content
stringlengths 0
1.88M
| url
stringlengths 0
5.28k
|
---|---|
WASHINGTON — The Federal Deposit Insurance Corporation (FDIC), along with the other federal banking regulators and the U.S. Department of the Treasury's Financial Crimes Enforcement Network (FinCEN), today issued a joint statement to encourage depository institutions to consider, evaluate, and, where appropriate, responsibly implement innovative approaches to meet their Bank Secrecy Act/anti-money laundering (BSA/AML) compliance obligations in order to strengthen the financial system against illicit financial activity.
In the statement, the Board of Governors of the Federal Reserve System, the FDIC, FinCEN, the National Credit Union Administration, and the Office of the Comptroller of the Currency recognize that private sector innovation, including adopting new technologies and finding new ways to use existing tools, can help banks identify and report money laundering, terrorist financing, and other illicit financial activity. To assist depository institutions in this effort, the statement makes clear that the agencies are committed to continued engagement with the private sector and other interested parties.
The agencies also welcome industry feedback on how they can best support innovative efforts through explanations of, or updates to, supervisory processes, regulations, and guidance. Those wishing to share such feedback in writing may do so by sending their submission electronically to FinCEN at [email protected].
Today's joint statement is the second statement resulting from a working group formed by the agencies and Treasury's Office of Terrorism and Financial Intelligence that focuses on improving the effectiveness and efficiency of the BSA/AML regime. On October 3, 2018, the agencies issued a joint Interagency Statement on Sharing Bank Secrecy Act Resources. | https://www.fdic.gov/news/news/press/2018/pr18091.html |
Background Carbon (C) and nitrogen (N) metabolites can regulate gene expression in Arabidopsis thaliana. signaling. To provide a global, yet detailed, view of how the cell molecular network is usually adjusted in response to the CN treatments, we constructed a qualitative multinetwork model of the Arabidopsis metabolic and regulatory molecular network, including 6,176 genes, 1,459 metabolites and 230,900 interactions among them. We integrated the quantitative models of CN gene regulation with the wiring diagram in the multinetwork, and recognized specific interacting genes in biological modules that respond to C, N or CN treatments. Conclusion Our results indicate that CN regulation Rabbit polyclonal to pdk1 occurs at multiple levels, including potential post-transcriptional control by microRNAs. The network analysis of our systematic dataset of CN treatments indicates that CN sensing is usually a mechanism that coordinates the global and coordinated regulation of specific units of molecular machines in the herb cell. Background Integrating carbon (C) and nitrogen (N) Pentostatin supplier metabolism is essential for the growth and development of living organisms. In addition to their essential functions as macronutrients, both Pentostatin supplier C and N metabolites can act as signals that influence many cellular processes through regulation of gene expression in plants [1-6] and other organisms (for example, [7,8]). In plants, C and N metabolites can regulate developmental processes such as flowering time and root architecture , as well as several metabolic pathways, including N assimilation and amino acid synthesis (for Pentostatin supplier example, [11,12]). Previous microarray studies from our group as well as others have recognized many genes whose expression changes in response to transient treatments with nitrate [2,13,14], sucrose Pentostatin supplier [5,15] or nitrate plus sucrose [16,17] in Arabidopsis seedlings. Addition of nitrate to N-starved plants causes a rapid increase in the expression of genes involved in nitrate uptake and reduction, production of energy and organic acid skeletons, iron transport and sulfate uptake/reduction [2,13]. These changes in gene expression preceded the increase in levels of metabolites such as amino acids, indicating that changes in mRNA levels are biologically relevant for metabolite levels, if a time delay is usually launched . Using a nitrate reductase (NR-null) mutant, Wang et al. showed that genes that respond directly to nitrate as a signal were involved in metabolic pathways such as glycolysis and gluconeogenesis . Separately, sugars, including glucose and sucrose, have been shown to modulate the expression of genes involved in various aspects of metabolism, signal transduction, metabolite transport and stress responses [5,15]. These studies confirm the presence of a complex CN-responsive gene network in plants, and suggest that the balance between C and N rather than the presence of one metabolite affects global gene expression. However, despite the considerable collection of biological processes regulated by N or C, to date, none of these studies have resolved the possible mechanisms underlying CN sensing, nor the interdependence of the CN responses in a network context. In this study, we make use of a systematic experimental space of CN treatments to determine how C and N metabolites interact to regulate gene expression. In addition, we provide a global view of how gene networks are modulated in response to CN sensing. For the latter, we produced the first qualitative network model of known metabolic and regulatory interactions in plants to analyze the microarray data from a gene network perspective. The combination of quantitative models describing the gene expression changes in response to the C and N inputs and qualitative models of the herb cell gene responses allowed us to globally identify a set of gene subnetworks affected by CN metabolites. Results A systematic test of CN interactions Based on our current understanding of CN regulation, four general mechanisms for the control of gene expression in response to C and N can be proposed: N responses impartial of C; C responses impartial of N; C and N.
Categories
- 22
- Chloride Cotransporter
- Exocytosis & Endocytosis
- General
- Mannosidase
- MAO
- MAPK
- MAPK Signaling
- MAPK, Other
- Matrix Metalloprotease
- Matrix Metalloproteinase (MMP)
- Matrixins
- Maxi-K Channels
- MBOAT
- MBT
- MBT Domains
- MC Receptors
- MCH Receptors
- Mcl-1
- MCU
- MDM2
- MDR
- MEK
- Melanin-concentrating Hormone Receptors
- Melanocortin (MC) Receptors
- Melastatin Receptors
- Melatonin Receptors
- Membrane Transport Protein
- Membrane-bound O-acyltransferase (MBOAT)
- MET Receptor
- Metabotropic Glutamate Receptors
- Metastin Receptor
- Methionine Aminopeptidase-2
- mGlu Group I Receptors
- mGlu Group II Receptors
- mGlu Group III Receptors
- mGlu Receptors
- mGlu, Non-Selective
- mGlu1 Receptors
- mGlu2 Receptors
- mGlu3 Receptors
- mGlu4 Receptors
- mGlu5 Receptors
- mGlu6 Receptors
- mGlu7 Receptors
- mGlu8 Receptors
- Microtubules
- Mineralocorticoid Receptors
- Miscellaneous Compounds
- Miscellaneous GABA
- Miscellaneous Glutamate
- Miscellaneous Opioids
- Mitochondrial Calcium Uniporter
- Mitochondrial Hexokinase
- My Blog
- Non-selective
- Other
- SERT
- SF-1
- sGC
- Shp1
- Shp2
- Sigma Receptors
- Sigma-Related
- Sigma1 Receptors
- Sigma2 Receptors
- Signal Transducers and Activators of Transcription
- Signal Transduction
- Sir2-like Family Deacetylases
- Sirtuin
- Smo Receptors
- Smoothened Receptors
- SNSR
- SOC Channels
- Sodium (Epithelial) Channels
- Sodium (NaV) Channels
- Sodium Channels
- Sodium/Calcium Exchanger
- Sodium/Hydrogen Exchanger
- Somatostatin (sst) Receptors
- Spermidine acetyltransferase
- Spermine acetyltransferase
- Sphingosine Kinase
- Sphingosine N-acyltransferase
- Sphingosine-1-Phosphate Receptors
- SphK
- sPLA2
- Src Kinase
- sst Receptors
- STAT
- Stem Cell Dedifferentiation
- Stem Cell Differentiation
- Stem Cell Proliferation
- Stem Cell Signaling
- Stem Cells
- Steroidogenic Factor-1
- STIM-Orai Channels
- STK-1
- Store Operated Calcium Channels
- Syk Kinase
- Synthases/Synthetases
- Synthetase
- T-Type Calcium Channels
- Tachykinin NK1 Receptors
- Tachykinin NK2 Receptors
- Tachykinin NK3 Receptors
- Tachykinin Receptors
- Tankyrase
- Tau
- Telomerase
- TGF-?? Receptors
- Thrombin
- Thromboxane A2 Synthetase
- Thromboxane Receptors
- Thymidylate Synthetase
- Thyrotropin-Releasing Hormone Receptors
- TLR
- TNF-??
- Toll-like Receptors
- Topoisomerase
- TP Receptors
- Transcription Factors
- Transferases
- Transforming Growth Factor Beta Receptors
- Transient Receptor Potential Channels
- Transporters
- TRH Receptors
- Triphosphoinositol Receptors
- Trk Receptors
- TRP Channels
- TRPA1
- trpc
- TRPM
- trpml
- trpp
- TRPV
- Trypsin
- Tryptase
- Tryptophan Hydroxylase
- Tubulin
- Tumor Necrosis Factor-?? | https://scienceofgreathealth.com/background-carbon-c-and-nitrogen-n-metabolites-can-regulate-gene-expression/ |
Home / Recipes / Christmas Plum Cake
How would you rate this recipe? Please add a star rating before submitting your review.
Can I use desi ghee instead of butter
i was looking for a microwave version! thanks for sharing this :)
Take all dry fruits in a bowl. Melt butter and add to it and mix well.
Take 1 tbsp water and 1/2 cup sugar in a thick bottom pan and melt till it becomes brown in colour and begins to caramelize.
This will take approx 10 minutes. Take care as to not burn the caramel.
Add this in the fruits. Let it cool. Take all spices and dry grind to fine powder. Add jam, orange juice, 1/2 cup sugar, salt, spice mix, vanilla essence to the fruits mixture.
Mix well. Sieve wheat flour, baking powder and soda in a separate bowl and add to fruits mixture slowly. Mix well.
Bake in microwave for 10-12 minutes on high. Let it cool, cut and serve.
SERVING: 5
seems simple and yummy!
I load my dishes with more excitement than you will find in other new recipes that are getting far more attentions.
Enter your phone number and email id to continue
OTP sent to 9903106374
Resend OTP in
RESEND OTP
Change your old password to a new one
Edit and update your profile here
Deleting your account may make your saved recipes, collections, and personalization preferences permanently inaccessible to you and reduce the functionality of connected appliances. Deletions will be performed in accordance with our Privacy Notice and applicable laws or regulations.
Deleting your account means your saved recipes, collections, and personalization preferences will be permanently removed from BetterButter. Once you confirm, your account will be deactivated immediately.
Note: If you login during next 14 days, your account will be reactivated and deletion will be cancelled.
Login and Start Exploring!
Forgot Password?
To receive a reset password link in your inbox, enter your email address.
A password reset link has been sent to your mail. Please check your mail.
Enter your new password
Sign Up with BetterButter and Start Exploring!
By creating an account, I accept the Terms & Conditions
It’s faster, safer, and easier than ever! | https://www.betterbutter.in/recipe/2083/christmas-plum-cake/ |
Pricing in health care organizations. A key component of the marketing mix.
Pricing is one of the key components of a successful marketing mix. Pricing objectives, strategies, and tactics cannot stand alone, however. To be effective, price must work in harmony with other marketing and management activities. Despite its importance, use of pricing as a management tool is limited in health care compared to other industries. Many factors contribute to this situation, including the structure of the health-care exchange process, limited consumer knowledge, and a limited ability to measure costs. I will provide an overview of pricing information, both within and outside health care. Specifically, we will explore the definition of pricing, nonmonetary pricing, price elasticity, classical pricing theory, and the role of pricing in a health-care setting.
| |
What Is Beam?
A member in a structure in which the member carries various external forces applied to it perpendicular to its length. Such a member is called a beam.
Thus any member of the structure whose longitudinal axis is perpendicular to its cross-section is called a beam.
Due to the external force exerted on the beam of the structure, bending moment and shear force are produced in its cross-section.
Calculation of beam design includes external force values, type of beam, the elasticity of beam material, a cross-section of beam, etc.
Beams are horizontal structural members in building construction. It uses vertical load, shear load, and horizontal load to transfer to columns. The beam plays a major role in the structures of the building.
The function of a beam is to transfer the load to the column or walls by the external force applied to it. The beam is attached to the column. It is mainly used in the construction of bridges, trusses, and high-rise constructions.
Beams are traditionally part of a building or civil engineering structural elements. But most have structure beam structures such as automotive automobile frames, aircraft components, machine frames, and other mechanical or structural systems. Which is used to carry side loads
Historically beams were made from wood material. But over time, metal, stone, and metal alloys began to be used as beam materials.
Also Read: What Is a Tie Beam? | Advantage of Tie Beam | Bar Bending Schedule for Tie Beams | To Withstand Earthquakes, Tie Beam Specification
Type of Beam
The main types of beams are classified as follows.
- Simply Supported Beam.
- Cantilever Beam.
- Over Hanging Beam.
- Continuous Beam.
- Fixed Ended Beam.
What Is Column?
A member that is arranged anywhere in the structure and has a compressive load on a member with less cross-section in length is called a column.
Columns and struts are used as compression members in heavy construction, in the construction of buildings, bridges, auxiliary systems of tanks, factories, etc.
According to IS CODE 456-1978, the effective length of a vertical column is three times the value of the minimum size of its cross-section.
The column is a structural element as a compression member in architecture and structural engineering, which transfers the external load of the structure to the other structural elements below.
For wind or seismic engineering purposes, the column can be designed to resist external forces.
Columns are used in building structures to support beams or arches, which support the upper part of the walls or ceiling. In architecture, structural elements such as “columns” can be used for decorative features.
Also Read: What Is the Grade Beam? | The Construction Process of Grade Beam | Advantages & Disadvantagesof Grade Beam
Types of Column
- Short Column
- Long Column
- Tied Column
- Spiral Column
- Composite column
- Axially Loaded Column
- Column with Uniaxial Eccentric Loading
- Column with Biaxial Eccentric Loading
- T-Shape column
- Shape of Steel Column
- Shape of Composite Column
- Square or Rectangular Column
- Circular column
- L-Shape Column
- Reinforced Concrete, Steel, timber, Brick, Block, and Stone Column.
Also Read: What is the Plinth Beam? | Application of Plinth Beam | Specification of Plinth Beam | Plinth Protection
Difference Between Beam and Column
|Sr No||Beam||Column|
|1||A horizontal member of a structure that resists a transverse load is called a beam.||A member that is arranged anywhere in the structure and has a compressive load on a member with less cross-section in length is called a column.|
|2||The load carried on the beam is perpendicular to the longitudinal axis||The column carries a load parallel to the longitude axis as a compression member.|
|3||The beam resists the shear force and bending moment.||The column resists the compression load on it.|
|4||Beams can be made in square, rectangular, T shape, I shape, H shape, etc.||Columns can be made in rectangular, circular, square, T shape, L shape, C shape, elliptical, etc.|
|5||The minimum width of the beam is kept at 200 mm.||The minimum width of the column should be 200 mm, and the minimum for earthquake resistance should be 300 mm.|
|6||High rise building can be built without beams||A high rise building cannot be built without a column|
|7||It is classified based on the support of the beam.||Columns are classified as short column or long column based on the slender ratio|
|8||The beams used to resist bending moments have longitudinal steel at the top and bottom on two faces, while the vertical load is resisted by stirrups.||The column has steel on all faces, which normally resists compression.|
|9||Beam failure does not occur without being shown as sudden deflection or cracking.||Column break or failure occurs suddenly. And the whole structure suddenly collapses|
|10||The beam is supported by a column||The column is erected with a foundation|
|11||The minimum and maximum reinforcement used for the beam is 0.2% to 2.5%, respectively.||The minimum and maximum reinforcement used for the column is 0.8% to 5%, respectively.|
|12||The beam is laid along with the slab, so more care is taken for adequate compression and curing when concreting in the RCC structure.||They are usually laid separately, so in the case of RCC structures, the act of curing is performed.|
Also Read:Cantilever Beam | Advantages of a Cantilever Beam | Disadvantage of the Cantilever Beam
Like this post? Share it with your friends! | https://9to5civil.com/difference-between-beam-and-column/ |
The Tripitaka Koreana woodblocks had been produced by the individuals of Goryeo whom sought the Buddha’s magical capacity to repel the Mongol forces which had occupied and devastated their country within the century that is 13th. The Tripitaka Koreana is generally in contrast to other Tripitaka editions created by the Song, Yuan and Ming Dynasties in Asia, and it has been very praised because of its richer and much more complete content. The process of manufacturing the woodblocks played a role that is important the development of publishing and book approaches to Korea.
Human Rights Documentary Heritage 1980: Archives of this might eighteenth Democratic Uprising in Gwangju
The May eighteenth Gwangju Uprising had been a well known rebellion that occurred within the town of Gwangju from might 18 to 27 1980, during which Gwangju’s citizens made a very good plea for democracy in Korea and actively opposed the dictatorship that is then military. The pro-democracy challenge in Gwangju finished tragically but exerted a robust impact on comparable democratic movements that distribute across East Asia within the 1980s. This UNESCO inscription is made of the papers, videos, photographs as well as other types of records made concerning the tasks of Gwangju’s residents through the motion, additionally the subsequent procedure of settlement when it comes to victims, as gathered by The might 18 Memorial Foundation, the nationwide Archives and Records Service, the nationwide Assembly Library, and different companies in america.
Representative listing of the Intangible Cultural Heritage of Humanity
Jongmyo Jeryeak (Royal Ancestral Rite and Ritual Music at Jongmyo Shrine) The Royal Ancestral Memorial Rite held seasonally during the Jongmyo Shrine involves the performance of this civil and armed forces dances Munmu and Mumu.
Royal Ancestral Rite and music that is ritual
The Royal Ancestral Rite (Jongmyo Jerye) now held regarding the very first Sunday of might to honor the dead Joseon Kings and their Queen Consorts during the Jongmyo Shrine in Seoul stayed one of the more crucial state ceremonies following the establishment of Joseon as a Confucian state in 1392. Made to take care of the social purchase and market solidarity, the ritual comprises of performances of ceremonial orchestral music and dances praising the civil and armed forces achievements associated with Royal ancestors of Joseon. This age-old Confucian ritual combining splendid shows of music and party is widely admired not merely when it comes to conservation of initial features created more than 500 years back, but in addition for its unique syncretic or art form that is composite.
Pansori is really a genre of musical storytelling done by way of a vocalist and a solitary drummer in which he/she combines singing (sori) with gestures (ballim) and narrative (aniri) to provide an epic drama conceived from popular people stories and well understood historic occasions. The talent ended up being founded throughout the century that is 18th has created enthusiastic performers and audiences from the time.
Gangneung Danoje Festival
Come july 1st festival held close to Gangneung, Gangwondo Province, for approximately thirty days through the 5th time associated with 5th lunar month to Dano Day regarding the 5th time for the 5th lunar month, is certainly one of Korea’s oldest folk festivals and has now been preserved pretty much in its initial type since its emergence numerous hundreds of years ago. The event begins using the old-fashioned ritual of honoring the mountain god of Daegwallyeong and continues with an excellent number of people games, activities and rituals during which prayers might be offered for the good harvest, the comfort and success of villages and specific domiciles, and communal unity and solidarity.
This age-old shamanic ritual is at onetime done in practically all the towns and villages in Jejudo, with worshippers praying for a great catch additionally the security of fishermen working at sea. Based on the old-fashioned folk belief of Jejudo islanders the next lunar month could be the thirty days of Yeongdeung, during which Grandma Yeongdeung, a wind deity, visits all of the villages, farming industries and houses across Jeju, bearing tidings concerning the harvest into the oncoming autumn.
Among the surviving conventional arts that are martial in Korea, Taekkyeon, which can be quite not the same as Taekwondo, had previously been understood by a number of various names such as Gakhui (“sport of feet”) and Bigaksul (“art of flying legs”), although such names declare that it’s related to the motion of throwing. Like the majority of other fighting styles in which tools are not utilized, Taekkyeon is directed at increasing self-defence that is one’s and advertising real and psychological state through the training of orchestrated dance-like physical motions, making use of the legs and legs in specific. Participants ought to concentrate more on defence than on offense, and also to toss the opponent into the ground utilizing their fingers and foot or jump up and kick him into the real face to win a match.
When you look at the old-fashioned Korean art of jultagi (tightrope hiking), a tightrope walker does an assortment of acrobatic motions, additionally as performing and comic storytelling, as he walks along a tightrope. He could be generally speaking assisted by the eorit gwangdae (clown) on the floor who responds to his terms and motions with witty remarks and comic actions meant to generate a response that is amused the spectators. Tightrope walking had been formally performed at the Royal Court to commemorate unique occasions including the (Lunar) New Year’s Day or even to entertain special visitors such as for instance international envoys. Though the aspiration of Joseon’s rulers towards an even more lifestyle that is austere forced it toward villages and areas, also it fundamentally became an activity when it comes to common individuals. Whilst tightrope walking in other countries has a tendency to concentrate on the walking methods alone, Korean tightrope walkers have an interest in tracks and comedy in addition to acrobatic stunts, thus concerning the spectators more intimately within the performance.
1. Taekkyeon a normal Korean art that is martial by elegant yet effective real motions. 2. Jultagi Performance of tightrope walking coupled with performing, comedy and acrobatic motions.
Korea includes a tradition that is long of and training falcons as well as other raptors to seize quarry, such as for instance crazy pheasants or hares. Archaeological and historic evidence reveal that falconry regarding the Korean peninsula started thousands of years ago and ended up being commonly practiced throughout the Goryeo Period (918-1392) in specific. The game was a lot more popular within the north compared to the south, and had been carried out often throughout the cold temperatures period when farmers had been clear of farm work. Falconers would tie a fabric sequence across the ankle of these bird as well as an ID tag and a bell to its end. The tradition that is korean inscribed in the Representative listing of the Intangible Cultural Heritage of Humanity this year along side those preserved in eleven other countries around the globe such as the Czech Republic, France, Mongolia, Spain, and Syria. | http://www.duniang1688.com/13920.html |
Farmhouse is a term used more often to describe function. The design of a farmhouse – also called ‘connected farms’ or ‘folk houses’ – was initially influenced by geography and a particular agricultural pursuit. The style evolved from the characteristics of the place, people, climate and materials available in the particular region it was located.
The earliest homes that we can call ‘true’ farmhouses were those built by early colonial families and owners who would likely have built the homes themselves. The commonality was this: The farmhouse was unpretentious, straightforward and functional.
The home itself was often of a certain Colonial vernacular (cape-like, saltbox, colonial, etc.); beginning as a residential structure then added upon with multiple utilitarian additions to the rear of the home. Farmhouse architecture is perhaps most recognizable by its core design elements: porches were a perfect place for muddy boots to be kept outside; from the porch, an additional entry at the gable end of the house was also characteristic so as not to access the house through the two formal front rooms for entertaining, and finally the large farmhouse kitchen was housed in the back, a space that allowed for harvested crops to be canned, dried, cooked and stored.
Stone and timber were predominant structural elements in regions where these materials were readily available. Classic forms and details from the Greek Revival, Georgian and Victorian architectural eras were also common styles of the home, and reflected in the additional structures that were often attached. These buildings today are some of the most beautiful and iconic combinations of structures seen. | https://classiccolonialhomes.com/classic-colonials/farmhouse/ |
This extensive guide shares everything you need to know about water quality and testing in the US and beyond.
📌 Key Takeaways:
- Water quality is a measure of water’s physical, chemical, and biological characteristics as relates to the specific application.
- Sources of contamination affecting water quality include pollution from local manufacturing processes, sewage releases, and naturally occurring elements.
- Water quality is monitored through sampling and testing, using biosensors, Consumer Confidence Reports, real-time monitoring, and more.
Table of Contents
🚰 What Is Water Quality?
Water quality is an indication of water’s physical, chemical, and biological characteristics in relation to the standards set for its specific purpose (application).
By assessing water quality, we can determine whether or not water has been treated to achieve certain standards, demonstrating compliance. Water quality may also be assessed and monitored to convey:
- The condition of drinking water
- The extent of water pollution
- The health of ecosystems
- The safety of human contact
The quality of a water source determines its uses and the extent of treatment required.
🔎 What Affects Water Quality?
Water quality is affected by both natural and non-natural contaminants.
Local geology and the ecosystem differ from region to region, which affects the contents of local water supplies.
Additionally, common sources of contamination, which affect the quality of a water supply, are:
- Human sewage releases
- Naturally occurring minerals and chemicals (like iron, fluoride, and uranium)
- Pollution from local manufacturing processes
- Agricultural land use (such as livestock farming and pesticide use)
- Malfunctioning septic systems and other wastewater treatment systems
- Poorly maintained, corroded, or damaged distribution systems
🤔 What Is Considered “Quality Water”?
Now we know a bit about water quality and how it’s affected, let’s look at the definition of “quality water”.
There’s no set standard for quality water – i.e. water that is considered good quality – across all areas of intended use.
The biggest focus is on water that is treated for human consumption, water for domestic or industrial use, and environmental water quality.
Let’s look in more detail at these three water uses.
Water For Human Consumption
Water for human consumption needs to be free from contaminants that could harm us or make us sick if we drink them.
Some of the contaminants potentially present in public drinking water prior to treatment are:
- Viruses
- Bacteria
- Protozoa
- Herbicides and pesticides
- Inorganics like metals and salts
- Organics from petroleum use and industrial processes
- Radioactive impurities
This water type is considered “quality water” if it contains only trace amounts of these harmful impurities.
Note: water is not expected to be entirely pure. There’s a reasonable expectation that water for human consumption contains a small number of certain contaminants – but not enough to pose a human health risk.
To ensure that quality water is maintained, the US Environmental Protection Agency (EPA), authorized by the Safe Drinking Water Act (SDWA), sets standards that water treatment facilities must adhere to.
There are two types of standards for public drinking water quality:
- Primary Standards, which regulate potentially health-harmful contaminants
- Secondary Standards, which regulate impurities with aesthetic effects, such as poor taste, smell, or appearance
For water products (such as bottled water and other beverages containing water), there are regulations set by a separate governing body: the U.S. Food and Drug Administration (FDA).
So, how is quality drinking water maintained?
In urban areas, municipal water suppliers use water purification technology to treat the water and remove contaminants that compromise water quality. All public drinking water supplies in the US are treated before they’re distributed to homes, businesses, and other local residents.
Sadly, there are still millions of people around the world who don’t have access to a clean, treated water supply. These people are at risk of serious illness from drinking pollutants and waterborne pathogens. Polio, typhoid, dysentery, cholera, and hepatitis A can all be contracted from drinking an untreated water supply.
Water For Domestic Or Industrial Use
Water for domestic or industrial use doesn’t necessarily need to be of drinkable standard – and “quality water” in this case depends on the water’s intended purpose.
Water’s suitability for various domestic and industrial uses may be affected by its dissolved ions content. Calcium and magnesium (hardness minerals) are the two key minerals that cause the most problems in industrial and domestic applications because they form limescale and reduce the cleaning properties of soap.
The treatment of water to make it a suitable quality for domestic or industrial use may include purification, where certain contaminants are removed, and softening, where calcium and magnesium minerals are exchanged with harmless ions (usually sodium). Again, treatment depends on the intended use of the water.
Water Quality In The Environment
Our oceans, lakes, rivers, and reservoirs have varying water quality, depending on local ecosystems and environmental conditions, as well as local contamination and pollution.
There’s no set standard for “quality water” for a natural water source. It depends largely on the water’s intended use.
Certain substances and pathogens may affect the quality of water in the environment, making it unsafe for swimming, irrigation, industrial use, fishing, and other non-drinking purposes.
There may be local water quality laws in place that protect wildlife from the pollution of these natural water sources. Some laws allow for mild contamination of water in the environment, as long as healthy ecosystems are restored and/or maintained. Other laws are more focused on protecting human health (if water is used for human consumption) or protecting an endangered species that relies on a quality water supply.
🧪 How Water Quality Is Tested & Monitored
So, we know about water quality across various water sources – but how is water quality measured?
Water Sampling
One of the most effective ways to monitor water quality in the long term is to use a water sampling device.
Some of the water conditions that might be logged by water sampling are:
- Dissolved oxygen levels
- pH
- Conductivity
- Turbidity
- Temperature
- Oxygen reduction potential
- Secchi disk depth
There are various methods of sampling that may be used, depending on the parameters that need to be tested for and the required testing accuracy.
A few sampling methods that may be used are cluster sampling, random sampling, passive sampling, and remote surveillance.
Some states use autosamplers, which automatically collect samples at various times and record water conditions.
Laboratory sampling is the best option for occasions when complex measurements need to be taken, and requires water samples to be collected and analyzed at a laboratory.
Are there any setbacks in water sampling?
Yes. First, a water sample is only accurate at the time of taking the sample, since the quality of a water source is ever-changing. For this reason, regular samples are required to get an overall understanding of water quality.
Secondly, water samples may be altered by the container they’re collected in. The container needs to be clean and free from materials that might leach into the water or react with substances in the water.
This second problem is easy enough to avoid. Most issues can be minimized by analyzing the water as soon as possible and keeping samples at a cold enough temperature to prevent phase change and chemical reactions.
Consumer Confidence Reports
Consumer Confidence Reports (CCRs) are produced by public water suppliers and provided to water customers as a means of information on local drinking water quality.
A CCR is produced based on a water supplier’s testing of treated drinking water onsite. Some of the information in the report includes:
- The water source (where the water was taken from)
- Contaminants in the water and at what level they were detected
- How these contaminant levels compare to national standards
- Whether or not any contaminants have violated any health-based standards
- The potential health effects of drinking contaminated water
- How consumers can protect their drinking water
Consumer Confidence Reports are shared annually with all residents who pay their own water bill. Because these reports are only produced once a year, they have their limitations.
As we mentioned earlier, water quality fluctuates in real time, so the contaminants listed in a CCR will only be accurate at the time of testing. CCR reports also don’t account for contaminants that may enter a water supply at a later stage after treatment, such as lead from a lead supply line.
With that said, Consumer Confidence Reports offer a good way for water customers to get a general understanding of their water quality, and comparing annual reports can give an indication of how water quality may change year by year.
Testing After Natural Disasters
A natural disaster (like a tsunami or an earthquake) or another emergency can have a major impact on water quality, and testing in response to such an event can determine how water supplies have been affected.
Testing is the first step toward restoring the fundamental resources that are needed for basic survival, keeping in mind that the disease threat usually increases after a natural disaster due to unsanitary living conditions.
There are a few water quality parameters that are addressed after an emergency, including:
- pH
- Coliform bacteria
- Turbidity
- Chlorine residual
- Total dissolved solids
Water quality will often need to be monitored over a long period as water slowly returns to its pre-disaster quality. In the meantime, local authorities may need to extensively treat the water to make it safe for consumption or arrange for alternative short-term solutions, like bottled water.
At-Home Water Test Kits
Very basic residential water testing can be carried out at home using a Do It Yourself water quality testing kit.
A DIY drinking water test kit detects a handful of common water parameters and contaminants, including total alkalinity, pH, hardness, dissolved minerals, lead, copper, chlorine, mercury, fluoride, and nitrate/nitrite.
This type of testing is usually used on a one-off basis (by residents who are curious about their water quality, concerned about a certain contaminant, or keen to test the effectiveness of a water treatment process, for example), or periodically (e.g. once a year) to give a general overview of water quality.
An at-home water test kit contains testing strips and a color chart. When a testing strip is dipped in the water sample, it changes color. The color can be compared to the color chart to indicate which contaminants are present, and to what level.
DIY water testing is a good way to gather basic water quality information, but it’s not accurate or thorough enough to be used extensively for non-residential purposes.
Chemical Analysis
A chemical analysis is used to measure the chemical elements in a water supply. For example, an elemental analysis can be performed to detect water’s dissolved oxygen levels.
Chemical analysis is also a quick and simple way to detect heavy metals. A person conducting the analysis should also consider any suspended soil particles in the water, since soil may contain traces of heavy metals that, while not dissolved in the water, would still be consumed by someone drinking the water.
This method of water testing and monitoring is often complex and expensive. However, there are a few chemical analysis tools available for residential use, such as fish tank test kits.
Environmental Indicators
There are various environmental indicators that can be used for monitoring and testing water quality. These can be split into biological indicators, physical indicators, and chemical indicators.
Biological indicators
Biological indicators include:
- Americamysis bahia (Mysid shrimp)
- Coliform bacteria
- Escherichia coli (E. coli)
- Ephemeroptera (mayflies)
- Pimephales promelas (fathead minnow)
- Mollusca (mollusks)
- Plecoptera (stoneflies)
- Trichoptera (caddisflies)
- Sea urchins
Physical indicators
Physical indicators include:
- Total dissolved solids (TDS)
- Total suspended solids (TSS)
- Total hardness
- Water temperature
- Water odor
- Water color
- Water taste
- Water turbidity/transparency
- Water conductivity
Chemical indicators
Chemical indicators includes
- pH
- Dissolved oxygen
- Chemical oxygen demand
- Biochemical oxygen demand
- Nitrate
- Pesticides
- Heavy metals
- Surfactants
- Orthophosphate
The presence of certain chemical, physical, or biological indicators may point towards good or bad water quality. For instance, most chemical indicators (heavy metals, pesticides, nitrate, etc) poorly affect the quality of a water supply, but certain biological indicators (such as mayflies and stoneflies) are generally present in regions with good-quality water.
Evaluating environmental indicators is a good option for folks who want to get a general water quality reading but can’t afford or manage a large-scale lab analysis.
Residential Well Water Testing
Private well owners get their residential tap water from an underground well, rather than a municipal supplier. Regular water testing and monitoring is essential for well owners because local authorities don’t treat private well supplies to make them safe for human consumption.
There are several water testing methods for wells, but laboratory testing – sending off a water sample to receive a water test report – is the most reliable and common.
New wells or homes should test for the following water parameters and contaminants:
- Bacteria
- Total hardness
- Calcium
- Magnesium
- pH
- Sodium absorption ratio
- Nitrates
- Conductivity
- Iron
- Total dissolved solids (TDS)
To account for changes to water quality, the CDC says a well owner should also test their water supply once a year for the following contaminants:
- Total coliform bacteria
- Total dissolved solids (TDS)
- Nitrates
- pH levels
- Any contaminants of concern
Additionally, well owners should test their water every 5 years for:
- Bacteria
- Total hardness
- Calcium
- Magnesium
- pH
- Sodium absorption ratio
- Nitrates
- Conductivity
- Iron
- Total dissolved solids (TDS)
- Alkalinity
- Potassium
- Chloride
- Fluoride
- Sulfate
To get a proper understanding of their water quality, well owners are advised to take a raw water sample, meaning that the water hasn’t been treated by, or influenced by, any at-home water treatment units. Two samples may be taken – one of the untreated surface water or groundwater and one of the treated water – to determine the effectiveness of a water treatment system’s performance.
Private wells aren’t regulated by the Environmental Protection Agency. But well owners should still refer to EPA standards and guidelines when testing water quality and determining possible treatment options.
Special attention should be given to contaminants of local concern or contaminants that have been found in high quantities in the past.
Real-Time Monitoring
We mentioned earlier that public water suppliers produce Consumer Confidence Reports that provide water testing results from one specific occasion. Although these reports are only produced and distributed once a year, the majority of water utilities have their own systems for collecting real-time information about the quality of their source water.
These systems include monitoring devices and sensors, which can measure dissolved oxygen, total dissolved solids, pH, turbidity, and more.
🌎 How Climate Change Affects Water Quality
So, how can climate change affect our water quality?
The quality of a natural water source can be affected in numerous water due to weather effects caused by climate change, depending on the context of the issue.
For instance, temperature extremes, water shortages, and heavy rain may cause floods or droughts, damaging water infrastructure and deteriorating water quality.
The United Nations General Assembly established a list of Sustainable Development Goals in 2015. The sixth of these goals – achieving universal access to safe drinking water – is threatened by the weather effects of climate change.
How exactly does climate change reduce the quality of water?
- Flooding – Causes floodwater to mix with wastewater and redistribute contaminants due to increased surface runoff.
- Heavy rainfall – Increases surface runoff and causes increased pollution and contamination in rivers, reservoirs, and shallow groundwater supplies. Increases the likelihood of microbiological contamination, especially following periods of drought.
- Increased meltwater from glaciers – Risks releasing contaminants that were historically deposited. Also causes the loss of the dilution of seasonal meltwater on downstream water quality due to shrinking glaciers.
- Droughts – Reduce the water levels and dilution capacities of rivers, making groundwater contamination more likely.
- Higher temperatures – Causes warmer water which increases the likelihood of harmful algal blooms and reduces water’s oxygen content.
- Rising sea levels and intense storms – Increase the amount of salt in water sources, especially in groundwater supplies.
✅ Standards For Water Quality
There are a number of water quality standards in place for various water sources. These standards were produced and implemented to suit the water’s use point and purpose.
Water Quality Standards Around The World
There are several international guidelines for drinking water quality standards:
- The World Health Organization (WHO) updated its guidelines for drinking water quality, now the 4th edition document, in 2017.
- The International Organization for Standardization (ISO) published water quality regulation, toxicity, and protection against pollution, in ICS 13.060.
National Water Quality Standards:
Most regions have their own national water quality standards:
United States
There are various state agencies in the United States that define water quality standards for different water bodies, including:
- The Clean Water Act (CWA), which requires each governing jurisdiction to submit a set of biennial reports on local water quality, which are submitted to, and approved by, EPA.
- The EPA under the Safe Drinking Water Act (SDWA) issues Drinking Water Standards, which all public water systems should adhere to.
Europe
There are three primary directives that are used to monitor and maintain water quality in Europe:
- The Directive on Urban Waste Water Treatment (91/271/EEC), produced on 21 May 1991, which concerns municipal wastewater discharge (and some industrial wastewater discharge)
- The Drinking Water Directive (98/83/EC), produced on 3 November 1998, which concerns the quality of potable water
- The Water Framework Directive (2000/60/EC), produced in 23 October 2000, which concerns the management of water resources
United Kingdom
The United Kingdom has its own water quality regulations for drinking water supplies in England and Wales. These are listed in the Water Supply (Water Quality) Regulations 2000 document.
India
India’s drinking water regulations are set by the Indian Council of Medical Research (ICMR) Standards for Drinking Water.
Australia
The Australian government has produced the Australian Drinking Water Guidelines, a document that provides guidance to water suppliers and regulators on managing and monitoring drinking water quality.
South Africa
Water supplies are grouped by user types in South Africa, with each potential user type having its own water quality guidelines. These guidelines are outlined in the 1996 Water Quality Guidelines.
Local Water Quality Standards:
Some regions, such as various states in the US, have their own water quality standards and regulations in place that local water utilities must adhere to alongside the national regulations.
This is common if a specific contaminant has been identified as particularly prominent or dangerous in the area.
Some states may also have their own laws relating to pollutants that are known to contaminate water supplies. For instance, Washington now restricts the use of PFAS (a group of manufactured chemicals) in firefighting foam and bans PFAS in consumer products.
❔ Water Quality and Testing: FAQ
What are the biggest threats to water quality?
The biggest threats to water quality are point-source pollution (pollution from an identifiable source, like an industrial plant or factory), non-point-source pollution (pollution that can’t be traced to a single source), urban runoff, agricultural runoff, and septic sewage. With the right management practices in place, many of these threats can be reduced or prevented.
What are the 3 types of water quality?
The 3 water quality parameters are physical, chemical, and biological. Physical indicators of water quality include water temperature, water odor, and total dissolved solids. Chemical indicators of water quality include nitrate, dissolved oxygen and pesticides. Biological indicators of water quality include the presence of coliform bacteria and mayflies.
What tests are done for water quality?
When testing water quality, there are various parameters and contaminants that can be specifically tested for. The best test for residential drinking water supplies is laboratory testing, which provides thorough, accurate test results, usually within 2 weeks.
Why our water quality is important?
Water quality is important because it directly affects human health and the environment. Poor-quality water may make us sick or cause health issues like reproductive damage and neurological disorders. Poor or changing water quality could also affect local ecosystems, killing or harming plants and wildlife in the area. Without a high-quality water source, humans and animals simply couldn’t survive.
Does the US have good water quality?
Yes, the US generally has good water quality. We’re lucky to have access to potable drinking water as a public necessity. Water supplies in the US are generally safe. However, the US is still affected by pollution (largely due to human activities), disasters (such as flooding and earthquakes), and natural contamination, which all pose a threat to the quality of natural water sources.
Why is it important to monitor the water quality?
Monitoring water quality is important because it’s common for water parameters and contaminant levels to change over time, affecting its quality. Without regular water testing and monitoring, we’d be unaware of the potentially dangerous changes to the composition of our drinking water, and we wouldn’t be able to address these issues with suitable treatment options.
How is tap water quality monitored in the US?
Drinking water quality in the US is monitored by the Environmental Protection Agency (EPA). The Environmental Protection Agency has produced guidelines for primary and secondary contaminants (contaminants with health effects and contaminants with aesthetic effects), and water utilities must adhere to these guidelines when treating water for drinking.
Related: Learn the truth about the safety of drinking tap water
Where is the best water quality in the US?
Some of the US states with the best water quality are Minnesota, Kansas, Rhode Island, Missouri, and South Dakota. We’ve shared a guide on the states in the US with the best water quality if you’re looking for more information. | https://waterfilterguru.com/water-quality/ |
Thought I’d get one out there. It being summer and all.
Day: June 22, 2011
That’s My Soul Up There
Charlie Stross today has penned a thoughtful piece on why you shouldn’t be waiting up for The Singularity. It’s fun and interesting stuff, but I have a small quibble with his thoughts on the theological implications of uploading one’s brain into the network. Here’s what Charlie has to say on it:
Uploading … is not obviously impossible unless you are a crude mind/body dualist. However, if it becomes plausible in the near future we can expect extensive theological arguments over it. If you thought the abortion debate was heated, wait until you have people trying to become immortal via the wire. Uploading implicitly refutes the doctrine of the existence of an immortal soul, and therefore presents a raw rebuttal to those religious doctrines that believe in a life after death. People who believe in an afterlife will go to the mattresses to maintain a belief system that tells them their dead loved ones are in heaven rather than rotting in the ground.
I think Charlie’s correct that there will be theological arguments about it; I don’t think he’s necessarily correct that trying to upload one’s brain into the cloud implicitly refutes the soul any more than any other non-organic life-extending therapy, like getting an artificial heart or blood dialysis. In the case of a brain upload (or more accurately, I suppose, mind upload) what would be extended is not the physical body but some aspect of the consciousness, but it’s an open question of whether this represents a difference of degree or of kind. I think a theologian worth his or her salt could very easily make the argument that if the soul is not threatened by an artificial heart, neither is it threatened by the consciousness having its lifespan artificially extended via the cloud (or the net, or the wire, insert your favorite computing metaphor here).
Also, here’s the thing: someone may attempt to become immortal via a mind upload, but death is no less guaranteed there than it is in the physical world. It may just take longer. Or it may not, since if anyone thinks a post-singularity mind-uploaded world is going to be a happy friendly utopia of love is to be asked how long their computer will remain unmolested if they turn off all the prophylactic measures they use to keep the bad guys out of them. That sort of thing is going to get worse, not better, in a post-singularity world. So death will remain — possibly delayed, but always eventually certain, since even in the best case scenario (if you want to think of it like that, which is debatable) the entire universe will wipe itself via proton decay trillions upon trillions of years from now. No one’s getting out of here alive. So in that respect, those who yearn for true immortality, the ultimate refutation of entropy, there will always be a need for an afterlife, and a way to get there, i.e., one’s soul.
So, no, I don’t think uploading implicitly refutes the soul. It just means that if the soul does truly exist, it will have to live with you longer.
Giving It a Rest
This week’s FilmCritic column is a plea for science fiction filmmakers to show a little originality by way of pointing out several all-too-familiar tropes that could use a rest, for, oh, a decade or so (and noting which recent films are running those tropes into the ground). As ever, the comment thread at FilmCritic.com yearns for your input. Yearns, I tell you. | https://whatever.scalzi.com/2011/06/22/?amp |
By Amanda Linette Meder Psychic Medium
In this post, we continue on our journey of debunking the Ghost Whisperer’s 100 Ghost Rules. The Ghost Whisperer is a fictional television show, where the main character, Melinda, is a medium who struggles with managing her every day life and dealing with Spirit. It’s also a favorite show of my friends, family and acquaintances.
While the series has since been aired and completed, there’s lots of valid information on the show, yet many of the rules are in need of more explanation and expansion. So here, a real life medium and regular gal (me) will debunk, verify and clarify these ghost idiosyncrasies for you, step by step. If you are just joining us now, please head back to the first post and check out Ghost Rules 1-25.
Otherwise, onward!
100 GHOST RULES FROM 26-50
Each rule is stated exactly as the show states it, underneath is each I provide you with the thoughts of a every-day medium.
26. Melinda, and others like her, can filter out the voices of the many ghosts who surround them and focus on the most important ghost by listening with their hearts.
Yes, but this takes practice. It’s not always that easy to filter out the important messages from the noise at first. If you have trouble getting Spirits to stop talking over one another, ask them to quiet down and then ask, for one who has the most important messages to share now, to step forward. Most of the time, just calling out a single speaker, can help reduce all the surrounding noise so that you can focus on one spirit-speaker, rather than potentially thousands of individuals.
27. Ghost listeners are people like Eli James who can hear earthbound spirits but cannot see them.
I’ve never heard this term, but I suppose this is accurate. Some mediums can see Spirit, some can hear them, some can feel them. Each Spirit sensitive usually has a primary way communicate with Spirit. We can identify yours in a private session or class. My Spirit sensing way is primarily seeing, but many people can hear them. Those with either primary ability are often equal in accuracy, where a clairaudient (hearing) medium versus a clairvoyant (seeing) medium, does not determine overall ability. These are intuitive modalities.
28. Initially, a spirit's appearance can be distorted, even scary. Once they start to interact with the living, they begin to look more like they did when alive.
Yes, sometimes. Once someone starts to feel human again, and is offered compassion, love and a listening ear, they begin to soften and appear, act and feel more like the we do. All you need to do is offer compassion to a Spirit, and often, all the scariness fades away. The person, without the fear, begins to shine through.
29. Ghosts do not always retain memories from their experiences in the world of the living.
Some things are forgotten. As a medium if you can’t ‘get’ the information from a Spirit, it’s likely they may not even have it. In comparison, think about how often we forget things everyday, even things considered pertinent our everyday lives. We just flat out forget. Now think of yourself as a Spirit, now without an everyday life, lots of things become way less important to you and therefore, can be lost from soul memory. Sometimes, you have to let go of things you experienced here on Earth, in order to move on.
30. "Guardians" are spirits responsible for bringing babies to the Light when they do not have someone to meet them.
Generally, these individuals are Guardian Angels.
31. Ghosts often stay earthbound in order to help a grieving loved one heal and move on with his or her life.
Some individuals do this for a time and then when they feel the Loved One is ready, or when a Loved One formally releases them, by saying, “It’s okay for you to go, I’ll be fine,” those in Spirit will feel much more confidently about moving into the Light. This is common between parents and children and with romantic partners, when one party moves on.
32. Because of the resentment an earthbound spirit feels about his/her tragic death, the spirit can wreak havoc on the living.
I don’t agree with this statement. Not all Earthbound Spirits feel this. Those that I have encountered have expressed fear, confusion, sadness, loss or injustice, but rarely have I noticed resentment. With those that do, not all choose to ‘wreak havoc’ with their feelings, though there are some that choose to make these choices with their emotions.
33. When a person commits suicide, his/her spirit can be stuck between the worlds of the living and the dead.
I don’t agree with this statement. Many of those who, as a part of their life path, choose to take the life of their physical body, cross over into the Light nearly immediately. Where others, may go to their life review and connect with their Guides and Angels to work out their thoughts, emotions or issues around their death. This is sometimes called the ‘waiting place’, or the stuck place. Where others still, return to Earth as Spirit Guides and their job is to coach and convince people still on Earth, out of the same fate.
34. Ghosts can force visions of their death onto the living. If those memories are extremely violent, the person's life can be jeopardized.
The first part, yes. The second part, no, I don’t think so.
Those in Spirit, especially those who died alone or died of causes in which no one still living knows the answer, are often eager to share their story with someone who can empathize. There is healing in listening. Many of those in Spirit, wish to share the story of their death with another, simply to get it off their chests and to release them, from carrying the burden and the knowledge, all alone. Many ‘new’ mediums experience an abundance of visitations from those in Spirit, eager to show and share their deaths, and this can be a frightening experience, until each person learns how to set their own boundaries with Spirit.
And remember, the reason for this sharing, is not a malicious one, it’s an out reaching effort for your empathy, love and compassion for their human experience. One that they may have experienced alone.
35. Ghosts have no sense of time.
Yup. Time is a physical world limitation. This fact alone, often explains why Spirits have seemingly no boundary for visiting at night time - time of day is a physical world only thing. While your Loved Ones have lived in the physical world, they don’t now. This concept, as it’s not that important in a world with a lack of physical world responsibilities, is easy forgotten.
36. Out of body experiences occur when a person flat-lines and is resuscitated.
These experiences are often called near death experiences and yes, you, your Spirit, can move, jump or float out of your physical body, during periods of trauma. In the shamanistic tradition this is sometimes called soul loss.
37. Earthbound spirits of children tend to hang out in groups. Adult ghosts typically do not.
I have seen more children spirits in groups of 2-3 or with adult-Spirit escorts, like grandparents, than I have seen adult Spirits in groups. Generally, I see adult human Spirits by themselves, but not always. In readings, many times, your Loved Ones come together in a small, loving group.
38. Spirits can group together for a common purpose and use the strength of their numbers to interact more powerfully with the world of the living.
Just like people can. Spirits are people, remember?
39. When an extremely large group of souls crosses over together, it is possible for the living to see the Light.
If you have the ability to see clairvoyantly or have ever seen flashes of Light, you can also see the Divine Light that shines down to create the link between the Spiritual world and the Physical one. You don’t need to wait for a huge group crossing to occur, so much as you need to develop your acute awareness for un-accounted for flashes, glows or streaks of Light in the atmosphere.
40. Light spirits protect souls and help them cross over. Dark spirits are evil and collect souls to keep them earthbound.
Sigh, this is a complicated one. Light Spirits, such as those that live in the Divine Light, sometimes known as Heaven, including Spirit Guides, Angels and many Loved Ones, can and do assist in the crossing over process.
While I do believe Dark Spirits exist, I don’t necessarily believe they can be classified as evil, participating in acts of mal-intent, on purpose. Read my posts on Dark Spirits here.
41. If a dark spirit takes the soul of a light spirit, the dark spirit becomes invincible.
What? I don't even understand this statement. All Spirits are eternal.
42. A child ghost will often remain earthbound waiting or searching for it's parents.
Sometimes yes, but more likely a Child Spirit, crosses fully over and then returns to their parents, staying by their side, all the way through their remaining lives. Eventually, assisting their own parents in the crossing over process, when they too, are ready to return to Spirit. Sometimes, Child Spirits become Spirit Guides or Angels for their parents.
43. When a soul crosses over into the Light, the handicaps it had in life are gone. Every soul is perfect.
Yes. All physical body ailments are cured, as the physical body is left behind on earth.
44. A ghost who experienced a violent death may relive that experience while trapped as an earthbound spirit.
Yes, but as a medium, you can shake them out of it, if you see it, sense it, or feel it happening. You can provide them with clarity by telling them the current year and date, and explaining the actual situation that is going on around them while they relive the past one.
For example, if a Spirit is reliving being chased by their 200 year old killer, while you are standing in your kitchen all alone, explain to this Spirit, as though you are talking to a real person (because you are), that this is a kitchen now, that the year is 2014, and that they are no longer living. This information can help them not only calm down, but cross over.
45. Ghosts can use infrasound, a frequency that's so low we can't hear it, to make their presence felt.
Yes, this is a low frequency sound that can be felt, and hose in Spirit can also experiment with other frequencies of sound to be both heard and felt. As a side note, both Elephants and giraffes use infrasound to communicate with their friends and family a few miles across the savannah. Many humans can feel this sound vibration, too.
46. Ghosts are often confused about the way they died, blaming the wrong people for their death.
Meh, I haven’t heard a lot of blame coming from those in Spirit, so while not true for my experience, it may be true for the experience of another medium.
47. When a person is brain dead and on life support, their soul is outside the body, but still tethered to it.
Sometimes, but not always.
48. Souls are assigned new bodies when they are reincarnated.
Yes, each of us, born onto Earth as a Spirit into a physical body, are given new bodies as we emerge from within our new mothers. There’s a Spirit within each of us, the physical body, is simply the vehicle that we use and hopefully, value, here while learning and growing here on Earth.
49. Ghosts exhaust their powers when they act aggressively.
If you respond with lots of energy, such as by getting all worked up, anxious, fearful, in hysteria, or nervous, they can use the energy given off by you, to gather energy for themselves. But, if you refuse to energetically respond to any unwanted Spiritual Activity (ignore, refuse to respond, respond neutrally, etc), they will exhaust their efforts and leave.
50. A walk-in can only occur to a corpse if the spirit originally inhabiting the body abandons it.
A walk-in is when a living person, who is a Spirit within a body, ‘checks out’ of their life, and abandons their physical body, then another Spirit, steps into their old body.
This happens in cases such as trauma, addiction, hardship, or just lack of care, when a person, who is alive, decides to no longer care about their life or body. In doing this, their Spirit, separates from their body and with a vacant body, anyone can step into it.
(This caveat within a caveat is not a common occurrence).
I hope this clears some things up for you ~ stay tuned next week for the debunking and clarifying of Ghost Whisperer’s 51-75 Rules! | https://www.amandalinettemeder.com/blog/2014/8/30/fact-or-fiction-debunking-ghost-whisperers-100-ghost-rules-26-50 |
What is Information Security?
Information Security refers to various measures taken to protect and safeguard information against any unauthorised access, misuse, modification, deletion or improper disclosure. More generally, information security focuses on policies, procedures and technologies used to establish sufficient controls to maintain the integrity, confidentiality and availability of information.
Information security typically consists of both proactive and reactive components. The proactive components aim to prevent incidents which adversely affect the integrity, confidentiality and availability of information while the reactive components focus on the handling of incidents once they occur and includes assessment, remediation, reporting and recovering from incidents.
Common proactive information security activities include:
- Security awareness and education programs
- Risk assessments and identification of appropriate controls
- Development of policies and procedures
- Providing advice and guidance with respect to the implementation and use of technology and business processes from a security perspective
- Auditing to ensure systems and procedures comply with various legislation, regulations, policies and procedures
- Ensuring areas have adequate ICT disaster recovery and business continuity plans
Reactive information security activities include:
- Responding to and assessing of security incidents or potential security issues
- Assessing the impact of security incidents and providing recommendations regarding appropriate remediation
- Assisting individuals and areas in handling a security incident
- Reporting incidents and security issues to management, senior executive and where necessary or appropriate, external agencies.
- Overall coordination of security incident response processes
No documents could be found.
Who is responsible for information security?
All users of UNE ICT services are responsible for Information Security. The role of the information security team within ITD is to assist all staff and organisational units with the development and implementation of secure processes and practices with respect to the use and maintenance of information and ensure these processes and practices comply with relevant legislation, regulations and policies.
Any UNE representative who becomes aware of an information security issue or a potential security issue is required to inform the Information Security Team via email at [email protected]. Anyone who wants guidance or assistance with respect to Information security processes or practices is encourage to contact the Information Security team. | https://www.une.edu.au/current-students/support/it-services/security |
If you’ve been reading our blog for a while you know I tend to write about all of the reasons to celebrate Delaware. This week isn’t exactly an exception since I’m spotlighting our amazing beaches, but with some simple advice on how to stay safe at both the bay and the ocean.
Watch for surprising dangers in Delaware Bay
I’ll start by pointing out that the places most people think are the safest – the beaches along the Delaware Bay – can actually be very hazardous. While the shallow waters can help anxious parents of young children feel more relaxed, most of the swimming area is atop sandbars that can shift by the hour. As a result you might wade out 20 feet to water that only comes up to your waist at one part of the day while becoming completely submerged at the same spot later on.
While that certainly means you need to watch your kids and grandkids carefully, the even bigger danger comes when people dive into the water without realizing how shallow it is.
I can’t stress this enough. When you take your kids or grandkids to the beach, make sure they know that diving – even on a racing style slant – is an absolute NO. Don’t do it when you’re heading into the water from the beach . . . or after you’ve been out on one of those floating mats. In most cases there’s just no way to know if you’re diving into water that’s 10 feet deep or 2 feet deep. So please don’t do it.
“Normal” surf conditions can actually be the most dangerous
There are also more obvious threats when you head to Rehoboth, Dewey and Bethany, which usually have much bigger surf.
“I’ve seen it hundreds of times — people getting clobbered by a wave,” says Kent Buckson, former head of the Rehoboth Beach Patrol. “It happens a lot to people who wade out to waist-deep level. They see a giant wave coming and their automatic reaction is to turn and try to run. But you can’t outrun a wave, especially when you’re halfway underwater and running up a slope. It’ll catch you from behind and propel you into the sand.”
Dr. Paul Cowan, an emergency specialist at Beebe Healthcare, seconds that warning, and adds: “The energy from a three- or four-foot wave is similar to the energy from getting hit by a small compact car moving at 20 or 30 miles an hour.”
Intrigued by the problem, Dr. Cowan and his trauma registrar, Michelle Arford-Granholm worked with Jack Puleo and Matt Doelp from the University of Delaware on a research project to learn more about injuries in the “surf zone” where the waves tend to break.
According to the study, about 50 percent of the injuries recorded occurred to people who were simply wading in a few feet of water.
Turning your back on the ocean is apparently the riskiest thing one can do. Data from 2015 to 2017 shows that 72 percent of wading injuries happened when people were facing the shore.
Swim within sight of lifeguards, and check the daily beach forecast.
“Lifeguards are aware of the dangers of the surf zone because they have the training and experience and are out there every day,” Buckson says. “We use flags to post conditions throughout the day. Green means you don’t have a dangerous shore break. You’ve got gentle surf and small waves so you’re less susceptible to rip currents and surf-zone injuries. Yellow means there’s more moderate danger. Red is for the most dangerous conditions.”
On those red-flag days, Buckson says, the lifeguards strongly advise people not to enter the water.
Don’t dive at the ocean either.
As the waves rise and fall, it’s very difficult to determine how deep the water is. Heading into the water feet first is the smart way to go.
When a big wave is coming, duck and cover.
Trying to outrun a large wave is one way to get injured, Buckson says, but standing your ground and bracing yourself can be just as dangerous because your body will tighten up and probably still get knocked down. “You’re better off turning into the wave and going under it,” Buckson says, so that it passes over you.
Don’t ever turn your back on the waves. | https://blog.activeadultsdelaware.com/2022/06/14/stay-safe-in-the-surf-zone-and-on-the-bay/ |
Taking its cue from the question “Crisis compared to what?“ posed by the anthropologist Janet Roitman, the contribution will provide some preliminary hypotheses about the competing narratives that have been disseminated about the coronavirus pandemic and the Covid-19-crises. Arguing that pandemic stories can be conceptualized as crisis narratives, we will make an attempt to clarify what kind of crisis, or crises, we are currently witnessing when dealing with competing narratives of the coronoavirus pandemic. We will explore whether the latter can be understood less as just a health crisis but rather as a catalyst of a cluster of different crises, or as a ‘deep crisis’ with various dimensions and layers. Taking into consideration the contagious nature of narratives (Robert Shiller), we will argue that the competing crisis narratives surrounding the corona pandemic constitute not just an ‘infodemic’ but a fully-fledged epistemological and normative crisis and a crisis of prevailing forms of life.
Jim Phelan (Ohio State University): Donald J. Trump’s Storytelling, May 12—June 7, 2020; or, Can His Saying Make Things So?
This talk examines U.S. President Donald J. Trump’s storytelling over 27 days in spring 2020 in order to explore the ways in which his performances threatened to destroy the genre of nonfiction political narrative in the United States. The analysis of these 27 days is framed by a Preface, written from the perspective of January 2021 after the attack on the U.S. Capitol by those who believed Trump’s Big Lie that he won the 2020 presidential election—an attack indicating that Trump had almost succeeded in destroying the genre.
By the spring of 2020, Trump had all but eroded that genre’s foundations in referentiality, and his Republican supporters in Congress, in right-wing media, and in the electorate had allowed him to operate on the principle that “my saying makes things so.” The events of the spring of 2020, however, especially those accompanying the COVID-19 pandemic, provided the greatest resistance to that principle, because the virus was an extratextual reality that was indifferent to Trump’s rhetoric. The talk is itself an unfolding narrative, as it traces Trump’s storytelling about the pandemic, voting by mail, Barack Obama, and, toward the end of the period, about George Floyd’s murder and the protests that followed. This thick description of Trump’s performances does not end with a definitive judgment about the fate of the genre of nonfiction political narrative, but instead offers insights into the nature and relentlessness of Trump’s attack on that genre that in turn shed light on his Big Lie about the 2020 presidential election.
Recommended Reading: | https://www.uni-giessen.de/faculties/gcsc/gcsc/events/partner-events/accels-aachen/online-lecture-ansgar-and-vera-nunning-and-jim-phelan |
This is a showcase of the recent developments in Japanese Applied Linguistics.This book showcases recent developments in the field of Japanese Applied Linguistics.
It covers a wide range of current issues and influential theoretical and methodological frameworks, many of which are of concern not only for Japanese specialists but also applied linguists in general.
At the same time, the book provides empirical studies that exemplify how these issues and frameworks manifest themselves in contexts that surround first and second language speakers of Japanese.
The book is divided into four sections. The first examines language in action, providing a close analysis of language as it is used in interactions between speakers.
The second section looks at sociological diversity in Japanese speakers, considering factors such as gender, age, or background.
Section three explores how globalization has affected Japanese language use and acquisition.
The final section reflects on classroom teaching of Japanese language and culture.This comprehensive, in-depth study will be useful for researchers and graduate students in both applied linguistics and Japanese linguistics. | https://www.hive.co.uk/Product/Junko-Mori/Japanese-Applied-Linguistics--Discourse-and-Social-Perspectives/2435481 |
Spin Master Corp (TSE:TOY) – Investment analysts at National Bank Financial reduced their FY2020 EPS estimates for shares of Spin Master in a research report issued to clients and investors on Wednesday, March 4th. National Bank Financial analyst A. Shine now forecasts that the company will earn $1.22 per share for the year, down from their prior forecast of $1.59. National Bank Financial currently has a “Sector Perform” rating and a $26.00 target price on the stock. National Bank Financial also issued estimates for Spin Master’s FY2021 earnings at $1.58 EPS.
Get Spin Master alerts:
TOY has been the subject of a number of other research reports. BMO Capital Markets cut shares of Spin Master from an “outperform” rating to a “market perform” rating and dropped their price objective for the company from C$35.00 to C$20.00 in a report on Friday, March 6th. TD Securities lowered their price target on shares of Spin Master from C$43.00 to C$26.00 and set a “buy” rating for the company in a report on Friday, March 6th. CIBC lowered their price target on shares of Spin Master from C$36.00 to C$27.00 in a report on Friday, March 6th. DA Davidson cut shares of Spin Master from a “buy” rating to an “underperform” rating and lowered their price target for the stock from C$41.00 to C$20.00 in a report on Thursday, March 5th. Finally, Cormark lowered their price target on shares of Spin Master from C$33.00 to C$20.00 in a report on Friday, March 6th. One research analyst has rated the stock with a sell rating, four have given a hold rating and two have issued a buy rating to the stock. The stock has an average rating of “Hold” and an average target price of C$28.44.
Shares of TOY stock opened at C$15.02 on Monday. The company has a debt-to-equity ratio of 10.53, a quick ratio of 1.31 and a current ratio of 1.81. The stock has a market capitalization of $1.71 billion and a P/E ratio of 16.84. The company has a 50 day moving average price of C$30.09 and a 200 day moving average price of C$37.35. Spin Master has a fifty-two week low of C$14.25 and a fifty-two week high of C$46.61.
Spin Master Company Profile
Spin Master Corp., a children's entertainment company, creates, designs, manufactures, and markets various toys, games, products, and entertainment properties in North America, Europe, and internationally. The company sells toys and related products to retail customers and distributors, as well as online. | |
Centrum pro dokumentaci totalitních režimů, z.s. The Center for the Documentation of Totalitarian Regimes
The Center for the Documentation of Totalitarian Regimes was established to explore the history of the totalitarian and authoritarian regimes of the 20th century. CDTR wants to contribute to the preservation of historical memory and the protection of human rights.
CDTR activities include historical and archival research, oral history, academic and civic education, focusing on topics related to the existence of totalitarian and authoritarian regimes in the 20th century. It also focuses on practical cooperation with other similarly-oriented bodies at both a national and international level, organizing internal and public seminars, lectures and conferences, organizing campaigns and petitions, publishing and distributing printed and electronic publications, and also conducting advisory and consulting activities in the above-mentioned areas.
The CDTR runs three web sites: minulost.cz (an online portal for the documentation of totalitarian regimes), iBadatelna (the State Security documentation portal) and vons.cz (a website collecting information on the history of the Committee for the Defense of Unjustly Prosecuted People).
CDTR has no employees. It is a non-profit organization that is run in the free time of its members. | http://cultural-opposition.eu/registry/?lang=en&uri=http://courage.btk.mta.hu/courage/individual/n20871&type=groupsandorgs |
Darker Slate is an interactive puzzle mystery. Each chapter is like a new level of the game. The chapter advances the story, and at the end you will be presented with a puzzle of some kind. Simply type the correct solution into the form at the bottom and you will advance to the next level. You will find some levels harder than others, naturally. Some may even require you to flex your search engine skills. In some cases, there are hover notes at the bottom of the page on levels where the solution format is tricky. For every level, though, the solution will always be a combination of letters, digits, or both. Some levels refer to things from previous chapters, too, so write down anything you think might come in handy later on. You never know!
Each chapter has a difficulty rating. The higher the number, the harder the level is, relative to how well people perform on that level. The number is determined by dividing the fails by the successes. As you can see in this example, 96 divided by 5 is about 19.
Do I really have to read the story?
No, not really. Okay, we lied. Some chapters have clues in the story text. Be thankful the chapters are short.
What if I get stuck on a level?
If you get stuck on a level, you can always try to ask for clues in the Dead Drop. It is a general rule that you should never ask for the answer outright; as such, you should also never post an answer outright to any level. Posting the answers ruins the fun for everyone, much like posting spoilers to your favorite shows. | http://darkerslate.com/content/page.php?id=2 |
Intensity based methods for brain MRI longitudinal registration. A study on multiple sclerosis patients.
Registration is a key step in many automatic brain Magnetic Resonance Imaging (MRI) applications. In this work we focus on longitudinal registration of brain MRI for Multiple Sclerosis (MS) patients. First of all, we analyze the effect that MS lesions have on registration by synthetically eliminating some of the lesions. Our results show how a widely used method for longitudinal registration such as rigid registration is practically unconcerned by the presence of MS lesions while several non-rigid registration methods produce outputs that are significantly different. We then focus on assessing which is the best registration method for longitudinal MRI images of MS patients. In order to analyze the results obtained for all studied criteria, we use both descriptive statistics and statistical inference: one way ANOVA, pairwise t-tests and permutation tests.
| |
An experience-based co-design approach to develop an interactive toolkit for employers supporting stroke survivors to return to- and stay in work post-stroke
What we are doing?
We will be using an experience-based, co-design approach to develop an interactive toolkit to improve the support given by employers to stroke survivors during the return-to-work process and beyond. Various data collection methods (e.g., survey, interviews, workshops) will be used to gain perspectives from employer stakeholders, and to ensure the toolkit provides useful information and resources in an accessible format. We will also apply theory and evidence to identify and describe the toolkit’s potential mechanisms of change; and identify potential barriers and facilitators to future implementation.
Why we are doing it?
The number of working age stroke survivors is increasing, and many have disabilities. Employers are legally required to make reasonable adjustments for disabled employees, and clinical guidelines recommend they seek expert advice when an employee returns to work. However, organisations do not always have access to such advice. Research has shown that stroke survivors and their employers often lack knowledge and understanding of stroke and the return-to-work process. Employers often look online for advice, but online resources are often brief and often do not include materials to consolidate learning (e.g., case study examples, practical aids, pathway diagrams).
