a groove 50 in which balls 14, 14'...14 are located.
N
As shown in Figure 11, a single section 16 is initially inserted in the outer race 44 such that semi-spherical surface 20 is located in groove 50. Thereafter, a ball 14 is located in the groove 50 and moved into semi-spherical pocket 52 formed on one end of section 16. Another section 16' is placed in race 44 and end 52 brought into contact with ball 14. This sequence is repeated such that a ball 14 is the last component that is inserted in groove 50 to reconstruct ring 18.
N
N
N
N
N
N
N
N -1
N -1
N
N
N
Cylindrical end 56 of the inner race 43 is aligned with race 44 and sufficient force is applied to race 43 to move groove 58 into alignment with groove 50 to retain balls 14, 14'...14 therein. As shown in Figure 12, after the assembly, the separator gap T is substantially equal between each section 16, 16'...16. As the inner race 43 and/or outer race 44 rotates the balls 14, 14'...14 engage surfaces 42, 42'...42 to obtain lubrication. After an extended period of use, the carbon sections 16, 16'...16 wear to a condition shown in Figure 13. In this condition, faces 48, 48'... 48 of segments 16, 16'...16 engage each other and form spherical pockets to contain all the balls except ball 14. From this point on, the balls 14, 14'... 14 will abut against only one face of each hole 38, 38'...38 in each section 16, 16'...16 to limit the amount of lubricant transfer for lubrication. Since wing members 24 and 26 on each section 16, 16'... 16 abut each other, the spacing between the balls 14, 14'...14 is thereafter established.
Thereafter, the inner race 43 is inserted in the outer race 44 in the following manner: | |
At The Malago we use local suppliers to bring us the freshest ingredients, to be creatively prepared by our skilled chefs - headed by restaurant owner Helly Highland. Our skilled chefs use natural and seasonal produce imaginatively to create a dynamic menu that is inclusive of vegetarians and vegans. We are passionate about creating a local, independent bar and restaurant that is at the heart of North Street and showcases all Bristol has to offer. | https://www.myvegantown.org.uk/listing/malago |
CROSS-REFERENCE TO RELATED PATENTS
This is (1.) an improvement over patent application Ser. No. 15/987,409 filed on May 23, 2018 which issued on Dec. 3, 2019 as U.S. Pat. No. 10,494,896, (2.) a formal utility patent application claiming priority to Provisional Patent Application No. 62/961,523 filed on Jan. 15, 2020, and (3) a formal utility patent application claiming priority of Provisional Patent Application No. 62/961,532, filed on Jan. 15, 2020, all which are incorporated herein by reference.
BACKGROUND OF INVENTION
Field of the Invention
Description of the Prior Art
This invention relates generally to the use of drillable guides in drilling of a large diameter injection well, and also to the control of artesian flow without the use of weighted well drilling material such as salt or barite.
Perforations in the earth's surface to find and release hydrocarbons is well known. Typically an oil well is created by a drilling hole into the earth with a drilling rig that rotates a drill string with a bit attached to the lower end. As the hole is drilled to an ascribed depth, sections of steel casing are set in a hole. The casing is slightly smaller in diameter than the borehole. The casing provides structural integrity to the newly drilled wellbore and isolates zones from each other and from the surface. As the well is drilled deeper, smaller casing and smaller bits are used.
Generally, the same type of equipment used in drilling an oil and/or gas well can be used in drilling injection wells from the surface. In the state of Florida, injection wells have been used for disposal of both storm water and municipal waste water for many years. In Florida, disposal of municipal waste water, including treated waste water, is injected deep underground into highly permeable rock formations that naturally contain saline water. The geological formation that most commonly receives the injected water is the lower most portion of the Floridian Aquifer System, which is between the depths of approximately 2,500 to 3,400 feet below the land surface. The formation at this depth is made up of limestone and dolostone which contain highly transmissive solution channels. This zone is commonly referred to as the “Boulder Zone”.
The Boulder Zone has highly brackish water with a salinity that is similar to seawater. Separating the brackish water from the fresh water contained in the Surficial Aquifer are intermediate layers of less permeable clays which are 300 or more feet thick.
A typical injection well will be about sixty inches in diameter at the top going down to about 24 inches in diameter at the bottom. The injection wells operate at very low pressure normally around 20 PSI. The injection wells are used to dispose of run-off water that should not be released into the streams, but is not heavily polluted water that might be found in an oil field environment.
The upper part of the injection well is the largest diameter and typically would have casing of approximately 54 inches in diameter cemented into place for approximately 100 feet in what is commonly known as “snubbing in.” After snubbing in, a slightly smaller diameter hole and a smaller diameter casing will be set as the injection well is being drilled. Each time a string of casing is installed and cemented into place, a pilot hole of typically 12 inches in diameter is drilled a few hundred feet past the expected length of the next string of casing. The pilot hole is for testing using both geophysical logging tools and inflatable packers to determine the best depth for the next string of casing or completion of the well. Typically, there would be three to five sets of subsequently smaller hole sizes being drilled, each drilled inside of one another and each cemented with a different diameter casing.
Because the pilot hole has a much smaller diameter than hole in which the pilot hole is being drilled, a ledge is formed at the top of the pilot hole. Many times logging tools, inflatable packers, or other devices being lowered into the pilot hole will become stuck on the ledge.
Throughout the drilling process, typically a temporary drilling header, sometimes referred to as a “rotating control device,” is used at the surface to control or prevent artesian flow out of the well. The temporary drilling header includes stripping rubber that seals around the drill pipe while allowing a drill pipe to move up and down. The stripping rubber removes material stuck to the drill pipe. The problem with this type of temporary drilling header is that the bits, weights, and/or drill collars are larger in diameter than the drill pipe. While the drill pipe can go through the temporary header, these larger diameter devices cannot.
In the past, when inserting or removing the larger diameter devices from the well being drilled, the temporary drilling header had to be removed. To remove the temporary drilling header, the well would have to be killed using a heavy drilling mud. The killing or suppressing of a well during the drilling process is time consuming and expensive. A heavy drilling mud would need to be mixed and injected into the well, which heavy drilling mud would then intermix with native well bore fluids. It may later be difficult to remove the heavy drilling mud from the native well bore fluids. Also, the possibility of loss of well control during well suppression or killing activities could occur. While salt and barite are the two most common materials used to create a heavy drilling mud to kill and/or suppress a well, other materials could also be used. In large artesian aquifer zones, it is common to use a truckload or more of salt or barite to mix into slurry each time a well is killed. During the typical construction of a large diameter injection well, the well is suppressed/killed approximately twenty times.
While drilling an injection well and setting the first two strings of casing, the well bore is filled with bentonite drilling fluid, commonly called “mud”. The mud is pumped down through the drilling pipe and returns to the surface between the outside of the drilling pipe and the well bore. The mud will carry the cuttings suspended therein.
After the second string of casing is cemented, the mud is evacuated from the casing and replaced with water. From this point forward, drilling fluid (mud) is no longer used with the present invention. Water is forced to flow in the reverse direction, namely, down the outer annulus and back up the drilling pipe with the water carrying the cuttings to the surface.
SUMMARY OF THE INVENTION
It is an object of the present invention to control artesian flow while drilling an injection well without using a weighted drilling fluid.
It is another object of the present invention to reduce the number of times a large diameter water well must be killed or suppressed during drilling.
It is still another object of the present invention to insert drillable centering guides in the lower most casing before drilling a pilot hole in the bottom of the well being drilled. The drillable center guide being drilled out when the next segment of the well is drilled for a reduced diameter casing.
It is yet another object of the present invention to have a temporary drilling header at the top of a large diameter disposal well during the drilling process, which temporary drilling header is installed after the disposal well is snubbed in. A second casing is set down to approximately 1000 feet in depth. After installing the temporary drilling header, a drop pipe is installed that extends below the temporary drilling header. The drop pipe is connected to the temporary drilling header by any convenience means, such as bolted to flanges or a welded connection to the previously installed casing. Above the temporary drilling header on the drill pipe is connected a rotating control device with stripper rubber for cleaning the drill pipe as it goes in or out of the well. Connected to a lower end of the drop pipe is a valve operated by a hydraulic cylinder to open or close the lower end of the drop pipe. By the use of the drop pipe, access to the inside of the disposal well being drilled can be obtained without killing or suppressing the well.
In the past, if the temporary drilling header had to be removed to set drill collars, replace drill bits, do geophysical logging or anything else requiring larger diameter items pass through temporary drilling header to access lower regions of the disposal well, the disposal well would have to be killed or suppressed by using heavy drilling fluid to stop any artesian flow. By use of a drop pipe with a hydraulically actuated lower valve, it is not necessary to kill the well when moving larger diameter items through the temporary well header via the drop pipe.
A bottom hole assembly can be lowered through the temporary well header into the drop pipe when the valve on the lower end of the drop pipe is closed. Thereafter, the rotating control device and a stripper rubber is secured against the drill pipe so that when the lower valve is open, there will not be any artesian flow from the well being drilled.
In the drilling of a disposal well, pilot holes are drilled beyond the lower end of the casing, which pilot holes are used for geophysical logging tools and inflatable packers. Also, if samples need to be obtained, they can be obtained by having a bottom hole assembly connecting through the temporary drilling header into the drop pipe while the lower valve of the drop pipe is closed. Thereafter, once the rotating control device and stripper rubber are in place, the lower valve on the drop pipe can be opened and the bottom hole assembly lowered to collect samples. This typically occurs several times for each disposal well. By use of the drop pipe and the hydraulically operated valve, this can be done repeatedly without having to kill or suppress the well. The length of the drop pipe is determined by the bottom hole assembly that is to be used in drilling the injection well. Typically the drop pipe that would be two to three hundred feet in length. By using the drop pipe, large amounts of heavy fluid to suppress or kill the artesian flow from the well is no longer necessary.
BRIEF DESCRIPTION OF THE DRAWINGS
1
FIG.
is a pictorial illustration of a prior art oil drilling rig.
2
FIG.
is a simplified, partial, cross-sectional view of the upper portion of a large diameter injection water well being drilled.
3
FIG.
is an illustrative sectional view of the underground portion of a large diameter injection water well.
4
FIG.
is a partial, cross-sectional view of the upper portion of a large diameter injection water well with a hydraulically actuated valve opening or closing a lower end of a drop pipe.
5
FIG.
is a partial, cross-sectional view of the upper portion of a large diameter injection water well having a drop pipe with a bottom hole assembly therein prior to opening a lower valve.
6
FIG.
is a partial, cross-section of the upper portion of a large diameter injection water well with a bottom hole assembly extending through a drop pipe and a lower valve into lower portions of the large diameter injection water well.
7
FIG.
is a lower cross-sectional view of a pilot hole being drilled in a large diameter injection water well.
8
FIG.
is a lower cross-sectional view of geophysical logging tools being inserted in a pilot hole in a large diameter injection water well.
9
FIG.
is an enlarged cross-sectional view of a drillable centering guide.
DESCRIPTION OF THE PREFERRED EMBODIMENT
1
FIG.
10
12
14
16
18
20
22
24
26
28
30
32
32
34
36
38
38
40
42
44
Before explaining the present invention, an explanation as to how an oil well is drilled is helpful. Referring to , a simplified pictorial representation of an oil field derrick drilling an oil well in the earth's surface is shown. A mud tank holds a drilling mud, such as barite, which may be delivered via a suction line to mud pump , through vibrating hose , standpipe , kelly hose , goose necks , swivel to Kelly drive . From the Kelly drive , the drilling mud travels through the rotary table and drilling floor to the drill string . However, before reaching the drill string , the drilling mud must travel through bell nipple , an angular blowout preventer , and ram blowout preventers .
1
FIG.
34
38
While shows a rotary table , a tophead rotary drive may be used. Either one uses rotary drive to turn the drill string .
34
38
16
38
46
12
48
50
52
54
54
56
58
38
16
12
12
42
44
12
As the rotary table turns the drill string drilling mud from the mud tanks is delivered under pressure through drilling string to the drill bit . As the oil well is drilled deeper, derrick uses traveling block and crown block to add additional drill pipes from the stand of drill pipes, which stand holds the pipe rack by monkey board . As additional pipe is added to the drill string , flow of the mud from the mud tank is stopped. The weight of the drilling mud will keep pressures inside the oil well from blowing out the top of the oil well . Blow out preventers and also ensure that pressures inside of the oil well will not escape.
16
12
38
38
12
60
62
16
Mud from the mud tank flows into the oil well by flowing downward through the drill string . The mud returns in the annulus formed between the drill string and the well being drilled in the earth simultaneously carrying any cuttings to the surface. The returning mud and cuttings flows through flow line to a shell shaker for removal of cuttings before returning the mud to the mud tank .
64
66
68
50
52
54
38
Motor with draw works operate drill lines to move traveling block and rotate crown block when adding more pipe from stand to the drill string . This is a simplified description of how an oil well is drilled using standard techniques.
70
70
38
3
FIG.
1
FIG.
In the drilling of the large diameter disposal water wells, similar techniques are used during the drilling process. A large diameter disposal water well that might be drilled in central or southern Florida would typically be snubbed in with a 54 inch steel casing . See . After the 54 inch steel casing is cemented into place, mud will continue to flow through the drill string . See .
7
FIG.
8
FIG.
104
70
104
38
106
76
46
108
108
76
70
104
46
38
110
106
70
Because a large diameter disposal water well is being drilled, a pilot hole should first be drilled below each string of reduced diameter casings that are to be installed. Referring to , a large diameter drillable centering guide is installed in the last 50 feet of the 54 inch steel casing . The large diameter drillable centering guide centers the drill string in the bottom of the well . In that manner, the drill bit will center within the remnant cement collected in the bottom of the well when cementing the 54 inch steel casing into position during snubbing in. With the use of the large diameter drillable centering guide , drill bit on the end of drill string can then drill a pilot hole that will be centered in the bottom of 54 inch steel casing . See .
110
104
70
76
46
38
In a typical large diameter water well, the pilot hole will be drilled to approximately 1000 feet in depth. Because the large diameter drillable centering guide is attached toward the bottom of casing , the well will be drilled in the bottom center thereof by drill bit attached to the lower end of drill string .
104
110
112
114
114
112
110
110
After installing large diameter drillable centering guide and the drilling of the pilot hole , geophysical logging tools can be attached to the lower end of logging cable . By extending or retracting the logging cable , the geophysical logging tools will be raised or lowered in the pilot hole . In this matter, the entire depth of the pilot hole can be logged from the surface. The logging will tell the operator where different zones or different zone conditions are located, which in turn tells the operator if packers are needed to separate the different subsurface zones.
104
104
116
118
70
116
118
120
122
124
116
126
118
124
126
120
122
128
104
128
38
46
76
128
104
112
114
110
112
130
106
110
9
FIG.
7
FIG.
An enlarged cross-sectional view of the large diameter drillable centering guide is shown in . The large diameter drillable centering guide has a wear ring on the center thereof and a steel casing that will just fit in steel casing . Fill between the wear ring and the 54 inch steel casing is cement that has rope reinforcement therein. Wear ring cement retainment devices extend outward from the wear rings . Casing cement retainment devices extend inward from steel casing . The wear ring cement retaining device and casing cement device hold the cement and rope reinforcement in position. A funnel shaped surface forms the upper surface of the large diameter drillable centering guide . The funnel shaped surface directs items such as the drill sting and drill bit to the center of the well . As shown in . Also, funnel shaped surface of the large diameter drillable centering guide directs geophysical logging tools being lowered by logging cable into the pilot hole . This prevents the geophysical logging tool from getting stuck on ledges formed in the bottom while being lowered into pilot hole .
72
72
38
Subsequently, a 44 inch steel casing will have to be installed and cemented into place down to approximately 1000 feet in depth. Through the cementing in place of the 44 inch steel casing , drilling mud may be used, which drilling mud is pumped down through a drill string and up through the outer annulus back to the surface. Everything through this point is the same as the prior art except there are larger diameters and lower pressures.
72
110
110
72
104
72
Prior to the setting of the 44 inch steel casing , the pilot hole will have to be drilled out to approximately 1000 feet. When enlarging the pilot hole to receive the next size steel casing (which is 44 inches in diameter), the large diameter drillable casing guide will have to be drilled out. This can be accomplished by simply having a drill bit that drills out a hole with a diameter enough to receive the 44 inch steel casing therein.
72
74
74
42
44
74
38
76
76
38
76
78
38
2
FIG.
1
FIG.
2
FIG.
Upon setting the 44″ steel casing into place the drilling mud is removed and a temporary drilling header is installed. See . The temporary drilling header is located below the blowout preventers and . See . The next step in drilling the disposal water well is to drill a pilot hole approximately twelve inches in diameter to approximately two-thousand feet. The temporary drilling header is normally installed after the drilling of the pilot hole. Typically, three or four core samples will be needed when drilling from 1000-2000 feet in depth. This requires tripping the drill string out of the well . To prevent artesian flow therefrom, the well will have to be either suppressed or killed. As the drill string is removed from the well as shown in , stripper rubber will remove material from the drill string .
38
80
80
80
78
74
34
80
76
76
76
76
76
On the bottom of the drill string is located bottom hole assembly . The bottom hole assembly may be a drill bit, packer, coring bell, a logging device, etc. However, the bottom hole assembly normally cannot get past the rubber stripper and/or temporary drilling header nor past the rotary table . In the past, each time the bottom hole assembly has to come out of the well , pressures inside the well have to be either killed or suppressed. Previously, to kill or suppress pressures inside of the well required a large amount of barite or salt to mix into a drilling mud. It is expensive and time consuming to have to kill or suppress the well using large amount of salt or barite. When drilling operations are to be resumed, the drilling mud or slurry will need to be reduced and/or removed from the well . The weight of the slurry/drilling mud prevents artesian flow from well .
76
74
82
74
82
82
74
84
4
FIG.
To prevent having to repeatedly kill the well , the temporary drilling header has been modified so that a drop pipe extends downward from the temporary drilling header . See . While the length of the drop pipe may vary, it is estimated that drop pipe would be approximately two hundred feet in length. The drop pipe is attached at the upper end to temporary drilling header . Flanges are welded, or threaded connections may be used to add the necessary length to the drop pipe.
82
86
88
90
86
90
92
90
94
96
86
98
82
On the lower end of the drop pipe is located a valve that is pivotally mounted on pivot pin . The operation of the hydraulic cylinder causes valve to be opened or closed. Hydraulic fluid for the hydraulic cylinder is provided through hydraulic hoses . Each end of the hydraulic cylinder is free to pivot on pivot pins and . If the valve is closed, a rubber sealing element prevents leakage through the drop pipe .
5
6
FIGS. and
5
FIG.
3
FIG.
5
FIG.
76
14
70
72
74
70
82
74
90
86
82
86
38
80
82
38
78
34
Referring to in combination, the present invention will be illustrated in further detail. In the well is being drilled into the earth . The initial steel casing has been snubbed in into position and cemented in place. The 44″ steel casing (See ) may, or may not, need suppression while it is being installed. A temporary drilling header is installed at the top of the steel casing . The drop pipe extends downward from the temporary drilling header . In the hydraulic cylinder has closed the valve located at the bottom of the drop pipe . With the valve of closed, drill pipe along with bottom hole assembly are lowered into the drop pipe . The upper part of the drill pipe is sealed with the stripper rubber and turned by rotary table .
76
38
80
86
98
80
82
78
34
38
86
90
38
80
76
80
80
Pressure inside of the well does not need to be suppressed or killed when inserting drill string and bottom hole assembly because valve is closed with rubber sealing preventing leakage there through. After the bottom hole assembly is inside of drop pipe , then stripper rubber and rotary table are secured to the drill string . By opening the valve with the hydraulic cylinder , the drill string and the bottom hole assembly can be lowered to the bottom of well . The bottom hole assembly can include a drill bit for drilling the hole deeper or a drill collar. The bottom hole assembly can include coring equipment to get core samples. For injection water wells in Florida, it is important to run logging tools into the pilot holes.
82
76
34
100
24
102
76
82
76
5
6
FIGS. and
With the use of the drop pipe just as described in , numerous trips can be made into the well without having to kill or suppress the well. Pilot holes can be drilled and logged. Smaller ″ steel casing , and ″ steel casing can be installed and cemented in place using tremie tubing (not shown). It is only necessary to kill or suppress the well one time; namely, when the drop pipe is being removed at the final completion of the well .
104
70
110
110
72
72
104
76
104
72
3
FIG.
When a string of casing of a particular diameter has been set, that is when the large diameter drillable centering guide is attached to the lower end of a drilling casing that is being set. For example, after the 54 inch steel casing has been set and a pilot hole drilled, thereafter the pilot hole will have to be enlarged to receive the next size, i.e., the 44 inch steel casing . At the bottom of the 44 inch steel casing , a second large diameter drillable centering guide will be installed to make sure the pilot hole being drilled between approximately 1000 feet to 2000 feet is drilled in the center thereof. As the well is drilled, the casing is reduced in diameter. See . In this case, the large diameter drillable centering guide has a smaller diameter so that it can be attached by bonding or otherwise to the lower end of a 44 inch steel casing .
44
104
104
100
102
104
110
106
110
110
104
110
130
On each occasion, before setting a new large diameter drillable centering guide , the preceding centering guide of a larger diameter is drilled out. The procedure of drilling out the larger diameter of the large diameter drillable centering guide before placing the next centering guide of a slightly smaller diameter is repeated when installing the 34 inch steel casing and the 24 inch steel casing . On each occasion, the large diameter drillable center guide makes sure the pilot hole is being drilled in the center of the bottom . In this manner, the pilot hole insures a well is being drilled that can accommodate geophysical logging tools or other items that may need to be lowered into the pilot holes . Also, the centering guide makes sure the geophysical logging tool or other items being lower into pilot hole do not become stuck on ledge . | |
The invention relates to a synthetic method of anionic polyacrylamide, which comprises the steps of adding distilled water, an acrylamide monomer, an acrylic monomer and sodium hydroxide powder to a reaction device in sequence, stirring uniformly until completely dissolving to form a monomer aqueous solution, adding appropriate solubilizer, chelating agent and initiator to the monomer aqueous solution, stirring uniformly, filling high-purity nitrogen into the reaction device, exhausting air in the reaction device, sealing the reaction device, placing in an ultraviolet light reaction device, initiating a polymerization reaction under the irradiation of ultraviolet light with certain wavelength, generating an anionic polyacrylamide colloid, purifying, washing and refining the colloid, drying in a vacuum drying oven, grinding, and obtaining anionic polyacrylamide. The method is simple in process, short in production cycle and few in procedure; the polymerization reaction is more stable, and easy to control; prepared polyacrylamide is large in molecular weight, high in conversion rate and solid content, good in dissolvability, and stable; and anionic polyacrylamide is high in DEHP (Di-2-Ethyl Hexyl Phthalate) removal rate. | |
---
abstract: 'The virtual unknotting number of a virtual knot is the minimal number of crossing changes that makes the virtual knot to be the unknot, which is defined only for virtual knots virtually homotopic to the unknot. We focus on the virtual knot obtained from the standard $(p,q)$-torus knot diagram by replacing all crossings on one overstrand into virtual crossings and prove that its virtual unknotting number is equal to the unknotting number of the $(p,q)$-torus knot, i.e. it is $(p-1)(q-1)/2$.'
address:
- 'Mathematical Institute, Tohoku University, Sendai, 980-8578, Japan'
- 'Mathematical Institute, Tohoku University, Sendai, 980-8578, Japan'
author:
- Masaharu Ishikawa
- Hirokazu Yanagi
title: Virtual unknotting numbers of certain virtual torus knots
---
Introduction
============
The notion of virtual knots was introduced by Kauffman in [@kauffman] as a generalization of classical knots. A virtual knot diagram is a diagram obtained from a knot diagram by changing some of crossings into, so-called, virtual crossings. A virtual crossing is depicted by a small circle around the crossing point, for example see Figure \[fig1\] below. Two virtual knot diagrams are said to be equivalent if they are related by isotopy of diagrams and generalized Reidemeister moves shown in Figure \[figRM\]. An equivalence class, or a diagram in this equivalent class, is called a [*virtual knot*]{}. We can also define a virtual knot as an embedding of a circle into a thickened surface. If a virtual knot can be modified into the unknot by generalized Reidemeiter moves and crossing changes then we say that the virtual knot is [*virtually null-homotopic*]{}. Here a [*crossing change*]{} is an operation which replaces an overstand at a classical crossing into an understrand. Remark that there exist virtual knots which cannot be modified into the unknot by only crossing changes.
There are several unknotting operations for virtual knots. For example, an operation which replaces a classical crossing of a diagram of a virtual knot by a virtual crossing is called a [*virtualization*]{}[^1], and any virtual knot can be modified into the unknot by applying virtualizations successively. A forbidden move, introduced by Goussarov, Polyak and Viro [@gpv], is also known as an unknotting operation [@kanenobu; @nelson]. A forbidden detour move, which is essentially introduced in [@kanenobu; @nelson], is also, see [@yoshiike].
In [@chernov], Byberi and Chernov introduced the notion of the virtual unknotting number for virtually null-homotopic virtual knots [@chernov]. The [*virtual unknotting number*]{} ${\text{\rm vu}}(K)$ of a virtually null-homotopic virtual knot $K$ is the minimal number of crossing changes needed to modify $K$ into the unknot. They studied virtual unknotting numbers for virtual knots with virtual bridge number one.
Recently, in [@kkkp], Kaur, Kamada, Kawauchi and Prabhakar introduced the notion of the generalized unknotting number of a virtual knot as follows: For any virtual knot diagram, there exists a sequence of virtualizations and crossing changes such that the virtual knot is modified into a virtual knot diagram virtually homotopic to the unknot. For such a sequence $s$ for a virtual knot $K$, let $v_s$ and $c_s$ denote the number of virtualizations and crossing changes in the sequence, respectively. Then the generalized unknotting number $U(K)$ of a virtual knot $K$ is defined by the minimal pair $(v_s,c_s)$ among such sequences and choices of diagrams of $K$, where the minimality is defined by the lexicographic order. For example, $\min\{(2,0),(0,1)\}=(0,1)$. In [@kkkp], they determined the generalized unknotting numbers of virtual knots obtained from the standard $(2,p)$-torus knot diagrams by changing odd number of classical crossings into virtual crossings, and also those of virtual knots obtained from the standard twisted knot diagrams by changing some specific crossings into virtual crossings.
In this paper, we study the virtual unknotting numbers for a certain class of virtual knots obtained from the standard torus knot diagrams by applying virtualizations. Let $D(T_{p,q})$ be the standard $(p,q)$-torus knot diagram, where $p$ is the braid index and $p,q>0$. Here we do not care in which side we close the braid since we think of it as a diagram on $S^2$. The diagram has $q$ overstrands and we label them by $a_1,a_2,\ldots,a_q$ in a canonical order. Fix an integer $n\in\{1,\ldots,q\}$ and virtualize all classical crossings at which $a_i$ passes as an overstrand for $i=1,\ldots,n$. We denote the obtained virtual knot by $VT_{p,q}^n$. Note that the supporting genus of $VT_{p,q}^n$ is at most one and this implies that $VT_{p,q}^n$ is virtually null-homotopic, see Remark \[rem99\].
![The closure of this braid is $VT_{7,3}^1$.\[fig1\]](./fig1.eps){width="6cm"}
The following is our main theorem.
\[thm1\] The virtual unknotting number of the virtual knot $VT_{p,q}^1$ is $${\text{\rm vu}}(VT_{p,q}^1)=\frac{(p-1)(q-1)}{2}.$$
We will prove this theorem by the same method as in [@chernov]: the lower bound is given by the $P$-invariant and the upper bound is done by demonstrating an unknotting sequence explicitly.
At the beginning of this study, we checked the lower bounds of the virtual unknotting numbers for a few virtual knots obtained from the standard torus knot diagrams by applying virtualizations. We may call such knots [*virtual torus knots*]{}. It is well-known that the unknotting number of the $(p,q)$-torus knot is $(p-1)(q-1)/2$, which was conjectured by Milnor [@milnor] and proved by Kronheimer and Mrowka [@km]. Examining a few examples, we found that the virtual unknotting number of $VT_{p,q}^1$ is exactly same as the unknotting number of the $(p,q)$-torus knot, which brought us the above theorem. On the other hand, for the virtual knot $VT_{p,q}^2$, we are not sure if the lower bound obtained by the $P$-invariant attains the virtual unknotting number or not. This will be discussed in Section \[sec51\]. If we choose the virtualization on the standard torus knot diagram randomly, then the obtained virtual knot may not be virtually homotopic to the unknot, see Section \[sec52\].
The authors would like to thank Andrei Vesnin for telling us the result of Kaur, Kamada, Kawauchi and Prabhakar. They also thank Shin Sato for telling them the fact mentioned in Remark \[rem99\] and thank Vladimir Chernov and Seiichi Kamada for helpful comments. The first author is supported by the Grant-in-Aid for Scientific Research (C), JSPS KAKENHI Grant Number 16K05140.
Preliminaries
=============
Sign at a classical crossing
----------------------------
For a virtual knot diagram $D$, we assign an orientation to the virtual knot. We say that a classical crossing of $D$ is [*positive*]{} if the understrand passes though the crossing from the right to the left with respect to the overstrand. Otherwise, it is said to be [*negative*]{}. The sign ${\text{\rm sign}}(c)$ at a crossing point $c$ is defined to be $+1$ if it is positive and $-1$ otherwise. A crossing change changes a positive crossing into a negative one and vice-versa.
Generalized Reidemeister moves
------------------------------
The local moves of virtual knot diagrams described in Figure \[figRM\] are called [*generalized Reidemeister moves*]{}. The moves R1, R2, R3 are called classical Reidemeister moves. It is known that two classical knot diagrams represent the same knot if and only if these diagrams are related by classical Reidemeister moves. For virtual knots, we have four additional moves VR1, VR2, VR3 and MR. The moves VR1, VR2, VR3 are called [*virtual Reidemeister moves*]{} and the move MR is called a [*mixed Reidemeister move*]{}. By definition, two virtual knot diagrams represent the same virtual knot if and only if these diagrams are related by generalized Reidemeister moves.
![Generalized Reidemeister moves.\[figRM\]](./fig2.eps){width="14cm"}
Two virtual knots are said to be [*virtually homotopic*]{} if they are related by isotopy, generalized Reidemeister moves and crossing changes. If a virtual knot is virtually homotopic to the unknot then we say that it is [*virtually null-homotopic*]{}.
Upper bound
===========
Virtual knot $(i,j,k)$
----------------------
Let $i,j$ and $k$ be integers such that $0<j$ and $0\leq k<i$. We denote by $VB_{i,j}^1$ the virtual braid diagram obtained from the braid part of the standard diagram of the $(i,j)$-torus link by changing all classical crossings on the left-most overstrand into virtual crossings. For example, the braid in Figure \[fig1\] is $VB_{7,3}^1$. Let $B_k$ be the braid given by $\sigma_k\sigma_{k-1}\cdots\sigma_2\sigma_1$ as shown in Figure \[fig100\], where we read the braid words from the left to the right. We denote by $(i,j,k)$ the virtual link diagram obtained as the closure of the product of $VB_{i,j}^1$ and $B_k$. Hereafter, we always assume that $(i,j,k)$ is a virtual knot, that is, it has only one link component.
