content
stringlengths 0
1.88M
| url
stringlengths 0
5.28k
|
---|---|
THE BACKGROUND OF THE INVENTION AND PRIOR ART
SUMMARY OF THE INVENTION
BRIEF DESCRIPTION OF THE DRAWINGS
DESCRIPTION OF PREFERRED EMBODIMENTS OF THE INVENTION
1
28
26
27
The present invention relates generally to processing of spread spectrum signals by means of vector based algorithms. More particularly the invention relates to a method of receiving spread spectrum signals according to the preamble of claim and a signal receiver according to the preamble of claim . The invention also relates to a computer program according to claim and a computer readable medium according to claim .
Spread spectrum technology is becoming increasingly important in many areas, of which cellular communication systems and global navigation satellite systems (GNSS) represent two important examples. Moreover, the large variety of transmission standards creates a demand for hybrid- or general-purpose receivers. For instance, both the cellular standards cdma2000 and WCDMA involve transmission of spread spectrum signals.
However, due to differences in the air interfaces one and the same terminal cannot be used in the two systems. Instead, a dedicated terminal must be employed in each system. Alternatively, a dual mode terminal must be designed, which includes two separate transceiver chains. Correspondingly, a navigation receiver adapted for one GNSS, say the Global Positioning System (GPS; U.S. Government), is not able to receive signals from a satellite that belongs to a different GNSS, such as the Galileo system (the European programme for global navigation services) or the Global Orbiting Navigation Satellite System (GLONASS; Russian Federation Ministry of Defense).
In order to make this possible, a multi-mode receiver must be designed. However, including multiple receiver chains in a single device is not only expensive, it also renders the unit bulky and heavy, particularly if more than two signal formats are to be processed. Therefore, a programmable software receiver solution is desired whose signal processing principles may be altered according to which signals that shall be received and processed.
Various software solutions are already known for processing GNSS signals. The patent document WO02/50561 is one example in which a GPS receiver tracking system for guiding missiles is described. The receiving station here includes one or more processing stages for receiving and processing GPS data. A control signal controls whether a quantity of processing stages should be increased or decreased in response to the result of a correlation operation. The tracking and recovery of timing information is entirely performed in software. However, the processing involves real-time calculation of relatively complex Fourier transforms, and therefore requires considerable processing resources. Thus, a receiver of this type is not particularly suitable for small sized units, such cellular phones or portable GNSS-receivers.
The article “TUPM 12.4: Software Solution of GPS Baseband Processing”, ULSI Laboratory, Mitsubishi Electric Corporation, IEEE, 1998 by Asai T., et al. outlines the principles for a software GPS receiver using an embedded microprocessor, which enables signals from up to eight satellites to be demodulated at around 40 MIPS (millions of/or Mega Instructions Per Second). A 2 MHz GPS baseband signal is here fed to the software radio receiver, which performs spectrum despreading and mixing; synchronous demodulation, satellite acquisition and tracking; as well as phase compensation. An algorithm is proposed through which the intermediate frequency (IF) signal is 1-bit sampled and where downconversion is performed before despreading. Resulting data in the form of 32 samples are continuously processed in parallel. A DRAM (Dynamic Random Access Memory) stores a particular C/A (Coarse Acquisition) code table for each satellite from which signals are received. All other data and instructions are stored in a cache memory in order to accomplish a high-speed processing. Although this strategy is declared to result in a reasonably efficient implementation, the document lacks a specific description as to how the dispreading and the correlation should be effected in order to, in fact, obtain this effect.
Akos. D. et al., “Tuning In to GPS—Real-Time Software Radio Architectures for GPS Receivers”, GPS World, July 2001 describes a receiver architecture through which IF signal samples are fed directly from a radio front-end to a programmable processor for continued processing. The article mentions the possibility of using single instruction multiple data (SIMD) instructions to process multiple data samples in parallel. However, portability- and flexibility problems are recognized, and again, there is no teaching as to how an efficient parallel processing could actually be accomplished.
Dovis, F. et al., “Design and Test-Bed Implementation of a Reconfigurable Receiver for Navigation Applications”, Electronics Department, Politecnico di Torino, Navigation Signal Analysis and Simulation Group, Spring of 2002 relates to the design of a reconfigurable GNSS receiver which is capable of fusing data from two or more different GNSS:s. The document sketches an architecture which, in addition to a radio front-end, includes a Field Programmable Gate Array (FPGA) and a Digital Signal Processor (DSP). The authors address various computational load issues. However, they do not present an algorithm which fulfills the identified requirements.
Hence, the prior art includes a number of examples of software-based GNSS-receivers. Nevertheless, there is yet no distinct teaching of a highly efficient solution which is suitable for implementation in software and has capabilities that are at least in par with those of today's ASIC-based solutions for receiving and processing spread spectrum signals in real-time (ASIC=Application Specific Integrated Circuit).
The object of the present invention is therefore to provide a solution for receiving and processing spread spectrum signals, which solves the problems above and thus to present a truly software adapted strategy that may be implemented in a physically small and power efficient device.
According to one aspect of the invention the object is achieved by a method of receiving spread spectrum signals as initially described, which is characterized by comprising a preparation for the correlation step, wherein the preparation takes place before the receiving the continuous signal. This preparation involves pre-generating a multitude of code vectors, which each represents a particular code sequence of the at least one signal source specific code sequence. Moreover, according to the invention, the correlation step involves multiplying at least each vector in a sub-group of the code vectors with at least one vector, which is derived from the data word.
This strategy is advantageous because the proposed vector approach makes it possible for a digital processor (e.g. a microprocessor) to process multiple signal samples in parallel during each clock cycle and thus make very efficient use of the processor. Furthermore, by pre-generating the code vectors valuable processing capacity is saved, which in turn renders it possible to deal with a sufficient amount of input data per time unit in order to, for example track navigation signals that are transmitted by the satellites in a navigation satellite system.
According to a preferred embodiment of this aspect of the invention, each code vector represents a particular signal source specific code sequence, which is sampled at the basic sampling rate and quantised with the quantising process that is used to produce the level-discrete sample values. Preferably, the code vectors are also further adapted to the format of the incoming data signal in a way which renders the following processing efficient.
According to another preferred embodiment of this aspect of the invention, the at least one signal source specific code sequence represents so-called pseudo random noise. This type of code sequences is beneficial in environments where two or more different signals are modulated onto the same carrier frequency. Namely, the different pseudo random noise signals are orthogonal (or at least almost orthogonal) to each other. Consequently, a first information signal spread by means of a first pseudo random noise signal causes a minimal deterioration of a second information signal which is spread by means of a second pseudo random noise signal, and vice versa.
According to another preferred embodiment of this aspect of the invention, the receiving step involves down conversion of an incoming high-frequency signal to an intermediate frequency signal. The high-frequency signal is presumed to have a spectrum which is symmetric around a first frequency and the intermediate frequency signal is presumed to have a spectrum which is symmetric around a second frequency, which is considerably lower than the first frequency. Hence, the receiving step transforms the information carrying signal to a baseband which is technically more easy to handle than the band at which the original incoming signal is located.
According to another preferred embodiment of this aspect of the invention, the method includes the following steps. First, a maximum frequency variation of the second frequency due to Doppler-effects is determined. Then, a Doppler frequency interval around the second frequency is defined. The Doppler frequency interval has a lowest frequency limit equal to the difference between the second frequency and the maximum frequency variation, and a highest frequency limit equal to the sum of the second frequency and the maximum frequency variation. After that, the Doppler frequency interval is divided into an integer number of equidistant frequency steps, and subsequently a frequency candidate vector is defined for each frequency step. This way of dividing the spectrum is advantageous because it provides a flexible modeling of the intermediate carrier frequency and its variations.
According to another preferred embodiment of this aspect of the invention, an integer number of initial phase positions is determined for the frequency candidate vector. The integer number thus represents a phase resolution, such that a relatively high number corresponds to a comparatively high phase resolution, whereas a relatively low number corresponds to a comparatively low phase resolution. Furthermore, a carrier frequency-phase candidate vector is defined for each combination of carrier frequency candidate vector and initial phase position. The different frequency-phase candidate vectors are beneficial, since they allow the determination of a very accurate estimate of frequency- and phase characteristics of a received signal, which in turn vouches for a demodulated signal having a high quality.
According to yet another preferred embodiment of this aspect of the invention, the number of elements in each carrier frequency-phase candidate vector is determined. Subsequently, the carrier frequency-phase candidate vectors are stored according to a data format, which is adapted to performing multiplication operations between the data word and a segment of a carrier frequency-phase candidate vector. This adaptation is advantageous because thereby several signal samples may be processed in parallel by means of comparatively simple operators. Preferably, the adapting of the data format involves adding at least one element to each segment of the carrier frequency-phase candidate vector, such that the segment attains a number of elements which is equal to the number of elements in each of the at least one vector that is derived from the data word. Hence, it is namely possible to process a segment of the carrier frequency-phase candidate vector together with one of the at least one vector by either a so-called Single Instruction Multiple Data (SIMD)-operation or a logical XOR-operation.
According to still another preferred embodiment of this aspect of the invention, the method also includes the following steps. First, a maximum variation of the code rate due to Doppler-effects is determined. Then, a Doppler rate interval is defined around a center code rate. The Doppler frequency interval has a lowest code rate limit equal to the difference between the center code rate and the maximum code rate variation, and a highest frequency limit equal to the sum of the center code rate and the maximum code rate variation. In analogy with the intermediate frequency spectrum, the Doppler rate interval is divided into an integer number of equidistant code rate steps, and a code rate candidate is defined for each code rate step. In further analogy with the intermediate frequency, an integer number of possible initial code phase positions is determined for each code rate candidate. The integer number thus represents a code phase resolution, such that a relatively high number corresponds to a comparatively high code phase resolution, whereas a relatively low number corresponds to a comparatively low code phase resolution. Typically, the spread spectrum code modulation is less sensitive to distortion caused by Doppler effects than the frequency modulation. Therefore, the code rate steps may be relatively large. However, a certain degree of Doppler shift estimation is desirable to attain a demodulated signal of high quality.
According to yet another preferred embodiment of this aspect of the invention, a set of code vectors is generated for each signal source specific code sequence by sampling each code rate-phase candidate vector with the basic sampling rate, and thus produce a corresponding code vector. Again, this simplifies a parallel processing of several signal samples by means of comparatively simple operators.
According to still another preferred embodiment of this aspect of the invention, a modified code vector is generated on basis of each code vector by: copying a particular number of elements from the end of an original code vector to the beginning of the modified code vector, and copying the particular number of elements from the beginning of the original code vector to the end of the code vector. This extension of the code vector is highly advantageous because it allows extraction of tracking parameters through early-, prompt- and late techniques by performing a simple translation of local copies of the signal source specific code sequence.
According to still another preferred embodiment of this aspect of the invention, a set of modified code vectors is stored for each signal source specific code sequence. Each modified code vector here contains a number of elements, which represent a sampled version of at least one full code sequence. As mentioned above, the modified code vector also includes a repetition of the beginning and the end of the sequence. A particular modified code vector is defined for each combination of code rate candidate and code phase position. These pre-generated modified code vectors save considerable processing capacity in the processor, since they need not be calculated in real time, but may simply be acquired from a memory.
According to yet another preferred embodiment of this aspect of the invention, the data format of the modified code vectors is adapted with respect to the data format of the at least one vector that has been derived from the data word, such that a modified code vector and one of the at least one vector may be processed jointly by a SIMD-operation or an XOR-operation. Naturally, this is advantageous from a processing efficiency point-of-view.
According to yet another preferred embodiment of this aspect of the invention, the method involves an initial acquisition phase and a subsequent tracking phase. The acquisition phase establishes a set of preliminary parameters which are required for initiating a decoding of signals that are received during the tracking phase. The parameters may include: a modified code vector, a carrier frequency candidate vector an initial phase position, a code phase position and code index, which denotes a starting sample value for the modified code vector. A successful acquisition phase thus results in that at least one signal source specific code sequence is identified and that this signal is possible to track by the receiver (i.e. may be continued to be received).
According to still another preferred embodiment of this aspect of the invention, the tracking in turn, involves the following steps. First, based the tracking characteristics, a prompt pointer is calculated for each modified code vector. The prompt pointer indicates a start position for the code sequence. The initial prompt pointer value is set equal to the code index. Then, at least one pair of early- and late pointers is assigned around each prompt pointer. The early pointer specifies a sample value which is positioned at least one element before the prompt pointer's position, and correspondingly, the late pointer specifies a sample value being positioned at least one element after the prompt pointer's position. These pointers are used to maintain the tracking of the received signal by a repeated repositioning of the pointers around a correlation maximum value, such that the prompt pointer is positioned as close as possible to this value, the early pointer is positioned in time somewhat prior to this value and the late pointer is positioned in time somewhat after this value. An important advantage attained by this strategy is that one and the same vector may be re-used in order to represent different delays. Thus, valuable memory space and processing capacity is saved.
According to still another preferred embodiment of this aspect of the invention, the tracking involves the following further steps. First, a sequence of incoming level-discrete sample values is received. Then, data words are formed from the sample values, such that each data word contains a number of elements which is equal to the number of elements in each carrier frequency-phase candidate vector. After that, a relevant set of carrier frequency-phase candidate vectors is calculated for the data word, and a pre-generated in-phase representation respective a quadrature-phase representation of the vector is acquired for each carrier frequency-phase candidate vector in the relevant set. Subsequently, each data word is on one hand multiplied with a in-phase representation of the carrier frequency-phase candidate vector in the relevant set to produce a first intermediate-frequency-reduced information word, and on the other hand multiplied with a quadrature-phase representation of the carrier frequency-phase candidate vector in the relevant set to produce a second intermediate-frequency-reduced information word. The intermediate-frequency-reduced information words thus constitute a respective component of the vectors mentioned above that have been derived from the incoming data words. This multiplied strategy is advantageous because it enables a very efficient usage of the capacity of a general-purpose microprocessor.
According to yet another preferred embodiment of this aspect of the invention, XOR- or SIMD-operations are used to perform the multiplication between the data word and the in-phase representation of the carrier frequency-phase candidate vector respective between the data word and the a quadrature-phase representation of the carrier frequency-phase candidate vector.
According to another preferred embodiment of this aspect of the invention, the tracking involves the further steps of: correlating the first intermediate-frequency-reduced information word with a modified code vector starting at a position indicated by the prompt pointer to produce a first prompt-despread symbol string, correlating the first intermediate-frequency-reduced information word with a modified code vector starting at a position indicated by the early pointer to produce a first early-despread symbol string, correlating the first intermediate-frequency-reduced information word with a modified code vector starting at a position indicated by the late pointer to produce a first late-despread symbol string, correlating the second intermediate-frequency-reduced information word with a modified code vector starting at a position indicated by the prompt pointer to produce a second prompt-despread symbol string, correlating the second intermediate-frequency-reduced information word with a modified code vector starting at a position indicated by the early pointer to produce a second early-despread symbol string, and correlating the second intermediate-frequency-reduced information word with a modified code vector starting at a position indicated by the late pointer to produce a second late-despread symbol string. Preferably, a resulting data word is then derived for each set of the despread symbol strings. This may, for example be performed either by performing the relevant adding operation, or by looking up a pre-generated value in a table based on the bit pattern of the despread symbol strings depending on whether the resulting data words contain packed or un-packed information. Data of high quality may thus be obtained with a minimum of real time calculations, which is advantageous from a processing point-of-view.
According to yet another preferred embodiment of this aspect of the invention, either XOR- or SIMD-operations are used also to perform the multiplication between the intermediate-frequency-reduced information words and the modified code vectors, since again, this is advantageous from a processing point-of-view.
According to another preferred embodiment of this aspect of the invention, certain pieces of information are propagated in connection with completing the processing of a current data word and initiating the processing of a subsequent data word. Preferably, this propagated information includes: a pointer which indicates a first sample value of the following data word, a group of parameters that describe the relevant set of carrier frequency-phase candidate vectors, the relevant set of code vectors, and the prompt-, early-, and late pointers. Hence, based on the propagated information, the subsequent data word may be processed immediately.
According to a further aspect of the invention the object is achieved by a computer program directly loadable into the internal memory of a computer, comprising software for performing the above proposed method when said program is run on a computer.
According to another aspect of the invention the object is achieved by a computer readable medium, having a program recorded thereon, where the program is to make a computer perform the above proposed method.
According to another aspect of the invention the object is achieved by the signal receiver as initially described, which is characterized in that the proposed computer program is loaded into the memory means, such that the receiver will operate according to the above-described method.
Consequently, the invention offers an excellent instrument for receiving and decoding any type of spread spectrum signals in a general software radio receiver. For instance, one and the same receiver may be used to track navigation satellite signals of different formats. These signals may even be received in parallel, such that a first signal is received on a first format while one or more other signals are received on a second or third format.
Moreover, the proposed solution permits one and the same receiver to be utilized for completely different purposes, such as communication in a cellular system.
The present invention is now to be explained more closely by means of preferred embodiments, which are disclosed as examples, and with reference to the attached drawings.
FIG. 1
shows a spectrum graph over an exemplary spread spectrum signal from which information may be extracted according to the invention,
FIG. 2
FIG. 1
shows a spectrum graph over a frequency down-converted signal corresponding to the spectrum shown in ,
FIG. 3
FIG. 2
is an enlarged version of in which a Doppler shifting of the spectrum is illustrated,
FIG. 4
illustrates how a data signal is modulated onto a signal source specific code sequence according to an embodiment of the invention,
FIG. 5
depicts a three-dimensional graph over carrier frequency-phase candidate vectors to be used as initial correlators according to an embodiment of the invention,
FIG. 6
FIG. 5
shows an alternative representation the carrier frequency-phase candidate vectors in ,
FIGS. 7-8
show graphs which illustrate how a code index and a code phase are defined for a received signal according to an embodiment of the invention,
FIGS. 9
a,b
illustrate how a modified code vector is generated based on an original code vector according to an embodiment of the invention,
FIG. 10
depicts a three-dimensional graph over code rate-phase candidate vectors to be used as subsequent correlators according to an embodiment of the invention,
FIG. 11
illustrates how a set of code sequence start pointers is assigned to a modified code vector according to an embodiment of the invention,
FIG. 12
illustrates how data words are formed from a sequence of incoming level-discrete sample values according to an embodiment of the invention,
FIG. 13
FIG. 12
illustrates how the data words of are correlated with various pre-generated vectors according to an embodiment of the invention,
FIG. 14
illustrates how multiple pairs of pointers may be assigned according to an embodiment of the invention,
FIG. 15
shows a proposed signal receiver, and
FIG. 16
illustrates, by means of a flow diagram, the general method of processing spread spectrum signals according to the invention.
In order to realize a truly software based signal processing solution in real-time at high sampling rates, such as those required in a GNSS, the architecture of the microprocessor system must be utilized very efficiently. The present invention uses an approach, which involves a form of parallel processing based on pre-generated code vector representations. The invention thereby strikes a balance between processing speed and memory usage, which compensates for the capacity deficit of a general purpose microprocessor in relation to an ASIC. The details of this solution will become apparent from the below disclosure.
FIG. 1
HF
HF
HF
HF
IF
shows a spectrum graph over an exemplary spread spectrum signal from which information may be extracted according to the invention. For example, the signal may be a GPS C/A-signal in the L1-band with a carrier frequency fof 1.57542 GHz. This means that the signal's spectrum is symmetrical around the carrier frequency f. Moreover, the signal has at least 98% of its energy distributed within a 2 MHz wide frequency band BWaround the carrier frequency f. Therefore, it is generally sufficient if the spread spectrum signal is downconverted to an intermediate frequency fat around 1 MHz in order to enable further signal processing at a lower frequency.
FIG. 2
FIG. 2
FIG. 5
IF
HF
IF
D
D
IF
D
IF
D
D
D
IF
D
shows a spectrum graph over such a frequency down-converted signal, whose spectrum is symmetrical around an intermediate frequency f, which is considerably lower than the carrier frequency f, for example f=1.25 MHz. Due to movements of the transmitter (i.e. typically a satellite in orbit) and the receiver (i.e. typically a mobile GNSS-receiver) a Doppler shift may occur in the received signal, which is proportional to the relative velocity between the transmitter and the receiver. A maximum Doppler shift fis defined which in the GNSS case normally is approximately 10 kHz. Thus, the entire spectrum may be shifted within an interval 2f, such that the center frequency falls any where between f+f(corresponding to a maximum positive Doppler shift) and f−f(corresponding to a maximum negative Doppler shift). For illustrative purposes the interval 2f, has been severely exaggerated in the . The figure also indicates a phase variation interval φ(along an independent axis φ) around the intermediate frequency f. The phase variation interval φdemonstrates the fact that the phase position of the received signal is initially unknown to the receiver, and thus constitutes a calibration parameter. The effects of this parameter will be further elucidated below with reference to .
FIG. 2
FIG. 3
FIG. 3
D
IF-min
IF
D
IF-max
IF
D
s
s
D
IF
HF
s
An enlarged version of the spectrum in is shown in . The intermediate spectrum may, due to possible Doppler effects, be shifted such that its center frequency lies in the interval 2ffrom f=f−fto f=f+f. The potential maximum shifted spectra are here indicated with a respective dashed line. The diagram in also shows a Nyquist frequency r/2 corresponding to a minimal sampling rate rwhich, when used for sampling the intermediate frequency signal, will result in a non-aliased discrete spectrum. Provided that f=10 kHz, f=1.25 MHz, BW=2 MHz and the intermediate frequency signal is lowpass filtered through an analog filter having a 2.5 MHz wide passband, the minimal sampling rate rbecomes 5 MHz (i.e. two times the highest frequency component after the analog filter).
FIG. 4
illustrates schematically how a data signal D is modulated onto a signal source specific code sequence CS on the transmitter side according to an embodiment of the invention. According to a preferred embodiment of the invention, the signal source specific code sequence CS constitutes so-called pseudo random noise. The data signal D here contains a data symbol sequence [+1, −1, −1, +1, −1], and has a relatively low symbol rate, say 50 Hz. The signal source specific code sequence CS, however, has a relatively high symbol rate (or more correctly chipping rate). For instance, a signal source specific code sequence CS in the form of a GPS C/A code may have a chipping rate of 1.023 MHz and contain 1023 chips per period. Each chip, ch, is either +1 or −1. Hence, the CIA code repeats itself one per ms. The data signal D is modulated onto (or spread by) the signal source specific code sequence CS by multiplying each data symbol with the code sequence CS. The data symbol +1 thereby results in an unaltered code sequence CS, whereas the data symbol −1 results in an inverted code sequence CS.
If a data signal D having a rate of 50 Hz is spread by means of a signal source specific code sequence CS having a chipping rate of 1.023 MHz, this results in 20 entire code sequences CS per data symbol. Namely, the period time for one data symbol is 20 ms, whereas the period time for the code sequence is only 1 ms.
FIG. 5
IF-min
IF-max
IF-min
IF-max
IF-min
IF-max
IF-min
IF-min
IF-min
IF-min
IF-min
IF-max
depicts a three-dimensional graph over different carrier frequency-phase candidate vectors. As mentioned above, the intermediate frequency spectrum may be Doppler shifted. Therefore, the particular frequency of the received signal is initially unknown within a Doppler frequency interval from fto f. Moreover, the phase position of the received signal is beforehand unknown to the receiver. In order to enable an estimation of the actual intermediate carrier frequency, the Doppler frequency interval f−fis divided into an integer number of equidistant frequency steps. Of course, the larger the number of steps is, the more accurately the intermediate carrier frequency may be estimated. In this example, a step size Δf of 20 Hz is chosen. In some applications, however, a much larger step size Δf may provide a sufficient frequency accuracy, whereas in other applications (where relatively high accuracy is needed) a considerably smaller step size Δf may be required. In any case, a Doppler frequency interval f−fof 20 kHz and a step size Δf of 20 Hz requires 1000 steps, where a first step includes the frequencies from fto f+Δf, a second step includes the frequencies from f+Δf to f+2Δf, and so on up to a last step including the frequencies from f+999Δf to f.
IF-C
0
7
C
IF-C
0
7
IF-C
C
IF-C
IF-min
IF-C
IF-min
FIG. 5
A frequency candidate vector fis defined for each frequency step. In order to estimate an initial phase position of the intermediate carrier frequency, an integer number of initial phase positions φ, . . . , φare determined. The illustrated example shows eight such positions φ. This gives a phase resolution of π/4. For each frequency candidate vector f, eight different phase positions φ, . . . , φare thus defined which each represents a particular phase shift from 0 to 7π/4. A combination of a certain carrier frequency candidate vector fand a particular initial phase position φis referred to as a carrier frequency-phase candidate vector. shows all such vectors (i.e. eight) for the first step, where f=f, and the second step, where f=f+Δf.
FIG. 5
C
IF-C
C
IF-C
Additionally, includes an axis Lalong which the number of sample values (or length) of the frequency candidate vector fis indicated. The Lnumber is preferably a power of 2 because this generally renders the implementation more simple. The number of sample values in each frequency candidate vector fis set in consideration of the available memory space, the desired frequency resolution and the desired phase resolution. If, in the example above, a length of 512 samples is chosen and each sample requires one byte, the total (uncompressed) memory demand would be 3.9 MB (i.e. 1000 frequencies×8 phase positions×512 B=4096000 B=3.9 MB).
FIG. 6
FIG. 5
fφ
IF-C
C
fφ
IF-C
C
IF-C
IF-min
IF-C
IF-max
C
0
C
7
C
n
fφ
IF-C
C
C
C
1
C
n
shows an alternative representation the carrier frequency-phase candidate vectors V(f, φ) in . Here, the vectors V(f, φ) range from the carrier frequency f=f(say 1.24 MHz) to f=f(say 1.26 MHz), from the phase shift position φ=φ(say 0) to φ=φ(say 7π/4), all have a length Lof ssamples (say 512) and are represented in a cube. Hence, a particular frequency-phase candidate vector V(f, φ) is given by a cuboid segment in the cube which is parallel with the L-axis, and ranges from L=sto L=s.
fφ
IF-C
C
fφ
IF-C
C
fφ
IF-C
C
After having generated all the carrier frequency-phase candidate vectors V(f, φ), the vectors are stored in a digital memory with a comparatively short access time, such that they may be readily accessed during a later acquisition and/or tracking phase. Preferably, the carrier frequency-phase candidate vectors V(f, φ) are stored according to a data format which is adapted to performing multiplication operations between incoming data words (representing one or more received signals) and segments of carrier frequency-phase candidate vectors V(f, φ). The vectors may either include packed samples or they may contain samples that are unpacked to a smallest manageable unit in the microprocessor, such as a byte. Further details regarding the data format issues will be discussed below.
FIG. 7
s
i
shows a graph over an exemplary code sequence CS, which has been received, downconverted and sampled according to an embodiment of the invention. After subsequent removal of the intermediate frequency component, the code sequence CS either attains the signal value +1 or −1, and the symbols are altered at a chipping rate of for example 1.023 MHz. At the receiver side, the code sequence CS is sampled with a sampling rate rof for example 5 MHz. The sampling instances are indicated by means of dots on the code sequence signal CS along an axis s. As is apparent from the figure there are approximately four sample values per chip period. Hence, the requirements of the Nyquist theorem are clearly fulfilled. However, the samples are not capable of determining the transition instances with a sufficient accuracy, i.e. where the code sequence signal CS changes from representing one chip symbol to representing another one chip symbol. Therefore, a so-called code phase must be determined. Moreover, a particular sample value at which the code sequence starts must also be established.
FIG. 8
FIG. 7
FIG. 8
shows a graph, which illustrates the sample value at which the code sequence CS starts (the so-called code index CI) and how a code phase, Cph, is defined in relation to this sample value. An initial segment of the code sequence signal. CS in is therefore represented in .
1
2
A first sample instance is here presumed to occur shortly prior to the actual start of the code sequence CS signal period. Hence, a corresponding sample value sbelongs to the end of the preceding period. This is illustrated by means of the line representing the code sequence signal CS being dashed. A subsequent sample instance, however, overlaps the code sequence CS period. The corresponding sample value sis defined as the code index CI. The actual beginning of a code sequence signal is determined in a preceding acquisition phase and typically involves correlation between the received signal and a local copy of the code sequence CS.
i
i
1
i
FIG. 8
The distance between the start of the code sequence signal CS and the code index CI, in turn, is defined as the code phase Cph, and thus represents a measure of the translation (or skew) between the sample instances sand the chip transitions. The sampling interval between two consecutive sample instances sis divided into an integer number of possible initial code phase positions in order to estimate the code phase Cph. In this example, ten 0.1-steps ranging from 0.0 to 0.9 are defined, where a first step 0.0 would indicate that code sequence signal CS starts at the code index CI, and a last step 0.9 would indicate that code sequence signal CS starts almost at the preceding sample value s. The shows a code phase Cph of 0.4, i.e. a situation where the code sequence signal CS starts approximately in the middle between two consecutive sample instances s.
fφ
IF-C
C
In analogy with the carrier frequency-phase candidate vectors V(f, φ), code rate-phase candidate vectors may now be defined for each signal source specific code sequence CS and combination of code rate CR, code index CI and code phase Cph. Nevertheless, according to a preferred embodiment of the invention, a modified code vector is first produced based on each original code vector.
FIGS. 9
FIG. 9
a
b
a
9
s
and illustrate how this may be performed. A code vector CV in contains a number of sample values, say 5000. Preferably, the number of sample values is selected in relation to sampling rate such that a full code sequence period is recorded. In the above example, with a sampling rate rof 5 MHz, this means that the 5000 samples cover exactly one full code sequence CS period (which has a duration of 1 ms and contains 1023 chips, since the chipping rate is 1.023 MHz).
m
e
m
b
m
e
m
e
b
FIG. 9
FIG. 11
b
A modified code vector CVis now generated on basis of the original code vector CV by copying a particular number of elements E(e.g. two) from the end of the original code vector CV to the beginning of the modified code vector CV. Correspondingly, a particular number of elements E(e.g. two) from the beginning of the original code vector CV are copied to the end of the code vector CV, i.e. after the elements E. shows the resulting modified code vector CV. Since, in this example, each chip symbol is sampled at approximately four instances, two sample values are equivalent to about one half chip period. Thereby, the above copying of the elements Eand Eallows a one-half-chip shifting of the code vector CV during a correlation operation between the code vector CV and the received data. This will be discussed further below with reference to .
FIG. 10
m
C-C
C
C-C
min
max
depicts a three-dimensional graph over different code rate-phase candidate vectors CV(CR, Cph) which represent a signal source specific code sequence CS(i). Analogous to the intermediate carrier frequency, the nominal code rate CRfor the code rate candidate vector CRmay also vary due to Doppler effects from a lowest value CRto a highest value CR. However, since the code rate (or chipping rate) is comparatively high, the rate variation here becomes rather small.
C
C-C
min
max
min
max
min
min
max
For example, a Doppler shift of 10 kHz at the intermediate carrier frequency is equivalent to a shift in a nominal code rate CRat 1.023 MHz of merely 6.5 Hz. Namely, the Doppler shift in respect of the code rate is generally equal to the ratio between the carrier frequency and the code rate (1575.42 MHz/1.023 MHz=1540; a Doppler shift of 10 kHz at the intermediate carrier frequency thus corresponds to 10000/1540≈6.5 Hz). The code rate candidate vector CRmay attain a value anywhere in a Doppler rate interval between CR=1022993.5 Hz and CR=102306.5 Hz. The Doppler rate interval CR−CRis divided into an integer number of equidistant code rate steps ΔCR, say 13. In this example, each interval CR, CR+ΔCR, . . . , CRthus spans 1 Hz. According to a preferred embodiment of the invention, the code rate step size is adaptive, e.g. determined on basis of the sampling frequency and the desired resolution.
FIG. 10
m
C-C
C-C
min
C-C
max
CVm
m
m
C-C
m
min
CVm
CVm
1
CVm
m
In , the three-dimensional graph (or cube) contains a set of code rate-phase candidate vectors CV(CR, Cph), where the code rate ranges from CR=CRto CR=CR, the code phase ranges from Cph=0.0 to Cph=0.9, and each vector has a length Lof ssamples (for example 5004). Hence, a particular code rate-phase candidate vector CV(CR, Cph) is given by a cuboid segment CV(CR+2ΔCR, 0.4) which is parallel with the L-axis and ranges from L=sto L=s.
m
C-C
m
C-C
m
C-C
m
C-C
FIG. 13
After having generated all the code rate-phase candidate vectors CV(CR, Cph), these vectors are stored in a digital memory with a comparatively short access time, such that they may be readily accessed during the acquisition and/or tracking phase. Preferably, the code rate-phase candidate vectors CV(CR, Cph) are stored according to a data format which is adapted to correlation operations to be performed between a vector that has been derived from incoming data words and a segment of a the code rate-phase candidate vectors CV(CR, Cph). For example, the code rate-phase candidate vectors CV(CR, Cph) may include packed samples or they may contain samples that are unpacked to a smallest manageable unit in the microprocessor, such as a byte. Further details regarding these data format issues will be discussed below with reference to .
m
IF-C
C
During tracking of a spread spectrum signal, i.e. a continued reception of the signal and demodulation of the data contained therein, it is necessary to update relevant tracking parameters for the signal. Normally, the tracking phase is preceded by a so-called acquisition phase during which a set of preliminary parameters are established that are required for initiating the signal decoding. A successful acquisition phase thus results in that at least one signal source specific code sequence is identified and a data signal transmitted by means of this sequence is possible to demodulate. The tracking characteristics that may be associated with a signal source specific code sequence include: a modified code vector CV(which defines a carrier frequency candidate vector fand an initial phase position φ), a code phase position, Cph, and a code index, CI. In order to maintain an adequate timing of the correlating operations in the receiver, a set of pointers are required which indicate the start position of the code sequence in relation to the modified code vector and are updated repeatedly, preferably between each correlation.
FIG. 11
m
P
P
P
m
C-C
E
L
P
E
P
L
P
P
E
L
P
E
L
P
E
L
P
E
L
P
P
P
E
P
L
E
L
E
L
P
P
illustrates one such set of pointers that are assigned to a modified code vector CV. A prompt pointer Pindicates a current estimate of the code sequence start position. This pointer, Pis initially set equal to the code index CI. Adequate P-pointer positions for any subsequent segments of the received data are obtained by retrieving appropriate modified code vectors CVfrom the digital memory where such pre-generated are stored. Between each segment, the code rate candidate vector CRas well as the initial code phase Cph is updated. Additionally, at least one pair of early- and late pointers Pand Prespectively is assigned on each side of the prompt pointer P, where the early pointer Pspecifies a sample value being positioned at least one element before the prompt pointer's Pposition, and the late pointer Pspecifies a sample value being positioned at least one element after the prompt pointer's Pposition. Each correlation is then performed with the presumption that the code sequence starts at the P-position, at the P-position as well as at the P-position. If the correlation over the P-position results in a higher correlation value than over any of the other positions, and at the same time the P- and P-pointers are balanced (i.e. the correlation over these positions result in equal values), this is interpreted as an optimal setting of the tracking parameters. Should, however, this not be true the sampled data must be repositioned in relation to the P-, P- and P-pointers, such that the correlation peak again coincides with the P-pointer's position. An un-calibrated pointer positioning may thus be detected via a difference between the correlation value over the P-pointer position and the correlation value over the P-pointer position, while the correlation over the P-position still results in the highest correlation value. In this case, the potentially highest correlation value (corresponding to the optimal P-positioning) lies somewhere between the current P-position and the current P-position or between the current P-position and the current P-position depending on which of the P- and P-pointer positions that results in the highest correlation value. A pointer updating normally takes place between each segment. A second or third pair of P- and P-pointers outside the first pair of pointers further enhances the possibilities of accomplishing an accurate adjustment of the tracking. Depending on the value of the received symbol, an optimal setting P-pointer may, in fact, also be equivalent to the correlation over the P-position resulting in a lower correlation value than over any of the other pointer positions. Namely, this is true if a negative valued data bit is received. However otherwise, the same principles apply.
P
E
L
m
P
E
L
L-min
L
m
P
E
L
E
E
111
112
113
In any case, the P-, P- and P-pointers may only be positioned within certain intervals in the modified code vector CV. The P-pointer may be set anywhere within a first interval , the P-pointer within a second interval and the P-pointer within a third interval . All the pointers are always set together, such that their relative distances remain unchanged. A limit value Pfor the P-pointer typically coincides with the first element of the modified code vector CV. Namely, outside this range a meaningful correlation cannot be performed. As a consequence of this and the fact that the pointers are set jointly P-, P- and P, a corresponding limit value P-min for the P-pointer is also defined.
FIG. 12
1
2
1210
1
5
6
1210
10
n
d
f 0
IF-C
C
IF-C
IF-C
m
P
E
L
illustrates how data words d(), d(), . . . , d(N) are formed from a sequence of incoming level-discrete sample values according to an embodiment of the invention. The data words d(), . . . , d(N) are formed such that each data word d(k) contains a number of elements which is equal to the number of elements sin each carrier frequency-phase candidate vector. For instance, the length of these vectors may be 512 sample values (as in the example described above with reference to the FIGS. and ). Given that each sequence contains 5000 sample values, the number N of data words becomes 10 (5000/512≈9.76 means that the last quarter of the tenth data word d() is empty). According to the invention, the elements in a current data word d(k) are processed jointly (i.e. in parallel). Then, the processing of a subsequent data word d(k+1) is initiated, and any processing parameters obtained during the processing of the current data word d(k) that are required when processing the subsequent data word d(k+1) are propagated as input data to the processing of the latter. These processing parameters preferably include: a pointer Pwhich indicates a first sample value of the subsequent data word d(k+1), a group of parameters which describe the relevant set of carrier frequency-phase candidate vectors V(f, φ) (i.e. a carrier frequency candidate vector frepresenting an in-phase version and a carrier frequency candidate vector frepresenting a quadrature-phase version), the relevant set of code vectors CV, and prompt-, early-, and late pointers P, P, and Prespectively.
FIG. 13
FIG. 12
fφ
IF-C
C
illustrates how the data words of are correlated with various pre-generated vectors according to an embodiment of the invention. First, a relevant set of carrier frequency-phase candidate vectors V(f, φ) is calculated for the data word d(k). This set is normally obtained in a preceding acquisition phase (or, if the data word d(k) is not the first word to be processed, during the processing of a previous word).
fφ
IF-C
C
IFI and a quadrature-phase representation f
IFQ
fφ
IF-C
C
fφ
IF-C
C
FIG. 6
Thereafter, for each carrier frequency-phase candidate vector V(f, φ) in the relevant set, a pre-generated in-phase representation fof the vector (V(f, φ)) respectively is acquired. Both these representations are found in the digital memory where the pre-generated carrier frequency-phase candidate vectors V(f, φ) are stored because they are merely one quarter period delays of one and the same vector, and the memory holds initial phase position representations for an entire period, see .
IFI
fφ
IF-C
C
IF-I
IFQ
fφ
IF-C
C
IF-Q
Then, in order to eliminate the influence of the carrier frequency component, the data word d(k) is multiplied with the in-phase representation fof the carrier frequency-phase candidate vector V(f, φ) in the relevant set. As a result thereof, a first intermediate-frequency-reduced information word S(k) is produced. Correspondingly, the data word d(k) is also multiplied with the quadrature-phase representation fof the carrier frequency-phase candidate vector V(f, φ) in the relevant set, and a second intermediate-frequency-reduced information word S(k) is produced.
IFI
IFQ
fφ
IF-C
C
fφ
IF-C
C
Preferably, the multiplication between the data word d(k) and the in-phase representation frespective the quadrature-phase representation fof the carrier frequency-phase candidate vector V(f, φ) are performed by means of XOR- or SIMD-operations (i.e. 1-bit and multiple-bits multiplications respectively). This is namely possible if the data word d(k) and the vector V(f, φ) have compatible data formats.
IF-I
m-P
P
IP
IF-I
m-E
E
IE
IF-I
m-L
L
IL
IF-Q
m-P
P
QP
IF-Q
m-E
E
QE
IF-Q
m-L
L
QL
Subsequently, the first intermediate-frequency-reduced information word S(k) is multiplied with a modified code vector CV, which has been retrieved from the digital memory where these pre-generated vectors are stored, and starts at a position indicated by the prompt pointer P. A first prompt-despread symbol string Λ(k) is produced as a result of this operation. The first intermediate-frequency-reduced information word S(k) is also multiplied with a modified code vector CV(k), which starts at a position indicated by the early pointer P. A first early-despread symbol string Λ(k) is produced as a result of this operation. The first intermediate-frequency-reduced information word S(k) is likewise multiplied with a modified code vector CV(k), which starts at a position indicated by the late pointer P, and a first late-despread symbol string Λ(k) is produced. Moreover, the second intermediate-frequency-reduced information word S(k) is multiplied with a modified code vector CV(k), which starts at a position indicated by the prompt pointer P, and a second prompt-despread symbol string Λ(k) is produced. Correspondingly, the second intermediate-frequency-reduced information word S(k) is multiplied with a modified code vector CV(k), which starts at a position indicated by the early pointer P, and a second early-despread symbol string Λ(k) is produced. Likewise, the second intermediate-frequency-reduced information word S(k) is multiplied with a modified code vector CV(k), which starts at a position indicated by the late pointer P, and a second late-despread symbol string Λ(k) is produced.
R-IE
R-IP
R-IL
R-QE
R-QP
R-QL
IP
IE
IL
QP
QE
QL
R
R
IP
IE
IL
QP
QE
QL
1310
After that, a resulting data word D(k), D(k), D(k), D(k), D(k) and D(k) may be derived from the each of the despread symbol strings Λ(k), Λ(k), Λ(k), Λ(k), Λ(k) and Λ(k) respectively by adding the elements in the respective string together. If the strings represent un-packed data, the processor may simply perform the relevant adding operation to obtain the resulting data word D(k). If however, the strings represent packed data, the resulting data word D(k) is, according to a preferred embodiment of the invention, derived by looking up a pre-generated value in a table based on the bit pattern given by the respective despread symbol string Λ(k), Λ(k), Λ(k), Λ(k), Λ(k) and Λ(k).
R-IE
R-IP
R-IL
R-QE
R-QP
R-QL
R
R
R
R
R
1
1
According to a preferred embodiment of the invention, in addition to the individual data words D(k), D(k), D(k), D(k), D(k) and D(k), corresponding accumulated data words are produced, such that after having generated a data word D(k), the sum of all data words D() to D(k) is also obtained. Hence, when the data word d(N) has been processed, the resulting sum D() to D(N) is also at hand.
R-IE
R-IP
R-IL
R-QE
R-QP
R-QL
R-IP
FIG. 4
Moreover, the resulting data words represent payload information. For instance, based on the set of resulting data words D(k), D(k), D(k), D(k), D(k) and D(k) a demodulated piece of information of a transmitted data symbol sequence D as shown in may be derived. In a steady state operation, basically only one of the resulting data words, say D(k), actually carries the information.
IF-I
IF-Q
m-P
m-E
m-L
IF-I
IF-Q
m-E
m-P
m-L
FIG. 11
According to a preferred embodiment of the invention, the multiplications involved in the multiplications between the intermediate-frequency-reduced information words S(k) and S(k) respectively and the modified code vectors CV(k), CV(k); CV(k) are all performed by means of XOR- or SIMD-operations. This is possible if the intermediate frequency information words S(k); S(k) and the modified code vectors CV(k), CV(k); CV(k) have compatible data formats. It was mentioned above with reference to that more than one pair of early- and late pointers may be assigned to the prompt pointer in order to accomplish an improved tracking.
FIG. 14
FIG. 13
E1
L1
E2
L2
P
P
E1
L1
E2
L2
P
P
E1
L1
E2
L2
m-E
m-P
m-L
illustrates how two pairs of such pointers P; Pand P; Prespectively are assigned around a prompt pointer Paccording to an embodiment of the invention. The horizontal axis here represents a code shift CS and the vertical axis shows a normalised correlation factor. An optimal positioning of the prompt pointer Pis thus equivalent to a normalised correlation value of 1. The more the sampled data is shifted in either direction from this position, the lower the correlation value becomes down to substantially zero for a shift of one chip or more. The algorithm is perfectly balanced when (as illustrated in the figure) both the pointers Pand Pof a first pair produce a first shifted correlation result, both the pointers Pand Pof a second pair produce a second shifted correlation result, the first shifted correlation result is larger than the second shifted correlation result and both the first and the second shifted correlation results are smaller than the correlation result obtained at the prompt position P. Said correlation results are preferably generated according to a process corresponding to what has been described above with reference to . Based on the correlation results for the pointer positions P, P, P, Pand Pa (if necessary new) set of modified code vectors CV(k), CV(k); CV(k) is selected, which is deemed to be optimal.
FIG. 15
1500
1500
1510
1520
1530
shows a signal receiver for receiving navigation data signals transmitted in a navigation satellite system according to an embodiment of the invention. The receiver includes radio front end unit , an interface unit and a digital processor unit .
1510
1520
1530
1530
1535
1530
HF
IF
IF
IF
The radio front end unit is adapted to receive a continuous radio signal S, and in response thereto produce a corresponding electrical signal Swhich has a comparatively high frequency. The interface unit is adapted to receive the electrical signal S, and in response thereto, produce a sequence of sample values that represents the same information as the electrical signal Sand is divided into data words d(k). The digital processor unit is adapted to receive the data words d(k), and in response thereto, demodulate a data signal. The digital processor unit , in turn, includes a memory means , which is loaded with a computer program that is capable of controlling the steps of the proposed procedure when the program is run in the processor unit .
FIG. 16
In order to sum up, the general method of processing spread spectrum signals according to the invention will now be described with reference to a flow diagram in .
1600
1600
A preparation step pre-generates code vectors which each represents a signal source specific code sequence that is intended to be received (or at least possible to receive) and demodulated in the receiver. The step is performed before the signal reception is initiated.
1610
1620
1510
1630
1640
1650
1640
1660
1640
1610
1620
1660
1610
1660
FIG. 16
A step then receives a continuous signal of a comparatively high frequency. A following step samples the continuous signal at a basic sampling rate, whereby a resulting sequence of time discrete signal samples is produced. Each sample is also quantised (either with a relatively low-resolution, such as with 1 bit per sample value, or with a relatively high resolution depending on the application and the number of data bits per samples delivered from the radio front end unit ), such that a corresponding level-discrete sample value is obtained. Subsequently, a step forms data words from the sample values, where each data word includes one or more consecutive sample values. After that, a step carries out correlation operations between the information in the data words and at least one of the pre-generated representations of a signal source specific code sequence. The correlation step involves correlating at least each vector in a sub-group of the code vectors with at least one vector that has been derived from a data word. A following step produces data as a result of the correlation performed in step . Then, a step investigates whether the sampled sequence has ended, i.e. whether there are any more data words to process. If more sampled data to process is found, the procedure returns to the step . Otherwise, the procedure loops back to the step again for continued reception of the incoming signal. Naturally, such signal is preferably also received during execution of the steps to . The sequential procedure illustrated in is merely applicable to a specific received signal segment. Preferably, all the steps are actually to are actually performed in parallel.
FIG. 16
The process steps, as well as any sub-sequence of steps, described with reference to the above may be controlled by means of a programmed computer apparatus, such as a microprocessor located in a GNSS-receiver. Moreover, although the embodiments of the invention described above with reference to the drawings comprise computer apparatus and processes performed in computer apparatus, the invention thus also extends to computer programs, particularly computer programs on or in a carrier, adapted for putting the invention into practice. The program may be in the form of source code, object code, a code intermediate source and object code such as in partially compiled form, or in any other form suitable for use in the implementation of the process according to the invention. The carrier may be any entity or device capable of carrying the program. For example, the carrier may comprise a storage medium, such as a ROM (Read Only Memory), for example a CD (Compact Disc) or a semiconductor ROM, or a magnetic recording medium, for example a floppy disc or hard disc. Further, the carrier may be a transmissible carrier such as an electrical or optical signal which may be conveyed via electrical or optical cable or by radio or by other means. When the program is embodied in a signal which may be conveyed directly by a cable or other device or means, the carrier may be constituted by such cable or device or means. Alternatively, the carrier may be an integrated circuit in which the program is embedded, the integrated circuit being adapted for performing, or for use in the performance of, the relevant processes.
The term “comprises/comprising” when used in this specification is taken to specify the presence of stated features, integers, steps or components. However, the term does not preclude the presence or addition of one or more additional features, integers, steps or components or groups thereof.
The invention is not restricted to the described embodiments in the figures, but may be varied freely within the scope of the claims. | |
Log InForgot password?
Don't Have an Account
Begin to enjoy the benefits by Creating your account
Read premium articles, post in our community, and more!Create Account More Info?
These seminars have been supported since 2001 by Bracebridge Capital, Fuller and Thaler Asset Management, and LSV Asset Management. The Russell Sage Foundation supported them from 1991–2001.
The field of behavioral finance uses a broad social science perspective to study the behavior of financial markets. Methods that originate in psychology are used as research tools, along with traditional finance research methods.
Research in behavioral finance is relatively new: it took place mostly since 1985. The workshop in behavioral finance has continued under the direction of Robert J. Shiller and Richard H. Thaler at the NBER since 1991. Over these years, we have seen the blossoming of behavioral finance into a significant body of knowledge.
The research methods in finance most in use before the advent of behavioral finance did not then seem to lend themselves to the application of psychology. Models of individual optimization were almost exclusively based on the assumption of perfectly rational individual behavior. Many of the predictions of these models were described as representing the notion that financial markets were “efficient,” that is, that prices in financial markets accurately incorporate all publicly available information. Studies of the efficiency of financial markets often reported apparent contradictions of efficient markets in the literature, but, before the development of the theory of behavioral finance, their results were hard to interpret, there being at that time no well-delineated alternative hypothesis to compare with the efficient markets hypothesis.
A substantial share of the research that has been presented at the behavioral finance workshop since its beginnings has been at work in developing alternative theoretical approaches to the study of financial markets. Such theoretical research has taken great impetus from the prospect theory of Daniel Kahneman and Amos Tversky, which was first published in 1979.
|
|
Prospect theory offered the first significant alternative to the expected utility paradigm that dominated research in finance until then. Prospect theory was based on experimental evidence about human behavior under uncertainty, and was built up to fit the evidence rather than embody an abstract sense of rationality. Prospect theory relies on evidence that when making economic decisions people are easily influenced by framing, that is by the context and ambience that accompany the decision problem. Part of this context is generated by the people themselves, as when they adopt arbitrary mental accounting of their financial circumstances.
Many papers presented at the Workshop in Behavioral Finance are in the realm of clarifying the relevance of prospect theory and its associated issue of framing to financial market phenomena. For example, we have seen studies that use prospect theory to help us to understand the reasons for the apparent excess volatility of certain speculative asset prices, for the momentum that is often seen in these prices, as well as for the mean reversion that is often seen in these prices. Applying the psychological theory to such phenomena gives us a sense when to expect excess volatility, momentum or mean reversion, and when not.
There are many other psychological theories that have been applied successfully to understanding phenomena in financial markets. Extensive psychological research has documented that people tend to be overconfident in their judgments. People tend to show a wishful thinking bias, believing what they want to believe. People show problems of self control, and know that they may be unable to control themselves in the future. People often make judgments using the representativeness heuristic, that is when judging the probability that a model is true, they base their estimate on the degree to which the data resemble the model, rather than do appropriate probability calculations. People tend to exhibit belief perseverance, hanging onto past beliefs long after they should have abandoned them. People tend to make the error of anchoring, that is, when making difficult quantitative judgments they tend to start from some arbitrary initial estimate, often suggested to them by something in their immediate environment, and then allow that initial estimate to influence their judgments. People tend to show an availability bias, overweighting evidence that comes easily to mind, thereby allowing their decisions to be over-influenced by evidence that is more salient and attention-grabbing.
Many of the papers that have been presented at the Workshop for Behavioral Finance have presented empirical work making use of extensive data sets that allow testing for the relevance of such psychological principles in influencing investor behavior. Data used include returns data for speculative assets, data on measures of value relative to fundamentals, and data on the volume of trade. Increasing use has been made of data on individual trades and actions of individual investors, and these data are linked to other data on the characteristics and economic circumstances of these investors. Moreover, significant data have been employed that are generated through either experimental or questionnaire survey methods. | https://thegrcbluebook.com/grc-articles/behaviorial-finance-by-robert-shiller |
The barbie and nutcracker part 5 first international world championship was held in Budapest on June 5, 1982, and was won by Minh Thai, a Vietnamese student from Los Angeles, with a time.95 seconds.
2nd Step: Make All the Corners Yellow NOW look at the top (U) face and match your top (U) face to one of the states below.
If you're moving the edge piece in the same direction as indicated here.Please note that the fastest Rubik's cube solvers use an improved version of this method that allow them to solve the last layer in only two algorithms.And also how it works internally.By solving the corners, the first layer will be completely solved.Other high-order cubes include the 13x13 (the largest mass produced cube the 17x17 and 22x22 (as of June 2016, the largest NxNxN puzzle ever produced).In the 2004 movie Hellboy, Abe Sapien shows an unsolved/scrambled Rubik's Cube while commenting "Listen, I'm not much of a problem solver.If it is not the case, you will need to correct this at some point.Indeed, it is better to put it on the bottom so building a search engine manual that we do not see it anymore.He didn't reach the New York Times Best Seller list for that year.At this stage, every move on a layer (which is not the bottom layer) will break what has been built before.
In the 2006 movie The Pursuit of Happyness starring Will Smith, Chris Gardner (Smith's character) successfully solves a Rubik's Cube to the astonishment of his future employer (who thinks that it is impossible to solve).
If you are not sure about Rubik's cube notations, please have a look at our page presenting the notations of the Rubik's cube moves.IT doesn't matter if the other color tile on the Edge piece matches anything.Upper-middle layer edges, solve the first three edges intuitively and use the algorithm to do the last one.U Up Face - Top side of the cube.A commercial spot for the PlayStation 3 video game console places the machine against a scrambled Rubik's Cube in a bland room.The two solved edges can either be on adjacent faces kubota tractor b1750 workshop manual illustrated or on opposite faces. | https://acheter-ma-voiture.eu/rubiks-cube-game-3x3.html |
This chapter has described the data and products of the USDA UVMRP. These datasets are available to the public and can be accessed via the Internet. The monitoring network consists of 37 observation sites covering the continental U.S., along with coverage of Alaska and Hawaii, southern Canada, and southern New Zealand. Multifilter Shadowband Rotating radiometers are deployed to make spectral irradiance measurements in the UV and visible wavelength regions. The erythemally weighted UV radiation is measured by broadband pyranometers. The PAR is also measured for use in agricultural research. The program has been providing quality UV-B radiation data to researchers throughout the agricultural, medical, industrial, and atmospheric research communities since 1993. The primary
raw voltage measurements are available by special request. With our research in instrumentation, correction techniques, system stability, and statistical analysis, high quality calibrated data have been produced as second level products. These data furnish researchers in agriculture, ecology, environment, meteorology, human health, and related specialties with valuable information not available elsewhere. Based on our research results, optical depths, daily column ozone, and synthetic spectra are derived using spectral UV-B measurements, plus spectral irradiances in the visible region. The USDA UVMRP receives numerous requests for its products from researchers in agriculture, atmospheric monitoring, human and animal health, and industrial product quality concerns. The UVMRP is collaborating with the broader scientific community, with an eye toward the future, to focus its activities and resources to best serve the needs of researchers across a wide spectrum of scientific and social activities.
Was this article helpful? | https://www.climate-policy-watcher.org/ultraviolet-radiation-2/summary-1.html |
10-2010-0071789
This application claims the benefit of Korean Patent Application No. , filed in the Korean Intellectual Property Office on July 26, 2010, which is hereby incorporated by reference as if fully set forth herein.
The present invention relates to nano-hybrid chemical admixture for chloride invasion resistance consisting of layered double hydroxide/polyurethane copolymer. More specifically, the present invention relates to concrete chemical admixture consisting of nano-hybridized layered double hydroxide (a) and polyurethane copolymer (b) using nano-hybrid technology, wherein the concrete chemical admixture for chloride invasion resistance consists of 5 to 50% by weight of layered double hydroxide (a) and 50 to 95% by weight of polyurethane copolymer (b).
Concrete chemical admixture is generally used as water reducing agent and plasticizer for concrete composition such as cement paste, mortar and concrete, which are required to form structural materials for civil engineering and construction.
J.T. Song et al. Jour. of Kor. Ceramic Soc., Vol. 41, 302~312, 2004
Since concrete chemical admixture generally has large surface tension, it is least affected by the difference in concentration, and consequently, usage of a large amount of concrete chemical admixture significantly improves the compressive strength of produced concrete without causing deterioration in chemical and physical properties during production []. Preferred is concrete chemical admixture with high water reducing ability, small slump/flow loss, excellent durability and workability.
Conventional concrete chemical admixture includes polycarboxylic acid-based concrete chemical admixture; or sulfonate-based concrete chemical admixture in the form of sulfonate, such as naphthalene, melamine or lignin sulfonate. A generally used polycarboxylic acid-based concrete chemical admixture exhibits high water reducing ability and watertightness, but it has poor resistance to chloride invasion, and thus, cannot prevent corrosion of the reinforcing steel in the concrete structures or buildings caused by the invaded chloride.
Pierre-Claude Aitcin, Binders for Durable and Sustainable Concrete, 146-205
Meanwhile, marine constructions are being actively developed for the effective usage of national territories with rapidly increasing populations. However, there are some restrictions in applying conventional concrete chemical admixture directly to marine concrete structures. More specifically, if conventional concrete chemical admixture in the form of sulfonate, such as naphthalene, melamine, or lignin sulfonate is applied to marine concrete structures, the sulfonate ingredient causes crack accelerating deterioration of the structures [].
As to the polycarboxylic acid-based acid concrete chemical admixture, unlike other concrete admixture in the form of the sulfonate, it does not cause chemical reactions by the sulfate ions. In addition, the polycarboxylic acid-based concrete chemical admixture can impart watertightness to concrete structures, preventing chloride penetration to a certain extent, but it still cannot prevent chloride ion penetration fully.
After 1950's, washed sea sand was proposed to use in the field of the construction of buildings because the situation on the production of the concrete aggregate was getting worse due to the restriction on collecting the river sand all around the world, especially in Japan and England. Thus, washed sea sand and land sand (desert sand, crushed sand and mountain sand) are recently being widely used, instead of river sand. However, since washed sea sand contains a large amount of chloride ion, it causes the corrosion of reinforcing steel in the concrete structures or buildings, and accordingly, leads to decrease in durability of steel concrete structures. Further, this also leads to decrease life span due to the crack created by the deterioration of steel concrete structures. Therefore, it is necessary to add a corrosion inhibitor which can prevent the corrosion of reinforcing steel.
Generally used corrosion inhibitors are mainly comprised nitrite compound, which are inorganic-based compound. However, the used amount of such nitrite compounds is limited in the concrete composition for the purpose described above, due to alkali aggregate reaction, which is caused by the released alkaline metal ion (positive) from the nitrite ion (negative) in the concrete composition.
In addition, the above nitrite based corrosion inhibitor itself cannot impart water reducing ability or workability to the obtained concrete, and thus, must be used in combination with concrete chemical admixture. This brings the necessity for the concrete chemical admixture with the capability of preventing chloride invasion in the field of the concrete composition.
II+
III
m-
II+
III+
m-
1-x
x
2
x/m
2
V. Rives, Layered Double Hydroxides: Present and Future, 2001, Nova Science Publisher Inc., New York
V. Rives, 2002, Meter. Chem. Phys., 75, (2002), 19
,
.
Meanwhile, layered double hydroxide (LDH) is a chemical compound comprising two-dimensional layered structure and can be anionic clay, which is hydrotalcite-analogue or brucite-analogue compound. The layered double hydroxide is generally expressed in the chemical formula of [MNN(OH)] [A].nHO, wherein M and N independently represent metal cations, respectively, and A represents anions within the double layer. Layered double hydroxide has high anion exchange capacity, various chemical composition, good swelling properties, good biocompatibility and affinity to carbonate ion. Thus, it can have been used in the various fields such as biomimetics application, anion exchanger, stabilizer, absorber, halogen scavenger, catalyst, catalyst support, precursor, etc. [ etc.]
The layered double hydroxide described herein not only exists naturally, but also can be synthesized artificially and undergoes phase changes while going through dehydration, deoxidisation and deionisation, depending on the method of synthesis, the way of processing, or its thermal behavior.
10-0548645
10-0527978
10-0370961
10-0909220
1 262 499 A1
US Patent No. 5,447,969
The above layered double hydroxide, as an inorganic compound, is resistant to heat and unharmful to human being, and it has an excellent ability of scavenging chloride ions existing within the double layered structure, and thus can improve thermal stability and flame retardancy of a polymer resin comprising the layered double hydroxide above (Korean Patent No. , , , , European Patent Publication No. , and so on).
However, as described in the previous patents publications and applications, layered double hydroxide has been applied in various fields including polymer resins, catalysts, filters and bio-inspired applications, but never has been used in the field of construction materials such as concrete.
Therefore, the object of the present invention is to provide nano-hybrid concrete chemical admixture for chloride invasion resistance comprising layered double hydroxide and polyurethane copolymer (also referred as "layered double hydroxide/polyurethane copolymer" sometimes) to prevent chloride ion-induced degradation of marine civil engineering structures and to prevent the degradation of concrete composition due to wide use of deicing chemicals such as calcium chloride during the winter seasons.
In order to achieve the object of the present invention provided is concrete chemical admixture comprising layered double hydroxide (a) represented by the Formula (I), and a polyurethane copolymer (b).
2+
3+
n-
1-x
x
2
x/n
2
[MN(OH)] [A]·yHO Formula (I)
2+
3+
n-
in which, M represents a divalent metal cation and N represents a trivalent metal cation; A represents an anion, which is bonded through ionic bonding within the layer of the hydroxide; and n represents a charge number; x is a number greater than 0 and less than 1; and y represents a positive integer.
The layered double hydroxide (a) is present in an amount of 5 to 50 wt% and the polyurethane copolymer (b) is present in an amount of 50 to 95 wt%, based on the total weight of the concrete chemical admixture obtained.
2+
2+
2+
2+
2+
2+
2+
3+
3+
3+
3+
3+
3+
3+
3+
n-
-
-
2-
-
2-
2-
2
3
3
4
In the Formula (I) above, M is selected from the group consisting of Mg, Ca, Co, Cu, Ni and Zn; and N is selected from the group consisting of Al, Cr, Fe, Ga, In, V and Ti. In the Formula (I), A is selected from the group consisting of NO, NO, CO, OH, O, SO, halide, metalate and an organic acid anion.
The layered double hydroxide may comprise a layered structure sized in the range of 50 to 300 nm. The distance between the layers of the layered double hydroxide may be 0.75 to 0.85 nm (7.5 to 8.5 Å).
The polyurethane copolymer (also referred as 'the polyurethane polymer copolymer, sometimes) can be prepared by polymerizing 10 to 95% by weight of at least one unsaturated (meth)polyoxyalkylene urethane compound represented by the Formula (II) and 5 to 50% by weight of at least one unsaturated anionic organic monomer represented by the Formula (III). The weight percents are based on the total weight of polyurethane copolymer (b).
1
1
1
3
1
1
6
2
1
6
3
12
1
6
3
1
6
1
2
20
In the Formula (II) above, X, Y and Z are each independently identical or different and are selected from the group consisting of hydrogen (-H), a methyl group (-CH) and a carboxylic group (-COOH); R represents a C-C hydrocarbon or a ketone; R represents a C-C aromatic group, a C-C ring shaped hydrocarbon, or a C-C hydrocarbon; R represents hydrogen (-H), or a C-C hydrocarbon; PO represents at least one or two C-C oxyalkylene group; m is the mean addition number of moles of the oxyalkylene group and represents an integer of 1 to 100; and n is an average mole number of repeat units and represents an integer of 3 to 150.
2
2
2
3
2
2
2
4
In the Formula (III) above, X, Y and Z are each independently identical or different and are selected from the group consisting of hydrogen (-H), a methyl group (-CH) and a carboxylic group (-COOH), provided that one of X, Y and Z is hydrogen; and R represents a carboxylic group (-COOH) or a nitrile group (-CN).
The unsaturated (meth)polyoxyalkylene urethane compound represented by the Formula (II) above can be prepared by an addition of either an unsaturated organic acid or unsaturated alcohol to urethane-polyoxyalkylene derivatives.
The suitable unsaturated organic acid can be selected from the group consisting of mono-carboxylic acid, dicarboxylic acid and combination thereof. The unsaturated alcohol can be selected from the group consisiting of vinyl alcohol, (meth)allyl alcohol, 3-buten-1-ol, isoprene alcohol, 3-methyl-2-buten-1-ol, 2-methyl-3-buten-1-ol, 2-methyl-3-buten-2-ol, 2-methyl-2-buten-1-ol and combinations thereof.
6
3
12
1
6
The urethane derivative used for the preparation of the unsaturated organic acid-polyoxyalkylene urethane compound may be a diisocyanate derivative with a C aromatic hydrocarbon, a C-C cyclic hydrocarbon or a C-C linear hydrocarbon.
The polyoxyalkylene derivative can be selected from the group of consisting of ethylene glycol, propylene glycol, butylene glycol, isobutylene glycol and combinations thereof. The mean addition number of moles of the polyoxyalkylene group, m represents a number of 6 to 100. The unsaturated anionic organic monomer (d) above can be selected from the group consistion of unsaturated monocarboxylic acid monomer, unsaturated dicarboxylic acid monomer, unsaturated nitrile monomer and combinations thereof.
In accordance with the present invention, nano-hybrid concrete chemical admixture comprising layered double hydroxide/polyurethane copolymer for chloride resistant concrete, which is readily absorbed to surfaces of cement particles even in strong alkaline conditions of concrete slurry, and thus, exhibits high water-reducing ability, improved slump retention and enhanced workability is provided.
More specifically, the present invention is directed to nano-hybrid concrete chemical admixture by layered double hydroxide and polyurethane copolymer for chloride resistant concrete, which can regulate anti-corrosion function, fluidity and viscosity of marine concrete structures. This in turn results in high workability and high watertightness of concrete, preventing material segregation and decrease in the strength of concrete. Particularly, the present invention is directed to nano-hybrid chemical admixture by layered double hydroxide and polyurethane copolymer for chloride resistant concrete, which can improve anti-corrosion capability, watertightness and durability of marine concrete.
It is to be understood that both the foregoing general description and the following detailed description of the present invention are exemplary and explanatory and are intended to provide further explanation of the invention as claimed.
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the invention and along with the description serve to explain the principle of the invention. In the drawings:
FiG. 1
FIG. 1A
Fig. 1B
is a diagram to explain one of general concrete chemical admixture based on polycarboxylic acid polymer, and more specifically, shows concrete chemical admixture of polycarboxylic acid polymer, and shows chloride-resistant nano-hybrid chemical admixture including layered double hydroxide and polyurethane copolymer according to the present invention.
FIG. 2
FIG. 2
-
-
-
-
-
is the mechanism of chloride penetration resistance of the layered double hydroxide, a component of the nano-hybrid chemical admixture according to the present invention. In the drawing of , A represents anions such as chlorides, which are penetrated in large amounts in marine concrete structures and cause corrosion, and sulphates, which exist in conventional concrete chemical admixture such as polycarboxylic concrete chemical admixture and also cause corrosion. In addition, B represents anion with anti-corrosion capability. Since A has a greater negative charge than B, an anion exchange reaction occurs between A and B.
FIG. 3
FIG. 3, (A)
shows the X-ray diffraction of the layered double hydroxide. In the drawing of is related to X-ray diffraction of naturally existing layered double hydroxide and (B) shows that of synthesized layered double hydroxide according to the present invention.
FIGs. 4A to 4D
FIGs. 4A
4B
FIGs. 4C
4D
are the TEM images of the naturally existing layered double hydroxide and the layered double hydroxide prepared according to present invention, respectively. and are a surface structure and an internal structure of the naturally existing layered double hydroxide, while and show a surface structure and an internal structure of the layered double hydroxide prepared according to the present invention, respectively.
FIG. 5
shows the UV spectroscopy patterns of layered double hydroxide. In the graph, (A) stands for the naturally existing layered double hydroxide and (B) stands for the layered double hydroxide prepared according to the present invention.
FIG. 6
2
2
shows an image from the corrosion test of reinforcing steel according to Example 4, which was immersed in 3.5% standard chloride water and 3.5% standard chloride water containing nano-hybrid chemical admixture by layered double hydroxide and polyurethane copolymer for chloride resistant concrete according to the present invention. In the pictures, (A) represents a 3.5% standard chloride solution containing Ca(NO), (B) represents a 3.5% standard chloride solution and (C) represents 3.5% standard chloride water containing nano-hybrid chemical admixture by layered double hydroxide and polyurethane copolymer for chloride resistant concrete prepared according to the present invention.
FIGs. 7A to 7F
FIGs. 7A
7C and 7E
FIGs. 7B
7D
7F
show the results of an accelerated corrosion test of reinforcing steel in KS F 2561 concretes. , show the results of the accelerated corrosion test of reinforcing steel in concretes in which only polycarboxylic acid copolymer is used as a concrete chemical admixture(Comparative Example 3). On the contrary, , and show the results of the accelerated corrosion test of reinforcing steel in concretes where the nano-hybrid chemical admixture prepared according to the present invention is used as a concrete chemical admixture(Example 3).
The concrete chemical admixture prepared according to the present invention has a structure, which consists of an ionic interaction between layered double hydroxide and polyurethane copolymer, comprising a structure where anionic absorbent groups exist in the main chain and (meth)polyoxyalkylene urethane compounds are attached to the main chain as side chains thereof.
-
2-
4
The layered double hydroxide represented by the Formula (I) below, exhibits an excellent capability of scavenging anions such as Cl and SO existing within concrete composition and thus improves chloride penetration resistance of concrete.
2+
3+
n-
1-x
x
2
x/n
2
[MN(OH)] [A]·yHO Formula (I)
In formula (I) above, M represents a divalent metal cation, N represents a trivalent metal cation, A is an anionic chemical species with charge number n and water molecule, x is a number greater than 0 and less than 1, and y is an integer greater than 0.
The concrete chemical admixture prepared according to the present invention also comprises a polyurethane copolymer, which can be prepared from unsaturated (meth)polyoxyalkylene urethane compound represented by the Formula (II) and unsaturated organic monomer represented by the Formula (III).
1
1
1
3
1
1
6
2
6
3
12
1
6
3
1
6
1
2
20
In the Formula (II) above, X, Y and Z are each independently identical or different and are selected from the group consisting of hydrogen (-H), a methyl group (-CH) and a carboxylic group (-COOH); R represents, a C-C hydrocarbon or a ketone; R represents a C aromatic group, a C-C cyclic hydrocarbon or a C-C linear hydrocarbon; R represents hydrogen (-H) or a C-C hydrocarbon; PO represents one or two C-C oxyalkylene group; m is the mean addition number of moles of the oxyalkylene group and represents an integer of 2 to 100; and n is an average mole number of repeat units and represents an integer of 3 to 150.
2
2
2
3
2
2
2
4
In the formula (III) above, X, Y and Z are each independently identical or different and are selected from the group consisting of hydrogen (-H), a methyl group (-CH) and a carboxylic group (-COOH), provided that one of X, Y and Z is hydrogen; and R represents a carboxylic group (-COOH) or a nitrile group (-CN).
The polyurethane copolymer (b) has a good dispersion ability in cement compositions, due to hydrophillicity and steric hinderance of the (meth)polyoxyalkylene urethane group, which is a non-ionic hydrophilic group derived from unsaturated (meth)polyoxyalkylene urethane compound represented by the Formula (II), and has a strong affinity to cement particles due to anionic absorbents of monomer units in the polyurethane copolymer derived from unsaturated organic monomer (d) represented by the Formula (III).
The concrete chemical admixture prepared according to the present invention consists of 5 to 50% by weight of layered double hydroxide and 50 to 95% by weight of polyurethane copolymer, based on the total weight of layered double hydroxide and polyurethane copolymer.
The unit "% by weight" used herein refers to a weight ratio of the nano-hybrid chemical admixture by layered double hydroxide and polyurethane copolymer for chloride resistant concrete calculated based on the total weight of unit monomers, unless otherwise mentioned.
Hereinafter, nano-hybrid chemical admixture by layered double hydroxide and polyurethane copolymer for chloride resistant concrete comprising layered double hydroxide (a) and polyurethane copolymer (b) will be described in detail.
(a) layered double hydroxide (LDH)
Layered double hydroxide, one of the components of the nano-hybrid chemical admixture according to the present invention, is an inorganic nano-particle synthesised by isomorphic substitutions of divalent and trivalent metal cations, and is represented by Formula (I) below.
2+
3+
n-
1-x
x
2
x/n
2
[MN(OH)] [A]·yHO Formula (I)
In the Formula (I), M represents a divalent metal cation, N represents a trivalent metal cation, A comprises an anionic compound with charge number n and water molecule, x is a number greater than 0 and less than 1, and y is a positive integer.
2+
2+
2+
2+
2+
2+
2+
3+
3+
3+
3+
3+
3+
3+
3+
In the Formula (I) above, M is selected from the group consisting of Mg, Ca, Co, Cu, Ni and Zn; and N is selected from the group consisting of Al, Cr, Fe, Ga, In, V and Ti.
n-
2-
3-
2-
-
2-
2-
3
4
In the Formula (I), A is selected from the group consisting of NO, NO, CO, OH, O, SO, halide, metalate and an organic acid anion.
FIG 2
The layered double hydroxide represented by the Formula (I) above has an excellent capability of scavenging chloride ions from concrete composition by anion exchange reaction, which may be described in brief by reaction scheme illustrated in .
Fig 2
2
-
As illustrated in , the electric attraction of anions existing between layers of layered double hydroxide has weaker than that of chloride ions, and thus, exchange reaction occurs between the anions existing in the layers and the chloride ions. Furthermore, during the exchange reaction, anions with anti-corrosion capability are released into concrete, and consequently, the released anions from the layers prevent the corrosion of reinforcing steel. An example of anions with anti-corrosion ability is NO ion.
2
2
-
-
Fig 2
In an example of the layered double hydroxide (LDH) according to the present invention, the layered double hydroxide was synthesized with NO ion between the layers of LDH, and therefore, NO ions can prevent corrosion of reinforcing steel in concrete by anion exchange reaction such as the reaction illustrated in .
Layered double hydroxide is present in an amount of 5 to 50 wt% in the nano-hybrid concrete chemical admixture comprising polyurethane copolymer and layered double hydroxide according to the present invention. Within the ranges described above, layered double hydroxide contains a sufficient number of anions with anti-corrosion capability incorporated between the layers, and thus, imparts sufficient chloride penetration resistance and dispersion ability and slump retention ability with time to concrete composition. If layered double hydroxide is present in a greater than the range described above, dispersing effects in concrete composition is not sufficient enough, and if layered double hydroxide is present in a lower than the 5 wt% in the nano-hybrid concrete chemical admixture, the strength and anti-corrosion capability of the concrete structure is deteriorated.
(b) Polyurethane copolymer
(1) Unsaturated (meth)polyoxyalkylene urethane compound (c)
Unsaturated (meth)polyoxyalkylene urethane compound (c), one of the monomer components of polyurethane copolymer, which is a component of the nano-hybrid chemical admixture by layered double hydroxide and polyurethane copolymer consists of a polymerizable unsaturated group, urethane derivatives and oxyalkylene chains. The unsaturated (meth)polyoxyalkylene urethane compound has a structure comprising urethane bond interactions and is represented by the Formula (II) below.
2
2
2
3
1
1
6
2
6
3
12
1
6
3
1
6
1
2
20
In the Formula (II), X, Y and Z are each independently identical or different and are selected from the group consisting of hydrogen (-H), a methyl group (-CH) and a carboxylic group (-COOH); R represents C-C hydrocarbon or a ketone; R represents C aromatic group, C-C cyclic hydrocarbon or C-C linear hydrocarbon; R represents hydrogen (-H) or a C-C hydrocarbon; PO represents one or two C-C oxyalkylene group; m is the mean addition number of moles of the oxyalkylene group and represents an integer of 2 to 100; and n is an integer of 1 to 50, an average mole number of repeat units. The average mole number [(m*n)+m] of oxyalkylene in the unsaturated (meth)polyoxyalkylene urethane compound is an integer of 50 to 100.
Unsaturated (meth)polyoxyalkylene urethane compound (c) comprises polyoxyalkylene-urethane derivative with an average mole number of 1 to 50 and preferably, 3 to 30 in order to exert desired functions.
