content
stringlengths 0
1.88M
| url
stringlengths 0
5.28k
|
---|---|
Q:
"Split bamboo" for different purposes
We split bamboo poles into two and sometimes more to make a variety of things.
Does English like my native language have specific words and phrases for split bamboo poles?
Thanks in advance.
A:
Each country has a rich vocabulary for things that people deal with regularly. In England, we have very varied weather, so we have many different words to describe wet weather: mist, fog, cloud, drizzle, rain, hail, sleet, slush, snow, etc.
Bamboo is not native to England, and so we don't have any special terms for it. We do, however, have many specialised terms for ways to process the types of wood native to England. For example, one traditional method of making a barrier round a field in England is hedge laying, and terms like pleacher, stake, brash and crook are used to describe different ways of using the wood in the construction of the hedge.
A:
A thin piece of wood, metal, plastic or bamboo is called a slat. If you split a large bamboo pole into flat pieces you could call each one a "bamboo slat". This term is used by several bamboo wholesalers on alibaba.
The fence was made by weaving bamboo slats between bamboo stakes that had been driven into the ground.
There is no specific term for a half-round bamboo pole. But a "half-round" would describe the shape clearly enough.
| |
FIELD OF THE INVENTION
The present invention relates to a means to increase the depth range of an underwater pressure hull such as an underwater camera by balancing the internal pressure of the hull with the exterior ambient pressure.
BACKGROUND OF THE INVENTION
Recent achievements in the microprocessor control field have led to the development of underwater cameras which utilize the basic camera case as the pressure hull. The majority of cameras of this type have a maximum operating limit from 3 to 10 meters. Operations within this range are accomplished with minimal changes to the basic camera bodies and therefore the camera price may be held low.
A few attempts have been made to increase the strength of the structure of the camera body so that the cameras may be utilized at greater depths and therefore render the cameras more practicable for underwater use. The maximum depth obtainable by increasing the camera structure is approximately 30 meters but the increased costs necessitated by the stronger camera body more than triples the retail cost of the camera, placing it out of range for the average sport diver.
OBJECTIVES OF THE INVENTION
A principle and primary objective of the present invention is to provide a means for pneumatically connecting a pressure hull to a relatively high pressure source of gas wherefrom the pressure hull may "breathe" and thus maintain an internal pressure approximately equal to ambient pressure.
Another objective of the present invention is to provide a source of pressurized gas and a pressure reducing regulator adapted to enable the pressurized gas source to maintain the internal pressure of an associated system at approximately ambient pressure.
Another objective of the present invention is to provide a means to couple the second stage regulator of a self-contained underwater breathing apparatus to a camera whereby the internal pressure of the camera system is maintained at approximately ambient pressure in response to gas supplied by the second stage regulator.
It is a primary objective of the present invention to provide a means for pressure compensating the interior of a waterproof enclosure to approximate the ambient pressure.
It is a primary objective of the invention to provide a means whereby the operating depth of an underwater camera may be increased without increasing the physical structure.
Another objective of the invention is to provide a method for operating an underwater camera where the camera body is by the regulator of an underwater breathing apparatus.
A still further objective of the invention is to provide a camera including means to pressurize the camera in response to ambient pressure.
Another objective of the invention is to provide a method for operating a video camera underwater by encasing the video camera in a flexible waterproof container.
A further objective of the invention is to provide a flexible underwater container and means to pressurize the container in response to ambient pressure encountered during an underwater dive.
Another objective of the invention is to provide a means to seal the breathing port of an underwater breathing apparatus to cause the apparatus to "breathe" in through its high pressure inlet and out through its exhaust valve means so that the chamber between input and output is maintained of approximately the external ambient pressure.
Another objective of the invention is to provide a means to seal the breathing port of an underwater breathing apparatus to cause the apparatus to "breathe" in through its high pressure inlet and out through its exhaust valve means so that the chamber between input and output is maintained of approximately the external ambient pressure and provide a means for pneumatically connecting a pressure hull to said chamber whereby the internal pressure of the pressure hull is approximately equal to the surrounding pressure.
SUMMARY OF THE INVENTION
The present invention contemplates a means to automatically maintain the internal pressure of a pressurized hull such as an underwater camera body or a waterproof container at approximately ambient pressure. Numerous sources of pressurization equalizing gas are disclosed, including high pressure gas containers coupled to the body to be pressure equalized via low pressure regulators.
In a principle embodiment of the invention, the pressurization port of the camera is attached to the second stage regulator of a diver's self- contained underwater breathing apparatus by a plug inserted in the apparatus mouth piece. The camera "breathes" through the regulator to maintain an internal pressure approximately equal to the ambient water pressure as the diver changes depth. Thus there is no limit to the depth at which the camera may operate except for the limitations of the diver.
In another embodiment of the invention, the breathing port of an underwater breathing apparatus is sealed by a membrane such as a common balloon and an underwater camera body is pneumatically connected to the sealed mouthpiece or breathing port whereby the camera body may "breathe" through the underwater breathing apparatus to maintain an internal pressure approximately equal to the ambient external pressure.
In another embodiment, a waterproof flexible container encloses a non- waterproof camera or piece of equipment. A pressure equalization means is attached to the container to maintain the pressure within equal to the surrounding ambient pressure. The container may include both rigid and flexible panels. The flexible panels are positioned to allow operation of the enclosed apparatus and the rigid sections provide protection and mounting means and an unobstructed space for operation of movable items such as automatic telephoto lenses.
DESCRIPTION OF THE DRAWINGS
FIG. 1 is a front view of a camera illustrating the pressurization and pressure relief valves.
FIG. 2 is bottom view of a camera illustrating the pressurization and relief valves.
FIG. 3 is a front view of an underwater camera with a collapsible, auxiliary air volume attached.
FIG. 4 is a side view of an underwater camera with a collapsible, auxiliary air volume apparatus attached. The dashed lines illustrate the collapsed configuration.
FIG. 5 is a front view of an underwater camera with a collapsible, auxiliary air volume apparatus attached illustrating in dash line the apparatus collapsed and rolled up.
FIG. 6 is a side view of an underwater camera with a collapsible, auxiliary air volume apparatus attached illustrating in dash line the apparatus collapsed and rolled up.
FIG. 7 illustrates an underwater camera with a pressurization equalization line attached to the low pressure, second stage regulator of a scuba apparatus.
FIG. 8 illustrates an underwater camera with a pressurization line connected to the low pressure output of the first stage regulator of a scuba system.
FIG. 9 illustrates an underwater camera with a pressure equalization line connected to a collapsible bladder located in a remote container.
FIG. 10 illustrates an underwater camera with a hollow hand grip containing a collapsible bladder.
FIG. 11 illustrates an embodiment of the basic invention which includes a pressure responsive pump for pressurizing the camera case.
FIG. 12 illustrates the use of a pair of pressure responsive pumps for pressurizing an equipment pressure hull.
FIG. 13 illustrates a rigid waterproof container for a video camera with flexible operation access panels, rigid means to provide space for lens operation and a pressure compensation port.
FIG. 14 illustrates an embodiment wherein a camera is contained in a waterproof, flexible container and a high pressure air source is coupled to the container via a pressure reduction regulator.
FIG. 15 illustrates an embodiment wherein a camera is contained in a waterproof, flexible container and a high pressure air source emergency breathing system is coupled to the container via a pressure reduction regulator.
FIGS. 16 through 18 are a stylized schematic illustration of a low pressure regulator of the type contemplated to provide an air source for a pressure equalized system whereby the pressure within the system is maintained at approximately ambient pressure.
FIG. 19 illustrates an embodiment of the invention where a camera is pneumatically coupled to the second stage regulator of an underwater breathing apparatus via a plug adaptor in the mouthpiece of the system's second stage regulator.
FIG. 20 is an exploded view of an underwater breathing apparatus second stage regulator mouthpiece adaptor plug for coupling the second stage regulator to the system to be pressure equalized.
FIG. 21 illustrates an embodiment of the invention where a camera is pneumatically coupled to the second stage regulator of an underwater breathing apparatus via a waterproof closure.
FIG. 22 illustrates an embodiment of the invention where a camera is pneumatically coupled to the second stage regulator of an underwater breathing apparatus via a tube inserted into the mouthpiece which is sealed by a covering.
FIG. 23 illustrates an adapter for providing a means to couple a pneumatic tube to a pressure hull.
FIG. 24 is a sectional view of the adapter illustrated in FIG. 23 taken along lines A--A.
FIG. 25 is a sectional view of the adapter illustrated in FIG. 23 taken alone lines A--A and showing an alternate, light impervious pneumatic passage.
FIG. 26 is a sectional view of an adapter similar to that illustrated in FIG. 24 but including a curved section.
DESCRIPTION OF THE INVENTION
FIG. 1 illustrates a typical underwater camera with the camera body or case 10 used as the pressurization hull. The case is modified by including a one-way, pressurization valve 11. This valve may be similar to a common tire valve and its purpose is to allow the camera case to be pressurized by a simple hand pump or compressed air source. A pressure relief valve 12 is included in the camera body to prevent over pressurization of the camera. The use of a pressure relief valve simplifies pressurization by allowing an operator to apply a compressed air source to pressurization inlet valve 11 until safety valve 12 opens. Cap 13 seals the pressurization inlet valve 11 during dive operations to prevent water from entering the camera body when the external pressure exceeds the internal pressure.
This system allows operation of the camera at greater than design depths. For instance, the Cannon Aqua Snappy has a body with an operating design depth of one atmosphere or approximately 33 feet. According to this embodiment of the invention, the camera may be pressurized to at least that value. Thus the pressure relief valve 12 is set to open at one atmosphere above ambient. The camera body is pressurized until the relief valve opens to ensure that the internal pressure is one atmosphere above ambient. A protective cap 13 is placed over the pressurization inlet port 11 and the camera is ready for underwater operations. When the camera is submerged to its normal design structural limit of 33 feet, the pressure within the camera equals the external pressure of one atmosphere greater than sea level so there is no stress on the camera body. The camera may safely be submerged an additional 33 feet which places the camera at its new maximum operating depth which is a real pressure of three atmospheres. However, because the camera was pressurized to one atmosphere above sea level ambient pressure, the differential pressure at 66 feet is only one atmosphere and the camera is within its operating range.
The safety pressure relief valve 12 may include a manual pressure relief valve 14. This valve allows an operator to manually release the camera pressure so that the camera body may be opened to change film. In a preferred embodiment, the manual pressure relief valve 14 is recessed and requires a small diameter rod for actuation to preclude inadvertent operation while the camera is submerged.
FIG. 2 is a bottom view of the embodiment discussed above.
FIG. 3 illustrates an alternate embodiment where a collapsible air container 20 is attached to air inlet port 11. In this embodiment, the one-way valve within air inlet port 11 is removed to allow the free exchange of pressure between the camera body 10 and auxiliary air container 20.
In a typical operation, air container 20 has a volume equal to the volume within the camera body. In this embodiment, pressure relief valve 12 is not necessary because the camera will never become over pressurized. As the camera is submerged, container 20 collapses to maintain the air pressure within the camera body 10 equal to the external water pressure. In the exemplary case, the container 20 has a volume equal to the interior of the camera case, when the camera has been submerged to a depth of 33 feet or one atmosphere, the container 20 is completely collapsed as illustrated by dashed lines in FIG. 4 and the differential pressure between the camera and the water is zero. The camera may now be submerged to a point where the differential pressure between the camera and the exterior equal the original design depth. If desired, container 20 may have a volume greater than the volume of the camera body to permit even deeper descents. For instance, if a Nikon Action Touch camera with a design depth of only 3 meters is fitted with a container 20 having an internal volume equal to four times the internal volume of the camera, the normally shallow water camera may be operated at depths as great as 140 feet.
The preceding operations are presented as being exemplary of a system which utilizes a camera body having a one-third atmosphere operating pressure differential. If the camera body strength is greater, the benefits of this invention are appropriately increased while if the operating differential pressures are less, the basic benefits of the system are likewise reduced.
Container 20 and attached camera body 10 may be pressurized throuqh one-way valve 21. This valve is similar to that utilized in the embodiment illustrated in FIG. 1 or it may be a ball inflation valve of the type requiring a hollow needle. In this embodiment, the pressure relief valve 12 is a desirable item to prevent over pressurization of the camera body. Air bag 20 is fabricated from a material which is reinforced in such a manner that it will readily collapse but will not significantly expand when pressurized.
Assuming a camera case 10 capable of withstanding a differential pressure of one atmosphere such as the Cannon Aqua Snappy, the container/camera body is pressurized to the pressure differential limits of the camera body. When the camera is submerged to a depth of 33 feet or one atmosphere, the differential pressure is Zero and the air bag 20 is on the verge of beginning to collapse. The camera may be submerged an additional 33 feet or to a total of 66 feet and upon reaching that depth, the air bag 20 has completely collapsed as illustrated by the dashed line representation 22 of FIG. 4 but the differential pressure which the camera body 10 is experiencing is still zero. The camera body may now be submerged an additional 33 feet to 99 feet (four atmospheres) where it experiences its maximum design depth limit differential of one atmosphere.
FIGS. 5 and 6 are front and side views of an embodiment illustrating an auxiliary air chamber 30 which includes a coiling means whereby the container rolls into a coil as it collapses. The inflated configuration of the air container is illustrated by solid lines 30 in the figures and the collapsed, rolled condition is illustrated by dashed lines 32. Container 30 may be used exactly as described for 5 container 20 illustrated in FIGS. 3 and 4.
FIG. 7 illustrates a still further embodiment of the invention. The camera body 10 is pneumatically coupled to the second stage regulator 40 of a self-contained underwater breathing apparatus. In the illustrated embodiment, a Nikon Action Touch camera having a design operating depth of 3 meters is modified by replacing the battery cap with a battery cap 43 having an air inlet port 41. The air inlet port may be similar to that illustrated in FIGS. 1 through 6 so that the camera may operate as illustrated in those embodiments. In the illustrated embodiment of FIG. 7, the air inlet port 41 is a hollow tube to which a heavy walled, small diameter neoprene tubing 42 is sealed to provide a pneumatic conduit to the second stage regulator 40. In preferred embodiments, the hollow tube of inlet port 41 is provided by an adapter similar to that illustrated in FIGS. 23 through 26.
The second stage regulator fitting includes a one-way valve 43 which protects the integrity of the breathing apparatus in the event of a malfunction of the camera or if the tube 42 is severed or torn loose. The one-way valve 43 allows air from the low pressure regulator 40 to pass through tubing 42 into the camera body but will prevent water from entering the regulator in the event that tube 42 is removed. The one-way valve is coupled to the second stage regulator 40 via a chamber 44 which may be filled with a desiccant 45 such as silica gel. The chamber is sealed to the second stage regulator and includes a termination inlet port 46 which contains a gas permeable vapor barrier 47. Air inlet port 66 is larger in diameter than the tubing to accommodate the greater surface area required to allow reasonable free passage of air from the second stage regulator into the conduit to the camera via the restriction of the gas permeable vapor barrier 47. This material will allow air to pass into the camera but prevent moisture from entering the system.
FIG. 8 is an alternate embodiment usable with pressure hulls having a design strength capable of withstanding a pressurization equal to the low pressure output of the first stage regulator of a scuba system. In this embodiment, air line 52 is connected to a low pressure outlet of the first stage regulator 50 in much the same fashion as used to connect buoyancy controlled devices or second stage regulators to the first stage regulator of a scuba system. A quick release fitting 51 is used so that the operator may disconnect the system in the event of a failure of the line 52, pressure relief valve 12 or camera to prevent the total loss of air through the resultant open low pressure outlet.
In the embodiments illustrated in FIGS. 7 and 8, the pressure relief valve 12 automatically depressurize the pressure hull as the camera is raised to the surface. If the embodiment illustrated in FIG. 7 is modified by removing the one-way safety valve 43, the camera will automatically depressurize through the second stage regulator and safety valve 12 is not required.
The embodiments illustrated in FIGS. 7 and 8 will allow a diver to take the camera to any depth that the diver can survive.
In the embodiment illustrated in FIG. 7, a shallow water camera, such as the Nikon Action Touch camera which has a design depth of only 3 meters, may be used with comparative safety at any depth to which the diver can survive because the differential pressure between the camera and the ambient water pressure will remain at zero.
FIG. 9 illustrates an embodiment which will allow a camera to be taken to depths equal to many times the design depth of the camera. It includes an air bladder 60 within a container 63 which may be strapped to the diver or the diver's apparatus. The air bladder may be large relative to the camera to permit operation at extreme depths. The air bladder 60 is coupled to the camera 10 via air line 62 and coupling 61 in a manner similar to that described for the embodiments illustrated in FIGS. 7 and 8. In the embodiment of FIG. 9, a pressure relief valve is not necessary because the camera will equalize on descent by the collapse of air bladder 60 and on ascent by the expansion of the air bladder.
FIG. 10 is a further adaptation of the embodiment illustrated in FIG. 9 where the container or bag 70 is shaped in the form of a hollow handle 73 that may be secured to the camera body by the tripod attachment means 74. In this embodiment, a short air line may be used to couple bladder 70 to the camera or the bladder may be fitted with a sports ball needle valve 75 positioned to engage a hollow needle valve 76 threaded into the body of the camera. In the embodiment illustrated in FIG. 10, the battery cap 77 of the camera may be modified by boring a hole therethrough and tapping a 5/16-32 thread therein. The sports ball needle valve 76 may be threaded into the modified battery cap so that air bladder 70 will be connected directly to the camera through needle 76 by valve 75. The tripod retaining screw 78 holds the assembly securely to the base of the camera body 10 and bladder 70 is secured to the interior of the handle in the vicinity of valve 75 so that the bladder will not pull free from the valve needle 76 in the event that the camera is held underwater with the handle in the up position while the bladder is partially collapsed.
FIG. 11 illustrates an embodiment of the invention which uses a free piston pump 80 to pressurize the camera. The pump cylinder is pneumatically coupled to the air inlet of the camera body 81. The other end 84 of cylinder 80 is open to the ambient environment and a free piston 82 provides a movable gas tight seal within the cylinder. In operation, the free piston 82 is positioned at the end 89 of the cylindrical chamber 83 to provide a maximum volume between the upper surface of free piston 82 and the inlet port 81. The piston may be manually pushed into the extreme lower position by a rod or light spring 84 or simply by adding air pressure to the outlet port 85 which couples the pump to the camera inlet port 81. With the free piston 82 in the extreme down position, the pump 80 is secured to the air inlet port 81 of the camera body 10. As the assembly is submerged, external water pressure forces the free piston 82 towards the camera body, forcing air into the pressure vessel to equalize the pressure between the camera and ambient external water pressure. As the assembly ascends, the ambient pressure around the assembly is less than the pressure within the camera body so the pressure in the camera body forces the free piston 82 back down the cylinder 83 of the pump 80 The pressure is equalized within the camera body as the camera descends or ascends by movement of free piston 32. In a preferred application of this embodiment, pump 80 is configured to function as a handle.
The free piston 82 is illustrated sectioned on a plane parallel to and passing through the vertical axis to illustrate the compression "O" ring 86, the stabilizing "O" ring 87, and inner ring pressure equalization bore 88.
To increase the operational depth of the assembly, a second pump 90 may be attached as a second hand hold for the camera. The second pump 90 functions identically to the first. It may be provided with an independent portal into the camera body 10 or connected via a T connector 96 to the basic camera inlet port 81.
The cylinders 83 and 93 may be fabricated from any suitable material such as brass or steel but preferably they are fabricated from a transparent plastic so the diver may use the scale 99 as an alternate depth gauge, determine if the piston seals are leaking and ascertain when the maximum equalization depth has been reached.
FIG. 13 illustrates a television camera within a combined flexible/rigid waterproof container 110. This system includes a flexible container 114 and a rigid optical window section 115 which allows the automatic operation of a zoom lens 125. A soft flexible panel 116 is positioned in the harder flexible container 114 over the control panel 126 to permit free operation of all controls. A second optical window 117 is located in front of the monitor/view system 127 to allow the operator to aim the system and review the tape. Pressure equalization port 109 provides a means for connecting the container to any pressure equalization source. A clamp 128 seals the opening through which the camera is inserted and removed.
FIG. 14 is another example of a flexible waterproof container 100 adapted to enclose a system such as a camera to provide a waterproof housing which will allow the protected apparatus to be immersed. The waterproof housing or flexible container 100 completely encloses the exemplary apparatus 10, which is as a camera. The flexible container 100 may be optically clear whereby the camera may expose film through the side of the container. Alternately, a lens, 101 may be positioned opposite the lens opening of the camera. A pressurization port 11 provides a means for coupling a gas source to the flexible container 100. A pressure relief port 12 may be included to prevent over pressurization of the system in the event of a failure of the pressurization means and an optional, manual pressure relief valve 14 can be included for other emergencies.
Pressurization of the container 100 of FIG. 14 is achieved by a system including a high pressure gas source 130 which may be a typical CO. sub.2 cartridge. The CO.sub.2 cartridge is coupled via an adaptive fitting 140 to the input 122 of a low pressure regulator 120. The low pressure regulator includes an outlet port 121 which is pneumatically coupled to the pressurization port 110 of container 100. A pressure relief port 123 is incorporated in the low pressure regulator 120 so that the system may "breathe". Thus as the system is submerged, high pressure gas from the CO. sub.2 container 130 or similar gas source is reduced to ambient pressure by regulator 120. The ambient pressure is coupled to the interior of the container 100 or, in alternate embodiments, directly to the pressurized hull of a waterproof system. As the system is raised towards the surface, excess pressure within the container exit through the pressure relief valve 123.
An adaptation of the FIG. 14 embodiment is illustrated in FIG. 15. It uses an emergency breathing apparatus 131 in place of the CO.sub. 2 cartridge 130 and regulator 120. The "SPARE AIR" system, produced by Submersible Systems, Inc. is typical of the many emergency breathing systems that may be employed as a gas source in this adaptation. Emergency breathing devices of this type usually have a regulator rigidly attached to an air supply tank.
FIGS. 16 through 18 illustrate graphically and in more detail the actual operation of a typical low pressure regulator. In such systems, the regulator 120 is fabricated from a rigid housing and includes a flexible diaphragm 124. One side of the flexible diaphragm is exposed to ambient pressure and the other side to pressure chamber 126 within the regulator. The housing of the regulator is sealed to create the pressure chamber 126, with three controlled ports; a gas inlet port 122, a pressure relief valve 123, and an outlet port 121. Outlet port 121 is equivalent to the mouthpiece outlet in a scuba system second stage regulator. It is fundamental to this invention that the outlet port be sealed. With the port sealed by a means such as plug 127, the pressure within chamber 126 tracks the ambient exterior pressure as explained in the following paragraph. Thus when a waterproof camera or other pressure hull is pneumatically coupled to chamber 126, the pressure within the camera or hull is kept approximately equal to ambient external pressure.
When the system is in a quiescent condition, diaphragm 120 is in a neutral state and the lever operated valve 125 closes off the high pressure inlet 122, see FIG. 16. In FIG. 17, the regulator 120 is subjected to an increased relative external pressure which causes diaphragm 124 to be flexed into the regulator pressure chamber 126. This moves lever valve 125 to open the high pressure inlet port 122 to admit high pressure gas into the regulator pressure chamber 126 and out through the breathing output port 121. As soon as the pressure within the regulator 120 and anything attached to the outlet port 121 reaches ambient pressure, the diaphragm 124 returns to the position illustrated in FIG. 16 to close off the high pressure port 122. When the external relative pressure is decreased, as when the system is raised towards the surface with outlet port 121 sealed or if a user exhales into the outlet port 121 which is the mouthpiece of the regulator is being used as a second stage regulator in a self-contained underwater breathing apparatus, diaphragm 124 flexes outward slightly as illustrated in FIG. 18 and pressure relief valve 123 opens to allow the interior of the regulator 120 and any system coupled to the regulator output port 121 to reach ambient pressure. As soon as ambient pressure is established within the regulator and attached system, the pressure relief valve 123 closes.
In FIG. 19, a low pressure regulator, the second stage regulator 150 includes a pressurized gas input coupling 152 which is connected via a low pressure line to a low pressure output port of the high pressure regulator of the scuba system in much the same way as air line 52 is coupled to the low pressure output port of the first stage regulator in FIG. 8. The exhaust port 153 functions as a pressure relief valve in exactly the same way as illustrated for exhaust valve 123 in FIGS. 16 through 18 and the mouthpiece 15I and its air passage 154 is identical to the outlet port 121. A plug 146 completely closes off the air outlet 154 of mouthpiece 151 so that a chamber within the regulator will track the external ambient pressure as explained with respect to FIGS. 16 through 18. Plug 146 also provides a means for pneumatically coupling, via a plastic tube 145, the chamber within regulator 150 and the inlet or pressure compensation port 41 of the camera 10.
A safety pressure relief valve 12 may be used to prevent over pressurization of the system in the event of free flowing of the second stage regulator 150. Thus if the second stage regulator fails and begins to free flow and the exhaust port 153 fails to open, the camera system will be protected and excess gas pressure will escape through the relief valve 12 as opposed to blowing out the seals of the system or plug 146 from the mouthpiece 151.
FIG. 20 is an exploded view of plug 146 and mouthpiece 151 of FIG. 19. The illustrated plug is similar to the plug disclosed in U.S. Pat. No. 4, 079,735, but it is modified to include a small bore 147 along the longitudinal axis. This bore allows the adapter needle 148 to pass through the plug and provide an air passage into the mouthpiece outlet 154 and chamber within the regulator. Adapter needle 148 is part of a standard sports ball needle valve inflation needle 149 fitted with a special barb 144 that threads into a threaded bore 180 in an adapter such as a modified tire valve cover 181 which is screwed onto the needle valve inflator 149 and bored and tapped to provide the coupling means for the barb 144 which secures a plastic tube.
In FIGS. 19 and 20, plug 146 is adapted to fit within the mouthpiece of 151 of a standard demand type second stage air pressure regulator which function as schematically illustrated in FIGS. 16 through 18. Regulator 150 receives air at typically 100 to 160 PSI and supplies it at ambient pressure upon demand through the mouthpiece opening 154 when a diver reduces pressure by inhaling through the mouthpiece. Mouthpiece 151 is semi-cylindrical with a mouth engaging surface 170 which, in use, rests against the outside of the lips of the user who holds the mouthpiece in his teeth by clamping them on spacers 173 and 174 which support flanges 171 and 172.
The mouthpiece plug 146 is oval in the end region 175 and tapers slightly, being of smallest cross section at the end. It is dimensioned to fit into a standard mouthpiece opening 154. A first and second pair of locking arms 176 and 177, on opposite sides of the plug, are adapted, when engaged with mouthpiece 151, to fit under flanges 172 and 172 to secure the plug in a sealing engagement with the mouthpiece. In this way, not only is mouthpiece plug 146 locked into position with tapered end 175 in opening 154 and thereby closing it off.
An opening 178 in an opposite end region to that of the tapered end region 175 is dimensioned to receive typical needle valve inflation adapter 146 such as is used to inflate sports balls. A small diameter bore 147 passes longitudinally through the tapered region of the plug 175 so that the needle 148 of the needle valve inflation adapter 149 may be inserted through the plug with its end entering the mouthpiece bore 154 and chamber of the regulator. In the illustrated embodiment, a barb 144 receives and securely holds a hose member such as the plastic tube 42 of FIG. 19. In a preferred embodiment, barbed coupling 144 is an off the self item having a 10/32 threaded end which is screwed into a threaded bore 180 in the top of a standard, high pressure tire valve cover 181. The valve cover 181 is screwed onto the needle valve inflator 149 to provide a gas tight seal.
An alternate means for sealing the air passage, 154 of the mouthpiece is with a cover such as cover 183 illustrated in FIG. 21. This cover is fabricated from a gas impervious material such as plastic or rubber The cover opening 186 which is secured about the tubular section 187 of the mouthpiece which couples the lip engaging portion of the mouthpiece to the second stage regulator 150. The opening of the cover may be secured by a variety of mechanical devices but in a preferred embodiment, the opening includes a resilient band which creates an elastic opening having a diameter smaller than tube 187. The cover is placed over the mouthpiece by stretching opening 186 over the flanges and allowing it to restrict about the mouthpiece tube 187 to seal the mouthpiece opening and second stage regulator chamber. The effects of the cover may be visualized by referring to FIGS 16 through 18. In these figures, the cover replaces plug 127 to seal opening 121 so that chamber 126 is maintained at a pressure approximately equal to the ambient pressure by the breathing action created by diaphragm 124 and the associated valve 125 coupled with the ambient pressure responsive exhaust valve 123.
In FIG. 21, a needle valve 182 is provided in the cover so that a hollow needle 148 may be inserted into the cavity created by the cover to permit camera 10 to be pneumatically coupled to the chamber within the second stage regulator. Thus the camera will breathe through the second stage regulator. That is, when the camera and second stage regulator are subjected to an increased pressure, the second stage regulator will allow gas from a higher pressure source to enter the second stage regulator chamber as illustrated in FIG. 17. The hollow needle 148 passing through needle valve 182 allows the increased pressure within the chamber to be transmitted through tubing 42 to the camera 10. As the camera and second stage regulator are raised to a shallower depth, the reduction in ambient pressure causes exhaust valve 123 of FIG. 18 to open and reduce the pressure within the second stage regulator chamber. The reduction of the pressure within this chamber is reflected by a reduction of pressure within the camera due to the pneumatic coupling through the hollow needle 148.
FIG. 22 illustrates the best mode of practicing the invention. In this mode, a cover 184 seals the mouthpiece 151 to provide an operation of the second stage regulator exactly as described for FIGS. 16 through 21. The primary distinction in this embodiment is the way in which the air passage through the mouthpiece is sealed. In FIG. 22, the cover 184 does not contain a needle valve or any other means to allow the camera to be connected to the chamber within the second stage regulator. In this embodiment, the cover 184 is a simple balloon whose mouth is stretched over the flanges of the mouthpiece and allowed to snap about the mouthpiece tube connected to the second stage regulator. This creates a seal similar to the elastic seals suggested for the embodiment illustrated in FIG. 21. The invention is perfected in the embodiment by creating a small hole, 185 in the mouthpiece tube by forcing a darning needle or similar device through a side wall of the mouthpiece connecting tube. For all practical purposes, this small diameter hole through the mouthpiece connecting tube seals when the mouthpiece is used for its normal purpose of allowing a diver to breathe through the apparatus. However, it allows the insertion of a hollow needle 148 and thereby functions similar to needle valve 182 of FIG. 21.
In the preferred embodiment of FIG. 22, extended depth operation of an underwater apparatus is achieved through the method of sealing the mouthpiece of a second stage scuba regulator with a balloon or any convenient means such as a plug, tape or any other apparatus capable of performing a sealing function. A hollow needle is connected via a pneumatic coupling to the pressure hull, which is a camera in the illustration. A hole is formed in the side wall of the mouthpiece tube and the needle is inserted therethrough. Once the needle is inserted through the side wall of the mouthpiece tube, the pressure within the pressure hull is maintained at approximately the ambient pressure through the pressure demand functions of the second stage regulator. That is, when the second stage regulator and pressure hull are submerged to an increased depth, the resultant increased pressure causes the second stage regulator's chamber to undergo an increasing pressure from a higher pressure source via inlet tube 152. Thus the pressure within the pressure hull is increased as it tracks the pressure within the second stage regulator chamber. When the pressure hull and second stage regulator are raised to a shallower depth, the reduced ambient pressure causes the exhaust valve of the second stage regulator to vent until the pressure within the second stage regulator chamber and the pressure hull match ambient pressure.
The pressurization or pressure equalization ports 41 or 61 illustrated in the various figures in this patent are provided by an adapter similar to those illustrated in FIGS. 23 through 26. The adapter includes a coupling section 210 which is dimensioned to fit within the pneumatic coupling tube 42. The exterior surface of the coupling section may include a section of increased diameter of a smoothly rounded surface or an angular surface such as the barbs 211 illustrated in FIGS. 23 through 26. The purpose of the enlarged radius section 211 is to improve mechanical and pneumatic security between the adapter and pneumatic tube. A clamp may be provided to increase the mechanical and pneumatic security but under most circumstances, the barbed embodiment provides an adequate means to prevent the pneumatic tube 42 from being pulled free of the adapter. The coupling section 210 is connected to a threaded section 213 by a transition section 222. A flange 214 is provided at the end of the adapter opposite the coupling section. The flange provides a stop so that the adapter may be secured to a pressure hull by inserting it through an appropriately dimensioned hole and threading a nut on the threaded section 213.
The adapter is used by barring a hole of adequate size through the wall of the pressure hull or camera body 215. The adapter is pushed through the hole from inside of the pressure hull and nut 218 is threaded onto the threaded portion 213 to clamp the pressure hull wall 215 between the backing flange 214 and the nut 218. An O-ring, grommet or similar sealing device 216 may be placed between the pressure hull wall 215 and a washer 217 to provide the required pneumatic seal. The nut 218, washer 217, sealing ring 216, and pressure hull wall 215 are illustrated as cutaway in FIG. 23 to more clearly portray the adapter.
In the basic embodiment, a bore 220 of FIG. 24 is provided through the center of the adapter to complete a pneumatic passage from the coupling tube 42 to the interior of the pressure hull. If the pressure hull is a camera, a tortuous passaqe, 221 of FIG. 25, is preferred. It provides a non-direct pneumatic path through the adapter to preclude the possibility of light entering the camera body through the pneumatic passage and ruining film. To further minimize the possibility of light entering the camera through the adapter, the inside of the passage may be provided with a non-reflective finish or coating which may also be light absorptive. A further embodiment is illustrated in FIG. 26 where section 222 coupling the tubular connecting end 210 of the adapter to the threaded portion 213 is bent at an angle so that the pneumatic coupling tube may lie at a more desirable angle relative to the pressure hull wall and further, if a camera body is the pressure hull, the curve in the pneumatic passage 223 will prevent light from entering the camera body, especially if the interior wall of passag 223 is treated with a non- reflective, light absorptive coating or texture. In FIG. 25, a resilient sealing material 224 is coated on the portion of the flange 214 and threaded portion 213 which abuts the pressure hull to effect a gas tight seal when the adapter is installed.
While preferred embodiments of this invention have been illustrated and described, variations and modifications may be apparent to those skilled in the art. Therefore, I do not wish to be limited thereto and ask that the scope and breadth of this invention be determined from the claims which follow rather than the above description. | |
BACKGROUND OF THE INVENTION
1. Field of the Invention
This invention relates broadly to apparatus and methods for making visual recordings of submarine objects. More particularly, it concerns improvements in such apparatus and methods that inform the system when an submarine object is in the camera's field of view and that its distance to the object is suitable for in-focus recording.
2. Description of the Prior Art
A great number of underwater visual recordings are made with photographic or video cameras which have limited remote controls. This is particularly true of deep-sea camera systems where camera lens opening and focus are preset and the photographer must somehow arrange for the subject to be at the correct distance and within the field of view at the time of exposure.
One approach to providing better control in submarine photography would be to incorporate the ranging features of advanced, above the surface cameras. Such cameras use a variety of techniques to obtain proper exposure conditions for control. The most common is a triangulation arrangement which superimposes the images received by a pair of space optical receives and provides automatic, mechanical adjustment of the lens until the received images are coincident. Microelectronics are used to perform the image comparison and thereby provide automatic focusing (see U.S. Pat. Nos. 3,435,744 and 4,313,654).
Other advanced surface cameras use microprocessor based optical- image analyzers to determine correct focus. Also, sonar systems are used in some cameras.
The optical systems of the surface cameras generally use infrared light beams with reflected light intensity, image analysis and triangulation. Unfortunately, the devices and techniques developed for surface cameras are not directly transferable to submarine camera systems. Differences between the physical properties of air and water result in major differences in the propagation of light and sound in the two media. Additionally, spurious material and signals can cause many "false" exposures to occur with submarine photography while this is not a serious consideration in use of surface cameras. Therefore, a camera system which depends on the propagation of energy waves for operation must be designed for the medium in which it is to be used.
Extensive development work has occurred relative to submarine photography, e.g., see "Underwater Photography--Scientific and Engineering Applications", compiled by Paul Ferris Smith, Van Nostrand Reinhold Company, 422 p., 1984. Such work has included use of (a) optical triggering of underwater cameras, e.g., see U.S. Pat. No. 3,446, 555 and pp. 223-228, "Deep Sea Photography", J. B. Hersey, Editor, The Johns Hopkins Press, 1967, and (b) sonar techniques, e.g., see U.S. Pat. Nos. 4, 105,990; 4,335,944; 4,381,144, 4,447,896 and copending U.S. patent application Ser. No. 842,139, filed Mar. 21, 1986.
Notwithstanding the extensive prior work and developments with surface and submarine camera systems, substantial improvements are needed for the submarine systems, e.g., to provide for (1) more efficient use of battery or other power, (2) saving of film, (3) mitigation of triggering of exposure by spurious materials or events and (4) the acquisition of consistently properly focused recordings.
OBJECTS
A principal object of the invention is the provision of improved apparatus and methods for submarine visual recording.
Further objects include the provision of:
1. Improvements in such apparatus and methods that inform the system when a submarine object is in the camera's field of view and that the distance to the subject is suitable for in-focus photography.
2. Relatively simple, radiant energy triangulation systems which accommodate existing photographic or video cameras.
3. Such camera systems that can verify that the camera to object distance is within the camera's depth of field.
Other objects and further scope of applicability of the present invention will become apparent from the detailed description given hereinafter; it should be understood, however, that the detailed description, while indicating preferred embodiments of the invention, is given by way of illustration only, since various changes and modifications within the spirit and scope of the invention will become apparent to those skilled in the art from this detailed description.
SUMMARY OF THE INVENTION
The objects are accomplished, in part, in accordance with the invention by the provision of an underwater visual recording system capable of making consistently in-focus visual records of submarine objects which comprises a camera including lens means having a predetermined depth of field, a first laser structured to emit a beam of coherent light of a first wavelength range, e.g., red, a second laser structured to emit a beam of coherent light of a second wavelength range different from the first wavelength range, e.g. green, and means supporting the first laser spaced apart from the second laser with the camera therebetween so that the beams project forward of the camera and cross one another within the depth of field.
In preferred recording system of the invention, the first and second wavelength ranges are within the range visible to the human eye and a power source is connected by electrical conductor means and electrical control means to the lasers to energize them thereby to emit such light.
The control means comprises a pressure-sensitive switch to prevent the power source from energizing the lasers until the system is immersed to a predetermined depth in water and a trigger switch to control energizing of the lasers.
Additionally, the system includes a strobe light to illuminate space forward of the camera which at least includes the space where the laser beams cross.
The objects are further accomplished by the provision of a laser device for use in submarine service which comprises a laser unit including a portion through which the unit emits coherent light coaxially with the longitudinal axis of the unit, a waterproof pressure housing encloses the laser unit, a window is in one end of the housing through which light emitted by the laser unit can exit the housing and there is electrical conduit means for supplying power from an outside source to the laser unit plus a normally open pressure switch which permits flow of the power from the conduit to the laser unit only when the device is immersed to at least a predetermined depth in water.
The method of use of the new recording systems of the invention involves moving the supported lasers and camera toward a submarine object until the laser beams at their point of intersection coincide with the submarine object, and thereafter operating the camera to make a recording of the object. In preferred methods, where the laser positioned to the right of said camera emits green light and the second laser positioned to the left of said camera emits red light, the supported lasers and camera are moved toward the object when the red light beam appears to the right of said object and back from the object when the green light beam appears to the right of the object.
BRIEF DESCRIPTION OF THE DRAWINGS
A more complete understanding of the invention may be had by reference to the accompanying drawings in which:
FIG. 1 is a perspective view of a two color laser containing submarine visual recording system of the invention.
FIG. 2 is a sectional view of a laser unit used as a component of the system of FIG. 1.
FIG. 3 is functional block diagram of the electrical components of the recording system of FIG. 1.
DESCRIPTION OF THE PREFERRED EMBODIMENTS
Referring in detail to the drawings, in which identical parts are identically marked, the invention comprises an underwater visual recording system 2 capable of making consistently in-focus visual records of benthic or other submarine objects which comprises a camera 4 including lens means 6 having a predetermined depth-of-field.
A first laser 8 structured to emit a beam 10 of coherent green light and a second laser 12 structured to emit a beam of coherent red light are mounted by support means 14 spaced apart with the camera 14 therebetween so that the beams 12 and 14 project forward of the camera and cross one another within the depth of field of the camera defined by its minimum in- focus distance 16 and maximum in-focus distance 18. A power source 20 is connected by electrical conductor means 22 and electrical control means 24 to the lasers 8 and 12 to energize them thereby to emit light.
The system 2 additionally includes a strobe light 26 powered by source 28 via conductor means 30 to illuminate space forward of the camera which at least includes the point 32 where beams 10 and 14 cross.
The conductor means 22 includes power line 32 from power source 20, trigger line 34 to strobe 26, power and trigger line 36 to the camera 4, trigger line 38 from trigger switch 40 to the master laser 8 and power line 42 from the master laser 8 to slave laser 12.
The electrical control means 24 in each laser unit 8 and 12 are essentially identical and includes a pressure-sensitive switch 44 that prevents the power source 20 from energizing the lasers 8 and 12 until the system 2 is immersed to a predetermined depth in water.
Control means 24 further includes the trigger switch 40 to control energizing of the lasers 8 and 12 via non-retriggerable one-shot integrate circuit 46, opto-electronic couplers 48 and turn then through a power switch 50 in series with the pressure-sensitive switch. The couplers 48 also serve to connect the trigger generate 52 strobe 26 via line 34 and camera 4 via line 36 to the control of the system by the trigger switch 40.
The circuit 46 serves to ignore contact bounce or inadvertent retriggering signals for a period of time, e.g., one second. With normal operation of the lasers 8 and 12, the coupler 48 ensures that the trigger lines 34 and 36 are not connected into the power system.
The laser unit 8 includes a front portion 54 through which the unit emits coherent light coaxially with the longitudinal axis of the unit, a waterproof tubular pressure housing 56 enclosing the laser 58 and a window 60 in the front portion 54 of the housing through which light emitted by the laser 58 can exit the housing 56. The housing 56 also contains the electrical control means 24 in the form of printed circuit board and a foam cushion 62. The removable end cap 64 serves as a mounting base for the control means 24, the pressure switch 44 and the conductor means 22. Standard O-rings are used for sealing of the laser units.
The laser unit 12 is a substantial duplicate of laser unit 8, except that the emitted light will be a different and easily identifible color, e.g., green vs red. They typically will be 20" long by 2" diameter and will have a starting voltage of 10 KV, input power of 23-33 V d.c. at 0.6 A, an output power of 2mW minimum producing, in red beam embodiment, a laser beam of wavelength 632.8 nm. having a bandwidth less than 0.1 nm. with a beam diameter of 0.7 mm and a divergence of 1.2 m radian (full angle), e.g. the beam is 0.05" at window 60, 0.10" at 5 ft, 0.15" at 10 ft and 0.20" at 15 ft with an effective range up to 20 ft depending on water clarity and observation system sensitivity. In the green beam embodiment, the laser beam typically will have wavelength 543. 5 nm. having a bandwidth less than 0.1 nm. with a beam diameter of 0.5 mm and a divergence of 1.6 m radian (full angle).
The beams 10 and 14 are visible in daylight or in the presence of floodlights.
The housing 56 is typically 25" long by 3' diameter, weight in air 5.5 lbs (in water 0.5 lbs) made of 6061-T6 aluminum with plastic hardware and is capable of operating at depths up to 3,000 ft. or even deeper with increase housing wall thickness. Pressure switch 44 will typically be structured to enable input power at a depth of 20 ft. or greater.
In the absence of the laser trigger 40, the lasers 8 and 12 are on during operation of the system 2, providing input power 20 is available and the safety interlock 44 is enabled. The power input to the second laser (slave) unit 12 is connected in parallel with power input to the laser unit 8 so that both are gated off and on simultaneously.
