content
stringlengths
0
1.88M
url
stringlengths
0
5.28k
Piano Rolls are a form of punched media aimed at the specific application of reproducing music through specifying a sequence of piano keys to be pressed. A player piano reads the punched holes in the roll as it moves through the reader portion of the device, and this triggers the pressing of the appropriate keys under automated control. In the late 19th and early 20th centuries, player pianos competed with another newly-created medium, the phonograph, as the medium for the public to purchase and play "canned" music instead of doing live musical performances by hand. Famous musician John Philip Sousa famously denounced all of them as "infernal machines" that were killing real music. Some piano roll formats include velocity information, and in the 1920s famous pianists such as Rachmaninoff and Gershwin made piano roll recordings. They lack many of the subtleties of a live performance, but they're free of the noise and distortion that characterized acoustic recordings of that period, and some of these recordings have been re-released on CD. Most piano rolls, though, include only attack and release information, producing a mechanical sound. Characteristics Paper rolls, generally 11 1/4 inch wide. Well preserved ends should angle the paper toward the center where it meets in a tab that will have a hole to connect to the take up roller. 65 note scale introduced in 1896 with 6 holes to the inch on center. Rolls had pins on end. 88 note scale introduced in 1900 with 9 holes to the inch on center. 72 note scale introduced in 1902. In 1909 United States standardized on the 88 note scale.
http://fileformats.archiveteam.org/index.php?title=Piano_Rolls&oldid=18141
Back in the late 1990s, a group of physicians and local community leaders in Red Bank, New Jersey, began exploring ways to care for the uninsured in their community. Their project took off when one member of the group, Dr. Eugene Cheslock, a local oncologist nearing retirement, read an article in Newsweek about Dr. Jack McConnell and the clinic he founded in Hilton Head, South Carolina that used retired physicians as volunteer health care providers. What caught Dr. Cheslock’s attention was the possibility of tapping the vibrant local medical community anchored by Riverview Medical Center in Red Bank. He contacted Dr. McConnell and Amy Hamlin of Volunteers in Medicine, to discuss what he hoped to do, and invited them to Red Bank to explore the possibility of a volunteer-based clinic to serve Monmouth County. VIM staff saw Dr. Cheslock in action, and realized he had the passion and influence to successfully lead the project to completion. Together, they discussed the formation and membership of an organizing committee, and then recommended how best to conduct a Feasibility Study/Needs Assessment. At the conclusion of the initial site visit, Dr. McConnell sealed the deal when he convinced Dr. James Parker, revered physician for Red Bank’s West Side, that a volunteer-based clinic was not a “free lunch” for patients, but a better way to care for the needy. And the uninsured were present. Red Bank constituted a pocket of poverty within a much wealthier suburban county in central New Jersey. Almost 15 percent of Red Bank residents were below the poverty level, compared with 6 percent in the county overall (and 9 percent statewide). Recent Latino immigrants represented a third of the town’s population. To assess the need for a local clinic, the Red Bank Physicians and Citizens Committee conducted a door-to-door survey on the town’s West Side and found that 95 percent of Latino families and 30 percent of African-Americans lacked health insurance. Most people were employed as household help or in small businesses that could not afford employee health coverage. At the same time, Dr. Cheslock informally polled his colleagues at Riverview Medical Center and determined there was sufficient medical interest in volunteering to support a clinic. VIM staff guided the organizing committee in establishing its legal status as a nonprofit as well as applying for 501( c )(3) status and an Employer Identification Number. Articles of Incorporation and Mission and Vision statements were also developed with assistance from the national office. After the clinic was open, Dr. Cheslock applied for FTCA malpractice insurance for volunteers. The need was clear, the community provided the resources, VIM staff guided the planning process and the clinic—named for Dr. Parker and his late father, also a physician—opened on July 29, 2000 in a donated trailer outfitted for medical care by Riverview Medical Center. Three years later, with support from Jon Bon Jovi and his wife, the clinic opened in a new clinic building. The clinic has done more than deliver health care to the uninsured – it has improved the economic health of Red Bank, with the opening of new businesses that transformed the area around the Parker Family Health Center. Volunteer medical professionals are the primary care providers, supported by a small professional staff. The clinic logs over 10,000 patient visits annually with a focus on preventive services, chronic disease management and children’s health. For more information, visit Parker Family Health Center.
http://volunteersinmedicine.org/about-us/vim-clinic-stories/parker-family-health-center/
The 20 Most Affordable Places to Retire in 2021 Chicago: 55places.com––a leading real estate platform for homebuyers 55 and older––released today its list of the 20 Most Affordable Places to Retire in 2021. To compile the ranking, the company examined U.S. cities with a population of at least 50,000 and determined a score based on a variety of data points, including cost of living, median home value, taxes, accessible health care, transit and walkability scores, availability of 55+ communities, and more. This produced an index of metropolitan areas that offer a mix of quality living opportunities within an attainable price point. Though choosing a retirement location is a personal and subjective decision, affordability is top of mind for buyers. In fact, 43% of respondents who participated in 55places' 2020 National Housing Survey, said they expect the value of their next home to be slightly less or much less compared to their current home. "For the millions of Americans who depart the U.S. labor force each year, the image of what an ideal retirement is can differ," said George Kolar, regional sales manager for 55places.com. "However, an inexpensive and comfortable way of living are top factors that are considered before entering this phase of life. For adults looking to retire in 2021, the 20 metropolitan areas listed below provide prospective homeowners with low living costs and attractive amenities to foster a high quality of life." The 20 Most Affordable Places to Retire in 2021:
https://apekshasandesh.com/the-20-most-affordable-places-to-retire-in-2021-46405
“But we don’t know if they have effects on gender identity. This points to a role. “We have found a few weak contributors. And there are likely to be very many other genes involved. “But these are some small glimpses into the genetics of gender identity that are emerging,” Harley said. One woman who contributed to the study told The Age she got involved because she thought it might help change negative attitudes towards trans people. “I agreed to be in this study because I thought it might help people. That greater medical acceptance, potentially it saves lives.” Transgender Victoria’s Sally Goldner cautioned against the potential for the study to be used to delegitimise people’s identities by focusing solely on genetics. “It’s helpful to have evidence that says trans people are who we are – as we always knew. But a genetic study should never invalidate someone’s sense of identity.” Previous studies have also suggested a genetic basis for gender dysphoria, with a 2008 study finding that trans women have a longer version of the gene which modifies the action of testosterone. In a piece for the Star Observer, Mama Alto wrote about the “complex interplay of genetic and environmental factors that give rise to physical sex characteristics and psychological feelings of gender.” “So it is clear from an ever growing body of historic and scientific evidence that trans and gender diverse identities have existed for a long time – in all likelihood, forever.” About the AuthorLaurence Barber Laurence is Star Observer's Arts & Culture Writer and Digital Co-ordinator. His background is in film, television and arts criticism with a focus on LGBTI representation in media. For jokes, commentary and actress GIFs, you can follow him on Twitter @bortlb. 1 Comment Some genetic conditions do very clearly rely on single genes, others rely on multiple genes and others again rely on a combination of genetic and environmental factors (including in the womb during foetal development, diet, ‘stress’ which could itself include all sorts of different things, chemical exposure etc). Genes are a powerful factor in many aspects of our physical and emotional selves, but they are also far from being the whole story. This kind of research is interesting, it is helpful in understanding how people come to be who they are but it should not be overplayed. I think scientists generally know not to overstate its importance, the issue is potentially that anti-trans activists will misuse this sort of research to suggest that genes can be used to “diagnose” or even potentially “cure” transgenderism and there’s currently no reason to believe this is true, especially if environmental factors are also at play which remains entirely possible if not likely.
Recently, I have become intrigued by civil engineering. On one of my cycle routes through the mountains, there is a point where the road curves and a dam wall becomes visible. There are many different types of dams due to differences such as location, the construction period, the type of material (rock) and available transportation to the site. But in each case, the engineer has done their best to store the largest amount of water with the least amount of effort using the technology obtainable at the time. It is always a result I can appreciate! Not bounded by gravity and free from air drag, our spacecraft does not suffer from the same technical restrictions as dam building. For our technicians, weight poses the most severe restrictions on the design. Even essential controls and the equipment to be used on the mission must be built without any surplus bulk. By considering these needs and restrictions, we can create a plan for what the Martian Moon eXploration (MMX) spacecraft will look like. Figure 1 is a technical model of the spacecraft I sketched in three dimensions, overlaying a hand drawn background created with an artist tablet. To create the spacecraft image, I used a three-dimensional software package called “Shade”. Although highly precise models that can be used in construction analysis are created using the full-scale CAD engineering imaging software, three dimensional sketches to examine the spacecraft layout can be done more easily with Shade. In this 3D sketch, we first draw the parts whose dimensions are already known. The heaviest part of the MMX probe (and therefore the first parts to be installed) are the propellant tanks. Propellant is a mixture of fuel and oxygen which combine to produce gas for the spacecraft propulsion. The mixing ratio of these two ingredients is one of the factors that determines the tank size, along with the required change in velocity of the spacecraft, ΔV, and the density of the propellant. Since the tanks are heavy, their position on the spacecraft must be carefully balanced by the rest of the structure. In this image, I did this by joining the propellant tanks to a conical shape like a Christmas tree that can withstand strong lateral stresses during launch (see Figure 2). As the MMX spacecraft will carry more propellant than any previous Japanese scientific satellite to date, I think this kind of structure will be suitable for lifting such a heavy load. The size of the solar cells on the spacecraft is determined by the required electric power. The solar energy available at Mars is less than half that at the Earth, as the red planet is more than 1.5 times further from the Sun. We therefore need solar panels that are more than twice the size needed for a satellite operating around the Earth. In the three dimensional image data previously created with Shade, there was already a solar battery design. I used this same image and enlarged it for the MMX spacecraft model. The lightweight thin-film solar panels developed at JAXA have a slight curvature to improve their rigidity. On the image, this wave is emphasised to show this property but the actual panel structure may not be like this. A completely original part of the MMX spacecraft model is the landing gear and connected structures on the spacecraft’s landing module. For the “Hayabusa” and “Hayabusa2” asteroid missions, the spacecraft briefly touches down on a small celestial body with a weak gravitational field. There is therefore no need to have any leg-like structures. But the MMX spacecraft will hit the ground as a reasonable speed and risks bouncing unless there are legs to prevent a rebound. Although the shock from the landing will be absorbed by cushioning material, the spacecraft will still experience a force of up to 0.3 G (1 G = Earth’s gravity). This is enough for a spacecraft more than 1.5 metric tons to need a strong and rigid structure system. By referring to Moon-landing spacecraft, I attached the rigid legs with cushion cylinders in Figure 3 to the structure of the MMX spacecraft to absorb the almost all the landing energy and keep the spacecraft on the moon surface. However, the legs currently drawn will not allow the spacecraft body to clear the surface, so these will be extended in the next version. The dark surface of the spacecraft body is the black MLI (Multi-Layer Insulation) that reduces heat lost via radiation and prevents the spacecraft becoming electrically charged. This is the same material that was used for the lunar orbiting satellite, “Kaguya”, and the Mars probe, “Nozomi”. For the MMX spacecraft, we have not yet decided whether black or gold MLI will be used. However, the surface the Martian moons are covered with fine regolith (soil) which is likely to be kicked up before and after landing. This risks sticking to the spacecraft surface due to its small electric charge. I think it is therefore highly probable that the black MLI will be used as it should be superior against such electrical adhesion. In the model of the spacecraft, parts of the propulsion tank are covered in the gold MLI. In fact, this is only to accent the appearance of the different components. The entire spacecraft must be covered by the same black MLI type if electric charge prevention is required. From the technical point of view, this two-tone view is incorrect! In Figure 4, you can compare the spacecraft all in black and all in gold, but I felt it looked clearer when both colours were used. Although I considered many technical aspects to create the model of the MMX spacecraft, I think the image is not yet right. But if we allow for this being a first sketch, you can see the spacecraft system already has many cool and interesting features. I am not sure if this design will become the familiar image of the spacecraft, or if it will be significantly modified as the technology is optimised further. However, as many engineers discuss conflicts with the design, the MMX spacecraft will become more refined and get cooler and cooler. Do keep an eye out for these changes in the future!
https://mmx-news.isas.jaxa.jp/?p=492&lang=en
Three U.S. federal entities are coming together to launch the Food Safety for Food Security Partnership, also known as FS4FS. “Strong food safety delivered through policies and institutions, as well as farmer, consumer, and industry readiness, are critical to transforming agri-food systems,” said USDA Foreign Agricultural Service Administrator Daniel Whitley. The Foreign Agricultural Service is working with its parent agency, the U.S. Department of Agriculture, and the Food and Drug Administration on the project. The work includes a five-year commitment of $15 million to support the availability and trade of safe food. In addition to helping to ensure the trade of safe food, the program seeks to reduce foodborne illnesses, poverty, hunger, and malnutrition in low- and middle-income countries. “Through the new Food Safety for Food Security partnership, we will build on Feed the Future’s successes and work with countries around the world to increase access to safe and nutritious foods and unlock trade opportunities,” said USAID Bureau of Resilience and Food Security Acting Assistant to the Administrator Dina Esposito. To improve food safety and security, FS4FS is designed to support the development of sanitary and phytosanitary systems in Feed the Future countries. Through the partnership, longstanding barriers to participation in the food system will be addressed through capacity building, according to a USDA statement. With a capital investment of $15 million, the partnership will provide technical assistance, knowledge management, and digital tools to strengthen the policy and regulatory environments in participating countries. The collective efforts will help achieve global food security goals by decreasing foodborne illnesses and reducing trade suppression. “During the U.S.-Africa Leaders Summit, many African heads of state reached out to USDA for help in developing science- and risk-based measures and standards to ensure the supply and safety of their countries’ food,” said Foreign Agricultural Service Administrator Whitley. “Through the Food Safety for Food Security Partnership, we will work together to address these needs, which are vital to ensuring greater access to safe and nutritious food across Africa.” For additional information on the Food Safety for Food Security Partnership, visit https://fas.usda.gov/programs/food-safety-food-security-partnership.
https://veggiesfrommexico.com/other-news/u-s-begins-new-food-safety-program/
Doomsday Preppers: Thinking Beyond the Board Reserve (Part 2) In our last article, we started considering ways that organizations can respond effectively to financial crises. This is more relevant than ever as organizations try to weather the pandemic and navigate their recovery. We considered the kinds of financial crises organizations face and strategic responses to these crises when we find ourselves in the middle of a crisis. In this article, we’re considering how to see a financial crisis coming, when to take action, and how to set yourself to be best insulated for the future. Telling the future How can we forecast trouble and what should I do? With the understanding that not all financial crises can be predicted (read: Global Pandemic), what can organizations do to learn to spot trouble brewing? Learning to track and identify trends should provide the data that you need to see trouble on the horizon and take action. In all organizations, long before a crisis hits, trends should be tracked in the following areas: - Income/revenue streams – are they trending up, down, or flat? Are they cyclical? Be sure to look at your revenue streams over a long enough period to get good data, especially if you are an organization with a seasonal influx followed by a spend-down period. It’s important to look at each revenue stream separately so that gains in one area don’t mask an area that needs attention. Ensure that non-recurring revenue is separated (i.e. COVID-related relief grants), to see the trend of the underlying operations. The pandemic has impacted organizations differently and it can be difficult to identify trends with several unprecedented years in the data set. - Expenses trending above income —track headcount of your organization as a % of revenue and expenses. Ask yourself if you have enough staff to carry on development and operations. Also ask: can you afford the staff you have and/or need? Have you adjusted salaries to retain your most valuable staff? The cost of turnover can be disruptive to an organization financially and otherwise. - Cash management —calculate your cash burn rate. How much are you using a month? Ideally, your monthly income is higher than your cash expenses. If not, you are burning cash every month. If that is the case, is the burn rate increasing or decreasing? And how long can you sustain operations? Let’s consider these factors in more detail. Identify what the leading indicators are for your financial stability and success. Is it cash burn rate? Is it a fundraising efficiency ratio (i.e. how much you are earning for every dollar spent on fundraising activities)? Leading indicators should be tracked and reviewed regularly, and parameters should be identified for when the organization would take action based on each particular indicator. For example, if Cash on Hand is a leading indicator for your organization, and you have identified that any balance less than three months of cash on hand will require some action, define what that action is, calculate this ratio on a regular basis, and take action immediately when the indicator slips into that warning zone. The earlier you act the better. Take, for example, a non-profit organization that has just been informed that a major funder of theirs is changing direction and support will end in one year. Their cash burn will be ($250) starting next year. This can be thousands, hundred-thousands, millions, etc. While the organization searches for new contributions or determines if they want to continue the work funded by this Foundation they can: - Maintain status quo – continue operations with the belief that additional funders can be cultivated in the final year of this grant. - Act later – Continue operations for the final year of funding and cut expenses by $150/month beginning when this grant ends. - Act now – cut expenses by $150/month immediately. Let’s consider the potential outcome of each course of action: - Maintaining the status quo will result in cash running out within 1.5 years. - Acting later (i.e. when the grant ends) will result in cash running out within 2.5 years - Acting now, BEFORE the grant terminates will result in the organization being able to operate for seven more years without replacing that funding. What should we be doing now? Organizations should always be operating with a little bit of that Doomsday Prepper spirit. Hoarding cash (and toilet paper!) is great – just make sure that you don’t amass so much that it creates other problems with optics, especially for non-profit organizations. You want to ensure you are serving your mission while remaining fiscally responsible for the future. - If your organization has built up a significant amount of cash, consider an investment strategy and have your board help you set a policy and guardrails for the management and diversification of those investments. If you are a non-profit organization, consider starting an endowment. - Set SMART Goals today and revisit them regularly. SMART Goals are Specific, Measurable, Achievable, Relevant and Time-Bound. Set a goal for each of your leading indicators. Define a fundraising or development goal, and don’t forget to develop a strategy for achieving your goals. - Budget and forecast – and not just once per year. Organizations should have at least 1-3 years of forecasted budget AND cash flow—a detailed one-year forecast and a more summarized second and third year. Don’t forget – multi-year gifts increase revenue once and cash many times. Make a plan for the spend-down of that influx. - Develop your board to advise your organization. Evaluate whether you have the internal resources to assist in analysis, crisis management, goal-setting, budgeting and forecasting. It can be helpful to consider outside, objective input in contingency planning, so your organization may consider consulting a specialist for one-off or ongoing support. With some careful planning, a watchful eye, and strategic, creative and timely actions, your organization can better anticipate and weather any storm that may come your way! As always, if you need assistance, we can help. For more information and support, follow us or get in touch today. Follow us on social media here: For anything else, email us at [email protected] or call us on (781) 235-1490.
https://www.insourceservices.com/doomsday-preppers-thinking-beyond-the-board-reserve-part-2/
PSYCHOLOGICAL TRAUMAPsychological trauma is a pervasive reality in our society. When people think of psychological trauma they may think of military combat, violent assault, or torture, to name a few. However, we now know much more about the full scope of psychological trauma. We now understand that psychological trauma also includes emotional abandonment and neglect and there is a vast array of symptoms that can persist long term. SYMPTOMSTrauma remains unresolved because people are often not aware that they have been traumatized. People usually think that their childhood was just fine, or that is what they say to protect themselves from feeling the pain of emotional abandonment or neglect. So here are some of the symptoms to look for: - Drifting off and losing a sense of oneself, losing periods of time, and feeling everything and everybody seems unreal, strange, or foreign - Being mistrustful of others leading to difficulties in relationships - Feeling emotionally numb or “frozen” - Being easily “triggered” (intense emotional reactions), for example, being quick to anger - Feeling frequently anxious, fearful, or depressed - Having trouble sleeping, including having nightmares - Being self-destructive, such as, abusing a substance (including alcohol, marijuana, cigarettes, prescription drugs, or food) to numb painful feelings - Becoming obese - Developing certain chronic illnesses or chronic pain CAUSESThrough years of research and study we also know why some people become traumatized and others do not. When children have a secure relationship with emotionally available parents or caregivers they are much more resilient when they encounter the stresses of life. Furthermore, if they experience a traumatic situation they are less likely to become traumatized. However, when children grow up with parents or caregivers who are emotionally damaging, those children can become severely traumatized and their symptoms can last a lifetime. So what kind of parenting is emotionally traumatizing for children? Parents or caregivers who are: - Emotionally distant-not capable of providing loving attention, comfort, and support - Erratic-sometimes overwhelmingly involved and then emotionally unavailable at other times - Frightening by their words or actions - Severely neglectful TREATMENTBut the good news is there are effective ways of treating trauma and most psychologically traumatized people respond well to psychotherapy. When a therapist is trained in the treatment of trauma and helps create a safe and understanding environment, the necessary trust can be established to enter the often painful stages of healing. The work involves first understanding what has been traumatizing throughout one’s life and the emotional impact it has had. Also, we need to understand all the symptoms that people have struggled with and how the symptoms themselves have affected their life. Then we begin to develop “tools” that will help them to: - cope more effectively - improve self-esteem - build inner strength - sooth and comfort themselves - reduce anxiety and panic attacks In order to cope with the sense of powerlessness and all the emotional pain people try very hard to avoid their feelings. However, this avoidance needs to shift, in order for healing and growth to occur. This shift will occur gradually. I work with people’s painful experience slowly and carefully so they are not re-traumatized. In time they become more aware and comfortable with their painful experiences and the impact these experiences have had on their life. Then the intensity of the feelings and symptoms begins to lessen and becomes less frequent. People describe feeling much more comfortable in their own skin, their world feels safer, and their relationships become happier and healthier.
http://www.rhondalynnsummersphd.com/?page_id=26
This week, I had the opportunity to see renowned British scientist Richard Dawkins speak as part of his new book tour (his book is aimed at children and teens, and is quite creative and appealing). Dawkins is one of the most prominent thinkers in 20th-21 first century biology and natural sciences, and certainly, his contribution is indeed remarkable. But Dawkins is notoriously pro-science and anti-religion, to which I say—-why the schism? I myself am the daughter of a Hindu scientist, and am a very serious spiritual practitioner with a background in biological anthropology (though my degree was in Anthropology: Social Sciences). Why does he overlook the religious traditions that are pro-science, such as Buddhism? Perhaps one of the most pro-science, high profile individuals in the world today is HH Dalai Lama, the great leader of (the Yellow Hat branch of)Tibetan Buddhism. He himself has said that, “If scientific analysis were conclusively to demonstrate certain claims in Buddhism to be false, then we must accept the findings of science and abandon those claims.” His Holiness has done much to assist with the field of neuroscience and the scientific study of the brain and mind; one need only do a Google search with the words “Dalai Lama” and “science” to see the plethora of articles on the interconnectedness of Buddhism and science. The basis of Buddhism is impermanence and change, the evolution of thought, and seeing what is—-all concepts that relates well to the fundamentals of modern scientific thinking and scientific methodology. Dawkins fails to clarify that “religion” as he uses the word really refers to “Judeo-Christian” religion as well as more basic or fundamentalist types of ideas from any world religion. His thought processes reveal a narrow-mindedness that is a common process in any system of thought or philosophy or religion that bills itself as the ONLY way of thinking without any room for input from the opposite side, a dogmatism that one can see in fundamentalist Islam, Judaism, Christianity, Hinduism, politics, or any culture. It is rather ironic that Dawkins himself is rather caught up in a rather emotional, dogmatic campaign to promote his brand of scientific rationality as the only answer. Also frustrating about Dawkins is his mission to eliminate non-scientific explanations of natural phenomena. It seems a bit like the schoolyard child with the pin trying to pop your balloon. There is nothing wrong about myths or non-scientific explanations to explain the wonders of nature; they simply need to be contextualized as such, and not taught as- and confused with scientific truth. And vice versa: scientific truth is (if we look at it very, very simplistically), a method-tested, results-repeatable, quantitative, analytical, logical explanation for the wonders of nature. It is a tool which has allowed us to manipulate the world to a degree deemed impossible for centuries if not millennia. It has allowed us to make exponential progress (and, if we look at the state of the environment, regress) and achieve advances in technology that have changed the course of human history in a very short time. Science and myth/religion/storytelling are perhaps two sides of the same coin, quantitative and qualitative explanations for life. No, we cannot let the religious right prevent us from teaching evolution in schools. Yes, our politicians are generally very misinformed and fearful of science and scientific rationality. Yes, faith often gets in the way of rationality. But we cannot throw out the baby with the bathwater and completely dismiss religion as though it is all irrational, emotional, extremist poppycock. And for those of us not from the Judeo-Christian tradition, we cannot continue to allow the faith vs. rationality schism to persist.
https://thewomenofletters.com/2012/10/
Multiple endocrine neoplasia type 2 (MEN 2) and familial medullary thyroid carcinoma (FMTC) are autosomal dominantly inherited cancer syndromes that predispose to the development of C-cell hyperplasia and MTC. MEN 2A and FMTC are caused by multiple mutations in exons 10, 11, 13, 14 and 15 of the RET proto-oncogene. Associations between phenotype and specific germline RET mutations in exons 10, 11 and 13 have been established. We have studied 2 large FMTC families with a mutation in codon 804 in exon 14 (GTG→ATG; Val804Met) in which some individuals over age 70 had no overt clinical evidence of medullary thyroid carcinoma despite carrying or transmitting this mutation, In addition, some affected individuals with metastatic disease have had a relatively benign course, suggesting that this mutation causes a less aggressive form of MTC. Because of the presence of active MTC, including metastasis, in younger individuals within these families, we have continued to advocate thyroid surgery on the basis of mutation analysis. However, the apparent absence of disease in older individuals caused some of the younger individuals also known to be gene carriers to be reluctant to accept the recommended prophylactic thyroidectomy. Thus, counseling issues remain difficult in families with FMTC for specific mutations, even in a genetic disease usually considered to have a high penetrance, often with expression at much younger ages. These families emphasize the importance of molecular genetic testing in individuals or families with a history of FMTC, since identifying the specific RET mutation significantly influences the decision-making process for the affected individuals. Rights and permissions About this article Cite this article Feldman, G., Schuffeneeker, I., Lenoir, G. et al. Variable expressivity of Familial Medullary Thyroid Carcinoma (FMTC) due to a RET V804M (GTGG→ATG) mutation in two families: Reluctance of gene carriers to accept prophylactic thyroidectomy. Genet Med 1, 45 (1999). https://doi.org/10.1097/00125817-199901000-00023 Issue Date:
https://www.nature.com/articles/gim199923?error=cookies_not_supported&code=94fce9bc-08ba-4a12-96e2-906d3def99d9
My first InformationWeek column on big data incited some hot responses, such as: "Who has the time to waste working with software that is so ill featured and unreliable that it is like something out of the '80's?" and "If certain data is important to an institution, then that data belongs in the data warehouse, not in some newfangled database that doesn't even impose validity constraints." The meanest comment was, "Big data is a fad and you're just a shill for the vendors who created the fad because they had run out of things to sell us." Ouch! My column stressed the need for CIOs to get involved in big data in order to provide support to the faculty who were either teaching or doing research in this area. A few of the CIOs who responded confessed that they did not know much about the software and tools I had cited, and they sure didn't have a clue as to why their faculty wanted these tools. I tried to help by pointing them to some explanatory websites for Hadoop, MapReduce, Cassandra and R. [ Important analytics: Auburn University Program Trains Future National Security Analysts. ] The responses I found most intriguing were from CIOs who said that they had already taken steps to provide their faculty with access to big data tools, but now they are itching to expand their own role with these new technologies by utilizing big data analytics to improve IT operations. I asked what was stopping them, and they said: "I have no money" and "My staff is already overwhelmed dealing with clouds and mobile and virtualizing and distance learning and every other game changer that's been happening in higher ed technology. How can I tell them they now have to learn Hadoop?" A fair question, given the sad state of Hadoop's interface -- a question that can't be answered just by me sharing links to websites. My advice to them was to first identify the pain points in IT operations that happen to be awash in unstructured data. A pain point might be trying to keep the network secure. Or perhaps they are getting too many complaints about network performance or reliability. These pain points do not suffer from a lack of data. The log files produce so much data that staff can barely skim them each day. This massive amount of data creates its own problems, since the attention one can pay to a warning signal is inversely proportional to the number of warning signals being emitted. (I just made that up, but I'm pretty sure it's true.) If the data for a major pain point is generated, but it is way too much to comprehend, you have a perfect big data problem! Those CIOs who have been seeing their budgets increase each year can just hire a consulting team to come in and set up systems to tackle the pain points. Unfortunately, none of my respondents seem to be in that situation. And, they are not likely to have any data scientists on staff. So where can higher ed IT leaders get the people to create the research design and the predictive algorithms, deploy the software and tools, mine the data, and then reach that Eureka moment, known as the "big insight"? The experts tell us that anyone starting a big data analytics project will likely need a cross-functional team that has at least one person on the team with the knowledge and skills to use these new tools, one who has the predictive analytics skills, and one who is great at visualization. They point out that the team also needs a project manager who has superior business domain knowledge. My respondents admitted that they do have folks with business domain knowledge, but the other skills ... no way! Yet these are cutting-edge leaders who have deployed big data tools for faculty and students, something that few higher ed CIOs have done. This means that every day in their institutions students are gaining experience in using R, Hadoop, MapReduce and a variety of visualization and predictive analytics tools. To these CIOs I'd like to ask: Could some of these students be recruited by your IT organization to be part of a junior data sciences team? If assembling a student team seems too much of a challenge, then how about tapping into existing student teams in your school's big data programs, such as this one at George Mason, which has teams of students from many disciplines engaging in a final project involving a big data set -- which could be your set of log data! Bill Gates was a high school student when mainframe computers first came to Seattle. His teacher set up a link with a local corporation and then organized the students into teams to learn to computer program in order to help the high school and the corporation take advantage of this new technology. Big data projects could provide the higher ed IT leader with the opportunity to become this kind of world-changing teacher. I look forward to your comments. If you are using big data analytic tools to address pain points in your IT department, please share! Your colleagues are especially interested in knowing how you managed to build your data sciences team, so share that, too.
https://www.informationweek.com/big-data/some-higher-ed-cios-remain-big-data-skeptics
The conception of steady growth is the corresponding item of long run symmetry in state thesis. It is reliable with the concept of symmetry development. In steady state growth all variables such as productivity, population, capital stock, saving, investment and technical progression either grow at steady exponential rate or are steady. Taking diverse variables, some of the new-classical economists have given their explanation to the notion of steady growth. To start with Harrod, a fiscal system is in a state of steady growth when Gw = Gn. As per Meade in a state of steady growth the growth rate of aggregate earnings and the growth rate of earnings per head are invariable with population growing at an invariable ration rate, with no variation in the rate of technical progression. Properties of Steady State Growth The neo classical thesis of fiscal development is concerned with scrutinising of properties of steady state growth depending on the following basic postulations of the Harrod Domar model. - There is only one compound product which can eb consumed or utilised as a raw material in manufacturing or can be collected as a capital stock - Labour force builds up at an invariable proportional rate n - Full employment triumphs at all phases - Capital – productivity ratio v is provided - Saving – earnings ratio s is invariable - There are predefined coefficients of manufacturing. In other terminology there is no feasibility of the substitution of capital and labour - There is no technical variation (m) The neo classical development models talks about the properties of steady rate growth by integrating and relaxing these postulations In order to talk about the properties of steady state growth we first analyse the Harrod Domar model in a few words The Harrod Domar model is not a steady state growth model where Gw (=s/v) = Gn (=n+m). It is one knife corner balance among accumulated inflation and collected deflation. It is only when the warranted growth rate s/v equals the natural rate of growth n+m that there will only be steady state growth. But s,v,n and m being independent invariables, there is no valid ground for the fiscal system to grow at full employment steady state. Functions Assigned to Neo-Classical Growth Society - Flexibility of n - Flexible Capital Productivity Ratio v - Flexibility of Saving Ratio s - Flexible Saving Ratio s and Flexible Capital Productivity Ratio v - Technical Development - Flexibility of n Economists like Joan Robinson and Kahn have depicted that the non-absence of redundancy is well-matched with steady growth. So the presumptions of the progress rate of labour force at full employment are dropped. In its place it is replaced by the stipulation that the progress rate of employment should not be higher than n. For steady progress it is not necessary that s/v = n. Quite, symmetry progress is well-matched with s/v = n. This is what Kahn calls a bastard golden age as in opposition to Joan Robinson’s golden age where s/v = n. In this age capital stock is not progressing speedier for the reason that inflationary pressures. Rising prices mean a lower real wage rate. When the actual remuneration rate is at the bearably least level, it sets a limit to the rate of capital collection. - Flexible Capital – Productive Ratio v Hypothetically the Harrod Domar presumption of a constant capital productivity ratio means that the volume of capital and labour necessary to manufacture a unit of production are predefined. The neo-classical economists assume a continuous manufacturing function connecting productivity to the raw materials of capital and labour. The other presumptions of invariable returns to scale no technical development and invariable saving ratio are retained. Solow swan depict that for the reason that the substitutability of capital and labour and by enhancing the capital labour ratio, the capital productivity ratio can be enhanced and therefore, the warranted rate s/v can be made equal to the natural rate, n+m. if the warranted growth rate surpasses the natural growth rate, the fiscal system tries to break through the full employment hindrance, thus making labour more expensive in relation to capital and making incentives to move to labour saving techniques. This enhances the capital productivity ratio and the value of s/v is diminished until it overlaps with n+m. if otherwise, the warranted progress rate is less than the natural growth rate there will be excess labour which reduces the actual remuneration in association to the actual interest rate. Resultant, more labour intensive techniques are chosen which diminishes the capital productivity ratio v thereby increasing s/v. This procedure lasts till s/v parities n+m. Therefore, it is the capital productivity ratio which upholds the steady rate progress single handed whilst s,n and m remain invariable. Online Live Tutor Functions Assigned to Neo-Classical Growth Society: We have the best tutors in Economics in the industry. Our tutors can break down a complex Functions Assigned to Neo-Classical Growth Society problem into its sub parts and explain to you in detail how each step is performed. This approach of breaking down a problem has been appreciated by majority of our students for learning Functions Assigned to Neo-Classical Growth Society concepts. You will get one-to-one personalized attention through our online tutoring which will make learning fun and easy. Our tutors are highly qualified and hold advanced degrees. Please do send us a request for Functions Assigned to Neo-Classical Growth Society tutoring and experience the quality yourself. Online Steady State Growth Help: If you are stuck with an Steady State Growth Homework problem and need help, we have excellent tutors who can provide you with Homework Help. Our tutors who provide Steady State Growth help are highly qualified. Our tutors have many years of industry experience and have had years of experience providing Steady State Growth Homework Help. Please do send us the Steady State Growth problems on which you need help and we will forward then to our tutors for review.
https://www.tutorsonnet.com/properties-of-steady-state-growth-homework-help.php
Gendering global conflict : toward a feminist theory of war. New York: Columbia University Press. Slyvester, C. New York: Routledge. Whitworth, S. Williams, ed. Security Studies: An Introduction. Gendering Global Conflict: Toward a Feminist Theory of War by Laura Sjoberg (Paperback, 2013) Gender Issues , 28, pp. In Defence of New Wars. Stability , 2 1 , pp. London, Zed Books. Ellerby, K. As peacebuilding discourses increasingly stress the importance of including women, to what degree have security-related practices taken heed? This article adds to our understanding on women and peacebuilding by engaging as an operationalizable concept and then applying it to peace agreements to understand how women's security is addressed as part of formal peace processes. Given previous difficulties in operationalizing? Using this concept of en gendered security, I assess intrastate peace agreements between and to elucidate where and how women are included in peace processes. This article illustrates the potential of a systematized and practical approach to security embodied in and a preliminary discussion of what accounts for better approaches to en gendered security during peacebuilding. Enloe, C. Maneouvres: the international politics of militarising women's lives, Univ of California Press. Globalization and Militarism: Feminists Make the Link. Lanham MD, Rowman and Littlefield. Gibbs, J. Ruiz, et al. To address this gap in knowledge, this study explores differences between countries with high and low proportions of officers who are female. Four of the five low percentage countries are located in Asia, with a higher population density, homicide rate and economic inequality as measured by the Gini Index than most of the countries with a high percentage of female officers. These low percentage countries also have yet to abolish capital punishment, whereas all high percentage countries have done so. In addition, two of the low percentage countries, but none of the high percentage countries, were involved in a civil war during the data collection period; two of the high percentage countries, but no low percentage countries, were involved in interstate war. Implications and suggestions for future research are discussed. Gizelis, T. See the latest events Pierre Goetz, A. Nyamu Goldstein, J. War and gender: how gender shapes the war system and vice versa, Cambridge University Press. Heathcote, G. Otto Rethinking peacekeeping, gender equality and collective security, Palgrave Macmillan. Heinecken, L. Since the end of the Cold War, there has been an exponential growth in the use of private military and security companies. Few have debated the long-term consequences outsourcing of security holds for the military profession. The first section of this article outlines the evolution of military outsourcing. The implications that this has for the armed forces and the military profession are deliberated. The conclusion is reached that extensive growth and use of private security have affected the intellectual and moral hegemony of the armed forces as providers of public security. The long-term implications of this in terms of the social structure and the identity of the military profession are not yet fully realized. The South African military has adopted an assertive affirmative action campaign to ensure that women are represented across all ranks and branches. This has brought about new tensions in terms of gender integration, related to issues of equal opportunities and meritocracy as well as the accommodation of gender difference and alternative values. - (PDF) Review of Laura Sjoberg's Gendering Global Conflict | Dustin Howes - grapinprominmy.cf. - Gendering Global Conflict. - References. - I Shall Not Die: Living A Psalm 118:17 Existence. - You are here:. - Articles & Publications; - Front matter? The argument is made that the management of gender integration from a gender-neutral perspective cannot bring about gender equality, as it obliges women to conform to and assimilate masculine traits. Under such conditions, it is exceedingly difficult for women to bring about a more androgynous military culture espoused by gender mainstreaming initiatives and necessary for the type of missions military personnel are engaged in today. Van der Waag-Cowling Hendricks, C. Gender and security in Africa: An overview. Uppsala, Nordiska Afrikainstitutet. Hutton Valasek Herbert, M. Camouflage isn't only for combat: Gender, Sexuality and Women in the Military. - Country Ways (History Comes to Life Book 1). - gendering global conflict toward a feminist theory of war none Manual! - Bloomsbury Collections - Women and Gender in International History - Theory and Practice. Hudson, H. A feminist perspective can make security discourse more reflective of its own normative assumptions. A critical feminist perspective is geared towards addressing the politics of multiple overlapping identities. Since gender is intertwined with other identities such as race, class and nationality, the dichotomy between universalism and cultural relativism is overcome by connecting individual experiences in a particular location to wider regional and global structures and processes. An overview of a number of feminist and security-studies schools of thought reveals the extent of universalizing tendencies and gender silences within such discourses. The conceptual and political commensurability of the gender and security constructs is often overlooked. An emphasis on identity politics may thus help to clarify the ambivalence of human security as both a political project of emancipation and an analytical framework. A case is therefore made for more fluid context-based interpretations of gender in human security. In this regard it is posited that alternative feminist approaches, such as those rooted in the African context, could facilitate dialogue within and across supposedly irreconcilable standpoints. Gender Inclusive: Essays on violence, men, and feminist international relations, Routledge. Karim, S. Beardsley Since the United Nations Security Council adopted Resolution , which is referenced in most of the mandates for peacekeeping authorizations and renewals as of its adoption, UN peacekeeping forces have begun a process of gender balancing. While we have seen an increase in the numbers of female peacekeepers during the decade? Some feminist theorists have reclaimed and redefined such words as " dyke " and " bitch " and others have invested redefining knowledge into feminist dictionaries. Feminist psychology is a form of psychology centered on societal structures and gender. Feminist psychology critiques the fact that historically psychological research has been done from a male perspective with the view that males are the norm. It incorporates gender and the ways women are affected by issues resulting from it. Ethel Dench Puffer Howes was one of the first women to enter the field of psychology. One major psychological theory, relational-cultural theory , is based on the work of Jean Baker Miller , whose book Toward a New Psychology of Women proposes that "growth-fostering relationships are a central human necessity and that disconnections are the source of psychological problems". Conflict Resolution: Feminist Perspectives - Oxford Research Encyclopedia of International Studies Psychoanalytic feminism and feminist psychoanalysis are based on Freud and his psychoanalytic theories , but they also supply an important critique of it. It maintains that gender is not biological but is based on the psycho-sexual development of the individual, but also that sexual difference and gender are different notions. Psychoanalytical feminists believe that gender inequality comes from early childhood experiences, which lead men to believe themselves to be masculine , and women to believe themselves feminine. It is further maintained that gender leads to a social system that is dominated by males, which in turn influences the individual psycho-sexual development. As a solution it was suggested by some to avoid the gender-specific structuring of the society coeducation. Other feminist psychoanalysts and feminist theorists whose contributions have enriched the field through an engagement with psychoanalysis are Jessica Benjamin , Jacqueline Rose , Ranjana Khanna , and Shoshana Felman. Feminist literary criticism is literary criticism informed by feminist theories or politics. Its history has been varied, from classic works of female authors such as George Eliot , Virginia Woolf , and Margaret Fuller to recent theoretical work in women's studies and gender studies by " third-wave " authors. In the most general, feminist literary criticism before the s was concerned with the politics of women's authorship and the representation of women's condition within literature. It has considered gender in the terms of Freudian and Lacanian psychoanalysis , as part of the deconstruction of existing power relations. Many feminist film critics, such as Laura Mulvey , have pointed to the " male gaze " that predominates in classical Hollywood film making. Through the use of various film techniques , such as shot reverse shot , the viewers are led to align themselves with the point of view of a male protagonist. Notably, women function as objects of this gaze far more often than as proxies for the spectator. Linda Nochlin and Griselda Pollock are prominent art historians writing on contemporary and modern artists and articulating Art history from a feminist perspective since the s. Pollock works with French psychoanalysis, and in particular with Kristeva's and Ettinger's theories, to offer new insights into art history and contemporary art with special regard to questions of trauma and trans-generation memory in the works of women artists. http://speedynutrition.com/4161-mobile-phone.php Feminist history refers to the re-reading and re-interpretation of history from a feminist perspective. It is not the same as the history of feminism , which outlines the origins and evolution of the feminist movement. It also differs from women's history , which focuses on the role of women in historical events. The goal of feminist history is to explore and illuminate the female viewpoint of history through rediscovery of female writers, artists, philosophers, etc. Feminist geography is often considered part of a broader postmodern approach to the subject which is not primarily concerned with the development of conceptual theory in itself but rather focuses on the real experiences of individuals and groups in their own localities, upon the geographies that they live in within their own communities. In addition to its analysis of the real world, it also critiques existing geographical and social studies , arguing that academic traditions are delineated by patriarchy , and that contemporary studies which do not confront the nature of previous work reinforce the male bias of academic study. The Feminist philosophy refers to a philosophy approached from a feminist perspective. In This Article This critique stems from the dichotomy Western philosophy has conjectured with the mind and body phenomena. This means that Feminist philosophers can be found in the analytic and continental traditions, and the different viewpoints taken on philosophical issues with those traditions. Feminist philosophers also have many different viewpoints taken on philosophical issues within those traditions. Feminist philosophers who are feminists can belong to many different varieties of feminism. The writings of Judith Butler , Rosi Braidotti , Donna Haraway , Bracha Ettinger and Avital Ronell are the most significant psychoanalytically informed influences on contemporary feminist philosophy. Feminist sexology is an offshoot of traditional studies of sexology that focuses on the intersectionality of sex and gender in relation to the sexual lives of women.
https://grapinprominmy.cf/gendering-global-conflict-toward-a.php
BEIJING, Nov. 2 (Xinhua) -- China will inject more efforts in the intellectual property rights (IPR) sector to better serve the growth of new fields and new business forms during the 14th Five-Year Plan period (2021-2025), said the IPR authorities. The National Intellectual Property Administration (NIPA) will carry out in-depth study and practice in the Internet, big data, artificial intelligence (AI) and other new fields and new business forms. China will put diverse efforts on patent examination, data IPR protection, Internet-related IPR protection and IPR international cooperation in the 14th Five-Year Plan period. The NIPA will give full play to the bidirectional promotion function of patent examination in promoting innovation and application. It will improve the examination rules in the emerging fields to boost breakthroughs in core technologies and their industrial application. It will promote the implementation of the data IPR protection project, push forward the legislative research and establish rules in the sector, targeting to effectively protect and use data to ensure personal privacy and national security. The Chinese IPR authorities will also strengthen the IPR protection in the Internet field and facilitate the sector's online and offline integrated development to meet the new challenges from the information era. According to the NIPA, China will also promote international IPR cooperation in new fields and business forms, as well as international rulemaking in big data, AI and other emerging new fields. "In recent years, new technologies and new business forms in the fields of Internet, big data, AI and other emerging sectors are reorganizing the essential global production factors and reshaping the global economic structure. They are changing the global competition pattern," said Shen Changyu, head of the NIPA. In 2020, China saw the industrial scale of its digital economy reach 39.2 trillion yuan (6.12 trillion U.S. dollars), accounting for around 38.6 percent of the gross domestic product (GDP). The COVID-19 pandemic has also accelerated the development of the digital economy. Online shopping, online education, telecommuting and smart health care, as well as other new technologies and business forms, have been deeply integrated into people's daily work and life, injecting impetus and vitality into high-quality economic development. "New technologies and business forms propose new requirements for IPR protection works in digital fields. Therefore, we must tailor regulations and IPR protection measures to ensure sustainable and effective data application," Shen said. China recently released a plan on IPR protection and application works for the 14th Five-Year Plan period (2021-2025), proposing new targets involving the protection, application, services and international cooperation of the country's IPR sector.
http://www.news.cn/english/2021-11/02/c_1310286057.htm
The American Museum of Natural History's Margaret Mead Film Festival screens documentaries that increase our understanding of the complexity and diversity of the peoples and cultures that populate our planet. The festival has evolved with the times while maintaining its important history and has grown steadily to reflect the ever-evolving incarnations of storytelling, technology and growing access to communities near and far. The Mead presents the best in documentary, experimental films, animation, hybrid works, and more. The Mead aims to connect viewers to cultures and communities around the world, creating empathy and understanding through visual media. Hundreds of filmmakers and scholars, thousands of moviegoers, and over 40 international nonfiction films and media converge over four thrilling days of screenings, conversations, and parties. Awards & Prizes: The Margaret Mead Filmmaker Award recognizes documentary filmmakers who embody the spirit, energy, and innovation demonstrated by anthropologist Margaret Mead in her research, fieldwork, films, and writings. The award is given to a filmmaker whose feature-length documentary displays artistic excellence and originality of storytelling technique while offering a new perspective on a culture or community remote from the majority of our audiences’ experience. Filmmakers with works making their U.S. premieres at the festival are eligible.
https://filmitalia.org/p.aspx?t=festival&l=en&did=27085
About Us Sunday, January 13, 2013 Increasing the Volume of Writing I vividly remember sitting in a parent meeting with one of our reading specialists, discussing a student who struggled with reading. "How much time does she spend reading?" our specialist asked. The parent avoided the question and our specialist pointed out that when people improve on musical instruments, it's because they practice. Basketball players get better at dribbling by spending time dribbling. Yesterday, in the driver's education class that I attended with my daughter (yes, this is a scary concept for me), the instructor stated that teens should spend over 100 hours practicing their driving before getting their license. Along with purpose and audience, an important component of the Writing Workshop at any grade is volume. By volume, I mean write a lot. And after they write a lot, write more. Just as learners need practice to improve reading, dribbling and driving, writers need practice to improve writing. I am not going to say that just writing alone will improve writing. Students also need coaching and exposure to strong mentor pieces. That way, they can see and hear strong writing and it is more likely that specific techniques will begin to show up in their own writing. So how can we increase the volume of writing that students produce? Always remember to teach the writer and not the writing. When we accept that the writing does not need to be perfect, we remove the pressure from students and they are more apt to write more. You might try encouraging less time planning. Sometimes, students spend more time on planning than on writing. Then, by the time they write, they are already sick of their piece. Planning should be inspirational and exciting to students so that they are chomping at the bit to begin their writing. Encourage different ways to plan that differentiate and celebrate learning styles. Verbalizing, sketching, and acting out are ways that work for some students, helping them to visualize their story to completion. When students write, you can see how they plan and help them organize and revise that piece or the next piece. Students should work through the writing process several times in a unit. Challenge students to try out new strategies in the piece that they are currently working on or in pieces that they have previously written. That way, they get more practice and yes, they write more. For younger students, accept that sometimes they can't read their writing. A great question to come back to for these students is: "What did you want to say on this page." The more that they feel like they are competent story-tellers, the more competent they will become at story-telling. For reluctant writers, let them talk about strategies that they could use in past, present, or future pieces. Talking about what they could do may propel them to try those strategies in future writing. Use specific pieces to grow specific strategies. Not all skills are going to show up in every piece. Think of every piece as a coaching opportunity. Encourage older students to try out strategies in their notebooks. They should be revising as part of the writing process and not just as an-end-of-the-piece step. Accept that not every piece has to be completed. Some pieces are for experimenting and trying new strategies. Take time to celebrate the milestones that involve application of new skills and techniques and not just the finished "perfect" product. Teach students how they can generate and spin stories from stories. I can't tell you how many drafts I have read (and written) that have multiple stories within them. One story leads to another leads to another. Make sure that your students know what they can do when they need to have a conference--they can revisit drafts, begin new pieces, or study mentor texts for inspiration. Those 35-45 minutes of workshop time are precious writing minutes. Find parts of their writing to LOVE. Nothing generates excitement about writing as much as appreciation OF writing. Find ways to say "I love this part!" and mean it.