What the benefits will be and to whom?
Successful development and implementation of the toolkit could lead to employers being better equipped for supporting stroke survivor employees to return to- and stay in work post-stroke. Returning to- and maintaining working roles could provide stroke survivor employees with financial security, a sense of purpose and self-worth, and routine and structure to their daily lives.
The toolkit may also benefit organisations by encouraging implementation of best practice recommendations, potentially leading to reductions in sickness absence costs and improved productivity among stroke survivor employees.
Who we are working with:
Our advisory group includes experts in human resources, occupational health, rehabilitation medicine, research methodology, vocational rehabilitation; and business management. Group members also include stroke survivors and representatives from national organisations (e.g., Stroke Association, Different Strokes). We will also be seeking input from a Patient and Public Involvement group of stroke survivors at the University of Nottingham.
The stakeholder participants will include employers across private, public and voluntary sectors; with experience supporting stroke survivors to return to- and stay in work.
Contact
Kristelle Craven, PhD student, Centre for Rehabilitation & Ageing Research (CRAR), Medical School, University of Nottingham, [email protected]. | https://arc-em.nihr.ac.uk/phd-and-post-doc/toolkit-employers-supporting-stroke-survivors-return-and-stay-work |
Judgment: Apocalypse Survival Simulation is a colony simulation game with tactical combat and survival elements, developed by the Israeli indie company Suncrash. The game was initially released as alpha software on Steam Early Access on April 11, 2016, for Microsoft Windows. In Judgment: Apocalypse Survival Simulation the player controls a colony of survivors in an ongoing Apocalypse. After surviving an encounter with a demon, three survivors build a base in an isolated valley in order to resist the invasion and survive.
Gameplay
Judgment: Apocalypse Survival Simulation puts the player in control of a group of survivors with the ultimate goal to stop an ongoing Apocalypse. First, survivors need to eat, drink and sleep, and for that they build a sustainable base and defend it against demon attacks. The economy of the base is one of the most important parts of the game: survivors have to farm, mine, plant or scavenge different basic resources – and use them to build facilities, craft equipment, and research for technologies and magic. Survivors have different professions, making them more efficient in some tasks than others; they can also gain experience and level up to improve their skills. There are also different random events that serve as a sort of side missions, such as having to gather some resources in order to perform a ritual to remove a curse. In the end, victory can only be achieved by researching for a way to close the Hellgate that the demons are using to enter the world.
Apart from the colony management and economy simulation mechanics, Judgment: Apocalypse Survival Simulation features tactical combat, both going to combat missions to the outside world and defending the base against demon attacks. In the combat missions, the player sends a group of survivors to different locations in a randomly generated world map. The group of survivors can be equipped with melee and ranged weapons, armors and other items (such as Molotov cocktail or spells). In all the combat missions, the squad faces different types of demons, each with different combat styles, weaknesses, and strengths. Combat missions can be won by achieving their goals (for instance, rescuing a trapped survivor) or killing all enemies in the map. As is common in survival games, death is permanent. If all the survivors in a mission party die, the mission is lost. | https://raidofgame.com/2462-judgment-apocalypse-survival-simulation-download-pc.html |
This morning, the Food Bank of Delaware celebrated the culinary accomplishments of five students from its Culinary School at the Milford Branch.
The graduates are: David Cassey, Sarah Pearce, Jesmariely Perez, Eric Roberts and Troy Smith
Guest speaker for the occasion was Andrew Feeley, Executive Chef of Bluecoast Seafood Grill.
“That eight-inch plate is your palette. That is what you are presenting to the world. That is you,” he told graduates.
Under the instruction of Food Bank of Delaware Executive Chef Tim Hunter, the students have spent the past 14 weeks developing their skills and passion for the culinary arts. From proper knife handling techniques to ServeSafe® certification, the students are prepared for entry-level jobs in the food industry.
“I am confident that these graduates will find much success in Delaware’s food service industry,” said Hunter. “They have the skills and attitude needed to move up the career ladder. We wish them much success.”
In addition to learning hands-on skills in the food bank’s industrial-sized kitchen, the students also participated in a two-week internship, paid for by the Food Bank of Delaware. Internship sites included DiFebo’s, Lupo Italian Kitchen and Dover Downs.
Graduate Eric Roberts completed his two-week internship at Dover Downs. Upon completion, he was offered employment.
“I’ve been cooking all my life, but I wanted to know how to do things right,” he explained. “I learned a lot of things I didn’t know how to do, and I got my ServSafe certification. This is a good program, really a great program, and I would recommend it to anybody.”
Food Bank of Delaware President and CEO Patricia Beebe praised the students and their families.
“The Culinary School is incredibly important to the Food Bank of Delaware. When students ask what they can do to thank us, I tell them ‘just find a job and do well.’ The Culinary School enables us to develop adults for Delaware’s food service industry where they can make a sustainable wage to support themselves and their families. Our graduates can be very successful in this industry if they work hard. We are proud of all of today’s graduates.” she said.
Following today’s ceremony, guests were served a lunch prepared by the new graduates. The menu included barbeque chicken and ribs, grilled salmon, grilled corn on the cob, cornbread stuffing, collard greens and more.
The mission of The Culinary School is two-fold. First students are taught skills that are highly desirable to employers in the food industry and second, these newly-developed skills have the potential to lead to jobs in the industry that provide job security and economic sustainability.
Students are referred to the program through the Department of Corrections, Delaware Department of Labor, Delaware Division of Vocational Rehabilitation and other community-based organizations.
Students interested in applying for future classes, may sign up online by clicking here.
Congratulations, graduates! | https://www.fbd.org/food-bank-of-delaware-celebrates-eighth-graduating-class-at-the-milford-branch/ |
ecological succession definition
Geological and climatic catastrophes such as volcanic eruptions, earthquakes, avalanches, meteors, floods, fires, and high wind also bring allogenic changes. Updated March 13, 2018. The English word games are: It comprises few mites, ants and spiders living in the cracks and crevices. Additions to available species pools through range expansions and introductions can also continually reshape communities. When an important catastrophe will arrive, the opportunity for the pioneers will be open again, provided they are not absent at a reasonable range. The SensagentBox are offered by sensAgent. Gleason argued that species distributions responded individualistically to environmental factors, and communities were best regarded as artifacts of the juxtaposition of species distributions. Each square carries a letter. As succession continues, k-selected species begin to join the community and replace the original pioneer species. We Will Write a Custom Essay SpecificallyFor You For Only $13.90/page! According to classical ecological theory, succession stops when the sere has arrived at an equilibrium or steady state with the physical and biotic environment. The animal population increases and diversifies with the development of forest climax community. Most English definitions are provided by WordNet . Ecological equilibrium is reached when the community becomes stable and development ends. Seasonal succession is another type of succession, but instead of being the result of a disastrous event, it is caused by cyclical changes in the environment or interactions between the species in a community. It may not have been reviewed by professional editors (see full disclaimer), All translations of Ecological succession. ", “An association is not an organism, scarcely even a vegetational unit, but merely a coincidence.”. Contact Us The trajectory of successional change can be influenced by site conditions, by the character of the events initiating succession, by the interactions of the species present, and by more stochastic factors such as availability of colonists or seeds or weather conditions at the time of disturbance. | Last modifications, Copyright © 2012 sensagent Corporation: Online Encyclopedia, Thesaurus, Dictionary definitions and more. Succession is a scientific term describing the long-term progression of biological communities that occurs in a given area. How about receiving a customized one? Shade-tolerant species will invade the area. Depending on the substratum and climate, a seral community can be one of the following: Animal life also exhibit changes with changing communities. – Definition & Examples, What Is Succession in Biology? Succession of micro-organisms like fungi, bacteria, etc. Ecological succession was first documented in the Indiana Dunes of Northwest Indiana. Ecological succession was first documented in the Indiana Dunes of Northwest Indiana. Get XML access to reach the best products. Particularly common types of secondary succession include responses to natural disturbances such as fire, flood, and severe winds, and to human-caused disturbances such as logging and agriculture. Barring major disturbances, it will persist indefinitely. The idea of a climax community. Ecological succession is the same idea. When you are born, your learn to crawl, then walk and then run. Things in nature are usually neither white nor black, and there are intermediates. In some cases the new species may outcompete the present ones for nutrients leading to the primary species demise. Ecological succession breaks down into three fundamental phases: primary and secondary succession, and a climax state. Primary succession: Occurs in barren, soilless, uninhabited regions. The community develops in a new area that may not have been colonized previously or one that was previously colonized but has been severely damaged. The Historical Roots of the Nature Conservancy in the Northwest Indiana/Chicagoland Region: From Science to Preservation. Robbert Murphy sees a significantly ideological, rather than scientific, basis for the disfavour shown towards succession by the current ecological orthodoxy and seeks to reinstate succession by holistic and teleological argument. Smith, S. & Mark, S. (2006). This may create regeneration sites that favor certain species. It is an index of the climate of the area. Within an ecological community, the species composition will change over time as some species become more prominent while others may fade out of existence. Individuals in the climax stage are replaced by others of the same kind. It is then the opportunity for shade "tolerant" species to get established under the protection of pioneer. Once they have produced a closed canopy, the lack of direct sun radiation at soil makes it difficult for their own seedlings to develop. When these pioneers will die, the shade tolerants will replace them. There are "opportunistic" or "pioneer" species that produce great quantity of seeds that are disseminated by the wind, and therefore can colonize big empty extensions, and they are capable to germinate and grow under direct sun exposition. Find out more. Furthermore, each climax formation is able to reproduce itself, repeating with essential fidelity its development. It has a wide diversity of species, a well-drained spatial structure, and complex food chains. Email. A prisere is a collection of seres making up the development of an area from non-vegetated surfaces to a climax community. The Bulletin of the Torrey Botanical Club, Michael G. Barbour and William Dwight Billings (2000), an offensive content(racist, pornographic, injurious, etc. He first published this work as a paper in the Botanical Gazette in 1899 ("The ecological relations of the vegetation of the sand dunes of Lake Michigan"). Autogenic succession can be brought by changes in the soil caused by the organisms there. Ecological succession. As you develop and grow there are certain predictable changes that will occur, and they usually happen in a specific order. Some of these factors contribute to predictability of succession dynamics; others add more probabilistic elements. Succession that begins in new habitats, uninfluenced by pre-existing communities is called primary succession, whereas succession that follows disruption of a pre-existing community is called secondary succession. Ecological succession is the steady and gradual change in a species of a given area with respect to the changing environment. These are things like bacteria, moss, insects, and smaller plants. Secondary succession occurs when an area that has previously had an ecological community is so disturbed or changed that the original community was destroyed and a new community moves in. Give contextual explanation and translation from your sites ! Thus the species composition maintains equilibrium. The Indiana Dunes on Lake Michigan, which stimulated Cowles' development of his theories of ecological succession. He recognized that vegetation on dunes of different ages might be interpreted as different stages of a general trend of vegetation development on dunes (an approach to the study of vegetation change later termed space-for-time substitution, or chronosequence studies). The web service Alexandria is granted from Memodata for the Ebay search. This feed-back process may occur only over centuries or millennia. ○ Boggle. The fauna consists of invertebrates like slugs, snails, worms, millipedes, centipedes, ants, bugs; and vertebrates such as squirrels, foxes, mouse, moles, snakes, various birds, salamanders and frogs.
Bad Wolves - Zombie Lyrics
,
Ken Kwok Sister
,
Assassin's Creed Ii
,
Steven Brault Singing
,
Jason Lee 2020
,
Watch Iron Maiden: Flight 666
,
The A Team Series
, | http://minxfilms.tv/blog/ytnlnw0.php?c4b97b=ecological-succession-definition |
This brief guide discusses what Quality Function Deployment (QFD) is, its importance and benefits, its four phases, and some FAQs. Learn more about how an innovative mobile app software can help organizations optimize the QFD process.
Published 16 Jan 2023
Quality Function Deployment (QFD) is a proactive, focused approach used in taking the Voice of the Customer (VOC) into account and then carrying out effective responses to customer expectations and needs during the design and production stages. Initially considered a form of cause-and-effect analysis, QFD is an essential tool not just for quality management but also for planning.
Originally developed in Japan by Professors Yoji Akao and Shigeru Mizuno in the late 1960s while working for Mitsubishi’s shipyard, QFD was later adopted and widely used by other companies such as Toyota and its suppliers. Consequently, the methodology was introduced in the US during the late 1980s primarily by automotive companies and electronics manufacturers. It’s also commonly known as a basic Total Quality Management (TQM) tool, being used by organizations in the manufacturing and healthcare industries, among others.
The goal was to create a methodology that integrates customer satisfaction into a product before implementing its manufacturing process. This presents a more proactive approach than other methods of quality control that focus on fixing customer issues during or after manufacturing.
Usually, customer requirements are communicated in the form of qualitative terms such as “safe,” “user friendly,” “ergonomic,” and so on. For organizations to effectively develop a product or service, these qualitative terms from customers need to be translated into quantitative design requirements. This is where QFD comes in. By combining various matrices to form a comprehensive house-like structure called the “House of Quality”, manufacturers and production facilities can come up with a prioritized list of customer needs and a systematic process of integrating them into the design of the product or service.
Hence, organizations can then make better decisions after weighing customer requirements and considering how the products or services go against the competition in the market. How QFD helps in this aspect is that it provides the needed documentation for the overall decision-making process.
Now, how does this approach help organizations ensure the quality of their processes particularly in product development? To summarize, here are a few of the major advantages of using QFD:
Also known as the product planning matrix, the House of Quality (HoQ) is practically the most essential stage of the QFD. This is where every bit of detail must be taken into consideration, as it’s going to set the pace for the succeeding stages of the four-phase QFD. Further, HoQ serves as a primary graphical representation of the product planning and development process.
House of Quality Example | QFD Matrix
In general, there are 6 main rooms or areas inside the House of Quality. Apart from answering the question “How do I fill out a QFD?,” these rooms also give an overview of how to effectively use the House of Quality template:
Empower your team with SafetyCulture to perform checks, train staff, report issues, and automate tasks with our digital platform.
The 4 Phases of QFD
QFD enables cross-functional teams to collaborate and find a balance between customer needs and technical requirements. This is crucial in streamlining the way manufacturers and production facilities decide what kind of features or characteristics they should include in their products and services that customers will buy and value.
The comprehensive process of QFD is divided into 4 major phases: Product Planning, Product Development, Process Planning, and Production Planning. Each matrix or visual representation used under each of the 4 phases is related to the previous one. Let’s look into what happens under each stage.
In this stage, the House of Quality matrix is used to translate customer needs into design requirements. The Voice of the Customer (VOC) is gathered through conducting Focus Group Discussions (FGDs), interviews, and other similar methods. Then, feedback and insights from such customer requirements are lined up for design and product features considerations.
As this phase will help set the pacing of the entire QFD process, it’s important to cover various aspects as well. These include identifying the underlying—apart from the obvious, stated ones—customer requirements, characteristics of possible market offerings, and competitive opportunities. It’s also crucial to note that this stage is typically led by the Marketing department.
This phase enables the team to specify design requirements by identifying critical parts and assembly components. These are then based on the prioritized list of offering characteristics gathered in the Product Planning phase using the House of Quality matrix.
The third phase involves deciding on the design manufacturing and assembly process that best addresses the requirements discussed in the Product Development phase. Teams responsible for this aspect must be able to define the required operational guidelines, elements, and parameters.
The final phase is where process control methods are established, along with the production and inspection processes. These are key to ensuring that the characteristics are met and continuously undergo evaluation and improvement.
As mentioned in the Importance section of this brief guide, QFD is a more proactive approach in such a way that it aims to incorporate customer feedback during the initial stages of production and manufacturing processes. Also, most quality initiatives focus on minimizing or eliminating errors—human or machine-made—to produce maximum results and achieve zero defects. Unlike other quality management tools, QFD takes the extra step to ensure that design processes capture customer requirements—underlying or stated—toward positive experiences and valuable offerings.
The overall methodology of Six Sigma lies on the principle of gathering and integrating the VOC throughout an organization’s quality process. QFD is an effective tool to do so, as the first and most essential stage involved in it requires obtaining customer requirements using the House of Quality or product planning matrix.
As the principle and practice of Total Quality Management (TQM) must be present in every aspect of the organization, QFD provides ways to seamlessly integrate its best practices into every stage of the product development process. One of the main principles of TQM is Customer Focus, in which the comprehensive methodology of QFD is most applicable with its core emphasizing customer requirements in the production process.
Using technology in implementing quality processes and in improving process controls puts organizations at a great advantage. Having streamlined systems in place gives way for creating products and services that meet market demands and surpass customer expectations.
All these boils down to establishing a Quality Management System (QMS) and using a tool that can meet its demands. QMS software solutions such as SafetyCulture lets you monitor every stage of the manufacturing and production processes to check if it meets the customer and design requirements.
Empower your teams in ensuring proper QFD implementation by maximizing the following features of SafetyCulture:
Patricia Guevara
Patricia Guevara is a content writer and researcher for SafetyCulture. With her extensive content writing and copywriting experience, she creates high-quality content across a variety of relevant topics. She aims to promote workplace safety, operational excellence, and continuous improvement in her articles. She is passionate about communicating how technology can be used to streamline work processes, empowering companies to realize their business goals.
Benefits Since the primary purpose of gathering and maximizing the Voice of the Customer data is to ...
SATs are important because they help to ensure that the system works as expected and that the ...
Why are Management Practices Important? Various organizations face different challenges depending on... | https://safetyculture.com/topics/qfd/ |
The first years of school bring children into contact with many new demands, environments and relationships. Children’s experiences in these early years carry lasting implications for their educational trajectory (Hauser-Cram et al 2007). The transition to school can be even more daunting for children with additional health and developmental needs (AHDN) and their families. They can face additional challenges like fitting in with peers, and accessing necessary additional resources (Goldfeld et al 2012; Whiteford et al 2012).
With health and education closely intertwined, there are a myriad of ways in which additional needs can impact on children’s learning and engagement with school, with these influences operating right from the earliest yearsof schooling. Yet while there has been ample research on the medical and health care experiences of children experiencing additional health and developmental needs, the impact on their school functioning has generally been under-explored. This includes those factors that put them at less or more risk of school failure.
Children with additional health and developmental needs (also known as special health care needs) are those who have or are at an increased risk for a chronic physical, developmental, behavioural, or emotional condition, and who also require health and related services of a type or amount beyond that required by children generally (Newacheck et al., 1998). Additional needs include a wide variety of conditions, ranging from obesity and asthma to profound intellectual impairment, with a parallel broad range of possible presentations, levels of severity, and associated needs.
Further information about the prevalence and types of conditions experienced by children with additional needs is contained in another Australian Early Development Census (AEDC) research snapshot: Children starting schools with additional health and developmental needs: results from the 2009 Australian Early Development Census.
The research described in this snapshot aimed to understand what can help or hinder the transition to school for children with AHDN, through a narrative review of relevant literature.
Consistent with an ecological approach to child development, there was a mixture of influences identified ranging from the child’s characteristics to the environments in which they are operating, including numerous factors at the service-system level. The many protective factors identified suggest it is important to not only describe and respond to children’s limitations, but also to acknowledge the child’s capabilities and strengths as well as other protective factors operating at the family and service-system level so that these can be drawn on and developed to help them succeed.
Given the range of risk and protective factors that can be at play for any given child, provision of care based only on the child’s condition may be too restrictive. In contrast, a multidisciplinary approach tailored to the child’s individual circumstances may be more beneficial in supporting children with additional needs to thrive at school (Lollar et al., 2012; Janus, 2011).
The current state of the literature clearly suggests that many of the risk and protective factors are operating from the earliest experiences at school. Given that the transition period to formal schooling is a critical time that helps to shape long-term educational trajectories, it is important to address risk factors and promote protective factors early in children’s educational careers.
The review revealed a broad range of risk and protective factors, suggesting that there are many opportunities to intervene to promote better outcomes for these children.
Most research to date has focused on specific conditions rather than taking a broad non-categorical approach, that is, looking at children with additional needs collectively. However, the current findings suggest that there are generic risk and protective factors likely to be relevant across many condition types, and it may therefore be helpful for more research to examine interventions, outcomes and influences for children at this broader level of analysis.
Tools such as the AEDC provide a means to further explore the factors that contribute to optimal educational outcomes for children with additional needs.
The review highlights that the ways in which additional needs impact on a child’s functioning are very complex, suggesting the need for a clear conceptual framework to guide research in this area. A proposed conceptual model of the processes that can impact on school functioning for children with additional needs will be explored in further detail in the companion research snapshot titled: ‘Pathways through school for children with additional needs: A conceptual model’.
This research snapshot is derived from a literature review conducted within the AEDC research programme at the CCCH.
For further details
Published article details: Howell-Meurs, S., O’Connor, M., Kvalsvig, A., & Goldfeld, S. (2014). The school functioning of children with additional health and developmental care needs in the primary years: A literature review. Melbourne, Australia: Centre for Community Child Health.
For access to AEDC data please visit www.aedc.gov.au for details.
Additional sources
AEDC snapshots provide a brief and accessible overview of research being undertaken in relation to the AEDC. The Australian Government under the AEDC programme funded this project. For further up-to-date information and resources consult the AEDC website: www.aedc.gov.au
The Royal Children’s Hospital Centre for Community Child Health (CCCH) has been at the forefront of Australian research into early childhood and behaviour for over two decades. The CCCH conducts research into many conditions and common problems faced by children that are either preventable or can be improved if recognised and managed early. By working collaboratively with leaders in policy, research, education and service delivery, the Centre aims to influence early childhood policy and improve the capacity of communities to meet the needs of children and their families. | https://www.aedc.gov.au/resources/resources-accessible/research-snapshot-factors-that-help-or-hinder-children-with-additional-needs-to-succeed-at-school |
Health Service Specialist is responsible for Early Head Start (EHS) services to pregnant women through the delivery of prenatal information, supportive services, and home visits on the following subjects: fetal development, including the risks from smoking and alcohol; labor and delivery; postpartum recovery, including information on maternal depression, nutrition; and the benefits of breastfeeding and other community resources.
Essential Duties & Responsibilities: Identifies, recruits and enrolls pregnant women for participation in EHS; Assist pregnant women to access comprehensive prenatal and postpartum care, through referrals, immediately after enrollment in the program. Provide pregnant women and other family members, as appropriate, with prenatal education on fetal development (including risks from smoking and alcohol), labor and delivery, and postpartum recovery (including maternal depression). Maintains caseload of 16 pregnant women; visits each pregnant woman’s home for at least 60 minutes on a monthly following enrollment. Establishes trusting, nurturing relationships with pregnant women, and their families. Observes, assesses and documents each pregnant woman’s health, skills, behavior, and pregnancy development. Provides pregnant women with group socialization experiences opportunities. Serves as an advocate for pregnant women and as a liaison between women, the program, and the community at large. Integrates other components, i.e. health, nutrition, mental health, family and community engagement into home visit and other services support pregnant women. Encourage participation in the Policy Council meetings as well as socialization meetings, workshops, and other events or trainings. Enters pregnant women information and other required program information into the Child Plus system in a timely manner. Assist pregnant women with children's transition into EHS Home-based, Center-based or other child care programs, postpartum. Plan and implement lessons using program required curriculum and other resources. Conduct screening and developmental assessments and maintain written records of each visit; maintain current and accurate records on each pregnant woman. Exchange information and serve as a member of a trans-disciplinary intervention team. Participate in on-going in-service and educational development opportunities provided by the Agency. Perform other duties as assigned.
Requirements
Minimum Associate Degree (2-Year) in Early Childhood Education (ECE) /Child Development and two (2) years demonstrated experience working with infants/toddlers; must have a valid State of Ohio Driver’s License and transportation, as position requires significant and on-going travel; computer literacy; Summit County residency; fingerprint/background checks conducted.
Pay Rate
$17.31 p/hr., Pay Level 8 (2-Year Degree, ECE/Child Development)
Classification/FLSA
Regular, Full-Time, Non-exempt, 11-month work schedule
Postings Dates
08/19/2021 – CONTINUOUS UNTIL FILLED
SEND RESUME/APPLICATION TO:
Community Action Akron Summit – Human Resources Department
55 East Mill Street, Akron, Ohio 44308
Or, Email resume to [email protected]
NO PHONE CALLS. Applicants selected for an interview will be contacted. Applications/resumes are kept on file for 6-months. | https://www.ca-akron.org/jobs/health-service-specialist-home-visitor-services-pregnant-women |
On May 8, 2018, Chief Bankruptcy Judge Isicoff for the Southern District of Florida issued an opinion addressing the question: if a former debtor seeks damages or attorneys’ fees and costs from the IRS for violating the discharge injunction, is the former debtor first required to exhaust administrative remedies prior to seeking recourse from the bankruptcy court? The answer was yes, administrative remedies must be exhausted.
In re Thal, 09-12434 (Bankr. S.D. Fla. May 8, 2018) dealt with the above-issue as presented in two bankruptcy cases. In each, the IRS had filed priority and general unsecured claims in the debtors’ chapter 13 cases. Through their chapter 13 bankruptcy plans, the debtors paid the IRS’ priority claims in full, completed all other plan payments, and received discharges. Subsequently, the IRS served notices of intent to levy on each of the former debtors, and seized a portion of one debtor’s Social Security benefits and the other debtor’s tax refund. In response, the debtors filed motions for sanctions against the IRS for violation of the discharge injunction.
Violation of the Discharge Injunction: The bankruptcy court first held that the IRS’ collection efforts violated the discharge injunction provided by 11 U.S.C. § 1328(a). With respect to the first debtor’s case, the court dismissed the IRS’ argument against sanctions on grounds that it acted without knowing it was violating the discharge injunction. The court found the IRS had received notice of the debtor’s discharge when the debtor’s bankruptcy case was closed, and its interception of federal funds otherwise payable to the debtor was intentional, notwithstanding the argument that the act was not a deliberate decision to violate the discharge injunction.
Similarly, the court dismissed the IRS’ argument that it did not violate the discharge injunction in the second debtor’s case because priority taxes are non-dischargeable. The court found that the IRS’ claim had been discharged by payment in full under the debtor’s plan. Under Chapter 13 of the Bankruptcy Code, in order to confirm a Chapter 13 plan, a debtor must agree to pay all priority tax debt in full over the life of the plan. See 11 U.S.C. §§ 507, 1322(a)(2). Under Section 1238(a) of the Bankruptcy Code, a discharge is granted in a Chapter 13 upon completion of all plan payments. A Chapter 13 debtor who successfully obtains a discharge is relieved from further liability associated with the priority tax debt. Thus, the IRS’s actions violated the discharge injunction.
Punitive Damages and Return of Funds: One debtor requested punitive damages and attorneys’ fees arising from the violation. The second debtor sought a finding of contempt, return of his funds, and attorneys’ fees. The court held that it was authorized to grant some relief, but could not grant all relief requested without the debtors exhausting the administrative remedies established by applicable IRS regulations. Concerning the first debtor’s request, the court explained it had no authority to award punitive damages pursuant to 11 U.S.C. § 106(a)(3), a statute abrogating the United States’ sovereign immunity with respect to various provisions of the Bankruptcy Code but specifically carving out the court’s ability to award punitive damages against a governmental unit. As to the second debtor’s request for return of his funds, the court found it had authority to grant such relief without the need to pursue administrative remedies through IRS regulations, since the request was not a claim for damages under 26 U.S.C. § 7433.
Damages and Costs of Litigation: The court then turned to the crux of the opinion: that the debtors were required to exhaust their administrative remedies prior to petitioning the bankruptcy court for damages.
Section 7430 of the Internal Revenue Code (the “IRC”) allows the prevailing party in an administrative or court proceeding “brought by or against the United States in connection with the determination, collection, or refund of any tax, interest or penalty” under the IRC an award of reasonable administrative costs and reasonable litigation costs. Section 7430(b)(1), however, requires the prevailing party to first exhaust administrative remedies available within the IRS. Under Section 7433(a), a taxpayer may bring a civil action in district court for damages against the United States when the IRS recklessly, intentionally or negligently disregards any provision of the IRC or IRS regulations. Section 7433(e) provides that a taxpayer may petition the bankruptcy court to recover damage for any willful violation of the automatic stay or discharge injunction. Again, however, the plaintiff must have exhausted the administrative remedies available to it within the IRC. 26 U.S.C. § 7433(d). Further, because Section 7433(e) also provides that, other than an action under Section 362(k) of the Bankruptcy Code, the referenced petition is the exclusive remedy for recovering damages resulting from discharge injunction violations, the court found that Section 7433 applies to any claim for damages for violation of the discharge injunction, and exhaustion of administrative remedies is therefore required pursuant to Section 7433(d).
In sum, the court held that a party seeking damages from the IRS for violation of the discharge injunction must make any claim to the bankruptcy court, not the district court, and the claim can only be made after exhaustion of internal IRS administrative remedies. | https://gs-lawfirm.com/exhaustion-is-required-before-seeking-damages-from-the-irs-for-violating-the-discharge-injunction/ |
In this post I thought that it would be interesting to share some of my thoughts that I have been having recently around Resource Dictionaries (RD) and how they are structured. It is very easy to just put everything into your generic.Xaml or even into your app.Xaml files and let the designer run away with implementing their designs, but this is not too say that its the best way to roll.
From a developer prospective these files can become large very quickly and the result is a complete management headache when it comes to maintaining the styles, control and data templates. Its is also rather easy to allow this to happen as its in the Xaml and its what the designer produces, in effect its someone else’s responsibility. What is rather interesting and confusing at the same time is that Blend actually works very well when it comes to dealing with resources that are all in one file and it provides the designer with an easy way manage styles and templates. The other interesting thing about RD is that its actually at the heart of the Designer and Developer collaboration, its one of the areas where these two worlds collide. Therefore one of the ways in which we can help improve the workflow is to have a better understanding of RD and create some guidelines on how to best go about structuring them.
Unfortunately, even though RD are one of the core parts that make up the presentation layer there is very little information on best practices on how we should be doing this and why its important to get it right in order from which to have a good platform to move off from. Structuring RD in the wrong way can have rather serious performance problems.
There is a great article on the WPF Disciples pages providing very good advice on how to structure your RD and naming conventions, but I want to attempt to take it a little further. There are a number of different scenarios that I have come across and I am sure that there will be more along the way. These include; a POC application where this is built quickly and iteratively and requires a compelling UI but there is a high potential the application will not make it into production; themeable applications where a number of different themes can be applied to change the look and feel; and also applications that leverage 3rd party controls which have their own and sometimes rather interesting ways of how they are styled and templated. Each scenario is different but can be solved in the same way by using well structured RD to produce a clean, performant and easy to maintain application.
Ok, so how can we achieve a better structuring of the RD, help improve collaboration and provide a basic pattern and best practices in order to satisfy the different scenarios outlined above ?
Putting your RD in a separate project is the first thing to do, there are a number of advantages in doing this; but primarily this is about separation of concerns to help with workflow; and it helps to provide a blue print of a theme that can be reused over time.
In addition to the guidelines put forwards from the WPF list I am also going to add some more into the mix.
Suggested WPF Disciples Resources :-
BrushResources – solid brushes, linear gradient brushes and drawing brushes
ConverterResources – allows us to reference any of the converters by merging our resource dictionary with this file, rather than re-declaring our converters every time.
ImageResources – as above, allows us to declare an ImageSource once and reference it from anywhere.
TextResources -styles applied to textual elements (Hyperlinks, TextBlocks, etc.)
Additional Resources:-
Colours – for simple colours used as a swash for branding of clients colour palette.
DataTemplates – holds all the Data Templates used in the application.
Storyboards – holds all the Storyboard animations.
VectorGraphics – holds all the vectors graphics
CustomControls – holds styles and templates for those custom lookless controls
CommonControls- holds styles and templates for those common controls
Now the above list is not an exhaustive one and there is a high potential that this may change in the future but for now these provide a good platform from which to start. There are a number of ways in which you can slice and dice the RD used in your application some of which I will talk about shortly, but in general its best to think about the RD as a whole. The reason for this is that its best to see the Xaml assets as what constitutes your design and interaction of the UI that you are projecting onto the view for the user to experience. Therefore a change in the template or style means a complete new design. By thinking about them in a more holistic view as a the sum of all parts.
Therefore by splitting up the styles, templates etc into different high level RD categories provides the capabilities for the designers to work in an independent way and not have the constraints of working in the same project as the developers. The majority of times you will want to split out the RD into a separate project, and provide an area where they can create and design controls and elements. It also means that as they are working in a separate project they are completely separated from the developers but they are both working in the same solution.
What are those other views of RD that I mentioned earlier. Another potential way of looking at splitting up the RD is to break out the control templates and styles and place those into separate files. This will provide the ability to change the colours, font types etc and leave the control templates alone, which is great for those situations where you want to restyle the application and want to retain the layout of the controls. However, there are some problems with this approach; making significant changes to the style of controls will almost certainly mean that you will have to change the layout of the control, or building a custom control to handle the different styles; support in Blend for this type of structure is sub optimal in that it becomes more difficult to navigate and manage the styles and templates.
So why is it important to structure the RD in this way ? Why can they live all in the same Generic.Xaml file ? Is it the developer or the designer who owns the files ? How does this make my application more themeable ?
So those are a few of the questions which I have been asked about recently from both designers and developers, and they are all good questions and ones which i have also been thinking about hence my solution attempts to tackle these questions and provide a simpler implementation of how to use RD in your app.
One of the main problems with coming up with a good structure is the lack of guidance that is actually out there, plenty of high level information around some structure and naming conventions but no real information on the details. Rather frustratingly although we have gone head first into solving and building frameworks that address MVVM and come up with some notable solutions. It does feels like we have neglected an important area of the presentation layer.
What is rather interesting is how differently developers and designers perceive RD and this comes out in how they implement them in the app.
Developer : As a developer it is a natural and in the interest of best practices to split out each individual control so that each control is sat in its own RD.
Designer: As a designer its natural to think of all the controls at a higher level so that at set of individual controls contribute to the overall design of the app.
So as you can see neither side is right or wrong its their interpretation of RD which differs and this is natural as the different roles have different views and priorities on what is required to build the User Experience. What is interesting as well is that these opinions are skewed by the tools that they use and how they interpret and solve problems. The developer is very much focused on detail and implementation, mean while the designer is more interested in the higher level and the total experience of their design.
Therefore a combination of both these views seems to feel right where we split up the RD into a higher level categorisation with good naming conventions. This approach meets both parties needs and is Blendable allowing the designer to work in an environment which has a reduced reliance on the developer world and vice versa.
So I am hoping this that has made you think a little more about RD. In the next post I am going to talk more about how to implement the RD in your application and drill into the performance issues related to implementing RD and some sample code to help with guidance. | http://blogs.xamlninja.com/blend/resource-dictionaries |
Markis "Trunk" Smith is set to go to trial later this month in connection with an April 2009 armed robbery, a crime with a key witness placing him at the scene: the victim.
That victim had less than 10 seconds to look at the perpetrator, who wore a hat and pointed a gun less than 12 inches from his face outside a Pine Hills hair and nail studio.
This fleeting yet terrifying encounter prompted Smith's attorney, Roger Weeden, to ask the judge in the case for something highly unusual in Florida's criminal courts: a set of special jury instructions regarding eyewitness identification.
The instructions Weeden suggests would advise jurors to consider whether the witness had "adequate opportunity" and the "capacity" to observe the perpetrator. They would also be asked to look at factors such as stress or fright, the length of time the person was observed and any distractions occurring at the time.
"The probability of a misidentification and wrongful conviction would be significantly lessened by a special jury instruction on eyewitness identification," Weeden argued.
The Orange circuit judge handling the case, Walter Komanski, has not yet ruled on Weeden's motion but is intrigued by the idea, according to comments he made during a hearing Wednesday.
"If a jury instruction will aid and assist that process, should we not be looking to come up with something that might help the jury further analyze such eyewitness identification?" Komanski asked.
Komanski recalled a case he had last year in which three witnesses misidentified a woman named Malenne Joseph as the perpetrator in a 2007 property crime. Joseph was found guilty, and Komanski placed her in jail for three months before the verdict was eventually tossed out and the charge against her dropped.
But Joseph's case is just one local example of a larger problem with the flaws in eyewitness identification. The Innocence Project, a national organization working to free the wrongly convicted, says eyewitness errors are the No. 1 contributor to those convictions.
And the Florida Innocence Commission, headed by 9th Judicial Circuit Chief Judge Belvin Perry, has been studying the issue in light of a dozen people in Florida being released from prison after DNA testing proved they were innocent. Nationally that number is 266.
Perry would not comment on the Smith case but said it is an individual judge's discretion, and "depending on the facts of a particular case, special jury instructions on eyewitness identification may be warranted."
Eyes not always right
The credibility of eyewitness identifications has surfaced as a national issue around the exonerations. Weeden cited a comprehensive report out of New Jersey detailing eyewitness problems, and his suggested special jury instructions come from one of several other states using them.
In Florida, special jury instructions on this issue are extremely rare. Perry said he has seen a request for such instructions twice in his long career.
Last week's hearing in front of Komanski provided a glimpse at how the defense, the prosecution and the court consider introducing new jury instructions in response to a growing body of research that points to the fallibility of eyewitness identifications.
Assistant State Attorney Deborah Barra argued that standard jury instructions cover concerns about eyewitness identifications. She said the research cited by Weeden is geared toward law enforcement's ensuring the integrity of these identifications on the front end of a criminal case, not at the time it goes to a jury.
When Komanski asked her about the Joseph prosecution, Barra called it "an unfortunate mistake" and cited issues with the police investigation in that case.
"Those mistakes are few and far between, but they do happen," Barra said. "I think that's the nature of the criminal-justice system: that they do happen."
But Komanski responded, "If they do happen, is it not our obligation to come up with something that can if not eliminate certainly narrow and limit the number of mistakes that fall into that category?"
Weeden said many jurors do not necessarily know about the research done in this area. He encouraged the judge "to be ahead of the curve on this."
Misidentification common
Experts say that in 75 percent of the DNA exonerations in Florida and nationwide, innocent people were convicted, in part, because eyewitnesses were wrong.
Weeden says courts in other states have contemplated the problem with witness misidentifications and used special jury instructions similar to what he is proposing. Guidelines about such instructions also have been spelled out in federal-court rulings.
He wrote in his motion for the special jury instruction that "the state's case rests substantially if not entirely upon the witness testimony of the alleged victim,"
Barra, however, said one other witness aside from the victim identified Smith, who is charged with armed robbery with a firearm. The robbery occurred at 3:15 p.m. outside Jay's Pure Platinum Hair and Nail Studio.
According to an Orange County Sheriff's Office report, the victim went to the shop to get his hair cut when the perpetrator walked up to his driver's-side window, pointed a silver .38-caliber revolver at him and demanded the man's wallet "by the count of five" or he would shoot him.
The victim later identified Smith, 22, in a photo lineup using five other black males with similar characteristics, the report says.
Komanski plans to rule on the jury-instruction issue before Smith's trial Feb. 21. If he approves it, Weeden said he will likely request the instructions be used in other cases with critical witness-identification evidence.
The proposed instruction would ask jurors to consider that a witness can be wrong and honest at the same time.
"You don't have to believe that the identification witness was lying or not sincere to find the defendant not guilty," Weeden's proposed instruction reads. "It is enough that you conclude that the witness was mistaken in his/her belief or impression." | https://www.orlandosentinel.com/news/os-xpm-2011-02-13-os-witness-identification-jury-instru20110211-story.html |
The clock is ticking. Govt needs to walk the talk on personal taxes
Increased savings are not all that bad, which may lead to greater investment, output, employment and economic growth
The cut in corporate tax rates is a step towards making India an attractive investment destination. The reduction stoked expectations that there may be some relief on the personal tax front as well. Any such cut will result in increased cash flow among consumers, which in turn would spur demand -- at least in the short term.
The finance minister recently said the government is working on several measures to revive the economy and one among those is rationalisation of personal income tax rates.
All said, there are varying views on the interplay between lower personal tax rates and economic growth. Put two plus two together, that should increase consumer spending and boost growth. But it may not work exactly the same way as expected. Consumers, in turn, may decide to save more rather than spend, given the cautious state of affairs.
related news
Increased savings are not all that bad, which may lead to greater investment, output, employment and economic growth.
The government can consider bringing in some changes in the personal tax regime to accelerate consumer demand and spur growth.
At present, the basic exemption limit is Rs 2.5 lakh per annum and income between Rs 2.5 lakh and Rs 5 lakh is taxed at 5 per cent. Those in the income bracket of Rs 5-10 lakh are taxed at 20 per cent and those above Rs 10 lakh are taxed at 30 per cent rate. Further, surcharge is levied from taxpayers with an income of more than Rs 50 lakh. Accordingly, the maximum marginal rate of tax varies from 34.32 per cent to 42.74 per cent for income ranging from above Rs 50 lakh to Rs 5 crore and above.
The government could consider some favourable tweak in either the slab or the rate of income tax, which will help increase the net take home salary.
The 2019 Budget had introduced additional deduction of Rs 1.5 lakh for interest on loan for purchase of first residential property (subject to satisfaction of certain conditions). Given the current market situation, the government could consider extending this benefit to the second home buyers as well. Further, carving out the deduction for housing loan principal repayment from Section 80C and allowing it under a separate section is another option that could be considered.
Increasing the ceiling limit of deduction for interest on housing loan from the existing Rs 2 lakh to Rs 3 lakh will lead to additional investment in the real estate sector.
In addition, the government could increase deduction under Section 80C to Rs 2 lakh from the existing limit of Rs 1.5 lakh. This would provide more saving avenues for individual taxpayers.
There are other factors that play an influential role in the growth dynamics, namely global developments, NBFC liquidity squeeze, slump in real estate and automotive sectors, shift in the savings pattern of the workforce and the like. Let’s hope that measures taken by the government so far will bring back the economy to a position where we all want it to be. | |
Mitigating Risk, Advancing Innovation
DTCC Forum 2020
Trends Forging the Future in Resilience
The Building of a Cyber Resilient Financial Services Sector
Stephen Scharf, DTCC Chief Security Officer.
In 1962, Everett Rogers, an eminent American communications theorist and sociologist popularized the “diffusion of innovations” theory which explains how new ideas and technology spread. Included in this theory was the technology adoption life cycle, often referred to as the S-curve.
There are four stages which Rogers identified – innovation, syndication, diffusion and substitution – along with a typical period of hype early on, when a new technology is introduced. Only time will tell whether the hype around a new technology is justified, it is difficult to judge in the early stages whether the excitement is excessive.
Over several years, DLT has proven to be a good candidate for further adoption across the financial services industry, given the benefits the technology provides, such as strengthened identity measures, improvements in information preservation and data integrity, processing efficiencies and increased operational capacity. However, these value enhancements also come with security risks.
A number of guides, standards and best practices have been put forward to address DLT security concerns and these were recently highlighted in a DTCC white paper called “Security of DLT Networks.” The overarching message from the paper was that a reliable and comprehensive framework is needed around DLT security, irrespective of the use case and to promote long term adoption of the technology. By developing and adopting a principles-based framework, firms will be better positioned to identify potential weaknesses and regulators will benefit from a harmonized approach to evaluating DLT implementations.
We also underlined the importance of standards in the development of an industry-wide framework. DLT standards can:
To develop industry standards, four things need to happen. First, it is critical that industry participants collaborate in an open source environment, sharing best practices for DLT security. Second, we must collectively establish a temporary baseline for industry DLT security standard. Third, we must measure current baseline practices and identify potential areas for improvement. And finally, we must work toward industry agreement on security standards best practices, followed by wide adoption of the standards.
Given the current speed of digital transformation within financial services, we are advocating for a coordinated strategy around the development of a principles-based framework to identify and address DLT-specific security risks. As these risks apply across multiple critical infrastructures, these collaborative efforts must cross-sector and begin with a dialogue across the industry, including market infrastructures, DLT providers and market participants.
While DLT can provide many benefits to the financial services industry, the initial hype around it has been replaced by a more realistic view of the technology’s potential uses. Now, there is a general acceptance that, for DLT use to become more ubiquitous, progress needs to be made around a reliable and comprehensive security framework that further protects firms from risks and is based on industry wide standards. Once these measures are in place, DLT’s potential can be more widely realized.
This article first appeared in Fintech Futures on June 10, 2020. | https://www.dtcc.com/dtcc-connection/articles/2020/june/25/developing-industry-wide-standards-on-dlt-security-will-lead-to-wider-adoption |
Haddadin, Sami and De Luca, Alessandro and Albu-Schäffer, Alin Olimpiu (2017) Robot Collisions: A Survey on Detection, Isolation, and Identification. IEEE Transactions on Robotics, 33 (6), pp. 1292-1312. IEEE - Institute of Electrical and Electronics Engineers. ISSN 1552-3098.
Full text not available from this repository.
Abstract
Robot assistants and professional coworkers are becoming a commodity in domestic and industrial settings. In order to enable robots to share their workspace with humans and physically interact with them, fast and reliable handling of possible collisions on the entire robot structure is needed, along with control strategies for safe robot reaction. The primary motivation is the prevention or limitation of possible human injury due to physical contacts. In this survey paper, based on our early work on the subject, we review, extend, compare, and evaluate experimentally model-based algorithms for real-time collision detection, isolation, and identification that use only proprioceptive sensors. This covers the context-independent phases of the collision event pipeline for robots interacting with the environment, as in physical human–robot interaction or manipulation tasks. The problem is addressed for rigid robots first and then extended to the presence of joint/transmission flexibility. The basic physically motivated solution has already been applied to numerous robotic systemsworldwide, ranging from manipulators and humanoids to flying robots, and even to commercial products. | https://elib.dlr.de/117080/ |
Get the status of specific workflows.
Initiate a workflow for a particular entry directly from within the Laserfiche Client.
Retrieve workflow status and terminate a workflow for a particular entry directly from within the Laserfiche Client.
Trigger a workflow using data entered into a form outside of Laserfiche.
Note: Before using the code samples below, you may want to familiarize yourself with Workflow SDK basics in this whitepaper: Getting Started with the Workflow SDK (Visual C#). A Support Site account is required to access this white paper.
Scenario: Your organization has scheduled a particular workflow to run every evening to process invoices from a particular folder in Laserfiche. Every once in a while, an invoice will need to be processed and approved right away. You can add a button to your Laserfiche Client that, when clicked, will enable you to select a particular workflow from a list, and initiate it directly.
Select the document in Laserfiche that you would like to process with Workflow.
Click on the custom button in the toolbar to launch a form that lists all available workflows.
Select the workflow that you would like to run and click Start.
This workflow will then be initiated and the invoice processed.
Here is the code for generating a list of available workflows.
Here is the code for the Start button.
Scenario: You need to delete an invoice but you want to make sure it isn’t currently being used by a workflow. If you do notice that it is being used by a workflow, terminate that workflow instance before deleting the invoice. To do this, you can add a custom button to your Laserfiche Client which will display a list of all workflows currently processing this document and enable you to terminate each instance before deleting the invoice.
Select the document in Laserfiche that you would like to delete.
Click on the custom button in the toolbar to launch a form that lists the status of all the workflows that are currently using this document.
Select each of the workflows that you would like to terminate and click on Terminate.
The workflows will then be terminated and you can delete the document.
Here is the code to list the workflows that are using the selected entry.
Here is the code for the Terminate button.
Scenario: Every time a new employee is hired at your organization, the human resources department needs to e-mail that employee forms to fill out. Once the new employee fills out these forms, they need to be stored in the employee’s folder in Laserfiche. To streamline this process, HR staff can fill out a simple form and click a button to initiate a workflow that will create a new folder in the repository for the new hire and e-mail that person the required forms.
Create a shortcut on your desktop to the New Employee application.
Double-click on the shortcut to launch a form.
After filling out the First Name, Last Name and Email fields, click on Add Employee.
This initiates a workflow that will create a new folder in the repository for the new hire and e-mail him the required forms. The values that were entered in the fields are used as tokens in the workflow.
Here is the code for the Add Employee button. | https://www.laserfiche.com/solutionexchange/extend-workflow-functionality-with-the-workflow-sdk/ |
Minnesota Veterans Medical Research and Education Foundation
At Bristol-Myers Squibb, we are working to address significant unmet medical needs, including the mental health needs of our returning veterans.
Need
Combat veterans typically identify issues of moral injury, ranging from failing to prevent harm to wounding or killing others, as more distressing and a higher priority for treatment than threats to their own life or physical injury. Surprisingly, most Post-traumatic Stress Disorder (PTSD) treatments do not generally address those issues. A key strategy for getting returning veterans to begin treatment for PTSD is to develop alternative treatment options that they are more willing to use. For example, research tell us that soldiers and veterans are more apt to seek spiritual support from chaplains than from traditional mental health providers because of the stigma associated with conventional mental health services.
Project
Building Spiritual Strength (BSS) is an eight-session interfaith, manualized, spiritually integrated group intervention for trauma survivors, developed primarily with combat veterans in mind. Pastoral counselors are specially trained to implement and facilitate the process. The project will recruit 150 veterans with PTSD from the Greater Minneapolis/St. Paul area to participate in the eight-week intervention, during which they will receive mental health services from pastoral counselors in a non-stigmatizing community setting. At the end of the study, participants’ PTSD symptoms and their level of spiritual distress/moral injury will be reassessed. The BSS model addresses the need for outreach to veterans who won’t use conventional mental healthcare. It will also create a low-cost, sustainable alternative option for mental healthcare for veterans. | https://www.bms.com/about-us/responsibility/bristol-myers-squibb-foundation/our-focus-areas/veterans-mental-health-and-well-being/minnesota-veterans-medical-research-and-education-foundation.html |
I'm posting one puzzle, riddle, math, or statistical problem a day. Try to answer each one and post your answers in the comments section. I'll post the answer the next day. Even if you have the same answer as someone else, feel free to put up your answer, too!
Thursday, February 17, 2011
Ring Around the Marbles
A boy has four red marbles and eight blue marbles. He arranges his twelve marbles randomly, in a ring. What is the probability that no two red marbles are adjacent?
Posted by Michael Doherty at 1:59 PM
Labels: Math
2 comments:
I'll give you a hint, since no one's answered: It's close to 1/2.ReplyDelete
- Anonymous4/19/2011 12:02 AM
no chance... ring has no side at allReplyDelete
Leave your answer or, if you want to post a question of your own, send me an e-mail. Look in the about section to find my e-mail address. If it's new, I'll post it soon.
Please don't leave spam or 'Awesome blog, come visit mine' messages. I'll delete them soon after. | http://www.questionotd.com/2011/02/ring-around-marbles.html |
Cause and effect of unemployment Antigone Thesis Statements and Important Quotes Through Antigone the impossible is trying to become possible.
All five incorporate at least one of the themes in Antigone and are broad enough so that it will be easy to find textual support, yet narrow enough to provide a focused clear thesis statement. These thesis statements offer a short summary of Antigone by Sophocles in terms of different elements that could be important in an essay.
You are, of course, free to add your own analysis and understanding of the plot or themes to them for your essay. Using the essay topics below in conjunction with the list of important quotes from Antigone at the bottom of the page, you should have no trouble connecting with the text and writing an excellent essay.
Agency Versus Inaction in Antigone Ismene and Antigone vary greatly in their respective attributes, Ismene is breathtakingly beautiful, while Antigone is plain; Antigone is brave while Ismene is frightened. This difference manifests itself most brilliantly in the burial of Polynices. Antigone is willing to risk anything to have her brother buried with honor, while Ismene worries solely for the safety of her sister.
In the end of the play, Antigone even takes her life in her own terms. What can be said about the desire to make life happen, the ability to not sit idly by? Does Sophocles seem to advocate this position, despite the death of Antigone? The Function of the Chorus in Antigone For most plays, the role of the Chorus involves a small number of people, usually betweenwho make commentary on the unfolding events and serve as foreshadowers to the action to come.
They are usually apart from the action, yet also apart from the audience; they function best as Thesis statement on antigone and ismene uninvolved narrator.
However, in Antigone, the chorus breaks most literary conventions. Instead of being portrayed as a group of people, the chorus is merely one person, who aligns himself with the audience.
Why is this important? What feelings towards the play are created when the audience takes on the role of the chorus? Antigone and Sisterhood The rivalry between Ismene and Antigone is strong, because both girls are similar in age with very contrasting personalities.
Antigone is decisive, moody, brave and impulsive, while Ismene is beautiful, timid and beautiful. However, despite this fierce rivalry between the two sisters, when Creon is threatening Ismene with death and imprisonment if she does not stop her attempts to bury her brother, Ismene is quick to jump to her defense, stating that if Creon locks Antigone up, Ismene will simply take over and die alongside her for their treason.
Is their rivalry perhaps less fierce than expected because of their bond of sisterhood? Obviously, Antigone herself is a strong individual character, who is not willing to allow her brother to be dishonored, no matter what the cost is to her own body.
Creon is also a strong character, and while he knows the law and is convinced that he must follow it, he has sympathetic feelings for Antigone and tries to get her out of trouble.
In which ways are Creon and Antigone both destroyed by the power of the law? How do they try to get around the laws that have been set down by Creon, and in which ways do they fail at that attempt?
What is the meaning behind their failures? Tragedy in Antigone As the reader progresses through Antigone, it becomes obvious by the plot twists that the play is a tragedy at heart. However, to make the nature of the play even more clear, the Chorus appears halfway through the production to tell the audience that the tragedy has begun.
This statement proves the inevitability of the coming tragic events, and takes the pressure off of the characters to attempt to stop such things from occurring.
This list of important quotations from Antigone by Sophocles will help you work with the essay topics and thesis statements above by allowing you to support your claims. All of the important quotes from Antigone listed here correspond, at least in some way, to the paper topics above and by themselves can give you great ideas for an essay by offering quotes and explanations about other themes, symbols, imagery, and motifs than those already mentioned and explained.
Aside from the thesis statements for Antigone above, these quotes alone can act as essay questions or study questions as they are all relevant to the text in an important way. All quotes contain page numbers as well.
Look at the bottom of the page to identify which edition of the text by Sophocles they are referring to. I can say no to anything I say vile, and I don't have to count the cost.
But because you said yes, all that you can do, for all your crown and your trappings, and your guards—all that your can do is to have me killed.
I do not love Haemon! One smells of garlic, another of beer; but they're not a bad lot. They have wives they are afraid of, kids who are afraid of them; they're bothered by the little day-to- day worries that beset us all.
At the same time—they are policemen: They are quite prepared to arrest anybody at all, including Creon himself, should the order be given by a new leader. The hush when the executioner's ax goes up at the end of the last act. The unbreathable silence when, at the beginning of the play, the two lovers, their hearts bared, their bodies naked, stand for the first time face to face in the darkened room, afraid to stir.
The silence inside you when the roaring crowd acclaims the winner—so that you think of a film without a sound track, mouths agape and no sound coming out of them, a clamor that is not more than picture; and you, the victor, already vanquished, alone in the desert of your silence.The following thesis statement once upon a time served me well: A major theme of Antigone is the conflict between religious law and man-made law.
An interesting way of thinking about theme in Antigone is through an analysis of the contrast between Antigone and Ismene. A defensible thesis statement could be: Antigone is a proto-feminist.
I certainly think that there is much in way of validity in this thesis statement. It takes the approach that Antigone was essential in her actions because she was able to stand for principles. Nov 29, · Best Answer: Sorry to the first answerer, but they're wrong.
Creon was *the* tragic hero in Antigone. I did an essay on it I don't know what your teacher's like, but maybe something like, "Creon, King of Thebes, takes on the role of tragic hero as he descends from his self-righteous thoughts to realizing that he was wrong with Haimon and Eurydice's deaths."Status: Resolved.
Antigone vs. Ismene essaysAntigone is a tragic hero who believes in her moral duty to the gods over her duty to the state and is willing to suffer the consequences in order to do what is morally right.
Her sister Ismene, on the other hand, follows the laws of the state in attempt to stay out of any. Antigone is also pretty stubborn. That is kind of a good trait in a heroic sort of way but unfortunately her stubbornness gets herself in trouble but also risks other characters as well like Ismene and Haemon. | https://kudusopymu.pfmlures.com/thesis-statement-on-antigone-and-ismene-46159bf.html |
The Sales Planner is a key member of Condé Nast’s Sales Operations team, responsible for supporting advertising campaign activities from pitch through campaign wrap-up. This role is critical to the success of our campaigns, and is directly responsible in supporting activities such as analyzing reporting and buffering, pulling screenshots, and maintaining billing approvals.
Primary Responsibilities:
Desired Skills & Qualifications:
If you are interested in this opportunity, please apply below and we will review your application as soon as possible. Please note that due to the high level of applications we receive, it is not always possible for us to respond to each applicant in person. Should your profile fit this open position we will contact you within approximately 4 weeks. You can update your resume or upload a cover letter at any time by accessing your candidate profile.
C ondé Nas t is an equal opportunity workplace.
Duties and responsibilities may be adjusted based on years of experience.
Salary is also commensurate with experience. | https://www.peersight.mx/job/conde-nast-sales-planner-entertainment-media-in-new-york-ny |
4 Tips for Your New Nonprofit Liquidity Disclosure
Although financial professionals serving not-for-profit organizations still have time to prepare for implementation of the Financial Accounting Standards Board’s (FASB’s) new not-for-profit financial reporting standard, it’s important to consider and discuss the impacts of the new guidance with board members.
In June, we published a blog post answering common questions related to implementing the new liquidity disclosures required under the recently-issued not-for-profit financial reporting standard. This post discusses steps for making that implementation process smooth and effective.
The new standard requires not-for-profits to provide both qualitative and quantitative information about liquidity and availability of resources as follows:
- Qualitative information that communicates how the not-for-profit manages its available liquid resources to meet cash needs for general expenditures within one year of the balance sheet date.
- Quantitative information that communicates the availability of financial assets to meet cash needs for general expenditures within one year of the balance sheet date. The availability of a financial asset may be affected by its nature; external limits imposed by donors, laws and contracts with others; and internal limits imposed by governing boards.
When contemplating these disclosure requirements, not-for-profits should consider the following steps:
- Determine the message you want to convey to your stakeholders.
Does your organization have ample resources to fund activities over the next 12 months? If so, you may want to make that clear in the disclosure. On the other hand, perhaps your organization struggles to maintain sufficient resources to meet general expenditures. In that situation, you will want to make your related action plan clear. Some not-for-profits have significant capital projects that may have resources set aside to fund them. In those cases, consider discussing those resources and the anticipated timing of their use.
- Review your current procedures around board designation of net assets.
With the standard’s emphasis on board-designated net assets, organizations may wish to review and document their procedures for designating net assets, perhaps even creating a board designations policy if one does not already exist. It also may be a good time to revisit existing board designations to determine if they still make sense.
- Decide on the best presentation approach for your organization.
The guidance requires an organization to provide information about the availability of financial assets at the balance sheet date to meet cash needs for general expenditures within one year; however, there is no prescribed presentation for that information. The standard provides a few example disclosures, but they may not resonate with every not-for-profit. The Not-for-Profit Section offers example disclosures. Independent auditors may also have samples you can use as a starting point.
- Evaluate whether any changes to accounting and reporting systems will be necessary in order to easily capture information for disclosures.
Once you have determined how you want to present the required information, you’ll need to assess your supporting systems and technology to determine whether any changes or additions will be required to easily capture the information you wish to disclose.
No matter the size or complexity of your organization, consider starting the discussion now to prepare for implementation of the new liquidity and availability disclosures. Being proactive will boost efficiency internally and help to ensure your disclosures provide meaningful information to your financial statement users.
FASB’s new not-for-profit financial reporting standard is effective for annual financial statements issued for fiscal years beginning after December 15, 2017 and for interim periods within fiscal years beginning after December 15, 2018. Visit aicpa.org/nfp to learn more.
Karen Craig, CPA. Karen is a consultant providing technical accounting, reporting, finance and analytical expertise to not-for-profits with a focus on higher education. She volunteers on the AICPA Not-for-Profit Advisory Council and is an ex-officio member of the AICPA Not-for-Profit Industry Expert Panel. Karen also is a technical advisor to the Accounting Principles Council of the National Association of College and University Business Officers (NACUBO). | https://blog.aicpa.org/2017/09/4-steps-to-create-exceptional-liquidity-disclosures.html |
Genetic variants of CDH23 associated with noise-induced hearing loss.
Noise-induced hearing loss (NIHL) is a complex disease resulting from the interaction between external and intrinsic/genetic factors. Based on mice studies, one of the most interesting candidate gene for NIHL susceptibility is CDH23-encoding cadherin 23, a component of the stereocilia tip links. The aim of this study was to analyze selected CDH23 single nucleotide polymorphisms (SNPs) and to evaluate their interaction with environmental and individual factors in respect to susceptibility for NIHL in humans. A study group consisted of 314 worst-hearing and 313 best-hearing subjects exposed to occupational noise, selected out of 3,860 workers database. Five SNPs in CDH23 were genotyped using real-time PCR. Subsequently, the main effect of genotype and its interaction with selected environmental and individual factors were evaluated. The significant results within the main effect of genotype were obtained for the SNP rs3752752, localized in exon 21. The effect was observed in particular in the subgroup of young subjects and in those exposed to impulse noise; CC genotype was more frequent among susceptible subjects, whereas genotype CT appeared more often among resistant to noise subjects. The effect of this polymorphism was not modified by none of environmental/individual factors except for blood pressure; however, the latter one should be further investigated. Smoking was shown as an independent factor determining NIHL development. The results of this study confirm that CDH23 genetic variant may modify the susceptibility to NIHL development in humans, as it was earlier proven in mice. Because the differences between the 2 study groups were not necessarily related to susceptibility to noise but they also were prone to age-related cochlear changes, these results should be interpreted with caution until replication in another population.
| |
PROBLEM TO BE SOLVED: To enhance a target position setting function by a technology for extracting in-vivo information from a target position by utilizing digital-modulated continuous wave.
SOLUTION: A first digital modulating part 21 outputs a first digital-modulated continuous wave signal, and a second digital modulating part 22 outputs a second digital-modulated continuous wave signal. A multiplexing part 20 forms transmission signals obtained by multiplexing the first and second continuous wave signals. Delay circuits 27I and 27Q delay the first continuous wave signal by a quantity of delay corresponding to the depth of the target position, and output delayed reference signals. With these signals, a receiving mixer 29 extracts a receiving signal from a first target position. Delay circuits 28I and 28Q delay the second continuous wave signal by a quantity of delay corresponding to the depth of the target position, and output delayed reference signals. With these signals, a receiving mixer 30 extracts a receiving signal from a second target position.
COPYRIGHT: (C)2010,JPO&INPIT | |
*Infectious Disease Ecology: The Effects of Ecosystems on Disease and of Disease on Ecosystems*, Richard S. Ostfeld, Felicia Kessing, and Valerie T. Eviner (Editors), 2008, Princeton, NJ: Princeton University Press, 504 pp, ISBN13: 978-0-691-12484-1 (cloth), ISBN13: 978-0-691-12485-8 (paper) {#Sec1}
====================================================================================================================================================================================================================================================================================================
In the late 1960s, a number of prominent public health experts predicted the end of infectious diseases as a serious threat to mankind. Their optimism was based on successes from recently developed antimicrobial drugs, vaccines, and with infection control measures like improved public sanitation and regulating the food supply. Unfortunately, their hopeful forecast was short-lived. Soon there were epidemics caused by newly identified human pathogens, like *Legionella* and Ebola virus, and resurgent old ones like tuberculosis and malaria, often in forms resistant to previously effective antimicrobial drugs. The most catastrophic pathogen has been HIV-1, the major human immunodeficiency virus that causes AIDS. In approximately 25 years, it has spread throughout the world to infect more than 70 million people and cause approximately 35 million deaths. AIDS is now the fourth leading cause of death worldwide and accounts for about 25% of recent deaths in Africa (Kanki and Essex [@CR1]).
We have been asked to review the Ostfeld et al. ([@CR3]) text, *Infectious Disease Ecology: The Effects of Ecosystems on Disease and of Disease on Ecosystems*, through the lens of our recently published multi-authored text, *The Social Ecology of Infectious Disease* (Mayer and Pizer, [@CR2]). The primary unifying thesis of our book is that many, if not most, human epidemics are primarily potentiated by patterns and changes in human behavior, e.g., the sexual revolution facilitating the spread of HIV, or increased ease of international travel leading to major global influenza epidemics and the spread of SARS. The Ostfeld et al. ([@CR3]) text is grounded in basic biological ecology, focusing on physical environment-host-pathogen interactions, while the foundations of our perspectives are public health and sociobehavioral sciences, relying heavily on medical epidemiology as a core investigative tool. While a superficial read of the two texts might lead one to think they are completely different, they are in fact complementary. Both texts are looking for the fundamental factors in infectious diseases that impact the health of populations, and both seek to describe and explain the complex and active interplay of pathogens and hosts that occur in an ever-changing pattern of exposures to new hosts, pathogens, and vectors, and changing physical environments.
*Infectious Disease Ecology: The Effects of Ecosystems on Disease and of Disease on Ecosystems* is the product of the 11th biennial Cary Conference that convened in May 2005 to discuss the effects of ecosystems on infectious disease dynamics. Sixty-seven scientists from diverse backgrounds who are grounded in the modern discipline of ecology contributed to the book. It is divided into four parts that explore the effects of ecosystems on disease and disease on ecosystems, management and applications, and a final chapter by the editors that looks at the challenges that lay ahead. In contrast, our book (Mayer and Pizer, [@CR2]) is organized along the lines of the specific varied human activities that provide the most distinctive niches for microbes to flourish and spread.
One example from the two texts can help shed light on how these two books and their respective disciplines of ecology and public health inform each other. More than 75% of emerging human pathogens are zoonotic, i.e., transmitted to humans from other animals usually by vectors like mosquitoes and ticks. A myriad of human and animal activities (e.g., moving into new physical niches), plus factors like land and water use, and climate change affect the distribution and dispersal of vector populations which, in turn, influences pathogen prevalence and transmission, and ultimately infectious disease outbreaks in specific human populations. Lyme disease provides a good example of how this works. The causative agent is *Borrelia burgdorferi*, a spirochete that is typically transmitted to people by the bite of *Ixodes* ticks. While reports of *B. burgdorferi* infection in New England date back to at least the 1890s, it was not until the 1970s that Lyme disease became recognized as a significant public health problem. Michael Begon (Ostfeld et al., [@CR3]) uses Lyme disease to explore the question of whether having multiple hosts for a given pathogen will amplify or inhibit the potential spread of an infectious disease to humans. A variety of mammals and birds that live in the northeastern United States are known to serve as reservoirs for spreading *B. burgdorferi* to humans. Based on ecological studies of the incidence of Lyme disease in recent years, including a series of manipulative experiments with mammals, it appears that the risk of dissemination of this zoonotic infection to humans has been greater when there is relatively less diversity among potential host reservoirs. The full picture of which factors are most responsible for periods of increased clinical cases is quite complex, and many other ecological issues impact the intensity of Lyme outbreaks in humans. Examples include boom years in acorn production which can increase the number of deer reservoirs and thereby the number of ticks, and human behaviors such as the frequency of using tick repellant when working or playing outdoors in endemic areas.