A typical trigger output 52 to the camera and strobe will be a solid- state, power-FET switch closure with automatic transfer to the laser trigger, in the event of power failure.
Typically in the new recording systems 2 the camera 4 will be a film recording camera or a video camera. The method of claim 14 wherein the first laser is positioned to the right of the camera and emits green light and the second laser is positioned to the left of the camera and emits red light.
In the methods of use of the new systems 2, lasers 8 and 12 and camera 4 are moved toward the object when the red light beam 14 appears to the right of the object 66 are moved back from the object 66 when the green light beam appears to the right of the object.
For still-photographic applications of the systems 2, it is advantageous to briefly turn off the lasers 8 and 12 so the photograph will not be contaminated. Thus, application of a trigger signal from switch 40 will turn the lasers off for 2 to 3 seconds, during which time a camera trigger signal is generated. | |
# Collectible miniatures game
Collectible miniatures games (CMGs) are a form of miniatures game that is also similar to collectible card games (CCGs) — the primary difference being that while CCGs are card-based games, CMGs feature miniature figures.
A popular theme for CMGs are strategy wargames, since games of that genre typically feature miniatures such as: soldiers, vehicles, etc. Miniature wargames have been around for a long time, but the idea of a collectible miniature wargame is recent. In a conventional miniature game, players purchase the miniatures they want and generally invest time in assembling, painting, and often customizing the figures to their liking. CMGs were designed to appeal to those who would enjoy the game aspect but not necessarily the hobby aspect of miniature gaming.
CMGs tend to cover a more diverse range of topics than traditional wargames (which generally are fantasy, sci-fi, or historical in theme), and certain games, such as Dreamblade are even somewhat abstract in nature.
Due to the random distribution of figures when purchasing CMG products, a large secondary market has sprung up selling single miniatures, as well as websites that allow players to trade spare figures.
Perhaps the most popular and well-known CMG to date is HeroClix, which allows players to create battles between characters from the Marvel and DC Comics comic book universes, as well as certain smaller publishers. Other popular CMGs include Dungeons & Dragons Miniatures Game, Halo ActionClix, HorrorClix, Monsterpocalypse, Pokémon Trading Figure Game, and Star Wars Miniatures. | https://en.wikipedia.org/wiki/Collectible_miniatures_game |
Across cultures, speakers produce iconic gestures, which add - through the movement of the speakers' hands - a pictorial dimension to the speakers' message. These gestures capture not only the motor content but also the visuospatial content of the message. Here, we provide first evidence for a direct link between the representation of perceptual information and the motor system that can account for these observations. Across four experiments, participants' hand movements captured both shapes that were directly perceived, and shapes that were only implicitly activated by unrelated semantic judgments of object words. These results were obtained even though the objects were not associated with any motor behaviors that would match the gestures the participants had to produce. Moreover, implied shape affected not only gesture selection processes but also their actual execution - as measured by the shape of hand motion through space - revealing intimate links between implied shape representation and motor output. The results are discussed in terms of ideomotor theories of action and perception, and provide one avenue for explaining the ubiquitous phenomenon of iconic gestures. | https://abdn.pure.elsevier.com/en/publications/gesturing-meaning-non-action-words-activate-the-motor-system |
Interest rates hover near the best levels since September, despite several good economic readings reported. Let’s discuss what happened and see what is coming next week.
“Hey, alright now And don’t it feel good” – Walking on Sunshine by Katrina and the Waves
Economy Grew to Finish 2022
Gross Domestic Product, a measure of economic growth, for the Fourth Quarter 2022 showed the economy expanded at a 2.9% annual rate, down slightly from the 3.2% rate in the Third Quarter 2022. Seeing the economy grow in the back half of 2022 after negative growth in the first half of 2022 is good news.
This positive reading elevates the chance of a “soft landing” by the Fed, where they hike rates to slow inflation but do not slip us into a recession.
Unemployment Line is Historically Short
Initial Jobless Claims for December came in at 186,000…the lowest reading in 9 months. This is also good news as it tells us the length of the unemployment line. If the amount of people signing up for first time unemployment benefits remains near historical lows, it further lowers the chance of a recession. Moreover, it highlights the continued strength in the labor market, and this is paramount as jobs buy homes. Yes, we want interest rates to move lower but if someone doesn’t have a job or is in fear of losing their job, they can’t commit to a home purchase. Let’s hope the labor market remains strong as the Fed continues to hike rates to slow demand and lower inflation.
New Home Construction Costs Coming Down
The National Association of Homebuilders reported that building materials costs, less energy, are up 8.3% which is a big increase annually. However, the price growth is down a staggering 60% as input costs increased over 16% in 2021.
We should expect input cost growth to slow further in response to slower demand and further reopening of supply chains. This is another positive theme as we move through 2023.
Smaller Fed Rate Hike Still Priced In
One of the headwinds to the economy is the threat of higher short-term rates by the Federal Reserve. The good news there? After four consecutive .75% rate hikes, followed by a .50% hike in December, the financial markets are fully pricing in a smaller .25% hike at next week’s Fed Meeting.
The markets also believe the Fed will raise rates by another .25% in March and then pause to allow all the hikes that date back to last summer to seep into the economy.
This means the Terminal Rate, or the fancy way of saying the peak in the Fed Funds Rate, is going to be in a range of 4.75- 5.00%. From there we will have to continue to watch the standoff between the Fed who says they want to keep rates higher for longer. Additionally, with no rate cuts this year versus the financial markets, which are starting to “price in” as many as two rate cuts later this year.
Bottom line: The economy is showing mixed signals, but the labor market remains strong, and we are nearing the end of Fed rate hikes. So, the plan to land the U.S. economy softly and avoid a deep recession remains very much in play. That is good news for housing and the economy.
Looking Ahead
Next week is Fed week. As of this moment, the markets fully expect the Fed to raise rates by .25%. Anything other than that would be a surprise and generate a lot of market volatility. The Fed generally looks to avoid sending the market mixed signals but the markets will be on edge.
Have you experienced property damage due to the 2022/2023 Winter Storms?
A federal emergency declaration has been proclaimed by President Biden and financial assistance may be forthcoming. While the federal government has not yet declared a disaster (a different designation that provides different resources) for California that could authorize direct financial assistance to affected residents.
Placer County requests those who have suffered damage to report it HERE.
If the issue is life threatening please dial 911. The intention of the survey is to allow the reporting of non-emergency issues during periods when the Emergency Operation Center is active. Your answers to the brief survey will help better document the extent of damage these storms have caused, so Placer County can continue to advocate for all available support for impacted residents.
With more weather still in the forecast, please use the Ready Placer Dashboard for the latest on road and weather hazards and to access resources to help protect your family and property.
Breaking News: CPI Report at 6.5%
The Consumer Price Index (CPI) measures the monthly change in prices paid by U.S. consumers. The U.S. Bureau of Labor Statistics (BLS) calculates the CPIas a weighted average of prices for a basket of goods and services representative of aggregate U.S. consumer spending.
January’s CPI (consumer price index) inflation data was released this morning and came in right at expectations of 6.5%. This is good news as it’s notably lower than December’s reading of 7.1%, and CPI inflation has now moved lower for 6 consecutive months, with the last 3 CPI reports being the real catalyst in mortgage rates lower. While this 6.5% CPI figure remains notably higher than the Fed’s target of 2% inflation, today’s report was still good news in the context of how inflation/mortgage rate are recovering from the distortion created by the Fed’s red line full throttle bond purchase program during Covid, and all supply chain related Covid issues which are mostly in the rear view mirror. Here’s some context to share with clients and what it all means for mortgage rates.
We’re currently in this interesting window of time where it’s valuable for real estate investors to understand that increases to the Fed Funds rate does NOT mean mortgage rates increase. Sometimes reiterating the mechanics of what determines mortgage rates (bond prices, which have move significant been determine by 2 things in the past few years: the Fed’s bond purchase program and inflation) can instigate the question of; “why does it matter if the Fed hiking the Fed Funds rate isn’t what drives mortgage rates higher, it seem they’re usually moving in the same direction?”, in other words – does it really matter if it’s correlation or causation?
Answer: yes – very much so, and the current market is precisely why it’s so important to clearly communicate the differences & mechanics for clients. As of November, we are now in a phase where the Fed will continue to hike the Fed Funds rate, while mortgage rates are moving lower. This is key for those looking to capitalize on a real estate opportunity before mass market sentiment pendulums back.
Here’s what’s going on with inflation mortgage rates: CPI, a primary measure of inflation, had peaked at 9.1% this past summer. The Fed hikes the Fed Funds rates (short term consumer debts) to fight this inflation. The November & December CPI reports both came in notably lower/better than the market expectation, this benefited bond prices, and therefore mortgage rates. Since mid-November we’ve been talking about how; unless we got surprisingly bad news on inflation in the months ahead, it looks like mortgage rates peaked that first week in November. Today’s CPI data coming in right at expectations further reinforces this trend. To put into perspective, the 10 yr Treasury, which is what Jumbo mortgage rates follow, hit ~4.35% that last week of October, then had it’s best day of the year the same day the November CPI report came in lower than expectations, then again moved another leg lower after the December CPI data, and is settled in today at ~3.4%. This is significant good news as we all know higher mortgage rates are part of the downward pressure on real estate prices, and vice versa.
We’re still seeing Jumbo rates today a bit lower than conforming, and the larger loan amounts actually pricing the best. For example today, a ~$2.0M purchase with 20% down, can get a 30 yr fix in the 5%’s with no points, and as low as ~5.25% with a little over a point. This is a historically healthy place for mortgage rates to be.
In sum, the headlines will soon again talk about rates moving higher when the Fed increases the Fed Funds rate again, which is coming, and meanwhile mortgage rates have already come down to a healthy level.
Your Guideline to Short-Term Rental in Lake Tahoe
If you are looking to purchase a home to use as a short-term vacation rental (rental periods of less than 31 nights), you will be required to apply for a permit with the county in which the home is located. While Lake Tahoe falls into two different states, we have five different counties around the lake, that each have their own set of requirements and their own application processes. The guidelines have gone through numerous renditions and are always subject to change, so your best resources will be found on the county websites, organized below.
Let’s start with the counties. In the below map of Lake Tahoe, you will see four counties, with Truckee falling into both Placer County and Nevada County (detailed in the second map), and in some neighborhoods, it may even come down to what side of the road you live on! Northstar lies in Placer County, while Tahoe Donner is in Nevada County. The town of Truckee lies in Nevada County, which has additional restrictions, including that your home can not be short-term rented within one year of purchase.
Notably, many gated communities and some condo complexes and HOAs will not allow rentals for less than 31-day periods. If renting your home for short increments of time is a requirement for your purchase, this may dictate neighborhoods that you search in.
Some counties experience waitlists for permits. If renting your home is a necessary part of your purchase, you may want to call county offices to determine the waiting period.
Below, we provide links for more information on each county’s Short-Term Rental program and application process.
Placer County, CA
Short-Term Rental Program Information
Short-Term Rental Permit Application
Nevada County, CA (Town Of Truckee)
Short-Term Rental Program Information
Short-Term Rental Permit Application
El Dorado County, CA
Vacation Home Rental Program Information
Vacation Home Rental Permit Application
Washoe County, NV (Incline Village & Crystal Bay)
Short-Term Rental Program Information
Short-Term Rental Permit Application
Douglas County, NV
Vacation Home Rental Program Information
Vacation Home Rental Permit Application
Navigating the Path to Homeownership
UPCOMING EVENT
Want to buy a home in Tahoe/Truckee but not sure where to begin? Join Amie Quirarte with Tahoe Luxury Properties and Chelsy Delia with The Rice Team at Guild Mortgage for an informative presentation on Navigating the Path to Homeownership from two home-buying experts who will guide you on a path toward buying your first home.
New Developments Breaking Ground in Lake Tahoe
With a wave of new development projects underway, revitalization of Lake Tahoe continues. Read our summary of upcoming projects below, and see the significant investments being made to North Lake Tahoe. Links are provided to take you to developers’ websites with more detail.
The Waldorf Astoria by EKN
Hotel giant Hilton announced plans for the luxury Waldorf Astoria Lake Tahoe to be located on the 15-acre site of the former Tahoe Biltmore Hotel and Casino on the Nevada side of North Lake Tahoe. Slated to open in 2027, the newly built resort will feature 76 guest rooms and 61 Waldorf Astoria-branded residences. Hilton signed a brand and management agreement for the Northern Nevada project with EKN Development Group.
Boatworks at Tahoe
At the site of the Boatworks Mall in Tahoe City, there are plans to develop the approximately four acres to a development that includes a lakefront hotel, 31 residential condominium units, and 8,000 square feet of commercial retail space along North Lake Boulevard. Boatworks at Tahoe, LLC acquired the Mall in 2019 and the adjacent 35-room Tahoe City Inn in late 2018.
Homewood Mountain & Lake Club
Homewood Mountain Resort is switching to a members only model with 175-180 residences to be built around the base of the ski resort area, plus a hotel with 15-20 rooms. Memberships offer lifelong access to skiing. Purchasing a residence will include a membership and an additional number (TBD) of non-residential memberships will be sold. The Discovery Land Company operates a vast portfolio of private residential clubs and resorts, including the famed Yellowstone Club.
Tahoe City Lodge
Located in downtown Tahoe City, a new luxury development is opening its doors to a limited number of astute buyers. Tahoe City Lodge, the first new resort development project in over 50 years, is scheduled to break ground in Spring 2023, with estimated completion in Winter 2024/2025. This will be a four-star hotel with 65 resort condominiums and a restaurant and rooftop bar.
Hyatt Lake Tahoe
Larry Ellison’s investment firm acquired the lakeside resort for $345M on September 3. At more than $817,535 a room, the deal for the property in Incline Village, Nevada, set a per-room record for hotel pricing in the Tahoe market, according to Atlas Hospitality Group President Alan Reay. The deal includes the 16-acre main Hyatt property at 111 Country Club Drive, as well as an adjacent 8.5-acre parcel on the lake’s shore that contains 24 cottages and the Lone Eagle Grille restaurant. The 12-story resort features 422 guest rooms, including 35 suites, restaurants, spa, casino, and more. According to the website, Hyatt Regency will be undergoing renovations to enhance the guest experience from late April 2023 through April 2025. During this time access to Lake Tahoe, the beach and the pier will be unavailable.
39°N Lake Tahoe
39°N is a vibrant new hotel, housing, restaurant/retail and community space right in the heart of Kings Beach. 39°N is anchored by a 153-room hotel and will offer 36 for-sale townhomes and 74 units of for-rent workforce housing. The project is intended to bring a new energy to the Kings Beach core.
Nine 47 Tahoe
Nine 47 Tahoe is a luxury development of 40 mountain modern condominiums located in Incline Village, starting at $2.5M. The development boasts reserved garage parking, stunning courtyards, a rooftop deck and a dog washing station. Residences include two, three, and four bedrooms ranging 1,525 to 4,171 square feet.
Placer County short-term rental updates
Vacation towns have been seeing an influx of second homeowners, and Lake Tahoe is no different. Placer County has said it is committed to preserving “the residential neighborhood character and addressing community concerns regarding nuisances caused by STR operations.”
The implementation of the new short-term rental policies will start April 1, said Community Development Director Crystal Jacobsen, of the Tahoe City office. Here’s how Sierra Sun breaks down the updates:
- The ordinance contains new cap provisions to limit the quantity of short-term rental operations in East Placer — for the first time.
- According to Jasmyn Carr, Placer County’s short-term rental administrative clerk, there are about 2,500 active permits.
- The county has a 3,900 permit cap, Jacobsen said. The cap was suggested by county supervisors in January after they placed a moratorium on all new applications last July.
- No applications can be accepted after 3,900 permits, except from primary residents.
- According to the county website, short-term rentals are residential units rented for 30 days or less, and typically advertised as vacation rentals.
- The county has a priority for processing permits. First is current short-term rental permits for renewal. Second is currently approved exempted properties. And third is properties previously renting without a permit or exemption, and new permits.
- The permit application fee is $306. The fire fee, which covers a fire-life safety inspection, is $475.88 for professionally managed short-term rentals every three years, and the same amount annually for privately managed short-term rentals.
- Applicants need to provide photo evidence of an installed bear box trash enclosure, a business license and a Transient Occupancy Tax certificate. Jacobsen said those using their primary residence as a short-term rental must show proof of primary homeowner exemption.
- Jacobsen said the short-term rental Fire Life Safety and Defensible Space Inspection will be required for 2023 permits and renewals.
Article originally shared via Sierra Sun on March 17, 2022.
Tahoe Daily Tribune: Incline Village seeks new path on housing crisis
Some Incline residents want independence from Washoe County
Since the pandemic, local governments and organizations around the lake and in Truckee have been scrambling to come up with solutions to the housing crisis.
That’s included putting moratoriums on short-term rentals, building multiple workforce housing developments, and even offering thousands of dollars to second homeowners to rent their vacant homes to local workers and families.
Among this expedient change, Crystal Bay and Incline Village have been experiencing some of the worst effects of the housing crisis. Recently, the Village Market of Incline closed its doors after 42 years — in part due to a lack of employees.
Tahoe Luxury Properties real estate agent Amie Quirarte said that the Nevada side of the lake has always been a hot spot due to its low property taxes.
“…the second piece, which is arguably the biggest, is that there were so many changes happening in the political climate across every state and because… the coronavirus has become so highly politicized people left California… and Nevada was a really great state for people to relocate to as far as retirement benefits go and capitalizing on some tax benefits over there if you were switching your residency and Incline saw a huge demand,” Quirarte said. “We just saw a $60 million dollar sale over there – the prices are much higher there than on the California side.”
Due to the lack of affordable housing, much of the local workforce has been pushed out and left many businesses at a loss for employees. Incline Village General Improvement District has also been experiencing an impact to its ability to recruit and retain employees, according to General Manager Indra Winquest – but it does not have as much autonomy over housing as some may think.
“A lot of people think that IVGID has more abilities than it does in regard to how we control (housing) as the local government,” said Tim Callicrate, chairman of the district’s Board of Trustees. “The tough part is we can’t – we have to work with the county. Though we have many, many people here in town who have been really forthright and stepping up and trying to come up with a positive, workable solution. … we’re a general improvement district under the auspices of the county. These are zoning issues that we have no control over … so far we’re doing the best that we can with the limitations that we have as a general improvement district.”
Read the full article here. | https://www.realestatenorthtahoe.com/category/tahoe-real-estate-news/ |
Hebrew at BERS
At BERS, we are focused on helping all of our students find success whenever they walk into our building. That’s why we are proud to launch our new Hebrew program, which we believe will best situate our students to become enthusiastic, successful Hebrew learners. Research shows that language is best learned from sound-to-print, meaning our beginning steps in language skills acquisition begin first from hearing the language, then speaking it, and then proceeding to reading and decoding, so we have made some changes to our curriculum to align BERS with these best practices.
Hebrew Through Movement – Kindergarten and First Grades
We have a new Hebrew Through Movement specialist who will work with kindergarten and first grade classes. In our Hebrew Through Movement sessions, which will happen regularly throughout the year, students will learn Hebrew by hearing and responding to commands. This fun and interactive approach is an adaptation of James J. Asher’s Total Physical Response and creates a positive first link between children and Hebrew. While it is not a methodology that teaches communicative Hebrew, it gives children a good foundation upon which they will be ready to begin the process of Hebrew reading.
Hebrew Decoding – Second Grade
Students at BERS begin their formal introduction of the Hebrew alef bet in the second grade. By the end of the year, students will be introduced to all of the letters and vowels in the alef bet and will begin the process of decoding – blending consonants and vowels together to read fluently.
Hebrew Workshop – Third through Sixth Grades
BERS students begin their midweek studies in the third grade, launching them into the process of gaining comfort and familiarity with blessings and prayers in Hebrew, giving them the foundation to comfortably join the praying community at Congregation Beth El. The HebrewWorkshop program is a self-paced Hebrew program for students in grades 3-6. Each Tuesday and Wednesday afternoon, our students participate in this unique program that meets them where they are, allowing to learn in small groups at the pace that best meets their needs. Below are the answers to some of the questions you may have about this program.
Let’s start from the beginning. What is Hebrew Workshop?
Our Self-Paced Hebrew Workshop is designed to meet students where they are and allow them learn at their own pace. Working in small groups with a teacher on a specific skill or prayer, they will learn at their own speed until they have mastered it. Once they’ve achieved that accomplishment, they’ll move on to the next step. And that’s the key to why do this – we want kids to have that feeling of accomplishment. We want them to have confidence in their ability to work with Hebrew.
Let’s say my child is in the 4th grade. Don’t all 4th graders at BERS know the same amount of Hebrew? Why not just keep them all learning together in the same classroom?
Many of our students are in about the same place, in terms of Hebrew and prayer skills, as their classmates. But not all of them. Some of our students started BERS a little later than their peers. Some are regular participants in Shabbat morning programs and have a familiarity with more prayers than other students in their grade. Some of our students have special learning needs or just need a little more time to work with Hebrew. Some students find Hebrew comes easily and they are looking for more challenges. What makes a self-paced program work for everyone is that everyone gets what they need.
So how do you determine what my child needs?
Over the first three weeks we will assess every student in the 4th-6th grades. We’ll combine that assessment with what else we know about your child (for example: does he/she have an IEP?) and use all of that data to decide where they should begin their journey in Hebrew Workshop during the 2018-2019 school year.
Ok, so you’re going to assess my child and figure out where they start. Then what? What does this program actually look like?
Our Self-Paced Hebrew Program begins on Wednesday, October 24th. During their Hebrew Workshop session, all students in their grade will head to their Hebrew Workshop group. They’ll be joined by a few more students and a teacher, plus our madrichim (teen assistants) will be on hand to help. For about fifty minutes, they’ll work in small groups or one-on-one with their teacher and madrich on the specific skill or prayer they are studying. We’ll have two sessions of Self-Paced Hebrew each afternoon, one for students in 3rd – 4th grade and one for students in 5th – 7th grade. When they’re not in Self-Paced Hebrew, students will be in their regular classrooms.
Who are the other students at the table? And who is the teacher? Is it my child’s classroom teacher?
This program is multi-aged, but the age range is small, because we limit each session to just two grades. Many of our students find themselves sitting with children in the same grade but not all of them. As for the teacher, all of our classroom teachers participate in the program but not necessarily with their own students. For example, when the 3rdgrade is in the program, their teachers are there too but they won’t be exclusively working with 3rd graders. When the 3rdgrade leaves, so do their teachers. We also have 6-8 Hebrew Workshop faculty who only work with small groups during our midweek sessions.
What does it mean for my child to master a skill? And how do they demonstrate it?
When your child’s self-paced Hebrew teacher feels they are ready, we assess their mastery of whatever they’ve been working on. Can they read a series of consonants and vowels with fluency? Can they chant the prayer they’ve been studying with confidence and accuracy? Mastery looks different depending on what they are focusing on but we’ll be sure they know what their goals are.
What if they are struggling a little? What if they get stuck?
This is where the small groups are key. If your child is struggling, our teachers figure out why and adapt the learning until it clicks. Maybe they need a little more one-on-one. Maybe we need to make things more active or use music or a few more games to help it all stick. Because there aren’t 20 kids all working on the same thing at the same time, our teachers have the chance to make sure your child gets what he/she needs.
How many levels should my child get through in a school year? How many prayers should they master? What’s the magic number?
Every child moves at their own pace. So we don’t have a magic number. We have a list of of Hebrew skills and prayers we want our BERS students to feel comfortable with. Most get through that list over several years. Some move faster. Some move slower. Some focus on a smaller number and some need more to keep them challenged and engaged. All of that is ok.
Ok, I think I get it. But what does this mean for the time my child isn’t in Hebrew Workshop on Tuesdays and Wednesdays. And what about Sundays?
In our classrooms, we’ve got a lot of learning to do. Our BERS curriculum includes Torah, history, holidays, lifecycle, ethics, Israel….you get the picture. As part of that learning, our teachers explore the meaning, history, and choreography of prayer. This exploration reinforces everything happening in Hebrew Workshop. In addition, we sing Hebrew songs in music, use Hebrew words throughout our study of Judaics, and experience prayer in all of our holiday celebrations. Every Sunday, our K-5th grade students participate in a morning prayer experience, elevating the prayers they are learning with a spiritual experience. Hebrew is a priority in our curriculum throughout the grades. | https://www.bethelmc.org/lifelong-learning/religious-school/hebrew-bers/ |
---
abstract: 'It has been suggested that cosmological $\gamma$-ray bursts (GRBs) can produce the observed flux of cosmic rays at the highest energies. However, recent studies of $\gamma$-ray bursts indicate that their redshift distribution likely follows the average star formation rate of the universe and that GRBs were more numerous at high redshifts. As a consequence, we show that photomeson production energy losses suffered by ultrahigh energy cosmic rays coming from GRBs would produce too sharp a spectral energy cutoff to be consistent with the air shower data. Futhermore, we show that cosmolgical GRBs fail to supply the energy input required to account for the cosmic ray flux above $10^{19}$ eV by a factor of 100-1000.'
address: 'NASA Goddard Space Flight Center, Greenbelt, MD 20771'
author:
- 'S.T. Scully'
- 'F.W. Stecker'
title: On the Spectrum of Ultrahigh Energy Cosmic Rays and the Gamma Ray Burst Origin Hypothesis
---
gamma-ray bursts; cosmic rays; theory
Introduction
============
Ultra-high energy cosmic rays (UHECRs) are among the most energetic form of radiation ever detected, with energies apparently reaching beyond 10$^{20}$eV. Cosmic rays with ultrahigh energies were first detected over 35 years ago by the Volcano Ranch experiment [@vol63]. With typical event rates of one per km$^2$ per century, subsequent experiments including the Fly’s Eye [@fly94] and AGASA [@agasa95][@agasa98] experiments have observed only a double digit number of events. However, in spite of the paucity of data, a surprising characteristic in the UHECR spectrum has been observed, [*viz.*]{}, its apparent smooth continuation beyond $10^{20}$ eV. UHECRs appear to be distributed isotropically, indicating an extragalactic origin. Protons traveling from intergalactic distances should experience energy losses owing to photopion production interactions with the 2.7K cosmic background radiation. For a uniform distribution of protons in the universe, even neglecting redshift effects and cosmological source evolution, these interactions would be expected to produce a cutoff in the observed spectrum of UHECRs at $\sim 6 \times 10^{19}$ eV, commonly referred to the Greisen-Zatsepin-Kuzmin (GZK) cutoff[@gzk1][@gzk2]. This is because of the strong energy dependence in the energy loss rate with energy from photomeson production interactions. As a result, above $\sim 10^{20}$ eV, only protons from within the relatively nearby distance of $\le 100$ Mpc will survive at these energies to reach the Earth [@stk68]. The present data indicate, however, a flattening of the spectrum above $\sim 10^{19}$ eV[@bir93] and no obvious cutoff out to an energy of $\sim3\times 10^{20}$ eV.
Two classes of theories have emerged to explain this phenomenon. In one class of theories, “top down”, a small branching ratio into high energy nucleons would result from the decays of unstable or meta-stable supermassive particles originating at the grand unified scale or in topological defects produced at that scale. (Most of the energy from these decays goes into the production of pions which, in turn, decay to produce much larger numbers of neutrinos, photons and electrons.)
In the other class of theories, “bottom up”, protons achieve their high energies through conventional electromagnetic acceleration processes. Only a few astrophysical sources are presently considered to have the possibility to accelerate particles to ultrahigh energies of the order of $10^{20}$ eV. Suggested possible acceleration sites include AGN jets and hot spots at the ends of radio galaxy jets. For reviews, see Ref. [@yos98].
Among other origin hypotheses, it has been suggested that $\gamma$-ray bursts (GRBs) can produce the observed flux of UHECRs[@wax95a]. In such scenarios, it has been speculated that UHECRs would be emitted by GRBs fireballs with roughly the same amount of total emitted energy as the observed $\gamma$-rays in the keV to MeV range. Based on this assumption, and also assuming that the GRB rate is independent of redshift, it has been argued that the flux and spectrum of UHECRs with energies above $10^{19}$ eV (a putative extragalactic component which could account for the flattening and possible composition change above $10^{19}$ eV[@bir93]) is consistent with their production by GRBs [@wax95b].
In recent years, X-ray, optical, and radio afterglows of about a dozen GRBs have been detected leading to the subsequent identification of the host galaxies of these objects and consequently, their redshifts. The regions in the host galaxies where the bursts are located have also been identified as regions of very active ongoing star formation. One of us [@stk00] has therefore argued that a more appropriate redshift distribution to take for GRBs is that of the average star formation rate. One consequence of most GRBs being at moderate to high redshifts, is that the GZK effect in the UHECR spectrum produced by GRBs would materialize at lower energies and be more pronounced, in stark contradiction to the data. In this Letter, we present a detailed calculation of the expected UHECR spectrum which would result from GRBs with a more realistic redshift distribution, one following the star formation rate.
Gamma Ray Burst Redshift Evolution
==================================
To date, some 15 GRBs afterglows of long duration bursts have been detected with a subsequent identification of their host galaxies. At least 14 of the 15 are at moderate to high redshifts with the highest one (GRB000131) lying at a redshift of 4.50[@and00],[@gal97].[^1] Redshift data on GRB host galaxies are presently available only for long duration bursts; the short duration bursts have not as yet been identified with any astronomical sources, however, their source-count distribution is also consistent with a cosmological origin [@pac99].
The host galaxies of GRBs appear to be sites of active star formation[@rei98][@cl98]. The colors and morphological types of these galaxies are also consistent with active star formation[@kul98] as is the detection of Ly$\alpha$ and \[OII\] in several of the host galaxies[@met97][@blm98]. Further evidence suggests that bursts themselves are directly associated with star forming regions within their host galaxies; their positions correspond to regions having significant hydrogen column densities with evidence of dust extinction[@rei98][@kul98]. A good argument in favor of strong redshift evolution for GRBs is made in Ref.[@mao98] based on the nature of the host galaxies. Other recent analyses have also favored a GRB redshift distribution which follows the strong redshift evolution of the star formation rate [@sch99],[@frr00].
One argument for strong redshift evolution for GRBs which is independent of the SFR assumption has been put forward very recently. It is based on correlating the time variability of GRB events with the absolute luminosity of the events[@frr00]. The relationship is based on seven events and has been extended to to a sample of 224 long, bright GRBs detected by BATSE. The GRB rate was found to scale as $(1+z)^{3.6\pm0.3}$ which is roughly consistent with the SFR for $z < 1.5$. For higher $z$, the SFR can not be accurately determined because it is strongly affected by dust. As we shall show in the next section, this uncertainty at such high redshifts does not strongly affect our result because contributions to the observed UHECR flux from such redshifts are negligible.
Calculations {#calc.sec}
============
Energy losses of high energy protons from their creation to the present epoch $(z = 0)$ are a result of cosmological redshifting and by pair production ($p+\gamma\rightarrow p+e^+ + e^-$) and pion production ($p+\gamma \rightarrow \pi +n$) through interactions with cosmic background radiation (CBR) photons. We shall assume for this calculation a flat ($\Omega = 1$) Einstein-de Sitter universe with a Hubble constant of H$_0$ = 70 km sec$^{-1}$ Mpc$^{-1}$ ($h=0.7$) and taking $\Lambda = 0$.[^2] The relationship between time and redshift is then given by $$\begin{aligned}
t= {2\over{3}} H_0^{-1}(1+z)^{-3/2},
\label{eq1}\end{aligned}$$ and the energy loss owing to redshifting is $$\begin{aligned}
-{1\over{E}}{dE\over{dt}} = H_{0}(1+z)^{3/2}.
\label{eq2}\end{aligned}$$
Photopion production is the dominant interaction between UHECRs and the CMB for energies $>$ 10$^{20}$ eV. Below energies of 3 $\times$ 10$^{19}$ eV, protons will lose energy mainly through pair production. The combined energy loss rate for both pion and pair production for protons in collisions with photons of the 2.7K background at the present epoch ($z=0$) is defined as $$\begin{aligned}
{1\over{E}}{dE\over{dt}} \equiv \tau (E)^{-1}.
\label{eq3}\end{aligned}$$
The photomeson loss time is given by Stecker[@stk68] and that for pair production is given by Blumenthal[@blu70]. In order to compute the energy losses due to pion and pair production occurring at a redshift $z$, one must account for the increased photon densities and energies at larger $z$. The energy of photons increases as $(1+z)$ and the photon density increases as $(1+z)^3$. The energy loss for photons for any epoch $z$ can then be expressed as $$\begin{aligned}
{1\over{E}}{dE\over{dt}} = (1+z)^3\tau [(1+z)E]^{-1}.
\label{eq4}\end{aligned}$$ We can then calculate the energy E$_0$(z) at which a proton is created at a redshift $z$ whose observed energy today is E.
In order to calculate the (number) flux of protons observed on earth of energy $E$, we follow the formalism derived in Berenzinsky and Grigor’eva [@bg88]. Because of their high energies, we will assume that these protons will propagate along roughly straight lines from their source to the observer, unaffected by small intergalactic magnetic fields. (Dropping this assumption increases their propagation time and energy losses so that it would only strengthen our argument.)
The observed flux from a volume element of the sphere $dV = R^3(z)r^2drd\Omega$ is $$\begin{aligned}
{dj\over{dE}}dE = {{F(E_0,z)dE_0n(z)dV}\over{(1+z)4\pi R_0^2r^2}}.
\label{eq5}\end{aligned}$$ where F(E$_0$,z) is the flux of particles emitted at $z$ of energy E$_0$ and $n(z)$ is the density of GRBs as a function of redshift. We will take this function to be of the form $$\begin{aligned}
n(z) = (1+z)^{(3+q)}n(0).
\label{eq6}\end{aligned}$$ Furthermore with $R_0 = R(z)(1+z)$ and $R(z)dr = cdt$, changing time to redshift dependence utilizing (\[eq1\]), and by integrating (\[eq5\]) to the edge of the sphere ([*i.e.*]{} out to a maximum redshift $z_{max}$) one obtains $$\begin{aligned}
j(E) = {3\over{8\pi}}R_0n(0)F(E)\int_{0}^{z_{max}}(1+z)^{(q-5/2)}
\left({E_0\over{E}}\right)^{-\alpha}{{dE_0}\over{dE}}dz.
\label{eq7}\end{aligned}$$ assuming a power-law spectrum of index $\alpha$ for F(E) to be generated by the GRBs, where F(E) is the total number of particles per second with energy E observed.
Above $\sim 10^{19}$ eV, the Fly’s Eye[@fly94] and AGASA data[@agasa95][@agasa98] are well fit by a spectrum with a power law $\propto$ E$^{-2.75}$. The “GZK cutoff energy” for UHECRs versus redshift of origin is plotted in Figure 1. We have defined this as the energy at which the spectrum drops to $1/e$ of its original value owing to photomeson production. It can be seen from Figure 1 that the protons of energy above ($> 10^{20}$ eV) can have originated no further than a redshift of $z
= .034$ or a distance of 130 Mpc.
For the redshift distribution of GRBs, we have have considered three scenarios and corresponding values for the evolution index, $q$. In the first two cases, we assume a value for $\alpha$ of 2.75 which fits the data above 10$^{19}$eV. For the first case, we take an isotropic comoving source density distribution corresponding to $q = 0$ out to a maximum redshift of 2.5. In a second case, we take a redshift dependence proportional to the star formation rate corresponding to $q = 3$ out to a redshift of 2.5.
For our third case, we take the redshift distribution for GRBs derived from the time variability-redshift relationship for GRBs[@mao98]. This corresponds to taking $q = 3.6$ out to a redshift of 3.6. (It should be noted that there is no observable contribution to the cosmic ray flux from redshifts beyond 2.5 in any case.) For this case, we assume a flatter source spectrum with a smaller value for $\alpha$ of 2.35. This gives a better fit to the data between 10$^{18}$ and 10$^{19}$ eV, but requires a larger energy input. (If we take $\alpha$ = 2.75 for this case, we get a very similar result to the second case, but slightly lower fluxes.)
We have normalized our resulting spectra to the Fly’s Eye data at $E =
10^{18}$ eV and calculated the corresponding UHECR spectra observed at Earth under the assumptions for the three scenarios described above. The results of these scenarios are plotted against the Fly’s Eye and AGASA data in figure 2. The failure of all three scenarios to fit the observed observed spectrum, particularly for energies above 10$^{20}$ eV, is evident. In the scenarios where the source rate follows the star formation rate as a function of redshift, the spectrum is significantly steepened from the source spectrum above 10$^{18}$ eV, a situation which does not occur in the case of a uniform distribution independent of redshift.
For the $\alpha$ = 2.75 cases, the required energy input in cosmic rays above 10$^{19}$ eV is $2 \times 10^{45}$ erg Mpc$^{-3}$ yr$^{-1}$. This is two orders of magnitude greater than the energy release rate from GRBs in the 0.01-1 MeV range [@stk00]. For the $\alpha = 2.35$ case, the discrepency increases to three orders of magnitude, given the required normalization and the flatter source spectrum.
One may speculate that there are numerous nearby low-flux GRBs below the [*BATSE*]{} threshold. However, [*BATSE*]{} has only detected one burst which may have had an energy release significantly lower than $10^{50}$ erg, even this event being in doubt [@bir93]-[@pia99]. Thus, there is no reason to believe that such a scenario could overcome the energy discrepency shown above unless much more GRB energy is released in UHECRs than in low-energy $\gamma$-rays.
Our calculated spectrum above $\sim 10^{20}$ eV may be underestimated owing to the fact that fluctuations in the interaction rate from very nearby sources can allow more protons to reach the Earth than our continuous-energy-loss approximation indicates [@aha94]. However, even with the inclusion of this effect, the predicted energy fluxes from GRBs would be much lower than the observations indicate[@bla00]. With regard to fluctuations, it has been argued that a few nearby sources could produce the UHECRs [@mir96] but statistical studies rule this out [@dub00].
Conclusions
===========
In this paper, we have presented the predicted spectra of UHECRs assuming that the UHECR sources are GRBs and that their source density distribution follows the star formation rate. Our motivation is the recent redshift studies of GRBs which suggest a strong redshift evolution for these objects. The results indicate that GRBs can not be responsible for the UHECRs observed at Earth because their redshift evolution leads to a predicted spectrum which is well below the data, particularly for energies above $10^{20}$ eV. In fact, the “effective GZK cutoff” for UHECRs of cosmological GRB origin is found to be $\sim 3 \times 10^{19}$eV (see Figure 2).
It should be noted that, independent of spectral considerations, if the GRB redshift distribution follows the star formation rate, GRBs can be ruled out as candidates for the UHECRs based on energetics considerations. The present star formation rate coupled with the mean energy release per burst leads to an energy release rate per volume which is more than an order of magnitude below the rate need to account for the UHECRs with energies above $10^{20}$ eV[@stk00],[@dar00] and, as shown in the previous section, two to three orders of magnitude below the rate needed to account for UHECRs above $10^{19}$ eV, contradicting the hypothesis advocated in Ref. [@wax95b] and stengthening the conclusion of Ref. [@stk00].
The recently launched High Energy Transient Explorer (HETE-2) and the Swift satellite mission, projected to be launched in 2003, should eventually provide redshift information for thousands of bursts, including the short duration bursts. These missions therefore have the potential to conclusively exclude gamma ray bursts as the source of the UHECRs, should the density distribution of the bursts conclusively indicate redshift evolution.
Future and planned UHECR detectors such as the Pierre Auger Observatory, and the space-based orbiting wide-angle lens collector (OWL) satellite system should provide the coverage area necessary to determine the true particle spectrum above 10$^{20}$eV. Confirmation of the lack of a pronounced GZK cutoff and an event rate similar to that indicated by present data would also spell the demise for a GRB origin of the UHECRs.
[00]{}
J. Linsley, Phys Rev. Lett. 10 (1963) 146. D.J. Bird, D.J. [*et al.*]{}, ApJ 424 (1994) 491. S. Yoshida, [*et al.*]{}, Astropart. Phys. 3 (1995) 151. M. Takeda, [*et al.*]{}, Phys. Rev. Lett. 81 (1998) 1163. K. Greisen, Phys. Rev. Lett. 16 (1966) 748. G.T. Zatsepin and V.A. Kuz’min, JETP Lett. 4 (1966) 78. F.W. Stecker, Phys. Rev. Lett 21 (1968) 1016. D.C. Bird, [*et al.*]{}, Phys. Rev. Lett. 71 (1993) 3401. S. Yoshida and H. Dai, J. Phys.G 24 (1998) 905; M. Nagano and A.A. Watson, Rev. Mod. Phys. 72 (2000) 689 ; X. Bertou, M. Boratav, and A. Letessier-Selvon, e-print astro-ph/0001516, F.W. Stecker, e-print astro-ph/0101072. E. Waxman, Phys. Rev. Lett. 75 (1995) 386 ; M. Vietri, ApJ 453 (1995) 883 ; M. Milgrom and V. Usov, ApJ 447 (1995) L37. E. Waxman, ApJ 452 (1995) L1. F.W. Stecker, Astropart. Phys. 14 (2000) 207. M.I. Andersen, [*et al.*]{}, Astron. and Astrophys. Lett., in press, e-print astro-ph/0010322.
T.J. Galama, [*et al.*]{}, Nature 389 (1997) 261. E. Pian, [*et al.*]{}, ApJ 536 (2000) 778. D.E. Reichart, ApJ 495 (1998) L99. F.J. Costander, and D.Q. Lamb, D.Q. 1998, in [*Gamma Ray Bursts*]{}, ed. C.A. Meegan, R.D. Preece, and T.M. Koshut (New York: AIP), 520. S.R. Kulkarni, [*et al.*]{}, Nature 393 (1988) 35. M. Metzger, [*et al.*]{} 1997, Nature 387 (1997) 878. J. Bloom, [*et al.*]{}, ApJ 507 (1998) L25. S. Mao and H.J. Mo, Astron. and Ap. 339 (1998) L1. M. Schmidt, ApJ 523 (1999) L117. E.E. Fenimore and E. Ramirez-Ruiz, e-print astro-ph/0004176. Paciesas, W.S., [*et al.*]{} 1998, ApJ Suppl. 122 (1998) 465; also Preece, R., private communication. G.R. Blumenthal, Phys. Rev. D1 (1970) 1596. V.S. Berenzinsky and S.I. Grigor’eva, S.I., Astron. Ap. 199 (1988) 1. F.A. Aharonian and J.W. Cronin, J.W., Phys. Rev. D50 (1994) 1892; A. Achterberg, Y. Gallant, C.A. Norman and D.B. Melrose, D.B., e-print astro-ph/9907060. M. Blanton, P. Blasi and A.V. Olinto, e-print astro-ph/0009466. J. Miralda-Escude and E. Waxman, ApJ 462 (1996) L59. S.L. Dubovsky, P.G. Tinyakov and I.I. Tkachev, Phys. Rev. Lett. 85 (2000) 1154. A. Dar, e-print astro-ph/9901005.
[^1]: The origin of GRB980425 is somewhat controversial; a possible X-ray source[@pia99] and an unusual nearby Type Ic supernova[@gal97] have both been put forward as candidates. Taking the supernova identification gives an energy release which is orders of magnitude smaller than that for a typical cosmological GRB.
[^2]: Taking a $\Lambda$ = 0.7 model does not significantly affect the results.
| |
1. Does this help with weight loss?
Our Berry Blush Green Tea is known for its beauty benefits of restoring your natural glow. For weight loss, we can recommend you our Rose Oolong Tea. It burns body fat and soothes your digestive system.
2. Can i use the tea leaves again? After using them once?
All our teas, loose leaf or tea bags can be rebrewed 2-3 times. Simply add hot water to the brewed leaves and steep for longer.
3. How many cups of tea can we drink for best results?
You can enjoy a cup of tea 2-3 times a day. However, if you are sensitive to caffeine, we'd suggest sticking to 1 cup. | https://teatrunk.in/collections/loose-leaf-teas/products/berry-blush-green-tea |
Welcome to Green Star Sustainable Precincts Online Training.
