content
stringlengths 0
1.88M
| url
stringlengths 0
5.28k
|
---|---|
Hours & Location
700 Ocean Drive,
Miami Beach, FL 33139
(305) 532-1727
[email protected]
Dining
5:30-10pm Sunday-Thursday
5:30-11pm Friday-Saturday
Happy Hour
5:30-7pm
Dress Code
Resort Casual
Jacket and tie not required
Shorts accepted but not preferred
No cut off shorts or sleeveless shirts for men.
Parking
There is street parking and a public parking garage located on 7th Street between Washington and Collins Avenue. Please note, Ocean Drive is currently closed to vehicles. | https://www.afishcalledavalon.com/location/a-fish-called-avalon/ |
The Volume of Concrete in a Slab calculator computes the volume of concrete in a rectangle (square) slab. The value is function of the surface area (length * width), and the depth.
INSTRUCTIONS: Choose units and enter the following:
Volume of Concrete (V): The calculator returns:
However, these can be automatically changed to compatible units via the pull-down menu.
The Volume of Concrete in a Slab calculator compute the volume (3 dimensional space) of a concrete slab through the following equation:
V = L ⋅ W ⋅ D
where:
The calculator converts the parameters into feet and computes the volume in cubic feet. It then uses the cubic feet to return volume in cubic yards for bulk concrete delivery, and divides it by the volume of the different sizes of concrete in bags. The most common are 40lb, 60lb and 80lb bags. | https://www.vcalc.com/wiki/KurtHeckman/slab+-+volume?var-BagSize=SYSTEM |
Young artists’ role in promotion of Pashto music highlighted
MINGORA: Young writers, poets and cultural activists said here on Saturday that young and educated artists played vital role in promotion of Pashto music by introducing modern pop music genres in it.
They were speaking at the launching ceremony of a new Pashto song ‘Ashna’ sung by an emerging young singer Shahab Shaheen, written by Prof Afzal Khan and released by Zulfan Band.
The ceremony was organised by Nariwal Adabi Taroon and ICA Swat. Poets and writers, including Abdur Rahim Roghaney, Hanif Qais, Riaz Ahmad Hairan, Sirajuddin Siraj, Ali Khan Umeed, Tahir Bostan and Samiullah Gran, were among the participants besides a number of young poets and writers.
The speakers said that Pashto entertainment industry was lifted by youngsters in which talented youth introduced modern beats to the traditional folk music.
They praised Mr Shaheen for promoting Pashto music by selecting quality poetry.
“We are glad that young, educated youth have started entering the music industry not only in Swat, but also in other parts of Khyber Pakhtunkhwa. Shahab Shaheen is one of them who introduced new style of Pashto music,” said Riaz Ahmad Hairan, a poet in Swat.
Girls were also among the participants and said they loved Shaheen’s music as it represented Pashtun youth in a modern and peaceful style.
“We want such positive activities here in Swat because our youth need encouragement,” Hajra Ali, a student and one of the hosts of the ceremony, told this scribe.
Another young boy Shahzad Ahmad said that Shaheen was the representative of youth in Swat involved in cultural activities.
Mr Shaheen said that it was his ninth song which he filmed to introduce Pashto music in Lahore and launched it in Swat.
“We want to show to the world that Pashtun youth is educated, peaceful and culture -loving who want peace and harmony in the world,” he said. | https://www.dawn.com/news/1459964/young-artists-role-in-promotion-of-pashto-music-highlighted |
Transparency is a big buzzword in today’s law enforcement debates. The Gloucester County Prosecutor’s Office took another step toward transparency by holding a town-hall style meeting on officer-involved shootings on May 15 at Rowan College at Gloucester County.
The meeting was set up by the 21/21 project, is a new initiative put in place by Attorney General Gurbir S. Grewal.
Last Tuesday’s meeting was hosted by Gloucester County Prosecutor’s Office First Assistant Prosecutor Paul Colangelo, Sgt. Stacie Lick of the Special Investigations Unit, and Det. Bryn Wilden of the Special Investigations Unit of the Gloucester County Prosecutor’s Office.
1. Comprehensive, rigorous, impartial investigation. This is the effort and time an investigation of a police-shooting involves.
2. Integrity of ongoing investigation and rights of the accused. Confidentiality is key in this stage.
3. Mandatory review of all actual and potential conflicts of interest. Think about who is involved and whom they know.
4. Multi-tiered layers of independent review. This stage determines who reviews the investigation and when it will take place.
5. Uniformity and statewide investigation legal practice and grand-jury practice. These directives give rules to follow.
6. Transparency of the process through factual findings and appropriate junctures. This stage decides when and how much information can be released to the public.
7. Ongoing allegation study. This is the stage where the investigators reach out to the community.
Lick went on to describe what it’s like to investigate a case. Investigators review witnesses, both officers and people on the scene. She stressed this can be time consuming due to scheduling conflicts and, in some cases, the public not wanting to cooperate with the investigation. She also mentioned they will review video surveillance, whether it’s from a street camera or the body camera on an officer.
The investigation doesn’t stop there. Lick rattled off a handful of other things that are taken into consideration.
She ended her segment by saying they cannot share information with witnesses or officers. “They can’t know anything that’s going on in the investigation because it may affect their statement and contaminate their record,” she said.
Wilden addressed the room on when body-camera footage can be released.
The county prosecutor or the director of the Division of Criminal Justice determines the completeness of an investigation. They will determine when it is appropriate to release the body-camera footage.
Wilden added the body-camera footage can be kept confidential in the event of a subject using force against a police officer. A police officer can make that request as well, but the county prosecutor will deliberate the request.
For more information about the 21/21 Project and future seminars go to nj.gov/oag/2121 or call (609) 292–4925. | https://thesunpapers.com/2018/05/20/gloucester-county-prosecutors-office-presented-a-seminar-to-increase-transparency-2/ |
In politics, truthfulness is a virtue -- except where it matters most.
As children, we all heard the story of George Washington and the cherry tree. The rambunctious young George, age 6, was playing with his new hatchet when he decided to do a number on the family's backyard tree. When confronted about this act of vandalism by his father -- who apparently didn't have the foresight to predict that giving a 6-year-old a hatchet might result in some destruction -- George immediately fessed up. "I cannot tell a lie," he said. Instead of delivering the vigorous beating an 18th-century lad might expect, Washington's father praised the future president for his honesty.
The incident never actually happened; it was the invention of the early Washington biographer known as Parson Weems. But 210 years after Weems' biography appeared, the tale is still valued for its lesson: The integrity and fortitude that made Washington the "father of our country" can be witnessed in his unshakeable commitment to the truth, even at such a tender age. Oh, that all our leaders might live up to Washington's standard!
Today, we continue to believe that we can predict whether politicians will perform well or poorly in government by whether we perceive them to be "honest." This seems like a reasonable enough basis on which to judge them, particularly given alternative metrics like which candidate you'd like to have a beer with or which has less political experience and can therefore declare herself "not a politician."
The problem is that we have a rather unusual set of unspoken rules that we apply -- or that the press applies on our behalf -- to determine which lies matter and which don't, which are so consequential -- and so indicative of something dark and dangerous lurking within the politician's heart -- as to disqualify one from office, and which can be ignored because "everybody says that sort of thing."
The latest candidate to run afoul of these rules is Delaware Republican Senate nominee Christine O'Donnell, who, despite (or perhaps because of) her refusal to talk to non-conservative media outlets, continues to provide ample material for our amusement. O'Donnell appears to have generously padded her resumé, particularly in the area of her educational accomplishments, claiming to have graduated from one institution when she hadn't and to have attended other institutions when she hadn't (see here for more details). Her dishonesty rings interesting hypocrisy bells -- the anti-elitist desperate to get elite cred, the candidate who claimed her commitment to truth was so fervent she wouldn't lie to the Nazis if she were harboring Jews is now caught lying about something far less consequential. But it gives us the opportunity to highlight the rules of lying in American politics and to ask whether they're serving us well.
The first rule is that lying about yourself is worse than lying about your opponent. Candidates routinely fib about their opponents' records and histories with little notice. Perhaps it's because reporters presume that in the rough-and-tumble of a campaign, a certain degree of hyperbole is to be expected and therefore can't be judged too harshly. If you claim, though, to have done something you haven't, reporters will usually be all over you. Look at what happened to O'Donnell's fellow Senate candidates Mark Kirk in Illinois, who was caught inflating his military record in multiple ways, and Richard Blumenthal of Connecticut, who said at various times that he had served "in" Vietnam when really he had served "during" Vietnam. This is the kind of lie reporters find outrageous -- when candidates make themselves look more heroic or accomplished than they actually are. A lie about your opponent may draw attention, but the discussion will be about whether the attack was out of line; in other words, what you did. A lie about yourself, on the other hand, will spur a discussion about who you are.
Which leads to the second rule: Lying about personal matters is worse than lying about policy. That may be because reporters think policy is less important than "character," but whatever the cause, candidates can, with few exceptions, get away with murder when it comes to policy. O'Donnell herself has benefited from this double standard; lots of people heard about her comments about witchcraft, but nearly no one knows that she revived the claim that the Affordable Care Act will create "death panels" -- perhaps the most despicable lie to have coursed through our political bloodstream in recent years.
The problem is that the kind of lie candidates get in trouble for -- like claiming a military honor they never got -- doesn't really have an analogue to the performance of official duties. If a politician lies about policy when he's a candidate, on the other hand, it's a pretty good indicator that he'll lie about policy when he's in office. That does matter.
Unfortunately, the supposed consequences of a liar sneaking through an election are seldom discussed in any detail, so we don't often learn why we're supposed to be afraid of the dishonest candidate. The line we always hear when these lies are exposed is that the dishonesty "raises questions" about the candidate, but we almost never hear exactly what those questions are.
The underlying reason, however, that dishonesty is supposed to matter is that it offers some kind of meaningful prediction about the candidate's performance should the candidate win office. For instance, when a candidate is found to have cheated on his wife, people often say, "If he'll lie to her, how do we know he won't lie to the country?" This kind of thing was often said about Bill Clinton. Once Clinton actually took office, we found that his pre-presidential failings as a husband accurately predicted that as president he would fail as a husband. What effect, though, did that have on his efforts on the economy or foreign policy or anything else? On the other hand, in 2000, George W. Bush told a great many lies on matters like taxes and health care, which foreshadowed quite well the ways he would endeavor to deceive the public on those topics and others. His campaign of deception leading up to the Iraq War is well remembered; perhaps less so is the parade of prevarication that preceded the passages of his tax cuts. Yet no one said in 2000, "Well, if he's willing to lie about his tax plan, how do we know he won't cheat on the country?"
None of us wants politicians to lie to us. If we're going to put honesty near the top of the list of qualities we want in our leaders, though, we should understand why we're doing so and which kinds of lies are the ones we should get angriest about. Resumé-padding and extra-marital affairs shouldn't just be dismissed; they might indeed reveal the kind of character defect that should be disqualifying. But if you really want to know whether a candidate is going to betray you once in office, watch what he or she is saying about policy. | https://prospect.org/article/truth-about-lies-0 |
Shahpaska-Dudziak: MLSP and UN continue enhanced cooperation in social policy field
Minister of Labor and Social Policy Jagoda Shahpaska and UN Resident Coordinator in the Republic of North Macedonia, Rossana Dudziak discussed Friday the ongoing bilateral projects and future cooperation towards implementing even better social policies, enhancement of workers' rights and protection of human rights.
Skopje, 11 September 2020 (MIA) – Minister of Labor and Social Policy Jagoda Shahpaska and UN Resident Coordinator in the Republic of North Macedonia, Rossana Dudziak discussed Friday the ongoing bilateral projects and future cooperation towards implementing even better social policies, enhancement of workers’ rights and protection of human rights.
“Today, we no longer have children up to 18 years of age in institutions. They are cared for in small group homes or foster families. Every citizen deserves decent living conditions. Fifty percent of the persons with special needs are already in the de-institutionalization process, for the purpose of their better integration in the community. This is in the focus of the cooperation of the Ministry with UNDP and UNICEF,” said Minister Shahpaska.
The coming period will focus on the new Law on Labor Relations, which should contribute to the enhancement of workers’ rights.
Shahpaska also thanked UNDP, UNFPA, UN Women for their assistance during the COVID-19 crisis in distributing hygiene and food sets for vulnerable groups, single mothers, domestic violence victims.
Interlocutors expressed their commitment to further strengthened cooperation with UN agencies in the fields of the ministry’s jurisdiction.
This material may not be stored, published, broadcast, rewritten or redistributed in any form, except with the prior express permission of Media Information Agency. Every intrusion and abuse of MIA website is penalized in line with Articles 251 and 251a of the Criminal Code of the Republic of North Macedonia. Legal consultant and representative: Lawyer Slagjana Serafimova. | |
The transportation and logistics industry is confronting immense change: digital transformation, new market entrants, changing customer expectations, and new evolving business models. If you want to remain competitive, now is the time for action.
Our experts offer insights, guidance and solutions to address the complex needs of this sector. More than 5,800 people at PwC are specialised on the transportation and logistics industry and its sub-sectors.
Airlines & airports
Logistics & post
Rail & roads
Shipping & ports
What does the future hold for the transportation & logistics industry? How will business models be disrupted? Who’s driving change? What are the opportunities? What are the key technologies? Find out …
When humanity and technology hit the road
Visit our Smart Mobility Hub - an essential resource for the latest perspectives that define our collective mobility challenges and help find the smartest solutions.
From cities and urban infrastructure, to automation and impending regulatory hurdles, we’re ensuring the next stop is a new beginning for all. | http://benefitrealise.org/transportation-logistics.html |
We recognize there has been a period of elevated volatility in the early part of 2014, but we are quite excited about the opportunities we think the rest of the year will bring. Our team has spent quite a bit of time this year on the ground in a number of countries, evaluating and challenging some of the reasons behind that volatility.
The first quarter of 2014 was somewhat similar to what we saw in the second quarter of 2013. The volatility has largely centered around Fed tapering, developments in some emerging market countries, and fears about slowing growth in China. And, in many ways, those factors are actually interrelated. We have seen the stronger countries recover very quickly, so we think
we have already started to see that trend reverse. Ultimately, it is fundamentals that will drive long-term returns, so we’ve been selecting various countries that we believe have good long-term potential based on their individual fundamentals, including good current account balances, appropriate monetary policy and strong growth prospects. A common question we have heard from clients during our visit to Tokyo is similar to what we have heard in Europe and in the United States: Investors are asking how they can better manage their bond portfolios in an environment where interest rates are moving higher. Our approach today is to position very defensively with regard to interest rates; we are actively allocating across different currency markets to potentially generate positive returns in an environment where interest rates go up. We believe it absolutely necessitates being active, and it absolutely necessitates being global. We are looking for opportunities to earn a decent yield without taking a lot of interest rate risk. And we think countries like South Korea and Mexico, with strong underlying fundamentals, are places that may offer a solid and positive real yield without taking a lot of interest rate exposure. Japan’s Liquidity Pump Japan is actually one of the most important places to be in, and focus on, to understand the global impact of the US Federal Reserve’s (Fed) tapering of its asset purchase program in a global context. Even though the Fed has started to taper, at the same time, the Bank of Japan (BOJ) is embarking upon a massive amount of quantitative easing. So while the Fed will not likely print an additional trillion dollars, the BOJ is in the process of printing the equivalent of an additional trillion-plus US dollars. Given BOJ policy, I think the amount of global liquidity should be adequate to support capital flows across the global economy and maintain the global recovery that’s underway. We have a pretty clear idea that the Fed will be tapering; that it will be backing off of excessively easy policy. That being the case, we are not particularly concerned that Fed tapering is going to create a global crisis, especially since the BOJ appears to be moving to offset the Fed’s reductions. Given this dynamic, we expect the Japanese yen to depreciate, and the yen versus the dollar is one of the areas where we’re seeking to add alpha. One of the core components of our currency strategy is long the US dollar, short the Japanese yen. Emerging Markets: Not All the Same Looking at emerging markets, I think the important thing to understand is they are not uniform. What is happening in a country like Turkey is completely different than a country like South Korea. The dynamics that drove some concern in places like Turkey—such as current account deficits, fiscal deficits, monetary policy that was inappropriate—are not representative of the entire asset class. Many countries, including Malaysia, Hungary, Poland and Mexico, in our view, are well positioned to deal with any changes in Fed policy, given strong current account positions, solid growth, and monetary policy that is proactive and ahead of the curve. As such, we viewed the market volatility over the last couple of months as an opportunity to take advantage of the fact that the market was not differentiating based on fundamentals and was treating the entire emerging markets asset class uniformly. As a result, we were able to exploit some of the market panic and feel that we are well positioned to take advantage of the dynamics going forward. China: The Distinction between Quality and Quantity of Growth Recent growth estimates coming out of China are pointing toward deceleration this year. However, there’s a big difference between deceleration in growth in and of itself, and a moderation in growth in China based on a healthy dynamic of better quality of growth. In our travels to China, we were asking two questions. First, can China sustain a 7% to 7.5% growth rate? And second, are the problems in the shadow banking system likely to lead to a systemic crisis within the broader context of China’s economy? We came away reaffirming our view that China can, indeed, maintain a 7% to 7.5% growth rate, and while issues in certain sectors of the Chinese banking system are problematic, the scale of those relative to the entire economy appears quite manageable. The real support factor in China’s growth going forward is that domestic demand is being driven by higher wage growth. The impact of the one-child policy put in place decades ago is now moving into the working-age demographic. Right around the early 2000 period, China crossed a tipping point where it went from an excess capacity of labor to a shortage of labor. And any time one runs into a shortage of something, the price goes up, and what we’ve seen is a dramatic pickup of wage growth in China. Stronger wage growth is, in turn, providing a core anchor of increased consumption in China, and we think that consumption growth will make up anywhere from two-thirds to three-quarters of China’s total growth. We think this dynamic should be sustainable and can provide an important foundation for China to be able to achieve a 7% to 7.5% growth rate. Investment levels in China will clearly moderate over the course of the next decade or so, in our view, but there is still underlying need for investment. In particular, we think the urbanization process in China is probably only halfway complete, and it involves moving tens of millions of people from the rural sector to the urban sector. President Xi Jinping’s recent reforms have facilitated that mobilization of labor, which is going to require a tremendous amount of investment, in everything from schools to sewage to water purification to subway systems to housing. That investment, we believe, will support China’s growth.
We are encouraged that the reforms are improving the quality of growth in China, even albeit at a lower quantity of growth perhaps than in the past. And lastly, we are very encouraged by the reform agenda. The political reform, the economic reform, by President Xi is potentially going to be one of the most transformational periods of reform since the era of Deng Xiaoping, and President Xi’s efforts to fight corruption and modernize the economy are encouraging. So far, they seem to be on track to succeed. So in sum, this period of volatility that we’ve seen over the last several months is not different from periods we’ve seen over the past several years. It has been characterized by panic, and it has been characterized by lack of understanding of the differentiation between countries. And we are doing what we’ve always done, which is to go out to these countries, understand the underlying fundamentals and exploit these periods of panic. As we look into 2014, we are excited about the potential opportunities in many countries around the world. Michael Hasenstab’s comments, opinions and analyses are for informational purposes only and should not be considered individual investment advice or recommendations to invest in any security or to adopt any investment strategy. Because market and economic conditions are subject to rapid change, comments, opinions and analyses are rendered as of the date of the posting and may change without notice. The material is not intended as a complete analysis of every material fact regarding any country, region, market, industry, investment or strategy. For timely investing tidbits, follow us on Twitter @FTI_Global and on LinkedIn. What are the Risks? All investments involve risks, including possible loss of principal. The value of investments can go down as well as up, and investors may not get back the full amount invested. Generally, those offering the potential for higher returns are accompanied by a higher degree of risk. Bond prices generally move in the opposite direction of interest rates. Thus, as prices of bonds in an investment portfolio adjust to a rise in interest rates, the value of the portfolio may decline. Special risks are associated with foreign investing, including currency fluctuations, economic instability and political developments. Investments in emerging markets, of which frontier markets are a subset, involve heightened risks related to the same factors, in addition to those associated with their relatively small size, lesser liquidity and lack of established legal, political, business and social frameworks to support securities markets. Because these frameworks are typically even less developed in frontier markets, as well as various factors including the increased potential for extreme price volatility, illiquidity, trade barriers and exchange controls, the risks associated with emerging markets are magnified in frontier markets. | https://global.beyondbullsandbears.com/2014/04/22/hasenstab-separating-wheat-chaff/ |
Statues of officials, priests and nobles help complete the vision of part of the complex and varied society that existed under the pharaohs.
Egypt was one of the oldest models of a state in humanity. Centred on the figure of the pharaoh, the the model of the State operated based on a strict division of basic functions (administrative, religious and military) and the existence of a large number of strictly prioritised positions.
The role of the vizier, or prime minister, was to ensure compliance with the will of the King throughout Egypt. Supervisors of the king, nomarchs (or provincial governors) and other high priests and military figures also had great power and influence.
Real armies of officials and writers made up the majority of the state bureaucratic apparatus. Artisans, peasants and soldiers, under the organisation and direct orders of their administrators, were responsible for the production, maintenance and protection of the essence of their civilisation.
Cartonnage belonging to the Lady of the House Djed-Montu-iues-ankh (Montu has said that long shall she live), the wife of Pamiu (the cat). The Third Intermediate Period, 22nd Dynasty (945-715 B.C.).
From the Middle Kingdom onwards, the title of Lady of the House was one of the most common titles used to refer to women of the elite. In noble households, the Lady of the House was responsible for most domestic activities such as making bread and beer, cooking, weaving, sorting grain, looking after the animals and artisanal production. Their cartonnage features representations of a number of protector divinities, as well as the hieroglyphic texts that set out a characteristic form for petitioning offerings and provide her name and the name of her husband.
Statue of a noble. The Old Kingdom, 6th Dynasty (2323-2150 B.C.).
These works, which are of high technical quality, were incorporated into the tombs as material representations of their owner. They could be on their own of form part of scenes of everyday life, in which they usually appear as supervisors of various works.
Statue of the Guard of the Room and Inspector of the Gardens of Amon, also known as Amenhotep. Sandstone. 18th Dynasty (1550-1307 B.C.).
Amenhotep, kneeling, holds a stele with a hymn addressed to Re-Haractes. Behind him, another stele has a hymn addressed to Osiris and to Amon. Such statues were located in an open niche above the door of the private tebana tombs.
Cube statue of Huy. Limestone. 19th Dynasty (1307-1196 B.C.).
A beautiful and complete representation of Huy, whose titles are unknown. It is a highly emotive piece: the hieroglyphic texts indicate with the expressive phrase “... Of his son, which shall ensure that his name lives on...” which was dedicated by a son (the scribe Huy) to his deceased father. In addition, the platform bears the name of another son, the scribe Iny. | https://www.museuegipci.com/en/the-collection/positions-and-characters/ |
This article was written and contributed by Sathish Ravichandran, Machine Learning Engineer on June 24, 2019
Most manufacturers today realize the critical importance of collecting equipment data to improve their operations. From better understanding machine performance to finding inconsistencies in the production line, data is often the start to solving many manufacturing woes. In addition, the availability of data in an industrial setting opens the door for use of emerging technologies such as IoT and machine learning which can deliver next-level asset optimization.
However, not every business has pools of data to draw from right out of the gate. Luckily for them, there are ways to introduce new technologies into their operations regardless of the amount of data available – even if the answer is zero. In fact, there are varying levels of machine learning maturity that can help manufacturers achieve their asset optimization goals, starting with rules engines (minimal, or no data) and ending with deep learning (complex, built-out data sets). Let’s take a look at these stages in a little more detail:
Stage #1: Just Beginning the Data Journey
Manufacturers just starting out rarely have the data they need to analyze their operations and leverage machine learning in a meaningful way – or so they think. While they can’t quite jump ahead to more complex machine learning systems, such as deep learning, they can apply rules engines to translate analytical insights into actionable logic.
Rules engines pair machine learning with the institutional knowledge of subject matter experts (SMEs) to create logic and automate actions based on first-hand insights, making them a great fit for inventory optimization. Once an SME has determined the desired outcome for the engine and written specific rules, the engine uses an ‘if this, then that’ function to execute the appropriate actions when specific conditions arise.
With IoT-enabled assets, businesses can integrate data from their supply chain to forecast demand and ensure they right-size the quantities of raw materials on hand. Then, through rules-based actions, they can automatically pre-order the precise amount of material needed for future production.For example, a window manufacturer could use the IoT and supply chain data to forecast the exact amount of glass needed for the window units it will produce each month. This level of accuracy helps them avoid ordering too much inventory, which can increase the cost of storage, and ordering too little inventory, which can result in production holdups.
Another example might be an LED lamp manufacturer: they need to have LED chips, epoxy resin, wire and more. With too little wire, they won’t be able to produce the number of lamps they need to meet customer demand. Yet, with too much wire, they will need to warehouse the surplus amount until they need it.
Stage #2: Big Data and Analysis
After several months, manufacturers will have collected enough data to progress beyond rules engines to something much more scalable: machine learning. This method of data analysis allows software applications to become more accurate in predicting outcomes without being explicitly programmed. Through machine learning, manufacturers can more easily achieve their yield optimization goals. But first, they must establish a well-defined problem to solve and ensure they have relevant historical data sets (which is why this stage occurs after they’ve collected more data), so the machine can compare new data to the old data and arrive at a solution.
Businesses use machine learning to analyze a combination of on-site sensor data from equipment and external and historical data to forecast the maximum number of products they can produce while still ensuring output quality remains high. For example, a manufacturer of electric bicycles might leverage IoT data to determine the productivity of machines, while also turning to external data to determine the popularity of models, and as a result, the demand of each bicycle. With this information, the manufacturer could produce the number and type of bicycles required to meet customer demands without over producing any of the models across its lines.
Stage #3: Years of Collected Data Provides Greatest Insight
Finally, manufacturers that have been collecting data for years and have a mature enough data set can layer deep learning into their operations for more insight and achievements like optimized quality. Deep learning is a machine learning technique that businesses use to teach artificial neural networks to learn by example. In deep learning, a computer model learns to perform tasks directly from images, text, or sound, with the aim of exceeding human-level accuracy.
Businesses can use deep learning to detect imperfections in their operations. By training neural networks to recognize the difference between unblemished and defective images, they can become aware of even the most minor imperfections that would otherwise be missed by the human eye. For example, a wine bottling operator might teach the system what a perfect wine bottle looks like, so that it can detect anomalies that don’t match the spec, such as the label falling ever so slightly outside the approved label area. Once flagged, production managers can decide if it the imperfect bottle is okay to process and ship to customers.
In another example, a car manufacturer may require holes placed two and a half centimeters from the edge of a car door. If these holes are misplaced, additional door components will be affected down the assembly line, such as the screw that will be drilled in. If the machine is trained to distinguish what a perfect car door looks like, then it can detect anomalies in production. Over time, these businesses can begin to identify and analyze error patterns to make improvements upstream and create a more consistent product.
There is no more avoiding it: data has become essential to optimizing manufacturing processes and staying competitive. While the argument “I don’t have enough data to utilize these new technologies” may have been suitable in the past, it is no longer a valid response with the various levels of adoption available. Instead of accepting the costs of underperforming assets, manufacturers can leverage the data they do have (no matter how little or how much), along with IoT and machine learning, to identify the characteristics of machines operating at peak efficiency. They can then apply those traits to subpar equipment for lower total cost of ownership and better return on assets.
Collected at: https://www.engineering.com/AdvancedManufacturing/ArticleID/19294/The-3-Stages-of-Machine-Learning-in-IoT-Enabled-Asset-Optimization.aspx?utm_source=engineering.com&utm_campaign=72b5313773-EMAIL_CAMPAIGN_7_12_2018_8_42_COPY_01&utm_medium=email&utm_term=0_622b2cc90f-72b5313773-323001813
20 thoughts on “The 3 Stages of Machine Learning in IoT-Enabled Asset Optimization”
-
I couldn’t resist commenting. Perfectly written!
-
hello!,I really like your writing so much! proportion we communicate extra about your article on AOL?
I need a specialist in this house to unravel
my problem. May be that’s you! Taking a look ahead to peer you.
-
Hi my friend! I want to say that this post is amazing, great written and come with approximately all important infos.
I’d like to see extra posts like this.
-
Hello my loved one! I want to say that this
article is amazing, nice written and include approximately all important
infos. I would like to look extra posts like this.
-
I will immediately clutch your rss feed as I can’t in finding your e-mail subscription link or e-newsletter service.
Do you’ve any? Please let me recognise so that I may just subscribe.
Thanks.
-
Well I really enjoyed studying it. This post provided by you
is very effective for proper planning.
-
Well I definitely liked studying it. This article procured by you is very constructive
for accurate planning.
-
Great beat ! I would like to apprentice while you amend your web site, how could i subscribe for a
blog web site? The account aided me a acceptable deal.
I had been a little bit acquainted of this your broadcast offered bright clear idea
-
I constantly spent my half an hour to read this website’s content all the time along with a cup of coffee.
-
Nota común a este grupo.- Este grupo comprende los productos residuales de la extracción de aceite de oliva. Epígrafe 412.3.- Refinado, hidrogenación, envasado y otros tratamientos similares de cuerpos grasos vegetales y animales. Nota: Este epígrafe comprende el sacrificio y obtención de carnes y despojos frescos, refrigerados congelados de ganado bovino, caprino, porcino, ovino y conejos, equino, volatería, caza, etc., en todo tipo de mataderos autorizados. Se incluye en este epígrafe la obtención en mataderos de pieles y cueros en sangre salados, crines, pelos y otros subproductos (plumas, picos, huesos, tripas, vejigas, tendones, sangre, etc.); así como las salas de despiece y de frío anejas a los mataderos.
-
I was curious if you ever considered changing the structure of your blog? Its very well written; I love what youve got to say. But maybe you could a little more in the way of content so people could connect with it better. Youve got an awful lot of text for only having one or 2 images. Maybe you could space it out better?
-
Awesome post. That was helpful
-
Wonderful blog! I found it while surfing around on Yahoo News.
Do you have any suggestions on how to get listed in Yahoo News?
I’ve been trying for a while but I never seem to get there!
Thank you
-
Hi i am kavin, its my first occasion to commenting anyplace, when i read this article i thought i could also create comment due to this sensible paragraph.
-
I cannot thank you enough for the blog post.Much thanks again. Want more.
-
Enjoyed every bit of your post.Really looking forward to read more. | https://longdnguyen.com/the-3-stages-of-machine-learning-in-iot-enabled-asset-optimization/ |
Career path following Life path
There’s more to finding your dream job than simply figuring out what you love and doing it. Career development or career change requires a long-term view, patience and commitment. Unfortunately, many people fail in a particular career path because they gave up too soon. Also, the starting point for many individuals is what kind of job I would love to have, rather than asking themselves and have a clear answer to what kind of life they want to have. Then, afterward, tailor the job they need that would fit their life.
Accordingly, I suggest a short list of questions to start the process of exploring your career path that includes:
- Ask yourself what kind of life you want to have.
- Figure out the work that can fulfill such life and consider all factors that are important to you.
- Make a list of what you love is only a starting point and may not yield an obvious career choice.
- Then ask yourself, why do I love what I love? What are the underlying characteristics is what allows you to identify potential paths.
Many clients come to my practice and say I would like to do X or to do Y without knowing and understanding what it takes to get to that point. I always recommend starting by knowing who you are and where you are. This is why our starting point is self-knowledge. So it makes sense to begin with a personal SWOT analysis. SWOT is an assessment tool that originally was created for organizational analysis, but many now applies it to individuals, while turning the lens on ourselves. SWOT stands for Strengths, Weaknesses, current Opportunities, and a determination of what situations in our life are bringing out the worst in us, both professionally and personally (Threats).
Successful career path starts by defining who you and knowing where you want to be. Then, the SWOT analysis can show you if your goals are realistic and within that what it takes for you to achieve your goals. Then one need to realize the cost involved in committing to one path. For example, do you need to gain education or go back to school?, do you need to scarify your current income?, and what about relocation, or family etc. Suddenly, many questions appear to be relevant. But ultimately, all these questions needed to be considered and while understanding the consequences of each decision. When making the decision and realizing the change you want to make, then figure out the track you would take from your present position to where you want to be and create a gradual path that would lead you to your destiny. | https://www.spiral2grow.com/2010/10/12/career-path-following-life-path/ |
More than 40 athletes are expected to attend international training camps ahead of this summer’s Commonwealth Games in Glasgow. Tanzania is also hoping to send some Paralympic athletes to Glasgow, but there are difficulties in getting the disabled athletes properly classified locally and hence participation is in doubt (www.ippmedia.com).
Disabled tennis
We are often astounded by the talent and determination of disabled sportspeople, and Tanzania has its own stories of inspiration. The charity Friends of Children of Tanzania, which helps people with disabilities to excel and express themselves through sport, has a partnership with the Tanzania Tennis Association to promote wheelchair tennis. Men’s and women’s teams recently competed in the All Africa tournament in Kenya, a qualifier for the 2014 Wheelchair Tennis World Cup. Although they did not win their respective tournaments, the women’s team beat the tournament’s eventual winner Kenya.
Soccer
The national side Taifa Stars have parted ways with their coach Kim Poulsen after he failed to deliver the progress expected during his two years in charge. No successor has yet been named.
In January Eton College launched a pilot project to identify and develop future Tanzanian soccer stars from pupils in rural schools in Arusha and Moshi. The sports master of Eton, Glen Pierce, led a group of three Etonians who are on their gap year before going to university. The project was sponsored by Safari Hub in collaboration with the charity ACE Africa and the Tanzanian High Commission (The Citizen, Daily News). | https://www.tzaffairs.org/2014/05/sport-6/ |
AS Tallink Grupp Unaudited Consolidated Interim Report Q4 2020
In the 2020 financial year (1 January – 31 December), Tallink Grupp AS and its subsidiaries (the Group) carried a total of 3 732 102 passengers, which is 62% passengers less compared to the 2019 financial year. The number of cargo units transported decreased by 5.2% compared to the previous financial year. The Group’s unaudited consolidated revenue amounted to EUR 442.9 million (EUR 949.1 million in 2019). Unaudited EBITDA was EUR 8.0 million (EUR 171.1 million, 2019) and unaudited net loss for the financial year was EUR 108.3 million or EUR 0.16 per share (net profit of EUR 49.7 million or EUR 0.07 per share, 2019).
Impact of Covid-19 and travel restrictions In the 2020 financial year, the Group’s operations and operating results were strongly influenced by the Covid-19 situation, restrictions on international travel and communications advising against travelling by state authorities. As a result of changes in the operating schedules there were 20% less trips compared to last year. Other limitations included restrictions on maximum capacity on vessels.
Travelling restrictions on all routes were in force from March until June and again starting from September. While the restrictions remained limited in most markets during the summer months, the restrictions for international passenger traffic to and from Sweden have been continuously in force effectively since March 2020. During the summer, vessel operations were flexibly rerouted to other routes and operated various special cruises. From mid-December the Group operates the shuttle and cargo service on Estonia-Finland route, Turku-Stockholm route and Paldiski-Kapellskär cargo route with the operation of other routes and vessels suspended.
Several operational changes were effective in 2020:
Daily operations of the Tallinn-Stockholm, Riga-Stockholm and Helsinki-Stockholm routes were suspended from mid-March 2020.
Tallink City Hotel was closed from March 2020, Riga Hotel was from since October 2020.
Throughout the year our vessels were flexibly rerouted to other routes:
The cruise ferry Victoria I was temporarily rerouted to the Tallinn-Helsinki route from June until late December. It also operated a limited number of special cruises to various destinations. In autumn, the ferry operated also weekly Tallinn-Stockholm-Riga roundtrip.
During summer season and until the end of September, the cruise ferry Baltic Queen operated special cruises from Tallinn to Mariehamn and from Tallinn to Turku. In addition to that, the cruise ferry also operated special return trips on the Tallinn-Stockholm route and special cruises on the Helsinki-Riga route.
From mid-March until mid-April the shuttle vessel Star was temporarily rerouted to Paldiski-Sassnitz route.
In spring, the cruise ferry Romantika operated special return trips on the Riga-Stockholm route in order to secure transport of cargo. During summer season and until the end of September the ferry operated special cruises from Riga to Mariehamn and from Riga to Helsinki.
The cruise ferry Isabelle operated temporarily on the Paldiski-Kapellskär route from June to October.
The cruise ferry Silja Serenade operated on the Helsinki-Riga route during summer season.
From July until the end of October the cruise ferry Silja Symphony operated special cruises from Stockholm to Visby and special cruises from Stockholm to Härnösand.
Changes concerning personnel Due to the Covid-19 situation the following changes relating to personnel were in force in the financial year of 2020:
During spring the workload and remuneration of all Latvian and Estonian personnel was reduced to 70% for two and three months, respectively.
In autumn the workload and remuneration of a portion of Estonian personnel was reduced to 70% until spring 2021.
Most of the Finnish personnel were temporarily laid off, except the staff on duty.
The workload of Swedish personnel was reduced to varying extent.
Reorganisation and collective redundancies concerned both shore and sea personnel in all markets.
Given the different labour regulations in our home markets most efficient immediate response to the changes in the environment was possible on the Finnish flagged vessels. The situation was the most difficult in Estonia and Latvia where the rigid legislation did not enable to combine unpaid leave with other salary support measures to the employee. Therefore, lengthy redundancies processes were first initiated in Estonia and Latvia but were carried out in Finland and Sweden later in the year. After completion of the processes some support functions were migrated to Estonia.
As a result of changes in the business and processes regarding personnel, including collective redundancies processes, the number of employees at the end of the year decreased by 3 040 compared to the beginning of the year. The average number of employees during the year and the number of employees at the end of the year were, respectively, 16.0% and 42.0% lower compared to the same period last year.
Support measures In the second quarter of 2020 the Group used temporary salary compensation measures offered by the states.
In the second quarter of 2020, the Estonian Parliament approved the change in legislation granting exemption from ships’ fairway dues for twelve months starting from April 2020. The effect of the exemption amounted to EUR 3.4 million in the 2020 financial year.
During the year the Group received a net total of EUR 36.6 million in direct financial support from various government grants from all home markets.
Activities to improve liquidity On 30 July 2020, the shareholders’ annual general meeting decided not to pay dividends from net profit for 2019.
In order to relieve the liquidity issues caused by the Covid-19 situation, the Group’s companies were allowed to postpone the tax payments. At the end of the year, the postponed tax liability amounted to EUR 5.4 million and will be paid by autumn 2021.
During the year the Group negotiated with existing and new financial institutions financing and payment terms including waivers of loan covenants, deferral of loan principal repayments for the year 2020 and new loan agreements. As a result, the Group’s liquidity improved in great extent.
Sales and segments In 2020, the Group’s total revenue decreased by EUR 506.2 million and amounted to EUR 442.9 million. The total revenue in 2019 amounted to EUR 949.1 million and in 2018 to EUR 949.7 million.
Revenue from route operations (core business) decreased by EUR 483.0 million to EUR 400.2 million. The passenger operations and segment results on all routes were significantly affected by the Covid-19 situation and imposed travel restrictions.
In 2020, The Group’s ships carried a total of 2.4 million passengers on the Estonia-Finland routes, which is a 52.3% decrease compared to last year. The number of transported cargo units on the routes increased by 1.0%. Estonia-Finland routes’ revenue decreased by EUR 153.5 million and amounted to EUR 200.4 million. The segment result decreased by EUR 77.0 million to EUR 3.5 million. The Estonia-Finland routes’ results include also the operations of the Tallinn-Turku, Tallinn-Mariehamn and Paldiski-Sassnitz routes.
The Finland-Sweden routes’ revenue decreased by EUR 194.9 million and amounted to EUR 149.5 million. The segment result decreased by EUR 80.7 million to EUR -53.9 million. The Finland-Sweden routes’ results include also the operations of the Helsinki-Riga route and the special cruises from Stockholm to Visby and to Härnösand.
The Estonia-Sweden routes’ revenue decreased by EUR 77.4 million, compared to the previous year, and amounted to EUR 34.9 million. The segment result decreased by EUR 22.6 million to EUR -17.9 million. The Estonia-Sweden routes’ results reflect the operations of the Paldiski-Kapellskär route and the limited operations of the Tallinn-Stockholm route.
The Latvia-Sweden route’s revenue decreased by EUR 57.1 million, compared to the previous year and amounted to EUR 15.4 million. The segment result decreased by EUR 18.1 million to EUR -17.5 million. The Latvia-Sweden route’s results include the limited operations of the Riga-Stockholm route as well as the special cruises from Riga to Helsinki and to Mariehamn.
Revenue from the segment other decreased by a total of EUR 28.5 million and amounted to EUR 45.2 million. The decrease was mainly driven by significantly lower accommodation sales and lower revenue from services provided at the hotels. The segment revenue was positively impacted by an increase in online shop sales, opening of Burger King restaurants and revenue from providing mooring services at the Tallinn Old City Harbour.
Earnings In 2020, the Group’s gross profit decreased by EUR 240.3 million compared to last year, amounting to EUR -43.5 million. The Group’s EBITDA decreased by EUR 163.1 million and amounted to EUR 8.0 million.
In 2020 the Group’s profitability was impacted mainly by the following factors:
Significant cut in operating expenses, including significant decrease in personnel expenses as a result of collective redundancies, state support measures and remuneration cuts.
Negative impact from one-off costs related to redundancies processes in the amount of EUR 9.0 million. Positive financial impact from the redundancy processes is expected to start from 2021.
Positive impact from various government grants in total net amount of EUR 36.6 million.
Positive impact from exemption from ships’ fairway dues in Estonia in the amount of EUR 3.4 million.
Amortisation and depreciation expense increased by EUR 4.4 million to EUR 100.7 million compared to last year.
Compared to last year, net finance costs increased by EUR 0.2 million to EUR 17.8 million. The change includes a decrease of EUR 0.3 million in interest costs compared to same period the previous year and EUR 0.5 million net loss from foreign exchange differences.
The Group’s unaudited net loss for 2020 financial year was EUR 108.3 million or EUR 0.162 per share compared to a net profit of EUR 49.7 million or EUR 0.074 per share in 2019 and net profit of EUR 40.0 million or EUR 0.060 per share in 2018.
Investments In the 2020 financial year the Group’s investments amounted to EUR 100.1 million. The Group’s investments mainly reflect prepayments for a new LNG shuttle vessel MyStar in the total amount of EUR 61.8 million and a purchase of a ro-pax vessel Sailor in the amount of EUR 8.5 million.
Investments were made in the ships’ technical maintenance and completion of energy efficiency and emissions reduction projects. Due to the changed economic environment and suspension of vessel operations, ship-related investments were kept to minimum and only critical maintenance and repair works were performed.
Investments were also made in the development of the online booking and sales systems as well as other administrative systems and in relation to the opening of Burger King restaurants.
Results of the Q4 of 2020 In the fourth quarter (1 October – 31 December) of 2020, the Group’s revenue decreased by EUR 147.1 million compared to same period last year and amounted to EUR 79.3 million.
Restaurant and shop sales on-board and onshore decreased by EUR 96.2 million, ticket revenue decreased by EUR 35.5 million and, as a result of 12.6% less transported cargo units, cargo revenue decreased by EUR 8.1 million.
The fourth quarter EBITDA decreased by EUR 32.2 million to EUR 1.2 million and net loss for the period was EUR 26.9 million.
In the fourth quarter of 2020, the Group’s revenue and operating result were impacted by following factors:
Changes in operations of vessels and hotels due to the Covid-19 situation and the travel restrictions.
Negative impact from one-off costs related to redundancies process in the amount of EUR 3.9 million.
Positive impact from various government grants in the total net amount of EUR 14.7 million.
Dividends Due to a deteriorated operating environment and considering the Company’s long-term interests, the Management will propose not to pay dividends for the financial year 2020.
Financial position In the fourth quarter, the Group’s net debt increased by EUR 138.3 million to EUR 677.3 million (EUR 539.0 million at 31 December 2019) and the net debt to EBITDA ratio was 84.2 at the reporting date (3.1 at 31 December 2019).
At the end of the fourth quarter, total liquidity buffer (cash, cash equivalents and unused credit facilities) amounted to EUR 147.1 million (EUR 128.9 million at 31 December 2019).
At 31 December 2020, the Group’s cash and cash equivalents amounted to EUR 27.8 million (EUR 38.9 million at 31 December 2019) and the Group had EUR 119.3 million in unused credit lines (EUR 90.0 million at 31 December 2019).
Economic Environment The Group considers Finland, Sweden, Estonia and Latvia its home markets with the most exposure to the economic developments in Finland. The Group has also high exposure to the economic developments in Estonia and Sweden. In the fourth quarter of 2020, the Group’s economic environment was dominated by the second wave of Covid-19 pandemic and the restrictions related to international travelling.
Despite the stabilisation of confidence of the Finnish and Swedish consumers the overall demand in passenger traffic remained low due to hindrances in travelling. The international travel restrictions and reduced air traffic also effectively meant the absence of demand from the customers from outside our home markets and the state-level travelling and border-crossing restrictions effectively allowed to offer only international cargo operations to and from Sweden.
In the fourth quarter, the cargo market fared somewhat better relative to the passenger business, supported by the recovering business confidence on all the home markets. Yet the market conditions regarding price competition remained challenging resulting in an overall decline both in the number of carried cargo units and in the average revenue per unit.
While more flexible labour regulations in Finland and Sweden had previously allowed to employ temporary lay-offs as opposed to the extensive redundancy processes in the Group’s Estonian and Latvian subsidiaries, in the fourth quarter the Group initiated sizeable redundancy process also in its Finnish and Swedish organisations in the face of the persistently weak outlook of the operational environment and following the negotiations with the unions.
Measured in euros the global fuel prices declined, on average, by 37% in the fourth quarter of 2020 compared to last year. The Group’s overall fuel cost declined by 50% compared to the same period last year. In addition to the decrease in the fuel market price, the cost was affected by the changes in the operating schedule as well as an existing fuel price agreement with the price fixed above the market level.
For the foreseeable future, the key risk has to do with global and regional developments with the Covid-19 situation and related restrictions on travel and other economic activities, its economic damage and its impact on local and international trade.
Events in Q4 Prepayment for the new shuttle vessel MyStar The last prepayment instalment for the new LNG shuttle vessel MyStar in the total amount of EUR 12.4 million was made in the fourth quarter of 2020. The completion and delivery of the vessel is expected in early 2022 and the arrival of MyStar will make Tallinn-Helsinki shuttle route Tallink’s first service operated by only environmentally friendly LNG fuelled vessels.
Signing of the loan agreement On 27 November 2020, Tallink Silja OY and Nordic Investment Bank signed a term loan agreement for financing of working capital. The total amount of the loan limit is EUR 100 million and the loan can be drawn in EUR 10-40 million disbursements. The loan carries Euribor based floating interest rate and has final maturity of four years.
The loan is secured by the mortgages on the vessels Megastar and Baltic Queen, ranking after the existing creditors and the corporate guarantee of AS Tallink Grupp. The Government of the Republic of Finland has issued a state guarantee in favour of Nordic Investment Bank regarding the loan facility.
Extensive reorganisation In October and November 2020, the Group’s Finnish and Swedish subsidiaries had cooperation negotiations with the employee representatives which resulted in agreement of changes in the organisational structure, redundancies, reduction in working hours and temporary lay-offs.
During the quarter, additional redundancies affected both shore and sea personnel in all home markets.
Opening of Burger King restaurants During the quarter first Burger King restaurants were opened in Latvia and Lithuania, and one restaurant in Tallinn Old Town.
Suspended operations of Tallink Hotel Riga The operations of Tallink Hotel Riga were suspended from 18 October 2020. The hotel will be closed until spring 2021 unless the operating environment does not improve sooner.
Events after the reporting period and outlook Opening of Burger King restaurants In January 2021, second Burger King restaurant was opened in Latvia. The Group continues preparations for opening additional Burger King restaurants.
Earnings The Group’s earnings are not generated evenly throughout the year. The summer period is the high season in the Group’s operations. In management’s opinion and based on prior experience most of the Group’s earnings are generated during the summer (June-August).
Due to the ongoing Covid-19 situation the earnings outlook has become uncertain and continues to be largely subject to external factors such as the progress of vaccinations, states’ decisions regarding the timing of lifting of the travel restrictions, allowing passenger traffic as well as the duration of the recovery period.
Research and development projects Tallink Grupp AS does not have any substantial ongoing research and development projects. The Group is continuously seeking opportunities for expanding its operations in order to improve its results.
The Group is continuously looking for innovative ways to upgrade the ships and passenger area technology to improve its overall performance through modern solutions. The most recent technical projects are focusing on the solutions for reduction of the ships CO2 footprint.
Risks The Group’s business, financial position and operating results could be materially affected by various risks. These risks are not the only ones we face. Additional risks and uncertainties not presently known to us, or that we currently believe are immaterial or unlikely, could also impair our business. The order of presentation of the risk factors below is not intended to be an indication of the probability of their occurrence or of their potential effect on our business.
Covid-19 situation and developments
Governmental restrictions on business activities
Accidents, disasters
Macroeconomic developments
Changes in laws and regulations
Relations with trade unions
Increase in the fuel prices and interest rates
Market and customer behaviour
Key figures
For the period
Q4 2020
Q4 2019
Change %
Revenue (million euros)
79.3
226.4
-65.0%
Gross profit/loss (million euros)
-18.4
39.1
-147.0%
EBITDA¹ (million euros)
1.2
33.4
-96.5%
EBIT¹ (million euros)
-24.2
9.0
-369.6%
Net profit/loss for the period (million euros)
-26.9
5.5
-590.5%
Depreciation and amortisation (million euros)
25.4
24.5
3.7%
Capital expenditures¹ ²(million euros)
4.8
10.0
-52.0%
Weighted average number of ordinary shares outstanding
669,882,040
669,882,040
0.0%
Earnings/loss per share¹
-0.040
0.008
-590.5%
Number of passengers
462,859
2,280,805
-79.7%
Number of cargo units
81,861
93,645
-12.6%
Average number of employees
4,707
7,197
-34.6%
As at
31.12.2020
30.09.2020
Change %
Total assets (million euros)
1,516.2
1,542.9
-1.7%
Total liabilities (million euros)
801.9
801.4
0.1%
Interest-bearing liabilities (million euros)
705.1
671.2
5.1%
Net debt¹ (million euros)
677.3
640.5
5.7%
Net debt to EBITDA¹
84.2
15.9
429.9%
Total equity (million euros)
714.3
741.5
-3.7%
Equity ratio¹ (%)
47%
48%
Number of ordinary shares outstanding
669,882,040
669,882,040
0.0%
Equity per share¹
1.07
1.11
-3.7%
Ratios¹
Q4 2020
Q4 2019
Gross margin (%)
-23.2%
17.3%
EBITDA margin (%)
1.5%
14.8%
EBIT margin (%)
-30.5%
4.0%
Net profit/loss margin (%)
-33.9%
2.4%
ROA (%)
-6.1%
4.8%
ROE (%)
-14.1%
6.0%
ROCE (%)
-7.2%
5.7%
1 Alternative performance measures based on ESMA guidelines are disclosed in the Alternative Performance Measures section of this Interim Report. 2 Does not include additions to right-of-use assets.
Newswire Distribution Network & Management
About Us
GlobeNewswire is one of the world's largest newswire distribution networks, specializing in the delivery of corporate press releases financial disclosures and multimedia content to the media, investment community, individual investors and the general public. | |
We are using cookies for a better user experience.
Turbulent first quarter of the race for Audi
Turbulent first quarter of the race for Audi
Shortly before the end of the first quarter of the Nürburgring 24 Hour race, Audi has every reason to be confident. The race started in a turbulent way. Torrential rain, hail and many accidents urged the race director to stop the race for three hours just 50 minutes after the start. After a pit stop sequence, the Audi race experience was the best Audi team. Christian Bollrath/Maximilian Hackländer/Ralf Oeverhaus/Micke Ohlsson were sixth in the number "11" Audi R8 LMS. Belgian Audi Club Team WRT was on 14th position with the number "2" car just in front of Audi Sport Team Phoenix number "6" car. The second Phoenix Racing Audi was 18th. The other Audi cars followed in positions 21 (Twin Busch Motorsport), 22 (montaplast by Land-Motorsport), 23 (Audi Sport Team WRT), 28 (Audi race experience) and 64 (Car Collection Motorsport). | https://www.audi-mediacenter.com/en/newsflash/turbulent-first-quarter-of-the-race-for-audi-6228 |
MTA's speed safeguards in place, but agency studying deadly Amtrak crash
The head of the MTA Wednesday assured customers that the region's transportation network has technology in place to help prevent accidents like one that killed eight Amtrak passengers last week.
At a meeting of the Metropolitan Transportation Authority Board, MTA chairman and chief executive Thomas Prendergast said the December 2013 crash of a Metro-North train that derailed after speeding through a sharp curve in the Bronx taught the MTA lessons about the importance of "overspeed protections."
"Clearly, we knew that we had to do things to be to address issues related to . . . a train, a locomotive engineer, who did not respond properly" to speed limit restrictions, Prendergast said.
Soon after the Metro-North derailment, which killed four, the MTA installed automatic speed control technology at all sharp curves and bridges on Metro-North and the Long Island Rail Road. The technology automatically slows a train if it approaches too fast.
Prendergast said that similar technology, called grade time signaling, already was in place on the New York City Transit Authority subway system. Nevertheless, Prendergast assured the public that the MTA will be closely watching the National Transportation Safety Board's investigation into the May 12 Amtrak derailment in Philadelphia, which also injured more than 200 people as the train took a 50-mph curve at 106 mph.
"We take a look at any accident that occurs and gather as much information from that accident as it's developing," Prendergast said.
The MTA has said it is moving forward on a $1 billion plan to install positive train control accident prevention technology on the LIRR and Metro-North by 2018. The technology uses radio transponders installed on tracks and in trains to automatically slow down or stop a train if it's going too fast, about to hit another train, or violates a signal.
The Long Island Rail Road Council Wednesday called on the LIRR to learn at least one valuable lesson from the Amtrak accident: the importance of designing train cars with passengers' safety in mind.
With the LIRR's next fleet of M-9 electric train cars being designed, the council urged the LIRR to use input from passengers from recent train accidents to "inform the design of passenger protection and car evacuation systems."
"We believe that it is critical that we learn from these tragedies to lessen the risk of similar incidents in the future and that necessary resources be available to put into practice any lessons learned from these accidents," LIRR Commuter Council chairman Mark Epstein said.
The council also renewed its call for an LIRR rider to be appointed to Amtrak's board of directors, saying that the move would benefit Amtrak because the two agencies share many facilities, including Penn Station. | https://www.newsday.com/long-island/thomas-prendergast-mta-s-speed-safeguards-in-place-but-agency-studying-deadly-amtrak-crash-r08483 |
The inspector considered the main issues to be whether the proposal constituted inappropriate development in the green belt, the scheme’s effect on openness and the area’s character, and whether any harm arising was outweighed by other considerations constituting very special circumstances.
In determining whether the scheme comprised inappropriate development, the inspector considered whether it amounted to redevelopment of previously developed land, namely whether there were permanent structures with associated curtilage covering the site as defined in annex 2 of the NPPF.
He found that although part of the site complied with this definition, not all of it could be regarded as doing so. He remarked that some of the land appeared undeveloped and had a separate curtilage to the main waste transfer area, despite having been subject to waste disposal. With regard to openness, he felt that the proposed housing would have a neutral impact. In terms of character, he judged that it would result in an extension to the built form and have a visible roofscape, leading to diminution of a gap between two settlements contrary to a made neighbourhood plan policy.
The inspector concluded that the proposal was inappropriate development and would harm the area’s character of the area. However, he found that the scheme’s advantages, including cessation of the waste use, visual benefits, remediation of the site, improved woodland and ecology and a boost to housing provision in an area where the council could not identify a five-year supply, outweighed the harm and represented very special circumstances. | https://www.planningresource.co.uk/article/1447759/homes-benefits-outweigh-green-belt-presumption |
The invention discloses a cold-proof thermal insulation clothes knitted fabric. Bottom yarns and surface yarns are knitted to form the cold-proof thermal insulation clothes knitted fabric. Far infrared ceramic materials are integrated with composite fibers to form the bottom yarns, the weight of the bottom yarns is 35% to 40% that of the fabric, the diameter of each far infrared ceramic material is 20 nanometers to 30 nanometers, the surface yarns are blended yarns which are formed by organic wool and profiled fibers, the weight of the surface yarns is 60% to 65% that of the fabric, the content of the organic wool is 35% to 40% that of the surface yarns, and the content of the profiled fibers is 60% to 65% that of the surface yarns. Through the method, the cold-proof thermal insulation clothes knitted fabric can absorb heat which is dissipated outward by the human body in the room temperature, radiate the heat back to the human body through far infrared rays and enable the far infrared rays and the human body cells to resonate to produce a heat effect, the weight of the fabric is practically reduced, and the heat preservation effect and the cold-proof capacity are improved. | |
---
abstract: 'For security, environmental, and regulatory purposes it is useful to continuously monitor wide areas for unexpected changes in radioactivity. We report on a temporal anomaly detection algorithm which uses mobile detectors to build a spatial map of background spectra, allowing sensitive detection of any anomalies through many days or months of monitoring. We adapt previously-developed anomaly detection methods, which compare spectral shape rather than count rate, to function with limited background data, allowing sensitive detection of small changes in spectral shape from day to day. To demonstrate this technique we collected daily observations over the period of six weeks on a 0.33 square mile research campus and performed source injection simulations.'
author:
- 'Alex Reinhart, Alex Athey, and Steven Biegalski [^1] [^2] [^3] [^4] [^5]'
bibliography:
- 'algorithms.bib'
title: 'Spatially-Aware Temporal Anomaly Mapping of Gamma Spectra'
---
Introduction
============
wide-area radiation surveillance is a challenging problem for environmental and security applications. For example, a city may wish to produce a map of radiation sources over a wide region, identify unexpected or unauthorized radioactive sources and take corrective action, then monitor the area for any future introduction of sources. Dedicated systems have been developed, such as the United States Department of Energy’s Aerial Measuring System, which uses aircraft to map radiological activity at nuclear sites and during emergencies [@Wasiolek:2007vn; @AMS]; however, these systems focus on one-time mapping, rather than continuous monitoring and surveillance.
For city-sized areas, current mapping efforts typically use low-flying helicopters. These operations produce high-resolution maps, but require several weeks of intensive flying, making them unsuitable for continuous monitoring. Other methods of mapping include gamma-ray imaging devices mounted in vehicles [@Zelakiewicz:2011ig]; mobile scintillator detectors which search for sudden changes in background spectral shape, indicating the detector is traveling past a source [@Pfund:2007; @Pfund:2010hm]; and commercially-available portable identifying spectrometers.
These methods are limited in a number of ways. An aerial survey which requires weeks to complete cannot continuously monitor a wide area in real time. For vehicle-based mobile detectors, previous work has developed spectroscopic source detection algorithms, but these do not perform change detection from one survey to the next, and do not take advantage of previous background observations to improve detection sensitivity [@Pfund:2010hm]. Imaging methods require large and expensive detectors and focus on detecting and imaging individual sources, rather than mapping large areas.
We report on an integrated system of (a) mobile data collection, (b) spatial-temporal database of gamma spectra, and (c) spatially-aware anomaly mapping algorithm. Collectively we refer to this system as the spectral comparison ratio anomaly mapping (SCRAM) system. The SCRAM system uses mobile detectors to build spectral maps of wide areas and identifies temporal anomalies using spectral comparison ratios (SCRs), detecting changes in spectral shape. By using a spatial database of observed spectra and comparing new observations to the recorded background, a high sensitivity to temporal anomalies is obtained. To demonstrate these concepts we collect and analyze a sample dataset on a small research campus.
This research is motivated as a feasibility study to consider collecting radiation maps with vehicles that naturally transit areas of interest through their daily operations, such as patrol vehicles, buses, or unmanned aerial vehicles. Such a system, collecting data continuously as vehicles operate, would provide high-sensitivity, continuous, wide-area surveillance at low operational cost.
SCRAM System
============
The SCRAM system is composed of three core components: a mobile detection platform, based on a scintillator detector and GPS system; a spatial and temporal database of observed spectra allowing analysis and change detection; and an analysis method based on spectral comparison ratios. We constructed a proof-of-concept platform using off-the-shelf components.
