content
stringlengths 0
1.88M
| url
stringlengths 0
5.28k
|
---|---|
In this paper, we propose a novel method for magnetic resonance imaging based Alzheimer's disease (AD) or mild cognitive impairment (MCI) diagnosis that systematically integrates voxel-based, region-based, and patch-based approaches into a unified framework. Specifically, we parcellate the brain into predefined regions based on anatomical knowledge (i.e., templates) and derive complex nonlinear relationships among voxels, whose intensities denote volumetric measurements, within each region. Unlike existing methods that use cubical or rectangular shapes, we consider the anatomical shapes of regions as atypical patches. Using complex nonlinear relationships among voxels in each region learned by deep neural networks, we extract a “regional abnormality representation.” We then make a final clinical decision by integrating the regional abnormality representations over the entire brain. It is noteworthy that the regional abnormality representations allow us to interpret and understand the symptomatic observations of a subject with AD or MCI by mapping and visualizing these observations in the brain space. On the baseline MRI dataset from the Alzheimer's Disease Neuroimaging Initiative (ADNI) cohort, our method achieves state-of-the-art performance for four binary classification tasks and one three-class classification task. Additionally, we conducted exhaustive experiments and analysis to validate the efficacy and potential of our method. | https://koreauniv.pure.elsevier.com/en/publications/toward-an-interpretable-alzheimers-disease-diagnostic-model-with- |
The results of the evaluation are as follows :
Number of proposals submitted : 56
Number of inadmissible proposals : 4
Number of ineligible proposals : 3
Number of above threshold proposals : 24
Total budget requested for the above threshold proposals : EUR 3.455.477, 80
We informed the applicants about the evaluation results for their proposals on 29/11/2021.
For questions, please contact : [email protected]
Jul 29, 2021 12:33:14 PM
Call ERASMUS-YOUTH-2021-YOUTH-TOG-LOT1 has closed on the 24 June 2021.
56 proposals have been submitted.
Evaluation results are expected to be communicated in December 2021.
In the last hours before the deadline, we have been informed about some possible technical problems when accessing and filling in the Fom C. As this Form is mandatory, in order to be able to take this issue into account, you are invited to keep screenshots (with date and time clearly visibles) of any blocking error message, which may avoid you to submit your application within the deadline. You must contact the IT Helpdesk immediately.
Jul 15, 2021 9:50:35 AM
Call ERASMUS-YOUTH-2021-YOUTH-TOG-LOT1 has closed on the 24 June 2021.
56 proposals have been submitted.
Evaluation results are expected to be communicated in December 2021.
Jun 24, 2021 5:51:24 AM
In the last hours before the deadline, we have been informed about some possible technical problems when accessing and filling in Fom C. As this Form is mandatory, in order to be able to take this issue into account, you are invited to keep screenshots (with date and time clearly visibles) of any blocking error message, which may avoid you to submit your application within the deadline. You must contact the IT Helpdesk immediately.
Apr 28, 2021 4:42:22 PM
The submission session is now available for: ERASMUS-YOUTH-2021-YOUTH-TOG-LOT1(ERASMUS-LS)
European Youth Together (Small)
TOPIC ID: ERASMUS-YOUTH-2021-YOUTH-TOG-LOT1
Programme: Erasmus+ Programme (ERASMUS)
Call: European Youth Together (ERASMUS-YOUTH-2021-YOUTH-TOG)
Type of action: ERASMUS-LS ERASMUS Lump Sum Grants
Type of MGA: ERASMUS Lump Sum Grant [ERASMUS-AG-LS]
Deadline model: single-stage
Opening date: 20 April 2021
Deadline date: 24 June 2021 17:00:00 Brussels time
Topic description
Scope:
The European Youth Together action targets youth organisations at grass-root level which want to establish partnerships across borders, i.e. which aim at adding a European dimension to their activities and at linking these activities to EU youth policies, most notably the EU Youth Strategy 2019-2027. The purpose is to encourage new applications from organisations not well established yet at European level. To this end, the action primarily consists in supporting activities aiming at connecting EU level youth organisations and grassroots NGOs operating at local levels (rural, cities, regions, countries) that will benefit from developing cross-border activities.
The overall structure of the action takes into account the growing size of the youth sector, the changing trends in youth participation and the need for more sustained and stable funding support in the youth domain161. It also takes into account the need to better cover the great diversity of youth organisations across Europe and to respond to the identified needs for both grassroots activities and large co-operation projects within Europe.
OBJECTIVES OF THE ACTION
European Youth Together projects aim to create networks promoting cross-border partnerships that will run in close cooperation with young people from across Europe (Erasmus+ programme countries). These networks will organise cooperation, exchanges, promote trainings (for instance for youth leaders) and allow young people themselves to set up joint projects through physical and/or online activities.
Contributing to and promoting the EU Youth Goals as well as the EU Youth Strategy 2019-2027162 constitute important thematic priorities for the action. The European Youth Goals are also reflected in the President von der Leyen Commission’s political guidelines163. The ongoing 18 months’ cycle164 of the Youth Dialogue and its priorities is equally a basis for this European Youth Together action.
Finally, in light of the COVID-19 pandemic, responses are required to mitigate its socio-economic impact on youth, including capacity building and specific measures to deal with Covid-19 crisis recovery in the youth sector. When doing so, youth networks should consider ways of forging solidarity and inclusiveness, which concur with challenges related to digital skills and green lifestyles.
SPECIFIC OBJECTIVES
The action seeks to specifically support:
The promotion and development of transnational structured cooperation, online and offline, between different youth organisations so as to build or strengthen partnerships focusing on solidarity and inclusive democratic participation of all;
The implementation of EU Frameworks and initiatives such as country specific recommendations from the European Semester165 as far as they relate to the youth area;
Initiatives to encourage young people to participate in the democratic process and in society by organising trainings, showcase commonalities among young Europeans and encourage discussion and debate on their connection to the EU, its values and democratic foundations, including by providing a meaningful voice to youth in the framework of the Covid-19 recovery process;
The participation of under-represented groups of young people (e.g. vulnerable and socio-economic disadvantaged youth) in politics, youth organisations and other civil society organisations;
New ways to empower youth organisations in dealing with the Covid-19 pandemic and its aftermath. Indicatively, this could include enhancing collaboration between youth organisations in a digital context by using relevant nonformal learning methods and organisational models including alternative modes of exchanges and mutual aid.
ACTIVITIES
The activities proposed must be directly linked to the general and specific objectives of the action and must be detailed in a project description covering the whole period of the grant as instructed in the relevant “setting up a project” section and the impact section.
Activities shall be of cross-border nature and may be performed at European (Erasmus+ Programme Countries), national, regional or local level.
Examples of relevant activities:
Activities facilitating access and participation of youth in EU policy activities taking place at all levels of a society (local, regional, national, European) as well in different institutional contexts (formal institutions, nonformal co-peration and learning, informal exchanges etc.);
Mobility activities including exchanges for the purpose of networking and/or benefitting from non-formal or informal training;
Awareness-raising, information, dissemination and promotion activities (seminars, workshops, campaigns, meetings, public debates, consultations, etc.) on EU policy priorities in the field of youth;
Foster strategic cooperation, exchange of ideas, collaborative working, and co-creation and relevant nonformal methods to shape and discuss bottom-up EU youth policy initiatives, partnerships and projects between young people, youth organisations, policy and decision-makers as well as researchers and other relevant civil society actors. This includes initiatives and events for developing Youth European NGOs/Civil Society organisations / EU-wide networks
Explore the views of politicians about young people’s proposals for democratic systems, including the views and aspirations of not-engaged youth, barriers and enablers to engagement among young people who do not have experience of existing participatory forms, and foster new spaces for youth political engagement and action across Europe.
Explore a revived understanding of the meaning and benefits of active citizenship for EU youth, including in a post-COVID context, and in light of the European Green New deal at the heart of recovery, as well as intragenerational differences in youth representation, and the changing patterns of youth representation in the EU.
Support the development of user friendly, standardised methods, tools and innovative collaboration methods for the NGO youth sector, including developing new youth community-based initiatives, skills and know-how for monitoring and evaluation of existing activities in a results driven manner, demonstrating the value of youth participation in civil society.
It is optional to include mobility activities in this action. The mobility activities for young people must underpin the main objectives of the project and offer a significant added-value to the project and to the young persons concerned.
WHICH ARE THE CRITERIA TO BE MET TO APPLY FOR THE EUROPEAN YOUTH TOGETHER GRASSROOTS ACTION?
ELIGIBILITY CRITERIA
In order to be eligible for an Erasmus grant, project proposals for European Youth Together must comply with the following criteria:
Who can apply?
The following organisations can be involved as co-ordinator:
- NGOs (including European Youth NGOs and national Youth Councils) working in the field of Youth ;
- Public authorities at local, regional or national level
The organisation applies on behalf of all participating organisations involved in the project and must be legally established and located in an Erasmus+ Programme country.
What types of organisations are eligible to participate in the project?
Any organisation, public or private, with its affiliated entities (if any), working with or for young people outside formal settings established in an Erasmus+ Programme country.
Such organisations can, for example, be:
a non-profit organisation, association, NGO (including European Youth NGOs);
a national Youth Council;
a public authority at local, regional or national level;
an education or research institution;
a foundation;
Public or private companies (small, medium or large enterprise (including social enterprises) may be included. Therefore, whereas this action is primarily targeting non-for-profit organisations, for-profit organisations can be involved if a clear added value is demonstrated for the project.
Number and profile of participating organisations
Minimum of 4 partners from at least 4 Erasmus+ Programme Countries.
At least half of the organisations in the consortia should not have been recipients of EU funds from the Erasmus+ Programme in Key Actions 3 – European Youth Together projects in the previous 2 years
Venue of activities
The activities must take place in the Erasmus+ Programme countries.
Duration of project
2 years
Where to apply?
To the European Education and Culture Executive Agency (EACEA), based in Brussels.
The same organisation can submit only one application to this action by the deadline.
Call ID: ERASMUS-YOUTH-2021-YOUTH-TOG
When to apply?
Applicants have to submit their grant application by 24 June at 17:00:00 (Brussels time).
Applicant organisations will be assessed against the relevant exclusion and selection criteria. For more information please consult Part C of this Guide.
SETTING UP A PROJECT
A ‘European Youth Together Grassroots’ project consists of four stages, which start even before the project proposal is selected for funding e.g. 1) Project identification and initiation; 2) Project preparation, design and planning; 3) Project implementation and monitoring of activities; and 4) Project review and impact assessment. Participating organisations and participants involved in the activities should take an active role in all those stages and thus enhance their learning experience.
Identification and initiation; identify a problem, need or opportunity that you can address with your project idea in the context of the call; identify the key activities and the main outcomes that can be expected from the project; map the relevant stakeholders and potential partners; formulate the project’s objective(s); ensure the project’s alignment to the participating organisations’ strategic objectives; undertake some initial planning to get the project off to a good start, and put together the information required to continue to the next phase etc.;
Preparation, design and planning; specify the project scope and appropriate approach, decide on a schedule for the tasks involved; estimate the necessary resources and develop the detail of the project e.g. needs assessment; define sound objectives and impact indicators (specific, measurable, achievable, relevant and time-bound);
identify project and learning outcomes; development of work programme, activity formats, expected impact, estimated overall budget; preparing a project implementation plan including strategic aspects of project governance, monitoring, quality control, reporting and dissemination of results; defining practical arrangements and confirmation of the target group(s) for the envisaged activities; setting up agreements with partners and writing the proposal etc.;
Implementation and monitoring of activities: carrying out the project implementation according to plans fulfilling requirements for reporting and communication; monitoring ongoing activities and assessing project performance against project plans; identifying and taking corrective action to address deviations from plans and to address issues and risks; identifying non-conformities with the set quality standards and taking corrective actions etc.;
Review and impact assessment: assessing project performance against project objectives and implementation plans; evaluation of the activities and their impact at different levels, sharing and use of the project's results, etc.
HORIZONTAL ASPECTS TO BE CONSIDERED WHEN DESIGNING YOUR PROJECT:
In addition to complying with the formal criteria and setting up sustainable cooperation arrangement with all project partners, the following elements can contribute to increasing the impact and qualitative implementation of ‘European Youth Together projects’ throughout the different project phases. Applicants are encouraged to take these opportunities and dimensions into account when designing their project.
Environmental sustainability
Projects should be designed in an eco-friendly way and should incorporate green practices in all its facets.
Organisations and participants should have an environmental-friendly approach when designing the project, which will encourage everyone involved in the project to discuss and learn about environmental issues, reflecting about what can be done at different levels and help organisations and participants come up with alternative, greener ways of implementing project activities.
Inclusion and Diversity
The Erasmus+ Programme seeks to promote equal opportunities and access, inclusion and fairness across all its actions.
To implement these principles, an Inclusion and Diversity Strategy has been devised to support a better outreach to participants from more diverse backgrounds, in particular those with fewer opportunities facing obstacles to participate in European Projects. Organisations should design accessible and inclusive project activities, taking into account the views of participants with fewer opportunities and involving them in decision making throughout the whole process.
As a transversal principle, participating organisations should pursue strategies to connect to young people at grassroots level from a diversity of backgrounds. This covers the involvement of a diverse youth population with fewer opportunities, including those from remote/rural areas and/or with a migrant background.
Therefore, all the activities should contribute to widening both the outreach of young people and their active engagement so as to ensure a diversity of voices are brought together.
Digital dimension
Virtual cooperation and experimentation with virtual and blended learning opportunities are key to successful projects.
In particular, projects are strongly encouraged to use the European Youth Portal and the European Youth Strategy Platform to work together before, during and after the project activities.
Common values, civic engagement and participation
Projects will support active citizenship and ethics, as well as foster the development of social and intercultural competences, critical thinking and media literacy. The focus will also be on raising awareness on and understanding the European Union context.
EXPECTED IMPACT
The granted projects should demonstrate their expected contribution to EU youth policy by:
helping to improve the capacity of the youth sector active at grassroots level to scale up their activities and work transnationally towards building inclusiveness, solidarity and sustainability including promoting transnational learning and cooperation between young people and decision makers;
building on the objectives of the EU Youth Strategy 2019-2027 and more specifically by demonstrating how they are contributing to the ‘Engage-Connect-Empower’ priorities of the Strategy;
building on outcomes of the European Youth Goals, the Youth Dialogue and other youth debate projects and opinion surveys related to the future of Europe and linking them to policy development at local/regional/national/European level;
building on country specific recommendations from the European Semester as far as they relate to the youth area;
improving the involvement of young people in democratic life, in terms of active citizenship and engagement with decision-makers (empowerment, new skills, involvement of young people in project design, etc.);
upscaling existing best practices and outreach beyond local levels (rural, cities, regions, countries) and the regular network(s) including making good use of digital means to stay connected under all circumstances even in situations of remoteness, isolation or confinement;
disseminating their results in an effective and attractive way among young people involved in youth organisations, so as to pave the way for more systematic partnerships, and also among youngsters who are not
affiliated to youth structures or those who come from disadvantaged backgrounds.
AWARD CRITERIA
Relevance of the project (maximum score 30 points)
Purpose and EU added value: the proposal establishes and develops a project that supports policies at EU level relevant for youth – most notably the EU Youth Strategy 2019-2027. The proposal clearly demonstrates the EU added value at a systemic level, generated through its trans-nationality and potential transferability.
Objectives: the proposal objectives are relevant to the general objectives of the action and at least one of its specific objectives; moreover, the proposal objectives are specific and clearly defined, achievable, measurable, realistic and timely; they address issues relevant to the participating organisations and of a clear added value to the chosen target groups.
Needs: the proposal demonstrates that is based on a thorough needs assessment based as far as possible on verifiable facts and figures supported by general and specific data relevant to all countries and organisations in the consortium. A clear needs analysis linking to the concrete realities of applicants, partners and target groups is expected.
Youth engagement: the partnership demonstrates that it is able to secure an active engagement with a diverse youth population such as those from remote/rural areas, with a migrant background, and/or from disadvantaged social backgrounds already from the design phase of youth related activities
Quality of the project design and implementation (maximum score 30 points)
Planning: The proposal is clear, complete and of high quality and includes appropriate phases for preparation, implementation, monitoring, and evaluation of the project based on robust project management methodologies.
Methodology: The implementation is based on suitable methodologies; the objectives are consistent with the activities and are clearly outlined, with logical links between the identified problems, needs and solutions; the work plan is coherent and concrete; there are suitable quality control measures and indicators to ensure that the project will be duly implemented with the required quality, in scope, in time and within budget; there are concrete and suitable risk management and contingency plans.
Cost effectiveness: the proposed budget is coherent, detailed enough, suited for the implementation of the project and designed to ensure the best value for money. The resources assigned to work packages are in line with their objectives and deliverables. The budget caters to the needs of grassroots organisations and vulnerable young people in order to encourage their inclusion in the Erasmus+ programme.
Quality of the partnership and the cooperation arrangements (maximum score 20 points)
Configuration: the partnership involves an appropriate mix of complementary organisations with the necessary profiles, skills, experience, expertise and management support to achieve its objectives; the added value of the for-profit organisations is clearly demonstrated, if involved in the consortium.
Geographic composition: the partnership demonstrates capacity to reflect the European economic, social and/or cultural diversity through its geographic composition (i.e. coverage of East, West, North and South areas across Europe) so as to ensure a truly pan European cooperation.
Local NGOs development: the partnership has the ability to develop the capacities and knowledge of local NGOs that are not already well established at European level to achieve enhanced peer-to-peer collaboration between NGOs across Europe.
Commitment & tasks: the distribution of responsibilities and tasks in the partnership is clear and appropriate; the coordinator shows high quality management and potential for coordination of transnational networks and leadership in complex environments.
Cooperation arrangements: the governance mechanisms proposed will ensure an effective coordination, decision-making, communication and conflict resolution between the participating organisations, participants and any other relevant stakeholders.
Youth engagement: young people are suitably involved in all stages of the project implementation and youth inclusion is addressed at all stages and levels of the project, providing empowering roles and/or concrete strategies to ensure their diverse participation.
Impact (maximum score 20 points)
Impact: the potential impact of the project on participants and partner organisations is high – in particular towards expanding the grassroots organisations’ focus of national, regional or local activities not yet cross border in nature where activities were scaled up or developed at EU level during and after the project lifetime, as well as on the youth community at large. The expected results display the understanding and capacity of the applicant and partners to communicate the European Union’s values particularly in regard to citizenship.
Dissemination: the proposal demonstrates capacity to undertake youth outreach and ability to communicate effectively on problems and solutions of the communities they represent to a broader global audience; in particular, the proposal provides a sound plan for the communication and dissemination of results and includes appropriate targets, activities and tasks distribution among partners, relevant timing, tools and channels to ensure that the results and benefits will be spread effectively to policy makers and are accessible to end users within and after the project’s lifetime.
Sustainability: the proposal clearly identifies how the outcomes of the project could contribute to changes at system level in the youth sector both within the project lifetime and beyond, with high potential to enable long lasting cooperation at EU level and/or inspire new EU youth policies and initiatives.
To be considered for funding, applications must score at least 60 points, also taking into account the necessary minimum pass score for each of the four award criteria (i.e. minimum 15 points for the categories "relevance of the project" and "quality of the project design and implementation"; 10 points for the categories of "quality of the partnership and the cooperation arrangements" and “impact”. For ex aequo cases, priority will be given to the scores awarded for the award criterion “relevance” and then “impact”.
As a general rule, and within the limits of existing national and European legal frameworks, results should be made available as open educational resources (OER) as well as on relevant professional, sectorial or competent authorities’ platforms. The proposal will describe how data, materials, documents and audio-visual and social media activity produced will be made freely available and promoted through open licences, and does not contain disproportionate limitations.
WHAT ARE THE FUNDING RULES?
This action follows a lump sum funding model. The amount of the single lump sum contribution will be determined for each grant based on the estimated budget of the action proposed by the applicant. The granting authority will fix the lump sum of each grant based on the proposal, evaluation result, funding rates and the maximum grant amount set in the call.
Maximum EU grant per project is 150,000 euros
How is the project lump sum determined?
Applicants must fill in a detailed budget table according to the application form, taking into account the following points:
a) The budget should be detailed as necessary by beneficiary/-ies and organized in coherent work packages (for example divided into ‘project management’, ‘training’, ‘organization of events’, ‘mobility preparation and implementation’, ‘communication and dissemination’, ‘quality assurance’, etc.);
b) The proposal must describe the activities covered by each work package;
c) The applicants must provide in their proposal a breakdown of the estimated costs showing the share per work package (and, within each work package, the share assigned to each beneficiary and affiliated entity);
d) Costs described can cover staff costs, travel and subsistence costs, equipment costs and subcontracting as well as other costs (such as dissemination of information, publishing or translation).
Proposals will be evaluated according to the standard evaluation procedures with the help of internal and/or external experts. The experts will assess the quality of the proposals, against the requirements defined in the call and the expected impact, quality and efficiency of the action.
Following the proposal evaluation, the authorising officer will establish the amount of the lump sum, taking into account the findings of the assessment carried out. The lump sum value will be limited to a maximum of 80% of the estimated budget determined after evaluation.
The grant parameters (maximum grant amount, funding rate, total eligible costs, etc.) will be fixed in the Grant Agreement.
The project achievements will be evaluated on the outcomes completed. The funding scheme would allow putting focus on the outputs rather than the inputs, thereby placing emphasis on the quality and level of achievement of measurable objectives.
More details are described in the model Grant Agreement available in the Funding and Tender Opportunities Portal (FTOP). | https://www.developmentaid.org/grants/view/689884/european-youth-together-small |
Art imitates life, as the saying goes.
Unbelievable.
J.K. Rowling’s Hogwarts detention seems to be coming to an end.
“I’m staying right here on this hill.”
“War is Peace. Freedom is Slavery. Ignorance is Strength…”
Renowned “Harry Potter” novelist J.K. Rowling fired back Sunday after facing yet another death threat — this time from a transgender activist who wished the author would “receive a pipe bomb in her mailbox.”
British author J.K. Rowling, known for her beloved “Harry Potter” series, is demanding an end to the “climate of fear” over the transgender debate, noting in a recent interview she’s received “heartbreaking letters” from people who have told her they regret their sex-reassignment surgeries.
The actor who plays Hagrid in the “Harry Potter” series has come to novelist J.K. Rowling’s defense, telling anyone outraged by her comments on transgenderism to “get over yourself.”
No award is worth keeping if the president of the organization that bestows the prize has no respect for diversity of opinion.
A literary agent in New York was ousted from her job after she tweeted that transgender males who identity as females are not biologically females.
The famed author of the “Harry Potter” series is not backing down after a series of public spats on social …
“If sex isn’t real, the lived reality of women globally is erased.”
“Harry Potter” author J.K. Rowling is in the hot seat with many in the LGBTQ community after she dared to side with a researcher who lost her job for tweeting that biological sex is immutable. | https://www.faithwire.com/?s=rowling |
Over the last five decades, the Lower Mekong Basin has been the scene of major human and environmental upheavals, especially in Cambodia, Laos and Vietnam where sustained political instability degenerated into major armed conflicts and significant migrations. The Vietnam War, whether official in Vietnam, or secret in Laos, arguably played a decisive role in the extensive deforestation observed from c. 1960 to c. 1980 in the Lower Mekong Basin. Deliberate massive removal of vegetation by bombing and chemical spraying was a military tactic to deny cover and land to opposition forces. In Laos only, from 1953 onward, approximately 1 million people were displaced, successively escaping the war, the communist takeover or following resettlement policies.
Detailed examination of bombing and hydro-meteorological data suggests that these extensive environmental damages and population movements altered watershed hydrology, especially in two sub-basins of the Mekong River that were either heavily bombed (in southern Laos) or depopulated (in northern Laos). The northern sub-basin (110,500 km2) adjoins the Xiengkhouang Plateau in the East. The southern sub-basin (50,300 km2) includes parts of the Annamite chain in the East and of the Boloven plateau in the Southeast and about one third of the latitudinal extent of the Ho Chi Minh trail in Laos.
Available information on air operations indicates that the southern sub-basin has been one of the most heavily bombed areas in Indochina. A total of between 690,000 and 2,948,000 tons of high explosive ordnance was expanded over this sub-basin between October 1965 and September 1973, clearing an estimated surface area of about 20,000 km2 (>one third of the sub-basin area). Most of this forest bomb-clearing occurred between 1970 and 1973.
The chronology of changes in the relationship between rainfall and river flows, in each of the 2 sub-basins, was studied using hydro-meteorological data covering the period 1960-2004, and hydrological modeling. Our analyses show that runoff started to increase in 1972 in the southern catchment and peaked in 1973-75. Although runoff stabilized afterward, it remained at higher than pre-war levels until the early 2000s.
In highly bombed areas of the southern catchment, land damage resulted in the displacement of significant amounts of soil, disrupting soil horizons, possibly fragmenting bedrock and exposing the water-table, through a process termed bombturbation. Bombturbation induces profound, long-term effects on ecosystem functioning. The original forest is replaced by succession vegetation types with comparatively sparse canopy and shallow root systems restricting evapotranspiration, hence the observed increase in runoff a few months after bombing climaxed. However, land-cover change is not the only cause for the higher water yields that persisted after 1987 in the southern catchment: with time, war damages become increasingly difficult to separate from the pressures of economic development, including commercial logging. However, bomb-degraded forest areas are still apparent in places.
In the northern catchment, runoff remained stable until 1975 and decreased thereafter. While air operations of the Vietnam War caused losses of forest, continuing ground battles in northern Laos over the period 1953-1975 induced important emigrations. Between 730,000 and 1 million people (one fourth of the country’s population as per 1970) were displaced over this period. This migration flow was sustained after the end of the war, as an immediate consequence of the communist takeover: between 1975 and 1985, more than 300,000 people fled to Thailand, escaping the new regime. This massive exodus particularly affected the northern provinces of Laos, traditionally inhabited by Hmong ethnics. The abandonment of large mountainous areas traditionally used for shifting or permanent cultivation, most likely induced a shift toward forest regeneration, explaining the runoff decrease observed after 1975. Forest regeneration in abandoned areas appears to have been sustained until more recent periods as the result of abandoned swidden areas to secondary forest, in response to the government’s policy of reducing shifting cultivation practices in the upland areas and promoting cash crop production. A plausible scenario therefore proposes that long-lasting conflicts depopulated the northern catchment of a significant proportion of its population, while bombing sorties, although far from anecdotal, were not sufficient to have ecocidal consequences such as that observed in the southern catchment.
Observed long-term hydrological variations are obviously consistent, in terms of magnitude, occurrence and spatial distribution, with the broad-scale land-cover changes that most likely occurred over the last half century in the two studied catchments. These results illustrate the high responsiveness of flow regime to forest cover changes in tropical areas where deforestation is expected to perpetuate at a high rate over the coming decades.
Alain Pierret is a research scientist in the fields of soil biophysics, natural resource management and environmental archaeology. After working in Australia, with the CSIRO, Land and Water, from 1997 to 2003, he was appointed as a research scientist with IRD in December 2004. Alain has published over 50 scientific articles / book chapters among which 37 in peer-reviewed international journals. He is also a section editor for the journal Plant and Soil. Alain’s current research interests include the complex interactions between land use / land use change, plant growth and the water and carbon cycles.
Guillaume Lacombe holds a PhD in hydrology from Montpellier 2 University. He is an agronomic engineer graduated from AgroParisTech. His skills include watershed hydrology, climate change sciences, reservoir water balance modeling. He worked with short- and long-term assignments in Australia, Canada, Laos, Switzerland, Thailand, Tunisia, United Kingdom, USA and Uzbekistan. Since 2010, Guillaume Lacombe is appointed as a researcher at the International Water Management Institute, based in the Southeast Asia regional office in Vientiane, Laos.
Chu Thai Hoanh holds a Ph.D. in Agricultural and Environmental Sciences from the International Institute for Aerospace and Earth Sciences (ITC) and Wageningen University in the Netherlands. He has 40 years of experience in research and management with wide and varied subjects in agriculture and water management. In 1997 he joined the International Rice Research Institute (IRRI) for research on rice and land use in Asia countries. Since 2003 he has joined the International Water Management Institute (IWMI) and at present he is a principal researcher on water resources for many studies in Asia and Africa.
This Editorial was first published on the Asia-Pacific Migration and Environment Network on 4 September 2013. | https://environmentalmigration.iom.int/es/node/532 |
Find your people
For one struggling with a mental health disorder or addiction, it may be very hard to step outside of the self-imposed isolation and become vulnerable to ask for help. When struggling with depression or in active addiction it is hard to ask for help, when one honestly doesn’t want to be seen at all.
The COVID pandemic has taught us that there is certainly an inherent need for humans to develop physical and emotional connections with others they trust. The traumatic isolation imposed on our world has left many individuals to struggle with isolation and negative ways of coping throughout the crisis. Inevitably, the need for mental health and addiction treatment is larger than ever before, while our society tries to dust ourselves off.
Openness and trust is necessary in order to be vulnerable with another. In order to trust, we must first feel we belong. Individuals in recovery who find a group of men and women who they can relate to have a much higher chance of sustaining recovery than going at it alone.
There is a sense of validation and belonging, while “becoming known” not only to others, but also oneself. The struggle one has in common with another, is the one thing that bonds and unites them together.
As one finds their own voice and bonds with others, there is a deepening intimacy that unfolds. Mental health disorders and addictions are all too isolating and they thrive on shame and self hatred. When one finds another person who is just like them, their heart softens and develops an openness and willingness to trust.
Group therapy is a type of therapy that for many people is the firm groundwork of their recovery. The feelings of shame may have been too deep for one to come up out of isolation alone. But when one develops a common bond with another person who “gets it,” it may be easier to open up more as one gains comfort within a safe place.
Finding your people while on the road to recovery takes courage. Try it. Take up space with the people you think might be “your” people. Practice being open, honest, and present with them and wait to see how they react. The ones who stay with you while in your own vulnerable moments, without judgement, may truly be your people.
Kirsten Book, PMHNP-BC
I support the patient to help them feel empowered in their own recovery. | https://www.kirstenbook.com/blog/find-your-people/ |
There is a saying in Chinese, “you learn by reading ten thousand volumes of books as well as by traveling ten thousand miles”. We firmly believed that Yunnan is where you can learn Chinese with our well-qualified teachers in the classroom and by traveling to many different places which can make Chinese cultures and the Chinese language more of a reality. Our weekend Trips in Yunnan will help you learn more about the culture by travel and by experiencing firsthand this amazing province.
Yunnan has for a long time been regarded as one of most popular tourist destinations all over China. Its diverse cultures of twenty-five distinctive ethnic minority people, its breathtaking landscapes and historical interest all over the province make Yunnan one of a kind in China for cultural experience and travel. It is a great place for you to appreciate the beauty of China and inspire your study of Chinese.
It is a place full of history; there are ancient cities and towns like in Lijiang, Dali, Jianshui, and Heijing, all of which have a long history. These are great places for you to deepen your understanding of Chinese culture and will be a great benefit to your Chinese language learning.
Fifty-two of China’s fifty-five ethnic minorities are found in Yunnan. Twenty-five of them have a majority population in Yunnan, and fifteen groups are exclusive to Yunnan. Lijiang is where you can have a better understanding of the Naxi people and their unique culture; Xishuangbanna is where you can closely observe the Dai people and their traditions; Chuxiong helps you grasp the distinctive culture of the Yi people; in Shangri-la you experience almost the same authentic Tibetan culture as you would in Tibet. These are but a handful of many other places where you can learn about the diverse cultures of Yunnan. The desire of learning more about these cultures can be a great inspiration for your Chinese language study.
For the other very important aspect of culture, religions can give you a greater perspective on how cultures are shaped and developed. Studying and traveling in Yunnan can be a great benefit for your understanding of this aspect. Shangri-la has for long been regarded as one of the most important pilgrimage sites for Tibetan Buddhism. Dali has long been impacted by Mahayana Buddhism in history and people’s lives are still influenced by it. Yunnan is the only place in China where you can study how Theravada Buddhism is practiced. For this, places like Xishuangbanna and Dehong are great places to visit. Taoist temples and Confucianism buildings can be found everywhere around the province.
There are a great number of impressive natural wonders which will certainly make your oversea Chinese language study in Yunnan interesting and colorful---Jade Dragon Snow Mountain, Mei Li Snow Mountain, the First Bend on the Yangtze River, the Tiger Leaping Gorge, the Terrace Field, and the Volcano Clusters, among many others. | http://www.mindsabroad.com/Yunnan_Weekend_Trips.html |
- Enhancing community...
Enhancing community resilience through social capital and connectedness
On the theme of Social Capital and Social Connectedness for Resilience, the committee identified three topics as being particularly important for natural hazard mitigation and resilience: (1) inspiring communities to create and sustain social capital and connectedness, (2)
bolstering community-created digital and public spaces, and (3) building social capital through financial investment strategies.
On the first topic, more research is needed on how social capital and connectedness not only enhance resilience but how communities create and sustain them. Multiple stakeholders need to better understand these processes, from micro-communities to national governments and
international organizations, as well as communities of varying sizes and geographic locations. Efforts to build social capital and connectedness often result in co-benefits, which is also a current research gap.
On the second topic, digital and public spaces have become increasingly powerful tools in creating and sustaining social capital and connectedness. By enabling people to connect and self-organize before, during, and after disasters, these spaces serve as a means of
communication, motivation, and organization, with consequences for trust, relationships, and action. Studying how different groups use different spaces and platforms for connecting, communicating, and motivating can inform decisions and policies that build capacity for resilience. Applied research on these spaces is significant because investments in these tools can produce substantially greater returns, relative to their cost, than money spent on big ticket, nonsocial physical infrastructure.
Finally, on the third topic, despite the importance of social capital and connectedness and in evaluating risks and resilience, financial organizations that use such evaluations to invest in mitigation and resilience rarely consider these factors. Metrics are needed to account for the
impacts of social capital and connectedness in ways that are compatible with the other tools used to make these decisions. By adopting a more inclusive and quantitative way of looking at the risks of loss, investment organizations can build resilience using a broader range of information.
PLEASE NOTE: CONTENT IS DISPLAYED AS LAST POSTED BY A PREVENTIONWEB COMMUNITY MEMBER OR EDITOR. THE VIEWS EXPRESSED THEREIN ARE NOT NECESSARILY THOSE OF UNDRR, PREVENTIONWEB, OR ITS SPONSORS. | https://www.preventionweb.net/publication/enhancing-community-resilience-through-social-capital-and-connectedness |
Tears of Joy and Sorrow as Uluru Climb is Closed: A Chat with Brooke Prentis
By 96five Friday 1 Nov 2019
There was joy and celebration at the foot of Uluru as climbing of the rock was finally banned—but tears, too, as climbers continued to ignore the wishes of traditional owners until the last minute.
Among those attending the closure celebrations was Brooke Prentis, Aboriginal justice spokesperson for the Christian group Common Grace, and a descendant of the Wakka Wakka people from Queensland.
Brooke had joined an annual Uluru pilgrimage group led by Fusion Australia, to travel to Australia’s heart for the marking of the closure. She became emotional talking about the significance of the moment, explaining that the sacredness of the site can’t be underestimated.
“With our over 300 nations (on the indigenous map of Australia), on each of our nations we have sacred sites,” Brooke explained. “And many people still climb those sites. Uluru and Kata Tjuta are two of the most significant.”
Above: Entertainment after the closing of the Uluru Climb included (L-R) the Central Australia Aboriginal Women’s Choir; Peter Garrett; and traditional indigenous dancers.
To climb the rock, visitors have had to pass signs that read, “Please don’t climb. Uluru is sacred in our culture. It is a place of great knowledge. Under our traditional law climbing is not permitted.”
Brooke said it was heartbreaking to see people still disrespecting the wishes of the Anangu people, the traditional owners, right up until the last possible moment when the climb was closed at 7pm. Many indigenous people found it upsetting to see the disregard for their culture, even after decades of education.
Above: The sign says it all.
“To be there for that moment when the climb was closed and to hear the clapping and the jubilation in the Anangu peoples, and all the peoples that had gathered, while we still had to stand there and watch people walking going past the signs that said ‘please don’t climb this’, there was heartbreak,” Brooke said.
“I was very emotional, and got quite disappointed that people still chose to disrespect Aboriginal peoples. So we’ve still got a long way to go and I think Aboriginal peoples feel that deeply.”
Another Step Towards Healing and Reconciliation
Above: (L) Brooke Prentis with fellow Uluru piligrims; (R) with a local young artist
Brooke said she hopes the closing of the climb is another step towards healing for Australia’s indigenous people.
“It’s been an incredible privilege to be here at this time and in this place,” she said, “and my hope is that it’s another one of these first steps that our nation of Australia needs to take to bring truth and justice and healing… to all peoples, especially Aboriginal peoples.”
Prime Minister Scott Morrison has been criticised for his absence from the closure of the climb. Also missing was the Federal Minister for Indigenous Australians, Ken Wyatt, and Opposition Leader Anthony Albanese.
“I don’t want people scrambling all over the roof of St Mary’s Cathedral – so why is it okay for people to scramble all over the top of Uluru?” ~ Opposition Leader, Anthony Albanese
Despite failing to attend, minister Ken Wyatt spoke to the ABC about the importance of the climb closing. He likened the rush of tourists doing last minute climbs, as “equivalent to having a rush of people climbing over the Australian War Memorial”. In a similar vein, Opposition Leader Anthony Albanese said in a tweet, “I don’t want people scrambling all over the roof of St Mary’s Cathedral – so why is it okay for people to scramble all over the top of Uluru? Uluru is precious. It has deep spiritual significance for the Traditional Owners who rightly want it protected.”
Dignitaries and performers at the event included Midnight Oil singer and former Environment Minister Peter Garrett, Shane Howard of the band Goanna and writer of the song Solid Rock, the celebrated Central Australia Aboriginal Women’s Choir, the Aboriginal Christian dance group Dusty Feet Mob from Port Augusta, the Federal Environment Minister Sussan Ley, and four Labor MPs including Indigenous politicians Linda Burney, Pat Dodson and Malrndirri McCarthy.
Now that the climb is closed, the chains that have been installed in 1964 and later to help people climb the rock’s western face, will be removed.
Warnings and fines of up to $10,000 can now be issued for those who attempt to climb, and Uluru-Kata Tjuta National Park management has the support of Northern Territory Police to enforce the ban.
ABOUT US
As this city’s family radio station, we see ourselves as having a commitment and responsibility to our listeners to broadcast ENGAGING radio content that ADDS VALUE and is SUITABLE for the entire family…… which makes 96five so different across the FM dial. | |
A recipe for kids! Flour, butter, milk, eggs and... right into the oven!
Ingredients
|For the dough:|
|220 g||Mix C - Mix Pâtisserie|
|150 g||sugar|
|125 g||butter at room temperature|
|3 medium||eggs|
|8 g||baking powder|
|125 ml||milk|
Preparation
- Allow the ingredients to come to room temperature and preheat the oven to the appropriate temperature as shown below.
- Beat the butter until creamy. Add half of the sugar and cream together for approx. 2 minutes until well mixed.
- Add the egg yolk, baking powder and milk and whisk them together.
- Beat together the egg white with the remaining sugar until peaks are formed and add to the mixture.
- Pour the mixture into a greased and floured springform tin and bake in a preheated oven at 180°C/gas mark 4 for approx. 50 minutes.
- Top with icing, jam or fresh fruit as desired.
Tip: To make a chocolate cake, add 2 tbsp. unsweetened cocoa powder to the dough. | https://www.schaer.com/en-ind/r/pound-cake |
Recently, I was the resource person for a two-hour-long online workshop on "Effective Ways of Teaching English", organised by Oxford University Press. The participants of the workshop were a group of 25 English language teachers from a residential school in Chennai. During the course of the session, they were asked to state whether the following statements are true or false:
A good speaker is a good listener.
A good writer is a good reader.
Developing communicative competence is the fundamental aim of language teaching. The teachers' responses were mixed. The purpose of giving these three statements was to highlight the importance of receptive skills which are neglected by most English language teachers. Of the four major language skills, listening and reading are known as receptive skills and speaking and writing are called productive skills. Some teachers treat productive skills as active skills and receptive skills as passive skills and do not give importance to the so-called 'passive skills'. It is incorrect to label listening and reading as passive skills. All four skills are active skills and should be given equal importance. Let the labels: "active listening skills" and "active reading skills" help us treat listening and reading as active skills.
Let us look at the first statement: "A good speaker is a good listener." It is very much true. Those who have developed their speaking skills and speak effectively have given importance to listening skills. By being good listeners, learners learn how to pronounce individual words correctly. They also acquire the skills of identifying lexical chunks (a group of words) and stressing the words that need to be stressed in connected speech. Most effective communicators attribute their success to their active listening skills.
Let us look at the second statement: "A good writer is a good reader." Reading and writing are related. A good writer is one who writes convincingly and effectively. Their writings are characterised by their clarity of thought and clarity of expression. All great writers attribute their success to their readings. A ‘scrupulous reader’ can become a ‘scrupulous writer’. In other words, those who know the art of reading any text have the potential to become good writers. George Orwell says the ‘scrupulous writer’ asks himself these questions in every sentence: "What am I trying to say? What words will express it? What image or idiom will make it clearer? Is this image fresh enough to have an effect?"
Language acquisition expert Stephen Krashen, based on the results of research in the area of reading, states that those "who read for pleasure do significantly better in all the areas of language use: reading comprehension, vocabulary development, grammatical correctness, writing style, and spelling…"
Developing communicative competence is the fundamental aim of language teaching and language teachers can do justice to learners only by encouraging learners to develop their receptive skills.
Not all readers are leaders, | https://www.edexlive.com/opinion/2020/nov/07/enhancing-english-language-skills-15632.html |
Q:
Program to check for a Palindrome
I'm trying to write a program that converts a long into a string and checks if it is a palindrome, I've written the following so far, but it gives me an incompatible types error, and I can't seem to find what's causing it. :S
Any help would be much appreciated :)
The error occurs at line 24 and it says incompatible types - found void but expected java.lang.String
public class programPalindrome
{
private String go()
{
Input in = new Input ();
System.out.print("Enter Number: ");
return in.nextLine();
long number = in.nextLong();
String Palindrome = Long.toString(number); // converts the long into a string
String newAnswer = reverse(Palindrome);
String anotherAnswer = reverseCheck(Palindrome,newAnswer);
System.out.println("This is a Palindrome" + Palindrome);
}
// Check to see if the two argument Strings are the reverse of each
// other.
private String reverseCheck(String Palindrome, String newAnswer)
{
if (Palindrome.compareTo(newAnswer) == 0) {
return System.out.println("It is a palindrome");
}
else
{
return System.out.println("It is not a palindrome");
}
}
// Return a String which is the reverse of the argument String
private String reverse(final String Palindrome)
{
String result = new String();
int position = 0;
while (position < Palindrome.length())
{
result = new Character(newAnswer.charAt(position)).toString() + result;
position = position + 1;
}
return result;
}
public static void main(String[] args)
{
new programPalindrome().go();
}
}
A:
you can't return System.out.println when your function signature says you want to return a String... you have some another syntax error on the line
result = new Character(newAnswer...
newAnswer can't be resolved in that scope... are you using an IDE like Eclipse? That would probably help you out a lot.
Here's a more straightforward program to do the same thing:
public class programPalindrome
{
static public boolean isPalindromic(long value){
String valueAsString = Long.toString(value);
String reverseString = (new StringBuffer(valueAsString)).reverse().toString();
if(valueAsString.equals(reverseString)){
return true;
}
else{
return false;
}
}
public static void main(String[] args)
{
System.out.println(args[0] + " is palindromic == "
+ isPalindromic(Long.parseLong(args[0])));
}
}
| |
We are in a city where history plays a fundamental role in its cuisine, and it has influences from multiple cultures, from Austrian to French, through other closer ones such as Italian.
Eating in Budapest: 12 essential typical dishes
To all the above we must add a fundamental ingredient, paprika, which provides spicy flavors and aromas of all kinds. So, some suggestions of dishes you should eat in Budapest they are soups, stews and meats of all kinds although, without a doubt, the star recipe is goulash.
Goulash
A thick meat soup flavored with paprika. The soup owes its thickness and texture because the collagen in the cuts used (shoulder, pimple or cane) turns into jelly during the cooking process, it also contains chopped onion, or it can include potatoes and tomatoes.
Pörkölt (Hungarian style meat stew)
It is very related to goulash and is usually made from beef or pork (it can also be made with other types of meat) and different vegetables such as paprika. It is served hot and usually accompanied by Tarhonya.
Halászlé (fish soup)
If you are a fish lover you also have a dish that you can eat in Budapest to meet your needs. It is a delicious fish soup called halászlé that contains freshwater fish, onion, paprika, tomato and white wine.
Kolbasz
A sausage that includes black pudding and varieties of liver rice. Salt, peppers, spices and marjoram are added for flavor.
Libamáj (Goose Liver)
There are a variety of dishes with goose liver such as: goose liver with mushrooms, pickled goose breast, ... It is also a Bulgarian specialty but it is well worth trying.
Letscho
It is made mainly of peppers, tomatoes and onions, and is usually served with some sausage strips or fried sausage. Eye, it is a slightly spicy dish due to the addition of spicy paprika.
Túrós Csusza
Pasta sheets accompanied with Hungarian cottage cheese (Túró) and with pieces of bacon (szalonna). It is very simple but one of our favorite dishes to eat in Budapest.
Paprika chicken
This is one of the best dishes to eat in Budapest according to travelers. Take lard, chicken, onion, red and green pepper, zucchini, tomato and salt. It is usually accompanied with pasta or rice.
Strudel
It is a rolled cake composed of some thin layers of cake between which a filling (usually of fruits, white cheese or cottage cheese, poppy seeds or nuts) and all rolled to form a typical gypsy arm is placed.
Palacsinta
They are a crepe of overlapping pancake tower. Between each layer they are filled with jam and crushed nuts.
Dobos Cake
A curious dessert consisting of five overlapping biscuits. It was invented by the famous Hungarian pastry chef Jozsef C. Dobos and hence the name
Pancakes
There is a lot of variety of pancakes in Budapest, the Császármorzsa called “the crumbs of the emperors” is made with a kitchen pancake paste and mixed until it breaks into small pieces or crumbs. There is also another pancake like the palacsinta.
Restaurants in Budapest where you can taste typical Hungarian food
Spoon Café & Lounge Restaurant
It is a restaurant located in a ship anchored on the banks of the Danube. In addition to typical Hungarian foods, there are many options of white and red wines of the country.
The Food is spectacular, with the price perhaps somewhat high for the average of the city but the fact of having dinner on the Danube makes it worthwhile as a romantic evening optionRESTAURANT DATA:
Direction: Vigado Ter, Pier 3, Budapest 1051 see on map Phone: +364110933
Average price: 7 - 60 euros
Office hours: 12:00 - 0:00 hours. It also has a website in www.spooncafe.hu
21 Restaurant
They offer traditional Hungarian cuisine. His slogan prays“Hungarian cuisine as it was in its good times, but updated for the 21st century”.
In the light of this slogan all the ingredients maintain an essence of the classic Hungarian cuisine, but without feeling too overwhelmed and heavy, so these dishes are not so "fatty" and are much lighter than Hungarian food is usually , which makes it suitable for all audiences.RESTAURANT DATA:
Direction: Fortuna utca 21, Budapest 1014 see on map Phone: +3612022113
Office Hours: Monday to Sunday from 12:00 - 24:00 hours. It has web in 21restaurant.hu
Nancsi Neni
It's like a old decorated country house with wooden panels and paintings in a suburb between the hills of Buda.
It represents traditional Hungarian cuisine, unlike the previous one, including the heaviest traditional dishes although it also has international recipes. The restaurant pays special attention to families with babies, guests with pets and even those who come by bicycle.RESTAURANT DATA:
Direction: Ordogarok ut 80, Budapest 1028 see on map Phone: 3987127
Average price: 25 - 40 euros
Office hours: Monday to Sunday from 12:00 - 23:00 hours. It has web in www.nancsineni.hu
Kor coffee
One of the most popular restaurants to eat in Budapest. It's found in the heart of the busy Fifth District, near the Basilica of St. Stephen. It really is a cafeteria but visitors to this restaurant are regulars and could say the memory letter.RESTAURANT DATA:
Direction: Sas utca 17, St. Stephen's Basilica, Budapest 1051 see on map Phone: 13110053
Office hours: 10: 00-22: 00 hours. It has web in www.cafekor.com
Gundel Restaurant
In the Heroes' Square, next to the Szechenyi spa, is the most famous restaurant in Budapest, but also the most expensive. It has excellent food and service and there is both international and Hungarian food.RESTAURANT DATA:
Direction: Gundel Karoly Ut 4, Budapest, Hungary see on map Phone: +36 889 8111. | https://bz.unboutdailleurs.com/523-comer-en-budapest-restaurantes-y-platos-t-picos.html |
Imaging spectrograph to probe galaxy formation on ESO's Very Large Telescope
An instrument that combines high resolution imaging with spectroscopy has been installed on the European Southern Observatory’s Very Large Telescope (VLT) at the Paranal Observatory in northern Chile. The device observed distant galaxies, bright stars and other test targets during the first period of observations, the results of which will be presented at the forthcoming 3D2014 workshop in March at ESO in Germany.
The instrument, called Multi Unit Spectroscopic Explorer (MUSE), is mounted on Unit Telescope 4 of the VLT, which is currently being converted into a fully adaptive telescope. The VLT Survey Telescope is the largest telescope designed to survey the skies in visible light. MUSE uses 24 spectrographs to separate light into its component colours to create both 3D images and spectra of selected regions of the sky; coupling the discovery potential of an imaging device with the measuring capabilities of a spectrograph. Astronomers are able to move through the data and study different views of the object at different wavelengths.
The new instrument is the result of ten years of design and development by the MUSE consortium — headed by the Astrophysics Research Center of Lyon, France and partner institutes Leibniz Institute for Astrophysics Potsdam (Germany), Institute for Astrophysics Göttingen (Germany), Institute for Astronomy ETH Zurich (Switzerland), The Research Institute of Astrophysics and Planetary Science (France), Dutch Research School for Astronomy (The Netherlands) and ESO.
The leader of the team and principal investigator for the instrument, Roland Bacon from the Astrophysics Research Center of Lyon, commented: ‘It seems strange that this seven-tonne collection of optics, mechanics and electronics is now a fantastic time machine for probing the early Universe. We are very proud of the achievement — MUSE will remain a unique instrument for years to come.’
MUSE’s science goals include delving into the early epochs of the Universe to probe the mechanisms of galaxy formation and studying both the motions of material in nearby galaxies and their chemical properties. It will have many other applications, ranging from studies of the planets and satellites in the Solar System, through the properties of star-forming regions in the Milky Way and out to the distant Universe. | https://www.imveurope.com/news/imaging-spectrograph-probe-galaxy-formation-esos-very-large-telescope |
ASU student fosters connections with Taiwan Pilot Tour and International Forum project
Doctoral student Chia-Mei Hsia had a vision of connecting her native Taiwan to the United States around the theme of community development. That dream is coming to life as she launches the Global Community Development Partnership — a collaboration between Arizona State University’s Partnership for Community Development (PCD) and Feng Chia University.
The initiative started with her research data collection in summer 2016 when she interviewed people in Taiwan and noticed the need for community collaboration.
“Numerous communities have attained incredible achievement and made great progress in enhancing well-being and quality of life, but they are confronted with larger issues and challenges, particularly from globalization and urbanization,” Hsia said. “Coincidently, these communities seek sustainable solutions for various issues they are tackling. This motivated me to think of ways in which my skills as a community organizer could help them.”
When Hsia traveled back to Arizona from Taiwan, she recruited two volunteers from ASU to launch an “idea think tank” through which resources and ideas could be shared and collaborations formed among various communities.
“We knew we had the right direction but needed to find funding,” she said.
Hsia connected with her colleagues at ASU’s PCD and shared the idea with her mentor, Richard Knopf, professor in the School of Community Resources and Development. At the same time, Hsia reached out to Chieh-Ying Chen, director of the Center for Studies of Everyday Life at Feng Chia University and found he shared her vision. A new partnership was formed.
Chen, with a background in sociology and years of experience in fieldwork with communities, sees community development as the potential solution for social change.
“I witnessed some amazing community development cases and believe they have influential roles in a bigger society structure. The key issue is how we can leverage an individual community’s influence to amplify its strength and impacts,” he said.
A forum to open collaboration
The idea of creating a platform for international community collaboration and partnership formation became a reality when Hsia and her colleagues launched the Taiwan Pilot Tour and International Forum project in summer 2017.
The trip featured visits to communites and an academic forum that focused on eco-tourism, community culture exploration and participatory art activities. The forum also included a professional symposium for the communities to collaboratively brainstorm on community issues. Scholars and representatives from ASU’s PCD and Arizona nonprofit organizations visited nine Taiwanese communities and learned about their culture and history. A community development forum was held on the last day of the trip at Feng Chia University as the capstone event. It served to incubate community innovation and to facilitate a comfortable environment for honest and open-minded dialogue among members from the various communities.
“Community development is all about facilitation and dialogue,” said Knopf. “One fundamental thing we added is what we call listening conversations. We start not with a premise that there is a problem to be solved and we bring in the experts. Instead, we just open conversations in which community members can discover their gifts and build a collective vision for change.”
Hsia’s understanding of Asian culture has been a key element in fostering open dialogue.
“There were great conversation dynamics happening in the forum. Even in the midst of occasional disagreement, people listened to each other and began to understand the perspectives of others. I think that is a big step,” she said.
The forum participants included community members and practitioners, professionals and government officers together with ASU scholars who collaboratively examined insights gathered during the site visits. They shared challenges, successes and issues present in the various communities visited. The topics ranged from youth community engagement to tribal culture preservation. Also, the discussions explored how to boost community economic viability without compromising local traditions and cultural heritage.
“There was lots of spirited conversation,” Knopf said. “They shared opinions, then listened, and we co-discussed a way to draw the community together for forward movement.”
Aiming to scale up
The pilot tour to Taiwan was the first step in a larger goal to provide a global platform to incubate creative ideas, reciprocal networking, exchange of resources, and facilitate international partnerships to increase community capacity building.
To continue the collaboration between ASU’s PCD and Feng Chia University, Hsia plans to launch a community participatory tour program aiming to send a team to Taiwan in the summer of 2019. The tour will identify and more deeply explore select communities and building partnership with locals in those communities.
“The destination for future tours is not limited to Taiwan,” Hsia explained. “Any country with unique community development cases would be in our visiting destination list.”
To extend the partnership network, Rodney Machokoto, a current ASU doctoral student and Zimbabwean financial professional, and Ethan Hsu, a former ASU student and Taiwanese travel professional, are helping to contribute their connections and expertise to broaden the scope of the GCDP collaboration. The ultimate aim of the collaboration is to expand the concept to other parts of Asia, Europe, South America and Africa.
“It is a big dream, but we start where we are, leverage what we have, and achieve what we can,” Hsia said. | https://asunow.asu.edu/20180523-fostering-global-conversations-address-shared-challenges |
A technique to recognize coherent structures in turbulence signals is presented. A digital computer was programmed to extract and ensemble average the patterns which repeatedly occur in the streamwise fluctuating velocity signal of a bounded turbulent shear flow. It is believed that these patterns are the signatures of the coherent structure. These patterns can be characterized by a relatively weak deceleration of the flow followed by a strong acceleration which was on the average over twice as strong as the deceleration in the region near the wall. Pattern length varied over quite an extensive range (1:25) necessitating a normalizing scheme. The pattern recognition technique can (1) detect simple wave forms that are characteristic of a sequence of events producing Reynolds stress in the wall region, and (2) provide insight into the vorticity dynamics of organized structures. By using two probes simultaneously at different locations, the technique can give additional information about the spatial extension of the coherent structures.
- Publication:
-
Dynamic Measurements in Unsteady Flows
- Pub Date:
- 1979
- Bibcode:
- 1979dmuf.proc..161E
- Keywords: | https://ui.adsabs.harvard.edu/abs/1979dmuf.proc..161E/abstract |
McLaren hospitals taking coronavirus precautions
LANSING, MI. (WILX) - On Monday, McLaren Greater Lansing hospitals are taking precautions to help prevent the spread of coronavirus right here in Michigan.
On Monday McLaren hospitals are taking precautions to help prevent the spread of coronavirus right here in Michigan.
McLaren began screening their employees, patients and visitors for coronavirus.
Doctor Linda Peterson, Chief Medical Officer of McLaren Greater Lansing says screening for cornavirus and testing are two different things.
For screen tests, they will focus on key questions to keep in mind before actually testing for the virus.
Do you have a fever? Do you have a cough? Do you have shortness of breath?
Doctors in McLaren Greater Lansing will be screened or asking patients, those questions before deciding if a coronavirus test needs to be done due to the short supply of test kits.
"There are limitations in the testing that we do have available more is supposed to be coming, but currently due to the limitations were reserving our testing for those patients who are highly suspicious and require to be in the hospital," said Dr. Peterson.
Coronavirus screen testing will continue to happen until further notice with McLaren employees before they come to work along with patients and visitors.
"We know that influenza A is very prevalent right now so is strep throat -- but we also have allergies season coming and kicking in. So we're going to be trying to figure out the three buckets as I call them," said Dr. Peterson.
If doctors think a coronavirus test needs to be done McLaren will be testing in its emergency room.
"We know that people are going to be exposed so as far as exposure -- we know that the younger folks are the carriers, but we also know that our elderly population are the ones that are becoming ill and requiring hospitalization," said Dr. Peterson.
Dr. Peterson says that people should continue to follow CDC recommendations and to take the necessary precautions to keep yourself safe.
"If you feel like you might have the possibility to be contagious, there is nothing wrong with wearing a mask - again washing your hands will alleviate the needs to have gloves on. I basically don't see the need to do that currently," said Dr. Peterson.
As of Monday there are no patients at McLaren Greater Lansing who have tested positive for the coronavirus.
They do however have patients under investigation that are being monitored.
Online Public Information File
Viewers with disabilities can get assistance accessing this station's FCC Public Inspection File by contacting the station with the information listed below. Questions or concerns relating to the accessibility of the FCC's online public file system should be directed to the FCC at 888-225-5322, 888-835-5322 (TTY), or [email protected]. | |
Crossing of the Leopold Canal
Keywords for this place of interest
Crossing of the Leopold Canal
The first stage of the attack on the Breskens pocket in 1944 was a crossing of the Leopold Canal, just east of where it met up with the canal de derivation de la Lys. The attack started on 6 October, under support of several dozens of Wasp flamethrower carriers.
The Wasp flamethrower carriers doused the German positions across the canal with flames and thus covered the approach of Canadian troops crossing the Leopold Canal . The canal was a difficult, wide obstacle with steep banks, but the Canadians managed to cross it and establish two bridgeheads. These were fiercely attacked by the German forces and for three days the situation was precarious. Close quarter fighting was interchanged with large scale mortar and artillery strikes, making life along the canal absolute hell. On the early morning of 9 October the Canadian forces managed to link the two bridgeheads together, but progress remained slow. They were however aided that day by an amphibious landing of the Canadian 9th Brigade at the hamlet of Hoofdplaat, further to the north of the Breskens pocket. This attack caught the Germans by surprise and forced them to split their defensive efforts between multiple locations.
The Canadian soldiers managed to place several bridges across the Leopold Canal that allowed them to bring up troops and supplies more easily and even allowed for the deployment of tanks. This was a big help to the soldiers out in the flat open fields and it significantly helped in pushing the German forces back.
The attack across the Leopold Canal had been a success, but it came at a heavy cost. After the first seven days of fighting the Canadians had advanced only 1,000 meters at the cost of 600 casualties of which 111 dead.
Tourist information
On this location you can see a Bailey bridge that was placed here by the Canadian army in 1944. It is one of the last remaining Bailey bridges that is presently still in use.
| |
Public companies may need to look more closely at their exposure to cyberattacks after new guidelines were released this week by the U.S. Securities and Exchange Commission.
The guidelines, from the SEC’s division of corporation finance, aim to help companies determine when they need to disclose cyberattacks or the amount of risk they pose to a business.
In general, public companies in the U.S. are required to disclose incidents that could have a material impact on their business. While the current regulations don’t specifically mention cyberattacks, the new guidelines say they need to be reported in some cases.
Companies should disclose the risk of cyber-incidents “if these issues are among the most significant factors that make an investment in the company speculative or risky,” say the guidelines, issued late Thursday
To determine that, companies need to look at factors such as how likely it is they will be targeted by an attack and what the cost of an attack might be, in terms of disruption to operations or loss of sensitive data.
They may also be required to give details about hacking incidents that took place in the past.
“For example, if a registrant experienced a material cyberattack in which malware was embedded in its systems and customer data was compromised, it likely would not be sufficient for the registrant to disclose that there is a risk that such an attack may occur.” Instead, they would probably be required to reveal specifics of the incident, the SEC said.
The guidelines come in a year that has seen numerous high-profile hacking incidents, including a massive attack on Sony that forced it to take its PlayStation Network offline for more than a month.
The risk of cyberattacks has always been a potential disclosure issue, but the SEC guidance “really highlights the issue and brings it to the fore,” according to David Navetta, a founding partner of Information Law Group, which provides legal services related to IT matters.
Even so, he wrote in a company blog post, “materiality is still going to be a big issue, and not every breach will need to be reported as many/most will not likely involve the potential for a material impact to a company.”
One interpretation of the guidelines is that “companies internally are going to have to more carefully forecast and estimate the impact of cyber incidents and the consequences of failing to implement adequate security,” Navetta wrote.
“This analysis will go well beyond privacy-related security issues where most companies have focused (due to various privacy laws and regulator activity), and implicate key operational issues impacted by security breaches,” he said.
James Niccolai covers data centers and general technology news for IDG News Service. Follow James on Twitter at @jniccolai. James’s e-mail address is [email protected]
Note: When you purchase something after clicking links in our articles, we may earn a small commission. Read our affiliate link policy for more details. | https://www.pcworld.com/article/477412/us_companies_pushed_to_disclose_cyberattacks.html |
Shopping Center is located near the intersection of Rockville Pike and Nicholson Lane. It extends the entire block to Marinelli Road and is situated immediately adjacent to the White Flint Metro Station. The center is characterized by strong demographics and high traffic volumes with 57,750 ADT passing the site. The Company is actively engaged in master planning the property for redevelopment in the future. The zoning, in close proximity to the White Flint Metro, will allow multi-story, mixed-use development including retail, office and residential uses. | http://www.saulcenters.com/properties-metro/md/metro-pike/index.htm |
2. This document is for information purposes only.
3. The administrator of the personal data of the Users of the Website, within the meaning of the "GDPR" (Regulation 2016/679 of the European Parliament) and the Act of 27 April 2016 on the protection of personal data, hereinafter together referred to as Data Protection Act is Konrad Caban operating under the name SITEIMPULSE with its registered office in Warsaw (02-737), Poland at ul. Niedźwiedzia 29B, registered in Central Register and Information on Business (CEIDG) under the tax identification number (VAT ID): PL5212118341, National Business Registry Number (REGON): 012887347, phone: +48222195800, e-mail: office AT siteimpulse DOT com.
4. The Administrator declares that the User's personal data is processed in accordance with Data Protection Act and the Act of 18 July 2002 on providing electronic services (Polish Journal of Laws No. 144, item 1204 as amended).
5. Personal data of Users using the services and tools provided as part of the Website are processed in accordance with the provisions of this document, which the User has read and has consented to (for this purpose, the User selects the appropriate checkboxes on the Website prompted by the messages that appear on the Website).
6. The Administrator ensures that personal data is processed in accordance with the law and shall not be made available or sold to third parties.
7. The User has the right to ask the Administrator to obtain comprehensive information on how they personal data is being used. We always strive to clearly inform our Users about the data we collect, how we use it, what is its purpose and with whom we share it, how we protect it when sharing it with other entities; we also provide information about the institutions to contact if in doubt.
8. The Administrator declares that in order to secure data against unauthorized access or unauthorized use, all data collected is protected using reasonable technical, organizational and security measures.
9. The Administrator of the Website has exclusive access to data on the terms set out in this document. Access to personal data of the User may also be given to other entities, e.g. the services the Customer/User uses to make payments for purchases on the Website, which collect, process and store personal data in accordance with their own Terms and Conditions and Privacy Policies. Access to personal data of the User is given to the above entities only to the extent necessary for the provision of their services.
§2 Collecting and acquiring personal data and the scope and purpose of its collection
1. The personal data of the Users of the Website is (or will be) collected using the following features of the website: Contact form and Subscription to the Newsletter.
2. The administrator acquires information about Users, including by collecting server logs via the hosting provider.
3. The Administrator processes the personal data of the Users which are necessary for the correct implementation of the services available on the Website and is entitled to use the data collected and stored through the Website for the following purposes:
a) communications with Users regarding responding to the contact form inquiries,
b) sending Newsletter to the Users that have subscribed to, using the subscription form,
c) direct marketing of the Administrator's own products or services,
d) adjusting the offer and the User's experience, including advertisements, on the Website,
e) monitoring the activity of all Users and specific Users,
f) conducting research and analysis in order to improve the operation of the Website.
4. The Administrator is entitled to store the data collected and tracked on the Website only in the scope necessary for the implementation of the above-mentioned objectives.
5. The Administrator collects, processes and stores the following data of its Users:
a) e-mail address,
b) name and surname,
c) name of the company.
6. The Administrator declares that the provision of data by the User in the above-mentioned scope is completely voluntary and at the same time necessary for the implementation of the above-mentioned objectives.
7. Administrator is entitled to automatically acquire and record data transferred to the server via web browsers or devices of Users, e.g.: IP address, software and hardware data, pages visited, mobile device identification number, as well as other data related to devices and the use of the system.
8. In order to measure the attractiveness of advertisements and services provided to the Users, improve the quality and effectiveness of the services provided by the Website or other entities listed or participate in a scientific research, the Administrator may share anonymized data with other entities, including partners of the Website.
9. The Administrator informs the Users that the processing of personal data is entrusted to the following entities:
a) IQ PL Sp. z o.o., located at ul. Geodetów 16, 80-298 Gdańsk, Poland, National Court Register (KRS): 0000007725, Tax Identification Number (VAT ID): PL5832736211 in order to store personal data on the server where the website is installed.
10. Solutions used by the Administrator to track activity of the User within the Website:
a) Google Analytics,
b) Google AdWords,
c) Facebook Pixel.
§3 Cookies Policy
1. The Administrator automatically collects information contained in Cookie files in order to collect data related to the use of the Website by the User. Cookies are small text files that the Website sends to the User's browser and which are sent back by the browser upon the subsequent instances of accessing the Website. They are mainly used to maintain a session, e.g. by generating and sending a temporary identifier after logging in. The Administrator uses session (temporary) cookies that are stored on the User's end device until the User logs out, turns off the Website or disables the web browser as well as permanent cookies which are stored on the User's end device for the time specified in the parameters of the cookie files or until they are removed by the User.
2. As part of the Website, the Administrator uses the following types of Cookies:
- cookies that are necessary to enable the use of services available on the Website,
- cookies that ensure safety,
- advertising cookies that allow the delivery of advertising content adapted to the interests of the User,
- performance cookies that allow to obtain information about the use of the Website by the Users,
- functional cookies that allow to remember the User's preferences pertaining to the features of the Website.
3. The service administrator uses external cookies to collect general and anonymous statistical data via analytical tools provided by Google Analytics (the cookie administrator is Google Inc., based in the United States).
4. Cookie files adjust and optimize the Website and its offer to the needs of Users by creating website page statistics and ensuring the security of the Website and its Users. Cookies are also necessary to maintain the User's session after leaving the website.
5. At any time, the User may use their web browser to change the Cookie settings, including blocking the collection of Cookies or their deletion.
6. The User is fully entitled to block collecting or introducing other changes in the Cookies settings on their device, but must be aware that any such actions may hinder or make it impossible to use certain features of the Website.
8. Additional information on Cookies is available in the help menu of any web browser. Web browsers that support the Cookie files mentioned above include Internet Explorer, Mozilla FireFox, Google Chrome, Opera, Safari and Edge.
9. The Administrator may enable the collection of information using the above solutions directly on the Website by external entities, e.g. advertising suppliers or providers of analytical solutions. Data collected this way is subject to Privacy Policies of these entities.
10. Some third party entities that operate within the Website may allow Users to withdraw their consents to collect and use their data for the purpose of delivering advertising content based on the activity of the User. For more information please visit e.g. www.youronlinechoices.com.
§4 Rights and obligations
1. The Administrator has the right, as well as the statutory obligation to provide selected or all information regarding the Users of the Website to public authorities or to third parties who submit such a request for information on the basis of applicable provisions of the Polish law.
2. The User has the right to access their personal data collected by the Administrator at any time. The right includes the possibility of verification, modification, supplementation, deletion or limitation of data processing, opposition to processing, transfer of data and termination of personal data processing, the right to withdraw consent to the processing of data for a specific purpose if the User previously gave their consent as well as the right to lodge a complaint with the supervisory authority. These rights can be exercised without the necessity to provide a reason.
3. In order to exercise their rights, the User may at any time send a relevant declaration of will to the address of the Data Administrator or via electronic mail.
4. The Administrator declares that he shall not entrust processing of data and does not make available the collected personal data of Users without the consent of interested parties that are not related, unless the following circumstances take place:
b) The Administrator has the right to share data with public authorities in conducting proceedings related to possible violations of the law or in order to combat possible violations of the Terms and Conditions of the Website.
5. The User agrees to the processing of personal data by accepting the statements featured in the interactive forms available on the Website and provided by the Administrator, including Contact form and the Newsletter Subscription Form.
6. The User may also give consent to additional purposes of processing their personal data by accepting optional statements included in the forms available on the Website.
7. Users who submitted forms on the Website have the right to edit, inspect and delete any data they provide.
8. The User ensures that the data provided or published by them on the website is correct. Users who decided to delete their Account on the Website have the right to request for their personal data to be permanently deleted from the Administrator's resources.
9. Consents to receive commercial information that have been voluntarily given by the User may be revoked at any time at their request submitted via e-mail. Within 48 hours of receiving the statement on the withdrawal of consent the Administrator shall delete the User's data from the database of contacts which is used to provide commercial information by electronic means.
10. The Administrator undertakes to comply with applicable law and generally accepted rules of social conduct.
Warsaw, February 7th, 2020. | https://www.siteimpulse.com/en/additional-pages/privacy-policy |
Networking is the process to connect with people; to get to know them well enough to have an idea about the strengths that they can bring to a troop activity. These people could be fellow leaders, parents, or members of the community. Forming a network enables the leader to have a support group and a wealth of information around the troop. It makes the leader's job easier. The goal of networking is to talk with people frequently enough so that you will feel comfortable asking them for information. Asking other leaders where to go camping, talking to a friend about how to handle a problem girl in the troop, asking a member of the community if your troop could come and visit their business are all examples of networking.