Last week I took you behind-the-scenes of organizing your ideas and outlining them. Things were a bit messy but rather exciting, right? There was so much creative energy, and there were so many right ways to reach the objective: being ready to draft. So now I’ve got good news and bad news. The good news is that drafting is no problem. Seriously. It’s the least thoughtful part of writing. (More on that in a sec; I won’t leave you hanging.) But the bad news is that after you draft, there is still the revising and editing process to go through. And they not only take time, they take extreme patience. I should have said I had good news, bad news, and more good news, though. Just like gathering and organizing ideas, revising and editing your writing is an adaptable process that you can make your own. Once you find the methods that work for you, getting from the first draft to the final draft will feel doable. It'll still take time and effort, but it won't be nearly so frustrating. Ready to jump in and choose your own revising adventure? Here we go! First Drafts First As promised, here’s the return to the drafting conversation. Will you agree to do two things? Always plan your writing in some way Always revise your writing in some way If you’re game to uphold those two agreements, then I hereby grant you permission to write the lousiest first draft in the universe. The first draft isn’t called the “smooth draft”; let it be rough, let it be imperfect. [Tweet that] Why is the first draft so rough? Because you have to write it quickly! The secret to effective drafting is momentum. If you stop too long to think about what you’re doing, two things are very likely to happen: You’ll lose your ideas. The things you thought you knew how to explain will slowly start to slip away, and you’ll have to work three times as hard to write them later. You’ll lose your nerve. If you pause for too long, you’ll start to question your sentences. You’ll start to unravel your ideas. You’ll become more likely to scrap your writing and start all the way over at the beginning. And that’s a shame, because you won’t even have had a chance to see whether your idea worked before throwing it into the recycling bin. So have a little bit of faith. Trust your outline to take you somewhere. Trust that you’ll revise your draft. In some ways, your draft parallels your brainstorm: you have to get everything out of your brain and onto the page in order to see what’s treasure and what’s trash. Here’s how to make your rough draft easy on yourself: - Look at your outline as you draft and stick to it - Turn of your internal editor: ignore spelling, grammar, and typos - Use [brackets] around elements that are place holders: words you know aren’t quite right or spaces where you can’t think of the word or phrase you need - Write all the way through to the end before starting any revising - Whatever happens, just keep going! Revising Your Way Let me get your gut reaction to something. If you’ve just finished writing a first draft and I say to you, “You now have permission to change whatever you want about it,” how would you respond? “What a relief! Now I can go back in and fix all those awkward parts and make it sound the way I want it to.” “What do you mean, ‘make changes’? If I knew how to make it different, I would have done that in the first place!” “You’re out of your mind. That was hard enough. No way I’m gonna rewrite the whole thing!” Do you know where you fall? Maybe somewhere between these points of reference? Maybe you’ve felt them all at different times or in response to different writing projects. When you finish a rough draft, take a minute to assess yourself using these landmarks; then proceed based on the guidelines below. “What a relief!” If you couldn’t wait to get through drafting so you could polish your writing, my hat is off to you! You must be highly motivated to write about this topic and share your ideas. Or maybe you’re just feeling that this isn’t your greatest writing, and you’re looking forward to taking another stab at it so you can show your best skills. Make a list of what you want to change: - What isn’t working for you? Why? - Where do you want more detail? - Where do you want more explanation? - Where do you want more specific word choices? - Where do you need some more reflection? - Where could you use more transitions? - Do you have all your structure pieces in place, such as topic sentences? “Make changes? Are you crazy?!” If you feel resistant to making changes because you think you won’t do any better than your first draft, it can be helpful to follow a recipe so that you know exactly where you might make improvements. Go through your writing with a highlighter or highlighter tool on the computer and look for what, in your own opinion, are the weakest components in your writing. Look for places that just feel off to you. Identify your “worst” in each category: - Topic sentence (including a place where one is missing) - Piece of evidence - Explanation or description - Transition (including a place where one is missing) - Concluding sentence - Worst sentence overall Once you’ve got this list, you know at least five places you can improve your writing—maybe six; it depends on whether your worst overall overlapped with any of the other categories. If you only address those elements, guess what? You’re way better off than you were before! But if you have more energy and time, start asking yourself Why? Why was that my worst topic sentence? Why wasn’t it working? Am I using that same ineffective pattern in other places in my writing? The more you identify patterns in your writing, the easier it will be to revise now and on future writing projects. This is why I always build Writing Toolboxes with my students, helping them see which strategies are effective for them, and which writing habits would be worth breaking. “No way I’m rewriting this whole thing!” You’re right! There is no way you should have to rewrite your entire draft! You did so much work! You followed the steps: you brainstormed, you organized and outlined, you drafted—you shouldn’t be penalized. So I want you to know that the feeling of injustice that might be coming up is well-founded. It would be cruel and unusual punishment to make you rewrite everything you just did. I want to remind you of something, though. Your draft is not one solid piece; it’s modular. You can make changes to it in one place and leave other places well enough alone! That means revising is far from rewriting. Try this. Use a checklist to give your writing a once-over and give your honest judgments about what you think could be better. Follow a revising checklist - Do I have a clear, concise thesis statement? - Do I have clear topic sentences? - Do I have relevant evidence? - Do I explain my evidence and how it supports my topic? - Do I use the style and voice that fit my audience and my purpose in writing? - Do I make use of specific words so that my audience can clearly picture what I mean? - Do I use a variety of sentence types and lengths? Once you’ve answered each question honestly, you'll probably see that there are at least a few places where you could improve your writing. Start revising those and see where it takes you. If you’re feeling stuck, why not enlist some help? Grab a trusted friend or family member and ask him or her these questions: - In your words, what’s my main idea? (if you disagree with the response, that’s a sign you need to state your idea more clearly!) - Is anything confusing? - Where would more explanation have been helpful? - Does anything feel repetitive? - Are there any awkward sentences? Talking about your writing with someone else is by far the best way to improve at revising because you get a chance to defend your choices and take stock of the strategies that are working for you. You’re the Editor in Chief Surrounded by so much (increasingly smart!) technology, it’s easy to think, “Editing, schmediting. My computer does that for me.” Those little red and green lines from your writing software’s spellcheck and grammar check are a good place to start. But simply right-clicking on them is not the same as editing your work. Editing is choosing what makes the cut. When you write a book or publish articles in magazines or newspapers, the editor is actually a separate person who gets the final decision about your writing. But when you write for yourself, for school, or for a blog, you have to be your own editor. When you revise and edit your own work, some of the tasks will overlap, and that’s a good thing. Revising your rough draft was like putting the first coat of frosting—what’s called the crumb layer—on a cake. This layer isn’t smooth, and it’s not supposed to be. Its job is to create a cohesive base for the next layer of frosting to stick to. As you put on each layer of frosting (revise each draft), you make your writing smoother and smoother, so that eventually it’s ready for just a few final touch-ups here and there. After you revise, your writing will look pretty tasty—uh, I mean interesting and inviting. So your job is to go through the whole piece one more time and do a final check for anything out of place. Use an editing checklist: - Check for accuracy of information (If you used quotes, did you copy them faithfully?) - Make sure the writing matches the intended audience and purpose - Tighten up any unnecessarily long sections - Correct any mechanical errors (missing words, extra words, misspelled words, typos, grammatical blunders, wacky punctuation, etc.) - Double-check your format and word count if those elements are important I recommend a three-step editing process so that you can look for one type of problem at a time. Use Your Strengths Whether you’re gathering your thoughts in a brainstorm, grouping them together in an outline, drafting them into paragraphs, or polishing them into a final draft, your writing process should be a reflection of your unique thinking process. Even though your thinking and learning style is your own, seeing it for yourself can be difficult. Especially if you’ve never been invited to investigate it. If you’ve always been made to write in a certain way, you might have to take some time to discover which writing strategies work best for you. But when you invest this time—to learn your personal best path from the beginning to the end of writing—writing will be less frustrating and more enjoyable. Join the conversation! What do find to be the hardest part of the writing process? Do you have any favorite strategies that make writing easier?
http://www.wholeed.com/megan-blog/from-first-draft-to-final-draft-with-less-frustration
Andrew is available for private lessons for piano, guitar, saxophone, clarinet, drums, and trumpet. Read more below. about andrew Andrew began playing music at the age of five, when his mom brought a piano into the house and signed him up for lessons. He was trained classically through middle school, but fell in love with jazz at an early age and studied under Amy Stephens-Chen in high school. He picked up the clarinet in fourth grade with his sights set on the tenor sax, which he began playing in 7th grade. That same year, he began fiddling with the other instruments in the house, including guitar, harp, trombone, trumpet, and didgeridoo. He played in concert, jazz, pep, and worship bands throughout high school, as well as performing with cover band The Potentials. He moved to Salem in 2009 to attend Corban University. There, he played in a variety of campus ensembles, and led the jazz combo for three years. In 2012, he began teaching individual and group lessons at Guitar Center in Keizer, and that’s where he fell in love with music education. He taught at GC for 6+ years, serving the last 4 as Lead Instructor. He began working in schools in 2014, establishing an elementary band program at Riviera Christian School before taking a position as Music Specialist at Abiqua Academy. There, he teaches Pre-K through 4th Grade General Music, Middle School Concert, Jazz, and Guitar Ensembles, and a variety of Music History courses. Anyone can make the simple complicated. Creativity is making the complicated simple. Andrew loves the Salem music scene, and has participated in it in a variety of forms. He currently plays keys with The Ferenjis, a funk project with Trevor Fischer, Jason Pluemke, and Peter Ellis. The Ferenjis recently released their first full length record, and toured it down the west coast. Andrew is passionate about music education, and in fostering an environment that creates confident, competent musicians. Andrew began working at RiverCity in 2019 and is available for private lessons for piano, guitar, saxophone, clarinet, drums, and trumpet.
https://rocksalem.com/pages/andrew-norman
ET involves moving resources between sectors (for example, from agriculture to manufacturing); and improving productivity within sectors (for example, from subsistence agriculture to high-value crops), including through firm entry and exit, as well as within firms. ET and trade are intimately linked through, for example: diversification of production and trade; discovery and development of new productive capabilities through trade; and creation higher domestic value added in trade. Whilst there has been a firm belief in a strong link between trade and transforming productive structures, it remains too ambitious to identify a unique and unambiguous link between trade policy, trade, and economic structures. Import substitution strategies were used during the 1960s and 1970s to move resources from, typically, natural-resource-based sectors to manufactures. In the late 1980s and early 1990s, trade liberalisation was one of the most important policy tools under the so-called Washington Consensus. This briefing discusses the effects of trade (related) policies and how trade policy affects ET through multiple channels: allocative efficiency, market size, competition, access to inputs and backward linkages, forward linkages, skills and technology, and political economy. The briefing identifies several areas that require empirical work: (i) empirical evidence on the way in which trade affects the within and between components of productivity change and ET; (ii) building up more evidence on what drives exports of services, incl. the role of trade policy played in this; and (iii) the effects of different forms of global and regional value chains on ET. Previous Previous post: Steve Wiggins (ODI) | Tracking agricultural transformation – if measuring productivity is hard, should we focus on rural wages?
https://set.odi.org/trade-policy-and-economic-transformation/
Which Are The Most Famous Singers 2023? Even when is impossible to predict the most famous singers of 2023, some of the most famous singers across various genres and countries include: 1. Adele - Known for her powerful vocals and soulful ballads. 2. Taylor Swift - A country-pop crossover artist with numerous chart-topping hits 3. Ed Sheeran - A singer-songwriter known for his acoustic guitar and catchy pop hooks 4. BTS - A South Korean boy band with a massive global following 5. Billie Eilish - A young artist known for her dark pop sound and unique fashion sense 6. Ariana Grande - A pop singer and actress with a four-octave vocal range and a loyal fan base 7. Drake - A rapper, singer, and songwriter known for his smooth flow and catchy beats 8. Justin Bieber - A Canadian pop singer who rose to fame as a teenager and has continued to produce hits 9. Dua Lipa - A British pop singer with a dance-pop sound and powerful vocals 10. Beyoncé - A pop and R&B icon with a career spanning several decades. It's worth noting that music tastes and popularity can change quickly, so this list may not necessarily be reflective of the most famous singers in the future.
https://www.blissmusicacademy.com/post/which-are-the-most-famous-singers-2023
NAIROBI, Feb 10 2017 (IPS) - Agriculture plays a pivotal role in the livelihoods of Kenya’s majority, providing both formal and informal employment with women accounting for about 70 percent of the agricultural labour force. The sector, dominated by smallholder farmers, generates approximately 60 percent of Kenya’s exports and directly contributes about 30 percent to the National Gross Domestic Product (GDP). However, considering the country’s vision for the agricultural sector, the sector has performed below its potential. Kenya’s vision is outlined in the Agricultural Sector Development Strategy, an amalgamation of the priorities laid out in both the regional Common Market for Eastern and Southern Africa (COMESA) and the national Comprehensive African Agricultural Development programme (CAADP) to be achieved through specific targets. The sector aims at significantly contributing to the reduction of hunger and the number of people living below absolute poverty lines to less than 25 percent as set under the Sustainable Development Goals. It is estimated that 10 million people in the country are categorized as chronically food insecure and with the current looming drought 2.7 million people are at risk, the most affected being women and children in rural areas. The Semi-Arid Lands represent Kenya’s next agricultural frontier and are identified in the agricultural development strategy as a key priority for future development. Creating farmer-market linkages has great potential to spur tremendous growth in the agricultural sector. There continues to be a huge unmet market demand for specific crops particularly pulses and cereals in both domestic and international markets. Market opportunities for agricultural products continue to grow in national, regional and global markets around the world such as in large retail supermarket chains and in emerging markets like India, Poland and South Africa. These new market conditions provide great opportunities for farmers to increase their productivity, incomes and employment opportunities as well as improve the food security situation and nutritional status in the country. However, despite these opportunities, there is a total disequilibrium in the market dynamics in the rural semi-arid regions of Kenya. Owing to a low history of commercialisation, these agricultural chains are dominated by middle men who often do not provide value but instead, exploit the farmers who get caught up in a vicious cycle of poverty as they are permanently indebted to the middle men. One approach towards a solution is through increased productivity and profitability of small holder farmers by promoting and upscaling good agricultural practices and the context-based farming approach of conservation agriculture (CA) in productive semi-arid areas of Kenya. This approach is based on three core principals which are minimal tillage, maintenance of soil cover, and crop rotation that help farmers to increase yields, reduce the costs of production, improve soil fertility and to conserve water and the environment. An on-going four-year project (2014-2018) financed by the European Union and implemented by the Food and Agriculture Organisation of the United Nations (FAO) is currently being implemented in eight counties across Kenya. The project focuses on the promotion of conservation agriculture and targets 80,000 farmers with at least 40 percent being women. Its strong agribusiness component involves facilitating linkages between farmers and end markets. This is done through contract farming that is a pact between the farmers and companies for the production and supply of specific agricultural products based on an agreement and at a price which is pre-determined by the farmers and the firms. The project is executed in collaboration with both the national and county governments, local organisations, farmer groups and the private sector. Rural transformation is a process that requires an appropriate institutional framework and financial inclusion to provide an enabling environment for improved productivity and commercialisation to happen. With improved market access and direct linkage to end buyers, rural communities are increasing their profitability, incomes and livelihoods. This in turn is having a direct contribution on rural communities’ improved food security, nutritional status and economic freedom. Gabriel Rugalema is FAO Representative to Kenya and Alessio Colussi is the Head of Crops and Agribusiness Sector of the Food and Agriculture Organization (FAO) of the United Nations. I’ve profited $104000 in 2016 by working online from home and I manage that by working part-time for 3 or sometimes more hours daily. I’m using a money making model I came across from this website i found online and I am happy that i was able to make so much money on the side. It’s so newbie friendly and I’m so happy that i discovered it. This is what i do… STATICTAB.COM/dntj48t Food security is only achievable and sustainable if the production of food is profitable. In practical terms it means that food security is driven and created by profits and profits alone – there is no other way. The prices that farmers pay for their production inputs against that the prices that they received for their products (input/output price ratio} is and will remain one of the two main driving forces behind the successful commercial production of agricultural products. It is therefore a pity that almost all the major international donors who pump billions of dollars into Africa, believe that small-scale subsistence farmers can be developed as fully fledged commercial farmers by only increasing their efficiency (“productivity”) of production to achieve sustainable food security. While increasing the efficiency of production through new technological developments is the second main driver that can improve the profitability and sustainability of food production, it is not as important as the above mentioned input/output price ratio. Efficiency plays an important role during times when the prices of inputs are rising at a faster rate than the prices of agricultural products and it is in fact the only way a deteriorating input/output price ratio can be financially survived. New technology must support and enable agricultural producers to either produce more products with the same level of inputs or produce the same quantity of products with less improved and high quality inputs. By ignoring the major thrust of the input/output price ratio is the main reason why small subsistence farmers will not develop as fully fledged commercial farmers and it is undoubtedly also the most important reason why Africa will never be in a position to produce enough food for himself. The correct application of these two drivers in combination is known as the “optimum level of production” which is the most important principle that determines the highest profitability and sustainability of commercial agricultural production as it also incorporates all the other agricultural disciplines. Why is a project for 80,000 farms being financed by the European Union and managed by the UN? Where is the government of Kenya? Third world forever. Yep. IPS is an international communication institution with a global news agency at its core, raising the voices of the South and civil society on issues of development, globalisation, human rights and the environment Copyright © 2019 IPS-Inter Press Service. All rights reserved. - Terms & Conditions | | You have the Power to Make a Difference Would you consider a $20.00 contribution today that will help to keep the IPS news wire active? Your contribution will make a huge difference.
http://www.ipsnews.net/2017/02/kenyas-potential-in-agriculture-lies-in-rural-transformation/
What is Philosophy? In the beginning of this course, this very same question was the theme to our first assignment. My summarized view was; philosophy is the study of truth by asking questions and answering them with our objective reasoning of our perceptions, thoughts, and beliefs. The metaphor I used to represent this analogy was that philosophy is like a painting. I also stated that philosophy was not as important nowadays as it once was. Are these still my view on philosophy? First of all, how would we define philosophy? I would say that the definition I gave the first time was quite good but not accurate enough. I would redefine my definition as follows: Philosophy is the study of truth and reality, with a method of asking questions and generating answers from perceptions, beliefs, thoughts, and ideas. This definition alone may be satisfying but it does not tell us what we can learn in philosophy. I assume the reason most people enroll into a philosophy class is to gain wisdom, more knowledge, and comprehend a new way of thinking rationally. With that said, the study of philosophy can be quite a broad study but, you’ll certainly gain some wisdom. This study is broad in the way that it’s not possible to specialize in all fields of its’ study. So, what are the fields/branches of philosophy? Well, historically Philosophy was divided into 3 main branches; these were: Natural philosophy, moral philosophy, and metaphysical philosophy. In fact, many modern day studies are rooted from these three branches (e.g. science, psychology, economics). So, that was back in the past, But what about now? Today, modern day philosophy is primarily composed of following branches: Aesthetics, Logic, Ethics, Epistemology, and Metaphysics. Philosophy has played a critical role in human history. It has arguably been just as fundamental and impactful as mathematics. Most of philosophy’s impact has been on individuals’ ways of thinking in societies. Influential philosophers and their ideas were the main root causes for historical events and creation of new political ideologies such as the French Revolution, Utilitarianism, Marxism, Fascism, etc. Influential Philosophers to be noted are: John Locke, Renee Descartes, Immanuel Kant, Adam Smith, and Voltaire. My favorite unit was logic. I thought this lesson was quite useful, I didn’t know what constituted a rational argument and now I do. The Logic lessons were also quite fun. In my personal opinion, Philosophy 12 was not as difficult as some in this class claim it to be. I don’t think the course material and the concepts we went over were too complex and unreasonable to understand and comprehend. But I think that’s because its’ our first year learning what philosophy even is and therefore the units weren’t gone into as deep as actual philosophers in college go into. The class discussions were quite interesting most the time, but I feel that they were constantly being dominated by the same group of people and whenever disagreements arose, a large body of people rose in opposition and their responsive arguments were emotionally structured rather than logically, this disencouraged people from participating and the class did not feel fully open to everyone. To conclude my essay, I must say that in the first week of this class I thought philosophy was a useless study in the 21st century and people who chose to major in this in university would be very limited with their career options once done with university. I’m not too sure on whether that second part of my statement is true, but I have changed opinions on the importance of philosophy in the 21st century. I think some of the branches of philosophy can be used in conjunction to several other studies and be quite contributive. For example, Ethics could be used in conjunction as a minor or second major for those pursuing political science as their career; or logic for those pursuing law with theirs. So I certainly don’t think philosophy is a useless study nowadays, but don’t think it’s as impactful on society as it used to be.
http://philosophy.talons43.ca/2016/01/26/what-is-philosophy-9/
I am a Chartered Psychologist and Chartered Scientist with the British Psychological Society (BPS), an Associate Fellow of the BPS and a Registered Practitioner Psychologist with the Health and Social Care Professionals Council (HCPC). I'm a clinical psychologist working in the NHS working within adult mental health and neurorehabilitation. Choosing to come to therapy can be a difficult and worrying decision. Please do contact me with any questions you may have and I will be happy to speak with you about how we might work together. During our first appointment, we will have opportunity to talk about what it is that is you would like support with. We can then decide together if on-going work would be helpful. There is no obligation to continue with sessions following our first meeting. I offer a comfortable and confidential consulting room, with free parking available on site. I work within the strict professional and ethical guidelines of both the HCPC and BPS and receive regular clinical supervision from a Senior Consultant Clinical Psychologist, ensuring you receive the highest standard of psychological care. As a clinical psychologist, I am trained to a high standard of expertise in a range of therapeutic models. I am happy to discuss with you any presenting difficulties you may be experiencing. In therapy, we will utilise a person centred approach, integrating a number of psychological approaches appropriate to your needs. Clinically, I draw on a theoretical background of: Cognitive Behavioural Therapy (CBT) Compassion Focussed Therapy (CFT) (Compassionate Mind Foundation Accredited) Acceptance and Commitment Therapy (ACT) Eye Movement Desensitisation and Reprocessing (EMDRworks Accredited) As part of our consultation, we will think about how to use these models to best help address the difficulties you are facing. I also offer diagnostic assessment for Autistic Spectrum Disorders (ASD) for both adults and children using the Diagnostic Interview for Social and Communication Disorders (DISCO). Please do contact me by text/ email if you would like to arrange an initial consultation. If contacting me by telephone, please leave a voice message with your full name and contact number or email so that I am able to return your enquiry. Regrettably, calls made without a message cannot be returned -BA (Hons) Combined Honours (Psychology) -Doctorate in Clinical Psychology -Postdoctoral Diploma in Adult Clinical Neuropsychology -Diploma in Neurology - (Accredited) EMDR training - (Accredited) DISCO trained - (Accredited) DBT skills trained - Advanced training in Mental Capacity Act assessment within adult mental health -Chartered Psychologist with the British Psychological Society -Associate Fellow of the British Psychological Society -Chartered Scientist -Member of the National UK Register of Therapists (MSFTR) I am experienced in working psychologically using evidence based therapy interventions with a broad range of severe and complex mental health difficulties. I also have experience in providing structured cognitive and neuropsychological assessment for adults and young people (16+). Academically, I am an Associate Lecturer in Psychology at the University of Northampton providing teaching to undergraduate and post graduate psychology and counselling students. I offer clinical supervision to students, assistant psychologists, clinical psychology trainees and newly qualified clinical psychologists. I also offer supervision to speciality doctors in psychiatry in psychotherapy cases. As well as my regular clinical supervision from a senior consultant clinical psychologist, I also receive regular specialist and accredited supervision for EMDR and specialist Neuropsychology supervision ensuring you receive the highest quality of psychological care throughout your therapy journey. Member organisations Individual therapy, self funding clients: £90 per session (55 mins) EMDR (60 minute session): £90 Online counselling: £75 (please enquire regarding format of online counselling) Clinical supervision: £60 (1 hour)/ £80 (90 minutes) Cognitive/ neuropsychological Assessment: £100 per hour Assessment for Autistic spectrum disorder: £100 per hour Clients wishing to fund sessions through their health insurer, please ensure this has been agreed prior to therapy starting. Insurance companies will be invoiced accordingly. Please make yourself aware if you are required by your insurer to pay an excess on your policy. This is payable at the first session I am currently registered with: AXA PPP, AVIVA, Pru Healthcare, Nuffield Health, WPA, Cigna Healthcare and Vitality |Online counselling:||Yes| |Telephone counselling:||No| |Face to face counselling:||Yes| |Sign language:||No| |Other languages:||None| Afternoons and some evening availability |Young people| |Adults| |Older adults| |Groups| |Organisations| |Employee Assistance Programme| I have completed BPS accredited supervisor training at the University of Hertfordshire and provide clinical supervision to clinical psychology doctorate trainees, assistant psychologists, psychology students (undergraduate and post graduate), counsellors, trainee counsellors & speciality doctors (psychiatry).
https://www.counselling-directory.org.uk/counsellors/emily-callan
I am a cardiologist at Memorial Cardiac and Vascular Institute. I treat patients with arrhythmia, coronary artery disease, valvular disease, peripheral arterial disease, cardiomyopathy, heart failure, hypertension, dyslipidemia and other cardiac concerns. I am also a Registered Physician in Vascular Imaging (RPVI), and am board certified in internal medicine, cardiovascular disease, echocardiography, nuclear cardiology, vascular imaging, and interventional cardiology. I chose to pursue a career in medicine because it is intellectually challenging and constantly evolving. I chose cardiology in particular because the heart involves complex physiology that can affect every other organ in the body. I love being able to integrate clinical history and imaging to diagnose and treat various cardiac problems and help improve people's quality of life. I approach cardiology as not just treatment of the heart and vascular system, but treating a patient as a whole. I believe it is important for patients to fully understand their conditions and know about their treatments and why those treatments are the best for their particular situation. Patient involvement is key to ensuring the best outcomes.
https://www.mhs.net/physicians/p/patel-ruchi-c
Q: Describe the region where $f_n(x) = nx(1-x^2)^n$ uniformly converges $f_n(x) = nx(1-x^2)^n$ Describe the region where $f_n(x)$ uniformly converges Try Note : $f_n(x)$ converges pointwise on $(-\sqrt{2}, \sqrt{2})$. I could only prove that, for any interval $I \subset (-\sqrt{2}, \sqrt{2})$, $f_n(x)$ fails to uniformly converge if $\exists \epsilon >0$ such that $(-\epsilon, 0) \subset I$ or $(o,\epsilon) \subset I$. Assume $\exists \epsilon >0$ such that $(-\epsilon, 0) \subset I$ or $(o,\epsilon) \subset I$. Then $\exists n\in\mathbb{N}$ s.t. $|f_n(x)|$ has its maximum on $x_0=1/\sqrt{2n+1} \in I$ or $x_0=-1/\sqrt{2n+1} \in I$, and $$ \begin{align} \sup_I |f_n(x)| = |f_n(x_0)| &= \frac{n}{\sqrt{2n+1}} \left( 1 - \frac{1}{2n+1}\right)^n\\ &> \frac{n}{\sqrt{2n+1}}e^{-1/2} \end{align} $$ However, this claim does not "find" the region where $f_n(x)$ uniformly converges. The claim does not prove, e.g., $f_n(x) $ uniformly converges on nowhere. Is there anyone to help me find the region where $f_n(x)$ uniformly converges? A: I claim that $U\subseteq \Bbb R$ is a set such that the sequence $(f_n)$ is uniformly convergent (to $0$) on $U$ if and only if there exist $\epsilon$ such that $0<\epsilon<\frac{1}{\sqrt{2}}$ and sets $V\subset [-\sqrt 2+\epsilon,-\epsilon]$ and $W\subset [\epsilon,\sqrt 2-\epsilon]$ such that $U\setminus\{0\}=V\cup W$. First, as you noticed, the sequence $\big(f_n(x)\big)$ converges if and only if $x\in (-\sqrt2,\sqrt2)$ (and the limit is $0$). So, if $(f_n)$ uniformly converges on $U$, then $U\subseteq (-\sqrt2,\sqrt2)$. Let $V=U\cap (-\sqrt2,0)$ and $W=U\cap(0,\sqrt{2})$. If $0$ is an accumulation point of $W$, then there exists a sequence $(t_1,t_2,\ldots)$ in $W$ with $\frac1{\sqrt3}\geq t_1>t_2>\ldots$ such that $\lim_{k\to\infty} t_k=0$. For each $k$, suppose that $$\frac{1}{\sqrt{2n_k+3}}< t_k\leq \frac{1}{\sqrt{2n_k+1}}$$ for some positive integer $n_k$. Then, $$f_{n_k}(t_k)\geq f_{n_k}\left(\frac{1}{\sqrt{2n_k+3}}\right)=\frac{n_k}{\sqrt{2n_k+3}}\left(1-\frac{1}{2n_k+3}\right)^{n_k}>\frac{n_k}{\sqrt{e(2n_k+3)}}.$$ That is, $$f_{n_k}(t_k)\geq \sqrt{\frac{n_k}{5e}}.$$ This means $f_n$ does not converge uniformly to $0$ on $W$. This is a contradiction, so $0$ is not an accumulation point of $W$. Similarly, $0$ is not an accumulation point of $V$. If $\sqrt2$ is an accumulation point of $W$, then there exists a sequence $(t_1,t_2,\ldots)$ in $W$ with $\sqrt2-\frac{1}{3}\leq t_1<t_2<\ldots$ such that $\lim_{k\to\infty} t_k=\sqrt2$. Let $n_k\geq 3$ be an integer such that $$\frac1{n_k+1}<\sqrt2-t_k\leq \frac1{n_k}.$$ Then, $$\left\vert f_{n_k}(t_k)\right\vert\geq \Biggl\vert f_{n_k}\left(\sqrt{2}-\frac1{n_k}\right)\Biggr\vert=n_k\left(\sqrt{2}-\frac{1}{n_k}\right)\left(1-\frac{2\sqrt{2}}{n_k}+\frac{1}{n_k^2}\right)^{n_k}.$$ That is, $$f_{n_k}(t_k)\geq n_k\left(\sqrt{2}-\frac13\right)\left(\frac{8-6\sqrt{2}}{9}\right)^3.$$ This means that $f_n$ does not converge uniformly to $0$ on $W$. This is a contradiction, so $\sqrt{2}$ is not an accumulation point of $W$. Similarly, $-\sqrt2$ is not an accumulation point of $V$. One direction of the claim is now proved. Conversely, suppose that $U$ satisfies the condition that there exist $\epsilon$ such that $0<\epsilon<\frac{1}{\sqrt{2}}$ and sets $V\subset [-\sqrt 2+\epsilon,-\epsilon]$ and $W\subset [\epsilon,\sqrt 2-\epsilon]$ such that $U\setminus\{0\}=V\cup W$. Then, there exists a compact set $K\subseteq [-\sqrt2+\epsilon,-\epsilon]\cup\{0\}\cup [\epsilon,\sqrt2-\epsilon]$ that contains $U$. It suffices to prove that $(f_n)$ converges uniformly to $0$ on $K$. Fix $\delta>0$. Clearly, $f_n(0)=0$ for every $n$, so the point $0$ is not a concern. For $x\in K$ such that $|x|> 1$ (that is we assume that $\epsilon< \sqrt2-1$), we have $$\big|f_n(x)\big|\leq n(\sqrt 2-\epsilon)\big((\sqrt2-\epsilon)^2-1\big)^n=n(\sqrt2-\epsilon)(1-2\sqrt2\epsilon+\epsilon^2)^n.$$ As $1-2\sqrt2\epsilon+\epsilon^2<1$ and exponential decays beat polynomial decays, we have $n(\sqrt2-\epsilon)(1-2\sqrt2\epsilon+\epsilon^2)^n\to 0$. Let $N_1$ be a positive integer such that $$\big|f_n(x)\big|=n(\sqrt2-\epsilon)(1-2\sqrt2\epsilon+\epsilon^2)^n<\delta$$ for all $n\geq N_1$. In the case that $\epsilon\geq \sqrt{2}-1$. we can set $N_1$ to be $1$. Suppose now that $x\in K$ satisfies $\epsilon\leq |x|\leq 1$. Let $N$ be so large a positive integer that $$\frac{1}{\sqrt{2N+1}}<\epsilon.$$ Then, for $n\geq N$, we have $$\big|f_n(x)\big|\geq f_n(\epsilon)=n\epsilon(1-\epsilon^2)^n.$$ As before, there exists a positive integer $N_2\geq N$ such that $$\big|f_n(x)\big|\geq n\epsilon(1-\epsilon^2)^n<\delta$$ for all $n\geq N_2$. Set $M$ to be the maximum among $N_1$ and $N_2$. Then, $$\big|f_n(x)-0\big|=\big|f_n(x)\big|<\delta$$ for every $n\geq M$ and $x\in K$. Therefore, $(f_n)$ converges to $0$ uniformly on $K$.
Teachers & Staff The exemplary faculty at our school fosters leadership qualities and they are skilled in development, promoting critical thinking and self-reflection in a caring and stimulating environment. The exemplary faculty at our school are trained to supervise the implementation of the various programmes that come under the curriculum, with a determination to serving the needs of the students and parents in the school community. Our school provide significant learning opportunities for our staff through our emphasis on professional learning, and encourage them to attend workshops and conferences off-site as well as providing numerous opportunities for teacher facilitated learning on campus.
https://msis.com.sa/academics/teachers-stuff/
The questions concerning modern-day Egypt and its history from 7th century AD to present. For questions about ancient Egypt, use [tag:ancient-egypt] instead. The deployment, martialing and maneuver of low-level units to achieve military advantage. The 15th century began on January 1, 1401, and ended on December 31, 1500. the span of time of before written history. It often refers to the period of human existence, but in broader terms also includes all time preceding this. The 16th century was the century which lasted from January 1, 1501 to December 31, 1600 in the Gregorian calendar. a head of republican state. The term can also refer to leader of organization, institution or community. The religious texts of Israeli origin, considered in whole by Christianity and in part (the Old Testament) by Judaism as holy. Questions about the transition to new manufacturing processes and technologies that occurred in the late eighteenth and early nineteenth centuries. For questions about characteristics of a population. The Early Medieval Period of European history lasted from the 5th century to the 10th century. A document or documents which set the fundamental principles and rules to which a state, or organisation agrees to govern itself. A continent, east of Europe and Africa, separated from Europe by the Ural Mountains in the North, and the Straits of Dardanelles in the south, and separated from Africa by the Suez Canal. For questions about Joseph Stalin, the leader of the U.S.S.R. from 1922 to 1952 and a leading figure in the Bolshevik Revolution. The Holy Roman Empire existed from 962 to 1806 on the territory of present-day Germany and a number of its neighboring countries. Questions about the history of nuclear weapons. Questions about the German empire from 18 January 1871, to 1918. Questions about Napoleon Bonaparte (AKA Napoleon I), Emperor of the French May 18, 1804 – April 11, 1814 and March 20, 1815 – June 22, 1815. moving and fighting on horseback. In some areas other animals were used, like camels in Arabia. The modern cavalry units are equipped in helicopters.
https://history.stackexchange.com/tags?page=4&tab=popular
Published at 6:56 pm, June 3, 2020 IDAHO FALLS — The number of confirmed and probable COVID-19 cases is creeping up again, both statewide and in eastern Idaho. Across the state During the past week, the Idaho Department of Health and Welfare reports an increase from 2,731 cases on Wednesday, May 27, to 2,990 on Wednesday, June 3. Of those positive cases, about 77 percent have now lived at least 30 days since initial infection and are presumed recovered. The vast majority of infected individuals will recover from COVID-19 at home. Only 253 people in the entire state have required hospitalization. IDHW also reports 83 deaths have now been tied to COVID-19. Of that number, a test confirmed 63, and 20 are considered probable. A case is considered probable if a person has not been tested, or a test is pending, and the person has all the symptoms of COVID-19, have come into direct contact with an infected person and developed symptoms within the expected timeframe. In eastern Idaho Since mid-March, the number of confirmed COVID-19 cases in eastern Idaho has remained fairly low, but now it appears to be picking up. This week, the number of confirmed or probable cases jumped from 109 to 172, according to Eastern Idaho Public Health and the Southeast Idaho Public Health District. Of that number, 72 individuals are still symptomatic and are being monitored by the district. That’s up from 13 from last week. About 100 eastern Idahoans have now recovered from the coronavirus, according to both health districts. Testing and precautions The number of COVID-19 tests available in the Gem State continues to grow. However, public health officials warn that due to initial testing limitations, the actual number of coronavirus cases may be higher than what is being reported. After weeks of being shut down, the state is reopening more each week. For more information about Gov. Brad Little’s plans to reopen the state, visit Idaho Rebounds. Wearing a fabric face covering or mask when in public settings where other social distancing measures are difficult to maintain. Covering your coughs and sneezes with a tissue or our sleeve. Avoiding touching your eyes, nose and mouth with unwashed hands. Cleaning and disinfecting frequently touched objects and surfaces. Washing hands often with soap and water for at least 20 seconds or using hand sanitizer. Limiting close contact with people who are sick. Since restrictions on gatherings have loosened, EIPH says most new COVID-19 cases are linked to gatherings where people attended while ill and social distancing was not followed. “We understand that social connections are vitally important to people, but we also want people to take precautions when interacting with others to minimize the opportunities for COVID-19 to be spread,” EIPH Director Geri Rackow said in a news release. Health officials say to contact them if someones been exposed to COVID-19 or exposure has occurred at your business, organization, event, etc. EIPH can be reached at its COVID-19 hotline at (208) 522-0310. SIPH’s hotline is reached at (208) 234-5875.
A-List uses a sophisticated Learning Management System (“LMS,” or “VLE”), to facilitate all of our school courses and programmes. With this tool, we integrate and simplify all of our teaching resources by uniting assessments, textbooks, and homework in one learning space. Our online textbooks, hosted on Bibliu, allows our tutors to create seamless transitions from lessons to homework assignments. This system helps keep students engaged and reduces time spent juggling multiple learning tools. In addition, the platform’s course analytics and communication tools ensure that pupils, teachers, and parents are kept up to date on assignments, results, and programme updates throughout the course. We are able to provide these resources to schools who are looking to run their own SAT/ACT courses and advising programmes.
https://www.alisteducation.co.uk/proprietary-materials-tech/
CROSS-REFERENCE TO RELATED APPLICATIONS STATEMENT REGARDING FEDERALLY SPONSORED RESEARCH OR DEVELOPMENT REFERENCE TO SEQUENCE LISTING, A TABLE, OR A COMPUTER PROGRAM LISTING COMPACT DISK APPENDIX BACKGROUND OF THE INVENTION SUMMARY OF THE INVENTION DETAILED DESCRIPTION OF THE INVENTION U.S. Pat. No. 4,696,315 A 9/1987 Summers U.S. Pat. No.4,813,438 A 3/1989 Fleming U.S. Pat. No.4,817,640 A 4/1989 Summers U.S. Pat. No.4,887,620 A 12/1989 Summers U.S. Pat. No.4,969,477 A 11/1990 Yagisawa U.S. Pat. No.5,417,229 A 5/1995 Summers U.S. Pat. No.7,913,700 A 3/2011 Calandro US 2012/0042888 A1 11/2011 May US 2012/0031415 A1 2/2012 Essen Not Applicable Not Applicable 1. Field of the Invention The present invention is in the field of tobacco substitutes. Particularly, the present invention is in the technical field of compositions for smokeless tobacco substitutes and methods of producing such substitutes thereof. More particularly, this invention relates to herbal tobacco compositions intended for personal use as moist snuff. 2. Description of the Prior Art Tobacco can be consumed in a variety of ways. Most commonly, tobacco is either smoked or “dipped”. Its dipped form is known as moist snuff. Moist snuff is not consumed, but rather held in the oral cavity by placing a pinch of moist snuff between one's lower lips and gums. It is held in the oral cavity for extended periods of time typically ranging from several minutes to upwards of an hour. The consumer dips moist snuff primarily for its organoleptic qualities, such as its sweet tobacco flavor, its spicy “bite” or burning sensation, and for its dizzying, light-headed effect, a direct result of its high nicotine content. Nicotine is a proven addiction-forming chemical, and according to a New York Times article the concentration of nicotine in moist snuff is 1.5 to 2.5 percent greater than that of cigarettes. In addition, diseases, such as cancer may be caused by dipping moist snuff tobacco in the oral cavity. Thus, there has been an increase in attention by the medical profession, the public, and government directed against moist snuff tobacco. In light of the foregoing, there is a need for herbal moist snuff substitutes intended for personal use as moist snuff. Such herbal moist snuff products may be offered as a healthy alternative to moist snuff tobacco products, especially for those who currently use smokeless moist snuff tobacco products. As a result of numerous cancer-causing chemicals, including nicotine, found in moist snuff tobacco products, several moist snuff tobacco substitutes in the form of herbal compositions have been developed. Herbal moist snuff is produced from two primary components—an herbal component and a liquid casing component. The herbal component consists of a singular shredded plant, such as red clover, alfalfa leaves, kudzu, etc. Optimally, the herbal component will satisfy one of the four organoleptic qualities—texture. It is each prior art's herbal component that most differentiates one art from another. To fulfill the remaining organoleptic qualities—appearance, aroma, and flavor—of a fine moist snuff tobacco, the herbal component is made moist by the addition of the liquid casing component. Few such moist snuff substitutes have been created and even fewer have been issued United States patents. Many prior art compositions stress the importance of their art's “organoleptic” qualities, or those qualities that most closely resemble some or all of the perceived four organoleptic qualities of a moist snuff tobacco. These four qualities consist of appearance, aroma, flavor, and texture. Visually, due to the dark brown hue of the tobacco leaf, a finely shredded moist snuff tobacco product will be dark brown in color; it will carry the sweet aroma of the tobacco leaf; it will provide a slight burning sensation in addition to its sweet tobacco flavor; and its texture will be soft, moist, and slightly spongy. These are the four organoleptic qualities accomplished by or sought after by all prior art. However, it is the current art's intent to bring an overlooked fifth organoleptic quality to the forefront—an organoleptic quality not accomplished in all prior art. This organoleptic quality is “cud consistency”. Cud consistency is identified by how well the moist snuff tobacco remains intact as a singular entity in the oral cavity. A good cud consistency is malleable, is not dissolvable by the oral cavity's salivatory response, and it can easily be moved as a single entity into, around, and out of the oral cavity. The present art's essential herbal ingredient, citrus rind and pith—hereto referred to as citrus fiber—accomplishes this feat where all other prior art fails. The following is a list of all prior art and their composition's respective shortcoming as compared to the organoleptic qualities of the present art's composition. U.S. Pat. No. 7,913,700 March 2011; Calandro. This invention is intended for the use as an herbal moist snuff dipped in one's oral cavity. The essential herbal ingredient of this invention is corn silk. Corn silk is the hair-like fibrous strands found between the husk and kernels of a head of corn. As described in this art, corn silk has a “light texture, smooth mouth feel, uniform appearance, and a smell and taste that is nonexistent.” In essence, this invention satisfies four of the five organoleptic qualities of a fine herbal moist snuff tobacco. However, no cud consistency is formed, rather the herbal moist snuff becomes scattered, easily dispersed throughout the oral cavity. Also, according to David L. Hoffman, Director of the California School of Herbal Studies, corn silk as a demulcent has known adverse health risks associated with it, such as decreased potassium levels in the blood, skin rashes, allergies, as well as decreased blood sugar resulting in complications with persons suffering from diabetes. Therefore, all persons suffering from the adverse effects of diabetes whom are also moist snuff consumers in search of an herbal moist snuff substitute may wish to seek out a more compatible herbal moist snuff. U.S. Pat. No. 7,913,700 also offers a unique component in its liquid casing, which greatly distinguishes itself from all other prior art in the field of herbal moist snuff. This invention allows for the presence of nicotine in a variation of its primary invention. The presence of nicotine allows this invention to compete in the nicotine-laden genuine moist snuff tobacco marketplace as well as the herbal moist snuff marketplace, however, this dual approach both increases and decreases this invention's appeal. On the one hand, the presence of nicotine increases desire among moist snuff tobacco consumers whom have been unsuccessful at quitting nicotine products, and on the other hand, the presence of nicotine defeats the purpose of a chemical-free composition, thus, a true 100 percent herbal composition is not realized. The following is an excerpt from U.S. Pat. No. 7,913,700 referencing this invention's inclusion of nicotine: “It is likely that the primary users of nontobacco (read: herbal) moist snuff compositions according to the present invention will be current users of tobacco-based moist snuff compositions. As such, it is likely that many users of nontobacco moist snuff compositions according to the present invention will have an addiction to nicotine. Therefore, nicotine may be included in the casing component to provide a nontobacco moist snuff composition with a desirable amount of nicotine without appreciable effects. When present, it is preferable that nicotine be included as a liquid in the casing component in an amount ranging from about 0.01% to about 0.10% by weight of the total composition.” In other words, this invention provides the consumer with either a non-nicotine or nicotine product, with the nicotine present ranging in an amount between 0.01 to 0.10 percent total weight of the composition. What this invention fails to provide is an intermediary product, which the present art fulfills with its nicotine cessation program. The present art is the first art in the field of moist snuff compositions to offer the consumer a nicotine cessation program. The nicotine cessation program will provide the consumer with a variety of personally tailored nicotine cessation plans. Such plans range anywhere from four to sixteen weeks duration, in which every two to three weeks the nicotine content found in the present art will diminish by 25 to 50 percent total weight of the composition. By the final week of the plan, the nicotine content will be omitted altogether from the art. The nicotine cessation program offered by the present art is the first and only program of its kind in which the nicotine addicted consumer has the opportunity to gradually diminish his or her nicotine consumption over an extended period of time, thus, eliminating one's need to quit “cold turkey”—an option not provided in any other art in the field of herbal moist snuff. For further detail of this plan, please see the “Summary of the Invention” section of the present art. U.S. Pat. No. 4,696,315, U.S. Pat. No. 4,817,640, U.S. Pat. No. 4,887,620; September 1987, April 1989, December 1989, respectively; Summers. The main ingredient, also the only herbal ingredient, of the invention is the red clover blossom. Most commonly used in tea products due to its sweet flavor, red clover also produces a vegetal flavor, which taints the sweeter taste of genuine tobacco. Furthermore, red clover, due to its harvesting method, consists of undesirable stalks and seeds, which do not absorb the dark tobacco-like coloring of a good herbal snuff substitute. And, due to the small size of the blossoms, as compared to the stalks and seeds, it is inevitable that the mixture of pulverized red clover blossoms will include an undesired amount of red clover stalks and seeds. This lack of a uniform mixture of red clover has several adverse effects, especially to texture and appearance. Specifically, the stalks and seeds are harder, drier, sharper, and lighter in color as compared to the pulverized blossoms. U.S. Pat. No. 5,417,229 May 1995; Summers. This is an invention related to herbal moist snuff and chew compositions containing the principal herbal component alfalfa leaves. The alfalfa plant is ubiquitous throughout the world and is commonly used as forage for cattle. Commercially, it is harvested as hay. Superficially, this species of plant is identical to the red clover—clusters of small purple flowers followed by fruits containing 10-20 seeds—thus, identical shortcomings of above prior art U.S. Pat. Nos. 4,696,315, 4,817,640, and 4,887,620 are discovered. US 2012/0031415 A1 (Patent Publication) February 2012; Essen. This invention relates to an herbal moist snuff composition for oral use with high dietary fiber content. The scope of this invention is simply too large to fully understand the entirety of its shortcoming. The main ingredient of this invention is “plant fibers”, which, as further described, can consist of maize fibers, oat fibers, tomato fibers, barley fibers, rye fibers, sugar beet fibers, cocoa fibers, bamboo fibers, citrus fibers, or a “combination thereof”. The scope of this invention needs to be more self-contained as such a multitude of “plant fiber” combinations will create far-ranging products and bi-products alike, from one plant species to another. pueraria. FIG. 5 FIG. 5 US 2012/0042888 A1 (Patent Publication) November 2011; May. This is an herbal moist snuff intended for one's oral cavity made in part by the essential herbal component kudzu from the plant genus Unlike a genuine moist snuff tobacco, this invention scatters and disperses throughout one's oral cavity. No cud consistency is formed. The invention becomes messy and sloppy, not easily moved into, around, or out of one's oral cavity, such as a moist snuff tobacco will allow. This may be due to the high glycerin content. Glycerin is a known humectant, meaning it absorbs and withholds moisture content. Referencing the table in , one will notice the high glycerin content found in this invention. In no other invention found in is more than 26.5 percent by total weight of the composition glycerin. In patent publication US 2012/0042888 almost twice this amount is used. 46.4 percent by total weight of the composition in US 2012/0042888 is glycerin. The ubiquitous amount of glycerin in this invention creates too great a moisture content; thus, the invention fails to adhere to itself once placed in one's oral cavity. U.S. Pat. No. 4,969,477 November 1990; Yagisawa. This invention is intended for use as a smoking material composed of the essential herb pineapple fiber. The pineapple pulp is extracted from the fruit, rolled, cut, flavored, and dried. Whereas the present art is made moist and dipped in one's oral cavity, U.S. Pat. No. 4,969,477 is dried and smoked, therefore, these two inventions not only differentiate by their essential herbal component, but also by their intended use. U.S. Pat. No. 4,813,438 March 1989; Fleming. Again, as stated above in prior art U.S. Pat. No. 4,969,477, this invention is intended for use as a smoking composition. It is composed of the essential herbs bran, soybean, and mesquite fibers. These fibers are treated in a sodium chloride and glycerol solution. The components are eventually dried for use as a smoking agent, thus, when compared to the present art, the two inventions differentiate between an art intended as a moist snuff tobacco substitute versus an invention intended as a dry herbal smoking tobacco substitute. Although the various essential or primary components in these herbal moist snuff tobacco and herbal dry tobacco products have made some impact on the use of less harmful components found in tobacco products, such alternatives are still void of one, some, or all of the five organoleptic qualities of a fine moist snuff tobacco, thereby acting as only a safer product and not as a desirable and satisfying alternative to tobacco, or more particularly to a moist snuff tobacco. Thus, there is a need in the art for a product that can more closely resemble moist snuff tobacco without carrying with it the harmful components of a moist snuff tobacco while simultaneously satisfying the five organoleptic qualities of a fine moist snuff tobacco alternative. The present invention is an herbal snuff tobacco that is made moist and “dipped” in one's oral cavity, and it is used as a safe alternative to moist snuff tobacco. In the present invention, compositions and methods have been provided for a safe herbal moist snuff product including a dry herbal component encased within a liquid material and processed to a texture which is non-injurious to the surface of one's oral cavity unlike moist snuff tobacco. The herbal component, when combined with the liquid casing, produces all the desired organoleptic qualities of a superior herbal moist snuff product. Although several different ingredients, such as kudzu, alfalfa leaves, red clover, and corn silk have been used as the primary ingredients in herbal moist snuff tobacco substitute products, none have yet disclosed or recognized the herbal component of the citrus fruit as a feasible alternative to tobacco leaves. The use of citrus fibers results in a superior herbal moist snuff that most closely mimics the five organoleptic qualities of moist snuff tobacco without producing the harmful chemicals and components of a moist snuff tobacco. Citrus fiber, when dried, and voided of all its organoleptic qualities, such as aroma, appearance, and flavor, can easily absorb the desired organoleptic qualities of the present invention's liquid casing as well as provide the desired organoleptic quality of cud consistency in one's oral cavity. The result is a healthy, safe alternative to moist snuff tobacco. In one exemplary embodiment, the present invention is a composition for use as a moist snuff tobacco substitute. The composition includes citrus fiber as the essential herbal component as well as a liquid binder to create cohesion in the final product. The composition includes 20 percent by total weight of the present invention citrus fiber (to include the rind and pith) as the base herb; also included is 48 percent by total weight distilled water, 18.4 percent by total weight caramel color, 4 percent by total weight glycerin, 3 percent by total weight sodium chloride, 2.4 percent by total weight flavoring propylene glycol, 1.6 percent by total weight cayenne pepper, 1.6 percent by total weight caffeine anhydrous, and 1 percent by total weight sodium bicarbonate all representing the liquid component. In another exemplary embodiment, the present invention is a method for producing a moist snuff tobacco substitute. The method includes providing the herbal component including citrus fiber as well as adding the liquid casing void of caffeine anhydrous to create cohesion. In other words, a non-caffeinated version of the present invention is created. In yet another exemplary embodiment, the present invention is a method for producing a moist snuff tobacco substitute. The method includes providing the herbal component including citrus fiber as well as adding the liquid casing—whereas caffeine anhydrous is excluded and in its place liquid nicotine is included—to create cohesion. Nicotine added to the present invention will be the first and only of its kind, when compared to all prior art related to the field of a moist snuff tobacco alternative, in such that nicotine is included in the present art as a nicotine cessation program. The nicotine cessation program will provide the consumer with a variety of personally tailored nicotine cessation plans. Such plans range anywhere from four to sixteen weeks duration, in which every two to three weeks the nicotine content found in the present art will diminish by 25 to 50 percent total weight of the composition. For example, in one such plan—the 12-week plan—the plan will begin with a nicotine content similar to that found in leading moist snuff products on the market today. The nicotine content in these products ranges between 0.01 percent to 0.10 percent total weight of the composition. This nicotine amount will only be available in weeks one and two of the present art. The following three Weeks—weeks three, four, and five—will provide a nicotine content ranging between 0.005 percent to 0.05 percent total weight of the composition, a 50 percent reduction from weeks one and two. The nicotine content in weeks six, seven, and eight will then be reduced an additional 50 percent from the previous three weeks (0.005 percent to 0.05 percent total weight of the composition to 0.00125 percent to 0.0125 percent total weight of the composition). Weeks nine, ten, and eleven will see yet another 50 percent decrease in nicotine content, again, from the previous three weeks so that the nicotine content present ranges from 0.00001 percent to 0.01 percent total weight of the composition. Finally, in week twelve, the nicotine content will be at 0 percent total weight of the composition. In essence, from one nicotine content level to the next, 50 percent nicotine by total weight of the composition will be reduced. Note: In order to obtain this nicotine fluctuation, the nicotine component will have an inverse relationship with the distilled water component. Where the nicotine component is added, the distilled water component is subtracted, and vise versa. Each individual consumer will also be allowed to tailor his or her plan according to their comfort level, meaning longer or shorter plans as well as higher or lesser nicotine content in the present art. However, the consumer will not be given the opportunity to have a nicotine content greater than that of 30 mg (the highest amount of nicotine offered in genuine moist snuff tobacco), nor will the consumer be given the opportunity to undertake the nicotine cessation program for any longer than two sixteen week plans in a calendar year. Unlike prior art U.S. Pat. No. 7,913,700, and genuine moist snuff tobacco products on the market today, it is not the intent of the present art to provide the consumer with unlimited nicotine, but rather to assist the consumer in defeating his or her nicotine addiction by slowly and gradually weaning him or her off the harmful chemical. The nicotine cessation program offered by the present art is the first and only program of its kind in which the nicotine addicted consumer has the opportunity to gradually diminish his or her nicotine consumption over an extended period of time, thus, eliminating one's need to quit “cold turkey”—an option not provided in any other art in the field of herbal moist snuff. For better understanding of the present invention, reference is made to the following description and tables, the scope of which is pointed out in the claims. FIG. 1 FIG. 2 Referring now to the present invention in more detail, and are tables that represent the components of the present invention by each component's total weight of the present invention. FIG. 1 FIG. 2 is the primary version of the present invention, in which the invention can be marketed as an energy supplement in addition as a moist snuff tobacco substitute. omits the component caffeine anhydrous. This variation of the invention is intended for those individuals that do not desire the effects of a caffeinated product, which may include light-headedness or a “buzzed” feeling, and adrenaline rush among other effects. FIG. 1 FIG. 1 is a list of the components that create the present invention of an herbal moist snuff. The ingredients are listed in order by total weight, whereas distilled water is 48 percent total weight of the present invention, citrus fiber is 20 percent total weight, caramel color is 18.4 percent total weight, glycerin is 4 percent total weight, sodium chloride is 3 percent total weight, propylene glycol is 2.4 percent total weight, cayenne pepper is 1.6 percent total weight, caffeine anhydrous is 1.6 percent total weight, and lastly, sodium bicarbonate is 1 percent total weight of the present invention. also shows whether or not the listed component is an herbal or liquid component by denoting an “X” in the coordinating column. FIG. 1 Referring again to , it is important to understand how the components are included in the present invention. The method, or process in which these components are combined, is significant so that the present invention maintains its consistency among the five previously stated organoleptic qualities of a fine herbal moist snuff, which includes appearance, texture, aroma, flavor, and cud consistency. In order to accomplish this a detailed process is as follows. A. The Herbal Component 1. Gather citrus fruits. Citrus fruits can range from lemons and limes to oranges and grapefruit, or any hybrid of the citrus variety. It is each fruit's outer fibrous material—the rind and pith—that create the present invention's herbal component. 2. Shred the citrus fruit using a commercial-grade zesting tool, such as a Zipzester, which allows its user to zest, or shred, many citrus fruits quickly and effectively. The resulting shred is spongy, fresh, and fibrous. It is this shredded citrus fiber that is the essential herbal component of the present invention. This is where the present invention differentiates the most from all other prior art. Ultimately, the sponge-like fibrous material of the citrus fiber allows the present invention to remain intact in one's oral cavity. As stated in prior art U.S. Pat. Nos. 7,913,700 and 4,696,315, 4,817,640, 5,417,229, and 4,887,620 it is the difference of each art's “essential” ingredient, such as corn silk, red clover, and alfalfa leaves, respectively. These three essential ingredients fail to allow a cud-like entity to form in one's oral cavity. The shredded citrus fiber in the present invention is absolute essential in this respect. 3. Boil shredded citrus fiber for a minimum of 15 minutes. This releases the citrus aroma and flavor from the citrus fiber as these are not organoleptic qualities desired in the present invention. Repeat Step 3 to eliminate any remaining citrus aroma and flavor. 4. Collect the boiled citrus fiber and place in a food dehydrator. Dehydrate the citrus fiber at 155 degrees. Remove the citrus fiber at the 5 hour mark. The shredded, boiled, and dehydrated citrus fiber will now be void of all moisture. The moisture content of the citrus fiber will be at 0 percent and ready to combine with the liquid casing. B. The Liquid Casing 1. Begin the liquid casing by adding 48 percent total weight of distilled water. Distilled water is the essential component of the liquid casing as it represents almost half of the present invention. Furthermore, the use of distilled water over other liquid sources is to limit the number of impurities that can lead to spoilage in the present invention. Fewer impurities found in the present invention will lead to a longer shelf life and an altogether fresher, healthier product for the consumer. Distilled water, when mixed with the following components, will return necessary moisture back to the dehydrated citrus fiber. The present invention should have a moisture content to that of a genuine snuff tobacco, which has a pH of 7.5. 2. Add 18.4 percent total weight dark brown caramel color to the distilled water. Caramel color is one of the oldest and most widely used food colorings and is found in many commercially produced foods, including beer, bread, chocolate, custards, potato chips, gravy, ice cream, soft drinks, etc. Caramel color is widely considered a safe, effective food ingredient worldwide. In the present invention, the caramel color is important for maintaining a visual appearance to that of a genuine snuff tobacco—a dark brown color. 3. Add 4 percent total weight glycerin to the distilled water and caramel color. In food and beverages glycerin serves as a humectant and solvent, and is considered a preservative. Glycerin has also been used as a filler in low-fat foods as well as a thickening agent in liqueurs. For the present invention glycerin is used as a humectant and preservative to maintain moisture and create a longer shelf life of the present invention. 4. Add 3 percent total weight sodium chloride to the distilled water, caramel color, and glycerin. Sodium chloride is important to the present invention as it serves as yet another food preservative, which dramatically extends the shelf life of the present invention. In addition to this, sodium chloride also serves as a trigger to the oral cavity's salivatory response. As a genuine moist snuff tobacco produces an excess of saliva in one's oral cavity, the use of sodium chloride in this respect is highly desired in the present invention. 5. Add 2.4 percent total weight propylene glycol to the distilled water, caramel color, glycerin, and sodium chloride. Propylene glycol is a clear, colorless, hygroscopic liquid used as a humectant, solvent, flavor carrier, and preservative in food and tobacco products. Here, propylene glycol is not only used as a solvent and preservative, but most importantly it is used to mimic the flavor of a genuine snuff tobacco. Such propylene glycol flavorings can include sweet tobacco, wintergreen, peppermint, apple, berry, peach, cherry, grape, cinnamon, rum, whiskey, etc. The propylene glycol not only provides flavoring to the present invention, but it also provides the essential aroma desired. 6. Add 1.6 percent total weight cayenne pepper to the distilled water, caramel color, glycerin, sodium chloride, and propylene glycol. Cayenne pepper in the liquid casing component will provide a satisfying approximation of the “bite” found in a genuine moist snuff tobacco composition. 7. Add 1.6 percent total weight caffeine anhydrous to the distilled water, caramel color, glycerin, sodium chloride, propylene glycol, and cayenne pepper. Caffeine anhydrous is added to the present invention in order for the present invention to mimic the dizzying feeling one gets from the nicotine content of a genuine moist snuff tobacco composition. The addition of caffeine anhydrous also allows the present invention to be more marketable. With a large market for energy supplements, such as drinks, capsules, and foods, the addition of caffeine anhydrous will allow the present invention to compete in such a marketplace. 8. Add 1 percent total weight sodium bicarbonate to the distilled water, caramel color, glycerin, sodium chloride, propylene glycol, cayenne pepper, and caffeine anhydrous. Sodium bicarbonate is another food preservative that extends the shelf life of the present invention. Sodium bicarbonate also serves as a filler or place holder for non-caffeinated version of the present invention. Note: As a specified amount of caffeine anhydrous is removed from the present invention, that same specified amount of sodium bicarbonate is added, and vice-versa. C. Combining the Herbal and Liquid Casing Components 1. Combine 20 percent total weight of the composition dehydrated shredded citrus fiber—the herbal component—with the aforementioned liquid casing components. Allow approximately two hours for the dehydrated citrus fiber to completely absorb the liquid casing, then mix. The mixing is accomplished by using any commercial-grade mixing blender, such as a KitchenAid Artisan blender set to low for 5 minutes. 2. Once the dehydrated citrus fiber has completely mixed and absorbed the liquid casing, the mixture should be re-shredded in any commercial-grade food processor, such as a Cuisinart T3500, for 30 seconds or until the mixture is completely shredded into a uniform mixture ranging between 20 to 40 mesh (referencing NBS screen size) and, ultimately, mimicking the mesh screen size of a genuine snuff tobacco. In more detail, still referring to the present invention of FIG. 1, the ingredients come together as a whole and surpass the shortcomings of all prior art. The essential ingredient of the present invention—citrus fiber—when shredded, boiled, dehydrated, and combined with a high distilled water content, in addition to the remaining liquid casing components, produces a unique herbal substitute that most closely resembles genuine moist snuff tobacco. When the dehydrated citrus fiber is rehydrated with the liquid component a striking resemblance to genuine moist snuff tobacco is created and all five organoleptic qualities of an herbal tobacco substitute are served; there is an earthy texture, a sweet tobacco aroma, a bite or burn to the taste, a deep brown appearance, and once placed in one's oral cavity, a true cud consistency is formed—the present invention remains intact and malleable in one's oral cavity. BRIEF DESCRIPTION OF THE FIGURES The objects and features mentioned above of the present invention, as well as additional objects and features, can be understood from the description of the invention presented herein below, taken in combination with the accompanying figures, tables, and drawings below, in which: FIG. 1 is a table, which provides a list of the herbal and liquid components by percentage of total weight of the present invention. FIG. 2 is a second table in which caffeine anhydrous is omitted from the present invention. FIG. 3 is a third table in which 1 percent nicotine total weight of the present invention is added, and 1 percent distilled water total weight of the present invention is omitted. Note: This figure represents one of several nicotine content variations in the present art. Other such nicotine contents are available in 1.5, 1, 0.5, and 0.25 percent total weight of the composition. FIG. 4 is a table depicting the compositions by total weight of the present invention in relation to the compositions by total weight of all related prior art. Only the herbal moist snuff inventions are included in the following table. All prior art intended for smoking purposes were omitted from this table.