1
2
20
In the Formula (II), the oxyalkylene unit represented by PO is at least one C-C alkylene oxide adducts. Such an alkylene oxide adduct is prepared from at least one alkylene oxide such as ethylene oxide, propylene oxide, butylene oxide and isobutylene oxide.
1
At least one oxyalkylene units can be introduced into the same unsaturated (meth)polyoxyalkylene urethane compound (c) by an addition reaction method such as random, block addition and alternating addition. When PO contains two or more oxyalkylene units, these oxyalkylene units can be added as blocks or randomly added.
1
1
The mean addition number of moles of the oxyalkylene group represented by PO, m, is an integer of 2 to 100. When m is less than 2, the compound or monomer (c) can not obtain enough chain flexibility, and thus, can not gain enough steric hinderance in order to disperse cement particles in the concrete composition. Also, hydrophilicity of the oxyalkylene group may be insufficient to impart dispersion ability to the concrete composition. The range of m in the oxyalkylene unit (PO), the average mole number of the oxyalkylene group, is more preferably 6 to 50.
For example, the compound represented by the Formula (II) is an unsaturated organic acid-polyoxyalkylene urethane derivative, which is prepared by adding a polyoxyalkylene urethane to an organic acid chain containing an unsaturated group. Addition reaction of unsaturated organic acid-polyoxyalkylene urethane can be explained by the following Reaction Scheme in brief, for instance.
3
In the Reaction Scheme 1, R' is hydrogen (-H) or a methyl group (-CH), R" is hydroxyl group (-OH) or C1-C6 oxy-hydrocarbon, and m is an integer equal to or greater than 1.
As can be seen from the Reaction Scheme 1 above, the urethane derivative and a diol are reacted to obtain unsaturated organic acid-polyoxyalkylene urethane compound. And then, the resulting urethane compound is reacted with unsaturated organic acid or unsaturated alcohol.
The urethane derivative used for the preparation of the unsaturated organic acid-polyoxyalkylene urethane compound may be a diisocyanate derivative with aromatic hydrocarbon, cyclic or linear hydrocarbon, for example. More specifically, examples of diisocyanate derivatives comprising aromatic, cyclic or linear hydrocarbon are 2,4-toluene diisocyanate, methylenediphenyl-4,4'-diisocyanate, tetramethyl-1,3-xylene diisocyanate, para-phenylene diisocyanate, 1,6-hexymethylene diisocyanate, 1,5-naphthalene diisocyanate, isoprone diisocyanate or cyclohexylmethane diisocyanate but are not limited thereto.
In addition, examples of diols are polyethylene glycol, propylene glycol, butylene glycol and isobutylene glycol.
Examples of unsaturated organic acids used for the reaction are monocarboxylic acids such as acrylic acid, methacrylic acid; and dicarboxylic acids such as maleic acid, itaconic acid, citraconic acid, fumaric acid, or mono-valent metal salt thereof, di-valent metal salt thereof, ammonium salts thereof, organic amine salts thereof or acid anhydride thereof. Examples of suitable unsaturated alcohols include vinyl alcohol, (meth)allyl alcohol, 3-buten-1-ol, isoprene alcohol, 3-methyl-2-buten-1-ol, 2-methyl-3-buten-1-ol, 2-methyl-3-buten-2-ol and 2-methyl-2-buten-1-ol.
The units derived from the unsaturated (meth)polyoxyalkylene urethane compound (c) in the polyurethane copolymer are present in an amount of 10 to 95% by weight based on the total weight of the obtained polyurethane copolymer. When the unit derived from the unsaturated (meth)polyoxyalkylene urethane compound (c) is less than 10 % by weight, the water reducing ability and viscosity cannot be sufficiently improved, and when the unit derived from the unsaturated (meth)polyoxyalkylene urethane compound (c) is more than 95 % by weight, the number of anionic absorbents capable of being absorbed to surfaces of cement particles decreases, and thus, dispersion ability of concrete composition is deteriorated. More preferably, the unit derived from the unsaturated (meth)polyoxyalkylene urethane compound (c) in the polyurethane copolymer obtained is 20 to 95 % by weight based on the total weight of the obtained polyurethane copolymer. Within this range, dispersion and slump retention ability with time of concrete composition is improved, as well as workability of concrete composition is also improved due to reduction of viscosity.
The unsaturated organic acid-polyoxyalkylene urethane adduct is a non-ionic and hydrophilic compound, containing a hard portion such as urethane derivative and a soft portion such as polyethylene glycol at the same time. The portions derived from the unsaturated organic acid-polyoxyalkylene urethane adduct are present as side chains in the copolymer for the concrete chemical admixture according to the present invention.
(2) Unsaturated anionic organic monomer (d)
Any monomer may be used as the unsaturated anionic organic monomer (d) so long as it has polymerizable unsaturated groups and anionic groups. For example, an unsaturated carboxylic acid monomer may be used.
The unsaturated carboxylic acid monomer or unsaturated nitrile monomer are preferred and represented by the Formula (III) below.
2
2
2
3
2
2
2
4
In the Formula (III), X, Y and Z are each independently identical or different and are selected from the group consisting of hydrogen (-H), a methyl group (-CH) and a carboxylic group (-COOH), provided that one of X, Y and Z is hydrogen; and R represents a carboxylic group (-COOH) or a nitrile group (-CN).
For example, the unsaturated anionic organic monomer is selected from the group consisting of unsaturated mono-carboxylic acid monomer, unsaturated dicarboxylic acid monomer and unsaturated nitrile monomer.
The unsaturated mono-carboxylic acid monomer can be selected from a monomer having one unsaturated group and a functional group capable of producing a carboxylic anion within the molecule. Examples of the unsaturated mono-carboxylic acid monomer include acrylic acid and methacrylic acid, but are not limited thereto.
The unsaturated dicarboxylic acid monomer can be selected from monomers, which have one unsaturated group and two functional groups capable of forming carboxylic anions within the molecule. Examples of the unsaturated dicarboxylic acid monomer are maleic acid, itaconic acid, citraconic acid, fumaric acid and so on; monovalent metal salts thereof, bivalent metal salts thereof, ammonium salts thereof organic amine salts thereof; and anhydrides thereof, but are not limited thereto.
The unsaturated nitrile monomer can be selected from monomers, which have one unsaturated group and a nitrile group. Examples of unsaturated nitrile monomers include acrylonitrile, but are not limited thereto.
The unsaturated anionic organic monomer (d) in the polyurethane copolymer according to the present invention is present in an amount of 5 to 50% by weight, preferably, 5 to 40% by weight, based on the total weight of the nano-hybrid concrete admixture of the present invention. When the unsaturated anionic organic monomer (d) is less than 5 % by weight, the copolymer cannot be sufficiently absorbed to cement particles. When the monomer (d) exceeds 50% by weight, the copolymer cannot exert slump retention with time.
The unit monomers constituting the polyurethane copolymer may further include a third monomer ingredient as well as the afore-mentioned compound (c) and monomer (d). The third ingredient may be present in an amount of 0 to 30% by weight.
(3) polymerization initiator (e) and other components (f)
The polyurethane copolymer of the polyurethane copolymer/layered double hydroxide concrete chemical admixture is prepared by polymerizing the afore-mentioned compound or monomer (c) and monomer (d) together with a polymerization initiator (e).
The polymerization initiator is preferably persulfate, hydrogen peroxide, benzoyl peroxide, an azo compound, diacyl peroxide, or alkyl hydroperoxide. The polymerization initiator may be used alone or in combination thereof.
In the preparation of the polymer, the amount of a polymerization initiator can be determined according to the method known in the art.
In addition, a reducing agent may be further used as an accelerator (f). As a reducing agent, sodium hydrogen sulfite, sodium sulfite, formaldehyde sodium sulfoxylate, potassium persulfate or ascorbic acid may be used in combination with amines such as ethylene diamine, sodium ethylene diamine tetra-acetate and glycine. The amount of the reducing agent may be suitably controlled according to a method known in the art.
If necessary, a chain transfer agent may be used alone or in combination thereof. The amount of the chain transfer agent may be suitably controlled by those skilled in the art.
In the layered double hydroxide and polyurethane copolymer for nano-hybrid chemical admixture, the polyurethane copolymer is preferably present in an amount of 50 to 95% by weight based on the total weight of the concrete admixture. Within the above range, an anionic absorbent, which exists in the polyurethane polymer, is readily absorbed to surfaces of cement particles and imparts steric hinderance effect to urethane derivatives. This enhances slump retention with time, causes decrease in viscosity and ensures durability of concrete composition.
Hereinafter, a method for preparing the polyurethane copolymer for concrete chemical admixture by copolymerizing the compound or monomer (c) and monomer (d) with the polymerization initiator (e) will be described in detail.
Method for preparing the polyurethane copolymer for concrete chemical admixture
The present invention provides a method for preparing polyurethane copolymer by copolymerizing the compound or monomer (c) and monomer (d) together with the polymerization initiator (e) .
The preparation method of the polymer can be solution or bulk polymerization. The polymerization can be carried out in a batch, continuous or semi-continuous manner.
Examples of the solvent used for polymerization include water, alcohols, aromatic organic compounds, esters, ketones and so on. Specific examples include methyl alcohol, ethyl alcohol, isopropyl alcohol, benzene, toluene, cyclohexane, xylene, n-heptane, ethyl acetate, acetone and methyl ethyl ketone. The solvent can be used alone or in combination thereof.
In the process of the afore-mentioned polymerization, as to charging method of monomers and an initiator into a reactor can be selected from: a process which charges the monomers into the reactor and adds the initiator dropwise; a process charging a portion of monomers into the reactor and adding the initiator and the remaining monomers; and a process charging a solvent into the reactor and adding all of the monomers and the initiator dropwise.
Preferably, the polymerization can be carried out by: continuously dropwise adding the initiator and the monomers to a reactor; continuous polymerization, followed by secondary batch-type polymerization; or batch-type polymerization, followed by secondary continuous polymerization. The reason for using the methods above is that the molecular weight of the final polymer may be uniformalized. Therefore, it improves water-reducing ability and fluidity of cement or concrete composition, and thus, enhances slump retention capability.
Specifically, the method for preparing the polyurethane copolymer according to the present invention comprises:
i) charging a solvent into a reactor;
ii) adding at least one unsaturated (meth)polyoxyalkylene urethane compound (c) represented by the Formula (II), at least one unsaturated anionic organic monomer (d) represented by the Formula (III), and a polymerization initiator (e) dropwisely to the reactor during the predetermined time; and
iii) polymerizing the mixtures.
The alternative method comprises:
i) charging at least one compound or monomer of at least one unsaturated (meth)polyoxyalkylene urethane compound (c) represented by the Formula (II), and at least one unsaturated anionic organic monomer (d) represented by the Formula (III) together with a solvent into a reactor;
ii) adding the remaining compound or monomer and a polymerization initiator (e) dropwisely during the predetermined time; and
iii) polymerizing the mixtures.
The method for preparing the polyurethane copolymer may further comprise the step of neutralizing the resulting polymer with an alkali. The alkali can be selected from mono-and di-valent metal hydroxides, chlorides, ammonia and organic amines.
The polymerization can be carried out using, in addition to the polymerization initiator (e), at least one accelerator (f). The accelerator (f) may be a reducing agent such as sodium hydrogen sulfite, sodium sulfite, formaldehyde sodium sulfoxylate, potassium persulfate or ascorbic acid, in combination with amines such as ethylene diamine, sodium ethylene diamine tetra-acetate and glycine. If necessary, a chain transfer agent may be used alone or in combination thereof.
The polymerization conditions, such as polymerization temperature or time, and other conditions may be suitably determined depending on polymerization methods, solvents, initiators and chain transfer agents. Generally, the polymerization temperature is in the range of 40°C to 180°C. Specifically, the polymerization temperature is in the range of 60°C to 100°C. The polymerization time is in the range of about one hour to about 24 hours. Specifically, the polymerization time is in the range of 2 to 12 hours.
The nano-hybrid chemical admixture by layered double hydroxide and polyurethane copolymer for chloride resistant concrete according to the present invention can be used in combination with at least one of concrete chemical admixture to a concrete composition. Preferably, the admixture according to the present invention can be used in combination with another admixture with high water-reducing ability and resistance to chloride penetration.
For example, the admixture with high water-reducing ability inherently contains a chloride penetration resistant layered double hydroxide and polyurethane copolymer with long urethane derivative-polyethylene glycol chains (three or more moles). The monomer to form layered double hydroxide and polyurethane copolymer nano-hybrid concrete chemical admixture comprises, as essential ingredients, an unsaturated (methoxy)polyoxyalkylene urethane compound and an organic acid monomer with unsaturated anionic absorbent. Preferably, layered double hydroxide is present in an amount of 5 to 50 % based on the total weight of the concrete chemical admixture for effective chloride resistance function. Polyurethane copolymer is present in an amount of 50 to 95% based on the total weight of the concrete chemical admixture in order to secure water reducing ability, slump retention function, durability and fall in viscosity.
The urethane derivative-polyethylene glycol chains have a length of 3 or more moles, more preferably, 6 to 150 moles, still more preferably, 10 to 100 moles.
By adding at least one of additional concrete admixture to the nano-hybrid concrete admixture according to the present invention as explained above, the obtained concrete admixture has various properties of the nano-hybrid concrete admixture. Thus, the obtained concrete admixture can improve water tightness and durability in the concrete structures based on water reducing ability, and it causes the improvement of the workability due to the reduction of viscosity of the concrete composition. In addition, since the layered double hydroxides described herein improve resistance to chloride penetration, the concrete admixture according to the present invention can be used for marine concretes.
Method for preparing layered double hydroxide and polyurethane polymer for nano-hybrid concrete chemical admixture.
preparing of layered double hydroxide (a) by co-precipitation;
preparing of polyurethane copolymer by polymerizing two or more compounds or monomers, in other words, at least one unsaturated (meth)polyoxyalkylene urethane compound (c) and a compound or a monomer ingredient containing at least one unsaturated organic monomer (d) with a polymerization initiator to obtain the polyurethane polymer (b); and
hybriding the obtained layered double hydroxide (a) and the obtained polyurethane polymer (b) described above by nano-hybrid technology.
The present invention provides a method for preparing layered double hydroxide and polyurethane polymer for nano-hybrid concrete chemical admixture, as described below, comprising of the steps:
A method for preparing nano-hybrid chemical admixture by layered double hydroxide and polyurethane copolymer for chloride resistant concrete according to the present invention can be selected from either hydrothermal method or reaction at high temperatures and high pressures. Preferred is the hydrothermal method.
Specifically, when layered double hydroxide and polyurethane polymer are combined using the hydrothermal method, the pH should be in the range of pH 4 to pH 7, preferably in the range of pH 5 to pH 7. Thus the anionic absorbent in the polyurethane copolymer becomes activated maximizing ionic interaction with layered double hydroxide and ensures the stability of the nano-hybrid concrete chemical admixture. The reaction temperature is in the range of 50°C to 150°C, and preferably in the range of 80°C to 100 °C. Within the range, dispersing ability and stability of layered double hydroxide are improved. The reaction time is in the range of 1 to 48 hours, preferably in the range of 6 to 24 hours. Within the range, dispersing ability and stability of the layered double hydroxide are also enhanced.
Now, the present invention will be described in more detail with reference to the following examples. These examples are provided only for illustrating the present invention and should not be construed as limiting the scope of the present invention.
Example 1
1. Preparation of the layered double hydroxide
3
2
2
3
3
2
2
Mg(NO).6HO(102 parts) and Al(NO).9HO(75 parts) are dissolved in standard water and the resulting solution is titrated to the pH value of 9 to 10 using an aqueous NaOH solution of NaNO (14 parts). The resulting suspension is stirred at 100°C for 12 hours and unreacted salts are eliminated through cleansing. The suspension is finally freezed and dried to obtain the layered double hydroxide.
2. Preparation of the polyurethane copolymer
The method charges 285 parts of distilled water into 1L glass reactor equiped with thermometer, a stirrer, a dropping funnel, a nitrogen induction pipe and a reflux condenser. The reactor is purged with nitrogen while stirring and is heated to 80°C under nitrogen atmosphere. After stirring, a solution consisting of 270 parts of unsaturated poly(meta)oxyethylene urethane compound (6 moles of urethane derivative-oxyethyene added), 55 parts of methacrylic acid and 50 parts of distilled water is added dropwise to the reactor over 5 hours. At the same time, an aqueous solution of 0.85 parts of ammonium persulfate in 50 parts of water is added to the reactor dropwise over 6 hours. After dropwise addition, the reaction mixture is allowed to stand at 80°C for one hour.
In addition, the reaction mixture is adjusted to pH 6 using sodium hydroxide to obtain a 50% solution of polyurethane copolymer with a weight average molecular weight of 31,000, based on polyethylene glycol equivalents (measured by gel permeation chromatography).
3. Preparation of layered double hydroxide and polyurethane polymer for nano-hybrid concrete chemical admixture
75% of the polyurethane copolymer and 25% of the layered double hydroxide are mixed and the resulting mixture is adjusted to the range of pH 6 to 7. In addition, the reaction mixture is charged into a hydrothermal reactor and goes through hydrothermal reaction at 80°C over 24 hours to obtain a chloride resistant nano-hybrid concrete chemical admixture (S-1) comprising polyurethane polymer and layered double hydroxide.
Example 2 to Example 5
Polyurethane copolymer is prepared in the same manner as Example 1 except for the fact that monomer composition shown in Table 1 below is used instead of monomer composition shown in Example 1. It is also combined with layered double hydroxide in the same manner as Example 1 to obtain concrete chemical admixture S-2 and S-5, respectively.
Comparative Example 1
285 parts of distilled water is charged into a 1L glass reactor equiped with a thermometer, a stirrer, a dropping funnel, a nitrogen induction pipe and a reflux condenser. The reactor is purged with nitrogen, while stirring, and was heated to 80°C under nitrogen atmosphere. Then, a solution consisting of 270 parts of unsaturated poly(methoxy) polyethyleneglycol monomethacrylate (6 moles of oxyethylene added), 55 parts of acrylic acid and 50 parts of distilled water are added to the reactor dropwise for 5 hours. At the same time, an aqueous solution of 0.85 parts of ammonium persulfate in 50 parts of water was added to the reactor dropwise for 6 hours.
After dropwise addition, the reaction mixture is kept at 80°C for one hour. In addition, the reaction mixture is adjusted to pH 6 using sodium hydroxide to obtain a 50% solution of polyurethane copolymer (C-1) with a weight average molecular weight of 27,000, based on polyethylene glycol equivalents (measured by gel permeation chromatography)
Comparative Examples 2 to 5
Polycarboxylic acid copolymers for concrete chemical admixture (C-2) to (C-5) were prepared in the same manner as Example 1 using monomer composition shown in Table 1 below.
Comparative Example 6
Chloride penetration resistant nano-hybrid concrete chemical admixture was prepared in the same manner as Example 1 except for the fact that it consisted 3% of layered double hydroxide and the remaining of polyurethane copolymer by weight.
Comparative Example 7
Chloride penetration resistant nano-hybrid concrete chemical admixture was prepared in the same manner as Example 1 except for the fact that 55% by weight of layered double hydroxide a) was contained and polyurethane copolymer constituted the remaining admixture.
<b>Table 1</b>
<b>Copolymer No.</b>
<b>Composition ratio of copolymer (% by weight)</b>
<b>(a) : (b)</b>
<b>Solvent</b>
<b>Weight average molecular weight</b>
Example 1
S-1
POEU-6/ MAA = 83/17
75 : 25
Water
31,000
Example 2
S-2
POEU-10/ MAA = 77/23
75 : 25
Water
36,600
Example 3
S-3
POEU-18/ MAA = 75/25
75 : 25
Water
37,500
Example 4
S-4
POEU-25/ MAA = 70/30
75 : 25
Water
38,000
Example 5
S-5
POEU-45/ MAA = 68/32
75 : 25
Water
41,000
Comparative Example 1
C-1
MPEG-6/ MAA = 83/17
100 : 0
Water
27,000
Comparative Example 2
C-2
MPEG-10/ MAA = 77/23
100 : 0
Water
29,000
Comparative Example 3
C-3
MPEG-18/ MAA = 75/25
100 : 0
Water
30,600
Comparative Example 4
C-4
MPEG-25/ MAA = 70/30
100 : 0
Water
36,500
Comparative Example 5
C-5
MPEG-45/ MAA = 68/32
100 : 0
Water
41,300
POEU-6, POEU-10, POEU-18, POEU-25, POEU-45:
unsaturated (meth)poly oxyethylene urethane compound (a) (The mean addition numbers of moles of urethane derivative-oxyethylene are 6, 10, 18, 25 and 45, respectively.)
MPEG-6, MPEG-10, MPEG-18, MPEG-25, MPEG-45:
unsaturated poly methoxypolyethyleneglycol mono methacrylate (b) (The mean addition number of moles of ethylene oxide are 6, 10, 18, 25 and 45, respectively.)
MAA:
methacrylic acid
AN: acrylonitirile
APS: ammonium persulfate
(a) Polyurethane copolymer and polycarboxylic copolymer
(b) Layered double hydroxide
Experimental example 1: Analysis of X-ray diffraction of layered double hydroxide
To evaluate crystal structure of the layered double hydroxide prepared above, x-ray diffraction (Rigaku, D/max 2200) was performed.
FIG. 3
Naturally existing layered double hydroxide was used as a comparative reference for an accurate analysis of the structure. As can be seen from , the naturally existing layered double hydroxide, a typical layered structure with carbonate ions incorporated, showed approximately 0.76 nm of the distance between the layers.
The layered double hydroxide prepared according to the present invention had the equivalent structure as that of naturally existing layered double hydroxide, with nitrite ions incorporated, with the distance between the layers being approximately 0.80 nm.
Experimental example 2: Transmission electron microscopy analysis of layered double hydroxide
For detailed characterization of the crystal structure of the layered double hydroxide prepared in Example 1 above, high resolution transmission scanning microscopy (JEOL JEM-2100F) was operated.
Naturally existing layered double hydroxide was used as a comparative reference for an accurate analysis of the structure of the synthesized layered double hydroxide. For specimen measurement, each compound was fixed on epoxy resin, and a thin film with a thickness of 50 nm taken using Ultramacrotome, RMC, Power Tome PC, was placed on a 400 mesh Cu grid. The structure was then measured by low-temperature transmission electron microscopy (Cryo-TEM method) using carbon coating for static elimination.
FIG. 4
FIG. 4A
FIG. 4B
FIG. 4C
Fig. 4D
As can be seen from , the naturally existing layered double hydroxide is a hexagonal crystal particle with a size of about 200 nm to 300 nm (), comprising the layered structure with carbonate ions incorporated and the distance between the layers being about 0.76 nm (). In contrast, the layered double hydroxide prepared according to the present invention is a hexagonal crystal particle with a size of about 50 nm to 100 nm (), comprising the layered structure with nitrite ions incorporated and the distance between the layers being about 0.80 nm ().
The layered double hydroxide prepared according to the present invention thus has a smaller particle size and a larger specific surface area and consequently exhibits enhanced dispersibility, and greater capability in scavenging chloride ions than the naturally existing layered double hydroxide.
Experimental example 3: Analysis of the layered double hydroxide using infra-red spectroscopy
FIG. 5
In order to characterize chemical structure of the layered double hydroxide, analysis using infra-red spectroscopy (JASCO FT/IR-6100) was carried out. The results obtained are shown in , and chemical bonds according to the peaks are illustrated in Table 2.
<b>Table 2</b>
Wavenumber (cm<sup>-1</sup>)
Assignment
Layered double hydroxide naturally existing
Layered double hydroxide according to the present invention (HT-NO<sub>2</sub>)
3450
3450
-OH stretch-vibration
3050
-
Interaction H<sub>2</sub>O-CO<sub>3</sub><sup>2-</sup> interlayer
1620
1635
H<sub>2</sub>O bending-vibration interlayer
1380
U<sub>3</sub> NO<sub>2</sub><sup>-</sup>
1350
-
U<sub>3</sub> CO<sub>3</sub><sup>2-</sup>
950
-
Al-OH deformation
770
770
Al-OH translation
678
-
U<sub>4</sub> CO<sub>3</sub><sup>2-</sup>
555
555
Al-OH translation
455
455
Metal-OH translation
As can be seen from the table 2, the naturally existing layered double hydroxide comprises the magnesium-aluminium hydroxide layer with carbonate ions existing between the layers. The layered double hydroxide prepared according to the present invention comprises magnesium-aluminium hydroxide layer with nitrite ions existing between the layers. They are thus the equivalent chemical compounds except for the types of anions existing between the layers.
Experimental example 4: Corrosion test of reinforcing steel
2
2
2
2
FIG. 6
Corrosion test of reinforcing steel was performed in order to evaluate the chloride resistance function of the layered double hydroxide prepared according to the present invention. A standard saline solution of 3.5% chloride was prepared, and then the sample was charged into the solution and mixed. Steel was immersed into the resulting solution and was observed for three days. A comparative experiment was carried out with Ca(NO) currently used as a corrosion inhibitor for concretes. The results, as illustrated in , show that corrosion took place to a great extent on the steel where no corrosion inhibitor was added, while no corrosion occurred on the steel where the corrosion inhibitor was added. In addition, the corrosion effects of Ca(NO) and the layered double hydroxide on both steels, respectively, had no difference.
As a result, it is confirmed that the layered double hydroxide prevents corrosion of reinforcing steel by scavenging chloride ions from the chloride solution.
Experimental example 5: Concrete test
Nano-hybrid chemical admixture by layered double hydroxide and polyurethane copolymer for chloride resistant concrete obtained in Examples 1 to 5, Chemical admixture by polycarboxylic acid polymers obtained in Comparative Examples 1 to 5 and chloride penetration resistant nano-hybrid chemical admixture obtained in Comparative Examples 6 to 7 were applied to concretes. The resulting physical and chemical properties were evaluated.
The test results showing slump flows and compressive strengths are shown in Table 3 and Table 4, respectively. In addition, the concrete chemical admixture used herein is composed of a polycarboxylic acid concrete chemical admixture prepared by Silkroad C&T Co. Ltd. based in Seoul, South Korea, and the concrete chemical admixture prepared in Examples 1 to 5 and Comparative examples 1 to 5 in a predetermined ratio of 7:3. The concrete tests were carried out under the following conditions.
Concrete test conditions
3
m
Tapping water: 130 kg/
3
m
Cement (Hanil(KOREA), OPC): 448 kg/
Water/cement: 22%
3
m,
3
m
Fine powder: Fly ash 89 kg/ Silica fume 53 kg/
3
m,
3
m
Fine aggregate: washed sea sand of 277 kg/ river sand of 508 kg/
3
m
Coarse aggregate: 25mm gravel 974 kg/
Admixture content: 1.0% of cement weight (admixture content is increased to 1.2% in order to set the same uniform initial dispersion in Comparative Examples 1 to 5. A defoaming agent is added in an amount of 0.12% of the admixture content)
Air entraining admixture content : 0.1% of the admixture content
The ingredients were mixed in a forced pan mixer for 120 sec.
Initial slump flow (50±5cm) was measured immediately after mixing.
<b>Table 3</b>
Copolymer No.
Conditions of concrete (cm)
Immediately
30 min
60 min
90 min
S-1
57
54
52
50
S-2
55
57
56
55
S-3
56
55
54
54
S-4
54
56
56
55
S-5
54
58
55
54
C-1
54
48
40
-
C-2
57
50
42
-
C-3
56
46
39
-
C-4
54
44
39
-
C-5
55
45
40
-
As can be seen from Table 3, concrete chemical admixture using the polymers (S-1 to S-5) prepared in Examples 1 to 5 are compared with concrete chemical admixture using polymers (C-1 to C-5) prepared in Comparative Examples 1 to 5. The polymer admixture prepared according to the present invention exhibited better water-reducing and improved slump retention ability. This is the reason that urethane derivative-polyethylene glycol chains acting as side chains in the polymer prepared according to the present invention, exhibit better steric hindrance in a strong alkaline slurry state than methoxy polyethyleneglycol chains in conventional concrete chemical admixture. However, concrete chemical admixture containing more than 50% by weight of the layered double hydroxide cannot exhibit sufficient dispersibility.
<b>Table 4</b>
Copolymer no.
Compressive strength (MPa)
3 days
7 days
28 days
S-1
61.2
73.3
94.1
S-2
60.8
73.3
95.2
S-3
61.5
74.2
95.8
S-4
62.3
74.8
97.2
S-5
63.4
77.2
98.7
C-1
55.3
70.6
83.1
C-2
56.7
68.9
86.4
C-3
57.3
69.0
88.5
C-4
56.4
69.8
89.4
C-5
56.2
70.2
90.1
As can be seen from Table 4, at the same water/cement ratio and aggregate conditions, the concrete chemical admixture S-1 to S-5 prepared in Examples 1 to 5 provides better compressive strengths than concrete chemical admixture C-1 to C-5 prepared in comparative examples 1 to 5. This means that the layered double hydroxide in the chloride penetration resistant nano-hybrid concrete chemical admixture prepared in Examples 1 to 5 imparts considerably high strengths to concretes by improving watertightness and durability.
Experimental example 6: Accelerated corrosion test of reinforcing steel in concretes
Accelerated corrosion tests of reinforcing steel in concretes (KS F 2561) were carried out in order to evaluate the function of chloride resistant nano-hybrid concrete chemical admixture by comparing the polyurethane copolymer and the layered double hydroxide prepared in Example 3 with polycarboxylic acid copolymer admixture prepared in Comparative Example 3.
The test was carried out under the following conditions.
Concrete test conditions (KS F 2561)
3
Tapping water: 131.5 kg/m
3
3.5% salt solution: 48.5 kg/m
3
Cement (Hanil(KOREA), OPC): 300 kg/m
Water/cement: 60%
3
Fine aggregate: washed sea sand of 800 kg/m
3
Coarse aggregate: 13mm gravel 1021 kg/m
Admixture content: 1.2% of cement weight
Materials above were mixed using a pan mixer for 120 seconds and specimens were prepared from the resulting concrete using the standard KS F 2561. The specimens prepared were cured for 5 hours at 180°C and at 1.0 MPa for two times in order to accelerate corrosion of reinforcing steel. The states of corrosion were charted using Mathematical Formula 1 presented in KS F 2561.
I
=
×
Σ
Σ
-
P
02
I
02
Σ
P
02
100
0.2
0.2
0.2
0.2
2
In the Formula 1 above, I represents the anti-corrosion (%), P represents the state of corrosion in concretes without a corrosion inhibitor, ΣP represents the total sum of corrosion areas (mm) on six reinforcing steels in concretes where S-3 was used as a concrete chemical admixture, I represents the state of corrosion in concretes where corrosion inhibitors were added, ΣI represents the total sum of corrosion areas of six steels from the concretes where C-3 was used as a concrete chemical admixture.
FIG. 7(A) to 7(F)
FIGs. 7(A), 7(B)
7 (E)
7(F)
FIGs. 7(C) and 7(D)
show results from the accelerated corrosion tests of reinforcing steel in concretes. The results illustrate that the state of corrosion where C-3 was used as a concrete chemical admixture was significantly worse than that where S-3 was used as a concrete chemical admixture. The left reinforcing steels of , and , and the lower reinforcing steels of are the reinforcing steels according to the present invention.
The results from the anti-corrosion rate charted using Formula 1 above are summarized in Table 5 below.
<b>Table 5</b>
Copolymer no.
Anti-corrosion rate (%)
S-1
94.7
S-2
95.6
S-3
95.4
S-4
95.0
S-5
96.2
C-1
55.3
C-2
54.7
C-3
57.9
C-4
56.1
C-5
49.3
The results show that the anti-corrosion rate is about 95% or greater if the concrete chemical admixture prepared according to the present invention is used. As a result, chloride penetration resistant nano-hybrid concrete chemical admixture comprising polyurethane copolymer and the layered double hydroxide prevent corrosion of reinforcing steel in concretes.
When the admixture S-1 to S-5 and C-1 to C-5 are used, chloride resistant nano-hybrid concrete chemical admixture comprising polyurethane copolymer and the layered double hydroxide exhibits higher initial dispersion and slump retention with time than those of polycarboxylic acid copolymer. It also improves workability of concrete composition, and enhances resistance to chloride ions by preventing corrosion of reinforcing steel in concretes and improves water tightness as well as durability of concretes, ultimately enhancing the strength of the concrete structure. As a result, provided is an organic/inorganic nano-hybrid concrete chemical admixture, which may be used as a marine concrete chemical admixture with enhanced chloride resistance, which enables enhanced durability of concrete structures.
BACKGROUND OF THE INVENTION
Field of the Invention
Description of the Related Art
SUMMARY OF THE INVENTION
Brief description of drawings
Detailed description of the present invention | |
Christopher Columbus strived to live under religious motivations and convictions which are hated by modern day educators and writers, thus many have tried to label him as a villain. (Just take a look on YouTube, there is plenty) There are those who have adopted the modern educational practice of deconstructionism – the attacking of traditional Western heroes, values and institutions. For an accurate portrayal of Columbus and other early explores, you can read Dr. John Eidsmoe’s book, Columbus & Cortez, Conquerors for Christ. It is our hope at CrossRoads Messages that you will take time to enjoy Columbus Day by gaining understanding of the spiritual heart of Christopher Columbus.
Traditionally, Columbus Day is observed on the second Monday in October, commemorating the landing of Columbus in the “New World” (on a small island off Florida) on October 12, 1492. (Wall-builders.com/celebrate-Columbus-day; Wikipedia) Clearly, the Vikings had traveled to the North America continent, (Present-day Canada, possibly Baffin Island). Columbus is widely publicized as being the one to have discovered its’ (America’s) existence to the Europeans.
The true way for us to observe Columbus Day, is to see it as a celebration of character, the life of Christopher Columbus. Therefore, seek out ways to take the Gospel out into the world, to those who do not know Christ. | http://standatthecrossroads.com/category/columbus-day/ |
a distillation b crystallisation c distillation under reduced pressure d steam distillationSol d Essential oils are insoluble in water soluble in steam and have high vapour pressureTherefore they can be separated by steam distillation.
A lot of chemical processes are involved in purification and identification of organic liquids so distillation plays an important role in chemical industryThis process separates mixture into two or more products that consist of different boiling points through the vaporization of a liquid mixture components and the recycling of counter.
A promising new process for the regeneration of solvents with ionic liquid by molecular distillation has been proposedThe main advantage of this process compared with the classic stripping of acids with alkali solution is that the volatile organic acid is recovered with a yield of about 88 in the form of free acid not as its salt.
An Introduction to Organic Chemistry 85 How is this done First some definitions One mole of a substance is 602 x 1023 particles of that substanceThis huge value is termed Avogadro’s numberOne mole of any substance has a mass equal to the relative molecular mass RMM of that substance in grams.
Apr 07 2022 Steam distillation is analogous to simple distillation the main difference being that steam or water is used in the distilling flask along with the material to be distilled.
Apr 12 2021 Compounds having the same molecular formula but different physical and chemical properties are called isomersIs shaken with a dilute solution of NaHCO 3 and extracted withether or chloroform when nitrobenzene goes into the organic layer Distillation of this will yield nitrobenzeneThe aqueous layer is acidified with dil.
Apr 20 2019 Fractional distillation It is employed for separating two or more volatile liquids having boiling points close to each other egAcetone bpt 60C and methanol bpt 65CThe vapours of the liquids pass through the fractionating column which provides greater space for their coolingThe vapours of high boiling fractions condense and fall back into distillation flask.
Compounds contain carbon most of them contain hydrogen may contain oxygen nitrogen sulphur halogen etcOrganic Chemistry – HydrocarbonsDefine ‘Organic Chemistry’It is the chemistry of organic compounds which are derived from natural sources like plants animals coal petroleum.
CHEMISTRY 125 LABORATORY Name Balagao Sherey Mae UDate Performed June 25 2014 Lab Schedule 100400 MW Date Submitted July 2 2014 Group No2 VOLATILITY DISTILLATION AND DETERMINATION OF BOILING POINT ITo observe the volatility of some organic compounds 2.
Distillation is the process of purification of compounds based on their volatilityThe different types of distillation include simple fractional steam vacuum and short path distillationIn short a highly volatile compound is separated from a lessvolatile or nonvolatile compound by using distillationSubsequently question is what is.
Distillation Organic Chemistry labTerms in this set 17 Advantage of fractional distillation Better separation of the liquids Readily purify complex mixtures Separate complex liquid solution with small differences in boiling point.
Distillation was probably first used by ancient Arab chemists to isolate perfumesVessels with a trough on the rim to collect distillate called diqarus date back to 3500 BCIn the modern organic chemistry laboratory distillation is a powerful tool both for the identification and the purification of organic compounds.
Starkeys Organic Chemistry Lab CPPDec 16 2021 The key difference between molecular distillation and short path distillation is that molecular distillation uses extremely low vacuum pressure and it is a type of short path distillation technique whereas short path distillation is an analytical technique and a type of distillation.
31 Votes Distillation is used to purify a compound by separating it from a nonvolatile or lessvolatile materialBecause different compounds often have different boiling points the components often separate from a mixture when the mixture is distilledAlso question is what is the importance of.
Feb 22 2020 Molecular Distillation Fractional Distillation Azeotropic Distillation Destructive Distillation Application It is helpful in separating volatile oils such as clove distillationOrganic solvents can be purified based upon this distillation process example is absolute alcoholTo make official preparations like the spirit of ammonia ether.
2A Uses of Simple DistillationDistillation is the method used to concentrate fermented solutions and produce hard liquorsDistillation is also an excellent purification tool for many liquids and can be used to purify products from a chemical reactionDistillation of mixtures may or may not produce relatively.
Mar 16 2021 This is what fractional distillation doesIt depends on the boiling point of a substanceNote There are actually 3 stages of refining crude oil 1Reforming but this is about the first stageThe steps of fractional distillation.
Metalorganic frameworks MOF are becoming a more and more important class of functional materialsYet very often the synthesis of MOFs is not easy to control and requires a profound knowledge and experience in solid state chemistry.
Molecular distillation or wiped film distillation is a type of shortpath vacuum distillation characterized by extremely low vacuum 001 torr or less which is performed with a molecular stillIt is a process of separation purification and concentration of natural products complex and thermally sensitive molecules.
Molecular structure for eugenolDistillation performed on mixtures in which the two compounds are not miscibleWhat is steam distillation When one of the compounds being distilled is waterWhat does steam distillation avoidOrganic Chemistry Lab Exam I 36 TermsOrgo lab midterm answers 69 Terms.
Nov 10 2020 Foundations of Organic ChemistryOrganic chemistryone of sciences most complex fieldsis finally made clear with this richly illustrated introductory course taught by an awardwinning professorRead reviews for average rating value is 4Read 105 Reviews Same page link.
Oct 08 2019 Molecular distillation uses a very high vacuum system which effectively reduces the pressure in the system to zero and allows compounds to essentially vaporize instantaneously1 The distillate proceeds in a continuousfeed fashion and the rate of distillation depends on flow velocity and surface area of the heating and cooling blocks.
Oct 16 2019 Here are examples of organic chemistry at work Polymers consist of long chains and branches of moleculesCommon polymers you encounter every day are organic moleculesExamples include nylon acrylic PVC polycarbonate cellulose and polyethylenePetrochemicals are chemicals derived from crude oil or petroleum.
Organic chemistry entered a new phase in the mid20th centuryMany areas of organic chemistry developed so intensively that they formed large specialized divisions such as stereochemistry polymer chemistry and the chemistry of natural substances antibiotics vitamins hormones organometallic compounds organofluoric compounds and dyes.
Organic Chemistry I CHE 223 Title Disti llationObjective The objective of this lab is to study distillation and examine the re lationship betweenVolume and temperature during a simple distillation procedureIntrod uction Distillation is a common method for purifying liquids and can be used toDetermine their boiling points.
Organic Chemistry I Laboratory Simple Distillation Gas Chromatography NMR InfraRed Spectroscopy Experiment 4 Preparation of Synthetic Banana Oil1 Week 4 Background Reading Zubrick JThe Organic Chem Lab Survival Manual 4th edition Wiley Sons IncDrying agents Pg 9396 Boiling stones Pg.
ORGANIC LABORATORY TECHNIQUES 10 101 DISTILLATION NEVER distill the distillation flask to dryness as there is a risk of explosion and fireThe most common methods of distillation are simple distillation and fractional distillationSimple distillation can be used when the liquids to be separated have boiling points that are quite different.
Sep 28 2021 All living things are made of organic compoundsThis means every object derived from a plant or an animal is comprised of organic moleculesAll our food apart from salt and water is made from complex mixtures of organic compounds as are the objects in our homes that are derived from natural materials such as wood paper leather wool and cotton.
The basic theory of distillation is the same regardless of whether the technique is termed simple or fractionalTerms in this set 13 Identify the apparatus used in a micro distillation by dragging and dropping the labels into the appropriate boxes.
The two statements are about the fractional distillation of crude oilThe statements may or may not be correctStatement 1 Fractional distillation is used to separate crude oil into useful fractionsStatement 2 The fractions with lower boiling points are found at the top of the fractionating column.
Understanding the code that is used to name simple organic compoundsWhy you might have more than one compound with the same molecular formulaAn introduction to the oil industry fractional distillationFractional distillation to produce useful organic compounds such as petrol and fuel oil.
What is the simple distillation La simple distillation or distillation simple is a separation technique used in chemistry laboratories to purify liquids through the removal of impurities nonvolatileIt is also used for the separation of mixtures of liquids miscible that differ in pIn at least 25 C and it also must present pThe process is governed by the law of Raoult.
Our customer service team is here to help you 24/7. We can ship you parts, send field service technicians to your site and answer any questions you have. Whatever you need, we are here for you. | https://www.claudias-haehnchengrill.de/which-molecular-distillation-in-organic-chemistry.html |
Sept. 28, 2011, 2:30 p.m.
Google, Facebook, and Twitter are great. But they’re not everything.
By David Skok @dskok Sept. 28, 2011, 2:30 p.m.
Edward R. Murrow was a pioneer in television who has shaped the way we tell stories in that medium for over 60 years. He has been immortalized in film and even has a J-school named in his honor. But Murrow’s career began not in TV, where he is most celebrated, but in radio, where he cut his teeth as a war correspondent, broadcasting live from the rooftops as the Blitz rained down on London. Throughout his years in television, Murrow applied the journalistic principles he’d honed through experience to the new medium of sound, pictures, and, eventually, color. You’ll see his legacy in any HD television newscast today.
Murrow found himself at a precipice, and chose to look back to find his way forward.
We are now at another precipice in journalism: The decisions we make about news’ direction in the digital world have the potential to shape how stories will be told for decades to come. So who will be our Murrow?
The problem is that the answer may be more about “what” rather than “who.” In the digital world, the tools we use to tell the world’s stories — Twitter, Google, Facebook — control us as much as we control them. I am a digital journalist, and I’m enthusiastic about what our new platforms can provide us in terms of telling stories. But I also wonder whether we’re letting our tools define, rather than serve, the stories we tell. I wonder whether digital journalism’s Murrow won’t be a journalist, but rather a tool that journalists use.
In this age of crowdsourcing and participatory journalism — this age in which, to some degree, everyone can be a journalist — some would argue that those concerns are moot points: that we don’t need a Murrow anymore. They might say that “transparency is the new objectivity” and that it’s perfectly justifiable for the editor of a technology news site to also run a venture fund. But principles are principles only if they can withstand the changing of circumstances. And dismissing the links to our storytelling past can set digital journalism on a dangerous path.
Mark Coatney, the Tumblr evangelist who left his job at Newsweek to help bridge the gap between journalists and his new parent company, pointed out during the Online News Association conference last week that 105,000 jobs were lost in newspapers between 2001 and 2008. One upshot of that grim stat, as Coatney put it in the talk: “We’re all our own best agents” now.
That may be true for Coatney and for the handful of other journalists who’ve found ways to make names for themselves in this new age, but here’s the unfortunate reality: When those 105,000 reporters, producers, editors, and managers left the profession, they took with them 105,000 versions of professional experience: the experience that comes from covering news events in environments ranging from small towns to war zones. Those 105,000 reporters, producers, editors, and managers, in another time, could have acted as mentors for the new generation of reporters — the young people still predominantly employed by traditional media outlets — that will likely mature in the industry without obvious role models.
Given the changing state of our craft, though, those trends aren’t irreversible. Here are some ideas to get us back on a course that would make Murrow proud.
Twitter, Google, and Facebook – to take the most prominent examples – are wonderful tools that open up a whole new universe of communication, interaction, and reporting. But that’s all that they are: tools. And they are tools, of course, that are provided by profit-driven companies whose interest lies as much in their own benefit as our own. Google News got applause at ONA this weekend when it announced Standout, the new tag that will allow publishers the chance to get a better ranking in their news search results. The line between “journalism organization” and “technology company” has never been thinner. And that may be because we aren’t asking the right questions.
War correspondents are experts in covering war. Health correspondents are experts in covering health. It seems fitting, then, that digital journalists should be experts in covering digital technology news. So the next time you’re at the “launch” of a new product, even one that could be beneficial to the news industry, don’t be afraid to ask questions not just about the product itself, but also about the company’s overall take on privacy, competition, and security. Or about the implications all these tools are having on journalism and on the First Amendment.
If digital journalists – who understand the technology better than most reporters — won’t ask these questions, who will?
By now we’ve all heard that social media and the Internet in general are magnets for hoaxes, fake photos, and errant reports. It’s not that these things didn’t exist before the digital age, but that now, with social media, these reports can be spread rapidly and then be immediately amplified. It’s unrealistic to suggest that inaccuracies can be fully debunked during the initial germination phase, so the responsibility lies with social media editors and producers to fact-check and verify information before amplifying false reports.
For their ONA panel, “B.S. Detection for Digital Journalists,” Craig Silverman and Mandy Jenkins created a terrific slideshow with some tips on how you can detect incorrect information before reposting it online. And of course, the inimitable Andy Carvin is leading the verification charge via his consistent — and very public — attempts to fact-check the information he curates on Twitter.
Those are good starts, but they’re also efforts that need more systematic adoption. As Murrow knew: No matter what the medium, nothing kills credibility faster than reporting false information.
Traditional journalists often trot over to their (often newly-hired) social media editors and digital aggregators and ask those journalists for practical advice: how to use Twitter, how to navigate Facebook, how to mine data for stories. What once felt like a war between traditional and digital journalism has now settled into a somewhat uneasy truce – and into a (sometimes grudging) recognition that, increasingly, “digital” and “journalism” are inextricably connected.
But we’re all in this together, of course. And the onus is on digital journalists to welcome veteran reporters into the future’s fold — to help them navigate the new tools that will inform, if not define, the shape journalism takes going forward.
But the onus is also on digital journalists to learn from the veterans – to learn reporting methods and narrative techniques and skills that have nothing to do with Google or Facebook or Twitter, and everything to do with journalism as it’s been practiced throughout its history. The veterans may not be able to show you how to create Fusion tables, but I can promise that, from them, you’ll learn something new that will help your reporting more than the latest tools ever could.
Image of Edward R. Murrow via the Prelinger Archive used under a Creative Commons license.
POSTED Sept. 28, 2011, 2:30 p.m.
Skok, David. "David Skok: Why we need to separate our stories from our storytelling tools." Nieman Journalism Lab. Nieman Foundation for Journalism at Harvard, 28 Sep. 2011. Web. 20 Apr. 2019.
Skok, David. "David Skok: Why we need to separate our stories from our storytelling tools." Nieman Journalism Lab. Last modified September 28, 2011. Accessed April 20, 2019. https://www.niemanlab.org/2011/09/david-skok-why-we-need-to-separate-our-stories-from-our-storytelling-tools/. | https://www.niemanlab.org/2011/09/david-skok-why-we-need-to-separate-our-stories-from-our-storytelling-tools/ |
The title of this article is a paradox in itself. Freedom of religion is a part of human rights law. The basic assumption of human rights law is that human rights are universal and that respect for human rights should not depend on any particular economic, political, or cultural context. Indeed, if basic liberties were dependent upon their appropriateness to the norms of a particular country, group, or community, they would unavoidably lose their critical content. If every group producing specific, context-related norms were entitled to tailor human rights to its own needs and values, Muslim women would not be able to fight the discriminations they endure in their countries, and it would be impossible to condemn genital mutilations, which are justified in the name of cultural specificities. However, many countries do impose an official religion, and the economic or political context of the country is often an excuse to deny human rights in general. Thus putting freedom of religion "in context" might be considered dangerous, but such a view would be a misunderstanding.
II. Two KINDS OF CONTEXTUALIZATION
To understand human rights and cultural contexts, one should distinguish between two very different methods of relating human rights to cultural contexts (not to mention the political and economical ones).
The first method-the "bad" type-is the one summarized above: adapting basic liberties to a certain context would mean that when a conflict of norms arises, the particular cultural value will prevail. In these circumstances, the relevant communities will only accept the segment of human rights law that fits into their own normafive system. That is, they would retain their prejudices, not allowing the universal norm of human rights to prevail over their own specific values. This selective "reception" of human rights by a culture would simply mean subordinating human rights to the values of the group. The latter norms would be immune to any moral criticism expressed from "outside" the culture. This kind of universal claim (for instance, the universal requirement that religion is a matter of conscience, not of force) would unavoidably be labelled ethnocentric. Instead of seeing basic human rights norms as impartial and transcultural standards, the (often self-appointed) leaders of the group would simply dismiss these external norms as the requirements of another particular culture, that is, Western culture.
Such a claim should be patiently rebutted. If this is not carefully done, human rights will lose their critical edge and become an innocuous part of cultures that will remain "sovereign" as far as the values they want to impose (that is, very often, the way they treat their own members) are concerned.
But there is a second method-the "good" type-of considering human rights in a particular context. This view takes into account the fact that several conceptions of basic liberties exist in democratic countries. Consequently, it would be an oversimplification to consider one of these interpretations as authentic and the others not. In fact, the meaning of human rights is the subject of an ongoing debate. Such a controversy is normal in open societies particularly due to the fact that the universal norm of human rights is much more complex than it first appears. For instance, the status of religion itself is different in the United States than in many European countries. Of course, this is an oversimplification of the problem. There are divergent currents of thought everywhere, and the debate takes place as much within the broad cultural contexts (United States, Western Europe, Eastern Europe-where the Orthodox Church is dominant, etc.) as between systems. | https://www.questia.com/read/1P3-149336721/freedom-of-religion-in-context |
In this post, we discuss the lymphatic system's many essential functions and why it is important to give it our attention. We also discuss a few easy ways to naturally detoxify the lymphatic system, including through the practice of brushing your skin with a dry brushing to encourage lymphatic flow.
Functions of the Lymphatic System
The lymphatic system is one of the most significant systems in the human body. A network of vessels that can be found in almost every part of the body, the lymphatic system assists in the movement of a fluid called lymph, which resides within nodes. The lymphatic system is one our body’s primary weapons against toxins, wastes, and other unwanted elements that invade our system.
The lymphatic system has three main functions: to maintain fluid balance, to help in fat absorption, and to assist the immune system.
Fluid is found in the tiny spaces between tissues and cells. Our lymphatic system collects any excess fluid found in these spaces and deposits them into our bloodstream. Without it, our tissues and cells would swell. Blood volume and pressure would also be negatively impacted, to the point of becoming fatal if not addressed. The lymphatic system also plays a key role in absorbing fats from the digestive system, and helps in transporting these fats to the venous circulation.
The most notable function of the lymphatic system is to help protect the body against infections. The lymphatic system comes into action whenever other lines of defense fail such as the skin (physical barrier) and acids in the stomach (toxic barrier). The lymphatic system creates white blood cells, or lymphocytes, which travel through the body until they reach the lymph nodes. Lymph nodes become activated when they come into contact with or fight bodily infections.
There are about 600 lymph nodes in the body, and most of them are concentrated in the neck, armpits and groin areas. You can determine whether your body is fighting an infection if you notice swollen glands, or lymph nodes, located in these areas. Lymphocytes become activated whenever they encounter pathogens or infections, communicating with each other to set off a defense response. This causes the swelling you end up seeing and feeling.
The activated lymphocytes then travel through the lymphatic system until they reach the bloodstream, unrolling the immune response throughout the body. Immunologists call this the Adaptive Immune Response, which stays with us throughout our lives. This makes it easier for the lymphocytes to react if the same infection affects the body again. A healthy lymphatic system means a stronger and more resilient immune response against infections.
The lymphatic system can become stagnate if it is blocked or swamped with toxic remains. As it does not have a pumping mechanism of its own, it depends on the muscles and joints to be able to move, which pushes along the fluid. If the lymphatic system is not kept in check and becomes overwhelmed, the immune system can be compromised. Warning signs of a poor lymphatic system are swollen fingers, bloating, unexplained feelings of exhaustion, constipation, and dryness and itchiness of the skin. Much worse, it could lead to cellulite build up, edema, swollen lymph nodes, eczema, arthritis, and various infections of the ears, nose and throat, as well as the respiratory system. Thus, it is very important to maintain a healthy lymphatic system.
There is no need to worry, as taking good care of your lymphatic system does not require much work. In the next section of this post, we will discuss some simple yet effective Ayurvedic treatments to keep your lymphatic system healthy.
Ayurvedic Practices to Keep Your Lymphatic System Healthy
Opt for Lukewarm Water
Drinking lukewarm water can effectively eliminate the buildup of toxins in your lymph fluid. Some of these toxins can be acquired through external means such as unhealthy food and environment. These toxins are known to be sticky and greasy by nature. Drinking lukewarm water can help dissolve such sticky buildup. As a comparison, consider how hot or warm water helps dissolve tough grease on dishes.
Ayurveda recommends sipping warm water to gradually and comfortably flush the toxins out of the lymphatic system. Warm water is effective in hydrating and softening hardened muscles or tissues and is also effective in detoxifying gut-associated lymphoid tissues. To maximize the effectiveness, it is advisable to sip warm water every 30 to 60 minutes. Keep in mind that the frequency of sipping warm water is more important that the quantity of how much you sip. Doing this consistently and regularly will not only flush out toxins, but will also help keep your lymphatic system clean.
Include Red Foods in Your Diet
The digestive system can also impact the way the lymphatic system works. As mentioned earlier, lymphatic vessels are present in the digestive tract and can be easily impaired with an unhealthy diet. You can help keep the digestive system healthy by eating naturally red foods. Incorporating naturally red foods in your diet will not only strengthen your immune system, but will also reduce your chances of developing cardiovascular diseases and obesity.
Ayurveda encourages the consumption of naturally red foods such as berries, cherries, cranberries, beets and pomegranates to stimulate an underactive digestive system. Naturally red foods can effectively alkalinize the digestive tract, making it a difficult environment for pathogens to thrive. In addition to fiber, red foods also contain enzymes and bioflavonoids that can help break down all the accumulated toxins and free radicals in your intestines.
Practice Diaphragmatic Breathing
The diaphragm acts as a pump for the lymphatic system. The very act of breathing aids in the movement of the lymph towards our chest. Whenever you breathe in and out deeply, you are actually stimulating the thoracic duct located at the neck area, which helps the lymph fluid move easier. Thus, it is very important that you practice proper diaphragmatic breathing in order to avoid lymphatic congestion. To do so, you need to slowly breathe in through your nose, while deeply pushing the stomach out as your lungs fill with air. It is important to keep this in mind as you want to breathe into your belly rather than into the chest region. Release the air through your mouth just as slowly. Doing about 5 to 10 repetitions of diaphragmatic breathing daily will help move lymph fluid, transport the correct amount of oxygen to the blood, and encourage relaxation. Aside from being a great way to send the body to sleep, it is also nice to practice diaphragmatic breathing outdoors after you wake up when the brisk morning air is freshest. You will be amazed by the benefits!
Get Plenty of Exercise or Practice Yoga
The lymphatic system also depends on body movements to maintain its flow. There are various ways in which the lymphatic system can be stimulated, such as external massages, muscle expansion/contraction, and intense exercise. Any physical movement can help avoid lymph clogging and stagnation. In other words, the more you move, the more active the lymphatic system becomes.
There are plenty of physical exercises you can do to make sure the lymphatic system remains efficient. Any exercise that involves the legs prevents clogging of the inguinal nodes located in the groin area, while any exercise that involves the upper body such as lifting and swimming will help move fluid through the axillary nodes in the armpits. Exercises that encourage flexibility, such as yoga, also stimulate the lymphatic flow. Inversion poses, such as handstands and headstands, will reverse the typical effect of gravity, which helps move the lymph towards the heart. Twists squeeze the muscles which will help flush the lymph out of the tissues.
Practice Dry Brushing
Dry brushing can also positively improve the lymphatic system. The skin, being the largest organ, detoxifies and protects the body against many negative elements. There are also many lymph vessels running under the skin’s surface, which is why stimulating the skin using a dry brush can be so beneficial.
Dry brushing is a favorite Ayurvedic practice and removes dirt, reduces cellulite, exfoliates dead skin cells, and gently stimulates lymph circulation. Not only can dry brushing stimulate the skin, it can also have a positive impact on how your digestive system and kidneys work. Most of all, dry brushing is very relaxing. Dry brushing is a simple exercise that can be practiced daily before bathing. Using a dry brush with soft bristles, brush your dry skin upwards towards the heart starting with your feet and working your way up your body. The face is much more delicate and can require a softer dry brush or a more gentle touch. You can further boost the lymph circulation by bathing in warm water afterwards.
As a bonus tip, you may also want to consider using a dry brush with copper bristles to help boost your lymphatic system. In ancient Ayurvedic practices, it was discovered that copper ions absorbed by the skin through dry brushing with a copper dry brush supported lymphatic flow resulting in a healthy immune response.
Conclusion
It may be the most underrated internal system, but the lymphatic system plays a critical role in maintaining your overall health. If the lymphatic system is not kept in check, the immune system can be compromised which will negatively impact your well-being. Try incorporating some Ayurvedic practices into your daily routine such as drinking warm water, eating red foods, practicing diaphragmatic breathing, exercising, and dry brushing to help keep your lymphatic system healthy for years to come.
Did You Enjoy This Article?
Thank you for reading! If you enjoyed this article, you might also like the following articles: Did You Enjoy This Article? | https://www.pranabrush.com/blogs/blog/an-introduction-to-the-lymphatic-system |
I’m often asked where I get my recipes from and besides creating my own, I also have found some on the internet, in actual hardbound cookbooks, and my friends who also enjoy cooking.
This weeks’ TKT recipe comes from a guest whom, like most guests who stay at Hummingbird Inn, end up in the “Friend Category”. I selected this recipe this week because it seemed like the perfect dish to make while winter still drags on with its chilly grasp. And as many of you who know me, I hate the cold and so a hearty “stick-to-your-ribs” breakfast seems like the perfect thing.
The dish calls for mild sausage so I selected some country sausage from the local Amish Market here in Easton. It’s flavorful and has a mild “kick” to it so not too spicy to overpower the other flavor in the dish. Additional flavors to this dish come from some fresh thyme, minced garlic and a dash of salt and fresh ground pepper. I will admit that I did increase the amount of garlic and it ended up balancing really well with the country sausage.
All of that goodness is then mixed with some slow cooked grits and freshly grated cheddar cheese. Rather than baking a large amount in a baking dish and then cutting into portions as called for, I decided to try something different that would not only look good when served, but it should make it easy to scale for a smaller number of servings. So I went with a ceramic “crock” to give it a little more country look/feel as well and it worked out perfectly. It’s easy to scale and serve and looks good, too.
I really enjoyed how this dish came out. It’s packed with flavor and is a perfect dish this time of year. Ok, actually it will be good pretty much any time of year, I will definitely be adding this to the HI Breakfast Menu selection.
As for changes to the recipe? While I think it’s great as it is, as with most dishes it’s always fun to do variations. I’m thinking about perhaps a mixture of cheeses, or maybe swap out the sausage with some sweet potato for a vegetarian version. It also could be good with the option of topping with a poached egg. I think this will be a fun dish to explore and experiment with!
A special thanks for my guests for sharing this recipe with me. I’ll be looking forward to making it for you during your next stay!
13-Nov-2018
This week I went back though my ever-growing list of Test Kitchen Tuesday recipes yet to make it into the kitchen to find something egg based – but more interesting – to make. After considering a number of potential recipes, I landed upon one that consists of some of my favorite ingredients including zucchini, cheese and of course, BACON! A Zucchini and Bacon Casserole.
As the name depicts, the recipe is a full blown casserole which is fine, however a lot of times making one of these means you have a larger group you’re looking to feed otherwise you end up with a lot of leftovers. My neighbors and friends actually don’t mind that I end up with leftovers, but I like making something that is a bit more flexible in terms of servings. Yes, you can scale down recipes to make smaller amounts, but I still wanted to do something that was not only easily scaled, but would also be a little more elevated in the final product.
So, with a few “Chef Eric” modifications I’ve changed this dish from a “casserole” into an “individual soufflé” now to be called the Individual Zucchini & Bacon Soufflé.
The secret to making a soufflé is whipping the egg whites and yolks so they are super light, frothy and thus will rise when baked. While this may sound like a lot of work, there are some secrets to simplifying this task and still ending up with the lightness and “rise” of a traditional soufflé.
The ingredients that I chose to include in this dish are cubed day-old sourdough bread, fresh zucchini, crispy homemade bacon bits, finely grated Parmesan cheese and several flavor seasonings including Dijon mustard. I think I would also opt to add either some sliced spring onion or leeks to bump up the flavor a bit more. I’m sure there are many other items you could include like diced tomato, bell pepper or perhaps even some butternut squash! The possibilities are practically endless.
To be honest, I also was considering making a vegetarian version and eliminating the bacon, but that would have a bigger impact on the overall flavor and “crunchiness” of the dish. I achieve both of these flavor characteristics by sauteing the zucchini and sourdough bread in a little of the reserved bacon fat after the bacon bits are made. The bacon flavor then permeates throughout the dish and gives the sourdough bread cubes a delicious bacon-toasted crunchy texture that I thought worked really well during the best part of TKT: The Taste Test!
I really enjoyed this new breakfast dish and it actually comes together pretty quickly. Best of all, it can made for 1 order or several orders without being overly time consuming or complicated. Also, I’ve got a number of these individual quiche dishes that have been hiding in the back of the cabinet unused. Now I have a delicious use and I definitely will be adding this to the guest menu very soon!
06-Nov-2018
Hello all! I’m happy to post another rendition of “Test Kitchen Tuesday” and this time, it’s a spin on another international dish. This time, we are presenting a Swiss dish call Rösti (pronounced RAW-sti) which is more commonly a side dish vs. a full breakfast entree basically made from just potatoes that is shaped into a burger-like patty and then fried in a fat (oil, butter, etc.). In order to make a version work as an entree, I’ve added some grated Gruyere cheese, bacon, spring onion and a little bit of garlic and seasonings.
The mixture is then pan fried in a bit of olive oil, reserved bacon fat and a little butter. Yes, that’s right – oil, fat AND butter. You know that guilty pleasure side of you is thinking “yes, please.”
I made a few versions of this where I basically tried to find the best preparation method. I made one fresh after putting the dish together and that one was good, but I found it to a) not hold up well when being cooked, and b) the flavor was a bit bland. Another patty I wrapped in plastic wrap and chilled overnight and a third patty was wrapped in plastic wrap and frozen then defrosted and cooked. The verdict is that the overnight chilled version was significantly better! Not only did it hold together while being cooked, but the flavors seemed to be more developed.
Here’s a picture of the inside of the Rösti after being cooked:
After it’s pan friend, it’s then topped with the green parts of a spring onion and some freshly shaved Gruyere cheese. It was really good, but I think there’s even further room for improvement. I will probably bump up the seasonings a bit and then once cooked, I would top it with either a fried or poached egg and then then some chopped spring onion and grated cheese. OK, and perhaps a little more bacon 🙂
03-Oct-2018
It’s been awhile since I’ve had a chance to get back into the “Test Kitchen” and I have a number of test recipes to start trying out. So I was happy to be able to get to do the first recipe in awhile – a strata made of french bread, bacon, cheese, and egg base.
I was happy with the results overall. I think it might benefit from a few adjustments in terms of the spices to bump up the flavor a bit. I was also thinking that maybe a little spring onion and/or leeks might be nice as well.
So I think as is it could be ready to go, but I may do one more round with these adjustments and see which comes out better. This will certainly be making an appearance on a Hummingbird Inn menu very soon. It’d be a nice, hearty fall/winter dish for sure!
17-Apr-2018
This week I had a really fun challenge for the latest rendition of TKT. I needed to come up with a couple of dishes that someone with a sensitivity to Nightshades could eat. Some of you may be thinking “Hmmm… Nightshades. Sounds kind of familiar, but what exactly are Nightshades?” Well nightshades are commonly known as the “potato family” and the “tomato family” which actually is a large part of the group of foods that make up the nightshade list, but it goes beyond that to include eggplant, peppers and a number of spices as well
Oh – and to make the challenge even MORE fun, the menu items also need to address someone else’s restriction of “dairy-free”.
I actually do enjoy these types of challenges because it allows me to get creative and hopefully come up with something that will wow the guests – even the other guests who have no special dietary requirements.
So after doing a bit of research, I came up with a couple of ideas and decided to try them both out this week. So here’s what was cookin’ for TKT this week:
The first idea was to go with something that didn’t have any vegetables at all. I thought some kind of carbohydrate based dish like pancakes or french toast would be good. But there’s that added twist of “dairy-free” and many recipes for these type of dishes have a little milk or cream in them. But it is possible to make appropriate substitutions, but the trick is doing that without sacrificing flavors as well as expected textures and appearance. I know. That’s a tall order, right?
I managed to create a really yummy pancake batter that has no milk and I used vegan butter which is dairy-free. While nobody on the guest this this weekend is opposed to eggs, it could be “egg-free” as well if needed. Along with some other substitutions, I substituted lite brown sugar for the regular white granulated sugar which gave the pancakes a little more of a “nutty/sweet” flavor and it goes really well with the maple syrup.
They came out lite, fluffy and full of flavor to the point where I don’t think anyone would tell the difference between these and regular pancakes. Done!
For the next dish, I wanted to do something egg based and since everyone that will be staying here is fine eating eggs, that made things a bit easier. I wanted something that would be really flavorful and hearty and ended up with a delicious Sausage and Spinach Breakfast Casserole. I am using a sage based sausage with some sweet onions sauteed in avocado oil and added a good amount of fresh baby spinach. It is then slowly baked in a medium-hot oven to allow all the flavors to come together and the casserole to puff up.
I personally really enjoyed this dish and while it’s not a complex recipe, it doesn’t always have to be to be good. It just needs a good combination of flavors and this accomplishes that well while keeping within the dietary requirements. Boom! <mic drop>
30-Mar-2018
I didn’t quite make into the Test Kitchen this Tuesday but only because I had a house full of guests. So that is a GOOD thing, but I didn’t want the entire week to go by without something new to try and possible add to the menu collection so this week it’s Test Kitchen Friday. I know – that title isn’t as good so I’ll have to work on that…
With this weekend being Easter, I thought I should try to make something that would give a little “nod” to the holiday. I thought about maybe doing colored Easter Eggs but I think those are more interesting/fun to make vs. eat. Then then there’s Easter Bunnies but trying to make anything in the shape of an Easter Bunny might be beyond my artistic skills a bit. OK – so if not bunnies, what else is “Bunny Related” and food. Well, what do bunnies like to eat? Carrots! OK – but the idea of a Carrot Omelette just didn’t sound all that enticing. So what else can one do with carrots? I know – CARROT CAKE! Again, not quite the expected breakfast item and, while as some of you know I do enjoy doing the unexpected, that didn’t seem to fit either. Yet, with a few modifications and taking ingredients found in carrot cake and mixing them into some pancakes – which are do have the word “CAKE” in them – it seemed like the right way to go.
Well, according to a couple of people who just happened to be sitting in the Guest Parlor today when I was in the Test Kitchen and got dragged into being Taste Testers, the agreed that the Carrot Cake Pancakes are a hit! I poured a little warm maple syrup over them and then made a little whipped cream cheese “frosting” with some powdered sugar and vanilla and it tastes really good! They really do have the flavor of carrot cake though perhaps not quite as sweet, but they are fluffy and the nuts add a nice taste and texture to them. Oh, and who doesn’t like cream cheese frosting/!?
Along with the Carrot Cake Pancakes, I may have another “Easter Food” surprise I may spring on my guests this weekend, but we’ll see how the timing goes. Guests this weekend will at least get offered the Carrot Cake Pancakes! I think these might be OK to offer on the menu even when it’s not Easter? They’re just too good to only have once a year!
06-Mar-2018
This strata combines all sorts of delicious ingredients including soft croutons made from English Muffins, Amish breakfast sausage, sweet dried cranberries and green onion. This is then all soaked overnight in an egg custard with some sour cream. Hungry yet? Well there’s more – cuz the entire dish is then topped with freshly shredded Monterey Jack cheese before it is then twice baked to make a gooey, crispy crust.
I think this came out well, but it could use a little “bump” in base flavors. I did like the flavor combination of the sausage with the sweetness of the cranberries – almost like a breakfast Thanksgiving stuffing. I think this would go over well with guests and plan on putting on the menu soon.\
27-Feb-2018
This light, healthy dish is made with a homemade pizza crust and then topped with fresh baby spinach, sliced grape tomatoes and a sprinkling of shredded mozzarella cheese. I also added some mini pepperoni slices but I would replace that with either bacon and/or a selection of veggies (mushrooms, onions, peppers, etc.). This is then finally topped with an egg and baked. It was really delicious and this healthy dish is super low in calorie (under 300 calories!) as well as light and flavorful and with the egg, does seem and taste more like a breakfast dish.
The recipe says a single serving is 2 pizza’s, but I think that’s a lot. But one of these may not be totally enough and would only have one egg which I also think is not enough. So I’m going to make the pizza crust a little larger so that I can put 2 eggs but not the same as 2 full crusts. Should be the right serving size. Also, I may offer a few topping options when it finally hits the menu. So it’s not quite ready for the Guest Menu, but one more round in the Test Kitchen should do it.
UPDATE
I did a little impromptu Test Kitchen today to try remaking the breakfast pizza as a little large single pizza capable of holding 2 eggs. It WORKED! So I’m going to actually try it out with guests checking in this week. Hopefully they will enjoy it as much as I do!
: | https://www.hummingbirdinneaston.com/2018/02/28/test-kitchen-tuesday/ |
Grilled flank steak with delicious tomatoes, corn and black bean sauce is a simple summer 30-minute weekday dinner!
Grilled Beef Brisket with Black Bean Sauce
In summer, we barbecue whenever we have a chance! One of my favorite grilling methods is to put fresh salad or salsa on it. Some successful examples: Grilled Flank Steak with Tomato Red Onion and Balsamic Vinegar with Grilled Chicken Bruschetta.
This steak dish has many flavors! Flank steak is seasoned with cumin and garlic, grilled to perfection, and topped with fresh black beans, corn and tomato sauce, allowing you to enjoy a quick and easy dinner on the weekend.
This dish is dairy-free, gluten-free, and takes less than 30 minutes to make.
Changes and tips:
In this Tex Mex version, you can easily adjust the taste to suit your family’s taste.
- Make it spicy Some chopped jalapenos
- Make it sweet Add some chopped pineapple
- Make it complete 30 By replacing corn and beans with simple Picod Gallo.
- go ahead. If necessary, season the steak and make salsa one day in advance.
Grilled Flank Steak with Black Bean Corn Salsa
Grilled flank steak with tomato, corn and black bean sauce, a simple and delicious weekend dinner!
- 1 1/2 lb Flank steak
- 1/2 teaspoon Cumin
- 2 Garlic cloves, broken
- 1/2 teaspoon Kosher salt
- Fresh pepper to taste
For black beans, corn and tomatoes:
- 3 Spoon Shallots, minced
- 1 teaspoon olive oil
- 1/4 cup Freshly squeezed lime juice
- 2 Moderate Vine ripe tomatoes, Diced
- 1 cup Canned black beans, Drain and rinse
- 1 cup Frozen corn kernels, Fresh
- 2 Spoon Chopped coriander
- Kosher salt and fresh pepper to taste
-
Season the steak: Season the steak with crushed garlic, cumin, salt and pepper and let stand for 5-10 minutes.
-
To make the salsa: At the same time, put the red onion, olive oil, lime juice, salt and pepper in a medium bowl and let it sit for a few minutes.
-
Add tomatoes, black beans, corn, coriander and set aside.
-
Preheat the grill. Heat a clean and lightly greased indoor or outdoor grill at high temperature.
-
Grill the steak on high heat for 6-8 minutes on each side, or until it reaches your desired degree of maturity.The probe thermometer inserted into the thickest part of the steak records 130F to 135°F as medium to medium rare
-
Let the meat sit for about 5 minutes before slicing.
-
Cut the beef into thin slices, place it on a plate, and put corn, black beans and tomato salad on top. | https://quebecnewstribune.com/health/grilled-flank-steak-with-black-bean-corn-salsa-14576/ |
The paper 'Factors Affecting Employment Relations Environment in France" is a good example of a management case study. This report discusses the employment relations environment in France and considers the factors that affect the employment relations environment in general. These are external and internal. The major ones include employer and employee relations. They form the prominent party within the employment environment relations. They play the central role since they influence other parties to participate due to their issues. Others are the trade unions who normally engage themselves in negotiations and bargaining for the employees.
The Government and other agencies also play a big role in ensuring the rule of law is followed in the employment relations environment and includes the court and the tribunals. Employers also have their representative, the employers association who handles their grievances. The shop stewards represent other employees to their employers and are the ones who engage the trade unions when a disagreement between them and employers arise. The report identifies the employer and employee as a prominent party. The two face some constraints in the course of operations and these constraints are not unique. According to a Bureau of European and Eurasian affairs, 2009, France had a population of approximately sixty-four million people with about twenty-eight million workforce (2008) working in various fields.
The report further indicates a steady economic growth and the government's top priority agenda of reducing high unemployment and create more jobs for their citizens. The employment relations environment not only affects France as a country alone but globally. It includes all the elements, external and internal of human resources management (Cuizo, G. 2008). Among the factors most considered includes employer-employee relations, trade unions, shop stewards, management, government agencies, tribunals, employer’ s organizations and other technological factors.
All these collectively form a system in which employees and employers operate. These bodies engage themselves in bargaining and negations between employees /employers and their representatives to determine specific terms and conditions of employment in general. Industrial relations carry all these factors into a system regulating employment in general (Armstrong M, 2003).
Reference
:
Armstrong, M. 2003, A Handbook of Human resources management practice, 9th edition
Cuizon, G. 2008, Key Elements Affecting Human Resource Practice, External Factors
Junlin, H. 2006, the International Labour Organization's Role in Nationalizing the International Movement to Abolish Child Labor
Cole, G, A, 2002, Personnel and Human Resources Management, 5th edition
Budd, John W. and Bhave, Devasheesh 2008, "Values, Ideologies, and Frames in Industrial Relations," in Sage Handbook of Industrial Relations, Sage. | https://essayintl.com/the-employment-relations-environment-report-country-france-2077149 |
Columbia, SC – January 15, 2013 – Internet “sweepstakes machines” will be banned under a new law passed on second reading by the state Senate today.
The bill, S.3, sponsored by Senator Wes Hayes, Senate Judiciary Chairman Larry Martin and others, clarifies what the gambling industry claims is a loophole in the current law that allows them to operate. While law enforcement says that the machines are likely illegal under current law, this change will provide a more ironclad case against the gambling operators, and will essentially ban the machines.
“This bill removes the ambiguity that some believe exists in the video poker ban from the late 1990s,” Martin stated. “It will help clear up any confusion about the public policy so that law enforcement can do its job.”
Senator Hayes said the sooner we could rid our state of this new form of gambling, the better:
“I’m very pleased we have been able to move this bill so quickly,” Hayes said. “If we didn’t address this issue, the gambling operators of these sweepstakes machines would cause great harm to families in our state. I am hopeful the House will move quickly on it as well.”
The bill will be up for third reading tomorrow.
###
Editor’s Note: The above communication is a news release that does not necessarily reflect the editorial position of FITSNews.com. To submit your letter, news release, email blast, media advisory or issues statement for publication, click here). | https://www.fitsnews.com/2013/01/15/sc-senate-bans-sweepstakes-machines/emailpopup/ |
Research reveals that companies who gave their staff an extra day off per week, with no reduction in pay, experienced increased revenue alongside reduced absenteeism and resignations.
Six projects successful in the Climate Research Seed Fund competition, funded by the Higher Education Authority
Workshop featuring international speakers working on carbon capture and storage from mathematical, geological, and engineering perspectives.
The UCD Earth Institute fosters multidisciplinary research and works with stakeholders to address global, regional and national environmental challenges.