![The braid $B_k$.\[fig100\]](./fig3.eps){width="8cm"}
\[rem99\] It is known by Masuda in [@masuda Lemma 5.8] that if the supporting genus of a virtual knot is at most one then it is virtually null-homotopic. The proof is done by realizing the virtual knot as a knot on a torus and straightening it in the torus. If it is homotopic to a straight line in the torus then the corresponding virtual knot is virtually homotopic to the unknot. If it is homotopic to a straight line with multiplicity $m>1$ then the corresponding virtual knot is virtually homotopic to the $(m,1)$-torus knot, which is also the unknot. Therefore, the virtual knot is virtually null-homotopic. We can easily check that the supporting genera of $VT_{p,q}^n$ and $(i,j,k)$ are at most one. Therefore, they are virtually null-homotopic by his result.
We will prove the following theorem:
\[thm2\] The virtual unknotting number of the virtual knot $(i,j,k)$ is $${\text{\rm vu}}((i,j,k))=\frac{(i-1)(j-1)+k}{2}.$$
Setting $k=0$, we have Theorem \[thm1\].
The aim of this section is to prove the upper bound of the equality in Theorem \[thm2\], that is, $$\label{eq1}
{\text{\rm vu}}((i,j,k))\leq \frac{(i-1)(j-1)+k}{2}.$$
Reduce to the case $j\leq i$
----------------------------
\[lemma1\] Suppose that $j>i$.
- If $(i,j-i,k)$ consists of one link component then $(i,j,k)$ also does.
- $(i,j,k)$ is modified into $(i,j-i,k)$ by $i(i-1)/2$ crossing changes.
The braid part of the virtual knot $(i,j,k)$ is the product of $VB_{i,j-i}^1$, the full twist $B_{i,i}$ of $i$ strands and the braid $B_k$. We can replace the full twist $B_{i,i}$ into $i$ horizontal strands by $i(i-1)/2$ crossing changes. Hence the assertions hold.
\[lemma2\] If $(i,j-i,k)$ satisfies inequality then $(i,j,k)$ satisfies it also.
The inequality for $(i,j-i,k)$ is ${\text{\rm vu}}((i,j-i,k))\leq ((i-1)(j-i-1)+k)/2$. Hence, by Lemma \[lemma1\], we have $$\begin{split}
{\text{\rm vu}}((i,j,k))&\leq {\text{\rm vu}}((i,j-i,k))+\frac{i(i-1)}{2} \\
&\leq \frac{(i-1)(j-i-1)+k}{2}+\frac{i(i-1)}{2}=\frac{(i-1)(j-1)+k}{2}.
\end{split}$$
Thus, to prove the upper bound , it is enough to show the inequality in the case where $j\leq i$.
Operations A, B and C
---------------------
We will give an unknotting sequence of $(i,j,k)$ explicitly. To do this, we need to introduce three operations, named A, B and C. First we introduce operations 1, 2 and 3 to define operations A and B, and then give the definitions of operations A, B and C.
Let $(VB_{i,j}^1)B_k$ be the braid part of $(i,j,k)$. Starting from the right-top point, we follow the strand to the left until we meet a virtual crossing. Assume that this strand is always an understrand at each crossing. We move this strand to the top of the braid part as shown in Figure \[figM1\]. This operation is called [*operation 1*]{}. We only use classical Reidemeister moves during this operation.
![Operation 1.\[figM1\]](fig4.eps){height="40mm"}
Let $(VB_{i,j}^1)B_k$ be the braid part of $(i,j,k)$. Starting from the right-top point, we follow the strand to the left until we meet a virtual crossing. Assume that this strand contains some of the overstrands of $VB_{i,j}^1$ other than the most-right overstrand of $VB_{i,j}^1$. Remark that, since we are assuming $j\leq i$, this strand contains only one overstrand (passing through $i-1$ classical crossings). We apply crossing changes to all the crossings on this overstrand and then move the strand to the top of the braid part as shown in Figure \[figM2\]. This operation is called [*operation 2*]{}. We use $i-1$ crossing changes during this move.
![Operation 2. We use crossing changes $i-1$ times.\[figM2\]](fig5.eps){height="35mm"}
Take a diagram obtained by operation 1 or operation 2. We apply mixed Reidemeister moves, apply VR1 move once, and then move all the crossing lying on the left of the virtual crossings to the most-right position by the conjugation of the braid. We then obtain a virtual knot diagram of the form $(i,j,k)$ again. This operation is called [*operation 3*]{}. See Figure \[figM3\]. We only use generalized Reidemeister moves during this operation. The braid index of the obtained virtual braid diagram is $i-1$ since we use VR1 move once.
![Operation 3. We use VR1 move once, so that the braid index decreases.\[figM3\]](fig6.eps){height="8cm"}
Assume that $k+j<i$. We first apply operation 1 and then operation 3, which modifies $(i,j,k)$ into $(i-1,j,j+k-1)$. This is called [*operation A*]{}. Note that we only use generalized Reidemeister moves during this operation. In other words, we do not use crossing changes during operation A.
Assume that $i<k+j<2i-1$ and $i\ne k+1$. We first apply operation 2 and then operation 3, which modifies $(i,j,k)$ into $(i-1,j-1,j+k-i-1)$. This is called [*operation B*]{}. We use $i-1$ crossing changes during this operation.
Assume that $i=k+1$ and $j\geq 2$. Operation C is the move in Figure \[figMC\] which modifies $(i,j,k)$ into $(i,j-1,0)$. We use $i-1$ crossing changes during this operation.
![Operation C. We use crossing changes $i-1$ times.\[figMC\]](fig7.eps){height="7cm"}
An unknotting sequence of $(i,j,k)$
-----------------------------------
\[lemma10\] Assume that $(i,j,k)$ is a virtual knot with $2\leq j\leq i$ and $0\leq k<i$. Then we can apply one of operations A, B and C. More precisely,
- if $2\leq k+j<i$ then we apply operation A,
- if $i<k+j< 2i-1$ and $i\ne k+1$ then we apply operation B,
- if $i<k+j< 2i-1$ and $i=k+1$ then we apply operation C, and
- if $i=j=k+1$ then we apply operation C.
If $i=j$ then $k=i-1$, otherwise $(i,j,k)$ has more than one link component. This is in case (iv) and we can apply operation C.
Suppose that $2\leq j\leq i-1$ and $0\leq k < i$. We decompose it into four cases: (i), (ii), (iii) in the assertion and the case where $i=k+j$. If it is in case (i), (ii) and (iii) then we apply operation A, B and C, respectively. Suppose $i=k+j$. Let $VB_{i,j}^1$ is the braid part of $VT_{i,j}^1$, i.e., $VT_{i,j}^1$ is the closure of $VB_{i,j}^1$. If we follow the strand of $VB_{i,j}^1$ from the left-top then on the right side of the braid $VB_{i,j}^1$, we arrive at the $j-i+1$-th strand counted from the top. The braid part of $(i,j,k)$ is the product of $VB_{i,j}^1$ and $B_k$, and the $j-i+1$-th strand is connected to the first strand on the right side of $B_k$. Taking the closure of this braid, we see that this constitutes a link component of $(i,j,k)$. Since $i\geq 2$, it has more than one link component. Thus we can exclude this case.
\[prop1\] Suppose that $(i,j,k)$ is a virtual knot with $2\leq j\leq i$ and $0\leq k<i$. Then $(i,j,k)$ can be modified to the unknot by a sequence of operations A, B and C.
First we observe the case where $i=2$. Since $(i,j,k)$ has only one link component, possible cases are only $(2,2,1)$ and $(2,1,0)$. The virtual knot $(2,1,0)$ is the unknot. The virtual knot $(2,2,1)$ is modified into $(2,1,0)$ by operation C. Thus it is virtually null-homotopic.
Assume that $i\geq 3$. We check that the conditions $1\leq j\leq i$ and $0\leq k<i$ are satisfied after operations A, B and C. If it is in case (i) in Lemma \[lemma10\] then we apply operation A and obtain $(i-1, j, j+k-1)$. The second inequality is verified as $(i-1)-(j+k-1)=i-j-k>0$. If it is in case (ii) in Lemma \[lemma10\] then we apply operation B and obtain $(i-1, j-1, j+k-i-1)$. The second inequality is verified as $(i-1)-(j+k-i-1)=2i-j-k>0$. If it is in case (iii) or (iv) in Lemma \[lemma10\] then we apply operation C and obtain $(i, j-1, 0)$, which satisfies the required inequalities.
By these operations, either the first or the second entry decreases one by one. Since $2\leq j\leq i$, we will reach either case (a) $i=3$ or case (b) $i>3$ and $j=1$. If it is in case (a) then either $(i,j,k)=(3,2,2)$, $(3,2,0)$ or $(3,1,0)$. For $(3,2,2)$, we obtain $(2,1,0)$ by operation B. For $(3,2,0)$, we obtain $(2,2,1)$ by operation A and then $(2,1,0)$ by operation C. Since the virtual knot $(i,1,0)$ is the unknot, the knot is virtually null-homotopic in either case in case (a). If it is in case (b) and $k>0$ then we can check directly that it always has more than one link component, and we can exclude this case. If it is in case (b) and $k=0$ then it is the unknot $(i,1,0)$. Thus we have the assertion.
Proof of the upper bound
------------------------
In the following proposition, we do not assume $j\leq i$.
\[prop2\] Suppose that $(i,j,k)$ is a virtual knot with $0\leq k<i$. Then inequality holds.
By Lemma \[lemma2\], it is enough to show the assertion in the case where $j\leq i$.
As we saw in the proof of Proposition \[prop1\], we can reach the unknot of the form $(i,1,0)$ after applying operations A, B and C. For $(i,1,0)$, the right hand side of inequality is $0$. Thus the assertion holds.
Now we prove the assertion by induction. Let $m(i,j,k)$ be the number of operations A, B and C to obtain the unknot. For the induction, we assume that inequality holds for any virtual knot $(i,j,k)$ with $m(i,j,k)\leq \ell$, and check the inequality for a virtual knot $(i',j',k')$ with $m(i',j',k')=\ell+1$.
Suppose that $(i,j,k)$ is obtained from $(i',j',k')$ by operation A, i.e., in the case $(i',j',k')=(i+1,j,k-j+1)$. We do not use crossing changes during operation A. Since $$\frac{(i'-1)(j'-1)+k'}{2}=\frac{(i+1-1)(j-1)+k-j+1}{2}=\frac{(i-1)(j-1)+k}{2},$$ the assertion holds.
Suppose that $(i,j,k)$ is obtained from $(i',j',k')$ by operation B, i.e., in the case $(i',j',k')=(i+1,j+1,k-j+i+1)$. We use $i'-1$ crossing changes during operation B. Since $$\frac{(i'-1)(j'-1)+k'}{2}-(i'-1)=\frac{ij+k-j+i+1}{2}-i=\frac{(i-1)(j-1)+k}{2},$$ the assertion holds.
Finally, suppose that $(i,j,0)$ is obtained from $(i',j',k')$ by operation C, i.e., in the case $(i',j',k')=(i,j+1,i-1)$. We use $i'-1$ crossing changes during operation B. Since $$\frac{(i'-1)(j'-1)+k'}{2}-(i'-1)=\frac{(i-1)j+i-1}{2}-(i-1)=\frac{(i-1)(j-1)}{2},$$ the assertion holds. This completes the proof.
Lower bound and Proof of Theorem \[thm2\]
=========================================
Gauss diagram
-------------
We shortly introduce the Gauss diagram of a virtual knot. Let $D$ be a virtual knot diagram. Choose a starting point $p$ on $D$. Describe the unit circle $\Gamma$ on a plane and choose a point $q$ on $\Gamma$ which corresponds to $p$. We follow the knot strand of $D$ from $p$ and also $\Gamma$ from $q$ simultaneously. When we meet a classical crossing on $D$ then we put a label on $\Gamma$. In consequence, we have $2N$ points on $\Gamma$, where $N$ is the number of classical crossings on $D$. Each classical crossing of $D$ corresponds to two points among these $2N$ points. We connect these two points by an edge and add an arrowhead to the point on $\Gamma$ corresponding to the understrand. Finally, we write a sign $+$ if the crossing is positive and $-$ otherwise. The obtained diagram is called the [*Gauss diagram*]{} of $D$ and a signed, arrowed edge on the Gauss diagram is called a [*chord*]{}.
A [*flip*]{} is an operation on a Gauss diagram which reverses the direction of the arrow of a chord and changes the sign assigned to the chord. This operation corresponds to a crossing change on a virtual knot diagram obtained from the Gauss diagram.
Invariant $P(K)$
----------------
Let $GD(K)$ be a Gauss diagram of a virtual knot $K$. The endpoints of a chord $c$ of $GD(K)$ decompose the circle $\Gamma$ of $GD(K)$ into two open arcs, $\gamma_1$ and $\gamma_2$. We flip suitable chords in $GD(K)$ other than $c$ such that their arrowheads are on $\gamma_1$ and denote the sum of signs in the flipped Gauss diagram by $i(c)$. We then define $P(GD(K))$ for the Gauss diagram $GD(K)$ by $$P(GD(K))=\sum_{c}{\text{\rm sign}}(c)t^{|i(c)|},$$ where the sum runs all chords $c$ such that $i(c)\ne 0$.
The polynomial $P(GD(K))$ does not depend on a choice of Gauss diagram of the virtual knot $K$.
The $P$-invariant $P(K)$ of a virtual knot $K$ is defined by $P(K)=P(GD(K))$ for a Gauss diagram $GD(K)$ of $K$.
Note that this invariant was first introduced by Henrich in a slightly different form, see [@henrich Definition 3.3].
\[lemma13\] Set $P(K)=\sum_{m\in{\mathbb N}}b_mt^m$. Suppose that $K$ is virtually null-homotopic. Then the following inequality holds: $${\text{\rm vu}}(K)\geq\frac{1}{2}\sum_{m\in{\mathbb N}}|b_m|.$$
Proofs of the lower bound and Theorem \[thm2\]
----------------------------------------------
In this section, we complete the proof of Theorem \[thm2\] by showing the lower bound of the equality in the theorem.
The definition of $i(c)$ is interpreted in terms of a virtual knot diagram $D$ as follows: A chord $c$ corresponds to a classical crossing $p$ of $D$. Start from $p$ and follow the strand into one of the possible directions, then we come back to $p$ again at some moment. Denote this loop by $\gamma_1$ and the rest part of the virtual knot by $\gamma_2$. For each classical crossing consisting of $\gamma_1$ and $\gamma_2$, if $\gamma_1$ is an understrand then we apply a crossing change so that $\gamma_1$ is an overstrand. We denote the obtained virtual knot diagram by $D_c$. Then, $i(c)$ is the sum of signs of all classical crossings consisting of $\gamma_1$ and $\gamma_2$. Let $i_o(\gamma_1,\gamma_2)$ and $i_u(\gamma_1,\gamma_2)$ be the number of classical crossings on $D$ consisting of $\gamma_1$ and $\gamma_2$ such that $\gamma_1$ is an overstand and an understrand, respectively. Then we have $$|i(c)|=|i_o(\gamma_1,\gamma_2)-i_u(\gamma_1,\gamma_2)|.$$
A closed positive braid is a link, or a diagram, obtained as the closure of a braid consisting of only positive words. Remark that all classical crossings on $(i,j,k)$ are positive and they are given by positive words in its braid word presentation.
\[lemma11\] Let $B$ be the diagram of a closed positive braid and suppose that $B$ is a knot. Let $GD(B)$ be the Gauss diagram of $B$. Then $i(c)=0$ for any chord $c$ in $GD(B)$.
Choose a crossing point $p$ of $B$. We choose $\gamma_1$ by following the strand from $p$ in the right-bottom direction. There are two important remarks: One is that, since all crossings on $B$ are positive, $\gamma_1$ is always an overstrand when $\gamma$ directs to the right-bottom, and it is always an understrand when $\gamma$ directs to the right-top. The other remark is that, since $B$ is a knot, $\gamma_1$ comes back to $p$ from the left-bottom. If $\gamma_1$ has no self-crossing, then $i_o(\gamma_1,\gamma_2)=i_u(\gamma_1,\gamma_2)$. Furthermore, this equality holds even if $\gamma_1$ has self-crossings since each self-crossing consists of a strand going to the right-top and a strand going to the right-bottom. Thus we have $i(c)=0$.
\[lemma12\] Suppose that $(i,j,k)$ is a virtual knot diagram and let $GD((i,j,k))$ be its Gauss diagram. Then $i(c)\ne 0$ for any chord $c$ in $GD((i,j,k))$.
Assume that there exists a chord $c$ such that $i(c)=0$. Choose $\gamma_1$ such that it does not contain the vertical strand $a_1$ which passes though all virtual crossings. This is possible by exchanging the roles of $\gamma_1$ and $\gamma_2$ if necessary. Suppose that $\gamma_1$ meets $a_1$ at virtual crossings $N$ times, where $N$ is at least $1$. If we regard the virtual crossings as classical crossings, then the diagram is a closed positive braid and we have $i(c)=0$ by Lemma \[lemma11\]. This means that $i(c)$ for $(i,j,k)$ is calculated from that for the closed positive braid by subtracting the signed number of virtual crossings on $\gamma_1$. Thus we have $|i(c)|=N\geq 1$.
As mentioned in Remark \[rem99\], $(i,j,k)$ is virtually null-homotopic. This also follows from Lemma \[prop1\]. The upper bound of the equality in Theorem \[thm2\] follows from Proposition \[prop2\]. For the lower bound, we use the inequality in Lemma \[lemma13\]. The diagram $(i,j,k)$ has $(i-1)(j-1)+k$ classical crossings and the signs of all classical crossings are positive. Since $i(c)\ne 0$ for any chord $c$ by Lemma \[lemma12\], we have $\sum_{m\in{\mathbb N}}|b_m|=(i-1)(j-1)+k$. Thus the lower bound follows from the inequality in Lemma \[lemma13\].
The assertion in Theorem \[thm1\] holds in case $pq<0$ also since the virtual knot diagram $V_{p,q}^1$ with $pq<0$ is the mirror image of $V_{|p|,|q|}^1$.
Further discussions
===================
The virtual torus knot $VT_{p,q}^n$ {#sec51}
-----------------------------------
\[lemma14\] Suppose that $p$ and $q$ are coprime and $n$ is an integer such that $1\leq n\leq q$. If $p$ and $n$ are coprime then ${\text{\rm vu}}(VT_{p,q}^n)\geq (p-1)(q-n)/2$.
Let $V_{p,n}$ be the braid part of $VT_{p,q}^n$ having only virtual crossings. If $n\geq p$ then we can apply generalized Reidemeister moves to $V_{p,n}$ such that it becomes $V_{p,n-p}$. Therefore, we can assume that $n<p$.
Assume that there exists a chord $c$ such that $i(c)=0$. Choose $\gamma_1$ such that it does not contain the vertical strand $a_1$. This is possible by exchanging the roles of $\gamma_1$ and $\gamma_2$ if necessary. Observing how $\gamma_1$ passes though $V_{p,n}$, we have two cases:
- When $\gamma_1$ passes a vertical strand $a_i$, for some $i\in\{1,\ldots,n\}$, the contribution on the virtual crossings on $a_i$ to $i_o(\gamma_1,\gamma_2)$ by virtualizations from the closed positive braid $D_{p,q}$ is $p-1$. The strand containing $a_i$ in the braid part $V_{p,n}$ also has the contribution $n-1$ to $i_u(\gamma_1,\gamma_2)$ since it has one crossing with each of the other vertical strands $a_j$, $j\ne i$, in $V_{p,n}$.
- When $\gamma_1$ passes though $V_{p,n}$ horizontally, the contribution to $i_u(\gamma_1,\gamma_2)$ is $n$ and there is no contribution to $i_o(\gamma_1,\gamma_2)$.
Let $N_1$ and $N_2$ be the number of case (1) and (2) appearing along $\gamma_1$, respectively. Since $\gamma_1$ does not contain $a_1$, $0\leq N_1\leq n-1$. We have $1\leq N_2\leq p-n$. As in the proof of Lemma \[lemma12\], we check the difference of $i(c)$ for $VT_{p,q}^n$ and $D(T_{p,q})$, where $i(c)=0$ for $D(T_{p,q})$ by Lemma \[lemma11\]. From the above observation, we have $$\begin{split}
0&=|i(c)|=|i_o(\gamma_1,\gamma_2)-i_u(\gamma_1,\gamma_2)| \\
&=|(p-1)N_1-((n-1)N_1+nN_2)|=|pN_1-n(N_1+N_2)|.
\end{split}$$ Thus we have $pN_1=n(N_1+N_2)$. We then divide the both sides by $n$ and get $pN_1\equiv 0\mod n$. Since $p$ and $n$ are coprime and $0\leq N_1\leq n-1$, we have $N_1=N_2=0$. This is a contradiction.
Since $i(c)\ne 0$ for any chord $c$, the assertion holds by Lemma \[lemma13\] as in the proof of Theorem \[thm2\].
We checked the lower bounds of ${\text{\rm vu}}(VT_{p,q}^2)$ obtained by the $P$-invariant and also tried to find good upper bounds by moves of virtual knot diagrams for virtual knots $VT_{p,q}^2$ with $q<p\leq 8$. The result is shown in Table \[table1\].
$(p,q)$ $\sum|b_j|/2$ upper bound ${\text{\rm vu}}(VT_{p,q}^2)$
--------- --------------- ------------- ---------------------------------------------
$(3,2)$ $0$ $0$ ${\text{\rm vu}}(VT_{3,2}^2)=0$
$(4,3)$ $1$ $1$ ${\text{\rm vu}}(VT_{4,3}^2)=1$
$(5,2)$ $0$ $0$ ${\text{\rm vu}}(VT_{5,2}^2)=0$
$(5,3)$ $2$ $2$ ${\text{\rm vu}}(VT_{5,3}^2)=2$
$(5,4)$ $4$ $4$ ${\text{\rm vu}}(VT_{5,4}^2)=4$
$(6,5)$ $7$ $7$ ${\text{\rm vu}}(VT_{6,5}^2)=7$
$(7,2)$ $0$ $0$ ${\text{\rm vu}}(VT_{7,2}^2)=0$
$(7,3)$ $3$ $3$ ${\text{\rm vu}}(VT_{7,3}^2)=3$
$(7,4)$ $6$ $6$ ${\text{\rm vu}}(VT_{7,4}^2)=6$
$(7,5)$ $9$ $9$ ${\text{\rm vu}}(VT_{7,5}^2)=9$
$(7,6)$ $12$ $12$ ${\text{\rm vu}}(VT_{7,6}^2)=12$
$(8,3)$ $3$ $3$ ${\text{\rm vu}}(VT_{8,3}^2)=3$
$(8,5)$ $9$ $10$ $9 \leq {\text{\rm vu}}(VT_{8,5}^2)\leq 10$
$(8,7)$ $17$ $17$ ${\text{\rm vu}}(VT_{8,7}^2)=17$
: Virtual unknotting numbers of $VT_{p,q}^2$[]{data-label="table1"}
If $p$ is odd then the lower bound is given in Lemma \[lemma14\]. If $p$ is even then we calculate the $P$-invariant for each case. The upper bound is obtained by finding moves of virtual knot diagrams, which are written in [@yanagi]. The virtual unknotting numbers of $V_{p,q}^3$ with $q<p\leq 8$ are also discussed in [@yanagi].
A virtual torus knot which is not virtually null-homotopic {#sec52}
----------------------------------------------------------
As mentioned in Remark \[rem99\], the virtual torus knot $VT_{p,q}^n$ is virtually null-homotopic. On the other hand, we can check that the virtual torus knot in Figure \[fig22\] is not virtually homotopic to the unknot by the following reason: For a Gauss diagram $GD(K)$ of a virtual knot $K$, let $\overline{GD}(K)$ be the Gauss diagram obtained from $GD(K)$ by flipping some of chords such that all signs are $+1$. If $K$ is a virtual knot obtained from a closed positive braid by virtualizations then $GD(K)=\overline{GD}(K)$ for the Gauss diagram obtained from that diagram of $K$. In particular, $VT_{p,q}^n$ has this property. For each chord $c$, we rotate the Gauss diagram $\bar D$ such that $c$ directs to the top, and let $n_+(c)$ be the number of chords which cross the chord $c$ from the left to the right and $n_-(c)$ be the number of chords which cross $c$ from the right to the left. Set $n(c)=n_+(c)-n_-(c)$. It is known in [@chernov], originally from [@turaev], that the polynomial $$u(K)=\sum_c{\text{\rm sign}}(n(c))t^{|n(c)|}$$ does not depend on the choice of a Gauss diagram of $K$ and also does not change under crossing changes, where the sum runs all chords $c$ on $\bar D$ with $n(c)\ne 0$. This polynomial is called the [*$u$-invariant*]{} of $K$. In, particular, if a virtual knot $K$ is virtually null-homotopic then $u(K)=0$. We can check that the $u$-invariant of the virtual torus knot in Figure \[fig22\] is $t^2-2t$ and hence it is not virtually null-homotopic.
![The closure of this braid is a virtual torus knot which is not virtually homotopic to the unknot.\[fig22\]](./fig8.eps){width="5.5cm"}
On virtual Gordian complex
--------------------------
For the set of virtually null-homotopic virtual knots, we can define a virtual version of the Gordian complex as follows: set a vertex for each virtually null-homotopic virtual knot and connect two vertices by an edge if one can be obtained from the other by one crossing change. We then attach a $2$-simplex along a triangle consisting of three edges, and continue this process $m$-simplices with $m\geq 3$ inductively. By construction, if there is an $m$-simplex then the $m+1$ virtual knots corresponding to the vertices of the $m$-simplex are related by a single crossing change. The Gordian complex of classical knots is embedded in this complex canonically. However, we do not know if the embedding preserves the distance of two vertices (i.e., the minimal number of edges between two vertices). For example, we may ask the following: Is the distance from the vertex corresponding to the $(p,q)$-torus knot to the vertex of the unknot is $(p-1)(q-1)/2$ in the virtual Gordian complex? If this is true then our main theorem means that the virtualization from $D(T_{p,q})$ to $VT_{p,q}^1$ does not change the distance from the vertices of these knots to the vertex of the unknot in the virtual Gordian complex.
For another definition of a Gordian complex for virtual knots, see [@ohyama1; @ohyama2]. They used forbidden moves to define the Gordian complex. In particular, it is defined for all virtual knots.
[99]{} E. Byberi, V. Chernov, [*Virtual bridge number one knots*]{}, Commun. Contemp. Math. [**10**]{} (2008), 1013–1021.
M. Goussarov, M. Polyak and O. Viro, [*Finite-type invariants of classical and virtual knots*]{}, Topology [**39**]{} (2000), no. 5, 1045–1068.
A. Henrich, [*A sequence of degree one Vassiliev invariants for virtual knots*]{}, J. Knot Theory Ramifications [**19**]{} (2010), no. 4, 461–487.
S. Horiuchi, Y. Ohyama, [*The Gordian complex of virtual knots by forbidden moves*]{}, J. Knot Theory Ramifications [**22**]{} (2013), no. 9, 1350051, 11 pp.
S. Horiuchi, K. Komura, Y. Kasumi, M. Shimozawa, [*The Gordian complex of virtual knots*]{}, J. Knot Theory Ramifications [**21**]{} (2012), no. 14, 1250122, 11 pp.
T. Kanenobu, [*Forbidden moves unknot a virtual knot*]{}, J. Knot Theory Ramifications [**10**]{} (2001), no. 1, 89–96.
L.H. Kauffman, [*Virtual knot theory*]{}, European J. Combin. [**20**]{} (1999), no. 7, 663–690.
L.H. Kauffman, [*Introduction to virtual knot theory*]{}, J. Knot Theory Ramifications [**21**]{} (2012), no. 13, 1240007, 37 pp.
K. Kaur, S. Kamada, A. Kawauchi, M. Prabhakar, [*Generalized unknotting numbers of virtual knots*]{}, preprint.
P.B. Kronheimer, T.S. Mrowka, [*Gauge theory for embedded surfaces, I*]{}, Topology [**32**]{} (1993), 773–826.
Y. Masuda, Knot diagrams and Dehn presentations of knot groups, (in Japanese), Master Thesis, Kobe University, 2014.
J.W. Milnor, Singular points of complex hypersurfaces, Ann. Math. Studies 61, Princeton Univ. Press, Princeton, N.J., 1968.
S. Nelson, [*Unknotting virtual knots with Gauss diagram forbidden moves*]{}, J. Knot Theory Ramifications [**10**]{} (2001), no. 6, 931–935.
V. Turaev, [*Virtual strings*]{}, Ann. Inst. Fourier (Grenoble) [**54**]{} (2004), 2455-2525.
H. Yanagi, The virtual unknotting numbers of a class of virtual torus knots, (in Japanese), Master Thesis, Tohoku University, 2017. (in preparation)
S. Yoshiike, Estimates on forbidden numbers and forbidden detour numbers of virtual knots, (in Japanese), Master Thesis, Nihon University, 2017. (in preparation)
[^1]: The terminology “virtualization” is used in [@kauffman2] for a different operation.
| |
TextYard is an online marketplace for textbooks. It was launched by Indiana University students in 2008 and has since grown to cover over 1000 schools throughout the USA. It is a web-based local-search program, where students cans search for books by class, term, department, or section, by school and location. Students are also able to sell their textbooks through TextYard. It is a free service to students but takes a percentage of books sold. It compares lowest prices on textbooks with Amazon, Half, Chegg, and other student sales. | http://dealbook.startl.org/company/textyard/ |
July 15, 2013 – Day 1 of Camp Vanadzor
I went to bed last night very anxious for what today would bring. Having only heard stories from fellow AYF-ers past camp experiences, I did not know what to expect. The team gathered in the morning for breakfast and headed together to the camp. As we approached the school, eager campers were waiting for us at the door. I greeted them with warm hellos and introduced myself as their counselor for the next two weeks. Quickly the number of campers escalated and I found myself overwhelmed with emotions. I could not continue greeting the children without tears forming in my eyes. Oddly enough they were both happy and sad tears; happy because through AYF we are creating an unforgettable experience for these children and sad because they are not as fortunate but have such an appreciation for life. Entering the camp, we started registrations which included dividing the campers into groups and handing out the t-shirts that will leave a lasting memory in Vanadzor. During the flag ceremony, the sight of over 150 campers singing “Mshag Panvor” was breathtaking. We spent the day playing games, learning songs and having discussions about computers and voting systems. Towards the end of the day, the kids did not want to leave my side. They were holding my hand and requesting that we continue this camp every year, hoping they will see me again. I already know it will be difficult to say goodbye. Thank you to AYF Canada for giving me the opportunity to be a part of such an incredible experience. | https://ayfcanada.org/2013/07/15/camp-vanadzor-is-open/ |
Databases are used to store information for an innumerable number of applications, including various commercial, industrial, technical, scientific and educational applications. As the reliance on information increases, both the volume of information stored in most databases, as well as the number of users wishing to access that information, likewise increases. Moreover, as the volume of information in a database, and the number of users wishing to access the database, increases, the amount of computing resources required to manage such a database increases as well.