An electric dipole is a pair of equal and opposite charges q and –q separated by some distance 2a. Its dipole moment vector p has magnitude 2qa and is in the direction of the dipole axis from –q to q. The electric field of the pair of charges (–q and q) at any point in space can be found out from Coulomb’s law and the superposition principle. When it is in the equatorial plane of the dipole, i.e., on a plane perpendicular to the dipole axis through its center. The magnitudes of the electric fields due to the two charges +q and –q are equal. The directions of E+q and E-q are shown in fig. The total electric field is opposite to . The important point that the dipole field at large distances falls off not as 1/r2 but as1/r3. Further, the magnitude and the direction of the dipole field depend not only on the distance r but also on the angle between the position vector r and the dipole moment p. There is a force qE on q and a force –qE on –q. The net force on the dipole is zero since E is uniform. However, the charges are separated, so the forces act at different points, resulting in a torque on the dipole. When the net force is zero, the torque (couple) is independent of the origin. Its magnitude equals the magnitude of each force multiplied by the arm of the couple (perpendicular distance between the two anti-parallel forces). This torque will tend to align the dipole with the field E. when p is aligned with W, the torque is zero.
https://selfstudypoint.in/electric-dipole/
The most helpful favourable review The most helpful critical review 7 of 7 people found the following review helpful 4.0 out of 5 starsSpirituality in the modern, technological world Reflecting back on the enormous popular and critical success of 'The Matrix', it is refreshing to note that people were overwhelmingly drawn to a film that conformed itself neither to the cynical and pessimistic bent that informs many recent movies nor to an easy and clichéd sort of optimism. The quest for truth is not mocked but strongly valorized here. This film... 3.0 out of 5 starsCrafty filmmaking lacking substance In this movie, the Wachowskis obviously have a ball working out the technical details of the photography and the digital effects. There's a nice gloss and attention to detail that's lacking in many other films. The brothers have an eye for small details, such as reflections and color tints. What The Matrix lacks is any real intelligence. As an synthesis of comic books,... Reflecting back on the enormous popular and critical success of 'The Matrix', it is refreshing to note that people were overwhelmingly drawn to a film that conformed itself neither to the cynical and pessimistic bent that informs many recent movies nor to an easy and clichéd sort of optimism. The quest for truth is not mocked but strongly valorized here. This film is especially interesting for the numerous clues it gives about how spirituality is envisioned in the modern, technological world: organized groups and systems of all kinds (social, religious, political...) are discarded in favour of a more individualistic, master-disciple type of spiritual experience; at the same time, the notion of an official church is replaced by secret fraternities. This disregard for dogmas entails an eclectic approach that welcomes elements of Eastern thought (especially Buddhism and Taoism), of Hellenism and of Christianity; the path towards enlightenment is the Way, or Tao, which can't be put into words but must be lived. Neo's ongoing initiation features recurrent death-resurrection motifs - it does get caught up in a few noisy and overdone action scenes, but it remains fascinating from beginning to end. And the movie works well as an introduction to philosophy... Last night, I have watched one of my favorite movies, "The Matrix" as I have seen it many times. I would highly recommend this movie, and I am not talking about just the full trilogy. I am talking about the very first one, this one. There is alot of symbolism in this movie and certainly several aspects that would drive one mad and utter turns to disbelief if it were to be true. What if our reality is the Matrix? Don't start looking for the holes on your arms...yet. Also, there was alot of dailogues between Neo and Morpheus that is memorable, including this one: "The Matrix is a system, Neo. That system is our enemy. But when you're inside, you look around, what do you see? Businessmen, teachers, lawyers, carpenters. The very minds of the people we are trying to save. But until we do, these people are still a part of that system and that makes them our enemy. You have to understand, most of these people are not ready to be unplugged. And many of them are so inured, so hopelessly dependent on the system, that they will fight to protect it. Were you listening to me, Neo? Or were you looking at the woman in the red dress?" The woman in the red dress is what we would consider to be temptation. There are those who tasted temptation, lived for it, and will die for it...even though it is a lie. Interesting, eh? Go out and see this movie. It is surely a must see and there's a good deal to learn from it. But, if you're not into symbolism of the movie, the actions and fights were "awesome," as my inner child would say. Well the movie describes very well how the thing are working in our world. If you are not awaken, you are not able to see the way the matrix works. You are in a dream. It is the time to wake up and the movie can just give you the little hint you need to see the world as it is. The Matrix Trilogy, and especially the first installment, must be one of the most significant films of our time, and is likely to go down as an all time sci-fi classic along with the likes of Blade Runner. It is obviously laden with symbology fished from a variety of sources, but I wonder if the Watchowski brothers realised just exactly how powerful a metaphor for our reality they were creating. The central premise that our lives are not 'real' but are steeped in illusion in order that our life force may be fed upon whilst we are enfenced unwittingly like cattle - this is a relevant and powerful message on many levels. It can easily be seen that this is true on a superficial level, with the rampant rise of ultra-aggressive capitalist consumerism, whereby everyone is 'sold a dream' in order to siphon off all income to profit the few, but it goes deeper than that, and can be used to catch a glimpse of some ideas on the true nature of reality. The overlap with material such as Castaneda is remarkable, with stories about the archetypal predator who is invisible, and feeds on us because he has 'given us his mind'. In all, it is a striking metaphor for the human condition. Of course the great thing is that, even if you don't want to explore things to those levels, taken at surface value as a piece of entertainment, the Matrix is still a fantastic sci-fi/action film, with colourful characters, awesome visuals, and a solid original plotline. Taken as a trilogy, this is a fantastic piece of film-making artwork, but the first episode definitely has the lead for sheer impact and originality. Recommended to all! This is still my favourite movie and one that I have seen more than 10 times. It is a movie that can be seen on many levels. Some will see it just as a great action movie which it is, but there is so much more to this film. It is a fantastic depiction of the journey of the spiritual seeker and the difficulties that he encounters within himself as he starts pushing against the prisons of his own mind and the multitude of programs that operates and which keep us small. It also neatly depicts the way humans are kept as 'food for the moon' in Gurdjieff's words or simply food for ultra terrestrials. In the film this is depicted as humans, being little less than cultivated biological batteries for the machines. The story is part of a trilogy and all three parts are worth watching more than once, as you will undoubtedly see new things each time. Things that start making sense only after some time of reflection and reading. In this regard I can recommend reading the book by Ouspensky called "In Search of the Miraculous", and the book by Laura Knight-Jadczyk called "The Secret History of the World". This movie has a great cast, great cosutmes, cutting edge action, original storyline and it's just plain cool. The leather duds, flying kicks and black glasses have brought back the popularity of the trench coat, brought back appreciation for kung fu movies and sent the sunglass revolution on a spinning craze.The script is quite clever that to this day I still find it mind-boggling. It has definitely sparked after-movie discussions because I've had to ask my more intellectual friends to explain it to me. I am glad that it decided to throw in action sequences which suited the less brainy audiences. All around a novel concenpt and should have just stopped right here.The following sequels seemed somewhat of a disappointment. As you were expecting each sequel to become more novel and orginal, it had to come to deal with teh reality of the Matrix in the fight of humans aginst the machines. It was better to have left you wondering and thinking "what-if".My favorite characters, by far, are the agents. In their secret-service like manner to be anti-cool, they were very cool and just as lethal as the rebels. "Find them and Destroy Them" is one of my favorite lines followe dby an agent slowly bringing his hand to his ear piece.A neat film. Conceptually confusing at times, but the action more than makes up for it. I consider this movie to be one of the greatest sci-fi movies of all time, right up there with the first two 'Alien' movies and various anime like 'Cyber City: Oedo', 'Ghost in the Shell' (which played a role in inspiring this movie), and 'Akira'. Being the hardcore anime fan that I am, I found 'The Matrix's' style very appealing and fun to watch. Everyone fit their roles perfectly in this movie; despite the fact that I'm not a fan of any of them (except Hugo Weaving), Keanu Reeves was much more likeable and believable than Will Smith would have ever been (he was originally considered to play the role of Neo, but he himself turned it down because 'he wasn't a serious enough actor'. I like Will Smith, but I totally agree with him). And let's not forget Hugo Weaving's brilliant performance as Agent Smith. Like this movie, I consider Hugo Weaving to be one of the greatest things to have ever come into existence. He has maintained his status of being the highlight in the entire Matrix franchise, alongside the action sequences that are nothing short of amazing.Now, many people complain about the middle of this movie up until the point where Neo sees a deja-vu cat to be super-boring, but I disagree, and I tell them to open their damn ears and listen to what the characters were saying so that they are so frigging confused later on, because everything that's said in the movie is said with a purpose. Not to mention, everything that's said is actually very interesting."Whoa."Anyway, I'll be closing this review by highly recommending it to any sci-fi lover who's been crazy enough to NOT view it yet. This movie is like the 'Pulp Fiction' of... well... science fiction.***** out of ***** To Neo (Keanu Reeves) it seemed as if his entire life was a dream. As with most of us he was searching for something. He was also looking for a person named Morpheus (Laurence Fishburne) who would be able to answer the burning question "What is the Matrix?" It just may be possible that for other reasons Morpheus may be looking for Neo. The movie producers get points for it the first people to do the particular FX. This film even though it has a beginning and an end is really the first is a series that unfolds a further truth. Keanu Reeves plays his part well; however, he is better as Siddhartha in "Little Buddha" (1994). Their little trick with pills reflecting off the classes was good. Speaking of Buddha one does not realize until going through the rest of the films in this series that there is a subtle Buddhist philosophical thread running through them. Even though this is a review of the first film in a series or trilogy I do have the compete Blu-ray set. It rather grows on you. This is still my favourite movie and one that I have seen more than 10 times, as I went out and got the VHS edition back then before DVD's were in. It is a movie that can be seen on many levels. Some will see it just as a great action movie which it is, but there is so much more to this film. It is a fantastic depiction of the journey of the spiritual seeker and the difficulties that he encounters within himself as he starts pushing against the prisons of his own mind and the multitude of programs that operates and which keep us small. It also neatly depicts the way humans are kept as 'food for the moon' in Gurdjieff's words or simply food for ultra terrestrials. In the film this is depicted as humans, being little less than cultivated biological batteries for the machines. The story is part of a trilogy and all three parts are worth watching more than once, as you will undoubtedly see new things each time. Things that start making sense only after some time of reflection and reading. In this regard I can recommend reading the book by Ouspensky called "In Search of the Miraculous", and the book by Laura Knight-Jadczyk called "The Secret History of the World".
Share This Viral relics show cancer’s ‘footprint’ on our evolution Cancer has left its ‘footprint’ on our evolution, according to a study which examined how the relics of ancient viruses are preserved in the genomes of 38 mammal species. Viral relics are evidence of the ancient battles our genes have fought against infection. Occasionally the retroviruses that infect an animal get incorporated into that animal’s genome and sometimes these relics get passed down from generation to generation – termed ‘endogenous retroviruses’ (ERVs). Because ERVs may be copied to other parts of the genome they contribute to the risk of cancer-causing mutations. Now a team from Oxford University, Plymouth University, and the University of Glasgow has identified 27,711 ERVs preserved in the genomes of 38 mammal species, including humans, over the last 10 million years. The team found that as animals increased in size they ‘edited out’ these potentially cancer-causing relics from their genomes so that mice have almost ten times as many ERVs as humans. The findings offer a clue as to why larger animals have a lower incidence of cancer than expected compared to smaller ones, and could help in the search for new anti-viral therapies. A report of the research is published in the journal PLOS Pathogens. ‘We set out to find as many of these viral relics as we could in everything from shrews and humans to elephants and dolphins,’ said Dr Aris Katzourakis of Oxford University’s Department of Zoology, lead author of the report. ‘Viral relics are preserved in every cell of an animal: Because larger animals have many more cells they should have more of these endogenous retroviruses (ERVs) – and so be at greater risk of ERV-induced mutations – but we’ve found this isn’t the case. In fact larger animals have far fewer ERVs, so they must have found ways to remove them.’ ‘This is the first time that anyone has shown that having a large number of ERVs in your genome must be harmful – otherwise larger animals wouldn’t have evolved ways of limiting their numbers,’ said Dr Katzourakis. ‘Logically we think this is linked to the increased risk of ERV-based cancer-causing mutations and how mammals have evolved to combat this risk. So when we look at the pattern of ERV distribution across mammals it’s like looking at the ‘footprint’ cancer has left on our evolution.’ ERVs that are immediately harmful to an animal tend not be passed on, what makes them troublesome is that having arrived at one location in a genome the replication process means they can be copied across, ‘jumping’, to somewhere else. ERVs can, for example, ‘jump’ into the middle of gene machinery responsible for suppressing tumours, damaging it and ratcheting up the risk of mutations turning into cancer. We know that some cancers, such as t-cell leukaemia, are directly linked to retroviruses but a lot of the time ERVs contribute to the number of things that need to go wrong in cells for cancers to arise,’ said Dr Katzourakis. ‘As animals get bigger so the number of cells increases and there are more opportunities for things to go wrong, so there is an evolutionary pressure for larger animals to reduce the number of ERVs.’ Dr Gkikas Magiorkinis of Oxford University’s Department of Zoology, an author of the report, said: ‘We know that taller people have higher risk for some cancers, which fits our study about ERVs posing evolutionary pressure through cancer. Yet we still have no evidence that ERVs might have causal links with cancer in humans, even though they clearly cause cancers in other animals such as mice. We need to search in a more systematic way to see if ERVs cause cancer in humans, and our study suggests that viral pathogenic mechanisms in larger animals like humans would be more complex than those observed in smaller animals.’ The research suggests that larger creatures must have more effective anti-viral genes and resources than smaller ones and, if these can be identified, in the future it may be possible to mimic these mechanisms to produce new anti-viral therapies. The new study is relevant to Peto’s Paradox, an observation made by Sir Richard Peto that the incidence of cancer does not appear to correlate with the number of cells in an organism. ‘Our work doesn’t solve Peto’s paradox as a whole but is has solved it in respect of infection,’ said Dr Katzourakis.
Web mapping tool provides user-friendly means of locating and exploring training resources for US Army soldiers in Europe and Africa. Tap In is an online map application developed for the US Army Europe (USAREUR) 7th Army Training Command (7ATC). Hosted and administered by the USAREUR Sustainable Range Program (SRP) under the 7ATC Directorate Training Support Activity Europe (TSAE), Tap In is designed to be a one-stop-shop for training support resources. Using a map interface, soldiers and planners can find information on over 800 facilities and training areas across the European and African theatres. Powered by the Army-accredited Enterprise Information System known as the Army Range Mapper (ARM), the map-centric interface provides soldiers and planners rich content from numerous disparate data sources and document repositories. Overlays and location information are integrated with numerous other sources, including aerial imagery, scheduling information, a document repository, and public data services such as those offered by DigitalGlobe, NOAA, and Natura 2000. Partnering with USAREUR SRP, Tierra Plan has played a key role in developing and supporting Tap In since its emergence in 2012. Through the map interface, users can search for training areas and facilities, view location-specific information, download related PDFs (such as Standard Operating Procedures (SOPs), handbooks, topographic maps, access maps). Users can also share lessons learned and “TTPs”: Tactics, Techniques and Procedures. Tap In provides training units the ability to view current and future schedules of US controlled training facilities thanks to integration with the Range Facility Management Support System (RFMSS). By requesting real-time data from RFMSS, planners can view scheduling information for any facility, installation or one of TSAE’s Training Support Centers (TSC) registered in the system. Sharing and Integration A key feature of Tap In is that it can be shared and easily embedded in other applications such as SharePoint sites and web portals hosted on the Army’s network. Embedding Tap In in a SharePoint site is super easy: users simply copy a snippet of code from a Share Feature tool, much like embedding a YouTube video, and plug that into their SharePoint site. Feature can also be shared via email links or URL shortcuts. Tap In is engineered to be smart and detect a SharePoint implementation: when it is embedded in another application, some richer content and advanced tools are not loaded, ensuring that the map is fast and fits within a smaller window. Resource Library Additional training resources linked from the map are found in the Resource Library: a large document repository consisting of thousands of files within a folder hierarchy the user can easily navigate. Resource Library content is integrated with the map interface, eliminating the need to open other applications or search other websites for documents. Users can also share a Resource Library folder with other users, or save a folder for future reference. Design and Technology An embedded, lightweight database contains configuration rules and data for all facilities, TSCs, and installations. The embedded database makes Tap In easy to deploy to other units and servers throughout USAREUR, and it simplifies deployment by eliminating the need for connecting to and external database platform on another server.
https://tierraplan.com/2016/07/web-map-us-army-europe-training-resources/
The year was 2011 and a massive earthquake and tsunami rocked Japan. The Fukushima Daiichi Nuclear Power Plant accident remains marked in history. The 9 magnitude earthquake sent a Tsunami that reached over 45 feet towards the plant. Unfortunately, the Fukushima Nuclear Power Plant was only designed to withstand an earthquake of 7 plus magnitude and only had an 18-foot wall constructed between the plant and the Pacific Ocean. It was called 3/11 and was a devastating nuclear disaster, marking the worst accident at a nuclear power plant since the 1986 Chernobyl accident. A focus on nuclear safety has been on the forefront of discussions since the Fukushima disaster. Five years later it is estimated that the Fukushima nuclear disaster has cost Japan over $118 billion. Lessons Learned from Fukushima Worldwide nuclear safety has seen billions invested into safety and security upgrades to ensure that an accident of the same magnitude of Fukushima can’t take place again. The nightmare that was Fukushima called attention to nuclear power plants worldwide. Within the United States, the Nuclear Regulatory Commission looked at the various types of natural disasters (or a design basis threat) that could occur to nuclear power plants thus calling attention to the need for increased safety and security. A $4 billion industrywide investment towards nuclear power plants in the United States was made to ensure future security. Mandatory regulations went into effect as well as intense inspections of every nuclear reactor within the United States.
https://savantx.com/tag/fukushima/
Social support services can give people the opportunity to remain active in their community, achieve new goals, be creative, learn new skills, enjoy social and recreational activities. BBCR’s friendly staff and volunteers can provide support and encouragement to build and maintain social contacts by identifying activities, groups or events that may be enjoyed. Feedback we have received has shown that even the interaction with staff has been of benefit in improving feelings of isolation. Social support can provide: - Weekly phone calls - Medication Monitoring - Support with coordinating appointments - Weekly home chats with a matched volunteer - Social and recreational activities out in the community Community Visitors Scheme BBCR is able to offer a volunteer based program, which is structured to provide two different streams of support. One is to connect individuals who have a home care package but would still like to have social visits with a volunteer. These volunteers visit in the home providing companionship and conversation. The second stream is for residents in aged care facilities who can participate through scheduled group visits by volunteers and BBCR’s Men’s Shed Band The Pirates.
https://www.bbcri.com.au/services/active-ageing/social-support/
Explore this exceptional 820-acre walled demesne dramatically set overlooking Strangford Lough and marvel at the quirky mid-Georgian mansion. An architectural curiosity, it is built inside and out in distinctly different styles of classical and gothic. Winding woodland, lakeside and parkland walks afford amazing unexpected vistas. You can head out on the Lough in a canoe, climb and abseil the cliffs, or build a raft with Clearsky Adventure. Fans of Game of Thrones may be interested to learn that Castle Ward served as Winterfell in the show, and there is a tour and archery experience available on site. Facilities – at a glance Refreshments Features - Parking onsite - Parking nearby - Cafe - No access to upper floor of house - Facilities: Wheelchair available, may be driven to house, Braille - Accessible toilets - Open all year - Opening Times: Parkland, woodland & gardens open Jan-28 Feb, daily 10-4; 29 Feb-3 Apr & 12 Sep-Dec, daily 10-6; 4 Apr-11 Sep, daily 10-8. House, laundry & pastimes centre open 5-20 Mar, wknds, 12-5; 23 Mar-3 Apr & 27 Jun-4 Sep, daily 12-5; 6 Apr-26 Jun & Also in the Area About The area Discover County Down Geographically, County Down seems to put a long arm around Strangford Lough, over 70 square miles of water. The arm is the Ards Peninsula, the most easterly part of Ireland. Strangford Lough is a ria (a drowned estuary), caused by rising sea levels at the end of the Ice Age It is dotted with some 70 small islands, actually the highest points of drowned drumlins (small rounded hills) formed of material left behind by glaciers. The Lough is home to large flocks of wintering wildfowl that congregate on the mudflats surrounding its shores. About 9 square miles of the lough are a designated reserve for this reason. Bangor is at the top of the peninsula, and with its picturesque seafront promenades, a charming marina and many shops and restaurants, it is regularly voted the most desirable place to live in Northern Ireland. Much of the town dates from the Victorian era with some historic buildings as well as some more modern development, and one of the largest open-air markets in Northern Ireland. Nearby Stays Places to Stay Dining Nearby Restaurants and Pubs Why Choose Rated Trips Your trusted guide to rated places across the UK The Best Coverage Discover more than 15,000 professionally rated places to stay, eat and visit from across the UK and Ireland. Quality Assured Choose a place to stay safe in the knowledge that it has been expertly assessed by trained assessors. Plan Your Next Trip Search by location or the type of place you're visiting to find your next ideal holiday experience. Travel Inspiration Read our articles, city guides and recommended things to do for inspiration. We're here to help you explore the UK.
https://www.ratedtrips.com/establishments/castle-ward
LIFe is about..... 3/20/2014 Life is about trusting your feelings and taking chances, losing and finding happiness, appreciating the memories, learning from the past, and realizing people change." ~Atul Purohit MIndfulness: is it a fad or a powerful life-changing coping skill. A look at the science ~ Amanda Mascarelli, washington Post, HEalth, Science and the Environment 3/19/2014 This article is written by Amanda Mascarelli and appeared in the Washington Post, Mar 1oth, 2014. Original link: http://www.washingtonpost.com/national/health-science/mindfulness-is-it-a-fad-or-a-powerful-life-changing-coping-skill-a-look-at-the-science/2014/03/07/a43d36f4-a2ed-11e3-8466-d34c451760b9_story.html Imagine this scenario: You come home from work tired and frazzled, and your little kids are running wild. Perhaps this doesn’t require much imagination. People in such situations might find solace in a popular meditative practice called mindfulness. With mindfulness, you train your mind to focus on the present and respond with reason before emotion. It’s about taking a pause and guiding yourself to become “aware enough in the moment so that before you react, you’re aware of how you’re responding to a situation,” says Ronald Epstein, a professor of family medicine at the University of Rochester Medical Center in New York. “That gives you the choice to blow up or not to blow up. You recognize and say, ‘I’m about to lose my temper,’ rather than losing your temper.” In our high-stress culture, the idea has caught on. Mindfulness is being practiced not just by New Age-types, celebrities and executives. Education leaders in many states have received training for how to incorporate mindfulness into K-12 curricula. Most medical schools now offer an elective in mindfulness in medicine, Epstein says. For the rest of us, a popular way to learn the technique is through eight-week mindfulness-based stress reduction (MBSR) courses, says Kirk Warren Brown, a psychologist at Virginia Commonwealth University in Richmond, who has been studying and practicing mindfulness for more than 20 years. MBSR courses are often held in churches, schools, hospitals and community centers. A typical course in the Washington area costs about $550. For faster, less expensive options, you can find mindfulness courses online and tutorials on apps such as Buddhify. Popularity is not necessarily a gauge of effectiveness, of course. So what’s the science behind mindfulness: Is it really a powerful life-coping skill? “It’s not a cure-all; it doesn’t take all the problems away,” says Luke Fortney, a family medicine doctor in Madison, Wis., who has conducted clinical studies on the practice. “But it can help reframe our focus around how we approach these stresses.” Research shows that being mindful can have tangible benefits, such as alleviating chronic pain and helping to curb depression and anxiety. Various studies have linked mindfulness practice to improvements in attention, eating and sleeping habits, weight management, and recovery from substance abuse. Research also suggests that mindfulness can help people cope better with heart disease, breast cancer, fibromyalgia, asthma and other conditions. One way to assess the validity of studies is to do a meta-analysis, a comprehensive review of multiple studies. One such analysis published this year in JAMA Internal Medicine found “moderate evidence” that mindfulness meditation programs can have small but significant effects on anxiety, depression and pain. But the review did not find sufficient evidence that mindfulness could help with other health problems. This doesn’t mean that mindfulness can’t help people with other conditions, but just that stronger study designs are needed to know whether it is effective, says Madhav Goyal, an assistant professor of general internal medicine at Johns Hopkins School of Medicine and lead author of the meta-analysis. The important message from the study, he says, is that after evaluating thousands of people, including patients with anxiety, fibromyalgia, low back pain, HIV and heart disease who underwent approximately eight weeks of mindfulness training, “we were seeing a fairly consistent but small effect of improvement in all of those populations for anxiety, depression and pain.” Brown points out that these moderate reductions are “nothing to sneeze at.” The meta-analysis demonstrates “that the average person may be able to cut back on anti-anxiety, antidepressant or other medications they are taking, which is not insignificant given the side effects and other issues such as tolerance that many psychotropic medications have,” he says. And as the authors note in their paper: “these small effects are comparable with what would be expected from the use of an antidepressant in a primary care population but without the associated toxicities.” Last year, Brown published one of the first studies to look at how mindfulness practice affects the early unfolding of emotional reactions. By studying how brain waves change in response to emotional stimuli such as unpleasant images, he and his colleagues found that individuals deemed to be more mindful had lower stress responses than less-mindful individuals. Mindfulness practice seems to alter how emotional centers in the brain are activated, Brown says. “Rather than simply helping people cope better with negative emotions and stress — which is certainly important — mindfulness seems to help inoculate against the arising of stress in the first place.” The beauty of mindfulness is that once it’s learned, it can be done easily, while doing other things. “It’s something that can be applied under any kind of circumstance: washing the dishes, doing child care, driving, sitting in front of the computer,” Brown says. As the mother of three young children, I find this to be perhaps its greatest appeal. It’s empowering to be able to step back, pause to assess the situation — however stressful it is — and recognize what I’m feeling. Then I can choose how to respond rather than letting my response happen to me. Author: Amanda Mascarelli Let's help to de-stigmatize and bring awareness and compassion to discrimination and other issues folks with mental health issues face. There is no shame in having to struggle and figure out how to live with strong emotions. We all have feelings, and some folks have bigger, more complicated feelings to figure out and manage than others. And that's not wrong....it simply is. The blog post reprinted below is from the TED blog and Thu-Huong Ha is the author. Here is the link to the original post: http://blog.ted.com/2013/12/18/how-should-we-talk-about-mental-health/ TED Blog Post: Mental health suffers from a major image problem. One in every four people experiences mental health issues — yet more than 40 percent of countries worldwide have no mental health policy. Across the board it seems like we have no idea how to talk about it respectfully and responsibly. Stigma and discrimination are the two biggest obstacles to a productive public dialogue about mental health; indeed, the problem seems to be largely one of communication. So we asked seven mental health experts: How should we talk about mental health? How can informed and sensitive people do it right – and how can the media do it responsibly? End the stigma Easier said than done, of course. Says journalist Andrew Solomon, whose tear-inducing talk about depression was published today: “People still think that it’s shameful if they have a mental illness. They think it shows personal weakness. They think it shows a failing. If it’s their children who have mental illness, they think it reflects their failure as parents.” This self-inflicted stigma can make it difficult for people to speak about even their own mental health problems. According to neuroscientist Sarah Caddick, this is because when someone points to his wrist to tell you it’s broken, you can easily understand the problem, but that’s not the case when the issue is with the three-pound mass hidden inside someone’s skull. “The minute you start talking about your mind, people get very anxious, because we associate that with being who we are, fundamentally with ‘us’ — us as a person, us as an individual, our thoughts, our fears, our hopes, our aspirations, our everything.” Says mental health care advocate Vikram Patel, “Feeling miserable could in fact be seen as part of you or an extension of your social world, and applying a biomedical label is not always something that everyone with depression, for example, is comfortable with.” Banishing the stigma attached to mental health issues can go a long way to facilitating genuinely useful conversations. Avoid correlations between criminality and mental illness People are too quick to dole out judgments on people who experience mental health problems, grouping them together when isolated incidents of violence or crime occur. Says Caddick, “You get a major incident like Columbine or Virginia Tech and then the media asks, ‘Why didn’t people know that he was bipolar?’ ‘Was he schizophrenic?’ From there, some people think, ‘Well, everybody with bipolar disease is likely to go out and shoot down a whole bunch of people in a school,’ or, ‘People who are schizophrenics shouldn’t be out on the street.’” Solomon agrees that this correlation works against a productive conversation about mental health: “The tendency to connect people’s crimes to mental illness diagnoses that are not in fact associated with criminality needs to go away. ‘This person murdered everyone because he was depressed.’ You think, yes, you could sort of indicate here this person was depressed and he murdered everyone, but most people who are depressed do not murder everyone.” But do correlate more between mental illness and suicide According to the National Institute for Mental Health (NIMH), 90 percent of people who die by suicide have depression or other mental disorders, or substance-abuse disorders in conjunction with other mental disorders. Yet we don’t give this link its due. Says Solomon, “Just as the association between mental illness and crime is too strong, the connection between mental illness and suicide is too weak. So I feel like what I constantly read in the articles is that ‘so-and-so killed himself because his business had gone bankrupt and his wife had left him.’ And I think, okay, those were the triggering circumstances, but he killed himself because he suffered from a mental illness that drove him to kill himself. He was terribly depressed.” Avoid words like “crazy” or “psycho” Not surprisingly, nearly all the mental health experts we consulted were quick to decry playground slang like “mental,” “schizo,” “crazy,” “loonie,” or “nutter,” stigmatizing words that become embedded in people’s minds from a young age. NIMH Director Thomas Insel takes that one step further — he doesn’t like the category of “mental health problems” in general. He says, “Should we call cancer a ‘cell cycle problem’? Calling serious mental illness a ‘behavioral health problem’ is like calling cancer a ‘pain problem.’” Comedian Ruby Wax, however, has a different point of view: “I call people that are mentally disturbed, you know, I say they’re crazy. I think in the right tone, that’s not the problem. Let’s not get caught in the minutiae of it.” If you feel comfortable talking about your own experience with mental health, by all means, do so Self-advocacy can be very powerful. It reaches people who are going through similar experiences as well as the general public. Solomon believes that people equipped to share their experiences should do so: “The most moving letter I ever received in a way was one that was only a sentence long, and it came from someone who didn’t sign his name. He just wrote me a postcard and said, ‘I was going to kill myself, but I read your book and changed my mind.’ And really, I thought, okay, if nobody else ever reads anything I’ve written, I’ve done some good in the world. It’s very important just to keep writing about these things, because I think there’s a trickle-down effect, and that the vocabulary that goes into serious books actually makes its way into the common experience — at least a little bit of it does — and makes it easier to talk about all of these things.” Solomon, Wax, as well as Temple Grandin, below, have all become public figures for mental health advocacy through sharing their own experiences.
https://www.annemaderlmft.com/tools-for-living-blog/archives/03-2014
Everyone strives to be a master ‘doer,’ and many of us find ourselves searching for the magic bullet that will solve all of our problems. But productivity isn’t one-size-fits-all. The first step toward being more productive lies in intelligently scheduling your day and really understanding your strengths and weaknesses. Try implementing these simple tactics to maximize productivity in the workplace, and you’ll tackle your workload with time to spare. 1. Implement a weekly No Meeting Day Block off an entire day on your calendar every week. Call it a No Meeting Day, and don’t forget to socialize this schedule to your teammates. Optimize this day to get heads down in one or two big projects. At Asana, we observe No Meeting Wednesdays. With the occasional exception, we all try to keep our commitment to having this day be meeting-free. As best you can, try to spread the word about this plan. Getting your entire company or team on board will help you all get more done. Why give it a try Whether you’re a manager or individual contributor, having an entire day free of meetings lets you pursue strategic projects that require a lot of heads down time,but that often get interrupted with meetings, emails, and ad hoc requests. With this new schedule, you’ll discover you’re less stressed on the other days of the week, and you’ll be finally be able to tap into that coveted flow time. 2. Identify optimal times for the right projects Spend a week or a couple of days tracking your current schedule (or lack thereof), paying attention to when you have the most energy and when you are least productive. Then, plan your day based on your optimal focus times: start with smaller tasks and those that take up less energy and brainpower at times when you often find yourself less inspired; block off larger chunks of time for bigger tasks — when your creative juices are more likely to flow freely. Why give it a try Procrastination is often the result of a lack or structure or scheduling. Working on big projects at times when you’re most in need of a break, or not quite ready to think big can leave you spinning your wheels. By making yourself aware of times you’re in need of a break or ‘on’ to tackle high-level work, you can tap into your most productive self when you need it most. 3. Give the Pomodoro Technique a try The Pomodoro Technique (which gets its name from a tomato kitchen timer) works by allowing you to break down big projects into smaller distributed tasks that you’re more likely to accomplish over the course of the day. These tasks should be punctuated by frequent breaks and each one should take 25 minutes or less to complete. Why give it a try The Pomodoro Technique is designed to help you recharge, so you’ll move faster through projects — with less fatigue. 4. Make time to plan your day Half the productivity battle lies in good planning. So start or end your day with a 30 minute planning session. Use this time to respond to teammates and organize your projects so you have a clearer picture of what you’re working on and why. Why give it a try We’re often bogged down by constant distractions: messages, emails, or time spent trying to figure out what to do next. All of these waste a lot of time and drain your energy. By getting through housecleaning, you can redirect your energy to more mentally-challenging — and fulfilling — work. More? Project management software can also aid with productivity–it can help organize tasks, keep your team in communication, and make sure your projects are always on time and on budget. How do you stay productive at work? Leave your thoughts and comments below! Want more articles on productivity? Check out.. - The 58 Most Insanely Useful Project Management Blogs and Resources - How ‘Getting Things Done’ Changed My Life: 5 Lessons I Learned - I Tried These 7 Productivity Hacks from Business All-Stars Looking for Project Management software? Check out Capterra's list of the best Project Management software solutions.
https://blog.capterra.com/4-ways-to-design-your-day-to-maximize-productivity-in-the-workplace/
Geothermal brine reservoirs exist in many areas of the world and represent a valuable energy resource. Typically, the energy contained in the hot geothermal brine is recovered in a geothermal power plant by flashing the brine to produce steam and then using the steam to activate a turbine connected to an electrical generator. The geothermal brine presents handling difficulties in the geothermal power plant. For example, geothermal brines, and particularly those from a geothermal resource at a temperature of about 400.degree. F. or more, are rich in silica, which can, by complex chemical reactions involving silica polymerization, come out of solution, forming solid amorphous silica deposits that scale equipment. These deposits are particularly troublesome with equipment designed to extract energy, e.g., flashing vessels and heat exchangers, but the silica in the brine also presents problems in any equipment or piping in which the brine is transported, including the piping for re-injection wells. Indeed, silica deposition problems can even extend to the formation into which the brine is ultimately re-injected. If the silica substantially deposits soon after re-injection, the end result could be premature plugging of the formation, rendering it a useless or more difficult resource from which to recover geothermal fluids. Likewise, the acidity of geothermal brines can present problems, in particular, corrosion problems. For example, brines at pH values below about 4.5 typically require expensive alloys for their handling, such as titanium or high nickel alloys. Oftentimes, the problem can be so severe, and the cost to handle the acid brine so expensive, that in many instances the "acid well" is shut in or used only as a re-injection well. Needless to say, such procedures decrease the energy resource base.