Networking is as easy as talking! If you meet a total stranger:
Networking can help you help your troop. By using networking on fellow leaders you can find out important information on how they did activities in the past-you can base your activities on their knowledge. By networking with the parents, you are forming a basis from which you can ask for their help or expertise at meetings. By networking with members of the community you are adding program experts to your troop.
Networking is an important way to get tasks done through the knowledge of others and can make leaders' jobs much easier. | http://guidezone.e-guiding.com/networki.htm |
The Individuals with Disabilities Education Act (2004) is a U.S. federal law that promotes an inclusive model of classroom participation. In this model, the goal is that all children, regardless of disability status, learn together while receiving high quality instruction and developing positive social relationships with peers. With the rise of inclusive education, more and more students with disabilities are receiving instruction in the general education classroom. Thus, it is pertinent that general educators feel confident in their abilities to effectively teach students with disabilities. Unfortunately, research has demonstrated that general education teachers have a low sense of teacher efficacy for teaching students with disabilities, in part due to a lack of education, experience, and support. Acknowledging the importance of teacher efficacy and the role it plays in children’s academic success, this study attempted to analyze elementary teacher efficacy in multiple domains. First, teachers in my sample reported relatively high efficacy related to students with disabilities, but general educators reported lower efficacy than special educators. In addition, this study found that general educators reported higher overall efficacy scores in teaching students with disabilities than teaching students in general. Lastly, this study attempted to better understand the construct of teacher efficacy and found that special educators reported higher levels of efficacy-related details such as education, experience, and support. Implications for the field of education are discussed.
Comments
Imported from Johnson_ilstu_0092N_11701.pdf
Recommended Citation
Johnson, Morgan E., "A Comparison Between General And Special Educators: Elementary Teachers' Efficacy For Teaching Students With Disabilities" (2020). Theses and Dissertations. 1335. | https://ir.library.illinoisstate.edu/etd/1335/ |
CCL to continue ‘Zero Tolerance’ against coal pilferage
[20th Mar 2020] Chairman-cum-Managing Director, Central Coalfields Ltd (CCL), Gopal Singh presided a review meeting of the security department and issued necessary directives. During the meeting, informed him about the Standard Operating Procedures (SOPs) being practiced in Security department to curb coal pilferage and other security related issues were discussed in details.
Singh in his review meeting said that company will continue to adopt ‘Zero Tolerance’ towards any incident of coal pilferage, illegal mining and indiscipline. Company will take punitive action as per the norms, if any officer or staff is indulged in any such incident or activity.
Security Department has been asked to monitor the security situation 24 x 7 and review the related issued on daily basis. In this connection, 24 hours help line number has been functional and coal and security related issues of the command areas are monitored round the clock. If there is any unlawful activities like illegal mining, coal theft, mishaps inside the mines and others, then, suitable action are taken with the help of police force, rapid action force and other and normalcy is restored at the earliest. The CMD has also directed to set up two (02) Quick Reaction Teams at CCL Headquarters, Ranchi so that they can visit mines area from time to time to take stock of situation and act accordingly.
It is to be noted that CCL has deployed Global Positioning System or GPS-enabled vehicle tracking systems and CCTV cameras at mines to monitor mining activities.
This GPS-based vehicle tracking system on trucks carrying coal to arrest diversion of coal, overloading of coal and others.
Singh also directed the Area GMs to take appropriate action to curb coal pilferage, if any, with the help security department including State Police. He reiterated that the coal is property of the Country and the company is committed to meet energy requirement of the Nation.
CMD CCL thanked the Jharkhand Government, District Administration and other stakeholders for extending help to CCL in carrying out raids where there is suspect of illegal mining or unethical practices. | https://www.telematicswire.net/india-ccl-to-continue-zero-tolerance-against-coal-pilferage-2/ |
Cognitive modeling is a methodology of cognitive sciences that allows the simulation of human cognitive processes in a variety forms, commonly in a computational and mathematical way. The cognitive modeling aims at understanding cognition basis by designing cognitive models based on mathematical or computational processes, mechanisms and representations. A cognitive model is a verbal-conceptual computational and mathematical description of some mental processes, whose main purpose is to understand and/or predict human or animal behavior. Cognitive models developed for a cognitive architecture are characterized by being executables and producing a set of specific behaviors. CARINA is a metacognitive architecture to create artificial intelligent agents derived from Metacognitive Metamodel MISM. CARINA is a metacognitive architecture structured by two cognitive levels called object-level and meta-level. The object-level has the model of the world to solve problems. The meta-level represents the reasoning of an artificial intelligent agent. Furthermore, the meta-level has the components, the knowledge and the mechanisms for an intelligent system to monitor and control its own learning and reasoning processes. The main objective of this research project is to develop cognitive models as knowledge acquisition mechanisms for the metacognitive architecture CARINA, through the following specific objectives: i) to represent formal, semantic and computationally cognitive models for the CARINA metacognitive architecture, ii) to build a functional prototype of a framework for the creation of cognitive models in the metacognitive architecture CARINA and iii) to create cognitive models in several knowledge domains using CARINA based intelligent systems. The methodology used for this research project was part of the research methods (R+D) used in computer science, called modeling, structured by five steps: i) Formal representation, ii) Semantic representation, iii) Computational representation of a cognitive model, iv) Creation of a functional prototype for build cognitive models and v) Prototype testing and maintenance. The developed research project allows simplifying the developing intelligent agents process and the easiness to enable any programmer to uses CARINA to solve cognitive tasks, focusing only on descriptions of cognition and relationships with algorithms and programs based on computer science and technology, using a functional prototype (MetaThink version 2.0). As a result, an open standard file format, simplifying the complexities of detailed descriptions of cognitive mechanisms of brain functioning was created. | https://repositorio.unicordoba.edu.co/handle/ucordoba/2888 |
HemeLB is an open-source computational suite for fluid dynamics simulations of blood flow in the vasculature of the human body.
The HemeLB suite is able to generate 3D models of the vasculature of individual human body parts based on medical images such as an angiogram, MRI or CT scan.
These models are then used to run sophisticated fluid dynamics simulations (using the Lattice Boltzmann method) which can provide accurate haemodynamic estimates for blood vessels; for example, blood pressure, flow rate, and wall shear stress at different locations.
HemeLB has been developed by Professor Peter Coveney’s group at the UCL Centre for Computational Science.
The research software development team provided assistance with programming a key component of HemeLB: the ‘setup tool’ which creates 3D models of the vasculature based on medical images.
To date, HemeLB has primarily been applied to the simulation of blood flow in cerebral aneurysms – balloon-like malformations in the arteries of the brain; a potential cause of stroke. However, HemeLB is just one example of a wide array of models that are being developed as part of the Virtual Physiological Human project.
This project aims to bring together computational models, from the molecular to the organ scale, to simulate larger biological systems and eventually the whole body.
A primary concern for the group working on HemeLB was that, owing to the complexities of computing 3D geometrical operations, the setup tool used to generate the initial models of the vasculature failed in approximately 5% of cases.
This problem was likely to be a major blocker in the path towards deployment of HemeLB in production environments.
The Research Software Development Team (RSDT) was brought in to help identify the reason for these failures and to provide a solution to this problem, enabling the setup tool to work reliably in all cases.
HemeLB uses a 3D image of the vasculature which is split up into small cubes called voxels (like three dimensional pixels).
The primary job of the setup tool is to construct this representation by defining each voxel as interior (fluid) or exterior (solid) to a blood vessel’s surface.
Starting with a known voxel, the status of nearby voxels is determined by counting the number of intersections with the vessel’s surface when travelling in a straight line from one to the other: an odd number of intersections indicate a change in status from fluid to solid or vice-versa.
The HemeLB team identified the problem of resolving voxels on the surface of blood vessels (i.e. those which are partially inside and outside) as being the point of failure for the setup tool.
The cause was the fact that computers are limited in terms of the accuracy to which they can represent numbers and, in some cases, this made it impossible to tell whether a voxel and a surface intersect.
The chances of this occurring were very small when considering an individual voxel, but the setup tool had to perform millions of these calculations for each model.
The result was that, approximately 5% of the time, the setup tool produced inconsistent results because two assessments of the same voxel taken from different directions disagreed as to whether it was fluid or solid.
The RSDT had the difficult job of identifying all possible types of failures and writing exceptions into the code which could detect and resolve these failures. It was quickly determined that the set of geometrical algorithms initially chosen for the job was unsuitable due to numerical accuracy issues. Replacing those algorithms with a state-of-the-art computational graphics library allowed the identification of different, well separated, modes of failure in the intersection counting.
This wasn’t a case of writing just one exception as there were a lot of special cases to detect and each one needed code writing for it.
Jens Nielsen from the RSDT worked methodically to test the code for many possible points of failure and produce a solution for each one. His background in physics made him the ideal person to carry out this difficult mathematical and computational work.
Remedying the problems with the setup tool is a significant step towards producing a version of HemeLB which can be used as a tool in medicine.
Specifically, aneurysm treatment planning should benefit from the availability of accurate haemodynamic estimates in and around the aneurysm.
So, in future neurosurgeons could use HemeLB to help decide whether or not to operate.
However, HemeLB will have to obtain conformity certification (e.g. CE marking) if it is going to be used in the routine treatment of patients. To achieve this, Professor Coveney’s group will have to demonstrate that good software development practices have been followed by ensuring that HemeLB is well documented and well tested.
RSDT encourage all software development projects to apply good coding practice from the start and regularly run training courses with UCL researchers to introduce these concepts.
A HemeLB analysis of the pressure exerted on the blood vessel walls in the area surrounding an aneurysm.
In the academic environment, HemeLB is being applied in other areas of research: Miguel Bernabeu is now using HemeLB to study the relationship between haemodynamics and vascular remodelling.
His recent work, studying the developing mouse retina, has confirmed that vessels with low wall shear stress go on to be pruned later in development. This is the beginning of a larger project which aims to understand the parameters underlying vascular growth and change.
This work has potential significance for the development of drugs to treat cancer as it may help us to understand the processes underlying the quick and extensive vascularisation that supports tumour growth.
One of the next stages for development of HemeLB is to find a way to couple it with other computational models; for example, to model the relationship between fluid dynamics in blood vessels and mechanobiological responses to these stresses at the cellular level. | https://hpc-sig.org.uk/index.php/case-studies/hemelb-vascular-modelling-and-blood-flow-simulation/ |
1. Introduction {#sec1}
===============
Table tennis is a very fast, varied, and complex game, requiring an immediate response to changing stimuli. The difficulty of the game is increased by the high speed and variety of ball rotation \[[@B1], [@B2]\]. Multiple factors affect performance in this sporting discipline, including the level of technical preparation, tactical thinking, motor skills, mental preparation, and physiological determinants \[[@B3]\]. At an elite level, competition (match) outcomes are often determined by very small differences and sometimes by moments of excellent performance, and many table tennis coaches and professionals have identified comprehensive and perfect technique as a prerequisite for high-level success \[[@B4], [@B5]\]. In general, technique is thought to determine tactical potential and likelihood of achieving champion status \[[@B6]\].
There is evidence that the topspin forehand is among the most frequently used strokes in modern table tennis, in both the first attack and its continuation or counter-attack \[[@B7]--[@B9]\]. In this stroke, the velocity of the racket at the moment of contact with the ball reaches 20 m/s; following impact, the ball reaches a velocity of up to 45 m/s, rotating at up to 140 revolutions per second \[[@B1], [@B10], [@B11]\]. Theoreticians and practitioners regard the topspin forehand as a complex stroke, involving a kinematic chain of proximal-to-distal sequences or a stretch-shortening cycle. The speed at which the racket hits the ball is primarily influenced by hip joint and body rotation, flexion and adduction at the shoulder joint, and flexion at the elbow joint \[[@B12], [@B13]\]. During a game, the player must react to different situations and associated changes in ball parameters such as speed, rotation, flight trajectory, point of contact with the table, and height of rebound. In deciding on the type of stroke, the player adjusts their movements, the angle of the racket, the force applied, and the direction of racket movement. For example, a player attacking with topspin against a backspin shot and hitting the ball below the line (surface) of the table must "open" the racket, hitting the ball close to its central line and directing the movement from the bottom upward. In contrast, when returning a topspin ball flying above the net line, they must close the racket, hitting the upper part of the ball and directing movement strongly forward. Deciding on the type of stroke may also involve other changes---for example, from a rotational to a direct hit---resulting in further alteration of motion parameters.
This complexity means that players must choose from a range of options while maintaining high movement accuracy. It is therefore interesting to explore variations in table tennis players\' movements and the limits of this variation. Within the rich literature on movement variation, some researchers have approached this as a problem of movement "noise"---that is, as nontargeted variability resulting from a complex multijoint movement \[[@B14]\]. However, it is increasingly suggested that this variability (both inter- and intraindividual) may be a functional and purposeful response to different situations and requirements of the task, such as parameters of the flying ball or avoiding injury \[[@B14]\]. Others have emphasized the need for consistency and repeatability; for example, Whiteside et al. suggested that a consistent projection angle during service is critical for successful tennis performance \[[@B15]\]. Small differences in movement parameters may also indicate a compensation mechanism, as for example when a change in the range of motion at one joint is compensated by a change at another \[[@B16]--[@B20]\]. According to some researchers, human movement variability facilitates motor learning through active nervous system regulation \[[@B21], [@B22]\]. Functional variability of movement is also thought to change and develop with player age and experience \[[@B23]\]. There is also evidence that variability decreases when movement is accompanied by increased mental focus on a particular aspect of activity \[[@B24]\].
As well as works investigating the kinematics of table tennis strokes \[[@B10], [@B12], [@B25]\], a number of studies on stroke kinematics have examined the relationships between movement and work done or force generated, between force and racket speed, and between the kinetics of the upper limbs and other body segments \[[@B13], [@B26], [@B27]\]. To the best of our knowledge, however, the issue of movement variability in table tennis kinematics has not yet been intensively explored. Among existing studies, Bootsma and van Wieringen \[[@B28]\] referred to movement variability in the accuracy and time of movement of five table tennis players during a drive stroke (which can be described for present purposes as "light topspin"). They found that when forced to play accurately---that is, to hit a specified target---the spatial and temporal accuracy of players\' movement was reduced in attempting to hit the target. At the same time, variability at the moment of contact between racket and ball was also reduced---a phenomenon they characterized as "compensatory variability." In a study of racket kinematics and direction during the forehand drive stroke across different levels of expertise, Shepard and Lee also found that movement variation was reduced at the time of racket-ball contact \[[@B29]\]. They described this phenomenon as "funneling" and again noted the speed-accuracy trade-off.
It seems, then, that the mechanisms of movement variability in table tennis warrant more detailed investigation. In particular, it seems interesting to investigate the best table tennis players\' use of the topspin forehand, which is the most commonly used stroke in the game. To guide the teaching-learning process and to individualize the training process, it seems useful to explore movement variability and the conditions and limits of its occurrence. This may assist in the process of monitoring and correcting technique and in developing improvement plans for individual players.
To that end, the present study employed inertial measurement unit (IMU) sensors from the myoMotion System to measure selected kinematic parameters of the topspin forehand stroke and the intra- and interindividual variability of these parameters among advanced male table tennis players. Specifically, we hypothesized that measurement of key kinematic parameters of the topspin forehand stroke (duration of the cycle and its phases and knee, shoulder, elbow, and wrist joint angles) would explain any variability in these strokes. We further assumed that the values of some of these parameters would vary more (CV \> 40%)---especially in the Ready position and Backswing phases---and that some would be less variable (CV \< 20%), especially the moment of contact and elbow and wrist joint angles, in light of the principle of "funneling" described in the literature.
2. Materials and Methods {#sec2}
========================
The study participants were seven top adult male players from Poland\'s national team, with a mean body height of 177 ± 3.5 cm and mean body mass of 76 ± 8.5 kg. Each participant was informed about the purpose and nature of the research and signed an informed consent form. The study protocol was approved by the Institutional Ethics Board (Senate\'s Research Bioethics Commission at the University School of Physical Education in Wrocław). All the players ranked among the top ten Polish senior athletes. Six of the players were right-handed, and one was left-handed. Participants were asked to perform the topspin forehand stroke with submaximal or maximal force on a specially prepared stand (see [Figure 1](#fig1){ref-type="fig"}), and individual kinematic parameters of the players were measured using the MR3 myoMuscle Master Edition system (myoMOTION™, Noraxon, USA). To record acceleration, wireless IMU sensors were attached (as per the myoMotion protocol described in the manual) to the following body segments: head, left and right arms, left and right forearms, left and right hands, left and right thighs, left and right foot, shanks, and body trunk (see [Figure 2](#fig2){ref-type="fig"}). The myoMotion system includes a set of 1 to 16 inertial sensors; using so-called fusion algorithms, a 3D accelerometer, gyroscope, and magnetometer measure the 3D rotation of each sensor in absolute space in terms of yaw, pitch, and roll (also known as orientation or navigation angles). To record and analyze the moment of racket-ball contact, a piezoelectric sensor (7BB-20-6L0, Murata Manufacturing Co., Ltd., USA) compatible with the myoMotion system was attached to the racket. The max sampling rate was 100 Hz per sensor for the whole 16-sensor set, and this was adjusted to the speed of registration by the piezoelectric sensor (1500 Hz). The maximum test range of the 3-axis digital accelerometer is ±16*g* (*g* = 9.8 m/s^2^) with 10000*g* high shock survivability.
Prior to testing, the athletes completed the standardized general (15 minutes) and sport-specific (20 minutes) warm-up procedures. Each then performed a topspin forehand with maximum or submaximal force. Each task comprised 15 presented strokes, and the player was required to hit the marked area (30 × 30 cm) at the corner of the table. Every successful shot (i.e., "on table" and played diagonally) was recorded for further analysis. Any balls missed, hit out of bounds, or hit into the net were excluded. Balls were delivered according to specified parameters (see [Table 1](#tab1){ref-type="table"}) by a dedicated table tennis robot (Newgy Robo Pong Robot 2050, Newgy Industries, Tennessee, USA; see [Figure 1](#fig1){ref-type="fig"}).
All movement parameters were recorded and calculated using a standard protocol and report of the myoMotion software. Focusing on the topspin forehand technique, assessment of variability was confined to joints on the playing side (shoulder, elbow, and wrist) and the knee joints, which have been identified as decisive for performance of the topspin forehand \[[@B12], [@B30], [@B31]\]. We chose to discuss only selected movements in sagittal plane where the ROM is greatest and the speed of movement has probably the greatest impact on the spin of ball. In order to show the magnitude of variation, we chose only selected parameters. The sensors attached to the athlete\'s body and to the racket recorded the values of the following parameters for further analysis: angles of playing hand, extension of the wrist, shoulder flexion, elbow flexion, and knee flexion (both sides), and acceleration of the playing hand at the moment of racket-ball contact. Movement of the playing hand was measured to assess the following specific events in the cycle: Ready position (racket not moving after previous stroke, before swing, forward-backward acceleration =0); Backswing (the moment at which the racket changes direction from backward to forward in the sagittal plane following the swing); and Forward (the moment at which the racket changes direction from forward to backward in the sagittal plane after the stroke). The fourth event in the cycle---the moment of ball-racket contact---was captured by the racket-mounted sensor. Each click on the racket (i.e., contact of racket and ball) transmitted a signal from the sensor to the system software. The moment at which this signal was registered was treated as the moment of racket-ball contact.
By capturing these events, it was possible to determine the duration of individual phases of the stroke: Backswing (Ph1); Hitting (Ph2); Followthrough (Ph3); and Back to Ready position (Ph4). It is also worth noting that the study confirms the utility of Noraxon\'s IMU as an alternative to optical motion capture systems for movement analysis. During dynamic trials, the root mean square error (RMSE) for myoMotion (as compared to Vicon) was 0.50 deg, with a correlation coefficient of 0.99 between Vicon and myoMotion for dynamic trials \[[@B32]\].
Using basic descriptive statistics (means, standard deviations, and variances) for all kinematic parameters, their variability was measured as coefficients of variation \[[@B33]\]. For the purposes of this study, low variability was defined as CV \< 20; medium variability was defined as 20--40; and high variability was defined as CV \> 40. Statistical calculations were performed using the Statistica software (Statistica 12.5, StatSoft Inc., Tulsa, USA).
3. Results and Discussion {#sec3}
=========================
Intraindividual and interindividual variability in the topspin forehand stroke was measured by coefficients of variation (CV), based on IMU values for the following kinematic parameters.
3.1. Time Duration {#sec3.1}
------------------
The results for temporal parameters are shown in Tables [2](#tab2){ref-type="table"} and [3](#tab3){ref-type="table"}.
There was little variation in overall cycle duration across participants ([Table 2](#tab2){ref-type="table"}). Of the four distinct phases, the Hitting phase (Ph2) was shortest in duration. Variability in the duration of individual hitting phases was small (CV \< 20%) or medium (20--40%). Values in Ph4 (return to the Ready position) differed for every player and returned the most cases of CV \> 40%. Among individual players, variability in duration of the entire cycle and its individual phases ([Table 3](#tab3){ref-type="table"}) was small (total time TT), with CV values for all players ranging from 0.8% to 6.7% ([Table 3](#tab3){ref-type="table"}). Low variability cases included Ph1 (one player), Ph2 (four players), and Ph3 (six players). The remaining cases in these three phases were characterized by medium variability. Based on these results, the large number of cases of low variability (low CV values) in individual athletes for the entire duration of the stroke (TT) and for most phases (mainly Hitting and Followthrough) indicates that variation in these parameters is small and that stroke characteristics are fairly constant, confirming the findings of previous studies \[[@B11], [@B13]\]. For each player, the greatest variation was observed in duration of Ph4 (Back to Ready position). The beginning of the Ready position phase (Ph4) was defined as the point at which the player held the racket stationary before the next action (forward − back acceleration = 0) while waiting for the robot to deliver the ball. As this moment was freely determined by each participant, the duration of this phase varied more. Interestingly, the results across the entire group indicate small or medium variation in duration for most phases ([Table 3](#tab3){ref-type="table"}) other than Ph4 (from Forward to Ready position), where variability exceeded 40%. This indicates that players\' performance of the tasks was similar in terms of duration of the stroke and its individual phases.
3.2. Angles {#sec3.2}
-----------
The myoMotion system was also used to measure angles at joints known to be important for specific events during table tennis performance (see Tables [3](#tab3){ref-type="table"} and [4](#tab4){ref-type="table"}). In the analysis of results for the entire group (intervariability), knee and elbow joints accounted for the highest number of cases of small variability (low CV value) (see [Table 4](#tab4){ref-type="table"}). There were 8 cases of high or very high variability and 12 cases of small or average variability. In terms of intraindividual variability, the analysis indicates that individual variability of movement was low in 82 of 140 cases and medium in 19 cases ([Table 5](#tab5){ref-type="table"}). Regarding individual events, there were some cases of high variability for all joints, most of which related to angles in the Ready position (6 of 35 cases) and at the moment of contact (14 of 35 cases) (see [Table 4](#tab4){ref-type="table"}). High variability most often related to the position of the hand at the wrist joint on adopting the Ready position (2 of 7 cases), completion of the movement (Forward, 6 of 7 cases), and the position of the arm at the shoulder joint at the moment of Backswing (3 of 7 cases).
The analysis of angle variations in the four selected topspin forehand events (Ready position, Backswing, Contact, and Forward) focused on the CV values of the angles. Intraindividual variability was more often small or medium rather than large, indicating that the participating players each used a repeatable technique. As in other sports, however, it is impossible to state unequivocally that any given player repeated the same task with the same movement pattern. For example, in their review of research on interindividual and intraindividual variation in track and field throwing events, basketball throws, and gait during human locomotion, Bartlett et al. demonstrated that the large variation in movement is probably functional in character, as athletes make motor adjustments or seek to avoid injury \[[@B14]\]. They also noted that even the best athletes (with similar results) fail to perfectly reproduce the same movement (in terms of parameters, range of motion, and coordination). Bartlett et al. further argued that these factors should be considered when preparing an individualized training plan for each athlete, taking into account their unique capabilities. In the present context, that might include addressing the various ways of coordinating topspin movement and perhaps compensating for a small range of motion in one joint by ensuring a larger range of motion in another. Crucially, any coaching to shape and improve stroke technique should be flexible.
3.3. Acceleration and Compensatory Mechanism {#sec3.3}
--------------------------------------------
The variability of acceleration values was small in all cases, both for the entire group and for individual players ([Table 6](#tab6){ref-type="table"}). It is important to mention that the specified task required participants to use submaximal force. At the moment of contact, several players exhibited high or very high variability of angles, especially in extension at the wrist joint. There was also medium and high variability of the shoulder joint in many cases, but the variability of acceleration values remained low, perhaps because changes at the shoulder and wrist joints are mutually dependent---in other words, changes at one joint are compensated for by changes at the other. This kind of compensation mechanism has been observed in other studies and in other sports; for example, Button, MacLeod, Sanders, and Coleman evaluated movement variability in basketball players performing free throws \[[@B34]\] and found that players compensated for mutual changes of angle at the elbow and wrist joints. They further reported that variability at the elbow and wrist joints tended to increase toward the end of the throwing action. In a study of cueing actions in billiards (assessing parameters such as velocity, acceleration, height, and angle of the cue), Kornfeind et al. \[[@B35]\] observed significant variability in stroke movement despite very similar outcome values.
Many researchers have emphasized functional variability---that is, flexible changes in movement parameters in response to the changing requirements of the game or competition \[[@B14], [@B19], [@B36]\]. In the present case, the observed acceleration values may indicate similar functional variability and compensation mechanisms in table tennis. While angular variability at the joints was often low or medium in individual athletes, the frequency of high variability cases indicates that table tennis players\' technique is not entirely repetitive. In contrast, there was very little difference in hand acceleration at the time of contact, with CV values well below 10%. Despite some angular variation in subsequent events, individual players (and the entire group) exhibited relatively constant hand acceleration at the moment of contact between racket and ball, indicating compensatory changes in angular parameters (e.g., shoulder/wrist) as observed in many other sports \[[@B16]--[@B19], [@B37], [@B38]\].
In sporting contexts, there is some evidence of the need for constancy and repeatability in the range of specific parameters \[[@B15]\]; in the present case, one such constant element was acceleration value at the moment of contact, with small CV values across the entire group. A similar phenomenon has been documented in billiards \[[@B36]\], golf \[[@B20]\], basketball \[[@B31]\], and by other authors \[[@B14]\]. The low CV values for acceleration at so important a point as racket-ball contact support the findings of Bootsma and Wieringen \[[@B29]\] and Shepard and Lee and Xie \[[@B30]\] regarding acceleration and reduced variability at critical moments.
Among the limitations of the present study, the sample was small (*n* = 7), and all of the participants were male, making it difficult to generalize the findings. Additionally, while this study examined only the topspin forehand with use of submaximum or maximum force, our recent work reports similar findings for other variants of this stroke \[[@B39]\]. A final limitation is that the present study was laboratory-based, and examination of variability in kinematic parameters under game condition might yield different outcomes.
4. Conclusions {#sec4}
==============
In this study of the table tennis topspin forehand, the use of an IMU system facilitated measurement of the duration of individual phases and key kinematic parameters, as well as estimation of their variability. The low CV values for duration of most phases (mainly Hitting and Followthrough) for both individual athletes and the entire group indicates small variability in this constant stroke characteristic.
Intraindividual variability of angles was most often low or medium, indicating repeatable technique among the participating players. Nevertheless, it is impossible to state unequivocally that any player repeated the same task with the same movement pattern. As the literature suggests, the large variability in movement may be functional and compensatory in character, reflecting motor adjustment of various parameters.
Inter- and intraindividual variability of joint angles was generally low for the knees and the elbow joint. The greatest observed variability was in extension at the wrist joint, with medium or large variability of the shoulder joint in many cases. It seems likely that the observed changes at the shoulder and wrist joints are mutually dependent (i.e., changes at one joint are compensated for by changes at the other).
There was low variability in hand acceleration. Despite the variability of some angles in subsequent events, it can be concluded that individual players achieved relatively constant hand acceleration at the moment of contact between racket and ball. This indicates compensatory changes in angular parameters at one joint to offset changes at another.
Data Availability
=================
The raw data.xls data used to support the study findings are included in the supplementary information file (available [here](#supplementary-material-1){ref-type="supplementary-material"}).
Disclosure
==========
This research was performed as part of the authors\' employment at the University School of Physical Education in Wrocław. No other parties were involved in writing, editing, or approving the manuscript, or in the decision to publish.
Conflicts of Interest
=====================
The authors have no conflict of interest to declare.
Supplementary Materials {#supplementary-material-1}
=======================
######
Table S1.
######
Click here for additional data file.
{#fig1}
{#fig2}
######
Table tennis robot parameters.
Robot parameter Value
-------------------------------------------------------------------------------------- ---------
Rotation (direction of spin) Topspin
Speed (determines both speed and spin, where 0 is the minimum and 30 is the maximum) 18
Left position (left most position to which the ball is delivered) 4
Wing (robot\'s head angle indicator) 8.5
Frequency (time interval between balls thrown) 1.4
######
Time duration of particular phases during topspin forehand in the entire group of players (*n* = 7)---means, standard deviations (SD), variations (V), and coefficients of variation (CV).
Variable Topspin forehand
---------- ------------------ ------ ---------- --------- ---------
Mean (s) 0.5 0.1 0.2 0.4 1.5
SD (s) 0.1 0.0 0.0 0.1 0.0
V 0.0 0.0 0.0 0.0 0.0
CV (%) 18.3^∗∗^ 46.2 18.2^∗∗^ 25.7^∗^ 1.4^∗∗^
Ph1: Backswing; Ph2: Hitting; Ph3: Followthrough; Ph4: Back to Ready position; TT: total time of the cycle. ^∗^Average variability. ^∗∗^Small variability. Not marked CV: high and very high variability.
######
Variability (CV in %) of time duration of particular phases during topspin forehand in particular players (1-7).
Player Topspin forehand
-------- ------------------ ---------- --------- ------- ---------
1 31.6^∗∗^ 10.0^∗∗^ 21.4^∗^ 107.8 2.3^∗∗^
2 22.1^∗^ 36.8^∗^ 3.1^∗∗^ 65.9 1.1^∗∗^
3 25.3^∗^ 36.0^∗^ 1.6^∗∗^ 79.9 5.0^∗∗^
4 21.6^∗^ 13.8^∗∗^ 5.2^∗∗^ 64.4 0.8^∗∗^
5 15.9^∗∗^ 15.5^∗∗^ 2.8^∗∗^ 63.7 0.9^∗∗^
6 22.2^∗^ 30.8^∗^ 8.9^∗∗^ 65.2 6.3^∗∗^
7 28.4^∗^ 9.2^∗∗^ 6.7^∗∗^ 80.1 6.7^∗∗^
Ph1: Backswing; Ph2: Hitting; Ph3: Followthrough; Ph4; Back to Ready position; TT: total time of the cycle; ^∗^Average variability. ^∗∗^Small variability. Not marked CV: high and very high variability.
######
Values of angles at joints in chosen events during topspin forehand in the entire group of players (*n* = 7)---means, standard deviations (SD), variations (V), and coefficients of variation (CV).
Ready position Backswing Contact Forward
------------ ---------------- ----------- --------- --------- ---------- ------ ------- ------- --------- ---------- ------- --------- -------- --------- ---------- --------- --------- ------- --------- ---------
Mean (deg) 13.2 66.1 44.7 43.3 41.4 8.7 47.6 25.4 51.9 58.0 26.4 43.7 47.7 47.6 52.7 90.8 87.0 -3.0 51.1 49.7
SD (deg) 9.2 6.6 41.5 10.6 5.3 8.6 20.9 11.8 14.3 8.9 11.8 15.3 39.3 12.7 9.3 18.2 21.5 25.2 10.8 10.1
V 84.3 43.9 1727.8 111.5 28.1 74.9 435.0 139.3 203.6 78.7 139.1 232.8 1542.5 162.4 87.3 330.9 464.1 636.2 117.2 102.7
CV (%) 69.6 10.0^∗∗^ 92.4 24.4^∗^ 12.8^∗∗^ 99.2 43.8 46.5 27.5^∗^ 15.3^∗∗^ 44.6 34.9^∗^ 82.3 26.8^∗^ 17.7^∗∗^ 20.0^∗^ 24.7^∗^ 851.0 21.2^∗^ 20.4^∗^
ShF: shoulder flexion; ElF: elbow flexion; WrE: wrist extension; RKnF: right knee flexion; LKnF: left knee flexion. ^∗^Average variability. ^∗∗^Small variability. Not marked CV: high and very high variability.
######
Values of angles at joints in chosen events during topspin forehand of particular players (1-7)---means, standard deviations (SD), variations (V), and coefficients of variation (CV).
Variable Ready position Backswing Contact Forward
---------- ---------------- ----------- --------- ---------- ---------- ---------- ---------- ---------- ---------- ---------- --------- ---------- --------- ---------- --------- --------- ---------- ---------- ---------- ---------- ------
1 Mean (deg) 10.8 62.2 82.2 44.7 42.1 36.1 75.8 6.0 74.8 65.8 34.9 56.7 88.5 71.7 59.6 82.1 108.5 40.2 66.9 57.6
SD (deg) 11.6 11.9 33.9 16.6 13.2 32.7 6.2 43.2 3.4 6.9 15.8 26.1 39.9 30.8 27.6 24.2 19.6 74.3 10.9 9.3
V 135.1 141.2 1148.4 276.5 173.6 1067.2 38.6 1862.9 11.3 48.3 251.1 681.1 1593.4 947.4 759.6 586.3 383.7 5521.9 118.9 86.5
CV (%) 147.7 19.0^∗∗^ 49.1 33.4^∗^ 28.1^∗^ 138.3 8.4^∗∗^ 185.9 4.5^∗∗^ 10.7^∗∗^ 55.7 55.4 54.8 54.3 55.3 32.3^∗^ 18.4^∗∗^ 308.3 16.9^∗∗^ 16.5^∗∗^
2 Mean (deg) 18.5 80.3 40.0 59.5 40.2 0.6 58.1 31.6 70.6 71.6 17.2 61.0 62.1 64.3 70.4 70.2 72.2 -8.4 50.5 61.8
SD (deg) 19.6 3.6 10.1 3.8 7.3 30.5 19.2 23.7 7.2 6.0 22.6 21.5 16.0 2.7 4.1 36.7 2.7 11.5 4.7 5.2
V 386.0 12.6 103.0 14.2 53.1 930.5 370.3 563.8 52.0 35.6 509.8 463.6 255.5 7.3 16.7 1344.6 7.4 132.5 21.9 27.0
CV (%) 144.6 4.4^∗∗^ 23.1^∗^ 6.4^∗∗^ 17.7^∗∗^ 931.5 35.04 88.0 10.4^∗∗^ 8.4^∗∗^ 181.5 41.5 24.1^∗^ 4.2^∗∗^ 5.8^∗^ 48.5 3.8^∗∗^ 131.3 9.0^∗∗^ 8.4^∗∗^
3 Mean (deg) 17.2 68.8 33.9 38.1 50.0 11.5 67.5 40.4 47.9 57.7 -1.4 43.9 5.9 42.4 61.3 75.9 104.5 11.9 58.6 47.8
SD (deg) 3.5 7.6 8.1 4.5 4.7 2.4 2.4 8.3 3.6 5.1 3.4 22.2 4.4 21.2 29.5 2.3 8.9 6.6 5.7 7.7
V 12.2 57.1 65.5 20.0 22.2 5.6 5.7 68.9 12.6 26.4 11.6 493.9 19.6 450.0 871.6 5.2 78.9 43.9 32.6 58.5
CV (%) 20.8^∗^ 11.1^∗∗^ 24.2^∗^ 11.3^∗∗^ 9.3^∗^ 19.2^∗∗^ 3.5^∗∗^ 19.1^∗∗^ 7.6^∗∗^ 8.9^∗∗^ 147.0 66.4 78.0 66.6 65.7 3.0^∗∗^ 8.3^∗∗^ 48.5 9.8^∗∗^ 15.7^∗∗^
4 Mean (deg) 14.6 67.3 -1.5 48.1 36.1 12.8 13.9 23.4 48.6 50.0 19.1 18.6 24.2 45.6 43.0 87.8 60.9 12.1 52.2 37.0
SD (deg) 6.0 17.7 2.7 10.0 6.4 7.6 7.0 3.0 16.7 6.7 6.0 7.2 6.8 17.3 12.9 3.9 3.5 6.1 16.8 4.9
V 35.4 311.6 7.1 100.6 40.4 57.8 49.4 8.9 277.9 45.2 36.4 52.3 45.7 297.8 165.7 15.2 12.0 37.6 281.6 23.9
CV (%) 41.8 27.8^∗^ 214.5 22.5^∗^ 16.6^∗∗^ 59.3 47.9 13.0^∗∗^ 37.8^∗^ 13.4^∗∗^ 32.7^∗^ 40.5 30.4^∗^ 44.9 31.0^∗^ 4.4^∗∗^ 5.7^∗∗^ 52.6 36.8^∗^ 12.7^∗∗^
5 Mean (deg) 21.1 61.8 79.5 46.1 40.4 6.0 48.3 30.3 49.8 55.2 10.3 62.3 54.9 49.5 50.5 107.1 113.8 -48.3 56.6 57.5
SD (deg) 3.5 4.9 6.3 3.9 7.6 3.8 6.2 6.3 3.2 5.1 4.6 4.4 4.8 3.1 6.5 2.4 4.4 7.7 4.3 4.7
V 12.0 23.6 40.1 15.6 57.8 14.5 38.8 40.3 10.3 25.8 21.2 19.7 23.1 9.7 42.8 5.9 19.0 59.6 18.2 22.6
CV (%) 16.9^∗∗^ 7.9^∗∗^ 7.9^∗∗^ 8.5^∗∗^ 20.0^∗∗^ 60.7 13.1^∗∗^ 21.1^∗^ 6.5^∗∗^ 9.2^∗∗^ 46.1 7.1^∗∗^ 8.8^∗∗^ 6.3^∗∗^ 12.7 2.3^∗^ 3.8^∗∗^ 15.2^∗∗^ 7.5^∗∗^ 8.18^∗∗^
6 Mean (deg) 0.8 60.6 102.7 39.3 38.7 22.3 29.0 26.8 45.5 44.1 27.2 35.3 88.9 48.9 52.9 135.2 71.8 -27.7 52.2 49.7
SD (deg) 2.6 3.4 8.7 5.0 3.5 2.9 4.0 3.5 3.1 3.7 2.5 5.2 6.2 5.1 3.4 37.6 4.7 20.2 6.4 4.6
V 6.5 11.8 75.4 25.4 12.2 8.2 16.4 12.1 9.8 13.7 6.3 26.9 38.3 25.8 11.6 1412.7 22.5 408.1 41.4 21.3
CV (%) 356.6 5.6^∗∗^ 8.7^∗∗^ 13.1^∗∗^ 9.3^∗∗^ 12.4^∗∗^ 13.8^∗∗^ 12.6^∗∗^ 7.0^∗∗^ 8.2^∗∗^ 9.1^∗∗^ 14.1^∗∗^ 7.0^∗∗^ 10.6^∗∗^ 6.3^∗∗^ 30.7^∗^ 6.6^∗∗^ 83.0 12.6^∗∗^ 9.3^∗∗^
7 Mean (deg) 22.1 73.8 -6.5 26.7 33.2 -14.2 34.7 11.2 36.3 66.6 2.6 38.0 11.6 35.2 65.9 94.7 88.0 12.8 29.6 36.0
SD (deg) 9.7 4.6 5.2 6.2 4.6 4.6 5.6 5.8 1.1 3.1 3.4 5.9 4.8 1.4 2.6 4.6 5.0 6.9 3.4 3.7
V 94.4 20.8 27.5 38.4 20.7 21.3 30.9 33.2 1.2 9.8 11.4 34.3 23.2 1.8 6.6 21.0 25.3 47.5 11.4 14.0
CV (%) 43.7 6.7^∗∗^ 76.3 22.9^∗^ 13.8^∗∗^ 35.1^∗^ 15.1^∗∗^ 48.4 3.0^∗∗^ 4.7^∗^ 121.2 14.7^∗∗^ 42.0 3.9^∗∗^ 3.9^∗∗^ 4.8^∗∗^ 5.8^∗∗^ 57.3 11.3^∗∗^ 10.4^∗∗^
ShF: shoulder flexion; ElF: elbow flexion; WrE: wrist extension; RKnF: right knee flexion; LKnF: left knee flexion; ^∗^Average variability; ∗∗Small variability; not marked CV: high and very high variability.
######
Values of acceleration of "playing hand" in the moment of racquet\'s contact with the ball---entire group and particular players---means, standard deviations (SD), variations (V), and coefficients of variation (CV).
Variable Topspin forehand
------------------------ --------------- ------------------
Entire group (*n* = 7) Mean (m/s^2^) 149.2
SD (m/s^2^) 8.6
V 73.7
CV (%) 5.8^∗∗^
Players
1 Mean (m/s^2^) 159.4
SD (m/s^2^) 3.1
V 9.6
CV (%) 2.0^∗∗^
2 Mean (m/s^2^) 160.1
SD (m/s^2^) 14.3
V 204.6
CV (%) 9.2^∗∗^
3 Mean (m/s^2^) 158.9
SD (m/s^2^) 3.6
V 12.9
CV (%) 2.3^∗∗^
4 Mean (m/s^2^) 156.0
SD (m/s^2^) 6.8
V 46.0
CV (%) 4.3^∗∗^
5 Mean (m/s^2^) 138.4
SD (m/s^2^) 10.1
V 101.5
CV (%) 7.3^∗∗^
6 Mean (m/s^2^) 157.9
SD (m/s^2^) 1.8
V 3.1
CV (%) 1.1^∗∗^
7 Mean (m/s^2^) 148.3
SD (m/s^2^) 14.3
V 204.7
CV (%) 9.6^∗∗^
^∗^Average variability. ^∗∗^Small variability. Not marked CV: high and very high variability.
[^1]: Academic Editor: Juri Taborri
| |
This is article 1 of 6 in a collection about the Demographic transition Model – a fundamental concept in populace education, i beg your pardon is extended in Social studies courses, many notably AP human Geography.
You are watching: The highest crude death rates are found in countries in which stage of the demographic transition?
Beginning in the so late 1700s, something impressive happened: death rates declined. With brand-new technologies in agriculture and production, and advancements in health and sanitation, a greater number of people lived through their adolescent years, increasing the average life expectancy and creating a brand-new trajectory for populace growth. This sudden change created a change in knowledge the correlation between birth and death rates, which approximately that point had both been fairly equal, regardless of location. Over the previous 300 years, populace demographics have continued to evolve as a result of the relationship between the birth and death prices within a country. The observation and documentation the this global phenomenon has developed a model, the Demographic change Model, which helps explain and make feeling of alters in populace demographics. Using the Demographic shift Model, demographers can much better understand a country’s current populace growth based on its placement in ~ one of five stages and then happen on that data come be used for addressing economic and social policies within a nation and across nations.
What is the Demographic shift Model?
The Demographic change Model (DTM) is based on historical population trends of 2 demographic features – birth rate and death price – to imply that a country’s total populace growth price cycles through stages together that country develops economically. Each stage is identified by a certain relationship between birth price (number of annual births every one thousand people) and also death rate (number of annual deaths every one thousand people). As these rates adjust in relationship to each other, your produced influence greatly influence a country’s total population. Within the model, a country will progress gradually from one phase to the following as specific social and also economic pressures act ~ above the birth and also death rates. Every country can be placed within the DTM, but not every stage of the model has actually a nation that meets its certain definition. For example, over there are currently no nations in stage 1, nor space there any type of countries in stage 5, however the potential is there for motion in the future.
What are the stages of the Demographic transition Model?
In Stage 1, which used to many of the world prior to the commercial Revolution, both birth rates and also death rates are high. As a result, populace size remains fairly constant but can have significant swings with occasions such as battles or pandemics.In Stage 2, the introduction of contemporary medicine lowers fatality rates, especially amongst children, when birth prices remain high; the result is rapid populace growth. Many of the least developed countries today are in phase 2.In Stage 3, bear rates gradually decrease, typically as a an outcome of improved financial conditions, rise in women’s status, and accessibility to contraception. Populace growth continues, however at a reduced rate. Most arising countries are in phase 3.In Stage 4, birth and also death rates are both low, stabilizing the population. These nations tend to have stronger economies, higher levels that education, better healthcare, a greater proportion of functioning women, and a fertility price hovering about two youngsters per woman. Most developed countries are in phase 4.A possible Stage 5 would certainly include countries in which fertility rates have actually fallen significantly listed below replacement level (2 children) and the elderly population is greater than the youthful population.
Limitations that the Demographic change Model
Like any type of model, there will be outliers and exceptions to the rule and the Demographic shift Model is no different. Additionally, there space things the DTM cannot reveal: the impact of other demographic variables such as migration, room not considered, nor does the model predict just how long a nation will it is in in each stage. However even so, the relationship between birth rate and also death rate is an important concept when discussing populace and any kind of patterns, such as those detailed by the DTM, that aid in knowledge are helpful.
See more: Six Six Six 2014 ) - Wrap The Scrap With Dmaic
Demographic change Model case Studies
Over a collection of five articles we will define each stage of the Demographic change Model in depth and administer a instance study because that stages once there is a nation that currently fits the parameters. | https://thedailysplash.tv/the-highest-crude-death-rates-are-found-in-countries-in-which-stage-of-the-demographic-transition/ |
Rotator cuff pain and injury is most common in people older than 40 yearsof age and/or have a bone spur on their shoulder bone. Women tend to have a higher incidence of rotator cuff injuries. These injuries can also affect younger people who often participate in new or repetitive activities, are already injured and/or have chronic weakness in their shoulder.
Rotator Cuff Tendinitis and Bursitis
Overstraining the rotator cuff can lead to inflammation in your shoulder joint, which can result in (also spelled tendonitis) and bursitis. You can experience these conditions independently or simultaneously. Failure to take action against the inflammation can cause an impingement (pinching of the soft tissue), and produce further degeneration which frequently results in a major rotator cuff strain and/or tear. These injuries can often lead to surgery.
This mild inflammation can cause your rotator cuff tendons and bursa to swell and rub against or snag the acromion, or rub against a ligament at the front of your shoulder. When your arm is raised in a forward, reaching or overhead position the rotator cuff tendons and bursa can be pinched (impingement), which causes further swelling. Impingement syndrome occurs when your tendon and/bursa becomes pinched and tissue begins to break down near the humerus bone as a result of this inflammation and swelling. If this continues, your pain will get worse and your tendon may split or completely tear away from the bone.
Inflammation of your rotator cuff tendons or bursa will produce redness, swelling, and soreness in your shoulder soft tissue. Tendonitis is often due to overuse or repetitive actions common in athletes or workers who use frequent overhead arm movements such as throwing a ball, swinging a racquet, swimming, lifting weights, dusting high shelves, painting, or completing manual labor tasks. Decreased space in your rotator cuff will result from the above, as well as from anatomical differences in the shape of your shoulder bone, or arthritis. These will trigger pain, limit the use of your shoulder, and can lead to chronic tendonitis.
This condition is often referred to as Swimmer’s shoulder, Pitcher’s shoulder, Tennis Shoulder, or Shoulder impingement syndrome.
Rotator Cuff Instability
A muscle strength and flexibility imbalance or weakness, can cause instabilityand result in a subluxation or partial dislocation (your shoulder bones slide in and out of their sockets) or a full dislocation (the head of the arm bone slips out of the shoulder socket). These can cause a lot of pain and discomfort in your rotator cuff soft tissue. People with frequent dislocations often require surgery.
Shoulder instability which may have been present since birth or due to an injury, can also occur over time from overstraining, poor posture or inactivity. The rotator cuffis overworked, becomes weak and has difficulties stabilizing your shoulder, which in turn causes inflammation. If your rotator cuff becomes weak and tired, the head of your arm bone can squash up against the acromion and can result in a tear. This is often a major cause of rotator cuff tears in individuals over 40 years of age.
Rotator Cuff Strains or Tears
As you age, chronic degeneration can occur from repetitive motions breaking down the soft tissue and collagen (a fibrous connective tissue) in your rotator cuff. Degeneration may be caused by the development of calcium deposits, arthritic bone spurs or poor posture causing the acromion to rub on tendons or other soft tissue.
Rough or repetitive arm movements, especially when your shoulder is lifted to the limit of its natural range of motion, can weaken the tendons already experiencing tendonitis. This can lead to a tear in your tendon or muscle that is often difficult to repair surgically. Imagine your favorite jeans wearing out; they get more and more worn until the edges fray or a hole appears.
A rotator cuff acute trauma results from asudden injury such as falling onto an outstretched arm, which can bruise, strain or tear your rotator cuff tendon or muscle at any age.Excessive force exertedby lifting or pulling something too heavy, pushing off an object vigorously with your arm, or making a forceful and abrupt forward throwing or overhead action, can also severely damage and tearyour rotator cuff.
Rotator cuff injuries can also happen in conjunction with other shoulder injuries such as a fracture.
Types of Rotator Cuff Tears
A partial thickness tear of your tendon or muscle is not torn all the way through. This is related to chronic inflammation or impingement which results from the development of spurs on the underside of the Acromion (often require surgery to remove the bone spur).
A full thickness or complete tear is torn all the way through your tendon or muscle. This generally results from acute or sudden injuries, ongoing impingement, or degeneration of partial thickness tears.
A tendon torn from the bone often results from a traumatic injury or degeneration. | http://alternativemusculartherapy.com/?page_id=545 |
from creativity.
Being creative means we can solve
any
problem that's not physically impossible. If you care about solving our biggest problems, from cancer to climate change, you look for barriers to creativity. All progress comes from human minds creating solutions to new problems.
But creativity is at risk.
In a
famous study
conducted by NASA, 98% of kindergarteners scored at "genius level" for divergent thinking. By the time they reached adulthood, only 2%
passed
the test. Outdated institutions are stifling creativity by limiting our freedom to explore interesting problems. This is especially true for kids.
Together, we're freeing human creativity.
Moonrise isn't a space. It's a movement. We're building an entire generation of creative, independent minds who have the skills and ambition to tackle the world's biggest problems.
Our Decatur location opens in August. Apply now to reserve your membership. | https://www.moonrise.com/creativity |
This topic contains 3 replies, has 4 voices, and was last updated by Stoneman 2 months ago.
Most traders use take-profit orders in conjunction with stop-loss orders(S/L) to manage their open positions. If the security rises to the take-profit point, the T/P order is executed and the position is closed for a gain. If the security falls to the stop-loss point, the S/L order is executed and the position is closed for a loss. The difference between the market price and these two points helps define the trade’s risk to reward ratio.
The benefit of using a take-profit order is that the trader doesn’t have to worry about manually executing a trade or second-guessing themselves. On the other hand, take-profit orders are executed at the best possible price regardless of the underlying secutity’s behavior. The stock could start to breakout higher, but the T/P order might execute at the very beginning of the breakout, resulting in high opportunity costs.
Take-profit orders are often placed at levels that are defined by other forms of technical analysis, including chart pattern analysis and support and resistance levels, or using money management techniques, such as the Kelly Criterion. Many trading system developers also use take-profit orders when placing automated trades since they can be well-defined and serve as a great risk management technique. | https://otc.watch/groups/penny-stock-school/forum/topic/what-is-a-take-profit-order-t-p/ |
Would an insured’s psychotic episode, resulting in a stabbing, warrant coverage for a negligence claim brought by the victim of the stabbing?
In Butterfield v Intact Insurance Company, 2022 ONSC 4060, the Superior Court of Justice confirmed that an insurer correctly denied coverage under the exclusionary clause of an insurance policy to its insured who suffered a psychotic episode and stabbed another person.
The Facts
The Applicant, Brett Butterfield (“B”) attended at a firearms store in 2019. He experienced a deluded belief that the store owner had murdered his friend, causing him to stab the store owner.
B was charged with aggravated assault but was declared Not Criminally Responsible (“NCR”) on account of his schizophrenia.
The store owner sued B, alleging that B was negligent in visiting the store and applying for a firearms license while lucid, when it was reasonably foreseeable that he would injure someone (the “Claim”).
The Respondent, Intact Insurance Company (“Intact”), insured B pursuant to a Condominium Unit Owners Policy (“the Policy”). The Policy contained exclusions for coverage.
As in most policies, the exclusion stated that Intact does not insure claims arising from bodily injury or property damage caused by any intentional or criminal act by any person insured by the policy.
Intact denied coverage to B, stating that the knife attack was both an intentional act and a criminal act, for which no coverage would be afforded under the policy.
B commenced an application for coverage (“the Application”).
There was no dispute that the Claim fell within the policy of insurance. The issue in dispute was whether the exclusions applied in this instance, given the pleading and the actions of B.
The Court’s Reasoning
The True Nature of the Claim
In considering an exclusion clause, the Court discussed that it was not bound by the labels used in the Statement of Claim. The Court reasoned that it must examine the substance of the allegations contained in the pleadings to determine the true nature of the claims.
B took the position that the Claim was grounded in negligence and that at the time of the incident, he lacked the intent to commit an intentional tort. Furthermore, he argued the Statement of Claim did not refer to intentional or criminal acts and was solely based on negligence. Therefore, he contended that Intact had a duty to defend him.
The Court, however, saw things differently:
The damages suffered by Mr. Carr clearly flow from the attack. A plaintiff cannot convert the intentional tort of assault into an action in negligence solely to ensure that the defendant’s insurer will provide the necessary ‘deep pocket’ to make a judgment recoverable. The negligence claim is derivative of an intentional tort, which is the true nature of the claim (emphasis added).
The Court then considered whether the intentional tort of assault was captured by the exclusion clause in the insurance policy.
Whether B’s actions were criminal
Under the policy, the term “criminal act” is unambiguous and implies any breach of the Criminal Code. The wording of the exclusion allows the insurer to exclude indemnification for damages caused by a breach of the criminal law, notwithstanding an intent to cause the injury or a lack thereof.
At the criminal trial, the Ontario Court of Justice (“OCJ”) found that the insured committed the act that constitutes the offence and made a finding of NCR due to a mental disorder.
Accordingly, for the purposes of the Application, it was acknowledged that the insured committed the criminal act and the Ontario Court of Justice found that he committed the criminal act.
Therefore, it was concluded that the damages claimed in the action were caused by a criminal act of B.
Whether B’s actions were intentional
While B did not understand that his act was morally wrong, his actions intended to harm or kill the store owner – he went to retrieve the hunting knife, went back to the store, and then stabbed the store owner.
Thus, in analysing the insured’s actions, it was concluded that there was an intentional component and therefore, it was deemed an intentional act.
Duty to Defend?
As the knife attack was held to be both an intentional act and criminal act, it was concluded that the exclusionary clauses applied and there was no duty to defend or indemnify B in this Claim.
Takeaway
This decision provides a useful analysis of the steps required to determine coverage, especially in challenging fact scenarios.
It is likely that insurers will see more of these types of Claims going forward, given that the components of negligence and the intentional tort of assault are not always distinct. Insurers should be cautious that a Plaintiff may frame a claim in intentional torts as a claim in negligence to access the deep pockets of insurers. However, where a claim in negligence arises out of the same harm as an intentional tort, the exclusion clause may be triggered.
Insurers should be aware that in determining coverage, the Court is not bound by the language used in the pleadings but can apply its own interpretation, given the fact scenarios and issues before it. | https://www.pallettvalo.com/whats-trending/exclusion-under-the-condominium-unit-owners-policy-for-criminal-and-intentional-actions/ |
Cy Twombly – Untitled, 2008.
Coinciding with the 2017 Venice Biennale, the Axel & May Vervoordt Foundation and the Fondazione Musei Civici di Venezia present the sixth, and final exhibition in their decade-long partnership: Intuition.
As the concluding exhibition in a highly acclaimed series held at the Palazzo Fortuny, Intuition is curated once again by Axel Vervoordt and Daniela Ferretti. Other exhibitions included Artempo (2007), In-finitum (2009), TRA (2011), Tàpies: The Eye of the Artist (2013), and most recently, Proportio (2015).
The exhibition Intuition brings together historic, modern, and contemporary artworks related to dreams, meditation, telepathy, creative power, and inspiration. Spanning diverse geographies and cultures, the exhibition explores how intuition has shaped our understanding of art for generations.
What role does intuition play in an artist’s creative process? The exhibition aims to provoke questions about the origins of creation, which is constantly evolving. This ambitious project is intended to be seen as a work in progress, with leading contemporary artists creating a dialogue with historic works staged within the unique character of Mariano Fortuny’s former home.
The exhibition also features performances by a number of young artists, including a sleep-performance by Matteo Nasini, a dance performance by Yasmine Hugonnet, a hypnosis performance by Marcos Lutyens, a public improvisation Straatman by Angel Vergara, and a live performance of a new “Architecture Sonore” by the musician Mireille Capelle, especially created for the exhibition. | http://www.numerocivico.info/events/palazzo-fortuny-axel-may-vervoordt-foundation-intuition/ |
4 Mistakes That Can Sink a Cyber Forensic Investigation
It is exciting to see how forensics contributes to the investigation of a cyberattack. The application of forensics in the crime scene is what we are aware of but using forensics in digital crime requires a deeper understanding. One common aspect among both is that the evidence must be secured and handled carefully. In the case of computer forensics, the digital data in the devices, and other information gathered from the crime scene should be stored properly.
The major similarity between a security breach and crime lies in the mistakes that investigation officers often commit. A prime example of ineffective forensic investigation is that of Equifax’s breach which was reported in 2017. The hackers breached the Equifax application in May 2017 but the company only realized this after July 2017. However, this was the company’s second breach and the previous breach was in April 2016. Equifax ignored the severity of the breach and also failed to alert its clients about the incident. The data of nearly 143 million Americans was breached due to the company’s poor investigation. The icing on the cake is that the Equifax also failed to effectively handle the incident and ended up diverted the users to a phishing site.
Avoid These 4 Mistakes:
Mistake #1: Missing the only chance of capturing the image
Like crime, detectives have only one chance to take the first picture of the crime scene as soon as the crime is reported. The digital forensic investigators also get the only chance to capture the initial scene of the breach. Forensic imaging is also important in analyzing the root cause of the attack. It involves capturing and storing all the targeted systems’ data. Capturing and preserving the exact image of the breached network will help preserve the state of the system at the time of the incident. Any changes made to the systems after this will not affect the analysis.
Mistake #2: Inadequate prevention
While starting to investigate a crime scene it is important to define its boundaries and restrict entry to the crime scene to preserve the crime elements. The same goes for cybercrime. Cyber investigators must assess the severity of the attack, find what information has been compromised, the longevity of the attack, and analyze what is persistent and non-volatile for investigation. The investigation should be performed carefully by not altering the metadata, caches and temporary files.
Mistake #3: Lack of communication
A crime investigation requires a lot of communication between the detective, the pathologist, the coroner, the lab scientists, and other partners involved. A lack of communication could hinder the effective investigation. The communication in the case of cyber forensics extends beyond the security team to the management, stakeholders, law enforcement, etc. The investigators communicate with the IT team to understand the network environment. They communicate with senior management to assess the impact of the security breach on the business.
The most important communication that is often neglected is addressing the breach to the stakeholders and customers. A communication professional reports the information on a timely basis to the stakeholders and the clients and ensures to minimize the damage of an organization’s reputation. The information about the breach should neither be delayed not it should be too early that it lacks valid details about the incident.
Mistake #4: Lack of policies and rules
An incident can be better handled when the policies are defined. Most often, initial drafting of policies and procedures are ignored as the task is laborious. But in the absence of pre-defined policies, there will be unnecessary delay in an investigation resulting in negative outcomes or compromised evidence.
An incident response plan is a set of policies and procedures that need to be followed on happening of an incident. An IR plan will serve as a guiding route map to the digital forensic investigators. Therefore, it is significant that the plan should be practical and updated annually based on the latest experiences. In order to make the plan more effective, the investigators should be trained prior to hand on how to effectively carry out the plan.
With so many differences between the physical crime scene and cyber breach, the investigators can learn from each other’s best practices, as well as the mistakes that each team tries to avoid.
Want to be a leader in computer forensic investigation?
Join EC-Council’s Computer Hacking Forensic Investigator (C|HFI) program now. The program certifies individuals in the specific security discipline of computer forensics from a vendor-neutral perspective. The certification fortifies the application knowledge of the cyber investigator on various forensic-related domains like reporting, storing, law enforcement, etc.
Reference: | https://blog.eccouncil.org/4-mistakes-that-can-sink-a-cyber-forensic-investigation/ |
- This concert has passed.
Here and Now Series: JS Bach / Dan Tepfer
May 7 at 7:00 pm
Here and Now Series: J.S. Bach / Dan Tepfer: Inventions / Reinventions
Following the critical and audience acclaim for his Goldberg Variations / Variations, Dan Tepfer introduces a new project, Inventions / Reinventions. Bach composed his set of Inventions as study pieces for his children and students, covering eight major and seven minor keys, for a total of fifteen. But there are twenty-four possible major and minor keys, so there are nine keys missing. In the Inventions / Reinventions program, while playing Bach’s original compositions sequentially, Dan Tepfer creates his own Inventions for the missing keys, freely improvising new ones during each performance. In so doing, he follows the logic behind Bach’s beloved original pieces, in which simple musical ideas, like characters in a novel or a play, are taken on a harmonic journey to foreign keys before returning home. | https://www.bargemusic.org/concert/here-and-now-series-js-bach-dan-tepfer/ |
To mark the occasion of Petronor’s 50thanniversary, the Fine Arts Museum in Bilbao is reviewing five decades of Basque art, with ‘After ‘68. Art and artistic practices in the Basque Country 1968 – 2018’, thus consolidating the museum’s commitment to local contemporary art.
This vast selection of almost 150 works – painting, sculpture, photography, video art and works on paper – and almost 100 artists from various generations, enables us to discover the way that the art experienced in this particular context has been modernised in the last change of century. It also allows us to value the great importance that individual and collective careers emerging from the Basque Country and Navarre have had on the national and international scene.
The display, open to the public until 29thApril 2019, was curated by Miriam Alzuri (historian), Begoña González (chief librarian), and Miguel Zugaza (Museum director). The exhibition image and its corresponding catalogue were designed by Franziska Estudio.
The image is based on ‘the skin’ of the museum, specifically in the grid that features on the modern building’s exterior profile. The building, opened in 1970, has had a decisive influence on the evolution of Basque art, and now it has a major bearing on the exhibition’s graphic elements. In homage to the meeting space that the museum has provided – and continues to provide – the grid of the outside of the building has been used as the graphic cover for all the exhibition’s diffusion pieces: from the teasers to the catalogue.
This grid is represented using lines of blue fixer, a tool that is normally used in the world of construction to mark layouts, and which here acts as a nexus between building and art.
These blue line markers have been adapted to each of the exhibition diffusion formats, both internal and external, and have a particularly important place within the catalogue.
The catalogue
With over 500 pages, the catalogue is split into two major sections. The first includes texts from specialists – Peio Aguirre, Fernando Golvano, Francisco Javier San Martín and Miren Jaio – who contribute new information to the study of manifestations of art emerging in the Basque Country from 1968 to today, as well as the photographic representation of all the works that make up the exhibition.
The second section presents an exhaustive timeline, created by Mikel Onandia, which includes the facts that defined the artistic and cultural backdrop of the time.
Music in the Basque Country
‘After ‘68’ is completed with a space designated to music.
Curated by the sound artist Xabier Erkizia, and designed by Franziska Estudio, this venue presents original materials – album sleeves, posters, sound recordings… – which give us a historical insight into the musical and sound practices in the Basque Country over the past fifty years.
The hall displays all of these sound materials on the walls, separated into decades, and it also offers a foldout leaflet that visitors can take home with them as a souvenir of the exhibition.
The central part of the hall is presided by a large circular ‘tablet’measuring five metres in diameter, where guests are welcome to lie down to enjoy the playlists from each decade on the four listening points.
In the other room in the hall there is a two-storey stand dedicated to sound workshops for school groups, which will be held throughout the duration of the exhibition. | https://www.creative.onl/startupsgeek/franziska-estudio-creates-image-of-after-68-exhibition-about-basque-art-in-bilbao-fine-arts-museum/ |
Vitamin A and Beta-Carotene
This page intends to be a space where you can find more information about the scientific studies and research tests proving the benefits from the use of the ingredients present in SOLEIL, this page is only for educational purposes, not expecting to promote our product. SOLEIL is a dietary supplement, that is, it’s not intended to treat, prevent, cure or mitigate any disease or any symptom. It’s important to mention that discussion, results and conclusions from each study may not be supported by all scientists or no other researcher, sometimes there are opposition to the extension from benefits of that particular ingredient.
In the text below you can find more information about the scientific studies that serve as background support to the benefits from the Vitamin A and Organic Carrots (as Beta-Carotene) usage.
CLINICAL RESEARCH PUBLICATIONS
Beta-Carotene: an unusual type of lipid antioxidant
ABSTRACT The mechanism of lipid peroxidation and the manner in which antioxidants function is reviewed. beta-Carotene is a purported anticancer agent, which is believed by some to have antioxidant action of a radical-trapping type. However, definitive experimental support for such action has been lacking. New experiments in vitro show that beta-carotene belongs to a previously unknown class of biological antioxidants. Specifically, it exhibits good radical-trapping antioxidant behavior only at partial pressures of oxygen significantly less than 150 torr, the pressure of oxygen in normal air. Such low oxygen partial pressures are found in most tissues under physiological conditions. At higher oxygen pressures, beta-carotene loses its antioxidant activity and shows an autocatalytic, prooxidant effect, particularly at relatively high concentrations. Similar oxygen-pressure-dependent behavior may be shown by other compounds containing many conjugated double bonds. Download
Free radical tissue damage: protective role of antioxidant nutrients.
ABSTRACT Highly reactive molecules called free radicals can cause tissue damage by reacting with polyunsaturated fatty acids in cellular membranes, nucleotides in DNA, and critical sulfhydryl bonds in proteins. Free radicals can originate endogenously from normal metabolic reactions or exogenously as components of tobacco smoke and air pollutants and indirectly through the metabolism of certain solvents, drugs, and pesticides as well as through exposure to radiation. There is some evidence that free radical damage contributes to the etiology of many chronic health problems such as emphysema, cardiovascular and inflammatory diseases, cataracts, and cancer. Defenses against free radical damage include tocopherol (vitamin E), ascorbic acid (vitamin C), beta-carotene, glutathione, uric acid, bilirubin, and several metalloenzymes including glutathione peroxidase (selenium), catalase (iron), and superoxide dismutase (copper, zinc, manganese) and proteins such as ceruloplasmin (copper). The extent of tissue damage is the result of the balance between the free radicals generated and the antioxidant protective defense system. Several dietary micronutrients contribute greatly to the protective system. Based on the growing interest in free radical biology and the lack of effective therapies for many of the chronic diseases, the usefulness of essential, safe nutrients in protecting against the adverse effects of oxidative injury warrants further study. Download
Vitamins E and C, beta-carotene, and other carotenoids as antioxidants
ABSTRACT Tocopherols and tocotrienols (vitamin E), ascorbic acid (vitamin C), and the carotenoids react with free radicals, notably peroxyl radicals, and with singlet molecular oxygen (1O2), which is the basis for their function as antioxidants. RRR-alpha-Tocopherol is the major peroxyl radical scavenger in biological lipid phases such as membranes or low-density lipoproteins. Ascorbic acid is present in aqueous compartments (eg, cytosol, plasma, and other body fluids) and can reduce the tocopherol radical; it also has several metabolically important cofactor functions in enzyme reactions, especially hydroxylations. These micronutrients need to be regenerated on oxidation in the biological setting, hence the need for further coupling to nonradical reducing systems such as glutathione-glutathione disulfide, dihydrolipoate-lipoate, or NADPH-NADP+ and NADH-NAD+. Carotenoids, such as beta-carotene, lycopene, and some oxycarotenoids, eg, zeaxanthin and lutein, exert antioxidant functions in lipid phases by quenching 1O2 or free radicals. There are pronounced differences in tissue carotenoid patterns, extending also to the distribution between the all-trans and various cis isomers of the respective carotenoids. Physical quenching leaves the structure intact, so that in this mode the carotenoids do not require a regeneration reaction. Download
Beta-carotene is an antioxidant found in carrots.
Free radicals damage cells through oxidation. Eventually, the damage caused by free radicals can cause several illnesses and as well as contribute to early ageing of skin. | https://soleilprotection.com/vitamin-a-and-beta-carotene/ |
the disorder is complex and long term. this disease can disrupt a personâs daily function and typically requires ongoing treatment. the symptoms can be debilitating and disabling; however, with treatment, it is possible to live well with schizophrenia. for many people, the early stages of schizophrenia are characterized by disruptions to normal emotions and behaviors, which can be referred to as negative symptoms. the symptoms of schizophrenia can affect a person’s career, academic performance, interpersonal relationships, and social activities.
other symptoms include: schizophrenia is a disease that is caused by a chemical imbalance in the brain. when levels of dopamine, a neurotransmitter, are increased in certain parts of the brain it can trigger psychosis. schizophrenia and schizoaffective disorder can be difficult to distinguish because many of the symptoms overlap. because the symptoms of schizoaffective disorder are the same as those of other illnesses, it can be difficult to diagnose. schizophrenia treatment involves a multi-modal treatment approach, including biological, psychological, and social symptoms.
people with bipolar disorder may experience episodes of mania and depression, often separated by periods of relative stability. some people have schizoaffective disorder, which involves a combination of schizophrenia symptoms and those of a mood disorder. in some types of bipolar disorder, people experience a less severe form of mania, known as hypomania. people may think, for example, that they are famous or special in a certain way, that they are being harassed or stalked, or that something terrible is about to happen. this is common among people with schizophrenia, but people with bipolar disorder may seem to have disorganized thoughts during episodes of mania.
some researchers report high rates of drug and alcohol misuse among people with schizophrenia, bipolar disorder, or depression. during this evaluation, the doctor will also observe the person’s appearance and actions to look for signs of schizophrenia and bipolar disorder. antipsychotic medications are a vital part of treatment for most people with schizophrenia. people with bipolar disorder generally alternate between periods of low and high moods, while people with schizophrenia typically lose touch with reality as they experience hallucinations and delusions. people with schizophrenia often experience paranoia, a type of delusion that usually involves persecution. it is usually manageable with a correct diagnosis and suitable treatment and… bipolar ii disorder involves episodes of elevated mood and depression.
racing thoughts are rare in schizophrenics who do not have an affective syndrome and more common in schizoaffective patients. the symptom is associated with racing thoughts is when your thoughts go through your head very fast. it can involve them racing so fast that they feel out of control. manic behavior. if a person has been diagnosed with schizoaffective disorder: bipolar type they will experience feelings of euphoria, racing thoughts, increased, .
racing thoughts are rare in schizophrenics who do not have an affective syndrome and more common in schizoaffective patients. the symptom is associated with disturbed concentration. it is experienced as pleasant by manic patients and as unpleasant by depressed patients. manic episode: feelings of euphoria, racing thoughts, increased risky behavior, and other symptoms of mania. what are the treatments? people with schizophrenia racing thoughts refers to the rapid thought patterns that frequently occur in manic, hypomanic or mixed episodes. if you have any concerns, please make an racing thoughts refers to relentless, rapid thinking that often signals hypomania or mania in people with bipolar disorder., .