Database management systems (DBMS's), which are the computer programs that are used to access the information stored in databases, therefore often require tremendous resources to handle the heavy workloads placed on such systems. As such, significant resources have been devoted to increasing the performance of database management systems with respect to processing searches, or queries, to databases.
Improvements to both computer hardware and software have improved the capacities of conventional database management systems. For example, in the hardware realm, increases in microprocessor performance, coupled with improved memory management systems, have improved the number of queries that a particular microprocessor can perform in a given unit of time. Furthermore, the use of multiple microprocessors and/or multiple networked computers has further increased the capacities of many database management systems. From a software standpoint, the use of relational databases, which organize information into formally-defined tables consisting of rows and columns, and which are typically accessed using a standardized language such as Structured Query Language (SQL), has substantially improved processing efficiency, as well as substantially simplified the creation, organization, and extension of information within a database.
Furthermore, significant development efforts have been directed toward query “optimization,” whereby the execution of particular searches, or queries, is optimized in an automated manner to minimize the amount of resources required to execute each query. A query optimizer typically generates, for each submitted query, an access plan, which typically incorporates low-level information telling the database engine that ultimately handles a query precisely what steps to take (and in what order) to execute the query. In addition, the access plan may select from different access methods (e.g., table scans or index accesses), based upon the available resources in the system.
In generating an access plan, a query optimizer typically creates multiple potential access plans, and selects the best among those potential access plans based upon the “cost” of each plan. The cost of each plan represents the amount of resources expected to be utilized by the plan (typically expressed in the expected amount of time to execute), and as such, selecting the plan with the lowest cost typically results in the most efficient (and quickest) execution of a query.
The cost of an access plan is typically calculated as a function of both processor cost and the input/output cost. The former is reflective of the expected amount of processor time required to execute the query, while the latter is reflective of the expected amount of time required to retrieve resources needed during query execution, e.g., to retrieve required data from persistent storage such as a disk drive into working memory.
Resources that may need to be retrieved in connection with a query may include, for example, tables or files in a database, as well as hash tables, indices, and the like. Such resources are retrieved into working memory principally for performance reasons, as working memory is usually several orders of magnitude faster than persistent storage media such as disk drives and the like.
In calculating the input/output cost associated with retrieving required resources, however, conventional costing algorithms generally make an assumption that the required resources have not been previously retrieved into working memory. In practice, however, some required resources may have been retrieved into working memory as a result of prior system activity, e.g., the execution of other queries. In such situations, the practical input/output cost associated with retrieving the resources would be significantly less than the cost that would be expected if the resources had to be retrieved from disk in connection with executing the query.
As an example, a query optimizer may receive a query such as: SELECT * from X, Y WHERE X.col1=Y.col1 and X.col2=? and Y.col3=?In generating an access plan for such a query, one of the decisions that a query optimizer typically must make is selecting a join order, i.e., whether Y is joined to X or X is joined to Y. It may be the case that if both X and Y and all their indices are not in working memory, then joining Y to X is the optimal join order. However, it may also be the case that, if Y is already in memory, but none of X is in memory (e.g., if a previous query recently performed a table scan of Y), the opposite join order may actually result in better performance, because the practical input/output cost associated with retrieving Y into memory would be negligible. However, given that conventional costing algorithms assume that no required resources have already been retrieved into memory for the purpose of calculating input/output costs, the former join order will always be selected over the latter. Thus, under certain runtime conditions, conventional costing algorithms may make assumptions that are not consistent with actual costs, resulting in the selection of suboptimal access plans under such conditions
A need therefore exists in the art for an improved manner of calculating the costs of potential access plans, and thus selecting optimal access plans for executing database queries, to address disparities in the actual costs that may arise during runtime.
| |
Cooking description:
It is a dish with an interesting history that ties back to Napoleon himself. According to legend, it was for him that such a chicken was first prepared, when the chef had to invent something tasty and satisfying from a small set of products at hand. Since then, the emperor has asked to prepare such a dish after every significant battle. Ready to try one of the many options? Remember!
Purpose: For lunch / For dinner
Main Ingredient: Poultry / Chicken
Dish: Hot dishes
Cuisine geography: French / European
Ingredients:
- Chicken - 1 Piece
- Shrimps - 6-8 Pieces (large)
- Mushrooms - 250 Grams
- Onion - 1-2 Pieces
- Garlic - 4-6 Cloves
- Dry white wine - 1 Glass
- Salt, pepper, thyme - To taste
- Vegetable oil - 2-3 tbsp. spoons
- Tomatoes - 3-4 Pieces
- Flour - To taste
- Butter - 50 Grams
Servings: 4-6
How to cook "Chicken" Marengo "
1. A set of ingredients that we will use.
2. Wash the chicken, pat dry, cut into 4 pieces. Season with salt and pepper to taste, roll in flour. Place in a skillet with heated oil and fry until crusty on both sides.
3. Remove chicken and set aside temporarily. And send chopped onions with garlic to the pan. Fry over medium heat, stirring occasionally, for 3-4 minutes.
4. Add the chopped mushrooms, some butter and continue to fry.
5. Send the diced tomatoes to the skillet.
6. Pour in wine, add salt and pepper, a pinch of thyme. Lay out the chicken. Leave to simmer over medium heat for half an hour.
7. Place the shrimp and continue cooking for another 5-7 minutes. Enjoy your meal! | https://fooddiscoverybox.com/7927329-chicken-marengo-a-step-by-step-recipe-with-a-photo |
We’ve been having some pretty fractious days, lately. Too much together time, I think. Too much sitting at a table completing the last few pages of maths when the green grass outside is calling. The result is a lot more poking, taunting, teasing and general irritability over being in each other’s presence. I get it. I had two siblings of my own growing up, and I know it is completely natural. But, as the mum and headmaster of the Pear Tree Skool, it’s still not really okay.
So, to change gears a bit, I thought I’d introduce Kindness Balls.
Everything we needed – one big jar, two smaller jars and a bunch of tiny pom-poms balls – we picked up at our neighbourhood Dollar Store. The stickers, to decorate the jars, we already had, in a seemingly bottomless sticker box.
Now, whenever one does something nice for for the other, they can help themselves to a pom-pom to put in their own jar. When their jar is full, they’ll get a little treat as a reward.
I don’t expect that to happen too quickly – it takes about 200 of the little balls to fill a jar!
That said, they’ve gotten onboard in a big way. Big Brother made Little Sister’s bed this morning, cleared her table after breakfast and put away some of her toys. She returned the favour by making his bed, and picking up some of his clothes.
So the Kindness balls have started to accumulate.
And the mood around here has dramatically improved, already. Funny how looking out for someone else instead of yourself can do that. This could be quite a fun summer if it keeps up! | http://thepeartree.ca/2015/05/kindness-balls/ |
Post-Impressionism is a term contrived by British Art critic Roger Fry. It was used in 1910 to describe the development of French Art since Manet. Post-Impressionism was seen as extending impressionism whilst rejecting its limitations. Post-impressionistic Artist continued using many techniques and styles of impressionism however they were more inclined to emphasize geometric forms, to distort forms for expressive effect, and to use unnatural or arbitrary colours.
Post-impressionist focal point of their paintings were real-life subjective forms. They developed a range of styles that focus on emotional, structural, symbolic and spiritual elements. The artists of this movement were dissatisfied with the triviality and the loss of structure in impressionist painting.
Impressionist artist continued using vivid colors, thick application of paint and distinctive brush strokes like impressionist artists. However they were disinterested in recording light and color phenomena. Post-Impressionism is characterized by bright color, sharp, often outlined edges. Post-Impressionist artists used short choppy brush strokes similar to impressionists. They were interested in creating form with broken color and short brush strokes. Post-Impressionist artworks developed the the sub-movement impressionism within modernism altering the artistic movement developement. | http://modernism-literature-movement.weebly.com/post-impressionism.html |
Q:
How good is this cipher? (Python)
I made a cipher on python and I want to know how good it is, I calculated there are about 10^1025 possibilities for the key, is that any good? I can easily make it bigger. I mainly focused on the 'hard encoding' by the way.
Here is the code:
import random
import itertools
print ('''
READ THIS BEFORE USE
This encryption can ONLY use ASCII
this contains most/all of the
keys on your keyboard, this
includes capital letters
The key supports around 100000 digits.
The hard encoding adds three more
layers of security. You will have to
copy your new key.
x
by Tudor Popescu
''')
hard_encoding_1 = {
'0': '8',
'1': '4',
'2': '3',
'3': '7',
'4': '1',
'5': '9',
'6': '5',
'7': '6',
'8': '2',
'9': '0',
}
hard_encoding_2 = {
'0': '5',
'1': '9',
'2': '0',
'3': '1',
'4': '4',
'5': '3',
'6': '7',
'7': '2',
'8': '6',
'9': '8',
}
hard_encoding_3 = {
'0': '2',
'1': '5',
'2': '7',
'3': '4',
'4': '9',
'5': '8',
'6': '1',
'7': '0',
'8': '3',
'9': '6',
}
hard_encoding_4 = {
'0': '1',
'1': '3',
'2': '5',
'3': '8',
'4': '0',
'5': '7',
'6': '6',
'7': '2',
'8': '9',
'9': '4',
}
def randint_generator(n):
key_generate = ''
for b in range(n):
b = random.randint(0, 9)
key_generate = key_generate + str(b)
return 'copy this key: ' + key_generate
def randint_generator_nonreturn(n):
return key_generate
def setnumber(x, y, str_or_int):
n = len(str(x))
z = str(x)
while n != y:
z = '0' + z
n = len(z)
if str_or_int == str:
return str(z)
if str_or_int == int:
return int(z)
while True:
What_operation = int(input('''
Do you want to:
soft:
decrypt(0)
encrypt(1)
hard:
decrypt(3)
encrypt(4)
generate a key:
100-digit(5)
500-digit(6)
1,000-digit(7)
10,000-digit(8)
1,000,000-digit(9)
'''))
if What_operation == 1:
text = input('What is your text you want to convert? ')
New_text = bin(int.from_bytes(text.encode(), 'big'))
key = int(input('What is your key you want to use?'))
cyphered_text = int(New_text[2:]) * key
print ('copy this text: ', cyphered_text)
if What_operation == 0:
try:
numbers = input('What is your string you want to convert? ')
key = int(input('What is your key? '))
New_text = '0b' + str(int(numbers) // key)
encoded = int(New_text,2)
decoded = encoded.to_bytes((encoded.bit_length() + 7) // 8,
'big').decode()
print ('Here is your message: ' + decoded)
except ValueError:
print('Your key or/and encrypted text are incorrect! ')
if What_operation == 4:
try:
text = input('What is your text you want to convert? ')
New_text = bin(int.from_bytes(text.encode(), 'big'))
key = int(randint_generator_nonreturn(1000))
key_2 = random.randint(1,4)
cyphered_text = New_text[2:]
hard_cyphered_text = ''
cyphered_text = int(cyphered_text) * key
for i in str(cyphered_text):
if key_2 == 1:
hard_cyphered_text = hard_cyphered_text + hard_encoding_1[i]
if key_2 == 2:
hard_cyphered_text = hard_cyphered_text + hard_encoding_2[i]
if key_2 == 3:
hard_cyphered_text = hard_cyphered_text + hard_encoding_3[i]
if key_2 == 4:
hard_cyphered_text = hard_cyphered_text + hard_encoding_4[i]
x_cyphered_text = str(hard_cyphered_text)
array0, array1, array2 = '', '', ''
count = 0
for i in x_cyphered_text:
if count % 3 == 0:
array0 += i
count += 1
count = 0
for i in x_cyphered_text:
if count % 3 == 1:
array1 += i
count += 1
count = 0
for i in x_cyphered_text:
if count % 3 == 2:
array2 += i
count += 1
array0_key, array1_key, array2_key = random.randint(1, 99999999),
random.randint(1, 99999999), random.randint(1, 99999999)
final_array0, final_array1, final_array2 = int(array0) * array0_key,
int(array1) * array1_key, int(array2) * array2_key
len_array0, len_array1, len_array2 = str(len(str(final_array0))),
str(len(str(final_array1))), str(len(str(final_array2)))
full_key = str(key) + str(key_2) + setnumber(len_array0, 6, str) +
setnumber(len_array1, 6, str) + setnumber(len_array2, 6, str) +
setnumber(array0_key, 8, str) + setnumber(array1_key, 8, str) +
setnumber(array2_key, 8, str)
complete_cyphered_text = str(final_array0) + str(final_array1) +
str(final_array2)
print('copy this text: ', complete_cyphered_text)
print('Copy your key: ', full_key)
except ValueError:
print('You aren\'t using ASCII or you copied a text with
paragraphs')
if What_operation == 3:
try:
numbers = input('What is your string you want to convert? ')
key = input('What is your given key? ')
key_2 = int(key[-43:-42])
array2_key, array1_key, array0_key = int(key[-8:]),
int(key[-16:-8]), int(key[-24:-16])
len_array2, len_array1, len_array0 = int(key[-30:-24]),
int(key[-36:-30]), int(key[-42:-36])
n0, n1, n2 = len_array0, len_array1, len_array2
crypt_array0, crypt_array1, crypt_array2 = numbers[:n0],
numbers[n0:n0 + n1], numbers[n0 + n1:]
array0, array1, array2 = (int(crypt_array0) // array0_key),
(int(crypt_array1) // array1_key), (int(crypt_array2) // array2_key)
numbers_noncrypt = ''.join(''.join(x) for x in
itertools.zip_longest(str(array0), str(array1), str(array2),
fillvalue=''))
key = int(str(key)[:-43])
encoded_text = ''
decoding = {}
if key_2 == 1:
decoding = {a: b for b, a in hard_encoding_1.items()}
if key_2 == 2:
decoding = {a: b for b, a in hard_encoding_2.items()}
if key_2 == 3:
decoding = {a: b for b, a in hard_encoding_3.items()}
if key_2 == 4:
decoding = {a: b for b, a in hard_encoding_4.items()}
for i in str(numbers_noncrypt):
encoded_text = encoded_text + decoding[i]
encoded_text = '0b' + str(int(encoded_text) // key)
encoded = int(encoded_text, 2)
if What_operation == 5:
print(randint_generator(100))
if What_operation == 6:
print(randint_generator(500))
if What_operation == 7:
print(randint_generator(1000))
if What_operation == 8:
print(randint_generator(10000))
if What_operation == 9:
print(randint_generator(1000000))
A:
I should start off by saying, as a standard disclaimer, that cryptography experts consistently recommend that the best way to implement a secure cipher is to let someone else do it! That's not to say don't have a go for a bit of fun or as a learning experience. (I decided to invent one myself back when I was 14 or so. It wasn't very good, but it was a good place to start.) I would just say that if you're using cryptography for real to run an online bank or something, then use a standard library implementation of a standard cipher.
Here's a few of the common pitfalls that everyone falls into if they're not university professor level experts.
Key generation has to be really random. Most ways that computers generate random numbers aren't very random. They just run some numbers through a complicated formula that is too chaotic for humans to track, but if you know just a little bit about what the formula started with you can predict the numbers it will produce with perfect accuracy. For example, this is what the python docs say about the inbuilt random module:
Python uses the Mersenne Twister as the core generator. It produces
53-bit precision floats and has a period of 2**19937-1. The underlying
implementation in C is both fast and threadsafe. The Mersenne Twister
is one of the most extensively tested random number generators in
existence. However, being completely deterministic, it is not suitable
for all purposes, and is completely unsuitable for cryptographic
purposes.
A secure encryption program should be secure against an enemy who plays dirty. There are tricks that someone who is trying to break a cipher can do. For example, if the computer starts to run out of RAM it will write some of the things it needs to remember to the hard disk. If the cipher program isn't careful, that might include the key. Then the bad guy can just read that bit of the hard disk for anything that looks like a key.
Other tricks include measuring how long a computer takes to encrypt something, or even leaving a microphone in the room with the computer and listening to the noises it makes as it works. This is because some algorithms take longer or make more noise when processing some bits of a key than others. Writing a cipher to be secure against a dirty fighting adversary involves thinking about exactly what a CPU does with each instruction. (I would go so far as to say that for this sort of level, it's impossible to write a completly secure cipher against this sort of attacker in Python, because Python lets you tell the computer what to do but not exactly how to do it.)
A secure encryption program should be secure even against someone who knows what some of your messages say, and uses that to help them work out the ones they don't know. You might think that's a silly requirement: they don't know what the message says because it's encrypted with the cipher! But this was actually really relevant in history, in the British codebreaking effort in the Second World War. The British knew that at a certain time the U-boat commanders would send a weather report to the rest of the navy (and the British could guess what the report said by checking the weather!) and they knew that the Nazis would sign off their messages with "Hail Hitler". They could use that to work out what other more important messages encrypted with the "unbreakable" Enigma machine said.
Anyway, like I said it's fine to have a go. This was just a quick primer to explain how hard it is to beat the best cryptanalysts (People who try to break ciphers).
Looking specifically at your code and your cipher
Your hard_encoding_x set up is a standard substitution cipher with, essentially, a fixed key. You should always assume in cryptography that the enemy knows everything about the system: basically assume they have your source code. The only thing you can assume they don't have is secret keys, which in this case is which of the four substitution tables you used. So, that does, hopefully, make it 4 times harder to decrypt, but not more than that. You could make things better by generating the tables as part of your key, but do note that frequency analysis is notoriously effective against substitution ciphers.
The more fundamental bit of your basic cipher is multiplying by a really huge random number. You're right that, all things being equal, bigger keys help security. And you do have a lot of possible keys! If I was a cryptanalyst trying to break your cipher, I would be looking for ways to avoid needing to check all the possible keys.
One thing that I might try is guessing what your message says. Suppose I know that you've sent a message that either says "attack" or "retreat", but I don't know which. With a good cipher, I can't tell even with the encrypted message, unless I have the key. That is because under some key, "attack" would give this encrypted message and under another key "retreat" would. However with multiplication, I have a way in. What I have to do is check whether the ciphertext is a multiple of the number representation of "attack" and whether it has a remainder when divided by the number representation of "defend".
It's a useful and fun skill whenever you make something that is meant to be safe, to immediately turn around and imagine you're the bad guy, who knows as much as you do about the system you just made, and work out ways it might still be attacked. (Although of course not seeing any ways doesn't mean they aren't there. But if you can see them, you can fix them!)
So, as a fun exercise, suppose that you can't possibly guess the message, but you get a dozen different messages all multiplied by the same key. What mathematical property of the dozen encryped messages would probably allow you to work out the key?
I will say that the process you go through to split up the message into thirds probably does frustrate simple attacks like this one. It's 2 A.M. here and my brain is not engaged enough to come up with exactly how I'd go about attacking that component of the cipher, but hopefully I've given you enough to think about.
Finally, you asked about how secure the cipher is, but while I'm here I might as well make a few suggestions about general coding style.
Firstly, using Python 3 is a big plus! An annoyingly large number of people still insist on using the old Python 2, and it's generally good to use the newest versions of technology if possible.
It would help to have a few more comments dotted around. In particular, all your lines if What_operation == ... should be followed by a comment to remind the reader what the number corresponds to. Likewise, it would be helpful to have comments explaining what your functions are meant to do and what your variables are meant to represent.
If you find yourself repeating yourself, look for ways to use arrays and loops. For example, instead of
array0_key, array1_key, array2_key = random.randint(1, 99999999), random.randint(1, 99999999), random.randint(1, 99999999)
You could have
array_keys=[]
for i in range(3):
array_keys[i] = random.randint(1, 99999999)
Oh, and as mentioned at the top, avoid Python's random if you want anything security related. Instead use the secrets module. Something like b = secrets.randbelow(10)
| |
What is Synergy of Serra?
The game
The cards
The crates
The special drops
The Fame
The economy
The roadmap
Ask Us Anything
Lore
The planet of Serra
The Council of the Six
The Factions of Serra
Natives
Mechs
Virtuals
Cyborgs
Transcendent
Faction 6
The flora and fauna
The Schism
Stories from Serra
A to Z
Support
Password & Login
Delete your account
Purchases
Wallets
Blockchain
About Us
Calystral
Armed conflicts
Partners
Social channels & contact
Powered By
GitBook
Transcendent
At least Cyborgs don’t tamper directly with their brains. Not in such ways as the Transcendents who enhanced and changed their biological brains with cybernetic implants and artificial intelligence. Letting them walk between the virtual and the physical world and utilizing more of their biological brain’s capacity. Some of them even developed telepathic powers, controlling the minds of other beings and telekinesis.
The Transcendent are very secretive and rather prefer to be alone. Their abilities make them awed and feared at the same time by the other factions. A group of the Transcendent started to believe in the
Source
, the code and patterns building the fabric of this very universe. They turned to the
Source
and formed a religion around it. The Virtuals were near to curing Serra of religions in this age of enlightenment and now this had to happen. | https://synergyofserra.gitbook.io/the-compendium-of-serra/the-factions-of-serra/transcendent |
If you’re sick with a sore throat, cough, and sinus congestion, eating anything is often farthest from your mind. While most of us suffer from mild to no appetite with the flu, it’s important to continue to eat (even tiny amounts) of food for energy and take liquids to remain hydrated. Eating and drinking when you have the flu is necessary in order to give your body the nutrients and energy needed to fight off infection. Water in particular, via teas and juices, is vital if you’re eating very little and particularly if you have a fever. Drinking fluids will keep the body hydrated, replace essential nutrients, and help you recovery more quickly.
If you have the flu, here are the best foods and drinks to help you recover:
- Oatmeal
There’s nothing more soothing than a warm bowl of oats with cinnamon, particularly when you’re under the weather. The flu calls for hot, soft, comforting meals and a warm bowl of oatmeal loaded with whole grains, antioxidants, fiber, and vitamin E will help increase your body’s energy and immune-fighting capabilities.
- Herbal teas
If you have the flu and are hardly eating, it’s easy to get dehydrated quickly, particularly if you have a fever and are losing essential fluids through sweat. So even if your appetite is gone, aim to replenish your vital fluids with some hydrating and soothing herbal teas. Try a cup of tummy settling ginger or licorice herbal tea, or sip some lemon or chamomile with lemon and honey to soothe a sore throat and break up sinus congestion.
- Electrolyte beverages
When it comes to fighting the flu, it’s important not to let your body get dehydrated. If you’re eating and drinking little, incorporate water, tea, and electrolyte beverages (i.e., pedialyte, kombucha, and sports drinks) into your healing regimen to deliver energy to help your body naturally fight off infection. Just beware of drinks and juices with a lot of added sugar.
- Yogurt
While yogurt isn’t a typical food associated with fighting the flu, consider that this fermented treat is loaded with healthy bacterial cultures that improve gut health and boost the immune system. Yogurt is also packed with protein and cool and gentle on a red, sore throat. Just beware of eating prepared yogurt blends with a ton of added fruit (and refined sugar).
- Plain broth
Often all you can get down when you have the flu is a little bit of vegetable, chicken, or beef broth. Plain broth is an excellent flu recovery aid as it helps prevent dehydration, delivers healthy nutrients for energy, eases sore throat pain, and helps break up congestion because it’s warm and steamy. Start with broth, and as you recover, try incorporating chicken soup for the added fiber, iron and protein from meat and vegetables.
- Garlic
Not only does it ward off vampires, garlic has long been used to slay the flu. Incorporating raw, cooked and garlic powder in comforting soups has been a century-old flu fighter. In fact, alternative practitioners have long prescribed garlic to patients at the earliest signs of infection to boost immunity and aid flu symptom recovery. | https://www.wethinkhealth.online/eat/the-best-foods-to-eat-when-youve-got-the-flu/ |
require 3 characters or more.
About information presented in this cross reference
The information presented in this cross reference is based on TOSHIBA's selection criteria and should be treated as a suggestion only. Please carefully review the latest versions of all relevant information on the TOSHIBA products, including without limitation data sheets and validate all operating parameters of the TOSHIBA products to ensure that the suggested TOSHIBA products are truly compatible with your design and application.
Please note that this cross reference is based on TOSHIBA's estimate of compatibility with other manufacturers' products, based on other manufacturers' published data, at the time the data was collected.
TOSHIBA is not responsible for any incorrect or incomplete information. Information is subject to change at any time without notice.
Company about
April. 11, 2013
Silicon Carbide Lineup Will Meet Demand for Industrial and Automotive Applications
IRVINE, Calif., – Toshiba America Electronic Components, Inc. (TAEC)*, a committed leader that collaborates with technology companies to create breakthrough designs, has announced that Toshiba Corporation has started volume production of silicon carbide (SiC) power devices, in anticipation of growing demand for industrial and automotive applications. Production is at Toshiba's Himeji Operations-Semiconductor in Hyogo Prefecture, Japan.
Toshiba will manufacture Schottky Barrier Diodes (SBDs) as the first of its new line-up of SiC products. The SBD is suited for applications that include power conditioners for photovoltaic power generation systems. SBDs can also act as replacements for silicon diodes in switching power supplies, where they are approximately 50 percent more efficient.
SiC power devices offer more stable operation than current silicon devices - even at high voltages and currents - as they significantly reduce heat dissipation during operation. They meet diverse industry needs for smaller, more effective communications devices and suit industrial applications ranging from servers to inverters and trains to automotive systems.
Analysts estimate that the SiC power device market will grow to about 10 times the current scale by 2020. Toshiba aims to secure 30 percent market share in 2020 by strengthening its product line-up, starting with the launch of the new SBD.
|Part number||TRS12E65C|
|VRRM||650V|
|IFM||12A|
|VF||1.7V max@I F =12A|
|IRRM||90uA max@ VRRM =650V|
|Timing of volume production||March 2013|
|Scale of production||1 million pieces|
Through proven commitment, lasting relationships and advanced, reliable electronic components, Toshiba enables its customers to create market-leading designs. Toshiba is the heartbeat within product breakthroughs from OEMs, ODMs, CMs, VARs, distributors and fabless chip companies worldwide. A committed electronic components leader, Toshiba designs and manufactures high-quality flash memory-based storage solutions, solid state drives (SSDs), hard disk drives (HDDs), discrete devices, advanced materials, medical tubes, custom SoCs/ASICs, imaging products, microcontrollers and wireless components that make possible today's leading smartphones, tablets, MP3 players, cameras, medical devices, automotive electronics, enterprise solutions and more.
Toshiba America Electronic Components, Inc. is an independent operating company owned by Toshiba America, Inc., a subsidiary of Toshiba Corporation, Japan's largest semiconductor manufacturer and the world's third largest semiconductor manufacturer (Gartner, 2011 Worldwide Semiconductor Revenue, March, 2012). Toshiba Corporation was founded in 1875 and today has over 554 subsidiaries and affiliates, with 210,000 employees worldwide. Visit Toshiba's web site at www.toshiba.co.jp/index.htm.
Information in this press release, including product pricing and specifications, content of services and contact information, is current and believed to be accurate on the date of the announcement, but is subject to change without prior notice. Technical and application information contained here is subject to the most recent applicable Toshiba product specifications. | https://toshiba.semicon-storage.com/us/company/news/2013/04/powr_13_673.html |
Jump to navigation
Engagement between the U.S.S. 'Constitution' and H.M.S. 'Guerriere'.
Garneray, Louis, 1783-1857
1939.597
after 1816
Watercolor, black ink, gouache, and graphite on paper, laid on board.
Drawings (visual works)
Watercolors (paintings)
6 1/8 x 8 5/8 in. (15.6 x 21.9 cm)
Gift of Mrs. James Barnes.
This digital image may be used for educational or scholarly purposes without restriction. Commercial and other uses of the item are prohibited without prior written permission from the New-York Historical Society. Please visit the New-York Historical Society's Rights and Reproductions Department web page at http://www.nyhistory.org/about/rights-reproductions for more information. | https://digitalcollections.nyhistory.org/islandora/object/nyhs%3A3458 |
As the Arctic Ocean sea ice rapidly diminishes, threatening the habitat and lives of polar bears and their prey, a group of researchers are arguing we may need to consider a large-scale supplemental feeding program to save polar bears from extinction.
The researchers published their proposal recently in the Conservation Letters journal.
Andrew Derocher, professor of biology at the University of Alberta and a long-time polar bear researcher, says there are 19 separate populations of polar bears in Arctic, but each one is experiencing different problems.
"Some of the populations are definitely undergoing stress with climate changes where the sea ice melts away, particularly those bears that live in the Hudson Bay system in Canada, but also the bears off of Alaska in the southern Beaufort Sea population," he said. "Other populations are quite secure and will continue to be so for quite some number of years into the future."
Polar bears need the Arctic ice for their survival because they live on and travel across the ice, undertaking long migrations each year to hunt Ring seals and Bearded seals, which can only be found where sea ice exists, Derocher said.
As the climate warms, drastic changes to Arctic sea ice diminishing the bears' habitat.
"We expect them to continue to lose their habitat in the south. They’ll persist for some longer period of time at very high latitudes, but of course it’ll be a much-diminished number of bears than we have today," he said.
A study by the U.S. Fish and Wildlife Service estimated that the world will lose two-thirds of the global population of polar bears by midcentury.
In the paper, Derocher and his colleagues outline a potential solution for saving the polar bears — by rehabilitating the starving bears through supplemental feeding and then reintroducing them to the wild.
"To put it into perspective, we feed other species to keep them alive as well. So if you go into a European context, their equivalent of our Grizzly bear, the Brown bear, there are populations that are fed all the time to keep a viable population in an area — and to keep them away from humans as well," he said. "So it's not unheard of and you can see the hand of humans in conservation of many species."
Because the polar bear's prey is also endangered, Derocher says, conservationists are looking at alternative food sources, like a polar bear chow, similar to what would be fed to a polar bear in the zoo.
"In some places down the road, we may be looking at what we would call a semi-wild bear park model," he said. "What we would hope is that we wouldn't have to support the bears fully ... but this would be sort of a means of keeping the population more viable."
The challenge the polar bears are facing is greater than many other species because sea ice is diminishing at an alarming rate, Derocher said.
"The whole field of conservation biology hinges on the idea that you have the habitat of the species in place, so that you can actually keep them alive in the wild," he said. "What we’re hoping is we're going to hold onto some bears at very high latitudes in the Canadian Arctic and probably in Northern Greenland and that that might be the sort of nucleus of an expansion of a population perhaps hundreds or thousands of years from now."
Derocher says humans also need to deal with their own overpopulation and excessive use of fossil fuels.
"Until we can deal with those two issues, the future for polar bears is definitely going to be challenging. But it's not just polar bears. It’s going to be so many other species and ecosystems that are going to be pressed so hard by climate change. At the end of the day, the climate’s warming, polar bears are going to be one of the clear victims of it," he said. | https://theworld.org/stories/2013-02-21/researchers-suggest-supplemental-feeding-potential-solution-save-polar-bears |
Global carbon pollution continues to rise, but not as fast as previous years - study shows
•
Source:
Associated Press
The world continues to increase the amount of heat-trapping carbon dioxide it pumps into the air, but it’s not rising as fast as in the previous couple years.