Mobile Detection Platform
-------------------------
The first component in the SCRAM system is a platform for collecting radiation data. For data collection, the required electronics were USB-based GPS, USB-based scintillator detector and a PC laptop; the largest of these components was the laptop and all items were easily contained in a small backpack. This could be carried by a person or placed in a golf cart or other vehicle. The detector was a Bridgeport Instruments $2\times2$-inch cesium iodide scintillator and was used to collect spectra continuously at two-second intervals; however, the analysis system is agnostic to choice of sensor, and would work with other gamma spectra detectors, including much larger or more sensitive devices.
Spatial-Spectral-Temporal Database
----------------------------------
The second component in the SCRAM system is a method of storing multiple-pass radiation data in a spatial and temporal database. For this, we constructed a database of spectra using the PostGIS geographic information system [@postgis; @pgsql]. Software was developed to allow for rapid spatial and temporal querying of spectra. Spectra were recorded into the database along with the detector’s GPS coordinates, current time, and several diagnostic fields.
We were able to use our spatial and temporal database to determine the expected background at each location, along with the background variability with respect to time. More importantly, new observations could be compared against the background at a location by querying the database for past observations, which were summed together to produce an accurate background spectrum determination.
Spectral Comparison Ratio Anomaly Mapping
-----------------------------------------
The final component of the SCRAM system is a spectral anomaly detection algorithm. Our algorithmic approach is based on the method of spectral comparison ratios (SCRs), as previously developed by other authors [@Pfund:2007; @Jarman:2008fm], with modification to accurately produce a covariance estimate with limited data, such as the case where few observations are made within a given spatial area.
The first step is to group data into square spatial cells. (We will refer to components of the spectral histogram as “bins” and the spatial grid as “cells” to prevent confusion.) Data within each cell is summed, and the newly-observed spectrum compared to the cell’s recorded background spectrum. Spatial cell size choices are discussed in Section \[analysis\].
### Spectral Comparison Ratios
The SCR method does not detect changes in radiation levels, but instead examines spectral shapes. SCR collects observed gamma counts into energy bins, which may be chosen to cover certain spectral regions of interest or can be distributed evenly across the spectrum. Various methods exist to choose energy bins targeted for detection of particular isotopes [@Wei:2010go; @Pfund:2010hm]; however, for this demonstration, we simply chose 8 energy bins which contained roughly equal numbers of counts in a typical background spectrum, covering the energy range between 100 and 2500 keV, as shown in Fig. \[spectral-bins\]. Applications which are targeted to specific isotopes or which wish to reject certain nuisance isotopes may use bins selected for this purpose. In the course of this research, we examined a number of bin choices, including bins with widths proportional to the square root of energy, as used in previous research [@Jarman:2008fm]; the results of subsequent analysis were qualitatively the same regardless of bin choice, although quantitively the sensitivity to specific isotope detection varied with bin choice, as expected.
![An example background spectrum, with vertical dashed lines indicating the boundaries of spectral bins. There are eight bins total.[]{data-label="spectral-bins"}](figures/spectral-bins.pdf){width="3.5in"}
Binning the data into $n$ energy bins creates a vector of counts $\mathbf{c}
= [ c_1 c_2 \ldots c_n]$. We also have a background vector, $\mathbf{b}$, containing the observed background spectrum, binned in the same way. One energy bin is chosen as a reference bin (in this case, bin 1). The choice of reference bin is unimportant, as the anomaly statistic has been shown to be invariant to the choice of bin [@Runkle:2009ev]. The spectral comparison ratios can then be computed by $$\label{scr}
s_i = c_1 - \frac{b_1}{b_i} c_i,$$ for $i > 1$. Here $c_1$ and $b_1$ are the numbers of counts in the reference bin. This is mathematically equivalent to multiplying the vector $\mathbf{c}$ by a spectral shape matrix $S$:
$$S = \begin{pmatrix}
1 & - \frac{b_1}{b_2} & 0 & \ldots & 0 \\
1 & 0 & - \frac{b_1}{b_3} & \ldots & 0\\
\vdots \\
1 & 0 & 0 & \ldots & -\frac{b_1}{b_n} \\
\end{pmatrix}$$
$$\mathbf{s} = S \cdot \mathbf{c}$$
There are $(n - 1)$ linearly independent SCRs, since one bin is a reference bin. The SCR process compares $c_1$ against projections based on the ratio between bins in the background data and the counts in bin $i$; the deviations of the projections are given in the SCR vector $\mathbf{s}$. Since $\mathbf{s}$ is computed using ratios between bins, it is insensitive to global changes in count rate unless they alter the spectral shape. This important feature allows for comparisons of spectra made with unequal observation times, which happens when numerous observations over wide areas are aggregated into spatial cells.
### Characterizing Expected Variation {#expected-var}
To accurately detect anomalies, we first need to determine what variation can be expected in the natural background. First, we assume that counts in each energy bin follow an overdispersed Poisson distribution. As counts are aggregated across larger spatial cells, they become overdispersed; see Fig. \[poisson-dispersion\]. Consequently, we approximate that $\text{var}
(c_i) = V c_i$, where $V$ is the average variance-to-mean ratio of count rates ($V=1$ for perfectly Poisson-distributed counts). $V$ is selected empirically by calculating the ratio for the area of interest. We know the relationship between the variance of random variables: $$\begin{gathered}
\text{var}(aX + bY) = \\
a^2 \text{var}(X) + b^2 \text{var}(Y) + 2 ab\, \text{cov}(X,Y)\end{gathered}$$ Hence, using (\[scr\]) we may estimate $\text{var}(s_i)$: $$\text{var}(s_i) = V c_1 + \left(\frac{b_1}{b_i}\right)^2 V c_i - 2
\frac{b_1}{b_i} \text{cov}(c_1, c_i)$$ Here $\mathbf{b}$ is treated as an exact value rather than having its variance propagated. This is a significant simplification, as (\[scr\]) is nonlinear in $\mathbf{b}$ and an exact variance estimate could not be derived. Consequently, $\text{var}(s_i)$ will be underestimated. The impact of this will be explored in Section \[analysis\].
The covariance $\text{cov}(c_1, c_i)$ would be best estimated from all previous background observations made in a spatial cell, so that $\text{cov}(c_1, c_i) \propto \text{cov}(b_1, b_i)$. However, spatial mapping would be impractical if it required numerous repeated observations before detecting anomalies. The relationship between the covariance $\text{cov}(b_i,
b_j)$ and the correlation $\text{corr}(b_i, b_j)$ is [@Morrison]:
$$\text{cov}(b_i, b_j) = \text{corr}(b_i, b_j) \sqrt{\text{var}(b_i) \, \text{var}(b_j)}$$
To replace $\text{cov}(c_1, c_i)$ we must also rescale; $\mathbf{b}$ may have resulted from an observation of a different duration than $\mathbf{c}$. Consequently, we can replace the covariance with a correlation: $$\begin{gathered}
\label{vars}
\text{var}(s_i) = \\
V\left(c_1 + \left(\frac{b_1}{b_i}\right)^2 c_i - 2 \frac{b_1}{b_i}
\left(\frac{T_c}{T_b}\right)^2 \text{corr}(b_1, b_i) \sqrt{b_1 b_i}\right)\end{gathered}$$ where $T_c$ is the time taken to observe $\mathbf{c}$ and $T_b$ the time taken to observe $\mathbf{b}$. This is obtained by replacing $\text{var}(b_i)$ with $\text{var}(b_i T_c/T_b)$, and likewise for $\text{var}(b_j)$, rescaling the observation to match the new observation time.
To compute $\text{corr}(b_1,b_i)$ we do not rely only on background observations made in the chosen spatial cell, as there is frequently not enough data to make this possible. Instead, $\text{corr}(b_1,b_i)$ is estimated from observations in all spatial cells by summing together observations into thirty-second intervals. The correlation between energy bins in these summed observations is easily computed.
Finally, we can construct the covariance matrix $\Sigma$ between energy bins in the SCR vector: $$\Sigma_{ij} = \text{corr} (s_i, s_j) \sqrt{\text{var}(s_i) \text{var}(s_j)}$$ where $\text{corr} (s_i, s_j)$ is estimated by summing all observations across all spatial cells in the same way as for $\text{corr}(b_i,b_1)$, then comparing each observation to the global mean spectrum to produce $\mathbf{s}$.
By using assumptions about the distribution of the data, we have avoided requiring direct calculation of $\Sigma_{ij}$ from the data, as required by past SCR implementations, which would be impossible when there are too few background observations. To produce well-conditioned and invertible covariance matrices, many more observations than variables are required. This would require numerous repeated mapping passes before any anomalies can be detected, making the system impractical. Approaches based on shrinkage estimators are possible [@Daniels:2001et], but cannot work if there are only one or two observations.
The correlation matrices may be computed and reused for anomaly detection in all spatial cells; in very large regions where spectra vary greatly, the correlation matrices may be estimated separately for smaller areas within the monitored region. Any similar method using covariance matrices would require each spatial cell to contain observations of equal length, or require new covariance matrices to be computed for each spatial cell.
### Anomaly Detection
Previous work has developed a simple anomaly detection algorithm which makes use of the SCR vector $\mathbf{s}$ [@Pfund:2007]. In these applications a set of many independent background observations $\mathbf{b}$ are made, and $\mathbf{s}$ is calculated for each observation. After computing the covariance matrix $\Sigma$ for the resulting set of SCR vectors, $\mathbf{s}$ is calculated for the new observation and it is compared to the background through the mathematical construct of the Mahalanobis distance:
$$\label{dist}
D^2 = \mathbf{s}^T \Sigma^{-1} \mathbf{s}$$
The Mahalanobis distance measures the difference between a multivariate observation and the typical mean, normalizing by the typical variance expressed in the covariance matrix [@Morrison]. This implies that spectral shape changes consistent with already-observed natural background variations will cause only small increases in $D^2$, while changes very different from the past data will produce large discrepancies.
If the estimated covariance matrix $\Sigma$ is accurate and the background radiation source is unchanging, the Mahalanobis distance $D^2$ should be $\chi^2$-distributed with $(n-1$) degrees of freedom [@Pfund:2010hm]. In practice there are slight background fluctuations from various natural processes, and the distribution departs slightly from theoretical predictions [@Pfund:2010hm]. (See Fig. \[scr-distribution\].)
By setting a desired alarm threshold $D_A$ based on typical natural spectral variations, one can search for unusually large spectral anomalies, which may indicate source changes. To monitor a wide area, observations can be aggregated into spatial cells and the cumulative spectrum in each cell compared to previous observations. Each cell may contain different numbers of observations, and an individual cell may have observations at different times and locations from day to day.
Due to (\[vars\]), as $T_c$ increases $\text{var}(s_i)$ decreases. This renders the system more and more sensitive with longer observation times.
The method does not distinguish between equally-sized anomalies from natural or artificial sources, though the choice of energy bins may be made to optimize sensitivity to certain isotopes [@Pfund:2007]. Additional benefits of this approach include being able to detect unexpected decreases in radioactivity as well as the replacement of one radioactive source with another, which may maintain a constant count rate in a given area while altering the spectral shape.
Example Dataset
===============
We collected a sample dataset between June 22nd and August 10th, 2012 at the University of Texas’s J. J. Pickle Research Campus. To survey the campus, the system was placed in a golf cart and driven on most work days on irregular routes. Total observation time amounted to twenty hours in 48 observation runs containing a total of more than 37,000 individual two-second observations.
![A map of J. J. Pickle Research Campus with gamma counts per second overlaid, averaged over one month of mapping. Areas of elevated background include the radioactive materials storage facility at the northwest corner (A) and a cluster of large brick buildings near central campus (B).[]{data-label="prc-cps"}](figures/prc-cps.pdf){width="3.5in"}
The natural gamma background varies spatially and temporally due to many natural factors. Our surveys revealed a spatially varying natural background across Pickle Research Campus. A map of average radiation levels over several weeks is shown in Fig. \[prc-cps\]. Background activities vary spatially by a factor of two due to natural and artificial sources.
Analysis
========
Poisson Distribution Assumption
-------------------------------
Our algorithmic approach relies on the underlying Poisson distribution of radiation data. To test the validity of this assumption, Poisson dispersion tests were performed on the dataset as a function of spatial scales. The Poisson dispersion test determines whether a given set of observations could plausibly have been drawn from the same Poisson distribution [@Rao:1956vp]. The test computes a dispersion parameter $P$, defined by: $$P = \frac{1}{\bar x} \sum_{i=1}^N (x_i - \bar{x})^2$$ where $\bar{x}$ is the mean of all observations $x_i$ and $N$ the total number of observations. This parameter is $\chi^2$-distributed with $(N -
1)$ degrees of freedom. Using this distribution, a $p$ value can be computed for $P$, indicating the probability that the observed distribution of values would arise from a Poisson-distributed random variable. For example, dividing our dataset into 125-meter grid cells, we find that on average, $p = 0.33$, so we do not reject the hypothesis that the data are Poisson distributed; this falls to $p = 0.17$ for 250-meter cells.
To quantify this, the index of dispersion was computed for all grid cells at various cell sizes. The index of dispersion $V$ is a measure of the variance of a distribution, compared to its mean: $$V = \frac{\sigma^2}{\mu}$$ where $\mu$ is the distribution’s mean and $\sigma^2$ its variance. The variance of a Poisson distribution equals its mean, so the index of dispersion is expected to be one. Fig. \[poisson-dispersion\] shows mean indices of dispersion for various grid cell sizes, demonstrating that smaller cells tend to have count rate distributions closer to the expected Poisson distribution, as expected. To account for this, we adjusted the dispersion parameter $V$ in Eq. \[vars\] to match the mean index of dispersion for grid cells at a chosen spatial scale.
![Mean, minimum and maximum index of dispersion of counts in each energy bin for all grid cells, at specified grid sizes. An index of 1 is consistent with a Poisson distribution. As expected, smaller cells more closely match the Poisson distribution, while larger cells have additional variance.[]{data-label="poisson-dispersion"}](figures/poisson-dispersion.pdf){width="3.5in"}
Of course, this problem is dependent on the nature of the area being mapped; areas with greater spectral variation on short spatial distances will need to be mapped with smaller spatial cells.
Comparing Spatial and Temporal Variation
----------------------------------------
Our dataset at the Pickle Research Campus revealed not only spatial but temporal variation in background. To compare the temporal variation to the spatial variation, the observation area was divided into grid cells 250 meters on each side, and each day’s set of observations was compared to two or more previous days using the SCRAM algorithm. Fig. \[scr-distribution\] shows the distribution of $D^2$ recorded over several dozen passes through the area during July 2012. For comparison, it also plots the $D^2$ values calculated by comparing each grid cell’s spectrum to a fixed reference cell, rather than comparing it to the same cell on a previous day.
![Distribution of the SCR anomaly statistic $D^2$ in 250-meter grid cells in the sample dataset, with a $\chi^2$ distribution (with 7 degrees of freedom) overlaid. The upper histogram is the result of comparing each grid cell to the same cell on the previous day; the lower histogram compares each cell to a fixed reference cell, showing spatial rather than temporal variation. The lower distribution is clearly shifted to the right.[]{data-label="scr-distribution"}](figures/scr-distributions.pdf){width="3.5in"}
The spatial distribution is clearly shifted to the right, indicating that there is more spatial variance than temporal variance. This validates the assumption of the SCRAM method that it is best to compare spectral observations to previous observations made in the same place, rather than observations made at other locations. In other words, the background spectra vary much more spatially than they do temporally. This suggests that alarm thresholds may be set lower when using the SCRAM method to perform anomaly mapping, giving higher sensitivity without increased false alarm rates; knowledge of the prior background is more useful than the detector’s knowledge of what it observed thirty seconds ago at a different location, allowing more sensitive detection.
Further research should also investigate the impact of known natural variations in background radiation, such as those caused by rainfall’s interaction with radon daughter products, which have been extensively modeled [@Mercier:2009gv]. At least five inches of rainfall occurred during our observation period, so these effects may be present in our example dataset, accounting for some of the temporal variance, and can be compared against existing models.
The presence of $p < 10^{-3}$ anomalies in Fig. \[scr-distribution\] is not unusual. The $p$-values are computed under the $\chi^2$ distribution, which the data do not follow perfectly: There are, of course, some true variations in natural background in the data, and the distribution of counts may be more or less overdispersed in different spatial cells. As noted in Section \[expected-var\], estimates of $\text{var}(s_i)$ are systematically low, making some observations appear more anomalous than they should. Also, some spectral comparisons were made with little data – because of irregular routes, a spatial cell may only contain a few seconds of data, giving an extremely poor estimate of the spectrum in that cell. Regardless of these issues, the algorithm is practical for anomaly detection, as demonstrated in the following simulations.
Detection Performance
---------------------
![A heatmap of SCR values comparing one day to the previous days, with $p$ values computed based on the $\chi^2$ distribution of $D^2$. A simulated 140 mCi cesium-137 source was injected on the west side of campus, at the small square. The detector traveled along the adjacent road, never closer than 100 meters.[]{data-label="scr-injected-map"}](figures/scr-injected-prc.pdf){width="3.5in"}
To demonstrate the expected performance of the SCRAM algorithm, we performed several simulations. Simulations used real observed spectra from a $0.844 \,
\mu\text{Ci}$ cesium-137 check source. The simulation code was calibrated by placing the source at known distances from the scintillator detector, and accounted for geometric attenuation of count rates, as well as the exponential attenuation due to gamma absorption in air.
The first simulation, shown in Fig. \[scr-injected-map\], injected a simulated 140 mCi cesium-137 source on the west side of Pickle Research Campus, 100 meters from the detector’s typical path. The detector, driving past at roughly 10 miles per hour, easily detected the source with $D^2 = 156$ (a far larger anomaly than any natural variation recorded in Fig. \[scr-distribution\]), demonstrating the ability of a small moving detector to detect sources at distance.
Next, we performed a simulation to calculate the minimum detectable radioactive source size at a variety of distances. We selected the same straight stretch of road on the northwest corner of the Pickle Research Campus and simulated the injection of a cesium-137 source at various distances from the road into the collected background data.
To choose our alarm threshold, we used the anomaly statistics distribution data shown in Fig. \[scr-distribution\], selecting a threshold which only 1% of our example dataset exceeds. This corresponds to a 1% false alarm rate. For temporal comparisons of spectra, this threshold is $D_A^2 = 83$, while for purely spatial comparisons the result is $D_A^2 = 113$. We computed the minimum source size required to achieve a statistical power of 0.8 (that is, detection of a true positive at least 80% of the time) for both thresholds, and the results are given in Fig. \[minimum-detectable\].
![The minimum cesium-137 source sizes required for detection at least 80% of the time, at various distances away from the detector’s path, using both temporal and spatial comparisons of spectra. Total observation time was 136 seconds.[]{data-label="minimum-detectable"}](figures/minimum-detectable.pdf){width="3.5in"}
These results show that taking advantage of the exact prior background spectrum at each location leads to approximately 20% better detection performance over the use of spectra from a single fixed reference point. Of course, smaller sources would be detectable with a much larger scintillator or with a much longer observation time.
New and Improved?
-----------------
There are many academic, prototype, and commercial systems that map radiation. The SCRAM system contains many elements in common with previous demonstrations, including the detector, GPS, spectral binning, spectral comparison algorithm, and spatial database. For these components, we are agnostic to replacements: different detectors or spectral binning choices could be chosen for specific applications. The novel component of the SCRAM system is estimation of the local background and its variance from previous observations. As has been pointed out previously, simply deploying larger detectors does not improve detection performance, as the local background is the limiting factor [@Ziock:2002bo].
It is instructive to compare the SCRAM system against commercial systems and federal guidelines. However, these comparisons are difficult, given varying detector sizes and modes of operation. The Domestic Nuclear Detection Office has published testing methodologies we plan to follow as our system evolves from a proof-of-concept [@DNDO]. These guidelines require less than one false alarm per hour for 60-second integrations, amounting to a 1.7% false alarm rate. We chose a more strict limit of 1%, though this is not directly comparable; our spectral comparisons are made per spatial cell, rather than per 60-second integration. This limit can be chosen to meet user requirements.
For detection performance comparison, we can look to mapping systems with similar goals. The commercial ORTEC NaI-SS consists of a $4\times 4 \times
16^{\prime\prime}$ sodium iodide detector transported by car, recording spatial and spectral data every second [@ORTEC]. For ORTEC’s chosen false alarm rate, the detector can identify a 10 $\mu$Ci cesium-137 source at 3 meters while traveling at 10 miles per hour. Similarly, the SORIS coded aperture imager uses four large van-mounted sodium iodide plate scintillators, and can detect 1 mCi cesium-137 sources at a distance of 100 meters [@Zelakiewicz:2011ig]. The detector in the SCRAM system is hundreds of times smaller; a simple scaling of our performance by collection area ignores many factors, but nevertheless, the SCRAM concept shows its relevance and promise by displaying significant gains over these previous detection limits when scaled to their detector sizes. Given all the differences in the systems, direct quantitative comparisons are not currently in order.
Conclusion
==========
In this work, we report on the development of an integrated system for wide-area radiation surveillance. A mobile detector is used to collect multiple-pass data, which is stored into a spatial-temporal spectral database. We developed a novel approach for anomaly detection of the spectral content by comparing observations to previous determinations of the background. Because the spatial variance is much larger than the temporal variance, this multi-pass methodology has the potential to deliver increased sensitivity to weak or distant sources, as demonstrated by simulations.
These developments are the first steps necessary to implement the larger vision of a providing continuous wide-area surveillance through the use of mobile sensors. Future improvements to the algorithm include the use of spatial kriging to improve estimates of background spectral shape, methods to determine optimal energy bin sizes, and adaptation for use in small, low-power mobile detectors.
Acknowledgment {#acknowledgment .unnumbered}
==============
The authors would like to thank T. Tipping of the Nuclear Engineering Teaching Laboratory and S. Pennington of Environmental Health and Safety at the University of Texas for their valuable suggestions and support, J. D. Biniaz and P. Vetter for their suggestions on the context and need for wide-area radiation surveillance, and staff at Bridgeport Instruments for technical support and advice regarding use of their detectors. The authors would also like to thank R. Schwitters for the suggestion to plot anomalies as $p$ values, as well as several other helpful suggestions.
[^1]: Manuscript received April 3, 2013; revised August 21, 2013; accepted April 9, 2014. This research has been funded in part by the Office of the Assistant Secretary of Defense for Nuclear Matters.
[^2]: A. Reinhart is with the Department of Statistics, Carnegie Mellon University, Pittsburgh PA 15213 (e-mail [email protected]).
[^3]: A. Athey is with Applied Research Laboratories, The University of Texas at Austin, Austin TX 78713 (e-mail [email protected]).
[^4]: S. Biegalski is with the Nuclear Engineering Teaching Laboratory, The University of Texas at Austin, TX 78712.
[^5]: Accepted for publication in *IEEE Transactions on Nuclear Science*, DOI 10.1109/TNS.2014.2317593. © 2014 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.
| |
Copy of diploma or academic certificate of bachelor’s degree or master’s degree (for those who already completed their education) or academic report that indicates the current studying period of the students with their GPA report (for those who are still studying).
Applicant must have a complete Transcript (for those who already completed their education).
Test results from TOEFL, TU-GET and IELTS and the test results must not be over 2 years counted from the test date.
Students must have an English test score in order to be able to register. Their TU-GET should not be lower than 500 points, TOEFL for Paper-based must not lower than 500 points, Computer-based not lower than 173 points, Internet-based not lower than 61 points or IELTS not lower than 6.0 points and the test results must not be over 2 years counted from the test date.
Candidates whose English Proficiency does not meet the criteria stated above can be accepted to study in the program, but they need to have at least 400 points for TU-GET, 400 points for Paper-based TOEFL, 97 points for Computer-based TOEFL, 32 points for Internet-Based TOEFL, or 4.5 points for IELTS. All must be valid within two years counted from the test date. However, the students must pass the criteria stated in 4.1.1 before attending their Thesis proposal examination.
In case of foreign students, English language shall be used as the main medium of communication or students who completed their education from English-based courses within 2 years counted from the date they graduated until the date they applied for the program, English test score requirements shall be exempt.
For those who apply for Master’s Degree Program Plan A Type A2, students should attach their published dissertations from scientific journal, scientific journal of medicine, journal of medicine, work certificates or other evidence showing previous work experience. Students should present the aforementioned dissertation and/or other evidences in the meeting.
For those who apply for Doctor of Philosophy Program Type 1, students should attach their published dissertations from scientific journal, scientific journal of medicine or journal of medicine in the meeting.
For those who apply for the Master’s Degree Program but have a GPA less than 2.5, students must present their work certificate, other evidences showing their work expertise, published dissertation from scientific journal, scientific journal of medicine, or present other possible evidence in the meeting.
In case the students lack the aforementioned requirements, they can claim request by filling the GR-002 form of General Request for Chulabhorn International College of Medicine and its committee to consider. | http://cicm.tu.ac.th/intra/courseApply/integrative/2019/document.php |
Starts With a Bang!
Did Hubble Just Find New Stars Where Planets Are Impossible?8 Jun 2020, 14:01 UTC Maybe 100% of stars don’t have planets, after all.
Universe Today
A New Test Confirms Dark Energy and the Expansion of the Universe5 Jun 2020, 15:36 UTC In the standard model of cosmology, dark energy fills the universe. It causes the universe to expand at an ever-increasing rate, and it makes up more than 70% of the cosmos. But there’s a problem. When we measure the rate of cosmic expansion in different ways, we get results that disagree with each other.
ESO Announcements
METIS Instrument Passes Design Milestone5 Jun 2020, 12:14 UTC METIS, the powerful imager and spectrograph for ESO’s Extremely Large Telescope (ELT), has passed its Preliminary Design Review at ESO’s headquarters in Garching, Germany. METIS, short for Mid-infrared ELT Imager and Spectrograph, will make full use of the giant main mirror of the telescope to study a wide range of science topics, from objects in our Solar System to distant active galaxies. METIS will be extremely well suited to study the life cycle of stars, from infant stars and planet-forming discs to older stars near the end of their lifetime.
SciTech Daily
Gas Far Outside of Our Galaxy Illuminated by Enormous Burst of Energy Unleashed by Milky Way’s Black Hole3 Jun 2020, 12:45 UTC About 3.5 million years ago, the supermassive black hole at the center of our Milky Way galaxy unleashed an enormous burst of energy. Our primitive ancestors, already afoot on the African plains, likely would have witnessed this flare as a ghostly glow high overhead in the constellation Sagittarius. It might have persisted for 1 million years.
Discover
Ancient Mars May Have Had Rings, Then Moons, Then Rings ...2 Jun 2020, 19:30 UTC For a long time after their discovery in 1877, scientists assumed Mars’ two puny moons — Deimos and Phobos — were captured asteroids. This belief persisted until evidence revealed both moons formed at the same time as the Red Planet itself, and that the smaller one, Deimos, has a mysteriously tilted orbit. However, it wasn’t until 2017 that researchers put forth a new idea that could explain why Deimos' orbit is slanted by 2 degrees. | http://www.portaltotheuniverse.org/blogs/posts/featured/17/ |
Higonokami Mono High-Carbon Steel Craft Knife Silver Handle (L)
A Higonokami is a Japanese traditional non-locking pocket knife. History of since 1896 in Miki City, the forged lever used to open the knife. They are great for opening packaging, sharpening pencils, cutting fruit etc.
Steel : SK High Carbon
Blade Length : 95mm
Total Length : 213mm
Weight : 67g
* Please dry thoroughly to avoid rust!! | https://katabahamono.com/products/higonokami-mono-high-carbon-steel-craft-knife-silver-handle-large-size |
On Friday 16 December 2011 the Ritman Library re-opened its doors after having been closed for a year. On this occasion Joost Ritman, the founder of the library, explained: ‘The library is like a ship in a storm, we have always tried to steer it to a safe and vital haven’. Before the library had to close, the staff consisted of seven people, then continued with four, while in the past year both former staff and new people have been contracted on a freelance basis.With a team of around fourteen people, of whom some are more actively involved than others, The Ritman Library is heading to open waters decided to make its treasury available to people all over the world.
Giving body to this mission, from last week the Hermetically Open project is live, aiming to open up sources related to the big questions of existence for anyone wishing to consult or study sources belonging to the field of Christian-Hermetic Gnosis. The library, a house of living books, may well be compared to an organism. It has passed through and will continue to go through various phases of growth always determined to seek its own way. Having encountered heavy winds, every time it has undergone stages of the alchemical process of solve and coagula. It sometimes fell apart, however managed to come together again and every time in an improved formula.
The year 2012 may be characterized as period of preparation, a time to start a new cycle: becoming accessible not only to the academic field, but also to a worldwide audience of practitioners, devotees, younger generations and all who are interested in the library’s field of expertise, the Christian-Hermetic Gnosis. The Ritman Library is ready to share its infinite fire, to open its heart, the symbol which occupies a central place in the tradition of Gnosis. The heart represents the source of sensing, the door to the inner life in which the powers of creation are hidden but are always ready to be unlocked. The aspiration to fathom this source may be considered the hidden motive of man’s life. From the beginning, the Ritman library has always aimed to foster this aspiration by collecting the experiences of people throughout the ages, who have undertaken this journey to the heart.
Focussing on the foundation of a Scholarly Hermetic Circle and a Global Hermetic Circle, the library intends to encourage an interdisciplinary exchange of ideas and vivid debate on the living tradition and we invite all to take part in these conversations. In the coming years, we will concentrate especially on education, aiming to establish co-creative projects with universities, higher education institutions, art academies, but also primary schools. The circle in Scholarly Hermetic and Global Hermetic Circle is an apt symbol because it emphasizes infinity, wholeness and unity. It symbolizes a ‘sacred’ space, a place of trust in which learning and development are encouraged and in which there is room for trial and error. The circle is chosen to underline the dynamics of the community in forming and transforming itself. Secondly, it refers to the Gnostic tradition, which visualizes the circle as the Ouroboros, the world serpent that devours its own tail, thereby representing cyclicality and self-sustainability. This symbolism can also be associated with the foundation of a vibrant online and offline community able to operate in an open and free space of trust.
Looking backwards, it has been an enervating but also energizing two years for the library. Without your support, especially during the closing year of 2011, we would never have succeeded to navigate through the heavy storms of time. We would like to extend our warm thanks to all who have demonstrated their support in the past period, also to all academic brave hearts, who signed an online petition to keep the doors of the library open. Our deepest gratitude goes to prof. dr. W.J. Hanegraaff, head of the Center for the History of Hermetic Philosophy and Related Currents (GHF), the initiator of this petition. We are very much looking forward to continuing and deepening the collaboration with the Center and are proud to present the Infinite Fire Webinar Series as a joint initiative. Together with you, academic colleagues, friends, acquaintances, practitioners, supporters, fans and all of you, who may be touched by the library’s treasures in the future, we hope to bring the knowledge related to the big questions of our lives outside the walls of the Ritman library and lighting a spark in the hearts of people all over the world.
Together we aim to contribute to a future in which knowledge can be shared and discussed freely, a future in which everybody will be given the chance to learn, a future in which the world community will become conscious again of its roots. We are entering a new paradigm, an open paradigm in which consciousness, co-creation, communality, sharing, transparency, sustainability and a love for life in all its aspects will come to blossom. It is with great enthusiasm that we are looking forward to facilitating this open paradigm the best way we can and build this living future together with you.
Connected by the hart. Namaste.
Good to know you’re back!
I first heard of this library in 1984, when Joseph Ritman, a Dutch industrialist based in Amsterdam, turned his private collection of books and manuscripts on hermetic philosophy into a library open to the public. Mr. Ritman’s vision was to establish a library that would act as the focus for the study of hermetic philosophy into the next millennium. He employed a small staff to operate the library under the direction of Frans Janssen, who during the 1980’s and 1990’s were able to purchase a vast number of original books, manuscripts, as well as 20th century reference material.
The webinar series, named “Infinite Fire”, was officially launched last week, with a short talk by my colleague Dr. Peter Forshaw, a specialist in the history of alchemy. Future talks are being planned, to begin with by other experts present in Amsterdam (Wouter Hanegraaff and Marco Pasi). The idea is, however, to expand with time. So if you are a scholar working in an area related to the library’s collection, and you’re planning a trip to Amsterdam, I am sure that the BPH staff would love to hear from you. Perhaps you will do a brief interview or otherwise contribute to this collaborative, evolving “global hermetic circle”? | https://www.ritmanlibrary.com/2012/09/a-word-of-gratitude-to-the-living-future/ |
Into the saucepan: Carrots, red pepper, onion and mushrooms. All sliced and diced.
Into a pot: Wild rice, with a pinch of pink Himalayan sea salt.
Into a pot: Dumplings (made with soya milk)
Into the oven: Vegetarian (vegan friendly) sausages
End result = Delicious
#RandomRecipe
Last night I made up a random meal – I have no instructions. I chopped and tossed things into a saucepan and a couple of pots.
I’m no chef!
I never use any measurements, unless I’m baking – I just add to the cooking tool and hope for the best. I take peace in knowing that I use minimal salt, I don’t use cows milk, and 7/10 of my ingredients are whole foods. The rest are meat-free!
I always feel happy and unrestricted, too, as I know, my meal is healthy, and my body enjoys choosing health.
I hope you feel inspired to just take the plunge into the unknown, and cook freely. Enjoy eating clean, love eating green and most importantly, eat with NO REGRETS.
Preparing meals should be an enjoyable task, one should feel excellent for eating meals containing fruits and vegetables. Mother earth has many plant-based delights for all to taste and appreciate.
I remember preparing meals in the past, my main thought was ‘what meat shall I buy?’ and my second thought was, ‘chicken, I’ll buy chicken! That’s healthy.’ To satisfy my choice, I used to prepare a meat-based meal and add a vegetable or two, to it.
Back then, I hadn’t known how much I was damaging my body, my mind and my soul. Back then, I accepted the false facts that eating chicken is part of a healthy diet. It wasn’t back then, it isn’t right now, and it never will be.
I scoffed down buckets of chicken, alongside millions of others around our world. I loved the flavours that danced on my tongue and delighted my senses. I hadn’t realised it was the seasoning all along – the herbs and spices! They made the flavours, not the chicken, not any animal meat.
Many people around the world mock those who eat vegetarian/vegan based meals. However, the joke is on them, without herbs and spices which fall under plant-based living, your meat wouldn’t be so appetising.
I’m ecstatic about my choice to become vegetarian, I’m proud to consume plant-based milk, cheese and butter. I’m positive meat-eaters alike will be overjoyed once they switch to foods from our earth, rather than eating the remains of a life that once had a beating heart. | https://uniquefatso.com/2019/09/19/vegetarian-curry-by-uniquefatso/ |
Constellation Cetus represents a whale, or a sea monster, depending on the specific view and interpretation. The biggest star in this constellation is Deneb Kaitos, the tail of the whale, with a magnitude 2.2. This is a large constellation, with a surface that can be observed below and above the ecliptic. In the table you will find some important Cetus constellation stars.
|Current position||Fixed Star||Part of a constellation|
|02 ° A||DENEB KAITOS||Whale’s tail|
|22 ° A||BATEN KAITOS||Whale’s stomach|
|01 ° B||MIRA||Whale’s neck|
|09 ° B||KAFFALJIDHMA||Under the left eye of the Whale|
|14 ° B||MENKAR||Whale’s nose|
The whale behind the constellation of Cetus, the one in Greek mythology, represents a sea monster that was sent by Poseidon to kill Andromeda, chained naked, on a rock by the sea. Perseus saved her, killed this monster, and it was set in the skies as huge as it is to remind us of Perseus’ courage. The second story behind this constellation is the one important in Christian symbolism, connected to God’s messenger Jonah. Jonah was a simple man who didn’t want to spread religion as God intended him to, so he tried to run away across the seas. God changed the weather, making enormous waves on his way, and Jonah ended up in the sea and in the stomach of a big fish – a whale. He begged for forgiveness, giving promise that he will do as he was intended to, and God sets him free to be his voice on Earth and spread religion.
In general, any planets or house cusps in a very close conjunction to Cetus constellation stars represent a threat to a beautiful girl – “monsters from the sea” that will attack her, with her being saved or not by the hero she will end up with. But there is a special spiritual kick to stars in this constellation that shouldn’t be forgotten, especially if the star in the stomach of the whale is awake in one’s chart.
Cetus constellation stars speak of one’s personal relationship with God. It is a place where one has a mission they run away from, try to hide, only to get hurt, have a near death experience or end up in some sort of darkness of the Soul. This is a story of a man who ran away from God, so it represents our futile attempts to dismiss faith and act in our animalistic, and yet rational human nature. We can see the connection to Neptune and the axis of Virgo and Pisces here, as a person’s guiding light to find religion, or faith of any kind.
If you are linked to this constellation, the main thing you need to do is find faith within. This doesn’t have to be a religious effort, nor do you need to explain how the entire Universe came to exist. The faith you need to search for is the faith in yourself. You have to believe in YOU without a shred of doubt and without hesitation.
Source: The Sydney Morning Herald
The Faith we all search for is inside the whale, inside the stomach, not outside in the world. This is exactly what Cetus constellation stars want us to learn – to look within, believe in ourselves, and spread the magic of Faith where people have lost it. | https://astrologyrevealed.com/cetus-constellation-stars-how-do-you-connect/ |
In 2017, Virginia Democrats flipped fifteen seats in the Virginia House of Delegates with a sixteenth seat, decided by random drawing, that went to a Republican. Had the seat gone to a Democrat, each party would have had 50 seats, instead the split is 49 (D) to 51 (R). The 2017 election brought Democrats the closest they’ve been to controlling the House of Delegates since 1997. The Virginia Public Access Project reported that a total of $46.9 million was raised for the 2017 election, which was by all accounts one of the most expensive in history. It’s no surprise that in 2019, with all seats in both chambers of the state legislature up for election, that number has nearly doubled with close to $82.5 million reported at the end of September. Of that, $26.4 million was spent on broadcast, cable, digital, or radio advertising.
Digging In
Of all the races, the top five most expensive spent 44.48% or $10.5 million of the $26.4 million that has been spent this cycle. Four of those five races are for Senate seats, as there has not been an election for the VA State Senate since 2015 and Democrats came close to flipping the House of Delegates in 2017. The one House seat in the top five is currently held by House Speaker Kirk Cox (R). Overall, Democrats have a slight lead in spending, accounting for 56.41% of the total or $14.9 million, Republicans have spent $11.5 million. Outside groups, which this year account for 28.4% of spending, heavily favor Democrats with about two out of every three dollars from an outside group spent on behalf a Democrat. If the conventional wisdom that those who spend more win, Virginia could be looking at a blue State Legislature post-election.
The Lottery District
Though not in the top five most expensive races, there is another House district worth watching. House district 94 was decided by random drawing in 2017, and has seen surprisingly one-sided spending this cycle. Shelley Simonds (D) who is running against Republican incumbent David Yancey has spent over 7 times as much as Yancey in this race $360,000 to Yancey’s $50,000. This is Simonds 3rd time running for this seat against incumbent Yancey. She first lost by around 15% in 2015, then tied in 2017 and now is running for the seat after a U.S. District Court created new boundaries that shifted party identification within the district by 13 points in favor of Democrats. This is a visible trend across the state as multiple Republican districts went from safe to significantly less so, including HD-66, the seat of House Speaker Kirk Cox which went from 62.7% Republican to 53.2% Democratic. Shifting districts and heavy spending from the left are two significant factors in
Please note, the data in this post is current as of 2:30pm Eastern Time on Tuesday, November 5, 2019. | https://adimpact.com/blog/state-of-the-race-virginia-down-ballot/ |
Highlights:
The Enriched Learning Program (ELP) at LittleSPORT is a NEW learning opportunity for children ages 3 ½ to 5 years old. Designed to enhance any traditional preschool program, children will benefit from the subject-specific workshop that will focus on school readiness while also inspiring a spirit of exploration of the world around them.
The ELP will run in 14 week semesters and enrollment will be closed after the first three weeks of the session. The class enrollment will be capped at eight children per day.
This drop-off program will run from 1:00 – 3:00 PM on Wednesdays and Thursdays. Children may attend either or both sessions during each 14-week semester. Students must be potty-trained to attend.
Due to the length of the day, children enrolled in our AM pre-k on ELP days may not participate in PM class.
Daily Schedule:
Each day will start with 20 minutes of play time in the Arena. The group will then move into the classroom and engage in individualized and group activities centered around the concept of the day.
Wednesdays: Reading Readiness
Reading Readiness will encourage a love of reading and writing and provide a foundation of knowledge and skills for students as they move into kindergarten and beyond. Skills covered will include phonics, sight words, writing, and tracing.
Thursdays: Math/Science
Our Math and Science program will cover a broad array of mathematic and scientific concepts. Students will explore how math fits into the world around them and learn concepts like patterns, ordering, measurement, shapes, and counting. They will also begin to explore basic addition and subtraction. Science topics may include: The Human Body, Laboratory Science, Space and Planets, Animals and Energy.
Semesters:
Fall: September 11thto December 18th (Registration closes 9/27/19) – No class 11/27 & 11/28
Winter/Spring: January 8th to April 9th (Registration closes 1/21/20)
Cost: $450 per 14-week semester for one day, or $850 per semester for both days (Payment Plan Available)
Important:Enriched Learning Program (PM Sessions): No make-up sessions are offered for missed classes. No refunds or credits will be given for sessions missed for any reason.
To sign up, download, print, and complete our Registration Form & Guidelines:
———-> Print 2019/20 ELP Registration Form <———-
—-> Print Guidelines & Policies for Enriched Learning Program <—-
“Give-7” Terms, Conditions, Policies
2019-20 ELP School Year – Important Dates:
Sept. 11th – 1st Day of 1st Semester 2019-20 Enriched Learning Class!
Sept. 27th – Enrollment closes for semester
Nov. 27th – 28th– Thanksgiving Break – No Class
Dec. 18th– End of 1st Semester
—————————–
Jan. 8th– 1st Day 2nd Semester
Jan. 29th – Enrollment closes for semester
April 9th– Last Day of Class!
Class is taught by our certified teacher, Ms. Christine. The student/teacher ratio will be no greater than 8:1. Additionally, there is always a front desk coordinator or director on site to assist as necessary.
The maximum number of students in a class will be 8. Spaces are filled on a first come, first serve basis. Due to the nature of the instruction, enrollment will be closed 3 weeks after classes begin, regardless of the number of children enrolled.
Yes. While we will of course encourage potty breaks for potty-trained children, we cannot accommodate diaper changing during class.
The Enriched Learning Program is split into two 14-week semesters per school year. You may choose either semester or both, while choosing 1 day or 2, for your child/children. We do require commitment to at least 1 day during 1 full semester when you register.
You may enroll before or during the first 3 weeks of each semester. | https://www.littlesport.net/give7-pre-k-enrichment/enriched-learning-program/ |
1 Preparation to Place a Filling
Chapter 1:
1.1 Placing a Rubber Dam video
1.2 Placing a Matrix Band video
1.1 Placing a Rubber Dam
This video demonstrates how to place and remove a rubber dam including common safety precautions.
1.2 Placing a Matrix Band
An introduction to the tofflemire holder and matrix band. This video demonstrates how to load and place a tofflemire band on a typodont. It covers wedging, working parts, and proper orientation of the matrix and tofflimer. This technique is applicable to amalgam and composite restorations.
1.3 Supplies
Click the links below for lists and descriptions of the supplies needed for the procedures explained in the videos above.
- Amalgam Set Up: List and description of the supplies needed to place a two surface amalgam filling as described in Chapter 2.
- Composite Set Up: List and description of the supplies needed to place a two surface composite filling with a tofflemire band as described in Chapter 3 videos.
- Rubber Dam Set Up: List and description of the supplies needed to place a rubber dam
1.4 Transcripts
Video Transcript: 1.1 Placing a Rubber Dam
Using a rubber dam protects the patient from harmful dental materials and makes it easier to keep a clean dry field.
Review the materials and tools needed.
Stamp the dam with a punch guide.
It’s good practice to make a guide mark in the upper right quadrant. It’s easy to get turned around when the dam is partially inserted.
Choose the correct hole size
Make clean punch holes without rips.
Punch holes one place behind the prep through one past the midline. We will be working on #29 so, in this case, punch 30- 24.
Choose the proper clamp and place a ligature on the arch with a simple cow hitch also known as a larks head knot. The ligature is always on the buccal side to keep it out of your way while working. And the larks head knot allows you to move it from side to side if needed.
Use the clamp forceps to place the clamp one tooth behind the prep. Check that it is secure and does not rock. If it does, reposition or get a different clamp.
Thread the ligature through the rubber dam in the #30 slot and gentilly wiggle the clamp loop through the hole. It’s ok to use a non bladed instrument to help with this steep.
Use the guide hole to orient the dam and place the upper right frame pin in it.. Pull the other corners tight and secure.
Stretch the dam and slide each tooth into the corresponding hole pushing it into the occlusal embrasure.
Carefully floss each section through the contact.
secure the final tooth with a widget if needed.
Finally invert the rubber dam into the gingiva to create a seal with a plastic instrument
Now you’re ready to place a filling!
To remove the dam, loop an explorer through two holes and pull tight to expose the interdental piece. This makes it easy to cut the dam out without accidentally cutting your patient.
When all the interdental pieces are cut, remove the dam, frame, and clamp checking that no pieces are left behind.
It’s just that easy!
Video Transcript: 1.2 Placing the Matrix Band
You will need a tofflemire holder, matrix band, cotton pliers, wedge, and ball burnisher.
Know the parts of the Tofflemier holder.
The outer knob adjusts the spindel while the inner knob adjust the diagonal slot holding the matrix band. Turning the right tightens and turning to the left loosens.
Begin with the outer slot holder close to the inner slot holder and the spindle pin removed from the diagonal slot.
When placing the matrix band, consider the shape. Gently press the outer edges of the matrix band, aligning them together. This will create a circle.
The smaller circumference will face the gingiva. Place the ends of the matrix band with the smaller circumference facing the slots being careful not to pinch the matrix band as this will leave a crease.
Orientate the matrix band through the outer slots straight.
Bring the band close to the tooth you’ll be working on. Determine whether the matrix band should come from the right or the left knowing that it will need to end with the slots down and the smooth surfaces up towards the crown.
Adjust the matrix band toward either the right or left orientation using the outer knob to loosen the hold in the diagonal slot of the matrix band if needed.
Now tighten the outer knob making sure that the diagonal slot is close to the outer slots.
Using the smooth part of the ball burnisher stretch the matrix band from the mesial and distal aspect so that the loop is longer from mesial to distal than buccal to lingual.
Now you’re ready to place this on your tooth.
The tofflemire will rest on the buccal side with the slots pointing toward the gingiva.
Pull the tofflemire toward the buccal closing the gap.
Now adjust the knob to reduce the circumference of the matrix band while checking to make sure the outer knob is still secure.
Now you’re ready to wedge the tooth.
Grasp the wedge with the cotton pliers on the square end. Aiming the pointed end toward the gingiva move from the lingual to the buccal inserting the wedge in the embrasure space.
Once it is secure, flip the cotton pliers to the flat end to push the wedge into place.
Overwedging will make the contact too tight while under wedging will leave the contact too loose.
When the wedge is properly inserted, the gap between the matrix band and the floor of the prep will close.
Let’s watch that again.
Now you’re ready to burnish the contact.
Failure to burnish will result in a contact that is not tight, and an embrasure space that is not well shaped.
Use the ball burnisher side to side and up and down, burnishing the matrix band along the contact of the adjacent tooth.
This will leave a small mark in the matrix band.
And now you’re ready to place a filling. | https://mhcc.pressbooks.pub/restorativedentistry/chapter/preparation-to-place-a-filling/ |
Water Quality Protection District
We all need clean water. We drink it. We fish, swim, boat and enjoy it in our streams and lakes. It irrigates our crops, is used by our businesses, and helps keep our yards and parks green. The Lewis and Clark County Water Quality Protection Districthas worked to preserve, protect, and improve water quality and quantity since 1992.
WQPD Board Meeting - January 28, 2020, at 5:30, Room 226 of the City-County Building, 316 N. Park Ave. Board Agendas
LHWG Meeting -Visit the LHWG website for more information. LHWG
_________________________________________________________________________
East North Hills - James Swierc presentation -ENH presentation
_________________________________________________________________________
Groundwater levels in the Tenmile Creek Area - Check the groundwater levels in the Tenmile Creek area. Water levels will vary depending on location. Check back periodically as we are updating levels weekly.
The WQPD's monitoring plan to collect groundwater information in the Tenmile Creek flood zone during flooding events.
Click here for results and discussions on groundwater levels, recharge, and other factors that led to the 2018 flooding in the Helena Valley.
If you were unable to make any of the informative flood meetings in early 2019, the WQPD provided the presentations for you to view. They offer helpful links in case you want to track water levels both with surface water and groundwater.
As you are scrolling through the slides, please note the conversation box in the upper left hand of each slide of the WQPD presentations. A description and/or explanation of the slide was provided for each.
Please let your neighbors know that this information is here.
January 24th WQPD presentation,
February 28th WQPD presentation,
County Agencies Contact Information:
Disaster & Emergency Services, 406-447-8285 - Public Information Hotline, 406-447-1605
Environmental Health, 406-447-8351 - Drinking Water, Well Safety, Sewage, Septic Systems
Public Health, 406-457-8900 - Food Safety, Mold, Shelter Inspections, Disease Control
Public Works, 406-447-8037 - Road Repair, Bridge Repair, Culverts
Sheriff's Office, 406-457-8235 (non-emergencies) - Evacuation, Traffic Control, Road Closures
Planning & Floodplain Administration - 406-447-8394
Start out the new year by sampling your private well and find out if it is safe to drink!
Reduced Cost Water Sampling Kits Available. Annual well water testing is the only way to know if your water is safe. Stop by the City-County Building, room 224 to pick up your drinking water sampling kit. This kit is offered at a reduced cost, plus you can receive an additional $25 reimbursement from the L&C Conservation District. For more information on the program click here: MSU Extension Water Quality
Montana Water Supply Report - Not available
Stream Gage reports - Surface Water Assessment and Monitoring Program
National Groundwater Awareness Week is March 8-14, 2020 but anytime is a good time to sample your well. Stop by and see us and let's talk about your well.
This is a great reminder to test and protect your groundwater. What will you do to protect your groundwater? Take advantage of the reduced cost sampling program. Kits are available at the City/County Building, Room 224. | https://www.lccountymt.gov/health/water.html |
Three tiny qubits, another big step toward quantum computing
(PhysOrg.com) -- The rules that govern the world of the very small, quantum mechanics, are known for being bizarre. One of the strangest tenets is something called quantum entanglement, in which two or more objects (such as particles of light, called photons) become inextricably linked, so that measuring certain properties of one object reveals information about the other(s), even if they are separated by thousands of miles. Einstein found the consequences of entanglement so unpalatable he famously dubbed it "spooky action at a distance."
Now a team led by Yale researchers has harnessed this counterintuitive aspect of quantum mechanics and achieved the entanglement of three solid-state qubits, or quantum bits, for the first time. Their accomplishment, described in the Sept. 30 issue of the journal Nature, is a first step towards quantum error correction, a crucial aspect of future quantum computing.
"Entanglement between three objects has been demonstrated before with photons and charged particles," said Steven Girvin, the Eugene Higgins Professor of Physics & Applied Physics at Yale and an author of the paper. "But this is the first three-qubit, solid-state device that looks and feels like a conventional microprocessor."
The new result builds on the team's development last year of the world's first rudimentary solid-state quantum processor, which they demonstrated was capable of executing simple algorithms using two qubits.
The team, led by Robert Schoelkopf, the William A. Norton Professor of Applied Physics & Physics at Yale, used artificial "atoms"—actually made up of a billion aluminum atoms that behave as a single entity—as their qubits. These "atoms" can occupy two different energy states, akin to the "1" and "0" or "on" and "off" states of regular bits used in conventional computers. The strange laws of quantum mechanics, however, allow for qubits to be placed in a "superposition" of these two states at the same time, resulting in far greater information storage and processing power.
In this new study, the team was able to achieve an entangled state by placing the three qubits in a superposition of two possibilities—all three were either in the 0 state or the 1 state. They were able to attain this entangled state 88 percent of the time.
With the particular entangled state the team achieved, they also demonstrated for the first time the encoding of quantum information from a single qubit into three qubits using a so-called repetition code. "This is the first step towards quantum error correction, which, as in a classical computer, uses the extra qubits to allow the computer to operate correctly even in the presence of occasional errors," Girvin said.
Such errors might include a cosmic ray hitting one of the qubits and switching it from a 0 to a 1 state, or vice versa. By replicating the qubits, the computer can confirm whether all three are in the same state (as expected) by checking each one against the others.
"Error correction is one of the holy grails in quantum computing today," Schoelkopf said. "It takes at least three qubits to be able to start doing it, so this is an exciting step." | https://phys.org/news/2010-09-tiny-qubits-big-quantum.html |
Compute the number of "True" values in an OR-Pascal-triangle structure.
Your job is to count the number of nodes in the OR-Pascal-triangle that contain the value 1 (this number is 11 for the animation above).
that, given an array P of N Booleans, returns the number of fields in the OR-Pascal-triangle built on P that contain the value 1. If the result is greater than 1,000,000,000, your function should return 1,000,000,000.
Given P = [1, 0, 0, 1, 0], the function should return 11, as explained above.
Given P = [1, 0, 0, 1], the function should return 7, as can be seen in the animation below.
N is an integer within the range [1..100,000].
Your job is to count the number of nodes in the OR-Pascal-triangle that contain the value true (this number is 11 for the animation above).
that, given an array P of N Booleans, returns the number of fields in the OR-Pascal-triangle built on P that contain the value true. If the result is greater than 1,000,000,000, your function should return 1,000,000,000.
Given P = [true, false, false, true, false], the function should return 11, as explained above.
Given P = [true, false, false, true], the function should return 7, as can be seen in the animation below. | https://app.codility.com/programmers/task/pascal_triangle/ |
What is an Edupreneur?
An Edupreneur is anyone who acts on passion to improve the quality of education, anyone who learns in innovative ways, and anyone who takes a risk to redefine education. The Edupreneur Podcast is a platform to explore the minds of and learn from these students, teachers, administrators, and entrepreneurs.
Meet the hosts
Zack Baker
Zack is a student and entrepreneur pursuing a degree in Philosophy at UC Berkeley in California. He has a passion for entrepreneurship, computer programming, and people. Zack started computer programming at a young age and runs his own startup, PassWhiz. In addition to his startup, Zack has founded computer and technology outreach programs to help elementary school students, senior citizens, and everyone in between take advantage of technology.
Pete Freeman
Pete Freeman is a student and entrepreneur studying sociology, gender studies, and international peace studies at the University of Notre Dame. Pete is passionate about developing and implementing unique approaches to education that produce proven, measurable outcomes for marginalized students and communities. He is a TEDx speaker, meditation enthusiast, and loves stopping by his mother’s kindergarten classroom to visit with her students. | https://www.theedupreneur.org/main-index/ |
?
22536
Calculate the least common multiple of 270 and 540.
540
Find the common denominator of -11/72 and -71/18.
72
Calculate the smallest common multiple of 249 and 9.
747
Find the common denominator of 51/32 and 59/772.
6176
What is the least common multiple of 343 and 8?
2744
Calculate the common denominator of -49/1860 and 59/24.
3720
What is the common denominator of 41/180 and -1/3?
180
What is the smallest common multiple of 252 and 5670?
11340
What is the common denominator of -23/18 and -79/1404?
1404
Find the common denominator of 35/8 and 77/412.
824
What is the smallest common multiple of 44 and 209?
836
What is the common denominator of -31/1349 and -38/639?
12141
Calculate the common denominator of 11/15 and -121/10.
30
What is the common denominator of -103/72 and 97/186?
2232
What is the common denominator of -20/911 and 45/14?
12754
What is the common denominator of 13/990 and -74/135?
2970
What is the least common multiple of 1495 and 30?
8970
What is the least common multiple of 3 and 876?
876
What is the smallest common multiple of 12 and 1638?
3276
Calculate the smallest common multiple of 42 and 12.
84
Calculate the smallest common multiple of 75 and 5.
75
What is the least common multiple of 33 and 7?
231
What is the least common multiple of 12 and 5530?
33180
What is the least common multiple of 8 and 3772?
7544
Calculate the least common multiple of 104 and 416.
416
Calculate the lowest common multiple of 9780 and 12.
9780
What is the common denominator of 43/2 and -6/137?
274
What is the lowest common multiple of 102 and 36?
612
What is the common denominator of -49/228 and -107/120?
2280
Calculate the common denominator of -65/16 and 107/104.
208
What is the smallest common multiple of 353 and 4?
1412
What is the common denominator of 37/252 and -97/140?
1260
Calculate the common denominator of -17/16 and -21/5980.
23920
Calculate the smallest common multiple of 30 and 1020.
1020
Calculate the common denominator of 33/86 and -19/8.
344
Calculate the common denominator of -32/265 and -14/1215.
64395
What is the lowest common multiple of 8112 and 3432?
89232
What is the common denominator of 81/380 and 37/40?
760
Find the common denominator of 7/24 and -49/3408.
3408
What is the smallest common multiple of 795 and 424?
6360
What is the common denominator of -53/18 and -107/6?
18
Calculate the common denominator of 25/2 and -69/68.
68
What is the common denominator of 121/90 and 41/114?
1710
What is the lowest common multiple of 3 and 1866?
1866
Calculate the common denominator of 61/12 and 59/806.
4836
Calculate the common denominator of 157/198 and -75/176.
1584
Find the common denominator of 131/42 and 52/9.
126
Calculate the least common multiple of 1 and 4.
4
What is the common denominator of -77/114 and -137/18?
342
Calculate the least common multiple of 24 and 591.
4728
Find the common denominator of -23/231 and 53/9.
693
What is the common denominator of -115/8834 and 49/4?
17668
What is the common denominator of -31/108 and 73/72?
216
What is the lowest common multiple of 136 and 44?
1496
Find the common denominator of 25/11306 and -41/4.
22612
Calculate the common denominator of -5/454 and -23/908.
908
Calculate the least common multiple of 28 and 70.
140
Calculate the smallest common multiple of 66 and 402.
4422
What is the common denominator of 10/93 and 10/27?
837
What is the common denominator of -69/392 and -35/4?
392
Calculate the common denominator of -137/120 and 81/160.
480
What is the least common multiple of 6 and 118?
354
Calculate the common denominator of -13/4 and -4/41.
164
Calculate the least common multiple of 209 and 33.
627
What is the smallest common multiple of 7163 and 4147?
78793
Calculate the least common multiple of 1099 and 35.
5495
What is the common denominator of -191/4080 and 47/4080?
4080
What is the least common multiple of 231 and 657?
50589
Calculate the common denominator of -6/5257 and -50/49.
36799
Calculate the common denominator of 59/20 and 9/40.
40
Calculate the lowest common multiple of 195 and 741.
3705
What is the common denominator of -105/92 and 3/8?
184
What is the smallest common multiple of 135 and 270?
270
Calculate the smallest common multiple of 273 and 429.
3003
Calculate the lowest common multiple of 461 and 6.
2766
Find the common denominator of 131/390 and -111/130.
390
Calculate the lowest common multiple of 324 and 164.
13284
What is the common denominator of -15/77 and 113/182?
2002
Calculate the common denominator of 69/20 and 19/92.
460
Find the common denominator of 73/8 and 44/67.
536
Calculate the common denominator of 73/90 and -19/234.
1170
What is the lowest common multiple of 27 and 3?
27
Calculate the least common multiple of 48 and 88.
528
What is the common denominator of 27/8 and -97/204?
408
What is the smallest common multiple of 136 and 408?
408
Calculate the common denominator of 77/190 and 1/1919.
19190
Find the common denominator of 1/614 and -77/4.
1228
What is the common denominator of 92/255 and 117/50?
2550
What is the smallest common multiple of 5 and 5?
5
What is the common denominator of -19/5958 and -13/3972?
11916
Find the common denominator of 81/8 and -23/236.
472
Calculate the common denominator of -73/612 and -13/1188.