The aim of this course is to provide a comprehensive overview of the Green Star Sustainable Precincts rating tool.
The SUP tool supports the objective measurement and rating of the environmental performance of precincts and provides insight into all major aspects of environmental sustainability that should be considered in the design and construction and operation of green precincts.
This online training program is part of the formal accreditation pathway required for registration as a Green Star Accredited Professional for Sustainable Precincts (GSAP SUP) with the Green Building Council South Africa.
Please watch this Navigation tutorial to familiarise yourself with how the site works.
By the end of this course you will have a thorough understanding of the context for Green Star Sustainable Precincts in South Africa, all tool categories and their related credits. You will receive the GBCA Communities Submission Guidelines, Local Context Report for RSA, a Rating Tool and some background reading resources and links for detailed review in your own time.
Record any questions you may have and submit these to [email protected] for clarification. | https://www.gbcsa-learn.co.za/courses/sustainable-precincts/ |
For the beginner, this is probably the most difficult aspect of dreams to accept. Dreams of family members, friends, enemies, - all represent various aspects of the dreamer's personality - e.g. ideas, emotions, hopes, fears, ideals, etc..
Symbols of fire in dreams, such as fire, bombs, electricity, etc. represent the dreamers emotions. For example, a dream in which lightning is striking and causing damage to a house is demonstrating how negative emotions (lightning) are affecting the dreamer's physical health (structure of house being damaged).
Air, atmosphere or the interior of a room show the dreamers state of mind. For example, a dark gloomy room would be a depressed personality while a dirty, dingy room would indicate a negative or angry mind.
Water symbols i.e. sea, rivers, lakes, canals, etc. reflect the spiritual or cultural life of the dreamer. How water appears or is organized indicates the dreamer's philosophy of life. A river indicates the dreamer needs a more free spiritual flow. A canal or swimming pool, both man made structures, indicates man-made or conventional ideals are restricting the dreamer's Spiritual flow. A lake or pool indicates that the dreamer does not have a spiritual outlet. The sea or ocean indicates the dreamer's spirituality / life is the subject matter. Diving into the any body of water is a request for the dreamer to get into life.
All the symbols in dreams are linked to show cause and effect. Apparently UN-connected things - people, emotions and events are linked in a chain of cause and effect. In other words find a symbol to show the cause of the dreamer's problem and another symbol to illustrate the effect. This is important because if the effect is not being experienced in the present time then it will be in the future.
You can also use this rule to show why the dreamer is ill, depressed, cannot get on with their spouse, boss, partner or why their career is not getting off the ground.
This rule can be quite difficult to grasp but the rule does not vary. The dreamer is ALWAYS responsible for what happened, is happening, can happen or will happen in the dream. For example, in dreams we find all kinds of apparent accidents, blockages to progress, etc. which inhibit movement. On the surface these SEEM to be outside our control but when we apply this rule we find that we are responsible for our own progress. Look for delays at an airport (meaning reluctance to get a new project off the ground) or roadblocks or obstructions in the path (meaning reluctance to clear obstacles to progress).
Look for what the dreamer is trying to avoid in the dream. This is what he needs to accept or face up to in waking life. Dreams try to create wholeness or completeness in the dreamer by drawing scattered aspects of his personality together. For example, a person in real life may separate himself from his emotions and in the dream he may still try to avoid them. His dreams will insist that he accept these and all other aspects of his personality. Similarly, dreams ask the dreamer to face his fears. In this way he can come to terms with them and heal them.
For example: In a particular dream the dreamer is standing on top of the General Post Office in Dublin in a war type scene. There is a scaffolding around the building. At one point in the dream the dreamer fears for her life and steps back from the edge of the roof. This is an obvious example of avoidance. In this dream the dreamer is 'stepping back' from using her spiritual gift of channeling. | http://www.dream-analysis.com/dreams/4rules.htm |
On 15 October 2018 the NZ Transport Agency announced an extensive review of more than 850 open compliance files. We also announced that we are taking a tougher approach to enforcement and strengthening our regulatory functions.
All 850 compliance files have now been reviewed. These urgent files relate to potentially serious non-compliance safety issues where an individual or operator may not be following the rules and their responsibilities as set out in legislation.
We cast a wide net to review files covering all regulatory areas for which the Transport Agency is responsible. This includes Warrant of Fitness (WoF) and Certificate of Fitness (CoF) providers, Transport Service Licences, heavy vehicle driver licensing, course providers and Heavy Vehicle Certification.
What is the regulatory compliance review?
The review follows concerns that were raised by the Transport Agency’s Board Chairman around compliance. The Board engaged law firm Meredith Connell to review more than 850 open files with the intention of prioritising those that may be a risk to safety.
Compliance files related to potential issues where an individual or operator may not be following the rules and their responsibilities as set out in legislation. Open files are ones that were under investigation by the Transport Agency.
The Transport Agency has taken a firm and prudent approach, casting a wide net to review files from all regulatory areas for which we are responsible. This encompasses issues from the very minor to the very serious.
Meredith Connell now leads the regulatory function within the Transport Agency.
Meredith Connell and the Transport Agency looked into active files where Transport Agency inspectors had identified concern, including heavy vehicle certification, Warrant of Fitness (WoF) and Certificate of Fitness (CoF) inspections, course providers and for people licenced to work on the roads – such as commercial drivers.
When will the review be complete?
This review is ongoing. The future of regulatory compliance is now the focus for the Transport Agency.
What led to the regulatory compliance review?
In the past the Transport Agency’s approach to regulation was through ongoing education to address and remedy compliance issues.
It has become clear that this approach has been neither sufficiently robust nor swift enough to ensure the highest levels of regulatory compliance. We have been too reliant on self-regulation and have not devoted enough attention or resource to ensuring compliance.
We need to do better, and we need to do it now. That is why we are accountable and taking a tougher enforcement approach.
Safety is the Transport Agency’s top priority.
Why is Meredith Connell now leading the regulatory function within the Transport Agency?
The Transport Agency Board engaged law firm Meredith Connell, initially to review the open files. Meredith Connell has expertise in regulatory compliance and performance.
The Board was sufficiently concerned about the Transport Agency’s regulatory performance that it further engaged Meredith Connell to lead the compliance function within the Transport Agency until a time that the Board is satisfied that compliance is performing to the standard required.
Can you assure people that they are safe on the road?
Safety is our top priority. We can assure people that we are urgently addressing these issues and are taking all steps necessary to fix this problem.
We are applying a risk-based approach to addressing any non-compliance where public safety is a concern. Where suspension is necessary to ensure public safety, we are acting.
It is fair to say that no regulatory agency can ever guarantee that every vehicle on the road is up to standard 100% of the time.
While non-compliance is a very serious issue, it’s important to note that the number of open files is very small compared to the overall number of operators who perform a regulatory compliance role in the industry.
the overall strategic and operational aspects of our regulatory role.
How can I report any concerns I have?
How can I keep informed about the regulatory compliance review?
We will keep the regulatory compliance review web page updated with information and links to media releases on compliance actions we have taken.
Why has a Queen’s Counsel (QC) been engaged?
The Transport Agency has engaged Kristy McDonald QC to independently investigate and establish the facts of Dargaville Diesel Specialists (suspended in August and outside the open compliance files now under review) and identify the specific failings of the Transport Agency’s performance as a regulator and make recommendations on any further steps we should take. When complete the report will be released publicly.
What can you tell us about the Ministry of Transport review?
This review (the Review) was announced by the Minister of Transport. It will provide advice to the Minister of Transport on the performance of the Transport Agency’s regulation function. The Review will undertake an assessment of all components of the Transport Agency’s regulatory capability and delivery. The Review is being conducted under section 132 of the Crown Entities Act 2004.
provide the public with confidence that any regulatory deficiencies in the Transport Agency are appropriately identified and addressed, with safety of the public being the overriding priority.
The review is intended to produce its findings and recommendations by March 2019. | https://nzta.govt.nz/vehicles/regulatory-compliance-review/questions-and-answers/ |
Councilwoman Margaret Klein brought up the issue, saying that petition "bothered" her due to the recent city efforts to rebrand the logo.
This first petition calls for the retiring of the griffin symbol due to its impact on the Black community. Petitioners believe it heavily resembles a dragon symbol commonly connected to the KKK.
The Griffin symbol needs to be retired. Commonly associated with strength in war and vigilance, this archaic symbol is at odds with community policing at its best, which is not to be an occupying force, but rather to serve as guardians of the common good. And this statement should not interpreted as an attack on the City of Waterloo or our brothers and sisters in law enforcement. In fact, the Waterloo Commission on Human Rights actively welcomes a productive relationship with any agency engaged in the same nature of service; enforcement of the law. We have no interest in debating the intention behind the symbol’s creation; instead, we would like to address the impact this symbolism has had- and continues to have – on many of our community residents in Waterloo.
Excerpt from Waterloo Human Rights Commission Petition on Change.org
Earlier this year, the council voted to create a rebranding committee that would discuss a potential new logo for the Waterloo Police Department. The committee was filled with equal numbers of residents with opposing views on the issue.
“We were working towards cooperation and hopefully harmony in the future, and then this wrench was thrown into the system by one of our own departments, which really bothered me," Klein said. | |
Development and molecular composition of the hepatic progenitor cell niche.
End-stage liver diseases represent major health problems that are currently treated by liver transplantation. However, given the world-wide shortage of donor livers novel strategies are needed for therapeutic treatment. Adult stem cells have the ability to self-renew and differentiate into the more specialized cell types of a given organ and are found in tissues throughout the body. These cells, whose progeny are termed progenitor cells in human liver and oval cells in rodents, have the potential to treat patients through the generation of hepatic parenchymal cells, even from the patient's own tissue. Little is known regarding the nature of the hepatic progenitor cells. Though they are suggested to reside in the most distal part of the biliary tree, the canal of Hering, the lack of unique surface markers for these cells has hindered their isolation and characterization. Upon activation, they proliferate and form ductular structures, termed "ductular reactions", which radiate into the hepatic parenchyma. The ductular reactions contain activated progenitor cells that not only acquire a phenotype resembling that observed in developing liver but also display markers of differentiation shared with the cholangiocytic or hepatocytic lineages, the two parenchymal hepatic cell types. Interactions between the putative progenitor cells, the surrounding support cells and the extracellular matrix scaffold, all constituting the progenitor cell niche, are likely to be important for regulating progenitor cell activity and differentiation. Therefore, identifying novel progenitor cell markers and deciphering their microenvironment could facilitate clinical use. The aims of the present PhD thesis were to expand knowledge of the hepatic progenitor cell niche and characterize it both during development and in disease. Several animal models of hepatic injury are known to induce activation of the progenitor cells. In order to identify possible progenitor cell markers and niche components, we examined several genes upregulated in a global gene expression array conducted on one of these models, in which progenitor cells are activated. The protein expression patterns were evaluated in our collections of human embryonic and fetal livers, human liver diseases, and rodent hepatic injury models. When analyzing standard histological liver sections underlying connections and tissue architecture are not immediately evident. We therefore developed models for digitally reconstructing not only protein expression in serially cut tissue sections, but also vessels of the portal area. Article I constituted our earliest attempts to create 3D reconstructions of biological material. Human embryonic stem cell cultures were previously thought to consist of homogenously undifferentiated cells. The protocols for 3D reconstructions developed in this study demonstrated micro heterogeneity in expression of differentiation markers and provided the basis for later reconstructions of hepatic tissues. In article II we examined the expression patterns of chosen proteins seen upregulated in the gene array as well as classical hepatocytic and cholangiocytic markers in human liver disease and during prenatal development. Previous studies had indicated direct connections between activated progenitor cells apparently isolated in the parenchyma and the intrahepatic biliary tree. Our developed protocols for 3D reconstructions visually demonstrated direct connections between these entities. Analysis of protein expression in prenatal liver revealed the formation of the intrahepatic tree to occur through a special form of asymmetric tubulogenesis, only recently described in mice. In order to describe the composition of the hepatic progenitor cell niche and the localization of cell surface proteins in article III, the expression patterns of certain genes upregulated in the gene array analysis were analyzed in different models of rodent liver regeneration. We observed that the extracellular matrix molecules collagen 1a1, laminin, nidogen-1 and agrin embraced the biliary cells and sharply defined the hepatic progenitor cell niche, which was encircled by desmin positive support cells. In all injury models biliary cells expressed the cell surface proteins matriptase and HAI-1. However, in the so-called 2-AAF/PHx model of progenitor cell activation, a subpopulation of hepatic progenitor cells was positive for Dlk1. 3D reconstructions clarified that the Dlk1-subpopulation was entirely located in the portal area periphery, and connected to the bile ducts via HAI-1 positive biliary cells. The heterogeneous expression patterns of matriptase, HAI-1 and Dlk1 in this particular injury model indicate the presence of a cellular hierarchy containing possibly less differentiated Dlk1-positive hepatic progenitor cells. In conclusion, our studies characterized the hepatic progenitor cell niche in humans and rodents. We successfully developed protocols for digitally visualizing, not only hepatic, but virtually any tissue through two fundamentally distinct approaches. The identification of an asymmetric form of tubulogenesis in humans added new knowledge to the development of the intrahepatic biliary tree, and thereby the formation of the progenitor cell niche. The identification of heterogeneously expressed cell surface proteins and extracellular matrix components provided knowledge of the constituents defining the niche. These pieces of information are important for future isolation and characterization studies of biliary subpopulations and their differentiation abilities in vitro.
| |
The UN Group of Governmental Experts in the field of information and telecommunications in the context of international security produced a substantive consensus report in 2015 on norms, rules or principles of the responsible behaviour of States in the cyber-sphere as well as confidence building measures, international cooperation and capacity building, which could have wider application to all States. It also addresses how international law applies to the use of information and communications technologies and makes recommendations for future work. Its findings include:
- In their use of ICTs, States must observe, among other principles of international law, State sovereignty, the settlement of disputes by peaceful means, and non-intervention in the internal affairs of other States.
- Existing obligations under international law are applicable to State use of ICTs and States must comply with their obligations to respect and protect human rights and fundamental freedoms.
- States must not use proxies to commit internationally wrongful acts using ICTs and should seek to ensure that their territory is not used by non-State actors to commit such acts.
- The UN should play a leading role in promoting dialogue on the security of ICTs in their use by States, and in developing common understandings on the application of international law and norms, rules and principles for responsible State behaviour. | https://eucyberdirect.eu/content_knowledge_hu/2015-ungge-report-on-the-field-of-information-and-telecommunications-in-the-context-of-international-security/ |
density units:
|From unit |
Symbol
|Equals Result||To unit |
Symbol
|1 pound per gallon US lb/gal||= 0.0043||pounds per cubic inch lb/in3|
Prefix or symbol for pound per gallon US is: lb/gal
Prefix or symbol for pound per cubic inch is: lb/in3
Technical units conversion tool for density measures. Exchange reading in pounds per gallon US unit lb/gal into pounds per cubic inch unit lb/in3 as in an equivalent measurement result (two different units but the same identical physical total value, which is also equal to their proportional parts when divided or multiplied).
How many pounds per cubic inch are contained in one pound per gallon US? To link to this density - pound per gallon US to pounds per cubic inch units converter, only cut and paste the following code into your html. | http://convert-to.com/conversion/density/convert-lb-per-gal-to-lb-per-in3.html |
FLORENCE, Italy — Italian experts say they can’t say with certainty whethr bones dug up in a Florence church are those of a Renaissance-era noblewoman some believe was the model for Leonardo da Vinci’s Mona Lisa.
Researchers told journalists at a news conference in Florence Thursday that testing found one of three pieces of remains compatible with the period in which Lisa Gherardini died, and that historical documents indicate she was buried in a Florence convent in 1542.
Head researcher Silvano Vinceti says there are few remains and no skull, which might have helped determine if the woman could have been Leonardo’s model for the portrait now in the Louvre museum in Paris.
Art historians differ on who might have been the enigmatically smiling model. Some say he used a male model.
Most Read Nation & World Stories
- Washington health-care exec vowed to follow COVID rules. Then he led a 153-person Grand Canyon hike, rangers say.
- Florida middle school killer dies in prison at 31
- The girl in the Kent State photo and the lifelong burden of being a national symbol
- Can you have alcohol after the COVID vaccine? | https://www.seattletimes.com/nation-world/expert-cant-say-if-bones-in-florence-are-mona-lisa-model/ |
DZYNE Technologies specializes in the rapid design, development, and production of advanced unmanned aircraft and analytic systems. We start from concept creation and rapid prototype development and carry it all the way through to delivery of operational systems.
DZYNE Technologies has assembled a team proven in their ability not only to conceive of groundbreaking designs but also to deliver functioning systems based on those innovative designs.
We house experts in many fields including aerodynamics, structural design, systems engineering, and flight test, as well as artificial intelligence, image understanding, and autonomy software. | http://www.dzynetech.com/ |
A matrix martingale is a sequence of random matrices where the expectation of each matrix in the sequence equals the preceding matrix, conditional on the earlier parts of the sequence. Concentration results for matrix martingales have become an important tool in the analysis of algorithms in randomized numerical linear algebra. Simple and fast algorithms for many well-studied problems can be analyzed in using martingales. We survey recent results on using matrix martingales for randomized constructions of sparse approximations of graphs and discuss in detail the use of matrix martingales for analyzing approximate Gaussian elimination on Laplacian matrices associated with undirected and directed graphs. | https://simons.berkeley.edu/talks/matrix-martingales-randomized-numerical-linear-algebra |
The Scottish Youth Theatre venue features a large, striking foyer, used as a shared social space for all building users. The foyer can also be used as an exhibition or registration area for your event, or box office and front of house area for performances. Directly adjacent is our large enclosed outdoor courtyard, a perfect area to relax for breaks, but also a location for performances and events in its own right. There are many creative activities happening in the venue at any one time: these communal spaces are where everyone can come together, with the potential to share ideas and socialise. | https://scottishyouththeatre.org/venue/foyer-and-courtyard/ |
Herds of wildebeests jumped in the river, landing into the open jaws of nile crocodiles. They were not alone. Zebras had an urge to dive in and some of them managed to dodge death and swim across. Vultures were having a feast of the carcasses that lay galore on the shore.
These were the scenes; I had imagined seeing, at Mara River.
What we really saw was a rather placid river. We sighted a few floating carcasses and were informed that the endless influx of willing-dinner occurred sporadically. A few crocodiles laid on opposite side of the river, well away from a pod of hippopotamuses that were frolicking in the water. The shore reeked of rotten flesh and dung but it was hard to imagine that seemingly calm river could become an arena for life and death.
The landscape of Mara was open savannah grassland. In its vastness, we saw migrating wildebeests, thousands if not millions. These herbivores are the Big-Mac of Masai Mara. Twice a year, gazelles, zebras and wildebeests migrate to Serengeti, Tanzania (in January to March)and back to Masai Mara,Kenya(in July to August). These herbivores are responsible for the unkempt-stable-like stench of the savannah.
The following day, our driver/guide declared. ‘Lions have a kill’. We left our breakfast table and dashed to beat the rush hour.
Lionesses had killed a wildebeest in the night. Alphas, betas and higher members had already eaten and they lay scattered around the site, some on their backs, some on their sides, one with a femur stuck in their mouth, like a pacifier. Lower members of the pride were still nibbling.
Three of them tugged on the carcass – one had the ribs, another had the tail and third one had a front leg. A juvenile lion saw an untouched piece and dug his teeth right in. The piece was the stomach and partially formed dung oozed out. Phew! Soon, he was rubbing his snout on grass – he snorted like a domestic cat .
On our third day, we had just left the lodge, ‘There…elephants’ pointed our driver.
We saw a herd in the horizon. In the hunt for Big Five, we spotted the elephants, not in all its glory with the tusks but their enormous arses.
Thankfully, I had seen a member of the Elephant family on our trip from Nairobi to Lake Nakuru at the Great Rift Valley View-Point.
Despite the view of the Eastern Rift Valley, which spreads over about 6000 kilometres from Jordan to Mozambique, my eyes were on a rabbit-like-brown rodent scampering up and down the rocks. ‘African rats are huge.’
It was later after I realised that it was a hyrax. They are related to elephants and not rodents- it is on Wikipedia.
Talking about relatives, just after checking-out from Mara Simba Lodge (the reception didn’t even have the contact details for Kenya Airways,their national carrier ) we found a vervet monkey rummaging through a trash bin. Oh, the joy on its face as it licked a cereal bar wrapper!
Our trip to Kenya was worth every moment; we met the semi-nomadic Masai people ( read here- https://biswadarshan.com/2014/10/20/an-encounter-with-masai/ ) and saw the bio-diversity of Lake Nakuru (read here – https://biswadarshan.com/2014/10/27/hakuna-matata/ ).
But our trip to Masai Mara did not turn out as expected. We did not witness the physical migration across deadly Mara River…may be Kenya has saved it for our next trip!
P.S – Thanks a lot to Shannon Kretschmer ( http://www.capture-the-spirit-photography.com/ ) for being my travel partner and for sharing his photographic expertise. | https://biswadarshan.com/2014/11/03/the-dramas-of-masai-mara/ |
Over the past 15 years our research group has been exploring models of developmental robotics and curiosity. Our research is based on the premise that intelligent behavior arises through emergent interactions between opposing forces in an open-ended, task-independent environment. In an initial experiment we constructed a recurrent neural network model where self-motivation was "an emergent property generated by the competing pressures that arise in attempting to balance predictability and novelty". The system first focused on its error, then learned to successfully predict its error, and finally became habituated to what caused the error. This process of focusing, learning, and habituating can be seen as a rudimentary type of curiosity.
Conference
Designing For Curiosity: An Interdisciplinary Workshop
Conference Dates
May 7, 2017
Conference Location
Denver, CO
Recommended Citation
Lisa A. Meeden, D. Blank, and J. Marshall.
(2017).
"Curiosity: Emergent Behavior Through Interacting Multi-Level Predictions".
Designing For Curiosity: An Interdisciplinary Workshop. | https://works.swarthmore.edu/fac-comp-sci/85/ |
How Functional F# Really Is?
How "Functional" F# Really Is?
Is F# a functional language? Well, it definitely has functions and lambdas, but so does C#. One of the main selling points of F# is immutability of data. It seems to be a popular belief that in F# most data is immutable. I am not an F# guru, but after some practical F# programming, I have strong doubts about that.
There is no much doubt about it. If the data is immutable, you don't need to worry about it being corrupted by mutliple threads. The trouble is, having your data immutable shifts your paradigm and sometimes has performance implications.
Functional languages help developers support concurrency by encouraging immutable data structures that can be passed between threads and machines without having to worry about thread safety.
The underlying assumption is that F# "encourages" immutable data. This may be the case, but does this "encouraging" really work?
Give It Up For Immutable Data!
Any .NET classes with mutable members, such as Windows Forms, WCF proxies, ASP.NET pages, XML parsers, etc., etc.
How much mutable data a typical F# program would deal with?
The answer is, of course, "it depends". It depends on the task at hand, on the programming habits and the libraries we use. I believe that in the current state of the language any real F# program will contain lots of mutable data.
Well, this is not really a myth, since very few people believe it. F# explicitly allows mutable data, and if something is allowed, people will use it. So, using immutable data in F# requires discipline, just as it does in C# ot Java.
Class members are mutable by default.
Classes are passed by reference. If your otherwise immutable object contains a reference to a class, it depends on mutable data.
F# Arrays are mutable classes.
Many other collections are mutable classes as well.
No mutable keyword in sight, eh? Still, your data is mutable.
second.data. <- 42 // mutable?!
Note, that we did not use mutable even once. Not only we are able to change the data, the change also "contaminates" another object!!!
Of course, one may say: don't use arrays, but then what is an alternative? What if I do have a relatively large uniform list of things that requires random access? E.g., I don't know, current rotating speeds of the 128 fans that cool down my shiny 65536-core CPU? There is some research into functional arrays, and they are incorporated into languages like Haskell, where AFAIR arrays are immutable. I also found a post about functional arrays in OCaml, but I am not sure whether it really works. In any case, F# did not bother with functional arrays, and it uses standard .NET arrays.
F# implemented quite beautiful immutable set, but it pretty much ends there. Even the books that are supposed to demonstrate best practices use mutable structures. E.g., in "Expert F#" Don Syme himself uses mutable dictionary to store intermediate results of computations. Yes, this dictionary would be local to a function, and thus most likely is not a thread-safety issue, but I fail to see how it is radically different from C# or Java.
And enumerator, my friends, is mutable data. Also note mutable res variable. If F# library has to do it, you may also have to do it under different circumstances.
F# is a port of OCaml to .NET. It is the power of .NET libraries that makes F# commercially viable. .NET libraries penetrate the core of the language: IEnumerable, arrays, The trouble is, most .NET library objects rely on mutable state: XML parsers, ASP.NET pages, Windows Forms, WCF proxies. It might be possible, but is definitely very difficult to use them from a functional program and avoid relying on mutable state yourself. Therefore, it would not happen, since people tend to take the path of least resistance.
In theory, F# encourages immutable data. In practice holding on to it requires strong discipline, almost as strong as in C# in Java. Any real world F# program would contain significant amount of mutable state.
F# definitely has attractive properties and interesting ideas, but in my view the "immutable data" point has been heavily oversold. | https://ikriv.com/dev/misc/fsharp/functional |
comments powered by Disqus.
Part 1. Getting Started
Task 1: Understanding the Desktop
Task 2: Understanding the Start Menu
Task 3: Opening and Closing a Window
Task 4: Minimizing a Window
Task 5: Maximizing a Window
Task 6: Moving a Window
Task 7: Resizing a Window
Task 8: Arranging Windows on the Desktop
Task 9: Using Menus
Task 10: Using Shortcut Menus
Task 11: Using a Dialog Box
Task 12: Getting Help
Task 13: Getting Context-Sensitive Help
Task 14: Restarting and Shutting Down the Computer
Part 2. Working with Programs
Task 1: Starting a Program from the Start Menu
Task 2: Exiting a Program
Task 3: Starting a Program from a Shortcut Icon
Task 4: Switching Between Programs
Task 5: Saving and Closing a Document
Task 6: Opening a Document
Task 7: Switching Between Open Documents
Task 8: Creating a New Document
Part 3. Working with Folders
Task 1: Opening My Computer
Task 2: Opening the My Documents Folder
Task 3: Opening the My Pictures Folder
Task 4: Opening the My Music Folder
Task 5: Selecting a Folder
Task 6: Navigating Folders
Task 7: Changing the Window View
Task 8: Sorting the Contents of a Window
Task 9: Grouping Icons
Task 10: Creating a New Folder
Task 11: Displaying the Folders List
Task 12: Copying Folders
Task 13: Moving Folders
Task 14: Renaming Folders
Task 15: Deleting Folders
Task 16: Changing the Folder Options
Part 4. Working with Files
Task 1: Selecting Files
Task 2: Viewing File Details
Task 3: Viewing File Properties
Task 4: Renaming a File
Task 5: Moving a File
Task 6: Printing a File from a File Window
Task 7: Copying a File
Task 8: Copying a File to a Floppy Disk
Task 9: Deleting a File
Task 10: Undeleting a File
Task 11: Opening a File from a File Window
Task 12: Setting File Associations
Task 13: Searching for Documents
Part 5. Working with Printers, Scanners, and Digital Cameras
Task 1: Adding a Printer
Task 2: Displaying Installed Printers
Task 3: Setting Printing Preferences
Task 4: Viewing Printer Properties
Task 5: Previewing a Document
Task 6: Printing a Document
Task 7: Viewing the Print Queue
Task 8: Canceling a Print Job
Task 9: Viewing Fonts
Task 10: Adding Fonts
Task 11: Setting Up a Scanner
Task 12: Setting Up a Digital Camera
Task 13: Printing Photographs
Task 14: Ordering Photo Prints from the Internet
Part 6. Entertainment
Task 1: Playing Games
Task 2: Changing the Volume
Task 3: Playing a Sound with Sound Recorder
Task 4: Playing an Audio CD
Task 5: Working with Media Player Controls
Task 6: Changing the Visualizations
Task 7: Copying CD Tracks
Task 8: Using the Media Library
Task 9: Creating a Playlist
Task 10: Tuning into the Radio
Task 11: Changing the Skin for Windows Media Player
Task 12: Playing a Video Clip
Task 13: Importing a Movie with Windows Movie Maker
Part 7. Sending Faxes and E-mail
Task 1: Sending a Fax
Task 2: Receiving and Viewing Faxes
Task 3: Starting Outlook Express
Task 4: Reading Mail
Task 5: Responding to Mail
Task 6: Creating and Sending New Mail
Task 7: Attaching a File
Task 8: Opening a File Attachment
Task 9: Deleting Messages
Task 10: Setting E-mail Options
Task 11: Adding Addresses to Your Address Book
Task 12: Using Your Address Book to Enter Names
Task 13: Organizing Messages in Folders
Task 14: Moving Messages
Task 15: Cleaning Out the Deleted Items Folder
Part 8. Connecting to the Internet
Task 1: Starting Internet Explorer
Task 2: Browsing with Links
Task 3: Typing an Address
Task 4: Searching the Internet
Task 5: Adding a Site to Your Favorites List
Task 6: Going to a Site in Your Favorites List
Task 7: Rearranging Your Favorites List
Task 8: Using the History List
Task 9: Clearing the History List
Task 10: E-mailing a Page or Link
Task 11: Setting Your Home Page
Task 12: Setting Internet Privacy Levels
Task 13: Turning on Firewall Protection
Part 9. Using Windows Accessories
Task 1: Using Calculator
Task 2: Using Command Prompt
Task 3: Using WordPad
Task 4: Typing Text
Task 5: Selecting Text
Task 6: Deleting Text
Task 7: Copying Text
Task 8: Moving Text
Task 9: Formatting Text
Task 10: Using Notepad
Task 11: Using Paint
Task 12: Drawing a Shape with Paint
Task 13: Adding Text to a Drawing
Task 14: Adding Color to a Drawing
Task 15: Erasing Part of a Drawing
Part 10. Personalizing Windows
Task 1: Customizing the Taskbar
Task 2: Selecting a Desktop Theme
Task 3: Applying a Background Image
Task 4: Customizing Desktop Icons
Task 5: Adding Desktop Content
Task 6: Choosing a Screen Saver
Task 7: Changing the Color Scheme
Task 8: Setting Resolution and Color Quality
Task 9: Changing How the Mouse Works
Task 10: Changing the Sound Scheme
Task 11: Changing the System Date and Time
Task 12: Setting Up Windows for Multiple Users
Task 13: Using Accessibility Options
Part 11. Setting Up Programs
Task 1: Working with Program Shortcuts
Task 2: Pinning a Program to the Start Menu
Task 3: Customizing the Start Menu
Task 4: Adding Programs to the Classic Start Menu
Task 5: Removing Programs from the Classic Start Menu
Task 6: Adding Folders to the Classic Start Menu
Task 7: Rearranging the Classic Start Menu
Task 8: Starting an Application When You Start Windows
Task 9: Installing Software
Task 10: Installing Programs Via Windows Update
Task 11: Uninstalling Applications
Task 12: Setting Default Programs
Task 13: Removing Windows Components
Part 12. Maintaining Your System
Task 1: Displaying System Information
Task 2: Displaying Disk Information
Task 3: Cleaning Up Unnecessary Files
Task 4: Scanning Your Disk for Errors
Task 5: Defragmenting a Disk
Task 6: Scheduling Tasks
Task 7: Formatting a Floppy Disk
Task 8: Transferring Files and Settings from Another PC
Task 9: Installing New Hardware
Task 10: Restoring Your System
Part 13. Home Networking Basics
Task 1: Using the Network Setup Wizard
Task 2: Enabling File Sharing
Task 3: Browsing Shared Files
Task 4: Mapping a Network Drive
Task 5: Creating Network Shortcuts in My Network Places
Task 6: Enabling the Security Log
Glossary
A
B
C
D
E?F
G?H
I
J?K
L
M
N?O
P?Q
R
S
T?V
W?Y
Z
Remember the name: eTutorials.org
Copyright eTutorials.org 2008-2021. All rights reserved. | http://etutorials.org/Microsoft+Products/microsoft+windows+xp+home+edition/Glossary/ |
MOSCOW (UrduPoint News / Sputnik - 24th January, 2022) Moscow is concerned about the deterioration of the situation in Burkina Faso and is closely following the recent developments in the country, hoping for an urgent stabilization, the Russian Foreign Ministry said on Monday.
Reports have been coming in on Monday that Burkina Faso president was removed from power by the rebelling military and is currently held in one of the garrisons in the capital city of Ouagadougou, according to the ministry.
"Moscow is concerned about the significant deterioration of the internal political situation in this friendly African country. We continue to closely monitor the development of the situation, we look forward to its quick stabilization," the ministry said in a statement.
UrduPoint Network is the largest independent digital media house from Pakistan, catering the needs of its users since year 1997. We provide breaking news, Pakistani news, International news, Business news, Sports news, Urdu news and Live Urdu News | |
America's Best Dance Crew recap: Crews' Control
The remaining teams combine to form Super Groups and then split back up to show that the crews should really always be in control.
I usually leave episodes of ABDC feeling a little exhaustion (secondary, of course), but I never expected an episode with such a clumsy pun in the title to leave me quite so emotionally taxed. Whoo—there were tears! From T-Pain. A lot of them!
But that particular emotional rollercoaster didn’t actually start until the last 10 minutes of tonight’s episode. With just four teams left, the crews first split into teams of two to form two “Super Groups.” The crews in the Super Group that landed on the bottom would be facing off for elimination. Normally in situations like these, each pairing might have a gimme—one crew on each team that could be easily disarded no matter what the results. But now that we’re down to these final four, each crew is pretty evenly matched, all champions in their own right (okay, except Kinjaz, but they’ve got their whole descendants of the Jabbawockeez thing going on).
The best thing about the four remaining crews though, is how completely different each of their styles are. From here on out, all calls will be tough calls…Super Cr3w + Kinjaz = SUPER KINJAZ; “Lean On” by Major Lazer and DJ SnakeExplosive b-boying plus precise isolations do not a logical combination make. But slap some masks on Super Cr3w and Kinjaz, and they make one cohesive unit. The anonymity of Kinjaz can sometimes leave their routines lacking in intrigue, but here it worked perfectly to blend two crews together in one big show of synchronized athleticism. From the plunging shoulder-stands in the beginning to the final flip, this was a high-flying, high-energy performance.
I.aM.mE + Quest Crew = I AM QUEST; “The Saints” by Andy MineoBut as fun as the Super Kinjaz routine was, I thought the I Am Quest performance straight up out-funned it. Compared to the anonymity of the super group that came before them, I Am Quest just had so much personality. From the brain-banging (basically tutting on speed) straight from the jump to the moving art on the bleachers at the end, these two crews didn’t just master two styles, they cohesively created an entirely new one for their blended crew.
The judges seemed to agree with that sentiment, which was why it was a little surprising that I.aM.mE and Quest Crew were the teams put up for elimination. But, to be fair, I wouldn’t have wanted to decide between any of the teams on this particular week. All four crews were given control of every element of their performance for the second half of the show and it brought out some of the most innovative work each crew has shown this season.
KINJAZ; beatboxer, KRNFXWhen the Kinjaz first said they would be performing without music, I was very concerned—dance is no place for a cappella. But collaborating with beatboxer KRNFX was a little stroke of genius, giving the Kinjaz the perfect showcase for their ability to hit every single beat in a performance. I’m not always as impressed with Kinjaz as others seem to be, but tonight I was in full agreement with the judges about the artistry they created between music and dance in this stripped down, completely focused performance.
SUPER CR3W; “i” by Kendrick LamarSuper Cr3w were “feeling [themselves],” indeed. There is something so inherently old school about this crew and their mastery of breakdancing, and to see them embrace that in a challenge that was so much about showing their spirit was really fun. And there was Just. So. Much. Happening here! From the synchronized windmills to the “tramp stamp” backflip to that gravity-defying freeze on the bleachers, this was a breathless and brave performance that earned Super Cr3w their spot in the semi-finals much more than their earlier collaboration. These are some of the most innovative b-boys around.
I.aM.mE “Firepower” by Wolfgang GartnerI get excited for just about every weird, creepy, brain-banging thing I.aM.mE brings to the stage, but from the moment they mentioned the airboards, I knew they might be doomed. So much effort went into mastering those boards—and boy, did they master them—but that effort was practically all you could think about while watching them. That they were carrying each other on their shoulders and doing handstands, and especially the running across the three-person train, was all really impressive, but it was also all about the boards. On a challenge where everyone else went for such a raw connection to the soul of their crew, it made the showiness of this gothic-on-wheels performance feel a little put upon.
Quest Crew; “Take Ü There” by Jack ÜAnd when you compare it to the emotional tour de force that Quest Crew brought out at the exact right time in the season, there was just no hope for this battle to go a different way. Quest decided to use the control they were given over this performance to tell the story of… well, Quest Crew. More specifically, it was just them and a bench, used to represent the time they almost decided to disband the crew. As a symbol, it was beautifully incorporated in their dance—supporting them, creating obstacles, facilitating incredible tutting, and sometimes just hanging out in the back while they were spinning and gliding their asses off. Quest said they wanted to show the audience who they are instead of just what they can do; according to T-Pain’s emotional artistic connection to “doing things the way you believe they should be done,” they were successful. | https://ew.com/recap/america-s-best-dance-crew-season-8-episode-4/ |
FIELD
BACKGROUND
SUMMARY
DETAILED DESCRIPTION
This disclosure relates generally to the maintenance of aircraft, and more particularly to assessing the operational impact of deferring the maintenance of aircraft.
There are many systems and methods for managing the maintenance of aircraft. These systems can schedule routine periodic maintenance events for an aircraft. Additionally, conventional maintenance management systems may be able to accommodate an unexpected maintenance event occurring on an aircraft by coordinating maintenance resources on the ground to repair the fault associated with the unexpected maintenance event.
However, airline systems typically have procedures in place to allow for the deferral of maintenance. For example, operators of an airline system may choose to defer maintenance, or forego the repair of a fault, for various reasons, such as maximizing customer utility. The deferral of maintenance is generally acceptable from a regulatory standpoint when the deferral does not significantly lessen the safety of the aircraft.
The subject matter of the present disclosure has been developed in response to the present state of the art, and in particular, in response to the limitations of conventional aircraft maintenance systems. Specifically, although some conventional aircraft maintenance systems may facilitate the monitoring of aircraft faults, delivery of information regarding limitations for deferring maintenance, and the entry of information regarding a deferred maintenance event, such systems do not assess the operational impacts associated with the deferral of maintenance. In other words, there are no conventional aircraft maintenance systems that obtain information regarding deferred maintenance events, determine operational limitations associated with deferred maintenance events, and determine operational impacts associated with the deferred maintenance events based on the operational limitations. Accordingly, the subject matter of the present disclosure has been developed to provide an apparatus, system, and method for assessing operational impacts associated with the deferral of aircraft maintenance that overcome at least some of the above-discussed shortcomings of the prior art.
According to one embodiment, an apparatus includes a minimum equipment list (MEL) data module and an impact assessment module. The MEL data module determines at least one operational limitation associated with deferred maintenance on a vehicle. The impact assessment module determines an operational impact associated with the deferred maintenance based on the at least one operational limitation. At least one of the MEL data module and the impact assessment module comprises one or more of hardware and executable code, where the executable code is stored on one or more computer readable storage media.
In some implementations of the apparatus, the MEL data module categorizes the at least one operational limitation into one of a plurality of operational impact categories. The operational impact can be associated with the one of the plurality of operational impact categories. The plurality of operational impact categories may include at least two operational impact categories selected from the group consisting of maintenance impact, crew impact, passenger impact, and economic impact. The MEL data module can determine a plurality of operational limitations. Furthermore, the MEL data module may categorize at least one of the plurality of operational limitations in a first of the plurality of operational impact categories and at least one of the plurality of operational limitations in a second of the plurality of operational impact categories. The operational impact can include a first operational impact associated with the first operational impact category and a second operational impact associated with the second operational impact category.
In some implementations of the apparatus, the impact assessment module assigns one of a plurality of operational impact values to the operational limitation. The operational impact can be determined based on an assigned operational impact value. The MEL data module can determine a plurality of operational limitations. The impact assessment module assigns one of a plurality of operational impact values to each of the plurality of operational limitations. The operational impact can be based on an aggregation of the operational impact values assigned to each of the plurality of operational limitations. The operational impact may be one of a plurality of operational impacts, where each of the plurality of operational impacts is associated with a different aggregated operational impact value threshold.
In certain implementations, the apparatus includes a maintenance query module accesses at least one deferred maintenance record associated with the deferred maintenance from a maintenance information system and determines an MEL item from the at least one deferred maintenance record. The MEL data module locates the MEL item in an MEL document and determines the at least one operational limitation from the MEL item.
According to some implementations of the apparatus, the maintenance query module accesses a plurality of deferred maintenance records from the maintenance information system and determines an MEL item from each of the plurality of deferred maintenance records. The MEL data module can determine at least one operational limitation associated with each of the MEL items. Also, the operational impact can be associated with the plurality of deferred maintenance records based on the at least one operational limitation associated with each of the MEL items.
According to certain implementations of the apparatus, the operational impact corresponds with an impact of operating the vehicle.
In some implementations of the apparatus, the vehicle includes one of a plurality of vehicles of a vehicle fleet. The maintenance query module can access at least one deferred maintenance record for each of the plurality of vehicles from a maintenance information system and determine an MEL item from each of the deferred maintenance records. The MEL data module may locate the MEL items in respective MEL documents each associated with one of the plurality of vehicles and determine at least one operational limitation associated with each MEL item. Furthermore, the impact assessment module can determine an operational impact associated with the at least one deferred maintenance record for each of the plurality of vehicles. The impact assessment module can be further configured to determine a fleet operational impact associated with the deferred maintenance records of the plurality of vehicles based on an aggregation of the operational impacts of the plurality of vehicles.
According to certain implementations of the apparatus, the MEL data module searches the MEL item in the MEL document for key terms. The operational limitation can be determined based on results of the search for the key terms.
According to another embodiment, a system includes a maintenance information system that stores a deferred maintenance record, which includes an MEL item identifier associated with a deferral of maintenance of a system fault on a vehicle. Additionally, the system includes a deferred maintenance apparatus that determines the MEL item identifier, locates an MEL item associated with the MEL item identifier in an MEL document, determines at least one operational limitation associated with the MEL item, and determines an operational impact associated with the deferral of maintenance of the system fault based on the at least one operational limitation.
In some implementations of the system, the deferred maintenance apparatus automatically queries the maintenance information system to determine the MEL item identifier. The system may also include a data network. The aircraft, maintenance information system, and deferred maintenance apparatus can communicate with each other over the data network.
According to certain implementations, the maintenance information system can store a plurality of deferred maintenance records each associated with a deferral of maintenance of the system fault associated with a respective vehicle of a plurality of vehicles of a vehicle fleet. Additionally, the deferred maintenance apparatus can determine the MEL item identifier for each of the plurality of deferred maintenance records, locate the MEL items associated with the MEL item identifiers in respective MEL documents, determine at least one operational limitation associated with each MEL item, and determine an operational impact associated with the deferral of maintenance of the system fault for each of the plurality of vehicles of the vehicle fleet based on the at least one operational limitation associated with the respective MEL item. In one implementation, the deferred maintenance apparatus determines a fleet operational impact based on an aggregation of the operational impacts associated with the deferral of maintenance of the system faults for all vehicles of the vehicle fleet.
In yet another embodiment, a method includes obtaining at least one operational limitation associated with deferred maintenance of a vehicle. Additionally, the method includes determining an operational impact associated with the at least one deferred maintenance record based on the at least one operational limitation.
According to some implementations, the method may also include determining an MEL item identifier from a deferred maintenance record, where the at least one operational limitation is obtained from an MEL document based on the MEL item identifier. According to one implementation, the method also includes querying a vehicle maintenance information system to access the deferred maintenance record.