In our book (Mayer and Pizer [@CR2]), infectious disease specialist, Gary Wormser, and vector researchers, Richard Falco and Thomas Daniels, discuss how suburbanizing the landscape worked to create a favorable environment for Lyme disease. From the 1950s onward, the suburbs grew 30% faster than the cities they surround. Farmland was rapidly replaced by clustered housing separated by parks and wooded areas. While the net amount of forest did not decrease significantly after World War II, the suburbanization created a new landscape of clustered homes separated by patches of wooded land. The ideal house in the suburbs has lawn in front and back for children and pets to play, and is situated at the end of a quiet cul-de-sac street that is surrounded by conservation land. While no doubt idyllic for young families, the suburban landscape design also put people, mammals, birds, and ticks in close proximity, thereby exposing them and their pets to the bite of ticks infected with *B. burgdorferi*. Without an effective vaccine, prevention so far has depended largely on public health education around personal protection activities and behavior modification. This means using repellant when outside and promptly removing ticks from people and pets. Despite public education efforts, the number of new cases of Lyme has been increasing steadily. It just is not practical to keep children and pets indoors during the summer, or always send them outside well-covered from head to toe and sprayed with DEET insecticide. Meanwhile, most suburban communities have been against public prevention strategies that could be aimed at controlling vectors and reservoir hosts, like widespread pesticide spraying and culling deer populations. Research shows that Lyme disease is driven largely by the abundance of nymphal *I. scapularis* (Ostfeld et al. [@CR3]). Looking ahead, it would seem that strategies for controlling Lyme outbreaks are likely to be informed by ecological studies such as those described by Begon in *Infectious Disease Ecology.*
There are other examples in this text of how basic ecology helps inform the public health approach to infectious disease outbreaks in humans. In Chapter 4, Johnson and Carpenter discuss consequences of eutrophication, which occurs when excessive nutrients, like nitrogen and phosphorous from sewage and fertilizer run off, produce plant overgrowth and decay. The algal blooms that result can adversely impact water quality and marine life, as well as create opportune environments for microbial pathogens to flourish that can cause human disease. Eutrophication has been associated with outbreaks of a type of allergic dermatitis ("swimmer's itch") that occurs when trematode cercariae invades the skin, as well as cholera and malaria. In addition to eutrophication, land clearing produces large numbers of temporary pools for mosquitoes to breed and spread malaria. On the other hand, if eutrophication is not abetted by other human influences, such as overwhelmed sewerage systems in developing world slums in mega-cities, or poor sanitation in public bathing areas, its sequelae may not result in appreciable clinical and public health problems.
To the modern ecologist, infectious disease outbreaks are inherent events that inevitably will occur and be structured by specific ecosystem dynamics. Basic research is needed to understand how and why pathogenic organisms, and the reservoirs and vectors associated with their spread to humans, are able to thrive in different environments. Although ecology is a theoretical discipline that does not focus principally on predicting the next emerging or reemerging pathogen or how it can be controlled, it is increasingly being applied to these questions and, over time, it will likely play a more important role in infectious disease control and public health planning.
| |
Panel Discussion: How Do We Stop Deforestation?
Apr 27 2020, 5:30pm UTC
Duration:
4144 mins
Presented by
Duncan Brack, Paola Despretz, Jon Shepard, and Yulia Stange. Introductions by Imad Ahmed
About this talk
Join the conversation as The Liberal International British Group, in partnership with The Paddy Ashdown Forum, welcomes four speakers with expertise in forestry to discuss their perspectives on the current state of deforestation, and strategies we must pursue if we hope to halt further destruction of critical forests. Viewers are encouraged to submit questions for the panelists. Duncan Brack is an environmental policy analyst focused on forest issues. He is an Associate Fellow at Chatham House, and an associate of Forest Trends. From 2010-12 he was Special Advisor to Rt Hon Chris Huhne, UK Secretary of State for Energy and Climate Change. Paola Despretz is an Economist working in the Earth Observation and Natural Resources practices at Vivid Economics. She has extensive experience in forestry and sustainable cocoa in West Africa. Paola leads Vivid's analytical and engagement work to deliver a real-time deforestation monitoring tool in Côte d'Ivoire and Perú. Her engagement work includes assisting the Ivorian REDD+ Secretariat in the design of its National Reducing emissions from deforestation and forest degradation + (REDD+) Strategy. Paola holds and MSc in Economics and Public Policy from Sciences Po Paris. Jon Shepard is a director at the Global Development Incubator. He is supporting the establishment of Emergent, a non-profit funded by Norway and the Rockefeller Foundation to catalyze the flow of private sector capital towards the protection of tropical forests at national scale through the issuing and sale of 'REDD+' carbon credits. Yulia Stange is Senior Manager of the Climate & Forests Programme at Client Earth, which works to improve forest governance, support forest legal refor, and reduce global trade in illegal timber. The programme also advocates for regulations that address the overseas impact of forest-risk commodities such as palm oil, soy, cocoa and beef, and strengthens forest provisions in EU free trade agreements.
Related topics:
Deforestation
Policy Compliance
Nonprofit
Economics
Sustainability
Conservation
Public Sector
Private Sector
Emissions
Environments
More from this channel
Environmental Issues
Upcoming talks (
0
)
On-demand talks (
1
)
Subscribers (
884
)
Tune in to hear the latest on environmental and climate change issues. | https://www.brighttalk.com/webcast/1035/396571?utm_campaign=communication_reminder_24hr_registrants&utm_medium=email&utm_source=brighttalk-transact&utm_content=socialbutton |
Tendencje rozwojowe polskich samogłosek nosowych
Author:
Zarębina, Maria
xmlui.dri2xhtml.METS-1.0.item-citation: Biuletyn Polskiego Towarzystwa Językoznawczego. Z. 34 (1976), s. -33
xmlui.dri2xhtml.METS-1.0.item-iso: pl
Subject:samogłoski nosowe
nosówki
Date: 1976
MetadataShow full item record
Abstract
The paper first has a brief review of recent publications concerning the phonetic, phonemic and statistical status of nasal vowels in colloquial Polish. The author then presents an investigation of the, nasal yowels in child language. Two methods of research have been employed: 1. Observation of recorded small talk, spontaneous utterances in the group of 30 children; 2. a repeating test conducted in a group of 7 children. We have only 6% nasal realizations and only several phonemes in spontaneous utterances. In the repeating test were found 55% nasal realisations, 62% for phonem ǫ, 18% for phonem ę. 100% for variants in the pre-fricatiye position. The author thus concludes that the child language has two potential phonemes in its inventory (/ǫ/) and (/ę/). The phenomena in the child language display indications on the one side of the same status as in the adults language and on the other side anticipate the same changes in colloquial Polish, i.e. the disappoaring of nasal vowel phonemes. | https://rep.up.krakow.pl/xmlui/handle/11716/1216 |
For this assignment, you will develop a hypothetical family case. The purpose of this project is to provide you with an opportunity to review and reflect on your clinical development of a case study. You will develop a genogram for this fictional family and choose from specific theoretical models, depending on your degree program. Your analysis needs to include theory-based interventions that align with the clinical model chosen.Your assignment will include three parts:Case overview with supporting genogram and pattern reflection.Theoretical model and interventions.Reflection.You will need to use and cite a minimum of eight scholarly resources from within the most recent 35 years (unless it is a seminal article). The length of the paper should be a minimum of 12 typed, double spaced pages.Case Overview With Supporting Genogram and Pattern ReflectionIn 12 pages, provide a general description of your created case, an identification of the clients, and any other presenting information that sets a context for the case and your work with it. Create a supporting genogram that aligns with the narrative for this hypothetical case. The case should include a family system and the genogram should include three generations. Be sure to identify who is attending the sessions in the case overview. When reflecting on the patterns of the genogram, you need to identify themes across the generation, such as marital patterns, educational and career patterns, patterns which started in different generations, and patterns which stopped in different generations. Discuss your ideas about the how the relationship qualities developed between the family members. How did personality traits and family values influence education and career choices? How did generations balance family and work?Theoretical Model and InterventionsLearners in the Marriage and Family Counseling/Therapy program need to choose from this list of theoretical models:Strategic family therapy, including the MRI and Milan models (theorists: Weakland, Jackson, Watzlawick, Haley, Madanes, Palazzoli, Boscolo, Cecchin, Prata).Intergenerational family therapy (theorist: Bowen).Structural family therapy (theorist: Minuchin).Learners in the Mental Health Counseling program need to choose from this list of theoretical models:Bioecological theory (theorist: Bronfenbrenner).Structural family therapy (theorist: Minuchin).Intergenerational family therapy (theorist: Bowen).After you have identified your choice of the theoretical model to use, complete the following:Identify the theoretical model you used, and provide a brief overview of the model. Include the theory of change, stance of the therapist, and founding theorists. It is important to use peer-reviewed references (from the most recent 35 years, unless it is a seminal article) to support your discussion of the theory; look for seminal articles written by the founding theorists.Include interventions that are used according to the model and provide questions you would ask during the therapy session. Include a discussion on these questions and how the interventions used relate to the theoretical model. For example, if you were using solution-focused therapy, you might ask the miracle question or a scaling question.ReflectionIn 12 pages, write a conclusion summarizing what you learned about yourself as a counselor or therapist. Address the following:How have you learned as a counselor or therapist to take care of yourself?What are some areas you recognize as strengths and challenges?When do you think it is important for a counselor or therapist to seek supervision?What will you do as a counselor or therapist to increase your own awareness of diversity when working with clients? Provide examples.What are some possible issues that may arise when working with a client from a different cultural background from yours?
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe. | https://acemyonlinecourse.com/2020/06/10/case-conceptualization-and-genogram/ |
Thermal detection cameras are designed to capture heat energy. The sensors on thermal detection cameras allow the user to view the otherwise invisible infrared spectrum, which exists at wavelengths between visible light and microwaves. In no light or low light environments, thermal sensors display warm areas at higher contrast with sharper clarity.
Cameras with thermal detection work best in darkness. Light may be detected at a depth of 1,000m in the ocean, but there is rarely any significant light beyond 200 meters. Subsea and underwater cameras offer options and features with integrated LEDs and LED light rings to assist in the detection abilities of these high performance, low light / no light cameras. | https://www.sidus-solutions.com/product-category/cameras/thermal/ |
Logistics Analysts are also known as logistics specialist coordinate and analyze the logistical functions or supply chain of an organization or a company. They look after the entire life cycle of a product, from purchase to distribution to internal allotment, release and final clearance of resources.
These professionals help their employers enhance performance by determining and reducing inefficiencies and checking the loopholes. Through their analysis, logistics analysts help streamline operations and identify the best way to use the company’s resources to achieve its goals.
Also, it is very important for Logistics analysts must have quantitative skills and must be familiar with logistics and production. Computer proficiency and knowledge of databases, statistics applications, spreadsheets and logistics programs are essential for this position. These professionals must be comfortable collaborating with other employees at different organizational levels so they can communicate findings, give recommendations and facilitate change effectively. Management skills are also necessary for this job.
Candidates wondering 'How to become a Logistic Analyst?' must meet the following requirements.
One must hold either a bachelor's degree or master's degree in the relevant field.
The degree must have been issued by a recognised university.
Requirements for the minimum percentage are not specified for this field.
Some of the relevant degrees are B.Com, BBA, MBA in Logistics and Supply Chain Management, MBA in Material Management, etc.
Step 1: Earn a Bachelor’s Degree
Candidates who are willing to make a career as a logistics analyst are required to have a bachelor’s degree in engineering, business management degree in engineering, business management, supply chain, mathematics or a related field.
Internships in the respective field can add an extra edge to the resume.
Step 2: Master’s Degree
To make a career as a logistics analyst you will be required to have a master’s degree in Supply Chain Management. Senior and executive-level positions typically require an advanced degree, additional work experience, or both.
To enhance your knowledge and skills in the field of supply chain management, professionals can be a part of various certificate and diploma course which will increase their employability.
To become a logistics analysts it is mandatory to have an MBA degree in Supply Chain and Management. A degree in supply chain and management can cost you between Rs.5,0,0000 to Rs.18,00,000.
There are numerous job roles available for logistics analyst as their skills are transferable from one sector to another. Some of the popular job roles for logistics analysts are as follows:
Logistics Consultant: Logistics Consultants help companies to optimize their warehouse activities. They also identifying solutions to increase efficiency, and monitoring supply chain performance.
Logistics Team Leader: Logistics Team Leaders supervise employees responsible for the storage and distribution of goods. A logistics team leader should have leadership qualities, attention to details should be able to manage the staff.
Logistics Manager: Logistic managers are responsible for planning and managing logistics, warehouse, transportation and customer services. They are also responsible for directing, optimizing and also coordinate order cycle.
Logistics Coordinator: Logistics Coordinator oversee and facilitate the supply chain operations in an organisation or the company they work. They will be the one to coordinate personnel and processes to achieve the effective distribution of goods. It is very important to have good communication and negotiation skills to become a logistics coordinator.
Material Manager: Materials manager’s job is to manage the inventory and purchasing procedures of raw materials and other supplies used in our company. They have experience in supply chain and inventory control
Shipping Manager: Shipping manager has to look after and manage daily shipping and distribution operations. They will be the one to ensure complete orders are shipped and delivered in a timely manner. A successful shipping manager is analytical, well-organized and excels in communication.Supply Chain Analyst: Supply Chain Analyst has to conduct data analysis to improve our supply chain operations. Their job is to increase the efficiency and reduce the costs of all the operations in an organisation.
The employment opportunities for Logistics Analysts are available worldwide. Some of the popular employment opportunities for logistic analyst are as follows:
Check out the top recruiting companies for logistics analysts and other related fields here:
The starting salary of a logistic analyst is between Rs.3,50,0000 to Rs 4,50,000. The potential salary of a logistic analyst may vary depending on location, professional experience, education and the type of organisation.
The salary packages are relatively better abroad as compared to India.
|Minimum Salary||INR 1.8 LPA|
|Maximum Salary||INR 4.2 LPA|
|Average Salary||INR 10 LPA|
|Salary in the US||INR 48 LPA|
Logistics and Supply Chain Management books are a great way to enhance your knowledge about the management and operations of the same. These books are helpful for logistics professionals at all levels. Some of the popular logistics and supply chain books are as follows:
The skills of logistics analysts are easily transferable which opens a lot of career choice for them.
There is a lot of capital involved in logistics. Therefore executive and top managerial job posts offer great salary packages and a promising career.
It is a great career choice for people who like to start and carry out projects.
Career as a logistics analysts is a great career choice for professionals who prefer desk job and enjoy working indoors.
It is hard to get into this career. A considerable amount of work-related skill and knowledge is required to be successful in this career.
The job of a logistic analyst is very hectic, sometimes they are required to work 40 hours a day.
This career is not for someone who enjoys travelling and helping others or society through their work. | https://www.collegedekho.com/careers/logistics-analysts |
Education Technology Specialist Master's Projects
Graduates of SUNY Oneonta's Educational Technology Specialist program have met the educational requirements to be recommended for professional teaching certification. They will also be eligible for initial certification as Educational Technology Specialists. Our online program builds upon initial skills and knowledge and further develops educational professional leaders who are committed to excellence, empowerment, diversity, and the best research based teaching practices. Students will gain a greater understanding of the teaching-learning process to develop skills in employing the most up-to-date technologies to enhance student performance.
Recent Submissions
-
The Effects of Explore Learning’s Math and Science Simulations on Student Engagement in a Rural High SchoolStudents across the nation struggle to build a conceptual understanding of scientific phenomena. The complexity of scientific concepts is difficult for students to understand, and students struggle to visualize the processes that are taught in science. New approaches that incorporate digital simulations can be used to enhance student learning of biological processes. However, more research is needed to understand how digital simulations can be used in the classroom to improve student engagement, and ultimately improve student learning. This qualitative study invited secondary teachers at rural high school who use Explore Learning’s digital simulations to teach math and science concepts. The teacher participants completed an online questionnaire which asked them to share their perspectives and opinions of Explore Learning’s simulations and how it effects student engagement. Findings suggest that Explore Learning Math and Science Gizmos increases student engagement. Based on these findings, the student researcher suggests that further research be conducted to test the effect Explore Learning's digital simulations on students' engagement when learning in math and science. | https://soar.suny.edu/handle/20.500.12648/8025 |
The B&W Tek BAC102 series E-grade probe is able to access frequency modes as low as 65cm-1. Access to lower frequencies provides key information for applications involving protein characterization, polymorph detection and identification, and material phase and structure determination. This article discusses how the low frequency E-grade probe can be a valuable asset in many applications including studying semiconductor lattices, carbon nanotubes, solar cells, and many kinds of minerals, pigments, and gemstones.
There are linear accelerators (LINACs) employed in radiation oncology that produce radiation in pulsed microseconds-long bursts, generated by the accelerator waveguide. By taking advantage of a LINAC’s inherent pulsed operation, time-gated detection of Cherenkov radiation is possible, significantly improving the ratio of signal to ambient light. Recently, a research group at Dartmouth College and Dartmouth-Hitchcock Medical Center in New Hampshire led by Dr. Brian Pogue has investigated fluorescence and absorption spectroscopy methods using pulsed LINAC-induced CES2, under ambient room lighting conditions. An overview of some of their work is provided in this application note.
Shifted Excitation Raman Difference Spectroscopy (SERDS) has proven an effective method for performing Raman analysis of fluorescent samples. This technique allows achieving excellent signal to noise performance with shorter excitation wavelengths, thus taking full advantage of the superior signal strength afforded by shorter excitation wavelengths and the superior performance, also combined with lower cost, delivered by silicon CCDs.
In this article, shifted excitation Raman difference spectroscopy (SERDS) implemented with two wavelength-stabilized laser diodes with fixed wavelength separation is discussed as an effective method for dealing with the effects of fluorescence in Raman spectroscopic analysis.
Raman spectroscopy is gaining intense interest as an analytical tool due to the strong specificity of the Raman signature of many materials. However, the Raman signal is often very weak and traditional slit spectrometers typically have poor optical throughput — mostly due to the slit itself. In this application note, we introduce the Apex spectrometer, the first product in the Elite Series of high-performance spectrometers, light sources and sampling accessories.
Plastic tubing is available in a variety of opacities ranging from clear to translucent. The transparency of plastic tubing is varied for a number of reasons including providing contrast for visual monitoring of fluid flow, decreasing exposure to ambient light and making the tubing more distinct for machine vision technology. In this application note, VIS-NIR transmission spectroscopy is used to assess the amount of frosting applied to plastic tubing to determine if the tubing meets the required opacity level.
Using a pulsed laser to create a surface ablation on a sample and then spectroscopically analyzing its elemental and molecular composition is known as Laser Induced Breakdown Spectroscopy (LIBS). This form of spectroscopy has been greatly helped with the advent of fiber optic spectrometers, as their flexibility has enabled the measurement of LIBS plasma in harsh or challenging environments. This application discussed the advantages of LIBS, and also explores different instruments that can be used in such an application.
Raman spectroscopy is experiencing a rapid increase in commercial and military application integration. There has been a large amount of commercial discussion regarding relatively low cost, low resolution single point (single fiber) spectrometers for handheld transportable applications, although only limited advancement of higher performance designs. By Jay Zakrzewski and Kevin Didona, Headwall Photonics, Inc.
Raman Spectroscopy provides convenient and rapid analysis for chemical sample identification, including alcohol and alcohol isomers. Its non-invasive measurement capabilities provide reliable and non-destructive testing in aqueous solutions, powders, gels, tablets, and surfaces. Additionally, there is no interference from water, and little to no sample preparation is required. This application note demonstrates how Ocean Optics modular Raman components differentiate between 10 different alcohol samples with similar molecular formulas. | https://www.photonicsonline.com/hub/bucket/spectroscopy-white-papers-and-case-studies?page=2 |
Welcome to Feature Artist Friday, a weekly segment bringing focus on the artists, creators and makers in our community.
Continuous circles, wheels turning and the unrelenting march of time; William Cares does something truly remarkable, taking very huge, very human experiences and makes them visually vulnerability. Playing with textures and familiar shapes, he creates pieces that are deeply emotional and create an instantaneous connection with it’s viewer. Read on to find out William’s inspirations, processes and a few life lessons. You can find William’s work on his Instagram @willcaresart and Email: [email protected]
He will also be at Ann Arbor Art Center for their Holiday Market December 8th 10-8 pm and December 9th 12-6 pm.
In my recent work I am exploring new methods and new materials. These artworks focus on process and often cross the boundary between painting and sculpture. The main “subject” of these works is the dialectic of seeming opposites. Some of these oppositions include 2D/3D, white/black (with all that those words convey about opposition and race as well), clockwise/counterclockwise, life/death, Western linear time / Eastern cyclical time, and future-focused / present focused.
In my Circle Series I have used this most “perfect” shape as a symbol for existence itself. I have loaded a flat stick with paint and attached the stick to the painting by means of a metal pin. The stick is then moved in a counterclockwise direction to apply the paint in a wide uneven swath, much like the sweeping hand of a clock, but I move in the opposite direction. The counterclockwise motion is significant, I am going counter to the direction of Western time, thus I am “turning back the clock” as it were.
In ancient Eastern models of time (Hinduism and Buddhism) there exists the “wheel of time” or Kalachakra, which represents time as cyclical, whereas most Western cultures view time (and thus life) more like a line or arrow, beginning at the left and moving to the right. In my fifties now, I am more aware of the passage of time and of the fleeting nature of existence. My father died in the Fall of 2015 and my mother is turning 85. My two children are grown men. As a teacher of Art, I have an acute sense of the tyranny of the clock, and of the need to be “timely” and future focused, yet I also feel a strong desire to slow the passage of time, to become more present in the now. This is largely due to the influences of Taoism, Zen Buddhism, and art making itself. The past is a memory and the future merely an illusion, all we really have is now.
Recent pieces have been made from textiles purchased at the Salvation Army Thrift Store. These textiles have been altered by draping, cutting, and/ or painting and pinned to the wall without stretcher bars, thus eliminating the typical presentation of paintings. My aim is to reference other uses of textile in our everyday lives such as clothing (robes), bedspreads, window curtains and the like to create works that function both as painted sculptures or sculptural paintings but with the echo of those other aspects of the materials from which they are made. The finished works speak of the missing human body, of loss, and death, dreams, and memories.
WANT TO BE A FEATURE?! Email Marisa ([email protected]) and tell me a bit about you and your work! Photos always appreciated; not limited to visual art! | https://www.riversidearts.org/feature-artist-friday-william-r-care/ |
---
abstract: |
An arc colored eulerian multidigraph with $l$ colors is rainbow eulerian if there is an eulerian circuit in which a sequence of $l$ colors repeats. The digraph product that refers the title was introduced by Figueroa-Centeno et al. as follows: let $D$ be a digraph and let $\Gamma$ be a family of digraphs such that $V(F)=V$ for every $F\in \Gamma$. Consider any function $h:E(D)\longrightarrow\Gamma $. Then the product $D\otimes_{h} \Gamma$ is the digraph with vertex set $V(D)\times V$ and $((a,x),(b,y))\in E(D\otimes_{h}\Gamma)$ if and only if $ (a,b)\in E(D)$ and $ (x,y)\in E(h (a,b))$.
In this paper we use rainbow eulerian multidigraphs and permutations as a way to characterize the $\otimes_h$-product of oriented cycles. We study the behavior of the $\otimes_h$-product when applied to digraphs with unicyclic components. The results obtained allow us to get edge-magic labelings of graphs formed by the union of unicyclic components and with different magic sums.
address:
- |
Departament de Matemàtica Aplicada IV\
Universitat Politècnica de Catalunya. BarcelonaTech\
C/Esteve Terrades 5\
08860 Castelldefels, Spain
- |
Graph Theory and Applications Research Group\
School of Electrical Engineering and Computer Science\
Faculty of Engineering and Built Environment\
The University of Newcastle\
NSW 2308 Australia
author:
- 'S. C. López'
- 'F. A. Muntaner-Batle'
title: Rainbow eulerian multidigraphs and the product of cycles
---
[**Keywords:**]{} rainbow eulerian multidigraph, eulerian multidigraph, direct product, $\otimes_h$-product, (super) edge-magic. **MSC:** 05C76 and 05C78.
Introduction
============
For the undefined concepts appearing in this paper, we refer the reader to [@W]. We denote by $C_n^+$ and by $C_n^-$ the two possible strong orientations of the cycle $C_n$ and by $\overrightarrow{G}$ any orientation of a graph $G$. Let $D$ be a digraph, we denote by $D^-$ the reverse of $D$, that is, the digraph obtained from $D$ by reversing all its arcs. According to this notation, it is clear that $({C_n^+})^-=C_n^-$.
An old result of Good (see for instance, [@RobTes05]) states that a weakly connected multidigraph $M$ has an eulerian circuit if and only if, for every vertex, indegree equals outdegree. Let $M$ be an arc labeled eulerian multidigraph with $l$ colors. We say that $M$ is [*rainbow eulerian*]{} if it has an eulerian circuit in which a sequence of $l$ colors repeats. Similarly, a [*rainbow circuit*]{} in $M$ is a circuit in $M$ in which a sequence of $l$ colors repeats.
Figueroa-Centeno et al. introduced in [@F1] the following generalization of the classical direct product for digraphs. Let $D$ be a digraph and let $\Gamma $ be a family of digraphs such that $V(F)=V$, for every $F\in\Gamma$. Consider any function $h:E(D)\longrightarrow\Gamma $. Then the product $D\otimes_{h} \Gamma$ is the digraph with vertex set $V(D)\times V$ and $((a,x),(b,y))\in E(D\otimes_{h
}\Gamma)$ if and only if $(a,b)\in E(D)$ and $(x,y)\in
E(h (a,b))$. The adjacency matrix of $D\otimes_{h} \Gamma$ is obtained by multiplying every $0$ entry of $A(D)$, the adjacency matrix of $D$, by the $|V|\times |V|$ null matrix and every $1$ entry of $A(D)$ by $A(h(a,b))$, where $(a,b)$ is the arc related to the corresponding $1$ entry. Notice that when $h$ is constant, the adjacency matrix of $D\otimes_{h} \Gamma$ is just the classical Kronecker product $A(D)\otimes A(h(a,b))$. When $|\Gamma |=1$, we just write $D\otimes\Gamma$.
A known result in the area (see for instance, [@HamImrKlav11]) is that the direct product of two strongly oriented cycles produces copies of a strongly oriented cycle, namely, $$\label{producte_directe_strong_cicles}
C_m^+ \otimes C_n^+\cong \hbox{gcd}(m,n)C_{\hbox{lcm}(m,n)}^+.$$
An extension of (\[producte\_directe\_strong\_cicles\]) was obtained by Ahmad et al. in [@AMR].
[@AMR]\[cicleALI\] Let $m, n\in \mathbb{N}$ and consider the product $C_m^+ \otimes_h \{{C_n^+, C_n^- }\}$ where $h:
E(C_m^+)\longrightarrow \{{C_n^+, C_n^- }\}$. Let $g$ be a generator of a cyclic subgroup of $\mathbb{Z}_n$, namely ${\langle{g}\rangle}$, such that $|{\langle{g}\rangle}|=k$. Also let $r<m$ be a positive integer that satisfies the following congruence relation $$m-2r\equiv g\ (mod\,\ n).$$
If the function $h$ assigns $C_n^-$ to exactly $r$ arcs of $C_m^+$ then the product $$C_m^+ \otimes_h \{{C_n^+, C_n^- }\}$$ consists of exactly $n/k$ disjoint copies of a strongly oriented cycle $C_{mk}^+$. In particular if gcd$(g,n)=1$, then ${\langle{g}\rangle}=\mathbb{Z}_n$ and if the function $h$ assigns $C_n^-$ to exactly $r$ arcs of $C_m^+$ then $$C_m^+ \otimes_h \{{C_n^+, C_n^- }\}\cong C_{mn}^+.$$
In this paper, we study $C_m^+\otimes_h\Gamma$, where $\Gamma$ is a family of $1$-regular digraphs. We characterize this product in terms of rainbow eulerian multidigraphs (Theorem \[Ahmad\_extension\]), which leads us to a further characterization in terms of permutations (Theorem \[Ahmad\_extension\_permutations\]). This is the content of Section 2. Section 3 is focused on applications to the product of unicyclic graphs and of graphs whose connected components are unicyclic graphs (Theorems \[producte\_uni\], \[producte\_uni\_amb\_permutacions\] and \[th\_charact\_decom\_suma\_unicyclics\]). Finally, in Section 3, we obtain (super) edge-magic labelings of graphs that are union of unicyclic graphs. One of them (Theorem \[generalizing\_McQ\_tm\]) generalizes a previous result found in [@McQ02]. We also construct families of graphs with an increasing number of possible magic-sums (Theorem \[versio\_complerta\_i\_magic\_sums\]).
Arc colored eulerian multidigraphs obtained from the product
============================================================
Let $\Gamma$ be a family of $1$-regular digraphs such that $V(F)=V$, for every $F\in \Gamma$. Consider any function $h:E(C_m^+)\longrightarrow\Gamma $. We denote by $M_h$ the eulerian multidigraph with vertex set $V(M_h)=V$ and arc set $E(M_h)=\cup_{e\in E(C_m^+)}E(h(e))$, including repetitions, that is, if $(x,y)$ is an arc in $r$ different digraphs $h(e)$, $e\in C_m^+$, then $(x,y)$ appears in $M_h$ with multiplicity $r$. An example is shown in Figure 1.
![A function $h:E(C_3^+)\longrightarrow\Gamma $ and the multidigraph $M_h$.[]{data-label="Fig1"}](Figura_1a "fig:"){width="150pt"}![A function $h:E(C_3^+)\longrightarrow\Gamma $ and the multidigraph $M_h$.[]{data-label="Fig1"}](Figura_1b "fig:"){width="124pt"}\
Assume that we color the arcs of $C_m^+$ using a set of $m$ different colors $\{s_1,s_2,\ldots, s_m\}$, in such a way that, we start by assigning color $s_1$ to some particular arc, and then, we apply the next rule: if the arc $e$ has color $s_i$ assigned then arc $e'$ receives color $s_{i+1}$, where the head of $e$ is the tail of $e'$. We proceed in this way, until all arcs have been colored. We will refer to that coloring as a coloring with color sequence $(s_1,s_2,\ldots, s_m)$. Thus, we obtain an induced arc coloring of the eulerian multidigraph $M_h$, in which the arcs related to $h(e)$ receive the color of $e$, for each $e\in E(C_m^+)$. Figure 1 shows the coloring of the multidigraph $M_h$ induced by a coloring of $C_3^+$ with color sequence (dash, line, dots).
\[main\] Let $\Gamma$ be a family of $1$-regular digraphs such that $V(F)=V$ for every $F\in \Gamma$, and $n=|V|$. Consider any function $h:E(C_m^+)\longrightarrow\Gamma $. Then, the digraph $C_m^+\otimes_h\Gamma$ is strongly connected, that is, is a strongly oriented cycle of length $mn$, if and only if, the eulerian multidigraph $M_h$ is rainbow eulerian with color sequence $(s_1,s_2,\ldots, s_m)$, when we consider the arc coloring of $M_h$ induced by a coloring of $C_m^+$ with color sequence $(s_1,s_2,\ldots, s_m)$.
By definition of the arc set, the digraph $C_m^+\otimes_h\Gamma$ is $1$-regular. Let $V(C_m^+)=\{a_1,a_2,\ldots, a_m\}$ with $E(C_m^+)=\{(a_i,a_{i+1})\}_{i=1}^{m-1}\cup \{(a_m,a_1)\}$, and with the arc $(a_i,a_{i+1})$ colored $s_i$, for $i=1,2,\ldots, m-1$, and with the arc $(a_m,a_{1})$ colored $s_m$. Assume first that $C_m^+\otimes_h\Gamma$ is a strongly oriented cycle of length $mn$. Let $v_1v_2\ldots v_{mn}$ be a hamiltonian path in $C_m^+\otimes_h\Gamma$. Without loss of generality assume that $\pi_1(v_1)=a_1$, where $\pi_1:V(C_m^+\otimes_h\Gamma)\rightarrow V(C_m^+)$ is the natural projection $\pi_1(a,x)=a$. By definition of the $\otimes_h$-product, we have that $\pi_1(v_r)=a_i$ if and only if $r\equiv i$ (mod $m$). Thus, for every $r$ and every $i$ with, $1\le r\le mn-1$, $1\le i\le m$ and $r\equiv i$ (mod $m$), the arc $(v_r,v_{r+1})$ is related to the arc $(a_i,a_{i+1})\in E(C_m^+)$ and an arc $(x,y)\in h(a_i,a_{i+1})$, where if $i=m$, the expression $(a_i,a_{i+1})$ should be replaced by $(a_m,a_1)$. Since every arc $h(a_i,a_{i+1})$ receives color $s_i$, we have that the arc $(v_r,v_{r+1})$ is related to the arc $(x,y)$ of $M_h$ colored with $s_i$. Therefore, the multidigraph $M_h$ contains a rainbow eulerian circuit, namely $\pi_2(v_1),\pi_2(v_2),\ldots, \pi_2(v_{mn})$ where $\pi_2(a,x)=x$, with color sequence $(s_1,s_2,\ldots, s_m)$. The converse is similar. Assume that $x_1x_2\ldots x_{mn}x_1$ is a rainbow eulerian circuit with color sequence $(s_1,s_2,\ldots,s_m)$. Without loss of generality, assume that $x_1x_2$ is colored using color $s_1$. Then, $x_rx_{r+1}\in E(h(a_ia_{i+1}))$, for every $r\equiv i$ (mod $m$). Hence, if we let $v_r=(a_i,x_r)$, where $ i\equiv r$ (mod $m$), we get a hamiltonian cycle $v_1v_2\ldots v_{mn}v_1$ in $C_m^+\otimes_h\Gamma$.
For instance, the digraph $C_3^+\otimes_h\Gamma$, where $h$ is the function defined in Figure 1, is a strongly oriented cycle of length $12$, since, as Figure 2 shows, we can find a rainbow eulerian circuit with color sequence (dash, line, dots). The arc labels denote the place that each arc occupies in the rainbow eulerian circuit when we start to follow the circuit with the arc labeled $1$.
![A rainbow eulerian circuit of $M_h$ with color sequence (dash, line, dots).[]{data-label="Fig2"}](Figura_2 "fig:"){width="124pt"}\
From the proof of Theorem \[main\] we also obtain the next result, which is a generalization of Theorem \[cicleALI\] in terms of the existence of rainbow circuits.
\[Ahmad\_extension\] Let $\Gamma$ be a family of $1$-regular digraphs such that $V(F)=V$ for every $F\in \Gamma$. Consider any function $h:E(C_m^+)\longrightarrow\Gamma $. Then, every rainbow circuit in $M_h$ with color sequence $(s_1,s_2,\ldots, s_m)$ corresponds to a strongly connected component of $C_m^+\otimes_h\Gamma$, when we consider the coloring of $M_h$ induced by a coloring of $C_m^+$ with color sequence $(s_1,s_2,\ldots, s_m)$.
Let $h,h':E(C_m^+)\rightarrow \Gamma$ be two functions with Im $h=$ Im $h'$, when Im $h$ and Im $h'$ are considered to be multisets. The next example shows that the relation $C_m^+\otimes_h\Gamma\cong C_m^+\otimes_{h'}\Gamma$ does not hold, in general.
\[Exemple\_h\_h’\] Let $\Gamma=\{F_i\}_{i=1}^3\cup\{F^-_1\}$, where $F_1,F_2$ and $F_3$ are the digraphs that appear in Figure \[Fig3\]. Assume that $E(C_4^+)=\{e_i\}_{i=1}^4$ and that the head of $e_i$ is the tail of $e_{i+1}$, for $i=1,2,3$. Consider the functions $h,h':E(C_4^+)\rightarrow \Gamma$ defined by: $h(e_1)=h'(e_1)=F_1; h(e_2)=h'(e_4)=F_2; h(e_3)=h'(e_3)=F_1^-; h(e_4)=h'(e_2)=F_3.$ Then, $$C_4^+\otimes_h\Gamma\cong C_{16}^++ C_8^+\hspace{0.5cm} \hbox{and}\hspace{0.5cm} C_4^+\otimes_{h'}\Gamma\cong C_4^++ C_{20}^+.$$
![The digraphs $F_1$, $F_2$ and $F_3$.[]{data-label="Fig3"}](Figura_3 "fig:"){width="316pt"}\
The next lemma, although it is fairly simple, will prove to be useful in order to obtain Corollary \[co\_weakly\_coonected\_components\].
\[reverse\] Let $K_2^+$ and $K_2^-$ be the two possible orientations of $K_2$. Then, the reverse of $K_2^+\otimes C_m^+$ is the digraph $K_2^-\otimes C_m^-$. In particular, $$\hbox{und}(K_2^+\otimes C_m^+)\cong\hbox{und}(K_2^-\otimes C_m^-).$$
Let $D=(K_2^+\otimes C_m^+)^-$. By definition $V(D)=V(K_2^+)\times V(C_m^+)$, that is, $V(D)=V(K_2^-)\times V(C_m^-)$, and $((a,x),(b,y))\in E(D)$ if and only if $((b,y),(a,x))\in E(K_2^+\otimes C_m^+)$. Thus, $((a,x),(b,y))\in E(D)$ if and only if, $(b,a)\in E(K_2^+)$ and $(y,x)\in V(C_m^+)$, that is, if and only if, $(a,b)\in E(K_2^-)$ and $(x,y)\in V(C_m^-)$. Hence, $((a,x),(b,y))\in E(D)$ if and only if, $((a,x),(b,y))\in E(K_2^-\otimes C_m^-)$. This proves the main statement. Therefore, the final statement trivially holds.
\[co\_weakly\_coonected\_components\] Let $\overrightarrow{C}_m$ be any orientation of a cycle $C_m$, and let $\Gamma$ be a family of $1$-regular digraphs such that $V(F)=V$ for every $F\in \Gamma$. Assume that $h:E(\overrightarrow{C}_m)\rightarrow \Gamma$ is any function. We consider the function $h^*:E(C_m^+)\rightarrow \Gamma\cup \Gamma^-$, where $\Gamma^-=\{F:\ F^-\in \Gamma\}$, defined by: $h^*(x,y)=h(x,y)$ if $(x,y)\in E(\overrightarrow{C}_m)$, or, $h^*(x,y)=h(x,y)^-$ if $(y,x)\in E(\overrightarrow{C}_m)$.
Then, every rainbow circuit in $M_{h^*}$ with color sequence $(s_1,s_2,\ldots, s_m)$ corresponds to a weakly connected component of $\overrightarrow{C}_m\otimes_h\Gamma$, when we consider the coloring of $M_{h^*}$ induced by a coloring of $C_m^+$ with color sequence $(s_1,s_2,\ldots, s_m)$ .
The key point is that und$(\overrightarrow{C}_m\otimes_h\Gamma)$=und$(C_m^+\otimes_{h^*}(\Gamma\cup \Gamma^-))$, since by Lemma \[reverse\], the digraph $\overrightarrow{C}_m\otimes_h\Gamma$ can be obtained from $C_m^+\otimes_{h^*}(\Gamma\cup \Gamma^-)$ by reversing the arcs related to the arcs in $E(C_m^+)\setminus E(\overrightarrow{C}_m)$. Then, the result holds by Theorem \[Ahmad\_extension\].
The induced product of permutations
-----------------------------------
A permutation $\pi$ is a bijective mapping $\pi: \{i\}_{i=1}^n\rightarrow \{i\}_{i=1}^n$. It is well known that a common way to describe permutations is by means of the product of mutually disjoint strongly oriented cycles, in which $(i,j)$ is an arc of an oriented cycle if and only if $\pi (i)=j$. Thus, every $1$-regular digraph on $V$ is identified with a permutation on the elements of $V$. This idea allows us to express Theorem \[Ahmad\_extension\] in terms of permutations.
Let $V(C_m^+)=\{a_1,a_2,\ldots, a_m\}$ with $E(C_m^+)=\{(a_i,a_{i+1})\}_{i=1}^{m-1}\cup \{(a_m,a_1)\}$ and let $\Gamma$ be a family of $1$-regular digraphs such that $V(F)=V$, for every $F\in \Gamma$, and $|V|=n$. Consider any function $h:E(C_m^+)\longrightarrow\Gamma $. Then, if we identify each element on $\Gamma$ with a permutation on $V$, we can consider the product of permutations $P_h=h(a_ma_1)\cdots h(a_2a_3)\cdot h(a_1a_2 )\in \mathfrak{S}_n,$ where $ \mathfrak{S}_n$ is the set of all permutations on the set $V$.
Let $h,h':E(C_4^+)\rightarrow \Gamma$ be the functions introduced in Example \[Exemple\_h\_h’\]. Then $$\begin{aligned}
P_h&=& h(e_4)h(e_3)h(e_2)h(e_1)=(1\ 5\ 4\ 6\ 3\ 2)(1\ 5\ 4\ 6\ 3\ 2)(1\ 6\ 5\ 4\ 3\ 2)(1\ 3\ 5\ 4\ 2\ 6)(1\ 2\ 3\ 4\ 5\ 6) \\
&=& (1\ 4\ 2\ 6)(3\ 5).\\
P_{h'}&=&h'(e_4)h'(e_3)h'(e_2)h'(e_1) = (1\ 3\ 5\ 4\ 2\ 6)(1\ 6\ 5\ 4\ 3\ 2)(1\ 5\ 4\ 6\ 3\ 2)(1\ 2\ 3\ 4\ 5\ 6)\\
&=& (1)(2\ 3\ 4\ 5\ 6).\\\end{aligned}$$ Thus, the products $(1\ 4\ 2\ 6)(3\ 5)$ and $(1)(2\ 3\ 4\ 5\ 6)$ are the disjoint cyclic decompositions (which are uniquely defined up to ordering) of $P_h$ and $P_{h'}$, respectively.
The following result is a generalization of Theorem \[cicleALI\] in terms of permutations.
\[Ahmad\_extension\_permutations\] Let $\Gamma$ be a family of $1$-regular digraphs such that $V(F)=V$ for every $F\in \Gamma$. Consider any function $h:E(C_m^+)\longrightarrow\Gamma $. Then, every cycle in the disjoint cyclic decomposition of $P_h$ corresponds to a strongly connected component of $C_m^+\otimes_h\Gamma$. Moreover if $\sigma$ is a cycle in the disjoint cyclic decomposition of $P_h$ then the corresponding strongly component of $C_m^+\otimes_h\Gamma$ has length $m$ times the length of $\sigma$. That is, $$C_m^+\otimes_h\Gamma\cong C^+_{m|\sigma_1|}+C^+_{m|\sigma_2|}+\ldots +C^+_{m|\sigma_s|},$$ where, the product $\sigma_1\cdots \sigma_{s}$ is the disjoint cyclic decomposition of $P_{h}$ and $|\sigma_j|$ denotes the length of $\sigma_j$, for $j=1,2,\ldots, s$.
Consider the coloring of $C_m^+$ with color sequence $(s_1,s_2,\ldots, s_m)$ that assigns color $s_1$ to $(a_1,a_{2})$. By Theorem \[Ahmad\_extension\], every rainbow circuit in $M_h$ with color sequence $(s_1,s_2,\ldots, s_m)$ corresponds to a strongly connected component of $C_m^+\otimes_h\Gamma$, when we consider the coloring of $M_h$ induced by the coloring of $C_m^+$. Since every rainbow circuit in $M_h$ can be obtained following a cycle in the product of permutations $h(a_ma_1)\cdots h(a_2a_3)\cdot h(a_1a_2 )$, we get that every cycle in the disjoint cyclic decomposition of $P_h$ corresponds to a strongly component of $C_m^+\otimes_h\Gamma$. Moreover, every element in this cycle represents the tail of the arc colored with $s_1$. Hence, the length of the strongly connected component is $m$ times the length of the cycle.
Note that, as a Corollary of the previous theorem we get Theorem \[cicleALI\]. The reason is that, using the notation introduced in Theorem \[cicleALI\], together with the idea of permutations, the product $P_h$ is a sequence of $m$ factors of the form $\{\sigma, \sigma^-\}$, where $r$ of them are $\sigma^-$. Thus, assuming that $m\ge 2r$ (the other case is similar), we get $P_h=\sigma^{m-2r}$. Hence, if $|{\langle{m-2r}\rangle}|=k$ in $Z_n$ then $P_h$ decomposes into $n/k$ disjoint cycles of length $k$. Therefore, by Theorem \[Ahmad\_extension\_permutations\], we obtain that $$C_m^+ \otimes_h \{{C_n^+, C_n^- }\}\cong \frac{n}{k}C^+_{mk}.$$
In order to conclude this section, we want to observe that so far, we have been using the theory of permutations in order to describe the behavior of the $\otimes_h$-product for $1$-regular digraphs. However, and although it is not the goal of this paper, it is worth to notice that this product can also be used in order to understand properties of the permutations.
(Di)graphs with unicyclic connected components
==============================================
Let $G=G_1+G_2+\ldots +G_l$ be a simple graph in which every $G_i$ is a connected component that contains exactly one cycle. Let $m_i$ be the length of the cycle in $G_i$ and let $\{a_j^i\}_{j=1}^{m_i}$ and $\{a_j^ia_{j+1}\}_{j=1}^{m_i-1}\cup \{a_m^ia_1^i\}$ be the vertex and edge sets of the cycle in $G_i$, respectively. Let $T_j^i$ be the tree attached at vertex $a_j^i$, where $|V(T_j^i)|\ge 1$. If $w_j^i\in V(T_j^i)$ is the vertex identified with $a_j^i$ then, we denote $G_i$ as follows: $G_i=(T_1^i (w_1^i), T_2^i (w_2^i),\ldots, T_{m_i}^i (w_{m_i}^i)).$
Using this notation, the graph $G$ can be described as a succession of tuples. Suppose that a component $G_i$ is of the form: $$G_i= (T_1^i (w_1^i), T_2^i (w_2^i),\ldots, T_{m_i}^i (w_{m_i}^i), T_1^i (w_1^i), \ldots, T_{m_i}^i (w_{m_i}^i),\ldots, T_1^i (w_1^i), \ldots, T_{m_i}^i (w_{m_i}^i))$$ where the sequence $(T_1^i (w_1^i), T_2^i (w_2^i),\ldots, T_{m_i}^i (w_{m_i}^i))$ repeats $k$ times. Then, we say that $G_i$ is a periodic component of multiplicity $k$. We denote such a component $$G_i=(T_1^i (w_1^i), T_2^i (w_2^i),\ldots, T_{m_i}^i (w_{m_i}^i)) ^k.$$
An example of this notation appears in Figure \[Fig4\].
![The graph $G=(P_1(w_1),P_2(w_2),P_3(w_3))^3$, where $P_s$ is the path of order $s$ and $w_3$ is the central vertex of $P_3$.[]{data-label="Fig4"}](Figura_4 "fig:"){width="153pt"}\
A useful result in order to study the union of acyclic graphs is due to Figueroa et al. [@F1].
[@F1]\[product\_of\_tree\] Let $F$ be an acyclic graph and let $\Sigma_n$ be the set of $1$-regular digraphs of order $n$. Consider any function $h:E(\overrightarrow{F})\rightarrow \Sigma_n$. Then, $\overrightarrow{F}\otimes_h\Sigma_n=n\overrightarrow{F}.$
The following lemma is an easy observation.
\[components\] Let $D=D_1+D_2+\ldots+D_l$ be a digraph where $D_1$, $D_2$,…, $D_l$ are the weakly connected components of $D$. Consider any function $h:E(D)\rightarrow \Gamma$, where $\Gamma$ is a family of digraphs such that $V(F)=V$ for every $F\in \Gamma$. Let $h_i=h_{|E(D_i)}:E(D_i)\rightarrow \Gamma$ be the restriction of $h$ over $E(D_i)$, for each $i=1,2,\ldots, l$. Then, $$D\otimes_h\Gamma\cong (D_1\otimes_{h_1}\Gamma)+\ldots +(D_l\otimes_{h_l}\Gamma).$$
As a corollary of Theorem \[cicleALI\] and Theorem \[product\_of\_tree\], together with Lemma \[components\] we get the next result.
\[producte\_uni\] Let $G=G_1+G_2+\ldots +G_l$ be a simple graph where each $G_i$ is of the form $G_i=(T_1^i (w_1^i), T_2^i (w_2^i),\ldots, T_{m_i}^i (w_{m_i}^i))$ and each $T_j^i$ is a tree. Consider $D=D_1+D_2+\ldots+D_l$ an oriented graph obtained from $G$ by considering strong orientations of all its cycles, where und$(D_i)=G_i$. Let $h:E(D)\rightarrow \{C_n^+, C_n^- \}$ be any function such that the restriction of $h$ over $E(D_i)$ assigns $C_n^-$ to exactly $r_i$ arcs of its cicle, for each $i=1,2,\ldots, l$. Then, $$und(D\otimes_h\Gamma)\cong \frac{n}{k_1}(T_1^1 (w_1^1), T_2^1 (w_2^1),\ldots, T_{m_1}^1 (w_{m_1}^1))^{k_1}+\ldots +\frac{n}{k_l}(T_1^l(w_1^l), T_2^l (w_2^l),\ldots, T_{m_l}^l (w_{m_l}^l))^{k_l},$$ where, for each $i=1,2,\ldots, l$, $k_i$ is the order of the subgroup of $\mathbb{Z}_n$ generated by $m_i-2r_i$.
By Lemma \[components\], it is enough to prove that if $G$ is of the form $(T_1 (w_1), T_2 (w_2),\ldots, T_{m} (w_{m}))$ then und$(D\otimes_h\Gamma)\cong n/k(T_1 (w_1), T_2 (w_2),\ldots, T_{m} (w_{m}))^{k}$, where $D$ is an oriented graph obtained from $G$ by considering a strong orientation of its cycle, namely $C_m^+$ and $h:E(D)\rightarrow \{C_n^+, C_n^- \}$ is any function. By Theorem \[cicleALI\], if the function $h_{|E(C_m^+)}:E(C_m^+))\rightarrow \{C_n^+, C_n^- \}$ assigns $C_n^-$ to exactly $r$ arcs of $C^+_m$ then $(C_m^+\otimes_{h_{|E(C_m^+)}}\{C_n^+, C_n^- \})\cong n/k C^+_{mk},$ where $k$ is the order of the subgroup of $Z_n$ generated by $m-2r$. Let $\overrightarrow{F}$ be the oriented digraph obtained from $T_1+ T_2 +\ldots+ T_{m}$ by considering the orientation induced by $D$. Assume that $V(C_n^+)=V(C_n^-)=\{i\}_{i=1}^n$. By Theorem \[product\_of\_tree\], we obtain that $\overrightarrow{F}\otimes_{h_{|E(\overrightarrow{F})}}\{C_n^+, C_n^- \}=n\overrightarrow{F}.$ Moreover, since each vertex $a_j\in V(C_m^+)$ is identified with a vertex $w_j\in V(T_j)$, we obtain that $(a_j,i)$ is identified with $(w_j,i)$, for each $i=1,2,\ldots, n$ and for each $j=1,2,\ldots,m$. Therefore, the desired result has been reached.
An extension of the previous result can be obtained by considering Theorem \[Ahmad\_extension\_permutations\], Theorem \[product\_of\_tree\] and Lemma \[components\].
\[producte\_uni\_amb\_permutacions\] Let $G=G_1+G_2+\ldots +G_l$ be a simple graph where each $G_i$ is of the form $G_i=(T_1^i (w_1^i), T_2^i (w_2^i),\ldots, T_{m_i}^i (w_{m_i}^i)).$ Consider an oriented graph $D=D_1+D_2+\ldots+D_l$ obtained from $G$ by considering strong orientations of all its cycles, where und$(D_i)=G_i$. Let $\Gamma$ be a family of $1$-regular digraphs such that $V(F)=V$ for every $F\in \Gamma$. Consider any function $h:E(D)\longrightarrow\Gamma $. Denote by $C^+_{m_i}$ the cycle of $D_i$ and $h^c_i=h_{|E(C^+_{m_i})}:E(C^+_{m_i})\rightarrow \Gamma$ the restriction of $h$ over $E(C^+_{m_i})$. Then, $$und(D\otimes_h\Gamma)\cong \sum_{i=1}^l\sum_{j=1}^{s_i}(T_1^i (w_1^i), T_2^i (w_2^i),\ldots, T_{m_i}^i (w_{m_i}^i))^{|\sigma_j^i|},$$ where, for each $i=1,2,\ldots, l$, the product $\sigma_1^i\cdots \sigma_{s_i}^i$ is the disjoint cyclic decomposition of $P_{h^c_i}$ and $|\sigma_i^j|$ denotes the length of $\sigma_j^i$.
The proof is similar to the proof of Theorem \[producte\_uni\]. The only difference is that we use Theorem \[Ahmad\_extension\_permutations\] instead of Theorem \[cicleALI\].
One of the goals in [@LopMun13a] was the characterization of the existence of a nontrivial decomposition of a graph in terms of the $\otimes_h$-product. The next result is a contribution in this direction when we apply the product over and over again to digraphs. Moreover, this result can be though as the converse of Theorem \[producte\_uni\].
\[th\_charact\_decom\_suma\_unicyclics\] Let $l,m,n$ and $s$ be nonnegative integers, such that, $m\ge 1$, $n\ge 3$ is odd and if $m$ is odd then $m\ge n$. Let $G=(T_1(w_1),T_2(w_2),\ldots, T_m(w_m))$ be a unicyclic graph with a cycle of length $m$ and $D_1$ be an oriented graph obtained from $G$ by considering a strong orientation of its cycle. Assume that $(a_0^l,a_1^l,\ldots, a_l^l)$ is any sequence of nonnegative integers such that, $a_0^0=n$ when $l=0$, $$\sum_{i=0}^{l}\frac{a_{i}^l}{n^{l-i}}=n \ \hbox{and}\ \sum_{i=0}^k\frac{a_{i}^l}{n^{k-i+1}}\in \mathbb{Z}^+,\ \hbox{for each}\ k=0,1,l-1,\ \hbox{when}\ l\ge 1.$$ Then, there exists a sequence of digraphs $D_i$ and a sequence of functions $h_i: E(D_i)\rightarrow \{C_n^+,C_n^-\}$, $i=1,\ldots, l+s+1$, such that $D_{i+1}=D_i\otimes_{h_i}\{C_n^+,C_n^-\}$, $$G^{n^{s}}\cong \hbox{und}(D_{s+1})\quad \hbox{and}\quad \sum_{i=0}^la_i^l G^{n^{s+i}}\cong \hbox{und}(D_{l+s+2}).$$
If $m$ is odd we define $r_i=(mn^{i-1}-1)/2$. Otherwise, we define $r_i=(mn^{i-1}-2)/2$. In both cases, the subgroup of $\mathbb{Z}_n$ generated by $mn^{i-1}-2r_i$ is $\mathbb{Z}_n$. Similarly, if $m$ is even we define $r'_i=mn^{i-1}/2$. Otherwise, we define $r'_i=(mn^{i-1}+n)/2$. Thus, the subgroup of $\mathbb{Z}_n$ generated by $mn^{i-1}-2r'_i$ is the trivial subgroup.
We construct $h_i$ and $D_{i+1}$ recursively as follows, for $i\ge 1$. Let $h_i: E(D_i)\rightarrow \{C_n^+,C_n^-\}$ be any function such that ${h_i}_{|E(C_{mn^{i-1}}^+)}:E(C_{mn^{i-1}}^+)\rightarrow \{C_n^+,C_n^-\}$ assigns $C_n^-$ to exactly $r_i$ arcs of $C_{mn^{i-1}}^+$. Define $ D_{i+1}=D_i\otimes_{h_i}\{C_n^+,C_n^-\}$. By Theorem \[producte\_uni\], we obtain that und$(D_{s+1})\cong G^{n^s}$. Thus, the first part of the statement holds.
Let $h_{s+1}: E(D_{s+1})\rightarrow \{C_n^+,C_n^-\}$ be any function such that ${h_{s+1}}_{|E(C_{mn^s}^+)}:E(C_{mn^s}^+)\rightarrow \{C_n^+,C_n^-\}$ assigns $C_n^-$ to exactly $r'_{s+1}$ arcs of $C_{mn^s}^+$. By Theorem \[producte\_uni\], we obtain that und$(D_{s+2})\cong nG^{n^s}$. Hence, the result holds for $l=0$. From now on, assume that $l\ge 1$. We will prove by induction on $l$ that there exists a sequence of digraphs $D_{i+1}$ and a sequence of functions $h_i: E(D_i)\rightarrow \{C_n^+,C_n^-\}$, $i=s+2,\ldots, l+s+1$, such that $D_{i+1}=D_i\otimes_{h_i}\{C_n^+,C_n^-\}$ and $$\label{formula _D}
\hbox{und}(D_{l+s+2})\cong \sum_{k=1}^{l} \left(n\sum_{t=1}^kj_t^{l-k+t}-\sum_{t=1}^{k-1}j_{t}^{l-k+t+1}\right)
G^{n^{k+s-1}}+\left(n-\sum_{k=1}^lj_k^k\right)G^{n^{l+s}},$$ where $\{j_1^1, j_1^2,j_2^2,\ldots,
j_1^l,j_2^l,\ldots, j_l^l\}$ is a set of nonnegative integers, and we let $\sum_{t=1}^{0}\alpha (t)=0$, for any expression $\alpha (t)$ depending on $t$.
Let $h_{s+2}:E(D_{s+2})\rightarrow \{C_n^+,C_n^-\}$ be any function that assigns $C_n^-$ to exactly $r'_{s+1}$ arcs of $C_{mn^{s}}^+$ to $j_1^{1}$ weakly connected components with a cycle of length $mn^{s}$ and that assigns $C_n^-$ to exactly $r_{s+1}$ arcs of $C_{mn^s}^+$ of the remaining weakly connected components with a cycle of length $mn^{s}$. Then, by Theorem \[producte\_uni\], we have that: $
\hbox{und}(D_{s+3}) \cong nj_1^{1}G^{n^{s}}+\left(n-j_{1}^{1}\right)G^{n^{s+1}}
$. Thus, formula (\[formula \_D\]) holds for $l=1$. Suppose now that these sequences of digraphs and functions exist for $l$. We have to prove that also exist for $l+1$. Let $h_{l+s+2}:E(D_{l+s+2})\rightarrow \{C_n^+,C_n^-\}$ be any function that assigns (i) $C_n^-$ to exactly $r'_{s+k}$ arcs of $C_{mn^{s+k-1}}^+$ to $j_k^{l+1}$ weakly connected components with a cycle of length $mn^{s+k-1}$ and (ii) $C_n^-$ to exactly $r_{s+1}$ arcs of $C_{mn^s}^+$ of the remaining weakly connected components with a cycle of length $mn^{s+k-1}$, for $k=1,2,\ldots, l$. Then, by Theorem \[producte\_uni\] and the induction hypothesis, we have that: $$\begin{aligned}
\hbox{und}(D_{l+s+3}) &\cong & \sum_{k=1}^{l}nj_k^{l+1}G^{n^{k+s-1}}+ \sum_{k=1}^{l}\left(n\sum_{t=1}^kj_t^{l-k+t}-\sum_{t=1}^{k-1}j_{t}^{l-k+t+1}-j_k^{l+1}\right)G^{n^{k+s}}\\
&+& nj_{l+1}^{l+1} G^{n^{l+s}}+\left(n-\sum_{k=1}^lj_k^k-j_{l+1}^{l+1}\right)G^{n^{l+s+1}}\\
&=& nj_{1}^{l+1} G^{n^{s}}+ \sum_{k=2}^{l+1}nj_k^{l+1}G^{n^{k+s-1}}+ \sum_{k=2}^{l+1}\left(n\sum_{t=1}^{k-1}j_t^{l-(k-1)+t}-\sum_{t=1}^{k-1}j_{t}^{l-(k-1)+t+1}\right)G^{n^{k+s-1}}\\
&=& \sum_{k=1}^{l+1} \left(n\sum_{t=1}^kj_t^{l+1-k+t}-\sum_{t=1}^{k-1}j_{t}^{l+1-k+t+1}\right)
G^{n^{k+s-1}}+\left(n-\sum_{k=1}^{l+1}j_k^k\right)G^{n^{l+s+1}},\end{aligned}$$ which proves that formula (\[formula \_D\]) also holds for $l+1$. Now, we are ready to finish the proof. Let $(a_0^l,a_1^l,\ldots, a_l^l)$ be any sequence of nonnegative integers such that, $$\label{equation_a_l^l}
a_l^l=n-\sum_{k=1}^lj_k^k\quad \hbox{and}\quad a_{k-1}^{l}=n\sum_{t=1}^kj_t^{l-k+t}-\sum_{t=1}^{k-1}j_{t}^{l-k+t+1}, \ k=1,2,\ldots, l.$$ Then, $$\sum_{k=0}^la_k^l G^{n^{k+s}}\cong \hbox{und}(D_{l+s+2}).$$
An easy check shows that we can find a set of nonnegative integers $\{j_1^1, j_1^2,j_2^2,\ldots,
j_1^l,j_2^l,\ldots, j_l^l\}$ that is a solution of (\[equation\_a\_l\^l\]) if $$\sum_{i=0}^{l}\frac{a_{i}^l}{n^{l-i}}=n \ \hbox{and}\ \sum_{i=0}^k\frac{a_{i}^l}{n^{k-i+1}}\in \mathbb{Z}^+,\ \hbox{for each}\ k=0,1,l-1,\ \hbox{when}\ l\ge 1.$$ Therefore, the result follows.
Super edge-magic labelings of (di)graphs with unicyclic connected components
============================================================================
Through this section, we use the term graph to mean simple graph. That is to say, the graph considered do not contain loops nor multiple edges. Let $G=(V,E)$ be a $(p,q)$-graph, that is a graph with $|V|=p$ and $|E|=q.$ Kotzig and Rosa introduced in [@K1] the concept of edge-magic labeling. A bijective function $f:V\cup E\longrightarrow \{i\}_{i=1}^{p+q}$ is an [*edge-magic labeling*]{} of $G$ if there exists an integer $k$ such that the sum $f(x)+f(xy)+f(y)=k$ for all $ xy\in E$. A graph that admits an edge-magic labeling is called an [*edge-magic graph*]{}, and $k$ is called the [*valence*]{}, the [*magic sum*]{} [@Wa] or the [*magic weight*]{} [@BaMi] of the labeling. In 1998, Enomoto el al. [@E] defined the concepts of super edge-magic graphs and super edge-magic labelings. A [*super edge-magic labeling*]{} is an edge-magic labeling that satisfies the extra condition $f(V)=\{i\}_{i=1} ^{p}$. It is worthwhile mentioning that an equivalent labeling had already appeared in the literature in 1991 under the name of [*strongly indexable labeling*]{} [@AH]. A graph that admits a (super) edge-magic labeling is called a [*(super) edge-magic graph*]{}. Super edge-magic graphs and labelings are of great interest in the world of graph labeling since they constitute a powerful link among different types of labelings. See [@F2] and more recently [@LopMunRiu8].
From now on, let $\mathcal{S}_n^k$ denote the set of all super edge-magic labeled digraphs with order and size equal to $n$ and magic sum $k$, where each vertex takes the name of the label that has been assigned to it. Then, the following result can be found en [@LopMunRiu8].
[@LopMunRiu8]\[super\] Let $D$ be a (super) edge-magic digraph and let $h:E(D)\longrightarrow \mathcal{S}_n^k$ be any function. Then $und(D\otimes _h \mathcal{S}_n^k)$ is (super) edge-magic.
The key point in the proof, see also [@LopMunRiu8], is to rename the vertices of $D$ and each element of $\mathcal{S}_n^k$ after the labels of their corresponding (super) edge-magic labeling $f$ and their super edge-magic labelings respectively. Then define the labels of the product as follows: (i) the vertex $(i,j)\in V(D\otimes_h \mathcal{S}_n^k)$ receives the label: $n(i-1)+j$ and (ii) the arc $((i,j),(i',j'))\in E (D\otimes_h \mathcal{S}_n^k)$ receives the label: $n(e-1)+k+n-(j+j')$, where $e$ is the label of $(i,i')$ in $D$. Thus, for each arc $((i,j),(i',j'))\in E (D\otimes_h \mathcal{S}_n^k)$, coming from an arc $e=(i,i')\in E(D)$ and an arc $(j,j')\in E(h(i,i'))$, the sum of labels is constant and equals to: $
n(i+i'+e-3)+k+n.
$ That is, $n(\sigma_f-3)+k+n,$ where $\sigma_f$ denotes the magic sum of the labeling $f$ of $D$. Therefore, we obtain the following proposition.
\[Pro\_induced\_labeling\] Let $\check{f}$ be the edge-magic labeling of the graph und$(D\otimes_h \mathcal{S}_n^k)$ obtained in Theorem \[super\] from a labeling $f$ of $D$. Then the magic sum of $\check{f}$, $\sigma_{\check{f}}$, is given by the formula
$$\label{induced_labeling}
\sigma_{\check{f}}=n(\sigma_f-3)+n+k,$$
where $\sigma_f$ is the magic sum of $f$.
\[valences\_differ\] Let $D$ be an edge-magic digraph and assume that there exist two edge-magic labelings of $D$, $f$ and $g$, such that $\sigma_f\neq\sigma_g$. If we denote by $\check{f}$ and $\check{g}$ the edge-magic labelings of the graph und$(D\otimes_h \mathcal{S}_n^k)$ when using the edge-magic labelings $f$ and $g$ of $D$ respectively, then we get $$|\sigma_{\check{f}}-\sigma_{\check{g}}|\ge 3.$$
Since $\sigma_f\neq\sigma_g$, we get the inequality $|\sigma_f-\sigma_g|\ge 1$. Thus, using (\[induced\_labeling\]), we obtain that $|\sigma_{\check{f}}-\sigma_{\check{g}}|=|n(\sigma_f- \sigma_g)|\ge 3.$
Using a technique introduced in [@McQ01], McQuillan proved the following. Let $n$ be a positive integer and let $G=C_{m_1}+\ldots +C_{m_l}$ be a disjoint union of cycles. Let $I=\{1,2,\ldots,l\}$ and $J$ be any subset of $I$. Finally, denote by $G_J=(\sum_{j\in J}nC_{m_j})+(\sum_{i\in I\setminus J}C_{nm_i})$.
[@McQ02]\[MacQ\_tm\] Let $n$ be an odd positive integer and let $G=C_{m_1}+\ldots +C_{m_l}$ be a disjoint union of cycles. Consider $I=\{1,2,\ldots,l\}$ and $J$ any subset of $I$. If $G$ has an edge-magic labeling with magic constant $h$ then $G_J$ has edge-magic labelings with magic constants $3(n-1)(m_1+m_2+\ldots +m_l)+h$ and $nh-3(n-1)/2$.
Using Theorems \[producte\_uni\] and \[super\], we generalize, in some sense, Theorem \[MacQ\_tm\].
\[generalizing\_McQ\_tm\] Let $n$ be an odd positive integer and let $G=G_1+G_2+\ldots +G_l,$ where each $G_i$ is a unicyclic graph of the form $G_i=(T_1^i (w_1^i), T_2^i (w_2^i),\ldots, T_{k_i}^i (w_{m_i}^i))$. Let $I=\{1,2,\ldots,l\}$ and $J$ be any subset of $I$ such that if $m_i\in J$ is odd then $m_i\ge n$. If $G$ has a (super) edge-magic labeling then $$(\sum_{j\in J} nG_i)+(\sum_{i\in I\setminus J}G_i^n)$$ has a (super) edge-magic labeling.
Let $j\in J$. If $m_i$ is even we define $r_i=m_i/2$. Otherwise, we define $r_i=(m_i+n)/2$. Thus, the subgroup of $\mathbb{Z}_n$ generated by $m_i-2r_i$ is the trivial subgroup. Hence, inheriting the notation introduced in Theorem \[producte\_uni\], und$(D_i\otimes_{h_i}\{C_n^+,C_n^-\})\cong nG_i$. Now, let $i\in I\setminus J$. If $m_i$ is odd we define $r_i=(m_i-1)/2$. Otherwise, we define $r_i=m_i/2-1$. In both cases, the subgroup of $\mathbb{Z}_n$ generated by $m_i-2r_i$ is $\mathbb{Z}_n$. Thus, inheriting the notation introduced in Theorem \[producte\_uni\], und$(D_i\otimes_{h_i}\{C_n^+,C_n^-\})\cong G_i^n$. Hence, by considering the function $h:E(D)\rightarrow \{C_n^+,C_n^-\}$ defined by $h(e)=h_i(e)$, for each $e\in D_i$ and $i=1,2,\ldots, l$, by Lemma \[components\] we obtain that und$(D\otimes_h\{C_n^+,C_n^-\})\cong(\sum_{j\in J} nG_i)+(\sum_{i\in I\setminus J}G_i^n)$. Therefore, since $\{C_n^+,C_n^-\}\subset \mathcal{S}_n^{(5n+3)/2}$ the result follows by Theorem \[super\].