20196
What is the common denominator of -61/6 and 32/6105?
12210
Calculate the common denominator of -75/314 and -99/34.
5338
Calculate the smallest common multiple of 860 and 8.
1720
What is the common denominator of -27/4 and -53/6?
12
Calculate the smallest common multiple of 344 and 72.
3096
Find the common denominator of 149/294 and 77/10.
1470
Calculate the least common multiple of 60 and 50.
300
What is the common denominator of 33/2716 and -131/6?
8148
Calculate the smallest common multiple of 12 and 2012.
6036
What is the smallest common multiple of 244 and 12?
732
What is the common denominator of 119/78 and -67/885?
23010
What is the smallest common multiple of 9280 and 20?
9280
Calculate the smallest common multiple of 868 and 28.
868
Calculate the lowest common multiple of 3822 and 6006.
42042
Find the common denominator of 11/78 and 75/16.
624
What is the lowest common multiple of 6 and 48?
48
Calculate the common denominator of 67/8622 and 97/8622.
8622
What is the lowest common multiple of 112 and 160?
1120
Find the common denominator of -15/664 and -9/2.
664
What is the common denominator of 59/42 and 65/2066?
43386
What is the common denominator of -79/16 and 61/108?
432
What is the smallest common multiple of 1215 and 126?
17010
What is the common denominator of 61/352 and 27/440?
1760
What is the lowest common multiple of 230 and 1265?
2530
What is the lowest common multiple of 10 and 122?
610
Calculate the common denominator of 14 and -89/768.
768
What is the lowest common multiple of 90 and 2?
90
What is the lowest common multiple of 2 and 4329?
8658
Calculate the least common multiple of 10 and 2.
10
Calculate the least common multiple of 10 and 60.
60
What is the lowest common multiple of 64 and 3376?
13504
Calculate the common denominator of -73/594 and -119/110.
2970
Calculate the lowest common multiple of 1384 and 1730.
6920
Find the common denominator of 45/56 and -67/6.
168
What is the smallest common multiple of 642 and 107?
642
What is the lowest common multiple of 5 and 41?
205
Calculate the lowest common multiple of 54 and 2214.
2214
Find the common denominator of -1/12 and -3/14278.
85668
What is the common denominator of 119/216 and -23/162?
648
What is the common denominator of -5/6 and 143/228?
228
What is the common denominator of 7/6 and -51/676?
2028
Calculate the common denominator of -101/3712 and 89/20.
18560
Find the common denominator of 111/28 and 113/140.
140
Calculate the common denominator of 41/70 and 49/52.
1820
What is the smallest common multiple of 776 and 2134?
8536
Calculate the common denominator of 25/934 and -22/6071.
12142
What is the common denominator of -59/462 and 95/126?
1386
What is the common denominator of 57/830 and -57/4?
1660
Calculate the common denominator of 38/4311 and -76/15.
21555
What is the least common multiple of 88 and 8?
88
What is the common denominator of -31/88 and -21/506?
2024
What is the lowest common multiple o
| |
Dementia, and specifically Alzheimer’s, is a serious, growing problem. In fact, 1 out of every 10 adults over the age of 65 has Alzheimer’s dementia. As Northbrook's senior population continues to grow (14.29% growth between 2014 and 2019), so does the concern about aging and the risk of cognitive impairment.
In Northbrook, the number of deaths for those 65 and older caused or partly caused by Alzheimer’s disease increased 3.4% between 2014 and 2019. To put that into perspective, the number of deaths from all causes for that same age group only increased by 1.5%, showing that Alzheimer's is a growing concern in the region. Overall, the percentage of seniors’ deaths related to Alzheimer’s is higher than the rest of the nation (8.1% in Northbrook vs. 6.46% in the U.S.).
To help families and caregivers of those with Alzheimer’s or other forms of cognitive impairment find the support and care their loved ones need, we applied our unique methodology and spent dozens of hours researching senior living communities in Northbrook. In addition to an overview of the communities’ best features, this guide highlights the best memory care facilities in the city, and gives information about pricing, types of care provided, residents’ reviews, and more.
Table of Contents
According to the Alzheimer’s Association, 83% of all caregivers are unpaid family members, relatives, or other friends, and nearly half of all care is for older adults with some form of dementia. Caregiving, especially when it involves Alzheimer’s or dementia, is extremely exhausting and time consuming, leading many caregivers to feel isolated and overwhelmed.
As a loved one continues to progress through the stages of dementia and his or her cognitive abilities continue to decline, behavioral problems, safety, and general care often become more than one caregiver can handle. This is when it’s important to find extra help, and residential facilities that have specialized memory care programs are often the best solution.
In addition to providing a safe environment, memory care programs seek to delay or halt cognitive decline while providing the opportunity for a social, independent lifestyle.
To choose the best memory care facilities in Northbrook, our team of researchers started by using our unique methodology to develop a list of contenders. We further refined the list in the next phase of our process by completing hands-on research for each one of the companies that we developed. Finally, we compiled online reviews from residents and families and wrote summaries of each facility that made it through our selection process.
Overall, our team:
North Shore Place uses its Embrace system to deliver all-encompassing memory care to seniors living in its neighborhood. Residents follow individualized routines and participate in activities matched to their abilities as they receive support and guidance from caregivers, who also handle medication management needs. This community takes care of weekly housekeeping and laundry services for residents so they have more time to enjoy social activities in the communal rooms as well as the outdoor spaces, which are open to everyone in the community. A secured courtyard prevents seniors in the memory care neighborhood from leaving unsupervised.
Family members praise caregivers and administrators at North Shore Place. One says "I was very impressed with how caring and attentive the staff were. I have also found the staff extremely responsive to any questions I have about my parents' health and happiness, including the directors of medical care and activities."
Arden Courts of Northbrook offers a safe, welcoming environment for memory care residents. Each resident undergoes an initial assessment by a trained professional to receive an individualized care program. Levels of ability, interests and needs are taken into account, and care alters as these change. The layout of the community ensures residents are secure. Designed as four self-contained houses, each pod shares areas such as the activity room, beauty salon, porch and extensive walking paths. Visual cues and colors help with navigation and to stimulate memories. Residents may bring their own furnishings or use those belonging to the community. Structured activities and programs help keep community members engaged and mentally stimulated. Staff is available 24/7, and each one offers compassionate, understanding care. Three nourishing daily meals and snacks ensure residents eat well, and assistance with dining is provided.
Family members believe the community offers a good environment. A loved one says, "I was particularly impressed by the physical layout and the safety of the facility. The residents are able to move around the entire facility as well as move outside to the secure walking paths and outside garden areas." Another comments "Arden Court has amazing staff."
An award-winning community just 15 minutes from Chicago's bustling downtown, Sunrise of Park Ridge offers a high level of care within close reach of department stores, movie theaters and restaurants. Its Reminiscence neighborhood is a secure, intimate environment specially designed for residents living with Alzheimer's and other dementias. Through personalized plans, the community's trained team offers support with bathing, dressing, grooming and medication while getting to know residents' needs, monitoring behaviors and encouraging socialization. The neighborhood features relaxing common areas, activity spaces for residents to enjoy art projects, puzzles and crafts, soft-lit reflection rooms for holding club meetings and secure outdoor areas, plus friendly resident pets to encourage a sense of home. Activities include range from multisensory experiences to local outings, art and music therapy, exercise classes and small group programming.
Visitors note the ambiance and experienced staff. "The place had a nice relaxed warm vibe to it," says one reviewer. "I like that they have a dog and two cats there. I love all the details of how they ensure disabled people keep their dignity. ... So many of the staff have been there many years."
Life at Belmont Village Senior Living Buffalo Grove provides residents with comfort and assistance in a peaceful setting with hospitals nearby. The community features enriching programs and activities tailored to suit the unique needs of seniors with Alzheimer's and other forms of dementia. The staff follows a person-centered approach to care for residents with memory loss, assisting them with daily living and medication management. The Whole-Brain Fitness Program helps improve the brain health of residents and nurtures their mind, body and spirit. Seniors remain safe and comfortable with the help of 24/7 on-site healthcare and clinical staff. Residents can access a fitness center, outdoor seating areas and an on-site salon. Seniors can savor three delicious and nutritional chef-prepared meals in a restaurant-style setting. Special dietary menus are also available.
Located in a peaceful residential neighborhood, Belmont Village Senior Living Glenview offers a broad spectrum of care services for seniors, minutes away from the Northshore Glenbrook Hospital and Advocate Lutheran General Hospital. The community offers individualized care plans, which focus on the unique needs and abilities of residents living with Alzheimer's, dementia and other memory limitations. An on-site licensed nurse and trained staff are available 24/7 to assist residents with wellness checks, medication management and activities of daily living. Seniors are encouraged to socialize and participate in various activities organized in a safe, secure and monitored setting. The community follows an ability-centered and adaptive enrichment approach to help residents maintain their physical and mental well-being. Whole-brain fitness programs and physical, occupational and speech therapies help residents improve their agility, flexibility and strength. Residents can relish chef-prepared delicious meals that adhere to their specific dietary requirements.
Nestled in a suburban community just 30 minutes outside Chicago, Sunrise of Highland Park provides award-winning memory care with convenient access to city amenities. Through individualized service plans, residents receive the assistance they need 24 hours a day. Purposefully designed for seniors with Alzheimer's and related dementias, the Reminiscence neighborhood features secure areas that promote easy navigation, with spacious living and dining areas adjacent to resident suites, softly lit reflection rooms with relaxing elements and country-style kitchens. Chef-prepared meals feature fresh choices paired with resident preferences via tablet technology. Trained in validation therapy, life enrichment managers learn about personal needs and preferences, ask open-ended questions and put their full focus on every resident, becoming trusted care partners. Seniors enjoy days filled with multisensory experiences, exercise classes, art projects, puzzles, group activities and outings to local attractions.
Visitors like the amenities and robust schedule. "They had a lot of activities for family who came in and out all day long," says one reviewer. "They could have meals with them. They could go for walks. It was close to places downtown. They showed me the library. ... They served two or three meals a day."
Emerald Place is located close to Glen View Town Center. Among the many features of the community is the state-of-the-art reporting system that keeps residents safe. This specialist Alzheimer and dementia community offers residents stimulating activities and lifestyle programs that engage the mind, body and soul. The residents receive the very best specialized care from the trained staff who treat them with a personal touch and dignity according to their specific needs. To keep residents' minds engaged, there is a wellness program that provides social and therapeutic activities geared to the resident's needs in a safe, nurturing environment. The tasty, nutritious meals prepared by the chefs are served to residents three times a day and are designed to match their personal preferences.
Residents and their family members only have amazing things to say about this community, particularly about the loving nature of the staff. One relative said, "There are simply not enough words to say how blessed and truly grateful I am to the team at Emerald Place...They are simply the best...and will make you feel part of them as they are truly one big family. I will be forever grateful to them!!!!"
Summit of Uptown welcomes seniors living with dementia to its Evergreen memory care neighborhood, which creates a safe and structured environment where skilled nurses tend to each resident's daily health needs and licensed therapists offer physical and cognitive therapy. This community, which has served those with dementia for over 30 years, coordinates social engagement between residents as well as shared meals that provide a sense of community. Medication management, housekeeping and other cleaning services are provided. Summit of Uptown's concierge team helps family members coordinate travel plans and other arrangements.
Family members are positive about the dementia care program at Summit of Uptown. One relative comments, "Summit of Uptown has done a wonderful job caring for my mother who has dementia. She can be disruptive and difficult, but they have been patient and caring."
The Landing on Dundee Senior Living, owned and operated by the senior living company Frontier Management, offers Frontier's award-winning memory care program, SPARK. The program, based on the research of Maria Montessori, helps significantly improve skills, increase engagement and give a sense of purpose to those with memory loss. Each new memory care resident is assigned a concierge to make sure they have a smooth transition into the community. The care team uses proprietary assessment tools beyond traditional healthcare assessments that focus on what each resident can do instead of what they cannot. Caregivers also employ therapeutic techniques, including occupational, physical and speech therapy, and specialized touch-screen technology to ensure 1residents remain engaged and fulfilled. SPARK also offers residents lifelong learning opportunities through various programs, such as group crafts, guest speakers and interactive lectures.
Family members rave about the staff and the care provided, and they love how beautiful this community is. One writes, "My Aunt is currently living in this community. It is brand new and so beautiful, but we are so impressed with the care and staff. Everyone has been so great and she is so happy."
Located in the heart of Lake Country, The Auberge at Highland Park offers residents a holistic experience with private rooms in its safe memory care community. The award-winning SPARK memory care program keeps residents engaged through regular activities such as town hall meetings or social events such as cheese and wine evenings. The on-site, specialized staff and a skilled nurse provide health care 24/7, and occupational and speech therapy are available, as are trips to the doctor's office, health care plans and medication management. Seniors can also participate in a range of creative programs and group exercise classes daily. Homemade soups, delectable salads and seasonally based entrees are served in the communal dining room.
My wife has been a resident of Auberge for more than a year, during which time she has received the kindest of care by staff and nurses who see their work as a calling and who genuinely love their residents. It doesn't get better. ... I recommend Auberge warmly, says one family member of a resident.
Harbor House is a safe and secure environment providing memory care to seniors with Alzheimer's and dementia. Residents live in one of three separate homes, based on the stage of their condition reside. Specially trained staff is available 24/7 to provide personalized assistance with bathing, dressing, grooming, toileting, eating and ambulation. Since each home houses a small number of seniors, the high staff-to-resident ratio allows caregivers to provide more personal attention to help address clinical and psycho-social issues related to memory loss. Group and individual programs engage residents in life-enriching activities. Residents can get some fresh air in the enclosed outdoor patio or take a stroll on the beautifully landscaped walking path. Three delicious and nutritious meals are served family-style.
People love the resident-to-staff ratio and excellent care provided by experienced staff members. One family member says, "I appreciate the small group setting, which provides for more personalized. hands-on care and provides a community for both residents and their family, you know the people there and they know you. Very supportive to the patient and those who love them."
The Sheridan at Park Ridge offers an award-winning memory care program, embrace Memory Care, that supports the mind, body and soul of each resident dealing with memory loss. It provides a personalized and holistic experience that sparks the imagination and promotes social connection while keeping each resident safe. The care team, available 24 hours a day, helps residents with various activities of daily living, including dressing and grooming. Assistance with household tasks, such as daily tidying-up, weekly housekeeping and laundry services, is also provided. Residents enjoy restaurant-style dining with support for special dietary needs, including customized diets, pureed meals and feeding assistance. The on-site staff performs regular wellness checks and provide medication reminders, while transportation is available to residents who need to go offsite for doctor's appointment. This community offers a wide variety of activities, including happy hours and outings.
Family members love the caring staff. One writes, "My grandma is happy to call The Sheridan at Park Ridge her home. The place is very clean and well kept. The staff is caring and can be trusted to go the extra mile to accommodate the residents' needs. I'd highly recommend The Sheridan at Park Ridge."
An award-winning community nestled in a suburban setting, Atria Glenview provides the full spectrum of senior support, from independent living to memory care. Life Guidance is a specialized program for residents living with Alzheimer's and related dementias, with 24-hour assistance available from specially trained caregivers. From help with bathing and grooming to medication management and transportation to local appointments, staff is standing by. Residents also enjoy a lively lifestyle filled with engaging activities, including daily exercise programs, such as stretching, dancing and restorative yoga. Through music and social events, seniors can boost mood, improve focus and connect with fellow residents. The environment is designed to feel like home, with memory displays for favorite photos and mementos, artwork featuring local landmarks and cozy common areas. Through the Culinary Excellence program, seniors enjoy seasonal meals made from scratch, all presented with restaurant-style service.
Loved ones praise the friendly, compassionate team. "Witnessing the opening and welcoming of new residents gave me goosebumps. The employees are absolutely wonderful," says one relative. "They really roll out the red carpet with love, professionalism and compassion. I heard a new resident say after her first night, 'This is truly amazing!'"
Atria Highland Park offers a full spectrum of care in a convenient location, just a short distance from Route 41. Residents living with memory loss experience person-centered support through the Life Guidance program, specially designed for those affected by Alzheimer's and other dementias. A highly trained team is available 24/7, helping with bathing, grooming and medication management to provide peace of mind. Daily activities focus on physical activity and social connections, with opportunities to stretch, dance, work with weights or try restorative yoga, and diverse programs use music to encourage social connections and awaken memories. Within the secure Life Guidance neighborhood, residents have memory displays equipped with their favorite photos and mementos, artwork with nostalgic images and furniture arranged to feel like home. Transportation is provided to off-site appointments, events and errands.
Loved ones appreciate the convenient layout. "Living in Memory Care is like living in a house with other people," says one reviewer. "My mom has a beautiful unit ... a large bedroom with a nice entryway. ... She walks out her door and there she is in the living area with lovely furnishings, a huge tv, gorgeous fireplace."
Wickshire Wilmette is a senior community with a bed-and-breakfast atmosphere that enables older people with memory care needs to live within a friendly and secure environment as they receive 24/7 attention. It schedules dementia programming to address each person's specific circumstances and organizes activities that provide mental stimulation and opportunities to socialize with peers. This community performs consistent maintenance of each resident's apartment and the entire grounds, so they can live in a clean and comfortable environment as dedicated caregivers help them to fulfill personal needs such as eating, bathing and getting dressed. Restaurant-style dining service simplifies mealtimes for residents at Wickshire Wilmette while still offering them various choices each day and tailoring meals to their preferences and dietary requirements. A wellness center is available.
Family members are satisfied with the amount of individual attention residents receive from caregivers at Wickshire Wilmette. One says, "The staff to resident ratio is higher than many facilities, which is especially important since the facility specializes in dementia and Alzheimer's."
Elevate Saint Andrew is a senior living community provides a dignified life for those with dementia and other memory impairments in a secure and friendly environment. Its Reflections memory care program is staffed by trained caregivers who help older adults with bathing, dressing, grooming, incontinence care and other daily living tasks. On-call nurses and visiting physicians manage the resident's medications and any health needs that arise. A wireless personal emergency response system allows seniors to call for assistance 24/7. Other amenities and services at Elevate Saint Andrew include housekeeping, laundry, garbage removal, chef-prepared meals and a beauty salon/barber shop.
Elevate Saint Andrew works with families, staff and physicians to design a care plan that meets the needs of each resident. One reviewer remarks, "Elevate Saint Andrew Living Community was nice. The staff was very friendly and very helpful. The facility was clean and very well kept. I liked the rooms too. They were nicely kept and large enough for my sister."
Hartwell Place is an adult care community serving those with dementia and other memory conditions on an intimate campus within a residential neighborhood. Art therapy, including both music and memory therapy, is a prominent aspect of the memory care programming at this community. Aside from enrichment and socialization, residents also have their medical needs tended to by skilled nurses and their personal needs, such as room cleaning, laundry, and hygiene needs, handled by professional caregivers who also help them to complete various day-to-day tasks. Hartwell Place maintains a high caregiver-to-resident ratio so that its seniors can access caregivers at any time. This community is secured to prevent anyone from wandering off or accidentally hurting themselves.
Many family members are particularly satisfied with the nurturing environment fostered by caregivers at Hartwell Place. One says, "Without exception, all of the caregivers have demonstrated a genuine compassion and empathy for the residents under their care. They know the patients intimately and adapt their caregiving to the needs of each individual."
The Carrington at Lincolnwood places emphasis on providing an environment of well-being and engagement. The Tessera long-term memory care neighborhood offers personalized care to residents in a secure environment. Residents in the private and shared studio and companion suites bring their own furnishings to make them feel completely at home. The enclosed courtyard and walking paths provide space for relaxing and socializing. Trained staff members care for community members in a compassionate, dignified manner, and activities include exercise such as stretching, swimming and walking, while music and art enrich the lives of residents. The Carrington at Lincolnwood also has a bridging care program, Mezzanine, that caters for residents in between assisted care and memory care. Residents receive individualized assessments and partake in engaging and therapeutic activities separately or in group settings.
Family members and residents view this community as friendly and welcoming. One resident says, "I have made a lot of new friends since I moved here. The staff is kind and courteous" This relative comments, "The buildings are modern, well equipped and immaculately clean. The staff and service are exceptional."
The memory care residents of St. Joseph Village of Chicago stay in a specially designed neighborhood featuring secure outdoor walking paths and landscaped courtyards, and each resident receives a personalized care plan. The memory care team provides weekly housekeeping and laundry services, as well as help with the activities of daily living, including grooming, medication reminders and administration, personal hygiene and verbal cueing. On-site health clinics offer dental hygiene, massage therapy and foot care. Residents can reach the staff 24/7 through the emergency response system. Activities and amenities include a spa with a hydrotherapy whirlpool, a beauty salon and an exercise room.
Family members praise how loving the staff is. A reviewer writes, "My mom was able to get into this facility rather quickly for which I am forever grateful. Everyone there was extremely fantastic. She was treated and cared for with such respect, dignity, love (yes love) and everyone was so communicative with us for every little detail."
Museum Residences on Oak provides assisted living and memory care facilities in a serene and calm neighborhood, minutes away from Evanston Hospital and AMITA Health Saint Francis Hospital. The community offers individualized care plans for seniors with Alzheimer's, dementia and other memory-related impairments. Registered nurses and caregivers are available 24/7 and assist residents with their activities of daily living, diabetes management and medication administration. Emergency call systems and secure and alarmed premises provide a safe environment for residents prone to wandering off-site. Residents are encouraged to participate in cognitively enriching activities such as music, dance, art and gardening to keep them physically and mentally active. Seniors can access a fitness center, movie theater, library, saloon and landscaped gardens. Residents can relish delicious, nutritious chef-prepared meals in a restaurant-style setting, and private dining rooms are available for celebrations with friends and families. | https://www.memorycare.com/northbrook-il-facilities/ |
Scientists find routes using arches of chaos that can lead to much faster space travel.
Humanity could be making its way through the Solar System much faster thanks to the discovery of a new superhighway network among space manifolds. Don't get your engines roaring along this "celestial autobahn" just yet, but the researchers believe the new pathways can eventually be used by spacecraft to get to the outer reacher of our Solar System with relative haste.
The celestial highway could get comets and asteroids from Jupiter to Neptune in less than a decade. Compare that to hundreds of thousands or even millions of light years it might ordinarily take for space objects to traverse the Solar System. In a century of travel along the new routes, a 100 astronomical units could be covered, project the scientists. For reference, an astronomical unit is the average distance from the Earth to the Sun or about 93 million miles.
The international research team included Nataša Todorović, Di Wu, and Aaron Rosengren from the Belgrade Astronomical Observatory in Serbia, the University of Arizona, and UC San Diego. Their new paper proposes a dynamic route, going along connected series of arches within so-called space manifolds. These structures, coming into existence from gravitational effects between the Sun and the planets, stretch from the asteroid belt to past Uranus.
The most pronounced of these structures are linked to Jupiter by its strong gravitational pull, explained UC San Diego's press release. They influence the comets around the gas giant as well as smaller space objects called "centaurs," with are like asteroids in size but exhibit the composition of comets.
This animation shows space manifolds over a hundred years. Each frame of the animation shows how the arches and substructures appear over three-year increments. Credit: Nataša Todorović, Di Wu and Aaron Rosengren/Science Advances
"Space manifolds act as the boundaries of dynamical channels enabling fast transportation into the inner- and outermost reaches of the Solar System," write the researchers. "Besides being an important element in spacecraft navigation and mission design, these manifolds can also explain the apparent erratic nature of comets and their eventual demise."
A closer image of the manifolds showing colliding and escaping objects.
Credit: Science Advances, doi: 10.1126/sciadv.abd1313
The researchers discovered the structures by analyzing collected numerical data on the millions of orbits in the Solar System. The scientists figured out how these orbits were contained within known space manifolds. To detect the presences and structure of the space manifolds, the team employed the fast Lyapunov indicator (FLI), used to detect chaos. The scientists ran simulations to compute how the trajectories of particles approaching different planets like Jupiter, Uranus and Neptune would be affected by possible collisions and the manifolds.
While the results are encouraging, the next step is to figure out how these arches can be used by spacecraft for much speedier travel. It's also not clear how similar manifolds work near Earth. Also unclear is how they impact our planet's run-ins with asteroids and meteorites or any of the man-made objects floating up in space near us.
Check out the new paper "The arches of chaos in the Solar System" in Science Advances. | https://usagag.com/2020/12/10/fast-superhighway-through-the-solar-system-discovered/ |
You will learn how to write an imaginative story that sustains reader interest and includes well-paced action, an engaging story line, and a believable setting.
Write Literary Text That Uses Literary Strategies/Devices to Enhance the Style and Tone
You will learn how to write an imaginative story that uses literary strategies/devices to enhance style and tone.
Domain and Range: Numerical Representations
Given a function in the form of a table, mapping diagram, and/or set of ordered pairs, the student will identify the domain and range using set notation, interval notation, or a verbal description as appropriate.
Transformations of Square Root and Rational Functions
Given a square root function or a rational function, the student will determine the effect on the graph when f(x) is replaced by af(x), f(x) + d, f(bx), and f(x - c) for specific positive and negative values.
Transformations of Exponential and Logarithmic Functions
Given an exponential or logarithmic function, the student will describe the effects of parameter changes.
Solving Square Root Equations Using Tables and Graphs
Given a square root equation, the student will solve the equation using tables or graphs - connecting the two methods of solution.
Functions and their Inverses
Given a functional relationship in a variety of representations (table, graph, mapping diagram, equation, or verbal form), the student will determine the inverse of the function.
Rational Functions: Predicting the Effects of Parameter Changes
Given parameter changes for rational functions, students will be able to predict the resulting changes on important attributes of the function, including domain and range and asymptotic behavior. | https://texasgateway.org/resource-index?search=&sort_by=search_api_relevance&sort_order=DESC&items_per_page=20&f%5B0%5D=audience%3AStudents&f%5B1%5D=audience%3ATeachers&f%5B2%5D=course%3AAP%20Physics%202%3A%20Algebra-Based&f%5B3%5D=course%3AAlgebra%20II&f%5B4%5D=course%3ACreative%20Writing&f%5B5%5D=course%3AUnited%20States%20History |
FIELD
BACKGROUND
DETAILED DESCRIPTION
The present disclosure relates generally to content presentation, and in a specific example embodiment, to handling combined audio for multiple contents presented from a same audio output device.
In an enclosed environment or area, two individuals may desire to experience different content from a same device, such as a television, monitor, or speakers. Conventionally, it is not possible to use a speaker of the television or monitor to present audio for multiple content being displayed on the same screen of the television or monitor.
The description that follows includes systems, methods, techniques, instruction sequences, and computing machine program products that embody illustrative embodiments of the present inventive subject matter. In the following description, for purposes of explanation, numerous specific details are set forth in order to provide an understanding of various embodiments of the inventive subject matter. It will be evident, however, to those skilled in the art that embodiments of the inventive subject matter may be practiced without some or other of these specific details. In general, well-known instruction instances, protocols, structures, and techniques have not been shown in detail.
Example embodiments described herein provide systems and methods for presenting multiple programs or content including a combined audio stream from a same audio output device. The content can comprise programs (e.g., television show, videos, movies, music, and concerts), a blank presentation, or computing device outputs (e.g., audio from an application running on a computing device). The combined audio stream combines a first audio track from a first content stream and a second audio track from a second content stream. The first audio track is to be heard by a first user using a first audio device while the second audio track is to be heard by a second viewer using a second audio device. Because an ambient audio signal heard by a user includes the first and second audio tracks from the multiple content, the ambient audio signal will likely sound like gibberish. Accordingly, each user is provided with a respective audio device, such as a headphone, that filters out unwanted audio (e.g., audio track of the content that the user is not experiencing).
Conventional noise canceling headphones isolate desired sound by analyzing ambient noise, creating an inverse (canceling) sound wave for the ambient noise, and combining the inverse sound wave with a signal for the desired sound. The inverse sound wave effectively cancels out the ambient noise, leaving only the desired sound.
In contrast, the audio device (e.g., headphone) or the audio filtering system associated with the audio device, in example embodiments, are not configured to dynamically analyze the ambient noise and create an inverse sound wave of the ambient noise. Instead, an inverse sound wave corresponding to audio data (e.g., an audio track) of another user's content (e.g., unwanted audio content) is generated and used to filter out the unwanted audio data from the ambient audio signal. The ambient audio signal comprises an audio signal (e.g., the combined audio tracks or streams) from an audio output device of a presentation system (e.g., speakers of a television) along with any environmental noises (e.g., conversation with another person, phone ringing, doorbell chime). In various embodiments, the inverse sound wave may be provided to the headphone (e.g., wirelessly or through a wired connection) from a handheld device associated with each user, or may be generated by the headphone, itself.
In some embodiments, a reference audio signal is used to assist in the suppression of the unwanted audio. The reference signal may be constructed to be imperceptible in the presence of the user's content, or it may be constructed to easily be filtered to an inaudible level. Because audio signals decrease over distance, the reference signal is used to modify a level of the inverse sound wave so as not to overcorrect and degrade wanted sound or undercorrect for the unwanted sounds, and to assist with estimating environmental effects upon the unwanted audio, such as reflections and absorption, which may be frequency dependent. In a presentation system that comprises multiple speakers, a different reference signal can be provided from each speaker to account for a three-dimensional movement of the user within an environment.
As a result, one or more of the methodologies described herein facilitate solving the technical problems relating to presenting multiple contents from a same presentation system whereby a combined audio signal is outputted. As a result, one or more of the methodologies described herein may obviate a need for certain efforts or resources that otherwise would be involved in having to present the audio from two or more separate audio output devices. Additionally, resources used by one or more machines, databases, or devices (e.g., within the network environment) may be reduced. Examples of such computing resources include processor cycles, network traffic, memory usage, data storage capacity, power consumption, network bandwidth, and cooling capacity.
FIG. 1
100
100
100
102
104
1
106
2
108
1
106
2
108
With reference to , a diagram illustrating an example environment in which embodiments of a system for providing multiple visual content from a same presentation device and a combined audio signal for the multiple content from a same audio output device is provided. The environment includes an area in which multiple users are present (e.g., a bedroom, living room, or office). The environment comprises a presentation system coupled via a network (e.g., the Internet, wireless network, cellular network, PSTN, Bluetooth, infrared, or a Wide Area Network (WAN)) to a plurality of user environments (e.g., user environment and user environment ). The user environment is associated with a first user, while the user environment is associated with a second user. In example embodiments, the first and second users each desire to experience a different program or content. In one instance, the first user desires to experience a program, and the second user desires to not hear audio from the program being experienced from the first user (e.g., block out the audio from the program of the first user).
102
102
110
112
114
116
102
110
116
114
112
110
The presentation system is configured to receive content from various sources and generate a combined video stream, if applicable, and a combined audio stream that are presented to the first and second users. As such, a combine video stream comprises combined video data (e.g., frames, pixels) from the various sources. Similarly, a combined audio signal comprises combined audio data or audio tracks from the various sources. Accordingly, the presentation system comprises a signal processing device , a content controller , a presentation device , and an audio output device (e.g., speakers or speaker system). In some embodiments, some components of the presentation system may be embodied within other components. For example, the signal processing device , audio output device , or the content controller may be a part of the presentation device (e.g., a television). In another example, the content controller may be a part of the signal processing device .
110
114
116
116
116
110
FIG. 2
The signal processing device is configured to receive multiple content streams and to combine the content streams to generate a combined video stream (also referred to as a “combined video signal”) and a combined audio stream (also referred to as a “combined audio signal”) that together presents the combined content or programs. In one embodiment, a single combined stream or signal that combines both video data and audio data from the multiple content sources is generated. The combined video stream and combined audio stream are then provided to the presentation device (e.g., a television, monitor) for video presentation to the users and to the audio output device (e.g., speakers, stereo speaker system) for audio presentation to the users. In an alternative embodiment, the individual audio streams (e.g., audio tracks) for the multiple content may be provided to the audio output device , and the audio output device simply plays the individual audio data simultaneously effectively resulting in a combined audio stream. The signal processing device will be discussed in more detail in connection with below.
112
118
118
118
106
108
1
106
1
118
112
110
1
2
1
2
The content controller is configured to receive and process control signals from a handheld device (e.g., handheld device A or B; collectively referred to as “handheld device ”) at the user environment or . The control signal indicates an action to be performed with respect to one of the contents or programs being presented to the users. For example, the first user at the user environment desires to pause program, and provides an indication of this desire using their handheld device A. The content controller receives this indication and causes the signal processing device to adjust or modify the combining such that program is paused while program being experienced by the second user is unaffected (e.g., continues playing for the second user). Any operations that can be performed on a program or content may be indicated via the control signal such as, for example, pausing, rewinding, forwarding, stopping, changing content, or exiting from experiencing the content and, for example, viewing a guide or interacting with a user interface. It is noted that program and program may be the same program. However, because each user can control their own experience, the actual presentation of the same program may be different for each user. Additionally, white embodiments discuss content having both a video component and an audio component, alternatively, content having only an audio component may be combined and presented to the users.
118
118
124
124
102
124
102
104
The handheld device comprises an application that specially configures the handheld device to operate as a control device or remote control for controlling the content or program that the respective user is experiencing. The application may be downloaded or otherwise obtained from an application provisioning device . While the application provisioning device is shown to be within the presentation system , alternatively, the application provisioning device may be located outside of the presentation system but accessible via the network .
116
104
118
1
104
118
2
104
118
122
122
122
In an alternative embodiment, the audio output device is coupled to the network and provides the appropriate audio track to the handheld device of each user. For example, audio for program is provided via the network to the handheld device A of the first viewer, while audio for program is provided via the network to the handheld device B of the second viewer. The respective viewers can then listen to their audio (e.g., simulcast) through a coupled audio device A or B (also referred to as audio device ), such as a headset.
116
122
116
114
122
Alternatively, the audio may be provided directly from the audio output device to the respective audio device of each user. For example, the audio output device or the presentation device (e.g., in the case of a television) can wirelessly transmit the appropriate audio track to each respective audio device .
106
108
118
118
120
120
120
122
122
118
FIGS. 3 and 4
Each user environment and comprises the handheld device A or B, a wearable device A or B (also referred to as wearable device ), and the audio device A or B. The handheld device will be discussed in more detail in connection with .
120
114
1
2
120
120
114
120
1
2
120
2
1
The wearable device comprises eyewear or glasses that are similar in application to 3D glasses. In example embodiments, the combined video stream being displayed by the presentation device comprises frames of a first video content of a first content stream and a second video content of a second content stream that are interleaved. Thus, for example, odd-numbered frames of the combined video stream are from program and even-numbered flumes are from program. Accordingly, instead of having a left lens and a right lens, as is typical in 3D glasses, the wearable device A comprises two “right” lenses, while the wearable device B comprises two “left” lenses. The “right” lenses allow viewing, for example, of the odd-numbered frames, while the “left” lenses allow viewing of the even-numbered frames from the combined video stream that is displayed on the presentation device (or vice-versa). This, for example, allows the first user with the wearable device A to see the odd-numbered frames that represent program and not see the even-numbered frames that represent program. Conversely, the second user having the wearable device B with two “left” lenses will see the even-numbered frames that represent program, but not see the odd-numbered frames that represent program.
1
2
1
2
120
1
2
120
2
1
In an alternative embodiment, the combined video stream comprises frames containing pixels polarized in a first direction from program and pixels polarized in a second direction from program, whereby polarization in the second direction is orthogonal to the first direction. For example, the pixels from program can be vertically polarized while the pixels from program can be horizontally polarized. Accordingly, the “right” lenses comprises a first direction polarizer (e.g., vertical polarizer) that allows viewing of pixels polarized in the first direction, while the “left” lenses comprises a second direction polarizer (e.g., horizontal polarizer) that allows viewing of pixels polarized in the second direction. This, for example, enables the first user with the wearable device A to see the vertical polarization that represents program and not see the horizontal polarization that represents program. Conversely, the second user having the wearable device B with two “left” lenses will see the horizontal polarization that represents program, but not see the vertical polarization that represents program.
116
116
122
2
122
2
122
1
2
122
FIG. 4
In example embodiments, the audio output device presents a combined audio signal that combines audio data from the multiple content. As such, the users would hear gibberish if the users were to listen to the output (e.g., ambient audio signal) of the audio output device . To remedy this situation, the audio device A is provided with an audio filter signal that represents the audio track or signal for program. Using this audio fitter signal, the audio device A filters out (e.g., blocks out) the audio signal for program. As a result, the first user wearing the audio device A hears the audio for program along with any environmental noise (e.g., telephone ring, doorbell, conversation with another individual). In one embodiment, the audio filter signal comprises an inverse sound wave for the audio signal to be filtered out (e.g., audio signal for program). The audio device will be discussed in more detail in connection with .
116
104
118
1
104
118
2
104
118
122
122
118
122
116
122
116
114
122
In an alternative embodiment, the audio output device is coupled to the network and provides audio for a specific program to the handheld device of the user. For example, an audio track for program is provided via the network to the handheld device A of the first user, while an audio track for program is provided via the network to the handheld device B of the second user. The respective users can then receive the audio track (e.g., simulcast) through a coupled audio device A or B (e.g., via a wired or wireless connection between the handheld device and the audio device ). Alternatively, the audio may be provided directly from the audio output device to each of the respective audio device . For example, the audio output device or the presentation device can wirelessly transmit the proper audio track to the respective audio device .
100
106
108
110
FIG. 1
It is noted that the environment shown in is merely an example. For example, alternative embodiments may comprise any number of user environments and . Furthermore, any number of content signals may be received and combined by the signal processing device .
FIG. 2
110
110
1
2
is a block diagram illustrating an example embodiment of the signal processing device . The signal processing device is configured to receive multiple content streams each representing a particular piece of content or a program (e.g., television show, movie, music track) and to combine the content streams to generate a combined stream that contains two or more content (e.g., program and program). The combined stream may comprise a combined video stream, a combined audio stream (also referred to as combined audio signal), or a combination of both video and audio streams. In one embodiment, one of the content comprises computer outputs (e.g., user interfaces and accompanying audio resulting from an application running on a computer or webpage or streaming content including music from the Internet). Thus, for example, a first user may watch a DVD while a second user streams content from the Internet. In another example, both users may be streaming content from different applications or websites.
110
110
202
204
206
208
110
102
To enable the operations of the signal processing device , the signal processing device comprises a signal input module , a combining module , a signal output module , and a content control module all communicatively coupled together (e.g., via a bus). The signal processing device may comprise other components not pertinent to example embodiments that are not shown or discussed. Furthermore, alternative embodiments may comprise more, less, multiples of, or other modules, or locate the modules in other components of the presentation system . Additionally, some functions of the modules may be combined or divided into two or more further modules.
202
204
The signal input module is configured to receive the individual content streams from various sources. For example, the sources of the content streams may include broadcast video, cable, satellite, Internet Protocol television (IPTV), over-the-top content (OTT), DVR recordings, computer display, Internet streaming, or any content stream that can be received through any standard inputs to, for example, a television display. The content streams are then passed to the combining module .
204
204
204
106
108
The combining module is configured to generate the combined audio stream (or cause the generation of the combined audio stream) that is presented to the multiple users. With respect to the audio, the combining module combines the audio data or audio tracks from the multiple content streams into a single combined audio stream. In one embodiment, the combining module incorporates a reference signal into the combined audio stream. The reference signal is used by an audio filtering system located at the user environment or to adjust a level of a device filtering signal (e.g., an inverse sound wave for the unwanted audio) as will be discussed in more detail below.
206
206
116
116
116
204
116
The signal output module is configured to provide the combined audio stream for presentation. Thus, the signal output module provides the combined audio stream to the audio output device (e.g., speakers), which in turn plays the combined audio stream. In an alternative embodiment, the audio data or track for each content may be individually provided to the audio output device and is simultaneously played by the audio output device . In this case, the reference signal may also be provided by, for example, the combining module and combined with the audio tracks for output at the audio output device .
208
112
1
106
1
3
118
112
208
208
204
1
3
2
208
204
The content control module is configured to work with the content controller to cause actions to occur with respect to the content being presented. For example, the first user at the user environment desires to change program to a program and provides an indication of this desire using their handheld device A. The content controller receives this indication (via a control signal) and provides this indication to the content control module . The content control module than provides instructions to, or otherwise causes, the combining module to adjust or modify the combined audio stream (and the combined video stream if applicable) such that program is replaced with program for the first user, while program being experienced by the second user is unaffected (e.g., continues playing for the second user). Similar operations may be performed for other actions to be performed to the program such as pause, rewind, forward, stop, or exiting the program to interact with a user interface. In some embodiments, the functionality of the content control module may be incorporated into the combining module .
FIG. 3
118
118
118
302
302
304
302
304
306
308
118
302
310
312
302
314
316
314
316
118
118
Referring now to , a detailed block diagram illustrating an example embodiment of the handheld device is shown. The handheld device may comprise a mobile device such as, for example, a mobile phone, a tablet, or a remote control. The handheld device includes a processor . The processor may be any of a variety of different types of commercially available processors suitable for mobile devices (e.g., an XScale architecture microprocessor, a Microprocessor without Interlocked Pipeline Stages (MIS) architecture processor, or another type of processor). A memory , such as a Random Access Memory (RAM), a Flash memory, or other type of memory, is typically accessible to the processor . The memory is adapted to store an operating system (OS) , as well as applications , such as a content application that allows a user using the handheld device to control the program or content the user is experiencing. The processor may be coupled, either directly or via appropriate intermediary hardware, to a display and to one or more input/output (I/O) devices , such as a keypad, a touch panel sensor, a microphone, and the like. Similarly, in some embodiments, the processor may be coupled to a transceiver that interfaces with an antenna . The transceiver is configured to both transmit and receive network signals, wireless data signals, or other types of signals via the antenna or other sensors (e.g., infrared sensor) available on the handheld device , depending on the nature of the handheld device .
118
102
118
112
110
102
106
108
118
118
In example embodiments, the handheld device is registered or otherwise known to the presentation system . For example, the handheld device may be registered with the content controller or the signal processing device . Based on the registration, the presentation system knows which program is being presented to each of the user environments or . As a result, for example, appropriate audio filtering signals corresponding to or representing the audio signal, stream, or track that is to be filtered out can be transmitted to the proper handheld device . In another example, control signals received from the handheld device can indicate the program being experienced by the corresponding user.
FIG. 4
400
400
118
124
118
122
116
400
122
122
400
400
402
404
406
108
Referring now to , an audio filtering system is shown. In example embodiments, the audio filtering system is embodied within the handheld device (e.g., with some components being a part of, or using functionalities of, the content application provisioned by the application provisioning device ). In this embodiment, the handheld device generates a device filter signal which is provided to the coupled audio device . The device filter signal is an inverse sound wave of the unwanted audio (received as the audio filtering signal) that filters out or blocks the unwanted audio (e.g., the other user's program or content). In some embodiments, a level of the inverse sound wave is adjusted based on an estimated distance and orientation of the user from the audio source (e.g., the audio output device ). In another embodiment, the audio filtering system is embodied within the audio device , itself, and the audio device generates the device filter signal and uses it to filter out the unwanted audio. As such, the audio filtering system generates the device filtering signal. In order to enable this operation, the audio filtering system comprises an audio input module , an audio filtering module , a microphone , and a filtering output module .
402
116
102
110
118
122
104
The audio input module is configured to receive an audio filter signal that represents (or corresponds to) the unwanted audio. In one embodiment, the audio filter signal may be an audio track or stream for the content that the user wants to filter out (e.g., audio track of the other user's content). The audio filter signal is then used to generate the device filter signal (e.g., an inverse sound wave of the unwanted audio adjusted for user distance and orientation from the audio source) that is used to filter out the unwanted audio that is presented as a part of the combined audio stream from the audio output device . In an alternative embodiment, the audio filter signal may be the inverse sound wave of the unwanted audio or the device filter signal, whereby the presentation system (e.g., the signal processing device ) generates the inverse sound wave or the device filter signal and transmits it to the appropriate handheld device or audio device , for example, via the network .
402
400
116
116
116
102
116
100
116
In some embodiments, the audio input module also receives or detects a reference signal. In normal noise canceling operations, a location of the user is irrelevant because a microphone picks up whatever unwanted noise is reaching the user's ears wherever the user is at, and cancels that unwanted noise out. In example embodiments, because the audio filtering system is canceling out a specific audio signal (e.g., the unwanted audio stream or data from the other content) and allowing other audio including audio for the content the user is experiencing to be heard, it is important to know where the user is in relations to the reference signal and the source of the combined audio stream (e.g., the audio output device ). For instance, if the first user walks up close to the audio output device , a louder audio signal needs to be filtered out versus if the first user is further away. Similarly, if the first user moves left or right, the audio received from the audio output device changes. Accordingly, the reference signal provides a mechanism to help estimate an effect of the listening environment and a relative position of the unwanted audio source and the listener. The reference signal may be transmitted by the presentation system (e.g., by the audio output device ), for example, as part of the combined audio stream. Alternatively, the reference signal may be presented by devices in the environment so long as the device is located substantially near the audio output device .
116
In some embodiments, a plurality of reference signals are provided, corresponding to a plurality of speakers associated with the audio output device. The plurality of reference signals may be provided in parallel or to a subset of the output speakers at any given time. These reference signals are used to help estimate an amplitude of any arriving unwanted signal, as well as impact or effect of the listening environment on the unwanted signal as it travels from a speaker associated with the audio output device to the user. These effects include filtering and attenuation, as well as reflections or echoes. This estimate may be used in conjunction with the audio fitter signal to generate the device filter signal. If the user's audio device has more than one output, such as stereo headphones, one device filter signal may be generated for each such output.
400
404
202
202
In one embodiment, the unwanted audio itself can be used as the reference signal. Since the audio filter signal (corresponding to the unwanted audio track) is already provided to the audio filtering system , the audio filtering module knows what the audio filtering signal should look like (e.g., waveforms). One embodiment is based on correlating the external sound arriving at the signal input module with the audio filter signal, and using that correlation to estimate the filter characteristics required to generate a device filter signal that substantially cancels the unwanted audio sound. In another embodiment, analysis of the spectrum of the audio filter signal and the sound arriving at the signal input module are used to generate the device filter signal.
404
404
100
400
122
2
1
122
The audio filtering module is configured to generate the device fitter signal using the audio filter signal alone or in combination with the reference signal. The generating of the device filter signal is adaptive. That is, the audio filtering module will constantly adjust to changes in the environment (e.g., the user turning their head when the audio filtering system is a part of the audio device that the user is wearing). The device filter signal is used to filter out the unwanted audio for the content that the user is not experiencing. For example, the device filter signal filters out an audio track from program for the first user that is experiencing program. In example embodiments, the device filter signal does not filter out any ambient noise. As such, ambient noises such as, for example, a telephone ring, doorbell, or conversation with another individual can be heard through the audio device .
406
404
400
118
406
118
122
404
400
122
406
122
400
118
122
In some embodiments, the microphone detects the reference signal and provides the reference signal to the audio filtering module . In embodiments where the audio filtering system is embodied in the handheld device , the microphone may be a standard component of the handheld device or the audio device which captures the reference signal and provides the reference signal to the audio filtering module . In embodiments where the audio filtering system is embodied in the audio device , the microphone is provided on the audio device . As such, the audio filtering system may be at either the handheld device or the audio device .
116
406
404
In some embodiments, the reference signal at the audio output device may comprise an imperceptible multi-frequency signal. Such a reference signal can be constructed taking into account the spectral content of the desired audio signal so as to be masked by the wanted or unwanted audio signal as perceived by the listener. Accordingly, the reference signal can be added to the combined audio stream and be a part of the combined audio stream. The microphone picks up the reference signal, and analyzes the received signal at the known frequencies in the reference signal. Based on this analysis, the audio filtering module estimates the environmental characteristics (e.g., effect of the audio environment) to assist in the construction of the inverse filter signal for the unwanted audio. In example embodiments, the reference signal may comprise a steady signal or one that is pulsed. For example, a pulsed multi-frequency reference signal can be processed to estimate frequency dependent reflections and absorptions in the environment.
408
400
118
406
122
4085
122
408
122
The filtering output module is configured to output the device filter signal. In embodiments where the audio filtering system is embodied in the handheld device , the filtering output module transmits the device filter signal to the audio device (e.g., via wired or wireless connection). Alternatively, in embodiments where the filtering output module is embodied within the audio device , the filtering output module provides the device filter signal to an audio output component (e.g., earphones) of the audio device which presents the device filter signal to each ear of the user.
FIG. 5
500
102
500
500
102
500
102
500
500
102
is a flow diagram of an example method for managing audio signals and reference signals at the presentation system . The method may be embodied in computer-readable instructions for execution by one or more processors such that the operations of the method may be performed in part or in whole by the presentation system . Accordingly, the method is described by way of example with reference to the presentation system . However, it shall be appreciated that at least some of the operations of the method may be deployed on various other hardware configurations and the method is not intended to be limited to the presentation system .
502
110
118
In operation , at least two content streams are received by the signal processing device . The content streams represent programs or content that each individual user of a plurality of users has selected for playing (e.g., via their handheld device ) and can include audio data (e.g., audio track) or a combination of both video and audio data. The content streams may be received from sources such as, for example, broadcast video, cable, satellite, Internet Protocol television (IPTV), over-the-top content (OTT), and DVR recordings.
504
110
110
116
502
504
In operation , the audio component (e.g., tracks or data) of the content streams are combined (or caused to be combined) into a single combined audio stream. In one embodiment, the signal processing device combines the audio data from the content stream to generate the combined audio stream. In an alternative embodiment, the signal processing device provides the audio data from each content stream to the audio output device , which then plays the audio data together. In an embodiment where a first user wants to listen to audio data and a second user wants to block out the audio data, only a single content signal is received in operation and operation is not needed.
506
400
106
206
400
202
110
110
106
400
106
2
400
1
400
104
In operation , an audio filter signal is provided to each respective audio filtering system in each user environment . In example embodiments, the signal output module provides the audio filter signal to each respective audio filtering system . The audio filtering signal represents or corresponds to the unwanted audio data that is to be filtered from the combined audio stream. Since the signal input module of the signal processing device receives the content streams, the signal processing device knows which user environment , and thus which audio filtering system of each user environment , should receive each respective audio filter signal. For example, an audio filter signal that corresponds to an audio track for program (being presented to the second user) is provided to the audio filtering system of the first user. Similarly, an audio filter signal that corresponds to an audio track for program (being presented to the first user) is provided to the audio filtering system of the second user. The audio filter signal may be provided via, for example, wireless transmission over the network .
508
110
116
114
116
114
In operation , the combined audio stream is presented to the users. Accordingly, the signal processing device provides the combined audio stream to the audio output device (or the audio data from each content stream). Additionally, if there is a combined video stream, the combined video stream is provided to the presentation device . The audio output device and optional presentation device causes output of the combined stream(s).
508
504
116
In operation , the reference signal is also caused to be presented. In some embodiments, the reference signal can be combined into the combined audio stream as part of operation . Alternatively, the reference signal may be separately provided and played simultaneously with the combined audio stream by the audio output device .
FIG. 6
600
106
600
600
400
600
400
600
600
400
is a flow diagram of an example method for filtering out unwanted audio from a combined audio stream received at a user environment . The method may be embodied in computer-readable instructions for execution by one or more processors such that the operations of the method may be performed in part or in whole by the audio filtering system . Accordingly, the method is described by way of example with reference to the audio filtering system . However, it shall be appreciated that at least some of the operations of the method may be deployed on various other hardware configurations and the method is not intended to be limited to the audio filtering system .
602
402
604
402
116
In operation , an audio filter signal corresponding to the unwanted audio to be filtered out is received by the audio input module . In operation , a reference signal is received by the audio input module . In example embodiments, the reference signal may comprise a reference tone sent at a specific frequency, fixed output level from the audio output device . Alternatively, the reference signal may be an inaudible pilot tone or tones, or a multi-frequency pulse. In another embodiment, the unwanted audio can be used as the reference signal.
606
In operations one or more environment effects are determined. The unwanted audio arriving at the user may contain a direct component, a component that is partially absorbed, and/or a reflected components. These components are not generally simple copies of the original unwanted audio, but have also been distorted in transmission, and spectrally altered and attenuated by the various materials in the paths between the unwanted audio source and a user's ear. The environment may also contain resonances, which accentuate particular frequencies. Collectively, these environmental effects distort the original unwanted audio sound waves before their perception by the user.
406
408
The generation of an inverse sound wave requires that the known original unwanted audio signal be similarly distorted to achieve proper cancellation. This distortion is determined by comparing an original known signal, such as the unwanted audio or reference signal, to the corresponding received signal, and then modeling the environmental effects using conventional techniques such as deconvolution and/or a pole/zero system. Intrinsic model information, such as estimates of the transfer functions of the microphone , the audio output module , or the acoustic coupling between the left and right ear of the user may also be incorporated into determination of the inverse sound wave. In one embodiment, the inverse sound wave is individually determined for each ear.
606
608
404
Using the audio filter signal and the environmental effects determined in operation , an inverse sound wave is determined in operation . In one embodiment, the audio filter signal may be an audio track for the content that the user wants to filter out (e.g., audio track of the other user's content). In this embodiment, the audio filtering module generates a sound wave that is an inverse of the unwanted audio track taking into consideration the environmental effects. In an alternative embodiment, the audio filter signal may be, itself, the inverse sound wave of the audio data that is to be filtered out that is adjusted by the environmental effects.
610
404
404
404
116
404
In operation , a device filter signal is generated. In example embodiments, the audio filtering module adjusts a level of the inverse sound wave based on the determined environmental effect to derive the device filter signal. Because the audio filtering module is attempting to filter out specific audio, the audio filtering module wants to filter out an exact decibel of the frequency of the unwanted audio. As such the environmental effect is important in order to filter out the unwanted audio that is being presented from the audio output device . If the environment effect is not accounted for, the audio filtering module may either overcorrect which can result in filtering out of some ambient noise or undercorrect which results in some of the unwanted audio being heard.
In example embodiments, the device filter signal is dependent on relative amplitude and spectrum of the arriving unwanted audio signal relative to the original unwanted audio signal that is the audio filter signal that is sent to the audio output device. The difference between these two signals is a result of the previously mentioned environmental effects such as reflections or absorptions, which themselves can be frequency dependent.
612
406
400
118
406
122
406
122
406
122
The device filter signal is output in operation by the filtering output module . In embodiments where the audio filtering system is embodied in the handheld device , the filtering output module transmits the device filter signal to the audio device . Alternatively, in embodiments where the filtering output module is embodied within the audio device , the filtering output module provides the device filter signal to an audio output component (e.g., earphones) of the audio device which presents the device filter signal to each ear of the user.
FIG. 7
FIG. 7
700
724
722
700
724
700
is a block diagram illustrating components of a machine , according to some example embodiments, able to read instructions from a machine-readable medium (e.g., a non-transitory machine-readable medium, a machine-readable storage medium, a computer-readable storage medium, or any suitable combination thereof) and perform any one or more of the methodologies discussed herein, in whole or in part. Specifically, shows the machine in the example form of a computer system (e.g., a computer) within which the instructions (e.g., software, a program, an application, an applet, an app, or other executable code) for causing the machine to perform any one or more of the methodologies discussed herein may be executed, in whole or in part.
700
700
724
724
In alternative embodiments, the machine operates as a standalone device or may be connected (e.g., networked) to other machines. The machine may be a server computer, a client computer, a personal computer (PC), a tablet computer, a laptop computer, a netbook, a set-top box (STB), a personal digital assistant (PDA), a cellular telephone, a smartphone, a web appliance, a network router, a network switch, a network bridge, or any machine capable of executing the instructions , sequentially or otherwise, that specify actions to be taken by that machine. Further, while only a single machine is illustrated, the term “machine” shall also be taken to include a collection of machines that individually or jointly execute the instructions to perform any one or more of the methodologies discussed herein.
700
702
704
706
708
702
724
702
702
The machine includes a processor (e.g., a central processing unit (CPU), a graphics processing unit (GPU), a digital signal processor (DSP), an application specific integrated circuit (ASIC), a radio-frequency integrated circuit (RFIC), or any suitable combination thereof), a main memory , and a static memory , which are configured to communicate with each other via a bus . The processor may contain microcircuits that are configurable, temporarily or permanently, by some or all of the instructions such that the processor is configurable to perform any one or more of the methodologies described herein, in whole or in part. For example, a set of one or more microcircuits of the processor may be configurable to execute one or more modules (e.g., software modules) described herein.
700
710
700
712
714
716
718
720
The machine may further include a graphics display (e.g., a plasma display panel (PDP), a light emitting diode (LED) display, a liquid crystal display (LCD), a projector, a cathode ray tube (CRT), or any other display capable of displaying graphics or video). The machine may also include an alphanumeric input device (e.g., a keyboard or keypad), a cursor control device (e.g., a mouse, a touchpad, a trackball, a joystick, a motion sensor, an eye tracking device, or other pointing instrument), a storage unit , a signal generation device (e.g., a sound card, an amplifier, a speaker, a headphone jack, or any suitable combination thereof), and a network interface device .
716
722
724
724
704
702
700
704
702
722
The storage unit includes the machine-readable medium (e.g., a tangible machine-readable storage medium) on which are stored the instructions embodying any one or more of the methodologies or functions described herein. The instructions may also reside, completely or at least partially, within the main memory , within the processor (e.g., within the processor's cache memory), or both, before or during execution thereof by the machine . Accordingly, the main memory and the processor may be considered machine-readable media (e.g., tangible and non-transitory machine-readable media).
700
In some example embodiments, the machine may be a portable computing device, such as a smart phone or tablet computer, and have one or more additional input components (e.g., sensors or gauges). Examples of such input components include an image input component (e.g., one or more cameras), an audio input component (e.g., a microphone), a direction input component (e.g., a compass), a location input component (e.g., a global positioning system (GPS) receiver), an orientation component (e.g., a gyroscope), a motion detection component (e.g., one or more accelerometers), an altitude detection component (e.g., an altimeter), and a gas detection component (e.g., a gas sensor). Inputs harvested by any one or more of these input components may be accessible and available for use by any of the modules described herein.
722
700
702
As used herein, the term “memory” refers to a machine-readable medium able to store data temporarily or permanently and may be taken to include, but not be limited to, random-access memory (RAM), read-only memory (ROM), buffer memory, flash memory, and cache memory. While the machine-readable medium is shown in an example embodiment to be a single medium, the term “machine-readable medium” should be taken to include a single medium or multiple media (e.g., a centralized or distributed database, or associated caches and servers) able to store instructions. The term “machine-readable medium” shall also be taken to include any medium, or combination of multiple media, that is capable of storing instructions for execution by a machine (e.g., machine ), such that the instructions, when executed by one or more processors of the machine (e.g., processor ), cause the machine to perform any one or more of the methodologies described herein. The term “machine-readable medium” shall accordingly be taken to include, but not be limited to, one or more data repositories in the form of a solid-state memory, an optical medium, a magnetic medium, or any suitable combination thereof.
722
722
722
Furthermore, the machine-readable medium is non-transitory in that it does not embody a propagating or transitory signal. However, labeling the machine-readable medium as “non-transitory” should not be construed to mean that the medium is incapable of movement—the medium should be considered as being transportable from one physical location to another. Additionally, since the machine-readable medium is tangible, the medium may be considered to be a machine-readable device. Furthermore, the machine-readable medium does not comprise any transitory signals.
724
726
720
The instructions may further be transmitted or received over a communications network using a transmission medium via the network interface device and utilizing any one of a number of well-known transfer protocols (e.g., HTTP). Examples of communication networks include a local area network (LAN), a wide area network (WAN), the Internet, mobile telephone networks, plain old telephone service (POTS) networks, and wireless data networks (e.g., WiFi, LTE, and WIMAX networks). The term “transmission medium” shall be taken to include any intangible medium that is capable of storing, encoding, or carrying instructions for execution by the machine, and includes digital or analog communications signals or other intangible medium to facilitate communication of such software.
Throughout this specification, plural instances may implement components, operations, or structures described as a single instance. Although individual operations of one or more methods are illustrated and described as separate operations, one or more of the individual operations may be performed concurrently, and nothing requires that the operations be performed in the order illustrated. Structures and functionality presented as separate components in example configurations may be implemented as a combined structure or component. Similarly, structures and functionality presented as a single component may be implemented as separate components. These and other variations, modifications, additions, and improvements fall within the scope of the subject matter herein.