When you try to get related information on racing thoughts schizophrenia, you may look for related areas. . | http://www.reporttutor.com/racing-thoughts-schizophrenia/ |
Fashinnovation held its 3rd Worldwide Talks on September 10th, 2020, in collaboration with the UN Office for Partnerships kicking off the NYFW. Even though the fashion world will not be able to come together in Spring Studios this Fall, Fashinnovation brought together global leaders in fashion, technology, and cross-over industries for a day-long online summit. Rachel Zoe, Abrima Erwiah, Rebecca Minkoff, Derek Blasberg, and many more came together to discuss the foreseeable trends in the next normal after the shake-down of the Covid-19 pandemic. 19 panels featuring 73 speakers focused on the areas of sustainability, ethical sourcing, social justice, diversity and inclusivity, and climate change. Through interactive conversations, Fashinnovation created a global network for fostering change. | https://event.fashinnovation.nyc/3rd-worldwide-talks-envisioning-the-next-normal-post-pandemic/ |
Introduction: In order to ensure that athletes achieve their highest performance levels during competitive seasons, monitoring their long-term performance data is crucial for understanding the impact of ongoing training programs and evaluating training strategies. The present study was thus designed to investigate the variations in body composition, maximal oxygen uptake (VO2max), and gas exchange threshold values of cross-country skiers across training phases throughout a season.
Materials and methods: In total, 15 athletes who participate in international cross-country ski competitions voluntarily took part in this study. The athletes underwent incremental treadmill running tests at 3 different time points over a period of 1 year. The first measurements were obtained in July, during the first preparation period; the second measurements were obtained in October, during the second preparation period; and the third measurements were obtained in February, during the competition period. Body weight, body mass index (BMI), body fat (%), as well as VO2max values and gas exchange threshold, measured using V-slope method during the incremental running tests, were assessed at all 3 time points. The collected data were analyzed using SPSS 20 package software. Significant differences between the measurements were assessed using Friedman’s twoway variance analysis with a post hoc option.
Results: The athletes’ body weights and BMI measurements at the third point were significantly lower compared with the results of the second measurement (p<0.001). Moreover, the incremental running test time was significantly higher at the third measurement, compared with both the first (p<0.05) and the second (p<0.01) measurements. Similarly, the running speed during the test was significantly higher at the third measurement time point compared with the first measurement time point (p<0.05). Body fat (%), time to reach the gas exchange threshold, running speed at the gas exchange threshold, VO2max, amount of oxygen consumed at gas exchange threshold level (VO2GET), maximal heart rate (HRmax), and heart rate at gas exchange threshold level (HRGET) values did not significantly differ between the measurement time points (p>0.05).
Conclusion: VO2max and gas exchange threshold values recorded during the third measurements, the timing of which coincided with the competitive season of the cross-country skiers, did not significantly change, but their incremental running test time and running speed significantly increased while their body weight and BMI significantly decreased. These results indicate that the cross-country skiers developed a tolerance for high-intensity exercise and reached their highest level of athletic performance during the competitive season. | https://www.dovepress.com/seasonal-variations-in-body-composition-maximal-oxygen-uptake-and-gas--peer-reviewed-article-OAJSM |
This class is for Highest Yoga Tantra practitioners, and is designed to support HYT practice through improving our faith, imagination and understanding of HYT teachings. We are currently using New Guide to Dakini Land. For those with HYT empowerments of Heruka and Vajrayogini only.
If you are interested in learning Buddha's Tantra teachings but do not yet have the Highest Yoga Tantra empowerments, we recommend you join us for our Intro to Tantra workshops. For more information about the upcoming Highest Yoga Tantra empowerments at the NKT Summer Festival, please click here. | https://www.meditateinfortcollins.org/event/hyt-class/ |
Page:
1
2
3
4
5
Amount of Results to Show:
10
50
100
All
Sort by:
Publication Date:Newest to Oldest
Title: A to Z
Title: Z to A
Publication Date:Oldest to Newest
John Dewey and Environmental Philosophy
(November 2003)
Hugh P. McDonald
-
Author
A comprehensive look at how John Dewey's ethics can inform environmental issues.
Hugh P. McDonald's
John Dewey and Environmental Philosoph
y breaks new ground by applying Dewey's insights to a new approach to philosophy of the environment; the concern for the rights of animals; the preservation of rare species, habitats, and landscapes; and the health of the whole ecology. The book summarizes much of the current li
...
(Read More)
Epistemology
(October 2003)
An Introduction to the Theory of Knowledge
Nicholas Rescher
-
Author
A comprehensive introduction to the theory of knowledge.
Guided by the founding ideas of American pragmatism,
Epistemology
provides a clear example of the basic concepts involved in knowledge acquisition and explains the principles at work in the development of rational inquiry. It examines how these principles analyze the course of scientific progress and how the development of scientific inquiry inevitably en
...
(Read More)
In Dewey's Wake
(January 2003)
Unfinished Work of Pragmatic Reconstruction
William J. Gavin
-
Edited and with an introduction by
Leading scholars evaluate the importance of Dewey's work for our times.
In a pluralistic tapestry of approaches, eminent Dewey scholars address his pragmatic philosophy and whether it should be reinterpreted, reconfigured, or "passed-by," so as to better deal with the problems posed by the twenty-first century. For some, Dewey's contextualism remains intact, requiring more to be amended than radically changed. For others, his wo
...
(Read More)
The Lesbian Index
(December 2001)
Pragmatism and Lesbian Subjectivity in the Twentieth-Century United States
Kim Emery
-
Author
Adds historical and philosophical perspectives to current debates over whether lesbian identity is socially constructed or genetically based.
For more than a century, female homosexuality has been a frequent flashpoint for conflicts configured around such oppositions as nature and nurture, essentialism and constructivism, foundationalist philosophies and poststructuralist ones. In
The Lesbian Index,
Kim Emery o
...
(Read More)
Neoplatonism and Contemporary Thought
(November 2001)
Part One
R. Baine Harris
-
Editor
Leading scholars relate Neoplatonism to contemporary science and philosophy.
Significant twentieth-century thinkers offer views of Neoplatonism as having relevance to contemporary life and thought. Specifically discussed is how Neoplatonism relates to contemporary science and contemporary philosophy, including metaphysics and environmental thought.
Contributors include Jay Bregman, John Charle
...
(Read More)
Time, Continuity, and Indeterminacy
(February 2000)
A Pragmatic Engagement with Contemporary Perspectives
Sandra B. Rosenthal
-
Author
Offers a pragmatically oriented reconstruction of the central issues of time.
Focusing on the issue of temporality, this book explores the assumptions guiding the frameworks of philosophers who have shaped the contours of the contemporary philosophical landscape, including Whitehead, Weiss, Derrida, McTaggart, and Heidegger. In the process, it remaps the terrain, often finding similarities where differences--some quite radical--are gen
...
(Read More)
Realistic Pragmatism
(December 1999)
An Introduction to Pragmatic Philosophy
Nicholas Rescher
-
Author
Recovers classical pragmatism from recent deconstructive interpretations.
Nicholas Rescher gives a compact but comprehensive overview of pragmatism that does justice to the doctrine's original realistic and objectivistic purport. By providing a historically faithful version of a pragmatist position that is at once grounded in the root inspirations of the doctrine and able to overcome the sorts of objections that have often been advance
...
(Read More)
Dewey Reconfigured
(October 1999)
Essays on Deweyan Pragmatism
Casey Haskins
-
Editor
David I. Seiple
-
Editor
Eleven essays, all but one appearing here for the first time, offer a spectrum of recent critical perspectives on issues central to the philosophy of John Dewey and to what is now known as Deweyan pragmatism. The contributors focus on classically Deweyan concerns such as the nature of experience, selfhood, ethics, education, aesthetics, and democracy, as well as on the relation of those concerns to recent debates concerning feminism, epistemological
...
(Read More)
The Last Conceptual Revolution
(October 1998)
A Critique of Richard Rorty's Political Philosophy
Eric M. Gander
-
Author
A critique of Rorty's own provocative political philosophy, as well as an in-depth look at both the issues concerning the relationship between the public and the private, and arguments on the role of reason in liberal political discourse generally.
In 1989, with the publication of
Contingency, Irony, and Solidarity
, and in articles throughout the 1990s, Richard Rorty developed a detailed social and political phil
...
(Read More)
Genealogical Pragmatism
(October 1997)
Philosophy, Experience, and Community
John J. Stuhr
-
Author
Drawing on the work of popular American writers, American philosophers, and Continental thinkers, this book provides a new interpretation of pragmatism and American philosophy.
"Stuhr's way of relating the American philosophical tradition to contemporary problems is genuinely enlightening. He contributes to the great revival of pragmatism by being one of its most sensible and sensitive interpreters." -- John Lachs, Vande
...
(Read More)
Page:
1
2
3
4
5
Amount of Results to Show:
10
50
100
All
Sort by:
Publication Date:Newest to Oldest
Title: A to Z
Title: Z to A
Publication Date:Oldest to Newest
Home
|
Publish
|
Donate
|
About
|
Contact
|
Help
|
Search
|
Site Map
If you are experiencing trouble accessing information published on this website, please contact the Press at: | https://www.sunypress.edu/(F(ox0gDH1S2WExoz9RQucEprdTVvACyUSy_R1xDa1j2FgGhTXkoO6OFiIyL1P4xgQA0gZa70kXMCHDAykAMljH9fFzbcRnVSdjs7Mxm5SSxTQv3hMQLpQHL-NNbPPJu_IBbAWBXQIzQh7tycruho9a4G_j0rh-pWRgAHJgNJ7ntMI1))/Searchadv.aspx?IsSubmit=true&CategoryID=524&pagenum=4&groupnow=1 |
Monument wars are not unique to our own political moment. Bitter contests over what representations should stand on the public landscape are a deeply American tradition—and a seemingly human one as well. Nor are monuments some kind of apolitical "word of God" whose removal has the potential to "erase" history. Rather, they are political manifestations of discrete ideas, attitudes, and policies, as well as class, racial, regional, and gender preferences. Put another way, monuments are bronze and stone renderings of the past that, by conscious design or not, influence the present, and whose meanings succeeding generations continuously debate and reconfigure.
In his new book, Thomas Brown examines dozens of monuments to reveal the mutable and contingent political dynamics of collective memory. He discusses the varied uses and interpretations of Civil War monuments with regard to artistic intentions, public negotiations, ceremonial practices, commissioning procedures, fundraising strategies, and the influence of power brokers. He also tells us something about the links between monuments and society that bears on present-day reappraisals.
Based on his control of pertinent primary sources, the author discriminates three types of monuments: (a) memorials/statues of ordinary citizens constructed during the Civil War; (b) representations of public leaders; and (c) victory monuments. Of these, class "a" departed most from existing precedents, while "b" and "c" hewed more to tradition. Over time, despite the occasional protests of reformers, intellectuals, and political progressives, all three genres came to reflect a violent, gendered, and highly stratified social order.
Americans did not always live in a monumental society. As Kirk Savage and other scholars have noted, citizens in the early national period deeply distrusted monuments. Steeped in the anti-Federalist and Jeffersonian aversion to standing armies, they associated monumental works with monarchy, making them incompatible with democratic values. The Civil War changed that. Brown suggests that, by the middle of the war, Americans needed public coping mechanisms, and common-soldier monuments bridged the gap between prewar dislike of monuments and the postwar need to commemorate the hundreds of thousands of war dead. Gravestones, cenotaphs, obelisks, memorial halls, allegorical figures, and likenesses of citizen-soldiers soon linked citizenship to military service and the soldier replaced the farmer as the emblematic American male. Often conveying mourning, meditation, and sentimentality, these monuments identified military service with local and regional forms of democracy, ethnicity, and both middle and working-class life.
But memorials and small statues were just the tip of the iceberg. Propelled by swelling veterans' organizations like the Grand Army of the Republic and the United Confederate Veterans, idealizations of soldiers during the monument boom of 1900–1915 pivoted from their concentration on war dead. They tied monuments directly to the needs and attitudes of living veterans—and eventually to the state. Single-figure and group statues of troops in action stoked such nationalist gestures as drives to make the Pledge of Allegiance and American flags mandatory in public schools. Others works animated white supremacy, idealized conservative womanhood, or symbolized state power against workers. In short, Civil War veterans, by helping popularize representations of themselves, became unofficial arbiters of American patriotism.
At the same time, a proliferation of commander statues idealized hierarchical leadership and evoked social deference. Unlike the iconoclastic republicanism of the Revolutionary generation that venerated artisans and small farmers, equestrian statues of military and civilian leaders drew on precedents from imperial Rome through monarchical Europe. Depending on who controlled the war narrative, certain leaders were emphasized and others ignored. Massive budgets mirrored the expansion of military bureaucracy: a professionalized National Guard, a rapidly expanding navy, and the creation of a general staff. Although regional (West vs. East) and sectional (North vs. South) stylings persisted, most statues fostered conciliatory militarism. Rather than depicting sectional reunion, statues led white elites North and South to embrace a homogeneous martial culture. Enormous ornate soldier and battle monuments called to mind a nation-state based on the racial and labor order of Jim Crow and corporate capitalism.
Even more than common soldier and (mounted) commander statues, "victory" monuments flouted the anti-triumphalist commemorative preferences of the post-Revolutionary republic. Borrowing directly from Old World analogues, arches, columns, and allegorical figures were openly hierarchical, self-aggrandizing, and often celebratory of violence. Rather than promoting reconciliation, most embodied sectional themes. In the South, this meant honoring political Redemption and the Anglo-Saxon triumph over the "negro rule" of Reconstruction. In the North such hyper-sectionalism meant consecrating what Robert Penn Warren dubbed the "Treasury of Virtue" or what John R. Neff called the "Cause Victorious." Across Northern cities, images of Columbia, "Armed Freedom," and winged Victory expressed support for expansionistic projects, first across the North American continent and then abroad into Latin America and the Pacific. In fact, Brown maintains that Civil War monuments contributed to a full-on redefinition of the state. By 1900, most Americans believed militarism to be integral to national identity rather than a threat to democracy.
Brown asserts that, because the US entry into World War I immediately followed the peak decade of Civil War monument building (1905–15), those memorials shaped popular understanding of the conflict in Europe. The prewar proliferation of Lincoln memorials accounted for his prominence in Great War imagery and the publicity of mobilization. Moreover, American commemoration differed sharply from that of the other Allies, especially the French, whose monuments aux morts (monuments to the dead) evinced their nation's colossal human losses.
Rather than tributes specifically to those who had perished in 1914–18, US statuary normally centered on all soldiers, living and dead, thus reflecting Civil War patterns. The meaning of the Great War was superimposed on existing Civil War monuments and grafted onto new ones. The rationale of a "war to end all wars" is that cultural militarism can foster peace in some Orwellian sense.
Some readers, especially those with backgrounds in art and art history, may find Brown's use of certain terms to be a source of confusion. For instance, he never explicitly distinguishes between monuments, which tend to convey grand and triumphal themes, and memorials which connote grief, bereavement, and solemnity. A clearer definition of a handful of key terms would have strengthened his work. More generally, Brown's thesis regarding militarization, though important and compelling, is more asserted than proved. He insists that "cultural form invigorated ideology in the metamorphosis of the country from iconoclastic republic to a militarized nation." The shift toward monumentalism "not only correlated with but preceded and facilitated policy developments" (2). The Civil War certainly elevated the prestige of the military in American life. More specifically, the lessons and implications of Civil War monuments eased bourgeois anxieties over immigration, national expansion, industrial capitalism, and other forms of social and political fragmentation. Brown even suggests that, by their stress on discipline, individualism, and the values prized by patricians and "captains of industry," Civil War monuments were instruments of social control over working-class people.
Yet readers are left to ponder whether monument culture was the source or the result of wider policy and social change. Of course, any given society's monuments naturally reflect, reinforce, and sometimes even anticipate ideological trends. But this does not illuminate the more specific links between Civil War monuments and "militarization," much less US foreign or domestic policy. One wishes Brown had more sharply defined the connections among, say, westward expansion, eugenics, segregation, imperialism, Social Darwinism, White Man's Burden, or capitalist ideology vis-à-vis consumerism. Work remains to be done on the political and economic genealogy of Civil War monuments.
Civil War Monuments and the Militarization of America is chock-full of fascinating insights into the dynamism and variety of Civil War memory, especially Union memory, which remains understudied compared to the Lost Cause of the Confederacy. Scholars of the Civil War, US cultural history, and collective memory should read with care the arguments Thomas Brown makes in his wonderful and timely new book.
In Standing Soldiers, Kneeling Slaves: Race, War, and Monument in Nineteenth-Century America, 2nd ed. (Princeton: Univ Pr, 2018). | https://www.miwsr.com/2021-021.aspx |
FIELD OF THE INVENTION
BACKGROUND TO THE INVENTION
SUMMARY OF THE INVENTION
0001 This invention relates to a computer system for executing branch instructions and to a method for operating such a computer system.
0002 Programs consist of blocks or strings of sequential instructions, which have a single entry point (the first instruction) and a single exit point (the last instruction). There are one or two choices of instruction blocks to be executed after any particular block. When there are two possible blocks, a condition must be used to determine which block to choose. The pattern of links between blocks is called the program's control or flow graph.
0003 These blocks of instructions are packed together in memory. When there is no choice of subsequent block (block B), it can normally be placed immediately after the first block (block A). This means that there need not be any explicit change in control to get from block A to block B. Sometimes this is not possible, for instance, if more than one block has block B as a successor. All but one of these predecessors must indicate that the subsequent block will not be the next sequential block, but block B. These are unconditional branches. Some blocks have a choice of successor blocks. Clearly only one of the successors, for example block B, can be placed sequentially afterwards. The other block, block C, is indicated explicitly within block A. A conditional mechanism is used to determine which block is to be chosen. If the condition is met, then the chosen successor block is block C. If the condition is not met, then the chosen successor is block B. These are conditional branches.
0004 Branches are well known in the art and are essential for a computer system to execute any program. Known computer systems contain a special register, the instruction pointer register, which provides an indication of the address of the next instruction to execute. This register is usually automatically incremented after an instruction executes, so that it now indicates the address of the next sequential instruction. Branch instructions are used to change this behaviour. These branch instructions specify an alternative address (the target location) for the next executable instruction. Conditional branch instructions also specify a condition which must be met for the alternative address to be usedotherwise the instruction pointer will be incremented as usual. These branch instructions thus define the end of a block of instructions.
0005 In a non-pipelined computer system, the computer fetches, decodes and executes to completion one instruction, before moving on to the next instruction. However, in a pipelined system where fetch, decode and execution stages can all operate simultaneously on a stream of instructions, it is possible to fetch instructions which are not required. For instance, consider a system with a four stage instruction pipeline with fetch, decode, execute and write stages. The earliest that a branch instruction can be detected is in the decode stage, by which time the next sequential instruction in memory will have already been fetched. For an unconditional branch this must be thrown away, and new instructions fetched from the target location. For conditional branches it is more complicated. The condition must be evaluated to determine whether or not to change to the target location. This will occur in the execute stage, thus the sequentially fetched instruction must be stalled in the fetch stage, and only after the branch has been executed can the pipeline proceed. If the condition was true, then the sequentially fetched instruction must be ignored, and new instructions fetched from the target location. The first pipelining applied to any processor architecture is to issue instructions in advance, as this is one of the easiest speed-ups.
1
0
2
1
0006 From the previous description, it is clear that the instruction after a branch instruction is always fetched, but is only sometimes required, and that therefore a pipeline bubble is created while determining what to do. An attempt has been made to improve this by changing the semantics of branch instructions, so that the subsequent instruction is always executed and the branch determines whether the instruction executed after that one is the one sequentially after it, or the instruction at the target location. These are called delayed branches, and the instruction immediately following the branch instruction is called a branch delay slot. FIG. 1 illustrates schematically this operation. The branch instruction is detected in the decode stage. The branch delay slot is Inst , which is always executed. If the branch is taken, then the next executed instruction will be Inst D being the first instruction of a different block, whereas if the branch is not taken, it will be Inst which is the first instruction of the next sequential block. Inst must be an instruction which can always be executed, regardless of the outcome of the (conditional) branch, and it must not be an instruction which determines whether the conditional branch is to be taken. If no instruction can be found within the program which satisfies these conditions, then an instruction which has no effect (NO OP) must be inserted instead.
0007 Pipelines can be designed where the optimum number of delay slots is more than one. The more deeply pipelined a computer is, the more delay slots are generally required. Unfortunately, it gets harder and harder to find useful instructions to put in each additional slot, so many of them are filled with instructions which do nothing. This places large bubbles of NO OP instructions in the execution pipeline, thus reducing the speed advantage obtained by making a deep pipeline.
0008 Another significant problem with this approach is that when a new computer system of an existing instruction set is designed, with a new pipeline organization, and therefore a different number of branch delay slots, it cannot execute existing binaries. Programs must be recompiled in order to be executed.
0009 In an attempt to dispense with branch delay slots, one known system uses two instruction fetchers at the fetch stage of a pipeline, each instruction fetcher being capable of fetching and holding a sequence of instructions. One instruction fetcher has associated with it local decode circuitry which is arranged to detect branch instructions. It will be appreciated that this local decode circuitry is in addition to the normal decode stage of the pipeline. When a branch instruction is detected by the active fetcher it initialises the other instruction fetcher to start fetching instructions from the new block while the instructions up to the branch instruction of the first block continue to be passed into the pipeline for decoding and execution. Not only does this system require extra local decode circuitry to detect branch instructions prior to the normal decode stage of the pipeline, but it also involves speculative fetching of instructions from the memory, many of which may not be required.
0010 EP-A-355069 (Evans & Sutherland Computer Corporation) defines a system in which there is separation of the instruction to effect a branch into two different parts. The set branch instruction indicates the target location for the branch and can be placed as near the beginning of the string of instructions as possible.
0011 Actual implementation of the branch is carried out later in response to a split bit located. in a later instruction.
0012 The provision of the target location for the branch with the set branch instruction provides an early indication of the fact that a memory access is going to be made (or is likely to be made) and provides the memory address (the target location) for that access. When the split bit causes the branch to be taken, and the time comes therefore to access that memory address, the system has had a chance to set up for the access, for example by bringing the necessary data into a local cache.
0013 One problem associated with the system of EP-A-355069 is that the target location from which new instructions are fetched is reset after a split bit signal has been executed. This means that there cannot be multiple branches using the target location set up by a single set branch instruction. It is advantageous to allow for this situation and it is one object of the present invention to provide an improved system for implementing branches allowing for this.
0014 According to one aspect of the present invention there is provided a computer system for fetching, decoding and executing instructions comprising:
0015 storage circuitry for holding a plurality of instructions at respective storage locations, said plurality of instructions being arranged in instruction strings, each string comprising a first instruction and a set of subsequent instructions;
0016 instruction fetch circuitry for fetching a sequence of instructions from said storage circuitry and including an indicator for providing an indication of a next address at which a next fetch operation is to be effected;
0017 execution circuitry for executing fetched instructions, wherein at least some of said instruction strings each includes a set branch instruction (SET) which provides an indication of a target location from which a subsequent instruction may be fetched, the subsequent instruction being from a different instruction string, and wherein said instruction fetch circuitry is operated responsive to execution of a said set branch instruction (SET) to fetch in parallel subsequent instructions from said string containing said set branch instruction and new instructions from said different instruction string commencing from said target location while said subsequent instructions continue to be executed;
0018 a target store for holding the indication of said target location, said indication being loaded into said store on execution of said set branch instruction (SET) and being held in said store as a valid indication until execution of a subsequent set branch instruction; and
0019 select circuitry responsive to generation of an effect branch (DO) signal indicative that further instructions to be executed are said new instructions, to cause said execution circuitry to execute said new instructions and to cause said instruction fetch circuitry to fetch again new instructions commencing from said target location.
0020 The invention also provides a method of operating a computer to fetch decode and execute instructions which computer has storage circuitry holding a plurality of instructions at respective storage locations, said plurality of instructions being arranged in instruction strings, each string comprising a first instruction and a set of subsequent instructions the method comprising:
0021 fetching a sequence of instructions from said storage circuitry and providing an indication of a next address at which a next fetch operation is to be effected;
0022 decoding said instrutions;
0023 executing each instruction in turn, wherein at least some of said instruction strings each include a set branch instruction (SET) which provides an indication of a target location from which a subsequent instruction may be fetched, the subsequent instruction being from a different instruction string;
0024 on execution of said set branch instruction, holding the indication of said target location in a target store as a valid indication until execution of a subsequent set branch instruction, fetching in parallel subsequent instructions from the string containing said branch instruction and new instructions from said different instruction string commencing from said target location;
0025 continuing to execute said subsequent instructions until an effect branch signal is generated which indicates that further instructions to be executed are said new instructions; and
0026 responding to said effect branch signal by commencing execution of said new instructions and fetching again new instructions commencing from said target location.
0027 In one embodiment said instruction fetch circuitry comprises two instruction buffers, a first buffer for holding subsequent instructions connected to said execution circuitry, and a second buffer for holding new instructions wherein the contents of said second buffer are copied into said first buffer responsive to generation of said effect branch (DO) signal.
0028 In the described embodiment said instruction fetch circuitry includes two instruction fetchers for fetching respectively said subsequent instructions and said new instructions and wherein said select circuitry is operable to connect a selected one of said instruction fetchers to said execution circuitry.
0029 In the simplest case, the target store can hold the memory address of the target location. To allow kernel entry, the set branch instruction can identify the target location using an implicit value which addresses a special register holding the memory address of the new instructions.
0030 To allow descriptor branches to be executed, the target store can hold a pointer to a memory location which contains the memory address of the target location.
0031 The effect branch signal is generated when the branch point, at which the branch is to be taken, is identified. This can be done in a number of ways. For example, a further instruction can be located in the string of instructions being executed prior to the branch point in which case said further instruction will identify the branch point which will be held in a branch point register. The contents of the branch point register can then be compared with an instruction pointer register holding an indication of the address from which a next instruction would normally be fetched and when the two are equal the effect branch signal is generated. Alternative methods for identifying the branch point are also discussed herein.
0032 The provision of a further instruction which identifies the branch point but which is located before the branch point reduces the number of unwanted instructions which will be fetched before the branch is taken.
0033 As a still further alternative, the set branch instruction itself can identify the branch point which is stored in the branch point register, thereby obviating the need for a further instruction.
0034 However, in a particularly preferred embodiment, the branch point is identified by a further, dedicated instruction, different to the set branch instruction, which is located at the branch point in the string of instructions being executed. To allow for additional branches to be effected, this effect branch instruction can itself define the condition to be satisfied so that a branch is only taken if the condition is satisfied and is not taken if the condition not satisfied.
0035 This provides a further technical advantage over the system of EP-A-355069 discussed above. In that system, the set branch instruction itself must indicate whether or not the branch is conditional or not and cause various different condition detectors to be in a ready state, ready to sense a condition. The condition itself is defined in an instruction different to the set branch instruction and to the split bit instruction.
0036 To avoid the need for state indicators, the present invention provides in another aspect a computer system for fetching, decoding and executing instructions comprising:
0037 storage circuitry for holding a plurality of instructions at respective storage locations, said plurality of instructions being arranged in instruction strings, each string comprising a first instruction and a set of subsequent instructions;
0038 instruction fetch circuitry for fetching a sequence of instructions from said storage circuitry and including an indicator for providing an indication of a next address at which a next fetch operation is to be effected;
0039 execution circuitry for executing fetched instructions, wherein at least one of said instruction strings includes a set branch instruction (SET) which provides an indication of a target location from which a subsequent instruction may be fetched, the subsequent instruction being from a different instruction string, and an effect branch instruction different from said set branch instruction and located at the branch point after which said new instructions are to be executed and wherein said instruction fetch circuitry is operated responsive to execution of a said set branch instruction (SET) to fetch in parallel subsequent instructions from said string containing said set branch instruction and new instructions from said different instruction string commencing from said target location while said subsequent instructions continue to be executed; and
0040 select circuitry responsive to execution of a said effect branch (DO) instruction to cause said execution circuitry to execute said new instructions if a condition determined by the effect branch instruction is satisfied.
0041 The invention also provides in a further aspect a method of operating a computer to fetch decode and execute instructions which computer has storage circuitry holding a plurality of instructions at respective storage locations, said plurality of instructions being arranged in instruction strings, each string comprising a first instruction and a set of subsequent instructions the method comprising:
0042 fetching a sequence of instructions from said storage circuitry and providing an indication of a next address at which a next fetch operation is to be effected;
0043 decoding said instructions;
0044 executing each instruction in turn, wherein at least one of said instruction strings includes a set branch instruction (SET) which provides an indication of a target location from which a subsequent instruction may be fetched, the subsequent instruction being from a different instruction string;
0045 on execution of said set branch instruction, fetching in parallel subsequent instructions from the string containing said branch instruction and new instructions from said different instruction string commencing from said target location;
0046 continuing to execute said subsequent instructions until an effect branch instruction is executed which is located at the branch point after which new instructions are to be executed and which indicates that further instructions to be executed are said new instructions if a condition determined by the effect branch instruction is satisfied; and
0047 responding to said effect branch signal by commencing execution of said new instructions.
0048 As an alternative arrangement to enable the computer system to perform conditional branches, it can include circuitry for holding a state indicator in one of a confirmed state and a rejected state. The confirmed state is one in which further instructions to be executed are new instructions commencing from the target location. The rejected state is one in which further instructions to be executed are subsequent instructions in memory and not new instructions. One of the states can be set responsive to execution of the set branch instruction and the other of the states can be selectively set responsive to execution of a second instruction different from the set branch instruction and subject to a condition.
0049 The second instruction can be a confirm instruction which sets the confirmed state if the confirm condition is satisfied.
0050 Alternatively, the second instruction could be a reject instruction which sets the rejected state if the reject condition is satisfied.
0051 The provision of these reject or confirm instructions allows a further improvement to be made in that the set branch instruction is the first instruction of the string and there is a plurality of contiguous instruction strings, with the set branch instruction acting as a further instruction to generate the effect branch signal if the state indicator is in the confirmed state. It will be appreciated that the set branch instruction acting as the further instruction will also change the state of the state indicator back to its original state. Preferably the confirm/reject instruction can be placed as early as possible within the string (after the condition has been generated) so that the execution circuitry can be given an early indication of which way the branch will go.
BRIEF DESCRIPTION OF THE DRAWINGS
0052 For a better understanding of the present invention and to show how the same may be carried into effect, reference will now be made by way of example to the accompanying drawings.
0053FIG. 1 is a schematic illustrating a known branching system;
0054FIG. 2 is a schematic illustrating the branch system of the present invention for non-conditional branches;
0055FIG. 3 is a schematic illustrating the branch system of the present invention for conditional branches;
0056FIG. 4 is a simple block diagram of a pipelined processor;
0057FIG. 5 is a circuit diagram of an instruction fetcher;
0058FIG. 6 is a circuit diagram of a computer system for implementing branch instructions;
0059FIG. 7 is a circuit diagram of an instruction fetcher with kernel and descriptor functions;
0060FIG. 8 is a schematic diagram illustrating procedure calling;
0061FIG. 9 is a sketch illustrating states for performing procedure calls;
0062FIG. 10 is a block diagram illustrating an alternative implementation for an instruction fetch circuit;
0063FIG. 11 is a block diagram illustrating a non predictive fetcher; and
0064FIG. 12 is a block diagram illustrating a predictive fetcher.
DESCRIPTION OF THE PREFERRED EMBODIMENTS
1
2
1
0
0
0065 Reference will first be made to FIGS. 2 and 3 to explain the concept underlying the branching system of the present invention. FIG. 2 illustrates three blocks of instructions in memory, Block A, Block B and Block C. Each block comprises a first instruction which in each case is a set branch instruction Set B, Set C, Set D, respectively, a sequence of subsequent instructions for example Inst A, Inst A . . . Inst Ai- in Block A and a last instruction which in each case is an effect branch instruction referred to herein as D. Assume that the sequence of instructions in Block A is being fetched decoded and executed in a pipelined computer system. On execution of the first instruction Set B, a target location for a branch is stored, in this case identifying the memory address of the first instruction Set C of Block B. However, no action is taken at this stage other than to store the target location and possibly to set up the memory containing Block B for an access, for example by moving the relevant memory addresses to a local cache. The instructions in Block A continue to be fetched, decoded and executed until the last instruction, D, is being executed. Execution of this instruction causes an effect branch signal to be generated which causes the execution unit to address as its next instruction the target location set up by the set instruction Set B. Thus, the next instruction to be fetched from memory is the first instruction Set C of Block B. This is indicated by the dotted arrow in FIG. 2.
0066FIG. 2 illustrates the case for unconditional branches, that is branches that will inevitably be taken. FIG. 3 illustrates the position for conditional branches, that is branches that may or may not be taken depending on whether or not a condition which has been evaluated is satisfied. FIG. 3 illustrates the case where a third instruction is used in addition to the set branch instruction and effect branch instruction described above with reference to FIG. 2. In FIG. 3 this third instruction is referred to as CONFIRM, although it will become clearer in the following that it is possible to implement conditional branches using a reject instruction with the opposite semantics.
0067 It is also possible to implement conditional branches using a conditional DO instruction.
0068FIG. 3 illustrates three sequences of instructions held in memory as Block A, Block B and Block C. Block B is shown contiguous to Block A and is arranged in memory such that if instructions are fetched from memory using sequential memory addresses then instructions will be normally fetched in the sequence of Block A followed by Block B. Block C is shown located elsewhere in memory. As in FIG. 2, each block comprises a first instruction which is a set branch instruction (Set C in Block A, Set B in Block B and Set E in Block C). Block A then additionally comprises a sequence of instructions to be executed including a confirm instruction and the last instruction which is the effect branch instruction. As described above with reference to FIG. 2, instructions are fetched, decoded and executed. When the first instruction of Block A is executed it is identifed as a set branch instruction with a target location identifying the memory address of the first instruction Set E in Block C. Instructions in Block A continue to be fetched, decoded and executed until the confirm instruction is reached which has a condition associated with it. If the condition is satisfied, the branch is confirmed and execution of the effect branch instruction DO at the end of Block A will cause the branch identified by the target location to be taken as indicated by the dotted line in FIG. 3. Thus, the next instruction to be fetched, decoded and executed will be the first instruction Set E of Block C. If the confirm condition is not satisfied, the branch will not be taken when the effect branch instruction is executed but instead the next instruction to be fetched, decoded and executed will be the first instruction Set D of Block B which sequentially follows Block A in memory. It will readily be appreciated that once confirm instructions has been introduced, it will be necessary even to confirm unconditional branches such as that which is illustrated by way of example in Block C, where the branch is always confirmed and is not subject to a condition.
METHOD A
set
<addr>
;specify branch target
. . .
confirm
<cond>
;confirm the branch
. . .
do
;execute it, if confirmed
0069 It is assumed for the purposes of the present description that any useful computer system must be capable of implementing conditional branches in addition to unconditional branches. It will be appreciated that in order to implement branches as described above with reference to FIGS. 2 and 3, a target register must be provided for storing the target location indicated by the set branch instruction. Moreover, for conditional branches a state indicator must be provided to indicate whether the branch is in a confirmed state or not. A detailed explanation of circuitry capable of implementing the present invention is given later. Firstly, there follows an explanation of the various different ways in which branch instructions in accordance with the present invention may be implemented.
METHOD B
set
<addr>
;specify branch target
. . .
reject
<cond>
;optional conditional reject branch
. . .
do
;do the branch if not rejected
0070 This is the scheme outlined above. There are three distinct instructions. One bit of state is needed to specify whether the branch has been confirmed or not. There could be multiple confirm instructions, the branch being taken if the condition evaluated for any confirm instruction is true.
METHOD C
set
<addr>
;initialize branch target
. . .
do
<cond>
;conditionally execute branch
0071 This mechanism is similar to Method A, except that the branch has to be rejected, rather than confirmed. As before, one bit of state is required to hold whether the branch has been rejected or not. The set instruction initializes the branch target register, and sets the state to branch. The reject instruction conditionally sets the state to not branch. The do instruction executes the initialized branch, if the state is still at branch. With these semantics, the reject instruction is optional, unconditional branches would not need one. There can be more than one reject instruction, if any nullify the branch, then the branch will not be taken.
METHOD D
set
<addr>
;initialize branch target
. . .
confirm
<cond>
;conditionally confirm branch
. . .
do
<Offset>
;perform branch some
instruction later
0072 This method combines the confirm and do instructions, so that do becomes a conditional do. There is no requirement for a state machine to hold whether the branch is to be taken or not.
0073 This scheme delays the effect of the do instruction by a variable amount (<offset>). This permits unnecessary instruction fetching to be stopped at the end of the block of instructions.
METHOD E
set
<addr>
;initialize branch target
. . .
reject
<(cond>
;optionally conditionally
reject branch
. . .
do
<offset>
;perform branch some
instruction later
0074 The end of the block (branch point) is indicated in the do instruction, either as an offset to the last instruction in the block, the first instruction in the subsequent block or as an instruction count to the end of the block. Two registers are required, one bit of state to record whether the branch has been confirmed or not, and a branch point register to hold the block termination address or count, as an indication of the branch point.
METHOD F
set
<offset>,<addr>
;initialize target and branch point
. . .
confirm
<cond>
;conditionally confirm branch
0075 This scheme is similar to Method D, except that the branch is conditionally rejected, rather than confirmed. The reject instruction is optional.
METHOD G
set
<offset>,<addr>
;initialise target and branch point
. . .
confirm
<cond>
;optionally conditionally reject branch
0076 This scheme is similar to Method D, except that the branch point is specified with the set instruction, thus removing the requirement for a do instruction. The branch still needs to be confirmed, otherwise it will be ignored. Two additional registers are required, one bit of state to record whether the branch has been confirmed or not, and a branch point register to hold the block termination offset or count as an indication of the branch point.
METHOD H
set
<addr>
;initialize branch target
. . .
do
<cond>,<offset>
;confirm and set branch point
0077 This scheme is similar to Method F, except that the branch can optionally be rejected. Unconditional branches do not require a reject instruction. The same additional state is required.
0078 This method is a combination of Method C and Method D. The set instruction specifies the branch target location, whilst the do instruction specifies both a branch point and the condition on whether the branch is to be executed. Two pieces of state are required to support this, a branch point register to hold the branch point and one to hold whether the branch is to be executed or not. Both of these are set by the do instruction. If the condition is false, the processor stays in the unbranching state. Unconditional branches could either specify a true condition, or use a special unconditional do instruction.
set
loop
;set branch target to loop
loop:
;loop entry point
. . .
;loop code
do
<cond>,<coffset>
;loop continuation condition
. . .
;some more loop code
0079 This method is interesting, as it does not require the branch target location to be set for each block, if the target of successive blocks is the same. This occurs in tight loops. For instance the following code is valid.
0080 The set instruction is executed only once. The same branch target is required for each iteration of the loop.
0081 Some of the above referenced methods can be modified still further. For example, it will be clear that for a plurality of contiguous blocks in memory as illustrated for example in FIG. 3 where the set branch instruction is the first instruction of a block and the do instruction is the last instruction of a block, there will be at each block interface a do instruction immediately followed by a set instruction. This is illustrated particularly where Block A meets Block B in FIG. 3. For methods which hold an indication as to whether or not the system is in a branch state, it is possible to eliminate the do instruction at the end of a block and to rely on the set instruction at the beginning of a contiguous block. Thus, Methods A and B can be modified to eliminate a different do instruction and to interpret the set instruction as follows. If the system is in a branch state, the subsequent set instruction at the beginning of the next block is executed as though it were a do instruction to effect the branch. If the system is not in a branch state when the set instruction at the beginning of the next block is executed, the branch will not be taken and the set instruction will be executed in the normal manner to set up a branch with a target location.
41
39
43
41
41
41
43
41
39
10
12
14
16
22
16
18
20
11
16
18
20
11
17
0082 There will now be described a computer system for implementing branching using a split branch instruction. FIG. 4 is a simplified block diagram of a pipelined computer system. This shows a memory which in this example comprises a conventional RAM. The computer system includes an address bus and a data bus coupled to the memory . It will be appreciated that read and write control signals for the memory are required but they are not illustrated in FIG. 4. The memory holds program comprising sequences of instructions at different addressable locations, as already described above with reference to FIGS. 2 and 3. The memory may also hold data. The data bus carries data values to and from the memory . The address bus carries memory address values for read or write operations. The computer system comprises an instruction fetch circuit which is arranged to supply addresses to memory along address line and to receive instructions from memory along data line . A decode circuit is connected to receive instructions fetched by the fetch circuit and supplied on instruction line and decodes them. The decode circuit supplies instructions to an execution circuit which executes instructions and controls a result write circuit to write results of the execution into temporary registers . For the purposes of the present invention, the decode circuit , execution circuit , result write circuit and registers are conventional and are not described further herein. They are referred to together in the following as the processor .
10
41
22
16
0083 The fetch circuit is arranged to fetch four bytes at a time from the memory and to provide instructions along instruction line to the decode circuit . Where the instructions are of variable length, it will be appreciated that an alignment mechanism is required within the instruction fetch circuit to deal with instructions which are not exactly four bytes long and to correctly align these instructions. Circuitry to accomplish this is described in our copending Application No. ______ (Page White & Farrer Ref. 74893 Compressed Instruction Set). The present invention can be implemented with same length or variable length instruction sets.
10
14
12
14
12
65
65
38
14
66
22
17
74
70
66
74
86
75
66
24
66
41
66
26
41
66
28
24
28
30
a
a
0084 The fetch circuit comprises two instruction fetchers, one of which will now be described with reference to FIG. 5. The data line and address line are connected to the corresponding lines and illustrated in FIG. 4. The fetcher includes a fetch pointer which comprises a 32 bit latch containing the next address in memory from which a 32 bit word is to be read. Whenever a value is read from memory, the fetch pointer is normally increased by four bytes to a new pointer address via an increment unit . The fetcher is arranged to read instructions from memory on data line into an instruction buffer from which they are output along instruction line to the processor . For variable length instructions, a length indicator is provided which receives on line an indication from the instruction buffer of the length of the instruction which has been output. The length indicator generates an amount signal which indicates the number of bytes used by the instruction being output. A byte counter holds a count of the number of bytes in the instruction buffer at any one time and generates a select signal which determines where in the instruction buffer bytes fetched from the memory are to be inserted. The instruction buffer also receives a remove signal which causes an instruction to be removed from the buffer. Unremoved instructions are shifted along, thereby creating space at the end of the buffer for more bytes from the memory . The instruction buffer is also responsive to a store signal which causes bytes from the memory to be stored in the buffer at the location indicated by the select signal . The store signal is derived from a latch signal which is used to indicate that data can be stored from the memory.
65
32
34
36
38
38
34
40
42
34
40
65
44
42
30
65
30
46
75
48
66
0085 The fetch pointer is supplied with an address on line from a fetch multiplexor which has one input connected to receive a next address on line from the increment unit . The increment unit updates the fetch address in the usual manner, in this example by four bytes each time. The other input of the fetch multiplexor is connected to a start line on which is supplied a new address from which fetching is to be commenced. It will readily be appreciated that for the purposes of branching the new address is derived from the target location identified in the set branch instruction. A begin signal controls the fetch multiplexor to start fetching from a new address on the start line . The fetch pointer has its latch input connected to an OR gate which receives the begin signal and the latch signal to control latching of subsequent addresses into the fetch pointer . The latch signal is also supplied to a gate which is connected to the latch input of the byte counter and which receives as its other input a next signal which is used to indicate that an instruction has been read from the instruction buffer and which thus latches the appropriate byte count.
42
75
50
50
52
50
54
50
56
12
56
12
50
56
58
80
80
75
66
58
82
66
82
75
84
85
85
90
75
74
90
92
0086 The begin signal is also fed to the clear input of the byte counter and to the clear input of a stop latch . The stop latch receives on the Stop At line the address after which no further instructions are to be fetched. This address is stored in the stop latch under the control of a stop signal . The output of the stop latch is fed to a comparator which also receives the memory address on line . The comparator determines whether or not the memory address on line has reached the address stored at the stop latch . The output of the comparator is supplied to a gate which also receives the output from a check full unit . The check full unit receives the output from the byte counter and asserts its output whenever the buffer is full. The output of the gate provides a full signal on line which indicates either that the instruction buffer is full or that the stop address has been reached. No further memory requests will be performed when the full signal is asserted. The output of the byte counter is also fed to a second increment unit the output of which is fed to one input of a count multiplexor . The other input of the count multiplexor is supplied from a subtract unit which receives the output from the byte counter and the output from the length indicator . The subtract unit asserts a more signal whenever the instruction buffer does not contain at least one instruction.
40
34
42
50
65
14
66
30
65
38
66
22
70
74
74
86
90
75
24
22
48
92
80
82
0087 Operation of the instruction fetcher will now be described. A start address, which is the memory address identifying the first four bytes at the beginning of a block of instructions is supplied on line to the fetch multiplexor . The begin signal is asserted to clear the stop latch and to latch the start address into the fetch pointer . A memory access is made at that address and the first four bytes are supplied along data line to the instruction buffer . The latch signal causes these four bytes to be stored in the buffer and latches a next address into the fetch pointer . This next address will now be the start address incremented by four bytes by the increment unit , unless a branch is being taken as described more fully later. The instruction buffer supplies an instruction along line and indicates the length of the instruction on line to the length indicator . The output of the length indicator supplies the amount signal to indicate the size of the instruction which has been removed and also supplies an input to the subtract unit which provides a count to the byte counter to enable it to assert the select signal to determine where in the buffer the next four bytes fetched from memory should be stored. As has already been described, removal of an instruction from the buffer on line is under the control of the next signal . If there is not at least one instruction held in the instruction buffer, the more signal is asserted. If the instruction buffer is full, the check full unit causes the full signal to be asserted to prevent further memory accesses.
50
50
42
50
50
0088 The stop latch is used to store an address which the fetcher should not advance past. On commencement of fetching at the start address the stop latch is cleared to an invalid address by the begin signal . Storing a special address in the stop latch will stop fetching. The use of the stop latch will become clearer in the following description of the application of the fetcher unit.
40
0089 When a branch instruction has been fetched, decoded and executed, the target location identified by the branch instruction is used to provide the start address on line for the instruction fetcher when the effect branch signal has been supplied to cause a branch to be taken. The fetcher thus commences fetching of instructions from the new target location.
10
5
100
12
102
12
104
100
14
22
104
22
104
17
11
17
48
17
106
92
17
108
110
112
114
108
108
116
a
a
0090 The fetch circuit of FIG. 4 includes two instruction fetchers of the type described above with reference to Figure . Reference will now be made to FIG. 6 to describe in more detail how branch instructions control the activity of the instruction fetchers. In FIG. 6, the fetchers are illustrated as Fetcher A and Fetcher B. The system includes an arbitrator unit which arbitrates between Fetcher A and Fetcher B for access to the memory using the full and more signals from each fetcher to determine which requires data. The full and more signals for Fetcher A are referred to at the arbitrator as more A and full A and the full and more signals for Fetcher B are referred to at the arbitrator as more B and full B. Reference numerals relating to Fetcher A correspond to those for the instruction fetcher shown in FIG. 5. These numerals are not repeated again for Fetcher B, because this has precisely the same signals and operation as fetcher A. The address outputs of the Fetchers A and B are supplied through an address multiplexor to the address line . The multiplexor is controlled by a Sel A signal on line from the arbitrator which gives priority to the fetcher which is currently fetching instructions for execution. It will be appreciated that one of the fetchers is used to fetch instructions in the current block (and potentially the next sequential block) and the other fetcher is used to fetch instructions commencing from the target location. Both fetchers receive instructions along data line and supply their instructions on line to a select multiplexor . The output of the multiplexor is connected to the processor which decodes and executes instructions and writes the results to temporary registers . The processor supplies the next signal which is fed to the instruction fetchers on line . The processor receives a wait signal on line which is derived from the more signals of the fetchers. As the processor executes instructions it updates an instruction pointer register to point to the next instruction to be executed by supplying an output on the new IP line via a pointer multiplexor . A latch IP signal on line indicates when the instruction pointer register is to be updated. The output of the instruction pointer register provides the current value of the instruction pointer on a current IP line .
118
120
122
17
124
120
108
17
126
128
112
122
128
130
124
0091 The computer system of FIG. 6 also includes a target pointer register for holding a target location identified by a set branch instruction and a branch pointer register for holding a value identifying the point at which the branch is to be taken. The computer system also includes an active fetcher switch which controls which of the fetchers A and B is supplying instructions to the processor . There is also a compare unit connected to receive the outputs from the branch pointer register and the instruction pointer register . A check output from the processor on line is fed via a gate to control the pointer multiplexor and the active fetcher switch . The gate also has an input on line from the compare unit .
17
136
142
132
0092 The execution circuit of the processor includes a set branch instruction execution unit and a do instruction execution unit . The computer system also includes a state indicator for holding an indication of the state of the system, that is whether it is in a branch state or not.
0093 The remaining gates illustrated in FIG. 6 are not described herein because they are illustrated for the sake of completeness only to more clearly demonstrate the connections between the signal lines.
17
22
104
134
122
17
136
17
136
138
140
42
118
17
132
145
54
1
142
17
142
120
144
50
54
145
120
108
124
146
112
108
118
146
112
112
104
a
0094 Operation of the computer system of FIG. 6 will now be described. Assume that the processor is to execute block A of FIG. 3. The start address identifying the beginning of the first instruction of block A is supplied to fetcher A. The first instruction is supplied on line to the multiplexor which is controlled by a signal on line from the active fetcher switch so that instructions from fetcher A are supplied to processor . The first instruction is a set branch instruction Set C which is identified by the set branch execution unit forming part of the processor . The set branch execution unit generates the appropriate target location on target line and a set signal on line . The set signal is used to activate the begin signal for fetcher B so that that fetcher is initialised to commence starting to fetch instructions from the target location. The target location is also stored in the target pointer register . Instructions in block A continue to be supplied by fetcher A from memory to the processor and executed. On execution of the confirm instruction, the condition for the confirm instruction is evaluated and the state indicator is appropriately set. The condition line indicates the state of the system which is selectively supplied to the stop lines and the fetchers as described later. The following description assumes that the condition for the confirm state has been positive so that the system is in a branch state. After fetching decoding and execution of further instructions up to and including Inst A- in block A, the next instruction is an effect branch instruction. This is executed by the do instruction execution unit which forms part of the processor . On execution of the effect branch instruction by this unit , the branch point is calculated (the first address of the first instruction at the beginning of the next sequential block) and is supplied to the branch pointer register along line . The branch point is also supplied to the stop latches of the fetchers. In this case, the stop signal is asserted for Fetcher A via the condition line and not for Fetcher B. Therefore Fetcher A latches the stop address so that it will stop fetching when that address is reached. When the branch point stored in the branch pointer register matches the address of the next instruction stored in the instruction pointer register , the output of the compare unit causes an effect branch signal to be asserted on line, . This controls the instruction pointer multiplexor to update the instruction pointer register from the target pointer register which, it will be recalled, holds the target location identified in the set branch instruction. Furthermore, the effect branch signal is supplied to the active fetcher switch which causes fetcher B to become the active fetcher commencing fetching from the target location so that the branch is taken. The output of the active fetcher switch controls the instruction multiplexor to switch its inputs.
142
144
50
120
108
146
0095 If the condition which was evaluated for the confirm instruction indicates that the branch is not to be taken, on execution of the do instruction by the do branch execution unit , an invalid address is supplied on branch line to be stored in the stop latch of the active fetcher, Fetcher A. Thus, the active fetcher will continue to fetch sequential instructions from memory so that the branch will not be taken. Likewise, the invalid address stored as the branch point in the branch pointer register will never match the address stored in the instruction pointer register so that compare unit will never cause the effect branch signal to be asserted.
118
146
118
0096 The desription given above relating to the computer system of FIG. 6 is for a system including a branch point register and a state indicator for holding the state of the system. As mentioned earlier, these may be omitted if a method such as method C is utilised in which the effect branch signal is a conditional signal located at the branch point. The set branch instruction sets the target location into the target pointer register as described above. When the effect branch instruction is executed, the condition defined in the instruction is evaluated. If that condition is true, the effect branch signal is supplied to cause fetcher B to become the active fetcher commencing fetching from the target location so that the branch is taken. The target location remains valid in the target pointer register and, instead of fetcher A being controlled to stop fetching as described above, it is caused to commence fetching new instructions from the target location. This has the advantage that if a further branch should be required having a target location defined by the set instruction, the new instructions have already been fetched.
142
0097 When an effect branch instruction has been executed for which the condition defined in the instruction is true, all instructions which entered the execution unit after the effect branch instruction are deleted because they should not be executed. Instead, execution of the new instructions is commenced.
0098 Thus, on execution of an effect branch instruction for which the condition is satisfied, fetcher A and fetcher B swop over their roles.
0099 If an effect branch instruction is executed for which the condition determines that the branch is not to be taken, there is no change to the role of the fetchers.
118
118
0100 The target location remains valid and stored in the target pointer register until execution of the next set instruction, which resets a new target location in the target pointer register .
39
43
10
402
404
406
408
410
0101FIG. 11 is a block diagram illustrating this principal. In FIG. 11, reference numerals and denote the address bus and data bus as in preceding figures. The fetch circuitry in FIG. 4 is implemented by an execute instruction fetcher and a target instruction fetcher . These are denoted fetcher E and fetcher T respectively. Like elements in each fetcher have the same reference numeral, suffixed E or T appropriately. Each fetcher comprises a fetch pointer for holding an indication of the next address from which instructions are to be fetched and a start pointer for holding the target location representing the first instruction in a new string of instructions. Each fetcher also has a buffer for holding a queue of instructions.
118
412
16
414
146
412
411
0102 Reference numeral denotes as before the target pointer register which holds an indication of the target location responsive to execution of the set branch instruction. Reference numeral denotes a select circuit for selecting the one of the fetchers acting as the execute Fetcher E to supply its instructions to the decode circuit of FIG. 4. A sequencer receives the effect branch signal and has state which changes on receipt of that signal to cause the role of the fetchers to alter as described above, by controlling the select circuit along line .
414
408
418
418
418
0103 The sequence can also provide signals to the fetchers E,T along lines E,T respectively. When the effect branch signal occurs, the sequencer supplies a signal on line E to cause Fetcher E to commence obtaining instructions from the target location.
0104 Sometimes it is useful to provide more than two instruction fetchers to take into account conditional instructions which probably will be satisfied and conditional instructions which probably will not be satisfied. This is particularly the case where the execution unit is pipelined and the determination of the effect branch condition is made at a late stage in the pipeline.
0105FIG. 12 is a block diagram illustrating a system for implementing such an arrangement. In FIG. 12, like numerals denote like parts as in FIG. 11 for the execute instruction fetcher and the target instruction fetcher and the other features common between FIGS. 11 and 12.
403
406
410
408
412
16
0106 The system of FIG. 12 additionally includes a mispredict fetcher , fetcher M. This likewise has a fetch pointer register M for holding the address from which next instructions are to be fetched, a buffer M for holding a queue of instructions and a start pointer register M for holding the start address from which instructions are to be fetched. The select circuit is arranged to select the one of the three fetchers acting as the execute fetcher E to supply instructions to the decode circuitry .
402
404
403
0107 As before, the execute fetcher fetches the normal sequence of instructions for supply to the execution unit. The target fetcher fetches instructions beginning from the target location, and thus holds the next branch target instruction. In addition to these two fetchers, the mispredict fetcher fetches instructions which are located at a branch resulting from a conditional instruction which probably will not be satisfied. This is referred to as a predicted to be not used arm of a branch. If it is subsequently determined that a conditional branch was predicted the wrong way, the correct sequence of instructions is held in this fetcher.
118
404
0108 On execution of a set branch instruction, an indication of the target location is loaded into the target pointer register as before. The target fetcher is cleared and starts fetching instructions from the target location.
402
404
403
118
118
0109 When a conditional DO instruction which will probably be taken (or an unconditional DO instruction) is sent to the execution unit, the functions of the three fetchers is changed so that the execute fetcher becomes the mispredict fetcher, the target fetcher becomes the execute fetcher and the mispredict fetcher becomes the target fetcher. The new target fetcher (formally the mispredict fetcher fetcher M) is cleared and starts fetching instructions from the target location stored in the target pointer register . When a conditional DO instruction representing a condition which probably will not be met is sent to the execution unit, the roles of the target and mispredict fetchers alter as follows. The target fetcher fetcher T becomes the mispredict fetcher and the mispredict fetcher fetcher M becomes the target fetcher. The new target fetcher is cleared and starts fetching instructions at the target location stored in the target pointer register .
413
414
0110 Detection of despatch of these conditional DO instruction to the execution unit is undertaken by a detect unit . This supplies Predict Taken and Predict Untaken signals to the sequencer .
0111 When a DO instruction is executed by the execution unit, it is determined whether or not the branch is to be taken. If this agrees with the prediction, then all is well. If however the taking of the branch was incorrectly predicted, all instructions which entered the execute unit after the incorrectly predicted conditional DO instruction are deleted, and the mispredict fetcher and execute fetcher swap roles. To this end the sequencer receives a Mispredicted signal from the execution unit.
414
0112 This arrangement can be implemented in a variety of different ways without affecting the concept. For example, when the fetchers are renamed the contents of the outgoing target fetcher could be copied to the incoming target fetcher. This means that the new target fetcher does not waste time refetching these instructions. It would continue the fetching from where the outgoing target fetcher left off, provided it is not full. Alternatively, the fetchers need not be renamed dynamically, but their contents transferred as appropriate. This would remove any requirement for state in the sequencer .
0113 The instruction fetcher and circuitry described above are capable of implementing so-called simple branches. Other, specialised type of branch instructions are also useful. One of these is kernel branches. Many processors have two modes of operation, one for normal programs and one for special programs. These are referred to as user and kernel modes. Kernal mode has more instructions available to it which are used to manipulate the operation of the computer. This separation is required to prevent an erroneous or malicious user mode program from causing damage to other user mode programs. Kernel mode programs can be assumed to be correct. There is therefore a need for a method to change a programs mode from user to kernel. This is done by branching to a special target location, called the kernel entry point. With the present invention this is implemented using a special set branch instruction, which does not specify the branch target location explicitly but uses an implicit value. Some state must be used to specify that when the branch occurs, the processor must change to kernel mode.
0114 Another specialised kind of branch instruction is a so-called descriptor branch, which is a call via a pointer. This branch instruction specifies an address in memory, but it is not the address representing the target location of the branch. Instead, it is a memory location containing the target location for the branch.
200
202
204
206
40
206
208
40
200
65
206
208
0115FIG. 7 illustrates an instruction fetcher which can be used to implement kernel and descriptor branches. Like numerals in FIG. 7 denote like parts in FIG. 5. The fetcher of FIG. 7 has the following additional circuitry. A kernel latch holds the address to use for kernel calling and can only be programmed by trusted code. It receives at its latch input a store kernel signal to latch the kernel address on line . A kernel multiplexor receives the kernel address at one input thereof and the normal start address on line at the other input thereof. The kernel multiplexor is controlled by a branch kernel signal on line . The branch kernel signal is asserted at the same time as the start signals would normally be asserted to initialise a branch. When the signal is asserted, the address held in the kernel latch is stored into the fetch latch via multiplexor and a further multiplexor , rather than the address supplied by the start signal.
210
65
212
210
66
214
208
65
214
206
216
66
214
0116 The fetcher also includes a descriptor latch which indicates whether the fetch pointer holds an instruction address or a descriptor address. It is controlled by the descriptor signal on line . When the descriptor latch indicates that the address is a descriptor address, it is loaded from data held in the buffer via a pointer register . The multiplexor controls whether the address supplied to the fetch pointer is from the pointer register or from the multiplexor . A descriptor indication unit signals whether or not the buffer holds enough information for the pointer register to hold the correct descriptor address.
0117 The fetcher of FIG. 7 is thus able to carry out kernel branches and descriptor branches.
0
0118 Another type of branch instruction is procedure calling. This requires that a suitable instruction pointer value is saved so that the procedure can return back to the piece of program from whence it came. Thus, the procedure can be called from different parts of the program. FIG. 8 illustrates the flow graph for a procedure call. FIG. 8 illustrates a program containing Part 1, Part 2 and Procedure. Part 1 has sequential blocks of instructions Block A, Block B between which is located a call instruction. Similarly, Part 2 has sequential blocks of instructions Block C, Block D between which is a call instruction. The procedure includes a sequence of procedure instructions PROC and a return instruction. The two pieces of code, Part 1 and Part 2 both call the Procedure and both return to their respective control flows. The call instruction can be implemented as a particular type of set or do branch instruction which not only identifies a target location (SET) or branch point (D) but causes the return address of the first instruction of the, next sequential block to be saved in a return register. Then, the return instruction can be implemented as a particular type of set instruction which effects a branch to the return address which was held in the register.
230
232
234
230
236
238
230
0119FIG. 9 indicates the state register required to implement procedure calls. This includes registers with a select register unit controlled by a register select signal . On execution of a set or do branch (or call) instruction, the address of the next instruction after the call instruction to which the program is to return is stored in the registers on branch line responsive to the store signal . When the special set (or return) instruction is implemented, the branch is effected to the target location which is stored in the specified register .
17
136
142
108
118
65
66
65
66
0120 In the above described embodiment, there are two instruction fetchers which can both function as the active fetcher depending on the state of the switch multiplexor. FIG. 10 illustrate in block diagram form an alternative embodiment where the instruction fetch circuit comprises two instruction fetchers, one of which is always the active fetcher. This embodiment will now more clearly be described with reference to FIG. 10. Like numerals in FIG. 10 denote like parts to FIG. 6, but primed. Thus, FIG. 10 illustrates a pipelined processor including execution circuitry with a set branch instruction execution circuit and a do branch instruction execution circuit . There is an instruction pointer register and a target pointer register . The fetch circuit includes an active fetcher and a target fetcher. The active fetcher includes a fetch pointer and an instruction buffer . The target fetcher similarly includes a fetch pointer and a target instruction buffer .
118
65
17
300
66
66
17
0121 On execution of a set branch instruction, the target pointer register is initialised to instruct the fetch pointer of the target fetcher to commence fetching instructions from the target location. Meanwhile, the active fetcher is fetching instructions sequentially from memory and supplying them to the processor . On execution of the effect branch instruction, a copy unit acts to copy the contents of the target instruction buffer of the target fetcher to the instruction buffer of the active fetcher so that the next instructions to be supplied to the processor are those commencing from the target location.
7
0122 Further details of implementation of the circuit of FIG. 10 are not given herein because it will be apparent from the information given in relation to the circuit of FIGS. 5, 6 and how the circuit of FIG. 10 could be implemented. | |
According to Marcus Buckingham, “The job of a manager is to turn one person’s particular talent into ... their top 10 strengths, and how they can use their strengths to achieve their team’s goals. The report ... engagement on your team. This means you have the power to change the trajectory of your team ...
-
Jams & Jellies
https://wayne.osu.edu/news/jams-jellies
course, ice cream are some of the ones we look forward to every year. Sometimes other fruit spreads are ... small whole fruit/fruit pieces in a slightly gelled syrup Conserves – jam-like, may contain a mix of ... correct proportion for the product to set correctly. Let’s look at each one a little more closely. ...
-
Landaverde elected to position on AIAEE board
https://acel.osu.edu/news/landaverde-elected-position-aiaee-board
extension education programs and institutions worldwide. Landaverde is a graduate research associate for ... ACEL where his research area is in international development. He holds a bachelor of science from Pan ...
-
Dr. Lyda Garcia is the State Winner for the Search for Excellence in Livestock Production
https://ansci.osu.edu/news/dr-lyda-garcia-state-winner-search-excellence-livestock-production
Congratulations to Dr. Lyda Garcia on being the State Winner for the Ohio NACAA Search for ... Excellence in Livestock Production award. This award recognizes an NACAA member who has developed and carried ... out an outstanding extension educational program in livestock production. To view Dr. Garcia's ...
-
Cloverbud Fun Saturday- June
https://butler.osu.edu/news/cloverbud-fun-saturday-june
The Clover Leader Team will be hosting a special event the first Saturday of each month via Zoom ... a book that goes with the program. The topic for June will be Plant Me & Watch Me Grow. For more ... details, please click here. The Zoom link for the June program is: Topic: Cloverbud Fun Saturday Time: ...
-
Ezekiel M. Miller
https://students.cfaes.ohio-state.edu/node/4686
Agribusiness & Applied Economics Oceanside, CA 2021 Distinguished Senior Award Celebration Program (.pdf ... Ezekiel M. Miller Department of Agricultural, Environmental, and Development Economics ... ) 2021 Distinguished Senior Award Recipient Poster (.pdf) Before coming to Ohio State, Ezekiel Miller ...
-
Niewoehner-Green elected to national leadership educators board
https://acel.osu.edu/news/niewoehner-green-elected-national-leadership-educators-board
community development and action, and from the University of Florida with a doctorate in leadership ...
-
Inclusive Leadership online
https://leadershipcenter.osu.edu/events/inclusive-leadership-online
involves leveraging the talents and skills of your team in ways that recognize and honor the unique ... perspectives andexperiences of a diverse workforce. Leading diverse, multidisciplinary teams can be challenging, but research has shown ... that diverse teams are more innovative, productive, and perform better. Leadership that is ...
-
Problem-Solving, Teamwork and Creativity for Success
https://leadershipcenter.osu.edu/events/problem-solving-teamwork-and-creativity-success-2
Teamwork can be hard! Have you ever been frustrated with a team member and how they approach ... individual’s problem-solving style and creativity. This training will enhance your understanding of team ... dynamics in problem solving and increase group cohesion, effectiveness, and team building. Objectives: ...
-
Preserve Forage Quality with Baleage
https://wayne.osu.edu/news/preserve-forage-quality-baleage
Educator and may be reached at 330-264-8722. CFAES provides research and related educational programs to ... premium maturity, which can sometimes be hard to come by in Ohio and other parts of the Midwest during the ... can cut one afternoon and bale the next day after the dew lifts. Odds are that finding a 2-day, rather ... | https://comdev.osu.edu/search/site/programs%20economic%20development%20ohio%20tourism%20toolbox%20pdfs%20Tourism%20Team%20One%20Page%20Overview%20May%202009%20pdf?f%5B0%5D=hash%3A232jhm&f%5B1%5D=hash%3Aov30gi&f%5B2%5D=hash%3Aavt4pe&f%5B3%5D=hash%3Aifzm5o&f%5B4%5D=hash%3Afjjuex&f%5B5%5D=hash%3Aajcnw6&f%5B6%5D=hash%3At0469t&f%5B7%5D=hash%3Ammw06j&f%5B8%5D=hash%3Abm1igs&f%5B9%5D=hash%3A3szs6a&f%5B10%5D=hash%3A1pcg3d&f%5B11%5D=hash%3Aivuzg6 |
Despite many significant advances in its prevention and management, infectious disease still accounts for considerable morbidity and mortality. The mechanisms by which mammals, including humans defend against microbial invasion are incompletely defined. Defensins are recently identified cysteine-rich, cationic peptides found in abundance in phagocytic leukocytes of several mammals. These peptides are responsible, in part, for the non-oxidative microbicidal activity of these cells toward microorganisms. Four defensins, all derived from granular leukocytes are known to exist in humans. In vitro, defensins have potent activity against bacteria, fungi and enveloped viruses. Recent studies in animal models have found that in addition to leukocytes, epithelial cells also express defensin-related molecules. Preliminary studies presented in this proposal show clear evidence of novel defensin gene expression in non-hematopoietic tissue of humans. Using a molecular biological approach, strong data have been obtained indicating that the family of human defensins is more diverse than currently appreciated, and some of these newly. discovered defensins are expressed exclusively in epithelial cells. The long range goal of this research is to define the role of epithelial defensins in host defense. Toward this goal the following experiments are proposed: 1) Clone and characterize genes corresponding to the non-hematopoietic defensins, establish the nucleotide sequence of selected genes and their flanking sequences, and determine a regional map of these genes which appear to be clustered; 2) Clone and characterize the cDNA encoding novel defensins and defensin-related peptide(s) from non-hematopoietic human tissues; 3) Characterize the cellular localization and antimicrobial properties of the newly discovered defensins; 4) Identify and characterize the cis-acting elements which regulate defensin expression. Epithelial-derived defensins are likely to equip mucosa] surfaces with a previously unrecognized defensive capability that complements other well-defined antimicrobial defenses. The understanding of the physiological regulation of epithelial defensins in humans may ultimately lead to therapeutic modulation of endogenous peptide expression, and may lead to the development of novel therapeutic antimicrobial peptides.
| |
What is obesity and how can it affect your cancer risk?
An expert from the Maine CDC answers some common questions and concerns
An expert from the Maine CDC answers some common questions and concerns
An expert from the Maine CDC answers some common questions and concerns
February is Cancer Prevention Month and obesity can play a significant role in your risk of developing cancer.
WMTW has partnered with the Maine Cancer Foundation to highlight different issues related to cancer in Maine each month.
Dawn Littlefield is the Obesity Prevention Coordinator at the Maine Center for Disease Control and Prevention. She says it is important to understand that obesity is a condition with public health implications and should not be stigmatized as a personal failing.
She says obesity is a condition in which a person has an unhealthy amount and/or distribution of body fat. In 2013, the American Medical Association officially recognized obesity as a chronic disease that impacts other chronic diseases including hypertension, type 2 diabetes, cardiovascular disease, and cancer.
Littlefield says the most common way to determine if a person has obesity is to calculate body mass index, BMI, which is an estimate of body fat that compares a person’s weight to their height. An individual is identified as having obesity if their BMI is 30 or above.
Obesity rates have been rising in Maine and across the country for several years. The most current data for the percentage of adults in Maine with a body mass index of 30 or higher is 31%. The national rate is 31.9%.
Littlefield says an increase in obesity brings an increased risk for many chronic diseases, including cancer. According to the U.S. CDC, there are 13 cancers associated with obesity: breast (in postmenopausal women); colon and rectum; esophageal; gallbladder; kidney; liver; uterine; multiple myeloma; ovarian; pancreas; stomach (upper); thyroid and; meningioma (cancer in the tissue covering the brain and spinal cord). These 13 cancers make up about 36% of all new cancer diagnoses in Maine.
The Maine CDC Chronic Disease Program has worked with partners to develop plans and recommendations including the Maine Cancer Plan. There is an obesity section in that plan that uses evidence-based strategies for reducing risks and preventing obesity. The program also funds community efforts that work to increase awareness of risks and promote healthy lifestyles — making the healthy choice the easiest choice.
Littlefield says regular cancer screenings with your health care provider to stay on top of your health and for early detection are key. | https://www.wmtw.com/article/what-is-obesity-and-how-can-it-affect-your-cancer-risk/39010840 |
The Domplatz in Erfurt looking west, featuring the Cathedral and St, Severi Church. The 13th- century Bonifatiuskapelle in the lower right.