In this series of post, we’ve been looking at Romans 7 and learning why we struggle to win against sin. The short answer is that the reason for our struggle is what the Bible calls “the flesh.” In previous posts we’ve learned two important truths about the flesh. 1). The flesh is part of you, but not the heart of you. 2) The flesh is the leftover mindset and muscle memory from your old life before Christ. Now we come to the third truth we need to know. And let me warn you, this is the most discouraging one of all! The flesh stronger than your good intentions and best efforts Did you notice how Paul talked about wanting to do the right thing but still finding himeslf doing the wrong thing? “For I do not understand my own actions. For I do not do what I want, but I do the very thing I hate” (7:15). He’s got the right want-to, but can’t pull off the right follow-through. His intentions are good and his effort is commendable. But he still is failing and falling. Paul is saying the flesh is stronger than his good intentions and best efforts. Let that sink in. This is the apostle Paul telling us this. A man who seems to us as godly and committed as they come. If he can’t do it, what chance do you and I have. Some years ago I watched a sports show on TV called The World’s Strongest Man. A number of incredibly burly, muscular men were competing for the title of “world’s strongest man.” To win the crown, they had to prove the best at lifting incredibly heavy objects. One part of the competition had them put on a harness that was attached by a rope to a large, plexiglass container filled with coins. Their task was to lift the container off the ground. I remember watching one burley guy give it a go. This man had already shown he could lift ridiculously heavy objects. With swagger and confidence, he put on the harness and gave it all he had—groaning and grunting as he tried to lift the container. But despite all his determination and effort, he couldn’t do it. Ultimately, he had to give up. Just imagine that you were in the crowd that day watching the competition. Imagine that the TV announcer offered you a chance to put on the harness and try to lift the container. Would you give it a go? Would you think you had a chance to succeed where the big, burly weighlifter failed? Of course not. You’d be thinking, “If that guy couldn’t lift the load, there’s no way I can.” Here’s my point. We rightfully consider the apostle Paul a heavyweight Christian. His level of spiritual dedication and determination exceed anything we’ve known or shown. But when it came to carrying out God’s law, Paul says he couldn’t do it. And if he fell short, so will we. Peter Drucker, a well-known business author, is famous for saying “Culture eats strategy for breakfast.” He means that no matter how good a company’s business strategy may be, the culture of the organization will have a much stronger impact on its efforts to succeed. We could paraphrase Paul’s teaching in Romans 7 by saying “The flesh eats good intentions for breakfast.” In other words, no matter how good and noble your intentions are to obey the Lord and keep clear of sin, the flesh will have a bigger impact on your spiritual life. The flesh is stronger than your good intentions and best efforts. Is this making sense to you? Are you getting the picture of why you still struggle with sin? Is it sinking in that, even though you are a new person in Christ, you still will battle with old patterns of thinking and acting? Finding freedom is still hard because of the potency of the flesh. No wonder we hear Paul cry out in frustration, “Wretched man that I am! Who will deliver me from this body of death?” (7:24). If you are a sincerely frustrated Christian, you have echoed those words more than once! A Glimmer of Hope Romans 7 discourages and dashes our illusions that we can find freedom from sin through understanding our new identity in Christ and giving our best efforts to live our that new identity. But Romans 7 doesn’t leave us without hope. The chapter winds up with a glimmer of hope. Paul answers his own question—“Who will deliver me from this body of death”—by pointing to Christ: “Thanks be to God, through Jesus Christ our Lord!” (7:25). Praise God, Jesus has made a way for us to break the sin cycle and find freedom. There is good news on the far side of Romans 7. If you are tired of getting pinned by sin, tired of trying hard but failing miserably, you are ready to move from Romans 7 to Romans 8. You are ready to hear the good news about the Holy Spirit! Watch for an upcoming post on How the Holy Spirit helps us Win Against Sin!
https://rickandlindareed.com/2021/11/17/when-you-struggle-with-sin-part-4/
He/him, she/her, they/them, ze/zir — the options grow daily. One can simply wake up one day and assume the identity of a boy, the next claim that they are a girl, and the day after neither, and announce their pronouns as a part of their introduction, expecting an unquestioned adherence to affirm self-identification. This is despite the fact that there is no definition on their part of what a woman or a man actually is aside from the recursive argument, “anyone who identifies as such.” Nowadays, pronoun introductions are an assumed feature of elite educational and working spaces, with dissenters branded as bigoted or transphobic. As pronouns form a part of daily speech and polite introductions, from the elementary classroom teaching the variety of pronouns to workplaces and applications requiring them, Muslims have also begun adopting this practice. For some, it is a part of adopting polite society decorum; for others, it may be out of sympathy with individuals who struggle with dysphoria; and for another growing group, it is an outright acceptance of modern, Western liberal gender and sexuality mores. However, rather than an innocuous practice, I argue that the usage of pronouns is a sign of adopting a postmodernist framework of gender that is completely antithetical to Islamic values. The problem is not only that of “they/them” and using plural third person pronouns in place of he or she. Arguments that contend with forcing grammatical changes is an issue for an area of linguistics termed sociolinguistics and pragmatics. While I think these types of arguments point to the institutionalization of language norms forcefully pushed by a minority, the problem is not in language “being changed” alone. Language evolves over time, both “naturally” and through the efforts of people — and sometimes the line is blurred. The bigger issue here is that one can use language to reflect an understanding of “who they are” to others, despite it having no grounding in reality. Even languages and cultures that have no gendered personal pronouns retain the basic demarcation between what is a woman and a man that is reflected in other aspects of language. Rather than truth rooted outside the emotions of consciousness, the concept of self-identification assumes that what is internally felt is the authoritative truth. There is no measurable, conceivable way to assess the accuracy of such a claim because gender is now considered a “felt” experience alone — a label to self-identify without ever having to define what exactly is being identified as. For example, only women know what women are, but anyone who identifies as a woman is a woman, but what exactly constitutes a woman depends from woman to woman! Sociologist and philosopher Zygmunt Bauman in Liquid Modernity diagnoses identity in the modern world as follows: …it is the ability to ‘shop around’ in the supermarket of identities, the degree of genuine or putative consumer freedom to select one’s identity and to hold to it as long as desired, that becomes the royal road to the fulfillment of identity fantasies. Having that ability, one is free to make and unmake identities at will. Or so it seems. Before even entering a discussion of moral truth and a tawhidic framework, these arguments are recursive and fail on the level of basic logic. Announcing one’s pronouns in such a fashion not only normalizes the sins associated with the movement, but validates the premises underlying the up-taking of this practice: that sex and gender are not objective realities, but ever-evolving conceptualizations one “identifies” with that should be accepted at face value. And because there is no way to assess the truth of a claim, as long as one claims it, this has led to absurd legal implications — for example, Scotland’s policy of allowing male inmates who simply “self-identify” as women to, without question, be put into women-only prisons, with some returning to their identity as men after release. As one woman inmate described, “[h]e wanted to be in this hall because he wanted to have sex with loads of lassies.” This not only has implications on a fiqhi level — where gendered aspects or any demarcation between men and women will be undermined — but is an affront to our theology and understanding of Allah’s creation of humankind: as men and women (many proponents of modern gender and sexuality norms will try to use the example of intersex individuals to invalidate this point. However, this is something I have discussed in a previous piece, and will discuss below as well, because it’s often invoked in these circles). This has already impacted policy beyond the above example, with Muslims supportive of such definitions failing to realize it will harm Muslims and Muslim women the most. Without the ability to define a woman as female, for example, encroachment into women’s only spaces will become commonplace. There is no way for the state to protect the needs and wants of women, because nothing is essential to being a woman and therefore there is no definitive feature of women that require such protections, because a woman is anyone who defines themselves as one. Yet for the Muslim woman who abides by the shar’i commands to veil from unrelated men and minimize physical contact, increasingly deconstructive attitudes to gender will pose a clash that few policymakers and members of the public have had the strength to accommodate. Those attempting to defend women of faith or simply those concerned about encroachment are vilified, from J.K. Rowling’s public flagellation (despite her contention only being that transgender women are not the same ontologically as women, not that attempting to change sex is immoral), to a transwoman bringing discrimination lawsuits against Muslim and Sikh women at a spas who refused to wax the genital area of males. The irony here is the demand to accommodate another’s view of their gender is positioned higher than the Muslim woman’s — or any other person’s — view of themself and relationships with others. Arguing gender fluidity, or that multiple genders exists that one can voluntarily adopt, is Islamically corrupt. The underlying premise is that there are two sexes that correspond to two genders, which one is throughout life. Both academics and laypersons often conflate the discussions of khuntha (commonly translated as intersex) and mukhanathoon (effeminate men, there is another term for masculine women) in fiqh texts and the seerah to advocate for a vision of Islam and gender that aligns with progressive gender ideology. They fail to admit that both in fact are in line with “men” and “women” as discrete categories and creations of Allah. Khuntha are a biological reality, individuals who display a spectrum of ambiguity as to their biological sex, but aside from the rare completely ambiguous case, will still align more with one sex or the other. The underlying presumption is still that such a person has a sex, but is not discernable in this world. The unique fiqhi rulings for extremely rare cases of khuntha mushkil (a completely ambiguous intersex person) are not an acknowledgement of a “third gender,” but rather that in such extreme cases where the gender cannot be discerned at all, these individuals are still a part of society and must be accommodated. Those who have congenital abnormalities or displayed qualities of the opposite sex that were beyond their control — like a male with a high-pitched voice — bear no blame. Among mukhanathoon, however, are also individuals that voluntarily adopt the dress and mannerisms of the opposite sex, which is categorically impermissible. Ibn Abbas reported: The Prophet, peace and blessings be upon him, cursed men who imitate women and women who imitate men. In another narration, Ibn Abbas said: The Prophet cursed men who copy women and women who copy men. [Ṣaḥīḥ al-Bukhārī 6445] Today, in the English-language, “she” and “her” are used to refer to women. Men adopting these pronouns are purposefully trying to be perceived by society as women, and are implicated by this hadith. Should the day come where English becomes a language that has no gendered pronouns, like Malay and other Austronesian languages, this critique will move to other avenues through which men or women attempt to convey an inaccurate representation of the self. This is why rebuttals like “it’s just language” or “other languages don’t have gendered pronouns” are irrelevant. English uses gendered pronouns, and this is another avenue through which transgender individuals attempt to portray a vision of themselves that is untrue. When people today use the acknowledgement of khuntha as evidence that Islam affirms such a vision of gender, they completely forgo ahkam (normative rulings) in favor of ahistorical readings. If one’s sex is clear or once discerned, it is not permissible to try and physically alter oneself to better resemble the opposite sex. The underlying premise is that sex is discrete, which means that regardless of how one may struggle with their sex, it is a feature of the way Allah created humans. Therefore, one cannot adopt a label that misrepresents this reality. One may respond: how does all this mean there is a problem with announcing pronouns, especially if it just accurately reflects one’s biological sex (which is the case for most people)? The issue here is that this implicitly affirms a vision of sex and gender beyond Islamic mores, one that implicates the modern day movement. Announcing pronouns affirms a vision in which gender cannot be discerned from one’s sex, that the intuition one has in accurately identifying one as a man or woman the vast majority of the time must be forgone in accommodating every single individual’s self-perception. In other words, such a person is not simply announcing their pronouns, even if the pronouns are accurate to their sex. Such a person is announcing that they ascribe to a corrupt vision of gender, where rather than being decreed by Allah ﷻ, it is for every individual to mold for themselves. Even from an irreligious standpoint, the contradictions of this ideology are many, for example, in the “cancellation” of Natalie Wynn, a transwoman. In a series of tweets, Wynn criticized the public show of announcing pronouns, as it is counterproductive to what many transgender individuals seek in being assumed to be a particular gender like cis individuals. Backlash from non-binary individuals critiqued her “privilege” in “passing” as a woman, and a number of pieces were subsequently written by others expressing discomfort in centering their identity around gender (and in their view “paradoxing reinforcing gender binaries”). Other debates discuss whether the genitals of a person is “woman” or “man” depending on the identity of the person, despite the initial demarcation between sex and identity; whether a post-gender world solves these issues; whether it is actually progressive to announce pronouns when individuals may still be figuring out their gender identity; feminists who see this as an erasure of womanhood; and so on. It is unfortunate that questioning the ephemeral goals of the movement that seeks more and more affirmation is assumed to be relegated to the political, often hateful right — principled Muslims must look to critically analyze the American progressive culture that uncritically exports these issues to the world and demands unquestioning adherence, while remaining compassionate to those sincerely looking for answers and help within the parameters of our Deen. Works Cited Bauman, Z. Liquid Modernity, Polity Press, 2000, p 83. In the case of those naturally looking androgynous, or are often mistaken for the opposite sex, there are ways to indicate this (for example, in social media biographies), or correct one in person without engaging in this. That pronouns have monopolized normal mistakes of human interaction is part of the issue. Photo by Sharon McCutcheon on Unsplash About the Author: Farhana K. is based out of North America. She is interested in the Islamic sciences and medical ethics. Disclaimer: Material published by Traversing Tradition is meant to foster scholarly inquiry and rich discussion. The views, opinions, beliefs, or strategies represented in published articles and subsequent comments do not necessarily represent the views of Traversing Tradition or any employee thereof.
https://traversingtradition.com/2022/07/18/pronouns-progressivisms-preposterous-plight/?like_comment=19660&_wpnonce=bb358e1a5d
To access the recordings and abstracts, click here. We start on Monday 18 May with sessions on Curiosity (with Marina Warner and others), Coffee and Commonwealth, illustrator and caricaturist Chris Riddell‘s reflecting on Gulliver’s Travels and Diderot on Monday, to discussions of Ruins, productions of S.T.Coleridge‘s Ancient Mariner and Blake‘s Illuminated manuscript Vala or the Four Zoas, Mike Leigh’s Mr Turner with members of the film team, and we end on Friday with sessions on the enlightenment art of Shadow Portraits and a Magic Lantern Show. And this is just a couple of examples. Do visit the Birkbeck Arts Week’s webpage, choose your events, and book seats. It’s all free. And please spread the word.
https://romanticillustrationnetwork.com/tag/birkbeck/
Standard 1/2 Bedroom Apartment for 6, Chamonix Sleep up to 6 guests in the beautiful Standard 1/2 Bedroom Apartment at the Residence La Rivière in south Chamonix. This apartment features 1 double bed, 1 double sofa bed and a sleeping alcove with a bunk bed in the living room, and a fully-equipped kitchen. This residence in southern Chamonix, decorated in the classic Savoyard style, offers the perfect escape from the daily grind! Located in the midst of an exceptional natural area and listed as a World Heritage Site, you will undoubtedly find yourself ensconced in a haven of peace and tranquility. Only 300m from the residence, L'Aiguille du Midi lift will take you up to an altitude of 3.842m, providing speedy access to the high-altitude slopes. For those who wish to take a day off from skiing, a short walk on the promenade outside your door will take you to the town of Chamonix, where endless entertainment, shops and restaurants await! Other fun outdoor activities in the area include dog sledding, hiking, and hot air balloon rides. For those wanting to relax and rejuvenate, a spa and wellness centre are found in the Hôtel Les Aiglons, only 100m from the residence. The residence itself features a games room, ski storage, and a transport service to the ski slopes. It is possible to pre-book lift passes, equipment rentals and ski lessons with the residence. After a busy day exploring the town or the mountains, retreat to this cozy 450 sq. ft. Standard 1/2 bedroom apartment, which offers optimal comfort, all the while providing the finest modern amenities and decor. Accommodating up to 6 guests, the master bedroom features 1 double bed, while a full bathroom and a shower room with a toilet provide ample space for you to prepare for a day in the mountains. The open-plan living area features 1 double sofa bed and a TV with national channels, along with a sleeping alcove that contains a bunk bed. The kitchen opens onto the living area and comes fully-equipped with a dishwasher, a fridge and a stovetop. There is also a coffee machine, a microwave, and a full complement of kitchenware and utensils found in the cupboards. A lovely dining area provides seating for 6. Free Wi-Fi is available throughout the apartment. Please note that a tourist tax applies at this residence. If you are interested in bringing your pet with you, please enquire as to the availability of pet friendly units.
https://leavetown.com/accommodation/chamonix/residence-la-riviere/standard-12-bedroom-apartment-for-6/?currency=USD
When you've had enough of the rush and daily grind, sometimes the best thing to do is to put life on hold and escape to somewhere simply otherworldly. When you're choosing where to point the proverbial compass, discerning travellers have a myriad of destinations to choose from around the world. Sure, you could drop your bags anywhere with the beach and sunshine typical of most Asia holidays, but if you really want to find your centre and balance, perhaps a destination with some more spiritual significance is in order. You don't need to be a believer to soak up the tranquil atmosphere of Bali, one of the myriad of islands that form the Indonesian archipelago. Renowned the world over for its natural beauty and its gracious, welcoming residents, Bali is the perfect island hideaway to get some much-needed revival. Here are two ways to find your ultimate bliss in Bali. Immerse yourself in the temple of Tirta Empul Save a good few hours for this unique temple, built around a natural sacred spring. Just around 30 minutes' drive from the village of Ubud where Eat, Pray, Love was filmed, Tirta Empul draws visitors from far and wide who come to experience its tranquil surrounds. The site is estimated to have been built around 960 AD during the reign of the Warmadewa Dynasty. As you arrive at the temple complex, you'll pass through verdant tropical gardens to arrive at the purification bath. You'll want to bring a change of clothes for this particular temple visit, as you'll be stepping down into the clear waters of Tirta Empul's sacred pool, where mountain water from the spring gushes out to douse the eagerly awaiting pilgrims. The belief that these waters have healing powers is possibly based on the legend of a Balinese god, who drove his staff into the ground to create a purifying spring to heal his ailing troops. One thing's for certain; once you've waded through the cool water, shared with golden koi and locals quietly murmuring their blessings, all the stresses of home will be a distant memory. Time your visit either early morning or later in the evening to best experience the full effect of the Tirta Empul away from the surge of visitors that arrive at midday. Choose a villa. Why Villas Beat Hotel Rooms In Bali Love the spa? 4 Blissful Bali Spa Experiences Take the pressure off at Jimbaran Bay Arguably one of the most idyllic locations on Bali, Jimbaran Bay is situated on the northern side of the island, home to select luxury resorts nestled on the stunning coastline. With Travel Associates, we provide access to some of the most incredible accommodation on offer, such as the Four Seasons. The Bali outpost of this iconic resort chain includes its very own sumptuous spa, so hours of blissful pampering is a short walk from your suite. Set in a secluded beachside garden oasis, the Healing Village Spa's selection of treatments is inspired by Balinese rituals, with local healers on site practising traditional holistic healing. Feeling tense after your flight? A traditional Balinese massage will make short work of the knots, whether you choose the Rwa Binada, which uses stones to balance yin and yang, or Ku Nye, a therapeutic treatment to soothe the nervous system using floral compresses and acupressure points. Once you're feeling loose-limbed, treat yourself to a facial or take advantage of the Jimbaran Traditions sessions - choose between the Balinese rejuvenating ceremony of Suara Jimbaran, or the Agni Akasa, martial arts-style breathing and stretching sequences.
https://www.travelassociates.com/luxury-holidays-news/two-ways-to-find-bliss-in-bali
TORONTO, ONTARIO -- (Marketwired) -- 07/07/17 -- Constellation Software Inc. ("Constellation") (TSX: CSU) today announced that its subsidiary, Constellation Software Netherlands Holding Cooperatief U.A., a subsidiary of Constellation and the indirect owner of Total Specific Solutions (TSS) B.V. ("TSS"), has entered into an agreement for the purpose of refinancing its current EUR 160,000,000 term and multicurrency revolving facilities agreement. Upon closing of the new multicurrency revolving facility and term facilities agreement with a consortium of lenders, TSS will be able to borrow up to EUR 300,000,000 under a multicurrency revolving loan facility and up to EUR 50,000,000 under an additional uncommitted term loan facility. The facilities agreement has an initial term of five years with an extension option for two additional one year periods. The facilities will be applied towards general corporate and working capital purposes (including the financing of acquisitions and capital expenditures). Completion of the agreements remains subject to mutually agreed customary closing conditions. Total Specific Solutions is a leading provider of IT business solutions and consists of independent business units that deliver products and services to their specific vertical market segment. This market expertise is based on decades of experience. In particular, TSS is active in the following vertical software markets: healthcare, local and central government, retail, financial, legal services and real estate. TSS is part of Constellation Software Inc., listed on the Toronto Stock Exchange.
BACKGROUND OF INVENTION SUMMARY OF INVENTION DETAILED DESCRIPTION Two-Layered Laminated Sheet Three-Layered Laminated Sheet Sandwich Laminated Sheet Methods for Making Laminated Sheets Double-Sided Overflow Fusion Pipe Single-Sided Overflow Fusion Pipe Multi-Compartment Overflow Fusion Pipe Down Draw Process Method of Forming a Two-Layered Laminated Sheet using a Single-Sided and a Double-Sided Overflow Fusion Pipe Method of Forming a Three-Layered Laminated Sheet using Two Single-Sided and a Double-Sided Overflow Fusion Pipes Method of Forming a Two-Layered Laminated Sheet using Two Single-Sided Overflow Fusion Pipes Method of Forming a Two-Layered Laminated Sheet Using Two Double-Sided Overflow Fusion Pipes Method of Forming a Two-Layered Laminated Sheet Using a Single-Overflow Fusion Pipe and a Slot Draw Fusion Pipe Method for Forming a Two-Layered Laminated Sheet Using a Double-Sided Overflow Fusion Pipe with a Slot Draw Device Method of Forming a Two-Layered Laminated Sheet Using a Continuous Sol-Gel Process and a Single-Sided Overflow Fusion Pipe Method of Making a Sandwich Laminated Sheet Method for Applying Coating to a Fusion-Formed Surface Method of Making a Laminated Sheet with a Glass-Ceramic Layer The invention relates generally to substrates, such as those used in manufacturing flat panel displays, and method of making the same. Display components, e.g., thin film transistors (TFTs), color filters, and organic light emitting diodes (OLEDs), are typically fabricated on glass substrates. Although, glass has desirable optical properties for display and other applications, it is relatively heavy and easily broken. From the foregoing, there is desired a substrate for applications such as displays, other active electronic devices, and optical device packaging that has a high mechanical strength and low thermal shrinkage. In one aspect, the invention relates to a laminated sheet which comprises a surface layer having an optical surface that is of fire-polished quality and a core layer having a higher modulus than the surface layer to increase an overall stiffness of the laminated sheet. In another aspect, the invention relates to a laminated sheet which comprises a compressive surface layer having an optical surface that is of fire-polished quality and a core layer, wherein the thermal expansion coefficients of the surface and core layers are adjusted to control stress and enhance fracture toughness of the laminated sheet. In another aspect, the invention relates to a laminated sheet which comprises a surface layer having an optical surface that is of fire-polished quality, a core layer having a higher modulus than the surface layer to increase an overall stiffness of the laminated sheet, and a sacrificial layer interposed between the surface layer and the core layer. In another aspect, the invention relates to a laminated sheet which comprises a core layer, a surface layer disposed on a first side of the core layer, the surface layer having an optical surface that is of fire-polished quality, and a bottom layer disposed on a second side of the core layer, wherein the core layer has a higher section modulus than the surface layer and the bottom layer to increase an overall stiffness of the laminated sheet. In another aspect, the invention relates to a method of making a laminated sheet which comprises supplying a first viscous, flowable material into an overflow channel, overflowing the first viscous, flowable material in a controlled manner to form a first sheet-like flow having at least one untouched surface of fire-polished quality, depositing at least a second material on a surface of the first sheet-like flow to form a laminated flow, and drawing the laminated flow into a laminated sheet. In another aspect, the invention relates to a method of making a laminated sheet which comprises supplying a viscous, flowable material into an overflow channel, positioning a consumable material in a flow path of the viscous, flowable material so as to introduce a compositional variation to a specific portion of the viscous, flowable material, overflowing the viscous, flowable material in a controlled manner to form a sheet-like flow having at least one untouched surface of fire-polished quality, and drawing the sheet-like flow into a laminated sheet. In another aspect, the invention relates to a method of making a laminated sheet which comprises forming a first sheet-like flow by a continuous sol-gel process, supplying a viscous, flowable material into an overflow channel, overflowing the viscous, flowable material in a controlled manner to form a second sheet-like flow, fusing the second sheet-like flow with a surface of the first sheet-like flow to form a laminated flow, and drawing the laminated flow into a laminated sheet. In another aspect, the invention relates to a method of making a laminated sheet which comprises supplying a first and a second viscous, flowable material into independent compartments in an overflow channel, simultaneously overflowing the first and second viscous, flowable materials to form separate flow streams, uniting the separate flow streams into a single sheet-like laminated flow, and drawing the sheet-like laminated flow into a laminated sheet. In another aspect, the invention relates to a method of making a laminated sheet which comprises drawing a first viscous, flowable material through a slot to form a first sheet-like flow, supplying a second viscous, flowable material into an overflow channel and overflowing the second viscous, flowable material from the overflow channel in a controlled manner to form a second sheet-like flow having an untouched surface of fire-polished quality, merging the second sheet-like flow with a surface of the first sheet-like flow to form a laminated flow, and drawing the laminated flow into a laminated sheet. In another aspect, the invention relates to a method of making a laminated sheet which comprises supplying a viscous, flowable material into an open channel, simultaneously overflowing the viscous, flowable material from a first side of the open channel and drawing the viscous, flowable material from a second side of the open channel, wherein the viscous, flowable material drawn from the second side of the open channel forms a sheet-like flow, wherein the viscous, flowable material overflowed from the first side of the open channel forms two separate flow streams having untouched surfaces of fire-polished quality, merging each of the flow streams with a surface of the sheet-like flow to form a laminated flow, and drawing the laminated flow into a laminated sheet. In another aspect, the invention relates to a method of making a laminated sheet which comprises obtaining a sheet of material, supplying a first viscous, flowable material to a first overflow channel, overflowing the first viscous, flowable material in a controlled manner to form a sheet-like flow with an untouched surface of fire-polished quality, and, while the sheet-like flow is in viscous, flowable form, merging the sheet-like flow with a surface of the sheet of material. In another aspect, the invention relates to a method of making a laminated sheet which comprises supplying a first viscous, flowable material to a first overflow channel and a second viscous, flowable material to a second overflow channel, overflowing the first viscous, flowable material from the first overflow channel in a controlled manner to form a first sheet-like flow with at least one untouched surface of fire-polished quality, wherein the viscous, flowable material drawn from the second side of the open channel forms a sheet-like flow, wherein the viscous, flowable material overflowed from the first side of the open channel forms two separate flow streams having untouched surfaces of fire-polished quality, merging each of the flow streams with a surface of the sheet-like flow to form a laminated flow, drawing the laminated flow into a laminated sheet. In another aspect, the invention relates to an apparatus for forming a laminated sheet which comprises an overflow means for forming opposed sheet-like flows, wherein the overflow means has at least two independent compartments for receiving a viscous, flowable material, a forming means positioned below the overflow means for converging and uniting the opposed sheet-like flows into a single drawn sheet flow, means for pivotally adjusting the overflow means such that a surface of the overflow channel has a desired tilt angle with respect to the horizontal, and means for delivering a viscous, flowable material into the compartments. In another aspect, the invention relates to an apparatus for forming a laminated sheet which comprises an overflow channel for forming opposed sheet-like flows from a viscous, flowable material, a slotted channel positioned below the overflow channel for forming a drawn sheet-like flow, and a forming body positioned below the overflow channel for converging and uniting the opposed sheet-like flows with outer surfaces of the drawn sheet-like flow to form a laminated flow. The apparatus further includes means for pivotally adjusting the overflow channel such that a surface of the overflow channel has a desired tilt angle with respect to the horizontal and means for delivering a viscous, flowable material into the overflow channel. Other features and advantages of the invention will be apparent from the following description and the appended claims. The invention will now be described in detail with reference to a few preferred embodiments, as illustrated in accompanying drawings. In the following description, numerous specific details are set forth in order to provide a thorough understanding of the invention. It will be apparent, however, to one skilled in the art, that the invention may be practiced without some or all of these specific details. In other instances, well-known features and/or process steps have not been described in detail in order to not unnecessarily obscure the invention. The features and advantages of the invention may be better understood with reference to the drawings and discussions that follow. The inventors propose herein a substrate that can be used for fabricating displays, especially flat panel displays. The substrate may also be used for other applications benefiting from a surface with high optical flatness, such as active electronic devices, photovoltaic devices, and substrates for biological arrays. In one embodiment, the substrate is a laminated sheet having a surface layer that exhibits optimal properties for enduring direct chemical and thermal interaction with display manufacturing processes and a core layer that has a higher elastic modulus than the surface layer for enhancing the overall mechanical stiffness of the laminated sheet. In one embodiment, the surface layer has a fusion-formed optical surface that is pristine and of fire-polished quality and a uniform thickness and flatness that satisfy display application requirements. In one embodiment, the core layer is separable from the surface layer, leaving a final product, i.e., the surface layer, that is thin and meets display application requirements. In general, the materials used in forming the layers in the laminated sheet are selected such that the optical, electrical, chemical, and mechanical properties of the laminated sheet are optimized for the target application. For example, the materials can be selected such that the laminated sheet has a low density and is flexible, tough, and transparent. For the fusion-formed layers, the layer-forming materials should have viscoelastic characteristics. Examples of materials exhibiting viscoelastic characteristics are glass and polymer. The laminated sheet may be made of multiple materials with different elastic moduli, which could include, but are not limited to, glasses and polymers and/or their precursors such as curable monomers and oligomers, or multiple polymers, or glasses, including low-melting glasses, glass-ceramics, nanocomposites, and any combination thereof. The laminated sheet may include additional layers besides the surface layer and the higher modulus core layer. For example, the laminated sheet may include interlayers with thermal expansion coefficients tailored to manage residual stress upon cooling. As another example, should the outermost surface layer require additional optical functionality, the pristine, fire-polished quality need not be maintained. For example, one of ordinary skill in the art will recognize that optically functional layers, such as microlens arrays or polarizers, could be added to any of the laminated sheets described herein. One of ordinary skill in the art will also recognize that the laminated sheet with fire-polished surface quality could also be achieved with a redraw-type process, for example, redrawing of a slot-drawn laminated sheet. Specific laminated sheet structures will now be described with reference to the accompanying drawings. FIG. 1 10 12 14 12 14 12 16 16 12 14 12 12 10 12 shows a two-layered laminated sheet having a surface layer and a core layer . The surface layer and the core layer may be single layers, as illustrated in the figure, or may be made of sub-layers. The surface layer has a fusion-formed optical surface that can serve as a basis for fabricating functional elements (not shown), such as, but not limited to, TFTs, OLEDs, or color filters. The fusion-formed optical surface is untouched by a forming device, e.g., uncontaminated by refractory material, and has a fire-polished surface quality. The surface layer has a uniform thickness and a flatness that meet display application requirements. The core layer has a higher elastic modulus than the surface layer and provides mechanical support to the surface layer such that the structural integrity of the laminated sheet is maintained while packaging and fabricating functional elements (not shown) on the surface layer . 14 10 10 14 14 10 Preferably, the outer extent of the core layer is placed as far as possible from the neutral axis of the thickness of the laminated sheet . This is because the section modulus of the laminated sheet depends on the square of the distance of the higher modulus layer from the neutral axis. Thus, the farther away the outer extent of the core layer is from the neutral axis of the thickness of the laminated sheet, the higher the section modulus and the mechanical stiffness of the laminated sheet . 12 14 In one embodiment, the surface and core layers , are made of glasses and/or polymers or glasses and/or glass-ceramics. Examples of glasses include, but are not limited to, alkaline-earth boro-aluminosilicate, zinc borosilicate, and soda-lime glass. Examples of polymers include, but are not limited to, poly perfluorocyclobutane ether, polycyclic olefin, polyamide, polyether-sulfone (PES), polyarylate, polycarbonate, poly ethylene terphthalate (PET), poly ethylene naphthalate (PEN), poly methyl methacrylate (PMMA), and poly vinyl butyral (PVB). Examples of glass-ceramics include, but are not limited to, glasses enriched with magnesium oxide, yttria, berylia, alumina, or zirconia. 12 14 12 14 12 14 12 14 12 14 Preferably, the materials used in forming the surface and core layers , are transparent. The type of materials used in forming the surface and core layers , can be the same or can be different. For example, the surface and core layers , may both be made of glass or of polymer. Alternatively, the surface layer may be made of glass and the core layer of polymer, and vice-versa. Alternatively, the surface layer may be made of glass and the core layer made of glass-ceramic. Typically, the layer-forming materials are selected based on the display application requirements. For example, display applications involving fabrication of low-temperature poly-silicon (LTPS) TFTs typically require a substrate that has a high strain point, e.g., greater than 600° C., in order to minimize shrinking and/or warping when the substrate is heated. These applications also generally require a substrate having a thermal behavior that is similar to that of silicon. 12 14 10 10 12 14 In general, the materials used in forming the surface and core layers , will be selected to achieve a desired thermal expansion behavior when the laminated sheet is heated. Of particular interest in display applications is to select the materials such that the overall shrinkage of the laminated sheet due to heating is negligible. The layer-forming materials may also be selected to achieve low density, flexibility, toughness, transparency, and, possibly, low permeation to moisture and gas. The optical properties of the surface layer can be optimized for the target application, while the mechanical properties of the core layer can be optimized to achieve, for example, a desired toughness and flexibility. 14 12 14 12 14 12 14 12 12 10 12 14 12 12 14 12 12 In one embodiment, the core layer is separable from the surface layer by means such as thermal, chemical, mechanical, electromagnetic radiation, or other means. In one embodiment, separation of the core layer from the surface layer is achieved by selecting the material used in forming the core layer to be more soluble in an appropriate solvent than the material used in forming the surface layer . The advantages of making the core layer separable from the surface layer are significant. The surface layer can be made as thin as necessary to meet display application requirements, e.g., thinner than 1 mm. During handling and packaging of the laminated sheet and fabrication of functional elements on the surface layer , the core layer would provide the required mechanical support to the surface layer . After adding function to the surface layer , the core layer can then be separated from the surface layer , leaving the thin surface layer that meets display application requirements. 14 12 14 14 14 12 14 14 14 12 When the core layer is separable from the surface layer , there is a wider latitude in selecting the material used in the core layer , i.e., the core layer does not have to satisfy the stringent requirements required for display applications since it will not be a part of the final product. Thus, for example, the core layer may be made of a cheap glass or polymer or glass-ceramic that provides the desired mechanical stiffness to the surface layer . The core layer may also be made of a material that has a low thermal shrinkage, e.g., a well-annealed glass. Alternatively, the core layer may be made of a material that can be expanded to achieve zero thermal shrinkage, e.g., a foam material such as polystyrene. The core layer can be made as thick as necessary to provide the necessary mechanical support to the surface layer and does not need to have a fusion-formed optical surface that is pristine and of fire-polished quality. 10 18 16 10 18 18 14 10 12 14 FIG. 2 One or more layers of coatings can be added to the laminated sheet . For example, shows a coating layer formed on the optical surface of the laminated sheet . The coating layer could be made of a metal, semiconducting, or nonmetallic organic or inorganic material. In one embodiment, the coating layer could act as a barrier to the environment, e.g., act to reduce gas and moisture permeation. A protective coating (not shown) may also be added to the core layer . Other types of coating may also be added to the laminated sheet , such as an optical coating, which will enhance the optical properties of the surface layer and/or core layer , or a conductive coating, which can be used as a basis for fabricating active electronic devices, such as electrodes, diodes, or transistors, or a dark or dark color coating that can enhance the contrast of the display, or a reflective metal coating that can enhance the brightness of the display, etc. FIG. 3 FIGS. 1 and 2 20 22 24 26 22 26 22 28 28 26 22 22 10 20 shows a three-layered laminated sheet which includes a surface layer , a sacrificial interlayer , and a core layer . The surface layer and the core layer may be single layers, as illustrated in the figure, or may be made of sub-layers. The surface layer has a fusion-formed optical surface that can serve as a basis for fabricating active and passive electronic devices. The fusion-formed optical surface is untouched by a forming device, e.g., uncontaminated by refractory material, and has a fire-polished surface quality. The core layer has a higher elastic modulus than the surface layer and provides mechanical support to the surface layer , as previously described above. Much of the discussions above concerning materials to use in the two-layered laminated sheet ( in ) also apply to the three-layered laminated sheet . 24 22 26 22 26 24 22 26 22 24 24 26 22 22 24 FIG. 1 The sacrificial interlayer couples the surface layer to the core layer and may be removed so as to allow the surface layer to be separated from the core layer . For example, the sacrificial interlayer may be made of a material that is more soluble in an appropriate solvent than at least the material used in the surface layer . In this way, the core layer can be separated from the surface layer by dissolving the sacrificial interlayer away. The advantage of this embodiment over the one shown in is that the sacrificial interlayer can be made very thin so that the amount of material to be dissolved away is very small. In this way, the core layer can be made as thick as necessary to provide the necessary mechanical support to the surface layer while it is coupled to the surface layer through the sacrificial interlayer . 20 30 28 20 30 30 26 20 22 26 FIG. 4 One or more layers of coatings may be added to the laminated sheet . For example, shows a coating layer formed on the optical surface of the laminated sheet . The coating layer could be made of a metal, semiconducting, or nonmetallic organic or inorganic material. In one embodiment, the coating layer could act as a barrier to the environment, e.g., act to reduce gas and moisture permeation. A protective coating (not shown) may also be added to the core layer . Other types of coating may also be added to the laminated sheet , such as an optical coating, which will enhance the optical properties of the surface layer and/or core layer , or a conductive coating, which can be used as a basis for fabricating active electronic devices, such as electrodes, diodes, or transistors, or a dark or dark color coating that can enhance the contrast of the display, or a reflective metal coating that can enhance the brightness of the display, etc. FIG. 5 32 34 36 38 36 34 38 34 36 38 34 40 40 38 34 34 38 36 34 38 34 38 32 36 34 shows a laminated sheet having a surface layer , a core layer , and a bottom layer , where the core layer is sandwiched between the surface layer and the bottom layer . The surface layer , core layer , and bottom layer may be single layers, as illustrated in the figure, or may be made of sub-layers. The surface layer has a fusion-formed optical surface that can serve as a basis for fabricating functional elements (not shown), such as TFTs, OLEDs, or color filters. The fusion-formed optical surface is untouched by a forming device, e.g., uncontaminated by refractory material, and has a fire-polished surface quality. The bottom layer is generally non-functional and does not necessarily have to meet the stringent requirements for the surface layer . The surface and bottom layers , can be made very thin. The core layer can be made much thicker than the surface and bottom layers , and may have a higher section modulus than the surface and bottom layers , so as to improve the overall structural integrity of the laminated sheet . The core layer can be made of a low thermal shrinkage material that will constrain the shrinkage of the laminated sheet while undergoing cyclic thermal history. 32 34 38 36 34 36 38 32 36 36 34 38 Generally speaking, the higher strength of the laminated sheet comes from the surface layer that is resistant to compression, the bottom layer that is resistant to tension, and the core layer that is resistant to shear stress. In one embodiment, the thermal expansion coefficients of the surface layer , the core layer , and the bottom layer are adjusted to control stress and enhance fracture toughness of the laminated sheet . If desired, function can be added to the core layer . For example, the core layer can be optically enhanced to enhance the brightness and/or enlarge viewing angle of the display. As described for the two-layered and three-layered laminated sheets above, one or more coating layers (not shown), e.g., protective coating, optical coating, or conductive coating, may be added to the surface layer and/or the bottom layer . The inventors propose herein a method of making a laminated sheet having at least one fusion-formed optical surface that is pristine and of fire-polished quality. The method of the invention can also be used to add one or more layers of coating to the laminated sheet. The coating layer may be protective, e.g., reduce gas and moisture permeation. The coating layer may enhance the optical properties of the substrate, e.g., enhance brightness or enlarge viewing angle. The coating layer may be conductive or have other functional characteristics In general, the methods for making the laminated sheets of the invention start with formation of a sheet of material by a fusion process. In the fusion process, a viscous, flowable material flows into an overflow channel and then overflows in a controlled manner from one side or both sides of the overflow channel, depending on the configuration of the fusion-forming device, to form a sheet-like flow. The other layers of the laminated sheet may be formed by depositing other materials on one or both surfaces of the sheet-like flow. The thickness of the layers are controlled to achieve a laminated sheet having a desired thickness. The viscous, flowable material(s) used in forming the layers of the laminated sheets may be materials such as, but not limited to, a glass melt or polymer melt. In some embodiments, the viscous, flowable material(s) may be a base glass melt that can, with the addition of one or more elements or oxides, be readily transformed into several specific glasses. The elements or oxides could be nucleating agents for a glass-ceramic, with the base glass being the precursor glass without these agents or with these agents below a critical composition level. The elements or oxides could also be glass components that would cause a significant, controlled change in the resulting elastic modulus of the formed layer. Recent advances in modeling of the fusion process using computational fluid dynamics make possible the mapping of the precise location in the delivery system of the glass (or polymer) that ultimately ends up at any location in the finished sheet. Thus, elements or oxides can be introduced to the glass melt according to a computer-model-generated map to produce a final fusion drawn sheet having the desired layered structure. The oxides or elements could be introduced, for example, by positioning blocks of consumable (dissolvable) material containing the oxides or elements at specific positions in the fusion pipe to achieve the desired layered structure. FIG. 6A 42 44 46 48 50 44 50 52 54 56 56 50 58 60 58 50 shows a double-sided overflow fusion pipe having a wedge-shaped forming body bounded by converging sidewalls , . An overflow channel is formed in the upper portion of the forming body . The overflow channel is bounded by sidewalls (or dams) , and a contoured bottom surface . The shape of the contoured bottom surface is such that the height of the overflow channel decreases as it extends outwardly from the channel inlet to the dam . In operation, a delivery pipe (not shown) would be connected to the channel inlet for delivery of a viscous, flowable material to the overflow channel . 42 62 52 54 52 54 50 The fusion pipe can be pivotally adjusted by any suitable means, such as roller, wedge, or cam , such that the upper surfaces of the dams , have a desired tilt angle with respect to the horizontal. The tilt angle of the dams , , the rate at which a viscous, flowable material is supplied to the overflow channel , and the viscosity of the flowable material can be selected such that a single sheet-like flow having a uniform thickness is formed. FIG. 6B 64 58 64 50 64 52 54 46 48 44 64 64 44 64 64 66 66 66 a b a b a b In operation, a viscoelastic material, e.g., a glass or polymer material, is blended, melted, and stirred well. As shown in , the homogeneous flowable viscoelastic material is then delivered to the channel inlet . The flowable viscoelastic material has a low effective head that allows it to flow up the overflow channel without surge or agitation. The flowable viscoelastic material wells over the dams , and flows down the converging sidewalls , of the forming body as flow streams , . At the bottom of the forming body , the separate flow streams , rejoin to form a single sheet-like flow with pristine surfaces , of fire-polished surface quality. 66 46 48 64 64 46 48 64 50 a b The initial thickness of the sheet-like flow is determined by the amount of material flowing down the converging walls , , where the amount of material , flowing down the converging walls , is dependent on the head pressure of the flowable viscoelastic material and the geometry of the overflow channel . FIG. 7A 70 72 74 76 78 72 78 82 84 86 82 84 84 88 78 78 86 78 88 80 shows a single-sided overflow fusion pipe having a wedge-shaped forming body bounded by a straight sidewall and a converging sidewall . An overflow channel is formed in the upper portion of the forming body . The overflow channel is bounded by sidewalls (or dams) , and a contoured bottom surface . The dam is higher than the dam , so that overflow occurs only at the dam . In operation, a delivery pipe (not shown) would be connected to the inlet of the overflow channel for delivery of a viscous, flowable material to the overflow channel . The shape of the contoured bottom surface is such that the height of the overflow channel decreases as it extends outwardly from the inlet to the dam . 70 90 82 84 82 84 78 The fusion pipe can be pivotally adjusted by any suitable means, such as roller, wedge, or cam , such that the upper surfaces of the dams , have a desired tilt angle with respect to the horizontal. The tilt angle of the dams , , the rate at which a viscous, flowable material is supplied to the overflow channel , and the viscosity of the flowable material can be selected such that a single sheet-like flow having a uniform thickness is formed. FIG. 7B 102 88 102 78 102 84 76 72 104 104 104 76 a b In operation, a viscoelastic material, e.g., a glass or polymer material, is blended, melted, and stirred well. As shown in , the homogeneous flowable viscoelastic material is then delivered to the channel inlet . The flowable viscoelastic material has a low effective head that allows it to flow into the overflow channel without surge or agitation. The flowable viscoelastic material wells over the dam and flows down the converging sidewall of the forming body to form a single sheet-like flow with pristine surface of fire-polished surface quality. The surface is not pristine because it makes contact with the converging sidewall . 104 102 76 102 76 102 78 The initial thickness of the sheet-like flow is determined by the amount of material flowing down the converging sidewall , where the amount of material flowing down the converging sidewall is dependent on the head pressure of the flowable viscoelastic material and the geometry of the overflow channel . FIG. 8A 106 107 108 110 112 114 107 112 118 120 122 120 118 118 114 120 124 126 120 124 124 128 129 112 114 122 126 112 114 128 129 131 shows an overflow fusion pipe having a wedge-shaped forming body bounded by converging sidewalls , . Independent overflow channels , are formed in the upper portion of the forming body . The overflow channel is bounded by sidewalls (or dams) , and a contoured bottom surface . The dam is higher than the dam so that overflow occurs only at the dam . The overflow channel is bounded by sidewalls (or dams) , and a contoured bottom surface . The dam is higher than the dam so that overflow occurs only at the dam . In operation, delivery pipes would be connected to the inlets , of the overflow channels , , respectively. The shapes of the contoured bottom surfaces , are such that the height of the overflow channels , decrease as they extend outwardly from the inlets , to the dam . FIG. 8B FIG. 8A FIG. 8B 130 128 132 129 130 132 112 114 130 132 118 124 108 110 107 107 130 132 134 134 134 a b In operation, as shown in , a first flowable viscoelastic material is delivered to the channel inlet ( in ) and a second flowable viscoelastic material is delivered to the channel inlet ( in ). The flowable viscoelastic materials , have a low effective head that allows them to flow into the overflow channels , , respectively, without surge or agitation. The flowable viscoelastic materials , well over the dams , , respectively, and flow down the converging sidewalls , of the forming body . At the bottom of the forming body , the materials , merge to form a laminated, sheet-like flow with pristine surfaces , of fire-polished surface quality. 134 130 132 108 110 130 132 108 110 130 132 112 114 The initial thickness of the sheet-like flow is determined by the amount of materials , flowing down the converging sidewalls , , where the amount of materials , flowing down the converging sidewalls , are dependent on the head pressure of the viscous, flowable materials , and the geometry of the overflow channels , . FIG. 9A 140 140 142 142 142 Various types of overflow fusion pipes have been described above for forming a sheet-like flow. The fusion process further includes drawing the sheet-like flow into a sheet with a desired thickness. shows a drawing device according to an embodiment of the invention. The drawing device includes a channel for receiving a sheet-like flow (not shown). The channel is shown as vertical but could also have some other orientation, e.g., horizontal. A vertical channel is generally preferred because drawing is favored under vertical conditions due to the effect of gravity. The width of the channel determines the width of the final sheet (not shown). Typically, the cross-draw dimension of the final sheet is greater than about 4 feet. However, a sheet having a small cross-draw dimension may also be formed. 144 142 142 146 142 146 148 146 Sets of rollers (or edge guides) are positioned along the length of the channel to convey the sheet-like flow (not shown) through the channel and to control (attenuate) the thickness of the sheet-like flow. A series of heated zones are defined inside the channel . The heated zones become progressively cooler in the direction shown by the arrow . The zones may be heated by electrical heating elements, induction heaters, or other heating means (not shown). FIG. 9B FIG. 9C 150 152 142 150 142 142 144 150 150 142 144 150 150 142 150 150 shows a sheet-like flow advancing from a fusion pipe into the channel . The sheet-like flow may be guided into the channel by means of edge guides (not shown). Referring to , inside the channel , paired rollers gently grip (or press against) the vertical edges of the sheet-like flow and convey the sheet-like flow down the channel . The spacing between each of the paired rollers is such that the thickness of the sheet-like flow is gradually reduced as the sheet-like flow is conveyed down the channel . If necessary, temperature can be used to “tweak” the thickness of the sheet-like flow , i.e., a hot or cold spot can be applied to selected regions of the flow to thin or thicken the flow . 150 146 154 142 154 154 144 FIG. 9D As the sheet-like flow is conveyed through the cooler regions of the heated zones , it is formed into a very flat and uniform sheet. shows the sheet coming out of the channel . The sheet can be scored and cut as necessary, Typically, the vertical edges of the sheet , which have been in contact with the rollers , would have to be trimmed off because they are not pristine. FIG. 10 FIG. 6A FIG. 7A 156 156 42 70 42 70 42 70 42 70 shows an apparatus for making a two-layered laminated sheet. The apparatus includes the double-sided overflow fusion pipe (previously shown in ) and the single-sided overflow fusion pipe (previously shown in ). The double-sided overflow fusion pipe is placed above the single-sided overflow fusion pipe . In general, the fusion pipes , are arranged in a manner that allows the sheet-like flow produced by the fusion pipe to be merged with the sheet-like flow produced by the fusion pipe . 78 42 158 158 52 54 46 48 158 158 158 158 42 160 a b a b In operation, the overflow channel in the fusion pipe is filled with a first flowable viscoelastic material , e.g., a glass or polymer material. The flowable viscoelastic material wells over the dams , and flows down the converging sidewalls , as separate flow streams , . The flow streams , rejoin at the bottom of the fusion pipe to form a single sheet-like flow . 78 70 162 162 84 76 162 162 160 160 164 164 164 164 164 140 a a b FIG. 9A Similarly, the overflow channel in the fusion pipe is filled with a second flowable viscoelastic material , e.g., a glass or polymer material. The viscous, flowable material wells over the dam and flows down the converging sidewall to form a single sheet-like flow . The single sheet-like flow merges with the surface of the single sheet-like flow to form a laminated flow . The surfaces , of the laminated flow are pristine and of fire-polished surface quality. The laminated flow is then drawn into a sheet using the drawing device ( in ). 164 164 a b It should be noted that either of the surfaces , can serve as a basis for forming functional elements because they are both pristine. In general, the final thickness and optical characteristics of each layer of the laminated sheet will determine whether the layer can act as a surface layer or a core layer. 156 70 170 164 164 168 168 140 168 70 70 FIG. 10 FIG. 11 FIG. 9A b a b. The apparatus shown in can be easily modified to form a three-layered sheet. As shown in , another single-sided overflow fusion pipe can be used to form a single sheet-like flow , which can then be merged with the surface of the sheet-like flow to form a three-layered laminated flow . The laminated flow can be drawn into a sheet using the drawing device ( in ). One or more layers can be added to the laminated flow using additional single-sided overflow fusion pipes, positioned below the overflow fusion pipes , FIG. 12 FIG. 5 166 166 70 70 70 70 70 70 70 shows an apparatus for making a two-layered laminated sheet. The apparatus includes two of the single-sided overflow fusion pipes (previously shown in ), herein identified as fusion pipes R and L. The fusion pipes R and L are positioned at the same height. However, if desired, one fusion pipe can be elevated above the other. In general, the fusion pipes R and L are positioned such that the sheet-like flows they produce merge to form a single laminated flow. 174 78 176 78 174 176 84 84 76 76 178 180 178 180 182 182 182 182 140 182 70 70 a b FIG. 9A In operation, a first viscoelastic material , e.g., a glass or polymer material, is supplied to the overflow channel L. At the same time, a second viscoelastic material , e.g., a glass or polymer material, is supplied to the overflow channel R. The viscoelastic materials , well over the dams L, R, respectively, and flow down the converging sidewalls L, R, respectively, to form the single sheet-like flows , , respectively. The single-sheet like flows , merge to form a laminated flow with pristine surfaces , of fire-polished surface quality. The laminated flow is then drawn into a sheet using the drawing device ( in ). Layers can be added to the laminated flow by positioning one or more single-sided overflow fusion pipes below the fusion pipes L, R. 182 182 a b Again, either of the surfaces , can serve as a basis for forming functional elements because they are both pristine. In general, the final thickness and optical characteristics of each layer of the laminated sheet will determine whether the layer can act as a surface layer or a core layer FIG. 13 FIG. 6A 184 184 42 42 42 42 42 42 42 42 42 186 42 42 186 192 194 186 shows an apparatus for making a two-layered laminated sheet. The apparatus includes two of the double-sided overflow fusion pipes (previously shown in ), herein identified as fusion pipes R and L. The fusion pipes R L are spaced apart horizontally. The fusion pipe L is elevated above the fusion pipe R. Below the fusion pipes R, L is a float bath . The fusion pipes R, L are positioned such that the sheet-like flows they produce can be transitioned from the vertical to the horizontal and floated on the float bath . Edge guiding devices , , such as rollers, could be provided to guide the sheet-like flows from the vertical orientation to the horizontal orientation. The float bath could be a bed of air, molten tin, molten polymer, or other floating material that is compatible with the materials that will be used in forming the laminated sheet. 42 42 187 189 187 189 52 54 52 54 188 190 188 186 192 186 190 188 194 188 195 195 186 140 184 FIG. 9A In operation, the fusion pipes L, R are filled with viscous, flowable materials , , respectively. The viscous, flowable materials , overflow the dams L, L and R, R, respectively, to form the sheet-like flows , . The sheet-like flow is guided to the float by edge guides and floated on the float bath . The sheet-like flow is guided to the sheet-like flow by edge guide(s) and merged with the sheet-like flow to form a laminated flow . The laminated flow can be transitioned from the float bath into the drawing device ( in ) for drawing into a laminated sheet. Additional double-sided overflow fusion pipes and/or single-sided overflow fusion pipes can be added to the apparatus to make a laminated sheet with more than two layers. FIG. 14 196 196 70 198 198 200 202 204 200 206 202 204 202 206 208 78 70 210 84 76 212 208 212 214 214 214 198 208 206 214 b a shows an apparatus for making a two-layered laminated sheet. The apparatus includes a single-sided overflow fusion pipe and a slot draw device . The slot draw device includes a forming body having a channel for receiving a viscous, flowable material . The forming body also includes a longitudinal slot which is connected to the channel . The viscous, flowable material in the channel flows down the slot to form a sheet-like flow . The overflow channel in the fusion pipe is also filled with a viscous, flowable material , which wells over the dam and flows down the converging sidewall to form a sheet-like flow . The sheet-like flows , merge to form a laminated flow with a pristine surface . The other surface is not pristine because it contacts the slot draw device as the sheet-like flow flows down the slot . The laminated flow can be drawn into a laminated sheet as previously described. FIG. 15 216 216 218 220 222 224 218 226 218 226 218 228 230 224 232 234 220 222 218 230 230 236 226 228 238 230 230 238 238 238 240 a b a b a b shows another type of double-sided overflow fusion pipe that allows a laminated sheet to be formed via a combination of a fusion process and a slot draw process. The fusion pipe has a forming body bounded by converging sidewalls , . An overflow channel is formed in the upper portion of the forming body . A channel is formed in the base of the forming body . The channel opens to the bottom of the forming body through a longitudinal slot . Viscous, flowable material in the overflow channel wells over the dams , and flows down the converging walls , of the forming body as flow streams , , respectively. Viscous, flowable material in the channel flows down the longitudinal slot as a sheet-like flow . The separate streams , merge with the surfaces , of the sheet-like flow to form a laminated flow . FIG. 16B FIG. 16B FIG. 16A 215 215 217 219 217 219 217 221 217 223 217 219 225 227 229 231 233 219 shows another type of double-sided overflow fusion pipe that allows a laminated sheet to be formed via a combination of a fusion process and a slot draw process. The fusion pipe has a forming body . A channel is formed in the forming body . As shown in , the channel runs through the forming body and has an opening at the top of the forming body and an opening at the bottom of the forming body . Returning to , the channel is bounded by sidewalls (or dams) , , . An inlet is provided for feeding a viscous, flowable material into the channel . 233 225 227 223 223 235 225 227 237 239 235 241 241 140 241 235 237 239 FIG. 9A In operation, the viscous, flowable material is simultaneously flowed over the dams , and drained (or drawn) through the opening . The viscous, flowable material drained through the opening forms a sheet-like flow . The viscous, flowable material flowed over the dams , forms two separate flow streams , , which are merged with the surfaces of the sheet-like flow to form a three-layered laminated flow . The laminated flow can be drawn into a sheet using the drawing device ( in ). Note that in this case, all the layers of the laminated flow are made of the same material, but the center core layer (formed by the sheet-like flow ) can be much thicker than the outer layers (formed by the flow streams , ) to provide the laminated sheet with enhanced mechanical stiffness. FIG. 17 FIG. 9A 242 244 244 70 246 244 244 248 140 244 244 a b In , a continuous sol-gel process, indicated as , is used to produce an aerogel , which forms the core of a laminated sheet. The aerogel has a continuous porosity and can be prepared as a transparent, porous solid. A single-sided overflow fusion pipe is then used to form a sheet-like flow which is merged with a surface of the aerogel to form a two-layered laminated flow , which can be drawn into a sheet using the drawing device ( in ). To form a sandwich (or three-layered) laminated sheet, another single-sided overflow fusion pipe (not shown) can be used to form a sheet-like flow (not shown), which can be merged with the surface of the aerogel . The sol-gel process is well-known. The process generally involves preparing a “sol” using inorganic metal salts or metal organic compounds such as metal alkoxides. The starting materials are typically subjected to a series of hydrolysis and condensation reactions to form a colloidal suspension, i.e., the “sol.” The sol undergoes a transition to a soft porous mass, called a “wet gel.” The liquid in the wet gel can be removed by either air drying or supercritical extraction to form the aerogel. The aerogel is typically rigid. The aerogel can be made flexible by adding fibers to the sol, allowing the fiber-reinforced sol to gel, and extracting liquid from the gel. FIG. 5 The methods described above can be used to form the sandwich laminated structure illustrated in . In another embodiment, the core of the sandwich laminated structure is prepared separately. Then, fusion processes are used to add layers to the core. One motivation for forming the core separately is to allow for additional steps to enhance the properties, such as mechanical and thermal properties, of the core. For example, the core of the sandwich structure may be a glass material that is subjected to annealing steps prior to forming of the sandwich structure. FIG. 18 250 70 70 252 254 70 70 256 258 256 258 250 250 250 a b shows a core substrate interposed between two single-sided overflow fusion pipes R, L. Viscous, flowable materials , are supplied to the fusion pipes R, L and allowed to overflow in a controlled manner to form sheet-like flows , , respectively. The sheet-like flows , merge with the surfaces , of the core substrate to form the sandwich structure, which is drawn to the desired thickness. FIG. 19 FIG. 6A 42 262 262 262 262 264 266 262 262 a b a In , the double-sided overflow fusion pipe (previously shown in ) is used to form a sheet-like flow with pristine surfaces , . While the sheet-like flow is still in viscous, flowable form, a slot/trough type delivery system is used to deliver a coating material to the surface of the sheet-like flow . 264 266 266 268 266 268 270 270 262 266 262 270 268 262 262 FIG. 20 a a b b Other delivery systems besides the slot/trough type delivery system can also be used to deliver the coating material . For example, shows the coating material being delivered via an overflow channel . The coating material is delivered into the channel and allowed to overflow in a controlled manner over the dam . The dam is positioned relative to the surface such that the coating material merges with the surface as it overflows from the dam . Another overflow channel (or other delivery system) can be provided to coat the other surface of the sheet-like flow . 262 262 266 262 262 266 262 266 272 a a a FIG. 21 Another method for coating the fusion-formed surface involves spraying the coating material on the fusion-formed surface . shows the coating material being sprayed on the surface of the sheet-like flow . The coating material can be sprayed while drawing down the sheet-like flow . If the coating material is a polymer, it can be subsequently cured, as indicated at , via radiation, microwave, or heat. 262 266 266 For all the coating methods described above, the sheet-like flow is very reactive when in flowable or molten form, allowing the coating material to form a strong bond with the surface(s) of the sheet-like flow without the use of an adhesive. The methods described above can be used to form a laminated sheet having a glass-ceramic layer with the modification that the nucleating agents for the glass-ceramic layer are introduced to the delivery system at appropriate locations. The nucleating agents can be introduced to the glass delivery system by positioning blocks of consumable material (containing the nucleating agents) at the appropriate locations in the delivery system. In one embodiment, the glass-ceramic layer is a buried within the laminated sheet. A method of forming such a buried laminate will now be described. FIG. 22A FIG. 22B 300 302 304 306 304 310 304 312 314 As previously discussed, recent advances in modeling of the fusion process make it possible to map the precise location in the delivery system that ultimately ends up at any location in the finished sheet. shows an example of such a map. The map indicates where to position blocks of consumable material in a melt to form a desired layered structure. The line demarcates the portion of the melt that will ultimately end up on the surface of the formed sheet. The line demarcates the portion of the melt that will be buried in the formed sheet. shows a surface glass composition corresponding to the surface layer of the formed sheet and a buried glass composition corresponding to the core layer of the formed sheet. 300 FIGS. 22A and 22B In operation, a melt having the compositional variation shown in, for example, the map of would be delivered to a double-sided overflow fusion pipe to form a sheet-like flow, as previously described. The final glass sheet would have a buried layer that includes elements from the consumable material. The final glass sheet can then be subjected to a ceraming process to form the buried glass-ceramic layer. It should be noted that the method described above can generally be used to form a laminated sheet having a buried layer with a composition that is different from the surface layer, where the consumable material is used to introduce the desired compositional variations. An alternative process for forming a laminated sheet with a glass-ceramic layer involves forming the glass-ceramic layer separately and then using a fusion process to add a surface layer to the glass-ceramic layer in a manner similar to the one described above for the sandwich laminated sheet. Those skilled in the art will understand that various combinations of the methods described above can be used to form laminated sheets. While the invention has been described with respect to a limited number of embodiments, those skilled in the art, having benefit of this disclosure, will appreciate that other embodiments can be devised which do not depart from the scope of the invention as disclosed herein. Accordingly, the scope of the invention should be limited only by the attached claims. BRIEF DESCRIPTION OF DRAWINGS FIG. 1 shows a two-layered laminated sheet according to one embodiment of the invention. FIG. 2 FIG. 1 shows a coating layer added to the laminated sheet of . FIG. 3 shows a three-layered laminated sheet according to another embodiment of the invention. FIG. 4 FIG. 3 shows a coating layer added to the laminated sheet of . FIG. 5 shows a laminated sheet having a sandwich structure according to another embodiment of the invention. FIG. 6A shows a perspective view of a double-sided overflow fusion pipe. FIG. 6B FIG. 6A shows a method for forming a sheet-like flow using the double-sided overflow fusion pipe of . FIG. 7A shows a perspective view of a single-sided overflow fusion pipe. FIG. 7B FIG. 7A shows a method for forming a sheet-like flow using the single-sided overflow fusion pipe of . FIG. 8A shows a perspective view of a multi-compartment overflow fusion pipe. FIG. 8B FIG. 8A shows a method for forming a laminated sheet-like flow using the multi-compartment overflow fusion pipe of . FIG. 9A shows a device for drawing a sheet-like flow into a sheet. FIG. 9B FIG. 9A shows a sheet-like flow advancing into the device of . FIG. 9C FIG. 9A shows a side view of the device shown in with a sheet-like flow being conveyed through the channel of the device. FIG. 9D FIG. 9A shows a sheet emerging from the device of . FIG. 10 illustrates a method of forming a two-layered laminated sheet using a double-sided overflow fusion pipe and a single-sided overflow fusion pipe. FIG. 11 illustrates a method of forming a three-layered laminated sheet using a double-sided overflow fusion pipe and two single-sided overflow fusion pipes. FIG. 12 illustrates a method of forming a two-layered laminated sheet using two single-sided overflow fusion pipes. FIG. 13 illustrates a method of forming a two-layered laminated sheet using two double-sided overflow fusion pipes. FIG. 14 illustrates a method of forming a two-layered laminated sheet using a single-sided overflow fusion pipe and a slot draw fusion pipe. FIG. 15 illustrates a method of forming a two-layered laminated sheet using a double-sided overflow fusion pipe with an integrated slot draw fusion device. FIG. 16A shows a perspective view of a double-sided overflow fusion pipe with a combined overflow and slot draw channel according to another embodiment of the invention. FIG. 16B FIG. 16A is a vertical cross-section of the fusion pipe shown in . FIG. 17 illustrates a method of forming a two-layered laminated sheet using a continuous sol-gel process and a single-sided overflow fusion pipe. FIG. 18 illustrates a method of forming a sandwich laminated sheet structure. FIG. 19 illustrates a method of applying a coating material on a fusion-formed surface. FIG. 20 shows a coating material delivered to a fusion-formed surface via an overflow channel. FIG. 21 shows a coating material being sprayed on a fusion-formed surface. FIGS. 22A and 22B show a mapping of locations in a viscous, flowable material carried through a delivery system to locations in a final sheet formed from the viscous, flowable material.