Certain embodiments are described herein as including logic or a number of components, modules, or mechanisms. Modules may constitute either software modules (e.g., code embodied on a machine-readable medium or in a transmission signal) or hardware modules. A “hardware module” is a tangible unit capable of performing certain operations and may be configured or arranged in a certain physical manner. In various example embodiments, one or more computer systems (e.g., a standalone computer system, a client computer system, or a server computer system) or one or more hardware modules of a computer system (e.g., a processor or a group of processors) may be configured by software (e.g., an application or application portion) as a hardware module that operates to perform certain operations as described herein.
In some, embodiments, a hardware module may be implemented mechanically, electronically, or any suitable combination thereof. For example, a hardware module may include dedicated circuitry or logic that is permanently configured to perform certain operations. For example, a hardware module may be a special-purpose processor, such as a field-programmable gate array (FPGA) or an ASIC. A hardware module may also include programmable logic or circuitry that is temporarily configured by software to perform certain operations. For example, a hardware module may include software encompassed within a general-purpose processor or other programmable processor. It will be appreciated that the decision to implement a hardware module mechanically, in dedicated and permanently configured circuitry, or in temporarily configured circuitry (e.g., configured by software) may be driven by cost and time considerations.
Accordingly, the phrase “hardware module” should be understood to encompass a tangible entity, be that an entity that is physically constructed, permanently configured (e.g., hardwired), or temporarily configured (e.g., programmed) to operate in a certain manner or to perform certain operations described herein. As used herein, “hardware-implemented module” refers to a hardware module. Considering embodiments in which hardware modules are temporarily configured (e.g., programmed), each of the hardware modules need not be configured or instantiated at any one instance in time. For example, where a hardware module comprises a general-purpose processor configured by software to become a special-purpose processor, the general-purpose processor may be configured as respectively different special-purpose processors (e.g., comprising different hardware modules) at different times. Software may accordingly configure a processor, for example, to constitute a particular hardware module at one instance of time and to constitute a different hardware module at a different instance of time.
The various operations of example methods described herein may be performed, at least partially, by one or more processors that are temporarily configured (e.g., by software) or permanently configured to perform the relevant operations. Whether temporarily or permanently configured, such processors may constitute processor-implemented modules that operate to perform one or more operations or functions described herein. As used herein, “processor-implemented module” refers to a hardware module implemented using one or more processors.
Similarly, the methods described herein may be at least partially processor-implemented, a processor being an example of hardware. For example, at least some of the operations of a method may be performed by one or more processors or processor-implemented modules.
Some portions of the subject matter discussed herein may be presented in terms of algorithms or symbolic representations of operations on data stored as bits or binary digital signals within a machine memory (e.g., a computer memory). Such algorithms or symbolic representations are examples of techniques used by those of ordinary skill in the data processing arts to convey the substance of their work to others skilled in the art. As used herein, an “algorithm” is a self-consistent sequence of operations or similar processing leading to a desired result. In this context, algorithms and operations involve physical manipulation of physical quantities. Typically, but not necessarily, such quantities may take the form of electrical, magnetic, or optical signals capable of being stored, accessed, transferred, combined, compared, or otherwise manipulated by a machine. It is convenient at times, principally for reasons of common usage, to refer to such signals using words such as “data,” “content,” “bits,” “values,” “elements,” “symbols,” “characters,” “terms,” “numbers,” “numerals,” or the like. These words, however, are merely convenient labels and are to be associated with appropriate physical quantities.
Unless specifically stated otherwise, discussions herein using words such as “processing,” “computing,” “calculating,” “determining,” “presenting,” “displaying,” or the like may refer to actions or processes of a machine (e.g., a computer) that manipulates or transforms data represented as physical (e.g., electronic, magnetic, or optical) quantities within one or more memories (e.g., volatile memory, non-volatile memory, or any suitable combination thereof), registers, or other machine components that receive, store, transmit, or display information. Furthermore, unless specifically stated otherwise, the terms “a” or “an” are herein used, as is common in patent documents, to include one or more than one instance. Finally, as used herein, the conjunction “or” refers to a non-exclusive “or,” unless specifically stated otherwise.
Although an overview of the inventive subject matter has been described with reference to specific example embodiments, various modifications and changes may be made to these embodiments without departing from the broader spirit and scope of embodiments of the present invention. For example, various embodiments or features thereof may be mixed and matched or made optional by a person of ordinary skill in the art. Such embodiments of the inventive subject matter may be referred to herein, individually or collectively, by the term “invention” merely for convenience and without intending to voluntarily limit the scope of this application to any single invention or inventive concept if more than one is, in fact, disclosed.
The embodiments illustrated herein are believed to be described in sufficient detail to enable those skilled in the art, to practice the teachings disclosed. Other embodiments may be used and derived therefrom, such that structural and logical substitutions and changes may be made without departing from the scope of this disclosure. The Detailed Description, therefore, is not to be taken in a limiting sense, and the scope of various embodiments is defined only by the appended claims, along with the full range of equivalents to which such claims are entitled.
Moreover, plural instances may be provided for resources, operations, or structures described herein as a single instance. Additionally, boundaries between various resources, operations, modules, engines, and data stores are somewhat arbitrary, and particular operations are illustrated in a context of specific illustrative configurations. Other allocations of functionality are envisioned and may fall within a scope of various embodiments of the present invention. In general, structures and functionality presented as separate resources in the example configurations may be implemented as a combined structure or resource. Similarly, structures and functionality presented as a single resource may be implemented as separate resources. These and other variations, modifications, additions, and improvements fall within a scope of embodiments of the present invention as represented by the appended claims. The specification and drawings are, accordingly, to be regarded in an illustrative rather than a restrictive sense.
BRIEF DESCRIPTION OF DRAWINGS
Various ones of the appended drawings merely illustrate example embodiments of the present invention and cannot be considered as limiting its scope.
FIG. 1
is a diagram illustrating an example environment in which embodiments of a system may be implemented.
FIG. 2
is a block diagram illustrating an example embodiment of a signal processing device.
FIG. 3
is a block diagram illustrating an example embodiment of a handheld device.
FIG. 4
is a block diagram illustrating an example embodiment of an audio filtering system.
FIG. 5
is a flow diagram of an example method for managing audio and reference signals at a presentation system.
FIG. 6
is a flow diagram of an example method fir filtering out unwanted audio from a multiplexed audio signal at a user environment.
FIG. 7
is a simplified block diagram of a machine in an example form of a computing system within which a set of instructions for causing the machine to perform any one or more of the methodologies discussed herein may be executed. | |
Where do little girls learn to how to be brave? Certainly not by bearing witness to the ego-driven bravado of little boys. And yet, one of the greatest qualities of a female entrepreneur is her ability to demonstrate bravery every time she stands toe to toe with her fear.
Starting and running a business can be a daunting task, wrought with challenges that can leave any woman trembling in her heels. But smart women never let fear see them sweat, because deep down they know that much of their fear is created within.
Call it female intuition or simply an honest look at self, but women know if it is self-created, it can be self-controlled. I am not trying to suggest that men aren’t brave. But women are just more honest with themselves and others when it comes to being scared, whereas men tend to bluster and deny in order to save face when ruffled.
Women aren’t afraid to admit they’re afraid. Rather than wasting time trying to cover it up or pretend it’s not real they take action to understand it and diffuse it’s impact. It’s not a matter of working around it, women do what it takes to work through their challenges. And often they reach out to those they trust when they need help.
Modeling “the toughest kid on the block” persona In business will only hold you back. The shortest path to freedom and growth is the straight one, which often means working through your toughest moments with grace. So ladies, the next time fear raises it’s ugly head in yours, what will you do to conquer it head-on?
This entry was written by Dr. Shannon Reece, posted on September 28, 2010 at 7:33 am, filed under Alphabet of Entrepreneurs, Aspiring Entrepreneurs and tagged bravery, businesswoman, entrepreneur, start your own business. Bookmark the permalink. Follow any comments here with the RSS feed for this post. Post a comment or leave a trackback: Trackback URL. | https://blog.drshannonreece.com/2010/09/28/brave-women-in-a-world-of-male-bravado/ |
- What is space?
- Are there parallel universes?
- Does infinity exist?
- Is there free will?
- What is time?
- How many dimensions are there?
Thanks for taking part in the project and happy reading and listening!
This project is a collaboration between Plus and FQXi, an organisation that supports and disseminates research on questions at the foundations of physics and cosmology. The FQXi community website does for physics and cosmology what Plus does for maths: provide the public with a deeper understanding of known and future discoveries in these areas, and their potential implications for our worldview.
Here are some of the questions we put to you which didn't win — post a comment on a blog if you'd like us to look at them again!
How did the Universe start?
What does modern physics say about the origin (or non-origin) of the Universe? And how can we test these theories? Vote for the start of the Universe or read these taster articles:
- On Plus: What happened before the Big Bang? — the answer will make your mind bubble.
- On FQXi: The holographic Universe — turning the Universe into a hologram to understand the birth of the cosmos.
What's the role of chance in the Universe?
Did chance have a hand in the early stages of the Universe? What does this mean for physics and how can we calculate the probabilities of different outcomes? To find out, vote for chance or read these articles:
- On Plus: Lambda marks the spot — is the biggest mystery of theoretical physics, the cosmological constant, a result of chance?
- On FQXi: Phantasms of infinity — can you define probabilities in the face of infinity?
What is information?
What does information really look like? Are there fundamental laws of information processing? And can they lead us to a physical theory of everything? Vote for information and read these articles:
- On Plus: The illusory Universe — what happens to information when it falls down a black hole?
- On FQXi: DoubleThink — storing information using quantum physics.
Will there be a theory of everything?
Finding a theory of everything is the biggest challenge for modern physics. Will we ever find it? And what will it look like? Vote for the theory of everything and read these articles:
- On Plus: String theory: from Newton to Einstein and beyond — on the currently hottest contender for a theory of everything.
- On FQXi: The quantum PlayStation — how the PS3 is helping physicists develop a theory of quantum gravity.
What is quantum cosmology?
We've all heard of quantum mechanics, the physical theory that describes the microscopic world so well. But what happens when you apply quantum mechanics to the whole Universe? If you'd like to find out, then vote for quantum cosmology or read our taster article:
- On FQXi: The holographic Universe — Take one universe, turn it into a hologram, find its quantum wavefunction and understand the birth of the cosmos. | https://plus.maths.org/content/comment/reply/5489 |
Orange honey-mustard Salmon. How to Make Honey Mustard Salmon. This video is part of our Simply Kids Cook YouTube series. Head over there to see more videos in the series.
I had some oranges on hand and there's always mustard in the fridge for mustard lovers like us. A bit of freshly squeezed orange just, some orange rind, honey, soy, ginger and ground mustard (not dijon) and that's your sauce. Whisk it together, pan sear the salmon, add some sauce and we were done. You can cook Orange honey-mustard Salmon using 7 ingredients and 7 steps. Here is how you achieve that.
Ingredients of Orange honey-mustard Salmon
- It’s 1 of Salmon fillet.
- It’s 5 tbsp of Honey.
- Prepare 6 tsp of Gourmet mustard (the one with honey already).
- It’s 1 cup of Orange Juice.
- It’s 2 tbsp of Olive oil.
- It’s 2 dash of Black pepper.
- Prepare 6 dash of Sea salt.
This Honey Mustard Salmon is quick, easy and perfect for busy weeknights! A whole salmon fillet in a delicious and epic honey mustard sauce gets baked in foil to flaky perfection! Simplicity is the key to this Orange-Honey Baked Salmon which is quick and easy to make, tastes absolutely wonderful and would be a great choice for a dinner. In a small bowl mix the orange juice, orange zest and honey.
Orange honey-mustard Salmon instructions
- In a baking dish add the salmon. Add the black pepper, olive oil and sea salt on the top..
- Cover the salmon with a thin layer of honey. Put the baking dish in the oven for 10 minutes..
- Squeeze the oranges in a bowl..
- Add the mustard to the orange juice bowl..
- Add honey to the orange juice bowl. Mix well..
- Open the oven (after 10 minutes) and put the contents with orange juice, mustard and honey on the top of the salmon. Put the baking dish back to the oven for more 5 minutes..
- Leave for 5 minutes, in the oven, absorbing the juices and it's ready to serve!.
Divide the mixture on top of the salmon fillets. Smoked Salmon Tartare With Smoked Salmon, Spring Onion, Oil, Lime, Watercress. Der Hokkaido- Kürbis gibt dem Kuchen ein raffiniertes Aroma und eine wunderbare orange Farbe. Spoon the honey-mustard mixture evenly over the salmon fillets. (Don't worry if it drips down the sides a little.) Sprinkle the panko-pecan mixture The honey mustard salmon sounds great so I will make it tonight. My question is how large is the tablespoon measure you use in the metric ingredients please? | https://cookcodex.com/baked-recipes/recipe-appetizing-orange-honey-mustard-salmon/ |
gg.other_representationsall knowls · up · search:
An abstract group $G$ may be a transitive subgroup of $S_n$ for different $n$ and even in different (non-conjugate) ways for a given $n$. Each action is identified by a label of the form
nTt where $n$ is the degree and
t is the T-number classifying the action.
In terms of the Galois correspondence, the group $G$ corresponds to a degree $n$ extension $F/K$ where $F=K(\alpha)$, and $G$ is the Galois group of the splitting field of the monic irreducible polynomial for $\alpha$. The siblings correspond to sibling fields, which are not isomorphic to $F$, yet have the same normal closure.
There can be more than one action with the same transitive classification. This corresponds to non-isomorphic fields with the same degree, Galois group, and Galois closure. We indicate multiplicity using the notation "
nTt x k" where there are
k non-conjugate subgroups such that the action is
nTt. | https://www.lmfdb.org/knowledge/show/gg.other_representations |
A selection of our very best maths resources entirely free, updated each month.
Available for everyone, even expired accounts.
Autumn
Spring
Summer
Shape activities including identifying faces on 3D shapes and continuing patterns.
Tap on the trucks that have a pentagon on them.
Tap on the trucks that have a hexagon on them.
Identify the 2D shape from the selection.
Click on the shape to continue the pattern.
How many faces does the 3D shape have?
Identify the rotation from the selection.
Follow the directions to find the end point.
The latest news, articles, and resources, sent to your inbox weekly. | https://urbrainy.com/maths-games/year-2-age-6-7/shape-and-data |
”I grew up with a spatula in one hand and a paintbrush in another among a family of artists and cooks. I’ve blended the two together, as chef/author of 5 award-winning cookbooks and a mixed media artist.”
Rebecca Katz’s art asks viewers to step into a world of possibility, mystery, and magic, and to be transported through color, light, and texture. In a unique melding of artistry and culinary skill, Rebecca Katz has created a distinct niche, ”I grew up with a spatula in one hand and a paintbrush in another among a family of artists and cooks. I’ve blended the two together, as chef/author of 5 award-winning cookbooks and a mixed media artist.” Katz pioneered a novel use of food in the treatment of cancer, working closely with survivors and health professionals in US cancer centers. She finds making art and cooking creatively are both opportunities to be fully present in life.
In 1995, I took a life sabbatical and I fled to Italy, with no language and no luggage (mine was lost), clutching a map in Italian and my innate curiosity, I found color, texture, and atmosphere. I found a studio to paint in the mornings and an Italian signora to teach me cooking in the afternoons. I began a life of exploration, inspiration, and healing through food and art, and offering that to the world of people in search of both.
Absolutely! When I’m cooking whether it’s day to day, or creating recipes for a book, I’m always thinking about color, texture and how certain flavors will work together to provide the maximum amount of yum. We eat with our eyes as well as our mouths, so it’s extremely important to pay attention to how a plate of food looks. The more color on the plate, the more nourishing the plate.
When I was five, my mother gave me a watercolor set on a summer vacation and told me to paint the seascape in front of me. Art was a way for me to lose myself. Cooking came later.
I approach cooking as a way to nourish people through their taste buds and I approach art-making the same way. How can I help people feel nourished and touched through their visual senses?
Matisse. He was a lover of good food.
I would describe my painting style as an atmospheric abstract landscape. My niche in food and healing. I play with flavor, color, and texture to connect nutrition science to the plate, and pioneered an intelligent, novel and delicious use of food in the treatment of cancer.
Yes, that would have to my greatest contribution to the culinary canon – the legendary Magic Mineral Broth, a healing broth that has helped nourish thousands of people around the world.
Yes, I have a cooking class and a mixed media art class at the same time. The two are so connected.
Cooking is becoming less fussy and more focused on local and seasonal ingredients, using big bold flavors that come from around the globe.
A dear friend and colleague said to me recently, “Rebecca—I would know you anywhere in these paintings because it’s the way you make soup!”
Just as with making soup—the most elemental and alchemical of all culinary mediums— making a painting becomes an opportunity to explore intentions, experiment intuitively, and to feel into the colors and textures. Yet I do have a template or system of how I create soups and how I paint, which are surprisingly similar.
I choose my ingredients. I prep them out. I choose my spices or colors. I layer them. I find my way to an expression of life. And whether creating soup or painting, my intention is to nourish someone, so they savor inspiration, an experience, a memory.
For me, there is this sense of feeling about being in the kitchen and being in the studio, making soup or making paintings, that are atmospheric and ethereal, yet process-driven. Creative, but within a framework. I don’t just throw everything in a pot and hope. The onions are cut correctly, added to a pot of warmed oil… they start clarifying, turning golden… the spices go in… there’s a process of layering the flavor. Behind the stove and in the studio I have carefully developed flavors and colors that I work with, not pulling on everything under the sun each time I create something new. I try to work with the bare minimum to create the maximum sensory experience.
The opportunity to display my art is similar for me to serving soup. I create a soup, make it from scratch, take it off the stove, put in a bowl and serve it to someone. Once the bowl leaves my hands, it’s no longer my own. It becomes that person’s experience. Like years ago when I created my signature soup,
Whether you are looking for the perfect gift for a loved one, need to impress a colleague, or want to give a friend something they will always remember you by, you will find just the right piece on ARTmine. Need help? Contact us at [email protected]
Magic Mineral Broth to nourish participants in the Commonweal Cancer Help Program. As I conjured up the first batches, working with a deep intention and the alchemy of flavor and healing, participants wandered into the kitchen in search of that beguiling aroma. As I served mugs full of the magical broth, I watched as their faces expressed their inner joy, that involuntary spasm of vocal delight: yummmm. | https://art-mine.com/collectors-corner/2019/10/rebecca-katz-art-and-cooking-as-a-therapy/ |
During these uncertain times, how can we help?
See below to access our COVID-19 Resource Hub, and to explore our growing directory of COVID-19-specific and virtual volunteering opportunities.
Volunteers are needed in a variety of ways to increase the Park's visibility, accessibility, and usage, as well to teach the public the importance of conserving green space. Outdoor opportunities include gardening, weeding, picking up litter, removing algae from McGovern Lake, watering trees, and cleaning the Jones Reflection Pool. Areas include the Japanese Garden, Lake Plaza, Kinder Station, Centennial Gardens and other designated areas.
Individual adult volunteers only, are welcome to assist staff at our Centennial Gardens. All adult volunteers should sign up for an Orientation before volunteering.
Adults, Family or Teen volunteers are welcome to help out at Bayou Parkland or the Japanese Garden.
From 9am to 12pm, adults, teens, or families with youth are welcome to participate:
1 st Sat. of the month at Bayou Parkland. Assist with native ecosystems.
2 nd Sat. Heart of the Park. Assist with maintaining various areas in the Park. Task may include painting, de-littering, invasive removal.
3 rd Sat. and each Thursday, at Japanese Garden. Assist with weeding, pruning, stream cleaning.
4 th Sat. Heart of the Park. Assist with natural areas, mulching, pruning, seeding, planting.
Teens ages 15 -16, may volunteer without a parent/chaperone provided the teens have written parental permission (request a teen form). Teens and families do not need to take an orientation.
To start the process, please let me know if you are an Adult, Family, or Teen volunteer so that I can send the appropriate forms. All volunteers will be asked to follow COVID-19 protocols. Contact the Volunteer Department at [email protected].
1700 Hermann Drive, Houston, TX 77004, US
The Hermann Park Conservancy is a citizens' organization dedicated to the stewardship and improvement of Hermann Park - today and for generations to come.
In a city increasingly effected by the problems of a deteriorating environment, including pollution, climate change, vanishing plant and animal species, urban sprawl, there is a critical need to restore our urban green spaces. An urban green space provides a range of tangible benefits, such as mitigating air and water pollution, combating suburban sprawl, providing opportunities for recreation, reducing crime and fostering cohesive neighborhoods. Unfortunately, Urban Green Spaces are often the first public works to be hit by budget crunches. The aforementioned issues have all adversely affected Hermann Park. In order to simply maintain the park in its current condition, a 22,000 hour gap of needed maintenance must be filled.
The Hermann Park Conservancy was implemented to help fill this gap. The City of Houston's Parks and Recreation department does a great job with resources provided to them. However, due to the limited supply of man hours, many projects do not get the proper attention. Therefore, HPC continues to look for volunteers to lend a helping hand.
The exciting part of trying to fill this great need is that there are many opportunities that can accommodate any one. If you have a desire to help your community, please contact us!
We'll work with your schedule. | https://www.volunteermatch.org/search/opp299497.jsp |
Lily has two uncles that will want to do all sorts of fun stuff with her; like rock climbing.
And, as it turns out, most parks by us have a rock climbing wall on the play equipment so we started showing her how it works.
No, she won’t be going solo anytime soon, but she’s experiencing something new and having fun. | https://www.twistermc.com/36249/lilys-practicing-rock-climbing/ |
I would like to use GPS coordinate of one point and create a hexagonal grid layer around it where it is at the exact middle of a hexagon.
When using MMQGIS it produces a hexagonal grid on the current window and produces something like the attached.
The green point is a layer with one GPS coordinate.
I can get it roughly to the centre by moving the window around but I was wondering if there is a more precise way of doing this?
From the other options in the grid layer window (see attached) custom area seems the most promising.
However I am not sure how to use this to get the green point in the middle?
And it obviously depends on how large a grid I what.
UPDATE:
I have solved this when using a square grid but the Hexagon grid is still giving me trouble - mainly because I do not understand what the X spacing term relates to?
First I will go step by step through a rectangle grid:
- In the grid window I change the units to degrees
- For this example I set X spacing (Longitude) at 0.0001 and Y spacing (Latitude) at 0.0001 - this sets up the size of each rectangle or in this case square.
- Select Custom Area from Extent drop down
My point coordinates that I want to base the grid around are: S -6.58361, E 38.84678
Say we want 10 grid squares width in every direction from the point. We know my grid squares are 0.0001 degrees (WxL) thus ten grid squares will be 0.001. Thus the custom area can be set as follows:
Top Y = -6.58361 + 0.001 Bottom Y = -6.58361 - 0.001 Left Y = 38.84678 - 0.001 Right Y = 38.84678 + 0.001
- We are not quite there as the middle of a grid is the intersection of four grid squares so we need to offset everything by half a square (see attached for result):
Top Y = -6.58361 + 0.001 + 0.00005 Bottom Y = -6.58361 - 0.001 + 0.00005 Left Y = 38.84678 - 0.001 + 0.00005 Right Y = 38.84678 + 0.001 + 0.00005
For the Hexagon I thought I could do a similar thing however there are a couple of problems. Because to of the shape Y and X spacing are related and if you change one the other changes. If I set Y to 0.0001 the grids come out as the the same hight as the previous example (this makes sense) however at this setting X spacing is 0.0000866 - I have no idea what this relates to? I have tried to measure various things on the Hexagon but nothing matches. The width of the Hexagon is larger the the hight not smaller as indicated by the settings. | https://gis.stackexchange.com/questions/244185/centering-hexagon-grid-layer-on-point-in-mmqgis |
Spring musical 2021 audition extended till Jan. 8
“URINETOWN: The Musical” extended its audition period until Jan. 8 of next year, giving students more time to rehearse this winter break.
Professor Jude Navari, co-director of the production, revealed the reasons for the organizers having decided to extend the period.
“Our initial audition announcements to students (in October) coincided with the weeks just before and after the November elections, which, for many students, were distracting and overwhelming,” Navari wrote. “In mid-November, students were also dealing with the rising winter surge of infections in the COVID-19 pandemic. Now in December, there is still so much uncertainty in our state, our country, and our world about what the future holds in 2021. Maybe after the end-of-the-semester winter break and some rest, students will be able to refocus on the spring semester, and decide to participate in a fun, interactive, creative, and collaborative project!”
Next semester’s production and preparations would be done entirely online, both synchronously and asynchronously. Unlike the way it would be if it were in person, where the cast would give several performances, they will be using their class times to rehearse and perform scenes that will be recorded to produce a movie.
“Several theatrical rights organizations have now made the performance rights for plays and musicals available for streaming performances as live performance venues continue to be closed during the COVID-19 pandemic,” Navari said. “At the end of April 2021, we will host virtual ‘performances’ of URINETOWN online, but our ‘performances’ will be showing the ‘movie’ that we made together.”
The directors are aiming to cast a group of 16 to 20 students for the production. But with fewer number of students enrolled in DANC 410 (Dance for Musical Theater Production) and MUS 410 (Voice for Musical Theater Production), Navari expressed the risk of the courses being dissolved and ultimately canceling the production even before the spring semester begins.
Auditionees are asked to create an audition video and sing 16-32 bars of both up-tempo song (fast-tempo) and ballad (slow tempo). Auditionees must send their videos or links via email to [email protected].
Directors asked auditionees not to sing any selections from URINETOWN for their audition video.
Students cast in the musical are required to enroll in courses DANC 410 and MUS. 410 next semester. Both are two-unit classes and would make up the time needed to rehearse and to film the show.
“At Skyline College, our spring musical productions have been a premiere artistic collaboration and showcase of student talent for the past eight years. We hope enough interested students will audition so we can cast the show and keep this Skyline College annual student opportunity going while we are remote learning during the COVID-19 pandemic,” Navari wrote. | |
CAMBRIDGE, Mass., June 23 (UPI) -- Ratheon's BBN Technologies was given $17 million to continue work on a special language translation program for the Defense Advanced Research Projects Agency.
Work on the Global Autonomous Language Exploitation program, is in the final year of a 5-year effort.
The purpose of GALE is development and application of software to transcribe, translate, and distill large volumes of speech and text in multiple languages -- all with more than 90 percent accuracy by the end of the program.
Raytheon, in a news release, said the capability would allow U.S. analysts recognize critical information in foreign languages.
"DARPA's GALE program is already responsible for many great advances in machine translation and BBN has deployed systems for monitoring live broadcasts in foreign languages in more than two dozen locations," said BBN President Tad Elmer. "This new funding will allow us to achieve an even higher level of machine translation accuracy."
The company described its approach to the system as combining output transcriptions and translations from multiple systems to obtain a translation that is better than any of the component system translations.
"The team is using automatic adaptation and contextually aware processing at all system levels to optimize performance across different languages, dialects, topics, speakers and semantic nuance to deliver the relevant information," it said. | http://blog.worldlanguagecommunications.com/2010/09/more-funding-for-language-project-from.html |
Om is considered to be the symbol and vibration of unity between all people and all creatures and all things in the universe.
It has been said that constant repetition of the mantra, Om, can unite one with energy that is pure love, unbound by time and space.
We will chant Om together for an hour, surrounded by musicians playing gongs, drums, didgeridoo, crystal bowls and percussion; all instruments that bathe us in resonant harmonizing tones that can create peace inside and out.
Afterwards, we'll sit and savor the silence and the stillness.
By enjoying peace in the present moment, we are creating our peaceful future. When we practice together, our practice is strengthened. The more people we have in collective harmony, the more ability we have to transform into who we truly are.
When we chant Om, our hearts widen like a great ocean.
We invite you to take pleasure in immersing yourself in an Ocean of Om.
2019 date to be announced
BYOC (bring your own cushion to sit on!)
Joining us: | https://www.theyogaofsusannah.com/ocean-of-om |
The current COVID-19 pandemic has forced many organizations into a state of high anxiety. Even the top economists are uncertain about how the future will look and what the long-term impacts will be, but all are in agreement about one thing: Things will be different. To stay competitive, it is more important than ever for leaders to “get lean” in their organizations and start doing more with less. This starts with your technology and internal processes.
The ground is shifting. COVID-19 has impacted industries and businesses of all sizes. Many have begun course correcting and adapting to the changing, tumultuous environment. As a leader, it’s important that you do the same.
If you don’t pay attention and shift your organizational focus during this time, the effects on your outcomes could prove dire. Failure to prepare for a downturn in a timely, decisive fashion will result in losses. And depending on the extent, these losses may be difficult to overcome.
A part of every business leader’s plan should be doing more to stay competitive as efficiently as possible.
How is your organization interacting with buyers today? Your prospects and customers are keenly aware of your service, or lack thereof, now more than ever. Responding to changing demands in your customer base is essential, but this is really nothing new. Thought leaders have waxed poetic over the last few years about rising to consumer demands and becoming a service-oriented organization to stay competitive – ourselves included. This line of thinking usually aligns closely with the call for digital transformation and investment in technology.
COVID-19 has expedited this call to action. The pandemic has forced us all to rethink nearly every aspect of our daily routine – from work and school to how we buy groceries (and find toilet paper). In business, it has necessitated mass remote workforces, moved meetings and events to virtual environments, and changed the way organizations rely on technology. For some organizations, this was easier done than for others. And much of that difference lies with the technologies they had (or did not have) in place.
To quote Forbes:
“It’s been imperative to digitally transform our places of work and education to be able to operate effectively. Those companies able to use technology well to keep going and rethink their business model for the future by fast-tracking digital transformation will be ones ahead of their competition.”
If you are struggling to stay competitive with decreased performance and an inability to effectively reach your customers, now is the time to rethink your digital platforms. Consider the current situation the much-needed reminder to shift your focus to long-term digital investments that will enable your future success.
Improved visibility and speed to action in your sales and customer support processes are essential to making it through today’s economic conditions. Leaders can start by reviewing their operations and implementing business process improvements across departments.
❯❯❯What your bad processes are costing you.Learn More
While this process will look different in every organization, with the current focus on improving sales efficiency and performance, we’ve identified three areas that can greatly improve your customer experience, sales productivity, and overall effectiveness. Improving these areas can help you stay competitive both during and after COVID-19.
Are you managing a number of your processes in Excel or Google Docs?
While spreadsheets can be great for exporting and viewing data, managing key parts of your business in spreadsheets is a large red flag. Spreadsheets can be fragile and finicky. If a formula or reference is off, it can lead to major problems.
The more complex the spreadsheet, the bigger the risk. Spreadsheets often require a lot of manual effort to manage and maintain, and valuable time and resources to verify and support. Not to mention the data concerns that come with managing key parts of your business outside of secure systems.
This is where your technology investments can provide a huge advantage. Using Salesforce to manage your processes eliminates these data integrity and long-term stability concerns. An integrated CRM solution like Salesforce also provides additional opportunities to improve efficiency through advanced reporting, enhanced tracking, and mobile accessibility.
Many business processes involve a number of approvals and checks-and-balances across management levels. This is a part of accountable operations today. Streamlining this process can not only save significant time, but also money. Added bonus? Reduced headaches and frustration from your team by eliminating common roadblocks and barriers throughout the process.
Whether it’s pricing discounts, support entitlements, or proposals, phone call or email approval is simply not scalable. These methods often lead to critical delays, a lack of proper documentation, and limited visibility.
Your technology can streamline and automate these approval processes. Salesforce approvals, for example, includes notifications when an approval is completed and provides status visibility across your organization. This reduces silos and provides a scalable framework for your business to operate in current conditions no matter what changes come your way.
Do your customers often ask about the status of their order or support request? Do you heavily rely on email for communication and follow-up?
Leveraging your Salesforce investment, you can centralize your customer communications with Salesforce Service Cloud. It consolidates all your service and support communications under the customer record, providing your team with a full history to address and resolve issues quickly and with much-needed context at their finger-tips.
Additionally, Salesforce Communities is an amazing tool to provide your customers and vendors with a controlled experience. Your organization can enable self-service on frequently asked questions like order status, invoices, services requests, and more. This enables your team to focus on much better areas of the business to drive results.
At the end of the day, the critical piece for leaders to stay competitive is to drive efficiency through your technology. Look for ways to streamline and use your technology investments in new ways. Only this will enable you to truly do more with less during these unprecedented and unpredictable times. | https://www.eidebailly.com/insights/articles/tc/do-more-with-less-to-stay-competitive-during-and-after-covid-19 |
Author: Frederick "Ken" Sexe
Systems thinking is critical to understanding how systems perform yet traditional methods of thinking often fail (or worse yet result in unintended consequences) when applied to systems. This is not intended to be a comprehensive article on systems but instead is intended to provide basic systems concepts that will hopefully provide insight for those unable to clearly understand systems. These concepts mainly derive from Russ Ackoff’s presentation to the InThinking Network on February 28, 2005 that is a valuable primer into the understanding of a system. The InThnking Network is a non-profit organization dedicated to systems thinking that has many useful resources for both novices and those expert in systems thinking.
A system can be defined loosely as two or more components of which one or more are essential parts that interact with each other to achieve a shared goal. This definition has several important factors of which all systems rely upon. The first is that a system contains one or more essential parts of which if removed the system would be unable to achieve its goal. The second is that each part within a system interacts which each other to achieve the goal of the system. It is important to understand that no essential part can by itself perform the function of the system as a whole and that the system cannot perform its function within a larger system if an essential part is removed from the system.
Essential parts have three factors that define them. Each essential part can affect the behavior or properties of the whole. Conversely, every subsystem within a larger system can affect the behavior or properties of the whole yet none of the subsystems can have an independent effect on the whole. This factor is important in that if the essential part is altered then the ability of the system to perform its function is impacted, possibly negatively. Therefore, it is possible to improve the performance of an essential part yet degrade the performance of the system.
No essential part has an independent effect on the whole; each essential part instead interacts with other essential parts as a connecting set. An example of this would be the brain within the human body in that the brain is not able to think on its own but instead relies on its interactions with other subsystems within the body to perform. Nor can a subsystem perform the function, behavior, or properties of the larger system. An example of this is the human body in which no component or subsystem within the human body can live yet all of the components and subsystems interact to perform the overall function of the human body (life).
The properties of essential parts provide several concepts important in understanding all systems. The first important concept is that the performance of a system relies on the interactions of the parts within it and not on the performance of the parts taken separately. This concept runs counter to conventional analytical thinking which attempts to gain an understanding of the whole by disassembling the parts. Analytical thinking fails to provide understanding of a system due to the fact that when a system is disassembled it no longer is able to perform it’s role; it is through a study of the interactions that true understanding of a system is gained. The second important concept is that by optimizing the parts one can inadvertently make the system worse. When parts are optimized without consideration of the interactions the ability of the other parts to interact and perform their own role relative to the function of the overall system changes. Russ Ackoff notes that you can take the best parts of all of the cars in the world and place them together and may will not even have a car; this is because each part is designed in relation to interactions with different systems and as such may not work when combined with other parts.
It is my hope that this brief article provides some basic understanding to those who are unfamiliar with how systems work. In future submissions I may focus on other system elements and characteristics; please feel free to contact me if there are any questions you may have. I also hope that others within ASEM more knowledgeable in systems than I am expand upon these so that all members could learn from their expertise.
Graphic Credit: http://www.stockvault.net/photo/116783/electronics-lab
Frederick (Ken) Sexe is a lifelong learner currently wrapping up his PhD in Engineering Management and Organizational Psychology at Northcentral University. His hobbies include challenging prevailing patterns of thinking that discourage new ideas while developing new ways to do things. He is currently employed as a Senior Systems Engineer at Raytheon where he is taking a career break from management to pursue his educational goals and focus on his family. | https://asem.org/blog/3535083 |
The Department of Surgical Services implements state-of-the-art technology to perform both elective and emergency surgical procedures in a variety of subspecialties. Norwood Hospital’s surgical team performs more than 4,000 surgeries each year.
Taking the T:Norwood Hospital is conveniently located directly across the street from the "Norwood Central" commuter rail station on the MBTA's Franklin line. We are also located along the MBTA bus route 34 E. From the Forest Hills Station, take the “Walpole Center” bus, which follows Washington Street through Norwood Center and stops at the hospital. Please call the MBTA office directly for train and bus schedules.
Parking & More:Visitor parking at Norwood Hospital is available 24 hours a day in the visitor parking lot off E. Hoyle Street behind the hospital. Parking is free for the first hour. For over one hour, there is a $5 one time charge per day with receipt. Please ask for a receipt to avoid being charged for future visits on the same day. | https://locations.steward.org/ma/norwood/825-washington-street-3122842.html?utm_source=citation&utm_medium=local&utm_campaign=yext-listing&utm |
None of the Betaproteobacteria isolates could solubilize phosphate. Three pots were set up for each of the four exposure times 0, 1, 4, and 9 days in the greenhouse and each assay consisted of three replicates, arranged in a completely randomized design. They search out nutrients and moisture and bring them back to share with the plants. A rhizobium is a particular type of rhizobacterium, but there are also many other kinds of rhizobacteria. Plant nutrient solution samples were filtered using 0. However the growth promoting properties of endophytic bacteria from ginger has not yet been well studied. The cultures were centrifuged at 10000 rpm for 15 min and 2 mL of the supernatant were transferred to a fresh tube to which 100 μL of 10 mM orthophosphoric acid and 4 mL of the Salkowski reagent 1 mL of 0.
After initial denaturation at 94°C for 5 min, each thermal cycling consisted of 1 min denaturation at 94°C, 1 min annealing at 52°C and 1. Genome survey and characterization of endophytic bacteria exhibiting a beneficial effect on growth and development of poplar trees. After 35 cycles, a final extension step was performed at 72°C for 10 min. Inside these nodules, the rhizobia fix nitrogen. In order to prepare them for the experiments, shoots were cut above the hypocotyl.
The side dressing should be made 25 to 30 cm 10-12 in from the row of plants due to ginger being easily damaged by fertilizer applications. They also can spread disease between plants. Bacterial clones are grouped by taxonomic groups class. Inside the root microbiome: bacterial root endophytes and plant growth promotion. This was further treated with Tween 80 for 10 min with vigorous shaking.
Everyone has their own methods for trying to eliminate moles. Introductory Plant Biology 10th ed. Ginger Zingiber officinale Roscoe has been used widely as a food spice and an herbal medicine. Cause Management Plant resistant varieties if nematodes are known to be present in the soil ;check roots of plants mid-season or sooner if symptoms indicate nematodes; solarizing soil can reduce nematode populations in the soil and levels of inoculum of many other pathogens. It is caused by the bacteria, Pectobacterium carotovorum.
Thus, these isolates could be beneficial partners for the phytoremediation of organic pollutants, especially in constructed wetlands, were the removal of excess nitrogen is needed. Structural studies suggest that there are more than 50 structurally related siderophores like pyoverdins, that are produced by different species of Pseudomonas Abdallah ; Budzikiewicz. In general, a tuber is high in , e. Endophytic bacteria associated with growing shoot tips of banana Musa sp. If one looks at the label on a bag of either of these well-known organic-approved phosphate sources, one will read that they are only rated to contain 3% phosphate P 2 O 5 , 0-3-0 is what the bag says, meaning 0% N Nitrogen , 3% P phosphate , and 0% K potash. Nitrogen fixation is an energy-intensive process, and the bacteria take carbon compounds from the plant to fuel it. The eggs survive the winter and hatch out with warm weather in the spring.
No, it takes either strong acids or the right microorganisms to break the Ca-P bond. Biodegradation of nitro-substituted explosives 2, 4, 6-trinitrotoluene, by a phytosymbiotic Methylobacterium sp. Propagation Basic requirements As a tropical plant, ginger grows best in warm and sunny climates in a deep but well draining soil loam that is high in organic matter. They are probably the oldest living organisms on the planet, the ones that begin the process of creating a livable world for us by turning rocks into fertile soil. This makes the present finding much more interesting.
The bacterial infection follows the leaf veins down the leaves and the splotches may run together. It has been used successfully in the treatment of industrial and municipal wastewater. The pathogen is Sclerotium rolfsii, also know as mustard seed fungus, because it also presents as brown, spherical sclerotia, about the size and color of mustard seeds, when inactive. The surface sterilization procedure for the isolation of endophytic bacteria as standardized in the experiment was quite satisfactory as no growth appeared on the control plate. For the same reason that bakers use bread yeast, champagne makers ferment grapes with champagne yeast, brewers add beer yeast, yogurt is made with yogurt starter, and cheesemakers use the culture that will give them the kind of cheese they wish to make.
Rhizomes are also called creeping rootstalks or just rootstalks. The evolutionary distances were computed using the Maximum Composite Likelihood method. There are several long-standing disagreements concerning the taxonomy of rhizobia and their relatives, though, and I shall probably write something about them in future posts. In late summer they leave the rhizome entering the soil and becoming dark brown pupae. Properties of bacterial endophytes and their proposed role in plant growth.
Measurements of carbamazepine remaining in the control pots after 9 days did not reveal any adsorption to the perlite or vessel walls over time. The microorganisms residing within the plants or endophytes are unique in their adaptations to specific chemical environment of host plant. These strains could serve in the future to improve in planta degradation of the antiepileptic drug in wetland-based waste water treatment plants. However, it is not my purpose to write a textbook. Transfer of wastewater associated pharmaceuticals and personal care products to crop plants from biosolids treated soil. It is also used to reduce fever, reduce hormonal dosage in immune diseases and treat chronic infections in the lungs.
Influence of Rhizobium meliloti on phytoremediation of polycyclic aromatic hydrocarbons by alfalfa in an aged contaminated soil. If a rhizome is separated each piece may be able to give rise to a new plant. They live underground in burrows often using a mole's but travel aboveground through runways they make by eating everything in their path, be it grass, herbaceous plants, bulbs, tubers and even tree roots or tree bark at the ground level. Since then, pharmaceuticals in the aquatic environment have raised increasing interest as it is reflected in the growing number of publications related to their fate. They do have more nitrogen than average plant roots, but most of the nitrogen fixed in the nodules does not stay below ground. | http://lemurianembassy.com/rhizome-bacteria.html |
Time for fundamental change in the sheriff's department
Sheriff Chuck Jenkins’ lengthy presentation at the Nov. 10 County Council meeting took longer than the county business agenda, and citizens need to know what he and the sheriff’s department have to say.
Jenkins’ announced topic was “Community Policing,” but he spent nearly all of his time lamenting the perceived lack of appreciation for the difficult work he and his deputies must do in the face of “unjustified and unfair” opposition. He characterized the Black Lives Matter movement and continuing protests arising from the George Floyd killing calling for “broad sweeping reform” as “reality in policing versus political rhetoric.”
Perhaps most indicative of Mr. Jenkins’ and the sheriff’s department’s mind-set is his repeated insistence that the sheriff’s department is a “reactionary” force; he said they approach every incident from a “reactionary” stance. What that means to this writer is that the sheriff’s department and Mr. Jenkins arrive at every call expecting the worst: their lives are in jeopardy, and they are prepared to “react” before assessing the totality of the situation. The American Edition of the Oxford English Dictionary (1996) defines “reactionary” as “tending to oppose (especially political) change and advocate return to a former system.”
Mr. Jenkins has told us precisely what to expect from him. Any attempt on the part of citizens to change policies in order to address racial, ethnic, religious, or gender identity problems that manifest in incidents of police misconduct will be met with intransigent opposition. He and the sheriff’s department do not believe that systemic injustice exists. Mr. Jenkins was very clear when he said: “systemic racism is political rhetoric.”
We are living in times of tumultuous change — environmental, social, political. We must have people in positions of leadership who are willing to evolve their thinking as realities shift and transform. Mr. Jenkins has demonstrated his determination to maintain business as usual. It is time for fundamental change in the Frederick County Sheriff’s Department.
Watch this discussion.Stop watching this discussion.
(1) comment
Yes, policing is largely "reactionary". They must react when someone calls 911 & yes they must assess the situation when they arrive at the scene. For police to do otherwise could endanger others or themselves, especially in today's political climate. I've witnessed proactive actions of the sheriff's office but those actions don't make the news. What do you want the sheriff's office to do, greet you with a bouquet of flowers when they arrive at an incident? In my opinion, you are so off base, I'll just stop here and continue supporting Sheriff Jenkins and his entire staff.
Welcome to the discussion.
Keep it clean. No vulgar, racist, sexist or
sexually-oriented language. Engage ideas. This forum is for the exchange of
ideas, not personal attacks or ad hominem criticisms. TURN OFF CAPS LOCK. Be civil. Don't threaten. Don't lie.
Don't bait. Don't degrade others. No trolling. Stay on topic. No spamming. This is not the place to sell miracle
cures. No deceptive names. Apparently misleading
usernames are not allowed. Say it once. No repetitive posts, please. Help us. Use the 'Report' link for abusive
posts.
Commented
Letters must include your real name, town of residence and daytime phone number, which we use for verification. We do not accept anonymous letters or letters written under a pseudonym. Those of no more than 200 to 300 words are more likely to be published.
News-Post social
Keep the conversation about local news & events going by joining us on Facebook, Twitter and Instagram. Recent updates from The News-Post and also from News-Post staff members are compiled below. | |
What is supersymmetry?
Supersymmetry is part of a hypothetical model of how the universe works. It gives one explanation of how the universe might have evolved into its current state and suggests that the universe is unified under a single symmetric framework. One prediction of the supersymmetric model is that, for every kind of fundamental particle in the universe, there are symmetric partner particles or “sparticles” that exist as well, but these are not readily observable. So far, no sparticle has yet been detected. For this and other reasons, supersymmetry in the universe has not yet been confirmed. | https://www.papertrell.com/apps/preview/The-Handy-Astronomy-Answer-Book/Handy%20Answer%20book/What-is-supersymmetry/001137027/content/SC/52caff7282fad14abfa5c2e0_Default.html |
Halo 4 Walkthrough Guide- Part 3: Forerunner
Make your way along the bridge here until you reach the circular platform ahead. As you approach a terminal will rise up. Stick Cortana into this for a short scene. Afterwards, hop off the platform and enter the portal that has appeared.
Follow the tunnel until you find yourself in an outside area. Ignore the retreating critters and continue around the path to the right. As you enter the next larger area you will be attacked. There are a few crawlers here to kill. Proceed to the terminal opposite the entrance and activate the button here. A light bridge will appear behind it.
Cross the bridge and continue along the path. A short scene will play, hit the melee button when prompted to do so.
Continue through the tunnel and follow the path outside until you see a rocky structure in front. Two pillars will raise either side of it and a knight will be standing on top of it waiting for you. Eliminate the crawlers that enter the area from the left hand side of the area before focusing your efforts on the knight, you will also find a watcher in the area. Take the watcher down first as they can shield other units. Kill any remaining crawlers that may have joined the fray and then look behind the rocky structure to find a door we can enter.
Once inside, follow the tunnel to the end and exit into another large area. Kill the knight outside the door and then follow the passage between the rocks to the right to find another. Follow the path back to the left and deal with the crawlers in the area, continue towards the glowing circular platform on the ground in front. As you approach, more crawlers will attack from the cliff to the right so deal with them before continuing.
Drop down to the platform below and you’ll find a watcher a knight and a few more crawlers here. Again deal with the crawlers and the watcher first before taking out the knight.
Climb the ramp to the left or right and enter the door at the top. Follow the hallway all the way to the end, note that there is a small side passage to the left containing some ammo if you are interested. When ready enter the door to the next area.
We will need to destroy three shield generators at ground level.
Each of the generators is located in a small, square structure with a ramp on one side and two open doorways allowing you to see all the way through the room. There are two of these located on the right side of the central structure and one on the left side. Take your time and try to eliminate the hostiles around each of the generators before approaching so they don’t distract you while you destroy them.
After the three generators are down, head to the ramp at the back of the central structure. A pair of watchers and a pair of knights will be waiting for you. Eliminate them and then climb the ramp. On this level, kill one more knight and then work your way around the platform, cruise up the next ramp and find the bridge leading to the next area. Continue across this and activate the button at the end of the hall. Ride the elevator to the top and enter the next room.
Run up to the spinning core and activate the panel to stop it. Proceed into the portal on the far side of the room.
Part 2: Enemy of my Enemy
You will find yourself back in the first room that we warped from earlier. This time, the portal on the right will be activated so head over here and enter it. Follow the tunnel all the way to the end and drop down the hole and push forward until you reach another outside area.
As you enter, you will see covenant drop pods landing in the area in front. The covenant and Promethean forces will attack each other. There is an assortment of jackals, grunts and elites on the covenant side and the usual crawlers, knights and watchers on the Promethean side. Let the two factions weaken each other a little before intervening to polish off any survivors.
Either way, once you leave the starting cave, you’ll need to make your way across the room to the right and when the coast is all clear, climb the ramp against the wall leading up to the left. Kill the knight around the corner, the Promethean laser emplacement on the wall in the distance and the group of watchers before continuing to the end and entering the passage to the right.
Here you will see two elites on ghosts get taken out by a knight. Kill him and then proceed down the path. Grab one of the ghosts to make the next section a little easier! Our goal is to reach a tunnel in the far left hand corner of the area, so either let the enemies thin themselves out, or take them out yourself as you make your way to the aforementioned tunnel. Inside, climb the ramp and follow the set passage until you exit out into another small area in front of a large structure.
Kill the enemies and then enter the doorway. Follow the tunnel all the way to the end and exit into a familiar looking room. This room is almost identical to the earlier room where we had to destroy the three shield generators. We’ll need to do the same thing here, but this time its a little harder as there will be covenant forces with banshees and ghosts in addition to the standard infantry units. Note that in this room, there are two power core rooms on the left of the central structure and one on the right hand side.
Once you have destroyed all three power cores, continue up the ramp at the back of the central structure and across the bridge as we did previously, killing the 2-3 elites on the platforms here as you go. Once inside the main building, hit the switch to activate the lift.
At the top, run over and activate the panel in front of the spinning core to stop it. Continue through the portal at the back of the room. We’ll be back in the first portal room for the third time! Enter the next portal here.
Part 3: Almost Home
As you proceed down the ramp towards the circular structure a covenant ship will arrive in front and drop off a group of grunts and a sniper jackal. When they are dead, hit the button on the wall to the left and enter the door that opens.
At the top of the passage you’ll enter into a room with a fight going on between the covenant and the Prometheans. There are 2-3 elites, a few grunts and jackals, three knights and a watcher to watch out for. There is also a Promethean laser emplacement, so try and focus on that whilst the two other forces works themselves down. Once the fighting dies down, mop up any survivors and continue through the next door.
Step on the light covered floor at the back of the room to rise up to the next level exit the door into the next room. The first part of the room has a similar layout and enemy make up to the previous one, so either take down both sides or wait until the numbers are thinned out a little to press through. Continue to the far side of the room and climb the ramp on the left all the way to the top.
Kill the elites and knights and the laser emplacement too before proceeding up the ramp and running over to activate the terminal here.
Part 4: Next Stop, Certain Death
When you regain control of the chief, run forward and hop onto one of the ghosts. You are going to have to pilot the ghost through a disintegrating environment. There’s no real challenge here, just avoid the obstacles that appear and make your way to the end of the linear area and jump into the portal at the end to complete the mission.
| |
No spinning is allowed on Atholl Estates water during the salmon and sea tout season.
Cutting through some of Scotland's most impressive scenery, the Tummel beat extends from the village of Moulinearn to the Logierait bridge (approx 2500 yards), just before the Tummel meets the Tay at Ballinluig.
The beat is double banked, can accommodate up to 4 rods and has some outstanding fishing opportunities both from the bank and from wading. With eleven pools, the Lower Tummel provides excellent fishing in most water conditions.
The spring run starts in March and continues until the early summer, when the water becomes quieter until the autumn run starts in September.
Fishing continues until the season closes on 15th October. The beat is usually let by the week during April, May, June, September and October.
WE HAVE INTRODUCED A 2 ROD HOUSE POLICY, WHERE THE 5 & 6 RODS WILL ONLY BE USED BY A MEMBER OF THE ATHOLL ESTATE FAMILY.
All anglers are asked to please read and understand the procedures for safe use of the railway level crossing which needs to be crossed to access and egress the fishings, these details are found in the
|Review Type||Score by %||Star rating|
|Fishery Description||80%||★★★★|
|Banks & Paths||68%||★★★|
|Hut/boats etc||57%||★★★|
|Gillie Service||63%||★★★|
|Gillie Knowledge||67%||★★★|
|Value for money||70%||★★★★|
|Overall (based on 19 reviews)||67%||★★★|
Salmon & GrilseLast Week: - Largest: lbs
Sea TroutLast Week:
-- Largest:
-lbs
-- Largest:
-lbs
Wild TroutLast Week: | https://www.fishpal.com/Scotland/Tay/LowerTummel/index.html |
Consider a dynamic scene such as Figure 1 where you, as the camera wearer, plan to pass through the corridor in the shopping mall while others walk in different directions. You need to plan your trajectory to avoid collisions with others and objects such as walls and fence. Looking ahead, you would plan a trajectory that enters into the shop by turning left at the corner although such space cannot be seen directly from your perspective.
The fundamental problem we are interested in is future localization: where am I supposed to be after 5, 10, and 15 seconds? This challenging task requires understanding of the scene in terms of a long term temporal human behaviors with respect to the spatial scene layout, with missing data due to occlusions.
We study the future localization problem using a first person depth (stereo) camera. We present a method to predict a set of plausible trajectories of ego-motion given a depth image captured from a egocentric view. As a byproduct of predicted trajectories, the occluded space behind foreground objects is discovered. Our method purely relies on the depth measurements, i.e., no image based features such as semantic labeling/segmentation or object detection/recognition are required.
Inspired by proxemics , we represent the space around a camera wearer using an EgoSpace map which reassembles an illustrated tourist map: an overhead map with objects seen from first person video projected onto it.
A predictive future localization model, using the EgoSpace map, is learned from in-situ first person stereo videos from various life logging activities such as commutes, shopping, and social interactions. By leveraging structure from motion, camera trajectories are reconstructed. These camera trajectories are associated with its depth image at each time instant, i.e., given the depth image, a future camera trajectory is precisely measured while the depth image is obtained by the stereo cameras111Any depth sensor such as Kinect and Creative Senz3D are complimentary to our depth measurement. as shown in Figure 2(a).
In a training phase, we discriminatively learn the relationship between the EgoSpace map and future camera trajectory. We model a trajectory of ego-motion using a linear combination of compact trajectory bases. By the nature of the alignment between ego-motion and gaze direction, the trajectory is highly structured. We empirically show that 46 linear trajectory bases are sufficient enough to express all plausible trajectories of ego-motion with high precision (99 accuracy). This compact representation allows us to efficiently find a set of trajectories that are compatible with the associated depth image using EgoSpace map matching. This provides an initialization of the predicted trajectories. However, not all these ‘re-imagined’ trajectories avoid objects in the current first person view. We refine it by minimizing a cost function that takes into account compatibility between the obstacles in EgoSpace map and trajectory. This cost function explicitly models partial occlusion of a trajectory which allows us to discover the space behind foreground objects.
Why EgoSpace map? Two cues are strongly related to predict a trajectory of ego-motion, e.g., where is he or she going? (1) ego-cue: a vanishing point is often aligned with gaze direction; and 2D visual layout of the obstacles in the first person view implicitly encodes the semantics of the scene. (2) exo-cue: objects in a 3D scene such as road, buildings, and tables constrain the space where the wearer can navigate. Such cues can be explicitly extracted by an ego-depth image where the gaze direction of the wearer can be calibrated with respect to a ground plane (exocentric coordinate) while the depth provides obstacles with respect to the wearer (egocentric coordinate). Our EgoSpace map representation exploits these two cues where we measure depth from an egocentric view, and create an illustrated tourist map representation capturing both 2D visual arrangement of the obstacles (in first person view) and their 3D layout (in overhead view). This representation allows us to analyze and understand different scene types and gaze directions in the same coordinate system.
Contributions To our best knowledge, this is the first paper that predicts ego-motion from a depth image without semantic scene labels or object detection via in-situ first person measurements. Core technical contributions of our paper are (a) a predictive model that describes a spatial distribution of objects with respect to an egocentric view, allowing us to register different scenes in a unified coordinate system; (b) a compact subspace representation of the predicted trajectories enabling a search for trajectory parameters feasible without explicit modeling of dynamics of human behaviors; (c) occluded space discovery through trajectory prediction; and (d) the EgoMotion dataset with a depth and its long term camera trajectory, which includes diverse daily activities across camera wearers. We evaluate our algorithm to predict ego-motion in real world scenes.
2 Related Work
Our framework lies an intersection between behavior prediction and egocentric vision.
2.1 Human Behavior Prediction
Predicting where-to-go is a long standing task in behavioral science. This task requires to understand the interactions of agents with objects in a scene that afford a space to move. There is a large body of literature on human behaviors prediction algorithms. Pentland and Lin modeled human behaviors using a hidden Markov dynamic model to recognize driving patterns. Such Markovian model is an attractive choice to encode human behaviors because it reflects the way humans make a decision [38, 17, 19]
. These models, especially partially observable Markov decision process (POMDP), have influenced motion planning in robotics[29, 15, 31].
In computer vision, Ali and Shah developed a flow field model that predicts spatial crowd behaviors for tracking extremely cluttered crowd scenes. Inspired by the social force model , Mehran et al. predicted pedestrian behaviors in a crowd scene to detect abnormal behaviors, and Pellegrini et al. used a modified model to track multiple agents. Ryoo presented a bag-of-word approach to recognize social activities at the early stage of videos. Vu et al. predicted plausible activities from a static scene by associating the scene statistics and labeled actions. In terms of the trajectory prediction task, our work is closely related with three path planning frameworks by Gong et al. , Kitani et al. , and Alahi et al. . Gong et al. presented a method to generate multiple plausible trajectories of each agent in the scene constructed by homotopy classes, which allows them to produce a long term trajectory for visual tracking in crowd scenes. Kitani et al. leveraged inverse optimal control theory to learn human preference with respect to the scene semantic labels, which enables them to predict the paths an agent follows. Alahi et al. introduced a geometric feature, social affinity model that captures a spatial relationship of neighboring agents to predict destinations of a crowd.
Unlike previous methods that use semantic labels/segmentation or object detection/tracking which are often noisy in real world scenes, our measurements are a single depth image that can be reliably obtained by stereo cameras or depth sensors. Estimating optimal parameters for Markovian models is often intractable. In contrast, our trajectory representation in a egocentric view can be encoded using compact trajectory bases, thus it makes learning tractable because of the reduced number of parameters.
2.2 Egocentric Vision
A first person camera is an ideal camera placement to observe human activities because it reflects the attention of the camera wearer. This characteristics provides a powerful cue to understand human behaviors [5, 12, 7, 30, 33].
Kitani et al. used scene statistics produced by camera ego-motion to recognize sport activities from a firse person camera. Traditional vision frameworks such as object detection, recognition, and segmentation frameworks are successfully integrated in first person data: Pirsiavash and Ramanan recognized daily activities using deformable part models, Lee et al. found important persons and objects, Fathi et al. discovered objects, and Li et al. [21, 20] segmented pixels corresponding to hands. In a social setting, Fathi et al. presented a method to recognize social interactions by detecting gaze directions of people and Park et al. introduced an algorithm to reconstruct joint attention in 3D by leveraging 3D reconstruction of camera ego-motion. This reconstruction allows prediction of joint attention possible by learning the spatial relationship between a social formation and joint attention .
Such characteristics of first person cameras were used to generate interesting applications in vision, graphics, and robotics. Lee et al. summarized a life logging video, Xiong et al. detected iconic images using a web image prior. Arev et al. used 3D joint attention to edit social video footages and Kopf et al. used 3D camera motion to generate a hyperlapse first person video. In robotics, Ryoo et al. predicted human activities for human-robot interactions.
Unlike most previous methods, our task primarily focuses on predicting future behaviors by leveraging in-situ measurements from 3D reconstruction of camera ego-motion. This also allows us to tackle a more challenging problem—to discover an empty space that is not observable because of visual occlusion.
3 Representation
Inspired by proxemics , we present a characterization of space with respect to the egocentric coordinate system, called EgoSpace map.
3.1 EgoSpace Map
EgoSpace Map is a representation for space experienced from first-person view but visualized in an overhead bird-eye map, akin to an illustrated tourist map.