Emissions (file).
Source: istock.com
Led by big jumps from China and India, the world is projected to spew 36.8 billion metric tons of carbon dioxide into the air in 2019.
That's up nearly 231 million metric tons from 2018, according to two scientific studies released today.
The studies by Global Carbon Project, a group of international scientists who track emissions, show a 0.6 per cent increase from last year.
In previous years, global carbon dioxide emissions grew by 2.1 per cent and 1.5 per cent after a few years in the mid 2010s when global emissions barely rose, according to the studies in Environmental Research Letters.
Carbon dioxide from the burning of coal, oil and gas has caused 1 degree of warming since pre-industrial times and world leaders are meeting in Madrid to try to limit warming to another 1.8 degrees from now.
“Emissions grew more slowly than last year but we still set a global record. It’s hard to be upbeat about that,” said study co-author Rob Jackson, a Stanford University climate scientist.
“The U.S. National Academy of Sciences sounded the alarm on carbon and climate 40 years ago. Since then, global carbon dioxide emissions have doubled, and the world is hurtling towards catastrophic climate change.”
The 2019 estimate is based on data through the first nine to ten months of the year, with a few national estimates based only on six months of data, said co-author Glen Peters, a climate scientist in Norway. Past projections have proven pretty accurate, he said.
That means every second this year people put 1.16 million kilograms of carbon dioxide in Earth’s atmosphere. That's the equivalent weight of two Airbus A380s, the world's largest passenger airliner, going into the air every second.
Both the United States and the European Union saw emissions drop 1.7 per cent from 2018 to 2019, but China saw a 2.6 per cent increase and India had a 1.8 per cent rise. China is by far the biggest carbon polluter, with 28 per cent of the 2019 emissions. The United States is No. 2 at 14.5 per cent.
“Generally, I think this is bad news. Not terrible news, but bad news,” said Cornell University climate scientist Natalie Mahowald, who wasn’t part of the report. “A stronger switch from coal to solar or wind needs to happen to reach low climate targets.”
Led by 10 per cent drops in both the United States and Europe, carbon pollution from coal dropped worldwide nearly 1 per cent but increased 2.6 per cent from cleaner natural gas, according to the studies.
Coal still is the No. 1 source of man-made carbon pollution putting 14.6 billion metric tons of carbon dioxide in the air this year, followed by oil and then gas.
Coal generally emits 76 per cent more carbon dioxide than natural gas to produce the same amount of energy, according to the U.S. Energy Information Administration.
“I don’t think we have completely seen the end of coal yet, but it is certainly in the death throes,” Peters said. “Though, I would imagine a slow and protracted decline of coal because of the young infrastructure in Asia.”
But with coal dropping or even just plateauing, it is now apparent that the world is not quite on the worst-case scenario carbon emissions path of the four charted by the UN’s Intergovernmental Panel on Climate Change, Peters said. But the next two highest emission scenarios, which the world is closer to, are not “pleasant worlds to live in,” he said.
Princeton University climate scientist Michael Oppenheimer, who wasn’t part of the study, called the numbers grim: “Stepping back and looking at 30 years of data, there is nothing at all that reveals any reason to be optimistic that the world is about to turn the corner on reducing carbon dioxide emissions.”
The United States, which is in the early part of a year-long process of pulling out of the 2015 Paris climate agreement, has reduced its carbon dioxide pollution by 9.7 per cent between 2000 and 2018, Jackson calculated.
Critics of the Paris agreement said the U.S. is the world leader in reducing emissions, but Jackson’s numbers show 11 other nations have had bigger percentage cutbacks this century.
From 2000 to 2018, the United Kingdom has cut its carbon pollution by about one-third, Greece and Italy cut their emissions by more than 28 per cent. At the same time, China’s carbon pollution has tripled and India’s has increased by 157 per cent.
“The numbers show that the U.S. is not leading in terms of overall emissions reductions and this proves that we could be doing better,” said University of Michigan environment dean Jonathan Overpeck.
“This highlights that more, not less, U.S. international leadership is urgently needed. I’m still hopeful we can turn this all around... If we don’t, the planet is cooked.” | |
More than 575 competitors from 37 countries made the trip to Las Vegas this weekend in an attempt to make it into Rubik’s Cube history at this years Rubik’s Cube World Championship. The three-day event took place at the Riviera Hotel & Casino where some of the world’s best Rubik’s Cube solvers competed in more than 15 classic and non-traditional official cubing events.
After three straight days of competition, Feliks Zemdegs of Australia won with the fastest average time for solving the classic 3×3 Rubik’s Cube in 8.18 seconds. The bi-annual World Rubik’s Cube Championship is comprised of 17 official events, with the culmination being the crowning of the 3×3 Rubik’s Cube champion.
Out of town Rubik’s Cube enthusiasts were able to follow the competition from start to finish via live updates on the Rubik’s Cube Facebook, Twitter, and Instagram pages using #RubiksWorldChamps. | https://toybook.com/rubiks-cube-enthusiasts-compete-for-world-championship/ |
The FL variables calculated based on the Bowman findings and, growth of the companies is represented by total assets, profit, and sales these are calculate. Multiple discriminant https://www.bookstime.com/ function was constructed to ascertain study FS variable. The overall results of the study find FL in the Sri Lankan context to be positively related to the growth and FS.
Times interest earned , also known as a fixed-charge coverage ratio, is a variation of the interest coverage ratio. This leverage ratio attempts to highlight cash flow relative to interest owed on long-term liabilities. This means they restrict how much money a bank can lend relative to how much capital the bank devotes to its own assets. The level of capital is important because banks can “write down” the capital portion of their assets if total asset values drop. Assets financed by debt cannot be written down because the bank’s bondholders and depositors are owed those funds.
It’s a good idea to measure a firm’s leverage ratios against past performance and with companies operating in the same industry to better understand the data. Fedex has a D/E ratio of 1.78, so there is cause for concern where UPS is concerned.
To compensate for this, three separate regulatory bodies, the FDIC, theFederal Reserve, and theComptroller of the Currency, review and restrict the leverage ratios for American banks. There are several different ratios that may be categorized as a leverage ratio, but the main factors considered are debt, equity, assets, and interest expenses. In this reading, we have reviewed the fundamentals of business risk, financial risk, and measures of leverage. Examples of financial leverage usage include using debt to buy a house, borrowing money from the bank to start a store and bonds issued by companies.
The Federal Reserve created guidelines for bank holding companies, although these restrictions vary depending on the rating assigned to the bank. In general, banks that experience rapid growth or face operational or financial difficulties are required to maintain higher leverage ratios. However, if a company’s operations can generate a higher rate of return than the interest rate on its loans, then the debt may help to fuel growth. A reluctance or inability to borrow may be a sign that operating margins are tight. Interest on debt is tax-deductible, making debt a low-cost source of capital.
The Most Crucial Financial Ratios For Penny Stocks
They may have to pay higher interest rates on loans because their risk is greater. Financial leverage is a useful tool for companies that are profitable and can predict their income streams. Sue uses $500,000 of her cash and borrows $1,000,000 to purchase 120 acres of land having a total cost of $1,500,000.
The Degree of Financial leverage, or in short DFL, is calculated with a different formula from the one that is commonly used for the calculation of leverage value of an organization. Business OperationsBusiness operations refer to all those activities that the employees undertake within an organizational setup daily to produce goods and services for accomplishing the company’s goals like profit generation. This is because higher leverage means more borrowing, as well as more interest commitments. This raises the chances of failure to honor the interest commitments. And, if the conditions aren’t favorable, it may even result in bankruptcy. Now, here we see that the ROI is more than the interest rate charged by the lender, i.e., 12%. This is the reason behind the higher EPS as well as ROE in the case of a levered firm.
Advantages Of Financial Leverage
It’s magnitude is determined by the ratio of variable cost per unit to price per unit, rather than by the relative size of fixed costs. In a business, debt is acquired not only on the grounds of ‘need for capital’ but also taken to enlarge the profits accruing to the shareholders. An introduction of debt in the capital structure will not have an impact on the sales, operating profits, etc. But it will increase the share of profit of the equity shareholders, the ROE % . This ratio indicates that the higher the degree of financial leverage, the more volatile earnings will be. Since interest is usually a fixed expense, leverage magnifies returns and EPS.
Degree Of Financial Leverage FormulaThe degree of financial leverage formula computes the change in net income caused by a change in the company’s earnings before interest and taxes. It aids in determining how sensitive the company’s profit is to changes in capital structure. While leverage magnifies profits when the returns from the asset more than offset the costs of borrowing, leverage may also magnify losses. A corporation that borrows too much money might face bankruptcy or default during a business downturn, while a less-leveraged corporation might survive. An investor who buys a stock on 50% margin will lose 40% if the stock declines 20%.; also in this case the involved subject might be unable to refund the incurred significant total loss. High operating leverage is common in capital-intensive firms such as manufacturing firms since they require a huge number of machines to manufacture their products.
- This can result in volatile earnings as a result of the additional interest expense.
- Financial leverage is also known as leverage, trading on equity, investment leverage, and operating leverage.
- However, you must pay back debt and make periodic interest payments.
- To compensate for this, three separate regulatory bodies, the FDIC, theFederal Reserve, and theComptroller of the Currency, review and restrict the leverage ratios for American banks.
- Leverage can thus multiply returns, although it can also magnify losses if returns turn out to be negative.
- Financial leverage is the name given to the impact on returns of a change in the extent to which the firm’s assets are financed with borrowed money.
However, keep in mind that in addition to gains, the leverage also accelerates potential losses. Therefore, we recommend beginner traders to handle the leverage carefully, as its reckless use can very quickly lead to an empty trading account.
The Interest Coverage Ratio
The content on this website is subject to change at any time without notice, and is provided for the sole purpose of assisting traders to make independent investment decisions. A company which offers services connected to trading on financial markets to its clients. Its role is sending trade orders placed by clients into the market for execution.
Most of the scholars have studied of FL and its related attributes in developed and emerging capital market. The pioneering work of and many scholars [4,10,11,18,21–26] revealed that the FL is one of the most influencing factors in determining the FG. The common approach in empirical capital structure studies has been to examine the relationship between observed FL and value of the firm and share prices. The main problem of this study is to investigate whether the FL influences negatively or positively on signaling the firms’ growth. The required data were collected from published annual reports, Handbook of listed companies in CSE and annual reports of Central Bank of Sri Lanka from 2000 to 2009.
Net Leverage Ratio
Second, ownership types are not taken into account in this study. If, however, you are able to borrow enough money that you can invest $100,000 dollars in your chosen stock, then the expected 10% increase will yield a more significant amount, $10,000. And you are very certain that the stock you’ve picked will go up by 10%. With your measly $100, a 10% increase will give you only ten bucks of profit. Financial debt can be complex with stringent regulations and affirmative/negative covenants . Orion and other film studios needed level-headed projections about projects before jumping in with both feet. They needed reasonable budgets with spending caps per movie and an honest appreciation of the overwhelming odds against producing a hit in Hollywood.
In addition, the interest rate is usually lower than the rates of return demanded by investors in shares. Borrowing at a lower interest rate and investing the proceeds at a higher interest rate is a form of financial leverage. In the spring of 2007 about the dangers of excessive financial leverage. Option B allows Joe to use $100,000 of his own money and borrow an additional $650,000 from the bank in order to purchase a much bigger building. If Joe borrows from the bank, he will also have to pay 5% interest on the loan. Due to the interest expense, EBT is lower for L in comparison with U and therefore, the ratio EBIT/EBT is greater.
Perhaps the most well known financial leverage ratio is the debt-to-equity ratio. If ROI is equal to the cost of debt financing, it is not advisable to borrow funds because the company may not be able to generate surplus earnings by debt financing. Based on calculations like those shown above, the finance manager can make appropriate decisions by comparing the cost of debt financing to the average return on investment. If you’re looking to secure funding or just want a better understanding of how your business might fare going forward, it’s important you have a grasp on your leverage ratios. These figures can be very telling into your company’s health, potential, and ability to deliver on its financial obligations.
Nestle Financial Leverage Example
He is a CFA charterholder as well as holding FINRA Series 7, 55 & 63 licenses. He currently researches and teaches economic sociology and the social studies of finance at the Hebrew University in Jerusalem. Calculate and interpret the operating breakeven quantity of sales. It is a trading instrument; its value is derived from its underlying instrument, which can be for example a stock index or a future contract. Settlement of this instrument type is always performed financially, therefore the client speculates on future value difference of the underlying instrument while he/she does not become the owner of it. This is because there may not be enough sales revenue to cover the interest payments. First, this study focuses on only listed manufacturing firms in China.
Financial leverage can be used to analyze a company’s capital structure and its reliance on financial debt financing compared to equity financing. A ratio of one indicates a company has been financing with equal amounts of financial debt and common equity, while a ratio less than one means a company has financed itself with more common equity . Owners’ return rises by 9.33 percent as a result of the financial leverage obtained by 70 percent debt financing at a cost of 8 percent. If borrowing rose above 70 percent, this figure would rise, that is, financial leverage would be greater. If financial leverage is measured, instead, as an index number, an additional calculation is necessary to determine what return on equity it produces. It is mostly used to boost the returns on equity capital of a company, especially when the business is unable to increase its operating efficiency and returns on total investment. Because earning on borrowing is higher than interest payable on debt, the company’s total earnings will increase, ultimately boosting the earnings of stockholders.
Leverage Finance
While a business with high financial leverage may be considered risky, using financial leverage also offers benefits, such as a higher return on investment . FInancial leverage can also appeal to stockholders who may see an increase in their initial investment as well.
- When lending out money to companies, financial providers assess the firm’s level of financial leverage.
- The fixed financial charges do not vary with the operating profit.
- If at the maximum possible level of output fixed costs are a large percent of total costs, price per unit will have to be high relative to variable cost per unit in order for the business to be able to earn a profit.
- There are several ratios that measure the financial leverage, such as the Debt ratio, Debt to equity ratio, Coverage ratios, etc.
- Second, interest expense is tax deductible in many tax jurisdictions, which reduces the net cost of debt to the borrower.
We are not a law firm, do not provide any legal services, legal advice or “lawyer referral services” and do not provide or participate in any legal representation. It provides a variety of financing sources by which the firm can achieve its target earnings. We’re firm believers in the Golden Rule, which is why editorial opinions are ours alone and have not been previously reviewed, approved, or endorsed by included advertisers. Editorial content from The Ascent is separate from The Motley Fool editorial content and is created by a different analyst team.
If your current accounting software application needs a boost, or you’re looking for more comprehensive reporting options, be sure to check out The Ascent’s accounting software reviews and find a product that works for you. Hypothetically, let’s say that the value of both buildings has increased by around 12%, with the smaller building selling for $280,000 and the larger building selling for $850,000. Joe has begun to look at purchasing a larger manufacturing facility, and currently has two options available. Option A allows Joe to purchase a new building that is slightly larger than his current facility, using cash in the amount of $250,000. Many or all of the products here are from our partners that pay us a commission. But our editorial integrity ensures our experts’ opinions aren’t influenced by compensation. Therefore we can conclude that the increase in a Leverage ratio of Marriott was a result of Higher Debt.
This allows the company to use debt to finance assets acquisitions. Financial leverage is defined as the ability of a firm to use fixed financial charges to magnify the effect of change in E.B.I.T on the firm’s earning per share. The financial leverage occurs when a firm’s Capital Structure contain obligation of fixed financial charges. For instance, interest on debentures, dividend on preference share etc., along with owner’s equity to enhance earning of equity shareholder’s. The fixed financial charges do not vary with the operating profit.
Exploration costs are typically found in the financial statements as exploration, abandonment, and dry hole costs. Other noncash expenses that should be added back in are impairments, accretion of asset retirement obligations, and deferred taxes. Finally, the consumer leverage ratio refers to the level of consumer debt compared to disposable income and is used in economic analysis and by policymakers. One of the main mechanisms of online trading is financial leverage. Leverage is the ratio of the amount of capital that a trader invests in an account against funds provided by the broker.
Bottom LineThe bottom line refers to the net earnings or profit a company generates from its business operations in a particular accounting period that appears at the end of the income statement. A company adopts strategies to reduce costs or raise income to improve its bottom line. Financial leverage means the presence of debt in the capital structure of a firm. In other words, it is the existence of fixed-charge bearing capital, which may include preference shares along with debentures, term loans, etc. The objective of introducing leverage to the capital is to achieve the maximization of the wealth of the shareholder.
Why Marriott International Financial Leverage Increased Drastically?
National regulators began imposing formal capital requirements in the 1980s, and by 1988 most large multinational banks were held to the Basel I standard. Basel I categorized assets into five risk buckets, and mandated minimum capital requirements for each. If a bank is required to hold 8% capital against an asset, that is the same as an accounting leverage limit of 1/.08 or 12.5 to 1. Assets are $200, liabilities are $100 so accounting leverage is 2 to 1.
The Risks Of Having An Excessive Amount Of Financial Leverage In An Organization
On one hand, it increases the earning per share and on the other hand it increases the financial risks. The finance manager is required to trade-off between risk and return for determining the appropriate amount of debt. The financial leverage employed by a company is intended to earn more on the fixed charges funds than their costs. | https://www.rajiasacademy.com/a-guide-to-financial-leverage/ |
Gary Griggs, Our Ocean Backyard | Stack attack incidents continue to climb
The size of container ships and the number of containers they can carry has increased with the expansion of our global exports and imports, with about 5-6 million of these steel boxes crossing the sea on ships at any one time.
As ships have become larger and containers have been stacked higher to carry more cargo, the risks of what have become known as stack attacks has increased. This refers to the collapse or failure of a large stack of containers under rough sea conditions. Because the containers are stacked as high as multistory buildings, the pressure on the pile of containers from the ship rolling from side to side in large waves can exceed the stability of the stack and the cabling that is holding them to the ship.
As the world becomes increasingly globalized, demand for shipping will continue to increase. Ocean shipping is still the preferred method of transport and as a result, we are likely to see increasingly larger cargo ships being designed and introduced. Today, the largest cargo ship can transport more than 21,000 TEU (20-foot equivalent) shipping containers, and Orient Overseas Container Line Hong Kong – the company that currently owns the largest cargo ship in the world – is looking to build even larger ones.
There is some uncertainty about just how many containers are lost at sea each year. While the World Shipping Council reported that from 2008 and 2019 there were 1,382 containers lost at sea each year or an average of four every day, another source says from 2,000 and 10,000 containers fall off each year, a big discrepancy. These can float at or just below the surface for hours, or in one documented case, 15 months as a lost container floated completely across the Atlantic from the Caribbean to Spain.
These lost containers have been labeled, UFOs, or Unidentified Floating Objects, and present significant hazards to smaller vessels, especially sailboats. The 2013 movie, “All is Lost” with Robert Redford, is a film about his sailboat colliding with a partially submerged container in the Indian Ocean.
Maritime insurance executives reported that about 3,000 containers were lost at sea in the period from late November 2020 to early January 2021. A cargo ship operated by A.P. Moller-Maersk A/S lost several hundred containers in the Pacific Ocean while sailing through heavy seas from China to Los Angeles, the latest in a spate of incidents in which boxes carrying millions of dollars worth of goods have gone overboard. The company said the Maersk Essen, which has a capacity for more than 13,000 containers, lost an estimated 750 of them on Jan. 16, of this year, about halfway through its trans-Pacific sailing from China’s Port of Xiamen.
The loss of containers from the Maersk Eindhoven bought the number of reported cases of serious stack attacks since just Nov. 30, 2020 to six. In early February this year, the One Apus container vessel, operated by Singapore-based Ocean Network Express, lost about 2,000 boxes in November when it hit a storm off Hawaii on its way to Long Beach from Yantian, China. The ship eventually sailed to Kobe, Japan, with hundreds of tipped-over containers sitting precariously onboard and remains there for repairs and an investigation into the cause of the incident.
Earlier this year, 76 containers fell off a vessel operated by Israel’s ZIM Integrated Shipping Services Ltd. en route from South Korea to North America. On Dec. 31, 2020, a containership managed by Taiwan’s Evergreen Marine Corp. Ltd. lost around 40 containers off the coast of Japan while heading across the Pacific. Engineers involved in the probes say they are looking into typical causes such as failures in lashing systems that hold containers together.
The ultimate resting places of the many thousands of metal shipping containers that have fallen overboard in stack attacks is little known. In February 2004, the cargo vessel Med Taipei was heading south along the California coast when severe seas and winds led to 24 containers going overboard, 15 within the Monterey Bay National Marine Sanctuary. Not long afterward, scientists at the Monterey Bay Aquarium Research Institute (MBARI) came across one of these in an ROV dive and then returned in 2011 to collect extensive video footage.
They were surprised how little the container had corroded in the seven years on the seafloor, likely due to the near-freezing temperature and low oxygen content of the water. The container had also acted as a rock outcrop and was now covered with animals such as scallops, tubeworms, snails, and tunicates, animals that were not found in the surrounding mud as they need a hard surface to attach to. Based on MBARI scientist observations it appears that it may take hundreds of years for these containers to fully degrade. Interestingly, from cargo records, they discovered that the container was full of automobile tires.
Source: Santacruzsentinel
Are you looking for Shipping Containers for Hire or Shipping containers for Sale?
ABC Container Hire & Sales is Australia’s one of the leading shipping container company. We are a 100% Australian-owned company. We have been selling and renting new and used premium quality shipping containers to satisfied customers all over greater Sydney since 2002. We can easily arrange one for you too, that is suitable based on your requirement.
Please give us a CALL (07) 4630 7666. Our team will be delighted to assist your shipping containers needs. | https://abccontainerhiresales.com.au/gary-griggs-our-ocean-backyard-stack-attack-incidents-continue-to-climb/ |
It has been a week. A week since we spent all day standing next to this fence with hundreds of other people shouting and cheering and snapping photos.
The Volcom youth surfing competition at The Lane in Santa Cruz, California.
Leaving town before 5 a.m., traveling down Hwy 101 along the coast was amazing. The Pacific Ocean to our left and beautiful mountains to the right. Cute tiny little towns nestled between twisting highway every 20-30 miles along the way. We had to stop often to scope out future surf sites. I lost my photos – they got downloaded and erased on accident to another computer. But it was – Glorious. We got to stop in Eureka and surprise my brother and sister in law, a completely last minute decision. They too live right on the water so lunch was fun! We continued on to San Francisco, looping a bit in the dark for the kids to see the bridge and a bit of Lombard Street. Then it was all systems go to Santa Cruz. We headed straight out to The Lane – and listened to the surf, trying to see the swells come in. On to the Motel checking in a little after 10 p.m. 4 Surf Team members and 3 coaches in the van, 16 hours of surfing videos, and tons of laughter and the occasional cheese bit fight.
In the morning, it was back to the Lane where we joined up with 3 more coaches and another Surf Team Member. They had drove through the night after work and jumped in the water around 7 a.m. Crazy! After looking at the swells, they hurried to suit up/gear up and jump in!
The waves here are vastly different. The swells, on this day, are very long and really far apart. You could have over 20 people in line waiting to get on the next swell. Several catching it. People were in much thinner gear than our 5/4. Hoodies were optional. It was a photographer’s paradise. I think I went through about 600 on Friday.
Our team paddling out.Jon is the outside in a hoodie.
Saturday morning, the boys had the van re-loaded and breakfast made by 5:40 in the morning. We were told to be out at 6 a.m. or risk not getting a spot on the line up. At 7 a.m. Volcom started asking for registration forms and it was frenzy of
soccer surf mom’s shoving papers at them. Our Team all got a slot. Jon was in the first heat of the day with the Groms, ages 11-13. He was pretty nervous.
Chatting with the other moms in the wee hours of the morning made me feel really uncomfortable. This competition is one of the last of the season, and many of them travel from spot to spot participating in them all. Many carried on about how their ‘pro surfing son’ was expecting to place and move on to the Nationals. We met the dad of a kid who was “First in the State of California for Squids” (Squids is 10 and under) and he was participating. Was there any kids there just to participate and have a great time?
That’s when I met Heather – another mom of ‘just a surf crazy kid’ who wanted to participate. She had a Squid. We kept each other company and kept each other mostly sane throughout the morning.
Wait for your time,
Climb down the stairs and out over the rip rap,
Paddle out to the swells,
Take a couple of fun waves,
Try to forget how many people are watching,
Then climb back up. 15 minutes. And it’s over. (Jon in Blue)
Spend the rest of the day meeting the coolest surfers ever, like Big Wave Surfing Champion Darryl “Flea” Virostiko . He had a great time chatting it up with the other groms as well.
Many hours were spent on this cliff watching the other heats. (Jon in red)
They sent out a video shout out to the competition in Hawaii –
We tourist-ed a bit.
And surfed until dark Friday and Saturday.
I got to see the joy and passion of that lil guy on the left there. Un inhibited. Surrounded by so many who live the life of pro surfing. For Jon – he’s been surfing seriously since June. A couple of lessons the summer before. He came in 2nd in Beginners at Otter Rock in June, and 3rd in Groms at the Longboard Competition –but those were nothing like we saw this weekend. These kids were wild. We’ve never had to share waves, so we were not used to the line up rules at all. In the ocean by ourselves – our kids rip it. By Sunday – they were really getting the hang of it. We surfed until 3 in the afternoon – and then drove straight up I-5.
This past 6 months, I have spent a bit of time talking to Jon. Talking him down with his surf excitement. Trying to find the line between passion and humility. After being around this crowd, I realized he could have passion and humility – but that joy and enthusiasm were not bad things. He’s already been out to swim train twice this week. Talked to everyone in town about the trip. Walked miles on the beach pointing out lefts and rights and beach breaks. Even went out this morning and met a few Big Wave Surfers on the beach while they checked out the waves.
Yep. I think you’ll be hearing a lot more about our surfing adventures. This lil grom is going to impress your socks off this summer! | https://pebblekeeper.com/2013/02/09/santa-cruz-volcom-youth-competition/?shared=email&msg=fail |
The Mysterious Case of the Ghost Serial Killer
It’s not unusual for a serial killer to remain on the loose for a while, but one specific case that I’m about to discuss baffled experts for many years and the conclusion was surprising to say the least.
For 16 long years, authorities were convinced that a serial killer was on the loose somewhere in Germany. This individual, who authorities nicknamed the “ghost of Heilbronn”, left DNA on evidence from numerous crime scenes.
This ghost serial killer’s journey began back in 1993 when a 62-year-old woman named Lieselotte Schlenger was found strangled in her Idar-Oberstein home. The mysterious DNA appeared in a cup of tea. The only thing the DNA revealed was that it belonged to a woman (but not the victim).
The same DNA appeared again in 2001 at the scene of where a 61-year-old man was strangled to death in his Freiburg home. The DNA was found in a kitchen drawer near the deceased individual’s body. Since the two murders were similar in nature and they occurred less than 300 kilometers apart (186 miles), it seemed as though a serial killer was on the loose.
The DNA appeared again just five months later in a heroin syringe found on a playground in Gerolstein. Was the serial killer also a drug addict? It reappeared in a stolen caravan in Bad Kreuznach and then at a bar that was robbed in Karlsruhe. Wow, that’s one busy criminal. Then in 2005, a man fatally shot his brother in Worms but the mysterious female DNA showed up on the bullet. Did the man have an accomplice?
The crimes didn’t finish in Germany as the unknown DNA appeared at several different crime scenes (armed robberies, car thefts and murders) in France and Austria. Interestingly, none of the accused ever implicated a female in their crimes.
The last crime committed by the ghostly serial killer occurred in Heilbronn in 2007 when two strangers entered a police car and shot both officers who were sitting in the front seats. One officer died while the other was injured. The mysterious DNA was found on the backseat of the patrol car.
Police had enough and offered a monetary reward to whoever could identify the mysterious serial killer. Hundreds of women in Germany, France, Italy, and Belgium were swabbed for their DNA but none of them matched the “ghost of Heilbronn”.
The mystery was finally solved in 2009 and it was something that surprised everyone. When French authorities found the charred remains of a body who they believed was a man seeking asylum back in 2002, they analyzed his fingerprints which revealed the mysterious female DNA. At that point, they realized that perhaps it wasn’t a serial killer but accidental police contamination.
They eventually confirmed that the DNA did in fact belong to a woman who was working at a medical supply company in the packaging chain. It was the same company that supplied materials to the police labs that performed studies on the evidence found at the crime scenes.
It was concluded that the “ghost of Heilbronn” serial killer never committed numerous crimes or even existed.
Jocelyne LeBlanc works full time as a writer and is also an author with two books currently published. She has written articles for several online websites, and had an article published in a Canadian magazine on the most haunted locations in Atlantic Canada. She has a fascination with the paranormal and ghost stories, especially those that included haunted houses. In her spare time, she loves reading, watching movies, making crafts, and watching hockey. | |
The aim of our Student Council is to ensure that all of our students have a voice and are able to positively contribute to shaping our whole school ethos and community. Therefore every student is given the opportunity to take part and vote in the Student Council. It is important that all students feel they have a way of expressing their wishes or points of view in a safe and friendly environment; with the view of making every experience for each student the best it can possibly be.
The Student Council is inclusive and proactive and being a member can help to improve a wide variety of skills including: teamwork, communication, presenting, decision making, time management, organisation, leadership, providing support and guidance, understanding varying viewpoints, debating and much more!
Since September 2014, the Student Council has already contributed to the following projects:
- Shaping the school ethos
- School dinners
- Valentines Roses
- Lockers
- Playground equipment
- Pupil voice surveys
- Comic Relief
- School visitors' tours
- Charity Bake Sales
- End of term school disco
- Open evening assistance
- Lunchtime revision club
- Children in Need
- School events
We look forward to many more exciting projects over the next few months! If you wish to contact any members of the council for further information or suggestions, please use the email address: [email protected]
This is what our Executive Council members have said in previous years:
Nasua (Chairperson): “We can make positive contributions to what's going on in school we can join together and make changes based on student voice. The Student Council is a really good opportunity for the school as most students’ ideas are usually considered. If you have an idea for school development, the Student Council are the best people to come to because they listen to your ideas and try their best to follow them through.”
Hadden (Vice Chairperson): “The Student Council is great because it is a chance for students to make decisions – they can tell the Student Council reps and this will then be discussed in our meetings. It helps us all to work together, communicate and rely on each other.”
Gabby (Publicity Officer): "I wanted to be on the school council because I felt that since we were the first two year groups to come to this school, a student voice needed to be heard. I think the Student Council gives students a voice to help develop our school and keeps everyone informed about what’s happening."
Thomas (Events Officer): “It is important to have a responsibility and be independent. We can arrange events and it is nice that we can organise projects ourselves. It has helped me with public speaking in assembly and you can be creative and outgoing with ideas.”