What Is a Interpretation Audit? A performance audit is an independent assessment of an entity’s operations to determine if specific programs or functions are working as aim to achieve stated goals. Performance audits are typically associated with government agencies at all levels as most administration bodies receive federal funding. Key Takeaways - A performance audit is an independent assessment of an entity’s operations, typically associated with direction agencies. - The goal is to evaluate the performance of stated programs to determine their effectiveness and make changes if needed. - The gonfanons for the audits are laid out by the U.S. Government Accountability Office (GAO). - The scope of a performance audit varies, but usually includes an assessment of effectiveness, effectiveness, and compliance with legal requirements. Understanding Performance Audits In government, a performance audit is designed to examine the productivity and effectiveness of a program, with the goal of implementing improvements. According to Generally Accepted Government Auditing Standards (GAGAS), the position “program” can include government entities, activities, organizations, programs, and functions. The standards for the audits are laid out by the U.S. Government Responsibility Office (GAO) and the principal aim is to provide objective data that may be used to reduce costs and make other improvements. The unequivocal objectives of an audit can vary. They may include effectiveness, economy, and efficiency of a program and compliance with legal musts. An audit’s scope is wide and can seek to determine fraud and wasteful processes that are a hindrance to the stated objectives of a program. Requirements for a Doing Audit The standards for the performance audit are laid out by the GAO and cover three areas: general, field, and reporting. General Ratings General standards cover matters such as professional judgment, quality control (QC), and competence of the Benefits of Performance Audits Positively a performance audit is completed, the findings are delivered to the management of the specific organization or program. The goal is for them to use the findings to instrument any changes to improve processes that will help them achieve the stated goals. Typically, a follow-up dispatch audit is done to assess whether management has implemented any of the audit findings and if there has been any improvement by doing so. Portrayal audits serve a fundamental purpose of government accountability. Through performance audits government entities are held to intent standards of executing the responsibilities that they are legally authorized and charged to carry out. Higher-level appointed staff and elected officials inspect the results of audits to oversee the proper, legal, and cost-effective operation of public services and programs. Publication of the results admits the public to see if certain programs are worth their tax dollars, and they can use the information to make educated voting decisions. Task Audits Performance audits are also implemented in the business sector and follow many of the same stated goals and takes. In the investment world, a performance audit may be conducted on an asset manager by an outside accounting firm to verify that the scene figures shown to the public represent actual results. The CFA Institute has established performance guidelines, called Global Investment Acting Standards (GIPS). Though voluntary, they help ensure full disclosure of investment practices.
https://alekbo.com/news-line/performance-audit-definition.html
Focus group discussion is a small group of consumers and specialists who meet to discuss a research topic under the guidance of a moderator. Typically one to two hours in length, a focus group discussion often includes from two to ten respondents. How do we conduct it? - Respondents are selected carefully to ensure that they are broadly typical of the universe of interest to the project. If views are likely to diverge sharply between different types of respondent or if long parts of the discussion would not be relevant to all respondents. - Then moderator guides the focus group discussion, draw out the views of all respondents and encourage the exchange of opinions between different members of the group. Discussion is free-ranging and led for the most part by the respondents themselves rather than following a series of pre-determined questions. - It is performed behind one way mirror, which allows clients to view groups and video and/or audio recordings are used to record the group discussion. What do we get? - It produces an interesting data like, voice of common. - As the respondents get the chance to participate a dynamic group discussion, so it results much more productive data than an in-depth interview. - It is possible to observe the expressions, gestures or attitude toward questions, so that a moderator can modify his questions.
http://www.analytiqueresearch.com/services/focus-group/
One critical aspect of leadership, in my experience, is to be aware of the values one holds. As in life, each leader has certain values that are especially and even uniquely important to him or her. Without thinking about it, we typically will favor those values in the way we lead others…when we make policies, in the way that we manage and the issues which get our greatest attention. Because we make decisions based on what we value, it’s important that a leader understand what he or she values in leadership and to recognize also that others may hold values which are different from ours.Have you ever considered your personal values as a leader? I’ve spent time over the years realizing the things I tend to value most in leadership. Those whom I lead can probably clearly see these displayed in my leadership. This doesn’t mean other values aren’t important…perhaps even more important…but that these are the ones most important to me. Here are my top 7 values as a leader and why I hold them: Responsiveness – I believe leaders are required to be responsive to those they wish to lead. If people don’t hear from you they make up their own scenarios, become afraid, and lose interest and motivation. Accountability – Leaders are extremely vulnerable individuals. Sometimes the leader is the last to know there is a problem. Power in leadership can lead to problems with pride and corruption. Grace – No leader ever gets to the top without a tremendous amount of grace along the way. Isn’t it only fair that a leader reciprocates the grace received into grace given? Authenticity – If a leader wants people to follow, he or she must be trustable. That requires realness and transparency. Integrity – Leaders are taking people places where they may not be completely comfortable going. If a leader has been granted trust, he or she should honor that trust with honest and moral leadership. Change – Organizations that stand still die. Change brings momentum and creates opportunities for growth. Leadership development happens best during change. Intentionality – Nothing happens without action. You can have the greatest dreams and they will remain only a dream without a plan, a strategy, a system and genuine effort. Publisher Ron EdmondsonView Website Please register for a free account to view this content We hope you have enjoyed the 10 discipleship resources you have read in the last 30 days. You have exceeded your 10 piece content limit. Create a free account today to keep fueling your spiritual journey!
https://www.idisciple.org/post/7-personal-values-as-a-leader
Slash Net Worth Slash net worth: Saul Hudson, more commonly known as the musician Slash, was born on July 23, 1965 in England. Slash has a net worth of $90 million. Slash is best known for being the lead guitarist of the band Guns N' Roses. Slash played with GNR from 1985 until 1996 and then reunited again with the band recently. Slash also co-founded Velvet Revolver with former bandmates and other rock stars. In August of 2009, Time Magazine named Slash #2 on their list of the top 10 Best Electric Guitar Players of All Time. Slash was exposed to music at an early age. His mother designed costumes for David Bowie and his father created album covers for musicians such as Neil Young and Joni Mitchell. He moved from England to Los Angeles at an early age, and took music lessons as a child. In 1983 he formed a Motorhead tribute band, which broke up in 1984. Slash soon joined another band called Black Sheep, which played with a popular band Hollywood Rose. In 1984, Slash met Axl Rose and the two quickly became friends. A few months later Slash and Axl Rose teamed up with Duff McKagan and Izzy Stradlin to form the band Guns N' Roses. Between 1985 and 86 the band had several hits, and their album Appetite for Destruction sold over 28 million copies. In 1988, Guns N' Roses had their first #1 hit, "Sweet Child of Mine." After leaving the band in 1996, Slash began focusing on his solo career, as well as studio work for many successful artists, including Michael Jackson and Quentin Tarantio's soundtrack to Jackie Brown. In 2004 after reuniting with Stradlin, McKagan, and Matt Sorum, the super-group Velvet Revolver released their first album "Contraband." Slash continued to play with other artists in the studio and on tracks. According to Forbes, Slash and Axl Rose earned $20 million a piece thanks to their "Not in this Lifetime" comeback tour. That number might be a low estimate if you believe a court filing made by Slash's ex-wife Perla as part of a divorce battle. On August 31, 2018, Perla's lawyer filed a document which claimed that Slash's 2017 income was $45 million.
https://www.celebritynetworth.com/richest-celebrities/rock-stars/slash-net-worth/
Too many people believe that to achieve great things we must make brutal sacrifices, to succeed in work we must focus single-mindedly, at the expense of everything else in life. Even those who reject the idea of a zero-sum game fall prey to a kind of binary thinking revealed by the term we use to describe the ideal lifestyle: ‘work/life balance’. The idea that ‘work’ competes with ‘life’ ignores ‘life’ is actually the intersection and interaction of four major domains: work, home, community, and the private self. Most successful people are those who can harness the passions and powers of the various parts of their lives to achieve ‘four-way wins’—actions that result in life being better in all four domains. Thus, integration, not balance, is a better lens to view how one navigates work and the rest of life. How would you analyze work-life integration vis-à-vis the concept of Total Leadership (TL)? The ‘purpose’ of TL is to improve performance in all four domains of life by creating mutual value among them. It is a proven method for creating harmony, or integration, among the different parts of life, based on decades of research. The key principles of this approach are to ‘be real’, acting with authenticity by clarifying what is important; to ‘be whole’, acting with integrity by respecting the whole person, and to ‘be innovative’, acting with creativity by continually experimenting with how things get done. What are the critical skills needed for integrating work and life? In my thirty years as a professor, researcher, consultant, and executive, I have found eighteen specific skills that bring these principles to life, and foster greater alignment and harmony among the four life domains. I illustrate them with examples and describe how you can develop them in Leading the Life You Want: Skills for Integrating Work and Life. Create cultures of innovation around you. How is an approach based on “being real, being whole, and being innovative” linked to success? By clarifying what is important, respecting the whole person, and continually experimenting, one increases one’s chances of being successful in all of life’s domains. The six exemplary leaders I profile in my book show how truly successful people do not forsake the other parts of their lives to achieve success in their professional and public lives; to the contrary, they find creative ways to embrace their family, community, and personal lives to gain the support and resources they need to accomplish great things—to use their particular talents and passions in the service of contributing to the world. Definite connect between work-life integration and productivity? Yes, for example, if you are distracted while you are at work by responsibilities you have at home or to others outside of work (for example, your aging parents, your sports team members), you will be less productive. If you are distracted by work obligations and worries while you are at home with your spouse and children, then you will be less effective as a loving, caring spouse, or parent. But if you are able to manage these boundaries by understanding what is most important to you, finding out from others what they really need from you, and then experimenting with ways of meeting your needs ‘and’ their needs, in years of research, consulting, and teaching, I have found that it is nearly always possible to be more productive. With more millennials entering the workforce, how can organizations best help employees lead the life they want? Millennials are keenly interested in and quite outspoken about their desire to have meaningful lives outside of work and also to have meaningful work. Employers can attempt to change the way in which some view this attitude as laziness or a lack of commitment to work. Instead, employers who want to attract and retain millennial talent can recognize that people, and not just millennials, are most productive when they are well-rested, when they are engaged in work that is meaningful to them, when they are not distracted by obligations, responsibilities, and worries from outside of work. We have found that the Total Leadership approach resonates deeply with millennials and helps them feel purposeful, connected, and optimistic about having an impact through their work. Stew Friedman is Practice Professor of Management at the Wharton School, University of Pennsylvania. He is the creator of the concept of Total Leadership, and author of Total Leadership: Be a Better Leader, Have a Richer Life.
http://www.thesmartmanager.com/cover-story/how-to-achieve-four-way-wins.html
- Govt. - Job Type - Other, Research Scientist Health Scientist (Diagnostics Concept Accelerator) Office of Biodefence Research, Resources, and Translational Research Division of Microbiology and Infectious Diseases National Institute of Allergy and Infectious Diseases National Institutes of Health Department of Health and Human Services The National Institute of Allergy and Infectious Diseases (NIAID) is seeking an exceptional, industry-experienced leader for a senior scientific product development specialist responsible for identifying cutting-edge research and using the latest technological advances to shepherd the concepts toward potential diagnostic applications. The diagnostics concept accelerator will 1) coordinate progression of multiple infectious diseases product candidates addressing biodefense and public health needs, from early through advanced product development and the transition to a commercialization partner; 2) manage the design and development of initiatives that leverage the existing research base for product development with an enhanced focus toward exploiting innovative concepts that target product development; 3) ensure adequate oversight and integrate various pre-existing elements of the division’s product development resources and capabilities into the development of candidates; 4) conduct long-range planning in a research environment where future scientific opportunities are not readily apparent and frequently change with the development of new knowledge; and 5) build upon and establish additional cooperative, productive, and coordinated relationships with other government entities, especially the Biomedical Advanced Research and Development Authority (BARDA) and the Department of Defense, to advance candidates and related concepts while avoiding duplication of efforts, interact with FDA on relevant regulatory issues, and work closely with the greater scientific community and the pharmaceutical and biotechnology industries to achieve shared scientific goals. Qualifications - Applicants must have a degree in a major study in an academic field related to the health sciences or allied sciences and demonstrate a broad range of expertise in infectious disease disciplines, platform/diagnostic discovery and development experience, and associated research and development methodologies - Applicants must demonstrate experience in the successful development of a candidate diagnostic or management and coordination of diagnostic development activities and an in-depth understanding of the entire process, from discovery or prototype design, analytical validation, and preclinical feasibility testing through 510(K) and/or investigational device exemption (IDE)-enabling studies and early clinical development. - Applicants must demonstrate knowledge of the complex and nuanced regulatory requirements for licensure of new diagnostics. - Applicants must show evidence of successful implementation of multifaceted, complex biomedical research programs. - Applicants must show evidence of leadership and collaborative skills demonstrating effective interactions across multiple disciplines within an organization or between multiple sectors such as industry, academia, and/or government. - The scientist or physician of this position must be a U.S. citizen. - Incumbent must obtain and maintain a Top Secret security clearance based on a state bureau investigation (SBI) with eligibility for sensitive compartmented information (SCI). Application Visit www.USAJobs.gov and access the detailed vacancy announcements NIH-NIAID-DE-20-10617254 (U.S. citizens) and/or NIH-NIAID-MP-20-10617962 (status candidates) beginning October 30, 2019. Applications must be submitted online by 11:59 p.m. on November 8, 2019. Email Lily Martin ([email protected]) with questions or for more information about the position. Email Susie Yi-Miller ([email protected]) with questions regarding how to apply. Visit NIAID Careers to learn more about NIAID and how you can play a role in this exciting and dynamic research organization. HHS, NIH, and NIAID are equal opportunity employers.
https://jobs.sciencecareers.org/job/505216/health-scientist-diagnostics-concept-accelerator-/?LinkSource=SimilarJobPlatform
Teri is a Toronto labour and employment lawyer with a focus on civil litigation and disability law. As a tenacious advocate, Teri represents clients in connection with all types of employment and labour disputes, including wrongful dismissal, constructive dismissal, and disability benefits claims. Time is money, and Teri’s no-nonsense approach is to achieve timely and fair results for her clients whenever possible. Teri has obtained favorable outcomes for clients at various stages of the litigation process, including procedural motions before the Ontario Superior Court, examinations for discovery, mediation, and hearings. With a background in disability benefits law and professional misconduct proceedings, Teri takes the time to understand the unique challenges her clients face when their income support, careers and livelihoods are on the line. Prior to practising employment law, Teri attained considerable academic success. At Kingston University London (United Kingdom), she was awarded an International Scholarship and graduated with First Class Honours, the highest degree classification awarded to only the top students of her graduating law school class. Eager to serve the community and vigorously fight for the underdog, she also volunteered at a legal clinic, where she represented and assisted at-need individuals facing various legal issues. Before law school, Teri completed her Bachelor’s degree in Business and Legal Studies at the University of Waterloo. She also holds a Master’s degree in Library and Information Science studies from the University of Western Ontario. In addition to being fluent in English, Teri is a native Cantonese speaker and is conversational in Mandarin. She has on many occasions helped her clients feel at ease by communicating with them in their native tongue. Outside of the office, Teri enjoys spoiling her Golden Retriever rescue with homemade treats and long hikes. She also loves travelling and exploring other countries.
https://jpakemploymentlaw.com/team/teri-truong
CROSS REFERENCE TO RELATED APPLICATIONS TECHNICAL FIELD BACKGROUND SUMMARY DETAILED DESCRIPTION EXAMPLES Examples 1-1 to 1-31 Examples 2-1 to 2-3 Examples 3-1 and 3-2 Examples 4-1 to 4-12 Comparative Example 1 Comparative Examples 2-1 to 2-3 Comparative Example 3 Comparative Example 4 Comparative Example 5 The present application is based on, and claims priority from, Taiwan Application Serial Number 104141059, filed on Dec. 8, 2015, the disclosure of which is hereby incorporated by reference herein in its entirety. The technical field relates to a composition of enhancing thermal conductivity of a dielectric layer, and in particular it relates to a magnetic and thermally conductive material added into the dielectric layer. Circuit boards and the IC substrates produced for the optoelectronics and semiconductor industries are trending toward high-speed, high density, being intensive, and high integration because rise of “Cloud”, “Internet” and “Internet of things”, enhancements of 4G and 5G communication technologies, and improvement of display technologies. The required properties of the circuit boards and the IC substrates of the future are not only low dielectric constant and high insulation, but also low dielectric loss and high thermal conductivity. Moreover, they should be designed for heat dissipation of different applications, e.g. controlling the direction and distribution of their high thermal conductive path. For example, the copper foil substrate in a circuit board is concisely represented as copper foil/dielectric layer/copper foil, and the middle dielectric layer is usually composed of resin, glass fiber cloth, or insulation paper with low thermal conductivity. Therefore, the copper foil substrate has a poor thermal conductivity along its thickness direction. Enhancing the thermal conductivity of the middle dielectric layer may dramatically improve the thermal conductivity along its thickness direction. One conventional method adds a thermally conductive material into the dielectric layer. The thermally conductive material is usually randomly arranged, so that a large amount of the thermally conductive material should be added for increasing the thermal conductivity of the dielectric layer. However, too much thermally conductive material (filler) will dramatically increase the dielectric constant of the dielectric layer and the related cost. Another way is to magnetically align a high thermal conductive material along a specific direction (e.g. the thickness direction of the dielectric layer), thereby achieving a high thermal conductivity along a specific direction. However, the thermally conductive material should be inherently magnetic. A non-magnetic and thermally conductive material needs a magnetic field of high intensity (or a long magnetic alignment period) to be aligned. Accordingly, a magnetic, insulative, low dielectric loss, and thermally conductive material is called for a dielectric layer with high thermal conductivity, insulation, and low dielectric loss. One embodiment of the disclosure provides a magnetic and thermally conductive material, comprising: a thermally conductive compound powder; and an iron-containing oxide at a surface of the thermally conductive compound powder, wherein the iron-containing oxide is an oxide of iron with an other metal, and the other metal is nickel, zinc, copper, cobalt, magnesium, manganese, yttrium, lithium, aluminum, or a combination thereof. One embodiment of the disclosure provides a thermally conductive and dielectric layer, comprising: a magnetic and thermally conductive material and a resin, wherein the thermally conductive material comprises a thermally conductive compound powder, and an iron-containing oxide at a surface of the thermally conductive compound powder, wherein the iron-containing oxide is an oxide of iron with an other metal, and the other metal is nickel, zinc, copper, cobalt, magnesium, manganese, yttrium, lithium, aluminum, or a combination thereof. A detailed description is given in the following embodiments with reference to the accompanying drawings. In the following detailed description, for purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the disclosed embodiments. It will be apparent, however, that one or more embodiments may be practiced without these specific details. In other instances, well-known structures and devices are schematically shown in order to simplify the drawing. 11 13 11 FIG. 1 One embodiment provides a magnetic and thermally conductive material including a thermally conductive compound powder and an iron-containing oxide on a surface of the thermally conductive compound powder , as shown in . The thermally conductive compound powder can be boron nitride, aluminum nitride, silicon nitride, silicon carbide, aluminum oxide, carbon nitride, octahedral carbon, tetrahedral carbon, or a combination thereof. In one embodiment, the thermally conductive compound powder has a particle size of 0.1 μm to 110 μm. An overly small thermally conductive compound powder is influenced by a thermal effect, such that the magnetic and thermally conductive material is difficult to align with a magnetic field. An overly large thermally conductive compound powder is easily influenced by gravity and difficult to control and align with a magnetic field. Note that the thermally conductive compound powder and the iron-containing oxide have a long axis, which means that their long axis dimensions (e.g. length) are greater than the dimensions in other directions (e.g. width or thickness). In one embodiment, the thermally conductive compound powder has a long axis length to short axis length ratio of greater than 1.1 and less than or equal to 120, and the iron-containing oxide has a long axis length to short axis length ratio of greater than 1.1 and less than or equal to 40. If a thermally conductive compound powder has an overly low ratio of the long axis length to the short axis length, the magnetic and thermally conductive material cannot efficiently transfer heat along a specific direction. If an iron-containing oxide has an overly low ratio of the long axis length to the short axis length, the magnetic and thermally conductive material cannot efficiently transfer heat along a specific direction. In one embodiment, a coating ratio (the weight % that the iron-containing oxide occupies magnetic and thermally conductive material) is about 0.05 wt % to 60 wt %. An overly low coating ratio make the thermally conductive material have an insufficient magnetic property, thereby needing a magnetic field of high intensity or a long period to align the magnetic and thermally conductive material. As a result, the equipment cost or manufacturing period is dramatically increased. An overly high coating ratio results in an overly large surface of the thermally conductive compound powder being covered by the iron-containing oxide (with a lower thermal conductivity). As a result, the thermal conductivity of the magnetic and thermally conductive material is reduced. The iron-containing oxide is an oxide of iron with an other metal, and the other metal is nickel, zinc, copper, cobalt, magnesium, manganese, yttrium, lithium, aluminum, or a combination thereof. The other metal and the iron of the iron-containing oxide have a molar ratio (other metal mole/iron mole=x/y) greater than 0 and less than or equal to 80. If the other metal and iron have a molar ratio of 0, the magnetic and thermally conductive material has a poor insulation and a high dielectric loss, it may result in conductive path and signal loss. If the metal and iron have an overly high molar ratio, the magnetic and thermally conductive material will have an insufficient magnetic property, thereby needing a magnetic field of high intensity or a long period to align the magnetic and thermally conductive material. As a result, the equipment cost or manufacturing period is dramatically increased. In one embodiment, the magnetic and thermally conductive material has a saturation magnetization of greater than 0.03 emu/g and less than or equal to 40 emu/g. A magnetic and thermally conductive material with an overly low saturation magnetization is difficult to align with a normal magnetic field, thereby needing a magnetic field of high intensity or a long period to align the magnetic and thermally conductive material. As a result, the equipment cost or manufacturing period is dramatically increased. A magnetic and thermally conductive material with an overly high saturation magnetization means increasing an iron-containing oxide ratio, such that an overly large surface of the thermally conductive compound powder is covered by the iron-containing oxide (with a lower thermal conductivity). As a result, the thermal conductivity of the magnetic and thermally conductive material is reduced. 11 13 15 17 17 19 FIG. 1 FIG. 2 The magnetic and thermally conductive material can be utilized in a thermally conductive and dielectric layer. After magnetic aligning the magnetic and thermally conductive material in the dielectric layer, the thermal conductivity of the dielectric layer can be enhanced. The thermally conductive compound powder or the iron-containing oxide of the magnetic and thermally conductive material has a long axis length to short axis length ratio of greater than 1.1. The magnetic and thermally conductive material (See ) and a resin is mixed to form a gel layer , a magnetic field is then applied to the gel layer by an external magnetic field , thereby controlling a component ratio of the long axis of the magnetic and thermally conductive material along a direction of the magnetic field. The magnetically aligned resin is then cured to obtain a thermally conductive and dielectric layer, as shown in . Too less magnetic and thermally conductive material cannot efficiently enhance the thermal conductivity of the dielectric layer. Too much magnetic and thermally conductive material is difficult to magnetically align, and reduces the mechanical properties of the thermally conductive and dielectric layer. In one embodiment, the resin can be acrylic resin, epoxy resin, poly (phenolic ether) resin, polyimide resin, polyolefin resin, or a combination thereof, which can be stacked to form a multi-layered structure. In one embodiment, the thermally conductive and dielectric layer includes 2 wt % to 90 wt % of the magnetic and thermally conductive material and 98 wt % to 10 wt % of the resin. Below, exemplary embodiments will be described in detail with reference to accompanying drawings so as to be easily realized by a person having ordinary knowledge in the art. The inventive concept may be embodied in various forms without being limited to the exemplary embodiments set forth herein. Descriptions of well-known parts are omitted for clarity, and like reference numerals refer to like elements throughout. Ratios of a long axis length to a short axis length of thermally conductive compound powders were measured by a scanning electron microscope (commercially available from Oxford Instruments), which are listed in Table 1. 1-1 1-31 1-1 1-31 1-1 1-31 1-1 1-31 1-1 1-31 1-1 1-31 1-1 1-31 Thermally conductive compound powders were weighed according to numbers in Tables 1, 3, and 4, and then added into deionized water to form solutions Ato A, respectively. Chemicals were weighed according to element molar ratios and coating ratios in Tables 2 to 4, and then added into deionized water to form solutions Bto B. The coating ratio means a weight ratio that the iron-containing oxide occupied in a thermally conductive powder. In the following Examples and Comparative Examples, the coating ratio is used for illustration to be consistent with the Tables. The solutions Ato Awere added to the corresponding solutions Bto Band mixed by a stirrer to form mixture liquids Cto C. The mixture liquids Cto Cwere heated to and stabilized at 80° C. A sodium hydroxide aqueous solution was added into the mixture liquids Cto Cfor tuning them to be basic. The basic mixture liquids were stirred for 30 minutes, heated to 800° C., and then cooled to room temperature, thereby obtaining samples of Examples 1-1 to 1-31 (Magnetic and thermally conductive materials). Appropriate amounts of the samples in Examples 1-31 to 1-31 were weighed to measure their saturation magnetization values by a vibrating sample magnetometer (MODEL 7304, commercially available from Lake Shore). Appropriate amounts of the samples in Examples 1-1 to 1-31 were put into a mold, respectively, and then pressed to mold the samples with a diameter of about 10 mm and a thickness of 2 mm. Resistivity values of the samples were measured by an ammeter (KEITHLEY 617 source meter). Dielectric loss values of the samples were measured by an LCR meter (E4291B 16453A test fixture). Ratios of a long axis length to a short axis length of the iron-containing oxide in the some samples were measured by a scanning electron microscope (commercially available from Oxford Instruments). The measured values are listed in Tables 3 and 4. 2-1 2-3 2-1 2-3 2-1 2-3 2-1 2-3 2-1 2-3 2-1 2-3 2-1 2-3 Thermally conductive compound powders were weighed according to numbers in Tables 1 and 5, and then added into deionized water to form solutions Ato A, respectively. Chemicals were weighed according to element molar ratios and coating ratios in Tables 2 and 5, and then added into deionized water to form solutions Bto B. The solutions Ato Awere added to the corresponding solutions Bto Band mixed by a stirrer to form mixture liquids Cto C. The mixture liquids Cto Cwere heated to and stabilized at 80° C. A sodium hydroxide aqueous solution was added into the mixture liquids Cto Cfor tuning them to be basic. The basic mixture liquids were stirred for 30 minutes, heated to 800° C., and then cooled to room temperature, thereby obtaining samples of Examples 2-1 to 2-3 (Magnetic and thermally conductive materials). Appropriate amounts of the samples in Examples 2-1 to 2-3 were weighed to measure their saturation magnetization values by a vibrating sample magnetometer (MODEL 7304, commercially available from Lake Shore). Appropriate amounts of the samples in Examples 2-1 to 2-3 were put into a mold, respectively, and then pressed to mold the samples with a diameter of about 10 mm and a thickness of 2 mm. Resistivity values of the samples were measured by an ammeter (KEITHLEY 617 source meter). The measured values are listed in Table 5. 3-1 3-2 3-1 3-2 3-1 3-2 3-1 3-2 3-1 3-2 3-1 3-2 3-1 3-2 Thermally conductive compound powders were weighed according to numbers in Table 5, and then added into deionized water to form solutions Aand A, respectively. Chemicals were weighed according to element molar ratios and coating ratios in Tables 2 and 5, and then added into deionized water to form solutions Band B. The solutions Band Bwere heated to and stabilized at 80° C. A sodium hydroxide aqueous solution was added into the solutions Band Bfor tuning them to be basic. The basic solutions were stirred for 30 minutes, heated to 800° C. and 1000° C., respectively, and then cooled to room temperature, thereby obtaining magnetic powders Dand D. The magnetic powders Dand Dwere added to the corresponding solutions Aand Aand mixed by a stirrer. Nitric acid aqueous solution was added to the mixtures for tuning them to be acidic. The acidified mixtures were stirred by a stirrer for 30 minutes and then baked in an oven to be dry, thereby obtaining samples of Examples 3-1 and 3-2 (Magnetic and thermally conductive materials). Appropriate amounts of the samples in Examples 3-1 and 3-2 were weighed to measure their saturation magnetization values by a vibrating sample magnetometer (MODEL 7304, commercially available from Lake Shore). Appropriate amounts of the samples in Examples 3-1 and 3-2 were put into a mold, respectively, and then pressed to mold the samples with a diameter of about 10 mm and a thickness of 2 mm. Resistivity values of the samples were measured by an ammeter (KEITHLEY 617 source meter). The measured values are listed in Table 5. FIG. 2 FIGS. 3A and 3B The magnetic and thermally conductive materials in Tables 4 and 5 and the resins in Table 6 were mixed according to the magnetic and thermally conductive material ratios (wt %) in Table 6. The mixtures were coated to form gel layers C4-1 to C4-12. The gel layers were put into an external magnetic field system 16 to magnetically align with a magnetic field of 1.25 Tesla for periods as shown in Table 6. The external magnetic field direction was parallel to the thickness direction of the gel layers, as shown in . The magnetically aligned gel layers were put into an oven and baked to dry, thereby obtaining samples of Examples 4-1 to 4-12. The thermal conductivity along the thickness direction of the thermally conductive dielectric layers before and after the magnetic alignment were measured by a thermal resistance and conductivity measurement apparatus (LW 9389). The increase ratio of the thermal conductivity through the magnetic field alignment can be calculated by following formula: The increase ratio of the thermal conductivity through the magnetic field alignment=(the thermal conductivity after the magnetic field alignment—the thermal conductivity before the magnetic field alignment)/(the thermal conductivity before the magnetic field alignment)*100%. The measured values are listed in Table 6. The samples before and after the magnetic field alignment in Example 4-8 were measured by a scanning electron microscope (commercially available from Hitachi) to obtain photographs of their cross sections, as shown in . 1 1 1 1 1 1 1 A thermally conductive compound powder was weighed according to number in Tables 1 and 3, and then added into deionized water to form a solution E. A chemical was weighed according to an element molar ratio and a coating ratio in Tables 2 and 3, and then added into deionized water to form a solution F. The solution Ewas added to the solution Fand mixed by a stirrer to form a mixture liquid G. The mixture liquid Gwas heated to and stabilized at 80° C. A sodium hydroxide aqueous solution was added into the mixture liquid Gfor tuning it to be basic. The basic mixture liquid was stirred for 30 minutes, heated to 800° C., and then cooled to room temperature, thereby obtaining a sample of Comparative Example 1. An appropriate amount of the sample in Comparative Example 1 was weighed to measure its saturation magnetization value by a vibrating sample magnetometer (MODEL 7304, commercially available from Lake Shore). An appropriate amount of the sample in Comparative Example 1 was put into a mold, and then pressed to mold the sample with a diameter of about 10 mm and a thickness of 2 mm. A resistivity value of the sample was measured by an ammeter (KEITHLEY 617 source meter). A dielectric loss value of the sample was measured by an LCR meter (E4291B 16453A test fixture). A ratio of a long axis length to a short axis length of the iron-containing oxide in the sample was measured by a scanning electron microscope (commercially available from Oxford Instruments). The measured values are listed in Table 3. 2-1 2-3 2-1 2-3 2-1 2-3 2-1 2-3 2-1 2-3 2-1 2-3 2-1 2-3 The thermally conductive compound powder according to number 3 in Table 1 was weighed, and then added into deionized water to form solutions Eto E. Chemicals were weighed according to element molar ratios and coating ratios in Tables 2 and 4, and then added into deionized water to form solutions Fto F. The solutions Eto Ewere added to the corresponding solutions Fto Fand mixed by a stirrer to form mixture liquids Gto G. The mixture liquids Gto Gwere heated to and stabilized at 80° C. A sodium hydroxide aqueous solution was added into the mixture liquids Gto Gfor tuning them to be basic. The basic mixture liquids were stirred for 30 minutes, and then baked in an oven to be dry, thereby obtaining samples of Comparative Examples 2-1 to 2-3. Appropriate amounts of the samples in Comparative Examples 2-1 to 2-3 were weighed to measure their saturation magnetization values by a vibrating sample magnetometer (MODEL 7304, commercially available from Lake Shore). Appropriate amounts of the samples in Comparative Examples 2-1 to 2-3 were put into a mold, and then pressed to mold the sample with a diameter of about 10 mm and a thickness of 2 mm. Resistivity values of the samples were measured by an ammeter (KEITHLEY 617 source meter). Dielectric loss values of the samples were measured by an LCR meter (E4291B 16453A test fixture). Ratios of a long axis length to a short axis length of the iron oxide in the samples were measured by a scanning electron microscope (commercially available from Oxford Instruments). The measured values are listed in Table 4. 3 3 3 3 3 3 3 A thermally conductive compound powder according to number 5 in Table 1 was weighed, and then added into deionized water to form a solution E. A chemical was weighed according to an element molar ratio and a coating ratio in Tables 2 and 5, and then added into deionized water to form a solution F. The solution Ewas added to the solution Fand mixed by a stirrer to form a mixture liquid G. The mixture liquid Gwas heated to and stabilized at 80° C. A sodium hydroxide aqueous solution was added into the mixture liquid Gfor tuning it to be basic. The basic mixture liquid was stirred for 30 minutes, heated to 800° C., and then cooled to room temperature, thereby obtaining a sample of Comparative Example 3. An appropriate amount of the sample in Comparative Example 3 was weighed to measure its saturation magnetization value by a vibrating sample magnetometer (MODEL 7304, commercially available from Lake Shore). An appropriate amount of the sample in Comparative Example 3 was put into a mold, and then pressed to mold the sample with a diameter of about 10 mm and a thickness of 2 mm. A resistivity value of the sample was measured by an ammeter (KEITHLEY 617 source meter). The measured values are listed in Table 5. 4 4 4 4 4 4 4 A thermally conductive compound powder according to number 10 in Table 1 was weighed, and then added into deionized water to form a solution E. A Chemical was weighed according to an element molar ratio and a coating ratio in Tables 2 and 5, and then added into deionized water to form a solution F. The solution Fwas heated to and stabilized at 80° C. A sodium hydroxide aqueous solution was added into the solution Ffor tuning it to be basic. The basic solution was stirred for 30 minutes, heated to 800° C., and then cooled to room temperature, thereby obtaining a magnetic powder G. The magnetic powder Gwas added to the solution Eand mixed by a stirrer. Nitric acid aqueous solution was added to the mixture for tuning it to be acidic. The acidified mixture was stirred by a stirrer for 30 minutes and then baked in an oven to be dry, thereby obtaining a sample of Comparative Example 4. An appropriate amount of the sample in Comparative Example 4 was weighed to measure its saturation magnetization value by a vibrating sample magnetometer (MODEL 7304, commercially available from Lake Shore). An appropriate amount of the sample in Comparative Example 4 was put into a mold, and then pressed to mold the sample with a diameter of about 10 mm and a thickness of 2 mm. A Resistivity value of the sample was measured by an ammeter (KEITHLEY 617 source meter). The measured values are listed in Table 5. 5 FIG. 2 The magnetic and thermally conductive material in Comparative Example 3 and an acrylic resin in Table 6 were mixed according to the magnetic and thermally conductive material ratios (wt %) in Table 6. The mixture was coated to form a gel layer E. The gel layer was put into an external magnetic field system 16 to magnetically align with a magnetic field of 1.25 Tesla for a period as shown in Table 6. The external magnetic field direction was parallel to the thickness direction of the gel layer, as shown in . The magnetically aligned gel layer was put into an oven and baked to dry, thereby obtaining a sample of Comparative Example 5. The thermal conductivity along the thickness direction of the thermally conductive dielectric layer before and after the magnetic alignment was measured by a thermal resistance and conductivity measurement apparatus (LW 9389). The increase ratio of the thermal conductivity through the magnetic field alignment can be calculated by following formula: The increase ratio of the thermal conductivity through the magnetic field alignment=(the thermal conductivity after the magnetic field alignment—the thermal conductivity before the magnetic field alignment)/(the thermal conductivity before the magnetic field alignment)*100%. The measured values are listed in Table 6. FIGS. 3A and 3B As proven in Comparative Example 1, if the other metal of the iron-containing oxide includes a similar coating ratio of undesired metal (e.g. barium, bismuth, or tin), the iron-containing oxide will have an overly low saturation magnetization. As such, it is difficult to control the alignment direction of the magnetic and thermally conductive material by the magnetic field. Moreover, the iron-containing oxide with the undesired metal had a small ratio of its long axis to short axis, such that the magnetic and thermally conductive material cannot efficiently transfer heat along a specific direction. In Comparative Examples 2-1 to 2-3, the iron oxide free of other metal had an overly high resistivity loss and dielectric loss, which resulted in an electrically conductive path and a signal loss. In Comparative Example 4, the thermally conductive filler was graphite with an overly high electrically conductivity, it resulted in an electrically conductive path that was unsuitable for a thermally conductive and dielectric layer. In comparative Example 5, the magnetic and thermally conductive compound powder (from Example 3) had a long axis length to short axis length ratio of 1, it could not efficiently transfer heat along a specific direction, such that the increase ratio of the thermal conductivity through the magnetic field alignment was almost zero. In Examples, the thermally conductive compounds of the thermally conductive and dielectric layers and the iron-containing oxide had a long axis length to short axis length ratio of greater than 1.1 and magnetic property, which can magnetically align with a magnetic field to control a component ratio of the long axis of the magnetic and thermally conductive material along the direction of the magnetic field, as shown in . In other words, the thermal conductivity of the dielectric layer can be enhanced to be utilized in different application fields, e.g. a thermally conductive sheet, an optoelectronic device substrate, a printed circuit board, a semiconductor substrate, a packaging material, a encapsulating material. TABLE 1 Ratio of long axis length/ Thermally Thermally short axis conductive conductive length of Thermally compound compound thermally conductive powder powder conductive compound composi- particle compound powder No. tion size powder Supplier 1 Boron Average 15 Lowerfriction nitride particle size = 0.5 μm 2 Boron Average 110 Lowerfriction nitride particle size = 1.5 μm 3 Boron D50 = 7 μm 68 Saint Gobain nitride 4 Boron Average 10 Saint Gobain nitride particle size = 12 μm, Maximum particle size = 60 μm 5 Boron Average 6 Saint Gobain nitride particle size = 30 μm, Maximum particle size = 103 μm 6 Aluminum D50 = 5 μm 1.8 FirstCo Corp. nitride 7 Silicon 1200 Mesh 3.1 FirstCo Corp. carbide 8 Aluminum D50 = 3 μm 1.2 Ceramet, Inc. oxide 9 Aluminum D50 = 3 μm 1.0 Showa Denko oxide 10 Graphite D50 = 13 μm 38 HOMYTECH Co. Ltd. TABLE 2 Names of Names of Chemicals Chemical formula Chemicals Chemical formula Iron Fe(NO<sub>3</sub>)<sub>3</sub>&#x2022;9H<sub>2</sub>O Tin SnCl<sub>2</sub>&#x2022;2H<sub>2</sub>O nitrate chloride hydrate hydrate Nickel Ni(NO<sub>3</sub>)<sub>2</sub>&#x2022;6H<sub>2</sub>O Magnesium Mg(NO<sub>3</sub>)<sub>2</sub>&#x2022;6H<sub>2</sub>O nitrate nitrate hydrate hydrate Zinc Zn(NO<sub>3</sub>)<sub>2</sub>&#x2022;6H<sub>2</sub>O Manganese Mn(CH<sub>3</sub>COO)<sub>2</sub>&#x2022;4H<sub>2</sub>O nitrate acetate hydrate hydrate Lithium LiNO<sub>3</sub> Iron FeCl<sub>3</sub>&#x2022;6H<sub>2</sub>O nitrate chloride hydrate Copper CuCl<sub>2</sub> Ferrous FeCl<sub>2</sub>&#x2022;4H<sub>2</sub>O chloride chloride hydrate Cobalt CoCl<sub>2</sub> chloride Yttrium Y(NO<sub>3</sub>)<sub>3</sub>&#x2022;6H<sub>2</sub>O nitrate hydrate Aluminum Al(NO<sub>3</sub>)<sub>3</sub>&#x2022;9H<sub>2</sub>O nitrate hydrate Barium BaCl<sub>2</sub>&#x2022;2H<sub>2</sub>O chloride hydrate Bismuth Bi(NO<sub>3</sub>)<sub>3</sub>&#x2022;5H<sub>2</sub>O nitrate hydrate TABLE 3 Ratio of Long axis length to short Thermally axis conductive Dielectric length of compound Element Coating Saturation loss iron- powder molar ratio magnetization Resistivity (@0.85 containing No. x/y ratio (wt %) (emu/g) (Ω · cm) GHz) oxide Example 1-1 3 0.5 Ni:Fe = 12.5 3.02 2.92E+11 2.69E−03 4.4 1:2 Example 1-2 3 0.5 Ni:Zn:Fe = 12.5 4.61 8.66E+09 1.66E−03 9 0.8:0.2:2 Example 1-3 3 0.5 Ni:Cu:Zn:Fe = 12.5 2.75 7.85E+11 2.50E−03 11.7 0.4:0.2:0.4:2 Example 1-4 3 0.5 Ni:Co:Fe = 12.5 4.08 4.73E+11 3.04E−03 11 0.5:0.5:2 Example 1-5 3 0.5 Mg:Mn:Fe = 25 4.48 1.08E+09 2.88E−03 7.2 0.9:0.1:2 Example 1-6 3 0.5 Ni:Y:Zn:Fe = 12.5 0.28 5.00E+11 2.82E−03 10 0.6:0.2:0.2:2 Example 1-7 3 0.75 Ni:Li:Fe = 12.5 1.34 3.81E+11 3.05E−03 1.7 0.5:1:2 Example 1-8 3 2 Ni:Al:Fe = 12.5 1.04 2.72E+11 3.98E−03 21.8 1:1:1 Example 1-9 3 3 Ni:Al:Fe = 12.5 0.71 5.98E+10 4.52E−03 12 1.2:1.2:0.8 Comparative 3 0.5 Ba:Bi:Sn:Fe = 12.5 0.03 4.06E+11 6.63E−03 1 Example 1 0.2:0.4:0.4:2 TABLE 4 Ratio of Long axis length to Thermally short axis conductive Dielectric length of compound Element Coating Saturation loss iron- powder molar ratio magnetization Resistivity (@0.85 containing No. x/y ratio (wt %) (emu/g) (Ω · cm) GHz) oxide Comparative 3 0 Fe = 1 12.5 3.64 2.36E+08 3.91E−02 1 Example 2-1 Comparative 3 0 Fe = 1 25 10.86 1.91E+06 9.05E−02 Not measured Example 2-2 Comparative 3 0 Fe = 1 40 12.88 3.15E+05 2.85E−01 Not measured Example 2-3 Example 3 0.01 Ni:Zn:Fe = 12.5 0.32 6.02E+11 3.68E−04 2.1 1-10 0.024:0.006:2.97 Example 3 0.02 Ni:Zn:Fe = 12.5 0.37 8.30E+11 1.78E−03 20 1-11 2.323:0.581:0.097 Example 3 0.1 Ni:Zn:Fe = 12.5 2.50 1.09E+09 1.29E−04 1.5 1-12 0.22:0.06:2.73 Example 3 0.2 Ni:Zn:Fe = 12.5 3.74 3.25E+11 4.54E−03 12.9 1-13 0.4:0.1:2.5 Example 3 0.5 Ni:Zn:Fe = 0.1 0.06 6.42E+11 2.45E−04 6.7 1-14 0.8:0.2:2 Example 3 0.5 Ni:Zn:Fe = 0.2 0.07 7.48E+11 5.15E−04 Not measured 1-15 0.8:0.2:2 Example 3 0.5 Ni:Zn:Fe = 0.5 0.22 4.10E+11 3.94E−03 Not measured 1-16 0.8:0.2:2 Example 3 0.5 Ni:Zn:Fe = 2 1.05 8.20E+11 1.98E−04 13 1-17 0.8:0.2:2 Example 3 0.5 Ni:Zn:Fe = 30 16.49 3.84E+11 4.29E−03 Not measured 1-18 0.8:0.2:2 Example 3 0.5 Ni:Zn:Fe = 40 18.79 6.16E+08 5.19E−03 12.9 1-19 0.8:0.2:2 Example 3 0.5 Ni:Zn:Fe = 50 26.63 2.39E+08 1.05E−02 Not measured 1-20 0.8:0.2:2 Example 1 0.5 Ni:Zn:Fe = 2 0.50 4.54E+11 5.23E−03 Not measured 1-21 0.8:0.2:2 Example 1 0.5 Ni:Zn:Fe = 25 4.18 3.86E+08 8.13E−03 10.7 1-22 0.8:0.2:2 Example 2 0.5 Ni:Zn:Fe = 2 0.11 6.92E+11 6.43E−03 10.3 1-23 0.8:0.2:2 Example 2 0.5 Ni:Zn:Fe = 5 0.36 9.77E+11 8.59E−03 Not measured 1-24 0.8:0.2:2 Example 4 0.5 Ni:Zn:Fe = 25 2.81 6.30E+08 6.90E−05 10.5 1-25 0.8:0.2:2 Example 5 0.5 Ni:Zn:Fe = 2 0.87 8.19E+11 2.52E−03 6.1 1-26 0.8:0.2:2 Example 3 0.6 Ni:Zn:Fe = 12.5 2.65 3.30E+11 3.24E−03 Not measured 1-27 0.9:0.23:1.88 Example 3 5 Ni:Zn:Fe = 12.5 0.59 2.97E+09 2.21E−03 4.4 1-28 2:0.5:0.5 Example 3 30 Ni:Zn:Fe = 12.5 0.06 9.61E+11 2.41E−03 13.1 1-29 2.323:0.581:0.097 Example 3 40 Ni:Zn:Fe = 12.5 0.08 4.80E+11 3.27E−03 33 1-30 2.342:0.585:0.073 Example 3 60 Ni:Zn:Fe = 12.5 0.06 7.51E+11 2.62E−03 16.3 1-31 0.8:0.2:2 TABLE 5 Thermally conductive Saturation compound Element Coating magne- Resis- powder molar ratio tization tivity No. x/y ratio (wt %) (emu/g) (Ω · cm) Example 7 0.5 Ni:Zn:Fe = 12.5 8.86 4.27E+08 2-1 0.8:0.2:2 Example 8 0.5 Ni:Zn:Fe = 25 8.80 8.86E+08 2-2 0.8:0.2:2 Example 8 0.5 Ni:Zn:Fe = 2 0.25 7.64E+08 2-3 0.8:0.2:2 Example 6 0.6 Y:Fe = 12.5 3.84 2.22E+08 3-1 3:5 Example 6 0.5 Ni:Zn:Fe = 12.5 0.31 7.59E+10 3-2 0.8:0.2:2 Comparative 9 0.5 Ni:Zn:Fe = 2 0.66 3.65E+08 Example 3 0.8:0.2:2 Comparative 10 0.5 Ni:Zn:Fe = 12.5 7.92 9.96E−01 Example 4 0.8:0.2:2 TABLE 6 Increase ratio of the Magnetic Thermal Thermal thermal and conductivity conductivity conductivity Magnetic thermally Magnetic before the after the through the and conductive field magnetic magnetic magnetic thermally material alignment field field field conductive ratio period alignment alignment alignment Resin material (wt %) (min) (W/mK) (W/mK) (%) Example Acrylic Example 5 1 0.204 0.255 25.0 4-1 resin 1-17 Example Acrylic Example 10 1 0.265 0.325 22.6 4-2 resin 1-17 Example Acrylic Example 40 1 1.339 2.392 78.6 4-3 resin 1-17 Example Acrylic Example 50 1 1.373 1.849 34.7 4-4 resin 1-17 Example Acrylic Example 60 1 0.848 1.167 37.7 4-5 resin 1-17 Example Acrylic Example 70 1 1.317 1.712 30.0 4-6 resin 1-17 Example Acrylic Example 85 1 0.663 0.731 10.3 4-7 resin 1-17 Example Acrylic Example 40 2 0.806 1.326 64.5 4-8 resin 1-2 Example Acrylic Example 40 1 4.189 4.8 14.6 4-9 resin 1-26 Example Acrylic Example 40 1 0.535 0.685 28.0 4-10 resin 1-23 Example Acrylic Example 40 1 0.563 0.7325 30.1 4-11 resin 2-3 Example Epoxy Example 40 1 0.59 0.66 11.9 4-12 resin 1-17 Comparative Acrylic Comparative 40 1 0.643 0.642 −0.2 Example 5 resin Example 3 It will be apparent to those skilled in the art that various modifications and variations can be made to the disclosed methods and materials. It is intended that the specification and examples be considered as exemplary only, with the true scope of the disclosure being indicated by the following claims and their equivalents. BRIEF DESCRIPTION OF THE DRAWINGS The disclosure can be more fully understood by reading the subsequent detailed description and examples with references made to the accompanying drawings, wherein: FIG. 1 shows a magnetic and thermally conductive material in one embodiment of the disclosure. FIG. 2 shows a thermally conductive and dielectric layer in one embodiment of the disclosure. FIGS. 3A and 3B show cross sectional photographs (obtained by scanning electron microscope) of a gel layer before and after a magnetic field alignment in one embodiment of the disclosure.