It has three key ingredients. First, we define an egocentric coordinate system centered at the feet location, the projection of the center of eyes onto the ground plane as shown in Figure 2(b). The normal direction, , of the ground plane is aligned with the -axis, and the height of the eye location is , i.e., where is the 3D location of the center of eyes. The gaze direction defines tangential directions of the ground plane: the -axis is aligned with the projection of the gaze direction, , i.e., .
Second, the EgoSpace encodes depth cue from a first person view onto an overhead view on the ground plane. Using a log-polar parametrization of the X-Z (ground) plane, we define EgoSpace Map as a function , measuring likelihood of occlusion introduced by foreground objects from the gaze direction. One can think of the eye gaze is a light source shining on foreground objects casting shadows onto the ground plane. On the shadow image we record the object height which is proportional to the occlusion likelihood.
Formally, measures the height of the point, , from the ground plane that intersects the ray, , from the center of eyes, , to with an occluding object, , i.e.,
|(1)|
where such that . is a set of objects in the scene.
We discretize the polar coordinate system by uniform sampling in angle between and and uniform sampling in the inverse of radius which results in uniform sampling in the egocentric view as shown in Figure 2(c). Note that the locations to measure the EgoSpace map are almost radially uniform from the first person view point. Figure 2(d) shows the EgoSpace map for Figure 2(c).
For future localization, ground plane provides a free space for us to move into. On the EgoSpace map, if from the first person view the point lies on the ground plane. More interestingly, the space behind an object also indicates potential places to navigate. Since the EgoSpace map is represented in the ground plane, not in first person view, the space behind the object are marked as occluded area (the right few columns of the map).
Third, the area outside of a first person view depth image boundary is set to m. On the EgoSpace map, shape of the mask is uniquely defined by the gaze direction (roll and pitch angles of the head direction). For example, Figure 2(c) shows a case where the wearer is looking ahead almost parallel to the ground, the ground area close to the wearer (m) was not visible e.g., is marked as . If the wearer is looking down, the masked area on EgoSpace would be for large values of .
The EgoSpace representation supports learning future localization from first person videos by combining cues from 3D scene geometry and gaze direction. Its benefits include: 1) the gaze direction normalized coordinate system provides a common 3D reference frame to learn; 2) overhead view representation removes the variations in first person 3D experience due to the head’s pitch angle, 3) the log-polar encoding and sampling gives more importance to nearby space, and 4) the depth masking encodes implicitly both roll and pitch angle of head, making it more situation aware.
3.2 Compact Trajectory Representation
Let be a 2D trajectory on the ground plane of the egocentric coordinate system, where is the number of future frames to predict and and are two coordinates at the time instance as shown in Figure 2(b). In practice, this trajectory can be obtained by projecting 3D camera poses between the and time instances at the time instant onto the ground plane. This allows us to represent all trajectories in the same egocentric coordinate system, which are normalized by gaze direction because the axis is aligned with the gaze direction.
The gaze direction normalized trajectory is highly compressible. Most trajectory of ego-motion can be encoded using a linear combination of trajectory bases learned using Principal Coordinate Analysis (PCA) from the EgoMotion dataset described in Section 5:
|(2)|
where is a mean trajectory and is a collection of trajectory bases, i.e., each column of is a trajectory basis where is the number of basis. In practice, is selected as 46 which can express all ego-motion trajectories with accuracy as shown in Figure 3(a) and Figure 3(b). is the trajectory coefficient, which is the low dimensional parametrization of . In Figure 3(b), we compare reconstruction error produced by PCA bases and DCT generic bases .
4 Prediction
A trajectory of ego-motion is associated with an EgoSpace map, i.e., given a depth image, we know how we explored the space in the training data (Section 5). By leveraging a computational representation of egocentric space and trajectory described in Section 3, in this section, we present a method to predict a set of plausible trajectories given an EgoSpace map and to discover the occluded space using the predicted trajectories.
4.1 Ego-motion Prediction
Estimating that conforms to a depth image is to find a path that stays in the ground plane minimizing the following cost function along the trajectory:
|(3)|
where is the Cartesian coordinate representation of the EgoSpace map, and is a matrix composed of the and rows of . Therefore, is the point at the time instant.
Equation (3) finds a trajectory that stays on the ground given a depth image. This approach has been used in robotics communities for various path planning tasks. However, this does not take into account the trajectory that is partially occluded by objects because the occluded part of the trajectory always produces higher cost. Instead, we introduce a novel cost function that minimizes a trajectory cost difference between the given depth image and the retrieved depth image from the database:
|(4)|
where and are the EgoSpace map and trajectory parameter retrieved from the training dataset. This minimization finds a partially occluded trajectory as long as there exists a trajectory in the database that has similar occlusion cost.
There exist infinite number of trajectories that are compatible with a given EgoSpace map. More importantly, the cost function in Equation (4) is nonlinear where an initialization of the solution is critical.
We initialize
using a trajectory retrieved from the training data by EgoSpace map matching. The dataset is divided into 3 gaze directions (3 pitch angles) to reduce the false matches dominated by the area beyond the depth image. Given an EgoSpace map, k-nearest neighbors (KNN) are found using K-d tree. Other search or planning methods such as structured SVM and Rapidly Exploring Random Tree (RRT) can be complimentary to the KNN search.
4.2 Occluded Space Discovery
The predicted trajectories of ego-motion allow us to discover the hidden space occluded by foreground objects because the trajectories can be still predicted in the hidden space. We build a likelihood map of the occluded space as follows:
|(5)|
where is the likelihood of the occluded space that a trajectory can pass through at the evaluating point in the ground. is the predicted trajectories, is the number of predicted trajectories, and is the bandwidth for the Guassian kernel. Equation (5) takes into account the likelihood of the predicted trajectories weighted by the likelihood of the occlusion. is high when many trajectories are predicted at while is high.
5 EgoMotion Dataset
We present a new dataset, EgoMotion dataset, captured by first person stereo cameras. This dataset includes various indoor and outdoor scenes such as Park, Malls, and Campus with various activities such as walking, shopping, and social interactions.
5.1 Data Collection
A stereo pair of GoPro Hero 3 (Black Edition) cameras with 100mm baseline are used to capture EgoMotion dataset as shown in Figure 2(a). All videos are recorded at 1280960 with 100fps. The stereo cameras are calibrated prior to the data collection and synchronized manually with a synchronization token at the beginning of each sequence.
Depth Computation We compute disparity between the stereo pair after stereo rectification. A cost space of stereo matching is generated for each scan line and match each pixel by exploiting dynamic programming in a coarse-to-fine manner.
3D Reconstruction of Ego-motion We reconstruct a camera trajectory using a standard structure from motion pipeline with a few modifications to handle a large number of images222A 30 minute walking sequence at a 30 fps reconstruction rate produces HD 108,000 images.. We partition the dataset such that each dataset includes less than 500 images with sufficient overlap with neighbor image sets (100 image overlap). We reconstruct each dataset independently and merge them by minimizing cross reprojection error between two dataset, i.e., a point in one dataset is reprojected to a camera in the other dataset. Then, we project the reconstructed camera trajectory onto the ground plane estimated by fitting a plane using RANSAC .
Scenes We collect both indoor and outdoor data, which consists of 21 scenes with 55,933 frames of 7.7 hours long in total, including walking on campus, in parks and downtown streets, shopping in the mall, cafe and grocery, as well as taking public transportation. The data consists of various activities (walking, talking, and shopping), scenes (campus, park, malls, and downtown streets), cities, and time. We also collect repeated daily routines multiple times at a campus. The dataset is summarized in Table 1.
5.2 Data Analysis
We define the EgoSpace map with respect to a gaze direction, which allows us to canonicalize all trajectories in one coordinate system and further to represent it with compact bases. This stems from a primary conjecture: a gaze direction is aligned with ego-motion. In this section, we empirically prove the conjecture from our EgoMotion dataset.
We compute the pitch angle of a gaze direction by calibrating the relationship between the first person camera and gaze direction . The pitch angle is by definition in Section 3.1 and the position after 10 seconds is used to measure the direction of destination. Figure 4(a) shows a distribution of the direction of destination with respect to the gaze pitch angle, which indicates that the gaze direction is aligned with the pitch axis. Figure 4(b) shows a yaw distribution of the direction of destination given pitch angle (a horizontal cross section of Figure 4(a)). This also indicates that gaze direction is highly correlated with the direction of destination.
6 Result
We apply our method to predict ego-motion and hidden space in real world scenes by leveraging the EgoMotion dataset. We divide all scenes into two categories: indoor and outdoor scenes as ego-motion has different characteristics, e.g., speed and scene layout. Note that for all evaluations, we predict a scene that is not included in training data, i.e., training and testing scenes are completely separated.
6.1 Quantitative Evaluation
We quantitatively evaluate our trajectory prediction by comparing with ground truth trajectories achieved by 3D reconstruction of the first person camera. Our evaluation addresses the future localization problem.
Multiple trajectories are often equally plausible, e.g., Y-junction, while one ground truth trajectory is available per image. This results in a large prediction error. To address this multiple path configuration, we measure predictive precision—how often one of our predicted trajectories aligns with the ground truth trajectory, i.e., , where is the number of testing images. if , and otherwise where is the location at the time instant of the predicted trajectory and is the ground truth trajectory. We set . Note that unlike previous approaches measured a spatial distance between trajectories 333A dynamic time warping was used to handle a time scale., our evaluation measures a spatiotemporal distance between trajectories because the time scale also needs to be considered.
Four baseline methods444These baseline algorithms are designed by ours because no previous algorithm exists to predict the trajectories of ego-motion are used to compare our approach: one method solely based on gaze direction, two methods with a subsampled depth image at the same resolution of our EgoSpace map, and one method with EgoSpace map but without trajectory refinement by Equation (4). (1) Going straight: we generate a trajectory aligned with the gaze direction to test gaze bias; (2) Pure 2D: we retrieve a set of trajectories using KNN solely based on a subsampled depth image; (3) 2D+ground plane: we retrieve trajectories using the subsampled depth image but transform the coordinates of the trajectories such that they lie on the ground plane of the test image. This coordinate transform takes into account the 3D camera direction with respect to the ground plane of the test image; (4) EgoSpace w/o trajectory optimization: the trajectories are retrieved by the EgoSpace map but no adaptation to the test image by Equation (4). In fact, this method provides an initialization of our predicted trajectories.
Figure 5 shows evaluations on indoor and outdoor depth images. We retrieve neighbors from dataset and measure precision. Our method outperforms the baseline algorithms with large margin. These experiments indicate that the EgoSpace representation has strong predictive power comparing to the camera pose oriented feature produced by the subsampled depth image. Also the scene adaptation by the trajectory optimization allows us to produce more accurate prediction (see the performance gap from the initialization). As noted in Section 5.2, a gaze direction is a good predictor but it is not strong enough to predict a long term behavior. Note that the precision at early k may be significantly improved by using N-best algorithms based on homotopy class because KNN retrieves many redundant trajectories. In Table 2, we measure the average precision across all scenes in Section 5.
Occluded Space Discovery We quantitatively evaluate our occluded space discovery by measuring detection rate, where is the number of true positive detection and the total number of detection produced by the space discovery. We threshold the likelihood of the occluded space, , from Equation (5) and manually evaluate whether the detection is correct. Note that no ground truth label is available unless the camera wearer already had passed through the space. The detection rate in Table 3 indicates that our method predicts the outdoor scenes better than the indoor scenes. This is because the indoor scenes such as Grocery and IKEA, the camera wearer had a number of close interactions with objects such as shelves or products where the view of the scenes are substantially limited.
6.2 Qualitative Evaluation
We apply our method on real world examples to predict a set of plausible trajectories of ego-motion and the occluded space by foreground objects. Our training dataset is completely separated from testing data, e.g., Grocery scene was trained to predict IKEA scene. Given a depth image, we estimate the ground plane by a RANSAC based plane fitting with gravity and height prior. This ground plane is used to define the EgoSpace map with respect to the camera direction555The yaw angle of the gaze direction is assumed to be aligned with the camera direction..
Figure 1 and Figure 7 illustrate our results from the EgoMotion dataset. In a testing phase, only a depth image was used while 3D reconstruction of camera poses were used in the training phase. In Figure 7, we show (1) image and ground truth ego motion; (2) input depth image; (3) EgoSpace map overlaid with the predicted trajectories (gray) and ground truth trajectory (red); (4) reprojection of the trajectories; (5) reprojection of occluded space computed by the EgoSpace map (inset image). For all scenes, our method predicts the plausible trajectories that pass through unexplored space.
Obstacle Avoidance Our cost function in Equation (4) minimizes cost difference between trajectories from training data and testing data. This precludes a trajectory passing through an object unless the retrieved trajectory was partially occluded. EgoSpace map captures the obstacle avoidance as shown in Campus and Grocery.
Multiple Plausible Trajectories Our prediction produces a number of plausible trajectories that conform to the testing scene. Trifurcated trajectories in Campus; bifurcated trajectories in Bus stop; and multiple directions of trajectories in Mall I.
Occluded Space Discovery The space occluded by foreground objects is discovered by the predicted trajectories. The space inside of the shop and behind the person in Figure 1; the space occluded by the left fence and persons in Campus; the space behind the cars and the parking vending machine in Bus stop; the space behind the persons and trees in Park; the space inside the shop and around the left corner; the space behind the column; and the space occluded by the fence.
7 Discussion
In this paper, we present a method to predict ego-motion and occluded space by foreground objects from a first person depth image. EgoSpace map that encodes a likelihood of occlusion is used to represent a scene around a camera wearer. We associate a trajectory with the EgoSpace map in the training phase to predict a set of plausible trajectories given a test depth image. The trajectories that are parametrized by a linear combination of compact trajectory bases are refined to conform with the test depth image. The occluded space is detected by measuring how often the predicted trajectories invade the occluded space.
Limitation Our framework needs three ingredients: similar scene training data, ground estimation, and depth computation. These failure cases are illustrated in Figure 6.
References
- I. Akhter, Y. Sheikh, S. Khan, and T. Kanade. Trajectory space: A dual representation for nonrigid structure from motion. PAMI, 2011.
- A. Alahi, V. Ramanathan, and L. Fei-Fei. Socially-aware large-scale crowd forecasting. In CVPR, 2014.
- S. Ali and M. Shah. Floor fields for tracking in high density crowd scenes. In ECCV, 2008.
- I. Arev, H. S. Park, Y. Sheikh, J. K. Hodgins, and A. Shamir. Automatic editing of footage from multiple social cameras. SIGGRAPH, 2014.
- A. Fathi, A. Farhadi, and J. M. Rehg. Understanding egocentric activities. In ICCV, 2011.
- A. Fathi, J. K. Hodgins, and J. M. Rehg. Social interaction: A first-person perspective. In CVPR, 2012.
- A. Fathi and J. M. Rehg. Modeling actions through state changes. In CVPR, 2013.
- M. A. Fischler and R. C. Bolles. Modeling and prediction of human behavior. Communications of the ACM, 1981.
- H. Gong, J. Sim, M. Likhachev, and J. Shi. Multi-hypothesis motion planning for visual object tracking. In ICCV, 2011.
- E. T. Hall. A system for the notation of proxemic behaviour. American Anthropologist, 1963.
- D. Helbing and P. Molnár. Social force model for pedestrian dynamics. Physics Review, 1995.
- K. M. Kitani, T. Okabe, Y. Sato, and A. Sugimoto. Fast unsupervised ego-action learning for first-person sports videos. In CVPR, 2011.
- K. M. Kitani, B. Ziebart, J. D. Bagnell, and M. Hebert. Activity forecasting. In ECCV, 2012.
- J. Kopf, M. Cohen, and R. Szeliski. First person hyperlapse videos. SIGGRAPH, 2014.
- H. Kurniawati, Y. Du, D. Hsu, and W. S. Lee. Motion planning under uncertainty for robotic tasks with long time horizons. In Robotics Research, 2009.
- S. M. LaValle. Rapidly-exploring random trees: A new tool for path planning. Technical Report 98-11, Computer Science Department, Iowa State University, 1999.
- R. Lee, D. H. Wolpert, S. Backhaus, R. Bent, J. Bono, and B. Tracey. Modeling humans as reinforcement learners: How to predict human behavior in multi-stage games. In NIPS, 2011.
- Y. J. Lee, J. Ghosh, and K. Grauman. Discovering important people and objects for egocentric video summarization. In CVPR, 2012.
- S. Levine and V. Koltun. Continuous inverse optimal control with locally optimal examples. In ICML, 2012.
- C. Li and K. M. Kitani. Pixel-level hand detection for ego-centric videos. In CVPR, 2013.
- Y. Li, A. Fathi, and J. M. Rehg. Learning to predict gaze in egocentric video. In ICCV, 2013.
- R. Mehran, A. Oyama, and M. Shah. Abnormal crowd behavior detection using social force model. In CVPR, 2009.
-
M. Muja and D. G. Lowe.
Scalable nearest neighbor algorithms for high dimensional data.PAMI, 2014.
- D. Park and D. Ramanan. N-best maximal decoders for part models. In ICCV, 2011.
- H. S. Park, E. Jain, and Y. Shiekh. 3D social saliency from head-mounted cameras. In NIPS, 2012.
- H. S. Park and J. Shi. Social saliency prediction. In CVPR, 2015.
- S. Pellegrini, A. Ess, K. Schindler, and L. van Gool. You’ll never walk alone: Modeling social behavior for multi-target tracking. In ICCV, 2009.
- A. Pentland and A. Lin. Modeling and prediction of human behavior. Neural Computation, 1995.
- J. Pineau and G. J. Gordon. Pomdp planning for robust robot control. In Robotics Research, 2007.
- H. Pirsiavash and D. Ramanan. Recognizing activities of daily living in first-person camera views. In CVPR, 2012.
- S. Ragi and E. K. P. Chong. Uav path planning in a dynamic environment via partially observable markov decision process. In IEEE Transactions on Aerospace and Electronics Systems, 2013.
- M. S. Ryoo. Human activity prediction: Early recognition of ongoing activities from streaming videos. In ICCV, 2011.
- M. S. Ryoo and L. Matthies. First-person activity recognition: What are they doing to me. In CVPR, 2013.
- M. S. Ryoo, B. Rothrock, and L. Matthies. Pooled motion features for first-person videos. In CVPR, 2015.
- I. Tsochantaridis, T. Joachims, T. Hofmann, and Y. Altun. Large margin methods for structured and interdependent output variables. JMLR, 2005.
- T. Vu, C. Olsson, I. Laptev, A. Oliva, and J. Sivic. Predicting actions from static scenes. In ECCV, 2014.
- B. Xiong and K. Grauman. Detecting snap points in egocentric video with a web photo prior. In ECCV, 2014.
-
B. Ziebart, A. Maas, J. Bagnell, and A. Dey.
Maximum entropy inverse reinforcement learning.In AAAI, 2008. | https://deepai.org/publication/future-localization-from-an-egocentric-depth-image |
2. To take as many people with us.
3. To have a member of RCCG in every family of all nations.S
4. To accomplish No. 1 above, holiness will be our lifestyle.
5. To accomplish No. 2 and 3 above, we will plant churches within five minutes walking distance in every city and town of developing countries and within five minutes driving distance in every city and town of developed countries.
Our Beliefs
We believe that the entire Scripture, both Old and New Testament are written by the inspiration of the Holy Spirit – II Tim. 3:16-17. All the Christian teachings and the Christian attitude of the Children of God are such as are established in the Holy Bible – II Tim. 3:10-15; II Peter 1:21; John 17:17; Ps. 119:105.
We believe that the Bible is the written and revealed Will of God. Man’s position to God, the way to obtain salvation, woe and destruction awaiting sinners that refuse to repent and everlasting joy that is kept for the born again souls. All the Bible teachings are holy, what the Bible reveals as the will of God are such that we should accept, and whatever God writes in the Bible and His Law are to remain unchangeable; for the Heavens and Earth may pass away but the Word of God stands forever. Deut. 4:22; Rev. 22:18, 19; Matt. 24:34-38.
Ps. 33:6-9
As revealed unto us by the Bible, we believe that there is only one God, Who is the Creator of both visible and invisible creatures -Gen. 1:1; Ps. 86:9-10; Is. 43:10-11; John 1:1-3. Only God will be in existence forever. Ez. 3:14; in God every creature receives life -John 5:26.
Healing without medicine is Biblical – Matt. 4:23; Ps. 103:3; Sickness is caused because of the fall of man. The force behind this is Satan – Job 2:1-9; Luke 13:15; Acts 10:3. But JESUS came to destroy the works of the devil – I John 3:8. Christ purchased our soul from the curse of sin. He bore our infirmities and carried our sorrow – Matt. 8:15-17. By His stripes we are healed. Is 53:4-5; Gal. 3:13; I Peter 2:24. Healing without medicine is of the Gospel – Matt. 9:35; Mark 6:10-18. We read that the twelve Apostles and the seventy disciples combined healing with their Ministry of the Gospel – Luke 9:1-2; Luke 10:1-9. The Lord commanded us to go into the world, just to teach the nations alone, but that we should also heal the sick – Matt. 28:19-20; Mark 10:1, Mark 16:15-18.
We could obtain our healing in these four ways: 1. By individual prayer – John 14:13-14 2. By two people (or a group of people) who have agreed to pray by faith – Matt. 18:19-20. 3. By the laying of hands on the head – Mark 16:18; Acts 9:18; Acts 28:8. 4. By the Ministry of the Elders, anointing the sick with prayer of faith – James 5:14-15 Special Notice – Before we can work by healing without medicine, we would have sanctified our life to the doing of the Law – Rom. 6:13, 19; Rom. 12:1; Matt. 16:24; II Cor. 8:5, 15. Many miracles were performed by the Apostles – Acts 9:33-42; Acts 19:11-12; Acts 28:8-9.
The Bible teaches us to abstain from all appearance of evil – I Thess. 5:22. “But follow after righteousness, faith, love, purging ourselves from unclean things so that we may be vessels unto honor, sanctified, and prepared unto every good work” – II Tim. 2:21-22. Therefore we must not see our Church members in dancing halls, or cinema halls, reveling, for such things are works of the flesh. All people doing such things shall not inherit the kingdom of God – Gal 5:19-21; I Peter 4:3-4; Prov 31:4-5; Rev. 1:5-6; Gen 19:30-38.
Swearing and Cursing Forbidden All Christians should not swear or curse or blaspheme for we were not taught of Jesus in such a way. “Bless, and curse not” Rom. 12:14. Swear not at all, neither by Heaven, nor by the earth or any other swearing. But let your yes by yes, and No be No so that you do not run into condemnation – Matt. 5:34; James 5:12. | https://rccgshp.org.ng/about-rccg/who-we-are |
Finding the Area of a Region In Exercises 47-50, (a) use a graphing utility to graph the region bounded by the graphs of the equations. (b) explain why the area of the region is difficult to find analytically, and (c) use the integration capabilities of the graphing utility to approximate the area of the region to four decimal places.
Experts are waiting 24/7 to provide step-by-step solutions in as fast as 30 minutes!*
*Response times vary by subject and question complexity. Median response time is 34 minutes and may be longer for new subjects. | https://www.bartleby.com/solution-answer/chapter-71-problem-47e-calculus-of-a-single-variable-11th-edition/9781337275361/finding-the-area-of-a-region-in-exercises-47-50-a-use-a-graphing-utility-to-graph-the-region/639fc2f3-80f5-11e9-8385-02ee952b546e |
The example pages are shown using the BookStrap interface in a desktop browser. The page layout will be different on mobile screens. Some options can be disabled in config, and not all options are available in the default interface.
This shows the list of authors in your library. You can quickly get back to this page using the homepage button on the top left of all the other pages
Below this is a menu bar with two buttons
[Refresh Active Authors] reloads all active author details from Goodreads/GoogleBooks. You can select whether to use Goodreads or GoogleBooks in config.
[Show Ignored Authors] switches the table between Active and Ignored authors. Active authors are monitored periodically for new books. Ignored authors are not monitored, and not shown in lists. Useful if the author only has one or two books you are interested in.
On the right is the search box This is used to search Goodreads/GoogleBooks for authors or books. Type the book name, author name, or isbn into the white box and click the search icon to start searching. Search results appear in a new page.
Below this is a list of column toggles Clicking each of these shows/hides the relevant column. Useful on small screens. LazyLibrarian remembers the show/hide state of columns while the program is running, but does not store them when you exit.
On the left below this is a row selector where you can choose how many rows to show per page.
There are checkboxes on the left of the author images, and a selector (not shown in screenshot) where you can change the status of the authors from Active/Wanted/Ignored/Paused/Remove/Delete
See the doc page on Status Choices for what the various statuses mean. Use the tickboxes on the left column to select which authors to change and then press Go
On the right is a result filter . The filter contents are retained until you exit the program, or the 'x' clears the filter. You can filter on any text in any column of the table, eg author name, book title, series, dates, number of books, or book status.
Below this is the table of results. This defaults to sorting on ascending author name. Clicking on a column header sorts the table on that column. Clicking the column header again toggles ascending/descending sort. It is not possible to sort on more than one column, and not all columns allow sorting, eg sort on image is not useful, but clicking on the author image will show a larger image. Clicking on an author name takes you to a page with author details and a list of their books. Clicking on a book title takes you to the book page on Goodreads/GoogleBooks.
The basic page layout is the same for most lazylibrarian pages, so the rest of the page descriptions highlight the differences. | https://lazylibrarian.gitlab.io/overview/ |
The Toronto International Film Festival has added a big dose of CanCon to its lineup with the announcement Wednesday of this year’s Canadian titles, with films starring Felicity Huffman, David Cronenberg, Imogen Poots, Neve Campbell and Heather Graham, among others.
The Canadian selection includes seven first features, 13 works by returning TIFF alumni, five titles by Indigenous filmmakers and almost 50% films directed by women.
“We are deeply impressed by the high quality of the work done by Canadian directors this year — particularly from filmmakers who were making their first and second features,” said Steve Gravestock, a senior programmer at TIFF.
The festival also announced its Canadian Rising Stars lineup, which this year consists of Kacey Rohl (White Lie), Mikhail Ahooja (The Twentieth Century), Nahima Ricci (Antigone), and Shamier Anderson (Endings, Beginnings).
TIFF has already announced high-profile Canadian films as part of this year’s festivities, including The Song of Names (with Clive Owen) and its opening night documentary Once Were Brothers: Robbie Robertson and The Band.
The Toronto International Film Festival runs Sept. 5-15. For tickets and info, visit tiff.net.
This Week's Flyers
Comments
We encourage all readers to share their views on our articles and blog posts. We are committed to maintaining a lively but civil forum for discussion, so we ask you to avoid personal attacks, and please keep your comments relevant and respectful. If you encounter a comment that is abusive, click the "X" in the upper right corner of the comment box to report spam or abuse. We are using Facebook commenting. Visit our FAQ page for more information. | |
Dallas Cowboys running back Darren McFadden is putting up his $700,000 Arkansas home up for sale, according to the Dallas Morning News.
According to a Realtor.com listing, he's looking to sell the 4-bedroom, 3.5-bathroom 4,235 square-foot cliff-dweller for just under $700,000. The home features a back deck and pool overlooking the Arkansas River and the I-430 bridge over it.
The house is absolutely stunning. Here's some of the photos:
The News reports that ff he can manage to get a buyer to bite on the list price, he'll come out with close to a 10 percent profit, considering he bought the home for $638,000 in 2009.
Last month, McFadden filed a second lawsuit in Arkansas over the management of his finances. The former University of Arkansas football standout initially filed a lawsuit in June 2016 against Michael Vick (not the former NFL quarterback), a family friend who served as McFadden's business manager and financial adviser. McFadden alleges Vick misappropriated millions of dollars and mishandled his duties.
The Arkansas Democrat-Gazette reported McFadden filed a lawsuit Little Rock this May against Ameriprise Financial Services Inc., the company Vick worked for when he managed McFadden's finances.
The suit alleges the company was negligent and actively concealed Vick's actions as he "manipulated" McFadden to seize control over his professional income, assets and retirement savings.
The 29-year-old rusher from Arkansas is entering his 10th professional season. In nine seasons McFadden has rushed for 5,423 yards and scored 33 total touchdowns. He's also lost 15 fumbles. | https://thefootballfeed.com/nfl-news/cowboys-star-puts-huge-house-up-for-sale?ref=sidebar |
You can reach the Editor Home page by logging in and clicking the Create Issue, Notify Users, etc.).link from your User Home page. Note the addition of quick links that can take you directly to various tasks (
The Editor Home page is chunked into three distinct sections: the Submissions section, with Unassigned, In Review and In Editing queues as well as a link to the submission Archives; a submission search section; and the Issues section, where you can schedule and publish new issues and edit previously published content.
When an author completes a submission it automatically arrives in the Editor's Journal Sections for details). Click the link to go to the Unassigned queue.queue, available from the Editor's User Home page. If the submission was made to a journal section with an assigned Section Editor, however, the submission will go directly to the queue for that Section Editor (see the configuration option for
The Unassigned page contains links to the other queues (, , ), a search function, and the list of submissions awaiting assignment to an Editor or Section Editor. Although the example below has only one unassigned submission, your journal may have hundreds, and the search feature will help you find the one you are looking for. To assign a submission, you must click the submission title. This will take you to the submission record.
The submission record is divided into four pages: Section Editor section of this manual., , , and . Complete details on the Review and Editing pages are covered in the
The Summary section includes basic submission details.
In addition to details about the submission (author, title, original files, etc.), you have the option to upload any additional supplementary files using thelink. You can also see the section selected by the Author, and change it if necessary using the dropdown "Change To" menu and the button. You can also see any comments the author has made for you when the submission was originally made.
The Summary page also lists Author Fees. If your journal does not charge fees, this section will not appear. From here you can note if the fees have been paid, or you can choose to waive fees.
Next, from the Editors section you can assign either a Section Editor, another Editor, or yourself to guide this submission through the review and editing process. Clicking the Review page.)(or ) link will bring up a selection page. (Clicking the link will assign yourself to the submission and bring you to the submission's
From here, use thelink to assign this user to the submission.
An email box will appear, addressed the assignee, from you, with text pulled from the appropriate email template.
At this point, you can add email addresses to the TO, CC or BCC fields, upload an attachment, and change the Subject or Body text.
Once the message is ready to go, use thebutton to deliver it. The button does not send the message and cancels the assignment. The button does not send the message but does complete the assignment.
Once the message is sent, cancelled, or skipped, you will be returned to the Summary page. If you have completed the assignment, the assigned user's name will appear. By default, she will be given the responsibility to guide the submission through both the review and editing process, but this can be limited by unchecking either of the Review or Editing boxes. Be sure to use thebutton after making a change.
From here, you can also use thelink to reverse the assignment and also assign another Section Editor, Editor, or yourself.
Next, you can see the Status of the submission. If a Section Editor has been assigned, the submission will be listed as "In Review". If the submission is clearly unsuitable and should not be sent through peer review, you can use thelink to send it immediately to the Archives (where it will be listed as Rejected).
This will generate an email (based on an existing email template) to the author.
The final section of the Summary page contains the submissions' Metadata. From here, you can review the metadata and make any changes using thelink.
Using thelink allows you to make any necessary changes to the information supplied by the Author, including author information. You can add any additional authors using the button.
You can also modify the title and abstract.
The next section allows you to upload a small cover image for the submission. This would appear with the article in the Table of Contents (and in the abstract view page) upon publication. This is an optional feature, but can serve to add some visual interest to your journal design.
You can also modify the indexing information supplied by the author.
Next, you can modify the supporting agencies included by the author.
Finally, you can determine whether or not the author names should display in the Table of Contents. This is typically controlled by the Journal Section policy, but it can be overridden here. For example, you may have set your Editorial section to not display author names, but one issue will have a special editor and you do want her name to appear. Use this feature to allow for this.
Remember to hit thebutton. For further information on working with submissions, see Section Editor.
As an Editor you can search through all submissions from your Editor Home page. Between your Submissions queues and your Issues options is a comprehensive search field: you can use it to search against a submission title, or against any user associated with the submission; you can also use it to search for submissions that were submitted, copyedited, layout edited, or proofread between any given date range.
As an Editor you have four issue-specific pages available: Create Issue, Notify Users, Future Issues, and Back Issues.
Only Editors can create issues and publish issues. Section Editors can add (schedule) submissions to an existing issue, but they cannot create an issue.
It is the Editor's responsibility to check that all edited material has been proofread by the Author and (optionally) by a Proofreader.
The Editor can arrange journal section and article order for each issue; can modify issue data like volume and number information, issue details and cover images, and so on.
The Editor is also the only one who may remove published material from a Table of Contents.
Finally, the Editor is the only person who can send out a notification email to all registered Readers, notifying them of a new issue.
Journal content can be published in bundled issues in traditional volume/number/year format, or can be published as soon as they are ready by adding finished submissions to the 'current' issue. See Publication Scheduling for more information on configuration options.
To create an issue, you must select thelink. The resulting page has three sections: Identification, Access, and Cover.
The issue needs to be identified with the appropriate numbers and/or title, depending on the option chosen in Publication Setup (e.g., Vol 2, No 5, 2008). While the system will prompt the Editor with the next issue each time an issue is created, the Editor can override these settings and enter a new set of numbers or a different year. You also have the opportunity to add a special title and description for the new issue.
You can also upload a cover illustration for the journal, in the form of a .jpg, .png or .gif file. This file will be posted on the Table of Contents as a cover page. It will appear on the journal's homepage while the journal issue is Current, and can be clicked on to reach the Table of Contents for that issue. Once the issue is archived, the cover will remain available with the issue through the Table of Contents.
If your journal has enabled subscriptions, you will next see an Access section, where you can set the status of the issue (open, subscription) and an open access date (if applicable).
You can send an email notification to all users associated with your journal by clicking thelink. Before sending the email, you can choose to have the email sent only to those who have indicated they wish to receive notifications regarding newly-published material (this option is available in a user's Profile), or to all users associated with your journal -- Journal Managers, Editors, Authors, Readers, and so on. You can also opt to include the table of contents of an issue. Finally, you have one more chance to edit the prepared email template before it is sent.
The Future Issues are where the Editor schedules submissions that are to be published next and into the future. The Editor may wish to ensure that there are always two or three unpublished issues, which enables submissions to be scheduled over a couple of issues (for reasons of balance, for example). Once an issue is created, it appears in the Future Issues list. A planned special issue is another example of a future issue.
Every entry in the Future Issues list displays the issue title and as it was created by the Editor and as it will appear online; the number of items (edited submissions that have been scheduled with that particular issue; and aoption. clicking will remove the issue from the Future Issues list, and all scheduled submissions will revert to their original unscheduled status (they will not be archived or deleted, nor will they be resubmitted for review: they will remain in Editing, but will have to be rescheduled).
Clicking on an issue title in the Future Issues list will take you the issue's Table of Contents, Issue Data and Preview Issue pages.
Clicking the Journal Sections configuration pages; articles are ordered by the date they have been scheduled. You can reorganize the order of both the journal sections and the articles by clicking the up and down arrows next to each item or by single-clicking and dragging an element with your mouse.link will display all submissions that have been scheduled against that issue, enveloped within their respective journal sections (e.g., Articles, Commentary, etc.). By default, journal sections are ordered as they have been ordered by the Journal Manager in the
Rearranging journal sections in one issue will not affect the order of already-published issues, and future issues will still default to the Journal Manager's prescribed order. After making changes, make sure to click thebutton at the bottom of the page.
Every submission entry in the Table of Contents displays the submission title as a link: clicking the link will take you to the submission's Summary, Review, Editing and History pages. There is also a checkbox you can check to remove the submission from that particular issue. Removing a submission from an issue will not delete or archive the submission: it will only 'deschedule' it, and you will have to reschedule it from its Editing page, or archive it from its Summary page.
The 'Proofed' column shows which submissions have had the Author sign off on the final galley copy via the Proofreading process. Your journal may not rely on proofreading online, but this is a handy check to see whether Authors have had a final say on how their work has been represented.
Finally, you have the Back Issues page and promoting it to Current status on the website. The issue will also be listed in the journal's Archives page.button at the bottom of the unpublished Table of Contents. Clicking this will publish the issue, moving it from the Future Issues list to the
The Issue Data page allows you to edit any of the information you entered when creating an issue.
The Back Issues page lists issues that have already been published, including the Current issue. There are three differences between this page and the Future Issues page listing: this page shows the issues' publication dates; you can re-order back issues up and down (which will affect the order in which they are displayed in the Archives); and you can assign any of the published issues to be the Current issue by choosing from the dropdown menu near the bottom and pressing .
Clicking on any issue title in the Back Issues listing will bring you to that title's Table of Contents page, which is exactly the same as the Table of Contents available for Future Issues. Similarly, you also have access to the issue's Issue Data page. As the issue has already been published, you do not need -- or have -- a Preview Issue option. | http://pkp.sfu.ca/ojs/docs/userguide/2.3.1/editorPages.html |
Question:
Why has £10,000 been allocated to celebrate Prince Harry’s wedding when many other things are much more important? Helping to house or give night shelter to the homeless I see sleeping out in freezing conditions, surely would be a benefit to all the community! Or funding the excellent Roaring Twenties celebration in July which many hundreds of people enjoy, and bringing in much needed revenue to the town? If people want to celebrate the Royal Wedding they can, why do the rate payers have to subsidise them? (25/02/2018)
Answer:
Thank you for your question regarding the allocation of funds to the celebration of the forthcoming royal wedding.
The decision to allocate a part of our Community Grant Scheme to this fund was based on the community benefit derived from social gatherings and street parties. We believe that this promotes a strong sense of belonging in communities and, as people get to know each other and offer a helping hand to their neighbours, goes some way to combat isolation and loneliness.
Separately, we support tourism events that draw in visitors to the district and support our local businesses. The Roaring Twenties event in Bexhill has been the recipient of this funding for the past three years but the organisers have not applied to us for funds this year. | https://www.rother.gov.uk/ask-the-leader/question-06-18/ |
Robert Irundu demonstrates how to finish off a penalty kick during a Mennonite youth camp in Congo.
By Dwight Short
Tuesday, April 19, 2016
In my humanness, I didn't know how we could do a soccer clinic when we had no soccer balls or any of the other athletic equipment, which was tied up in the Congolese transportation system. I was with a group of North American Mennonites traveling to celebrate the 100th anniversary of Mennonite mission workers in Democratic Republic of Congo.
In order to fly into the interior city of Tshikapa, where the Mennonite Church headquarters are located, we were told to get down to one modest suitcase and a carry-on. I had three bags with me, so this meant that my oversized bag of soccer balls, volleyballs, nets, and athletic equipment would have to be shipped separately. We were also told that no soccer or sports events would be held as it would interfere with the rest of the centennial activities.
So I decided to leave my bulky sports shoes behind in favor of one pair of dress shoes, which I wore on the plane, and one pair of flip flops, which I wore in every other event when dress shoes were not required. I was assured that my sport equipment would be shipped ahead and would be arriving at the same time as I would. (In fact, that bag of sports equipment did not arrive until six weeks later, long after I had returned to the United States.)
Once we arrived in Tshikapa, our heavier luggage was carted to our accommodations. We walked with our carry-ons a mile or so from the airport. Our first stop was the church and meeting house where we were introduced to dignitaries from churches around the regions near Tshikapa. A young man approached me and introduced himself as Robert Irundu, the national Youth for Christ director for Congo. He asked me, through an interpreter, about how we were going to do the soccer clinics he had heard about. I told him we were informed that the soccer clinics had been removed from the events of the week. Robert said that was not true. He said that we indeed would want to do such a clinic, and that he and his fellow youth directors were eager to see how we could spread the gospel through soccer, or in his words, futbol.
How could we do a soccer clinic when we had no soccer balls? Word soon spread that we needed help. Our delegation included a family of former missionary kids and their spouses. They were all experienced players, and they had brought a few soccer balls with them. We worked together to organize a soccer clinic with a gospel message. Somehow, more than 400 kids came from all over to participate in this first event.
That experience inspired Robert and many members of the churches in Congo to simulate this event in other communities. In a recent trip to Ndjoko Punda, more than 4,000 young people gave their lives to Christ. What a solid reminder that God's ways are always better than our ways!
We anticipate that we will be able to do many more soccer events with the message of the gospel being shared as well as one-touch passes and penalty goals.
Dwight Short is the proud nephew of Lodema Short, who served in Congo from 1947-1981 through Africa Inter-Mennonite Mission, a partner agency with Mennonite Mission Network. He wrote a book about his aunt's ministry, Home is Where God Calls Us. Short serves God in many arenas. To name a few: He established a financial consultancy, DLS Consulting; he facilitates Christian camps for athletes; and he writes email devotionals at the beginning of each week, Monday Morning Messages.
It looks like your browser does not have JavaScript enabled. Please turn on JavaScript and try again.
| |
The floor of the room is a carpet, so there is a lot of dust. The furniture was black, so the white dust was more noticeable. The location of the accommodation was easy to find because it was the entrance to the city from the highway, and there were many amenities because it was in front of the city. The staff were friendly. The parking facility was a tower, but there is a parking facility across the street about 50 meters from the hotel. Breakfast is served as a semi-buffet. | https://www.expedia.co.uk/Gangneung-Hotels-Gangneung-Tourist-Hotel.h17251429.Hotel-Information |
BACKGROUND
BRIEF SUMMARY
DETAILED DESCRIPTION
The present inventions relate to software development systems, and more specifically, to revision-control systems for development systems that provide conflict avoidance.
During a software development project, a team of developers may work on source code, documentation, and/or graphics, stored in various files. Each developer may potentially change any file, and a change to any file may potentially trigger a need to change one or more other files. Each developer must remain alert to changes implemented by other developers that might impact his or her work, so that the developer can if necessary make compatible changes or coordinate compatible changes with the other developers. To manage change during development, a development project may rely on a revision-control system (RCS). An RCS may provide features for storing files in a source-code repository, for designating one or more versions of the project, for allowing a developer to check out copies of files, and for allowing the developer to check the copies back into the repository. An RCS may provide features for merging differing copies back into the repository. The merging process may reveal conflicts that must be resolved before the revised product can be built. For example, changes implemented by one developer may conflict with changes implemented by another developer working on the same file or on a different file.
According to one embodiment, a method for pre-merge conflict avoidance may include identifying by a computer system a portion of interest of a revision-controlled base source code stored in a source-code repository, the base source code being developed by a plurality of developers; determining by the computer system whether at least one of the developers has made a change to a portion of a first copy of the base source code corresponding to the portion of interest prior to commitment of the first copy of the base source code to the source-code repository; and in response to a determination that the developer has made a change to the portion of interest, producing a notification about the change to the portion of interest by the developer. Identifying a portion of interest may further include monitoring a second copy of the base source code being developed by at least one other developer; identifying a portion of the second copy that is changed by the other developer; and designating as the portion of interest the portion of the base source code corresponding to the changed portion of the second copy.
In another embodiment, identifying a portion of interest may include monitoring each copy of the base source code to identify each portion of each copy that is changed by each developer of the plurality of developers prior to commitment of the respective copy to the source-code repository; and designating each portion of the base source code corresponding to each portion of each copy that is changed as a respective portion of interest of the base source code.
In yet another embodiment, determining whether at least one of the developers has made a change to a portion of a first copy of the base source code may include determining whether the determined portions of interest of the base source code include common portions of the base source code; and wherein producing a notification about the change to the portion of interest may include producing a respective notification for each developer that has made a change to a respective common portion of the base source code.
In yet another embodiment, identifying a portion of interest of the base source code may include receiving an indication of the portion of interest of the base source code.
In yet another embodiment, determining whether at least one of the developers has made a change to the portion of interest of at least a first copy of the base source code may include monitoring a source of information generated in response to changes to respective copies of the base source code made by the at least one other developer, and determining whether the generated information indicates that changes have been made to the portion of interest of the base source code.
Any of the above embodiments may be embodied as computer-based methods, systems, or program products.
As will be appreciated by one skilled in the art, aspects of the present inventions may be embodied as a system, method or computer program product. Accordingly, aspects of the present inventions may take the form of an entirely hardware embodiment, an entirely software embodiment (including firmware, resident software, micro-code, etc.) or an embodiment combining software and hardware aspects that may all generally be referred to herein as a “circuit,” “module” or “system.” Furthermore, aspects of the present inventions may take the form of a computer program product embodied in one or more computer readable medium(s) having computer readable program code embodied thereon.
Any combination of one or more computer readable medium(s) may be utilized. The computer readable medium may be a computer readable signal medium or a computer readable storage medium. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing. More specific examples (a non-exhaustive list) of the computer readable storage medium would include the following: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a random access memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or Flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the context of this document, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
A computer readable signal medium may include a propagated data signal with computer readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device.
Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
Computer program code for carrying out operations for aspects of the present inventions may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, Smalltalk, C++ or the like and conventional procedural programming languages, such as the “C” programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the latter scenario, the remote computer may be connected to the users computer through any type of network, including a local area network (LAN) or a wide area network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet Service Provider).
Aspects of the present inventions are described below with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the inventions. It will be understood that each block of the flowchart illustrations and/or block diagrams, and combinations of blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer readable medium that can direct a computer, other programmable data processing apparatus, or other devices to function in a particular manner, such that the instructions stored in the computer readable medium produce an article of manufacture including instructions that implement the function/act specified in the flowchart and/or block diagram block or blocks.
The computer program instructions may also be loaded onto a computer, other programmable data processing apparatus, or other devices to cause a series of operational steps to be performed on the computer, other programmable apparatus or other devices to produce a computer implemented process such that the instructions that execute on the computer or other programmable apparatus provide processes for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks.
FIGS. 1 and 2
FIGS. 1 and 2
With reference now to the figures and in particular to , exemplary diagrams of data processing environments are provided in which illustrative embodiments may be implemented. It should be appreciated that are only exemplary and are not intended to assert or imply any limitation with regard to the environments in which different embodiments may be implemented. Many modifications to the depicted environments may be made.
The flowcharts and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present inventions. In this regard, each block in the flowcharts or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustrations, and combinations of blocks in the block diagrams and/or flowchart illustrations, can be implemented by special purpose hardware-based systems that perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
FIG. 1
10
10
12
10
12
depicts a computer system, indicated generally at , and including a network of computers in which illustrative embodiments may be implemented. Computer system may contain a network , which is the medium used to provide communications links between various devices and computers connected together within computer system . Network may include connections, such as wire, wireless communication links, or fiber optic cables, or combinations of such connections.
14
16
12
18
12
20
22
24
20
22
24
14
20
22
24
20
22
24
14
10
In the depicted example, a server and a server may connect to network along with a storage unit . In addition, one or more client computers may connect to network , such as a first client computer , a second client computer , and a third client computer . Client computers , , and may be, for example, personal computers work stations, or network computers. In the depicted example, server may provide data, such as boot files, operating system images, and/or software applications to client computers , , and . Client computers , , and are clients to server in this example. Computer system may include additional servers, clients, and other devices not shown, or may include fewer devices than those shown.
12
10
FIG. 1
In the depicted example, network may be or may include the Internet. Computer system also may be implemented with a number of different types of networks, such as for example, an intranet, a local area network (LAN), or a wide area network (WAN). is intended as an example, and not as an architectural limitation for the different illustrative embodiments.
FIG. 2
FIG. 1
30
30
14
20
30
32
34
36
38
40
42
44
With reference now to , a block diagram of an exemplary data processing system is shown in which illustrative embodiments may be implemented. Data processing system is an example of a computer, such as server or client computer in , in which computer-usable program code or instructions implementing the processes may be located for the illustrative embodiments. In this illustrative example, data processing system may include communications fabric , which provides communications between a processor unit , a memory , a persistent storage , a communications unit , an input/output (I/O) unit , and a display . In other examples, a data processing system may include more or fewer devices.
34
36
38
34
34
34
Processor unit , also referred to simply as a processor, may serve to execute instructions for software that may be loaded into memory from persistent storage . Processor unit may be a set of one or more processors or may be a multi-processor core, depending on the particular implementation. Further, processor unit may be implemented using one or more heterogeneous processor systems in which a main processor is present with secondary processors on a single chip. As another illustrative example, processor unit may be a symmetric multi-processor system containing multiple processors of the same type.
36
38
36
38
38
38
38
38
Memory and persistent storage are examples of storage devices. A storage device is any piece of hardware that is capable of storing information either on a temporary basis and/or a permanent basis. Memory , in these examples, may be, for example, a random access memory or any other suitable volatile or non-volatile storage device. Persistent storage may take various forms depending on the particular implementation. For example, persistent storage may contain one or more components or devices. For example, persistent storage may be a hard drive, a flash memory, a rewritable optical disk, a rewritable magnetic tape, or some combination of the above. The media used by persistent storage also may be removable. For example, a removable hard drive may be used for persistent storage .
40
40
40
Communications unit , in these examples, provides for communications with other data processing systems or devices. For example, communications unit may be a network interface card. Communications unit may provide communications through the use of either or both physical and wireless communications links.
42
30
42
42
44
Input/output unit allows for input and output of data with other devices that may be connected to data processing system . For example, input/output unit may provide a connection for user input through a keyboard and mouse. Further, input/output unit may send output to a printer. Display displays information to a user.
38
36
34
34
36
34
36
38
Instructions for the operating system and applications or programs are located on persistent storage . These instructions may be loaded into memory for execution by processor unit . The processes of the different embodiments may be performed by processor unit using computer implemented instructions, which may be located in a memory, such as memory . These instructions are referred to as program code, computer-usable program code, or computer-readable program code that may be read and executed by a processor in processor unit . The program code in the different embodiments may be embodied on different physical or tangible computer-readable media, such as memory or persistent storage .
50
52
30
34
50
52
54
52
38
38
52
30
52
52
Program code may be located in a functional form on a computer-readable media that is resident on a local or remote storage device or is selectively removable and may be loaded onto or transferred to data processing system for execution by processor unit . Program code and computer-readable media form computer program product in these examples. In one example, computer-readable media may be in a tangible form, such as, for example, an optical or magnetic disc that is inserted or placed into a drive or other device that is part of persistent storage for transfer onto a storage device, such as a hard drive that is part of persistent storage . In a tangible form, computer-readable media also may take the form of a persistent storage, such as a hard drive, a thumb drive, or a flash memory that is connected to data processing system . The tangible form of computer-readable media is also referred to as computer-recordable storage media. In some instances, computer-recordable media may not be removable.
50
30
52
40
42
30
30
30
36
38
52
FIG. 2
Alternatively, program code may be transferred to data processing system from computer-readable media through a communications link to communications unit and/or through a connection to input/output unit . The communications link and/or the connection may be physical or wireless, or a combination of physical and wireless in the illustrative examples. The computer-readable media also may take the form of non-tangible media, such as communications links or wireless transmissions containing the program code. The different components illustrated for data processing system are not meant to provide architectural limitations to the manner in which different embodiments may be implemented. The different illustrative embodiments may be implemented in a data processing system including components in addition to or in place of those illustrated for data processing system . Other components shown in can be varied from the illustrative examples shown. As one example, a storage device in data processing system is any hardware apparatus that may store data. Memory , persistent storage , and computer-readable media are examples of storage devices in tangible forms.
32
36
32
In another example, a bus system may be used to implement communications fabric and may be comprised of one or more buses, such as a system bus or an input/output bus. Of course, the bus system may be implemented using any suitable type of architecture that provides for a transfer of data between different components or devices attached to the bus system. Additionally, a communications unit may include one or more devices used to transmit and receive data, such as a modem or a network adapter. Further, a memory may be, for example, memory or a cache such as found in an interface and memory controller hub that maybe present in communications fabric .
FIG. 3
60
10
60
60
62
12
64
64
20
22
24
66
14
16
68
64
64
70
70
70
70
70
70
a
n
a
n
a
n
a
n
a
n
With reference also to , a development environment, indicated generally at , is an example of a computer system in which illustrative embodiments may be implemented. Development environment offers features and capabilities for producing a product, such as a computer program, website, or publication. Environment may include a communications network , which may be an example of network ; one or more developer's workstations -, which may be examples of a client , , ; and at least one server , which may be an example of a server , and which may host or have access to storage . Each workstation -may run or have access to a set of developer's tools -selected for the task at hand. For example, to develop products delivered as object files, tools -may include one or more text editors, compilers, assemblers, interpreters, and/or debuggers; to develop websites, tools -may include HTML, CSS, graphics, and/or script editors and validators; or to develop internal or published documentation, tools may include word processors, graphics editors, and/or page-layout software. Other development tasks, other tools, and other combinations of tools will be apparent to those skilled in the art.
74
72
74
64
74
74
74
74
74
64
64
64
72
72
114
116
62
a
a
b
n
a
n
b
n
Development projects may be collaborative efforts involving a plurality of developers , hereinafter called a team , that includes at least one developer operating at least one workstation and one or more other developers -of a plurality of developers , each of the other developers -operating one or more other workstations , such as workstations -. Members of team may be in close proximity or widely distributed and may be considered a team by the fact that they are developing the same source code. Members of team may have access to email , discussion forums , and other sources of project-related information, for example via network .
60
80
80
82
82
64
64
84
66
62
60
a
n
a
n
FIG. 3
Environment may further include a revision control system (RCS), indicated generally at . RCS may include client-side components -that run on workstations -and server-side components that run on servers . These components may communicate when appropriate via communications network . It is understood that is intended as an illustrative example, and not as an architectural limitation. Environment may include other workstations, servers, and devices not shown; or it may include fewer devices than those shown.
FIG. 4
80
60
80
90
92
92
94
92
92
94
80
94
94
92
74
74
a
k
a
k
a
a
a
Referring now also to , RCS is an example of a portion of development environment in which illustrative embodiments may be implemented. RCS may provide features for tracking, managing, and/or implementing changes to source-code files and for generating (or building) one or more versions -of a product . Each version -of product may be an update to a previous product release (for example, to correct errors) or an upgrade offered as a new product release (for example, to add new features). RCS provides the ability to assign a unique identifier, which may be called a version number, to designate a variant of product , for example, to define a distinguishable revision or configuration of product . It is understood that the “a-n” and similar notation used herein to indicate an indefinite range does not necessarily imply any direct correspondence between items designated by the same letter; or that each range has the same number of items; or that the designated items are in any ordinal sequence. For example, version does not necessarily correspond to developer , who might or might not be among the developers working on version ; and the total number of developers may differ from the total number of versions.
96
90
90
90
90
96
66
68
62
a
o
a
o
FIG. 3
Source-code repository may be a storehouse for source code, which may be stored in one or more source-code files -, also referred to a source code. Files -may contain program instructions, ASCII text, binary data, image data, formatted documents, or any other type of information. With reference to , repository may be implemented via a server in communication with storage for example via network . Other functional combinations will be apparent to those skilled in the art.
92
92
94
80
98
90
90
96
80
94
96
98
90
96
98
80
90
96
90
90
98
80
a
k
a
o
a
o
To provide the ability to build or rebuild one or more versions -of product , RCS may maintain a code base , which may be a set of source-code files -in source-code repository managed by RCS to build product . Repository may store more than one code base , and a source file in repository may belong to more than one code base . RCS may maintain a record of changes to the content of each source file in repository , where the changes to content may be stored as differences or deltas between versions. Source code -in a code base managed by RCS may be referred to as revision-controlled base source code.
80
112
112
112
74
90
80
112
FIG. 5
RCS may maintain one or more log files , shown in , that list and describe each change to the base source code. A log file may detail each change by file name and line number, for example, the log file thereby being an example of a source of information indicative of changes being made to the base source code by the team or plurality of developers. For example, if a developer checks in a revised version of a source-code file that contains an inserted line of code, then RCS may write data to one or more log files , such as a commit log file, to document the insertion.
80
94
94
80
98
80
98
112
94
80
94
RCS further may provide capabilities for building or rebuilding any designated version of product . For example, to build a specified version of product , RCS may generate from code base a set of source-code files synchronized to the specified version. If appropriate, RCS may directly or indirectly compile or otherwise assemble one or more executable programs for inclusion in the specified version. By storing a code base , version-specific records of changes to the content of source code, and log files documenting the changes, and by building any designated version of product , RCS provides capabilities that enable a developer or a team of developers to work concurrently on multiple versions of product .
98
94
98
80
A main development stem of code base , perhaps dedicated to a future upgrade release of product , may be referred to as a trunk. A fork of code base , perhaps corresponding to a previously released version, may be referred to as a branch. RCS may provide the ability to apply specified changes to specified numbered versions. For example, changes that add new functionality may be limited to the trunk, while changes that correct errors may propagate to one or more specified branches, for example, to support an eventual updated revision.
FIG. 5
80
74
102
98
100
100
80
102
102
90
74
102
102
64
74
80
64
102
74
104
104
94
a
b
a
b
a
b
Referring now also to , features of RCS may allow a developer to designate a version number and check out a working copy of all or part of code base , thereby obtaining a private copy of all or part of the designated revision-controlled base source code synchronized to that version number. During a check-out operation, indicated at and , RCS may create a working copy or of each file that has been checked out and provide access by respective developer to copy . Copy may reside on workstation used by developer but may reside elsewhere, for example, on a server maintained for RCS and in communication with workstation . Access to working copy provides developer with the ability to make changes to his or her working copy, as indicated at and . A developer may build a private variation of all or part of changed product , for example, to implement changes to the product.
80
96
94
98
106
106
106
106
80
130
130
80
136
94
80
a
b
a
b
Features of RCS may allow the developer to check one or more changed files in a working copy back into repository , for example, to propagate changes made to a portion of the source code into one or more numbered versions of product . The check-in operation publishes changes from a working copy into the base source code , also called the code base, which is the official or canonical version of the code under development by the team. This publication commits at or the changes to the shared base source code, so this operation may be referred to as a commitment operation . During a check-in (commitment) operation , RCS may perform a merge operation or to propagate changes from the working copy into one or more specified trunks or branches, for example, by means of a file-comparison operation that yields a list of differences between the working copy and the base source code, so that the differences may be stored as a record of the change. When RCS generates or builds at a specified version of product , RCS may incorporate all changes accumulated in the specified branch.
94
80
98
98
96
80
80
For example, if a bug has been reported in a version of product , the developer may use RCS to check out the relevant portion of the base source code synchronized to that version, fix the bug, and check the fixed source code back into repository , so that RCS can rebuild a revision of the version that includes the correction. If the bug exists in other versions, features of RCS may enable specifying other numbered versions to benefit from the same change.
60
80
64
If development environment has a client-server architecture, portions of RCS may run or reside on one or more servers, and portions may run or reside on one or more client workstations . Those skilled in the art will understand that networked environments can express similar functionality thorough diverse architectural designs.
106
80
112
106
130
96
80
112
106
80
113
112
113
During a commitment operation , RCS may generate one or more log files that document the commitment operation , merge operation , or both. For example, when checking in a file and committing changes to repository , a developer may write comments describing the change, and RCS may save data such as a developer ID, comments, a time stamp, and/or other details in the form of a commit log file , which may accumulate entries spanning a series of check-in (commitment) operations . In another example, RCS may save computer-generated data such as a list of differences between revisions to a log file , such as a patch log file. Log files and may serve as references or information sources for locating or understanding particular changes.
90
80
130
80
100
80
If only one developer at a time changes a given file , RCS may conduct a straightforward merge operation to detect differences between the checked-in copy and the base source code and propagate those differences into one or more designated branches. RCS may offer an option during a check-out operation to lock one or more files being checked out. RCS places a locked file under the exclusive control of the developer who locked it. When checking in a locked file, the developer can release the lock, allowing other developers to check out and edit the file.
74
100
104
102
90
74
100
104
102
90
102
102
90
80
102
102
130
132
90
96
a
a
a
a
a
b
b
b
b
a
a
b
a.
a
b
a
a
Developers may be able to disregard locks held by other developers and to edit independent working copies of source files. For example, a first developer may check out, lock at , and edit at working copy of source file . A second developer may check out at the same file, accidentally or intentionally disregard the lock, and edit at an independent working copy of source file . In this situation, the locked working copy and the independent working copy differ in different ways from source file If both developers propagate changes into the base source code, then RCS may accommodate the differences between locked copy and the independent copy . For the first working copy to be checked in, merge operation checks for conflicts as indicated at , finds no conflicts, and performs a straightforward update to the base source code file in repository .