In the next photo, the Domplatz looking east
I am in Erfurt, Germany, again, my home-away-from-home. My Great-great-grandfather grew up here before going abroad about 1810, and finally settling in Charleston, South Carolina in about 1818. My mother found a bunch of his old family letters in an office-secretary, written by his father and his siblings still in Germany between 1812 and 1857.
Among other things, I am impressed by Erfurt's long and complex history. During my very first visit in 1998, for instance, I read that a construction crew was clearing a site to prepare it for new buildings, and discovered a hoard of ancient artifacts hiding in the rubble.
Curiously, the demolished buildings had only been there since World War II, but had already fallen into disrepair, thanks to East Germany's poor maintenance of its buildings. As the tractors moved back and forth, they ran over the artifacts and damaged a few of them. The construction crew turned over the artifacts to the city's archeologists who pored over what they had found. The most interesting object in the Erfurt treasure was a gold wedding-ring engraved with Hebraic letters. The wedding-ring and Jewish motifs on other objects confirmed that the treasure had belonged to a member of Erfurt's thriving Jewish community.
In addition to the jewelry, the treasure contained 3100 silver coins from the early-14th century, known in the trade as gros-tournois, that traded widely in Europe at that time.
It was a real treasure from the 13th and 14th centuries--wealth from a completely different culture: silver coins, gold jewelry, gilt-silver cups and pitchers. The most Americans can find, digging into the ground, is Indian artifacts or the remains of extinct animals.
In places like Erfurt, however, which has documented city-status since the 8th century, you can find the remains of extinct human cultures. You can see the remains of building-foundations beside a differently configured network of streets.
The Jews had settled in Erfurt after its ruler, the Archbishop of Mainz published an encyclical that offered Erfurt-citizenship to anyone based on "libertas et iustitia," like the American "liberty and justice for all."
The Jews took advantage of the offer and settled in Erfurt. By the 12th century, they had built an impressive synagogue, which still stands, and settled the neighborhood around it; but they succeeded so well, the majority-gentile population turned against them.
The contents of the treasure reveal that the Jews wore bejewelled brooches and clips on their cloaks and robes, and enameled belts made of gilded-silver to wear around their waists. The city-authorities warned wealthy citizens against wearing so much jewelry, in order not to provoke poorer citizens. Mostly, they ignored these warnings.
1349 was a watershed year across Europe as the dreaded Black Plague took hold in city after city. Almost by design, Gentiles started looting Jewish businesses and homes. After the first signs of violence, wealthy Jews started burying their wealth, but driven from their homes, they could never return for it. The Erfurt city council confiscated what remained.
Such hoards have appeared in other cities, such as Regensburg, Germany, as well as other cities. Curiously, these other hoards also contained wedding rings and similarly-designed jewelry.
Everyone should have enough moral orientation to know the lessons by heart: Do not flaunt your wealth; do not covet other people's wealth. But history has moved mightily under the spell of envy and resentment. It has proven that wealth induces the most violent and vindictive form of envy. Why bother to steal other people's wealth, if you can elect political official who will get it for you legally, so to speak--giving you a justification for taking it? | https://lloydbowers.com/article/The-Erfurt-Synagogue-Treasure.html |
Descriptive Narrative Essay Example Lovely 23 Free Reflective Of Writing
Tips On Writing A Descriptive Essay. Drafting a Descriptive Essay When creating the initial draft of a descriptive essay follow the outline but remember the goal is to give the reader a rich experience of the subject. Keep in mind the most important watchword of writing a descriptive essay is show dont tell. One of the best ways to show is to involve all of the sensesnot just sight but also hearing touch smell and taste.
The very first step in writing a descriptive essay is to choose your topic. If you do not have a specific assignment provided for you to help narrow down your topic this can be somewhat of a challenge. One essential tip to keep in mind is that the best topic for a good descriptive essay is one that you have a deep connection with.
Descriptive essays often focus on describing. Some place or other. An item or object.
Essentially you can describe anything you feel experience or perceive in this type of essay. What Is the Purpose of Your Essay. An effective way to approach a descriptive essay is to be creative and just describe something you see or observe.
Tips On Writing A Descriptive Essay. Writing a descriptive essay is based on creating a picture in the mind of your reader with the help of involving all their five senses smell touch sight sound and taste. Ability to do it means success.
But if you fail to do this you have tons of things to work on. 7 Tips on Writing Your First Descriptive Essay Make Your Topic Specific. Narrowing the topic of your descriptive essay to the maximum is key to success.
The more concrete the subject is the easier it is to create a vivid image of it in your memory and find the right words to describe it. By Jennifer Frost on October 24 2013 One of the keys to writing a descriptive essay is to create a picture in your reading audiences mind by engaging all five of their senses smell sight touch taste and sound. If you can do this then your essay is a success if not then you have a lot of work to do.
In a descriptive essay conclusion you should sum up your main thoughts and explain the general impressions or thesis using new words. Your conclusion is the last chance to impress readers. As a rule you may ask to write a descriptive essay outline.
It is written to detail the main points that will be described in the writing. Descriptive Essay Structure To write descriptive essay the author needs to first think of he or she is going to talk about and why. The descriptive essay draft should follow the descriptive essay outline but the author should put in mind that the subject experience is what will appeal to the reader.
Tips on Writing Descriptive Essays When writing a descriptive essay you should remember to include words that relate to your readers five senses. They should be able to smell hear touch see and taste your narration. You can follow these tips to make the best descriptive essay ever.
The following tips will guide you in writing a good introduction to your descriptive essay. Start the introduction with suspense you have to choose the right words in the introduction to capture the eye of the reader. To write a descriptive essay start by choosing a topic like a person place or specific emotion.
Next write down a list of sensory details about the topic like how it sounds smells and feels. After this brainstorming session outline the essay dividing it into an introduction 3 body paragraphs and a conclusion. Formulate themes and ideas that you want to cover in your essay.
Pay special attention to the illustrative material and a descriptive essay example that will make your piece of writing more original and interesting. Do not forget about the structure. The paper identifies three main parts - introductory paragraph main section and conclusion.
So in our opinion such a widespread activity deserves a lot of attention which is a good reason to propose a few tips on writing a descriptive essay. Writing a good essay is always a fine piece of work requiring the authors creativity and diligence. As is well known a proper guidance never hurts in a complex job.
Descriptive essay is one of the hardest forms of writing. To master descriptive writing you must be creative and craft a scene that all readers can picture with words alone. This freedom and creativity can make it one of the most rewarding and fun essays to write.
First of all you should invent descriptive essay ideas ie. You are to determine what you will describe. There are a lot of things you can depict but in most cases you will always focus on describing a person an object a place a memory or an experience.
As it was specified before everybody is equipped for depicting. Descriptive essays give readers a more robust understanding of a particular topic by fleshing it out with concrete details and figurative language. After reading a descriptive essay you should walk away with a clear picture of the subject at hand whether its a historical episode a geographic location or a work of art.
Tips on Writing a Descriptive Essay. Very often young and unexperienced students and writers confuse a descriptive essay with a narrative one and need paper helpAt first sight these two papers are similar and have a lot in common but such statement can hardly be called completely correct. When you have to write a descriptive thesis you should pay attention to the detailed description of events processes and people.
This type of essay is contrasted to a prescriptive thesis where you should show the things as they should be. In the descriptive essay you have to demonstrate them as they are in fact. Descriptive essay tips wont do any good if you dont know how to write this type of paper.
You see theres no short cut if you want to write an incredible descriptive essay. Your instructor needs you to demonstrate not only a deep knowledge of the subject but also exceptional writing skills. | https://www.kappero.com/essays/tips-on-writing-a-descriptive-essay/ |
We work in AG-X BB-AA continuing cut 5 in the dark earth of BB 0-Z and AA Z, skirting the rock pack and in the west and south ( see sketch # 6 p. 8 ) and in AG-11 E-F 112-15, where the newly begun cut 2 primarily removes dumped earth full of large and small rocks. Around the west end of 13 (we are moving eastward) we reach what seems to be the original slope and a dark topsoil also full of rocks. Pottery is sporadic and in the dump at first we find some fine ware. Here we also find a bronze fragment (# 1) and some tile including # 2. Later perhaps in topsoil we find a bit of black volcanic glass (# 6), and further, in the black topsoil, a fibula without its pin (# 8). We reach eastern 11 and a depth of 50cm. There a little tile occurs as well.
In AG-X we find the soil on the whole that of burn debris but a complex mixture of hues and intensities. A dark brown soil full of plaster and terracotta bits lies at the bottom. In 0 a greenish-yelllowish tan clay with some carbon and little else in it overlies this as far as the stones in the east and mid AA in the west, about 5-7cm thick. Over the green, the burn is full of plaster, so much so that the texture is altered, and in Z, plaster - yellow to orangle to pink - nearly saturates the earth. Our few beans (# 11) come from this topmost layer but only in the far wast almost in 1. Pottery is frequent and often find impasto. Stemmed (?) bowls with incurved rims are frequent and in various sizes and wares. Bucchero occurs as well as much heavy coarseware. In AA in the bottom we find some large body-base fragments of pithoi and leave 1 in situ. We save a sample of matter stuck to a wall of such a fragment (# 12). We reach the mid-point of AA having turned south in eastern Z.
- Find # 5
- AG-X BB 0
- Cut 5
-
Fragment of an impasto rochetto
- Find # 7
- AG-X BB Z
- Cut 5
-
Fragment of worked (?) long bone. Slashed? Cut?
- Find # 8
- AG-11 Fossa E 12
- Cut 2
-
Fragment of bronze fibula, lacking pin with incised design above plate
- Find # 10
- AG-X AA Z
- Cut 5
-
Fragment of whittled bone (?)
- Find # 13
- AG-X
- Cut 5 Burn
-
Fragment of incised buccheroid
- Find # 14
- AG-X
- Cut 5 Burn
-
Fragment of painted pottery
Afternoon
We have broken down the pottery table of AG-X covering about half the material from these areas and corresponding to cuts 1-3 in both streches with some material from cut 4 of the east-west stretch. It thus corresponds roughly to strat over the heavy burn full of seeds now near or at the bottom of these areas. We are equipped now to being our summary.
Summary 1980. Pottery.
Fabric. Body sherds are chosen to illustrate the wares discussed as well as bodily curvature, sizes, and transitions.
- Find # 1
- Agger DD/0-y
- Cut 4
-
Italo-Corinthian Scale fragment (
see also p. 163, n.12
)
|Descriptive Variable||Value(s)|
|Document Type||Trench Book Entry|
|Trench Book Entry Date||1980-07-28|
|Entry Year||1980|
|Start Page||326|
|End Page||337|
|Title||Daily Log|
|Property or Relation||Value(s)|
|
Temporal Coverage
|
[Standard: Dublin Core Terms]
|Editorial Note||
|
Open Context editors work with data contributors to annotate datasets to shared vocabularies, ontologies, and other standards using 'Linked Open Data' (LOD) methods.
The annotations presented above approximate some of the meaning in this contributed data record to concepts defined in shared standards. These annotations are provided to help make datasets easier to understand and use with other datasets.
Suggested Citation
Mapping Data
Copyright License
Attribution 4.0
To the extent to which copyright applies, this content
carries the above license. Follow the link to understand specific permissions
and requirements. | https://opencontext.dainst.org/documents/a3864f12-6918-4738-b5db-e50203464140 |
Did you know? Environment, diet, and lifestyle, along with daily choices, influence how our genes are expressed. In other words, each decision determines how, when and if certain genes get turned on or not. Just because you have certain ‘inherited’ or genetic traits, or certain diseases seem to run in your family, you're not destined to get the same illnesses or conditions as your ancestors. A happy and healthy life, while not guaranteed to everyone, is within reach. We have more influence over health and wellness than many believe. This book unveils truths behind the relatively new science of epigenetics by sharing the personal, heart-wrenching stories of 16 women who would not take illness as a lifetime answer. They changed their health and thus their lives with nutrition and self-care, and you, can take your life back too! | https://www.barnesandnoble.com/w/genetics-isnt-everything-katherine-s-egan/1127140906?ean=9781478790372 |
An Illinois artist says he was commissioned to paint a mural, only to learn days later the man who paid him does not own the building he worked on.
-
Mural Highlights Dolly Parton's Black Lives Matter Quote
Tourists are flocking to Nashville to see a new mural of Dolly Parton that celebrates her position on Black Lives Matter.
-
Dallas Artist Paints Mural of Soldier Vanessa Guillen
A Dallas artist painted a mural honoring the Fort Hood soldier allegedly killed by a fellow soldier. Aljandro Juarez painted an image of 20-year-old soldier Vanessa Guillen on a fence to bring awareness to her death.
-
Dallas Artist Honors Kobe Bryant with Mural
Artist Theo Ponchevelli showed up late Sunday night to SandersFit Performance Center and began painting a mural of Kobe Bryant and his daughter Gianna without the owner’s permission. See why Ponchevelli felt it was the right thing to do.
-
Dallas Transgender Activist Mural Restored
An artist has restored a Dallas mural celebrating transgender women of color that was vandalized a week ago. Dallas-based artist Rafiq Salleh-Flowers restored the mural Sunday, after someone painted mustaches on the faces of the women in the mural Dec. 8. The mural, on the side of a building in the 4000 block of Cedar Springs Road, commemorates the 50th…
-
Interactive Border Wall Mural Tells Stories Of Deported
Lizbeth De La Cruz Santana returned Friday to the Mexican beach where her father entered the U.S. illegally before she was born, this time to put final touches on a mural of adults who came to the U.S. illegally as young children and were deported. Visitors who hold up their phones to the painted faces are taken to a website...
-
Blind Artist Uses Touch and Texture to Create Paintings
Next month, LSA Burger in Denton will kick off their Fourth annual mural art project, transforming their rooftop into a massive art showcase. Each year, six artists are featured, but there’s one artist that stands out above the rest.
-
Artist Channels Protest For Migrant Children Through Art
Frances Tulk-Hart of Rhode Island is painting a mural of migrant children to protest child separation from parents at the Mexico-U.S. border.
-
L.A. Artist Honors Anthony Bourdain With Vibrant Mural
Jonas Never paid tribute to the late chef-turned-TV host with a large mural on the side of the Gramercy bar in Los Angeles. Never talks about the importance of his new portrait and his experience painting in Los Angeles over the years.
-
Prince Mural Receives Blossoming Crown
A California woman’s mural honoring the late recording artist Prince received a fresh new look.
-
Mural Honoring Fallen Officers in Dallas Ambush Taken Down
The mural sits beside Last Call Lounge on the corner of Madison Avenue and Centre Street in the Bishop Arts neighborhood.
-
Seriously, These Horizontal Lines Are Perfectly Straight
A mind-bending mural in Georgia will have you distrusting your eyes. Are the horizontal lines in this piece of art straight? Join the debate!
-
Mural Honors Late Linkin Park Frontman
Los Angeles artist Jonas Never painted a mural of the late Linkin Park singer Chester Bennington on the wall of a Sherman Oaks, California, pizzeria. Never, who has painted many murals around Los Angeles, says Bennington, who took his own life in July, inspired him to mix genres in his work.
-
New Mural Plaza Brings People out to Bishop Arts District
A new “mural plaza” in the Bishop Arts District was opened to the public on Saturday afternoon.
-
Texas Connects Us: Artist Painting Mavericks' Spray-Paint Mural Credits God's Gift
Although he’s been spray painting for around four years, Josh said his talents and gifts came at birth. ”God has been wowing me all my life with what he’s put in me,” Mittag said. He’s continuing to share his gifts with others by making things around him more beautiful.
-
Work Begins to Install Corpus Christi Mural
Work began this week to install a 65 panel mural that the community helped paint on the side of the Corpus Christi Caller-Times building.
-
Jenni Rivera Mural Vandalized in Long Beach
Vandals were caught on camera spray painting a 125-foot-long mural recently unveiled at a Long Beach park in honor of the late singer Jenni Rivera, police said. | https://www.nbcdfw.com/tag/mural/ |
My name is Sarah Hoffeditz, and I spent the first half of this summer gaining unique experiences through my internship at the Pennsylvania State Historic Preservation Office in Harrisburg, PA.
This opportunity allowed me to use the skills I have developed over the last four years to the test and learn new skills. My internship title is MARS (or Mapping, Assistance, Resources, and Survey) Sites Survey Intern. My supervisors were Elizabeth Shultz and Taylor Napoleon, and I was assisted by other PA SHPO staff.
My internship role was to research above-ground and surficial archaeological sites in five locations, develop a survey at those locations, and update the massive online database PA-SHARE using the Surveyor tools.
There are five PHMC historic sites that I had to research before site visits and surveying:
- Landis Valley Museum (https://www.landisvalleymuseum.org/),
- Historic Ephrata Cloister (https://ephratacloister.org/),
- Conrad Weiser Homestead (http://www.conradweiserhomestead.org/),
- Cornwall Iron Furnace (https://www.cornwallironfurnace.org/), and
- Brandywine Battlefield (http://brandywinebattlefield.org/).
With each location, I had to research and understand the history, the types of buildings attached to the state property, and any potential archaeological sites.
I started researching each location by first going through the sites’ websites. When overlooking the website, I developed an excel file with anything I would find. I was looking for a general map of the types of buildings, structures, or objects attached to the property. For the most part, all sites had a generalized map of their location. By looking at the map, I could see the buildings included in to the property, and often there were descriptions of the buildings.
I would then turn to PA-SHARE. Through PA-SHARE, I would look for more specific details of the buildings like the structure, foundation, wall, roof materials, dates, location description, architecture, and the purpose of the building. I collected this information because I needed to catalog the facilities at each site.
Along with that, I needed to be able to describe those buildings through those characteristics. I also looked for any potential archaeology in the area, such as demolished buildings, noticeable pits, historical documentation of previous excavations, evidence of moved buildings, or of other types of structures that are no longer there.
Another area that I investigated for documentation is speaking with the site administrators or the Friends groups of the historic sites. They usually have more historical documents or maps of the properties and a better understanding of what buildings or archaeological sites are attached to the state’s property. All information collected was put into an excel file so that I could be more organized with what knowledge I have collected and might need about the site.
A final area that I looked at for building or archaeology potential is looking through historical and modern aerials of the locations. By looking through historical aerials, I was able to see if some buildings or structures formerly existed at some point in time but are no longer there. Sometimes the dates of construction of these buildings are unknown, but if I can find historical aerials of the facilities, I can get a general understanding of the era of their construction.
Since Google maps may have clearer images of the properties, I used Google maps to review aerial images of the sites to see if there were any mysterious structures or features on the land that I should investigate during the site visit.
After collecting as much information as I could about each site, I developed a list of needs and questions for each location. That way, at the site visit, I could be prepared to gather as much information as possible.
The purpose of having a site visit to these locations was to collect photographic evidence of the buildings, structures, and potential archaeological sites, and planning the survey ahead of time enabled me to be as efficient as possible in this work I started the site visits with a debriefing with the site administrator.
As part of the debriefing I described why I was there and the purpose of the survey. I also asked any questions that I may have had about certain buildings that may or may not exist or any questions about potential archaeological sites associated with the property.
After that conversation, I then started photographing all the facilities and anything else I needed to document. A great benefit of going for a site visit is to see what else is on the property that I may not have seen in historical documents, aerials, or previous photographs.
When completing the fieldwork for the sites’ surveys, I used the SHPO’s PA-SHARE Surveyor tools, including the mobile field app on a tablet. You can read more about the PA-SHARE Surveyor tools, including the field app, in the blog post “PA-SHARE’s Surveyor is Here!”.
This app helped me provide a more accurate location of the buildings, structures, and sites than I would be able to do if I were completing a map outline on a computer miles away from the area. The app also allowed me to take photographs of the buildings and have them immediately attached to the survey without having to go through several steps to upload them to the records using only a desktop computer.
I also used the app to fill out several fields of information like descriptions, materials, or dates. The benefit of having the app instead of pen and paper is that I do not have to re-upload or refill the information when I shift to PA-SHARE. It can be automatically sent to the PA-SHARE Surveyor Manager website so that I can continue my work there.
Before entering the area, I made a survey request to PA SHPO. This request outlined where and what I intended on surveying. Once this request was approved, it gave me access to upload and record above-ground resources and archaeology.
I described the buildings’ location, appearance, and historical significance in these records. I also described the photographs I took of the buildings or areas, detailing the direction the photo was taken. The purpose of updating PA-Share is to help maintain the site and provide individuals an understanding of what buildings, structures, or features are attached to a particular property.
In addition to completing the research and fieldwork components of my internship’s survey project, I also was able to experience how other sections of the PA SHPO operate and I was able to attend the June meeting of the Pennsylvania Historic Preservation Board.
The other area where I gained more knowledge was the National Register Reviewer. I have prior knowledge about how this section operates because of working on the Determination of Eligibility (DOE) for the Midland Cemetery in Steelton, PA. While working at the SHPO, I contacted April Frantz, the National Register Reviewer. She guided me on how her section operates and advised me if I wanted to pursue writing National Register nominations.
She talked to me about how I could work for a consulting firm where I could write National Register nominations and DOEs for the firm or I could work privately and do them on my own time. She also provided templates of what the PA SHPO is looking for in DOEs. Through working on that DOE, I understood the external end of the SHPO and what is all involved in writing a DOE.
The one notable event I experienced with this section was the National Register board meeting. At this board meeting, all the elected board members voted upon several National Register nominations. All the nominations were approved, and the next step is National Park Service review and then, if accepted, official listing in the National Register. Now that I gained knowledge of the internal workings of the National Register section, I have a well-rounded understanding of how this section works.
I have thoroughly enjoyed the experiences that I have been a part of at the PA SHPO. It has been amazing to take what I have learned in the classroom and put it to the test. When I entered a chapter here at the PA SHPO, I entered a new one in my life as well. Next up I will continue on into my final semester at Shippensburg University and work hard with my studies. While this internship has come to an end, I hope my adventures with the PA SHPO have not.
Today’s guest author is PA SHPO’s summer intern, Shippensburg University graduate student Sarah Hoffeditz. You can read more Sarah in the blog post “Meet PA SHPO’s 2022 Interns!” For more information about the Pennsylvania Historical and Museum Commission’s summer internship program, visit https://www.phmc.pa.gov/About/Join/Pages/Internships.aspx. | https://pahistoricpreservation.com/intern-introspect-mars-sites-survey-internship/ |
"If you want a vision of the future, imagine a boot stamping on a human face — forever."
Warning: Spoilers Ahead
This is the book. One of the most horrifying and depressing codifiers for the Dystopian genre, ever.
After reading Yevgeny Zamyatin's dystopian thriller We, George Orwell wrote Nineteen Eighty-Four as a Pragmatic Adaptation of the novel for non-Russian audiences. It became one of the most iconic stories in the English language, and introduced the phrases "Big Brother Is Watching You", "Thoughtcrime," "Thought Police," and "doublethink" into the English lexicon (but not "doublespeak").
"It was a bright cold day in April, and the clocks were striking thirteen." The year is 1984... maybe. All that's definitively understood is that we are on what used to be the British Isles, now known as Airstrip One, a few decades after a Revolution that took place during the global nuclear wars following World War II and left the world in the hands of three superpowers called Oceania, Eurasia and Eastasia. Oceania has always been at war with Eurasia, or so everyone seems to remember; in reality, only four years ago Oceania was at war with Eastasia and in alliance with Eurasia... but in this world, reality is a very malleable concept.
As everyone in Oceania knows, there is only one Party and only one leader, the omnipresent godlike Big Brother. Oceania's rigid society is divided into the Inner Party, the ruling elite; the Outer Party, the lower government officials and bureaucrats, the closest thing there is to a middle class; and the 'proles', the poor and uneducated lower classes who make up the vast majority of the population, monitored for signs of unrest but otherwise left contemptuously alone ("proles and animals are free", runs the relevant Party slogan). Everyone is conditioned through a carefully manipulated mixture of fear and gratitude to love their leader, Big Brother, as their only protector against total chaos.
Opposition to the Party is discouraged by keeping everyone outside the Inner Party constantly on the brink of starvation and exhaustion. Any resultant discontent is easily answered since "there's a war on, after all." The proles are kept sedated with mindless entertainment and cheap booze, and the Outer Party members survive on a principle called 'doublethink' - a defense mechanism that consciously suppresses the idea that there might be any differences between the Party line and reality. There are no longer any laws, but everyone in the Party is hyper-aware that the faintest glimmer of discontent or even individualism, known as "thoughtcrime," might lead to becoming an "Unperson", which is not only to be destroyed but to have one's life rewritten out of existence.
The Party's ideology, called IngSoc, or English Socialism, has moved beyond the social experiments of past totalitarian regimes, and aims to completely reshape people's ability to perceive the world around them. History is continually rewritten - often outright made up - by the Party so that Big Brother is always right, has always made the right predictions, and always implemented the right policies, for which the citizenry are always appropriately grateful. No evidence to the contrary, in any media, is allowed to remain. As part of this effort, a new language, Newspeak, is being constructed, with the express intent of removing all "superfluous" shades of meaning, especially concepts related to political freedom. The ultimate goal is the elimination of the ability even to think about an anti-authority concept, let alone express it in words.
Winston Smith, a seasoned member of the Outer Party, is also a secret rebel — although since his dreams of defiance are the mundane ones typical of the common man, they apparently haven't yet been discovered. What finally drives him over the edge into becoming the hero of our story is his constant, instinctive feeling that there must be more to life than the uniformly dull and dreary present and the nightmarish future. If the Party can constantly reshape the collective memory, including your very existence, on an ever-changing whim...what meaning is there in anything? As the novel opens, Winston commits a decisive act of thoughtcrime: writing all of this down in a secret diary.
His heresy next expands to take in a boldly attractive, down-to-earth young woman named Julia, who one day passes him a note that changes his life: I love you. Sexually eager and shrewd in all the small day-to-day methods of rebellion, she joins him on secret trysts in an upstairs room he rents from what he thinks is a nice old pawnbroker. For a few months the lovers meet and live like a heartbreakingly teenage-like couple.
Partly through Julia's influence and partly out of his own fierce longing, Winston dares to hold on to the belief that the Party can somehow be toppled. The major hope lies in the Brotherhood, a rumored underground organization seeking to overthrow Big Brother. Winston's golden opportunity seems to come in the form of O'Brien, an extremely powerful member of the Inner Party who through various subtle signals to Winston appears to be harboring rebellious thoughts of his own. Alas, it's only a cruel delusion: soon after Winston and Julia believe they have enlisted in the Brotherhood through O'Brien, it is revealed that the Party had known of their defection all along. They are arrested by the Thought Police and sent to the Ministry of Love.
Winston is imprisoned for weeks and then tortured by O'Brien, whose only loyalty turns out to be to the Party, into believing that two plus two make five and that Oceania has always been at war with Eastasia, because Big Brother says so. Gradually Winston becomes the perfect Big Brother devotee — on the outside at least; but still clinging desperately to the hope that "they can't get inside you." That spark is smashed out from him once and for all by a scarring visit to the dreaded Room 101, where his worst fear is cruelly used against him. He betrays Julia, and with that relinquishes the last of his humanity. After his public confession and release, while awaiting his inevitable execution, Winston realizes that he loves Big Brother.
In spite of it suffering from a bad case of Twenty Minutes Into the Future, as the title alone testifies, Nineteen Eighty-Four remains one of the best and most horrific dystopian works ever.
The BBC adapted the book for television in 1954 with Peter Cushing as Winston Smith. Questions were asked in the House of Commons when it was alleged that one viewer had actually died of shock while watching.
Two film versions were made, in 1956 and (appropriately) 1984. The 1956 version changed the ending, completely ignoring Orwell's point, (on purpose, it turns out), although to some extent proving it. The brilliant and depressing 1984 version of Nineteen Eighty-Four, starring John Hurt as Winston and Richard Burton in his final role as O'Brien, is far more true to the original novel, but is often compared unfavorably to Terry Gilliam's surreal dystopian movie Brazil (which came out one year later, in 1985), which takes a much more subversive and blackly humorous view of Orwell's themes. According to IMDb, Tim Burton is working on another adaptation of this movie.
Also, this book is frequently compared to Brave New World as a way of showing the perspectives of the dystopia-esque society. Note that Nineteen Eighty-Four shows that what we fear controls us, while Brave New World shows that what we love controls us.
Compare also with Jennifer Government, another Dystopian novel in which it's not the state or a single party, but corporations who control everything.
NOTE: Do not identify this book as being anti-communist or anti-fascist anywhere on this wiki. It's anti-totalitarianism. Orwell was personally a socialist, but thought that both extremes were bad and would inevitably lead to the same thing. The original political leaning of the Party is deliberately vague.
This novel named the following tropes:
- Airstrip One
- Big Brother Is Watching
- Doublethink
- Newspeak
- Room 101
- Thoughtcrime
- Two Plus Torture Makes Five
- Orwellian Editor
- Orwellian Retcon
- Unperson (possibly not the first use of the term, but certainly popularised it)
Tropes:
- Adjusting Your Glasses: O'Brien constantly does this. The narrator remarks about the "curious, disarming friendliness that he always managed to put into the gesture".
- Affably Evil: O'Brien is the most nightmarish version of this trope imaginable.
- After the End: The Party has permanently stalled all human progress, and even history itself:
|
|
He who controls the present, controls the past. He who controls the past, controls the future.
- Airstrip One: Trope Namer.
- And I Must Scream/Fate Worse Than Death: The entire world. History and progress has been paralysed, and the inhabitants are dehumanized into mindless drones while being constantly tortured by the warmongering regime and being watched by Big Brother, having no private life whatsoever, spending every day as a form of Mind Rape. And you are fully aware of all of it.
- It's worth noting that Doublethink is in itself a mental version of And I Must Scream, with Doublethink being essentially self-hypocrisy and the Doublethink practitioners being unconscious drones who sublimate themselves and do whatever Big Brother says as truth, while being fully conscious of the entire process and all the heresies and lies the Party imposes on the citizens. Even more chilling is that some people enjoy it.
- Apathetic Citizens: The Proles.
- Arc Words: "Big Brother is watching you", and on a different level:
|
|
WAR IS PEACE
- Assimilation Plot: The Party claims to be doing this.
|
|
"You know the Party slogan 'Freedom is Slavery." Has it ever occurred to you that it is reversible? Slavery is freedom. Alone -free- the human being is always defeated. It must be so, because every human being is doomed to die, which is the greatest of all failures. But if he can make complete, utter submission, if he can escape from his identity, if he can merge himself in the Party so that he is the Party, then he is all-powerful and immortal.
- Author Phobia: The Room 101 scene was inspired by Orwell's personal fear of rats, and the name "Room 101" itself was inspired by a conference room where Orwell had to sit though boring meetings.
- Author Tract: Orwell was never the slightest bit shy in admitting that he wrote primarily in defense of democratic socialism and against totalitarianism.
- A World Half Full: The index that Orwell insisted be added to all versions of the novel - the one containing the article explaining Newspeak. This confused a lot of people...until they realized...hey, it's written in the past tense...
- The Bad Guy Wins: The whole point of this book is that moral and/or ethical standards are irrelevant to Realpolitik, and thus the good guys never will remake the world in their image. Ever.
- Believing Their Own Lies: A key component of doublethink is to "tell deliberate lies while genuinely believing in them".
- Big Beautiful Women: Winston finds the prole woman who sings the "Love Song" outside his apartment to be beautiful in her own way.
|
|
Julia: She's a meter across the hips, easily.
- Big Brother Is Watching: Trope Namer.
- Bigger Bad: Big Brother is never seen in the plot, and it's ambiguous whether he even exists, or is just an icon of the Party.
- Blatant Lies: The whole purpose of the Ministry of Truth and the scary thing is no one questions them.
- Blind Idiot Translation: The original Finnish translation, but it was later remedied by a much better and accurate one.
- Bread and Circuses: The Proles. The Ministry of Truth has a section that produces crappy entertainment for them: newspapers that only contain crime, sports and horoscopes, sensationalistic novels, films "oozing with sex", sentimental songs made by machines and porn.
- Break the Cutie: The rats finally break Winston. Break the Cutie is pretty much the philosophy of Ingsoc in a nutshell — it allows Wide Eyed Idealists to exist so that the Party will have the sadistic pleasure of torturing them For the Evulz.
- Broke Your Arm Punching Out Cthulhu: Winston against the Party's dictatorship. Specifically, version 2.
- Card-Carrying Villain/For the Evulz/Despotism Justifies the Means/Dystopia Justifies the Means: In discussions with Winston during his "re-education", O'Brien drops all pretense that the Party is out for anything other than pure, unrestrained Power. See the page quote for a sampler.
- There are few purer examples of For the Evulz in literature. In material terms, Inner Party members live not much better than the Outer Party and Proles. O'Brien states plainly that what they want is not luxury or long life or happiness, but only power. "How does one man prove his power over another?" he asks. Winston, after a moment's thought, answers, "By making him suffer." Exactly. The Mind Rape that Winston is put through is not merely a necessary measure to preserve the state, it is the whole point of the system — that the Party shall have the sadistic pleasure of breaking down resistant minds and reshaping them.
- O'Brien explicitly states that "Goldstein and his heresies will live forever. Every day, at every moment, they will be defeated, discredited, ridiculed, spat upon- and yet they will always survive". The Party creates its own enemies just so it can have the Evulz of defeating them.
- Chekhov's Gun: Winston's freakout when a rat shows up in the hiding place.
- The Chessmaster: O'Brien.
- Conditioned to Accept Horror: Everyone in the end.
- Conveniently Interrupted Document: Winston is reading Goldstein's book, and is just about to learn why the Party is so brutal and totalitarian - upon which he falls asleep, preventing both him and the reader from learning the reason (until later).
- Crapsack World: Living in the world of 1984 is worse than living in a Cosmic Horror Story. At least most Cosmic Horror Stories have an apathetic universe where you still have privacy and can think whatever you want.
- Despair Event Horizon: The entire world, although Winston doesn't realize this until Room 101.
- Diesel Punk: The tech level of Oceania at least is permanently stuck here.
- Disproportionate Retribution: The hell Winston is put through is astonishing, considering that his rebellious acts — keeping a diary, having an affair and enjoying it — are so trivial and furtive that he would pose no threat to the Party at all if he were only left alone. Very likely he would not agitate, or publish samizdat tracts, or even whisper thoughtcrime to his acquaintances. He would just go on and on, writing lies for the Ministry of Truth and meeting up with Julia and wondering wistfully if there is a Brotherhood, until his natural death. But for the Party, mere obedience is not enough.
- O'Brien seems to imply that what they make Winston go through is not retribution, but rather a twisted sort of intervention. Winston is not actually being punished for a crime; he is being tortured so that he does not grow to commit an actual crime.
- And as O'Brien explains, they also put him through his ordeal because they can.
- An even more terrifying possibility: Winston's rebellion started when he saw a picture that directly contradicted established party dogma (even more so than what he usually saw), that appeared to have been passed to him by accident. It's strongly implied that the party intentionally arranged for him to get this. One interpretation is that the Party felt that its existence required opposition to exist, so they intentionally conditioned some people to rebel, JUST SO THEY COULD CRUSH THEM!
- O'Brien seems to imply that what they make Winston go through is not retribution, but rather a twisted sort of intervention. Winston is not actually being punished for a crime; he is being tortured so that he does not grow to commit an actual crime.
- Doomed Moral Victor: Cruelly, relentlessly, absolutely subverted. The Ministry of Love's methodology is specifically crafted to prevent it.
- Downer Ending:
- For the protagonists, at least; besides the aforementioned appendix, there just may be a single spot of hope left for the world as indicated subtly by the fact that the proletarian woman's symbolic recurring love song outlasts the popularity of the Hate Song. The Party might fall after all, eventually.
- And also within the 'Oranges and Lemons' motif. When O'Brien continues Winston's recitation of the rhyme a couple of lines beyond Winston's recollection of it, he exclaims 'You knew the last line!', and O'Brien agrees. But the rhyme as normally told continues a little more ("I'm sure I don't know, said the great bell of Bow", — that is, interestingly, Bow Bells, the Cockney Londoner's central point.) suggesting that the Inner Party is not as omniscient as it believes.
- The Michael Radford movie ended with a subtler bleak ending, forgoing the bullet to the brain ending, and instead has Winston looking at the image of Big Brother, then thinking, "I love you! I love you!" Meanwhile, the CIA-funded version of 1984 had Winston and Julia rebelling in a hail of gunfire. Not surprisingly, the Orwell family and everyone else pretended it never existed. Talk about irony.
- Actually, the book ends as the movie ends; the trial, walk down the hallway, and bullet to the brain only occur in Winston's imagination, and represent his complete demolition. The events of the book (and 1984 movie version) end with him in the Chestnut Tree Cafe, realizing he 'loves' Big Brother.
- The Brotherhood is this. Although O'Brien implies that it's a myth, it must be borne in mind that O'Brien is lying - the party is not known for its truthfulness. Also possible is a resistance movement that the party does not control (although O'Brien rejects this notion as impractical).
- The following passage (which, incidentally, comes from the narration): "It was curious to think that the sky was the same for everybody, in Eurasia or Eastasia as well as here. And the people under the sky were also very much the same--everywhere, all over the world, hundreds or thousands of millions of people just like this, people ignorant of one another's existence, held apart by walls of hatred and lies, and yet almost exactly the same--people who had never learned to think but were storing up in their hearts and bellies and muscles the power that would one day overturn the world."
- For the protagonists, at least; besides the aforementioned appendix, there just may be a single spot of hope left for the world as indicated subtly by the fact that the proletarian woman's symbolic recurring love song outlasts the popularity of the Hate Song. The Party might fall after all, eventually.
- Dystopia: Trope Codifier.
- Dystopia Is Hard: Interestingly, though, there are shades of this in the book as well (which makes the book an example of using an Unbuilt Trope, since that didn't become popular until 1984 had affected the zeitgeist). Nothing is efficient in Oceania except for the Thought Police, and the few Hope Spots in the book come from the Proles, whom the Party can't really control (or even understand, for that matter). And during Winston's interrogation, O'Brien does - briefly - voice an opinion that the endless war with the other superpowers can't be maintained in perpetuity, and when the breaking point comes, it'll be bad news for the Party.
- It should be noted that part of this is intentional on the party's part since they want the lower ranked party members to be exhausted and unable to rebel
- The Eighties: Subverted. Orwell was writing in the 1940s, with the book being published in 1948, and using the year 1984 as a Twenty Minutes Into the Future setting.
- As revealed in the book Why Not Catch-21?, Orwell really didn't set the story in 1984, nor did he have any particular attachment to the date in question, as one of the titles he was considering for the book up to the publishing date was The Last Man in Britain. He even told foreign publishers that if they wanted to change the title to something other than 1984, he didn't really care.
- In the book Winston himself isn't entirely sure what year it is, because Minitrue has screwed with history so much. Why the Party would keep a dating system based upon the birthdate of Jesus Christ (someone the Party would like very much for people to forget) as opposed to resetting the calendar completely, is another issue, especially since they've gone out of their way to alter everything else about life in former Britain (including the language itself).
- Electric Torture: And pretty much every other kind of torture you can think of.
- The Empire: Oceania, and how!
- Though Winston does at one point wonder if the Empire really exists and perhaps Airstrip One is all there is to Oceania. It's kept ambiguous.
- Empty Shell: The Ministry of Love mass manufactures these out of dissenters.
|
|
"You will be hollow. We shall squeeze you empty and then we shall fill you with ourselves."
- Enfant Terrible: Parson's kids. They're little hellians whom Winston believes will kill their own mother one way or another within a couple of years. And that's before they turn their father over to the Thought Police.
- Equal Opportunity Evil: Goldstein's book tells that the Party accepts Jews, blacks and Indios in their ranks, if only to avoid that some people feel oppressed by other races / cultures / nationalities.
- The Everyman: Winston Smith. See Meaningful Name.
- Evil Will Fail: This book is an infamous aversion of this trope: the evil Big Brother governments of the world have things so completely under control and so tightly locked into their plans, that the book ends with the "resistance" depicted as a myth and the protagonist of the story successfully brainwashed into obedience.
- The Evils of Free Will: This seems to be one of the few things that O'Brien and the Party actually believe in, besides their utterly cynical For the Evulz motivation.
- False Friend: O'Brien.
- Fan Service: In the film. Julia is quite clearly naked in some scenes.
- Fat Bastard: Subverted with Parsons, who seems to be pretty affable.
- Faux Affably Evil: O'Brien talks to Winston in a calm, sometimes cordial tone throughout his torture in the Ministry of Love.
- Female Misogynist: Julia says that she hates women.
- Fictional Political Party: 'The Party'. Simply 'The Party' since they've long since gotten rid of the competition, forming a totalitarian regime. Judging from what little history we can discern, they were originally a far left/communist party which formed in Britain or Europe, eventually succeeding in revolution. Of course, their communist beliefs about social equality were all just a sham, or have long since become one - the only thing The Party wants is power.
- Bear in mind that even this little snippet comes from a document that is very probably a fabrication by the party themselves. It is heavily implied that the original "Party" was simply a clique of amoral intellectuals who took power via a coup d'etat.
- Fictionary: The Newspeak dictionary.
- Foe Yay: Invoked. The purpose of the Two Minutes' Hate is to channel the citizens' sexual impulses into their hatred for the state's enemies.
- Foreshadowing: Julia, albeit unintentionally. "I bet that picture's got bugs behind it."
- Under the spreading chestnut tree, I sold you and you sold me...
- Made even better by Winston spending all his time at the Chestnut Tree Cafe at the end.
- O'Brien telling Winston and Julia about how they will be captured, tortured, etc. after joining The Brotherhood.
- Under the spreading chestnut tree, I sold you and you sold me...
- Forever War: causes a totalitarian Hell.
- Four Eyes, Zero Soul: O'Brien.
- Freud Was Right: Invoked. Julia theorizes that the Party keeps people in a state of warlike hysteria and power hunger though subjecting them to sexual deprivation. She even calls it "sex gone sour."
- Genius Bruiser: O'Brien.
- Genre Blind: Winston.
- Good Bad Girl: Julia.
- Heel Face Mole: O'Brien.
- Hope Spot: Pretty much the entire second part.
- In the third part there is one caused by a typo: after Winston is released, he at one point subconsciously writes "2 + 2 = ", hinting that he may not have been completely conditioned. According to the foreword of one of Penguin Books recent editions of the book, this is actually a typo that has spread to several translated editions. What he wrote was "2 + 2 = 5". Talk about a downer.
- Huge Holographic Head: The face of Big Brother is displayed on huge screens to comfort the citizens after the Two Minutes' Hate is over.
- Industrialized Evil: While the party has very specifically created tortures for dissidents, the entire apparatus is one huge example of human degradation for its own sake.
- Info Dump: Goldstein's book.
- Internal Reformist: Julia, who works for the Party to survive but does things considered illegal when she is not being monitored. Winston tries to be this, but fails.
- Internal Retcon: Winston's job is to receive reports of new articles that do not match the current party line, and to fix the mistakes or to write a new article as a replacement of the Unperson. He also notices the same being applied to announcements on telescreens, where some rations are cut back but still shown to be greater than last year.
- At one point during a rally, the Party, having always been at war with Eurasia, suddenly has always been at war with Eastasia. As in mid-speech (the speaker is handed a note with the change). And — as Winston notes with horror — his audience instantly goes along with it, because Big Brother is watching them and Big Brother is always right.
- The rally in question took tons of preparation, which involved creating banners damning Eurasia, among other propaganda. Once Eastasia has been named as the enemy, the crowd becomes aghast that their banners now falsely name Eurasia and believe Goldstein's heretical group is to blame for them being wrong.
- At one point during a rally, the Party, having always been at war with Eurasia, suddenly has always been at war with Eastasia. As in mid-speech (the speaker is handed a note with the change). And — as Winston notes with horror — his audience instantly goes along with it, because Big Brother is watching them and Big Brother is always right.
- I Reject Your Reality: On a society-wide scale.
- Ironic Echo: "We shall meet again in the place where there is no darkness." It's a brightly-lit prison cell.
- Ironic Nickname: The Ministry of Truth (the past is rewritten), The Ministry of Peace (in charge of the armed forces), and The Ministry of Plenty (rationing to maintain Perpetual Poverty) and worst of all (on a personal basis) The Ministry of Love (torture and brainwashing).
- Fridge Brilliance: They may be ironic names, but from a certain POV (that's what doublethink is for, after all) they are actually truthful names:
- The Ministry of Truth publishes the truth according to the Party and the Big Brother.
- The Ministry of Peace makes sure that there is no peace.
- The Ministry of Plenty makes sure that there is never plenty of anything.
- The Ministry of Love makes sure everybody loves Big Brother more than anything else.
- For that matter, Big Brother himself. The friendly, protective family member stereotype is so completely subsumed by the bullying one that, due to the novel's term being a pervasive Ascended Meme in its own right, the term on its own has no meaning: you can't tell whether someone's using it affectionately or making a reference to 1984 without context.
- Fridge Brilliance: They may be ironic names, but from a certain POV (that's what doublethink is for, after all) they are actually truthful names:
- Ironic Nursery Tune: "Here comes a candle to light you to bed, here comes a chopper to chop off your head!"
- Similarly "Under the spreading chestnut tree/I sold you and you sold me."
- Jail Bake: Winston, after being imprisoned, thinks that the Brotherhood might send him a razor blade hidden in his food, not to escape but to kill himself with. It doesn't happen.
- Just the First Citizen: Big Brother, according to the Party's faux-egalitarian ideology. It's unclear whether he exists at all, but if he did, he would be near-omnipotent.
- Karma Houdini: See The Bad Guy Wins. The Party, O'Brien, and Big Brother all go off scot free due to the way the system is set up. At least, until the Newspeak Appendix implied the Party's fall...
- Kick the Dog
- Kicked Upstairs: After getting arrested, tortured and brainwashed unorthodox Party members are allowed to hang around for several years, and are allowed to spend as much time drinking in the Chestnut Tree Cafe as they can while given jobs which sound important but are really sinecures.
- Kids Are Cruel: Winston, in his youth. During a flashback he remembers how he was driving his family (mother and little sister) out of house and home and was generally a greedy brat.
- The children of Oceania are brought up to mistrust and spy on their own parents. Family values and loyalty are discouraged in favor of sadistically ratting out the other members of one's family.
- Knight Templar: Subverted. The party claims that they have the people's best interests at heart, but in reality, they pursue power for its own sake.
- La Résistance: The Brotherhood, which may or may not actually exist, led by Emmanuel Goldstein, the supposed author of "the book" who also may or may not actually exist.
- Language Equals Thought: The entire purpose of Newspeak is to reconfigure the way people think by controlling the language in which they express their thoughts; the intended logical conclusion of this is that thoughtcrime will eventually be impossible, because there will no longer be any words in which to express it.
- Lie Back and Think of England: Party women are encouraged to do this when they have sex. "Goodthinkful" women are taught to call it "our duty to the Party."
- Men aren't really encouraged to enjoy it either. The Party wants sex to be seen as a dirty but necessary act, like vomiting or getting an enema.
- At one point, O'Brien claims the Party plans to abolish the orgasm, making sex a purely reproductive act devoid of pleasure for anyone.
- Light Is Not Good: "The place where there is no darkness" is not a place you ever want to end up. Ever.
- Malevolent Mugshot
- Manipulative Bastard: O'Brien, and by extensive the entire Party.
- Meaningful Name: Winston Smith, from "Winston Churchill" and "Smith", The Everyman. Julia from Romeo and Juliet. Emmanuel Goldstein from "Bronstein" (Trotsky's given surname) and anarchist Emma Goldman, who was prominent in Orwell's time.
- The Metric System Is Here to Stay: Some focus is given to everybody having to use the metric system. Orwell was against the complete scrapping of Imperial units, though he supported the use of the metric system in scientific work.
- The prole's diatribe against the half-litre is meant to highlight the proles' small-mindedness and lack of vision. The prole in the pub is overworked, underfed, and completely without hope of a better life, yet his main complaint about Ingsoc is the difference between the half-litre and the pint. This is reinforced by the fact that there's almost no difference between the two. A half-litre is 0.9 Imperial pints, or 1.05 American pints.
- Mind Rape: The last third of the novel may be the the most disturbing and prolonged Mind Rape ever put to paper.
- The Party is subjecting the entire Oceanian population to a form of Mind Rape, with the goal of making them mindless and obedient like cattle.
- More Than Mind Control
- My Girl Is a Slut: Winston to Julia.
|
|
"The more men you've had, the more I love you."
- Neologism: Invented terms like "Big Brother," "Thought Police," and "doublethink" and popularized "Unperson." Just look at all the tropes this book has named...
- Newspeak: Trope Namer.
- Necessarily Evil: If O'Brien is correct, the Brotherhood has no choice but to commit the most heinous of acts to defeat The Party.
- Nietzsche Wannabe: O'Brien, who by doublethink, is also the Determinator of the story. Obviously, Ingsoc's motive (Will to Power) and worldview (Despair Event Horizon) reeks of extreme Nietzschean nihilism.
- Ironic, since Nietzsche's ideas about the self would be just about the most subversive thing possible in the eyes of this regime.
- No Celebrities Were Harmed: Aside from Big Brother being a clear Expy of Josef Stalin, Emmanuel Goldstein is pretty clearly based on Lev Trotsky. He even has a Jewish surname.
- No Name Given: Julia's last name and O'Brien's first name are not revealed.
- No Sex Allowed: All intercourse within the Outer Party is strictly regulated only for the development of children. There's a lecture in a part of the book talking about trying to remove the orgasm to prevent any pleasure being derived from sex.
- Not So Different: The rival countries. Oceania may be bad, but the implication is that the two other superstates, Eurasia and Eastasia, are almost exactly identical to it. The three states are always at war with each other, with nobody ever winning. If you live in one of the areas the three states are always fighting over, you are a slave in both body and mind to whoever has power over the area at the current time.
- It is heavily implied that an unspoken gentleman's agreement exists between the three states that they will never make a serious effort to destroy the others - this is the reason no state ever uses mass conscription or WM Ds - because the war is part of the Evil Plan for the three of them to keep the standard of living down and mobilize the hatred of the population. Goldstein's book even mentions that Oceania could probably conquer all of Europe up to the Polish frontier, or that Eastasia could likely seize Australia, but that neither state does so for fear of upsetting the Balance of Power.
- Of course, we don't actually know anything of the other two powers, or indeed how finely balanced the Balance of Power actually is.
- Oh Crap: Winston and Julia's reaction to the fact that there was a telescreen in their hiding place the whole time.
- Only Sane Man
|
|
Winston: Sanity is not statistical.
- O'Brien later convinces Winston that he is more like the "Only Insane Man".
- Peace and Love Incorporated: Minitrue, Miniluv, and Minipax.
- Post-Mortem Conversion: Winston (who works for a propaganda office) pulls out a name and photo of a random dead guy and makes him a great war hero and party loyalist.
- Pragmatic Adaptation: Since the movie obviously cannot devote itself to lengthy info breaks like the novel does, it spends more time cultivating atmosphere and showing just how miserable life is in Airstrip One. Also, many of Winston's thought processes are lost, making him more of an Audience Surrogate - the fact that he's magnificently played by John Hurt (who even looks like George Orwell) is an added bonus.
- The ending is subtly different, changing the meaning but not the outcome. Winston writes 2 + 2 = (as opposed to "2 + 2 = 5," which was Orwell's intent), and thinks "I love you!" after Julia leaves (rather than realising that he loves Big Brother). Whilst the film doesn't depict his brainwashing as absolute, it shows him in an enforced state of doublethink - he subconsciously remembers that 2 + 2 isn't 5 and that he was in love with Julia, but has been broken into unconsciously repressing both memories. Downer Ending indeed.
- Rage Within the Machine
- Reality Subtext: The 1984 film. Richard Burton was dying during filming, and it shows.
- Room 101: The Trope Namer, where Winston and Julia are faced with their worst fears and made to betray each other.
- Scary Shiny Glasses: Winston's duckspeaking colleague.
- Schizo-Tech: The Party has a machine that writes trashy novels (to keep the proles happy) but farms are still worked by using horse plows.
- Justified in that working the farms keeps the proles busy and poor and writing trashy novels the old fashioned way would potentially lead to dangerous thoughts in the writers.
- Screens Are Cameras: The telescreens.
- Secret Police: The Thought Police.
- Sex Is Evil: The Party wants to supress the sex drive. O'Brien states that their neurologists are working on the abolition of the orgasm. One of The Party's prominent youth movements is the Junior Anti-Sex League, who want all reproduction done by artificial insemination.
- Shadow Dictator: Big Brother.
- Sinister Surveillance: Surveillance cameras, hidden microphones and two-way "telescreens" exist in every home and in every street, spying on citizens, monitoring their every move and showering them with propaganda slogans. The Proles are lucky in that they have no telescreens, and only members of the Inner Party are able to (temporarily) turn their telescreens off.
- Space Filling Empire: The whole world has been split into three superpowers: Oceania (North and South America, Great Britain, South Africa and Australia), Eurasia (the Soviet Union, mainland Europe and North Africa), and Eastasia (China and surrounding Asian nations, down to India and the Pacific Islands).
- Staged Populist Uprising: The "resistance's" book claims that all revolutions are just the middle class using the lower class as a tool to supplant the upper class. IngSoc is designed to prevent this with the meritocratic Inner Party selection process and intense surveillance of the Outer and Inner Parties.
- Stockholm Syndrome: The Party imposes this on its members, including Winston, in the end.
- Strange Syntax Speaker: Newspeak, though it isn't used often in the novel.
- Strawman Political: The entire point of the book. Big Brother is the Strawman Totalitarian. He's also a Strawman Communist or a Strawman Fascist depending on what aspects of IngSoc you focus more on.
- There's a sort of Lampshade Hanging on this when O'Brien explains that, unlike previous totalitarian regimes in history, the Party is knowingly out for power for itself without any delusions of Utopia Justifies the Means.
- Super Fun Happy Thing of Doom: Played very un-comedically with the Ministries. The Ministry of Plenty's business is to maintain shortages; the Ministry of Truth concerns itself with censorship and propaganda; the Ministry of Peace maintains perpetual war; and the Ministry of Love is... housed in a windowless building with swaths of barbed wire all around it and is a secret prison with torture chambers.
- To the Pain: O'Brien's explanation in the Ministry of Love of exactly what is going to happen to Winston is pretty discomfiting.
- Torture Technician: O'Brien.
- The Treachery of Images
- Truth in Television: The Democratic People's Republic of Korea seems to have taken many, many cues from Orwell. In a bad way. Christopher Hitchens, after his visit to North Korea, described it by saying "it was as if someone had taken 1984 and said 'Can you make it as much like this as possible?'"
- Even going so far as to build a giant pyramid building. And by law, North Korean libraries may not stock books older than fifteen years - the books must be re-edited and reprinted. Wonder where they got that idea...
- During the Stalinist era in the USSR, children had to paste new pages into their history books as the official view changed. If any classmates were taken away and "vaporized", the kids had to scratch out their faces in all the yearbooks.
- Big Brother is Stalin. Never say to a survivor of Stalin's regime, or even someone who had lived in the USSR when it was still Communist, that 1984 is an exaggeration of those times; children much like Winston's next door neighbors existed in droves, enjoyable sex was discouraged, and most importantly, thoughtcrime in its purest form existed — it just wasn't called thoughtcrime.
- The most terrifying part of all of this is that it is all plausible. There are no far-fetched sci-fi elements in it, and they had 30ish years in the book-- long enough to raise a generation who've never known anything else. Orwell lifted most of Big Brother's tactics from Stalin and Hitler and provided a reason (war) for otherwise rational men and women to accept the same tactics from their own government. Though this also provides some hope, as North Koreans flee to China all the time, and when the Soviet Union collapsed people lined up to leave, and they were a generation that knew nothing else.
- Twenty Minutes Into the Future: Although apparently this was a case of Executive Meddling, Supposedly Orwell wanted to set the book in 1948, but was told he couldn't, so he just switched the last two digits around to arrive at the new date/title. The fact that Winston himself isn't sure what year it is is remarked on several times.
- Two Plus Torture Makes Five: Though George Orwell used it before in essays, this is the book it's most remembered from.
- Unnamed Parent: Winston's mother.
- Unperson: Trope Codifier; Josef Stalin used the term long before this book was written.
- Unreliable Narrator: Do Eurasia and Eastasia actually exist, or are they made up by the Party, which actually controls the whole world? Alternatively, does Oceania even exist, and does the Party actually control less than it says does? The whole point is that the information given out by the Party is unreliable, and seeing how the only information the reader receives comes from the Party, nobody knows for sure any details about "the world" of 1984. The Party may not control any territory outside the British Isles. It may not even control the whole of the UK. Seeing as Winston never leaves London, we'll never know.
- The Un-Reveal: Whether or not a resistance movement actually exists is left completely ambiguous.
- Utopia Justifies the Means: Inverted. Winston believes that despite the horrible atrocities the Party has done, its mission is this, but what the Party actually wants is only power.
- We Will Use Wiki Words in the Future: One of the main purposes of Newspeak; condensing words makes it easier to utter them automatically without much thought, and to make communicating against the party impossible.
- Being an Anglophile, this was one of Orwell's biggest fears.
- Wham! Line: "It's behind the picture." It Makes Sense in Context.
- "I love you."
- "They got me a long time ago."
- "You are the dead."
- "Do it to Julia!"
- "You do not exist."
- The book ends with a rather chilling one: "He loved Big Brother."
- Why Did It Have to Be Snakes?: Winston is terrified of rats which is used against him in the most horrible way possible in Room 101.
- Wicked Cultured: O'Brien.
- Wide-Eyed Idealist: Poor Winston. Apparently even falling in love is considered wide-eyed idealism in and on itself.
- Wine Is Classy: Not only do the members of the Inner Party (the political elite of the totalitarian state) get assigned much better dwellings, clothes, food, coffee, chocolate and tobacco than the members of the Outer Party (i.e. the mere White Collar Workers), but also while the members of the Outer Party drink gin (and the blue-collar proles drink beer!), the members of the Inner Party drink... wine, what else?
- With Us or Against Us: Why "War is Peace" literally works.
- Working Class People Are Morons: The proles are completely useless and indeed, according to Goldstein's book, the poor lower classes always have been.
- Despite his left-wing views, Orwell was often criticised for his negative views of the English working-class, in particular the idea that they would just naturally degrade into ignorance and filth. Chalk it up to that Eton College education...
- The fact that Winston sees them as the best hope for the future says something.
- Wrench Wench: Julia, who is a mechanic that works on the automatic writing machines that churn out prolefeed.
- Wretched Hive: The prole neighbourhoods, in sharp contrast to the mechanistically controlled Party neighbourhoods.
- Xanatos Gambit: Goldstein's Brotherhood seems to be set up by the Party itself in order to identify possible dissidents; either people reject Goldstein and are loyal Party members, or they try to join Goldstein, alerting the Party to their treason. This also has precedent in real life, as the Cheka, forerunner of the KGB, did the same thing in the '20s when the party was cementing its power over everyday life.
- You Are Worth Hell: This is Winston's attitude about Julia until it's brutally subverted by what happens to him in Room 101.
- You Cannot Kill an Idea: Subverted. The Party can and does.
- You Keep Using That Word: Orwell preferred to use precise language when talking politics and didn't really like the (over)use of metaphors because they lost all their meaning and became just another way that thought was restricted. It's doubtful that he'd like the way his name gets thrown around by people today.
- See also: Politics and the English Language.
- For any proposed change in government policy, the opposing side will call it "Big Brother" or Orwellian, especially if it has anything to do with collecting information or regulating industry. An explanation is unlikely, a citation of the book even less so.
- Zeerust: Inter-office communication is sent on paper in glass tubes (no computers).
- The Ministry of Truth uses 'novel-writing machines' to keep churning out low-grade literature to keep the proles busy. You can tell who works in the Fiction Department by the oil-stains on their overalls.
- This makes sense in the context of the story though: the Party doesn't encourage the development of labour-saving technology (except for surveillance/law-enforcement purposes and some plans for new weapons of war which really aren't likely to produce anything) because half their time is spent intentionally trying to burn resources to make the war seem more real.
- Also a case of Truth in Television. Pneumatic Tube Transport (the system described in the novel) was used in many offices from the early twentieth century right up to the late nineties. It's still used in many banks and supermarkets to transport cash. E-mail has supplanted it completely for the transfer of documents, though.
- When Julia and Winston meet in the woods, they know that they're safe from listening devices because the trees are too small to hide a microphone. By the actual year 1984, microphones were sufficiently miniaturized that they could be hidden even in small trees.
We shall meet again in the place where there is no darkness. | https://tropedia.fandom.com/wiki/Nineteen_Eighty-Four_(Literature) |
Roger Martin on validity vs. reliability in business strategy, Institute of Design Strategy Conference, May 2007
A Canadian from Wallenstein, Ontario, Roger Martin was formerly a Director of Monitor Company, a global strategy consulting firm based in Cambridge, Massachusetts. During his 13 years with Monitor Company, he founded and Chaired Monitor University, the firm’s educational arm, served as co-head of the firm for two years, and founded the Canadian office. His research interests lie in the areas of global competitiveness, integrative thinking, business design and corporate citizenship.
The IIT Institute of Design Strategy Conference is an international executive forum addressing how businesses can use design to explore emerging opportunities, solve complex problems, and achieve lasting strategic advantage.
Global businesses increasingly appreciate how design and design thinking can provide them with high-level, strategic value and competitive advantage. In an intensely competitive market, with ever more diverse and demanding customers, executives are often left unsure of exactly what products, communications and services to create for what segments of the market. Design, with its ability to understand users, redefine problems and create systemic, human-centered solutions, can help companies better understand their customer’s daily lives, and lead directly to valuable (and valued) offerings that are effectively tailored to their market. | http://www.pablolinzoain.com/roger-martin-on-validity-vs-reliability-in-business-strategy-institute-of-design-strategy-conference-may-2007/ |
Job Description:
Responsible for preparation and execution of QA Testing & Test Automation implementation for projects.
Projects would include Approved Strategic and Tactical Projects. Partner with Technology and Business to ensure overall quality control / risk management.
Partner with Program Management teams to craft comprehensive set of Use Cases and Test Cases as well as the full contingent of requirement project documentation during the life cycle of a project.
The candidate would also be responsible for implementing the test automation for the project and execute automated cases as needed as part of our DevOps/Agile Testing Model as a SDET.
Candidate should also have experience in being part of a Project with CI/CD implemented. Work with other Test Analysts to plan and execute testing tasks
Review requirement specifications, identify gaps, determine testability and testing implications
Identify and create test scenarios, design and develop test scripts in Teamwork Prepare test plan and test scripts to test each software component and requirement. Participate in the test case Peer Review process
Setup test conditions prior to script execution.
Execute test scripts and document the results in Teamwork/Jira.
Log defects in defect tracking system and follow entered defects through lifecycle of creation to resolution.
Identify and automate the right set of cases to build the regression test for the project partnering with the horizontal automation team. Execute automation as needed during the test cycle.
Work closely with business analysts, business subject matter experts and development teams to clarify and resolve testing issues
Replicate issues and provide defect triage support
Participate in test status meetings & able to publish the concise report to test Manager/Senior Stakeholders.
Perform tasks under minimal supervision, Other testing/validation support as determined.
Skills:
The candidate should hands-on on Test Automation tools & framework designing, development and enhancement.
Can manage multiple projects & team members simultaneously
Should have hands-on experience & expertise on Selenium, JMeter, LeanFT, BDD, Cucumber, Cypress.
Experienced in BDD, TDD, DevOps, CI/CD enablement
Good hold on SQL / NoSql
Flexible to work on multiple technologies and languages
Excellent Communication and Stakeholder management skills
Experience in Functional, Performance, Regression and Integration testing of API services.
Strong structured testing knowledge and thorough understanding of quality assurance testing applications and concepts.
Proactively takes initiative and demonstrates a high level of accountability & proactiveness.
Excellent written and verbal communication skills.
Experience within an Agile/Scrum/ Kanban environment. | https://career.tier5.in/QALead.html |
Responsibilities:
• Services existing accounts and establishes new accounts by planning and organizing daily work schedule to call on existing or potential clients
• Submits orders by referring to price lists and product literature.
• Keeps management informed by submitting activity and results reports, such as daily call reports, weekly work plans, and monthly and annual territory analyses.
• Monitors competition by gathering current marketplace information on pricing, products, new products, delivery schedules, merchandising techniques, etc.
• Maintains professional and technical knowledge by attending educational workshops; reviewing professional publications; establishing personal networks; participating in professional societies.
• Contributes to team effort by accomplishing related results as needed.
• Provides technical, clinical and programming assistance, primarily in support of 1-2 Territory Managers.
• Integrates into all accounts; builds trust and relationships; establishes strong rapport with customers.
• With gained product knowledge, becomes proficient in programming and case support.
• Works seamlessly with Territory Managers(s) allowing them increased selling time.
• Will foster high trust relationships with customers, including the regional team members.
• Develop and maintain knowledge of assigned accounts and customers to include competitor activity.
• Provides feedback to providers both within operating room setting and outside operating room setting on the directions for on label usage specific to the company
Requirements
• Min of Diploma or Degree in any field
• No experience needed, full training provided
• Candidates with a strong track record with government sectors will have an added advantage
• Candidates with a great team spirit, persistency, good communication and interpersonal skills are welcome to apply
• Candidates do not need to have a personal transport
If you are interested in the position, do kindly drop your most updated resume to [Click Here to Email Your Resume] (Attn: Biz Development, HC Sales rep - Leon)
Thank You. | https://jobscentral.com.sg/job/business-development-consultant-healthcare-sales-rep-territory-mgr-j3p6bm6zg2tvqvj92ts |
Sample solution is provided at 25 µL, 10mM.
GlpBio Products Cited In Reputable Papers
Product Documents
Quality Control & SDS
- View current batch:
-
Purity: >98.00%
- COA (Certificate Of Analysis)
- SDS (Safety Data Sheet)
- Datasheet
Background
Anti-Inflammatory Peptide 1 (C45H82N12O14S2), with the sequence H-Met-Gln-Met-Lys-Lys-Val-Leu-Asp-Ser-OH, belongs to the group of synthetic oligopeptides corresponding to a region of high amino-acid sequence similarity between uteroglobin and lipocortin I. The name 'antiflammins' is proposed for those peptides, which are valuable models for the development of novel anti-inflammatory agents of therapeutic importance. Anti-inflammatory peptide 1 possesses a potent anti-inflammatory activity in vivo and is a strong inhibitor of phospholipase A2 (PLA2), whose increased presence and activity results in inflammation and pain at certain bodily sites.
References:
1. Argiolas A, Pisano JJ (November 1983). "Facilitation of phospholipase A2 activity by mastoparans, a new class of mast cell degranulating peptides from wasp venom". J. Biol. Chem. 258 (22): 13697–702.
Chemical Properties
|Cas No.||118850-71-8||SDF|
|Synonyms||H2N-Met-Gln-Met-Lys-Lys-Val-Leu-Asp-Ser-OH|
|Chemical Name||Anti-Inflammatory Peptide 1|
|Canonical SMILES||CC(C)CC(C(=O)NC(CC(=O)O)C(=O)NC(CO)C(=O)O)NC(=O)C(C(C)C)NC(=O)C(CCCCN)NC(=O)C(CCCCN)NC(=O)C(CCSC)NC(=O)C(CCC(=O)N)NC(=O)C(CCSC)N|
|Formula||C45H82N12O14S2||M.Wt||1079.33|
|Solubility||≥ 107.9mg/mL in DMSO||Storage||Store at -20°C|
|General tips||For obtaining a higher solubility , please warm the tube at 37 ℃ and shake it in the ultrasonic bath for a while.Stock solution can be stored below -20℃ for several months.|
|Shipping Condition||Evaluation sample solution : ship with blue ice
|
All other available size: ship with RT , or blue ice upon request
In vivo Formulation Calculator (Clear solution)
Step 1: Enter information below (Recommended: An additional animal making an allowance for loss during the experiment)
Step 2: Enter the in vivo formulation (This is only the calculator, not formulation. Please contact us first if there is no in vivo formulation at the solubility Section.)
Calculation results:
Working concentration: mg/ml;
Method for preparing DMSO master liquid: mg drug pre-dissolved in μL DMSO ( Master liquid concentration mg/mL, Please contact us first if the concentration exceeds the DMSO solubility of the batch of drug. )
Method for preparing in vivo formulation: Take μL DMSO master liquid, next addμL PEG300, mix and clarify, next addμL Tween 80, mix and clarify, next add μL ddH2O, mix and clarify.
Method for preparing in vivo formulation: Take μL DMSO master liquid, next add μL Corn oil, mix and clarify.
Note: 1. Please make sure the liquid is clear before adding the next solvent.
2. Be sure to add the solvent(s) in order. You must ensure that the solution obtained, in the previous addition, is a clear solution before proceeding to add the next solvent. Physical methods such as vortex, ultrasound or hot water bath can be used to aid dissolving.
3. All of the above co-solvents are available for purchase on the GlpBio website.
Molarity Calculator
Dilution Calculator
Related Products
Reviews
Average Rating: 5(Based on Reviews and 7 reference(s) in Google Scholar.)
GLPBIO products are for RESEARCH USE ONLY. Please make sure your review or question is research based. | https://www.glpbio.com/anti-inflammatory-peptide-1.html |
Ubuntu Security Notice 598-1 - It was discovered that the CUPS administration interface contained a heap- based overflow flaw. A local attacker, and a remote attacker if printer sharing is enabled, could send a malicious request and possibly execute arbitrary code as the non-root user in Ubuntu 6.06 LTS, 6.10, and 7.04. In Ubuntu 7.10, attackers would be isolated by the AppArmor CUPS profile. It was discovered that the hpgl filter in CUPS did not properly validate its input when parsing parameters. If a crafted HP-GL/2 file were printed, an attacker could possibly execute arbitrary code as the non-root user in Ubuntu 6.06 LTS, 6.10, and 7.04. In Ubuntu 7.10, attackers would be isolated by the AppArmor CUPS profile. It was discovered that CUPS had a flaw in its managing of remote shared printers via IPP. A remote attacker could send a crafted UDP packet and cause a denial of service or possibly execute arbitrary code as the non-root user in Ubuntu 6.06 LTS, 6.10, and 7.04. In Ubuntu 7.10, attackers would be isolated by the AppArmor CUPS profile. It was discovered that CUPS did not properly perform bounds checking in its GIF decoding routines. If a crafted GIF file were printed, an attacker could possibly execute arbitrary code as the non-root user in Ubuntu 6.06 LTS, 6.10, and 7.04. In Ubuntu 7.10, attackers would be isolated by the AppArmor CUPS profile.
Ubuntu Security Notice 588-2 - USN-588-1 fixed vulnerabilities in MySQL. In fixing CVE-2007-2692 for Ubuntu 6.06, additional improvements were made to make privilege checks more restrictive. As a result, an upstream bug was exposed which could cause operations on tables or views in a different database to fail. This update fixes the problem.