January 2021
|M||T||W||T||F||WE|
|1||2|
|4||5||6||7||8||9|
|11||12||13||14||15||16|
|18||19||20||21||22||23|
|25||26||27||28||29||30|
Latest News
- Reverse Advent Calendars
Our students have been giving back this Christmas (Whole School - 10/12/2020)
- Incredible art work!
Talented Y8 (Whole School - 01/12/2020)
- Year 13 develop their painting skills! | https://www.nottinghamfreeschool.co.uk/page.php?d=student&p=council |
Trial likely for 1933s
This article was originally printed in the latest issue of Numismatic News.
>> Subscribe today!
Resolution of the legal positions of the U.S. Mint and the descendants of Israel Switt over the fate of 10 genuine 1933 double eagle coins moved one step closer to trial on Oct. 28 with release of a 20-page decision by U.S. District Court Judge Legrome Davis Jr., from the federal court on the Eastern District of Pennsylvania.
A trial would occur in late 2011 or in 2012.
Both sides have been battling since September 2004 when Switt’s daughter, Joan Langbord, and her two adult sons, contacted the Mint’s counsel, Daniel Shaver, to ask if the Mint would authenticate 10 coins thought to be genuine 1933 double eagles. The coins were sent to Washington for review.
Fascinating Facts, Mysteries & Myths About U.S. Coins
The family acted through New York lawyer Barry Berke, who had previously negotiated with the Mint to legalize the King Farouk-Jay Parrino-Stephen Fenton specimen that sold for $7.59 million in 2002.
Israel Switt, a Philadelphia jeweler and pawn merchant, has been identified in recent years as included in the pedigree of every known specimen of the 1933 double eagle or $20 gold piece that ever surfaced. This includes a number of pieces in the 1940s and 1950s in a series of seizures or prosecutions, usually by the United States attorney in the district where the coin was seized.
The Mint declined to return the 10 gold coins, saying in essence, “sue us,” and Berke rose to the challenge, demand the coins return in court.
Berke’s pleadings laid out the case as to why Langbord and her family believed that they had the right to retain the coins and that the Mint had to seek their forfeiture, not simply retain them like a neighborhood bully. The Mint had an entirely different perspective and attempted to retain the coins as the fruit of a crime, much as a bank robber is denied the loot.
The plaintiffs basically claim the government has my coins, it took them, and we want them back.
Significantly, the government now bears the burden of proof that it is the rightful owner. The problem: all through the years, the government found that when the other side had the burden, it could not be met. The shoe is on the other foot.
Judge Davis wrote, “Two months after the Court’s summary judgment ruling,” in 2009, “the United States sought leave to file a multi-count complaint ... [which] includes the court-ordered forfeiture count against the 10 1933 double eagles (Count I) and three additional claims: replevin and declaratory judgment claims against the Langbords (Counts II and III, respectively), and a declaratory judgment claim against three John Doe third-party defendants who allegedly possess other 1933 double eagles stolen from the Mint (Count IV).”
This part is new. The Mint wants to use this case as the last litigation of this issue. It might well be, but not as they intended.
Judge Davis wrote that “Plaintiffs protest that the addition of the proposed claims because they will allow the Government to prevail on a lesser showing – requiring only proof of proper title, rather than that the coins are the proceeds of a crime.” And so he denied that request.
In the realm of “you won’t believe this, but try it on for size”, Judge Davis characterized another proposed claim of the Mint this way: “Adding a twist, the United States also filed a claim of interest, alleging rightful ownership as the victim of the coins’ theft ...”
Judge Davis then characterized the Langbord family’s response: “Plaintiffs move to dismiss Government’s claim of interest for lack of jurisdiction, arguing that neither the forfeiture statute nor the Constitution’s case-and-controversy requirement permit the United States to file a claim against itself.”
In the end, the Judge gave both sides a little – and Langbord’s a solid procedural victory. “The Court appreciates the uniqueness of this case. But the unfamiliar landscape does not persuade it to abandon well-established legal principles, as the parties’ briefs often suggest it should.”
Based on other cases and past practices called precedent, “the Court 1) denies the Government’s motion for leave to file Counts II and IV of its proposed complaint; 2) grants the Government’s motion for leave to file Count III of its proposed complaint; and 3) grants Plaintiffs’ motion to dismiss the Government’s claim of interest in the forfeiture proceeding.”
More Coin Collecting Resources: | https://www.numismaticnews.net/archive/trial-likely-for-1933 |
Directions: Enter from Plantation Bay entrance from Plantation Bay Dr. turn on to Millstream Ln Home is on the right.
General Property Description
Bedrooms: 5
Baths - Total: 2
Baths - Full: 2
Supra: No
Living Area: 2800
SqFt - Total: 3443
SqFt Source: Property Appraiser
A/V Surveillance: Yes
Acreage: 0.36
Year Built: 1998
Homeowner Association Name: PLANTATION BAY COMMUNITY ASSOCIATION, INC.
HOA Main Address: 3511 S. PENINSULA DRIVE PORT ORANGE, FL 32127
HOA License Location Address: 103 NORTH LAKE DRIVE ORMOND BEACH, FL 32174
Maint Fee: 270
Maint Fee Paid: Quarterly
Water: City
Sewer: City
As Is Cond: Yes
Lot Size: 101X151
Status Change Info
Status: Active
Rooms
Bedroom 1 Level: Main
Bedroom 2 Level: Main
Bedroom 3 Level: Main
Bedroom 4 Level: Main
Dining Room Level: Main
Kitchen Level: Main
Living Room Level: Main
Property Features
Acreage: 0 - 1/2
Land: Gated Community; Golf Course Community
Building: 1 Story
Construction: Concrete Block; Stucco Cover
Parking: 2 Car Garage
Pet Restrictions: No
Inside: Ceiling Fans; Fireplace; Inside Laundry
Appliances: Dishwasher; Microwave; Refrigerator; Trash Compactor; Water Softener
Miscellaneous: Gated Community; Golf Community
Heating: Central
Air Conditioning: Central; None
Floor Coverings: Laminate; Tile
Porch: Front
Rooms: Bedroom 1; Bedroom 2; Bedroom 3; Bedroom 4; Dining Room; Kitchen; Living Room
House Orientation: S
Roof: Tile
Special Conditions: None
Maint Fee Covers: Clubhouse; Common Area; Security
Road: Paved
Supplements
cutouts made for the TV and other decorative items. The master bedroom comes fully equipped with crown molding and a tub and shower combo. Exiting through the back of the home you will first pass through the tiled Florida room which is perfect for enjoying that morning cup of coffee. The backyard of the home comes with a fairly large paver pad. Additional features of the home include: 2019 water heater, 2019 Kitchen full update, 2019 added 5th bedroom, 2019 fresh interior paint throughout, NEW light fixtures, NEW ceiling fans, NEW Pella Windows, NEW blinds, NEW plantation shutters, 2019 paver patio, 2019 NEW garage door, 2020 NEW stone wall with fireplace and cutouts in living room, and 2020 floors installed
Room Information
|Room Name||Level||Length||Width||Dimensions|
|Bedroom 1||Main||16.00||15.00||16 x 15|
|Kitchen||Main||18.00||13.00||18 x 13|
|Bedroom 2||Main||13.00||11.00||13 x 11|
|Bedroom 3||Main||13.00||11.00||13 x 11|
|Bedroom 4||Main||12.00||10.00||12 x 10|
|Dining Room||Main||12.00||13.00||12 x 13|
|Living Room||Main||18.00||13.00||18 x 13|
Listing Office: Nonmember office
Last Updated: January - 17 - 2022
Listing data provided by the Daytona Beach Area Association of REALTORS®' Internet Data Exchange (IDX) program. Data is believed to be accurate but not warranted. | https://urbanistarealty.com/idx/804-S-Millstream-Lane-Ormond-Beach-FL-32174-mls_1092202/?SavedSearch=20180123005750734754000000&PropertyType=A&City=Ormond+Beach&pg=1&OrderBy=-ModificationTimestamp&p=y&m=20141217142419760845000000&n=y |
All materials that are normally available for check-out will continue to be available, including books, magazines, DVDs, audiobooks, children’s backpacks and kits. Patrons can request materials for check-out by calling the library or sending an email to [email protected]. We are also happy to curate a list of books for you if you request a subject, author, style, etc.
Staff will be on-site and answering phone calls during our regular business hours Monday-Friday, 10am-5pm and Saturdays 10am-2pm.
Printing Service: Please email your document to [email protected] and specify the number of copies.
Copy/Fax/Scan: Please call us during business hours for instructions.
All documents will be picked up and returned through the curbside locker.
Public computers will unfortunately not be available; however like always our public WiFi is available 24/7 in the area around the library building. Network is Salmon Library Guest.
If you would like more information about any of our service options, please give us a call at (208) 756-2311.
Thank you for your patience and understanding. We are wishing everyone in our community good health and a speedy recovery for those who are sick. | https://salmonlibrary.org/2020/10/21/covid-update-back-to-curbside-only/ |
EDITOR'S NOTE: The Swnews4u.com Athlete of the Week is a web-only feature that will publish each Thursday throughout the calendar year.
Izzy Carroll, Sr., Platteville High School
STEVENS POINT — Platteville senior Izzy Carroll was recently selected as a finalist for the WIAA’s prestigious 2020 WIAA Statewide Scholar Athlete Award underwritten by Marshfield Children’s Hospital.
Sixteen senior girls and 16 senior boys from Waunakee to Washburn have been selected as finalists for the award. More than 1,100 Scholar Athlete finalists have been recognized since the program began in 1984.
To determine the top 32 finalists, four boys and four girls were selected (based on both athletic and academic achievement) from each of four WIAA divisions.
“These extraordinary student athletes excel in both academics and athletics,” said Tom Shafranski, assistant director of the WIAA. “Sixteen of this year’s 32 WIAA Scholar Athlete finalists have a grade point average of 4.0 to date, while the average GPA is an amazing 3.94. All 32 scholar athlete finalists have already earned a total of 313 varsity letters during their first 31/2 years of high school. That’s an average of 10 letters per athlete.”
The 2020 WIAA Scholar Athlete Finalists will be recognized in a video to be posted May 15 on the WIAA website (www.wiaawi.org) and broadcast statewide by Fox Sports on several dates to be announced.
Each 2020 WIAA Scholar Athlete Finalist will receive a medallion, a certificate, and a special plaque for display in their school’s trophy case.
Student athletes nominated for the award by their high school athletic directors, but not selected as one of the 32 statewide finalists, will be recognized locally by the school administration.
Carroll has earned 11 varsity letters, and it would have been 12 this spring, in volleyball, basketball and track and field, has a 4.0 GPA and is currently ranked #1 in her class of 95 students.
Carroll was twice named the SWC co-Player of the Year and named first-team All-SWC three times in volleyball after leading the Hillmen to three straight SWC titles.
She averaged 6.3 point, 5.2 rebounds and 2.1 assists and was named second-team All-SWC in basketball for a second straight year while helping the top-ranked undefeated Hillmen (26–0) reach the WIAA D3 state championship game, that was cancelled due to the COVID-19 pandemic.
Last spring, Carroll won individual sectional track and field titles in both the discus and shot put, then went on to place second in the discus (126’2”) and eighth in the shot put (37’6.25”) at the WIAA D2 state track and field meet in La Crosse.
River Ridge’s Skylar White and Mineral Point’s Isaac Lindsey were are named finalist for the WIAA Scholar Athlete awards. | https://www.swnews4u.com/sports/athlete-of-the-week/mast-water-technology-athlete-week-izzy-carroll/ |
Big Bend protects a desert landscape that tends to be described with terms like: barren, waste, wasteland, a-whole-lot-of-nothing. In our first twenty-four hours in the park, we met: a bobcat, a ground-owl, jackrabbits, raccoon, bluebirds, mice, bumble bees, two bear, countless deer; sotol & yucca with flowers ten feet tall, cholla, ocotillo, mesquite, juniper. In the free fenceless desert, life overflowed. There is no such thing as a waste land! (John Locke be damned!) Every living thing we saw was thriving exactly where it was. The desert is not a place where life evaporates before the pale sandy face of death, in some horrible death-sunshine, it's where "life on earth" shows its true extent: The Whole Earth.
The world isn't empty, it's full!
//South Rim, Big Bend National Park, Texas
The Zodiac, Eagles Nest Wilderness, Colorado // The most spiritual places on earth were not made by any hands, they were here before we were.
Red Peak, Eagles Nest Wilderness, Colorado // Mountains always have a different character when you get up close. What you lose in towering massive silence you gain in an explosion of detail and variety: jagged peaks revealing themselves as precarious piles of rock, being held up by the magic inevitability of the angle of repose. From a distance it almost seems impossible. How could something so massive, so solid be so complex, so chaotic? How can such obvious order be so illusory? I suppose it's just like human nature to miss the rocks for the mountains. | https://www.borrowedparadise.com/Home/i-PScxHBz/ |
The following people are involved with this project:
Professor Mike Benton Professor of Vertebrate Paleontology Tel. (0117) 39 41208 [email protected]
Ms Claudia Hildebrandt Technical Specialist Tel. (0117) 954 5412 [email protected]
Ms Hannah Lowery Archivist and Special Collections Manager Tel. (0117) 928 8014 [email protected]
Mr Jasper Tredgold SLSP Team Manager Tel. (0117) 4550782 [email protected]
The JISC-funded University of Bristol Collections as Linked Open Data (BRICOLAGE) project will publish catalogue metadata as Linked Open Data for two of its most significant collections: the Penguin Archive, a comprehensive collection of the publisher’s papers and books; and the Geology Museum, a 100,000 specimen collection housing many unique and irreplaceable resources. The metadata will be licensed for ease of reuse according to JISC guidelines. The project will re-apply the best practice processes and tools produced by relevant preceding projects to create persistent identifiers, identify and create links to authoritative datasets and vocabularies, and work with the two collections’ infrastructure platforms: CALM and Drupal. The Linked Data production workflows will be embedded in the collections’ teams to ensure future sustainability. The project will also produce two simple demonstrators to illustrate the potential of data linking and reuse, and will encode resource microdata into the Geology Museum’s forthcoming online catalogue with the aim of improving collection visibility via the major search engines. | http://www.bristol.ac.uk/ilrt/people/project/1367 |
In the My Identity, Your Identity Project, students are encouraged to explore and research the elements that form their culture and identities. One of these elements includes the historical landmarks or famous places in their communities, which are an important part of their culture and identities. The purpose of this unit is to help students from around the world appreciate their heritage through historical landmark research, share what they learned with their global peers, and compare and contrast landmarks from different countries.
To do this, students from six BRIDGE countries conducted research and found pictures of historical landmarks or famous places in their country. They began in week one by researching multiple landmarks in order to gain a better understanding of which they would ultimately like to select to study. Then, in week two, they compared and contrasted landmarks found in different countries. The images below are taken from an Egyptian student's project comparing and contrasting the fortress in St. Augustine, FL with the Qaitbey Fortress in Alexandria, Egypt.
During week three of the project, students deepened their understanding about the significance of their historical landmark by visiting the site or by interviewing someone who had visited it.
Week four of the project introduced the idea that landmarks can create social good. During this phase of the unit, students identified historical landmarks that were created to promote peace and researched them to better understand their importance. Students suggested landmarks like the Al Zaytuna Mosque in Tunisia, the Church of the Holy Resurrection in Morocco, the Peace Arch Park on the border of Canada and the United States, and the Chouf Cedar Nature Reserve in Lebanon.
To conclude the unit, students created final projects to teach younger students about historical landmarks from around the world.
As illustrated by this Egyptian teacher's experience, the My Identity, Your Identity Project not only gives students the opportunity to learn, but also offers professional development for teachers: "At first I was confused about how I can make a conference with another teacher from another country and the difference in the time zones, but we take it step by step and we make many of video conference. It helped me in the class and how to turn the class into a small global world. I learn how to use technology in the class and I know new media connection from my peers from another countries."
Learn more about the My Identity, Your Identity Project! | https://us.iearn.org/news/my-identity-your-identity-project |
Required Courses I (6 hours) Foundations of Psychology Courses - Select two fo the following with these exceptions: If you select PSY 587, do not select PSY 687. If you select one of PSY 589, PSY 680 or PSY 681 do not select the other two.
Required Courses II (24 hours) Industrial/Organizational Psychology Content Courses
Required Courses III (12 hours) Research Courses
Required courses IV (3 hours) Experience Based Courses - Select one of the following:
Master Thesis (6 hours)
Doctoral Dissertation (12 hours) - 12 hours are required, 6 in PSY 898 and 6 in PSY 899. Students may take an additional 12 dissertation credits as electives.
Electives (33 hours)
33 hours of electives, of which 9 hours may be from outside Psychology. Or
Occupational Health Psychology (OHP) concentration Requirements within the I/O Ph.D. Program.
Students in the Industrial/Organizational Psychology Ph.D. Program can earn a concentration in OHP by using 9 hours of their I/O Psychology Program electives in OHP courses and completing a thesis or doctoral dissertation on an OHP topic. The 9 hours of OHP electives must come from the following list unless substitutions are approved by the student's advisor or the I/O Psychology Program Director. The thesis or dissertation topic also must be approved as and OHP topic by the student's advisor or the I/O Psychology Program Director. | https://www.cmich.edu/colleges/class/Psychology/Graduate/IOpsychology/IOGeneral/Pages/IO-Doctoral-Requirements.aspx |
While some chefs seek to update and revitalize their national cuisine, the Turkish chef and restaurateur Musa Dağdeviren simply tries to record and preserve his country’s culinary culture.
For Dağdeviren, author of The Turkish Cookbook, this culinary history is intimately connected to his own family's story, and in keeping traditional dishes alive, he honours the talents and memories of his parents, cousins, neighbours and forebears.
“Relatives on my father’s side were farmers and on my mother’s side bakers. My father looked after pistachio, olive and fruit trees. I still remember the wild honey I tasted in a pistachio orchard. My father was my master of all things rural from pistachios to olives, olive oil and fresh cheeses.
“My elder brothers and I are restaurateurs with a baking background. In Nizip, Gaziantep, where I am from, food meant everything to us. The ridged bread, various pides and börek were prepared at bakeries. The locals made trays of food at home and sent them off to local bakeries for a final taste test and baking. The filling for Lahmacun (Spiced Meat-Topped Flatbread) was made at the butcher and then sent, along with other meat, to the local bakery for cooking, eaten with fresh flatbreads and pide. There used to be many street vendors who cooked chickpeas in bone broth and pulled their carts in front of bakeries for hungry aficionados in the early morning. The bakers knew who were the best cooks in Nizip. They got cross if they were not offered a piece of the food they baked for others.
“The baker, butcher, greengrocer, kebab shop and pastry shop were all in the same area in Nizip. They somehow had a lot to do with one another. What is called ridged bread in urban areas was our staple. We always had it fresh. Sugar, sesame seeds, cartilage and lamb confit from the homes were added to this bread and turned into delicious pide. The fresh pide are dipped into olive oil and eaten with milk for breakfast. Fresh cheese is made of sheep’s milk at the beginning of spring and eaten with the pide.
“During primary school we used to compare our mothers’ food. Every mother had a special dish she made really well. I have always been interested in ingredients and cooking techniques. This curiosity eventually led me into my research and field work on the relationship between food and folklore. Discovering sources about our culinary history put things into a historical perspective, more of a continuum. My mother has been my inspiration and I still love to learn.
“I came to Istanbul in 1979 to work at my uncle Ismet’s restaurant. The meze, grilled dishes and fish fired my enthusiasm and broadened my horizons. I learnt about the restaurant trade at places run by my older brothers and uncles. In the 1980s we cooked with diverse ingredients, most locally produced.
“Street vendors and restaurants contributed to a vibrant and authentic food scene which is sadly no longer here because of wider access to mass-produced foods. The local food culture that was dominant in Nizip in my childhood has long been replaced by restaurant food. Restaurants do serve local specialties like ridged bread, pide, lahmacun, sheep’s head and trotters soup, lentil soup, karnıyarık and moussaka. More efficient communication and urbanisation have unfortunately taken place at the expense of local cuisines.
“I worked at several restaurants and did a fair bit of field work before opening a tiny restaurant with four friends in 1986. This six-table diner eventually turned into Ciya and I eventually became the sole owner. This boutique hole-in-the-wall is still remembered with affection by aficionados. I would take orders for special dishes and cook them for the patrons who enjoyed them accompanied by classical music. A woman among our regulars made a comment about the name of the Icli köfte (Kibbeh) in the menu. She claimed it was called ‘oruk’. I immediately knew she was from Antakya since this is the local name for kibbeh. That is how I met my wife Zeynep!
“In 1998 we opened Ciya Sofrası, on the same street but with a new concept. Ciya Sofrası has always been known as a destination for the lesser-known cuisines of Southeastern Anatolia and Eastern Mediterranean. It encompasses a larger area from Mesopotamia to Anatolia featuring Azeri, Georgian, Turkish, Arabic, Armenian, Kurdish, Rum, Assyrian, Laz, Circassian and Sephardic dishes. In 2001 we opened a bigger kebab restaurant on the same street. We now also have our own farm to supply our restaurants with the freshest produce. We make our own pickles, grow our own fruit and vegetables and make our own tomato and red bell pepper pastes with the ingredients we grow ourselves.
“I have also been sharing my knowledge about Turkish culinary culture in high schools, universities and local councils both in Turkey and internationally. Since 2005 I have been publishing Yemek ve Kültür (Food and Culture) with an editorial board of academics covering the history, literature, etymology and folklore of food. Ciya Yayınları is a specialised publishing house focusing on documenting food history. The Ciya Foundation carries out research on our culinary culture and aims to compile a food dictionary of our country and document food culture.
For more on this holistic view of Turkey’s culinary heritage, and to learn how to make many of the dishes mentioned, order a copy of The Turkish Cookbook here. | https://staging.phaidon.com/agenda/food/articles/2019/april/30/phaidon-introductions-musa-da-deviren-on-food-and-family/ |
The CBSE Class 12th board exam will start from March 9, 2017. This year, a total of 10,98,420 students have applied for the Class 12th board exam.
Before appearing the exam, it is important to understand that all the subjects requires more of conceptual understanding along with a bit of revise. Also Read: How to crack BITSAT exam 2016? Tips to prepare
Here are some last minute tips, tricks and some points to remember before appearing the exam:
Admit card: First and most important thing, do not forget to carry your admit card. Without it, you won’t be allowed to appear for the paper.
Read the questions carefully: 10 to 15 minutes reading time will be provided before the commencement of the exam, during this time one should read the question paper carefully and check the marks which is given to each question.
Make a proper choice: There is an internal choice in one question of 2 marks, one question of 3 marks and three questions of 5 marks. Try to make a proper choice of the questions during the first 10 to 15 minutes reading time. So, that you would want to attempt in order to avoid confusion later.
Answering tips and tricks: Definitions should be direct to the point; derivations should contain a sentence or two of introduction, a diagram (if any), clear mathematical steps with highlighted final result; graphical questions and conceptual problems should be supported with correct reasoning. Numerical problems must be solved in logical systematic manner.
Follow the proper sequence: Try to follow the proper sequence if the question demands you to write about the procedure or steps.
Answered with examples: Don’t forget to give examples wherever possible.
Time factor: Be careful in time factor. Don’t spend too much time on one particular question at the cost of other questions. Questions asking for ‘Distinguish’ or ‘Differentiate’ should be written in a table format, it will good impression to the teacher.
Diagrams: Don’t forget to give diagrammatic representation of the answers wherever necessary.
Not to repeat your answers: If you attempts a question twice, marks will be given in the question which is attempted first and the question attempted later will be ignored, whether is it right or wrong.
Don’t forget to revise: Leave around 20 minutes to revise your written answer sheets.
Have a look at BITSAT cut off scores
With the help of Embibe.com, you can improve your score easily. Embibe is India’s leading tech-company with a keen focus on improving learning outcomes, using personalised data analytics, for students across all level of ability and access. | https://wearecrafthouse.com/2017/03/24/cbse-class-12th-tips-tricks-and-points-to-remember-for-science-and-mathematics-exam/ |
PROBLEM TO BE SOLVED: To provide a printer that transfers print media both at a thermal head position and a position on a downstream side of the thermal head position, and that can maintain excellent printing quality.
SOLUTION: A printer comprises: a head holding part 3 for holding a thermal head 3A; a first roller 52 for interposing a print medium 7A between itself and the thermal head 3A, rotating in a first normal rotating direction to transfer the print medium 7A toward a downstream side; a second roller 53 for rotating in a second normal rotating direction to transfer the print medium 7A toward the downstream side; a driving part for driving the first roller 52; a transmission part 54 which is interposed between the first roller 52 and the second roller 53, and transmits a rotary driving power of the first roller 52 rotating in the first normal rotating direction to the second roller 53 to rotate the second roller 53 in the second normal rotating direction; and a torque limiter 54B which can restrict transmission of the rotary driving power of the first roller 52 rotating in the first normal rotating direction to the second roller.
SELECTED DRAWING: Figure 5
COPYRIGHT: (C)2019,JPO&INPIT | |
The utility model discloses a jam racking machine carries out the complex operation's of partial shipment a problem to the workman one by one to fruit sauce bag dress box, provide following technicalscheme, including quick -witted case and be used for distributing the material loading subassembly of material, be equipped with conveying turnplate on the quick -witted case, the hole is placed to last being equipped with of conveying turnplate, is equipped with sealing assembly on the quick -witted case, still is equipped with the inclined guide plate of liftable on the quick -witted case. Workman's accessible will fruit sauce bag dress box be placed and is placed the hole at conveying turnplate, it carries out the branch material to drive fruit sauce bag dress box by conveying turnplate, the completion of three processes such as encapsulation and transport, carry out the branch material by the material loading subassembly to fruit sauce bag dress box, and then encapsulate fruit sauce bag dress box by sealing assembly by sealing station, last workman's accessible raises inclined guide plate, the deflector promotes the packing carton at the in -process that risees and rises, the packing carton is led the lapse in the slope of deflector and is left and place the hole, thereby realize the output of packing carton, and convenient for operation, and the labor intensity is reduced, work efficiency is improved. | |
As a kid there were two homemade treats my brothers and sisters and I loved – Rice Krispie Squares and Puffed Wheat Squares! Both are easy to prepare, don’t cost a lot to make, and kids devour them!
My family may never eat plain Rice Krispie Squares again, these are incredible!
Chocolate Caramel Rice Krispie Squares
Ingredients
- 1 1/2 tbsp butter
- 1/2 bag marshmallows about 20 large-2 cups mini
- 1 tsp vanilla
- 4 cups Rice Krispies cereal
- 7 ounces unwrapped caramels 1/2 bag
- 1 tbsp water
- 3/4 cup peanut butter divided use
- 8 ounces milk chocolate
Instructions
- Butter a 9 x 9 inch pan.
- In large bowl melt butter in microwave just until melted. Add marshmallows, stir to coat marshmallows in butter, then microwave until melted, stirring occasionally. This should only take a couple of minutes.
- Stir in vanilla.
- Stir in Rice Krispies.
- Pour into buttered pan and press mixture firmly with buttered hands.
- Place in refrigerator to chill.
- In saucepan, melt caramels and water on low heat, stirring frequently. (careful not to burn).
- Remove from heat, stir in 1/2 cup peanut butter. Blend completely.
- Pour over Rice Krispies, and spread to an even layer.
- Put back into refrigerator.
- In saucepan over low heat, melt chocolate.
- When melted, stir in 1/4 cup peanut butter. Combine well.
- Pour chocolate over caramel layer spreading to edges in even layer.
- Refrigerate for 1 hour or until chocolate is firm.
- Cut into squares. | https://www.artandthekitchen.com/chocolate-caramel-rice-krispie-squares/ |
Lili Anne Taylor is an American actress notable for her appearances in such award-winning indie films as Mystic Pizza and I Shot Andy Warhol and The Conjuring (2013).
Continue below to see how tall Lili Taylor really is, plus her weight, body measurements and stats.
Facts
|Real Name:||Lili Anne Taylor|
|Profession:||TV Actress|
|Nationality:||American|
|Date Of Birth:||February 20, 1967|
|Age (as of 2021):||54 years old|
|Birth Place:||Glencoe, Illinois, USA|
|Born In:||Generation X|
|Zodiac Sign:||Pisces|
|Chinese Zodiac:||Goat|
Lili Taylor was born in 1960s.
Personal
She graduated from New Trier High School and later attended The Theatre School at DePaul University. Lili Anne Taylor attended New Trier High School, Winnetka, IL (1985) and DePaul University. You can also learn about Lili Taylor’s dating history at CelebsCouples.
|Eye Color:||Hazel|
|Hair Color:||Light Brown|
|Shoe Size:||N/A|
Height
At the age of 54, Lili Taylor’s height is 5 feet 2 inches (157 cm cm) or approximately 1.57 m meters or 62 inches inches.
|Height:||5 ft, 2 in|
|Height (meters):||1.57 m m|
|Height (centimeters):||157 cm cm|
|Height (inches):||62 inches in|
According to CDC, the average American height for men is 5′ 9″ inches (175 cm or 69 inches) and 5′ 4″ inches (162 cm or 64 inches) for women.
Fact: People lose a total of 1-3 inches (2.5 to 7.5 cm) in height as they age, and women generally losing more than men. Height loss is more rapid after age 70.
Weight
|Body Build:||Slim|
|Weight (pounds):||Under review lbs|
|Weight (kilograms):||Under review kg|
|Weight (stone):||Under review stone|
Lili Taylor is a member of famous people who are known for being a popular 54 year old, TV Actress, born in February, in the year 1967, with zodiac sign of Pisces.
Now that you know how tall is Lili Taylor, find out lili taylor net worth, check out the countdown to Lili Taylor’s birthday celebration, and discover related celebrities below.
Did we make a mistake? Please submit a correction and help us fix it. Submit a correction. | https://www.celebsdetails.com/stats/lili-taylor-height-weight-body/ |
You are here:
HOME
»
Students - General
(x)
»
Events - General
(x)
»
Faculty and Staff - General
(x)
»
University of Toronto Archives Image Bank
(x)
» Search results
Search results
Advanced Search
Field
Keyword
Title
Date
Description
Search terms
Preserve Filters
(1 - 2 of 2)
Title
Innis College - Panoramic views of Dr. Robbin Harris
Date
July 14, 1969
Extent and medium
6 negatives : b&w ; 35 mm
Description
Panoramic views taken in on the east side of University College featuring Dr. Robbin Harris holding up sketch of the proposed Innis College.
Title
Chinese scientists visit the University of Toronto
Date
November 10, 1972
Extent and medium
94 negatives : b&w ; 35 mm
Description
Photographs document a visiting delegation of scientists from People's Republic of China. Shots show scientists meeting with President Evans in the Governing Council chamber and a trip to visit facilities of the Banting and Best Department of Medical Research and the Princess Margaret Hospital. | https://utarms-online.library.utoronto.ca/islandora/search?islandora_solr_search_navigation=0&f%5B0%5D=-mods_subject_topic_ms%3A%22Students%5C%20%5C-%5C%20General%22&f%5B1%5D=mods_subject_topic_ms%3A%22Events%5C%20%5C-%5C%20General%22&f%5B2%5D=mods_subject_topic_ms%3A%22Faculty%5C%20and%5C%20Staff%5C%20%5C-%5C%20General%22&f%5B3%5D=-RELS_EXT_isMemberOfCollection_uri_ms%3A%22info%5C%3Afedora%5C/utarmsIB%5C%3Aroot%22&display=default |
Astronauts in places with microgravity, like on the ISS, are weightless; they can sleep or rest in any orientation.