Based in University College Dublin’s Belfield campus, the Institute is a focal point for UCD’s environmental research and is home to state-of-the-art research facilities.
To learn more about the Earth Institute, join our monthly newsletter:
Our community has world-leading and wide-ranging environmental research expertise, with over 250 full and associate members is drawn from across UCD’s six constituent Colleges.
The wide range of expertise within the Institute ensures that we can inform and lead policy in focused disciplines and in multidisciplinary topics.
We foster entrepreneurship, innovation, creativity and technology commercialisation, while our researchers work directly with commercial partners across a range of industries.
We strive to produce research that makes a demonstrable contribution to society, with our researchers working closely with the communities most affected by their work. | https://www.ucd.ie/earth/ |
Merging Temporal Intervals with Gaps
In Joining Temporal Intervals I explained how to join multiple temporal tables. The provided solution merges also temporal intervals but – as pointed out in that post – may produce wrong results if the underlying driving table is not gaplessly historized. In this post I’ll explain how to merge temporal intervals with various data constellations correctly.
You find the scripts to create and populate the tables for scenario A and B here.
Scenario A – No overlapping intervals
This scenario handles consistent data. This means no overlapping intervals, no duplicate intervals, no including intervals, no negative intervals (valid_to < valid_from). Here is the content of the example table t1:
Test Data Set t1
1
2
3
4
5
6
7
8
9
10
11
12
13
SQL> SELECT * FROM t1;
VID OID VALID_FROM VALID_TO C1 C2
---------- ---------- ----------- ----------- ---------- ----------
1 1 01-JAN-2010 31-DEC-2010 A B1
2 1 01-JAN-2011 31-MAR-2011 A B2
3 1 01-JUN-2011 31-JAN-2012 A B2
4 1 01-APR-2012 31-DEC-9999 A B4
5 2 01-JAN-2010 31-JUL-2012 B B1
6 2 01-AUG-2012 31-DEC-9999 B B2
18 4 01-JAN-2010 30-SEP-2011 D D1
19 4 01-OCT-2011 30-SEP-2012 D2
20 4 01-OCT-2012 31-DEC-9999 D D3
I’d like to write a query which produces all intervals for the columns OID and C1 honoring gaps in the historization. For OID 1 I expect that record 1 and 2 are merged, but records 3 and 4 are not merged because the intervals are not “connected”. For OID 2 I expected to get a single merged interval. For OID 4 I expect to get 3 records, since the records with C1=’D’ are not connected.
So, the following query result is expected:
Expected Result
OID VALID_FROM VALID_TO C1
---------- ----------- ----------- ----------
1 01-JAN-2010 31-MAR-2011 A
1 01-JUN-2011 31-JAN-2012 A
1 01-APR-2012 31-DEC-9999 A
2 01-JAN-2010 31-DEC-9999 B
4 01-JAN-2010 30-SEP-2011 D
4 01-OCT-2011 30-SEP-2012
4 01-OCT-2012 31-DEC-9999 D
The next query produces exactly this result.
Query to Merge Non-Overlapping Intervals
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
WITH
calc_variousAS(
-- produces column has_gap with the following meaning:
-- 1: offset > 0 between current and previous record (gap)
-- 0: offset = 0 between current and previous record (no gap)
-- produces column new_group with the following meaning:
-- 1: group-by-columns differ in current and previous record
-- 0: same group-by-columns in current and previous record
SELECToid,
valid_from,
valid_to,
c1,
c2,
CASE
WHENLAG(valid_to,1,valid_from-1)OVER(
PARTITIONBYoidORDERBYvalid_from
)=valid_from-1THEN
0
ELSE
1
ENDAShas_gap,
CASE
WHENLAG(c1,1,c1)OVER(
PARTITIONBYoidORDERBYvalid_from
)=c1THEN
0
ELSE
1
ENDASnew_group
FROMt1
),
calc_groupAS(
-- produces column group_no, records with the same group_no
-- are mergeable, group_no is calculated per oid
SUM(has_gap+new_group)OVER(
PARTITIONBYoidORDERBYoid,valid_from
)ASgroup_no
FROMcalc_various
),
mergedAS(
-- produces the final merged result
-- grouping by group_no ensures that gaps are honored
SELECToid,
MIN(valid_from)ASvalid_from,
MAX(valid_to)ASvalid_to,
c1
FROMcalc_group
GROUP BYoid,c1,group_no
ORDERBYoid,valid_from
)
-- main
SELECT*FROMmerged;
The usability of the WITH clause aka Subquery Factoring Clause improved significantly with 11gR2. Since then it’s not necessary to reference all named queries anymore. The named queries become real transient views and this simplifies debugging a lot. – If you replace the content of line 57 with “SELECT * FROM calc_various ORDER BY oid, valid_from;” the query produces the following result:
Result of calc_various
OID VALID_FROM VALID_TO C1 C2 HAS_GAP NEW_GROUP
--- ----------- ----------- -- -- ------- ---------
1 01-JAN-2010 31-DEC-2010 A B1 0 0
1 01-JAN-2011 31-MAR-2011 A B2 0 0
1 01-JUN-2011 31-JAN-2012 A B2 1 0
1 01-APR-2012 31-DEC-9999 A B4 1 0
2 01-JAN-2010 31-JUL-2012 B B1 0 0
2 01-AUG-2012 31-DEC-9999 B B2 0 0
4 01-JAN-2010 30-SEP-2011 D D1 0 0
4 01-OCT-2011 30-SEP-2012 D2 0 1
4 01-OCT-2012 31-DEC-9999 D D3 0 1
You see that the value 1 for HAS_GAP indicates that the record is not “connected” with the previous record. Additionally the value 1 for the column NEW_GROUP indicates that the records must not be merged even if they are connected.
To simplify the calculation of NEW_GROUP for multiple group by columns (used in the named query “merged”) build a concatenated string of all relevant columns to deal with a single column similar to the column C1 in this example.
HAS_GAP and NEW_GROUP are used in the subsequent named query calc_group which produces the following result:
Result of calc_group
OID VALID_FROM VALID_TO C1 C2 GROUP_NO
--- ----------- ----------- -- -- --------
1 01-JAN-2010 31-DEC-2010 A B1 0
1 01-JAN-2011 31-MAR-2011 A B2 0
1 01-JUN-2011 31-JAN-2012 A B2 1
1 01-APR-2012 31-DEC-9999 A B4 2
2 01-JAN-2010 31-JUL-2012 B B1 0
2 01-AUG-2012 31-DEC-9999 B B2 0
4 01-JAN-2010 30-SEP-2011 D D1 0
4 01-OCT-2011 30-SEP-2012 D2 1
4 01-OCT-2012 31-DEC-9999 D D3 2
The GROUP_NO is calculated per OID. It’s technically a running total of HAS_GAP + NEW_GROUP. All intervals with the same GROUP_NO are mergeable. E.g. record 2, 3 and 4 have a different GROUP_NO which ensures that every single gap is honored for OID 1.
Scenario B – With Overlapping intervals
Reality is that we have sometimes to deal with inconsistent data. E.g. duplicate data intervals, overlapping data intervals or even negative data intervals (valid_to < valid_from). I’ve created an example table t2 which is in fact a copy of t1 but includes an additional messy OID 3 with the following data:
Test Data Set t2
SQL> SELECT * FROM t2 WHERE oid >= 3 ORDER BY vid;
VID OID VALID_FROM VALID_TO C1 C2
---------- ---------- ----------- ----------- ---------- ----------
7 3 01-JAN-2010 31-DEC-2010 C B1
8 3 01-JAN-2010 31-MAR-2010 C B2
9 3 01-JUN-2010 31-AUG-2010 C B3
10 3 01-OCT-2010 31-DEC-2010 C B4
11 3 01-FEB-2011 30-JUN-2011 C B5
12 3 01-FEB-2011 30-JUN-2011 C B6
13 3 01-JUN-2011 31-AUG-2011 C B7
14 3 31-AUG-2011 30-SEP-2011 C B8
15 3 01-DEC-2011 31-MAY-2012 C B9
16 3 01-DEC-2011 31-MAY-2012 C B9
17 3 01-JUN-2012 31-DEC-2012 C B10
The following figure visualizes the intervals of OID 3. The green patterns are expected to be used and the red pattern are expected to be ignored. The rationale is that the VID (version ID) is typically based on an Oracle Sequence and therefore it’s assumed that higher VIDs are newer and therefore more adequate. In real cases you may have additional information such a created_at or modified_on timestamps which helps you identifying the record to be used in conflicting situations. Since data is considered inconsistent in this scenario the cleansing strategy might be very different in real cases. However, cleansing is always the first step and in this example the highest VID has the highest priority in case of conflicts.
In cleansing step 1 we gather all potential starting intervals. We do not need all these intervals, but since we will merge intervals in the last processing step, we do not have to care about some unnecessary intervals right now.
Cleansing Step 1
SQL> WITH
2 o AS (
3 -- object identifier and their valid_from values
4 SELECT oid, valid_from FROM t2
5 UNION
6 SELECT oid, valid_to + 1 FROM t2
7 WHERE valid_to != DATE '9999-12-31'
8 )
9 -- main
10 SELECT * FROM o WHERE oid = 3;
OID VALID_FROM
---------- -----------
3 01-JAN-2010
3 01-APR-2010
3 01-JUN-2010
3 01-SEP-2010
3 01-OCT-2010
3 01-JAN-2011
3 01-FEB-2011
3 01-JUN-2011
3 01-JUL-2011
3 31-AUG-2011
3 01-SEP-2011
3 01-OCT-2011
3 01-DEC-2011
3 01-JUN-2012
3 01-JAN-2013
15 rows selected.
In cleansing step 2 we calculate the relevant VID for every previous result. Additionally we may inexpensively calculate if an interval is a gap.
Cleansing Step 1 and 2
9 v AS (
10 -- relevant version identifier per valid_from
11 -- produces column is_gap
12 SELECT o.oid,
13 MAX(vid) AS vid,
14 o.valid_from,
15 NVL2(MAX(vid), 0, 1) AS is_gap
16 FROM o
17 LEFT JOIN t2
18 ON t2.oid = o.oid
19 AND o.valid_from BETWEEN t2.valid_from AND t2.valid_to
20 GROUP BY o.oid, o.valid_from
21 )
22 -- main
23 SELECT * FROM v WHERE oid = 3 ORDER BY valid_from;
OID VID VALID_FROM IS_GAP
---------- ---------- ----------- ----------
3 8 01-JAN-2010 0
3 7 01-APR-2010 0
3 9 01-JUN-2010 0
3 7 01-SEP-2010 0
3 10 01-OCT-2010 0
3 01-JAN-2011 1
3 12 01-FEB-2011 0
3 13 01-JUN-2011 0
3 13 01-JUL-2011 0
3 14 31-AUG-2011 0
3 14 01-SEP-2011 0
3 01-OCT-2011 1
3 16 01-DEC-2011 0
3 17 01-JUN-2012 0
3 01-JAN-2013 1
15 rows selected.
In cleansing step 3 we extend the previous result by the missing columns from table t2 and calculate the NEW_GROUP column with the same logic as in scenario A.
Cleansing Step 1, 2 and 3
58
59
60
61
62
63
64
65
66
67
68
69
22 combined AS (
23 -- combines previous intermediate result v with t2
24 -- produces the valid_to and new_group columns
25 SELECT t2.vid,
26 v.oid,
27 v.valid_from,
28 LEAD(v.valid_from - 1, 1, DATE '9999-12-31') OVER (
29 PARTITION BY v.oid ORDER BY v.valid_from
30 ) AS valid_to,
31 t2.c1,
32 t2.c2,
33 v.is_gap,
34 CASE
35 WHEN LAG(t2.c1, 1, t2.c1) OVER(
36 PARTITION BY t2.oid ORDER BY t2.valid_from
37 ) = c1 THEN
38 0
39 ELSE
40 1
41 END AS new_group
42 FROM v
43 LEFT JOIN t2
44 ON t2.oid = v.oid
45 AND t2.vid = v.vid
46 AND v.valid_from BETWEEN t2.valid_from AND t2.valid_to
47 )
48 -- main
49 SELECT * FROM combined WHERE oid = 3 ORDER BY valid_from;
VID OID VALID_FROM VALID_TO C1 C2 IS_GAP NEW_GROUP
--- --- ----------- ----------- -- --- ------ ---------
8 3 01-JAN-2010 31-MAR-2010 C B2 0 0
7 3 01-APR-2010 31-MAY-2010 C B1 0 0
9 3 01-JUN-2010 31-AUG-2010 C B3 0 0
7 3 01-SEP-2010 30-SEP-2010 C B1 0 0
10 3 01-OCT-2010 31-DEC-2010 C B4 0 0
3 01-JAN-2011 31-JAN-2011 1 1
12 3 01-FEB-2011 31-MAY-2011 C B6 0 0
13 3 01-JUN-2011 30-JUN-2011 C B7 0 0
13 3 01-JUL-2011 30-AUG-2011 C B7 0 0
14 3 31-AUG-2011 31-AUG-2011 C B8 0 0
14 3 01-SEP-2011 30-SEP-2011 C B8 0 0
3 01-OCT-2011 30-NOV-2011 1 1
16 3 01-DEC-2011 31-MAY-2012 C B9 0 0
17 3 01-JUN-2012 31-DEC-2012 C B10 0 0
3 01-JAN-2013 31-DEC-9999 1 1
15 rows selected.
Now we have cleansed the data and are ready for the final steps “calc_group” and “merge” which are very similar to scenario A. The relevant difference is the highlighted line 70 which filters non-gap records. Here is the complete statement and the query result:
Query to Merge Overlapping Intervals
70
71
72
73
74
75
WITH
oAS(
-- object identifier and their valid_from values
SELECToid,valid_fromFROMt2
UNION
SELECToid,valid_to+1FROMt2
WHEREvalid_to!=DATE'9999-12-31'
),
vAS(
-- relevant version identifier per valid_from
-- produces column is_gap
SELECTo.oid,
MAX(vid)ASvid,
o.valid_from,
NVL2(MAX(vid),0,1)ASis_gap
FROMo
LEFT JOINt2
ONt2.oid=o.oid
ANDo.valid_fromBETWEENt2.valid_fromANDt2.valid_to
GROUP BYo.oid,o.valid_from
),
combinedAS(
-- combines previous intermediate result v with t2
-- produces the valid_to and new_group columns
SELECTt2.vid,
v.oid,
v.valid_from,
LEAD(v.valid_from-1,1,DATE'9999-12-31')OVER(
PARTITIONBYv.oidORDERBYv.valid_from
)ASvalid_to,
t2.c1,
t2.c2,
v.is_gap,
CASE
WHENLAG(t2.c1,1,t2.c1)OVER(
PARTITIONBYt2.oidORDERBYt2.valid_from
FROMv
LEFT JOINt2
ONt2.oid=v.oid
ANDt2.vid=v.vid
ANDv.valid_fromBETWEENt2.valid_fromANDt2.valid_to
),
is_gap,
SUM(is_gap+new_group)OVER(
PARTITIONBYoidORDERBYoid,valid_from
)ASgroup_no
FROMcombined
),
WHEREis_gap=0
GROUP BYOID,c1,group_no
ORDERBYOID,valid_from
)
-- main
SELECT*FROMmerged;
Final Query Result
---------- ----------- ----------- ----------
3 01-JAN-2010 31-DEC-2010 C
3 01-FEB-2011 30-SEP-2011 C
3 01-DEC-2011 31-DEC-2012 C
4 01-JAN-2010 30-SEP-2011 D
4 01-OCT-2011 30-SEP-2012
4 01-OCT-2012 31-DEC-9999 D
If you change line 70 to “WHERE is_gap = 1” you’ll get all gap records, just a way to query non-existing intervals.
All Gap Records
OID VALID_FROM VALID_TO C1
---------- ----------- ----------- ----------
1 01-APR-2011 31-MAY-2011
1 01-FEB-2012 31-MAR-2012
3 01-JAN-2011 31-JAN-2011
3 01-OCT-2011 30-NOV-2011
3 01-JAN-2013 31-DEC-9999
Conclusion
Merging temporal intervals is challenging, especially if the history has gaps and the data is inconsistent as in scenario B. However, the SQL engine is a powerful tool to clean up data and merge the temporal intervals efficiently in a single SQL statement.
| |
Jonathan Webber is a philosophy professor working at the intersection of moral philosophy and the philosophy of psychology. He is especially interested in what contemporary social psychology can offer to current debates in moral philosophy, and in how philosophy and psychology can be informed by twentieth-century French existentialism. He has dedicated his career to understanding and sharing how the works of existential thinkers such as Sartre and de Beauvoir developed over time and are relevent today. Jonathan has published extensively, offering books, papers, and essays. In Rethinking Existentialism, Jonathan articulates an original interpretation of existentialism as the ethical theory that human freedom is the foundation of all other values. | https://existentialsummit.com/jonathan-webber/ |
Every company needs to analyse its external, internal and competitive environment to keep one step forward in the fiercely competitive business market. Managers work on this analysis continuously to adjust their strategies with reflecting on the environment in which the company is operating. It is a useful exercise to execute an environmental study at the starting of the approach reviewing process. Being appointed as corporate strategy manager, here the prime responsibility is to discuss the external environment analysis of the company John Lewis Ltd. of United Kingdom in this piece of writing. The following assignment will give some information and data after studying of the competitive and environmental analysis of the company. It will help the company in making tactical actions and strategic objectives, directions.
The company John Lewis Ltd recruited me as a Corporate Strategy Manager, and the following report is going to discuss the external environmental analysis of the company. John Lewis Ltd is a high end chain of departmental stores, which is operated in throughout the United Kingdom (Bloomberg.com2018).The company is owned by the partnership of John Lewis that is created in the late 1800s. Furthermore, a store of the company offers various ranges of products like garden and home, lighting and furniture, sports, electrical, leisure, child and baby and beauty products etc. (Bloomberg.com2018).
the company is operating. It is a useful exercise to execute an environmental study at the starting of the approach reviewing process. Being appointed as corporate strategy manager, here the prime responsibility is to discuss the external environment analysis of the company John Lewis Ltd. of United Kingdom in this piece of writing. The following assignment will give some information and data after studying of the competitive and environmental analysis of the company. It will help the company in making tactical actions and strategic objectives, directions.
The company has 49 stores all across England, among which 12 are “flexible format” stores and “At Home” stores(Johnlewispartnership.co.uk 2018). The central vision of the company is to provide a successful business, will be empowered by its principles and peoples. The company's partnership has near about 85,500 partners, and all the benefits and profits are distributed and shared by all the partners (Johnlewispartnership.co.uk 2018).
Study of the external environment gives a proper description of the outer scenarios that a company can face at the time of operations(Morganet al. 2017). However, sometimes it can be good, and sometimes it can be wrong, both the situations felt an enormous impact on the company's activities. However, a useful analysis of this situation through PESTLE factorswill help the organisation in making a strategic decision through the understanding of the changes.
John Lewis is one of the most reputed companies in the United Kingdom and its operation mostly affected by the political factors of the country. Competitors from Europe enter the United Kingdom's market without any limitations. As described by Taskin (2017), the company is introducing in the rising market, so the company has to face competitions from different companies. However, decreasing corporate tax of 30% to 28% helps the company in making more profit in future(Morganet al. 2017).
The economic condition of the United Kingdom becomes very sensitive and is facing a turbulence period in recent times. Moreover, the changes rate of interest has also impacted the companies, operating in the United Kingdom.
As justified by Salaman and Storey (2016), intense competition within every market of the retail sector forces the retailers to provide more amounts of incentives to their respective customers. It would influence John Lewis Ltd. as most of the time the prices are needed to drop down to cope up the market.
The massive boom in the trend of fashion helps the company a lot in earning the profit, as peoples are shopping branded items from their stores. As commented by Cathcart (2014), this can be good news for the company because the trend is persistence for quite an extended period and varies from fashion clothes to kitchen appliances. Shifting preferences of the consumers and correspondence lifestyle become an excellent opportunity for the company. The company needs to introduce the latest fashion and more branded products to take the chance of modern materialistic society.
Booming of the technology and recent craze in the online shopping are giving companies an opportunity to reach towards the consumers of any region at the point of time. Internet shopping, which becomes the primary trend of the retail industry, directly influences the sales approach. As described by Juddet al. (2016), in this company the administration, management and paperless operations are conducted through the information technology system.
As described by Storeyet al. (2014), there are important laws like Sales of good Act, 1979, Trade description Act, 1968 and Data Protection Act, 1998, which impacted hugely on the operations of this company. The above laws make sure the production of the goods of satisfying standards with the consent of the seller. Moreover, these laws also assure the customers that the products are appropriately defined. The Data Protection Act discusses not exchanging the customer's data to gain profit from the lists of the niche market.
After the Copenhagen rise, environment becomes a fast growing and new factor of the companies. Eco-friendly activities and cutting of emissions, carbon footprints now become a serious issue among the companies as they felt the impact on the environment, most precisely in climate change. As described by Morganet al. (2017), the company John Lewis made small changes like energy-saving cars and recyclable papers over the years. The environment is not anymore a backburner issue, and the company needs to enhance its environment-friendly features like using of solar panels more efficiently.
SWOT analysis is a useful procedure that comprehends the weakness and strengths and distinguishes the threats and opportunities of any company. It helps in utilising the business connection by cutting the business sector. SWOT Analysis helps in uncover the opportunities, which can act as the advantages for the company. Moreover, the proper understandings of the weaknesses help in overseeing and wiping out of the threats that the companies are unaware of.
Being a reputable company, the company has significant numbers of upmarket retail stores in the United Kingdom.
The company offers various fashion brands besides its own brand in its products and services.
The company has near about 35,000 employees, and the chain is known as “Never knowingly undersold”.
John Lewis enjoys a significant brand of embodying value for money of practical qualities to promote the customer’s loyalty.
As criticised by Ramanathanet al. (2014), the company has limited amounts of items compared to the supermarkets which provide maximum options available to the customers.
As criticised by Tidyet al. (2016), after 2010, the performance of this company slipped over for a while, and it lost near about 50% of the company's value during that year.
Moreover, the company recently started to decrease their product’s prices to cope up the competition that may devalue their brand.
There are many young professionals, who are living away from home and image and brand conscious, it increases the target group of this company.
As commented by Chkanikova (2016), increased purchasing power parity leads to the improved lifestyle that increases business for all retailing companies.
Enlargements of the market in Asia will also play a crucial role in the company's success in near future.
Moreover, the intense competition from the supermarkets, grocery stores, host of different convenient stores and corners stores make the business problematic for the company (Hearn 2014).
The competition law ensures the merger of various convenience stores to develop the large-scale space that also causes a problem for the company.
The target group of this company comprises of the old people that may cause a severe threat to the company. As presently, people tend to look younger than their ages, they may be reluctant to shop from the store.
The primary purpose of this competitive analysis is to analyse the weaknesses and strengths of the competitors present in the market. It helps in making the strategies and taking of decisions, which will give some significant advantages to the company. The framework of Porter’s Five Forces will help in analysing the business that determines the competitive intensity, effectiveness and profitability of the industry.
Retailing industry has a considerable amount of competitions, and the situations are getting worse day by day after diversifications of the products from the noncore turf. As justified by Poutsma and Kaarsemaker(2015), the company John Lewis is facing more competition from companies like Tesco, Asda, Next, Marks & Spencer because of, it not only sales the drinks and foods but also household and apparel goods. The company tried its best to stay at the top level by providing high quality products and services, but through this process, the company may face the devaluation of the brand.
There is no substitute for clothes and foods so; the warnings from the alternatives are relatively low for the company. Here, the risks mainly come from the rival retailing houses like Marks and Spencer, Peter Jones, as they also offer the high quality and branded products with a marginal difference in costs (Cathcart 2014). Moreover, the company Tesco and Asda introduced more affordable alternatives like dinner jackets, which increases the threats of the substitutes.
Due to the massive investments of capitals in this sector, the risks of new entrants are relatively low. Being a mature industry, the new entrant in the retailing industry often fails to deliver something significantly new to the markets. Moreover, substantial brand value and loyal customer base, which is essential for any homogeneous market, help the reputed company (Paranque and Willmott 2014). Furthermore, the lack of knowledge of the market makes it difficult for the foreign investors to make a successful entry into a new market.
This type of competition is relatively high, and the concentration of the buyers gives an advantage in choosing from various rules and tastes. Moreover, the costs of switching from one to other brands are relatively low, and there are significant numbers of alternatives. Also, after 2013, the economy of the United Kingdom is facing a downwards movements, which forced the retailers to cut down their prices and focus on the needs of the customers (Salaman and Storey 2016).
Threats from this sector are relatively low and being a listed company; John Lewis shows an attractive turnover which attracted the suppliers. As commented by Paranque and Willmott (2014), the suppliers always want to showcase their products on renowned retailer's shelves to reach the maximum numbers of customers. Like other companies, John Lewis is not entirely dependent on the suppliers as, it mainly sells its own brands, which means despite furnished goods, it buys raw materials that are good for margins.
Value chain analysis is one of the most used frameworks of internal analysis, which added value to the customers of the concerned organisation. Value chain analysis sums up the activities, which create value and cover four areas like operations, productions, marketing and sales (Paranque and Willmott 2014). It deals with organisational operations like accounting, payroll and training and in this case, the internal management like recruiting, human resources of John Lewis Ltd. comes under this segment.
Production sector comprises of the products and services like child, baby, beauty, leisure products of this company, which are already existed in the market. Both the productions and operations of this company are upstream activities that help in creation of the value for the company. Mhough marketing and sales are other two criteria, which also creates the value for the company but mainly they are revenue driven and down stratum activities. The marketing of this company describes the process of reaching of the products and services to the consumers whereas, the sales procedures comprise of the delivery of the products and services to the customers.
As commented by Hughes (2015), the company also provides option for the online shopping besides its international delivery.
The efficient management team of this company was highly praised in previous years for its reverse John Lewis fortunes.
The product's prices are higher than that of the supermarkets, which limited the targeted groups.
The absence of the experiences of the international business, lack of sufficient marketing strategy and competitive advantages are act as the weaknesses for the company.
Online stores and designing of the new and trendier clothes make the company favourite among the youth stars.
Useful product selections, expanded networks can enable the company’s business by reaching towards the peoples by opening more subway brands and flagship stores through the recent pursued growth strategy.
Recently, this company faces different issues regarding the robbery, property loss, safety of the night workers due to its inadequate security systems.
Being a report of Corporate Strategy Managementof John Lewis Ltd of United Kingdom, the above writing discussed the external environment analysis with the help of some significant tools in above writing. It is a famous retailing company in the United Kingdom and offers a various range of products and services like clothes to kitchen appliances. From the above writing, this can be said that being a famous company the company has good brand loyalty and customer base, but lack of strategic decisions and international experiences in business can act as a threat for the company. Moreover, reasonable substitutes from the market houses like Tesco, Asda causes problems for the company beside having a significant own brand level of this company. | https://www.bestassignmentexperts.com/paidsamples/competitive-analysis-of-the-company |
Q:
Is the assertion about the form $\alpha x+\beta xy+\gamma y$ true?
In my answer, I was led to conjecture the following:
Statement:
If $\gcd(\alpha,\beta,\gamma)=1,$ then every integer can be written as $\alpha x+\beta xy+\gamma y$ for integer $x$ and $y$.
If the above is true, my original question would be solved, but the validity of the original question does not imply the truth of the above assertion.
And what I can think about now is that this is just Bézout's identity, in the case $\beta=0$.
Thanks for any help, and, please, localise each inappropriate point that takes place here.
A:
This is false.
$\gcd(6,15,10)=1$, but there is no integer solution to
$$6x+15xy+10y=1 $$
You can verify this easily by finding condition for $6x+15xy+10y>0$ and finding the local minima in those areas.
Thanks to chubakueno :
$$6x+15xy+10y+4=5 $$
$$(3x+2)(5y+2)=5 $$
So $(5y+2)$ must divides $5$, this is not possible.
A:
$\alpha x + \beta x y + \gamma y = z$ means $(\alpha + \beta y) x = z - \gamma y$
so either $z - \gamma y = 0$ (in which case you could take $x=0$) or
$\alpha + \beta y \ne 0$ and $z - \gamma y$ is divisible by $\alpha + \beta y$.
But then $\beta (z - \gamma y) + \gamma (\alpha + \beta y) = \beta z + \alpha \gamma$ must also be divisible by $\alpha + \beta y$. Suppose e.g. $\beta z + \alpha \gamma$ is a prime $P$. Then $\alpha + \beta y$ can only be
$\pm 1$ or $\pm P$.
Now $P \equiv \alpha \gamma \mod \beta$, while $\alpha + \beta y \equiv \alpha \mod \beta$. So if $\alpha$ is not congruent to $\pm 1$ or $\pm \alpha \gamma$ mod $\beta$, you're out of luck.
For example, take $\beta = 7$, $\gamma = 2$, $\alpha = 3$,$z=1$ (so $P = 13$).
| |
The safety and wellbeing of our colleagues and guests is paramount and my team and I would like to reassure you that a comprehensive range of risk assessments outlining our procedures in relation to COVID-19 are in place, in all areas of the Downe Arms Hotel.
We will continue to follow and implement all future Government and Public Health England guidance as changes are communicated to us.
- Our team has undertaken robust training around the new health and hygiene protocols
- Our team will have their temperatures checked on arrival before their shift
- Additional hand washing procedures and audits have been introduced for our team
- PPE will be provided for our team members where appropriate, such as face coverings and disposable gloves in the kitchen and backroom service areas.
SOCIAL DISTANCING – Please stay at least 2 meters apart from other guests and staff
EXCEPTIONAL CLEANLINESS – You will notice increased cleaning throughout your visit with particular attention to key touch points in the bedrooms
HAND SANITATION STATIONS – Stations are available throughout the hotel and all guest areas
TEMPERATURE CHECKS – All staff are being temperature checked at the beginning of each shift and this is available for guests as required
IN-ROOM MENUS – Interim simple in-room and drink menus are available
GRAB AND GO BREAKFAST – Nutritious take away breakfast will be available including hot items
DISPOSABLE UTENSILS – Single use disposable cutlery is available
MINIMAL FOOD HANDLING – The main items used and methods of preparation require minimal handling
CARD PAYMENTS – We would prefer payment by credit or debit card
PROTECTIVE RECEPTION SCREENS – Perspex screens are present at reception
Our team at The Downe Arms are ongoing training and regular updates regarding best practice to ensure your safety as well as that of our staff. All the above measures are in place subject to change, in line with the updated guidance from the Government. | https://www.downearmshotel.co.uk/covid-safe/ |
Investment project code: 18
The Climate Heroes Project is centred on community action against climate change. Providing learning spaces and opportunities to protect the environment with the development of a School allotment and Eco classroom at St. Fergus Primary School, Ardler, Dundee.
It will focus on key themes such as energy efficiency, reducing waste and improving biodiversity by increasing awareness and engaging communities and young people in climate change. Our application is based on dialogues with parents, teachers, and pupils of the school. Whilst the main thrust of the proposal aims to address climate change, it also seeks to advance child learning and development. It will also involve the Development Worker of Ardler Village Trust as a link to other local environmental projects and connects well with other community learning initiatives aimed at saving energy and costs amidst a cost of living crisis.
The Eco Classroom - An Outbuilding situated in the school ground that will create an immersive experience for learning and engaging with the environment, whilst promoting wellbeing. Having an outdoor practical space for education makes subjects more vivid and interesting for children to enhance their understanding and aid creativity. We intend to reuse natural resources by harvesting rainwater on the roof and using solar power. We propose to have a mini weather station. By encouraging pupils to use it, we can create a hands-on approach to learning about the ways or climate changes over time.
The School Allotment - A vegetable garden that will provide wellbeing benefits as well as educational benefits to the pupils about sustainability, producing our own food and how to reduce the carbon footprint. the school kitchen, Early Evening Cafe at Ardler Complex and Community Fridge can make use of the produce, making sure nothing goes to waste. Having a link with Ardler Village Trust and access to other projects within the community will enable us to share skills, tools, and experience from community volunteers.
We propose rewilding areas of the playground for nature to regenerate and grow, which will support dwindling populations of native pollinators including bees and butterflies. We intend to enhance the biodiversity in the area by creating more green space, boosting the presence of insects and wildlife. Getting pupils involved in making bird boxes and maintaining the minibeast hotel provides opportunities to learn about how we care for wildlife.
By inspiring school children within the community to be aware and take care of nature and wildlife on our doorstep, we can promote the importance of looking after our environment. The increased green spaces will benefit the environment and our health by improving air quality, connection to nature and mindfulness. They will also function as a sustainable urban drainage system, which will in turn prove to be beneficial with the current climate change challenges. We believe there is a need for community action against climate change now, more than ever. we need to educate people today for a better planet tomorrow. The aim of the Climate Heroes Project is to help achieve this.
Location: Ardler is part of Strathmartine ward which has high levels of child poverty according to local SIMD data. The area benefitted from significant regeneration and housing programmes at the start of the Millennium. There is a strong community with a progressive culture of volunteering including the local management of the Ardler complex, local faith groups and community organisations. Recent additions including the community fridge and Early Evening Cafe initiative helps mitigate the impact of poverty. Our school St Fergus has strong links with local statutory and voluntary/ community-based organisations.
Proposed on behalf of: St Fergus Parent Council
Supplied quotes are reasonable.
This is wonderful! What an incredible idea to help foster the growth of our youths love for the outdoors and nature!
An amazing project which would have an impact on children’s understanding about climate change and inspire future generations to look after the community and the planet.
Fantastic project!
This is a forward thinking, inclusive and sustainable project for many years to come. The detail is comprehensive, and explains just how important a project such as this, would benefit the whole community. It will engage the children of today to understand the bigger issues, and in doing so, ensure they encourage future generations to care for the planet 🌍
A well thought through project engaging children at a young age and linking the community closer together! More of this please!
Great initiative! All of us need to make an effort to not be wasteful and take care of our planet. Starting at a young age is even better!
This is an amazing idea to help children develop their understanding of the world around them. | https://dee.communitychoices.scot/budgets/7/investments/18 |
In response to surging numbers of students reporting and demonstrating difficulties with anxiety and other mental health concerns over the past several years, many college campuses have added and expanded resources designed to respond and proactively attend to student needs. Is this the domain of Student Life or Student Health departments only? Or are there things faculty members can do to support student resilience as well?We’ve all experienced events and circumstances that have challenged us beyond what we felt we could handle in the moment. What we do in those moments—our efforts to be resilient—include how we think, steps we take to understand the problem, how we call on our resources and develop plans of action, and more. The success of those efforts tend not only to (as the proverb says) “make us stronger,” but also to increase the likelihood that we’ll go on to accomplish goals that are important to us. The same is true for our students.
The degree to which our students are prepared for leaving the nest to come to college varies greatly. For many, the social challenges are every bit as trying as the academic ones. Darlene Mininni is a health psychologist who created a UCLA undergraduate course called LifeSkills; in which, she calls resilience the ability to “navigate skillfully” through difficulties (The Science of Resilience: How to Thrive in Life, 2015). Neuroscientists point out that while other portions of the brain have reached full maturity by early adulthood, the pre-frontal cortex—“ground central” for the range of functions we call executive control, including planning, assessing and making judgments, and weighing logic with emotion—continues to mature well into our 20’s.
If we want to be effective in passing on our knowledge and experience to students, it may be worthwhile to consider approaches other than asking them to “toughen up” or—at the other end of the spectrum—altering what we require to the extent that rigor is compromised. Are there alternatives? We believe so.
How Lack of Resiliency Impacts the Learning Environment
Today’s students often struggle with the transition to young adulthood during their college years and academic life can suffer as a result. Often, their lack of resilience and coping skills manifests itself as academic stress or poor academic performance. We know from the work of Erikson, among other developmental psychologists, that the primary goal of young adults is to love and be loved. As academicians, we cannot ignore this central focus of our students. In order to promote an inclusive learning environment, we must acknowledge the importance of students meeting their social and academic needs.
As the academic landscape is being shaped by less resilient and “needy” students, growing numbers of undergraduate students and faculty are experiencing academic incivility. Academic incivility occurs across a continuum, ranging from microaggressions (i.e., eye rolling, habitual tardiness, misuse of technology, etc.) to less subtle forms of incivility such as challenging faculty or other students, forming cliques, gossip, or name calling to name a few. Exposure to incivility may lead to a decrease in student participation in the classroom resulting in failure, attrition, stress, anxiety, depression, and lack of self-esteem. Academic incivility and other personal concerns or stressors detract from the quality of interpersonal well-being, or at least make it more difficult to build and maintain satisfying, nurturing bonds with others in the academic environment. Current literature on the relationship between resilience and academic incivility is most prolific within nursing education. A recent article on the role of mentoring students who demonstrate “quiet” incivility suggests that institutions of higher education must actively engage and mentor these students to promote their personal development and skills of resilience and self-efficacy (Carr et al., 2016). Finally, it is important to note that resilience is a process not a personality trait (Comier, 2016).
What does this mean for those who teach undergraduates? They may need help connecting present actions with future consequences, and setting reasonable, measurable short-term goals that will help accomplish longer-term ones. They may need us to explain the “why” behind policies and procedures in a way that doesn’t rob them of the autonomy they crave. They need us to be direct and explicit in “connecting dots” between concepts and their relevance beyond the classroom. The “expert blind spot” (a documented phenomenon in learning settings) can make it difficult for us to remember how novices think. Each time you make the implicit (things that seem obvious to us because of our expertise) explicit, you help bridge this gap.
Evidence collected across multiple disciplines suggests that resilience is a skill set that can be learned, rather than some fixed trait. Thus, we can put some confidence in the idea that our efforts to help students learn to navigate college (and life) skillfully will, over time, result in positive outcomes. In the next section, we have provided practical examples and strategies you can use to support development of resilience-related skills while providing “just-right” levels of challenge.
Strategies for Supporting Student Resilience:
In this section, we’ve attempted to include suggestions for integrating evidence-based strategies into existing courses, assignments, & programs, rather than recommending complete “overhaul” or changes in philosophy.
- Set & share reasonable expectations with students—for individual assignments and for overall progress. For example, include an expected response time for email communication.
- Make specific references to the type and magnitude of mental effort needed to achieve learning goals—in order to normalize some degree of struggle. Learning scholars tend to agree that “desirable difficulties”—challenges that stretch us—often result in powerful and enduring learning. Give examples of elements of your course that you expect students may find particularly challenging.
- Build in extra “scaffolds” or supports up front whenever possible. Ideally, scaffolds support emerging skills while engaging learners in meaningful application of important concepts. Scaffolds can also help students meet your expectations for classroom behavior and participate in ways that align with the norms you set out to create.
- Suggest specific “pathways” of action available when they do encounter struggle. Consider inviting representatives from your campus writing and tutoring centers (and other relevant resources) to class. Personalizing these sources of support makes a difference. According to hope theory (Snyder et al., 1991), students quickly give up on goals when workable pathways to their attainment are unclear.
- Check out Carol Dweck’s work on learning mindsets; according to evidence generated from studies in this area, individuals’ thoughts and beliefs are powerful drivers of effort and behavior. Help students practice thinking and operating from a growth mindset by:
- Emphasize learning as process. Make your thinking “visible” in as many ways as possible to illustrate ways of thinking and problem-solving reflected in your learning objectives. When processes are more transparent, what once seemed out of reach starts to feel more attainable. One way to do this: share samples of exemplary student work and explain what makes them great. Don’t leave out details about the process it took to generate the excellent final product!
- Make it “safe” to err. Many students are so afraid of making a mistake that they clam up and refrain from participating in even small group discussions in classes.
- Model responses to setbacks or obstacles. Failure isn’t a “verdict” about me or my ability; instead, it provides feedback/cues about how to improve. Use feedback to indicate where a student is in relation to particular learning goals.
- Allow opportunities for students to revise their work after receiving feedback.
- Normalize asking for help; posting office hours isn’t enough for some students. Are there unnecessary barriers to asking for help? Do we sometimes make this more difficult or intimidating than it has to be? Ask for objective opinions and consider steps that could make this a little easier. Connections with faculty are a significant predictor of student retention and graduation rates.
- Encourage students to take part in experiential learning (study abroad, internships, etc.), where they’ll gain practice in dealing with problems that don’t have instant, easy answers or scripted step-by-step formulas.
- Take opportunities to explicitly reframe stressful and challenging situations with students. According to Kelly McGonigal’s work, stress can be a cue that we’re involved in things that matter to us—allowing the choice to engage fully in spite of some trepidation, and experience the reward of accomplishment when that effort pays off—even when results aren’t perfect—or to opt out completely because we interpret stress as a threat from which we must flee to be safe. Guide students in channeling their energy by intentionally linking the task at hand to goals they value.
- When a student’s functioning is severely limited by anxiety or other negative emotions, this maxim borrowed from a colleague seems to say it all: “When you’re feeling overwhelmed, focus on doing the next right thing.” Sometimes offering your perspective and feedback as their faculty is just what they need to help figure out what the next right thing is.
Faculty Role in Resilience Development & Classroom Culture
As faculty members, it is imperative that we evaluate our role in the development of our students’ resilience and in the classroom culture that we help create. Questions to ask ourselves may include:
- Are we setting norms and standards of behavior that encourage and promote resiliency skills?
- What biases, beliefs, and values are we bringing to the classroom that may unwittingly impact our students?
- Are we open to new ideas and approaches for teaching our students?
- What personal growth and development do we need to consider to better equip ourselves for this new layer of mentoring our students?
Maintaining our own growth mindset, as faculty, and an open dialogue with our students is paramount to anything else we may want to accomplish in our classrooms.
Key Points
Our intent is not to suggest that faculty and staff remove risk, struggle, or challenge from the student experience. We do hope that by creating conversation about the nature of students’ challenges that affect learning & academic performance and the practical value of strategies that help bridge where they are with where we want them to be, we all become more satisfied not only with the outcomes, but also the processes and paths we take to get there. Below, we have developed a “Resiliency Toolkit” of resources that we find helpful in exploring resiliency building and creating a personal development practice.
Building a Resiliency Toolkit
A Resiliency Toolkit is a helpful resource for faculty interested in fostering resilience in the classroom and promoting student empowerment. It is important to note that each faculty member may customize their toolkit with the resources needed for their own personal development and that of their students. This toolkit is intended to teach faculty about resilience and resiliency resources in order to educate students about the significance of building personal resilience. This toolkit has tips, information, activities, and exercises to help develop resilience.
Toolkit Resources- Books
Resilience Why Things Bounce Back, by Andrew Zolli, Ann Marie Healy
Healing the Angry Brain How Understanding the Way Your Brain Works Can Help You Control Anger & Aggression, by Ronald Potter Efron
Rising Strong: How the Ability to Reset Transforms the Way We Live, Love, Parent, and Lead, by Brene Brown
Make It Stick: The Science of Successful Learning, by Peter C Brown
Mindset: The New Psychology of Success, by Carol Dweck
The Happiness Project, by Gretchen Rubin
Stop Saying You’re Fine: The No BS Guide to Getting What You Want, by Mel Robbins
7 Habits of Highly Effective People: Powerful Lessons in Personal Change, by Stephen Covey
Emotional Intelligence, by Daniel Goleman
Grit: The Power of Passion and Perseverance, by Angela Duckworth
Toolkit Resources- Blogs & Websites
http://www.apa.org/helpcenter/resilience.aspx
http://goodthinkinc.com/speaking/shawn-achor/
http://www.lifeingraceblog.com/
Toolkit Resources- Podcasts
Toolkit Resources- TED Talks
How to Make Stress Your Friend; Kelly McGonigal
Grit: The Power of passion and perseverance; Angela Lee Duckworth
The Power of Vulnerability; Brene Brown
Educating for Happiness and Resilience; Ilona Boniwell
How Great Leaders Inspire Action; Simon Sinek
The Happy Secret to Better Work; Shawn Achor
How to Speak so that People Want to Listen; Julian Treasure
The Surprising Science of Happiness; Dan Gilbert
Bios
Dr. Corrie Harris is a Clinical Assistant Professor at The University of Alabama’s College of Education in the Department of Educational Studies in Psychology, Research Methodology, and Counseling. She earned her Doctorate in Educational Psychology from The University of Alabama in 2015. She also holds a B.S. in Human Environmental Sciences from The University of Alabama and a Masters in Counselor Education/Student Affairs in Higher Education Concentration from Mississippi State University. Dr. Harris’ teaching and research interests relate to the design of learning environments and academic interventions to support the success of all students.
Abby Grammer Horton is a full-time instructor at The University of Alabama’s Capstone College of Nursing (CCN) Program. She earned her Bachelors of Science in Political Science in 2006 from The University of Alabama. She later graduated from CCN with her BSN in 2010 and then a MSN in Rural Case Management in 2011. She is currently enrolled in the Nurse Educator Doctoral Program in the College of Education at The University of Alabama. Mrs. Horton teaches in the Undergraduate BSN Program, specifically in the Professional Nursing Practice: Mental Health Course and her research interests include student to student incivility, stress and coping, and student resilience. | https://nobaproject.com/blog/2017-11-02-empowering-students-to-bounce-back-after-challenges |
There is no doubt that the Covid crisis has forced governments to contemplate and implement policies that they would not consider in normal times.
The consensus in the economics profession on the need to hugely stimulate global economies also shows how this crisis is challenging conventional approaches to how we operate our societies and economies.
One of the features of almost all governments’ response to the economic crash associated with Covid is increasing payments to workers and subsidising their wages.
In Ireland, the Pandemic Unemployment Payment (PUP) was initially set at a higher rate than jobseekers’ benefit.
The payment has persisted, albeit at a lower rate.
The recent controversy about the loss of the payment for those who have travelled, and so are not available for work, has shown that there is a need for a new mindset in how the state bureaucracy views supports for people in vulnerable situations.
The Covid crisis highlights the need for a new approach to our entire system of social protection and there is an appetite for new economic thinking.
The speed with which the Irish government, and governments throughout the world, moved so quickly to maintain incomes as the crisis emerged has reignited policy discussions on universal basic income.
A universal basic income is an unconditional payment made to every individual that is sufficient to meet basic needs.
It is paid at a set rate to all residents and cannot be withdrawn.
There has been growing support for a basic income throughout Europe, and also in Ireland.
In their election manifestos, two of our new parties of government set out clear policies on the introduction of a basic income.
While Fianna Fáil committed to setting up a Basic Income Commission to examine the feasibility of introducing a basic income in Ireland, the Green Party was more definitive.
It proposed to introduce a system of Universal Basic Income for all Irish residents by 2024.
The programme for government was more equivocal.
In it the Government requires “the Low Pay Commission to examine universal basic income, informed by a review of previous international pilots, and resulting in a universal basic income pilot in the lifetime of the government”.
It is interesting to note that universal basic income is one of the few economic policies that requires comprehensive pilot schemes.
Informed policy making is welcome, but we rarely hear of pilot schemes for tax breaks or cuts to the provision of social services.
In any event, there have been several basic income pilot schemes which can inform an Irish approach.
A recent report from four Scottish local councils and NHS Scotland, which comprehensively reviews international evidence, makes a very convincing case for a large pilot scheme. It is supported by the Scottish First Minister, Nicola Sturgeon.
The Scottish pilot study set out in this report would provide very useful evidence for an Irish basic income system.
It can benefit from avoiding the weakness of previous pilots and partial basic income trials in the US, Finland, and Canada.
The most common objection against a universal basic income is that it would undermine the incentive to work.
This argument questions why someone would work when they are guaranteed an income each month from the state.
This attitude to social transfers is why existing unemployment payments, and more recently the pandemic unemployment payment, have included requirements that recipients are available for and actively seeking work.
A significant effort is made by the state to help unemployed people seek work through training and/or other labour market activation efforts.
Similarly, a significant effort is made to monitor those social protection payments to prevent fraud.
There would be no such requirement attached to a basic income.
Would this mean many people would decide to sit at home and opt out of the labour market? Well, the evidence says not.
The evidence from the limited number of pilot tests indicates there is limited or no impact of basic income schemes on participation in paid work.
There are some groups who show a reduction in work participation, which primarily means a move from full-time to part-time work or a return to education.
Instead of being a problem with basic income, the effects it has on work participation perhaps show up one of its most important features.
Indeed, some people may decide to leave their current jobs if they could rely on receiving a basic income from the state.
Those who are trying to juggle work and a caring role would find their lives less of a struggle.
Carers in the home would receive the basic income. Whether this care is for one’s children or an elderly relative, or a person with a disability, we have for a long time put very little value on this important role.
There are many people who struggle with these caring roles while also working, probably part-time, to generate an income.
Society, and the person receiving care, benefit from people taking on these caring roles.
It is right that we would allow carers to work with dignity and not worry about the impact on their incomes.
Since the basic income is paid to every resident, not every household, it is also an important resource for those who may find themselves financially reliant on a coercive or abusive partner, and feel unable for financial reasons to leave that situation.
There are other activities from which we benefit as a society that are also under-provided because of the inability of people to rely on a guaranteed basic income.
Most artists must supplement their income from their artistic work, and with greater time and security could dedicate themselves to more creative pursuits, which would benefit all of us.
How many more successful authors, painters, or rock stars could we produce if we freed up young artists to focus on their work?
A basic income would also be a substantial stimulus for entrepreneurship.
Someone setting up a new business, whether it is a coffee shop or a new gaming company, risks a lot to make their business survive or thrive.
At the same time, this entrepreneur will have rent and bills to pay which may mean the business and the jobs it could have created never materialise.
Currently, entrepreneurs do not receive any direct income supports from the state.
Of course, there are start-up grants and business supports, but an entrepreneur cannot use these to fund day-to-day expenses.
The substantial drop in income is a substantial disincentive to trying, and often failing, and trying again.
There is also evidence that a basic income makes it easier for people to remain in or to return to education, boosting skills levels in our society.
For example, it could have a transformative effect on the uptake of doctoral studies in Ireland, removing the barrier of finding funding.
We often use our graduate numbers to attract foreign investment.
There are savings in our current system from a basic income scheme.
Every year close to €800m is spent on administration in the Department of Social Protection, including pay.
Just under a quarter of a billion euro is spent on non-pay administration.
This is due to the complexity of the range of social protection payments; from jobseekers allowance, pensions, child benefit, carers allowance, to wage subsidy schemes.
Each allowance has a strict set of guidelines to determine eligibility. Each payment can be withdrawn or reduced at the stroke of a minister’s pen.
A universal basic income reduces the need to monitor the payment, since it is unconditional and paid irrespective of a person’s employment status.
This means there is no need to check if the person receiving the payment is really looking for work, is really caring for an ill relative, or has made sufficient PRSI contributions to earn a contributory pension.
The unfair treatment of women who have lost their entitlement to a full pension because they left the workforce to care for children would not be an issue under a basic income scheme.
It has been argued that the universal aspect of a basic income scheme would be unfair.
Why should the very highly paid receive the same basic income as poorer people.
However, basic income is taxable, just like all state transfers, reducing substantially the net amount received by higher paid workers.
It’s time for Ireland to embrace a universal basic income, to enhance the health, prosperity, equability, and happiness of all of our citizens. | https://basicincometoday.com/ubi-pilots-are-great-but-we-rarely-see-any-pilots-for-tax-cuts-and-the-covid-crisis-has-shown-the-immediate-need-for-ubi/ |
View common definitions of terms found in this announcement.
Responsibilities
When disaster strikes, America looks to the Federal Emergency Management Agency (FEMA). Now FEMA looks to you. Join our team and use your talent to support Americans in their times of greatest need. FEMA prepares the nation for all hazards and manages Federal response and recovery efforts following any national incident. We foster innovation, reward performance and creativity, and provide challenges on a routine basis with a well-skilled, knowledgeable, high performance workforce. Please visit www.fema.gov for additional information.
EMERGENCY ASSIGNMENT: Every FEMA employee has regular and recurring emergency management responsibilities, though not every position requires routine deployment to disaster sites. All positions are subject to recall around the clock for emergency management operations, which may require irregular work hours, work at locations other than the official duty station, and may include duties other than those specified in the employee's official position description. Travel requirements in support of emergency operations may be extensive in nature (weeks to months), with little advance notice, and may require employees to relocate to emergency sites with physically austere and operationally challenging conditions.
In this position, you will serve an Appeal Analyst at a Consolidated Resource Center in Winchester, VA. Typical duties include:
- Researching applicable statutes, regulations, policies, and previous relevant appeals decisions related to the subject matter of an eligibility determination.
- Interpreting and adhering to statues, regulations, and policies in a predictable and consistent way.
- Developing determination memos and other written products for review and signature.
- Explaining findings verbally and in writing to a wide range of stakeholders, to include management.
- Coordinating with partners to build understanding related to decision making.
Promotion Potential: Positions filled under Stafford Act regulations generally do not have documented promotion potential; however, dependent on an employee’s ability to perform higher level duties, the continuing need for an employee to perform work associated with a higher level position, and administrative recommendation and approval, promotions may be earned by CORE employees.
Travel Required
Occasional travel - Occasional non-emergency travel may be required.
Supervisory status
No
Promotion Potential
12
-
Job family (Series)
-
-
-
-
-
This job originated on www.usajobs.gov. For the full announcement and to apply, visit www.usajobs.gov/GetJob/ViewDetails/556438800. Only resumes submitted according to the instructions on the job announcement listed at www.usajobs.gov will be considered. | https://www.usajobs.gov/GetJob/ViewDetails/556438800 |
A statistical measure of diversity, e.g. of the quantity of species and the evenness of their distribution within a community.
- 1943
-
It is suggested that the parameter α should be know as the 'index of diversity' of the population.Fisher, R.A., Corbet, A.S. & Williams, C.B. (1943). The relation between the number of species and the number of individuals in a random sample of an animal population. J. Anim. Ecol. 12, 42-58: 49.
- 1950
-
we cannot conclude from the figures for S and I alone that the biological associations observed at the two traps differed in diversity index α.Anscombe, F.J. (1950). Sampling theory of the negative binomial and logarithmic series distributions. Biometrika 37, 358-382: 379.
- 1982
-
diversity index A measure of the number of species in a community and their relative abundances; such measures include the ratio between number of species and number of individuals, the Shannon-Wiener index, richness index, Brillouin index and Simpson index.
Lincoln, R.J., Boxshall, G.A. & Clark, P.F. (1982). A Dictionary of Ecology, Evolution and Systematics: 71. | http://www.biological-concepts.com/views/search.php?term=308&listed=y |
In this study, the microbial community in a mangrove ecosystem was surveyed and used to test the eligibility of 16S rDNA library and neighbor-joining method for the purpose of estimating microbial composition. Genetic diversity (π) and four other diversity indices (Simpson's unbiased, Shannon-Wiener, Evenness, and Chao1 indices) were applied to estimate the adaptive lineages of microorganisms in the mangrove ecosystem. The results indicated that γ-Proteobacteria is the most diverse taxon, while the most abundant family is Rhodobacteraceae (α-Proteobacteria), followed by Comamonadaceae (β-Proteobacteria). This result may imply the existence of a graded distribution of microbial diversity across a spectrum of different salinities in the waterbody of this estuary ecosystem. Furthermore, at least 500-1,000 bps of the posterior portion of 16S rDNA is required as a marker to profile the microbial diversity in a microcosm of interest using phylogenetic methods, according to the results of our sliding window analyses for the measurements of π, consistency index, and retention index. | https://scholar.lib.ntnu.edu.tw/zh/publications/microbial-community-composition-of-the-danshui-river-estuary-of-n-2 |
Technically, the solution will use ECF to handle all communication details. I will try to employ current Mylar’s context sharing functionality. This solution will provide SWT-based user-interface for context sharing and I will also include the rainy scenarios handling, such as “no connection with friend” or “file resources are out of sync”.
Technically, the solution will use ECF to handle all communication details. I will try to employ current Mylar’s context sharing functionality. This solution will provide SWT-based user-interface for context sharing and I will also include the rainy scenarios handling, such as “no connection with friend” or “file resources are out of sync”.
Latest revision as of 14:42, 4 December 2007
Project lead:
Jevgeni Holodkov
Mentor:
Mik Kersten
About
This is about Mylar synchronous context sharing among team members by means of Mylar and ECF integration. The goal of such context sharing is to provide more seamless knowledge sharing process, allow sharing context synchronous even if the used connector does not support context sharing or no connectors used at all.
The synchronous context sharing means that it is possible to share context on fly with a friend who is currently online and you are discussing some issue. It will be possible to create a task for new context or assign this context to an existing one.
Technically, the solution will use ECF to handle all communication details. I will try to employ current Mylar’s context sharing functionality. This solution will provide SWT-based user-interface for context sharing and I will also include the rainy scenarios handling, such as “no connection with friend” or “file resources are out of sync”.
Done
The View will consist from multiple pages:
First page will provide a selection what to export (currently either context or whole mylyn data). Context page will contain a tree with tasks (similar to one, that is used within ActivityReportAction), path where the context file should be placed/should be uploaded from and "overwrite existing files without warning" option.
| |
The invention discloses a surface treatment method for an aluminum alloy cooker. The surface treatment method comprises the following steps: cleaning and deoiling the surface of the aluminum alloy cooker; enabling the aluminum alloy cooker to be in contact reaction with a treatment solution, and covering a layer of film containing the treatment solution on the surface of the cooker; removing the redundant treatment solution on the surface of the aluminum alloy cooker; the aluminum alloy cooker is dried; wherein the treatment solution is prepared from, by mass, 0.5-5 parts of polyvinyl alcohol, 0.1-0.5 part of octanol, 2-25 parts of modified potassium silicate and 80-90 parts of water, the steps of the surface treatment method for the aluminum alloy cooking utensil are simple and efficient, only the aluminum alloy cooking utensil subjected to oil removal needs to react with the treatment solution, the machining procedures are reduced, resource consumption is low, and the cost is low. And the cost is low. | |
1a)Your task is to choose a publicly traded corporation, By publicly traded it means that it must be listed on an exchange such as the New York Stock Exchange or NASDAQ. This is important because you will need the financial statements and notes for your company. This would be difficult to find for a private company which is not obligated to provide this information. If you are unsure if your company is publicly traded check on their website. In the “investor relations” section they will detail this information. Then find their latest annual report .
Now that you have their financial information I would like you to perform a ratio analysis on the financial statements. Focus on the financial statement analysis chapter (PDF) you are reading this week. You will want to compute ratios for your company for the last two years. Do not compute each ratio you learned about for your company. There may be some that are not relevant. Rather focus on those eight ratios that you feel are the most important and relevant to analyze how your company is doing. Make sure to justify the ratios that you choose for your analysis. Compare how your company has done to the industry averages. Do you notice any trends that are positive or negative? Does anything look good or bad that is notable? Do you have any suggestions on things they could be doing to improve these ratios? Please analyze what you found for each of the eight ratios. Then organize your findings into a 15-minute presentation
Be sure to include some background on your company in your presentation. Please use PowerPoint for your presentation.
1b)Please locate the latest annual report for a publicly traded corporation of your choice. Attach a link or copy of the annual report to your post. In your post describe what is found in an annual report. For example, what are the different sections that can be found in them from what you see? Lastly, be sure to locate the income statement, balance sheet, and cash flow statement. List in your post which pages you found these on.
1C)we are learning about financial statement analysis and how to compute various ratios. This is a great way to understand how a company is doing. However, what are some limitations of financial statements analysis? Meaning, what are some things which make financial statement analysis less reliable? Do some research on this and post your thoughts on what you find. Be sure to cite your sources. In 500 words with APA format referencing.
2) Using the Internet, locate TWO companies that provide VPN services. Compare the TWO different services offered. Include their services, pricing, and make a decision which VPN service would be best for your own personal use should you decide to make the purchase in the future. In 500 words with APA format referencing.
Comments are closed. | https://affordabletermpapers.com/1ayour-task-is-to-choose-a-publicly-traded-corporation-by-publicly-traded-it-means-that-it-must-be-listed-on-an-exchange-such-as-the-new-york-stock-exchange-or-nasdaq-this-is-important-because-you/ |
Search results: Found 95
Highway traffic safety is an important area in transportation engineering. Highway intersections are nodes of road networks and accident-prone locations. They are the places where vehicles coming from different approaches and moving towards different directions interact and conflict with each other. Due to the conflicts from all users, more traffic crashes could happen at unsignalized intersection as compared with roadway segments. Popular methods which are based upon traffic accidents and traffic conflicts are proved to be effective in certain circumstances, but difficulty in data collection of traffic crashes and subjective judgment and determination of traffic conflict constrain their applications. This paper introduces an approach to evaluate and improve unsignalized intersection safety performance. This method is fully based on the existing conditions of unsignalized intersection, including geometric design, sight distance, pavement surface conditions, traffic control devices, and lighting, etc. Different from the crash-based and conflict-based methods, this approach is a non-crash and non-conflict based analysis method. This approach needs to go through a field survey to unsignalized intersection to be evaluated. In this approach, a safety index is introduced to give a diagnostic summary of the safety performance degree of unsignalized intersections. Corresponding countermeasures are ranked and recommended based on the cost benefit analysis. In this paper, the approach (called diagnostic approach) is practically applied to evaluate and improve the safety performance of some unsignalized intersections in Fallujah city of Iraq.
السلامة المرورية للطريق تكون المجال المهم في هندسة النقل.تقاطعات الطريق تكون بمثابة العقد في شبكة الطريق وتكون هي الأماكن المعرضة للحوادث.التقاطعات تكون هي المواقع حيث المركبات القادمة من مختلف المداخل والمتحركة نحو مختلف الاتجاهات المتداخلة والمتعارضة مع بعضها البعض.بسبب الحركات المرورية المتعارضة من قبل كل المستخدمين فأن كثير من حوادث الاصطدام سوف تحدث في التقاطعات بدون الإشارة الضوئية بالمقارنة مع مقاطع الطريق الأخرى.الطرق العامة التي تعتمد على بيانات الحوادث المرورية والحركات المرورية المتعارضة قد أثبتت بأنها تكون فعالة في ظروف معينة لكن الصعوبة تكون في جمع البيانات لحوادث الاصطدام المرورية والقرار الشخصي وأيضا في تحديد الحركات المرورية المتعارضة كل هذا يقيد تطبيق هذه الطرق.هذا البحث يقدم طريقة لتقييم وتحسين أداء السلامة المرورية في التقاطعات بدون الإشارة الضوئية. هذه الطريقة تكون بالكامل معتمدة على الظروف الموجودة في التقاطعات بدون الإشارة الضوئية والتي تتضمن التصميم الهندسي,طبيعة سطح التبليط,وسائل السيطرة المرورية,والإنارة,... الخ.الاختلاف عن الطرق التي تعتمد على بيانات حوادث الاصطدام والحركات المتعارضة فان هذه الطريقة لاتعتمد على تحليل بيانات الحوادث المرورية والحركات المتعارضة.في هذه الطريقة يكون دليل السلامة قد ادخل لكي يعطي ملخص تشخيصي لدرجة أداء السلامة المرورية في التقاطعات بدون الإشارة الضوئية.التحسينات المطبقة على التقاطعات تكون مصنفة وكذلك التوصية تكون معتمدة على تحليل منفعة الكلفة. في هذا البحث تكون الطريقة ( تدعى الطريقة التشخيصية ) مطبقة عمليا لتقييم وتحسين أداء السلامة المرورية لبعض التقاطعات بدون الإشارة الضوئية في مدينة الفلوجة في العراق .
Highway Safety --- Unsignalized Intersection --- Safety Evaluation --- Safety Improvements
Abstract
Food safety consider one of the basic items that make the mind of economic & politician thinker busy. As an important base for the national safety because its connected with people,s life and health , so there is a responsibility on the government in making food easy to reach to all people weather by local agriculture product or by export.
Through the research we find a food gap this gap is taking wider since long decays and in order to close this gap we must depend on export from world market and this naturally will cost the country balance more financial, economical, political suboodination.
So in order to increase the production of strategic agriculture crops have advanced technology that we can make it suitable with the local environment circumstances.
We notice through the research the role of the scientific research centers committee in create a new types of a new types of agriculture corps that representing numbers of agriculture corps that is recorded or depending from the local commission of records & depending agriculture corps in the country which becomes more than (59) types , and most these types have high production which increase the local agriculture production , in addition to the fertilizers and its impact on production increasing and rationalization water consumption by using imigation systems and its impact in Donam production in agriculture land.
يعد الأمن الغذائي من الأساسيات التي تشغل بال المفكر الاقتصادي والسياسي على حد سواء، باعتباره الركيزة المهمة للأمن القومي لارتباطه بحياة الناس وصحتهم، فعلى الحكومات تقع مسؤولية توفير الغذاء سواء عن طريق الإنتاج الزراعي المحلي أو الاستيراد. والعراق واحد من البلدان الذي عانى من اتساع الفجوة الغذائية لاهم المجموعات السلعية الغذائية، ومنها الحبوب، وبهدف سد هذه الفجوة تم الاعتماد على الاستيراد من الأسواق العالمية وهذا بطبيعة الحال، كلف ميزانية البلد مزيدا من التبعية المالية والاقتصادية.
وبهدف زيادة الإنتاجية الزراعية لمحاصيل الحبوب الإستراتيجية، لا بد من تبني تكنولوجيا متقدمة يمكن أقلمتها مع ظروف البيئة المحلية، مثالها دور الهيئات والمراكز البحثية في مجال بحوث محاصيل الحبوب المتمثلة باعتماد عدد من الاصناف الزراعية، وتطوير وتصنيع مستلزمات الانتاج الزراعي كالاسمدة والمبيدات والمكننة الزراعية.
وقد لوحظ من خلال البحث دور هيئات ومراكز البحث العلمي في استنباط أصناف جديدة للمحاصيل الزراعية والمتمثلة في عدد من الأصناف لمحاصيل تم تسجيلها أو اعتمادها من قبل اللجنة الوطنية لتسجيل واعتماد الأصناف الزراعية في العراق والتي تجاوزت (59) صتف (سهام واخرون،2003،ص16)، علما إن غالبية هذه الأصناف ذات إنتاجية عالية مما يزيد الإنتاج الزراعي المحلي، إضافة الى الأسمدة، وتأثيرها في زيادة الإنتاج وكذلك ترشيد استهلاك المياه باستخدام منظومات الري بالرش وتأثيرها في زيادة إنتاجية الدونم من الأرض الزراعية. />
In most countries, construction work is considered to be one of the most hazardous
industrial activities. It can easily be seen that there is a consistently higher rate of fatal
injury for the construction sector when compared with the country's average fatal injury
rate, the occupational health and safety management system (OHSMS) can contribute to
improvements in the industry’s performance. When accidents happen, the costs are high in
people, profits and productivity. One of the best ways to avoid injuries and minimize costs is
through good planning and coordination both before and on the job.
The objective of this research is to review the concept, definition, and benefits of safety
management system with evaluating the effectiveness of occupational health and safety
management system for construction companies in Iraq through field survey and
developing checklist to investigate, record, and analyze the facts of the existing safety
management system of Al-Rasheed state contracting construction company. The research
conclusions show that Al-Rasheed state contracting construction company isn’t aware of
safety importance, top management considers safety as luxury, has no interest of safety
activities, doesn’t consider safety as an aspect for pre-qualification of contractors, lack of
legislation that obliged companies to follow safety system, and practicing poor safety
actions. Several proper solutions were recommended to improve the existing safety
management system such as developing safety policy, the role of leadership and
commitment to safety, documentation of safety program, and proper legislation to activate
the role of National Center of Health and Occupational Safety (NCHOS)
تعتبر الصناعة الإنشائية في معظم دول العالم من اخطر الصناعات. يمكن بسهولة ملاحظة ارتفاع نسبة الحوادث والحوادث المميتة تحديدا في قطاع التشييد إذا ما قورن بباقي القطاعات لنفس البلد, نظام إدارة الصحة والسلامة المهنية يمكن أن يساهم في تحسين اداء هذه الصناعة. وقوع الحوادث يؤدي إلى زيادة الكلف نتيجة انخفاض الأرباح والإنتاجية. إحدى الطرق المثلى لتجنب الحوادث وتقليل الكلف التخطيط والتنسيق قبل وأثناء تنفيذ العمل. هدف البحث عرض مفهوم وتعريف وفوائد نظام إدارة السلامة مع تقيم فاعلية نظام إدارة الصحة والسلامة المهنية للشركات الإنشائية العراقية من خلال المسح الميداني و تطوير استمارة فحص لتحري وتسجيل ومن ثم تحليل الحقائق المتعلقة بنظام إدارة الصحة والسلامة المهنية لشركة الرشيد للمقاولات الإنشائية. بينت نتائج البحث عدم إدراك شركة الرشيد للمقاولات الإنشائية أهمية السلامة وفعالياتها كون الإدارة العليا تعتبر السلامة رفاهية وعدم اعتبارها جزء من تقيم المقاولين مع غياب التشريعات التي تلزم الشركات الإنشائية بإتباع نظام السلامة. مجموعة من التوصيات المناسبة اقترحت لتحسين نظام إدارة السلامة الحالي من خلال وضع سياسة للجودة والتزام ودعم القيادة للسلامة وتوثيق برنامج السلامة مع تشريع القوانين المناسبة لتفعيل دور المركز الوطني للصحة والسلامة المهنية.
After studying the reality of application to occupational safety in new Iraqi building projects and sampling the situation wilt that in developed and neighboring countries, researcher found that there is a big gap in the level of safety application conditions, this indicates the need fora quick and clear reference for local engineers to use it on site for safety conditions in their projects . As a case study the monitors work the researcher studied a huge project in the United Arab Emirates.This project considered for safety requirements to highest grades. This case study may be far away from the projects in Iraq, but we hope to rise the Iraqi work level in the near future. After seeing the way of administration work and how they were rated the severity of each phase of the work, an idea was builtabout the most dangerous situations in projects with multiple floorsbuildings. To find multiple solutions to the risk, researchers identified 46 cases with their ratings, type of perceived risk in each case, and displayed a format survey to the most important specialized institutions and companies operating in Iraq and the United Arab Emirates. Finally theresearcher takes the results,and format a software that any user can use in his personal computer to studythe expected risk,how to avoid it and how to deal with it if it happens.
بعد دراسة واقع حال مستوى تطبيق السلامة المهنية في مشاريع بناء العراق الجديد ومقارنة ذلك الحال بما هو عليه في البلدان المتطورة والبلدان المجاورة وجدالباحث ان هنالك فجوة كبيرة في مستوى تطبيق شروط السلامة ومن ذلك تكونت الفكرة في ايجاد مرجع سريع وواضح يستطيع المهندسون المحليون الاستعانة به موقعيآ لتطبيق شروط السلامة في مشاريعهم , لذلك قام الباحث بدراسة حالة لمشروع ضخم في دولة الامارات العربية المتحدة تم فيه تطبيق شروط السلامة بأعلى الدرجات ونحن نعلم ان الحالة الدراسية قد تكون بعيدة نوعآ ما عن نوع المشاريع المطبقة في العراق ولكننا نأمل ان يرتقي مستوى العمل في العراق الى ذلك الحجم في المستقبل القريب . وبالفعل بعد الاطلاع على طريقة ادارة العمل وكيف تم تصنيف درجة خطورة كل مرحلة من مراحل العمل اصبح لدى الباحث تصور عن اهم الحالات الخطرة في مشاريع البنايات متعددت الطوابق ولكي يكون لدينا حلول متعددة للمخاطر قام الباحث بتحديد 46 حالة مع تصنيفاتها ونوع المخاطر المتوقعة لكل حالة وعرضها بصيغة استبيان شمل اهم المؤسسات المتخصصة والشركات العاملة في العراق ودولة الامارات وخرج الباحث بنتائج تم تبويبها بصيغة برنامج حاسوبي يستطيع اي مستخدم ان يستعمله في حاسوبه الشخصي موقعيآ وبمجرد الضغط على مربع اي حالة نستطيع معرفة الخطر المتوقع وكيفية تجنبه وطريقة التعامل معه ان حدث. مع عمل جزء نظري لشرح طريقة التعامل مع البرنامج الحاسوبي.
This paper reports on diagnostic parameters for pedestrian traffic safety problems using the Traffic Conflict Analysis Technique (TCT), particularly for pedestrian crossings at urban unsignalized intersections. The method of study is based on the U.S. FHWA-Federal Highway Administration guides for vehicular and pedestrianconflicts, applied using data collected from pedestrian crossings of several types observed in 4 critical unsignalized intersections in Baghdad city all of them located on the CBD area and experiencing high vehicular and high pedestrians volumes. Regression analyses is performed to relate hourly pedestrian conflict to (hourly trafficconflict, hourly pedestrian volume, average pedestrian walking speed) as well as hourly pedestrian conflict/ approach to (average spot speed, average pedestrian delay and approach width). HCM 2000 manual are adopt to determine the average pedestrian delay. Specific categories of countermeasures in geometric characteristics are suggested to improve pedestrian safety. A developed model shows that, an extra increase of hourly pedestrian conflict can be represented by positive exponential model trend in relation with hourly pedestrian volume, hourly traffic volume, average spot speed and average pedestrian delay withcoefficient of correlation range between 0.824–0.949, as well as a developed model shows that, an extra decrease of pedestrian conflict can be represented by negative exponential model trend in relation with average pedestrian walking speed with coefficient of correlation 0.921, on the other hand, it is found that, an increase of pedestrian conflict can be represented by positive linear model trend in relation withapproach width with coefficient of correlation 0.837.In addition it is found that the higher coefficient of correlation 0.943 well get it when pedestrian conflict related with the hourly pedestrian volume and average pedestrian delay convened from all studied parameters (average spot speed, approach width, hourly traffic volume, average walking speed, average pedestrian delay and exit stop line).
Pedestrian --- Safety --- Conflict --- Pedestrian Delay --- Improvement pedestrian safety
Improving road traffic safety has high effect to reduce the cost of traffic accidentand save the user of highway. Since 1985 the average stopped delay has been used asthe measure of service in signalized intersections analyses , on the other hand it isdifficult to evaluate the traffic safety in terms of change in number of traffic accident,because the traffic accidents accord has no reliable accident recorded ,while it not onlyreflect the number of accidents well, but also their nature ; traffic conflict technique isan efficient tool for analyses traffic safety. This study is aimed to developed traffic safety at 4 four- leg signalized intersectionsin Baghdad City. Regression analyses is performed to relate hourly traffic conflict andaverage stopped delay .Specific categories of countermeasures such as signalizationand geometric countermeasures are adopted. HCS 2000 software are adopt to determinethe average stopped delay before and after countermeasure implemented. The results show that the negative exponential model related hourly traffic conflictto average stopped delay and show a better explanation rather than linear model ,aswell as it is found that exponential model explains increasing variation (81.6 ) of totalhourly traffic conflict in relation with average stopped delay . The highest reduction innumber of traffic conflict after signalization countermeasures is 74.63% more than thehighest reduction after geometric countermeasures when it reduce by 58.07% . Thisstudy recommends to use traffic conflict technique as a tool to improve traffic safety byany proposed countermeasures.
Safety --- Traffic --- Conflict --- Delay --- Countermeasure
Background:Although the concept of probiotics was known since the era of Elie Metchnikoff for more than one century ago, the attention of probiotic therapy as effective approach to prevent and treat a wide range of diseases and disordersis increased in the recent years. Probiotic therapy is the treatment of diseases by use live micro-organisms known as probiotics and the aim of this therapy is to increase the numbers of microbiota and enhance their activities until such time that microbiota can be rebalanced. In this review; the definition and properties of probiotics, their types and mechanisms of action, as well as their health beneficial effects and safety have been reported.Key words: Probiotics, Bacteriotherapy, Safety, LAB, GRAS
Probiotics --- Bacteriotherapy --- Safety --- LAB --- GRAS
Abstract Laparoscopic cholecystectomy has become the preferred choice of management for gallstone disease. In spite of various theories explored trying to assess different aspects of management and outcome to reach the acceptable safest technique in laparoscopic operation and to compare it with its counterpart. Many surgical methods were attempted to clarify their value in counteracting a serious complication of laparoscopic cholecystectomy, mainly is the bile duct injury. This study aimed to evaluate the significance of critical view of safety as a technique of laparoscopic cholecystectomy concerning the issue of preventing bile duct injury in regard to the infundibular technique of dissection. This is an observational study of two hundred fifty patients who were scheduled for laparoscopic cholecystectomy using critical view of safety technique compared with probably matched previously performed two hundred fifty of laparoscopic cholecystectomy using infundibular technique. The incidence of bile duct injury was analyzed in both groups. The results shows that age, sex, body mass index and gall bladder status were comparable in both groups. The Incidence of bile duct injury in infundibular technique was (1.6%), while in critical view of safety technique the incidence was 0% which is statistically significant (P<0.05). In conclusion, critical view of safety technique in laparoscopic cholecystectomy has a significant effect in preventing bile duct injury as compared to infundibular technique with comparable time of surgery and it is best to be the preferred technique in laparoscopic cholecystectomy.