Gentoo Linux Security Advisory GLSA 200804-02 - The Oulu University discovered that bzip2 does not properly check offsets provided by the bzip2 file, leading to a buffer overread. Versions less than 1.0.5 are affected.
Mandriva Linux Security Advisory - A heap-based buffer overflow in CUPS 1.2.x and later was discovered by regenrecht of VeriSign iDenfense that could allow a remote attacker to execute arbitrary code via a crafted CGI search expression. A validation error in the Hp-GL/2 filter was also discovered. Finally, a vulnerability in how CUPS handled GIF files was found by Tomas Hoger of Red Hat, similar to previous issues corrected in PHP, gd, tk, netpbm, and SDL_image.
SiLK (System for Internet-Level Knowledge) consists of two sets of tools: a packing system and an analysis suite. The packing system receives Netflow V5 PDUs and converts them into a more space efficient format, recording the packed records into service-specific binary flat files. The analysis suite consists of tools that can read these flat files and then perform various query operations, ranging from per-record filtering to statistical analysis of groups of records. The analysis tools interoperate using pipes, allowing a user to develop a relatively sophisticated query from a simple beginning.
PHP Block version a8.4 suffers from a remote file inclusion vulnerability.
DaZPHP version 0.1 suffers from a local file inclusion vulnerability.
The Joomla OnlineFlashQuiz component versions 1.0.2 and below suffer from a remote file inclusion vulnerability.
LANDesk Management Suite versions 8.80.1.1 and below suffer from a directory traversal vulnerability.
httpry is a specialized packet sniffer designed for displaying and logging HTTP traffic. It is not intended to perform analysis itself, but instead to capture, parse, and log the traffic for later analysis. It can be run in real-time displaying the live traffic on the wire, or as a daemon process that logs to an output file. It is written to be as lightweight and flexible as possible, so that it can be easily adaptable to different applications. It does not display the raw HTTP data transferred, but instead focuses on parsing and displaying the request/response line along with associated header fields.
The Joomla actualite component version 1.0 suffers from a SQL injection vulnerability.
Apache-SSL versions prior to apache_1.3.41+ssl_1.59 suffer from a memory disclosure vulnerability that may allow for privilege escalation.
Noticeware Email Server version 4.6.1.0 remote denial of service exploit.
Writer's Block suffers from multiple SQL injection vulnerabilities.
ChilkatHttp ActiveX version 2.3 arbitrary file overwrite exploit.
HP Security Bulletin - Potential security vulnerabilities have been identified in PostgreSQL versions 8.2.4 and earlier running on HP Internet Express for Tru64 UNIX. The vulnerabilities could be exploited to execute arbitrary code, elevation of privilege, or cause a Denial of Service (DoS).
HP Security Bulletin - Potential security vulnerabilities have been identified with HP Select Identity software. The vulnerabilities could be exploited by an authenticated user to gain unauthorized access to other user accounts.
The RunCMS module bamagalerie3 suffers from a remote SQL injection vulnerability.
Nuked-Klan versions 1.7.6 and below exploit that allows for remote upload, remote code execution, and administrative hash retrieval.
HP OpenView NNM version 7.5.1 pre-authentication SEH overflow exploit that takes advantage of OVAS.EXE and spawns a shell on port 4444.
nipper is a Network Infrastructure Configuration Parser. nipper takes a network infrastructure device configuration, processes the file and details security-related issues with the configuration together with detailed recommendations. nipper was previous known as CiscoParse. nipper currently supports Cisco switches (IOS), Cisco Routers (IOS), Cisco Firewalls (PIX/ASA/FWSM) and Juniper NetScreen (ScreenOS). Output is in HTML, Latex, XML and Text. Encrypted passwords can be output to a John-the-Ripper file for strength testing. This is the Windows version.
Changes: This release includes updates to the report output from Nipper, some minor PQR issues and resolves issues reported by the community.
nipper is a Network Infrastructure Configuration Parser. nipper takes a network infrastructure device configuration, processes the file and details security-related issues with the configuration together with detailed recommendations. nipper was previous known as CiscoParse. nipper currently supports Cisco switches (IOS), Cisco Routers (IOS), Cisco Firewalls (PIX/ASA/FWSM) and Juniper NetScreen (ScreenOS). Output is in HTML, Latex, XML and Text. Encrypted passwords can be output to a John-the-Ripper file for strength testing. This is the source version.
XnView version 1.92.1 Slideshow "FontName" buffer overflow exploit.
Novell eDirectory HTTP denial of service exploit.
McAfee EPO version 4.0 remote denial of service exploit that takes advantage of FrameworkService.exe. | https://packetstormsecurity.com/files/date/2008-04-03/ |
Camp Lejeune, NC, is adding a new class to its roster: learning to launch, pilot and recover Group 1 assets, which are aircraft that weigh less than 20 pounds, typically fly below 1,200 feet and have missions that last from 45 minutes to 2 hours. They include RQ-11B Raven, Wasp, RQ-20A Puma and RQ-16B T-Hawk. The new program will be recruiting directly from the Wounded Warrior Project to staff the support activity, giving former service men and women an opportunity to continue their service in a new capacity. Program manager Col. Jim Rector adds, “Consistent training and sustainment support are key components for any weapon system and are integral to the warfighter’s mission success. After years of operational contingency funding and rapid fielding of numerous small UAS, we identified this as an area that we needed to rapidly improve.”
Rector said small UAVs provide the battlefield commander an organic capability, within his or her unit, to perform over-the-horizon reconnaissance, surveillance and target acquisition. This reduces operational risks and enhances his or her decision process.
There are plans to establish an additional class at Camp Pendelton, CA, later this year. | https://www.modelairplanenews.com/marines-add-an-rc-class-to-camp-lejeune/ |
1 Place 200gm peanuts into TM bowl and mix 15 seconds/speed 6.
2 Add 50gm of peanuts closed lid position/turbo 4-6 times to chop nuts to desired size (less processing will produce crunchier peanut spread).
3 Add butter. Mix 10 seconds/speed 1.
4 Scrape down sides and continue to mix for another 5 seconds/speed 1.
5 Place in sterilised jars and store in cool dry place. Coconut flavour will develop over 24-48 hours.
Accessories you need
Tip
Refrigerate for best consistency and longevity.
This recipe was provided to you by a Thermomix ® customer and has not been tested by Vorwerk Thermomix ® or Thermomix ® in Australia and New Zealand.
Vorwerk Thermomix ® and Thermomix ® in Australia and New Zealand assume no liability, particularly in terms of ingredient quantities used and success of the recipes.
Please observe the safety instructions in the Thermomix ® instruction manual at all times. | https://www.recipecommunity.com.au/sauces-dips-spreads-recipes/crunchy-peanut-coconut-spread/apdarf8z-99291-460832-cfcd2-kz7w0xf3 |
DRAWING
Customize icons
Icons, of all depths, are dumb simple. They are just a raw dump of pixel data. So an icl8, a 32x32x8 icon, has the simple format of 32 bytes per row times 32 rows equals 1024 bytes. And an icl4 has 16 bytes per row (4 bits per pixel) times 32 rows equals 512 bytes. (The system clut is assumed for both.)
What you need to do is get the GWorld's pixmap (FN GETGWORLDPIXMAP, natch) then lock its pixels (with FN LOCKPIXELS) then look up the address of the pixmap data (FN GETPIXBASEADDR).
Now copy (using BLOCKMOVE or whatever) the data from the pixmap into the handle you will use as your icon resource.
An ICN# resource is a little trickier. One black and white icon is 4 bytes times 32 rows, which equals 128 bytes. But an ICN# has TWO such icons. So the entire ICN# resource is 256 bytes long. The first icon is the icon itself. The second icon is a mask: black mask pixels mean "opaque", and white mask pixels mean "transparent". But you can still use BLOCKMOVEDATA to copy the data into the ICN# resource. Think of it as one single 32 by 64 pixmap.
| |
To consider the report of the Director (RB) (reference 18/200) attached
Minutes:
The Cabinet considered a report by the Director (RB) (Reference 18/200) in respect of proposed mitigation work at four critical junctions in Scarborough. Members were advised that the Business Case to be submitted to the Local Enterprise Partnership provided a solution to anticipated levels of housing and economic growth, as identified in the Local Plan that without intervention would lead to capacity issues in relation to the four junctions in the report. The risks of not approving the Business Case concerned the increased congestion at the junctions which could lead to the Highway Authority objecting to planning applications which, in turn, could jeopardise the delivery of the Local Plan and Yorkshire Coast Growth Plan. The risks of approval concerned cost over-runs which would be mitigated through the proposed service level agreement between the Borough and County Councils. Councillor Cockerill queried why the Borough Council should contribute £150k to the scheme which was clearly the responsibility of the Highway Authority. In reply, Mr Bradley acknowledged this and the funding challenges faced by both local authorities, but reiterated that without the recommended financial contribution which would lever in £3.5m from the Local Enterprise Partnership and £150k from the County Council, then the delivery of the Local Plan and Yorkshire Coast Growth Plan could be put at risk.
RESOLVED that the Cabinet:
1. Approves that the joint Business Case for mitigation work at the four identified critical junctions as prepared between Scarborough Borough Council and North Yorkshire County Council (NYCC) is submitted to the Local Enterprise Partnership for consideration;
2. Subject to (ii) below and the bid to the Local Enterprise Partnership being successful, delegates authority to the Director (RB) to accept the grant funding for the scheme and enter into a funding agreement with the Local Enterprise Partnership and NYCC; and
3. Approves that the Council enters into a Service Level Agreement with NYCC so that the project is undertaken by NYCC (and its contractors) with measures to deal with construction cost over-run as set out in this report.
And recommends that the Council:
Reasons
Planning decisions, both in terms of applications and allocations within the newly adopted Local Plan mean that Scarborough is likely to experience significant levels of growth in housing and the economy. To further facilitate this there is an opportunity to generate external funding (via the Local Economic Partnership) to deliver targeted infrastructure improvements to mitigate potential capacity issues on 4 no. junctions that are located in central Scarborough. Without mitigation either:
1. the capacity of the identified junctions will be surpassed and the experience of the road user will be adversely affected with higher levels of queueing and congestion. There could be a subsequent knock on to local business and their continued viability to remain in the town and a negative impact on encouraging inwards investment; or
2. objections to planning proposals will be received from the Local Highway Authority which could prevent/delay further development of housing and other forms of development from proceeding on highways capacity grounds, putting pressure of the Highway Authority to bring forward and fund improvements itself.
Supporting documents: | https://democracy.scarborough.gov.uk/mgAi.aspx?ID=44001 |
We believe by focusing on a special list of moral virtues we can help students grow in empathy, self-awareness, and kindness. During each month of the school year, our classrooms dive into discussion and practice of a particular “moral focus.” These nine virtues include:
- Wisdom
- Respect
- Gratitude
- Self-Control
- Perseverance
- Courage
- Encouragement
- Compassion
- Integrity
Experience greater peace of mind. Untrustworthy people who do shady things hurt others and self-sabotage. They create negative consequences for themselves – which leads to fear and anxiety. But children who learn morality at a young age typically grow up to be people of integrity. When we know who we are and what we stand for, we live more confidently and above board.
Make better choices. The greater our self-confidence and empathy, the better our chances for making well-rounded, informed, and wise decisions. Students who grow up with a strong ethical foundation and self-esteem are less likely to get tangled up with negative influences or peer pressure.
Find purpose. Moral focus virtues ultimately help us to think about how our actions impact other people, and to consider our lives as part of a larger picture. Focusing on others helps us grow more caring and considerate – and can help us notice the deeper things in life. | https://www.nhaschools.com/schools/Phoenix-Academy/en/Blog/Deeper-dive-into-moral-focus |
According to Statistics Canada consumer price index, prices in 1969 are 0.99% lower than average prices since 1970. The Canadian dollar experienced an average inflation rate of 1.00% per year during this period, causing the real value of a dollar to decrease.
In other words, $1 in 1970 is equivalent in purchasing power to about $0.99 in 1969.
The 1969 inflation rate was 4.69%. The inflation rate in 1970 was 1.00%. The 1970 inflation rate is lower compared to the average inflation rate of 3.88% per year between 1970 and 2020.
|Average inflation rate||1.00%|
|Converted amount ($1 base)||$0.99|
|Price difference ($1 base)||$-0.01|
|CPI in 1970||20.300|
|CPI in 1969||20.100|
|Inflation in 1969||4.69%|
|Inflation in 1970||1.00%|
Our calculations use the following inflation rate formula to calculate the change in value between 1969 and 1970:
Then plug in historical CPI values. The Canadian CPI was 20.3 in the year 1970 and 20.1 in 1969:
$1 in 1970 has the same "purchasing power" or "buying power" as $0.99 in 1969.
To get the total inflation rate for the 1 years between 1969 and 1970, we use the following formula:
Plugging in the values to this equation, we get:
Politics and news often influence economic performance. Here's what was happening at the time:
Raw data for these calculations comes from the government of Canada's annual Consumer Price Index (CPI), established in 1914 and computed by Statistics Canada (StatCan).
You may use the following MLA citation for this page: “$1 in 1970 → 1969 | Canada Inflation Calculator.” Official Inflation Data, Alioth Finance, 26 May. 2020, https://www.officialdata.org/1970-CAD-in-1969?amount=1.
Special thanks to QuickChart for providing downloadable chart images.
in2013dollars.com is a reference website maintained by the Official Data Foundation. | https://www.in2013dollars.com/1970-CAD-in-1969?amount=1 |
Spring Exhibitions at the CVA Galleries
Please join the CVA Galleries for the opening recpetions for the following:
Dewy, Past, Present, Future, BFA Thesis Exhibition
Sherry Amoore, Affinity, BFA Thesis Exhibition
Reba Crawford Hayes, It Hurts, Until it Doesn’t, BFA Thesis Exhibition
Kendal Cermak, Art Through Learning, Capstone Exhibition
Madelyn Zarraonandia, Untitled, Solo Exhibition
Sierra Burt, Climate Change Contemplations, Capstone Exhibition
Opening Reception: Wednesday, April 11th, 2018, 5:00 p.m. – 8:00 p.m.
Exhibition Dates: April 6th – April 20th, 2018
Retzlaff Gallery (Art Building):
Past, Present, Future, Dewy, BFA Thesis Exhibition
This work represents my life experiences, past, present and future. I use paint, paper and tulle to express the history of my plans that have been steady and those that have gone array. Color helps to echo the feelings I have when looking at these time periods. My viewers can see their own feelings and patterns playing out with the texture in each painting and hopefully reminisce on their own lives.
Thorndike Gallery (Art Building):
Affinity, Sherry Amoore, BFA Thesis Exhibition
My photography reveals and celebrates the intrinsic beauty of human emotion in intimate moments. I focus on the authentic nature of affection and explore the raw and tender expressions of deep personal connections observed through the lens. My desire is to expose beyond words, the passion that drives the human spirit to unite. To me, black and white film eliminates the distraction of color and highlights the vulnerability of pure emotion that I try to memorialize within my images.
Meyer Memorial Gallery (Marion Ady Building):
It Hurts, Until it Doesn’t, Reba Crawford Hayes, BFA Thesis Exhibition
An exploration of grief, death and the relationship between mother, daughter and the places they shared.
Boise-Cascade Gallery (Marion Ady Building):
Art Through Learning, Kendal Cermak, Capstone Exhibition
I have always been interested in teaching students how to create art. Throughout the last few months I have been able to volunteer at a local high school and teach them a lesson about Georgia O’keeffe. I combined artworks from four different levels, and three different mediums, for the students work; and for my piece, I combined nine different mediums to create one image. Teaching gives me joy and I can’t wait to pursue my career.
Art Department Chairs Gallery (Marion Ady Building):
Untitled, Madelyn Zarraonandia, Solo Exhibition
In this series, I wanted to play with the line between what makes a landscape recognizable, and what makes it abstract. In doing so, I experimented with fluid shapes, recognizable yet unrealistic shapes, and dreamy colors. I expressed how I feel when looking at a pleasing landscape mainly through these colors and shapes to evoke different emotions such as calmness, playfulness, and liveliness.
JELD WEN Gallery (Marion Ady Building):
Climate Change Contemplation, Sierra Burt, Capstone Exhibition
In honor of Earth Day, this gallery is an environmental educational snapshot of climate changes’ implications on individuals, society, and the planet. Seen through the eyes of the SOU community – the diversity of feelings, opinions, and passions creates a beautiful and harsh recognition of the current state of our planet. In hopes of manifesting a call to action, this gallery will inspire viewers to start making positive, eco-friendly changes in their lives.
Attached photos: | http://www.ashlandgalleries.com/members/cva-galleries-at-sou/2018/03/spring-exhibitions-at-the-cva-galleries/ |
Mark Teeuwen and John Breen's A Social History of the Ise Shrines: Divine Capital is a survey-style history of the Ise Shrines that begins in the 7th century and stretches to the present day. Proposing their own periodization scheme, the authors break their narrative of premodern and early modern Ise into chapters, each covering two to three centuries of history. With the last three chapters of the book focused on the late-19th and 20th centuries, the modern period is covered in detail.
The work is a social history rather than an intellectual one. Teeuwen and Breen have focused on agents who shaped Ise’s development, including priests, patrons, pilgrims, and the state. The authors outline how authority over the Ise shrines changed hands many times over the course of their history, asking “when, how and why new groups of agents gained influence over the shrines, often reshaping conceptions of Ise and its meaning radically in the process” (8).
In taking this approach, Teeuwen and Breen are challenging assumptions held both inside and outside specialist circles regarding the Ise Shrines. The authors illustrate that Ise has never been static. They argue that Ise has not existed since time immemorial, instead being created in the 7th century, and then retroactively inserted into court chronicles detailing the history of previous periods. Furthermore, Ise was not always an imperial institution; it has changed hands multiple times, and has historically served different functions. For example, the shrine priests of Ise (Arakida and Watarai lineages) were not always the most influential agents shaping the course of the shrines. Court officials directed the shrines for much of the Heian period (794-1185), and though the Arakida and Watarai—through the patronage of Kantō warriors—regained control in the Kamakura period, they were soon overshadowed by entrepreneurs capitalizing on the pilgrimage boom of the Muromachi period (1336-1573). Teeuwen and Breen’s account of Ise emphasizes radical change, in contrast to the more common narratives that depict Ise as an unchanging bastion of Japanese religiosity.
Crucially, Teeuwen and Breen’s work is situated within a larger discourse regarding the identity of the tradition now referred to as “Shinto.” Following the work of Kuroda Toshio, many scholars of Japanese religion now reject the notion that Shinto existed continuously throughout the premodern period. However, there is less consensus regarding when and how Shinto came to be; there has been an effort in recent scholarship to define and set boundaries for premodern Shinto. Teeuwen and Breen’s survey is in many ways similar to Helen Hardacre’s recent work Shinto: A History (Oxford University Press, 2016), which also presents a survey history of kami worship in Japan from the ancient period to the present day. However, the two books define the beginning of Shinto in different ways. Whereas Hardacre cites the founding of the jingikan, or “Department of Divinities,” in the 7th century as the beginning of a lasting and coherent tradition deserving of the name “Shinto,” Teeuwen and Breen argue that the first meaningful reference to the term “Shinto” appears in 13th century esoteric transmissions of the Watarai priestly lineage at Ise. Furthermore, Teeuwen and Breen argue that “the naming of such transmissions as ‘Shinto’ did not mark the birth of a new religion, or the revival of an old one, but was an attempt to create a new label for this closed Ise lineage” (75). The Watarai lineage of esoteric transmission was broken in the 14th century, and the use of the term “Shinto” does not reappear until the mid-17th century. Ise priests of the early Edo period (1603-1868) crafted a novel concept of “Shinto,” in which the term “constituted a new ideal that had to be realized by restoring an age-old ‘national law’ that had been utterly lost” (133). Teeuwen and Breen argue that Ise does not become a site of Shinto until this moment in the mid-17th century. The lack of scholarly consensus regarding the identity and boundaries of premodern Shinto speaks to the complexity of the problem, and it remains an exciting and rapidly developing field of study.
Teeuwen and Breen present the history of Ise as strata—layered narratives that have been deployed at various points in history for various purposes. They explain that “Ise’s landscape has been constantly modified over the centuries to conform to new narratives, while the most obvious traces of older narratives have been erased or forgotten” (235). The agents in control of Ise today emphasize some of these narrative layers, such as Ise’s connections to national identity and personal religiosity, while obscuring others, including the medieval equation of the deity of Ise with the Buddha Mahāvairocana and Ise’s involvement with wartime ideology. Teeuwen and Breen present the narrative strata that make up Ise’s historical identity and recount a dynamic history in which the Ise shrines have been transformed many times over the centuries. The result of their thorough research is a fascinating and eye-opening book, an excellent resource for both researchers and teachers in the field of Japanese religions. | https://readingreligion.org/9781474272797/a-social-history-of-the-ise-shrines/ |
• Cost management is a key issue today and for the foreseeable future – The market is experiencing a severe liquidity crunch and the explosion of a global asset bubble well beyond sub-prime. At the root of this crisis is not only asset values, but the amount of capital ...view middle of the document...
Many do not understand the true profitability of those businesses today at the proper level of granularity (e.g., desk level, product, etc.). To make the right decisions regarding the business platform going forward, a fundamental understanding of where the institution does and doesn’t make money is now more important than ever. Of particular importance is the need to understand the interrelationships between different businesses, products and geographies and the overall impact of curtailing or exiting certain activities on the broader franchise. • Focusing on operational costs only will not be sufficient – Organizations have focused most previous cost cutting efforts largely on back office operating costs. Areas such as front office costs, the costs of risk management failures and funding costs will have to be considered in new ways to achieve a cost baseline that is acceptable in today’s markets. Operating costs will also have be re-examined as well, of course, and perhaps in different ways.
PricewaterhouseCoopers
4
Intelligent Cost Reduction
Point of view (continued)
• Many organizations confuse “cost postponement” with total cost management – Many financial institutions simply stop investing in new projects and people during difficult times in the market. Further, many simply reduce their support teams, etc., and hire them back when the markets bounce back. There is often a price to pay for these moves in terms of customer loyalty, heightened risk and future profitability. We consider many of these actions cost postponement as opposed to true cost reduction. We recommend that our clients measure the quality of their efforts through analyzing the types of reductions they are making and how they impact the platform and the company longer term. • A well organized end-to-end program is needed – Many organizations have a cost cutting “czar” or team, but lack an organizational-wide approach to the issue. This leads to sub-optimal execution, missed targets and worse. Avoiding these pitfalls requires an overall program structure with a clear executive mandate, defined targets, a management organization for the effort and strong engagement from each of the business units and support areas. • Consistent investment is required – Building a sustainable competitive cost platform requires consistent investment, even in times of financial stress. Given the markets today, managing the program in a way that creates investment funds through tactical, short-term savings to fund medium to longer term savings is critical. • The tone at the top is key – The overall objectives, targets and business decisions made at the executive management level are more important than ever to achieving sustainable improvement. • Create an executive dashboard to monitor results – Implementing an executive dashboard with key metrics and reporting will help management to view and gauge the overall effectiveness of their program over time. • This is a survival issue on... | https://www.avroarrow.org/essay/cost-reduction |
I have been a non-resident Indian (NRI) for the last 20 years. I own three houses in Pune. First, a self-acquired 20-year-old flat that was redeveloped four years ago and whose possession is due in a few months. Second, a self-acquired flat in which I currently live with my family. Third, an ancestral property that was recently transferred to me. I intend on selling the first two flats and the expected value is around ₹1.3 crore, of which long-term capital gains (LTCG) tax will be around ₹30 lakh after indexation. If I reinvest only LTCG for buying a new house (maybe around ₹60 lakh in value), will my remaining principal amount become tax-free? I can alternatively pay LTCG tax on the entire gains and invest in a new business venture.
—Anil
Capital gains from the sale of a house property may be claimed as exempt from tax when they are invested for the purchase or construction of another house property. This exemption has been laid down under Section 54 of the Income-tax Act. The benefits of this section are also available to NRIs. To be able to claim this exemption, you are required to invest your capital gains. If the entire capital gains earned are not invested, the balance uninvested capital gains shall be taxable at 20% after allowing for indexation of the cost of acquisition. Therefore, there is no restriction on how much you can invest. Also, there is no requirement to invest the entire sales proceeds under this section. But do note that any capital gains that remain uninvested shall be taxed at 20% after allowing for indexation.
Section 54 requires that a property may be purchased one year before or two years after or constructed within three years from the date of sale. The new property must be situated in India. Exemption under Section 54 is available on the sale of one or more houses, where the capital gains are invested to purchase one house property within the time limits and other conditions laid down under Section 54.
There have been several cases before the income tax authorities where the taxpayer has been allowed to claim exemption on capital gains on the sale of two properties when they are reinvested to purchase a single house property. You are required to hold the new property for a period of three years; if sold before three years, the entire capital gains shall be taxed in the year of sale.
In case you do not plan to purchase another house property, you may choose to do any of the following. Invest the capital gains in capital gains exemption bonds as per Section 54EC of the Act. The maximum amount allowed to be invested is ₹50 lakh in a financial year. These bonds have a lock-in period of five years.
If you want to invest your capital gains in a new business, you may be eligible to claim exemption as per Section 54GB of the Act. This section allows you to claim exemption on the capital gains from the sale of a house property when it’s reinvested in equity shares of an eligible new company, which then purchases a specified asset, provided all the conditions laid down under Section 54GB are met. | |
---
abstract: 'GENIUS is a proposal for a large scale detector of rare events like double beta decay, cold dark matter and low-energy solar neutrinos in real time. The idea of GENIUS is to operate a large amount of “naked” Ge detectors in liquid nitrogen, with the aim of reducing the background down to a level of 10$^{-3}$ counts/kg keV y. In this work we investigate the contribution to the background of GENIUS coming from argon ($^{39}$[Ar]{}) and krypton ($^{85}$Kr) contamination in the liquid nitrogen.'
address: 'Max-Planck-Institut für Kernphysik, Postfach 103980, Heidelberg 69029, Germany'
author:
- 'H.V. Klapdor Kleingrothaus'
- 'and C.Tomei'
title: '$^{85}$Kr and $^{39}$[Ar]{} background in GENIUS'
---
Dark matter ,Solar neutrinos ,Low-background experiments ,High-purity Ge detectors
07.05.Fb ,95.35.d ,95.55.Vj ,23.40.s ,14.60.Pq ,23.40.Bw ,14.80.Ly
Introduction {#intro}
============
GENIUS(GErmanium in liquid Nitrogen Underground Setup) [@ringb; @prop_genius] is a proposal for a large scale detector of rare events like double beta decay, cold dark matter and low-energy solar neutrinos in real time. The idea of GENIUS is to operate a large amount of “naked” Ge detectors in liquid nitrogen, which has been shown to work already in [@ringb].\
The proposed scale of the GENIUS experiment is a nitrogen tank of about 12m diameter and 12m height with 100kg of natural Ge or 100kg of enriched $^{76}$Ge, in the dark matter and double beta decay versions, respectively, suspended in its center. With this configuration, which removes most of the material in the vicinity of the detectors, the background can be strongly reduced with respect to conventionally operated detectors. Moreover, the liquid nitrogen acts at the same time as cooling medium and as a shield against external radioactivity.\
It is clear that residual impurities in the liquid nitrogen, like $^{238}$U and $^{232}$Th contaminations, $^{222}$Rn, $^{40}$K and $^{60}$Co, can be a source of background for the GENIUS experiment and for this reason their contribution has to be deeply investigated. This has been done in [@ringb; @prop_genius; @nim_genius; @eur_genius], where we show, for example, that the contribution of the mentioned isotopes to the background of GENIUS, in the low-energy region, is of the order of $3 \cdot 10^{-4}$ counts/kg keV y for $^{222}$Rn and $4 \cdot 10^{-4}$ counts/kg keV y for the remaining isotopes. For these calculations, values of liquid nitrogen purity measured by the BOREXINO collaborations were used [@Borexino]. For the BOREXINO [@Borexino2] experiment the nitrogen purity is a very crucial point; they realized only recently [@HLLG] that they have to address the problem of argon and krypton background at low energies more seriously. This is true as well for the KAMLAND [@Kamland] experiment, as long as they aim to measure solar neutrinos, after the first successful reactor neutrino phase.\
This motivated us to study in detail the effect of argon and krypton on the GENIUS background. In this note we investigate the background contribution coming from the two long-lived isotopes $^{85}$Kr (T$_{1/2}$=10.76 y) and $^{39}$[Ar]{} (T$_{1/2}$=269 y) and we show that the potential of GENIUS to look for Dark Matter at low energies is not affected, while, for solar neutrinos, a reduction of a factor 10 of the krypton contamination with respect to best-quality commercially available nitrogen is needed (from which a factor 8 has already been achieved, see below).
$^{85}$Kr and $^{39}$[Ar]{} simulation {#simul}
======================================
The two isotopes $^{85}$Kr and $^{39}$[Ar]{} decay both via $\beta^-$ decay with end point energy of 565.0 keV and 687.1 keV respectively; in addition $^{85}$Kr emits four gammas, with energies and intensities listed in Table \[tab1\].\
Both the electrons coming from the $\beta$ decay and the photons from the $\gamma$-lines can be a source of background at low energies ($<$500 keV). Since the mean free path of the electrons is expected to be very small, only the electrons produced very close to the detectors[^1] can reach them. In the case of photons, even if produced far from the detectors, we expect them to be slowed down and to produce a diffuse background at low energies.\
We calculated the amount of this background by performing a simulation of the GENIUS setup with the GEANT4 simulation tool. The configuration of the detectors used for the simulation is shown in Fig. \[fig:simul\]: we assume 10 Ge detectors, each one with a radius of 6.7 cm and 13.4 cm height, arranged in two layers. The total mass is 100.534 kg and reproduces the mass of natural germanium foreseen for the application of GENIUS to Dark Matter search. The detectors are suspended in the middle of a cylindrical tank of 12 m diameter and 12 m height. According to the measurements performed by the Heidelberg group of the BOREXINO collaboration [@HLLG], the purest nitrogen available on the market has a contamination of 0.03 - 0.2 ppm for argon and about 10 ppt for krypton. In the following we will assume a contamination of 0.2 ppm (2.4 $\mu$Bq/m$^3$) from argon and about 10 ppt (10 $\mu$Bq/m$^3$) from krypton. These values refer to gaseous nitrogen and have to be multiplied by a factor 650 when considering liquid nitrogen.
Background from $^{39}$[Ar]{}
-----------------------------
As a first step we simulated the background coming from $^{39}$[Ar]{}. We started assuming that only a cylindrical region of 1 m diameter and 1 m height around the center of the tank is filled with liquid nitrogen, that means that each detector is surrounded by at least 35 cm of liquid nitrogen in each direction. The total number of simulated events is $2.5 \cdot 10^{8}$. In Fig. \[fig:argon\] we see the output of this first simulation for two of the detectors (the central one and one of the external ones of the upper layer), Fig. \[fig:argon\_sum\] (left) shows the sum spectrum of all 10 detectors.\
We can express the background in terms of the usual units (counts/kg keV y): the result is shown in Fig. \[fig:argon\_sum\] (right). Increasing the amount of liquid nitrogen around the detectors will not change the number of detected counts. This is because the electrons coming from $^{39}$Ar-decay have a very short range and so only those produced very close to the detectors can contribute to the background. To verify this, we performed another simulation, this time assuming that a cylindrical region of 2 m diameter and 2 m height around the center of the tank is filled with liquid nitrogen (a volume of liquid 8 times bigger than the previous case); the total number of simulated events was $5 \cdot 10^{8}$. As we see again from Fig. \[fig:argon\_sum\], the resulting background does not change.
Background from $^{85}$Kr
-------------------------
In the case of $^{85}$Kr, a contribution to the background will come both from electrons and from the 514 keV photons; photons can travel in liquid nitrogen much longer than electrons and they can reach the detectors even if produced far from them.\
We can have an idea of how far they can travel calculating the mean free path of photons, with the appropriate energy, in liquid nitrogen. The total mass attenuation coefficient in nitrogen for $\gamma$-rays with energy of 500 keV is [@Tsoulf]: $$\mu = 8.71 \cdot 10^{-2}\;\;{\rm{cm}}^2/{\rm{g}}.$$ Multiplying by the density of liquid nitrogen (0.808 g/cm$^3$) we obtain: $$\begin{aligned}
\mu &=& 7.04 \cdot 10^{-2}\;\;{\rm{cm}}^{-1} \\
\lambda &=& \mu^{-1} = 14.2\;\;{\rm{cm}} \nonumber\end{aligned}$$ where $\lambda$ is the mean free path of a 500 keV-photon in liquid nitrogen.\
From a previous simulation performed with a simpler geometry we obtained some results on the propagation of the photons coming from $^{85}$Kr. We considered only four detectors in a single layer, for a total mass of 13.4 kg, suspended in the middle of a cubic copper box, filled with liquid nitrogen. This simulation has been performed in five steps, the details of each step are described in Table \[tab:simul\]. The number of simulated events was increased at each step in order to have approximately the same statistics in all five cases. In Fig. \[fig3\] we compare the result of the five simulations (after converting each sum spectrum to the usual units): as we can see, increasing the dimensions of the copper box the number of decaying atoms increases and, consequently, we get a higher count rate in the detectors. This behaviour goes on until we reach a situation were, even adding more liquid nitrogen to the setup (and therefore more impurities) we do not see an increase in the detected backround: this is due to the fact that the photons coming from the decay of $^{85}$Kr atoms are absorbed by the liquid nitrogen itself. According to Fig. \[fig3\], 100 cm of liquid nitrogen are enough to absorb the photons coming from the rest of the liquid.\
We can use this information for a simulation with the more realistic geometry described before (see Fig. \[fig:simul\]). We simulated 1.5 $\cdot 10^{9}$ $^{85}$Kr decays in a cylindrical volume with a radius of 2 m and 2m height around the detectors, to be sure that they are surrounded by at least 150 cm of liquid nitrogen. We obtained the results shown in Fig. \[krypton\_norm\], which represents the total background expected in GENIUS from the decay of $^{85}$Kr.\
We started also another simulation in a smaller volume (1.5 m radius and 3 m height) and we show in the same Fig. \[krypton\_norm\] that the resulting background (red histogram) is the same, apart from statistical fluctuations.\
Finally, Fig. \[total\] shows the total background coming from the contribution of both krypton and argon in GENIUS. The results on the background indexes are summarized in Table \[tab:results\].\
The final goal of GENIUS is to obtain a level of background of the order of 10$^{-3}$ counts/kg keV y in the low-energy region. This low background is requested for real-time detection of solar pp neutrinos [@LowNu2]. Already with a background 10 times higher, GENIUS would obtain the planned results in the field of Dark Matter searches. It would be able to test the WIMP-parameter space down to cross sections of the order of 10$^{-9}$pb [@ringb; @HVKK].\
As shown in Table \[tab:results\], the argon contribution to the background will remain well under the level of 10$^{-3}$ counts/kg keV y, while the background coming from krypton is expected to be of the level of 10$^{-2}$ counts/kg keV y, which is still acceptable for Dark Matter detection. A further reduction of the krypton contamination by a factor of 10 will allow GENIUS to fulfill its background requirement also for solar neutrino detection: it must be noted that a krypton purification of a factor 8 has already been reached from the Heidelberg group of the Borexino Collaboration [@HLLG].\
The GENIUS experiment will also be equipped with a nitrogen recycling device (through condensation) [@prop_genius], in order to avoid accumulation of argon and krypton inside the liquid: this would happen if the evaporated liquid would be replaced by fresh nitrogen.
Background considerations for GENIUS-TF
=======================================
A test facility for the GENIUS experiment, GENIUS-TF [@GENIUS-TF], is under construction at the Gran Sasso National Laboratory, with at present six natural Ge detectors (about 15 kg) operated in a 50 cm $\times$ 50 cm $\times$ 50 cm liquid nitrogen container.\
The goal of GENIUS-TF is to reach a background of 2 - 4 counts/kg keV y in the low-energy region. The estimated contribution of argon and krypton contamination to the GENIUS-TF background at low energies, under the same assumptions as made for GENIUS, is less than 10$^{-2}$ counts/kg keV y . Even a contamination 100 times higher would not affect the background in a noticeable way.\
The problem of the accumulation of argon and krypton in the liquid nitrogen because of the periodic refilling procedure has been considered. Assuming that argon and krypton do not evaporate and that we fill the container when the liquid nitrogen is half of the total volume, we would have to refill 200 times in order to increase the contamination by a factor 100.
Conclusions
===========
In the GENIUS detector, a big amount of liquid nitrogen will be used both as cooling medium and shielding material and it will be in direct contact with the detectors [@ringb; @prop_genius]. For this reason the purity of the liquid nitrogen not only in terms of radon, but also of argon and krypton contamination, is a very crucial point. The same, and even much more seriously, will be true for the Borexino experiment, which foresees the use of gaseous nitrogen to purify the liquid scintillator, and for the KAMLAND experiment when coming to the solar neutrino detection. For the Borexino experiment, only a level of nitrogen contamination of 0.36 ppm for argon and 0.16 ppt is acceptable [@HLLG], while the best-quality nitrogen commercially available has typically 0.03 - 0.2 ppm of argon and about 10 ppt of krypton. A reduction on the krypton contamination by at least a factor 60 is then needed.\
In this work we have shown that the above mentioned commercially available purity of 0.03 - 0.2 ppm of argon and 10 ppt of krypton would allow the GENIUS experiment to look for Dark Matter at low energies ($<$ 100 keV), with a background of the order of 10$^{-2}$ counts/kg keV y, which corresponds to the planned sensitivity. A further reduction of a factor 10 (of which a factor of 8 has been already obtained, see [@HLLG]) will bring the background to the level of 10$^{-3}$ counts/kg keV y, which is the requirement of GENIUS for its use as a solar neutrino detector.
Acknowledgments {#acknowledgments .unnumbered}
===============
One of us (C.T.) thanks the Max Planck Institut für Kernphysik for the ospitality during her stay in Heidelberg and would like to thank Dr. G.Zuzel and B.Freudiger for useful discussions.
[00]{}
H.V. Klapdor–Kleingrothaus: In [*Proc. of Beyond the Desert 1997*]{}, ed. by H.V. Klapdor–Kleingrothaus, H. Päs, IOP Bristol (1998), pp. 485–531, H.V. Klapdor–Kleingrothaus, Int. Journ. Mod. Phys. A [**13**]{}, 3953 (1998), H.V. Klapdor-Kleingrothaus, M. Hirsch, Z. Phys. A [**359**]{}, 351 (1997), H.V. Klapdor-Kleingrothaus, J. Hellmig, M. Hirsch, J. Phys. G [**24**]{}, 438 (1998).
H.V. Klapdor-Kleingrothaus, L. Baudis, G. Heusser, B. Majorovits, H. Päs, [ ‘GENIUS: a Supersensitive Germanium Detector System for Rare Events’]{}, MPI-H-V26-1999, hep-ph/9910205 (1999) and in [*Proc. of Beyond the Desert 1999*]{}, ed. by H.V. Klapdor–Kleingrothaus and I. Krivosheina, IOP Bristol (2000), p. 915-1024.
L. Baudis, G. Heusser, B. Majorovits, Y. Ramachers, H. Strecker, H.V. Klapdor-Kleingrothaus, Nucl. Instr. Meth. A [**426**]{}, 425 (1999).
H.V. Klapdor-Kleingrothaus, L. Baudis, A. Dietz, G. Heusser, I. Krivosheina, B. Majorovits, H. Strecker, Nucl. Instr. Meth. A [**481**]{}, 149-159 (2002).
L. Baudis and H.V. Klapdor-Kleingrothaus, Eur. Phys. J. A [**5**]{}, 441-443 (1999).
R.B. Firestone and V.S. Shirley, [*Table of Isotopes*]{}, 8-th Edition, John Wiley and Sons Incorp., N.Y. (1998).
G. Zuzel et al. on behalf of the Borexino Collaboration, Talk given at the DPG spring conference on Particle Physics, Aachen (Germany), March 10-13, 2003.
Borexino Collaboration, C. Arpesella et al., Astropart.Phys. [**18**]{} (2002) 1-25.
Borexino Collaboration, G. Alimonti et al., Astropart.Phys. [**16**]{} (2002) 205-234.
KamLAND Collaboration, Phys.Rev.Lett. [**90**]{} (2003) 021802.
N. Tsoulfanidis, [*Measurement and Detection of Radiation*]{}, McGraw-Hill-Hemisphere Publications, New York (1983).
V.A. Bednyakov and H.V. Klapdor-Kleingrothaus, Phys.Rev D [**63**]{}, 095505.
H.V. Klapdor-Kleingrothaus, in [*Proc. of the International Workshop on Low Energy Solar Neutrinos (LowNu2)*]{}, December 4 and 5, 2000, Tokyo, Japan, ed by Y.Suzuki et al., World Scientific (2001) 116-131.
\[tab1\]
E (keV) I (%)
--------------- ----------------
129.820 (12) $<$0.00000043
151.159 (6) 0.0000022 (13)
362.81 (4) 0.0000022 (4)
514.0067 (19) 0.43
: Gammas from $^{85}$Kr (see Table of Isotopes [@TOI]).
\[tab:simul\]
Simulation \# of events box dimension $[\mathrm{cm}]$ LiN volume $[\mathrm{cm}^3]$
------------ --------------------- ------------------------------- ------------------------------
1 1 $\times$ 10$^7$ 25 cm 13080
2 9 $\times$ 10$^7$ 50 cm 122455
3 5 $\times$ 10$^8$ 100 cm 997455
4 2 $\times$ 10$^9$ 200 cm 7997455
5 3.5 $\times$ 10$^9$ 300 cm 26997455
: Details of the five steps of the $^{85}$Kr simulation.
\[tab:results\]
Element Energy $[$keV$]$ Background $[$ counts / kg keV y $]$
----------- ------------------ --------------------------------------
$^{85}$Kr 0 - 100 1 $\cdot$ 10$^{-2}$
$^{85}$Kr 0 - 500 3.8 $\cdot$ 10$^{-3}$
$^{85}$Kr 514 0.13
$^{39}$Ar 0 - 100 1.1 $\cdot$ 10$^{-4}$
$^{39}$Ar 0 - 500 3.2 $\cdot$ 10$^{-5}$
: Expected background from $^{85}$Kr and $^{39}$Ar in GENIUS in the low-energy region.
![Simulated geometry for the GENIUS detectors.[]{data-label="fig:simul"}](g4_99.eps){width="7cm"}
![Output of the $^{39}$[Ar]{} simulation for 2 of the 10 detectors in Fig. \[fig:simul\] (see text).[]{data-label="fig:argon"}](det1.eps "fig:"){width="6.5cm"} ![Output of the $^{39}$[Ar]{} simulation for 2 of the 10 detectors in Fig. \[fig:simul\] (see text).[]{data-label="fig:argon"}](det2.eps "fig:"){width="6.5cm"}
![$^{39}$[Ar]{} simulation: sum spectrum of all 10 detectors (left) and the same spectrum in units of counts/kg keV y (right). The dashed histogram represents the expected $^{39}$[Ar]{} background for a volume of liquid nitrogen 8 times bigger (assuming the same argon contamination).[]{data-label="fig:argon_sum"}](argon.eps "fig:"){width="7cm" height="5.5cm"} ![$^{39}$[Ar]{} simulation: sum spectrum of all 10 detectors (left) and the same spectrum in units of counts/kg keV y (right). The dashed histogram represents the expected $^{39}$[Ar]{} background for a volume of liquid nitrogen 8 times bigger (assuming the same argon contamination).[]{data-label="fig:argon_sum"}](argon_norm.eps "fig:"){width="6.5cm" height="5.5cm"}
![Compared results of the $^{85}$Kr simulations described in Table \[tab:simul\]. Each of the five histograms corresponds to a different step of the simulation and then to a different volume of liquid nitrogen around the detectors (see Table \[tab:simul\]).[]{data-label="fig3"}](comparison_log.eps){width="9cm" height="8cm"}
![$^{85}$Kr background simulated with the geometry of Fig. \[fig:simul\], from the first simulation (dashed histogram) to the second (solid histogram) we increased the volume of liquid nitrogen, keeping the same $^{85}$Kr concentration.[]{data-label="krypton_norm"}](kripton_norm.eps){width="9cm" height="8cm"}
![Total background for GENIUS in the energy region (0-500) keV, coming from the contribution of $^{85}$Kr and $^{39}$Ar.[]{data-label="total"}](total.eps){width="9cm" height="8cm"}
[^1]: Remember that in the GENIUS experiment the detectors are in direct contact with liquid nitrogen.
| |
AGC requires all participants and guides to be fully vaccinated for COVID-19 at least 14 days prior to their trip's start date. Please note that prior to booking, you will also need to review and agree to AGC's Covid Waiver. We do not, however, require boosters at this time.
We recognize that people have a variety of perspectives on COVID-19 vaccinations. We made this decision to require vaccination in accordance with the recommendation of the Centers of Disease Control and Prevention, which states that being vaccinated for COVID-19 and other infectious diseases not only protects yourself and those close to you, it helps reduce spread of the disease in communities.
If you are unable to be vaccinated for medical reasons, you may apply for an exemption from AGC's vaccine requirement. Exemptions will be assessed on a case-by-case basis. To apply please submit an exemption request to AGC, along with a certificate from a medical professional, for review.
Given the constantly changing global health environment, our plans may evolve as we consider new guidance and recommendations from health agencies. We’ll keep this space updated with any changes that might affect you. Please check here as your trip approaches.
We understand that deciding when to travel next is a personal decision that comes with both excitement and reluctance, especially now. Our goal is to help you feel comfortable and supported during your adventure and to help everyone travel with more ease. With that goal in mind, we have created the following policies and procedures in relation to COVID-19. We ask that you register for an upcoming trip only if you are comfortable with our policies and procedures outlined below. We also strongly recommend getting travel insurance for unforeseen events such as flight delays, baggage loss or even an unexpected sickness or injury that could impact your travel plans.
Consistent with CDC guidance, all participants and guides must be fully vaccinated against COVID-19 before traveling with us on any trip. Please note that proof of vaccination, including a booster, is now a requirement of some international destinations.
Any participant or guide who tests positive for COVID-19 within 10 days of a scheduled departure, will not be allowed to go on the trip.
At the start of your trip, your guide(s) will ask to see your proof of vaccination. We recommend carrying a hard copy and digital copy of your COVID-19 vaccination record with you for the duration of your travels.
When you arrive, the guide(s) will also conduct a verbal health screening check for any symptoms of illness. Participants displaying symptoms, may require further evaluation at the nearest health clinic and a negative COVID-19 test before being permitted to continue.
All participants and guides are encouraged to bring a face mask and to wear as required by local regulations and/or establishments, or when it makes you feel more comfortable.
Should a participant become ill during a trip, they should immediately notify the guides, who will assist in obtaining medical care. If a participant develops symptoms consistent with COVID-19 or other communicable illnesses, they will be asked to wear a mask and assisted to self-isolate, both for their health and the health and safety of the group. The guides will then help the participant get tested, or contact a local medical professional so they can evaluate the participant's symptoms and provide appropriate guidance regarding treatment and care. Participants who feel unwell and are having symptoms consistent with COVID-19 will not be permitted to rejoin the trip and must remain in self-isolation until either they test negative for COVID-19, or are evaluated by a medical professional who determines their condition is not contagious and clears them to resume group activities, at which time they may return to the trip.
Following CDC guidance, if a participant tests positive for COVID-19, they will be required to isolate and assisted to leave the trip at their own expense. The rest of the group will be notified of the exposure and while we will not require everyone on the trip to test, we will encourage everyone to wear masks and test to their comfort level. And if anyone else develops symptoms consistent with COVID-19, we will follow the protocol outlined above.
Additionally, our offices are staffed for emergencies, and along with the guides, we will work to provide support for you as needed and proactively communicate about any COVID-19 related issues or adjustments that may be needed during the trip.
We understand how disappointing it can be in the event you need to cancel or change your long-anticipated adventure. Our cancellation policy is not meant to be punitive, however, we plan far in advance for each departure and continuously send non-refundable payment to hotels and other suppliers. We use your payments to prepare for your participation and handle other costs associated with our operations. Therefore, we must strictly adhere to our cancellation and transfer policy for all participants. We strongly suggest purchasing travel insurance in the event you must cancel or otherwise change plans.
While we do not require travel insurance on our trips, some of our domestic and international partners do, including now for COVID-19. You must have travel insurance when required by the partner or country, and in any event, we strongly recommend getting travel insurance. For your convenience, we offer travel protection through Travelex Insurance Services. You can find them online at travelexinsurance.com or talk with a real person at 800-228-9792 and reference location number 06-0331. To learn more about Travelex’s Coronavirus coverage, please visit: https://www.travelexinsurance.com/covid19.
To help you understand what Travelex protection plans will cover, please refer to these Frequently Asked Questions. The full coverage terms and details, including limitations and exclusions, are contained in the insurance policy. Travelex Insurance Services, Inc CA Agency License #0D10209. All products listed are underwritten by, Berkshire Hathaway Specialty Insurance Company, NAIC #22276.
We are learning that COVID-19 is likely to be an enduring part of our lives moving forward and we are doing everything we can to safely make our experiences available for those who are ready to travel. If we need to cancel a trip after the final payment deadline for reasons outside of our control, we will do our best to offer priority booking for the rescheduled trip and do all we can to transfer payments or issue a travel credit towards the rescheduled trip or a different trip that fits your schedule.
Please Note: All standard booking terms and conditions not explicitly addressed on this webpage remain in full force and effect. | https://www.adventuresingoodcompany.com/trip-info/travel-updates |
Subscribe to our newsletter to receive the latest news and events from TWI:
Paper presented at ASME Pressure Vessels and Piping Conference 25-29 July 2004, San Diego, CA., USA: Computational weld mechanics, constraint, and weld Fracture.
Fracture assessment procedures such as BS 7910 and API 579 are formulated based on the Fracture Mechanics concept for assessing integrity of structures such as pipelines, pressure vessels, etc. In the current study those procedures are applied to through-wall and surface cracked pipe geometry under four-point bending. The predicted maximum tolerable applied loads are then compared with pipe full-scale fracture testing results published by Miura et al (2002). Other assessment schemes namely, GE/EPRI, Net-section plastic collapse, LBB.NRC and finally LBB.ENG2, as reported in the same publication are also included in the current paper for sake of comparison. The comparative study showed that BS 7910 and API 579 predict similar maximum tolerable load for through-wall pipes but different value for surface-cracked pipes. Difference in predictions for the latter geometry is owing to the use of different stress intensity factor/reference stress solution by BS 7910 than API 579. However, both procedures provided conservative results compared with the experimental data as well as other engineering routes mentioned in Miura et al (2002).
Fitness-for-service (FFS) assessment is a multi-disciplinary engineering analysis of equipment to determine if it is fit for continued service until the end of a desired of operation, such as until next turnaround or planned shutdown. The main products of FFS are (API 579, 2000) a decision to run, alter, repair, monitor, or replace the equipment and (API 579, 2002) guidance on inspection interval for the equipment. FFS applies analytical methods to evaluate flaws, damage, and material ageing. API 579 (2002) recommendation practice and BS 7910 (1999) standard are among the recognised assessment procedures, which provide information for assessing fitness-for-service. Other methods such as Net-section collapse criterion and several other estimation schemes, namely, GE/EPRI (1988), LBB.NRC (1986) and LBB.ENG (1987) methods also exist.
BS 7910 and API 579 procedures use fracture mechanics to assess crack-like flaws. A failure assessment diagram (FAD) is applied to crack-like flaws. Linear elastic stress analysis is used to compute the toughness ratio (K r ) and the load ratio (L r ) for a component with a crack-like flaw. K r is the ratio of the linear elastic stress intensity factor (K I ) to the material fracture toughness (K mat ), while L r is the ratio of the reference stress ( σ Ref ) to the material yield stress ( σ ys ). For a given flaw and load, the value of K r as a function of L r is plotted on a FAD. No failure is predicted for points below the failure assessment envelope, whereas failure is likely to occur for points at or above the failure assessment envelope. Calculations are repeated for other condition to see where they fall with respect to the envelope or to determine the critical conditions (a point on the failure envelope) at which failure is predicted to be more likely to occur.
In both procedures, there are three choices for the FAD curve: the standard FAD curve can be used (API 579 Level 2, which is equivalent to the BS 7910 Level 2A FAD), or a material-specific FAD (BS7910 level 2B) that requires a stress-strain curve can be selected. Alternatively, a user-defined FAD curve can be input. In the current paper material-specific FAD approach is used. This level generally gives more accurate results compared with the case where FAD is constructed based on the single values of tensile properties (Generalised or standard FAD). Stress-strain data are required at the appropriate temperature for parent material and/or weld metal. The lower yield or 0.2 % proof strength, tensile strength, and modulus of elasticity should be determined together with sufficient co-ordinate stress/strain points to define the FAD curve.
There are subtle differences in the way in which the two methodologies compute the assessment point. Stress intensity factor and reference stress solutions within the API579 are used independent of the analysis type selected.
The FAD analysis can be performed either with a single toughness value or with a resistance curve.
Other assessment methods aforementioned are based on the limit analysis or elastic-plastic J-calculations.
Current study is aimed to use assessment approaches mentioned earlier for prediction of the maximum load applied to two pipes with through-wall and surface semi-elliptical flaws, under four-point bending. The predicted maximum loads are compared with the experimentally determined values reported elsewhere (Miura et al, 2002).
All the required input data for the assessment of the pipes are collected from Miura et al (2002). Those include the information listed below.
The material used for the pipes was STP410 carbon steel specified in Japanese industrial standard with tensile properties as reported in Table 1. As the pipes were used in the high temperature conditions, tensile values for 300°C are also reported separately. The Table also included Ramberg-Osgood fitting parameters for room temperature as well as 300°C.
Table 1 Tensile properties of STP410 carbon steel (Miura et al, 2002)
Maximum load value of J, J m , was calculated based on the information given in the Miura et al (2002) and used in the current study. It should be noted that value of J was estimated in that paper only for a through-wall cracked pipe at room temperature and 300°C (there was no reported data for surface cracked pipe to be used in the current study). Values of maximum-load fracture toughness are estimated 1744N/mm for room temperature and 1396.1N/mm for 300°C.
Table 2 shows crack geometry and dimensions of the pipes tested. As it can be seen all the pipes have similar outside diameter and wall thickness but different crack length/geometry. For better tractability, pipes are numbered 01 to 03 ( Table 2).
Table 2 Crack geometry and dimensions of pipes (Miura et al, 2002)
Table 3 shows results of the pipe fracture tests at room temperature and 300°C. As it can be seen, pipe with surface crack (pipe 03) tolerate higher level of applied load compared with the through-wall cracked ones owing to larger ligament size ( Miura et al, 2002).
Table 3 Results of pipe fracture tests (Miura et al, 2002)
The equations used to construct the assessment line in the current study are the following:
and
Single-point fracture toughness values ( J mat ) for Room and 300°C, is converted to
Critical parameter analysis was carried out for applied load and maximum values obtain for each case is given in Table 4. This maximum load is associated with the assessment points, which locate on the Failure Assessment Lines ( Fig.1). As it clearly shown in Table 4, both BS 7910 and API 579 procedures predicted similar maximum load for the through-wall-cracked pipes. However, the prediction for surface-cracked pipes is inconsistent between the two procedures: API 579 predicts higher maximum load (with less conservatism in comparison with experimental results) compared with BS 7910.
Table 4 Comparison of experimental and predicted maximum load for pipes tested in Miura et al (2002)
Fig.1. FAD curves with assessment points for all the pipe geometries studied. Failure mode for all the pipes is plastic collpase
a)
b)
c)
Predictions made by other engineering methods such as net-section collapse criterion ( Kanninen etal, 1976), GE/EPRI (1988), LBB.ENG (1986) and LBB.NRC (1987) are also summarised in Table 4. For the net-section collapse criterion, two inputs for flow stress namely, materials flow stress and design flow stress was used in Miura et al (2002) for the calculations. It can be seen that net-section collapse method in general over-estimates the maximum load values for through-wall cracked pipes at room and higher temperatures. However the prediction for surface cracked pipes provides good margin of conservatism especially for the case of using material flow stress in the calculation. Predictions by other engineering ways are also showing acceptable conservatism compared with the experiments.
Assessment of the pipes 01-03 under four-point bending showed that plastic collapse is dominant failure mode for all of them. This can be seen from Figs.1a to c, with failure assessment points close to the plastic collapse region. This justifies sensitivity of assessment results on reference stress value as well as tensile properties of the pipe material.
Predictions by BS7910 and API579 for through-wall cracked pipes are conservative (on the safe side) relative to the experimental results ( Fig.2).
Fig.2. BS 7910 and API 579 maximum load predictions for the through-wall and surface cracked pipes at RT and 300°C
For the pipe 03 with surface crack, API 579 compared with BS 7910 predicts higher maximum applied load. Two reasons can be mentioned:
One is that BS 7910 implements Kastner equation ( Kastner et al, 1981) for estimation of reference stress of circumferential surface cracked pipes, whereas API 579 recommends using of different solution ( Eiber etal, 1971). A separate study conducted at TWI ( Cheaitani et al, 2002) revealed that Kastner equation is more conservative than the API 579 solution ( Eiber et al, 1971). This conclusion are drawn when both solutions were compared with the result of a verified finite element study ( Cheaitani et al, 2002). Since plastic collapse is dominant failure mode for the pipe 03, hence less conservative reference stress value will result in less conservative predicted maximum load as shown in Table 3 and Fig.2.
Another reason for the difference between BS 7910 and API 579 predictions could be the result of using flat plate solution by BS 7910 (Raju et al, 1979) for the current surface cracked pipe (Pipe 03). This is done owing to geometrical restrictions. On the contrary API 579 implements using of different solutions ( Klecker et al, 1986) for the same pipe geometry. Although the pipe dominant failure mode is plastic collapse but nevertheless the effect of input stress intensity factor should not be neglected thoroughly.
Fig.3. Comparison of the maximum load prediction for the through-wall pipe at room temperature
Fig.4. Comparison of maximum load predictions for the through-wall cracked pipe at 300°C
Figures 5-7 also show comparative study between all the aforementioned engineering methods, including BS7910 and API579. Apart from the net-section collapse method, rest of the Engineering routes predicts maximum load for through-wall cracked tested pipes conservatively. The level of conservatism is less for LBB. NRC (1986) compared with other methods used.
Fig.5. Comparison of maximum load predictions for the surface cracked pipe at 300°C
Assessment of two through-wall-cracked pipes and a surface cracked pipe were conducted based on the BS 7910 and API 579. Following conclusions can be drawn from the results obtained:
API 579, 2000, 'Recommended practice for fitness-for-service-API 579', 1 st edition.
BS 7910:1999 (incorporating Amendment No. 1), 'Guide on methods for assessing the acceptability of flaws in metallic structures' BSI.
Brust, F., 1987, 'Approximation methods for fracture analysis of through-wall cracked pipes', NURGE/CR-4853.
Cheaitani, M. J. and Wignall, C. M., 2002, 'Acceptance criteria for pipe girth welds inspected using Automated Ultrasonic Testing (AUT), Sub-task 3.1, Development of Girth weld-specific ECA procedures', TWI REPORT NO.: 13545/17/02.
Eiber, R. J., Maxey, W. A., Duffy, A. R., and Atterbury, T. J., 1971, 'Investigation of the initiation and extent of ductile pipe rupture, 'Battelle Report to the pipeline committee of the American Gas Association.
Kanninen, M. F., Broek, D., Marschall C. W., Rybicki, E. F., Sampath, S.G., Simonen, F. A., and Wilkowski, G. M., 1976, 'Mechanical Fracture Predictions for Sensitised stainless steel Piping with circumferential cracks', EPRI/NP-192.
Kastner, W., Rohrich, E., Schmitt, W. and Steinbuch, R., 1981, 'Critical crack sizes in ductile piping, International Journal of pressure vessels and piping'. 9(3) 197-219.
Klecker, R., Brust, F., and Wilkowski, G., 1986, 'NRC Leak-Before-Break (LBB.NRC) analysis method for circumferential through-wall cracked pipes under axial plus bending loads', NURGE/CR-4572.
Kumar, V., and German, M.D., 1988, 'Elastic-plastic fracture analysis of through-wall and surface flaws in cylinders', EPRI/NP-5596.
Miura, N., Kashima, K., Miyazaki, K., Hisatsune, M. and Hasegawa, K., 2002, 'Ductile fracture behaviour of carbon steel cracked pipes with moderate-toughness' ASME PVP 2002 conference proceeding, PVP-Vol. 437, service experience and failure assessment applications, pp. 55-60.
For more information please email:
[email protected]
Browser does not support script. | https://www.twi-global.com/technical-knowledge/published-papers/fracture-assessment-of-through-wall-and-surface-cracked-pipes-by-bs-7910-and-api-579-assessment-procedures-a-comparative-study |
Two years ago, 24 million tons of dust rose high above Africa, forming a cloud that hovered across the Atlantic, hiding Puerto Rico in a pink patina. An unusually meandering jet stream contributed to the formation of the monstrous dust cloud. But environmentalists have now identified another factor contributing to such storms: the disappearance of the “biocrust,” a microbial mat that covers dry soil and keeps dust in place.
Biodust is a hard surface coating, or “skin,” typically a few millimeters thick, containing a thriving community of fungi, lichens, algae, cyanobacteria, and other microbes. Bettina Weber, an ecologist at the University of Graz and co-author of the book NatureGeoscience Published study. But this gum is likely to weaken in the future, having been trampled on and destroyed by livestock as a result of climate change, leaving the soil prey to the winds. USGS ecologist Rebecca Finger-Higgins said the dust study shows “that the loss of bio-dust in a particular region of the world can have far-reaching effects.”
So far, ecologists have paid little attention to the biome that covers soils in arid, semi-arid, and extremely cold regions around the world. However, researchers have realized that these layers produce and process nutrients that other organisms in the area need to thrive, especially in arid environments. It also helps dry soil retain low moisture levels.
In 2018, Weber and her colleagues mapped all types of bio-dust on Earth and concluded that they cover 12 percent of the Earth’s surface. They then collaborated with climate modelers and dust experts to find out how much dust the bioglue currently prevents from forming. First, the researchers identified the winds needed to destroy biological soils and blow up the soil. They then calculated dust emissions at 31 different sites and fed the results into a model of global dust levels – and how much they would have increased without bio-dust.
According to Weber and her team, biosynthetic insects reduce dust pollution in the air by 700 million tons annually. That amount would bury the entirety of New York under 14 inches of dust. The study notes that “biological forests play a key role in preventing dust emissions worldwide,” says Fernando Maestre, a dryland ecologist at the University of Alicante.
Dust can aggravate respiratory problems and other illnesses
Dust storms like the one that devastated cities in southeastern Brazil in 2021 could become more frequent as soils in arid regions retain less moisture. Between 25 and 40 percent of these crusts will disappear in the next 65 years, says Emilio Rodriguez Caballero, who was involved in the study and now works at the University of Almeria. On the other hand, climate change threatens soil biota, and can cause about half of the destruction. People and livestock also tread on the husks or under the wheels of agricultural machinery.
Finger-Higgens and colleagues document the effects of climate in more detail. In a long-term study of areas in Utah’s Canyonlands National Park, they found that biogeococcus lichens in particular suffer from warming. With temperatures in the Canyonlands rising 0.27 degrees Celsius per decade, lichens, especially those that help convert nitrogen in the air into a form other organisms can use, have all but disappeared, the team reported in April in the journal. PNAS.
Fewer plants can survive with less nitrogen, resulting in bare soil and more dust emissions, according to Finger-Higgens. According to the researchers, some of the effects of the dustiest climate are still unclear. The effect of dust on temperatures depends in part on the size of the particles. Dust particles act as nuclei for cloud formation and can cause snow to melt faster. While dust helps transport nutrients essential to plant life, it can exacerbate respiratory problems and other health conditions in humans.
Previously, it was assumed that dusty areas such as the coast would become greener and less dusty because higher levels of carbon dioxide have a fertilizing effect. Weber and colleagues note that the loss of biodust is likely to nullify this process to some extent.
Climate makers have often neglected how dust affects temperature and precipitation, says Michael Mann, an atmospheric researcher at Penn State University. However, the effects of fading biological disappearances shouldn’t be so dramatic that they make a big difference to global climate models, he says.
However, Joseph Prospero, an atmospheric chemist at the University of Miami, warns that there are vast regions on Earth where information about bio-dust is scarce. Weber, Maestre, Finger-Higgens, and other experts are now trying to fund biometric blister measurements worldwide. | https://myastheniamedi.com/2022/06/08/biocrusts-a-natural-disappearing-glue-wikipedia/ |
You ought to be certain that your work will probably be effectively written, especially if you’re writing essay checking sentences for correct grammars on a certain subject. It’s best to create your writing on your knowledge and experience. When you’ve done this, the essay needs to be able to be coherent and informative, which can be readily understood by the viewers.
Writing an essay is not quite as easy as it sounds. It has to meet certain requirements for this to be successful. It must be well-organized and specific. The author of the essay needs to take advantage of the exact same method throughout the article, so the reader will have the ability to trace the flow of the essay.
Writing an essay doesn’t need much writing skill, but it does need decent judgment. The principal goal of writing an essay is to make a certificate or degree. The essay has to be comprehensive in its content. Moreover, the article also has to have a strong analytical quality. The writer of the article needs to make the reader view the perspective of this author.
It’s best to start off with the principal focus. It is only after the reader becomes familiar with the subject and the writer, he or she’ll have the ability to read free online spell check the other parts of the specific article. This is why the start ought to be given equal emphasis. It’s best to start from the articles and work one-by-one to the theme of the essay. It will also assist the reader to be focused on the material, because it allows him or her to be wholly focused on the essay.
The second portion of writing an essay is focusing on the main idea. The theme of the essay is your foundation for the whole essay. After the base is installed, the writing will be easier. If the writing is detailed enough, it’ll be simple to move on to another portion of the composing process.
Once the theme and the content are set, the next step is to have a good outline. The outline is a list of factors that the essay will pay for. It might also be called the aims of the specific article. The outline is significant to the entire essay. It assists the reader know what has to be covered by this essay.
Last, you can enable the essay by using a dictionary. The dictionary is a vital tool in writing essays. A person who writes can be a source of understanding for the other subscribers. An individual can find all of the definitions to the terms used in the essay online. You can even check in your dictionary to locate a definition of the period.
The major goal of an essay is to earn the reader understand a concept through a collection of statements, arguments, facts, and comparisons, which are also typical in various topics. The author’s ability to make the reader understand the concept depends greatly on the writing style used. Different styles of writing are explained in different writing guides. Reading these guides will help you in developing your writing style. | https://shaiwna3na3.com/2021/07/14/writing-an-essay-know-the-basic-rules-for-writing-an-essay/ |
Bad Medicine? The Side Effects of Central Bank Mispricing
Big medical problems often require significant doses of strong pharmaceuticals. Unfortunately, the medicines often come hand-in-glove with unwanted side effects.
The same is true in economics.
An Anemic Economy
In response to the conditions produced by the 2007–09 financial crisis and the eurozone sovereign debt crisis that persisted, one of the world’s central banks doled out some strong medicine — and it caused considerable problems.
In an attempt to resuscitate the weak European economy, European Central Bank (ECB) policies distorted Europe’s bond market and effectively transferred hundreds of millions of dollars from taxpayers to financiers, according to “Central Bank-Driven Mispricing,” a paper co-authored by Davide Tomio, a professor in Darden’s Finance area. Moreover, the distortions reduced the market’s usefulness as a measure of the ECB’s policy effectiveness.
“[These findings] should concern central banks in particular and policymakers in general,” states the report.
Strong Medicine
Here’s how the distortion came to pass: In 2015, in the context of abiding near-deflationary conditions, the ECB decided to buy the bonds issued by those governments that participated in Europe’s single currency area, the eurozone. The idea was to hold down long-term borrowing costs and to jump-start the European economy.
To see if the ECB’s strategy altered the markets in unintended ways, Tomio and his fellow researchers used data from 2013 and 2014 — the two years just before the ECB announced the new bond-buying program — as control years. They studied the period of March 2015 through April 2017, when the ECB made monthly bond purchases of between €50 billion and €80 billion.
In the history of central banking, this level of quantitative easing was unprecedented in both scope and duration.
Adverse Effects
The ECB’s bond-buying binge caused a variety of effects, direct and indirect.
With reduced availability of the government securities, it naturally became more difficult for commercial banks to acquire bonds for use as collateral. And without the ability to support their loan operations — vital for lending institutions — bond scarcity likely stymied loan growth.
Importantly, the availability of bonds typically helps maintain market liquidity, and a more liquid market tends to be a more efficient market. Likewise the inverse: Fewer available bonds can mean lower liquidity, and the corresponding less efficient market means the prices of securities don’t necessarily reflect their true values.
In this case, the bond market became so distorted that financial institutions could make money easily through trading between the futures market and the bond market.
An Expensive Prescription
In an efficient market, bond interest rates should be more-or-less identical to those indicated by the futures contracts for the same bonds. When there is a significant difference, then traders can sell one (a bond) and buy the other (a futures contract) to make a risk-free profit — such opportunities exceedingly rare or nonexistent in an efficient market.
During the period of the ECB’s market efforts, there were larger-than-usual gaps between the interest rates in the bond and futures markets. These differences allowed “traders to profit from selling the more expensive security — and contemporaneously perfectly hedging it by buying the cheaper security,” the report states.
Such trades, possible due to the ECB’s intervention, were “tantamount to a direct transfer from taxpayers to arbitrageurs” — the latter a type of trader who profits from price differences across separate markets.
Though determining the exact figure would be a challenge, as the ECB doesn’t provide that data, Tomio notes that “what is certain is that the ECB paid too much for the securities.”
Using data from other sources, the researchers estimate that the total transfer of wealth to speculators was as high as €1.46 billion.
Further Complications
Not only did the wide difference between the prices of bonds and futures contracts give speculators the opportunity to make money with zero risk — at the expense of taxpayers — it undermined the ECB’s ability to measure what its own policies did or didn’t achieve. Central bankers use the financial markets as indicators of how effectively their policies are working; when two markets don’t show the same interest rate (in this case, the futures and bond markets), it gives them conflicting information.
“The market for interest rates should be informative for monetary policy to be effective, and it is in the policymakers’ interests that the market participants agree on what the ‘correct’ interest rate is,” the researchers note.
Although the research by Tomio and his colleagues specifically addressed the actions of the ECB, there are clear implications for other central banks, including the Federal Reserve, which conducted a similar bond-buying program in the U.S. markets.
When conducting outright asset purchases, central banks would be well-advised to carefully monitor markets connected by arbitrage, and market neutrality is more likely if they purchase a broader set of assets.