Let $f:V(G)\cup E(G)\rightarrow \{i\}_{i=1}^{p+q}$ be a super edge-magic labeling of a $(p,q)$-graph $G$, with $p=q$. The [*odd labeling*]{} and [*even labeling*]{} obtained from $f$, denoted respectively by $o(f)$ and $e(f)$, are the labelings $o(f), e(f):V(G)\cup E(G)\rightarrow \{i\}_{i=1}^{p+q}$ defined as follows: (i) on the vertices: $o(f)(x)=2f(x)-1$ and $e(f)(x)=2f(x)$, for all $x\in V(G)$, (ii) on the edges: $o(f)(xy)=2\hbox{val}(f)-2p-2-o(f)(x)-o(f)(y)$ and $ e(f)(xy)=2\hbox{val}(f)-2p-1-e(f)(x)-e(f)(y)$, for all $xy\in E(G).$
\[odd\_even\_labelings\] Let $G$ be a $(p,q)$-graph with $p=q$ and let $f:V(G)\cup E(G)\rightarrow \{i\}_{i=1}^{p+q}$ be a super edge-magic labeling of $G$. Then, the odd labeling $o(f)$ and the even labeling $e(f)$ obtained from $f$ are edge-magic labelings of $G$ with magic sums $\hbox{val}(o(f))=2\hbox{val}(f)-2p-2$ and $\hbox{val}(e(f))=2\hbox{val}(f)-2p-1$.
Following an idea that appeared in [@LopMunRiu7], we obtain the next result.
\[versio\_complerta\_i\_magic\_sums\] Let $D$ be any super edge-magic labeled digraph of order and size equal to $p$ and assume that the vertices take the name of their labels. Consider a set of functions $h_i$, where $h_i: E(D_i)\rightarrow \mathcal{S}_n^k$ and $D_i$ is defined recursively as follows: $D_1=D$ and $D_{i+1}=D_i\otimes_{h_i}\mathcal{S}_n^k$, for each $i\ge 2$. Then, $D_i$ admits at least $i+1$ edge-magic labelings with $i+1$ distinct edge-magic sums.
We will prove the result by induction on $i$. First of all, notice that, by Theorem \[super\] each digraph $D_i$ is super edge-magic, for $i\ge 2$. Also, notice that by Lemma \[odd\_even\_labelings\] any super edge-magic labeled digraph of order and size equal to $p$ admits two edge-magic labelings with consecutive magic sums. Thus, $D_1=D$ has at least $2$ edge-magic labelings with $2$ distinct edge-magic sums. Suppose now that $D_i$ admits at least $i+1$ edge-magic labelings with $i$ distinct edge-magic sums. By Corollary \[valences\_differ\], the induced edge-magic labelings of $D_{i+1}$ (see the paragraph just before Proposition \[Pro\_induced\_labeling\]), differ at least by three units. Note that, by definition of the $\otimes_h$-product, we have that $|V(D_{i+1})|=n|V(D_i)|$ and $|E(D_{i+1})|=n|E(D_i)|$, that is, equality $|V(D_i)|=|E(D_i)|$ holds for every $i\ge 1$. Hence, Lemma \[odd\_even\_labelings\] implies that $D_{i+1}$ admits two edge-magic labelings with consecutive magic sums. Therefore, at least one of them is different from the ones induced by the $h_i$-product of $D_i$ with $\mathcal{S}_n^k$. That is, $D_{i+1}$ admits at least $i+1$ edge-magic labelings with $i+1$ distinct edge-magic sums.
\[SEM\_magic\_sums\_suma\_unicyclics\] Let $l,m,n$ and $s$ be nonnegative integers, such that, $m\ge 1$, $n\ge 3$ is odd and if $m$ is odd then $m\ge n$. Let $G=(T_1(w_1),T_2(w_2),\ldots, T_m(w_m))$ be a unicyclic graph that is super edge-magic. Let $(a_0^l,a_1^l,\ldots, a_l^l)$ be a sequence of positive integers such that, $a_0^0=n$ when $l=0$, $$\sum_{i=0}^l\frac{a_i^l}{n^{l-i}}=n \quad \hbox{and}\quad \sum_{i=0}^k\frac{a_i^l}{n^{k-i}}\in \mathbb{Z}^+,\ \hbox{for each}\ k=0,l-1, \ \hbox{when} \ l\ge 1.$$ Then, the graph $\sum_{i=0}^la_i^l G^{n^{s+i}}$ is super edge-magic. Moreover, there exist at least $l+s+1$ diferent edge-magic labelings with at least $l+s+1$ different magic sums.
By Theorem \[th\_charact\_decom\_suma\_unicyclics\], there exists a sequence of functions $h_i: E(D_i)\rightarrow \{C_n^+,C_n^-\}$, $i=1,2,\ldots, l+s$, where $D_1$ is an oriented graph obtained from $G$ by considering a strong orientation of its cycle and the digraphs $D_i$ are defined recursively as follows: $D_{i+1}=D_i\otimes_{h_i}\{C_n^+,C_n^-\}$, for each $i\in \{2,\ldots,l+s\}$, such that $\sum_{i=0}^la_i^l G^{n^{s+i}}\cong \hbox{und}(D_{l+s+1}).$ Thus, by Theorem \[versio\_complerta\_i\_magic\_sums\], since $\{C_n^+,C_n^-\}\subset \mathcal{S}_n^{(5n+3)/2}$ the result follows.
[**Acknowledgements**]{} The research conducted in this document by the first author has been supported by the Spanish Research Council under project MTM2011-28800-C02-01 and by the Catalan Research Council under grant 2009SGR1387.
[xxxxx]{} B.D. Acharya and S.M. Hegde, Strongly indexable graphs, *Discrete Math.*, [**93**]{} (1991) 123–129. A. Ahmad, F. A. Muntaner-Batle, M. Rius-Font, On the product $\overrightarrow{C}_m \otimes_h \{{\overrightarrow{C}_n, \overleftarrow{C}_n }\}$ and other related topics, [*Ars Combin.*]{} in press. M. Ba$\check{c}$a and M. Miller, Super Edge-Antimagic Graphs, BrownWalker Press, Boca Raton, 2008. D. McQuillan, Edge-magic and vertex-magic total labelings of certain cycles, [*Ars Combin.*]{}, [**90**]{} (2009) 257–266. D. McQuillan, A technique for constructing magic labelings of $2$-regular graphs, [*J. Combin. Math. Combin. Comput.*]{}, [**75**]{} (2010) 129–135. H. Enomoto, A. Lladó, T. Nakamigawa and G. Ringel, Super edge-magic graphs, *SUT J. Math*. [**34**]{} (1998), 105–109. R.M. Figueroa-Centeno, R. Ichishima and F.A. Muntaner-Batle, The place of super edge-magic labelings among other classes of labelings, *Discrete Math.* [**231**]{} (1–3) (2001), 153–168. R.M. Figueroa-Centeno, R. Ichishima, F.A. Muntaner-Batle and M. Rius-Font, Labeling generating matrices, *J. Comb. Math. and Comb. Comput.* [**67**]{} (2008), 189–216. R. Hammarck, W. Imrich and S. Klav$\check{z}$ar, Handbook of Product Graphs, Second Edition, CRC Press, Boca Raton, FL, 2011. A. Kotzig and A. Rosa, Magic valuations of finite graphs, *Canad. Math. Bull.* [**13**]{} (1970), 451–461. S.C. López and F.A. Muntaner-Batle, Connectivity and other invariants of generalized products, [*Periodica Math. Hungarica*]{}, in press. S. C. López, F. A. Muntaner-Batle, M. Rius-Font, Perfect edge-magic graphs, [*Bull. Math. Soc. Sci. Math. Roumanie.*]{}, in press. S. C. López, F. A. Muntaner-Batle, M. Rius-Font, A problem on edge-magic labelings of cycles, [*Canad. Math. Bull.*]{} (2013), DOI:10.4153/CMB-2013-036-1. S. C. López, F. A. Muntaner-Batle, M. Rius-Font, Labeling constructions using digraphs products, [*Discrete Applied Math.*]{} [**161**]{} (2013), 3005-3016, A.M. Marr and W.D. Wallis, *Magic Graphs*. Second Edition. Birkhaüser, New York, 2013. F.S. Roberts and B. Tesman, Applied Combinatorics. Upper Saddle River, NJ: Pearson Education Inc. (2005). D.B. West. Introduction to graph theory. Prentice Hall, INC. Simon & Schuster, A Viacom Company upper Saddle River, NJ07458, 1996.
| |
Michael D. Moberly May 11, 2012
I have yet to encounter a company or a management team that does not want to survive this recessionary period. While this statement may appear self-evident, I have encountered countless c-suites and other members of company management teams who express virtually no or, at best, little interest in the economic fact that an increasingly significant key to sustaining, even strengthening, a business during this extended economic downturn is to understand their cheese has indeed, been moved. That is, their company’s success and sustainability is directly linked to how well they identify, nurture, manage, and exploit their intangible assets.
For those unfamiliar with this ‘cheese movement notion’, there is a very brief, but quite reflective book authored by Spencer Johnson and Kenneth Blanchard titled Who Moved My Cheese?: An Amazing Way to Deal with Change in Your Work and in Your Life. Those who have read it, I’m quite confident, found the 30+/- minutes required to read it, was time well spent. By the way, ‘cheese’ of course, is a metaphor for what one want’s to have in life…whether it is a good, well paying job, acquisition of certain possessions, good health, or merely peace of mind, etc.
Should you elect to read Johnson and Blanchard’s thought provoking book, I offer one suggestion intended to help make the concept of ’who moved my cheese’ more relevant to busy, time constrained business decision makers, management teams, and c-suites. That is, substitute the words ‘intangible assets’ every time the word ‘cheese’ appears in the narrative. This simple exercise facilitates readers identifying with the intangible assets their company and its employees produce and the importance of recognizing how intangible assets, individually or collectively play a significant contributory role relative to company value, revenue streams, and sustainability, and profitability.
Thus, the ’cheese that’s been moved’ represent a company’s tangible (physical) assets! That is, for an overwhelming majority of company’s (globally) their tangible assets, i.e., property, buildings, equipment, inventory, etc., have been permanently, and to add emphasis, irreversibly moved to playing lessor contributory roles relative to a company’s overall value and revenue, etc.
In other words, tangible (physical) assets no longer, as they have in previous decades represent the dominant drivers or sources of most company’s value, revenue, and/or ‘building blocks’ for growth, wealth creation, sustainability, or profitability.
Instead, for most, and a continually growing percentage of companies globally, their primary sources of value and revenue have transitioned, largely as a product of companies and economies being increasingly ‘knowledge-based and knowledge intensive, thus greater reliance on intangible assets ala intellectual, structural, and relationship capital, reputation and brand, etc. (To see a representative list of intangible assets go to http://kpstrat.com and ‘click on’ brochure and scroll to ‘what are intangible assets’.)
To try to bring additional clarity to these points, allow me to describe the remarks of the keynote for a entrepreneurs’ seminar I recently attended. The speaker was a well-known and by most measures, a highly successful local restauranteur. For those listening carefully to her 30 minute presentation, at least 20 minutes included the speakers’ obviously experienced sense of the restaurant chain’s culture which he contributed to developing. I have noted numerous times how company-business culture can, quite literally, be the foundation for any company’s sustained success and profitability, in this instance, a 35+ year career in the restaurant business.
Without exception, each of the factors the speaker identified as being embedded in his restaurant’s (dining experience) culture contributed to building and sustaining a successful and profitable trend, even during the recession – economic downturn and the increasingly competitive dine out market space. Again, without exception, each factor – variable the speaker identified clearly constituted an intangible asset which were now firmly embedded. However, much to my chagrin, not once did the speaker utter the words or otherwise refer to these factors as intangible assets!
Another example is also worth noting. During another seminar I attended, much like the one described above, a very successful business person (keynote speaker) offered a somewhat emotional characterization, in somewhat of a laundry list fashion, the various factors that collectively, over a period of time, became the self–described foundations of this company’s success, profitability, and sustainability, again, even during this recessionary period.
Being the avid note taker I am, I cited no less than 17 factors which the speaker described as contributors to the success his company enjoyed and would likely continue to enjoy for the foreseeable future. As you may have concluded already, all 17 factors were in fact, intangible assets. Unfortunately however, like the previous speaker, not once were the words ‘intangible assets’ uttered during the presentation, nor were they addressed in an extensive Q&A period that followed.
It’s true, in both examples cited above, these one-time entrepreneurs had achieved considerable success by most anyone’s measure. But, these examples also give rise to the posibility of how much more profitable and sustainable their respective ventures may be merely by recognizing and practicing
the economic fact that 65+% of most company’s value, sources of revenue, and ‘building blocks’ for growth, sustainability, and profitability lie in – evolve directly from intangible assets, and
the ability as business leaders’ ability to consistently exercise the necessary stewardship, oversight and management of the intangible assets they, their company, and its employees developed, i.e., sustain control, use, ownership, and monitor the value and materiality of those assets. Because, in both instances, their collective success is directly attributable to intellectual and structural capital and a particularly strong company culture built on compliance and relationship capital.
For those dedicated to elevating awareness, use, and accountability for their company’s intangible assets, the process starts with management teams literally acknowledging and verbalizing their success and profitability being attributed to, in large measure, the effective and sustained development, nurturing, and utilization of intangible asset cheese! | https://kpstrat.com/2012/05/11/intangible-assets-who-moved-my-tangible-asset-cheese/ |
The architecture of Arcosanti is the perfect backdrop for a 1-day photographic experience. Participants will learn the use of creative techniques that incorporate depth of field, shutter speed, and exposure compensation alongside both artistic and impactful approaches to composition. General architectural information will be provided throughout the tour and architectural elements will be highlighted. Besides receiving an intimate look at Arcosanti, participants will also learn:
- How to "see" light and the interplay of light and shadows
- How to make creative compositions
- How to experiment with depth of field
- How to intentionally stop - or blur - action and movement
- How to control ISO or exposure compensation
This workshop is led by Jessica Sypher, an Arcosanti resident and professional photographer. Jessica’s educational background includes a BA Honors in Environmental Studies and a graduate diploma in Environmental Visual Communication from the Royal Ontario Museum. She specializes in environmental portraits and creative on-location photography that takes advantage of the interplay between built and natural environments.
Class time: 10am - 6pm
Lodging is available in a shared dorm for $25 per night, or a private guest room for $50 per night.
For further information, contact [email protected]. | https://shop.arcosanti.org/products/1-day-photography-workshop |
By Charles P. McKeague
Pat McKeague's 7th version of easy arithmetic is the ebook for the fashionable scholar such as you. Like its predecessors, the 7th version is obvious, concise, and sufferer in explaining the recommendations. This re-creation includes 1000s of latest and up to date examples and purposes, a redecorate that incorporates cleanser images and photographs (some from Google Earth) that let you see the relationship among arithmetic and your international. This contains references to modern themes like fuel costs and a few of modern day such a lot ahead pondering businesses like Google.
Read Online or Download Basic Mathematics: A Text Workbook PDF
Best algebra & trigonometry books
New Developments in Lie Theory and Its Applications: Seventh Workshop on Lie Theory and Its Applications November 27- December 1, 2009 Cordoba, Argentina
This quantity comprises the lawsuits of the 7th Workshop in Lie conception and Its purposes, which used to be held November 27-December 1, 2009 on the Universidad Nacional de Cordoba, in Cordoba, Argentina. The workshop used to be preceded by way of a different occasion, oEncuentro de teoria de Lieo, held November 23-26, 2009, in honour of the 60th birthday of Jorge A.
- Calculus: Concepts and Applications
- An Invitation to the Algebra of Canonical Commutation Relations
- Introductory Algebra, 3rd Edition
- Algebra II Essentials For Dummies (For Dummies (Math & Science))
Extra info for Basic Mathematics: A Text Workbook
Sample text
87. 88. 2 ft 4 ft 9 in. 3 in. 89. 90. 1 yd 3 yd 5 yd 10 yd 91. 92. 4 in. 6 in. 5 in. 10 in. 12 in. 7 in. E Applying the Concepts 93. Classroom appliances use a lot of energy. You can save 94. The information in the illustration represents the energy by unplugging or turning of unused appliances. number of picture messages sent for the first nine Use the information in the given illustration to find the months of the year, in millions. Use the information to following: find the following: Energy Estimates A Picture’s Worth 1,000 Words All units given as watts per hour.
49. First Number a Second Number b 11 11 22 22 11 22 22 44 First Number a Second Number b 25 25 25 25 10 100 1,000 10,000 First Number a Second Number b 12 36 12 36 20 20 40 40 Their Product ab 50. 52. 51. Their Product ab Their Product ab Their Product ab 54. 53.
A. To the nearest hundred dollars, what is the total amount spent on food and entertainment? b. To the nearest thousand dollars, how much of their income is spent on items other than taxes and savings? SOLUTION In each case we add the numbers in question and then round the sum to the indicated place. a. We add the amounts spent on food and entertainment and then round that result to the nearest hundred dollars. Food Entertainment Total Answers 3. a. 1,000 b. 1,000 4. a. 377,000,000 b. 3 Rounding Numbers, Estimating Answers, and Displaying Information b. | http://www.grassofratelli.com/download/basic-mathematics-a-text-workbook |
Doctors without Borders (MSF) on Tuesday commended South Africa for advocating the removal of intellectual property (IP) barriers that stand in the way of access to COVID-19 drugs, tests and vaccines.
Past experience has shown that IP barriers severely hamper the development of and access to medical tools, especially in low- and middle-income countries, MSF said in a statement emailed to Xinhua. According to MSF, South Africa took leadership in calling for IP barriers to be removed when the World Trade Organization (WTO) met on July 30 for a Trade-Related Aspects of Intellectual Property Rights (TRIPS) Council formal session.
At the meeting, South Africa called on WTO members to explore new bold measures to address IP barriers, including binding commitments to ensure open sharing and global non-exclusive rights to use know-how, data and technologies, and legislative measures to restrict patent evergreening.
An effective response to the COVID-19 pandemic requires that all COVID-19 medical tools, including treatments, vaccines and tests, are affordable, available and accessible to everyone and allocated based on public health need, MSF said.
While the 73rd World Health Assembly “COVID-19 response” resolution recommends countries to use the health safeguards enshrined under the TRIPS Agreement to facilitate equitable access, there has not been, until this point, any formal discussion about their use or limitations at WTO, according to MSF.
“We are excited to see South Africa stand strong in the interest of public health today in front of WTO members, highlighting the importance of health safeguards to ensure access to COVID-19 drugs, tests and vaccines, and the limitations of the current international mechanism to overcome barriers to access,” said Yuanqiong Hu, Senior Legal and Policy Advisor, MSF Access Campaign.
MSF has seen time and time again how IP barriers leave lifesaving medicines, essential diagnostics and new vaccines out of the hands of the most vulnerable people in developing countries, Hu said.
For example, past experience with the pneumococcal vaccine and human papillomavirus vaccine has shown that IP can affect every step of vaccine development, and monopolies can hinder timely introduction of affordable vaccines in developing countries, Hu said.
“We cannot risk repeating the same mistakes in the face of this global pandemic,” he stressed. Since the start of the COVID-19 outbreak, there have been several concerning examples of pharmaceutical corporations seeking monopoly power through patents.
For example, the voluntary licenses recently signed in secret by Gilead, a research-based biopharmaceutical company, for the investigational drug Remdesivir that was approved for emergency use in treating COVID-19 inexcusably exclude nearly half of the world’s population.
“These actions provide scant assurance that pharma can be trusted to act in the public interest and illustrate how we cannot rely on the voluntary actions of companies in this pandemic,” Hu said.
MSF hopes that WTO members recognize the gravity of the challenges faced by countries today and show solidarity once again during this pandemic and support the demand raised by South Africa to pursue a comprehensive and expeditious approach to removing IP barriers, Hu said.
All governments, he said, should take urgent actions to knock down these IP barriers that stand in the way of people’s access, including suspending and overriding patents and other exclusivities. | https://newsghana.com.gh/s-africa-commended-for-advocating-universal-access-to-medical-tools-against-covid-19/ |
In Canada, the range is 15% to 33%. In the U.S., the lowest tax bracket for the tax year ending 2019 is 10% for an individual earning $9,700 and jumps to 22% for those earning $39,476. The corresponding bottom Canadian bracket stays at 15% until $47,630.
What percent of taxes is taken out of a paycheck in Canada?
If you make $52,000 a year living in the region of Ontario, Canada, you will be taxed $11,432. That means that your net pay will be $40,568 per year, or $3,381 per month. Your average tax rate is 22.0% and your marginal tax rate is 35.3%.
How much percent of taxes is taken out of a paycheck?
Overview of Federal Taxes
|Gross Paycheck||$3,146|
|Federal Income||15.32%||$482|
|State Income||5.07%||$159|
|Local Income||3.50%||$110|
|FICA and State Insurance Taxes||7.80%||$246|
How much does a Canadian pay in taxes?
In Canada, the average single worker faced a net average tax rate of 23.2% in 2020, compared with the OECD average of 24.8%. In other words, in Canada the take-home pay of an average single worker, after tax and benefits, was 76.8% of their gross wage, compared with the OECD average of 75.2%.
How much tax is taken out of $15 an hour?
What is $15 an hour annually after taxes? With the average single American contributing 29.8% of their earnings to income taxes, Medicare and Social Security, your average take home salary annually on $15 an hour after taxes will be $21,902.40.
How is tax calculated in Canada?
Average tax rate = Total taxes paid / Total taxable income.
…
Example: If your taxable income was $50,000 in 2020, you would calculate your federal tax as follows:
- Pay 15% on the amount up to $48,535, or $7,280.25.
- Pay 20.5% on the amount between $48,535 to $97,069, or $300.33.
- Total federal tax payable: $7,580.58.
How much tax do you pay for $1000?
The tax rate will be determined by your income. So, for instance, if you make $42,000 annually and file as single, your federal tax rate is 22%. If you win $1,000, your total income is $43,000, and your tax rate is still 22%.
How do I calculate my paycheck withholdings?
Federal income tax withholding was calculated by:
- Multiplying taxable gross wages by the number of pay periods per year to compute your annual wage.
- Subtracting the value of allowances allowed (for 2017, this is $4,050 multiplied by withholding allowances claimed).
How is tax calculated on salary?
The year during which your income tax is calculated for the previous financial year is called the assessment year.
…
Components for calculating the income tax.
|Income Slab||Tax Rate|
|2.5 lakhs – 5 lakhs||10% of exceeding amount|
|5 lakhs – 10 lakhs||20% of the exceeding amount|
|Above 10 lakhs||30% of the exceeding amount|
Are taxes high in Canada?
We can learn from our neighbors to the north, whose broad and expensive social programs require a redefinition of “high-income earner.” Although Canada’s top federal income-tax rate (33%) is comparable to the top U.S. rate (37%), Canada’s provincial income-tax rates are much higher (ranging from 13% to 25%) than U.S. …
Why are Canadian taxes so high?
The reason they pay a higher proportion of income taxes than all taxes combined, is that many additional taxes Canadians pay — such as federal and provincial sales taxes, municipal property taxes, fuel taxes and tobacco and liquor taxes — are not progressively based on income.
How much is $17 an hour annually?
If you make $17 per hour, your Yearly salary would be $33,150. This result is obtained by multiplying your base salary by the amount of hours, week, and months you work in a year, assuming you work 37.5 hours a week.
How much is $10 an hour weekly?
Comparison Table Of $10 An Hour
|$10 An Hour||Total Income|
|Yearly (262 Work Days)||$20,960|
|Monthly (175 Hours)||$1,750|
|Weekly (40 Hours)||$400|
|Daily (8 Hours)||$80|
How much is 10 an hour after taxes?
What is $10 an hour salary after taxes monthly take-home salary? $1,460 on average. If you want to calculate your income after taxes quickly, you can use this tool that allows you to input your status (single, married), location, and gross income to give you your net income after tax. | https://experiencethewhiteshell.org/canada-landmarks/what-percent-of-your-paycheck-goes-to-taxes-in-canada.html |
Mary Ainsworth: Attachment theory
John Bowlby was the original founder of attachment theory this began after World War II where he found many children became orphans at a very young age and concluded that attachment was crucial for development (Miler, 2011). In his studies he proposed that attachment came from the knowledge that infants needed protection and biologically infants know that separation could cause a child horrendous consequences without protection of the elements, therefore their instinct is to attract the mothers attention for protection (Miler, 2011). Ainsworth who was one of Bowlby’s colleagues began to look at attachment, as a mother as a “secure base” for their ability to explore, instinctively that the mother is a place to come back for reassurance and safety. After leaving Bowlby she began to study in Uganda when her husband had an opportunity to teach there, this gave Ainsworth an opportunity to research mothers and infants where she developed the theory of “strange situation”. After Uganda Ainsworth had the opportunity to teach at John Hopkins University (Miler, 2011).
Ainsworth defines attachment as an affectionate bond between two individuals that cannot be interchanged and that endures through time. Each attachment is defined differently between each other and one cannot interchange with each other and have the same affect (Ainsworth, 1989). When it comes to the survival of infants they have been imbedded with certain behaviours as a way to grab the attention of their caretaker to get what is needed for survival. The behaviours such as crying are a way to tell the caretaker to come to the child and attend to whatever is needed at the time (Ainsworth, 1989). Mother’s attachment behaviors can be increased in the time the environment may be dangerous or if the child is being removed from the caretaker (Ainsworth & Bell, 1970) .
Mirecki and Chou (2012) argue that attachment behaviors may be interpreted differently depending on the culture which the child is raised in; leaving what some families see as acceptable behavior where others may mistake it for not caring or showing emotion. Caretakers of different cultures interpret different styles of compassion as their way to determine when comfort and protection are needed. This leads to difficulties for families moving from one culture to another where parental behaviors may be significantly differently (Mirecki & Chou, 2013).
Ainsworth (1989) states that babies are able to distinguish individuals and behave differently depending on who is present. Initially the infant will most likely attach first to the mother as the voice is the one that is the most familiar and the need for survival with nourishment will become the initial focus. As the infant gets older he/she begins to distinguish between individuals and is able to distinguish what behaviors and needs are given depending on each individual (Ainsworth, 1989).
Behavior Interaction
In Ainsworth 1963 study her initial reason for this research was to examine the strength and quality of the attachment to the mother. This was done with 28 babies born in Uganda and all were breast fed but one. While researching the topic of strength and quality of attachment she then led her study to find what criteria are needed to establish what is stated as attachment (Ainsworth, 1963). Ainsworth stated that these children were more advanced into their attachment than possibly other children due to the breastfeeding which was not as noticed in the United States at the time of the study (Ainsworth, 1963). In this study there were patterns of attachment behaviour that were evaluated as specific behaviors. An infant may exhibit differently when around someone besides the mother which included crying, smiling and vocalization each one of these behaviors where seen as being different for anyone else other than the mother. Next category of behavior patterns were the idea that the infant looked for the location of their mother these behaviors would be visual-motor orientation towards the mother, crying when the mother leaves, and following or scrambling so that the child has the opportunity to cling to the mother. By the time the infant has turned one they have completed four different stages of behavior, this is done in a smooth fashion without any specific timeline as one behavior starts and another one ends. They were as follows undiscriminating responsiveness to people, then discrimination to the mother (8-12 weeks), following the mother (6-7 months), then sharp preference to a guardian. These types of behaviors become an active part in both the infant and the mother’s interaction and that it is initiated by the infant, and that physical contact is not needed but that attachment behaviors can be maintained through interaction such as facial expression, gestures and vocalization (Ainsworth, 1963).
Strange Behavior
As stated by Ainsworth (1963) the idea of verbal interaction needed more than physical contact is disagreed by Ainsworth (1981). This study divides into three different behavior stages as follows: Category A which is anxious/resistance where the child is extremely upset when the parent leaves the room, will be very clingy to the parent and explore less but will seem resistant to any type of affection given by the mother. Category B where the child is secure the behaviors seen was, the child is upset when the mother leaves, happy when the mother returns and uses the mother as a safe base when exploring. Category C where the child is not upset if the parent leaves, and is fine when a stranger picks them up, and is not excited when the mother comes back into the room (Ainsworth,1970). In the study of maternal affectionate behavior Ainsworth looked at how each mother expressed affection to their child (Ainsworth & Tracy, 1981). Finding were that mothers of children of pattern A kissed their infants more than the other two pattern but that they would not demonstrate as much physical contact such as hugging, cuddling as the other two classes. It was noted that mothers would have an aversion to close body contact. This was not to say that the mother did not feel affection to the child but on many occasions the mother would be more rejecting to the child and on occasions would feel more irritated and sometimes anger to the child when the child showed behaviors that would demonstrate a need of protection or affection. Where group B mothers hugged and cuddled their children the most, but hugging was the most significant. Group C the mother would display the least amount of affection but when she did it would signify more hugging and cuddling than kissing and would cuddle the baby when it needed soothing. She would find that cuddling was an easier way to sooth the child than just a kiss. Categories B are shown more affection than the other two groups (Ainsworth & Tracy, 1981). A fourth group, group D was found and is classified as anxious resistant/ambivalent infant (O’Gorman, 2012). This type of child finds that the mother or caregiver may be unpredictable in their response of affection. This can be due to lack of accessibility, or that the parent has a difficulty managing the correct behavior, this can be due to maternal mental disorders, or financial or personal challenges. Many of these children are more likely to be diagnosed later on having a disorder or challenged (O’Gorman, 2012).
Ainsworth (1989) discovered that mothers who are able to hold their child immediately after giving birth to their child have more maternal instinct than mothers who hold their child later (Ainsworth, 1989). Which can be a way the mother and child attach, and now today hospitals under most circumstances they ensure this happens (Ainsworth, 1989). But it does not prove that if attachment does not happen immediately it cannot happen. Though as time span divides the period that they are separated the capacity of the attachment will decrease and cannot be restored (Ainsworth, 1989). As a child grows their primitive nature of survival becomes less substantial and their affective behaviour is brought about more on their environment by the time they have their first birthday. At this time a child has learned how to mold a parent’s reaction to certain needs and is beginning to communicate. The child themselves has an ability to move which gives them the opportunity to get what they want without needing an adult for all of their needs which demonstrates that the attachment at this time begins to change and continues to change as the child grows (Connor, Matias, Futh, & Scott, 2014).
Following Infancy
As an infant begins to mature into a child and continue on to adulthood. Matais et al (2014), states that not only how affection was presented to the child affected how the infant behaves, but that the quality of the interaction would be a prediction on how the child social learning is presented including emotional development (G.Connor, Matias, Futh, & Scott, 2014).
Ainsworth (1989) states attachment carries through a lifetime but changes as the environment changes, such as age and as life distinguishes its influences. This can be seen as parents get older and the role of parent and child switches and the parents becomes unable to care for themselves, so the child takes on this role. Also romantic attachment also is seen as sexual pair bonds. This type of bond is not merely for the reproduction of children but as the relationship continues the caregiving as one of the couple may be in need of that nurturing role where one of the couple may take on that role, for others the role is more of a friendship where they have many interests and typically enjoy spending time together (Ainsworth, 1989). In many families, siblings play an influential role on the caregiving of the children, as it is expected for them to take care of their siblings. This attachment can give the child a secure base when beginning to explore unfamiliar areas and a trust is seen in the same way infants and mothers have. For a younger child to watch and become familiar with others who are the older sibling’s gives the child a bases on areas to explore and play by viewing what they are doing as acceptable behaviours (Ainsworth, 1989).
In conclusion attachment is different between each individual but brings together the need for connection and affection. For the first year, maternal attachment leads to developmental growth and social learning. For children who have a secure attachment this behavior is traveled with them through life, as it is seen in social situations and relationships as they grow older. Maternal attachment may not become the most significant as the child grows and becomes an adult but still demonstrates as a basis for other types of attachments thought out a lifespan. (Ainsworth & Tracy, 1981).
Ainsworth, M. D. (1963). Patterns of Attachment Behavior Shows by the Infant in Interaction with his Mother. Merrill-Palmer Quarterly, 51-58.
Ainsworth, M. D. (1989). Attachment Beyond Infancy. American Psychologist, 44(4), 709-716.
Ainsworth, M. D., & Bell, S. M. (1970). Attachment, Exploration adn Separation: Illustrated by the behavior of one year olds in a strange situation. Child Development, 41, 49-67.
Ainsworth, M. D., & Tracy, R. L. (1981). Maternal Affectionate Behavior and Infant Mother Attachment Patterns. Child Development, 52, 1341-1343.
G.Connor, T., Matias, C., Futh, A., & Scott, S. (2014). Observational attachment theory-based parenting measures predict children’s attachment narratives independently from social learning theory-based measures. Attachment & Human Development, 16(1), 77-92.
Miler, P. H. (2011). Theories of Development Psycology (Vol. Fith Edition). New York, New York, USA: Worth Publishers.
Mirecki, R. M., & Chou, J. L. (2013). A multicultural application of attachment theorywith immigrant families: Contextual and developmental adaptations. Contemporary Family Theropy, 35(3), 508-515.
O’Gorman, S. (2012). Attachment Theory, Family System theory, and the child presenting with significant behavioral concerns. Journal of Systemic Therapies, 31(3), 1-16. | https://savedelicious.com/mary-ainsworth-attachment-theory/ |
|(11) Volcanic Activity Summary:||Satellite data suggests ash emissions from Semisopochnoi volcano have been ongoing since early this morning and are continuing. The ash cloud extends up to 217 mi (350 km) southeast of the volcano with heights up to 20,000 feet (6 km) above sea level. Based on the length and height of the ash plume and ongoing nature of ash emissions, AVO is issuing this update; the Color Code/Alert Level remains at ORANGE/WATCH. AVO will continue to monitor the situation.
|
|(12) Volcanic cloud height:||20,000 feet above sea level. or less.|
|(13) Other volcanic cloud information:||continuous ash cloud extends 350 km from volcano.|
|(14) Remarks:||Semisopochnoi is monitored by satellite data, regional infrasound, and lightning detection instruments. An infrasound array on Adak Island may detect explosive emissions from Semisopochnoi with a slight delay (approximately 13 minutes) if atmospheric conditions permit.|
|(15) Contacts:||Aaron Wech, Acting Scientist-in-Charge, USGS
|
[email protected] (907) 786-7497
Jessica Larsen, Acting Coordinating Scientist, UAF
[email protected] (907) 322-4085
|(16) Next Notice:||A new VAN will be issued if conditions change significantly or alert levels are modified. While a VAN is in effect, regularly scheduled updates are posted at http://www.avo.alaska.edu|
This website is supported by the U.S. Geological Survey under Cooperative Agreement Grant G19AC00060 and G19AC00171.
Mention of trade names or commercial products does not constitute their endorsement by the U.S. Geological Survey. | https://www.avo.alaska.edu/activity/avoreport.php?view=chron&id=390081&type=8&month=April&year=2021 |
Sources:
(1) Article: People Have NDEs While Brain Dead: The Case of Pam Reynolds
(2) Book: Light and Death: One Doctor’s Fascinating Account of Near-Death Experiences, by Michael Sabom
(3) Article: Further Analysis of the Veridical Element of Pam Reynolds’ NDE, by Ian Lawton
(4) Article: NDEs: Brain Physiology or Transcendental Consciousness? Or Both?, by Kevin Williams and Gerald Woerlee
2. Out-of-body perception during NDEs have been verified
Dr. Bruce Greyson documented perhaps one of the most compelling examples of a person who had an NDE and observed events while outside of his body which were later verified by others. The only way that these events could have been observed by the experiencer was if in fact he was outside of his body. Al Sullivan was a 55 year old truck driver who was undergoing triple by-pass surgery in 1988 when he had a powerful NDE including an encounter with his deceased mother and brother-in-law, who told Al to go back to tell one of his neighbors their son with lymphoma will live. Furthermore, during the NDE, Sullivan accurately noticed the surgeon, Dr. Hiroyoshi Takata, operating on him was “flapping his arms as if trying to fly” with his hands in his armpits. When he came back to his body after the surgery was over, Sullivan’s cardiologist was startled that Sullivan could describe Dr. Takata’s habit of arm flapping. It was Dr. Takata’s idiosyncratic method of keeping his hands sterile and pointing out to surgical instruments and giving instructions to surgical staff.
Sources:
(1) Article: Do Any NDEs Provide Evidence for the Survival of Human Personality after Death? (PDF), by Cook, Greyson, et al
(2) Website: University of Virginia, Division of Perceptual Studies, Bruce Greyson
(3) Article: People See Verified Events While Out-Of-Body
(4) Book: The Near-Death Experience, Problems, Prospects, Perspectives, by Bruce Greyson, Charles Flynn, et al
(5) Video: Science and Postmortem Survival, by Bruce Greyson
(6) News: Scientists Validate Near-Death Experiences, ABC News
3. People born blind can see during an NDE
Dr. Kenneth Ring and Sharon Cooper completed a two-year study into the NDEs of the blind. They published their findings in a book entitled “Mindsight” in which they documented the solid evidence of 31 cases in which blind people report visually accurate information obtained during an NDE. Perhaps the best example in his study is that of a forty-five year old blind woman by the name of Vicki Umipeg. Vicki was born blind, her optic nerve having been completely destroyed at birth because of an excess of oxygen she received in the incubator. Yet, she appears to have been able to see during her NDE. Her story is a particularly clear instance of how NDEs of the congenitally blind can unfold in precisely the same way as do those of sighted persons… Read more
Sources:
(1) Article: Near-Death and OBEs in the Blind: A Study of Apparent Eyeless Vision (PDF), by Kenneth Ring et al
(2) Article: People Born Blind Can See During an NDE, by Kenneth Ring
(3) Book: Mindsight: Near-Death and Out-of-Body Experiences in the Blind, by Kenneth Ring
4. People have been clinically dead for several days
George Rodonaia underwent one of the most extended cases of a near-death experience ever recorded. Pronounced dead immediately after he was hit by a car in 1976, he was left for three days in the morgue. He did not return to life until a doctor began to make an incision in his abdomen as part of an autopsy procedure. Prior to his NDE he worked as a neuropathologist. He was also an avowed atheist. Yet after the experience, he devoted himself exclusively to the study of spirituality, taking a second doctorate in the psychology of religion. He then became an ordained priest in the Eastern Orthodox Church. He served as a pastor at St. Paul United Methodist Church in Baytown, Texas. Rodonaia held an M.D. and a Ph.D. in neuropathology, and a Ph.D. in the psychology of religion. He delivered a keynote address to the United Nations on the “Emerging Global Spirituality.” Before emigrating to the United States from the Soviet Union in 1989, he worked as a research psychiatrist at the University of Moscow.
Sources:
(1) Article: Some People Have Been Dead For Several Days
(2) Video: Testimony of Dr. George Rodonaia, YouTube Video
(3) Book: Pathways To Peace: Understanding Death and Embracing Life, by Christine Spencer
5. People having NDEs have brought back scientific discoveries
Perhaps the best example of a person having an NDE and bringing back a scientific discovery from it is the NDE of Lynnclaire Dennis (www.mereon.org). Lynnclaire had an NDE where saw a complex geometric structure: a knot of Light she recognized to be “the energy of all matter,” “life itself,” “light”, as well as “time and space.” During her life review, a being of light told her she would be “a catalyst for change” and “for love” in the future. She refers to this knot of light as “The Pattern.” With no knowledge of mathematics or geometry, Lynnclaire provided a detailed description of this new dynamic structure which caught the attention of renowned University of Illinois Chicago knot theorist, Dr. Louis H. Kauffman, who identified it as a previously unknown version of the Trefoil knot: it is geospherical and polarized. The matrix generated by The Pattern was given the scientific name the “Mereon Matrix.” Top scientists around the world became attracted to it when its Prime Frequency derived by the mathematics – a “rational” golden ratio – generated the entire Matrix within the natural medium of water using a CymaScope. It is no stretch of the imagination to say this new mathematical discovery is the very science of life and living. The Mereon Matrix’s sequential process generates a coherent link to living and non-living systems whether they are physical, mathematical, philosophical, or social. The importance of this discovery – the elusive “Pattern of patterns” – is underscored by the fact that a 600+ page academic textbook was published about the Mereon Matrix in 2013 by Elsevier, the world’s leading provider of science and health information. This textbook entitled “The Mereon Matrix: Everything Connected Through (K)nothing” is the culmination of Lynnclaire being a catalyst for change and love as revealed in her NDE. The Mereon Matrix to currently helping humanity solve some of its most critical problems by offering a new way of systems modeling applicable across a multitude of sciences. It provides the world with an algorithm representing the unification of knowledge and gives a scientific framework charting the emergent growth process of systems. Astrobiologist Neville Nick Woolf used the Mereon Matrix to map the formation of matter starting with the Big Bang. The Mereon Matrix defines, and sequentially and dynamically unites, the fundamental forms we know to be the building blocks of matter: the Platonic and Kepler solids. In reference to physics, the Mereon Matrix is a 120/180 polyhedron with triangular faces – a geometric structure which may be the “mother” of all physical matter because it “breathes” and “births” new systems. At the center of the Mereon Matrix is a core structure that is a pattern match for theories about the structure of the nucleus of an atom. The Mereon Matrix is a dynamic process currently being used as a template for a Universal Systems Model. Modeling human clinical molecular genetics is the first example of this application. The Mereon Matrix is currently being explored in multiple scientific domains including alternative energy technologies, medical informatics and healing modalities.
Sources:
(1) Article: Lynnclaire Dennis Near-Death Experience
(2) Article: The Science of Life Discovered From Lynnclaire Dennis’ Near-Death Experience
(3) Website: The Mereon Legacy CIC
(4) News: Elsevier Publishes a Scientific Textbook About a New Mathematical Discovery Found in a Near-Death Experience
(5) Book: The Mereon Matrix: Everything Connected Through (K)nothing, by Lynnclaire Dennis, et al
6. NDEs have produced visions of the future which later became true
Many people were given visions of the future during their near-death experience. Generally, these visions foretell a future of catastrophic natural disasters and social upheaval followed by a new era of peace and have actually already come to pass. Some of them did not happen as foretold. Many of these apocalyptic visions are to happen within the next few decades. Examples of events which have been foretold by the NDE visions of the future by Edgar Cayce include World War I & II, the 1929 Stock Market Crash, the fall of the Soviet Union and communism, the discovery of the Dead Sea Scrolls, the Desert Storm war against Iraq in 1990, and the 9/11 terrorist attack.
Sources:
(1) Article: Some People Correctly Foresee the Future: Dannion Brinkley’s NDE
(2) Article: The NDE and the Future: Kevin Williams’ Research Conclusions
(3) Article: Edgar Cayce on the Future
7. Groups of dying people share the same NDE
A rare type of NDE called the “group near-death experience” is a phenomenon where a whole group of people have an NDE at the same time and location. They see each other outside of their bodies and have a shared or similar experience. In 1996, NDE researcher Arvin Gibson interviewed a fire-fighter named Jake who had a most unusual NDE while working with other fire-fighters in a forest. What makes it unique is that it happened at the same time as several co-workers were also having an NDE. During their NDEs, they actually met each other and saw each other above their lifeless bodies. All survived and they verified with each other afterwards that the experience actually happened. Jake’s near-death experience was so interesting that Gibson’s local chapter of IANDS invited him to tell his story at one of their meetings. Another example of a group NDE is described in the IANDS publication Vital Signs (Volume XIX, No. 3, 2000) and is described in a greater way in Dr. Stephen Hoyer and May Eulitt’s book entitled “Fireweaver: The Story of a Life, a Near-Death, and Beyond.”
Sources:
(1) Article: May Eulitt and Her Friends’ Group Near-Death Experience
(2) Article: John Hernandez and His Firefighting Co-Workers’ Group Near-Death Experience
(3) Article: Steven Ridenhour and His Girlfriend’s Group Near-Death Experience
(4) Article: Four Hospital Patients Group Near-Death Experience
8. NDEs cannot be explained by brain chemistry alone
Dr. Jeffrey Long (www.nderf.org) is a physician practicing the specialty of radiation oncology in Houma, Louisiana. Dr. Long served on the Board of Directors of IANDS, and is actively involved in NDE research. In his book, “Evidence of the Afterlife: The Science of Near-Death Experiences,” Dr. Long documents a study he conducted – the largest scientific study of NDEs ever. It is based on his research of over 1,300 NDEs shared with NDERF. Using his treasure trove of data, Dr. Long explains how NDEs cannot be explained by brain chemistry alone, how medical evidence fails to explain them away and why there is only one plausible explanation – that people have survived death and traveled to another dimension. Dr. Long makes his case using nine lines of evidence and they are the following:
a. Crystal-Clear Consciousness: The level of conscious alertness during NDEs is usually greater than that experienced in everyday life – even though NDEs generally occur when a person is unconscious or clinically dead. This high level of consciousness while physically unconscious is medically unexplained. Additionally, the elements in NDEs generally follow the same consistent and logical order in all age groups and around the world, which refutes the possibility that NDEs have any relation to dreams or hallucinations.
b. Realistic Out-of-Body Experiences (OBEs): OBEs are one of the most common elements of NDEs. Events witnessed and heard by NDErs while in an out-of-body state are almost always realistic. When the NDEr or others later seek to verify what was witnessed or heard during the NDE, their OBE observations are almost always confirmed as completely accurate. Even if the OBE observations include events occurring far away from the physical body, and far from any possible sensory awareness of the NDEr, the OBE observations are still almost always confirmed as completely accurate. This fact alone rules out the possibility that NDEs are related to any known brain functioning or sensory awareness. This also refutes the possibility that NDEs are unrealistic fragments of memory from the brain.
c. Heightened Senses: Not only are heightened senses reported by most who have NDEs, normal or supernormal vision has occurred in those with significantly impaired vision, and even legal blindness. Several people who have been totally blind since birth have reported highly visual NDEs. This is medically unexplainable.
d. Consciousness During Anesthesia: Many NDEs occur while the NDEr is under general anesthesia – at a time when any conscious experience should be impossible. While some skeptics claim these NDEs may be the result of too little anesthesia, this ignores the fact that some NDEs result from anesthesia overdose. Additionally, descriptions of a NDEs differ greatly from those people who experiences “anesthetic awareness.” The content of NDEs occurring under general anesthesia is essentially indistinguishable from NDEs that do not occur under general anesthesia. This is more strong evidence that NDEs occur independent from the functioning of the material brain.
e. Perfect Playback: Life reviews in NDEs include real events which previously occurred in the lives of the NDEr – even if the events were forgotten or happened before they were old enough to remember.
f. Family Reunions: During an NDE, the experiencer may encounter people who are virtually always deceased and are usually relatives of the NDEr. Sometimes they include relatives who died before the NDEr was even born. If NDEs are merely the product of memory fragments, they would almost certainly include far more living people, including those with whom they had more recently interacted.
g. Children’s Experiences: The NDEs of children, including very young children who are too young to have developed concepts of death, religion, or NDEs, are essentially identical to those of older children and adults. This refutes the possibility that the content of NDEs is produced by preexisting beliefs or cultural conditioning.
h. Worldwide Consistency: NDEs appear remarkably consistent around the world, and across many different religions and cultures. NDEs from non-Western countries are incredibly similar to those occurring in people in Western countries.
i. Aftereffects: It is common for people to experience major life changes after having NDEs. These aftereffects are often powerful, lasting, life-enhancing, and the changes generally follow a consistent pattern. NDErs themselves are practically universal in their belief that their experience of the afterlife was real.
Sources:
(1) Article: Common Elements Are Found in NDEs, by P.M.H. Atwater
(2) Book: Evidence of the Afterlife: The Science of Near-Death Experiences, by Jeffrey Long and Paul Perry
9. The skeptical “dying brain” theory of NDEs has been falsified
Two competing hypotheses are advanced in a book by skeptic Susan Blackmore entitled Dying to Live and they are (1) The Afterlife Hypothesis and (2) Susan Blackmore’s Dying Brain Hypothesis. The Afterlife Hypothesis states spirit survives body death. The NDE is the result of spirit separating from the body. The Dying Brain Hypothesis states the NDE is an artifact of brain chemistry. According to the dying brain hypothesis, there is no spirit which survives body death. Skeptics who claim the author of Dying to Live is non biased are proven wrong; skeptics who claim she provides scientific proof are shown, by her own words, to be in error.
Because NDEs have many common core elements, this suggests that they are spiritual voyages outside of the body. Also, if the dying brain creates NDE illusions, what is the purpose for doing it? If our brains are only a high-tech computer-like lump of tissue which produces our mind and personality, why does it bother to create illusions at the time of death? If everything, including the mind and personality, are about to disintegrate, why would the brain produce a last wonderful Grand Finale vision? Even if NDE elements can be reduced to only a series of brain reactions, this does not negate the idea that NDEs are more than a brain thing.
Sources:
(1) Article: A Critique of Susan Blackmore’s Dying Brain Hypothesis, by Greg Stone
(2) News: Science Can’t Yet Explain Near-Death Experiences, Reuters News
(3) News: No Medical Explanation For Near-Death Experiences, New Scientist News
10. Skeptical arguments against NDEs are not valid
Sociologist Dr. Allan Kellehear states that some scientific theories are often presented as the most logical, factual, objective, credible, and progressive possibilities, as opposed to the allegedly subjective, superstitious, abnormal, or dysfunctional views of mystics. The rhetorical opinions of some NDE theories are presented as if they were scientific (Kellehear, 1996, 120). Many skeptical arguments against the survival theory are actually arguments from pseudo-skeptics who often think they have no burden of proof. Such arguments often based on scientism with assumptions that survival is impossible even though survival has not been ruled out. Faulty conclusions are often made such as, “Because NDEs have a brain chemical connection then survival is impossible.” Pseudo-skeptical arguments are sometimes made that do not consider the entire body of circumstantial evidence supporting the possibility of survival or do not consider the possibility of new paradigms. Such pseudo-skeptical claims are often made without any scientific evidence.
Sources:
(1) Article: The NDE and Science: Kevin Williams’ Research Conclusions
(2) Book: Experiences Near Death: Beyond Medicine and Religion, by Allan Kellehear
11. Quantum theory supports concepts found in NDEs
Principles of quantum physics and quantum mechanics supports concepts found in NDEs including a universal light (the Big Bang), a creator of the cosmos (Gödel’s incompleteness theorem), an omnipresent energy field (the “God particle” or Higgs field), a cosmic memory (holographic universe), a holistic oneness of all things (holographic principle), a conscious universe (fractal cosmology), panpsychism (quantum indeterminacy and emergence), collective unconscious (quantum consciousness), consciousness creating reality (Heisenberg’s uncertainty principle), telepathy (quantum entanglement), mind over matter (wave function collapse), synchronicity (space time continuum), mind/brain dualism (wave-particle duality), mind/body separation (quantum nonlocality), an immortal “soul” or consciousness (quantum immortality and the law of conservation of energy: energy can neither be created nor destroyed), out-of-body experiences (quantum superposition), astral body (bioelectromagnetics), bilocation (quantum coherence), the NDE tunnel (black holes and wormholes), multidimensional realms (string theory), a higher self (parallel universes), an invisible realm (dark energy), a Void realm (zero point field), a timeless realm (theory of relativity), entire lifetime memory (holonomic brain theory and Orch-OR), life review flashback (delayed choice quantum eraser experiments), life review flash-forward (many-worlds interpretation), instantaneous spirit travel (electricity teleportation and quantum tunnelling), reincarnation (omega point and quantum gravity), subjectivity as true reality (principle of complementarity), objective reality as illusionary (simulation hypothesis).
Sources:
(1) Article: Quantum Theory Supports Near-Death Experiences
(2) Article: T. Lee Baumann’s NDE and Physics Research
(3) Article: Near-Death Studies and Modern Physics (PDF), by Craig Lundahl et al
(4) Article: Non-Local Effects in the Process of Dying: Can Quantum Mechanics Help? (PDF), by Peter Fenwick
(5) Article: A Quantum Biomechanical Basis for Near-Death Life Reviews, (PDF), by Thomas Beck et al
(6) Article: How the New Physics is Validating NDE Concepts, by C.D. Rollins
(7) Book: The Tao of Physics: An Exploration of the Parallels Between Modern Physics and Eastern Mysticism, by Fritjof Capra
(8) Book: The Physics of God: Unifying Quantum Physics, Consciousness, M-Theory, Heaven, Neuroscience and Transcendence, by Joseph Selbie
(9) Book: God at the Speed of Light: The Melding of Science and Spirituality, by T. Lee Baumann
(10) Book: The Physics of Consciousness: The Quantum Mind and the Meaning of Life, by Evan Harris Walker
12. The transcendent nature of minds in NDEs corresponds with physics
New developments in quantum physics show we cannot know phenomena apart from the observer and how the observer plays a supreme role in creating reality. Arlice Davenport has challenged the hallucination theory of NDEs as outmoded because the field theories of physics now suggest new paradigm options available to explain NDEs. Mark Woodhouse says the traditional materialism/dualism battle over NDEs has already been solved by Einstein. Since matter can now be viewed as a form of energy, an energy body alternative to the material body can now explain NDEs. This is also supported by Dr. Melvin Morse who has described NDEs that are able to realign charges in the electromagnetic field of the human body and wiring of the brain. He reports on patients having NDEs who recover from diseases such as pneumonia, cardiac arrest, and cancer (Transformed by the Light, pp. 153-54) suggesting the brain acts more like a receiver of information much like a television, radio, or cell phone. Signals, such as voice or music, in the form of electromagnetic waves, are received by the brain and processed to make them audible to the senses. At death, the brain (receiver) dies; but consciousness (the signal), in the form of electromagnetic waves, continues to exist (in the airwaves).
Sources:
(1) Article: Energy Monism: A Solution to the Mind-Problem that Connects Science and Spirituality, by Mark B. Woodhouse
(2) Book: Transformed by the Light: The Powerful Effect of Near-Death Experiences on People’s Lives, by Melvin Morse and Paul Perry
(3) Article: A Critique of Susan Blackmore’s Dying Brain Hypothesis, by Greg Stone
(4) Article: The NDE and Science: Kevin Williams’ Research Conclusions
13. NDEs support the “reducing valve” theory of consciousness
One particular theory of consciousness which is supported by NDE research involves the expansion after death. Stanislav Grof, a leading consciousness researcher, explained this theory in the documentary entitled “Life After Death” by Tom Harpur: “My first idea was that it [consciousness] has to be hard-wired in the brain. I spent quite a bit of time trying to figure out how something like that is possible. Today, I came to the conclusion that it is not coming from the brain. In that sense, it supports what Aldous Huxley believed after he had some powerful psychedelic experiences and was trying to link them to the brain. He came to the conclusion that maybe the brain acts as a kind of reducing valve that actually protects us from too much cosmic input … I don’t think you can locate the source of consciousness. I am quite sure it is not in the brain – not inside of the skull … It actually, according to my experience, would lie beyond time and space, so it is not localizable. You actually come to the source of consciousness when you dissolve any categories that imply separation, individuality, time, space and so on. You just experience it as a presence.”
Sources:
(1) Website: Official Website of Stanislav Grof
(2) Article: Do Psychedelics Expand the Mind by Reducing Brain Activity?, Scientific American
(3) Study: Neural correlates of the psychedelic state as determined by fMRI studies with psilocybin, by Carhart-Harrisa, Erritzoea, et al
(4) Book: The Doors of Perception, (PDF), by Aldous Huxley
(5) Book: When the Impossible Happens: Adventures in Non-Ordinary Realities, by Stanislav Grof
(6) Book: The Ultimate Journey: Consciousness and the Mystery of Death, by Stanislav Grof
14. NDEs demonstrate the return of consciousness from death
An anecdotal example of evidence that a person’s consciousness leaves and returns to their body during an NDE comes from the research of Dr. Melvin Morse. Olga Gearhardt was a 63 year old woman who underwent a heart transplant because of a severe virus that attacked her heart tissue. Her entire family awaited at the hospital during the surgery, except for her son-in-law, who stayed home. The transplant was a success, but at exactly 2:15 am, her new heart stopped beating. It took the frantic transplant team three more hours to revive her. Her family was only told in the morning that her operation was a success, without other details. When they called her son-in-law with the good news, he had his own news to tell. He had already learned about the successful surgery. At exactly 2:15 am, while he was sleeping, he awoke to see his Olga, his mother-in-law, at the foot of his bed. She told him not to worry, that she was going to be alright. She asked him to tell her daughter (his wife). He wrote down the message, and the time of day and then fell asleep. Later on at the hospital, Olga regained consciousness. Her first words were “did you get the message?” She was able to confirm that she left her body during her near-death experience and was able to travel to her son-in-law to communicate to him the message. This anecdotal evidence demonstrates that the near-death experience is a return to consciousness at the point of death, when the brain is dying. Dr. Melvin Morse thoroughly researched Olga’s testimony and every detail had objective verification including the scribbled note by the son-in-law.
In June 2005, scientists of the Safar Center for Resuscitation Research at the University of Pittsburgh announced that they succeeded in reviving dogs after three hours of clinical death. The procedure involved draining all the blood from the dogs’ bodies and filled them with an ice-cold salt solution. These dogs were scientifically dead, as their breathing and heartbeat were stopped and they registered no brain activity. But three hours later, their blood was replaced and they were brought back to life with an electric shock with no brain damage. A spokesman said the technique will eventually be tried on humans.
Sources:
(1) Article: The Resurrection Men, ParamedicUK News
(2) Website: Safar Center for Resuscitation Research, University of Pittsburgh, PA
(3) Book: Parting Visions: Uses and Meanings of Pre-Death, Psychic, and Spiritual Experiences, by Melvin Morse
(4) Book: A Lawyer Presents the Case for the Afterlife, by Victor Zammit
(5) Book: Human Personality and Its Survival After Death, by Frederic W. H. Myers
15. Memories of NDEs are More Real Than Normal Memories
Researchers at the Coma Science Group, directed by Steven Laureys, and the University of Liege’s Cognitive Psychology Research, headed by Professor Serge Bredart and Hedwige Dehon, have demonstrated that the physiological mechanisms triggered during NDEs lead to a more vivid perception not only of imagined events in the history of an individual but also of real events which have taken place in their lives. These surprising results – obtained using an original method which now requires further investigation – were published in PLOS ONE. The researchers looked into the memories of NDEs with the hypothesis that if the memories of NDEs were pure products of the imagination, their phenomenological characteristics (e.g., sensorial, self referential, emotional, etc. details) should be closer to those of imagined memories. Conversely, if the NDE are experienced in a way similar to that of reality, their characteristics would be closer to the memories of real events. Their results were surprising. From the perspective being studied, not only were the NDEs not similar to the memories of imagined events, but the phenomenological characteristics inherent to the memories of real events (e.g. memories of sensorial details) are even more numerous in the memories of NDE than in the memories of real events.
Sources:
(1) Article: Characteristics of NDEs Memories as Compared to Real and Imagined Events Memories
(2) Article: The Memories of NDEs: More Real Than Reality?
(3) Article: Features of NDE in relation to whether or not patients were near death, by Owens, Cook, et al
(4) Website: Coma Science Group
(5) Book: Near-death experiences, by Bruce Greyson, in Varieties of Anomalous Experience: Examining the Scientific Evidence, by Cardeña, Krippner, et al
16. Raymond Moody’s NDE study has been replicated
In 1975, Dr. Raymond Moody published a book entitled “Life After Life” which described his findings from his study on near-death experiences. Moody’s book became a bestseller and focused public attention on the NDE like never before. Moody recorded and compared the experiences of 150 persons who died, or almost died, and then recovered. Moody outlined nine elements that generally occur during NDEs: (1) hearing strange sounds, (2) feelings of peace, (3) feelings of painlessness, (4) out-of-body experiences, (5) experiencing a tunnel, (6) rising rapidly into the heavens, (7) seeing beings of light, (8) experiencing a life review, (9) a reluctance to return to the body. Dr. Ken Ring’s replicated this NDE study by Dr. Raymond Moody. Ring’s research conclusions include:
- Dr. Moody’s research findings are confirmed.
- NDEs happen to people of all races, genders, ages, education, marital status, and social class.
- Religious orientation is not a factor.
- People are convinced of the reality of their NDE experience.
- Drugs do not appear to be a factor.
- NDEs are not hallucinations.
- NDEs often involve unparalleled feelings.
- People lose their fear of death and appreciate life more after having an NDE.
- People’s lives are transformed after having an NDE.
Sources:
(1) Book: Life At Death, by Kenneth Ring
(2) Article: Dr. Kenneth Ring’s NDE Research
(3) Website: The Official Site of Dr. Kenneth Ring
(4) Article: The NDE and Science: Kevin Williams’ Research Conclusions
17. NDEs have been validated in scientific studies
On October 23, 2000, The BBC reported: “Evidence of Life After Death” about a study in the UK conducted by Dr. Sam Parnia and others at the University of Southampton which provided scientific evidence suggesting the survival of consciousness after clinical and brain death. Then on June 29, 2001, ABC News reported: “Study Suggests Life After Death: Brains of Dead Heart Attack Patients Still Function” concerning the same study. These findings support other NDE evidence suggestive of life after death.
Sources:
(1) News: Evidence of Life After Death, BBC News
(2) Study: University of Southampton NDE Study
(3) Book: What Happens When We Die?: A Groundbreaking Study into the Nature of Life and Death, by Sam Parnia
(4) Website: Horizon Research Foundation, Erasing Death, by Sam Parnia
(5) News: Soul-searching doctors find life after death, Telegraph UK
18. NDEs can be considered to be an objective experience
Carl Becker, Ph.D. received his Ph.D. from the University of Hawaii in 1981. He has researched NDEs in Japanese hospitals and literature for 30 years. Dr. Becker has published numerous books on bioethics, death and dying, and NDEs in both Japan and the United States. Currently, Dr. Becker is a Professor of Bioethics and Comparative Religion at Kyoto University, Kyoto, Japan. Carl Becker examined four ways in which NDEs may be considered objective:
- Paranormal knowledge that is later verified
- The similarity of deathbed events in different cultures
- Differences between religious expectations and visionary experiences
- Third-party observations of visionary figures, indicating that they were not merely subjective hallucinations (Becker, 1984).
Sources:
(1) Book: Paranormal Experience and Survival of Death, by Carl B. Becker
(2) Article: A Philosopher’s View of Near-Death Research (PDF), by Carl B. Becker
(3) Article: The NDE and Science: Kevin Williams’ Research Conclusions
19. Out-of-body experiences have been validated in scientific studies
In 1968, a paper by Dr. Charles Tart was published entitled “Psychophysiological Study of Out of the Body Experiences in a Selected Subject” which documented the out-of-body experience of a young woman who was one of his research subjects. What makes her particular out-of-body experience remarkable is that she was able to leave her physical body, read a 5-digit number from a significant distance, and correctly recall the number to Dr. Tart upon return to her body. The odds of guessing a 5-digit number correctly are 1 in 100,000. Her OBE is an outstanding example of “veridical out-of-body perception” – where verified events are observed while in an out-of-body state. Read more here..
Sources:
(1) Study: Autoscopic Evidence: Dr. Charles Tart’s Out-of-Body Experience Research
(2) Study: Psychophysiological Study of Out-of-the-Body Experiences in a Selected Subject (PDF), by Charles Tart
(3) Book: The End of Materialism: How Evidence of the Paranormal is Bridging Science and Spirit Together, by Charles Tart
(5) Article: The NDE and Out-of-Body Experiences: Kevin Williams’ Research Conclusions
20. The replication of OBEs satisfies the scientific method
In 2002, Neurologist Professor Olaf Blanke and colleagues at Geneva University Hospital in Switzerland were using electrodes to stimulate the brain of a female patient suffering from Temporal Lobe Epilepsy. They found that stimulating one spot – the “God spot” – the angular gyrus in the right cortex – repeatedly caused out-of-body experiences. The doctors did not set out to achieve this out-of-body effect – they were simply treating the women for epilepsy. Apparently the increased electrical activity in the brain resulting from seizure activity (abnormal electrical activity in the brain), makes sufferers more susceptible to having near-death experiences. The doctors believe the angular gyrus plays an important role in matching up visual information and the brain’s touch and balance representation of the body. When the two become dissociated, an out-body-experience may result. Writing in the journal Nature, “Electrodes Trigger Out-of-Body Experiences,” the Swiss team said out-of-body experiences tended to be short-lived, and to disappear when a person attempts to inspect parts of their body (autoscopy). Professor Blanke told BBC News Online that “OBEs have been reported in neurological patients with epilepsy, migraine and after cerebral strokes, but they also appear in healthy subjects. Awareness of a biological basis of OBEs might allow some patients who suffer frequently from OBEs to talk about them more openly. In addition, physicians might take the phenomenon more seriously and carry out necessary investigations such as an EEG, MRI, and neurological examinations.” However, It must be pointed out that Blanke views OBEs as merely induced mental self-images and not an actual experience of consciousness separating from the physical body. Nevertheless, Blanke’s study does show that OBEs satisfy the scientific method as being a real phenomenon worthy of scientific research.
Sources:
(1) News: Doctors Create Out-of-Body Sensations, BBC News
(2) Article: Out-of-Body Experiences and Brain Localisation, by Vernon M. Neppe
(3) Article: The Trigger of Brain Stimulation: Dr. Bruce Greyson’s NDE Research
21. Autoscopy during NDEs have been validated in scientific studies
Pim van Lommel led a 2001 study concerning the NDEs of research subjects who had cardiac arrest and the results were published in the prestigious medical journal The Lancet.. The findings of the study suggests that research subjects can experience consciousness, with self-identity, cognitive function and memories, including the possibility of perception outside their body during a flat EEG. Those research subjects who had NDEs report that their NDE was a bonafide preview of the afterlife.
Sources:
(1) Study: NDE in Survivors of Cardiac Arrest: A Prospective Study in the Netherlands, by Pim van Lommel, et al
(2) Website: Official Website of Pim van Lommel
(3) Article: About the Continuity of Our Consciousness, by Pim van Lommel
(4) Book: Consciousness Beyond Life: The Science of the Near-Death Experience, by Pim van Lommel
22. Experimental evidence shows NDEs are real experiences
Science demands verifiable evidence which can be reproduced again and again under experimental situations. Dr. Jim Whinnery, of the National Warfare Institute, thought he was simply studying the effects of G forces on fighter pilots. He had no idea he would revolutionize the field of consciousness studies by providing experimental proof that NDEs are real. The pilots were placed in huge centrifuges and spun at tremendous speeds. After they lost consciousness, after they went into seizures, after they lost all muscle tone, when the blood stopped flowing in their brains, only then would they suddenly have a return to conscious awareness. They had “dreamlets” as Dr. Whinnery calls them. These dreamlets are similar to near-death experiences and they often involved a sense of separation from the physical body. A typical dreamlet involved a pilot leaving his physical body and traveling to a sandy beach, where he looked directly up at the sun. The pilots would remark that death is very pleasant.
Sources:
(1) Study: Acceleration Induced Loss of Consciousness: A Review of 500 Episodes (PDF), by James Whinnery
(2) Article: Loss of Consciousness and Near-Death Experiences, by James E. Whinnery
(3) Article: The Trigger of Gravity: Dr. James Whinnery’s NDE Research
23. Dream research supports NDEs and an afterlife
One of the strangest cases in the history of dream research is described in the documentary, The Secret World of Dreams. It describes the amazing story of a woman named Claire Sylvia. She was a professional dancer with several modern dance companies. As the years passed, Claire’s health began to deteriorate. Claire Sylvia had to undergo a heart and lung transplant. Soon after the transplant, she began having strange and incredibly vivid dreams about a young man she didn’t recognize. Eventually, Claire realized that the young man in her dreams was the eighteen-year-old organ donor whose heart and lungs resided in her chest. Through her continuing dream contacts with her donor, she learned a lot about him including his name. She then decided to do the research to find out if this “heavenly” information was correct.