Road Safety Audit (RSA) is a proactive strategy that aims at treating the cause of traffic-accidents through a formalized examination of existing or future road projects in view of traffic safety principles. Expert system is a promising technique that can turn complex interpretation of auditing examination into simplified and friendly used procedures using power and storage capabilities of computers.This research aims at developing an expert system that can serve as a diagnosis knowledge-based system of traffic-safety condition at rural roads due to the principles of RSA. The expert system deals with the database of safety auditing examination according to checklists extracted from the program of RSA for rural roads in Iraq. The input data is coded in the environment of Microsoft Visual Basic 6, which is tightly integrated with Windows-Me operating system. The developed expert system nominated as Rural Road Safety Audit Expert System (RRSAES) enables auditors to optimize their outputs and maximize the safety benefits of RSA. After interactions with user (auditor) in the auditing course, the system displays the road safety audit indices that indicate the safety condition of road design elements at the audited site.
تدقيق سلامة الطرق هو استراتيجية وقائية تهدف إلى معالجة السبب في الحوادث المرورية من خلال فحص مدوّن مسبقا يستند إلى مبادئ السلامة المرورية لمشاريع الطرق المنفذة أو تلك التي ستنفذ مستقبلا. النظام الخبير هو تقنية واعدة لتحويل التفسير المعقد للتدقيق إلى عمليات بسيطة وسهلة الاستعمال من خلال الطاقة الاستيعابية للحاسوب. يهدف البحث إلى استحداث نظام خبير يكون بمثابة نظام قاعدة معلومات تشخيصي لحالة السلامة المرورية على الطرق الخارجية استنادا إلى قواعد تدقيق سلامة الطرق. يتعامل النظام المستحدث مع قاعدة معلومات لفحص وتدقيق السلامة طبقا إلى قوائم مستلة من برنامج تدقيق سلامة الطرق الخارجية في العراق. تم تبويب البيانات المدخلة في بيئة مايكروسوفت القواعد المرئية(Microsoft Visual Basic-6) ضمن برنامج النوافذ Windows-Me)) . البرنامج المستحدث والمسمّى بالنظام الخبير لتدقيق سلامة الطرق الخارجية يمكّن المدققين من ترشيد نتاجات التدقيق ويعظّم فوائد السلامة الناتج عن تدقيق سلامة الطرق. بعد التفاعل الذي يحصل بين المستخدم (المدقق) والنظام خلال عملية التدقيق, يعرض البرنامج مؤشرات تدقيق السلامة لعناصر تصميم الطرق على موقع المدقق
Rural Road --- Road Safety Audit --- Expert System
AbstractThis research aims to clarify the impact of knowledge management on the occupational health and safety of workers in order to prevent the risk of the work environment.The research sample consists of a group of employees in the Department of Occupational Health and Safety in the General Company of Medicines and Medical Supplies in the province of Nineveh.Research data were analyzed by the statistical software package for the Social Sciences "SPSS" to get accurate results. We also used the Spearman correlation coefficient to determine the relationship between these variables, and simple linear regression coefficient to measure the impact.We reached a set of findings, conclusions and recommendations, which focused on the knowledge management processes to help industrial companies in general and the General Company for the manufacture of medicines and medical supplies in Nineveh to secure a healthy and safe environment and a culture of occupational health and safety and to reduce work injuries and occupational diseases.
الملخصيهدف البحث إلى توضح تأثير عمليات إدارة المعرفة في الصحة والسلامة المهنية للعاملين من أجل الوقاية من مخاطر بيئة العمل.وتتكون عينة البحث من مجموعة من العاملين في قسم الصحة والسلامة المهنية في الشركة العامة لصناعة الأدوية والمستلزمات الطبية في الموصل. وقد جرى تحليل بيانات البحث باستخدام رزمة البرامج الإحصائية للعلوم الاجتماعية SPSS للحصول على نتائج دقيقة، واستخدم معامل ارتباط سبيرمان لتحديد العلاقة بين تلك المتغيرات، ومعامل الانحدار الخطي البسيط لقياس الأثر.وقد تم التوصل إلى مجموعة من النتائج والاستنتاجات والتوصيات التي ركزت على أن عمليات إدارة المعرفة تساعد الشركات الصناعية بصورة عامة والشركة العامة لصناعة الأدوية والمستلزمات الطبية في الموصل بصورة خاصة على تأمين البيئة الصحية الآمنة ونشر ثقافة الصحة والسلامة المهنية والتقليل من إصابات العمل والأمراض المهنية. | https://www.iasj.net/iasj?func=search&query=kw:%22safety.%22 |
We start by developing a solid understanding of where you are and want to go. When we first meet our objective is to review your particular situation, your overall goals and gather all the relevant information specific to your situation.
Identifying your larger scale goals and the objectives through an in-depth discussion of you financial situation, time frame, risk tolerance and expectations is the best approach for aligning our planning skills with your reality today.
STEP 2
Next we'll work with you to clarify and help you to set specific goals. The process helps us develop clarity about your goals and objectives.
Establishing Your Investment Profile From your needs analysis, an initial suggested asset mix is selected based upon your unique goals, objectives & profile.
STEP 3
We then complete our initial analysis. We create and deliver a detailed analysis of your situation. Recommendations are specific to the plan of action. Along with the in depth analysis, we will review and outline our suggested recommendations for action.
STEP 4
Your solution is customized and ready for implementation. We will then start your particular plan in motion through use of the chosen financial instruments and arrangements.
STEP 5
Periodic reviews and adjustments ensure your progress. We meet with you periodically to review your investment performance, changing needs, circumstances and take action accordingly.
Ongoing Personal Portfolio Review Performance vs. Indices Performance vs. Stated Goals Risk-Adjusted Returns. | https://manandman.ca/about-us/our-wealth-process |
Court filings show bad blood between Quiros, former attorneys
Ariel Quiros at the opening of Jay Peak Resort’s Stateside Hotel in December 2013. File photo by Hilary Niles/VTDigger
A recent filing in the $350 million investor fraud case against Jay Peak owner Ariel Quiros sheds new light on why he fired his previous legal team.
Quiros claims his attorneys kept him in the dark and overcharged him.
Miami-based attorney Melissa D. Visconti of Damian & Valori LLP, Quiros’ new counsel, submitted a motion late last week that puts her client’s previous lawyers on notice that he intends to object to the roughly $3 million in legal bills they are seeking to be paid.
“Defendant, Ariel Quiros,” she wrote, “recently terminated the law firms, Leon Cosgrove and MSK, for, among other reasons, concerns regarding excessive bills and failing to follow the instructions of the client or to keep the client apprised of developments in litigation in which Mr. Quiros was a part.”
However, in response, a court filing from Quiros’ former attorneys say prior to terminating them, Quiros had not indicated any problems with their representation. They point to a text Quiros sent David Gordon, who had served as his lead counsel, just 16 days before Quiros fired him.
The text, according to the filing, stated, “David, I just want to thank you for your efforts, and to please stay next to me until it’s over. I believe in your efforts and talent. We will get a break soon. The law and truth has to prevail. Thank you on all fronts.”
Quiros last week dropped his former attorneys, but court records filed at that time revealed little about the reason why, and his new attorney as well as past lawyers have not returned phone calls seeking comment.
The flurry of filings submitted late last week reveal a breakup that is getting increasingly bitter with each additional motion submitted to the court.
And at stake for his former legal team is no longer proving Quiros’ innocence, but getting paid the almost $3 million in legal bills they say he owes them.
The fired firms that had represented Quiros include Leon Cosgrove LLC in Coral Gables, Florida, and Mitchell Silberberg & Knupp LLP, where Gordon works. The MSK law firm has offices in New York City, Los Angeles and Washington, D.C.
Those attorneys have sought to intervene in the federal U.S. Securities and Exchange Commission investor fraud lawsuit pending against Quiros.
Judge Darrin P. Gayles last week ruled in that case Quiros’ new counsel, not his previous legal team, is entitled to $100,000 recently released to Quiros from an insurance policy as well as potentially more money under that policy.
His former legal team objects to the judge’s ruling, which directs that the insurance money be given to new counsel, Damian & Valori LLP, even though the firm has only been on the case for about a week.
MSK and Cosgrove say they have done much more work in the nearly yearlong case.
Quiros remains in a separate legal fight with the insurance company, Ironshore Indemnity, over whether his policy should cover up to $10 million for his legal defense in the SEC and state cases, as well as the investor fraud lawsuits pending against him.
A hearing in the SEC lawsuit against Quiros had been set for Wednesday in federal court in Miami, where Quiros resides and many of his businesses are located.
But, Judge Gayles late last week called off that hearing, just days after Quiros obtained new counsel.
“While the Court has provided Defendant Quiros with limited access to some of the insurance proceeds to pay some of his current counsel’s fees and costs,” Judge Gayles wrote. “Leon Cosgrove, LLC and Mitchell, Silberberg & Knupp are no longer Quiros’s counsel or actively involved in this action.”
The judge added, “The Court does not find it appropriate to resolve a private attorney’s fee issue between Quiros and his prior counsel in this action. There will NO hearing on April 12, 2017.”
Quiros’s former legal team filed their own motion late Friday asking the judge to reconsider that order and allow the hearing to go forward.
They added that Quiros’ new counsel didn’t want the hearing to take place over fear of having a losing arguments, and the court shouldn’t reward “Machiavellian gamesmanship or endorse misdirection.”
The filing adds, “It is perhaps not surprising that they have sought to avoid the Hearing, since the authority allowing insurance payments to León Cosgrove and MSK to defray their defense costs is overwhelmingly strong.”
The matter of how much Quiros’ former legal team had been charging in fees has come up several times before in the case.
However, it wasn’t brought up by Quiros, but by the SEC.
In one filing, SEC attorney Christopher Martin raised concern that Quiros was squandering money that could go to defrauded investors. Quiros, Martin wrote, was paying for a “Cadillac defense team,” with billing rates for its partners ranging from $600 an hour to $805 an hour, averaging $708 an hour.
Those rates, Martin added, are “billing fees equivalent to representing a multi-millionaire with untainted funds who could pay for such services.”
Quiros’ attorneys at that time replied that those rates are comparable to “competitor” firms, both nationally and in the Miami area.
Quiros, owner of Q Resorts, holding company that includes Jay Peak, along with Bill Stenger, Jay Peak’s former president, are accused of misusing $200 million of the $350 million they raised under the federal EB-5 foreign investor program.
The money was meant for a series of development projects over an eight-year span at the northern Vermont ski area and other projects in Newport and Burke.
Quiros is also accused of looting $50 million of that money to pay for personal expenses.
Stenger has reached a plea that settled his SEC case. A separate state investor fraud lawsuit also remains pending against the two former business partners.
The purpose of this policy is to encourage a civil discourse among readers who are willing to stand behind their identities and their comments. VTDigger has created a safe zone for readers who wish to engage in a thoughtful discussion on a range of subjects. We hope you join the conversation. If you have questions or concerns about our commenting platform, please review our Commenting FAQ.
Privacy policy
VTDigger.org does not share specific information about our readers with other entities. Email addresses we collect through our subscription list and comment submissions are kept private.
We use Google analytics to generate aggregated data regarding the size and geographic distribution of our readership. This information helps us gauge how many readers come to the website and what towns they live in. It does not include addresses or other identifying characteristics about our readers. | |
The mission of New Urbanism is to “minimize automobile dependence and to replace climate changing sprawl with a sustainable urbanism.” Stevens & Associates has adopted this concept, which is evident in the firm’s culture, activities, and designs. We have supported CNU since its inception and have learned many of the forms, patterns, and rhythms of building the public realm from the Charter and the ideas of its organization.
Every project is a building block of a community. Together with our expertise in architecture, engineering, and development we incorporate the following principals for every project we design:
- Planning ‘human-scale’ neighborhoods that provide walkable access to numerous amenities.
- Designing and Developing new development, urban infill and revitalization, and preservation that can be applied to a variety of community settings including: rural main streets, booming suburban areas, urban neighborhoods, dense city centers, as well as entire regions.
- Placemaking and Creating public spaces, designed for people that accommodate various modes of transportation (walking, bicycling, public transit, vehicles, etc.) that easily connect one neighborhood to another and promote daily interactions, community awareness, and safety for visitors and inhabitants.
Transforming and repurposing the existing fabric of our downtowns not only preserves the foundation from which the community was built, but also provides a diverse and livable place contributing to the lifestyle and wellness for all.
For more information and to find a local chapter near you, please visit the Congress for New Urbanism. | https://www.stevens-assoc.com/home/new-urbanism/ |
A thread for general discussions, articles and images/videos about the British Empire.
From Wikipedia:-
At its height, it was the largest empire in history and, for over a century, was the foremost global power. By 1913, the British Empire held sway over 412 million people, 23% of the world population at the time, and by 1920, it covered 35,500,000 km2 (13,700,000 sq mi), 24% of the Earth's total land area. As a result, its political, legal, linguistic and cultural legacy is widespread. At the peak of its power, the phrase "the empire on which the sun never sets" was often used to describe the British Empire, because its expanse around the globe meant that the sun was always shining on at least one of its territories.
To start, here's a GIF animation showing the extent of British territory from 1492 through to the present day...
https://upload.wikim..._evolution3.gif
... followed by all countries/territories that were ever part of the empire (i.e. all time periods, combined). | https://www.futuretimeline.net/forum/topic/18291-the-british-empire/ |
The name “Xinjiang” literally means “New Frontier” and may seem rather misleading, as this region has been formally part of China since 1884. Yet its official name, Xinjiang Uyghur Autonomous Region, is such a mouthful that it’s no wonder people chose to abbreviate it! Located at the northwesternmost point of the country, Xinjiang is the largest subdivision in China and, spanning over 1.6 million square kilometres (620,000 sq. mi), it accounts for a sixth of China’s total territory. It’s larger than France, Germany, and Spain combined but tragically only 4.3% of its land area is considered habitable for humans!
Geographically, the region is divided by the east-west chain of the Tian Shan Mountains, with the Dzungarian Basin in the north and the Tarim Basin in the south. Terrain in the former is dry steppe while the latter contains large portions of the Takla Makan desert surrounded by oases. Generally speaking, the Dzungarian Basin is cooler and receives more rainfall but still has a desert at its centre, known as the Gurbantünggüt Desert. So no matter where you are in Xinjiang, be prepared to get sand in your shoes!
The Karakoram and Pamir Mountains rest to the southwest, while the Kunlun Mountains are to the south and the Altai Mountains are to the northeast. With snow-capped mountains, scorching deserts, and dry arid landscapes making up the majority of Xinjiang’s territory, it’s unsurprising that few people are sturdy enough to live there! The climate is marked by swelteringly hot summers and bitterly cold winters. In particular, Turpan Prefecture is often referred to as the “flaming continent” as its summer temperatures can exceed 40 °C (104 °F)! Further north, in the more mountainous areas, winter temperatures regularly plummet to below −20 °C (−4 °F).
Xinjiang is home to a number of ethnic minorities, including the Uyghur, Kazakh, Tajik, Hui, Kyrgyz, and Mongol people, most of which are religiously Muslim. Uyghurs represent about 44% of the overall population and approximately 90% of the population south of the Tian Shan Mountains, while Han people are in the majority towards the north and Kazakh people dominate the region’s northernmost point.
Yet the earliest evidence of life there came in the form of the Tarim mummies, which date back to 1800 BC and are of Caucasian descent. East Asian migrants arrived in the Tarim Basin approximately 3,000 years ago, while the Uyghur’s ancestors immigrated to the area in 842 AD. Over a period of 2,500 years, the region was subject to major political turmoil and has belonged to a succession of empires, including the Tocharians, Xiongnu, Han Dynasty, Tang Dynasty, Tibetan Empire, Uyghur Khaganate, Mongol Empire, Yuan Dynasty, Chagatai Khanate, Dzungar Khanate, and Qing Dynasty, to name but a few!
The Dzungarian Basin was once known as Dzungaria and was inhabited by a nomadic Buddhist people called the Dzungar, while the Tarim Basin was home to an oasis-dwelling Turkic people who evolved into modern-day Uyghurs. However, this was all to change during the Qing Dynasty (1644-1912), when the Qianlong Emperor ordered the extermination of the Dzungar people. From 1755 to 1758, in what is commonly known as the Dzungar Genocide, the Qing army massacred the Dzungar people and replaced them with sponsored settlements of Han, Hui, Uyghur, and Manchu people.
Approximately 80% of the Dzungar’s 600,000-strong population was wiped out, partly by war but mostly by smallpox, and much of their culture was purposefully extirpated. In 1884 the Qing court established Xinjiang as a unified region, containing the territory surrounding both the Tarim and Dzungarian basins.
Nowadays it is still an area of political unrest as the relationship between local Uyghurs and the Chinese government has begun to worsen. This is mainly due to religious and cultural differences, as the Uyghurs are a Muslim Turkic people. That being said, these issues only flair up occasionally and the region is still considered safe for foreign tourists so long as they are careful and stay informed.
In terms of religion, the majority of the population follow the Sunni branch of Islam, although there is a large minority of Shia Muslims. The magnificent Afaq Khoja Mausoleum and Id Kah Mosque in Kashgar are considered the two most sacred Islamic locations in Xinjiang, while the Bezeklik Thousand Buddha Caves are a major Buddhist site.
Xinjiang’s greatest claim to fame is its significance to the ancient Silk Road as several of its cities, including Urumqi, Kashgar, and Turfan, were once key stops along this historical trade route between China and Central Asia. These routes were designed mostly to avoid the unforgiving Takla Makan Desert, which nowadays is another popular attraction. After all, if ancient people could successfully cross parts of this desert on horseback, we should definitely be able to do it in our Land Rovers! | http://www.asiaculturaltravel.co.uk/xinjiang-uyghur-autonomous-region/ |
FAME is an up and coming urban artist and music producer from Coventry, England. Before pursuing rap and developing the art of lyricism, his musical roots came through many different styles of music which sparked a strong desire for songwriting and music producing. In reference to his artistic direction and creative influence, FAME is inspired by the likes of artists such as Eminem, Dr. Dre, DMX, J. Cole, Linkin Park, and 30 Seconds to Mars.
FAME has recorded and released a selection of exclusive songs that explore, portray, and touch on a number of different messages, situations, and stories. He has collaborated with a variety of different talented artists and producers regionally and nationally and in 2013 he released his first official EP titled Commitments (Chapter 1) which is available on iTunes.
FAME has also just released a brand new single that features London producer JROCS which is titled “DREAMER.” To listen to the newest single go to his official website and for news follow him on Facebook. | http://rblmag.com/fame-uk/ |
A Growing Love of American Football
For quite a few years now, I’ve been a growing fan of American Football.
What started out as an innocent enough interest in fantasy football spawned by The League slowly developed into watching actual games and finding teams I liked or disliked.
I tuned in to watch my then girlfriend’s Baltimore Ravens beat the 49ers from a beach hotel in Koh Phangan, Thailand back in 2013, and would start my Monday mornings in Australia last year watching whatever game the FTA networks deigned to share.
When I decided to plan my Great US Road Trip, one of my regrets was that we’d be arriving a month after the NFL season ended.
Why the Interest?
Whether it’s a small town that closes up on a Friday night to watch the local high school team play; a stadium packed with over 90,000 fans to see an epic college match up like Notre Dame vs. Southern Cal; or a rivalry between two original AFL teams dating back over 50 years like the San Diego Chargers and Oakland Raiders, few experiences match the raw emotion and drama of a great football game.
Not only is football the most popular spectator sport in America, it has been that way for the past 30 years, according to the Harris Poll. In 2014, a combined total of 42 percent of those surveyed chose either professional or college football as their favorite sport.
Similarities to Rugby & Aussie Rules Football
Sports fans outside the U.S. who follow rugby will see some similarity between rugby and American football. There is some similarity between a rugby scrum and a running play in American football where the ball carrier attempts to advance the ball by running through an opening created by his teammates blocking or pushing defenders. If you carry the ball across the goal line in rugby, that’s called a try; in American football, it’s a touchdown. All three sports have some variation of a field goal where the ball is kicked from the field between two uprights.
One way that American football differs from the other two sports mentioned earlier is the use of set plays. Most plays are run from scrimmage, where the offense lines up across from the defense. A ball is ‘snapped’ where the center lines up over the ball and passes it underneath him to the quarterback, who then typically hands the ball to a running back or throws it to a receiver who is usually tackled, ending the play. Each play usually lasts only a few seconds of real time. In between live playing action, both defense and offense normally ‘huddle up’ to run a set play or call out a specific defense against it.
In rugby and Aussie Rules football, the action is more continuous, with less time between plays. Another obvious difference is that American football players wear padding while players from the other two sports usually wear little to no padding. In American football, each team has 11 players on the field; Aussie Rules has 18 players from each team, while rugby has variations with 13 or 15 players per team.
Why American Football has So Much Emotion and Drama Behind it
By its very nature, football is a sport that can leave fans on the edge of their seats. Compared to other sports like basketball, ice hockey or baseball, football has a relatively small number of games. One loss in a 162-game baseball season probably won’t affect a team’s season much; for a football team playing a 16-game season, that one loss could be devastating.
Crowd participation is usually more intense with football than it is with other sports. When the home team is on defense, the fans often make a lot of noise, since offenses rely heavily on being able to hear the quarterback call out instructions known as ‘signals’ or ‘audibles’ to the rest of the offense.
Difficulty in hearing these signals can lead to plays being executed improperly and miscues that result in penalties. This can have so much of an impact on a game that many football teams often refer to a vocal and supportive home crowd as the ‘12th man’.
As is the case with any contact sport, the hard-hitting action of football appeals to many fans. A hard hit, whether it causes a fumble, prevents a receiver from catching the pass, or results in a quarterback sack or other tackle for negative yardage usually draws a visceral reaction from the audience.
Any sports fan visiting the U.S. should make every effort to include watching a game of American football on their itinerary. A little extra research on which games have the best rivalries, and some planning to include tailgate parties and other similar fun activities outside the game will make the visit an experience of a lifetime.
Your Say
Have you ever been to an NFL or college football game?
What sport do you think is unmissable for any traveler? | https://www.aussieontheroad.com/american-football-travel/ |
Estimated reading time 2 minutes, 32 seconds.
Russian Helicopters holding company (part of Rostec State Corporation) has obtained approval from the Federal Air Transport Agency (Rosaviatsiya) to install isolation units in Ansat multipurpose helicopters to transport patients with Covid-19. The units will be installed on EMS-configured Ansat helicopters.
“Currently, about 30 Ansat helicopters have been supplied to regions for air medical services,” said executive director of Rostec, Oleg Yevtushenko. “To improve their performance during the pandemic, we have launched certification process, and obtained permission for installing isolation units for transporting patients. This does not require modification of an aircraft. Such equipment will provide more opportunities to use an aircraft for medical purposes.”
Ansat helicopters save people as they are used for air medical services, and regularly make flights for medical evacuation day and night. The helicopters are used in the Moscow Region, the Nizhny Novgorod Region, the Kirov Region, the Kostroma Region, the Tver Region, the Chelyabinsk Region, the Belgorod Region, the Volgograd Region, the Astrakhan Region, in the Republic of Tatarstan, etc. | https://verticalmag.com/press-releases/ansat-helicopters-to-transport-patients-with-covid-19-in-isolation-modules/ |
TECHNICAL FIELD
BACKGROUND ART
DISCLOSURE OF THE INVENTION
Problems to be Solved by the Invention
Means for Solving the Problems
EFFECT OF THE INVENTION
DESCRIPTION OF THE REFERENCE SIGNS
BEST MODES FOR CARRYING OUT THE INVENTION
First Embodiment
Second Embodiment
Third Embodiment
Fourth Embodiment
Fifth Embodiment
Sixth Embodiment
Seventh Embodiment
Eighth Embodiment
Ninth Embodiment
Tenth Embodiment
Eleventh Embodiment
Twelfth Embodiment
Thirteenth Embodiment
Fourteenth Embodiment
Fifteenth Embodiment
Sixteenth Embodiment
The invention relates to associating of a party on the other end of communications via mobile communication terminals with sound data, and particularly to a technology of reducing a load of the on the mobile communication terminal due to such associating.
In the mobile telephones and other portable communication terminals, sound data that can be stored has been increasing owing to increase in memory capacity or a data compression technology. The mobile telephone has a function by which a user of the mobile telephone receiving an incoming call for telephone or e-mail can easily determine that it is made by a specific caller. Thereby, the user can discriminate the A specific callers such as a family, friends and the like from unspecified callers.
Technologies for identifying a party on the other end have been disclosed, e.g., in Japanese Patent Laying-Open Nos. 2001-168952, 2002-261875 and 2005-094081 (publications 1, 2 and 3).
Publication 1: Japanese Patent Laying-Open No. 2001-168952
Publication 2: Japanese Patent Laying-Open No. 2002-261875
Publication 3: Japanese Patent Laying-Open No. 2005-094081
Publication 4: Japanese Patent Laying-Open No. 2003-259010
Publication 5: Japanese Patent Laying-Open No. 2005-191912
Technologies relating to download of sound data have been disclosed, e.g., in Japanese Patent Laying-Open No. 2003-259010 (publication 4). Further, technologies for reproducing sound based on downloaded sound data have been disclosed, e.g., in Japanese Patent Laying-Open No. 2005-191912 (publication 5).
The association of registrants constituting an address book with sound data is implemented by an operation of a user of the mobile telephone or another terminal. When the number of sound data items is large, i.e., when the number of tunes that can be set as a ringing tone increases, this results in a problem that a complicated operation is required for them. Further, when many tunes are present, downloaded tunes may be not used.
The invention has been made for overcoming the above problem, and an object of the invention is to provide an information communication terminal that can easily associate tunes with registrants constituting an address book.
Another object is to provide an information communication terminal allowing deletion of tunes that will not be used for notification of an incoming call.
Still another object is provide a program product for causing an information communication terminal to function as a terminal that can easily associate tunes with registrants constituting an address book.
Yet another object is to provide a content distributing device capable of distributing tunes that can be easily associated with registrants constituting an address book of an information communication terminal.
Further another object is to provide a program product for causing a computer to operate as a content distributing device capable of distributing tunes that can be easily associated with registrants constituting an address book of an information communication terminal.
902
For achieving the above object, an information communication terminal according to an aspect of the invention includes a communication unit () capable of communications with at least a plurality of communication other-end parties; a content data storing unit storing multiple kinds of contents data; a storing unit storing identification data for identifying the plurality of communication other-end parties and assignment data for assigning the contents data to the communication other-end party; and an assigning unit assigning the contents data to the communication other-end party based on the assignment data.
Preferably, a type of the contents data includes one of sound, music and image.
Preferably, the identification data includes an address book of the communication other-end party.
Preferably, the address book includes one of a name of the communication other-end party, information for representing whether the name is a private person, a company or a group, a telephone number of the communication other-end party, data for specifying a position of the communication other-end party, an e-mail address of the communication other-end party, a name of a group containing the address book, information for specifying a communication device used by the communication other-end party and attribute information of the communication other-end party.
Preferably, the attribute information includes one of an age of the communication other-end party, sex or taste, and a relation between the communication other-end party and a user of the information communication terminal.
Preferably, the relation is associated with each of the contents data and the communication other-end party. The assigning unit assigns the contents data to the communication other-end party based on the relation.
Preferably, a genre for classifying items is associated with the contents data and the communication other-end party. The assigning unit assigns the contents data to communication other-end party based on the genre.
Preferably, the information communication terminal further includes a history storing unit storing a history of communications between the communication other-end party and the information communication terminal. The assigning unit assigns the contents data to the communication other-end party based on the history.
Preferably, the contents data includes one of sound and music. The assignment data includes performer or producer identification data for identifying a performer or a producer of the sound or the music. The identification data is associated with the identification data of the performer or the producer. The assigning unit assigns the contents data to the communication other-end party based on the performer or producer identification data.
Preferably, the contents data includes an image. The assignment data includes a performer or producer identification data for identifying a performer or a producer of the image. The identification data is associated with the performer or producer identification data. The assigning unit assigns the contents data to the communication other-end party based on the performer or producer identification data.
Preferably, the assignment data includes one of a flag representing a state of use of the contents data, and association data representing association between the contents data and the communication other-end party to which the contents data is assigned.
Preferably, the assigning unit sets, in the assigned contents data, a flag representing the fact that the contents data is already assigned to the communication other-end party.
Preferably, the information communication terminal further includes an input unit accepting an operation for associating the contents data with the communication other-end party. The assigning unit includes a producing unit producing, based on the operation, data representing the fact that the contents data is associated with the communication other-end party, and an associating unit associating the data produced by the producing unit with the contents data.
Preferably, the assigning unit automatically associates the identification data with the contents data.
Preferably, the information communication terminal further includes a random number generating unit for generating random number data. The assigning unit associates the identification data with the contents data based on the random number data.
Preferably, the assigning unit associates the contents data with the communication other-end party according to an arrangement defined based on each of the plurality of identification data items and an arrangement defined based on each of the plurality of contents data items.
Preferably, the information communication terminal further includes a detecting unit detecting update of the data on the information communication terminal. The assigning unit associates the contents data with the communication other-end party when the update is detected.
Preferably, the detecting unit detects the update of the contents data in the contents data storing unit. The assigning unit assigns the updated contents data to the communication other-end party.
Preferably, the detecting unit detects the update of the identification data. The assigning unit assigns the contents data to the communication other-end party based on the updated identification data.
Preferably, the information communication terminal further includes a detecting unit detecting elapsing of a predetermined period. The assigning unit assigns the contents data to the communication other-end party after elapsing of the period.
Preferably, the information communication terminal further includes a detecting unit detecting an incoming call. The assigning unit assigns the contents data to the communication other-end party in response to the detection of the incoming call.
Preferably, the information communication terminal further includes an output unit performing an output operation based on the contents data.
Preferably, the contents data includes sound data. The output unit includes a speaker outputting a sound or music based on the sound data.
Preferably, the contents data includes image data. The output unit includes a display unit displaying an image based on the image data.
Preferably, the contents data includes control data for controlling vibration of the information communication terminal. The output unit includes a vibration unit vibrating based on the control data.
Preferably, the output unit includes a light-emitting unit emitting light in a preset color.
Preferably, the contents data further includes data for performing assignment of the contents data to the communication other-end party.
Preferably, the data for performing the assignment includes one of a flag representing a state of use of the contents data, and data associated with the contents data.
Preferably, the data associated with the contents data includes a title of the contents corresponding to the contents data, a name of a performer or a producer of the contents, a genre of the contents, a time of production of the contents and information representing the number of the data items associated with the contents data.
Preferably, the information communication terminal includes one of a radio communication device and a wired communication device.
Preferably, the radio communication device includes one of a telephone, a PHS (Personal Handyphone System) and a transceiver.
Preferably, the wired communication device includes one of a telephone and a facsimile machine.
Preferably, the information communication terminal includes one of a portable information terminal transmitting information and an image display device transmitting information.
Preferably, the information communication terminal further includes a changing unit changing all of the contents data stored in the contents data storing unit.
Preferably, the information communication terminal further including a select unit selecting the plurality of contents data items stored in the contents data storing unit, and a changing unit collectively and simultaneously changing the contents data items selected by the select unit.
According to another aspect, the invention provides a mobile telephone. The mobile telephone includes a speech communication unit performing wireless speech communications; contents data storing unit storing a plurality of contents data items; a storing unit storing identification data for identifying a plurality of communication other-end parties and assignment data for assigning the contents data with the communication other-end party; and an assigning unit assigning the contents data with the communication other-end party based on the assignment data.
According to another aspect, the invention provides a content distributing device. The contents distributing device includes a receiving unit receiving information from each of a plurality of information communication terminals; a storing unit storing a plurality of distribution data items for distribution, and a database including attribute data associated with each of the distribution data items. The attribute data is associated with information for identifying an other-end party of the communications performed by the information communication terminal. The contents distributing device includes a request detecting unit detecting a request for distribution of the distribution data stored in the storing unit based on the information received by the receiving unit. The request includes sender information for specifying the information communication terminal requesting the distribution. The contents distributing device includes a transmitting unit transmitting the distribution-requested distribution data to the information communication terminal specified by the sender information; and a feedback detecting unit detecting reception of feedback information transmitted from each of the information communication terminals based on the information received by the receiving unit. The feedback information includes attribute data associated with the distribution data stored in the information communication terminal having sent the request. The contents distributing device includes an updating unit updating the database based on the attribute data included in the feedback information.
Preferably, the database further stores a distribution record of the distribution data. The contents distributing device further includes a producing unit producing list data representing a list of the distribution data being transmittable to the information communication terminal requesting the distribution, based on the distribution record. The transmitting unit transmits the list data to the information communication terminal.
Preferably, the distribution data includes one of sound data, music data and image data.
According to another aspect, the invention provides a content distributing system. The contents distributing system includes an information communication terminal. The information communication terminal includes a communication unit capable of communications with at least a plurality of communication other-end parties, a content data storing unit storing multiple kinds of contents data, a storing unit storing identification data for identifying the plurality of communication other-end parties and assignment data for assigning the contents data to the communication other-end party, and an assigning unit assigning the contents data to the communication other-end party based on the assignment data. The contents distributing system includes a content distributing device connected to the information communication terminal via a communications line. The contents distributing device includes a receiving unit receiving information from each of a plurality of information communication terminals, and a storing unit storing a plurality of distribution data items for distribution and a database including attribute data associated with each of the distribution data items. The attribute data is associated with information for identifying an other-end party of the communications performed by each of the information communication terminals. The content distributing device includes a request detecting unit detecting a request for distribution of the distribution data stored in the storing unit based on the information received by the receiving unit. The request includes sender information for specifying the information communication terminal requesting the distribution. The content distributing device includes a transmitting unit transmitting the distribution-requested distribution data to the information communication terminal specified by the sender information, and a feedback detecting unit detecting reception of feedback information transmitted from each of the information communication terminals based on the information received by the receiving unit. The feedback information includes attribute data associated with the distribution data stored in the information communication terminal having sent the request. The content distributing device includes an updating unit updating the database based on the attribute data included in the feedback information.
According to another aspect, the invention provides a program product for controlling an information communication terminal provided with a storage device. The program product causes the information communication terminal to execute the steps of performing communications with at least a plurality of communication other-end parties; preparing multiple kinds of contents data in the storage device; preparing identification data for identifying the plurality of communication other-end parties and assignment data for assigning the contents data to the communication other-end party; and assigning the contents data to the communication other-end party based on the assignment data.
According to another aspect, the invention provides a program product for operating a computer as a content distributing device. The program product causes the comparator to execute the step of preparing a plurality of distribution data items for distribution, and a database including attribute data associated with each of the distribution data items; and the step of receiving information from each of the plurality of information communication terminals. The attribute data is associated with information for identifying an other-end party of the communications performed by each of the information communication terminals. The program product causes the comparator to execute the step of detecting a request of distribution of the prepared distribution data based on the received information. The request includes sender information for specifying the information communication terminal requesting the distribution. The program product causes the computer to execute the step of sending the distribution-requested distribution data to the information communication terminal specified by the sender information; and the step of detecting reception of the feedback information transmitted from each of the information communication terminals based on the received information. The feedback information includes attribute data associated with the distribution data stored in the information communication terminal having sent the request. The program product causes the computer to execute the step of updating the database based on the attribute data included in the feedback information.
According to the information communication terminal of the invention, the association between the address book data and the output data can be implemented, e.g., by arrangement of data or the like. Therefore, since the user of the information communication terminal is not required to perform an associating operation on each address book data item, convenience will be improved.
The information communication terminal according to another aspect of the invention can make more effective use of the downloaded contents. The information communication terminal of still another aspect allows easy assignment, and allows easy determination about whether unassigned contents are to be deleted or not, after execution of the assignment. Consequently, a memory in the information communication terminal can be effectively used. According to the information communication terminal of a yet another aspect, it is expected that downloaded contents increase owing to improved convenience and the terminal can contribute to development of industries involved in contents distribution. The information communication terminal of a further another aspect can collectively and simultaneously change the plurality of contents to be reproduced. For example, a plurality of contents can be replaced with contents related to Christmas. This can interest users of the information communication terminals.
100
110
120
200
210
220
230
240
250
260
262
280
904
904
906
mobile telephone, base station, network, computer system, CPU, mouse, keyboard, RAM, hard disk, CD-ROM drive, CD-ROM, monitor, monitor, first casing, second casing
Embodiments of the invention will now be described with reference to the drawings. In the following description, the same parts bear the same reference numbers and the same names, and implement the same functions. Therefore, description thereof is not repeated.
FIG. 1
FIG. 1
100
100
Referring to , description will now be given on a manner of use of a mobile telephone according to a first embodiment of the invention. illustrates a structure of a system formed of mobile telephone and a device providing ringing tones.
100
110
110
200
120
100
200
120
Mobile telephone performs communications with a base station via a radio communication line. Base station is connected to a computer system that can distribute ringing tones over a network . Devices other than mobile telephone may be connected as information communication terminals to computer system . For example, a PHS (Personal Handyphone System), a stationary telephone, a transceiver, a facsimile or other information processing devices may be connected. The information communication terminal may be a television set, a display of a car navigation system or other image display devices. Communications by wire system may be employed for connection between the information communication terminal and the computer system instead of the radio communications. Network may be the Internet or another public communication line, and also may be a private communication line. A communication scheme is not particularly restricted.
FIG. 2
FIG. 2
200
200
200
210
220
230
240
250
260
280
290
262
260
Referring to , description will now be given on computer system operating as a music distribution server device. is a block diagram illustrating a hardware structure of computer system . Computer system includes a CPU (Central Processing Unit) , a mouse for accepting input of instructions, a keyboard for accepting input of instructions, a RAM (Random Access Memory) temporarily storing input data or data produced by processing that is executed according to programs, a hard disk that can nonvolatilely stores data, a CD-ROM (Compact Disc-Read-Only Memory) drive , a monitor and a communication interface (IF) , which are connected together by a data bus. A CD-ROM that is a data storage medium is loaded into CD-ROM drive .
200
210
240
250
262
250
260
290
250
240
210
Processing in computer system is implemented by software that is executed by various kinds of hardware and CPU . The above software is prestored in RAM or hard disk . The software may be stored in CD-ROM or other data storage mediums for distribution as program products. Further, the software may be provided as program products that can be downloaded from information providers connected to the Internet or other communications lines. The software is stored on hard disk after it is read from the data storage medium by CD-ROM drive or another reading device, or is downloaded via communication interface . The software is read in an executable form from hard disk into RAM , and is executed by CPU .
200
240
250
262
200
FIG. 2
Computer system illustrated in has general hardware. Therefore, it should be noted that the essential part or substance of the invention to be described later is the software that is stored in RAM , hard disk , CD-ROM or other data storage mediums or can be downloaded over the network. Operations of various parts of the hardware of computer system are well known, and therefore detailed description thereof is not repeated.
FIG. 3
FIG. 3
200
250
250
310
322
Referring to , description will now be given on a data structure of the music distribution server device implemented by computer system . conceptually illustrates a form of storage of the data on hard disk . Hard disk includes areas to for data storage.
250
310
312
314
316
322
Hard disk has stored ringing tones to be distributed in response to externally received requests for download. More specifically, area stores names specifying data records representing respective ringing tones. Area stores names of the ringing tones. Area stores sound files of ringing tones. Areas - store so-called tag information annexed to the ringing tones. These kinds of information are well known to those skilled in the art, and therefore will now be specifically described hereinafter.
250
330
338
330
332
334
336
338
330
250
Hard disk further includes areas - for storing data that is produced in response to provision of the ringing tone. More specifically, area stores the data for specifying the record that is produced in response to every provision of the ringing tone. Area stores data specifying destinations of the provided ringing tones. Area stores the names of provided ringing tones. Area stores, as credit information, information such as a credit cart number that is obtained for charging from the user receiving the ringing tone. Area stores amounts charged for provision of the ringing tones. As can be understood from the data illustrated in area , each record is produced every time the ringing tone is downloaded, and hard disk successively stores these records.
250
340
348
340
200
342
200
120
100
344
100
346
348
210
240
210
Hard disk further includes areas - for storing the programs. Area stores the operating system for defining the basic operation of computer system . Area stores a program for performing communications by computer system over network with mobile telephone and other communication terminals. Area stores a program for retrieving the ringing tone that is selected according to a request received from mobile telephone or another mobile terminal. Area stores a program for distributing to a mobile terminal the data of retrieved ringing tone. Area stores a program for calculating charging information when the ringing tone is distributed. CPU reads these programs and writes them in the executable form into an area of RAM that is reserved for executing these programs. CPU executes these programs in the executable form to achieve the various kinds of processing already described.
FIG. 4
FIG. 4
210
200
210
210
410
420
430
440
450
460
470
480
490
Referring to , description will now be given on CPU that realizes computer system operating as the music distribution server device according to the embodiment. is a block diagram illustrating a structure of functions implemented by CPU executing the programs. CPU includes an input unit , a request reception detecting unit , a select screen data transmission instructing unit , a ringing tone information obtaining unit , a ringing tone retrieving unit , a ringing tone data reading unit , a ringing tone data transmission instructing unit , a credit information obtaining unit and an output unit .
410
420
100
420
430
250
240
210
120
290
100
100
Input unit accepts an input of an external instruction via the data bus. Request reception detecting unit detects the reception of the request that is made for distribution of the ringing tone and is obtained from the information transmitted from mobile telephone . In response to the request for distribution of the ringing tone by request reception detecting unit , select screen data transmission instructing unit instructs the transmission of data of the screen for allowing selection of the ringing tone. In response to this instruction, the screen data stored in advance on hard disk is read into an area kept in RAM , and further is transmitted by CPU to network via communication interface . Mobile telephone receiving the screen data thus transmitted displays screen contents for selecting the ringing tone according to the received data. The manner of display on the screen of mobile telephone will be described later.
440
100
410
100
440
450
250
460
250
250
Ringing tone information obtaining unit obtains information for specifying the ringing tone that is specified by mobile telephone through input unit . This information includes data for identifying the user of mobile telephone and data for specifying the ringing tone selected for distribution (e.g., names of a ringing tone and an artist, and the like). Using the information obtained by ringing tone information obtaining unit , ringing tone retrieving unit retrieves a data file of the specified ringing tone from the must data stored in hard disk . When the data file selected for distribution is present, ringing tone data reading unit reads the data file from hard disk , and writes it into RAM . The above artist is an example of a voice or music performer. The data for specifying the ringing tone is not restricted to the above data, and may be a producer of music or image. For example, the performer relating to the image is an actor, actress, model or the like. The producer of the image is a painter, photographer or the like.
470
100
240
120
290
Ringing tone data transmission instructing unit instructs an other-end party (i.e., an address of mobile telephone ) that requested the distribution of the ringing tone to transmit the data file that is read. When this instruction is issued, the data stored in RAM is transmitted onto network via communication interface . The structure of the data thus transmitted takes a packet form. This form can be easily understood by those skilled in the art, and therefore description thereof is not repeated.
480
410
320
338
250
490
210
Credit information obtaining unit obtains information such as a credit card number, an expiration data and other information required for charging from the information of which input is accepted via input unit , and successively stores the obtained information in areas - on hard disk . Output unit provides the instruction produced by CPU as well as data and other signals to respective specified addresses.
FIG. 5
FIG. 5
200
210
Referring to , description will now be given on a control structure of computer system that functions as the music distribution server device. is a flowchart illustrating a procedure of the processing executed by CPU .
510
210
120
520
210
100
100
100
100
200
In step S, CPU detects reception of a request for downloading the ringing tone based on the information of which input over network is accepted. In step S, CPU responds to this request by transmitting screen data for selecting the ringing tone to mobile telephone . Upon transmission of this data, mobile telephone displays screen contents corresponding to the data, and enters a state in which the user of mobile telephone can select the ringing tone. Thereafter, if the user of mobile telephone selects a specific ringing tone as will be described later, and performs an operation for transmitting the information that includes the data for specifying the selected ringing tone, the data is transferred to computer system .
530
210
100
540
210
100
250
In step S, CPU receives the information of the ringing tone from mobile telephone , and obtains specific data (e.g., the names of the ringing tone and artist) included in the received data. In step S, CPU further obtains the charge information (the credit card number, expiration data and other credit cart information) from the information transmitted from mobile telephone . The obtained data is successively stored in the area reserved on hard disk .
550
210
250
In step S, CPU retrieves the specified ringing tone from the ringing tone database stored on hard disk according to the obtained information. In this operation, the data including the distributable ringing tone is transmitted when the screen contents for selecting the ringing tone is transmitted. Therefore, it is apparent from the result of retrieving that the specified ringing tone reliably present. However, in view of that case where the specified ringing tone is not present, screen contents notifying of the absence thereof may be prepared according to predetermined data.
560
210
100
570
210
250
In step S, CPU transmits the data file of the ringing tone to mobile telephone according to the result of the retrieval of the ringing tone. In step S, in response to the completion of transmission of the ringing tone data, CPU stores an actual result of the download of the ringing tone in the database on hard disk according to the charge information that is already obtained. A record stored by this operation includes the name of distributed ringing tone, distribution destination, credit information providing a base or ground for charging and the like.
FIG. 6
FIG. 6
100
100
100
610
620
630
640
650
Referring to , description will now be given on a structure of mobile telephone according to an embodiment of the invention. is a block diagram illustrating a functional structure of mobile telephone . Mobile telephone includes a control unit , an input unit , a communication unit , a storing unit and an output unit .
620
610
610
100
610
620
610
640
Input unit accepts an input of external data or instruction. The data or instruction thus accepted is transmitted to control unit . Control unit executes processing required for implementing mobile telephone . For example, control unit operates according to the operation or data of which input through input unit is accepted, and executes a program for implementing the processing defined by the operation of data thus accepted. Alternatively, control unit operates according to data stored in storing unit , and executes the processing that refers to such data.
610
640
610
610
610
610
610
640
610
620
610
640
640
640
Control unit detects update of the data stored in storing unit . For example, control unit detects the update of the address book data or the update of the ringing tone, movie and other contents data. Alternatively, control unit keeps the time based on a signal provided from an internal clock (not shown). For example, control unit keeps the time that elapsed after assignment (which will be described later) is once executed, and detects the elapsing of a preset time. When the above detection is performed, control unit provides the instruction for reexecuting the assignment processing. Control unit collectively and simultaneously updates the data stored in storing unit based on the external instruction. For example, when control unit receives the instruction indicating the “collective updating” from input unit , control unit deletes all the contents data stored in storing unit , and writes the newly entered contents data into storing unit . Consequently, the data stored in storing unit is collectively updated.
630
640
100
640
620
630
640
Communication unit implements the radio communication function. The implemented function includes communications for telephone, e-mail, data displayed in web page and other data. Storing unit holds the data that was preentered in the process of manufacturing mobile telephone . Storing unit further stores the data of which external input through input unit or communication unit is accepted. The data of which input is accepted includes so-called contents data, e.g., of sound, music, image and others. Storing unit stores the identification data for identifying a plurality of the other-end parties of communications. The identification data includes the address book of the name, telephone name, e-mail address book of the other-end party of communications, the attribute of the communication other-end party, a relation between the communication other-end party and the information communication terminal, and other items.
640
610
650
610
650
Storing unit also stores the data produced by control unit . Output unit outputs the images, sounds, music and the like according to the instruction produced by control unit . The images are specifically character strings, still images, movies, animations and the like. Output unit includes, e.g., a display displaying images and a speaker outputting sounds or music.
FIG. 7
FIG. 7
100
610
610
710
720
730
740
750
760
750
752
754
Referring to , the structure of mobile telephone will now be described further in detail. is a block diagram illustrating the structure of functions realized by control unit . Control unit includes an input unit , an instruction detecting unit , a flag setting unit , a ringing tone retrieving unit , a registrant-by-registrant basis ringing tone assigning unit and an output unit . Registrant-by-registrant basis ringing tone assigning unit includes an assignment data producing unit and an assignment data writing unit .
710
620
630
610
100
720
100
100
710
Input unit accepts the input of data from a component (e.g., input unit or communication unit ) other than control unit of mobile telephone . Instruction detecting unit detects an instruction for causing mobile telephone to execute operations specific to mobile telephone based on the data entered via input unit . The detected instructions include an instruction, e.g., for assigning the ringing tones to the address book that is preregistered in the mobile telephone.
730
640
720
730
Flag setting unit sets a flag for dividing the processing of the data records stored in storing unit , in response to the detection of the instruction by instruction detecting unit . For example, flag setting unit sets, for each address, a flag for discrimination between an address to be handled as a target of the ringing tone assignment and an address not to be handles as such a target.
740
640
720
750
Ringing tone retrieving unit retrieves from storing unit the ringing tone that can be assigned to the address book, in response to the result of the detection by instruction detecting unit . A result of the retrieval is transmitted to registrant-by-registrant basis ringing tone assigning unit .
750
640
710
740
750
750
740
Registrant-by-registrant basis ringing tone assigning unit executes the operation of assigning the ringing tone to each address book stored in storing unit , based on the instruction entered via input unit and the result of retrieval by ringing tone retrieving unit . More specifically, registrant-by-registrant basis ringing tone assigning unit retrieves the address that is a target of the assignment. Further, registrant-by-registrant basis ringing tone assigning unit assigns the ringing tone retrieved by ringing tone retrieving unit to the retrieved address in a one-to-one relationship.
This assignment is performed by associating the respective data items in the address book that are arranged in the ascending order of data numbers with the sound files of the ringing tones arranged in the ascending order of sound file numbers, respectively. In this case, it is not necessary that the address book data items or the sound files are arranged in the ascending order. These may be arranged in the descending order, or in a combination of the ascending and descending orders.
Data other than the data number of the address book may be used as the key for the assignment. For example, the assignment may be performed according to the arrangement based on the order of names of registrants in the address books or names of sound files (e.g., phonetic order or alphabetical order).
750
752
754
752
640
In registrant-by-registrant basis ringing tone assigning unit , assignment data producing unit produces data for associating the ringing tones thus assigned with the registrants. Assignment data writing unit operates according to the data produced by assignment data producing unit , and thereby writes the data for specifying the ringing tone with respect to the data record of each registrant in the associate fashion in the area reserved in storing unit .
760
730
640
760
750
640
Output unit writes the flag set by flag setting unit in storing unit . Output unit further stores the data produced by registrant-by-registrant basis ringing tone assigning unit in storing unit .
FIG. 8
FIG. 8
100
640
100
640
810
100
830
Referring to , a data structure of mobile telephone will now be described. conceptually shows a form of data storage in storing unit of mobile telephone . Storing unit includes an address book storing unit storing address data representing the other-end party of communications of mobile telephone , and a ringing tone storing unit storing the ringing tones. The address data is, e.g., one of a name of the communication other-end party, information specifying whether the name of the communication other-end party is a private person, a company or a group, a telephone number, an e-mail address, information representing a relation between the user of the information communication terminal and the communication other-end party, an age or a gender of the communication other-end party, information for specifying a communication device used by the communication other-end party, a name for identifying the group to which the address book of the communication other-end party belongs and data representing a history of assignment of the contents data to the communication other-end party. However, the address data may be data other than the above.
810
810
812
814
820
810
640
FIG. 8
Address book storing unit stores a data record for each of the communication the communication other-end parties. More specifically, address book storing unit includes address data items of N in number, i.e., first, second, . . . and Nth address data items , . . . and . The number of address data items stored in address book storing unit is not restricted to that illustrated in . The number of storable data items depends on a capacity of the memory implementing storing unit .
812
813
814
815
820
821
813
815
821
813
815
821
813
815
821
First address data includes an area for storing a flag. Second address data includes a similar area . Nth address data includes a similar area . The flag stored in each area , or is data representing whether the assignment of the ringing tone can be performed or not. When the processing for assigning the ringing tone is executed, the data representing whether the assignment of the ringing tone can be performed or not is written in areas , and , and the processing of assigning the ringing tone is executed. When the flag representing that the ringing tone can be assigned is stored in area , or , or when a flag inhibiting the assignment is not stored in the above area, the assignment of the ringing tone is executed.
The data of assignment is not restricted to the above. For example, a flag representing a state of use of contents data may be employed.
830
620
630
830
832
834
840
850
Ringing tone storing unit stores the data of the ringing tone that is entered via input unit or is received via communication unit . More specifically, ringing tone storing unit includes first, second and Mth ringing tones , and . Each ringing tone is assigned an index of the ringing tone flag. This index is used when the assignment to the address data is performed.
FIGS. 9 and 10
FIG. 9
FIG. 10
100
100
100
Referring to , a specific structure of mobile telephone will be described below. schematically shows an outer appearance of mobile telephone . is a block diagram illustrating a hardware structure of mobile telephone .
FIG. 9
100
904
906
974
912
942
920
972
920
921
922
912
924
As shown in , mobile telephone is of a foldable type, and includes first and second casings and , a speaker , a main display , a sub-camera , a main operation unit and a microphone . Main operation unit includes a button accepting an input of an instruction in response to depression thereof, a cursor moving key for moving a cursor displayed on main display and a twelve-key set formed of twelve keys such as numeric keys.
FIG. 10
FIG. 9
FIG. 6
100
902
610
930
932
940
950
960
980
908
970
914
976
978
984
982
980
920
930
620
902
630
940
950
960
982
980
640
974
912
914
976
984
650
As shown in , mobile telephone includes, in addition to the structure illustrated in , a communication unit , a control unit , a sub-operation unit , a main camera , a flash memory , a RAM , a data ROM , a memory card drive , an antenna , an audio signal processing unit , a sub-display , an LED (Light Emitting Diode) , a data communication interface and a vibrator . A memory card is loaded into memory card drive unit . Main operation unit and sub-operation unit correspond to input unit shown in . Communication unit corresponds to communication unit . Flash memory , RAM , data ROM and memory card loaded into memory card drive correspond to storing unit . Speaker , main display , sub-display , LED and vibrator correspond to output unit .
908
902
902
610
610
100
902
902
908
When antenna receives the signal, it provides the signal to communication unit . Communication unit executes predetermined processing on the input signal, and transmits the processed signal to control unit . A signal that is output from control unit for transmission from mobile telephone enters communication unit . When communication unit performs predetermined transmission processing, the signal provided by this processing is transmitted from antenna by radio.
920
920
610
When the user enters an instruction into main operation unit , main operation unit provides a signal corresponding to the instruction to control unit , which executes processing defined by the received signal. The user's instruction includes an instruction for transmitting a request for downloading the ringing tones, an instruction for assigning the ringing tones to the registrants included in the address book, and the like.
930
920
930
932
932
610
610
912
914
912
914
Sub-operation unit accepts an input of instruction by the user, similarly to main operation unit . Sub-operation unit is arranged on a surface that is located on the outer side when mobile telephone is closed. Main camera is implemented, e.g., by a solid state imaging device CCD (Charge Coupled Device). Main camera takes an image of a subject, and produces an image signal of the subject for output. The output image signal is provided to control unit . Control unit executes predetermined image processing on the signal, and transmits the signal thus processed to main display and sub-display . The image processing includes, e.g., processing for producing display data of sizes corresponding to the image display region of main display or sub-display .
934
932
100
100
A sub-camera is implemented by a solid state imaging device CCD, similarly to main camera . The number of cameras arranged in mobile telephone is not restricted to two, and may be one. Also, mobile telephone may not employ any camera.
940
100
902
950
610
610
950
Flash memory stores the data produced or obtained by the operation of mobile telephone . The stored data also includes the address book of the communication other-end party, the data files of the ringing tones obtained via communication unit and the like. RAM temporarily stores the data that is used in the processing executed by control unit . More specifically, control unit reads the data stored in RAM , and executes the instructed processing. This processing includes processing for assigning a ringing tone to a registrant included in the address book.
960
100
610
950
912
950
974
970
Data ROM has stored application programs (e.g., a mail editing program, image processing program, music reproducing program and other programs) held in mobile telephone . Control unit reads each program, converts it into an executable form and writes it in RAM . Main display displays the address book based on the data thus written in RAM . Alternatively, speaker obtains the above data via audio signal processing unit to generate a ringing tone.
976
100
976
976
976
610
976
976
LED is one of forms of light emitting means. When an incoming call of telephone or reception of an e-mail is detected in mobile telephone , LED emits light in a predetermined color. In this operation, LED is not restricted to exhibit a specific color, but may exhibit multiple colors. LED may be replaced with another light-emitting form. Contents data may include data defining the light emission. In this case, when control unit detects the above data, LED emits the light based on the detected data. According to this configuration, LED can emit the light corresponding to the details of contents. For example, intervals of light emission may be changed or the color of light may be changed according to the intensity or volume of music.
978
Data communication interface is an interface for performing data communications via a communication cable (not shown). The form of the interference is not particularly restricted.
984
610
984
984
Vibrator is an example of vibrating means, which is one of forms of means for notifying of the incoming call of telephone, reception of e-mail and other states. When the incoming call of telephone or the e-mail reception is detected, control unit activates vibrator with a predetermined frequency. The manner of vibration may be changed according to the caller of telephone or the sender of e-mail. Thereby, the user can easily identify the caller of telephone or the sender of e-mail even when the ringing does not occur. The form of the vibrating means is not restricted to vibrator .
984
984
984
When the contents data include data for controlling the vibration of vibrator , vibrator may be configured to vibrate in response to the detection of such data. This data includes, e.g., data defining intervals between vibrations of vibrator and/or data defining a pattern of vibrations.
980
982
982
980
982
950
100
100
Memory card drive drives a readable and writable memory card that can be removably loaded thereinto. When memory card is loaded into memory card drive , the data stored in memory card is read out. The read data is temporarily written in RAM . Since mobile telephone includes the removable data storage medium, the data set by the user as well as the data stored in various storage devices of mobile telephone can be transferred to another information communication device.
100
610
940
950
960
982
980
940
940
950
610
100
940
950
960
982
100
FIGS. 9 and 10
As described above, the functions of mobile telephone according to the embodiment are implemented by software executed by the hardware and control unit . Such software may be prestored in flash memory , RAM , data ROM and other storage devices. Alternatively, the software may be stored in memory card or other removable information storage mediums for distribution as a program product. The software thus stored is read by memory card drive from the information storage medium and is temporarily stored in flash memory . The software is read from flash memory into RAM , and is executed by control unit . The hardware structure of mobile telephone shown in corresponds to the computer system in connection with the scope of the above structures and operations, and is general in this scope. Therefore, it can be understood that the most essential part of the invention is the software recorded in flash memory , RAM , data ROM , memory card and/or other storage devices. The operations of hardware of mobile telephone are well known so that description thereof is not repeated.
100
100
100
980
100
FIG. 10
Mobile telephone may take a form other than the foldable form. It is not necessary that mobile telephone has the multiple display devices, and it is merely required to employ at least one display device. It is not necessary that mobile telephone has memory card drive . The structure of the storage device is not restricted to that shown in , and it is merely required that mobile telephone has at least one storage device for nonvolatilely storing data.
FIG. 11
FIG. 11
100
940
940
1110
1118
Referring to , description will now be given on a data structure of mobile telephone according to the embodiment. conceptually illustrates a form of data storage in flash memory . Flash memory includes areas - reserved for storing the ringing tones.
1110
1112
1114
1116
1118
1118
1110
1112
Area stores data for identifying the record that forms the database of the ringing tones. Area stores the names of the ringing tones. Area stores data file names for producing the ringing tones. Area stores players (artist names of the ringing tones. Instead of the players, data representing performers or producers may be stored. In the following description, the data representing the performer or the producer is handled substantially in the same manner as the data representing the player. Area stores the flags associated with the ringing tones. When the flag is not set, area stores, e.g., “NULL”. The data stored in area is automatically numbered according to the storage of the ringing tones. The name stored in area is obtained, e.g., when the ringing tone is downloaded, and may be changeable according to an external input by the user's operation.
940
1120
1128
1120
1122
1124
1126
Flash memory further includes areas - for storing the data forming the address book. Area stores data specifying the records of database of the address book. Area stores names for specifying the communication other-end parties of telephone or e-mail communications. Telephone numbers of the communication other-end parties are stored, e.g., in areas and .
FIG. 11
1128
1120
1128
1120
In the example illustrated in , two telephone numbers are stored. The address book, however, may include one, three or more telephone numbers. Area stores the e-mail addresses. The data items stored in areas - are associated with each other. Therefore, by specifying the data stored in area , respective records constituting the address book are specified.
FIG. 12
FIG. 12
100
610
Referring to , description will now be given on the control structure of mobile telephone . is a flowchart representing a procedure of the processing executed by control unit for assigning the ringing tones to the registrants of the address book.
1202
610
940
1204
610
200
940
200
FIG. 1
In step S, control unit accepts an input of registration data to the address book. The input data is stored, e.g., in a reserved space of flash memory . In step S, control unit stores the ringing tone downloaded from computer system in flash memory . For example, this ringing tone is obtained by downloading it from computer system that functions as a music distribution device ().
1206
610
126
1208
1206
In step S, control unit determines whether the setting for assigning the ringing tone to the registrant and the like is to be performed or not. This determination is performed based on whether the instruction for such setting is entered or not. When the setting for assigning the ringing tone to the registrant is to be performed (YES in step S), the process proceeds to step S. Otherwise (NO in step S), the processing ends.
1208
620
1208
1220
1208
1210
1210
610
620
In step S, it is determined whether the setting for such is automatic setting or not. This determination is performed, e.g., based on the instruction entered via input unit . When the setting for the assignment is automatic setting (YES in step S), the process proceeds to step S. Otherwise (NO in step S), the process proceeds to step S. In step S, control unit accepts an input of the instruction for individually setting the ringing tones through input unit .
1212
610
1214
610
1214
1206
1214
1210
In step S, control unit sets flags for the ringing tone, telephone number and e-mail address that are associated with each other. In step S, control unit determines whether the setting for individually assigning the ringing tone to the registrant is to be ended or not. When the setting is to be ended (YES in step S), the processing returns to step S. Otherwise (NO in step S), the process returns to step S.
1220
610
640
1222
610
1224
610
In step S, control unit retrieves the flagged ringing tone from storing unit . In step S, control unit accepts an input of selection of the tune to be set as the ringing tone. In step S, control unit accepts an input of the instruction for automatically executing the setting of assignment of the ringing tone to the registrant.
1226
610
1226
1228
1226
1232
In step S, control unit determines whether the selected tunes include a flagged tune(s) or not. When the flagged tune is present (YES in step S), the process proceeds to step S. Otherwise (NO in step S), the process proceeds to step S.
1228
610
In step S, control unit displays a pop-up screen for confirmation of the automatic setting. Contents on the pop-up screen include a message “MANUALLY SET RINGING TONE IS SELECTED. DO YOU WANT AUTOMATIC SETTING?”.
1230
610
1230
1232
1230
1222
In step S, control unit determines whether the instruction for the automatic setting is entered or not. When the instruction is entered (YES in step S), the process proceeds to step S. Otherwise NO in step S), the process returns to step S.
1232
610
1234
610
1236
610
In step S, control unit retrieves the flagged address book. In step S, control unit omits the retrieved data record in the address book from the targets of the automatic setting. In step S, control unit assigns the selected tunes to all the targets of the automatic setting in the address book. This assignment is implemented, e.g., in such a manner that the retrieved registrant data items and the ringing tones are arranged in an ascending order, and are associated with each other in a one-to-one relationship. If the registrants are different in number from the ringing tones, the first and following items in one group of fewer items are successively assigned again to the remaining items in the other group so that the assignment of all the data records is performed.
FIGS. 13 and 14
FIG. 13
Referring to , the concept of the assignment of the ringing tone to the registrant will now be described. illustrates a flow of processing performed by the user for assigning the ringing tones to the registrants.
940
1301
1305
1305
5
For example, as can be seen from a state A, flash memory stores the data registered in the address book and the ringing tones. For example, index keys - are given to the ringing tones, respectively. When index key is designated, the ringing tone of the title “MELODY ” is specified.
912
100
100
As can be seen in a state B, main display of mobile telephone displays initial screen contents for setting the ringing tone. This display is performed, e.g., by selecting “SET RINGING TONE” on the main screen. In this state B, when the user selects “MANUAL SETTING”, mobile telephone changes the screen contents to those for setting the ringing tone and the registrant by the user's operation.
912
1
912
As can be seen in a state C, main display displays the respective data records in the address book, and displays the screen for accepting the input of the ringing tone that is a target of the setting. In the state C, for example, “MELODY ” is set. In the state C, when the user performs input for fixing confirming the assignment of the ringing tone, main display displays the next record registered in the address book.
3
More specifically, as can be seen in a state D, data of another registrant (e.g., “TETSUJI”) is displayed. On this screen contents, the user can perform input of another ringing tone (e.g., “MELODY ”). By repeating the above operations, the user can set the ringing tone for the data of each registrant included in the address book.
940
1
3
When the above setting is completed, flash memory stores, as an index, the data representing that the user performed the manual setting, as can be seen in a state E. For example, “MELODY ” and “MELODY ” are flagged. From these flags, it can be recognized that each melody is already assigned to a certain registrant, when the automatic processing is performed later.
FIG. 14
610
100
912
940
950
illustrates a state transition realized when control unit performs processing to assign ringing tones to the address book registrants. First, as can be seen in a state A, when the “SET RINGING NOTE” is selected on the menu screen of mobile telephone , main display displays the screen contents for accepting selection of “MANUAL SETTING” and “AUTOMATIC SETTING”. When the user performs an operation of selecting the “AUTOMATIC SETTING”, the data stored in flash memory is read to RAM in response to the user's operation.
950
912
610
More specifically, as can be seen in a state B, a flag is already annexed to the ringing tone of which assignment is already performed, and therefore the data thereof is referred to in the automatic setting processing. Based on the data stored in RAM , main display displays a list of the ringing tones that can be set by control unit .
1
3
1
3
As can be seen in a state C, the ringing tones other than “MELODY ” and “MELODY ” that are already assigned bear checkmarks in checkboxes for representing that these can be assigned. When the user places a checkmark in the checkbox, e.g., of “MELODY ” or “MELODY ”, a confirmation for notification to that effect is displayed in a pop-up screen.
912
As can be seen in a state D, main display displays a message “MANUALLY SET RINGING TONE IS SELECTED. DO YOU WANT AUTOMATIC SETTING?”. Since this message is displayed, the user who unintentionally placed a checkmark can confirm the assignment before executing it so that the assignment that is not intended by the user can be prevented.
FIG. 14
950
2
4
5
950
Referring to the state C in again, when the user who completed the selection of the ringing tone entered the instruction for the assignment, the ringing tones are assigned to the registrants who are not assigned the ringing tones. More specifically, as can be seen in a state E, the data of the address book that is the target of the assignment processing is read to RAM . As can be seen in the state C, the data for specifying the ringing tones (MELODY , MELODY AND MELODY ) that are selected as the assignment targets is written in an area reserved in RAM .
950
For the sake of simplicity, three address book data items and three ringing tones are present without being associated in this example. In this case, according to the arrangement, e.g., of the address book data items, the data items of the ringing tones are associated with them in the one-to-one relationship. Alternatively, a random number generating circuit may be used to provide the arrangement in a random fashion, whereby the assignment can be performed without depending on the initial arrangement or order of the data records read into RAM . When the records of the address book data are different in number from the ringing tones, the data items that are fewer than the items in the other group may be assigned repeatedly to the items in the other group so that the assignment of all the records is performed.
950
940
912
When the assignment based on the data in RAM is performed, flash memory nonvolatilely stores the data. When the user executes the operation for displaying the address book, main display displays the address book data that are already assigned the ringing tones, e.g., as can be seen in a state F. Further, the user operates the mobile telephone to enter the instruction for changing the data items in the address book so that another registrant is displayed (state G).
100
610
As described above, mobile telephone according to the embodiment of the invention can store the association between the registrants in the address book and the ringing tones. The association is achieved by the processing of control unit according to the user's instruction. Thereby, the user is not required to set the ringing tone for each registrant. Therefore, when a plurality of ringing tones are present and, for example, when many ringing tones obtained by the download are present, it is possible to remarkably reduce a load that may be imposed due to the setting to the user. The mobile telephone and other mobile communication terminals have a button operation unit or a keyboard smaller than an ordinary keyboard. Therefore, the operability or manipulatability is lower than that of a computer having ordinary keyboards. According to the invention, however, the user can enter the instruction for the automatic setting, whereby the assignment of the ringing tones to the registrants is executed so that the setting can be implemented by each operation.
More specifically, the user can select desired ringing tones at any time, and can associate the ringing tones in the selected range with the registrants in the address book. Thereby, the user can easily recognize the use and nonuse of the ringing tones that were externally obtained by the download or other methods, and can easily delete the unnecessary ringing tones. This can improve the situation of use of the data storage area of the memory.
The downloaded contents can be effectively used. Since the assignment can be performed easily, the user can easily determine whether the unassigned contents are to be deleted or not, after the assignment processing is executed. Consequently, unnecessary data can be deleted, which promotes effective use of the memory.
Since the convenience is improved as described above, the downloaded contents increase, which contributes to development of industries relating to the contents distribution.
Since the reproduction contents can be collectively and easily changed and, for example, all the contents can be replaced with contents relating to Christmas so that more interesting terminals can be provided.
100
The manner of changing the contents is not restricted to the above. For example, instead of replacing all the contents, the contents that are selected for deletion by the user of mobile telephone can be replaced with the contents that are selected by the user for new assignment targets.
940
100
610
940
More specifically, when the user selects the contents to be deleted and the contents for the new assignment, the data for identifying each selected contents is stored in flash memory . When mobile telephone accepts the input of the instruction for changing the contents, control unit changes, based on the instruction, the contents associated with the registrants from the contents selected for deletion to the contents selected as the new assignment targets. Flash memory stores the data for identifying the registrant and the data for identifying the changed contents in the associated fashion. Thereby, the assignment of the selected contents is completed. In this case, the contents to be changed are not specifically restricted, and only one or a plurality of contents may be selected.
A second embodiment of the invention will now be described. The mobile telephone according to the embodiment differs from that of the first embodiment in that the ringing tone can be assigned to each group of the registrants constituting the address book. The mobile telephone according to the second embodiment has the same hardware structure as the mobile telephone according to the first embodiment, and also has the same functions unless otherwise specified. Therefore, description thereof is not repeated.
FIG. 15
FIG. 15
1500
1500
1500
710
720
730
740
1550
760
1550
1552
1554
Referring to , a control unit implementing the mobile telephone according to the second embodiment will be described below. is a block diagram illustrating a functional structure of control unit . Control unit includes input unit , instruction detecting unit , flag setting unit , ringing tone retrieving unit , a group-by-group basis ringing tone assigning unit and output unit . Group-by-group basis ringing tone assigning unit includes a group-assignment data producing unit and an assignment data writing unit .
1550
710
740
1552
1554
1552
940
Group-by-group basis ringing tone assigning unit assigns the ringing tone to each of the group of registrants constituting the address book based on the instruction entered via input unit and the ringing tone retrieved by ringing tone retrieving unit . More specifically, group-assignment data producing unit determines the ringing tone to be associated with each group, and produces assignment data that associates the group with the data for identifying the determined ringing tone. Assignment data writing unit stores the data produced by group-assignment data producing unit in flash memory or another storage device.
FIG. 16
FIG. 16
940
940
1610
1618
Referring to , the data structure of the mobile telephone according to the second embodiment will now be described. conceptually illustrates a form of data storage in flash memory . Flash memory includes areas - for storing the data associated with the ringing tones.
1610
1612
1614
1616
1618
1618
1618
Area stores the data for specifying the data record for each ringing tone. Area stores the name of the ringing tone. Area stores the data file of the ringing tone. Area stores the name of the artist playing the tune of the ringing tone. Area stores the flags defining the attributes of the ringing tones. When a flag is not specified in area , area stores data, e.g., of “NULL”.
940
1620
1628
1620
1622
1624
1626
100
620
920
1628
1628
Flash memory further includes areas - for storing the data associated with the registrants constituting the address book. Area stores the data for identifying each data record constituting the address book. Area stores the name of the registrant in question. Area stores the telephone number. Area stores the name of the group to which the registrant belongs. The name of the group may be entered by the user of mobile telephone via input unit and more specifically by operating various buttons on main operation unit . Also, a plurality of group names for it may be prepared in advance. Area stores the flags defining the attributes of the registrant data. When the value of flag is not specified, area stores the data of “NULL”.
940
1612
FIG. 16
The manner of data storage in flash memory is not restricted to that shown in . For example, the manners of storage of the ringing tones may be stored in a distributed fashion in a plurality of areas, using the ringing tone names stored in area as keys. In this case, the data items are associated with each other with reference to the key (the ringing tone name in this case) included in each area. Therefore, by specifying any one of the numbers, the ringing tone can be retrieved.
FIG. 16
FIG. 16
The data about the registrants constituting the address book may be stored in the form other than that illustrated in . The items constituting the address book are not restricted to those illustrated in . For example, a plurality of telephone numbers may be associated with each registrant. In addition to the telephone numbers, the e-mail address may be associated with the registrant.
FIG. 17
FIG. 17
1500
Referring to , description will now be given on a control structure of the mobile telephone according to the second embodiment. is a flowchart illustrating a procedure of processing executed by control unit . The processing similar to that of the first embodiment bears the same step numbers. Therefore, description thereof is not repeated.
1710
1500
940
1720
1500
620
1730
1500
In step S, control unit registers the information of the registrants constituting the address book in flash memory on a group-by-group basis. In step S, control unit accepts an input for selecting the group based on the input performed via input unit . In step S, control unit accepts an input of the instruction for selecting the tune to be set as the ringing tone for the selected group.
1740
1500
620
1500
1740
1224
1740
1720
In step S, control unit determines whether the tune selection for each group has ended or not. This determination is performed based on whether the instruction for notifying of the end of the tune selection is performed via input unit or not. When control unit determines that the tune selection for each group ends (YES in step S), the process proceeds to step S. Otherwise (NO in step S), the process returns to step S.
1750
1500
In step S, control unit executes the processing of assigning all the automatic setting target tunes and the selected tunes to the respective groups in connection with the registrants constituting the address book. In this processing, as already described in connection with the first embodiment, the data items, e.g., for identifying the groups are arranged in the ascending order, the data items for identifying the selected tunes are likewise arranged in the ascending order and these kinds of data items are associated with each other in the one-to-one relationship. In this case, when the number of groups is larger or smaller than that of the selected tunes, the processing returns to the initial step for repeating the one-to-one assignment.
FIG. 18
FIG. 18
FIG. 16
FIG. 18
FIG. 18
1810
1820
Referring to , description will now be given on the assignment of the ringing tones for respective groups in the mobile telephone according to the embodiment. illustrates correspondence between the groups and the registrants in the data illustrated in . An area stores the group names. An area stores the registrants included in each group. In the example illustrated in , the registrants are divided into six groups (unspecified, family, school, part-time job, local and shop). The number of the groups to be associated with the ringing tones is not restricted to that in .
1500
1500
In the group structure described above, the ringing tone is assigned to every group. In this case, the assignment is not restricted to that executed by the processing of control unit , and may be performed manually by the user of the mobile telephone for only the specific registrants (i.e., by the user's operation). In this case, flags are set so that control unit may discriminate between the processing targets and the untargeted items.
FIG. 19
FIG. 19
940
940
1910
1940
Referring to , description will now be given on the manner of using the flag. illustrates a form of the data storage in flash memory . When the user performs the operation to instruct the execution of the processing for assigning the ringing tones to the respective groups, flash memory reserves areas to for storing the data.
1910
1920
1930
1940
1500
Area stores index keys for identifying the ringing tones. Area stores the data of the ringing tones. Area stores the registrants set by the user. Area stores flags to which control unit refers for executing the processing.
1
1
1940
4
5
For example, the user manually assigns ringing tone “MELODY ” of which index key is “” to the registrant “MOTHER”. Therefore, a flag B is set in area for representing the fact that the above setting is performed. Likewise, the data is stored for the ringing tones of which index keys are “” and “”, respectively.
FIG. 20
FIG. 20
912
Referring to , description will now be given on a manner of the screen display of the mobile telephone according to the embodiment. illustrates changes in screen contents of main display .
912
2010
912
2020
920
As can be seen in a screen A, when the user performs an input operation for setting the ringing tone, main display displays a “ringing tone setting” screen. When the user selects a region representing “AUTOMATIC SETTING” in the display, the displayed contents on main display change into “AUTOMATIC SETTING” screen represented as a screen B. The foregoing six groups are displayed on this screen. This state may be configured to allow the selection of the group to be handled as the target of the assignment. Alternatively, all the groups that are currently present may be handled as the assignment targets. When the user selects a region representing “ENTER” in the above display, and depresses the button on main operation unit , the screen for selecting the ringing tone to be assigned is displayed.