Davide Tomio co-authored “Central Bank-Driven Mispricing,” a Sustainable Architecture for Finance in Europe working paper, with Loriana Pelizzon of Goethe University Frankfurt and Ca’ Foscari University of Venice, Marti G. Subrahmanyam of New York University’s Stern School of Business and Jun Uno of Waseda University. | https://ideas.darden.virginia.edu/bad-medicine-the-side-effects-of-central-bank-mispricing?_gl=1*3xdko0*_ga*NzkwNDUwMDc5LjE1MjAyNjE2NDM.*_ga_SLY12CWTWF*MTY0NjkzMjkzMy4xMi4wLjE2NDY5MzI5MzkuNTQ.&_ga=2.19614655.642710485.1646932935-790450079.1520261643 |
As some of you will know on 22 September 2010, Katharine St John-Brooks presented her research findings at the late summer alumni event on what are the ethical challenges involved in being an internal coach?
Katharine’s research was to seek and explore the following:
What are the key ethical dilemmas that arise for internal coaches?
How can organisations best support their internal coaches to equip them to deal with such dilemmas in the most ethical way?
Katharine’s research also looked into whether there were any successful ethics awareness workshops and what the trend in the UK is towards developing an internal coaching provision. Katharine found that there wasn’t a lot of research on internal coaching and ethics but did find a number of books around the subject which can be found in her presentation.
Katharine narrowed down her research to the top 10 dilemmas for internal coaches. She then led the discussion about which dilemmas resonate for us, what we have encountered and how we might deal with them. It soon emerged that there were many of the same challenges for external coaches. One area of debate was understanding the circumstances in which it is appropriate to 'blow the whistle' and maybe disengage from a coaching relationship. One particular issue that was discussed was the case of a coach whose one-on-one coaching client had a drinking problem. The coach made the person aware that colleagues were seeing him in particular light which the client wasn’t aware of and recommended he see a person he knew who was experienced in that area. He ceased to coach the client.
It’s difficult to know what to do in a sitatuation such as this; some organisations have strict drinking policies and therefore the coach should have ‘blown the whistle’ and told the client’s employer the situation as the coach is working for the organisation. It’s a hard decision to make. As a coach you need to gain trust and also there are confidentiality issues and your reputation is at stake.
There were also many other issues which arose throughout the discussion. When do you turn down work especially in this climate? One coach was asked to coach a wife and husband but he decided against it because of the awkwardness. Another dilemma raised was a coach being asked to delay a planned coaching session until the coach’s client had been informed of his redundancy. The coach spoke to the organisation and said this wouldn’t be a good idea as the client would realise that he had known about the redundancy and his trust and reputation would be lost.
These issues also highlighted the need for external coaches to ask organisations what their code of ethics/policies are in the case of difficult situations, especially in the case of bullying, sexual discrimination and drug and alcohol abuse.
Another deep discussion which arose for internal coaches especially was a role conflict; where the coach’s day job impinges on their coaching relationship. One example cited was where a coach was coaching an internal client. The coach’s HR support was requested as part of a disciplinary process for the same person that she was coaching. This puts the coach in a very awkward position that they should not have to experience.
These are common issues that organisations need to address and they are not always thought about until the issues arise. Organisations need to make sure they have the appropriate training and support to navigate the ethical waters without difficulty.
It highlights - especially for internal coaches - the reason for supervision. Read our supervision
blog
featured in september for more information.
To find out more about Katharine’s’ research please download her presentation below. You can also read her story on Moral Support for internal Coaches.
1.
Moral Support Coaching at work article
2. | https://www.theschoolofcoaching.com/ethical-challenges-for-internal-external-coaches/ |
Anarchism: A Documentary History of Libertarian Ideas
The subtitle of Volume One of my anthology of anarchist writings, Anarchism: A Documentary History of Libertarian Ideas, was From Anarchy to Anarchism. By this I meant to emphasize that people lived without states for tens of thousands of years, and therefore in a kind of “anarchy,” before the first states began to emerge about 6,000 years ago. Far from being impossible, as Thomas Hobbes and many other political commentators have argued, anarchy was a very successful form of human social organization which existed for the most of the time of human existence on this planet. Because these societies without states were preliterate, it is impossible to say to what degree this may have been a conscious choice. It is highly doubtful that people living in stateless societies ever identified themselves in opposition to the state, as “anarchists” of some sort, given that there were no states in existence for most of the time that people lived within these stateless societies. Anarchism, as an identifiable doctrine, could only emerge after the development of state forms and institutions, hence the subtitle, “From Anarchy to Anarchism.”
For Volume Three of the Anarchismanthology, I wrote an Afterword, “The Anarchist Current,” in which I discuss the evolution from living without states, or “anarchy,” to the origins of anarchist ideas and movements, after the rise of so-called “civilization.” I then survey the development of anarchist ideas over time and across the globe, from the Daoists in ancient China to contemporary “Occupy” and similar transnational movements against neo-liberalism. As the Afterword also serves as an extended introduction to the material in the the volumes of the Anarchismanthology, and the history of anarchist thought, I have decided to publish it in serial form here on my blog in the hope that this will pique peoples’ interest in the original material contained in the anthology, of which the Afterward can of course only offer a glimpse (the material is referenced in the text by volume and selection numbers). I hope someday in the not too distant future to expand the Afterward into a book.
Bakunin Bicentennial 2014
From Anarchy to Anarchism
Anarchism, George Woodcock once wrote, is like the river of the ancient Greek philosopher, Heraclitus: constantly changing, with different sources, eddies and currents, sometimes percolating below the surface, at other times bursting forth in revolutionary torrents, but generally moving “between the banks of certain unifying principles” (1977: 16). Contrary to popular misconceptions, those unifying principles are not chaos and terrorism, but a rejection of hierarchy, authority and exploitation, and an alternative vision of a society without domination based on freedom and equality. Anarchists reject the State and its institutions, advocating societies based on free association, without anyone having the power to dominate or exploit another.
Long before anyone consciously articulated anarchist ideas, people had lived in societies without a state for thousands of years. So-called primitive and prehistoric peoples lacked any formal institutions of government and hierarchical social structures based on relationships of command and obedience (Clastres, Volume Two, Selection 64). As the anthropologist Harold Barclay puts it, “Ten thousand years ago everyone was an anarchist” (1982: 39). Around 6000 years ago, the first hierarchical societies began to emerge in which a minority of their members assumed positions of prestige and authority, from which they came to exercise power over others (Barclay, Volume Three, Selection 17).
It took thousands of years for this process of state formation finally to encompass the entire globe, with some people continuing to live in stateless societies into the 20th century. Members of stateless societies lived in roughly egalitarian communities without rank or status (Taylor, 1982). For the most part, stateless societies had sustainable subsistence economies based on relationships of equality, reciprocity and mutual aid (Clastres, Volume Two, Selection 64; Bookchin, Volume Three, Selection 26; Sahlins (1974), Barclay (1982) and Kropotkin (1902)).
Relatively few states emerged from within their own societies: ancient Mesopotamia, Egypt, China, Mexico, Hawaii, Tahiti, Tonga, Samoa and possibly India (Barclay, 2003). State institutions were forced on most societies by external powers, or were created in response to such power. According to Barclay, a combination of factors led to the emergence of state forms: 1) increased population; 2) sedentary settlement; 3) horticulture/agriculture; 4) redistribution of wealth; 5) military organization; 6) secondary significance of kinship ties; 7) trading; 8) specialized division of labour; 9) individual property and control of resources; 10) a hierarchical social order; and 11) ideologies of superiority/inferiority (Volume Three, Selection 17).
As most people were innocent of government, having lived without it for thousands of years, they had nothing against which to compare their so-called primitive forms of social organization until it was too late. “Anarchy” was for them a way of life, not a concept. Although they may have had nonhierarchical conceptions of their societies and the natural world (Bookchin, Volume 3, Selection 25), it is unlikely that they conceived of anarchy as some sort of ideal. Anarchist ideas only began to be articulated after people started living within hierarchical societies based on exploitation and domination. When looking for precursors of the anarchist idea, one must be careful then not to read too much into the writings of people who never identified themselves as anarchists and never explicitly endorsed anarchy as an ideal.
Lao Tzu – Neither Lord Nor Subject
Daoism and Early Anarchism
Daoism in ancient China helped give more formal expression to the nonhierarchical sensibilities of earlier human societies, eventually leading some Daoists to adopt an anarchist stance. John P. Clark has argued that the classic text, the Daode Jing (or Tao Te Ching), circa 400 BCE, evokes “the condition of wholeness which preceded the rending of the social fabric by institutions like the state, private property, and patriarchy” (1984: 168).
Writing around 300 CE, the Daoist sage Bao Jingyan gave the Daoist rejection of the hierarchical cosmology of the Confucians a more political slant, seeing it as nothing more than a pretext for the subjugation of the weak and innocent by the strong and cunning (Volume One, Selection 1). He harkened back to the “original undifferentiated” condition of the world in which “all creatures found happiness in self-fulfillment,” expressing a nonhierarchical, ecological sensibility which eschews “the use of force that goes against the true nature of things.” He noted that in “the earliest times,” prior to the creation of a hierarchical social order, “there was neither lord nor subjects.” He saw compulsory labour and poverty as the results of the division of people into ranks and classes. With the emergence of a hierarchical social order, everyone seeks to be above the other, giving rise to crime and conflict. The “people simmer with revolt in the midst of their poverty and distress,” such that to try to stop them from revolting “is like trying to dam a river with a handful of earth.” He prefered a life worth living to the religious promise of life after death.
In his commentary on Bao Jingyan’s text, Etienne Balazs argues that Bao Jingyan was “China’s first political anarchist” (1964: 243). As with later self-proclaimed anarchists, Bao Jingyan opposed hierarchy and domination, seeing them as the cause of poverty, crime, exploitation and social conflict, rejected religious beliefs that justify such a state of affairs, predicted the revolt of the masses and advocated a society without hierarchy and domination where there are “neither lord nor subjects,” a phrase strikingly reminiscent of the 19th century European anarchist battle cry, “Neither God nor Master.” While similar ideas may have been expressed in ancient Greece by the Stoic philosopher, Zeno of Citium (333-262 BCE), only fragments of his writings have survived, making Bao Jingyan’s text perhaps the oldest extant to set forth a clearly anarchist position.
Review of Red State Revolt, The Teachers' Strike Wave and Working-Class Politics by Eric Blanc on Verso Books, 2019. ---- By Michael Mochaidean ---- Last year's wave of public teacher strikes and walkouts was the highest number of workers walking off the job in three decades. Whether it will be the start of a larger trend across other sectors is ye […]
This is a public communication from the High security prison in Santiago and extends to the mobilization of all the prisons of the territory in Chile. ---- "We start an indefinite liquid and hunger strike in rejection to Law 321 which modifies all the postulation times for benefits, as well as keeping us behind the bars for a lot more time." ---- O […]
The interprofessional trade union CNT-AIT (section of the International Association of Workers) in Madrid announced the launch of protests against Faunia and calls for its boycott. The cause of the conflict was the dismissal from the company's El Olivo restaurant in Valdebernardo, Comrade Emanuele. ---- A fellow worked as a cook in a restaurant and open […]
Constructing virtual storage of articles in companies has become a brand new stage within the development of business information surroundings, associated with the growth of the availablility of separated sources, file systems, information systems and outside sources of data that users need to consult with. Cloud data storage is highly demanded because of co […]
This Wednesday CNT La Felguera returns to the court to demand what is fair. On this occasion, it will be DMS, contract of Capgemini Spain the more than likely will have to admit another partner in the template. The union encourages us to attend the event and calls the fight "to the entire staff of Capgemini in a union where we organize ourselves as equa […]
On May 17, the union sections of the metal of Bizkaia agreed to participate in the strike days called by the unions ELA, LAB, UGT and CCOO. ---- "More than 50,000 workers in this historic territory have frozen wages and working conditions, we have to put an end to this situation", said the CNT. ---- The strike of the metal sector of Biscay will be […]
André Hébert was a volunteer with the YPG between 2015 and 2017. He delivers through this book a fascinating political testimony on the current revolution. ---- This book was first motivated by the need to twist the necks of the untruths circulating on the conflict that ignited and still sets Syria on fire. Indeed, after having initially supported the Free S […]
On May 26, Italian citizens will vote to elect the new European parliament, and 400 million European voters will be called to the polls. ---- Several hundred candidates are ready to be elected to give continuity to their self-representation, perpetuating a simulacrum of democracy in a scenario crossed by strong systemic contradictions. ---- These elections a […]
The 38 th Confederal Congress of the CFDT is held from 8 to 12 May 1979 in Brest. Between the policy of "refocusing" and exclusions, it marks a turning point in the history of the plant. The CFDT will therefore resolutely turn its back on the self-management socialist orientation that had made its originality and its appeal in the post-68. In defia […]
The Glyphosate Campaign is one of the most successful initiatives in the fight against pesticides. Collectives are being created all over France to lodge complaints against this invisible pollution. Questions to Dominique Masset, co-founders of the campaign in Ariège. ---- Libertarian alternative: How was born the idea of this campaign of samples and urine t […]
| |
Ada Lovelace was a pioneer in the realm of modern computer science. But wait …Augusta Ada King-Noel, Countess of Lovelace (née Byron; was born 10 December 1815 and died 27 November 1852) was an English mathematician and writer, chiefly known for her work on Charles Babbage's proposed mechanical general-purpose computer, the Analytical Engine. She was the first to recognize that the machine had applications beyond pure calculation, and published the first algorithm intended to be carried out by such a machine. As a result, she is sometimes regarded as the first to recognize the full potential of a "computing machine" and the first computer programmer.
Between 1842 and 1843, Ada translated an article by Italian military engineer Luigi Menabrea on the engine, which she supplemented with an elaborate set of notes, simply called “Notes”. These notes contain what many consider to be the first computer program—that is, an algorithm designed to be carried out by a machine. Lovelace's notes are important in the early history of computers. She also developed a vision of the capability of computers to go beyond mere calculating or number-crunching, while many others, including Babbage himself, focused only on those capabilities. Her mindset of "poetical science" led her to ask questions about the Analytical Engine (as shown in her notes) examining how individuals and society relate to technology as a collaborative tool. So, before there was Apple, Windows or even DOS, there was the analytical engine that led to the age of modern computing and beyond.
Where would our world be if not for the dreamers and the risk takers who see what others cannot or will not see? What about those who understand the intricate complexities of the vast infinite diversity of the created order and yet are able to discern a single “thread” of continuity to weave and “bind” the whole of the seemingly disparate individual parts?
SERVE ROME is like an Eagle ready to soar. Beyond the sharing of space and the collaborative community, the next portion towards the full implementation of SERVE ROME is to build and maintain a database of needs and resources for the community. Imagine, a website (space) that listed every known and possible volunteer opportunity in Floyd County? What if every non-profit in Floyd County was able to solicit volunteers for the work force they needed to accomplish their transformational work? What if non-profits were able to write grant proposals that funded their work and allowed them to focus on their mission as a caring, serving community endeavors instead of non-stop fundraisers? What if through the collective, collaborative efforts of the nonprofit and religious community in Rome, we were able to eliminate poverty, homelessness, and hunger in Rome and Floyd County? What if the combined efforts of a collaborative community could formulate and execute a unified plan that worked with leaders from across the political, economic and social spectrum to support families in their pursuit of “building a community of excellence” that was a model for other communities of all sizes in every part of the World?
Could that place be Rome, Georgia? I believe it could be and is… There is an unprecedented atmosphere of positivity within the larger collective community of Rome and Floyd County that has the potential and possibility to propel the good works and plans for fulfilling the dreams of many and making the dreams a near and present reality. The business community led by the efforts of the Chamber of Commerce along with the Educational and Health Care Communities are coming together in unparalleled and unprecedented new collaborative ventures. Law Enforcement and Community Groups are in conversation and are engaged in ongoing efforts to make Rome and Floyd County not just a safe place, but a place that has a reputation as a caring community for all its citizens. The faith Communities of Rome and Floyd County must also “step up” to embrace new paradigms for addressing the challenges of an ever-changing, fast paced world that may or may not embrace a common perspective of a Judeo-Christian worldview.
Is it possible, that a dream can become reality? Is it possible that something as simple as a questions about stewardship and the use of space could be the “platform” for dramatic transformation and positive change in Rome and Floyd County?
The implementation of the Serve Rome “concept” is a significant reorientation for both thinking and doing. There may be some “radical changes” that may cause some “localized discomfort” and some significant adjustments along the way. Some of the adjustments will include having to schedule space for meetings or gatherings. JoAnn Crane will be the “scheduler” for all things Rome First and Serve Rome. Please plan ahead for your next meeting, gathering, small group event and “regularly” scheduled events – you may or may not be assigned the same space each time you schedule a meeting. Thank you in advance for your patience and cooperation in helping Rome First live “into” the dream of SERVE ROME.
The Reverend Dr. Martin Luther King in his famous “I Have a Dream” speech delivered to a crowd gathered on the National Mall for the March on Washington for Jobs and Freedom. On August 28, 1963 from the steps of the Lincoln Memorial He spoke these words- “…I say to you today, my friends, so even though we face the difficulties of today and tomorrow, I still have a dream. It is a dream deeply rooted in the American dream. I have a dream that one day this nation will rise up and live out the true meaning of its creed: ‘We hold these truths to be self-evident: that all men are created equal.’ I have a dream that one day on the red hills of Georgia the sons of former slaves and the sons of former slave owners will be able to sit down together at the table of brotherhood….” We have not yet arrived at the place or the time of which Dr. King dreamed, but we are “marching on”… And as we march, we have the opportunity to move closer to approaching the dream by participating in transformational events in our community like ONE TABLE.
One Table is scheduled for September 23, 2018 at 6:30 on the pedestrian bridge in downtown Rome. Tickets will soon be available and I hope you will join me in attending this transformational community wide event.
Let’s dare to soar on the wings of Eagles. Let’s dream of and work for the day when all God’s People will sit together as brothers and sisters who love one another the way God loves ALL his children. Let’s spread our collective wings and soar to new heights that have heretofore thought to be “impossible” or unattainable. Let’s trust that the God who brought us to this place and is with us even at this time, will be able to sustain us, renew us and continue to equip us for the journey towards becoming the people God created us to be.
I look forward to seeing you in worship on Sundays and in small groups, classes and involved in transformational community events that will continue to make Rome a Great place to live, work, play! | https://www.romefirst.org/words-from-our-pastor/2018/8/1/living-into-the-dream |
Browsing by Subject "Reconciliation"
Now showing items 1-5 of 5
-
Faculty developers as allies (not experts) in supporting Indigenous perspectives (Universities Canada, 2018-01-30)Situated in teaching and learning centres, faculty developers are well-positioned to be allies in the face of faculty uncertainty. Here and now, teaching and learning centres are being called to go beyond drawing rubrics ...
-
The politics of Aboriginal title in British Columbia: from the Referendum to the Truth and Reconciliation Commission (Electronic version published by Vancouver Island University, 2017-05-04)Over the course of the last decade and a half, we have interrogated key intersections of the political economy of natural resource development and ongoing geographic strategies of colonialism in BC. Studying Gordon Campbell’s ...
-
Promoting reconciliation through research collaboration between Xaaynangaa Naay and Northern Health Authority: Beginning the dialogue (Royal Roads University, 2019)This project was supported by the Government of Canada through a SSHRC Connection Grant, and builds on a previous project supported by a CIHR Planning and Dissemination Grant. The first project was focused on developing ...
-
Reconciliation with an Indigenous Elder and a Euro-Western settler through co-created art and conversation (Electronic version published by Vancouver Island University, 2019)Many Indigenous peoples, cultures and communities across the globe have experienced some form of colonization or genocide that caused adverse effects. Often the relationship among colonizer and Indigenous people have been ... | https://viurrspace.ca/browse?type=subject&value=Reconciliation |
Joshua A. Gordon, M.D., Ph.D., director of the National Institute of Mental Health (NIMH), and Ellen Leibenluft, M.D., chief of the Section on Mood Dysregulation and Neuroscience and co-chief of the Emotion and Development Branch in the NIMH Intramural Research Programs, have been elected as members of the National Academy of Medicine.
For National Suicide Prevention Awareness Month, NIMH Director Dr. Joshua Gordon and Dr. Jane Pearson, chair of the Suicide Research Consortium at the NIMH, are available for interviews on suicide prevention research, trends, and the findings and implications of recent studies.
On February 20, 2018, join NIMH for a Twitter chat on Seasonal Affective Disorder with expert Dr. Matthew Rudorfer.
Redesigned web section adds interactive tools, sharing features.
Research in a wide range of disciplines supports the idea that mental disorders result from the complex interplay of biological, developmental, social, and environmental processes; however, the more we learn about mental disorders, the more we realize there are still gaps in our understanding of how best to classify, diagnose, and treat them.
Joshua A. Gordon, M.D., Ph.D., Director of NIMH, has been promoted to Fellow status by the American College of Neuropsychopharmacology based on his scientific reputation, contributions to the College through committee work and involvement in the Annual Meeting program.
American Association of the Advancement of Science (AAAS) to induct Dr. Gordon and other recipients in February ceremony.
National Institute of Mental Health (NIMH) recently released its second annual update of the Strategic Research Priorities.
The directors of the Eunice Kennedy Shriver National Institute of Child Health and Human Development, the National Institute of Mental Health, and the National Institute of Neurological Disorders and Stroke discuss the importance of post-mortem brain donation in a joint message.
Dr. Shelli Avenevoli has been named deputy director of NIMH.
The National Institute of Mental Health (NIMH) congratulates two NIMH grantees, Mary Kay Lobo from the University of Maryland School of Medicine and Eric Morrow from Brown University, who are among the 102 scientists and researchers receiving the 2017 Presidential Early Career Award for Scientists and Engineers (PECASE).
The National Institute of Mental Health (NIMH) announces that Francis McMahon, M.D., is a recipient of the Brain & Behavior Research Foundation’s 2016 Colvin Prize for Outstanding Achievement in Mood Disorders Research.
The NIMH Research Domain Criteria (RDoC) unit, the Delaware Project (DP), and the Association for Behavioral and Cognitive Therapies (ABCT) will launch a webinar series examining the science-to-service pipeline in psychology and psychiatry.
At its annual meeting for 2016, the National Academy of Medicine (NAM) announced the election of 79 regular members, including the National Institute of Mental Health’s (NIMH Karen F. Berman, M.D. One of the highest honors in the fields of health and medicine, election to the Academy recognizes outstanding professional achievement and commitment to service.
National Institute of Mental Health (NIMH) recently released updates to its Strategic Research Priorities.
RDoC Unit at the National Institute of Mental Health (NIMH) announce that they are holding monthly virtual “office hours” starting Friday, October 14, 2016.
Three NIMH grantees have been named recipients of the 2016 Kavli Prize in Neuroscience.
Studies based on a database made available by the Human Connectome Project’s first phase reveal that an individual’s brain connectivity can predict his or her behavior.
NIMH congratulates four NIMH grantees who received the 2016 Presidential Early Career Award for Scientists and Engineers (PECASE).
The more folding in the thinking parts of our brain, the smarter we are – to a degree.
The National Institute of Mental Health (NIMH)’s Research Domain Criteria (RDoC) Unit has launched its official account on Twitter, @NIMH_RDoC.
New York expanded OnTrackNY, a treatment program for youth with psychosis which is an offshoot of one of the two NIMH-funded Recovery After an Initial Schizophrenia Episode (RAISE) studies.
Boys are more likely than girls to receive an antipsychotic prescription regardless of age, according to a new study published in JAMA Psychiatry.
New NIMH Strategic Plan balances the need for long-term investments in basic research with urgent mental health needs.
Many patients with first-episode psychosis receive medications that do not meet guidelines. A study finds that almost 40 % of people with first-episode psychosis in community mental health clinics across the country might benefit from medication treatment changes.
An increasing number of U.S. adults connect to the web through smartphones or a tablets, according to a recent study by the Pew Research Internet Project. With NIMH’s new mobile-friendly website, visitors can access NIMH information and resources anywhere, anytime, and on any device—from desktop computers to tablets and mobile phones.
NIMH announces a new unit within the Office of the Director to support the development of the institute’s Research Domain Criteria initiative. The unit will enhance communication with scientists, clinicians, and the public to refine the RDoC research framework and accelerate the translation of basic research into clinical treatments.
A drug being studied as a fast-acting mood-lifter restored pleasure-seeking behavior independent of – and ahead of – its other antidepressant effects.
The Substance Abuse and Mental Health Services Administration released the findings of a new clinical study providing national data on the past-year prevalence of specific mental disorders in adults.
Over the past decade or so, evidence has emerged suggesting that the birth of new neurons in the adult brain’s memory hub, or hippocampus, may play a key role the action of antidepressants, resilience to stress, the benefits of exercise and enriched environments, and preventing memory loss. But understanding how it might work has remained elusive. NIMH researchers in NIH’s new Porter Neuroscience Research Center are following up leads.
A brain blueprint maps where genes are tuned on and off during mid-pregnancy—when most brain disorders such as autism and schizophrenia occur.
NIMH scientists presented hands-on demonstrations of neural electrical activity at the National Museum of Health and Medicine Brain Awareness Week program, March 12, 2014.
NIMH announces updated World Health Organization estimates of the burden of disease in the United States.
NIMH/NICHD experts explain what sparks and halts youth violence. | https://www.nimh.nih.gov/news/science-news/science-news-about-institute-announcements.shtml |
The book of hours is a Christian devotional book used to pray the canonical hours. The use of a book of hours was especially popular in the Middle Ages and as a result, they are the most common type of surviving medieval illuminated manuscript. Like every manuscript, each manuscript book of hours is unique in one way or another, but most contain a similar collection of texts, prayers and psalms, often with appropriate decorations, for Christian devotion. Illumination or decoration is minimal in many examples, often restricted to decorated capital letters at the start of psalms and other prayers, but books made for wealthy patrons may be extremely lavish, with full-page miniatures. These illustrations would combine picturesque scenes of country life with sacred images.: 46 Books of hours were usually written in Latin (the Latin name for them is horae), although there are many entirely or partially written in vernacular European languages, especially Dutch. The English term primer is usually now reserved for those books written in English. Tens of thousands of books of hours have survived to the present day, in libraries and private collections throughout the world.
The typical book of hours is an abbreviated form of the breviary, which contains the Divine Office recited in monasteries. It was developed for lay people who wished to incorporate elements of monasticism into their devotional life. Reciting the hours typically centered upon the reading of a number of psalms and other prayers.
A typical book of hours contains the Calendar of Church feasts, extracts from the Four Gospels, the Mass readings for major feasts, the Little Office of the Blessed Virgin Mary, the fifteen Psalms of Degrees, the seven Penitential Psalms, a Litany of Saints, an Office for the Dead and the Hours of the Cross. Most 15th-century books of hours have these basic contents. The Marian prayers Obsecro te ("I beseech thee") and O Intemerata ("O undefiled one") were frequently added, as were devotions for use at Mass, and meditations on the Passion of Christ, among other optional texts. Such books of hours continue to be used by many Christians today, such as the Agpeya of Coptic Christianity or The Brotherhood Prayer Book of Lutheranism.
The book of hours has its ultimate origin in the Psalter, which monks and nuns were required to recite. By the 12th century this had developed into the breviary, with weekly cycles of psalms, prayers, hymns, antiphons, and readings which changed with the liturgical season. Eventually a selection of texts was produced in much shorter volumes and came to be called a book of hours. During the latter part of the thirteenth century the Book of Hours became popular as a personal prayer book for men and women who led secular lives. It consisted of a selection of prayers, psalms, hymns and lessons based on the liturgy of the clergy. Each book was unique in its content though all included the Hours of the Virgin Mary, devotions to be made during the eight canonical hours of the day, the reasoning behind the name 'Book of Hours'.
Many books of hours were made for women. There is some evidence that they were sometimes given as a wedding present from a husband to his bride. Frequently they were passed down through the family, as recorded in wills. Until about the 15th century paper was rare and most books of hours consisted of parchment sheets made from animal skins.
Although the most heavily illuminated books of hours were enormously expensive, a small book with little or no illumination was affordable much more widely, and increasingly so during the 15th century. The earliest surviving English example was apparently written for a laywoman living in or near Oxford in about 1240. It is smaller than a modern paperback but heavily illuminated with major initials, but no full-page miniatures. By the 15th century, there are also examples of servants owning their own Books of Hours. In a court case from 1500, a pauper woman is accused of stealing a domestic servant's prayerbook.
Very rarely the books included prayers specifically composed for their owners, but more often the texts are adapted to their tastes or sex, including the inclusion of their names in prayers. Some include images depicting their owners, and some their coats of arms. These, together with the choice of saints commemorated in the calendar and suffrages, are the main clues for the identity of the first owner. Eamon Duffy explains how these books reflected the person who commissioned them. He claims that the "personal character of these books was often signaled by the inclusion of prayers specially composed or adapted for their owners." Furthermore, he states that "as many as half the surviving manuscript Books of Hours have annotations, marginalia or additions of some sort. Such additions might amount to no more than the insertion of some regional or personal patron saint in the standardized calendar, but they often include devotional material added by the owner. Owners could write in specific dates important to them, notes on the months where things happened that they wished to remember, and even the images found within these books would be personalized to the owners—such as localized saints and local festivities.
By at least the 15th century, the Netherlands and Paris workshops were producing books of hours for stock or distribution, rather than waiting for individual commissions. These were sometimes with spaces left for the addition of personalized elements such as local feasts or heraldry.
The style and layout for traditional books of hours became increasingly standardized around the middle of the thirteenth century. The new style can be seen in the books produced by the Oxford illuminator William de Brailes who ran a commercial workshop (he was in minor orders). His books included various aspects of the Church's breviary and other liturgical aspects for use by the laity. "He incorporated a perpetual calendar, Gospels, prayers to the Virgin Mary, the Stations of the Cross, prayers to the Holy Spirit, Penitential psalms, litanies, prayers for the dead, and suffrages to the Saints. The book’s goal was to help his devout patroness to structure her daily spiritual life in accordance with the eight canonical hours, Matins to Compline, observed by all devout members of the Church. The text, augmented by rubrication, gilding, miniatures, and beautiful illuminations, sought to inspire meditation on the mysteries of faith, the sacrifice made by Christ for man, and the horrors of hell, and to especially highlight devotion to the Virgin Mary whose popularity was at a zenith during the 13th century." This arrangement was maintained over the years as many aristocrats commissioned the production of their own books.
By the end of the 15th century, the advent of printing made books more affordable and much of the emerging middle-class could afford to buy a printed book of hours, and new manuscripts were only commissioned by the very wealthy. The Kitab salat al-sawai (1514), widely considered the first book in Arabic printed using moveable type, is a book of hours intended for Arabic-speaking Christians and presumably commissioned by Pope Julius II.
As many books of hours are richly illuminated, they form an important record of life in the 15th and 16th centuries as well as the iconography of medieval Christianity. Some of them were also decorated with jewelled covers, portraits, and heraldic emblems. Some were bound as girdle books for easy carrying, though few of these or other medieval bindings have survived. Luxury books, like the Talbot Hours of John Talbot, 1st Earl of Shrewsbury, may include a portrait of the owner, and in this case his wife, kneeling in adoration of the Virgin and Child as a form of donor portrait. In expensive books, miniature cycles showed the Life of the Virgin or the Passion of Christ in eight scenes decorating the eight Hours of the Virgin, and the Labours of the Months and signs of the zodiac decorating the calendar. Secular scenes of calendar cycles include many of the best known images from books of hours, and played an important role in the early history of landscape painting.
From the 14th century decorated borders round the edges of at least important pages were common in heavily illuminated books, including books of hours. At the beginning of the 15th century these were still usually based on foliage designs, and painted on a plain background, but by the second half of the century coloured or patterned backgrounds with images of all sorts of objects, were used in luxury books.
Second-hand books of hours were often modified for new owners, even among royalty. After defeating Richard III, Henry VII gave Richard's book of hours to his mother, who modified it to include her name. Heraldry was usually erased or over-painted by new owners. Many have handwritten annotations, personal additions and marginal notes but some new owners also commissioned new craftsmen to include more illustrations or texts. Sir Thomas Lewkenor of Trotton hired an illustrator to add details to what is now known as the Lewkenor Hours. Flyleaves of some surviving books include notes of household accounting or records of births and deaths, in the manner of later family bibles. Some owners had also collected autographs of notable visitors to their house. Books of hours were often the only book in a house, and were commonly used to teach children to read, sometimes having a page with the alphabet to assist this.
Towards the end of the 15th century, printers produced books of hours with woodcut illustrations, and the book of hours was one of the main works decorated in the related metalcut technique.
In the 14th century the book of hours overtook the psalter as the most common vehicle for lavish illumination. This partly reflected the increasing dominance of illumination both commissioned and executed by laymen rather than monastic clergy. From the late 14th century a number of bibliophile royal figures began to collect luxury illuminated manuscripts for their decorations, a fashion that spread across Europe from the Valois courts of France and the Burgundy, as well as Prague under Charles IV, Holy Roman Emperor and later Wenceslaus. A generation later, Duke Philip the Good of Burgundy was the most important collector of manuscripts, with several of his circle also collecting.: 8–9 It was during this period that the Flemish cities overtook Paris as the leading force in illumination, a position they retained until the terminal decline of the illuminated manuscript in the early 16th century.
The most famous collector of all, the French prince John, Duke of Berry (1340–1416) owned several books of hours, some of which survive, including the most celebrated of all, the Très Riches Heures du Duc de Berry. This was begun around 1410 by the Limbourg brothers, although left incomplete by them, and decoration continued over several decades by other artists and owners. The same was true of the Turin-Milan Hours, which also passed through Berry's ownership.
By the mid-15th century, a much wider group of nobility and rich businesspeople were able to commission highly decorated, often small, books of hours. With the arrival of printing, the market contracted sharply, and by 1500 the finest quality books were once again being produced only for royal or very grand collectors. One of the last major illuminated book of hours was the Farnese Hours completed for the Roman Cardinal Alessandro Farnese in 1546 by Giulio Clovio, who was also the last major manuscript illuminator.
See Category:Illuminated books of hours for a fuller list
The book of hours was the favourite prayer-book of lay-people, and enabled them to follow, in private, the church's programme of daily devotion at the seven canonical hours.
In short, the Brotherhood Prayer Book is a fully catholic book of hours refracted through the lens of the Lutheran confessions. | https://db0nus869y26v.cloudfront.net/en/Book_of_hours |
The digital clinical trial revolution has transformed all aspects of our lives. As our devices become increasingly connected and access to information flourishes, new categories have emerged.
Health is one of the industries with the greatest potential for innovation. Yet, because it has been less beholden to user preferences, the clinical research industry has been late to adopt digital clinical trials, moving slowly to implement the digital tools that hold the key to safer, more efficacious therapeutics.
Speak with Our Clinical Operations Team about Conducting a Digital Clinical Trial
From on-site to on-the-go data reporting.
A once novel concept, electronic (health) data capture (EDC), first introduced in the 1980s, has taken decades to catch on; start-up technology costs made digital transfers more challenging, and pharmaceutical giants were heavily reliant on paper-based, on-site reporting. However, the growing use of web-based software by investigational sites has more recently led to broad adoption of EDC technology, which in turn has spawned the birth of the digital clinical trial.
Today, increasing bandwidth, improved WIFI, and bluetooth technology are driving new ways to capture data at the point of origin, rather than transcribe or move it from one repository/system to another. This has led to digital transformation in clinical trials based on esource data, where EDC is just one of the electronic sources.
The Transcelerate cross-industry esource initiative defines esource as inclusive of four categories of data:
1. Electronic Health Records (EHR) – collected and/or reused for clinical research.
2. Devices and apps- Data coming from electronic patient-reporting (ePRO), wearables, sensors, and clinical outcome assessments by medical staff (eCOA).
3. Non-CRF - Data collected from third-party safety labs, imaging, and other data that isn't into a case report form.
4. Direct Data Capture (DCC) - Data entered directly by site staff during a trial.
Enhanced operational efficiency brings new challenges.
The technology revolution that opened the door to electronic patient-reported outcomes (ePRO) and digital health technologies such as wearables and in-home medical devices has expanded operational capabilities and boosted efficiency. But it has also created challenges, as there has been limited interoperability between data systems.
Legacy contract research organizations (CROs) who have run trials through their sites for decades are scrambling to reinvent the way they operate, moving towards more patient-centric designs equipped to manage the collection of data sets from disparate sources. By contrast, companies like ObvioHealth are part of a new wave of VRO's (Virtual Research Organizations) built from the ground up to run anything. Still, nothing but digital clinical trials and are transforming the clinical trial experience.
Digital clinical trials are faster, more secure, less complicated, and better at generating the information required to drive innovation. They are a tremendous asset to the research industry and a valuable resource for developing enhanced therapeutics.
Digital Clinical Trial companies like ObvioHealth generate quality data by creating and implementing clinical trial protocols that streamline data collection and achieve faster enrollment, higher compliance, and greater retention.
Digital clinical trials are digital end to end. The virtual site teams use social media and other digital tools to target trial cohorts more efficiently than on-site HCPs. Many of the trials are 100% remote, enabling people to participate from the comfort of their homes.
Virtual studies are so much more convenient for participants that they do a better job keeping them engaged from start to finish. Engaged patients are more likely to adhere to study protocols (reporting health-related endpoints more reliably), use wearables to capture data more easily, and consume the study product more regularly, with gentle nudges from digital clinical trial coordinators to remind them when they forget to comply. For researchers, this means more robust, real-time data that is more representative of health-outcomes in the real-world.
Here’s further evidence in support of digital capabilities over outdated systems:
Recruitment
Up to 4x Quicker
ObvioHealth digital trials to date have recruited participants 2-4 times more quickly than traditional trials. Many individuals are unaware of the trials which might be relevant for them. We can fill recruitment because we can reach them more effectively online, providing access to trials for individuals residing too far from a clinic or research center or those who aren't enrolled in a patient database.
Adherence
48% Higher Medication Adherence
People often forget to take their medication, and the situation is no different for participants. ObvioHealth has developed an effective interplay between tech and team to increase adherence. This involves sending automatic notifications to participants to remind them to take their medication or use the product. The digital nature of reporting enables us to see any drop-off in reporting and quickly reach out to participants to understand and correct any issues.
Retention
60% Fewer Dropouts
Our clinical trials incorporate a patient-centric design that makes participation less complicated and burdensome for participants, either minimizing or eliminating required site visits. This seamless participant journey with personalized support from start to finish makes for a seamless digital experience.
We'll help you design and optimize your next digital trial.
Next-Gen Data Capture for Real-World Insights
Real-world Data
Ask any clinical trial manager. He or she will tell you that trying to capture vitals data from participants when they make only occasional visits to a clinic is a real challenge. Take blood pressure, for example. People get nervous when coming to a clinic.
As a result, their blood pressure can often rise when being recorded by a doctor or nurse. "Whitecoat hypertension" is a known phenomenon, leading to higher readings in the clinic than at home.
Given the importance of accurately measuring the impact of a study product on health outcomes, including blood pressure, the advantage of at-home readings to minimize the whitecoat effect is self-evident, with the potential to provide a more accurate representation of how the product will perform in the real world.
Complete Data Sets
Most site-based clinical trial teams are familiar with the following scenario: a participant is seen sitting in his/her car or the waiting room, frantically trying to complete his or her study activities before an appointment.
ObvioHealth's more user-friendly approach to digital clinical trials makes this scenario much less likely. Because data-entry is more comfortable and quicker for participants, they only need to tap on their smartphone screen to report medication adherence, complete a digital questionnaire, or report a symptom or side effect.
Remote monitoring can be set up to alert researchers concerning health-related endpoints in real-time. With participant approval, wearable devices/sensors provide the added benefit of continuous and passive data from vitals measurements.
A digital clinical study design can transform an overburdened participant, who reluctantly finishes study activities, into one who remains engaged and adherent to the protocol. Better compliance rates translate to better data and, ultimately, more comprehensive information for sponsors. See below for the proven methods we use to drive high compliance rates throughout the clinical trial journey.
Efficient Recruitment & Enrollment
Traditional clinical trials are often hard to recruit. ObvioHealth utilizes digital recruitment methods that engage untapped participant pools. This can help people who are struggling to cope with their symptoms of disease/condition but don't realize that a clinical trial is available to them.
Digital clinical trial recruitment allows our team to target potential participants as they browse social websites or submit queries to a search engine instead of relying purely on physician referrals. An electronic informed consent document (eIC) then enables participants to review a given protocol's details and sign on once they are comfortable.
During this time, the study staff is available via text or phone to resolve concerns and answer questions. After enrollment is completed, research materials can often be sent directly to participants without having them go to a clinic or hospital for pickup. In addition to making the participant's life more comfortable during recruitment and enrollment, these digital recruitment strategies also address some of the hurdles of the under-representation of both minorities and particular demographics in clinical research.
Study Team Engagement Prompts
Prompts: Reminders (via smartphone notifications) pertaining to required study activities encourage participants to stay on course, thereby increasing protocol compliance.
Access to study team: Participants who have a question or concern have direct access to a research team member through a chat function available within the app.
Outcomes Measurement Made Easy
ePROs (diaries, adherence reporting, etc.) – In ObvioHealth's digital trials, participants download our app and interface with their smartphone to submit electronic patient-reported outcomes (ePRO).
By leveraging the app, patients have access to study activities both when at-home or while on-the-go. Our clinical research staff and knowledgeable tech team work closely to design easy-to-complete questionnaires, patient diaries, and other digital reporting tools.
With a direct line of communication with the study staff, it only takes a moment to ask questions or obtain help with troubleshooting. Read more on our digital trial solution.
Image, audio, and video capture – Self-reporting can be supplemented by technology to reduce bias and/or errors during data entry. For example, during a recent study, ObvioHealth instructed parents to provide photos of their infants' stools instead of relying solely on patient reporting accuracy.
Two off-site study coordinators were able to properly assess the stool consistency and color based upon the captured images. A final review showed that parents often graded their infant's sample as 'normal' when, in reality, the expert analysis provided a more accurate representation of the samples.
A separate study implemented a recording device to capture audio of crying/fussing events among infants. Mothers were instructed to record the crying/fussing manually. After analyzing both data sets, researchers identified inconsistencies between data derived from the devices and data reported by mothers. Parents, possibly influenced by exhaustion, submitted data that showed crying times up to 4x longer than the recorder.
Device Integration – A study protocol designed to support wearables and/or digital devices allows for continuous and passive data collection without increasing patient burden.
By eliminating manual data entry for vitals measurements, we minimize error during data input, gaining a complete view of the range in each vital over time while allowing participants to avoid disruption in their daily lives.
Are you sure your study requires site visits?
Speak to our clinical operations team today about using digital tools to minimize or eliminate site visits.
Many of our clients understand the benefits of digital research but need assistance imagining a fully virtual protocol or transitioning an existing protocol to take advantage of digital components.
The most common questions we receive are:
• "What kind of protocols are best adapted to digital clinical trials?"
• "How can I be sure the data collected remotely will be accurate?"
• "How do you integrate with sponsor or site data?"
Of course, each trial needs to be assessed based on its specific objectives. Still, from experience on 30+ digital clinical trials, we can confidently state that there is more potential to go virtual in your protocols than you may think. We have worked across more than 16 therapeutic areas and 28 countries designing and running trials that are either partially or fully virtual.
The hybrid trials have integrated site data seamlessly side-stepping the issues with complex EDCs by collecting the data from the sites at the source and channeling it directly into our cloud.
A couple of examples may help to bring the digital clinical trial experience to life:
Case Study: Assessing Efficacy & Understanding Consumer Likeability of a Fiber Ingredient
• 400 study subjects recruited in 28 days
• 85% questionnaire compliance
• <10% of the allocated budget spent during recruitment
Objective
A leading plant-based food company sought to explore consumer likeability and gastrointestinal (GI) response regarding a reformulated fiber snack bar's consumption.
Approach
ObvioHealth utilized its proven digital recruitment strategy to target and enroll 400 study subjects across 48 states in the continental U.S. in under one month. Researchers randomized participants into four separate arms to test three separate dosages of the ingredient and one placebo group. From initial targeting to final review/singing of eIC, the complete enrollment process was carried out virtually (zero site visits).
Approach (Pt. 2)
From data collection and storing to final analysis, the complete clinical data management process was constructed and performed by ObvioHealth. When participants reported health-related outcomes via the app, the research staff could remotely monitor clinical endpoints related to efficacy, GI tolerance, and consumer perception of the product.
Results
• The client leveraged the data to launch its product successfully.
• Database lock was met within four weeks of LPO.
• 92% of participants completed the study
Case Study: Evaluating Safety and Efficacy of COVID-19 Treatment
One of our current studies aims to measure the safety and effectiveness of a COVID-19 treatment developed by a specialty biopharmaceutical company. Current clinical trials on treatments like Remdesivir have been conducted on hospitalized patients with constant on-site monitoring. However, most COVID-19 patients have been directed to quarantine at home. This creates an unmet demand for a clinically proven COVID-19 treatment designed to be taken orally at home. Until recently, it was assumed that patients would need to visit a research center or clinic for health-related measurements during such a trial.
The swift emergence of 510(k)-cleared medical devices for at-home use has legitimized remote participation in pivotal research studies. Researchers can capture more robust, real-world data points that provide more precise insights on clinical outcomes.
Objective
Determine the safety, tolerability, and efficacy of a COVID-19 oral treatment in at-home patients.
Approach (Pt. 1)
This study is designed as a randomized, double-blind, two-part hybrid study (minimized site visits) with a placebo group. Patients with symptomatic, diagnostically confirmed COVID-19 will be enrolled at a research center. Once enrolled, participants will be sent the study product and multiple digital devices to collect ePRO and telemetric data to assess safety, efficacy, and tolerability from home.
Approach (Pt. 2)
Patients will receive training to ensure they understand how to operate each device; vitals measurements will include respiratory and pulse rates, electrocardiogram, blood pressure, pulse oximetry, and temperature.
In-home visits will be conducted in intervals throughout the study. Medical personnel will check-in on patients and retrieve blood samples for specific laboratory parameters, conduct virus PCR swabs, and assist with data capture/troubleshooting with any study tools.
Results
This study is ongoing, so results cannot yet be determined. However, ObvioHealth has worked closely with the sponsor to create a protocol conducive to high engagement, compliance, and retention rates.
By supplementing data collected in-person with remote monitoring and ePRO, we have minimized required site visits to just one initial baseline reading. By alleviating the pain points of traditional trials, digital clinical trials produce higher quality, more complete data.
Other Benefits to Going Digital for Researchers
Streamlined Operations
A digital (or virtual) clinical trial design can be deployed to keep studies on track. For example, in traditional clinical trials, recruitment is often completed by HCPs who supply patient referrals from their database. This is usually a slow-moving process, filled with travel requirements, disruption to daily routine, etc. Digital recruitment strategies and remote monitoring enable digital clinical trials that were previously improbable.
Real-time Data Visualization
Easier aggregation of data at the back end also enables real-time monitoring by study teams and reporting to sponsors who can see how a study progresses and make strategic decisions more efficiently.
Safety
The safety benefits of digital trials go without saying. The COVID-19 pandemic forced researchers to shut down sites to adhere to safety guidelines, but thanks to the digital transformation in clinical trials, studies are back up and running. The inclusion of remote monitoring into protocols allows researchers to pay close attention to concerning health-related data. As a result, the clinical operations team is alerted to potential AE/SAE in real-time, enabling immediate action to prevent symptoms from worsening. Gone are the days where patients must call or schedule a site-visit to report health-related concerns.
Cost Savings
Digital clinical trials eliminate many of the cost factors associated with conventional 'on-site' research. Digital targeting and econsent minimize sluggish enrollment. By reducing disruption, operational expenditures, and patient burden, researchers eliminate many avoidable expenses that inflate the final cost of a study. With fewer expenses related to site operations (on-site recruitment, monitoring), sponsors can implement a cost-effective trial design that takes less time to complete, thus staying within budget from recruitment through end-of-study.
Electronic Data Capture may have taken decades to catch on, but COVID-19 has accelerated the transformation to digital clinical trials exponentially. ObvioHealth was already conducting these trials four years ago. Today, we are at the forefront of making them a reality for patients and sponsors worldwide.
Are you interested in learning more about the advantages of our virtual platform? Fill out the form below, and we'll be in touch! | https://www.obviohealth.com/digital-clinical-trials-outperform-traditional-rcts |
Picture shown for illustrative purposes only.
Imran Mojib, Special Correspondent
Despite the many challenges for those engaged in the children’s film industry, including the lack of online access to all children during the current circumstances, “the future for children’s cinema remains very bright,” said Firdoze Bulbulia of the Nelson Mandela Children’s Film Festival in South Africa.
“The effort that we put in, the time we give, and the possibilities and partnerships we have with like-minded entities across the globe promoting quality children’s cinema, gives me hope,” said the filmmaker, during the Children’s Cinema Global Forum, hosted by the Sharjah International Film Festival for Children and Youth (SIFF) and the Lahore International Children’s Film Festival, on Friday and Saturday.
READ MORE
Four-year-old girl discovers 220-million-year-old dinosaur footprint on Wales beach
UAE to go on helping patients of neglected tropical diseases
The two-day virtual Forum had several thought-provoking discussions focusing on ‘Children’s Cinema – Past and Future’ that offered an insight into the potential of cinema as a tool for entertainment, education and learning in the future.
French director and academic Prof. Dragan M. Fimon said that to empower children, visual medium educators must tell stories from everyday life that children can relate to and which are rooted in their respective social and cultural backgrounds. Involving children in the filmmaking process and ensuring their active participation is vital to present stories from their point of view.
Meenakshi Vinay Rai, Director of Chinh India Film Festival, India, said, “The future of cinema is not what adults can create for children — they need a different kind of energy that can be realised only through their creativity; we can only provide a guiding framework to build on.”
Describing her experience of working with children who have created “bold and brutally honest cinema” that reflect their realities and are often beyond the comprehension of adults, she added, “What is required from our generation is a great level of tolerance to accept what we do not understand.”
At a session titled ‘Festivals in 2020 and Post COVID-19’, audiences heard about the challenges that were faced by organisers of the most prestigious film festivals, globally, faced in the aftermath of the worst health crisis in over a century.
Guest speakers Dan Bennett - Director of Los Angeles International Children’s Film Festival, USA; Claudio Gubitosi - Director of Giffoni Film Festival, Italy, and Keith Bennie - Director of Audience & Community, Toronto International Film Festival, Canada, opened up to the session moderator, Shoaib Iqbal, about how, they faced an unprecedented challenge head on and innovated every day to keep their audiences engaged and their businesses afloat.
Recounting how the Los Angeles International Children’s Film Festival was ready to go for their 2020 edition by December 2019, Bennett noted, “Suddenly it became apparent that it wasn’t going to go. The lockdown was immediate and drastic, and left us with no time to react.”
Eventually, Bennett and his team at the LA International Children’s Film Festival wrapped their head around the situation and pivoted to leverage all available digital bridges — Facebook, Twitter, Instagram — to connect with audiences of all age groups. Their digital platforms allow organisers and viewers the opportunity to offer inputs about film selections, and connect filmmakers to their audiences.
“We’re going to do an in-person festival in December if health and safety guidelines permit,” noted a positive and hopeful Dan.
Claudio Gubitosi, who has been the director of Giffoni Film Festival since its inception, said the pandemic struck during the year the organisers were planning the event’s 50th edition. “Last March, I realised I quickly needed a Plan B. It was important to not lose touch with my community. We have millions of Giffoners around the world, and I had to find a way to reassure them that Giffoni is here, and it is here to stay.”
During the first lockdown in Italy, from March - May, the festival set up Zoom discussions with actors, politicians, doctors, filmmakers because he felt a need to keep the community together, and engaged.
“I sensed a frailty in both industry and in community,” he noted that he had several apprehensions about how he would present an in-person event in a way that ensures everybody’s safety and wellbeing.
SIFF’s vast repository of high-quality content spanning series, films, cartoons, songs, stories, and educational videos, will be available free-of-charge on MENA Mobile’s Bustan app.
Eighth edition of SIFF to host 48 film premieres, which comprise 4 movies from the UAE, 3 from the GCC, 35 from the Middle East, and 6 films representing the unique vision of global filmmakers.
Festival organiser FUNN has confirmed that this edition will offer young cinema enthusiasts a unique opportunity to interact with top Arab and international actors and filmmakers.
Scheduled to be held from Oct.11-16, SIFF is one of the most anticipated cultural events organised by Sharjah and is the first film festival in the UAE and the Arab region to celebrate children’s and youth cinema.
Safwan is a resident of the emirate of Abu Dhabi, who purchased the ticket 011830.
Passengers expressed their gratitude to Sharjah Airport for the seamless procedures that enabled pilgrims to speed up travel processes, locate their designated gates with ease, as well as receive quality assistance services.
Sheikh Hamdan Bin Mohammed Bin Rashid Al Maktoum, Crown Prince of Dubai and Chairman of the Executive Council, approved a new reward system for Dubai's best high school students.
Currently, with the increase in fuel prices, the taximeter starts from Dhs7 during the time between 8:00am and 10:00pm with a minimum fare of Dhs17.5, and during the time between 10:00pm and 6:00am, starts from Dhs9 with a minimum fare of Dhs19.5. | https://www.gulftoday.ae/news/2021/01/30/future-for-children-cinema-remains--bright |
---
abstract: 'We study the Hecke algebra $\H(\bq)$ over an arbitrary field $\FF$ of a Coxeter system $(W,S)$ with independent parameters $\bq=(q_s\in\FF:s\in S)$ for all generators. This algebra is always linearly spanned by elements indexed by the Coxeter group $W$. This spanning set is indeed a basis if and only if every pair of generators joined by an odd edge in the Coxeter diagram receive the same parameter. In general, the dimension of $\H(\bq)$ could be as small as $1$. We construct a basis for $\H(\bq)$ when $(W,S)$ is simply laced. We also characterize when $\H(\bq)$ is commutative, which happens only if the Coxeter diagram of $(W,S)$ is simply laced and bipartite. In particular, for type A we obtain a tower of semisimple commutative algebras whose dimensions are the Fibonacci numbers. We show that the representation theory of these algebras has some features in analogy/connection with the representation theory of the symmetric groups and the 0-Hecke algebras.'
address: 'Department of Mathematics and Statistics, University of Nebraska at Kearney, Kearney, Nebraska, USA'
author:
- Jia Huang
title: Hecke algebras with independent parameters
---
[^1]
Introduction
============
Let $W:=\langle S:(st)^{m_{st}}=1,\ \forall s,t\in S \rangle$ be a Coxeter group. The *(Iwahori-)Hecke algebra* of the Coxeter system $(W,S)$ is a one-parameter deformation of the group algebra of $W$, which has significance in many areas, such as algebraic combinatorics, knot theory, quantum groups, representation theory of $p$-adic groups, and so on. We generalize the definition of the Hecke algebra of $(W,S)$ from a single parameter to multiple independent parameters.
\[def:Hq\] Let $\FF$ be an arbitrary field. The *Hecke algebra $\H(\bq)=\H_S(\mathbf q)$ of the Coxeter system $(W,S)$ with independent parameters $\bq=(q_s\in\FF:s\in S)$* is the (associative) $\FF$-algebra generated by $\{T_s:s\in S\}$ with
- quadratic relations $(T_s-1)(T_s+q_s)=0$ for all $s\in S$,
- braid relations $(T_sT_tT_s\cdots)_{m_{st}} = (T_tT_sT_t\cdots)_{m_{st}}$ for all $s,t\in S$.
Here $(aba\cdots)_m$ is an alternating product of $m$ terms.
The algebra $\H(\bq)$ can be represented by the Coxeter diagram of $(W,S)$ with extra labels $q_s$ for all vertices $s\in S$. For simplicity we only draw the labels of the vertices but not the vertices themselves. For example, we draw $$\xymatrix @C=8pt{
1 \ar@{=}[r] & 0 \ar@{-}[r] & 1\ar@{-}[r] & 0\ar@{-}[r] & 1\ar@{-}[r] & 0 \ar@{-}[r] & 1 \ar@{-}[r] & 0
}$$ for the usual Coxeter system of type $B_8$ whose Coxeter diagram is $$\xymatrix @C=8pt{
s_1 \ar@{=}[r] & s_2 \ar@{-}[r] & s_3 \ar@{-}[r] & s_4 \ar@{-}[r] & s_5 \ar@{-}[r] & s_6 \ar@{-}[r] & s_7 \ar@{-}[r] & s_8
}$$ with independent parameters $\bq=(q_{s_i}:1\leq i\leq 8)=(1,0,1,0,1,0,1,0)$. The quadratic relations for $\H(\bq)$ can be rewritten as $T_s^2=(1-q_s)T_s+q_s$ for all $s\in S$. If $q_s\ne0$ then $T_s$ is invertible and $T_s^{-1}=q_s^{-1}T_s+1-q_s^{-1}$. For any $w\in W$ with a reduced expression $w=st\cdots r$ where $s,t,\ldots,r\in S$, the element $T_w:=T_sT_t\cdots T_r$ is well defined thanks to the word property of $W$ (see e.g. [@BjornerBrenti Theorem 3.3.1]).
If $q_s=q$ for all $s\in S$ then $\H(\bq)$ is the usual Hecke algebra of $(W,S)$ with parameter $q$. If one only insists $q_s=q_t$ whenever $m_{st}$ is odd, then $\H(\bq)$ is the *Hecke algebra with unequal parameters* in the sense of Lusztig [@Lusztig]. Now we allow $\bq=(q_s\in\FF:s\in S)$ to be arbitrary. The following result may be well known to the experts, and we include a proof for it in the end of Section \[sec:collapse\] for completeness.
\[thm:TwBasis\] The algebra $\H(\bq)$ is always spanned by $\{T_w:w\in W\}$, which is indeed a basis if and only if $\H(\bq)$ is a Hecke algebra with unequal parameters, i.e. $q_s=q_t$ whenever $m_{st}$ is odd.
In general, we show that the algebra $\H(\bq)$ could be much smaller than the group algebra $\FF W$.
\[thm:collapse\] If there exist $s,t\in S$ with $m_{st}$ odd such that $q_s$ and $q_t$ are distinct nonzero parameters, then one has $\H_S(\bq) \cong \H_{S\setminus R}(\bq)$ where $R$ consists of all elements $r\in S$ connected to $s$ via some path with odd edge weights and nonzero vertex labels in the Coxeter diagram of $(W,S)$.
Thus we always assume without loss of generality that $\H(\bq)$ is *collapse-free*, i.e. if $m_{st}$ is odd and $q_s\ne q_t$ then at least one of $q_s$ and $q_t$ is $0$. We next characterize when $\H(\bq)$ is commutative.
\[thm:commut\] The algebra $\H(\bq)$ is collapse-free and commutative if and only if $(W,S)$ is simply laced and exactly one of $q_s$ and $q_t$ is $0$ for any pair of elements $s,t\in S$ with $m_{st}=3$.
We construct a basis for $\H(\bq)$ (not necessarily commutative) when $(W,S)$ is simply laced (Theorem \[thm:SimplyLaced\]). It implies the dimension a commutative $\H(\bq)$, giving one motivation for our study of the commutative case.
\[cor:DimFib\] Let $G$ be the underlying graph of the Coxeter diagram of $(W,S)$, and let $\II(G)$ be the set of all independent sets in $G$. If $\H(\bq)$ is collapse-free and commutative then its dimension is $|\II(G)|$ (the Merrifield-Simmons index of the graph $G$). In particular, if $(W,S)$ is of type $A_n$ then the dimension of $\H(\bq)$ is the Fibonacci number $F_{n+2}$.
Let $\FF$ be a field with at least $3$ distinct elements 0, 1, and c. Let $\H(\bq)$ be given by the diagram below. $$\scriptsize
\xymatrix @R=0pt @C=8pt {
0 \ar@{-}[rd] & & & & \framebox{c}\ar@{=}[r] & 1\ar@{-}[r] & 0\ar@{-}[r] & 1\\
& \framebox{1} \ar@{-}[r] & \framebox{1}\ar@{-}[r] & \framebox{c} \ar@{-}[rd] \ar@{-}[ru] \\
\framebox{1} \ar@{-}[ru] & & & & {\rm c} \ar@{=}[r] & 1\ar@{=}[r] & \framebox{c}\ar@{-}[r] & \framebox{1} \\
}
%\qquad \qquad\xymatrix @R=8pt @C=10pt {
%0 \ar@{-}[rd] & & & & 2 & 1\ar@{-}[r] & 0\ar@{-}[r] & 1\\
%& 1 \ar@{-}[r] & 1 \ar@{-}[r] & 2 \ar@{-}[rd] \ar@{-}[ru] \\
%1 \ar@{-}[ru] & & & & 2 & 1 & 2\ar@{-}[r] & 1
%}$$ Removing the boxed elements gives $3$ connected components $0$, $\xymatrix @C=8pt{ {\rm c} \ar@{=}[r] & 1,}$ and $\xymatrix @C=8pt{ 1 \ar@{-}[r] & 0 \ar@{-}[r] & 1. }$ Thus the dimension of $\H(\bq)$ is $2\cdot 8\cdot 5 =80$ by Theorem \[thm:collapse\], Theorem \[thm:commut\], and Corollary \[cor:DimFib\].
Theorem \[thm:commut\] shows that if $\H(\bq)$ is collapse-free and commutative then the Coxeter diagram of $(W,S)$ must be a simply laced bipartite graph. Computations in [Magma]{} suggest the following conjecture, which is verified for type A (Theorem \[thm:MinDimTypeA\]). This gives another motivation for our study of the commutative case.
If the Coxeter diagram of $(W,S)$ is a simply laced bipartite graph $G$, then a collapse-free $\H(\bq)$ has minimum dimension equal to $|\II(G)|$, which is attained when $\H(\bq)$ is commutative.
For the irreducible simply laced Coxeter systems of type $A$, $D$, $\widetilde A$, and $\widetilde D$, the dimensions of collapse-free and commutative Hecke algebras $H(\bq)$ are given below, which all happen to satisfy the Fibonacci recurrence.
Coxeter diagram Dimensions Known as OEIS entry
------------------ --------------- ----------------------------- ------------
$A_n$ ($n\geq1$) 2,3,5,8,13,… Fibonacci numbers $F_{n+2}$ A000045
$D_n$ ($n\geq2$) 4,5,9,14,23,… ? A000285
Note that the Coxeter diagram of $\widetilde A_n$ is a cycle of length $n$, which is bipartite if and only if $n$ if even. However, the dimensions given above for $\widetilde A_n$ make sense for all integers $n\geq1$. This is because we can define a commutative algebra $\H(G,R)$ whose dimension is $|\II(G)|$ for any (unweighted) simple graph $G$ with vertex set $V(G)$ and edge set $E(G)$ and for any $R\subseteq V(G)$, such that a collapse-free and commutative Hecke algebra $\H(\bq)$ is isomorphic to $\H(G,R)$ where $G$ is the Coxeter diagram of the simply laced $(W,S)$ and $R=\{s\in S:q_s=-1\}$. This algebra $\H(G,R)$ is defined as the quotient of the polynomial algebra $\FF[x_v:v\in V(G)]$ by its ideal generated by $$\{x_r^2: r\in R\} \cup
\{x_v^2-x_v: v\in V(G)\setminus R\} \cup
\{x_ux_v: uv\in E(G)\}.$$It is also a quotient of the *Stanley-Reisner ring of the independence complex of $G$* [@CookNagel].
We show the following results on the representation theory of $\H(G,R)$. The projective indecomposable $\H(G,R)$-modules are indexed by $\II(G-R)$, where $G-R$ is the graph obtained form $G$ by deleting $R$ and all edges incident to $R$. The simple $\H(G,R)$-modules are all one-dimensional and also indexed by $\II(G-R)$. The Cartan matrix of $\H(G,R)$ is a diagonal matrix. The algebra $\H(G,R)$ is semisimple if and only if $R=\emptyset$.
We next apply the above results to type $A$. Let $G=P_{n-1}$ be a path with $n-1$ vertices. One sees that the dimension of the algebra $\H(P_{n-1},R)$ is equal to the Fibonacci number $F_{n+1}$. We further assume that this algebra is semisimple, i.e. $R=\emptyset$, and write $\H_n:=\H(P_{n-1},\emptyset)$. If $\cha(\FF)\ne2$ then $\H_n$ is isomorphic to the Hecke algebra $\H(\bq)$ of the Coxeter system of type $A_{n-1}$ with independent parameters $\bq=(0,1,0,1,\ldots)$ or $\bq=(1,0,1,0,\ldots)$. We summarize our results on the algebra $\H_n$ below. The reader who is familiar with the representation theory of the symmetric group $\SS_n$ and/or the 0-Hecke algebra $\H_n(0)$ can see certain features of our results in analogy with $\SS_n$ and/or $H_n(0)$.
The semisimple commutative algebra $\H_n$ has $F_{n+1}$ many non-isomorphic simple modules, which are all one-dimensional and indexed by compositions of $n$ with internal parts larger than $1$. The *Grothendieck group* $G_0(\H_n)$ of finite dimensional representations of $\H_n$ is a free abelian group on these simple $\H_n$-modules. The tower of algebras $\H_\bullet: \H_0\hookrightarrow \H_1\hookrightarrow \H_2\hookrightarrow \cdots$ has a *Grothendieck group* $$G_0(\H_\bullet):=\bigoplus_{n\geq0} G_0(\H_n)$$ with a product and a coproduct given by the induction and restriction along the embeddings $\H_m\otimes\H_n\hookrightarrow\H_{m+n}$.
Although *not* a bialgebra, $G_0(\H_\bullet)$ has a self-dual basis consisting of simple $\H_n$-modules for all $n\geq0$. We provide explicit formulas for the structure constants of the product and coproduct of $G_0(\H_\bullet)$ in terms of this self-dual basis, which are naturally all positive. This result connects $G_0(\H_\bullet)$ to the Grothendieck groups of the finite dimensional (projective) representations of the 0-Hecke algebras $\H_n(0)$, or equivalently, the dual Hopf algebras $\NSym$ of *noncommutative symmetric functions* and $\QSym$ of *quasisymmetric functions*. It turns out that $G_0(\H_\bullet)$ is a quotient algebra of $\NSym$ and a subcoalgebra of $\QSym$, but its antipode satisfies a different rule than the antipodes of $\QSym$ and $\NSym$. The *Bratteli diagram* of the tower $\H_\bullet$ is a binary tree on compositions with internal parts larger than $1$.
This paper is structured as follows. We first provide preliminaries in Section \[sec:pre\]. Then we discuss when $\H(\bq)$ collapses or becomes commutative in Section \[sec:collapse\]. We study the algebra $\H(\bq)$ of a simply laced Coxeter system in Section \[sec:simply-laced\], and investigate the simply laced bipartite case in Section \[sec:bipartite\]. We provide more results on the commutative case in Section \[sec:H(G,R)\], and give the type A specialization in Section \[sec:H01\]. Finally we give remarks and questions in Section \[sec:future\].
Preliminaries {#sec:pre}
=============
Coxeter groups and Hecke algebras {#sec:Coxeter}
---------------------------------
A *Coxeter group* is a group with the following presentation $$W:=\langle S:s^2=1,\ (sts\cdots)_{m_{st}}=
(tst\cdots)_{m_{st}},\ \forall s,t\in S,\ s\ne t \rangle$$ where the generating set $S$ is finite, $m_{st}\in\{2,3,\ldots\}\cup\{\infty\}$, and $(aba\cdots)_m$ is an alternating product of $m$ terms. By convention no relation is imposed between $s$ and $t$ if $m_{st}=\infty$. The pair $(W,S)$ is called a *Coxeter system*.
The Coxeter diagram of $(W,S)$ is an edge-weighted graph whose vertices are the elements in $S$ and whose edges are the unordered pairs $\{s,t\}$ with weight $m_{st}$ for all $s,t\in S$ such that $m_{st}\geq 3$, $s\ne t$. An edge with weight $m_{st}<\infty$ is often drawn as $m_{st}-2$ many multiple edges between $s$ and $t$. An edge is *simply laced* if its weight is $3$. If every edge is simply laced then the Coxeter system $(W,S)$ and its Coxeter diagram are both called *simply laced*. An element $w$ in $W$ can be written as a product of elements in $S$. Among all such expressions the shortest ones are called *reduced*, and the length of a reduced expression of $w$ is called the *length* of $w$ and denoted by $\ell(w)$. A *nil-move* deletes $s^2$ and a *braid-move* replaces $(sts\cdots)_{m_{st}}$ with $(tst\cdots)_{m_{st}}$ in the expressions of $w\in W$ as products of elements in $S$. By [@BjornerBrenti Theorem 3.3.1], $W$ satisfies the following word property.
**Word Property.** *Any expression of $w\in W$ as a product of elements in $S$ can be transformed into a reduced expression of $w$ by braid-moves and nil-moves, and every pair of reduced expressions for $w$ can be connected via braid-moves.*
A subset $I\subseteq S$ generates a *parabolic subgroup* $W_I:=\langle I\rangle$ of $W$. The pair $(W_I,I)$ is a Coxeter system whose Coxeter diagram is the edge-weighted subgraph of the Coxeter diagram of $(W,S)$ induced by the vertex subset $I\subseteq S$. If $S_1,\ldots,S_k$ are the vertex sets of the connected components of the Coxeter diagram of $(W,S)$ then $W = W_{S_1}\times\cdots\times W_{S_k}$. Thus $(W,S)$ is *irreducible* if its Coxeter diagram is connected.
There is a well known classification for finite irreducible Coxeter groups, among which type A is of particular interest. The symmetric group $\SS_n$ is the Coxeter group of type $A_{n-1}$ with generating set $S$ consisting of the adjacent transpositions $s_i:=(i,i+1)$ for $i=1,\ldots,n-1$. The Coxeter diagram of $\SS_n$ is the path $\xymatrix @C=9pt {s_1 \ar@{-}[r] & s_2 \ar@{-}[r] & \cdots \ar@{-}[r] & s_{n-1}}$.
The *(Iwahori-)Hecke algebra* $\H_S(q)$ of a Coxeter system $(W,S)$ is a one-parameter deformation of the group algebra of $W$. Let $\FF$ be a field and let $q\in\FF$. Then $\H_S(q)$ is defined as the $\FF$-algebra generated by $\{T_s:s\in S\}$ with
- quadratic relations: $(T_s-1)(T_s+q) = 1,\ \forall s\in S$,
- braid relations: $(T_sT_tT_s\cdots)_{m_{st}} = (T_tT_sT_t\cdots)_{m_{st}},\ \forall s, t\in S,\ s\ne t$.
The specialization of the Hecke algebra $\H_S(q)$ at $q=1$ gives the group algebra $\FF W$, and the specialization at $q=0$ gives the *0-Hecke algebra* $\H_S(0)$. If $(W,S)$ is of type $A_{n-1}$ then we write $\H_n(q):=\H_S(q)$ and $\H_n(0):=\H_S(0)$.
If $w\in W$ has a reduced expression $w=st\cdots r$, where $s,t,\ldots,r\in S$, then $T_w:=T_sT_t\cdots T_r$ is well defined thanks to the word property of $W$. It is well known that $\{T_w:w\in W\}$ is a basis for $\H_S(q)$. One has $$\label{eq:reg}
T_s T_w = \begin{cases}
(1-q)T_w+qT_{sw}, & \ell(sw)<\ell(w), \\
T_{sw}, & \ell(sw)>\ell(w),
\end{cases}$$ for all $s\in S$ and $w\in W$. This gives the *regular representation* of $\H_S(q)$.