However, when it’s time for them to sleep, they have to attach themselves so they don’t float around and bump into something.
Astronauts Thomas D. Jones and Mark L. Polansky during their sleep shift in the Destiny laboratory on the International Space Station in 2001. Photo courtesy of NASA
ISS astronauts usually sleep in sleeping bags located in small crew cabins. Each crew cabin is just big enough for one person. Astronauts also attach themselves to walls or the ceiling to sleep.
Many sleep worse on a space mission than on earth. It may be due to micro gravitation, but also to other factors such as noise, excitement, stress, jet lag or too cold or too warm temperatures causing discomfort. Another factor can be the fact that on the ISS, for example, the sun rises as many as 15 times a day.
See also:
Why Time Dilation Allows Time Travel
Forbush Decrease: Dangerous Event That Can Affect Human Health, Technology, Earth’s Environment
Is There Anything In The Universe Bigger Than A Galaxy?
More Cool Science Facts
Astronauts have told they dream more, but sleep less in space – around six hours and not seven or eight as we usually do on earth. One theory suggests that it may be because an astronaut moves more easily in microgravity.
Weightlessness does affect the types of dreams, too.
During their sleep period, astronauts have reported having dreams and nightmares. Some have even reported snoring in space.
NOTE: Microgravity is the condition in which people or objects appear to be weightless. | http://tall-white-aliens.com/?p=8499 |
Summary: Students learn to sing and move along to “Hard to Stop” while building vocabulary to describe musical opposites.
Materials: Musical Explorers CD or online audio, markers or crayons
Time Required: 40 minutes (four 10 minute activities)
Standards: GA:MK-2GM.1, MK-2GM.6, MK-2GM.7, MK-2GM.8, MK-2GM.9, MK-2GM.10
SC: MGK-2.1, MGK-2.4, MGK-2.5, MGK-2.6
Vocabulary: zydeco, tempo, accordion, frottoir
Meet Jefferey
- Meet Jeffery on SG15.
- Jeffery sings zydeco. Zydeco is music of southern Louisiana that combines French dance melodies with rhythm and blues, as well as music that came from the Native people of Louisiana.
- Find Louisiana on the map, SG16. What states are near Louisiana? How close is Louisiana to Georgia?
Learn the Chorus to “Hard to Stop”
- Listen to “Hard to Stop,” Track 19
- Invite students to share what they hear in the music. (e.g. man singing/talking, various instruments playing, etc.)
- Invite students to sing along with “Hard to Stop,” Track 19
|
|
Hard to Stop (Chorus)
|Hard to stop when you’re having fun
|
Hard to stop when you’re on the run
Hard to stop when you’re feeling low
Hard to stop when it’s zydeco
Explore Tempo Through Movement in “Hard to Stop”
- Listen to a portion of the song once more.
- While students listen to the song, ask students to tap and dance along with the steady beat to explore the tempo of the song. Tempo is how fast or slow a song is.
- What kind of tempo does “Hard to Stop” have? Fast? Slow?
- In music, a fast tempo is called “allegro.”
Explore Instruments in Zydeco Music
- Zydeco music features many different instruments, including accordions, fiddles, triangles, and especially washboards or rub-boards called frottoirs (fro-TWAHS).
- Using SG17, examine pictures of the accordion, fiddle, triangle, and other zydeco instruments.
- Which instruments do you hear in “Hard to Stop?”
|Cultural Connection: Learn about Zydeco Music
|
In the 1960s, zydeco was born by combining traditional Cajun music with two new American styles of music: blues and rhythm and blues. Zydeco music was originally created at house dances, where families and friends gathered for socializing. The music integrated several dance styles including waltz, shuffles, and two-steps.
Musical Word Wall
Add the words zydeco, tempo, accordion, and frottoir to the Musical Word Wall. | https://musicalexplorers.savannahmusicfestival.org/season3/s3-unit3/lesson-1-learning-hard-stop/ |
In Model Viewer, choose Arthur, Dante, or Phoenix. Once their model shows up, press the Select button to switch to alternate models for each of the characters. They also have alternate colors that can be viewed by pushing the "x" button.
|
|
Deadpool Special Tag In
|
|
Hold Taunt while tagging in Deadpool and something special will occur.
|
|
Quick Reset in Training Mode and Mission Mode
|
|
In either mode press Start+Select which will reset you to the middle of screen. Start+Select+Right/Left will reset you to the corner on the Right/Left side (training mode only). Any of the above commands+holding down Assist 1 or 2 will reset in the desired location with one of your other party members.
|
|
Start match as 2nd or 3rd Character
|
|
During the Versus or Loading Screen, press and hold the Partner 1 or Partner 2 button to start the match as one of your other characters.
|
|
Switch assist position
|
|
If you hold Partner 1+ Partner 2 buttons before the match starts, your assist characters will be swapped. | https://www.gamerevolution.com/guides/50611-marvel-vs-capcom-3-fate-of-two-worlds-secrets |
Share this article
The TV star swept her auburn tresses into a simple ponytail, while she covered her face with a monochrome face mask.
As she made her way inside, she appeared cheerful but focused in the wake of Sunday's results which saw her narrowly avoided elimination again as the panel decided to save her over fellow actress Caroline Quentin and ballroom pro Johannes Radebe.
Low-key: The EastEnders actress, 19, dressed down in a pale pink padded jacket and baggy blue joggers as she prepared for a gruelling training session with pro partner Gorka Marquez
Maisie's outing comes after she claimed her nervousness has been misconstrued as overconfidence during an appearance on This Morning this week.
Admitting she struggles with her nerves, Maisie said: 'The pressure gets to me... even this interview I was so nervous.
'When I'm nervous I have this serious expression so people think I'm over confident.'
Casual: In keeping with her comfortable look, Maisie added a white T-shirt and colourful trainers, while she carried her essentials in a pink rucksack
Relaxed look: Maisie dressed down for a tough day of rehearsals following her disappointment at the weekend
Style: The TV star swept her auburn tresses into a simple ponytail, while she covered her face with a monochrome face mask
Gorka backed her up, as he told Holly Willoughby and Phillip Schofield: 'You know what, she's the opposite of confident.
'I think because she's an actress she gets into character and looks confident but I can tell you she is always like 'Gorka I haven't got it, I don't have the dance, I don't know what to do.'
Despite being in the dance off twice, Maisie said she's received a lot of support from former stars who have told her not to be 'upset by this'.
Let's go: Maisie clutched her pink rucksack as she climbed out the car and headed for practice
Let's do this: As she made her way inside, she appeared cheerful but focused in the wake of Sunday's results which saw her narrowly avoided elimination again
She added: 'Everyone has ups and downs, I'm not letting it get to me, we're still here and we're going to power through,' she said.
Maisie went on: 'I'll be honest I was more upset that I kind of felt guilty because I felt I was the one that ended Max and Dianne's journey on the show, same with Caroline, that's what hit me more.
'In regards to the bottom two it can happen to anyone, that's the point of this show you have no idea who it's going to be. Week one it was hard, no one expects it no one wants to be there.'
Feeling good: Maisie gave a thumbs up as she hopes to avoid the dreaded dance-off this weekend
Dream team: Maisie gave onlookers a wave as she and pro partner Gorka Marquez arrived at rehearsals
Fuel: The professional dancer clutched a cup of coffee as he headed for a day of training with Maisie
The TV star's appearance came after judge Craig Revel Horwood threw his support behind Maisie, after she landed in the bottom two again.
Dance expert Craig, 55, shared his belief that she may be struggling to soar because she 'needs to the win the hearts of the nation', as he compared her to 2007 champion Alesha Dixon.
During an appearance on ITV's This Morning on Monday, she said: 'Maisie is fantastic, she just needs to win the hearts and minds of the nation.
Honest: Maisie and Gorka made an appearance on Wednesday's This Morning, and claimed: 'When I'm nervous I have this serious expression so people think I'm over confident'
'I remember Alesha Dixon was in the bottom a few times and then she ended up winning and becoming a judge. I'm hoping it's a slow burner and that's the case. She's a lovely girl and I really want to see her go through.'
Her first dance-off reportedly left the auburn-haired beauty feeling shaken and she apparently had to be comforted by her fellow Strictly co-stars after taking the vote 'to heart'.
A source told The Sun: 'Poor Maisie has been so upset - she's been crying all night and has really taken it to heart.
Supportive: Gorka backed her up, as he told Holly Willoughby and Phillip Schofield: 'You know what, she's the opposite of confident. I think because she's an actress she gets into character'
Getting through it: Despite being in the dance off twice, Maisie said she's received a lot of support from former stars who have told her not to be 'upset by this'
'She's young and living away from home for the first time so it's hard on her.'
The insider also claimed the young star had the support of her fellow celebrity contestants and professional dancers as they attempted to cheer her up.
They added: 'The show's dancers and the other celebs have been rallying around and trying to lift her spirits.'
Do you want to automatically post your MailOnline comments to your Facebook Timeline?
Your comment will be posted to MailOnline as usual
We will automatically post your comment and a link to the news story to your Facebook timeline at the same time it is posted on MailOnline. To do this we will link your MailOnline account with your Facebook account. We’ll ask you to confirm this for your first post to Facebook.
You can choose on each post whether you would like it to be posted to Facebook. Your details from Facebook will be used to provide you with tailored content, marketing and ads in line with our Privacy Policy. | |
Travellers wishing to reach Edinburgh from Belfast have many transport options to choose from for their journey. The fastest and simplest option is to take a flight from Belfast International Airport, as the flight takes less than an hour. However, travellers preferring to make the journey over land can choose from bus and train services which can take anything from 7 to 20 hours to complete.
There are regular bus services to Edinburgh, which involve transferring to a Stena Line ferry to cross the Irish Sea. Citylink buses regularly depart from Belfast Europabus Centre at several points during the day. The entire journey takes up to 7 hours 35 minutes to complete. Alternatively, National Express runs coaches three times per day from Belfast Europabus Centre, using the same ferry crossing, which reaches Edinburgh within 7 hours 30 minutes.
Travellers preferring to travel to Edinburgh by train can reach the Scottish capital within 9 hours, but this option involves multiple transfers between a variety of transport services. Travellers must first travel from Belfast Central Station to Belfast Port by train before taking a ferry crossing from Belfast Port to Cairnryan Port to cross the Irish Sea. To complete the journey, travellers must take a bus from Cairnryan Port to Ayr and then transfer to a train service to make the last leg of the journey from Ayr to Edinburgh. Depending upon the departure time chosen, the entire journey can take up to 20 hours 30 minutes.
The fastest and most economical option to reach Edinburgh is to take a short flight from Belfast International Airport to Edinburgh Airport. The flight only takes 50 minutes with direct airlines such as Easyjet and Flybe, which also offer low-cost tickets. | https://www.omio.ie/travel/belfast/edinburgh |
April 1, 2019
Chennai : India has another of its satellite, EMISAT, in orbit now after its successful launch on Monday morning from the Sriharikota launch station in Andhra Pradesh. This satellite will emit electronic intelligence to the defence forces.
It is for the first time that the country’s defence forces will be getting this kind of intelligence, being described as a technological prowess not acquired by many nations.
Addressing a crowded press conference after the successful launch of the ISRO’s Emisat Satellite and another 28 satellites belonging to different customers, ISRO chairman K Sivan said, “Today the PSLV has successfully injected ISRO made Emisat satellite and 28 customer satellites at 504 km altitude. “
He described the mission as a special one for ISRO.
“The mission is special for ISRO on many counts as it was the first time a PSLV rocket is launched with four strap-on motors; it was the first time the mission has three different orbits; it was the first time the fourth stage is made an orbital platform for experiments and there is a new team for PSLV,” Sivan said adding that the private industry also contributed a lot for the building of the rocket and satellite.
“Ninety-five percent of the rocket hardware and 60-65 percent of satellite components were fabricated by the industry,” he said.
According to Sivan, heeding to the demand of the common man to view the rocket launches, a viewers gallery was built and 1,200 people enjoyed the launch on Monday.
He said, for the next mission about 5,000 people will be allowed to witness the launch and the number will be increased to 10,000
Sivan said under the outreach programme a total of 108 from each state and union territories will be visiting ISRO and get trained for 15 days so that they gain experience in space technology.
As regards future missions, Sivan said the next PSLV rocket will carry RISAT-2BR and it will be followed by another PSLV launch carrying Cartosat-3 satellite.
In the morning after the blast off, the PSLV launch vehicle ferried the four-stage rocket at 9.27 a.m. from the second launch pad at the spaceport of Sriharikota.vEMISAT was released first 17 minutes into the launch at an orbit 749 km away. The small satellites were to be released after about 40 minutes at a lower orbit of 504 km.
The countdown for the project began on Sunday on board Indian Space Research Organisation’s third generation workhorse Polar Satellite Launch Vehicle (PSLV), in its 47th flight, ISRO said. | https://www.covaipost.com/tamilnadu-news/now-indian-defence-forces-have-a-spy-who-can-see-all-from-the-skies/ |
Your essay topic must be selected wisely if you want your research paper to have a fantastic probability of being awarded the perfect grade. Luckily, there are lots of techniques that could help you decide which subjects are appropriate and which ones aren’t. It all begins with your study questions.
1 significant part of your article is that the research question you are likely to ask. Here is the main focus for the whole paper. When you decide to write your paper, then select a question that you will be on the lookout for a response to. You may begin by asking yourself questions like”What do essays writing help I wish to find out?”
Then decide how long you’re inclined to invest in writing the newspaper. Will it take three or four times to write the paper? Or are you willing to compose it in 30 minutes? Consider how much effort it’s possible to put into essay writing service it and then ask yourself what it is possible to get from it. The more time that you put in it, the more you will learn and come up with new ideas that will serve to make your paper interesting.
Once you’ve selected a question to investigate, you have to obtain the perfect question to reply. If your pick of query is too wide, you may not have the ability to answer it from how you expect. For example, if your question asks what you would do if you were given a million bucks, then you might find yourself answering that question in terms of what you’d do if you had $1 million. In this case, you might discover that you don’t know what you’d do with another thousand.
Another way to discover a challenging research question would be to read a post when it comes to the query you’re attempting to reply. A research about the prevalence of hemorrhoids in China is a good example. However, it also demonstrates that not all questions can easily be answered by most of people.
It’s best to pick out a question which will assist you on your own life in some manner and will help you resolve the question from the most creative way possible. As an instance, the study question”What will you do if you discovered the person which you had been creating plans together with is having an affair?” Would lead to more thought than if you were asked,”What could you do if your marriage was falling apart?” It could be a bit easier to come up with an answer if the choices have been narrowed down a bit.
Once you have selected a research question, you should be able to narrow down your choices from there. When you’ve the very best response for each question, it will be simple to choose the very best answer. Keep in mind your subject may call for a little bit of wordplay. This isn’t always required, but it will make certain you can come up with a great research topic for your document. It is going to also help the reader to recall what the topic of your paper would be.
At length, choose a subject that you are able to devote to each of the research and writing you’ll have to perform so as to finish your paper. Make sure you include the wording of your paper, in addition to the intended function of the research paper. You also want to make certain that you are clear on if you would like to write an outline or even a research paper. You might even make sure that the newspaper has a thesis statement that it can be accepted as a research paper. | https://3mrevision.dk/strategies-for-choosing-the-proper-research-paper-topic/ |
Dear Gaila - Book Circles & Disinterested Readers
Dear Gaila,
Last week you posted about Book Circles for struggling readers. My son can read well enough by now but he is disinterested in reading. Could the Book Circles help him?
Dear Parent of Disinterested Reader,
I'm so happy to hear that your child has mastered decoding letters and learning sight words and perhaps even more that, but yes, I understand that it's still hard work and not particularly interesting for your child. The key to success here is to make available as many interesting books as possible for your child on his level. I'm not sure whether your child has been reading for two or five years, however it's still the same. You need to find books on topics and levels that will grab your child's fascination.
For this precise reason we are offering children a chance to join a book circle. An experienced reader can help them find, choose and start them off reading books that will grab their interest but not frustrate them. Contact us if you would like your son to join a Book Circle. Be sure to also check out the school library . Naftali Bennett has okayed the budget for school's English library. Also check out online books. | https://www.ahava-english.org/single-post/2017/12/20/dear-gaila-book-circles-disinterested-readers |
Burnaby GDC Meeting # 3
Summary:
- Design session
- Themes, story, mechanics
- Ramin's Pong game written in c++
- C libraries
- Framerate independent motion
Last week, Ramin led us through a design session where we discussed potential themes, storylines and game mechanics for a hypothetical game. We started out listing themes we would like to base our game off of. The themes/mechanics we settled on were parkour styled gameplay, size manipulation, the inclusion of portals, gravity manipulation, time travel and a cyberpunk atmosphere. From there, we concocted a crazy story to weave all these ideas together.
The story is set in a near future, cyberpunk themed region overrun by large corporations. The protagonist of the story (the player) is a patient at a therapeutic clinic. Unfortunately, the doctor is a fraud looking to use his patients for his own benefit by trapping them in a virtual world and selling it as therapeutic technology. It is the player’s job to escape the virtual world and expose the doctor for the fraud he is. The story is dependent on the actions the player takes. For example, at the end of the game, the player may choose to side with the doctor and join him in his evil reign of terror or overthrow him and trap him in an infinite loop in his own virtual worlds. The name we decided on for this crazy, hypothetical creation was “Doctor Kerfuffle.”
Next, we refined the gameplay mechanics. There would be a “wanted level” where the player had to avoid gaining the doctor’s attention. There would be “group therapy sessions” which would essentially be a coop mode. The world would change depending on what you told the therapist (doctor) in therapy sessions. As you progress, the fidelity of the world would become higher. The gravity, time and lighting would all change and the player could break out of the virtual simulations by detecting glitches (Hacking?).
After our design session, Ramin gave us a rundown of a pong game he wrote in c++. He used irrlicht.h and irrklang.h libraries for the graphics and sound engines and explained how he used them to do animations, collision detection and game sounds. In addition, Ramin gave us a brief rundown of framerate independent motion. This is used to ensure that the framerate of a game is independent of the speed at which the game runs at. Essentially, regardless of how many frames per second your computer can render, the game will run at the same speed. We ended the meeting with a brief pong tournament. | http://sfugamedev.wikidot.com/2014springdiscussions:3 |
Question: In adults with psychosis, how effective is art therapy in improving patient outcomes?
There is limited evidence available on art therapy for adults with psychosis. More high quality research into this area is required to adequately assess the effectiveness of art therapy.
The limited available evidence suggests that art therapy offers no clear benefits for patients with psychosis, over and above high quality standard care provided by secondary-care mental health services (including care co-ordination, pharmacotherapy and the option of referral to other services as needed).
The only high quality study had poor participation rates, which (as noted by the study authors) may have impacted measures of effectiveness. Further studies may be informative, in particular studies comparing different types of group activity intervention and patients preferences for different activity options and comparing these types of interventions to lower levels of standard care.
To view National guidelines, see Related Links below. | http://best.awp.nhs.uk/search-answers/general/best-question-687/ |
The accuracy and accessibility of cited evidence: a study examining mental health policy documents.
Social Psychiatry and Psychiatric Epidemiology
(55)
pp. 111-121.
10.1007/s00127-019-01786-8.
|
|
Preview
|
Text
|
Hui2019_Article_TheAccuracyAndAccessibilityOfC.pdf - Published Version
Download (586kB) | Preview
Abstract
PURPOSE: Evidence-based policy making is increasingly being advocated by governments and scholars. To show that policies are informed by evidence, policy-related documents that cite external sources should ideally provide direct access to, and accurately represent, the referenced source and the evidence it provides. Our aim was to find a way to systematically assess the prevalence of referencing accuracy and accessibility issues in referenced statements selected from a sample of mental health-related policy documents. METHOD: 236 referenced statements were selected from 10 mental health-related policy documents published between 2013 and 2018. Policy documents were chosen as the focus of this investigation because of their relative accessibility and impact on clinical practice. Statements were rated against their referenced sources in terms of the (i) content accuracy in relation to the information provided by the referenced source and (ii) degree of accessibility of the source and the required evidence from the references provided. RESULTS: Of the 236 statements, 41 (59.7%) accurately represented the referenced source, 45 (19.1%) contained major errors and 50 (21.2%) contained minor errors in accuracy. For accessibility, 126 (53.4%) directly referenced primary sources of evidence that supported the claims made, 36 (15.3%) contained indirect references, 18 (7.6%) provided 'dead-end' references, and 11 (4.7%) references were completely inaccessible. CONCLUSIONS: With only slightly over half of all statements assessed providing fully accessible references and accurately representing the referenced source, these components of referencing quality deserve further attention if evidence-informed policy goals are to be achieved. The rating framework used in the current study proved to be a simple and straightforward method to assess these components and can provide a baseline against which interventions can be designed to improve referencing quality. | https://discovery.ucl.ac.uk/id/eprint/10084178/ |
Accountancy bodies are urging HM Revenue & Customs to delay the deadline for people to file their self-assessment tax returns, claiming that late filing will be commonplace due to the covid-19 pandemic.
Several professional bodies have also warned that economic difficulties caused by the pandemic will make it harder for some people to prepare and file their tax return.
The Institute of Chartered Accountants in England and Wales (ICAEW), the Association of Accounting Technicians (AAT), the Chartered Institute of Taxation (CIOT) and the Association of Taxation Technicians (ATT) are among the professional bodies in discussions with senior officials at HMRC seeking an extension to the deadline.
Jim Harra, HMRC chief executive, has promised to respond to the accountants’ requests this month.
The AAT is pushing for an extension of the January 31 2021 filing deadline and has recommended a delay either to March 31 2021 or to the end of the tax year on April 5 2021.
Phil Hall, AAT head of public affairs, said: “Almost 1 million self-assessment tax returns, of the 11 million due, were filed late in the last financial year. As a result of the coronavirus pandemic, the situation will probably be much worse this year and late filings will rise dramatically.”
Travel restrictions were a complicating factor for individuals who still prefer to meet their accountant in person to complete a return. Mr Hall said some people still arrive at their offices with “12 months of receipts in a plastic bag”.
Given the raft of assistance government has given to mitigate the impact of the pandemic, he added, it did not seem unreasonable to ask “what could be done to reduce the chances of millions of people being landed with at least a £100 late filing penalty”.
The request for an extension comes from taxpayers, who are worried about meeting the deadline, and accountants, who are exhausted after months of deciphering the government’s pandemic rescue packages for individuals and businesses, professional bodies said.
The ICAEW, CIOT and ATT have focused their efforts on persuading HMRC to waive late filing penalties until March. They are concerned that delaying the January 31 deadline would be too complicated, as this would require legislation and create unintended consequences in the tax credit system. Waiving penalties would instead give breathing space to struggling taxpayers and accountants.
“Many member firms are under enormous resource pressure due to assisting clients with claims for covid-19-related financial support and providing other pandemic-related business advice,” the ICAEW said. “While working every hour possible, they will still struggle to meet the filing deadline for all their clients.”
Helen Thornley, ATT technical officer, added: “What we are hopeful of seeing from HMRC is an understanding of the pressures that some agents are under. We would like to hear that adjustments will be made in respect of penalties for late filing where either the taxpayer or their agent are behind due to covid-19 pressures.”
About 11.5 million people are required to fill out a self-assessment tax return and pay any tax due by the January deadline. Last year saw 958,300 returns submitted late. Missing the deadline results in an immediate £100 fine, with the potential for further penalties, unless the taxpayer provides HMRC with a reasonable excuse.
HMRC has already confirmed it will accept the pandemic as a reasonable excuse for failing to file on time, providing that taxpayers clearly explain how they were affected in their grounds for appeal and submit the return as soon as they can.
HMRC said: “We want to encourage as many people as possible to file on time even if they can’t pay their tax straightaway, but where a customer is unable to do so because of the impact of covid-19 we will accept they have a reasonable excuse and cancel penalties, provided they manage to file as soon as possible after that.
“Support is in place for those who may struggle to pay, with customers able to spread their payment liabilities of up to £30,000 over twelve months.”
18th December 2020. | https://contractortap.com/calls-for-delay-to-self-assessment-deadline |
Since ancient times, games using role-playing and simulation have helped people navigate through important global conflict scenarios. These include military war games, as well as simulations in space, aviation, and medicine, where the stakes are high and the risks of making the wrong decision — or doing nothing — can be catastrophic. Scientists believe this approach also could be transformational in climate change, smashing through denial barriers, reaching people where other strategies have failed.
“Learning through experience engages both rational, analytic and emotional pathways that motivate us to learn more and drive us to act,” said Juliette Rooney-Varga, an environmental scientist and director of the climate initiative at the University of Massachusetts, Lowell. “In the case of climate change, we can’t afford to wait for real world experience because it will only come too late. Instead, games…can create simulated experience that deliver the benefits of learning and engagement while avoiding the costs and risks of making mistakes in the real world.”
She and her colleagues have been studying the impact of World Climate Simulation, a role-playing game that simulates UN climate talks, and found that the game motivated people outside traditional groups of climate change believers, including those who know or care little about the issue, among them free-market proponents who typically resist the science-based consensus that climate change is largely human-caused. In fact, the research found that 81 percent of those surveyed showed an increased motivation to fight climate change, according to the study.
“The research gave us an opportunity to analyze …whether or not World Climate can reach across the political divide,” Rooney-Varga said. “Climate change has become increasingly politicized and, at the same time, a growing body of social science research has shown that political views can pose an insurmountable barrier to climate communication. Overcoming this barrier would definitely be a breakthrough and could provide a major contribution to society’s ability to mitigate climate change.”
The game is a simulation of UN international climate change negotiations, designed for groups of eight to 50 people, led by a facilitator playing the role of a UN leader, while the other participants assume the role of delegates representing specific nations, negotiating blocs of interest groups. Within their assigned roles, they then work together to reach a global climate change agreement, an experience that runs for about three hours.
As in the real deliberations, each delegation presents proposals for their own greenhouse gas emissions. Also, those representing developed nations pledge contributions to the Green Climate Fund to help developing nations reduce their emissions, and adapt to change. Their decisions are then fed into a climate policy computer program, C-ROADS, which has been used to support the real negotiations. Participants receive immediate feedback on predicted effects of their proposals; first round results usually fall short, the scientists said. Then they try again.
“If I were to give a lecture about [greenhouse gas emissions], I would show the audience exactly what greenhouse gas emissions pathways would be needed,’ Rooney-Varga said. “As a World Climate facilitator, I would never show such information.” Instead, participants make their own decisions guided by how they affect global climate, using interactive climate policy models, she said. “Unlike a lecture or film, World Climate teaches through experience,” she said.
The study, published recently in the journal PLOS ONE, analyzed the effects of World Climate on more than 2,000 participants from eight countries and four continents, ranging from middle school students to CEOs. Regardless of political orientation, cultural identity, age, or gender, the participants increased their understanding of climate science, felt a greater sense of urgency and hope, and expressed an interest in learning and doing more about climate change, according to the study. The more people learned through the game, the more their sense of urgency increased, the scientists said.
Much of these effects are grounded in the social science research principles of “social norms,” which hold that members of a group often will respond to appropriate — or even inappropriate — values, beliefs and attitudes held by others with their group, she said. “We humans are very social creatures,” she said. “We take cues from our social groups, often updating our beliefs about how the world works based on what those around us believe. So, if people around us don’t believe in climate change, we are also less likely to believe in it. We literally feel better when we agree with our social group.”
Research has shown that negative social interactions cause an inflammatory response, similar to the biochemical reactions people experience as physical pain, she added. “So we’re motivated to avoid topics of conversation that we think are controversial or disagreeable,” she said. “These social factors are aggravated by another misconception about climate change: most of us underestimate the number of people who are concerned about climate change, while overestimating the number of people who dismiss it.”
For example, those personally concerned about climate change may be reluctant to share their concerns with people around them if “their perception is that most people don’t share that concern and would find such a conversation disagreeable or maybe even offensive — even though your perception is wrong,” she added. “In fact, a Yale study has shown that a majority of Americans are worried about climate change, yet you’re unlikely to talk about it because you think that doing so would be disagreeable. As a result, even people who are worried about climate change hesitate to talk about it.”
Participating in the game breaks down these communication barriers “by creating an immersive and richly social experience that people have together,” she said. “By the end of the game, it’s clear that everyone shares a concern about climate change, creating an opportunity to move on to the important next step of actually doing something about it.”
As of last July, more than 43,000 people in 78 countries globally have participated in the game, which has been reviewed by independent educators and scientists who found it supported U.S. national science education standards, the scientists said. It has been designated as an official resource for schools in France, Germany, and South Korea, they added.
“A quote from a fellow expert in climate change communication, Mark McCaffrey sums it up nicely: ‘If I were climate czar, it would be required of all high school students before they graduated . . . and incoming freshmen in college should have to do the game,’” said Rooney-Varga, who urged U.S. educators and climate communicators to try the game themselves — and then use it.
“For most of human history, experience has been our best teacher, enabling us to understand the world around us while stimulating emotions — fear, anger, worry, hope — that drive us to act,” Rooney-Varga said. “The big question for climate change communication is: how can we build the knowledge and emotions that drive informed action without real-life experience which, in the case of climate change, will only come too late? The answer appears to be simulated experience.”
Marlene Cimons writes for Nexus Media, a syndicated newswire covering climate, energy, policy, art and culture. | https://nexusmedianews.com/to-act-on-climate-change-play-on-d382c7cf0a6a/ |
Patient before and after photos and testimonials often give the best, most realistic idea for prospective patients of what the patient experience is like and what to expect from a procedure, a recovery and its potential results. Every patient that comes into our office is completely unique, with their own set of goals and concerns. We work hard to achieve each individual goal, while putting our patient’s care first.
Today we want to share one example of the many letters we’ve received from previous patients detailing their individual patient experience and how it impacted them. Oftentimes people outside the plastic surgery world may dismiss plastic surgery as a frivolous thing, but our patients prove how important, positive, and even life-changing plastic surgery can be. Read more patient experiences, like the one posted below, on our Testimonials page. | https://www.drmofid.com/testimonials/a-spotlight-on-patient-care-dr-mofids-patient-testimonials/ |
The invention discloses a fuel gas and electric arc mixed type lighter. The fuel gas and electric arc mixed type lighter comprises a shell, an electric arc ignition assembly and an electric arc ignition switch used for controlling the electric arc ignition assembly to conduct the ignition action. The electric arc ignition assembly comprises a battery, a high-voltage generation device and electric arc generation heads. The output end of the battery is in power supply connection with the high-voltage generation device. Ignition switch signals output by the electric arc ignition switch are used for enabling the battery to be in power-on and power-off connection with a power supply circuit of each discharge electrode set. A fuel gas ignition assembly is further arranged in the shell and comprises a gas tank and a prying plate. The gas tank is provided with a gas outlet fire nozzle in prying linkage fit with the prying plate. The gas outlet fire nozzle is in gas conveying connection with a fuel gas ignition port. Electric arcs generated by two discharge electrodes of each discharge electrode set are in ignition fit with fuel gas sprayed out of the fuel gas ignition port. The fuel gas and electric arc mixed type lighter has two ignition forms of fuel gas and the electric arcs, and has the beneficial effects of being compact in structure and the like. | |
“I have something hard on the sole of my foot that hurts when I support it,” “I have had a pimple between my toes and it hurts when I walk”, “I have cracked heels” …
These are usually the phrases of many patients who come to our consultations looking for solutions to the discomfort they suffer when walking, and their diagnosis is, in many cases, hardness or hyperkeratosis.