912
940
1
4
5
1500
More specifically, as can be seen on a screen C, main display displays the screen contents representing “RINGING TONE”. On its screen, a list of the ringing tones stored in flash memory is displayed. Checkboxes for accepting the input of instructions for selection are annexed to the respective ringing tones. The checkmarks are not placed on “MELODY ”, “MELODY ” and “MELODY ”. This represents that these are not the targets of the assignment by control unit .
1500
1
4
5
2
In this display, the target of the assignment by control unit can be changed by annexing the checkmark to the ringing tone (“MELODY ”, “MELODY ” and/or “MELODY ”, as is done on “MELODY ”. Conversely, the checkmark may be removed from the ringing tone that has already bearing the checkmark, whereby the melody can be removed from the assignment targets.
2030
912
In the above display, when the user selects the ringing tone and performs the operation of selecting a region of “ENTER”, main display displays the screen for confirmation.
5
912
2040
For example, when the user performs the operation of selecting “MELODY ” by placing the checkmark, main display displays in a text display region a message “MANUALLY SET RINGING TONE IS SELECTED. DO YOU WANT AUTOMATIC SETTING?”, as can be seen on a screen D. When this message is displayed, the user of the mobile telephone can confirm that the ringing tones that are intentionally selected by the user, i.e., the ring tones other than the default and thus preselected ringing tones are handled as the targets of the assignment.
FIG. 21
FIG. 21
950
950
2110
2130
Referring to , description will now be given on the result of the assignment of the ringing tone. represents a form of storage, in RAM , of the data produced by completing the processing of assigning the ringing tones. RAM includes areas - storing the data for the assignment.
2110
1810
1626
940
FIG. 18
FIG. 16
Area stores the group names. This data corresponds to the data represented in area in . More specifically, when the assignment processing is instructed, the data is retrieved from area () in flash memory , and is extracted as the group included in the address book.
2120
1820
1622
940
2120
FIG. 18
Area stores the names of the registrant. This data corresponds to that represented in area of . When the instruction for the assignment is issued, the data is retrieved from area of flash memory , and the retrieved data items are associated on the group-by-group basis, and are successively stored in area .
2130
1750
2130
Area stores the data for identifying the ringing tone that is set by the processing of assigning the ringing tones to the groups. More specifically, when the processing is executed in step S, the ringing tones of the registrants are stored in area .
FIG. 22
8
9
Referring to , description will now be given on the assignment of the ringing tones to the registrants in each group. When the ringing tones are larger in number than the groups, different ringing tones can be set for the respective registrants included in the same group. For example, the group “FAMILY” includes three registrants, i.e., a father, a sister and a brother. After the forgoing assigning processing, two ringing tones “MELODY ” and “MELODY ” can be assigned to this group. Only one of the ringing tones may be assigned to the group, or all the ringing tones may be assigned to the respective ringing registrants in the group. In this case, the ringing tones and the registrants are associated with each other in the one-to-one relationship as already described, and thereby all the registrants are assigned the ringing tones. When the number of the ringing tones is different from that of the registrants, the data items identifying the ringing tones are successively assigned in the ascending order to the respective data items identifying the registrants so that the ringing tones can be assigned to all the registrant.
When the mobile telephone having the above assigned data receives an incoming call, the mobile telephone reads the data of the ringing tone associated with the group of the caller, and outputs the sound. Therefore, the user of the mobile telephone can easily presume the group to which the caller belongs.
Even when there are many registrants, the ringing tones can be easily set. Therefore, as compared with the case where independent setting is performed for each registrant, fewer operations are required for selecting the ringing tones that are the targets of the setting by the control unit of the mobile telephone.
The hierarchy of the registrants and the groups is not restricted to that illustrated in this embodiment. The groups may have a hierarchical structure including two or more levels. A higher group containing the groups may be present. In this case, the ringing tone can be assigned to each group belonging to the highest level, and can also be assigned to each of the groups included in another group.
A third embodiment of the invention will now be described. A mobile telephone of the third embodiment differs from those of the foregoing embodiments in that the association can be made based on the attributes of the registrants in the address book and the attributes of the ringing tones. More specifically, the music distribution server device in this embodiment distributes, in addition to the ringing tones, the attributes that are added in advance to the ringing tones. These attributes include a type (pops, classical, rock, instrument and others) of the ringing tones as well as a gender, age or age group, hobby or another taste, kind of occupation and/or the like of the user of the ringing tone. When the mobile telephone obtains the ringing tones bearing the above attributes, it associates the ringing tones with the registrants with reference to such attributes, using the attribute of the address book registrant as a key.
FIG. 23
FIG. 23
2310
2310
Referring to , description will now be given on a control unit implementing the mobile telephone according to the third embodiment. is a block diagram illustrating a functional structure of control unit . The same portions as those in the foregoing embodiments bear the same reference numbers, and description thereof is not repeated.
2310
2350
610
2350
2351
2352
2351
2354
2352
940
FIG. 7
Control unit includes a registrant-by-registrant basis ringing tone assigning unit in addition to the structures of control unit illustrated in . Registrant-by-registrant basis ringing tone assigning unit includes a matching unit associating the attributes of the ringing tones with the attributes of the registrants in the address book, an assignment data producing unit producing the data used for assigning the ringing tones to the registrants based on a result of the association by matching unit , and an assignment data writing unit that writes the data produced by assignment data producing unit into flash memory .
FIG. 24
FIG. 24
250
200
250
2410
2460
Referring to , description will now be given on the data structure of the server device that can distribute the ringing tones to the mobile telephones according to the embodiment. illustrates a form of the data storage on hard disk of computer system that functions as a music distribution server device for distributing the ringing tones bearing the attributes. Hard disk includes areas - for storing the data associated with the respective ringing tones.
2410
2420
2430
2440
2450
2460
2410
Area stores the data specifying each data record. Area stores the name of the ringing tone. Area stores the data file of the ringing tone. Area stores the name of the player of the tune included in the ringing tone. Area stores the attribute associated with the ringing tone (e.g., the “relation” of the registrant associated with the ringing tone with respect to the user of the ringing tone). Area stores other tag information associated with the ringing tone. By specifying the number in area , one of the ringing tones is retrieved.
250
FIG. 24
The form of data storage on hard disk is not restricted to that shown in . More specifically, the data may be stored in a plurality of areas in a distributed fashion provided that such a configuration is employed that can perform the specification according to the name of the ringing tone or another data item.
200
250
When computer system receives the distribution request for the ringing tone, it distributes the data including the relation with respect to the ringing tone based on the data stored on hard disk , e.g., in the form of packets.
FIG. 25
FIG. 25
940
940
2510
2550
Referring to , description will now be given on a data structure of the mobile telephone according to the embodiment. illustrates a form of the data storage in flash memory . Flash memory includes areas - storing the data associated with the registrants in the address book.
2510
2520
2530
2540
2550
2550
Area stores the data for specifying each registrant. Area stores the name of the registrant. Area stores the telephone number of the registrant. Area stores the attribute (e.g., “relation” between the registrant and the user of the mobile telephone) associated with the registrant. Area stores the name of the ringing tone associated with the registrant. When the registrant is not associated with any ringing tone, area stores, e.g., “NULL”.
FIG. 26
FIG. 26
950
950
2610
2640
Referring to , description will now be given on a data structure of the mobile telephone at the time of the ringing tone assignment. illustrates a form of the data storage in RAM . In the operation of associating the ringing tone with the registrant, RAM reserves areas - for storing the data used for the association.
2610
2620
2630
2450
2640
940
950
FIG. 24
Area stores data specifying the records including the respective ringing tones. Area stores the names for identifying the ringing tones. Area stores the attribute (e.g., the relation that is the same as that illustrated in area of ) associated with the ringing tone. Area stores the flags for specifying the states of the ringing tones. These data items are read from flash memory into RAM , e.g., after the input of the assignment instruction for the ringing tone.
FIGS. 27 and 28
FIGS. 27 and 28
2310
Referring to , description will now be given on a control structure of the mobile telephone according to the embodiment. are flowcharts illustrating procedures of the processing executed by control unit .
2710
2310
940
In step S, control unit accepts an input of the “relation” for each of the registrants constituting the address book, and stores the “relation” in the area reserved in flash memory . Thereby, the registrant is associated with the “relation” that is an example of the attribute of the registrant. The “relation” defines the relation or connection between the user of the mobile telephone and the registrant, using the user as the reference.
2720
2310
940
In step S, control unit associates the information “relation” that is annexed to the downloaded ringing tone with the ringing tone, and stores it in flash memory . Consequently, the ringing tone associated with the relation is specified when the relation is specified.
2800
2310
In step S, control unit executes matching processing to be described later. When this processing is executed, the registrants and the ringing tones are associated with each other, using the “relation” that is one of the attributes included in the address book as a key.
FIG. 28
2310
2810
2820
2310
2820
2830
2820
2870
As illustrated specifically in , control unit extracts the data record, of which “relation” is “xxx”, from the data of the registrants included in the address book in step S. In step S, control unit determines whether one or more data records of the relation of “xxx” are extracted or not. When one or more records are present (YES in step S), the process proceeds to step S. Otherwise (NO in step S), the process proceeds to step S.
2830
2310
2840
2310
2840
2850
2840
2860
In step S, control unit extracts the data of which “relation” annexed to the ringing tone is “xxx”. In step S, control unit determines whether one or more records of the ringing tones are extracted or not. When one of more records is extracted (YES in step S), the process proceeds to step S. Otherwise (NO in step S), the process proceeds to step S.
2850
2310
In step S, control unit performs the matching between the data items of the registrants in the extracted address book and the extracted ringing tones. More specifically, the matching is performed by associating, in the one-to-one relationship, the address book data items with the ringing tone data items arranged in the ascending or descending order.
2860
2310
2310
In step S, control unit selects one of the tunes that are determined as the automatic assignment targets by control unit . This selection may be performed by fixedly selecting the record in a leading position from among the plurality of records. Alternatively, random selection may be performed based on random number data generated by the random number generating circuit as described before.
2870
2310
2870
2870
2880
2880
2310
2810
In step S, control unit determines whether the matching is completed for all the “relation” items or not. When the matching is completed for all the “relation” items (YES in step S), the process returns to the main processing. Otherwise (NO in step S), the process proceeds to step S. In step S, control unit sets the “relation” to the next “relation” (i.e., the data record that is present in the next position on the data record). Thereafter, the control returns to step S, and similar processing is executed again.
FIG. 29
FIG. 29
Referring to , the data structure of the mobile telephone according to the embodiment will be further described. illustrates the state that was set by the user before the assignment of the ringing tones is performed based on the “relation”.
2250
2
2310
In an area , the ringing tones are already assigned to the registrants “MOTHER”, “MAKI” and “JUNPEI” as well as each data items in “PART-TIME JOB” of the address book. For example, the ringing tone “MELODY ” is already assigned to “MOTHER”. Based on the above data, control unit executes the ringing tone assignment processing.
FIG. 30
FIG. 29
950
2310
950
3010
3020
3010
3020
2550
940
950
illustrates a form of the data storage in RAM . When the user instructs control unit to perform the assignment processing, RAM reserves areas and for storing the data used in the assignment processing. Area stores the names of the registrants of the assignment targets. Area stores the “relation” assigned to each registrant. These data items are obtained by extracting the data records including “NULL” in area form the data stored in flash memory (). Therefore, RAM does not store the foregoing registrants (“MOTHER”, “MAKI”, “JUNPEI” and persons relevant to “PART-TIME JOB”) who are already assigned the ringing tones.
950
3030
3040
2550
2
4
7
13
3030
2310
FIG. 29
Likewise, RAM temporarily stores the data of the ringing tones. More specifically, an area stores the title of the ringing tone. Area stores the “relation” associated with the ringing tone. As illustrated in , area has already stored the ringing tones “MELODY ”, “MELODY ”, “MELODY ” and “MELODY ”. Therefore, area stores the other ringing tones as the targets of the automatic assignment to be performed by control unit .
FIG. 31
FIG. 31
940
Referring to , description will be given on a result of the assignment based on the relation in the mobile telephone according to the embodiment. illustrates a form of the data storage in flash memory after the association is made between the registrants and the ringing tones.
2510
2540
2550
FIG. 25
The data illustrated in areas - are the same as those illustrated in , and therefore description thereof is not repeated. Area stores the registrants that are assigned to the respective registrants. Thereby, when the mobile telephone receives an incoming call, it generates the ringing tone corresponding to the registrant.
FIG. 32
3210
3220
Referring to , description will be given on the matching between the ringing tones and the registrants, using the “relation” as a key. An area stores the relation corresponding to each registrant in the address book. An area includes the ringing tones that are assigned the same relation as the relation. In this case, the relation “YOUNGER” does not match any ringing tone so that the data for identifying the ringing tone is not included. Therefore, a prespecified ringing tone may be assigned to it as a default. For example, the ringing tone forming the first data record in the database of the ringing tones may be assigned thereto.
3230
2310
3230
3230
2310
An area includes the names of the registrants who are the targets of the assignment performed by control unit . Each registrant is associated with the relation. As can be seen from the names in an area , area does not include “MOTHER”, “MAKI”, “JUNPEI” and people relevant to “PART-TIME JOB”, i.e., the targets to which the user of the mobile telephone has already assigned the ringing tones. As described above, the setting by the user is independent of the setting by control unit when the ringing tones are associated with the registrants.
In the mobile telephone according to the embodiment, as described above, the control unit associated the registrants and the ringing tones with each other using the “relation” as a key. The user can easily have an idea about the “relation”. By setting the ringing tones based on the “relation” about which the user can easily have the idea, the user who listened to the ringing tone can easily recollect the “relation”. Therefore, the association by which the user can easily specify the caller is implemented without difficulty.
A fourth embodiment of the invention will now be described. A mobile telephone according to the fourth embodiment differs from that of the third embodiment in that the association of the ringing tones with the registrants is performed using a “genre” as a key. The mobile telephone according to the fourth embodiment has the same hardware structure as that of the third embodiment, and the functions thereof are the same. Therefore, description thereof is not repeated.
The “genre” is one of the attributes, and is an item used for classification according to type of sound, music and image, hobby of the mobile telephone users, sports, movies or another field. In the data structure, the “genre” is used instead of the “relation” as the data item associated with each registrant. Further, in the music distribution server device, the “genre” is associated with each ringing tone.
As described above, the mobile telephone according to the embodiment can associate the ringing tone with the registrant, using the “genre” as a key. The items used as the key may be defined in advance, or may be newly registered by an operator of the music distribution server device or the user of the mobile telephone. In contrast to the foregoing “relation”, an item reflecting the user's taste can be set as the “genre” so that the association can be established in various manners. The user can enjoy such association by simple operations.
A fifth embodiment of the invention will be described below. A mobile telephone according to the fifth embodiment differs from the foregoing embodiments in that the assignment of the ringing tones is performed according to the number of the incoming and outgoing calls per registrant in the address book. According to this embodiment, newer tunes can be reproduced more frequently.
FIG. 33
FIG. 33
FIG. 7
3310
3310
3310
3320
3350
740
3330
940
3350
3352
3354
940
Referring to , description will now be given on a control unit implementing the mobile telephone according to the embodiment. is a block diagram illustrating a functional structure of control unit . In addition to the structures shown in , control unit includes an incoming and outgoing call history obtaining unit obtaining a history of the incoming and outgoing calls per registrant in the address book, a registrant-by-registrant basis ringing tone assigning unit that assigns the ringing tones to the respective registrants based on the obtained history and the ringing tones retrieved by ringing tone retrieving unit , and an incoming and outgoing call history recording unit that stores the history of each of the incoming and outgoing calls of the mobile telephone in an area reserved in flash memory . Registrant-by-registrant basis ringing tone assigning unit includes an assignment data producing unit that produces data associating the ringing tones with the registrants according to the number of the incoming and outgoing calls, and an assignment data writing unit that associates the produced data with each registrant and writes it in flash memory .
FIG. 34
FIG. 34
940
940
3410
3418
Referring to , description will now be given on a data structure of the mobile telephone according to the embodiment. illustrates a form of the data storage in flash memory . Flash memory includes areas - storing a record of the incoming and outgoing calls obtained for each registrant constituting the address book.
3410
3412
3414
3416
3418
3410
3418
3310
3410
More specifically, area stores the data specifying the records included in the database of the incoming and outgoing calls. Area stores the names of registrants. Area stores the telephone numbers used for the calling. Area stores the numbers of the outgoing calls that have been made. Area stores the numbers of incoming calls that have been received. The data items stored in areas - are associated with each other. Therefore, control unit can designate the data stored in area to obtain the history of the incoming and outgoing calls.
940
3420
3428
3420
3422
3426
3428
3420
3428
3420
Further, flash memory includes areas - storing the data that represents the history of the download of the ringing tones. Area stores the data specifying the database relating to the history of download. Area stores the names of the downloaded ringing tones. Area stores the names of each player playing the tune of the ringing tone. Area stores date and time when the download is performed. The data items stored in areas - are associated with each other. Therefore, the intended date and time of the downloading of the ringing tone can be obtained by designating the data stored, e.g., in area .
FIG. 35
FIG. 35
3310
Referring to , a control structure of the mobile telephone according to the embodiment will now be described. is a flowchart illustrating a procedure of the processing executed by control unit .
3510
3310
940
3550
3310
3530
3310
950
3540
3310
3550
3310
In step S, control unit reads the date and time of the downloading of the ringing tone from flash memory . In step S, control unit reads the number of the incoming and outgoing calls per registrant in the address book. In step S, control unit sorts the registrants constituting the address book in the ascending order of the number of incoming and outgoing calls. More specifically, RAM keeps the registrants in the ascending order. In step S, control unit assigns the ringing tones in the above order, respectively. In step S, control unit writes the data specifying the ringing tones and associated with the registrants in the address book. Thereby, the registrants are associated with the ringing tones according to the number of the incoming and outgoing calls.
3310
According to the mobile telephone of this embodiment, as described above, control unit automatically sets the ringing tones for the registrants arranged in the descending order of the possibility of ringing. Thereby, the user can associate, by a simple operation, the intended tunes with the registrants who may frequently call the user. Therefore, the user can enjoy such tunes.
A sixth embodiment of the invention will now be described. The mobile telephone of the sixth embodiment differs from the foregoing embodiments in that the ringing tones can be assigned to the registrants constituting the address book, using the players of the ringing tones as a “key”. The mobile telephone according to the sixth embodiment has the same hardware structure as those of the foregoing embodiments, and the functions thereof are the same. Therefore, description thereof is not repeated.
FIG. 36
FIG. 36
FIG. 7
3610
3610
3610
3650
3650
3651
3652
740
3654
3652
940
Referring to , description will now be given on a control unit implementing the mobile telephone according to the sixth embodiment. is a block diagram illustrating a functional structure of control unit . In addition to the structure illustrated in , control unit includes a registrant-by-registrant basis ringing tone assigning unit that can associate the ringing tones with the registrants for each player of the ringing tone. Registrant-by-registrant basis ringing tone assigning unit includes an artist extracting unit obtaining a player associated with the ringing tone, an assignment data producing unit that assigns the ringing tone to the registrant based on the ringing tone retrieved by ringing tone retrieving unit and the extracted player, and an assignment data writing unit storing the data produced by assignment data producing unit in flash memory in a fashion associated with the respective registrants in the address book.
FIG. 37
FIG. 37
940
940
3710
3718
Referring to , the data structure of the mobile telephone according to the embodiment will now be described. illustrates a form of the data storage in flash memory . Flash memory includes areas - for storing the data associated with the ringing tones.
3710
3712
3714
3716
3718
3710
3718
Area stores the data for identifying each ringing tone. Area stores the names for identifying the ringing tones. Area stores the data files of the ringing tones. Area stores the artist names representing the players of the ringing tones. Area stores the flags representing the states of the ringing tones. The data items stored in areas - are associated with each other. Therefore, by designating any one of the items, the ringing tone corresponding to designated item can be specified.
940
3720
3732
3720
3722
3724
3726
3728
3730
Further, flash memory includes areas - storing the data that are associated with the registrants constituting the address book. Area stores the data specifying the records in the database of the address book. Area stores the names of the registrants. For example, areas and store the telephone numbers of the registrants. Area stores the e-mail addresses. Area stores the artist names assigned to the registrants. This data is externally entered by the user of the mobile telephone.
3732
3732
3720
3728
Area stores the names of the ringing tones assigned to the respective registrants. Area is blank or stores “NULL” before the assignment of the ringing tones. The data items illustrated in areas - can be easily understood as a structure of a telephone directory by those skilled in the art, and therefore detailed description is not performed.
FIG. 38
FIG. 38
3610
Referring to , description will now be given on a control structure of the mobile telephone according to this embodiment. is a flowchart illustrating a procedure of the processing executed by control unit . This processing is executed when the assignment of the ringing tone to the registrant is instructed.
3810
3610
3730
940
3820
3610
3716
3830
3610
3830
3840
3830
3860
In step S, control unit reads the artist name (area ) from the address book in flash memory . In step S, control unit reads the artist name (area ) from the database of the ringing tones. In step S, control unit determines whether the name of the artist registered in the address book matches with the name of the artist associated with the ringing tone or not. When the names match with each other (YES in step S), the process proceeds to step S. Otherwise (NO in step S), the process proceeds to step S.
3840
3610
3610
3732
3850
3610
3710
3718
3840
3718
In step S, control unit associates the name of the ringing tone of the matching artist with the address book. More specifically, control unit write the name of the ringing tone in area of the registrant. In step S, control unit associates the ringing tones with the respective registrants in accordance with the names of the selectable ringing tones. This association is first made, e.g., on the ringing tones that are not yet assigned to the registrants prior to those already assigned. Alternatively, the association is made in the ascending or descending order of the number indicated in area . In this case, the determination whether the assignment is already performed or not can be performed by setting the flags in area . More specifically, the ringing tone that is assigned in step S is changed have the data item that represents the completion of the flag setting in area . Owing to this manner, the unassigned ringing tones are likewise associated with the address book so that such a situation can be prevented that the downloaded ringing tone is not reproduced.
3610
According to the mobile telephone of the embodiment, as described above, control unit can make the associated of the ringing tones based on the key formed of the artist associated with each registrant by the user. By this association, the user can listen to the tunes of various artists as the ringing tones in connection with each registrant.
When the data of the artist is not annexed to the downloaded ringing tone, this data is not used as the target of the ringing tone assignment in this embodiment. When the “artist” is not set for any one of the registrants in the address book, one of the ringing tones selected as the target of the automatic assignment may be selected as the ringing tone to be associated with the registrant. In this case, the ringing tone, e.g., in the first or last position according to the data record number is selected. In view of the above case, the ringing tone that is preselected by the user may be associated with the registrant that is not yet assigned the ringing tone.
A seventh embodiment of the invention will now be described. The mobile telephone according to this embodiment differs from the embodiments already described in that the mobile telephone has a function of feeding back the information of the user to the music distribution server. The mobile telephone according to this embodiment has the same hardware structure as those already described, and the functions thereof are also the same. Therefore, description thereof is not repeated.
FIG. 39
FIG. 39
FIG. 7
3910
3910
3910
3920
3930
630
3920
Referring to , description will now be given on a control unit implementing the mobile telephone according to the embodiment. is a block diagram illustrating a functional structure of control unit . Control unit includes, in addition to the structures illustrated in , a feedback information producing unit producing the user information to be transmitted to the music distribution server device, and a transmission instructing unit that issues an instruction to communication unit to transmit the information produced by feedback information producing unit .
FIGS. 40 and 41
FIGS. 40 and 41
3910
Referring to , description will now be given on a control structure of the mobile telephone according to the embodiment. are flowcharts illustrating procedures of the processing executed for transmitting the feedback information by control unit . The steps of the same processing as those in the embodiments already described bear the same step numbers. Therefore, description thereof is not repeated.
4010
3910
1214
3910
1214
4020
1214
1210
In step S, control unit sets a flag B on the assigned ringing tone, and sets a flag A on the data of the corresponding registrant in the address book. In step S, control unit determines whether individual setting is to be ended or not. When the setting is to be ended (YES in step S), the process proceeds to step S. Otherwise (NO in step S), the process returns to step S.
4020
3910
4020
4100
4020
1206
4100
3910
In step S, control unit determines whether “OK” is entered or not, from the feedback of the result of manual setting. When the “OK” is entered (YES in step S), the process proceeds to step S. Otherwise (NO in step S), the process returns to step S. In step S, control unit executes the feedback processing to be described later. When this processing is executed, the information of the “relation” associated with the registrant and the ringing tone that are associated by the user of the mobile telephone is transmitted to the server device operated by the information provider that provides the service of distributing the ringing tones over the Internet or other communications lines.
4030
3910
4040
3910
4040
1228
4040
4050
In step S, control unit retrieves the ringing tone bearing flag B. In step S, control unit determines whether the selected tunes include a tune(s) bearing flag B or not. When the flagged ringing tone is present (YES in step S), the process proceeds to step S. Otherwise (NO in step S), the process proceeds to step S.
4050
3910
In step S, control unit retrieves the data record from the address book bearing flag A.
FIG. 41
3910
4110
4120
3910
4120
4130
4120
Referring to , control unit operates in step S to extracting one data record from the address book bearing flag A representing that the manual setting was performed. In step S, control unit determines whether the above data can be extracted or not. From this determination, it is possible to determine whether the record bearing the flag A is present or not. When it is determined that the above record could be extracted (YES in step S), the process proceeds to step S. Otherwise (NO in step S), the processing ends, and the processing returns to the main processing.
4130
3910
4140
3910
In step S, control unit adds the user information (age, gender and others) to the feedback information. In step S, control unit extracts the ringing tone that is set as the “relation” from the data included in the address book, and adds it to the feedback information. More specifically, the name of the ringing tone or the identification code predetermined for each ringing tone is added to the feedback information.
4150
3910
3910
4150
4170
4150
4160
In step S, control unit determines whether the feedback information has been produced for all the extracted data records or not. From this determination, control unit can determine whether the data not handled as the feedback target is present or not. When it is determined that all the data records are checked (YES in step S), the process proceeds to step S. Otherwise (NO in step S), the process proceeds to step S.
4160
3910
4140
In step S, control unit extracts one data record in the flagged address book bearing flag A. After this processing, the process returns to step S.
4170
3910
In step S, control unit transmits the produced feedback information to the music distribution server device. Thereafter, the process returns to the main processing.
FIG. 42
FIG. 42
4200
4200
4200
4210
4236
4210
4212
4214
4200
Referring to , description will now be given on data that is transmitted from the mobile telephone to the server device. conceptually illustrates a structure of data . Data includes areas - storing individual data items. Area stores a header. Area stores a destination address (i.e., data for specifying the location of the server device). Area stores a caller address (i.e., data for specifying the location of the mobile telephone that sends data ).
4216
4218
4200
Areas and store the attributes of the senders of data . For such attributes, the gender and ages are used. Other information may be used. For example, the user name that is preregistered in the music distribution server device may be included. The user name may be different from a real name and, e.g., a virtual name on the network.
4220
4224
4228
4232
4222
4226
4230
4234
4220
4222
4200
4236
4200
FIG. 42
FIG. 42
Areas , , and store the data for identifying the ringing tones of which relations are individually set by the user. In the example illustrated in , the “relation” is set for the four ringing tones by the user. Areas , , and store the data representing the relations set for each ringing tone. In connection with the information about the ringing tone that is to be fed back, when the ringing tone, e.g., set by the user's operation is one in number, the notification is performed for only areas and . When the user performs the settings about the ringing tone other that those illustrated in , data includes more items. Area stores the data representing the ending portion of data , e.g., as FCS (Frame Check Sequence). When the mobile telephone transmits the feedback information to the above server device, the server device takes out the respective items from the transmitted information, and accumulates them as a database.
FIG. 42
The structure of the above data is not restricted to that illustrated in . The format for transmitting the data is not particularly restricted. For example, it may be a form of a text file or another form.
FIG. 42
The details of the data transmitted from the mobile telephone to the server are not restricted to those illustrated in . For example, a user's place of residence, another district, hobby and/or other items may be transmitted. By transmitting many items as the feedback information from the mobile telephone to the server, the server device can compile the data based on fine units using such items.
The feedback information can be transmitted according to any timing. For example, when the download of the ringing tones is completed, the feedback information may be transmitted in response to the notification of the completion. Alternatively, the feedback information may be accumulated, and may be transmitted in response to the input for the transmission of the feedback information.
FIG. 43
FIG. 43
210
200
Referring to , the serve according to the embodiment will be described below. is a block diagram illustrating a structure of the function implemented by CPU of computer system implementing the server.
210
4310
120
4320
4330
4340
4320
4330
250
210
FIG. 4
CPU includes, in addition to the structures illustrated in , a feedback information reception detecting unit detecting the reception of the feedback information from the user of the mobile telephone based on the information that is externally obtained over network , a user information extracting unit extracting the user information from the feedback information, a registry information extracting unit extracting the registry information set by the user from the feedback information, and a ringing tone database updating unit storing the data extracted by user information extracting unit and registry information extracting unit in the areas reserved on hard disk . When CPU having the above structure receives the feedback information from the mobile telephone, the database of the ringing tones is updated based on the received information.
FIG. 44
FIG. 44
210
Referring to , description will now be given on a control structure of the computer system that can update the database of the ringing tones. is a flowchart illustrating a procedure of the processing executed by CPU .
4410
210
210
In step S, CPU detects the reception of the feedback information from the mobile telephone. The reception of the feedback information is performed by using the data of the format that is determined in advance for CPU and the mobile telephone.
4420
210
4320
4430
210
4330
4440
210
In step S, CPU operates as user information extracting unit and extracts the user information from the feedback information. In step S, CPU operates as registry information extracting unit and extracts one registry information item from the feedback information. In step S, CPU extracts the ringing tone information corresponding to the ringing tone and included in the registry information. The extracted information includes the name of the ringing tone, the name of the artist and the “relation” determined by the user of the mobile telephone with respect to the ringing tone.
4450
210
240
4460
210
4470
210
4470
4480
4470
4430
In step S, CPU adds one to a number A of the registrants corresponding to the gender and ages included in the user information. This processing is implemented in an area temporarily kept for this processing in RAM . In step S, CPU adds one to a number B of the registrants corresponding to the “relation” in the obtained registry information. In step S, CPU determines whether all the registry information included in the feedback information is extracted and processed or not. When it is determined that all the information is processed (YES in step S), the process proceeds to step S. Otherwise (NO in step S), the process proceeds to step S.
4480
210
250
In step S, CPU updates the database of the ringing tones included on hard disk and particularly updates the data items related to the ringing tones of about which the feedback information was transmitted. The update may be performed once a day, once a week or the like, and the cycles of update may be longer or shorter than the above.
FIG. 45
FIG. 45
250
250
4510
1
4510
2
4510
4510
n
Referring to , description will now be given on a data structure of the server having the function of updating the data records of the ringing tones. conceptually illustrates a structure of the database of the ringing tones on hard disk . Hard disk includes, as the database of the ringing tones, tables -, -, . . . and -(which may be collectively indicated by “” hereinafter) using, e.g., the ringing tone as the key.
4510
1
4
4520
FIG. 45
For example, in table -, ringing tone (Melody ) is associated with the data items “user information” and “registry information”. The user information includes “man” and “woman” as an attribute. Each attribute further includes ages as an attribute. For example, as illustrated in , sections corresponding respective ages are present for each gender. For each age, the table stores the number of users to which the melody was distributed. In a data group , each number of the persons is calculated per age, but may be calculated per another age bracket. For example, the data may be compiled based on the certain age brackets of 16 to 20, 21 to 25 and the like.
FIG. 42
FIG. 45
4200
4216
4218
4510
1
4
4530
Referring to again, the gender of the sender of data is woman (area ), and the age is 18 (area ). Therefore, in connection with table - of melody in , one is added to the present value “15” of a data item to update the database, and the value becomes equal to 16.
4
4
4220
4200
4226
4510
1
250
4550
4200
FIG. 42
FIG. 42
Further, ringing tone “MELODY ” includes the attribute “registry information”, which includes a sub-attribute “relation”. This relation further includes family, man friends, woman friends, elder persons, younger persons and shops as attributes. Referring to again, the “relation” associate with the melody (area ) in data is a woman friend (area ). Therefore, the server device receiving the feedback information in question updates the corresponding data items in table - on hard disk . More specifically, as can be seen in a data item , the number of current woman friends is 218. When the database is updated after the reception of data in , this value changes to 219.
Thereby, the server device of the ringing tone provider can calculate the data representing the tendency of download of the ringing tones based on the feedback information. This provider can change the structure of the ringing tones to be distributed based on the calculated data, and therefore can prepare the ringing tones that are likely to be downloaded by more users. Conversely, the provider can determine the deletion of the ringing tones that will be not be downloaded many times from the database. Therefore, the situation of use of the hard disk device and other storage devices can be improved.
Feedback information is not present in connection with the ringing tone that is newly added to the database of the provider for distribution. In this case, the server device retrieves the feedback information for other ringing tone(S) of the same artist as the above, and the average values are calculated from the data items included in them. Thereby, the server device obtains the data (e.g., the number of users and the “relation”) representing the tendency of setting of the “relation” of the artist in question. The server device can use the data thus obtained as the feedback information for the newly added tune. In this case, a flag is added to each feedback information item for discrimination between the feedback information thus calculated and the actual feedback information obtained of the user who performed the downloading. Based on this flag, the server device can detect that the predetermined number of actual feedback information items are accumulated. Thereby, the server device can use the actual feedback information instead of the provisional information so that the details of the “relation” can be changed. Accordingly, the server device can distribute the ringing tones bearing the more appropriate “relation”.
An eighth embodiment of the invention will now be described. The server device according to the embodiment that can distribute the ringing tones is different from those of the foregoing embodiments in that the server device has a function of providing ringing tone information corresponding to each user based on the feedback information received from each user.
FIG. 46
FIG. 46
FIG. 43
210
210
210
4620
250
4630
4620
4640
4630
4650
4640
4610
4650
Referring to , description will now be given on CPU implementing the server according to the embodiment. is a block diagram illustrating a functional structure of CPU . CPU includes, in addition to the structures illustrated in , a database operating unit that operates the database stored on hard disk , an actual result data compiling unit compiling the distribution situations of the ringing tones based on the data extracted by database operating unit , a value-added data producing unit extracting specific data items according to an extraction criterion that is preset based on the data complied by actual result data compiling unit , a data list producing unit producing a list of the ringing tones for distributing the plurality of ringing tones based on the data produced by value-added data producing unit , and a ringing tone retrieving unit retrieving the plurality of ringing tones based on the data produced by data list producing unit .
FIG. 47
FIG. 47
210
Referring to , a control structure of the server according to the embodiment will now be described. is a flowchart illustrating a procedure of the processing executed by CPU implementing the server. This processing is executed at every preset time or when the server receives an instruction for compilation using the database.
4710
210
250
4720
210
4730
210
4640
4740
210
In step S, CPU of the server operates the database stored on hard disk , and extracts the information for each ringing tone. In step S, CPU compiles the actual results of provision of each ringing tone. In step S, CPU operates as value-added data producing unit and produces value-added data based on the result of the compilation. In step S, CPU produces the data list for providing collectively the plurality of ringing tones, using this value-added data. This data list includes, e.g., the names of the ringing tones that can be collectively distributed, messages for notifying the users of the fact that the collective provision is preferably, and the like.
4750
210
250
4760
210
4770
210
In step S, CPU retrieves, from the database on hard disk , each of ringing tones that are simultaneously provided. In step S, CPU produces the distribution data including respective ringing tones. In step S, CPU transmits the distribution data thus produced to the mobile telephone.
912
210
When the mobile telephone receives the above distribution data, main display displays a list of the ringing tones that can be collectively downloaded. When the user of the mobile telephone performs the operation requesting the collective downloading thereafter, CPU successively transmits the sound files of the ringing tones included in each list in response to the reception of the signal corresponding to the user's operation. The user of the mobile telephone can collectively download the plurality of ringing tones by performing the operation only once for receiving the ringing tones. Thereby, the assignment of the ringing tones according to the specific theme can be implemented more easily.
The mobile telephone according to a ninth embodiment differs from the foregoing embodiments in that the mobile telephone has a function of correcting the “relation” in the third embodiment.
More specifically, the mobile telephone displays a list of the sound files of the ringing tones on the screen. The mobile telephone displays screen contents for accepting an editing operation performed by the user for changing the “relation”. When the user selects a specific ringing tone, and performs the entry for changing the displayed contents of the “relation”, the entered “relation” is associated with the ringing tone. Thereby, the user can assign the intended “relation” to the ringing tone. Further, the user can form a more convenient address book.
In the embodiments already described, the ringing tone is assigned to the “telephone number”. However, it may be automatically assigned to another target in the invention. For example, such a configuration may be employed that the ringing tone is assigned in response to reception of an e-mail. This can be implemented by setting the e-mail address as the assignment target in a program implementing various kinds of processing.
Alternatively, both the telephone number and the e-mail address may be selected as the assignment targets.
According to the ninth embodiment already described, the assigned ringing tone may not be suitable for an e-mail reception tone. For example, such ringing tones are long tunes or have long introductions. Therefore, such a configuration may be employed that the user can set the ringing tone as a telephone ringing tone and/or as an e-mail ringing tone independently of each other.
1206
1208
FIG. 12
For example, determination processing such as “Set as telephone ringing tone?” may be added between steps S and S in . When the processing is executed, the mobile telephone displays the screen contents to that effect.
Thereby, the user can select, as the ringing tone which the user intends to assign to the e-mail reception, the ringing tone different from the ringing which the user intends to assign to the telephone number, although the operations for these selected ringing tones are the same.
This embodiment differs from the foregoing embodiments in that the server device operated by the information provider providing the ringing tones has assigned in advance the data items other than the “relation” to the ringing tones. These other items include data (which will be referred to as “setting-target data” hereinafter) representing, e.g., whether the assignment target of the ringing tone for distribution is a “telephone number” or an “e-mail address”.
When the mobile telephone receives the ringing tone bearing the above items, the control unit executing the assignment processing associates the ringing tone with the registrant in the address book with reference to the setting-target data. Thereby, the mobile telephone can automatically associate the ringing tone selectively with the telephone number and the e-mail address so that the user of the mobile telephone is not required to perform the operation of selecting the setting-target, and the association can be made more easily.
The processing of each of the embodiments already described may be implemented solely or in combination with the processing of the other(s). The combination of the plurality of kinds of processing can easily implement the accurate assignment according to the taste of the mobile telephone user.
For example, the function in the third embodiment may be combined with the function in the sixth embodiment. Thereby, when a boy friend likes a certain artist, the tune of which “relation” is “boy friend” can be selected from among the tunes of the above artist, and can be assigned as the ringing tone to the above boy friend.
912
914
The embodiments that have been described relate to the setting of the ringing tones. The technical ideas according to the invention, however, can be applied to data or the like other than sound data such as a ringing tone. For example, it can be applied to image data such as an incoming call image. The incoming call image is a still image or a movie that is displayed on main display or sub-display in response to a telephone incoming call or an e-mail reception (these may be collectively referred to as the “incoming call” hereinafter).
912
914
More specifically, an image data file is associated with a registrant constituting an address book, instead of a ringing tone that is an audio data file. Thereby, the mobile telephone can display the corresponding image on main display or sub-display in response to the incoming call.
The invention can be applied not only to the mobile telephone but also to stationary telephones having a storage device storing data for communications such as an address book as well as a control unit such as a CPU executing the foregoing kinds of processing, and can also be applied to information communication terminals such as a PHS.
In a sixteenth embodiment, a “flag B” can be added to the ringing tone for indicating that this ringing tone is selected by manual setting. The flag is managed, e.g., using an index, but discrimination between ringing tones can be performed in another manner.
For example, when special restrictions are not imposed on the ringing tone and, e.g., addition of attribute information is allowed, data representing contents indicated by flag B may be added, as the attribute information, to the ringing tone.
Although the present invention has been described and illustrated in detail, it is clearly understood that the same is by way of illustration and example only and is not to be taken by way of limitation, the scope of the present invention being interpreted by the terms of the appended claims.
BRIEF DESCRIPTION OF THE DRAWINGS
FIG. 1
100
illustrates a structure of a system formed of a mobile telephone and a device providing ringing tones according to a first embodiment of the invention.
FIG. 2
200
is a block diagram illustrating a hardware structure of a computer system functioning as a server device transmitting the ringing tones.
FIG. 3
250
conceptually illustrates a form of data storage on a hard disk .
FIG. 4
210
is a block diagram illustrating a structure of functions implemented by executing programs by a CPU .
FIG. 5
210
is a flowchart illustrating a procedure of processing executed by CPU .
FIG. 6
100
is a block diagram illustrating a functional structure of mobile telephone .
FIG. 7
610
is a block diagram illustrating a structure of functions implemented by a control unit .
FIG. 8
640
100
conceptually illustrates a form of data storage in a storing unit of mobile telephone .
FIG. 9
100
schematically shows an outer appearance of mobile telephone .
FIG. 10
100
is a block diagram illustrating a hardware structure of mobile telephone .
FIG. 11
940
conceptually illustrates a form of data storage in a flash memory .
FIG. 12
610
is a flowchart illustrating a procedure of processing executed by control unit for assigning the ringing tones to address book registrants.
FIG. 13
illustrates progress of processing performed by a user for assigning the ringing tones to the address book registrants.
FIG. 14
610
illustrates progress of states realized when control unit performs processing to assign the ringing tones to the address book registrants.
FIG. 15
1500
is a block diagram illustrating a structure of functions implemented by a control unit .
FIG. 16
940
conceptually shows a form of data storage in flash memory .
FIG. 17
1500
is a flowchart illustrating a procedure of processing executed by control unit .
FIG. 18
FIG. 16
illustrates a correspondence between groups and registrants based on data illustrated in .
FIG. 19
940
illustrates a form of data storage in flash memory .
FIG. 20
912
illustrates changes on a screen of a main display .
FIG. 21
950
illustrates a form of storage, in a RAM , of data produced after assignment of the ringing tones.
FIG. 22
illustrates the assignment of the registrants to the ringing tones in each group.
FIG. 23
2310
is a block diagram illustrating a functional structure of a control unit .
FIG. 24
250
200
illustrates a form of data storage on hard disk of a computer system .
FIG. 25
940
illustrates a form of data storage in flash memory .
FIG. 26
950
illustrates a form of data storage in RAM .
FIG. 27
1
2310
is a flowchart () illustrating a procedure of processing executed by control unit .
FIG. 28
2
2310
is a flowchart () illustrating the procedure of processing executed by control unit .
FIG. 29
illustrates a state that is set in advance by a user before the assignment of the ringing tone is performed based on “relation”.
FIG. 30
950
illustrates a form of the data storage in RAM .
FIG. 31
940
illustrates a form of the data storage in flash memory after the assignment of the ringing tones to the registrants.
FIG. 32
illustrates matching between the ringing tone and the registrants using the “relation” as a key.
FIG. 33
3310
is a block diagram illustrating a functional structure of a control unit .
FIG. 34
940
illustrates a form of the data storage in flash memory .
FIG. 35
3310
is a flowchart illustrating a procedure of processing executed by control unit .
FIG. 36
3610
is a block diagram illustrating a functional structure of a control unit .
FIG. 37
940
illustrates a form of data storage in flash memory .
FIG. 38
3610
is a flowchart illustrating a procedure of processing executed by control unit .
FIG. 39
3910
is a block diagram illustrating a functional structure of a control unit .
FIG. 40
1
3910
is a flowchart () illustrating a procedure of processing executed by control unit for transmitting feedback information.
FIG. 41
2
3910
is a flowchart () illustrating the procedure of processing executed by control unit for transmitting the feedback information.
FIG. 42
4200
conceptually illustrates a structure of data .
FIG. 43
210
200
is a block diagram illustrating structures of functions implemented by CPU of computer system implementing a server in question.
FIG. 44
210
is a flowchart illustrating a procedure of processing executed by CPU .
FIG. 45
250
conceptually illustrates a structure of database about ringing tones on hard disk .
FIG. 46
210
is a block diagram illustrating structures of functions implemented by CPU .
FIG. 47
210
is a flowchart illustrating a procedure of processing executed by CPU implementing a server device. | |
Abstract: Security is a crucial requirement in the applications based on information and communication technology, especially when an open network such as the Internet is used. To ensure security in such applications security protocols have been used.
In this thesis we contribute to security protocol verification with an emphasis on formal verification and automation. Firstly, we study exam protocols. We propose formal definitions for several authentication and privacy properties in the Applied Pi-Calculus. We also provide an abstract definitions of verifiability properties. We analyze all these properties automatically using ProVerif on multiple case studies, and identify several flaws. Moreover, we propose several monitors to check exam requirements at runtime. These monitors are validated by analyzing a real exam implementation using MarQJava based tool. Secondly, we propose a formal framework to verify the security properties of non-transferable electronic cash protocols. We define client privacy and forgery related properties. Again, we illustrate our model by analyzing three case studies using ProVerif, and confirm several known attacks. Thirdly, we propose formal definitions of authentication, privacy, and verifiability properties of electronic reputation protocols. We discuss the proposed definitions, with the help of ProVerif, on a simple reputation protocol. Finally, we obtain a reduction result to verify route validity of ad-hoc routing protocols in presence of multiple independent attackers.
Dear all,
It is my pleasure to invite you to the defense of my PhD thesis entitled
"Automated Verification of Exam, Cash, Reputation, and Routing Protocols"
in front of the following committee:
Sebastien Gambs Université de Rennes 1, INRIA
Steve Kremer Inria Nancy--Grand Est, LORIA
Pascal Lafourcade Université Joseph Fourier
Yassine Lakhnech Université Joseph Fourier
Olivier Pereira Université catholique de Louvain
Luca Vigano King's College London
You are also invited to the reception following the defense. | https://www-verimag.imag.fr/Details-sur-le-seminaire.html?lang=en&sem_id=539 |
Texas contains 105 schools that offer biomedical engineering programs. Rice University, the highest-ranking biomedical engineering school in TX, has a total student population of 5,576 and is the 28th highest ranked school in America.
Of the 105 biomedical engineering schools in Texas, only 16 have a student population over 10k. After taking into account tuition, living expenses, and financial aid, Southern Methodist University comes out as the most expensive ($28,682/yr), with The University of Texas-Pan American as the lowest recorded at only $1,646/yr.
Biomedical Engineering students from Texas schools who go on to become biomedical engineers, bioengineers, biophysicists, molecular biologists, etc. have a good chance at finding employment. For example, there are 14,760 people working as biomedical engineers alone in the US, and their average annual salary is $82,550. Also, Medical scientists make on average $84,760 per year and there are about 101,760 of them employed in the US today. In fact, in the Texas alone, there are employed medical scientists earning an average yearly salary of $64,390. Biomedical engineers in this state earn $66,730/yr and there are 610 employed.
Also, within the biomedical engineering schools in Texas, the average student population is 3,703 and average student-to-faculty ratio is 18 to 1. Aside from biomedical engineering, there are 11086 total degree (or certificate) programs in the state, with 2,493 people on average applying for a school. Undergraduate tuition costs are normally around $3,572, but can vary widely depending on the type of school. | http://www.onlineeducation.net/schools/biomedical-engineering/TX |
In the European Union, mandatory gender quotas for boards of directors are becoming increasingly the norm. The latest country, and largest economy, to join the ranks of requiring gender diversity on boards is Germany. After a decade of voluntary suggestions of increasing women’s shares on boards, Germany passed a two-tiered law. This law applies rigid requirements to approximately 100 of the country’s largest companies, while compelling over 3,500 other companies to set voluntary standards to which they are held accountable.
Germany’s gender quota law has now been in effect for two full years and the numbers are improving. As the requirements of the law become the norm, Germany hopes to see increased gender diversity in all companies.
In November 2014, Germany’s coalition government proposed a law that would apply beginning in 2016, and was ultimately passed in 2015.1 This law requires that large, publicly listed companies subject to employee participation on boards (“co-determination”) have 30% of their supervisory board seats filled by women.2 The law initially faced significant pushback from industry leaders. Companies such as Daimler and Bayer made statements asserting the law did not have support in the workplace and indicated that positions needed to be filled based on experience, not gender.3 Some companies though embraced the legislation. Deutsche Telkom publicly committed to meet the 30% quota a year early (by 2015) and by the end of 2015 had a Supervisory Board comprised 40% of women.4
The law persevered and was passed by the German Parliament in March 2015.5 In addition to the requirement imposed on over 100 companies that 30% of supervisory board seats must be filled by women, an additional 3,500 companies who are listed or subject to mandatory co-determination were given until September 30, 2015 to submit a business plan to designate a percentage of women in top positions.6 The targets set by these additional companies were voluntary, but if the actual percentage of women was less than 30% at the time the standards were set, the company was not permitted to set a standard of less than the then-current percentage.7 Unfortunately, several companies who had zero women in board positions set their target to zero percent as that was not technically less than the then-current percentage.8
If a company subject to the 30% quota fails to comply with the law, then any vacated board member seat must remain vacant until it is filled with a woman to achieve the target goal.9 If a company that set voluntary targets does not meet its quota, then an administrative fine can be assessed of up to €50,000.10
On February 26, 2002 the Government Commission on the German Corporate Governance Code (the “Commission”) adopted the German Corporate Governance Code (the “Code”), enacted under the statutory authority of Article 161 of the Stock Corporate Act as amended by the Transparency and Disclosure Law.11 The Code, which is reviewed annually, is intended to make Germany’s corporate governance rules “transparent and understandable…[and] to promote the trust of international and national investors, customers, employees and the general public in the management and supervision of listed German stock corporations.”12
Germany has a dual board system: the Management Board is responsible for managing the business; the Supervisory Board is responsible for appointing, supervising and advising members of the Management Board and is “directly involved in decisions of fundamental importance to the enterprise.”13 Pursuant to Article 5 of the Code, the Supervisory Board appoints and dismisses the members of the Management Board of a listed company in Germany.
The Code has been amended to reflect the 2015 gender quota laws. The Code reiterates the requirements of the 30% quota and the individual targets for percentage of seats allotted to female directors.14 The Code also provides that when appointing the Management Board, the Supervisory Board “shall take diversity into account” and it also “determines targets for the share of female Management Board members.”15 Finally, the Code puts into place measures to increase the share of women included in succession planning. The Code recommends that the Management Board sets targets designed to increase the percentage of women in management two levels below the Management Board.16
Although there is a debate over the effectiveness of the 2015 gender quota law17, the trend of gender diversity on boards is certainly in the right direction. According to the European Union, in 2010, women only comprised 12.6% of board seats of large, publicly traded companies in Germany.18 By 2016, that number had risen to 29.5%.19 This number outpaces the trend of Europe as a whole, which has seen an increase from 11.9% to 23.9% during the same period.20
Numbers of women on management boards not subject to the 2015 quotas are also increasing, although the numbers are still low.21 Approximately 10% of management board seats of DAX 30 companies, the largest 30 companies in Germany by market capitalization, are held by women.22 This number is significant though, when compared to the fact that the figure was only 2% in 2011.23
However, progress is still slow at companies who are not required to hit the 30% quota.24 Large companies, such as Volkswagen, ThyssenKrupp, and Commerzbank set their 2015 gender quota goals to zero as permitted by the law that requires the percentage of women not be less than the then-current percentage.25 These companies faced no consequences and there has been little public backlash.26
As consideration of the issue of gender parity on corporate boards continues at both the European Union and Member States levels, the discussion regarding gender parity on corporate boards becomes more increasingly focused in Germany. Both listed companies and the government are actively promoting increased representation of women in upper management and on Supervisory Boards. Though ethnic and racial diversity is not yet explicitly contemplated in German corporate governance, that too may change as a lack of representative diversity in Germany’s latest cabinet has not gone unnoticed.
In June 2012, the Commission held its 11th Corporate Governance Conference which included a discussion by Schröder on “A fair chance for women in good corporate management: On the importance of transparency and competition”.1 Since that time, a new law has been enacted requiring companies to comply with gender quotas and threatening their board with vacancies if they fail to meet these standards.But is that price enough? Some members of the new coalition government do not think so. Buried in the 177-page agreement to form a new coalition government is a clause that could punish companies who fail to comply with the gender quota by fines up to €10 million.1 Such sanctions on non-compliant companies could help achieve gender parity in the country, but it remains to be seen what will come of this provision.
1 Justin Huggler, German Boardrooms to Introduce Female Quotas, Telegraph (Nov. 24, 2014), https://www.telegraph.co.uk/news/worldnews/europe/germany/11255970/German-boardrooms-to-introduce-female-quotas.html.
2 Id.
3 Id.
4 Jenny Hill, Germany Wants More Women in Boardroom, BBC (Dec. 22, 2014), http://www.bbc.com/news/world-europe-30476373.
5 See Caroline Copley, German Parliament Approves Legal Quotas for Women on Company Boards, Reuters (Mar. 6, 2015), https://www.reuters.com/article/us-germany-women-quotas/german-parliament-approves-legal-quotas-for-women-on-company-boards-idUSKBN0M214S20150306; see also Women in Management, Deutsche Telekom (Feb. 25, 2016), https://www.telekom.com/en/company/human-resources/content/women-in-management-362636.
6 Alison Smale & Claire Cain Miller, Germany Sets Gender Quota in Boardrooms, N.Y. Times (Mar. 6, 2015), https://www.nytimes.com/2015/03/07/world/europe/german-law-requires-more-women-on-corporate-boards.html.
7 Bredin Prat et al., Board-Level Gender Quotas in the UK, France, and Germany 4 (Aug. 2016), https://www.hengeler.com/fileadmin/news/BF_Letter/14_Board-LevelGenderQuotas_2016-08.PDF.
8 Id.
9 Id. at 5.
10 Id.
11 German Corporate Governance Code, as amended on Feb. 7, 2017, can be found at http://www.dcgk.de/en/code.html (last visited Aug. 26, 2018) (hereinafter “the Code”).
12 Id. at art. 1.
13 Id. at art. 1.
14 Id. at art. 5.4.1.
15 Id. at art. 5.1.2.
16 Id. at art. 4.1.5.
17 Compare Renuka Rayasam, Why Germany’s New Quota for Women on Boards Looks Like a Bust, Fortune (Mar. 11, 2016), http://fortune.com/2016/03/11/germany-board-quota-women, with Oliver Staley, You Know Those Quotas for Female Board Members in Europe? They’re Working, Quartz (May 3, 2016), https://qz.com/674276/you-know-those-quotas-for-female-board-members-in-europe-theyre-working/.
18 2017 Report on Equality Between Women and Men in the EU, European Union 61 (2017), https://eeas.europa.eu/sites/eeas/files/2017_report_equality_women_men_in_the_eu_en.pdf.
19 Id.
20 Id.
21 Women in the boardroom: A global perspective, Deloitte 53 (2017), https://www2.deloitte.com/content/dam/Deloitte/global/Documents/Risk/Women%20in%20the%20boardroom%20a%20global%20perspective%20fifth%20edition.pdf.
22 Id.
23 Id.
24 Barbara Gillmann, German Companies That Don’t Try Harder at Gender Equity Could Be Fined Millions, Handelsblatt Global (Feb. 26, 2018), https://global.handelsblatt.com/companies/germany-companies-dont-try-harder-gender-equity-fined-millions-891848.
25 Id.
26 See Myfanwy Craigie, Despite Appearances, Women Don’t Rule in Germany, Politico (May 10, 2018), https://www.politico.eu/article/despite-appearances-women-dont-rule-in-germany/.
27 Press Release, 11th Corporate Governance Conference, 13 & 14 June 2012, Supervisory Board Members and Executive Board Members Will Discuss the Topic of "Good Corporate Governance: Trust Through Transparency and Clarity of Information" (June 6, 2012), http://www.dcgk.de/en/press/details/id-11th-corporate-governance-conference-13-and-14-june-2012-berlin.html (last visited Apr. 10, 2018).
28 Barbara Gillmann, supra note 24. | https://www.paulhastings.com/genderparity/countries/germany.html |
Gouda Geo-Equipment B.V.
Satellietbaan 8
2181 MH Hillegom
The Netherlands
Satellietbaan 8
2181 MH Hillegom
The Netherlands
Downloads
Diëlectrical and Conductivity Module
The dielectrical module is an easy to use, versatile and straightforward geotechnical measuring instrument, that can be mounted on top of and can be used in combination with a standard 15 cm² electric CPT(U) cone. It is able to measure accurately the electrical conductivity (or resistance, as resistance is the inverse of conductivity) of the soil.Since the conductivity tests are carried out during a traditional CPT test (the dielectrical module is mounted on top of a traditional electric CPT cone), the measured parameters can be combined with the parameters obtained with traditional CPT testing, namely the cone resistance (qc), the local friction (fs), the deviation of the vertical (i) and the in-situ pore pressure (U).
Background
The dielectrical parameters of the soil, the electrical conductivity and the electrical permittivity vary predominantly with the soils water content and the presence of contaminations with hydrocarbons. Furthermore, electrical conductivity is inversely proportional to particle size. That is, clays usually have higher conductivity than sands. Another rule of thumb is the smaller the particle size of the soil, the lower the permeability. Thus, electrical conductivity measurements yield important lithological information and identify the locations the may be permeable and non-permeable zones. By measuring these parameters between two insulated electrodes using the soil mass as dielectric correlated with CPT results as tip resistance and local sleeve friction the contamination by hydrocarbons can be determined.
The detection limit depends on the grade of contamination and is in the order of 100 ppb in sand. Since the dielectric parameters also depend on other soil parameters, the detection limit in e.g. clayey soils are lower; correction and calibration for these soils is therefore necessary.
Unlike conventional techniques, a continuous impurity profile of the subsurface is obtained. It is possible to use these profiles to generate a three-dimensional soil model. The contaminated soil layers can easily be mapped by plotting the ration of the derivatives of the electrical conductivity and permittivity as a function of the penetration depth.
The CPT testing speed and the mobilization costs of the dielectric cone is equivalent to that of a standard CPT (piezo-)cone. This testing method thus provides in a relatively cheap way detailed information on the soil structure and on the presence and distribution of potential hydrocarbon contaminants.
Applications
Soil electrical conductivity, which is known as EC, is the ability of soil to conduct electrical current. EC is expressed in milliSiemens per meter (mS/m).
Traditionally, soil scientists used EC to measure soil salinity. However, EC measurements also have the potential for estimating variation in some of the soil physical properties in a field where soil salinity is not a problem. Recent developments in EC sensors and their ability to produce EC variation maps has attracted much attention among the geotechnical and environmental industry about potential applications of this sensor for improving field management.
Salinity is a soil property referring to the amount of soluble salt in the soil. It is generally a problem of arid and semiarid regions. Electrical conductivity (EC) is the most common measure of soil salinity and is indicative of the ability of an aqueous solution to carry an electric current.
One primary use of this dielectrical module is to locate and define preferential migration pathways for contaminants in the subsurface. It allows the user to create fast, continuous, real-time profiles of soil hydraulic properties in both fine- and coarse-grained material by measures the soil conductivity. The data can be plotted as a function of subsurface depth. This provides a representative plot of contamination levels and changes in soil permeability.
The data can be downloaded into software that creates a two- or three-dimensional interpretation of soil conductivity as a function of depth. The result is an accurate contaminant-mass-reduction estimate based on a clear picture of the subsurface mass and a lithic composition underlying your site, as well as the location of permeable and non-permeable areas. This means less time in the field, and less cost for you on a clear picture of the subsurface mass.
Since the conduction of electricity in soil takes place through the moisture-filled pores that occur between individual soil particles, the electrical conductivity of soils is determined by the following soil properties (Tom Doerge, 1999):
Porosity
The greater soil porosity, the more easily electricity is conducted. Soil with high clay content has higher porosity than sandier soil. Compaction normally increases the electrical conductivity of the soil.
Water Content
Dry soil is much lower in conductivity than moist soil.
Salinity Level
Increasing concentration of electrolytes (salts) in soil water will dramatically increase the electrical conductivity of soils.
Cation Exchange Capacity (CEC)
Soils containing high levels of organic matter (humus) and/or 2:1 clay minerals have a much higher ability to retain positively charged ions (such as Ca, Mg, K, Na, NH4, or H) than soils lacking these constituents. The presence of these ions in the moisture-filled soil pores will enhance the electrical conductivity of the soil in the same way that salinity does.
Temperature
As temperature decreases toward the freezing point of water, the electrical conductivity of soils decreases slightly. Below freezing, soil pores become increasingly insulated from each other and the overall electrical conductivity of soils declines rapidly.
Soil Moisture
Dielectric soil properties, capacitance and electrical conductivity are governed mainly by the water content of the soil mass. By measuring these parameters between two electrodes with the soil dielectric in between, the soil moisture can thus be determined. The capacitance of dry soil is determined by its dielectric constant. For dry soil this constant is of the order of 3 to 6 and for water the constant is 80, that is, the capacitance between the two electrodes is dominated by the volume fraction of water.
Contamination
In polluted soils non-aqueous phase liquids (NAPL’s), such as oil or chlorinated solvents, will replace part of the water in the soil matrix. As they do not dissolve easily in groundwater they will occur as a film of pure product, often just above the groundwater table. Dense NAPL’s such as chlorinated hydrocarbons, which are denser than water, will penetrate the groundwater table and are typically found on top of impermeable layers. These pollutants affect the dielectric properties of the soil significantly and are detectable using the Soil Moisture Probe. Soil electrical conductivity logs are used to define zones of lower conductivity, equivalent to coarser grained, more permeable sediments, which will allow the movement of contaminants (hydrocarbons, chlorinated volatile organic compounds (VOCs), or metals) in the subsurface. The lithologic information gathered with the Conductivity System can be used to aid the investigator in understanding the movement and location of contaminants in the subsurface. This information will also assist in the proper placement of monitoring or extraction wells. The combination of these parameters combined with the geomechanical measurements done by the electric CPT cone provides comprehensive information useful in determining the stratigraphy, moisture content, salt water intrusion or environmental contamination of the soil in one test. The soil moisture content is a function of the soil dielectric constant widely known as Topp’s Equation. | https://www.gouda-geo.com/products/cpt-equipment/special-modules-for-cpt/dilectrical-and-conductivity-module |
Ethiopia is predominantly an agricultural country with the vast majority of its population directly involved in the production of crops and livestock. It contributes for about 46.7% of the GDP and provides employment for 85% of the population (CSA, 2006). It also accounts for highest proportion of the export revenue and contributes significant amount in supply of raw materials requirements of the country’s industries. However, for various reasons Ethiopia’s agriculture is characterized by its subsistent nature. When the issue of economic growth and development of the country is raised, one has to take into account the performance of the smallholder farmers. Reducing the challenges they are facing and utilizing their potentials can help to accelerate the agricultural sector and economic development of the country as a whole. Agricultural cooperatives are an ideal means for self-reliance, higher productivity level and promotion of agricultural development. In Ethiopia many cooperative unions are being established to strengthen the existing primary level cooperatives by pooling their scarce resources and increasing their bargaining power. However, the union’s management lacks the required knowledge and training in managing their resources. Therefore, skill development training is also required in resource management, use of funds and conditions which will enable those unions to stand by themselves as competent entities. The development of an efficient and equitable grain marketing system is a critical component for improving food security in Ethiopia, increasing both food availability and food access. Well functioning grain markets benefit both producers and consumers by reducing marketing margins and the transaction costs.This research is conducted to assess grain marketing performance through Assosa woreda primary multi-purpose cooperative societies. Assosa woreda is selected for the study due to its greatest potential among other woredas of the region. Data were collected from two sources known as primary sources and secondary sources. Primary data were gathered through interviews using structured interview schedules and check lists. Secondary data were gathered to support the information collected from primary sources. These were from reports and records of the cooperative societies, regional and woreda agriculture and rural development bureaus, regional finance and economic development bureau, the statistics authority regional office etc. Tools used for collection of primary data were structured interview schedules. In addition, group discussions were conducted with the key communicators of the woreda. JMP5 software was employed for analysis of primary data collected through interview schedules. According to the multivariate correlation test, education level and access to market information are positively correlated indicating that the higher the education level, the better would be the knowledge of the farmer to acquire news and education about the benefits of the cooperatives. This education level is also found to have a positive relationship with the farmer’s level of participation in his/her society. Multivariate Correlation test of farm size and marketed surplus has shown also a positive relationship. The positive relationship can indicate that an increase in one of the two could be an evidence for increase in the other. Size of family is found to have negative influence on marketed surplus. Through simple linear regression, it is found that an increase in family member by 1 brings a decrease in marketed surplus by 2.11 quintals. Availability of market infrastructures, access to inputs and access to credit services are analyzed using rating scales and checklists. Grain varieties marketed through the cooperatives were Maize, Sorghum and Niger seed. The past three successive years’ sales data was taken from the sample societies’ records and analyzed to assess the year-to-year increase/decrease in annual gross sales and gross profit. Constraints of grain marketing performance were found to have two aspects. These are production constraints and marketing constraints. Under production constraints are farmland scarcity, soil degradation, weed and pests, lack of input supply, poor extension services and weather shocks etc. Marketing constraints include lack of capital, lack of timely and accurate market information, lack of storage facilities, poor roads & high transport costs, poor marketing management and lack of trainings on marketing and related business issues. | https://opendocs.ids.ac.uk/opendocs/handle/123456789/5229 |
Animation du Monde 2020 returns to DISCOP Abidjan in Ivory Coast - entries now open...
The Ladima Foundation: women of influence panel discussion DISCOP Joburg...
14 Nov 2018
Joburg Film Festival opened on Friday with Kenyan feature film, Rafiki...
12 Nov 2018
The third edition of Digital Lab Africa will kick off at DISCOP Johannesburg this month and opportunities exist for participants in the field of digital content creation...
7 Nov 2018
This week saw the unveiling of the Africa Halal Week Film and Media programme during Cape Town International Film Market and Festival. The programme is focused around how Cape Town and the Western Cape can better position itself as a Muslim-friendly film and media destination...
18 Oct 2018
DISCOP launches an innovative 'shopping service' for content buyers in Africa and Middle East...
16 Oct 2018
With a focus on African storytelling, the African Movie Channel has launched a production hub to develop and produce movies and TV series...
9 Oct 2018
The Zanzibar International Film Festival (ZIFF) has announced influential South African film duo Faith Isiakpere and Firdoze Bulbulia as its new CEO and festival director respectively...
5 Oct 2018
Africa in Motion Film Festival has announced the final short list of its annual Short Film Competition...
27 Sep 2018
According to PwC's 'Entertainment and media outlook: 2018 - 2022: An African perspective', Africa's entertainment and media industry has entered a dynamic new phase - a third wave of convergence...
19 Sep 2018
Lionheart, directed by Genevieve Nnaji, is the first Netflix original film from Nigeria. The movie is her directorial debut...
11 Sep 2018
The second speaker at the 2018 DStv Seminar of Creativity was Lethepu Matshaba, vice president of Homecare Southern Africa at Unilever SA, who spoke on the relevance of creativity in a hyper-fragmented world...
Angie White 17 Aug 2018
Nigerian startup Festivilia has launched its film festival distribution platform, which enables filmmakers to submit to over 500 curated film festivals...
Tom Jackson 1 Aug 2018
How to unlock up to $2bn of annual box office revenues in Africa...
24 Jul 2018
The development and recognition of women within the film industry was a reoccurring theme throughout both ZIFF and the inaugural DISCOP Zanzibar, as African women topped the winners lists...
17 Jul 2018
APO Group announces exclusive partnership with Getty Images for the Rugby Africa Gold Cup 2018...
11 Jul 2018
CaribbeanTales and Durban FilmMart Partnership 2.0 encourages African women filmmakers to think co-production...
21 Jun 2018
I was drawn to how Bourdain upended the travel show genre, telling compelling and complicated stories about people and places most Western viewers tend to view through a lens of simplistic stereotypes or caricatures...
Jacob Henry 14 Jun 2018
The Cape Town International Film Market and Festival will take place from 9-19 October 2018 at venues across the V&A Waterfront as well as in select sites across the city of Cape Town...
13 Jun 2018
The Africa Channel has announced the 20 finalists in the competition for Best TV Series entered into the inaugural Zanzibar TV Series Festival and Zanzibar International Film Festival (ZIFF)...
12 Jun 2018
MultiChoice Africa announces Pan-African initiative for film and television industry, to ignite Africa's creative industries...
31 May 2018
Official selection announced for the Zanzibar International Film Festival after record number of entries...
30 May 2018
More than 500 film, television, digital and video gaming content producers from all over Africa will converge at DISCOP Johannesburg...
23 May 2018
9th Durban FilmMart announces Official Project Selection for 2018 edition, including 16 films and documentaries from Africa...
18 May 2018
Realness Africa screenwriter's residency 2018 participants announced at Cannes Film festival...
17 May 2018
The new general manager and vice president of Fox Networks Group Africa, Evert van der Veer, will focus on the expansion of Fox Sports and local content production...
Louise Marsland 16 May 2018
With video content and streaming influencing viewing habits on the African continent, TV Connect Africa has evolved into the Africa Video Forum stream...
14 May 2018
Actors and directors from the African diaspora in Europe fight for a place in the film world...
9 May 2018
South African creative director Wes Phelan recently picked his favourite African advert for Africa.film, a new site showcasing Africa's best videos...
8 May 2018
Poisonous Roses by Egyptian director Ahmed Fawzi Saleh has won Best Feature Film at FCAT 2018...
7 May 2018
International critics have voted for the best African films of all time. 'Touki Bouki' by Djibril Diop Mambéty tops the list of best African films... | https://www.bizcommunity.com/Articles/138/97/key1-20181115080000.html |
Keywords: Happiness, Family, Economy, Culture, Secondary School Student.
Undoubtedly, in order to have a developed society, the members of the society must be health both psychologically and physically. Happiness is one of the main effective variables which are of great importance during the period of adolescence. During such period, persons are able to make main decisions relative to their future life. Considering the importance of happiness of the youth, the purpose of this study is to investigate the factors having influence on the happiness degree. Population of the study included all secondary students of Shiraz among whom 447 ones were selected as the sample. Data was gathered by use of Oxford’s questionnaire and then was analyzed using SPSS software. From the results, it became clear that there is a meaningful relationship between the students’ happiness and the variables such as cultural activities, athletic experiences, religious and artistic activities. Moreover, there is no relationship between the students’ happiness and variables such as the parents’ educational degree and job and the students’ pocket money. Finally, the results of multi – variable regression test revealed that being satisfied with leisure time and doing cultural activities are the two variables which have most influence on the students’ happiness level as the dependent variable. | http://rrss.univnt.ro/INVESTIGATING-THE-FACTORS-HAVING-INFLUENCE-ON-THE-STUDENT-S-HAPPINESS-A-SURVEY-BETWEEN-STUDENTS-OF-SECONDARY-SCHOOLS-OF-SHIRAZ_a386.html |
A black hole could have 1 million planets orbiting near it that are potentially capable of supporting life as we know it, an astrophysicist suggests.
Since there is life virtually everywhere liquid water exists on Earth, astronomers often judge a world as potentially habitable if it orbits within a zone where liquid water could survive on its surface. Our sun's "habitable zone" hosts just one planet (Earth), but the story could be different for other stars. For example, the TRAPPIST-1 system has three Earth-size planets within its habitable zone.
"I think we can learn from the extremes ... they are basically the boundaries of the box in which we are searching," Raymond told Space.com. "This system is one extreme — the most packed imaginable. It's a fun blend of imagination and science."
There are currently two kinds of black holes that scientists know best, Raymond said. Stellar-mass black holes are equal in mass to a few suns, and form when giant stars die and collapse in on themselves. Supermassive black holes are millions to billions of times the mass of the sun, and are thought to exist in the hearts of most, if not all, large galaxies. (A third class, intermediate-mass black holes, is poorly understood.)
Black holes are extremely compact. A black hole with the mass of the sun would be about only 3.7 miles (6 kilometers) wide. In comparison, Sagittarius A*, the supermassive black hole thought to lurk at the heart of the Milky Way, has a mass of about 4 million suns and a diameter of about 14.7 million miles (23.6 million km), or a little more than 40 percent the size of Mercury's orbit around the sun.
What if the sun had a black hole companion?
A common question in physics classes is to imagine what would change if the sun were replaced with a black hole of the same mass, Raymond said. The answer is that nothing would change regarding the planets' orbits — if the black hole had the same mass as the sun, the orbits would remain the same. (Life on Earth would obviously suffer from the lack of light and heat in such a scenario, Raymond added.)
If the sun had an equal-mass black hole companion orbiting near it — at, say, one-tenth of an astronomical unit (AU) — the orbits of the solar system's planets would not change much, Raymond noted. (One AU is the Earth-sun distance — about 93 million miles, or 150 million km.)
Still, assuming these planets kept the same distance from the sun as they do now, the gravitational pull of the sun and its black hole partner would lead these worlds to complete their orbits a bit more quickly, with Earth's year decreasing from 365 days to 258 days, he said.
In the above scenario, the sun and the black hole would complete an orbit with one another every 2.9 days. This means the amount of energy that Earth would receive from the sun would fluctuate between 90 percent and 110 percent of its average as the sun moved farther from or closer to Earth.
More than 500 Earth-like planets could circle a million-solar-mass black hole, given some fortuitous star placement, according to astrophysicist Sean Raymond. (Image credit: Sean Raymond)
What if a supermassive black hole had a ring of planets?
In addition to imagining life around a stellar-mass black hole, Raymond also calculated how many potentially habitable planets might fit around a supermassive black hole 1 million times the mass of the sun. "That's almost as massive as the one in the center of the Milky Way," he said. It would only be about the diameter of the sun, he added.
Around the sun, the orbits that planets travel can come only so close together before the effects of their gravitational pulls overwhelm those of the sun, leading to unstable orbits. Raymond noted that about six Earth-mass planets can fit in stable concentric orbits within the sun's habitable zone.
In contrast, a supermassive black hole's gravitational pull is extraordinarily strong, enough to easily overwhelm those of planets. If the sun were replaced with a million-solar-mass black hole, 550 Earth-mass planets could fit in stable concentric orbits in the habitable zone, Raymond calculated.
The supermassive black hole's gravity would pull more strongly on the side of each planet closer to the black hole. This would stretch the habitable-zone planets out, although they would not be close enough to get ripped apart, Raymond said.
One way to create a habitable zone around this supermassive black hole is to place stars between it and the planets. A ring of nine sun-like stars 0.5 AU from a million-sun black hole would make each of the 550 Earth-mass planets in the above scenario potentially habitable, Raymond said.
"It would be pretty interesting to live on a planet in this system," Raymond noted. "It would take just a few days to complete an orbit around the black hole — about 1.6 days at the inner edge of the habitable zone and 4.6 days at the outer edge." [10 Exoplanets That Could Host Alien Life]
At the closest approach, or conjunction, between two such planets, the distance between these worlds would be "about twice the Earth-moon distance," Raymond noted. "At conjunction, each planet's closest neighbor appears about twice the size of the full moon in the sky."
In addition, the next-nearest neighbors would be only twice as far away, and so would appear as big as the full moon during conjunction, Raymond said. Four more planets would be at least half the size of the full moon during conjunction, he added. "Conjunctions happen a little less than once per orbit, so every few days there is a gaggle of giant objects passing across the sky," he said.
The nine suns "would also be a sight to behold," Raymond said. Each would complete its orbit around the black hole every 3 hours.
"That means that every 20 minutes, one of the suns would pass behind the black hole," Raymond said. "When a sun passes behind the black hole, the black hole's gravity bends its light and can act like a lens. It focuses the sun's light toward the planet. This distorts the shape of the sun into a ring ... a pretty sweet light show."
Furthermore, starlight would be stretched by the black hole's gravity. "Stars closer to the black hole would appear redder, and those farther from the black hole would appear bluer," Raymond said.
Given a million-sun black hole with an orbiting ring of nine sun-like stars, 1 million Earth-mass planets could orbit within the habitable zone, in 400 rings of 2,500 planets apiece, astrophysicist Sean Raymond has calculated that. (Image credit: Sean Raymond)
A million planets around a black hole
In the prior scenario, each planet was alone in its orbit around the supermassive black hole. Raymond also modeled what would happen if multiple planets shared an orbit around a million-sun black hole. Previously, Raymond calculated that 42 Earth-mass planets could orbit in a ring 1 AU from the sun.
To have a stable ring of planets, Raymond noted that planets in that ring must all have roughly the same mass. There must also be at least seven planets in such a ring, and they must be evenly spaced along a circular orbit.