Yale University Pediatric Cancer specialist Dr. Diane Komp reported that many dying children have NDEs which often occurred during dreams. One boy, for example, told Dr. Komp that Jesus had visited him in a big yellow school bus and told him he would die soon. The boy died as he predicted.
According to the celebrated psychiatrist and dream analyst, Marie Louise Von Franz, and based on her analysis of over 10,000 dreams of the dying, the meaning being communicated is that the light of the individual, one of the common metaphors for life that we’ve heard so often, goes out at death but is miraculously renewed on the other side. In other words, the spirit seems to live on. This dream then illustrates perfectly a profound insight of the great psychoanalyst and mentor of Dr. Von Franz, Carl Jung, MD, who has said: “The unconscious psyche believes in a life after death.” According to Jung, dream symbols which exist in the very depths of the soul behave as if the psychic life of the individual will continue. In Dr. Von Franz’ words: “These symbols depict the end of bodily life and the explicit continuation of psychic life after death. In other words, our last dreams prepare us for death.”
Sources:
(1) Article: Dreams and the Near-Death Experience: A Connection to the Afterlife
(2) News: Precognitive Dreams, Science Frontiers
24. Deathbed visions supports NDEs and an afterlife
Dr. Carla Wills-Brandon has researched, in depth, the universal phenomenon of the Deathbed Vision (DBV) and has included her findings in her book, One Last Hug Before I Go. Complete with her own personal encounters, and those of numerous other DBV experiencers, this revolutionary work explores DBVs throughout history, from ancient Egypt to modern-day America. Through the visions and experiences common to all dying people, one can learn more about the spiritual journey that begins with death. According to recent studies, only about 10% of people are conscious shortly before their death. Of this group, 50% to 67% have DBVs.
Sources:
(1) Article: Deathbed Visions, by Carla Wills-Brandon
(2) Website: Official Site of Carla Wills-Brandon
(3) Article: Deathbed Visions, by David Sunfellow
(4) Article: A Lawyer Presents the Case for the Afterlife, Chapter 20, by Victor Zammit
(5) Book: One Last Hug Before I Go: The Mystery and Meaning of Deathbed Visions, by Carla Wills-Brandon
25. Remote viewing supports NDEs and an afterlife
On April 23, 1984, the Washington Post reported: “The Race for Inner Space” about the CIA’s remote viewing program. On August 12, 1985, the Deseret News reported: “The United States is Still Involved in ESP-ionage.” Other media attention followed. One theory about how remote viewing works is that gifted or trained people can tap into a “Universal Mind.” NDE research also suggests the reality of a Universal or Collective Consciousness. Some of the most credible remote reviewers, such as Joseph McMoneagle, received their remote viewing powers from a near-death experience.
Sources:
(1) Website: Official Site of Joseph McMoneagle
(2) News: The Race for “Inner Space”, Washington Post
(3) News: The United States is Still Involved in ESP-ionage, CIA
(4) Article: Remote Viewing, Wikipedia
26. People having NDEs are convinced they saw an afterlife
In 1977, Dr. Kenneth Ring was a brilliant young professor of psychology at the University of Connecticut who read Dr. Raymond Moody’s book, Life After Life, and was inspired by it. However, he felt that a more scientifically structured study would strengthen Moody’s findings. He sought out 102 near-death survivors for his research. He concluded:
“Regardless of their prior attitudes – whether skeptical or deeply religious – and regardless of the many variations in religious beliefs and degrees of skepticism from tolerant disbelief to outspoken atheism – most of these people were convinced that they had been in the presence of some supreme and loving power and had a glimpse of a life yet to come.” (Dr. Kenneth Ring)
For the multitude of near-death experiencers who know they have left their bodies and received a glimpse of life after death, there is no amount of clinical explanation that will ever convince them otherwise
Sources:
(1) Article: People Who Have NDEs are Convinced They Are Real
27. Atheists believe in an afterlife after having NDEs
Atheists have deathbed experiences and near-death experiences just like everyone else does. The philosophy of Positivism, founded by the famous atheist named A. J. Ayer, is the philosophy that anything not verifiable by the senses is nonsense. Because NDEs mark the end of the senses, Positivists believe the survival of the senses after death is nonsense. But this philosophy has been challenged by its founder A. J. Ayer himself. Later in life, Ayer had an NDE where he saw a red light. Ayer’s NDE made him a changed man: “My recent experiences, have slightly weakened my conviction that my genuine death … will be the end of me, though I continue to hope that it will be.” (Ayer, 1988 a,b) (Read more about it from an article in the National Post and an article by Gerry Lougrhan: Can there be life after life? Ask the atheist! (by Gerry Lougrhan, Letter From London, March 18, 2001.)
A non-NDE example comes from Antony Flew, a champion of atheist beliefs for more than 50 years. In a news article titled “Atheist Discovers ‘The Science of God’“: “One of Britain’s most prominent atheists has decided that God might exist after all. Professor Antony Flew now believes there is scientific evidence supporting the theory of some sort of intelligence behind the creation the universe. Professor Flew, 81, a professor emeritus of philosophy at the University of Reading, said that this was the only explanation for the origin of life … “I’m thinking of a God very different from the God of the Christian and far and away from the God of Islam, because both are depicted as omnipotent Oriental despots – cosmic Saddam Husseins,” he said in his new video, “Has Science Discovered God?”
Sources:
(1) Article: NDE Analysis of Atheists
(2) Article: Did Atheist Philosopher See God When He ‘Died’?
(3) Article: What I Saw When I Was Dead (PDF), by A. J. Ayers
(4) Article: Atheist Discovers “The Science of God”, Telegraph UK
28. Childhood NDEs are remarkably similar to adult NDEs
The NDE researcher P.M.H. Atwater has pointed out the fascinating anomaly that an amazing number of people important to the evolution of humankind may well have had such an episode during their childhood. She discusses this at length in both of her books, Future Memory and Children of the New Millennium. Some of the notable child NDEs she came across were Abraham Lincoln, Mozart, Albert Einstein, Queen Elizabeth I, Edward de Vere/the 17th Earl of Oxford (who most likely is the real Shakespeare), Winston Churchill, Black Elk, Walter Russell, plus several others.
Sources:
(1) Article: Children Have NDEs Similar To Adults: P.M.H. Atwater’s NDE Research of Children
(2) Article: Childhood Near-Death Experiences, P.M.H. Atwater’s Research
29. NDEs have been reported for thousands of years
Reports of near-death experiences are not a new phenomenon. A great number of them have been recorded over a period of thousands of years. The ancient religious texts such as The Tibetan Book of the Dead, the Christian Bible, and the Koran describe experiences of life after death which remarkably resembles modern NDEs. The oldest surviving explicit report of an NDE in Western literature comes from the famed Greek philosopher, Plato, who describes an event in his tenth book of his legendary book entitled The Republic. Plato discusses the story of Er, a soldier who awoke on his funeral pyre and described his journey into the afterlife. But this story is not just a random anecdote for Plato. He integrated at least three elements of the NDE into his philosophy: the departure of the soul from the cave of shadows to see the light of truth, the flight of the soul to a vision of pure celestial being and its subsequent recollection of the vision of light, which is the very purpose of philosophy.
Sources:
(1) Article: NDEs Have Been Reported Since Ancient Times: Plato’s Testimony of a Soldier Named Er and His NDE
30. The expansion of consciousness occurs during NDEs
The following NDE descriptions of consciousness expansion supports the theory of consciousness described above by Stanislav Grof. It theorizes that the brain acts as a reducing valve of cosmic input to produce consciousness. At death, this reducing-valve function ceases and consciousness is then free to expand. The following NDEs support this:
a. “I realized that, as the stream was expanding, my own consciousness was also expanding to take in everything in the Universe!” (Mellen-Thomas Benedict)
b. “My mind felt like a sponge, growing and expanding in size with each addition … I could feel my mind expanding and absorbing and each new piece of information somehow seemed to belong.” (Virginia Rivers)
c. “In your life review you’ll be the universe.” (Thomas Sawyer)
d. “This white light began to infiltrate my consciousness. It came into me..It seemed I went out into it. I expanded into it as it came into my field off consciousness.” (Jayne Smith)
e. “My presence fills the room. And now I feel my presence in every room in the hospital. Even the tiniest space in the hospital is filled with this presence that is me. I sense myself beyond the hospital, above the city, even encompassing Earth. I am melting into the universe. I am everywhere at once.” (Josiane Antonette)
f. “I felt myself expanding and expanding until I thought, “I’m going to burst!” The moment I thought, “I’m going to burst!”, I suddenly found myself alone, back where this being had met me, and he had gone.” (Margaret Tweddell)
g. Susan had an out-of-body experience where she left her body and grew very big, as big as a planet at first, and then she filled the solar system and finally she became as large as the universe. (Susan Blackmore)
31. NDEs triggered by drugs satisfies the scientific method
Dr. Karl Jansen is a Member of the Royal College of Psychiatrists and is the world’s leading expert on ketamine. He has studied ketamine at every level. While earning his doctorate in clinical pharmacology at the University of Oxford, he photographed the receptors to which ketamine binds in the human brain. He has published papers on his discovery of the similarities between ketamine’s psychoactive effects and the near-death experience during his study of medicine in New Zealand. Because there exists a biological basis for NDEs and a method to replicate NDEs, this satisfies the scientific criteria for NDEs being a real, scientific phenomenon. However, this is not to say there are no problems with comparing hallucinations with NDEs as will be shown later in this web page. Dr. Karl Jansen’s ketamine research findings include:
a. NDEs and ketamine produce identical visions (see Ketamine: Dreams and Realities).
b. NDEs and ketamine both induce real visions of a real god (see this Lycaeum.org article: Using Ketamine to Induce the NDE).
c. Ketamine affects the right temporal lobe, the hippocampus and associated structures in the brain, the “God” spot (see this online paper Can Science Replace Religion?).
d. NDEs are an important phenomenon that can safely be reproduced by ketamine (see How to Have an NDE).
Sources:
(1) Book: Ketamine: Dreams and Realities (PDF), by Karl Jansen
(2) Article: Kevin Williams’ Research Conclusions: The NDE and Science
32. NDEs are different from hallucinations
NDEs are not a denial of reality, as is often seen in drug or oxygen deprivation induced hallucinations. There are not the distortions of time, place, body image and disorientations seen in drug induced experiences. They instead typically involve the perception of another reality superimposed over this one. For example, one young boy told Dr. Melvin Morse that “god took me in his hands and kept me safe” while medics were frantically trying to revived his body after a near drowning. He said and understood everything happening to him, but simply perceived something we usually don’t perceive at other times in our lives. German psychiatrist Michael Schroeter-Kunhardt in his extensive review of all published near death research states there is no reason to believe NDEs are the result of psychiatric pathology or brain dysfunction.
Sources:
(1) Article: Dr. Melvin Morse’s NDE Expert Page
(2) Article: A Review of Near-Death Experiences, by Michael Schroeter-Kunhardt
(3) Article: Are NDEs Hallucinations?, by Kevin Williams
(4) Article: Is the NDE Only N-Methyl-D-Aspartate Blocking? (PDF), by Peter Fenwick
33. NDEs change people unlike hallucinations and dreams
No matter what the nature of the NDE, it alters lives. Alcoholics find themselves unable to imbibe. Hardened criminals opt for a life of helping others. Atheists embrace the existence of a deity, while dogmatic members of a particular religion report “feeling welcome in any church or temple or mosque.”
Nancy Evans Bush, president emeritus of the International Association for Near-Death Studies, says the experience is revelatory. “Most near-death survivors say they don’t think there is a God,” she says. “They know.” In 1975, when Raymond Moody published Life After Life, a book that coined the term “near-death experience” (NDE) to describe this hard-to-define phenomenon. Moody interviewed 150 near-death patients who reported vivid experiences (flashing back to childhood, coming face to face with Christ). He found that those who had undergone NDEs became more altruistic, less materialistic, and more loving.
Bruce Greyson and Ian Stevenson have been instrumental in gathering evidence indicating that religious backgrounds do not affect who is most likely to have an NDE. They have mapped out the conversion-like effects of NDEs that can sometimes lead to hardship. “They can see the good in all people,” Greyson says of people who have experienced the phenomenon. “They act fairly naive, and they often allow themselves to be opened up to con men who abuse their trust.” They have gathered reports of high divorce rates and problems in the workplace following NDEs. “The values you get from an NDE are not the ones you need to function in everyday life,” says Greyson. Having stared eternity in the face, he observes, those who return often lose their taste for ego-boosting achievement. Not even the diehard skeptics doubt the powerful personal effects of NDEs. “This is a profound emotional experience,” explains Nuland. “People are convinced that they’ve seen heaven.”
Sources:
(1) News: Is There Life After Death? (PDF), U.S. News & World Report
(2) Article: Getting Comfortable With Near Death Experiences: An Overview of Near-Death Experiences, by Bruce Greyson
(3) Article: People Are Dramatically Changed By NDEs, by P.M.H. Atwater
34. NDEs have advanced the field of medical science
Another example of bringing back scientific discoveries resulting from an NDE comes from Mellen-Thomas Benedict. After his NDE, Mellen-Thomas Benedict brought back a great deal of scientific information concerning biophotonics, cellular communication, quantum biology, and DNA research. Mellen-Thomas Benedict currently holds eight U.S. patents and is always working on more. In a 2007 interview with Guy Spiro of Lightworks, Mellen-Thomas discusses this phenomenon:
“One of the things I did that got me a lot of attention was working with the University of Texas. I was brought in with Dr. Ken Ring and not told what it was going to be or any details whatsoever and I didn’t know anything until we entered the room. By the way, this was videotaped and recorded. At that time, I could do almost a self hypnosis and get to the light.
“So, the University of Texas sat me down and they said, ‘Today, we are going to be working on something call CNT.’ That was all the information that they gave me, that it was a medical problem, and then I did my technique. In those days, the only tools that I brought with me were a big pad of paper and large Crayola crayons. I could sit there, go to the light and still speak to you and draw pictures while seeing.
“With this experiment, I went to the light and asked ‘What information can we bring back?’ I almost immediately started drawing and I drew something that to me looked like two horse shoes. A big horse shoe facing down on the bottom and a smaller horse shoe facing up on top. I said, ‘The answer is in this upper horse shoe and it’s these three segments.’ I numbered them exactly and I said, ‘That’s where the problem is and the real problem is in this third piecing which is this thing.’ I was pointing out a gene, but I didn’t know any of that. And then I drew picture and I said, ‘There are two heads on it and one head is normal and the one that isn’t right is overriding the head that is. If we can figure out a way to cleave that head off, I think we can cure this.’
“It turns out that I was exactly right. I helped decode a genetic disease and the information was very accurate. Everybody thanked me and I went away. Then about three months later, I started getting letters and calls saying, ‘My God, you hit it right on the head! This is astounding. There is no way you could have had this information in advance.’ I did a fair number of projects like that and a fair number of think tanks, all of which you have to sign nondisclosures and promise to never talk about. I worked in a lot of think tanks with some very impressive world class scientists over the next ten years until I retired from all that in 1995.”
Sources:
(1) Article: Mellen-Thomas Benedict’s Near-Death Experience
(2) Article: A Conversation With Mellen-Thomas Benedict, by Guy Spiro
35. NDEs have advanced the field of psychology
In a hospital in Switzerland in 1944, the world-renowned psychiatrist Carl G. Jung, had a heart attack and then a near-death experience. His vivid encounter with the light, plus the intensely meaningful insights led Jung to conclude that his experience came from something real and eternal. Jung’s experience is unique in that he saw the Earth from a vantage point of about a thousand miles above it. His incredibly accurate view of the Earth from outer space was described about two decades before astronauts in space first described it. Subsequently, as he reflected on life after death, Jung recalled the meditating Hindu from his near-death experience and read it as a parable of the archetypal Higher Self, the God-image within. Carl Jung, who founded analytical psychology, centered on the archetypes of the collective unconscious. During his near-death experiences, he met the avatar of the physician who was treating him and was still living on Earth.
Sources:
(1) Article: The Father of Analytical Psychology: Carl Jung’s Near-Death Experience
(2) Article: Analytical Psychology, Wikipedia
(3) Article: Category: Carl Jung, Wikipedia
(4) Book: Memories, Dreams, Reflections, by Carl G. Jung
(5) Website: The Jung Page and Center
36. NDEs have advanced the fields of philosophy and religion
Philosophies and religions were founded on NDEs. The famed Greek philosopher, Plato, described at the conclusion of his legendary work entitled The Republic, the NDE account of a soldier named Er which has greatly influenced religious, philosophical, and scientific thought for many centuries.. Plato integrated at least three elements of this NDE into his philosophy: (1) The departure of the soul from the “cave of shadows” to see the light of truth, (2) The flight of the soul to a vision of pure celestial being, (3) Its subsequent recollection of the vision of light, which is the very purpose of philosophy.
When it comes to religion, one NDE was responsible for making Christianity a world religion. The apostle Paul once persecuted Christians until he converted to Christianity himself because of an NDE which he described as follows: “I know a person in Christ who fourteen years ago was caught up the third heaven. Whether it was in the body or out of the body I do not know – God knows. And I know that this person – whether in the body or apart from the body I do not know, but God knows – was caught up to paradise. He heard inexpressible things, things that people are not permitted to tell. (2 Corinthians 12:2-4). In this letter, Paul based his authority as an apostle on this NDE. Some or all of his revelations of Jesus certainly came from this NDE. The inspiration of much of the New Testament can therefore be attributed to Paul’s NDE.
Tibetan Buddhism is a religion based upon the NDEs of “deloks” which are described in the Tibetan Book of the Dead, whose actual title is “The Great Liberation upon Hearing in the Intermediate State” or “Bardo Thodol.” This holy book describes what happens after death and has striking parallels with modern NDEs. The Bardo Thodol is a guide that is read aloud to the dead while they are in the out-of-body state between death and reincarnation in order for them to recognize the nature of their mind and attain liberation from the cycle of rebirth. The Bardo Thodol teaches that once awareness is freed from the body, it creates its own reality as one would experience in a lucid dream. This dream occurs in various afterlife realms (bardos) in ways both wonderful and terrifying. Overwhelming peaceful and wrathful visions and beings appear. Because the deceased may be in a state of confusion due to its disconnection from its physical body, it might need help and guidance in order for enlightenment and liberation (Nirvana) to occur. The Bardo Thodol teaches how we can attain Nirvana by recognizing the heavenly realms instead of entering into the lower realms where the cycle of birth and rebirth continue.
Sources:
(1) Article: NDEs Have Been Reported Since Ancient Times: Plato’s Testimony of a Soldier Named Er and His NDE
(2) Article: The Tibetan Book of the Dead, Wikipedia
(3) Article: NDEs and Christianity: Testimonials of Those Who Have Seen Jesus
(4) Article: Moses’ Revelation’ on Mount Horeb as a Near-Death Experience (PDF), by Dov Steinmetz
(5) Article: Experiences of Soul Journeys in the World’s Religions: the Journeys of Mohammed, Saints Paul and John, Jewish Chariot Mysticism, etc. (PDF), by Roger Walsh
37. NDEs have the nature of an archetypal initiatory journey
Dr. Kenneth Ring believes NDEs can be viewed psychologically as archetypal initiatory journeys involving a death of one’s old ego and a rebirth of a new Self. In addition, he thinks an adequate interpretation must incorporate the spiritual realm of Kundalini experiences, the imaginal realm, and the Mind at Large. As Ring envisions in his essay in the book, The Near-Death Experience: A Reader, this shift in thinking will deconstruct our traditional Western worldview. It may bring a dramatic next step of evolution towards a more ecological and more compassionate consciousness.
Sources:
(1) Article: Near-Death and UFO Encounters as Shamanic Initiations Some Conceptual and Evolutionary Implications, by Kenneth Ring
(2) Article: Carl Jung’s Near-Death Experience
(3) Article: Archetypal Near-Death Experiences, by Kevin Williams
(4) Article: Jung and the Beyond (PDF), by Eduard C. Heyning
(5) Article: On Life After Death (Analytical Psychology) (PDF), by Carl G. Jung
(5) Book: The Near-Death Experience: A Reader, by Lee W. Bailey, Jenny Yates
(6) Book: The Red Book (PDF), by Carl G. Jung
38. Contact with the deceased have occurred under scientific controls
On October 4, 1999, the University of Arizona announced a study conducted by Dr. Gary Schwartz: “UA Researchers Look Beyond the Grave” concerning scientific evidence supporting a theory of the existence of a Universal Living Memory. This was achieved by testing highly qualified psychic mediums to see if they could contact the dead. The success of this study is important in that it supports NDE research in providing a scientific foundation toward investigating the survival of consciousness after death.
Sources:
(1) Article: Scientist Claims Proof of Afterlife
(2) Study: Accuracy and Replicability of After-Death Communication (HBO experiment), by Gary Schwartz, et al
39. Many people have experienced after-death communications
An after-death communication (ADC) is a spiritual experience that occurs when a person is contacted directly and spontaneously by a family member or friend who has died. During their seven years of research, Bill and Judy Guggenheim at www.after-death.com collected more than 3,300 firsthand reports from people who believe they have been contacted by a deceased loved one. Their book, Hello From Heaven, documents many such experiences.
Sources:
(1) Article: After-Death Communications: Bill and Judy Guggenheim’s Research
(2) Article: Study Shows Psychic Mediums Really Can Read Your Deep Secrets
(3) Article: After-Death Communication Synchronicities From a Mother to Her Family – by Kevin R. Williams, B.Sc.
(4) Article: The Ghosts of Flight 401, by John G. Fuller
(5) Book: Hello from Heaven: A New Field of Research-After-Death Communication Confirms That Life and Love Are Eternal, by Bill and Judy Guggenheim
40. A transcendental “sixth sense” of the human mind exists
On September 11, 2003, new research by the Institute of Psychiatry caused British scientists to announce that there is convincing evidence that people are capable of paranormal feats, such as premonitions, telepathy, and out-of-body experiences. The British Association for the Advancement of Science was told an increasing number of experiments support the theory of a human “sixth sense” – an ability which may have its roots in our past, when the ability to sense the presence of a predator was a matter of life or death. The view that people are capable of paranormal feats, such as premonitions, telepathy, and out-of-body experiences, is supported by new research by the Institute of Psychiatry, which suggests the human mind may exist outside the body like an invisible magnetic field. The research is being led by Dr. Peter Fenwick, a neuropsychiatrist at London University, who has just completed a survey of heart patients claiming to have had “near-death experiences” after their hearts had stopped beating.
Sources:
(1) News: Study Into Near-Death Experiences Supports Theory of a Sixth Sense, Scotsman
(2) Article: Science and Spirituality: A Challenge for the 21st Century, by Peter Fenwick
(3) Book: The Truth in the Light: An Investigation of over 300 Near-Death Experiences, by Peter Fenwick
(4) Website: Horizon Research Foundation
41. The brain’s connection to a higher power has been validated
Dr. Melvin Morse is the former Associate Professor of Pediatrics at the University of Washington and has studied near-death experiences in children for over 15 years and is the author of several outstanding books on the subject. In his book, Where God Lives, Morse makes the case that a connection to the right temporal lobe of the brain (the “God Spot”) to a higher power or “force” in the universe has been validated in the merging of scientific and paranormal research. Such research includes the following:
a. Right temporal lobe activity verifies the reality of the brain’s connection to a higher power (see Where God Lives)
b. Memories can exist outside of the brain (see Holonomic Brain Theory, Holographic Principle, Orch-OR).
c. Evidence exists supporting the theory that consciousness exists in some form after death (see the NDE of Pam Reynolds).
d. People can exhibit supernatural powers after having an NDE (see Joseph McMoneagle and Remote Viewing).
e. The brain can be induced to have paranormal experiences (see The Trigger of Brain Stimulation).
f. Consciousness research supports the reality of discarnate consciousness (see Dr. Gary Schwartz HBO Study) and global consciousness (see The Global Consciousness Project).
g. Scientific evidence exists supporting the theory of reincarnation (see Dr. Ian Stevenson’s research).
Sources:
(1) Book: Where God Lives: The Science of the Paranormal and How Our Brains are Linked to the Universe, by Melvin Morse, Paul Perry
(2) Article: Quantum Theory Supports Near-Death Experiences, by Kevin Williams
(3) Book: Light and Death: One Doctor’s Fascinating Account of Near-Death Experiences, by Michael Sabom
(4) Website: Official Website of Joseph McMoneagle
42. Apparitions of the dead have been induced under scientific controls
Dr. Raymond Moody, who became famous for his pioneering studies of NDEs, has been working on ways of inducing facilitated apparitions in a controlled setting. He took as his model classic works from ancient Greece which suggested that when people wished to contact a deceased loved one they consulted with an ‘oracle’ at a psychomanteum. A psychomanteum is a specially built laboratory using mirrors to help facilitate the psychic process. Part of the actual psychic process includes the sending of telepathic messages, sending vibrations – to the selected recipient in the afterlife. Moody has reconstructed the process with astonishing results – 85% of his clients who go through a full day of preparation do make contact with a deceased loved one – but not necessarily the one that they are seeking to meet. In most cases this occurs in his specially build psychomanteum but in 25% of cases it happens later in their own homes – the client wakes up and sees the apparition at the foot of the bed (Moody 1993:97). According to Dianne Arcangel, an associate of Dr. Moody, in some cases when contact is made with intelligences from the afterlife information is transmitted to reveal something that the person seeking contact does not know (1997). Moody gives full instructions on how to create your own psychomanteum in his book Reunions: Visionary Encounters with Departed Loved Ones and on his Psychomanteum page.
Sources:
(1) Book: Reunions: Visionary Encounters with Departed Loved Ones, by Raymond Moody, Paul Perry
(2) Book: A Lawyer Presents the Evidence for the Afterlife, by Victor Zammit
(3) Article: The Trigger of Psychomanteum: Dr. Raymond Moody’s Psychomanteum Research
43. Studies show prayer to be effective under scientific controls
On October 25, 1999, BBC News reported: “Healing Power of Prayer Revealed” about a study at a university hospital in Kansas City, U.S. about scientific evidence of healing through the power of prayer. Then on June 5, 2000, BBC News reported: “Prayer Works as a Cure” about a different study conducted at the University of Maryland providing more evidence of healing through prayer. These findings support NDE research findings which demonstrates the reality of a transcendent consciousness. Dr. Larry Dossey has done extensive research on the efficacy of prayer and has written several excellent books on the subject.
Sources:
(1) News: Prayer Works as a Cure, BBC News
(2) News: Healing Power of Prayer Revealed, BBC News
44. Scientific evidence of reincarnation supports an afterlife
On June 11, 1992, at Princeton University, Dr. Ian Stevenson presented a paper entitled: “Birthmarks and Birth Defects Corresponding to Wounds on Deceased Persons” providing scientific evidence suggestive of reincarnation which was published in the Journal of Scientific Exploration. These findings support reincarnation in NDE research findings as well. Reincarnation has been called by some to be the greatest unknown scientific discovery today. In the last chapter of Dr. Ian Stevenson’s book entitled Twenty Cases Suggestive of Reincarnation (1967), he provides rigorous scientific reasoning to show how reincarnation is the only viable explanation that fits the facts of his study. He considers every possible alternative explanation for his twenty cases of young children who were spontaneously able to describe a previous lifetime as soon as they learned to talk. He was able to rule out each alternative explanation using one or more aspects of these cases. Later research has even bolstered his case in favor of the existence of reincarnation. His study is also completely reproducible which means that anybody who doubts the validity of this study is perfectly welcome to repeat it for themselves. I believe it is only a short matter of time before his discovery of the existence of reincarnation is finally realized by the scientific community and the world to be accepted as one of the greatest scientific discoveries of all time.
Sources:
(1) Article: Can Reincarnation Be Proven? How Researchers Have Investigated Claims of Past Lives
(2) Article: Birthmarks and Birth Defects Corresponding to Wounds on Deceased Persons (PDF) by Ian Stevenson
(3) Article: Carol Bowman’s Library of Articles and Cases on Reincarnation
45. NDEs support the reality of reincarnation
Amber Wells was a student at the University of Connecticut and wrote a research paper based on her study of the near-death experience for her senior honors thesis under the direction of Dr. Ken Ring. Her paper was published in the Journal of Near-Death Studies in the fall of 1993. In her study, 70 percent of the group of near-death experiencers demonstrated belief in reincarnation. Claims have been documented by other researchers of direct knowledge of reincarnation which became available during the near-death experience itself. An example of this type out-of-body research of knowledge can be seen in a letter written to Dr. Ken Ring by John Robinson: “It is a matter of personal knowledge from what the being with whom I spoke during my near-death experience told me about my older son, that he had had 14 incarnations in female physical bodies previous to the life he has just had.”
Sources:
(1) Article: Reincarnation Beliefs Among Near-Death Experiencers, by Amber Wells (PDF)
(2) Article: The NDE and Reincarnation: Kevin Williams’ Research Conclusions
(3) Article: Abraham Lincoln and John F. Kennedy: Evidence of Reincarnation
46. Xenoglossy supports reincarnation and an afterlife
One of the most amazing psychic phenomena, which religionists, skeptics and atheists have continuously and deliberately ignored is xenoglossy – the ability to speak or write a foreign language a person never learned. After all other explanations have been investigated – such as fraud, genetic memory, telepathy and cryptomnesia (the remembering of a foreign language learned earlier), xenoglossy is taken as evidence of either memories of a language learned in a past life or of communication with a discarnate entity— a spirit person. There are many cases on record of adults and children speaking and writing languages which they have never learned. Sometimes this happens spontaneously but more often it occurs while the person is under hypnosis or in an altered state of consciousness. In some cases it is only a few words remembered but in other cases the person becomes totally fluent and able to converse with native speakers sometimes in obscure dialects which have not been in use for centuries. There are literally thousands of xenoglossic cases, many hundreds of which have been documented. They involve modern and ancient languages from all over the world. Psychic investigators, such the highly credible Dr. Ian Stevenson, used scientific method to illustrate xenoglossy and claim that there are only two possible explanations — either spirit contact or past life memory both of which are evidence for the afterlife.
Sources:
(1) Article: A Lawyer Presents the Case for the Afterlife, Chapter 22, by Victor Zammit
47. Past-life regression supports reincarnation and an afterlife
Past life regression such as that practiced by Dr. Michael Newton, simply involves placing a person under hypnosis and asking them to go back through their childhood to a time before they were born. In many cases the person begins talking about his or her life or lives before the present lifetime, about their previous death and about the time between lives including the planning of the present lifetime. The main reason why at least some of these claims must be considered as evidence are:
a. The regression frequently leads to a cure of a physical illness.
b. In some cases the person regressed begins to speak an unlearned foreign language.
c. In some cases the person being regressed remembers details of astonishing accuracy which when checked out are verified by the top historians.
d. The emotional intensity of the experience is such that it convinces many formerly skeptical psychiatrists who are used to dealing with fantasy and imagined regressions.
e. In some cases the alleged cause of death in an immediate past life is reflected by a birthmark in the present life.
Sources:
(1) Article: Michael Newton and the Journey of Souls
(2) Website: The Newton Institute for Life Between Lives Hypnotherapy
(3) Article: A Lawyer Presents the Evidence for the Afterlife, Chapter 24, Victor Zammit
48. The Scole Experiments supports NDEs and an afterlife
Victor Zammit is a lawyer who has collected a large body of evidence supporting the reality of an afterlife. Zammit has an excellent article concerning what many regard as the greatest afterlife experiment in the world. The evidence collected over a period of more than four years and with more than 500 sittings by the Scole Experiments and the afterlife team is absolute, definitive and irrefutable. Scole is a village in Norfolk, England. Using it as a base, mediums Robin and Sandra Foy and Alan and Diana Bennett and other experimenters produced brilliant evidence of the afterlife in England, the U.S. Ireland and in Spain. Their results are being repeated by other groups around the world and will convince even the toughest open-minded skeptic. The group began with two mediums delivering messages from a non-physical group. Many of these messages contained personal information that nobody else could know about. Soon the messages came in the form of voices which could be heard by all in the room. Then came the actual materialization of people and objects from the non-physical side.
Sources:
(1) Article: The Scole Experiments Prove the Afterlife, by Victor Zammit
(2) Article: The Scole Investigation: A Study in Critical Analysis of Paranormal Physical Phenomena, by Montague Keen
49. Electronic voice phenomena supports NDEs and an afterlife
For more than 50 years, experimenters all over the world have been tape recording “paranormal voices” – voices which cannot be heard when a tape recorder is playing but which can be heard when the tape is played back. Many of these messages have been reported to be from loved ones who have passed on. Such messages would include the experimenter’s name and also answers to the experimenter’s questions. It is a phenomenon known as “EVP” or “electronic voice phenomenon” and there are thousands of researchers around the world researching this fascinating psychic phenomenon. This phenomenon is particularly relevant to evidence supporting the survival hypothesis because it follows strict scientific procedures and have been duplicated under laboratory conditions by various of researchers in many different countries.
Friedrich Jürgenson (pictured above) is considered to be the “The father of EVP” because he was the first to capture EVP successfully on a recording device. One particular recording changed his life forever. After playing back on of his recordings, he was shocked to hear his mother’s voice say “Friedel can you hear me. It’s mammy.” Friedrich’s mother had long ago passed away and the endearment he heard was used exclusively by her. Jürgenson was now convinced these unusual audio transmissions were voices from the afterlife. In 1964, Jürgenson published a book on his EVP research entitled “The Voices From Space.”
After reading Friedrich Jürgenson’s book, Dr. Konstantins Raudive (1909–1974), a Latvian psychologist who was a student of Carl Jung, meet with Jürgenson and conducted EVP experiments with him. As a result, in 1965, Raudive began to conduct his own EVP research and with the help of various electronics experts, Raudive recorded over 100,000 audiotapes, most of which were conducted using strict laboratory conditions. Raudive would confirm the accuracy of his recordings by inviting listeners to hear and interpret them. Over 400 people were involved in his EVP research and all heard the voices. This culminated in his 1968 book entitled “Breakthrough: An Amazing Experiment in Electronic Communication With the Dead.” Raudice’s research into EVP gave experimenters various methods for recording EVP’s including the EVP classification scale that is used by researchers today. The popular paranormal TV series called “Ghost Adventures” features an overwhelmingly number of convincing EVP recordings as they occur.
Sources:
(1) Article: Konstantin Raudive and His ITC EVP Breakthrough
(2) Website: Association TransCommunication
(3) Website: World Instrumental Transcommunication
(4) TV Show: Ghost Adventures Home Page
(5) Book: Breakthrough: An Amazing Experiment in Electronic Communication With the Dead, by Konstant Raudive
50. Psychometry supports NDEs and an afterlife
According to Wikipedia.org, “psychometry” is a psychic ability in which the user is able to relate details about the past condition of an object or area, usually by being in close contact with it. The user could allegedly, for example, give police precise details about a murder or other violent crime if they were at the crime scene or were holding the weapon used. About.com’s Paranormal Phenomena website lists information about several of the most convincing psychometrists.
Stefan Ossowiecki, a Russian-born psychic, is one of the most famous psychometrists. Ossowiecki claimed to be able to see people’s auras and to move objects through psychokinesis. His psychic gifts enabled this chemical engineer to locate lost objects and missing people, and he assisted in several criminal investigations. In 1935, he participated in a test of his psychometric powers – a test devised by a wealthy Hungarian named Dionizy Jonky that involved a sealed package. Jonky stipulated that this test was to be conducted eight years after his death. (Jonky and Ossowiecki did not know each other.) First, 14 photographs of men were placed in front of Ossowiecki, one of which was of Jonky. Ossowiecki picked out the correct photo. Next, Ossowiecki accurately described many details of Jonky’s life and correctly identified the man who held the package for the past eight years. Finally, Ossowiecki was presented with the sealed package Jonky had prepared before his death. Ossowiecki touched the package and concentrated. “Volcanic minerals,” he said. “There is something here that pulls me to other worlds, to another planet.” Oddly, he also sensed sugar. Inside the package was a meteorite encased in a candy wrapper.
In later experiments, Ossowiecki performed remarkable psychometric feats with archeological objects – a kind of psychic archeology. These tests were conducted by Stanislaw Poniatowski, a professor of enthology at the University of Warsaw who could verify the accuracy of what Ossowiecki “saw.” While holding a 10,000-year-old piece of flint, Ossowiecki was able to describe in amazing detail the lives of the prehistoric people who made it. In other tests he provided similar descriptions of people who lived as long ago as 300,000 years. Some of the information he provided was not even known by experts at the time, but confirmed by discoveries years later!
Ossowiecki described his visions as being like a motion picture that he could watch, pause, rewind and fast-forward – like a videotape or DVD.
Sources:
(1) Article: What You Need To Know About … Psychometry
(2) Article: The Ontario Canada Psychometry Experiment – An Ontario, Canada psychometry study.
(3) Book: A World In A Grain Of Sand: The Clairvoyance of Stefan Ossowiecki by Barrington, Stevenson, et al
51. Other anomalous phenomena supports an afterlife
Other anomalous phenomena supports the Afterlife Hypothesis including astral projection research such as that done by Jerry Gross. Also anomalous phenomena associated with the following:
- Deathbed Visions
- Quantum Theory
- Dream Research
- After-Death Communications
- Reincarnation
- Hypnosis
- Synchronicity
- Remote Viewing
- Consciousness Research
Sources:
(1) Article: Jerry Gross’ Out-of-Body Research
(2) Article: The NDE and Science: Kevin Williams’ Research Conclusions
52. The burden of proof has shifted to skeptics of an afterlife
All neurological theories concluding NDEs to be only a brain anomaly, must show how the core elements of the NDE occur subjectively because of specific neurological events triggered by the approach of death. These core elements include: the out-of-body state, paranormal knowledge, the tunnel, the golden light, the voice or presence, the appearance of deceased relatives, and beautiful vistas. Perhaps the final word should go to Nancy Evans Bush, a NDEr with the International Association for Near-Death Studies, who said: “There is no human experience of any description that can’t simply be reduced to a biological process, but that in no way offsets the meaning those experiences have for us – whether it’s falling in love, or grieving, or having a baby.”
Sources: | https://near-death.com/afterlife-evidence/ |
Pierre Zimmerman, MS
Pierre Zimmerman has been working in Behavioral and Elder Health Care for over 30 years in many capacities including business administration, clinical program development, and contracting and marketing in the US and in Canada. He holds a BA in psychology and Eastern philosophy and an MS degree in organizational management.
Pierre received his mindfulness training at the University of Massachusetts Center for Mindfulness in Medicine, Health Care, and Society, where he trained with Jon Kabat-Zinn, Saki Santorelli, and Diana Kamila. He has been teaching Mindfulness Based Stress Reduction classes for over 10 years to the general public as well as special groups including: law enforcement personnel, physicians and other clinicians, people with chronic illness, and those affected by domestic violence. The Saratoga Stress Reduction Program has served over 3300 people in the last 12 years. He also teaches mindfulness and leads support groups for cancer patients and caregivers at Saratoga Hospital. Private courses are available by request.
Pierre provides several organizational management and wellness workshops to professionals in local and international business organizations which include: Mindful Practices in the Workplace, Mindful Leadership, Managing Change in the Workplace, Moral Distress and Burn Out, Balancing Home Life and Work Life, Team Building, Compassionate Care for the Dying, and Embodied Awareness Practices. He is promoting a Wellness Program for Physicians, PA’s and Nurse Practitioners at Saratoga Hospital.
Pierre is an ordained Buddhist chaplain in end of life care for Upaya Zen Center in Santa Fe. He worked as a chaplain at the d’Amour Cancer Care Center as well as at Baystate Medical Center as an interfaith chaplain. He has mentored many international chaplaincy students at Upaya for over a decade. He leads many meditations in the community and Dharma Meditation every Sunday morning.
He officiates weddings and memorials and belongs to the Saratoga Clergy Committee. He is on the board of directors of Beyond My Battle, a non-profit for people with disability and a team member for NP Palliative Care Team. | https://www.oneroofsaratoga.com/practitioner/pierre-zimmerman/ |
Chapters 15-18 in Business Essentials explain in detail the roles of accounting, money, and banking in our economic business environment. These Chapters further describe the management of business finances, highlighting the ramifications of poor accounting, financial, and ethical decisions.
In this assignment, you will watch Enron: The Smartest Guys in the Room and then use your readings to answer the questions below. Make sure you cite the text for any concepts you take from it for your response. You do not need to use formal academic citation, but may use informal citation within your post.
Explain the concept of mark-to-market accounting as used by Skilling and Lay and why this accounting method is particularly susceptible to ethical indiscretions.
In what ways did the Securities and Exchange Commission fail to monitor Enron’s use of this accounting method?
In what ways were the financial analysts, investment bankers, U.S. financial institutions, the SEC, and Enron’s accounting firm Arthur Anderson complicit in helping Enron cover up massive financial and accounting fraud?
How did Enron’s corporate culture of “survival of the fittest” contribute to the unethical business practices by employees and executives alike? Provide examples.
Why did Sherron Watkins, the whistle-blower of Enron, wait to report the firm?
In what ways did Skilling’s involvement in unethical financial and accounting practices benefit stakeholders initially?
What were the ultimate consequences to stakeholders and employees after bankruptcy?
The priest at the end of the film mentions “the pursuit of money can cause one to lose one’s soul.” How do you interpret this quote in the context of both the Enron scandal AND your own beliefs around money and the pursuit of it.
What happened to Skilling and Lay…and where are they now?
You do not need to respond to the comments from your fellow classmates but may if something they write strikes you as interesting.
Watch Enron: The Smartest Guys in the Room (Links to an external site.)Links to an external site.
Potent, fascinating chronicle of the rise and fall of the Houston-based energy giant. | https://cheapassignmentsolutions.com/2018/11/28/enrons-corporate-culture-of-survival-of-the-fittest-contribute-to-the-unethical-business/ |
This new award in Robotics and Artificial Intelligence builds on existing research and teaching expertise in the School of Engineering and Computer Science and addresses a growing demand by government and employers for graduates with this range of knowledge and skills. The award is structured with a strong emphasis on practical work to build your skills and confidence in the usage and application of contemporary Robotics and AI technologies. You will learn the elements needed to build robots, from simple electronic circuitry, software engineering and control, to high-level robot intelligence and will learn how to develop robotic systems and bring the learning to life.
University of Hertfordshire
BEng (Hons) Robotics and Artificial Intelligence
Entry Requirements
|UCAS points||A Level||BTEC||IB requirement|
|112-120||BBC-BBB - Mathematics and either Physics or Technology or Engineering based subjects, excluding General Studies/Critical Thinking.||DMM-DDM - Extended diploma in Engineering (DMM) to include Distinction in further maths||112-120 points - Minimum of 2 HL subjects at grade 4 or above to include HL Mathematics and Physics.|
GCSE: Grade 4/C in Mathematics and English Language.
Access: Engineering diploma with 45 Level 3 credits at Distinction to include Maths and Science or principles units. Any additional L3 credits must be at Merit.
All students from non-majority English speaking countries require proof of English language proficiency, equivalent to an overall IELTS score of 6.0 with a minimum of 5.5 in each band.
Course Details
The course content includes a number of practical Project based modules, during every year of study, along with necessary input from the other modules studied at each level. For example, during year one, you will design, build and program your own small mobile robot, which will be supported by modules including Introduction to Robotics, Principles of Digital Electronics and Computing, Programming, Maths for AI and Professional Engineering. For year two, you will deepen your theoretical knowledge, studying modules such as Mechatronics, Robot Sensors and Signal Processing, AI, Behavioural Robotics, Robotic Operating Systems, Embedded Systems Design and applying this in the year two project modules. This approach continues into year 3 (and 4 for the MEng award), with deeper studies in Machine Learning, 3D Computer Vision, Visual and Spoken interfaces, Robot Communication, Industrial Robotics, Mobile Robots and Drones, Robot Systems Design, Robot Product Design, AI Theory and Application, Human-Robot Interaction, etc. deepening your theoretical understanding, and gaining experience of applying this in practical robotics and AI systems.
Year 1
Digital electronics
Maths for robotics and artificial intelligence
Introduction to robotics
Robot design and build project a
Programming
Professional engineering
Digital computing principles
Robot design and build project b
Year 2
Embedded systems design
Operating systems for applications
Behavioural robotics
Artificial intelligence principles
Applied robotics and ai project
Robot sensors and signal processing
Mechatronics
Team project
Year 3
Machine learning
D vision
Industrial robotics
Robot communications
Mobile robots and drones
Visual and spoken interfaces
Beng individual major project
Optional modules
Industrial placement
Semester abroad
Are you ready to start building your future?
Contact our admission counseller and get a free consultation. | https://studentconnect.org/courses/university-of-hertfordshire-beng-hons-robotics-and-artificial-intelligence |
Like land and water, plants lie at the intersection of climate change, food security, ecological risk, geopolitical conflict, and cultural self-determination. Yet, they remain largely overlooked and marginalized as a practical body of knowledge by the alarming illiteracy of the botanical world across different fields of knowledge and practices. Obscured by the environmental fragmentation of contemporary urban landscapes or by the logistical industrialization of food chains or by the soft effeminate portrayal of living systems, the epistemological and cultural damage of settler colonialism (inherent to conservation policies) and racial capitalism (inherent to development projects) are undeniably at the root of environmental violence and territorial injustices.
Today, an increasingly resistant and resurgent culture of activist scholars and territorial defenders are pushing back and confronting these environmental and cultural aggressions, by reconnecting contemporary urban life with living systems not only through advocacy but through relation building with live media of fauna, flora, and biota in a radical transformation of the conventional and largely heteropatriarchal practices and extractive processes of urbanism that are located in spatial, ideological abstractions physically manifested in site development, land use mapping, regulatory zoning, master planning, infrastructure engineering, metropolitan densities, state borders, and foreign policies.
Through plant-based systems of knowledge and cultural practices, this initiative brings together Afro-Indigenous, Black & Brown Women of Color, knowledge keepers, and feminist practitioners whose work—spatial, cultural, political—confronts and challenges the dangerous paper world of design by focusing on cultural, regenerative power of plants and territorial self-determination whose legacies of displacement, histories of dispossession, and cultures of resistance are grounded in botanical traditions, medicinal practices, and ecological care in support of contemporary rematriation, territorial reparations, land back movements, and restorative justice.
This initiative involves the threefold launch of a book and exhibition at UVA, accompanied by a gathering of guest speakers and scholars from across the Americas. The event marks two key occasions focusing on the violent legacies of settler-colonialism and the role of Indigenous women’s resistance movements: the international release of a new book on the Cinchona plant, A BOTANY OF VIOLENCE: Across 529 Years of Resistance & Resurgence, co-authored by Ghazal Jafari, Pierre Bélanger, and Pablo Escudero and published by GOFF Books (an imprint of ORO Editions), as well as the U.S. opening of a traveling global exhibition, TOWARDS A FLORA OF THE FUTURE, at the School of Architecture’s Elmaleh Gallery featured last year at the 17th International Architecture Biennale in Venice, Italy. | https://dezignark.com/blog/towards-a-flora-of-the-future-01-28-2022/ |
Set in the middle of the Pacific Ocean, Chile’s Rapa Nui is a gem for history buffs and nature enthusiasts alike with archaeological wonders and stunning landscapes.
Far from the rest of the world and close to paradise, Easter Island is well known for its extinct volcanoes, pristine beaches and the enormous stone statues called moais that attract thousands of international visitors each year. Situated more than 2,000 miles to the west of mainland Chile, the small island is a 70 square mile speck in the Pacific Ocean.
The island is home to a Polynesian culture that dates back at least 1,700 years. In 300 AD, the first migrants arrived on the island, bringing with them a long cultural history preserved in myths and legends that are still being handed down today. The island’s 5,000 inhabitants have a rich heritage based on their native language, festivals and traditional songs and dances.
The first European to arrive at Easter Island was Jakob Roggeveen, who landed on Easter Sunday in 1722, giving the island its name. However, the natives call the island Rapa Nui, Te Pito o Te Henua, which means “the navel of the world.” In 1888, Policarpo Toro took possession of the island in the name of the Chilean government, and today it belongs to the country’s Valparaíso region.
Easter Island provides many outdoor adventure options. Snorkeling and scuba diving, surfing, sailing, kayaking, horseback riding and trekking are all common activities on and around the island, which was formed by volcanic activity centuries ago. Visitors can easily access the island’s three extinct volcanoes, where they can hike down to the lagoons and lush vegetation nestled in their craters. The largest volcano is called Maunga Terevaka (1722 ft) and the other two are called El Poike (1154 ft) and Ranu Kau (1063 ft).
Rapa Nui is considered by some to be the world’s largest outdoor museum. It was declared a National Park in 1935 and a UNESCO World Heritage site in 2005.
There are close to 900 moais scattered throughout the island, along with a number of other interesting archaeological sites. The journey through these sites is an excellent opportunity to come into contact with the magical energy that emanates from Easter Island.
Even today these places hold a special significance for the local community so it is recommended that visitors pay the greatest respect to the rules at each site. The locals ask people not to climb the ahus and moais and not to touch the rock carvings.
Rano Raraku: Here you will find a hiking trail that leads to the moai factory, a rock quarry containing almost 400 statues in various stages of construction. The statue-making enterprise seems to have been abandoned suddenly in a puzzling mystery that continues to baffle archaeologists.
Ahus: There are approximately 300 platforms or altars called ahus, scattered throughout the island, most of which are at least partially destroyed. The most important ahu sites are Vaihu, Akahanga, Heki’i, Raai, Te Peu and Vinapu, where visitors can see the remains of everyday human settlements complete with houses, caverns, stoves and henhouses.
Tahai-Ko Te Riku Complex: This site in the town of Hanga Roa contains stone houses, chicken coops, ceremonial sites, three moai platforms (Tahai, Vai Uri, Ko Te Riku), and a jetty built entirely of stone.
Ahu Akivi: This is an archaeological complex with seven statues gazing toward the sunset over the sea. According to tradition, these seven moais represent the first Polynesian explorers who arrived on Rapa Nui after being sent out by King Hotu Matu’a. The Agu Akivi site was restored in 1960 by archaeologist William Mulloy.
Ahu Ature Huki: Located on Anakena Beach, this site has an anthropomorphic statue that is believed to be among the oldest on the island.
Ahu Nau Nau: This site has seven well-preserved statues featuring details that are impossible to make out on other moais, such as tattoos. A moai from this site is currently on display at in the Easter Island Museum.
Easter Island has many interesting geographical landmarks for the avid trekking enthusiast, including a number of fascinating caverns. The most popular caverns are Ana Te Pahu and Ana o Keke. Ana o Keke, which means the Cave of the Virgins, is a site that Rapa Nui brides used to visit in preparation for marriage. The cavern is located on the north face of Poike Mountain and can only be entered by crawling on your belly. Ana Te Pahu, on the eastern side of the island, has four large chambers that were used as rooms and ossuaries.
The popular hike to Rano Kao Volcano is a full day excursion through eucalyptus forests until ascending to the crater and climbing down the inside to explore. Today the crater mouth is filled with native and introduced vegetation and unusual stone carvings. A second, less popular route to the volcano’s summit passes through a series of cliffs on the volcano’s north side.
Anakena and Ovahe: These are the only sand beaches on the island. Anakena is the main beach and with its sand, palm trees and warm, turquoise waters, it is a patch of paradise. Near the beach are two restored ahus and some camping sites. The smaller Ovahe beach is located to the east of Anakena.
Surfing beaches: The main surfing beaches of Rapa Nui are Hanga Roa, Vaihu and Tahai. Hanga Roa has ideal waves for beginners and the island’s natives have been mastering waves here for centuries on a special type of body board called a haka nini. Vaihu has beautiful tubes. while Tahai gets the biggest waves on the island. | https://www.thisischile.cl/easter-island-the-navel-of-the-world/?lang=en |
Homing of magnetized and demagnetized pigeons.
Homing pigeons appear to use the earth's magnetic field as a compass and perhaps as part of their position-finding system or 'map'. The sensory system they use to detect magnetic fields is unknown, but two current possibilities are some mode of response by the pineal organ or by the visual system, or it may be based on the magnetite crystals found in their heads. Three series of experiments to test the involvement of magnetite are reported here. The alignment of the permanent magnetic domains in the birds heads was altered by (a) demagnetizing the birds, (b) magnetizing them with a strong magnetic field and (c) exposing the birds to a strong magnetic gradient. None of these treatments had a marked effect on the pigeon's orientation or homing under sunny skies, but a few results obtained under overcast skies suggest that demagnetizing the birds may have increased the scatter of their vanishing bearings. Perhaps pigeons use one magnetic sensor for their magnetic compass and another for some component of the map.
| |
Interview with Tornike Guruli, PSP Pharma’s Marketing Director
Tell us about how you got into the field of marketing, and what factors played an important role in choosing this profession?
I graduated from University with a focus on PR, in Georgia. Then, I continued to study in Germany, as strategic communication was always interesting to me. I passed my doctoral studies in business, and my dissertation’s theme was in marketing. I liked the field of communication, and I did not think much about choosing a profession. I chose what I liked.
In regards to technological changes, what challenges do you face as the head of a marketing service?
We live in an era when the user has great power. If only mass media could disseminate information, the user has the power of social media networks. Consequently, each customer’s satisfaction is of the utmost importance. Anyone can communicate with the broad public about the brand, so it is very important to analyze user experience.
What has changed in the field in the last 5 years, and what changes are expected now?
The role of influencers in strategic communication has become very important. This direction has evolved well, abroad, and we are catching up with that. Specialist literature is also being written. Three types of influencers are described in the literature: 1.Celebrities 2. Vloggers 3. Experts in the field, who write and care about the user’s education. In the future, this direction will be dramatically developed. In the past five years, the print media has changed sharply. If they do not own online resources, they only go on a very narrow segment, which is no miracle for the marketers.
Facebook groups are becoming influential. A large number of people join in different groups, and receive information from other people. The majority of companies will plan future communication campaigns on these groups as the segmented group will be available and information will spread to relevant people.
What important features should a marketing manager focus on, and what are their roles in an organization?
Marketing Managers must be communicative, and should always be ready to receive the news. Marketing in the organization is always a user’s voice. The user and its experience are important for each organization’s development. If we listen to the details, and provide an analysis of experience, it will help us in development.
What steps did you take, as an organization, to catch up with new trends, and use innovative approaches in the field of marketing?
Most of what I do. I read professional online publications. I also watch trend setting media regularly. I’m also busy teaching and constantly preparing for every lecture. I am trying to do this in every lecture, bring something new and interesting to my students.
And that’s important; I constantly try to keep track of the user’s behavior. I’m constantly trying to find out what the customer needs. If you’re a marketer, you should go to the subway, and the market, to know the people’s consumer behavior and lifestyle, and not only your own decisions.
What’s your organisation’s business model, in terms of marketing?
We are a service brand. As you know, there are product brands and service brands. There are mixed ones, but mainly brands are in these two directions. PSP’s service is a brand. Consequently, it is very important for us to focus on the customer. A permanent care for consumers and experts The pharmacists and consultants are prerequisites,and we are leaders in the pharmaceutical market today.
One word that describes your job.
There’s only one idea: care for the customer.
The most useful advice you’ve ever received in life?
This advice does not only apply to marketing, but also to develop managerial skills. Previously I was working in a German organization, and the teacher taught me: never make a decision with a hot head. It’s better to think about it, sleep it through, and then analyze the situation, make the decision the next day, and stand behind this decision.
Think of a person who inspires you professionally.
David B. Fischer. | https://old.cbw.ge/business/tornike-guruli-marketer-represents-users-voice-in-the-organization/ |
The Food and Drug Administration and almost all scientists who are familiar with the data conclude that aspartame, and its use in a wide variety of products, is a safe and useful option for those individuals who prefer a low-calorie sweetener. Also, the Joint Expert Committee on Food Additives of the World Health Organization, the Scientific Committee for Food of the European Union, regulatory agencies in more than 100 countries and a number of health groups have reviewed aspartame and found it safe for use. Public comments supporting the safety of aspartame include:
“Substituting non-nutritive sweeteners for sugars added to foods and beverages may help people reach and maintain a healthy body weight – as long as the substitution doesn’t lead to eating additional calories later as compensation. For people with diabetes, non-nutritive sweeteners used alone or in foods and beverages remain an option and when used appropriately can aid in glucose control.”
— American Heart Association and American Diabetes Association, “Nonnutritive Sweeteners: Current Use and Health Perspectives,” 2012.
“A comprehensive review of the safety of aspartame has recently been published. The review covers previous publications as well as new information that support the safety of aspartame as a food additive…”
— American Dietetic Association, “Position of the American Dietetic Association: Use of Nutritive and Nonnutritive Sweeteners,” 2004.
“Available evidence suggests that consumption of aspartame by normal humans is safe and is not associated with serious adverse health effects.”
— American Medical Association Council on Scientific Affairs report, published in The Journal of the American Medical Association, July 19, 1985
“[P]resent levels of aspartame consumption appear to be safe for those who do not have PKU. . . . The blood phenylalanine levels reported in response to loading doses of aspartame in normal adults and those heterozygous for the PKU gene do not seem to be sufficiently high to warrant concern of toxicity to the individual or even to a fetus during pregnancy.”
— American Academy of Pediatrics Committee on Nutrition, Task Force on the Dietary Management of Metabolic Disorders, December 1985 Final Report
“The American Diabetes Association finds the use of the two commercially available non-caloric sweeteners saccharin and aspartame to be acceptable. The use of both sweeteners is encouraged for the particular advantages of each.”
— Position statement of the American Diabetes Association, “Use of Noncaloric Sweeteners,” 1990 (issued prior to the approval of acesulfame K)
“Evidence indicates that long-term consumption of aspartame is safe and is not associated with any adverse health effects.”
— American Dietetic Association “Use of Nutritive and Nonnutritive Sweeteners” position statement, July 1993
“Several years ago, experiments on rats suggested that saccharin might cause cancer. Since then, however, sudies of primates and humans have shown no increased risk of cancer from either saccharin or aspartame.”
— American Cancer Society, 1996 Dietary Guidelines
“Aspartame is an FDA-approved, safe sweetening agent and flavor enhancer than can be substituted for sugar in the diet.”
— American Dental Association “Statement on Aspartame,” July 17, 1981
“The extensive evidence presently available indicates that aspartame is a safe food ingredient. ACSH believes that consumers need not be concerned about its use. Extensive scientific evidence, including an unusually large number of studies in human subjects, indicates that aspartame is a safe food additive. Although aspartame is now approved for a wide variety of uses, levels of consumption remain well within safe limits.”
— American Council on Science and Health report, “Low-Calorie Sweeteners,” March 1993
“As an organization devoted to people with seizure related problems, we [at] the Epilepsy Institute have evaluated the current scientific evidence and found aspartame to be safe for people with epilepsy. . . . the members of the Professional Advisory Board of the Epilepsy Institute looked at the seizure activity of our patients, many of whom consume aspartame regularly, and saw no change over the past three years.”
— The Epilepsy Institute, published in the Congressional Record, June 20, 1986
“…Before consideration was given to permitting aspartame for use in foods in Canada, officials of Health Canada evaluated an extensive array of toxicological tests in laboratory animals and, since its listing for use, they have examined the results of a number of clinical studies in humans. There is no evidence to suggest that the consumption of foods containing this sweetener, according to the provisions of the Food and Drug Regulations and as part of a well-balanced diet, would pose a health hazard to consumers.”
— Health Canada Report, February 2003
“The Committee concluded that on the basis of its review of all the data in animals and humans available to date, there is no evidence to suggest that there is a need to revise the outcome…” of the prior endorsement of aspartame’s safety.
— Scientific Committee on Food, “Opinion of the Scientific Committee on Food: Update on the Safety of Aspartame,” December 10, 2002
“In conclusion, AFSSA considers that the current state of scientific knowledge does not enable a relationship to be established between the exposition to the aspartame and brain tumors in humans or animals. | https://caloriecontrol.org/expert-opinions-aspartame/ |
Muffins are such a simple treat. They can be made with fruits, nuts, grains and much more. There many healthy options for muffins or we can go full on with the fat and carbs and make them into a deliciously sweet snack. Banana muffins are my fav, but aside from those, my definite go to is gooey chocolate chip and, while its more of a snack than a breakfast meal, I still have it with some fruits and I welcome it into my breakfast menu with open arms. My recipe isn't just dairy free, it's full vegan and sure, I used chocolate chips, but you can always opt out of that and add fresh fruit, nuts etc of your choosing.
Here's my recipe guys, enjoy.
INGREDIENTS
2 1/4 cups All-Purpose Flour
3/4 cup Brown Sugar
2 1/2 tsp Baking Powder
1/4 tsp Baking Soda
1/2 tsp Ground Cinnamon
1/2 tsp Ground Nutmeg
1/2 tsp Salt
1 cup plant based Milk
1 tsp Apple Cider Vinegar
1/4 cup + 2 tbsp Vegetable Oil
1 tsp Vanilla Extract
Vegan Mini Chocolate Chips
METHOD
●Preheat oven 350°
●Stir apple cider into plant based milk and allow to sit for 5-10 this will help to give milk a buttermilk like flavor and texture.
●Mix all your dry ingredients in a mixing bowl.
●Once you milk has sat aside for recommended time add the remaining wet ingredients to milk and mix well.
●Mix wet and dry ingredients until all of the ingredients are properly incorporated then mix in chocolate chips.
(You can reserve a few to top your muffins after scooping into tins)
●Spray you muffin tins with olive oil pray or line tins with muffin wrappers and fill 3/4 of the tins
●Place in preheated oven and bake @ 350° 30-35 or test with toothpicks once inserted and it comes out clean then your muffins are done.
●Remove from oven, let cool and enjoy. | https://www.terisfoodtherapy.com/post/vegan-chocolate-chip-muffins |
Categories:
snacks breakfast
,
breakfast
,
quick
,
snacks
,
Print
0
Ingredients
batter:
2/3 cup
whole wheat flour
2 tsp
baking powder
1
egg
6 tbsp 2%
milk
3 tbsp
honey
2 tbsp
canola oil
filling:
1 cup chopped
apple
(i don't peel mine)
cinnamon
to taste
nutmeg
to taste
Nutrition
Serving Size
(
28.82
g)
Servings
6
Amount per Serving
Calories
124.11
Calories from Fat
52.02
% Daily Value *
Total Fat
5.78
g
53.4
%
Saturated Fat
0.9
g
26.86
%
Trans Fat
0.02
g
%
Cholesterol
10.21
mg
20.41
%
Sodium
239.29
mg
59.82
%
Total Carbohydrate
13.77
g
27.53
%
Dietary Fiber
0.02
g
0.43
%
Sugars
13.32
g
%
Protein
5.1
g
61.14%
Vitamin A
25.88
IU
%
Vitamin C
0.88
mg
%
Calcium
265.66
mg
%
Iron
0.24
mg
%
*Percent Daily Values are based on a 2,000 calorie diet. Your diet value must be higher or lower depending upon your calorie needs:
Calories
2,000
2,500
Total Fat
Less Than
65g
80g
Sat Fat
Less Than
20g
25g
Cholesterol
Less Than
300mg
300mg
Sodium
Less Than
2,400mg
2,400mg
Total Carb
300g
375g
Dietary Fiber
25g
30g
Potassium
3,500 mg
Protein
50 g
Calories Per Gram
Fat 9•Carbohydrate 4•Protein 4
*Nutrition information was calculated excluding the following ingredients:
batter, filling, chopped apple
Cooking Instructions
Recent Videos
Aloo ka halwa recipe | आलू का हलवा | Navratri Vrat Recipe | Potato Halwa | kabitaskitchen
Kabita's Kitchen
Pachai Payaru Sundal Recipe | பச்சை பயறு சுண்டல் | Green Gram Sundal | Navarathri Special -4
Amma samayal - அம்மா சமையல்
THE BOYZ : Flower Boys' SNACK SHOP ep.04 A new recipe to captivate people's appetites
ALL THE K-POP
Almond Cookies Recipe Easy Aquafaba Cookie Recipe For Almond Cookies Chocolate Almond Cookies
Manisha Bharani
Spicy Green Beans Chicken over Rice Recipe : ข้าวผัดเผ็ดถั่วแขกไก่ชิ้นรสเด็ด
totikky tikky
Fried Chicken In Oven Recipe, Baked Fried Chicken Recipe,Kfc Style Baked Crispy Fried Chicken
Mazar Cuisine
Comments
Similar Recipes
Whole Wheat Apple Muffins
Apple Whole-wheat Muffins
Karen's Whole Wheat Apple Muffins
Whole Wheat Oat Blueberry Muffins
Pumpkin Apple Whole Wheat Muffins
Whole-wheat Apple Muffins
Healthy Whole Wheat Muffins
Whole Wheat Flax Muffins
Honey Wheat Muffins
Whole Wheat Apple Pecan Rolls
Related Articles
Lightened-Up Apple Muffins
Food for the fresh
Wed, 3 Oct 2012 13:24:00 +0000
Heart Shaped Cinna-Monkey Pie Pops in Whole Wheat Crusts
Peanut Butter and Julie
Wed, 12 Feb 2014 17:17:35 +0000
Apple-Pecan Mini Pies
The Pioneer Woman
Fri, 14 Aug 2015 14:03:57 +0000
blueberry apple crumble bars
THE VANILLA BEAN BLOG
Fri, 13 Jan 2017 01:55:42 +0000
Quick, Melt-In-Your-Mouth Mini Muffins - Gluten, Grain & Dairy-Free
Garden of Eating
Fri, 4 Jul 2014 02:51:14 +0000
October Menu - Menu Plan Monthly
Mommy’s Kitchen
Tue, 13 Oct 2015 14:02:31 +0000
Sign Up
By creating an account, I accept Tastyfix's
Term of Service
and
.
Already have an account
Sign Up
Sign In
Forgot Password
Sign Up
Sign In
Email friends
(separate multiple email addresses with commas )
Close
Send
Forgot Password
Enter your email address and we'll send you instructions. | http://tastyfix.com/recipe/whole-wheat-apple-honey-muffins-sprk |
Advice on our Greece itinerary. This is our plan. Fly into Athens head to Crete. Stay in Crete 4 days, Santorini 4 days then Athens 3 days.
Can anyone recommend me a nice trip or itinerary arround the island of Crete, in Greece? | https://answers.worldnomads.com/locations/6984/map-of-greece?topic=itinerary&view=latest |
Velociraptor mongoliensis (pronounced /vɛ.ˌla.sɪ.ˈræp. more...
tər/
Velociraptor had strong jaws with rows of bladed teeth. These, in combination with large claws on their forelimbs and sickle-shaped talons on the second toe gave these animals some impressive weaponry.
In 2005, a BBC documentary, The Truth About Killer Dinosaurs, created an artificial Velociraptor leg and sickle claw to demonstrate the claw's power - when tested on a pork belly, the claw failed to fully penetrate it, lending discredit to the popular notion of Velociraptor using the claw to disembowel its prey (as described in the movie Jurassic Park, although other elements of the film were also exaggerated, such as the raptor's size).
Evidence as to how the claw was actually used is provided by one of the more spectacular specimens of Velociraptor, found in the Gobi desert in 1971. It is a complete, articulated skeleton clutching the skeleton of a Protoceratops. The penetrating toe claw is near to where the Protoceratops' jugular vein would have been, and the Velociraptors arm is clutched in the herbivore's jaws. This suggests Velociraptor used its sickle claw for precision killing, to pierce its victim's jugular vein or windpipe.
Velociraptor was first found and described by paleontologist H. F. Osborn in Mongolia in 1924. About a dozen Velociraptor fossils have been found, including one who died in a battle to the death with Protoceratops and two hatchling Velociraptor skulls that were found near an oviraptorid nest in Mongolia (they may have been a meal). Fossils have been found in Mongolia, Russia, and China.