132
130
130
90
130
132
80
94
b
a
a
b
For the second working copy to be checked in, a conflict detection operation and merge operation consider the second set of changes relative both to the original base source code and to the changes applied by the first merge operation . If two sets of changes are in functionally distinct regions of the same file , merge operation may be able to resolve the conflict automatically. If two sets of changes are in the same or functionally related regions, the conflict-detection operation may be able to detect a merge conflict but unable to resolve it. Often a developer inspects the conflicting working copies, combines changes, elects one change over another change, or otherwise reasons out a solution. Manual resolution of merge conflicts may consume large amounts of developer time and may reveal wasted effort, for example, by exposing redundant or incompatible changes. If there are more than two working copies, each with independent changes, the resolution process becomes more complex. An unresolved merge conflict may prevent RCS from building the impacted version of the product .
It may be desirable to allow two or more developers to work on the same file at the same time. This strategy allows multiple developers to work concurrently on the same source code, which is potentially more efficient than enforcing exclusive control. This strategy elevates the risk of merge conflicts, especially for large projects or distributed teams. In a development environment that permits concurrent work, resolution of merge conflicts may interfere with other productive work.
FIG. 6
80
200
130
80
202
202
98
96
72
74
74
204
204
80
102
204
106
106
80
206
124
124
80
124
a
b
a
n.
a
b
a
b
a
b
Referring now also to , RCS may provide mechanisms for avoiding merge conflicts between different copies of the same portion of the base source code by detecting merge conflicts prior to the merge operation . To do so, RCS may, as indicated at and , identify a portion of interest of revision-controlled base source code stored in repository and under development by team of developers -As indicated at and , RCS may determine whether a developer who has checked out a copy of the base source code has made a change to his or her copy within a portion of the copy corresponding to the portion of interest of the base source code. This determination may occur before the developer checks the changed copy back into the repository at and , thereby committing the change into the base source code. In response to the determination, RCS may produce a notification about the change, as indicated at One or more developers may rely on this notification or of pending change, for example, to maintain the compatibility of their changes with changes being made by other developers. RCS may send notice to the associated developers before that developer commits changes in his or her working copy into the base source code in the repository.
90
98
90
90
90
80
124
80
130
a
o
A portion of interest of revision-controlled base source code may be any part of the base source code . For example, the portion of interest may be one or more lines of code within one or more source files -, an entire file , a directory containing one or more files, all of the source code in a designated version, or any combination of lines or files. A portion of interest may be a portion of the base source code being developed by one or more developers; or a portion of interest may be a portion of the base source code that might or might not be under active development that is designated as being of interest by an appropriate person, such as developer or administrator. RCS may identify multiple portions of interest, for example, that may result in changes being made by two or more developers that will (when committed) modify the same portion of the base source code. By detecting common, overlapping changes among multiple developers, and by generating notifications (also referred to as notices) about potentially conflicting edits to working copies, RCS may provide developers with an early warning system that allows them to avoid or mitigate in advance the manual resolution of conflicts that would otherwise occur during merge operation .
80
74
100
90
96
124
90
124
80
74
74
90
74
102
90
74
74
74
102
90
130
a
a
a
a,
b
n
a
a
a
a
a
b
n,
a
a
A combination of embodiments may yield an illustrative implementation of RCS . For example, a first developer , by simply checking out at a file from repository , may trigger an automatic notice of conflicts potentially impacting file the notice being issued by RCS whenever another developer -checks in a change that modifies the base source code for file . By issuing such notices before developer checks in his or her working copy of file , developer has an early opportunity to anticipate changes being implemented by other developers -and to modify his or her working copy of file , for example, to avoid conflicts that would otherwise arise during the merge operation .
80
100
100
80
74
74
80
74
In some embodiments, RCS may automatically identify a portion of interest, for example, by extending the check-out operation to include an identification capability. As mentioned elsewhere, the check-out operation may allow a developer to designate a version and obtain a working copy of all or part of the base source code synchronized to that version. In some embodiments, during a check-out operation , RCS may additionally register an association between developer and the portion of the source code being checked out by developer . RCS may perform this registration by default and may identify all or part of the checked-out source code as a portion of interest. Such embodiments implement the premise that code that has been checked out by a developer is a presumptive portion of interest to that developer .
74
74
90
102
80
74
102
74
90
102
80
74
102
74
102
74
102
80
74
102
b
a
a
a
a
a
b
a
b
b
b
a
a
b
b
a
a.
In some embodiments, identifying a portion of interest may include monitoring a second copy of the base source code checked out by another developer , as a source of information, to detect a portion of the second copy that has been changed by the other developer, and designating as a portion of interest the portion of the base source code corresponding to the changed portion of the second copy. For example, a first developer may select a file in the base source code and check out a working copy . RCS may then identify a first portion of interest within the base source code based on changes made by developer within working copy . A second developer may also check out file as a second working copy , and RCS may identify a second portion of interest within the base source code based on changes being made by developer within working copy . Developer may change copy , while developer may concurrently change copy . RCS may determine that developer has made an uncommitted change to working copy
80
102
80
124
74
74
80
a
a
b
By monitoring the second portion of interest, RCS may detect an uncommitted change to the second portion of interest that potentially conflicts with the uncommitted change to first working copy . RCS may then produce a notification about the potential conflict and may direct the notice to (for example) developer , developer , or both. It is understood that that the “first” and “second” designations with respect to developers, files, and similar items are identifying labels that do not necessarily imply sequence. In this embodiment, RCS identifies two portions of interest and may treat the portions of interest separately for the purposes of determining change, evaluating potential conflicts, and producing one or more notifications.
102
102
80
74
74
90
80
80
a
b
a
b
a
The determination that triggers the notice may be the detection of changes to copies and that (if checked in) would modify the same line of the same file in the base source code. In some embodiments, RCS may allow developers or to specify determinations that depend on criteria in addition to, or other than, a literal match of line numbers in file in the base source code. For example, the criteria might enable detecting changes within a range of line numbers bracketing a single line being changed (that is, RCS performs a proximity match within a predetermined or specified range of lines). In another example, RCS may provide a mechanism for detecting changes based on functional features of the program code, such as but not limited to definitions of functions, data structures, variables, subsystems, and other constructs supported by the language in use.
205
205
80
80
80
80
80
124
80
124
80
a
b
In some embodiments, identifying a portion of interest may include monitoring information sources, as at steps and , such as by monitoring each working copy of the base source code to identify each portion of each working copy that is changed by its respective developer prior to the commitment of each working copy by its respective developer, and designating each changed portion as a portion of interest. In this embodiment, RCS may identify multiple portions of interest, each portion of interest corresponding to an aspect of the development effort being performed by one or more developers. For example, if three developers check out distinct working copies of the same file from the base source code, then RCS may identify a distinct portion of interest corresponding to each working copy. When RCS determines that at least one of the three developers has made a change to his or her working copy, RCS may monitor the other working copies, for example, to detect intersecting changes that would (when committed) impact the same portion of the base source code. RCS may produce a notice of the potential merge conflict and direct the notice to one or more of the three developers. Continuing the example, if all three developers happened to edit the same line of code (that is, the same line when mapped to the base source code) and none have committed the respective change, then RCS may issue a notice to all three developers. After one of the developers has committed the change, RCS deletes the corresponding portion of interest and subsequently tracks the two remaining portions of interest. Those skilled in the art will appreciate that the number of portions of interest active at any one time may vary dynamically according to the level of activity in the project.
102
102
80
102
102
74
74
80
102
102
80
74
74
102
102
80
74
74
102
102
64
64
80
102
102
64
64
80
64
64
102
102
80
102
102
80
74
102
102
80
102
22
124
80
a
n
a
n
a
n
a
n
a
n
a
n
a
n
a
n
a
n
a
n
a
n
a
n
a
n
a
n
a
a
n
a
n
To monitor multiple working copies -prior to check in, RCS may maintain a means of access to copies -checked out by one or more developers -. In an embodiment, RCS may maintain some or all copies -in a shared file system, so that RCS has ongoing access to work-in-progress changes by the respective developers -. For example, copies -may generally reside on a server accessible by RCS , and each developer -may remotely view and change his or her copies -. One or more workstation -may be thin clients used for access to RCS . In an embodiment, some or all copies -may reside elsewhere, for example, as files distributed to workstations -acting as client computers. RCS accordingly may communicate with one or more workstations -, in order to monitor local change being applied to working copies -. RCS may hold rights or permissions that grant it access to working copies -. For example, RCS may hold rights or permission to a portion of a file system used by workstation as a work space to store copies -. In these or other embodiments, RCS may monitor copies -constantly, at a specified or predetermined time interval, or at a specified or predetermined event. The time interval between keyboarding potentially conflicting changes and sending a notification to one or more developers may be virtually instantaneous, near real-time, delayed, predetermined, or controlled by a feature of RCS . Those skilled in the art will appreciate that other architectural embodiments may offer functionality equivalent to these representative architectural embodiments.
80
80
80
80
Each developer may potentially work on more than one development task at the same time in the same project. For example, a developer might be implementing changes in one subsystem while also implementing unrelated changes in a different subsystem. The two tasks are separate assignments performed by the same person. In an embodiment, RCS may provide a capability to allow a developer to designate multiple tasks, multiple roles, or both, so that RCS can identify distinct task-specific or role-specific portions of interest. A task or role may move from one developer to another. RCS may accordingly provide a capability for transferring tasks or roles from one developer to another, for example, to improve continuity after changes in staffing. References to a single developer do not necessarily imply a single person in that functional role. Those skilled in the art will appreciate that development efforts are collaborative efforts. A particular task may be performed by a single developer or by a group of developers—that is, by a subset of the team. The number of developers for a given task may change over time. In some embodiments, RCS may provide capabilities for mapping an identified portion of interest to more than one developer, for example, to facilitate collaboration by directing pre-merge conflict notifications to multiple interested persons. It is further understood that the term “developer” as used herein may include persons who do not change source code. Managers and documentation writers, for example, might not change the base source code, but might nonetheless benefit from receiving notification of potential conflicts.
80
In embodiments, identifying a portion of interest may include receiving an indication of the portion of interest. As discussed above, receiving an indication may include monitoring sources of information, such as one or more copies of the base source code and identifying in the copies an indication of the portion of interest entered by the respective developers. RCS accordingly may provide capabilities that permit a developer to expressly specify a portion of interest such as a line or lines of code, a file, combination of files, directory, combination of directories, branch, or trunk, alone or in any combination. A file not part of the source code may be established for storing indications of portions of interest by one or more of the developers. Receiving an indication may accordingly include monitoring the given file associated with a given copy of the base source code and identifying in the given file an indication of the portion of interest of the base source code entered by the at least one developer.
80
80
74
For example, if a developer plans to work on a given source file, RCS may provide a feature to allow the developer to designate that file as a portion of interest, optionally without checking out the file, for example, to receive notifications of pending changes that might affect that portion of the base source code. These mechanisms may allow the developer to elect to monitor any arbitrary source code controlled by RCS , instead of or in addition to code checked out by developer .
80
80
90
74
80
74
90
50
80
90
90
80
80
90
90
a
a
a
a
a.
In embodiments, RCS may provide features that allow a developer to mark one or more lines or regions of source code as a portion of interest. For example, RCS may provide a mechanism for specifying a portion of interest by internally marking a file with predefined symbols or sequences of characters. This internal markup, referred to as metadata artifacts, may have a syntax to allow a developer to control the behavior of RCS . For example, developer may wish to delimit a specific portion of file as a portion of interest . RCS accordingly may provide an ability to edit or insert metadata artifacts within file , for example, to mark the starting and ending lines of that region of file as portion of interest. A developer may insert artifacts by directly editing the artifacts into the source code, for example, with a text editor. RCS may interpret the markup as an instruction to monitor changes within the defined range of lines. Other metadata artifacts may control monitoring and notification by RCS , for example, to control the content of any notification triggered from the marked region. To prevent tools such as compilers from generating errors from unexpected characters in source file , a syntax for metadata artifacts may require delimiting metadata artifacts with comment characters selected for the computer language used within file
80
80
Those skilled in the art will appreciate that a syntax used for metadata artifacts may be extended to include instructions applicable to any operation of RCS . For example, in an embodiment, metadata artifacts may allow identification of a portion of interest by means of a symbolic name, such as but not limited to a program construct such as a function, data structure, or any other construct supported by the computer language being used for the project being controlled by RCS .
112
113
80
114
116
80
Receiving an indication of the portion of interest may include monitoring one or more sources of information that may indicate changes being made to the base source code by one or more members of the team of developers and determining whether one or more sources of information indicate that changes have been made to the portion of interest. Examples of sources of information may include log files and generated by RCS , email messages or mailing lists , online discussion boards , web pages, Wiki-based documents, social media mechanisms such as Twitter or Facebook, or other forums. In some embodiments, RCS may include capabilities for selecting one or more information sources.
112
90
112
90
112
90
90
112
90
74
90
112
74
80
112
112
80
112
80
80
124
80
124
a
a
a
a
a
a
In an embodiment, an information source may be one or more log files , which are generated during a check-in or merge operation to memorialize changes committed to a given source file . For example, a log file for source file may record data such as but not limited to an associated developer ID, date-stamp, and developer-written comments explaining changes. Separate log files may document atomic or accumulated changes affecting the associated source file . If a portion of interest is a given source file , a log file corresponding to file might contain information of use to developer who has checked out file . Other files may also contain information such as developer comments useful to developer . In an embodiment, RCS may offer a mechanism for defining a set of log files as a source of information and for defining patterns to match within the selected set of log files . RCS may offer a search syntax, such as that used for UNIX global regular expression parsing, to facilitate pattern matching within log files . In this embodiment, RCS in effect enables a developer to automatically monitor project-wide records associated with ongoing check-in operations. When a match causes RCS to send a notice to a developer, RCS may indicate the log file that triggered the match within the body of notice , for example by quoting it in full or in part or by including a link or pointer to a copy of the log file.
114
72
72
114
72
72
80
80
80
114
80
114
80
124
80
124
An information source may be one or more email mailing lists . To facilitate communication among members of team , team may establish one or more lists , which may allow any member of team to broadcast a message to other members of team and to participate in project-related discussions. In an embodiment, RCS may provide an integrated, internal email list feature. RCS may alternatively or additionally provide features that allow it to act as a subscriber to an external list. Hosting or subscribing to one or more lists enables RCS to gain access to the content of discussions on the lists and to maintain an archive of list traffic. Ongoing and/or archived discussions may contain comments applicable a particular development task. Specifying a list as a source of information in effect allows a developer to automatically monitor present and past email list traffic for comments applicable to the current portions of interest. Email discussions are often conducted in ASCII text, which lends itself to electronic search techniques. RCS accordingly may offer a search syntax to facilitate pattern matching within the selected list . When a match causes RCS to send a notification to a developer, RCS may indicate the message that triggered the match within the body of notification , for example by quoting it in full or in part or by including a link or pointer to a copy of the message.
116
116
114
72
116
116
80
116
116
80
116
80
116
116
80
124
80
124
In an embodiment, an information source may be one or more online discussion forums . Forums are similar to email lists but implemented in a shared location with bulletin-board hosting software instead of email broadcast to a list. Team may establish one or more forums to facilitate project-related discussions. Especially for large projects, forums may carry a high traffic volume. In embodiments, RCS may offer features for hosting an internal forum , to act as subscriber to an external forum , or both. In embodiments, RCS may offer a search syntax to facilitate pattern-matching within the content of a selected forum . RCS , by automatically monitoring forum for the current portion of interest, may save considerable developer time otherwise spent reviewing forum . When a match causes RCS to send a notification to a developer, RCS may indicate the message or thread that triggered the match within the body of notice , for example by quoting it in full or in part or by including a link or pointer to a copy of the message or thread.
60
118
In some embodiments, an information source may be a defect tracker , also called a bug reporting system. A development environment often has a formal or informal bug-reporting system. Notifications that reference a defect tracker may incorporate relevant data such as a defect number or a description of the defect in question.
80
80
80
Determining whether at least one of the developers has made a change to a portion of a first copy of the base source code may include determining whether the portions of interest include common portions of the base source code. For example, if three developers check out the same source file from the base source code, RCS may identify a portion of interest corresponding to changes occurring in each working copy. As each of the three developers modifies his or her respective working copy, RCS correlates each set of changes to each working copy back to the underlying base source code, which is the canonical copy and the standard for determining that the code has changed. By reference to the base source code, RCS may determine whether changes to two portions of interest impact a common portion of the base source code. For example, if two developers have edited the same line (when mapped back to the base source code), then both portions of interest include common portions.
80
124
80
In response to a determination that at one developer has made a change to a portion of interest, RCS may produce a notification of the change. RCS accordingly may offer features for generating, addressing, and transmitting notifications. Examples of types of notification may include one or more of email messages, postings to one or more email lists, posting to one or more message boards, postings to one or more social media services such as Twitter, or any other communication mechanism or messaging technique known in the art and designated for announcements to members of the team individually or collectively.
124
118
124
The content of notification may include any data associated with the pending change, portion of interest, or source of information. For example, if a first developer has checked out and changed a portion of the source code, and if a second developer has checked out and changed an overlapping portion of the source code, then the content of the notification to one developer individually may include the common file name, one or more line numbers, the source-code change implemented by the other developer, the name, email address, and/or phone number of the other developer, and other information detailing the pending change and potential merge conflict. In another example, if the event triggering the notification is the submission of a bug report through defect tracker , then the content of the notification may include a defect number, a description of the defect, an indication of the association between the defect and the portion of interest, and/or other descriptive data.
80
80
80
The recipient of the notification may be one or more developers associated with the pending change, designated as recipients of the notification, or both. In an embodiment, RCS may provide capabilities that automatically identify one or more recipients. For example, continuing the example of a first and second developer working on overlapping code, RCS might identify the first developer as a primary recipient, since the first developer is presumably impacted by the overlapping change. From the perspective of the first developer, the notification is an early warning of a potential merge conflict, sent by RCS before the first developer commits the change to the first working copy into the base source code. The notification enables the first developer to anticipate the merge conflict and avoid the task of manually resolving the merge conflict, which would otherwise be detected after the first developer commits the change.
80
RCS may automatically identify further recipients. In the same example, the second developer might benefit from receiving a copy of the notification triggered by his or her own work. If the content of the notification identifies both developers, then they can potentially communicate about their overlapping work in progress, thereby coordinating their efforts and encouraging compatible changes.
80
80
RCS may provide capabilities for registering an association between a developer or other team member and a notification address. For example, RCS may provide a feature that allows each developer to designate one or more email addresses as a contact address for notifications.
80
80
80
80
RCS may provide capabilities that allow a direct designation of one or more recipients of a notification. For example, it may be desirable to send notifications to project managers, documentation writers, or any other person or group identified by a contact address. RCS accordingly may allow designation of one or more arbitrary contact address for receipt of notifications. RCS may further allow filtering of notifications before determining the list of recipients, so that RCS may direct different types of notifications to selected recipients.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the described inventions. As used herein, the singular forms “a”, “an” and “the” are intended to include the plural forms as well, unless the context clearly indicates otherwise. It will be further understood that the terms “comprises” and/or “comprising,” when used in this specification, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
The corresponding structures, materials, acts, and equivalents of all means or step plus function elements in the claims below are intended to include any structure, material, or act for performing the function in combination with other claimed elements as specifically claimed. The description of the present inventions has been presented for purposes of illustration and description, but is not intended to be exhaustive or limited to the inventions in the form disclosed. For example, the invention may be embodied in an environment that is not part of a revision control system. Many modifications and variations will be apparent to those of ordinary skill in the art without departing from the scope and spirit of the inventions. The embodiments were chosen and described in order to best explain the principles of the inventions and the practical application, and to enable others of ordinary skill in the art to understand the inventions for various embodiments with various modifications as are suited to the particular use contemplated.
BRIEF DESCRIPTION OF THE SEVERAL VIEWS OF THE DRAWINGS
FIG. 1
is a pictorial representation of an example of a computer system in which illustrative embodiments may be implemented.
FIG. 2
is a block diagram of an example of a computer in which illustrative embodiments may be implemented.
FIG. 3
shows an example of a development environment in which illustrative embodiments may be implemented.
FIG. 4
shows an example of a revision control system in accordance with principles of the present inventions.
FIG. 5
. shows a flow-chart illustrating an example of the use of a revision control system in accordance with the principles of the present inventions.
FIG. 6
shows an example of a method of pre-merge conflict avoidance in accordance with the principles of the present inventions. | |
Topic 13 focuses mainly on Ratios and Proportional Relationships (RP) 3, 3a, and 3b:
- CCSS.Math.Content.6.RP.A.3 Use ratio and rate reasoning to solve real-world and mathematical problems, e.g., by reasoning about tables of equivalent ratios, tape diagrams, double number line diagrams, or equations.
- CCSS.Math.Content.6.RP.A.3a Make tables of equivalent ratios relating quantities with whole-number measurements, find missing values in the tables, and plot the pairs of values on the coordinate plane. Use tables to compare ratios.
- CCSS.Math.Content.6.RP.A.3b Solve unit rate problems including those involving unit pricing and constant speed. For example, if it took 7 hours to mow 4 lawns, then at that rate, how many lawns could be mowed in 35 hours? At what rate were lawns being mowed?
Double Dose Recommendation:
Pre-teach the following:
- Reading Frequency tables and histograms, 2 days (#71-2)
- Stem and Leaf Plots, 3 days (#73-35)
Tip of the Week:
One highlight of my walk-through at FPES a few weeks ago was seeing an awesome cumulative review game in several classes. Math Instructional Coach, Kathleen Donlan, engaged classes in this powerful collaborative group math game. She originally got the idea from a math competition she went to years ago, and has tailored the game to fit the classes with the standards they’ve learned so far.
Click here to download Kathleen’s game (used with permission).
Technology Integration Resources:
- 6th Grade Performance Task: Waverly Waves
- Mr. Avery made a QR Code game involving ratios and rate
Math Practices
The Teaching Channel created a great video about including math practices and explicitly in daily instruction.
How do you include the math practices daily?
If you have used Kathleen Donlan’s review game, what insight can you share with others?
3 Responses to “Tips, Mathematical Practices, and Ideas about Solving Proportions”
-
What we do for the rounds game, in case you were not at the meeting, is we start with round 1, students answer the 6 questions in a group of 4. It is a competition, When and if they have all the problems right for round 1 done they give you round 1 and get round 2 and so on through round 3. The first time we did it took about an hour I will let you know next week if we did it faster this time. I give the 1st team to finish 2 pieces of “fruit” and every team that participates and or finishes gets one piece of fruit.
NOTE: (You will need to carry the key for each rounds questions and this is where DOK 3&4 come in if something is wrong you tell them where to go back to and ask them to figure out what they did wrong.)
Make each round a different color so you can see where each group is at, and when you give them their strips of paper for each round make them keep track of their paper clip and have them clip the first round back for you before they get the next round from you. It makes it easier to keep track of the little slips.
Prepare for it to be loud and wear a comfortable pair of shoes that day. Enjoy and let there be laughter, joy, and lots of DOK 3 & 4 in your math classes this week & next week.
-
I found this video on you tube using a tic tac toe board to set up proportions and thought this was a cool way of doing it….. | http://blogs.goaj.org/commoncoremath/2014/02/13/tips-mathematical-practices-and-ideas-about-solving-proportions/?replytocom=6 |
CROSS-REFERENCE TO RELATED APPLICATION AND CLAIM TO PRIORITY
FIELD OF THE INVENTION
BACKGROUND OF THE INVENTION
SUMMARY OF THE INVENTION
DETAILED DESCRIPTION OF THE INVENTION
This application claims the benefit of Korean Utility Model Application No. 20-2008-0017087, filed on Dec. 24, 2008, in the Korean Intellectual Property Office, the disclosure of which is incorporated herein by reference.
The present invention relates to a trash collector for vehicles, and more particularly, to a trash collector for vehicles in which trashes that are produced in the vehicles are collected and processed neatly and efficiently.
Usually, various kinds of convenient facilities are installed in vehicles for the sake of drivers. Accordingly, those various kinds of convenient facilities are configured so that drivers who run vehicles can use them safely and conveniently, at the state where the drivers do not lose their front sight.
When only a driver runs alone or together with a passenger fellow on a passenger seat or back seat, various kinds of trash such as snipes or half-smoked cigarettes, cookies, paper bags, drink containers, fruit skins, etc., are deposited in vehicle. However, no particular articles for collecting the various kinds of trash such as snipes or half-smoked cigarettes, cookies, paper bags, drink containers, fruit skins, etc., have been yet installed in vehicles.
Of course, trash boxes are installed at the side of a driver seat or a back seat, in order to collect trash such as snipes or half-smoked cigarettes, but such trash boxes are limited to collecting trash of large volume.
Accordingly, trash that is produced in the inside of vehicles is taken to destination points at a state where the trash remain derelict. Otherwise, trash that is produced in the inside of vehicles are contained in vinyl paper bags which pack various kinds of foodstuffs or supplies at purchase and then remain derelict in the vehicles, so as to be dumped at destination points.
However, the above-described trash collection methods have caused the following problems.
Since trash that has been produced in the vehicles remain derelict as they are in the vehicles, there may cause to spoil a fine view of the vehicles, and make passengers of vehicles feel unpleasant feeling from the discarded trash.
In addition, seats of the vehicles may be polluted from the residual foods, and offensive odors may occur from the contaminated seats, which do not offer passengers agreeable environments.
That is, basic aims that vehicles should be maintained in comfortable and agreeable circumstances during running of the vehicles have not been satisfied.
Furthermore, some inconsiderate people throw away trash without permission at roadsides or on roads, in order to avoid bad views or offensive odors from happening in the vehicles, which makes other people frown their brows.
To overcome problems or inconveniences of the conventional art, it is an object of the present invention to provide a trash collector for vehicles which enables people to conveniently collect trash that is produced in the vehicles and to process the collected trash neatly and efficiently.
To accomplish the above object of the present invention, according to an aspect of the present invention, there is provided a trash collector for vehicles comprising: a body having a space for containing trashes therein and an opening portion which opens and closes the space at the top thereof; a fixing clip which is detachably installed on an inner side surface of the body and has hanging portions which are bent from the inner side surface of the body toward the upper portion of the body; and a roll of vinyl bags which are hung on the hanging portions of the fixing clip and are successively supplied downwards in the body, wherein shield wings are formed on the inner side surface of the body and are inserted into the roll of vinyl bags to thus prevent trashes from being exposed, and a plurality of leaf springs are formed along the girth of the opening portion, to enable the space of the body to be maintained at an opened state and with an elastic force, if flexural strengths of the leaf springs exceed threshold points of the leaf springs.
Preferably but not necessarily, an opening and closing portion which can open and close the space at the side of the body is formed in the opening portion of the body.
Preferably but not necessarily, the opening and closing portion is a zipper portion.
Preferably but not necessarily, a plurality of hanging rings are further formed on the body.
Preferably but not necessarily, at least one auxiliary coupling portion which is detachably coupled with the hanging ring is provided in the body, wherein the auxiliary coupling portion comprises: a detachable portion having a hanging groove whose side surface is opened; an extended portion which is extended from the detachable portion and formed so as to be freely folded; and a bent portion which is bent in a multiple step from the end of the extended portion toward the upper portion of the extended portion, so that the hanging ring is hung on the bent portion.
Preferably but not necessarily, press buttons are installed on the fixing clip and the inner side surface of the body, respectively, so as to be combined mutually.
Preferably but not necessarily, the fixing clip is formed in an integral form.
FIGS. 1 through 6
Hereinbelow, a trash collector for vehicles (hereinafter referred to as a trash collector) according to an embodiment of the present invention will be described with reference to the accompanying drawings, that is, . Like reference numerals are assigned for like elements in the drawings.
100
200
300
400
The trash collector is configured to include a body , a fixing clip , a roll of vinyl bags , and an auxiliary coupling portion .
100
200
300
100
The body provides a space to contain trash. The fixing clip and a roll of vinyl bags are installed in the body .
100
The body is preferably made of leather or cloth of a soft quality of a material so as to be conveniently used.
110
100
100
In addition, an opening portion that can open and close the space of the body is formed on the upper part of the body .
110
Here, the opening portion is formed of a pair of opening portions that are closely attached to each other.
110
100
Accordingly, users can widen the opening portion in order to open the space of body .
111
110
Meanwhile, a plurality of leaf springs are installed in the inside of the opening portion .
110
111
111
111
111
Accordingly, in the case that the opening portion is widened, the leaf springs are bent. If the flexural strengths of the leaf springs exceeds threshold points of the leaf springs , the leaf springs are maintained in a bent state in view of their property.
110
100
That is, since the opening portion is not naturally restored, the space or interior of the body can be kept at an opened state.
120
100
100
100
Meanwhile, an opening and closing portion that can open and close the space of the body at the side of the body is formed on the girth formed along the side surface of the body .
120
100
300
The opening and closing portion enables users to open the space of the body laterally and conveniently take out a sheet of a roll of vinyl bags which contains trashes.
120
Here, the opening and closing portion is preferably a zipper portion.
130
100
Here, a plurality of hanging rings are installed on the outer side surface of the body .
130
100
130
The hanging rings are hanging portions which enable users to hang the body on structures in vehicles. Positions or structures in vehicles where the hanging rings may be installed are not limited to any particular location although they likely will be in the interior of the vehicle.
140
100
In addition, shield wings made of leather or cloth are preferably further formed on the inner side surface of the body .
140
300
100
The shield wings shield the inner portion of the roll of vinyl bags , to thus avoid the trash from being exposed and prevent an offensive odor from leaking to the outside of the body .
140
100
100
Here, a pair of the shield wings are provided on the inner side surface of the body , and are installed on the opposing surfaces of the inner side surface of the body , respectively.
140
100
140
300
Here, one end of the respective shield wings is fixed on the upper portion of the inner side surface of the body , by backstitch etc., and the other end of the respective shield wings is arranged at a state of being inserted into the inside of the roll of the vinyl bags .
200
300
Next, the fixing clip is provided for fixing the roll of the vinyl bags .
200
100
Here, the fixing clip is detachably installed on the inner side surface of the body .
200
The fixing clip is preferably made of plastic, and is preferably integrally formed in one body.
200
210
100
220
210
230
220
Here, the fixing clip includes a detachable portion which is detachably installed on the inner side surface of the body , a hanging portion which is bent in a multiple step upwards from the detachable portion , and a connection portion which is integrally connected with the hanging portion .
210
100
210
100
The detachable portion is a portion that is attached to or detached from the body , in which detachable members are formed on the detachable portion and the body , respectively.
201
Here, press buttons are preferably used as the detachable members.
201
200
100
201
200
100
That is, press buttons are formed on the outer side surface of the fixing clip and the inner side surface of the body , respectively. Accordingly, the press buttons formed on the outer side surface of the fixing clip can be simply attached to or detached from the inner side surface of the body .
220
210
210
220
In addition, since the hanging portion is of a configuration that is bent upwards from the detachable portion , a predetermined gap is formed between the detachable portion and the hanging portion .
300
Accordingly, an overlapping portion of a roll of vinyl bags is loaded and arranged in the predetermined gap.
230
200
110
110
In addition, the connection portion plays a role of making the fixing clip integrally formed in one body, and is formed so as to be flexibly folded depending upon flexural strength of the opening portion at the time of opening and closing the opening portion .
FIG. 2
230
220
230
230
That is, as illustrated in , the connection portion connects with the top portion of the hanging portion , and is formed so that thickness of edges of the connection portion is formed to be thin. Thus, the connection portion can be smoothly folded.
200
Meanwhile, a cutter C is installed on the fixing clip .
300
210
200
The cutter C is to cut a part of the roll of the vinyl bags , and is preferably installed at one side of the detachable portion of the fixing clip .
300
200
Next, the roll of vinyl bags contains trash and is combined with the fixing clip .
300
The roll of vinyl bags is formed of a roll of vinyl sheets both ends of which are opened and lengths of which are long in which the vinyl sheets are rolled in an overlapping form.
220
210
200
Here, the rolled overlapping portion is arranged in a space formed between the hanging portion and the detachable portion of the fixing clip .
300
300
100
200
Accordingly, one end of the roll of vinyl bags is opened to accommodate trash, and the other end of the roll of vinyl bags is arranged in a space of the body through the fixing clip .
300
Here, the other end of the roll of vinyl bags is tied so that trash may not fall out.
400
100
Next, the auxiliary coupling portion plays a role of hanging the body on a structure of the vehicle, and is made of a separate member.
130
100
130
Of course, although a plurality of hanging rings are provided in the body , the trash collector for vehicles according to the present invention may not be hung on various positions in the vehicles only with the hanging rings .
FIG. 5
400
420
421
430
420
410
430
430
130
410
As illustrated in , the auxiliary coupling portion includes a detachable portion having a hanging groove whose side surface is opened, an extended portion which is extended from the detachable portion and formed so as to be freely folded, and a bent portion which is bent in a multiple step from the end of the extended portion toward the upper portion of the extended portion , so that the hanging ring is hung on the bent portion .
400
Here, the auxiliary coupling portion is preferably made of a synthetic resin material, and preferably a soft material whose flexure is free.
Hereinbelow, coupling and function of the trash collector having the above-described structure will be described.
200
100
The fixing clip is combined on the inner side surface of the body .
200
100
201
200
Here, the fixing clip is combined with the inner side surface of the body each other by the press buttons which are formed on the fixing clip .
300
220
200
Then, a roll of vinyl bags is hung on and combined with the hanging portion of the fixing clip .
300
300
100
200
Here, one end of the roll of vinyl bags is opened, and the other end of the roll of vinyl bags is arranged at the lower side of the space of the body through the fixing clip .
140
100
300
Then, a pair of shield wings provided on the inner side surface of the body are inserted into the inside of the roll of vinyl bags .
300
140
Accordingly, the inner side of the roll of vinyl bags is shielded by the shield wings .
300
110
100
140
230
200
110
100
300
Here, the term “shield” does not mean that trash may not be contained in the roll of vinyl bags . If the opening of the body is widened, that is, opened, the shield wings and the connection portion of the fixing clip are also widened together with the opening of the body . Accordingly, the inner portion of the roll of vinyl bags is opened so as to contain trash.
400
130
FIG. 6
Next, the auxiliary coupling portion is hung on one of the hanging rings of the trash collector for vehicles and then hung on and combined with an internal structure in a vehicle, for example, a neck support ‘B’ of a driver seat ‘S’, as illustrated in .
410
400
130
100
421
Here, the bent portion of the auxiliary coupling portion is hung on and combined with the hanging ring of the body , and the hanging groove is hung on and combined with the neck support ‘B’.
In this manner, the trash collector for vehicles according to the present invention is completely coupled and installed in the vehicle.
110
100
In order to contain trash in the trash collector which has been completely coupled and installed in the vehicle, the opening is widened at first and then the space of body is opened.
111
110
110
100
In this case, the leaf springs provided in the opening pass over a critical point, that is, a threshold point, to thus maintain a state where the opening has been bent, and to thereby maintain to open the space of the body .
300
110
Then, trash is deposited into the roll of vinyl bags through the opening .
300
140
140
Here, the trash has been contained in the roll of vinyl bags through the shield wings , and hidden by the shield wings .
300
Accordingly, the trash is not exposed nor does an offensive odor leak from the trash collector for vehicles, that is, the roll of vinyl bags .
Therefore, passengers do not feel unpleasant feelings due to the trash during the time when the vehicle runs to a destination place.
300
120
100
Open the zipper which is the opening and closing portion and thus open the space of the body .
300
100
Then, although it is not illustrated in the drawings, cut a portion of the roll of vinyl bags , using a cutter installed in the inside of the body .
300
300
Then, bind the cut portion of the roll of vinyl bags , in order to close both sides of the roll of vinyl bags , to then be thrown away into a waste bin.
120
100
Close or lock the zipper and close the opened space of the body .
Accordingly, a processing for trash that is neatly and cleanly ended.
Meanwhile, when the passengers arrive at a resting place or destination place, they should do the following operations to remove the trash-contained roll of vinyl bags .
The trash collector for vehicles according to this invention has the following effects.
Firstly, a plurality of leaf springs are installed on the opening of the body, and thus opening of the body can be kept continuously by the elastic force of the leaf springs. Accordingly, trash can be conveniently thrown into the body of the trash collector for vehicles.
Secondly, collection and treatment of trash can be conveniently performed with a roll of vinyl bags in which a vinyl bag is consecutively supplied from the roll of vinyl bags. Accordingly, since trash can be treated as necessary, the internal hygiene of the vehicle remains clean.
Thirdly, shield wings are formed on the inside of the body, in order to shield the inner portion of the roll of the vinyl bags. Accordingly, an offensive odor due to the trash is reduced, and the trash is prevented from being exposed, to thus heighten user satisfaction. Furthermore, passengers as well as drivers can travel to the destination place in an agreeable environment.
Finally, a plurality of hanging rings are installed on the body, and an auxiliary coupling portion is provided on the hanging rings, respectively. Accordingly, the trash collector for vehicles according to the present invention can be simply hung on an internal structure of a vehicle.
The present invention is not limited to the above-described embodiments. It is apparent to one who has an ordinary skill in the art that there may be many modifications and variations within the same technical spirit of the invention.
BRIEF DESCRIPTION OF THE DRAWINGS
The above and/or other aspects of the present invention will become apparent and more readily appreciated from the following description of the exemplary embodiments, taken in conjunction with the accompanying drawings in which:
FIG. 1
is a perspective view showing a trash collector for vehicles according to a preferred embodiment of the present invention;
FIG. 2
is an exploded perspective view showing a trash collector for vehicles according to a preferred embodiment of the present invention;
FIG. 3
is a cross-sectional view showing a trash collector for vehicles according to a preferred embodiment of the present invention;
FIG. 4
is a rear view showing a trash collector for vehicles according to a preferred embodiment of the present invention;
FIG. 5
is a perspective view showing an auxiliary coupling portion which is detachably coupled with a trash collector for vehicles according to a preferred embodiment of the present invention; and
FIG. 6
is a side view showing a trash collector for vehicles according to a preferred embodiment of the present invention is installed on a seat in a vehicle. | |
When we move to a new place, it naturally takes us a while to settle into a routine, to discover what is going to stoke our passion, and to get comfortable with our “selves” in the new environment. I think sometimes it takes me longer than others, since I work such long hours and in the privacy of our home; it’s hard to get out and about meeting people as often as I’d like and still “bring home the tortillas,” so to speak. One thing I’ve discovered over the past five years is how much diversity there is here in southern Sinaloa, and how much I enjoy its rich traditions, bio-diversity, and friendly people. I absolutely loved attending the frasca, the harvest of fresh shrimp in Agua Verde. I thank goodness we have marine biologists here in town who can take us up close and personal to whales and dolphins while being respectful and mindful. I love meeting people who are good at what they do, and watching them glow as they tell me about it—whether it’s oyster diving, farming in Los Llanitos, open water swimming, giving food to the hungry, or selling meat.
Well, a few years ago I discovered kindred spirits online in Sandra Luz Moreno and Hector Lizárraga Vencis. While I didn’t know it at the beginning, they are the people behind Mazatlán Interactivo (MI), a portal that, over the years, I have grown to enjoy and depend on more and more. Through their articles I have learned so much about Mazatlán, the histories, celebrations and unique cultural offerings here and in our nearby towns, and they’ve enabled me to connect with some really interesting people. MI is an important part of my day. (It’s all in Spanish, btw.) While it has taken me a while to connect the dots—I first “met” Sandra via the SIFoto conference and later in groups on Facebook, and didn’t realize her connection to MI—she is kind and funny, and has made me feel welcome and valued in our adopted home. Yesterday she and Hector celebrated the 18th anniversary of their terrific Mazatlán Interactivo—18 years of unflaggingly promoting the diversity, authenticity, and sustainability of Sinaloa (particularly southern Sinaloa), with an anniversary party at the Convention Center. The party included the launch of an exciting new venture: Sinaloa Tour.
It was a wonderful event! We were greeted personally at the door by Sandra and Hector, as well as by beautiful, traditionally dressed folkloric dancers. After a welcome speech, there were introductions by several of the municipios in southern Sinaloa. We very much enjoyed the presentation by Marcos Osuna, of El Quelite/El Mesón de los Laureanos fame. You no doubt know him and have enjoyed the terrific experience his restaurant provides. We take most all our visitors up that way for an enjoyable day trip. I know Marcos because he helped Danny with his quest to get to World Scout Jamboree. For decades he has been an incredible leader and visionary for El Quelite, working tirelessly for education, for the welfare of the local people, and to promote tourism to the town. While he spoke a bit long for my taste, he is charming, very, very funny, and incredibly inspirational. He admonished everyone in the room (primarily tour providers, artists and crafters, restaurant and hotel owners, plus government leaders and media) to:
- constantly up their skills and to behave as professionally as possible,
- to learn cross-cultural communication in order to differentiate the needs and desires of a diverse (national and international) customer base, and, interestingly to me,
- to dedicate themselves to providing new experiences for tourists: experiences they can’t get at home, and
- not to compete on price, as people will pay even in down economic times if the experience is unique and memorable,
- to be honest and AUTHENTIC, reaching into local traditions, customs, flora and fauna, being proud of it, and translating it in an accessible way to our visitors.
The representatives from El Rosario showed us two very terrific, creative ways to learn introduce a place. First, the group Sófocles, directed by Fernando Barraza, acted out with much dramatic flair two legends of the town. What a talented group, and what a terrific way to introduce and communicate the soul of a place! They followed that with the presentation of a gorgeous dress, designed by Sergio Antonio García Peinado, that showed representations of the various locations and claims to fame of the municipality. No boring talking heads today!
Cosalá was also very enjoyably represented by Gregorio Corrales , who, wearing a large sombrero and a beautiful leather zarape, sang a few traditional songs and corridos of the region for us, to the accompaniment of folkloric dancers. The music got the best of most everyone in the room, as people in the audience as well as on stage paired off to dance.
We were pleased to be able to meet Maestro Faustino Lopez Osuna, composer of our state anthem, and enjoyed the storytelling of Joaquín López Hernández, who recounted some legendary lies from the book, “El Güilo Mentiras”, written by Escuinapan author Dámaso Murúa.
Sinaloa Tour is something I’ve been looking forward to. Right now it’s only in Spanish with GoogleTranslate in a pull-down menu, but the great thing is that they have put together a bunch of information on the small towns in southern Sinaloa, to make it easier for all of us to explore and get to know them! In addition to the public-service aspect of the site (a partnership with the state), there is a commercial tour side. And again, to me it’s exciting, as they are planning tours that highlight the diversity and rich tradition that Sinaloa has to offer: religious, nature and environmental, cultural, sports, gastronomy, and adventure tourism.
At the time of this writing, the site seems to still have its glitches and typos, as with most any new launch, but I am hopeful that it will become a resource to help all of us enjoy both our gorgeous Mazatlán and the surrounding areas more fully, in the process learning more about what has been here for hundreds of years before we set foot.
Hector and Sandra, and staff, congratulations and thank you! | https://vidamaz.com/2013/08/24/congratulations-to-friends-and-launch-of-a-great-new-resource/ |
Multiple choice questions: please select all that applies and explain your answer.
Question 1 (Autocorrelation). 时间序列代考
The autocorrelation plot of the daily time-series has local peaks at t=7,14,21,28 etc.. How would you interpret that?
A. The time-series reaches its maximum on the days 7,14,21,28...
B. The time-series reaches its minimum on the days 7,14,21,28...
C. The time-series is likely to have a periodic pattern with a period of 7 days
D. The time-series is likely to have 7 periods per day
E. The appropriate AR model for the time-series should have at least 7 terms.
Question 2 (Stationarity).
Which of the following time-series models are stationary:
A. Linear trend
B. AR(1) model
C. White noise
D. Random walk 时间序列代考
E. ARMA(1,2) model
F. ARIMA(1,1,1) model
Question 3 (PCA). 时间序列代考
Which of the following statements regarding the model dimensionality reduction through Principal Component Analysis (PCA) are true:
A. Leading principal components of the features are the most efficient for modeling the output variable.
B. Principal components of the standardized features are uncorrelated and this way less exposed to multicollinearity.
C. The model using principal components of the features can't overfit.
D. Feature selection based on the principal components of the features is often more efficient in preventing overfitting comparered the feature selection over the original features.
E. Principal components are harder to interpret compared to the original features making the PCA regresssion model less interpretable compared to the regression model using original features. 时间序列代考
Question 4 (MapReduce).
What is true about MapReduce:
A. MapReduce is a Python module enabling parallel computing
B. Using MapReduce approach makes the code more suitable for parallel computing.
C. MapReduce code always runs faster compared to the code using more traditional approaches, like loops or list comprehensions.
D. MapReduce code will always efficiently run on multiple cores of you CPU or multiple machines within your cluster if available.
E. Multiprocessing and PySpark efficient alternatives to MapReduce. 时间序列代考
Practice part: Taxi ridership from JFK to other taxi zones prediction. 时间序列代考
This project is an example of applying PCA to predict hourly yellow taxi ridership at the taxi zone level. Modeling taxi ridership at a fine spatial and temporal granularity is challenging due to the low signal-to-noise ratio and high dimensionality. In this case, dimension reduction is essential in feature engineering. This project has five steps: data downloading, data preprocessing, baseline modeling, feature engineering, and RandomForest modeling.
Let's start with data downloading.
1. Data downloading (5pts)
Design a function to download yellow taxi data from 2017-01-01 to 2018-12-31 at https://www1.nyc.gov/site/tlc/about/tlc-trip-record-data.page.
2. Data Preprocessing (10 pts, 7 for dask, 3 for sanity check) 时间序列代考
Use dask to aggregate all months' records into one dataframe, and aggregate dataset by date and hour to get the ridership from JFK to each taxi zone each hour. The expected output has columns: date, hour, drop-off location 1, drop-off location 2, etc.
Hint:
- JFK taxi zone id is 132.
- time column should be the pickup time, and ridership is passenger count.
- Try read_csv("*.csv") to read all csv file in a folder
- files in 2017 and 2018 have different columns; apply argument usecols to select desired columns.
- using .compute() function to convert processed dask dataframe to pandas dataframe for further modeling.
2.1 Data loading
2.2 Sanity check 时间序列代考
Then, we need to do some basic sanity checks. It is possible that in a particular hour, there were no yellow taxis dispatched from JFK. Check if each day has 24-hour records and add missing records to the dataframe. The final output should have 17520 rows (365×2×24)
3. Time-series exploratory analysis
Apply exploratory analysis over the daily aggregated dataset at first.
3.1 aggregate the ridership from each dropoff location and sum it to get daily records. (3pts) 时间序列代考
3.2 Period detection and report the strongest period length on the 2017 data. (3pts)
Hint: using periodogram or acf plot.
3.3 Trend, seasonality, noise decomposition (using additive model) on 2017 data, period is from question 3.2 (3 pts)
4. Predict the total daily ridership from JFK using ARIMA. 时间序列代考
ARIMA is a common method to predict taxi ridership. Before we predict taxi zone level hourly ridership, let's try to predict the aggregated daily ridership using ARIMA.
4.1 Using adfuller test to test the stability of the aggregated dataset. If not stable, apply differencing method until the p-value from adfuller test is smaller than 0.05. (3pts)
4.2 Find out proper AR and MA terms in an ARIMA model using pacf and acf plots. (4 pts, 2 for each plot)
Hint: positive autocorrelation is usually best treated by adding an AR term to the model and negative autocorrelation is usually best treated by adding an MA term. In general, differencing reduces positive autocorrelation and may even cause a switch from positive to negative autocorrelation.
Identifying the numbers of AR and MA terms: 时间序列代考
- if the pacf plot shows a sharp cutoff and/or the lag-1 autocorrelation is positive then consider adding one or more AR terms to the model. The lag beyond which the PACF cuts off is the indicated number of AR terms.
- if the acf plot displays a sharp cutoff and/or the lag-1 autocorrelation is negative then consider adding an MA term to the model. The lag beyond which the ACF cuts off is the indicated number of MA terms.
- It is generally advisable to stick to models in which at least one of AR and MA term is no larger than 1, i.e., do not try to fit a model such as ARIMA(2,1,2).
4.3 build an ARIMA model using terms from 4.2, training on the first 700 days, forecast on the last 31 days. Print ARIMA model results and plot in-sample and out-of-sample prediction in different colors. (8 pts, 3 for correct terms, 3 for training and summary, 2pts for the plot)
Taxi zone level prediction 时间序列代考
This project aims to predict hourly yellow taxi ridership volume from JFK to each taxi zone. The ARIMA experiment in section 3 forecasts the total ridership amount from JFK. However, based on the reported R2, this model is not a good fit. ARIMA model has four main shortcomings: 1) they rely heavily on stationarity assumption which does not hold in real-world traffic systems 2) they do not consider spatial and structural dependencies that traffic networks exhibit and forecast each sensor as an individual time series 3) they are unable to model non-linear temporal dynamics 4) they suffer from the curse of dimensionality. Due to the limitation of ARIMA, we need to apply another method to predict taxi zone level ridership. 时间序列代考
5. Feature engineering
Our workflow is first standardizing the dataset, then using PCA to compress the dataset. As we predict future ridership, PCA should be learned from historical data (2017) then apply to the following year (2018). Next, add lag features (PCA components) from the past 12 hours and apply a Random Forest regressor to predict each PCA component's values in the next hour. After we had the PCA component prediction, inverse PCA, and inverse standardization to retrieve taxi ridership prediction in its original scale and dimension, in other words, we are predicting the PCA components instead of taxi zone level ridership and then using the inverse PCA method to reconstruct 时间序列代考
5.1. standardization. (3 pts)
The standardscaler stores information of this standardization process, including the mean and standard deviation values required when converting the prediction back to the raw scale. Split the whole dataset into two parts: 2017 and 2018, standardize each separately.
5.2. PCA 时间序列代考
5.2.1 train PCA on 2017 data. Let's arbitrarily set PCA components as 5, and gamma is None, try kernel ‘linear’, ‘poly’, ‘rbf’, and ‘sigmoid’. Select the transformer which has the lowest mean squared error in data reconstruction (inverse transform). (5 pts)
5.2.2 Apply the selected transformer from 4.2.1 to the standardized 2018 dataset and report the mean squared error between the standardized data and reconstructed data. Hint: fit the PCA on 2017 data and apply it to transform 2018 data.(5pts)
5.3 Add lag (5pts)
add 12 lags of each component from 5.2.2 (compressed 2018 data only). The expected output should have 65 dimensions. In the further modeling step, we will apply the 60 lag variables to predict the 5 components. 时间序列代考
6. RandomForest modeling (23pts)
We aim at predicting compressed daily ridership (5 PCA components values) from 12-hour lag variables. Parameter tuning is required in this section, including min_samples_split, min_samples_leaf, and n_estimators. First 80% days for training, test on the rest 20%. And in the training dataset, validate the model on the bottom 20%.
Extra credit:
Using grid_search function in sklearn instead of a for-loop when tuning parameters in a RandomForest. The train, validation, and test datasets should be split in the same way as described above. Hint: To fix train and validation in a grid search, you might need the PredefinedSplit function from sklearn.
6.1 train test split (3pts) 时间序列代考
Please keep in mind that random train test split is not applicable in this case.
6.2 parameter tuning (10pts)
Please search the best parameter set in the following range: min_samples_split: 2 to 10, min_samples_leaf: 2 to 10, and n_estimators equal to 50. | https://paperdaixie.com/%E6%97%B6%E9%97%B4%E5%BA%8F%E5%88%97%E4%BB%A3%E8%80%83/ |
Q:
What is the value of $a^2+b^2$?
If the range of the function $$f(x)=\frac{x^2+ax+b}{x^2+2x+3}$$ is
$[-5,4]$ then what is the value of $a^2+b^2$ ?
[$a,b$ are natural numbers]
What will the correct approach to this problem?
I tried using the general method as follows:
$({x^2+2x+3})y={x^2+ax+b}$
or,$x^2(y-1)+x(2y-a)+(b-3y)=0$
Then since $x$ is real the discriminant should be greater than equal to 0.
But this method isn't very efficient and quick for this problem.Any shortcuts possible?
A:
Both the quadratic equations
$$
f(x)=-5
$$
and
$$
f(x)=4
$$
must have double roots. If these equations have no roots, then the corresponding value is not in the range. But if either has two roots, then in between them the function will go outside the prescribed range.
So the discriminants $\Delta_1$ of both $(x^2+ax+b)+5(x^2+2x+3)$ and
$\Delta_2$ of $(x^2+ax+b)-4(x^2+2x+3)$ must both vanish. In other words
$$
\begin{aligned}
0&=\Delta_1=a^2+20a-260-24b,\\
0&=\Delta_2=a^2-16a-80+12b.
\end{aligned}
$$
This system is easy to solve. There are two solutions $(a,b)=(-10,-15)$ and
$(a,b)=(14,9)$.
| |
Everything in the environment, whether naturally occurring or man-made, is composed of chemicals, and research of chemicals has led to the discovery and development of new and improved paints, medicines, cosmetics, electronic components, and thousands of other products.
BRANCH OUT
Chemical engineers design and develop chemically based products such as rubber, plastic, soaps, and gasoline. They also test these products to make sure they are safe for consumers and the environment.
GET FOCUSED
This Investigation is designed to help you to answer the following Focus Question:
- In a chemical reaction, what is the relationship between the amount of reactants and the amount of products?
Note: This question is located in your SDR at the beginning and end of the Investigation.
GO DEEPER
As a class, read the Background(s) in the Investigation. When finished, discuss the following concepts as a class:
- Chemical reactions usually have two or more chemicals called reactants that are different from one another.
- The reactants interact during the chemical reaction to form one or more products.
- Products are substances that are different from the reactants and from each other.
- All chemical reactions can be written as equations that are like sentences.
- The reactant and product formulas are like words in a sentence.
- In an equation, the reactants and products are separated by an arrow, which represents the word “yield.”
- Sometimes chemical reactions produce heat.
- A calorimeter is a device that prevents the heat of a reaction from being lost to the surroundings.
LEARN THE LabLearner LINGO
The following list includes Key Terms that are introduced in the Investigation Background(s). They should be used, as appropriate, by teachers and students during everyday classroom discourse.
- chemical reaction
- reactant
- product
- formula
- chemical equation
- yield
- calorimeter
Note: Definitions to these terms can be found on the Introduction page to the CELL.
SET FOR SUCCESS
- The following chemical equation is a chemical “sentence” that uses chemical “words” to describe what occurs during the reaction.
- In a chemical reaction, chemical bonds between atoms are broken and reformed converting reactant chemical compounds into product chemical compounds.
- In breaking and reforming chemical bonds, energy in the form of heat can be released or consumed in a chemical reaction. Consider the following examples to illustrate this concept.
- When “ice melt” or calcium chloride (CaCl2) is spread on icy roads in the winter, the ice melts due to the release of heat. The solid calcium chloride (CaCl2) gradually dissolves releasing heat energy as bonds are formed between the calcium (Ca), the chloride (Cl), and the water molecules.
- Chemical cold packs contain solid ammonium nitrate (NH4NO3) and water in separate bags. When the inner bag of water is broken by squeezing, the solid and the water come in contact. The formation of bonds between the ammonium (NH4), nitrate (NO3), and the water molecules requires that heat is absorbed by the reaction. The cold pack feels cold to the touch because heat leaves our hand and is absorbed by the reaction.
- Can you predict the answers to the following questions?
- What happens to the reacting chemicals in a chemical reaction?
- What is produced in a chemical reaction?
- How do you know that a chemical reaction has occurred?
- Play the video below. Remember to follow along with your SDR and make any notes that you think might be helpful in the lab.
- After the video, divide into your lab group to discuss strategy for the lab. For example, you may assign certain group members to perform specific functions during the lab.
Note: The purpose of the video is to allow you to anticipate the laboratory experience you will soon encounter. You should leave this PreLab session with a firm idea of what to expect and how to perform in the lab.
Note: Homework is posted below the video.
HOMEWORK
Be sure that you review the Investigation and video in preparation for the Lab. | https://s.lablearneronline.com/student-portal/middle-school-s/chem-s/chem1-s/chem1-prelab-s/ |
County to Test Emergency Alert System
Centre County will conduct a test of the CodeRED emergency alert system at 10 a.m. on Wednesday.
The alert will be sent to all voice and text phone numbers and email addresses registered to receive the notifications countywide, according to Centre Region Emergency Management Coordinator Shawn Kaufmann.
Centre County has subscribed to emergency communications network OnSolve's CodeRED mass notification system since 2003. Today, 59,448 phone numbers, 2,888 for text messages, 2,139 emails and 17 telecommunications devices for the deaf (TDD) are registered in the system, Kaufmann said.
For cell phone voice calls or text messages, as well as emails, however, users must opt-in by registering online.
Wednesday's test call should come from 1-866-419-5000, Kaufmann said.
In the past two years, alerts have been sent five times. Over the years, notifications have been sent for evacuations and shelter-in-place messages, local missing children (Amber Alerts are used for statewide alerts), and criminal activity posing a potential danger. Kaufmann said the alerts can be used for any emergency situation that may impact the public.
The emergency official in charge of an incident or disaster decides when an alert is sent. Chiefs of police and emergency management coordinators are the primary users, according to Kaufmann.
In January, State College did not utilize the system when an assailant fled P.J. Harrigan's after fatally shooting two people and critically wounding another. He was found a short time later at a Tussey Lane residence, where he broke in and killed a resident before killing himself. State College Police Chief John Gardner said in January that by the time the necessary immediate response was conducted and information gathered, the suspect had already been found and there had been no time to issue an alert.
"The system is used when the person in charge of the incident determines that in can be a benefit to the incident or the public," Kaufmann said on Tuesday. "In the case of a fast moving incident which the person in charge is attempting to gather information about the incident while the incident is ongoing, sometimes the incident is stabilized before an emergency alert is attempted."
Penn State has its own PSUAlert system which can be used during emergencies on or near campus and for other matters like class cancelations due to weather. The university, about 2 miles from P.J. Harrigan's but with off-campus students living closer, also did not use its alert system during the January shooting.
During localized emergencies, a polygon is drawn around the impacted area on a map in the CodeRED system and a notification is sent to all numbers registered in that area. It also will go to any CodeRED mobile app users who are in the area where the alert is being issued.
"In addition to signing up for the CodeRED system [online], we encourage Centre County residents and visitors to use the CodeRED Mobile Alert App," Kaufmann said. "The app will provide the user the ability to receive alerts in any area using CodeRED."
Anyone without access to the Internet who wants to enroll their phone number in CodeRED can contact the Centre County Emergency Communications administration office at call at (814) 355-6800.
Geoff Rushton is managing editor for StateCollege.com. Contact him at [email protected] or find him on Twitter at @geoffrushton. | http://www.statecollege.com/news/local-news/county-to-test-emergency-alert-system,1480127/ |
Happy Mid-August, friends! Or as my fellow procrastinating capsule-ers may call it, "Fall Wardrobe Planning Time." Better late than never, right!?
Ordinarily I'd spend half my planning time digging through last Fall/Winter's garments - seeing what still fits, what's still in good condition, and what still excites me. I'd set those to one side, and stuff the rest in a Goodwill-destined bag. But that's not the case this year.
Last year was a LOT of change. New home, 6 months of living in limbo between houses, new schools, new new new. And rather than sewing for practical purposes (filling my closet with well-fitting, versatile pieces I love to wear) - I opted to sew for stress relief. Miss "sew-to-a-plan" slid fast and far into "OOOOH that's a pretty fabric!!' sewing territory.
I have zero regrets - it's what I needed at the time, and It was a fun break to see sewing from the eyes of an artist vs those of a wardrobe architect. But nevertheless it means I'm stuck with a wardrobe full of printed garments and hardly any coordinates to wear them with.
So today (well, last night) I vowed to get back on the wagon. I'll of course reuse as much as I can from what I've already invested time and materials in making (it'd be super wasteful not to!). But for the most part - I know I'll be starting over.
Here's what I've done so far - sharing for those of you considering your own over-haul, or starting your own capsule wardrobe for the first time.
Step 1: Consult my Color Palette
Remember this fun project?? With the help of Seamwork's tutorial and Adobe Color, I identified a whole host of colors that compliment my hair, skin, and eye colors. I'll use this as a guide to find 5ish colors for my new capsule: 3 neutrals, 2 color "pops."