Representation theory of associative algebras
---------------------------------------------
We review some general results on the representation theory of associative algebras; see e.g. [@ASS §I]. Let $\FF$ be a field and let $A$ be a finite dimensional (unital associative) $\FF$-algebra. Let $M$ be a (left) $A$-module. If $M$ has no submodules except $0$ and itself then $M$ is *simple*. If $M$ is a direct sum of simple $A$-modules then $M$ is *semisimple*. The algebra $A$ is *semisimple* if it is semisimple as an $A$-module. Every module over a semisimple algebra is also semisimple. If $M$ cannot be written as a direct sum of two nonzero $A$-submodules, then $M$ is *indecomposable*. If $M$ is a direct summand of a free $A$-module, then $M$ is *projective*.
The *(Jacobson) radical* ${\rm rad}(M)$ of $M$ is the intersection of all maximal $A$-submodules of $M$, which turns out to be the smallest submodule $N$ of $M$ such that $M/N$ is semisimple. One has $
\rad(M_1\oplus M_2) = {\rm rad}(M_1)\oplus\rad(M_2)
$ if $M_1$ and $M_2$ are two $A$-modules. The radical of the algebra $A$ is defined as $\rad(A)$ with $A$ itself viewed as an $A$-module. If $A$ happens to be commutative then all nilpotent elements in $A$ form an ideal of $A$, called the *nilradical* of $A$, which is always contained in $\rad(A)$. The *top* of $M$ is the quotient module ${\rm top}(M):=M/{\rm rad}(M)$. The *socle* ${\rm soc}(M)$ of $M$ is the sum of all minimal submodules of $M$, which is the largest semisimple submodule of $M$.
Every $A$-module can be written as a direct sum of indecomposable $A$-submodules. Let $A$ itself as an $A$-module be a direct sum of indecomposable $A$-modules $\P_1,\ldots,\P_k$. Although $\P_i$ is not simple in general, its top $\C_i$ is. Moreover, every projective indecomposable $A$-module is isomorphic to some $\P_i$, and every simple $A$-module is isomorphic to some $\C_i$. Suppose without loss of generality that $\{\P_1,\ldots,\P_\ell\}$ and $\{\C_1,\ldots,\C_\ell\}$ are complete lists of non-isomorphic projective indecomposable $A$-modules and simple $A$-modules, respectively, where $\ell\le k$. Then the *Cartan matrix* of $A$ is $[a_{ij}]_{i,j\in[\ell]}$ where $a_{ij}$ is the multiplicity of $\C_j$ among the composition factors of $\P_i$.
The *Grothendieck group $G_0(A)$ of the category of finitely generated $A$-modules* is defined as the abelian group $F/R$, where $F$ is the free abelian group on the isomorphism classes $[M]$ of finitely generated $A$-modules $M$, and $R$ is the subgroup of $F$ generated by the elements $[M]-[L]-[N]$ corresponding to all exact sequences $0\to L\to M\to N\to0$ of finitely generated $A$-modules. The *Grothendieck group $K_0(A)$ of the category of finitely generated projective $A$-modules* is defined similarly. We often identify a finitely generated (projective) $A$-module with the corresponding element in the Grothendieck group $G_0(A)$ ($K_0(A)$). It turns out that $G_0(A)$ and $K_0(A)$ are free abelian groups with bases $\{\C_1,\ldots,\C_\ell\}$ and $\{\P_1,\ldots,\P_\ell\}$, respectively. If $L,M,N$ are all projective $A$-modules, then the exact sequence $0\to L\to M\to N\to0$ is equivalent to the direct sum decomposition $M\cong L\oplus N$. If $A$ is semisimple then $G_0(A)=K_0(A)$ since $\P_i=\C_i$ for all $i$.
Let $B$ be a subalgebra of $A$. The *induction* $N\uparrow\,_B^A$ of a $B$-module $N$ from $B$ to $A$ is the $A$-module $A\otimes_B N$. The *restriction* $M\downarrow\,_B^A$ of an $A$-module $M$ from $A$ to $B$ is $M$ itself viewed as a $B$-module. The induction and restriction are well defined for isomorphic classes of modules.
Representation theory of symmetric groups and 0-Hecke algebras {#sec:rep}
--------------------------------------------------------------
The (complex) representation theory of the symmetric group is fascinating and has rich connections with symmetric function theory. The simple $\CC\SS_n$-modules $S_\lambda$ are indexed by partitions $\lambda$ of $n$, and every $\CC\SS_n$-module is a direct sum of simple $\CC\SS_n$-modules, i.e. $\CC\SS_n$ is semisimple. Thus the Grothendieck group $G_0(\CC\SS_n)=K_0(\CC\SS_n)$ is a free abelian group on the isomorphism classes $[S_\lambda]$ for all partitions $\lambda$ of $n$. The tower of groups $\SS_\bullet: \SS_0\hookrightarrow \SS_1\hookrightarrow \SS_2\hookrightarrow \cdots$ has a Grothendieck group $$G_0(\CC\SS_\bullet) := \bigoplus_{n\geq0} G_0(\CC\SS_n).$$ Using the natural embedding $\SS_m\times\SS_n\hookrightarrow \SS_{m+n}$, one can define the product of $S_\mu$ and $S_\nu$ as the induction of $S_\mu\otimes S_\nu$ from $\SS_m\times \SS_n$ to $\SS_{m+n}$ for all partitions $\mu\vdash m$ and $\nu\vdash n$, and define the coproduct of $S_\lambda$ as the sum of its restriction to $\SS_i\times\SS_{n-i}$ for $i=0,1,\ldots,n$, for all partitions $\lambda\vdash n$. This gives $G_0(\CC\SS_\bullet)$ a self-dual graded Hopf algebra structure, as the product and coproduct share the same structure constants, namely the *Littlewood-Richardson coefficients*.
The *Frobenius characteristic map* ch sends a simple $S_\lambda$ to the Schur function $s_\lambda$, giving a Hopf algebra isomorphism between the Grothendieck group $G_0(\CC\SS_\bullet)$ and $\Sym$, the *ring of symmetric functions* (see Stanley [@EC2 Chapter 7]).
The 0-Hecke algebra $\H_n(0)$ has analogous representation theory as the symmetric group $\SS_n$. We first review some notation. A *composition* is a sequence $\alpha=(\alpha_1,\ldots,\alpha_\ell)$ of positive integers. Let $\sigma_i:=\alpha_1+\cdots+\alpha_i$ for $i=1,\ldots,\ell$. The *size* $|\alpha|$ of the composition $\alpha$ is the sum of all its *parts* $\alpha_1,\ldots,\alpha_\ell$, i.e. $|\alpha|=\sigma_\ell$. If $|\alpha|=n$ then we say that $\alpha$ is a composition of $n$ and write $\alpha\models n$. The *descent set* of $\alpha$ is $D(\alpha):=\{\sigma_1,\ldots,\sigma_{\ell-1}\}$. Sending $\alpha$ to $D(\alpha)$ gives a bijection between compositions of $n$ and subsets of $[n-1]$.
Now recall from Norton [@Norton] that the 0-Hecke algebra $\H_n(0)$ has the following decomposition $$\H_n(0)=\bigoplus_{\alpha\models n} \P_\alpha(0)$$ where the $\P_\alpha(0)$’s are pairwise non-isomorphic indecomposable $\H_n(0)$-modules. The top of $\P_\alpha(0)$ is one-dimensional and denoted by $\C_\alpha(0)$. Thus the two Grothendieck groups $G_0(\H_n(0))$ and $K_0(\H_n(0))$ are free abelian groups on the isomorphism classes of $\C_\alpha(0)$ and $\P_\alpha(0)$, respectively, for all compositions $\alpha$. Associated with the tower of algebras $\H_\bullet(0): \H_0(0)\hookrightarrow \H_1(0)\hookrightarrow \H_2(0)\hookrightarrow \cdots$ are two Grothendieck groups $$G_0(\H_\bullet(0)):=\bigoplus_{n\geq0}G_0(\H_n(0)) \quad\text{and}\quad
K_0(\H_\bullet(0)):=\bigoplus_{n\geq0}K_0(\H_n(0)).$$ They are dual graded Hopf algebras with product and coproduct again given by induction and restriction of representations along the natural embeddings $\H_m(0)\otimes \H_n(0)\hookrightarrow \H_{m+n}(0)$ of algebras. The duality is given by the pairing $\langle \P_\alpha(0),\C_\beta(0) \rangle := %\dim_\FF {\rm Hom}_{\H_n(0)}(\P_\alpha(0),\C_\beta(0)) =
\delta_{\alpha,\,\beta}$ for all compositions $\alpha$ and $\beta$.
For later use we review the explicit formulas for the product of $K_0(\H_\bullet(0))$ and the coproduct of $G_0(\H_\bullet(0))$. Let $\alpha=(\alpha_1,\ldots,\alpha_\ell)$ and $\beta=(\beta_1,\ldots,\beta_k)$ be compositions of $m$ and $n$, respectively. We write $$\alpha\beta:=(\alpha_1,\ldots,\alpha_\ell,\beta_1,\ldots,\beta_k) \quad\text{and}\quad
\alpha\rhd\beta := (\alpha_1,\ldots,\alpha_{\ell-1},\alpha_\ell+\beta_1,\beta_2,\ldots,\beta_k).$$ For any $i\in\{0,1,\ldots,m\}$, let $r$ be the largest integer such that $\sigma_r:=\alpha_1+\cdots+\alpha_r$ is no more than $i$, and write $$\alpha_{\leq i}:=(\alpha_1,\ldots,\alpha_r,i-\sigma_r) \quad\text{and}\quad
\alpha_{>i}:=(\sigma_{r+1}-i,\alpha_{r+2},\ldots,\alpha_\ell)$$ where we ignore $i-\sigma_r$ if it happens to be $0$.
\[prop:ProdP\] For any $\alpha\models m$ and $\beta\models n$ one has $$\P_\alpha(0) \htimes \P_\beta(0) := \left( \P_\alpha(0) \otimes \P_\beta(0) \right) \uparrow\,_{\H_m(0)\otimes \H_n(0)}^{\H_{m+n}(0)} =
\P_{\alpha\beta}(0) \oplus \P_{\alpha \rhd \beta}(0),$$ $$\Delta(\C_\alpha(0)) := \sum_{i=0}^m \C_\alpha(0) \downarrow\,_{\H_i(0)\otimes \H_{m-i}(0)}^{\H_m(0)} = \sum_{i=0}^m \C_{\alpha_{\leq i}}(0) \otimes \C_{\alpha_{>i}}(0).$$
For example, one has $\P_{213}(0)\htimes\P_{223}(0) = \P_{213223}(0) \oplus \P_{21523}(0)$. Let $\emptyset$ be the empty composition of $n=0$. Then $$\Delta(\C_{121}(0)) = \C_\emptyset(0)\otimes\C_{121}(0) + \C_1(0)\otimes\C_{21}(0) + \C_{11}(0)\otimes\C_{11}(0) + \C_{12}(0)\otimes\C_{1}(0) + \C_{121}(0) \otimes \C_\emptyset(0).$$
The representation theory of the 0-Hecke algebras is connected with the dual graded Hopf algebras $\QSym$ of *quasisymmetric functions* and $\NSym$ of *noncommutative symmetric functions*. There are dual bases for $\QSym$ and $\NSym$ consisting of the *fundamental quasisymmetric functions* $F_\alpha$ and the *noncommutative ribbon Schur functions* $\bs_\alpha$ for all compositions $\alpha$. Krob and Thibon [@KrobThibon] introduced two Hopf algebra isomorphisms $$\mathrm{Ch}: G_0(\H_\bullet(0))\cong\QSym \quad\text{and}\quad
\mathbf{ch}: K_0(\H_\bullet(0))\cong \NSym$$ defined by $\mathrm{Ch}(\C_\alpha(0))=F_\alpha$ and $\mathbf{ch}(\P_\alpha(0))=\bs_\alpha$ for all compositions $\alpha$. There is an injection $\Sym\hookrightarrow \QSym$ of Hopf algebras given by inclusion, as well as a surjection $\NSym\twoheadrightarrow\Sym$ of Hopf algebras by taking commutative image.
Collapse and commutativity {#sec:collapse}
==========================
Let $(W,S)$ be a Coxeter system and let $\FF$ be a field. In this section we study when the Hecke algebra $\H(\bq)=\H_S(\bq)$ of $(W,S)$ with independent parameters $\bq=(q_s\in \FF:s\in S)$ collapses or becomes commutative.
We first study the *parabolic subalgebras* of $\H(\bq)$. We know that any subset $R\subseteq S$ generates a Coxeter subsystem $(W_R,R)$ of $(W,S)$. However, the subalgebra of $\H(\bq)$ generated by $\{T_r:r\in R\}$ is not necessarily isomorphic to the Hecke algebra $\H_R(\bq)$ of the Coxeter system $(W_R,R)$ with independent parameters $(q_r:r\in R)$. For example, if there exist two elements $s$ and $t$ in $S$ such that $q_s$ and $q_t$ are distinct nonzero parameters and $m_{st}$ is odd, then the algebra $\H_{\{s\}} (\bq)$ is $2$-dimensional, but Theorem \[thm:12\] below gives $T_s=1$ in $\H(\bq)$. To guarantee an isomorphism between these two algebras we assume that $R\subseteq S$ is *admissible*, i.e. if $m_{st}$ is odd for $s\in R$ and $t\in S\setminus R$ then either $q_s=0$ or $q_t=0$. If $R$ is admissible then one sees that $S\setminus R$ is also admissible. We denote the generating set of $\H_R(\bq)$ by $\{T'_r:r\in R\}$, which satisfies the relations $(T'_r-1)(T'_r+q)=0$ and $(T'_rT'_tT'_r\cdots)_{m_{rt}} = (T'_tT'_rT'_t\cdots)_{m_{rt}}$ for all $r,t\in R.$
\[prop:subalgebra\] For any $R\subseteq S$ there is an algebra surjection from $\H_R(\bq)$ to the subalgebra of $\H(\bq)$ generated by $\{T_r:r\in R\}$ by sending $T'_r$ to $T_r$ for all $r\in R$, which is an isomorphism when $R$ is admissible.
Sending $T'_r$ to $T_r$ for all $r\in R$ gives an algebra map $\phi:H_R(\bq)\to \H(\bq)$ whose image is the subalgebra of $\H(\bq)$ generated by $\{T_r:r\in R\}$. Suppose that $R$ is admissible and define $$\psi(T_s)=
\begin{cases}
T'_s, & {\rm if}\ s\in R,\\
1, & {\rm if}\ s\in S\setminus R,\ q_s\ne0,\\
0, & {\rm if}\ s\in S\setminus R,\ q_s=0.
\end{cases}$$ One sees that the quadratic relations are preserved by $\psi$. We next check the braid relations. Let $s,t\in S$ with $m_{st}=m$.
If $s$ and $t$ are both in $R$ then $\psi(T_s)=T'_s$ and $\psi(T_t)=T'_t$ satisfy the same braid relation as $T_s$ and $T_t$.
If $s\in R$ and $t\in S\setminus R$, then $\psi(T_t)\in\{0,1\}$. When $m$ is even one has $$(\psi(T_s)\psi(T_t)\psi(T_s)\cdots)_m=(\psi(T_t)\psi(T_s)\psi(T_t)\cdots)_m.$$ When $m$ is odd and $q_t=0$ one has $\psi(T_t)=0$ and the above quality still holds. When $m$ is odd and $q_t\ne 0$ one has $\psi(T_t)=1$ and the admissibility of $R$ implies $q_s=0$. Thus $$(\psi(T_s)\psi(T_t)\psi(T_s)\cdots)_m=(T'_s)^{(m+1)/2}=(T'_s)^{(m-1)/2}=(\psi(T_t)\psi(T_s)\psi(T_t)\cdots)_m.$$
It follows that $\psi$ is a well defined algebra map. Restricted to the image of $\phi$, the map $\psi$ is nothing but the inverse of $\phi$. Thus the result holds.
We say that a path in the Coxeter diagram of $(W,S)$ is *odd* if all its edges have odd weights, and *nonzero* if all its vertices, including the two end vertices, correspond to nonzero parameters. The *collapsed subset* of $S$ consists of all elements $r\in S$ that are connected to some other vertex $s$ (depend on $r$) with $q_s\ne q_r$ via an odd nonzero path.
\[thm:12\] If $R$ is the collapsed subset of $S$ then (i) $T_r=1$, $\forall r\in R$, (ii) $T_s\notin\FF$, $\forall s\in S\setminus R$, and (iii) $\H(\bq)\cong \H_{S\setminus R}(\bq)$.
By definition, for any $r\in R$ there exists an odd nonzero path $(r, s, \ldots,t)$ from $r$ to some $t\in S$ such that $q_r\ne q_t$. We show (i) by induction on the length of the path. First assume that the length is $1$, i.e. there is an edge between $r$ and $t$ with an odd weight $m:=m_{rt}$. The braid relation between $T_r$ and $T_t$ implies that $$T_r(T_rT_tT_r\cdots T_r)_m = (T_rT_tT_r\cdots T_t)_{m+1} = (T_tT_rT_t\cdots T_t)_m T_t.$$ Using the quadratic relations for $T_r$ and $T_t$ one obtains $$q_r(T_tT_rT_t\cdots)_{m-1}+(1-q_r)(T_rT_tT_r\cdots)_m = q_t(T_tT_rT_t\cdots)_{m-1} + (1-q_t) (T_tT_rT_t\cdots)_m.$$ Hence $$(q_r-q_t)(T_tT_rT_t\cdots T_r)_{m-1} = (q_r-q_t)(T_rT_tT_r\cdots T_r)_m = (q_r-q_t)(T_tT_rT_t\cdots T_t)_m.$$ Since $q_r\ne0$, $q_t\ne0$, and $q_r\ne q_t$, one can apply the inverses of $T_r$, $T_t$, and $(q_r-q_t)$ to get $T_r=T_t=1$.
Now suppose that the path $(r,s,\ldots,t)$ has length at least two. If $q_r\ne q_s$ then $T_r=1$ by the above argument. Otherwise $q_r=q_s\ne q_t$ and one has $T_{s}=1$ by induction, since $(s,\ldots,t)$ is an odd nonzero path of smaller length. Then applying $T_r^{-1}$ to the braid relation between $T_r$ and $T_{s}$ gives $T_r=1$. This proves (i).
To show (ii), we assume $T_s\in\FF$ for some $s\in S$. If $q_s=0$ then $\{s\}$ is admissible and thus the subalgebra of $\H(\bq)$ generated by $T_s$ is $2$-dimensional by Proposition \[prop:subalgebra\], which is absurd. Therefore $q_s\ne0$. Let $U$ be the set of all elements in $S$ that are connected to $s$ via odd nonzero paths, including $s$ itself. Then $q_u\ne0$ for all $u\in U$. One sees that $U$ is admissible and hence the subalgebra of $\H(\bq)$ generated by $\{T_u:u\in U\}$ is isomorphic to the algebra $\H_U(\bq)$ by Proposition \[prop:subalgebra\]. If $|\{q_u:u\in U\}|=1$ then $\H_R(\bq)$ has a basis indexed by $W_U$, and hence $T_s\notin\FF$, a contradiction. Therefore $|\{q_u:u\in U\}|\geq 2$. This forces $s\in R$ and establishes (ii).
Finally, one sees that $S\setminus R$ is admissible. By Proposition \[prop:subalgebra\], $\H_{S\setminus R}(\bq)$ is isomorphic to the subalgebra of $\H(\bq)$ generated by $\{T_s:s\in S\setminus R\}$. Hence (iii) follows from (i).
By Theorem \[thm:12\], we may always assume without loss of generality that $\H(\bq)$ is *collapse-free*, i.e. if $m_{st}$ is odd and $q_s\ne q_t$ then either $q_s$ or $q_t$ is $0$. We next develop some lemmas in order to characterize when $\H(\bq)$ is commutative.
\[lem:H(0,q)\] If $S=\{s,t\}$, $q_s=0\ne q_t$, and $m:=m_{st}$ is odd, then $\H(\bq)$ has dimension $2m-3$ and a basis $$\{(T_sT_tT_s\cdots)_k,\ (T_tT_sT_t\cdots)_k: k=0,1,2,\ldots,m-2\}.$$
Since $q_s=0\ne q_t$ and $m$ is odd, it follows from the defining relations for $\H(\bq)$ that $$(T_sT_tT_s\cdots T_s)_m=(T_sT_tT_s\cdots T_t)_{m+1}=(T_tT_sT_t\cdots T_t)_mT_t=q_t(T_tT_sT_t\cdots)_{m-1}+(1-q_t)(T_tT_sT_t\cdots)_m$$ which implies $(T_tT_sT_t\cdots)_{m-1}=(T_tT_sT_t\cdots)_m$ and thus $(T_sT_tT_s\cdots)_{m-2}=(T_sT_tT_s\cdots)_{m-1}$. Similarly, $$(T_sT_tT_s\cdots)_m = (T_tT_sT_t\cdots T_s)_{m+1}= T_t(T_tT_sT_t\cdots)_m=q_t (T_sT_tT_s\cdots)_{m-1}+(1-q_t)(T_tT_sT_t\cdots)_m.$$ Thus $(T_sT_tT_s\cdots T_t)_{m-1}=(T_tT_sT_t\cdots T_t)_m$ and $(T_sT_tT_s\cdots)_{m-2}=(T_tT_sT_t\cdots)_{m-1}$. It follows that $\H(\bq)$ is spanned by the desired basis. Then it remains to show that the dimension of $\H(\bq)$ is at least $2m-3$.
To achieve this, we define an $\H(\bq)$-action on the $\FF$-span of $
Z:=\{(sts\cdots)_k,\ (tst\cdots)_k: k=0,1,2,\ldots,m-2\}
$ where $(sts\cdots)_0=(tst\cdots)_0=1$ by convention. The dimension of $\FF Z$ is by definition $|Z|=2m-3$. Define $$\begin{cases}
T_s(tst\cdots)_k = (sts\cdots)_{k+1}, & 0\leq k\leq m-3, \\
T_t(sts\cdots)_k=(tst\cdots)_{k+1}, & 0\leq k\leq m-3, \\
T_s(sts\cdots)_k=(sts\cdots)_k, & 1\leq k\leq m-2,\\
T_t(tst\cdots)_k = q_t(sts\cdots)_{k-1} + (1-q_t)(tst\cdots)_k, & 1\leq k\leq m-2,\\
T_s(tst\cdots)_{m-2}=T_t(sts\cdots)_{m-2} = (sts\cdots)_{m-2}.
\end{cases}$$ One sees that the quadratic relations for $T_s$ and $T_t$ are both satisfied by this action, and so is the braid relation because $$(T_sT_tT_s\cdots)_m (z) = (T_tT_sT_t\cdots)_m (z) = (sts\cdots)_{m-2}, \quad\forall z\in Z.$$ Hence $\FF Z$ becomes a cyclic $\H(\bq)$-module generated by $1$. This forces the dimension of $\H(\bq)$ to be at least $2m-3$.
\[lem:01=0\] Suppose that there exists a path $(s=s_0,s_1,s_2,\ldots,s_k=t)$ consisting of simply laced edges in the Coxeter diagram of $(W,S)$, where $k\geq1$. If $q_{s_i}\ne0$ and $m_{ss_i}\leq 3$ for all $i\in[k]$, and $q_s=0$, then $T_sT_t=T_tT_s=T_s$.
We show $T_sT_t=T_tT_s=T_s$ by induction on $k$. If $k=1$ then $$T_sT_tT_s = T_tT_sT_tT_s = T_t^2T_sT_t = q_t T_sT_t + (1-q_t) T_tT_sT_t.$$ Since $q_t\ne0$, one has $T_sT_t = T_tT_sT_t$ and thus $T_s=T_tT_s$. Then $T_sT_t = T_sT_tT_s = T_s^2 =T_s$.
Now assume $k\geq2$. If $m_{st}=3$ then $T_sT_t=T_tT_s=T_s$ by the above argument. Assume $m_{st}=2$, i.e. $T_sT_t=T_tT_s$. Let $r=s_{k-1}$. Then $T_rT_s=T_sT_r=T_s$ by induction hypothesis. Thus $$T_tT_s = T_sT_rT_tT_r = T_sT_tT_rT_t = T_t^2T_s = q_tT_s + (1-q_t) T_tT_s.$$ This implies $T_sT_t=T_tT_s = T_s$ which completes the proof.
Now we provide a characterization for when $\H(\bq)$ is commutative. It implies that there exists $\bq\in\FF^S$ such that $\H(\bq)$ is collapse-free and commutative if and only if the Coxeter diagram of $(W,S)$ is simply laced and bipartite.
\[thm:commutative\] Suppose that $\H(\bq)$ is collapse-free. Then $\H(\bq)$ is commutative if and only if the Coxeter diagram of $(W,S)$ is simply laced and exactly one of $q_s,q_t$ is $0$ for any pair of elements $s,t\in S$ with $m_{st}=3$.
We first assume that $\H(\bq)$ is commutative. Let $s,t\in S$ with $m_{st}\geq3$. We need to show that $m_{st}=3$ and exactly one of $q_s$ and $q_t$ is $0$. To attain this we first show that $\{s,t\}$ is admissible. By symmetry, it suffices to show that $q_rq_s=0$ for any $r\in S\setminus \{s,t\}$ with $m_{rs}$ odd. Suppose to the contrary that $q_rq_s\ne0$. Then $q_r=q_s$ since $\H(\bq)$ is collapse-free. Let $R$ be a maximal subset of $S$ containing $s$ such that $q_a=q_b$ whenever $a,b\in R$ and $m_{ab}$ is odd. Then $r\in R$. The maximality forces $R$ to be admissible. By Proposition \[prop:subalgebra\], $\H_R(\bq)$ is isomorphic to a subalgebra of $\H(\bq)$ and thus commutative. It also has a basis $\{T_w:w\in W_R\}$ by Theorem \[thm:TwBasis\]. Hence $m_{rs}\leq 2$, a contradiction.
Therefore $\{s,t\}$ is admissible. Then $\H_{\{s,t\}}(\bq)$ is isomorphic to a subalgebra of $\H(\bq)$, and hence commutative. Since $m_{st}\geq 3$, Theorem \[thm:TwBasis\] implies that $m_{st}$ is odd and $q_s\ne q_t$. Then exactly one of $q_s$ and $q_t$ must be $0$ since $\H(\bq)$ is collapse-free. By Lemma \[lem:H(0,q)\], the dimension of $\H_{\{s,t\}}(\bq)$ is $2m-3$ and hence $m_{st}=3$. This proves one direction of the theorem. The other direction follows from Lemma \[lem:01=0\].
Finally, using the results in this section we obtain a proof for Theorem \[thm:TwBasis\]. One can check that $\{T_w:w\in W\}$ spans $\H(\bq)$ using the word property of $W$ and the defining relations of $\H(\bq)$. If $q_s=q_t$ whenever $m_{st}$ is odd, then $\{T_w:w\in W\}$ is a basis for $\H(\bq)$ by Lusztig [@Lusztig Proposition 3.3]. Conversely, suppose that $\{T_w:w\in W\}$ is a basis for $\H(\bq)$. Let $s,t\in S$ with $m:=m_{st}$ odd. The dimension $d$ of the subalgebra of $\H(\bq)$ generated by $T_s$ and $T_t$ equals the cardinality of the subgroup $\langle s,t\rangle$ of $W$, which is $2m$ by the word property of $W$. On the other hand, if $q_s\ne q_t$ then either $d=1<2m$ when $q_sq_t\ne0$ by Theorem \[thm:12\], or $d\leq 2m-3<2m$ when $q_sq_t=0$ by Proposition \[prop:subalgebra\] and Lemma \[lem:H(0,q)\]. Hence $q_s=q_t$.
The simply laced case {#sec:simply-laced}
=====================
In this section we study a collapse-free Hecke algebra $\H(\bq)$ with independent parameters $\bq=(q_s\in\FF: s\in S)$ of a simply laced Coxeter system $(W,S)$. We first give some lemmas in order to construct a basis for $\H(\bq)$.
\[lem:Si\] If $(W,S)$ is simply-laced then $S$ decomposes into a disjoint union of $S_1,\ldots,S_k$ such that
\(i) the elements of each $S_i$ receive the same parameters and are connected in the Coxeter diagram of $(W,S)$,
\(ii) if $s\in S_i$, $t\in S_j$, $i\ne j$, then either $m_{st}=2$ or exactly one of $q_s$ and $q_t$ is $0$.
We remove from the Coxeter diagram of $(W,S)$ all the edges whose two end vertices correspond to distinct parameters. Let $S_1,\ldots,S_k$ be the vertex sets of the connected components of the resulting graph.
If $s,t\in S_i$ then there exists a path from $s$ to $t$, whose vertices have the same parameter. Thus (i) holds.
If $s\in S_i$, $t\in S_j$, $i\ne j$, and $m_{st}=3$, then one has $q_s\ne q_t$ and thus exactly one of $q_s$ and $q_t$ is $0$ since $\H(\bq)$ is collapse-free. Hence (ii) holds.
Let $W_i:=\langle S_i\rangle$ for all $i=1,\ldots,k$. We say an element $w_i\in W_i$ *dominates* $S_j$ if $i\ne j$ and there exist $s\in S_i$ and $t\in S_j$ such that $q_s=0$, $m_{st}=3$, and $s$ occurs in some reduced expression of $w_i$. Let $W(\bq)$ be the set of all elements $(w_1,\ldots,w_k)\in W_1\times\cdots\times W_k$ such that $w_j=1$ whenever some $w_i$ dominates $S_j$. We need to define an $\H(\bq)$-action on $\FF W(\bq)$. Let $s$ be an arbitrary element in $S$. Then $s\in S_i$ for some $i\in [k]$. Let $\bw=(w_1,\ldots,w_k)\in W(\bq)$. We define $T_s(\bw):=(T_s(\bw)_1,\ldots,T_s(\bw)_k)\in\FF W(\bq)$ as follows.
If $S_i$ is dominated by some $w_j$, then $T_s$ acts *trivially* on $\bw$, meaning that $T_s(\bw):=\bw$. Otherwise $T_s$ acts *nontrivially* on $\bw$: if $\ell(sw_i)<\ell(w_i)$ then $T_s(\bw)_i=(1-q)w_i+qsw_i$ and $T_s(\bw)_j=w_j$ for all $j\ne i$; if $\ell(sw_i)>\ell(w_i)$ then $T_s(\bw)_i=sw_i$, $T_s(\bw)_j=1$ for all $j\ne i$ such that $s$ dominates $S_j$, and $T_s(\bw)_j=w_j$ for all $j\ne i$ such that $s$ does not dominates $S_j$. In other words, if $S_i$ is not dominated by $w_j$ for all $j\ne i$ then $T_s$ acts on the $i$th component of $\bw$ in the same way as the regular representation of the Hecke algebra $\H_{S_i}(q_s)$ (see (\[eq:reg\])), and for all $j\ne i$ one has $$T_s(\bw)_j=
\begin{cases}
w_j, & \textrm{if $s$ does not dominate $S_j$},\\
1, & \textrm{if $s$ dominates $S_j$}.
\end{cases}$$
\[lem:reg\] One has a well defined $\H(\bq)$-action on $\FF W(\bq)$ such that every element $(w_1,\ldots,w_k)$ in $W(\bq)$ is equal to $T_{w_1}\cdots T_{w_k}(1)$.
Let $s\in S_i$ and let $\bw=(w_1,\ldots,w_k)\in W(\bq)$. We first show that $T_s(\bw)\in\FF W(\bq)$. We may assume that $T_s$ acts nontrivially on $\bw$, i.e. $S_i$ is not dominated by $w_j$ for all $j\ne i$. If $\ell(sw_i)<\ell(w_i)$ then $\bw\in W(\bq)$ implies $$T_s(\bw)=(1-q)\bw+q(w_1,\ldots,w_{i-1},sw_i,w_{i+1},\ldots,w_k)\in W(\bq).$$ If $\ell(sw_i)>\ell(w_i)$ then $T_s(\bw)\in W(\bq)$ since $T_s(\bw)_i=sw_i$ and $T_s(\bw)_j=1$ whenever $s$ dominates $S_j$.
Next we verify the quadratic relation for the action of $T_s$. If $T_s$ acts trivially on $\bw$ then $T_s^2=(1-q_s)T_s+q_s$ clearly holds. Assume that $T_s$ acts nontrivially on $\bw$ and apply $T_s$ again to $T_s(\bw)$. For the $i$-th component this is the same as the regular representation of $\H_{S_i}(q_s)$ (see \[eq:reg\]). Hence $T_s^2=(1-q_s)T_s+q_s$ holds for the $i$-th component. Let $j\ne i$. If $s$ does not dominates $S_j$ then $T_s(\bw)_j=w_j$ is fixed by $T_s$. If $s$ dominates $S_j$ then $T_s(w_j)=1$ is also fixed by $T_s$, and $q_s=0$. Hence $T_s^2=(1-q_s)T_s+q_s$ also holds for the $j$-th component for all $j\ne i$.
Next we verify the braid relation between $T_s$ and $T_t$ for any $t\in S_i\setminus\{s\}$. If one of $T_s$ and $T_t$ acts trivially on $\bw$ then so does the other. Thus we may assume that $T_s$ and $T_t$ both act nontrivially on $\bw$. Then they both act on the $i$-th component of $\bw$ by the regular representation of $\H_{S_i}(q_s)$ and hence the braid relation holds for this component. Let $j\ne i$ and let $T(s,t)$ be any product of $T_s$ and $T_t$ that contains both of them. If either $s$ or $t$ dominates $S_i$ then $T(s,t)$ sends $w_j$ to $1$. If neither of $s$ and $t$ dominates $S_j$ then $T(s,t)$ fixes $w_j$. Hence the braid relation between $T_s$ and $T_t$ also holds for the $j$-th component for all $j\ne i$.
Next assume that $t\in S_j$ and $i\ne j$. First consider the case when $s$ dominates $S_j$. Since $q_s=0$, one has $T_s(\bw)_i=w_i$ if $\ell(sw_i)<\ell(w_i)$ and $T_s(\bw)_i=sw_i$ if $\ell(sw_i)>\ell(w_i)$. In either case $T_t$ acts trivially on $T_s(\bw)$, i.e. $T_t(T_s(\bw))=T_s(\bw)$. On the other hand, since $q_t\ne0$, one sees that $T_t$ dominates nothing and thus fixes all components of $\bw$ except the $j$-th one. Since $s$ dominates $S_j$, one also has $T_s(T_t(\bw))_j=T_s(\bw)_j=1$. Hence $T_s(T_t(\bw))=T_s(\bw)$.
Similarly if $t$ dominates $S_i$ then one has $T_sT_t(\bw)=T_t(\bw)=T_tT_s(\bw)$. For the remaining case, that is, when $s$ does not dominate $S_j$ and $t$ does not dominates $S_i$, one has $m_{st}=2$ by Lemma \[lem:Si\] (ii). We need to show that both actions of $T_sT_t$ and $T_tT_s$ on $\bw$ are the same. One sees for both actions that $T_s$ and $T_t$ act separately on $w_i$ and $w_j$ by the regular representations of $\H_{S_i}(q_s)$ and $\H_{S_j}(q_t)$, respectively. Let $h\in[k]\setminus\{i,j\}$. If $S_h$ is dominated by either $s$ or $t$ then both $T_sT_t$ and $T_tT_s$ sends $w_h$ to $1$. Otherwise both $T_sT_t$ and $T_tT_s$ fixes $w_j$. Hence $T_sT_t(\bw)=T_tT_s(\bw)$.
Therefore one has a well defined action of $\H(\bq)$ on $\FF W(\bq)$. One sees that every element $(w_1,\ldots,w_k)$ in $W(\bq)$ is equal to $T_{w_1}\cdots T_{w_k}(1)$ by induction on $\ell(w_1)+\cdots+\ell(w_k)$. This completes the proof.
\[thm:SimplyLaced\] Assume that $(W,S)$ is simply-laced and $\H(\bq)$ is collapse-free. Then $\H(\bq)$ has a basis $$B(\bq):=\{T_{w_1}\cdots T_{w_k}:(w_1,\ldots,w_k)\in W(\bq)\}.$$
Theorem \[thm:TwBasis\] shows that $\H(\bq)$ is spanned by $\{T_w:w\in W\}$. Let $s\in S_i$, $t\in S_j$, and $i\ne j$. If $m_{st}=2$ then $T_sT_t=T_tT_s$. If $m_{st}=3$ then we may assume $0=q_s\ne q_t$ by Lemma \[lem:Si\] and it follows from Lemma \[lem:01=0\] that $T_sT_r= T_s = T_rT_s$ for all $r\in S_j$. Hence for any $w\in W$ one can write $T_w=T_{w_1}\cdots T_{w_k}$ where $\bw=(w_1,\ldots,w_k)\in W(\bq)$. This shows that $B(\bq)$ is a spanning set for $\H(\bq)$. On the other hand, it follows from Lemma \[lem:reg\] that $B(\bq)$ is also linearly independent. Thus $B(\bq)$ is a basis for $\H(\bq)$.
\[cor:FiniteDim\] Suppose that $(W,S)$ is simply-laced and let $S_1,\ldots,S_k$ be given by Lemma \[lem:Si\].
\(i) A collapse-free $\H(\bq)$ is finite dimensional if and only if $W_i:=\langle S_i\rangle$ is finite for all $i\in[k]$.
\(ii) There exists $\bq\in \FF^S$ such that $\H(\bq)$ is collapse-free and finite dimensional if and only if there exists $R\subseteq S$ such that the parabolic subgroups $\langle R \rangle$ and $\langle S\setminus R\rangle$ are finite.
\(i) By Theorem \[thm:SimplyLaced\], a collapse-free $\H(\bq)$ is finite dimensional if and only if $W(\bq)$ is finite. For any $i\in[k]$, there are injections $W_i\hookrightarrow W(\bq)\hookrightarrow W_1\times\cdots\times W_k$. Hence $W(\bq)$ is finite if and only if $W_i$ is finite for all $i\in[k]$.
\(ii) Suppose that $\H(\bq)$ is collapse-free and finite dimensional. Let $R:=\{s\in S:q_s=0\}$. By Lemma \[lem:Si\], we may assume $R=S_1\cup\cdots \cup S_j$. Then $\langle R\rangle = \langle S_1\rangle\times\cdots\times\langle S_j\rangle$ and $\langle S\setminus R \rangle = \langle S_{j+1}\rangle\times\cdots\times\langle S_k\rangle$ are both finite groups by (i). Conversely, if there exists a subset $R\subseteq S$ such that $\langle R \rangle$ and $\langle S\setminus R\rangle$ are both finite groups, then $\H(\bq)$ is finite dimensional by (i), where $\bq$ is defined by $q_s=0$ for all $s\in R$ and $q_s=1$ for all $s\notin R$.
\(i) It is well known that the Coxeter group of affine type $A$ is infinite and so is the associated Hecke algebra with a single parameter. However, if one takes some parameters to be $0$ and others to be $1$, the resulting algebra is finite dimensional, since all the $W_i$’s given in the above theorem are of finite type $A$.
\(ii) Let the Coxeter diagram of $(W,S)$ be the complete graph $K_5$ with $5$ vertices. Assume that $\H(\bq)$ is collapse-free. There can be at most two different parameters $0$ and $q\ne0$. Both $R:=\{s\in S:q_s=0\}$ and its complement $S\setminus R=\{s\in S:q_s=q\}$ are admissible subsets of $S$, the larger one of which contains at least $3$ elements and thus gives a copy of the infinite dimensional Hecke algebra of affine type $A_3$ with a single parameter as a subalgebra of $\H(\bq)$. Therefore $\H(\bq)$ is never finite dimensional in such cases.
The simply laced bipartite case {#sec:bipartite}
===============================
By Theorem \[thm:commutative\] there exists $\bq\in\FF^S$ such that $\H(\bq)$ is collapse-free and commutative if and only if the Coxeter diagram of $(W,S)$ is simply laced and bipartite. We give more results for such case in this section. Let $T_I:=\prod_{i\in I} T_i$ for all $I\in\II(G)$, where $\II(G)$ consists of independent sets in the underlying graph $G$ of the Coxeter diagram of $(W,S)$.
\[cor:ComDim\] A collapse-free and commutative $\H(\bq)$ has a basis $\{T_I:I\in\II(G)\}$. In particular, if $(W,S)$ is of type $A_n$ then the dimension of $\H(\bq)$ equals the Fibonacci number $F_{n+2}$.
By Theorem \[thm:commutative\], the Coxeter diagram of $(W,S)$ is a simply laced and bipartite graph $G$ with all edges between the two subsets $\{s\in S:q_s=0\}$ and $\{t\in S:q_t\ne0\}$. Hence the subsets $S_1,\ldots,S_k$ given by Lemma \[lem:Si\] are all singleton sets. Then the basis $B(\bq)$ for $\H(\bq)$ given in Theorem \[thm:SimplyLaced\] consists of the elements $T_I$ for all $I\in\II(G)$.
Now suppose that $(W,S)$ is of type $A_n$, i.e. its Coxeter diagram is isomorphic to the path $P_n$ with $n$ vertices. If an independent set $I$ in $P_n$ contains one end vertex of $P_n$, then removing this end point from $I$ gives an independent set of $P_{n-2}$; otherwise $I$ is an independent set of $P_{n-1}$. Thus $|\II(P_n)|=|\II(P_{n-1})|+|\II(P_{n-2})|$. One also sees that $|\II(P_i)|=i+1$ if $i=0,1$. Thus $|\II(P_n)|=F_{n+2}$ for all $n\geq0$.
Computations in [Magma]{} suggest the following conjecture.
Suppose that the Coxeter diagram of $(W,S)$ is a simply laced and bipartite graph $G$. The minimum dimension of a collapse-free $\H(\bq)$ is $|\II(G)|$, which is attained when it is commutative.
We will verify this conjecture for type $A_n$. We first need a lemma on the *Fibonacci numbers*, which are defined as $F_0=0$, $F_1=1$, and $F_n=F_{n-1}+F_{n-2}$ for all $n\geq2$.
\[lem:Fib\] If $k\geq 4$ then $k!\geq F_{k+3}+2$. Also, if $a\geq1$ and $b\geq0$ then $F_{a+b}=F_a F_{b+1} + F_{a-1} F_b \leq F_aF_{b+2}$.
The first result follows easily by induction. It is well known that $F_{a+b}=F_a F_{b+1} + F_{a-1} F_b$ (see Example \[example:Fib1\]). Hence $F_{a+b} \leq F_a(F_{b+1}+F_b) =F_aF_{b+2}$.
\[thm:MinDimTypeA\] Let $\H(\bq)$ be a collapse-free Hecke algebra of type $A_n$ with independent parameters. Then its dimension is at least the Fibonacci number $F_{n+2}$, and the equality holds if and only if $\H(\bq)$ is commutative.
We prove the result by induction on $n$. The Coxeter diagram for type $A_n$ is the path $\xymatrix @C=8pt{ s_1 \ar@{-}[r] & s_2 \ar@{-}[r] & \cdots \ar@{-}[r] & s_n}$. We write $q_i:=q_{s_i}$ for all $i\in[n]$. Let $S_1,\ldots,S_k$ be the subsets of $S$ given by Lemma \[lem:Si\]. Then $S_j$ is a path of length $n_j\geq1$ for every $j\in[k]$. We may assume, without loss of generality, that $$S_j=\{s_i: n_1+\cdots+n_{j-1}<i\leq n_1+\cdots+n_j\},\quad\forall j\in[k].$$
If all parameters in $\bq$ are the same, then $\H(\bq)$ has dimension $(n+1)!\geq F_{n+2}$. Thus we may assume that there exists $j\in[k]$ such that $q_s=q\ne0$ for all $s\in S_j$. Let $a=n_1+\cdots+n_{j-1}$, $b=n_j$, and $c=n_{j+1}+\cdots+n_k$. By convention $a=0$ if $j=1$, and $c=0$ if $j=k$. One sees that $s_a$ and $s_{a+b+1}$ both dominate $S_j$.
By Theorem \[thm:SimplyLaced\], $\H(\bq)$ has dimension $|W(\bq)|$. We need to count the elements $(w_1,\ldots,w_k)$ in $W(\bq)$. If $w_j\ne1$ then any reduced word of $w_{j-1}$ cannot contain $s_a$ and any reduced word of $w_{j+1}$ cannot contain $s_{a+b+1}$. It follows that $(w_1,\ldots,w_{j-1})$ and $(w_{j+1},\ldots,w_k)$ are arbitrary elements in $W(q_{i}:1\leq i\leq a-1)$ and $W(q_{i}:a+b+2\leq i\leq n)$, respectively. Then the number of choices for $(w_1,\ldots,w_k)$ in this case is at least $F_{a+1}((b+1)!-1)F_{c+1}$, by induction hypothesis. Note that this still holds even if $a=0$ or $c=0$, since $F_1=1$.
Similarly, if $w_j=1$ the number of choices for $(w_1,\ldots,w_k)$ is at least $F_{a+2}F_{c+2}$ by induction hypothesis. Thus the dimension of $\H(\bq)$ is at least $f(a,b,c):=F_{a+1}((b+1)!-1)F_{c+1}+F_{a+2}F_{c+2}$. By Lemma \[lem:Fib\], $$f(a,b,c)=F_{a+1}((b+1)!-2)F_{c+1}+F_{a+c+3}.$$ If $b=1$ then this becomes $f(a,b,c)=F_{a+c+3}=F_{n+2}$. If $b=2$ then Lemma \[lem:Fib\] implies that $$f(a,b,c)> 3F_{a+1}F_{c+1} +F_{a+c+3} \geq F_4 F_{a+c} + F_{n+1} \geq F_n + F_{n+1}=F_{n+2}.$$ If $b\geq3$ then Lemma \[lem:Fib\] implies that $$f(a,b,c)> F_{a+1}F_{b+4}F_{c+1}\geq F_{a+b+3}F_{c+1}\geq F_{n+2}.$$ Therefore $f(a,b,c)\geq F_{n+2}$ always holds.
Finally, assume $f(a,b,c)=F_{n+2}$. By the above argument, this equality is possible only if $b=1$ and the dimensions of $\H(q_1,\ldots,q_a)$ and $\H(q_{a+2},\ldots,q_n)$ are $F_{a+2}$ and $F_{c+2}$, respectively. Then $\H(q_1,\ldots,q_a)$ and $\H(q_{a+2},\ldots,q_n)$ are commutative by induction hypothesis. The definition for $a$, $b$, and $c$ implies $q_a=0$, $q_{a+1}\ne0$, and $q_{a+2}=0$. It follows from Theorem \[thm:commutative\] that $q_i=0$ when $i\equiv a$ mod $2$ and $q_i\ne0$ otherwise. Hence $\H(\bq)$ must be commutative. On the other hand, if $\H(\bq)$ is commutative then its dimension is $F_{n+2}$ by Corollary \[cor:ComDim\]. This completes the proof.
Next we explain the connection between a collapse-free and commutative $\H(\bq)$ and the *Möbius algebra* $A(L)$ of a finite lattice $L$. According to Stanley [@EC1 §3.9], the Möbius algebra $A(L)$ is the monoid algebra of $L$ over $\FF$ with the meet operation, and it is a direct sum of $|L|$ many one-dimensional subalgebras.
Now let $Z$ be a finite rank two poset. Set $X:=\{x\in Z: x>y \textrm{ for some }y\in Z\}$ and $Y=Z\setminus X$. By abuse of notation we denote by $Z$ the underlying graph of $Z$. Let $L$ be the distribute lattice $J(Z)$ of the order ideals of $Z$ ordered by reverse inclusion (so that the meet operation is the union of ideals). Suppose that $(W,S)$ is a Coxeter system whose Coxeter diagram coincides with $Z$. Denote by $\H(Z)$ the Hecke algebra $\H(\bq)$ of $(W,S)$ with parameters $\bq=(q_s:s\in S)$ given by $q_s=0$ for all $s\in X$ and $q_s=1$ for all $s\in Y$.
When $\cha(\FF)\ne2$ the algebra $\H(Z)$ is isomorphic the Möbius algebra of $J(Z)$.
By definition, the algebra $\H(Z)$ is generated by $\{T_x:x\in X\}\cup\{T_y:y\in Y\}$ with relations $$\begin{cases}
T_x^2=T_x,\ T_y^2=1,& \forall x\in X,\ \forall y\in Y, \\
T_zT_{z'}=T_{z'}T_z, & \forall z,z'\in Z, \\
T_xT_y=T_x, & \textrm{if $x>y$ in $Z$ (by Lemma~\ref{lem:01=0})}.
\end{cases}$$ One has a basis $\{T_I:I\in\II(Z)\}$ for $\H(Z)$ by Corollary \[cor:ComDim\].
When $\cha(\FF)\ne2$ one can replace the generator $T_y$ with $T'_y:=(T_y+1)/2$, which is now an idempotent, for every $y\in Y$. One checks that all other relations given above remain same. Write $T'_x=T_x$ for all $x\in X$. Then the algebra $H(Z)$ is generated by $\{T'_x:x\in X\} \cup\{T'_y:y\in Y\}$ and has a basis $\{T'_I:I\in\II(Z)\}$ where $T'(I):= \prod_{z\in I} T'_z$.
Any independent set $I$ in $\II(Z)$ is an antichain in $Z$, generating an order ideal $J(I)$ consisting of all elements weakly below some element of $I$. Conversely, an order ideal of $Z$ corresponds to an independent set $I\in\II(Z)$ consisting of all maximal elements in this order ideal. Hence sending $T'(I)$ to the order ideal $J(I)$ for all $I\in\II(Z)$ gives a vector space isomorphism $H(Z) \cong A(J(Z))$. To see this isomorphism preserves multiplications, let $I_1$ and $I_2$ be two elements in $\II(Z)$. Then $T'(I_1)T'(I_2)=T'(I_1\circ I_2)$ where $I_1\circ I_2$ is obtained from $I_1\cup I_2$ by removing all the elements that are less than some element of $I_1\cup I_2$. On the other hand, the order ideal $J(I_1)\cup J(I_2)$ has maximal elements given by $I_1\circ I_2$, and thus equals $J(I_1\circ I_2)$. This completes the proof.
The commutative case {#sec:H(G,R)}
====================
By Theorem \[thm:commutative\] and Corollary \[cor:ComDim\], if $\H(\bq)$ is collapse-free and commutative, then the Coxeter diagram of $(W,S)$ is simply laced with a bipartite underlying graph $G$, and the dimension of $\H(\bq)$ is $|\II(G)|$. In this section we define and study a more general commutative algebra for any (unweighted) simple graph $G$, whose dimension is still $|\II(G)|$.
Basic results
-------------
Let $G$ be a simple graph with vertex set $V(G)$ and edge set $E(G)$, and let $R\subseteq V(G)$. We define an algebra $\H(G,R)$ to be the quotient of the polynomial algebra $\FF[x_v:v\in V(G)]$ by the ideal generated by $$%\begin{equation}\label{eq:HGR}
\{x_r^2: r\in R\} \cup
\{x_v^2-x_v: v\in V(G)\setminus R\} \cup
\{x_ux_v: uv\in E(G)\}.$$The image of $x_v$ in the quotient algebra $\H(G,R)$ is still denoted by $x_v$ for all $v\in V$. This algebra $\H(G,R)$ generalizes the commutative algebra $\H(\bq)$ by the following result.
\[prop:HGR\] If $\H(\bq)$ is collapse-free and commutative then it is isomorphic to $\H(G,R)$ as an algebra, where $G$ is the underlying graph of the Coxeter diagram of $(W,S)$ and $R:=\{s\in S:q_s=-1\}$.
The algebra $\H(\bq)$ has another generating set $\{x_s:s\in S\}$ given by $$x_s:=
\begin{cases}
T_s, & q_s=0,\\
T_s-1, & q_s=-1, \\
(1-T_s)/(1+q_s), & {\rm otherwise}. %(T_s-1)/(1+q_s)
\end{cases}$$ If $\H(\bq)$ is collapse-free and commutative then one can check that the relations for $\{T_s:s\in S\}$ are equivalent to the relations for $\{x_s:s\in S\}$ in the definition of $\H(G,R)$ using Lemma \[lem:01=0\]. Thus the result holds.
\(i) The set $R=\{s\in S:q_s=-1\}$ associated with $\H(\bq)$ depends on $\cha(\FF)$. For example, an element $s\in S$ with $q_s=1$ belongs to $R$ if and only if $\cha(\FF)=2$. However, once $R$ is chosen for the algebra $\H(G,R)$, our results on $\H(G,R)$ do not depend on $\cha(\FF)$ any more.
\(ii) By Theorem \[thm:commutative\], if $\H(\bq)$ is collapse-free and commutative then $R=\{s\in S:q_s=-1\}$ must be an independent set of $G$. But the commutative algebra $\H(G,R)$ is well defined for any simple graph $G$ and any subset $R\subseteq V(G)$. (iii) The *Stanley-Reisner ring of the independence complex of $G$* is defined as the quotient of the polynomial algebra $\FF[y_v:v\in V(G)]$ by the *edge ideal* generated by $(y_uy_v:uv\in E(G))$. See e.g. [@CookNagel]. The algebra $\H(G,R)$ is a further quotient of the Stanley-Reisner ring of the independence complex of $G$.
Now we study the algebra $\H(G,R)$ and our results will naturally apply to the commutative algebra $\H(\bq)$ by Proposition \[prop:HGR\]. We first need some notation. For any $U\subseteq V(G)$ we write $$X_U:=\prod_{u\in U} x_u\quad {\rm and}\quad X^-_U:=\prod_{u\in U} x^-_u$$ where $x^-_v:=1-x_v$ for all $v\in V(G)$. One sees that $X_U\ne0$ if and only if $U$ belongs to $\mathcal I(G)$, the set of all independent sets in $G$. We define the *length* of a nonzero monomial $X_I$ to be the cardinality $|I|$ of the independent set $I$. We partially order the nonzero monomials by their lengths. We denote by $N(U)$ the set of all vertices that are adjacent to some vertex $u\in U$ in $G$. We will often identify a subset $U$ of $V(G)$ with the subgraph of $G$ induced by $U$, whose vertex set is $U$ and whose edge set is $\{\{u,v\}\in E(G):u,v\in U\}$. We will also write “$+$” and ”$-$” for set union and difference. For example, we write $G-R$ for the subgraph of $G$ induced by $V(G)-R$, and hence $\II(G-R)$ consists of all independent sets of $G-R$. We give two bases for $\H(G,R)$ in the following proposition, which generalizes Corollary \[cor:ComDim\].
\[prop:basisG\] The algebra $\H(G,R)$ has dimension $|\mathcal I(G)|$ and two bases $\{X_I:I\in\mathcal I(G)\}$ and $$\label{eq:basisG}
\left\{ X_{I+ J} X^-_{G-R-I}: I\in\II(G-R),\ J\in\II(R-N(I)) \right\}.$$
The defining relations for $\H(G,R)$ immediately imply that it is spanned by $\{X_I:I\subseteq I(G)\}$. Let $\FF \mathcal I(G)$ be the vector space over $\FF$ with a basis $\mathcal I(G)$. We define an action of $\H(G,R)$ on $\FF \II(G)$ by $$x_v(I)=
\begin{cases}
0, & {\rm if}\ v\in I\cap R\ {\rm or}\ I\cup\{v\}\notin\mathcal I(G),\\
I\cup\{v\}, & {\rm otherwise.}
\end{cases}$$ It is not hard to check that this action satisfies the defining relations for $\H(G,R)$. For any $I\in\mathcal I(G)$, one has $X_I(\emptyset)=I$. This forces the spanning set $\{X_I:I\subseteq I(G)\}$ to be a basis for $\H(G,R)$.
One sees that any independent set of $G$ can be written uniquely as $I+J$ for some $I\in\II(G-R)$ and $J\in \II(R-N(I))$, and the shortest term in $X_{I+J} X^-_{G-R-I}$ is $X_{I+ J}$. Thus (\[eq:basisG\]) is also a basis for $\H(G)$.
Let $G'$ be a subgraph of $G$ induced by $V'\subseteq V(G)$, and let $R'=V'\cap R$. The following corollary allows us to study the induction of $\H(G',R')$-modules to $\H(G,R)$ and the restriction of $\H(G,R)$-modules to $\H(G',R')$.
\[cor:EmbedAlgebra\] The subalgebra of $\H(G,R)$ generated by $\{x_v:v\in V'\}$ is isomorphic to $\H(G',R')$.
There is an injection $\phi: \H(G',R')\hookrightarrow \H(G,R)$ of algebras defined by sending the generators $x'_v$ for $\H(G',R')$ to the generators $x_v$ for $\H(G,R)$ for all $v\in V'$. By Proposition \[prop:basisG\], the algebra $\H(G',R')$ admits a basis consisting of the elements $X'_I:=\prod_{v\in I} x'_v$ for all $I\in\II(G')$. The map $\phi$ sends this basis to the basis $\{X_I:I\in\II(G')\}$ for the subalgebra of $\H(G,R)$ generated by $\{x_v:v\in V'\}$, giving the desired isomorphism.
Projective indecomposable modules and simple modules
----------------------------------------------------
We first decompose the algebra $\H(G,R)$ into a direct sum of indecomposable submodules.
\[thm:decomp\] There is an $\H(G,R)$-module decomposition $$\label{eq:H(G,R)}
\H(G,R) = \bigoplus_{I\subseteq \II(G-R)}\P_I(G,R)$$ where each $\P_I(G,R):=\H(G,R)X_IX^-_{G-R-I}$ is an indecomposable $\H(G,R)$-module with a basis $$\label{eq:BasisP}
\left\{ X_{I+J} X^-_{G-R-I}: J\in \II(R-N(I)) \right\}$$ and hence has dimension $|\II(R-N(I))|$. The top of $\P_I(G,R)$, denoted by $\C_I(G,R)$, is one-dimensional and admits an $\H(G,R)$-action by $$x_v =
\begin{cases}
1, & {\rm if}\ v\in I, \\
0, & {\rm if}\ v\in G-I.
\end{cases}$$
Let $I\in\II(G-R)$. Since $x_vx^-_v=0$ for any $v\in G-R-I$, and $x_ux_v=0$ whenever $v\in I$ and $u\in N(v)$, one has $$\label{eq:HP}
X_J( X_I X^-_{G-R-I} ) =
\begin{cases}
X_{I+J} X^-_{G-R-I}, & {\rm if}\ J-I\in \II(R-N(I)), \\
0, & {\rm otherwise}
\end{cases}$$ for any $J\in\II(G)$. Hence (\[eq:BasisP\]) spans $\P_I(G,R)$. By Proposition \[prop:basisG\], $\H(G,R)$ has a basis (\[eq:basisG\]) which is the union of the spanning sets (\[eq:BasisP\]) for all $I\in\II(G-R)$. This implies the direct sum decomposition (\[eq:H(G,R)\]) of $\H(G,R)$ and forces the spanning set (\[eq:BasisP\]) to be a basis for $\P_I(G,R)$. The dimension of $\P_I(G,R)$ is then clear.
Now we prove that $\P_I(G,R)$ is indecomposable and find its top. Since $x_r^2=0$ for any $r\in R$, the elements in (\[eq:BasisP\]) are all nilpotent except $X_IX^-_{G-R-I}$. The span $\mathbf N_I$ of these nilpotent elements is contained in the nilradical of $\H(G,R)$, and hence in the radical of $\P_I(G,R)$. By (\[eq:HP\]), the quotient $\P_I(G,R)/\mathbf N_I$ is isomorphic to the one-dimensional $\H(G,R)$-module $\C_I(G,R)$. It follows that the radical of $\P_I(G,R)$ equals $\mathbf N_I$, and the top of $\P_I(G,R)$ is isomorphic to $\C_I(G,R)$. Then $\P_I(G,R)$ must be indecomposable as its top is simple.
By Theorem \[thm:decomp\], $\{\P_I(G,R):I\in\II(G-R)\}$ and $\{\C_I(G,R):I\in\II(G-R)\}$ are complete lists of pairwise-nonisomorphic projective indecomposable $\H(G,R)$-modules and simple $\H(G,R)$-modules, respectively. The proof of Theorem \[thm:decomp\] shows that the radical of $\P_I(G,R)$ is spanned by $\{X_{I+J}X^-_{G-R-I}: \emptyset\ne J\in\II(R-N(I))\}$ and hence the radical of $\H(G,R)$ is the ideal generated by $\{x_r:r\in R\}$. This ideal coincides with the nilradical of $\H(G,R)$, showing that $\H(G,R)$ is a *Jacobson ring*. Some other consequences of Theorem \[thm:decomp\] are listed below.
\[cor:decomp\] Theorem \[thm:decomp\] implies the following results.
\(i) The algebra $\H(G,R)$ is semisimple if and only if $R=\emptyset$.
\(ii) For any $I\in\II(G-R)$ one has $\P_I(G,R)\cong \H(G,R)\otimes_{\H(G-R,\emptyset)} \C_I(G-R,\emptyset)$.
\(iii) The socle of $\P_I(G,R)$ is the direct sum of $\FF X_{I+J}X^-_{G-R-I}\cong\C_I(G,R)$ for all maximal $J$ in $\II(R-N(I))$.
\(iv) The Cartan matrix of $\H(G,R)$ is the diagonal matrix ${\rm diag} \left\{ |\II(R-N(I))|: I\in\II(G-R) \right\}$.
\(v) A complete set of primitive orthogonal idempotents of $H(G)$ is given by $\{X_IX^-_{G-R-I} : I\in\mathcal I(G-R)\}$.
\(i) An algebra is semisimple if and only if its radical is 0. The radical of $\H(G,R)$ is generated by $\{x_r:r\in R\}$, which is 0 if and only if $R=\emptyset$.
\(ii) There is a bilinear map $
\H(G,R)\times\C_I(G-R,\emptyset)\to \P_I(G,R)
$ defined by sending $(X_J,z_I)$ to $X_J X_I X^-_{G-R-I}$ for all $J\in \II(G)$, where $z_I$ is an element spanning $\C_I(G-R,\emptyset)$. This induces an algebra surjection $$\phi:\H(G,R)\otimes_{\H(G-R,\emptyset)} \C_I(G-R,\emptyset)\twoheadrightarrow \P_I(G,R)$$ which sends $X_J\otimes_{\H(G-R,\emptyset)} z_I$ to $X_J X_I X^-_{G-R-I}$ for all $J\in\II(G)$. One sees that $\H(G,R)\otimes_{\H(G-R,\emptyset)}\C_I(G-R,\emptyset)$ is spanned by $\{X_J\otimes_{\H(G-R,\emptyset)} z_I:J\in\II(R-N(I))\}$, which is sent by $\phi$ to the basis (\[eq:BasisP\]) for $\P_I(G,R)$. Hence $\phi$ must be an isomorphism.
\(iii) If $J$ is maximal in $\II(R-N(I))$ then $\FF X_{I+J} X^-_{G-R-I}$ admits the same action of $\H(G,R)$ as $\C_I(G,R)$. Thus $\FF X_{I+J} X^-_{G-R-I}$ is a simple submodule of $\P_I(G,R)$ and must be contained in the socle of $\P_I(G,R)$. Conversely, we need to show that any simple submodule $M$ of $\P_I(G,R)$ is contained in the direct sum of $\FF X_{I+J} X^-_{G-R-I}$ for all maximal $J\in\II(R-N(I))$. Using the basis (\[eq:BasisP\]) for $\P_I(G,R)$ one writes an arbitrary element of $M$ as $$z = \sum_{J\in\II(R-N(I))} c_J X_{I+J}X^-_{G-R-I},\quad c_J\in\FF.$$ Let $K$ be a minimal independent set in $\II(R-N(I))$ such that $c_K\ne0$. It suffices to show that $K$ is also maximal in $\II(R-N(I))$. If not, then there exists $r\in R-K$ such that $K+r\in\II(R-N(I))$. For any $J\in \II(R-N(I))$, one sees that $$x_rX_{I+J}X^-_{G-R-I} =
\begin{cases}
0, & {\rm if}\ r\in J\cup N(I\cup J), \\
X_{I+J+r}X^-_{G-R-I}\ne0, & {\rm otherwise.}
\end{cases}$$ Thus in the expansion of $x_r z$ in terms of the basis (\[eq:BasisP\]), the coefficients of $X_{I+K}X^-_{G-R-I}$ and $X_{I+K+r}X^-_{G-R-I}$ are $0$ and $c_K\ne0$, respectively. It follows that $x_rz\notin \FF z$ and $M$ is at least $2$-dimensional. This contradicts the simplicity of $M$.
\(iv) Let $I\in \II(G-R)$. We order the elements $X_{I+ J} X^-_{G-R-I}$ by $|J|$ for all $J\in\II(R-N(I))$. This induces a filtration for $\P_I(G,R)$, under which $$x_v X_{I+ J} X^-_{G-R-I} \equiv
\begin{cases}
X_{I+ J} X^-_{G-R-I}, & v\in I,\\
0, & v\notin I.
\end{cases}$$ Hence every simple composition factor of $\P_I(G,R)$ is isomorphic to $\C_I(G,R)$. The Cartan matrix follows.
\(v) This follows from the decomposition of $\H(G,R)$ given in Theorem \[thm:decomp\] and the equality $$\sum_{I\in\mathcal I(G-R)} X_IX^-_{G-R-I}
= \sum_{J\in\II(G-R)} \sum_{I\subseteq J} (-1)^{|J\setminus I|} X_J
= 1.$$ The reader who is not familiar with primitive orthogonal idempotents can find more details in [@ASS §I.4].
Induction and restriction
-------------------------
Let $G'$ be an induced subgraph of $G$ and let $R'=G'\cap R$. By Corollary \[cor:EmbedAlgebra\], the following induction and restriction are well defined for isomorphism classes of modules:
- the induction $M\uparrow\,\!_{G',R'}^{G,R}:=\H(G,R)\otimes_{\H(G',R')} M$ of an $\H(G',R')$-module $M$ to $\H(G,R)$,
- the restriction $N\downarrow\,\!_{G',R'}^{G,R}$ of an $\H(G,R)$-module $N$ to $\H(G',R')$.
\[prop:IndC\] Assume $R=\emptyset$, and hence $R'=\emptyset$. Write $(G,R)=(G)$ and $(G',R')=(G')$. Then for any $I'\in\II(G')$, $$\C_{I'}(G')\uparrow\,_{G'}^G \cong\bigoplus_{I\in\II(G):I\cap G'=I'} \C_I(G).$$
Suppose that $\C_{I'}(G')=\FF z$. Using the universal property of the tensor product one obtains an algebra sujection $$\phi: \H(G)\otimes_{\H(G')}\FF z \twoheadrightarrow \H(G)X_{I'}X^-_{G'-I'}$$ which sends $X_J\otimes_{\H(G')} z$ to $X_J X_{I'}X^-_{G'-I'}$ for all $J\in\II(G)$. One sees that $\H(G)\otimes_{\H(G')}\FF z$ is spanned by $$\{X_I\otimes_{\H(G')} z: I\in\II(G),\ I\cap G'=I'\}$$ since $x_vz=0$ for all $v\in G'-I'$. This spanning set is sent by $\phi$ to $$\{X_I X^-_{G'-I'}: I\in\II(G),\ I\cap G'=I'\}$$ which is a basis for $\H(G)X_{I'}X^-_{G'-I'}$ since it is a spanning set triangularly related to $\{X_I:I\in\II(G),\ I\cap G'=I'\}$, a linearly independent set in $\H(G)$. Thus $\phi$ is an isomorphism. Using the length filtration induced by $|I|$ for all $I$ appearing in the above basis, one sees that the composition factors of $\H(G)X_{I'}X^-_{G'-I'}$ are $\C_I(G)$ for all $I\in\II(G)$ with $I\cap G'=I'$, each appearing exactly once. This completes the proof as $\H(G)$ is semisimple by Corollary \[cor:decomp\] (i).
\[prop:IndP\] Let $I\in\II(G-R)$ and $J\in\II(G'-R')$. Then $\C_I(G,R)\downarrow\,\!_{G',R'}^{G,R} \cong \C_{I\cap G'}(G',R')$ and $$\P_J(G',R')\uparrow\,_{G',R'}^{G,R} \cong \bigoplus_{K\in\II(G-R): K\cap G' = J } \P_K(G,R).$$
The restriction of $\C_I(G,R)$ follows easily from the definition. By Corollary \[cor:decomp\] (ii) and Proposition \[prop:IndC\], $$\begin{aligned}
\P_J(G',R')\uparrow\,_{G',R'}^{G,R} &\cong&
\C_J(G'-R',\emptyset) \uparrow\,_{G'-R',\emptyset}^{G',R'} \uparrow\,_{G',R'}^{G,R} \\
&\cong& \C_J(G'-R',\emptyset) \uparrow\,_{G'-R',\emptyset}^{G,R} \\
&\cong& \C_J(G'-R',\emptyset) \uparrow\,_{G'-R',\emptyset}^{G-R,\emptyset} \uparrow\,_{G-R,\emptyset}^{G,R} \\
&\cong & \bigoplus_{ K\in\II(G-R),\ K\cap G'=J} \C_K(G-R,\emptyset) \uparrow\,_{G-R,\emptyset}^{G,R} \\
&\cong & \bigoplus_{K\in\II(G-R),\ K\cap G'=J} \P_K(G,R). \end{aligned}$$ This completes the proof.
It is not hard to obtain the simple composition factors of the induction of a simple $\H(G',R')$-module to $\H(G,R)$. But the restriction of a projective indecomposable $\H(G,R)$-module to $\H(G',R')$ is not always projective.
Commutative Hecke algebras of type A {#sec:H01}
====================================
We apply the previous results to commutative Hecke algebras of type A with independent parameters.