Whether Velociraptor was a bird or a dinosaur depends on the definition being used. Technically all members of the clade Aves are dinosaurs, however, in common usage a "bird" is not just a member of Aves, but any animal with feathered wings. Under the later definition, Velociraptor and all maniraptor "dinosaurs" are actually birds. Recently, fossils of dromaeosaurid ancestors to Velociraptor have been found in China with feathers covering their bodies, and fully developed feathered wings. In light of this, it is almost certain that Velociraptor bore feathers too (although no fossil evidence has not yet confirmed this), since even flightless birds today retain most of their feathers, and Velociraptor would be no exception. | http://atvs-motorcycles.com/velociraptor.htm |
PROBLEM TO BE SOLVED: To achieve a vehicle occupant knee protection apparatus with which accuracy in attaching an upper bracket to an instrument panel reinforcement is easily ensured.
SOLUTION: In the vehicle occupant knee protection apparatus 10, front ends of upper brackets 20R, 20L, important for improving occupant knee protection performance, are welded to an instrument panel reinforcement 12, and lower brackets 22R, 22L and knee panels 24R, 24L are supported by the instrument panel reinforcement via the upper brackets 20R, 20L. Therefore, when the vehicle occupant knee protection apparatus 10 is fixed to the instrument panel reinforcement 12, the lower brackets 22R, 22L and the knee panels 24R, 24L are fixed to the upper brackets 20R, 20L, preparing a subassembly. Then, only the front ends of the upper brackets 20R, 20L may be welded to the instrument panel reinforcement 12.
COPYRIGHT: (C)2012,JPO&INPIT
PROBLEM TO BE SOLVED: To achieve a vehicle occupant knee protection apparatus with which accuracy in attaching an upper bracket to an instrument panel reinforcement is easily ensured.
SOLUTION: In the vehicle occupant knee protection apparatus 10, front ends of upper brackets 20R, 20L, important for improving occupant knee protection performance, are welded to an instrument panel reinforcement 12, and lower brackets 22R, 22L and knee panels 24R, 24L are supported by the instrument panel reinforcement via the upper brackets 20R, 20L. Therefore, when the vehicle occupant knee protection apparatus 10 is fixed to the instrument panel reinforcement 12, the lower brackets 22R, 22L and the knee panels 24R, 24L are fixed to the upper brackets 20R, 20L, preparing a subassembly. Then, only the front ends of the upper brackets 20R, 20L may be welded to the instrument panel reinforcement 12.
COPYRIGHT: (C)2012,JPO&INPIT | |
Planning to commence construction in May 2021
HSCC Appeal fund reaches £230,000 with pledges!
Scout Group donate £21,000 to the Appeal fund
£177,000 RAISED TO DATE….. Another £80,000 needed!
£174,210 raised to date… now for the final push! | http://www.henfield-scout-cc.org/news-events/page/2/ |
What is the 'Total Debt-to-Capitalization Ratio'
The total debt-to-capitalization ratio is a tool that measures the total amount of outstanding company debt as a percentage of the firm’s total capitalization. The ratio is an indicator of the company's leverage, which is defined as using debt to purchase assets. Companies need to manage debt carefully because of the cash flow needed to make principal and interest payments. Calculated as:
BREAKING DOWN 'Total Debt-to-Capitalization Ratio'Every business uses assets to generate sales and profits, and capitalization refers to the amount of money raised to purchase assets. A business can raise money by issuing debt to creditors or by selling stock to shareholders. The amount of capital raised is reported in the long-term debt and stockholders' equity accounts in the balance sheet.
Factoring in Rate of Return
Both creditors and investors want to earn a rate of return on an investment. Bondholders, for example, earn interest income on debt securities, while equity investors earn a return on equity (ROE) through dividend payments and due to an increase in the price of the issuer's stock. If a company takes on too much debt, it runs the risk of insolvency, which means that the issuer cannot make principal and interest payments on debt.
Examples of Capitalization
Assume, for example, that company ABC has short-term debt of $10 million, long-term debt of $30 million and shareholders' equity of $60 million. The company's debt-to-capitalization ratio is calculated as follows:
Total Debt to Capitalization = ($10 + 30) / ($10 + $30 + $60) = 0.4 or 40%.
This ratio indicates that 40% of the company’s capital structure consists of debt.
Consider the capital structure of another company, XYZ, which has short-term debt of $5 million, long-term debt of $20 million and shareholders' equity of $15 million. The firm’s debt-to-capitalization ratio would be computed as follows:
Total Debt to Capitalization = ($5 + 20) / ($5 + $20 + $15) = 0.625 or 62.5%.
Although XYZ has a lower dollar amount of total debt ($25 million versus $40 million), debt comprises a significantly larger part of its capital structure. In the event of an economic downturn, XYZ may have a difficult time making the interest payments on its debt, compared to firm ABC. The acceptable level of total debt for a company depends on the industry in which it operates. While companies in capital-intensive sectors such as utilities, pipelines and telecommunications are typically highly leveraged, their cash flows have a greater degree of predictability than companies in other sectors that generate less consistent earnings.
-
Capitalization RatiosIndicators that measure the proportion of debt in a company’s ...
-
Debt-To-Capital RatioA measurement of a company's financial leverage, calculated as ...
-
Debt ServiceThe cash that is required for a particular time period to cover ...
-
Leverage RatioAny ratio used to calculate the financial leverage of a company ...
-
Debt RatioA financial ratio that measures the extent of a company’s or ...
-
Capital StructureA mix of a company's long-term debt, specific short-term debt, ...
-
Investing
What is the Debt-To-Capital Ratio?The debt-to-capital ratio is used to measure a company’s use of financial leverage. The ratio is the company’s total debt, divided by the sum of the company’s equity plus total debt.
-
Small Business
Total Debt to Total AssetsTotal Debt to total assets, also called the debt ratio, is an accounting measurement that shows how much of a company’s assets are funded by borrowing. In business, borrowing is also called leverage.
-
Investing
Evaluating A Company's Capital StructureLearn to use the composition of debt and equity to evaluate balance sheet strength.
-
Investing
Target Corp: WACC Analysis (TGT)Learn about the importance of capital structure when making investment decisions, and how Target's capital structure compares against the rest of the industry.
-
Investing
Calculating Long-Term Debt to Total Assets RatioA company’s long-term debt to total assets ratio shows the percentage of its assets that are financed with long-term debt.
-
Investing
Debt RatioThe debt ratio divides a company’s total debt by its total assets to tell us how highly leveraged a company is—in other words, how much of its assets are financed by debt. The debt component ...
-
Investing
4 Leverage Ratios Used In Evaluating Energy FirmsThese four leverage ratios can help investors understand how oil and gas firms are managing their debt.
-
Investing
Understanding Leverage RatiosLarge amounts of debt can cause businesses to become less competitive and, in some cases, lead to default. To lower their risk, investors use a variety of leverage ratios - including the debt, ...
-
Investing
Analyzing Oracle's Debt Ratios in 2016 (ORCL, SAP)Learn how the debt ratio, debt-to-equity ratio and debt-to-capital ratio are used to evaluate Oracle Corp.'s liabilities, equity and assets.
-
Investing
UPS Stock: Capital Structure AnalysisAnalyze UPS' capital structure to determine the relative importance of debt and equity financing. Identify the factors influencing financial leverage trends. | http://www.investopedia.com/terms/t/total-debttocapitalization-ratio.asp |
The utility model discloses a pulley combined device of needle selection for a double action jacquard, comprising a pulley 1, a pulley 2, a pulley 3, a pulley 4 and a fixed support. The pulleys 1, 2 and 3 are connected into a group and the pulley 4 is installed at the E point and can not shift but rotate. According to the pulley group principle, when the A point immobilizes, the knife box drives the B point to rise to the F point and move H distance and the C point ascends 2H distance simultaneously, forming the open height 2H. Compared with the same technique, the C point moves 2 times H distance so that the smaller moving range of the knife box generates larger lifting effect and the double action jacquard can also operate at a high speed in the case of big opening. The device can upgrade the rotation speed of the double action jacquard to 1. 41 times and is favorable for increasing the rotation speed of the jacquard. | |
Q:
Connectedness of a union regading a proximity
Let δ is a proximity.
I will call a set A connected iff for every partition {X,Y} of the set A holds X δ Y.
Question: Let A and B are sets with non-empty intersection. Let both A and B are connected. Prove or give a counter-example that A∪B is also connected.
(This question arouse as a special example of a more general theorem. I spend may be half of hour attempting to prove it and after these my efforts failed, I desire to share this question.)
A:
Consider $X\cap A$ and $Y\cap A$, starting from a partition $\lbrace X,Y\rbrace$ of $A\cup B$. If both intersections are nonempty we are done, as $(X\cap A)\delta(Y\cap A)$. Otherwise, $A\subseteq X$, say, but then $X\cap B$ and $Y\cap B$ are nonempty and we find $(X\cap B)\delta(Y\cap B)$.
In either case $X\delta Y$.
| |
Further information can be found in the protocol.
GO Term Enrichment
In the following we are performing different sequence searches with the protein Aspartoacylase (UniProt ID: P45381). In order to validate the found hits, we are looking for common GO classifications of the hits with the query sequence.
For our protein Aspartoacylase there are 17 annotated GO terms (using EMBLs QuickGO):
<figtable id="aspa_go_terms">
|GO ID||GO Name|
|Cellular Compartment||GO:0005634||nucleus (3X)|
|GO:0005634||cytoplasm (4X)|
|Biological Process||GO:0006533||aspartate catabolic process|
|GO:0008152||metabolic process|
|GO:0022010||central nervous system myelination|
|GO:0048714||positive regulation of oligodendrocyte differentiation|
|Molecular Function||GO:0046872||metal ion binding|
|GO:0004046||aminoacylase activity|
|GO:0016787||hydrolase activity|
|GO:0016788||hydrolase activity, acting on ester bonds|
|GO:0016811||hydrolase activity, acting on carbon-nitrogen (but not peptide) bonds, in linear amides|
|GO:0019807||aspartoacylase activity|
</figtable>
Pairwise Sequence Search
For all sequence searches we chose a significance cutoff of 0.002.
BLASTP
|
|
The blast search with default parameters yielded 196 when using the default E-Value cutoff of 10. Being more restrictive and considering only hits with E-Values less than 0.002 we get 104 hits. The best alignment is with an uncharacterized Protein from Rattus norvegicus and has an E-Value of e-155. Most of the resulting proteins are Aspartoacylases of other species. There also are a lot of uncharacterized proteins, just as our best hit. Most of the results with EValue > e-15 are Succinylglutamate Desuccinylases, which are in the same protein family (Desuccinylase / Aspartoacylase family) and catalyze a reaction similar to Aspartoacylase.
|
|
<figtable id="aspa_blastp">
</figtable>
PSIBLAST
We run PSIBlast with four different parameter combinations:
- 2 iterations (j=2), default E-Value cutoff for inclusion of .. (h=0.002)
- 2 iterations (j=2), strict E-Value cutoff for inclusion of .. (h=10e-10)
- 10 iterations (j=10), default E-Value cutoff for inclusion of .. (h=0.002)
- 10 iterations (j=10), strict E-Value cutoff for inclusion of .. (h=10e-10)
As a cutoff value for significance of hits we chose 2e-10.
The Psiblast run with default parameters (2 iterations, EValue 0.002) results in an amount of 597 hits. The most significant hit has an E-Value of e-142. When restricting the search to a lower E-Value of 10e-10, we still get 502 hits.
only get 93 hits. This is similar to the result from the BlastP search, only that the worst hit still has a significant EValue of 2e-29. Hits with the good EValues are mostly Aspartoacylases, while hits with worse EValues contain more and more Succinylglutamate Desuccinylases.
Increasing the number of iterations obviously results in many more hits. Using different EValue cutoffs has little influence on the found results though. After 8 rounds, the search converged using the default EValue, while it run all 10 rounds using the more restrictive EValue cutoff. Interestingly, the best hits are less significant (~e-70) than for the psiblast search with only 2 iterations (~e-140). Also, we feel that the most significant results include more Succinylglutamate Desuccinylases than Aspartoacylases.
<figtable id="aspa_psiblast">
|Parameters||it2, def E-Value (h=2e-3)||it2, E-Value h=10e-10||it10 def E-Value (h=2e-3)||it10 E-Value h=10e-10|
|time||~2m30||~2m30||~10m||~10m|
|best E-Value||1e-142||1e-145||5e-70||9e-64|
|results (EVal: 10)||915||835||500||500|
|results (EVal: 2e-3)||597||502||500||500|
</figtable>
HHBLITS
commentmixed results with Aspartoacylases and Succivery varying results: Aspartoacylasen, Succinylasen, Zinc Proteins
<figtable id="aspa_hhblits">
|Parameters||it 2||it 8|
|time||2m50||~6m|
|results||274||500|
|best E-Value||2e-110||2.9e-68|
|worst E-Value||0.0011||9.5e-09|
</figtable>
Validation and Comparison
Along with the expactations one can find more hits with Psi-Blast than with a simple Blast search.
In general, one can distinguish between two kinds of proteins, that frequently are identified by the sequence searches:
- Aspartoacylases
- Succinylglutamate Desuccinylases
BlastP
<figtable id="blastp_comp">
|
|
A simple blast search yields only about 90 significant hits if one considers a threshold of 10e-10 as a significance cutoff. As one can see in Figure <xr id="blastp_comp"/>, the restriction of the E-Value results in less hits with a low sequence similarity.
For all 94 hits found with an E-Value cutoff of 10e-10, there are annotated GO terms. Furthermore all founds hits share the GO term "hydrolase activity, acting on ester bonds" and "metabolic process". Also, as one can see in <xr id="go_blastp_10e10" /> all hits share the most GO terms with Aspartacylase. Again, "Zinc binding" could also be associated with Aspartoacylase. Therefore, all GO terms that are found more than 5 times, are also associated with Aspartoacylase. The results are more accurate concerning shared GO terms with Aspartoacylase. This is what one would expect when restricting the EValue for finding the closer related proteins.
|
|
<figure id="blastp_comp">
</figtable>
<figtable id="go_blastp">
|E-Value||default (10)||10e-10|
|GO terms||
|
<figure id="go_blastp_def">
|
|
<figure id="go_blastp_10e10">
</figtable>
Psi Blast
Increasing the amount of iterations performed in a PSI-Blast search, obviously increases the running time. One can see, that the best ranked hits of the runs with 10 iterations have lower E-Values than the best hits of the runs with less iterations. Yet, the result includes a larger amount of significant hits with higher E-Values. This means, increasing the iterations finds further distantly related sequences, which is the expected outcome. This outcome is also represented in the distribution of sequence identities. As one can see in figure ??, running PSI-Blast with 10 iterations results in hits with a lower sequence identity to our query sequence than the hits from the run with 2 iterations.
When restricting the E-Value Cutoff for the profile built-up, we found that more hits are classified as Aspartoacylases than as Succinylglutamate Desuccinylases. The running time, as well as the E-Values of the resulting hits did not change significantly. The majority of the results from the runs with only two iterations, has moderate sequence identities with a broad distribution between 10% and 50%. In contrast, the results from the run with 10 iterations split up into two groups of hits which form cluster at about 15% and 35% sequence identity. This difference is also represented in the E_Value distribution. The runs with 10 iterations result in Hits with moderate E_Values between -200 and -40 log(E_Values). The runs with 10 iterations in contrast result in many low significant hits (log(E_Value > -20)) and a variety of high significant hits.
|
|
<figure id="PSI_10e10_seqd">
|
|
<figure id="PSI_2it_seqid">
</figure>
|
|
<figure id="PSI_10it_seqid">
</figure>
|
|
<figure id="eval_distri_psiblast">
</figure>
For the run with 2 iterations and the default cutoff value of 0.002, we received 915 hits. We considered 597 hits as significant (E-Value cutoff 2e-3). 586 of these significant proteins have GO terms annotated. For the run with 2 iterations and a EValue cutoff of 10e-10, we received 835 hits out of which we considered 502 proteins as significant. 496 proteins have GO terms annotated.
HHBlits
Running HHBlits with 2 iterations yields a small amount of hits (270) with very low (2e-110) and very high (0.0011) E-Values. To increase the amount of hits, we repeated the HHBlits search with the maximum amount of 8 iterations which resulted in a broader output with more Hits with lower averaged E-Values (compare figure ??). Regarding the Sequence Identity distribution, running HHBlits with 8 iterations results in more distant related Hits (see Figure ??).
Overlap
As one can see in Figure ??, roughly 40 percent of the resulting hits are unique to each method. From our considerations, about 25 percent of the hits are significant hits, that could be further investigated (overlap of 50 percent).
Further Evaluation
We tried to further validate the sequence search hits via structural similarity. Unfortunately none of the resulting Hits was a PDB Hit. Furthermore we tried to map the sequence identifiers against the UniProtKB/Swiss-Prot PDB cross-references (http://www.uniprot.org/docs/pdbtosp.txt). Again, this mapping yielded no results, which is why we cannot include any structural information for our ongoing research. When inspecting the annotation for the sequence hits, we already found, that the majority of the hits codes for Aspartoacylases or respectively the highly related protein Succinylglutamate Desuccinylases. Since there already exists a crystal structure of the human Aspartoacylase, it is only reasonable that one will not find other structures for this class of proteins. Additionally, a huge amount of hits codes for not yet characterized proteins, which also will hardly be an interesting target for crystallization.
Multiple Sequence Alignments
For generating our dataset for the MSA we clustered all Hits into Sequence Identity groups:
- >90%: 1
- 60-89%: 59
- 40-59%: 197
- 20-39%: 1141
Since we only got one hit with an sequence Identity >90% we decided to group out hits as follows: three groups of sequences with eight members each:
- 60-99%
- 40-59%
- 20-39%
We chose those hits from the respective groups, that have been found by at least 4 methods (overlap of 50%).
id eVal identity # 60-99% sequence identity Q8BZC2 1.7e-25 90 E1BVP5 e-140 72 H2RVG4 e-141 63 G3VM93 e-105 72 F6ZFQ0 e-139 78 F8WFU8 e-145 86 Q28C61 e-132 68 H2M5L4 e-133 64 # 40-59% sequence identity G5BTW1 e-133 43 G6FRX8 e-103 39 F7NV91 e-112 39 G1Q6P7 e-120 42 H0WH68 e-135 44 F2PFG6 e-119 40 H2MX25 5e-81 40 Q1Z2X2 e-115 38 # 20-39% sequence identity Q2F9Q7 e-109 31 Q8YQC1 e-117 41 E1SMZ8 e-108 39 D7E1T3 e-110 36 A5GQV1 7e-92 33 E8LP14 e-107 31 F9TUZ3 e-106 30 A6VUE4 e-101 35
General Results
All in all the three Alignment methods yield comparable results. One can identify several conserved regions. Especially the two groups with sequence identities <60% show very similar MSAs.
There are three strongly conserved motivs located in the first half of the sequences:
- GGTHGNE
- DLNR
- DLHNT
For the second half of the sequence alignments there is no clear concensus about reserved motifs, but several residues are strongly conserved and may be of functional or structural importance.
In the alignment of the >60% group the first two motifs are not colored in the alignment. This is due to two very short sequences which produce gaps in the alignment and thus lower the consensus.
ClustalW
command:
clustalw -align -infile=./db_over60.fa -outfile=./clustalw_msa_60.aln
TCoffee
Muscle
Concerning the wildtype human Aspartoacylase
The three identified motifs can also be foung in the wildtype protein (compare coloring of sequence on top of page). We colored the respective residues in the structure. They all are positioned in the same region of the protein and thus might implicate an important functional region. | https://i12r-studfilesrv.informatik.tu-muenchen.de/wiki/index.php?title=Canavan_Task_2_-_Sequence_alignments&direction=next&oldid=27932 |
How to Pack a Backpack the Right Way
If you have plans for going on a backpacking trip, having a good backpack is, of course, one of the most important things you should be considering. But as necessary as having a good bag is, it is also just as important to know how to pack one properly.
Simply stuffing your pack with your gear without any proper organization may be the easiest option, but this way will ultimately not be for your benefit. A poorly packed bag becomes a burden to you while you’re on the trail for several reasons.
A significant downside to a thoughtlessly stuffed backpack is that uneven weight distribution can put pressure on your back and shoulders and could end up hurting them. Also, not having easy access to necessities such as your rain gear or emergency kit can be very troublesome.
In this guide, we will help you avoid these problems by providing you a proper system to pack a backpack effectively and efficiently.
We also offer a list of some of the most common items hikers usually bring so you don’t needlessly overpack and contribute excess weight to your pack. We hope that you will find this article relevant and helpful for any backpacking trips you might have in the future.
Preparation/Organization
Before you can even begin planning on what to bring with you to your backpacking trip, you should first have your own backpacking pack. The most important thing to consider for a backpacking bag is its capacity or pack volume. The most significant factor in determining what capacity your backpack should have is the number of days you plan to spend backpacking.
For an overnight stay, your regular daypack should have a capacity of around 20 to 35 liters. This volume allows for basic overnight needs such as a sleeping bag, clothes, water, and snacks. For a multi-day hike(two to four), the recommended capacity for your bag would be between 35 to 60 liters; this allows for other heavier equipment such as cooking gear, lots of extra water, and other daily necessities.
Next is choosing what items you should bring. Before you start packing, make sure to only get what you need if you want to keep your pack as light as possible. Some of the essential items hikers usually bring are:
- Shelter (tent, rainfly)
- Weather protection (sunscreen, foldable umbrella, rain jacket, sweater)
- Clothes
- Sleeping items (sleeping bag, sleeping pad)
- Food
- Water
- Cooking equipment
- Toiletries
- Navigation equipment (map, GPS)
- First-aid kit
- Flashlight
Easily keep track of your equipment by creating a checklist for them. You can also refer to your list after you are done with your hike to make sure every item is taken into account and that you don’t forget to bring back anything.
Packing System
Your backpacking pack can be divided into four main parts: bottom, middle, top, and external storage. A sound packing system considers all of these to bring about the maximum potential of your backpack’s capacity.
Bottom
Generally, you will want to pack the softest, lightest, and most compressible stuff at the lowest portion of your pack. Packing these sorts of equipment at the bottom helps save your lower back by acting as a cushion for when you finally start hiking with your bag against your back. Softer items will be pressing against your lower back which saves you from pain and makes you feel more comfortable than if you packed more solid stuff at the bottom instead. Such soft and compressible items include your sleeping gear – such as your sleeping bag, sleeping pad, and pillow – and clothes.
Your sleeping gear is also non-essential; you won’t need to access it until much later on, which makes it OK to keep them at the bottom of your pack.
Middle
Next up is packing the middle portion of your backpack. You can continue putting more items into it because now you have a soft and padded base. Usually, the mid-portion of your pack is where you place the heavier gear you are bringing with you, which generally consist of:
- Cooking equipment (stove, fuel, cooking pot)
You can place the flat part of your cooking pot against your back so you don’t feel uncomfortable from weird bumps in your pack while you walk; it is easier to comfortably pad a flat surface than an uneven one. Also, a wood-burning backpacking stove is an excellent alternative to regular ones to keep your stove as lightweight as possible.
- Food and eating utensils
To help save space, you can place your food in your bear canister or other food storage.
- Food storage (bear canister, stuff sack)
- Water container/s
If you plan on camping out for a couple of days, having plenty of water reservoirs is very important, especially if you’re not guaranteed a clean source of water.
The middle part of your pack is the most suitable place for your heavier equipment because the closer to the center of your back your heavy gear is, the lighter they will feel. Packing your bag this way helps you maintain your center of gravity, providing more stability than if these items are placed at the top or bottom of the pack, and you also relieve pressure from not just your back but from your shoulders too.
Make sure you distribute the weight of your middle gear well to avoid an uneven load that can cause more strain on one shoulder and one side of your back and causes loss of balance, which can lead to injury. Also, to keep your middle gear from jostling around, you can fill in gaps with extra clothes or similar padding materials.
Top
The uppermost part of your pack is the most accessible and most suitable for storing items that you regularly use throughout the day. Such items include:
- Shelter (tent, rainfly, foldable tent poles)
When the weather quickly takes a turn for the worse, you will be able to have access right away to your shelter, which saves a lot of time. Also, you can place your foldable poles in an upright position towards the sides inside your backpack; you can simply pull them out when you are going to set up your tent.
- Weather gear (sunscreen, rain jacket, fleece jacket)
-
- Whether it’s a hot, sunny day, or a cold, rainy day, it is a good idea to have easy access to these items.
- Snacks
- Toiletries
- First-aid kit
- Flashlight
- Electronics (phone, camera, power bank, charger/s)
It is better to keep these smaller items separate by putting them in a waterproof bag or stuff sack. That way, you won’t have to fumble around for them when you need them, and they’ll also be safe when it rains.
- Small notebook, pen
The above items are also usually relatively lightweight, which makes it easier on your shoulders to bear the load of your backpack. For better organization, you can group items and place them in separate bags.
External storage
External pockets
These pockets outside of your pack are easily accessible and are excellent for storing other gear that won’t fit inside your backpack. If you have a lot of equipment stored in the bottom and middle parts of your pack, for example, and lack space for the top portion, you can place the upper gear in your backpack’s outside pockets. Other stuff you would usually keep here are:
- Small water bottle
This is separate from your primary water containers, which are generally larger and heavier. It is best to always have a small bottle of water for when you feel thirsty while you’re hiking.
- Bear spray (if you are in bear country)
- Navigation equipment (map, GPS)
Not all backpacks have plenty of side pockets, so it might be an essential consideration when buying your own backpacking backpack. Either way, it is better to keep the more needed items in these easily accessible pockets to make the best use of them.
Straps and Loops
The loops or straps outside of your pack might not seem to have any intuitive use at first glance, but they do have a purpose. For instance, gear like tent poles and trekking poles that won’t fit inside your pack can still be carried with you by securing them to these external straps. There are smaller loops attached to the straps that you can use to hang small and light items, such as extra rope, via clips or carabiners.
Also, you can secure bulky items like camp chairs, camp shoes (helpful in crossing a stream or river), and even an ax outside of the pack via these straps.
Final Checks
Hoisting your backpacking pack
After you pack your backpack, you should be able to carry it on your back properly. There are proper steps to do this, so you don’t hurt yourself or damage your pack.
First off, make sure that your backpack is in an upright position. Then, check that your packs’ compression straps are tightened. Next, lift your bag by grabbing its haul loop and set it on your thigh. Don’t lift it by the shoulder straps, as doing this could damage the straps instead.
Keep your pack steady by maintaining your grip on the haul loop, then slip one arm into one of the shoulder straps. Carefully lift your bag onto your back by using your core muscles while keeping a slightly bent position. Then slip your other arm into the other shoulder strap.
Lastly, stand up straight and adjust the length of your backpack straps, connect the hip belt, and adjust your sternum strap until you find the most comfortable fit.
Some reminders
- Refer to your checklist to make sure you didn’t forget to include anything.
- To protect the inside of your bag from rain, you can line the inside with a large trash bag. You can also use a rain cover to protect your entire backpack from wet weather.
- Keep in mind to bring plenty of water and enough food for your hiking trip, especially if it is for a couple of days.
- Make sure to inform someone of where you’re going in case something unexpected happens or if something goes wrong.
FAQs
What is the best way to pack a backpack?
The best way to pack a backpack is to properly distribute the weight of your gear while at the same time considering which part of your pack you should place them in order of accessibility. Pieces of equipment you don’t need to access until later should be placed at the bottom, while you should put more necessary items near the top. Also, heavy gear should be placed in the mid-portion and should be close to your back. You can place lighter items either at the top or bottom.
For better organization, you can group similar items and place them in compression bags or stuff sacks and label or color-code them before placing them in your pack.
How do I distribute my backpacking weight?
The ideal weight distribution of your backpacking gear would be to have your heaviest items positioned as close to the center of your back as possible. Compressible items that are generally light- to midweight should be at the bottom since these items also act as a cushion for your back and help you avoid back pain if you placed heavier and more solid items there otherwise.
Light- to midweight items should also be placed at the top of your pack so it doesn’t tilt backward, which can cause you to strain your back and shoulders. It is also best that the items at the top are ones you regularly use throughout the day and therefore need to have easy access to.
What size backpack do I need for three days?
For a 3-day hike, the recommended pack volume for your backpack would be around 35 to 50 liters. This capacity should fit all the necessary equipment you will need for three or even four days.
What size backpack do I need for an overnight hiking trip?
For an overnight camping trip, your backpack would only need to have a pack volume of around 20 to 35 liters. You won’t need as many items as a multi-day hiking trip would require, so a smaller backpack should suffice. This capacity range also allows you enough space for some extra items. You can still choose to bring a pack with a larger capacity if you plan on adding gear that will help provide a more comfortable and enjoyable camping experience.
What do I need for an overnight backpacking trip?
In general, essential gear you will want to pack a backpack with on an overnight backpacking trip are:
- Tent
- Clothes
- Sleeping bag, Sleeping pad
- Food
- Water
- Toiletries
- Navigation equipment (map, GPS)
- Emergency kit
- Flashlight
What should you not bring backpacking?
Avoid bringing unnecessary items with you such as jewelry and other valuables, hair or beauty products, heavy clothes such as jeans, bulky blankets and towels, multiple pillows, and multiple pairs of shoes. You will only make things more difficult for yourself if you bring unneeded items that only add more weight to your pack.
How much should your backpacking pack weigh?
As much as possible, you will want your pack to weigh no more than 20 percent of your body weight to avoid straining your back and shoulders. So, for example, if you weigh 150 pounds, the load of your pack should not go over 30 pounds.
How do you pack an external frame backpack?
Packing a backpack with an external frame is different from packing an internal frame pack. Unlike an internal one, heavier items are placed at the upper portion of your bag instead, the midweight items in the middle, and the most lightweight items at the bottom.
Having the heavy equipment at the top helps set the weight of your pack over your hips and helps keep you in an upright position.
Conclusion
Before packing your backpack, make sure to first determine what items are essential to bring to avoid overpacking.
Create a checklist for these items so you can keep track of them from the beginning to the end of your hiking trip.
Finally, make sure to maximize the use of each of your backpack’s components. When each backpack part is used effectively and efficiently, the ease and comfort of carrying your pack all add up and contribute to an overall excellent backpacking experience. | https://hikershq.com/how-to-pack-a-backpack-the-right-way/ |
Inverse theory in seismology has many applications. Some of the most important are:
1) Earthquake location
2) Determining 1D velocity and density structure of the Earth
3) Seismic tomography – i.e., 3D velocity variations.
Many problems in the physical sciences can be written in the form of a linear equation:
𝐀𝐀𝐀𝐀=𝐝𝐝
Where we define:
A = model/data kernel. This provides the relationship between model parameters and data.
m = model vector. Contains the unknown model parameters.
d = data vector. Contains our observations.
Example: Straight line fitting
A simple example would be temperature measurements (Ti) made as a function of depth (zi) in the Earth.
Looking at these data we see what looks to be a linear increase of temperature with depth. So, let’s try and describe our ith temperature measurement as follows:
𝑇𝑇𝑖𝑖=𝑎𝑎+𝑏𝑏𝑧𝑧𝑖𝑖
That is, we want to find the equation of a straight line that best fits our observations. We can write this in matrix form:
GEO 5210 – Seismology I L14-2
⎣⎢⎢⎢⎡𝑇𝑇1𝑇𝑇2𝑇𝑇3𝑇𝑇4𝑇𝑇5⎦⎥⎥⎥⎤=⎣⎢⎢⎢⎡11111𝑧𝑧1𝑧𝑧2𝑧𝑧3𝑧𝑧4𝑧𝑧5⎦⎥⎥⎥⎤𝑎𝑎𝑏𝑏
Where our data vector (d) contains our temperature measurements (T1, T2, …, T5), our model vector (m) contains the unknowns (our slope – b and intercept – a), and the model kernel (A) shows the relationship we are assuming between our data and unknowns.
Just multiplying out the first term of our matrix above we can see that this represents the relationship we are looking for:
𝑇𝑇1=𝑎𝑎+𝑏𝑏𝑧𝑧1
If the system above was evenly determined (i.e., we had the same number of equations and unknowns) then we could easily find the solution of 𝐀𝐀𝐀𝐀=𝐝𝐝 by just solving for m. That is:
𝐦 =𝐀𝐀−1𝐝𝐝
We can see why this is called inverse theory, because to find our solutions (our model parameters) we have to find the inverse of the model kernel.
But, our example problem had 2 unknowns and 5 observations. This is often the case that we encounter, i.e., we usually have more observations than unknowns – this is referred to as an overdetermined system.
Overdetermined Systems
Recall that a matrix A is invertible if there exists a matrix B such that: AB = BA = I. Non-square matrices are not invertible. Hence, in our example above we have a 5 × 2 matrix, which is not square and not directly invertible.
Traditionally, what is done is to look for the solution that provides the best fit in the least squares sense. Consider the next image:
GEO 5210 – Seismology I L14-3
Here we show our observed temperature readings (red circles) and a possible line fit to these observations. The black cross shows the predicted (model) value for this line at each depth. What we calculate is the residual. Where we define the residual = observed value – model value.
The least-squares solution provides the best-fit where we define the best-fit as the line for which the sum of the squared residuals has its least value. That is, we seek to minimize:
𝑆𝑆=Σ𝑟𝑟𝑖𝑖2𝑛𝑛𝑖𝑖=1
Where ri is the ith residual.
We set up our equations as:
𝐀𝐀𝐀𝐀=𝐝𝐝
The solution by least squares can be determined from multiplying each side of the above equation by the transpose of A: 𝐀𝐀𝑡𝑡 (see your linear algebra text for proof).
⇒𝐀𝐀𝑡𝑡𝐀𝐀𝐀𝐀=𝐀𝐀𝑡𝑡𝐝𝐝
Now we solve for m:
⇒𝐦 =(𝐀𝐀𝑡𝑡𝐀𝐀)−𝟏𝟏𝐀𝐀𝑡𝑡𝐝𝐝
Note that in our example A is a 5 × 2 matrix. So, At is a 2 × 5 matrix. So, multiplying 𝐀𝐀𝑡𝑡𝐀𝐀 we get a 2 × 2 matrix, which is square, and possibly invertible.
Underdetermined Systems
Underdetermined systems are also possible. That is, we have more unknowns than equations. If we try the least squares solution we find that 𝐀𝐀𝑡𝑡𝐀𝐀 is singular (i.e., it has no inverse). There are an infinite number of solutions. That is, if we try to fit a straight line to a single data point, any line will fit through that data point:
GEO 5210 – Seismology I L14-4
This is unfortunate because sometimes parts of problems we are trying to solve may be underdetermined.
The traditional approach to handling this is to look for the simplest solution. That is, we search for the model values that have the shortest length in the least squares sense. Specifically we seek to minimize:
𝑆𝑆=Σ𝑚𝑚𝑖𝑖2𝑖𝑖
In this case, the solution is:
𝐦 =𝐀𝐀𝑡𝑡(𝐀𝐀𝐀𝐀𝑡𝑡)−1𝐝𝐝
To make this clear, let’s take a look at an example. Suppose we have just one measurement:
T1 = 5° at z1 = 10 m.
So, we set up our matrix equation as:
𝐀𝐀𝐀𝐀=𝐝𝐝
⇒[1𝑧𝑧1]𝑎𝑎𝑏𝑏=[𝑇𝑇1]
⇒𝑎𝑎𝑏𝑏=
Solving 𝐦 =𝐀𝐀𝑡𝑡(𝐀𝐀𝐀𝐀𝑡𝑡)−1𝐝𝐝 we get:
⇒𝑎𝑎𝑏𝑏=110110−1
⇒𝑎𝑎𝑏𝑏=110(101)−1
⇒𝑎𝑎𝑏𝑏=
1101101[
5]
⇒𝑎𝑎𝑏𝑏=510150101
GEO 5210 – Seismology I L14-5
⇒𝑎𝑎=5101=0.0495 (the intercept)
⇒𝑏𝑏=50101=0.495 (the slope)
And our solution length is:
𝑆𝑆=Σ𝑚𝑚𝑖𝑖2𝑖𝑖=𝑎𝑎2+𝑏𝑏2=.247
So, we get a straight line passing through our point that looks like:
But is this solution really of any interest to us?
The problem in geophysics is that we often encounter cases where parts of our problem are over-determined and other parts are under-determined. So, typically we try to seek a compromise between minimizing the prediction error (the residuals) and the solution length.
Damped Least Squares
The damped least squares solution is:
𝐦 =(𝐀𝐀𝑡𝑡𝐀𝐀+λ2𝐈𝐈)−1𝐀𝐀𝑡𝑡𝐝𝐝
Where λ is a damping factor.
We try to choose a value of λ that minimizes both the prediction error and solution length.
• If λ2 is large the emphasis is on minimizing the solution length.
GEO 5210 – Seismology I L14-6
The effect of a large damping factor is to produce a smooth model (i.e., we have a small model length) but not necessarily a great fit to the data.
• If λ2 is small the emphasis is on minimizing the residuals (prediction error).
The effect of a small damping factor is have very small residuals but a very rough model (and a very large solution length).
We typically try to find a balance between these two end-member cases. For example, we can try a range of values for λ and produce a trade-off curve as shown below. Here we try to find the optimal solution as a balance between model roughness and model misfit. Calculating model roughness can be done in a variety of ways, for example by looking at the 2nd derivative of the model values.
GEO 5210 – Seismology I L14-7
But, one must always be cautious of these solutions. The optimal model doesn’t necessarily imply it is really the Earth we are looking at.
The figure below is an example of the effect of damping in a seismic tomography model. This is from the S-wave tomography model S20RTS by Jeroen Ritsema. It shows a cross-section through the Earth (cutting through the central Pacific LLSVP). Here we can see the effect that choosing a different damping parameter can have on the resulting model. On the left we have a heavily damped model which gives us a very smooth model. Whereas on the right we have less damping that results in a much rougher model and stronger perturbations in velocity.
2. Tau-P Inversion
Previously we noted that travel-time vs. distance or ray parameter vs. distance plots do not produce singularly valued functions. To get around this limitation we generate a new function called a Tau-p or τ(p) curve.
GEO 5210 – Seismology I L14-8
Setting up the inverse problem:
Recall from a previous lecture that we defined Tau(p) as follows:
𝜏𝜏(𝑝𝑝)=2(𝑢𝑢2−𝑝𝑝2)12 𝑑𝑑𝑑 𝑧𝑧𝑝𝑝0
We can write this instead for a stack of discrete layers:
𝜏𝜏𝑝𝑝𝑗𝑗=2𝑢𝑢𝑖𝑖2−𝑝𝑝𝑗𝑗212𝑛𝑛𝑖𝑖=1ℎ𝑖𝑖; 𝑢𝑢𝑖𝑖>𝑝𝑝𝑗𝑗
That is, we have measured τ at a number of discrete ray parameters (p1, p2, p3, …, pm). And we decide to parameterize our Earth model as a series of n-layers, each with thickness h:
Let’s think about this problem in the sense of straight-line fitting segments of our travel-time vs. distance curve:
GEO 5210 – Seismology I L14-9
That is, what if we approximate the real travel-time curve (blue), by a series of straight line segments (red segments). Each one of these segments has a ray parameter p, and let’s assume that the slowness is u. This is strictly only true if we are looking at refracted arrivals (headwaves – see the aside at the end of this lecture), but is a good first approximation in any case, and is true in the limit that our straight line segment lengths go to zero.
Let’s consider a few values of this equation.
𝜏𝜏𝑝𝑝𝑗𝑗=2𝑢𝑢𝑖𝑖2−𝑝𝑝𝑗𝑗212𝑛𝑛𝑖𝑖=1ℎ𝑖𝑖; 𝑢𝑢𝑖𝑖>𝑝𝑝𝑗𝑗
j = 1
𝜏𝜏(𝑝𝑝1)=2𝑢𝑢𝑖𝑖2−𝑝𝑝1212𝑛𝑛𝑖𝑖=1ℎ𝑖𝑖
⇒𝜏𝜏(𝑝𝑝1)=2ℎ1(𝑢𝑢12−𝑝𝑝12)12+2
ℎ
2(𝑢𝑢22−𝑝𝑝12)12+⋯
Recall that in our setup we assume that u1 = p1, u2 = p2, etc. Hence our first term (𝑢𝑢12−𝑝𝑝12)=0. Since we have increasing velocity with depth, that means that u2 < u1. And u1 = p1, so that u2 < p1. Thus, our second term (𝑢𝑢22−𝑝𝑝12)12 is undefined (hence, the condition that 𝑢𝑢𝑖𝑖>𝑝𝑝𝑗𝑗).
So, 𝜏𝜏(𝑝𝑝1)=0. This makes sense since our first straight-line segment passes through the origin.
j = 2
𝜏𝜏(𝑝𝑝2)=2ℎ1(𝑢𝑢12−𝑝𝑝22)12+2
ℎ2(𝑢𝑢22−𝑝𝑝22)12
The second term is zero here, so:
⇒𝜏𝜏(𝑝𝑝2)=2ℎ1(𝑢𝑢12−𝑝𝑝22)12
j = 3
Just considering the non-zero terms:
𝜏𝜏(𝑝𝑝3)=2ℎ1(𝑢𝑢12−𝑝𝑝32)12+2
ℎ
2(𝑢𝑢22−𝑝𝑝32)12
All terms
So, it should be obvious by now that we can write this in the form of a matrix:
GEO 5210 – Seismology I L14-10
𝜏𝜏(𝑝𝑝2)𝜏𝜏(𝑝𝑝3)⋮𝜏𝜏(𝑝𝑝𝑚𝑚)=⎣⎢⎢⎢⎢⎡2(𝑢𝑢12−𝑝𝑝22)1200…2(𝑢𝑢12−𝑝𝑝32)122(𝑢𝑢22−𝑝𝑝32)120…⋮2(𝑢𝑢12−𝑝𝑝𝑚𝑚2)12⋮2(𝑢𝑢22−𝑝𝑝𝑚𝑚2)12⋱⋮…2(𝑢𝑢𝑛𝑛2−𝑝𝑝𝑚𝑚2)12⎦⎥⎥⎥⎥⎤ℎ1ℎ2⋮ℎ𝑛𝑛
Which is a matrix equation of the form:
𝝉𝝉=𝐀𝐀𝐀𝐀
Which can be inverted for the layer thicknesses (h).
3. 1D Seismic Velocity Models
The first 1-D models of Earth’s seismic velocity structure were set up by Jeffreys and Bullen. Their 1940 JB model consisted of 7 layers labeled A through G as follows:
Layer
Deepest Depth (km)
Region
A
33
Crust
B
413
Upper Mantle
C
984
Mantle Transition
D
2898
Lower Mantle
E
4982
Outer Core
F
5121
Core Transition
G
6371
Inner Core
The layer names A through G are no longer used. But, it is interesting to note that early on the lowermost part of the D layer was observed to be different, hence the D layer was split into the D’ and Dʺ layers. Dʺ is still used for the lowermost part of the mantle. Another interesting feature was the F-layer, or the Core transition zone. This was dropped in future models, but now researchers are putting forth further evidence that there is a transition region from the outer- to inner- core, and hence the F-layer is making a comeback.
More recent developments are:
1981 – PREM (Preliminary Reference Earth Model) – by Dziewonski and Anderson.
Note that these models typically invert for seismic velocities as polynomial functions in different bands of the Earth as opposed to a stack of layers as we discussed above.
GEO 5210 – Seismology I L14-11
PREM model.
1991 – IASP91 (International Association of Seismology and the Physics of the Earth’s Interior) – by Kennett and Engdahl.
This model primarily improves the seismic velocities at the mantle transition zone.
1995 – AK135 – by Kennett, Engdahl, and Buland.
The main difference in model AK135 from IASP91 is in the velocities near the boundary of the inner core.
The next figure shows the difference between the JB40 model and the IASP91 model. As can be seen the variations aren’t that dramatic.
GEO 5210 – Seismology I L14-12
From Stein & Wysession.
The Moon
The only other planetary body for which we have 1D seismic velocity profiles is the moon. Recall that we installed seismometers on the moon during the Apollo missions:
Apollo 12 Alsep (Apollo Lunar Surface Experiments Package)
GEO 5210 – Seismology I L14-13
Several competing models currently exist. But, one of the best models is by Nakamura 1983. Note that these models do not resolve structure down to the lunar core.
Model Nakamura 1983. Plot by Yao Yao (green – S-wave velocity; red – P-wave velocity)
4. Density Structure
Models like PREM also include density as a function of depth. How is this determined? The answer can be seen by looking at the Adams-Williamson equation.
Assume that the Earth is made of infinitesimally thin spherical shells with uniform properties.
We know at depth that pressure (P) is given by:
𝑃𝑃=𝜌𝜌𝜌𝜌ℎ
Where,
g = gravitational acceleration.
ρ = density
h = depth
If we consider a change in pressure ΔP with increasing depth Δh:
Δ𝑃𝑃=𝜌𝜌𝜌𝜌Δℎ
⇒Δ𝑃𝑃Δℎ=𝜌𝜌𝜌𝜌
GEO 5210 – Seismology I L14-14
And, in the limit Δℎ⟶0
⇒d𝑃𝑃dℎ=𝜌𝜌𝜌𝜌
That is the change in pressure with increasing depth is +ρg. Going the other way, with increasing radius:
⇒𝑑𝑑𝑑 𝑑𝑑𝑑 =−𝑔 (𝑟𝑟)𝜌𝜌(𝑟𝑟)
That is, the pressure decreases with increasing radius.
We also know that the acceleration of gravity at radius r is (just equate Newton’s second law with Newton’s law of universal gravitation):
𝑔 (𝑟𝑟)=𝐺𝐺𝑀𝑀𝑟𝑟𝑟𝑟2
Where,
Mr = Mass within radius r.
Thus,
⇒𝑑𝑑𝑑 𝑑𝑑𝑑 =−𝐺𝐺𝑀𝑀𝑟𝑟𝑟𝑟2𝜌𝜌(𝑟𝑟)
From the chain rule:
𝑑𝑑𝑑 𝑑𝑑𝑑 =𝑑𝑑𝑑 𝑑𝑑𝑑 𝑑𝑑𝑑 𝑑𝑑𝑑
⇒𝑑𝑑𝑑 𝑑𝑑𝑑 =−𝐺𝐺𝑀𝑀𝑟𝑟𝜌𝜌(𝑟𝑟)𝑟𝑟2𝑑𝑑𝑑 𝑑𝑑𝑑 (Eqn 1)
Recall that bulk modulus (k) (or Incompressibility) is a materials ability to resist being compressed under a pressure equal in all directions.
Bulk modulus = k VVP−ΔΔ=,
Where P is the Pressure (Force/Area) applied to a volume of material given by V. Graphically, if we apply an equal Pressure (P) on all sides…
GEO 5210 – Seismology I L14-15
Then the box deforms as follows…
Where the dashed lines show the volume of the original, uncompressed, box.
For small volumes:
𝑘𝑘=𝑑𝑑𝑑 𝑑𝑑𝑑𝑑−𝑉 ; (𝐸𝐸𝐸𝐸𝐸𝐸 2)
Noting that we have a minus sign so that with increasing pressure we get a smaller volume.
Since we know that 𝜌𝜌=𝑚𝑚/𝑉 we can write:
𝑑𝑑𝑑 𝑑𝑑𝑑𝑑=𝑑𝑑𝑑𝑑𝑑𝑑𝑚𝑚𝑉
Carrying out the derivative:
⇒𝑑𝑑𝑑 𝑑𝑑𝑑𝑑=−𝑚𝑚𝑉 2
And substituting back in 𝜌𝜌=𝑚𝑚/𝑉 :
⇒𝑑𝑑𝑑 𝑑𝑑𝑑𝑑=−𝜌𝜌𝑉
GEO 5210 – Seismology I L14-16
⇒𝑑𝑑𝑑𝑑𝑉 =−𝑑𝑑𝑑 𝜌𝜌
Now, if we substitute this into Eqn 2:
⇒𝑘𝑘=𝑑𝑑𝑑 𝑑𝑑𝑑𝑑−𝑉 =𝑑𝑑𝑑 𝑑𝑑𝑑 𝜌𝜌=𝜌𝜌𝑑𝑑𝑑 𝑑𝑑𝑑
⇒𝑑𝑑𝑑 𝑑𝑑𝑑 =𝜌𝜌𝑘𝑘
And substituting this back into Eqn 1:
⇒𝑑𝑑𝑑 𝑑𝑑𝑑 =−𝐺𝐺𝑀𝑀𝑟𝑟𝜌𝜌(𝑟𝑟)𝑟𝑟2𝑑𝑑𝑑 𝑑𝑑𝑑 =−𝐺𝐺𝑀𝑀𝑟𝑟𝜌𝜌(𝑟𝑟)𝑟𝑟2 𝜌𝜌(𝑟𝑟)𝑘𝑘
Now, if we recall our seismic wave speeds:
P-wave velocity = 𝛼𝛼=𝑘𝑘+43𝜇𝜇𝜌𝜌
S-wave velocity = 𝛽𝛽=𝜇𝜇𝜌𝜌
⇒𝜇𝜇=𝛽𝛽2𝜌𝜌
⇒𝛼𝛼=𝑘𝑘+43𝜇𝜇𝜌𝜌=𝑘𝑘+43𝛽𝛽2𝜌𝜌𝜌𝜌
⇒𝛼𝛼2=𝑘𝑘𝜌𝜌+4𝛽𝛽23
Rearranging:
⇒𝑘𝑘𝜌𝜌=𝛼𝛼2−4𝛽𝛽23
⇒𝜌𝜌𝑘𝑘=1𝛼𝛼2−43𝛽𝛽2
And substituting back into our previous equation for the rate of change of density with respect to radius:
GEO 5210 – Seismology I L14-17
⇒𝑑𝑑𝑑 𝑑𝑑𝑑 = −𝐺𝐺𝑀𝑀𝑟𝑟𝜌𝜌(𝑟𝑟)𝑟𝑟2 𝜌𝜌(𝑟𝑟)𝑘𝑘=−𝐺𝐺𝑀𝑀𝑟𝑟𝜌𝜌(𝑟𝑟)𝑟𝑟21𝛼𝛼2−43𝛽𝛽2
If we let 𝜑𝜑=𝛼𝛼2−43𝛽𝛽2, then we arrive at the Adams-Williamson equation:
𝑑𝑑𝑑 𝑑𝑑𝑑 = −𝐺𝐺𝑀𝑀𝑟𝑟𝜌𝜌(𝑟𝑟)𝑟𝑟2𝜑𝜑
This equation gives us the density gradient with respect to radius. Unfortunately, density is also on the RHS of this equation, which is what we are interested in solving for. We already know the seismic velocities however in great detail (see previous lecture!). So, how do we solve this problem?
What we do is an iterative approach. That is, we start at the Earth’s surface at a known density:
𝜌𝜌(6371 𝑘𝑘𝑘 )=3300𝑘𝑘𝑘 𝑚𝑚3⁄
We know the Mass of the Earth (Mr) and the seismic wave speeds, so we can now calculate the gradient 𝑑𝑑𝑑 𝑑𝑑𝑑 . Hence, with this gradient we can linearly extrapolate the density to a new smaller radius:
Now, with this new density, we can calculate a new Mr at the new radius, and repeat. Hence, it is an iterative process. Remember, we also have important constraints that must be satisfied:
• Total Mass of the Earth: ME = 5.974×1024 kg.
• Mass at each successive level: 𝑀𝑀𝑟𝑟=𝑀𝑀𝐸𝐸−4𝜋𝜋∫𝜌𝜌(𝑟𝑟)𝑟𝑟2𝑑𝑑𝑑 𝑅𝑅𝐸𝐸𝑟𝑟
• Moment of inertia constant: 𝐼𝐼𝑚𝑚𝑎𝑎2=0.3307
There are a couple problems with direct implementation of this approach that also need to be accounted for.
GEO 5210 – Seismology I L14-18
• This assumes adiabatic compression. But, convection is happening in the mantle so an extra term accounting for convection must be included.
• This approach also assumes that the composition is constant throughout the Earth. This is readily accounted for by introducing density jumps at compositional boundaries.
Are you busy and do not have time to handle your assignment? Are you scared that your paper will not make the grade? Do you have responsibilities that may hinder you from turning in your assignment on time? Are you tired and can barely handle your assignment? Are your grades inconsistent?
Whichever your reason may is, it is valid! You can get professional academic help from our service at affordable rates. We have a team of professional academic writers who can handle all your assignments.
Our essay writers are graduates with diplomas, bachelor, masters, Ph.D., and doctorate degrees in various subjects. The minimum requirement to be an essay writer with our essay writing service is to have a college diploma. When assigning your order, we match the paper subject with the area of specialization of the writer.
We value our customers and so we ensure that what we do is 100% original..
With us you are guaranteed of quality work done by our qualified experts.Your information and everything that you do with us is kept completely confidential. | https://www.assignmentden.com/introduction-to-inverse-theory/ |
Astria AI is an AI-powered tool that helps businesses improve their customer service and support operations. It uses natural language processing to understand customer inquiries and generates responses that are accurate and tailored to the customer’s needs. The tool can also provide analytics and insights into customer behavior and sentiment, helping businesses make data-driven decisions. | https://noteableai.com/ai-tools/astria/ |
Country Gabon is situated in a location / continent Africa. Gabon has an area of 267 667 km2 and 1 608 321 residents. The highest point has a height 1 575 above sea level. and it is called Mont Iboundji. The lowest point is located at the level of 0 above sea level and it is named Atlantic Ocean. System of government is republic and the date of independence 17th August 1960. The capital city is Libreville. Gabon has the international abbreviation GB.
Total gross domestic product (GDP) is 24 890 000 000 $. Total gross domestic product per capita in purchasing power parity is 16 400 $. GDP grows by 5.80 % a year. Inflation (consumer price index) is equal to 1.20 % a year. Gabon have 737 200 working-age population (from a total population 1 608 321 people). Unemployment is at 21.00 %. Gabon issued 6.00 % GDP to healt care and 0,90 % GDP to army. The public debt of the country is 20.60 % GDP. The total amount of foreign debt is 2 726 000 000 USD.
As suggested above, Gabon has 1 608 321 people. Population growth is in the amount 1.98 % per year. Number of children born per 1000 population per year is 35.00.Every mother has average 4.56 children. The infant mortality rate is 49.00 and maternal mortality 230.00 deaths per 100,000 births. Average estimated life expectancy makes 52.29 years. Mortality is 13.07 people per 1000 population per year.
Gabon has 9 170 km of roads, 649 km of railway lines and 45 airports. The total length of waterways (navigable rivers, canals, etc.) is 1 600 km. There is registered 2 ships.
Number of active mobile phones (sim card) in the country Gabon is 1 800 000. Number of active fixed telephone lines is 30 000. Gabon has 98 800 internet users, who have the available 103 Internet connections. Gabon has been assigned a domain first Choose range .ga.
Gabon consumes a year 1 301 000 000 kWh of electricity. Annual electricity production is 1 604 000 000 kWh in power plants with a total installed electrical capacity 415 000 kW. Gabon exports 0 kWh and imports 0 kWh of electricity per year Energy mix of power generation is as follows: fossil fuels: 59 %, nuclear energy: 0 %, renewable: 0.0 %, hydropower: 41.0 %. The country Gabon is harvested annually 244 700 barrels of oil.
Keywords: list of countries, world countries, Gabon, Flag of Gabon, economy, list of flags, all flags, demography, Flags of countries, transport, telecommunications, energetics, information, flag states, national flags, flags of countries in the world, flag, politic. | http://flags.vlajky.org/africa/gabon.php |
THIS invention relates to a urine sampling device.
For accurate medical analysis of urine, it is important that a "middle fraction" of urine be obtained. By this is meant a fraction of the total urine discharge which is neither at the beginning nor at the end of the discharge. It is also important that the middle fraction which is obtained be uncontaminated by the initial discharge.
European patent application 79302118.9 (publication No 0009980) describes a urine sampling device which is designed to capture a middle fraction of the voided urine. The device described in this document has the disadvantage that the middle fraction of urine which is discharged and eventually captured is able to contact the initial fraction both directly and by contacting side walls of the device which have already been contacted by urine in the initial fraction. It is believed that this contamination may render the eventual middle fraction unsuited to accurate medical analysis.
US patent 3,722,503 also describes a urine sampling device designed to capture a middle fraction of a urine discharge. Once again, urine in the middle fraction can be contaminated by direct contact with urine in the initial fraction and also by contact with the walls of the device previously contacted by the urine of the initial fraction.
British patent 1354001 also addresses the problem of capturing a middle fraction, but again is prone to contamination of the captured fraction by the initial fraction. British patent 1497777 describes a further device intended for the same purpose but in this case requires manual intervention by the user to wet a sponge with urine discharged in the middle fraction.
US Patent Specification 3,635,091 relates to midstream urine specimen and fractional fluid collectors constructed in the manner defined in the precharacterising part of Claim 1.
According to the present invention, there is provided a urine sampling device characterised in that the trigger mechanism is float-operated and comprises a float arranged to float upwardly in the initial fraction of urine and to initiate operation of the trigger mechanism to cause the flow passage to open.
Preferably, the flow passage is caused to open automatically by a trigger mechanism once the initial fraction has been discharged into the receptacle. Preferably also, the device comprises a float arranged to float upwardly in the initial fraction of urine and to initiate operation of the trigger mechanism to cause the flow passage to open.
The flow passage may be provided by a funnel having flexible side walls. The funnel may include rigid members attached to the mouth of the funnel and movable from a closed position alongside one another to an open position spaced apart from one another to open the mouth of the funnel. Spring biasing means may be provided to open the funnel in response to operation of the trigger mechanism.
The device may also comprise a detent member operating initially to hold the rigid members in their closed position alongside one another, and an actuator movable in response to upward movement of the float to disable the detent member, thereby freeing the rigid members for movement apart from one another under the bias of the spring biasing menas. The flow passage may have an inlet mouth which which substantially coincides with the inlet to the receptacle when the flow passage is open. The flow passage may also have an outlet leading into a discharge spout which protrudes in use into the sample container, the discharge spout having an outlet at its operatively lower end.
The invention extends to the combination of a urine sampling device of this kind and a sample container, the container having a mouth dimensioned to make a friction fit with a rib surrounding the discharge spout.
Figure 1
Figure 2
Figure 3
Figure 4
Figure 5
Figure 6
shows a cross-sectional view through a urine sampling device according to the invention;
shows a plan view of the device;
shows a another cross-sectional view of the device prior to operation of the trigger mechanism;
shows a view similar to that of Figure 3 after operation of the trigger mechanism;
shows a perspective view of certain parts of the device before operation of the trigger mechanism; and
shows a view similar to Figure 5, but after operation of the trigger mechanism.
The invention will now be described in more detail, by way of example only, with reference to the accompanying drawings in which:
The illustrated urine sampling device 10 has a receptacle 12 moulded in rigid plastics material. The receptacle has an inlet 14 shaped to fit about the urethral opening of a user. Inside the receptacle, there is a float chamber 16 accommodating a loose float 18 with a specific gravity less than that of urine. Next to the float chamber is an overflow passage 20 which communicates with the interior of the receptacle 12 via an overflow 22 defined by a wall 24.
The float chamber 16 depends downwardly from a base 26 of the receptacle with which it is integrally formed. The base 26 has clipping formations 28 by means of which it can be clipped to the upper part of the receptacle 12. The base defines a circular rib 30 and a depending spout 32 which extends downwardly to a chamfered outlet 34. The interior of the float chamber 16 is in fluid communication with the interior 36 of the receptacle 12.
Figure 1 shows a clear plastics sample container 40 which is attached to the base 26 by frictional engagement of its circular upper edge with the outer periphery of the rib 30. The spout 32 protrudes downwardly into the container as illustrated.
Fixed at its lower end to the base 26 adjacent the float chamber 16 is a post 42 carrying spaced apart guide pins 44. A cranked actuator member has a lower horizontal portion 46 which rests upon the top of the float 18, a cranked portion 48 and a vertical portion 50 connected integrally with the portion 46 via the portion 48. The vertical portion 50 is a vertical slide fit between the guide pins 44 and is accordingly able to move vertically upwardly in response to upward movement of the float 18 in the chamber 16.
At its upper end, the portion 50 carries a detent member 52 in the form of a rigid plate formed with a central cut-out.
A pin 54 depends downwardly into the cut-out from the upper edge of the detent member 52.
Spanning across the upper end of the post 42 is a curved member 56 which carries, at its opposite ends, a pair of transverse slide elements 58 formed with abutments 59 at their free ends. Another curved member 60, which has a shape similar to that of the member 56, has holes at it ends through which the elements 58 pass. The member 60 is able to slide relative to the member 56 between the positions seen in Figures 5 and 6. In the Figure 5 position of the member 60, it sits alongside the member 56, while in Figure 6 position, it is spaced apart from the member 56.
Attached to the members 56 and 60 are the upper edges of a flexible plastics funnel 62.
The funnel tapers inwardly to an outlet at its base, the outlet being defined by a plastics plug 64 locating as a tight fit in an opening formed in the base 26 and leading to the spout 32.
Referring particularly to Figures 5 and 6, it will be appreciated that, when the members 56 and 60 are alongside one another (Figure 5), the entrance to the funnel is closed while when these members are apart (Figure 6), the entrance to the funnel is open.
A bracket 68 depends downwardly from the member 60 and carries a transverse lug 70 which is formed with a hole 72. With the members 56 and 60 together, the lug 70 protrudes through a slot formed in the post 42 and can be engaged by the pin 54 of the detent member 52. With the pin 54 received in the hole 72, the lug 70 cannot be pulled out of the slot in the post.
A spring element 74 of bowed shape has its ends fastened to the members 56 and 60 at approximately their mid-points. The bias applied by the spring element is such as to urge the member 60 away from the member 56, i.e. from the Figure 5 to the Figure 6 position.
In use of the described device, with the member 60 in the Figure 5 position, the user holds the device such that the inlet 14 is adjacent her urethral opening and commences urinating. With the member 60 in the Figure 5 position, the funnel 62 is closed, and urine which is initially voided flows into the receptacle 12 and from there into the float chamber 16. The urine level in the chamber 16 builds up, and the float 18 rises. This in turn causes the portion 50 of the cranked actuator member to lift up vertically, raising the detent member 52 and pin 54 as it does so. Eventually, the portion 50 has risen far enough for the pin 54 to disengage from the hole 70, freeing the member 60 from the member 58. Under the bias of the sping element 74, the member 60 moves quickly to the Figure 6 position to open the funnel 62. Thus the various components constitute a trigger mechanism which operates to open the funnel after a predetermined initial volume of urine has been discharged.
When open, the mouth of the funnel has a size approximately the same as the inner dimensions of the receptacle 12, with the result that subsequently voided urine enters the funnel without any substantial contact with the inner surfaces of the receptacle 12. Thus this urine is substantially uncontaminated by contact with surfaces which have previously been exposed to the initial fraction of voided urine.
The urine flows down the funnel to the outlet defined by the plug 64, and then flows through the outlet into the container 40 via the spout 32. The urine builds up in the container 40 until it covers the chamfered outlet 34, whereafter further urine is unable to flow into the container.
Further urine which is now discharged backs up in the funnel until it reaches the upper edge 76 thereof. The urine overflows the upper edge 76 and accumulates in the bottom of the receptacle 12 with the initially voided fraction which is still inside the receptacle. When the level in the receptacle 12 has risen far enough, the urine is able to overflow into the overflow passage 20. Normally, the sampling procedure will be carried out with the user seated on a toilet seat, so that the overflowing urine can run to waste in the toilet bowl until urination is completed.
The user is now able to invert the whole device over the toilet bowl, with the container 40 still fitted, so that any urine in the receptacle 12 and float chamber 16 can empty to waste.
The level to which the spout 32 protrudes into the container 40 is chosen so that urine 66 in the container will, upon inversion of the device as described, be accommodated in an ullage space 78 above the outlet 34. When the device has been emptied and is righted again, the urine in the space 78 flows back to the bottom of the container 40 which can now be detached from the rib 30 and capped with a suitable cap which seals the captured midstream or middle fraction sample so that it can be handled and transported to a urine testing laboratory. The device 10 itself is then disposed of, although it is conceivable that it could be cleaned and sterilised for re-use.
The major advantage of the invention is that the middle fraction sample is captured entirely automatically and is substantially uncontaminated either by direct contact with the initial fraction of urine or by contact with surfaces of the device previously contacted by the initial fraction. This feature is of course attributable to the fact that the funnel, which is initially closed, is only opened to pass a middle fraction flow once the initial fraction has been voided.
For hermetic reasons, the device 10 may include a lid 80 (Figure 3) which is releasably attached to the receptacle by means of a safety pin 82. The lid extends over the inlet 14 to prevent ingress of any contaminants into the device prior to use. The lid 80 is removed together with the safety pin 82, thereby freeing the detent member 52 for subsequent upward actuation by the float 18, and rendering the device ready for use. | |
St. John the Baptist Parish is now recognized as an epicenter of the coronavirus outbreak, with a high number of infections and deaths among a small population of residents. Gov. John Bel Edwards said Wednesday that the parish has the highest death rate from the virus per capita compared to all other counties in the United States.
St. John coroner, Dr. Christy Montegut said one-third of the deaths are connected to a nursing home for veterans in Reserve. He said at least seven people from the Southeast Louisiana Veterans Home have died. He said the virus has killed at least 21 people parish-wide.
The Lousiana Department of Veterans Affairs confirmed the coroner's account and added that 18 other residents have tested positive for the virus. In a statement, the department said: "The Louisiana Department of Veterans Affairs is in constant contact with all of our residents and their families, and has informed our families at Southeast Louisiana Veterans Home that 18 residents have tested positive for COVID-19 either in our facility or at the hospital. Of those residents, six have passed away. We have also received information that one additional resident who passed away tested positive for COVID-19 after their death. This brings our total number of Southeast residents who passed away and have a known COVID-19 positive test result to seven. We continue to follow the recommended CDC and Louisiana Office of Public Health protocols in caring for each of our veterans at all five of our state-run veteran homes."
The Louisiana Department of Health has identified Southeast Louisiana Veterans home as having a cluster of coronavirus cases. Thursday, the department reported 214 known cases of coronavirus and 14 deaths in St. John the Baptist. Dr. Montegut said the department’s reports lag a few days behind what the parish is reporting to the state. | https://www.wdsu.com/article/coroner-one-third-of-all-deaths-in-st-john-parish-connected-to-nursing-home-for-veterans-in-reserve/32022027 |
Q:
Can someone reconcile the two definition of Suslin's condition?
I am given two definitions of the so called "Suslin's condition" and I need to reconcile them. I am an undergrad and this is just for exploration.
Definition 1.
A partially ordered set $X$ is said to satisfy the Suslin's condition (or countable chain condition), if every strong antichain in $X$ is countable.
Definition 2:
Given some topological space $(X, \tau)$, $(X, \tau)$ satisfies the Suslin's condition if there are no uncountable collection of mutually disjoint open subset of $X$
These definitions looks very very different to me, can someone please elaborate on how every strong antichain in $X$ is countable means no uncountable collection of mutually disjoint open subset of $X$
Thanks!
A:
The topological condition is a special case of the partial order one.
If we have $(X,\tau)$, we have a partial order $(\tau\setminus\{\emptyset\}, \subseteq)$, the non-empty open sets, ordered by inclusion.
Two open sets are disjoint iff they have no common lower bound in the p.o., because the only candidate would be the empty set (the intersection of two open sets is always open; if non-empty it would be a common lower bound).
So a pairwise disjoint family of non-empty open sets is precisely a strong antichain in this partial order, and Suslin's condition in partial orders says all those strong antichains are at most countable (or equivalently there is no such uncountable collection), precisely the Suslin condition on topological spaces.
| |
Firefighter Command: Raging Inferno (other titles: Fire Department 2) is a strategy game released in 2004 by Brigades. The game was released for PC (Windows).