Who Started The First 100 Days? The Milestone Hasn't Been Around Long Try as you might, it's impossible to escape coverage of the sitting president's first 100 days in office. The milestone is often seen as an indication of how the administration is proceeding in its early stages, so it's probably no surprise to hear that the man who started the first 100 days was a president whose first term was going swimmingly — at least from a leadership perspective. (The country, on the other hand, was in less than ideal shape.) Although it might seem like a political institution, the concept of the first 100 days hasn't actually been around very long in the grand scheme of things. In fact, your grandparents might be able to remember when the idea was created. It all began when Franklin D. Roosevelt took office in 1933. He had his work cut out for him: In the midst of the Great Depression, almost all the banks had closed, and by his inauguration in March, 13 million people were unemployed. It was one of the darkest points in American history, but Roosevelt promised to start work immediately, reforming the country within 100 days. Amazingly enough, that's exactly what he did. Within hours of his inauguration, he had his his entire cabinet sworn in at once, and in the following special session of Congress, his administration passed 15 landmark pieces of legislation, including the establishment of the Tennessee Valley Authority. Technically, all this took place over the course of 105 days, and Roosevelt had been referring to the beginning of the special session of Congress rather than his own presidential term. But the idea of the first 100 days in office stuck around — it's a clear measurement for journalists, and as you've undoubtedly noticed from the news right now, politicians can use the date to pressure the commander in chief to get things done quickly. For more than 80 years now, it's been used as barometer for other presidents' administrations. However, there are a few problems with the idea of the first 100 days. For one thing, thanks in part to an obedient Congress, Roosevelt set a ridiculously high bar. As FiveThirtyEight points out, no president has achieved the same level of productivity since then; even Obama, who came into office during a similar financial crisis, passed 11 bills in his first 100 days. Furthermore, the early stages of an administration aren't always an indication of how it will proceed over the next four years. Bill Clinton, for example, had a rough start to his presidency, but he wound up serving two terms. Meanwhile, although Jimmy Carter had a strong first 100 days, he ended his administration on an unpopular note. Even John F. Kennedy wasn't exactly a fan of the first 100 days, once admitting in a campaign speech that "all this will not be finished in the first 100 days." Of course, none of this has stopped anyone from analyzing Trump's first days in office. So far, he appears to have left much to be desired, with approval ratings stagnating around 40 percent. He failed to repeal the Affordable Care Act, and his executive orders regarding travel from some Muslim majority countries are tied up in courts (on top of which are the facts that many Americans don't want the ACA repealed and don't support the travel ban). A columnist for the New York Times called his first 100 days the "worst on record." If other presidents' first 100 days are any indication, though, it remains to be seen how Trump's administration will go down in history. See you in another four years.
https://www.bustle.com/p/who-started-the-first-100-days-the-milestone-hasnt-been-around-long-54087
DrugCite is basically a search engine for the Food and Drug Administrations (FDA) Adverse Event Reporting System (AERS). Acording to the website: “One of the primary ways that the United States Food and Drug Administration monitors the safety of marketed drugs is the collection and analysis of reported adverse events (an event that was not the intended outcome of the prescribed drug and has a negative impact on health) through the Adverse Events Reporting System (AERS). These reports are submitted by physicians, healthcare consumers, lawyers amongst others, and then the FDA scientific staff will assess these events in the context of other databases to determine if a particular safety concern is associated, and possibly caused by, exposure to a particular drug. Since this is a public database and useful to prescribers and patients alike to know if “has what I’m experiencing been described in patients taking this drug before?” DrugCite has created a more friendly interface to answer that question. Use of this data should in no way be confused with the FDA’s rigorous process of evaluating the potential link of adverse events to drugs as causal but merely represents a portal into what is currently being reported to the Agency.” It’s a neat concept, but please take the information with a grain of salt. Remember that the FDA will list anything that is reported while an individual is on a medication, whether or not the drug is truly the offending agent or not. For example, I searched for acetaminophen and received the graphs below. Looks pretty scary on the surface, but I consider acetaminophen to be one of the safest medications on the U.S. market when used properly. Something to consider when using this tool.
http://jerryfahrni.com/2011/12/drugcite-a-searchable-database-of-drug-side-effects-reported-to-the-fda/
Condemning a mobile home usually occurs when a government entity determines it is no longer fit for human habitation. Patterns of unsafe mobile home code violations typically determine these decisions. No one should live in a condemned home or even use it unless they can prove that repairs fix the cited problem. Often, this is difficult to do for mobile homes. In these instances, it’s important to know how to condemn a mobile home. You see, mobile homes, if not well taken care of can deteriorate very fast and most often than not, the repairs are either too expensive or not even worth it. As a mobile home park owner, realize that if a home poses a threat to the lives of the residents, then you must go ahead and have it condemned. What are some of the reasons for having a mobile home condemned? There are many reasons which can lead to such a drastic decision. They can include: - The home is old and was abandoned by the owners for more than 60 days. - The utilities have been disconnected. - An inspector sites the home as a hazard and renders it unsafe for occupancy. - The mobile home is dilapidated even without specific hazards. - Bio-contamination - Presence of persistent or significant toxic mold - Chemical contamination - Persistent pest infestation How to condemn a mobile home: Step #1 There are steps you have to take as a park owner to have the house condemned and possibly demolished. However, these steps will vary with the jurisdiction, meaning the city, county and state your park resides. Before making any rash decisions, research what steps pertain to your residential area. To get the ball rolling, you need to observe the property. List all the possible health and safety violations that you notice from the outside. It is best you do not enter unless you have permission from the owner if they are still living in it. If they abandoned their home, then don’t go inside. There are also a few questions you should ask before entering the residence. These will help you determine the level of damage and whether the house is in a state of disrepair: – How safe does the house seem according to the house codes? – What signs of structural damage can you see? – Are there trash or weeds in the yard? – Is the foundation or the roof compromised? – Are there any signs of rodents or pests inhabiting the home? – Is there any sign of life? How to condemn a mobile home: Step #2 Once you have verified everything, it is time to contact the local authority. Check the government pages or the website of your town for the contact information of the officials in your area. Call the office and inform them about your concerns as a park owner. The housing inspector will come over and inspect the mobile home. Most cities post their mobile home building codes and regulations online. It is a good idea to check the ordinances in your area. This way, you will know if your particular situation warrants immediate attention and the best way to go about it to get quick action. How to condemn a mobile home: Step #3 Follow up on the complaint and check whether the inspection or any legal proceeding about the home is taking place. Be aware, even if an inspection takes place and the inspector does condemn the house, getting it off your property will not be a sure thing. As a matter of fact, this could be a tedious process that might take a while before the county authorities do anything. The officials might issue a citation or a notice to alert the homeowner of the problems. The owner will need time to respond to the citation and to address the problems. If the owner does not respond within the expected timeframe, the local government will go ahead and condemn it and will eventually demolish it. However, in this case, you need to understand that “eventually” could be a very long time. How to condemn a mobile home: Step #4 If given the opportunity, you should attend any legal hearing or proceeding to testify on the condition of the house. The amount of time taken to demolish the house may be shorter if you do. However, the legal battle could take longer if there were occupants in the mobile home. If the owner negotiates a rehabilitation agreement with the building authority, then it could be possible for them to reverse the condemned status. Will the owner of the mobile home get compensation? There is also the issue of compensation to the mobile home owner if the building gets condemned. If the owner of the home was living there at the time of the order, the housing authority might agree to compensation. In this case, the owner would get a pro-tanto award. The compensation will cover the destruction of their property, and it will be a written offer based on the value of the home. Once the mobile home is off of your property, then you can go ahead and lease the space to another homeowner. Safety above everything else While you may not necessarily want to learn how to condemn a mobile home, you may find yourself in a situation where it is necessary to know. House neglect is often a result of drastic financial or health problems. Protect yourself, the inhabitants, and other residents of your mobile home park by making the safe call.
https://www.mhomebuyers.com/how-to-condemn-a-mobile-home/
Ultra athletes are a special breed, running or cycling hundreds and sometimes thousands of miles to compete in exclusive races. But what really happens to their bodies hour after hour and day after day of intense exercise? A new study reveals some dramatic changes may take place. The study, presented Sunday at the annual meeting of the Radiological Society of North America in Chicago, focused on 44 runners who took part in the TransEurope-FootRace in 2009, a 64-day race that covered about 4,488 kilometers (about 2,789 miles), going from southern Italy to Norway. Researchers had a mobile MRI unit and tagged along with the runners, gathering information about how their bodies were changing. Half the runners had full-body MRIs taken every three or four days. The athletes also had their blood and urine checked, and some were given other tests such as electrocardiograms. Overall, during the race runners lost an average 5.4% of their body volume, most of that occurring during the first half of the race. During that time they also lost 40% of their body fat, but lost 50% by the end of the race. Average muscle volume loss in the athletes’ legs was 7%. Fat tissue was affected first by the excessive exercise. Loss of visceral fat--the fat around the abdomen that is thought to up the risk for cardiovascular disease--happened early on in the race. Most fat overall was lost in the beginning of the race as well. Researchers discovered that some leg injuries don’t require being sidelined. Runners with intermuscular inflammation of the upper or lower legs, for example, can frequently continue to run without additionally damaging tissue. However, running with joint inflammation carries more possible risk. Although ultra races are a niche event, researchers noted that the findings may spill over into marathon or recreational running. “The rule that ‘if there is pain, you should stop running’ is not always correct,” said study co-author Dr. Uwe Schutz, in a news release.
Content-addressable memory (CAM), also known as associative memory or associative storage, is a type of memory used in, for example, certain very high speed searching applications, such as, lookup tables, databases, data compression, etc. Unlike standard computer memory (e.g., random access memory (RAM)) in which the user supplies a memory address and the RAM returns the data word stored at that address, a CAM is designed such that the user supplies a search word and the CAM searches to see if that search word is stored anywhere in the CAM. If the search word is found, the CAM returns a list of one or more storage addresses where the word was found, and in some architectures, also returns the data word and/or other associated data. Thus, a CAM is the hardware embodiment of what in software terms would be referred to as an associative array. Because a CAM is designed to search its entire memory in a single operation, it is significantly faster than RAM in virtually all search applications. There are some cost disadvantages to CAM however. For example, unlike RAM, which utilizes comparatively simple storage cells, each individual memory cell in a fully parallel CAM generally has its own associated comparison circuit to detect a match between a stored data bit and an input search bit. Additionally, match line outputs from each CAM cell in a given data word are combined to yield a complete data word match signal. The additional circuitry required by a CAM increases the physical size of the CAM chip which increases manufacturing cost. Moreover, the additional circuitry may increase power dissipation in the chip since in most cases every comparison circuit is active during each clock cycle. Consequently, CAM is typically only used in specialized applications where searching speed cannot be achieved using a less costly approach. In a standard CAM, each CAM cell contains circuitry for performing an exclusive-OR (XOR) function. The XOR circuits for each data word are then summed by a wired-OR connection onto a match line. During a search operation, if any bit of the supplied search word is different from the corresponding bit of each stored data word, the XOR of the bit that does not match pulls down the match line of the stored word. The time it takes for the match line to discharge when only one bit is different between the search word and the stored word is a significant part of the overall critical delay of the search operation in the CAM. In this scenario, a single XOR circuit must discharge the match line. CAM words can be very wide (e.g., 64, 128 and even 256 bits are commonly used). As the number of CAM cells connected to a given match line in the memory circuit increases, the time for a single CAM cell to discharge the match line increases accordingly. This is due primarily to the increased capacitance on the match line attributable to the CAM cells connected thereto. In many cases, particularly single-ended sensing applications, the logical state of a selected match line in a CAM is sensed, for example during a search operation, by an inverter connected to the corresponding match line. A local search time of the memory circuit is defined primarily by the time it takes for the voltage on the match line to reach a switching point of the sensing inverter. Therefore, since it is desirable to minimize search time in the CAM, it is beneficial to reduce the time it takes for the voltage on the match line to reach the switching point of the sensing inverter. One known technique for reducing the search time in a CAM is to employ differential latch sensing. However, latch sensing adds significant complexity to the CAM design due at least in part to the lack of differential match lines and due to the substantial amount of noise generated by simultaneously searching every word stored in the CAM. Another known technique is to employ larger memory cells having increased gain capable of more quickly driving (e.g., charging or discharging) the corresponding match lines. However, using larger memory cells undesirably increases the physical area and the power consumed by the memory cells, and thereby increases the cost of a memory circuit which uses such cells. Accordingly, there exists a need for an improved searching arrangement and/or CAM cell for use with a CAM circuit which does not suffer from one or more of the problems exhibited by conventional CAM searching methodologies and/or CAM cells.
Boston Celtics Honor Paul Pierce The Management Team of Face Activities would like to take a moment to recognize a great moment in sports history. On Sunday, the same day the Boston Celtics faced the Cleveland Cavaliers on the court, the team honored legendary small forward Paul Pierce, retiring his beloved number 34. This is the 22nd jersey number the Celtics have retired. That’s the most among all North American Sports franchises. At six feet seven inches, Pierce, known to admiring fans as “The Truth,” was a player of consummate skill. The veteran of 10 All-Star teams, he enjoyed 19 years in the NBA—-15 of which he played for Boston, to the delight of legions of fans. He averaged 21.8 points and 6 rebounds per game for Boston. Pierce honed his basketball technique at the University of Kansas, from where the Celtics drafted him in 1998. His career point count is the 18th highest in NBA history, totaling a staggering 26,397. Only one other Celtic, John Havilcek, scored higher, at 24,021. That’s a truly admirable record. After the 2012-13 season, Pierce and Kevin Garnett were traded to the Brooklyn Nets, in a complicated and controversial deal involving 5 draft picks and 9 players. Many Boston fans consider this a sad day in Celtics history, and have sorely missed “The Truth” ever since. In addition to his iconic career in sports, Pierce had a strong presence off the court, working with children out in the community, encouraging them to develop academically as well as athletically.
http://faceactivities.com/2018/02/13/boston-celtics-honor-paul-pierce/
We would like to address some of the criticisms levied at the Government’s proposed social insurance scheme. The scheme was developed by the New Zealand Council of Trade Unions (CTU), Business New Zealand, and the Government, and includes input from many women who lead the trade union movement – us included. The scheme could revolutionise support for workers by offering up to seven months’ income protection to those who are made redundant or have a health or disability condition that prevents them from working. It would provide broad coverage for contractors, casual workers, and those in insecure work. SOCIAL RESPONSIBILITY The CTU believes protecting workers from the impact of unexpected economic change is one of our fundamental duties as a society. Yet protecting workers from a sudden loss in income is something we don’t do well in Aotearoa. We have no statutory redundancy, income protection, or notice periods. The proposed scheme includes all these provisions and should be welcomed by anyone who cares about protecting vulnerable workers. TARGETED SUPPORT Contrary to some claims, this programme will best support those workers who are most likely to be made redundant. Official data shows these are women, young people, Māori, Pasifika, and workers on low incomes. When unemployment rose during the first wave of the pandemic, women lost their jobs at a much higher rate than men. The number of unemployed women increased by 17,000 in the year to September 2020 and stayed higher than the rate for men for six months after that. Under this proposal, women and other vulnerable workers would have had economic security, training opportunities, and wraparound support. That’s why we, as women at the heart of the trade union movement, back this proposal. COMMUNITY RESILIENCE Job losses are always a tragedy. When they occur on a large scale, they are an economic disaster. We saw this during the painful restructuring of the 1980s, and later during the global financial crisis. It’s likely to happen again in the future as industries, skills, and technologies change. The scheme offers protection against this eventuality by helping local economies regenerate and renew. The proposal also protects workers who suffer job losses from health and disability conditions. Workers who develop illnesses like cancer or arthritis, and those with pre-existing mental or physical health conditions, often receive little or no support from the existing welfare state. The proposed scheme closes the gap and gives workers time to get well. It helps Kiwis get into work that’s right for them. It stops poverty upstream. STRENGTHENED SAFETY NET Despite what some say, the scheme doesn’t come at the expense of the welfare state – it boosts it. Countries with social insurance schemes have more robust welfare systems, lower levels of inequality, and better standards of living for all residents. In Aotearoa, this scheme would add another layer of protection for workers, without impacting the existing welfare state. The scheme is about making sure that when workers need help, they get it. This is an abridged version of an article which originally appeared in Stuff.
https://www.psa.org.nz/our-voice/union-leaders-back/
Buddhism was introduced in Japan in the 8th century CE during the Nara period (710-794) and the Heian period (794–1185). Zen was not introduced as a separate school in Japan until the 12th century during the Kamakura period (1185–1333), when Nōnin established the first Zen school known as the Daruma-school. How did Zen Buddhism start in Japan? The roots of zen Buddhism trace back to the 12th century, when it is said to have been brought to Japan by Buddhist priest Myoan Eisai after a visit from China (he is also credited as introducing green tea to Japan as well). Who started Zen Buddhism in Japan? Zen Buddhism survived the persecution though it was never the same again in China. Zen spread to Korea in the 7th century CE and to Japan in the 12th century CE. It was popularised in the West by the Japanese scholar Daisetz Teitaro Suzuki (1870 – 1966); although it was found in the West before that. Is Zen from Japan? Zen (Chinese: 禪; pinyin: Chán; Japanese: 禅, romanized: zen; Korean: 선, romanized: Seon; Vietnamese: Thiền) is a school of Mahayana Buddhism that originated in China during the Tang dynasty, known as the Chan School (Chánzong 禪宗), and later developed into various schools. What does Zen mean in Japan? The Japanese word zen is a borrowing of a medieval Chinese word (now pronounced chán, in modern Mandarin Chinese) meaning “meditation, contemplation.” Chán is one of the many Buddhist terms in Chinese that originate in India, the homeland of Buddhism. Is ZEN really Buddhism? Buddhists are those who follow the teachings of the Buddha. zen is the japanese translation of the chinese word “chan” which is the chinese word for “dhyana” which is the sanskrit word for the pali word “jhana” which means “meditation”. Is Buddhism Chinese or Japanese? Zen is the Japanese development of the school of Mahayana Buddhism that originated in China as Chan Buddhism. While Zen practitioners trace their beliefs to India, its emphasis on the possibility of sudden enlightenment and a close connection with nature derive from Chinese influences. Does Zen Buddhism believe in God? However, even though most of the world’s Buddhists recite the name of Buddha or pray to Buddha, Buddha is not a deity or supreme being in the same way that the Christian God is. … My teacher, Shunryu Suzuki Roshi, used to say that people could practice Zen meditation and also believe in God; that was OK with him. What does Zen mean in English? The definition of zen is slang for feeling peaceful and relaxed. An example of zen as an adjective is to have a zen experience, how you feel during a day at the spa. How do I start practicing Zen Buddhism? To begin practicing Zen meditation, find a comfortable place and position. Try short sessions where you focus on your breath. With time, develop a routine that works for you. Meditation can be difficult at first, as it takes practice to clear the mind, but you’ll eventually find a meditation routine that works for you. What is a Zen lifestyle? Zen: simple, easy, tranquil. Adding a bit more “zen” to our life is beneficial to both our brain and our body. In the past we’ve explored some mindfulness exercises that can alleviate stress and anxiety, which are great to include in your zen routine. What is the true meaning of Zen? 2 or zen : a state of calm attentiveness in which one’s actions are guided by intuition rather than by conscious effort Perhaps that is the zen of gardening—you become one with the plants, lost in the rhythm of the tasks at hand.— What is Zen state of mind? Zen meditation mainly involves perceiving your thoughts and understanding your mind and body. … The Zen state of mind is the same as the mood of a beginner: there are no assumptions, expectations nor prejudices. A neophyte is receptive and open. What does Zen feel like? Zen is a term that describes a feeling of peace, oneness, and enlightenment. It also describes a type of Buddhism in which meditation is used to stay present and non-judgmental. Zen is practiced diligently over a lifetime. What’s another word for Zen? What is another word for Zen?
https://livingashtanga.com/yoga-guru/how-did-zen-originate-in-japan.html
Office of Community Engagement and Diversity The Office of Community Engagement and Diversity in the Department of Molecular and Human Genetics works alongside the Baylor College of Medicine’s Office of Institutional Diversity, Equity and Inclusion to promote an environment that fosters inclusion, education and understanding for faculty, trainees, staff, and the community-at-large. Education, Recruitment and Inclusion Activities The Evenings with Genetics series has served the community for 15 years. The department partners with Texas Children’s Hospital to offer this free webinar/seminar series that is open to the public. The goals of the series are to provide current genetic and genomic information in a clear, plain-language manner, offer support and resources to families impacted by a genetic disorder and foster interdepartmental collaborations. Through a collaboration with the UT Texas Center for Disability Studies, the Texas Department of State Health Services and Texas Children's, we provide statewide genetics outreach in the form of in-person events and webinars. A Lunch and Learn series (in-person) and the Careers in Genetics and Genomics series (virtual) are provided annually to present the genetics and genomics career path to high school and undergraduate students. The Medical Genetics Diversity Visiting Students Program was developed to provide under-represented 4th year medical students a four-week clinical rotation. The Town Hall Medical Genetics Career Options virtual program offers 3rd and 4th year medical students the opportunity to learn about these careers from department faculty. The “Let’s Learn about One Another: the African American Experience” is a six-part series of interactive presentations that began in the department during the summer of 2020 to address the social injustice climate. The Let’s Learn program will continue to expand to include perspectives from the department’s widely diverse members. The office holds “Understanding Genetic Variations Sessions” at national meetings such as the Annual Biomedical Research Conference for Minority Students to introduce genetics and genomics careers and diverse biomedical researchers to encourage participation in the field. The office also curates an extensive internal online library of articles regarding diversity, inclusion, and equity for department faculty, trainees, and staff. Meet Our Team Learn more about members of the Office of Community Engagement and Diversity.
https://www.bcm.edu/departments/molecular-human-genetics/engagement-and-diversity
A book exhibition was held for four days in a school. The number of tickets sold at the counter on the first, second, third and final day was respectively 1094, 1812, 2050 and 2751. Find the total number of tickets sold on all the four days Addition is putting two or more numbers together or combining them to know the total or the sum of the numbers. Answer: The total number of tickets sold on all 4 days is 7707 tickets. Finding the total tickets on all 4 days, is equal to finding the sum of all tickets on the 4 individual days. Explanation: So, the total tickets would be equal to 1094 + 1812 + 2050 + 2752 tickets = 7707 tickets.
https://www.cuemath.com/questions/find-the-total-number-of-tickets-sold-on-all-the-four-days/
This family-style feast is full of bright, fresh flavors and is a blast to assemble at the table! Whether you choose our ginger scallion chicken or lemongrass tofu, either is sure to be hit when served alongside rice noodles with our spicy noodle sauce, tasty mushrooms, lots of fresh herbs, Vietnamese pickles and ALL the sauces. Don't forget dessert -- we're serving this with our coconut panna cotta with spicy pineapple compote! |Type:||Complete Dinner| |Servings:||4 servings| |Kitchen Time:||60 minutes| | | Great with: | | In your Kit: - K&M Ginger Scallion Chicken Thighs OR K&M Lemongrass Tofu - Rice Noodles - K&M Spicy Noodle Sauce - Romaine Lettuce & Arugula (or Signature Salad Mix) - Herbs (mint/cilantro/scallions) - K&M Vietnamese Pickles - K&M Nuoc Cham - Fresno Chilis - Lime - Peanuts - Shiitake & Crimini Mushrooms - K&M Ginger Scallion Sauce - K&M Coconut Panna Cotta Pantry: - Vegetable Oil Instructions: SOME PREP: 1) Wash and chop romaine into bite-size pieces. Wash and slice scallions. Chop cilantro (include some of the stems – the most flavorful part!). Pick mint leaves off of the stem. Toss romaine, scallions, mint, and cilantro in a large salad bowl. Set aside to chill in the fridge. 2) Place rice noodles in a large mixing bowl. Boil 2-3 quarts of water and pour over noodles to cover. Wait 2 minutes, then give it a gentle stir to loosen. Allow to sit for an additional 8 minutes, then strain out the water. Immediately toss with ½ cup of the spicy noodle sauce and set aside in the fridge until dinner is ready. 3) Slice Fresno chilis into thin rings and limes into wedges. Place in small garnish bowls for the table. 4) Place Vietnamese pickles, nước chấm, peanuts, and remaining spicy noodle sauce into serving dishes to be shared at the table. GLAZED MUSHROOMS: 1) Remove tough portion of the shiitake stems – kitchen shears work great here! Cut the shiitake and cremini mushrooms into 1-inch pieces. 2) Heat a nonstick skillet with 1-2 Tbs of vegetable oil over medium-high heat until shimmery. Add mushrooms and sauté, stirring occasionally, until almost tender. 3) Increase heat to high and add ¼-½ cup ginger scallion sauce. It should bubble and thicken within a minute. Remove from heat and dish mushrooms into a serving bowl to join the other toppings on the table. They taste great served at room temperature! GINGER SCALLION CHICKEN: 1) Heat 1 Tbsp vegetable oil in a pan over medium heat. Sear chicken thighs for approximately 4-6 minutes on each side until cooked through to 165ºF. Slice transfer to a serving dish. LEMONGRASS TOFU: 1) Line a sheet pan with foil for easy clean-up! Place lemongrass tofu on foil and drizzle any excess marinade over the top. 2) Broil tofu until browned and warmed through. Slice transfer to a serving dish. TO SERVE: 1) No rules here – we like to layer greens, noodles, protein and all the toppings as desired and dig in! 2) Don’t forget the coconut panna cotta for dessert. Simply scoop portions as desired and enjoy!
https://kitchenandmarket.com/blogs/recipes/vietnamese-noodle-bowl
Family therapy was launched from the early work of Gregory Bateson and others in the Hixon Symposia and then adopted a General System perspective. This paper charts some of the pathways taken by Systemic Family and Couples Therapy (SFCT) during the last 50 years, reviews current developments and invites consideration of developments in other areas of systemic theory and application that would benefit SFCT. In the process I will offer stages from my own erratic thread through these developments, through theories of contingency , causal attribution, schemas, and attachment to practice in reflexive learning and developing a self-report measure of family functioning. Early models of SFT included the strategic in which the therapist determines the systemic dysfunction and creates conditions that prevent the family from continuing with it, and the more collaborative structural with its focus on communicational and other boundaries, and triangulations. Major advances in the 1980s include ‘Milan systemic’, Murray Bowen’s Systemic Family Therapy and Maturana’s structurally determined systems. In Europe at least the field became resistant to explanations involving causality and there was a move to regarding the family as the only expert on its functioning. Meanwhile the focus on families as linguistic systems opened up to external influences from such as Bakhtin, Vygotsky, Foucault and Derrida focussed attention on wider systemic influences. Current developments cluster around an integration of systemic with attachment approaches, the ‘open dialogue’ movement and ‘relational reflexivity’. Concerns have returned to wider systems and in particular Government and Health concerns with evidence-based provision, monetisation, and well-being.
https://journals.isss.org/index.php/proceedings58th/article/view/2275
Armored dinosaur with spiky head now on display at Salt Lake City museum SALT LAKE CITY — A dinosaur that was covered in bony armor from its spiky head to its clubbed tail is newest fossil addition to a Utah museum. Scientists say the species of ankylosaur was a squat plant-eater that roamed southern Utah on four legs about 76 million years ago. It was first discovered in 2008 in the Grand Staircase-Escalante National Monument's rich dinosaur repository. The prepared and assembled fossil was unveiled Thursday at the Natural History Museum of Utah. MORE: Huge cache of fossils found on lands cut from Bears Ears National Monument Researchers say they were expecting it to have smooth bony armor on its skull like other North American ankylosaurs, but were surprised to instead find evidence that it instead had spiky, bony armor on its head and snout like fossils found in Asia. The Latin name for the species recognizes Randy Johnson, a museum volunteer who painstakingly freed the skull from rock and debris. READ MORE:
https://www.thespectrum.com/story/news/2018/07/20/ankylosaur-fossil-displayed-natural-history-museum-utah/810023002/
Dalata Hotel Group PLC: Total Voting Rights - Oops!Something went wrong.Please try again later. - DLTTF Dalata Hotel Group PLC (DAL,DHG) Total Voting Rights ISE: DHG LSE: DAL In conformity with Regulation 20 of the Transparency (Directive 2004/109/EC) Regulations 2007, Dalata Hotel Group plc announces that: As of 2 August 2022, Dalata Hotel Group plc’s share capital consists of 222,867,775 Ordinary Shares of nominal value €0.01 each. Dalata Hotel Group plc does not hold any Ordinary Shares in treasury. Therefore, the total number of voting rights in Dalata Hotel Group plc is 222,867,775. The above figure may be used by shareholders as a denominator for the calculations by which they will determine if they are required to notify their interest in, or a change to their interest in, Dalata Hotel Group plc under the Transparency (Directive 2004/109/EC) Regulations 2007. ENDs Contacts About Dalata Dalata Hotel Group plc was founded in August 2007 and listed as a plc in March 2014. Dalata is Ireland’s largest hotel operator, with a growing presence in the UK and continental Europe. The Group's portfolio comprises 48 predominately four-star hotels with 10,511 rooms and a pipeline of over 1,500 rooms. The Group currently has 28 owned hotels, 17 leased hotels and three management contracts. Dalata successfully operate Ireland’s two largest hotel brands, the Clayton and the Maldron Hotels. For the year ended 31 December 2021, Dalata reported revenue of €192.0 million and a loss after tax of €6.3 million. Dalata is listed on the Main Market of Euronext Dublin (DHG) and the London Stock Exchange (DAL). For further information visit: www.dalatahotelgroup.com ISIN: IE00BJMZDW83, IE00BJMZDW83 Category Code: TVR TIDM: DAL,DHG LEI Code: 635400L2CWET7ONOBJ04 OAM Categories: 2.5. Total number of voting rights and capital Sequence No.: 178688 EQS News ID:
https://uk.finance.yahoo.com/news/dalata-hotel-group-plc-total-075217828.html
Vertebra (spinal) is in the seat is an outstanding example of the partial application of ergonomic design, its intention is to suit the person's spine bones, according to the different posture of the human body and automatically changes its composition, in order to provide a more comfortable support. Seat and back completely independent, thus can without manual regulation on for user of need: If body straight, Chair on rendering comfortable of vertical of location; if sat with of people Qian pour wrote, seat on automatically to lower tilt 6º; people in relax of when, seat will ahead sliding, and chair back backward tilt, again push about, it of tilt can again increased 12º, makes sitting more relax. As precise anatomic study and serious orthopaedic examination results of Vertebra in an attempt to improve working conditions in the cultural background of the birth, and resulting design requires that the technology can meet the growing need for flexibility and adapt to the changing requirements of users.
http://www.anjitfbarstools.com/info/office-armchairs-85956.html
Podlaskie voivodeship in Poland and Hrodna Oblast in Belarus are the regions with a deeply ingrained history of handicraft traditions. Some of the local techniques have been existing on both sides of the border but some of them are characteristic only for their districts. One thing is common – this area represents a great legacy, which has to be supported and promoted to stay alive for future generations. Identical needs defined on both sides of the border, including inefficient use of cultural potential, the lack of suitable conditions and knowledge of regional culture and history, mainly among the young people, was the reason for the Project TRADITIONS. The project idea is to maintain and promote cultural heritage related to the old local handicraft traditions of the town Mosty in Belarus and the Czarna Białostocka Commune in Poland, as well as to improve the image and attractiveness of both regions in terms of tourism and economy. Both partners will create a system of well-established and regular interaction and exchange of experience between traditional cultures and areas of craftsmanship in the border region. Various events are planned within the project: Polish-Belarusian Plein-air workshop of traditional sculpture, The Path of Tradition - Polish-Belarusian open-air sculpture workshop, Traditional Pottery Plein-art event, Festival - Traditional handicraft fair. Moreover, the tourist infrastructure in Poland and Belarus will be improved, which will attract tourists and promote traditional crafts of the region. Joint cross-border actions will develop new cooperation based on common, similar traditions and will support regional culture and tourism. There will be an increase of interest among locals in preserving the identity of the region, in the rebirth of traditional crafts, and the exchange of experience of creators of the Polish-Belarusian borderland, giving opportunities for the creation and development of small craft businesses and tourism. Was this page useful?
https://pbu2020.eu/en/projects2020/478
part of the state. The districts that constitute Central Gujarat are Ahmedabad, Gandhinagar, Kheda, Anand, Vadodara, Mahisagar, Chota Udepur, Panchmahal and Dahod. There are various historic settlements within the region namely, Ahmedabad, Nadiad, Vadodara and Vaso; that include many traditional houses constructed of brick and wood. The traditional houses in Central Gujarat region have a typical organization with otlo and khadki leading to the chowk (courtyard) and medi (inner rooms) or main hall. Viramgam Sanand Dholka Kheda District Kheda Nadiad Vaso Mehmedabad Kalol Mansa Dehgam Bharuch Bhuj Mandvi Nakhatrana Lakhpat Dhordo Gandhi nu Gaam Ludiya Bhirandiara Tunda Kuran Virani Nani Khakhar The research project was initiated to study and comprehend the vernacular building technique called the koti-banal construction prevalent in Kumaon- Uttarakhand, India. Kumaon is one of the two regions and administrative divisions of Uttarakhand, a mountainous state of northern India, the other being Garhwal division. It includes the districts of Almora, Bageshwar, Champawat, Nainital, Pithoragarh, and Udham Singh Nagar. Kumaoni villages consist of loosely grouped homes surrounded by farmlands. The villages are generally situated near rivers or springs, and the homes are connected by footpaths. Like hill architecture all over, the houses in Kumaon are spread out in clusters. Every house has space for cattle and storage and it’s a close -knit lifestyle with nature. The intensions of the research included the mapping and documentation of the indigenous architecture in Kumaon, Champawat region. The study was divided in two parts, and was aimed to disseminate the treasure of knowledge that lies within. The mapping project formed part of the first trip to the region, and included preliminary research and identify houses for documentation. This research was funded by Ms. Annemarie Pestalozzi aka Ammaji from Zurich, Switzerland and was initiated in 2009. The project aims to identify and map the traditional building technique called the kath-khuni construction in Himachal Pradesh, India. The construction system which is prevalent in the region highlights the indigenous building practices, reflecting excellent sustainable and earthquake-resistant techniques. The land of Himachal Pradesh rises from the plains at an altitude from 350 meters above mean sea level on the southwest to an altitude of 6816 meters in the east towards the Tibetan plateau. 64% of land area is covered with forests in Himachal Pradesh; thus, the most predominant material of construction is wood. Majority of the population is spread in small village, which appear almost ecologically planned. The settlements and built forms located along the contoured sunny slopes amidst the backdrop of hills, appear to grow out of the folds of the landscape. The landscape, materials, techniques of making, all contribute to a common formal language of settlements. The research is a collaborative project, initiated in 2011, between researchers based in DICRC (Design Innovation and Craft Resource Centre) in the Faculty of Design, CEPT University, Ahmedabad, India and in CRIDA (Critical Research in Digital Architecture) in the Faculty of Architecture, Building & Planning, The University of Melbourne, Australia.
http://dicrc.in/Building-Mapping
In my article, False Starts, one of the forward moving tips is to forgive yourself for your failures. These alleged failures include struggles, the should haves and supposed to do’s, the sharp words, the mis-steps, unflattering thoughts and judgments. For some, it may even be important to forgive yourself for your success (believe it or not, success can make some people feel guilty). The culmination of your experiences have brought you to where you are today. Whether you find yourself feeling inspired or stifled can be linked to how other people treat you, yet more secretly to how you treat yourself. How do you treat yourself when you wish you would have acted differently? - Blame someone else? - Minimize or justify your actions? - Suppress your thoughts and feelings? - Beat yourself up? (feel angry, guilty, undeserving) - Take outward steps to reconcile? - Take inward steps to forgive? Most people have done some or all of these. The first four tend to prolong our pain and ability to learn and develop. Number 5 might be an olive branch which may or may not be received or reciprocated by the other person. Regardless of the outcome, it can be an important step toward number six…forgiving yourself. As an example, once I was out socially and someone who, in my opinion, was acting obnoxious and oblivious. They pushed my buttons and ’caused’ me to act in an unbecoming way. Even though I felt they were the antagonist, I reached out to apologize due to my behavior. Their response was lukewarm at best and did not even hint at reciprocating the apology. Even though, the outcome does not seem ideal, it did allow me to accept my behavior and forgive myself. Whereas I may not feel great about what happened or the outcome, I do feel good about the steps I took to correct for the event. In a past professional situation, In order to even have a chance at someone forgiving me, I had to forgive myself first. That meant acknowledging that I had done something wrong. Even though I could justify it intellectually (and put the onus on someone else)…it still weighed on me. When I was leading cross-functional teams, a high visibility risk occurred on one of my projects and I was pressed to throw someone under the bus to feed the chest pounding among certain senior managers. I tried to take the blame, but that didn’t fly. Using different words with the same intent, they asked me “Who can we fry?” I negotiated hard to minimize the fallout, yet there was fallout nonetheless for one of my team members. It was a totally unproductive activity that impacted my relationship with this conscientious and very professional person. I was angry at the ‘leader’ that forced a blame exchange, yet I was more infuriated with myself for agreeing to a lesser charge when no charge and corrective action would have been the best choice. In between losing sleep and taking steps to re-shore my character, I had to forgive myself. I had to think about the person I wanted to be. Did I want to act in fear of losing my job or in fear of losing my character. Moving forward, I chose the latter. In other examples, I have worked with clients that are so wound up with anger for not being considered for a promotion, or frustrated with their team members for not being accountable, or with their manager for not communicating with them. Of course, they blame the other person (who could have acted differently). After relatively short conversations, it becomes clear that they are also upset with themselves for not expressing their interest, not following through on their own action items and not seeking clarification, respectively. Of course, forgiving yourself doesn’t erase those events or non events, however it does allow you to utilize them to release weight that holds you back. We have a choice. We can hold onto dis-empowering external blame, or we can invest in ourselves by taking ownership and action that heals and prepares us for future opportunities. Forward moving tips: - Write down three occurrences that left you feeling disappointed. - Look internally to see how you added to the situation/outcome. - Recollect what led you to make the decision you made. - Reflect on what you learned and how it has impacted you. - Determine what actions you can take to smooth over a previous situation. - Decide how you want to act in the future. - Realize that releasing the past makes room for new possibilities. Because we are human, we are going to do things that upset ourselves and others. Rather than continually absorbing these experiences, it is healthier to learn, forgive and release. For assistance with helping you and your team release the past and move onto more fulfilling experiences…Contact Viage Partners today. © Viage Partners 2018. Unauthorized use and/or duplication of this material without express and written permission from this blog’s author and/or owner is strictly prohibited. Excerpts and links may be used, provided that full and clear credit is given to Viage Partners with appropriate and specific direction to the original content.
https://viagepartners.com/2018/08/24/forgive-yourself/
مشخصات نویسندگان مقاله: Ali Reza Ghodrati خلاصه مقاله: Ali Reza Ghodrati In the recent years, the coastline of Caspian Sea in Guilan province especially the mouth of big rivers such as Sefidroud delta has changedincreasingly due to the environmental, continental and marine factors. The changes in the position of these coastlines have made some damages.The changes of water level that come from the land, the differences in the land sediment levels and the situation of erosion in the coastline's sediments such as continental factor and the changes of sea level and the patterns of current and Caspian Sea waves are the some changes that occurs in Caspian Sea's coastlines. The purpose of this study was to investigate the causes of these factors in different regions of Guilan'scoastlines. Using of aerial photos in the two periods of years in 1967 and 1994 with the scale of 1/20000 and using of software's such as Ilwis, Photoshopsediment levels was estimated. Some geographic maps and topography with the scales of 1/20000, 1/50000, and space measurement used in order to complete theinformation in this research. The sedimentary units that studied were units that in geography named Quaternary unit. These units in the sedimentary environment are Qt1, Qt2 and QM, which are related to land environment. Qts, Qsp units isbelonged to land and Qt1, Qt2, Qt3 are related to rivers environment and finally the Q2be, Q2b, and Qbm units are related to middle and under coastline. The Guilan'scoastline progress under the sea erosion was estimated in Astaneh-Ashrafiye 84.08 ha, Talesh 49.52 ha, Anzali 45.87 ha, Lasko-kelaye 1430.69 ha and Roudsar 678.5 ha. Retrograde under the coastline's sediment was estimated in Astaneh- Ashrafiye 276.99, Talesh 48.31, Anzali has not retrograde, Lasko-kelaye 2.04 and Roudsar 5.46 ha.کلمات کلیدی:
https://civilica.com/doc/480163/certificate/print/
Reading art history today, one is inevitably faced with questions such as: How objective is art history? What alternative ways are there to consider art historical documents? And is there one universal story or can we accommodate multiple interpretations? During the course of 'October Contemporary 2008: Attr/Action', an annual month-long platform inaugurated in 2007 to promote contemporary visual art and artists in Hong Kong, AAA set up a space to consider these questions and invited individuals to take action by interpreting materials on art history using a selection of titles from AAA's collection. Art historian, Pamela Kember, and artist, Michael Lee Hong Hwee, were invited to work within this space and present a project in an attempt to offer alternative perspectives and possibilities in rethinking documents of recent art history. Pamela Kember studied the oscillating nature of histories and prose through her meditative installation, The Wall and the Books, while Michael Lee, in collaboration with Lee Chun Fung, explored instances when and where books are free from function with their idea of an ‘un-bookshop’. Their installation The Booked, the Unbooked and the Unbookable was composed of five sections: 'Bibliophiles-in-Residence', 'Restroom for the Deranged', 'The Garden of Paratextual Delights', 'Lost Libraries' and 'Twosomes'.
https://aaa.org.hk/en/programmes/programmes/a-z-26-locations-to-put-everything
Dr. Assoc. Prof. Ahmad Taher Azar :: Publications: |Title:|| | Lamamra K, Azar AT, Ben Salah C (2017) Chaotic system modelling using a neural network with optimized structure. Studies in Computational Intelligence, Vol. 688, pp 833-856, Springer-Verlag, Germany |Authors:||Not Available| |Year:||2017| |Keywords:||Not Available| |Journal:||Studies in Computational Intelligence| |Volume:||688| |Issue:||Not Available| |Pages:||833-856| |Publisher:||Springer| |Local/International:||International| |Paper Link:| |Full paper||Not Available| |Supplementary materials||Not Available| |Abstract:| | | In this work, the Artificial Neural Networks (ANN) are used to model a chaotic system. A method based on the Non-dominated Sorting Genetic Algorithm II (NSGA-II) is used to determine the best parameters of a Multilayer Perceptron (MLP) artificial neural network. Using NSGA-II, the optimal connection weights between the input layer and the hidden layer are obtained. Using NSGA-II, the connection weights between the hidden layer and the output layer are also obtained. This ensures the necessary learning to the neural network. The optimized functions by NSGA-II are the number of neurons in the hidden layer of MLP and the modelling error between the desired output and the output of the neural model. After the construction and training of the neural model, the selected model is used for the prediction of the chaotic system behaviour. This method is applied to model the chaotic system of Mackey-Glass time series prediction problem. Simulation results are presented to illustrate the proposed methodology.
https://bu.edu.eg/staff/ahmadazar14-publications/40238
Skip to content Unite Us is hiring a Network Director, Northeastern US with entrepreneurial ambition and a passion for improving healthcare. This role will be responsible for overseeing the strategy, planning, and implementation of Coordinated Networks across nine states in the Northeast. The Network Director will interface with senior leaders at healthcare systems, government agencies, and community-based organizations, and will lead the team to ensure successful onboarding of clinical and community organizations into the networks. We are looking for a committed leader and inspiring presenter with a knack for building trust and buy-in who has a wealth of knowledge and experience in the healthcare and/or social services space. What Youll Do: Unite Us Team Leadership & Project Management Lead and support existing Unite Us teams across NY, PA, CT, NH, MA, and RI and expand into new states in the Northeastern US as Unite Us networks growEnsure network onboarding milestones are achieved within forecasted time frames and within the scope of the project budgetCoordinate with team on contract deliverables and ensure feedback loop to affected partiesManage and participate in high-level presentation, conference, and public relations requests Client Management Build and maintain strong, long-lasting relationships with government entities, healthcare partners, nonprofits, and other partners as necessaryServe as liaison between Unite Us and major partners while assisting in the resolution of escalated client issuesMonitor the success of network implementations and ultimate client satisfaction Strategy and Oversight Create innovative strategies around addressing SDoH from a region-wide perspective Anticipate market trends regarding population and community health interventions to improve the health of all communities within your regionConduct high-level state and regional strategy discussions with key accounts (ie government, payers, large health systems, etc.)Ensure and manage the adoption and growth of enterprise licenses with health systems, health plans, and other stakeholders Whats Required:
https://www.jobserve.com/us/en/search-jobs-in-Philadelphia,-Pennsylvania,-USA/REGIONAL-NETWORK-DIRECTOR-NORTHEASTERN-US-D31184C9F472A9F710/?utm_source=50&utm_medium=job&utm_content=1&utm_campaign=JobSearchLanding
New book features W&M librarian William & Mary librarian Kathleen DeLaurenti has been featured in the book This is What a Librarian Looks Like by Kyle Cassidy, a celebratory tribute to the unsung community heroes. As a music and arts librarian at the W&M Music Library and Open Access Editor for the Music Library Association, DeLaurenti helps people access resources and make their work available to a broader audience. “Being a librarian means helping put people in touch with the tools and resources they need to explore their creativity and make new knowledge,” said DeLaurenti. “I love helping people think about what kind of impact they want their work to have and then helping them decide about how it will be sold or given away and under what conditions other people can share or reuse it.” DeLaurenti is just one of almost 220 librarians featured in Cassidy’s book. From brightly-dyed hair and tattoos to collared shirts and bow ties, this photographic montage of librarians from communities across the country gives a new perspective on who librarians are and what they look like – and it’s not the stern, humorless stereotype commonly portrayed in books and films. Librarians around the nation are fighting for patrons who need library resources to live in the modern age of technology. As a part of Cassidy’s project, DeLaurenti has called attention to the challenges music libraries face with collecting and preserving digital music. “One reason I wanted to participate in the project was to give a face to the issues confronting music libraries,” said DeLaurenti. “We have a separate association and aren’t always part of the conversation with our colleagues in public libraries and even other areas of academic libraries.” With the rise of digital music, it has become increasingly harder for music libraries to collect and share music, particularly music released through services like iTunes and Tidal, due to ownership rights. DeLaurenti explained that libraries aren’t able to purchase MP3s because they can’t be shared like a CD, which prevents libraries from preserving music for scholars and listeners of the future. “Many libraries are trying to solve this problem locally by working with artists who haven’t signed big record deals and who are much open to having their music preserved and accessible in their local communities, but we don’t have a solution for making sure that Frank Ocean’s Blonde is in library collections 50 or 100 years from now,” said DeLaurenti. In addition to highlighting the challenges faced by music libraries, DeLaurenti hopes that readers of Cassidy’s book learn about all of the different ways that librarians support, advocate and impact their communities every day.