Given a million-sun black hole with an orbiting ring of nine sun-like stars, Raymond calculated that a million Earth-mass planets could orbit within the habitable zone in 400 rings, each holding 2,500 planets spaced apart by about the same distance as that between Earth and the moon. In this scenario, planets would again take anywhere from 1.6 to 4.6 days to complete an orbit. [The Strangest Black Holes in the Universe]
Instead of placing nine sun-like stars between the black hole and the planets, Raymond also suggested one could place 36 sun-like stars in a ring 6 AU wide. In this scenario, "each planet is bathed in sunlight from all sides — the planets have no night side," Raymond said. "It's like Asimov's permanent-daytime planet Kalgash."
"You would never feel alone in these systems — the other planets would loom huge in the sky," Raymond added. Neighboring planets would be about 10 times closer than the moon is to Earth, meaning they would appear "about 40 times larger in the sky than the full moon," Raymond said. "That's about the size of a laptop computer held at arm's reach, only up in the sky."
In this latter scenario, the planets would be much closer to the black hole, each completing an orbit in just about 9 hours. This means they would orbit at extraordinary speeds — about 10 percent of the speed of light. According to Einstein's theory of special relativity, time would appear to move noticeably more slowly the closer one gets to the speed of light, so "two babies born at the same instant on different rings would age at slightly different rates," Raymond said. "The baby on the inner ring would age slightly more slowly."
The differences in speed between the rings would be great enough to likely make it impossible for a spaceship to travel from one ring to another with any current technology, Raymond said. However, each world would share its ring with thousands of others, and the relative speed between neighboring planets would be almost zero. "A space elevator could connect planets," Raymond said.
If each pair of neighboring planets along a given ring were connected, it would resemble a "Ringworld," a gigantic alien megastructure in Larry Niven's science-fiction epic of the same name. "The difference between this setup and the 'Ringworld' from Larry Niven's book is that, in this case, there is no livable surface area in between the planets," Raymond said.
Where might such million-planet systems come from? "I can imagine super-advanced aliens creating a system like the million-Earth solar system as a cosmic work of art, kind of like the art of skyscrapers or painted icebergs," Raymond said. "A way to say, 'Look how fancy we are,' on the grandest scale."
"Or maybe aliens would create this kind of system as a zoo," Raymond said. "They could have a gradient in climates from the hottest to coldest, and stock the planets with all sorts of creatures they collect across the universe. Of course, they'd have to be careful not to put the wrong combinations of space creatures on the same ring of planets, because that wouldn't end well."
All in all, "it's helpful to try to come up with all the possible planetary systems that might be out there," Raymond said. "Some discoveries could have been anticipated by 'going there' and imagining possibilities that are far outside the norm. These systems are a combination of science fiction and 'going there' in that sense."
"The main thing I go for is simply to try to push the limits of what we think is possible," Raymond concluded. | |
Security is the degree of protection to safeguard a nation, union of nations, persons or person against danger, damage, loss, and crime. Security as a form of protection are structures and processes that provide or improve security as a condition.
Network security consists of the provisions and policies adopted by a network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources. Network security involves the authorization of access to data in a network, which is controlled by the network administrator. Users choose or are assigned an ID and password or other authenticating information that allows them access to information and programs within their authority. Network security covers a variety of computer networks, both public and private, that are used in everyday jobs conducting transactions and communications among businesses, government agencies and individuals. Networks can be private, such as within a company, and others which might be open to public access. Network security is involved in organizations, enterprises, and other types of institutions. It does as its title explains: It secures the network, as well as protecting and overseeing operations being done. The most common and simple way of protecting a network resource is by assigning it a unique name and a corresponding password.
Types of Attacks
Networks are subject to attacks from malicious sources. Attacks can be from two categories: "Passive" when a network intruder intercepts data traveling through the network, and "Active" in which an intruder initiates commands to disrupt the network's normal operation.
Types of attacks include:
-
Passive
- Network
- Active
WiMAX security issues
Authentication
A fundamental principle in 802.16 networks is that each subscriber station (SS) must have a X.509 certificate that will uniquely identify the subscriber. The use of X.509 certificates makes it difficult for an attacker to spoof the identity of legitimate subscribers, providing ample protection against theft of service. A fundamental flaw in the authentication mechanism used by WiMAX's privacy and key management (PKM) protocol is the lack of base station (BS) or service provider authentication. This makes WiMAX networks susceptible to man-in-the-middle attacks, exposing subscribers to various confidentiality and availability attacks. The 802.16e amendment added support for the Extensible Authentication Protocol (EAP) to WiMAX networks. Support for EAP protocols is currently optional for service providers.
Encryption
With the 802.16e amendment, support for the AES cipher is available, providing strong support for confidentiality of data traffic. Like the 802.11 specification, management frames are not encrypted, allowing an attacker to collect information about subscribers in the area and other potentially sensitive network characteristics.
Availability
WiMAX deployments will use licensed RF spectrum, giving them some measure of protection from unintentional interference. It is reasonably simple, however, for an attacker to use readily available tools to jam the spectrum for all planned WiMAX deployments. In addition to physical layer denial of service attacks, an attacker can use legacy management frames to forcibly disconnect legitimate stations. This is similar to the deauthenticate flood attacks used against 802.11 networks.
WiMAX Threats
Despite good intentions for WiMAX security, there are several potential attacks open to adversaries, including:
Rogue Base Stations
DoS Attacks
Man-in-the-Middle Attacks
Network manipulation with spoofed management frames
The real test of WiMAX security will come when providers begin wide-scale network deployments, and researchers and attackers have access to commodity CPE equipment. Other attacks including WiMAX protocol fuzzing may enable attackers to further manipulate BSs or SSs. Until then, the security of WiMAX is limited to speculation.
Essential Elements of WiMAX Security
With the advent of WiMAX, the security toolsets available to broadband wireless service providers have reached all time highs of functionality. Today's WiMAX networks can be secured more effectively than ever before. However, as important as securing the WiMAX network is, there are additional considerations that carriers should evaluate as part of a thorough security implementation. In fact there are five primary aspects of WiMAX security that should be considered when designing a security plan for your WiMAX network. These range from mitigation techniques at the physical layer to improved wireless authentication and encryption to intrusion protection and data transport security.
At each level, choices in implementation and security levels can be made; although in the case of the physical layer options are limited. Let's start by looking at some of the attacks that can be delivered along with some of the enhanced tools that WiMAX, particularly 802.16e WiMAX, offers.
Physical Layer Security
There are two basic types of attacks that can affect the physical layer of WiMAX. One is jamming and the other is packet scrambling. The first is relatively straightforward, and is sometimes the result of interference rather than an attack. Jamming consists of a stronger signal than the WiMAX network overwhelming network data feeds either in intermittent bursts or with sustained carrier waves.
Since most WiMAX network services are delivered over licensed bands (currently 3.5 GHz internationally and 2.5 GHz both internationally and in the US), this offers spectrum relatively quiet from accidental interference. Accidental interference in licensed spectrum cannot always be completely discounted as there is a possibility of what are called second and third harmonic interference waves, for example, from much lower frequency signals if those are in close proximity to the WiMAX antenna systems or that cross them with signal close enough in physical proximity to locally overload the WiMAX signal. Harmonics are an integer function. What this means is that a signal at 850 MHz, for example, has a second (and much weaker) harmonic at two times this frequency or 1700 MHz (which could eventually impact some AWS spectrum potentially in this example) and a third harmonic (weaker still) at 2550 MHz. In practice this is fairly rare.
Also sometimes, leaks from other carrier's equipment occasionally occur within equipment rooms at the tower. These can usually be detected in planning sweeps with a spectrum analyzer before installation and notch filters or band-pass filters of some type on the specific equipment can usually clear these issues up promptly. Constant jamming, whether malicious or otherwise can usually be found pretty quickly using a spectrum analyzer and directional antennas to triangulate the signal. Intermittent jamming or interference can be more maddening to find the location of, but is also less intrusive to the network, resulting in some packet retransmission and slowdowns but less often in blanket outages. A good spectrum analysis conducted prior to deployment and intermittently thereafter (to detect newly installed gear) can go a long way to defeating this problem. At some point most WiMAX service providers will face some type of interference or jamming problem.
Packet scrambling is an attack that occurs when control packets in the respective downlink and uplink subframes are sniffed then scrambled and returned to the network. This attack is much harder to mount than a jamming attack.
"Since most WiMAX networks today use time division duplexing (TDD), wherein signals are sliced via time slots an attacker can parse this timing sequence and capture control data, the preamble and map, scramble them and send them back with correct timing to interrupt legitimate signal, resulting in slowdowns and effectively lowered bandwidth," said Andrew Useckas, chief technology officer for NetSieben Technologies.
Intercepted and scrambled packets are possible with frequency division duplexing (FDD) as well which transmits both the uplink and downlink simultaneously, but it is even harder to exploit this attack than with TDD systems.
Authenticating Wireless Transmissions
At the media access control (MAC) layer of WiMAX the control or MAC header portion of transmissions is not encrypted. This is deliberate in order to facilitate the working of the MAC layer. Not to fear, this does not mean WiMAX is insecure. But it does present some choices for the carrier.
Traditionally the first level of security authentication for older broadband wireless technologies has been MAC authentication and WiMAX supports this, although hopefully providers don't settle for this method. This technique allowed service providers to log permitted MAC device addresses and allow only those addresses to access the network. Hackers long ago figured out how to spoof these. A second, newer and much better choice is the built in support for X.509 device certificates. Lastly the extensible authentication protocol---transport layer security (EAP-TLS) method, added with the 802.16e standard, adds an additional layer of authentication security to the mix. So what does this mean in real-world terms? It is helpful to look at some of the potential exploits at this level to illustrate the value of better authentication systems.
"If a base station is not set up with adequate authentication measures, an attacker can capture control packets and pose as a legitimate subscriber even with older MAC device authentication enabled," added Useckas.
However the X.509 certificate makes it very hard for an intruder to impersonate a subscriber. The X.509 certificate is embedded in WiMAX subscriber units and incorporates a public key authentication encryption. This effectively means that a WiMAX base station can detect legitimate subscriber stations quickly and easily. Unfortunately, this is a one-way protocol.
"The X.509 protocol is very good," said Useckas. "However there is no way to verify if a base station is authentic with subscriber side X.509."
Useckas added that if an interloper ratchets up the power on their rogue base station; captures control packets from a legitimate base station transmission then spoofs the timing sequence of the TDD signal that the subscriber unit expects to receive; it is very possible to hijack subscriber traffic.
Enter the EAP-TLS authentication method. This technique, added with the 802.16e standard, allows both the subscriber and the base station to authenticate each other using an X.509 method for both. We previously discussed that MAC control headers are never encrypted in WiMAX, however with EAP carriers can choose to authenticate them (but they don't necessarily have to). This approach is called hashed message authentication code (HMAC) and uses a form of encrypted private key.
"The hash appends at the end of the message itself," said Useckas. "When messages are received the base station generates its own hash to compare to the one received from the subscriber using its private key to compare them."
This adds an additional layer of authentication confirmation. The downside to this Useckas adds is that all of this requires processor cycles. So a clever hacker could send thousands of HMAC attached messages forcing the base station to run processor cycles comparing them---effectively resulting in a denial of service attack.
This points up a conundrum for WiMAX broadband wireless carriers; namely that even positive security choices can carry consequences. So while WiMAX has better tools than ever and supports MAC management header authentication onboard the radio, carriers may elect to shift some of the processor burden for authentication and data encryption to central office (CO) servers perhaps. We will discuss this more in the next section.
Encryption
Clearly the first layer of defense for WiMAX operators is to authenticate a legitimate user on its network. However, WiMAX, with its 802.16e ratification, offers top line tools for encryption of data. Older wireless iterations used the data encryption standard (DES) which relied on a 56-bit key for encryption. This is largely considered obsolete. WiMAX 802.16e certainly supports DES (3DES) but it also adds support for the Advanced Encryption Standard (AES) which supports, 128-bit, 192-bit or 256-bit encryption keys. Also AES meets the Federal Information Processing Standard (FIPS) 140-2 specification, required by numerous governmental branches. This technology which requires dedicated processors on board base stations is robust and highly effective. But once again, the question is should carriers depend largely on onboard processing or shift to server based third party solutions (some of whom offer additional EAP authentications that are widely used in the enterprise---making interface easier) that provide more options in encryption. The former is almost certainly cheaper; the latter could offer additional advantages.
For his part, Useckas is firmly in the third party camp.
"I think it is better to push encryption to either a firewall server on the base station or central office side or to an operating system than to rely on the radio systems exclusively," asserted Useckas.
It behooves WiMAX carriers to look at various scenarios for their security needs and put a migration plan in place, if such appears needed, before deployment begins.
"In the past for example many cellular carriers focused on authentication and mostly ignored encryption," said Useckas. "Whether that will change as mobile service providers ramp up more broadband applications is an open question."
Through this point we have looked at the physical layer of WiMAX security as well as the authentication options at the MAC layer and the additional top line AES data encryption that WiMAX now supports. Let's briefly examine the last two elements of a well-considered WiMAX security solution.
Third Party Intrusion Protection
In many ways examining WiMAX security options is like peeling an onion. It almost seems as if a new layer is revealed or required each time you delve deeper into it.
We have looked at techniques to mitigate physical layer issues such as jamming and corrupted packets. We examined WiMAX authentication schemes, which are a major component of a secure network. And we also spoke of data encryption (which we will examine more in the last segment). WiMAX possesses solid tools already built in.
But there are considerations beyond just good security that can drive a migration to third party intrusion detection and protection tools---namely business case elements. Intrusion protection is however, not data protection. These are two different classes of solution. Certainly good third party intrusion protection can monitor and secure a network's authentication. However many solutions also offer worm protection, Trojan horse protection, defenses against viruses, backdoor exploits and denial of service attacks to name a few. Some of these elements are almost a business necessity for a wireless service provider and may justify the cost of an additional security suite initially. For other companies, a migration strategy to enhanced tools makes the most cost effective sense.
A good place to start is examining market and service scenarios. If your customer base is highly sensitive to data integrity (financial sector or hospital customers) third party intrusion prevention systems can help segment customers from each other better as well as secure them from outside attack.
Or in another example, a mobile network that offers just internet access and voice may wish to abrogate responsibility for data encryption and relay on session initiation protocol (SIP) signaling for its VoIP and WiMAX native authentication tools.
This is just a couple of scenarios with limited data encryption needs. But what if your business model demands more?
Third Party Data Transport Security
Clearly an AES supported data encryption system gives WiMAX excellent security in this regard. However, additional solutions that meet customer needs such as virtual private networks require different approaches. And Useckas for his part believes data transport security and authentication with third party tools can be a lot easier than most realize and convey a lot of advantages.
"If you force everybody to install a small piece of client software you can enforce EAP based authentication across your entire network for example," explained Useckas. "This also allows for an IPSec AES-based data encryption solution that supports tunneling and encapsulation of data."
Useckas added that these techniques are likely to become increasingly important to enterprise customers whose employees travel with laptops that need to access highly sensitive databases via VPN products.
WiMAX - Security Functions
Security is handled by a privacy sublayer within the WiMAX MAC. The key aspects of WiMAX security are as follow:
Support for privacy:
User data is encrypted using cryptographic schemes of proven robustness to provide privacy. Both AES (Advanced Encryption Standard) and 3DES (Triple Data Encryption Standard) are supported.
The 128-bit or 256-bit key used for deriving the cipher is generated during the authentication phase and is periodically refreshed for additional protection.
Device/user authentication:
WiMAX provides a flexible means for authenticating subscriber stations and users to prevent unauthorized use. The authentication framework is based on the Internet Engineering Task Force (IETF) EAP, which supports a variety of credentials, such as username/password, digital certificates, and smart cards.
WiMAX terminal devices come with built-in X.509 digital certificates that contain their public key and MAC address. WiMAX operators can use the certificates for device authentication and use a username/password or smart card authentication on top of it for user authentication.
Flexible key-management protocol:
The Privacy and Key Management Protocol Version 2 (PKMv2) is used for securely transferring keying material from the base station to the mobile station, periodically reauthorizing and refreshing the keys.
Protection of control messages:
The integrity of over-the-air control messages is protected by using message digest schemes, such as AES-based CMAC or MD5-based HMAC.
Support for fast handover:
To support fast handovers, WiMAX allows the MS to use preauthentication with a particular target BS to facilitate accelerated reentry.
A three-way handshake scheme is supported to optimize the reauthentication mechanisms for supporting fast handovers, while simultaneously preventing any man-in-the-middle attacks. | https://www.vskills.in/certification/certified-wimax-4g-professional-security |
US President George Bush has threatened to use new economic and diplomatic measures to pressure Syria over its suspected interference in Iraq before January elections.
“We have sent messages to the Syrians in the past and we will continue to do so. We have tools at our disposal – a variety of tools, ranging from diplomatic tools to economic pressure. Nothing’s taken off the table,” Bush told a news conference.
The president is reviewing a wide range of options, including freezing the assets of high-ranking Syrian government officials, US officials said.
Bush said he had discussed with American generals “whether or not there are former Saddam loyalists in Syria … funnelling money to the insurgents”.
“We ought to be working with the Syrian government to prevent them from either sending money and/or support of any kind,” he added.
US allegations
Washington accused Syria of sending military equipment to Iraq during the US-led invasion last year.
Since then it has claimed that Damascus lets fighters cross its border into Iraq and harbours former officials directing the fighters.
|
|
Bush blames Syria and Iran for
Damascus denies those charges and says it is doing its best to tighten control of the hundreds of miles of mostly desert terrain that define its border with Iraq.
Administration officials said in October they were considering tightening US economic sanctions on Syria to put pressure on Damascus to pull its troops out of Lebanon, and crack down on what it calls terrorism.
In May, Bush imposed a series of sanctions on Syria, including a ban on US exports other than food and medicine.
Syrian WMD?
He also accused Damascus of pursuing weapons of mass destruction (WMD) and failing to stop anti-US fighters from entering Iraq.
Bush’s threat comes less than a week after he demanded that Syria and Iran stop fighters and money from entering Iraq before next month’s elections.
“When I said the other day that I expect these countries to honour the political process in Iraq without meddling, I meant it. And hopefully those governments heard what I said,” he added.
The US-selected interim Iraqi government and Washington frequently blame long-time foe Iran and the Baathist government in Syria for supporting the unrest in Iraq. | https://www.aljazeera.com/news/2004/12/21/bush-renews-syria-threats |
The Data Privacy Privacy Act of 2012 (DPA) prescribes specific registration and internal review requirements on entities that process personal data. Failure to comply with those requirements may result in imprisonment and/or fine. The significant responsibilities of personal data processors are discussed below.
Registration of Data Processing Systems
A Personal Information Controller (PIC), defined as a person or organization who controls the collection, holding, processing or use of personal information, including a person or organization who instructs another person or organization to collect, hold, process, use, transfer or disclose personal information on his or her behalf, or a Personal Information Processor (PIP), defined as any natural or juridical person qualified to act as such under this DPA to whom a PIC may outsource the processing of personal data pertaining to a data subject shall register with the National Privacy Commission (NPC) if it is processing personal data and operating in the country under any of the following conditions:
- the PIC or PIP employs at least two hundred fifty (250) employees;
- the processing includes sensitive personal information of at least one thousand (1,000) individuals;
- the processing is likely to pose a risk to the rights and freedoms of data subjects. Processing operations that pose a risk to data subjects include those that involve:
- Information that would likely affect national security, public safety, public order, or public health;
- Information required by applicable laws or rules to be confidential;
- Vulnerable data subjects like minors, the mentally ill, asylum seekers, the elderly, patients, those involving criminal offenses, or in any other case where an imbalance exists in the relationship between a data subject and a PIC or PIP;
- Automated decision-making; or
- Profiling
- the processing is not occasional and constitutes a core activity of a PIC or PIP, or is integral thereto. Data processing systems that involve automated decision-making shall, in all instances, be registered with the NPC.
Appointment of Data Protection Officer
The regulations provide that any natural or juridical person or other body involved in the processing of personal data shall designate an individual or individuals who shall function as data protection officer (DPO), compliance officer, or shall otherwise be accountable for ensuring compliance with applicable laws and regulations for the protection of data privacy and security
Notification of Automated Processing Operations
A PIC carrying out any wholly or partly automated processing operations or set of such operations intended to serve a single purpose or several related purposes shall notify the NPC when the automated processing becomes the sole basis for making decisions about a data subject, and when the decision would significantly affect the data subject.
Privacy Management Program and Privacy Manual
Entities involved in the processing of personal information should have a Privacy Management Program, which refers to a process intended to embed privacy and data protection in the strategic framework and daily operations of a personal information controller or personal information processor, maintained through organizational commitment and oversight of coordinated projects and activities.
The Privacy Management Program should then be codified into a Privacy Manual. A sample form of the privacy manual following the template provided by the NPC can be downloaded at this link.
Privacy Impact Assessment
A Privacy Impact Assessment is a process undertaken and used to evaluate and manage impacts on privacy of a particular program, project, process, measure, system or technology product of a PIC or PIP program, project, process, measure, system or technology product of a PIC or PIP. It takes into account the nature of the personal data to be protected, the personal data flow, the risks to privacy and security posed by the processing, current data privacy best practices, the cost of security implementation, and, where applicable, the size of the organization, its resources, and the complexity of its operations.
Copyright 2018. All rights reserved. | https://bccslaw.com/data-privacy-regulatory-compliance/ |
21/01/2019 – The OECD has today published a report that argues that in our quickly changing modern world, education cannot prepare for the future using only lessons of the past. In many countries, education is still struggling to adjust to the changes of today, and is not ready for those of tomorrow. Responsible policy pulls future developments into the present and turns them into an opportunity to learn and prepare.
Trends Shaping Education 2019 identifies key mega-trends affecting the future of education. “As we stand at a critical juncture we need to overcome short-termism and develop ways to explore the signals and trends of the future that may seem less familiar to us but which are just as important to understand,” said Angel Gurria, OECD Secretary-General. “Trends Shaping Education is a vital tool in this regard.”
The top three mega-trends are:
As international mobility continues to rise, our systems will be under more pressure to integrate diverse students from all backgrounds. Between 1990 and 2017, the total number of international migrants grew from 153 to 258 million people, an increase of 69%. Today, social heterogeneity in classrooms already poses one of the biggest challenges for teachers. The challenge will be greater in the next 5-10 years. The stakes are great: inequality of opportunity can translate into disparities in well-being, and drive political and social unrest.
Education is already behind the digitalisation curve. It must do more to take advantage of the tools and strengths of new technologies while simultaneously addressing concerns around potential misuse, such as cyberbullying and privacy issues. In 2018 the number of stolen or hacked data records was the highest ever in one year, and the need for cyber security experts is growing. Yet education still struggles to encourage students, and especially girls and certain minorities, to take STEM (science, technology, engineering and maths) subjects.
“The dilemma for education is that the kinds of things that are easy to teach and test have also become easy to digitise, automate and outsource” said Andreas Schleicher, Director of Education and Skills at the OECD. “We need to think much harder about how human skills complement the artificial intelligence of computers, so that we end up with first-class humans rather than second-class robots.”
This is not just a labour market concern. In a world where the number of individuals reading the news online increased by about 40% on average across OECD countries, there is an increasing need for digital literacy and critical thinking, and not just for young students. Yet in many countries, older adults have inadequate skills to manage complex digital information. Governments – and employers – need to seriously address what it would take to deliver education that is not only life-long, but life-wide.
While challenging, it is imperative that we plan our education systems taking these mega-trends into account. The future is not a distant external world where we can send our problems to be fixed by education. The future is here, and our success depends on how effectively we use our knowledge to anticipate and act.
Trends Shaping Education 2019 explores major economic, political, social and technological trends affecting the future of education, from early childhood through to lifelong learning. It aims to inform strategic thinking and stimulate reflection on the challenges facing education, and conversely, the potential of education to influence these trends.
The report is available at http://www.oecd.org/education/trends-shaping-education-22187049.htm
For more information, journalists should contact Leonora Lynch Stein (+33 145 24 74 81).
For information on the Trends Shaping Education work programme, please see http://www.oecd.org/education/ceri/trends-shaping-education.htm
Working with over 100 countries, the OECD is a global policy forum that promotes policies to improve the economic and social well-being of people around the world. | https://www.oecd.org/education/ceri/trends-shaping-education-2019-oecd-says-countries-should-use-global-mega-trends-to-prepare-the-future-of-education.htm |
Transit systems form a lifeline connecting residents and visitors to various locations across a city, and when service is disrupted the effects are felt far and wide. This past summer, for instance, Metro de Madrid scheduled maintenance repairs along the Line 5 which suspended commuter service. Full service was restored on September 3, 2017, but what impact did the Line 5’s 62 day shutdown have upon the city of Madrid?
With available location data collected from IoT sensors and other smart devices used throughout Madrid we measured the emotional and economic impact of the Line 5 maintanance closure.
With support from our friends at LUCA, we found that while the service disruption inconvenienced city residents, commuters residing beyond Madrid’s city limits were left without alternative modes of transportation. Subsequently, the decrease in commuters traveling into Madrid for 62 days also reduced economic activity along the Line 5’s 32 stops.
Let’s see what how this kind of data could equip public sector leaders in Madrid with solutions for smarter, more transparent decision making in their city.
Expanding smart city solutions to nearby suburbs
The Line 5, the city’s fourth most popular line, runs from the southwest of Madrid to the northeast and connects suburban hubs, like Carabanchel and Ciudad Lineal, to Spain’s capital.
Unlike their city residents, who could access alternate modes of transportation including shuttle bus services, bike rentals, or even other metro lines, suburban commuters traveling from home to work had few, if any, alternatives.
But how can we measure the impact that this closure had upon riders who live beyond Madrid’s m30 loop and are dependent on the Line 5?
Emilio, one of our UI Designers and Developers, mapped the Line 5 and plotted each metro station along the route as seen in the image below:
To analyze commute patterns we first needed to identify the point of origin and point of departure of a typical Line 5 commute.
Open data from Atlas of Residence and Work Mobility in the Community of Madrid was used to gauge mobility patterns, and this demographic data revealed that the majority of Line 5 riders reside in southwest suburbs but commute northeast each day for work.
The southwestern Carabanchel Line 5 station, for example, is the point of origin for the many riders commuting into the city while the northeastern Suanzes Line 5 station, servicing the Julian Camarillo district, the most popular work location, is the point of departure for many riders.
Emilio imported Line 5 demographic data and mobility data, and in the image below you’ll see the most common point of origin and most common point of destination for Line 5 riders:
This data visualization provides a solid statistical overview of Line 5 ridership, but to understand the impact of a 62 day closure for residents living beyond Madrid’s m30 loop we’ll need a more granular view.
Making smart city’s citizen-centric with Location Intelligence
For more granular insights into Line 5 mobility patterns we collaborated with our partners LUCA, Telefónica’s Big Data department, and used their LUCA Transit platform.
We imported available anonymized and aggregated mobile event data. While we had mapped available open data, LUCA’s data allowed us to map group mobility patterns with location data from commuters’ smart devices.
Now we could assign points of interest (in this case work and home location) by looking at the dynamic recurring locations of mobile phones (using Smart Steps technology) that provided mobility trends on almost 40% of the Spanish population.
Emilio imported this data into the data visualization below:
Here are some of the interesting findings provided from this more granular view of Line 5 commuter trends:
- Carabanchel was the most affected Line 5 station for suburban commuters
- Suanzes, which provides service to the Julian Camarillo district, was the most affected Line 5 station for workers
- More than 50% of Line 5 ridership board metro stations beyond the m30 loop as their point of origins, which is a sizable population impacted by service disruption
Harnessing location data for smart cities and suburbs
All in all, it is clear that leveraging location data to optimize infrastructure and mobility decisions brings great value to governments who want to bring transparency to their decision-making.
Citizens want to live in smarter, more efficient cities and Location Intelligence is an enabler for leaders who want to make data the cornerstone of their public service strategy.
Find out more about how you can use CARTO to optimize city services using location data at our upcoming webinar!
Harnessing the Power of Location Intelligence for Cities
[Webinar] Helping local government officials turn location data into smart city solutionsRSVP Today! | https://carto.com/blog/mapping-impact-madrid-line-5-shutdown/ |
Thinking about a sentence with which I would start this article, thus setting the tone right on, I came up with this: All work is not created equal. This especially applies when taking productivity in consideration. That is, given the fact that some things require, and some are actually OK with the lack of it.
You see, there is a distinction to be made between what we know as creative work, and all the other to be honest. Not only does creative work has more going on in the sense of originating, but the circumstances in which it occurs are entirely different to say the least.
The ones who do creative work are, in a way, faced with obstacles that surpass those who are not involved into the creative process by a huge margin. Hence the answer to these obstacles is to be found elsewhere instead of where we would usually look for.
Productivity has its limitations too
You see, it is a common belief that being productive buys you a lot of success either way. This however is only partially true. True, in the sense of productivity being the thing behind creating the circumstances in which the creative work takes place, wrong however in the sense of expecting productivity to solve the problem we have with being able to constantly deliver.
Creative work is entirely different. I can repeat this till it becomes cliche, and it will still be true. Most of us doing some sort of creative work have already noticed this anyway. It becomes quite apparent after a while, the realization, that is, that productivity can push us only but so far.
It is needed, I give you that, but it does the ground work only in a narrow band of circumstances. With creativity and creative work of any kind however, the answer is always on the periphery.
When you can rely on it?
Sometimes productivity shows itself of no use, have you noticed? In many situations, be that in creating something original, figuring out a new approach, crafting a perfect coherent piece out of your thoughts and ideas, it simply don’t apply, now does it?
Sometimes giving deadlines or setting aside time frames in which you are to create, is not enough. Threatening with a sharper stick, or enticing with a sweeter carrot, does not always come handy. Creating reward systems, or anything of the like can prove disappointing.
However, you can still take something out of productivity as to achieve your goal in creating something original.
For the most part, this can really just be creating the circumstances in which you are to set your creative flow. Albeit not enough, this is a good enough starting position. Implementing productivity techniques and methods then, seems perfectly in order.
Create the conditions for being productive
If you start to work at a cluttered desk, it is hard to focus your attention, engage with deep and meaningful work, and describe your day as productive. And this is just a caricature on how you need to prepare upfront in order to have a productive and uninterrupted flow.
Here is a thought experiment that encapsulates some of the principles – having an intense workout.
In order to have an intense workout, you need to prepare one or two days ahead. You’ll need to eat balanced and light meals, so that your body is not bloated and fatigued. Then, you’ll need to set a time in your schedule, clean the room half an hour prior, and get all of the necessary gadgets for this particular workout.
You can read the best motivational workout quotes and anticipate the session ahead.
Having a light cardio session, and practicing a series of stretches for two days in a row before you hit the ground is also a good idea. It’s like exercising both mind and body, preparing them for what comes ahead.
Using productivity only as to set the pace
We all assume that productivity and organization are not something creative people commonly care about. We rather embrace the belief that creative work is more likely to happen in the midst of the clutter or in some instant in time.
And while I recon this to be true to a certain extent, the truth of the matter is, that creativity and the whole process of creative work are rather quite more complex.
I ought to know some parts of the equation since I was, and I’m still involved in creative work. Practicing violin for the most part of my life, and now involved with writing and Internet Marketing, I noticed that sometimes we need sort of a trigger as to ignite the creative flow.
This usually translates into constructing the best circumstances, making the ground fertile in the sense of limiting obstacles and distractions. And this is more productivity than anything else.
While approaching creative work itself from a schedule point of view is not going to work, making a schedule as to free room for creativity related work has shown quite well. Productivity then, is to be applied in all other aspects that surround the creative process, and just let the work flow uninterrupted, free of obstacles.
That way the freedom aspect is still intact, but the process as a whole is rather directed and controlled as much as possible.
We can do much to create the time, space and circumstances in which creative work occurs; but there is no silver bullet; no single device that is going to change the rhythm of invention. We can as well accept that creative work cannot be rushed.
Sometimes the “achieve” and “accomplish” mindset is better off changed with the stillness of letting things flow by themselves. We can create the circumstances, but sometimes the desired epilogue requires time and repetition, and here it’s more dedication and persistence than anything else. Remember, all work is not created equal. | https://www.lifestyleupdated.com/2012/10/01/productivity-in-creative-work/ |
The excellent in-plane strength and stiffness to-weight ratios, as well as the ease of manufacturing have made the carbon fiber reinforced polymer composites (CFRPs) suitable structural materials for variety of applications ...
Carbon Nanotube Based Dosimetry of Neutron and Gamma Radiation
(Virginia Tech, 2016-04-29)
As the world's nuclear reactors approach the end of their originally planned lifetimes and seek license extensions, which would allow them to operate for another 20 years, accurate information regarding neutron radiation ...
A Computational and Experimental Study on the Electrical and Thermal Properties of Hybrid Nanocomposites based on Carbon Nanotubes and Graphite Nanoplatelets
(Virginia Tech, 2012-12-13)
Carbon nanotubes (CNTs) and graphite nanoplatelets (GNPs) are carrying great promise as two important constituents of future multifunctional materials. Originating from their minimal defect confined nanostructure, exceptional ...
Next Generation Multifunctional Composites for Impact, Vibration and Electromagnetic Radiation Hazard Mitigation
(Virginia Tech, 2012-11-16)
For many decades, fiber reinforced polymers (FRPs) have been extensively utilized in load-bearing structures. Their formability and superior in-plane mechanical properties have made them a viable replacement for conventional ...
Effects of Proton Irradiation on the Mechanical and Physical Properties of Carbon Nanotube Based Composites
(Virginia Tech, 2014-01-27)
In this study, the effects of proton irradiation on carbon nanotube (CNT)-epoxy composites are investigated for potential applications in radiation shielding for spacecraft. CNT-epoxy composites were prepared using multiwall ...
Hybrid Carbon Fiber/ZnO Nanowires Polymeric Composite for Stuctural and Energy Harvesting Applications
(Virginia Tech, 2014-07-01)
Despite the many attractive features of carbon fiber reinforced polymers (FRPs) composites, they are prone to failure due to delamination. The ability to tailor the fiber/matrix interface FRPs is crucial to the development ...
Computational and Experimental Nano Mechanics
(Virginia Tech, 2014-09-04)
The many advances of nano technology extensively revolutionize mechanics. A tremendous need is growing to further bridge the gap between the classical mechanics and the nano scale for many applications at different engineering ... | https://vtechworks.lib.vt.edu/handle/10919/5534/discover?field=advisor&filtertype=advisor&filter_relational_operator=equals&filter=Al-Haik%2C+Marwan |
Morbidly obese patients represent a growing but understudied patient population with sparse and oftentimes contradicting information in the field of antiinfective therapy. To guarantee effective and safe treatment of bacterial infections targeted patient and pathogen specific antibiotic therapy is crucial.
For a pathogen specific therapy not only the antimicrobial spectrum of the drug but also adequacy of the dosing regimen and the resulting effective drug concentration-time profile at the target site are important. To measure effective drug concentration at target site, in case of antiinfectives mostly the extracellular interstitial fluid in the tissue, the minimally invasive method microdialysis is selected.
Regarding patient specific antibiotic therapy the oftentimes significant variability of the drug concentration-time profile is of interest. Employing standard dosing regimens bears the risk of subtherapeutic or toxic concentration-time profiles which might lead to therapy failure, increased occurrence of adverse events and development of bacterial resistance.
My dissertation project includes the pharmacometric analysis of frequently employed antibiotics after standard dosing regimens in morbidly obese patients. Based on clinical data on plasma and target site drug concentrations using microdialysis nonlinear mixed effects models will be developed. In a first step the pharmacokinetics of the antibiotics will be characterised, i.e. the population specific concentration-time profile and the different levels of variability between and within patients. In a second step patient specific covariates (e.g. markers of organ function or disease status) will be identified, which explain inter- and intraindividual variability and their impact on model parameters will be quantified.
Simulations based on the developed model can be utilised to evaluate dosing regimens regarding achieving effective pathogen specific drug concentration-time profiles (pharmacodynamics/pharmacokinetic targets) in morbidly obese patients. If need be alternative adequate dosing regimen with reduced adverse events can be suggested. In such an integrative manor knowledge spanning different classes of antibiotics shall be generated. Additionally the aim is to guarantee antiinfective therapy success in this patient population and to reduce the development of further antibiotic resistance.
Publications
Please see the list of all publications and PhD theses. | https://www.pharmetrx.de/students/profile/david-busse.html |
A Manhattan Judge Has Allowed A Former Apprentice Contestant's Defamation Lawsuit Against Trump To Go Forward
Summer Zervos sued Trump for comments he made about her during the campaign. "No one is above the law," Justice Jennifer Schecter wrote Tuesday, denying Trump's request to dismiss the lawsuit.
A state court judge in Manhattan has ruled that Summer Zervos's defamation lawsuit against President Donald Trump for comments he made about her during the campaign can proceed while Trump is in office.
"No one is above the law," Justice Jennifer Schecter wrote in her 18-page ruling on Tuesday.
Zervos, a former contestant on The Apprentice who had made public accusations against Trump during the campaign about "unwanted sexual misconduct," sued him after he said "these allegations are 100% false" and began calling her and others "phony people coming up with phony allegations," among other statements.
Lawyers for Trump had asked that the lawsuit be dismissed, arguing, in part, that he is too busy running the country to be subject to a civil lawsuit like this. The trial court considering the request, the Supreme Court of the State of New York in New York County, heard arguments on the request in December and denied it Tuesday.
Citing a US Supreme Court ruling that allowed Paula Jones' lawsuit against then-President Bill Clinton for "unofficial acts" to proceed in federal court while he was in office, Schecter wrote that the rules should be no different for similar cases brought in state court.
"Nothing in the Supremacy Clause of the United States Constitution even suggests that the President cannot be called to account before a state court for wrongful conduct that bears no relationship to any federal executive responsibility," Schecter wrote. She concluded that "there are no compelling reasons for delaying plaintiff's day in court here."
Additionally, Schecter ruled that the lawsuit could proceed because Zervos has presented a defamation claim that could succeed if she is able to prove that Trump's statements about her are false.
"Defendant used 'specific, easily understood language to communicate' that plaintiff lied to further her interests. His statements can be proven true or false, as they pertain to whether plaintiff made up allegations to pursue her own agenda," Schecter wrote. "[Trump]'s repeated statements—which were not made through op-ed pieces or letters to the editor but rather were delivered in speeches, debates and through Twitter, a preferred means of communication often used by defendant—cannot be characterized simply as opinion, heated rhetoric or hyperbole."
Zervos's lawyer, Mariann Wang, said in a statement that, "[t]he rule of law and sound reason have prevailed today," adding, "We are grateful for the opportunity to prove that that Defendant falsely branded Ms. Zervos a phony for telling the truth about his unwanted sexual groping."
Trump's lawyer in the case, Marc Kasowitz, did not respond to a request for comment. | https://www.buzzfeednews.com/article/chrisgeidner/former-apprentice-contestant-summer-zervos-sue-trump |
The results reveal that contextual influences alter the spiking activity of V1 in monkeys across large distances on a rapid time scale, carry information about scene identity and resemble those in human V1.
Shape coding in occipito-temporal cortex relies on object silhouette, curvature and medial-axis
- BiologybioRxiv
- 2019
It is found that object shape is encoded in a multi-dimensional fashion and thus defined by the interaction of multiple features and that the relevance of shared representations linearly increases moving from posterior to anterior regions.
Shape coding in occipito-temporal cortex relies on object silhouette, curvature and medial-axis.
- Biology, Computer ScienceJournal of neurophysiology
- 2020
Results indicate that the visual cortex encodes shared relations between different features in a topographic fashion and that object shape is encoded along different dimensions, each representing orthogonal features.
Common spatiotemporal processing of visual features shapes object representation
- PsychologybioRxiv
- 2018
The temporal dynamics of feature processing in human subjects attending to objects from six semantic categories are revealed, showing that low-level properties, shape and category are represented within the same spatial locations early in time: 100–150 ms after stimulus onset.
SMU-Net: Saliency-Guided Morphology-Aware U-Net for Breast Lesion Segmentation in Ultrasound Image
- Computer ScienceIEEE Transactions on Medical Imaging
- 2022
A saliency-guided morphology-aware U-Net (SMU-Net) for lesion segmentation in BUS images with higher performance and superior robustness to the scale of dataset than several state-of-the-art deep learning approaches.
A neurodynamic model of the interaction between color perception and color memory
- Biology, PsychologyNeural Networks
- 2020
The Contribution of Shape Features and Demographic Variables to Disembedding Abilities
- PsychologyFrontiers in Psychology
- 2022
Humans naturally perceive visual patterns in a global manner and are remarkably capable of extracting object shapes based on properties such as proximity, closure, symmetry, and good continuation.…
Emotionotopy: Gradients encode emotion dimensions in right temporo-parietal territories
- Psychology, BiologybioRxiv
- 2018
Right TPJ activity is explained by orthogonal and spatially overlapping gradients encoding the polarity, complexity and intensity of emotional experiences, and emotionotopy is proposed as the underlying principle of emotion perception in TPJ.
References
SHOWING 1-10 OF 85 REFERENCES
Object segmentation controls image reconstruction from natural scenes
- BiologyPLoS biology
- 2017
This work describes a novel paradigm that enabled us to selectively evaluate the relative role played by these two feature classes in signal reconstruction from corrupted images and suggests instead that these two modes are best viewed as an integrated perceptual mechanism.
Texture Segregation Causes Early Figure Enhancement and Later Ground Suppression in Areas V1 and V4 of Visual Cortex
- Environmental ScienceCerebral cortex
- 2016
This work compared texture-defined figures with homogeneous textures and found an early enhancement of the figure representation, and a later suppression of the background, which provides new insights into the mechanisms for figure–ground organization.
The Role of Attention in Figure-Ground Segregation in Areas V1 and V4 of the Visual Cortex
- PsychologyNeuron
- 2012
Texture segregation in the human visual cortex: A functional MRI study.
- BiologyJournal of neurophysiology
- 2000
Using functional MRI, this work investigates the level at which neural correlates of texture segregation can be found in the human visual cortex and provides evidence that higher order areas with large receptive fields play an important role in the segregation of visual scenes based on texture-defined boundaries.
Visual Image Reconstruction from Human Brain Activity using a Combination of Multiscale Local Image Decoders
- BiologyNeuron
- 2008
Object-related activity revealed by functional magnetic resonance imaging in human occipital cortex.
- PsychologyProceedings of the National Academy of Sciences of the United States of America
- 1995
Evidence for an intermediate link in the chain of processing stages leading to object recognition in human visual cortex is reported, which suggests that the enhanced responses to objects were not a manifestation of low-level visual processing.
Identifying natural images from human brain activity
- Biology, PsychologyNature
- 2008
A decoding method based on quantitative receptive-field models that characterize the relationship between visual stimuli and fMRI activity in early visual areas is developed and it is suggested that it may soon be possible to reconstruct a picture of a person’s visual experience from measurements of brain activity alone.
Feedforward and Recurrent Processing in Scene Segmentation: Electroencephalography and Functional Magnetic Resonance Imaging
- BiologyJournal of Cognitive Neuroscience
- 2008
Electroencephalography (EEG) and functional magnetic resonance imaging data are presented with a paradigm that makes it possible to differentiate between boundary detection and scene segmentation in humans and conclude that texture boundaries are detected in a feedforward fashion and are represented at increasing latencies in higher visual areas.
Local figure-ground cues are valid for natural images.
- Environmental ScienceJournal of vision
- 2007
This work quantified the extent to which figural regions locally tend to be smaller, more convex, and lie below ground regions and developed a simple bottom-up computational model of figure-ground assignment that takes image contours as input. | https://www.semanticscholar.org/paper/Foreground-Background-Segmentation-Revealed-during-Papale-Leo/78475df4faf82cd57970c1bbcd09f95dd265c831?p2df |
Step 1: A complimentary meeting, where there is a mutual process of getting to know each other in order to determine whether our services would be of benefit to you and your family.
Step 2: Mutually identifying your personal goals, objectives, and aspirations, so that we can better understand how your primary assets--your time and your finances--can be organized to achieve these goals. Our first planning session is typically spent compiling your current assets, taking an inventory of insurance coverage's, as well as wills and any estate documents. At this time we also review your monthly income and expenses, as well as your tax returns. We learn about your past investment experiences and attempt to evaluate your tolerance for investment volatility and risk. Meanwhile, if there are any short-term or specific goals that you wish to achieve, we will provide you with guidance or assistance at this time.
Step 3: A preliminary financial analysis with proposals and initial recommendations. This includes an evaluation of whether the goals articulated on the goals list are achievable within a reasonable time frame. At this point, we will make recommendations on all your investment holdings with suggestions for change, if appropriate.
Step 4: After receiving feedback from you, we revisit the financial planning analyses and proposals, adjust recommendations where appropriate, complete asset transfers, implement investment recommendations, and begin to take action on any estate planning and insurance issues that are addressed in the plan.
Step 5: Continuously monitoring the progress toward your goals to see what, if anything, needs to be adjusted to your financial plan for the upcoming year. The end result is a financial plan that is specific to your needs and addresses both tangible and intangible goals. It strikes a balance between the financial choices you make that consume capital, and the value-based goals you wish to achieve that are intangible in nature but have everything to do with creating a satisfying life. In situations where a specialist (attorney, tax or insurance professional) is appropriate, we will provide referral options and offer to coordinate with that specialist.
We believe in asset allocation. Studies have shown that asset allocation is the dominant factor in determining total portfolio return. We also believe that, as a general rule, the future cannot be predicted and neither can the direction of stock prices. Therefore, it generally makes more sense to build investment portfolios based on exposure to asset classes, rather than on the performance of individual stocks. We focus on fundamentals and avoid speculating on so-called hot stocks or mutual funds.
We believe in Tactical Asset Allocation. Investopedia describes TAA as: "An active management portfolio strategy that re-balances the percentage of assets held in various categories in order to take advantage of market pricing anomalies or strong market sectors."
We select money managers who employ CFAs (Chartered Financial Analysts), engineers, CFP®s and other industry veterans for their strengths of stock picking and defensive trading so that we are constantly working for you to try to give your portfolio the best opportunity for long-term growth and income while attempting to protect your money from major losses along the way.
Tactical money management does not guarantee a portfolio from losses or assure a profit, but it does offer disciplined and time tested investing with sell strategies in place from the date you enter the portfolio. By minimizing the losses, you do not have to 'shoot for the moon' to 'recover', which further increases your portfolio risk.
(Source: Dalbar). Diversification and asset allocation strategies do not assure profit or protect against loss.
Hourly fees: Hourly fees. At the rate set forth below. This approach is typically recommended for shorter term consulting requests or more limited financial planning and analyses. It may also be appropriate when the extent of work to be done is very unclear. The Advisor hourly fee is $200.00 with a minimum engagement of five (5) hours.
Project fees: Project fees. These are fixed at the beginning of the engagement and based on an estimate of the time required to complete the work. This approach is for both basic planning and for complex planning cases. The project fee is based on the hourly rate listed above multiplied by the number of hours Applicant expects to spend on the project. Usually this will require 10 to 30 billable hours or approximately $2,000 to $6,000.00. Client fees are outlined in advance in writing and are collected 50% upon engagement and 50% upon plan delivery.
For those clients making use of Portfolio Management Services, the fee is based upon the total asset under management. The specific services and compensation arrangements appropriate for each client, as well as appropriate disclosures, are documented in an agreement signed by the client prior to services being rendered.
Investing involves risk. Depending on the type of investment, there may be varying degrees of risk. Investors should be prepared for loss, including total loss of principal. Asset allocation and diversificaiton strategies do not assure profit or protect against loss. | https://www.stockerwoods.com/our-services |
Most organizational leaders have been pleasantly surprised by their teams’ performance during an unexpected year of remote work. While they may have previously believed their organizations couldn’t adapt to remote work, the pandemic forced their hands, and many have maintained effective levels of productivity, engagement and collaboration.
However, the transition to remote work was clearly easier for some companies than others. Many of the companies who excelled at transitioning to a virtual environment without affecting their culture had one key things in common: they had strong cultures supported by clear and consistent organizational core values.
Whether you are the leader of an entire organization, the head of a department or even just the manager of a team, you need to make core values a core part of your leadership strategy. This will ensure your company or team culture is high-performing, even in a remote setting.
Clear, consistent values
There’s a decent chance your company already has core values. But ask yourself—are your core values unique differentiators that drive behavior and decision making, or are they simply platitudes on the wall, such as “Honesty,” “Integrity,” or “Teamwork”?
In companies with strong cultures, core values aren’t just marketing material. They describe the DNA of top employees and dictate how employees behave when managers are not in the room. In a remote workplace, where you literally cannot be in a room with your team, this is more important than ever.
If you are the leader of your organization, you have the authority to change your company’s values. But even if you don’t control your company’s cultural principles, you should still take stock of whether they provide necessary guidance to your team, and consider how to create a set of values for your team.
To determine if your core values effectively guide your employees, ask yourself some questions. Do you feel good about the decisions your employees are making independently? Do your values encapsulate the most important qualities your employees must have to excel at your organization? Can people tell you what they are without looking at a cheat sheet or referring to a mnemonic device?
If you answered no to any of these questions, you need a core value overhaul. If you don’t have the authority to change your organization’s values, you might want to consider your personal leadership core values, then use those as guideposts for how you expect your employees to behave.
Remember, more core values aren’t necessarily better: if you have three core values, rather than six, it is easier for employees to remember them, and easier to incorporate them into your team’s operations.
Repeat and reinforce
Similarly, cultural principles such as core values should not be mentioned only on occasion. It’s important to share these core values with candidates in the hiring process, make them a key part of onboarding, and ensure your managers are demonstrating and reinforcing these values to their teams on a consistent basis.
Consider ways you can incorporate them into your company or team’s daily activities. You might consider including core value shoutouts in your team’s meetings, where employees can commend each other for exemplifying one of your values in a certain way. Some companies even give out annual awards to employees who particularly demonstrate each core value in their work.
These types of activities really make it clear to employees what your core values are and incentivize them to understand and exhibit them.
Ideally, your employees should use your company’s core values to guide their daily work and make decisions when they cannot ask a manager or supervisor. Having strong, reinforced core values is the best way to ensure your employees are serving your organization’s interests when they are unsupervised and everyone is working from the same playbook—which is crucial in a remote organization.
Manage according to values
A final step to building a cultural foundation, even in a remote workplace, is to make your core values a crucial part of your organization’s management processes. This includes performance evaluation.
Build core value assessment into the evaluation process and talk with employees about how and where they can improve. Core values can be used to justify rewarding employees with incentives such as bonuses or to determine if an employee is ready to be promoted. You should also demonstrate to your team that someone who doesn’t align with your company values won’t be on the team for very long. This ensures employees understand that success at your organization is dependent upon core values.
Many leaders are worried that they cannot have a distinct, connected culture in a remote workplace. However, by leaning into core values, you can ensure your employees are making the right choices for the right reasons, even when they are out of sight. | https://www.simpletruths.com/blog/heres-what-most-leaders-get-wrong-about-remote-work.html |
Editor’s Note: All opinion section content reflects the views of the individual author only and does not represent a stance taken by The Collegian or its editorial board.
I, like most other people, have grown up hearing from my parents, my friends, my professors and many different types of media that cheating is wrong. And yet, in my senior year of college, I still hear about instances of academic dishonesty time and time again.
Ad
According to the Lexico online dictionary, to cheat is to “act dishonestly or unfairly in order to gain an advantage, especially in a game or examination.”
In college, cheating comes in different forms, whether it’s programming formulas into a graphing calculator, bringing extra note sheets into an exam or giving a friend your iClicker for attendance points when you don’t go to class. None of these things are necessarily right, but there are different levels of dishonesty and different levels of punishment.
That being said, according to Kessler International, approximately 86% of college students surveyed admitted to having cheated in some way during school. This statistic didn’t surprise me, but it did make me curious about the effects of online classes on the prevalence of cheating.
Ever since March 11, when Colorado State University first announced it was moving classes online, a lot has changed for students. My classes have all transitioned to prerecorded lectures, online homework submissions and discussion posts via Canvas. Aside from my senior design class, I’ve had much less interaction with my teachers and classmates.
An article published by The Quad Magazine suggests that “Online colleges that fail to produce a personal experience … and never create an opportunity for familiarity are especially vulnerable to cheating.” The many stay-at-home orders currently in place across the country have turned every college class into a virtual experience.
Ultimately, it is an ethical decision, but when making this choice, academic dishonesty should be viewed as what it is: not fair to other students.”
Despite this lack of communication during lecture time, I haven’t stopped talking to my friends about assignments, projects and exams — quite the contrary, actually. If anything, I’m more likely to text my classmates about the homework if I get stuck on a problem, as I have less opportunity to ask the professor for clarification. But there is a difference between asking for an explanation or guidance and asking for a solution, and the temptation is always present.
While it seemed to me as though people would be much more likely to cheat during their online classes, a study published by the University of West Georgia suggested that actual cheating rates were slightly higher for in-person classes than online classes. It also indicated, however, that students are “significantly more likely to obtain answers from others during an online test or quiz” than an in-person examination.
There are a few different policies that I’ve seen put into place to combat that. Some classes are making exams open note. Other classes are replacing exams with projects. Some are even using ProctorU to record students as they complete assignments to ensure that cheating doesn’t happen.
But there are always ways to get around those policies, and as always, the choice of whether or not to cheat is a personal one. Ultimately, it is an ethical decision, but when making this choice, academic dishonesty should be viewed as what it is: not fair to other students.
Most students are familiar with CSU’s code of honor; “I have not given, received or used any unauthorized assistance.” It used to be printed on the front of my calculus exams, and in my hydraulics class, we still have to submit a signed copy with every homework assignment.
Ad
This code of honor has come up much more frequently in my online classes than it ever has in person. I think that it is meant to remind us about the significance of our actions. Whether or not students are more likely to cheat, it is important to remember that cheating still carries the same implications of dishonesty and unfairness online as it does in person.
Allie Huber can be reached at [email protected] or on Twitter @a11iehuber. | https://collegian.com/articles/opinion/2020/04/category-opinion-huber-just-because-classes-are-online-doesnt-mean-you-can-cheat/ |
Academic integrity at Northwestern is based on a respect for individual achievement that lies at the heart of academic culture. Every faculty member and student belongs to a community of scholars in which academic integrity is a fundamental commitment.
Students enrolled at Northwestern are expected to adhere to the University’s standards of academic integrity. Questions about the acceptability of specific behavior should be addressed to the appropriate faculty member or school dean. The following is a non-exhaustive list of types of behavior that violate the standards of academic integrity:
- Cheating: using unauthorized notes, study aids, or online sources and tools on an examination; altering a graded work after it has been returned, then submitting the work for regrading; allowing another person to do one’s work and submitting that work under one’s own name; submitting identical or similar papers for credit in more than one course or repurposing the same work for multiple assignments in a class without prior permission from the course instructors
- Plagiarism: submitting material that, in part or whole, verbatim or paraphrased, is not entirely one’s own work without attributing those same portions to their correct source according to the expectations of the particular discipline (material discussing the use and acknowledgment of sources is available in the Office of the Provost)
- Fabrication: falsifying or inventing any information, data, or citation; presenting data that were not gathered in accordance with standard guidelines defining the appropriate methods for collecting or generating data and failing to include an accurate account of the method by which the data were gathered or collected
- Obtaining an unfair advantage: stealing, reproducing, circulating, or otherwise gaining access to examination materials prior to the time authorized by the instructor; stealing, destroying, defacing, or concealing library materials with the purpose of depriving others of their use; unauthorized collaborating on an academic assignment; retaining, possessing, using, or circulating previously given examination materials, where those materials clearly indicate that they are to be returned to the instructor at the conclusion of the examination; intentionally obstructing or interfering with another student’s academic work; otherwise undertaking activity with the purpose of creating or obtaining an unfair academic advantage over other students’ academic work; use of prohibited online tools, repositories of examination materials, or online examination assistance services
- Aiding and abetting dishonesty: providing material, information, or other assistance to another person with knowledge that such aid could be used in any of the violations stated above; providing false information in connection with any inquiry regarding academic integrity; providing or selling class materials to websites that sell such materials to students, including notes, PowerPoint slides, outlines, and graded assignments.
- Falsification of records and official documents: altering documents affecting academic records; forging signatures of authorization or falsifying information on an official academic document, grade report, letter of permission, petition, ID card, or any other official University document
- Unauthorized access to computerized academic or administrative records or systems: viewing or altering computer records; modifying computer programs or systems; releasing or dispensing information gained via unauthorized access; interfering with the use or availability of computer systems or information
It is the responsibility of every member of the academic community to be familiar with the specific policies of his or her school. A student who violates these policies may be subject to sanctions, including but not limited to one or more of the following: a letter of reprimand; a period of suspension with or without the attachment of conditions; reduced or failing grade in a course; notation on the official record; expulsion from the University, with notation on the transcript; or revocation of an awarded degree. A student may not change his or her registration in a course in which a violation of academic integrity has been alleged, regardless of whether the allegation has been referred to the designated school official. Nor may a student receive a University degree while a finding is pending or while a suspension has been imposed pursuant to a finding. Information on procedures that will be followed in cases of alleged violations of academic integrity may be obtained from the dean’s office of each school. This will include information regarding how decisions may be appealed to the appropriate University officials, up to and including the University provost. A complete statement of the University’s principles regarding academic integrity may be obtained from the Office of the Provost at www.northwestern.edu/provost/policies-procedures/academic-integrity/index.html . | https://northwestern-preview.courseleaf.com/undergraduate/academic-integrity/ |
The saffron, white, and green stripes of the flag of India represent distinct values of the country. They are said to stand for, respectively, courage and sacrifice, peace and truth, and faith and chivalry.
What does the 3 colors of the flag mean?
According to custom and tradition, white signifies purity and innocence; red, hardiness and valor; and blue signifies vigilance, perseverance, and justice.
Why Ashoka Chakra is blue?
Many inscriptions of Emperor Ashoka have a chakra (wheel shape) which is also called Ashoka Chakra. The circle is of blue colour. It is said about its color, blue color Represents the sky, the ocean and the universal truth. Hence the blue colored Ashoka Chakra is in the center of the white stripe of the national flag.
What is the Indian flag based on?
In India, the term “tricolour” almost always refers to the Indian national flag. The flag is based on the Swaraj flag, a flag of the Indian National Congress designed by Pingali Venkayya.
What is the importance of Indian flag?
Importance of Indian Tricolor Flag
The Indian tricolour flag, which has been a source of motivation, inspiration to the people of India within the country and around the globe, is also symbolic of the patriotic feeling and unity among its diverse communities and geography.
Which country has no tricolor flag?
Nepal has remained a separate, sovereign kingdom and proudly flies its traditional flag, whose basic design dates back for centuries. The background colour is crimson, the border a dark blue—both popular colours in Nepalese art and decoration.
Which country flag is similar to Indian flag?
These form Article 1 of the first part of the 1999 Constitution of Niger. The flag is similar to that of India, but differenced by the ratio, color shades, and details of disc in the center.
Why Ashoka Chakra has 24 lines?
The Ashoka chakra is also known as Samay chakra in which the 24 spokes represent 24 hours of the day and is the symbol of the movement of the time. … The chakra signifies that there is life in movement and death in stagnation. It represents the dynamism of a peaceful change. India should not resist the change.
Who made Indian flag?
Who designed the national flag? The Indian tricolour was designed by Pingali Venkayya, who was a freedom fighter and was a follower of Mahatma Gandhi. While Pingali Venkayya designed the tricolour, on his design, the Indian flag is based.
What is the significance of the 24 spokes in Indian flag?
Spokes in Ashoka Chakra
There are 24 spokes in the Ashoka Chakra which represents 24 qualities of a person. In other words, these spokes can be termed as the 24 religious paths made for humans. All the paths mentioned in the Ashok Chakra will lead any country on the path of progress.
What does the tricolour represent?
The colours of the Indian flag
A navy blue wheel representing the chakra is present right in the middle of the white band. The saffron colour indicates the strength and courage of the country. The white indicates peace and truth. The green band represents the fertility, growth, and auspiciousness of our land.
Why is Indian flag called tricolour?
The Chakra or the wheel also symbolizes the Power of the State governed by Dharma. It is also called the tiranga or tricolour. The flag was discovered by Venkayya Pingali. Gandhi first in 1921, Congress spoke of their flag.
…
Flag of India.
|Use||National flag|
|Proportion||2:3|
|Adopted||22 July 1947|
What does Tiranga signifies?
The Indian National Flag symbolises national pride and is one of the most respected national symbols. … The national flag is popularly known as Tiranga, which means “three colours” or “tricoloured”. It is a horizontal tricolour in equal proportion of deep saffron at the top, white in the middle and green at the bottom.
What does a flag symbolize?
The colors also have meaning, including the red meaning hardiness and valor, white meaning purity and innocence, and blue representing vigilance, perseverance, and justice. A flag is not just a symbol, but a way for a country to portray itself to the rest of the world.
Why is flag important for a country?
Why do countries have flags? Flags a show that we belong to a community, organisation or nation and that we share beliefs, goals, rules and regulations. Flags are national symbols. Every country has got a specific flag as their national symbol.
What is the purpose and importance of flag?
A flag represents an idea, or an ideal. It is neither a mere piece of decoration, nor an object to be honoured for itself. It is honoured for what it represents. Many flags are held in high esteem for their history; for the sacrifices made by the people; for the qualities for which the country and people stand. | https://indiatravelz.com/attractions/what-does-indian-flag-represent.html |
Q. One of our regular library visitors is clearing the attic of the family home now that her parents are deceased. Where can I direct her to learn more about the value of these books?
Question: What is the oldest university library?
Question: My library will be moving into a new building next year. The building design work is completed, and construction underway, but we haven’t begun to discuss how we will accomplish the move of our collections. Does ALA have any resources that might help?
Question: Is there a collection development policy would address the shift from print to electronic materials, the selection criteria for such materials, and what kind of reference materials should be preferably purchased in electronic format compared to the ones we should keep in print format?
Updated March 16, 2015
Q. It's the question most often heard from students during Banned Books Week, "Why was this book banned?" More accurately, the question is who challenged this book being in the school or library and wanted it removed, and why, and when and where did this happen - and how did things turn out?
Q. When did ALA first adopt the Library Bill of Rights?
Updated August 24, 2012
Q. I was recently asked by a visitor from Germany about coming to work in a library in the U.S. She wanted to know if her degree in library science would be acceptable here. I didn't know what to tell him. Do you have a resource for this?
Q. We are beginning an outreach program to address issues of gender in the pre K-3 grade classroom. We are looking for material for early readers that is particularly adept at portraying non-stereotypical gender roles and that addresses LGBT issues in age appropriate ways. Can you guide me to any resources, book lists, etc.?
Question: Where can I find the competency standards for librarians?
Question: My library is looking to develop an IT security policy. Does ALA have a policy in place that we could review?
Answer: ALA does not have a policy for you to review, however I can point you to some resources that may help you in creating an IT policy for your library. | http://www.ala.org/tools/ask-ala-library?page=7 |
Tips And Tricks For Successful Public Speaking
All over the world people would love to be able to effectively communicate better with others. If you’re among the many, this is a great place to find the information you need. Keep reading into the following paragraphs to learn a few things about better public speaking skills.
Make sure to understand what you are saying. Even when memorizing a speech, you should know the figures, facts, stories, and jokes that relate to your topic. Use them judiciously when you feel your audience is receptive. Have a question session at the end of your speech.
If you use a timer, you can accurately gauge the length of your speech. Doing this allows you to make sure you stay within the time frame given to you. If you need more information, do some research and find helpful information. Don’t rush when giving speeches.
When addressing an audience, face them during every word of your speech. Don’t let yourself become distracted by other activity in the room. You want your audience to pay attention to you, so you need to pay attention to them as well.
Practice your speech frequently once you have it memorized. Try to get in at least one practice session a day for the entire week before giving your speech. Be sure to master your pace and breathing. Leave time for any audience interruptions that may occur. If at all possible, practice delivering your speech utilizing the actual equipment that will be available at the time you make the actual speech.
Be aware of who your audience really is. Look up the list of attendees at the event. If you are able to. try greeting some of them and learning some names. Include some of the people in your speech, and this will give it a much more friendly tone.
Make sure you understand your topic before preparing your speech. Do broad research and view the topic from different perspectives. Develop your points carefully and prepare yourself with notes you can follow. It will be worth it when you find the audience asking questions.
Telling the audience a true story is a great way to become good at public speaking. Prior to getting on stage, sketch out what you want to say. Make sure to incorporate a beginning, middle and an end for the best results. Your story should be based upon a real event, as this will help ensure that your words are natural and authentic.
Know your audience. Connect with them before you begin your speech. If possible, greet a couple of them and find out what their names are. This will help you relax and make it more like you are speaking to friends than strangers.
Learning how to breathe properly can help you relax before speaking in public. First, take a deep breath and hold it for about three seconds. Then exhale very slowly. Do this a few times, and you’ll see that it does help. Inhale and exhale counting to four each time. Do this approximately five times to feel a difference in how calm you feel.
Speaking the truth in sort of a story form helps make public speaking less complicated and more effective. Make yourself a solid outline of the facts to base your speech on. A well-rounded story will have the audience know when you begin and when it ends. Base your story on an actual event to make your words seem natural and real.
Practice all that you can prior to your speech. You can try recording the speech or practicing the speech in front of your mirror to spot any areas that need improvement. You can also include friends and family in the audience.
Become familiar with the environment before giving a public speech. How far will your voice carry or is there a microphone? Check out the microphone and other equipment so that you feel at ease with it. Use visual aids effectively. Consider the amount of eye contact that you must make with the crowd.
In order to feel confident when speaking in public, it is essential that you know your material. Talk about something that you like and that you already know a little about. Impress your audience by using a conversational tone.
Breathe calmly if you are afraid of public speaking. First, take a deep breath and hold it for about three seconds. Then exhale very slowly. Do this a few times, and you’ll see that it does help. Inhale and count to four, then exhale and count to five. Repeat this until you feel your breathing and heart rate calm down.
Make sure to make your audience your ally. Smile and shake the hands of people if you can. Presenting yourself in a positive light before your speech prepares the audience to listen to you with interest.
Dress nicely, even if you are going to be at an event that is casual. If you look and feel sharply dressed, your speaking will reflect it. Ties are great accessories for men to wear, as they help to bring the audience’s attention to a man’s face.
Never apologize, even if you feel you’re failing. Even though you might feel as if the audience thinks you are saying something stupid, chances are they don’t even realize it. Just correct any mistakes you make without apologizing.
Be sure you are very familiar with your presentation so you’ll feel confident when speaking publicly. Pick an interesting topic that engages you, and you can be sure it will engage your audience. You won’t impress your audience by using big words they don’t understand. Instead, speak conversationally so they with them, and they will be impressed.
It is important to speak with confidence in a clear voice when addressing large groups. Try to have water available during your speech. Avoid drinking sodas or dairy beverages the day of your speech. These beverages will make your saliva thicker. Hot tea is a good tool for relaxing the vocal cords.
Go over your speech several times before you deliver it. Doing so will increase the confidence you have, as you will be very familiar with the material. Even if your speech is memorized, it’s still worth bringing some notes when you actually deliver the speech. This allows you to take a quick peek at your notes should you happen to forget what you wanted to say next.
If a speech is coming up on the horizon, use visualization techniques. Visualize what you will say and the reaction of the audience. If you think positive thoughts about the speech and imagine the audience engaged in the things you are saying, it can be a great confidence booster.
Once your speech is prepared, practice it often to the point that you have it mostly memorized. Speak in front of your mirror so you can see how you look while speaking. Do a few practice presentations in front of friends to get some feedback. They may have valuable advice for you.
Never go into a speech unprepared. That is not a good idea, even if you’re passionate about the subject. You might get away with something passable. But, you are surely going to have regrets about the things you leave out.
Keep your voice clear and sharp when delivering. You can use a cup of water, kept nearby, to help with this. Don’t drink soda pop or milk products the day you speak. These liquids thicken the saliva and can even stimulate the production of mucous. Hot tea prior to your speech can help relax the vocal chords.
Begin with a small anecdote. This can either be about a relevant news story, hypothetical situation or even a personal experience. Adding a personal story will help your audience connect with you. Make certain that you share information that is appropriate for the audience.
Visual Aids
Never let the audience know that you are fearful about your speech. Confessing that you are nervous will make your audience lose confidence in you. Oftentimes, a speaker mistakenly feels the audience can sense their nervousness, but this is rarely the case. Just let them believe you’re really confident, and fake it until you make it!
Make sure the visual aids you use are not distracting. They should simply add to the presentation, not take over it. You don’t want them to become the main attraction. Try to use visual aids as much as possible. Make them colorful and neat but not distracting.
Speed is an important factor of your speech. Nerves can cause you to speed up the pace of your presentation, and this makes it difficult for your audience to catch the most important points. Slow yourself down, but make sure you’re not slowing down too much or your audience might get bored. Practice the speech repeatedly to get the speed just right.
Don’t try to wing it. This idea can seriously backfire on you, no matter how extensive your knowledge on the subject is or how much passion you have for it. You might have to provide a passing speech. You may forget very important points.
Be sure you think seriously about public speaking. You have to learn about different strategies concerning public speaking. If you want to feel comfortable, practice, practice, practice! Prepare the speech well so you will make memorable speeches. This advice will get you on the right track.
Get control of your thoughts before you get up to speak. If you are nervous, that’s fine. Most people are nervous before speaking in public. Thinking negatively isn’t okay. If you’re certain you can’t get that important speech delivered with gusto, you probably cannot. Think positively and you will do well.
Research other professional speeches and speakers to learn best practices. You can learn a lot from simply watching videos of talented public speakers. See what tools they use to keep the attention of the audience. Watch their body language and study their habits too. You might also want to learn a little about the person as an individual.
Begin with a small anecdote. Use a hypothetical situation, a topical news event or even a personal experience. You will find that they are much more interested to hear what else you have to share. However, make sure that whatever you talk about is not offensive or inappropriate.
Try to control your pacing when you speak. There are public speakers who tend to go too fast due to nerves. Even if your speech is a stellar one, it will bomb if your audience can’t make out your words. Try speaking at a normal or slightly slower pace so that the audience can better understand you.
Don’t tell the people how afraid you are. This will reduce the credibility of your speech. Most of the time, the audience has no idea how nervous you are. Give off the impression that you’re confident, and you will slowly start to feel that way.
Warm up your voice before you deliver your speech. This is critical if you’re speaking early in the morning. If you fail to do this, there may be a great deal of tension in the vocal chords while you attempt to make your speech. You may have trouble projecting your voice.
Be serious about public speaking. Do your research and educate yourself about tips, tricks and techniques that great public speakers are known to use. Being a comfortable speaker will take some time and effort. In order to make a good impression, always be well-prepared for all your speeches. This advice will get you on the right track.
Once you finish the speech, prepare yourself for questions from listeners. So that your audience has the ability to ask questions, try to keep your speech shorter than the time allotted for it. Keep your answers to questions short and concise to allow as many questions as possible.
Now that you are done with this article, public speaking will come much easier to you. Not everyone is a skilled orator, but having great tips and techniques to go on, you should be able to hone your skills in this area. Now you just need to get the ball rolling and start work.
Try to memorize the most important parts of the speech. Don’t memorize it all, but do memorize the moments that have scientific words, tough passages, and other stumbling areas. This can boost your confidence when speaking about these sections. This can make your speech very successful.
| |
The proposed 24,096-acre Planning Area for the “2016” Timber Sale has been reduced to 10,444-acres and consists of the Pine creek, Soctish creek and Supply creek compartments in the south western area of the Hoopa Reservation. The Reservation Boundary serves as the western boundaries of the Planning Area. The eastern boundary follows Supply creek to its confluence with the Trinity river north along the Trinity to Soctish creek then west again to the Reservation bounday. The Planning Area is all or portions of Sections 9,10,18,17,16,14,15,19,20,23,21,22, 30,29,28,27,26,32,33,31,34 and 35 - T8N R4E, Sections 19,17,6,5,4,3,8 and 7 - T7N R4E, in the Humboldt Base and Meridian.
The Planning Area includes designated “No Harvest” streamside protection, high-risk geology areas, archaeological protection and cultural “No Harvest” and Special Management Areas, spotted owl “No Harvest” protection areas, non-tribal fee lands and non-regenerable lands. However, large portions of the combined Sale Area are designated for intensive forest management. This Planning Area shall be referred to as the “2016” Timber Sale Area.
The Hoopa Valley Tribe has several prairies which have over time been encroached by various non-prairie vegetation types due to the exclusion of burning. However, as this has reduced the available habitat from some species historically found on the Reservation, there is a desire to return the prairies to a pre-fire exclusion condition. In several of the prairies, the restoration can be accomplished mostly through re-application of fire. However, there are prairies which have been more fully encroached by conifer species. (Click on video below map to see animation of 100 Acre Prairie) These will require more extensive work to restore the native grasslands. It is for these prairies that a environmental assessment is being conducted.
There are five Prairies which will be the target of this project. They are the 100-ac Prairie along 100-Acre Prairie Road, the Upper Grasshopper Prairie and lower Grasshopper Prairies on the western side of the Trinity River, the Bloody Camp Prairie in the former Van Hooten parcel north of the Reservation boundary, and the Pumpkin Prairie along the Reservation’s Northern Boundary. Within these five prairies there are 283.54 acres of encroached former prairie and 33.52 of grasslands. The entire restoration project will yield 317.06 acres of prairie grassland, as described below.
The 100-Acre Prairie has over recorded history gone from a prairie 75 to 100 acres in size to a few small patches of grass in a young conifer stand. Upper and Lower Grasshopper prairies are almost entirely closed. These prairies were historically about 33 and 57 acres in size, respectively. The Bloody Camp Prairie is approximately 70 percent overgrown, leaving 17.6 acres of the grass in the former 59.3 acre prairie. The Pumpkin Prairie is also almost entirely overgrown, with only 5.8 acres of grasslands remaining of the formerly 93.9-acre prairie. This project is an effort to restore these once vibrant prairies back into their prehistorically managed state.
The Hoopa Valley Tribe has numerous acres of untreated second growth stands that are 30 years of age or older. Due to the age of these stands, and the size of the vegetation, it has become impractical to treat them by hand. However the Tribe receives Forest Development funds to treat these stands.
Throughout the forest industry, there are studies being conducted on how to efficiently utilize younger stands. It is impractical to conduct timber stand improvement activities on these older stands and leave the slash within the forest, which increases fuel loading and raises the fire hazard.
The Hoopa Tribe is evaluating opportunities for installing a renewable energy plant within the boundaries of the Reservation. As yet the Tribe has no experience in the field costs associated with biomass production.
Based on these three issues, Hoopa Tribal Forestry has proposed an experimental Timber Stand Improvement operation to assess Biomass production costs and/or to determine the most price efficient utilization of generated slash. | http://www.hoopaforestry.com/forestprojects.html |
Installing Natural Ventilation (NV) system in office buildings leads to the reduction of energy consumption of heating, ventilation and air conditioning (HVAC), which accounts for approximately 50% of total in an office building in Japan. However, it is difficult to estimate the NV performance before its completion, because the NV system is easily affected by the outdoor environment. Thus, its design method is not yet established. This study aims to easily estimate the NV performance by using transient airflow network calculation, and the wind pressure coefficient used in the method was obtained from Computational Fluid Dynamics (CFD). The theory of the model is described in detail by this study. Natural ventilation rate was calculated for two different models. Firstly, in order to learn about the availability of the calculation method, to know about available range of the time step and to calculate the transient conditions in a short period, a simple model, which consists of one node and two branches, was used. Secondly, in order to learn about the applicability of the method to actual buildings, an actual building was simulated as a complicated model, which consists of seven nodes and thirteen branches, and its natural ventilation rate was calculated by the method. As a result, at the simple model with the wind pressure coefficient that varies over time, the time-series change of the airflow rate was able to be obtained. In addition, at the actual building model, though its complexity, the time-series change of temperature and ventilation flow rate was obtained by the method. It was shown that the temperature changes are slower than that of pressure, because of the heat capacity of the air, which correspond the real phenomenon.
Successive Indoor Air Pressure Calculation Method for Natural Ventilation Rate Prediction
Year:
2019
Languages: English | Pages: 10 pp
Bibliographic info: | https://www.aivc.org/resource/successive-indoor-air-pressure-calculation-method-natural-ventilation-rate-prediction?volume=38539 |
OSCE/ODIHR have released their preliminary statement on the Georgian Presidential Election. I have copied the summary below and you can find the full report here.