In some implementations, the method further includes categorizing the at least one operational limitation into one of a plurality of operational impact categories, comparing the at least one operational limitation to at least one predetermined impact factor associated with the one of the plurality of operational impact categories, and assigning an impact value to the at least one predetermined impact factor based on the comparison of the at least one operational limitation to the at least one predetermined impact factor. The operational impact can be determined based on the impact value. Also, the operational impact can identify an operational impact associated with the one of the plurality of operational impact categories.
According to certain implementations of the method, the at least one operational limitation includes a plurality of operational limitations and the at least one predetermined impact factor includes a first predetermined impact factor associated with a first operational impact category of the plurality of operational impact categories and a second predetermined impact factor associated with a second operational impact category of the plurality of operational impact categories. Categorizing the plurality of operational limitations can include categorizing a first operational limitation of the plurality of operational limitations into the first operational impact category of the plurality of operational impact categories and categorizing a second operational limitation of the plurality of operational limitations into the second operational impact category of the plurality of operational impact categories. An impact value can be assigned to the first predetermined impact factor based on a comparison of the first operational limitation to the first predetermined impact factor and an impact value can be assigned to the second predetermined impact factor based on a comparison of the second operational limitation to the second predetermined impact factor. The operational impact can include a first operational impact based on the first impact value and a second operational impact based on the second impact value. The first operational impact can be associated with the first operational impact category and the second operational impact can be associated with the second operational impact category.
In some implementations of the method, the at least one operational limitation includes a plurality of operational limitations each categorized into the one of the plurality of operational impact categories. The at least one predetermined impact factor can include a plurality of predetermined impact factors associated with the one of the plurality of operational impact categories. The plurality of operational limitations can be compared to respective predetermined impact factors of the plurality of predetermined impact factors. The impact values can be assigned to each of the plurality of predetermined impact factors based on respective comparisons of each of the operational limitations to an associated one of the plurality of predetermined impact factors. Additionally, the operational impact can be determined based on an aggregation of the impact values.
The described features, structures, advantages, and/or characteristics of the subject matter of the present disclosure may be combined in any suitable manner in one or more embodiments and/or implementations. In the following description, numerous specific details are provided to impart a thorough understanding of embodiments of the subject matter of the present disclosure. One skilled in the relevant art will recognize that the subject matter of the present disclosure may be practiced without one or more of the specific features, details, components, materials, and/or methods of a particular embodiment or implementation. In other instances, additional features and advantages may be recognized in certain embodiments and/or implementations that may not be present in all embodiments or implementations. Further, in some instances, well-known structures, materials, or operations are not shown or described in detail to avoid obscuring aspects of the subject matter of the present disclosure. The features and advantages of the subject matter of the present disclosure will become more fully apparent from the following description and appended claims, or may be learned by the practice of the subject matter as set forth hereinafter.
FIG. 1
10
10
20
30
40
20
30
Referring to , one embodiment of an aircraft maintenance system is shown. The aircraft maintenance system includes an airline system , a deferred maintenance apparatus , and a data network . The airline system and deferred maintenance apparatus communicate with each other over the data network.
40
20
30
40
40
40
40
40
40
40
20
30
The data network , in certain embodiments, transmits digital communications between the aircraft airline system and the deferred maintenance apparatus . The data network can be a wireless network, such as a wireless telephone network, a local wireless network, such as a Wi-Fi network, a Bluetooth® network, and the like. Similarly, the data network can include other wireless-type communications, such as optical communications (e.g., laser and infrared) and electromagnetically-generated communications (e.g., radio waves). In another embodiment, the data network includes a wide area network (“WAN”), a storage area network (“SAN”), a local area network (“LAN”), an optical fiber network, the internet, or other data network known in the art. The data network can include two or more networks. In a further embodiment, the data network includes one or more servers, routers, switches, and/or other networking equipment. The data network can include computer readable storage media, such as a hard disk drive, a mass storage unit, an optical drive, non-volatile memory, random access memory (“RAM”), or the like. In certain embodiments, the data network is two physically separate data networks such that one data network is coupled to the airline system , and another data network is coupled to the deferred maintenance apparatus .
20
22
20
24
22
20
26
22
24
20
Generally, the airline system maintains and controls the operation of one or more aircraft . As depicted, the airline system can include a maintenance information system that monitors the maintenance of the aircraft and stores information concerning the maintenance of the aircraft. The airline system may also include operators that manually perform maintenance on the aircraft , make decisions concerning the maintenance of the aircraft, and enter maintenance information into the maintenance information system . Although the system is described as an airline system associated with commercial aircraft, the system can maintain and control the operation of any of various other vehicles, such as non-commercial aircraft, watercraft, cars, trucks, buses, etc.
24
26
20
202
202
22
202
22
230
22
22
24
FIGS. 8 and 9
The maintenance information system and operators of the airline system also execute a deferred maintenance entry process (see ). Generally, the deferred maintenance entry process facilitates the elective deferral of maintenance on the aircraft . The process includes detecting a system fault on an aircraft, such as aircraft , at . The system fault can be an indication that a system, component, part, or other portion of the aircraft has malfunctioned, has broken, been disabled, or has failed to operate in an expected or normal manner. The system fault can be generated automatically via fault monitoring systems of the aircraft , and an operator can be alerted of the fault via a maintenance information system, such as system . Alternatively, the system fault can be generated based on visual recognition of the fault by an operator.
232
After a fault is generated or triggered, a minimum equipment list (MEL) document is accessed at to determine if the maintenance for repairing the fault is deferrable. The MEL document can be accessed manually or automatically through computer-based methods. The MEL document is either a physical or an electronic text-based document that contains a list of MEL items. Each MEL item includes a fault, an item identifier identifying the MEL item, such as a number, and operational limitations associated with the fault. Each MEL item or fault listed in the MEL document corresponds with a system, instrument, equipment, component, etc. of the aircraft that may be inoperative for flight as long as the provided operational limitations associated with the fault are met. The operational limitations include conditions and restrictions that must be met in order to defer maintenance of the fault. For example, the operational limitations may include conditions and restrictions that limit the maximum time a fault may be deferred, require certain actions or inspection be performed prior to deferring the fault, require periodic inspection of the portion of the aircraft triggering the fault, limit the flight or performance conditions under which the aircraft may be flown, require systems of the aircraft indirectly associated with the fault to be operating normally, and any of various other operational limitations.
22
In some implementations, each aircraft of an aircraft fleet has its own corresponding MEL document. In yet other implementations, each aircraft type or aircraft configuration of an aircraft fleet has an associated MEL document. According to yet further implementations, each aircraft fleet has one MEL document that applies to each aircraft of the aircraft fleet. The MEL document, including the faults, item identifiers, and operational limitations, from aircraft to aircraft, or aircraft type to aircraft type, or aircraft fleet to aircraft fleet, may be the same or different. Additionally, MEL documents can be periodically updated. Accordingly, it is common for operators to separately check the MEL document for each fault, even if the fault is the same as a previously deferred fault.
234
234
234
234
202
236
236
202
238
236
24
240
20
If the fault is listed in the MEL document and the operational limitations are met, maintenance for correcting or repairing the fault can be deferred at . Deferral of maintenance at may also depend on other operational considerations set forth by the airline or aircraft operators. Maintenance may be deferred at to increase customer utility. In addition, other reasons for deferring maintenance may exist. After a decision to defer maintenance occurs at , the deferred maintenance entry process includes performing any actions necessary to accommodate the limitations in the MEL document corresponding with deferral of maintenance at . After the necessary actions are performed at , the process includes creating a deferred maintenance record at based on information entered by the operators associated with the aircraft. The deferred maintenance record includes the fault or maintenance being deferred, the MEL item identifier from the associated MEL document, as well as information regarding the actions performed at and/or other information, such as the aircraft associated with the record. The deferred maintenance record is then stored in an airline maintenance information system, such as the system , at . The airline system can utilize the deferred maintenance record to track and monitor deferred maintenance of one, some, or all aircraft of an aircraft fleet maintained and controlled by the airline.
30
30
32
34
36
32
34
36
54
50
52
FIG. 2
Generally, the deferred maintenance apparatus obtains information regarding deferred maintenance events, determines operational limitations associated with deferred maintenance events, and determines operational impacts associated with the deferred maintenance events based on the operational limitations. As defined herein, operational impacts may include actual operational impacts or the probability of operational impacts. As depicted, the apparatus includes a maintenance query module , an MEL data module , and an impact assessment module . Referring to , the modules , , cooperate to determine operational impacts based on information from a deferred maintenance record and MEL document .
32
24
20
32
24
40
24
32
24
40
24
32
32
24
32
30
The maintenance query module accesses deferred maintenance records from the maintenance information system of the airline system , and determines MEL items from the maintenance records. As shown, the maintenance query module communicates with the maintenance information system over the data network using any of various electronic communication protocols. The maintenance information system grants the maintenance query module access to deferred maintenance records stored in the maintenance information system . In some implementations, the data network is a secured network and the maintenance information system requires the supply of proper security credentials from the maintenance query module in order to gain access to the deferred maintenance records. The maintenance query module may seek and gain access to all deferred maintenance records stored in the maintenance information system , or a selected one or selected few of the deferred maintenance records stored in the maintenance information system. Access to the deferred maintenance records may include storing a local copy of the records in memory of the maintenance query module specifically or the apparatus generally.
32
22
32
66
32
24
Each deferred maintenance record accessed by the maintenance query module is associated with and includes a single MEL item corresponding with a single deferred maintenance action. Additionally, a deferred maintenance record may include an MEL document identifier identifying the MEL document in which the MEL item is located. Furthermore, in some implementations, the MEL document in which the MEL item is located can be inferred based on the MEL item, the aircraft , aircraft fleet, airline, or other information. Accordingly, the maintenance query module is further configured to determine the MEL item, which can be in the form of an MEL item identifier , from each deferred maintenance record. In some implementations, the maintenance query module accesses a plurality of deferred maintenance records from the maintenance information system , and determines a plurality of MEL items each associated with a respective one of the records.
32
32
32
The maintenance query module may determine the MEL item and MEL document from a deferred maintenance record according to any of various techniques. According to one technique, the maintenance query module queries a designated database field or fields of the deferred maintenance record and assigns the value of that field as the MEL item and MEL document, respectively. In another technique, the maintenance query module utilizes a key word search powered by a key word search tool to locate the MEL item in the deferred maintenance record.
FIG. 3
66
32
34
34
60
52
66
60
52
34
52
24
20
40
52
34
30
Referring to , the MEL item or MEL item identifier determined by the maintenance query module is utilized by the MEL data module to locate MEL items in an MEL document. Accordingly, the MEL data module includes an item identification module that locates the MEL item in the MEL document based on the MEL item identifier . The item identification module may utilize a key word search powered by a key word search tool to locate the MEL item in the MEL document . In some implementations, the MEL data module accesses the MEL document , which can be stored on the maintenance information system or other system of the airline system , via the data network . A local copy of the MEL document can be stored in memory of the MEL data module specifically or the deferred maintenance apparatus generally.
60
52
62
68
52
52
66
62
60
After the item identification module locates the MEL item in the MEL document , a limitation module determines the operational limitation or limitations associated with (e.g., categorized or grouped with) the MEL item. Operational limitations, if any, are listed in the MEL document in association with (e.g., grouped or classified with) the corresponding MEL item. For example, in some implementations, an MEL document includes a plurality of MEL items listed one after another. Each MEL item includes text describing the MEL identifier , the fault corresponding with the MEL item, and any operational limitations (e.g., restrictions and/or conditions) associated with the MEL item. The limitation module is configured to search the text associated with the MEL item located by the identification module to determine the operational limitations of the MEL item.
62
70
72
70
52
66
72
70
72
70
68
62
36
54
According to one implementation, the limitations module includes a key word search module and a key word database . The key word search module is configured to search the MEL document , more particularly the MEL item associated with a given MEL item identifier , to locate key words associated with operational limitations. The key words may be stored in the key word database , and include key words historically associated with operational limitations listed in MEL documents. The key word search module often is necessary because the text used by airlines to describe operational limitations in MEL documents may vary from airline to airline, and even from aircraft to aircraft. Therefore, the key word database includes key words, which the key word search module searches for, that are often commonly or universally used to describe operational limitations in MEL documents across multiple airlines and aircraft. The operational limitations determined by the limitation module are utilized by the impact assessment module to determine the operational impacts .
34
64
68
64
68
36
34
36
According to some implementations, the MEL data module includes an impact categorization module that categorizes the operational limitations into one of a plurality of operational impact categories. The impact categorization module may categorize the operational limitations in this manner before the operational limitations are utilized by the impact assessment module . Therefore, in some implementations, categorized operational limitations are generated by the MEL data module and utilized by the impact assessment module . The plurality of operational impact categories includes any of various operational categories that may be impacted by the deferral of maintenance. In one implementation, the plurality of operational impact categories includes two or more of maintenance impact, crew impact, passenger impact, economic impact, and other impacts. According to some implementations, operational impact could include the probability of operational risks associated with the operation of aircraft.
64
52
64
52
64
68
64
The impact categorization module may be configured to take an uncategorized list of operational limitations from the MEL item of the MEL document and categorize them into desired operational impact categories according to predetermined categorization rules. The categorization of the operational limitations by the impact categorization module may be based on key words found in the operational limitations, or other techniques known in the art. Alternatively, the operational limitations may be pre-categorized in the MEL document according to desired operational impact categories. In such implementations, the operational impact categorization module recognizes the pre-categorization, and categorizes the located operational limitations accordingly. According to some implementations, the impact categorization module categorizes some of the operational limitations into one operational impact category and categorizes other operational limitations into another category. In one implementation, one operational limitation may be categorized into multiple operational impact categories.
FIG. 4
36
74
78
74
68
34
74
68
74
74
Referring to , the impact assessment module includes a comparison module and an aggregation module . Generally, the comparison module compares the operational limitations from the MEL data module to predetermined impact factors to determine if, or to what degree, the predetermined impact factors are met by the operational limitations. Then, based on the comparison, the comparison module assigns an operational impact value to each of the predetermined impact factors. The operational impact value may be associated with a probability of operational impact. In some implementations, a predetermined impact factor is either met or not met by the operational limitations . Therefore, in such implementations, the comparison module will assign either one or another operational impact value (e.g., “yes” or “no”, or “0” or “1”). However, in other implementations, a predetermined impact factor can be met by various degrees. Therefore, in these implementations, the comparison module will assign an operational impact value corresponding with the degree by which the predetermined impact factor can be met (e.g., “1”, “2”, or “3”, or “low”, “medium”, or “high”).
68
74
68
52
74
68
76
74
Each predetermined impact factor corresponds with a potential, distinct operational action that may be necessary for deferring maintenance. Accordingly, the predetermined impact factors correspond generally with the operational limitations found in MEL documents. For example, each operational limitation has a corresponding predetermined impact factor. However, because the description of the same general operational limitation may differ from one MEL document to another MEL document, and/or one MEL document may have more operational limitations for a given MEL item (e.g., fault) than another MEL document, the predetermined impact factors of the comparison module may not be exactly the same as the operational limitations from the MEL document . Therefore, the comparison module compares each operational limitation to the predetermined impact factor most closely related to the operational limitation to determine if, or to what degree, the predetermined impact factor is met. The predetermined impact factors can be stored in an impact factor database of the comparison module .
78
36
78
78
54
54
54
54
The aggregation module of the impact assessment module aggregates (e.g., combines, sums, averages, etc.) the operational impact values assigned to each predetermined impact factor. Then, the aggregation module compares the aggregated operational impact value to at least one aggregated operational impact value threshold. The aggregated operational impact value may be associated with a probability of operational impacts. Based on whether the aggregated operational impact value meets the at least one aggregated operational impact value threshold, the aggregation module determines the operational impact . In this manner, the operational impact is based on an aggregation of the operational impact values assigned to each of the plurality of operational limitations or corresponding predetermined impact factors. According to some implementations, the aggregated operational impact value is compared to a plurality of aggregated operational impact value thresholds each associated with a different operational impact . For example, the plurality of aggregated operational impact value thresholds may include a low, medium, and high threshold corresponding to a low, medium, and high operational impact , respectively.
54
22
54
78
78
78
78
The operational impact may be a single operational impact associated with the aircraft as a whole. Alternatively, in some implementations, the operational impact may include multiple operational impacts each associated with a respective one of the plurality of operational impact categories. In such implementations, the aggregation module separately aggregates the operational impact values assigned to each predetermined impact factor for each operational impact category. Accordingly, each operational impact category will be assigned a separate aggregated operational impact value and associated operational impact by the aggregation module . Then, if desired, the aggregation module may aggregate the aggregated operational impact values of the operational impact categories, and compare the resultant operational impact value to one or more predetermined thresholds, to determine an overall operational impact of an aircraft. In a similar manner, the aggregation module may aggregate multiple overall operational impact values each associated with one of multiple aircraft of an aircraft fleet, and compare the resultant operational impact value to one or more predetermined thresholds, to determine an overall operational impact of an aircraft fleet.
68
As mentioned above, the plurality of operational impact categories can include a maintenance impact category, a crew impact category, a passenger impact category, and an economic impact category. Each impact category can include multiple predetermined impact factors, which can be correlated to operational limitations , that affect the operational impact associated with the impact category.
22
68
34
74
78
78
54
The maintenance impact is associated with the operational impact that deferred maintenance has on the maintenance of the aircraft for which maintenance has been deferred. Predetermined impact factors of the maintenance impact category can include, but are not limited to, maintenance actions required before each flight day, required before each flight, and required to other related systems on the aircraft. According to one example, the operational limitations for all deferred maintenance on an aircraft as determined by the MEL data module may include one maintenance action required before each flight day, two maintenance actions required before each flight, and no maintenance actions required for other systems on the aircraft. In such an example, the comparison module may assign operational impact values of ‘1’, ‘2’, and ‘0’ to the respective predetermined impact factors of the maintenance impact category. The aggregation module may then aggregate the operational impact values by summing them such that the aggregated operational impact value for the maintenance impact category is ‘3’. If the predetermined aggregated operational impact value threshold is ‘2’, for example, the aggregated operational impact value meets the threshold, and the aggregation module determines the operational impact for the maintenance impact category to be an operational impact corresponding with meeting the threshold, which can be ‘high’ in some implementations.
22
68
74
78
The crew impact is associated with the operational impact that deferred maintenance has on the crew of the aircraft for which maintenance has been deferred. Crew operational impact can be related to actions required by the crew in order to defer maintenance. For example, predetermined impact factors of the crew impact category can include, but are not limited to, weight/CG limitations, performance adjustments, and special procedure requirements. Similar to the example described above in relation to the maintenance impact category, the operational limitations may correspond with one or more of the predetermined impact factors of the crew impact category, and appropriate operational impact values may be assigned to the impact factors by the comparison module . Then the aggregation module may aggregate the operational impact values and compare an aggregated operational impact value of the crew impact category to a corresponding threshold to determine an operational impact for the crew impact category.
22
68
74
78
The passenger impact is associated with the operational impact that deferred maintenance has on the passengers of the aircraft for which maintenance has been deferred. Passenger operational impact can be related to limitations placed on passengers in order to defer maintenance. For example, predetermined impact factors of the passenger impact category can include, but are not limited to, whether one passenger is affected, whether more than one passenger is affected, whether passenger systems/services are affected. Similar to the example described above in relation to the maintenance impact category, the operational limitations may correspond with one or more of the predetermined impact factors of the passenger impact category, and appropriate operational impact values may be assigned to the impact factors by the comparison module . Then the aggregation module may aggregate the operational impact values and compare an aggregated operational impact value of the passenger impact category to a corresponding threshold to determine an operational impact for the passenger impact category.
22
68
74
78
The economic impact is associated with the operational impact that deferred maintenance has on economic considerations of the aircraft for which maintenance has been deferred. Economic operational impact can be related to limitations placed on economic efficiency in order to defer maintenance. For example, predetermined impact factors of the economic impact category can include, but are not limited to, weight restrictions, extra fuel requirements, extended-range twin-engine operational performance standards (ETOPS) limitations. Similar to the example described above in relation to the maintenance impact category, the operational limitations may correspond with one or more of the predetermined impact factors of the economic impact category, and appropriate operational impact values may be assigned to the impact factors by the comparison module . Then the aggregation module may aggregate the operational impact values and compare an aggregated operational impact value of the economic impact category to a corresponding threshold to determine an operational impact for the economic impact category.
FIG. 5
100
100
10
10
100
100
132
124
124
132
132
150
150
150
150
150
160
180
152
180
150
150
Referring to , the operational flow of one embodiment of an aircraft maintenance system is shown. The aircraft maintenance system includes features analogous to the features of the aircraft maintenance system , with like numbers referring to like elements. Therefore, the description of features of the system may apply equally to the analogous features of the system . The aircraft maintenance system includes a maintenance query module that accesses a maintenance information system of an airline system. From the maintenance information system , the maintenance query module obtains a plurality of deferred maintenance records associated with an aircraft. For example, the maintenance query module obtains a first deferred maintenance record A, a second maintenance record B, and any additional number of deferred maintenance records as indicated by an Nth deferred maintenance record N. From the deferred maintenance records A-N, the item identification module generates an MEL item list by accessing an MEL document for the aircraft. The MEL item list includes a listing of all the MEL items from the deferred maintenance records A-N.
180
152
162
182
182
180
164
182
184
184
184
The MEL item list and access to the MEL document are used by a limitation module to generate an operational limitation list . The operational limitation list includes a listing of operational limitations associated with the MEL items from the MEL item list . An impact categorization module categorizes the operational limitations in the operational limitations list into any number of multiple categorized operational limitation lists. Each categorized operational limitation list corresponds with a respective one of any number of operational impact categories. For example, a first categorized operational limitation list A is associated with a first operational impact category, a second categorized operational limitation list B is associated with a second operational impact category, and an Nth categorized operational limitation list N associated with an Nth operational impact category.
136
136
184
154
136
184
154
136
184
154
An impact assessment module determines any number of impact impacts each associated with a respective one of the operational impact categories based on respective categorized operational limitation lists. For example, the impact assessment module assesses the operational limitations from the first categorized operational limitation list A and generates a first impact A indicating the operational impact associated with the first operational impact category. Additionally, the impact assessment module assesses the operational limitations from the second categorized operational limitation list B and generates a second impact B indicating the operational impact associated with the second operational impact category. Moreover, the impact assessment module assesses the operational limitations from the Nth categorized operational limitation list N and generates an Nth impact N indicating the operational impact associated with the Nth operational impact category.
FIG. 6
102
178
154
154
190
102
178
190
190
190
178
192
192
Referring to , one embodiment a sub-system for determining an aircraft fleet operational impact includes a first aggregation module A that aggregates the first through Nth impacts A-N and generates a first aircraft impact A indicating the overall operational impact associated with a first aircraft based on the aggregation of the first through Nth impacts. The sub-system may also include a second aggregation module B that aggregates the first aircraft impact A, a second aircraft impact B associated with an overall operational impact of a second aircraft, and any number of additional aircraft impacts associated with overall operational impacts of additional aircraft as indicated by an Nth aircraft impact N. The second aggregation module B then generates a fleet impact based on the aggregation of the aircraft impacts. The fleet impact A indicates the overall operational impact associated a fleet of aircraft.
FIG. 7
104
102
104
104
178
198
198
198
198
104
104
178
198
198
192
192
Referring to , one embodiment of a sub-system for determining an aircraft fleet operational impact is similar to the sub-system , but includes some differences. For example, the sub-system includes the intermediate step of determining operational impacts for each impact category of multiple impact categories on a fleet level prior to determining the overall operational impact of the fleet. The sub-system includes aggregation modules C, which can be the same module, that separately aggregate the first impacts of multiple aircraft of a fleet and generate a fleet first category impact A based on the aggregation. The fleet first category impact A indicates the operational impact associated with the first operational impact category for an entire fleet. A fleet second category impact B can be similarly determined where the fleet second category impact B indicates the operational impact associated with the second operational impact category for an entire fleet. Although not shown, the sub-system can determine additional fleet impacts as desired. The sub-system also includes an aggregation module D that aggregates the fleet impacts, such as the fleet first and second category impacts A, B, and generates a fleet impact B based on the aggregation. The fleet impact B indicates the overall operational impact associated a fleet of aircraft.
FIG. 8
FIG. 9
200
202
202
200
204
200
206
200
208
200
210
212
200
214
216
200
218
220
As shown in , and according to one embodiment, one method for assessing operational impacts corresponding with deferred aircraft maintenance events includes executing a deferring maintenance entry process at . One implementation of the process at is shown in and described above in more detail. The method then queries an airline maintenance information system to access deferred maintenance records at . Additionally, the method determines an MEL item identifier from the deferred maintenance record at . The method also includes obtaining operational limitations associated with the deferred maintenance record from the MEL document based on the MEL item identifier at . Moreover, the method includes categorizing the operational limitations into one or more operational impact categories at , and comparing the operational limitations to predetermined impact factors at . The method further includes assigning impact values to the predetermined impact factors at and aggregating the impact values for each of the operational impact categories at . Lastly, the method includes assigning an overall impact to each operational impact category based on the aggregated impact values at and displaying the impact values and/or overall impact at .
In the above description, certain terms may be used such as “up,” “down,” “upper,” “lower,” “horizontal,” “vertical,” “left,” “right,” “over,” “under” and the like. These terms are used, where applicable, to provide some clarity of description when dealing with relative relationships. But, these terms are not intended to imply absolute relationships, positions, and/or orientations. For example, with respect to an object, an “upper” surface can become a “lower” surface simply by turning the object over. Nevertheless, it is still the same object. Further, the terms “including,” “comprising,” “having,” and variations thereof mean “including but not limited to” unless expressly specified otherwise. An enumerated listing of items does not imply that any or all of the items are mutually exclusive and/or mutually inclusive, unless expressly specified otherwise. The terms “a,” “an,” and “the” also refer to “one or more” unless expressly specified otherwise. Further, the term “plurality” can be defined as “at least two.”
Additionally, instances in this specification where one element is “coupled” to another element can include direct and indirect coupling. Direct coupling can be defined as one element coupled to and in some contact with another element. Indirect coupling can be defined as coupling between two elements not in direct contact with each other, but having one or more additional elements between the coupled elements. Further, as used herein, securing one element to another element can include direct securing and indirect securing. Additionally, as used herein, “adjacent” does not necessarily denote contact. For example, one element can be adjacent another element without being in contact with that element.
As used herein, the phrase “at least one of”, when used with a list of items, means different combinations of one or more of the listed items may be used and only one of the items in the list may be needed. The item may be a particular object, thing, or category. In other words, “at least one of” means any combination of items or number of items may be used from the list, but not all of the items in the list may be required. For example, “at least one of item A, item B, and item C” may mean item A; item A and item B; item B; item A, item B, and item C; or item B and item C. In some cases, “at least one of item A, item B, and item C” may mean, for example, without limitation, two of item A, one of item B, and ten of item C; four of item B and seven of item C; or some other suitable combination.
Many of the functional units described in this specification have been labeled as modules, in order to more particularly emphasize their implementation independence. For example, a module may be implemented as a hardware circuit comprising custom VLSI circuits or gate arrays, off-the-shelf semiconductors such as logic chips, transistors, or other discrete components. A module may also be implemented in programmable hardware devices such as field programmable gate arrays, programmable array logic, programmable logic devices or the like.
Modules may also be implemented in software for execution by various types of processors. An identified module of computer readable program code may, for instance, comprise one or more physical or logical blocks of computer instructions which may, for instance, be organized as an object, procedure, or function. Nevertheless, the executables of an identified module need not be physically located together, but may comprise disparate instructions stored in different locations which, when joined logically together, comprise the module and achieve the stated purpose for the module.
Indeed, a module of computer readable program code may be a single instruction, or many instructions, and may even be distributed over several different code segments, among different programs, and across several memory devices. Similarly, operational data may be identified and illustrated herein within modules, and may be embodied in any suitable form and organized within any suitable type of data structure. The operational data may be collected as a single data set, or may be distributed over different locations including over different storage devices, and may exist, at least partially, merely as electronic signals on a system or network. Where a module or portions of a module are implemented in software, the computer readable program code may be stored and/or propagated on in one or more computer readable medium(s).
The computer readable medium may be a tangible computer readable storage medium storing the computer readable program code. The computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, holographic, micromechanical, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing.
More specific examples of the computer readable medium may include but are not limited to a portable computer diskette, a hard disk, a random access memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or Flash memory), a portable compact disc read-only memory (CD-ROM), a digital versatile disc (DVD), an optical storage device, a magnetic storage device, a holographic storage medium, a micromechanical storage device, or any suitable combination of the foregoing. In the context of this document, a computer readable storage medium may be any tangible medium that can contain, and/or store computer readable program code for use by and/or in connection with an instruction execution system, apparatus, or device.
The computer readable medium may also be a computer readable signal medium. A computer readable signal medium may include a propagated data signal with computer readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated signal may take any of a variety of forms, including, but not limited to, electrical, electro-magnetic, magnetic, optical, or any suitable combination thereof. A computer readable signal medium may be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport computer readable program code for use by or in connection with an instruction execution system, apparatus, or device. Computer readable program code embodied on a computer readable signal medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, Radio Frequency (RF), or the like, or any suitable combination of the foregoing
In one embodiment, the computer readable medium may comprise a combination of one or more computer readable storage mediums and one or more computer readable signal mediums. For example, computer readable program code may be both propagated as an electro-magnetic signal through a fiber optic cable for execution by a processor and stored on RAM storage device for execution by the processor.
Computer readable program code for carrying out operations for aspects of the present invention may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, Smalltalk, C++ or the like and conventional procedural programming languages, such as the “C” programming language or similar programming languages. The computer readable program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the latter scenario, the remote computer may be connected to the user's computer through any type of network, including a local area network (LAN) or a wide area network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet Service Provider).
The schematic flow chart diagrams included herein are generally set forth as logical flow chart diagrams. As such, the depicted order and labeled steps are indicative of one embodiment of the presented method. Other steps and methods may be conceived that are equivalent in function, logic, or effect to one or more steps, or portions thereof, of the illustrated method. Additionally, the format and symbols employed are provided to explain the logical steps of the method and are understood not to limit the scope of the method. Although various arrow types and line types may be employed in the flow chart diagrams, they are understood not to limit the scope of the corresponding method. Indeed, some arrows or other connectors may be used to indicate only the logical flow of the method. For instance, an arrow may indicate a waiting or monitoring period of unspecified duration between enumerated steps of the depicted method. Additionally, the order in which a particular method occurs may or may not strictly adhere to the order of the corresponding steps shown.
The present subject matter may be embodied in other specific forms without departing from its spirit or essential characteristics. The described embodiments are to be considered in all respects only as illustrative and not restrictive.
BRIEF DESCRIPTION OF THE DRAWINGS
In order that the advantages of the subject matter may be more readily understood, a more particular description of the subject matter briefly described above will be rendered by reference to specific embodiments that are illustrated in the appended drawings. Understanding that these drawings depict only typical embodiments of the subject matter and are not therefore to be considered to be limiting of its scope, the subject matter will be described and explained with additional specificity and detail through the use of the drawings, in which:
FIG. 1
is a schematic block diagram of an aircraft maintenance system according to one embodiment;
FIG. 2
is a schematic block diagram of a deferred maintenance apparatus according to one embodiment;
FIG. 3
FIG. 2
is a schematic block diagram of a minimum equipment list (MEL) data module of the deferred maintenance apparatus of according to one embodiment;
FIG. 4
FIG. 2
is a schematic block diagram of an impact assessment module of the deferred maintenance apparatus of according to one embodiment;
FIG. 5
is a schematic flow diagram of an aircraft maintenance system according to one embodiment;
FIG. 6
is a schematic flow diagram of an aircraft maintenance sub-system for determining an aircraft fleet operational impact according to one embodiment;
FIG. 7
is a schematic flow diagram of an aircraft maintenance sub-system for determining an aircraft fleet operational impact according to another embodiment;
FIG. 8
is a schematic flow diagram of a method for assessing operational impacts corresponding with deferred aircraft maintenance events according to one embodiment; and
FIG. 9
is a schematic flow diagram of a method for entering a deferred maintenance event into a maintenance information system according to one embodiment. | |
Vida Goldstein was a leading Australian suffragette and campaigner for women’s rights in the late 19th and early 20th century who courageously challenged the prevailing sexism in society.
Jacqueline Kent’s new biography illuminates Goldstein’s extraordinary life in the context of the social movements and political debates of the period. It highlights her steadfast ideals and ability to organise movements which boldly intervened in society to effect change.
As women again rise to challenge inequality and oppression, this biography provides an inspiring example about both previous struggles and future possibilities.
Vida Goldstein was born in 1869 in Portland, Victoria, into a middle-class family. She grew up in Melbourne, which was a wealthy city but also one in which large numbers of working people lived in squalid, overcrowded conditions.
Vida’s mother, Isabelle, was influenced by moderate Christian socialism and worked to gain aid for the unemployed, better conditions for female prisoners and to organise Australia’s first creche in Collingwood to provide childcare for working women.
In her youth Vida joined these campaigns and also a committee led by the first female medical doctors to initiate and raise funds for a women’s health clinic and later to establish the Queen Victoria Women’s Hospital.
Right to vote
The unequal status of women and their exclusion from political life was being challenged by a new generation of women. In 1891 Goldstein joined the campaign for women’s suffrage, collecting signatures for a petition to the Victorian Parliament. Some 30,000 signatures were collected on what became known as the “monster petition” for women’s right to vote.
Following this, legislation granting the vote to women passed the Victorian Legislative Assembly 17 times, only to be blocked by the conservative Legislative Council (Victoria’s upper house), even though women’s suffrage (including for Indigenous women) was granted in South Australia in 1894.
This upper house was dominated by wealthy businessmen and pastoralists. While reformist liberals and early Labor representatives backed women’s suffrage, the privileged representatives repeatedly blocked the vote for women. It was this that helped cement Goldstein’s view that it was not men but the “propertied classes” that were the obstacle to women’s suffrage.
Jaqueline Kent describes the patronising attitudes and harassment faced by women campaigners when they met with the male politicians of the Legislative Council. It is a scene which unfortunately resembles the current experiences of female politicians and staffers in Federal Parliament.
Goldstein became recognised as a persuasive speaker, organiser and leader in the movement. In 1899 she was elected secretary of the United Council for Women’s Suffrage (UCWS).
While the movement was mainly led by middle class women, Goldstein worked closely with trade unionists and developed an analysis about the barriers presented by the “propertied classes” and the key role of working people in the struggle for equality. Affiliates to the UCWS included Trades Hall Council and the new Victorian Lady Teachers Association.
Goldstein herself was a strong advocate of equal pay for equal work, including in her own field of teaching. She viewed gaining political rights as a means to achieve much wider social reform and equality for women.
In 1902 the Australian Commonwealth granted the vote to most men and women aged over 21. Unfortunately, racist amendments excluded Indigenous people. This historic achievement for white women reflected the determined campaign for women’s suffrage and the labour movement’s rising support for this demand.
The Australian suffragettes had close connections with the international movement. Goldstein travelled to the USA to attend the first conference of the International Woman Suffrage Alliance and spent months on a speaking tour. She later published an Open Letter to the Women of America, which contained this advice:
“You want, and must have, the support of the rank and file of the working people. And just here is your weakness, you haven’t got it … every social reform worth having has been won only through getting the support of the workers. It is they who feel the need for reform most, because it is they who suffer most in our present social condition.”
New political rights
The 1903 federal election was the first opportunity for women to exercise their new political rights and Goldstein seized the moment, standing as an independent Victorian senate candidate. This was unprecedented and attracted great publicity.
She toured the state, speaking at large public meetings in Melbourne and country towns. While the press coverage tended to be patronising, Kent captures the extent to which Goldstein’s campaign personified a new spirit of female assertiveness which couldn’t be ignored.
Goldstein used the Senate campaign to build the confidence of other women to act and as a platform to amplify the call for women’s equality. The key elements of her program in this and future elections included equal pay, equal divorce laws and parental rights, the right of women to occupy all government and social positions such as jurors, legal and financial protection of children to age 21, and welfare support for single mothers and their families.
She asserted the need for women’s views to be heard when decisions impacting them were being made. While not elected, Goldstein won an impressive 51,497 votes for this platform of women’s equality and civil rights. Despite this, the process of achieving change proved frustrating. Victoria did not grant women the vote until 1908.
Goldstein campaigned as a candidate in four other federal elections (1910 and 1917 for the Senate and 1913 and 1914 for the House of Representatives). However, she declined suggestions to stand as a Labor Party candidate and lacked a viable electoral pathway to parliament. This independence was often criticised by key allies in the movements as being divisive, but Goldstein was suspicious of the role of “party machines” and critical of the Labor Party’s support for national military development.
Goldstein innovated and developed her political ideas and strategies. She researched, wrote and edited a newspaper Woman Voter. Goldstein engaged in sustained social activism for equal pay, a living wage for workers, to raise the age of consent and for legal reform of children’s courts.
Through this work the connections between women’s oppression and social class inequalities were evident. Goldstein became more critical of the capitalist system itself and from 1906 she wrote articles and spoke at a series of public meetings to advocate socialism, achieved through reform, as the best means to overcome inequality. This form of moderate socialism based on trade unionism, the formation of workers’ co-operatives and public ownership of utilities and industry aligned with ideas common on the left and influential in the development of the early Labor Party.
Vida Goldstein was further radicalised by the experience of the British suffragette movement, which faced harsh repression from the British state and ruling class, who refused to grant reforms. A fascinating part of this biography describes her 1911 visit to Britain as a leading participant in the mass movement for women’s suffrage.
Goldstein publicly backed the militant protest tactics used by the British suffragettes as a legitimate response to the failure of “patient work by constitutional means” and “from a knowledge, bitterly enforced upon you, that the more pacific methods employed … were bound to continue wholly ineffectual”.
On her return, she declared: “We of the Women’s Political Association are working for the same ends as the suffragettes, for the freedom of women and children and men from legal and industrial slavery, for an exalted manhood, womanhood, childhood, for higher political ideals and practices.”
Opposing war
Goldstein’s shift to the left was also occurring in a context where the women’s movement itself was becoming more fractured along class and political lines. In 1904 the conservative Australian Women’s National League (AWNL) was founded to “counteract socialistic tendencies, to educate the women of Victoria to realise their political responsibilities, to safeguard the interests of the home, women and children”.
The AWNL was sponsored by the Victorian Employers Federation and built a mass membership. By 1914 it claimed 52,000 members compared with about 1000 members of the Women’s Political Association (WPA) led by Goldstein. The AWNL would go on to become a key founding member of the Australian Liberal Party in 1944.
With the onset of the First World War, these debates and struggles became much sharper. Goldstein had previously opposed the policy of compulsory military training introduced by the Fisher Labor Government in 1911. When war was declared in 1914, the Fisher Government declared its full support for the Empire and war effort.
Amid the patriotic fervour, Goldstein was among a small minority who opposed the war from the outset. The WPA paper Woman Voter editorialised against the war and faced censorship under the War Precautions Act. In December 1914 the WPA held an outdoor meeting to protest the sharp rise in food prices caused by the war and to advocate for peace.
In 1915 Goldstein formed the Women’s Peace Army to campaign against the war. Working people and the labour movement began to shift against the war as the cost of living rose along with the death toll. The decision by Labor Prime Minister Billy Hughes to advocate conscription for overseas service created huge controversy. Trade unions and most of the Labor Party itself mobilised against conscription and formed a fighting alliance with socialists and pacifists.
Kent’s biography contains compelling accounts of this period of heroic struggle. Goldstein and other leaders such as Adela Pankhurst and Cecilia John were centrally involved in the mass agitation and struggle to defeat conscription. They braved abuse from patriotic returned soldiers to speak at public meetings and distribute anti-conscription materials on the streets.
The Women’s Peace Army mass-produced the persuasive “Blood Vote” poster which showed a woman considering the real meaning of a “Yes” vote. Goldstein’s campaign both used and subverted traditional female roles such as motherhood to challenge the barbarity of war.
Their anthem, sung at meetings, was “I Didn’t Raise My Boy to be a Soldier” which asks “Who dares to put a musket on his shoulder, to shoot some other mother’s darling boy”. Their campaign stripped away the patriotic gloss of war to define soldiering as state-sanctioned killing, in the interests of ruling elites alone.
The combined movement would prevail against the leading institutions of society to defeat conscription, winning a majority of “No” votes in the plebiscites of 1916 and 1917.
General strike
In August 1917 the social strain caused by war led to a mass general strike among workers in NSW and Victoria. Kent describes how the WPA’s headquarters in Melbourne became the “Guild Hall Commune”; a strike organising and relief centre, providing meals and essential supplies and services for literally thousands of striking waterside workers and their families.
In the same year, Goldstein stood for the Senate on an explicitly anti-war platform. She spoke at a mass meeting of 1500 people in Bendigo and denounced the British Empire as a “warmongering institution”. Her opponents labelled her anti-marriage, pro-German and an advocate of free love.
Standing as a radical independent, her vote fell. Regardless, Goldstein had played a crucial role in defeating conscription and building a mass movement against the scourge of war and inequality.
Following the war, Goldstein returned to Britain and attended the 1919 Zurich International Congress of Women. She was dismayed by the scale of human suffering across Europe caused by the war and the arrogance of the victors. Goldstein condemned the unjust terms of the Treaty of Versailles and warned of the likelihood of future wars.
In her writings she expressed a growing sense of pessimism and frustration about the prospects for transformative social and political change. Unfortunately, Goldstein moved away from active political involvement and her lifelong Christian faith would become the main focus of her later years.
Goldstein occupied a position as an independent and radical progressive, which became harder to maintain amid the polarisation of the period. Among her great strengths was steadfast idealism combined with independence and audacity in thought and action.
Jacqueline Kent has written an insightful and compelling biography of Vida Goldstein, a person who should be recognised as among the great figures of both the women’s movement and the left. She issued a clear call for the social and political empowerment of women, alongside a commitment to organise and fight for justice for women, working people and those in society who lack power. It is a call which carries over the decades – to reach all those organising and fighting for justice today.
By Hamish McPherson
Jacqueline Kent, Vida: A Woman for Our Time, Penguin (2020), $34.99. | https://solidarity.net.au/reviews/vida-goldstein-pioneer-in-the-fight-against-sexism-and-poverty/ |
Please note that guests are required to provide their own gear for these activities.
With virgin reef abounding in the surrounding ocean Bull's Inn is becoming an increasingly popular scuba diving destination. Dives are charged at R150 per person with scuba tank refills charged at R20 each.
With Mpame Beach directly in front of the Lodge perfectly safe for swimming and surfing. Delightful gullies provide opportunity for endless hours of snorkeling, and fortunately, as the law prohibits the use of motor driven sports equipment on the river, the quiet sounds of nature remain blissfully uninterrupted.
The estuary and river are ideal for fishing, canoeing and paddling although the river does become inaccessible further up.
For the more energetic the nearby cliffs are ideal for abseiling enthusiasts, while the area lends itself to never-ending hiking and mountain biking opportunities.
With its magnificent coastal setting, neighbouring indigenous forest and sunrises and sunsets of breathtaking beauty, Bull's Inn presents an unparalleled haven for birdwatchers, solitude seekers, photographers and artists alike. | https://www.bullsinn.co.za/activities/ |
It is common knowledge that almost 85% of Americans brew their coffee at home. What people don’t know is – each cup of brew they enjoy leaves a little bit of residue on the machine, which affects the taste eventually. Therefore, to enjoy a fantastic cup of coffee, it is essential to learn how to clean a coffee machine.
Just as you wouldn’t cook in a dirty pan, you shouldn’t brew coffee in a coffee maker that is not clean. Cleaning your machine removes old coffee grounds, oils, and hard water deposits from it and maintains your brew’s quality. Let’s dive deep into different coffee machines’ cleaning processes.