WHAT ARE THE HARDNESS ON THE FEET?
Hardnesses or hyperkeratosis are a thickening of the most superficial layer of the skin due to an increase in dead and scaly cells, caused by the pressure or continued rubbing caused by improper footwear or a bad footprint.
It is a skin protection mechanism against an area of more friction.
A more superficial hardness plate may appear or grow inward, which will be called heloma. If you want more information about this lesion, you can consult it in “Plantar heloma. Causes and treatments”.
CAUSES. Why do they occur?
Here are some of the most common causes of hardness or hyperkeratosis:
– FOOTWEAR. Inadequate footwear with a narrow toe encourages the appearance of hardness between the fingers, backs of the fingers and even in the most distal area of these. This is due to the use of a small footwear. Likewise, this lesion will also appear in the lateral area of the first and fifth fingers, if a narrow shoe is used that presses the foot. In turn, the abuse of heels or an incorrect support of the foot negatively affect this aspect.
– DEFORMITY. If the patient has a deformity in the foot, such as a claw or mallet toe, they will also be prone to suffer, as they produce more pressure on the back of the finger against the footwear or even on the pulp.
– DEHYDRATION. Dehydration of the foot is a factor that also helps its appearance. It is very common in the heel area. In the article “Dry and cracked heels?” We tell you all about this dermal lesion.
– NAIL. This accumulation of cells can also appear in the nail channels or under them.
TREATMENT. How to treat this skin lesion?
– VISIT TO THE PODOLOGIST. First of all, it should be commented that it is a mistake to try to treat or cut one’s hardnesses. You should always go to a specialized podiatrist to use the appropriate and sterilized tools, and thus avoid a bad diagnosis and cuts that cause infections and inflammations of the skin. In turn, buying products with chemical components (callicides or similar) can damage the skin causing a burn and macerating it. In the article “Callicides. Are they recommended to end the calluses and hardness of the feet” we analyze the negative consequences they can produce.
– DIABETES. If a person is diabetic or has circulation problems, special care must be taken for complications resulting from poor healing.
– CHIROPODY. This podiatric treatment that consists of the elimination of calluses and alterations in the toenails will help to have 100% healthy feet and that the slight lesions can be aggravated.
– BIOMECHANICAL STUDY. Performing a biomechanical study of the tread we can observe the points of greatest pressure when walking and, with a customized Podoactiva insoles, rebalance the pressures and be able to discharge those points of maximum foot pressure to prevent plantar hardnesses from appearing.
PREVENTION. How to prevent the appearance of hardness?
Going to the podiatrist is essential to avoid this ailment but, in our homes, we can also try to prevent it if we follow these guidelines:
– Wearing appropriate footwear is essential to prevent this ailment as it is very important to change shoes regularly. It is advisable not to always use the same shoe but to alternate using different types so that friction does not always occur in the same areas.
– Keep your feet well hydrated, especially in areas prone to hardness formation.
– Dry the feet well after washing them, taking special care between the toes.
– Apply specific moisturizers to keep them healthy. In the case of hardnesses, those containing urea are beneficial, since this component affects the skin cells, promoting their desquamation. It is important to choose the right urea concentration for each foot. For example, a medical moisturizer for feet with hard and quite dehydrated feet would have to have a concentration of 20% to 30%, while for more extreme cases it would be 40 or 50% urea. For this reason, to assess the type of foot, it is advisable to go to a podiatrist so that he can advise you on which one best suits your needs.
– Pumice stone. Using the pumice stone to exfoliate dead skin while showering will help prevent the appearance of hardness. It is important to do it superficially, and before any injury or irritation go to the specialist. It is not a treatment, but a complement.
– Go to the podiatrist at least once a year to do a review of your feet and thus detect possible ailments or pathologies.
TIPS. What is the most suitable footwear to avoid hardness?
Regarding footwear, it is always advisable to buy a suitable shoe that has certain characteristics to avoid damaging our foot. In this link we discuss several aspects to take into account when buying shoes and we leave other points to highlight below:
1. Comfortable and wide footwear that is not too hard and thin toe, because if these characteristics are not met, the shoe will generate even more pressure on the fingers and friction and discomfort will appear. In these cases, for example, hardness may appear between the toes and over them due to the pressure exerted by a tip of a narrow shoe. On the other hand, it is also not advisable to wear shoes that are too large that do not fit our size. Therefore, the recommendation is simple: wear appropriate shoes to our foot size.
2. A good fit of the footwear is essential to avoid any type of injury. For this reason, we advise you to use shoes with closure adjustment such as laces or velcro for a better fit.
3. Avoid wearing heels. However, if you use them, it is recommended a wide heel of about 3 or 4 centimeters, since the higher the entire weight of your body will be concentrated on the forefoot with more pressure on it and the fingers.
4. Footwear that provides stability and that contains rigid buttresses to hold the foot well, in addition to avoiding thin soles to have less reactive ground forces. This is beneficial for shock absorption.
5. In addition, we must buy shoes that are made of quality materials and breathable fabrics. These should be alternated and not always use the same so that it does not generate continuous pressure at the same point and promote hardness.
In short, hardnesses or hyperkeratosis are a very common skin lesion among our patients. On many occasions, chiropody is the treatment we apply to them, but this will depend on the characteristics of the person and in what state their feet are. However, what is certain is that this condition has to be treated by a specialist to avoid increasing the problem. | https://www.gotplant.co.za/ |
Studio Visit With Xuan Chen: BETWEEN 2D Illusion and 3D Complexity
Sneak peak into my studio and my art-making processes. Studio Visit interview by Layla Leiman.
Thanks to ArtMaze Magazine in London.
Light and color are the subjects of Xuan Chen’s abstract visual art. Drawing influence from the California Light and Space Movement and Color Field abstraction, her dazzling artworks exist between the parameters of 2D surfaces and 3D forms. Part paintings, part wall sculptures, Xuan’s artworks leap out at the viewer and invite closer inspection. Using bright, neon color palettes, thread, pooled layers of paint, geometric shapes and the interplay between negative and positive space, Xuan’s project-based work can be understood as an ongoing exploration of the myriad properties of light.
Named after the Chinese ink-brush Xuan paper, one might think that Xuan was always destined to be an artist. But that’s not how her story goes. Growing up in China before immigrating to the USA with her family, Xuan only started taking art classes while she was finishing up her engineering degree at UC Berkely. This background perhaps accounts for Xuan’s almost scientific approach to deconstructing visual elements into their core conceptual characteristics before refiguring them in her abstract works.
We were very happy to have the opportunity to catch up with Xuan and find out more about her creative process, her thoughts on color, light, and the New Mexican desert. Enjoy!
Read Full Interview Here. | https://xuanchen.net/2017/05/27/interview-layla-leiman-artmaze-magazine-london/ |
the fearlessness to embrace the unknown.
Drawing on poetry, literature and a myriad of artistic influences including Japanese Notan design, Matisse paper-cuts and the organic landscapes of Georgia O’Keefe, Nikolova-Kratzer creates photographic compositions which become sculptural in their focus on the object yet have the depth and thought of a painting. Using geometrical shapes and floating planes, these works build on her preceding series of landscapes taking them to a higher level of abstraction. With the materiality of the photographic medium, she seeks to record intangible aspects of the landscape, as she experiences them, through immersion and observation, without the camera’s capacity for transcription.
Her practice is inextricably linked to her way of life. The physical process of creating work uses her daily ritual of walking in the redwood forests near her home in Oakland, California to connect with nature and respond intuitively whilst reflecting her belief in the concept of immanence.
About Nadezda Nikolova-Kratzer
Nadezda Nikolova-Kratzer (b. 1978, former Yugoslavia) is an artist working with wet plate collodion photograms – a historical technique dating back to the 1850s which uses light-sensitive salts to cover a glass plate before exposing it to the light in a portable darkroom. Her practice is informed by an experimental approach to early photographic processes and her interest in the image as an object. Captivated by the fluidity of wet plate collodion, she manipulates the medium while simultaneously courting chance intrinsic to handmade photography: “I spray, dab and brush on the chemistry in a performative enactment rather than an image capture. (Sometimes, the brush strokes leave physical marks on the emulsion.) In essence, I am negotiating with the chemistry, guiding it. But only to a point. The chemistry has a say in the final image.” Nadezda Nikolova-Kratzer.
The abstract landscape series, Elemental Forms, Landscapes and Elemental Forms, Landscape Rearticulated, emerged as the artist’s direct response to her surroundings and to feeling a sense of wellbeing and security within the landscape. She believes that each locale has its specific identity, history,
and emotional imprint. Nadezda Nikolova-Kratzer has a degree in conservation and environmental sciences and a Master’s in Public Policy. She went on to study photography and historic processes at George Eastman Museum with
Mark Osterman and at the University of Kentucky. She was a finalist for the 2018 LensCulture Exposure Awards. She lives and works in Oakland, California.
About HackelBury Fine Art
Founded by Sascha Hackel and Marcus Bury, HackelBury Fine Art deals in 20th and 21st century artworks. Established in 1998, the London gallery in Launceston Place is committed to nurturing long-term relationships with both artists and clients. It continues to evolve and progress through an expanding
program of gallery exhibitions, museum projects and publishing ventures.
The small group of artists with whom HackelBury work, represent a diversity of practice, pushing the boundaries of various media. The work and practice of these artists encompasses the worlds of photography, painting, drawing, sculpture, architecture and performance. Each artist, whether emerging or established, creates work defined by a depth of thought and breadth and consistency of approach. | https://artstyle.international/2021/07/02/hackelbury-fine-art-london-is-pleased-to-present-elemental-forms-landscape-a-solo-exhibition-of-new-work-by-nadezda-nikolova-kratzer/ |
The TInnGO project has established 5 key criteria for gender and diversity-smart products and services – products should be Effective, Attractive, Affordable, Sustainable, and Inclusive. The ‘EAASI’ checklist is a tool for evaluating smart mobility products from the perspective of these 5 criteria. The focus of this tool is to make gender- and diversity-smart thinking explicit in an evaluation of ‘smart mobility’ solutions, which gives it a strong appeal over more generic ‘usability’ methods and assessment tools.
Using the checklist helps you to:
- Evaluate a product or design for each indicator according to your explicit design goals
- Evaluate a product or design against EAASI goals, Effective, Attractive, Affordable, Sustainable, and Inclusive.
- Take account of intersectional diversity and Inclusivity: consider diverse group needs and identify who may be excluded from using the product and why
- Compare evaluations through the rating system
The checklist is designed to be used in several contexts: by designers as a self-checking tool, to develop a brief or develop empathy for diverse user groups; by evaluators, to evaluate a product for procurement to check how ‘diversity or gender smart’ it is; or by independent evaluators perhaps comparing marketplace products for review.
The EAASI tool is presented here with brief instructions, as a blank checklist of questions, with space for answers and ratings, plus worked examples to illustrate how it might be completed. | https://transportgenderobservatory.eu/eaasi-product-evaluation-tool/ |
Massive Galaxies Undiscovered For Years Detected In Space
Scientists have discovered several galaxies that remained unseen since we first studied the galactic space. And with the advancement in technologies, more of such discoveries are made consistently. The latest developments come after a few days following the discovery of two black holes in the Milky Way galaxy.
Details Of The New Findings:
The study conducted by a group of astronomers from the University of Tokyo reveals that there are around 39 galaxies which have remained undiscovered until now. One of the primary reasons for them to remain a mystery was the large distance which reduces their brightness making them hard to detect.
How Was The Study Completed?
The astronomers used a powerful satellite - the ALMA array to detect the light emitted by these undetected galaxies. This satellite can detect the wavelength in sub-millimeter levels making it easy to locate distant objects in the space.
As per Tao Wang, one of the researchers, the existence of these galaxies and their age has been a topic of discussion for them. "It was tough to convince our peers these galaxies were as old as we suspected them to be. Our initial suspicions about their existence came from the Spitzer Space Telescope's infrared data," he said.
However, the ALMA array telescope is quite powerful and had captured the minute details even at submillimeter level wavelengths. Wang quoted "But ALMA has sharp eyes and revealed details at submillimeter wavelengths, the best wavelength to peer through dust present in the early universe. Even so, it took further data from the imaginatively named Very Large Telescope in Chile to prove we were seeing ancient massive galaxies where none had been seen before."
Explaining further, Wang revealed that this is the first time that these many galaxies have been discovered collectively and how it contravenes the current models during the initial period of the cosmic evolution.
"This is the first time that such a large population of massive galaxies was confirmed during the first 2 billion years of the 13.7-billion-year life of the universe. These were previously invisible to us and the finding contravenes current models for that period of cosmic evolution and will help to add some details, which have been missing until now."
What The New Findings Suggest?
The latest study suggests that there are numerous undiscovered galaxies in the outer space hidden millions of light-years away. It also gives an insight on the galaxy formation pattern and how they age while shedding light on the black holes at their center. Moreover, it is being said that the size of the black holes at the center of a galaxy is proportional to the size of the universe. All these latest findings indicate the existence of unidentified galaxies in the universe and we might see more of them in the future.
We use cookies to ensure that we give you the best experience on our website. This includes cookies from third party social media websites and ad networks. Such third party cookies may track your use on Gizbot sites for better rendering. Our partners use cookies to ensure we show you advertising that is relevant to you. If you continue without changing your settings, we'll assume that you are happy to receive all cookies on Gizbot website. However, you can change your cookie settings at any time. Learn more | |
Trapped Between Pavement and the Pacific
The quest to save a pack of nature’s misfits with bacon, strawberry jam, and a poop-sniffing rescue dog.
The Island That Humans Can’t Conquer
“A faraway island in Alaska has had its share of visitors, but none can remain for long on its shores.”
Where Camels Take to the Sea
“In Gujarat, India, a special breed of camel is not constrained by land—but it cannot escape the many forces of change.”
Sharing Food, Building Resilience
“If someone wants to know how a community is doing, the response, Larson explains, could be, ‘Well, how many times did people share food with each other here?’ Each community’s constellation of shared food, labor, and equipment, like nets or boats, is unique and reveals different levels of interconnection and community cohesion.”
The Oddball Dolphin of Dingle
“Living solo for decades in an Irish harbor, a dolphin named Fungie has taught us something about solitary cetaceans—maybe they prefer to be alone.”
On Knowing the Winged Whale
Are humpback whales the Justice League of the oceans?
The Wonderful, Transcendent Life of an Odd-Nosed Monkey
“The island of Borneo is the only home of the proboscis monkey, an endangered primate that is surprisingly resilient.”
Scotland’s Seaweed Showdown
The fight over a proposal to harvest kelp on an industrial level off the Scottish coast is about the survival of rich ecosystems we don’t know enough about — and the survival of local identity.
Catch Me If You Can: The Global Pursuit of a Fugitive Ship
“The tale of a notorious fishing vessel shows just how difficult combating illegal activity at sea can be.”
The Fight Over a Shitty Rock
Literally, it’s covered in guano. And what happens to it could dictate maritime laws and fishing rights worldwide. | https://longreads.com/picks/publishers/hakai-magazine/page/2/ |
Brillhart, Aaron, Host; Meteorologist has reference to this Academic Journal, PHwiki organized this Journal Introduction to the phenomenology of high temperature superconductors Patrick Lee in addition to T. Senthil High Tc Phase diagram Plan Overdoped is it `conventional What is strange about the strange metal Phenomenology of the pseudogap Transition to superconductivity Eisaki et al, PRB 69, 064512 (2004) With further increase of layers, Tc does not go up further. The inner planes have less hole in addition to may be AF ordered.
This Particular University is Related to this Particular Journal
A preliminary look: transport Overdoped metal Does it have a Fermi surface Size in addition to shape Methods to detect ARPES, deHaas-van Alphen in addition to related quantum oscillations, other eg Angle Dependant Magneto-Resistance (ADMR) Is it really a Fermi liquid with L in addition to au quasiparticles
ARPES (Angle Resolved Photoemission Spectroscopy) Overdoped metal: Is there a Fermi surface deHaas van Alphen, other `quantum oscillations: classic Fermi surface determination methods
Remarks on quantum oscillations Quantum oscillations in Tl-2201 Tc = 10 K, B upto 60 T; oscillations in both M in addition to in c-axis Thermal conductivity: Wiedemann-Franz law
Is the OD state really a Fermi liquid High Tc Phase diagram Plan Overdoped is it `conventional What is strange about the strange metal Theory interlude Phenomenology of the pseudogap 5. Transition to superconductivity The strange metal: electrical transport Linear-T resistivity near optimal doping with nearly zero intercept. Slope of resistivity/layer roughly the same (1.5 µ cm/K) as long as all materials. Sheet resistance = /d ~ (h/e^2) T/J Bi-2201
Linear resistivity at very low-T Tied to “quantum criticality Quantum critical point: second order phase transition at T = 0 Magnetotransport: Hall effect Optical transport: high frequency tail
Optical transport: low frequency peak Spin physics: spin susceptibility in addition to NMR relaxation Dynamic spin correlations: neutron scattering in LSCO
ARPES: Fermi surface structure Analysis of ARPES data Absence of L in addition to au quasiparticles
Transition to SC: onset of coherence Onset of coherence in transport Neutron resonance
Summary on strange metal Strange metal: Power laws in many physical quantities; Large Fermi surface but no L in addition to au-like quasiparticles Slow growth of antiferromagnetic spin correlations Transition to superconductivity accompanied by appearance of coherent quasiparticles in addition to a sharp spin triplet `resonance mode. Brief theory interlude Some basic questions How does a metal emerge from a Mott insulator 2. Why superconductivity Simple physical picture (Anderson1987): Superexchange favors as long as mation of singlet valence bonds between localized spins. Doped Mott insulator: Hole motion in background of valence bonds. Cartoon pictures Large doping: Hubbard-U not very effective in blocking charge motion Expect `large Fermi surface with area set by 1-x. What happens as doping is reduced to approach Mott insulator
Even more questions Last question
Brillhart, Aaron Host; Meteorologist
Brillhart, Aaron is from United States and they belong to KSWT-TV and they are from Yuma, United States got related to this Particular Journal. and Brillhart, Aaron deal with the subjects like Meteorology
Journal Ratings by Chaminade University of Honolulu
This Particular Journal got reviewed and rated by Chaminade University of Honolulu and short form of this particular Institution is US and gave this Journal an Excellent Rating. | http://www.phwiki.com/introduction-to-the-phenomenology-of-high-temperature-superconductors-patrick-le/ |
One thing the recent global pandemic brought sharply into focus is that IT professionals have to expect the unexpected if they want their company to survive. COVID-19 caught many CIOs and IT managers flat-footed with regard to maintaining operations in a suddenly 100 percent virtual environment. In fact, a study by global consultancy firm Mercer found that 51 percent of companies did not have a business continuity plan in place pre-pandemic.
In many cases, there were too few laptops to go around, inadequate remote access security in place, and no strategy for dealing with the possibility of key team members being ill or incapacitated at the same time.
In today’s uncertain and highly competitive business climate, your economic survival strategy must include not only a disaster recovery plan but also a comprehensive business continuity plan. If your business does not have a well-tested plan in place to restore operations quickly when a disaster, outage, or complete 180 in your business model occurs, you could be left open to lost revenue, lost productivity, and reputational damage that could follow the company indefinitely.
What Should Your Business Continuity Plan Cover?
The main purpose of a business continuity plan is to ensure normal business operations are possible during or soon after a disaster or unplanned disruption. To achieve this, there are five main steps to creating and maintaining your business continuity plan so it is fully functional when you need it:
- Identify risks: Create a list of all potential risks and how they will affect normal business operations.
- Evaluate risks: Determine the effect each risk would have on the company’s normal operations.
- Mitigate risks: Implement and enforce risk mitigation policies and procedures to minimize the impact of risks on the business.
- Test the plan: Conduct scheduled and unscheduled dry runs of the plan to ensure key players are always prepared and that all essential systems are covered by the plan.
- Review and update the plan: Establish a schedule for plan reviews to ensure process, policy, and technology changes are incorporated quickly into the business continuity plan.
The Importance of a Business Continuity Plan Checklist
Today’s IT environments are highly complex. With so many moving parts, IT teams often sacrifice visibility, which can lead to undetected vulnerabilities and overlooked dependencies. To ensure all risks are considered and all systems are accounted for in the business continuity plan, it is helpful to create a step-by-step guide or checklist for preparing and maintaining your plan.
Here are the 10 steps every business continuity plan checklist must include.
1. Select a planning team.
This group will be in charge of initiating and managing the business continuity and recovery effort, so choose wisely. Be sure to include representation from up, down, and across the organization as well as from every department and business line to ensure every system and dependency are included in the plan and there is a wide variety of expertise available.
2. Take inventory of all technology.
You can’t protect something if you don’t know it exists, so it is crucial to make a thorough inventory of every asset. Include hardware, software, in-house devices, mobile devices, and any personal endpoints with access to the company network.
3. Draft an initial plan.
This will be your working business plan while the final plan is being revised and reviewed. During this step, your goals are to identify objectives and set goals, identify business-critical functions, and create a recovery strategy for all possible disaster scenarios.
4. Conduct a business impact analysis.
The business impact analysis will look at all the possible sources of a business disruption, such as cyberattack, natural disaster, and power outage; determine the likelihood of a particular event occurring; and measure how the disruption will affect operations, productivity, and revenue generation.
5. Train and educate employees.
A successful business continuity plan will include a role to play for every employee, so it is important to be transparent about the process. Provide training sessions so everyone knows who is in charge of what during a crisis, how communication will be handled internally and externally, and the appropriate points of contact.
6. Secure mission-critical info.
Protecting the company’s most sensitive data is a top priority for a business continuity plan. Implement data protection best practices such as segmenting the network, digitizing hard copies of documents so they can be easily stored off-site, and creating air-gapped backup copies that can’t be corrupted by ransomware.
7. Implement a backup strategy.
Secure backups aren’t just for confidential files. For a business continuity plan to succeed, all business-critical data, systems, and applications need to be backed up frequently with copies stored off-site, preferably in the cloud, and on a few different forms of media to ensure full recovery is possible.
8. Ensure there are failover/redundancy options.
Fire, floods, hurricanes, and other natural disasters can easily wipe out a data center. Be sure your data is stored in a facility that provides automated failover capabilities so operations can continue regardless of what is going on locally.
9. Create a communications plan.
Communication is critical during a crisis to maintain calm and confidence that recovery is underway. Your communications plan should include specific messaging targeting each different audience segment, including clients, staff, stakeholders, and the public. Be sure to tailor messaging appropriately for the medium (e.g., social media, website, telephone, and email).
10. Test and update often.
There’s a popular saying in the IT industry: “If you don’t test your business continuity plan, you don’t have a business continuity plan.” It doesn’t matter how much effort you put into a business continuity plan if you don’t ensure it works. Create a testing schedule to check that the plan does, in fact, allow business operations to continue, and spring surprise assessments on employees to gauge their preparedness. Conduct plan reviews and updates annually or after a major event such as a system update, software or hardware upgrade, security breach, or cyberattack.
A business continuity checklist is like a safety net for your recovery efforts. By taking a methodical, step-by-step approach to creating and testing your comprehensive business continuity plan, you will have peace of mind that a crisis or disruption doesn’t have to negatively impact revenue or customer confidence.
Learn more about protecting your organization from downtime in our guide Smart Strategies for Business Continuity. | https://info.arcserve.com/blog/things-include-business-continuity-plan-checklist |
SSB Junior Assistant / Stenographer Written Exam Syllabus is discussed here. The Odisha State Selection Board is gong to conduct the Written Exam for Jr. Assistant and Stenographer Posts on 20th December 2020. Thus the aspirants can get an overview or re look the Written Exam Pattern and Syllabus through this page.
Odisha SSB Jr. Assistant / Stenographer Written Exam Pattern
The Selection of 171 Jr. Assistant / Stenographer for Universities in Odisha State will be through this Recruitment. The prospective candidates through the Selection shall have to appear for a Written Examination of 100 Marks. Candidates need to qualify this test to appear for a skill test in the next phase. The Written Exam Mark Distribution is ready below for the willing candidates below –
- The Written Exam is an MCQ based Test.
- Questions will be objective in nature.
- The time duration of the test is 1&1/2 Hours.
You may read || SSB Odisha Jr Assistant Exam Date / Admit Card updates
Odisha SSB Junior Assistant / Steno Vacancies Overview
The SSB Odisha Junior Assistant & Steno Vacancies are announced for the State Universities in Odisha. Thus the applicants will be selected for the clerical posts through the written exam and skill test. A brief overview of the vacancy notice is as follows –
SSB Odisha Junior Assistant & Stenographer Syllabus
Coming to the SSB Odisha Junior Assistant and Steno Written Syllabus 2020, the applicants can refer to the topics discussed below. Hopefully, covering the topics during the exam preparation will help the aspirants prepare better for the upcoming test. The Written Exam Syllabus according to the official subjects are as under –
General English Syllabus
- Synonyms
- Antonyms
- English Vocabulary
- Fill up the blanks
- Correction of sentence
- Tense
- Verbs
- Preposition
- Comprehension
- Letter Writing
- Phrases
- Transformation of sentences
General Knowledge & Current Affairs Syllabus
- History of Odisha
- Geography of Odisha
- Natural Resources of Odisha
- Major Industries in Tripura
- Employment in Tripura
- Sports & Prizes
- Sports Personalities
- Who is who
- Abbreviations
- Constitution of India
- Inventions and discoveries
- Sports
- Art and culture
- Every day Science
General Mathematics Syllabus
- LCM (Lowest Common Multiple)
- HCF (Highest Common Factor)
- Profit and Loss
- Algebra
- Time and Distance
- Number system
- Time and Work
- Simple and Compound Interest
- Decimals, Fractions
- Ratio and Proportion
- Percentages
- Pipes & Cistern
- Mensuration
- Geometry and Trigonometry
- Elementary Statistics
- Square root
- Age Calculations
- Calendar & Clock etc.
Reasoning & Mental Ability Syllabus
- Figure odd one out
- Direct Sense
- Figure Series completion
- Venn Diagram
- Number series
- Coding/Decoding
- Number Series
- Analogies
- Relationship concepts
- Odd one out
Hopefully the aspirants by now have a complete overview of the Odisha SSB Junior Assistant and Steno Written Exam Syllabus. Hence, prepare for the test accordingly and refer the suggested books mentioned below. | https://sarkariexam.co.in/ssb-odisha-junior-assistant-syllabus/ |
By: Osman N. Sanyer, MD
We had to put our eleven-year-old family dog to rest this week. Bella, who was apparently well and healthy two weeks prior, had stopped eating and became obviously ill a few days ago. When tests revealed that she was riddled with cancer, the choice to reduce her suffering, while painful, was not hard to make. Last winter we had to help our sixteen-year-old cat move on from the pain of a chronic untreatable illness. Given their ages, neither the illnesses or deaths were unexpected, but both left all of us profoundly saddened. I’m sure this response is no great surprise to those who choose to share their homes with pets. But the residual sense of emotional loss has given me pause to wonder about what we can learn from the lives, and deaths, of our animals.
From the scientific standpoint, there is fairly extensive literature documenting the benefits of pet ownership. The data shows that when we welcome pets into our lives, we lower blood pressure and cholesterol, increase our physical activity, spend more time outside, form more social connections, and experience decreased loneliness and isolation. If we consider the leading causes of morbidity, mortality, and emotional distress, this research suggests that pet ownership could be considered a fairly cost-effective primary prevention for several of the leading determinants of health: cardiovascular disease linked to obesity and inactivity, and depression linked to social isolation and inadequate time in nature. The downsides to pet ownership are fairly limited: possible stress related to work or travel schedules, potential allergy issues, the costs of food and veterinary care, and a few relatively rare (and preventable) infections. In fact, the biggest negative impact on human health by having a pet may be the grief reactions we experience when a pet dies.
A more intangible question relates to an understanding of why we experience such grief at the loss of a pet (despite our intellectual understanding of normal pet lifespans), and what we can learn about our own lives from our pets. I think it can be distilled down to two fairly simple concepts:
- Over time, pets create memories of connection with others, both family and friends. Our animal companions appear as threads of continuity over time in our memories, photos, stories, and maturation (or aging). While we often talk about animal age in “dog years” or “cat years,” we also mark epochs of our own lives in the span of time a pet was with us. In our household, our cat was a 6th birthday present for my daughter and lived with us until the winter after her college graduation. Bella arrived on Christmas day when my kids were 12 and 14. She was present through their teen years and always eager to welcome them on return trips home during college and beyond. I realize that, for me, the passing of the two pets marks, with a jolt, the passage of time, not only in the lives of my now adult children but in my own. Their mortality serves as a reminder of my own. I find myself contemplating a home without a pet for the first time in nearly thirty years. And I wonder, “How many “pet lives” remain in my own?”
- Our pets may be the closest thing we ever get to a “perfect” friend or companion. They listen without judgment, are usually happy to see us (my personal bias is that this is harder to recognize in cats), remain loyal despite our own failures in friendship, and create opportunities for us to engage other people more easily. When we lose a pet, we lose our idealized version of a “best friend.”
The data and observations I’ve shared above may offer us some lessons we can take forward from our own lives, independent of whether we share them with pets. The more tangible and concrete include the commitment to go outside and move when we have the chance, it’s good for our health. Greet people we care about with joy, acknowledge that their presence brings meaning to our lives, and allow others to have the gift of our own presence without attached judgment.
A more challenging question is to ask how we can best keep our own mortality in mind. Is there a way to more consistently take stock of what has been, and what is coming? It may be healthy for us to ask ourselves, with some regularity, “How many pet lives do I have left?” and, given that the answer is finite, “What do I want to do be doing with my time… right now?”
Osman N. Sanyer, MD, is a Professor (clinical) in the Division of Family Medicine in the Department of Family and Preventive Medicine at the University of Utah. | https://fammedvitalsigns.com/2018/09/11/our-pets-lives-and-deaths-and-how-each-can-inform-and-transform-our-own-lives/ |
NEW DELHI: Twitter on Monday said it will label tweets that contain "potentially harmful, misleading information" related to COVID-19, and provide additional context to curb spread of fake news around the pandemic that has claimed thousands of lives globally.
Like other digital platforms, including Google and Facebook, Twitter is also undertaking these measures to ensure that people have access to information from trusted health experts and organisations like World Health Organization at a time when nations across the world are combating the coronavirus pandemic.