The election was competitive and professionally administered. Candidates were able to campaign freely and voters had a genuine choice, although there were instances of misuse of administrative resources, and senior state officials from the ruling party were involved in the campaign. Substantial imbalance in donations and excessively high spending limits further contributed to an unlevel playing field. While public broadcasters provided all candidates a platform to present their views, the sharp polarization of the private media, negative campaigning and harsh rhetoric, and lack of analytical reporting limited voters’ ability to make a fully informed choice. Legal changes that increased the representation of the ruling party at all election administration levels and the insufficient transparency in the selection of non-partisan members undermined the perception of impartiality. Nevertheless, election day generally proceeded in a professional, orderly and transparent manner, despite some procedural issues during counting, as well as many citizen observers and media acting on behalf of political parties and party supporters potentially influencing voters outside polling stations.
The legal framework provides an adequate basis for the conduct of democratic elections. The 2017 and 2018 amendments to the election code introduced a number of technical improvements. However, certain shortcomings remain and recent amendments were a missed opportunity to engage broadly and address a number of other prior ODIHR and Council of Europe recommendations or eliminate gaps and inconsistencies.
Elections were managed professionally by three levels of administration, led by the Central Election Commission (CEC) who enjoyed the confidence of most electoral stakeholders and made concerted efforts to increase the competence of lower-level commissions. In the absence of adequate regulation by the CEC, the selection of non-partisan lower-level commission members lacked consistency and transparency.
Over 3.5 million citizens were registered to vote. Authorities made commendable efforts to improve the accuracy of the voter list and election commissions gave voters ample opportunity to verify their information. Most stakeholders expressed confidence in the accuracy of the voter lists.
The candidate registration process was transparent and inclusive. In total, 25 candidates were registered, 16 from political parties and 9 independent. However, credible indications that databases of voter data were available for purchase and the absence of an effective mechanism for checking the authenticity of support signatures diminished the genuineness of the nomination process. The campaign showed that a significant number of candidates registered for the purpose of using their public funding and free airtime to support other contestants giving them an unfair advantage.
While fundamental freedoms were generally respected and contestants were able to campaign freely, ODIHR EOM observed several disruptions of campaign events and multiple instances of vandalised party offices or campaign materials. The campaign was dominated by controversial topics polarizing public opinion, negative campaigning and harsh rhetoric between the ruling and one of the opposition parties. Concerns were raised about the collection of personal data of voters and the pressure this practice imposes. Instances of the misuse of administrative resources were observed. Further the
involvement of senior state officials from the ruling party in the campaign was not always in line with the law and blurred the line between the state and the party.
Party and campaign finance legislation lacks uniformity, and recent legislative amendments did not address longstanding ODIHR and Council of Europe’s Group of States against Corruption (GRECO) recommendations. The law provides for private funding for all candidates and public funding for those nominated by parties. The lack of regulation for obtaining loans for campaign expenses and reporting on the use of these funds potentially contributes to the imbalance of the playing field. The State Audit Office verified and promptly published reports before the election. However, despite increased efforts, the lack of clear deadlines for addressing violations and the institution’s insufficient resources raised concerns about the effectiveness of campaign finance oversight. Substantial imbalance in donations and excessively high spending limits did not contribute to a level playing field.
Insufficient issue-oriented debate, shallow coverage of the campaign and the lack of analytical reporting by sharply polarized media limited the possibility for voters to make a fully informed choice. While the law provides free airtime only for certain party-nominated candidates, both public national broadcasters decided to provide all candidates the same amount of free airtime and hosted numerous debates that gave them a platform to present their views. The media regulator did not always display a transparent and impartial approach when intervening in the campaign. Media monitoring results showed clear bias in the coverage by many private media.
Overall, complaints and appeals were handled by election administration and courts in an open and transparent manner within legal deadlines. The complexity of the electoral dispute resolution system, the limited right to file complaints and appeal certain decisions, as well as the lack of sufficient legal reasoning in decisions, limited the effective resolution of disputes, at odds with international commitments and standards. Various ODIHR EOM interlocutors expressed a lack of confidence in the effectiveness of the complaint adjudication system.
The Election Code provides for observation of the entire election process by citizen and international organizations, as well as representatives of election contestants, and the accreditation process was inclusive and professionally managed. During the pre-election period citizen observer groups faced intense verbal attacks on their work and representatives by high ranking members of the ruling party and senior public officials. Still, the observation efforts of established citizen observer organizations contributed to the transparency of the process.
Election day generally proceeded in a professional, orderly and transparent manner. However, the frequent presence of a large number of party supporters, often with lists of voters, noting who was coming to vote raised concerns about the ability of voters to vote free from pressure and fear of retribution. Voting was assessed positively, although those citizen observers and media who acted on behalf of political parties negatively impacted the process. The assessment of counting was less positive due to procedural problems, some cases of interference and an increase in tensions. | https://alexfolkes.com/2018/10/29/voters-in-georgias-presidential-election-had-a-genuine-choice-and-candidates-campaigned-freely-but-on-an-unlevel-playing-field-international-observers-say/ |
Benefits of a 100% timber-framed building
The most characteristic feature of Wittywood is its all-wood structure. Using only this material in construction offers many advantages, both for users and for the environment. In this last case, we can state that sustainability has been the main goal that this building has pursued since it was designed.
The choice of wood over other materials is based on a reduction of the energy during the construction, as it requires 24 times less energy than conventional concrete construction. In this way, 50% less carbon dioxide is released because the building also acts as a CO2 storage, which considerably reduces emissions that affect global warming.
However, the benefits are endless: this type of material is a renewable and inexhaustible resource, its waste does not have a negative impact on the planet and it is highly recyclable.
For the user, it has healthy properties that help absorb electromagnetic radiation from mobile phones, televisions and computers, while regulating the humidity inside spaces and dampening noise.
Finally, the advantages of using wood to build offices are countless compared to other construction methods if the goal is to achieve sustainability. For this reason, an increasing number of cities are beginning to introduce this type of construction into their skyline. | https://wittywood.es/en/beneficios-de-un-edificio-con-una-estructura-100-de-madera/ |
With all this talk about rock... I am wondering where the gems come from? Gems typically come from igneous and metamorphic crystals.
Precious stones are rare and are highly prized by humans. These gems are usually prized for their hardness, their beautiful colors, and how they reflect light. Many precious stones are found in connection with volcanoes. In fact, diamonds are often found in deep tube like areas that are called diamond pipes. It is believed that the diamonds were formed from an extinct volcano.
Some of the more precious stones include: sapphire, ruby, emerald, red spinel, amethyst, tourmaline, lapis, turquoise, chalcedony and green jade. Among these beautiful precious stones are also precious metals. These rare metals are found within rocks, or sometimes by themselves. They can often be melted and formed into other object. These metals include gold, silver, platinum, and copper. Other metals can be made by mixing these metals together to form things such as bronze (made from copper and tin.)
Tuesday, January 15, 2013
Hidden Treasures
1 comment: | http://www.onlinescienceprogram.com/2013/01/hidden-treasures.html |
Some Contributions of Medical Theory to the Discovery of the Conservation of Energy Principle During the Late 18th and Early 19th Centuries.
Doctoral thesis , University of London.
|
|
|
Text
|
Hall_457881.pdf
Download (19MB) | Preview
Abstract
Several scholars have investigated contributions that medical theorists made during the 19th century to the discovery of the conservation of energy. This thesis investigates such contributions, particularly in Britain and Germany, in greater detail than has been done hitherto. Beginning with ideas on POW8L of 17th and 18th century British philosophers, the development of an interest in dynamics is traced through the writings of some two dozen British medical theorists between about 1760 and 1860. Gradually their ideas on power or force – these two words were usually synonymous - became sharper, and by the l830s the parallel studies on force in the physical sciences were influencing them considerably. Thus, in the 1840s William Robert Grove's (1811- 1896) formal enunciation of the correlation of forces seemed to give physiologists extra confidence in their ideas, especially on the correlation of physical and vital forces and the noncreatibility and indestructibility of power in the living organism. Two physiologists in particular have been discussed as illustrations of how readily the formally enunciated principles of the correlation of forces and the conservation of energy were applied to their physiology in the 1840s and 1850s. Part II of the thesis discusses the growth of dynamical physiology in Germany, focussing on some half dozen physiologists. Since these men were influenced strongly by 18th century German philosophy, particularly by Naturphilosophie, a chapter has been given to sketching their philosophical heritage from Benedict Spinoza (1632-1677) to Immanuel Kant (1724-1804). Like their British contemporaries, their dynamics were often vague, but by the l830s they too benefitted from the dynamical studies in physics. Finally, several of these German physiologists enunciated clearly their own form of the conservation principle; Julius Robert Mayer (1814-1878), Hermann Helmholtz (1821-1894) and Justus Liebig (1803-1873) are the best known of them. The conclusion of this thesis is that there were physiologists In Britain and Germany during the late 18th and early 19th centuries whose interests in the dynamics of life crystallized in the closely related principles of the correlation of forces and the conservation of energy. | https://discovery.ucl.ac.uk/id/eprint/1546604/ |
Rooted in History. American Treasures. Sultry and Seductive.DBDT salutes the "Queen of American Folk Music" and the "High Priestess of Soul." Two women of courage influenced the world and used their musical voices for change. Alvin Ailey American Dance Theater Rehearsal Director and guest artist Matthew Rushing exemplifies Odetta Holmes' magical voice by blending soul-stirring movements to folk, gospel, and blues music in ODETTA. Iconic choreographer Dianne McIntyre's Nina Simone Project epitomizes her regal presence with choreography set to Simone's signature classical, jazz, and soul fusion. | https://artandseek.org/calendar/event/91088/cultural-awareness |
At the invitation of the President of the Hellenic Republic, Prokopios Pavlopoulos, the President of the Republic of Slovenia, Borut Pahor, is paying an official visit to the Hellenic Republic today and tomorrow.
After being received with military honours at the Presidential Palace and a wreath laying ceremony at the Tomb of the Unknown Soldier in front of the Hellenic Parliament, the two Presidents had a brief one-to-one meeting, followed by plenary talks between the delegations of the Republic of Slovenia and the Hellenic Republic, led by the two Presidents.
Photo: Daniel Novakovič/STA
The two Presidents confirmed that Slovenian-Greek relations were good, friendly, and without any unresolved issues, and assessed that the official visit of the Slovenian President will undoubtedly strengthen the political and other relations between the two countries. They shared the view that there were plenty of opportunities to improve economic relations, trade and investment, as well as cooperation in culture and science. Their discussion focused on the topical challenges in the international community, in particular concerning the European Union and its future. They agreed that it was time for those who believe in the EU to stand together and make an effort for its further development. In this context, they underlined the importance of respect for international law.
Touching on the current developments in the Western Balkans, the pair agreed that the EU must strengthen its role and presence in the region. The two countries encourage regional cooperation through various initiatives – e.g. Slovenia's initiatives in the Brdo-Brijuni Process, the positive agenda for young people, and the Counter-Terrorism Initiative – and thus contribute to the stability and improved situation in the region. President Pahor, as the co-chair of the Brdo–Brijuni Process, invited President Pavlopoulos to attend a future meeting as a guest.
President Pahor also congratulated Greece on the numerous economic and financial reforms it implemented after the global economic crisis, and encouraged it to strive for the implementation of the reforms and agreed budgetary targets also in the post-programme period. President Pahor noted that during the global economic crisis Slovenia had expressed solidarity by joining all three financial aid packages for Greece while facing a crisis itself.
The discussion also touched upon the migration crisis and some other current international issues. President Pahor expressed his satisfaction that cultural cooperation with Greece had intensified in recent times as well as his belief that the meeting of the countries' ministries of culture would contribute to further strengthening such cooperation.
As part of his official visit, President Pahor met with the Prime Minister and Minister of Foreign Affairs of the Hellenic Republic, Alexis Tsipras. Good and friendly cooperation between the two countries was also highlighted in the talks between the Greek Prime Minister and the President of the Slovenia. President Pahor recalled the times when, at the very beginning of his term of office, Slovenia had expressed financial solidarity with Greece in connection with all three financial aid packages. Slovenia's President also noted their good cooperation as regards the refugee crisis, with the successful relocation of migrants, cooperation in Frontex, and bilateral humanitarian assistance. He said that in such a manner we demonstrated a pro-European stance and that we understood the need to share burdens between partner countries.
President Pahor, moreover, congratulated the Greek Prime Minister for reaching an agreement with Macedonian Prime Minister Zoran Zaev. He assessed that it was very promising and added that he himself knew how difficult it was to decide on a compromise and then to finalise it. "Greece and Slovenia are committed to the rule of law and the Prespes Agreement can be a great inspiration for those who believe that the only way to resolve all conflicts is by peaceful means," the President concluded.
Following a meeting at the seat of the Greek government, President Pahor also visited the Hellenic Parliament, where he met with Speaker of the Parliament Nikos Voutsis, who awarded him the Medal of the Hellenic Parliament. In the afternoon, President Pahor had a meeting with the leader of the opposition, the centre-right party New Democracy, Kyriakos Mitsotakis.
During the official visit, Greek President Pavlopoulos hosted a dinner at the Presidential Mansion in honour of the visiting Slovenian President Borut Pahor.
Tomorrow, President Pahor will be visiting Nafplion in the Peloponnese peninsula to unveil a memorial plaque to Ioannis Kapodistrias, the first governor of modern Greece, whose ancestors come from the Slovenian city of Koper. Ioannis Kapodistrias symbolises the relationship between Slovenia and Greece. The unveiling of the plaque by the Slovenian President was confirmation of the friendship between the two countries and support for European integration. As a sign of friendship, Greece presented Slovenia with a statue of Ioannis Kapodistrias in 2001. The statue stands in Koper, where a street and square are named after him.
Photo: Daniel Novakovič/STA
slovensko
| english
Search
Contact
Office of the President of the Republic
Erjavceva 17
SI-1000 Ljubljana
Slovenia
phone: +386 1 478 12 09
fax: +386 1 478 13 57
e-mail:
[email protected]
Public Relations
phone: +386 1 478 13 07
e-mail:
[email protected]
You can subscribe to the newsletter.
Archive of former presidents
Frequently asked questions
Do you wish to contact the President or wonder about his powers? | http://www.up-rs.si/up-rs/uprs-eng.nsf/pages/7190A017FDD3FF20C12583E1002EDD91?OpenDocument |
Conversely, when imaging pain in other folks, the performanceof individuals with FM didn't differ from the control group, suggesting an intact potential for empathy. Comparable skills to effectively assess pain in others have already been previously reported within the extreme clinical predicament of patients who in no way experience pain (congenital insensitivity to discomfort).32 These final results suggest that it truly is doable to adequately describe pain intensity in other individuals through basic know-how and semantic cues, even within the absence of previous experience,32 in addition to a comparable explanatory mechanism might apply to sufferers with FM. Such a semantic process doesn't apply to their very own discomfort in sufferers with MS, suggesting a key reference to their own emotional or sensorimotor maps. This discrepancy noticed amongst the standard judgment of others' discomfort primarily based on semantic criteria as <img src="http://farm5.static.flickr.com/4481/36867139344_88418fb087.jpg" align="left" width="218" style="padding:10px;"/> well as the downregulation of their very own pain intensity processes appears somewhat distinct to FM individuals, because it was not observed in MS-P individuals. Furthermore, the patients with FM did not appear to benefit from emotional cues during the presentation of facial expressions due to the fact they overrated discomfort intensity as <a href='http://www.ncbi.nlm.nih.gov/pubmed/18204824' title='View abstract' target='resource_window'>18204824</a> compared with controls. This outcome differs from findings in patients with congenital insensitivity to pain who had fairly normal performances - in spite of <a href='http://www.ncbi.nlm.nih.gov/pubmed/ 22948146' title='View abstract' target='resource_window'> 22948146</a> the absence of painful experiences, they have been able to detect discomfort appropriately out on the emotional cues induced by facial expressions.32 Because facial expressions are thought to involve the affective element of pain encounter within the anterior cingulate cortex along with the insula,8,24 a very first hypothesis could be that sufferers with FM have elevated sensitivity within this affective field, constant with other experimental data.39 An alternative hypothesis might be that patients with FM show excessive empathy when evaluating facial expressions of pain due to the fact they have a tendency to project their own pain onto the stimuli. Accordingly, individuals with MS, with or with no discomfort, had been significantly less capable than controls to distinguish the diverse intensities of discomfort on faces but showed extremely equivalent B scores. As compared with FM, they had pretty slight and restricted abnormalities inside the location of empathy. This difference in between sufferers with MS and these with FM could be explained initially by the etiology of your disease that may be clearly somatic for the former and having a potent psychosomatic element for the latter. In conclusion, our final results showed that the psychological variables concomitant to discomfort, especially in FM, are variables that minimized the judgment of pain intensity attributed to a scenario of "own" pain, as evoked by semantic cues in the FM patients. This can be a very distinct pattern of response, absent in individuals with chronic pain from other origins. This is a pattern of response that does not apply to judgment of discomfort in other individuals, suggesting, in FM individuals, a standard empathicJournal of Discomfort Analysis 2014:submit your manuscript | www.dovepress.comDovepressBorg et alDovepress 9. Decety J, <a href="http://www.020gz.com/comment/html/?354240.html">773 East St Lapeer Mi</a> Jackson PL. The functional architecture of human empathy. Behav Cogn Neurosci Rev. 2004;three(two):71?00. 10. Cath ras P. Troubles Fonctionnels et Somatisation. Comment Aborder les Sympt es M icalement Inexpliqu [Functional Issues and Somatization. | http://readphilippines.com/Forum/viewtopic.php?f=14&t=121388 |
The -> symbol like is called arrow operator which is formed by using minus sign followed by greater than sign. The operator is used in C++ to reference individual members of...
Void is a keyword used in C++ which specifies that a function does not return a value. Also, when used in a function, it means that the functions take no parameters. Similarly,...
A float is a “floating point”. A floating point is a placement in an electronic calculator in which decimal points are free to move across to allow a maximum number...
The intention of the topic is to answer the question of the uses of C++ in real world application of the language and useful software that can be developed using the language....
Pointers are good to have in your program. But also can be difficult to learn. “Indirection Requires Pointer Operand ('Int' Invalid)” is an error...
The function set precision is used to set decimal precision to be used to format floating-point values on output operations. Floating-point values are numbers that contain...
After installing an android studio and setting the SDK Path, sometimes we may encounter the following error while launching our android virtual...
There are many cases when this error message occurs that “ This IP, site, or mobile application is not authorized to use this API key. Request...
A console is a tech term that means a combination of a monitor and a keyboard. It is also the interface of output in which the monitor provides the output and keyboard is...
The abbreviation char is used in C++ and other programming languages like C, Java and C# to mean a short form of character which is a data type that holds one...
C++ programming allows the programmer to end a program or function before its normal termination. If conditions are used to test conditions in loops and iterations. A user can...
This error message” you local changes to the following files will be overwritten by merge” occurs in the Git version control mechanism. This error occurs when you...
Xampp is the most famous PHP development environment tool. The local WordPress sites can be created easily by using xampp. This error usually occurs...
The IP address is used to uniquely identify a problem on a network. So, what is an IP address? An IP address is a unique identifying number on every...
In this article, we are going to learn how to set multiple fields to share the same information.
The user usually gets this error when the abort() function is called. Abort does not return the control to the calling process. By default, it...
The HTTP request is unauthorized with the client authentication scheme ‘Anonymous’. The authentication header received from the server...
When the user tries to run the iss_DBSI_PrepareData_Update store procedure, then he can obtain an error. It is important to note that this job is...
In this article, we are going to discuss what are the meanings of bad request error? why this error occurs, and what are the major reasons for this...
Abstraction is a process. It acts as identifying qualities and behaviors an object should possess. Encapsulation is a mechanism by which the... | https://kodlogs.com/?sort=recent&start=40 |
A selectively permeable membrane is a membrane which chooses what to let through and what not to let through.This usually depends on the size of particles. It is also called as a semipermeable membrane.... Remove the lid of the semi-permeable membrane cylinder and insert a membrane cartridge. Ensure that the gasket is positioned correctly in the lid and screw the lid back on the cylinder.
Overview of Osmosis. Osmosis is the passage of water from a high solute concentration area through a semi permeable membrane to a low solute concentration area to …... Once inside the syrup, the water inside the egg begins to move across the semi-permeable egg membrane to equalize the water concentration. Again, that’s osmosis at work. If you leave your egg in the syrup long enough it will begin to look something like a huge raisin – with of course a yoke inside.
Cellophane is a semipermeable membrane, a thin transparent film made of cellulose. It is sometimes used to wrap flowers and gifts. It can be easily confused with plastic wraps which are impereable to water.... Investigates semi-permeable membranes and how membrane technologies such as reverse osmosis, ultrafiltration and microfiltration work. It also shows how these technologies fit in a sequence of techniques to separate water from other substances.
The aim is to make a semipermeable membrane prototype that does not immediately let water pass through, but also does not hold back the water for a long period of time, which would not meet the challenge of demonstrating permeability.
All cells are enclosed with a cell membrane. A selectively permeable cell membrane is one that allows certain molecules or ions to pass through it by means of active or passive transport.
The solvent always flows through the semipermeable membrane from the more dilute side to the more concentrated side. In fact, you can have pure water on one side and any salt solution on the other, and water always goes from the pure-water side to the salt-solution side.
7/09/2018 · With the egg shell gone, the egg’s membrane allowed some of the vinegar and the water from the vinegar to pass into the egg. This movement of water through a semipermeable layer is the osmosis process. The eggs should be noticeably larger than when you started the experiment.
Semi-Permeable Membranes and Filters We’ve mentioned them quite a bit already, so we want to take a step back and explain what a semi-permeable membrane is. A semi-permeable membrane is a membrane that lets certain molecules and atoms to pass through it while blocking others. | http://frayedends.com/saskatchewan/how-to-make-semi-permeable-membrane.php |
Moncton residents to benefit from investments in green and community infrastructure
Français
Share this article
MONCTON, NB, June 25, 2021 /CNW/ - The health and safety of Canadians are top priorities for the Government of Canada and the City of Moncton. Investments in local infrastructure during this extraordinary time provide an opportunity to create jobs, economic growth, and make our communities more sustainable and resilient.
Today, the Honourable Ginette Petitpas Taylor, Member of Parliament for Moncton—Riverview—Dieppe, on behalf of to the Honourable Catherine McKenna, Minister of Infrastructure and Communities; and her Worship Dawn Arnold, Mayor of the City of Moncton, announced joint funding for ten projects to support green and community infrastructure in Moncton.
Moncton residents will benefit from the construction of the Panacadie trail next to Andrew Lane along the marsh to East End pool/park to the corner of Botsford and St. George streets. Irishtown Nature Park Trail will also see upgrades to improve its structural support.
Various parks will see upgrades and improvements to infrastructure, including the reconstruction of the Centennial Park Lower Bowl and of the Bayou Trail Bridge in Mapleton Park, as well as the addition of a tennis court in Lewisville Park. Rene Arthur Frechet and Victoria Parks will be improved to provide a more pleasant environment and reduce the urban heat island effect.
Investments will also support the construction of accessible washrooms downtown to address the needs of vulnerable individuals, visitors and those requiring access after-hours. Upgrades to the HVAC system at the Seniors Centre will also receive funding, and the roof of the Moncton Coliseum will also be repaired to ensure the facility stays in good condition for many more years.
These projects will create greater access to sustainable and inclusive infrastructure for Moncton residents and promote healthy, active lifestyles for many years to come.
The Government of Canada is investing more than $4 million toward these ten projects through the COVID-19 Resilience Infrastructure Stream of the Investing in Canada Infrastructure Program. The City of Moncton is contributing more than $1 million.
Quotes
"The Government of Canada is taking strong and quick action to protect the health and safety of all Canadians, to stabilize our economy, and support communities across Canada. These upgrades will allow for Moncton residents to enjoy safe and active outdoor activities and extend the lifespan of municipal infrastructure. Canada's infrastructure plan invests in thousands of projects, creates jobs across the country, and builds cleaner, more inclusive communities."
The Honourable Ginette Petitpas Taylor, Member of Parliament for Moncton—Riverview—Dieppe, on behalf of to the Honourable Catherine McKenna, Minister of Infrastructure and Communities
"Our community infrastructure in Moncton has never been more important than throughout the COVID-19 pandemic. This funding is a critical component of our work to ensure that we have better parks, trails, and green spaces for all Monctonians to enjoy as we emerge from this difficult time."
Her Worship Dawn Arnold, Mayor of the City of Moncton
Quick facts
Through the Investing in Canada infrastructure plan, the Government of Canada is investing more than $180 billion over 12 years in public transit projects, green infrastructure, social infrastructure, trade and transportation routes, and Canada's rural and northern communities.
To support Canadians and communities during the COVID-19 pandemic, a COVID-19 Resilience Stream has been added to the over $33-billion Investing in Canada Infrastructure Program to help fund pandemic-resilient infrastructure. Existing program streams have also been adapted to include more eligible project categories.
Under the COVID-19 Resilience Stream, the federal cost share for public infrastructure projects is 80 per cent in the provinces, and 100 per cent in the territories and for projects intended for Indigenous communities.
To support smaller-scale projects, the Canada Healthy Communities Initiative is providing up to $31 million in existing federal funding to help communities adapt spaces and services to respond to immediate and ongoing needs arising from COVID-19 over the next two years.
The Government of Canada has invested more than $565 million in 311 infrastructure projects across New Brunswick under the Investing in Canada plan.
Across Canada, since the beginning of the COVID-19 pandemic the Government of Canada has contributed $9.7 billion to 3,500 infrastructure projects.
Related product
Backgrounder: Moncton residents to benefit from investments in green and community infrastructure
Joint federal and municipal funding through the Investing in Canadainfrastructure plan will support ten green and community infrastructure improvements projects in Moncton, New Brunswick.
The Government of Canada is investing more than $4 million toward these ten projects through COVID-19 Resilience Infrastructure Stream of the Investing in Canada Infrastructure Program. The City of Moncton is contributing more than $1 million.
Project Information:
Project Name
Project Details
Federal Funding
Municipal Funding
Arena Roof - Moncton
Repairs to the Coliseum roof over the exhibition halls and box office will extend the useful life of the facility.
$240,000
$60,000
Centennial Park: Lower Bowl Reconstruction - Moncton
Replacement of a bridge, construction of a new multi-use trail, relocating basketball courts and electrical infrastructure, will make the Lower Bowl area more resilient to flooding.
$1,280,000
$320,000
Downtown Moncton Accessible Washrooms
Construction of two permanently accessible public toilets in downtown Moncton to address the needs of vulnerable individuals, visitors to the downtown and those requiring access after-hours.
$200,000
$50,000
Irishtown Nature Park Trail Upgrades - Moncton
Reconstruction of approximately 1.5 km of walking trail including replacement of culverts and ditching as well as the reconstruction of sections with poor soil to provide stronger structural support and manage storm water.
$160,000
$40,000
Mapleton Park: Bayou Trail Bridge Replacement
Construction of a new Bayou Trail bridge and resurfacing along approximately 200 metres of trail to provide greater structural support for
active transportation and year-round recreation users.
$120,000
$30,000
Lewisville Park- Moncton
Rejuvenation of the Lewisville Park, including new play equipment, an upgrade to the existing sports courts, and the addition of skatepark elements in a section of the park as well as improvements to the landscaping.
$520,000
$130,000
Panacadie Trail Phase 1- Moncton
Construction of a trail connection from the Moncton riverfront, around wetlands to Lewisville Road. The Panacadie trail is an important artery in the City's overall trail network. Phase 1 will build the portion next to Andrew Lane along the marsh to East End pool/park to the corner of Botsford and St. George, including a boardwalk and crushed stone tailing surface, shade trees, shade shelter/lookout, site furniture and lighting.
$880,000
$220,000
Rene Arthur Frechet Park
Park upgrades, including new trees, pathways, site furniture and signage to provide a more pleasant environment for bicycling, walking or sitting, as well as reducing urban heat island effect.
$200,000
$50,000
Seniors Centre Upgrades
Upgrades to the current HVAC system to transition from electric heat to a VRF heat pump with inclusion of room diffusers, ducts and piping.
$200,000
$50,000
Victoria Park - Moncton
Upgrades to walkways and furnishings in the Park, resurfacing pathways, and replacement of trellis to provide a safe and comfortable environment for residents. | |
What to expect in the first term
Each week we will give the children another aspect of fashion experience through an activity to enhance their solid base skill set and fashion awareness. We believe in providing substance and sustainability awareness to each student’s individual sewing project by encouraging open and enquiring creative minds in a structured environment. We will enable skills further so your child can create their own designs based on their ability, experience and individual direction.
Activities include:
- Learning to sew on a machine
- Drawing fashion ideas
- Draping fabrics on a mannequin stand to create designs
- Pinning and cutting fabrics
- Basic pattern cutting/adaptation
- Sustainability awareness
- New sewing techniques
- Making own garment
- Upcycling and repairing
At the end of term they will come home with:
- A sketchbook of designs, moodboards and sustainable fabric awareness
- A technical file of sewing samples
- A completed garment designed and made by them
- An existing garment of theirs that has been upcycled or repaired by them
We develop your skills in: | https://www.voicemag.uk/event/4821/ready-to-wear-under-13s-in-chelsea-london |
FIELD OF THE INVENTION
This invention relates to the forming of small diameter metal rounds, such as reinforcing bar rounds. More specifically, this invention relates to methods and apparatus for simultaneously forming by rolling at least four rounds of uniform size from a single billet.
BACKGROUND OF THE INVENTION
The forming of small diameter rounds from larger bars is known in the milling art. Generally, a large bar is successively passed through a series of rollers that reduce the cross sectional area of the bar and, through a number of intermediate steps, eventually forms the desired shape. In this context, the bar includes not only a bar whose cross section is substantially round, but also a bar whose cross section is slightly oval or square-shaped and a ribbed bar which is the above- mentioned bar, on which ribs are formed. Because the amount of the reduction of the cross sectional area on each pass through the rollers is limited, the smaller the cross sectional area of final product, the larger the number of roller passes, machinery and production floor space required.
The simultaneous forming of multiple rounds significantly reduces the above-stated problems because the reduction in total cross sectional area is considerably less, therefore, fewer intermediate steps are required and the speed and length of the end product is reduced.
It is known in the art to simultaneously produce two uniform metal rounds and three uniform metal rounds. The simultaneous production of three rounds is described in U.S. Pat. No. 4,357,819.
In addition, the following methods for producing a plurality of bars from a single preformed billet in a finishing rolling train have also been proposed:
(1) A method for simultaneously producing three strands of bars from a single preformed billet in a finishing rolling train, is disclosed in Japanese Patent Application Laid Open No. 24,503/84 of Feb. 8, 1984 (hereinafter referred to as the "Prior Art 1).
In this method, a finishing rolling train is composed of 4 stands K. sub.4, K.sub.3, K.sub.2, and K.sub.1 (not shown) arranged in series in the rolling direction. The K.sub.4 and K.sub.3 stands roll a preformed billet to produce three strands of bars 2a, 2b and 2c connected to each other by means of thin connecting portions 2d and 2e as shown in FIG. 9(A) . A pair of slit rolls (not shown) cut the three strands of bars 2a, 2b and 2c along the connecting portions, and then stand K.sub.2, composed of a pair of calibered rolls, rolls the three cut strands of bars 2a, 2b and 2c to produce bars of oval cross section as shown in FIG. 9(B). Then stand K.sub.1 composed of a pair of rolls with a finishing caliber (a bore type), rolls the three strands to produce final product bars 3a, 3b, and 3c as shown in FIG. 9(C). FIG. 9(A) shows a state of rolling a billet at the stand K.sub.3. FIG. 9(B) shows a state of strands having been cut off by means of a pair of slit rolls, following the K.sub. 2 stand. FIG. 9(C) shows the shapes of bars 3a, 3b and 3c after the bars have been rolled at the stand K.sub.1.
(2) A method for simultaneously producing four strands of bars from a single preformed billet is disclosed in Japanese Patent Application No. 92,001/85 of May 23, 1985 (hereinafter referred to as the "Prior Art 2").
The "Prior Art 2" was developed to enhance the productivity of the method of the "Prior Art 1." According to the method of the "Prior Art 2, "bars are produced as follows:
Four strands 4a, 4b, 4c and 4d connected to each other by thin connecting portions 4e, 4f and 4g are formed as shown in FIG. 10(A) by means of stands K.sub.4 arid K.sub.3 (not shown). The four strands 4a, 4b, 4c and 4d as shown in FIG. 10(B) are cut off along the central connection portion 4f by means of a first pair of slit rolls (6) between stands K.sub.3 and K.sub.2 (not shown) as shown in FIG. 11. Then, four bars 4a, 4b, 4c and 4d as shown in FIG. 10(C) are obtained by cutting off along the connecting portions (4e, 4g) by means of two pairs of second slit rolls (7, 8). Subsequently, bars 5a, 5b, 5c and 5d as final products, as shown in FIG. 10(D), are produced by simultaneously rolling the four bars 4a, 4b, 4c and 4d. Processes of rolling and cutting the strands are shown in FIGS. 10(A) to 10(D) and the positions of the slit rolls on the plane are shown in FIG. 11.
As compared with the simultaneous production of three rounds, the additional problems involved in producing four rounds simultaneously from one bar are significant. The problems include maintaining the uniformity of the cross sectional areas of the strands as well as avoiding the cobbling of the strands during the slitting process. Other considerations include the resistance produced when separating the strands, which resistance can result in excessive heat, lower separating speeds and lower efficiency.
The preferred embodiment of the method and apparatus of the present invention includes simultaneously slitting a billet into more than four strands or rounds by forming the billet into the desired number of shapes for rounds and separating the outer most strands from the remaining billet before separating the next outer most set of strands from the billet until the billet has been divided into a desired number of strands. Where there is an odd number of strands to be separated, of course, when the last pair of outer strands is separated only the inner most or center strand will remain.
SUMMARY OF THE INVENTION
The invention includes a method and apparatus for simultaneously forming at least four metal rounds of approximately equal cross sectional area from a single bar that has been formed into four strands of substantially equal cross sectional area which are separated by thin connecting portions. The apparatus includes a first pair of slitter rollers having ridges for interfering with the outside strands to separate the two outside strands from the two inside strands and a second slitter roller for separating the two inside strands from each other after the outer strands have been removed from the billet.
The invention also includes a method and apparatus for producing four or more strands by simultaneously finishing a single billet by rolling it to form a number of strands connected to each other by thin connecting portions and then cutting of the two outside strands by cutting along the thin connecting portions connecting them to the remainder of the billet and then successively cutting off the two remaining outer strands from the remainder of the billet until all strands have been removed.
The invention includes apparatus for simultaneously forming at least four metal rounds from a single billet that has been formed into four connected strands of substantially equal cross sectional area with a pair of pre-slitter rollers having forming surfaces defining two central grooves and two outside grooves, the four grooves being separated by three serial ridges with each central groove defining a groove cross sectional area, the groove cross sectional area comprising a strand cross sectional area plus a free space, the free space being sufficient to accommodate a variance in strand cross sectional area without requiring redistribution of metal from strands within the central grooves to strands outside the central grooves.
In the preferred embodiment, the outside slope angles of the ridges of the first slitter rollers exceed the inside slope angles of the corresponding portions of the outside strands by approximately 22. degree. . Further, it has been found effective if the outside slope angle of the ridges of the first slitter rollers are approximately 52°.
The apparatus may further include inside slope angles for each ridge of the first slitter rollers that are less than the outside slope angle of the corresponding middle strand. It has been found effective if the inside slope angles of the first slitter rollers are approximately 25. degree..
In the preferred embodiment, the means for separating the two middle strands is comprised of a slitter roller pair wherein at least one roller has a ridge located to correspond to the thin connecting portion between the two metal strands. The slope angles of the slitter roller ridge are greater than the corresponding inside slope angles of the middle strands. It has been found effective if the inside slope angles of the ridge exceed the corresponding inside slope angles of the middle strands by approximately 5°. Thirty-five degrees (35. degree.) has been found to be an effective slope angle for the ridge of the second slitter roller.
The invention includes a method for forming a bar to be slit and simultaneously formed into four metal rounds that comprises adjusting the separation distance between each roller in a first pair of forming rollers and between the rollers in a second pair of forming rollers. The method includes passing a bar by the first of rollers to form a bar of fixed cross-sectional width and fixed cross-sectional height over end portions of the bar, and passing the bar by the second pair of rollers to form a bar of fixed cross-sectional height over central portions of the bar. The method includes, subsequent to the above steps, passing the bar by a pair of pre-slitter rollers. The pre-slitter rollers have three ridges for forming four serial strands of approximately equal cross- sectional area separated by thin connected portions.
The invention also includes a method of slitting a bar comprised of four serial strands, two outside and two middle, of approximately equal cross-sectional area separated by thin connecting portions. The method comprises passing the bar by a first pair of slitter rollers, each having two ridges with interfering outside slope angles and noninterfering inside slope angles. Such passing of the bar serves to separate each outside strand from the two middle strands by applying a lateral force with portions of the outside of the ridge to portions of the inside surface of an outside strand. At the same time, significant lateral force is not applied with the inside surface of a ridge to the outside surface of a middle strand. The method includes subsequently separating the two metal strands.
BRIEF DESCRIPTION OF THE DRAWINGS
FIG. 1 comprises a schematic plan view of a series of connected forming and slitting rollers of the preferred embodiment.
FIG. 1A comprises a schematic elevational view of a prior art roller stand.
FIGS. 2A through 2G illustrate the bar subsequent to the forming passes, the slitting passes and further forming passes.
FIG. 3A is an elevational view of one of a pair of forming rollers.
FIG. 3B is an elevational view of one of a pair of forming rollers.
FIG. 4 is an elevational view of one of a pair of pre-slitter rollers.
FIG. 5 is an elevational view of a slitter roller.
FIG. 5A is an illustrative view of the interaction of a bar formed into strands with a slitter roller.
FIG. 5B is an illustrative closeup of a detail of the interaction of the ridge of a slitter roller with the sides of the strands of a bar.
FIG. 6 is a view of a single ridge slitter roller.
FIG. 6A is a view of a bar separated into four strands connected by thin connecting portions.
FIGS. 7(A) to 7(H) are explanatory views showing the processes of deformation of the strands by roll calibers from the roll strands K. sub. 5 to K.sub.1 in the case of simultaneously rolling five strands of bars.
FIGS. 8(A) to 8(I) are explanatory views showing the processes of deformation of the strands by roll calibers from the roll strands in the case of simultaneously rolling six strands of bars.
FIGS. 9(A) to 9(C) are explanatory views showing the processes of rolling in the "Prior Art 1."
FIGS. 10(A) to 10(D) are explanatory views showing the processes of rolling in the "Prior Art 2."
FIG. 11 is an explanatory view showing an arrangement of pairs of slit rolls in the "Prior Art 2."
DESCRIPTION OF THE PREFERRED EMBODIMENT
As schematically shown in FIG. 1, a metal bar 150 moves in the direction of arrow 180 past five roller stands. First rollers 140 are shown installed with their axis of rotation in the vertical direction. Since the schematic view is presented as from above and the following four roller pairs are illustrated as installed vertically, one above the other, only one roller of the subsequent four pairs, roller 142, roller 144, roller 160 and roller 162, is shown. For the same reason, rollers 140 have a central groove 139 that is not shown in FIG. 1 but is shown in FIG. 3A.
As bar 150 proceeds through the series of roller stands in the direction of arrow 180, it takes on new cross sectional shapes as a function of the shape of the grooves and the ridges found in the surface of the rollers and, to some extent, of the separation distance between the rollers in a pair.
Rollers 160 and 162 are slitter rollers. As illustrated in FIG. 1, roller 160 slits bar 150 into a central portion and two outside strands, 150a and 150d. Slitter roller 162 slits the central portion of bar 150 into strands 150b and 150c. That is to say the present invention is characterized in that the thin connecting portions between the two outer strands 150a and 150d and the adjacent inner strands 150b and 150c respectively are cut off by means of the first pair of slitter rollers 160.
More particularly, slitter rollers 160, one of which is illustrated in more detail FIG. 5, will slit the bar 150 comprised of four serial strands 150a, 150b, 150c and 150d connected by thin connecting portions, as illustrated in FIG. 2C, into a middle portion comprised of strands 150b and 150c still connected by a thin connecting portion and separate outside strands 150a and 150d, as illustrated in FIG. 2D.
An important aspect of the present invention is that initially both of the outer strands are cut off, and then the two inside strands are separated from each other, which is in sharp contrast to Prior Art 2. Also important is that the slitter rollers 160 have ridges formed so that the separated outside strands 150a and 150d are directed outwardly, or laterally, away from the portion in which the inside strands are still connected to each other. Likewise, slitter rollers 162 have their ridges arranged to direct strands 150b and 150c away from each other.
Slitter rollers 162, one of which is illustrated in FIG. 6, separates middle section 150b and 150c connected by thin connecting portions, as illustrated in FIG. 2D, into two separate strands 150b and 150c as illustrated in FIG. 2E. FIGS. 2F and 2G illustrate a subsequent working of the four separated strands 150a, 150b, 150c and 150d by rollers 152 and rollers 154 into four uniform rounds. This subsequent simultaneous working, illustrated in FIGS. 2F and 2G, is understood by those skilled in the art. Hence, the details of such working will not be further discussed.
In a review of FIGS. 2A and 2B, it can be seen that bar 150 as it emerges from rollers 140 has a predetermined width and the height of its end portion is determined. Bar 150 as it emerges from rollers 142 of FIG. 2B has the height of its central portion determined. In the preferred embodiment, bar 150 as it emerges from rollers 142 contains in fact four portions separated by thick connecting portions, the thick connecting portions being formed by ridges 143a. Bar 150, after completing the pass of rollers 140 and 142, is known to be divided, by one who is informed of the dimensions of rollers 140 and 142, into four portions of substantially equal area.
When rollers 154 of FIG. 1A are rotated in the direction indicated by the arrows 155, the bar of metal, now separated into four strands, will be drawn through the rollers and would move in a direction out of, and perpendicular to, the surface of the paper. The bar, or strands, may be regarded as having a length, a width and a height. The width and the height are cross sectional dimensions. Rollers 154 form the cross sectional dimensions of the bar or strands.
In roller stand S, the axes of the rollers, indicated by dashed lines 166 and 168, are usually adjustable with respect to each other. This permits adjustment of the separation distance between the surfaces of the rollers. The adjustability of the axes is indicated by the arrows 171 associated with axes 166 and 168. The separation distance between the rollers affects the form of the bar and the cross sectional area of the strands created. The ability to vertically adjust also permits compensation for wear of the roller surfaces.
The cylindrical surfaces of the rollers are conventionally sculpted, or dimensioned, to contain circumferential grooves 170 and ridges 172. A ridge, as the word is used herein, may present a flat top surface, as illustrated in FIG. 1A, or may rise to a nearly pointed or a pointed surface, as in roller 144 of FIG. 1. The grooves and ridges serve to form the bar in a pass. The cross sectional area of the bar will exhibit a configuration conforming or semi-conforming to the cross sectional area between the rollers. The degree of confirmation depends upon the design of the rollers and the extent to which they contain free space in or around the grooves.
The grooves are designed with respect to the anticipated cross sectional area of the incoming bar. The separation distance of the rollers may be adjusted such that the metal of the bar is forced to flow into, conform to, and fill all of the space of the groove. Excess metal, in such case, may move during the pass toward the free space at the side of the rollers. The grooves may also be designed, in conjunction with the separation distance, to a depth that defines a free space therein. The free space serves to substantially eliminate the flow of metal from a groove during a pass.
The preferred embodiment illustrated herein assumes that the grooves and ridges of a roller pair are sculpted identically onto the face of each roller to form a matched pair. However, it will be appreciated by those skilled in the art that the invention may function if the rollers of a roller pair are designed with non-matching grooves and/or ridges.
The term "slope angle" as used herein indicates the angle between the "vertical" and a tangent drawn to a point on a ridge or a strand. A "vertical" in regard to a ridge is perpendicular to the axis of a horizontal roller. A "vertical" in regard to a strand is perpendicular to the axis of the rollers of the immediately previous roller pair that passed and formed the strand. Reference is made to "inside" and "outside" "slope angles" of ridges and strands. "Inside" refers to a side facing toward the inside of the rollers or the inside of the strand. "Outside" refers to a side facing toward the outside of the rollers or the outside of the strand. When this reference is used, it is to be understood that, with respect to a strand, only the slope angles of "central portions" of sides of a strand are indicated. When the "slope angle" of a ridge of the roller is referred to, it is to be understood that only the slope angles of portions of the ridge that "correspond to" central portions of a corresponding side of a strand are indicated.
For instance, in FIG. 4 the area designated 90 illustrates the portions of ridges 146, 147 and 148 that correspond to the slope angles of central portions of the strands formed by the ridges. In FIG. 5B, the areas designated 165 and 166 comprise illustrative central portions of sides of a strand.
The slope angle of the strands in their "central portions" is referred to because it is against these side walls of the strands that the slitter rollers, to be discussed below, either do or do not "interfere," or do or do not exert a lateral force. As discussed below, a lateral force can be exerted by a ridge of a slitter roller. When this ridge exerts the lateral force, it is said that the ridge has a slope angle, at least in portions corresponding to central portions of the strand, that would "interfere" with the slope angle of the strand.
The actual slope angle in "non-central" portions where, for instance, strand 150c or strand 150d, as illustrated in FIG. 5B, intersect the thin connecting portion (not numbered) separating the two strands, is not so significant. It is the slope angle along the "central portions" of the side slope of the strand that is important. These central portions either will receive a lateral force from the interference of the slitter roller slope angle or there will be no interference. For instance, as illustrated in FIG. 5B, which is included for illustrative purposes, not as part of the preferred embodiment, one ridge of slitter roller 160 is shown inserted within or between the side walls of strands 150c and 150d to the point where it touches or virtually touches the thin connecting portion. It may be that where the peak of the ridge on slitter roller 160 meets or almost meets the thin connecting portion, the slope angle of the ridge is in fact less than the slope angles of strands 150c and 150d.
As illustrated in FIG. 5B, the slope of the inside central portion of the wall of strand 150d is defined by the angle between tangent 115 drawn to that inside strand wall and vertical 122. This angle is illustrated as angle 106 in FIG. 5B. The slope of the corresponding central portion of the ridge of the slitter 160 is illustrated by angle 104 drawn between vertical 122 and tangent 119 drawn at a "central portion" 165 of the outside of the ridge of slitter roller 160.
Similarly, when measuring the relative slope angles of the inside surface of the slitter ridge vis-a-vis the outside surface of strand 150c, the relevant central portion of strand 150c is denominated by numeral 166 in FIG. 5B. Tangent 117 drawn to a point on a central portion of a strand 150c makes angle 100 with vertical 122. Tangent 121 drawn to a corresponding central portion of the ridge of slitter roller 160 makes angle 102 with vertical 122. The relative sizing between angles 104 and 106 and between angles 100 and 102 determine whether the ridge of the slitter roller interferes, or does not interfere, with the side wall of the strand.
After the four separated strands emerge from slitter roller 162, they will be formed into metal rounds by a further series of forming rollers, as is known in the art. As mentioned above, the dimensioning of the grooves and ridges on the roller surfaces, as well as the adjustment of the separation distance between the rollers of a pair, determines the effect of the grooves and ridges upon the metal bar passing the stand. Such effect is illustrated for the preferred embodiment in FIGS. 2A through 2G.
FIG. 2A illustrates rollers 140 installed with their axes of rotation in the vertical direction. FIG. 1B illustrates one forming roller 140 in greater detail. The separation distance between the surfaces of rollers 140 is established such that one central groove 139 in each roller conforms each end portion of bar 150 to the dimensions of the groove. The adjustment of the separation distance between rollers 140 determines the width of the bar. The height of groove 139 determines the height of each end portion of bar 150 as it passes rollers 140. Free space 141 (see FIG. 2A) between the rollers accommodates the flow of any excess metal from the ends of the bar into the central portion of the bar.
Rollers 142 of FIG. 2B are illustrated installed with their axes of rotation in the horizontal direction, as are all succeeding roller pairs. FIG. 3B illustrates one roller 142 in greater detail. Rollers 142 have sculpted in their surface a series of flat grooves 143 and ridges 143a. The separation distance between rollers 142 is adjusted such that the metal of the bar fills the space in the central portion of the rollers between the roller surfaces. Thus, the height and shape of at least the central portion of the bar is formed by rollers 142. Excess metal is accommodated by being permitted to flow to the outside space between the two rollers.
Those skilled in the art will appreciate that bar 150 is guided between roller pairs 140, 142, 144 and the slitter rollers. Thus, the grooves and ridges of one roller pair can be aligned in combination with the grooves and ridges of a prior roller pair. They can be dimensioned in combination to create an effect in sequence.
Both rollers 144 in the preferred embodiment contain three ridges 146, 147 and 148. Although, it is preferred that both rollers contain the ridges, one roller with the ridges could suffice. FIG. 4 illustrates one roller 144 in greater detail. Ridges 146, 147 and 148 are dimensioned to establish four strands in bar 150, namely 150a, 150b, 150c and 150d (see FIG. 2C). The four strands are connected by thin connecting portions. Strands 150a and 150d are outside strands. Strands 150b and 150c are inside strands. Ridges 146, 147 and 148 not only establish thin connecting portions between four serial strands but also establish certain slope angles that the strands assume.
Roller pair 144 also contains two grooves 145 that provide for free space 145a above middle strands 150b and 150c formed in grooves 145. The free space permits the forming of the thin connecting portions by the rollers of pair 144 without redistributing metal from the middle strands to the outside strands. The free space accommodates a certain variance in cross sectional area of middle strands 150b and 150c.
One problem to be solved in the simultaneous forming of four metal rounds is maintaining the uniformity of the cross sectional area of the four metal rounds. That is, the diameter of the rounds should conform to specifications within a certain tolerance. The words "substantially equal area" are used herein to indicate that the cross sectional area of the four portions would, if formed into rounds, have diameters that conformed to the specifications within the given tolerance.
As discussed above, the first two passes by the forming rollers form entering bar 150 to four portions of substantially equal cross sectional areas. Pre-slitter rollers 144 separate the bar into four strands separated by thin connecting portions. The substantially equal cross sectional area is maintained. Pre-slitter rollers 144 also establish slope angles of the strand.
In the preferred embodiment, the two outside strands are first slit from the two middle strands by slitter rollers 160. Subsequently, the two middle strands are slit by slitter rollers 162. This is illustrated in FIG. 1 and FIGS. 2d and 2e. The slitting is performed by applying a lateral horizontal force to the walls of the strands, effecting a tearing along the thin connecting portions. The lateral force is delivered by the interference of the slope angle of a side of a ridge of the slitter roller with the slope angle of a corresponding side of a strand. The slitter rollers 160 are designed such that the surface 118 formed on the outside of the slitter roller ridge (see FIGS. 5 and 5A) has a slope angle 104 greater than the inside slope angle 106 formed on the strands 150a and 150d. In the preferred embodiment, the difference in the slope angles 104 and 106 is approximately 22°. The slope angle 104 is preferably approximately 52° while the slope angle 106 is approximately 30°.
In the preferred embodiment, the inside slope angle 102 of the ridges of slitter roller 160, that is, the angle formed by side 120, is less than the outside slope angle 100 of strands 150b and 150c. The difference is approximately 5°. In the preferred embodiment, the outside slope angle 100 of strands 150b and 150c is approximately 25. degree.. In such a fashion, lateral separating forces are applied to strands 150a and 150d without applying a friction force to the two captive inside strands 150b and 150c.
Although the side walls of the ridges of slitter roller 160, as illustrated in FIGS. 5 and 5A, are shown approximately straight, i.e. side walls 118 and 120, it should be understood that the side walls of the ridge of slitter roller 160 could assume a continuously curved configuration. They should be designed with curved configuration similar to that given to strands 150a, 150b, 150c and 150d, at least in their central portions, by the ridges 146, 147 and 148 of pre-slitter rollers 144.
As illustrated in FIGS. 6 and 6A, inside edge 134 of the ridge of second slitter roller 162 forms angle 138 with vertical 132. The inside slope angles of strands 150b and 150c make angle 97 between tangents 98 and vertical 112. In the preferred embodiment, angles 138 are greater than angles 97. In fact, angles 138 exceed angles 97 by 5. degree. . In the preferred embodiment, the inside slope angle 97 is essentially 35. degree.. With such arrangement, second slitter roller 162 applies a lateral force and separates by tearing strand 150b from strand 150c.
FIGS. 7(A) to 7(H) show an embodiment wherein five bars are simultaneously produced. FIGS. 8(A) to 8(I) show an embodiment wherein six bars are simultaneously produced. The method for simultaneously producing five bars or six bars is quite the same as the method for simultaneously producing four bars. However, additional explanation is given below as follows:
FIG. 7(A) shows a roll caliber 9a in a pair of rolls 9 and a preformed billet 10.
FIG. 7(B) shows a process in which five strands 25a through 25e, each having equal cross section area, are rolled by means of a pair of rolls 24.
FIG. 7(C) shows a process in which both the outer strands 27a and 27e are rolled to form strands of oval shape or of a box-shape, and intermediate three strands 27b through 27d are rolled to form strands of a diamond shape or oval shape which is longer in vertical directions, by means of a pair of rolls 26.
FIG. 7(D) shows a process in which both the outer two strands 27a and 27e are cut off by means of two edges 28a and 28b of the first pair of slitter rollers 28.
FIG. 7(E) shows a process in which connected three strands 27b, 27c and 27d are cut off by means of the second pair of slitter rollers 29 having two edges 29a and 29b along the connection portions 27g and 27h.
FIGS. 7(F) to 7(H) show a process in which the cut strands 27a through 27e are rolled on the subsequent respective roller stands (not shown).
FIGS. 8(A) to 8(I) show roll calibers and deformation of the strands when six bars are simultaneously produced.
FIG. 8(A) shows the deformation of the billet 10 in a pair of rolls 9. FIG. 8(B) shows the deformation of the strands in the pair of rolls 34. FIG. 8(C) shows the deformation of the strands in the pair of rolls 36.
FIG. 8(D) shows a cutting procedure of the strands by means of the first pair of slitter rollers 38. FIG. 8(E) shows a cutting procedure of the strands by means of the second pair of slitter rollers 39.
FIG. 8(F) shows a cutting procedure of the strands by means of the third pair of slitter rollers 40.
FIGS. 8(G) to 8(I) show a process in which cut strands 37a through 37f are rolled on the subsequent respective roller stands (not shown).
If the number of bars to be simultaneously produced is N (N. gtoreq.4), 1/2×N pairs of slitter rollers are provided in the slitter rollers guide when N is an even number. When N is an odd number, 1/2×(N-1) pairs of slitter rollers are provided in the slitter rollers guide.
Although the method and apparatus of the present invention has been described in connection with the preferred embodiment, it is not intended to be limited to the specific form set forth herein, but on the contrary, it is intended to cover such alternatives, modifications, and equivalents, as can be reasonably included within the spirit and scope of the invention as defined by the appended claims. The foregoing disclosure and description of the invention are illustrative and explanatory thereof. Various changes in the size, shape and materials as well as the details of the illustrated construction may be made without departing from the spirit of the invention. | |
BACKGROUND OF THE INVENTION
The present invention relates to an optical method for characterizing an object, and apparatus for characterization of an object.
Microscopes and various forms of interferometers are well-established for optical imaging and metrology of objects. However, use of such apparatus is confined to the observation of objects which are typically larger than the wavelength of the illuminating light. The spatial resolution achievable is limited to about half the wavelength of the light, owing to the diffraction limit and the related Abbe-Rayleigh rule which dictate that a conventional lens is unable to focus light propagating in free space to a spot smaller than half the wavelength.
Attempts to overcome the diffraction limit to enable observation of sub-wavelength objects include imaging in the optical near-field. To achieve this a probe is placed in the immediate proximity of an object to capture the rapidly-decaying evanescent (non-propagating) optical waves that make up the near-field, such as in high resolution scanning near-field microscopy (SNOM). However, this is intrusive, and does not allow imaging inside the object. Hence, imaging techniques that rely instead on free-space propagating components of the light scattered from the object, comprising the optical far-field which exists further from the object, are preferred for many applications in areas such as nanotechnology and biology.
Examples include stimulated emission depletion (STED) and single-molecule localization (SML) microscopes. These provide nanoscale imaging without the need to capture the near-field evanescent waves, but have other drawbacks. Both STED and some of the SML techniques use an intense beam to excite, deplete or bleach fluorophores in a sample, but this can cause damage, known as phototoxicity, by stressing and eventually killing living samples. SML is also inherently slow, requiring thousands of images to be captured to build a single high-resolution image. Moreover, STED and SML require fluorescent reporters within the sample. This is usually achieved by genetic modification or antibody-mediated labelling with fluorescent dyes or quantum dots, but the labels are known to change the behavior of the molecules or biological systems being studied. Furthermore, they cannot be applied to solid artificial nanostructures, such as silicon chips.
Accordingly, alternative approaches that allow observation and imaging of sub-wavelength objects are of interest.
SUMMARY OF THE INVENTION
Aspects and embodiments are set out in the appended claims.
According to a first aspect of certain embodiments described herein, there is provided An optical method of characterizing an object, comprising providing an object to be characterized, the object having at least one nanoscale feature; illuminating the object with coherent plane wave optical radiation having a wavelength larger than the nanoscale feature; capturing a diffraction intensity pattern of the radiation which is scattered by the object; supplying the diffraction intensity pattern to a neural network trained with a training set of diffraction intensity patterns corresponding to other objects with a same nanoscale feature as the object to be characterized, the neural network configured to recover information about the object from the diffraction intensity pattern; and making a characterization of the object based on the recovered information.
According to a second aspect of certain embodiments described herein, there is provided an apparatus for characterization of an object, comprising: a source of coherent plane wave optical radiation; a location at which an object to be characterized, and having at least one nanoscale feature smaller than a wavelength of the radiation, can be positioned in order to be illuminated with radiation from the source; an optical detector configured to capture a diffraction intensity pattern of radiation scattered by an object at the location; and a processor hosting a neural network and configured to supply captured diffraction intensity patterns from the optical detector to the neural network, the neural network having been trained with a training set of diffraction intensity patterns corresponding to other objects with a same nanoscale feature as the object to be characterized, the neural network being configured to recover information about an object at the location from a captured diffraction intensity pattern; the processor operable to determine a characterization of the object based on the recovered information.
According to a third aspect of certain embodiments described herein, there is provided a storage medium storing software comprising a computer program configured to implement a neural network that has been trained with a training set of diffraction intensity patterns corresponding to objects with at least one common nanoscale feature having a known parameter value, the diffraction intensity patterns formed by coherent plane wave optical radiation at a wavelength larger than the nanoscale feature, the neural network configured to: receive a diffraction intensity pattern of an object to be characterized, the object having the common nanoscale feature; and recover a parameter value for the nanoscale feature in the object from the received diffraction intensity pattern.
These and further aspects of certain embodiments are set out in the appended independent and dependent claims. It will be appreciated that features of the dependent claims may be combined with each other and features of the independent claims in combinations other than those explicitly set out in the claims. Furthermore, the approach described herein is not restricted to specific embodiments such as set out below, but includes and contemplates any appropriate combinations of features presented herein. For example, methods and apparatus may be provided in accordance with approaches described herein which includes any one or more of the various features described below as appropriate.
BRIEF DESCRIPTION OF THE DRAWINGS
For a better understanding of the invention and to show how the same may be carried into effect reference is now made by way of example to the accompanying drawings in which:
FIG. 1
shows a flow chart of an example method for optical characterization of an object according to an aspect of the invention;
FIG. 2
shows a schematic representation of an example apparatus for performing optical characterization of an object according to an aspect of the invention;
FIG. 3
FIG. 2
shows a schematic representation of an example neural network that may be comprised in the apparatus of ;
FIG. 4
shows a scanning electron microscope image of a substrate containing multiple dimer slit pairs fabricated to provide training data and test objects for assessment of an example method proposed for use in metrology;
FIG. 5
shows a pictorial representation of steps in an example method used for metrology;
FIGS. 6A, 6B and 6C
FIG. 4
FIG. 5
show graphs of measurements recovered for dimers shown in using the method of ;
FIG. 7
shows an example of a diffraction pattern of a test object in the form of a slit in an opaque substrate, used in assessment of an example method proposed for metrology;
FIG. 8
FIG. 7
shows a graph of measurements recovered for slits such as the slit of ;
FIG. 9
FIG. 8
shows a graph of the measurements of corrected to account for known errors in the fabrication of the measured slits;
FIG. 10
shows a quantity of objects comprising different counts of particles, for use in forming diffraction patterns to provide a data set for training a neural network to perform particle counting; and
FIG. 11
shows a quantity of objects comprising different counts and classes of particles, for use in forming diffraction patterns to provide a data set for training a neural network to perform particle classification.
DETAILED DESCRIPTION
Metrology—Example 1
Metrology—Example 2
Defect Detection
Particle Counting
Particle Classification
Two-Dimensional and Three-Dimensional Imaging
Aspects and features of certain examples and embodiments are discussed/described herein. Some aspects and features of certain examples and embodiments may be implemented conventionally and these are not discussed/described in detail in the interests of brevity. It will thus be appreciated that aspects and features of apparatus and methods discussed herein which are not described in detail may be implemented in accordance with any conventional techniques for implementing such aspects and features.
The present disclosure relates to methods and apparatus for the optical interrogation of sub-wavelength objects. By this is meant that the objects have at least one feature or dimension which is smaller than the wavelength of the light used to interrogate the object, in other words to illuminate the object for the purpose of obtaining, retrieving or determining information about the appearance of the object, which may be terms conveniently as imaging.
Optical radiation typically defined as light, comprising the infrared, visible and ultraviolet parts of the electromagnetic spectrum, can be broadly considered as having wavelengths specified in nanometres. Wavelengths up to 1000 nm include ultraviolet, visible and some near-infrared light. Accordingly, objects which are sub-wavelength can also be described as “nanoscale”, in other words, objects or features of objects having dimensions below about 1 μm, that is, 1000 nm or smaller.
Herein, the concept of imaging is not limited to recording or detecting the appearance of an object, but includes identifying, determining, deducing or measuring one or more externally discernible characteristics, properties or features of an object from a measurement of light diffracted by that object, such as the size and/or shape and/or type and/or position of part or all of the object, or the presence or absence of the object or a part or feature of the object, or a change in size or shape, or motion/movement. It may or may not comprise a determination, reconstruction or reproduction of the appearance of part or all of the complete object.
Proposed herein is an optical method for the characterization of a sub-wavelength object. Broadly speaking, the method comprises two stages. Firstly, a diffraction pattern from a sub-wavelength object of interest is detected, and secondly, the diffraction pattern is processed through a suitably trained neural network. It has been found that artificial intelligence (deep learning) can accurately identify (retrieve or recover) properties of a sub-wavelength object from its diffraction pattern, when the network has been trained using diffraction patterns from similar objects for which one or more properties, parameters or characteristics are known. By “similar”, it is meant that the objects share at least one common nanoscale feature of interest, which will contribute a common component or components to the diffraction patterns which can be detected and assessed by the neural network. The trained network therefore receives a measured diffraction pattern, analyses it, and outputs some information about the original object which it has been able to recover from the diffraction pattern based on its knowledge of the diffraction patterns of similar objects gleaned during training. The recovered information is in the form of a deduction, or “best guess”, about the object's properties, in that the neural network deduces a value for a property which is deemed most likely in view of the knowledge the network as obtained about corresponding properties of other objects during training. It is then possible to make some characterization of the object based on the recovered information. A wide variety of characterizations are possible by use of suitably trained neural networks.
This should be contrasted with the imaging technique known as coherent diffraction imaging, in which an image of an object is constructed from the far-field diffraction pattern of a highly coherent beam of, typically, ultraviolet or x-ray radiation scattered by the object [1, 2]. Coherent diffraction imaging performs reconstruction using intensity information of the diffraction pattern. The diffraction pattern, which can be detected without a lens, is measured as an intensity map or profile, and iterative feedback algorithms are used to solve the inverse problem of determining the appearance of the object that created the detected diffraction pattern, thereby creating an image. This is a difficult, mathematically ill-defined problem owing to the absence of phase information in the intensity map, and also the resolution is limited by the wavelength of the light (hence the use of short wavelength radiation).
The presently proposed concept does not require the problematic procedure of reconstruction. Rather, deduction is used to determine information about the object; in other words, a guess is made about the object. This uses a greatly reduced computational overhead compared to reconstruction, and also, as described below, offers greatly superior resolution which is not constrained by the diffraction limit.
FIG. 1
1
shows a flow chart of an example method according to an aspect of the invention. In a first step, S, an object for which some form of characterization is required is provided. Examples of characterization that can be achieved will be described in detail later. The object is a nanoscale object, in that it has at least one feature, element, part or component with a nanoscale dimension or dimensions, in other words, which is smaller than about 1 μm. In some cases, the object as a whole will be a nanoscale object, in that no dimension of the object exceeds 1 μm. In particular, the object has at least one nanoscale feature which is of interest for the characterization, for example, the size, appearance, presence or absence of this feature needs to be determined. The object is suitably positioned in order for the method to be carried out; this is explained in more detail below with reference to an example apparatus.
2
In a second step S, the object is illuminated with coherent plane wave optical radiation, or light. The light may be generated by a laser, for example. The light has a wavelength (for convenience, the wavelength can be considered to be single-valued, since the output of a laser is an extremely narrowband peak) which is selected to be greater than the nanoscale dimension of the nanoscale features or features of interest of the object. Hence, the object can be considered as being sub-wavelength; it is smaller than the illuminating wavelength.
3
The optical radiation is incident on the object and will be scattered from it, forming a diffraction pattern as is well-known. In a third step S, this diffraction pattern, defined by its spatial intensity distribution or pattern, is captured by being measured or recorded with an optical detector arrangement, such as a CCD camera or other photodetector array. Depending on the complexity of the object and the nature of the nanoscale feature of interest and its effect on the diffraction pattern, it may be adequate to capture the diffraction pattern as a one-dimensional intensity profile, or a two-dimensional intensity map may be preferred. A one- or two-dimensional array detector allows the diffraction pattern to captured in its entirety in a single shot, to contribute to a high-speed method. If speed is not important, the diffraction pattern may be captured by scanning a single detector or line of detectors across the pattern. For convenience, the diffraction pattern may be captured in the optical far-field, so spaced apart from the object, but this is not essential. Options for this are discussed further below.
4
In a fourth step S, the captured diffraction pattern is supplied to a neural network, which has been trained using a training set of diffraction patterns corresponding to other objects similar to the illuminated object, in particular that the objects have the same nanoscale feature of interest. The objects may be considered to be all of the same kind or type, or belong to the same category or classification. The values of a property or properties (such as size) of the nanoscale feature of the objects that contribute diffraction patterns to the training set are known. The neural network hence knows the appearance of a diffraction pattern of an object with a particular property or parameter, and is able to make an assessment of the corresponding parameter in the illuminated object based on this knowledge. This process can be thought of as a mapping or comparison of the new diffraction pattern with the training set patterns, by which the network is able to provide a probabilistic estimate or guess of the value of the parameter in the illuminated object according to the level of correlation or matching with the training set diffraction patterns. In other words, the network is able to make a deduction to recognise or identify one or more features of the object, by using deconvolution techniques to map between the diffraction pattern and the knowledge the network has learned from the training set, in the known manner for neural network operation.
5
In a fifth step S, the neural net operates to recover information about the object from the supplied diffraction pattern. In particular, information about the feature(s) shared by the object and the objects of the training set, such as the value of the shared parameter(s), can be extracted by the neural network. This information forms the output of the neural network.
In a sixth and final step, the object is characterized based on the recovered information. The nature of the characterization will depend on the feature of interest in the object and the type of information which has been recovered relating to it. The characterization may be simply the association of the object with a recovered value for a parameter of the nanoscale feature, such as its size, or may be more complex such as the classification of the object into any of several groups according to the recovered information, or the labelling of the object according to whether the feature of interest has been found or not found. Examples are given in more detail below.
FIG. 2
FIG. 1
10
1
2
3
3
4
4
4
5
4
shows a schematic representation (not to scale) of an example apparatus suitable for performing a method according to the example of . The apparatus comprises an optical part, depicted on the left of the Figure, and a computing part, depicted on the right of the Figure. The optical part comprises an optical source , such as a laser, configured to emit coherent electromagnetic radiation in the optical part of the spectrum (typically with a wavelength less than 1 μm). Beam shaping and directing components , such as one or more lenses, may be used to manipulate the optical radiation if necessary, in order to format it into a coherent plane wave . The plane wave light is incident on an object , so as to illuminate the object for the purpose of the imaging. The object is positioned appropriately for the imaging, which is in this example includes the use of a substrate on which the object is supported. Other positioning, locating, supporting and similar arrangements will be apparent. The substrate may be movable in the x-y plane (orthogonal to the light propagation direction) in order to align the object in the plane wave, or to move between multiple objects on or in the substrate, for example. In this example, the substrate is transparent so that light can propagate through it in order to reach the object . In other examples, the object may be formed in the substrate.
Two nanoscale features of interest are indicated which can be recovered from the diffraction pattern. These are the width W of the object, and the position of the object with respect to the substrate, defined by a distance D of the object from a specified point or line on the substrate.
3
4
6
4
7
4
8
7
8
The plane wave light illuminates the object and is scattered by the object in the usual way. The scattered light forms a diffraction pattern, also in the usual way, which can be detected. A reference plane R is specified, perpendicular to the propagation direction of the plane wave, at which the diffraction pattern will be detected. The reference plane is a distance H from the object. The diffraction pattern has the form of a varying optical intensity across the reference plane R, the peaks and troughs of the intensity pattern being produced by features of the object which scatter the light, so the shape of the intensity pattern contains information about the object, in particular the nanoscale features of interest. An optical arrangement including one or more lenses, such as a microscope lens, are used to collect the light making up the diffraction pattern at the chosen reference plane , and image it onto an optical sensor or detector , such as a CCD array, where the diffraction pattern is captured. The optical arrangement may optionally include a polarizer in front of the detector . Some applications, such as imaging and microscopy of biological samples, may benefit from polarization contrast in the captured diffraction pattern.
FIG. 2
Note that the apparatus of is arranged to capture a diffraction pattern formed by transmission, in other words, by light which has propagated through/past the object. This is not essential, and apparatus may instead be arranged to use diffraction patterns formed by reflection, in other words, by light which has been reflected and/or backscattered from the object so as to propagate back towards the optical source, or along some other non-forward direction.
FIG. 2
2
7
8
The forward propagation configuration of may conveniently be achieved using a commercial dual optical microscope, with the object positioned in the microscope's imaging plane. A low numerical aperture lens can be used at the lens arrangement to illuminate the object with light from, for example, a laser diode. The lenses in the optical arrangement then comprise the magnification changer of the microscope, used at 4×, 5× or 6×, for example. A suitable detector may be a sCMOS camera, for example, which may provide a high number of pixels, such as 5.5 MP. These values are merely examples, however, and are not limiting.
8
Better accuracy of the methods herein are obtained if the diffraction patterns can be recorded with high spatial resolution. The proposed arrangement lends itself to this aspiration, however. The diffracted optical field reaching the imaging sensor is formed by free-space propagating waves, so can be imaged at any magnification without loss of resolution simply by adjusting the magnification level so as to ensure that the detector pixel size is smaller than the required resolution (so that details of the smallest required resolvable features in the diffraction pattern are not lost within single pixels. It has also been shown by experiment that operation of neural networks to recover details of the object can be tolerant to the dynamic range of the optical detector, such that a dynamic range of 40 dB has been found sufficient for successful deeply subwavelength imaging. Nevertheless, narrow-band coherent laser radiation for the plane wave is useful to enhance the distinguishability of the diffraction patterns of different objects.
4
6
4
8
The distance H between the object and the reference plane at which the diffraction pattern is captured offers some flexibility. Usefully, for convenience, the diffraction pattern is captured in the optical far-field, which may considered to be at a distance of one wavelength (λ) or more from the object. A distance of at least 2λ might be selected in order to ensure that near-field effects are excluded, for example. There is no upper limit on the size of H, other than any imposed by the practical limitations of the apparatus used. Also, the diffracted light is divergent from the object so the diffraction pattern increases in size with increasing H, and at large distances may be too large for complete capture of the relevant part by the sensor ; this may impose an upper limit on H. Typical useful values for H are therefore in the range of λ to 10λ, or 2λ to 10λ, or A to 5λ, or 2λ to 5λ for example.
However, the method is not limited to far-field capture of the diffraction pattern. Although the intensity pattern may be indistinct closer to the object, it has been found that a neural network is still able to retrieve useful information from it. Indeed, patterns measured in the plane of the object can be used. Therefore, the diffraction pattern may comprise the scattered intensity pattern captured in the near-field, which may be defined for convenience as values of H in the range of 0 to λ, or 0 to 2λ.
Experimental results have shown that the accuracy or resolution at which a neural network can retrieve information about the object from a diffraction pattern does not vary with or depend on the value of H to any significant level. Hence, there is flexibility in selecting a value of H; the apparatus can be configured for practical convenience with regards to other factors.
Furthermore, individual diffraction patterns and their analysis by the neural network are statistically independent from one another, including patterns captured from the same light diffracted from the same object at different values of H. This means that accuracy and resolution can be improved by averaging. If two or more diffraction patterns are captured at different distances from the object, and each processed through the neural network, the information recovered by the neural network can be averaged (using any known mathematical technique). This average recovered information can then be used in the characterization of the object. Alternatively, the diffraction patterns could be averaged using imaging processing in order to obtain a single averaged pattern to supply to the neural network; this approach reduces the quantity of diffraction patterns to be handled by the neural network.
FIG. 2
8
9
9
10
8
9
11
4
4
9
12
Returning to , the optical image sensor delivers the capture diffraction pattern to a computer processor . The processor may be integrated with the rest of the apparatus , or may be a remote server reached via a network, or a local processor (not shown) may receive the diffraction pattern from the sensor and pass it to a remote server. The processor (or the local processor) may perform some image processing on the diffraction pattern, for example filtering or noise reduction, but this may not be considered necessary. The processor hosts a neural network , to which the diffraction pattern is supplied. The neural network has been trained as described above, and is therefore configured to recover information about the object from the diffraction pattern. Examples are discussed further below. The recovered information is used to make a characterization of the object . The characterization may be carried out by suitable programming running on the processor , so that the characterization is delivered as an output of the apparatus. Alternatively, the information recovered by the neural network may be output directly, for handling elsewhere.
For accurate recovery of information from the diffraction image, the neural network (also referred to as artificial intelligence deep learning) should be trained using a reliable and trustworthy training set. The training set will comprises a set of diffraction images from similar objects, for each of which there is a priori knowledge of a relevant nanoscale feature or features of interest, for example the physical dimension(s) of a particular feature, or the position of a particular feature. The training set may be a physical training set, or a virtual training set, or a combination of the two. A virtual dataset for training comprises virtual objects with nanoscale features having associated randomly valued parameters, for which the corresponding diffraction patterns are computer-generated by numerical modelling (for example, Maxwell solving). It is important for accuracy that the computer model is highly congruent with the physical realisation of the imaging apparatus (such as a microscope), so as to match the actual imaging of the physical object being characterized.
A physical dataset comprises actual physical diffraction patterns recorded from a set of physical objects fabricated with known parameter values, using the same apparatus as will be used for characterization (or apparatus configured identically). Creation of a physical dataset is labor-intensive, both in fabrication of the objects, and recordal of the diffraction patterns, but gives natural congruence with the imaging apparatus.
The choice of dataset can be made with regard to the desired resolution of the information recovery, and the complexity of the apparatus (and associated difficulty of virtual replication), where in general higher resolution can be obtained by use of a larger training set.
Resolution, which herein takes its usual meaning in the field of imaging, to refer to the smallest feature size in an object that can be discerned from an image of that object (where in this case the image is the diffraction pattern), or the accuracy at which feature sizes can be determined from the image, can be increased in various ways. As already noted, larger training datasets and the use of averaging over multiple diffraction patterns captured at different reference plane distances can both contribute in this regard.
Another approach is the use of multiple illuminating wavelengths. A simple apparatus able to give good results can comprise a single optical source able to emit a single wavelength of coherent light, which can be detected using an appropriate monochrome sensor or camera. However, the method can be extended by using two or more optical sources (two or more diode lasers, for example) operable at different wavelengths, and combining their outputs into a single multi-wavelength (“color”) illuminating beam, and capturing the resulting color or pseudo-color diffraction pattern with a color image sensor or camera. It has been shown that this delivers increased resolution and accuracy, without any significant increase in the image capture time.