An In-depth Discussion on How to Clean a Coffee Machine
When it comes to the coffee makers, all of us have our favorite types. That’s why I presented a few cleaning procedures according to different kinds of coffee makers instead of discussing a straightforward cleaning process.
How to Clean Drip Coffee Maker
Although single-serve coffee makers are getting popular day by day, many US households still have their old drip coffee makers. However, if you don’t clean your drip coffee maker properly, its life can be shortened.
That’s why you clean your drip coffee maker at least once a month. If heavily used, more frequent cleaning is needed. Here goes the step by step procedure to clean your drip coffee machine:
Step 1
At first, rub the inside chamber with a damp cloth carefully and remove the loose grounds and other rubbish. Use a brush to remove dirt sneaking from any corner. A small grout brush will be great for tight spaces.
step 2
Fill the coffee maker’s water chamber midway with white vinegar and the rest of the space with water. A paper filter can be placed in the basket to seize any hard water deposits or other rubbish that may be loosened. Turn on your coffee maker and brew half of the water-vinegar mixture, and then turn it off. Allow this mixture to soak in the coffee machine for at least half an hour (a full hour is better).
Step 3
Again, turn on the coffee machine and brew the rest of the vinegar-water mixture. Replace the paper filter, then refill the water chamber and run the full cycle to wash the system. To ensure the removal of any remaining vinegar scent or taste, rinse for a second time.
Step 4
With warm water and dish soap, rub inside the entire carafe. Use a sponge or dishcloth to eliminate any mark or spot from the carafe’s surface, but don’t use any abrasive. Wipe down the exterior of your coffee machine to eliminate any dust or oil that tries to spread over time.
Step 5
Some limescale or calcium deposits may not be wiped during the cleaning of the water reservoir. For those, use a cleaning or descaling product dedicated specifically for coffee machines. If the calcium deposits cause you real trouble, use filtered water while brewing the coffee.
Clean Your Single-Cup Coffee Maker
Single-cup machines are quick and convenient. Most manufacturers recommend a thorough cleaning, in other words descaling a single-cup coffee maker within every 3-6 months.
Step 1
Empty your coffee maker and make sure there isn’t a pod in the coffee maker.
Step 2
Fill the coffee pot with white vinegar (1/2 cup) and cold water (1 cup) and pour this mixture into the reservoir. Make sure that the pod area is vacant.
Step 3
Turn on your coffee maker and brew a cup. After completing the brewing, turn off the machine and let the vinegar solution as it is for about 15 minutes.
Step 4
Brew only with water for two cycles to remove any remaining vinegar taste. Between each brewing cycle, shut off the machine for about 15 minutes.
Daily cleaning tips for single-cup coffee makers
You only need to descale the machine a few times each year. Here are some daily cleaning tips according to the National Coffee Association of America:
- Use a coffee pod only once
- Utilize filtered water when brewing. It will minimize hard water deposits
- Empty and refill your water reservoir every day
- Leave the lid off and allow the machine to “air out”
- Replace the filter (Go through the manufacturer instruction for doing it)
- Wipe down the coffee maker’s outer part and clean the surface it sits on to stop dust from settling inside.
Time to shine your glass pour-over
Cleaning a glass pour-over coffee maker seems a bit difficult as you cannot fit your hand inside it. Follow this method and make your coffee pot glazing. This method of cleaning can be done after every use. However, if you rinse well between services, doing it twice a month would be enough.
Step 1
Starting at room temperature, fill the bottom part of your pour-over coffee maker with a handful of ice cubes or a cup of crushed ice. If the machine is small in size, a bit less ice will be enough.
Step2
Add these things – 4 tbsp of table salt, 1 tbsp of water, and 1 tbsp of lemon juice (optional) and make a slightly vigorous swirl with the mixture. As a result, the salty ice will do the job of cleaning dried-on coffee sludge, while the water doesn’t allow it to be abrasive enough to roughen the glass. After the cleaning is done, you can see it if the glass isn’t too frosty.
Step 3
Pour the ice, salt, and water down the drain and cleanse the coffee machine with cold water. Don’t use hot water; it can break the cold glass.
If there is still any debris left (most unlikely), repeat this process. Another option is to apply the Chemex brush or any other long-handled brush and dish soap to rub your pour-over coffee machine.
Here Goes the Cleaning Method of Aeropress
Lower acidity and rapid brewing have increased the popularity of the Aeropress. Rinse your Aeropress after each use and take special care of the rubber gasket on the plunger. These are the key issues here. The remaining cleaning procedure is simple and easy. It goes like this:
Step 1
After using it every time, unscrew the cap and press the Aeropress. Continue pressing until the filter and condensed grounds pop out.
Step 2
Rinse out the machine, take special care while rinsing, and remove the rubber seal around the plunger.
Step 3
In case any debris still remains on the Aeropress, scrub the inside softly with a brush and dish soap. A piece of additional information: the Aeropress is top shelf dishwasher safe too.
Cold Brewer
The structure of cold brewers frequently varies from each other. You may have the multi-cup makers including a tap for dispensing straight from the fridge, or the single-cup makers having a core infusion filter.
For dedicated instructions, check the manufacturer’s manual of your specific cold brewer before proceeding forward to know how to clean a coffee machine. Please note that cleaning the cold brewer after using it every time will assist in preventing mildew growth.
Step 1
According to the manual, dismantle the machine. The dismantling process should be easy as most cold brew coffee makers are built with a pitcher with a filter basket filled with coffee grounds, which expands down into the water.
Step 2
Wash both inside & outside of the pitcher with dish soap and a sponge. Then make it dry.
Always wash the filter between uses. If you notice any debris clogging the filter, clean it with a brush and dish soap and thoroughly flush it with hot water. Don’t forget to dry all parts before putting them back together.
Stovetop Percolator
Brewing coffee in a percolator is environment friendly and doesn’t require high maintenance. Just a quick hand washing after each use will keep your percolator well and good. However, tough stains can be seen inside the percolator eventually. To avoid this, do a deep cleanse monthly or less (if the problem is not that big).
Step 1
Fill the percolator with water, then add 3 tbsp of baking soda. Turn on your percolator and run through a cycle.
Step 2
Let the water become cool, then rub inside the coffee machine with a brush. Throw out the water and rinse well.
Step 3
Fill the machine with half water and half white vinegar, perk through, and then throw out the water. Finally, run the third cycle of freshwater to rinse any remaining debris.
Don’t Leave the Accessories!
Although we may easily overlook it, the coffee maker isn’t the only thing responsible for affecting the brew’s taste. Make sure to clean all your accessories (for example, the grinder) after each use.
Wash them with hot water and make them dry with a towel. If the hot water isn’t good enough to get rid of all the coffee residue, give a quick wipe by using a damp cloth. Cleaning both the machine and accessories will ensure the perfect taste of your brew.
Why You Should Not Use a Dishwasher to Clean a Brewing Equipment
Well, it may be an option to clean the glass and dishwasher-safe plastic swell; however, this allows those parts vulnerable to breakage and warping. Even BPA (Bisphenol A) free plastics may leak potentially dangerous chemicals if exposed to the dishwasher’s heat.
Besides, replacing the broken parts would be hard and expensive, whether it’s Chemex glass or the filter basket for your favorite coffee maker. Stick to hand-washing to keep your brewing equipment well and good.
Finally
Keeping your coffee machine is not something you can neglect. Do the regular and periodic cleaning properly, and you will taste the difference in your brew. Check the manufacturer’s manual if you get stuck during disassembling or any stage of cleaning. Keep this piece on how to clean a coffee machine as a guidebook.
Related Post:
Best Coffee Machine Descaler of 2021
our recommended coffee machine descalers: | https://coffeenatic.com/how-to-clean-a-coffee-machine/ |
Vietnam, Cambodia prepare for high-ranking exchange visits in 2022
Experts believed that the Vietnam-Cambodia relations are vital for both.
Vietnam and Cambodia are discussing preparations for high-ranking exchange visits in 2022 – the year that marks the 55th year of diplomatic relations.
|Vietnam's Foreign Minister Bui Thanh Son (L) and Cambodia’s Deputy PM and Foreign Minister Prak Sokhonn in Pnom Penh on Jan 20. Photos: Cambodian foreign ministry.|
The two sides made the discussions during the visit paid to Phnom Penh by Vietnam’s Foreign Minister Bui Thanh Son on January 19-20.
This year will be labeled the “Friendship Year” to commemorate the 55th anniversary of establishing the bilateral ties.
Talking about the visit, Vietnamese Ambassador to Cambodia Nguyen Huy Tang said it will help concretize agreements reached by the two countries’ leaders over the past time and exchange views on the regional and international issues of mutual concerns.
The ambassador said it needs to focus on some aspects to enhance the relations that the countries’ leaders have committed to “good neighborliness, traditional friendship and comprehensive, sustainable and long-term development.”
Preserving and maintaining political relations are the most important to guide the comprehensive relationship. Accordingly, the two sides need to be aware of the significance of the bilateral ties to the building and protection of each country.
Meanwhile, cooperation in security, defense, and diplomacy must receive significant attention as they are the key pillars in the relations, ensuring peace and security for the development of each nation. At the same time, tightened collaboration at the multilateral forums would largely contribute to Cambodia’s successful presidency of ASEAN 2022.
Economic ties will be another factor contributing to sustainable relations while cooperation in culture, education, health, and science-technology should be given special care.
The last but not least, cooperation among agencies and localities sharing the border together with people-to-people links should also be highlighted for the enhanced ties.
|The foreign ministers join the meeting on Jan 20.|
In the meeting with Cambodia’s Deputy PM and Foreign Minister Prak Sokhonn in Phnom Penh on January 20, Son thanked Cambodia and expected further efforts to give legal identity for ethnic Vietnamese in Cambodia.
During the talks, Son affirmed Vietnam’s support to Cambodia in taking the chair of ASEAN 2022, working together with Cambodia and other ASEAN member states to implement ASEAN’s agendas, including that in the Five-Point Consensus on Myanmar.
Regarding the South China Sea, the Vietnamese FM reaffirmed the importance of peace, stability and freedom of navigation and overflight as well as solving disputes in a peaceful manner in accordance with international law.
The two sides agreed to soon sign a memorandum of understanding between the Diplomatic Academy of Vietnam and the National Institute of Diplomacy and International Relations (NIDIR).
Commenting on the visit, Uch Leang, Deputy Director of Asian, African and Middle East Studies of the International Relations Institute of Cambodia at the Royal Academy of Cambodia, said that it demonstrates good neighborliness and friendship.
“This is a demonstration of good neighborliness, traditional friendship and comprehensive cooperation between Cambodia and Vietnam for the mutual benefit of both peoples,” Leang told The Hanoi Times.
“Even if some foreign ministers cannot come because of the Covid-19 pandemic, he was still able to come. This is what the Cambodian slogan says, good friends help each other in times of need,” he noted. | https://hanoitimes.vn/vietnam-cambodia-prepare-for-high-ranking-exchange-visits-in-2022-319825.html |
The San and Khoi Centre, launched just over a year ago, has made tremendous strides in research, activism, and awareness around the First Nations people of South Africa and the importance of acknowledging their place and presence in our current society and culture.
By Amber Williams (Features Editor)
It has been over a year since the University of Cape Town (UCT) launched the San and Khoi Centre in the Centre for African Studies (CAS) Unit. Launched on the 21st of September 2020, the Centre aimed to bring to the foreground, the experiences, languages, rituals and knowledge systems of the indigenous San and Khoi people who have a history as South Africa’s First Nations group, dating as far back as 150 000 years ago, if not more.
UCT itself is situated on the historic Huri ǂoaxa (Hoerikwaggo) mountain, translated as ‘the mountain in the sea’, which was dispossessed from the First Nations’ tribes and is of great cultural significance to these tribes who once called the picturesque mountain and surrounding areas home. The San and Khoi people have faced extreme physical and cultural genocide, social exclusion, forced assimilation, geological dispossession, imprisonment, and violence under European settler rule and colonialism from the 1500s onwards. Many of their descendants still live in and around Cape Town today; some as students, staff, and graduates of the university itself.
Despite being launched at the height of the COVID-19 pandemic, the San and Khoi Centre has produced novel work that highlights the importance of preserving and recording the knowledge systems and traditions of the San and Khoi people. Dr June Bam-Hutchison has been appointed interim director of the Centre for the past year and has played an important role in the knowledge produced within the Centre, her latest publication being Ausi Told Me: Why Cape Herstoriographies Matter. June’s current research deals mainly with Khoisan identities and their link to social justice in South Africa. Along with leading scholars, feminist activists, community poets, and students, space has been opened up within the Centre for critical debate and reflection around the historiographies of the Khoi and San people and their place in our society and culture today, not only on a local scale but globally as well.
The Centre has hosted regular webinars throughout the year, with internationally renowned scholars, poets, activists, and community leaders coming together and sharing their understandings and personal stories of their own heritage and ancestral histories. The Centre will work within the Worldwide Universities Network to contribute to global debate and discussion around indigenous communities with other first nations groups in Canada, Australia and New Zealand, to name a few.
With the new constitution set up in 1994, the San and Khoi people have found it difficult to seek validation and expression as a cultural group in South Africa’s Constitution due to a large part of their history being swept away and degraded by centuries of colonial violence. The work done within the Centre will address this centuries old dissolution of their identities and culture as a people. The Centre recently implemented a foundational Khoekhoegowab language short course (one of the languages of the San and Khoi people) under the leadership of activist Bradley van Sitters, with hopes to have the language implemented as an official course within a degree structure in the next five years.
The work done within the Centre forms an important part of UCT’s Vision 2030, which aims to tackle themes of transformation, diversity, inclusion, and decolonisation within the university. This process of decolonisation has aided the university to address its harsh, dark and tumultuous past. Such action has culminated in the renaming of many important structures on campus, most notably the Sarah Baartman Hall, previously referred to as the Jameson Hall.
As a historically white university, UCT recognises the launch of the San and Khoi Centre as being crucial to decolonising the university and its associated spaces. With the Rhodes Must Fall movement many students were asking relevant questions concerning the history of the university’s land before Cecil John Rhodes possessed it for his own profit and gain. It is important to remember what once was (and still is) so we can move forward with this shared knowledge and not repeat the mistakes of the past. | https://varsitynewspaper.co.za/2021/10/30/the-san-and-khoi-centre-in-its-first-year/ |
You’ll find on this page:
Jetty Road Glenelg Masterplan
The Jetty Road Glenelg Masterplan was commissioned to establish a planning and design framework that will guide future works while maintaining the historical and distinctive character of the street. The proposed upgrades will enhance the street function and attractiveness as a destination, with the intention of a future proof design that will enable the Jetty Road precinct to maintain its longevity.
The endorsed Jetty Road Glenelg Masterplan provides a blueprint that will guide the staged upgrade of the Jetty Road Streetscape over the next 10 years.
Glenelg Foreshore Masterplan
The Glenelg Foreshore Masterplan was developed in 2014 to guide revitalisation of the Glenelg foreshore. The Masterplan proposes a contemporary outdoor public place to enable multipurpose usage, support the use of Coast Park and encourage engagement and physical interaction. The implementation of the first stage of this project was undertaken in 2016, which included the removal of the former Scampis Restaurant building and development of a new foreshore play space.
Kingston Park Foreshore Masterplan
The Kingston Park Foreshore Masterplan was developed to increase opportunities for local residents and the broader community to enjoy recreation, leisure and community-building activities, while honouring the site’s cultural significance and retaining valuable open space. Importantly, the Masterplan seeks to protect and enhance the sacred Tjilbruke Spring site. It also proposes building a new kiosk and interpretive centre; introducing a new adventure playspace and multi-use court; upgrading the site’s car parks; improving public amenities; installing barbecues, shelters and showers; and improving landscaping and increasing native plantings
Developed with significant consultation with local Aboriginal and community reference groups, the Masterplan encompasses two key projects: completing the Kingston Park section of the Coast Park and redeveloping the coastal reserve. In 2015 the Masterplan was adopted by Council, with the Coast Park project completed in May 2018. | https://www.holdfast.sa.gov.au/council/projects/public-realm-masterplans |
New certification for report creation software
We are very happy to announce that the Financial Reporter Compliance Suite, report creation software from Prognosys Solutions, is the latest product to join the XBRL Certified Software family.
Its certified status means that it has passed thorough testing to ensure that it conforms to all the current requirements of the XBRL standard, and is fully interoperable with all other certified products. It has also been verified to incorporate an XBRL Validating Processor that performs validation of the created reports.
Find out more about software certification here. | https://www.xbrl.org/news/new-certification-for-report-creation-software/ |
Q:
How are distributions for tail risk measures estimated in practice?
Let's say you want to calculate a VaR for a portfolio of 1000 stocks. You're really only interested in the left tail, so do you use the whole set of returns to estimate mean, variance, skew, and shape (let's also assume a skewed generalized error distribution - SGED)? Or would you just use the left tail (let's say the bottom 10% of returns)?
For some reason, using the whole set of returns seems more correct to me (by using only the left 10% or returns you'd really be approaching a non-parametric VaR). But using the whole set of returns would likely cause some distortion in the left tail in order to get a better fit elsewhere.
How are the pros doing this? Thanks!
A:
Perhaps you may want to consider article by D. Levine - Modeling Tail Behavior with Extreme Value Theory who gives practicale example on how EVT can be used to calculate probabilities on returns in tails with use of the Pickands-Balkema-de Haan Theorem and generalized Pareto distribution. It also contains some criterias and points on other methods that can be used to determine threshold value for PBH theorem:
Contrary to this notion is the fact that the PBH theorem
states a result based on the assumption of threshold values
approaching the right endpoint of the distribution F. This
implies that better GPD fits are expected for larger choices
of the threshold u.
One must strike a balance between choosing u large
enough so that the theorem is applicable from a practical
standpoint and small enough so that a sufficient number
of data points can be used in estimation of the parameters
of the GPD.
There is no hard and fast rule describing the “right”
choice of the threshold value. Some methods for threshold
selection can be found in Bensalah’s “Steps in Applying
Extreme Value Theory to Finance: A Review
A:
One approach is Conditional Value at Risk (CVaR) a.k.a. Expected Shortfall (ES). It does, as you suggest, take into account the whole set of returns. However, instead of traditional VaR which asks "what is the worst 1% or 5% loss I can expect" in a given time frame, conditional VaR asks "assuming I sustain losses of at least 95% or 99% (and perhaps am capitalized to sustain losses of only this amount), what is my expected loss (or shortfall)" for this time period? It can be argued this is more relevant for understanding the impact of more dire scenarios.
Another approach from Extreme Value Theory is concerned with strictly modeling the heavy tail of the returns. Generalized distributions (e.g. Gumbel, Frechet) can be fit to the tail(s) in question via something called the Hill Estimation technique. These are covered in depth in literature should you be interested in more detail.
| |
"An empirical validation of a base-excitation model to predict harvesta" by Xu Xu, Simon M. Hsiang et al.
Suspended-load backpacks have been proposed as a way to provide power for small electronic devices by capturing the mechanical energy generated by the vertical movement of the suspended load and converting it into electrical energy. The aim of the current study was to build a base excitation model able to predict the relative velocity of the load (an index of the amount of harvestable energy of such a system) using as inputs the mass of the suspended load, the walking speed and the leg length of the user. Nine human participants walked on a treadmill under two load conditions (15.8 kg and 22.6 kg load) and three walking speed conditions (1.16 m/s, 1.43 m/s and 1.70 m/s). The predictions of the load velocity by the base-excitation model under these conditions were then compared with the measured load velocity. The results of this study showed a moderately strong correlation (0.76) between the root mean square of the predicted and measured relative velocity of the load, and the average absolute error of these predictions was 24.2%. These results provide support for the utility of this approach and also provide motivation for further refinement of the base excitation model for the prediction of the amount of energy able to be harvested from suspended-load backpack systems.
Xu, Xu; Hsiang, Simon M.; and Mirka, Gary, "An empirical validation of a base-excitation model to predict harvestable energy from a suspended-load backpack system" (2010). Industrial and Manufacturing Systems Engineering Publications. 154. | https://lib.dr.iastate.edu/imse_pubs/154/ |
“I want to thank our colleagues from Morocco and the Netherlands for spearheading the forum’s effort to develop the first global set of good practices on stopping the flow of foreign terrorist fighters, which we will adopt here today,” said US Secretary of State John Kerry in opening remarks at the Forum.
A GCTF fact sheet released that day also announced the Open Border Management Initiative, which will be co-led by the US and Morocco in collaboration with the UN Counter-Terrorism Centre (UNCCT) and “will address the challenge of managing open borders, which are sometimes remote and lightly patrolled” and too often serve as conduits for terrorist activities. The initiative will feature workshops that “would bring together border security policymakers and practitioners from countries in different regions” to share expertise, identify good practices and capacity-building programs in the field, and mobilize resources. The inaugural workshop will be hosted by Morocco in late 2014 or early 2015.
Morocco and the US will also announce the Initiative to Foster Cooperation Networks among Justice Sector and Other Law Enforcement Practitioners in the Sahel and Maghreb Regions to “facilitate the sharing of information among justice sector officials in these regions,” coordinate “cross border investigations and prosecutions of terrorism,” and coordinate “extradition and mutual legal assistance requests on terrorism and other related cases.” Such initiatives bolster the strong and longstanding counterterrorism partnership between Morocco and the US, who routinely share intelligence and run joint military exercises.
Morocco has taken a strong public stance against terrorism, and most recently the crimes perpetrated by ISIL. In an August 24 statement from the Ministry of Foreign Affairs and Cooperation, Morocco “denounced and condemned, in the strongest terms, the despicable terrorist crimes committed by terrorist groups against innocents of all nationalities, religions and professions, including journalists mainly in Iraq and Syria,” adding that “these terrorist acts run counter Islam teachings and are a blatant abuse of universal human values.” Currently, Morocco’s Parliament is considering a bill that would strengthen anti-terrorism laws, criminalizing the act of attempting to join foreign terrorist groups. | https://moroccoonthemove.com/2014/09/24/morocco-plays-central-role-global-counterterrorism-forums-newest-initiatives/ |
The use of technology is an integral part of learning at all CBE schools, as required by the Information and Communication Technology (ICT) Program of Studies. Electronic networkable devices and network access require teacher permission and supervision. Printing student work is permitted with staff permission. Students must respect intellectual property and adhere to copyright, software piracy and fair dealing laws associated with learning technologies.
Each situation is dealt with on an individual basis and breach of policy may result in:
Teachers are responsible for ensuring that students remain safe as they use the internet in CBE schools. This in turn requires that teachers become aware of potential risks to students as they use the Internet.
To ensure student safety when accessing the internet teachers will:
Communicating, inquiring, decision making and problem solving are about the ability to use a variety of processes to critically assess information, manage inquiry, solve problems, do research and communicate with a variety of audiences. Students are expected to apply their knowledge and skills in real-life situations.
Foundational operations, knowledge and concepts is about understanding the nature and affect of technology, the moral and ethical use of technology, mass media in a digitized context, ergonomic and safety issues, and basic computer, telecommunication and multimedia technology operations.
Processes for productivity is about the knowledge and skills required to use a variety of basic productivity tools and techniques — for example: text composition; data organization; graphical, audio and multimedia composition and manipulation; media and process integration; and electronic communication, navigation and collaboration through electronic means.
Friday, Sept 24 is a system-wide non-instructional day so there are no classes for CBE students. Have a safe long weekend and please continue to follow all public health measures #WeAreCBE https://t.co/2BCAzks4jb
RT @UsihChristopher: We all recognize the benefits of in-person learning. We are doing everything we can to minimize transmission of COVID-19 in our schools. We NEED your help! To all employees and students (who are eligible): Please get vaccinated as quickly as possible. Thanks for sharing message! | https://school.cbe.ab.ca/school/Sunnyside/culture-environment/tech-tools/digital-citizenship/Pages/Acceptable-Use-Policy.aspx |
The Fisheries Biologist IV will use professional knowledge and competence in biology, statistics, and mathematics to perform tasks in the following areas:
Evaluation of Diversion Dams and Mark Detection Sites Compile juvenile migration and adult return and escapement data generated through visual surveys and counts, radiotelemetry, acoustic detection and PIT tag detection. Monitor Yakima Basin salmonids including: Spring, Summer, and Fall Chinook, Coho, Sockeye, and Summer Steelhead passing Prosser Dam and other Yakima Basin diversion dams using visual counts and mark detections both instream and within passage facilities at diversion dams. Estimate mark detection efficiencies, juvenile entrainment rates and juvenile passage and survival rates within selected facilities using locally-generated data and, as needed, upstream and downstream detection sites. Advise YN Fisheries Managers on mark detection strategies and mark release numbers and timing for estimating juvenile passage and bypass survival rates at Yakima Basin diversion dams. Estimate detection efficiency of instream antenna arrays and assist YN Fisheries Managers with design and placement of arrays to maximize efficiency. Work with YN Fisheries Managers to identify potential passage problem areas and to develop recommendations for improving fish passage.
Survival Rates, Travel Times and Return Rates of Juvenile Release Groups
Estimate juvenile survival and travel time from marking or release to downstream passage at instream antenna arrays, Prosser Dam and McNary Dam for differentially-marked hatchery and wild Yakima Basin salmonids including: Spring, Summer, and Fall Chinook, Coho, Sockeye, and Summer Steelhead. Estimate return rates of juvenile release groups and juvenile marking, release or instream detection to adult return at Columbia River dams and Yakima Basin dams and other mark detection sites. Estimate straying rates of marked adults within and outside the Yakima Basin. Statistically compare variables, including survival and travel time, among stocks, treatment types, broodstock crosses and/or release locations. Advise YN Fisheries Managers on the numbers of marked fish to release and on replication strategies to develop reliable estimates and comparisons of juvenile survival rates from release to instream antenna arrays, Prosser Dam and McNary Dam, and return rates of adults to various locations in the Yakima Basin.
Monitoring and Evaluation of Populations Status and Trends Monitor variability in fish population abundance and productivity indices by brood year and outmigration year in relation to local and Columbia Basin-wide limiting factors. Assist YN Fisheries Managers with designing studies to quantify predator impacts on rearing and outmigrating juvenile salmon and steelhead in the Yakima Basin, and analyzing study results. Assist YN Fisheries Managers with strategies to limit predation impacts on juvenile salmon and steelhead in the Yakima Basin.
Knowledge, Skills and Abilities:
Training and relevant experience in statistical evaluation and analysis in fisheries or another biological field transferable to fisheries disciplines.
Familiarity with querying large databases and manipulating local datasets using database, statistical, and programming software.
Ability to distill and communicate complex technical information to policy and lay audiences.
Ability to collaborate and build relationships with a variety of individuals and organizations.
Understanding of the larger ecological and management issues addressed by one’s own specialized work.
Ability to work outdoors on occasion, possibly under arduous conditions.
General Recruiting Indicators:
Master of Science Degree with concentration in animal population biology and statistics AND at least 3 years of relevant, professional work experience.
Fisheries education and work experience is desirable but not required.
Special Requirements:
Required to pass a pre-employment drug and alcohol test.
Must Possess or have the ability to obtain a Washington State Driver’s License and be able to obtain a Yakama Nation driving permit.
Yakama Enrolled Preference, but all qualified applicants are encouraged to apply. | http://blogs.evergreen.edu/mesweekly/2018/05/24/job-fisheries-statistician-yakima-nation-human-resources-department-nelson-springs-wa/ |
They’re nowhere near as complicated as the 1 bit ALU boards, but they do contain the accumulator circuit as discussed in our “Introduction to Digital Computers Part 4 video, along with a single tristate circuit for allowing the contents to be written to our bus, as discussed elsewhere in the same video.
These accumulator circuits are used as-is with the accumulator of our transistor-based circuit, and with additional circuitry for our flags register.
Of course this will take a while to build–and I have another 1,000 transistors and resistors on order (because ordering in bulk is cheap)–so hopefully I will be able to demonstrate a working accumulator with the ALU circuit built earlier.
Fortunately the boards (which implement the logic for a 1 bit accumulator) are not quite as complicated.
This is starting to get exciting, because instead of just showing addition we can show state, that is, we can show intermediate results being stored away and used for subsequent operations. | https://hackingden.com/2018/12/27/my-accumulator-boards-just-showed-up/ |
Monday, July 17th 2017, 07:32:26 AM Published at Amanda Holguin, Industrial And Scruffy Stylish Bachelor’s Apartment Apartment. The bathroom include a stroll‐in shower also is concealed with a drape from the bedroom to make it stay private. A huge flooring to ceiling bookshelf is put amid two spaces, so it does not take requisite floor area in the two major zones.
Apartment Amanda Holguin, Saturday, May 06th 2017, 07:21:22 AM. The bathroom gives prominence to brick-inspired white tiles, a shower, a toilet parted with a wall plus a vanity with a wooden counter. Blue textiles bring to your mind that it's a marine-inspired space plus also link the area to the remaining of the apartment.
Decorating Ideas Amanda Holguin, Friday, May 05th 2017, 15:57:14 PM. A brick building, which he rebuilt plus renovated, got fresh gridded steel mounting windows with an inner courtyard, they conduct much light in. Open the prospective of the site, Davies' plan noticed the renovation of the native brick covering of the building, keeping the historic design when running with an engineer to reduce the noticeable interior formation, exposing the double‐height space.
Home Design Amanda Holguin, Thursday, May 04th 2017, 15:22:09 PM. Wood is the most important material that was used in every part of the project, covering inside the residence. The interior walls, floor as well as ceiling are padded with wood and this produces a warm with extremely cozy ambiance in the absence of making an impression of a rustic feel. It assists that the decor is minimalist as well as mostly focused on what is practical also functional.
Apartment Amanda Holguin, Wednesday, May 03rd 2017, 07:00:57 AM. This apartment accomplishes a perfectly unique atmosphere, through the designers observation at the everlasting features of modern trends. Ageless classics like wall panels also ceiling moldings encounter with more modern features to produce light as well as add monumentality to this fairly small house.
Home Design Amanda Holguin, Thursday, April 27th 2017, 07:46:41 AM. This contemporary concrete house located in Switzerland is designed by MLZD Architecture plus it displays industrial also contemporary décor at its finest as well.
Home Design Amanda Holguin, Wednesday, April 26th 2017, 07:24:22 AM. An open idea interior design is created inside the house which is able to exploit the natural light. The clearness of the room describes the place of neat furniture layout generated by the contemporary furniture. The contemporary home interior design ideas are also described by the use of glass element inside the house which enhances the sleek feature of the interior.
Living Amanda Holguin, Tuesday, April 25th 2017, 07:17:24 AM. Located in the middle of dense woods in the wilderness of Lago Ranco, Chile, this building offers its amazing wooden house design for you. This cottage shows a great wooden home which is designed by elton + léniz arquitectos asociados. Modern home design is used by the architectural firm of the house to give you the comfort of modern living experience despite of its secluded location.
Recent Posts
Categories
Archives
Static Pages
Copyright © 2004–2017 ~ Home Interior. All Rights Reserved.
Any content, trademark/s, or other material that might be found on this site that is not this site property remains the copyright of its respective owner/s. In no way does Home Interior claim ownership or responsibility for such items, and you should seek legal consent for any use of such materials from its owner. | http://kramont.com/tag/glass-door-bathroom/ |
The recent dismissal of Black Hills Energy’s proposed “buy all, sell all” renewable energy tariff exemplifies South Dakota’s need to examine the benefits provided by residential solar to the electrical grid and determine a fair compensation rate for that energy.
Under the proposed tariff, grid-tied customers with distributed generation systems, such as residential solar panels, would have been required to sell all of their self-generated energy to the utility at a reduced rate, and then buy it back at retail price. The docket generated more than 130 public comments and was dismissed by the Public Utilities Commission after both the utility and the intervenors agreed to a settlement requiring them to collaboratively examine alternative solutions over a two-year period.
Privately generated solar offers numerous benefits to utilities and the grid, such as providing greater electrical reliability and reducing energy demand during peak hours, which lowers the cost for everyone.
Multiple states, including Minnesota, have conducted Value of Solar (VOS) studies to quantify the value of privately-generated solar and set a fair compensation rate. VOS studies calculate the savings provided by avoided transmission, fuel, and other costs. In 2020, Iowa passed Senate File 583, which wrote net-metering into law and authorized an independent VOS study. The bill was supported by utilities, agriculture groups, trade associations, and environmental groups.
South Dakota would benefit by taking a similar approach and conducting a VOS study to determine the fair value of excess solar energy sent back to the grid. | https://www.cfra.org/blog/energy-tariff-highlights-need-examine-value-solar |
Computational Complexity and other fun stuff in math and computer science from Lance Fortnow and Bill Gasarch
Thursday, August 22, 2013
P = NP and the Weather
In the Beautiful World, my science fiction chapter of The Golden Ticket where P = NP in a strong way, I predicted that we could predict weather accurately enough to know whether it will rain about a year into the future. Besides putting Novosibirsk on the wrong side of Moscow, my weather prediction prediction has drawn the most ire from my readers.
Here was my thinking: Weather forecasting comes down to modeling. Find a good model, use the current initial conditions and simulate the model. P = NP can help dramatically here by making what should be the hardest part, finding the right model, easy. P = NP would help create much better models and should lead to far more accurate and deep forecasts than before. A year ahead prediction of weather didn't seem out of the realm of possibility.
As my readers point out, one cannot put in all of the initial conditions which would involve too much data even if we could get it, and small random events, the so-called butterfly effect, could dramatically change the weather in even a short period of time. Dean Foster, a Penn statistician, wrote me a short piece giving an analogy to a game of pool over time changed by the gravity generated by a single proton.
So how far can you predict the weather if P = NP? A month? Of course we'll probably never find out since I doubt P and NP are the same. In retrospect I shouldn't have put in such an aggressive weather forecasting because it detracts from other great things that happen if P = NP such as curing cancer.
Case 1 Future weather can be predicted by a machine that runs in P (as an oracle correctly assures us), but whose runtime is not provably in P. Is weather prediction effectively in P?
Case 2 It turns out that future weather is random, but sampling the weather distribution is NP-hard. Bob's start-up company has a PTIME weather-simulation algorithm, that samples from a distribution that requires exponential resources (in space and/or time) to distinguish from the "true" NP-hard weather distribution. Is weather simulation effectively in P?
Case 2B Bob's start-up company has a PTIME quantum-simulation algorithm that (as with the weather-simulation algorithm) produces simulated measurements that are sampled from a distribution that requires exponential resources (in space and/or time) to distinguish from the "true" distribution of measurements. Is quantum simulation effectively in P?
Case 3 A proof is found that PvsNP is undecidable in homotopy type theory (HOTT), but the proof does not extend to a stronger axiom system (ZFC, for example). Should the Clay Institute rescind its PvNP Millenium prize, on grounds that the problem is uninteresting? More broadly, how strong does an axiom system have to be, for a proof of PvNP undecidability in that system to cause us to conclude that PvNP is "really" undecidable, such that we abandon the search for a "meaningful" proof?
The point is that these marginal questions can be settled only by (1) strong proofs and (2) refined definitions and (3) (possibly) adjusted axioms.
Summary PvNP is a triple-threat problem, with plenty of real-world implications.
As a followup to Case 2B, a recent preprint "Boson-Sampling in the light of sample complexity" (arXiv:1306.3995), by Christian Gogolin, Martin Kliesch, Leandro Aolita, and Jens Eisert, discusses John Preskill's notion of "quantum supremacy" in light of the same class of questions that Lance's weather example raises.
The overall point (perhaps) is that 20th century researchers envisioned an utopian future of quantum supremacy in which quantum computers solved problems that provably were not in P. Now in the 21st century, we are coming to concretely appreciate the reasons why a future in which none of the envisioned elements of quantum supremacy are achievable — even in principle! — might be both more utopian and more realistic that the traditional quantum vision … and therefore more hopeful and interesting.
It may be that the optimal weather model is itself computationally intractable (beyond P or NP). Quite plausibly, one would need to model an exponentially large number of elements to obtain optimal estimates. The real question is, what is the information-theoretically-optimal weather prediction?
In 2008, Lance Fortnow's reviewer wrote to me:"A Turing machine cannot diagonalize against itself as the author claims he can do without proof. I urge the author to write the program for this machine to realize the impossibility of this task". The paper contained a Prolog meta-interpreter where every line of a program is a Turing machine that diagonalizes against itself (semantically), using Fuzzy Logic Programming.
Since Fuzzy Logic Programming is a foreign area for complexity theorists. In 2009/2010, I modified my proof using the lambda-calculus Kleene-Rosser paradox which Laszlo Babai (ToC) rejected as the Kleene-Rosser paradox recognition problem is undecidable In 2011, Luca Trevisan (JACM) rejected a similar paper on the grounds that the Kleene-Rosser paradox is undefined.
In 2013, I proved (in JACM submission) that
1. KRP is defined iff KRP is undefined.2. KRP is decidable iff KRP is undecidable, over both the lambda-calculus and Turing machine.
==> All mathematical theories are inconsistent.
It is (philosophically) trivial to realize in order to effectively model a set of infinite numbers, one needs a mathematical language whose alphabet MUST be infinite.
See: http://kamouna.wordpress.com, for discussions with the FOM (Foundations of Mathematics) mailing list.
Apparently a simple example can lead to very deep (weird?) thoughts and Lance was right that he shouldn't have used a difficult problem, like the weather, as an example but rather an easy one, like a cure for cancer. Seems to me that there is indeed a question of does there exist a model of reasonable size that can be used to predict the weather (looks a bit like an NP-problem doesn't it?). If it does, and P=NP, then we can find it. (Guess one; use it; don't toss it as long as it predicts correctly; seems a perfect poly-time guess-verify strategy, that must work provided such a model exists).
The "Golden Ticket" is a nice, easy going, introductory, popular science book(let) about one of the most important questions of our time. As such, it is an unparallelled success. People shouldn't however take matters (and themselves) too seriously and dig deep into the text and dig up all sorts of ... let me just stop there.
--------------------Leen's Great Truth "People shouldn't however take [complexity theoretic] matters too seriously and dig deep into the text [of complexity-theoretic narratives such as The Golden Ticket]"--------------------
Leen, you have expressed a Great Truth whose dual Great Truth is worth contemplating,
--------------------Leen's Dual "People should take complexity theoretic matters very seriously and should dig deep into the texts of complexity-theoretic narratives [such as The Golden Ticket]"--------------------
Dick Lipton and Ken Regan's recent Gödel's Lost Letter essay, titled "Move the Cheese", addresses some of the reasons why engineers in particular should embrace Leen's dual. And an even finer Leen-dual essay (as it seems to me) is Wendell Berry's Thomas Jefferson Lecture in the Humanities for 2012, titled "It All Turns On Affection".
Summary The STEM community's "cheese" has moved; far too many young STEM "mice" are starving for lack of family-supporting jobs; essayists like Wendell Berry and William Thurston speak to the nourishment that all mice (of all ages and all occupations) require; in particular the traditional STEM cheeses of "quantum supremacy and the complexity zoo" are destined to be supplanted by new, more abundant cheeses; if we are diligent, imaginative, daring, and lucky, perhaps these new STEM cheeses may even prove to be more tasty and nourishing than the traditional STEM cheeses.
An NWP model solve a set of partial differential equations for which nobody knows how to compute an analytical solution. Almost all approximation algorithms (explicit and implicit time integrators) are polynomial in nature, but the time require to run them is large because
- the timestep is limited by the CFL criterion for explicit method. Considering that the equations of the fluids can support acoustic and gravity wave (fast moving wave), the constrain can be very important. Even if an implicit method is used, accuracy (precipitation and turbulence duration can be short) impose a limit on the time step.
- the grid required to run a simulation over the whole planet at high resolution (say less than 1 km in the horizontal and a few meters in the vertical) is very large. Problem get worse when a latlon grid is used because there is a singularity at the pole.
- if you google about data assimilation methods like extended kalman filter or 4D-VAR, you will see that producing initial conditions are probably a place where P=NP would imply improvement in the models, but P=NP would change nothing about the main problem : the full covariance matrix is quite big and problematic to fit in the memory of a real computer.
I think the fundamental problem with using the example of weather prediction is that finding the right model in practice is not a problem in which complexity theory is very useful. In practice finding the right model, and mathematical modeling, in general, are not decision problems as we think of them in terms of complexity. (Also how would you verify if you had the "right model" a priori any way?) Mathematical modeling often requires very specific domain knowledge (eg weather, biology) as well as wise choice of the variables that capture that knowledge and their nature (eg discrete, stochastic, etc.) Where complexity theory is really useful in modeling is helping determine how quickly and efficiently as solution can be found if at all with known algorithms, or if new algorithmic work is necessary, and how many resources such as memory, CPUs, and time would be necessary to find a suitable solution for the model. This latter point on resources is extremely nontrivial because this could be the difference between having a model you can use meaningfully and not having one at all (i.e., it's a beautiful model, but you'll need to wait a few years to get any results.)
| |
---
abstract: 'We discuss the relation between the power carried by relativistic jets and the nuclear power provided by accretion, for a group of blazars including FSRQs and BL Lac objects. They are characterized by good quality broad band X-ray data provided by the Beppo SAX satellite. The jet powers are estimated using physical parameters determined from uniformly modelling their spectral energy distributions (SEDs). Our analysis indicates that for Flat Spectrum Radio Quasars the total jet power is of the same order as the accretion power. We suggest that blazar jets are likely powered by energy extraction from a rapidly spinning black hole through the magnetic field provided by the accretion disk. FSRQs must have large BH masses ($10^8 - 10^9 M_{\odot}$) and high, near Eddington accretion rates. For BL Lac objects the jet luminosity is larger than the disk luminosity. This can be understood within the same scenario if BL Lac objects have masses similar to FSRQ but accrete at largely subcritical rates, whereby the accretion disk radiates inefficiently. Thus the “unification” of the two classes into a single blazar population, previously proposed on the basis of a spectral sequence governed by luminosity, finds a physical basis.'
author:
- 'Laura Maraschi & Fabrizio Tavecchio'
title: 'The Jet-Disk Connection and Blazar Unification'
---
Introduction
============
The formation of highly relativistic jets in Active Galactic Nuclei is one of the most fundamental open problems in astrophysics. It is currently assumed that jets are produced close to the central black hole, involving power extraction from the black hole spin (Blandford & Znajek 1977) and/or from the accretion disk (Blandford & Payne 1982). In both scenarios the magnetic field must play a major role in channelling power from the BH or from the disk into the jet; in both cases it should be sustained by matter accreting onto the BH, leading to expect a relation between the accretion power and the jet power.
Estimates of the power of jets and of the associated accretion flows can therefore be crucial to shed light on the jet-disk connection . In a pioneering work Rawling & Saunders (1991) addressed this question studying a large sample of radio galaxies. They used the narrow line luminosity as indicative of the accretion power and estimated the power transported by the jet from the energy content and lifetime of the radio lobes, finding a good correlation between the two. This result has been confirmed with larger and deeper samples and with different power “estimators” (e.g. Willot et al. 1999; Xu, Livio & Baum 1999). However, due to the indirect nature of the estimators used, the “calibration” of the relation in terms of jet power and accretion power remains uncertain. Celotti, Padovani & Ghisellini (1997, hereafter CPG) first investigated the relation between jet and disk using the direct radio emission of the jet close to the nucleus, as resolved by VLBI, for the jet power estimation. They considered a large sample of objects (55), mostly blazars (including 12 BL Lac objects) and derived the accretion luminosity from the broad emission lines when available. They found a suggestive hint of correlation between these two quantities, although the statistical significance was too low to draw a firm conclusion.
Blazars are in fact the best laboratories to study the physics of relativistic jets. Their emission (from radio to gamma-rays) is dominated by the beamed non-thermal continuum produced in the jet (Urry & Padovani 1995). Their SEDs are in general well understood as synchrotron plus IC emission. When observations of both components are available, the basic physical quantities of the emission region can be derived in a robust way, allowing to estimate the jet power in the region closest to its origin (e.g. Tavecchio et al. 2000, hereafter Paper I). Particularly interesting for the study of the jet-disk connection are those blazars showing thermal features directly related to the central accretion flow, such as the so-called blue bump and/or the bright emission lines produced in the Broad Line Region.