https://www.wm.edu/sites/womensnetwork/news/new-book-features-wm-librarian.php
Score Release FAQs for First-time and Returning Candidates - NBPTS | Shaping the profession that shapes America's future. - NBPTS | Shaping the profession that shapes America's future. Q: When will I receive my score results? A: Score results for the 2017-18 assessment cycle will be released by December 31, 2018. Any change to this date will be communicated. When an exact date is identified, our website will be updated. Monitor our Score Release page for updates. Q: At what time, on the day that scores are released, will I be able to access my score report? A: We anticipate releasing scores by noon, CST on the date specified. We are unable to provide a more precise time. Q: How will I receive my score results? A: We will release your score results to you via your personal National Board account. IMPORTANT: On the day of, and approximately 2-3 days following score release, you will only have access to your score report. All other aspects of your account, including payments, registration, and component selection, will be unavailable. Q: What preparations should I make in advance of score release? Log in to your National Board account to ensure you recall your username and password. If necessary, reset your password or retrieve your username by clicking “Forgot Username” or “Forgot Password”. IMPORTANT: Failure to confirm your username and password prior to the date of score release could result in delayed access to your scores. Verify your preferred contact information (address, telephone number and email address), and school district information is accurate and up to date. Familiarize yourself with the scoring process by reviewing the Scoring Guide, your certificate-specific Sample Items and Rubrics for Component 1, and your certificate-specific Portfolio Instructions and Rubrics located in Candidate Resources. Q: How are the components scored and reported? A: Selected response items are machine-scored. One point is awarded for a correct answer and zero points for an incorrect answer. The number of scorable items answered correctly will be converted to and reported as a score between 0 and 4.25 with 2.75 representing the lower bound of accomplished teaching. Raw scores (number correct) are not reported. Highly trained assessors, many of whom are National Board Certified Teachers themselves, have scored your responses on the Component 1 constructed response items and all portfolio components (Components 2, 3, and 4). The National Board uses a 12-point rubric score scale for all constructed response items and portfolio components. The rubric score scale is based on four primary levels of performance (Levels 4, 3, 2, and 1), with plus (+) and minus (-) variations at each level. See Scoring Guide for detail. Q: What is an unweighted score? A: Your unweighted score is the rubric score that reflects your level of performance on the component. An unweighted score has not been multiplied by a scaling weight. All unweighted scores are rounded to three decimal places. Q: What is a weighted scaled score? A: A weighted scaled score for a component is calculated by multiplying the highest unweighted score by the component’s scaling weight. A scaling weight is a number that reflects the component’s importance, or weight, within the total assessment. All weighted scaled scores are rounded to three decimal places. More information on weighting and scaling is described in the Scoring Guide. Q: How is my total weighted scaled score calculated? A: Your total weighted scaled score is calculated by adding together all seven weighted scaled scores (four scores from the assessment center section and three scores from the portfolio section) and rounding to the nearest integer. The total weighted scaled score has valid scores ranging from 30 to a maximum of 178. If you have not attempted one or more of the components or if you have received an NS (Not Scorable) for any component, your total weighted scaled score will display N/A. Q: How are the assessment center and portfolio sections’ unweighted average scores calculated? (2.750 + 2.500 + 2.750 + 2.863) / 4 = 2.716. *The following images are samples and for illustration purposes only. (3.125 + 2.750 + 2.250) / 3 = 2.708. Q: What are the score requirements for achieving National Board Certification? Earning a total weighted scaled score at or above 110. Earning an unweighted average score at or above 1.75 on Component 1: Content Knowledge (i.e., the assessment center section). Earning an unweighted average score at or above of 1.75 across Component 2: Differentiation in Instruction, Component 3: Teaching Practice and Learning Environment, and Component 4: Effective and Reflective Practitioner (i.e., the portfolio section). World Languages only: In addition to the requirements described above, World Languages candidates must also meet the National Board World Languages Standards for language proficiency by providing official American Council on the Teaching of Foreign Languages (ACTFL) Speaking and Writing Proficiency Certificates. For information about the ACTFL requirement, please consult the Guide to National Board Certification or this FAQ document. Q: What is the performance standard, or total weighted score requirement, for certification? A: The total weighted scaled score of at least 110 is the performance standard for certification. The intention of the assessment redesign was not to raise or lower the previously established performance standard on the assessment as a whole for teachers to achieve certification. Candidates need to demonstrate the same overall level of accomplished teaching practice to achieve certification that was required to achieve certification on the previous assessment. However, the score scale changed. On the current assessment, the total weighted scaled score to achieve is 110. It is important to remember that earning a total weighted scaled score of 110 or higher is just one of the score requirements for achieving certification. There are three score requirements and you must meet each one to achieve certification. The minimum score requirement for the assessment center and portfolio sections is 1.75 and has been published and operational since the 2014-15 candidate cycle. Q: What will my score report look like? A: Your official National Board score report will include your status, whether or not you met the three score requirements and your scores. We encourage you to review the sample score report in the Scoring Guide. You can also view Interpreting Your National Board Score Report that will help answer questions you may have. Q: Where on my score report can I see if I achieved certification? A: At the top center of your score report, the “Your Status” section displays whether or not you achieved National Board Certification, or whether your certification is still in progress. In the Scoring Guide, you will find a table with the four possible statuses, what your status means, and what your next steps are. Q: How do I know if I met each of the three score requirements? A: The “Score Requirements” section of your score report will display whether or not you met all three score requirements. If there is a “Yes” displayed for all three score requirements, you achieved National Board Certification! If you have not attempted or did not earn a valid score on one or more components, N/A will be displayed. Q: What scores are on my score report? A: Your official National Board Score Report will display your highest scores (if you are a retake candidate) on each component you have completed along with any associated feedback statements for portfolio components. Your score report will include your unweighted scores, your weighted scaled scores, your assessment center and portfolio section averages, and your total weighted scaled score based on the highest scores you earned (for retake candidates). Your Score Transcript, which can be accessed from the Scores page of your National Board account, displays all of your component scores by assessment cycle (year). Q: Why is the total weighted scaled score on my score report blank? A: Your total weighted score and/or weighted section scores will not be computed until you have attempted/submitted all four components. If you have not attempted one or more of the Components or if you have received an NS for any component, your Total Weighted Scaled Score will display N/A. Q: What is the purpose of the feedback statements on my score report? A: Feedback statements provide insight about the quality of your portfolio components. Assessors assign feedback statements to guide you in the general areas in which you might want to reevaluate your performance and enable you to target areas for improvement. Feedback statements appear on your score report if your score is less than 3.75 on a portfolio component. To learn more about feedback statements, review the Scoring Guide located on our Candidate Resources page. Q: Why do I have a score of “0” on my score report? For a constructed response item, your submitted response did not meet the requirements to receive the minimum score of 0.75. you did not submit a major piece of evidence such as the written commentaries, the student work samples, or the video recordings, or other critical materials. your video recording(s) were not viewable. your submission contained student work and/or video-recorded footage that was in a language other than English (and/or the target language for World Languages) and did not include an explanation or a translation. your videos included edits beyond those allowed as specified in the video editing rules (see your certificate-specific Portfolio Instructions and Scoring Rubric and General Portfolio Instructions for the rules). Q: Why do I have a score of “NS” on my score report? you did not schedule or attend your assessment center testing appointment. you did not open the selected response part of the exam and did not attempt any of the items. you did not open a constructed response item and did not view any prompts in the item. you were suspected of plagiarism or cheating. you did not submit a portfolio component. you registered your portfolio component in the online system, but did not submit any artifacts to be scored. your portfolio component submission revealed that the age range requirement was not met; i.e., the class or groups featured did not include at least 51% of students within the defined age parameters of your selected certificate area. your portfolio component submission featured content that did not fall within the scope of your selected certificate. your portfolio component submission featured classes and/or students and evidence that did not fall within the allowable timeframe specified in the Portfolio Instructions and Scoring Rubric and General Portfolio Instructions. Q: What happens to my scores? You must attempt each of the four components within the first three years of your candidacy. Every candidate has a five year window to achieve certification. If a candidate does not achieve certification within the five year window, the candidate may start the entire certification process again as a first-time candidate. There is no minimum or maximum score requirement to retake a component. You have up to two retake attempts for each component, and you can retake at any time during the five-year window; retake years do not have to be consecutive. You can have a year when you take or retake no components; however, it does not extend your three-year window to initially attempt each of the four components or the five-year window within which certification can be achieved. Candidates have up to two retakes for each part of Component 1 at any time during the five-year window. The highest numeric score – whether it is the initial attempt or a retake score other than Not Scorable (NS) due to disqualification case – will be used to compute your total weighted score. Q: How do I evaluate my performance? A: We encourage you to visit the Scoring Guide’s Evaluating Your Performance section to fully understand how to use the rubric to evaluate your performance and to understand how to potentially strengthen your retake portfolio component or response to a constructed response item. This section includes guiding questions to follow when evaluating your performance, information to help you understand the strengths and weaknesses of your performance, and how to use your feedback statements. Q: How do I know if/what I should retake? If you have not met the assessment center section unweighted average score requirement of at least 1.75, you will need to retake one or more parts of Component 1 in an attempt to earn a 1.75 or higher. If you have not met the portfolio section unweighted average score requirement of at least 1.75, you will need to retake one or more of the portfolio components. You will not know if you met the portfolio section requirement until you’ve attempted Components 2, 3, and 4. Meeting the section requirements of 1.75 is necessary but does not ensure you will have the scores required to meet the total weighted scaled score requirement of 110. You will not know whether you met the total weighted scaled score of 110 until you have attempted and received numeric scores for all four components. Consider how to maximize your retake opportunities for meeting or surpassing section average requirements and the performance standard of 110. Even if you have met the section average score requirements, if you do not meet the total weighted scaled score requirement of at least 110, you will need to retake one or more parts of Component 1 and/or one of the portfolio components. In rare cases, it is possible to earn a total weighted scaled score of at least 110 and not meet one of the section average score requirements. We encourage you to use the National Board’s online score calculator to measure the impact of possible new scores and to help you develop your strategy for retaking components. An online version of the score calculator is located here. For additional information about how to know if/what you need to retake, refer to the Scoring Guide located online on our Candidate Resources page. Q: How do I select my retake components? A: The Scoring Guide has a section to guide you as you evaluate your score report and choose which portfolio components and/or parts of Component 1 to retake. Consider how likely it is that your score on a given component/part will improve and use the online score calculator located with your score report to calculate how much any individual improved score(s) will affect your total weighted scaled score. You will want to consider a range of factors such as how many points you need to meet score requirements, your strengths, and personal factors. We encourage you to review sample retake scenarios located in the Scoring Guide. Q: What is the maximum number of allowed retake attempts? A: You have up to two retake attempts for each component, and you can retake at any time during the five-year window; retake years do not have to be consecutive. You can have a year when you take or retake no components; however, it does not extend your three-year window to initially attempt each of the four components or the five-year window within which certification can be achieved. Candidates have up to two retakes for each part of Component 1 at any time during the five-year window. A score of NS (Not Scorable) counts as an attempt. If you have not met a score requirement and have attempted two retakes related to that score requirement, you will not be allowed to continue the certification process. For example, consider a candidate who has retaken all parts of Component 1 twice in the first three years of his/her candidacy, and on none of the three attempts (including the initial) has he/she met the average section score of at least 1.75. There is no possibility of achieving certification and the candidate should not continue but can start the entire certification process again as a first-time candidate. Q: How do I register to retake? Log in to your National Board account and pay the $75 nonrefundable and nontransferable registration fee. (The registration fee must be paid before you can select a component). Click “Purchase Component” to select the component(s) you would like to complete. Submit payment. Payment can be made at any time prior to the payment deadline. Prior to registering, we encourage you to review the important dates, deadlines, and policy information contained in the Guide to National Board Certification, located on our Candidate Resources page. When will I receive my score results? At what time, on the day that scores are released, will I be able to access my score report? How will I receive my score results? What preparations should I make in advance of score release? How are the components scored and reported? What is an unweighted score? What is a weighted scaled score? How is my total weighted scaled score calculated? How are the assessment center and portfolio sections’ unweighted average scores calculated? What are the score requirements for achieving National Board Certification? What is the performance standard, or total weighted score requirement, for certification? What will my score report look like? Where on my score report can I see if I achieved certification? How do I know if I met each of the three score requirement? What scores are on my score report? Why is the total weighted scaled score on my score report blank? What is the purpose of the feedback statements on my score report? Why do I have a score of “0” on my score report? Why do I have a score of “NS” on my score report? What happens to my scores? How do I evaluate my performance? How do I know if/what I should retake? How do I select my retake components? What is the maximum number of allowed retake attempts? How do I register to retake?
https://www.nbpts.org/national-board-certification/candidate-center/score-release/score-release-faqs-for-first-time-and-returning-candidates
Nick Glimsdahl of EasyIT outlines when it's right to hire or outsource IT specialists. By Nick Glimsdahl Today, many business leaders are asking, "Should we hire someone or should we outsource?" IT outsourcing is a viable option for companies of all sizes; however, outsourcing a significant portion or all IT needs is most popular for small to medium size businesses. This article seeks to answer the questions, "When should you consider outsourcing?" and "When should you considering hiring?" To begin, you need to understand and ask questions about the following: Your needs – What does your company strategically need? What is your budget? Your ultimate goal – Is your goal to have part-time support, full-time support, or 24x7 support?The outcome of your options – What do you want the result to be? When should you consider outsourcing? Why is outsourcing a significant portion or all IT needs most popular for small to medium size businesses. Let's take a closer look-it may help you with your consideration. Many small IT departments focus on reactive, rather than proactive, support because of time constraints and competing priorities. Many small to medium size businesses cannot afford to provide their IT professionals with continuing education due to budget and resource constraints. Retention of IT talent can be a struggle, possibly losing talent to competitors and larger companies that have better benefits to offer. Often, when compared to a new hire, outsourcing provides a viable, less expensive option for 24/7/365 proactive and reactive IT support. Many small business leaders do not have the technical expertise to understand the inner-workings of an IT department, to staff it, to review and truly assess the work done and to plan for the company's technical future. Do you consider yourself a Chief Technology Officer along with your current day job? Could you draft the IT Department 2016 Strategy and the tactics to implement that strategy? Do you know the risk and compliance issues that face your company? In the absence of a Chief Information Officer, levels of IT leadership and several teams of IT architects and technicians, it can be difficult to challenge the status quo, find gaps, and identify needs. This gap is where a different perspective can shine light. When should you consider hiring someone? Hiring internally can generate positive results, and it can be the most appropriate option in some situations. A few of these are: You need an individual to be physically on-site when you have an industry specific software, so that professionals can best leverage that software for the business. Your IT shop is self-sustaining and can afford to lose a team member. You have the resources and capacity to hire, train and retain your IT employees. Whatever route you go: Whether you outsource IT or hire internally, you still need to have your IT managed. This management process requires trust, and either option can either be rewarding or very frustrating.That is where relationships come in. In either situation, you want to feel confident that you will receive great value, clear and effective communication and ethical behavior. This decision is a business decision, not an IT decision. Take the time to think through your business needs and determine the correct strategy to meet your short-term and long-term goals. Nick Glimsdahl is a business solutions specialist at Dublin-based EasyIT, which specializes in IT outsourcing, co-sourcing, help desk and assessment and audit services.
https://www.columbusceo.com/article/20151202/BLOGS/312029483
EFT for IBS The symptoms worsen at times of stress. Many IBS sufferers feel ashamed of their condition, especially so if they experience extreme incontinence, or extreme constipation, or both. This may lead them to feel that this problem has to be kept secret, even sometimes from their own doctors. Not being able to talk openly about an ailment can be an isolating and lonely experience for anyone. Professor Spiegel said that studies showed hypnosis was a distinct psychological state, and it was not simply that the person under hypnosis was adopting a role suggested to them. He added:. - Custom Hand Woven Basket Business. - Find Your Cure!! - 01229 208023 or 07531159976. - Tapping Locations and Technique; They don't just tell you that's what it is - it actually looks that way to them. He is still looking for a "brain signature" which will show what happens in the brain when people are hypnotised. Mr Mason, 54, instead chose to play the role of guinea pig to a Hertfordshire dentist's unorthodox form of treatment, using hypnosis as the only painkiller. The father-of-seven said: "It was incredible. I felt no pain at all. 5 Secrets to Curing IBS (Irritable Bowel Syndrome) With the offer of free treatment he agreed to the procedure performed at the Smile and Wellbeing dental practice in Bishop's Stortford. Mind over matter Mr Ridlington, 59, from Dunmow in Essex, said: "We all have the ability to control pain with our brains. Hypnosis taps into the subconscious mind. It's all about mind over matter. Whilst wielding an imaginary medieval sword, Mr Mason visualised a dial numbered one to 10 - one for no pain and 10 for excruciating pain. As soon as he felt a twinge he mentally turned the dial back to one. EFT-Tapping/Matrix Reimprinting The dentist had to dig away at the rotten roots that were right up into my jaw. There isn't anything I wouldn't have done under hypnosis now. It's incredible. Ordinarily this would involve surgery and such cases are usually referred to hospital. We're now exploring the possibility of offering tooth transplants under hypnosis. But unlike most patients, she was not given any anaesthetic - instead, the year-old claimed she used self-hypnosis to control the pain. Visualising your digestive system as a river may not seem the most obvious way of treating an illness. The condition can leave people in constant discomfort and can cause severe pain. And it can prevent them from working or socialising normally. Dr Peter Whorwell, the gastroenterologist who founded the centre, devised the "river" concept. Notify me of follow-up comments. Forgot your password? Forgot your username? After that session, there was no recurrence of the problem. Consider medication Case 2 The other client had different emotions that triggered her 6-month period of IBS. Needless to say, to have no control over her bowels was absolutely humiliating. We tapped on not needing to feel so irritated and to be more relaxed. We are dedicated to the EFT community and strive to maintain a respectful, engaging and informative conversation about EFT. Towards that end, we have general guidelines for commenting, thus all comments are moderated before going live. Moderation can take up to 48 hours. Finding the Right Tapping Points If your comments consistently or intentionally make this site a less civil and enjoyable place to be, your comments will be excluded. We have a strong word-blocking program to prevent spam posts, so if your comment ends up with [censored] blocks, it's because you have used a blocked word or a word spammers use to spam comment sections of websites. User Name. Remember Me. Log in.
https://ivicinifafym.cf/comedy/eft-for-ibs.php
establishes a unique integral type, enum days, a variable anyday of this type, and a set of enumerators (sun, mon,...) with constant integer values. The -b compiler switch controls the "Treat Enums As Ints" option. When this switch is used, the compiler allocates a whole word (a four-byte int) for enumeration types (variables of type enum). The default is ON (meaning enums are always ints) if the range of values permits, but the value is always promoted to an int when used in expressions. The identifiers used in an enumerator list are implicitly of type signed char, unsigned char, or int, depending on the values of the enumerators. If all values can be represented in a signed or unsigned char, then that is the type of each enumerator. In C++, you can omit the enum keyword if days is not the name of anything else in the same scope. The enumerators listed inside the braces are also known as enumeration constants. Each is assigned a fixed integral value. In the absence of explicit initializers, the first enumerator sun is set to zero, and each succeeding enumerator is set to one more than its predecessor (mon = 1, tues = 2, and so on). See Enumeration constants for more on enumeration constants. tuppence would acquire the value 2, nickel the value 5, and quarter the value 25. The initializer can be any expression yielding a positive or negative integer value (after possible integer promotions). These values are usually unique, but duplicates are legal. enum types can appear wherever int types are permitted. In C++, enumerators declared within a class are in the scope of that class. In C++ it is possible to overload most operators for an enumeration. However, because the =, [ ], ( ), and -> operators must be overloaded as member functions, it is not possible to overload them for an enum. See the example on how to overload the postfix and prefix increment operators.
http://docwiki.appmethod.com/appmethod/1.15/topics/en/Enumerations
Temple St. Clair found her passion for creative expression in gold and precious gemstones over thirty years ago and founded her company in Florence, Italy, beginning her partnership with the world’s finest goldsmiths—the centuries-old Florentine jewelers’ guild. Barneys New York inaugurated their fine jewelry department with St. Clair’s first collection in 1986, and in 2016 she was awarded the GEM Award for Jewelry Design, the jewelry industry’s most prestigious honor. Mythical Creatures from the Golden Menagerie and Wings of Desire, made their debuts at the Louvre Museum in Paris in January 2015 and July 2016.
https://www.clic.com/fashionbooks/the-golden-menagerie-temple-st-clair
ABSTRACT: Motivation: The importance of chemical compounds has been emphasized more in molecular biology, and "chemical genomics" has attracted a great deal of attention in recent years. Thus an important issue in current molecular biology is to identify biological related chemical compounds (more specifically, drugs) and genes. Co-occurrence of biological entities in the literature is a simple, comprehensive and popular technique to find the association of these entities. Our focus is to mine implicit "chemical compound and gene" relations from the cooccurrence in the literature. Results: We propose a probabilistic model, called the mixture aspect model (MAM), and an algorithm for estimating its parameters to efficiently handle different types of co-occurrence datasets at once. We examined the performance of our approach not only by a crossvalidation using the data generated from the MEDLINE records but also by a test using an independent human-curated dataset of the relationships between chemical compounds and genes in the ChEBI database. We performed experimentation on three different types of co-occurrence datasets (i.e. compound-gene, gene-gene and compound-compound co-occurrences) in both cases. Experimental results have shown that MAM trained by all datasets outperformed any simple models trained by other combinations of datasets with the difference being statistically significant in all cases. In particular, we found that incorporating compound-compound cooccurrences is the most effective in improving the predictive performance. We finally computed the likelihoods of all unknown compound-gene (more specifically, drug-gene) pairs using our approach and selected the top 20 pairs according to the likelihoods. We validated them from biological, medical and pharmaceutical viewpoints. CONTACT: [email protected] OP-44 Implementing the iHOP Concept for Navigation of Biomedical Literature Robert Hoffmann (1), Alfonso Valencia (1) 1) National Center of Biotechnology ABSTRACT: Motivation: The World Wide Web has profoundly changed the way in which we access information. Searching the internet is easy and fast, but more importantly, the interconnection of related content makes it intuitive and closer to the associative organisation of human memory. However, the information retrieval tools currently available to researchers in biology and medicine lag far behind the possibilities that the layman has come to expect from the internet. Results: By using genes and proteins as hyperlinks between sentences and abstracts, the information in PubMed can be converted into one navigable resource. iHOP (Information Hyperlinked over Proteins) is an online service that provides this gene-guided network as a natural way of accessing millions of PubMed abstracts and brings all the advantages of the internet to scientific literature research. Navigating across interrelated sentences within this network is closer to human intuition than the use of conventional keyword searches, and allows for stepwise and controlled acquisition of information. Moreover, this literature network can be superimposed upon experimental interaction data to facilitate the simultaneous analysis of novel and existing knowledge. The network presented in iHOP currently contains 5million sentences and 40000 genes from Homo sapiens, Mus musculus, Drosophila melanogaster, Caenorhabditis elegans, Danio rerio, Arabidopsis thaliana, Saccharomyces cerevisiae, and Escherichia coli. Availability: iHOP is publicly accessible at http://www.pdg.cnb.uam.es/UniPub/iHOP/ CONTACT: [email protected] OP-45 Expert knowledge without the expert: Integrated analysis of gene expression and the literature to derive active functional contexts Robert Küffner (1), Ralf Zimmer (1) 1) LMU Munich ABSTRACT: The interpretation of expression data without appropriate expert knowledge is difficult and usually limited to exploratory data analysis such as clustering and detecting differentially regulated gene sets. On the other hand, comparing experimental results against manually compiled knowledge resources might limit or bias the perspective on the data. Thus, manual analysis by experts is required to obtain confident predictions about the involved biological processes. We present an algorithm to simultaneously derive interpretations of expression measurements together with biological hypotheses from bio-medical publications. Gene clusters are selected to exhibit both a coherent gene expression pattern as well as a coherent literature profile. Manual intervention by an expert in specifying prior knowledge or during the analysis procedure is not required. The approach scales to realistic applications and does not rely on controlled vocabularies or pathway resources. We validated our algorithm by analyzing a current juvenile arthritis dataset. A number of gene clusters and accompanying concepts are identified as an interpretation of the data that coincide well with the phenotype and biological processes known to be involved in the disease. We demonstrate that generated clusters are both more sensitive and more specific than GeneOntology categories detected on the same data. The method allows for in-depth investigation of both subsets of genes, the associated concepts and publications.
http://eccb.iscb.org/2005/session10.htm
Overview These pantry sets by Rev-a-Shelf include five polymer full circle shelves with an independent rotating system. The full circle shelves are available in 16" and 18" diameters. Shelves are available in white or almond color. Product Warnings WARNING This product can expose you to chemicals which are known to the State of California to cause cancer and birth defects or other reproductive harm. For more information go to www.P65Warnings.ca.gov/product
AN EVALUATION OF THE ACCURACY OF A RADIO-TRILATERATION AUTOMATIC VEHICLE LOCATION SYSTEM Automatic Vehicle Location (AVL) systems is a technology which is of special significance to public transit agencies in their quest to improve services; it allows the monitoring of the location and status of transit vehicles. In order to select a suitable AVL system, there exists a need to evaluate the available AVL systems. This paper addresses the issue of evaluation of the accuracy of a radio-trilateration based AVL system. AirTouch Teletrac, a system utilizing radio-trilateration, which has been in use at Houston METRO for their paratransit services, has been evaluated in respect of its locational accuracy. A general method used for evaluation of accuracy is described which is applicable not only to radio-trilateration, but also to most other AVL technologies. Thereafter, each of four different evaluations for AirTouch accuracy is described. The descriptions include additional test procedures as well as analysis of the data collected. Accuracy has been evaluated in terms of (a) locating a stationary vehicle, (b) locating a stationary vehicle in central business district populated with a high density of high rise buildings, (c) locating a stationary vehicle underground or in covered parking areas, (d) locating a stationary vehicle along the periphery of service area, and (e) locating a moving vehicle. While the accuracy of AirTouch Teletrac is generally sufficient for a large number of vehicle location needs, the system is inconsistent. - Corporate Authors: Washington, DC United States 20036 - Authors: - Vaidya, N - Higgins, L L - Turnbull, K F - Conference:
https://trid.trb.org/view/463609
There is an increasing demand for internet services by mobile subscribers over the wireless access networks, with limited radio resources and capacity constraints. A viable solution to this capacity crunch is the deployment of heterogeneous networks. However, in this wireless environment, the choice of the most appropriate Radio Access Technology (RAT) that can Tsustain or meet the quality of service (QoS) requirements of users' applications require careful planning and cost efficient radio resource management methods. Previous research works on access network selection have focused on selecting a suitable RAT for a user's single call request. With the present request for multiple calls over wireless access networks, where each call has different QoS requirements and the available networks exhibit dynamic channel conditions, the choice of a suitable RAT capable of providing the "Always Best Connected" (ABC) experience for the user becomes a challenge. In this thesis, the problem of selecting the suitable RAT that is capable of meeting the QoS requirements for multiple call requests by mobile users in access networks is investigated. In addressing this problem, we proposed the use of Complex PRoprtional ASsesment (COPRAS) and Consensus-based Multi-Attribute Group Decision Making (MAGDM) techniques as novel and viable RAT selection methods for a grouped-multiple call. The performance of the proposed COPRAS multi-attribute decision making approach to RAT selection for a grouped-call has been evaluated through simulations in different network scenarios. The results show that the COPRAS method, which is simple and flexible, is more efficient in the selection of appropriate RAT for group multiple calls. The COPRAS method reduces handoff frequency and is computationally inexpensive when compared with other methods such as the Technique for Order Preference by Similarity to Ideal Solution (TOPSIS), Simple Additive Weighting (SAW) and Multiplicative Exponent Weighting (MEW). The application of the proposed consensus-based algorithm in the selection of a suitable RAT for group-multiple calls, comprising of voice, video-streaming, and file-downloading has been intensively investigated. This algorithm aggregates the QoS requirement of the individual application into a collective QoS for the group calls. This new and novel approach to RAT selection for a grouped-call measures and compares the consensus degree of the collective solution and individual solution against a predefined threshold value. Using the methods of coincidence among preferences and coincidence among solutions with a predefined consensus threshold of 0.9, we evaluated the performance of the consensus-based RAT selection scheme through simulations under different network scenarios. The obtained results show that both methods of coincidences have the capability to select the most suitable RAT for a group of multiple calls. However, the method of coincidence among solutions achieves better results in terms of accuracy, it is less complex and the number of iteration before achieving the predefined consensus threshold is reduced. A utility-based RAT selection method for parallel traffic-streaming in an overlapped heterogeneous wireless network has also been developed. The RAT selection method was modeled with constraints on terminal battery power, service cost and network congestion to select a specified number of RATs that optimizes the terminal interface utility. The results obtained show an optimum RAT selection strategy that maximizes the terminal utility and selects the best RAT combinations for user's parallel-streaming for voice, video and file-download. Orimolade, J. 2017. Access network selection schemes for multiple calls in next generation wireless networks. University of Cape Town.
https://open.uct.ac.za/handle/11427/25380
Down syndrome (DS), occurs due to constitutional trisomy 21 and is associated with mental retardation, congenital structural defects as well as predisposition to leukemias. Children with DS are at a substantial risk of developing AML with a nearly 500 fold higher risk of AML than non-DS children. Further, transient myeloproliferative disorder (TMD) which is morphologically indistinguishable from AML is diagnosed in DS infants <3 months of age, with nearly 70% of cases with spontaneous resolution. AML diagnosed in DS is quite distinct from those in non DS patients with blasts showing megakaryocytic features (acute megakaryocytic leukemia; AMKL). Children with DS AML show exquisite sensitivity to cytotoxic therapies, with higher rates of toxicities and treatment related mortality (TRM) with conventional therapies, leading to suboptimal outcomes due to excess TRM. However, with more measured therapies, such sensitivities have led to improved outcome compared to their non-DS AML. Mutations in GATA1 gene and a few other candidate genes have been implicated in the pathogenesis of DS AML, but broader genomic studies in DS AML have lagged behind more prevalent types of leukemias with recent studies in childhood AML completing large cohort studies of de novo AML with very limited data in DS AML. Although outcomes in DS AML have improved in the last two decades, cytotoxic therapies continue to cause substantial short and long term toxicities in this very susceptible population. Comprehensive studies including whole genome (WGS) and transcriptome sequencing (RNA seq) can inform the underlying mechanism for malignant transformation and identify potential therapeutic targets for more precise therapeutic development. We propose to discover genomic and transcript variants that are uniquely associated with DSAML by conducting WGS and RNA seq in diagnostic and remission (germline) specimens from patients enrolled in the most recent COG DS-AML and DS-TMD studies. Of particular interest is the differences between TMD and AML to define the underlying genomic and functional/biologic variations that leads to spontaneous resolution in TMD. This exact patient cohort was originally included in our X01 application (Germline and Somatic Variants in Myeloid Malignancies in Children). Newly released INCLUDE Project (INvestigation of Co-occurring conditions across the Lifespan to Understand Down syndrome) aims to specifically study the co-occuring conditions in children with DS. As this patient population is within the scope of both X01 and INCLUDE projects, it provides a unique opportunity for the two projects to work together and synergize towards defining the underlying mechanism of myeloid pathogenesis in this unique cohort of vulnerable patients who can most benefit from less toxic therapies.
Line graph should not be confused with path graph. In the mathematical discipline of graph theory, the line graph of an undirected graph is another graph that represents the adjacencies between edges of . is constructed in the following way: for each edge in, make a vertex in ; for every two edges in that have a vertex in common, make an edge between their corresponding vertices in . The name line graph comes from a paper by although both and used the construction before this. Other terms used for the line graph include the covering graph, the derivative, the edge-to-vertex dual, the conjugate, the representative graph, and the θ-obrazom, as well as the edge graph, the interchange graph, the adjoint graph, and the derived graph. proved that with one exceptional case the structure of a connected graph can be recovered completely from its line graph. Many other properties of line graphs follow by translating the properties of the underlying graph from vertices into edges, and by Whitney's theorem the same translation can also be done in the other direction. Line graphs are claw-free, and the line graphs of bipartite graphs are perfect. Line graphs are characterized by nine forbidden subgraphs and can be recognized in linear time. Various extensions of the concept of a line graph have been studied, including line graphs of line graphs, line graphs of multigraphs, line graphs of hypergraphs, and line graphs of weighted graphs. Given a graph, its line graph is a graph such that That is, it is the intersection graph of the edges of, representing each edge by the set of its two endpoints. The following figures show a graph (left, with blue vertices) and its line graph (right, with green vertices). Each vertex of the line graph is shown labeled with the pair of endpoints of the corresponding edge in the original graph. For instance, the green vertex on the right labeled 1,3 corresponds to the edge on the left between the blue vertices 1 and 3. Green vertex 1,3 is adjacent to three other green vertices: 1,4 and 1,2 (corresponding to edges sharing the endpoint 1 in the blue graph) and 4,3 (corresponding to an edge sharing the endpoint 3 in the blue graph). Properties of a graph that depend only on adjacency between edges may be translated into equivalent properties in that depend on adjacency between vertices. For instance, a matching in is a set of edges no two of which are adjacent, and corresponds to a set of vertices in no two of which are adjacent, that is, an independent set. Thus, If the line graphs of two connected graphs are isomorphic, then the underlying graphs are isomorphic, except in the case of the triangle graph and the claw, which have isomorphic line graphs but are not themselves isomorphic. As well as and, there are some other exceptional small graphs with the property that their line graph has a higher degree of symmetry than the graph itself. For instance, the diamond graph (two triangles sharing an edge) has four graph automorphisms but its line graph has eight. In the illustration of the diamond graph shown, rotating the graph by 90 degrees is not a symmetry of the graph, but is a symmetry of its line graph. However, all such exceptional cases have at most four vertices. A strengthened version of the Whitney isomorphism theorem states that, for connected graphs with more than four vertices, there is a one-to-one correspondence between isomorphisms of the graphs and isomorphisms of their line graphs. Analogues of the Whitney isomorphism theorem have been proven for the line graphs of multigraphs, but are more complicated in this case. The line graph of the complete graph is also known as the triangular graph, the Johnson graph, or the complement of the Kneser graph . Triangular graphs are characterized by their spectra, except for . They may also be characterized (again with the exception of) as the strongly regular graphs with parameters . The three strongly regular graphs with the same parameters and spectrum as are the Chang graphs, which may be obtained by graph switching from . The line graph of a bipartite graph is perfect (see Kőnig's theorem), but need not be bipartite as the example of the claw graph shows. The line graphs of bipartite graphs form one of the key building blocks of perfect graphs, used in the proof of the strong perfect graph theorem. A special case of these graphs are the rook's graphs, line graphs of complete bipartite graphs. Like the line graphs of complete graphs, they can be characterized with one exception by their numbers of vertices, numbers of edges, and number of shared neighbors for adjacent and non-adjacent points. The one exceptional case is, which shares its parameters with the Shrikhande graph. When both sides of the bipartition have the same number of vertices, these graphs are again strongly regular. More generally, a graph is said to be a line perfect graph if is a perfect graph. The line perfect graphs are exactly the graphs that do not contain a simple cycle of odd length greater than three. Equivalently, a graph is line perfect if and only if each of its biconnected components is either bipartite or of the form (the tetrahedron) or (a book of one or more triangles all sharing a common edge). Every line perfect graph is itself perfect. All line graphs are claw-free graphs, graphs without an induced subgraph in the form of a three-leaf tree. As with claw-free graphs more generally, every connected line graph with an even number of edges has a perfect matching; equivalently, this means that if the underlying graph has an even number of edges, its edges can be partitioned into two-edge paths. The line graphs of trees are exactly the claw-free block graphs. These graphs have been used to solve a problem in extremal graph theory, of constructing a graph with a given number of edges and vertices whose largest tree induced as a subgraph is as small as possible. All eigenvalues of the adjacency matrix of a line graph are at least −2. The reason for this is that can be written as A=JTJ-2I For an arbitrary graph, and an arbitrary vertex in, the set of edges incident to corresponds to a clique in the line graph . The cliques formed in this way partition the edges of . Each vertex of belongs to exactly two of them (the two cliques corresponding to the two endpoints of the corresponding edge in). The existence of such a partition into cliques can be used to characterize the line graphs: A graph is the line graph of some other graph or multigraph if and only if it is possible to find a collection of cliques in (allowing some of the cliques to be single vertices) that partition the edges of, such that each vertex of belongs to exactly two of the cliques. It is the line graph of a graph (rather than a multigraph) if this set of cliques satisfies the additional condition that no two vertices of are both in the same two cliques. Given such a family of cliques, the underlying graph for which is the line graph can be recovered by making one vertex in for each clique, and an edge in for each vertex in with its endpoints being the two cliques containing the vertex in . By the strong version of Whitney's isomorphism theorem, if the underlying graph has more than four vertices, there can be only one partition of this type. For example, this characterization can be used to show that the following graph is not a line graph: In this example, the edges going upward, to the left, and to the right from the central degree-four vertex do not have any cliques in common. Therefore, any partition of the graph's edges into cliques would have to have at least one clique for each of these three edges, and these three cliques would all intersect in that central vertex, violating the requirement that each vertex appear in exactly two cliques. Thus, the graph shown is not a line graph. Another characterization of line graphs was proven in (and reported earlier without proof by). He showed that there are nine minimal graphs that are not line graphs, such that any graph that is not a line graph has one of these nine graphs as an induced subgraph. That is, a graph is a line graph if and only if no subset of its vertices induces one of these nine graphs. In the example above, the four topmost vertices induce a claw (that is, a complete bipartite graph), shown on the top left of the illustration of forbidden subgraphs. Therefore, by Beineke's characterization, this example cannot be a line graph. For graphs with minimum degree at least 5, only the six subgraphs in the left and right columns of the figure are needed in the characterization. and described linear time algorithms for recognizing line graphs and reconstructing their original graphs. generalized these methods to directed graphs. described an efficient data structure for maintaining a dynamic graph, subject to vertex insertions and deletions, and maintaining a representation of the input as a line graph (when it exists) in time proportional to the number of changed edges at each step. The algorithms of and are based on characterizations of line graphs involving odd triangles (triangles in the line graph with the property that there exists another vertex adjacent to an odd number of triangle vertices). However, the algorithm of uses only Whitney's isomorphism theorem. It is complicated by the need to recognize deletions that cause the remaining graph to become a line graph, but when specialized to the static recognition problem only insertions need to be performed, and the algorithm performs the following steps: Each step either takes constant time, or involves finding a vertex cover of constant size within a graph whose size is proportional to the number of neighbors of . Thus, the total time for the whole algorithm is proportional to the sum of the numbers of neighbors of all vertices, which (by the handshaking lemma) is proportional to the number of input edges. consider the sequence of graphs G,L(G),L(L(G)),L(L(L(G))),.... If is not connected, this classification applies separately to each component of . For connected graphs that are not paths, all sufficiently high numbers of iteration of the line graph operation produce graphs that are Hamiltonian. See main article: article and Medial graph. When a planar graph has maximum vertex degree three, its line graph is planar, and every planar embedding of can be extended to an embedding of . However, there exist planar graphs with higher degree whose line graphs are nonplanar. These include, for example, the 5-star, the gem graph formed by adding two non-crossing diagonals within a regular pentagon, and all convex polyhedra with a vertex of degree four or more. An alternative construction, the medial graph, coincides with the line graph for planar graphs with maximum degree three, but is always planar. It has the same vertices as the line graph, but potentially fewer edges: two vertices of the medial graph are adjacent if and only if the corresponding two edges are consecutive on some face of the planar embedding. The medial graph of the dual graph of a plane graph is the same as the medial graph of the original plane graph. For regular polyhedra or simple polyhedra, the medial graph operation can be represented geometrically by the operation of cutting off each vertex of the polyhedron by a plane through the midpoints of all its incident edges. This operation is known variously as the second truncation, degenerate truncation, or rectification. The total graph of a graph has as its vertices the elements (vertices or edges) of, and has an edge between two elements whenever they are either incident or adjacent. The total graph may also be obtained by subdividing each edge of and then taking the square of the subdivided graph. The concept of the line graph of may naturally be extended to the case where is a multigraph. In this case, the characterizations of these graphs can be simplified: the characterization in terms of clique partitions no longer needs to prevent two vertices from belonging to the same to cliques, and the characterization by forbidden graphs has seven forbidden graphs instead of nine. However, for multigraphs, there are larger numbers of pairs of non-isomorphic graphs that have the same line graphs. For instance a complete bipartite graph has the same line graph as the dipole graph and Shannon multigraph with the same number of edges. Nevertheless, analogues to Whitney's isomorphism theorem can still be derived in this case. It is also possible to generalize line graphs to directed graphs. If is a directed graph, its directed line graph or line digraph has one vertex for each edge of . Two vertices representing directed edges from to and from to in are connected by an edge from to in the line digraph when . That is, each edge in the line digraph of represents a length-two directed path in . The de Bruijn graphs may be formed by repeating this process of forming directed line graphs, starting from a complete directed graph. In a line graph, each vertex of degree in the original graph creates edges in the line graph. For many types of analysis this means high-degree nodes in are over-represented in the line graph . For instance, consider a random walk on the vertices of the original graph . This will pass along some edge with some frequency . On the other hand, this edge is mapped to a unique vertex, say, in the line graph . If we now perform the same type of random walk on the vertices of the line graph, the frequency with which is visited can be completely different from f. If our edge in was connected to nodes of degree, it will be traversed more frequently in the line graph . Put another way, the Whitney graph isomorphism theorem guarantees that the line graph almost always encodes the topology of the original graph faithfully but it does not guarantee that dynamics on these two graphs have a simple relationship. One solution is to construct a weighted line graph, that is, a line graph with weighted edges. There are several natural ways to do this. For instance if edges and in the graph are incident at a vertex with degree, then in the line graph the edge connecting the two vertices and can be given weight . In this way every edge in (provided neither end is connected to a vertex of degree 1) will have strength 2 in the line graph corresponding to the two ends that the edge has in . It is straightforward to extend this definition of a weighted line graph to cases where the original graph was directed or even weighted. The principle in all cases is to ensure the line graph reflects the dynamics as well as the topology of the original graph . See main article: article and Line graph of a hypergraph. The edges of a hypergraph may form an arbitrary family of sets, so the line graph of a hypergraph is the same as the intersection graph of the sets from the family. The disjointness graph of, denoted, is constructed in the following way: for each edge in, make a vertex in ; for every two edges in that do not have a vertex in common, make an edge between their corresponding vertices in . In other words, is the complement graph of . A clique in corresponds to an independent set in, and vice versa.
http://everything.explained.today/Line_graph/
BACKGROUND OF THE INVENTION BRIEF DESCRIPTION OF THE DRAWINGS DESCRIPTION OF THE PREFERRED EMBODIMENTS The present invention deals with an automatic transmission control system as shown in the closest prior art according to the US-A-5,047,940. This known system has a traction control system comprising a throttle valve whose degree of opening is set in response to the actuation of an accelerator pedal and which is adjusted in the closed state if the control system detects a slip at one of the wheels. Furthermore the known automatic transmission control systems offers the possibility of changing the shift point in case the traction control system is activated such that a shifting from a lower to a higher gear is already effected at a speed which is lower than that in the case of an inactive transmission control system. In column 2, lines 35 to 40 of the above-mentioned US-A-5047940 it is in this connection described that the known shift characteristic changing means effects the change of the shift point in such a manner that said first shift characteristic is used at the time of ordinary running when no slip control is carried out by said slip control means and that said second shift characteristic is used when slip control is carried out by said slip control means. That is to say that the normal shift point is automatically changed independent of the accelerator pedal position when the slip control means is operated. According to the US-A-5,047,940 the shift point is thus maintained at a lower speed during the whole time of operation of the slip control means so that in the case of these control conditions a maximum acceleration of the vehicle is no longer possible. In view of this state of the art it is the object of the present invention to provide an automatic transmission control system capable of suppressing wheel slippage that occurs when gear shifting is performed and which at the same time renders a maximum acceleration of the vehicle possible. According to the invention, this object is achieved by means of the features of claim 1. Accordingly, the invention has to be seen in that the shift point is changed as claimed in the enclosed claim 1 when the degree of operation of the accelerator pedal is equal to or greater than a predetermined value and when the traction control system is ON. According to this claim 1, the shift point is changed when the degree of operation- of the accelerator pedal is large (equal to or greater than the predetermined value). Hence, even during traction control operation, the shift point is not changed if the degree of operation of the accelerator pedal is small. Thus, according to the claimed invention it is even during traction control possible to maintain the acceleration response which can be obtained during the normal accelerator pedal operation and it is also possible to prevent the occurrence of slippage which may be caused when the accelerator pedal is operated greatly and the engine speed is increased. Fig. 1 is a block diagram illustrating an overview of the present invention; Fig. 2 is a diagram illustrating the entire structure of a vehicle to which an automatic transmission control system according to an embodiment of the present invention is applied; Figs. 3 and 4 are flowcharts of a basic control process of a traction control; Fig. 5 is a flowchart of a process for setting a main throttle valve opening ratio executed by an EFI unit of a control unit shown in Fig. 2; Fig. 6 is a block diagram of a process for setting the main throttle valve opening ratio; Fig. 7 is a graph showing how up-shifting is performed with respect to the throttle valve opening ratio and the vehicle speed; Fig. 8 is a flowchart of a gear shifting process executed by an ECT unit of the control unit shown in Fig. 2; and Fig. 9 is a flowchart of a variation of the process for setting the main throttle valve opening ratio executed by the EFI unit. Other objects, features and advantages of the present invention will become more apparent from the following detailed description when read in conjunction with the accompanying drawings, in which: Fig. 1 illustrates an overview of the present invention. An automatic transmission control system that controls an automatic transmission M5 includes an accelerator pedal M1, a throttle valve M2, a valve control unit M3, and a shift point change unit M6. M4 denotes an internal combustion engine. The shift point change unit M6 changes the shift point towards a low engine speed when the quantity of depression (degree of operation or setting) of the accelerator pedal M1 becomes equal to or greater than a threshold value. Hence, wheel slippage can be prevented when the accelerator pedal M1 is deeply depressed. The automatic transmission performs shift control on the basis of the opening ratio of the throttle valve M2 and the vehicle speed. It will now be assumed that the vehicle is traveling on a slippery road (low-µ road) like an iced road while the traction control (TRC) is ON and the throttle valve M2 is maintained in the closed state. When the driver depresses the accelerator pedal M1, the engine speed increases but the driving force is not transferred to the road because of wheel slippage. Hence, the vehicle speed does not increase. Since gear shifting is based on the opening ratio of the throttle valve and the vehicle speed, the engine speed increases to a high value until the vehicle speed reaches the shift point while the vehicle is traveling on the slippery (low-µ) road. When up-shifting occurs in the above state, the engine speed greatly decreases to the speed defined by a gear selected by the up-shifting. Hence, the driving wheels slip a great deal on the road and the behavior of the vehicle becomes extremely unstable. According to the present invention, the shift point change unit M6 changes the shift point towards a low engine speed when the amount of operation of the accelerator pedal M1 becomes equal to or greater than the threshold value. Hence, the gear shifting occurs before the engine speed reaches a value causing a large amount of wheel slippage. Hence, wheel slippage because of gear shifting, particularly when the vehicle is traveling on a slippery road, can be prevented, and stable driving can be obtained. A description will now be given of an embodiment of the present invention with reference to Fig. 2 which illustrates the entire structure of a vehicle equipped with a control system for an automatic transmission. An internal combustion engine 10 is mounted on a vehicle 1. Driving wheels 3a and 3b are driven by the engine 10 through an automatic transmission 5 and a drive shaft 26. The vehicle 1 also has idler wheels 4a and 4b. Wheel speed sensors 22a, 22b, 24a and 24b for respectively detecting wheel speeds of the driving wheels 3a and 3b and the idler wheels 4a and 4b are provided for these wheels. A main throttle valve 14 responding to a driver's operation of an accelerator pedal 12 is provided in an air intake passage of the internal combustion engine 10. A sub-throttle valve 16 is fastened to the intake air passage and located on the upstream side of the main throttle valve 14. The sub-throttle valve 16 is driven by a stepping motor 18. A control unit 30 includes two integrated digital computers. One of the two digital computers functions as an electronic fuel injection (EFI) unit, and the other digital computer functions as an automatic transmission control (ECT) unit. The EFI unit performs fuel injection control and ignition timing control. The ECT unit performs shifting control of the automatic transmission 5. MG The control unit 30 receives, as the EFI unit, a sensor output signal of an engine speed sensor 32, a sensor output signal of a main throttle valve opening ratio sensor 34, and a sensor output signal of a sub-throttle valve opening ratio sensor 36. Further, the control unit 30 receives desired sensor output signals of other sensors necessary for engine control as in the case of conventional engines. The control unit 30 is connected to a fuel injection valve 38 and an igniter 40. The control unit 30 controls the quantity of fuel injection and the ignition timing via the fuel injection valve 38 and the igniter 40. The control unit 30 controls, as the ECT unit, the shift point most suitable for the current driving conditions on the basis of a sensor output signal of a vehicle speed sensor 35 and data indicating a main throttle valve opening ratio θ from the EFI unit. The system shown in Fig. 2 includes an acceleration slip control unit (traction control unit: TRC unit) 50. The TRC unit 50 is formed with a digital computer, and is supplied with the sensor output signal of the engine speed sensor 32 and the sensor output signals of the main and sub-throttle valve opening ratio sensors 34 and 36 in order to perform the traction control. Further, the TRC unit 50 controls the opening ratio of the sub-throttle valve 16. Furthermore, the TRC unit 50 is connected to the control unit 30, and outputs a signal FS, a fuel cut signal and an ignition timing delay angle signal to the control unit 30. The FS signal indicates whether or not the TRC is being performed. s(n) s(n-1) 0 1 2 3 S B D S D R D R D θ s(n) = θ s(n-1) + (dθ s /dt) x T 0 (dθ s /dt) = K 1 x ΔV + K 2 x K 3 x ΔG The present embodiment carries out driving torque control by controlling the opening ratio of the sub-throttle valve 16 on the basis of slippage of the driving wheels 3a and 3b. The sub-throttle valve opening ratio θ is controlled based on a slip quantity ΔV of the driving wheels 3a and 3b, and is written as follows: where θ denotes the sub-throttle opening ratio used in the previous computation, and T denotes a computation executing period. Further, K, Kand K are respectively positive constants, and ΔV is the difference between a target driving wheel speed V obtained from a vehicle speed (idler wheel speed) V, and the actual driving wheel speed V. In the present embodiment, the slip quantity ΔV is defined as V - V. In equation (2), ΔG is the difference between the ratio of variation of the vehicle speed V and the rate of variation of the driving wheel speed V, that is, |(dV/dt) - (dV/dt)|. smax s A description will now be given, with reference to Figs. 3 and 4, of a basic operation of the traction control according to the embodiment of the present invention. Figs. 3 and 4 show a basic routine of the traction control performed by the TRC unit 50. The basic routine is repeatedly executed with a repetition period of, for example, 12msec. In step 100, the TRC unit 50 determines whether or not a TRC execution condition is satisfied. In the embodiment of the present invention, the main throttle valve is not completely closed and the sensors operate normally when the TRC execution condition is satisfied. When it is determined, in step 100, that the TRC execution condition is not satisfied, the TRC unit 50 executes step 154, in which step all flags are reset and θ(full throttle) is set as the sub-throttle valve opening ratio θ. Then, the TRC unit 50 ends execution of the routine. R FR FL V R = (1/2)(V FR + V FL ) When it is determined, in step 100, that the TRC execution condition is satisfied, the TRC unit 50 computes the vehicle speed V as follows: where V and V respectively denote the wheel speeds of the idler wheels 4a and 4b. S S R R [1] V = V + 2.4km/h when V ≤ 30km/h S R R [2] V = (V x 1.08)km/h when 30km/h < V ≤ 100km/h S R R R [3] V = MIN[(V x 1.08)km/h, (V + 10)km/h] when 100km/h < V In step 104, the TRC unit 50 calculates the target driving wheel speed V in the following manner: where MIN[x, y] is equal to x when x < y and is equal to y when y < x. S R S R R S R The target driving wheel speed V is selected so that it is always greater than the vehicle speed V and a predetermined slip occurs in the driving wheels. It can be seen from the above [1] - [3] that a target slip ratio (V - V)/V is set to a large value and the acceleration characteristic can be improved when the vehicle speed is low. When the vehicle speed is high, V = V + 10km/h and the slip ratio is set low, so that the straight line stability can be improved. TB TB S V TB = V S + β In step 106, the TRC unit 50 sets a control starting speed V of the traction control. The control starting speed V is calculated as follows: where β is a constant for making the control starting speed greater than the target driving wheel speed V by β in order to prevent frequent TRC control. More particularly, the constant β is set between 2.0km/h and 4km/h on the basis of the road surface condition. D DR DL V D = (1/2)(V DR + V DL ) In step 108, the TRC unit 50 calculates the driving wheel speed V by the following equation: where V and V respectively denote the wheel speeds of the driving wheels 3a and 3b. D TB TB D smax s After determining the speed parameters in steps 102 - 108, the TRC unit 50 determines whether or not the flag FS is equal to 1. When FS = 0, the traction control is not started. In this case, the TRC unit 50 executes step 112 in which step it is determined whether V > V in order to determine whether or not the traction control might be needed. When it is determined, in step 112, that the control starting speed V is equal to or higher than the driving wheel speed V, the TRC unit 50 determines that the traction control is not needed and executes step 154 (Fig. 4) in which flags FS, FFBS and CEND are reset to zero, and the aforementioned θ(full throttle) is set as the sub-throttle valve opening ratio θ. D TB s (NE) When it is determined, in step 112 that the driving wheel speed V is higher than the control starting speed V, the TRC unit 50 sets the flag FS to 1 in step 114. Then, the TRC unit 50 sets the subthrottle valve opening ratio θ to an initial target opening ratio f in step 116, and resets the flag FFBS to zero in step 118, the flag FFBS being an initial feedback control inhibit flag. Then, the TRC unit 50 ends execution of the routine. (NE) s The initial target opening ratio f of the sub-throttle valve 16 is selected on the basis of the engine speed NE and the road surface conditions. The sub-throttle valve 16 is maintained in the full-throttle state when the traction control is not performed. Hence, when feedback control is started in the full-throttle state of the sub-throttle valve 16, it takes a long time to respond to a variation in the sub-throttle valve opening ratio. With the above in mind, in step 116, the sub-throttle valve 16 is closed up to an opening ratio (θ) at which a response appears, at the same time as the traction control is started, and then the feedback control is started. The initial feedback control inhibit flag FFBS is set to 1 when a predetermined requirement is satisfied after the traction control is started. s When steps 112 - 118 have been executed until the previous execution of the routine, that is, until FS = 1, the TRC unit 50 executes step 132 in which step it is determined, on the basis of the signal from the sub-throttle valve opening ratio sensor 36, whether or not the sub-throttle valve 16 has been closed to the initial target opening ratio θ. When the result of step 132 is negative, the TRC 50 ends execution of the routine. When the result of step 132 is YES, the TRC unit 50 executes step 134 in which step a feedback control inhibit flag FFBI is set to 1. In step 136 (Fig. 4), the TRC unit 50 determines whether or not the feedback inhibit flag FFBI is equal to 1. When the result of step 136 is YES, the TRC unit 50 ends execution of the routine. The feedback inhibit flag FFBI is a flag set in a shift-up control performed by the ECT unit of the control unit 30. More particularly, the feedback inhibit flag FFBI is set to 1 at the time of shift control by the ECT unit. When the ECT unit performs the shift-up control by the step-136 process, execution of the basic control routine (feedback control after step 140) with respect to the sub-throttle valve 16 is inhibited. s In step 138, the TRC unit 50 determines whether or not the initial feedback control inhibit flag FFBS is equal to 1. The feedback control from step 140 controls the sub-throttle valve opening ratio θ. When the result of step 138 is NO, the TRC unit 0 ends execution of the routine without executing steps 140 - 154. s s When the result of step 138 is YES, the TRC unit 50 executes step 140 from which step the feedback control of the sub-throttle valve opening ratio θ is started. When it is determined, in step 138, that FFBS = 1, the TRC unit 50 determines a control quantity Δθ with respect to the sub-throttle opening ratio. s s s(n-1) s s s M S D In step 142, the TRC unit 50 determines the target sub-throttle valve opening ratio θ by θ = θ + Δθ, and outputs a signal corresponding to the determined valve opening ratio θ to the stepping motor 18 for driving the sub-throttle valve 16. The traction control is continued while a condition remains satisfied and as long as a predetermined time has not elapsed. The above condition is such that the sub-throttle valve opening ratio θ is greater than the main throttle valve opening ratio θ (step 144), and the absolute value of the slip quantity |V - V| is less than a predetermined value d (step 146). The above-mentioned predetermined time is measured by using a parameter CEND, which is incremented by 1 in step 148. In step 150, the TRC unit 50 determines whether or not the value of the parameter CEND is greater than D where D is the above-mentioned predetermined time. s smax When it is determined, in step 150, that the traction control should be terminated (when the result of step 150 is affirmative), the flags FS, FFBS and CEND are reset to zero, and the sub-throttle valve opening ratio θ is set to θ (full-throttle state) in step 154. The control unit 30 is informed of the value of the flag FS set in step 114 (Fig. 3). M A description will now be given of a setting process for the main throttle valve opening ratio θ carried out by the EFI unit of the control unit 30, by referring to Fig. 5. M s MG As has been described previously, the EFI unit of the control unit 30 is supplied with information indicating the engine speed NE, the main throttle valve opening ratio θ, and the sub-throttle valve opening ratio θ and other sensor signals necessary for engine control. The control unit 30 performs the fuel injection control and the ignition timing control using the above information and sensor signals. The ECT unit of the control unit 30 controls the shift point most suitable for the current driving conditions on the basis of the vehicle speed SPD indicated by the vehicle sensor 35 and a coded stepwise main throttle valve opening ratio θ. The process shown in Fig. 5 is carried out in synchronism with the basic control routine of the traction control shown in Figs. 3 and 4 with a period of 12msec. M M MG 0 8 In step 200, the control unit 30 obtains the main throttle valve opening ratio θ from the output signal of the main throttle valve opening ratio sensor 34, and carries out a Gray code conversion operation on the valve opening ratio θ, so that the coded main throttle valve opening ratio θ can be obtained. For the sake of simplicity, the main throttle valve opening ratio (0% - 100%) is converted into one of nine steps between θ (0%) and θ (100%). MG MG After calculating the current coded main throttle valve opening ratio θ, the control unit 30 determines, in step 202, whether or not the traction control is being performed. This determination is performed by referring to the traction control execution flag FS (step 114 shown in Fig. 3) controlled by the TRC unit 50. When it is determined, in step 202, that the traction control is not being performed, the EFI unit of the control unit 30 executes step 208 and informs the ECT unit thereof of the coded main throttle valve opening ratio θ calculated in step 200. MG When it is determined, in step 202, that the traction control is not being performed, the EFI unit of the control unit 30 executes step 208 in which step the ECT unit of the control unit 30 is informed of the main throttle valve opening ratio θ. MG MG MG-1 MG MG When it is determined, in step 204, that the current main throttle valve opening ratio θ is equal to a valve opening ratio at which slip because of gear shifting may occur, in other words, it is determined that θ is an upper guard value A%, the control unit 30 executes step 206 in which step a main throttle valve opening ratio θ lower than the actual main throttle valve opening ratio θ by one step is determined as the current main throttle valve opening ratio θ. MG 7 7 6 7 MG MG The above process will be described in detail with reference to Fig. 6. It will be assumed that the coded actual main throttle valve opening ratio θ obtained in step 200 is θ and the upper guard value A% is determined as shown in Fig. 6. It can be seen from Fig. 6 that the actual main throttle valve opening ratio θ is greater than the upper guard value A%. Hence, in step 206, the main throttle valve opening ratio θ lower than the main throttle valve opening ratio θ by one step is set as the main throttle valve opening ratio θ. In step 208, the ECT unit is informed of the main throttle valve opening ratio θ determined in the above manner. MG MG When the result of step 204 is negative, that is, when it is determined that the current main throttle valve opening ratio θ does not cause wheel slippage due to gear shifting, the steps 204 and 206 are not executed, and the ECT unit is informed of the read main throttle valve opening ratio θ. The gear shifting process carried out by the ECT unit will be described with reference to Figs. 7 and 8. Fig. 7 shows up-shifting as a function of the throttle valve opening ratio and the vehicle speed. The ECT unit of the control unit 30 performs the gear shifting process on the basis of the diagram of Fig. 7. Fig. 8 is a flowchart of the gear shifting process performed by the ECT unit 30. The flowchart of Fig. 8 relates to a case where the gear is shifted from the first gear to the second rear. MG MG MG When the gear shifting process shown in Fig. 8 is started, the ECT unit of the control unit 30 is informed of the main throttle valve opening ratio θ sent from the EFI thereof in step 300. As has been described previously, the main throttle valve opening ratio θ input in step 300 is equal to the main throttle valve opening ratio lower than the actual main throttle valve opening ratio by one step when the actual main throttle valve opening ratio is higher than the upper guard value A%. Further, the main throttle valve opening ratio θ input in step 300 is equal to the actual main throttle valve opening ratio when it is not higher than the upper guard value A%. MG 7 MG 6 In the following description, the following will be assumed. The main throttle valve opening ratio θ input in step 300 is equal to θ, which is higher than the upper guard value A%. Hence, by the process of steps 204 and 206, the main throttle valve opening ratio θ is set equal to θ. 1 1 In step 302, the ECT unit of the control unit 30 determines whether or not the vehicle speed SPD indicated by the sensor output signal of the speed sensor 35 is equal to or greater than a threshold vehicle speed V. When the vehicle speed is equal to or greater than the threshold speed V, the ECT unit executes step 304 in which step it is determined that the current gear shift position is at the first gear. When it is determined that the current shift position is at the first gear, the ECT unit executes step 306 in which step the ECT unit performs the up-shifting process from the first gear to the second gear. MG MG MG MG-1 As has been described previously, the ECT unit performs the gear shifting process on the basis of the main throttle valve opening ratio θ sent from the EFI. More particularly, in the setting process of the main throttle valve opening ratio θ by the EFI unit, when the actual main throttle valve opening ratio θ is higher than the upper guard value A%, data indicating the main throttle valve opening ratio θ lower than the actual one by one step is sent to the ECT unit. 7 2 6 7 7 1 2 1 2 By way of example, in the ECT gear shifting process shown in Fig. 8, if the actual main throttle valve opening ratio θ is used without any change, up-shifting from the first gear to the second gear is performed when the vehicle speed SPD is equal to a speed V, as shown in Fig. 7. On the other hand, according to the present embodiment, the main throttle valve opening ratio θ lower than the actual main throttle valve opening ratio θ is used instead of the actual main throttle valve opening ratio θ. Hence, up-shifting from the first gear to the second gear is performed when the vehicle speed SPD is equal to V (V > V). Hence, according to the present embodiment, up-shifting is made at an engine speed which is lower than the conventional engine speed (corresponding to V) by an engine speed corresponding to the difference between the vehicle speeds V1 and V2. The above up-shifting process is equivalent to a process in which the shifting point is changed towards the low-engine-speed side. MG As described above, according to the present embodiment, the shift point of the up-shifting process is changed to the low-engine-speed side when the degree of depression of the accelerator pedal 12 is equal to or greater than the threshold value and the main throttle valve opening ratio θ is higher than the upper guard value A%. Hence, the engine speed can be reduced when up-shifting is made, and the unstable behavior of the vehicle due to gear shifting performed when the vehicle is traveling on a slippery (low-µ) road can be effectively prevented. MG MG When the traction control is not being performed and the main throttle valve opening ratio θ is less than the upper guard value A%, there is little influence of wheel slippage due to gear shifting. In this case, the gear shifting is made on the basis of the actual main throttle valve opening ratio θ. Hence, the engine 10 responds to manipulation of the accelerator pedal 12 until the degree of depression of the accelerator pedal 12 by the driver exceeds the upper guard value A%. Hence, the driver does not feel uncomfortable. MG-1 MG MG MG MG 8 7 8 MG 7 6 7 MG TH TH In step 206 shown in Fig. 5, the main throttle valve opening ratio θ lower than the actual main throttle valve opening ratio θ by one step is used instead of the valve opening ratio θ when the actual valve opening ratio θ exceeds the upper guard value A%. For example, when the actual main throttle valve opening ratio θ is θ, θ is used instead of θ, and when θ is θ, θ is used instead of θ. It is possible to employ step 206A shown in Fig. 9 instead of step 206 shown in Fig. 5. In step 206A, when the actual main throttle valve opening ratio θ exceeds the upper guard value A%, the main throttle valve opening ratio to be used is set to a predetermined constant ratio θ without exception. By using the predetermined constant ratio θ, the occurrence of wheel slippage can be effectively prevented, particularly when the degree of depression of the accelerator pedal 12 is great. 6 The up-shifting process from the first gear to the second gear in the state in which the main throttle valve opening ratio is θ was explained with reference to Fig. 8. The up-shifting process with respect to other gear shifting and other main throttle valve opening ratios will be carried out in the same manner as has been explained previously. S R R In the aforementioned embodiment, the constant upper guard value A% is used. Alternatively, it is possible to change the upper guard value in accordance with the slip ratio (V - V)/V. In this case, it will be convenient to use a table mapping slip ratios and suitable upper guard values. In the aforementioned embodiment, the shift point is changed to a shift point lower than the normal shift point during execution of the traction control. Alternatively, it is possible to use a first shift point map to be used when the traction control is OFF and a second shift point map to be used when the traction control is ON and to select either the first shift point map or the second shift point map. In order to perform the traction control, the wheel speed sensors 22a and 22b are provided for the driving wheels 3a and 3b, respectively. Alternatively, it is possible to use, instead of the wheel speed sensors 22a and 22b, a single revolution speed sensor for detecting the revolution of the drive shaft 26. By using the above single revolution speed sensor, the number of sensors used can be reduced, and it is no longer necessary to take into account the difference between the right wheel speed and the left wheel speed. In the previously described embodiment, the engine 10 is equipped with the main throttle valve 14 and the sub-throttle valve 16. However, the present invention can be applied to an engine in which the traction control is performed using a single throttle valve provided for the engine. In this case, the quantity of depression of the accelerator pedal 12 is used as the main throttle opening ratio, and the main throttle valve opening ratio is used as the sub-throttle valve opening ratio. The present invention is not limited to the specifically disclosed embodiments, and variations and modifications may be made without departing from the scope of the present invention.