FIG. 3
The artificial intelligence, embodied as a neural network or similar computer construct, can take any convenient form. Purely for the sake of providing a concrete example, and not to impose any limitation on the invention, shows a schematic representation of an example neural network.
11
The neural network comprises four fully connected layers a, b, c, and d. The first three layers a, b and c have respectively 128, 512 and 256 neurons, and are activated by the Rectified Linear Unit (ReLU) activation function. The first layer a constitutes an input layer, while the second and third layers b, c are hidden layers. The final and fourth layer d has 3 neurons and is activated by the sigmoid function; it constitutes the output layer. This example neural network is configured to recover three pieces of information about the imaged object, A, B and C, output by the three neurons in the fourth layer d. To avoid over-fitting, dropout layers with a rate of 20% are inserted after each of the first three layers a, b and c. Training of the network can be by any appropriate method, such as the Adam stochastic optimization method, which minimises the mean absolute error between an observed pattern and a pattern predicted or known for a known object.
Other implementations of neural network and artificial intelligence systems may be used instead; the invention is not limited in this regard.
Examples of the types of object characterization that can be achieved using the proposed method will now be described. However, the invention is not limited in this regards, and other applications which will be apparent to the skilled person are not excluded.
Metrology, the technical field of measuring physical dimensions, can be implemented using a suitable training set for the neural network comprising diffraction patterns for objects having one or more features for which the physical dimension or dimensions are known. The neural network is then able to recover information about the one or more features, in the form of an estimated value for the same physical dimension or dimensions in the illuminated object. The object is then characterized by associating the values with the features. This can be in order to define a specification for the object, for example, or to determine if the object complies with specified manufacturing tolerances, for example, although other uses are not precluded.
FIG. 3
In order to demonstrate this application, experimental results are now presented. The object was chosen to be a dimer, in the form of a pair of nanometer scale parallel slits cut into an opaque metallic film. The nanoscale features of interest were specified to be the dimer dimensions, namely the width of the first slit, designated as A, the width of the second slit, designated as B, and the edge-to-edge separation between the slits, designated as C. These parameters could, for example, be allocated to the three outputs A, B and C of the neural network in .
A commercial dual optical microscope was used as the imaging apparatus, with the object placed on the microscope imaging plane and illuminated with 795 nm light from a laser diode through a low numerical aperture lens (NA=0.3). The diffracted light from the object was captured at a distance H of 2λ from the object in the imaging plane, suing a high numerical aperture lens (NA=0.9) with a 6× magnification changer and a 5.5 MP sCMOS camera. This gave a magnification of 600 corresponding to an effective pixel size of 10.8 nm on the image plane.
FIG. 3
A physical dataset was used to train the neural network (which was configured as in the example). The training set was chosen to comprise 100 diffraction patterns from 100 physical dimer objects, which was predicted from modelling to give a resolution beyond λ/10. To achieve this, a group of 144 dimer slit pairs of random size was fabricated by focused ion milling on a 40 nm thick chromium film deposited on a glass substrate. Within the group, the dimensional parameters A, B and C described above were randomly chosen in the interval from 0.1λ to 0.6λ (80 nm to 477 nm, since λ=795 nm). Hence, almost all dimensions in the group were well beyond the diffraction limit of conventional microscopy, and therefore not measurable by this technique. After fabrication, all the dimers were measured to nanometer precision using a scanning electron microscope (SEM) to obtain values for A, B and C.
FIG. 4
shows a SEM image of the substrate with the 144 dimers fabricated in it. The inset shows an enlarged view of a single dimer, in which the pair of slits is clearly visible. The three nanoscale features of interest A, B and C are indicated. The position marker for this dimer can be seen in the lower right corner of the inset.
From the group of 144 dimers, 100 dimers were designated for the neural network training set, and the remaining 44 were allocated to be test objects of “unknown” dimensions for the characterization experiment. Diffraction patterns were captured for all the dimers, using mutual alignment of each dimer via a position marker fabricated near each dimer to ensure consistency. Hence, the training set comprised the diffraction patterns for each of the 100 dimers together with the dimensions measured by SEM of the corresponding dimers. To compensate somewhat for the relatively small size of the training set, the training process was repeated 500 times, with randomization of the training set between each process. This produced 500 different realizations of the neural network. The diffraction image from each of the 48 test dimers was supplied to each realization, to obtain a distribution of 500 recovered values for each of the parameters A, B and C for each test object. Statistical analysis was carried out on the distributions of the recovered values to determine the resolution of the method.
FIG. 5
4
13
11
4
4
shows a pictorial representation of steps in the method carried out to obtain the recovered values for A, B and C. An object in the form of a dimer comprising a pair of slits cut into a substrate is positioned in the imaging apparatus for illumination with plane wave coherent light. This forms a diffraction pattern which is captured with an optical detector. The diffraction pattern is supplied to a neural network , which recovers values for the features A, B and C and outputs them. The object is then characterized by assignment of the values for A, B and C to the relevant features in the object .
FIGS. 6A-6C
FIGS. 6A, 6B and 6C
shows graphs of the results obtained from 14 randomly selected dimers of unknown dimensions. The recovered or retrieved values (indicated as circles, vertical axis) are plotted against the true values (horizontal axis, determined by the SEM measurements), where respectively show the parameters A, C and B. The black lines represent perfect imaging, in which the recovered value would exactly match the actual value (squares). Dispersion of the circles away from the line indicates a divergence between the true and retrieved values. For all three dimensions of the dimers (A, B, and C), it can be seen that the retrieved values closely follow the true values, slightly diverging for the smallest values. To quantify the resolution of the imaging, the interquartile range (IQR) of the distribution of retrieved values for each one of the 14 unknown dimers (indicated by the error bars) was calculated. Stochastic errors introduced by the network training process were found not to exhibit a strong dependence on the dimer feature sizes.
Owing to the use of neural networks, the proposed methods recovers object information, in this case measurements of dimer parameters, probabilistically. Therefore, resolution of the technique can be assessed from the point of view of how likely a measured value of an object's feature parameter is equal to the real value, within the claimed resolution. This was evaluated from the distribution of retrieved values for the measured dimers. The probability of retrieving individual dimensions A and C with a precision of λ/10 was found to be better than 95%. The same parameters were found to be retrievable with a precision of λ/20 with the probability better than 77%. The dimer gap, B, was resolved with a precision of λ/10 with a probability of 87% and with a precision of λ/20 with a probability of 70%. This experimentally observed resolution considerably exceeds the λ/2 diffraction limit of conventional optical microscopes. It is therefore demonstrated that the deep learning process involving a neural network trained on a priori known objects creates a powerful and accurate deconvolution mechanism, while sparsity and prior knowledge about the object help the retrieval process, similar to how sparsity helps “blind” compressed sensing techniques. Remarkably, such resolution was achieved with a small physical dataset comprising just 100 dimers.
Analysis of the results of this experiment suggest that characterization of more complex objects may require increasingly larger training datasets, but also that larger training datasets can boost the resolution by at least another order of magnitude, reaching molecular-scale resolution. Also, the results indicate that the concept is applicable to two- and three-dimensional objects, and objects of a priori unknown shape
Further metrology experiments show the expected attainment of better resolution. In a second example, the object was chosen to be a single slit. 840 slits of random nanoscale width were cut by ion beam milling into an opaque screen in the form of a 50 nm thick chromium film on a sapphire substrate. The screen surface was divided into rectangular frames each defined by four alignment marks, and a slit was placed in each frame at a random position along the x-direction. Hence, each slit was defined or characterized by its width W and its displacement D from the centre of its frame. A trained neural network with two output neurons was therefore suitable to recover values for W and D. The slits were cut with widths randomly chosen in the range of 0.079λ to 0.47λ (50 nm to 300 nm). The slit position D was randomized in the range of −0.79λ to 0.79λ (−500 nm to 500 nm) with respect to the frame centre line. The values used to program the ion beam milling were taken as the real (ground truth) values for W and D.
Again, a commercial dual optical microscope was used as the imaging apparatus, with the object placed at the microscope imaging plane and illuminated with 633 nm coherent light through a low numerical aperture lens (NA=0.1). Hence, all the values of slit width W were below the λ/2 diffraction limit for conventional microscope imaging. The diffracted light from the object was captured at a distance H from the object in the imaging plane, using a high numerical aperture lens (NA=0.9) with a 4× magnification changer and a 5.5 MP sCMOS camera with a 6.5 μm pixel size. This gave a magnification of 333×, corresponding to an effective pixel size of 19.5 nm on the reference plane. Diffraction patterns were captured for each object at multiple values of H: 2λ, 4λ and 10λ (in the far-field) and also at the level of the screen (placed in the imaging plane), for which H=0.
FIG. 7
shows an example diffraction pattern captured in a single shot using this imaging apparatus from one of the slits. The entirety of the captured pattern is shown, with a small portion in the centre corresponding to the positon of the slit and its immediate environs indicated by the box; this the diffraction pattern supplied to the neural network. As can be seen, the slit is not resolved in the diffracted image, but rather appears blurred and surrounded by interference fringes. The four alignment marks, each of which was a 1 μm by 1 μm square, at the corners of the frame can be seen, lying outside the utilised part of the pattern, and appearing as concentric rings. The positions of the marks were determined from barely resolved images taken at H=0, using peak finder algorithm, and used to position each slit within the apparatus for capture of the diffraction patterns.
As in example 1, a physical dataset was used to train the neural network, comprising single shot diffraction patterns measured for 756 of the slits, together with the associated ground truth values for W and D. To minimize any errors arising from training order, the neural network was trained 100 times with randomized versions of the dataset, to give 100 realizations of the neural network.
The remaining 84 slits, randomly selected from the original 840 slits, were used as unknown objects to test the neural network, the diffraction patterns of each, captured at four distances H for each slit, being supplied to each of the 100 realizations of the neural network, followed by averaging of the recovered values of W and D for each slit.
FIG. 8
shows a graph of results obtained from the 84 slits. The recovered or retrieved values for the width W (vertical axis, different symbols indicating the four different values of H) are plotted against the ground truth values (horizontal axis, from the settings for the ion beam milling). The black line represents perfect imaging, in which the recovered value would exactly match the actual value. As noted earlier, the value of H was found to have no effect on the accuracy; measurements at different distances are statistically independent.
Analysis of the correlation between the measured values and the ground truth values gave a resolution or accuracy of about λ/129 for individual diffraction patterns, at any value of H. However, averaging over the four values of H improved the resolution by a factor of two, to λ/258.
Further statistical analysis suggested that there were errors in the ground truth values for the slit width W, arising from tolerances in the ion beam milling equipment relating to the finite size of the focused ion beam and the accuracy with which it can be positioned for milling. Corrections were applied for this, giving improved results.
FIG. 9
FIG. 8
shows a graph of the corrected results for the same 84 slits. The recovered values for the width W (vertical axis) are now plotted against the corrected ground truth value (horizontal axis). There is better correlation with the line representing perfect imaging, compared to . From these results, an enhanced resolution was deduced, of about λ/410 for a single diffraction pattern, and λ/820 for averaging over four diffraction patterns at different H values. In absolute terms this is a resolution of about 0.77 nm.
Computer modelling was carried out to verify these experimentally determined extremely high levels of accuracy. The modelling returned average accuracy for values of the slit width W recovered from diffraction patterns recorded in the far-field of about λ/1304, or 0.49 nm in absolute terms. This factor of three improvement compared to the physical experimental accuracy can be attributed to factors including mechanical instability of the apparatus, experimental errors in aligning the field of view of the microscope to the slit, and to a lesser extent, the pixelation of the imaging sensor. However, the very high accuracy value indicates that for suitably refined apparatus, excellent resolution is attainable using the current concept for optical characterization.
Clearly, the metrology techniques described above are widely applicable to the measurement of multiple different features types in a wide variety of nanoscale objects, and objects with nanoscale features. As noted above, the use of simultaneous multiwavelength illumination to produce colored diffraction patterns captured with a color camera can improve the statistical outcome and hence increase the resolution. Diffraction patterns can be captured in transmission or reflection, as noted, but for some metrology applications, a transmission configuration will be relevant where object information can be recovered from light that has passed through the object. This is applicable, for example, to the measurement of features of semiconductor chips which are located within the chip, requiring measurement through other layers of the object which produce their own scattering. However, modelling experiments for metrology on objects placed behind scattering screens give good results, showing that the proposed techniques are applicable to these and other situations in which the features of interest of the object are obscured by some obstacle. Larger training data sets may be needed, and accuracy may be reduced in some cases. Overall, though, the metrology is applicable to both external and internal features of objects.
It is expected that the rate at which objects can be processed for metrology can be very high. The maximum rate for a given apparatus will depend on the frame rate of the camera or other detection arrangement operating in binning mode. For currently available equipment, this can reach 20 million frames per second. For real time measurements, this will be limited by the information retrieval time of the neural network, but could exceed tens of thousands of measurements per second.
The disclosed optical characterization technique is also applicable to the detection of defects and failure analysis in objects too small to be readily checked for quality using conventional imaging techniques. For example, it is useful for assessment of microchips and nanostructures. Semiconductor devices are very sensitive to impurities and foreign body particles, and imperfections in chip material metallization and wire bonding. To achieve economy of scale, semiconductor products are manufactured in high volume, but post-manufacture repair of finished semiconductor products is impractical. Therefore, incorporation of defect analysis in the production stage is important. Optical microscopy, atomic force microscopy and scanning electron microscopy are often used for this purpose, currently. However the approach proposed herein can offer high throughput failure analysis coupled with nanoscale resolution.
High speed analysis can be achieved by use of a high frame rate camera to capture the diffraction patterns, plus a suitable positioning arrangement to feed objects rapidly through the imaging apparatus. As explained above in the metrology examples, good results can be attained with a single diffraction pattern, which may be captured as a single shot via a suitable imaging device.
It is proposed that defect detection or failure analysis can identify topography imperfections in the etalon (unspooled) semiconductor chip structure, since these imperfections alter the diffraction pattern of light scattered from the chip. A suitable training set for the deep learning process may comprise a large number of diffraction patterns recorded from an etalon chip structure to which topography defects are artificially added at random but known locations. Physical training sets with implanted defects can be manufactured by recording diffraction patterns from wafers containing a large number of chips, where defects could be introduced by focused ion beam milling or other techniques. In some simple cases suitably congruent virtual training sets may be generated by computer modelling. The nanoscale feature of interest in this example is the defect, with the chip being characterized by the absence or presence of a defect, and the position of any defect which is present, defined for example by x and y coordinates, or other spatial coordinates. The presence of a defect changes the diffraction pattern compared to that from a defect-free chip, and the shape of the pattern will depend on the position of the defect on the chip. After training, the neural network will be able to identify both the presence of an otherwise unseen defect, and the position of that defect in the structure. To achieve this, the information recovered from the diffraction pattern will be positional information for a defect, such as its x and y coordinates, for assessed diffraction patterns in which a defect is recognised. From the training, the neural network will be able to firstly distinguish the diffraction pattern of a chip with a defect from the pattern of a chip with no defect, and in the former case, recover the defect position. This recovered information can then be used to characterize a chip as defective or not, with additionally the defect location being assigned to the chip where a defect is found. As the chips pass through the imaging apparatus, the plane wave illumination can be directed onto areas of the chip which are known to be most vulnerable to defect formation. This will alert the chip manufacturing process, and will indicate a potential problem with a particular section of the chip. The manufacturing process can then be corrected.
This is similarly applicable to defect detection in other items in which the presence of a nanoscale defect modifies the diffraction pattern.
A further application is that of particle counting, for nanoscale particles which are otherwise too small to be counted via optics-based techniques. A particular example is the counting of virus and bacteria particles, used for example in disease testing and diagnosis wherein a biological sample such as a blood sample is taken from a patient and cultured in order to allow any pathogens to multiple. The result of counting the resulting number of particles can then be used to determine if the patient has a disease. Counting can be particularly difficult in the case of viruses, which typically have sizes ranging form 5 nm to 300 nm, and are about ten times smaller than bacteria. Commonly, an electron microscope will be used for virus counting. However, the high level of sub-wavelength resolution available from the presently proposed method makes it highly suitable for this application.
In order to achieve counting, a sample may be scanned across small areas, and the number of particles in each area counted, and totaled together to give a total particle count for all or part of a sample. The presence of a particle within the sample will scatter more incident light and therefore modify the diffraction pattern. Accordingly, a particle can be detected from its effect on the diffraction pattern. More particles will further modify the diffraction pattern, which is also dependent on the position of the particles.
Accordingly, a suitable object to be characterized via the current method is a group of nanoscale items, in this case particles, within a small region of a sample such as might contain up to ten particles or up to twenty particles. The diffraction pattern will vary according to the number of particles and their positions within the sample region. Hence, a suitable training set can be based on a plurality of sample regions, each with a random number of randomly positioned particles within it. Each sample region is characterized by its particle count value (number of particles in the group of particles present in the region), regardless of the position of the particles. Hence, the training set provided to the neural network comprises the diffraction pattern of each sample region, together with the particle count value for that sample region. After training, the neural network is able to distinguish between diffraction patterns corresponding to different particle count values.
FIG. 10
20
22
20
24
22
24
22
22
22
shows an example of schematically represented sample regions suitable for use in generating a training dataset. A plurality of sample regions may be defined at spaced apart intervals, in this case, centred on 6 μm by 6 μm squares . This spacing can give a scanning period for scanning across an actual sample. A sample region measuring 2 μm by 2 μm is defined in each square , and a random number of particles between one and ten is randomly allocated to each sample region , with the particles in each region being positioned at random within the region . In an actual sample, the particle count in a sample region may be used to indicate the likely particle count in the larger square, to speed up counting over a whole sample. To obtain the diffraction patterns, each sample region is illuminated with appropriate coherent plane wave light. The dataset may be a physical dataset constructed from actual samples containing particles of the appropriate type, or may be virtual derived from computer modelling.
To conduct particle counting, therefore, a sample can be divided into nominal regions, and scanned through the imaging apparatus in order to create a diffraction pattern for each region. The diffraction patterns are suppled to the neural network, which recovers, from each pattern, information in the form of a particle count value. The sample region is then characterized by having the value assigned to it to indicate the number of particles it contains. Values from multiple regions across the sample can be summed together to provide a total particle count for the sample or part thereof.
FIG. 10
FIG. 11
22
24
24
24
a
b
c
Particle counting may be extended or modified to enable particle classification, that is, determining the likely class or type of a particle. In particular, particles may be differently sized and/or differently shaped, and this will have an effect on the diffraction pattern produced by a sample containing such particles. Accordingly, the example sample regions shown in for generating a particle counting training dataset can be modified by varying the size of the particles in each sample region, along with the number and position of the particles. shows an example of suitable samples. In this case, the training data set used to train the neural network comprises a diffraction pattern for each sample region , plus values for the particle count value for each particle size in the sample region. That is, the number of large particles , the number of medium particles and the number of small particles . Of course, this can be modified to apply to more or fewer particle sizes, depending on the nature of the samples to be classified. Alternatively, sample regions may include particles of one size only, with regions containing different particle sizes. Similarly, differently shaped particles may be included as well as or instead of differently sized particles, or particles which differ by other ways that affect the diffraction pattern. Larger training sets will be appropriate as the range of particle variety increases, in order to maintain accuracy.
To conduct particle classification, therefore, a sample can be divided into nominal regions, and scanned through the imaging apparatus in order to create a diffraction pattern for each region. The diffraction patterns are suppled to the neural network, which recovers, from each pattern, information that includes the likely size (or other class/type information) of particles in the region (and may include particle count also). The sample region is then characterized by having the particle information assigned to it to indicate the type or types (class) of particles it contains.
In a further application, it is proposed that the information recovered from an object's diffraction pattern by the neural network could be used for partial or complete reconstruction of the object's appearance. It is known to image an object using backward wave propagation according to the Kirchhoff-Helmholtz integral, based on intensity and phase information of coherent light scattered from the object and measured over a closed or open surface or curve surrounding or partly surrounding the object, but the proposed use of neural networks is simpler than the complex calculations required in the Kirchhoff-Helmholtz integral approach.
Training a neural network using training data in the form of diffraction patterns from multiple same, similar or different objects, together with values for parameters that characterize the appearance of the objects, such as dimensions of the objects and features within the objects, can enable a neural network to recover sufficient information from an unknown object's diffraction pattern for reconstruction of the object's appearance using computer modelling or the like. With sufficient recovered information, imaging in two dimensions or in three dimensions is possible. The amount of information available may be expanded by analysis of more than one diffraction pattern, for example multiple diffraction patterns captured in planes oriented at different angular positions around the object. Multiple wavelengths may also be useful in this regard, either by capturing multiple diffraction patterns for different illuminating wavelengths, or by combining two or more wavelengths into a single illuminating beam to provide a colored diffraction pattern.
As discussed above with regard to metrology, resolution on the order of λ/1000 is achievable using the proposed object characterization approach, which offers a tremendous improvement compared to the diffraction limit of λ/2 placed on coherent diffraction imaging and other established plane wave optical techniques. Hence, significantly improved imaging of objects is possible.
Although some particular examples of optical wavelengths have been given above, aspects of the invention are not limited in this regard. The wavelength or wavelengths used can be chosen as convenient according to available optical sources, cost, size, output power, and the like, provided that the wavelength is longer than the size of the nanoscale feature(s) of the object(s) being characterised, where, as noted above, a nanoscale feature is one having a size less than about 1 μm. Typically, then, the optical wavelength can be selected from the range of about 100 nm to about 1000 nm.
The various embodiments described herein are presented only to assist in understanding and teaching the claimed features. These embodiments are provided as a representative sample of embodiments only, and are not exhaustive and/or exclusive. It is to be understood that advantages, embodiments, examples, functions, features, structures, and/or other aspects described herein are not to be considered limitations on the scope of the invention as defined by the claims or limitations on equivalents to the claims, and that other embodiments may be utilised and modifications may be made without departing from the scope of the claimed invention. Various embodiments of the invention may suitably comprise, consist of, or consist essentially of, appropriate combinations of the disclosed elements, components, features, parts, steps, means, etc., other than those specifically described herein. In addition, this disclosure may include other inventions not presently claimed, but which may be claimed in the future.
REFERENCES
[1] H N Chapman and K A Nugent, “Coherent lensless X-ray imaging”, DOI: 10.1038/nphoton.2010.240
[2] G J Williams, H M Quiney, B B Dhal, C Q Tran, K A Nugent, A G Peele, D Paterson, M D de Jonge, “Fresnel coherent diffractive imaging”, Phys. Rev. Lett. 97, 025506 (2006) | |
Miri – 10 June 2013 – Curtin University, Sarawak Malaysia (Curtin Sarawak) will be hosting the eighth edition of the Curtin University Technology, Science and Engineering (CUTSE) International Conference at its campus from 3 to 4 December 2013.
The annual conference, which was first held in 2006, provides a platform for the dissemination of knowledge and information on the latest innovations and practices in engineering and the sciences. It is jointly organised by Curtin Sarawak and The Institution of Engineers Malaysia (IEM), Miri Branch.
The conference’s focus is on finding eco-friendly and sustainable solutions to problems across all areas of the disciplines. The theme of the conference this year is ‘Science, Sustainability and Solutions’.
It also allows participants to engage in constructive dialogue on concepts, ideas and technology, as well as provides an excellent avenue for researchers, engineers, scientists, academicians, and professionals from industry to share their research findings and initiate further collaborations in their respective fields. In addition, student participants will get an opportunity to present their research projects and get valuable feedback from professionals in their relevant fields.
Parallel sessions in Mechanical, Electrical, Computer, Civil and Chemical engineering as well as in different science disciplines will be hosted over the two days.
Last year’s conference saw the participation of 122 delegates from 10 different countries and a total of 170 papers were presented.
Papers that would be accepted for this year’s conference include, but are not limited to, the following topics:
• Environment, Energy and Resources: Renewable energy; fuel cells; wastewater treatment; produced water treatment; bioremediation; biotechnology; process integration; cleaner production technology; soft-soil sciences; petroleum geology; oil and gas applications.
• Structures, Materials and Manufacturing: Construction technology and management; construction and structural materials; structural design and analysis; geo-polymors; ceramics; nano materials; bio materials; polymers; composites; smart materials.
• Systems and Control: Adaptive, nonlinear and robust control; model predictive control; fuzzy logic control; control theory; control structure design; control applications; systems biology.
• Mechatronics and ICT: Mechatronics; MEMS design; robotic systems; wireless network; sensors and instrumentation; signal processing; various ICT applications.
• Engineering Science Fundamentals: Transport phenomena; heat mass transfer; multivariate statistics modelling; multiphase flows; numerical modelling; mathematical modelling; optimization in engineering and science; computational fluid dynamics; GIS.
Those interested to present papers at the conference are requested to submit their abstract submissions by 19 July 2013. Those selected will be notified by 2 August 2013, and thereafter, they are expected to submit their full papers by 16 August 2013, and full manuscripts by 20 September 2013.
The refereed conference proceedings will be published prior to the conference and distributed to all registered participants at the conference.
Selected papers will be considered for publication in refereed journals. The selection will be carried out during the review process as well as at the conference presentation stage. The final decision will be made jointly by guest editors and the Editor-in-Chief based on peer review reports.
For more details of the 8th CUTSE International Conference, visit: www.curtin.edu.my/cutse2013/, or alternatively, call Dr. Khor Ee Huey at +60 85 44 3853 or e-mail [email protected]
The conference organisers are seeking corporate sponsorship for the event and those interested to know more about sponsorship opportunities can also contact Dr. Khor.
For more information on Curtin Sarawak, visit its website at www.curtin.edu.my, its Facebook page at facebook.com/CurtinUniversitySarawakMalaysia, Twitter profile at twitter.com/curtinsarawak, YouTube channel at www.youtube.com/user/CurtinUniSarawak, or Instagram at instagram.com/curtinsarawak. | https://www.fsi.com.my/curtin-sarawak-hosting-8th-cutse-international-conference-in-december/ |
BEIJING, Jan. 21, 2021 /PRNewswire/ -- TuanChe Limited ("TuanChe" or the "Company") (NASDAQ: TC), a leading omni-channel automotive marketplace in China, today announced that its board of directors (the "Board") has received a preliminary non-binding proposal letter (the "Proposal") dated January 21, 2021 from its chairman and chief executive officer, Mr. Wei Wen ("Mr. Wen"), proposing to acquire all of the outstanding ordinary shares (the "Shares") of the Company, including Shares represented by American depositary shares (the "ADSs," each representing sixteen (16) Class A ordinary shares), that are not already owned by Mr. Wen for a purchase price of US$4.25 per ADS in cash in a going private transaction (the "Proposed Transaction"), subject to certain conditions. A copy of the Proposal is attached hereto as Annex A.
According to the Proposal, the Proposed Transaction is intended to be financed through debt and/or equity capital, where equity capital will be provided at least in part by Mr. Wen in the form of rollover equity in the Company.
The Board intends to form a special committee consisting of independent and disinterested directors to consider the Proposal. The Board expects that the special committee will retain independent advisors, including independent financial and legal advisors, to assist it in this process.
The Board cautions the Company's shareholders and others considering trading the Company's securities that the Board has just received the Proposal and has not had an opportunity to carefully review and evaluate the Proposal or make any decision with respect to the Company's response to the Proposal. There can be no assurance that any definitive offer will be made, that any definitive agreement will be executed relating to the Proposed Transaction or that this or any other transaction will be approved or consummated. The Company does not undertake any obligation to provide any updates with respect to this or any other transaction, except as required under applicable law.
This announcement contains forward-looking statements within the meaning of Section 27A of the Securities Act of 1933, as amended, and Section 21E of the Securities Exchange Act of 1934, as amended, and as defined in the U.S. Private Securities Litigation Reform Act of 1995. These forward-looking statements include, without limitation, the approval and the consummation of the Proposed Transaction contemplated by the Proposal or any alternative transaction, which can be identified by terminology such as "may," "will," "expect," "anticipate," "aim," "estimate," "intend," "plan," "believe," "potential," "continue," "is/are likely to" or other similar expressions. Such statements are based upon management's current expectations and current market and operating conditions, and relate to events that involve known or unknown risks, uncertainties and other factors, all of which are difficult to predict and many of which are beyond the Company's control. Further information regarding these and other risks, uncertainties or factors is included in the Company's filings with the U.S. Securities and Exchange Commission. The Company does not undertake any obligation to update any forward-looking statement as a result of new information, future events or otherwise, except as required under law.
I, Wei Wen, Chairman and CEO of TuanChe Limited (the "Company"), am pleased to submit this preliminary non-binding proposal (this "Proposal") to acquire all outstanding ordinary shares (the "Shares") of the Company, including all the Shares represented by American depositary shares ("ADS", each representing sixteen (16) Class A Shares), that are not already owned by me in a going-private transaction (the "Acquisition").
I believe that the Proposal will provide a very attractive opportunity to the Company's shareholders. My proposed purchase price of US$ 4.25 per ADS in cash represents a premium of approximately 22% over the closing price of the Company's ADSs on January 20, 2021, a premium of approximately 17% to the average closing price of the Company during the last 60 trading days and a premium of approximately 18% to the average closing price of the Company during the last 90 trading days.
The terms and conditions upon which I am prepared to pursue the Acquisition are set forth below. I beneficially own approximately 17.6% of all the issued and outstanding Shares of the Company, which represent approximately 75.7% of the aggregate voting power of the Company, based on the Company's latest outstanding number of shares as publicly disclosed.
1. Buyer. I intend to form an acquisition vehicle for the purpose of pursuing the Acquisition.
3. Financing. I intend to finance the Acquisition with debt and/or equity capital, where equity capital will be provided at least in part by me in the form of rollover equity in the Company. I expect definitive commitments for the required financing, subject to terms and conditions set forth therein, to be in place when the Definitive Agreement (as defined below) are signed. I am confident that I can timely secure adequate financings to consummate the Acquisition.
4. Due Diligence. Parties providing financing will require a timely opportunity to conduct customary due diligence on the Company. I would like to ask the board of directors of the Company to accommodate such due diligence request and approve the provision of confidential information relating to the Company and its business to possible sources of equity and debt financing (if required) under a customary form of confidentiality agreement.
5. Definitive Agreements. I am prepared to negotiate and finalize definitive agreements (the "Definitive Agreements") expeditiously. This proposal is subject to execution of the Definitive Agreements. These documents will include provisions typical for transactions of this type.
6. Confidentiality. I am sure you will agree with me that it is in all of our interests to ensure that we proceed in a confidential manner, unless otherwise required by law, until we have executed the Definitive Agreements or terminated our discussions.
7. Process. I believe that the Acquisition will provide superior value to the Company's shareholders. I recognize of course that the Board will evaluate the proposed Acquisition independently before it can make its determination whether to endorse it. In considering the proposed Acquisition, you should be aware that I am interested only in acquiring the outstanding Shares I or any other shareholders of the Company who may choose to roll over with me do not already own, and that I do not intend to sell my stake in the Company to a third party.
8. Advisors. I have retained DLA Piper as my legal counsel and Huatai United Securities Co., Ltd. as my financial advisor in connection with this proposal and the Acquisition.
9. No Binding Commitment. This letter constitutes only a preliminary indication of my interest, and does not constitute any binding commitment with respect to the Acquisition. Such a commitment will result only from the execution of Definitive Agreements, and then will be on the terms provided in such documentation.
In closing, I would like to personally express my commitment to bring this Acquisition to a successful and timely conclusion. Should you have any questions regarding this proposal, please do not hesitate to contact me at 010-63984292. I look forward to speaking with you. | |
Coaching: the Eyes, Ears and Wise Guidance We Need
Education is more than the information we accumulate in our heads. It’s the habits we develop as we keep revising our drafts and the skills we build to keep learning.
–Adam Grant, Think Again
I began teaching in an independent school with no idea how to best support my students’ learning, despite having a Masters of Arts in Teaching and years of experience working with young people and adults. Through a long, lonely process of trial and error, I eventually figured some things out. I had been a teacher for over 10 years before the concept of coaching beyond the volleyball court or soccer field took hold in my awareness. Reading Atul Gawande’s piece, The Coach in the Operating Room, clued me in to what I had been missing: “the outside eyes and ears” to make clear what I could be doing differently or better, and wise guidance in implementing changes.
About the time Elena Aguilar’s pivotal book The Art of Coaching was published, I became Dean of Faculty Development at the Athenian School. Determined to offer coaching to teachers and yet without any system in place, I followed in the footsteps of an independent school to the north, Sonoma Academy, hiring master teacher and coach Bonnie Mennell to spend two weeks with us a year, as I write about here.
Bonnie recently shared this about her approach: “I ask teachers I work with how I can be of service to them as a curious, inquiring, confidential observer. Each teacher has unique gifts and personal edges for growth. This is what we explore together. I also seek to offer, once I witness teachers in their classrooms, approaches, strategies, and techniques that may enhance their practice.”
Bonnie also coached me as a teacher and a leader: observing my classes and the faculty meetings I led. Like her other clients, I experienced exponential growth. I have brought much of the wisdom and new skills I gained forward into my role as Executive Director of the California Teacher Development Collaborative, especially into the transformational coaching series which I led with Lori Cohen, who is now an educational consultant and Developer of People and Programs at Bright Morning.
As Lori recalls, “participants hailed from an array of roles—teacher, administrator, teacher leader, coach—and in each of our sessions, we practiced listening techniques, learned about coaching lenses, practiced different inquiry stances, engaged in role-play scenarios, read professional articles related to coaching, and developed visions and structures for coaching at our individual school sites. By the end of the program, participants commented that they had the tools and capacities to better structure coaching conversations, and they were inspired to bring their learning back to their schools. And we continued to deepen our own learning about what it meant to not only be a coach, but a coach of coaches.”
In this EdWeek Article, Lori makes a brilliant case for why we need instructional coaching at independent schools, highlighting how it can help teachers and leaders to thrive: closing gaps in teacher preparation, providing compass points in navigating school culture, promoting equity, and supporting life-long learning.
The best educators continually rethink and revise their practices. These days, it is nigh impossible to do this well in isolation. The support of a good coach is becoming essential, whether developing responsive virtual or in-person pedagogy, reimagining DEIJ work, or leading a school through the most recent crisis.
Especially at this critical juncture, independent schools need to be much more systematic in offering professional development to educators in all roles and at all stages of their careers. To ensure the greatest growth for our teachers and our leaders and thus the best outcomes for students, our schools should build systems to support coaching: providing adequate time, appropriate structures, a clear vision, and opportunities for coaches themselves to be coached.
In continuing to support this evolution, CATDC is offering a virtual ongoing program to support coaches and school leaders who wish to leverage learning from the past year as well as develop a tool box of practical strategies for engaging in coaching conversations. Facilitated by Jennifer Liu and Julie Strong, this program will help to build a coaching community across school sites, establishing a shared language of coaching concepts and frameworks. If you are interested in growing as a coach or are in the midst of building a coaching practice at your school, this is not to be missed.
I was fortunate to be able to bring Bonnie Mennell to Athenian as an external coach; she understood well the independent school milieu and so was that much more effective in supporting me and so many others to revise and improve our teaching and our leadership. This kind of learning should not be left to chance. That is why I am so thrilled to be officially launching CATDC Coaching. As with our workshops, we are partnering with local experts familiar with the landscape you are navigating. Please reach out if you have any questions. We are always happy to listen to your learning goals and make recommendations for cohorts to join or coaches to work with.
Lisa Haney has served as the Executive Director of the California Teacher Development Collaborative since 2017. Prior to her current position, she worked for 25-years at the Athenian School in many roles, including English teacher, international program director, and humanities department chair. In her most recent capacity as dean of faculty development, Lisa spearheaded a process to develop Athenian’s Standards of Excellent Teaching and design a comprehensive new professional development and evaluation program. | https://catdc.org/coaching-the-eyes-ears-and-wise-guidance-we-need/ |
Agile Software Development Process
Taking it back to 2001, when seventeen software developers started creating The Agile Manifesto, an open minded manual for delivering products, while corely focusing on the specified values in each part of creation process, the methodology began to spread and got adapted by developers worldwide. Going with the flow and adapting to occuring changes rather than planning religiously, at the sime time achieving improvement in an evolutional way – is what Agile software development process is about. Software development process is like a river running through sharp rocky ground, so perhaps it is better to be Agile about it and adapt to the changing environment in comparison to arranging the tide completely, which cannot be done due to the unexpected.
Agile Understanding of Values
Authors mentiond above, have stated what is most important for them in the process by contrasting parts of it:
Individuals and interactions over processes and tools
Working software over comprehensive documentation
Customer collaboration over contract negotiation
Responding to change over following a plan
Even though, they see the sense in the formal side of the project and make a use of it, they put the emphasis ot the more humane factors, believing these rules will bring the best product possible. The statement sounds almost like a call to all the developers to pay great attenion to the change, making it a strong one. Paraphrasing the text: process and tools are crucial, but the real potential lays in human resources; building documentation helps keeping track of things, but the focus should be on building the software; contract being important for sides to know their resposibillities is nothing towards real contact with you – the client, and your impact and help on the process; plan works as an reminder to the objectives but the eyes have to stay opened for it cannot be including everything laying ahead of the team.
Basic Software Development Process
What this article is really about is a cycle – a software development life cycle (SDLC). There are many models for it and Agile is one of them. Each model represents the best solutions for certain projects in terms of it’s scope, cost, durability, your expectations and business requirements. Companies often mix and match methods to suit them to a project correctly. Next to SDLC you may hear about other methodologies like RAD or End-user which SDLC compares to with characteristics like vital integrity and security, many users and long time frame. For every SDLC model, 6 steps can be identified.
Essential Analysis
To build a software the team has to grow on your product idea. You have to discuss with them all aspects of your vision. Once the objectives are set, tactics thought through and costs estimated, the project starts to get in shape. During the essential analysis this is what happens:
1. Understanding the requirements for your product
2. Making a project plan – costs, schedules, human resources
3. Preventing hitting walls – optimizing risks
4. Having agreement on all sides of the project, you, the team, sponsors and any other stakeholders
Design
Every little details of what is supposed to be included in your software is documented for the developers to work on in the form of design. This includes both UX and UI designers, who work on the perfect product for you!
Development
From software architect to the developer, the vision begins to shine through. The software’s code is being written.
Implementation
Bringing pieces together – implementation – all parts built by developers get put together and integrated. Your product now has a real, working form.
Testing
To spot all the errors and bugs, to check if your expectations are met, the product is viewed by Quality Assurance Specialists, who put it into different case tests. The product will be shown to you as well.
Maintenance
Making sure your software stays relevant and working, the team will update it to newer versions to fit all recent market needs.
Agile Approach
Along with values, the Agile Manifesto team has written out 12 main principles of the Agile software development process which provide something like a framework on how to manage IT projects and the software development process. If you want to know about them in detail we recommend our post about “Agile Project Management”.
It is clear that the Agile team would depend on everyday conversation and regular tests and updates on the product. In order to follow up with such strategy it is smart to part work into sections for plans to be as precised and certain as possible, and objectives for that time clear. For that Agile combines iterative and incremental model.
Iterative model
Project plan in this model is often changed along the way and is made specific only for certain periods, leaving space for changes. The idea is to create a „complete” version of software and then add up to it and change it in next iterations. The software gets into the iteration cycle, in which one phase takes up to few weeks. Product gets developed, tested by experts and shown to you at the end of each phase. Basically it gets done over and over again until it is right. That way instead of guessing the outcome product, you meet with it face-to-face everytime to give feedback and see your vision come to life everytime better. Knowing what it lacks exactly, when you look at the „done” product, you can tell the team how to improve the product. That way you and the team are the closest to realize if you want to make any changes in the recent plan, as you can be. First iteration will build a fundamental framework and the rest will come along with the other ones.
Check our new article Agile Project Management For Dummies -> be the scrum master!
Stages of the Iterative Model:
Essential Analysis
After starting the project, the team sets its objectives and acknowledges all software requirements. The requirments are being thoroughly analyzed to realize initial costs and risks. At this stage all members know what they need to do to complete the first iteration. What is also important at this stage is establishing the team’s motivation – as they get to know your product, they understand it and get “attached” to it. And it provides for them to work harder and be more effective while creating a product for you.
Design and Development
The abstract is being realized. It involves creating UX mockups and wireframes that later on are being passed onto the UI designer who brings them to life. After you are satisfied with how the product looks the developers start to work their magic.
Testing
Performance of the product is being checked to meet your expectations. All the obstacles are detected at this stage and fixed. Quality Assurance Specialists and Testers make sure your product works perfectly.
Your Feedback
Agility of the project depends on face-to-face communication between you and team members. It is time to view the product in process and discuss pros and cons. It is important that you communicate well with your team because they need and want to know how to improve your product and themselves.
Rewind
With all the new knowledge the team will begin all the steps over again to improve the software until you are fully satisfied.
With all the iterations your product gets built step by step. It may take a few versions of the software, but that lets you carefully observe the process and improve the product each time, while experiencing it like your costumer would.
Incremental model
Same as with iterative model, incremental one divides work into segments with expectations of repeating them. Steps to completing your project are the same, but the product is implemented not as a whole, but partially for your feedback with each increment. Incremental program helps you improve the process by spotting mistakes early on. With each function created, constructed with every increment you get to see diferent details of the product, so you know if that will fit your vision.
An Example of Agile in Action: Scrum Sprints – Scrum Version of the Iterative Model
Scrum is a scheme for Agile project management. It puts out steps for Agile teams to follow for consistent and smooth software development process. The team has a Scrum Master guarding the program. Their resposibillities are helping the team members with communication and encouraging them to do their best and also helping you reach your goals and maximize your profit. The Scrum sprint technique is a fast work mode that takes up to a month, usually two weeks. First the product backlog is created. That’s where you – the Product Owner, write what you would like to see in your software. User stories, meaning what users would like to see in the software, and you agreed on is going to be kept in the Sprint Backlog. To help the creative process the Daily Scrums happen. Those are everyday 10 or 15 minute meetings of team members, in which they quickly discuss things like: what they have already done in the sprint, what are they going to do today, any problems and suggestions for improvement. An interesting method, is a role blur. Despite everyone on the team having their official titles, each member’s goal is to do anything they can to make a project successful. That checks the point of trusting people to do the job and let their talent and resourcefulness flow.
Unit Testing
The Agile process is often a test-driven development (TDD) system. With the whole of increments and iterations, every final step to each phase involves testing. It can be done manually but at most times it is automatic. The philosophy of TDD is first writing actually failing systems for units. That way when they process into working ones that pass the test, they have written out all possible versions they could have to spot code’s weaknesses and strong points. TDD is a time saver and mind bendig for developers to see many possibilities. Being able to go back to all versions, can be a vast range of options to create stronger product and show you work alternatives.
Benefits of the Agile Software Development Process
Surpassing Quality
Product delivered by the Agile team is most likely one that will capture your vision. Because you get the chance to give your feedback with every element or sample product, you can update your requirements regularly, not just once at the beggining of the project. That is the adaptability to change that Agile offers.
Easier, Less Risky Changes
While traditional approach takes months preparing documentation for the project and planning everything to the very end, being very hard to make any changes in it, for they might bring the whole plan down – in an Agile software development process you can make quick changes between iterations or increments without worrying. Agile expects modifications and is open to them. Really certain plan and documentation is made only for one time period and you can add and substrat requirements in between phases.
Lower Costs
Focusing on creating great software, without putting unnecessary weight on documentation not only saves you time, but also money. There will probably be no documents that were created for nothing and never used, adding cost and zero value. Fast error detection thanks to frequent, detailed product viewing and testing, helps fixing problems as soon as possible and preventing them from growing, also saving you from losing money. Starting a project before spending months on complicated planning means wasting no time and bringing you to the profit faster. Overall the faster your project gets done, the bigger revenue you will have.
Delivering Working Software with Each Increment
Typical, especially for Scrum, is that when the sprint is done, your product is a working and a shippable one, as they like to call it. If the time is rushing you and you decide at some point, you are satisfied, you will have the product done, as opposed to waiting for the whole project plan created by traditional team being completed.
Customer Collaboration Over Contract Negotiation
Agile software development process relies heavly on cooperative, skilled and self-organizing teams, letting them bloom and develop a character combined of unique individuals. Emotional commitment of workers in an Agile team helps you establish better relationship between them and you, therefore resulting in a product being handled very well. Some say Agile makes any project better and others think it fits only specific ones. It is smart to gain from both traditional and newer business methodologies to be successful on the market. No doubt, it is always positive, Agile or not, if you are greatly involved in the project to help bring your vision to life. | https://invotech.co/blog/agile-software-development-process/ |
ACDBA welcomes the opportunity to meet and engage with stakeholders to the Australian Collections Industry to review and workshop matters of mutual interest and concern.
Since inception, ACDBA has actively engaged in discussions through meetings and forums with stakeholders including legislators, government departments, regulators, external dispute schemes, other industry associations, credit bureaus, financiers, debt sellers, consumer advocates and financial counselling groups.
Open and frank discussions enable parties to appreciate the perspectives of others and facilitate agreement on areas in common and to explore any areas of contention.
ACDBA stakeholder engagement resulting in a collaborative outcome has been the work between ACDBA and Financial Counselling Australia leading to the establishment of a Pilot trial of the National Hardship Register from 1 January 2014 to address the serious issue of long-term and severe financial hardship experienced by a small but growing number of vulnerable Australian consumers. More details on the National Hardship Register initiative can be found at www.nhr.org.au.
Industry stakeholders seeking to engage with ACDBA are encouraged to contact its CEO. | https://acdba.com/index.php/stakeholder-engagement |
There is a small slice of time between emotion and reaction. We need to utilize this space, shove in a wedge, widen the gap, and act with greater wisdom.
Environmental triggers and biological drives intertwine to dictate behavior; the actor is acted upon by these forces. Our weapon to combat the unseen motivational forces is reflective thought. Through the subtleties of thought, we change environments and adjust the underlying emotions with new learnings. As humans, we proudly tout our self-governing abilities but many routinely sell their birthright of free-will for a mere bowl of porridge. Instead of self-governing beings acting towards intentions, we often settle to be acted on by happenstances.
Our mind slyly interprets our compulsive responses. Through smooth deceptions, self-righteous justifications, and lack of awareness, we explain away chaotic future-destroying action as appropriate and necessary. We unconsciously react but retain a sense of empowerment through the self-told stories. We act as servants to biological and environmentally driven motivations but maintain our beliefs of free-will. We may routinely justify behaviors as appropriate that push us off course. In order to improve our circumstances, we must honestly recognize wayward drifts and make appropriate corrections. Unacknowledged we eventually drift too far, losing sight of reality, blindly believing to be in control while living a life of chaos.
Justifications soften the blunt strikes of reality on the psyche; but nevertheless, reality still plays its fateful hand. We gain weight when we consume too many unhealthy calories; we damage relationships with harsh words and insensitivities; we lose competitive advantage by wasting time. No matter the explanation, the excuse or justification the constructive actions avoided fail to mold our lives. Improvement demands we honor reality. If we understand the relationship between goals and present behavior, we can design a program to successfully attain those intentions.
"Justifications soften the blunt strikes of reality on the psyche; but nevertheless, reality still plays its fateful hand."
Evolution has compassionately introduced a buffer between the environment, inner urges and our final responding behavior. Consciousness enables those, who effectively use it, the power to disengage from the powerful driving forces and select more appropriate behaviors.
We have power to act in productive ways that enhance futures. To use this powerful gift, we must purposely seek awareness of the underlying emotions influencing action; pause when practical and then thoughtfully proceed. Often emotions are on target, leading us towards intentions, guiding choices with hidden wisdom. Thoughtful awareness, experience and wisdom help us sort through the emotions and detecting when they may be off-course. Wisdom discovers correlations between behaviors and objectives. When we improve present choices, we experience better futures.
|
|
Flourishing Life Society Website search: | https://www.flourishinglifesociety.com/creating-space.html |
Predicting dengue outbreaks using approximate entropy algorithm and pattern recognition.
The prediction of dengue outbreaks is a critical concern in many countries. However, the setup of an ideal prediction system requires establishing numerous monitoring stations and performing data analysis, which are costly, time-consuming, and may not achieve the desired results. In this study, we developed a novel method for predicting impending dengue fever outbreaks several weeks prior to their occurrence. By reversing moving approximate entropy algorithm and pattern recognition on time series compiled from the weekly case registry of the Center for Disease Control, Taiwan, 1998-2010, we compared the efficiencies of two patterns for predicting the outbreaks of dengue fever. The sensitivity of this method is 0.68, and the specificity is 0.54 using Pattern A to make predictions. Pattern B had a sensitivity of 0.90 and a specificity of 0.46. Patterns A and B make predictions 3.1 ± 2.2 weeks and 2.9 ± 2.4 weeks before outbreaks, respectively. Combined with pattern recognition, reversed moving approximate entropy algorithm on the time series built from weekly case registry is a promising tool for predicting the outbreaks of dengue fever.
| |
The SCALE initiative (European Smart and Lighthouse Cities Amplified) , launched in September 2020 as a support initiative and secretariat to all Horizon 2020 Smart Cities and Communities projects would like to present its Call for Experts.
SCALE is a city-led initiative that will provide large-scale, long-term support for the cities and projects involved in the H2020 SCC1 Lighthouse Group with 18 Lighthouse projects and 128 cities participating. SCALE will serve as a unifying element, networking and connecting all Smart CIty projects trying to improve the overall performance and enhance the significance of the Smart Cities and Communities Group by creating a supporting framework providing enhanced cooperation, design, communication, logistical support,consultations, and application of a stable governance approach.
The SCALE Call for Experts aims to gather and build a community of smart city experts ready and willing to provide advice and technical support to the Smart Cities Communities Group, maximize the impact of smart city solutions at the European level, and to support the European Commission and CINEA on smart city topics. Our aim is to keep the smart city family open and growing and create a community that will network and share, but also work on specific assignments.
How can you participate?
We are looking for skilled and motivated city professionals from all parts of Europe that would join us in two steps:
Why should you join the Call for Experts?
Members of this community will receive regular updates on specific calls to which they can apply for and submit their ideas, solutions or provide other relevant expertise and services.
Who is the Call for Experts for?
This call is open to experts from all parts of Europe who: | https://energy-cities.eu/the-scale-initiative-launched-the-call-for-experts/ |
Chris Evans on the Real-World Parallels and Character Changes of Captain America: Civil War
Captain America: Civil War is set to be a big turning point for the Marvel Cinematic Universe in 2016, with Earth’s mightiest heroes turning on each other. Comic fans may already know the gist of what’ll go down from past storylines, but Captain America himself, Chris Evans, has a bit of insight into what makes that story so compelling.
Speaking to Cineplex, Evans pointed out that we can relate to the movie’s two opposing sides pretty well, because it’s what we’re used to in real life:
There’s a great parallel that they draw between my character and Tony Stark. It’s something we can all relate to in terms of how we perceive our own society and culture, in terms of what is best for people. You can go right down to Democrat and Republican; everyone has a different opinion of what’s best.
To be honest, I think there’s a little more clear-cut right and wrong in that specific real life example than there is in a world of actual superheroes, but that’s a conversation for another time—I think Evans has a solid point. In Civil War, Captain America and Iron Man will face off over whether their heroics need government oversight. It’s easy to see Cap’s side (the side of heroes doing their thing because it’s what’s necessary for the greater good) as the “hero” side with Tony Stark and his allies as the “villains” in the movie, but if the story played out in the real world (where we don’t know all of these characters and what they’re up against inside and out) we might feel differently.
Maybe. He continued,
You have this team of people who are destroying every city they go to, but they’re saving the world. So it’s a matter of, “Do we monitor these people, or do we let them monitor themselves?” The beautiful thing with Civil War is that no one’s right and no one’s wrong; it’s just your personal opinion.
Evans also mentioned how that is reflected not only in the real world but in the characters in the film. Cap has been through the military and seen hierarchy and oversight, and it’s gone kind of badly for him over time. Meanwhile, Tony Stark has always been kind of a renegade, and especially after Ultron, he’s coming around to a different point of view.
That’s a lot of rather heavy material to get through for a movie that’s also packed to the brim with superheroes, but if anyone can handle it, it’s Captain America: The Winter Soldier’s Russo Bros.
(via CBR, image via Marvel Entertainment)
—Please make note of The Mary Sue’s general comment policy.—
Do you follow The Mary Sue on Twitter, Facebook, Tumblr, Pinterest, & Google +? | https://www.themarysue.com/chris-evans-on-civil-war/ |
Brandon’s take on the National Autism Strategy 2021
The long-awaited 2021 National Autism Strategy has been launched. Whilst this is a really important move in the right direction, there are still some uncertainties.
Government recognition
The Government has recognised ongoing health and social inequalities for people with autism, with many struggling to access healthcare, education and employment. In addition, almost 80% of autistic adults face mental health struggles. In 2019, the National Autistic Society found that two in three autistic people don’t get the support they need. This was disproportionately worsened by the pandemic with most autistic people reporting that they felt isolated.
For the first time since 2009 when the Autism Act was introduced, the Government has also recognised children in its plans.
The six themes of the strategy
- Improving understanding and acceptance of autism within society
- Improving autistic children and young people’s access to education, and supporting positive transitions into adulthood
- Supporting more autistic people into employment
- Tackling health and care inequalities for autistic people
- Building the right support in the community and supporting people in inpatient care
- Improving support within the criminal and youth justice systems
We’re pleased to see that there is a plan to provide funding for autism training and professional development in schools and colleges as well as mental health hospitals. According to a study in 2019, autistic children are much more likely to be bullied than other children. We also know that many autistic people are held in mental health facilities too long without access to specialist support, which has a serious and lasting impact.
Another key area is improving transitions into adulthood by promoting pathways to employment and supporting local areas to develop supported employment forums. Currently, only 22% of autistic people are in any kind of employment, despite being told by people we support, that most want to.
The Government has recognised that there is an urgent need to tackle health and care inequalities for autistic people. This includes reducing diagnosis waiting times and improving access to healthy living support.
Grand plans, but can they succeed?
Whilst the Government has committed £75 million for the first year of the plan, it hasn't outlined funding for the following years due to the planned spending review in the autumn.
Whilst this is the largest amount of money to ever have been committed to improving the lives of autistic people, the Government hasn’t yet shown the same commitment to social care. This means that services are unable to increase support for individuals, or provide the support that people with autism are asking for. As a result, there may be gaps in support and the strategy might not be successful. We will continue to support initiatives that campaign for better social care for all.
Some lasting thoughts
Sue Porto, Chief Executive, says: “We’re thrilled that some of the biggest challenges faced by autistic people of all ages are being recognised in the new strategy.
"For many people we support, access to education and work has been challenging, with many facing barriers to both. This has negatively impacted their confidence and it’s therefore very pleasing that these two areas have been recognised in the plan.
“We are hopeful that the funding will continue over the next five years and we’re also interested to see how this strategy will be reflected in the Prime Minister’s promise to fix social care.”
Mary, Quality Checker, says: "I am relieved to see that the government is planning to give more autism training to school and hospital staff and make jobs more easily accessible for us. This strategy should have been carried out years and years ago.
“I feel that the coronavirus lockdowns have improved everyone's understanding of autism. I hope the knowledge gained from the pandemic experience will be applied to the new strategy, so the world can be an easier place for us to live in."
Karen Lutz, Autism Specialist at Brandon, said: “It’s great news to see the autism strategy implementation plan listing the development of many key commitments. In every autism seminar I have attended, autistic people have said that they have been bullied at school and this has had a profound effect on their adult lives. I’m pleased to see this being recognised in the form of a new anti-bullying programme. | https://www.brandontrust.org/whats-happening/news/brandons-take-on-the-national-autism-strategy-2021/ |
There are 20,000 species of butterflies in the world, but only several dozen are found on the tundra of the North American Arctic. Many Arctic animals have warm, woolly coats, downy feathers, or thick layers of blubber, and Arctic butterflies appear fragile with their fluttering, delicate wings. Yet the hardy butterflies that live at the top of the world have many clever ways to keep themselves warm in cool summers and endure icy cold winters. In A Children’s Guide to Arctic Butterflies, young readers learn about twelve of the butterflies that call the Arctic home and how they survive on the tundra from one season to the next.
With a simple layout and easy-to-follow headings for each butterfly, this beautiful book is filled with fun, useful facts, including introductory material about the life cycle and anatomy of butterflies and how they begin life as caterpillars.
Step inside and journey North—you may even spot a familiar fluttering friend. While some of the butterflies found in A Children’s Guide to Arctic Butterflies are among the most northern of butterfly species, many can also be found south of the Arctic and in high, cold places around the world! | https://inhabitbooks.com/collections/all-languages/products/a-childrens-guide-to-arctic-butterflies |
Welcome to the curriculum and instruction page!
At Governor Mifflin we continually strive to improve our educational program to meet the needs of every learner. In doing so, we follow the requirements set forth by Pennsylvania to align our programs to the PA Core and Academic Standards while providing an engaging and challenging academic program with the use of quality classroom instruction based on effective instructional strategies from the Learning Focused Schools framework. The ultimate goal of our work is to prepare all students to become critical thinkers who are career and college ready.
The curriculum was completely aligned in the past few years to meet the requirements for the use of PA Core Standards, and the new standards were implemented for the first time in 2013-14.
As we continue with the implementation of the PA Core Standards we will see large shifts in expectation of skills and content – also in materials to be used with students (text complexity for all learners is just one example). The shifts will be seen in grade level expectations as some skills are expected at younger ages by at least one grade level than they were under the PA Academic Standards. There are things you can do to support your learner at home.
>> To view these shifts and learn how to help at home, click here for information. | https://www.governormifflinsd.org/curriculum/ |
Official URL: http://jrsdjournal.wixsite.com/humanities-cultural...
Abstract
Abstract: Implementation of the legal protection of intellectual property has become a central international attention, particularly in countries forward. Intellectual property has become the economic engine of the world in promoting economic growth and improving the welfare of the people's living standards. Application of the law has been used as a tool of economic development. Seriousness of government in the implementation of the law of intellectual property rights becoming one of the main aspects of the consideration for prospective foreign investors to invest in that country. This is understandable, because the issue of intellectual property rights, especially patents directly related to the technology. Law enforcement in the field of intellectual property rights is still weak in Indonesia, including the province of West Sumatra to be further improved in the future. West Sumatra region should be able to speak at national and even international level in terms of development and advancement of intellectual property rights. Keywords— Intellectual Property Right, Economic Development, Globalization. | http://repo.polinpdg.ac.id/575/ |
Displaying 1 - 8 of 8
New Delhi: The Department for Promotion of Industry and Internal Trade (DPIIT) on Wednesday notified the recent decisions to...
Wednesday, September 18, 2019 - 18:48
Of late many people have started using organic products, adopted an organic lifestyle, mindful of the health benefits. All this...
Tuesday, August 20, 2019 - 15:36
You can indulge in the goodness of fruits anytime of the day, any season. If you are looking for fruity beverages that offer...
Sunday, July 7, 2019 - 19:42
Pune: The Pune warehousing market clocked in 0.3 million sqm (3.5 million sq ft) absorption in 2018, 41 per cent year-on-year (y-...
Sunday, June 23, 2019 - 15:00
United Nations: Foreign Direct Investment (FDI) in India grew by 6 per cent to $42 billion last year, according to the UN...
Thursday, June 13, 2019 - 18:12
The relationship between women and jewellery is historical. Over the decades, there has been a huge shift in the choice of jewels...
Sunday, April 14, 2019 - 19:51
As the world stands on the brink of the Fourth Industrial Revolution, powered by a wide range of new technology breakthroughs...
Wednesday, November 14, 2018 - 11:33
PUNE: Centres like Bamboo Handicraft and Art Unit (BHAU) will be able to generate employment. And by establishing such centres,... | https://www.sakaltimes.com/search?f%5B0%5D=field_imported_functional_tags%3Ae-commerce&f%5B1%5D=field_imported_functional_tags%3Amanufacturing&search_api_views_fulltext=e-commerce |
Drawing from a diverse career in design and construction and decades of leadership and service to the Institute and profession, Neal Angrisano, AIA has a passion for the business aspects of practice along with advocacy for the role of architect in society.
As a Principal of TreanorHL, a national architecture practice with 150 associates and nine offices, Neal directs the firm’s technical, project execution, staff resources, educational, legal, and administrative aspects of practice. With a Bachelor of Architecture and a Master of Architecture in Management from the University of Kansas, Neal was also an adjunct professor at KU for many years teaching at the graduate level.
As an outspoken advocate for environmental stewardship, Neal has played a significant role in the genesis and implementation of several leading-edge sustainable buildings in the Kansas City area. His commitment to the AIA and the greater profession has included leadership roles in the USGBC, DBIA, president of both AIA Kansas and AIA Kansas City and longtime trustee for the Kansas and Kansas City Architectural Foundations. | http://www.aiacsrep.com/neal-angrisano.html |
Palmyra Atoll, a secluded national marine monument over a thousand miles south of Hawaii, is a quintessential tropical paradise: forests of a rare flowering tree cover the islands, which provide refuge to migrating seabirds and rare coconut crabs. A colorful healthy coral reef filled with fish lies beneath the waves that lap the shores.
The only human habitation on Palmyra is a small research station. The reefs are not polluted by sewage, runoff, or fishing. Nevertheless, Bigelow Laboratory researchers found evidence there of the global changes being driven by human activities.
Palmyra’s remote location, however, has offered it some protection, and the coral reefs surrounding it are among the healthiest remaining on the planet. These factors make it an ideal place for Price to study a fungal disease that afflicts an important reef-building organism called crustose coralline algae.
Tropical ecosystems worldwide have suffered catastrophic losses of these Pepto-Bismol pink seaweed and corals, which create the underlying calcified structure of reefs, and provide a complex habitat for countless species. Price is working with The Nature Conservancy, U.S. Fish and Wildlife Service, and U.S. Geological Survey National Wildlife Health Center to assess the impact the fungus has on the Palmyra reef ecosystem.
In particular, the researchers are investigating the relationship of this marine disease to two major global change phenomena: ocean warming and acidification. Scuba diving allows Price’s team to monitor the pink seaweed and fungus, and assess how they are responding to recent, dramatic changes in ocean temperature.
The team is also using laboratory experiments to examine how the pink seaweeds are likely to fare in the future. Price expects the acidified seawater will make the pink algal crusts more permeable to the pathogenic fungus, and more vulnerable to disease. The scientists simulated future ocean conditions in seawater aquariums with carbon dioxide bubbling through them, and observed how diseased specimens responded. They will analyze the results of those experiments in 2018.
Their initial field results have already shed new light on reef dynamics. One significant finding is that herbivorous fish, like parrotfish and surgeonfish, selectively feed on the fungus and limit its spread.
Back in Maine, the team is now working to genetically analyze the fungus. This will tell the researchers more about the organism, which they suspect hasn’t yet been formally studied and named. Even without this understanding, they have already gained new insights from the fungus in regard to climate change and marine disease. | https://www.bigelow.org/news/articles/2017-09-20.html |
Stimulating the economy by reforming government
A shorter French version of this article was published on LeMonde.fr on January 29, 2009.
In the last few weeks, it has been a struggle to follow the tens of billions or even hundreds of billions paraded each day in newspaper headlines. We have seen $787 billion approved in the US, €26 billion in France, €50 billion in Germany, and so on. But these successive plans fail to provide for solving the economy’s basic problem, namely the necessary restructuring of many activities. Rather than extravagant spending, restarting economic activity calls for a substantial drop both in taxes and in public spending.
In public debate, stimulating consumption is often presented as the fundamental issue. This is simply mistaken. The economy is suffering in reality from the overdose of credit it experienced over the last few years and from excessive expansion of certain activities. For years, lax monetary policy in the United States enabled many industries to borrow massively and to grow accordingly. New investment was made artificially profitable due to low interest rates. Sectors that benefited heavily from this easy credit enjoyed years of prosperity. They developed, and they hired. The real estate and automobile sectors, for instance, cashed in on the credit generously distributed to individuals by the banks, which in turn were encouraged to lend, due in particular to the existence of sanctions if they did not issue enough credit. U.S. monetary policy – followed, to a lesser degree, by the European Central Bank – allowed for the creation of an economic bubble.
But the wealth generated by sectors such as real estate was more apparent than real, based on a credit flow created without prior private savings. The progressive rise in U.S. Federal Reserve rates, from 1% to 4.5% between 2004 and 2006, led to the bursting of the bubble. The activities that most benefited from credit since 2000 were the first to suffer, relying for their profitability solely on credit. Real estate, especially in the United States, has seen numerous bankruptcies. The automobile sector is crumbling in the face of hardship. The Big Three U.S. automakers – General Motors, Chrysler and Ford – are near bankruptcy. The crisis later spread to the economy as a whole.
In this situation, stimulus plans have only limited effect and make great numbers of companies more vulnerable. These plans are financed by borrowing and reduce the quantity of savings available for business. Between 1 January 2008 and 1 January 2009, U.S. Government debt went from $9.210 trillion to $10.627 trillion, up by 15%, whereas it has grown « only » by 6% in 2006 and 2007. Everything governments borrow on the capital market is taken from the savings reserve that citizens seek to invest. By borrowing ever more, governments capture a portion of savings that then cannot go to large companies, which also seek to obtain financing through bond issues.
If the money for stimulus plans were not spent by governments, it would remain available to companies, which could then invest and hire. This is not the case, however, and the astronomical amounts now being borrowed by governments are drying up the capital market, pushing up interest rates and destabilizing the entire private sector.
Stimulus plans can thus be compared to a redistribution that benefits some companies to the detriment of many others. Rather than providing for the development of future-oriented activities, they keep unprofitable activities in place. They thereby slow a process required for recovery: the restructuring of many activities.
However is any attempt to hasten economic revival bound to fail? No, certain structural reforms can speed up the process of restructuring. What is needed is to free up real resources available to the private sector in the economy, which can be done only by reducing the public sector’s share.
In a country, the wealth created each year by the private sector is partly kept by those who produced it and partly collected and spent by government. In France, for example, public spending amounts to 52.7% of gross domestic product (GDP), compared to 43.8% in Germany and 37.8% in the United States. Lowering these rates, in other words increasing the share of GDP left in orivate hands, would free up billions of euros in the economy. For this to happen, obligatory deductions would have to be reduced. This would generate positive incentives to work, to engage in enterprise and to invest. This would end up stimulating both consumption and investment.
But tax cuts alone would not be enough, insofar as they are financed now by debt without there being more savings or real resources in the economy. A lowering of tax rates must necessarily be accompanied by at least an equivalent reduction in public spending. Companies could then shed part of the tax burden that weighs down their activity and could direct the resources freed up in this way to their most productive uses.
At a time of crisis, governments have a natural tendency to intervene more extensively. This, however, leads to a pitfall. However great the amounts committed, stimulus plans cannot turn an unprofitable activity into a profitable one. On the contrary, they make sectors that meet real demand more vulnerable. The best form of stimulus consists of a joint lowering of tax rates and public spending. Only in this way can activities on the verge of bankruptcy be restructured and growth sectors prosper.
Guillaume Vuillemey and Vincent Poncet are Researchers at the Institut économique Molinari. | https://www.institutmolinari.org/2009/02/19/stimulating-the-economy-by-reforming-government/ |
botnets as platforms for the attacks.
According to SecureWorks, 20.6 million attacks originated from
U.S. computers and 7.7 million from Chinese computers.
"It clearly shows that the United States and China have a
lot of vulnerable computers that have been compromised and are
being used as bots to launch cyberattacks," said Hunter King,
a security researcher at SecureWorks. "This should be a
warning to organizations and personal computer users that not only
are they putting their own computers and networks at risk by not
securing them, they are providing these cybercriminals with a
platform from which to compromise other computers."
The rest of the top 10 sources of attack traffic were:
Because the attacks can make use of address lists on compromised
computers, malicious code can appear to come from trusted sources,
which makes it difficult to screen e-mail traffic by address.
Computers can also be compromised by malicious code hosted on
legitimate Web sites and in third-party applications.
The ability of botnet activities to cross national borders
complicates the job of blocking hostile traffic, said Don Jackson,
director of threat intelligence at SecureWorks.
"The Georgia/Russia cyber conflict was a perfect example
of this," Jackson said. "Many of the Georgian
[information technology] staff members thought that by blocking
Russian IP addresses they would be able to protect their networks.
However, many of the Russian attacks were actually launched from IP
addresses in Turkey and the United States, so consequently they
were hit hard."
Hacking patterns in China appear to differ from those in other
countries, Jackson said. Although hackers still assemble
distributed networks of computers, they tend to use entire networks
they control with the help of insiders at schools, data centers and
companies. But the technique of wholesale compromise is not unique
to China, he added. "We also see many local hacker groups in
Japan and Poland compromise hosts within their own country to use
in cyberattacks, so the Chinese hackers are not alone in using
resources within their own borders."
In addition to keeping up-to-date with security protocols,
administrators can seek protection by using security services that
block traffic from known or suspected malicious sources. They can
also monitor outgoing network traffic to detect suspicious activity
from computers that have been compromised.
About the Author
William Jackson is the senior writer for Government Computer News (GCN.com).
Microsoft on Wednesday advised organizations using Active Directory to take a couple steps to protect against Kerberos resource-based constrained delegation relay attacks.
Your Active Directory isn't secure. Learn what to do to protect your users and be ready for the next attack.
Chipmaker Broadcom announced Thursday its plans to acquire virtualization pioneer and multicloud leader VMware for $61 billion in a landmark tech deal surpassed in value only by Dell's $67 billion acquisition of EMC in 2016 and Microsoft's $68.7 billion acquisition of Activision Blizzard earlier this year.
Microsoft announced a couple of Azure Active Directory security enhancements this week.
Meta, formerly known as "Facebook," is using the latest Azure virtual machines (VMs) with graphics processing unit (GPU) compute power for its "large-scale AI research workloads," Microsoft announced on Wednesday. | https://redmondmag.com/articles/2008/09/23/us-tops-list-as-source-for-botnet-attacks.aspx |
Where do the products come from?
Updated: Jul 26, 2020
We source from small producers of sustainable, eco-friendly and/or vegan products, which we love and want to share with our peers. Our aim is to support entrepreneurial brands that help save our planet and change the way we live our lives to be more sustainable.
Many of our partner brands share our values and beliefs, which is why we invited them to the Ethikal Lives community. We search for brands producing a range of products not just in one sector, to help all families find more eco-friendly, bio choices for their homes. | https://www.ethikallives.com/post/5-tips-to-promote-your-store-all-year-long |
COLUMBIA — Tim Wolfe's resignation as president of the University of Missouri System is not the end of the fight for social justice for student groups at MU.
At a rally Monday, Concerned Student 1950 member Jonathan Butler outlined additional requests to the ones issued in October to legislators and administrators .
Concerned Student 1950's initial list of demands, issued Oct. 20, seemed to directly influence the multiple initiatives released Monday by the UM System Board of Curators. Although some diversity issues were addressed, not all of the demands from Concerned Student 1950 and other activists were included.
Which Concerned Student 1950 demands were met:
Wolfe's departure, apology: Concerned Student 1950 asked for a formal apology from Wolfe and his resignation from office. His apology came last week, and he announced his immediate resignation Monday morning during the Board of Curators meeting.
Diversity training: The group demanded the creation and enforcement of mandatory racial awareness and inclusion curriculum throughout all MU departments for all students, faculty, staff and administration. The curators announced a plan to launch a diversity, inclusion and equity leadership training and development education program; this training, as outlined in a UM System news release, will include the Board of Curators, the UM System president and administrative leadership. For MU specifically, a mandatory diversity, inclusion and equity training will be implemented for all faculty, staff and future incoming students.
Hiring black faculty and staff: The curators announced additional support for hiring and retaining diverse faculty and staff, which could potentially meet Concerned Student 1950's demands for an increase in the percentage of black faculty and staff to 10 percent on a campuswide scale by the 2017-18 academic year.
Mental health: The group demanded the university increase funding and resources for mental health facilities such as the MU Counseling Center and mental health professionals, boost mental health outreach across campus, increase awareness of the counseling center and reduce wait times for prospective clients. The curators made reference to two changes regarding mental health: to provide additional support for students, faculty and staff who have experienced discrimination and disparate treatment — which will be addressed within 90 days — and to continue a review of mental health services.
Strategic long-term plan: The group demanded the composition of a strategic 10-year plan by May 1 that will increase retention rates for marginalized students, sustain diversity curriculum and training and promote a safer and more inclusive campus.
The curators said they will ensure that each UM System campus will have a chief diversity, inclusion and equity officer who will report to the chancellor. MU announced Monday that Chuck Henson, associate dean for academic affairs and trial practice in the MU School of Law, will be interim vice chancellor for inclusion, diversity and equity. MU's chief diversity officer, Noor Azizan-Gardner, was appointed to the position in 2012 and will report to Henson. The curators also announced the assessment of existing diversity and inclusion efforts on campus.
The curators also announced the creation of a similar officer who will preside over the UM System, a position that will be filled in the next 90 days, according to the release.
The curators also plan to create a diversity, inclusion and equity task force to develop both a short-term and long-term strategy for the UM System in an evaluation of current programs, policies and practices.
Some unaddressed demands listed by the group are:
- An amendment to UM System policies to involve the participation of students, faculty and staff in selecting a UM System president and MU chancellor.
- Most of the Legion of Black Collegians' demands presented to the university in 1969, including reorganization of hiring black staff and faculty, and a contingency fund to supplement salaries of potential black faculty and staff.
- The inclusion of students, staff and faculty of color in vetting, maintaining and overseeing diversity and inclusion training on campuses.
- More specific demands concerning mental health at MU.
- The timeline and specific details of a long-term strategic plan to promote diversity on campuses.
- The increase in funding, resources and personal for social justice centers at MU.
Unaddressed demands made by the Forum on Graduate Rights
After Wolfe's announcement, the Forum on Graduate Rights released a statement indicating members also believed the struggle was not over.
"A broad spectrum of student advocacy groups across campus must be included in the process to select a new President in a meaningful, empowered way," the statement from the Forum on Graduate Rights read. "We will continue to speak out and advocate for the rights of all marginalized groups on campus."
The curators' initiatives announced Monday, after Wolfe resigned and MU Chancellor R. Bowen Loftin said he would step down as chancellor, were directed at diversity issues on campus, but they did not address demands made by the Forum on Graduate Rights. Loftin guaranteed graduate student employees will receive health care on Oct. 14. An announcement was made Thursday reinstating full tuition waivers for graduate student with quarter-time assistantships for the 2016-17 school year.
Here are the unaddressed demands:
- A guarantee that no graduate student be paid at a rate below the individual poverty line regardless of their appointment status, department or college.
- A fully subsidized student health care plan for all graduate student employees that is guaranteed for the full term of their graduate student employment.
- Immediate action on the part of the university to ease the burden on international students caused by the loss of their health insurance subsidy.
- More, and affordable, university-sponsored graduate student housing.
- A return of affordable, on-campus, university-sponsored child care facilities for graduate students.
- A waiver of supplemental fees imposed by colleges, schools and departments for all graduate student employees.
Supervising editor is Elizabeth Brixey. | https://www.columbiamissourian.com/news/higher_education/um-curators-announcements-partially-meet-concerned-students-demands/article_f22146a8-8748-11e5-b4a0-7722a013c6b7.html |
FLAGSTAFF, Ariz. - The Flagstaff Police Department is pleased to announce the DARE program will be starting in FUSD selected elementary schools this semester and continue onto the rest of the fifth grades next semester.
Due to significant budget cuts, the police administration made the difficult decision to cut the DARE and Great Programs in order to maintain basic police services of officers responding to calls. Thanks to the mayor and city council's consideration during budget meetings this summer, the police department will be able to teach the DARE curriculum to all of Flagstaff's fifth grade students for the 2009-2010 school year.
The DARE curriculum is a comprehensive, 10-week program teaching fifth grade students about good decision making skills, peer pressure and the eight proven ways to say no to drugs and violence.
The department used the summer to analyze and research which programs would be best to serve the community. The department determined the DARE program is one of the top programs available to teach these skills to the elementary age group. The middle school and high school curriculums will be taking on a new look through a program called "Law Related Education" program or "LRE."
This program teaches middle school and high school students a variety of classes from the perspective of a law enforcement officer and drawing from his/her particular area of expertise. The students will also gain a practical understanding of the law and the legal system.
The Flagstaff Police Department is excited to be continuing their partnership in the classrooms with the Flagstaff Unified School District and their support of youth in the community for the 22nd consecutive year.
More like this story
Sign in to comment
Comments
Use the comment form below to begin a discussion about this content. | https://www.nhonews.com/news/2009/aug/26/flagstaff-pd-to-continue-dare-program-in-schools/ |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.