Decomposition of Fibonacci numbers
----------------------------------
Let $(W,S)$ be the Coxeter system of type $A_n$ whose Coxeter diagram is the path $\xymatrix @C=8pt{ s_1 \ar@{-}[r] & s_2 \ar@{-}[r] & \cdots \ar@{-}[r] & s_n}$. We often identify $s_i$ with $i$ and write $\bq:=(q_1,\ldots,q_n)\in \FF^n$. Let $\H(\bq)$ be a collapse-free and commutative Hecke algebra of $(W,S)$ with independent parameters $\bq$. Then Theorem \[thm:commutative\] implies that either $q_i=0$ for all odd $i\in[n]$ and $q_i\ne0$ for all even $i\in[n]$, or the other way around. Proposition \[prop:HGR\] provides an algebra isomorphism $H(\bq)\cong \H(P_n,R)$, where $R:=\{i\in[n]:q_i=-1\}$. Note that the set $R$ obtained from $\H(\bq)$ depends on $\cha(\FF)$. For example, if $\bq=(1,0,1,0,1,\ldots)$ then $R=\emptyset$ and $\H(P_n,R)$ is semisimple if $\cha\FF\ne2$, but $R=\{1,3,5,\ldots\}$ and $\H(P_n,R)$ is not semisimple if $\cha(\FF)=2$. However, the algebra $\H(P_n,R)$ is defined for any subset $R\subseteq[n]$ and our results do not depend on $\cha(\FF)$. We first give decompositions of the Fibonacci numbers.
\[prop:DimDecomp\] Let $R\subseteq[n]$. Then $$F_{n+2}=\sum_{I\in\II(P_n-R)}|\II(R-N(I))|.$$
Let $G$ be a simple graph and let $R\subseteq V(G)$. By Proposition \[prop:basisG\], the dimension of $\H(G,R)$ is $|\II(G)|$. By Theorem \[thm:decomp\], $\H(G,R)$ is the direct sum of $\P_I(G,R)$ for all $I\in\II(G-R)$, and the dimension of each $\P_I(G,R)$ is $|\II(R-N(I))|$. Hence $$|\II(G)|=\sum_{I\in\II(G-R)}|\II(R-N(I))|.$$ Now take $G=P_n$. We know that $|\II(P_n)|=F_{n+2}$ by Corollary \[cor:ComDim\]. Thus the result holds.
\[example:Fib1\] Let $R:=[m]$ for some $m\in[n-1]$. Then the subgraph of $P_n$ induced by $R$ is the path $P_m$. If $I\in\II(P_n-[m+1])$ then $\II(R-N(I))=\II(R)$. If $I\in\II(P_n-R)$ contains $m+1$ then $I-\{m+1\}\in\II(P_n-[m+2])$ and $\II(R-N(I)=\II([m-1])$. Thus we recover a well known identity $
F_{n+2} = F_{m+2}F_{n-m+1} + F_{m+1}F_{n-m}.
$
\[example:Fib2\] Let $X$ and $Y$ be the subsets of odd and even numbers in $[n]$, respectively. Then $$F_{n+2} = \sum_{ I\subseteq X} 2^{|Y-N(I)|} = \sum_{J\subseteq Y} 2^{|X-N(J)|}.$$ This writes a Fibonacci number as a sum of $2^{|X|}$ or $2^{|Y|}$ many powers of $2$. Some small examples are provided below. $$\begin{tabular}{|c|c||c|c|}
\hline
n=1 & 2 = 1+1 = 2 & n=2 & 3 = 2+1 \\
\hline
n=3 & 5 = 2+1+1+1 = 4+1 & n=4 & 8 = 4+2+1+1 \\
\hline
n=5 & 13 = 4+2+2+1+1+1+1=1 = 8+2+2+1 & n=6 & 21 = 8+4+2+2+2+1+1+1 \\
\hline
\end{tabular}$$
The semisimple commutative case
-------------------------------
Now we study the representation theory of the semisimple commutative algebra $\H_n := \H(P_{n-1},\emptyset)$, where $\H_0:=\FF$ by convention. We write $\alpha\propto n$ if $\alpha=(\alpha_1,\ldots,\alpha_\ell)$ is a composition of $n$ with all internal parts larger than $1$, i.e. $\alpha_i>1$ whenever $1<i<\ell$.
The algebra $\H_n$ decomposes into a direct sum of $F_{n+1}$ many 1-dimensional simple submodules $\C_\alpha$ indexed by $\alpha\propto n$, with the $\H_n$-action on $\C_\alpha$ given by $x_i=1$ if $i\in D(\alpha)$ or $x_i=0$ otherwise.
For any composition $\alpha$ of $n$, one sees that $D(\alpha)$ is an independent set of $P_{n-1}$ if and only if $\alpha$ has no internal parts equal to $1$. Thus the result follows from Theorem \[thm:decomp\].
Since $\H_n$ is semisimple, its two Grothendieck groups $G_0(\H_n)$ and $K_0(\H_n)$ are the same. Given nonnegative integers $m$ and $n$, the subalgebra of $\H_{m+n}$ generated by $x_1,\ldots,x_{m-1},x_{m+1},\ldots,x_{m+n-1}$ is isomorphic to $\H_m\otimes\H_n$, giving a natural embedding $\H_m\otimes\H_n\hookrightarrow\H_{m+n}$. Thus there is a tower $\H_\bullet: \H_0\hookrightarrow \H_1\hookrightarrow \H_2\hookrightarrow \cdots$ of algebras, whose Grothendieck group $G_0(\H_\bullet):=\bigoplus_{n\geq0} G_0(\H_n)$ has a product and a coproduct defined by $$\C_\alpha \htimes \C_\beta := \left( \C_\alpha \otimes \C_\beta \right) \uparrow\,\!_{\H_m\otimes \H_n}^{\H_{m+n}}
\quad\text{and}\quad
\Delta(\C_\alpha):=\sum_{0\le i\le m} \C_\alpha \downarrow\,\!_{\H_i\otimes \H_{m-i}}^{\H_m}$$ for all $\alpha\propto m$ and $\beta\propto n$. One sees that the product $\htimes$ and the coproduct $\Delta$ are well defined, with unit $u$ sending $1$ to $C_\emptyset$, and counit $\epsilon$ sending $C_\emptyset$ to $1$ and $C_\alpha$ to $0$ for all $\alpha\propto n$, $n\geq1$. Applying Proposition \[prop:IndP\] immediately gives the following explicit formulas for the product and coproduct below. See §\[sec:rep\] for the notation $\alpha\beta$, $\alpha\rhd\beta$, $\alpha_{\leq i}$, and $\alpha_{>i}$.
\[prop:simple\] For any $\alpha\propto m$ and $\beta\propto n$, one has $$\C_\alpha \htimes \C_\beta
= \begin{cases}
\C_{\alpha\beta} \oplus \C_{\alpha \rhd \beta}, & {\rm if}\ \alpha\beta\propto m+n, \\
\C_{\alpha\rhd\beta}, & {\rm otherwise,}
\end{cases}
\quad\text{and}\quad
\Delta(\C_\alpha) = \sum_{0\le i\le m} \C_{\alpha_{\leq i}} \otimes \C_{\alpha_{>i}}.$$
For example, one has $\C_{132}\htimes \C_{41} = \C_{13241}\oplus\C_{1361}$, $\C_{121}\htimes \C_{32} = \C_{1242}$, and $$\Delta(\C_{122}) = \C_\emptyset\otimes\C_{122} + \C_1\otimes\C_{22} + \C_{11}\otimes \C_{12} + \C_{12} \otimes C_2 + \C_{121}\otimes\C_1 + \C_{122}\otimes \C_\emptyset.$$
\[cor:duality\] (i) The graded algebra and coalgebra structures of $G_0(\H_\bullet)$ are dual to each other via the pairing defined by $\langle \C_\alpha,\C_\beta\rangle:=\delta_{\alpha,\,\beta}$ for all $\alpha\propto m$ and $\beta\propto n$, with a self-dual basis $\{\C_\alpha:\alpha\propto n,\ \forall n\geq0\}$.
\(ii) There is a surjection $\sigma:K_0(\H_\bullet(0)) \twoheadrightarrow G_0(\H_\bullet)$ of graded algebras and an injection $\iota: G_0(\H_\bullet)\hookrightarrow G_0(\H_\bullet(0))$ of graded coalgebras such that the two maps are dual to each other.
The first assertion holds since it follows from Proposition \[prop:simple\] that $$\label{eq:duality}
\langle \C_\alpha \htimes \C_\beta, \C_\gamma \rangle = \langle \C_\alpha\otimes\C_\beta, \Delta(\C_\gamma) \rangle,\quad \langle \C_\emptyset, \C_\alpha \rangle = \epsilon(\C_{\alpha}).$$ For the second assertion, first recall the representation theory of the 0-Hecke algebra $H_n(0)$ from §\[sec:rep\]. We define the surjection $\sigma$ by $$\label{eq:surj}
\sigma(\P_\alpha(0))=
\begin{cases}
\C_\alpha, & \textrm{if } \alpha\propto n, \\
0, & \textrm{otherwise.}
\end{cases}$$ We define the injection $\iota$ by sending $\C_\alpha$ to $\C_\alpha(0)$ for all $\alpha\propto n$. One sees that $\sigma$ and $\iota$ are maps of graded algebras and coalgebras, respectively, by comparing Proposition \[prop:simple\] with Proposition \[prop:ProdP\]. It is not hard to check that $$\langle \sigma(\P_\alpha(0)),\C_\beta \rangle = \langle \P_\alpha(0), \iota(\C_\beta) \rangle = \delta_{\alpha,\,\beta},\quad \forall \alpha\models m,\ \forall \beta\propto n.$$ This shows that $\sigma$ and $\iota$ are dual maps. Hence (ii) holds.
\(i) Comparing the definitions for $\H_n$ and $\H_n(0)$ one sees that the former is a quotient of the latter by the relations $T_iT_{i+1}=0$ for all $i=1,\ldots,n-2$. Thus any $\H_n$-module is automatically an $\H_n(0)$-module. This induces the injection $\iota:G_0(\H_\bullet)\hookrightarrow G_0(\H_\bullet(0))$ given in the previous proposition. On the other hand, $\C_\alpha(0)={\rm top} (\P_\alpha(0))$ admits an $\H_n$-action and is hence isomorphic to $\C_\alpha$ if and only if the composition $\alpha$ has all internal parts larger than $1$. This induces the surjection $\sigma:K_0(\H_\bullet(0))\twoheadrightarrow G_0(\H_\bullet)$ defined in (\[eq:surj\]).
\(ii) It is well known that the number of partitions of $n$ is no more than the Fibonacci number $F_{n+1}$. One may suspect that the surjection $K_0(\H_\bullet(0))\cong\NSym\twoheadrightarrow \Sym\cong G_0(\CC\SS_\bullet)$ factors through the surjection $\sigma: K_0(\H_\bullet(0))\twoheadrightarrow G_0(\H_\bullet)$. This is *not* true since the commutative image of the noncommutative ribbon Schur function $\bs_\alpha$ is the ribbon schur function $s_\alpha$, but $f(\P_\alpha(0))=0$ if $\alpha$ is a composition with an internal part equal to $1$. Similarly, one sees that the injection $G_0(\CC\SS_\bullet)\cong\Sym\hookrightarrow \QSym\cong G_0(\H_\bullet(0))$ does not factor through the injection $\iota: G_0(\H_\bullet)\hookrightarrow G_0(\H_\bullet(0))$, since the image of the injection $i$ is spanned by $\C_\alpha(0)$ for all $\alpha\propto n$, $n\geq0$, but $F_\alpha\in \Sym$ when $\alpha=1^n$, $n\geq3$.
\(iii) Unfortunately, $G_0(\H_\bullet)$ is not a bialgebra: one checks that $\Delta(\C_{11}\htimes\C_1)\ne \Delta(\C_{11})\htimes\Delta(\C_1)$ where the product on the right hand side is tensor-component-wise. Thus it does not fit into Zelevinsky’s theory on *positive self-dual Hopf algebras* [@Zelevinsky]. One also checks that $G_0(\H_\bullet)$ is not a *weak bialgebra* (c.f. [@WeakHopf]), nor an *infinitesimal bialgebra* (c.f. [@InfinitesimalHopf]).
Next we consider the *Bratteli diagram* of the tower of algebras $\H_0\hookrightarrow \H_1\hookrightarrow \H_2\hookrightarrow \cdots$. It has vertices at level $n$ indexed by $\alpha\propto n$, for $n=0,1,2,\ldots$, and it has an edge between $\alpha\propto n$ and $\beta\propto n-1$ if and only if $\C_\alpha\downarrow\,_{\H_{n-1}}^{\H_n}\cong \C_{\beta}$. One can draw this diagram using Proposition \[prop:simple\]. The first $5$ levels are illustrated below. $$\xymatrix @C=8pt @R=5pt {
&\cdots && \cdots && \cdots \\
4 & & 31 & 22 & 13 & & 121 \\
& 3 \ar@{-}[lu] \ar@{-}[ru] & & 21 \ar@{-}[u] & & 12 \ar@{-}[lu] \ar@{-}[ru] \\
& & 2 \ar@{-}[lu] \ar@{-}[ru] & & 11 \ar@{-}[ru]\\
& & & 1 \ar@{-}[lu] \ar@{-}[ru] \\
& & & \emptyset \ar@{-}[u]
}$$
Antipode
--------
We consider the antipode of $G_0(\H_\bullet)$. In general, let $A$ be an algebra with product $\mu$ and unit $u$, and let $C$ be a coalgebra with coproduct $\Delta$ and counit $\epsilon$. The *convolution product* of two maps $f,g\in {\rm Hom}_{\,\FF}(C,A)$ is defined as $f\star g := \mu\circ(f\otimes g)\circ \Delta$. One can check that $u\circ \epsilon$ is the two-sided identity element for this convolution product.
Let $(A',\mu',u')$ be another algebra and $(C',\Delta',\epsilon')$ be another coalgebra such that there exists an algebra surjection $\sigma: A\twoheadrightarrow A'$ and a coalgebra injection $\iota: C'\hookrightarrow C$. Then $u'=\sigma\circ u$, $\epsilon'=\epsilon\circ\iota$, and the following diagram is commutative, where $f':=\sigma\circ f\circ\iota$ and $g':=\sigma\circ g \circ \iota$. $$\label{eq:convolution}
\xymatrix @R=15pt{
C \ar@{->}[r]^-{\Delta} & C\otimes C \ar@{->}[r]^{f\otimes g} & A\otimes A \ar@{->>}[d]^{\sigma\otimes\sigma} \ar@{->}[r]^-{\mu} & A \ar@{->>}[d]^\sigma \\
C' \ar@{^(->}[u]^\iota \ar@{->}[r]^-{\Delta'} & C'\otimes C' \ar@{^(->}[u]^{\iota\otimes\iota} \ar@{->}[r]^{f'\otimes g'} & A'\otimes A' \ar@{->}[r]^-{\mu'} & A'
}$$
The *antipode* $S$ of a Hopf algebra $H$ is nothing but the 2-sided inverse of the identity map $1_H$ under the convolution product for the endomorphism algebra ${\rm End}_{\,\FF}(H)$. In other words, $S$ is defined by the commutative diagram below. $$\xymatrix @R=10pt @C=16pt {
& H\otimes H \ar@{->}[rr]^{S\otimes 1_H} & & H\otimes H \ar@{->}[rd]^{\mu} \\
H \ar@{->}_{\Delta}[rd] \ar@{->}^{\Delta}[ru] \ar@{->}^{\epsilon}[rr] & & \FF \ar@{->}[rr]^{u} & & H \\
& H\otimes H \ar@{->}[rr]_{1_H\otimes S} & & H\otimes H \ar@{->}[ru]_{\mu}
}$$ Note that the definition for the antipode $S$ only requires $H$ to be simultaneously an algebra and a coalgebra. Moreover, if the antipode $S$ of $H$ exists, and if there is an algebra surjection $\sigma: H\twoheadrightarrow H'$ and a coalgebra injection $\iota: H'\hookrightarrow H$, then one sees from that $S':=\sigma\circ S\circ \iota$ is the antipode of $H'$.
The antipodes of the dual graded Hopf algebras $\QSym$ and $\NSym$ are well known to the experts. If $\alpha=(\alpha_1,\ldots,\alpha_\ell)$ is a composition of $n$ then its *reverse* is the composition rev$(\alpha):=(\alpha_\ell,\ldots,\alpha_1)$ and its *conjugate* is the composition $\omega(\alpha):=({\rm rev}(\alpha))^c = {\rm rev}(\alpha^c)$. For example, if $\alpha=21321$ then rev$(\alpha)=12312$ and $\omega(\alpha)=22131$. The antipodes of $\QSym$ and $\NSym$ are defined by $S(F_\alpha) = (-1)^n F_{\omega(\alpha)}$ and $S(\bs_\alpha) = (-1)^n \bs_{\omega(\alpha)}$ for all $\alpha\models n$, $n\ge0$, where $\{F_\alpha\}$ and $\{\bs_\alpha\}$ are dual bases for $\QSym$ and $\NSym$.
However, the same rule does not work for $G_0(\H_\bullet)$. To give the antipodes of $G_0(\H_\bullet)$ we introduce a free $\mathbb Z$-module $\Comp$ with a basis consisting of all compositions. By Proposition \[prop:ProdP\], we can define a product $\alpha\htimes\beta := \alpha\beta+\alpha\rhd\beta$ and a coproduct $\Delta(\alpha) := \sum_{0\leq i\leq|\alpha|} \alpha_{\leq i}\otimes\alpha_{>i}$ for all compositions $\alpha$ and $\beta$, such that there is an algebra isomorphism $\Comp\cong K_0(\H_\bullet(0))$ and a coalgebra isomorphism $\Comp\cong G_0(\H_\bullet(0))$. The basis of all compositions for $\Comp$ is self-dual under the pairing $\langle \alpha,\beta\rangle:= \delta_{\alpha,\beta}$. There is an algebra surjection $\sigma: \Comp\twoheadrightarrow G_0(\H_\bullet)$ defined by $$\sigma(\alpha) =
\begin{cases}
\C_\alpha, & \alpha\propto n,\\
0, & {\rm otherwise,}
\end{cases}
\quad\forall \alpha\models n,\quad\forall n\ge0$$ and a coalgebra injection $\iota: G_0(\H_\bullet)\hookrightarrow \Comp$ sending $\C_\alpha$ to $\alpha$ for all $\alpha\propto n$, $n\ge0$. They are dual to each other by Corollary \[cor:duality\] (ii). One can check that $\Comp$ is not a bialgebra, but its antipode exists, giving the antipode of $G_0(\H_\bullet)$.
The map $S$ sending $\alpha$ to $(-1)^n \alpha^c$ for all $\alpha\models n$, $n\geq0$, is the antipode of $\Comp$. Consequently, the antipode of $G_0(\H_\bullet)$ is $\sigma\circ S\circ \iota$, which sends $\C_\alpha$ to $(-1)^n \C_{\alpha^c}$ if both $\alpha\propto n$ and $\alpha^c\propto n$ hold for some $n\ge0$, that is, if $\alpha\in\{22\cdots2, 122\cdots2, 22\cdots21, 122\cdots21\}$, or sends $\C_\alpha$ to $0$ otherwise.
If $S$ is the antipode of $\Comp$ then $\sigma\circ S\circ \iota$ is the antipode of $G_0(\H_\bullet)$. Thus it suffices to show that $$\sum_{i=0}^n S(\alpha_{\leq i}) \htimes \alpha_{>i}
= u\circ \epsilon(\alpha) = \sum_{i=0}^n {\alpha_{\leq i}} \htimes S({\alpha_{>i}}),\quad \forall \alpha\models n.$$ We only show the first equality and one can check that the same argument works for the second equality. It is trivial when $\alpha=\emptyset$. Assume $n\geq1$ below. Then $u\circ \epsilon(\alpha)=0$. For any $\beta\propto n$, it follows the self-duality of $\Comp$ that $$\label{eq:antipode}
\left\langle \sum_{i=0}^n S({\alpha_{\leq i}}) \htimes {\alpha_{>i}}, \beta
\right\rangle
= \sum_{i=0}^n \left\langle S({\alpha_{\leq i}}) \otimes {\alpha_{>i}}, \Delta(\beta) \right\rangle
= \sum_{i=0}^n \langle S({\alpha_{\leq i}}), {\beta_{\leq i}} \rangle \cdot \langle {\alpha_{>i}}, {\beta_{>i}} \rangle.$$ Thus it suffices to show that the sum of $L_i:=\langle S({\alpha_{\leq i}}), {\beta_{\leq i}} \rangle \cdot \langle {\alpha_{>i}}, {\beta_{>i}} \rangle$ for $i=0,1,\ldots,n$ equals $0$. One sees that $$L_i = \begin{cases}
(-1)^i, & {\rm if}\ (\alpha_{\leq i})^c = \beta_{\leq i},\ \alpha_{>i} = \beta_{>i},\\
0, & {\rm otherwise}.
\end{cases}$$ Let $N$ be the set of all $i\in\{0,1,\ldots,n\}$ such that $L_i\ne0$. It is trivial if $N=\emptyset$.
Suppose that $i\in N$. One sees that $D(\alpha_{\leq j})=D(\alpha)\cap[j-1]$ and $D(\alpha_{>j})=D(\alpha)\cap\{j+1,\ldots,n-1\}$ for any $j$; similarly for $\beta$. Hence $(\alpha_{\leq i})^c = \beta_{\leq i}$ implies $(\alpha_{\leq j}) = \beta_{\leq j}$ for all $j<i$, and $\alpha_{>i} = \beta_{>i}$ implies $\alpha_{>j} = \beta_{>j}$ for all $j>i$.
Since $(\alpha_{\leq i})^c = \beta_{\leq i}$, the number $i-1$ must belong to exactly one of $D(\alpha)$ and $D(\beta)$. This forces $\alpha_{>j} \ne \beta_{>j}$ for all $j<i-1$. Similarly, since $\alpha_{>i} = \beta_{>i}$, the number $i+1$ belongs to both or neither of $D(\alpha)$ and $D(\beta)$. This forces $(\alpha_{\leq j})^c \ne \beta_{\leq j}$ for all $j>i+1$. Hence $N\subseteq\{i-1,i,i+1\}$.
If $i$ belongs to exactly one of $D(\alpha)$ and $D(\beta)$, then $N=\{i,i+1\}$ since $(\alpha_{\leq i+1})^c = \beta_{\leq i+1}$ and $\alpha_{>i-1}\ne \beta_{i-1}$.
If $i$ belongs to both or neither of $D(\alpha)$ and $D(\beta)$, then $N=\{i-1,i\}$ since $(\alpha_{\leq i+1})^c \ne \beta_{\leq i+1}$ and $\alpha_{>i-1} = \beta_{i-1}$.
In either case above the equation (\[eq:antipode\]) equals $1 - 1 = 0$. This completes the proof.
Questions and Remarks {#sec:future}
=====================
Dimension
---------
If the Coxeter system $(W,S)$ is simply laced then using the basis for $\H(\bq)$ provided in Theorem \[thm:SimplyLaced\] one can obtain recursive formulas for the dimension of $\H(\bq)$. Is there anything else (e.g. closed formula and combinatorial interpretation) one can say about this dimension? More generally, how to write down a basis for $H(\bq)$ of an arbitrary Coxeter system?
Type A
------
In type A we know that the dimension of a collapse-free and commutative $\H(\bq)$ is a Fibonacci number; for example, one can take $\bq=(0,1,0,1,\ldots)$ or $\bq=(1,0,1,0,\ldots)$. What if $\H(\bq)$ is not commutative?
For instance, let $\bq$ be a sequence of $m-1$ zeros followed by $n-1$ ones. Then $\H(\bq)$ is a quotient of $H_m(0)\otimes \FF\SS_n$ and has dimension $(m-1)!(n!+m-1)$, by Theorem \[thm:SimplyLaced\]. How does the representation theory of this algebra connect to the representation theory of $H_m(0)$ and $\SS_n$?
Here is another example. If $\bq$ consists of $a$ many copies of $0$ followed by $b$ many copies of $q\ne0$ and then $c$ many copies of $0$, one can use Theorem \[thm:SimplyLaced\] to show that $$\begin{aligned}
\dim \H(\bq)
& = & c!(a!((b+1)!+a)+(a+1)!c).
%& = & a!(b+1)!c! + (a+1)!(c+1)! - a!c!.\end{aligned}$$ If $\bq$ consists of $a$ many copies of $q\ne0$ followed by $b$ many copies of $0$ and then $c$ many copies of $q'\ne0$, then $$\begin{aligned}
\dim \H(\bq)
&=& b!((a+1)!+b)+(b-1)!((a+1)!+b-1)((c+1)!-1).
%&=& (b-1)! [ (a+1)!(c+1)! + (b-1)((a+1)!+(c+1)!) + b^2-b+1)].\end{aligned}$$ What is the representation theory of $\H(\bq)$ in these two cases?
A final remark for type A: the tower of algebras $\H_0\hookrightarrow \H_1\hookrightarrow \H_2\hookrightarrow \cdots$ are different from the tower of algebras defined by Okada [@Okada], whose dimensions are $n!$ and whose Bratteli diagram is the Young-Fibonacci poset.
Other types
-----------
Our results on the commutative algebra $\H(G,R)$ applies to affine type A. Let $G$ be the cycle $C_n$ with vertices $1,\ldots,n$ and edges $\{1,2\},\ldots,\{n-1,n\},\{n,1\}$. We know that $\H(C_n,R)$ has a basis indexed by $\II(C_n)$. One checks that if $n\geq3$ then $\II(C_n)=\II(P_{n-1})\sqcup\II(P_{n-3})$, which is the shadow of the decomposition $$\H(C_n,R)\cong \H(P_{n-1},R\cap[n-1]) \oplus \H(P_{n-1},R\cap[n-1]) x_n.$$ Hence for $n\geq 3$ one has $|\II(C_n)| = F_{n+1}+F_{n-1}=L_n$, where $L_n$ is the $n$-th *Lucas number*. When $R=\emptyset$ the algebra $\H(C_n,\emptyset)$ is semisimple and has all simple modules 1-dimensional. Unfortunately, we do not have a tower of algebras $\H(C_n,\emptyset)$, since there is no natural embedding $C_n\hookrightarrow C_{n+1}$, and thus have no further result in this direction. One can also take $G$ to be the Coxeter diagram of finite type $D_n$ ($n\geq2$) or affine type $\widetilde D_n$ ($n\geq 5$). The dimension of $\H(G,R)$ is $4,5,9,14,23,\ldots$ (OEIS entry A000285) or $17, 24, 41,65,106,\ldots$ (OEIS entry A190996) in these cases.
Power series realization
------------------------
In Section \[sec:H01\] we defined an algebra and coalgebra structure for the Grothendieck group $G_0(\H_\bullet)$ of the tower of algebras $\H_\bullet: \H_0\hookrightarrow \H_1\hookrightarrow \H_2\hookrightarrow \cdots$, with a self-dual basis consisting of the simple modules, which are indexed by compositions with internal parts larger than 1. This is further extended to $\Comp$ with a basis indexed by all compositions. Is there a Frobenius type of characteristic map for $G_0(\H_\bullet)$, or in other words, is there a power series realization of $G_0(\H_\bullet)$ as both an algebra and a coalgebra, similarly to $G_0(\CC\SS_\bullet)\cong \Sym$, $G_0(\H_\bullet(0))\cong \QSym$, and $K_0(\H_\bullet(0))\cong \NSym$? And how about $\Comp$?
[50]{}
M. Aguiar, Infinitesimal Hopf algebras, Contemporary Mathematics 267 (2000) 1–30.
I. Assem, D. Simson, and A. Skowroński, Elements of the representation theory of associative algebras, vol. 1: Techniques of representation theory, London Mathematical Society Student Texts, vol. 65, Cambridge University Press, Cambridge, 2006.
A. Björner and F. Brenti, Combinatorics of Coxeter Groups, GTM 231, Springer 2005.
G. Böhm, F. Nill, and K. Szlachányi, Weak Hopf Algebras: I. Integral Theory and C-Structure, J. Algebra 221(1999) 385–438.
D. Cook II and U. Nagel, Cohen-Macaulay graphs and face vectors of flag complexes, SIAM J. Discrete Math. 26 (2012) 89–101.
D. Krob and J.-Y. Thibon, Noncommutative symmetric functions IV: Quantum linear groups and Hecke algebras at $q=0$, J. Algebraic Combin. 6 (1997) 339–376.
G. Lusztig, Hecke algebras with unequal parameters, CRM monograph series, vol.18, American Mathematical Society, 2003.
P.N. Norton, 0-Hecke algebras, J. Austral. Math. Soc. A 27 (1979) 337–357.
S. Okada, Algebras associated to the Young-Fibonacci lattice, Trans. Amer. Math. Soc. 346 (1994) 549–568.
R. Stanley, Enumerative Combinatorics, volume 1, second edition, Cambridge University Press, 2011.
R. Stanley, Enumerative combinatorics, volume 2, Cambridge University Press 1999.
A.V. Zelevinsky, Representations of finite classical groups: a Hopf algebra approach, Lecture Notes in Mathematics 869, Springer-Verlag, Berlin-New York, 1981.
[^1]: The author is grateful to Pasha Pylyavskyy and Victor Reiner for asking inspiring questions which lead to this work. He also thanks Victor Reiner for partial support from NSF grant DMS-1001933.
| |
All rights reserved. This publication is intended for use solely by faculty, students, and staff of Nova Southeastern University. No part of this publication may be reproduced, distributed, or transmitted in any form or by any means, now known or later developed, including but not limited to photocopying, recording, or other electronic or mechanical methods, without the prior written permission of the author or the publisher.
Defense Date
5-2010
Document Type
Thesis - NSU Access Only
Degree Name
M.S. Marine Biology
Department
Oceanographic Center
First Advisor
David W. Kerstetter
Second Advisor
John F. Walter III
Third Advisor
Richard E. Spieler
Abstract
The rainbow parrotfish Scarus guacamaia is a prominent herbivore in the coastal waters of southeastern Florida whose life history is strongly linked to a dependence on both mangrove and coral reef habitats. Rainbow parrotfish in turn serve in maintaining the health of coral reefs by keeping algal populations in check. This study used NOAA Fisheries data from the Mangrove Visual Census and the Reef Visual Census in Biscayne Bay and Upper Florida Bay. Observations of abiotic factors at individual sites were used to correlate and predict presence and absence of this species. This was done to visualize habitat presence and ontogenetic shifts present in this species between juvenile and adult stages through ArcGIS mapping. Logistic regression analysis was used to predict presence or absence using the environmental variables of temperature, dissolved oxygen, salinity, average depth, distance from channel openings, mangrove presence, temperature Δ, and salinity Δ. Average depth, distance from channel openings, temperature Δ and salinity Δ were significant in predicting the presence of this species, while salinity, temperature, dissolved oxygen, and mangrove presence were not. Conservation efforts for this species, listed as vulnerable under the IUCN, need to be given greater consideration. The health of this and other parrotfish may have a greater impact on coral reef ecosystems across the Caribbean Sea than currently acknowledged and management breadth and priorities should be adjusted to reflect this role.
NSUWorks Citation
Ethan G. P. Machemer. 2010. A Predictive Habitat Model for Rainbow Parrotfish Scarus guacamaia. Master's thesis. Nova Southeastern University. Retrieved from NSUWorks, Oceanographic Center. (212)
https://nsuworks.nova.edu/occ_stuetd/212. | https://nsuworks.nova.edu/occ_stuetd/212/ |
Libro electrónico.
The Castle of Otranto - Horace Walpole
The History of Caliph Vathek - William Beckford
The Mysteries of Udolpho - Ann Radcliffe
Caleb Williams - William Godwin
Wieland: or, The Transformation - Charles Brockden Brown
Northanger Abbey - Jane Austen
Frankenstein - Mary Shelley
Melmoth the Wanderer (Lock and Key Version) - Charles Robert Maturin
The Legend of Sleepy Hollow - Washington Irving
The Private Memoirs and Confessions of a Justified Sinner - James Hogg
St. John's Eve - Nikolai Gogol
The Hunchback of Notre Dame - Victor Hugo
The Queen of Spades - Alexander Pushkin
Berenice - Edgar Allan Poe
Young Goodman Brown - Nathaniel Hawthorne
The Nose - Nikolai Gogol
The Minister's Black Veil - Nathaniel Hawthorne
Oliver Twist - Charles Dickens
Ligeia - E. A. Poe
The Fall of the House of Usher - E. A. Poe
The Masque of the Red Death - E. A. Poe
The Oval Portrait - E. A. Poe
The Pit and the Pendulum - E. A. Poe
The Black Cat - E. A. Poe
The Tell-Tale Heart - E. A. Poe
Rappaccini's Daughter - Nathaniel Hawthorne
The Double - Fyodor Mikhailovich Dostoyevsky
Jane Eyre - Charlotte Brontë
Wuthering Heights - Emily Brontë
Varney the Vampire - James Malcom Rymer
Villette - Charlotte Brontë
The House of the Seven Gables - Nathaniel Hawthorne
Bleak House - Charles Dickens
Great Expectations - Charles Dickens
Uncle Silas - Joseph Sheridan Le Fanu
The Mystery of Edwin Drood - Charles Dickens
The Brothers Karamazov - Fyodor Dostoyevsky
Strange Case of Dr Jekyll and Mr Hyde - Robert Louis Stevenson
The Damned (Là-bas) - Joris-Karl Huysmans
The Picture of Dorian Gray - Oscar Wilde
The Yellow Wallpaper - Charlotte Perkins Gilman
Trilby - George du Maurier
Dracula - Bram Stoker
The Beetle - Richard Marsh
The Turn of the Screw - Henry James
The Real Thing - Henry James
The House on the Borderland - William Hope Hodgson
The Phantom of the Opera - Gaston Leroux
The Lair of the White Worm - Bram Stoker
The Outsider - Howard Phillips Lovecraft
Editorial: 360 Planet
Publicado: 2019-12-27
ISBN: 9782291082224
Publicado: 2019-12-27
ISBN: 9782291082224
Libros similares
Ten siempre un buen libro para escuchar o leer cuando y como quieras.
¡Lee y escucha tantos libros como quieras! Descarga los audiolibros para escuchar completos en modo sin conexión, cambia tu selección cuantas veces lo desees, elige una historia para tus hijos o descubre libros que normalmente no escucharías. Storytel es la mejor experiencia de lectura que puedes tener. | https://www.storytel.com/mx/es/books/1145693-50-Classic-Gothic-Works-Vol-1 |
Risk analysis of mineral resources is crucial at all levels:
− Company level: optimisation of your portfolio of projects;
− Project by project: identifying and characterising geological and grade uncertainty; and
− At mining stage: inform ore/waste allocation decisions on risk profiles, characterise product variability, help near mine development.
Risk analysis for mineral resource estimates generally relies on the use of conditional simulation.
Conditional simulation offers the perfect platform to tackle issues related to risk analysis. Conditional simulation, by characterizing spatial variability and producing multiple equi-probable realizations of the orebody, allows you to characterize uncertainty in a way single resource estimates cannot. They pave the way for:
- Quantitative assessment of uncertainties;
- Production of probability based indicators and maps;
- Supporting Monte Carlo risk analysis;
- Reproducing the orebody heterogeneities; and
- Capturing and reducing the space of uncertainty via scenario reduction, allowing effective multiple scenario analysis.
For scenario reduction, Isatis Simulation Reduction module offers a quick way to identify grade realizations which best represent the whole space of uncertainty. This approach is easy to set up in an industrial context and the selected scenarios are more manageable, which means it can be readily implemented to characterise the risk attached to a project due to the uncertainty on the resource for:
- Open pit optimization and mine scheduling;
- Evaluation of projects when taking financial and technical uncertainties into account; and
- Mine optimization for a portfolio of deposits.
Conditional simulation can also be used for:
- Recoverable resource estimation particularly when additivity is an issue; and to characterise the precision of recoverable estimates.
- Sampling optimisation; and
- Resource classification. | https://www.geovariances.com/en/risk-analysis-and-uncertainty-characterization/ |
---
abstract: 'This fluid dynamics video depicts the evolution of a suspension of paramagnetic colloids under the influence of a uniform, pulsed magnetic field. At low pulse frequencies, the suspension condenses into columns which decompose via a Rayleigh-Plateau instability. At high pulse frequencies, the suspension forms a kinetically arrested, system spanning network. We demonstrate the degeneration of the Rayleigh-Plateau instability with increasing pulse frequency.'
author:
- |
James W. Swan, Yifei Liu and Eric M. Furst\
Department of Chemical and Biomolecular Engineering, University of Delaware
title: 'Entry \#100742: Degenerate Rayleigh-Plateau instability in a magnetically annealed colloidal dispersion'
---
Super-paramagnetic colloids (525 nm in radius, Invitrogen MyOne), forming a monolayer with concentration $ 70\% $ by area on a microscope slide, are imaged via dark field microscopy. In the video micrographs, lighter areas indicate particle-rich regions, where the illumination is scattered, while black regions are particle-free. The microscope slide is placed in a Helmholtz coil that generates a uniform magnetic field with field lines oriented vertically in the micrograph. The magnetic field with strength $ 1500 $ A/m induces a dipolar interaction between the particles that is many times stronger than the thermal energy scale $ kT $. Thermodynamics predicts that the suspension phase separates into a particle-poor fluid and a body centered tetragonal crystal under these conditions (A.P. Hynninen and M. Dijkstra, Phys. Rev. Lett., 94:138303, 2005). Instead, however, a steady magnetic field of this magnitude leaves the suspension kinetically arrested.
To subvert this arrested state, we pulse the magnetic field on and then off, periodically in time. Pulse frequencies, $\omega$, which are high relative to the relaxation rate of the suspension, are indistinguishable from steady state. Lower pulse frequencies lead to a increased particle mobility and a microstructure that evolves towards the state predicted for equilibrium. The transition from disordered monolayer to condensed phase proceeds due to a remarkable Rayleigh-Plateau instability when the pulse frequency is low.
In the video we depict the evolution of the suspension driven by magnetic fields with four different pulse frequencies. Beginning with the pulse frequency, $ 0.66 $ Hz, we observe that the suspension organizes into dense columns or threads parallel with the magnetic field lines. These columns are unstable and their surface deforms sinusoidally. This perturbation grows until the columns break up into interacting magnetic droplets. This is the classical Rayleigh-Plateau instability.
At a pulse frequency of $ 1 $ Hz, similar columnar structures form initially and rapidly decompose into elongated droplets. Because the field is turned off for a shorter duration when $ \omega = 1 $ Hz than $ 0.66 $ Hz, the particle rich domains can be thought of as relaxing more slowly – or being more viscous. The theory of Tomotika (Proc. Royal Soc. Lon. A. 150(870):332Ð337, 1935) suggests that the most unstable wavelength of perturbation in the Rayleigh-Plateau instability grows with the viscosity contrast of the fluid columns relative to the solvent in which it is immersed. The instability will appear to degenerate with increasing frequency because the most unstable wavelength is increasing.
We illustrate this degeneration through evolution of the suspension under $ 5 $ Hz and $ 10 $ Hz pulses. Here, the particles are largely arrested and only the coarsest transitions in structure are observed. Rich illumination from the particulate phase indicates the presence of scattering interfaces and a low local particle density. In these cases, the suspension relaxes so slowly – or is so viscous – that the Rayleigh-Plateau instability goes unobserved.
Finally, these four experiments are compared side by side. The difference in the kinematics is striking. Pulsing the magnetic field leads to orders of magnitude reduction in the time scales necessary for the suspension to condense to its equilibrium state. The frequency of pulsing affects the route by which that condensed state is reached. While increasing pulse frequency and thus decreasing particle mobility, the Rayleigh-Plateau instability degenerates from its classical portrayal – threads become droplets – to a slowly evolving, kinetically arrested mass. Such a process taking advantage of the Rayleigh-Plateau instability could be key for advancing the directed self-assembly of ordered phases from nano-particles (Swan et al., Proc. Nat. Acad. Sci. USA, 109:16023–16028, 2012).
| |
Cynthia Spring author & speaker
“This is a message of great importance – to those who fear death, and those of us who struggle with the pain and aloneness of this planet. Frances Vaughan tells us what we most need to know – that love is what connects us to each other and to All, and love is what we come here to learn. This is a book to set your course by, to use as a touch-stone, and give you peace as you transition to the greater reality.
Beautiful and life-saving.”
— Matthew McKay. Ph.D. Author,
Seeking Jordan: How I Learned About Death and The Invisible Universe
When I read Frances Vaughan’s fine book Awakening Intuition, I realized I had found a fellow incarnate human spirit interested in things such as inspiration, insight, imagination, creativity, and ESP. Now I find to my delight that the discarnate spirit of Frances Vaughan is taking part in a cross–world channeling project, collaborating with the incarnate spirit of Cynthia Spring. Thank you, Frances and Cynthia, for what you have given us.
— Jon Klimo, Ph.D., Author,
Channeling: Investigations on Receiving Information from Paranormal Sources
In this series of books Cynthia Spring and Frances Vaughan are engaged in a dialogue based on questions about Life After Life and the Greater Reality. These fascinating books are anchors during a chaotic time filled with confusion and suffering: Religious and political institutions are wobbling. A pandemic has gripped the planet. The environment is in crisis. In this time of rebalance, we are learning the hard way that change is the only constant.
Both books offer a larger frame through which to view these changes, encourage direct experience over belief, and provide portals for exploration. They also move us toward a greater sense of consciousness and love of the value of our own evolution.
Frances describes the dimension she is in as earth-like, filled with Love and Light, and surprisingly integrated with our own space/time dimension. Knowing that there is life after life, we can more courageously confront the forces that would tear us apart. Knowing that our consciousness can tap limitless wisdom and compassion from the collective reservoir gives us strength and perseverance. The way to deal with the “current upheavals,” as Frances calls them, is to be of service in whatever ways we can, unique to our own evolution.
Frances: Let me just say that the experience of this side fills me with a joy beyond comprehension. The important point for us to convey right now is that the reality of life in another dimension is what awaits all of us. If you can accept that as a guiding principle, then you will live your life according to higher values, no matter what is going on around you. | https://www.cindyspring.com/ |
- You are here:
- GT Home
Featured Projects
Virtual reality as a medium and design space continues to grow, but we suggest that the range of experiences offered rarely stray from the first person perspective. Most experiences, especially video games, have the user directly embody their avatar. In Perspective is a project that explores alternate interfaces that place the user outside of the body of the avatars they inhabit and uses multiple forms of puppetry as design references for new interfaces that blend procedural and physical motion.
The Reflect! platform is designed to organize Reflective Consensus Building on Wicked Problems in small teams. Examples wicked problems are complex policy issues such as health care reform, poverty, global trade, or climate change; the regulation of new and emerging technologies; the design of products and technologies; and planning processes that involve different stakeholders.
This project is exploring ways of using air gesture technologies, audio and haptic to facilitate exploration of STEM concepts by blind and low vision learners. Efforts will establish the efficacy of this approach, as well as best practices for creating air gesture interfaces that support exploration of a virtual reality space such as a simulated atom, wind tunnel or electrical system- all without the use of vision.
Upcoming Events
-
No items available.
GVU News
-
Ph.D. Student Eric Corbett Receives Microsoft Grant
Eric Corbett, a Ph.D. student in Digital Media in the School of Literature, Media, and Communication, has received a $25,000 grant from Microsoft to help complete his dissertation on the role of trust and technology in local government.
-
Georgia Tech Presenting 13 Papers at Premier Computer Vision Conference CVPR
-
Second-Year Stefamikha Suwisar Takes Top Prize in IC T-Shirt Design Contest
About GVU
GVU Resource Labs
App Lab
Built for Success
A mobile computing "hackerspace."
Visit the App Lab website
Location: TSRB 333
GVU Prototyping Lab
From Concept to Creation
A rapid prototyping "makerspace."
Visit the Prototyping Lab website
Location: TSRB Basement
Usability Lab
Testing Methods and Technology
An adaptable project testing space. | http://www.gvu.gatech.edu/ |
Monstrous Media/Spectral Subjects explores Gothic, monstrosity, spectrality and media forms and technologies (music, fiction's engagements with photography/ cinema, film, magic practice and new media) from the later nineteenth century to the present day. Placing Gothic forms and productions in an explicitly interdisciplinary context, it investigates how the engagement with technologies drives the dissemination of Gothic across diverse media through the twentieth and twenty-first centuries, while conjuring all kinds of haunting and spectral presences that trouble cultural narratives of progress and technological advancement.
Gothic as a genre has become more amorphous and difficult to contain. This book brings together for the first time many of the multifarious visual motifs and media associated with Gothic together with areas that have never received serious study or mention in this regard before. It draws attention to an array of dark artefacts such as Goth and Gothic jewellery, dolls, posters and food, which, though part of popular mass marketing, have often been marginalised and largely omitted from the mainstream of Gothic Studies publishing. The book moves from the earliest Gothic architecture to décor and visual aspects of theatrical design, masquerade and dance. It focuses on paintings in two historical spans from Jan Van Eyck to Henry Fuseli and from Goya to H. R. Giger to consider Clovis Trouille's works influenced by horror films and Vincent Castiglia's paintings in blood. Gothic engravings, motifs of spectral portraits, posters and signs are covered. The book then uses early visual devices like Eidophusikon and the long-lived entertainment of peepshows to introduce a discussion of projection technologies like magic lanterns and, subsequently, film and TV. Gothic photography from Daguerreotypes onwards; and Gothic font, scripts and calligraphy are then discussed. Finally, the book presents a survey of the development of newer Gothic media, such as video gaming, virtual reality (VR) games and survival horror apps. | https://www.manchesterhive.com/search?pageSize=10&q=Photography+and+Film&sort=relevance&t=LIT |
The Pacific Island is home to some of the greatest linguistic diversity in the world. While many languages spoken in Oceania hail from the same language family (Austronesian), the number of individual languages is high, likely due to the isolated nature of island life. This is true of the Cook Islands, a self-governing Pacific Island nation in free association with New Zealand, which is responsible for the Cook Islands’ defense and foreign affairs. While English is the most widely spoken language in the Cook Islands, Cook Islands Māori, the indigenous language of the nation, is also spoken by more than 75% of Cook Islanders.
This means that Cook Islands Māori, which locals usually just call Māori when there’s no need to distinguish it from New Zealand Māori, boasts roughly 21,000 speakers. Speakers may also call the language Māori Kūki 'Āirani, Te reo Ipukarea, or Rarotongan, although this last one is controversial. While Cook Islands Māori is, as one would expect, closely related to New Zealand Māori, it’s nonetheless a distinct language with a degree of mutual intelligibility. At TranslationServices.com, we’re proud to work with minority languages like Cook Islands Māori, thanks to our skilled Cook Islands Māori translators.
Contact us now for a free quote for our Cook Islands Māori translation services.
What is Cook Islands Māori like, anyway?
As a Tahitic Polynesian language, Cook Islands Māori is closely related to Tahitian and New Zealand Māori and more distantly related to other languages spoken throughout Oceania. Legally, Pukapukan is classified as a dialect of Cook Islands Māori, even though linguists consider it a separate language more similar to Samoan or Tokelauan. Cook Islands Māori is written in the Latin alphabet, although debates about the precise orthography are ongoing.
Like other Polynesian languages, Cook Islands Māori has almost no inflection. Case is indicated through grammatical particles, not inflection. Verbs are similar—tense, aspect, and mood are marked via pre-verbal particles rather than inflection on the verb itself. Cook Islands Māori features more pronouns than English—not only does it feature dual pronouns, which specify a group of two people, in addition to singular and plural, but it also makes a clusivity distinction in the non-singular first person. This means that Cook Islands Māori has multiple words for “we” depending on whether the listener is included. Usually, the verb comes first in a Cook Islands Māori sentence.
What kind of Cook Islands Māori translation services are you looking for?
We’ve compiled a skilled team of Cook Islands Māori translators to translate a wide range of documents to and from Cook Islands Māori. As native speakers of the language, they’re well versed in all the subtleties and nuances that the language presents, which allows them to create natural-sounding translations in both directions. Have Cook Islands Māori historical documents or literature (traditional or contemporary) that you want to share with more people? Let us translate them into English! Perhaps instead you want to translate educational materials or books, websites, apps, games, poems, or other interesting content into Cook Islands Māori so that children can learn in their own language and adults can enjoy great content in their ancestral language—we can translate English-language content smoothly into Cook Islands Māori, too!
If you want reliable Cook Islands Māori translation services, simply message us with your translation project details. | https://www.translationservices.com/post/we-can-now-translate-cook-islands-m%C4%81ori |
The Alexandra Institute’s Security Lab joins EU-funded research project to develop privacy-preserving techniques and prototypes for data analytics.
Big data analytics holds a huge potential for knowledge and value creation in society. But how can companies and organisations harvest the benefits of for example healthcare data, while at the same time protecting people’s privacy?
This topic has high priority at EU level. Therefore, the EU financially supports research projects on the development of privacy-preserving techniques that enable companies and organisations to perform data analytics on for example patient and healthcare data without compromising on security.
The Alexandra Institute’s Security Lab and the Department of Computer Science at Aarhus University have received a total of DKK 9.4 million from the EUs' research and innovation programme Horizon 2020 for the research project SODA (Scalable Oblivious Data Analytics). The purpose of the project is to develop privacy-preserving techniques for big data analytics in the healthcare domain. The project is carried out in collaboration with Eindhoven University of Technology and the technology giant Philips Research – a world leader in healthcare technology.
The SODA project investigates how to use sensitive data from multiple data assets without compromising on privacy. To achieve this, the project will optimise the performance and security of two techniques.
Multi-Party Computation (MPC), which enables processing on encrypted data from multiple sources.
Differential Privacy, which is a method to obscure an individual’s identity and ensure that data remain anonymised at all times.
The objective is to be able to analyse data from multiple databases simultaneously without merging the databases. However, we need to improve the performance of existing technologies. To achieve this, the project will develop theory, build on existing software, and develop prototypes and applications based on the above techniques.
The role of the Alexandra Institute is to implement software components, carry out user studies and build prototypes.
In the SODA project we collaborate with the technology giant Philips Research – a world-leading provider of innovative technology solutions for the healthcare sector. This includes for example scanners and measuring equipment that collect huge amounts of data in hospitals.
Philips is interested in adding an analytical service to their solutions – but without having access to data. In the future, this can be developed into a product that can help physicians and researchers determine if a therapy works, why it does not work, or how to improve it. But in order for that to happen, data needs to be secured.
The project is funded with 22.2 million DKK by the EU's research and innovation programme Horizon 2020. The Alexandra Institute and the Department of Computer Science at Aarhus University receive 9.4 million DKK of the total budget.
The objective is to be able to analyse big data from multiple databases simultaneously without merging the databases. To achieve this, we need to develop theory and improve the performance of existing technologies.
Take good care of your users' data!
Contact us to learn about the latest privacy-preserving techniques. | https://alexandra.dk/uk/cases/scalable-oblivious-data-analytics-soda |
Images Of 2016 Honda Accord. 2016 honda accord reviews and rating motor trend. new honda accord 2016 india launch date price specs. 2016 honda accord first drive review motor trend. 2016 honda accord coupe touring egmcartech. 2016 honda accord sedan first drive review car and driver. 2016 honda accord models available in riverhead ny. 2016 honda accord v6 touring review test drive. 2016 honda accord review now apple android smart. honda debuts 2016 accord facelift we visually compare it. sedan archives suv news and analysis suv news and analysis. [Dinarjat.com]. | http://dinarjat.com/images-of-2016-honda-accord-3258.html |
Qualifications:
Osteopathy – B.Ost (Hons)
Acupuncture- Dip Ac TCM MAcS
Vadim is qualified in both Osteopathy, Acupuncture and further studying towards Physiotherapy degree. This unique blend of skills makes him a well-rounded healthcare professional and provides a fast resolution to pain for people of all ages Vadim is very passionate and knowledgeable about health and wellbeing. He specialises in the treatment of chronic unresolving conditions, particularly to the lumbar spine and pelvis. He is a member of the General Osteopathic Council (GOsC), the Institute of Osteopathy (previously British Osteopathic Association) and Acupuncture Society (UK).
Member of :
What is Osteopathy?
Osteopathic medicine is a drug-free and natural system of healthcare, with an established and recognised approach to diagnosis and treatment.
Osteopaths assess the dynamics of the entire body from restrictions in the spine and pelvic imbalances down to the mechanics of the feet. Osteopaths recognise that the body regularly compensates for these strains, impairing its natural ability to self-heal and regulate a state of health and wellbeing.
As a principle, we believe that providing the body with a good balance between its structure and function, osteopathy can encourage healing of existing problems, prevent future remissions and new complications. This ultimately helps to reduce the pain and inflammation often experienced by patients.
What can Osteopathy help treat?
Osteopaths can help treat and provide relief for a wide range of ailments and conditions. The most common presentation seen in practice is that of lower back pain but patients widely consult osteopaths with sciatica, neuralgia, arthritic pain, sports injuries, muscle tension, frozen shoulder and pregnancy-related issues.
How do Osteopaths treat?
There are numerous osteopathic treatments that can be utilised in practice, tailored to suit each individual patient. These can vary from the gentle craniosacral approach, soft tissue massage, joint articulation, dry needling to the more direct structural manipulations. This takes into account your age, gender, general health, medication, fitness and the diagnosis made.
Certain exercises may also be advised and explained throughout the consultation to aid the efficiency of the treatment and improve long-term posture.
What should I expect?
At the initial consultation, you will be asked a series of questions regarding your presenting ailment, general health and personal/ family medical background.
A full examination will also be carried out to assess your physical condition, which may involve being asked to dress down to your underwear. This helps to provide a more detailed screen of your standing/ sitting posture, palpation of different muscle groups and assessing the mobility of various joints. This enables osteopaths to formulate the correct diagnosis.
You will then generally be asked to remove some of your clothes, normally down to your undergarments, so it is best to wear something suitably comfortable and modest.
Can I bring a friend or relative?
You are welcome to bring a friend or relative into the consultation room. You may also stop the consultation or treatment at any point. Children under the age of 16, who are receiving treatment, must be accompanied by a parent/guardian at all times.
How long will my treatment be and how many will I need?
The initial consultation usually lasts between 45 minutes– 1 hour, whilst follow-up treatments are normally 30 minutes. Patients commonly require 2 – 6 sessions but some do decide that they would like to have periodic preventative treatments to avoid recurring problems.
What do I do next?
To make an appointment in Hatfield please contact me on 07738493974 or book online
Please arrive in ample time. If for any reason you need to cancel your appointment, no charges will apply providing you give us 24 hours notice. | https://osteopathy.colganosteo.com/ |
The therapist is obliged to inform the client about all necessary information concerning the treatment during the different stages of the treatment.
-
The client is obliged to cancel an appointment as soon as possible (minimum 24 hours before the session), otherwise the cost of the time reserved will be charged.
-
The client is obliged to provide all necessary information for the therapist on the intake form.
-
Privacy: For the benefit of the therapy the therapist will create a file. This is also a legal duty imposed by the Act on the Medical Treatment Agreement (WGBO). This file will contain information about your physical and mental health and reports about the sessions and will be saved for fifteen years. It can also contain information from other healthcare providers such as your general practioner. The therapist will only ask other healthcare providers information about your health with your explicit permission. She will do her utmost to protect your privacy. This means that she will handle all private and medical information with care and she will see to it that unauthorized people will not have entry to your data. The therapist is the only one with acces to your file. The therapist is bound by obligation of professional secrecy and will respect the privacy of the client. The client has the right to the access of his own file.
The information from your file can be used to:
- Inform other health care providers, but only with your explicit consent.
- Inform the therapist who will take over the therapy if this is necessary in case of absence
of the therapist by illness or private circumstances but only with your explicit consent
-The therapist can consult colleagues and share information anonymously if this is
necessary to guarantee the best quality of hypnotherapy
- Your name, address and birth date will be used to make an invoice
If any other use of your information is necessary I will inform you and I will ask your explicit consent.
-
The therapist is not allowed to use certain treatments without consent of the client.
-
The therapist is obliged to refer the client to a colleague, specialist or doctor if his treatment is not the appropriate treatment for the client.
-
Termination of the treatment can always take place with consent of both parties.
-
The therapist is a member of the Dutch Association for Hypnotherapists (NBVH), member no. 04006 and has a license that will be visible displayed in the practice. This license is provided yearly by the NBVH and guarantees that the therapist satisfies the conditions of the NBVH for training and intervision. The therapist is also member of the RBCZ (register Beroepsbeoefenaren Complementaire Zorg, member no. 403214R).
-
Clients under 16 will require a treatment form signed by both parents (also when the parents are divorced). If the child is 12 years or older it also has to agree with the treatment and sign the treatment form.
-
The right to information lies with the parents if the child is under 12, with the child and the parents if it is 12 to 16 years old and when the child is 16 years old the right to information lies with the client her/himself (parents have no right only if the client gives her/his consent).
-
The client is responsible for submitting the declarations to the health insurance company and to inform at their health insurance company if they reimburse the cost for the treatment. The therapist is not liable if the Insurance company does not reimburse the cost.
-
After the session the client will receive the invoice by mail. Payment is due within 30 days after the receipt of the invoice. If payment is not received on time the therapist will assign a collection agency to collect the payments. The collection agency will also charge for the legal interest and the cost for collection.
-
Questions or complaints about the invoice will only be handled if you file the complaint by letter or email within 15 days after receipt of the invoice.
-
De Praktijk voor Persoonlijke Begeleiding & Coaching is a member of SCAG (Register van de Stichting Complementaire en Alternatieve Geneeswijzen, member no. 10137). The SCAG is an independent foundation .
If you have a complaint about the treatment you can contact the SCAG. Website: https://www.scag.nl/. Contact information: SCAG, Newtonlaan 51, 3584 BP Utrecht, Tel: 085-9022863 email: [email protected]
-
The therapist has a professional indemnity. The Sole Proprietorship “Praktijk voor Persoonlijke begeleiding & Coaching” is the sole contractor of all the work concerning the treatment. The Dutch law applies to this agreement. The liability of the Sole Proprietorship is limited to the allowance that will take place under the professional indemnity. | https://www.infohypnotherapie.nl/general-conditions |
# Mycoplasma incognitus
Mycoplasma incognitus is a human invasive Mycoplasma type bacteria, as well as a disease agent that can cause a variety of different diseases. M. incognitus is an immunomodulatory agent, which means that it can weaken the immune response by decreasing the ability of the immune system to produce antibodies. This mycoplasma is highly contagious, and can be passed from person to person via bodily fluids, such as sweat and blood. Since M. incognitus is a mycoplasma, it does not have a cell wall, which means that it is naturally immune to many different antibiotics, such as penicillin or other antibiotics that target the cell wall. This new mycoplasma, however, was later determined to be a close form of Mycoplasma fermentans, although it does differ.
## Genome
Mycoplasma incognitus acts as a parasite, and gains most of its nutrients from its host because it has a very small genome, consisting of only the genes essential for life. It is estimated that M. incognitus has less than 500 genes.
## Cell structure
There have been frequent unsuccessful attempts at isolating a culture of M. incognitus because it is more fastidious in cultivation requirements than other mycoplasmas. It is known that the most frequently colonized sites are epithelial cell surfaces and red and white blood cells inside of the human body.
## Obtention of energy and metabolism
Scientists have found that M. incognitus can utilize glucose both aerobically and anaerobically, but prefers to utilize the alternate energy source: fructose. The metabolism of sugars may play an important role in the pathological process of infection, but scientists are not sure how yet. M. incognitus can metabolize arginine, and scientists believe that it is possible that mycoplasmas that utilize arginine may be more pathogenic than those that don't.
## Ecology
Mycoplasma incognitus cannot survive unless it is inside a host. Because of this, M. incognitus is also considered by some to be a rickettsia type bacteria, but because it had more traits of a mycoplasma, they stuck with the final name of Mycoplasma incognitus.
## Pathology
This mycoplasma acts by entering into the individual cells of the body where it can lie dormant for 10, 20, or 30 years. If the host experiences a severe injury or a vaccination isn't successful, M. incognitus can become triggered and start invading and destroying certain cells. M. incognitus has the ability to alter red blood cells so that they swell and therefore cannot be compressed and passed through the capillaries. | https://en.wikipedia.org/wiki/Mycoplasma_incognitus |
Prescribed burning has long been in the history of pine dominated forests for thousands of years before European settlement in the Southern Unites States, and continues to be an important management tool today. This style of management can have various environmental effects on vegetation, soil, wildlife, air, and water quality. Among these potential environmental effects, impact of fire on water quality have received very limited research attention. Increasing reports of negative changes in water quality has been reported following intense wildfire events in the recent years. However limited reports about prescribed fire impact on water quality and aquatic ecosystems have been mixed with examples of little to no effect, or effect to near wildfire levels in systems that undergo frequent fire managements. This study uses two experiments to address the lack of understanding of prescribed forest fire influence on water quality and aquatic biota in the Southeastern pine dominated open savanna ecosystems. In the first experiment, through a controlled experiment testing the impact of different forest detritus on water qualities, we found that water that exported through prescribe burned forest is less acidic, less nutritious, and have less concentrated dissolved carbon than the unmanaged forest, which correlated to improvements in water quality. Our second experiment, through a field survey looking and the effect of frequent prescribed burning on aquatic macroinvertebrate communities found no significant long-term impact of low intensity burn on the aquatic ecosystems, although we did find measurable changes in chemical and hydrological parameters through this management method. These results further confirm the benefits of prescribed fire management in the Southern United States, and releases certain concerns raised by similar studies on different ecosystems. It also validates that prescribed fire impacts are highly site-specific, fire history, watershed condition, and management goals must be carefully considered to determine the potential effectiveness and consequences of using this method.
Zhang, Wenbo, "Effects of Prescribed Forest Fire on Water Quality and Aquatic Biota in the Southeastern United States" (2017). All Theses. 2763. | https://tigerprints.clemson.edu/all_theses/2763/ |
Enter Drowsy Valley, a small remote tourist town located in the Alps of Austria. A place which bustles with life during summer and depopulates during winter. However, this ordinary and sometimes gloomy city harbors a secret. The people of Drowsy Valley suffer from severe sleep disorders and vivid nightmares.
The local physician are powerless against this ailment and when a young girl named Sandra, the daughter of city's mayor, falls into a coma the head of the city decides to enlist the aid of a special psychiatrist. She is rumored to possess a unique ability to enter and traverse people's subconscious minds - a Dreamwalker.
Step into the shoes of the paranormal psychiatrist and immerse yourself in the mystery of Drowsy Valley. Enter the subconscious of your patients, become the detective of the psyche and separate that which is real from imaginary, unravel the mystery behind Mayor's daughter and citizen's inexplicable condition. Dark secrets loom in the hidden corners of a human mind, will you dare to find them? | https://www.wildtangent.it/Games/dreamwalker-never-fall-asleep |
The compilation standard (Section 9200) requires the practitioner to reach an understanding and agreement with the client as to the services to be provided. While the standard does not specifically require a signed engagement letter for each engagement, best practice is to have an engagement letter in place for all engagements.
A good engagement letter should clearly explain the services that you are providing and should also clarify what you are not providing. It’s highly recommended to include in the engagement letter items such as management’s responsibilities, ownership of working papers, limitations of liability, terms of termination, confidentiality, and fees and billing practices.
There are engagement letter templates available from the profession and other organizations that you might want to use as a starting point. However, as this is essentially a contract for professional services, you might wish to consult a lawyer who is familiar with the profession's standards and regulations to review your engagement letter templates.
Practice Management Tip
Obtain an engagement letter at the beginning, or in advance, of all engagements. Your client needs to be provided with fair opportunity to read, consider, and agree to the engagement terms, and the fact that these conditions were present should be documented. An engagement letter might be unenforceable if it was obtained under circumstances that were considered to be unfair or unconscionable. An example would be presenting a client with an engagement letter close to filing deadlines with little opportunity to negotiate the terms of the engagement or the opportunity to engage another professional. Ensure your engagement letter is signed by an individual with appropriate authority, such as the shareholder(s) or key member(s) of the board of directors. | https://www.bccpa.ca/news-views-kb/news-views-kb-entries/compilation-and-other-related-services/compilation/guidance/engagement-letters/ |
Prague, 12th December – ManpowerGroup Czech Republic releases today results of the ManpowerGroup Employment Outlook Survey for the first quarter of 2018.
Czech job seekers can expect some hiring opportunities in the forthcoming quarter, according to employers who report a seasonally adjusted Net Employment Outlook of +5%. Hiring plans improve by 3 percentage points when compared with the previous quarter, and are 2 percentage points stronger in a comparison with 1Q 2017.
Staffing levels are forecast to grow by varying degrees in only five of 10 industry sectors and two of three regions during 3Q 2017. However, Outlooks weaken in nine sectors and two regions when compared with the previous quarter, while employers report decreases in seven sectors and all three regions when compared with 3Q 2016.
“The first quarter is often the worst period in terms of employment, and it is not uncommon to see workforce reductions in many sectors. On the other hand, the Net employment outlook +5 is the best prediction for Q1 in the history of the survey since 2008 and that can be sign of continuing optimism of Czech labor market with the lowest unemployment in Europe. This is very good news for people looking for a job, but companies increasingly complain that they cannot find enough suitable candidates. In-demand profiles are emphasizing not only specialized skills in IT, engineering or skill trades, but companies also report a lack of candidates for non-qualified jobs in manufacturing and logistics. According to the ManpowerGroup Employment Outlook Survey for the first quarter of 2018, 42 % of large companies plan to increase the number of vacancies. Especially we are seeing the most inquiries from our clients in automotive sector, logistics and call centers,” said Jaroslava Rezlerová, Managing Director of ManpowerGroup Czech Republic.
Industry sector comparisons
Payrolls are forecast to grow in nine of 10 industry sectors and all three regions during the next three months. Outlooks improve in seven sectors and one region quarter over quarter, and are stronger in six sectors and two regions when compared with this time one year ago. Electricity, Gas & Water Supply sector employers report the strongest of the 10 industry sector Outlooks for 1Q 2018. Standing at +17%, the Outlook matches the strongest reported since the survey 10 years ago, last reported in 3Q 2016. Hiring prospects improve by 13 and 8 percentage points from 4Q 2017 and 1Q 2017, respectively. The weakest sector Outlook of 0% is reported in the Mining & Quarrying sector, although hiring intentions are 3 percentage points stronger when compared with the previous quarter, and improve by 2 percentage points when compared with the first quarter of 2017.
Regional comparisons
Bohemia employers report the strongest of the three regional Outlooks (+7%). Hiring plans are the strongest in the region for more than nine years, improving by 9 percentage points quarter-over-quarter. When compared with 1Q 2017, the Outlook for the region remains relatively stable. Moravia employers report the weakest regional Outlook of +1%, remaining relatively stable when compared with the previous quarter, but declining by 2 percentage points year-over-year.
Organization Size Comparisons
Staffing levels are expected to increase in all four organization size categories during 1Q 2018. Large employers report brisk hiring intentions with an Outlook of +36%, while the most cautious hiring plans are reported by Micro employers (+3%).
Global overview
According to the survey, workforce gains of varying margins are forecast by employers in 41 of 43 countries and territories during the January-March time frame. And for the second consecutive quarter since the global financial crisis in 2009, employers report no negative Outlooks among the 43 countries and territories. Additionally, employers in a number of countries, including Australia, Japan, Norway, Poland, Romania and the United States, report their strongest hiring plans in five years or more. There are also signs that the volatility recently observed in some countries—most notably in Brazil, China and India—is declining. Overall, forecasts improve or remain stable in most countries and territories. When compared with the final quarter of 2017, hiring prospects improve in 20 of 43 countries and territories, are unchanged in eight, and decline in 15. When compared with this time one year ago, hiring intentions improve in 26 of the 43 countries and territories, are unchanged in six, and weaken in only 11.
The next ManpowerGroup Employment Outlook Survey featuring the forecast for the 2Q 2018 period will be published on 13 March 2018.
For additional information, please contact: Jiří Halbrštát, email: [email protected]
Note to Editors
Commentary is based on seasonally adjusted data where available. Full survey results for each of the 43 countries and territories included in this quarter’s survey, plus regional and global comparisons, can be found in the ManpowerGroup Press Room at www.manpowergroup.com/meos. In addition, all tables and graphs from the full report are available to be downloaded for use in publication or broadcast from the ManpowerGroup Web site at: http://www.manpowergroup.com/press/meos.cfm
ManpowerGroup has also released its ManpowerGroup Employment Outlook Survey Explorer tool, a new interactive way to examine and compare its data. The tool can be viewed at http://www.manpowergroupsolutions.com/DataExplorer/
This survey is conducted quarterly to measure employers’ intentions to increase or decrease the number of employees in their workforce during the next quarter. The Czech Republic is one of 43 countries and territories participating in the quarterly measurement of employer hiring intentions. The survey for Quarter 1 2018 was conducted by interviewing a representative sample of 750 employers in the Czech Republic and asking the same question: “How do you anticipate total employment at your location to change in the three months to the end of March 2018 as compared to the current quarter?”
The global ManpowerGroup Employment Outlook Survey has been running for more than 55 years, and uses a validated methodology in accordance with the highest standards in market research. This survey helps to identify the hiring intentions of both regional and industry sector employers, and facilitates preparation for labor market pressures.
About the Survey
The global leader in innovative workforce solutions, ManpowerGroup releases the ManpowerGroup Employment Outlook Survey quarterly to measure employers’ intentions to increase or decrease the number of employees in their workforce during the next quarter. It is the longest running, most extensive, forward-looking employment survey in the world, polling nearly 59,000 employers in 43 countries and territories. The survey serves as a bellwether of labor market trends and activities and is regularly used to inform the Bank of England’s Inflation Reports, as well as a regular data source for the European Commission, informing its EU Employment Situation and Social Outlook report the Monthly Monitor. ManpowerGroup’s independent survey data is also sourced by financial analysts and economists around the world to help determine where labor markets are headed.
About ManpowerGroup™
ManpowerGroup® (NYSE: MAN), the leading global workforce solutions company, helps organizations transform in a fast-changing world of work by sourcing, assessing, developing and managing the talent that enables them to win. We develop innovative solutions for over 400,000 clients and connect 3+ million people to meaningful, sustainable work across a wide range of industries and skills. Our expert family of brands – Manpower®, Experis®, Right Management® and ManpowerGroup® Solutions – creates substantially more value for candidates and clients across 80 countries and territories and has done so for nearly 70 years. In 2017, ManpowerGroup was named one of the World’s Most Ethical Companies for the seventh consecutive year and one of Fortune’s Most Admired Companies, confirming our position as the most trusted and admired brand in the industry. See how ManpowerGroup is powering the future of work: www.manpowergroup.com.
In January 2011, at the World Economic Forum Annual Meeting in Davos, Switzerland, ManpowerGroup announced the world has entered the Human Age, where talent has replaced capital as the key competitive differentiator. This concept of talentism as the new capitalism continues to resonate and was echoed as a core theme of the 2012 Annual Meeting of the World Economic Forum in Davos. Learn more about this new age at www.manpowergroup.com/humanage.
Gain access to ManpowerGroup’s extensive thought leadership papers, annual Talent Shortage surveys and the ManpowerGroup Employment Outlook Survey, one of the most trusted indices of employment activity in the world, via the ManpowerGroup World of Work Insight iPad application. This thought leadership app explores the challenges faced by employers navigating the changing world of work and provides in-depth commentary, analysis, insight and advice on strategies for success.
Enter the Human Age at: www.manpowergroup.com/humanage
About ManpowerGroup Czech Republic
Through a network of over 35 offices, we provide staff (nearly 12,000) for around 1,200 clients. With employment opportunities in the public and private sector, on both a permanent and temporary basis, we make it easy for people to find employment and for companies to find staff with the skills they need. Solutions include permanent and temporary positions, holiday, maternity or sick coverage, through to large workforce transformation and outsourcing contracts. | https://www.manpowergroup.cz/en/thought-leadership/manpower-employment-outlook-survey-for-q1-2018/ |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.