I once again used Adobe Color, which has some magic formula for pulling pleasing color schemes from whatever image I upload. It has a variety of "moods" - so I can pick bright colors, or deep ones, muted or dark, you get the idea.
I doubt I could really go wrong with any of these - even the wild colors can contribute in small, balanced ways like jewelry or trims or accents in fabric prints. But for the sake of Fall, and my own aesthetic, I lean towards "Deep":
Step 2: Find Pantone Color Equivalents
Now, I know the above colors will flatter me. But I DON'T know that they'll be readily available. Navy and off-white obviously will, but the rest are very Becca-specific shades of blue, green, and red. Fabric stores are NOT consulting my color palette before ordering fabric, nor are the designers when conceptualizing them in the first place. But they ARE consulting (and inspiring) Pantone. Like it or not, the fabrics we have available to us are largely determined by the "Miranda Priestly" types of the world - a select few who tell an entire industry what is in and what is not.
By finding the pantone equivalents of my own color palette, I'll know those colors will be available in-store and that they will compliment one another. I used the 2018 collection (fingers crossed for longevity!) knowing both that the 2017 shades of these colors are more readily available, and that I won't know the difference. 😜
Step 3: Go Window (Errr- screen?) Shopping!
This should be pretty easy. I'm looking for (to way WAY over simplify things) champagne colors, navy/slate, medium blues, rich greens, and dark, earthy reds. I head over to Cali Fabrics where I can search by most recent additions, and find a whole bunch that strike my fancy. Some fit my plan better than others. I'll sift through the outliers when I know more what garments I want/need and what type of fabrics they require.
Why Cali Fabric? I've had a lot of success with their apparel fabrics, and work with them regularly to promote their stock on the Cali&Co blog. But if you're more of a Mood kind of person, they have already picked out their pantone colors for you, here. Either way, pinterest is a helpful place to collect all your "swatches" from a variety of companies if you so choose. It'll help you see how all your fabrics play off each other before you invest a single cent!
I hope this was a helpful visual of my inital planning process! Even if you don't subscribe to things like "personal color palettes" - I still recommend you find a palette you love to help focus your fabric shopping. Your wardrobe planning will feel like a lot of square-peg-round-hole (or is it the other way around?) if you piece your wardrobe fabrics together haphazardly.
You can find gorgeous color palettes at Design-Seeds - just know that there are hundreds to sift through. Pantone's collections are more limited, which may be easier for those of you who get easily overwhelmed:
One last thing to keep in mind: this process mostly applies to separates. If you find a GOTTA-HAVE-IT color or print that doesn't fit the rest of your plans, consider how you can incorporate it as a solo piece like a dress or romper. Shopping smart doesn't need to spoil all your fun. 😊
Good luck with your Fall planning! Let me know what questions you have below! | http://www.freenotion.com/blog/2017/8/15/fall-capsule-wardrobe-back-on-the-wagon |
Present Continues Tense
We use the present continuous tense to express an event that started a short time ago and is continuing to happen at the time we are talking about it (now).
Signal Words for Progressive Present
There are words when we find them in the sentence, we use the present continuous because these words indicate that the action continues at the time of speaking
now / at the moment / at present / today / look / listen / this week / month/ year
Sentence Formation
To put the verb in the present continuous tense: we put am -is -are before the verb to be converted, and add it at the end of the verb-ing
Am/is/are + + is the infinitive of the verb ing, and so the verb form is in the present tense.
Examples
- Sam is playing now. _ Listen, we are singing. _ Sara is drawing pictures today.
- Look,l am eating pasta. -- Sam is studying English this week
- They are playing football at the moment.
Note
(1)- Verbs whose infinitive ends in (a consonant and preceded by a vowel), before putting ing at the end of the verb we double (write it twice) the consonant at the end of the infinitive, for example, run-running / swim-swimming / hop-hopping / clap-clapping/cut-cutting (the vowels are a-e-i-o-u), the rest of the English letters are consonants.
(2) - Verbs whose infinitive ends with the letter e, when we add ing to its ending, we delete the letter e from the last, examples: bake-baking / make make-making / take-taking / ride-riding / write-writing / come - coming
Practice: // Correct the verb:
- Sam play football at the moment. (Sam…………………)
- Look, we clean the rooms . (we ……………………………..)
- Sara bake bread now. (Sara………………………………..)
- The boy swim in the sea now. (The boys………………..)
- Listen , He read in his room. ( He ……………………..)
To negate the sentence placed in the present continuous tense: we add the negative adverb not / n't after the verb am - is- are
Examples
- Sam is jumping - Sam is not / isn't jumping /
- l am studying – I'm not studying
- Sara is eating – Sara is not eating / We are walking – We aren't /are not walking
Practice: // Turn the positive verb into a negative one:
- We are working. (We …………………………………………..)
- She is washing. (She ………………………………………….)
- I am speaking. (I ………………………………………………)
- They are drawing. (They …………………………………………)
Continuous Tense
To form the question starting with Is: We use the following verbs at the beginning of the sentence meaning (Is) Am - Is - Are and the formation of the question is as follows
Am - Is -Are Is + + verb infinitive ( + subject ing ) ?
Examples:
Is Sam playing? -Yes, he is playing. No, he isn't playing
Are you swimming? / Yes, l am swimming - No, l am not swimming:
Practice: Complete the question:
- ....…..cooking? - Yes, l am cooking.
- …………………… writing? No, they aren't writing.
- ……………….… baking? Yes, Sara is baking.
- …………… Speaking? - No, we are not speaking.
To form a negative question in the present continuous tense, we use Aren't / Isn't at the beginning of the question in the sense of (not). The question structure is as follows:
Aren't / Isn't + Subject + Verb + ing ?
Example
Isn't Sara playing? Yes, she is playing / No . she isn't playing
Note that the present continuous tense can be used in the sense (I will do this), to indicate our intention to do something in the future, if we decided to do this thing before actually doing it,
Example
- l am traveling to California tomorrow.
- Sam is going to the cinema next Friday.
- He is not playing tennis tomorrow. | https://www.learnenglish3.com/2022/07/present-continues-tense.html |
The Oklahoma Medicaid prior authorization form is a document which is employed by a medical office in order to request Medicaid coverage for a drug which is not on the State’s Preferred Drug List (PDL). We have provided a downloadable PDF version of this form on this webpage. Medicaid in the State of Oklahoma is provided by Soonercare, which is funded jointly by the federal and state government. If you require more information regarding Medicaid prior authorization, call the University of Oklahoma College of Pharmacy Pharmacy Management Consultants Prior Authorization Department at the phone number provided below.
Fax – 1 (800) 224-4014
Phone – 1 (800) 522-0114 (ext. 4)
Preferred Drug List (PDL)
How to Write
Step 1 – Download the form and open it using either the Adobe Acrobat or the Microsoft Word program.
Step 2 – Start by providing the patient’s name, member ID number, and date of birth.
Step 3 – “Section I” should be completed by the pharmacist. If this is you, provide following information into the indicated fields of this section:
- Pharmacy name
- Pharmacy NPI, phone number, and fax number
- Medication name, strength, and regimen
- NDC number
- Fill date
- Prescriber name
- Prescriber NPI, phone, and fax number
The pharmacist’s signature and the date must be provided in the appropriate spaces once the form has been printed out.
Step 4 – “Section 2” must be completed by the Health Care Provider. If you are the appropriate person, fill in the following items:
- Diagnoisis
- Previous Tier-1 trials/OTC trails (include name, dose, length of therapy, and reason for failure)
Your signature and the date will need to be written once the form has been printed.
Step 5 – Print and sign the form.
Step 6 – Fax the completed form to the appropriate directory. | https://eforms.com/prior-authorization/medicaid/oklahoma/ |
Lady Wu Edit: This is now the official general information thread for SGYYS. It has two parts: Cao Zhi's "Posting Guidelines" and my FAQ.
Proper attention to the Forum Rules regarding spam, flames, and trolling will be scrupulously observed.
Use your heads and follow the same format in posting that you would in preparing a formal paper for a professor or teacher. Mistakes are fine and are to be expected from time to time. But a dilligent effort at using the shift key and proper punctuation will be expected. Proper use of spelling and grammar will hold you in a much higher stead than will 'chat room talk'. This is a mature forum, therefore your posts must also be mature. Any instances of 'chat-room talk' will be squashed without question.
Please post in the proper forum. Discussions on Koei games must be made in their own respective forums.
Before you post, please make an attempt to see if your topic already exists. This can be done with a brief search or with a glance into the Index of Common Threads. New users are also encouraged to browse through the first four or five pages of the Symposium and to reply to some topics in order to get a feel for what has already been posted and what is currently being discussed before they start new threads of their own.
When posting, please describe your topic as accurately as you can in the title.
When posting your topic, give a background. This is so that people will have a good idea of what it is you are speaking and it will provide insight as to what you want answered or discussed.
If you need assistance or have a question, feel free to ask. This thread exists for brief questions.
Enjoy yourselves while you are here. Learn some new things, and challenge your mind!
What are these abbreviations that people throw around?
RTK = Romance of the Three Kingdoms, a classic Chinese novel on which the Koei game series of the same name as well as the Dynasty Warrior series are based.
SGYY = Sanguo Yanyi, the Chinese name of the novel known as Romance of the Three Kingdoms.
SGZ = Sanguo Zhi, or, Records of the Three States (or Records of the Three Kingdoms), the official history of the Three Kingdoms era. It was compiled by Chen Shou (AD 233-297) of the Jin dynasty.
HHS = Hou Han Shu, or, History of the Later Han. Authored by Fan Ye (AD 398-445 ), it is the official historical record of the Eastern Han dynasty.
ZZTJ = Zi Zhi Tongjian, or, Comprehensive Mirror for Aid in Governing, penned by Sima Guang (1019-1086) of the Song dynasty.
LGZ = Luo Guanzhong, author of SGYY/RTK.
PSZ = Pei Songzhi (AD 372-451), who was commissioned to provide annotations and supplementary information to Chen Shou's SGZ. Pei quoted extensively from various sources, many of which are now lost.
SoSZ = Scholars of Shenzhou, the excellent forum where you are right now!
What on earth is Shenzhou?
Shen means "spirit, magic, godly", and zhou means "land". The term Shenzhou is used as an affectionate term meaning "China". Usage of this word dates back to as early as the Warring States Period (403-221BC).
Where can I find an English translation of the SGYY novel?
Where can I find an English translation of SGZ?
There isn't one (published, anyway), unfortunately. Empresses and Consorts contains the translation of all the SGZ biographies of, well, empresses and consorts of the Three Kingdoms era.
Various RTK enthusiasts have translated portrions of SGZ. Some of them can be found here. Check also the Links section of KMA. Note that these are all amateur translations and KMA does not vouch for their accuracy or completeness. When in doubt, contact the translator for clarification.
I can read (Classical) Chinese; where do I find online copies of those historical sources?
I want to help with translating SGZ. How easy would it be to do it using Altavista Babelfish?
You may want to drown yourself before attempting such a thing. Babelfish results of SGZ tend to be painfully nonsensical.
Not to sound snobbish, but in addition to being written in a form of Chinese that is no longer spoken, SGZ contains a good deal of textual problems. Pei Songzhi unfortunately did not provide very detailed notes on phrases with obscure meaning or ambiguity. I would recommend arming yourself with a good sense of Classical Chinese grammar and a dictionary that covers archaic terms before starting, and when possible consult Chinese scholarship on the subject. 盧弼's 三國志集解and 山東教育出版社's 三國志辭典 are very good books to have at hand (they may be found in larger universities), and I would also recommend looking at annotations and translations by 繆鉞 or 方北辰.
I heard that the way they pronounce the names in Dynasty Warriors is wrong. How do I find out the real way of pronouncing the Chinese names?
This thread has some good information in it; see Starscream's post on page 6 in particular. You may also post your own pronunciation questions there.
Why is everyone saying that so-and-so didn't exist?
If that character's name doesn't show up in known historical sources, it is generally agreed that we cannot take him/her to have existed. See this thread.
What is the difference between "novel" and "history"?
The novel SGYY has been claimed to be "7 parts fact, 3 parts fiction". Luo Guanzhong did not set out to write a history book, but rather a historical novel on everyone's favourite historical period, incorporating stories from legends and popular literature of his time. Unfortunately, many of everyone's favorite parts of the novel are not found in the historical records. These include Guan Yu's heroic exploits at the five Passes, most of the events surrounding the Battle of Chibi (the Battle of Chibi itself, though, is real), and almost everything in relation to Zhuge Liang's Southern Campaign. The novel also distorts the character of several officers for artistic effects, so don't be surprised when you see people say things like "Zhou Yu was not a jealous man in history". See this thread for more information.
Why is my thread being locked?
1. A similar discussion already exists—it would be more fun for everyone if you bring your opinion to that discussion. Feel free to revive old threads.
2. Your question is already answered in another thread, or can be easily answered in another thread.
3. The content of the post is inappropriate for this forum.
It's nothing personal (usually ).
How come the officers have so many different names? Whats' the deal with "Zhuge Liang" and "Kongming"? What on earth is a style name?
Traditionally, Chinese people have both a given name and a "style name", which is a name used by friends and peers to show respect or friendliness. In the case of the great Shu strategist/politician, "Zhuge" is his family name, "Liang" is his given name, and "Kongming" is his style. I have written a guide to names and naming conventions of the Three Kingdoms era; it can be found here. Suggestions and questions can be posted in that thread.
Re: Posting Guidelines and FAQ for SGYYS--Please read!
The threads "Chronicles of the Three Kingdoms" and "Chronicles of the Three Kingdoms 2" have been moved to the SGYYS Archives. | http://the-scholars.com/viewtopic.php?f=5&t=8943&p=524199&sid=71544b207e484c78ce61c8ec81c307d4 |
Synopsis: Since the dawn of medicine, doctors have believed that, once injured, the brain could not heal. Now they’ve learned that the brain can heal, and are beginning to tap ways to make it heal better and faster. Experts explain.
Host: Nancy Benson. Guests: Dr. Norman Doidge, Professor of Psychiatry, University of Toronto, Columbia University Center for Psychoanalytic Training and Research and author, The Brain’s Way of Healing: Remarkable Discoveries and Recoveries From the Frontiers of Neuroplasticity; Dr. Edward Taub, Professor of Psychiatry, University of Alabama, Birmingham and Director, UAB Taub Training Clinic
Link for more information:
NEUROPLASTICITY
Nancy Benson: For thousands and thousands of years, the brain was considered sort of a “black box” by the age’s learned men. How the brain works was a mystery, and so they came to a lot of wrong conclusions. For example, doctors had always believed that when part of the brain was damaged, it would never heal, and the function associated with that part of the brain would be completely lost.
Norman Doige: For the longest time, scientists thought of the brain as though it were a machine with parts, and each part performs a single mental function in a single location in the brain. They started to think of the brain as an electrical machine with hardwired circuits. So, like your computer, the circuitry in the computer is not changing once you get it. They thought the brain was like hardware, if you will. And the only change that hardware undergoes is degeneration with use over time. But the brain is not inanimate like a machine. It’s animate, and just as when you use your muscles, or, you know, your other tissues, they change. So to does the brain within certain design parameters alter in a very dynamic way.
Nancy Benson: That’s Dr. Norman Doige, Professor of Psychiatry at the University of Toronto and the Columbia University Center for Psychoanalytic Training and Research. He’s also the author of the new book The Brain’s Way Of Healing, Remarkable Discoveries And Recoveries From The Frontiers Of Neuroplasticity.
Norman Doige: Neuroplasticity is that property of the brain that allows it to change its structure and function in response to mental activity or experience. So, that means change at many levels, but particularly at the level of the connections between the neurons of the nerve cells in the brain. They’re not, as was thought, hardwired. They’re constantly forming, unforming and rechanging in response to what we do. The kinds of change I’m describing are most akin to the slow incremental changes that occur when you learn a language or a musical instrument or something like that. You have to stick to it and do it every single day, or very frequently, and you slowly find that you can just grow by leaps and bounds. But only slowly and over time.
Nancy Benson: Neuroplasticity is a concept that shows promise for the treatment of many brain diseases. If we can get the brain to change, there’s the potential to treat Parkinson’s disease, multiple sclerosis, attention deficit disorders, and even stroke, from which patients are often given virtually no hope of recovery.
Edward Taub: They are typically told that one year after stroke, they are not going to improve, no matter what therapy is administered, whatever they have at one year, that’s it for the rest of their life. That is completely false. We’ve worked with people who are as much as 50 years post stroke.
Nancy Benson: That’s behavioral neuroscientist Dr. Edward Taub, Professor of Psychiatry at the University of Alabama, Birmingham, and Director of the Taub Training Clinic.
Edward Taub: One gentleman I recall had a stroke when he was five years old, and we treated him when he was fifty-five, and he had just as good a response to the treatment as a sixteen year old. We routinely work with people in their eighties. We’ve worked with some people in their nineties. There is a persisting plasticity in the nervous system that continues throughout the lifespan, so that we have as good a result with a eighty-five year old individual as we do with a two year old.
Nancy Benson: Taub is the developer of a technique for stroke victims called Constraint-Induced Movement therapy, or CI Therapy, which takes advantage of neuroplastic principles. For example, if a stroke has affected a person’s arm, the patient could learn to use it again by being restricted in the use of his good arm.
Edward Taub: We restrain the good arm with a padded mitt so the person can’t use the hand of the good arm. And this forces the person to use the impaired arm. The average patient started at about nine percent of the use of their more affected arm in the life situation compared to before stroke, and at the end of two weeks of treatment, they were at fifty two percent of the amount of use of the more affected arm in the life situation compared to before stroke. And that’s a five times improvement.
Nancy Benson: CI Therapy is grueling work, about three hours a day, but taub says an experienced clinician can tell what a patient is capable of doing.
Edward Taub: We have the patients push it but only a little bit. Push it up to the point that the nervous system is capable of supporting it, and no more.
Nancy Benson: The real test, however, is when the patient returns home. Taub supplies all his patients with what he calls a transfer package, a series of exercises to be done at home.
Edward Taub: If the person isn’t using the arm, say, to brush their teeth, and the therapist knows that the patient can do it, and the patient has agreed to try to do it the therapist will, what we call, problem solve with the patient, to enable them to do it.
Nancy Benson: The key to CI Therapy is consistent daily practice, not just in the clinic, but especially at home.
Edward Taub: The patient becomes the critical factor in enabling his own improvement. Typically the people are very highly motivated because the thing in the world that they want almost more than anything usually is to regain the function that they once had.
Nancy Benson: Unfortunately, if a person is told right off the bat that they’ll never regain the ability to talk or move their arm again, it can become a self-fulfilling prophesy.
Edward Taub: But if the person is told that they can improve and given hope where there was no hope before and then they are made to engage in this whole therapeutic process, which does lead to rapid improvement, so that day by day, or at least every second or third day, they can see substantial improvement having occurred, that is very rewarding and adds to their motivation to keep at this regimen.
Nancy Benson: The field of neuroplasticity is fairly new, so researchers don’t know the limits of rehabilitation. Many scientists around the world are excited about the remarkable discoveries and potential recoveries now that we know the brain can heal itself, too. You can learn more about today’s guests and find a link to the book The Brain’s Way Of Healing, which describes Taub’s and other researchers’ work, by visiting our website, radiohealthjournal dot net. You can always find our shows on iTunes and Stitcher. Our writer/producer this week is Polly Hansen.
Our production directors are Sean Waldron. I’m Nancy Benson. | https://radiohealthjournal.net/2015/04/26/15-17-story-2-neuroplasticity/?shared=email&msg=fail |
Inspired by classical leather & cloth bound English novels, I paper-cut a book cover design for Romeo & Juliet by hand, referencing the styles of old. The concept was to create a decorative and desirable object that people would want to have on their bookshelf as a luxury item.
The project was originally designed as part of a commission for a Dutch publishing-house, and was supposed to be used as a proposal of a book-cover design for their new Young-Adult ‘Classics’ range.
The cover suggests to elements within the story and gives reference to symbolic objects hidden amongst the decorative branches.
When you look closely, you can see the 2 family crests, the sun & moon, a pair of wine glasses, a venetian mask, grapes, the shape of a love-heart, a religious cross, a dagger, a bottle of poison… and of course the famous balcony.
The intricate design is drawn and cut entirely by hand, and all elements are connected as one single sheet of paper.
See pictures below for the “Making-of” : | https://annemariekekloosterhof.com/portfolio/romeo-juliet-papercut-bookcover/ |
Look at a mangrove and it’s clear that it is unlike any other forest type. Roots rise above ground in looping, arching shapes—an adaptation to the low-oxygen soils of subtropical coastal areas. But other aspects of these forests are less obvious, starting with their importance for storing carbon dioxide and keeping it out of the atmosphere.
Research has shown that mangroves account for only 3 percent of global forest cover. However, they happen to be the most carbon-rich type of forest in the tropics. This means that mangrove loss can have a large effect; up to 10 percent of global carbon emissions from deforestation has been attributed to mangroves. (When trees are harvested and die, whether they are burned or eventually rot, their stored carbon is released to the atmosphere.) Because of their importance to the carbon cycle and climate, researchers have been investigating the structure of these forests from the ground, air, and space.
The maps above are the result of one such effort, which uses satellite radar data to model the height of mangrove canopies in Africa. This map, based on a model developed by SeungKuk Lee of NASA’s Goddard Space Flight Center, shows tree canopy heights for 2015 in the vicinity of the Akanda and Pongara national parks in Gabon. The parks span 540 and 929 square kilometers, respectively, and together account for 25 percent of Africa’s protected mangrove area.
Dark greens represent areas where mangrove trees are the tallest. The darkest greens appear in Pongara National Park, where trees tower up to 60 meters (200 feet) in places—some of the tallest mangroves in the world.
Information on the height of mangrove canopies can help scientists estimate things like the total amount of biomass in a forest. That information, in turn, can be used to get more precise estimates of how much carbon is locked up in a mangrove, and how land cover changes are affecting where that carbon ends up.
But mangrove forests are not the same everywhere. Forests across Africa and around the world contain mangroves of various species and structures, with various capacities for storing carbon. Air- and ground-based data are important for helping researchers estimate total mangrove ecosystem carbon stocks in Gabon and around the planet.
NASA Earth Observatory maps by Joshua Stevens, using canopy height data courtesy of SeungKuk Lee/NASA GSFC/NASA Carbon Monitoring Systems. Story by Kathryn Hansen. | https://earthobservatory.nasa.gov/images/90251/gabons-towering-mangroves |
In the majority of the countries with a high level of agricultural development, the feeding of dairy calves is based on artificial rearing. The availability of milk substitutes based on by-products from the dairy industry has stimulated artificial rearing. This is not so in developing countries where there is a lack of fresh milk. In this case, artificial rearing must be based on fresh milk. Thus it is not logical to milk by hand or machine and later give part of the milk to the calf. It is better to make use of the calf's ability to extract milk from the cow.
Traditional rearing of dairy calves is characterized by the presence of the calf with the cow during milking to stimulate milk let-down and it stays with her after milking to consume the milk remaining in the udder. The time the cow is with the calf varies between 1 and 12 hours and is inversely related to the age of the calf. Age at weaning is rarely less than 6 months.
However, in dual purpose herds, natural (traditional) rearing does not efficient use of the cows' potential for the production of milk for the market. Hence, a variant of natural rearing was developed, called restricted suckling, characterized by the reduction in the time the calf remains with the cow each day, which is that strictly necessary for suckling, and in the age at weaning onto other feeds. This allows a greater economic effectiveness since:
RESULTS OF RESTRICTED SUCKLING
Residual milk
15% of the milk in the udder at the start of milking remains at the end as residual milk, containing 3 times more fat content than normal milk (Lane et al., 1970).
The amount of residual milk has been correlated to total milk and with the interval between milkings. It varies throughout the lactation from 9.1 and 23.5% of total production in the first and tenth months of lactation respectively (Marx, 1971). Only small amounts of residual milk have been found in the udder of cows after the calves have suckled (1.2 – 3.4%), always less than in hand or machine milked cows (Kreilis et al., 1971).
Considering that the rate of milk secretion is more intense immediately after milking and that the amount of residual milk remains relatively constant, it is expected that, by delaying the suckling time, this recently secreted milk would also be consumed by the calf, with a possible reduction in the amount of milk to be obtained in the following milking. Milk consumption rose from 3.8 to 5.2 litres on increasing this interval from 20 min to 2 hours while production obtained at milking was reduced from 13.9 to 12.4 litres for a total production of 17.6 litres. By this method, the producer may obtain a certain amount of milk for the calf without affecting the total production of the cow.
The frequency of sucklings also affects the destination of milk produced. Thus, comparing suckling once or twice a day, Ugarte and Preston (1972) found that milk consumption did not differ between maternal breeds but was 50% greater for twice a day, while total production (milking and calf consumption) remained equal (Table 1). In the experimental cows, the decrease in milk production during the milking of Holstein cows suckling calves twice and once a day was 3.5 and 0.4 litres respectively, while in the F1 (Holstein x Zebu) it was of 3.6 and 1.2 litres. Suckling once or twice are equally effective methods of taking the maximum advantage of milk production in cows of this potential.
|Litres of milk daily|
|At milking||Consumed by calf||Total||Daily gain kg.|
|Once daily x 60 m.||7.2||5.4||12.6||0.72|
|Twice daily x 30 m.||4.5||8.1||12.6||0.94|
|Control||8.0||-||8.0||0.54|
A satisfactory variant was the combination of different numbers of sucklings (Ugarte and Preston, 1973) (Table 2). On reducing it from two to one from the fourth week of age to weaning (10 weeks), milk consumption was reduced by 54% (3 litres per day), as was the daily gain of the calf, although this was acceptable (478 g/day) and resulted in an average of 535 grams over the whole period 7 – 70 days. The production obtained at milking increased by 4.2 litres (31%), while the cumulative total to weaning was similar to the control (without calves) and total production was 28% higher.
|Milk yield (litres) 1–70 days|
|SUCKLING TREATMENT||1–28 days||29–70 days||1–70 days|
|Milking||To calf||TOTAL||Milking||To calf||TOTAL||Milking||To calf||TOTAL|
|2x daily to 70 days||9.8||5.8||15.6||9.0||6.8||15.8||9.3||6.4||15.7|
|2x daily to 28 days and lx from 29–70 days||9.4||5.6||15.0||13.4||2.6||16.0||11.8||3.8||15.6|
|CONTROL||12.6||-||12.6||11.5||-||11.5||11.9||-||11.9|
|Milk yield (litres) 71–112 days by milking|
|2x daily to 70||11.8|
|days|
|2x daily to 28|
|days and 1x from||12.9|
|29–70 days|
|CONTROL||10.0|
|Daily gain of calves (kg)|
|1–28||29–70||1–70||70–154|
|2 x daily to 70||0.735||0.954||0.865||0.705|
|days|
|2 x daily to 28|
|days and lx daily from||0.624||0.478||0.535||0.718|
|29–70 days|
It should be noted that the intervals between milkings were 15 and 9 hours and that restricted suckling took place after the milking with the shortest interval (afternoon), when the cows produced less milk. To increase consumption by the calf, suckling should take place in the morning, since differences of 0.8 and 1.0 litres were found on suckling the calves in the morning, compared to the afternoon, with intervals between milkings of 15:9 and 16:8 hours (Table 3).
|At milking||Calf||Total|
|Morning||Afternoon||Total||Consumption|
|Experiment 1|
|Morning||7.71||2.40||10.11||4.40||14.54|
|Afternoon||5.94||6.75||12.69||3.59||16.21|
|Experiment 2|
|Morning||12.87||4.28||17.15||2.98||20.18|
|Afternoon||11.06||7.15||18.21||1.99||20.23|
Age at weaning
This has usually ranged between 4 and 8 weeks. However, in systems of natural rearing, weaning ages have generally been high since it is not common practice to use sufficient amounts of concentrates. The calf must receive milk in the early stages to avoid seriously reducing performance.
When calves suckling once a day were weaned at 35, 56 and 70 days, no significant differences were observed in weight at weaning and at 154 days (Ugarte, 1977) (Table 4). On the other hand, total milk consumption increased with age at weaning. Total production (milking + consumption) over the period 7–70 days was apparently not affected by age at weaning. As particularly careful management is needed when calves are weaned at 35 days, 56 day weaning is recommended.
|Period||Weaning age, days|
|35||56||70|
|Milk consumed (litres)||48||135||241|
|Net milk (litres)||1,210||1,242||1,088|
|Total milk (litres)||1,258||1,377||1,329|
|Liveweight gain of calves (kg)|
|7 – 70 days||0.23||0.18||0.31|
|71 – 154 days||0.80||0.85||0.67|
|7 – 154 days||0.56||0.57||0.52|
Milk production throughout lactation
A study carried out by Ugarte and Preston (1975) with 60 cows and calves suckling twice a day and an equal number without calves showed that from weaning (70 days) until cows were dried off, milk production did not differ significantly between treatments (6.1 and 5.7 litres per day, respectively). Lactation length did not differ either and total daily production throughout the lactation of cows suckling calves (milking + consumption) was 8.28 litres, while in cows without calves it was 7.35 litres (Table 5).
|No. of animals||First 10 weeks||From 10 weeks to drying off||Total||Lactation length days|
|Milk-ing||To calf||Total|
|Restricted suckling||57||6.2||6.9||13.1||6.1||8.3||262|
|Control||58||10.7||-||10.7||5.7||7.4||258|
|SE±||0.4||-||0.3||0.2||0.2||8|
These results agree with those obtained at a commercial level (with 97,678 cows milked twice a day for one year (Ugarte, 1977)). Daily milk production during milking was higher without the calf but, since about 332 litres were consumed by the calf, the F1 and F2 cows in restricted suckling produced 1.3% and 9% more milk in total (Table 6).
|BREED||COWS|
|Without Calf||With calf (restricted suckling)|
|no.||litres/d||no.||litres/d|
|F1 (50% H × 50% Z)||26902||5.91||54165||4.74|
|F2 (75% H × 25% Z)||9194||6.49||7417||5.73|
|Total||39096||6.05||61582||4.85|
Mastitis
A study of 61 herds in tropical areas revealed that the incidence of mastitis represents 12.6% of milking cows (Fustes et al., 1985). A lower incidence of clinical and subclinical mastitis was found during the suckling period. After weaning, no significant differences were found between rearing systems (Ugarte and Preston, 1975) (Table 7). This is due to several factors, such as the mechanical effect of suckling, the cleaning effect of the saliva and a more complete emptying of the udder.
|HERD 1 Quarters affected by clinical and subclinical mastitis during the first 10 weeks of lactation (number).|
|Cows||Clinical||Subclinical|
|Restricted suckling||36||5||14|
|Control||36||18||52|
Table 7 (continued).
|HERD 2 Quarters affected by clinical mastitis throughout the lactation %|
|Cows||Weeks after calving|
|1–10||11–20||21–30||31—drying|
|Restricted suckling||56||0.5||11||11||4|
|Control||58||2.0||14||11||4|
Reproduction
It is accepted that natural rearing produces long calving intervals and this has been more evident on increasing the age at weaning. However, when the animals are early weaned (70 days) these considerations are not valid.
This was confirmed in a population of F1 and F2 (Holstein x Zebu) cows, without calves or suckling calves until 90 days (Table 8). Intervals between calving and conception were slightly longer with restricted suckling compared to artificial rearing, but considerably less than with traditional rearing. In another study, Rodriguez (1987), on analyzing more than 120,000 cows, reported intervals of 109, 151 and 218 days to first insemination and 128, 166 and 240 days to conception for artificial rearing restricted suckling and traditional rearing systems respectively.
|BREED||Number of cows||Artificial rearing||Restricted sucklinga||TraditionaLbrearing|
|F1 (50% H × 50% Z)||27628||126||166||237|
|(8524)||(16461)||(2643)|
|F2 (75% H × 25% Z)||5680||136||163||178|
|(3179)||(2334)||(667)|
|Others1||54141||129||175||254|
|(17257)||(29245)||(7639)|
1 Mainly zebu x Brown Swiss in different proportions
( ) Number of cows on each system
a Weaning at 3 – 4 months of age
b Weaning at 6–8 months of age
Mortality
On analyzing deaths occurring in 195,000 births during a one year period, values found were of 9.9%, 6.5% and 7.2% mortality for calves reared artificially, by restricted suckling and by natural rearing (Table 9).
|Rearing system||No. of calves||Mortality %|
|Artificial||3820||9.87|
|Restricted suckling||75937||6.54|
|Other systems||116153||7.21|
Cost of rearing
The cost of a calf reared artificially was 115.59 Cuban pesos, while, with restricted suckling, it was of 82.89 Cuban pesos, giving a difference of 32.70 Cuban pesos (Ugarte, 1977). Rodriguez (1987) also found a favourable difference for calves reared by suckling of 55.24 Cuban pesos (142.15 and 86.94 Cuban pesos in artificial rearing and suckling respectively).
REFERENCES
Fustes, E., Avila, C. and Ortega, L. 1985 Efectos de la mastitis bovina sobre la producción lechera y la economia agropecuaria. Rev. Salud Animal 7: 91–98.
Kreilis, M.L., Silinish, A.A. and Maksimova, E.P. 1971 The completeness of emptying of the udder with various methods of milk removed. Anim. Breed. Abstr. 39: 666.
Lane, G.T., Dill, C.W., Armstrong, B.C. and Switzer, L.A. 1970 Influence of repeated oxytocin injections on composition of dairy cows milk. J. Dairy Sci. 53: 427–433.
Marx, G.D. 1971 Use of a quarter milking machine to study factors involved in mastitis. Paper 7549. Scientific J. Serv. Minn. Agric. Exp. Stat.
Rodriguez, E. 1987 Incidencia de los sistemas de crianza de terneros en la actividad productiva y reproductiva en el ganado. Reunión ACPA. MIN. AGRIC. La Habana.
Ugarte, J. 1977 Crianza de terneros lecheros en amamantamiento restringido. Tesis Cand. Dr. Cs. ISCAH, La Habana.
Ugarte, J. and Preston, T.R. 1972 Rearing dairy calves by restricted sucking. 1. Effect of suckling once or twice daily on milk production and calf growth. Rev. cubana Cienc. agric. (Eng. ed.) 6: 173–182.
Ugarte, J. and Preston, T.R. 1973 Rearing dairy calves by restricted suckling. 3. The effect of reducing suckling frequency to once daily, after the fourth week on milk yield and the the growth of the calf. Rev. cubana Cienc. agric. (Eng. ed.) 7: 147–154.
Ugarte, J. and Preston, T.R. 1975 Rearing dairy calves by restricted suckling. 6. Effects on milk production, reproductive performance and incidence of clinical mastitis throughout the lactation. Rev. cubana Cienc. agric. (Eng. ed.) 9: 15–26. | https://www.fao.org/3/t0413e/T0413E19.htm |
Baby bumps in the road: The impact of parenthood on job performance, human capital, and career advancement (with Jennifer Heissel). Job Market Paper. Submitted.
This paper explores whether and why a maternal "child penalty" to earnings would emerge even without changes in employment and hours worked. Using a matched event study design, we trace monthly changes in determinants of wages (job performance, human capital accumulation, and promotions). Data come from a usefully unusual setting with required multiyear employment and detailed personnel data: the United States Marine Corps. Mothers’ job performance initially declines and gaps in promotion grow through 24 months postbirth. Fathers’ physical fitness performance drops somewhat but recovers. These patterns lead mothers to earn relatively lower wages, even absent changes in employment postbirth.
Variation in teacher quality over the preschool year and its implications for early childhood education accountability systems (with Kathryn Gonzalez, Luke Miratrix, and Terri Sabol). Submitted.
Accountability systems designed to monitor and enhance early childhood education program quality increasingly rely on observational ratings of teachers' skills. The present study explores variation in teachers' quality ratings during the school year and its implications for the accuracy of accountability evaluations. We use an unusually rich data set with 2,803 observational ratings of 303 preschool teachers spread across the school year to characterize patterns of growth and decline in teacher quality ratings, as measured by the Classroom Assessment Scoring System (CLASSTM ). We then quantify whether time trends in CLASS ratings explain overall within-teacher variability in scores. Last, we simulate accountability outcomes under the federal Head Start accountability policy, based on the time of year a program's teachers are assessed. Results show teacher quality ratings decline during the beginning of the school year; improve during the winter; and plateau in the spring. This pattern is particularly pronounced for instructional support CLASS ratings, which capture how well teachers foster students' higher-order thinking. Seasonal variation in instructional support ratings explain 24% of the overall variability in teachers' scores. We find especially large differences in the likelihood of failing a Head Start accountability review due to time-patterned variation in instructional support scores.
Targeted public pre-K and the broader child care market in Illinois.
This paper explores how early care and education providers respond to the expansion of public pre-Kindergarten (pre-K) funding in Illinois. Federal, state, and local governments have increasingly invested in such programs, with the goal of increasing families' access to early care and education settings. However, it remains unclear whether public pre-K funding effectively draws new providers into the market for care and, if not, whether already established providers that receive public pre-K funds shift program operations in response to pre-K funding receipt. Using detailed longitudinal data on the universe of child care providers in Illinois, I identify what portion of public pre-K providers that receive funding are new to service delivery vs. already established. Next, among established providers, I compare changes in service delivery before and after public pre-K funding receipt to changes over time in observably similar providers, identified using a propensity score matching approach. I find Illinois’ pre-K expansion funds go to very few new providers; 75% of funded programs existed for 3 years or more before they were awarded funding. Among these, public pre-K funding increases the odds that a provider remains in business and increases the number of distinct child care sessions it offers for preschoolers. The latter finding is closely related to the nature of the funding, which covers only part-day care for eligible children. Findings on the impacts of public pre-K on funded providers begin to inform our understanding of how the early care and education sector responds to state pre-K expansion.
The ups and downs of classroom quality over the preschool year and relations to children’s school readiness. (with Kathryn Gonzalez [lead author], Luke Miratrix, and Terri Sabol).
Despite considerable evidence on the links between average classroom quality and children’s learning, the importance of variation in quality is not well understood. We examined whether three measures of variation in observed classroom quality over the school year – overall variation in classroom quality, teacher-specific trends in classroom quality, and instability in classroom quality – were associated with children’s language, literacy and regulatory outcomes. We also examined whether variation in quality was associated with teachers’ participation in coaching. Results indicated that overall variation and instability in emotional support and classroom organization over the year were negatively associated with children’s regulatory outcomes. Participation in coaching was linked to increased variation only in instructional support. We discuss implications for policies focused on improving classroom quality.
Works in Progress
Parenthood and health: Measuring the effects of maternity leave, paternity leave, and child care (with Jennifer Heissel).
The impact of variation in access to child care on job promotion and retention (with Alexander Chesney, Jennifer Heissel, and William Sevier).
Grandchildren’s spatial proximity to grandparents and intergenerational transfers of time and money (with Rachel Dunifon). | https://www.oliviajhealy.com/research |
By: Jenny Foreman
Senior Project grew out of the desire to create a mission-centered opportunity for students to culminate their Dublin education through a self-designed study that has both a scholarly and creative component. How do we develop curiosity, teach independent research and study skills essential to college, and promote deep learning and innovative ways of sharing that new learning? And what can we learn about ourselves in the process?
Now in its second year, Senior Project is well underway, with fifteen seniors pursuing learning in areas of their own special interest. The projects this year range from linguistics to acoustics, education to fashion design, programming and virtual reality to barbeque and botany. Students will conduct scholarly research, create and perform experiments, design curricular materials, and produce artistic works. Students have spent the first part of the term developing questions to help guide and focus their studies, and have set initial research and action goals based on these questions. Each student will eventually work with an on-campus mentor who will help guide the development of the project.
While all of these projects will be formally documented in a scholarly paper and presented to the school at the end of the year for Mayfair weekend, there are other checkpoints along the way that give the seniors an opportunity to share their work with both adults and peers for dialogue, feedback, questioning, and support. Stay tuned for blog posts, morning meeting announcements, and the occasional newsletter feature.
It has been invigorating to meet with this group of seniors and on a daily basis hear a new development, challenge or fun fact that has emerged.
Stay tuned for updates to the Senior Project page on our website that will have a full listing of the project topics, links to blogs and other news. And if you happen to have any expertise in the areas of study and want to get involved or introduce us to new sources of learning, we welcome your participation and interest! | https://www.dublinschool.org/consolidated-blog/2015/10/5/senior-projects |
Marisol Ortega is a first-generation Mexican-American designer, illustrator, and letterer living and working in Seattle, Washington. She is best known for her vibrant flora and fauna illustrations that play with texture, linework, bold colour palettes, and organic shapes. She pulls inspiration from childhood memories of visiting her abuela’s home in Michoacán, Mexico, and the hikes she’s always grateful her well-meaning husband Rob makes her take. She’s also been known to “borrow” colour palettes from the afternoon art dates with her seven-year-old daughter and art director, Ellie.
We caught up with Marisol to talk about her career so far, and how she’s been navigating lockdown.
Did you always want to be a designer and illustrator?
Sort of! I’ve always loved coloring in my notebooks from a very young age but I didn’t get into graphic design until high school when my art teacher gave us a project with pen and ink. I loved everything graphic and then decided to attend art school for graphic design. The illustrator part didn’t happen until my 3rd design job. I worked as a designer for the Seattle Symphony Orchestra, and we had a lot of posters to design for each concert, not to mention special events like the galas and their educational program as well. I’ve been hooked ever since!
Have you always worked for yourself?
No, I actually had my year anniversary of being my own boss in April. Prior to that I have always worked a 9-5 job while freelancing. My last full time job was a senior designer for Amazon.
Do you enjoy being freelance?
Yes and no. I love the flexibility it allows me and I’m getting to learn about what it takes to run a business. Not to mention learning how to keep a schedule and stay on top of my home life. The only aspect I miss about working in-house are the creatives! I miss having other creative people around to bounce ideas off of or just having a chat.
Can you describe your style?
I would describe my work as colourful, full of texture and bold. I love working with textures & colours so by default I draw a lot of nature inspired work. Nature is definitely a big influence in my work. I would also say that a lot of my happy memories of my late grandmother, Ines, influence me a lot as does my Mexican-American heritage.
What do you enjoy most about what you do?
Working with a lot of clients in different industries. I also really enjoy working with clients that share the same passions I do.
And what’s the most challenging thing?
The most challenging has been the growing pains of owning my own business and making sure I block out time for my projects at the same time. It’s a lot of organizing on top of organizing and I think people definitely underestimate it, I know I did. A year in and I’m happy to report that I’ve finally got a system down and things seem to be going rather smoothly.
How are you coping with the current lockdown situation?
When the lockdown first started I had several jobs cancel/postpone and it got quiet for a while. But after a month or so I started getting more requests. I think once people figured out how to work remotely and work in new ways, more digital work was requested. It’s been interesting, to say the least. I think the hardest part about lockdown was attempting to homeschool our 7 year old.
How do you stay productive?
Oh man, haha. I’m always working on something so it feels like I’m productive most days. If I’m really struggling to focus I usually put on some ambient music and set a timer for myself to do a specific task. I usually do this when I’m first doing research work or doing production work. I also set the same timers for “me time”. It helps me take a break from the screen and often times I come back to my desk looking at my work in a different perspective.
What’s worked for you in terms of getting your name out there?
I’ve learned to keep a digital sketchbook via instagram and post pretty frequently. I show a lot of process work as well as finished projects. That’s honestly all I have done, most of my work is from word of mouth, collaborations with other designers or instagram.
What advice would you give to other creatives?
Do personal work! Collaborate! I love doing personal work and collaborating with other designers/artists. I get to experiment and give yourself permission to play when I do personal work. I often refer back to some of it when I’m thinking about working in a different style. Collaborating with other creatives is also super important, especially since I no longer go into an office and work with other creatives. I think collaborating is also important for personal growth, you definitely learn something new! | https://thepeep.co.uk/interviews/marisol-ortega/ |
WASHINGTON — Moist air, warm waters in the Gulf of Mexico, and ideal wind patterns turbocharged Hurricane Michael in the hours before it smacked Florida’s Panhandle.
Michael made landfall near Mexico Beach, Florida, Oct. 10 in the early afternoon hours with 155 mph winds
Hurricane Michael’s wind speed increased by 50 mph in 24 hours, to 140 mph by Oct. 10 and continued to 155 mph.
“Michael saw our worst fears realized, of rapid intensification just before landfall on a part of a coastline that has never experienced a Category 4 hurricane,” University of Miami hurricane researcher Brian McNoldy said the morning of Oct. 10.
Hurricanes have something called a potential intensity. That’s how strong a storm can get if all other factors are aligned, said Jim Kossin, a climate and hurricane expert at the National Oceanic and Atmospheric Administration. Michael had nothing holding it back.
“Everything was there for it to reach its potential, and it did,” Kossin said.
As Michael’s eye started coming ashore, it boasted the third-lowest central pressure of any storm to hit the United States, behind only a 1935 Labor Day storm and 1969’s Camille.
Meteorologists first got a sense something big could be happening by watching how Michael’s eye changed shape. Early Oct. 9, it was oddly shaped and ragged. Later in the morning it started to get better organized, and by the night of Oct. 9, real-time satellite imagery was showing the eye getting stronger by the minute.
Another factor: Its pressure, the measurement meteorologists use to gauge a hurricane’s strength. The lower the pressure, the stronger the storm. Before landfall, Michael’s pressure fell so low it looked like the winds were sure to pick up fast, said Ryan Maue, a meteorologist for weathermodels.com.
And none of the factors that hold a storm back was present, especially something called “wind shear.” Wind shear is when there’s a mismatch either in speed or direction between winds near the surface and those 5 to 6 miles up.
That mismatch “pushes the storm over” or decapitates it, Kossin said. When the wind shear near Michael eased, the storm took off, he said.
“It’s kind of like someone was holding on to it when it was trying to run and they let it go,” Kossin said.
Another huge factor was the water temperature. Warm water is the energy that fuels hurricanes, and the Gulf water is 4 to 5 degrees warmer than normal.
Devon Ravine/Associated Press
Water temperatures in the Gulf of Mexico vary along with weather, but some scientists said the warm waters are signs of human-caused climate change.
“Have humans contributed to how dangerous Michael is?” Kossin said. “Now we can look at how warm the waters are and that certainly has contributed to how intense Michael is and its intensification.”
The warm waters, Kossin said, are a “human fingerprint” of climate change.
Kossin and others have a study out this month in the Journal of Climate with computer simulations showing that human-caused global warming will increase rapid intensification of tropical weather across the globe in the future.
Other studies have shown rapid intensification already has increased over past decades. One study this year in Geophysical Research Letters found that since 1986, the rate of intensification of storms such as Michael has increased by about 13 mph. | https://www.ttnews.com/articles/hurricane-michael-hits-florida-panhandle |
BACKGROUND AND SUMMARY OF THE INVENTION
BRIEF DESCRIPTION OF THE DRAWINGS
DETAILED DESCRIPTION OF THE DRAWINGS
This application claims the priority of German patent document 102 33 821.3, filed 25 Jul. 2002 (PCT International Application No. PCT/EP2003/007030), the disclosure of which is expressly incorporated by reference herein.
The invention relates to a method and apparatus for controlling a hybrid power supply system in a mobile device having at least one electric drive motor, a fuel cell system and a dynamic power system. The electrical outputs of the fuel cell system are connected to one side of a power converter whose other side feeds the drive motor which is controlled by a motor control unit. The dynamic power system has a storage battery which is connected to one side of a d.c./d.c. converter whose other side is connected to the electrical outputs of the fuel cell system and to one side of the power converter.
Power supply systems for an electric vehicle which has a fuel cell and a storage battery that can be connected in parallel with it are known. The electrical outputs of the fuel cell are connected to a motor for driving the vehicle, and to a d.c./d.c. converter to which auxiliary machines in the vehicle are connected. The power supply system contains a residual charge monitoring device for measuring the residual charge of the storage battery when the power supply system stops operation. If the residual charge is then less than a predefinable limiting value, the fuel cell charges the storage battery to the limiting value. The power supply system is not shut down until after such charging is completed. (See German patent document DE 197 31 250 A1.)
Hybrid drive vehicles which have, as a power source, a fuel cell that feeds an electric drive motor are known. Such vehicles contain a power accumulator and electrical secondary loads. Two separate circuits which are provided, with switching devices for optionally connecting the motor and the secondary load to the fuel cell or to the power accumulator, and a switchable connection between the fuel cell and the power accumulator are provided in the vehicle (German patent document DE 198 10 467 C1).
European patent document EP 0 334 474 B1 discloses a fuel cell system which includes a fuel tank, a reformer, a fuel cell, and a d.c./d.c. converter that is connected to the electrical outputs of the fuel cell. A load is connected to the d.c./d.c. converter and a storage battery is connected in parallel therewith. The fuel cell system contains a control unit which senses residual charge of the storage battery, and ensures that the storage battery is charged to a predefinable charge state in the shortest possible time.
Finally, U.S. Pat. No. 5,714,874 discloses a power supply system that comprises a fuel cell, a d.c./d.c. converter which is connected to the electrical outputs of the fuel cell, and a load which is connected to the outputs of the d.c./d.c. converter. A storage battery is connected in parallel with the load. A control unit regulates the current flowing via the d.c./d.c. converter such that the output voltage of the fuel cell remains within a predefined range.
One object of the invention is to provide a method and apparatus for controlling a power supply of a mobile device having at least one electric drive motor and a hybrid power system composed of a fuel cell system and a dynamic power system, such that the hybrid power system operates in an optimum way in terms of the required dynamics, with adaptation to the parameters and/or operating states.
This and other objects and advantages are achieved by the method according to the invention in which, for a particular setpoint power request, multiple signals are processed to determine the components of the requested setpoint power that will be provided, respectively, by the fuel cell system and by the dynamic power system. The signals which are processed for this purpose include signals generated by a signal transmitter for requesting the setpoint power of the drive motor, a signal from an operating mode switch (which has a plurality of selectable settings that are assigned to different types of dynamic behavior of the device), signals from power sensors for the output current and voltage of the fuel cell and signals from a sensor for the velocity of the mobile device. When there is a change in the setpoint power, the difference between the partial power that can be generated by the fuel cell system (with a delay according to the transition function) and the setpoint power is provided by the storage battery of the dynamic power system, by applying corresponding setpoint values to the d.c./d.c. converter, considering the power of the drive motor which has already been output and the power of the fuel cell system which has already been generated as well as the velocity of the device, and taking into account the selected type of dynamic behavior and the different transition functions of the fuel cell system and of the dynamic power system. Based on the power demand of the mobile device (which depends on the setpoint value of the torque, the setting element and the measured values of the sensors, and which is calculated from the signals, position sensors and measured values), the power demand can be adapted to the fuel cell system in a suitable way, (i.e., with a favorable efficiency and/or favorable time behavior), while the storage battery supplies the power contribution for rapid dynamics of the mobile device.
In the case of a sudden increase or decrease in the setpoint power, the resultant corresponding increase or decrease in the current flowing out of or into the storage battery via the d.c./d.c. converter is limited in particular to a maximum prescribable discharge current or charge, determined, for example, by the type of the storage battery used.
In one preferred embodiment, from a vehicle control unit of the mobile device load, current values of additional loads in the device are superimposed on the power demand values for the drive motor which are determined from the setpoint power. The result is fed (with a charge current value generated when necessary by a battery management system) to a power control unit with limitation to a predeterminable fuel cell maximum power value of a power control unit. The power control unit also receives velocity values, torque setpoint values from a setting element, battery charge state values and the setting of the operating mode selector switch. As a function of the fed values, the power control unit calculates the values of the overall power demand, portions which is to be contributed by the fuel cell system taking into account its inertia behavior and the selected dynamic behavior, and outputs corresponding setpoint values to the actuating elements of the fuel cell system. In each case the values of the current which is output by the fuel cell are determined and subtracted from the value of the current required by the drive motor; and the result is fed as current setpoint values to the d.c./d.c. converter with limitation to a maximum specifiable discharge current or charge current of the storage battery. The power control unit detects, by reference to the values fed to it, the operating mode and the operating state of the mobile device and concludes therefrom the type of current contribution which the fuel cell system must make for the power converter and the auxiliary drive. The storage battery provides the current contributions for the high-speed dynamic demand levels. The method according to the invention permits rapid setting of the current in order to achieve satisfactory driving dynamics, by the d.c./d.c. converter.
In a further favorable embodiment, the sum of the current which is drawn from the drive motor (via the power converter) and the currents which are drawn from the other loads of the device are subtracted from the value of the current that is output by the fuel cell, and when a maximum predefinable value of the discharge current of the storage battery is reached, it is limited to its discharge current. The result of the difference between the values of the currents which are drawn from the further loads is added to the value of the available fuel cell current and signaled to the control unit of the device as an available value of the current. The available current is a dynamic current in response to the demand for a current. The fuel cell system meters the amount of fuel sufficient for this current to be drawn. The control unit is therefore capable of matching the current demands made of the mobile device to the respective available values of the current.
Its particularly advantageous, that the response function of the fuel cell system is simulated as a controlled system, using a memory element of the n-th order. The torque setpoint value which is output by the vehicle control unit of the mobile device is applied to the memory element and to a control unit for the dynamic power system, and the values generated according to the response function of the controlled system are fed to the control unit. The current which is to be applied by the dynamic power system as a current setpoint value is supplied to the d.c./d.c. converter by the control unit by means of a limiter element with a ramp, the gradient of which can be set to at least two values as a function of control signals from the device. This embodiment achieves especially good overall dynamics, and the efficiency of the dynamic power system is exploited to an optimum degree. For example, during rapid starting of the mobile device (i.e., at the commencement of starting and with low power of the fuel cell system), the power is applied by the dynamic power system so that the large torque necessary to accelerate the device is rapidly available. At high rotational speeds, the power for the acceleration in order to reach a high rotational speed is output by the dynamic power system. A sliding transition of the power contributions of the fuel cell and power system is achieved by means of the power control unit.
In order to achieve high acceleration during an acceleration of the device (when the setpoint torque is determined by the vehicle control unit by pilot control and a maximum current for the generation of the setpoint torque is determined from a characteristic diagram with the torque as a function of the maximum current and the rotational speed), the difference between the current generated by the fuel cell system during the acceleration and the overall current which is required by the dynamic power system according to the characteristic diagram in order to achieve the high acceleration, is generated. With this embodiment, particularly good longitudinal dynamics are generated in a mobile device, in particular an electric vehicle, since utilization of the dynamic power system is optimized.
In order to utilize the power of the mobile device satisfactorily, the excess energy occurring when the load of the drive motor is reduced is recovered and stored in the dynamic power system.
The d.c./d.c. converter is also set in such a way that it feeds current into the storage battery and charges it when there is a negative load jump, (i.e., due to a corresponding change in the actuating element for the power to be output by the drive motor, the power converter is set to reverse mode). The charge current is determined by the charge controller which controls the charge currents across the d.c./d.c. converter as a function of the charge state of the storage battery. When there is a reduction in the setpoint torque to be output by the drive motor as a result of the presetting of a lower torque setpoint value, the current which is necessary for the lower torque is preferably determined from the characteristic diagram. With reference to the current load state of the fuel cell system, given the presetting of the lower torque setpoint value and the storage capacity of the storage battery, the latter is charged with the maximum permissible charge current by means of the d.c./d.c. current after the reversal of the flow of current in the power converter, and the fuel cell system is set to the current which is necessary for the lower setpoint torque. This measure avoids the risk of overheating of the fuel cell system.
In another preferred embodiment, the direction of the supply of combustion gas and air to the fuel cell is reversed periodically, and during such reversal, a current pulse matched to the instantaneous output of current of the fuel cell system and/or of the dynamic power system directly before the changeover is fed in to the power converter by the dynamic power system via the d.c./d.c. transformer. This avoids undesired fluctuations in the drive torque.
It is also expedient to monitor the output voltage of the fuel cell system to determine when a voltage limiting value that is permissible for satisfactory operation is reached or undershot. When the voltage limiting value is reached, the voltage in the power system which is connected to the output of the fuel cell is regulated to at least the permissible limiting value by feeding in current via the d.c./d.c. current. In particular, the load situation of the power supply system during the intervention of the regulating process and the frequency of intervention of the voltage regulating process during the operation of the power supply system are registered. After a predefinable number of interventions have been exceeded the dynamics are limited by reducing the rate of increase in the current of the fuel cell system and/or the dynamic power system and the magnitude of the power which is output.
It is advantageous to limit the rate of increase in the output power of the fuel cell system given sufficient storage battery charge when the torque setpoint value is increased, and to supply the current necessary to output the torque setpoint value, from the dynamic power system during the increase in the output power. In this context it is advantageous for operation of the power supply system with a high level of efficiency to approach the load state of the fuel cell system which is demanded by the torque setpoint value by means of a ramp with a low rate of increase.
It is particularly expedient if at least three operating modes for the drive motor can be set by means of the operating mode selector switch, one operating mode of which is aimed at a high level of dynamics of the mobile device, a second of which is aimed at a low level of dynamics with high efficiency and a third of which is aimed at a stop and go operating mode. When accelerations occur in the stop and go operating mode, currents are generated for the drive motor by the dynamic power system and stored therein during braking.
The portion of the current to be supplied by the dynamic power system which is formed by the current necessary to generate a requested drive power, in particular with the existing actual value of the current consumed by the mobile device, and the current available from the fuel cell system is determined.
In the case of reduced power of the fuel cell system, an emergency operating mode of the power supply system is preferably ensured by a voltage regulating mode in the high voltage power system, by means of the d.c./d.c. converter and by supplying current from the storage battery.
In the power supply control apparatus according to the invention, a vehicle control unit is connected to a velocity sensor of the mobile device and to a signal transmitter for a setpoint torque (to be generated by the drive motor). The vehicle control unit establishes the setpoint torque for a motor control unit, and determines the current setpoint values for the mobile device which are stored in a characteristic diagram for torque values and rotational speed values. The vehicle control unit is connected to the power control unit which is connected to the fuel cell system, a battery management system for the storage battery and to the d.c./d.c. converter. The current output by the fuel cell is measured and is fed as a fuel cell current value to the power control unit. The current of the drive motor is measured upstream of the power converter and is fed as a driving current value to the power control unit. The currents of the other loads are measured or calculated and fed to the power control unit as a composite current value. An operating mode selector switch for setting various types of dynamic behavior of the power supply system is connected to the power control unit. Values relating to the charge state of the storage battery, from the battery management system, and values relating to the maximum prescribable charge current and discharge currents are fed to a power flux controller in the power control unit. The power setpoint value, the fuel cell current value, the driving current value, the composite current value, the operating mode set with the operating mode selector switch, the charge state value and the maximum prescribed values of the charge and discharge currents are processed in the power control unit and in the associated power flux controller, with one or more programs. When there is a change in the setpoint power, the difference between the partial power that can be generated by the fuel cell system (with a delay according to the response function) and the setpoint power, is supplied by the storage battery of the dynamic power system by applying corresponding setpoint values to the d.c./d.c. converter, considering the power of the drive motor which has already been output and the power of the fuel cell system which has already been generated as well as the velocity of the device, and taking into account the selected type of dynamic behavior and the different response functions of the fuel cell system and of the dynamic power system. The current which is to be contributed by the battery is determined from the vehicle current and the available current of the fuel cell, which takes only a very short time.
Other objects, advantages and novel features of the present invention will become apparent from the following detailed description of the invention when considered in conjunction with the accompanying drawings.
FIG. 1
is a block circuit diagram of an arrangement for controlling the power supply of a mobile device having a fuel cell system and a dynamic power system as well as a power control unit and at least one electric drive motor;
FIG. 2
FIG. 1
is a block circuit diagram or signal flow diagram of the power control unit illustrated in ;
FIG. 3
is a block circuit diagram of a model of a fuel cell system with a methanol reformer and a control unit;
FIG. 4
is a diagram of fuel cell current and power system current for maximum acceleration, as a function of time;
FIG. 5
is a diagram of the fuel cell current and power system current for an acceleration which is below the maximum acceleration; and
FIG. 6
is a diagram of currents of the fuel cell system of the device and of the power system as a function of time in various operating states.