Firefighter Command Raging Inferno is a strategy and simulation game in which the player takes on the role of a commander from the crisis management team in one of the cities located on the west coast of the United States of America. During the game, nearly 40 firefighters with various skills and vehicles such as a ladder truck, heavy fire extinguisher or an ambulance are under the control of the user. The player's role is to save victims and extinguish fires during 12 missions divided into 3 scenarios of different difficulty levels.
Firefighter Command Raging Inferno is a game that belongs to the so-called real-time game genre. This means that the game takes place in real time, and the player must react to crisis situations that the game world puts in front of him. The variety of challenges faced by the player, the constant variability of the game environment depending on his actions and a very diverse vehicle and character base allow for a very real feeling from the game and creating your own tactics. | https://abandonwaregames.net/game/firefighter-command-raging-inferno |
A quality abstract must necessarily include a competent, without unnecessary borrowing and, most importantly, an understandable study of the subject. The text should reflect the closest and most authoritative views of specialists in this field, including analytics, the results of scientific research.
In the final part of the paper, its author sets out his opinion on the issue, as well as ways to resolve existing problems and conclusions. At the time of writing the essay, it is important to adhere to the sequence, to correctly place accents. Well, when the author is really interested in the topic, he is well oriented in it.
The choice of topics is not always available, but if it is available, it is recommended to choose the current topic. After this, you need to determine the sources, study them and systematize, carry out the initial processing. The completion of the essay is its presentation to the teacher or public speaking.
Even with a high level of service, research paper writing companies continue to work to ensure that customers receive the service as quickly and profitably as possible. We are well aware that in most cases, our clients have a busy rhythm of life and a minimum of free time, and therefore there is no opportunity to plan our life for many months to come. With an urgent need for a quality essay, it is important to exclude the situation of a possible refinement of the work due to the urgency of its preparation.
Therefore, our authors pay maximum attention to each individual order, trying to fulfill it with dignity, without repeated attempts and avoid possible corrections, adjustments. To order assistance in writing an essay with us means to secure a small victory in our studies, including over the pickiness and exactingness of strict teachers.
Why to use research paper writing jobs – a forced reality?
Not every student in the modern rhythm of life has time to search for material for the essay, its processing and systematization. In addition, not all due to subjective reasons have an analytical mindset. In this case, the best solution may be to order assistance in writing an essay on any topic in accordance with the requirements of the teacher.
Of course, you can try to search for a paper artist through acquaintances, friends, but, as practice shows, this cannot be done in a timely manner due to the complexity of the topic, short lead times, lack of qualifications and preparation, and other reasons. We provide consulting services in writing essays on a wide variety of topics, regardless of the content of the requirements of teachers. | https://preprod-mcifrance.com/quality-essay/ |
Thanks for saving Queen Lateefers, Flossy Flossy, and Grillz, PAWS!
An update from PAWS “When this sweet young cat (Queen Lateefers) arrived at the city shelter, it was clear she needed help. Surrendered with three newborn kittens (Flossy Flossy and Grillz) whose health was failing, Queen also had a hole in the roof of her mouth due to a cleft palate, which could cause food to travel into her nasal cavity or lungs if left uncorrected.
After being scooped up by PAWS, this sweet three-year-old has been in a loving foster home for the last month while her kittens nursed and weaned. Now that her kittens are old enough, we can determine if her cleft palate can be repaired! She has a consult with a veterinarian at VSEC on July 5th and we’re optimistic that we’ll be able to move forward with surgery. | https://philadoptables.org/news/momma-cat-and-kittens-saved-by-paws/ |
Q:
What is the meaning parameter TINYINT(parameter)?
I can not understand why this option.
The signed TINYINT data type can store integer values between -128 and 127.
mysql> create table b (i tinyint(1));
mysql> insert into b values (42);
mysql> select * from b;
+------+
| i |
+------+
| 42 |
+------+
A:
Data-wise, tinyint(1), tinyint(2), tinyint(3) etc. are all exactly the same. They are all in the range -128 to 127 for SIGNED or 0-255 for UNSIGNED. As other answers noted the number in parenthesis is merely a display width hint.
You might want to note, though, that application=wise things may look different. Here, tinyint(1) can take a special meaning. For example, the Connector/J (Java connector) treats tinyint(1) as a boolean value, and instead of returning a numerical result to the application, it converts values to true and false. this can be changed via the tinyInt1isBit=false connection parameter.
A tinyint(1) can hold numbers in the range -128 to 127, due to the datatype being 8 bits (1 byte) - obviously an unsigned tinyint can hold values 0-255.
It will silently truncate out of range values:
mysql> create table a
-> (
-> ttt tinyint(1)
-> );
Query OK, 0 rows affected (0.01 sec)
mysql> insert into a values ( 127 );
Query OK, 1 row affected (0.00 sec)
mysql> insert into a values ( -128 );
Query OK, 1 row affected (0.00 sec)
mysql> insert into a values ( 128 );
Query OK, 1 row affected, 1 warning (0.00 sec)
mysql> insert into a values ( -129 );
Query OK, 1 row affected, 1 warning (0.00 sec)
mysql> select * from a;
+------+
| ttt |
+------+
| 127 |
| -128 |
| 127 |
| -128 |
+------+
4 rows in set (0.00 sec)
mysql>
... unless you change the sql_mode or change the server config:
mysql> set sql_mode=STRICT_ALL_TABLES;
Query OK, 0 rows affected (0.00 sec)
mysql> insert into a values ( -129 );
ERROR 1264 (22003): Out of range value for column 'ttt' at row 1
mysql>
The value used in the DDL for the datatype (eg: tinyint(1)) is, as you suspected, the display width. However, it is optional and clients don't have to use it. The standard MySQL client doesn't use it, for example.
https://dev.mysql.com/doc/refman/5.1/en/integer-types.html
https://dev.mysql.com/doc/refman/5.0/en/numeric-type-overview.html
MySql: Tinyint (2) vs tinyint(1) - what is the difference?
| |
1. Field of the Invention
The invention relates to a process for rolling a metal product and applies more particularly to hot rolling of flat products such as slabs or bands originated from a shaping mill or from continuous casting.
2. Description of Related Art
Hot rolling usually takes place in successive rolling stages in a unit comprising one or several roll stands. Each roll stand can be used as a reversible mill performing a number of reducing passes, alternately in one direction and the other, until the desired thickness is achieved. But, a single rolling pass can be carried out in each stand. The unit operates then as a tandem mill, whereas the rolled product is taken simultaneously in all the stands and its thickness is reduced successively in each roll stand.
The invention applies especially to hot rolling of steels and their alloys, but can also be used, in certain conditions, for rolling non-ferrous metals such as aluminum and its alloys.
Generally, a mill comprises a rigid holding stand with two separate roll standards between which are provided at least two working rolls, superimposed, thus forming a gap enabling the product to be rolled to run through the said gap. In a conventional, so-called quarto arrangement, the working rolls rest each on a back-up roll of larger diameter. In a so-called sexto assembly, idling rolls are interposed between the working rolls and the back-up rolls.
At least the back-up rolls are fitted, at their ends, with journals rotating inside chocks that are mounted to slide into windows provided respectively on both standards of the stand, parallel to a clamping plane, generally vertical, passing more or less through the axes of the working rolls.
The mill is associated with means to control the running of the product between the rolls, at a certain forward speed. In the case of a reversible mill, which rolls alternately into two opposite directions, the forward control means consist, generally, of two roller tables, respectively, one roller table placed upstream of the stand, in the running direction, in order to control the engagement of the product and another roller table, placed downstream, in order to receive the product upon completion of the rolling operation.
In hot rolling, the product is heated, before rolling, up to a temperature of approx. 1200xc2x0 C. in the case of steel, in order to facilitate deformation of the metal and its flow between the rolls. Generally, indeed, in a rolling process, the product exhibits at the inlet of the roll stand a thickness greater than the distance between the rolls and, when it contacts the said rolls, it is driven by a friction effect, then pinched between both rolls, whereas the metal continues flowing and being reduced in thickness, until a thickness more or less equal to the distance between the generatrices opposite both working rolls is achieved. Thus, a roll nip can be defined, delineated by the arcs of contact between each roll and the product.
Rolling, therefore, starts with a raw part such as a slab or a band of variable thickness, which may range between a few millimeters and several hundred millimeters and to each pass corresponds a reduction in thickness that may vary, for instance, from 50 mm to a few ten millimeters.
During rolling, the rolls tend to move away from one another and must therefore be held in place by an opposite roll load which, in a quarto mill, is applied to the chocks of the back-up rolls.
These clamping means are thus used, on the one hand, for prior adjustment of the distance between the rolls and, on the other hand, for maintaining the said distance during the roll pass. They generally consist of screws or hydraulic jacks mounted on the roll stand and resting respectively on both chocks of a back-up roll, whereas the other is blocked in its upward motion. However, other arrangements are possible. For instance, back-up rolls can be used, which comprise a shell mounted to rotate round a fixed shaft and resting on the said shaft via a series of jacks. These jacks then constitute clamping means exerting the rolling load, which is thus distributed over the whole length of the gap.
In all cases, under the effect of the rolling load, certain members of the roll stand will inevitably yield to some extent, thereby increasing slightly the distance between the rolls, which had been adjusted without any product, and therefore causes the crushing foreseen to be reduced. To realise accurately the requested reduction in thickness, the yielding value must be assessed, so that it can be compensated for as exactly as possible.
The rolling load to be applied for keeping a given distance between the rolls depends on how the product will be deformed in the nip between the rolls.
Conversely, the maximum reduction possible in thickness depends on the rolling load that can be applied, taking into account the capacities of the mill.
The reduction in thickness that can be achieved at each pass is therefore limited and this is why a raw product is rolled, normally, in several successive passes, each determining an elementary reduction in thickness, compatible with the capacity of the mill. The total reduction in thickness from a raw thickness eo down a final thickness en can be achieved in n passes according to a progressive thickness reduction process, called a rolling scheme, which depends on the capacity of the mill and on the adjustment means available, on the mechanical and physical features of the roll stand and of the product, as well as the thickness and evenness tolerances to be adhered to.
According to the capacities of the unit available, a single rolling scheme can be defined in which, at each pass, the same average reduction in thickness is achieved. The number of passes to be carried depends then, simply, on the total reduction in thickness to be provided.
However, it may prove necessary to increase the number of passes since the selected average reduction in thickness must be determined so as to remain compatible, for all the passes, with the characteristics of the product and of the roll stand. Still, to improve the productivity, it obviously pays to reduce, as far as possible, the number of passes to be carried out.
But it has also appeared that the final quality of the product, and especially its evenness, depended on the conditions in which rolling is performed and that all the thickness reduction schemes are not equivalent when a product of a set quality should be achieved.
For example, even if a certain temperature of the product can be defined at the beginning of the rolling process, this temperature varies from one pass to the next. Indeed, the product cools down during the waiting time between two successive passes, but the deformation of metal causes, conversely, the product to be heated during the pass and it may prove necessary to cool the product down between two passes in order to prevent excessive cumulated heating.
Still, the deformation conditions of the product, which determine the rolling load to be exerted, depend obviously on the nature of the metal and its temperature.
It therefore seems judicious, in order to obtain a product with set qualities, to adhere to an optimum pattern that depends not only on the mechanical capacity of the installation, but also on the final quality requested for the product.
The last few years have witnessed attempts to automate the rolling process of a flat product enabling to achieve the thickness foreseen with good evenness and by using a minimum number of passes without overloading the roll stand(s).
In such a system, it is necessary to control, at each pass, the adjustment of the clamping means in order to apply between the working rolls, a rolling load enabling to realise the maximum reduction in thickness compatible with the capacity of the mill. This rolling load is assessed in relation to the different rolling parameters on which depend the running conditions of the metal in the chock, notably the reduction in thickness to be provided, the forward speed and the temperature of the product when entering the mill.
According to the practice known until now in the most sophisticated units, on the basis of global parameters such as, for instance the flow stress of a metal in relation to its grade and to its temperature, table of references of its rolling conditions, observed previously for a known steel, can be drawn in order to deduce the conditions to be adhered to when the same steel lies again in the production programme of a unit.
To this end, the predictable rolling load should be assessed in each case. However, this load can only be appraised globally on the basis of the observations made during previous rolling operations. Such an estimate is not accurate enough to adjust the rolling conditions during each pass so as to obtain effectively the optimum reduction in thickness and, in particular, compensate for the yielding effect.
The invention remedies this shortcoming and suggests, thanks to improved modelling technology, a new process enabling to determine with greater accuracy the rolling load to be applied in order to follow a rolling scheme. Moreover, the invention enables to act automatically and in real time on the settings of the mill in order to modify the said settings at each pass in relation to the measurements taken during the previous pass, so that the rolling scheme can be adapted permanently while optimising the settings at each pass.
The invention therefore generally relates to a rolling process of a metal product in a unit comprising:
a holding roll stand with two separate roll standards,
at least two working rolls, superimposed between the standards of the roll stand,
means to control the forward motion of the product during the rolling operation in a nip delineated by two arcs of contact of the product with both rolls, between an inlet section and an outlet section of the nip,
clamping means resting, respectively, on the rolls and on the roll stand, for adjusting the distance between the working rolls corresponding to a reduction in thickness to be carried out and for maintaining the said distance during the roll pass, by applying, between the working rolls, a rolling load that depends on the mechanical and physical characteristics of the roll stand and of the product and on the flow conditions of the metal in the roll nip, and determines a yield effect of the various members of the stand tending to increase the said distance e,
means for adjusting the said clamping means, controlled by a computer associated with a mathematical model.
According to the invention, the computer associated with the mathematical model determines before each pass x, a foreseeable value of the flow stress of the metal corresponding to the deformation to realise in the pass x considered, while taking into account the evolution, during the rolling operation, of the microcrystalline structure of the metal making up the product to be rolled, and the rolling load Fx to be applied in order to achieve the requested reduction in thickness, is calculated before each pass x according to the value thus predicted for the flow stress and the evolution of the said stress during the rolling operation.
Particularly advantageously, the rolling load Fx to be applied for a rolling pass is calculated while taking into account the predictable variation, along the nip, of the flow stress of the metal during the said pass x.
To this end, the rolling nip is divided into a series of p adjacent elementary portions M1, M2, . . . Mi, . . . Mp, each corresponding to an elementary length of forward travel of the product between the rolls, with an elementary deformation xcex5i of the product in each portion M1 between an inlet section of thickness ei-1 and an outlet section of thickness ei, whereas, on the basis of data provided by the mathematical model, the computer determines, for each portion Mi, a predictable value "sgr"I of the flow stress of the metal, corresponding to the said elementary deformation xcex5i and deduces therefrom the elementary rolling load dFi to be applied to the considered portion Mi in order to provide the said elementary deformation xcex5i and that, by integrating the elementary loads dFi into the successive portions M1, M2, . . . Mi, . . . Mp, the computer determines the global rolling load to be applied in order to achieve the requested reduction in thickness and controls, in relation to the global load thus calculated, the adjustment of the clamping means for maintaining the distance between the rolls, in order to achieve the requested reduction in thickness (exxe2x88x921xe2x88x92ex), while taking into account the yield conditions of the metal along the nip and the yield effect resulting from the said global load.
It should be noted, however, that the invention enables thus to determine the rolling load Fx to be applied during a pass x while taking into account the predictable value of the flow stress of the metal resulting from the evolution of the microcrystalline state of the metal during the previous passes.
Generally, the rolling operation is performed according to a rolling scheme enabling to achieve in n successive passes a global reduction in thickness (exxe2x88x921xe2x88x92ex).
According to another characteristic of the invention, the computer determines, by iteration, the rolling scheme to be adhered to while computing beforehand, for each pass, x, the maximum reduction in thickness leading to a predictable rolling load Fx compatible with the capacity of the mill, in relation to a number of rolling parameters comprising the thickness and the temperature of the product as well as its forward speed before entering the said pass x, in order to take into consideration the predictable evolution of the microstructure of the metal from one pass to the next.
In particular, the computer can be associated with permanent measuring means, during the pass, of the effective values of a set of rolling parameters comprising the rolling load applied at each moment, the forward speed of the product and the temperature of the said product respectively at the inlet and the outlet of the mill. Thus, at each pass x, the computer can compare these effective measured values with the values of the said parameters taken into account initially for the said pass x in the determination of the rolling scheme, in order to review the calculation of the said scheme and to add, if needed, correction factors to the parameters taken into account, in order to adapt the rolling scheme in the following passes.
According to a preferred embodiment of the invention, in order to take into account the microcrystalline evolution of the metal during the rolling operation, at least one modelling equation valid for a family of metals having an analogue microcrystalline behavior is established, on the basis of hot deformation tests carried out on sample pieces of at least one typical metal of this family, whereas the said equations depend on a set of parameters associated with the composition of the typical metal. The initial equations thus established are grafted to the mathematical model and, for rolling a product consisting of a metal of the same family as the typical metal, the model is calibrated for the metal to be rolled while modifying the parameters of the said theoretical equations in relation to results of deformation tests performed on a metal whose composition is at least similar to that of the metal to be rolled.
Particularly advantageously, to define modelling equations, an intermediate value can be determined, associated with the deformation speed of the metal and varying in a more or less linear fashion in relation to the flow stress in at least one deformation domain and, on the basis of deformation tests realised for a series of deformation temperatures and speeds held constant, a work-hardening diagram is established for which the variations of the said intermediate value can be represented approximately, in the said domain of deformation, by a family of straight lines to which corresponds at least one linear differential equation, associating the deformation with the flow stress and liable to be integrated by the computer.
On the basis of such a work-hardening diagram, we can establish at least two differential equations associating the deformation with the flow stress, respectively a first equation, linear in shape, giving by analytical integration, an expression of deformation in relation to the flow stress and a second equation liable to be integrated digitally in order to determine the predictable flow stress corresponding to a deformation to achieve.
According to another embodiment, whereas the modelling equations have been established initially for a typical metal and grafted to the mathematical model, these equations can be calibrated for the metal to be rolled, while performing first of all at least one rolling pass, at least one product made up of the metal to be rolled, in at least one roll stand adjusted conventionally and in measuring, during each pass, on the one hand the rolling load actually exerted and, on the other hand, the rolling parameters used by the computer in order to determine, using initial modelling equations, the rolling load to be exerted theoretically. Using a digital regression method, the modifications to be made to the parameters of the said initial equations can be defined in order to provide modelling equations specific to the metal to be rolled.
The invention also covers a particularly advantageous method to exploit the test results in order to establish the modelling equations. In such a method, on the basis of deformation test results each carried out at constant temperature and at constant deformation speed:
a first work-hardening diagram is established, comprising a series of representative curves, for each temperature T, of the variation of the temper-rolling rate xcex8=d"sgr"/dxcex5 in relation to the flow stress "sgr",
the digital data relating to each curve is transformed to establish a second normalised work-hardening diagram comprising a series of curves representative of the variation, in relation to the normalised running stress "sgr"*="sgr"/xcexc(T), whereas xcexc(T) is the shear modulus at the temperature considered,
whereas the said curves have each at least a portion more or less rectilinear situated in at least one domain II, III of the diagram, and the said rectilinear portions are more or less parallel in each domain,
each more or less rectilinear portion is modelled according to a first equation of the type:
k"sgr"*+kxe2x80x2=2xcex8*"sgr"*=b2dxcfx81/dxcex5
xe2x80x83while using as an intermediate variable, the dislocation density xcfx81 such that
"sgr"=xcexcb
xe2x80x83and an analytical integration of the first equation is performed in order to establish, at least for each of the domains II, III, a second modelling equation
xcex5=xe2x88x922/kb2[Xsln(1xe2x88x92x/xs)+X]+xcex
xe2x80x83by defining x=b="sgr"/xcexc="sgr"* and xs=xe2x88x92kxe2x80x2/k, whereas xcex is an integration constant,
whereby the parameters k and kxe2x80x2 are determined, for each of the domains II, III, on the basis of the rectilinear portion of a curve of the second work-hardening diagram corresponding more or less to the predictable temperature of the metal and to the predictable deformation speed when entering the roll stand.
In each of the domains II, III of the work-hardening diagram, the coefficients k and kxe2x80x2 of the first modelling equation can be determined by the computer while following a digital regression method, on the basis of the temperature and of the parameters representative of the crystalline state of the metal when entering the roll stand.
In order to take into account the evolution of the flow stress along the rolling nip, the former is divided into a series of successive portions M1, M2, . . . , Mi, . . . Mp, each corresponding to an elementary deformation xcex5i, and the computer determines before each pass, in relation to the roll parameters measured at the inlet of the stand, the predictable flow stress "sgr"i in each of the said portions Mi by digital integration reverse of the second modelling equation in relation to the elementary deformation xcex5i to realise in the considered portion Mi and deduces therefrom the elementary rolling load dFi to be applied in the said portion Mi, whereas the global rolling load is calculated by integration of the said elementary loads along the nip.
The invention also covers numerous other advantageous characteristics that are subject to the sub-claims.
It should be noted that, owing to the fact that it enables to calculate accurately, and at any moment during the rolling operation, the predictable value of the flow stress, the process according to the invention could be integrated to several levels in the rolling process.
In particular, as the rolling parameters are measured during each roll pass, the computer may check whether the global rolling load calculated in relation to the reduction in thickness predicted by the rolling scheme is compatible with the capacities of the unit and whether the said predicted reduction in thickness makes optimum use of the said capacities and it can also check the said capacities and modify, if needed, the rolling scheme for the following passes.
But the invention will be understood better using the following description of a peculiar embodiment, given for exemplification purposes and illustrated by the appended drawings.
| |
Sometimes the Eavesdropper remembered being a mother. She would stare at the single empty life-sac and think about the man who should have been lying there in cold sleep, the man who had once been the boy she’d held in her arms. At other moments she was convinced that she had done no such thing, that motherhood had never happened to her, that all she had ever been was what she was now: a traveler on an interminable journey between the stars, afloat in the belly of the Life-pod. At these moments, when even the human sleepers seemed to take on a terrifying unfamiliarity, she would feel as though she were at the edge of some calamitous discovery.
But these hanging, empty moments of anticipation were few. Almost immediately she would be distracted by the thought-clouds, the dreams of the men and women in cold sleep. There were two of them in particular who had once meant something to her: a man and a woman. She returned to their thought-worlds whenever she herself was awake, as though the tattered clouds of their remembrances would bring back to her what she had been. It was rather like eating (she still remembered that, at least) and at the end, still coming away hungry. The life-sacs were filmy, translucent; she couldn’t see their faces, only the vague human shape suspended in a watery garden, but she knew them by their thought-signatures, by the worlds of their dreams.
The Man
The man dreamed obsessively of the enemy. Through him she saw the great creatures with their giant, stiff wings (single, like a cloak) folded on their backs, the round, featureless heads swiveling from one side to another, scanning through some invisible means the bleak landscape of his moon-world. The aliens stopped before the broken bodies that littered the battlefield, pausing before human and alien remains, while the young man crouched in the shadow of an outbuilding, trying not to breathe. Through his memories, the Eavesdropper saw the long vertical gash on the abdomen of each alien: the lipless mouth open wide into a horrific darkness, the delicacy with which the prehensile edges of the orifice gathered in each body like an embrace and closed around it. She felt the young man’s horror, his anger, going through her like a cold knife.
But sometimes he dreamed of a green and primitive place on a distant planet. His childhood: running in a long, green meadow with patches of bare earth and wild tussocks of grass that would make him stumble so that suddenly he would be looking between grass-shoots into an ant’s world. And the washer with its arms aloft, swift-walking through the grass, back and forth, making the wash billow out in the constant wind . . . The mother was holding a woven-reed tray full of yeri grains, shaking it so the tiny winged grains flew up and caught the currents, streaming out in skeins of spotted gold, up the hill to the tanglewood, where the fine nets of the trees would catch them and they would sprout many months later. She did this just for him, not because she needed to; the seedblower had done most of the job already, up high. He watched her brown arms, strong and rhythmic, and the seeds rippling out in wide ribbons, and laughed in delight. She smiled at him. Lying with his face against the ground, the boy saw her as a great tree, her bare, callused toes peering from between the folds of the blue sari like roots that would hold them all to the earth, her head up in the clouds, long black hair turning to gray, loosening from the bun at the back of her neck so that the tendrils were fanned by the breeze . . .
But what struck the Eavesdropper about this man, this boy, was the way he felt about his mother: She was the bedrock of his world. At these times she felt the shock of familiarity: that she had once been the recipient of such an uncomplicated love. But her memories were unreliable; she recalled things that she had apparently experienced or done that seemed distant, unfamiliar, shocking. She knew, for instance, that she had herself spent a long time with the enemy aliens, but the knowledge of precisely what had happened — the capture, the incarceration of the humans, including herself, their journey through space in the alien ship in cold sleep, the attack or explosion that had blown the little Life-pod away into space on some random trajectory — the details were blurred in her mind, her personal memory contaminated by those of the others. Whatever she remembered came to her in flashes or glimpses: pungent, warren-like passageways, blind gropings in the heat of a room, the press of terrified bodies, the great silhouette of the alien in the doorway, its mind reaching out to her mind, calming it, telling her what to do (what was it she had been told with such urgency?) and she remembered also sweet hunger, and nutrients snaking out into her in thin, aromatic streams, and the mourning and celebrating of a death . . .
The Eavesdropper
The Eavesdropper moved slowly through the darkness of the Life-pod, floating over each womb-like holding unit, tasting the dreams of each dreamer. But what do I dream of, then, when I sleep, she thought to herself. She wondered, as she often had, why her own holding sac allowed her to wake and move about, and return to it only when she needed nutrients or rest. Each life-sac was a little eco-system of alien life-forms: bacterial blooms, algal fans that generated currents of nutrients and harvested waste, the whole maintaining a delicate symbiotic relationship with each occupant. But her sac was unique, larger than the rest, its chemistry adjusted to allow her these moments of wakefulness. Why had she been given this privilege? The vision of the alien in the doorway so many years ago, came to her mind as the answer: Was that what it had told her so urgently, to see to the safety of her people, the humans? Why? Where were they being taken before the explosion cast them into space? Why hadn’t they been killed? What had been her relationship with the alien? Sometimes she thought of it with simple hatred and fear, the unknown, the monster of nightmare moving across the ruined battlefield; then she would realize that she was seeing it through the eyes of one of the dreamers. When she admitted this to herself she felt as though cracks had appeared in her understanding of the universe, little fissures that threatened to open up and swallow her. She had betrayed her people, these people, in some way. Hadn’t she? Else why would she have gotten the privilege (or curse) of wakefulness during this long voyage? Why would she remember the alien with half-buried, shameful hunger (what had they done to her? With her?), with — yes, there was no escaping it — longing, as though the alien had satisfied in her some terrible, chemical need?
Sometimes she thought she saw the alien in the Life-pod. She would feel its presence just beyond the edge of her perceptions, as though it was waiting in the shadows beyond that life-sac or this one. Once or twice she thought she saw its face, so unimaginably strange, yet so familiar, hovering ghost-like just beyond the pale radiance from the life-sacs, or half-concealed among the knotted ganglia of the Life-pod itself. When she approached the phantom or mirage it would dissolve into the darkness, so that in her saner moments she knew it was not really there. At other times she wanted to believe it was there, to know that there was someone watching over her, tasting her dreams, knowing her thoughts.
And then there were her hands.
They were not as she remembered them; in the half-light, the brown skin was mottled, thickened, her nails grown long. She held the hands before her, floating in a shawl of moisture from her life-sac, and wondered if she herself was the alien in the shadows. She would convince herself very quickly that this could not be so, because the memories she had of being human, even the borrowed ones, were so vivid and familiar. These little debates with herself were a comfort; it was such a human thing to do, after all, to argue with your own doubts and fears when awake in the dark.
But she couldn’t come to any definite conclusion because of the voices in her mind. Sometimes something spoke to her without words, deep inside her head. She wasn’t certain if it was the alien, the Life-pod in which they were adrift, or some lost memory of her own. It could not be the Life-pod, she reasoned; the Life-pod’s mind was barely discernible to her, and what she could read of it was child-like and strange. It had been grown quickly from the body of the alien ship to host the captured humans, and when the explosion blew it away from the ship, it had not had time to mature. It knew how to maintain the environment on which they all depended and to protect itself, and to sing out its name on all permitted frequencies, but it did not know that it was going to die. It did not know that after a certain time it would need to find a mother ship, to dock, to hibernate until it renewed itself for further flight. Here, in this uncharted, empty sector of the galaxy, who would hear it sing? Who would tell it what it needed, how to find it? It was hardly more than a child, singing in joyful ignorance in the dark between the stars.
Then who was it who told her things as she floated in her life-sac at the edge of sleep?
Some of the things she heard were memories, she told herself. She had been incarcerated somewhere in the caverns of the mother ship, among alien bodies, overhearing their conversation. Or it was the alien stowaway, if it existed, telling her all this, opening before her mind’s eye the strange vistas of other worlds. Sometimes it would chant to her bits of its own lore, meaningless and frightening all at once, repeating the phrases like a child in a dark room, reciting for comfort. But nothing it said made sense.
To eat and be eaten is to become yourself and another. To eat is to give birth, to see with new eyes. Remember, remember this.
And:
We are separate so the whole may know itself. In eating, we edge closer to the Hidden One. Know this!
But she didn’t know anything. Only that she might have been a mother once, and the man who was missing — who should have been in the empty life-sac — was perhaps her son. She knew that she, along with the others, had been captured from their colony on a moon-world. And that she had had some dealings with the enemy, things she would rather not admit to herself. So here they were, blasted away from the ship, adrift in the belly of an infant Life-pod, lost in the sea of night.
The Woman
The other sleeper who had once had some connection with the Eavesdropper was a woman who hadn’t spoken for years, even before the capture. What had led her into silence was not an emotional or physiological condition, but a philosophical one. The Eavesdropper remembered this woman (whether through her own memories or through those of the other sleepers she could not always say) before the capture as a person who liked to be with the others but did little more than smile or nod. The woman liked the physical labor of the research camp; building and repair work, and tending the greenhouses, and when busy in these things she liked to hum strange little tunes, but spoke no words. The Eavesdropper knew that this woman had come to such a state because she had discovered the inadequacy of words. The woman was a scientist-poet whose reality had once been forged of words and mathematics. “Consider that antique concept, force,” she had said once, before the silence, “which makes sense at your scale or mine. The ancients built their theories, their mathematics, around that concept. But the moment you enter the sub-atom, or when you begin to examine the graininess of space-time, you realize that the word “force” has little meaning. You invent the field, another antique concept, and then that, too, fails. You abandon false analogies, then, you take refuge in strange axioms, in your mathematics. But go far enough and even mathematics fails as a descriptive, a language in which to describe nature. What do you have left, then?”
Somebody had laughed. The woman dreamed of a face, sometimes, not yearningly, but with pleasure, and it was the face of the man who should have been lying here in the Life-pod, in the empty sac. “She dreams of my son,” the Eavesdropper would say to herself. The man had laughed companionably in the woman’s dreams. “When mathematics fails? Then there’s only poetry,” he had said, smiling — his brown eyes and skin aglow, his black hair so soft and shiny in the light. Only poetry, dreamed the sleeping woman, recalling this, recalling him.
This woman had spent a lifetime studying “the graininess of space-time.” She had been part of the first team to map the tachyonic signatures that hinted at the existence of another universe underlying their own. They were only faint trails, like the tracks of ghost crabs walking on a sandy beach (“Ghost” said the Eavesdropper to herself; “Crab. Beach.” And she saw a sweep of yellow sand, a windswept blue sky — an old memory, hers or the woman’s.) The tachyon trails were regular, their mathematics sublime, their origins mysterious. The woman had lived three hundred and seven Earth-years, traveling on slowships from world to inhabited world, cheating time and death so she could study these trails. “They call to me,” she had said defensively to that man, the Eavesdropper’s son. “They are the shape of something I do not understand. Something large, complex, perhaps self-aware.” “How large?” “Of galactic proportions,” she’d said seriously, enjoying his surprise. “Why else would you need tachyons? How else can your brain tell your arm to twitch if it is 400 light-years away?” “You have such ideas!” laughed the man, half admiring, half mocking. “I thought you said last time that the tachyons were evidence of another universe.” “I did,” she acknowledged, smiling. “It’s a matter of words. Whether or not that thing is sentient, it is a universe unto itself.”
He was a practical man, an engineer, a pilot, and a poet in three ancient languages, and he kept her sane. “I see a bit here, a bit there,” she would tell him, frustrated, after several hours immersed in a holo of her theoretical construct. “But I never see the pattern as a whole, as one complete thing.” And he’d looked at her a moment and quoted Kalidasa in the original Sanskrit.
. . . I see your gaze in the deer’s quick glance
Your slender limbs in the shyama vine
Your luminous beauty in the face of the moon . . .
But, oh misfortune! I see not
All of you in any one thing . . .
Slowly, trying to put together the mathematics of the tachyon signatures, she had realized that no language existed — verbal or mathematical — that could describe them. “I must invent a meta-language,” thought the dreamer, “a language beyond words and equations.” She became outwardly silent, although her mind still chattered away in words and equations, but the Eavesdropper sometimes saw great and inexplicable vistas in the dreams of the sleeper: vast abstractions, geometries that defied the imagination, fractal swirls of color that rose and vanished, and she had the impression that the scientist-poet was indeed inventing a new language, iota by iota.
This, then, is poetry, thought the Eavesdropper to herself, and abruptly the memory of the alien would fill her mind. “Eat,” the alien had said to her. “To eat is to become yourself and another.” And the great lipless mouth had opened, drawing her in, and she could hear herself screaming. With a great effort she would calm herself, bring herself back to the dark interior of the Life-pod, and the faint, familiar glow of each life-sac. And the alien voice in (or out of) her head recited with childish insistence: “Why do we live? To eat. To be eaten. And so become closer to the Hidden One.”
Sometimes the Eavesdropper talked to the Life-pod. It understood only a few pictures she sent to it in her mind, and it seemed to her that the creature resented these interruptions. It would do as she asked, like a sullen child — once it had opened for her a round, translucent eye in the wall of the chamber through which she could see the unmoving starscape — and as soon as she was done, it would return to its play. In the early months (or years) of this uncharted journey, she had wept and railed at it, asking it to find the way back to their world, but, not knowing what she was talking about (which world? She herself didn’t know), it had simply shut her out.
So the Eavesdropper floated through the Life-pod, sipping at the dreams of the sleepers, sometimes going to sleep herself. If she could remember her dreams, if she could be aware of them as she was of the dreams of others, she would know who she was. But she couldn’t remember. So she waited, sometimes for death, sometimes for that knock on the door that would signal the return of the lost son, the missing sleeper. He would come back. This she knew about him, he was the kind who never gave up, who came back against all odds. As far as she could remember she hadn’t seen him captured. He was on his way to find them. He would knock on the door, she would open it and she would know who she was. She waited for that or for death. Sometimes she couldn’t tell the difference.
The Eavesdropper
The Eavesdropper was thinking about the moon-world. Her hands — she saw her hands, brown and fragile against the leaves of the greenhouse: They curled to form a round window through which she could see her world. In the foreground was the leaf, heart-shaped, slightly serrated, with fine white hairs on the green surface, and behind it the transparent wall of the greenhouse, with the familiar view of low, barren hills. Half the sky was dominated by the mother planet, the gas giant with its rings, its phantasmagoria of storm-clouds, the orange glow diffusing into the little room, turning her hands red-brown. And the other half of the sky was speckled with stars.
This, she thought to herself, not without a certain incredulity, was a memory all her own: not the view (which was in the dreams of the man and the woman, and some of the other humans who lay sleeping in the Life-pod) but the two hands, and how the fingers had curled around in a circle.
“Look through it!” she had said to someone, a boy who might have been her son. He had peered through the window of her fingers — she remembered glossy black hair that fell to his shoulders and was always getting in his eyes. He had long, brown legs; he liked to run, to chase the other children. He looked through the window and laughed, and ran off on those long legs. Did he understand how moving it was to her, to see that particular juxtaposition of those objects? The moon had been in just the right position for Half-Night, when its night side faced the planet instead of the endless field of stars. In that moment, at that time, the window told all: the sap rising in the green stem, the green leaf opening like a hand toward an alien light, against a partial backdrop of stars. She had been moved to tears.
Remembering, she wasn’t sure what had brought her to the middle of the chamber. She had thought she had been sleeping in her life-sac, but here she was, floating in the middle of the Life-pod, surrounded by the other sacs with their sleepers. Their dreams lapped around the edges of her consciousness, but some other feeling was rising through her, overcoming the familiar mental background noise: fear, excitement. She realized that the Life-pod was talking to her — to her, after all this time, communicating something urgently. Between the thick, pillar-like sap-vessels of the Life-pod, a portion of the wall contracted, then expanded into a round window, filmed over with a translucent membrane that slowly cleared. She saw through the window a vista of stars, and a bright, spherical, gray object in the foreground. It had locked velocity with the Life-pod. Memory stirred. A human exploration vessel, a small one that may hold one to three people . . .
So this was it, thought the Eavesdropper, suddenly light-headed, her heart thudding: this, the moment she had been waiting for all along. He had come, her son, against all odds, following the song of the Life-pod through space.
“Bring me out!” she commanded the Life-pod, pushing off against a sap-vessel so that she bumped gently against the window. She felt herself encased in a thick film of mucosal secretions; a vast muscular contraction launched her out of the window on to the surface of the Life-pod.
She struggled at first with the thick strands of film around her; she couldn’t see because the film was still opaque. A jolt of terror coursed through her and then subsided. The film was slowly hardening and clearing — she could breathe, she was atop the life-pod, poised over a vertiginous emptiness speckled with stars.
She felt it like a rush to the head, the music of the universe running through her as though she were a streambed, a cup overflowing. Before, space had been nothing but darkness and stars, something to be crossed so one could get to one’s destination. But now she could sense the tachyonic pathways all around her, like fine lacework, like the tangled neural pathways, the guts of some vast beast. The Hidden One, said the alien, exulting, and she looked around for the alien but it wasn’t there. Only herself and that strange object motionless above her, round, like an opaque window against the stars.
The rush faded. She saw the small humanoid figure in a spacesuit detach from the side of the craft, attached to it with an umbilicus that reeled out slowly as the figure jetted toward her. The light from the craft spilled over her; she saw the surface of the Life-pod, fissured and full of knobs and warts. She remembered something, a fragment of memory that was not her own: a summer hot and breathless, sandy cliffs, and thousands, perhaps millions of the aliens in their summer sleep, their flightless single wings spread to take in the sunlight, to draw in the fuel they needed for the long winter-to-come. It was an image so strange and yet so familiar that she turned around again to see if the alien had somehow manifested in her little bubble, but it was not there. She pushed the image from her mind, stretched her arms out to the descending figure. “My son,” she said to herself, her voice catching. Then a jolt of memory: She was standing barefoot in the grass in a blue sari, setting out the washing. The boy was lying face down on the ground, watching ants. It was a green and primitive place on a distant planet; he had been born there, some years before the trip to the barren moon of another world . . .
But if that is who I am, she thought in sudden consternation, then the man who lies dreaming in the life-sac below my feet is my son. Then who is this?
Or maybe, she thought desperately, the memory was not hers, just as that other memory — with the aliens stretched out like so many flies on a sand dune — that other memory was not hers. She looked up at the human figure in the spacesuit; he was getting closer and closer, decelerating. She could not see his face. Instead she saw the reflection of the Life-pod in the spacesuit’s headgear, all lit up by the spacecraft’s beacon, and the clear bubble in which she stood like a fly trapped in amber. And she saw what she was.
A half-alien thing: the shape still human but the face so strange! Ovoid eyes, the bony skull-sheath jutting over her cheekbones. She held her small brown hands before her and saw the tips curving into hard pincers, transforming almost as she stood there, transfixed with horror and wonder. She looked down at herself in the hard, honest light and saw that the reflection was not false. What am I? she wondered, aghast.
And the alien within answered her, not in words but in a swell of understanding that took her breath away. She remembered what it had proposed, what she had agreed to; the terrifying darkness within its body, her screams echoing in her ears as the thin tendrils inside it wrapped around her, penetrated her skin. After that, the chrysalid sleep as the new bridges between the two of them formed and hardened, as alien transforming organelles coursed through her body, as great, chemical swathes of emotion — pleasure and fear, hunger and sweet, nameless desire swept through her. Then she was lifted from the dead shell of the alien into a brief light, and into the life-sac which eased her once more into the sleep of forgetfulness . . .
So the Eavesdropper stood before the stranger who might or might not be her son; she a creature not alien, not human, but a bridge, a thing that was new, the first of its kind. He (or was it she?) stood away from her, bumping gently against the Life-pod, the long umbilicus stretching out into the dark like a luminous, flexible bridge. The stranger’s hands were as yet empty, but the posture was wary, as though poised to activate the spacesuit’s weapons systems. She felt some ancient part of her cry out: Do you not know me, son? And something inside her gave way, crumbled like a mud wall before a flood.
I must know, she said to herself. I must know if you are him. She stretched her arms toward him, slowly, saw him tense, then relax. Suddenly she wanted to enclose him in the dark, to exchange blood with blood, to share synapse with synapse, to know him cell by cell, and so become something new. The sharpness of her hunger took her breath away. In that brief moment she saw that the Life-pod itself was her kin, a hybrid of the original alien species and some gravid denizen of a distant ocean-world, and its mind was clear to her for the first time. Why couldn’t she know the stranger in the same way? No, she said, feeling or imagining the infant mouth straining to open in her chest. That was the alien within, as it had once been, remembering. There had to be some other way.
She opened her hands to show him that they were empty. She put the palms together in the old Indic gesture of greeting; then moved the fingers to make a circle, a window through which she could see him against the Life-pod and the infinity of stars. Around her, along pathways invisible to human and alien, sang the tachyons, leaving ghost trails in space-time that the sleeping woman in the chamber under her feet could only imagine. Only the Eavesdropper could sense them, could see where they were leading, to the heart of the great galactic beast, the Hidden One. She saw for just a moment that she had been conceived and forged for a great purpose. But for now she was only a bridge in the darkness between ship and ship, being and being. Through the window of her hands she watched the stranger come slowly toward her.
Share
Spread the word! | http://www.lightspeedmagazine.com/fiction/life-pod/ |
CROSS-REFERENCE TO RELATED APPLICATIONS
TECHNICAL FIELD
BACKGROUND
SUMMARY
DETAILED DESCRIPTION
The present application is a U.S. national phase application of International Application No. PCT/CN2016/082046, filed on May 13, 2016, the entirety of which is incorporated by reference herein.
The subject technology relates to formation and delivery of implantable devices.
Implants are delivered to a vascular site, such as an aneurysm, of a patient via a microcatheter to occlude or embolize the vascular site. Typically, the implant is engaged at the distal end of either the delivery microcatheter or the guidewire contained within the microcatheter and controllably released therefrom into the vascular site to be treated. The clinician delivering the implant must navigate the microcatheter or guide catheter through the vasculature and, in the case of intracranial aneurysms, navigation of the microcatheter is through tortuous microvasculature. This delivery can be visualized by fluoroscopy or another suitable means. Once the distal tip of the catheter or guidewire is placed in the desired vascular site, the clinician must then begin to articulate the implant in the vascular site to ensure that the implant will be positioned in a manner to sufficiently embolize the site. Once the implant is appropriately positioned, the clinician must then detach the implant from the catheter or guidewire without distorting the positioning of the implant. Detachment can occur through a variety of means, including, electrolytic detachment, chemical detachment, mechanical detachment, hydraulic detachment, and thermal detachment.
Previously, there had been provided 3-dimensional coils which are formed from a straight wire by detachment from the catheter or guidewire. The 3-dimensional coil is typically formed from a metal which upon detachment (e.g., in vivo) reconfigures from the straight wire into a coil shape or confirmation having a secondary structure (i.e., an extended or helically coil confirmation) which under ideal circumstances will comport to the shape of the vascular site to be embolized.
One or more embodiments of the subject technology are directed to an implant comprising a 3-dimensional coil designed to optimize packing into a vascular site, such as an aneurysm. It is contemplated that the implant of the invention, due to its secondary shape, is able to substantially conform to a vascular site thereby providing a more effective embolization. The subject technology is illustrated, for example, according to various aspects described below.
According to one or more embodiments of the present disclosure, an embolic implant can include a strand forming, in a relaxed state, (i) first consecutive loops in a first cycle along a first length of the strand and (ii) second consecutive loops in a second cycle along a second length of the strand. Each of the first loops can be an open loop that extends only partially about a corresponding first axis, and each of the second loops can be a closed loop that extends completely about a corresponding second axis that extends through a space within a radially adjacent one of the first loops.
The strand can form, in the relaxed state, a three-dimensional polyhedral shape. In the relaxed state, each of the first loops can contact and share tangent lines with at least one other first loop. A total number of the first loops can be equal to a total number of the second loops. The second consecutive loops can form a radially outermost section of the implant.
The strand can further form, in the relaxed state, consecutive third loops in a third cycle along a third length of the strand, each of the third loops extending about a corresponding third axis that that extends through a space within a radially adjacent one of the second loops. Each of the third loops can be an open loop that extends only partially about the third axis. Each of the third loops can be a closed loop that extends completely about the third axis. The first consecutive loops can form a radially innermost section of the implant.
According to one or more embodiments of the present disclosure, a method of forming an embolic implant can include winding a first length of a strand in a first cycle only partially about each of a plurality of posts extending from a core of a mandrel to form consecutive open first loops, and winding a second length of the strand in a second cycle completely about each of the posts to form consecutive closed second loops.
The first length and the second length can be wound such that the strand forms a three-dimensional polyhedral shape. The first length can be wound such that each of the first loops contacts and shares tangent lines with other first loops. The second length can be wound to form a total number of the second loops equal to a total number of the first loops.
The method can further include winding a third length of the strand in a third cycle about each of the posts to form consecutive third loops. The third length can be wound such that each of the third loops can be an open loop that extends only partially about a corresponding one of the posts. The third length can be wound such that each of the third loops can be a closed loop that extends completely about a corresponding one of the posts.
According to one or more embodiments of the present disclosure, a method of delivering an embolic implant can include providing an implant within a delivery device to a target location while the implant can be in a first, substantially straight configuration, and positioning the implant at the target location such that the implant can be in a secondary configuration in which the implant includes: a strand forming (i) first consecutive loops in a first cycle along a first length of the strand and (ii) second consecutive loops in a second cycle along a second length of the strand, wherein each of the first loops can be an open loop that extends only partially about a corresponding first axis, and each of the second loops can be a closed loop that extends completely about a corresponding second axis that that extends through a space within a radially adjacent one of the first loops.
The implant can be positioned to form, in the secondary configuration, a three-dimensional polyhedral shape. The implant can be positioned, in the secondary configuration, such that each of the first loops contacts and shares tangent lines with other first loops. The implant can be positioned, in the secondary configuration, such that a total number of the first loops can be equal to a total number of the second loops.
The implant can be positioned, in the secondary configuration, to form consecutive third loops in a third cycle along a third length of the strand, each of the third loops extends about a corresponding third axis that that extends through a space within a radially adjacent one of the second loops. The implant can be positioned, in the secondary configuration, such that each of the third loops can be an open loop that extends only partially about the third axis. The implant can be positioned, in the secondary configuration, such that each of the third loops can be a closed loop that extends completely about the third axis.
The implant can be positioned, in the secondary configuration, such that the first consecutive loops form a radially innermost section of the implant. The implant can be positioned, in the secondary configuration, such that the second consecutive loops form a radially outermost section of the implant. The implant can be positioned within an aneurysm.
According to one or more embodiments of the present disclosure, an embolic implant can include a strand forming, in a relaxed state, (i) first consecutive loops in a first cycle along a first length of the strand and (ii) second consecutive loops in a second cycle along a second length of the strand, wherein each of the first loops extends about a corresponding first axis and has a first loop shape, wherein each of the second loops extends about a corresponding second axis that that extends through a space within a radially adjacent one of the first loops and has a second loop shape, different from the first loop shape.
Each of the first loops can be an open loop that extends only partially about the first axis, and each of the second loops can be a closed loop that extends completely about the second axis. A minimum cross-sectional dimension of the first loops can be greater than a minimum cross-sectional dimension of the second loops. A maximum cross-sectional dimension of the first loops can be greater than a maximum dimension of the second loops. Each of the first loops can form a polygon. Each of the second loops can form a circle or an arc of an incomplete circle.
According to one or more embodiments of the present disclosure, a mandrel for forming an embolic implant can include a core and a plurality of posts extending from a surface of the core, each of the posts extending along an axis and having (i) a base section with a first on-face shape and (ii) an extension section with a second on-face shape, different from the first on-face shape.
The base section can be between the core and the extension section. A minimum cross-sectional dimension of the base section can be greater than a minimum cross-sectional dimension of the extension section. A maximum cross-sectional dimension of the base section can be greater than a maximum cross-sectional dimension of the extension section. The base section can form a polygon in cross-section. The extension section can form a circle in cross-section.
According to one or more embodiments of the present disclosure, an embolic implant can include a strand forming, in a relaxed state, first loops and second loops in one or more cycles along a length of the strand; wherein the first loops lie in separate planes on opposite sides of a center of the implant, wherein the first loops both extend about a shared first axis; wherein each of the second loops extends about one of a plurality of second axes that can be not parallel with any other of the second axes of any other of the second loops.
Each of the second axes can intersect with the first axis to form a first angle and a second angle, different from the first angle. Each of the second loops can be closer to one of the first loops than it can be to another of the first loops. Some of the second loops can be closer to a first one of the first loops than to a second one of the first loops and others of the second loops can be closer to the second one of the first loops than to the first one of the first loops.
According to one or more embodiments of the present disclosure, a mandrel for forming an embolic implant can include a core; first posts extending from a surface of the core on opposite sides of the core and along a shared first axis; and second posts extending from the surface of the core along corresponding second axes, wherein each of the second axes can be not parallel with a second axis of any other second post.
Each of the second axes can intersect with the first axis to form a first angle and a second angle, different from the first angle. Each of the second posts can be closer to one of the first posts than another of the first posts. Some of the second posts can be closer to a first one of the first posts than to a second one of the first posts and others of the second posts can be closer to the second one of the first posts than to the first one of the first posts.
According to one or more embodiments of the present disclosure, an embolic implant can include a strand forming, in a relaxed state, first loops along a first section of the strand and second loops along a second section of the strand; wherein each of the first loops extends about one of a plurality of first axes; wherein each of the second loops extends about one of a plurality of second axes; wherein the first axes intersect at a first region, and the second axes intersect at a second region, distinct from the first region; wherein a total number of first loops can be different from a total number of second loops.
The first region can be located between at least two first loops, and the second region can be located between at least two second loops. The first region can be located outside a space bounded by second loops, and the second region can be located outside a space bounded by first loops. The maximum dimension of the first section can be different from a maximum dimension of the second section. The maximum dimension of the first loops can be different from a maximum dimension of the second loops. The first axes can be orthogonal to an axis extending through the first region and the second region, and the second axes can be transverse to the axis. Some of the first loops form, in the relaxed state, a first three-dimensional polyhedral shape, and others of the first loops form, in the relaxed state, a second three-dimensional polyhedral shape, different than the first three-dimensional polyhedral shape.
The strand can further form third loops in a third section, wherein each of the third loops and extends about a third axis, wherein the third axes intersect at a third region, distinct from the first region and the second region.
According to one or more embodiments of the present disclosure, a mandrel for forming an embolic implant can include a first core; first posts extending from a surface of the first core along corresponding first axes, the first axes intersecting at a first region within the first core; a second core; second posts extending from a surface of the second core along corresponding second axes, the second axes intersecting at a second region within the second core and distinct from the first region; wherein a total number of first posts can be different from a total number of second posts.
The first region can be located outside the second core, and the second region can be located outside the first core. The maximum cross-sectional dimension of the first core can be different from a maximum cross-sectional dimension of the second core. The maximum cross-sectional dimension of the first posts can be different from a maximum cross-sectional dimension of the second posts. The first axes can be orthogonal to an axis extending through the first region and the second region, and the second axes can be transverse to the axis.
The mandrel can further include a third core; and third posts extending from a surface of the third core along corresponding third axes, the third axes intersecting at a third region distinct from each of the first region and the second region.
Additional features and advantages of the subject technology will be set forth in the description below, and in part will be apparent from the description, or may be learned by practice of the subject technology. The advantages of the subject technology will be realized and attained by the structure particularly pointed out in the written description and claims hereof as well as the appended drawings.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory and are intended to provide further explanation of the subject technology as claimed.
In the following detailed description, numerous specific details are set forth to provide a full understanding of the subject technology. It will be apparent, however, to one ordinarily skilled in the art that the subject technology may be practiced without some of these specific details. In other instances, well-known structures and techniques have not been shown in detail so as not to obscure the description.
According to one or more embodiments, the systems and devices disclosed herein can be used in human or veterinary medicine and, more particularly, for the endovascular treatment of intracranial aneurysms and acquired or innate arteriovenous blood vessel malformations and/or fistulas and/or for the embolization of tumors by thromboembolization. For this purpose, components of the various systems and devices disclosed herein can be designed as a coil implant, a filter, a stent, and the like, but may as well possess any other superimposed configuration as may be expedient. In one or more embodiments, the systems and devices disclosed herein may provide various designs and configurations for an aneurysm coil, as especially appropriate for the occlusion of intracranial aneurysms.
According to one or more embodiments, the systems and devices disclosed herein provide enhanced stability of an implant during and after deployment. Such stability promotes retention of the implant within a target site without migration therefrom or movement therein after delivery. The systems and devices disclosed herein further provide an implant with significant flexibility with respect to the target site to conform to the body anatomy without exerting excessive forces thereon. For example, an implant can provide balanced stiffness and flexibility to improve both stability and conformability. Such a configuration can also provide proper coverage over an opening to a body cavity (e.g., aneurysm) into which the implant is delivered, for reducing or eliminating flow into or out of the body cavity and promoting occlusion of the body cavity. Such implants can further be provided as framing coils for supporting yet other implants delivered to an interior space encompassed by the framing coil for enhanced filling and embolization of the target site.
10
10
20
40
20
80
40
80
95
95
95
FIGS. 1A-B
FIGS. 1A-B
According to one or more embodiments, a vascular implant device can be part of or included with a positioning system such as the one shown in . The positioning system shown in includes an actuator , a positioner coupled with the actuator , and an implant interface at the distal end of the positioner . A portion of the implant interface can engage a complementary portion of an implant in order to control the delivery (i.e., securing and detaching) of the implant at the desired location. While the implant is shown or described in several embodiments as comprising an embolic coil, any implant or device that is compatible with the subject technology can be used in lieu of or in conjunction with the coil in accordance with the embodiments described herein.
FIG. 1C
FIGS. 1A-B
FIG. 1C
10
12
14
12
12
12
12
14
12
14
14
12
16
a
shows the positioning system of used inside a patient's vasculature. In the embodiment shown in , an operator uses a guide tube or guide catheter to position a delivery tube or microcatheter in a patient's vasculature. This procedure involves inserting the guide catheter into the patient's vasculature through an access point such as the groin, and directing the distal end A of the guide catheter through the vascular system until it reaches the carotid artery. After removing a guide wire (not shown) from the guide catheter , a microcatheter can be inserted into the guide catheter and the distal end of the microcatheter subsequently exits the guide catheter distal end A and can be positioned near the target site , such as an aneurysm in the patient's brain.
FIGS. 1D and 1E
FIG. 1D
FIGS. 1C-E
FIG. 1E
14
15
15
14
14
14
16
10
14
80
40
16
95
80
10
14
95
15
16
15
64
40
15
64
80
95
10
a
a
a
a
In the embodiments illustrated in , the microcatheter can include microcatheter markers and that facilitate imaging of the distal end of the microcatheter with common imaging systems. After the distal end reaches the target site , the positioning system of the illustrated embodiment is then inserted into the microcatheter to position the implant interface at the distal end of the positioner near the target site , as illustrated in . The implant can be attached to the implant interface prior to inserting the positioning system into the microcatheter . This mode of implant delivery is illustrated in . The delivery of the implant is facilitated by disposing the microcatheter marker near the target site , and aligning the microcatheter marker with a positioner marker in the positioner which, when the two markers (markers and ) are aligned with each other as illustrated in , indicates to the operator that the implant interface is in the proper position for the release of the implant from the positioning system .
FIGS. 2A-B
80
10
95
40
95
40
80
Referring to , the implant interface is a portion of the positioning system that allows the operator to control the engagement and disengagement of the implant to the positioner . As will be appreciated by those skilled in the art, several methods or processes of detaching the implant from the positioner at the implant interface are possible.
FIG. 2A
52
80
88
52
84
81
84
52
42
42
81
86
80
88
52
84
81
96
94
95
84
52
96
52
96
96
52
96
84
52
96
84
95
40
80
52
42
88
52
84
81
84
96
94
95
84
42
40
96
42
Referring specifically to the exemplary embodiment shown in , a cord can be disposed at the implant interface , according to one or more embodiments of the present disclosure. A distal tip of the cord is positioned in the port of the end cap so that it partially obstructs the port when the cord is at its most distally advanced position in the positioner tube . The positioner tube and the end cap cooperatively define a cavity within the implant interface . The distal tip of the cord is disposed within the port in the end cap and prevents an enlarged portion, e.g., a ball , carried by a rod engaged by the implant to move distally through the port . In some instances, the cord can extend distally of the ball , and in one or more embodiments, the cord can terminate radially adjacent the ball . In one or more embodiments, the cross-sectional dimension of the ball coupled with the cross-sectional dimension of the cord is too large for the ball to pass through the port . In such embodiments, the cord and ball obstruct the port by their engagement with one another proximally of the port . To detach the implant from the positioner at the implant interface , the cord is moved in the proximal direction relative to the positioner tube such that the distal tip of the cord is proximal of the port in the end cap and no longer obstructs the port . At this point, the ball carried by the rod and engaging the implant is free to move distally through the port or, alternatively, the positioner tube or the entire positioner can be moved in the proximal direction to allow the ball to exit the positioner tube . Such configurations and methods are described in U.S. Patent Pub. No. 2010/0030200, the contents of which are hereby incorporated by reference to the extent not inconsistent with the present disclosure.
95
40
80
100
100
102
102
95
102
100
40
80
80
106
95
100
110
95
106
40
110
106
40
116
40
40
95
106
120
95
FIG. 2B
a
b
b
In yet further embodiments, detaching the implant from the positioner at the implant interface can be realized through an electrolytic process. For instance, referring now to , illustrated is another exemplary positioning system , according to one or more embodiments disclosed. The system has a proximal end and a distal end and can include the implant , such as a coiled implant, arranged at or adjacent the distal end . The system can further include the positioner extending from the user in conjunction with the implant interface . In one or more embodiments, the implant interface can include a severance module coupled to or otherwise arranged adjacent the implant . As illustrated, the system can be a generally elongate structure having a long axis or longitudinal axis where each of the implant , the severance module , and the positioner are axially-offset along said longitudinal axis . The severance module can require a voltage source and a cathode. The positioner can include an insulating sleeve shrink-fitted onto the outer surface of the positioner and used, for example, to prevent the positioner from corroding electrolytically. The implant can serve as an anode and be slidably-arranged within the catheter. The severance module has a severance location that is electrolytically-corrodible so that when in contact with a bodily fluid or the like, the implant will be detached by electrolytic processes.
40
95
106
80
95
80
106
106
As briefly described above, the positioner and the implant can be connected via the severance module included in the implant interface . As will be appreciated, however, any connection that can be effectively detached from the implant can be suitable for use as the implant interface . The severance module , for instance, can be suited for any kind of implant detachment or severance. For example, the severance module can be designed for, but not limited to, mechanical, thermal, or electrochemical (e.g., electrolytic) detachment.
95
95
302
95
In one or more embodiments, the implant can assume a predetermined, superimposed configuration after detachment. As used herein, the term “superimposed” refers to a shape or configuration that the implant is configured to assume as preprogrammed through one or more heat treatment processes or methods undertaken by the strand . As discussed in more detail below, the superimposed configuration can include the implant assuming a primary and/or a secondary shape.
FIG. 3
95
302
302
95
302
Referring to , in one or more embodiments, the implant is made of a strand that has been wound multiple times to form a generally tubular structure. In at least one embodiment, the strand is wound so as to form a spiral helix, for example, a spiral helix forming several contiguous loops or windings having a pitch that is constant or alternatively varies over the length of the implant . As will be appreciated, however, the strand can be formed or otherwise wound into several alternative configurations without departing from the scope of the disclosure.
95
95
95
320
95
320
320
95
95
In applications where the implant is to be delivered to fine intracranial or cerebral vessels, implants having a coiled or spring structure can be particularly suited. As can be appreciated, the specific sizing of the implant can be governed by the size of the treatment site or destination vessel and can be easily determined by those skilled in the art. In one or more embodiments, the primary shape of the implant can have an outer diameter that is between about 0.011 inch and about 0.0165 inch. By further example, in one or more embodiments, the primary shape of the implant can have an outer diameter that is between about 0.5 mm and about 10 mm. In other embodiments, however, the outer diameter of the implant can be less than about 0.5 mm and greater than about 10 mm, without departing from the scope of the disclosure. In one or more embodiments, the primary shape of the implant can have a length that is between about 4 cm and about 65 cm.
302
302
310
302
310
302
310
302
310
302
310
302
In one or more embodiments, the strand can be made of a nickel-titanium alloy (e.g., nitinol) which possesses both mechanical and thermal shape memory characteristics. In other embodiments, however, the strand can be made of any material exhibiting mechanical and/or thermal shape memory characteristics or, alternatively, platinum, platinum alloys, tungsten, tungsten alloys, or other like materials. In one or more embodiments, the diameter of the strand can be between about 0.002 inch and about 0.004 inch. In one or more embodiments, the diameter of the strand can be between about 0.03 mm and about 0.3 mm. In other embodiments, the diameter of the strand can be between about 0.05 mm and about 0.2 mm. In at least one embodiment, the diameter of the strand can be about 0.06 mm. In yet other embodiments, the diameter of the strand can be from dimensions below about 0.03 mm and above about 0.3 mm, without departing from the scope of the disclosure.
302
302
302
95
95
95
95
95
In one or more embodiments, the strand can be made of platinum or platinum alloys that have undergone a stress relief anneal process configured to help the strand “remember” the superimposed or primary wound shape and automatically expand thereto. Strand made of platinum and platinum alloys, or of similar materials, can also undergo stress relief annealing in order to better remember a secondary shape of the implant . In other embodiments the strand can be a nickel-titanium alloy and undergo a heat treatment configured to help the alloy remember a preprogrammed shape. Such a heat treatment can be comprised of restraining the strand in the desired shape, heat treating the restrained strand, then releasing the restraint. The implant can achieve the preprogrammed shape in a relaxed state, in which the implant is unrestrained, or the implant can achieve the preprogrammed shape in an implanted state, in which the implant is delivered to a target location with sufficient space to change its shape.
FIGS. 4A-B
FIG. 4A
FIG. 4B
400
402
410
400
410
400
402
410
410
402
420
422
424
422
424
422
424
420
410
400
430
440
410
440
410
430
400
Referring now to , a coil, formed by a helically wound filament, can be formed into a secondary shape, according to one or more embodiments of the present disclosure. A “secondary” shape is formed using the primary shaped structure and creating a three-dimensional shape by, for example, wrapping the primary shaped structure around a mandrel and heat setting the primary shape in the wrapped disposition so the structure retains its primary coil shape as well as the secondary shape. As shown in , an implant can be formed of a primary coil that transitions from a primary shape to a secondary shape, forming a plurality of loops facing outwardly from a central region of the implant . Each of the loops can lie within a plane and wind around an axis. In a relaxed state, the secondary shape of the implant can form or conform to a three-dimensional polyhedral shape. The primary coil can form a continuous structure that extends between and along adjacent and/or contiguous loops . Between contiguous loops , the primary coil can transition at or along an inflection region from a first arc shape to a second arc shape . The first arc shape can be convex with respect to a point in space, and the second arc shaped can be concave with respect to the same point in space. Alternatively, the first arc shape can be concave with respect to a point in space, and the second arc shaped can be convex with respect to the same point in space. The transition along the inflection region provides a continuous winding pattern that more uniformly distributes forces exerted by the resulting implant when conforming to body anatomy. As shown in , pairs of loops of the implant can provide regions that contact each other at or along a tangent line . Each of the loops can contact and share tangent lines with other loops . The adjacent regions can separate or press against each other as the coil transitions between shapes or is implanted and conforms to a target location.
FIG. 5
FIG. 5
FIG. 5
502
510
520
510
520
510
520
502
510
512
512
512
520
522
522
522
502
510
520
512
522
512
512
512
510
590
590
590
512
512
512
522
522
522
522
590
590
590
512
522
512
522
512
522
512
510
522
520
a
b
c
a
b
c
a
b
c
a
b
c
a
b
c
Referring now to , a continuous strand (e.g., forming a primary coil) can form a plurality of cycles, each cycle providing a plurality of loops to form a secondary shape with multiple layers, according to one or more embodiments of the present disclosure. As used herein, a “cycle” is a continuous formation that includes a plurality of loops, with only one loop about each axis of a plurality of axes, each loop comprising a continuous segment forming any number or fraction of revolutions about each axis of the plurality of axes. According to one or more embodiments, a continuous strand (e.g., forming a primary coil) can form a plurality of cycles, such as a first cycle and a second cycle . While the first cycle and the second cycle are shown separately in , both the first cycle and the second cycle can be formed by a single continuous strand . The first cycle can include a plurality of first loops , with each first loop winding about a corresponding axis, different from the axis of any other first loop . The second cycle can include a plurality of second loops , with each second loop winding about a corresponding axis, different from the axis of any other second loop . When formed of a continuous strand , the first cycle and the second cycle form overlapping first loops and second loops . As shown in , each of the first loops , , and of the first cycle have corresponding axes , , and . For each of these first loops , , and , a corresponding one of the second loops , , and of the second cycle winds around the same axis (i.e., around an axis that is coaxial with the axis , , or ). Each of the first loops can lie within a plane that is parallel to or coplanar with a plane of a corresponding one of the second loops . Each of the first loops can be in contact or close proximity with a corresponding one of the second loops . For example, each first loop can be radially adjacent to a corresponding second loop . The total number of first loops in the first cycle can be equal to the total number of second loops in the second cycle .
FIG. 5
500
510
512
520
522
According to one or more embodiments, loops of a cycle can be open loops or closed loops. As shown in , an implant can form at least one first cycle having a plurality of open loops and at least one second cycle having a plurality of open loops . As used herein, an “open loop” is a loop that does not overlap itself along a pathway about its axis (i.e., excluding sections of a strand that form any other loop or an inflection region transitioning to another loop). For example, an open loop can extend less than entirely (i.e., less than 360°) about a corresponding axis. By further example, each open loop forms an arc of an incomplete circle or other shape with ends that do not meet within the open loop. An exemplary open loop has an entire length that is separate from one or more adjacent loops. Each of the adjacent loops is wound about an axis that is different from the axis of the exemplary open loop. No part of the exemplary open loop overlaps, crosses, or intersects itself along the entire length thereof. As used herein, a “closed loop” is a loop that overlaps itself at least once along a pathway about its axis. For example, a closed loop can extend at least entirely (i.e., greater than or equal to 360°) about a corresponding axis. By further example, each closed loop forms a complete circle or other shape. An exemplary closed loop has an entire length that is separate from one or more adjacent loops. Each of the adjacent loops is wound about an axis that is different from the axis of the exemplary closed loop. At least part of the exemplary closed loop overlaps, crosses, or intersects itself along the entire length thereof.