In the present work we consider a relatively small group of bright blazars (11 FSRQs and 5 BL Lacs) with good wavelength coverage, basing jet power estimates on physical parameters derived from uniformly modelling the observed SEDs (Tavecchio et al. 2002, hereafter Paper II). All these objects have broad band X-ray spectra (0.1 - 100 keV) from [*Beppo*]{}SAX observations. As discussed below (section 2) the information on the X-ray continuum is crucial in order to have reliable estimates.
The plan of the paper is as follows. In Section 2 we describe the objects and the adopted method for estimating the power of the jet. We then compare the jet powers with their luminosities (integrated over angles), deriving the jet radiative efficiencies, and the jet luminosities with the accretion luminosities estimated from the blue bump or line strengths (Section 3). The derived relation between jet luminosity and accretion luminosity is discussed in Section 4 taking into account the radiative efficiencies and compared with the expectation of current models. Implications for a scenario of blazar unification are considered. The conclusions are presented in Section 5. Throughout the paper we assume $H_0=50$ km s$^{-1}$ Mpc$^{-1}$ and $q_0=0$.
Preliminary results were presented in Maraschi & Tavecchio (2001a) Maraschi & Tavecchio (2001b) and Maraschi (2001).
Sample and General Model
=========================
In view of a reliable estimate of the power carried by the relativistic jet we require uniform “good quality” data on their SEDs. These are commonly modelled with synchrotron and IC radiation from a uniform emission region. Both components must be observationally constrained in order to derive the physical parameters of the emitting region (Tavecchio et al. (1998); see further discussion below).
In practice the broad band coverage (0.1-100 keV) allowed by the BeppoSAX satellite is essential. In fact, in the case of FSRQs the X-ray emission derives from the Inverse Compton mechanism (with seed photons external to the jet (EC) and in some cases an additional contribution from the synchrotron photons (SSC)). The X-ray data then fall on the low energy branch of the IC component, constraining the electron spectrum at low energies, which is particularly important in the power estimate (see below). In the case of BL Lacs, whose SEDs peak at higher frequencies, the X-ray data constrain the position of the synchrotron peak, while information on the IC peak is provided by observations in the $\gamma
$-ray (GeV range) or in the TeV domain.
Specifically the selection criteria for the sources considered are the following. The FSRQs belong to a subsample of the 2-Jy catalogue by Padovani & Urry (1992; 50 sources) with a threshold of $F_{\rm 1\,
keV}>0.5 \mu$Jy (19 objects) chosen in order to obtain good [ *Beppo*]{}SAX spectra up to 100 keV. 12 objects have been observed until now. In Paper I we discussed three of them, namely 0836+710, 1510-089 and 2230+114; another 6 sources are analyzed in Paper II (0208-512, 0521-365, 1641+399, 2223-052, 2243-123, 2251+158) and 2 sources (3C279, PKS 0537-441) are discussed elsewhere (Maraschi et al. 1998; Ballo et al. 2002; Pian et al., submitted). For 0528+134, for which good data on the SED are available (Ghisellini et al. 1999) we were unable to find the line luminosity in the literature and for this reason it was excluded from our sample.
The 5 BL Lac objects were chosen so as to have a well measured SED near the synchrotron peak complemented by information on the IC peak. They are the two TeV sources Mkn 421 and Mkn 501 (for which simultaneous observations are used; Maraschi et al. 1999, Tavecchio et al. 2001), PKS 2155-304 (Chiappetti et al. 1999), ON231 (Tagliaferri et al 2000) and BL Lac itself (Ravasio et al. 2002). Other BL Lacs with $Beppo$SAX data and $\gamma $-ray information (from EGRET) are 0716+714 and 0235+164, but for 0716+714 the redshift is unknown, while 0235+164 shows a peculiar phenomenology, possibly due to gravitational lensing (e.g. Webb et al. 2000). Both were therefore excluded from the present analysis.
The observational information on the SEDs is given in the above papers. The physical parameters of the jets were rederived uniformly reproducing all the SEDs with a synchrotron + inverse Compton model including both the synchrotron and external photons as seed photons (SSC+EC).
We adopt a one-zone model, in which the radiation is produced in a homogeneous emitting region by a single electron population. One-zone models are supported by a number of observational evidences, at least for the spectral range from the gamma-ray band down to the optical-IR band. In particular, the observations of correlated variability at different frequencies suggest co-spatial production of low and high energy photons via the two mechanisms (synchrotron + IC) by the high energy branch of the electron population (e.g. Ulrich, Maraschi & Urry 1997; Urry 1999; Giommi et al. 1999, Maraschi et al. 1999; Sambruna 2000; Sikora & Madejski 2001). In general the one-zone model predicts synchrotron self absorption in the FIR /submm range. Thus it cannot account for the radio emission, which is thought to be due to the superposition of self-absorbed synchrotron components produced further out ($d \gta 0.1$ pc) along the jet (e.g. Blandford & Konigl 1979). The one zone model considered here naturally appears as the innermost component of the inhomogeneous jet model.
As shown in Tavecchio et al. (1998) for the case of a one zone synchrotron+SSC model, the knowledge of the frequency and luminosity of both the synchrotron and IC peaks, together with the upper limit on the size of the emission region derived from variability, allows to univocally determine the model parameters. In the case, particularly relevant for the present work, in which the IC component is dominated by scattering of external radiation, the model involves an additional parameter, that is the energy density of the external radiation field. However (see e.g. Paper I and the discussion below) the latter quantity can be estimated with reasonable confidence from the available luminosities of the emission lines and/or the UV bump. Therefore, given sufficient observational information on both peaks, in both the SSC and EC models reliable estimates of the basic physical quantities of the jet can be derived.
For a complete description of the model we refer to the Appendix. We just recall that a phenomenological description of the electron spectrum was adopted (analogous to a broken power-law): $$N(\gamma )=K\gamma ^{-n_1}\left( 1+ \frac{\gamma }{\gamma _b
}\right)^{n_1-n_2} \,\,\,\,\,\,\,\,\, \gamma _{\rm min} < \gamma <
\gamma _{\rm max}$$ where $K$ is the normalization factor, $\gamma _b$ is the Lorentz factor of electrons at the spectral break, $n_1$ and $n_2$ are the spectral indices below and above the break, respectively and $\gamma _{\rm min}$ and $\gamma _{\rm max}$ are the minimum and the maximum energies of the relativistic electrons. For Mkn 501 we used a slighly modified electron energy distribution (see Tavecchio et al. 2001), with the addition of an exponential high energy cut-off.
The viewing angle is assumed to be $\theta \sim 1/\Gamma $ where $\Gamma
$ is the bulk Lorentz factor of the emitting plasma; in these conditions the Doppler factor $\delta \simeq \Gamma$. This choice, which eliminates the angle to the line of sight as an independent parameter, may appear arbitrary for individual objects; however, it can be justified for a group of objects. In fact, for fixed $\delta $ (derived from the spectral modeling), the probability of observing a source at an angle $\theta $ is maximal around $\theta \sim 1/\Gamma $, since this is the maximum angle allowed for a given $\delta $: thus, for a group of sources, as in the case discussed here, we expect that the [*average*]{} viewing angle is close to $1/\Gamma $. A known exception is the case of 0521-365, for which various indicators suggest that the jet forms a relatively large angle with the line of sight (Pian et al. 1996). Assuming that the bulk Lorentz factor of the emitting plasma is similar to that of the other blazars, $\Gamma _{\rm b} \sim 10$, this implies that the emission from 0521-365 is weakly boosted. Here we assumed $\Gamma=10$ and $\theta
=15^{\rm o }$, implying $\delta=3$.
The external radiation field is described as a black-body with temperature $T\simeq 10^4$ K and energy density $U_{\rm ext}$. Uncertainties in the temperature (to within factors of a few) do not strongly affect the determination of other physical parameters. The most important parameter is the energy density $U_{\rm ext}$. The latter can be derived from the luminosity of the broad line region (BLR) and/or of the accretion disk by $U_{\rm ext} = L_{\rm BLR}/4\pi R_{\rm BLR}^2c$ and $L_{\rm BLR}=\tau L_{\rm disk}$ (where $\tau $, usually assumed to be $\sim 0.1$ represents the fraction of the central emission reprocessed by the BLR and $R_{\rm BLR}$ its radius ). For sources showing a clear UV bump we used $L_{\rm disk}=L_{\rm UV}$, while for the other cases $L_{\rm
BLR}$ was derived from the luminosity of the observed broad emission lines, applying correction factors as used by CPG. $R_{\rm BLR}$ was adjusted in the fits but the derived values were found to agree within a factor of 2 with those predicted by the correlation of Kaspi et al. (2000) between $R_{\rm BLR}$ and $L_{\rm BLR}$.
In the case of BL Lac, ON231, 0836+710, 1510-089 and 2230+114 the models for the SEDs presented in the original papers (Ravasio et al. 2002, Tagliaferri et al 2000, Paper I) were computed with different hypothesis on the electron energy distribution (Ghisellini et al. 1998). Electrons were assumed to be continuously injected in the emitting region, with a power-law distribution with index $n_{\rm inj}$, extending from $\gamma
_{\rm min}$ to $\gamma _{\rm max}$. The equilibrium distribution reached as a result of cooling has then a double-power law shape, with energy indices $n_1=2$ for $\gamma < \gamma _{\rm min}$ and $n_2=n_{\rm inj}+1$ for $\gamma > \gamma _{\rm min}$. Therefore, in this model the spectral index of the low-energy portion of the emitted spectrum is fixed to be $\alpha _1=0.5$ and the peak of the SED corresponds to electrons with $\gamma = \gamma _{\rm min}$, which plays the same role as $\gamma _b$ in the model adopted in the present paper. Notably, although some of the parameters obtained with the two versions of the model are different, important derived quantities such as powers and luminosities (see next sections) appear to be rather stable (within a factor of 2-3) against the details of the model adopted, supporting the consistency of our results. Table 1 reports the list of sources, their redshifts and the values of the parameters derived from modeling the SEDs.
Radiative Jet Luminosity and Power
==================================
The kinetic power of the jet, i.e. the energy flux of the relativistic flow through a section $\pi R^2$ of the jet, is given by: $P_{\rm
jet}=\pi R^2 \beta c \,U \Gamma ^2$ (e.g, CPG) where $U=U_B+U_e+U_p$ is the total energy density in the jet frame, due to magnetic field, relativistic electrons and, if present, protons ($L_{\rm jet}$ = $ L_{\rm
B} + L_{\rm e} + L_{\rm p}$). The energy density in particles is given by $U_e + U_p=n_em_ec^2[<\gamma >+(n_p/n_e) (m_p/m_e)]$ where $n_e=\int_{\gamma _{\rm min}} ^{\gamma _{\rm max}} N(\gamma)d\gamma $ is the electron density and $<\gamma >$ is the average Lorentz factor of electrons.
The critical parameter determining $P_{\rm jet}$ is the total number of particles, which in turn depends on the energy spectrum of the electrons below $\gamma_b$ and on the value of $\gamma _{\rm min}$. For FSRQ both quantities can be inferred from the shape of the X-ray spectrum. In particular values of $\gamma _{\rm min} >> 1$ would produce an unobserved break in the X-ray continuum (e.g. Paper I). Moreover in several cases our data exclude an important contribution from cold pairs, whose presence should produce a “bump” in the soft X-ray spectrum (Sikora et al. 1997).
We will assume that the jet is composed by a normal plasma with 1 (cold) proton per relativistic particle. This hypothesis is justified below. For uniformity we evaluate $P_{\rm jet}$ with $\gamma _{\rm min}=1$ for all the objects: the power should then be considered as an [*upper limit*]{} to the actual power of the jet. An increase of a factor 10 in $\gamma_{\rm min}$ (which cannot be excluded in all cases) would lower the estimated powers by a factor 5-10, depending on the value of $n_1$.
For BL Lac objects X-rays can derive from the synchrotron component or from IC emission produced through SSC. In both cases the emission is produced by high-energy electrons, $\gamma >1000 $ in the case of synchrotron and $\gamma \sim 100$ for SSC. Thus the SEDs contain less stringent information on the amount of low energy particles in the jet, in particular on the value of $\gamma _{\rm min}$ and on the index $n_1$. Since we work in the perspective of a unified model we will assume also for BL Lacs an equal number of protons and electrons and $\gamma
_{\rm min}\sim 1$.
The derived jet powers are reported in Table 2. Table 2 shows that the magnetic field tends to be close to equipartition with the relativistic particles in FSRQs but largely below equipartition in BL Lacs, especially in TeV sources ($U_e/U_B\sim 10-100$). The latter result has been recently independently found by other authors and appears to be rather robust (see in particular the discussion of Kino et al. 2001). Clearly in all cases the total jet power is dominated by protons, while the magnetic field and relativistic electrons give minor contributions.
An important quantity is the total radiative luminosity ($\L_{\rm jet}$) of the jet, integrated over the whole solid angle in the observer frame. This is derived from the observed apparent luminosity correcting for beaming (e.g., Sikora et al. 1997): $L_{\rm jet}= \frac {L_{\rm obs}}
{\delta^4} \Gamma ^2 \simeq \frac {L_{\rm obs}} {\Gamma ^2}$. $L_{\rm
jet}$ represents the [*minimum*]{} power that must be associated with the jet in order to produce the observed luminosity, i.e. a [*lower limit*]{} to $P_{\rm jet}$.
In Fig 1 we compare the radiative luminosities of jets with the powers provided by the electron component only. The dotted line indicates the relation $L_{\rm e}=L_{\rm jet}$. In most cases the power associated with the electron component alone is is insufficient or at best marginally sufficient to sustain the jet beyond the inner emission region. Analogously, the Poynting flux associated with the transport of magnetic field is too small, unless other components or complex geometries for the magnetic field are invoked. Thus a proton contribution seems the most natural to explain the transport of energy to large distances.
In Fig. 2 $L_{\rm jet}$ is compared with the total power estimated including protons $P_{\rm jet}$. There is a well defined correlation between the two quantities (probability$>$99.9%, slope=$1.12\pm 0.17$), extending over a range of about 4 orders of magnitude. Notably, BL Lac objects appear to lie on the same (linear) correlation with powerful quasars, supporting the view that these two classes of Blazars have similar jets.
The radiative efficiency, $\eta = L_{\rm jet}/P_{\rm jet}$, turns out to be in the range 10 – 1 %. It is interesting to note that similar values are naturally predicted by the internal shock scenario, recently proposed for Blazars by Spada et al. (2001).
The Jet-Disk Connection
=======================
The disk luminosity $L_{\rm disk}$ was estimated either directly from the optical-UV luminosity of the blue bump attributed to an optically thick accretion disk (e.g. Sun & Malkan 1989) or from the luminosity of the broad emission lines (assuming $\tau =0.1$), using the relations proposed by CPG. For 3C279 we used the luminosity of the blue bump identified in the IUE data by Pian et al (1999) we checked that this luminosity is close to 10 times the luminosity estimated from the emission lines. For BL Lacs, except for BL Lac itself, for which a broad emission line has been observed (Corbett et al. 2000) one can only derive upper limits to the luminosity of the (putative) accretion disk (CPG).
Fig. 3 shows the radiative luminosity of the jet, $\L_{\rm jet}$, against the disk luminosity $L_{\rm disk}$. A dotted line represents the equality of the two. It is apparent that for high luminosity blazars (FSRQ) $\L_{\rm jet}$, which represents the minimal power transported by the jet, is [*of the same order*]{} as the luminosity released in the accretion disk. The situation is different for low luminosity blazars (BL Lac objects). For the latter objects the jet luminosity is [ *higher* ]{} than the estimate/upper limits on their disk luminosity. Since $\L_{\rm jet}$ is obtained from the observed SED with only a beaming correction the results above are largely independent of the theoretical model adopted and in particular of the assumptions concerning the proton component which enter in the estimate of $P_{\rm jet}$.
In view of a more quantitative discussion it is however essential to convert the derived luminosities into powers taking into account radiative efficiencies for both the jet and the disk. Let us define $L_{\rm jet}=\eta P_{\rm jet}$ and $L_{\rm disk}=\epsilon P_{\rm
acc}$. As discussed in Sect. 3, $\eta \sim 0.1-0.01$, where the higher value holds for high luminosity jets. On the other hand, for high luminosity blazars where the blue bump and/or broad lines are observed, the accretion disk is also extremely luminous (see Fig. 3). It is then natural to assume that the disk should have efficiency close to standard, that is $\epsilon \simeq 0.1$, otherwise implausibly high accretion rates, as large as 10 solar masses per year would be required. The radiative efficiencies for the jet and disk are then of the same order so that comparable luminosities $L_{\rm jet} \simeq L_{\rm disk}$ imply comparable powers : $P_{\rm jet} \simeq P_{\rm acc}$. This near equality, though difficult to achieve according to presently available models (see below), represents the main result of our analysis.
For low luminosity blazars $\eta \sim 0.01$ and $\L_{\rm jet} > L_{\rm
disk} $. Assuming that the relation $P_{\rm jet} \simeq P_{\rm acc}$ is verified for all blazars, in order to account for a jet luminosity [*larger*]{} than the disk luminosity a very low radiative efficiency for the disk is implied. This can be naturally explained if the accretion flow in these systems has the structure of an “ion torus” (Rees et al. 1982) or ADAF (Narayan et al. 1998) whereby the inefficient cooling keeps the flow geometrically thick, supported by the pressure of hot ions. Such configurations are possible if the accretion rate is largely sub-Eddington.
This scenario then suggests that the range of powers observed in blazars is due essentially to a range in accretion rate onto black holes of equally large masses.
Discussion
----------
Two main classes of models for the formation of jets consider either extraction of rotational energy from a rapidly spinning black hole, the Blandford & Znajek (1977, BZ) process, or magnetohydrodynamic winds arising from the inner regions of accretion disks (MHD) (Blandford & Payne 1982). In the latter scenario jets would be powered solely from the accretion process through the action of the magnetic field. Livio et al. (1999) show that the power extracted through the latter mechanism can be important. For reasons of global consistency it would seem however difficult that in this type of model a large fraction (of order 1) of the accretion power could be channeled into a highly relativistic outflow.
The complex analysis of BZ can be summarized in the well known expression: $$P_{BZ}\simeq \frac{1}{128}B_0^2 r_g^2 a^2 c \,\,\,\,\,$$ where $r_g$ is the gravitational radius and $a=j/j_{\rm max}$ the adimensional angular momentum of the BH, $a=1$ for a maximally rotating black hole (e.g. Thorne et al. 1986). The critical problem is the estimate of the intensity reached by the magnetic field threading the event horizon, which must be provided by the surrounding matter.
Let us take as reference an extreme approximation i.e. a spherical free fall accretion flow. Assuming equipartition of magnetic and kinetic energy density ($B_0^2/ 8\pi \simeq \rho c^2$) as a 0 order approximation to the physical picture envisaged for the “plunging” region (Krolik 1999), it is easy to find that
$$P_{BZ} = g a^2 P_{acc}= g a^2 \dot{m} 10^{47} M_9 a^2 \,\,\,\,\, {\rm erg/s}$$
where $P_{acc}=\dot{M}c^2$ is the accretion power and $g$ is $1/64$. $\dot{m}=\dot{M}c^2/L_{\rm Edd}$ is the accretion rate in Eddington units and $M_9$ is the black hole mass in units of $10^9$ $M_{\odot }$. This simple formula shows clearly that even when the jet is produced at the expense of the black hole rotational energy the generated power is closely linked to the accretion rate. Eq. (3) is shown as a dashed line in Fig.3 (assuming $\eta\simeq\epsilon\simeq 10^{-1}$) and is clearly insufficient to account for our results.
In the case of disk accretion one expects higher densities and plausibly higher fields. Ghosh & Abramovicz (1997; GA) discussed the possible field strengths threading the black hole horizon on the basis of the disk model of Shakura and Sunyaev (1973). Their results are shown in Fig.3 as continuous lines (efficiencies as above). It is interesting to note that when the disk is in the gas pressure dominated regime ($\dot{m} < 10^{-3}$) ratios $L_{\rm jet} / L_{\rm disk}$ not far from unity are indeed obtained ($g\simeq 1$). However, due to the pressure saturation introduced by the formation in the disk of a radiation pressure dominated region (horizontal branches in Fig.3), the model fails to explain the large powers observed in the jets of bright quasars, even for maximal rotation and large BH masses ($g<<1$ for $\dot{m} > 10^{-3}$).
Our results, pointing to a high yield for the jet production mechanism, underline the need of further investigations of the BZ process in more general conditions, both for the disk model (e.g. $\beta $-disk models Sakimoto & Coroniti 1981) and for its interaction with a fast spinning black hole. In fact it has been suggested that dynamical effects and frame dragging by the rotating hole may restore $g$ to values of order 1 or even larger (Krolik 1999, Meier 1999, 2001).
The scenario indicated by our results involves a substantial equality of the jet and accretion powers which could hold for all blazars. High luminosity blazars including highly polarised, optically violently variable quasars (HPQ, OVV) or more generically quasars with flat spectrum radio cores (FSRQ) owe their properties to a high, near critical accretion rate, which accounts at the same time for the presence of bright accretion disks and of powerful jets. Low luminosity blazars (otherwise called BL Lacs) where clear signatures of an accretion disk are not found, can be explained by largely subcritical accretion rates, giving rise to radiatively inefficient accretion flows and low power jets. Thus there is no “genetic” difference between FSRQs and BL Lac objects and the blazar population can be “unified” and described in terms of a single parameter ($\dot m$).
The idea that the power scale of blazars corresponds to a scale of accretion rates in objects with essentially similar (large) masses and high angular momentum ($a\sim 1$) also provides a physical basis to understand the “spectral sequence” of blazars proposed by Fossati et al. (1998). The latter paper showed that the spectral energy distributions (SED) of blazars change systematically with luminosity in the sense of a shift of the emission peaks towards higher frequencies with decreasing luminosity. The modelling (Ghisellini et al. 1998) showed that the particles radiating at the peaks have lower energies in higher luminosity objects, which was interpreted as due to a larger density of ambient photons resulting in a larger cooling rate. The scaling proposed here supports this view, in the sense that, due to the ADAF like accretion flow, less powerful jets find a much cleaner ambient in the transition region from the black hole to the parsec scale.
The evolutionary aspects of this scenario have been explored by Cavaliere & D’Elia (2002) and found to be in agreement with present data on the number counts. Moreover Cavaliere & D’Elia (2002) also discuss reasons for the correlation between luminosity and the average shapes of the SEDs. Within a closely similar scenario Böttcher & Dermer (2002) developed a specific model of the expected SEDs introducing a number of hypotheses and parameters.
In particular Cavaliere & D’Elia (2002) and Böttcher & Dermer (2002) proposed that the blazar spectral sequence also traces an evolutionary sequence, from young FSRQs to the older BL Lac objects. FSRQs are rich of gas and therefore are characterized by large accretion rates while BL Lac objects represent evolved sources depleted of gas, with faint nuclear emission and low power jets. Our results provide a solid basis to these speculations.
This scenario can be observationally tested taking advantage of the correlations between the mass of the central black hole and the host galaxy properties (e.g. Merritt & Ferrarese 2002) for estimating the black hole masses in blazars of different types. Treves et al. (2001) measured the host galaxies around a large number of BL Lacs. Their results (see also Urry et al. 2000; Scarpa et al. 2000) show that the magnitudes of the host galaxies have relatively little scatter and are independent of the luminosity of the BL Lac. Assuming (e.g. Ferrarese & Merritt 2000) that the central black hole mass correlates with the mass of the bulge and therefore with the magnitude of the galaxy one can derive (to zero order) that the BH mass is similar in all these objects. More accurate estimates are possible measuring the stellar velocity dispersions of the host galaxies for which the intrinsic correlation with black hole mass is thought to be much tighter. Using the latter method Barth, Ho & Sargent (2002) derived a black hole mass of $10^9$ $M_{\odot}$ for Mkn 501 yielding for this object a highly subcritical accretion rate, in complete agreement with our expectations.
Conclusions
===========
Estimates of the powers transported by the jets of a small group of FSRQs and BL Lac objects, for which broad band spectra have been obtained with [*Beppo*]{}SAX, were derived by modelling their overall SEDs with the widely accepted Synchrotron/Inverse Compton emission model. Comparing jet powers and luminosities with estimates of the accretion luminosity derived from the optical-UV spectra, we find that for the most powerful blazars the power carried by the jet is of the same order as the accretion power. Moreover comparing the respective jet and accretion luminosities of FSRQ with those of BL Lacs with data of comparable quality on their SEDs, we find that for the latter the jet luminosity is higher than the upper limits on the accretion luminosity.
Taking into account the radiative efficiencies of both the jet and the accretion disk, we infer that the mechanism of jet production must have high efficiency (in terms of $\dot{M}c^2$) favoring energy extraction from a Kerr Hole rather than a hydromagnetic wind generated by an accretion disk.
In view of the various approximations used the conclusions above can only be regarded as tentative. Nevertheless the available evidence suggests that the main parameter governing the total power and the ratio between jet and accretion luminosity is the [*accretion rate*]{}. In FSRQs the accretion rate must be high, near Eddington. This can explain the large powers and the contemporaneous presence of thermal signatures associated with efficient disk accretion. The absence of thermal signatures in BL Lac objects (and in low power radio galaxies) can be ascribed to a highly subcritical accretion disk with low radiative efficiency.
The unification of the two classes of sources into a single blazar population, previously proposed on the basis of a spectral sequence governed by luminosity (Fossati et al.,1998; Ghisellini et al.,1998) and recently revisited by Cavaliere & D’Elia (2002) and Böttcher & Dermer (2002) finds therefore a physical basis.
The scenario is testable through measurements of the properties of the host galaxies of blazars of different types, leading to estimates of the central black hole mass.
The homogeneous synchrotron-Inverse Compton model
=================================================
We give here the full description of the model used to reproduce the SED of blazars adopted in our work.
The emission region is assumed to be a sphere (“blob”) with radius $R$, uniformly filled by a tangled magnetic field with intensity $B$ and isotropic relativistic electrons with energy distribution $N(\gamma
)$. The region is in motion with velocity $\beta c$ and bulk Lorentz factor $\Gamma $ at an angle $\theta $ with respect to the line of sight. Relativistic effects in the emitted radiation are then taken into account by the relativistic Doppler factor $\delta $, defined by: $$\delta =\frac{1}{\Gamma(1-\beta \cos \theta)}$$ The electron distribution is described (for $\gamma _{\rm min}< \gamma
< \gamma _{\rm max}$) by the law (in the following physical quantities are expressed in the comoving frame): $$N(\gamma )=K\gamma ^{-n_1}\left( 1+ \frac{\gamma }{\gamma _b
}\right)^{n_1-n_2}
%\exp(-\gamma/\gamma_{\rm max})$$ where $K$ \[cm$^{-3}$\] is a normalization factor (it represents the density of electrons with $\gamma =1$), $\gamma _b$ is the break Lorentz factor, $n_1$ and $n_2$ are the spectral indices below and above the break, respectively. This law represents a double power-law distribution with a smooth connection. This particular form for the distribution function has been assumed on a purely phenomenological basis, in order to describe the curved shape of the SED.
Once the parameters are specified, the outcoming spectrum is calculated using the standard single-electron synchrotron emissivity (e.g. Rybicki & Lightman 1977) and the IC emissivity including the full Klein-Nishina cross section given by Jones (1968). Specifically:
- In the case of the synchrotron emission the emissivity at a given frequency $\nu _s $ is calculated using the relation: $$j_s(\nu _s )=\frac{1}{4\pi }\int _{\gamma _{\rm min}}^{\gamma _{\rm
max}} N(\gamma) P(\nu _s , \gamma) d\gamma
\label{synchro}$$ where $P(\nu _s , \gamma)$ is the standard specific power emitted by a single electron with Lorentz factor $\gamma $. The spectrum is calculated between the two limit frequencies $\nu _{s,1} $ and $\nu _{s,2} $, where $\nu _{s,1} $ is the self absorption frequency (calculated using the approximation (obtained for the slab geometry) given in Ghisellini et al. 1985) and $\nu _{s,2} $ is the maximum frequency, evaluated as the typical synchrotron frequency of electrons with energy $\gamma _{\rm
max}.$, $\nu _{s,2} \sim 2.8 \times 10^{6} B \gamma _{\rm max}^2$.
- For the calculation of the IC spectrum we adopt the single-electron emissivity $j_C(\nu _C ; \gamma, \nu _{\rm t})$ (function of the electron energy $\gamma mc^2$ and of the soft photon frequency $\nu _{\rm t}$) calculated by Jones (1968) (see also Blumenthal & Gould 1970). The total emissivity $j_C(\nu _C)$ is calculated by integrating the single-electron emissivity over the soft photon spectrum and the electron energy distribution (from $\gamma _{\rm min}$ to $\gamma _{\rm max}$): $$j_C(\nu _C )= \int _{\gamma _{\rm min}}^{\gamma _{\rm
max}} N(\gamma)\int _{\nu _{\rm t, min} }^{\nu _{\rm t,
max} }n_t (\nu _{\rm t} ) j_C(\nu _C; \gamma, \nu _{\rm t} ) d\nu _{\rm
t} d\gamma
\label{IC}$$ where $n_t (\nu _{\rm t} )$ is the numerical density of target photons, $n_t (\nu _{\rm t} ) = U (\nu
_{\rm t} )/h\nu _{\rm t} $. The energy density $U (\nu _{\rm t} )$ of the soft target photons is calculated as follows:
$\bullet $ In the case of the energy density of the synchrotron target photons is calculated with (e.g. Ghisellini et al. 1998): $$U (\nu )=\frac{4\pi R}{3c} j_s (\nu
)
\label{uradsinc}$$ where $\nu _{\rm t, min} $ and $\nu _{\rm t, max} $ are fixed to $\nu _{s,1} $ and $\nu _{s,2} $, respectively.
$\bullet $ For the calculation of the we need a prescription to model the external radiation field. We assume that the spectrum of the external radiation is characterized by a blackbody-like spectrum with temperature $T$ and total luminosity $L_{\rm ext}$, diluted in a spherical region with radius $R_{BLR}$ (typically of the order of the radius of the Broad Line Region). The external radiation energy density (in the ) is: $$U_{\rm obs}^{\rm ext}(\nu _{\rm obs})=\frac{L_{\rm ext}(\nu _{\rm obs})}{4\pi
R_{BLR}^2 c}
\label{uext}$$ Due to relativistic amplification effects the (angle averaged) energy density seen in the blob’s reference frame will be: $$U ^{\rm ext}(\nu )=\Gamma U_{\rm obs}^{\rm ext}(\nu _{\rm obs}=\nu / \Gamma).
\label{uextcom}$$\
Comoving emissivities are used to calculate the observed fluxes as follows:
-Synchrotron and SSC emissions are transformed according to the standard relations (e.g. Lind & Blandford 1985): $$F_{\rm obs}(\nu _{\rm obs}) = \frac{\delta ^3}{D^2} j(\nu =\nu _{\rm
obs}/\delta) V
\label{fampl}$$ where $D$ is the luminosity distance and $V$ the comoving emitting volume.
-As pointed out by Dermer (1995) the beaming of the external radiation field in the source frame introduces a supplementary $\delta $ term in the calculation of the final flux. Dermer’s calculation assumed a number of approximations, namely a single power-law electron distribution, the Thomson cross-section, a monochromatic external radiation field and extreme beaming (assuming that photons enter the source only head-on): thus we can not directly apply his results (expressed by the supplementary term $\delta ^{1+\alpha}$, where $\alpha $ is the power-law index of the IC spectrum) to our more complex model. However, in the case $\delta = \Gamma$ (as assumed in the present work), the effect of the anisotropy is taken into account simply assuming Eq.(\[fampl\]) and using Eq.(\[uextcom\]) for the energy density.
Ballo, L. et al. 2002, ApJ, 567, 50
Barth, A. J., Ho, L. C., & Sargent, W. L. W. 2002, ApJ, 566, L13
Blandford, R. D. & Znajek, R. L. 1977, MNRAS, 179, 433
Blandford, R. D. & Konigl, A. 1979, ApJ, 232, 34.
Blandford, R. D. & Payne, D. G. 1982, MNRAS, 199, 883
Blumenthal, G. R. & Gould, R. J. 1970, Reviews of Modern Physics, 42, 237.
B[ö]{}ttcher, M. & Dermer, C. D. 2002, ApJ, 564, 86
Celotti, A., Padovani, P., & Ghisellini, G. 1997, MNRAS, 286, 415
Chiappetti, L. et al. 1999, ApJ, 521, 552
Corbett,E. A., Robinson, A., Axon, D. J., & Hough, J. H. 2000, MNRAS, 311, 485
Ferrarese, L. & Merritt, D. 2000, ApJ, 539, L9
Fossati, G., Maraschi, L., Celotti, A., Comastri, A., & Ghisellini, G. 1998, MNRAS, 299, 433
Ghisellini, G., Celotti, A., Fossati, G., Maraschi, L., & Comastri, A. 1998, MNRAS, 301, 451
Ghisellini, G. et al. 1999, A&A, 348, 63
Ghosh, P. & Abramowicz, M. A. 1997, MNRAS, 292, 887
Giommi, P. et al. 1999, A&A, 351, 59.
Jones, F.C. 1968, Phys. Rev., 167, 1159
Kaspi, S., Smith, P. S., Netzer, H., Maoz, D., Jannuzi, B. T., & Giveon, U. 2000, ApJ, 533, 631
Kino, M., Takahara, F. & Kusunose, M., 2002, ApJ, in press
Krolik, J. H. 1999, ApJ, 515, L73
Livio, M., Ogilvie, G. I., & Pringle, J. E. 1999, ApJ, 512, 100
Maraschi, L. et al. 1998, The Active X-ray Sky: Results from BeppoSAX and RXTE, Eds.: L. Scarsi, H. Bradt, P. Giommi and F. Fiore, Nuclear Physics B, 69, p. 453
Maraschi, L. et al.1999, ApJ, 526, L81
Maraschi, L. & Tavecchio F., 2001a, in “X-ray Astronomy 2000”, published in ASP Conference series, eds. R. Giacconi, L. Stella, & S. Serio, 2000, p.437
Maraschi, L. & Tavecchio F., 2001, in Blazar demographics and Physics, Eds. P. Padovani & C.M. Urry, ASP Conf. Series 227, p. 40
Maraschi, L., 2001 presented at the 20th Texas Symposium, 10-15 Dec. 2000
Meier, D. L. 2001, ApJ, 548, L9
Meier, D. L. 1999, ApJ, 522, 753
Merrit, D., Ferrarese, L., 2002, to appear in “The Central Kpc of Starbursts and AGN”, ed. J. H. Knapen, J. E. Beckman, I. Shlosman & T. J. Mahoney
Narayan, R., Mahadevan, R., & Quataert, E. 1998, Theory of Black Hole Accretion Disks, eds. M. A. Abramowicz, G. Bjornsson, and J. E. Pringle, 148
Padovani, P. & Urry, C. M. 1992, ApJ, 387, 449
Pian, E., Falomo, R., Ghisellini, G., Maraschi, L., Sambruna, R. M., Scarpa, R., & Treves, A. 1996, ApJ, 459, 169
Pian, E. et al. 1999, ApJ, 521, 112
Ravasio, M. et al. 2002, A&Ap, 383, 763
Rawlings, S. & Saunders, R. 1991, Nature, 349, 138
Rees, M. J., Phinney, E. S., Begelman, M. C., & Blandford, R. D. 1982, Nature, 295, 17
Rybicki, G.B., & Lightman, A.P., 1979, [*Radiative Processes in Astrophysics*]{}, John Wiley & Sons.
Sakimoto, P. J. & Coroniti, F. V. 1981, ApJ, 247, 19
Sambruna, R. M. 2000, GeV-TeV Gamma Ray Astrophysics Workshop : towards a major atmospheric Cherenkov detector, AIP Conference Proceedings, Vol. 515.19.
Scarpa, R., Urry, C. M., Falomo, R., Pesce, J. E., & Treves, A. 2000, ApJ, 532, 740
Shakura, N. I. & Sunyaev, R. A. 1973, A&A, 24, 337
Sikora, M. & Madejski, G. 2001, High Energy Gamma-Ray Astronomy, AIP Proceedings, volume 558, p. 275.
Sikora, M., Madejski, G., Moderski, R., & Poutanen, J. 1997, ApJ, 484, 108
Spada, M., Ghisellini, G., Lazzati, D., & Celotti, A. 2001, MNRAS, 325, 1559
Sun, W. & Malkan, M. A. 1989, ApJ, 346, 68
Tagliaferri, G. et al. 2000, A&A, 354, 431
Tavecchio, F. et al. 2000, ApJ, 543, 535 (Paper I)
Tavecchio, F. et al. 2001, ApJ, 554, 725
Tavecchio, F. et al. 2002, ApJ, in press (Paper II)
Thorne, K. S., Price, R. H., & MacDonald, D. A. 1986, Black Holes: The Membrane Paradigm, New Haven, CT, Yale University Press
Treves, A., et al. 2001, Conference proceeding “Issues in Unification of AGNs”, Marciana Marina, May 21-24 2001; to be published in PASP Conference Series
Ulrich, M., Maraschi, L., & Urry, C. M. 1997, ARA&A, 35, 445.
Urry, C.M. and Padovani, P. 1995, PASP, 107, 803
Urry, C. M. 1999, Astroparticle Physics, 11, 159.
Urry, C. M., Scarpa, R., O’Dowd, M., Falomo, R., Pesce, J. E., & Treves, A. 2000, ApJ, 532, 816
Webb, J. R., Howard, E., Ben[' i]{}tez, E., Balonek, T., McGrath, E., Shrader, C., Robson, I., & Jenkins, P. 2000, AJ, 120, 41
Willott, C. J., Rawlings, S., Blundell, K. M., & Lacy, M. 1999, MNRAS, 309, 1017
Xu, C., Livio, M., & Baum, S. 1999, AJ, 118, 1169
1.5 truecm
**Figure Captions**
1 truecm
[llcccccccc]{}\
Source & $z$ &$R$ & B & $\delta$ & $\gamma _{\rm b}$ & n$_1$& $n_2$ & $K$ & $U_{\rm BLR}$\
& & $10^{16}$ cm& G& & & & & cm$^{-3}$ & $10^{-3}$ erg cm$^{-3}$\
0208-512(PKS)& 1.003 &1.5& 1.5 & 18& 100& 1.4& 3.8& $2\times 10^4$& 15\
0521-365(PKS)& 0.055&2.0& 0.3& 3$^*$ & $8.8\times 10^3$ & 1.25& 4 &$3\times 10^3$ & 0.1\
0537-441(PKS)& 0.89 & 4.65 & 2.1 & 10 & 400 & 1.6 & 3.4& $3.5\times 10^3$ & 33\
0836+710(4C71.07) & 2.172 &4& 3& 16& 50& 1.6& 4.0& $5\times 10^4$& 54\
1253-055(3C279)& 0.538 & 5 & 0.5 & 12.3 & 600 & 1.6 & 4.2 & $4.5\times 10^3$ & 0.1\
1510-089(PKS)& 0.361& 3& 1.5& 19& 50& 1.7& 3.6& $6\times 10^3$& 0.8\
1641+399(3C243)& 0.593& 4.0& 2.9& 9.75& 200& 1.5& 4.2& $2.8\times 10^3$& 30\
2223-052(3C446)& 1.4&4.25 & 5.6& 17& 135& 1.6& 4.3& $1.7\times 10^3$& 18\
2230-014(CTA102)& 1.037& 3& 1.65& 18& 55& 1.9& 3.4& $3\times 10^4$& 6.5\
2243-123(PKS)& 0.63& 3.5 & 2.5& 15& 250& 1.6& 4.3& $1.7\times 10^3$& 18\
2251+158(3C454.4)& 0.859& 4.0 & 1.5& 12& 60& 1.8& 3.4& $5\times 10^4$ & 10\
1101+384(Mkn 421)& 0.03 &1& 0.06& 20& $3\times 10^5$ & 2.2& 5.3 &$4\times 10^4$ & -\
1219+285(ON231)& 0.102& 0.7& 0.8& 14& $5\times 10^3$& 2& 3.9& $5\times
10^3$&-\
1652+398(Mkn 501) & 0.03 &0.19& 0.32& 10& $1.1\times 10^5$ & 1.5& 3 & 750 & -\
2155-304(PKS)& 0.117& 0.3 & 1 & 18 & $3.2\times 10^4$ & 2 & 4.85 & $5\times 10^4$ & -\
2200+420(BL Lac)& 0.07& 0.2& 1.5& 20& $10^3$& 1.9& 3.8& $2\times 10^5$ &-\
\
[lccccc]{} Source & $L_{\rm disk}$ & $L_{\rm jet}$& $P_{\rm e}$ & $P_{B}$ & $P_{\rm jet}^*$\
name & $10^{46}$ erg s$^{-1}$ & $10^{46}$ erg s$^{-1}$ & $10^{46}$ erg s$^{-1}$ & $10^{46}$ erg s$^{-1}$ & $10^{46}$ erg s$^{-1}$\
0208-512& 0.5& 0.7& 0.5& 0.12&50.8\
0521-365& 0.024$^{**}$& 1.0$^{\rm a}$& 0.7& 0.05&5.4\
0537-441& 2.0$^{**}$& 2.18& 0.6& 0.8&14.6\
0836+710& 10.0& 17.3& 2.7& 2.7&500.0\
1253-055& 0.2& 6.0& 0.2& 0.04&90.0\
1510-089& 0.5& 0.12& 0.2& 0.6&50.0\
1641+399& 3.7$^{**}$& 1.1& 0.15& 0.8&12.0\
2223-052& 8.5$^{**}$& 1.2& 0.17& 8.2&24.7\
2230-014& 2.0& 1.0& 0.2& 0.2&220.0\
2243-123& 2.0& 0.4& 0.1& 0.83&12.0\
2251+158& 6& 45.7& 1.0& 0.4&290.0\
1101+384& $<5\times 10^{-4**}$& $5\times 10^{-4}$& 0.05& 0.001&42\
1219+285& $<5\times 10^{-4**}$& $1\times 10^{-2}$& 0.004& 0.003 & 0.74\
1652+398& $<2\times 10^{-4**}$& $5\times 10^{-3}$& 0.004& $1.5\times 10^{-5}$&0.014\
2155-304& $<$0.017 & $2.5\times 10^{-4}$& 0.02& 0.002&2.5\
2200+420& $2\times 10^{-4**}$& $2.3\times 10^{-2}$& 0.01& $4.5\times 10^{-4}$&1.4\
\
\
| |
Krav Maga is a reality based self-defence system that was developed in Israel, originally for use in the military, and is now used by civilians for self-defence. Literally translated as ‘contact combat’ Krav Maga teaches practitioners all aspects of dealing with violent confrontations, from avoidance and de-escalation, to fighting when necessary and escaping the danger zone.
Krav Maga is extremely effective and also relatively easy to learn because the techniques are based upon the body’s own natural reactions. This means that what you learn in training is much more likely to be retained and activated under the stress of a real-life violent situation than something that is very complicated.
Krav Maga teaches practitioners many things including:
- How to defend against strikes and kicks
- How to escape from grabs and holds
- How to deal with threats from knives and guns
- How to defend against knife attacks
- How to deal with multiple attackers
- Fighting and defending on the ground
History of Krav Maga
The system was developed by Imi Lichtenfeld, a Hungarian born Jew, who grew up in Bratislava in Slovakia in the 1920s. A talented boxer, wrestler and gymnast, Imi, with the help of other young Jewish men, stood up against the anti-Semitic gangs that were causing havoc in much of Europe during the 1930s. It was during these confrontations that he first realized that boxing and wrestling weren’t sufficient to use in the street against real attacks, often involving weapons and multiple attackers, and so he began to develop what would later become Krav Maga.