1
2
3
4
3
3
5
2
6
1
A mobile device, in particular a vehicle (or alternatively, a locomotive or a fork lift truck), contains a drive motor unit which includes a power converter connected to a motor (not illustrated in more detail), which may be an asynchronous motor. The rotational speed or torque of the motor is controlled by a motor controller by means of the power converter . The power converter is connected at its terminals which are opposite the motor to a d.c. power system (referred to as a high voltage power system, and having a voltage in the range from 250 to 450 V). In addition to the drive motor unit , there are other power loads in the vehicle . These loads are, for example, a compressor, a ventilator, a water pump, the loads of an air conditioning system and a d.c./d.c. converter between the high voltage system and a 12 V, 24 or 42 V low voltage power system with further loads such as headlights, windshield wiper motors, window drives, indicator flasher lights etc.
5
7
7
8
9
5
5
10
The d.c. power system is connected to the electrical outputs of a fuel cell system , which includes a fuel cell. The fuel cell system contains elements which are known per se, such as a fuel tank with liquid fuel (for example methanol), a reformer, a water tank and a compressor as well as a fuel cell to which combustion gas is fed from the reformer and air is fed from the compressor. A fuel cell controller activates the actuating elements of the fuel cell system in order to cause them to output a corresponding amount of power. A d.c./d.c. converter is also connected to the d.c. power system and is designed for bidirectional operation; it is connected at its terminals facing away from the high voltage power system to a storage battery which generates, for example, a voltage of 200 V. Instead of a storage battery, a supercapacitor or some other power accumulator can also be provided.
11
5
9
10
12
A d.c./d.c. converter controller , which sets the direction of the current of the d.c./d.c. converter and the current level which is output and can reset the converter to a voltage regulating mode for the d.c. power system , is connected to the d.c./d.c. converter . The storage battery is connected to a battery management system .
13
5
14
15
16
2
3
3
17
10
20
12
A voltage sensor connected to the outputs of the fuel cell measures the d.c. voltage of the d.c. power system . The current output by the fuel cell (designated below as a fuel cell vehicle current) is measured by a current sensor . A current sensor measures the current drawn by the additional loads (referred to below as an auxiliary current). A current sensor measures the current which flows to the drive control unit via the power converter or is fed back from the power converter (referred to below as the driving current). The current which flows from or to the d.c./d.c. converter at the d.c. power system end (referred to below as the d.c. converter current) is measured using a current sensor . The voltage of the battery is measured using a voltage sensor which is connected to the battery management system .
4
18
19
18
8
12
11
13
14
8
15
16
18
20
17
12
10
10
FIG. 1
FIG. 1
The motor controller is connected to a vehicle control unit via data lines which are shown by dashed lines in . A power control unit is connected via data lines (illustrated by dashed lines in ) to the vehicle control unit , the fuel cell controller , the battery management system and the d.c./d.c. converter controller . The voltage sensor and the current sensor are connected to the fuel cell controller . The current sensor and the current sensor are connected to the vehicle control unit . The voltage sensor and the current sensor are connected to the battery management system which monitors all the data of the battery , and continuously determines the charge current of the battery .
14
19
8
21
3
19
22
19
23
24
19
38
7
7
BRZFahrz
Vehicle
Aux
verf
Verf
Verf
BRZAnf
Verf
2
Verf
The value of the fuel cell vehicle current which is measured by the current sensor (referred to below as I, is signaled to the power control unit via the fuel cell controller on data line . The value of the current which is consumed by the drive motor (or if appropriate by a plurality of drive motors) at the time and which flows into the power converter and is referred to below as I, is fed to the power control unit on a data line . The value of the auxiliary current, referred to below as I, is signaled to the power control unit on a data line . On a further data line , the value of the current which is made available by the fuel cell (referred to below as I) is fed to the power control unit . (The value Iis a limiting value and indicates how much current can be drawn via the fuel cell.) This current Iis a dynamic value in response to a current value I, which is output by the power flux controller to the actuating elements of the fuel cell system . The fuel cell system meters the quantity of fuel such that the current Ican and has to be drawn. If too much current is drawn, the fuel cell is under-supplied. If too little current is drawn, too much His generated, which damages the reformer system. Iis thus a dynamic current which is also to be drawn.
BRZFahrz
Verf
Vehicle
Aux
Aux
Verf
Verf
Vehicle
Aux
Vehicle
Aux
Verf
Battmaxl
Battmaxe
Verf
Aux
Vehicleverf
FIG. 2
FIG. 2
FIG. 2
24
25
26
27
10
28
28
29
29
29
30
18
18
a
The value Iis subtracted from the value I, which is represented in by the summing point . The current values Iand Iare superimposed one on the other, which is represented in by a summing point . The value Iis subtracted from the value I, in a subtraction unit . The value Iis subtracted from the sum of Iand Iat a summing point . If the result (I+I−I) is greater than a maximum prescribable, stored discharge current value of the storage battery , The current value (referred to AS I) is further processed in the comparator . The value which is passed on by the comparator is fed to a further comparator in which a comparison is made with a prescribable, stored maximum permissible discharge current which is referred to as Iin . The value at the output of the comparator is limited to this value if the input value is greater. The output value of the comparator is superimposed on the difference I−Iat a summing point and results in a current value I, which is fed to the vehicle control unit . For this reason, the maximum available current value is available to the vehicle control unit , so that this unit does not output any higher current demand.
18
31
32
33
19
10
34
32
34
AnsF
Aux
Ladeanf
Ladeanf
AnfF
Aux
BRZDynmax
The vehicle control unit , to which the power to be output by the drive motor is signaled by a setpoint value transmitter , calculates a setpoint current value for the vehicle (referred to below as I) from the position of the setpoint value transmitter, the rotational speed of the drive motor (measured by a sensor), a table (stored in the trial operating mode) for the torque as a function of the current and the rotational speed. The setpoint current value is superimposed on the value Iat a summing point . A battery charge controller which is part of the power flux control unit monitors the charge state of the storage battery by means of sensors (not illustrated in more detail) and generates, when necessary, a charge current demand, referred to I, as a function of the measured battery temperature and the driving style which is determined from the measured rotational speed profile per time unit. The value Iis superimposed on the sum of Iand Iat a summing point . The result which is calculated at the summing point is fed to a comparator which determines whether the input value is greater than a maximum prescribable, stored, dynamic fuel cell current value, referred to below as I.
BRZDynmax
Anf
Anf
FahrzeugVehicle
Aux
Verf
Ladeanf
Anf
35
36
If the output value of the summing point is greater than I, this value is further processed at a summing point at which a current value Iis superimposed. The value Iis calculated by a quasi-static regulator . The values I, I, Iand I, from which the regulator Icalculates, are fed to the quasi-static regulator.
35
37
38
35
BRZmin
The sum which is formed at the summing point is compared in a comparator with a current minimum value, referred to below as I. This current minimum value is passed on to a variable power flux controller if the result of the summing point is smaller than this value.
Batt
BZ
MaxBatt
39
33
39
The temperature value of the battery Tis fed by a sensor (not illustrated) to a calculation unit for limiting values of the battery current, as are the load state of the battery LZ by the battery charge controller and the value of the voltage of the fuel cell U. The calculation unit determines a maximum battery current value Ifrom these values.
40
maxBRz
BRZDynmax
BRZ
BRZmaxstat
A further calculation unit for the maximum fuel cell current Ireceives the maximum dynamic fuel cell current value Ifrom a temperature sensor (not illustrated) of the fuel cell T, and a previously stored maximum static value, determined, for example, by trials, of the fuel cell system I.
Ladeanf
Aux
maxBatt
BRZmax
maxFahr
41
19
The value of the charge demand I, the value Iand the values Iand Iare fed to a calculation unit which determines therefrom the value of the maximum vehicle current Iand feeds it to the vehicle control unit .
42
20
43
BRZFahrz
Verf
Ladeanf
At a summing point , the value of the output of the comparator is superimposed, on the difference between Iand I, and the result is added to the value Iat a summing point .
7
44
43
45
FSW
The fuel cell system has a flow switch compensation function which compensates for the power dip when the direction of the gas supply to the fuel cell is reversed. A flow switch control unit generates a current value Iwhich is added to the result from the summing point at a summing point during the switchover period.
5
46
46
45
47
47
48
REG
In order to prevent the voltage in the high voltage power system from dropping to a value is dangerous for the operation of the fuel cell, a voltage regulating unit is provided with which the voltage of the high voltage power system is monitored to determine whether a lower limiting value is reached or undershot. As soon as this limiting value is reached or undershot, the voltage regulating unit outputs a value Iwhich is superimposed on the result of the output of the summing point at a summing point . The value at the output of the summing point is fed to a comparator which limits this value to the maximum set charge current if the input current is larger.
48
49
48
11
Battmaxe
d.c./d.c.
The output value of the comparator is fed to a further comparator which limits the value to the maximum set discharge current Iif the input value is higher. The output value of the comparator is fed as a current setpoint value Ito the d.c./d.c. converter controller .
38
19
31
18
33
50
51
52
1
1
50
51
52
38
38
38
18
38
7
F
soll
AnfF
BRZAnf
The variable power flux controller , an essential component of the power control unit , receives measured values of the vehicle velocity V, of the setpoint value transmitter relating to the setpoint torque Mdemanded by the drive motor, the value Ifrom the vehicle control unit and the battery charge state from the battery charge controller . Furthermore, an operating mode selector switch composed of a series of switches , , , with which a specific operating mode of the dynamic behavior of the vehicle can be set manually is present in the vehicle . The switched positions of the switches , , are fed to the variable power flux controller . In addition, a signal which relates to an antilock braking operation and signals this to the variable power flux controller is fed to the variable power flux controller by the vehicle control unit . The power flux controller processes these values and outputs a value Ito the actuating elements of the fuel cell system .
10
12
9
11
53
54
7
38
54
56
54
18
55
54
56
57
53
FIG. 3
1
1
1
1
The storage battery with the battery management system and the d.c./d.c. converter with the d.c./d.c. converter controller form a dynamic power system . A model of the fuel cell system with the methanol reformer and the associated components (which are known per se) is stored in the variable power flux controller . The model () has a reaction free memory element of the n-th order PTn. In each case the torque setpoint value is applied to the input of the model by the vehicle control unit . The time constant of the memory element PTnis set by an input of the model . The memory element PTnis also designated by a delay element. The input and the output of the memory element PTnare connected to inputs of a control unit which influences the behavior of the dynamic power system .
57
58
18
1
58
100
101
53
53
2
2
1
2
An output of the control unit is connected to a memory element of the n-th order PTn; the latter has a further input which is connected to a changeover switch , which is set by the vehicle control unit . The setting depends whether the vehicle is in the antilock braking system mode. Two different time constants are set in the memory element PTnby means of the changeover switch by means of the inputs and , one of which is set to the dynamics in the normal operating mode of the dynamic power system and the other of which is set to the antilock braking mode. The output of the memory element PTnindicates the “slow” reaction of the fuel cell system. The output of the memory element PTnindicates the “rapid” reaction of the dynamic power system .
1
2
1
2
2
59
38
1
The output values of the memory element PTnand PTnare superimposed one on the other at a summing point which indicates the sum of the “rapid” and “slow” reactions. The output values of the memory elements PTnand PTnand of the summing point are processed by the variable power flux controller , in which case different dynamic operating modes of the vehicle are taken into account. The memory element PTnlimits the supply of power by the dynamic power system in terms of its dynamics and is also designated by a limiter.
53
53
19
7
18
7
53
Soll
max
max
In a first operating mode, which can be designated as an “acceleration boost”, the dynamic power system is used to improve the longitudinal dynamics of the vehicle. The dynamic power system is made to output power by the power control units for the duration of an acceleration process (that is, in a temporally limited fashion), such power having an additive effect to the power generated by the fuel cell system . In this context, the vehicle control unit controls the torque setpoint value as a function of the available current from the characteristic diagram M=F(I, n). Iis here the composite current of the fuel cell system and of the dynamic power system .
FIG. 4
FIG. 4
FIG. 4
FIG. 4
AnfF
1
BRZMax
BattMax
BZ
BRZmax
Batt
Batt
2
BattMax
60
38
7
53
61
38
54
53
62
9
In , the current is shown on the ordinate as a function of the time t on the abscissa. It will be assumed that a setpoint value jump to the setpoint value I, designated by in , takes place at the time t. In the “acceleration boost” operating mode, the variable power flux controller demands the maximum current of the fuel cell system Iand the maximum current of the dynamic power system I. The fuel cell current I( in ), increases to Iafter a response function, which value is registered by the variable power flux controller by reference to the model and the dynamic power system causes the current I, designated by in , to be output by means of the setting of the d.c./d.c. converter , said current Iincreasing with the ramp which is determined by the memory element PTnand remaining at the current Ifor the duration of the “acceleration boost”.
FIG. 5
FIG. 5
FIG. 5
53
38
64
53
65
63
63
BRZMax
Battmax
BRZMax
BRZ
Batt
BRZ
BRZMax
Batt
shows the current profile as a function of time at a setpoint value jump which is smaller than the sum I+I. The variable power flux controller causes the fuel cell to output the current I. The profile of the current Iis designated by in . The increase takes place with the transition function of the fuel cell system. The dynamic power system generates the current Iwhose profile is designated by in and is added to the current I. As a result, the setpoint value is reached more quickly. As soon as the setpoint value has been reached, the fuel cell feeds in the current I, while the current Ireturns to a lower value at which it remains for the duration of the acceleration boost.
FIG. 6
FIG. 1
FIG. 6
1
18
66
38
7
67
38
AnfF
1
AnfF
BRZAnf
Verf
BRZDynmax
2
2
Verf
BRZMaxstat
3
shows the profile of currents I of the power supply system of the vehicle and of the drive unit as a function of the time t in various operating modes such as “dynamic boost”, “quasi-static operating mode” and “braking mode”. It will be assumed that the vehicle control unit demands a current Ifor the drive motor at the time t. The setpoint current Iis designated by in . The variable power flux controller applies a fuel cell demand current Ito the actuating elements of the fuel cell system , said current permitting the fuel cell current Ito increase to a value Iat the time taccording to the profile designated by in . Starting from the time t, the variable power flux controller controls the fuel cell current Iin such a way that it increases linearly, with an adjustable gradient, to the to the maximum static value I. This value is reached at the time t.
1
2
Batt
Verf
Batt
2
Verf
Vehicle
7
53
53
68
69
1
FIG. 6
FIG. 6
From the time tto t, the fuel cell system and the dynamic power system operate in the “dynamic boost” operating mode, in which the dynamic power system is made to output a high battery current Iwhich is added to the current of the fuel cell system I. The current Iwhose profile is designated by in and which is generated, according to the setting of the memory element Ptn, with a high rate of increase which is matched to the rate of increase of the fuel cell system supplements the current Ito form a current Iwhose profile is represented by in . The dynamics of the vehicle are improved by the dynamic operation with battery support.
2
3
Verf
Batt
3
7
53
7
53
70
71
FIG. 6
FIG. 6
From the time tto the time t, the fuel cell system and the dynamic power system operate in the quasi-static operating mode. In this operating mode, the fuel cell system is operated in a nondynamic fashion with support from the dynamic power system . As a result, it is possible to save fuel. The fuel cell current I( in ) increases linearly, and the battery current I( in ) decreases linearly up to the time t.
3
Verf
7
At the time tthe static operating point of the fuel cell system is reached (i.e., the fuel cell current Ihas arrived at its maximum value for the current load situation). Given a continuous demand, the fuel cell stream remains constant.
4
3
10
9
10
72
73
38
74
5
10
7
Batt
Battmaxe
Batt
Vehicle
Verf
Aux
Vehicle
FIG. 6
FIG. 6
FIG. 6
It is assumed that at the time t the setpoint current is reduced to zero by a corresponding change in the torque demand. As this point, the dynamic power system is changed over to recuperation (i.e., the power converter feeds back released energy into the high voltage power system). The storage battery is charged by means of the d.c./d.c. converter which is set to a reverse mode. The current Iis fed back into the storage battery , with limitation to I. The profile Iis designated by reference numeral in . The current Idecreases in the so called braking mode of the drive motor according to the profile in . The current Iis reduced by the variable power flux controller according to the profile in , in which case in addition to a very steep drop an essentially linear drop takes place up to the time t at which for example the current Iis still generated. After the decay of the current Ito zero, the storage battery takes up the current which is still output by the fuel cell system , insofar as it exceeds the currents of the further loads. In this manner, it is possible to decrease the torque of the drive motor in a short time when there is a load jump from a high load point to a low load point. The excess power is stored. The chronological behavior of the torque reduction in response to the change in the setpoint value transmitter depends on the vehicle velocity (at higher velocities the reduction taking place more slowly than at low velocities), and on the drive current (more slowly when there are high currents).
The adaptive flow switch compensation according to the invention improves the driving comfort and the regulating stability during operation, in particular with a high load, for example full load. In the case of fuel cells it may be necessary to reverse the direction of the gases through the cells periodically. At the changeover time there is a brief reduction in electrical power, which results in a voltage dip when the load is constant. In a vehicle with a fuel cell the electric driving mode represents the main load. The electronic control of the electric drive must increase the power drain very dynamically when there is a voltage dip in order to maintain a constant torque. In particular when the load points are high, the power dip of the fuel cell has an adverse effect on the entire system:
The drive torque cannot always be kept constant, which results in a reduction in the driving comfort.
The electric drive has to increase its current demand very dynamically, which has a destructive effect on the process of regulating the generation of current.
The invention makes it possible to compensate for brief power dips of the current generating system. As a result, it is also possible to avoid fluctuations in torque on electric drives (locomotion drive but also auxiliary drives) and thus increase the driving comfort. The process of regulating the system for generating current is improved in this way since the current demand as a result of the load (locomotive drive) does not need to be increased and there is thus no interference variable acting on the regulating process.
10
The adaptive flow switch compensation is carried out according to the invention in order to compensate a power dip of the fuel cell and thus prevent a voltage dip. A controlled power input from the storage battery is generated as a function of the load current of the fuel cell and a flow switch information item relating to the fuel cell. A characteristic curve according to which the level of the current is dimensioned is adapted by observing the resulting voltage at the high voltage end during the flow switch compensation.
The fuel cell system signals an imminent flow switch via a logic signal. At the time of the flow switch, the d.c./d.c. converter is controlled as a function of the instantaneous fuel cell current in such a way that a brief current pulse is additionally input. The shape is stored in a control table and standardized to 1. The height of the pulse is dependent on the present fuel cell current and on the adaptive learning factor. The adaptive learning factor is determined continuously by observing the voltage profile when a flow switch occurs, and it corrects system induced variation and fluctuations. If the deviations exceed a specific limit this is stored as diagnostic information.
10
10
9
A further essential feature of the invention is the under voltage detection and, in conjunction therewith, an additive power input as a function of the fuel cell current by correspondingly regulating the d.c./d.c. converter . In a current generating system of the fuel cell, the profile of the voltage is dependent on a very large number of factors as a function of the load current. The dependencies are currently not all capable of being described or predicted mathematically. With the under-voltage regulator according to the invention as a component of the power management system it is possible to increase the reliability and availability of the system. In addition it is possible to react actively during operation to system properties which change adversely. As a result it is possible to increase the availability of the system and determine information for service and maintenance during operation. The main function of the under-voltage regulator according to the invention is to add power from the battery when a lower limiting value of the voltage is reached. In this context, the current balance is not taken into account. The regulator output outputs an additive current demand to the d.c./d.c. converter , and is dependent on the control error (ΔU) and the present load current.
A further component of the invention is a means of detecting how frequently and in which situations the regulator must intervene, for example as a function of the load variable, temperature, air pressure, and humidity (environmental conditions). Data for service and maintenance from this information is stored. When a specific frequency value is exceeded, (i.e., the regulator is >N times active per time unit), active interventions are performed in dynamics and maximum power is provided with the objective of ensuring the availability of the system. The restriction of the available power is suitably indicated to the driver.
10
Vehicle
Verf
The battery current proportion is controlled in such a way that the balancing of the current is always correct independently of changes in parameter of the overall system. The d.c. value of the drive system is of particular significance as an actual value. The necessary current proportion of the battery is calculated by balancing the actual current Iand the available current of the fuel cell system I. As a result, the regulation concept intentionally allows for continuous infringement of the current balance.
9
7
Although the actual value has a chronological delay, this method has proven significantly more suitable than calculating the setpoint values for the battery current proportion in advance. Although at first a reaction variable (drive current) must be present for the functioning of the method described, the method operates very effectively since the reaction time of the manipulated variable (battery current proportion controlled by means of the d.c./d.c. converter ) is significantly below the storage time constant of the fuel cell system (capacity of energy of the fuel cell system). The current balance of the fuel cell system is as a result ensured in an optimum way. The advantages lie in a precise energy balance, which is very important in particular for reformer systems. Basically a precise energy balance in the fuel cell system increases the efficiency and the service life of the reformer.
53
7
Given knowledge as to which quantities of energy are required with which dynamics, the dynamic power system can be controlled selectively, or the power demand can be suitably adapted to the fuel cell system .
In the case of ABS braking, the driven wheels may begin to slip. There are technical regulating methods which calculate a correction/increase torque in such a case, and transmit it to the drive. In response, the drive usually briefly accelerates the wheels in order to decrease the slip. As a result, the wheels may, for example, increase lateral guidance again. In this case, only a small quantity of energy and a power level which can be output by a correspondingly configured dynamic power system is necessary in a chronologically limited form (usually only in the case of the initiation of braking). The dynamics of the power which is made available must however be very high.
18
19
The method according to the invention is characterized in that the vehicle control unit and the power control unit process information or additionally acquire information themselves:
19
7
18
10
7
1. In the case described above the vehicle control unit feeds, for example, one bit “ABS active” to the power control unit . As a result, the “increasing” setpoint current demand which is transferred simultaneously is not passed on to the fuel cell system ; instead it “knows” that the demand is a short dynamic, chronologically limited demand of the vehicle control unit , and covers this demand best by means of a battery . Thus, the power of the nondynamic fuel cell system is not unnecessarily increased or decreased in the case of loads of this type.
18
53
2
7
there is an improvement in the efficiency level of the fuel cell system and a reduction in the consumption.
The service life of the fuel cell system is prolonged.
2
There is an improvement in the dynamics in comparison to a fixed time constant of the memory element PTnwhich “fits the fuel cell system”.
Improvement in exhaust gas.
2. The vehicle control unit switches the time constant of the limiter of the PTnelement to the smallest possible value which the dynamic power system can represent/follow. As a result:
Further application cases or information which is processed in a suitable way are:
19
7
53
there is an improvement in the efficiency level, reduction in consumption,
improvement in exhaust gas.
Economy/sporty mode “information bit”: Economy mode: lower power non-dynamic use of the dynamic power system. Sporty mode: opposite of the above. (Switch in the center console) stop and go mode: control determines by means of the torque data, current data, rotational speed data, velocity data and their differential quotients whether the operating mode is a stop and go operating mode (driving in a traffic jam). The power control unit then sets an “average” nondynamic setpoint current demand and switches on the fuel cell system . The “low power” acceleration and braking processes are covered by dynamic demand levels of the dynamic power system . As a result:
The foregoing disclosure has been set forth merely to illustrate the invention and is not intended to be limiting. Since modifications of the disclosed embodiments incorporating the spirit and substance of the invention may occur to persons skilled in the art, the invention should be construed to include everything within the scope of the appended claims and equivalents thereof. | |
Have you ever wondered why it’s so hard to break old habits? How about this question: How are our habits formed and what causes them to repeat themselves over and over again? While our knowledge is still woefully incomplete when it comes to the human brain, we know more today than at any other time in history.
Consider, for example, a part of our brain called the basal ganglia. While there is much we don’t know about this tiny little organ buried in our brain, we are starting to learn more about how this part of our brain functions relative to forming and executing habits. It has been consistently demonstrated that procedural learning and routine behaviors are run by this part of the brain.
We’ve learned that the basal ganglia operates to provide us with shortcuts to accomplish tasks so that we don’t have to start our thinking from scratch every time we perform an action or think through every little detail. Instead, this part of our brain remembers tasks to help us perform with less effort. So once you’ve done something a few times, the basal ganglia stores the actions which allows the execution to be automatic without you having to think about it.
The trouble lies in the fact that we forget about how a number of unwanted habits were formed in the first place. This can make it challenging to change habits unless we know how to rewire the various automatic programs that have become stored in the basal ganglia. Some researchers now call these programs “Habit Loops.” Again, the challenge is that these habit loops typically run without any conscious knowledge.
Yet if we breakdown how these habit loops are formed, we can alter them to create more desirable habits. Here is the essence of how a habit is formed:
1. A need, desire, or craving exists that you want to fulfill.
2. A trigger, stimuli, or cue initiates a specific habit program that has fulfilled this desire in the past.
3. A routine, set of actions, or behaviors is automatically performed in order to satisfy your craving as quickly as possible.
4. A reward or benefit is provided which serves to further strengthen the habit and keep the cycle spinning.
In essence, a loop program runs when it’s executed and continues to run as long as a reward is in place to keep it running. And since these habit loops serve deeply held needs or cravings of one kind or another, we can easily become trapped by habits unless we learn how to change them or establish new ones.
Remember Samuel Johnson’s famous quote: “The chains of habit are too weak to be felt until they are too strong to be broken.” While there is great truth is this quote, it shouldn’t discourage you from changing unwanted habits. The chains of a habit can be broken!
Indeed, a habit can be rewired. The question is how?
First of all, remind yourself that your habit has four parts as previously discussed including the craving, trigger, routine, and reward. This means you need to examine each element of a habit so you can begin the rewiring process. So ask yourself these four questions to uncover what’s driving your habit:
1. What desire, need, or craving am I trying to fulfill?
2. What triggers, stimuli, or cues remind me of my desire or need or craving?
3. What automatic routine, behavior, or set of actions am I performing without even thinking about it?
4. What reward am I experiencing from this habit?
Once you’ve answered those four questions, you are ready to attack the habit head on using the following four questions:
1. What is the best way to satisfy my desire, need, or craving?
2. What do I need to remember when the cue or trigger for the craving presents itself?
3. What new behavior, action, or routine would better serve me?
4. How can I reward myself at an even higher level than the old reward?
Consider the problem of overeating or eating the wrong things. It starts with the desire, need, or craving we all share for food. This craving is not going away because we have to eat to survive. The question is what program are you running to fulfill this need? When you are triggered by natural feelings of hunger, do you reach for a candy bar or an apple? You’ll get a reward from eating anything that you enjoy but the question is what have you trained yourself to enjoy, a candy bar or an apple? The difference between the two is huge.
Here’s another example, take the need for certainty that we all share. Without some predictability in our environment, it’s difficult to even function in life. But the question is how to fulfill your need for certainly? Are you fulfilling your need in a way that’s good for you, good for others, and serves the greater good?
Consider someone who desires certainty. The focus becomes one of trying to control things in the world that could take away control. It might look like this:
1. CRAVING = Certainty (You want to be in total control of your life.)
2. TRIGGER = Something from the environment looks like it will take away your control. (A stock market crash would dramatically change your net worth.)
3. ROUTINE = You sense some danger in the world which alerts you of the need to respond which might even include activating your “fight or flight response” if the danger seems serious enough. (You become tense and agitated by news that the economy and stock market are on the verge of collapse so you start thinking about changes you might need to make to your portfolio.)
4. REWARD = You feel a sense of relief if you can come up with a solution. (You develop a diversified portfolio that takes into consideration all of the things that can happen including inflation, deflation, prosperity, or crash. However, the fact of the matter is that you can’t control the stock market so even with an intelligent plan you become stuck in the loop of trying to solve something you can’t ultimately control. You can become so stuck that eventually this pattern leads you to depression, anxiety, and Obsessive Compulsive Disorder or OCD. In fact, the OCD causes you to keep running this loop endlessly until a full-blown panic attack completely immobilizes you.)
So what’s the solution? You need a new habit loop or habit program.
Here’s an example of new code or programming you could install into your current habit loop:
1. CRAVING = Certainty
2. TRIGGER = Something from the environment looks like it will take away my control.
3. ROUTINE = You need to think clearly and rationally about the perceived problem and decide if it’s something you can control or influence. This involves adding a new “If-Then-Else Statement” in the code which goes something like this: “If I can control or influence the situation, then execute the solution. If I can’t control or influence the situation, then execute the else part of the program which means I need to relax and let it be.”
4. REWARD = You transform the energy of the “fight or flight response” with the corresponding hormones into positive energy for action or peaceful energy for relaxation.
After testing this new code for a few days or weeks, you’ll discover that it allows you to control the things that are in your power to control while accepting the things that are outside of your power to control. You then continue running this new code until it completely replaces the old habit loop so that your basal ganglia will now run the new habit for you automatically.
So think about the habit loops running in your life that perhaps need to be tweaked, altered, or completely rewritten.
If you’d like some help breaking an unwanted habit, consider signing up for a FREE coaching session to uncover your current program and then get the help you need to create some better code. | https://www.stuberg.com/category/problems/page/2/ |
Actualmente, este contenido solo está disponible en inglés.
the firm of joseph and son
"Your house...shall stand firm forever." —2 Samuel 7:16
St. Joseph, the carpenter (Mt 13:55), may have helped build houses. Surely he desired for the houses he built to "stand firm forever" (2 Sm 7:16).
Jesus, Joseph's Foster-Son, was also a Carpenter (Mk 6:3). Like His foster-father, Jesus was interested in houses that stand firm. Jesus concluded His most famous discourse by saying that anyone who obeyed His words would be like the builder who built a house that would firmly withstand any disaster (Mt 7:24-25).
How firm is your spiritual house? Have you built your family's life on the rock-solid word of God? Is your house and your life built into the Church, the house of God? (Eph 2:21-22) Is Jesus the Foundation of your life? (1 Cor 3:10-11)
Joseph the builder was a man of unshakable, firm faith. He was firm in the severe trials of his life because his faith was firm (cf Is 7:9). The Catholic Church has named St. Joseph as the patron of the universal Church. Like the Church, place your life under the protection of Joseph and Jesus. Jesus is the same now as He was when He worked side-by-side with Joseph (Heb 13:8). Jesus is still working with Joseph to build your life into a house that will last forever.
Prayer: Jesus, build me into Your house (1 Pt 2:5). I would rather be a small, unseen part of Your house than be popular (Ps 84:11).
Promise: "All depends on faith, everything is grace." —Rm 4:16
Praise: St. Joseph opened himself totally to the love of God and was paid back immeasurably.
Reference: (This teaching was submitted by a member of our editorial team.)
Rescript: †Most Reverend Daniel E. Pilarczyk, Archbishop of the Archdiocese of Cincinnati, August 16, 2005
The Nihil Obstat ("Permission to Publish") is a declaration that a book or pamphlet is considered to be free of doctrinal or moral error. It is not implied that those who have granted the Nihil Obstat agree with the contents, opinions, or statements expressed. | https://es.presentationministries.com/series/obob/obob-2006-3-20-en |
When an insolvency question arises, it is vital for clients to engage capable and experienced counsel to navigate the complex issues involved. The attorneys in Bryan Cave Leighton Paisner’s Restructuring and Insolvency practice group are located and practice in the United States, the United Kingdom, Europe, and Middle East, and provide a range of business-advisory and crisis-management skills, including insightful and practical guidance to parties in situations where companies face the risks and implications of insolvency. Our team regularly advises on a wide range of financial, corporate, and real estate restructuring and insolvency matters, and with a particular focus on multi-jurisdictional, highly complex, and challenging cases.
Members of our restructuring practice have long been known for their creative problem-solving abilities, responsiveness and networks with financial institutions, restructuring advisors, and other attorneys. The combination of these resources allows us to develop the most appropriate business solutions based upon our clients’ needs and goals. We have the ability and experience to resolve, promptly and cost-effectively, novel and difficult legal issues in restructurings, out-of-court loan workouts, Chapter 11 reorganizations, distressed sales, litigation matters and other insolvency proceedings.
The breadth of our team’s experience allows us to address problems with an interdisciplinary approach. We also regularly draw upon the experience of other attorneys in our firm, including those focusing on antitrust, employee benefits, insurance, mergers and acquisitions, securities, tax and various litigation disciplines. | https://www.bclplaw.com/en-US/practices/finance/restructuring-and-insolvency/index.html |
Last month we looked at the spectacular prominences, and noted although massive compared to Earth, they pose only a limited hazard to either space equipment or the Earth. The much larger Coronal Mass Ejections (CMEs) and the very high energy flares however do not have the same benign features; and they can pose a real threat.
Les éjections de masse coronale
Le mois dernier nous avons considéré les protrubérances spectaculaires et nous avons remarqué qu’elles ne posent pas une grande menace à la Terre ou à l’infrastructure spatiale. Toutefois les éjections de masse coronale (qui sont plus grandes) et les éruptions solaires sont plus dangéreuses.
The Solar Influences Data Centre (SIDC) of the Royal Observatory Belgium produces daily reports of the Sun’s activity, with CME and flare activity always being noted. You may have seen our sharing of data and news when an Earth directed CME has been observed. In our blog this month we look at the nature of CMEs.
Le SIDC de l’Observatoire royal de Belgique produit des reportages journaliers de l’activité solaire y compris les EMCs et les éruptions solaires. Cette semaine dans notre blog nous considérons la nature des EMCs.
Coronal mass ejection (CME) is the group name for discrete expulsion of matter from the corona (rather than the continuous expulsion of e.g. the solar wind). We have seen how events such as prominences can feed matter into the chromosphere and corona but a CME is where material is accelerated to sufficient velocities that matter escapes from the gravitational confines of the Sun.
CMEs are massive, ‘explosive’, high energy events. They have been the topic of active research and study since their first confirmed detection in December 1971 by NASA’s Orbiting Solar Observatory (OSO-7). They can, and do, have a significant effect on space-weather and Earth’s magnetosphere.
CMEs are generally observed using coronagraphs and the larger (‘halo’ CMEs) are always observed by this means. The use of specialised solar satellites has enabled detailed study of both their nature and sources. For example, the Large Angle and Spectrometric Coronagraph (LASCO) instrument on board the SOHO (Solar and Heliospheric Observatory) satellite has provided extensive observations of these phenomena since its launch in December 1995.
CMEs are ejections of plasma in a bulbous form, and they occur throughout the solar cycle. Their frequency matches closely the solar cycle and varies from ~0.2 (at solar min) to 4.5 (at solar max) per day. Expulsion velocities and thermal energies also vary in line with cycle with CMEs at solar maximum approximately twice as energetic than those at are seen solar minimum. For example, ‘average’ eruption velocities are 550 and 250 km/s respectively.
Coronal mass ejection (September 2014)
Image taken at 304Å (an emission line of helium within the Extreme Ultra Violet (EUV) part of the spectrum) by the Atmospheric Imaging Assembly (AIA) instrument on the Solar Dynamics Observatory.
(Courtesy of NASA/SDO)
A small group of CMEs are classed as ‘halo’ CMEs. These are when the angular width of the CME (which within a coronagraph looks a little like the shape of a traditional electric light bulb) exceeds 100º. Of the CMEs observed by LASCO during cycle 23, approximately 15% were classed as Halo by this definition. Halo CMEs are the larger class of CMEs.
Coronal Streamers and CME
(Courtesy of NASA/Trace mission)
Plasma is expelled at high velocity within a CME event; ranging from 100 to around 1000 km/s for the ‘smaller’ CME, and up to well in excess of 2000 km/s for the largest 5% of CMEs. The average and highest velocities recorded by LASCO during cycle 23 were 470 and 3340 km/s respectively. Halo CMEs velocities average close to 1,000 km/s. Kinetic energies (per CME) range from 1020 to 1026 Joules (kg m**2/s**2). Corresponding mass ejections range 10**9 to 10**13 kg. Overall averages, based upon the LASCO cycle-23 observations are ~ 5 x 10**22 joules and ~4 x 10**11 kg respectively.
Whilst four billion tons of plasma may appear, and is to us mere humans, rather a large amount of matter, in context it is insignificant. It is about half of one-billionth of the mass of the Earth’s moon. When comparing this to the Sun’s mass loss due to the solar wind and due to energy production by fusion, we can see that CMEs are rather more important to humankind and Earth than to the Sun.
The high kinetic energies within CMEs are matched by their high thermal energies. They have typical temperatures of the order of a few million Kelvin.
There appear to be three principal sources for CMEs: eruptive (spray) prominences; flares with associate mass ejection; and the evolution of long-term filaments (disparition brusque). Less than half of all flares give rise to mass ejections. The ones that do are the cooler flares and produce less intense radiation. Disparition brusque is the name given to the rapid (a few hours) evolution of a hitherto relatively stable quiescent filament. The internal velocities of the filament begin to rise, and the filament rapidly ascends, increasing velocities as it does until an expulsion (the CME) occurs (when the velocities exceed the photospheric altitudinal escape velocity).
The root cause of CMEs, especially their very high energies, temperatures and velocities, continues to be an area of active research. The gradual build-up of instabilities within the magnetic field of the corona, caused by sporadic and systematic changes within the magnetic field of both the photosphere and convection layer, is currently thought to be significant but to date no comprehensive model is available or agreed amongst solar physicists.
Today’s Sun
The Sun is currently at the solar cycle minimum and has been unusually quiescent over the past few months. However, the solar activity will develop over the next few months and year so keep an eye out for our bulletins where we promote and distribute the SIDC alerts!
As usual, we can recommend our book on the Sun for those readers who would find out more about CMEs and indeed each of the topics covered within this blog series.
Finally, we would like to wish our all our readers a very happy and peaceful new year.
Le Soleil aujourd’hui
Actuellement le Soleil connaît une activité minimale, mais l’activité solaire recommencera dans les prochains mois. Regardez donc nos bulletins de nouvelles où nous publions des alertes du SIDC.
Comme d’habitude nous recommendons notre livre sur le Soleil pour ceux qui voudraient savoir plus sur les EMCs et les autres sujets couverts par ce blog.
Enfin nous souhaitons à tous nos lectures une très bonne année!
|
|
Previously... | https://www.observatoiresolaire.eu/monthly-blog/archives/12-2018 |
By Elizabeth Hancq -- Yesterday, the Treatment Advocacy Center released a 2020 update to its landmark report, Grading the states: An analysis of involuntary psychiatric treatment laws. The report represents the results of Treatment Advocacy Center staff’s evaluation and grading of the involuntary treatment laws in all 50 states and the District of Columbia, updating state report cards with any changes to the state laws since the report’s original release in September 2018.
Each state has been graded based on a variety of different factors regarding its law and whether it permits someone who may need involuntary evaluation or treatment to receive it in a timely and effective manner. This analysis is purely based on the laws themselves, not how they are implemented in practice. However, the Treatment Advocacy Center believes that state commitment laws form the foundation for how the mental health system is built and is an important starting point for reform.
The analysis found that six states (Alabama, Delaware, Georgia, Oklahoma, Pennsylvania and Tennessee) have an outdated requirement that harm to self or others be imminent for a person to qualify for inpatient commitment. The Treatment Advocacy Center recommends that inpatient criteria should not require that danger or harm be imminent for eligibility because this inevitably leads to criminalization of the illness.
In fact, previous research has indicated that laws that require an individual to present an imminent danger to self or others before they can meet criteria leads to the criminalization of mental illness, resulting in the vast overrepresentation of people with mental illness in every stage of the criminal justice system.
An article published earlier this year in CNS Spectrums by late Treatment Advocacy Center board member Dr. H. Richard Lamb details the factors that have led to the criminalization of individuals with serious mental illness and strategies for how it is being addressed.
“The failure of the mental health system to provide a sufficient range of timely interventions, including an adequate number of psychiatric inpatient beds, has contributed greatly to persons with serious mental illness entering the criminal justice system,” Dr. Lamb and his coauthor, Linda Weinberger, write.
In addition to the deinstitutionalization movement and resulting shortage of inpatient psychiatric beds we have today, contributing to the criminalization of serious mental illness is the restrictive and outdated state civil commitment laws, they argue. Restrictive civil commitment laws result in fewer and shorter commitments, resulting in patients being discharged from psychiatric hospitals because they no longer meet the criteria. Too often, these patients are released into the community without the resources to help them adjust.
“They may have had difficulties maintaining psychiatric stability, controlling their impulses, living in unstructured community settings, and adopting to the demands of community living,” the authors write. “Thus, some of these individuals might have decompensated to the point where they committed criminal acts and entered the criminal justice system.”
Lamb and Weinberger suggest that decriminalizing persons with serious mental illness requires providing treatment and support services to individuals in the community to prevent their entering into the criminal justice system at all, a core tenant to the Treatment Advocacy Center’s work.
To see your state’s grade and how to improve access to treatment for people with serious mental illness, read the full Grading the States report here.
References:
- Dailey, L., et al. (2020, September). Grading the states. An analysis of involuntary psychiatric treatment laws. Treatment Advocacy Center.
- Lamb, H. R. & Weinberger, L. E. (2020, April). Deinstitutionalization and other factors in the criminalization of persons with serious mental illness and how it is being addressed. CNS Spectrums. | http://blackdisability.org/content/beyond-%E2%80%98grading-states%E2%80%99-and-progressing-toward-decriminalizing-severe-mental-illness |
I am a philosopher at Fordham University in New York City.
Questions about improving human judgment and inquiry are central to my research. During times of conflict and uncertainty in society, problems of knowledge and rational opinion bubble up to the surface: What do we know? Whom should we trust? How can we improve our beliefs? It’s the traditional mandate of epistemology to grapple with such questions, and my research aims to give inquirers good cognitive advice by blending philosophical reflection with insights from the sciences.
In Knowing Our Limits (Oxford University Press, September 2019), I describe a multidisciplinary approach for thinking about controversial topics, helping us distinguish between our reasonable and unreasonable opinions. I am pursing new work on the dynamics of open-minded inquiry, the nature of conformist thinking, the use of “moral shock” as a persuasion technique, and issues of trust and distrust in experts.
With the psychologist David Dunning, I have co-edited a collection of new essays by epistemologists and psychologists, due out from Oxford University Press in 2020. The volume is entitled Reason, Bias, and Inquiry: New Perspectives from the Crossroads of Epistemology and Psychology.
Beyond epistemology, I am interested in ethics, environmental ethics, and the history of philosophy (especially the 20th century in the United States and 17th century in Europe). I’ve collaborated with lots of philosophers and scientists, including psychologists at the University of Southern California’s Mind and Society Center and UC Irvine’s Hot Cognition Lab.
I am also an Executive Editor of the Canadian Journal of Philosophy, where I handle submissions on epistemology. | https://faculty.fordham.edu/nballantyne/ |
Ambient air pollution at concentrations below the limits set by current regulatory standards is associated with significant adverse effects on children's respiratory health. A growing number of studies demonstrate that particulate matter (PM) and traffic-related near-roadway air pollutants (NRP) have substantial adverse health impacts, and that asthma and epigenetic or genetic sequence variants may increase susceptibility for air pollution-associated deficits in lung growth, bronchitis symptoms, and development and/or exacerbation of asthma. Intensive public health and regulatory interventions have reduced current levels of PM, ozone and NO2. It is unknown whether the reduced levels of the current ambient air pollution mixture are sufficient to protect children's health. Improved approaches for early detection of these chronic effects at the population level are needed to guide effective public health and regulatory interventions and to assure that children are fully protected from long-term adverse effects due to these air pollution exposures. One promising approach for population-based early detection is the use of exhaled nitric oxide (FeNO). FeNO50 is associated with acute adverse respiratory effects and is modulated by short-term acute changes in air pollution exposure. Furthermore, the proximal and distal airways may be focal points for adverse chronic effects of PM2.5, and NRP. We have developed new methods to characterize responses in the proximal and distal airway compartments using extended exhaled nitric oxide parameters [proximal bronchial wall flux (J'awNO), distal alveolar NO concentration (CANO)]. In this application, we propose to investigate the utility of FeNO for detecting the early effects of chronic exposures to air pollution, using data on long-term air pollution, FeNO, epigenetic and genetic variants in NOS2, and health outcomes measured longitudinally in the southern California Children's Health Study, an ongoing prospective population-based cohort study of environmental determinants of respiratory health in southern California children. Over 7 years of follow-up, which coincided with substantial reductions in levels of air pollution in southern California, we have collected more than 13,000 longitudinal measurements of FeNO50. We hypothesize that 1) FeNO50 and CANO can be used for early detection of chronic health effects from long-term exposure to PM2.5 and elemental carbon, EC2.5 (a measure of NRP); and 2) that early detection of chronic effects can be enhanced using epigenetic (DNA CpG methylation) and cis genetic sequence variants in NOS2 that are synergistically associated with both acute and chronic differences in FeNO50, J'awNO, CANO, and increased susceptibility to EC2.5 and PM2.5. The results from this program of research will fill crucial gaps in our ability to rapidly identify chronic effects of air pollution in the periodbefore irreversible adverse respiratory effects occur.
| |
As I turned the "big 5-O" a couple of weeks ago, and chuckled as I received my first invitation in the mail to join AARP, I reflected on the importance of health and fitness in my life and that of my children, and on how much it pains me to see so many children these days who are overweight and obese. It also got me thinking about the ways in which dads can make a difference in the fight against childhood obesity.
Being active has been a vital part of my life since I can remember. I played baseball, football, and golf as a child. I'm not sure where the drive to be so active came from. Neither of my parents were active, and they didn't encourage me to be either. I just loved being outside all day, getting dirty, and playing pick-up games in the neighborhood.
When I stopped playing organized sports after high school, I continued to be active in college through intramurals. Because I was fast, several of my fraternity brothers who played soccer in high school recruited me to play on our fraternity's soccer team, which kindled a passion for the sport that remains today. In graduate school, I engaged in what was the beginning of the health and fitness craze of the 1980s. (Are you old enough to remember Physical -- as in "Let's get physical, physical!" -- by Olivia Newton-John?) I ran, swam, biked, and lifted my way to my master's degree. I continued to regularly exercise after graduate school, got married, and had kids.
As soon as I started my fatherhood journey, I committed to not let any grass grow under my daughters' feet as far as being active was concerned. Perhaps what drove me more than anything else to ingrain in them the importance of health and fitness was the memory of the struggles my parents and my younger brother had maintaining a healthy weight. I desperately wanted to break that cycle. I placed a soccer ball at their feet soon after they started to walk and enrolled them in organized soccer by age 4. I took them to watch my road races and entered them in races soon thereafter. As someone who understands the importance of self-awareness -- the first characteristic of a 24/7 Dad -- it's been difficult for me to encourage them to be active in their own way and to let go of the process. I only hope that the model of my dedication to health and fitness has rubbed off. Fortunately, my girls have maintained a healthy weight throughout their childhood and, for my oldest, into early adulthood.
I'm sure it's not news to you that childhood obesity is a major problem in this country. You've undoubtedly seen its consequences in some of the families you know--perhaps even in your own family. According to the Centers for Disease Control, approximately 17 percent of children -- some 12.7 million -- are obese. Many more (around 1 in 3 or 4) are overweight and on the road to becoming obese. Obesity is one of the primary drivers of the rise among children in type 2 diabetes, which typically doesn't develop until adulthood. Obesity places children at risk for a lifetime of poor health.
What might be news to you, however, is that your simple presence and involvement in the life of your child is one of the most potent weapons in the fight against childhood obesity. Research shows that family structure matters a great deal when it comes to the prevalence of childhood obesity. Children from single-mother families are at higher risk for obesity than children living with two parents. Moreover, studies show that a father's body mass index (BMI) -- the primary and, somewhat controversial, metric for determining whether someone is at a healthy weight -- predicts his children's BMI. Obese dads are more likely to have obese children. Other studies reveal that how well fathers eat and their level of activity directly affects their children's weight. When fathers (and mothers) create an environment that promotes obesity, their children are more likely to become obese.
1) Examine your eating habits and level of exercise and improve them if necessary. You must model good eating habits and regular exercise. Otherwise, your children, especially if they're in their teens, will see you as a hypocrite if you tell them to improve their eating habits and become more active.
2) Get involved in an active way in your child's life. There are many ways to get involved, but to directly affect your child's activity level, you must do things together that require regular physical activity. Find things you and your child enjoy doing that you can repeat often.
3) Eat meals together. Studies show that simply eating meals as a family lowers the risk of childhood obesity. But you must eat at least three meals together on a weekly basis to make a difference.
4) Enroll your child in a team or individual sport. Studies show that children who play organized sports are less likely to be overweight.
5) Encourage mom to examine her eating habits and level of exercise and improve them if necessary. It's better to have two good models than only one. Applying this tip might be easier said than done, but it's vital you have the courage to challenge mom if she doesn't set a good example in this regard.
For more tips on raising healthy kids, check out our downloadable guide Tips for Raising Healthy Kids.
Question > When was the last time you talked with your child about the importance of regular exercise? | https://www.fatherhood.org/fatherhood/5-tips-to-help-your-children-maintain-a-healthy-weight |
Across the continental United States, one can identify 20 distinct forest cover types. Most of these are to be found on federal lands managed by the U.S. Forest Service and Bureau of Land Management. Those responsible for the management of trees that form the 20 different cover types and the diversity of forest wildlife that reside in them must have a solid grounding in concepts of forest management, especially silviculture, as well as concepts of wildlife management, in order to integrate both as part of any effective natural resource management plan.
Forest Wildlife Ecology and Habitat Management provides both foresters and wildlife biologists responsible for managing forest resources with an integrated understanding of the relationship between forests and wildlife. Based on David Patton’s 50 years of experience as a forester and wildlife biologist, the book shows readers how to look at forests as ecological systems and wildlife as part of the energy flow and nutrient cycling process within those systems. He offers readers a fundamental understanding of the natural processes that occur in a forest taking into consideration vegetation, water, and the natural effects of climate and time. He then provides a biological perspective on wildlife, discussing reproduction, behavior, feeding habits, and mobility. He also discusses the various influences on forests and wildlife by both natural and human-caused events. | https://www.routledge.com/Forest-Wildlife-Ecology-and-Habitat-Management/Patton/p/book/9781439837023 |
Three College of Human Ecology programs were recognized for outstanding achievements in student learning assessment recently at the Office of Assessment’s fall 2011 showcase.
Marriage and family therapy was awarded for outstanding leadership and initiative in student learning assessment.
“Dr. Sandra Stith and her marriage and family therapy program faculty colleagues received their award for their ability to evaluate and document their graduate student courses and students' achievements of very specific learning outcomes, and for doing that in the context of a nationally accredited program,” Maurice MacDonald, director of the School of Family Studies and Human Services.
Personal financial planning was honored for a well-designed assessment process that demonstrates program improvement.
“John Grable, Kristy Archuleta, and Sonya Britt were recognized for their careful work to develop a process to monitor the proficiency levels of the students in our PFP doctoral program, which is a hybrid distance education-summer intensive program,” MacDonald commented. “Their creativity for using assessments within courses and aspects of their research teams' progress is outstanding.”
Interior design was recognized for program improvement resulting from faculty discussions of assessments.
“The interior design program faculty continuously assess student learning and apply what they learn to their teaching. Their consistent effort advances the quality of education for interior design students,” said Barbara Anderson, acting head of the Department of Apparel, Textiles and Interior Design.
Other awards went to sociology; American ethnic studies; communications studies; food science and industry; Brian Kovar with the Department of Management; Dixie Schierlman, associate dean of student life at K-State Salina; and Levi Esses, assistant director of student life at K-State Salina.
Session information, as well as copies of presentations, may be accessed through the Office of Assessment website.
Prepared by Human Ecology communications
This article was posted on Tuesday, November 15, 2011, and is filed under Applied Human Sciences, College News, Interior Design and Fashion Studies. | https://www.hhs.k-state.edu/news/2011/11/15/three-programs-recognized-for-assessment-work/ |
The utility model discloses a shuttlecock capable of emitting light and producing sound at night, which relates to the technical field of shuttlecocks and comprises a shuttlecock head, feathers are inserted at the upper end of the shuttlecock head, a power supply battery is fixed inside the shuttlecock head, and the positive electrode of the power supply battery is connected with a lamp holder and the positive electrode of a buzzer through lines. The negative electrode of the lamp holder and the negative electrode of the buzzer are connected with one end of a control switch through circuits, the negative electrode of the power supply battery is connected with the other end of the control switch through a circuit, the lamp holder and the buzzer are controlled to be powered on through the control switch, and a user can be reminded through light and sound when the shuttlecock is used at night. The badminton can be conveniently used for playing at night, and site limitation of the badminton is reduced. | |
A TEESSIDE woman has been banned from keeping animals for life after starving her dog to death.
Laura Whitfield allowed her female Staffordshire bull terrier-type animal to perish at her Stockton home.
The RSPCA slammed her actions - describing them as “beyond comprehension”.
The body of Meg had been found in a utility room by workmen decorating Whitfield’s house.
She was virtually skin and bones. The Gazette has been passed photographs of the dog but has chosen not to print them due to their content.
Whitfield, of Wrekenton Close, Hardwick, was sentenced at Hartlepool Magistrates’ Court earlier this week.
The 26-year-old pleaded guilty at an earlier hearing to causing unnecessary suffering to the dog, by failing to provide a balanced diet.
She was banned from keeping animals for life with no appeal.
Whitfield was also given a 12-week jail sentence, suspended for 12 months, and a 12-month supervision order.
RPCA inspector Lucy Hoehne described the death as a “really shocking case”.
She said: “This dog was literally shut in a room and left to die while her owner got on with life. Meg had obviously been starved - she was literally skin and bones and her eyes were sunken in her head. Starvation is a slow and terrible death and she would have suffered a great deal.
“How someone can allow such an awful thing to happen to an animal in a room of their house is beyond comprehension.”
The dog was discovered in July last year. After seeking advice from their manager, workmen at the house took photos of Meg and left the property before calling the RSPCA. By the time inspector Hoehne arrived the body was gone.
But she praised the workmen’s actions - and believes that the case would not otherwise have come to light. “Whitfield didn’t admit responsibility until right at the last minute, as the trial was about to begin,” she said. “In fact, the dog’s body has never been found. If those workmen hadn’t done what they did we probably wouldn’t have been able to bring this case to court.
“We’re very grateful to them for their commitment to helping us to ensure no further animals will suffer because of Whitfield’s actions, or lack of them.”
In mitigation, the court heard that Whitfield was struggling to cope with the responsibilities of a family after splitting with her partner and that the dog wasn’t a priority. | https://www.gazettelive.co.uk/news/local-news/life-ban-stockton-woman-who-3683248 |
It is not only important for the Human Resources students or professionals, but also for everyone who wants to build a successful career as well. I understood the purposes and use of employment interviews during a selection process, and also, how to ask standard questions during the job interview, among others. Moreover, I could have the chance to be familiar with questions which may be used as an interviewer or interviewee and that would contribute to my performance in both situations. To illustrate that, we were given an assignment which is an interview practicum and for that, I realized the importance of it, once the task led me to analyze a job posting, cover letter, resume, and also to consider the appropriate questions for a job interview. Personal Learning - Journal - Dec 8th, 2017
Hi there I 'm Denise Richardson and this is howdenni.com. If you want to learn how to ace a job interview, stay tuned we 're about to talk about it with Maggie Mistal, who 's a life purposing career coach who can be heard regularly on Martha Stewart Living Radio on Sirius. Thank you so much for being with us. You show up, you 're dressed properly, you walk in to meet the interview. What 's the first thing you do when you walk in?
The faculty member I interview was Mary Menninger-Corder, a nursing professor. Mary was born and raised in California. She studied History at Berkeley University, then came to Washburn University in August of 1976. She started studying Nursing because they had an accelerated program for that. She then moved to New York City, and worked at the 1800 Bin hospital for awhile, then she moved back to Topeka, KS to find her job.
Motivational Interviewing is a patient centred approach which strengthens the patient’s motivation for and movement toward a specific goal by exploring and resolving ambivalence (Hettema et al. 2005). In the scenario in my digital recording, for example: the patient’s goal is to cut down/stopping drinking alcohol. A Nurse’s empathic and collaborative approach to this conversation technique supports the eliciting and discovering of the patient’s personal reasons to change (Miller & Rollnick, 2012). Four guiding principles (R.U.L.E) were devised in order for effective Motivational Interviewing to occur; resist the righting reflex, understand and explore patient’s own motivations, listen with empathy and empower patient providing hope and encouragement
After one candidate is sorted out from the interview, then need to call him/her for finalising what is he/she expecting from the organisation and what organisation is expecting from him/her and finalising all the deals like salary and accommodation. The Executive Human Resource Manager plays a vital part in selection process. Mostly all the process in the selection and recruiting are done by HR Manager and also responsible in selection of the suitable candidate. Legal, Regulatory and Ethical consideration in Selection process and their implications Selection Selection is the process of selecting a qualified person to the required job who can successfully do the job and deliver valuable contributions to the organisation.
Selection methods deal with the candidate’s applications and resumes, interviews, reference checks, background checks, cognitive ability tests, performance tests, and integrity tests (Bateman & Snell, 2013, pp. 185-187). Throughout the selection process on the video, there were two applicants that were interviewed: Jacqueline and Sonya. The three key components that Robert was looking for was business experience, education, and personality qualities.
Imagine if you had a job interview. Would you arrive without any preparation and hope luck would land you the job, or would you learn about the position, the company and the required qualifications, and arrive fully prepared and confident. I know what choice I would choose.
Despite
Assignment 4 – Interview Questions 1. Tell me about yourself. I am a good listener, an effective negotiator, and a fast and effective problem solver. I enjoy interacting with customers to promote products and services to customers, answer customer questions, and resolve product and service related problems. 2.
As a Human Service major what better way to learn more about the profession than from someone who has experience in the field. I chose to interview a friend of mine, Florence Martus. Mrs. Martus is employed through the city of Fredericksburg, VA with the Department of Social Services. This agency is located at 608 Jackson St, Suite 100 Fredericksburg, VA 22401. Virginia Department of Social Services provides many services to the public such as, Temporary Assistance for Needy Families (TANF), Supplemental Nutrition Assistance Program (SNAP), Medicaid, Adoption, Child Care Assistance, Refugee Resettlement Service, and Child and Adult Protective Services. From conducting this interview I have learned how much the Department of Social Services
Holding an RHA position requires a plethora of skills in leadership, personal balance, academic balance, professional balance, and communication. Currently I am seeking a future in the Resident Assistant (RA) positon which will allow me to learn and utilize these skills when providing conflict resolution and creating relationships within my hall. In order to get a better understanding of many different aspects that go into being an RA, I interviewed a current RA named Bayleigh____ and asked her about the several different factors that relate to her personal life and the job itself. She explained her position and how it directly affected her life as a student as well as the personal challenges she faced regularly. The interview provided me with
When I interviewed Larnette Gonzales a Front Desk Coordinator at an emergency addiction center I was a bit eager to hear her concerns and opinions about working in a high paced medical environment. I learned that being a front desk coordinator is not a stress free career in an addiction healthcare setting, because you are dealing with many people with all sorts of mental and medical problems. I would have to say that Larnette has a lot of patience when it comes to the barriers she stated when the patient is being checked in with a family member or is still at the denial stage of their addiction. I did learn that in order for a hospital, clinic, or any health care environment the team leader of a Physician has to set the example for the rest of the staff to follow. For example, Larnette stated that they have weekly meeting and they are able to state their concerns without any harsh criticisms and the Physician tries to set up weekly lucheons, so that they can have a good work place and personal relationship with one another and come together as a family.
Introduction Motivational interviewing is a collaborative, person-centred form of communication which focuses on the language of change. ‘It is designed to strengthen personal motivation for and commitment to a specific goal by eliciting and exploring the person’s own reasons for change within an atmosphere of acceptance and compassion’ (Miller et al., 2013, p.29). The technique of motivational interviewing was developed by two psychologists, Bill Miller and Steve Rollnick. Motivational interviewing is therapeutic to patients as it is based on a partnership, rather than a nurse-patient relationship (Heckman et al., 2010). There are four processes of motivational interviewing; engaging, focusing, evoking and planning.
This will help to communicate in different situation. As a leader from one person to hundred persons (live or on TV, radio, internet) are watching or listening, it’s very difficult to stand in each of them expectation. Because each of them have their own perception about your speaking. So you must developed negotiation skill in vast sense in term to win a situation and make sure that you know your bottom line.
Interview techniques focus on active listening skills. Those who have their backs against the wall, please go outside the room. The rest stays in the room. Those who are outside are briefed shortly. The rest is the inside group. | https://www.ipl.org/essay/Persuasive-Speech-How-To-Preparing-A-Phone-FJECVWGKK5G |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.