Stephen Fry (born 24 august 1957) is a British writer, director and actor who played Mycroft Holmes in 2011 in Sherlock Holmes: A Game of Shadows with Robert Downey Jr. (Holmes) and Jude Law (Watson). He is a sherlockian scholar, member of the Sherlock Holmes Society of London (since his teenage years) and which he presided the 2005 dinner. He is the sponsor of the Lancelyn Green's Arthur Conan Doyle Collection in Portsmouth (UK). In 2004, a project of a sherlockian TV movie for ITV was evoked by the British press (The Daily Mail, 31 march; The Mirror, 30 march and 15 june...) where Fry and Hugh Laurie were the main roles, but the movie was never released. Celebrity Mastermind In 2004, he won the Celebrity Mastermind show on BBC where he chose to answer questions about Arthur Conan Doyle's Sherlock Holmes. Here is the questionnaire: - In which publication did the first Holmes story "A Study in Scarlet" first appear in 1887? (solution: Beeton's Christmas Annual) - In "The Hound of the Baskervilles", by what name did Jack Stapleton head a school in Yorkshire and establish a reputation in entomology? (solution: Vandaleur) - What name did Holmes adopt in his guise as an Irish-American spy? (solution: Altamont) - Mycroft Holmes was a founding member of which club of the most unsociable and unclubable men in town? (solution: Diogenes) - Irene Adler, always known as "the woman" by Holmes, was the prima donna of which opera company when she met the King of Bohemia? (solution: Warsaw) - In "A Study in Scarlet", what 5-letter word is scrawled in blood on the wall in a dark corner of the room? (solution: RACHE) - In "The Valley of Fear", what was the local name for the members of Lodge 341 of the Ancient Order of Freemen in the Vermissa Valley? (solution: Scowrers) - In "The Disappearance of Lady Frances Carfax", with which London banking firm did Lady Frances have her account? (solution: Sylvesters) - On which theorem did Professor Moriarty write a treatise that won him the mathematical chair at a small English university? (solution: Binomial Theorem) - When relating his very first case, "Gloria Scott", whom does Holmes describe as "the only friend I made during the two years that I was at college"? (solution: Victor Trevor) - In "The Solitary Cyclist", what was the nickname of "the greatest brute and bully in South Africa" who conspired with Bob Carruthers to get Violet Smith’s fortune? (solution: "Roaring" Jack Woodley) - In "The Adventure of the Speckled Band", how did Dr Roylott get the poisonous snake into the room of his step-daughters, killing Julia? (solution: Ventilator) - In which story did Holmes make his celebrated reference to "the curious incident of the dog in the night-time" – the curious incident being that the dog didn't bark? (solution: Silver Blaze) - What did the red-headed London pawnbroker Jabez Wilson have to copy out when he was duped by John Clay into accepting a position with the spurious "Red-Headed League"? (solution: First volume of the Encyclopedia Brittanica) - Stephen Fry answered correctly to questions: 1, 4, 6, 7, 9, 12, 13 and 14, and he passed on question 3. In 2005, he was the narrator of the BBC documentary The Man Who Loved Sherlock Holmes about Richard Lancelyn Green. In 2011, he played Mycroft Holmes in the movie Sherlock Holmes: A Game of Shadows with Robert Downey Jr. as Sherlock Holmes. Audible In 2017, Stephen Fry read 60 Sherlock Holmes stories and introductions for the audio book company Audible (Amazon).
https://www.arthur-conan-doyle.com/index.php?title=Stephen_Fry
The SerapeumSaqqara - The Places The burial place of the Sacred Bulls, the God Apis, the animal form of the God Ptah. This Necropolis appears to have held at least 64 mummified bulls ranging from the reign of Pharaoh Amenhotep III to the Ptolemaic Era. Each Bull had its own Sarcophagi with its own Cult Temple built directly above it for worshipping purposes. What is there? Avenue of Sphinx 30th Dynasty Pharaoh, Nectanebo I, the last native Pharaoh from Egypt, appears to have ordered the construction of this Avenue of 600 Sphinx which led to this Ceremonial site. The Lesser Vaults Excavated by the orders of 19th Dynasty High Priest of Memphis and son of Pharaoh Ramses II, Prince Khaemwaset, during the New Kingdom Period. The Vaults were rooms devised to hold the Mummified bodies of the deceased Bulls in their Sarcophagi. The Greater Vaults Pharaoh Psamtik I ordered the excavation of this second set of Vaults in the 26th Dynasty, and these were further grown in length, width and height by the Ptolemaic Dynasty. Both vaults were found with only remains left and one empty Sarcophagi. Why Bulls? And why are they called Apis Bulls? Son of the Goddess Hathor whose animalistic form is a Cow, the Bull was primarily worshipped in Memphis in the Nile Delta and associated with the God Ptah; the Head of the Memphite Triad of Deities and whose animalistic form was a Bull – click here for further details about the Memphite Triad. The Bull was often represented in its animalistic form whilst wearing the Sun Disk of his mother, Goddess Hathor, between his horns. Reigning Pharaohs were given the Title, “Strong Bull of his mother Hathor”, as this envisioned a courageous heart, fighting spirit and great strength for the Ruler as well as conjuring solid Fertility links. Pharaohs were often portrayed with Bull tails attached to their clothing and used the Bulls as part of their Heb Sed Festivals to reaffirm and celebrate Pharaoh’s revitalisation as a living deity. For more information about the Heb Sed Festival, click here. Birth Only one Apis Bull was born to be given to the Egyptian People at a time. The search for this animal commenced on the death of the previous Apis Bull whose body had died but whose spirit or Ka had changed to a younger model. A flash of lightning would have enabled the Apis Bull’s mother to conceive him and after birth she would no longer conceive any further offspring. Mother of Apis was known as the “Isis Cow” and was revered within her lifetime. The Bull was chosen to become a deified Apis Bull when it presented a certain list of criteria. These are, a calf who: Was black with a white diamond shape on its forehead Was blessed with the image of the eagle or vulture on its back Had double the hairs on its tail compared to the others and Had the sign of the Scarab under its tongue Once located, the Apis Bull was delivered to the Temple at Memphis – see below – in a specifically designed Boat suitable for a Deity’s transportation. Life and Worship in Memphis A Temple of Apis, “the Manifestation of Ptah”, was assembled in Memphis, according to classical historians, near the Great Temple of Ptah, although the structure is yet to be found. This was a Religious Temple with 2 Chambers; 1 for Apis and 1 for his mother. Herodotus confirmed that the Temple had a Peristyle columned Courtyard with large statues and was Erected during the reign of Pharaoh Psamtik I of the 26th Dynasty who built the Greater Vaults of the Serapeum. A live Apis Bull was housed in the Temple and people watched his daily actions through a window in the Temple Wall. These actions were then interpreted as prophecies for the people by one of the Temple’s Priests. His breath could cure the sick and his mere presences blessed those passing with unrivalled strength. During Festivals the Bull would be honoured with his own parade throughout the streets. Death and Burial Egyptologists believe that the Bull’s health was of paramount importance as a sign linked to Pharaoh’s virility. Therefore, if the Bull showed signed of disease or reached nearly its full lifespan of 25 years then the Bull would be ritually dispatched. After death, the Apis Bull would be embalmed and mummified within the Temple at Memphis. The Mourning Period was then decreed which triggered the search for the new Apis Bull. After the embalming was completed the mummified remains were processed from Memphis across to the Mortuary area at Saqqara to be laid in the Serapeum within their Granite Sarcophagi. The details documented for their burial included: Regnal Date for the Bull’s Birth Regnal Date for the Bull’s elevation to a Deity Regnal Date for the Bull’s Death Mother Cow’s name Calf’s Birth Location The Apis Bull then lost his deified status with God Apis and instead joined with God of the Dead and the Afterlife, Osiris. The Bull was now known as God Osirapis. This ritualised tradition continued in its format for over 3,000 years, through Ancient Egypt until the Christians banned it on the wave in Christianity in Egypt in the 4th Century.
https://historyofegypt.net/?page_id=3091
Arabic Calligraphy as an Art Form Calligraphy, from the Greek words kallos (beauty) and graphos (writing), refers to the harmonious proportion of both letters within a word and words on a page. While some of the best examples of calligraphic writing make this art form appear effortless, each letter and diacritical mark is the result of painstaking measurements and multiple strokes. Calligraphy appears on both religious and secular objects in virtually every medium—architecture, paper, ceramics, carpets, glass, jewelry, woodcarving, and metalwork. In addition to its decorative qualities, it often provides valuable information about the object it decorates, such as function, maker, patron, and date and place of production. A number of factors, such as the prospective audience, content of the text, and the shape and function of an object, informs the type of script employed. Graceful and fluid scripts such as nasta'liq are used for poetry (fig. 14), Qur'an manuscripts are written in bold and stately scripts (fig. 13), and royal correspondence utilized complex scripts that are difficult to forge (see image 23). Although there are exceptions, most scripts have several specific functions (figs. 11, 13, 14).
You Are: Home | Your Health | A to Z: Healthy Living | A to Z listing | School Food Guidelines Index A B C D E F G H I J K L M N O P Q R S T U V W X Y Z School Food Guidelines The School Food Guidelines were developed to help create a supportive environment for healthy eating in the school setting. They are based on Canada’s Food Guide and have been updated to provide additional guidance for making healthy food choices. The guidelines include: A detailed list of food and beverages that can be sold and served in school cafeterias, canteens and vending machines Information on foods that are the most healthy, nutritious and suitable For more information about the School Food Guidelines, check out the links below :
http://www.easternhealth.ca/WebInWeb.aspx?d=3&id=1558&p=1552
Serene Khader's book, Decolonizing Universalism, is the first book-length treatment of transnational feminism by a feminist philosopher. Its "overarching argument" is that feminism, despite its universalist opposition to sexist oppression, does not require a universal adoption of Western or "Enlightenment liberal" values advocated by "missionary feminism (MF)." The reasons are twofold: First, feminist praxis does not require "a single cultural blueprint to have normative bite," as "feminism's true normative core" lies in opposing sexist oppression. Indeed, diverse social and cultural forms are compatible with feminism understood in this way. Second, Western feminists have often lost sight of the feminist normative core--opposition to sexist oppression--as a result of blindly embracing Western values, predicated on the idea of moral progress as transcending traditional values and unchosen relationships and requiring economic independence. "Putatively" feminist values--such as individualism, autonomy, and gender eliminativism--have in fact contributed to the spread of imperialism in their justificatory and constitutive roles (3-5). Khader's book has five chapters in which she fleshes out her overarching argument. Chapter 1 is the most central chapter in which she develops her own position in opposition to MF. She characterizes the latter as a brand of universal feminism that stems from ethnocentrism (or, more precisely, Westocentrism), justice monism, and idealizing and moralizing ways of seeing that promote Western values as universal. Although few Western feminists would explicitly endorse this view, Khader continues, these presuppositions "lie in the background" of many Western feminists' and activists' attitudes on Western feminist interventions (22). Although Khader rejects MF, she wishes to retain universalism. As a superior universal feminist alternative to MF, Khader advances her "nonideal universalist" feminism based on the conception of feminism as "opposition to sexist oppression" à la bell hooks (37). Khader is aware of the intersectionality of diverse oppressions that "other" women face, yet she argues that feminists ought to distinguish between "what would improve individual women's lives from what would reduce sexist oppression" and prioritize the latter. The reason, according to Khader, is that strategies that resist oppressions other than sexism can only be in the women's "short-term interests" (17). In contrast to MF's false universalism that masks ethnocentrism, Khader argues, her universalist feminism is compatible with "multiple culturally specific ways of living gender" (38). Faulting MF's failures in its adherence to Western gender-justice ideals, Khader rejects any "thick" universal ideal of gender justice (12) whose content may be "decided more by Western and Northern self-representations and interests than by genuine empirical engagement, intercultural dialogue, and attention to what 'other' women actually need" (11). Her universalist feminism focuses rather on "what is wrong" under nonideal conditions in third-world contexts (38)--hence her emphasis on "nonideal." Khader argues that her nonideal position can counteract ethnocentric tendencies of MF to promote as universal Western ideals of gender justice and cultural forms in at least two ways: First, her position underdetermines "how gender justice should be brought about in particular cases" (38) by not specifying "the indicators of advantage and disadvantage . . . in any given context" (39); second, it gives "a picture of what is wrong rather than . . . what is right" (38) and thereby focuses on "whether oppression is present, not whether certain cultural vernaculars or practices are" (41; original emphasis). In the following chapters, Khader focuses her attention on how putatively feminist values endorsed by MF--such as individualism, autonomy, and gender eliminativism--have contributed to the spread of imperialism. In chapter 2, Khader reexamines Susan Okin's infamous multicultural "ultimatum" that women in nonliberal cultures might be better off if their own cultures were "to become extinct." This ultimatum is predicated on an underlying conception of individualism--"independence individualism"--which revolves around the Western values of economic self-sufficiency and "chosen relationships." Independence individualism is "imperialism-complicit" and "impedes transnational feminist praxis" (8). Chapter 3 discusses how the idea of autonomy, often conceptualized as "freedom from tradition" or "Enlightenment freedom (EF)," has contributed to imperialism. For example, Western feminists who subscribe to EF have been complicit in Islamophobia. The bulk of the chapter, however, is devoted to exploring the feminist limit in accommodating other women's "metaphysically traditionalist (MT)" worldviews. In particular, Khader claims that Saba Mahmood is "wrong" to respect the voices of Egyptian pietist women who unquestioningly accept their MT dictates (90). Yet, Khader continues, feminists ought not to reject all MT worldviews depending on their "effects" (93); those that have "normatively acceptable effects" (97)--meaning, conducive to feminism as opposition to sexist oppression--are compatible with feminism, whereas those that are not, such as Egyptian pietist women's worldview, are not. Chapters 4 and 5 focus on the value of "gender-role eliminativism" advocated by Western feminists and its relation to non-Western views about women's gender role. Although Western gender-role eliminativism is not necessarily a feminist value, "headship-complementarian (HC)" worldviews embraced by "other" women should be rejected as incompatible with feminist "ideals." The HC worldview advocates women specializing in household labor and deferring to men's authority because this is conducive to "women's own well-being" (104). High-caste Oriya Hindu women's and the Jamaat-e-Islami women's positions are given as examples. By deploying Okin's analysis of asymmetrical vulnerability, however, Khader argues that HC gender roles cannot be constitutive of a gender-just ideal because they involve "intrahousehold-inequality-supportive norms and practices," which result in unequal resource allocation within households (106). In contrast, Khader argues in chapter 5 that some non-Western constructions of "feminized power"--power "exercised through women's fulfillment of prescribed gender roles" (122)--are defensible feminist strategies. Leila Ahmed's defense of the harem and Nkiru Nzegwu's defense of a gender-differentiated public are given as examples. Western feminists dismiss "other" women's advocacy of feminized power by idealizing Western feminist ideals and cultural norms (122). This is unacceptable, however, as "other" women's advocacy of feminized power is a form of resistance in nonideal conditions meant to bring about incremental change (133). Transnational feminism has been a major preoccupation among feminists since the publication of Inderpal Grewal and Caren Kaplan's Scattered Hegemonies in the mid-1990s, and its influence has only increased over time (Grewal and Kaplan 1994). Yet feminist philosophers have been relatively silent on this topic, although some have offered helpful philosophical analyses of key concepts at the article level. Khader's book is significant and exciting in that it is the first monograph on transnational feminism by a feminist philosopher. As a fellow anti-imperial feminist philosopher committed to constructing a universal normative theory fit for transnational feminist praxis (Herr 2014; 2018), I welcome Khader's philosophical treatment of some of the most important questions for feminism in the twenty-first century. Khader's "ambitious" aim to identify "the core values of transnational feminist praxis" (13) is awe-inspiring. I agree wholeheartedly with her that such core values must enable anti-imperial feminists to criticize "gender injustice without prescribing imperialism" (2). Khader is spot on in identifying an important first step in this direction: Anti-imperial feminists must recognize that Western feminism has been "informed by unstated background assumptions" entrenched in liberalism (14) and forge transnational feminist solidarity by engaging "with 'other' traditions and practices" (16). After a careful reading of the book, however, I'm concerned that Khader's nonideal universalist feminism may not live up to her professed goals of anti-imperial feminism. I focus on five aspects of her theory as areas of concern: First, targeting missionary feminism (MF); second, her use of the term "other" to refer to third-world women; third, her brand of universalism; fourth, her insistence on the primacy of opposing sexist oppression in the global context; and fifth, her position toward "other" women's agency. First, Khader targets MF as representative of imperialist Western feminism. Although I agree that MF, as is conceptualized by Khader, is problematic, I'm puzzled by the significance that Khader attributes to MF in the year 2018. MF was a popular view held by Western feminists in the 70s and 80s, which consequently prompted severe critiques by feminists of color within the Western context. Although some prominent Western feminists--such as Okin--advocated it until early 2000, Western feminism has evolved considerably since then. I agree with Khader that certain presuppositions of MF continue to "lie in the background" of many Western feminists' treatment of third-world women, although "few Western feminists would explicitly endorse this view" (22). Under these circumstances, I would have liked more examples of how such presuppositions continue to operate implicitly and propagate imperialism in the more current Western feminist literature. Instead, Khader's critique targets mainly MF construed by other feminists in the early 2000s (Abu-Lughod 2002) or Okin's position, whose flaws have been amply discussed by other feminist philosophers (Flax 1995; Herr 2004; Jaggar 2009). Second, Khader's reference to third-world women as "other" women in her anti-imperial feminist book seems inappropriate. Khader's reasons for choosing this term are twofold: to "capture both the decline in the use of the term" and to reflect the fact "that women who are perceived as culturally 'other' now live throughout the West" (19). Neither of her reasons, however, seems to justify her choice of the nondescript term "other" to refer to third-world women, which not only erases differences among them, but also disturbingly conjures up the imperial and/or colonial gaze toward those conquered and/or colonized.[i] Third, Khader's nonideal universalist feminism may not be as compatible with "multiple culturally specific ways of living gender" (38) as she seems to think. The qualifier "nonideal," which is supposed to do the heavy lifting in distinguishing her universalism from the ethnocentric universalism of MF, is left largely untheorized (36). This is a problem, as the debate concerning "nonideal" theories in recent decades, particularly in opposition to Rawls's "ideal" theory, has involved conceptual confusions due to misconstruing Rawls's position (Simmons 2010; Stemplowska and Swift 2012). Rawls's ideal theory is not an idle philosophical speculation irrelevant to nonideal conditions; rather it is a "necessary precursor" to nonideal theory (Stemplowska and Swift 2012, 376) by serving as "the only basis for providing the systematic grasp of these more pressing problems" (Rawls 1999, 8). If this is correct, then universalism cannot be easily categorized as either "ideal" or "nonideal," as if ideals can be divorced from universal theories. Indeed, gender-justice ideals are constitutive of any plausible theory of universal feminism and bound to influence its contour whether they are explicitly recognized as such or not. Although Khader explicitly abjures universal gender-justice ideals, therefore, her nonideal universalist feminism seems predicated on a particular conception of universal gender-justice ideals. For example, although Khader urges feminists not to specify the indicators of advantage and disadvantage in a given context because "societies genuinely vary in their currencies of advantage," she states in the immediately following paragraph that "anti-imperialist feminists should not completely embrace nonspecificity about indicators of advantage” (39). There is, according to Khader, a need for a “list of universal indicators of advantage and disadvantage” that is not "abstracted from a specific culture." Such a list is presumably needed to serve as a universal standard of gender justice by which to critically assess women's activisms on the ground (40). Further, regarding what counts as such a list, Khader claims that the "list of basic human rights" in prevailing human-rights discourse is the "closest available thing" (40). Given that the list of individual human rights is clearly based on liberal values (Beitz 2001; Pogge 2002; Griffin 2008; Buchanan 2013; Donnelly 2013), and many prominent theorists have criticized this list as Westocentric (Pollis and Schwab 1979; Cobbah 1987; Ames 1997; Brown 1999; Mutua 2001; Kennedy 2002; Hafner-Burton and Ron 2009), it is curious that Khader views it to be "abstracted from a specific culture" and assumes it as universal rather than seriously engaging with these critiques.[ii] Hence I worry that Khader's universalist feminism may be a variation of Westocentric feminism, which subscribes to a universal gender-justice ideal whose content is "decided more by Western and Northern self-representations and interests than by genuine empirical engagement, intercultural dialogue, and attention to what 'other' women actually need" (11). Fourth, Khader insists that anti-imperial feminist theorizing about third-world women's activisms must focus on sexist oppression. Feminism as "opposition to sexist oppression" may be a fine definition of feminism in the abstract, but what counts as "sexist oppression" cannot be determined independently of specific cultural contexts. Therefore, I worry that Khader's insistence on prioritizing sexist oppression in the global context may misrepresent third-world women's activisms, which often do not involve an explicit demand for gender equality or feminist goals. Third-world women tend to advocate gradual changes that result from their collaboration with their male counterparts in local social movements, such as nationalist, pro-democracy, or human-rights movements, to enhance their communal influence vis-à-vis other members, and to improve the living standards of their families and of the community itself. Even in these mixed activisms, however, "women ultimately take up questions of gender inequality even if this was not their initial objective" (Basu 1995, 19). Under these circumstances, whether a particular third-world women's activism is feminist or not is not easy for an outsider to determine, as the contours of social and political landscapes on the ground are dense and complex. Khader at times seems to agree, as when she states that "One cannot know whether sexist oppression is present in a given case without [having] rich contextual information" (41). Unfortunately, if this is true, then Khader is wrong to categorically prioritize "exist oppression" over other oppressions in third-world contexts without the benefit of "rich contextual information." Finally, I'm concerned about a particularly paradoxical aspect of Khader's anti-imperial feminism regarding third-world women's agency. Khader claims that feminist questions are not likely to be resolved by "concern with agency," as "It is possible to be fully agentic and to also perpetuate one's own (or others') oppression" (18). Since feminism requires "opposition to oppression, not just the ability to make meaning and act in ways one cares about in the world," Khader continues, "respect for [third-world women's] agency is an insufficient feminist normative commitment" (18). According to this logic, even if third-world women are satisfied with progress they've made regarding their agency, transnational feminists in the West ought to take a step further and promote "women’s emancipation or gender justice" rather than "merely agency" of third-world women (18). Such statements seem to presume superior epistemic or cognitive capacities for transnational feminists based in the West in making more reliable judgments about third-world women's oppression than the women themselves make. It is disturbingly reminiscent of Okin's statement that "committed outsiders can often be better analysts and critics of social injustice than those who live within the relevant culture" (Okin 1994, 19). Not only is this presumption morally suspect, but it also contradicts Khader's claim about the importance of "genuine empirical engagement, intercultural dialogue, and attention to what 'other' women actually need" in her feminism.[iii] In conclusion, Khader's timely and ambitious book raises more questions than provides answers about key topics of feminism in the twenty-first century. Despite its limitations, it may serve the valuable purpose of bringing attention to and fostering constructive debates on critical and urgent feminist mandates of anti-imperialism, universal feminism, and transnational feminist solidarity in an unprecedentedly globalized world. Acknowledgment I wish to thank Jessie Payson for her helpful feedback on a draft of this review. References Abu‐Lughod, Lila. 2002. "Do Muslim women really need saving?." American Anthropologist 104 (3): 783-90. Ames, Roger. 1997. "Continuing the conversation on Chinese human rights." Ethics and International Affairs 11 (1): 177-205. Basu, Amrita. 1995. "Introduction." In The challenges of local feminisms, edited by Amrita Basu. Boulder, CO: Westview Press. Beitz, Charles. 2001. "Human rights as a common concern." American Political Science Review 95 (2): 269-83. Brown, Chris. 1999. "Universal human rights: A critique." In Human rights in global politics, edited by T. Dunne and N. Wheeler. Cambridge, UK: Cambridge University Press. Buchanan, Allen. 2013. The heart of human rights. Oxford: Oxford University Press. Cobbah, Josiah. 1987. "African values and the human rights debate." Human Rights Quarterly 9 (3): 309-31. Donnelly, Jack. 2013. Universal human rights in theory and practice. 3rd ed. Ithaca, NY: Cornell University Press. Dotson, Kristie, Ranjoo Herr, Serene Khader, Stella Nyanzi, and Saba Fatima. 2017. "Musings on contested terms." Hypatia 32 (3): 731-42. Flax, Jane. 1995. "Race/gender and the ethics of difference: A reply to Okin's 'Gender inequality and cultural differences.'" Political Theory 23 (3): 500-10. Grewal, Inderpal, and Caren Kaplan, eds. 1994. Scattered hegemonies: Postmodernity and transnational feminist practices. Minneapolis: University of Minnesota Press. Griffin, James. 2008. On human rights. Oxford: Oxford University Press. Hafner-Burton, Emilie, and James Ron. 2009. "Seeing double: Human rights impact through qualitative and quantitative eyes?" World Politics 61 (2): 360-401. Herr, Ranjoo. 2004. "A third world feminist defense of multiculturalism." Social Theory and Practice 30 (1): 73-103. Herr, Ranoo. 2014. "Reclaiming third world feminism: Or why transnational feminism needs third world feminism." Meridians 12 (1): 1-30. Herr, Ranjoo. 2018. "Feminism, nationalism, and transnationalism: Reconceptualizing the contested relationship." In Bloomsbury companion to analytic feminism, edited by P. Garavaso. London: Bloomsbury. Jaggar, Alison. 2009. "Susan Moller Okin and the challenge of essentialism." In Toward a humanist justice: The political philosophy of Susan Moller Okin, edited by D. Satz and R. Reich. New York: Oxford University Press. Kennedy, David. 2002. "The international human rights movement: Part of the problem?" Harvard Human Rights Journal 15: 101-26. Mutua, Makau. 2001. "Savages, victims, and saviors: The metaphor of human rights." Harvard International Law Journal 42 (1): 201-45.Pogge, Thomas. 2002. "How should human rights be conceived?" In World poverty and human rights. Malden, MA: Polity Press. Okin, Susan. 1994. "Gender inequality and cultural differences." Political Theory 22 (1): 5-24. Pollis, Adamantia and Peter Schwab, eds. 1979. Human Rights: Cultural and Ideological Perspectives. Westport, CT: Praeger. Rawls, John. 1999. The Law of Peoples. Cambridge, MA: Harvard University Press. Simmons, A John. 2010. "Ideal and Nonideal Theory." Philosophy & public affairs 38, no. 1: 5-36. Stemplowska, Zofia, and Adam Swift. 2012. "Ideal and Nonideal Theory." The Oxford handbook of political philosophy, 373-89. [i] For reasons to continue to use the term "third-world" despite the decline in its usage, see Dotson et al. 2017. More important, Khader's second reason does not seem relevant in the context of her book, which is about women living in third-world contexts. [ii] One exception is Makao Mutua's critique (Mutua 2001), whose name Khader misspells as "Matua." Yet not only is Mutua’s critique taken out of context, but it is misinterpreted as involving "nonnormative assumptions surrounding Western transcendence" (40). [iii] Khader's conceptualization of her "anti-imperial" feminism as comprising "postcolonial, transnational, and decolonial feminist positions" (19) is consistent with a dismissive attitude toward "other" women’s agency, as it excludes third-world feminism, which views third-world women as "active agents of positive change" whose "viewpoints must receive due respect" from Western feminists (Herr 2014, 6)"
https://www.hypatiareviews.org/reviews/content/437
- Harv_mass: is it the dry or the green mass? I just have volumes, so I am transforming it into mass with the basic density of my timber. Is it correct? But the problem is that we are now in the middle of the rotation period, so a few parcels have been harvested (I have detailed data) and the rest are not (I can approximate the production with the management plan). So, should I assign Immed_harv = Y to the parcels harvested and Immed_harv = N to the future ones? How can I run the model and get the output for the past years and the future years? - The documentation talks about an associated LULC map, is there any kind of map input apart from the parcels? - In the documentation Price has not units associated (only (-1)). I assume it is currency/ha, am I correct? Just a last comment. It could be nice in future versions to have the possibility to enter the timber data as volumes for those who have it. The documentation does discuss LULC maps, however they are not an input to this model. I believe the discussion referring to the LULC maps is meant to indicate that the parcel shapefile that defines your timber areas can be associated with a current, past, or future LULC map. Unfortunately I'm not able to answer the other questions, but will get in touch with someone who can get back to you. Thanks for your patience. Harv_mass: I believe it will depend on what you want to value, the dry or green mass. You are correct in using the density to derive the mass from the volume (mass = density * volume). Please keep in mind the parameter for the BCEF is used to convert dry mass. So you will want to use dry mass for Harv_mass if you are going to manipulate the BCEF parameter. Freq_harv, T, Immed_harv: It sounds like your table parameters may not reflect the scenario you described above. The table is currently set up so every parcel is harvested annually for 30 years (T = 30, Freq_harv = 1 for every parcel). Could you please let me know if that sounds correct or should there be just a single parcel harvested each year until all 30 are rotated through? Price will be the currency expressed per Mg (Mg-1). I can see where the units are blank in the Data Needs section but the units are described a bit further in the User Manual for equation 1 as “Price is the market price of a Mg of timber extracted from x…”. tank you for pointing this overlook, as we will correct it in future User Manuals. Please let me know which set of parameters is correct for your scenario and if you need anything else. Thank you very much for your feedback, Doug and Brad. The questions on LULC, density and price are now clear. @Brad: you were right, my scenario is just a single parcel harvested each year until all 30 are rotated through. So, should it be T=30 Freq_harv=30 for all the parcels? And, then, about the meaning of Immed_harv, should I put "Y" to the parcels already harvested and "N" to the rest? Or would it be better to split the model into 2 periods (past and future)? Setting up the parameters in your scenario could be a bit tricky. By using T=30, Freq_harv=30 for all parcels; the model will calculate 30 years of maintenance costs on every parcel but incorrectly apply the market discount rate using either 1 year (Immed_harv=Y) or 30 years (Immed_harv=N). It sounds like you want each parcel to be discounted accordingly throughout the rotation and include annual maintenance costs over 30 years for each parcel (pesticide management, thinning, etc.). To do so, I believe you will want to run the model two times. For the first run, please try ignoring maintenance costs (set Maint_cost=0) for all parcels and set up each parcel so it only gets harvested once during the 30-year rotation. In this case, the first parcel would be only harvested during year 1 (T=1, Freq_harv=1, Immed_harv=N), and the next harvested parcel would be cut during year 2 (T=2, Freq_harv=2, Immed_harv=N), etc, until the last harvested parcel would be cut during the last year in the rotation (T=30, Freq_harv=30, Immed_harv=N). This should correctly account for the market discount rate for the NPV of harvested timber. For the second run, we will only account for 30 years of maintenance costs. Please try setting Harv_mass=0, T=30, Freq_harv=30, Immed_harv=N for all parcels and use the actual maintenance cost values. Essentially, the first run calculates the NPV of your timber without accounting for any maintenance costs and the second run calculates NPV of the maintenance costs for 30 years. The difference between the two NPV values will be the final NPV of timber production. So the final step is to just subtract the values for the second run (NPVmaintenance) from the first run (NPVtimberharvest). Could you please let me know if this approach seems applicable to your scenario? Hopefully, this also addresses your issue concerning past harvests as you can model the 30-year rotation in its entirety.
https://forums.naturalcapitalproject.org/index.php?p=/discussion/95/inputs-for-the-timber-model
Excel is one of those things you can spend a lifetime trying to master everything it can possibly do. Luckily you don’t need to know everything Excel can do to get a lot out of it. I work with a partner now who is known to make the claim that Excel is the world’s largest Enterprise Resource Planning (ERP) system. Also, I can tell you when I started in business school at Kellogg, we used two fancy macro workbooks to run sophisticated statistical analysis until they shifted to having everyone use STATA. STATA was/is infinitely better than Excel, but you’d be amazed at what you can do in Excel, with a little bit of coding know-how. This post is about the Excel formulas, though – the little statements you type into a cell to make magical things happen. Read on to dive into the ten Excel formulas you need to know and love to…excel as a consultant. 1. Vlookup Vlookup is a formula that allows you to link data from two difference sources based on a unique key. They syntax is =vlookup(value, lookup table, column number in the lookup table, match type). A couple of notes, the column numbers should be counted started with the column containing the lookup key. In other words, your lookup table should be formatted such that the column with values that might match are the first column of that table. If you want the lookup to pull the nearest match – aka fuzzy match – put true in the last term and don’t forget to make sure your lookup table is sorted in ascending order. I don’t think I’ve ever used a fuzzy match in this way, but the functionality is there. Generally speaking, the lookup value needs to be a unique or you may distort the results. 2. Match Match is a formula that returns either the row number or column number of a value you’re looking for in a table. The syntax is =match(value, lookup row OR column, match type). The thing to note here is that match type has a few variations. If you put “1” as the match type, your lookup array row/column needs to be ascending order. This will tell Excel to return the position of the largest value that is less than or equal to your lookup value. Using “-1” tells Excel to return the position of the smallest value that is greater than or equal to your lookup value. This means your lookup row/column has to be sorted in descending order. If you want an exact match, then you just put “0” in for the match type. I rarely use the match formula independently to figure out a value’s position in a column or row because you can generally get that answer by highlighting the row/column and doing a search for the lookup value. You might be asking why match is on this list then if I never use it, but the operative word in my statement above was “independently”. When you get to number 4, you’ll understand what I mean. 3. Index Index is vlookup on steroids. Perhaps the best part of the index formula is the lookup value doesn’t need to be in the first column of the lookup table. If you’ve ever found yourself wishing you could do a negative vlookup, this is for you. There are two syntaxes for using the index but the one I use is =index(lookup table, row number, column number). In most instances, you can probably just type in the column number like the vlookup formula, but if your table has more than one row, index needs you to provide the row of the lookup value so it can return the result from the intersection. You can either type in the lookup value row manually for each occurrence of the formula or you can use formula #4 instead. 4. Index + match Ok, so technically this is two formulas combined, but it is a slick way of doing lookups without needing to re-sort any of your data. The syntax is =index(lookup table, match(lookup value, lookup value column in lookup table, match type), column number). You can also you match for the column number argument if you’re feeling too lazy to count how many columns it is to get from column A to column AC. 5. Text When it comes to lookups, formatting matters and one thing that’s happened too many times for me to count is I get a data set where the lookup key doesn’t match on the lookup table because one of the files has dropped the leading zero. For the lookups to work the lookup value needs to be formatted the same in each table. Let’s say we have two files. File #1 has my ID listed as 01234 and File #2 has my ID listed as 1234 in cell A2. I would fix file 2 by typing into a new cell =text(A2,”00000″). The first argument is the value that needs to be transformed, and the second value defines the format. In this case, the format is 5 digits. 6. Sumifs The sumifs formula allows you to return the sum of a specified column based on certain conditions. The syntax of the formula is = sumifs(sum_range, criteria range1, criteria1, criteria range2, criteria2,…). Using sumifs gives you some functionality you can’t have in a standard vlookup, because it allows for repeated lookup values in the lookup table. Imagine having a table with a list of customer IDs and wanting to pull in their total sales for the year. The lookup table, however, has a record for each month. Using index or vlookup would only return the first record with the matching customer ID. Sumifs will give you the total, even if your data set isn’t sorted by customer ID. Additionally, you can have multiple criteria, so this can be quite useful when summarizing data in a table so you don’t have to key in every cell manually. 7. Countifs Similar to the sumifs Excel formula noted above, countifs allows you to quickly summarize data using basically the same syntax. The beauty of countifs is it also gives you a good way to deal with qualitative data. For example, if you have a massive data table and you want to know the number of female customers who live in San Jose, countifs has you covered. 8. Iferror Once you have started using formulas, you inevitably come across a scenario where the formula is working perfectly but the result is hideous – #N/A. That means the value you’re looking for doesn’t show up in the lookup table. To keep your table clean use the syntax =iferror(formula,””). The second argument tells Excel what to do should you formula produce and error. In this case, I put empty quotation marks so Excel will return a blank, but you could put something else there like “additional research required”. 9. & If you find yourself wanting to combine the values int two cells, you can easily do that by using =Cell1&Cell2. If you want to put a space or other character between the two cell values, try =cell1&” “&cell2 or =cell1&”_”&cell2. This formula comes in handy when you want to make sure you have a unique value to perform a lookup. For example, first name might not be a unique key, but first and last is. If you’re combining more than two values (that are all adjacent to each other), I would suggest using the next formula instead. 10. Concatenate Sometimes creating a unique value for lookups requires mashing together several fields. Concatenate does this quickly by doing =concatenate(highlighted array of cells). Again, you can add in a character or space to separate the fields, but this is mostly cosmetic. The upside of this over the & formula is that if you’re combining 8 cells to come up with your unique value, you don’t have to type in “&” so many times. Want to learn more about Excel formulas? If you’d like to see a video of any of these formulas in action or have another Excel challenge you’re trying to solve, let me know in the comments. Update: you can now access my excel bootcamp course with videos and sample workbooks here:
https://ericpbutts.com/excel-formulas/
You searched for: Results: 1-10 - Kalenjin (people) Kalenjin, any member of the Kipsikis (Kipsigis), Nandi, Pokot, or other related peoples of west-central Kenya, northern Tanzania, and Uganda who speak Southern Nilotic languages ... - Deg Xinag (people) Deg Xinag, also called Deg Hitan, formerly Ingalik (pejorative), Athabaskan-speaking North American Indian tribe of interior Alaska, in the basins of the upper Kuskokwim and ... - Gusii (people) Their region is one of the most densely populated areas of Kenya, and the Gusii constitute one of the largest ethnic groups in Kenya. The ... - The Celtic godsfrom the article Celtic ReligionThe Gaulish Sucellos (or Sucellus), possibly meaning the Good Striker, appears on a number of reliefs and statuettes with a mallet as his attribute. He ... - Ngada (people) Ngada, also called Rokka, or Rokanese, tribe inhabiting the south coast of Flores, one of the Lesser Sunda Islands, in Indonesia. They live around the ... - Matrilineal Society (sociology) Matrilineal society, also called matriliny, group adhering to a kinship system in which ancestral descent is traced through maternal instead of paternal lines (the latter ... - Intelsat (company) Intelsat was founded as a public-private consortium in 1964 by the telecommunication agencies of 18 nations, including the United States, which proposed the organization. The ... - Sámuel, Gróf Teleki (Hungarian explorer) Teleki set out from Pangani (now in Tanzania) in February 1887 in the company of an Austrian naval officer, Ludwig von Hohnel, and they traversed ... - Tribal Nomenclature: American Indian, Native American, And First Nation In the 1970s Native Americans in Canada began to use the term First Nation as their preferred self-referent. The Canadian government adopted this use but ... - Trobriander (people) Trobriander, any of the Melanesian people of the Kiriwina (Trobriand) Islands, lying off eastern New Guinea. Subsistence is based on yams and other vegetables, domesticated ...
https://www.britannica.com/search?query=wecht
Each year, over 40 million people pack their bags and hit the road with friends and family members to spend time in the great outdoors. Camping is a popular activity for people of all walks of life simply because it can provide a much needed break from the sometimes hectic city life, and because it may be one of the easiest and least expensive vacations on the planet. Furthermore, camping is connected with a number of other activities such as backpacking, hiking, fishing, marshmallow roasting, and other activities you don’t often get a chance to participate in on a daily basis. It is possible to camp in nearly every corner of the world, but there are areas and campsites which are rated better than others. Whether you prefer roughing it in a tent or hooking up an RV, Utah has some of the best areas for camping in the United States. Residents lucky enough to live in the state and visitors alike can easily find hundreds of local campsites, many of which are free. Furthermore, Utah provides everything necessary for a great camping trip – scenic mountain views, beautiful, clear water, and some of the oldest trees in the country. For this reason alone, Utah is considered one of the most ideal destinations for great camping. Choosing the best campsites in Utah can be difficult but here are the top 10.
https://www.telegraphtoday.com/10-best-campsites-utah/
Abigael A. Lessons may take place At students’ place: At tutors' place: Online: Education Education: University of Ibadan Degree: B.Sc Zoology Graduation year: 2016 Diplomas: Teaching levels Tutor for children For study abroad GSCE Check point BECE IGCSE WAEC NECO UTME JSS Level SSS Level Undergraduates Adults About me I am skilled in adapting to students diverse learning styles, also experienced in one on one and group instruction. I am experienced in working in multicultural environment that emphasizes inclusion. I am proficient in English language and Yoruba language. Tutors with similar parameters Ibadan Olawunmi A. I teach Biology in all cadres, Secondary, Post Secondary, Cambridge A level, IGCSE and also conduct practicals. Oluwafemi A. I teach student from senior secondary school to the undergraduate level in the university the following subjects: Mathematics, Physics, Chemistry Adejoke J. I have strong initiative and exceptional organizational skills, combined with my ability to work well under pressure, Fast links Tutor’s summary Abigael A. is an experienced tutor, and has helped many students over 1 year. Tutor lives in Ibadan and does tutoring in following subject:
https://upskillstutor.com.ng/user-1604/