With the outbreak of war, Imi eventually fled the Nazi occupation of Europe and headed for Palestine in 1940. Once he arrived there his fighting abilities were quickly recognised by Israel’s pre-state military organisations and he began training soldiers in his fledgling system.
For 20 years Imi served in the IDF (Israeli Defence Force) as Chief Instructor of Physical Fitness and Krav Maga. After he retired from the military in 1964 he began teaching the system to civilians for self-defence purposes, first in Israel then, with the help of his top students, the rest of the world.
The Principles of Krav Maga
The basic principle of Krav Maga is to do as much damage to your attacker in the shortest possible time in order to escape and get to safety. This is done by using counter-attacks at the earliest opportunity to overwhelm the attacker making them either unwilling or unable to continue hurting you. You want to switch from defending to attacking as quickly as possible. Attacks are aimed at the most vulnerable parts of the body – meaning those that can’t be conditioned and will be effective on everyone regardless of size – for example the eyes, the groin, and the throat.
Krav Maga as a system contains both technical and tactical elements. The technical side deals with learning self-defence techniques to escape from specific situations, as well as more general fighting skills. The tactical side of Krav Maga involves things like situational awareness, avoiding and preventing danger, and scanning for further dangers after an attack is over. Combining these two elements makes Krav Maga a highly effective self defence system. | https://www.directdefencekravmaga.co.uk/about/about-krav-maga |
The utility model relates to a self-circulation driving device for vehicle energy, wherein, a damping device is hung on each wheel; gear racks on the damping device move due to vehicle gravity and bumpiness of roads and the like, and the mechanical energy generated by the movement of the gear racks is transmitted to a hydraulic pump through a gear so as to enable high pressure oil to enter an energy collecting unit, and the mechanical energy is converted into hydraulic energy; the high pressure oil enters an oil collecting constant-pressure device which is divided into two oil circuits after oil pipes are communicated with a dividing valve, elements in the two oil circuits operate at a synchronous speed, the oil circuits are communicated with a solenoid valve through the oil pipes, two groups of crankshaft link mechanisms and bevel gears are driven to move, and the hydraulic energy is converted into mechanical energy; and a power generator is sequentially connected with a voltage regulator stabilizer, a rectifying charger, a battery pack, a variable-frequency governor and a high power motor to drive each wheel to rotate, and the mechanical energy is converted into electrical energy. Energy conversion is carried out for three times by utilizing necessary kinetic energy generated by a vehicle, the energy drives the vehicle to move and can be used in a circulatory manner, and the self-circulation driving device has the advantages of energy conservation, environmental protection, simple structure, economy and practicability. | |
On appeal, the Supreme Court of Colorado reversed most of the trial court ruling, finding only one severable portion of the ordinance to be unconstitutionally vague.4 In so holding, the supreme court stated:
“While it is clear that [art. II, § 13] is an important constitutional right, it is equally clear that this case does not require us to determine whether that right is fundamental…. Rather, we have consistently concluded that the state may regulate the exercise of that right under its inherent police power so long as the exercise of that power is reasonable.”5
The supreme court concluded that, in its judgment, “the evidence presented to the trial court undeniably demonstrates that the ordinance is reasonably related to a legitimate governmental interest and constitutes a valid exercise of the state’s police power on the right to bear arms in self-defense.”6 The case was then remanded to the trial court, and much of the ordinance was eventually upheld by the Court of Appeals of Colorado.7
The Supreme Court of Colorado has only applied art. II, § 13 twice to overturn a law. In People v. Nakamura, the supreme court struck down a statute prohibiting unnaturalized foreign-born residents from owning or possessing firearms.8 Although the court noted that it is a valid exercise of the police power for the Colorado Legislature to prohibit aliens from hunting or killing wild game (which was, ostensibly, the purpose of the law), “it cannot disarm any class of persons or deprive them of the right…to bear arms in defense of home, person or property…[u]nder this constitutional guaranty, there is no distinction between unnaturalized foreign-born residents and citizens.”9 Thirty-six years later, in City of Lakewood v. Pillow, a municipal ordinance barring the possession or use of any deadly weapon except in one’s home was found to be unconstitutionally overbroad, in part because the ordinance violated art. II, § 13 by prohibiting the possession of a firearm in a vehicle or at a place of business for self-defense purposes.10
In People v. Ford, the court held that a statute imposing a “flat prohibition” on firearm possession by certain felons violated art. II, § 13 as applied to a defendant presenting competent evidence that his or her purpose in possessing firearms was the defense of home, person, or property.11
In 2002, the Court of Appeals of Colorado considered a challenge to two Denver ordinances which precluded most citizens from carrying unconcealed firearms on their person, or from carrying concealed firearms in motor vehicles.12 After noting that the supreme court’s decision in Robertson (see above) did not expressly state whether the art. II, § 13 “right” to bear arms is a fundamental right, the court of appeals found that:
“[B]y requiring that restrictions on the right be only reasonable, rather than necessary, the court essentially applied the rational basis test in evaluating the constitutionality of a city ordinance that implicated the right to bear arms. Therefore, we conclude that the court implicitly found that the right to bear arms is not a fundamental right.”13
Using the rational basis test, the court found that “Trinen has not met his burden of establishing beyond a reasonable doubt that the restrictions are so severe as to render the ordinance unconstitutional.”14 The court also noted that the affirmative defenses in the Denver ordinances expressly allow the activities that the City of Lakewood v. Pillow case (see above) protected.15. In addition, the court rejected plaintiff’s preemption claims, holding that there was no conflict with Colorado law. Please see the Local Authority to Regulate Firearms in Colorado summary for further information.
More recently, the Court of Appeals of Colorado rejected the defendant’s argument that the U.S. Supreme Court’s decision in Heller would require Colorado courts to take a different approach with respect to art. II, § 13 of the Colorado Constitution.16 In People v. Cisneros, the court held that the increased risk of death or injury allowed a state to “reasonably regulate the combination of drugs and weapons,” and that “a statute limiting the right to bear arms in self-defense should be held unconstitutional under the Colorado Constitution only if the defendant establishes that the statute does not regulate ‘under [the state’s] police power in a reasonable manner.’”17
Colorado law states, in part, “Section 13 of article II of the state constitution protects the fundamental right of a person to keep and bear arms.”18 There are no cases construing this provision. | https://giffords.org/lawcenter/state-laws/state-right-to-bear-arms-in-colorado/ |
During the 1990s, in a bid to address immediate labor shortages and mitigate the potential impact of declining fertility rates, the Singaporean government implemented a series of initiatives to make the country a more favorable destination for immigrants. China proved to be an important source of immigration given its abundant supply of the skilled and unskilled workforce that Singapore desired. The cultural background of immigrants from mainland China was thought to be compatible with the majority- ethnic Chinese composition of the Singaporean population, given that 76 % are of Chinese ethnicity (NPTD et al. 2014). Successive waves of Chinese immigration have accentuated Singapore’s reputation as a key site where Chinese ethnicity, identity and culture are expressed as part of a wider Chinese diaspora landscape. The growing number of new Chinese immigrants (xin yimin) arriving in the country through the different immigration schemes made available by the Singaporean state has served to deepen the variegation of the “Chinese diaspora,” a label that has been conceptually interrogated by scholars of Chinese overseas studies such as Wang (1991) and Suryadinata (1997).
E.L.-E. Ho (*) • F.Y. Foo
National University of Singapore, Singapore, Singapore © The Author(s) 2017
M. Zhou (ed.), Contemporary Chinese Diasporas, DOI 10.1007/978-981-10-5595-9_5
Singapore has a majority population of ethnic Chinese (74.3 % compared with 13.3 % Malays, 9.1 % Indians and 3.2 % other ethnic groups in 2015; Department of Statistics Singapore 2016). Most Chinese-Singaporeans were born in Singapore and assert claims of natal belonging that differentiate them from those who were born elsewhere. They distinguish themselves from coethnics born and bred in mainland China (Ho 2006). However, the new Chinese immigrants who left China after 1979 are far from homogenous, and their migration experiences can be periodized according to the conditions in China at the time of departure and the type of migration route they took to get to Singapore. We argue that these contextual factors have an impact on immigrants’ attitudes toward integration and the extent of their integration. In the wider literature on integration, one view is that it is the host country that sets the expectations and guidelines for integration. Immigrants are expected to internalize them and thereby become subjects of the state (Lewis and Neal 2005). Some scholars question such notions of integration (Ehrkamp 2006), highlighting that immigrants inevitably bring with them characteristics from their homeland, remaining culturally different from the host society (Nagel 2005). Such debates about integration tend to focus on visible cultural difference such as those to do with ethnicity or religion. Much less has been said about the cultural diversity and differences between coethnics who have converged in immigration societies at different times (for an exception, see Liu 2014). This chapter discusses integration expectations in Singapore, which is experiencing a new wave of immigration from China. It also considers the integration experiences of new Chinese immigrants, and the intraethnic tensions between Chinese-Singaporeans and new Chinese immigrants, as well as differences among the new Chinese immigrant population. This discussion contributes to a more nuanced understanding of the Chinese diaspora at a time when greater emphasis is being placed on human mobility as a resource for driving national progress and wealth accumulation.
The chapter focuses on new Chinese immigrants who have permanent residency or citizenship status. The Singaporean government approaches the integration of permanent residents and citizens separately from that of low-skilled workers. Low-skilled migrant workers are treated as a transient presence because their visas are tied to fixed-term contracts and they do not have the option of applying for long-term residency status. For this group the policy goal has been to minimize alleged social problems; in comparison, highly skilled or capital-bearing foreigners are treated as subjects to be socialized into Singaporean norms and values.
This chapter is based on 28 interviews conducted with 20 immigrants during 2014-2015 (we conducted repeat interviews with a selection of interviewees). The interviewees comprised 12 male and 8 female immigrants, and their ages ranged from 35 to 65. All of them held Singaporean permanent residency status or citizenship. They had immigrated through the employment-pass scheme or as entrepreneurs and investors. The interviews were conducted in Mandarin and lasted for 45 minutes to two hours. The interviewees were recruited through personal contacts initially and subsequently through snowballing contacts. We are both Chinese- Singaporeans born and bred in Singapore but we have forged strong personal and professional networks in mainland China. We situate our analysis of immigration and integration debates in a wider ethnography of Singaporean society and its transnational links with China. Additional analyses of newspaper reports and policy were carried out to set the interview data in a policy context and a social context.
The next section contextualizes integration debates in Singapore’s history of immigration and nation-building. As a country built on past immigration flows, Singapore is facing new immigration today that challenges its approach to managing both ethnic diversity and coethnic relations. The section discusses government initiatives to encourage integration and the expectations of Singaporean society of immigrants. The subsequent section discusses the attitudes of new Chinese immigrants to the expectation that they will integrate. It highlights the platforms for integration they have used, in particular the links they forge with new Chinese clan associations in Singapore that are distinct from the pioneer clan associations associated with the Chinese immigrants of yesteryear. The section highlights the intraethnic tensions manifested among the different cohorts of ethnic Chinese in Singapore. Distinctions are drawn not only between Chinese- Singaporeans who consider the country their birthplace and see the newer arrivals as outsiders, but also among new Chinese immigrants according to their period of immigration. These dynamics underline the variegated nature of the Chinese diaspora. | https://m.ebrary.net/80797/management/chinese_diasporas_asia |
Who we are
Dutchna Tax Consultancy Ltd. is a registered corporation under the Alberta Business Corporations Act.
Our website address is: https://dutchna.com/
Translate option
Our site provides a translate option through a button at the top of the page. The translate functionality itself is provided by Google. Please note that this is machine translation which can be inaccurate. We provide this option only to give an impression of the content of our site to users of the French and Dutch languages. Please contact us in case of questions or remarks.
What personal data we collect and why we collect it
Feedback
When visitors send us feedback using the contact form on the site we collect the data shown in the contact form, the email address and also the visitor’s IP address and browser user agent string to help spam detection.
Newsletter
When a visitor subscribes to our newsletter, the visitor grants us permission to store the visitor’s email address and to use it for sending newsletters. A subscriber to our newsletter can unsubscribe at any time.
Cookies
Cookies are files with small amount of data that is commonly used as an anonymous unique identifier. These are sent to your browser from the website that you visit and are stored on your computer’s hard drive. | https://dutchna.com/privacy-policy/ |
This section illustrates how PROC MODECLUS can be used to examine the clusters of data in the following artificial data set.
data example; input x y @@; datalines; 18 18 20 22 21 20 12 23 17 12 23 25 25 20 16 27 20 13 28 22 80 20 75 19 77 23 81 26 55 21 64 24 72 26 70 35 75 30 78 42 18 52 27 57 41 61 48 64 59 72 69 72 80 80 31 53 51 69 72 81 ;
It is a good practice to plot the data to check for obvious clusters or pathologies prior to the analysis. In this example, with only two variables and a small sample size, the SGPLOT procedure in the following statements produces a scatter plot:
proc sgplot; scatter y=y x=x; run;
Figure 78.1 suggests three clusters. Of these clusters, the one in the lower-left corner is the most compact, while the lower-right cluster is more dispersed.
The upper cluster is elongated and would be difficult for most clustering algorithms to identify as a single cluster. The plot also suggests that a Euclidean distance of 10 or 20 is a good initial guess for the neighborhood size in density estimation and clustering.
Figure 78.1: Scatter Plot of Data
To obtain a cluster analysis in PROC MODECLUS, you must specify the METHOD= option; for most purposes, METHOD=1 is recommended. The cluster analysis can be performed with a list of radii (R=10 15 35), as shown in the following PROC MODECLUS statement. An output data set containing the cluster membership is created with the OUT= option. The following statements produce Figure 78.2 through Figure 78.5:
proc modeclus data=example method=1 r=10 15 35 out=out; run;
For each cluster solution, PROC MODECLUS produces a table of cluster statistics including the cluster number, the number of observations in the cluster, the maximum estimated density within the cluster, the number of observations in the cluster having a neighbor that belongs to a different cluster, and the estimated saddle density of the cluster. The results are displayed in Figure 78.2, Figure 78.3, and Figure 78.4 for three different radii. A smaller radius (R=10) yields a larger number of clusters (6), as displayed in Figure 78.2; a larger radius (R=35) includes all observations in a single cluster, as displayed in Figure 78.4. Note that all clusters in these three figures are "isolated" since their corresponding boundary frequencies are all zeros. Consequently, all the estimated saddle densities are missing. A table summarizing each cluster solution is then produced at the end, as displayed in Figure 78.5.
Figure 78.2: Results from PROC MODECLUS for METHOD=1 and R=10
Figure 78.3: Results from PROC MODECLUS for METHOD=1 and R=15
Figure 78.4: Results from PROC MODECLUS for METHOD=1 and R=35
Figure 78.5: Summary Table
The OUT= data set contains a complete copy of the input data set for each cluster solution. By using a BY statement in the following PROC SGPLOT statement, you can examine the differences in cluster memberships for each radius as shown in Figure 78.6 through Figure 78.8: | http://support.sas.com/documentation/cdl/en/statug/68162/HTML/default/statug_modeclus_gettingstarted.htm |
Best Online Shoe Stores
How awards are chosen
Award winners are chosen using a ranking algorithm that assesses each business on the number, quality and recency of customer reviews, and takes into account the business's overall star ratings, page visits, customer response rates and timeliness, and number of comments and questions submitted by the Sitejabber community in the past year.
The annual Sitejabber Customer Choice Awards were created to honor outstanding businesses that provide exceptional products or services to their customers. Each year, over 70,000 businesses with reviews from over 100 million consumers are considered, and Customer Choice Awards are earned by less than 1% of them.
| |
Q:
javascript or jquery, Click on a link and expand a div
I have been looking a js/jquery solution on the net and stackoverflow for a div that has a set height (example 20px;) and after the user clicks [read more] it opens to a height of auto or 150px; (full content)
Example:
<style>
.small {height: 20px;}
.big {height: auto;}
</style>
<div class="small">
<p>Lorenter code hereem ipsum dolor sit amet, consectetur adipisicing elit, sed do
eiusmod tempor incididunt ut labore et dolore magna aliqua.
Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris
nisi ut aliquip ex ea commodo consequat. Lorem ipsum dolor sit amet,
consectetur adipisicing elit, sed do eiusmod tempor incididunt
ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis
nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo
consequat.</p>
<a href="#">Click to read more</a>
</div>
Thanks for the help.
EDIT: Ive tried this:
In the href: onclick="javascript:toggleContent(this, true);"
Along with this:
<script type='text/javascript'>
$(window).load(function(){
comment_reply = function (id){
var e = $(id);
e.toggle();
}
});
</script>
The problem with that is the div expands on click rather than an [a href] I hope thats clear.
A:
Just to expand DIV, you can use following code:
$('.wrapper').find('a[href="#"]').on('click', function (e) {
e.preventDefault();
$(this).closest('.wrapper').find('.small').toggleClass('small big');
});
Where wrapper is used to let link being displayed
DEMO
UPDATED code
To make it collapse too:
DEMO
$('.wrapper').find('a[href="#"]').on('click', function (e) {
e.preventDefault();
this.expand = !this.expand;
$(this).text(this.expand?"Click to collapse":"Click to read more");
$(this).closest('.wrapper').find('.small, .big').toggleClass('small big');
});
| |
The Nissan Institute believes in education as a way to transform, contribute to and develop people for our society. As a result, our motto is Education for Citizenship.
After defining this motto, we designed three thematic areas to encompass the projects and initiatives we will conduct and/or support. All these areas, which are described below, include education, technology and innovation as cross-cutting concepts.
Following its revamp, the Nissan Institute began to work in two distinct ways with its external stakeholders: selecting and supporting social initiatives through public contests, and also conducting its own projects. These two areas of action are associated with the institute’s new motto. Thus, we plan to work with strategic projects that have the potential to generate major impacts in the communities where they are implemented and a high level of internal engagement among our employees.
Our third area of action is our volunteering program, called Volunteers of Value, which has now gained internal strength and specific guidelines related to our motto and thematic principles.
We are attentive to the needs of the locations where our sites are based. As a result, Nissan Institute and Volunteers of Value Program projects are geographically focused on the municipalities of Rio de Janeiro, São Paulo, Resende and São José dos Pinhais, and their respective metropolitan regions.
Whenever possible, we prioritize activities with partners, including public sector and third sector organizations. This is one of the main principles for social transformation: working in a network! After all, collective challenges require collective action!
Stakeholders
The Nissan Institute does not restrict itself to working with specific types of stakeholders. However, as it is an organization that values the concepts of diversity and inclusion, when selecting projects, it prioritizes those that involve diverse and inclusive groups, as it believes in the importance of building a culture in this area. | http://www.institutonissan.org.br/atuacao/?lang=en |
Conventional policy approaches, usually focused on a particular land-use change driver (e.g., specific commodities) or individual regulations (e.g., the Amazon Soy Moratorium), have consistently failed to achieve sufficient or sustained results. The swift reversal of Brazil’s earlier success in reducing Amazon deforestation – now again accelerated – offers perhaps the most sobering illustration of that.
Therefore, this article draws from scholarship on sustainability transitions to propose a more comprehensive systems view of unsustainable land-use patterns. The authors examine persistent tropical deforestation as a case of “lock-in,” using a transitions lens, and explore its constitutive elements.
As a case study, they analyze the situation of Land Reform settlements in the Brazilian Amazon, where as much as one-third of that biome’s deforestation takes place. While subject to some specific factors, those places are also enmeshed in a broader setting that is common across the Brazilian Amazon’s deforestation frontier (e.g., infrastructure conditions, market demands, and sociocultural norms).
Drawing from document analysis of Brazilian policies and fieldwork in three Land Reform settlements in Pará State, the authors expose multiple forms of techno-economic, institutional, and socio-cognitive lock-in that together drive deforestation systemically in those settlements. These drivers form a strongly consolidated socio-technical regime around large-scale agriculture that includes material and immaterial factors (e.g., cultural ones), a regime that not only resists change but also – like a vortex – pulls others into it.
Escaping deforestation lock-in may thus require outside forces to help local actors destabilize and eventually replace this unsustainable land-use regime. International zero-deforestation efforts offer a starting point, but a transition requires moving beyond piecemeal, incremental change or end-of-pipe approaches and toward concerted, strategic action that addresses multiple of those regime elements in a coordinated way to replace it as a system.
The authors argue that understanding deforestation lock-in is vital for tackling its worrisome persistence and that sustainability transitions theory offers an illuminating, but still underutilized, framework to analyze and eventually overcome unsustainable land use. | https://www.sei.org/publications/understanding-deforestation-lock-in/ |
- Christian Classics Ethereal Library – Hundreds of classic theological works in electronic format.
Writing Resources
- How to Prepare an Annotated Bibliography (Cornell University Library)
- Plagiarism (The University of North Carolina at Chapel Hill)
- Purdue Online Writing Lab (OWL) has free writing resources and instructional material to assist with many writing projects. Users can also submit brief writing-related questions.
- Criswell College Manual of Style (CCMS) A print copy is available on reserve at the circulation desk.
Theological Discussion Groups
- The Theology List – The Theology List is designed to encourage friendly discussion and debate in all areas of Evangelical Christian theology. In all discussions, the Bible is assumed to be inerrant; the standard to be used for the evaluation of any Christian theological belief. This list has been in operation since 1992.
Theological Resources
- Center for Reformed Theology and Apologetics
- Open Access Digital Theological Library (OADTL) – Open access resources in religious studies.
Biblical Studies Discussion Groups
- Biblical Studies List – The purpose of this list is to allow the interested person to post questions regarding the whole gamut of Biblical Studies. Archaeology, linguistics, exegesis, history, textual issues, all are legitimate areas of inquiry for this list.
- Biblical Greek List – B-Greek is a mailing list for scholars and students of Biblical Greek. Its main focus is upon understanding the Greek text of the Bible. Discussion topics include scholarly study of the Greek Bible and related Jewish and Christian Greek texts, tools for beginning and advanced students of Biblical Greek such as textbooks, reference works, bibliography and research tools, and linguistic topics such as morphology, lexicography, syntax,and discourse analysis.
- Biblical Hebrew List – B-Hebrew is an e-mail conference of academic professionals, teachers, students, clergy and laity, people of any faith, devoted to a better understanding of the Hebrew Bible. As such, a variety of topics are discussed related to the Biblical languages, the history of the text and its study, the culture of the Ancient Near East, the literary analysis of the Hebrew Bible, and more.
General Resources
- Bible.org – Home of the NET Bible; has many other biblical studies aids and articles.
- Bible Hub – A free bible study website with search and study tools including parallel texts, cross references, concordances, interlinears, and commentaries.
- Association of Religion Data Archives – Statistics and information about American religion. | https://www.criswell.edu/academics/wallace-library/research-resources/ |
In the Eronga region, the badlands of the ancient Namib Desert, the Moon Landscape puts on an other-worldly show.
desert
-
-
GERHARD HORN takes a long, long journey to the tiny Northern Cape settlement of Putsonderwater, but will anyone be there to meet him?
-
The sheer bounty of birds will take you by surprise at the Tswalu Kalahari Reserve in the Northern Cape province of South Africa.
-
Mad Max would feel right at home on the Namib road that runs south from Swakopmund to Sossusvlei. RON SWILLING discovers why.
-
A dune is often viewed as nothing more than a heap of sand next to the sea. But the next…
-
Following the success of the Southern Africa’s Best Roads To Drive campaign, Avis has identified more hidden treasures to explore,…
-
Words and Images by Chris Marais When you visit a desert country like Mali, Namibia or right here in the…
-
They’ve walked the Earth for 50 million years but rhinos now face extinction. We went on a tracking expedition in Namibia, in search of desert black rhino.
-
Get stuck in the Namib & you’ll likely end up a skeleton. But Dale Morris meets a four-wheel-driving, desert-dwelling guide who knows just how to survive. | https://www.countrylife.co.za/tag/desert |
Cochrane today announces its COVID-19 priority areas of work over the next six months to help meet the healthcare evidence needs of policymakers, guideline developers and clinicians; and makes available a list of additional priority questions to help guide the work of other research organizations.
Since 18 March, Cochrane has been gathering some of the most important questions related to the COVID-19 pandemic from health researchers, clinicians, policymakers, patients and carers, as well as important external stakeholders including the World Health Organization (WHO), the UK National Institute for Health Research (NIHR) and guideline developers from different countries. Cochrane experts reviewed these questions in collaboration with health and policy decision-makers, resulting in Cochrane’s Question Bank, a resource that is now being made available to the global research community.
The Question Bank includes approximately 150 questions, categorized to allow users to see the questions being addressed by Cochrane (through a Rapid Review or a normal Systematic Review); those being addressed by other systematic reviewers; and those questions, to the best of our knowledge, that are not yet being addressed.
This categorization facilitated decision making by Cochrane’s Editor in Chief, Karla Soares-Weiser, and Cochrane’s COVID-19 Working Group on the organization’s priority areas of work for the next phase of its response to the pandemic. The questions and issues to be addressed by Cochrane over the next six months were aligned with the taxonomy of the ‘COVID-19 Evidence Network to support Decision-making’ (COVID-END), of which Cochrane is a leading member. These priority questions to be addressed by Cochrane evidence cover:
- Clinical management: including questions related to screening and testing, drug treatment, critical care, prophylaxis, prognosis and the clinical management of pandemic related impacts on health
- Public health measures: including questions related to the prevention of infection, personal protection and the need to support healthcare workers; and
- Economic and social responses: including questions related to the social determinants of health and their impact on health outcomes, and the impact of COVID-19 on food poverty.
View or download a more detailed diagram setting out these priority questions.
“Identifying these priority health topics is a pivotal moment in defining Cochrane’s editorial priorities for the next six months, as we move from responding to immediate critical care to questions related to longer-term management of the COVID19 pandemic,” said Editor in Chief, Karla Soares-Weiser. “Using the vast expertise of clinicians and researchers across the Cochrane community and together with global decision-makers we have identified the key areas of COVID-19 evidence production Cochrane should invest in going forward. These questions and topics are where we think we can add most value, considering our capacity, expertise, and the evidence synthesis work already being done by other institutions worldwide. We have also prioritized those questions most in need of a ‘living systematic review’, constantly updating the review when new evidence becomes available.”
Each of Cochrane’s priority areas are being addressed through a range of planned outputs including Cochrane Rapid Reviews, new Cochrane ‘living’ Systematic Reviews and Network Meta-Analyses, all led by different consortia of Cochrane authors, Groups and Cochrane’s Central Editorial Team.
The Cochrane ‘Question Bank’ is also being made freely available to the global research community to help guide work on other critical synthesized evidence questions not being addressed by Cochrane. It will be updated periodically to help decision-makers review progress and activity; and highlight new questions and topics to be addressed in future.
This new phase of Cochrane’s response to the COVID-19 pandemic comes after two months of intense activity by the organization’s global community to curate, develop and publish evidence to support health policymakers, clinicians, practitioners and researchers in their work. Since the middle of March Cochrane has published:
- Six ‘Special Collections’ of Cochrane evidence relating to the prevention and treatment of COVID-19, containing 106 Cochrane Reviews and 67 Cochrane Clinical Answers (to support decision-making for health professionals). These Special Collections were developed based on World Health Organization (WHO) interim guidance and are updated in response to new information.
- Four Cochrane Rapid Reviews published with accompanying podcasts and six related Cochrane Clinical Answers.
- A full Cochrane Review on Personal Protective Equipment for healthcare staff.
- All of this evidence is translated in up to 12 other languages to promote its global accessibility and use; and Cochrane Reviews are also being made openly available on the Wiley Online Library along with other relevant Wiley content.
- A COVID-19 ‘Living Evidence Project’ presenting data on trials registered all over the world, as well as living evidence synthesis of results from these trials
- Cochrane’s 'COVID-19 Study Register’ of primary research studies, in consultation with WHO, which has become one of the largest and most sophisticated registers in the world.
- The April 2020 issue of the Cochrane Library App, featuring abridged versions of Cochrane Reviews relevant for COVID-19 (available from Google Play (Android devices) or the App Store (iPhone and iPad)).
- The Cochrane Library Journal Club (Issue #97), focusing on a Cochrane Review related to COVID-19 response preparation. | https://www.cochrane.org/news/cochrane-identifies-its-priority-areas-future-covid-19-work-and-lists-other-critical-questions |
GAINESVILLE — Changes may be coming to senior centers across the state in order to boost participation, and area agencies on aging like Legacy Link want to hear from residents about what those changes should be.
Legacy Link, the agency serving Forsyth, Dawson, Hall and 12 other counties, is holding a public meeting from 9:30 a.m.-12:30 p.m. Tuesday at its offices at 4080 Mundy Mill Road, Oakwood.
“Basically, what they’re looking at is increasing the daily average attendance at the centers” from 20 to 30, said Lamar Gailey, community programs manager, of state objectives.
Also called for is forming advisory groups comprising clients, staff and “the community at large in looking at programming for seniors,” Gailey said.
“I’m not sure if any of our communities could exercise those options as much as you could in a more metropolitan area,” but some things can be done “to get the program more out into the community,” Gailey said.
The state’s Division of Aging Services, which falls under the Department of Human Services, sets policies and procedures for the programs, with senior centers receiving federal money from the Older Americans Act through the state.
Ashley Fielding, director of the Office of Legislative Affairs and Communications for the Department of Human Services, said the state is working with the agencies on aging and local providers “to change the way local services are delivered to seniors.”
“These changes give local communities the flexibility to meet the unique needs of the participants in their programs and to use their resources in a way that serves the greatest number of individuals,” she said.
Prompting the initiative is a recent ruling by the federal Centers for Medicare and Medicaid Services that requires that services “be more integrated in the community,” Fielding said.
“The first step is to get feedback from local communities on the service they currently receive, which is what is happening with Legacy Link,” she said. | https://www.forsythnews.com/local/business/meeting-tuesday-about-states-plan-to-increase-use-of-senior-centers/ |
The motif on this exuberant outer-kimono (uchikake) relates to a popular kabuki play – a traditional Japanese form of theatre – derived from the Chinese legend of Shakkyō (meaning Stone Bridge). The bridge, over a steep gorge near the summit of Mount Seiryo, was reputed to lead to the Buddhist paradise. It was guarded by mythical creatures called shishi – a type of lion-dog.
It is possible that this kimono was worn by an actor in a performance, but decorative themes on stage costumes were not usually so literal. This garment was more likely to have been worn by a high-ranking courtesan while parading through the pleasure quarter. The diversions of the theatre and the brothel were closely linked in 19th century Japan.
Explore the detailed motif on this kimono and zoom in to view the rich embroidery and embellishment.
Find out more about popular culture in Japan during the Edo period through our collection of woodblock prints. | https://www.vam.ac.uk/articles/courtesan-kimono |
Symptoms of a diabetic coma and what is the first aid at home, a diabetic coma can affect a person with diabetes if he has a high or low level of sugar in the blood or other substances in the body.
Despite this, with immediate treatment, recovery can be achieved quickly, but in the absence of attention and treatment received late, this may lead to death or brain damage.
Symptoms of a diabetic coma and what is first aid at home
This article will help you through an article website in identifying the symptoms of a diabetic coma and what is the first aid at home, as follows:
Symptoms of a diabetic coma
Symptoms of low blood sugar level are:
- Feeling shaky, sweaty and tired.
- feeling dizzy
- Feeling of headache.
Eating or drinking a source of glucose will bring your blood glucose back to a healthy range, thus feeling better almost immediately.
If a patient does not notice symptoms or is unable to act on them and their glucose continues to drop, they will become unconscious.
This prolonged loss of consciousness due to different blood sugar levels is called diabetic coma.
First aid at home
If you think you may have a diabetes emergency or have seen someone near you with the same problem, here are some signs to look for to determine the type of emergency:
- confusion, nausea, dizziness.
- feeling hungry.
- Feeling nervous, anxious and shaky.
- Sweating, chills and pallor of the skin.
- Rapid pulse and heartbeat.
- Feeling weak and tired.
- headache.
- coma or loss of consciousness.
- seizures.
- Weight loss in case of long-term hypoglycemia.
- Tingling feeling in the mouth.
What you need to do in an emergency for a diabetic
If you or someone near you experiences the above signs, it is important to take the following steps:
- Sit in a shaded area.
- Eat something sugary, as this will help bring your sugar level back to normal.
- If you do not see any improvement in your condition, call for medical help.
High sugar coma treatment
Symptoms of a diabetic coma and what is the first aid at home, the doctor is likely to reverse the state of the diabetic coma as soon as possible, but the treatment depends on the type of disease.
Since this must be done very quickly to prevent complications, diabetic coma is treated with glucose and glucagon injections.
The treatment of diabetic coma with increased blood sugar is water and insulin, and it will be noted that the person will begin to recover quickly after starting treatment.
Most people recover fully, however if they do not receive treatment soon after entering a coma there may be long-term effects.
For example the risk of irreversible brain damage.
Without timely treatment, a coma can be fatal. Even if a diabetic coma does not occur, the long-term effect of having blood sugar levels that are often too low or too high can be harmful.
Causes of a diabetic coma
There are three main things that can lead to a diabetic coma, and there are two types of diabetes (Type I and Type II), the first type has two causes, while the second type has one cause.
Type 1 diabetes
Type 1 diabetic coma is caused by one of the following factors:
- Low blood glucose level, known as hypoglycemia.
- Increased ketone levels in the blood, known as diabetic ketoacidosis.
Type 2 diabetes
Type 2 diabetic coma is caused by one of the following factors:
- Severe drop in blood sugar level, or increased level of glucose in the blood, which is known as hyperglycemic syndrome.
- hyperglycemic syndrome
- Diabetic hyperglycaemic syndrome mostly affects older adults with type 2 diabetes, which is not well controlled.
- A person with hyperglycemic syndrome will have normal ketone levels in the blood and a normal acid balance.
- The initial treatment is to inject a saline solution into the veins. This will rehydrate the person and help lower blood glucose levels.
- They may need insulin, however, if glucose levels do not return to normal with untreated rehydration, hyperglycemic syndrome (diabetic coma) can lead to vascular complications, such as heart attack, stroke or blood clots.
- Hypoglycemia, if the blood glucose level drops sharply and is less than 70 mg/dL.
According to studies and research, it has been proven that a person who suffers from type 1 diabetes often suffers from low blood sugar twice a week.
While people with type 2 diabetes who use insulin are less likely to develop hypoglycemia, there is still the possibility of a diabetic coma.
Sometimes hypoglycemia occurs only in people receiving insulin therapy.
But it can happen with oral medications that raise the level of insulin in the body.
Factors that result in hypoglycemia
- Take a lot of medication.
- lack of food
- Do a lot of exercise
- And various other factors.
Diabetic ketoacidosis
Ketoacidosis occurs when the level of ketones in the blood becomes too high and the level of acid in the blood increases.
Diabetic ketoacidosis is one of the most serious complications for people with type 1 diabetes, and it can result in a diabetic coma.
The levels of ketones in the blood can become very high if the patient uses fats as an energy source instead of sugar.
This often occurs in patients with type 1 diabetes for several different reasons, including not receiving enough insulin.
Patients with diabetic ketoacidosis have high levels of glucose in their blood, because sugar cannot pass from the blood into the cells.
The body tries to lower high glucose levels by allowing the glucose to leave the body through the urine, however this also causes the body to lose a lot of water.
Symptoms of diabetic ketoacidosis
- feeling tired and thirsty
- The need to urinate frequently.
- Plus an upset stomach with nausea and vomiting.
- Redness and dryness of the skin
- shortness of breath
Treatment is with insulin doses and fluid intake.
It is an emergency situation that needs immediate care because it can result in a diabetic coma.
If left untreated, diabetic ketoacidosis can be life-threatening.
Preventing a diabetic coma
Symptoms of a diabetic coma and what are the first aid at home, to reduce the risk of developing a diabetic coma, the following must be followed:
- Learn how high and low your blood glucose feels.
- Check your blood glucose levels, especially when you are sick.
- Reduce alcohol consumption and avoid alcohol after strenuous exercise.
- Test your blood ketone levels if you have type 1 diabetes.
- After exercising, watch for signs of low blood sugar, especially at night.
At the end of the article, the symptoms of a diabetic coma and what is first aid at home, we have provided you with detailed information on this subject; We hope that the article has been useful to you and received your approval! | https://www.soft3arbi.com/2021/09/symptoms-of-diabetic-coma-and-what-are.html |
Medical specialty: Anesthesiology
The specialist in anesthesiology is responsible for general anesthesia and local anesthesia of patients. In the case of surgical interventions, the specialist takes care of their pre- and post-treatment and the vital functions during surgery.
Even in ancient times the Assyrians, Romans, Egyptians and Greeks knew the pain relieving effects of herbs and plants such as poppy, mandrake and henbane. During the 18th and 19th centuries (after discovery of oxygen in 1774), the mind-altering effects of different gases were discovered. The chemist Humphry Davy, for example, determined in a self-experiment that inhaling nitrous oxide overrode sensation of pain.
In 1846, finally, the first successful and painless anesthesia was performed by allowing the patient to inhale ether. The American dentist William Thomas Green Morton had discovered this method. Since then, he has been known as the inventor of modern anesthesia. The German surgeon Heinrich Braun revolutionized the local anesthesia by mixing cocaine with adrenaline. | https://junisa.ru/en-us/general-medicine/medical-specialty-anesthesiology |
Multiple-home owners in one of Seoul’s most expensive districts have been scrambling to give away their apartments to family members or relatives as gifts before toughened tax rules come into force in June, according to data released by the state-run Korea Appraisal Board on Tuesday.
The number of apartment transfers among family members in Gangnam-gu, a southern Seoul district, hit a monthly record high of 812 in March, 6.3 times higher than 129 marked in the previous month, the data showed.
The March figure is the second highest since record-keeping began in January 2013, falling close behind the all-time high of 832 in June 2018.
The number of property transfer cases among family members remained in a range of 47 and 420 in Gangnam since June 2018.
“It seems that owners of multiple homes in Gangnam have decided to hand their apartments down to their family instead of selling them to others to avoid a hefty, comprehensive real estate tax and an increased sales tax for multiple-home owners, which will start to be in place from June,” said Park Won-gab, a senior real estate researcher at KB Kookmin Bank.
From June, owners of two or more homes will be slapped with heavy taxes as the comprehensive real estate tax rate will be raised to 6 percent, up from the maximum rate of 3.2 percent. The current property sales tax rate, ranging from 6 to 45 percent, will also increase to a level between 65 and 75 percent.
The overall number of apartment transfer cases across Seoul increased to 2,019 in March, up from 933 in the previous month.
The posh Gangnam district accounted for 40.2 percent among the total, while Gangdong-gu, an eastern Seoul district, came second with 307 cases, or 34.6 percent. They were followed by Nowon-gu in the northeastern part of Seoul and Gangseo-gu in western Seoul, which recorded 139 and 121 cases, respectively.
Across the nation, 10,281 cases of property giveaways took place in the month, up 57.2 percent from February.
By Kim Young-won (
[email protected]
)
|
◀
Back to List
More article by this Writer
MOST POPULAR
Disgraced ex-minister's daughter says she feels proud, qualified as a doctor
South Korea to provide $5m aid, dispatch rescue workers to Turkey
Seoul Court orders Korea to pay W30m to Vietnam War victim
[Newsmaker] [From the Scene] Robot shelves, packagers behind Coupang's ultra-fast Rocket Delivery
Korea sends condolences and aid to Turkey, Syria quake victims
Foreign shoppers flock back as pandemic nears its end
Korea to keep remaining COVID-19 rules until WHO lifts alert
Seongnam City Hall raided in development corruption investigation
LATEST NEWS
>
Genderless goes mainstream in luxury fashion sector
>
Bong Joon-ho’s 4K remastered ‘The Host’ to hit France next month
>
Seoul shares end higher on foreign buying after Powell comments
>
SK Innovation board chief stresses governance innovation
>
S-Oil donates W1b for heating bill relief
>
Air raid drills return in 6 years amid growing N.Korean threats
>
HD Hyundai to support rescue work in Turkey
>
Doosan to send $1m in equipment to earthquake-hit Turkey
>
BoA to hold 20th anniversary concert next month
>
SM faces management dispute led by founder Lee Soo-man
ABOUT KOREA HERALD
ABOUT HERALD CORPORATION
CODE OF ETHICS
ANNOUNCEMENT
CS CENTER
CONTACT US
LOCATION
National
Politics
Social Affairs
Foreign Affairs
Defense
North Korea
Hwang on China
Science
Diplomatic Circuit
Education
K-Wellness
Business
Industry
Technology
Transport
Retail
Finance
Economy
Market
Money
Life&Style
Culture
Travel
Fashion
Food & Beverage
Books
People
Expat Living
Arts & Design
Health
Entertainment
Film
Television
Music
Theater
K-pop
esports
Sports
World Cup
Soccer
Baseball
Golf
More Sports
World
World News
World Business
Opinion
Editorial
Viewpoints
English Eye
Podcast
English Cafe
#Hashtag Korea
Topics
Weekender
Interactive
PR Newswire
Global Insight
한국어판
PRIVACY STATEMENT
COPYRIGHT POLICY
HERALD OMBUDSMAN
Our Site
THE HERALD BUSINESS
THE HERALD POP
K-POP HERALD
REAL FOODS
HERALD ECO
HERALD DESIGN
THE INVESTOR
The Korea Herald by Herald Corporation
Copyright Herald Corporation. All Rights Reserved. | http://news.koreaherald.com/view.php?ud=20210420000935 |
An essay writer should know the big difference between trusted and unreliable sources. Educational institutions won’t accept references from unreliable sources. The article writer must collect, use, and synthesize information just from accepted resources given by the instructor or the university. The essay writer might select printed places that can be found in trusted sites such as for instance journals, publications, or look analyzed research articles. The stability of the information gathered by the freelance author depends on how trusted the source is. If the freelance writer does not use reliable options, then he may possibly are having issues later with the uniformity, evaluation, and validity of the gathered data.
What can you suggest by reliable resources?
The very first thing that the essay author ought to know when gathering knowledge and performing study is the capability to establish whether the site is trusted or not. There’s just something an article writer must think when he visits a website – know from knowledge if the information is good or not. Listed here are examples of good reliable sites that offer reliable information:
• Bing publications
• Newspapers
• Fellow analyzed posts
• Fellow reviewed journals
• PhD or MBA dissertations and study
• Community library including Questia
• Scholarly articles
• Separated reports or academic study
• Educational institutions websites
Though Wikipedia sites are great starting place to get original some ideas about the composition topic, the back ground information gathered from the site however need affirmation and checking with a trusted source. Wikipedia sites have no conventional get a handle on on the kind and quality of information printed on their sites. That notion is the exact same with websites and other articles. Utilizing the internet search engine to locate data may give both trusted and unreliable sources. Several websites also give opinions and reviews. When it is necessary to utilize the ideas shown in these web sites, then it is incredibly critical that composition authors validate the style or idea with a dependable source.
Academia authors have to know that government in addition to business sites offer trusted information. Article authors must use the same reading methods with produced text to e-resources publications preserved by academic institutions are far more trusted than blogs or particular sites for research. A PhD or MBA dissertation requires a well-balanced strategy in introducing mathematical knowledge and information. Composition writers should discover ways to measure the impartiality or stability of the net content of a particular web site provided in the research engine’s search page https://sleepjunkies.com/author/james-scott/.
How do you know a source is unreliable?
Academia authors do not want to learn most of the publications or any such thing from cover to cover. Essay authors will definitely achieve an information clog using this study technique. One strategy article authors can use would be to feel the material and follow this easy guideline:
• Notice the time of publication and file edition
• Look at the dining table of articles and skim through the identified areas
• Pick appropriate information for greater effects
• Prepared data collected from different resources to verify reliability
Essay authors may utilize the strategy unreliable web sites provide but need reliable assets to cite and ensure the collected information. Below are samples of unreliable resources that require evidence with a trusted supply:
• Wikipedia
• Blogs
• Forums
• Dubious websites developed by companies
• Web sites offering bias data
One way that composition writers can inform about the kind of company controlling the content of the web site is always to look at the domain name or URL. The domain expansion might have a two-letter state rule such as for example .ph for Philippines,.us for United States, or .uk for United Kingdom. Academic institutions often include.edu that could appear to be .edu .au for academic institution from Australia or .edu .ph for educational institution from the Philippines. | https://www.ronklein2006.com/essay-writer-information-for-deciding-reliable-and-unreliable-places/ |
2 edition of Modern movements in painting found in the catalog.