FIG. 6
FIG. 6
600
602
610
620
622
612
610
622
620
612
612
612
610
690
690
690
612
612
612
622
622
622
622
690
690
690
a
b
c
a
b
c
a
b
c
a
b
c
a
b
c
According to one or more embodiments, separate cycles can each have a distinct type of loop that is different from the type of loop (i.e., open or closed) in at least one other cycle. According to one or more embodiments, each and every one of the loops of a given cycle can be the same type of loop (i.e., open or closed). For example, as shown in , an implant can include a strand that forms at least one first cycle and at least one second cycle having a plurality of closed loops . Each of the loops of the first cycle can be open loops. Each of the loops of the second cycle can be closed loops. As shown in , each of the first loops , , and of the first cycle have corresponding axes , , and . For each of these first loops , , and , a corresponding one of the second loops , , and of the second cycle winds around the same axis (i.e., around an axis that is coaxial with the axis , , or ). Thus, each open loop can share an axis with a closed loop of a different cycle.
According to one or more embodiments, a closed loop provides a stiffer profile than that of an open loop. Accordingly, each closed loop will generate more force when deforming to fit within body anatomy and thereby generates a more stable structure to reduce movement and/or migration of the implant after delivery. According to one or more embodiments, an open loop provides greater flexibility and thereby promotes a greater degree of conformity with the body anatomy. By combining closed loops and open loops in different cycles of a secondary shape, an implant provides balanced stability and conformability upon delivery. The balance of stability and conformability can be modified by selecting combinations of open and closed loops.
According to one or more embodiments, a secondary shape of an implant can be provided with any number of cycles. For example, an implant can have, in a secondary shape, 2, 3, 4, 5, 6, 7, 8, 9, or 10 cycles. For any total number of cycles, at least one of the cycles can form only open loops and at least one of the cycles can form only closed loops. According to one or more embodiments, cycles can be formed by a continuous strand, such that each cycle contains contiguous loops that are not interrupted by the loops of any other cycle. Each cycle can terminate with ends at which additional cycles can begin or end. According to one or more embodiments, each cycle can be formed on a radially inner or radially outer surface of a different cycle. For example, at least one cycle can be fully encompassed or encapsulated by one or more other cycles. According to one or more embodiments, a radially innermost cycle of an implant forms only closed loops. According to one or more embodiments, a radially outermost cycle of an implant forms only closed loops. According to one or more embodiments, at least one cycle between a radially innermost cycle and a radially outermost cycle of an implant forms only open loops. According to one or more embodiments, an implant can include one or more additional loops adjacent to a radially innermost cycle and/or a radially outermost cycle. For example, additional loops can be used to secure the strand to a mandrel during a forming process.
FIGS. 7A-B
FIG. 7A
FIG. 7B
FIG. 7A
FIG. 7B
700
750
700
710
720
720
710
720
710
750
720
720
700
750
760
770
780
700
750
Referring now to , a mandrel can be employed to form an implant having four loops in each cycle, according to one or more embodiments of the present disclosure. The mandrel illustrated in includes a core (e.g., sphere) and four posts . The posts are mounted on an external surface of the core at four locations. Each of the posts extends in a direction of a corresponding axis, wherein the axes extend into and/or intersect within the core . Each of the cycles of the implant can be formed by winding a strand about each of the posts once to form loops. The number of loops (e.g., four) of each cycle corresponds to the number of posts of the mandrel . illustrates an implant formed with three cycles: a first cycle forming only closed loops, a second cycle forming only open loops, and a third cycle forming only open loops. It will be appreciated that additional cycles and/or cycles having different types of loops can be formed using the mandrel of . The implant of forms a generally tetrahedral shape.
FIGS. 8A-B
FIG. 8A
FIG. 8B
FIG. 8A
FIG. 8B
800
850
800
810
820
820
810
820
810
850
820
820
800
850
860
870
880
800
850
Referring now to , a mandrel can be employed to form an implant having six loops in each cycle, according to one or more embodiments of the present disclosure. The mandrel illustrated in includes a core (e.g., sphere) and six posts . The posts are mounted on an external surface of the core at six locations. Each of the posts extends in a direction of a corresponding axis, wherein the axes extend into and/or intersect within the core . Each of the cycles of the implant can be formed by winding a strand about each of the posts once to form loops. The number of loops (e.g., six) of each cycle corresponds to the number of posts of the mandrel . illustrates an implant formed with three cycles: a first cycle forming only closed loops, a second cycle forming only open loops, and a third cycle forming only open loops. It will be appreciated that additional cycles and/or cycles having different types of loops can be formed using the mandrel of . The implant of forms a generally hexahedral (e.g., cubic) shape.
FIGS. 9A-B
FIG. 9A
FIG. 9B
FIG. 9A
FIG. 9B
900
950
900
910
920
920
910
920
910
950
920
920
900
950
960
970
980
900
950
Referring now to , a mandrel can be employed to form an implant having eight loops in each cycle, according to one or more embodiments of the present disclosure. The mandrel illustrated in includes a core (e.g., sphere) and eight posts . The posts are mounted on an external surface of the core at eight locations. Each of the posts extends in a direction of a corresponding axis, wherein the axes extend into and/or intersect within the core . Each of the cycles of the implant can be formed by winding a strand about each of the posts once to form loops. The number of loops (e.g., eight) of each cycle corresponds to the number of posts of the mandrel . illustrates an implant formed with three cycles: a first cycle forming only open loops, a second cycle forming only closed loops, and a third cycle forming only closed loops. It will be appreciated that additional cycles and/or cycles having different types of loops can be formed using the mandrel of . The implant of forms a generally octahedral shape.
FIGS. 10-11
FIG. 10
FIG. 8
FIG. 10
1010
1020
800
1010
1010
1020
Referring now to , winding patterns can provide the sequence and manner of winding about each of a number of posts of a mandrel, according to one or more embodiments of the present disclosure. shows a first cycle and a second cycle as applied to a mandrel having six posts, such as the mandrel of . As indicated at the top left corner of , the first cycle is preceded by a winding about a first post. The first cycle then provides partial winding (e.g., ¾ of a circumference) about each of the six posts to form open loops. The second cycle then provides partial winding (e.g., ½-¾ of a circumference) about each of the six posts to form open loops.
FIG. 11
FIG. 8
FIG. 11
1110
1120
800
1110
1110
1120
It will be appreciated that additional cycles and/or cycles having different types of loops can be formed using similar winding patterns. According to one or more embodiments, shows a first cycle and a second cycle as applied to a mandrel having six posts, such as the mandrel of . As indicated at the top left corner of , the first cycle is preceded by a winding about a first post. The first cycle then provides partial winding (e.g., ¾ of a circumference) about each of the six posts to form open loops. The second cycle then provides at least complete winding (e.g., 1¼ of a circumference) about each of the six posts to form closed loops. It will be appreciated that additional cycles and/or cycles having different types of loops can be formed using similar winding patterns.
FIG. 10-11
FIG. 8
850
800
850
850
800
800
850
850
800
With further reference to the winding patters of and the exemplary mandrel and implant of , when forming the implant , the cycles are formed on the mandrel and the wrapped implant is subsequently subjected to a heat treatment process that causes the implant to thereafter have a bias to the winding pattern about the mandrel , i.e., to have the predisposition to coil in a pattern similar to the winding pattern about the mandrel . After the implant has been subjected to the heat treatment process, the implant is removed from the mandrel .
FIGS. 12A-D
FIG. 12A
FIG. 12A
1200
1250
1200
1210
1220
1220
1210
1228
1228
1210
1220
1222
1224
1222
1210
1210
1224
1224
1222
1210
1223
1222
1225
1224
1222
1223
1224
1225
1220
1223
1225
1220
1210
1220
1220
Referring now to , a mandrel can be employed to form an implant having different loop sizes in separate cycles, according to one or more embodiments of the present disclosure. The mandrel illustrated in includes a core (e.g., sphere) and a plurality of posts . Each post is mounted on an external surface of the core and extends in a direction of a corresponding axis , wherein the axes extend into and/or intersect within the core . One or more of the posts includes both a wider base section and a narrower extension section . The base section can be closer to and/or adjacent to the core (i.e., between the core and the extension section ). The extension section can extend away from the corresponding base section and the core . A base cross-sectional dimension (maximum or minimum) of the base section can be greater than an extension cross-sectional dimension (maximum or minimum) of the extension section . As shown in , the base section can have a constant cross-sectional dimension along a length thereof, and the extension section can have a constant cross-sectional dimension along a length thereof. The post can provide a stepwise transition from the base cross-sectional dimension to the extension cross-sectional dimension . Alternatively, the posts can taper or otherwise gradually change cross-sectional dimension along the lengths thereof, extending away from the core . It will be appreciated that additional sections of each post can be provided with distinct cross-sectional dimensions. For example, each post can include 3, 4, 5, 6, 7, or more than 7 sections with distinct cross-sectional dimensions.
FIG. 12B
1250
1200
1262
1264
1250
1220
1262
1222
1220
1264
1224
1220
1272
1262
1274
1264
1272
1262
1250
1200
1250
1250
1200
1250
1250
1200
shows the implant formed on the mandrel . A first cycle and a second cycle of the implant can each be formed by winding a strand about each of the posts once to form loops. For example, the first cycle can be formed by winding a strand once about the base section of each post , and the second cycle can be formed by winding the strand once about the extension section of each post . The loops of the first cycle can be open or closed loops, and the loops of the second cycle can be open or closed loops. For example, the loops of the first cycle can be closed loops to provide more structural stability than would be provided by open loops. The closed loops can be formed where the loops have a larger cross-sectional dimension than the cross-sectional dimension of loops of at least one other cycle. When forming the implant , the cycles are formed on the mandrel , and the wrapped implant is subsequently subjected to a heat treatment process that causes the implant to thereafter have a bias to a secondary shape according to the winding pattern about the mandrel . After the implant has been subjected to the heat treatment process, the implant is removed from the mandrel .
FIGS. 12C-D
FIG. 12A
1220
1200
1272
1262
1263
1223
1222
1274
1264
1265
1225
1224
1263
1272
1262
1265
1274
1264
1272
1262
1274
1264
1272
1262
1274
1264
1200
As shown in , the cross-sectional dimension of the resulting loops correspond to the cross-sectional dimensions of the posts of the mandrel . For example, the loops of the first cycle can each have a cross-sectional dimension that is substantially equal to the cross-sectional dimension of the base section , and the loops of the second cycle can each have a cross-sectional dimension that is substantially equal to the cross-sectional dimension of the extension section . Accordingly, the cross-sectional dimensions (maximum or minimum) of the loops of the first cycle can be greater than the cross-sectional dimensions (maximum or minimum) of the loops of the second cycle . Each of the loops of the first cycle can lie within a plane that is parallel to and/or non-intersecting with a plane of a corresponding one of the loops of the second cycle . Each of the loops of the first cycle can share a common central axis with a corresponding one of the loops of the second cycle . It will be appreciated that additional cycles and/or cycles having different types of loops can be formed using the mandrel of .
FIGS. 13A-C
FIG. 13A
FIG. 13A
FIG. 13A
1300
1350
1300
1310
1320
1320
1310
1310
1320
1322
1324
1322
1310
1310
1324
1324
1322
1310
1322
1324
1322
1324
1320
1320
1322
1324
1323
1322
1325
1324
1323
1325
1322
1323
1324
1325
1320
1323
1325
1320
1310
Referring now to , a mandrel can be employed to form an implant having different loop shapes in separate cycles, according to one or more embodiments of the present disclosure. The mandrel illustrated in includes a core (e.g., polyhedron) and a plurality of posts . Each post is mounted on an external surface of the core and extends in a direction of a corresponding axis, wherein the axes extend into and/or intersect within the core . One or more of the posts includes both a base section and an extension section . The base section can be closer to and/or adjacent to the core (i.e., between the core and the extension section ). The extension section can extend away from the corresponding base section and the core . The base section and the extension section can have different cross-sectional or on-face shapes. A cross-sectional shape of a section can be defined in a cross-section orthogonal to an axis. Different sections can have different cross-sectional shapes defined by separate cross-sections along the same axis or parallel axes. An on-face shape of a section can be defined in a view along an axis. Different sections can have different on-face shapes defined by views along the same axis or parallel axes. As used herein, different shapes do not include same or similar shapes scaled to different sizes. Rather, different shapes indicate shapes that are different in at least one respect other than size. The shapes of each of the base section and the extension section can be, for example, a shape of a circle, oval, ellipse, polygon, triangle, square, pentagon, hexagon, quadrilateral, star, or another geometric shape. It will be appreciated that additional sections of each post can be provided with distinct shapes. For example, each post can include 3, 4, 5, 6, 7, or more than 7 sections with distinct shapes. For example, as shown in , the base section can have a polygonal (e.g., triangular) shape, and the extension section can have a circular shape. A base cross-sectional dimension (maximum or minimum) of the base section can be greater than an extension cross-sectional dimension (maximum or minimum) of the extension section . A minimum base cross-sectional dimension can be greater than or equal to a maximum extension cross-sectional dimension . As shown in , the base section can have a constant shape and cross-sectional dimension along a length thereof, and the extension section can have a constant shape and cross-sectional dimension along a length thereof. The post can provide a stepwise transition from the base shape and cross-sectional dimension to the extension shape and cross-sectional dimension . Alternatively, the posts can taper or otherwise gradually change shape and cross-sectional dimension along the lengths thereof, extending away from the core .
FIG. 13B
1350
1300
1362
1364
1350
1320
1362
1322
1320
1364
1324
1320
1372
1362
1374
1364
1372
1362
1350
1300
1350
1350
1300
1350
1350
1300
shows the implant formed on the mandrel . A first cycle and a second cycle of the implant can each be formed by winding a strand about each of the posts once to form loops. For example, the first cycle can be formed by winding a strand once about the base section of each post , and the second cycle can be formed by winding the strand once about the extension section of each post . The loops of the first cycle can be open or closed loops, and the loops of the second cycle can be open or closed loops. For example, the loops of the first cycle can be closed loops to provide more structural stability than would be provided by open loops. The closed loops can be formed where the loops have a larger cross-sectional dimension than the cross-sectional dimension of loops of at least one other cycle. When forming the implant , the cycles are formed on the mandrel , and the wrapped implant is subsequently subjected to a heat treatment process that causes the implant to thereafter have a bias to a secondary shape according to the winding pattern about the mandrel . After the implant has been subjected to the heat treatment process, the implant is removed from the mandrel .
FIG. 13C
FIG. 13A
1320
1300
1372
1362
1363
1323
1322
1374
1364
1365
1325
1324
1363
1372
1362
1365
1374
1364
1372
1362
1374
1364
1372
1362
1374
1364
1372
1362
1374
1364
1300
As shown in , the cross-sectional dimension of the resulting loops correspond to the cross-sectional dimensions of the posts of the mandrel . For example, the loops of the first cycle can each have a shape and cross-sectional dimension that is substantially equal to the shape and cross-sectional dimension of the base section , and the loops of the second cycle can each have a shape and cross-sectional dimension that is substantially equal to the shape and cross-sectional dimension of the extension section . Accordingly, the cross-sectional dimensions (maximum or minimum) of the loops of the first cycle can be greater than the cross-sectional dimensions (maximum or minimum) of the loops of the second cycle , and the shape of the loops of the first cycle can be different from the shape of the loops of the second cycle . Each of the loops of the first cycle can lie within a plane that is parallel to and/or non-intersecting with a plane of a corresponding one of the loops of the second cycle . Each of the loops of the first cycle can share a common central axis with a corresponding one of the loops of the second cycle . It will be appreciated that additional cycles and/or cycles having different types of loops can be formed using the mandrel of .
FIGS. 14A-D
FIG. 14A
FIG. 14A
FIG. 14A
1400
1450
1400
1410
1412
1412
1420
1420
1420
1420
1412
1412
1410
1430
1430
1410
1412
1412
1412
1412
1430
1410
1420
1420
1420
1420
1410
1440
1440
1440
1440
1440
1440
1440
1440
1410
1430
1420
1420
1420
1420
1420
1420
1420
1420
1420
1420
1420
1420
1440
1440
1440
1440
1430
1440
1420
1430
1442
1444
1442
1444
1420
1430
1412
1412
1412
1412
1420
1420
1420
1420
1420
1420
1420
1420
1420
1412
1412
1420
1420
1420
1420
1412
1412
1420
1420
1420
1420
1420
1420
1420
1420
1400
1400
a
b
a
b
c
d
a
b
a
b
a
b
a
b
c
d
a
b
c
d
a
b
c
d
a
b
c
d
a
b
c
d
a
b
c
d
a
b
c
d
a
a
a
a
a
a
a
a
b
a
b
a
a
b
c
d
a
b
c
d
a
b
a
b
c
d
a
b
a
b
c
d
a
b
c
d
Referring now to , a mandrel can be employed to form an implant having loops with non-uniform distribution, according to one or more embodiments of the present disclosure. The mandrel illustrated in includes a core (e.g., sphere) and a plurality of primary posts and and a plurality of secondary posts , , , and . Each of the primary posts and is mounted on an external surface of the core and extends in a direction of the primary axis , wherein the primary axis extends into the core . The primary posts and can be coaxial, such that each of the primary posts and extends along the primary axis on opposite sides of the core . Each of the secondary posts , , , and is mounted on an external surface of the core and extends in a direction of a corresponding secondary axis , , , or . The secondary axes , , , and extend into the core and intersect with each other and/or the primary axis . Each of the secondary posts , , , and can extend along a unique axis, such that none of the secondary posts , , , and is coaxial with any other one of the secondary posts , , , and . Each of the secondary axes , , , and can intersect with the primary axis . As shown in , the secondary axis of the secondary post can intersect with the primary axis to form a minor angle and a major angle . The minor angle can be different from the major angle , such that the secondary post is oriented in a direction that is transverse to the primary axis and is closer to one of the primary posts and than the other of the primary posts and . The angles described above with respect to the secondary post can apply to one or more of the secondary posts , , , and . Some of the secondary posts , , , and can be closer to one of the primary posts and and others of the secondary posts , , , and can be closer to the other of the primary posts and . The minor angles of each of the secondary posts , , , and can be equal to each other and the major angles of each of the secondary posts , , , and can be equal to each other. While the mandrel of is shown having four secondary posts, it will be appreciated that any number of secondary posts with corresponding angular orientations can be provided. For example, the mandrel can include 1, 2, 3, 4, 5, 6, 7, 8, 9, 10 or more than 10 secondary posts.
FIG. 14B
1450
1400
1450
1450
1400
1450
1450
1400
1450
1450
1400
shows the implant formed on the mandrel . While the implant is shown having only one cycle, it will be appreciated that multiple cycles can be formed, as further described herein. The loops of each cycle can be open or closed loops. When forming the implant , the cycles are formed on the mandrel , and the wrapped implant is subsequently subjected to a heat treatment process that causes the implant to thereafter have a bias to a secondary shape according to the winding pattern about the mandrel . After the implant has been subjected to the heat treatment process, the implant is removed from the mandrel .
FIGS. 14C-D
FIG. 14A
1460
1460
1470
1412
1412
1420
1420
1420
1420
1400
1470
1460
1460
1470
1460
1460
1450
1470
1470
1450
1470
1470
1470
1450
1450
1400
a
b
a
b
a
b
c
d
a
b
b
a
As shown in , the distribution of primary loops and and secondary loops corresponds to the locations and orientations of the primary posts and and secondary posts , , , and of the mandrel . For example, some secondary loops are closer to the first primary loop than they are close to the second primary loop , and other secondary loops are closer to the second primary loop than they are close to the first primary loop . Accordingly, the forces exerted by the implant in various directions are asymmetric because at least some of the secondary loops are not balanced by another secondary loop on a diametrically opposite side of the implant . The resulting distribution allows each of the secondary loops , when implanted, to provide a force that is not balanced by another secondary loop . Such configurations can be provided and/or adapted to accommodate aneurysms of irregular shapes. The asymmetric distribution of secondary loops allows the implant to conform to an irregular shape with a balanced force distribution when implanted in such an irregular shape. It will be appreciated that various winding patterns and cycles can be employed to form an implant using the mandrel of .
FIGS. 15A-D
FIG. 15A
FIG. 15A
1500
1550
1500
1522
1532
1504
1512
1520
1522
1528
1528
1522
1528
1524
1530
1532
1538
1538
1532
1538
1534
1512
1522
1532
1510
1522
1532
1522
1532
1510
1520
1530
1522
1532
1520
1530
1528
1512
1538
1512
1500
1520
1530
1520
1530
700
800
900
1200
1300
1400
Referring now to , a mandrel can be employed to form an implant having multiple sections, according to one or more embodiments of the present disclosure. The mandrel illustrated in includes a first core (e.g., sphere) and a second core (e.g., sphere) . One or more main posts can extend along a main axis . A plurality of first posts are mounted on an external surface of the first core and each extend in a direction of a corresponding first axis , wherein the first axes each extend into the first core . Some or all of the first axes can intersect at a first central region . A plurality of second posts are mounted on an external surface of the second core and each extend in a direction of a corresponding second axis , wherein the second axes each extend into the second core . Some or all of the first axes can intersect at a second central region . The first central region and the second central region can be aligned along the main axis that extends through the first core and the second core . At least one common post can extend between the first core and the second core , such that a winding patter about each of the first core and the second core can include contact with the common post . A total number of first posts can be equal to, greater than, or less than a total number of second posts . A diameter or cross-sectional dimension of the first core can be equal to, larger than, or smaller than a diameter or cross-sectional dimension of the second core . A size or cross-sectional shape of the first posts can be the same as or different from a size or cross-sectional shape of the second posts . Some or all of the first axes can be orthogonal to the main axis , and some or all of the second axes can be transverse to the main axis . While the mandrel of is shown having five first posts and three secondary posts , it will be appreciated that any number of first posts and secondary posts with corresponding orientations can be provided. For example, each core and corresponding posts can be provided in accordance with the disclosure provided with regard to mandrel , mandrel , mandrel , mandrel , mandrel , and/or mandrel .
FIG. 15B
1550
1500
1550
1522
1532
1522
1532
1550
1500
1550
1550
1500
1550
1550
1500
shows the implant formed on the mandrel . While the implant is shown having only one cycle, it will be appreciated that multiple cycles can be formed, as further described herein. Each cycle can extend across both of the first core and the second core . Alternatively, a plurality of cycles can extend across the first core and another plurality of cycles can extend across the second core . The loops of each cycle can be open or closed loops. When forming the implant , the cycles are formed on the mandrel , and the wrapped implant is subsequently subjected to a heat treatment process that causes the implant to thereafter have a bias to a secondary shape according to the winding pattern about the mandrel . After the implant has been subjected to the heat treatment process, the implant is removed from the mandrel .
FIG. 15C
1550
1560
1522
1528
1570
1532
1538
1562
1528
1572
1538
1562
1572
1560
1570
1562
1572
1562
1572
95
400
500
600
750
850
950
1250
1350
1450
As shown in , the implant formed as described herein can provide a first section , corresponding to a winding about the first core and first posts , and a second section , corresponding to a winding about the second core and second posts . For example, first loops can each have a shape and cross-sectional dimension that is substantially equal to the shape and cross-sectional dimension of the first posts , and second loops can each have a shape and cross-sectional dimension that is substantially equal to the shape and cross-sectional dimension of the second posts . A total number of first loops can be equal to, greater than, or less than a total number of second loops . A diameter or cross-sectional dimension of the first section can be equal to, larger than, or smaller than a diameter or cross-sectional dimension of the second section . A size or cross-sectional shape of the first loops can be the same as or different from a size or cross-sectional shape of the second loops . It will be appreciated that any number of first loops and second loops with corresponding orientations can be provided. For example, each section and set of loops can be provided in accordance with the disclosure provided with regard to implant , implant , implant , implant , implant , implant , implant , implant , implant , and/or implant .
FIG. 15D
1550
1590
1592
1594
1580
1550
1560
1592
1590
1570
1594
1590
1560
1570
1592
1594
As shown in , the implant formed as described herein can be implanted within an aneurysm having a first region and a second region extending from a vessel . The implant can be implanted such that the first section thereof is positioned within the first region of the aneurysm and the second section is positioned within the second region of the aneurysm . Each of the first section and the second section can be sized and shaped to substantially conform to the first region and the second region , respectively.
FIGS. 16A-C
FIG. 16A
1600
1650
1600
1622
1632
1642
1604
1602
1620
1622
1630
1632
1640
1642
1622
1632
1642
1602
1610
1622
1632
1622
1632
1610
1612
1632
1642
1632
1642
1612
700
800
900
1200
1300
1400
1500
1620
1630
1640
1620
1602
1630
1602
1640
1602
Referring now to , a mandrel can be employed to form an implant having multiple sections, according to one or more embodiments of the present disclosure. The mandrel illustrated in includes a first core (e.g., sphere) , a second core (e.g., sphere) , and a third core (e.g., sphere) . One or more main posts can extend along a main axis . A plurality of first posts are mounted on an external surface of the first core , a plurality of second posts are mounted on an external surface of the second core , and a plurality of third posts are mounted on an external surface of the third core . The first core , the second core , and the third core can be aligned along the main axis . At least one common post can extend between the first core and the second core , such that a winding patter about each of the first core and the second core can include contact with the common post . At least one common post can extend between the second core and the third core , such that a winding patter about each of the second core and the third core can include contact with the common post . Each core and its corresponding posts can be provided in accordance with the disclosure provided with regard to mandrel , mandrel , mandrel , mandrel , mandrel , mandrel , and/or mandrel . It will be appreciated that any number of first posts , secondary posts , and third posts can be provided. Some or all of the first posts can be transverse to the main axis , some or all of the second posts can be orthogonal to the main axis , and some or all of the third posts can be transverse to the main axis .
1620
1630
1622
1632
1620
1630
A total number of first posts can be equal to, greater than, or less than a total number of second posts . A diameter or cross-sectional dimension of the first core can be equal to, larger than, or smaller than a diameter or cross-sectional dimension of the second core . A size or cross-sectional shape of the first posts can be the same as or different from a size or cross-sectional shape of the second posts .
1630
1640
1632
1642
1630
1640
A total number of second posts can be equal to, greater than, or less than a total number of third posts . A diameter or cross-sectional dimension of the second core can be equal to, larger than, or smaller than a diameter or cross-sectional dimension of the third core . A size or cross-sectional shape of the second posts can be the same as or different from a size or cross-sectional shape of the third posts .
1620
1640
1622
1642
1620
1640
A total number of first posts can be equal to, greater than, or less than a total number of third posts . A diameter or cross-sectional dimension of the first core can be equal to, larger than, or smaller than a diameter or cross-sectional dimension of the third core . A size or cross-sectional shape of the first posts can be the same as or different from a size or cross-sectional shape of the third posts .
FIG. 16B
1650
1600
1650
1622
1632
1642
1622
1632
1642
1650
1600
1650
1650
1600
1650
1650
1600
shows the implant formed on the mandrel . While the implant is shown having only one cycle, it will be appreciated that multiple cycles can be formed, as further described herein. Each cycle can extend across both of the first core , the second core , and the third core . Alternatively, a plurality of cycles can extend across the first core , a plurality of cycles can extend across the second core , and a plurality of cycles can extend across the third core . The loops of each cycle can be open or closed loops. When forming the implant , the cycles are formed on the mandrel , and the wrapped implant is subsequently subjected to a heat treatment process that causes the implant to thereafter have a bias to a secondary shape according to the winding pattern about the mandrel . After the implant has been subjected to the heat treatment process, the implant is removed from the mandrel .
FIG. 16C
1650
1660
1622
1628
1670
1632
1638
1680
1642
1648
1662
1628
1672
1638
1682
1648
As shown in , the implant formed as described herein can provide a first section , corresponding to a winding about the first core and first posts , a second section , corresponding to a winding about the second core and second posts , and a third section , corresponding to a winding about the third core and third posts . For example, first loops can each have a shape and cross-sectional dimension that is substantially equal to the shape and cross-sectional dimension of the first posts , second loops can each have a shape and cross-sectional dimension that is substantially equal to the shape and cross-sectional dimension of the second posts , and third loops can each have a shape and cross-sectional dimension that is substantially equal to the shape and cross-sectional dimension of the third posts .
1662
1672
1660
1670
1662
1672
A total number of first loops can be equal to, greater than, or less than a total number of second loops . A diameter or cross-sectional dimension of the first section can be equal to, larger than, or smaller than a diameter or cross-sectional dimension of the second section . A size or cross-sectional shape of the first loops can be the same as or different from a size or cross-sectional shape of the second loops .
1672
1682
1670
1680
1672
1682
A total number of second loops can be equal to, greater than, or less than a total number of third loops . A diameter or cross-sectional dimension of the second section can be equal to, larger than, or smaller than a diameter or cross-sectional dimension of the third section . A size or cross-sectional shape of the second loops can be the same as or different from a size or cross-sectional shape of the third loops .
1662
1682
1660
1680
1662
1682
A total number of first loops can be equal to, greater than, or less than a total number of third loops . A diameter or cross-sectional dimension of the first section can be equal to, larger than, or smaller than a diameter or cross-sectional dimension of the third section . A size or cross-sectional shape of the first loops can be the same as or different from a size or cross-sectional shape of the third loops .
1662
1672
1682
95
400
500
600
750
850
950
1250
1350
1450
1550
It will be appreciated that any number of first loops , second loops , and third loops can be provided. Each section and set of loops can be provided in accordance with the disclosure provided with regard to implant , implant , implant , implant , implant , implant , implant , implant , implant , implant , and/or implant .
The foregoing description is provided to enable a person skilled in the art to practice the various configurations described herein. While the subject technology has been particularly described with reference to the various figures and configurations, it should be understood that these are for illustration purposes only and should not be taken as limiting the scope of the subject technology.
There may be many other ways to implement the subject technology. Various functions and elements described herein may be partitioned differently from those shown without departing from the scope of the subject technology. Various modifications to these configurations will be readily apparent to those skilled in the art, and generic principles defined herein may be applied to other configurations. Thus, many changes and modifications may be made to the subject technology, by one having ordinary skill in the art, without departing from the scope of the subject technology.
It is understood that the specific order or hierarchy of steps in the processes disclosed is an illustration of exemplary approaches. Based upon design preferences, it is understood that the specific order or hierarchy of steps in the processes may be rearranged. Some of the steps may be performed simultaneously. The accompanying method claims present elements of the various steps in a sample order, and are not meant to be limited to the specific order or hierarchy presented.
A phrase such as “an aspect” does not imply that such aspect is essential to the subject technology or that such aspect applies to all configurations of the subject technology. A disclosure relating to an aspect may apply to all configurations, or one or more configurations. An aspect may provide one or more examples of the disclosure. A phrase such as “an aspect” may refer to one or more aspects and vice versa. A phrase such as “an embodiment” does not imply that such embodiment is essential to the subject technology or that such embodiment applies to all configurations of the subject technology. A disclosure relating to an embodiment may apply to all embodiments, or one or more embodiments. An embodiment may provide one or more examples of the disclosure. A phrase such “an embodiment” may refer to one or more embodiments and vice versa. A phrase such as “a configuration” does not imply that such configuration is essential to the subject technology or that such configuration applies to all configurations of the subject technology. A disclosure relating to a configuration may apply to all configurations, or one or more configurations. A configuration may provide one or more examples of the disclosure. A phrase such as “a configuration” may refer to one or more configurations and vice versa.
As used herein, the phrase “at least one of” preceding a series of items, with the term “and” or “or” to separate any of the items, modifies the list as a whole, rather than each member of the list (i.e., each item). The phrase “at least one of” does not require selection of at least one of each item listed; rather, the phrase allows a meaning that includes at least one of any one of the items, and/or at least one of any combination of the items, and/or at least one of each of the items. By way of example, the phrases “at least one of A, B, and C” or “at least one of A, B, or C” each refer to only A, only B, or only C; any combination of A, B, and C; and/or at least one of each of A, B, and C.
Terms such as “top,” “bottom,” “front,” “rear” and the like as used in this disclosure should be understood as referring to an arbitrary frame of reference, rather than to the ordinary gravitational frame of reference. Thus, a top surface, a bottom surface, a front surface, and a rear surface may extend upwardly, downwardly, diagonally, or horizontally in a gravitational frame of reference.
Furthermore, to the extent that the term “include,” “have,” or the like is used in the description or the claims, such term is intended to be inclusive in a manner similar to the term “comprise” as “comprise” is interpreted when employed as a transitional word in a claim.
The word “exemplary” is used herein to mean “serving as an example, instance, or illustration.” Any embodiment described herein as “exemplary” is not necessarily to be construed as preferred or advantageous over other embodiments.
A reference to an element in the singular is not intended to mean “one and only one” unless specifically stated, but rather “one or more.” Pronouns in the masculine (e.g., his) include the feminine and neuter gender (e.g., her and its) and vice versa. The term “some” refers to one or more. Underlined and/or italicized headings and subheadings are used for convenience only, do not limit the subject technology, and are not referred to in connection with the interpretation of the description of the subject technology. All structural and functional equivalents to the elements of the various configurations described throughout this disclosure that are known or later come to be known to those of ordinary skill in the art are expressly incorporated herein by reference and intended to be encompassed by the subject technology. Moreover, nothing disclosed herein is intended to be dedicated to the public regardless of whether such disclosure is explicitly recited in the above description.
While certain aspects and embodiments of the subject technology have been described, these have been presented by way of example only, and are not intended to limit the scope of the subject technology. Indeed, the novel methods and systems described herein may be embodied in a variety of other forms without departing from the spirit thereof. The accompanying claims and their equivalents are intended to cover such forms or modifications as would fall within the scope and spirit of the subject technology.
BRIEF DESCRIPTION OF THE DRAWINGS
The accompanying drawings, which are included to provide further understanding of the subject technology and are incorporated in and constitute a part of this description, illustrate aspects of the subject technology and, together with the specification, serve to explain principles of the subject technology.
FIG. 1A
shows a plan view of a positioning system and an implant, in accordance with one or more embodiments of the present disclosure.
FIG. 1B
FIG. 1A
shows a closer view of a portion of .
FIG. 1C
FIG. 1A
shows a plan view of the position system of within the human body.
FIG. 1D
FIG. 1C
shows a closer view of a portion of showing the positioning system in partial cross-section and an exemplary implant within the human body, in accordance with one or more embodiments of the present disclosure.
FIG. 1E
FIG. 1C
shows a closer view of a portion of showing the positioning system in partial cross-section and an exemplary implant within the human body, in accordance with one or more embodiments of the present disclosure.
FIG. 2A
shows a partial cross-sectional view of an exemplary positioning system, in accordance with one or more embodiments of the present disclosure.
FIG. 2B
shows a side view of another exemplary positioning system, in accordance with one or more embodiments of the present disclosure.
FIG. 3
shows a partial cutaway view of an implant formed in a primary shape as a wound filament strand, in accordance with one or more embodiments of the present disclosure.
FIGS. 4A and 4B
show plan views of an implant having a secondary shape, in accordance with one or more embodiments of the present disclosure.
FIG. 5
shows plan views of separate cycles of an implant and a view of the implant including both cycles while in a secondary shape, in accordance with one or more embodiments of the present disclosure.
FIG. 6
shows plan views of separate cycles of an implant and a view of the implant including both cycles while in a secondary shape, in accordance with one or more embodiments of the present disclosure.
FIG. 7A
shows a perspective view of a mandrel for imparting a secondary shape to an implant, in accordance with one or more embodiments of the present disclosure.
FIG. 7B
FIG. 7A
shows a perspective view of an implant formed by the mandrel of , in accordance with one or more embodiments of the present disclosure.
FIG. 8A
shows a perspective view of a mandrel for imparting a secondary shape to an implant, in accordance with one or more embodiments of the present disclosure.
FIG. 8B
FIG. 8A
shows a perspective view of an implant formed by the mandrel of , in accordance with one or more embodiments of the present disclosure.
FIG. 9A
shows a perspective view of a mandrel for imparting a secondary shape to an implant, in accordance with one or more embodiments of the present disclosure.
FIG. 9B
FIG. 9A
shows a perspective view of an implant formed by the mandrel of , in accordance with one or more embodiments of the present disclosure.
FIGS. 10 and 11
FIG. 8A
show representations of winding patterns for the mandrel of , in accordance with one or more embodiments of the present disclosure.
FIG. 12A
shows a perspective view of a mandrel for imparting a secondary shape to an implant, in accordance with one or more embodiments of the present disclosure.
FIG. 12B
shows a perspective view of a mandrel with an implant formed thereon, in accordance with one or more embodiments of the present disclosure.
FIGS. 12C and 12D
FIG. 12A
show perspective views of an implant formed by the mandrel of , in accordance with one or more embodiments of the present disclosure.
FIG. 13A
shows a perspective view of a mandrel for imparting a secondary shape to an implant, in accordance with one or more embodiments of the present disclosure.
FIG. 13B
shows a perspective view of a mandrel with an implant formed thereon, in accordance with one or more embodiments of the present disclosure.
FIG. 13C
FIG. 13A
shows a perspective view of an implant formed by the mandrel of , in accordance with one or more embodiments of the present disclosure.
FIG. 14A
shows a perspective view of a mandrel for imparting a secondary shape to an implant, in accordance with one or more embodiments of the present disclosure.
FIG. 14B
shows a perspective view of a mandrel with an implant formed thereon, in accordance with one or more embodiments of the present disclosure.
FIGS. 14C and 14D
FIG. 14A
show perspective views of an implant formed by the mandrel of , in accordance with one or more embodiments of the present disclosure.
FIG. 15A
shows a perspective view of a mandrel for imparting a secondary shape to an implant, in accordance with one or more embodiments of the present disclosure.
FIG. 15B
shows a perspective view of a mandrel with an implant formed thereon, in accordance with one or more embodiments of the present disclosure.
FIG. 15C
FIG. 15A
shows a perspective view of an implant formed by the mandrel of , in accordance with one or more embodiments of the present disclosure.
FIG. 15D
shows a view of an implant delivered to a target location within a body vessel, in accordance with one or more embodiments of the present disclosure.
FIG. 16A
shows a perspective view of a mandrel for imparting a secondary shape to an implant, in accordance with one or more embodiments of the present disclosure.
FIG. 16B
shows a perspective view of a mandrel with an implant formed thereon, in accordance with one or more embodiments of the present disclosure.
FIG. 16C
FIG. 16A
shows a perspective view of an implant formed by the mandrel of , in accordance with one or more embodiments of the present disclosure. | |
The TMPO gene currently has no well-established disease association; however there is preliminary evidence supporting a correlation with autosomal dominant dilated cardiomyopathy (DCM) (MedGen UID: 2880).
TMPO
Order this gene as a single gene test.
Invitae tests that include this gene:
Pathogenic TMPO variants are associated with an unknown percentage of clinical cases of DCM.
The TMPO gene encodes thymopoietin, which binds with lamins A and C and is involved in maintaining the nuclear structural integrity.
Invitae is a College of American Pathologists (CAP)-accredited and Clinical Laboratory Improvement Amendments (CLIA)-certified clinical diagnostic laboratory performing full-gene sequencing and deletion/duplication analysis using next-generation sequencing technology (NGS).
Our sequence analysis covers clinically important regions of each gene, including coding exons, +/- 10 base pairs of adjacent intronic sequence, and select noncoding variants. Our assay provides a Q30 quality-adjusted mean coverage depth of 350x (50x minimum, or supplemented with additional analysis). Variants classified as pathogenic or likely pathogenic are confirmed with orthogonal methods, except individual variants that have high quality scores and previously validated in at least ten unrelated samples.
Our analysis detects most intragenic deletions and duplications at single exon resolution. However, in rare situations, single-exon copy number events may not be analyzed due to inherent sequence properties or isolated reduction in data quality. If you are requesting the detection of a specific single-exon copy number variation, please contact Client Services before placing your order. | https://www.invitae.com/en/physician/genes/20567/ |
working together to play a single instrument's sound, live, one note at a time.
The concept of using digital technology to create sound has been around for a long time.
The first documented instance of the idea was in 1842 when Ada Lovelace wrote about the
analytical engine invented by Charles Babbage. Babbage was essentially making a digital
calculator. Before the device was even built, Lovelace saw its potential applications beyond mere
number crunching. She speculated that anything that could be expressed through and adapted to
“the abstract science of operations” – for example, music – could then be placed under the
creative influence of machine computation with amazing results. In Ada Lovelace‟s words:
Supposing, for instance, that the fundamental relations of pitched sounds in the
science of harmony and of musical composition were susceptible of such
expression and adaptations, the engine might compose elaborate and scientific
pieces of music of any degree of complexity or extent.
It took 140 years, however, before we began to see this idea realized in any practical
format. In 1983, Yamaha released its DX-series keyboard synthesizers. The most popular of
these was the DX7. What made these synthesizers significant from a historical perspective is that
they employed digital circuits to make the instrument sounds and used an early version of the
Musical Instrument Digital Interface (MIDI), later ratified in 1984, to handle the communication
of the keyboard performance data, in and out of the synthesizer.
The year 1982 saw the release of the digital audio compact disc (CD). Researchers from
various electronics companies had been experimenting with the idea of recorded digital audio
since the mid-1960s, but it took many years before all the technology came together that allowed
an analog audio signal to be stored digitally at an acceptable resolution and then written onto an
optical disc. The first commercially available compact disc was pressed on August 17, 1982, in
Hannover, Germany. The disc contained a recording of Richard Strauss‟s Eine Alpensinfonie,
played by the Berlin Philharmonic and conducted by Herbert von Karajan.
Today, digital sound and music are flourishing, and tools are available at a price that
almost any aspiring sound artist can afford. This evolution in available tools has changed the way
we approach sound. While current digital technology still has limitations, this isn‟t really what
gets in the way when musicians, sound designers, and sound engineers set out to bring their ideas
to life. It‟s the sound artists‟ mastery of their technical tools that is more often a bar to their
creativity. Harnessing this technology in real practice often requires a deeper understanding of
the underlying science being employed, a subject that artists traditionally avoid. However, the
links that sound provides between science, art, and practice are now making interdisciplinary
work more alluring and encouraging musicians, sound designers, and audio engineers to cross
these traditional boundaries. This book is aimed at a broad spectrum of readers who approach
sound from various directions. Our hope is to help reinforce the interdisciplinary connections
and to enable our readers to explore sound from the perspective and at the depth they choose. | http://wfu.tizrapublisher.com/digital-sound-and-music/3 |
Various chemical reactions take place according to the certain laws, known as the Laws of chemical combination.
(1) Law of conservation of mass : It was proposed by Lavoisier and verified by Landolt. According to this law, Matter is neither created nor destroyed in the course of chemical reaction though it may change from one form to other. The total mass of materials after a chemical reaction is same as the total mass before reaction.
(2) Law of constant or definite proportion : It was proposed by Proust. According to this law, A pure chemical compound always contains the same elements combined together in the fixed ratio of their weights whatever its methods of preparation may be.
(3) Law of multiple proportion : It was proposed by Dalton and verified by Berzelius. According to this law, When two elements A and B combine to form more than one chemical compounds then different weights of A, which combine with a fixed weight of B, are in proportion of simple whole numbers.
(4) Law of equivalent proportion or law of reciprocal proportion : It was proposed by Ritcher. According to this law, The weights of the two or more elements which separately react with same weight of a third element are also the weights of these elements which react with each other or in simple multiple of them.
(5) Gay-Lussac’s law : It was proposed by Gay–Lussac and is applicable only for gases. According to this law, When gases combine, they do so in volumes, which bear a simple ratio to each other and also to the product formed provided all gases are measured under similar conditions. The Gay-Lussac’s law, was based on experimental observation. | https://studyadda.com/notes/neet/chemistry/chemical-arithmetic/laws-of-chemical-combination/6347 |
One of the most stressful things when it comes to traveling domestically, or internationally, is packing. How many pieces of luggage are we going to use? How many clothing items, and essentials, are we trying to pack? These are merely some of the questions dancing through our minds, when having to go through that tedious routine of packing. Not only packing, but making sure that we are packing, well.
The reality is that packing doesn’t have to be as stressful, as it has been made to be. In fact, it can actually be a fun and comforting experience. Much of the stress comes from simply, “not knowing what to pack.” Furthermore, you don’t want to over pack, nor under pack. Here are a few tips, that can better assist you in making your packing journey more of a comforting experience.
1. Write Down What You Plan To Do On Your Trip
(Source: www.freepik.com); Edits By Lauren K. Clark
When you have a clear understanding about how you plan to spend your trip, and what you are going to do, you end up having a better understanding of the attire you will need for your journey. Yes! That includes that time on the plane. Make a list of activities, that you plan to do during your travels. Also, make a list of places you would like to visit. Having a proper understanding allows you mental clarity on what you should have in your suitcase. Furthermore, you should know the culture. What would be the proper way of dress for your destination?
2. Check Out the Daily Weather Patterns of Your Destination
Its always important to understand the climate of where you are heading to. Having an idea of the terrain and climate ensures that you have some idea of how you need to dress. It also means that you can weed out clothing, that you know will not be suitable for the trip. Less unnecessary things, that you have to carry, which means more room available in your suitcase. Pack strategically!
3. Roll Your Clothes Tightly, Except For Jeans and Heavy Fabrics!
(Source: www.freepik.com); Edits By Lauren K. Clark)
Cotton and other light fabrics can be rolled up tightly. Therefore, they do not take up much space. On the other hand, if you role your jeans for packing, they become heavier, and therefore, create extra weight in your suitcase. There is the option of laying your jeans (and other heavier fabric items) on the bottom of your suitcase, while placing those that take up less space on time. It creates a balanced weight throughout your suitcase.
4. Decide On the Number Of Pieces Of Luggage You Want To Take
When you are decisive about how many pieces of luggage you are going to carry, you are more than likely going to arrange what, and how, you pack to cater to that limit. Depending on if the trip is international (and for a short term), it would be best to take two pieces of luggage per person. Domestic trips can be limited to 1 piece of luggage. You can determine other pieces of luggage based the duration of your time overseas, or for domestic trips.
5. Keep Non-Clothing Items and Toiletries In A Larger Handbag/Backpack You Carry On
Things such as journals, diaries, books, pens, and so forth can be packed in a large handbag or backpack. Keep the different categories of items that you are packing, within their respective places. Plus, it will be much easier to locate when you arrive to your respective destination(s).
6. Carry Your Coat Or Jacket With You On the Plane
(Source: www.freepik.com); Edited By Lauren K. Clark
Heavy jackets and coats take up a lot of room in your luggage. It’s best to wear, or carry, it with you on the plane. It will come in handy during your flight, when it gets cold. Plus, you can always place them in the upper storage compartments should they take up too much room, while you are seated. Depending on the weather of your destination, you can keep it on or remove it, once you arrive.
Packing shouldn’t be as hectic and chaotic, as we are accustomed to it being. We should not have to find our living spaces in disorder, and total array, when preparing for our travel adventures. Travel preparations can be just as fun, and exciting, as the actual trip. And, no! You can erase the stress of having to weigh down your trip, with unnecessary items. Clothing, or devices, that you won’t use or wear, anyhow. Keep it light. Like the adventures of your travel destination, the preparation should be just as comforting as the fun you are sure to have, the very moment, you arrive.
Lauren K. Clark, Lauren K. Clark hails from Atlanta, Georgia. Currently based in Cairo, Egypt, she is a lover of travel, studying different languages, the arts, and more!
Coming from Atlanta, Georgia, Lauren K. Clark came to Cairo, Egypt for her graduate studies in Gender & Women's Studies/Migration and Refugee Studies. A writer, published in 6 countries, project coordinator, working with refugee/migrant children, and just enjoying the magic and power of life. The world of theater is her therapy, and the performing arts lavishes her world! Enthralled with the mysteries of the Universe, and all the beauties, Creation has to offer.
The Thrive Global Community welcomes voices from many spheres. We publish pieces written by outside contributors with a wide range of opinions, which don’t necessarily reflect our own. Learn more or join us as a community member!
Share your comments below. Please read our commenting guidelines before posting. If you have a concern about a comment, report it here.
Five Simple Tips For Anxious Travellers
“People look for retreats for themselves, in the country, by the coast, or in the hills . . . There is nowhere that a person can find a more peaceful and trouble-free retreat than in his own mind. . . . So constantly give yourself this retreat, and renew yourself.” | |
, we picks the top choices along with best image resolution simply for you all, and this photographs is actually among graphics libraries in this greatest pictures gallery with regards to Kitchen Table with Bench Seating and Chairs. I am hoping you can enjoy it.
published through Heather Greene on 2018-03-25 12:23:00. To determine many pictures in Kitchen Table with Bench Seating and Chairs photos gallery remember to adhere to this kind of link.
Kitchen Table With Bench Seating And Chairs New Restaurant Tables And Chairs Luxe Outdoor Dining Bench Seating Uploaded by Heather Greene on Sunday, March 25th, 2018 in category Round Kitchen Tables.
See also Kitchen Table With Bench Seating And Chairs New Dining Chairs 45 Lovely Bench Chair For Dining Table Se from Round Kitchen Tables Topic.
Here we have another image Kitchen Table With Bench Seating And Chairs Lovely Dining Room Set With Bench Seat Awesome Dining Room Table Benches featured under Kitchen Table With Bench Seating And Chairs New Restaurant Tables And Chairs Luxe Outdoor Dining Bench Seating. We hope you enjoyed it and if you want to download the pictures in high quality, simply right click the image and choose "Save As". Thanks for reading Kitchen Table With Bench Seating And Chairs New Restaurant Tables And Chairs Luxe Outdoor Dining Bench Seating. | https://foodventuras.com/kitchen-table-with-bench-seating-and-chairs/kitchen-table-with-bench-seating-and-chairs-new-restaurant-tables-and-chairs-luxe-outdoor-dining-bench-seating/ |
These two improvements account for probably 80% of the life expectancy improvements. Share Share Tweet Email Comment. Eleven case control studies on life expectancy in former athletes revealed consistently greater life expectancy in aerobic endurance athletes but inconsistent results for other athletes. I always wanted to train for open-water marathon swimming. Jogging for as little as an hour a week can put years on your life, new research has shown. Chart and table of Germany life expectancy from 1950 to 2020. As life expectancy increases, the threshold age also increases (Box 1 and SI Appendix, Fig. The data aren’t so simple. Modern medicine might have enabled us to live for longer, but we now seem to be using that as an … By Josh Coulson Mar 22, 2019. The anticipated gains in life expectancy at age 65 as projected by the statistical offices in Europe and the US amount to one month per year in the coming decades. Researchers can't construct carefully cultivated lifestyle choice groups and follow them from birth to death. Does increased life expectancy imply active life expectancy? Wondering how to increase your life expectancy? Loneliness can be a key driver for a short life since people may not feel valuable and will not have many social connections, which may lead them to lose their will to live pretty soon. The researchers say their results are a more accurate prediction of how life expectancy will increase than official figures, and are the first to look consistently at changes in life expectancy at the district level over a long period of time. Having kids and being responsible can also increase a man's life expectancy Credit: Getty Images 4. Life expectancy: 8 years Replacement cost range: $730-$2,100 for natural gas heaters, $1,000+ for solar energy models, $2,000-$3,000 for electric heaters Swimming in frigid water is no fun, and a water heater is essential to ensuring you are able to stretch how long you can use your pool. Progress, however, after the threshold age has been increasing. Yet between 1960 and 2015, life expectancy in the U.S. increased by about two months per year on average. The life expectancy is shown separately for males, and for females, as well as a combined figure. Life expectancy for men increased faster than for women in the decade to 2016, climbing by 1.7 years to reach 80.4 years. Weight gain was a big one: For every one-unit increase in body mass index (BMI), a person’s life expectancy dropped by seven months. It assumes that the age-specific death rates for the year in question will apply throughout the lifetime of individuals born in that year. One study compared whether walking, running or swimming has the most life-boosting effect. Marketeer Read full profile. Life expectancy is a hypothetical measure. United Nations projections are also included through the year 2100. The data aren’t so simple. Have kids. This will lead to unemployment for the young generation. There is then more scope to save early lives below the threshold age and maintain the positive relationship between life expectancy and life span equality. Life expectancy is a statistical measure of the average (see below) time an organism is expected to live, based on the year of its birth, its current age, and other demographic factors including gender. While there have been obvious ups and downs, life expectancy at birth overall has been steadily increasing for many years. On the one hand, lower mortality may increase income per capita by in-creasing the productivity of available resources (most notably human capital). In 1960, newborns could expect to live slightly more than 71 years. On the contrary, there will be a scarcity of resources if life expectancy keeps on increasing. These days, that number has risen to 79.12 years old and is expected to increase up to 83.9 years old by the year 2050. Share; Pin it; Tweet; Share; Email ; We all want to live as long as possible, but the quality of life is just as important as length. How Modern Medicine Has Increased Life Expectancy In Exchange For Our "Healthspan" Modern medicine allows us to live for longer and longer, but our reliance on it may mean that those latter years aren't as great as they could be. The current life expectancy for Germany in 2020 is 81.41 years, a 0.19% increase from 2019.; The life expectancy for Germany in 2019 was 81.26 years, a 0.19% increase from 2018.; The life expectancy for Germany in 2018 was 81.10 years, a 0.16% increase from 2017. What does a healthy lifestyle achieve for life expectancy? Does reopening schools lead to increased life expectancy? By Katrina Turrill PUBLISHED: 08:10, Fri, Jan 24, 2020 UPDATED: 08:11, Fri, Jan 24, 2020 Chart and table of U.S. life expectancy from 1950 to 2020. They say the increase is likely to be the result of better survival in people over the age of 65. Average US Life Expectancy Statistics by Gender, Ethnicity, State.Study IntroductionLife expectancy gives us a glimpse into the nation’s health, unfortunately, over the past few years the United States has been on the largest continuous decline in expected lifespan for a century. James Timpson. The figures reflect the quality of healthcare in the countries listed as well as other factors including ongoing wars, obesity, and HIV infections. Back in 1950, life expectancy was 68.2 years old. In theory, increasing life expectancy may have positive or negative e ects. It seems like a natural progression, really. 10 Top Ways to Increase your Life Expectancy. In addition to increasing life expectancy, drinking coffee also reduces the risk of developing and dying from cancer, cardiovascular disease, diabetes or respiratory disease. Life expectancy, estimate of the average number of additional years that a person of a given age can expect to live.The most common measure of life expectancy is life expectancy at birth. S5). Nowadays, many countries face poverty and starvation as the food production is not enough to feed all the people around the globe. This puts them considerably above the category of walking half an hour a day (remember that corresponded to an increase in life expectancy of 1.3 to 1.5 years) and closer to, if not above, the category of intense exercise for 5 days a week (and the 3.5 to 3.7 years of added life expectancy). Link between income and life expectancy. It’s not only in developing countries that life expectancy is influenced by social status. United Nations projections are also included through the year 2100. It has more than doubled in the last two centuries. But average life expectancy is also increasing because the rate of infant mortality has fallen across the world. The current life expectancy for U.S. in 2020 is 78.93 years, a 0.08% increase from 2019.; The life expectancy for U.S. in 2019 was 78.87 years, a 0.08% increase from 2018.; The life expectancy for U.S. in 2018 was 78.81 years, a 0.03% decline from 2017. I am very short at 5 feet 5 inches, and I weight 65kgs. ‘By inviting children to holiday in Ireland it is said to increase their life expectancy by two years.’ ‘At the time of transition the note had a life expectancy of just six months compared to the coin's 100 years.’ Synonyms. We’ll call this 3.7 years of added life expectancy. Most people think it is increasing the age to which they can live; for example, people at 50 think that they are going to live longer because of an increase in life expectancy. This is an essential characteristic of the long-run equilibrium. Several non-sovereign entities are also included in this list. This is not the case. Eleven studies included confounding risk factors for mortality and revealed an increase in life expectancy by 0.4 to 4.2 years with regular physical activity. On the other hand, lower mortality may lead to an increase in population size. In contrast to the specific Healthy People 2010 objectives, the overarching goal of increasing life expectancy and improving quality of life does not specify a numerical target. These results confirm that global efforts to combat poor health conditions in less developed countries can be highly effective, but also shed doubt on claims that unfavorable health conditions are the root cause of the poverty of some nations. It is surprisingly hard to answer that question for humans. increase in life expectancy led to a significant increase in per capita economic growth. According to the ABS, Australian men now have the third-highest life expectancy in the world, marginally behind Iceland and Switzerland (80.6 years and 80.5 years respectively). The oldest of the elderly population (aged 85 or older) constitute 8% of the world’s 65-and-over population: 12% in more developed countries and 6% in less developed countries. When people live longer, that means there will be more people refuse to retire at an early age. Feel free to delete it if it does not meet the standards of this subreddit. In order to increase life expectancy, it is also crucial that we integrate people in our society as well as possible and that no one is left behind. It's common knowledge that our life expectancies have increased dramatically over the past few hundred years, but not many people realize exactly how this development came to be. Here are 10 proven ways you can lead a happy and healthy life well into your golden years. While life expectancy has increased significantly for educated people over the last twenty years, it has plateaued for less educated people. Life expectancy is poorly understood. From stress management to having dietary discipline, there are many ways in which you can prolong your life. Overall, life expectancy has increased due to 6 major factors (from most to least importance): Clean drinking water However, I am concerned that swimming long distances, may decrease life expectancy in the long run. July 1992; Danish Medical Bulletin 39(3):258-61; Source; PubMed; Authors: Marianne Schroll. Regular running increases the average life expectancy of men and women by around six years, a study found. Anyways, I am a 24 years old male. Life expectancy is a statistical anomaly, which takes the average of the age of a person’s death. As life expectancy increases, employees may be more inclined to continue working until a more advanced age.
Whole Life Insurance Quotes,
Barilla Pesto Genovese Recipe,
Sri Yantra Ring Benefits,
Psna College Of Arts And Science,
Din Tai Fung Megamall Menu,
The Puppet Company,
Tropical Flowering Plant Colorful With No Petals,
Mocha Coffee Creamer Powder,
Cap Barbell Cast Iron Hex Dumbbell, | http://coconutlyly.com/xkmlhx24/does-swimming-increase-life-expectancy-8840bb |
Football is, no doubt, one of the most widely watched sports around the world despite its many varieties. Among the international competitions that people worldwide closely follow are the World Cup and FIFA games.
Football fans who are avid internet users can now check the schedule of games they want to watch and watch them live via the Live-foldbold.dk website. A Danish website that streams live football games, the content can be translated in English by clicking the link on the top right of the home page.
With this website dedicate to football, there’s no need to turn on your TV if you’re doing something online. Just visit the website and you’re ready to view the sports game you prefer live as it is being played. | https://www.blogsearchengine.com/2014/07/05/live-fodbold/ |
Identification of the signaling networks that mediate cardiac myocyte growth, cell death, and pathological remodeling is critical to the ultimate elucidation of the molecular basis of heart failure. The long-term goal is to define novel molecular signaling mechanisms regulating cardiac remodeling and heart failure and to determine how they can be targeted for the treatment of myocardial diseases. Preliminary studies in this application identify a novel TAK1 (TGF?-activated kinase 1, also termed MAP3K7) signaling network that is essential for cardiac cell survival and homeostasis. The functional roles of TAK1 signaling in the heart and its implications in heart disease are largely not known, nor is the mechanism of action understood. The central hypothesis is that the novel cardioprotective TAK1 signaling network is critically involved in cardiac myocyte survival and the maintenance of normal cardiac structure and function, thereby preventing pathological cardiac remodeling and heart failure progression. The objective of this application is to evaluate physiologic functions of the TAK1 signaling network in the heart and its role in the pathogenesis of adverse cardiac remodeling and failure, by using integrated molecular, genetic, and functional approaches, as well as unique genetically modified mice developed by this research team. Guided by strong preliminary data, this hypothesis will be tested by pursuing 3 specific aims: 1) To investigate the essential role of TAK1 in regulating cardiac cell survival and myocardial homeostasis in vivo. 2) To determine if activation of TAK1 is sufficient to protect the heart from adverse remodeling and failure through promoting cell survival. 3) To determine the molecular mechanisms underlying TAK1-dependent cardioprotection and its role in regulating cardiac cell death and myocardial remodeling. First, the physiologic necessity of TAK1 in regulating cardiac cell survival and myocardial homeostasis will be examined using cardiac-specific TAK1 knockout mice. Next, the cardioprotective potential of tetracycline- inducible transgenic expression of TAK1 will be evaluated in mouse models of heart failure. Finally, mechanisms underlying TAK1-mediated cardioprotection and its potential crosstalk with other cell death/survival signaling pathways will be investigated using molecular and genetic approaches. These studies will uncover new mechanistic perspectives from which heart failure can be approached therapeutically and provide candidates for pharmacologic and genetic targeting. Furthermore, the proposed research will be of significance because what is learned here will also contribute to improved understanding of cell survival and homeostatic regulation in other cellular systems and disease models.
Understanding molecular signaling mechanisms of heart failure is critical for developing novel strategies in the treatment of heart disease. The proposed studies are aimed to define a novel TAK1 signaling network that is critical for myocardial survival and homeostasis and to identify new therapeutic targets for heart disease. Thus, the proposed research is relevant to the part of NIH's mission that pertains to developing fundamental knowledge that helps to reduce the burdens of human illness. | https://grantome.com/grant/NIH/R01-HL116507-01 |
Answer: Lake Superior, at least the western arm of it, can turn color when heavy rains or strong winds launch red clay particles and other sediments into the water column.
The southwestern shoreline of Lake Superior has large deposits of glacial-lacustrine red clay. The clay bluffs are especially prone to erosion, and the clay particles can float in Lake Superior for days to weeks. The fine red clay can be found from Duluth to the Apostle Islands.
In the Duluth-Superior area, the Nemadji River is known for its clay-laden flow. Nearly all the sediment in the river is due to bluff erosion and slumping. Seventy-four percent of it ultimately ends up in Lake Superior. The Nemadji River alone deposits about 100,000 tons of silt and clay into Lake Superior a year — about 17 dump truck loads.
Lake Superior can also turn a muddy red or brown when high winds create enough wave action to stir up bottom sediments. The St. Louis River and smaller tributaries to Lake Superior deliver many other brownish or tan soil particles that end up in the Harbor and the lake. Even though the apparent color of natural water spans the color spectrum, most children pick the bluest blue crayon to illustrate it. This proclivity is borne of the fact that more red, orange, and yellow wavelengths are absorbed by water than are blue ones. When sunlight enters the water, it is mostly blue light that is left for us to see. The deeper the water, the stronger the effect. For instance, tap water in a drinking glass looks clear but the same tap water filling a swimming pool looks turquoise. Covering even larger areas, like Lake Superior, water can look exceptionally blue because the surface is also reflecting the color of the sky.
But once in awhile, looking at Lake Superior will have you seeing red. Other times ... it's apparently brown. Still others, it seems green. Which begs the question: why?
"Apparent color" is different from "true color" in the language of water. "Apparent color," the color we see on any given day, comes from a combination of dissolved minerals and compounds, plus particles, both living and nonliving, that are suspended in the water. Green algae can give water a distinct apparent blue-green color. Some bodies of water in the mountains shine like turquoise because of "glacial flour," finely ground bits of rock liberated from melting glaciers. The "true" color of water is the color perceived after it has been filtered or centrifuged to remove suspended solids, leaving only the dissolved substances such as iron, manganese, and copper, which can produce striking blue-green colors. The brown tint to otherwise clear water, especially in northern Minnesota, is part of the water's "true color." It comes from tannic acid. This natural compound found in plants is useful in tanning hides and making dry wines. Tannins leach from decaying plant material into water as seasons pass, "staining" water to look like tea or root beer. In the context of Lake Superior, the St. Louis River is especially known for its tannin content. As the St. Louis River flows out to Lake Superior, sunlight breaks down the tannins, causing the water to become clearer and clearer until the tea-colored water becomes crystalline blue.
Oh yes ... and don't forget the sky ... the color of the sky can reflect off the water's surface and make a lake like Superior look dramatically different from one hour to the next: blue, green, gray, golden and even purple.
The next time you are asked to draw water, don't be so quick to grab the blue, or even green marker. Consider the particles and dissolved materials that wash in from the watershed as well as the life within the water column. Think of the sky overhead and the rocks underneath. Ask yourself, "why this color?" And, continue to do your part in keeping water the color of ... amazing. | http://www.seagrant.umn.edu/newsletter/2015/06/readers_want_to_know_sometimes_lake_superior_seems_reddishbrown_why_.html |
The invention discloses a rabdosia rubescens beverage and a preparation method thereof, and belongs to the field of beverages. The rabdosia rubescens beverage is prepared from the following raw materials in every 100L of beverage: 2-4kg of rabdosia rubescens extract prepared from rabdosia rubescens decoction slices, 0.1-0.2kg of citric acid, 0.7-1.4kg of sodium citrate, 4-6kg of rock candy or 5-7.5kg of xylitol and 40-50ml of essence, wherein either rock candy or xylitol is selected. The preparation method comprises the following steps: (1) selecting and washing; (2) cutting; (3) drying; (4) mixing; (5) warmly immersing; (6) refrigerating; (7) filtering; (8) preparing a flavoring agent; and (9) blending. The beverage can sufficiently achieve the medicinal effect of rabdosia rubescens, has a unique flavor and properly sour and sweat taste, and is adaptive to multiple groups. The preparation method is reasonable in process arrangement, is suitable for industrial production, and can protect the medicinal value of rabdosia rubescens from damage. | |
A mixture of sand and water would be a heterogeneous mixture since most of the sand will settle to the bottom and only the tiniest grains will remain suspended in the water.
Unit 1 – Pure Substances and Mixtures ... Sugar can be separated from a sugarandwater mixture by boiling the ... The sawdust will float on water, but the sand ...
This tutorial shows you exactly how to make kinetic sand using ... Then add the water and soap solution to the sand and ... starch and play sand mixture and mix ...
Mixing Salt, Sand, Water ... when you mix salt, sand and water it will be a physical change. Our hypothesis was correct because when you mix sand, salt and water ...
A bowl of Fruit Loops cereal is a heterogeneous mixture because it has ... Sand shaken up in a bottle of water is a ... Examples of Heterogeneous Mixture
Actually, sand is not a pure substance. There is no chemical formula for sand, as it is a mixture. However, the water, if it is distilled, is a pure.
Mixing Salt, Sand, and Water Mix the Sodium ... Our observations told us that mixing sand/salt and water was a physical state because the cone stopped the water from ...
10/03/2007· Filter the sand/salt/water mixture to separate the sand from the salt water. Boil the salt water in a still until dry, and condense the water vapors. You now have sand, distilled water, and salt. The distilled water and salt are pure, but the wet sand will have a .
Teacher demonstration: Set up three glasses of water. Add pebbles of sand to the first glass. Stir the water. Ask students whether this is a mixture or a solution. (Answer: It is a mixture because the sand and the water stay separate. The sand does not disappear in the water.) Add a teaspoon of salt to the second glass.
Separation of a Mixtures Lab Report ... grams of sand, mL of water, ... That can easily be fixed by careful moderation of the sand grains. If the mixture ...
Separating mixtures. ... If you have a mixture of salt and sand, then by placing the mixture in water you will find that the salt dissolves but the sand remains.
Water and alcohol are easily separated by distillation because of ... from rock salt by first adding water to the mixture to dissolve the ... water and sand
Yes, putting sand and water together in a container is classified as a mixture. This is because the physical properties of sand and water remain unchanged when added together. A mixture occurs when the combination of two substances results in no chemical reaction and can be separated back into its original components.
Salt is soluble in water, which would give a homogeneous mixture. But, when you add sand, which is insoluble, you will have a mixture of two different phases, a solid and a liquid, therefore this is a heterogenous mixture.
Salt water is a mixture of water and ... But what could be done with a mixture of sand ... Chromatography works to separate a mixture because the components ...
05/10/2011· The task was to separate a fairly uniform mixture of salt and sand. To do this, I added water to the mixture, which dissolved the salt. Then I filtered a ... | https://alteregocz.cz/1609084156_sand-and-water-are-mixture-because.html |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.