Earlier this year, Twitter had introduced a new label for tweets containing synthetic and manipulated media that aims to mislead people, and had said it would take steps including removal of tweets if such content has the potential to harm public safety.
The crackdown on such content comes amid widespread concerns globally over altered, forged content on social media, including deepfake videos, and its catastrophic implications.
Twitter, in a blogpost on Monday, said, "In serving the public conversation, our goal is to make it easy to find credible information on Twitter and to limit the spread of potentially harmful and misleading content".
"Starting today, we're introducing new labels and warning messages that will provide additional context and information on some tweets containing disputed or misleading information related to COVID-19," it said, adding that this will also apply to tweets sent before May 11.
Reuters
An example image from Twitter shows how the company will add warnings to some tweets with misleading information related to the coronavirus disease. Twitter said it will take action based on three broad categories -- misleading information, disputed claims, and unverified claims.
Tweets containing misleading information will either be removed or contain a label with links to trusted information sources, depending on the propensity for harm.
Tweets featuring disputed claims will either carry a label or warning depending on the severity of content. No action will be taken for tweets containing unverified claims, Twitter said.
The company said these labels will link to a Twitter-curated page or external trusted source containing additional information on the claims made within the tweet.
These warnings, it said, will inform people that the information in the tweet is in contradiction to public health experts' guidance before a user views the content.
However, embedded tweets and tweets viewed by people not logged into Twitter may still appear without a label, the company said.
"Our teams are using and improving on internal systems to proactively monitor content related to COVID-19. These systems help ensure we're not amplifying tweets with these warnings or labels and detecting the high-visibility content quickly," Twitter said.
It added that the microblogging platform will also continue to rely on partners to identify content that is likely to result in offline harm.
"Given the dynamic situation, we will prioritise review and labeling of content that could lead to increased exposure or transmission. We'll learn a lot as we use these new labels, and are open to adjusting as we explore labeling different types of misleading information," it noted.
Not Just Fake News, Be A Pro At Spotting All Things Bogus On the Internet
of 10
Next
Prev
Play Slideshow
Fake News
17 Sep, 2018
Fake news is just the tip of the iceberg. The truth is, the internet is full of lies and you need a keen eye to segregate the bogus from the bonafide.
Next
Job Offers
17 Sep, 2018
Fraudulent job emails usually don’t have detailed information about the role, company and package. Also, if an offer asks you to pay for an appointment or interview, it’s fake. No employer asks for money in the name of security deposits in advance.
Next
Social Profiles
17 Sep, 2018
Social media influencers often grumble about fake profiles. But they are not difficult to identify — a fake profile will have a stock image or no image, not many friends, lack of activity in the platform and too many or too few followers. Then there are bot accounts that are fake voters with loud opinions or obsessive re-tweeters.
Next
Products
17 Sep, 2018
Do you know one among four products in your shopping wishlist at an e-commerce site can be counterfeit? Irrespective of what you intend to buy, compare the product with the one listed on the brand’s official website, and look for the assurance tag on the product to ensure it’s genuine. Also, avoid products offering heavy discounts.
Next
Reviews
17 Sep, 2018
Fake reviews are nothing new on hotel, restaurant, book and e-commerce sites. But they can be damaging. Unlike genuine reviews that contain words specifically relating to the place or product in question, the fake ones are vague and include repeated use of same words or marketing terms. Questionable grammar and the use of superlatives are also signs of suspicious reviews. | |
WATCH: Chef Salma has no regrets about swapping a career as a lawyer for one as a chef.
She worked hard to achieve success and now wants to teach and inspire others to join the culinary world.
Chef Salma Saleh seemed destined for a career as a lawyer, until her passion for cooking made her realise there was only profession for her. Following her love for food, Chef Salma has worked hard to achieve success and now wants to teach and inspire others to join the culinary world.
For more chef and culinary inspiration, sign up to our newsletter.
WATCH: Chef Seif wants to raise the profile of chefs in Egypt. Here’s how.
WATCH: Chef Khattab’s ‘unconventional’ career choice is often questioned by others. Here is her story. | https://www.unileverfoodsolutions.eg/en/chef-inspiration/a-chefs-tale/chef-salma.html |
The key purpose of Mother Tongue Language (MTL) education is to equip our young with effective communication skills and to create a greater awareness and appreciation of our culture and values, which in turn enables our young to have the confidence to connect with similar language communities across Asia and the world.
The MTL curriculum aims to develop our young to be proficient language users who have strong foundational language and literacy skills. The curriculum provides students with opportunities to interact in real-life settings and immersive environments, strengthening language skills such as listening, speaking, reading and writing. The infusion of Information and Communications Technology (ICT), Character and Citizenship Education (CCE) and Social and Emotional Learning (SEL) into the curriculum further enhances the learning and exposes our young to the culture and values woven into the curriculum. The curriculum also aims to develop higher order thinking skills and exposes students to a wide variety of literary and authentic texts. This is intended to make MTL a living language that enables our young to lead purposeful lives, and further develop their interest and build a keen sense of life-long learning of MTL in our children.
Changes in the global situation created new challenges in classroom teaching. The MTL curriculum has made many innovations in the face of these challenges, providing quality resources that enable students to learn MTL in the classroom and at home.
The information featured in our MTLS MOE MTL curriculum webpage aims to provide parents and educators with an understanding of the different opportunities for MTL learning, beginning from Pre-School through Primary, Secondary and Pre-University. There will also be tips for parents and educators to gain insights and ideas to bring the joy of learning MTL to our young, and for them to be able to better engage the children in meaningful MTL learning experiences. | https://www.mtls.edu.sg/exhibits/chinese-exhibitions-b/moe-curriculum |
The Scale Operator will provide customer service based and general operational support to the BEST Land Farm Bioremediation & Compost Office. The chosen individual will ensure that all vehicles entering the landfill are inspected, weighed and charged appropriately.
The required schedule is Monday to Friday, 8:00 a.m. to 5:00 p.m. from June to August 2017
Skills and Competencies
-
Previous customer service experience in an industrial environment
-
Ability to handle cash and perform basic accounting and recordkeeping duties
-
Valid driver’s license and access to a reliable personal vehicle
-
Equipment operating experience preferred but not required
-
Ability to work alone at times
Key Accountabilities
-
Weigh vehicles entering and leaving the landfill site and calculate the appropriate fee to be charged
-
Answer customer inquiries relative to landfill use and charges for recycling
-
Provide excellent customer service and professionally represent the organization
-
Clean and maintain the office as required
-
Support operations with other administrative or yard based tasks as assigned
GFL Environmental is an equal opportunity employer and encourages applications from all qualified individuals. We thank you for your interest. Only those selected for an interview will be contacted.
QUESTIONS?
If you would like to learn more about this position, please email your questions to GFL Human Resources. | https://careers.gflenv.com/Jobs/Details/1001569 |
The difference between the intervention and the control group in the change from baseline to the weighted mean of the 3- and 8-week follow-up (measured as AUC) for the European Organisation for Research and Treatment of Cancer Quality of Life Questionnaire (EORTC QLQ-C30) scale score that constitutes the primary need. The primary need can be a need related to the following: physical function, role function, emotional function, pain, shortness of breath, lack of appetite and nausea/vomiting.
The difference between the intervention and the control group in the change from baseline to the weighted mean of the 3- and 8-week follow-up (measured as AUC) for the European Organisation for Research and Treatment of Cancer Quality of Life Questionnaire (EORTC QLQ-C30) scale score that constitutes the primary need. The primary need can be a need related to the following: physical function, role function, pain, shortness of breath, lack of appetite, nausea, depression, and tense/worried/anxious.
The difference between the intervention and the control group in the change from baseline to the weighted mean of the 3- and 8-week follow-up (measured as AUC) for all the symptoms and problems measured by the EORTC QLQ-C30 and for anxiety and depression measured by the The Hospital Anxiety and Depression Scale (HAD scale)
Survival [ Time Frame: From the start of the trial to minimum three months after the end of the intervention. ] [ Designated as safety issue: No ]
Survival.
Economical consequences [ Time Frame: From the start of the trial to minimum three months after the end of the intervention. ] [ Designated as safety issue: No ]
Economical consequences measured as the expenses to health care services (treatments, hospitalisation, outpatient visits, emergency room visits, and visits with the general practitioner).
Patient reported Satisfaction with services provided by the health care system measured with the questionnaire FAMCARE-p16 [ Time Frame: 8 weeks ] [ Designated as safety issue: No ]
The difference between the intervention and the control group in the change from baseline to the weighted mean of the 3- and 8-week follow-up (measured as AUC) in the patients' evaluation of treatment and care provided by the health care system measured by the FAMCARE-p16 and four additional items developed for this trial
Patient reported Satisfaction with services provided by the health care system meassured with the questionnaire FAMCARE-p16 [ Time Frame: 8 weeks ] [ Designated as safety issue: No ]
The difference between the intervention and the control group in the change from baseline to the weighted mean of the 3- and 8-week follow-up (measured as AUC) in the patients' evaluation of treatment and care provided by the health care system measured by the FAMCARE-p16 and four additional items developed for this trial
The difference between the intervention and the control group in the change from baseline to the weighted mean of the 3- and 8-week follow-up (measured as AUC) for all needs measured by the 3-levels-of-needs questionnaire (3LNQ). A need is defined as patients having recieved inadequate help or no help despite a wish for help.
Current Other Outcome Measures ICMJE
Not Provided
Original Other Outcome Measures ICMJE
Not Provided
Descriptive Information
Brief Title ICMJE
A Trial Investigating the Effect of Specialised Palliative Care on Symptoms, Survival, Economical Factors and Satisfaction
Specialised palliative care (SPC) seeks to relieve suffering and improve quality of life in patients with a life threatening disease such as advanced cancer. Many patients with advanced cancer are not in contact with SPC. Previous studies have shown that among advanced cancer patients not referred to SPC there is a significant prevalence of symptoms, problems and needs. The aims of the present study are to investigate whether patients with metastatic cancer, who report palliative needs in a screening, will benefit from being referred to SPC and to investigate the economical consequences of such a referral.
Detailed Description
The trial is a randomised, clinical, multicenter trial including 6 Danish SPC-centres. The basic principle is that patients with palliative needs (see inclusion criteria) are identified at oncological departments and randomised to either (i) standard treatment plus SPC (intervention group) or (ii) standard treatment (control group).
Patients will be identified by the following procedure: A) Each week a research nurse reviews the medical records of consecutive patients seen in oncological out-patients clinic. B) Eligible patients are asked to fill out a questionnaire (the screening) that investigates symptoms and problems. The patients are told that their questionnaire will be evaluated and that the research nurse will contact some of the patients later on with information about a RCT. C) Those patients who report at least one palliative need in the questionnaire (see inclusion criteria) and have four additional symptoms are contacted by the research nurse who provide the patients with written and verbal information about the RCT. D) Patients who give informed consent are randomised.
Detailed statistical analysis plan:
Analysis of the primary outcome The primary outcome analysis will be a modified ITT analysis. Patients who withdrew consent after randomisation, who were randomised by mistake and did not fulfil our inclusion criteria, or who were not alive at the time of the follow-ups, will be excluded from the primary analysis. All exclusions will be shown in the CONSORT flow-chart of patient participation.
In the primary outcome analysis we will use multiple imputation for non-responders if there are more than 5% missing outcomes. In total, we will make 20 different data-sets with imputation based on a regression model using predictive-mean-matching using the MI and the MI ANALYSIS procedures in SAS. The primary outcome analysis will be made as a multiple regressions adjusted for the stratification variable if it is normally distributed.
Sensitivity analyses of the primary outcome We will make five sensitivity analyses: 1) a fully adjusted analysis including all relevant covariates, 2) a complete case analysis, 3) an analysis including a model for repeated measurement, 4) a per protocol analysis, 5) an analysis including imputations for those who died.
Analysis of secondary outcomes The analyses of the seven scales from EORTC QLQ-C30 (physical function, role function, emotional function, nausea and vomiting, pain, dyspnoea, or lack of appetite) will be made using the same principles as described for the primary outcome including the sensitivity analyses. Survival will be analysed using Kaplan-Meier plot. Patients who are alive three months after the end of data-collection will be censured on this date. A Cox regression will be made adjusted for the stratification variable. A sensitivity analysis will be made adjusting for all relevant covariates.
Exploratory outcomes and subgroup analyses For serious adverse events we report the number of hospitalisations, the number of acute hospitalisations and the number of deaths in the eight week trial period. The analyses of the other exploratory outcomes will not be dealt with in detail here. The overall principles regarding questionnaire data (the remaining scales from EORTC QLQ-C30, HADS and FAMCARE-P16) are that they will be analysed as complete case analyses.
Significance levels All tests will be two-tailed. For the primary outcome the risk of type I error is set to 5% (i.e., a significance level of P<0.05). As we have 8 secondary outcomes, we adjust the significance levels to P<0.01 to control the familywise (or cumulative) type I error due to multiplicity. The P-values of the exploratory outcomes will be provided, but it will be made clear that the analyses are exploratory.
Register-data, data-management and analyses Survival will be retrieved from the Danish Civil Registration System (CPR), and serious adverse events and contacts from The Danish Patient Registry (Landspatientregistret).
Data management will be done by project manager Anna Thit Johnsen. Analyses will be made by statistician Morten Aa. Petersen, who is blinded to the identity of the two intervention groups, which will be denoted Y and X. Results will be presented blinded in the same way for the investigators, and conclusions regarding the results will be drawn by the investigators and written down while the interventions are still blinded. The blinding will not be broken before all analyses of primary and secondary outcomes have been conducted.
The interventions given by the SPC centres follow the the WHO and the EAPC guidelines for palliative care. It is not possible in advance to describe the interventions more specifically as these will be adjusted to each particular patient. As part of the study the medical records of all patients in the intervention group will be reviewed with the purpose of describing the interventions given for the different symptoms and problems.
Study Arm (s)
Experimental: Specialised palliative care (SPC) group
Patients continue with their standard treatment (typically they receive treatment in one or more hospitals departments and from their GP). In addition, they are offered a consultation in the SPC out-patient clinic (or at home if the patient cannot attend the hospital) as soon as possible and no more than one week after randomization. If possible, each patient will have at least two contacts to the SPC in the trial period.
Intervention: Other: Specialised palliative care (SPC)
No Intervention: Standard care group
Patients continue with their standard treatment. They are instructed to contact either their GP or their hospital department if they feel that additional treatment or care is needed.
| |
- A Hospital Level Analysis of 30-Day Readmission Performance for Heart Failure Patients and Long-Term Survival: Findings from Get With The Guidelines-Heart Failure.
- A Subgroup Analysis of the Impact of Vortioxetine on Functional Capacity, as Measured by UPSA, in Patients with Major Depressive Disorder and Subjective Cognitive Dysfunction.
- A framework for the conceptual modelling of assistive technology device outcomes.
- A state-wide review of contemporary outcomes of gastric bypass in Florida: does provider volume impact outcomes?
- A systematic review of the neurocognitive effects of magnetic seizure therapy.
- Acceptance and psychological change at the higher levels of care: A naturalistic outcome study.
- Advanced imaging and hospice use in end-of-life cancer care.
- Advances in Stroke 2017.
- Adverse clinical and economic outcomes attributable to methicillin resistance among patients with Staphylococcus aureus surgical site infection.
- African-American crack abusers and drug treatment initiation: barriers and effects of a pretreatment intervention.
- Allocating HIV-prevention resources: balancing efficiency and equity.
- Ambulatory blood pressure in the dash diet trial: Effects of race and albuminuria.
- American Urogynecologic Society Prolapse Consensus Conference Summary Report.
- Anal neoplasms.
- Anemia and blood transfusion in trauma patients admitted to the intensive care unit.
- Antipsychotic effects on estimated 10-year coronary heart disease risk in the CATIE schizophrenia study.
- Aortoiliac angulation and the need for secondary procedures to secure stent graft fixation: which angle is important?
- Articulating external fixation to overcome nerve gaps in lower extremity trauma.
- Association of Delivery System Integration and Outcomes for Major Cancer Surgery.
- Barriers to Care for Persons With Sickle Cell Disease: The Case Manager's Opportunity to Improve Patient Outcomes.
- Bayesian semiparametric regression models for evaluating pathway effects on continuous and binary clinical outcomes.
- Cardiovascular Outcomes Assessment of the MitraClip in Patients with Heart Failure and Secondary Mitral Regurgitation: Design and rationale of the COAPT trial.
- Carotid endarterectomy and race: do clinical indications and patient preferences account for differences?
- Case-mix adjustment of adolescent mental health treatment outcomes.
- Changing CHANGE: adaptations of an evidence-based telehealth cardiovascular disease risk reduction intervention.
- Children and welfare reform: a view from an experimental welfare program in Minnesota.
- Clinical Outcomes and History of Fall in Patients with Atrial Fibrillation Treated with Oral Anticoagulation: Insights From the ARISTOTLE Trial.
- Clinical outcomes of bivalirudin for ischemic heart disease.
- Cognitive Effects of MIN-101 in Patients With Schizophrenia and Negative Symptoms: Results From a Randomized Controlled Trial.
- Comparing pharmacological treatments for cocaine dependence: Incorporation of methods for enhancing generalizability in meta-analytic studies.
- Comparison of automated interval measurements by widely used algorithms in digital electrocardiographs.
- Complete revascularisation in ST-elevation myocardial infarction and multivessel disease: meta-analysis of randomised controlled trials.
- Complications arising after implantation of DDD pacemakers: the MOST experience.
- Content and Face Validity and Feasibility of 5 Candidate Instruments for Psoriatic Arthritis Randomized Controlled Trials: The PsA OMERACT Core Set Workshop at the GRAPPA 2017 Annual Meeting.
- Convex mixture regression for quantitative risk assessment.
- Cost effectiveness in Canada of eptifibatide treatment for acute coronary syndrome patients using PURSUIT subgroup analysis.
- Depression and coronary heart disease: recommendations for screening, referral, and treatment: a science advisory from the American Heart Association Prevention Committee of the Council on Cardiovascular Nursing, Council on Clinical Cardiology, Council on Epidemiology and Prevention, and Interdisciplinary Council on Quality of Care and Outcomes Research: endorsed by the American Psychiatric Association.
- Depressive Symptoms, Exercise Capacity, and Clinical Outcomes After Lung Transplantation.
- Developing tailored instruments: item banking and computerized adaptive assessment.
- Development and validation of the Nasal Obstruction Symptom Evaluation (NOSE) scale.
- Different interventions, same outcomes? Here are four good reasons.
- Direct repair of the pars interarticularis for spondylolysis and spondylolisthesis.
- Do hospitals and surgeons with higher coronary artery bypass graft surgery volumes still have lower risk-adjusted mortality rates?
- EU/US/CTAD Task Force: Lessons Learned from Recent and Current Alzheimer's Prevention Trials.
- EUS-guided fine needle aspiration of the liver: indications, yield, and safety based on an international survey of 167 cases.
- Early identification of children at risk for costly mental health service use.
- Effect of institutional volume and academic status on outcomes of coronary interventions: the IMPACT-II experience.
- Effectiveness of a barcode medication administration system in reducing preventable adverse drug events in a neonatal intensive care unit: a prospective cohort study.
- Effectiveness of percutaneous coronary intervention in cardiac allograft vasculopathy.
- Effects of Adding an Internet-Based Pain Coping Skills Training Protocol to a Standardized Education and Exercise Program for People With Persistent Hip Pain (HOPE Trial): Randomized Controlled Trial Protocol.
- Effects of a caregiver-inclusive assistive technology intervention: a randomized controlled trial.
- Effects of candesartan in patients with chronic heart failure and preserved left-ventricular ejection fraction: the CHARM-Preserved Trial.
- Effects of continuation electroconvulsive therapy on quality of life in elderly depressed patients: A randomized clinical trial.
- Efficacy and Safety of Glutamine-supplemented Parenteral Nutrition in Surgical ICU Patients: An American Multicenter Randomized Controlled Trial.
- Efficacy of minocycline in patients with amyotrophic lateral sclerosis: a phase III randomised trial.
- Eligibility and outcomes reporting guidelines for clinical trials for patients in the state of a rising prostate-specific antigen: recommendations from the Prostate-Specific Antigen Working Group.
- Enhanced access to primary care for patients with congestive heart failure. Veterans Affairs Cooperative Study Group on Primary Care and Hospital Readmission.
- Enhancing measurement in health outcomes research supported by Agencies within the US Department of Health and Human Services.
- Estimating Clinical Trial Bleeding Events Using Electronic Health Record Data.
- Ethics and equipoise: rationale for a placebo-controlled study design of platelet glycoprotein IIb/IIIa inhibition in coronary intervention.
- Evaluating advanced practice nursing care through use of a heuristic framework.
- Evaluating the Implementation of a Preemptive, Multimodal Analgesia Protocol in a Plastic Surgery Office.
- Evaluating the impact of interventions in the Multisite Violence Prevention Study: samples, procedures, and measures.
- Evaluative Outcomes in Direct Extraction and Use of EHR Data in Clinical Trials.
- Frailty predicts some but not all adverse outcomes in older adults discharged from the emergency department.
- Frequency and impact of grade three or four toxicities of novel agents on outcomes of older patients with chronic lymphocytic leukemia and non-Hodgkin lymphoma (alliance A151611).
- Frequency and predictors of adverse health outcomes in older Medicare beneficiaries discharged from the emergency department.
- Gastroenterologist specialist care and care provided by generalists--an evaluation of effectiveness and efficiency.
- Health policy and outcome research in stroke.
- Health policy in stroke: translating what we know into what we do.
- Health service use and outcome: comparison of low charge, integrated, comprehensive services with usual health care.
- Health, nutrition and prosperity: a microeconomic perspective.
- Heart failure etiology and response to milrinone in decompensated heart failure: results from the OPTIME-CHF study.
- Hospital credentialing and quality of care.
- How effective is your patient teaching?
- How to use a systematic literature review and meta-analysis.
- How well does early-career investigators' cardiovascular outcomes research training align with funded outcomes research?
- Impact of Accountable Care Organizations on Utilization, Care, and Outcomes: A Systematic Review.
- Impact of on-site cardiac interventional facilities on management and outcome of patients with acute coronary syndromes.
- Impact of polyvascular disease on patients with atrial fibrillation: Insights from ROCKET AF.
- Impacting late life depression: integrating a depression intervention into primary care.
- Implementation of a Standardized Data-Collection System for Comprehensive Appraisal of Cleft Care.
- Implementation of an Exercise Program in an Assisted Living Facility.
- Improved fitness narrows the symptom-reporting gap between older men and women.
- Improving acute coronary syndrome care: the ACC/AHA guidelines and critical pathways.
- Improving the quality of rural nursing care.
- Increased sectioning of pathologic specimens with ductal carcinoma in situ of the breast: are there clinical consequences?
- Individual and Joint Effects of Pulse Pressure and Blood Pressure Treatment Intensity on Serious Adverse Events in the SPRINT Trial.
- Interlaboratory variation in results from immunohistochemical assessment of estrogen receptor status.
- Intramuscular myxoma: a clinicopathologic study of 17 patients.
- Is specialty care associated with improved survival of patients with congestive heart failure?
- Leveraging healthcare utilization to explore outcomes from musculoskeletal disorders: methodology for defining relevant variables from a health services data repository.
- Long-term citicoline (cytidine diphosphate choline) use in patients with vascular dementia: neuroimaging and neuropsychological outcomes.
- Mapping standard ophthalmic outcome sets to metrics currently reported in eight eye hospitals.
- Measuring agreement between patient and proxy responses to multidimensional health-related quality-of-life measures in clinical trials. An application of psychometric profile analysis.
- Measuring outcomes in chronic diseases: ready for prime time?
- Meta-analysis of survival with platelet glycoprotein IIb/IIIa antagonists for percutaneous coronary interventions.
- Mode of hospital presentation in patients with non-ST-elevation myocardial infarction: implications for strategic management.
- Modeling community-level effects on preterm birth.
- Modeling for health care and other policy decisions: uses, roles, and validity.
- Multiple outcomes and analyses in clinical trials create challenges for interpretation and research synthesis.
- Novel approaches to clinical trials: device-related infections.
- Obesity and 30-Day Outcomes Following Minimally Invasive Nephrectomy.
- Outcome analysis of patients with acute pancreatitis by using an artificial neural network.
- Outcomes following acute exacerbation of severe chronic obstructive lung disease. The SUPPORT investigators (Study to Understand Prognoses and Preferences for Outcomes and Risks of Treatments)
- Palliative Care Planner: A Pilot Study to Evaluate Acceptability and Usability of an Electronic Health Records System-integrated, Needs-targeted App Platform.
- Patient outcomes. A measure of nursing's value.
- Pediatric Cardiac Trauma in the United States: A Systematic Review.
- Pediatric tracheostomies: a recent experience from one academic center.
- Performance of a mail-administered version of a stroke-specific outcome measure, the Stroke Impact Scale.
- Personality Traits and Performance Contracts: Evidence from a Field Experiment among Maternity Care Providers in India
- Physical and sexual abuse, depression and alcohol use disorders in adolescents: onsets and outcomes.
- Pre-transplant mechanical ventilation and outcome in patients with cystic fibrosis.
- Problems in the evaluation of thymectomy for myasthenia gravis.
- Procedural volume as a marker of quality for CABG surgery.
- Project LIFE--Learning to Improve Fitness and Function in Elders: methods, design, and baseline characteristics of randomized trial.
- Prospective evaluation of where reperfusion ventricular arrhythmia "bursts" fit into optimal reperfusion in STEMI.
- Quality measurement in adult cardiac surgery: part 2--Statistical considerations in composite measure scoring and provider rating.
- Quality of clinical reports on behavioral interventions for hypertension.
- Rationale and design of The National Emphysema Treatment Trial: a prospective randomized trial of lung volume reduction surgery. The National Emphysema Treatment Trial Research Group.
- Re: Pietrobon R, Coeytaux RR, Carey TS, et al. Standard scales for measurement of functional outcome for cervical pain or dysfunction: a systematic review. Spine 2002;27:515-22.
- Recommended patient-reported core set of symptoms to measure in adult cancer treatment trials.
- Relation between hospital intra-aortic balloon counterpulsation volume and mortality in acute myocardial infarction complicated by cardiogenic shock.
- Relationship between heparin anticoagulation and clinical outcomes in coronary stent intervention: observations from the ESPRIT trial.
- Reliability and construct validity of PROMIS® measures for patients with heart failure who undergo heart transplant.
- Research design in end-of-life research: state of science.
- Research strategies for clinicians.
- Role of Health Services Research in Producing High-Value Rehabilitation Care.
- Safety and efficacy of eculizumab in anti-acetylcholine receptor antibody-positive refractory generalised myasthenia gravis (REGAIN): a phase 3, randomised, double-blind, placebo-controlled, multicentre study.
- Service use and health status of persons with severe mental illness in full-risk and no-risk medicaid programs.
- Sex differences in fitness outcomes among minority youth after participation in a park-based after-school program.
- Short-term outcomes of splenectomy avoidance in trauma patients.
- Shortages of rural mental health professionals.
- Signposts along the journey toward high-quality palliative care: the value of measuring what matters.
- Standard scales for measurement of functional outcome for cervical pain or dysfunction: a systematic review.
- Standardized End Point Definitions for Coronary Intervention Trials: The Academic Research Consortium-2 Consensus Document.
- Structural Network Position and Performance of Health Leaders Within an HIV Prevention Trial.
- Subcutaneous immunoglobulin for maintenance treatment in chronic inflammatory demyelinating polyneuropathy (PATH): a randomised, double-blind, placebo-controlled, phase 3 trial.
- Surgical team behaviors and patient outcomes.
- Telephone follow-up for pediatric ambulatory surgery: parent and provider satisfaction.
- Tezosentan in patients with acute heart failure and acute coronary syndromes: results of the Randomized Intravenous TeZosentan Study (RITZ-4).
- The Society of Thoracic Surgeons General Thoracic Surgery Database: 2017 Update on Research.
- The everlasting effect of primary percutaneous coronary intervention--even after transport?
- The evolution of care improves outcome in blunt thoracic aortic injury: A Western Trauma Association multicenter study.
- The impact of actual body weight-based chemotherapy dosing and body size on adverse events and outcome in older patients with breast cancer: Results from Cancer and Leukemia Group B (CALGB) trial 49907 (Alliance A151436).
- The value of certification in HIV/AIDS nursing.
- The value of patient-reported health status in predicting short-term outcomes after coronary artery bypass graft surgery.
- To what extent should quality of care decisions be based on health outcomes data? Application to carotid endarterectomy.
- Tracking mobility-related assistive technology in an outcomes study.
- Trends in endovascular therapy and clinical outcomes within the nationwide Get With The Guidelines-Stroke registry.
- Troponin T levels and risk of 30-day outcomes in patients with the acute coronary syndrome: prospective verification in the GUSTO-IV trial.
- Troponin and C-reactive protein have different relations to subsequent mortality and myocardial infarction after acute coronary syndrome: a GUSTO-IV substudy.
- Unmet Needs and Challenges in Clinical Research of Intracerebral Hemorrhage.
- Update on outcome assessment in myositis.
- Urinary type II collagen neoepitope as an outcome measure for relapsing polychondritis.
- Use of bupropion SR in a pharmacist-managed outpatient smoking-cessation program.
- Weight loss with self-help compared with a structured commercial program: a randomized trial.
- What drives outcomes for emotional and behavioral disorders in children and adolescents?
- Why not real economics? | https://scholars.duke.edu/display/meshD017063 |
),
Pub Date : 2021-05-24
, DOI:
10.3322/caac.21672
Teresa L. Deshields, Sharla Wells-Di Gregorio, Stacy R. Flowers, Kelly E. Irwin, Ryan Nipp, Lynne Padgett, Brad Zebrack
Distress management (DM) (screening and response) is an essential component of cancer care across the treatment trajectory. Effective DM has many benefits, including improving patients' quality of life; reducing distress, anxiety, and depression; contributing to medical cost offsets; and reducing emergency department visits and hospitalizations. Unfortunately, many distressed patients do not receive needed services. There are several multilevel barriers that represent key challenges to DM and affect its implementation. The Consolidated Framework for Implementation Research was used as an organizational structure to outline the barriers and facilitators to implementation of DM, including: 1) individual characteristics (individual patient characteristics with a focus on groups who may face unique barriers to distress screening and linkage to services), 2) intervention (unique aspects of DM intervention, including specific challenges in screening and psychosocial intervention, with recommendations for resolving these challenges), 3) processes for implementation of DM (modality and timing of screening, the challenge of triage for urgent needs, and incorporation of patient-reported outcomes and quality measures), 4) organization—inner setting (the context of the clinic, hospital, or health care system); and 5) organization—outer setting (including reimbursement strategies and health-care policy). Specific recommendations for evidence-based strategies and interventions for each of the domains of the Consolidated Framework for Implementation Research are also included to address barriers and challenges. | https://en.x-mol.com/paper/article/1396933163991154688 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.