Modern movements in painting
Charles Marriot
Published
1920 by Chapman and Hall in London .
Written in English
Edition Notes
|Statement||by Charles Marriott.|
|Series||Universal art series|
|The Physical Object|
|Pagination||xii, 268p. :|
|Number of Pages||268|
|ID Numbers|
|Open Library||OL13839217M|
Postscripts
I Dont Want to Go to Bed!
1001 healthy baby answers
The Philosophy of F.H. Bradley
Living in Ohio
The pathology of the U.S. economy
A threefold answer vnto the third part of a certain triobolar treatise
Catalogue of Books Printed in German-Speaking Countries and of German Books Printed in Other Countries from 1601 to 1700 Now in the British Library
Hearing on H.R. 15622, To Authorize the Attendance of the Marine Band at the Sesquicentennial Celebration To Be Held at Yorktown, Va., in October, 1931
Black review.
Cruising the Coral coast
Foreign direct investment in the United States
An analysis of the civil law
The formation of shocks in 3-dimensional fluids
Yearning for Yesterday
arts and crafts in North Carolina, 1699-1840
Modern movements in painting [Marriott, Charles] on *FREE* shipping on qualifying offers. Modern movements in painting. The Pop Art movement is discussed as is Photorealism that many folks may have imagined was the real topic of this book.
The book ends with discussions of Eric Fischl and Jenny Saville, outstanding contemporary artists of a disconcerting realism/5(6). Modern movements in painting book Cubism, perhaps the seminal art movement of the twentieth century, is also one of the most complex.
It was the product of the decade before the outbreak of war in France, during this period, was torn by intercity class and international tensions, caught between excitement over the experience of modernity and anxiety about its consequences.5/5(2).
Modern movements in painting. London, Chapman and Hall, (OCoLC) Document Type: Book: All Authors / Contributors: Charles Marriott. Find more information about: OCLC Number: Description: xii, pages color frontispiece, plates (some color) 24 cm. Modern movements in painting.
New York, Scribner's [?] (OCoLC) Document Type: Book: All Authors / Contributors: Charles Marriott. Find more information about: OCLC Number: Description: xii, pages color frontispiece, plates (some color) 24 cm.
Book Source: Digital Library of India Item : Marriott ioned: ble. After migrating back to Russia, he, along with Antoine Pevsner and Naum Gabo, published the Realist Manifesto inwhich, like the Futurists and Vorticists, declared an admiration of machines and technology as well as their functionalism.
The aim of this book is to give a simple and reliable account of modern painting from the Impressionists up to our own time.
It is the joint work of a number of art critics, mostly French; but though it comes from Paris, the vital centre of most modern movements in art, the editors have been at pains to maintain a broad outlook and describe painting activities outside France. modern art movements Impressionist Movement (flss) Christened by the French art critic Louis Leroy after the title of Monet's painting Impression: Sunrise (), Impressionism was a spontaneous plein-air manner of landscape painting whose goal was the exact representation of light.
As the name of the art movement implies, the paintings display objects–symbols–that represent abstract ideas. For example, the terrifying angel in The Death of the Grave Digger (below) symbolizes death.
Most of the symbolism referred to death, decadence and debauchery. Extending the symbolism to a whole painting makes it allegorical. The. Conceptual art. Conceptual art, sometimes simply called conceptualism, was one of several 20th century art movements that arose during s, emphasizing ideas and theoretical practices rather than the creation of visual term was coined in by the artist Sol LeWitt, who gave the new genreits name in his essay “Paragraphs on Conceptual Art,” in which he wrote.
After the First World War, the roaring 20s were a time of change. Personal expression and the rebellious thought of the influential avant-garde movements dominated the s innovations occurring at this time in painting, design, architecture, fashion, crafts, and music are still recognizable and modern art and the contemporary art.
American impressionism and realism: the painting of modern life, User Review - Not Available - Book Verdict. These painting styles have received oodles of attention from art historians of late, and one might wonder what more there is to be said on the subject.
Happily, this volume offers novel approaches and. It's a very good start for somebody new to the history of Modern Art and a guide that I will come back to as I discover new interests (I only read about the artistic movements in the 19th Century leading to modern currents in art and about my two favorites: Impressionism and Art Nouveau.4/5(40).
Texture Painting Art Texture Types Of Painting Inspiration Art Watercolor Artists Art Moderne Cool Art Awesome Art Modern Art Resumen Original pintura de 30 x 30 moderno acrílico rojo, verde, gris fino arte de la lona por Maria Farias de textura • Artista: Maria Farias • Título: Aferrarse a un esquema • Tamaño: 30 x 30 x • Medio.
Movements of modern art like Fauvism, Expressionism and Colour Field painting were the first to exploit colour in a major way. (4) New Techniques Chromolithography was invented by the poster artist Jules Cheret, automatic drawing was developed by surrealist painters, as was Frottage and Decalcomania.
Adele Sypesteyn "sense of movement" Abstract painting mark making The Modern Art Movements – Buy Abstract Art Right Based in New Orleans, artist Adele Sypesteyn shows in venues throughout the South, including large interior.
Luc Tuymans’s paintings levitate above all that they refer to, providing a strange philosophical distance to historical episodes, figures and references. Describing his approach as "authentic forgery", Tuymans (b) derives his imagery from other pictures and films so that invention becomes a product of reiteration, referral, recollection.
subjects, including many art movements. It is a term which became common in the ’s, for a technically controversial designation of a period between and today. The basis of the idea of modernism is that it is the move from modernism, including art movements before this time.
It is an overall subject concerning itself with areas. INTRODUCTION TO MODERN INDIAN ART & EARLY INSTANCE OF ABSTRACTION IN THE PRE-INDEPENDENCE INDIAN PAINTING Introduction to Modern Indian Art Around the mid 18th century, with the disintegration of Mughal Empire, mughal and rajput styles were on the wane.
Painters who had enjoyed court patronage scattered around the country. Postmodern art is a body of art movements that sought to contradict some aspects of modernism or some aspects that emerged or developed in its aftermath.
In general, movements such as intermedia, installation art, conceptual art and multimedia, particularly involving video are described as postmodern.
There are several characteristics which lend art to being . | https://qajeqocysuwoc.applikando.com/modern-movements-in-painting-book-4730xp.php |
This paper attempts to explore the innovative elements of non-formal education of Bangladesh in terms of its contribution towards poverty alleviation through income generating programmes. A survey of the beneficiaries, focus group discussions, and documentary review are used as research methods. This study selects one NGO through examining relevant NGOs in term of non-formal education linked income generating programmes and then finds out the innovative elements of that NGO by in-depth study. It shows that most of the NGOs have programmes for socio-economic development but a very few of them have innovative elements in non-formal education linked income generating programmes for poverty alleviation.
Attacking poverty has become an international concern for placing in the paradigm of 'education and learning for sustainable development' in consideration of the reality that almost half of the world's population live in poverty. The world has deep poverty amidst plenty (World Bank, 2000). Based on the recognition that formal education programme has failed to become adequately responsive to the needs, particularly of the poorer/disadvantaged sections of people, non-formal education programme has evolved in various form as a strategic intervention for poverty alleviation.
In recent years, non-formal education has become an important phenomenon in developing countries like Bangladesh where many international, national and local NGOs are providing non-formal education for increasing income generating programmes for the poor and disadvantaged groups. The general objective of this paper is to identify and examine innovative aspects of non-formal education programme having demonstrated potentials and scope for poverty alleviation through income generation. Specifically, the paper has sought to identify the scope and the role of non-formal education contributing to income generation; to identify innovative approaches of non-formal education linked to income generation; to assess the impact of pilot /experimental income generation programme under non-formal education as a useful contribution to human resource development; and to make recommendation for policy formulation to build up essential links between non-formal education and income generation programmes for poverty alleviation.
Bangladesh is classified as one of the poorest countries of the world. Data published by UNESCO rank Bangladesh in the thirty-first position out of thirty-five countries for which GDP data could be given. The national literacy rate has increased significantly but 34% adult people are still illiterate (Bangladesh Bureau of Statistics, 2002). The labour force, with the growth of population, will continue to grow for about 50 years more till the population becomes stationery. It is estimated that the labour force will grow from 55 million to 100 million over the next 20 years. The country has 6.6 million child labour force (aged 5-14), but in reality the number may be higher. Over 4 million of these children work in agriculture in rural areas and in informal sector in urban areas. The poverty line (daily intake of 2122 K. Cal a day) reveals that 36% people live below the poverty line. Thirty seven percent are rated most vulnerable, and forty six vulnerable (Bangladesh Bureau of Statistics, 2000). The present trend of the socioeconomic conditions in Bangladesh in terms of literacy rate, population growth, per capita income, and employment situation are improving but inequitable distribution of resources (e. g., income, land) deteriorate the situation. Twenty percent people has only 8.7 percent share of total income while the highest 20% people has 42.8 percent share of total income (The World Bank, 2000) and 84% people acquired small farm 0.05-2.49 acre land (Planning Commission, 1998).
As in many other countries of the world, non-formal education programmes have been organized in Bangladesh, first, by NGOs and subsequently by the Government at a larger scale. Although there are many NGOs, large and small, engaged in non-formal education not all programmes are well conceived. Also, many of these non-formal education programmes are not specifically designed to address the crucial issues of income generation to improve the quality of life of the targeted population, while some directly address the poor or disadvantaged groups. Some NGOs are relatively new in the field and their emergence has been prompted by foreign funding channeled through government projects or directly by the foreign NGOs with Bangladesh Government approval. A good number of NGOs have vast experience as they have been working for many years. Some NGOs follow traditional approaches and some have been trying to evolve new approaches. It is worth exploring those programmes which have innovative interventions linking non-formal education with poverty alleviation. For such programmes it is important to identify their strengths, weaknesses, replication prospects, sustainability and acceptability in the community.
In spite of the outstanding growth towards universal basic and primary education there are still many left outs of the system. They constitute drop-outs of the enrolled students and non-enrolled, mostly among the rural poor. Besides the non-formal education programme operated by NGO-small and big-the government has administered a member of big non-formal education projects nationwide. The thrust of the government project has been toward promoting literacy aimed at the goal 'Education For All'. Some of the government projects have been implemented by NGOs, as partner (contracted) agencies, although supervised and monitored by designated government staff.
Non-formal education operates alongside the formal education system. It is flexible in terms of curriculum, organization and Management, responsive to the needs of special groups of learners and is inclusive of all who wish to learn. Continuing education combines under non-formal education in a limited way literacy with life improvement skills in consideration of practical needs of different population groups. There are many barriers to non-formal education and livelihood skill training, as far as the goal of alleviation of poverty is concerned. The barriers are at the level of the illiterate poor and also in the nature of non-formal education programmes and quality of management. Identification of appropriate model to alleviate poverty of the people is an important area of in-depth investigation and it is a major concern of the Government, NGOs and the development partners. The Government of Bangladesh undertook several projects such as Integrated Non-Formal Education, Non-formal Education Project– 1, Project– 2, Project– 3, Project– 4, Post-Literacy and Continuing Education Pilot Project to address illiteracy (DNFE, 1999) and in a very limited way, the poverty issues. The Government has been planning to undertake Post-Literacy and Continuing Education for Human Development Project with the financial support of World Bank, Asian Development Bank (ADB), Norwegian Assistance for Development (NORAD) and Swedish International Development Assistance (SIDA). The most recent thrust of non-formal education project, named post-literacy and continuing education for human development is on skills training and income generation for poverty alleviation.
The two organizations appeared to have comparable elements that the study could take interest in.
The study team carefully examined the above two organizations by using the following indicators: (a) target groups; (b) benefits planned for the target groups; (c) coverage; (d) goals and objectives; (e) how innovative; (f) how closely non-formal education is linked with income generating programme; and (g) how much importance is given to non-formal education- income generation programme linkage. The study team, at this stage, also assessed the level of cooperation that the authority of the above two agencies at both head quarter and field level were ready to offer to the study team. Thus the team finally selected CMES for the case study.
The study was based on both secondary and primary data. Secondary data were obtained from available reports and documents of Government organizations, NGOs, international agencies, which supported planning, development and financing of non-formal education for linking with income generation programme. Primary data were collected from different groups of respondents taken from the selected NGO. Different method i.e. interview, observation, focused group discussion and informal discussions, were used to collect information. Use of different sources helped us to validate data, as data from one source could be checked by data from another source.
Besides looking into the available documents on the CMES activities, field study was carried out dating March 21 – April 8, 2002.
Established in 1978, CMES is solely dedicated to the disadvantaged population groups, and is based on an assumption that exposing the mass people to science and technology would bring about a significant positive change in the level of their living and would contribute to national development. In its programmatic interventions, CMES has sought to arrange an appropriate education for the common mass encouraging them to be used to science and technology in thoughts and practices. In other words, education and practices that help to bring appropriate technology within the grip of disadvantaged people in particular for their empowerment has been the major thrust of CMES.
adolescent's who have had some primary education but want to acquire livelihood education.
CMES, an enthusiastic organization, implements non-formal education for the disadvantaged boys and girls through very joyful and family environment. It offers basic education as well as employment opportunity to the learners. As a result not only the particular learners but also their families and community get benefits from the programme. Together with education and learning having concentration on science and technology through its Basic School System (BSS), CMES has got other supportive programmes, which includes skill training, health and environment, credit scheme, cultural activities, social actions, curriculum development and public awareness programme. A mixture of all these make CMES a unique and innovative organization in Bangladesh.
The innovative approach to human resource development, particularly for disadvantaged adolescent girls and boys is practically very useful. It has got a design of continuing education program offering diverse options through integrated education, skill training and profitable work-practice. The first stage in the process of transforming poor illiterate/out-of-school groups into productive human resource is the Basic School System, as it is called. This system has evolved through experience over a number of years at field level work and has been replicated and is serving now 20,000 students at a time. The focus is on increasing the chances for both wage employment and self-employment of the poor leading to poverty alleviation.
Basic School System offers an integrated package, which makes education a supportive force to simultaneous income generation. It arranges for a life-oriented education curriculum compatible to mainstream primary and early high school education (up to an approximate 8th grade level), along with training and profitable practice of appropriate technology. The system includes home to home interventions in health and environment. A distinct supportive programme called Adolescent Girls' Program (AGP) empowers the girls to shake off discriminations and stereotypes and to participate in the education and technology-oriented livelihood improvement programmes equally with boys. All the components of this integrated programme serve to reinforce each other. Literacy education draws its subject matters from livelihood practices while the latter derive scientific basis from the education curriculum. The school-day is divided into an inner campus (class room) and outer campus (practices) situations providing a lot of options. The latter takes place at market level, responding to the local demands for products and services that can be marketed by the Basic Education System. The marketing arrangement offers opportunity to the learners for earning income, which facilitates further practices in production and enhancement of skills.
Basic School System particularly seeks to establish closeness of education to the life-environment on the one hand, and the practice of rural technology on the other, leading to immediate income generation and enhancement of life opportunities. In keeping with the needs of adolescent boys and girls (young adults); CMES has included community-based programmes at different levels of education. The learning system of Basic School System encourages the learners to use the local reading materials and resources. Students' evaluation criteria seek to assess competency level. It conducts three tests in a year like the government school system, but the tests are conducted very carefully followed by assessment of practice skills. After completing their education in Basic School System the students can get them admitted to technical centre and Advanced Basic School and move through different sessions of continuing education.
CMES wants the parents to participate in the programmes, gets them in the parents' meeting and thereby facilitates community involvement. In 2001, three thousand and nineteen such meetings were held where the target was 3429.
CMES encourages financial participation of the students. It allows the students to have a feeling of ownership of Basic School System. Each student deposits Tk. 2 per month that is kept in a bank of the Unit. By June 2002 the total amount deposited under this programme was Tk. 958,497, which is a substantial amount.
Productive trades of CMES include carpentry, welding, computer-compose, repairing of tools and machineries, tailoring and garments, dyeing, block printing, nursery, mushroom cultivation, masonry sericulture, poultry, leather works and sanitary latrine manufacturing. Necessary supports like teachers and teaching/training materials are provided by CMES. Community and national demands as well as availability of local resources and learners' capacity are considered. Thus CMES involves its learners in different simple technology based production. The products include chalk, candle, soap, tie-dye, ball pen, and metal products. Other activities for income earning includes home-gardening, construction works, appropriate paper technology, book binding, decorative candle making and craft works by using jute fabrics. In 2001, students produced 971,728 pieces of chalk, 194,261 pieces of ball pen, 2944,005 pieces of candle, 32,466 pieces of soap, 135,137 saplings in home gardening and a good number of other products. The students' trainees earn money and contribute to their family income, while they learn.
CMES also offer different short training courses for target groups and staffs of other organization. This is an effort to diffuse the education and training on science and technology. To ensure quality education and to develop its own staff, CMES provides regular training to its personnel.
Home to home work as outer campus education is an important component of CMES programmes. As a change agent at the level of community, CMES takes up some activities like promotion of the improved chula (oven), compost fertilizer use, sanitary latrine use, tree plantation, vaccination, tube well repair, etc., which improve the condition of living of the target community population The students learn practical knowledge through this kind of outer campus education.
Gender programmes include organization of gender convention, couple programme for awareness raising, peer assisted education, social action, management of credit programme and entrepreneurial training. Under the Adolescent Girls' Programme the adolescent girls get awareness on gender equity, rights, reproductive health, and livelihood skills.
The importance and use of mass education in science is brought to the attention of various materials for a particularly professional community interested in the promotion of non-formal education and income generation programme for poverty alleviation. Different dissemination initiatives in this regard are regular publication of the lessons, special publication, audio visual presentation, organization of seminars and exhibitions.
Field Units: Each unit of system works through 15-30 Basic Schools, 2-4 Advanced Basic Schools and one Rural Technology Centre.
Five or six Basic schools serve as feeder to one Advanced Basic School (ABS). This is a primary level school with a difference. Seven or eight ABS serve as feeder to Rural Technology Centre (RTC). Rural Technology Centre is a higher and diversified school having emphasis on technical skill training. The general organizational setup is shown in the figure (please see Figure 1).
Basic and primary education is delivered by following a learner centred approaches such that the students are active agents in not only learning, but also applying the competencies in the livelihood practices.
Technology skill training, which involves application of general education and science education, is carried on to production of goods and services for the sale at the local market.
Home to home work on health and environment constitutes a part of school routine – putting education into immediate practice for the enhancement of quality of life.
The CMES education and training is designed and administered over 5 grades (levels), each taking one years in general. The five levels are: i) Angkur (Germinating), ii) Bikash (Developing), iii) Agrassar I (Advanced I), iv) Agrassar II (Advanced II), and v) Agrassar III (Advanced III). Angkur and Bikash levels are imparted to students in basic school and Advanced Basic School, while Advanced I, Advanced II, and Advanced III are imparted in Advanced Basic School and Rural Technology Centre. The way education and training is organized according to level and type of institution.
The Angkur level education is intended to ensure reading, writing and numercy skills while imparting basic knowledge of health, and environment. Angkur also offers opportunities to learn at least one technological skill directly relevant to income generation. The Bikash level gives emphasis on the use of literacy and numeracy in real life situation, knowing the environment and acquiring technology skill. Bikash also offers opportunities to learn two or more technological skills directly relevant to income generation. Agrassar (Advanced) I, II, III cover primary level syllabus of the formal education system and advanced technological skills directly relevant to income generation. Rural Technology Centre offers advanced courses as well as combination of flexible courses on technical know-how.
CMES operates its programmes through 20 Field Units in various parts of the country comprising. These units work through eight Rural Technology Centres, fifty nine Advanced School Systems and three hundred and eighteen Basic Schools. The total students in all the schools are 20,000 at a time. All the Rural Technology Centres have, in addition to general education and skill training, Adolescent Girls' Programme. The number of adolescents involved in programs related to income generation activities is more than 10,000. There are 3 field training centres and a central training centre and several special laboratories to support the CMES programmes.
CMES offer non-formal education at three levels in a hierarchy but in an integrated pattern. The levels are: (i) Basic School, (ii) Advanced Basic School, and (iii) Rural Technology Centre. Basic School serves as a feeder to Advanced Basic School and similarly Advanced Basic School to Rural Technology Centre. Basic and Advanced School Curricula are designed to fit to the requirements of trade training at Rural Technology Centre. Combined together, the non-formal education system levels address the needs of the poor target groups. The most note worthy feature of the system is the conceptual coherence and practical integration between education and skill training with the aim of transforming the target groups into productive human resource for eventual elimination of poverty.
Application of non-formal education including skill training is directed at producing services and goods, marketing of the products, add allowing some income for the learners while they participate in education/training. All the components of the system make an integrated package for the young people enabling them to effectively participate in production and market mechanism.
Research and development on appropriate technology and their adaptation to micro-enterprises for the disadvantaged young men and women.
The CMES education system arranges for life oriented education curriculum compatible to mainstream primary and junior secondary (up to 8th grade), along with training and profitable practice of appropriate technology.
The Adolescent Girls' Programme makes the young women conscious of their rights and empowers them to stand up against all superstitions and discrimination and to participate in education and technology based income generating activities.
The organization of activities as 'inner campus activities' (classroom activities) and 'outer campus activities' (practices of skills in work setting) establishes close link between education in classroom and the practical life in the world of work. The outer campus training takes place at market level as if students are producers or employees, get daily wages for the works, or go to the markets to sell the products.
Marketing system of CMES provides scope for the students to become familiar with the challenges and realities at the market situation. This also provides an income to the students and the schools, and encourages the students to further enhance their skills through practice. The Rural Technology Centre serves not only as learning centre, but also as main education resource centre, technology centre and management centre for the field unit.
Programmes of Advanced Basic School and Rural Technology Centre capitalize on the basic education and offer a number of livelihood skills. The livelihood skills are utilized in producing a wide variety of consumable and marketable goods based primarily on locally manageable resources. The system has a provision of very limited micro-credit to the graduates (producers) and the participants of Adolescents Girl Programme of CMES. That the credit programme meets the demand of only a very small percentage of CMES target groups is explained by limited availability of such credit fund.
It brings education closer to home environment, both spatially and attitudinally, through interfacing with the real life of works.
The same closeness involves the families in education and work, and eliminates the alienations between formalisms of schools and realities of life.
All the important indicators and competencies of a quality education are given proper weight, and these come in a natural way, the students being active agents. Students create teaching aids through their own practical activities and through the presentation of the same.
The three components mentioned earlier are organized and managed such that one supports or enriches the other e.g. general curriculum draws its examples and exercises from real life skill practices and home to home interventions, whereas the latter finds the required academic basis from the former. The school is virtually extended from the classroom to the world of work outside.
Education is not treated here only as a preparation for the next level of academic structure. Rather it is made interesting and useful in itself, a matter of joy and pride, a thing of immediate benefit to themselves and the families. People are more ready to accept some opportunity-costs in such a situation.
The girls are placed in an active role as much as the boys, within all the components. Gender issues are directly addressed so much so that this has given rise to a follow-up programme for the empowerment of adolescent girls.
In overall terms, CMES education system makes significant contribution to enrolment, retention and quality performance especially in its relevance to improving the quality of living.
Discussions with the graduates reveal that the level of skills acquired by them was very good in reading, writing, numeracy and life skills. The levels of skills on trades, however, varied among the graduates. Some were found to have acquired satisfactory level of skill and they were engaged in helping the fellow students. The centre lacks sophisticated machines.
Immediate benefits gained by the graduates are basic education and skill training on a number of simple trades and on one particular advanced trade. In addition, the important qualitative contribution of the programme is reflected in the high degree of consciousness of the graduates about the importance of education, health and nutrition, and keen interest in gainful self-employment or entrepreneurship.
The impact of employment and income is relatively pronounced in case of Rural Technology Centre graduates. Learners graduating from Rural Technology Centre are fewer compared to those who complete 'Ankur' and 'Bikash' in Basic School and Advanced Basic School. Twenty one graduates interviewed in this study have an average earning of Taka 1700 per month, which is a good amount in rural areas of Bangladesh.
Most of the graduates are either employed or self employed. The employed graduates are determined to start self-employment and they are saving money for the purpose. They have been trying and face problems to get loan from CMES and other sources to start their own business.
graduates help younger children in their families to get education; they can do coaching.
The prevailing micro-credit facility in the regular economic system is often not available to landless families and people living below poverty line. The available marketing facility for the products of loan recipients is very poor. In the study area, the only source of credit is CMES. Because of fund constraints, however, the number of beneficiaries of CMES credit is small. The credit amount is also small. Those who could avail the limited facility have started self-employment and they have been able to raise their family income. Case records included in this report as illustrations bear testimony to this.
The lessons that emerge from the present study could be definitely considered in future planning of non-formal education linked to skill training at a national scale as an approach to poverty alleviation. The approach will have higher chances of being effective provided sufficient attention is given to strengthening of to other approaches to modify the structural conditions that work against the poor in their efforts to change the situation.
Basic literacy with post-literacy with the limited objective to retain literacy is not sufficiently attractive to the poor and, therefore, cannot combat poverty problem of the poorest people. Poverty can be eliminated through gainful wage employment and self-employment. Gainful employment is possible if graduates can rightly identify marketable skills and acquire those skills, which have demand in the local market. Thus the hypothesis that integrated approach is necessary to ensure that continuing education leads to gainful employment.
To identify marketable skills, local barriers, and other problems associated with self-employment, appropriate market research and market analysis by using sufficient and relevant data must be carried out. Locality specific conditions must be placed in this analysis. Available indigenous experiences should also be taken into consideration.
Training should be carried out following well-thought out curricula and syllabus prepared by persons having appropriate conceptual insights, practical knowledge about the skills together with persons having wide-spread knowledge of market mechanisms. The trainers and resource persons should have extensive expertise to work upon the individual poor's motivational level and social and cultural predicaments. They should also be well-oriented about the poverty scenario, the complexity of factors involved in poverty alleviation efforts and the interacting processes between individual and the larger social contextual elements in poverty.
The trained people must have access to raw materials, essential equipment and marketing know-how. During the training the learners must have the opportunities to be involved in practical work and the poor learners should be supported to earn by marketing their products.
After completion of continuing education with an emphasis on vocational training, a probation period of 3 to 4 months would be very useful for the trainees to gain confidence about their capacity and enhance the chances for their acceptance in employment market situation. This would be useful also for building-up motivation and capability to start self-employment.
A special programme to encourage young women and mobilize the local community for marking a congenial atmosphere (in terms of norms and facilities to support) might be integrated within the non-formal education program. The present programme suffered for the fact that these aspects were not built into the non-formal education programme.
Learners are keen to learn skills as long as they clearly perceive the potential economic benefits, opportunity cost to their advantage, and if they can choose the skills of their choice using their own judgment. Potential learners should have access to information regarding skills, products, markets, capital requirements, rate of returns and future prospects so that they can make the right choice.
The programme experiences have implications for future actions at two levels. The first one is about designing and implementing non-formal education programmes focused on income generation activities targeting the poor in particular, and the second one is getting broad based policy to strengthen non-formal education for transforming the unschooled and early dropout population groups (living in the poverty) into productive human resource conscious and capable to change their economic and social status. The implications are therefore described below under two titles.
Conventional non-formal education programme work with a limited interest in literacy. When extended to cover continuing education, non-formal education programme has to have a particular emphasis on imparting skills which can generate employment and income.
As the scope of wage employment for non-formal education completers may be limited in a rapidly changing market situation with the continual adoption of new technology, appropriate income generation programme has to be kept in view in a given locality. This has to be done with full understanding of the possibility to use and improve the indigenous technology, and the importance of encouraging self-employment/entrepreneurship of the non-formal education/continuing education graduates.
With the growth of economy and expansion of wage employment market the pattern of continuing education can be upgraded to ensure skills development appropriate for the target group to have wage employment with a reasonable income level.
Non-formal education with employment skills training has to be combined with training for other life skills such as healthful and hygienic living, safe living in home and work environments, safeguarding the basic rights as human being within family and community.
Organization and management of continuing education (non-formal education), programmes have to be in fulfillment of the personal and social (normative) interest of the people, who are potential participants in the programmes.
The programme characteristics have to be sufficiently motivating and stimulating for the participants that the latter can clearly perceive and experience the prospect of earning and improving their standard of living.
The programme participants (target group) being the poorest segment of population will find it attractive to have some earning, even if it is in small amount, during the period of their education/training.
Programmatic initiative for employable skill learning, that is preparation for engagement in income generation activities, is effective when the first part in the preparation consists of an understanding of the role of science in daily life situation, and the other part has the practical experience that the use of technology and learning new skill can give concrete benefits for better living.
When the issues of women improvement are in focus of non-formal education- income generation programme and pursuit of non-conventional trades is needed for poverty alleviation, the character of the non-formal education porgramme shall have to be such that women gain the courage and confidence to overpower the cultural prejudice and negative attitude in the society restricting women's access to new knowledge and participation in new activity.
Programme managers, monitors, supervisors, teachers/trainers, that is , all categories of personnel involved in implementation have to have sufficient preparation for playing their role effectively while making a link between non-formal education and promotion of income generation programme toward poverty alleviation. An understanding of the dynamics of individual and societal situations in interplay with poverty has to be an important part of this preparation.
The programmatic non-formal education intervention has to promote participation especially of local government institution and other community based agencies and subsequently gains strength from community participation, in planning, implementation, and monitoring and impact assessment.
Non-formal education programme for enabling individuals and groups to get out of the poverty situation has to have institutional linkage with other programmes and service agencies, which are relevant to fulfilling the needs and aspirations of the non-formal education graduates.
The national education policy and plan of action have to give adequate allowance for the development of non-formal education in both government and non-government sectors and also in private sector with emphasis on science and technology to be applicable in bringing about a positive change in life situation. This will be in consistency with the Dakar Framework for 'Education For All' goals.
Clear and adequate information about non-formal education policy, goals, programme objectives, strategies, key players, targeted groups and new opportunities are to be regularly disseminated through different media and mechanisms and be made accessible to all concerned groups/agencies. This should crate an overall positive social climate.
Successful micro initiatives as experiments or pilot programmes have to be scaled up and replicated with necessary adaptations to varying situations and supports from national government authorities and other development partners are necessary in this regard. National budgetary allocation is an appropriate measure and should be a part of the poverty reduction strategy of the national government.
All sectors concerned with human development and economic growth are to recognize the importance and the obligation to support non-formal education in the national interest. Two approaches are necessary in this regard. Those who are directly engaged in non-formal education and poverty alleviation projects/programmes can act together in some forum to share and disseminate experience and information. Secondly, the national development planning authority and the specialized agencies, which are to support the national development planning process (e.g. research agencies authorities responsible for collection, compilation and analysis of date in carious sectors), can stress the point that the different sectors of development relevant to poverty reduction should draw upon the strengths of non-formal education for preparing human resource to carry forward their sectoral programmes. As such, these development sectors (for example, industries, commerce, transport, public heath and so on) are to support the non-formal education programmes. Authorities responsible for implementing micro finance system, in particular, has to assume responsibility to support the non-formal education programme by making funds available to the graduates of non-formal education programme and to those institutions which can run income generation programme by using the output (graduates) of non-formal education.
The foregoing analysis of CMES Programme and other observations that come along are drawn upon to make the following recommendations presented in two categories. One is about the post-literacy and continuing education to have special relevance to income generating programme for poverty alleviation, and the other on the role of the national authority (DNFE in the case of Bangladesh) to promote post-literacy and continuing education human resource development including research issues.
A national policy should guide continuing education programme to contain science and technology orientation, while the educational competence level will be comparable with that of formal education to be integrated with skill training and practices allowing opportunities for production of marketable goods. The programme will contain all necessary ingredients -- curriculum contents, teaching-training approach, materials and equipment etc. which will give employment attractiveness from the very beginning of implementation process.
Technical-vocational skill training component has to allow supervised practice training within the education training centres. This will require national commitment and a bold move to make necessary resources available as a part of the overall development policy and programmes for poverty alleviation through human resource development and promotion of small enterprises. The major thrusts will on making the large youth population group in poverty informed, conscious and productive manpower of the country.
Adolescents and youths should be given particular attention as they have special needs and potentials.
The learners should get practice learning opportunity through work-settings in the market situation; and to make it possible, the training centres should be required to establish linkage with production and business enterprises.
The learners should be given exposure to and experience in the dynamics of marketing, while they are in the learning centres for skill learning and are engaged in production of useful commodities.
Skill training component should offer a range of possibilities in terms of trade and skill level.
Instructors to engage in training are required to have adequate technical competence, ability to teach skills, knowledge about the poverty situation, understanding of the need for linking education and skill learning to income generating programme and poverty alleviation.
Teachers/Instructors should be locally recruited and specially trained for their job.
Learners should be given option to select the trades for their skill acquisition. They should be given orientation on the prospect of the trades in the market.
Trades having no market demand should not be offered.
Continuing education programme should be monitored and assessed with particular consideration given to the process and outcomes in the light of poverty alleviation objective.
Continuing education programme management should establish a database for learners and a follow-up system for the graduates moving into the market situation for employment.
Education and skill learning through non-formal education has to be accredited by the authority as a necessary part of the education system.
Every learner should be given information on the skills, job market, future prospect, so that he/she can take decision based on analysis and own assessment.
The curricula and syllabuses should be prepared by experts having practical, as well as sufficient theoretical expertise and familiarity with practical work setting.
Trainees and graduates should be informed in advance about the capital required to start self-employment in any trade.
For the graduates to have access to credit facility, concerned organizations should either introduce credit programs or makes arrangements with credit giving agencies.
The national authority designated to promote non-formal education /continuing education has to work based on clear guidelines, which can be formulated with the participation of all stakeholder groups. The authority should set standards corresponding to grades/skills and the requirements to be fulfilled for standards at various levels of continuing education keeping in view the poverty alleviation objective.
NGOs interested and engaged in continuing education should be supported by the national authority to work in fulfillment of definite standard(s), Supervision and monitoring system should seek to ensure compliance with the standard(s).
The national authority should facilitate linking of NGOs with relevant government bodies for the latter's support to the farmer. Similarly linkage should also be established with business community.
The national authority should organize sharing of experiences/learning of continuing education programmes and their contributions among the stakeholder groups for feedback and follow-up actions.
The authors are grateful to UNESCO, Bangkok for providing financial support for the study.
Bangladesh Bureau of Statistics (2002) Statistical Profile of Women in Bangladesh, Planning Commission, Dhaka.
Campaign for Popular Education (CAMPE) (1995) Directory of Education Programs of the NGOs. CAMPE, Dhaka.
Cantre for Mass Education in Science (CMES) (1999) Basic School System – Non-Formal Education. CMES, Dhaka.
Directorate of Non-formal Education (DNFE) (1999) Non-formal Education in Bangladesh. DNFE, Dhaka.
Planning Commission (1998) The Fifth Five Year Plan (1997-2002). Planning Commission, Government of the People's Republic of Bangladesh.
World Bank (2000) Bangladesh Education Sector Review Volume, I, II, III. Washington DC, Oxford Press Limited. | http://ijedict.dec.uwi.edu/viewarticle.php?id=358&layout=html |
We live in a society that provides some groups more or fewer opportunities based solely on factors they do not control. Aspire was founded to address the long-standing inequities in K-12 education. Our founders believed in creating high-quality public school options in low-income neighborhoods and communities which have historically lacked that access. Every part of our mission of College For Certain lives and breathes the mandate to address this inequity. As an organization, we continue to devote significant resources of time and energy to build our collective muscle in order to develop our equity lens to better identify, discuss, and address equity issues impacting our students, schools, and teammates. These equity belief statements provide unequivocal direction and guidance to our team as we go forth on our journey to define who we are and how we approach our work. Since the overwhelming majority of our students are Latinx and African American, when we say that we are using an equity lens to evaluate outcomes and actions we are typically referring to these particular populations.
At Aspire we…
- Understand the significant difference between equity and equality. Every student deserves to receive what they need to succeed (equity), not that every student receives the same amount of resources, instruction, attention, etc. (equality).
- Develop school environments where all students are actively and meaningfully engaged in rigorous instruction.
- Interrupt the “school to prison pipeline” – policies and practices that are directly and indirectly pushing the most at risk students out of school and on a pathway to the juvenile and criminal justice systems.
- Engage families as partners in meaningful ways in our work.
- Build the capacity of diverse teams that are more reflective of our students.
- Nurture an open, collaborative, and trusting environment because the work is enormous, deeply personal, emotional and often difficult.
We must continually put the Equity Commitments into action and live by them. Every Aspire teammate is accountable for applying these commitments in every decision, use of resources, and management of talent. The power of our collective and individual dedication to these commitments is reason enough to be hopeful as we pursue our mission and create a more just and equitable world.
Variable Content
. | https://aspirepublicschools.org/discover_aspire/equity/ |
Project Summary/Abstract The decision by a cell to divide or not is a highly regulated and vitally important process in all organisms from yeast to human. Most cells remain in a reversible non-dividing state referred to as quiescence for much of their lifetime. Although some environmental signals as well as the signaling pathways and genes that respond to them to promote quiescence entry have been identified, the molecular mechanisms involved in initiating the quiescence program are not well understood. Defining these mechanisms is essential to our understanding of how the misregulation of quiescence contributes to developmental defects, premature aging, and diseases such as cancer. Yeast cells enter quiescence similar to human cells, but do so in response to nutrient limitation. The yeast quiescence program is thus easily manipulated in the laboratory. Furthermore, the signaling pathways utilized by yeast are conserved in humans, rendering yeast an excellent model organism in which to study the mechanisms of quiescence regulation. Prior studies of quiescence entry relied on information obtained from comparing quiescent cells to dividing cells, due to difficulty in identifying quiescent cells prior to their entry. Because the quiescence program is initiated long before cells actually enter, I propose to develop a method for identifying cells that are destined to become quiescent prior to the initiation of the program. By analyzing gene expression in these cells as compared to cells that will not enter quiescence, I will elucidate the molecular mechanisms involved in initiating the quiescence program. In addition to transcription, the fine tuned regulation of DNA replication in response to environmental cues is essential to the survival of all organisms. By analyzing the role of the SWI/SNF chromatin remodeling complex in regulating replication during quiescence entry, I will determine how transcription and replication are co-regulated to induce quiescence. Overall, the proposed research is expected to define the mechanisms underlying the early stages of quiescence entry, and to provide novel therapeutic targets for diseases such as cancer. !
| |
Inadmissible foreigners facing emergency situations abroad may be able to travel to the U.S. through a "humanitarian parole" non-immigrant visa. Parolees may stay in the U.S. for only as long as the emergency exists, but they are allowed to apply for "re-parole" to remain in the U.S. longer.
Below our Las Vegas Nevada humanitarian parole lawyers answer frequently-asked-question about relevant laws, eligibility requirements, and application processes.
1. What is "humanitarian parole"?
2. Am I eligible for "humanitarian parole" in Las Vegas, NV?
3. Can I make a "re-parole request"?
The USCIS grants "humanitarian parole" to non-citizens facing a compelling emergency or if it is in the public interest to admit them.
Note that humanitarian parolees are admitted into the U.S. for a limited period of time that corresponds with the length of the emergency. Parolees have to then leave the U.S. before the expiration of their parole.1 Learn more about immigration visas in Nevada.
2. Am I eligible for "humanitarian parole" in Las Vegas, Nevada?
The person is not using parole to avoid standard visa-issuing procedures or to bypass immigration procedures.
The application for "humanitarian parole" in Nevada requires a fee and filling out numerous forms.
Including a detailed explanation with evidence of the circumstances surrounding the request for humanitarian parole relief.
Note there is no appeal process for people who are denied humanitarian parole. But foreigners may reapply for humanitarian parole if there are significant new facts to bolster their position.
Note that applicants are advised not to fill out and submit immigration forms without the help of an experienced Las Vegas Nevada humanitarian parolee immigration attorney. Every noncitizen's situation is different, and they risk rejection from an innocent error that an adept lawyer could have prevented.
Aliens granted "humanitarian parole" may request "re-parole" to stay longer.
If the person seeking humanitarian parole is currently in removal proceedings from the U.S. or has already been removed from the U.S., the applicant will need to submit the application to Homeland Security Investigations rather than USCIS.2Learn more about deportable offenses in Nevada and how to avoid deportation in Nevada.
Yes. Since humanitarian parole relief lasts for only a limited amount of time, parolees are permitted to apply for "re-parole" in an effort to stay in the U.S. longer. But parolees seeking re-parole must file the request at least ninety (90) days before the parole is set to expire.
Including a copy of the applicant's Form I-94, Arrival/Departure Record that he/she was issued by the U.S Customs and Border Patrol (CBP) upon parole into the U.S.
Call 702-333-3673 for help from Nevada immigration law attorneys.
Since there is no appeal available for foreigners denied humanitarian parole in Nevada, it is vital that you work with an experienced immigration attorney from the start to maximize your chances of success. Call our Las Vegas NV immigration lawyers at 702-DEFENSE (702-333-3673) for a consultation on whether we may be able to help you.
Id.; CBP Begins Implementation of Form 1-94 Automation, USCIS. | https://www.shouselaw.com/nevada/immigration/humanitarian-parole.html |
That evening, Siddhartha and Govinda approach the samanas and are accepted to join them. They give away their clothes and wear loin cloths instead. This begins a life of fasting and abstinence from the world. The sight of worldly people and possessions and property become a sham to Siddhartha. It all tortures him. His one goal is now to become empty of all desire, all worldliness, and, in doing this, extinguish the ‘self’ in order for his true essence to awaken.
A lot of the samana way of life is about extinguishing and diminishing the outside world, which is a surprising twist, since from the outside, the samanas, with their near nakedness and wandering, seemed to offer more of a natural life than the one Siddhartha experienced in his childhood Brahmin home.
Through the dry and rainy seasons, Siddhartha suffers the pain of burning and freezing, and sores from walking, but he withstands everything, until the pains fade. He learns to control his breath, to slow it right down until he is hardly breathing. He learns the art of unselfing meditation, loosing his soul from memories and senses. He feels like he embodies the creatures around him, the heron and even the dead jackal, through the whole life cycle. He transforms, from creature to plant to weather to self again. No matter how totally he seems to leave himself, he always returns, and feels himself in an inescapable cycle.
Siddhartha is overtaken by physical phenomena. The heat and the cold impose themselves on his body, but through thought he banishes all of his human responses and overcomes them. But instead of becoming one with nature, as we later learn is possible, Siddhartha seems to be trying to extinguish himself, to eliminate the impact of nature on him. Each time he comes back to his own body, it seems like a failure, not like a positive reconnection with his spirit.
Siddhartha asks Govinda, who has been living this painful samana life along with him, whether he thinks they have made progress. Govinda thinks Siddhartha is learning quickly and will become a great samana, even a saint, but Siddhartha himself is not so sure. He thinks he could have learned just as much among criminals in the red light district or an ox driver! Govinda thinks this is a joke. How could the same selflessness be learned there? But Siddhartha tells him that the abandonment of the self that he has learned as a samana does not differ that much from the abandonment of an ox driver having an ale after a hard day’s work. The drinker’s escape is momentary though, thinks Govinda, and surely the ascension that they are learning to achieve is more profound. Siddhartha is cynical.
In both the life of the samanas and the philosophy of contemplation and speaking the om that they learned from the Brahmins, Siddhartha and Govinda have grown up with the notion that enlightenment is a high ideal and that there is a distinct direction upwards that leads to this level of greatness. But Siddhartha’s comparison of the wizened samana to a drunk or an ox driver shows that he is beginning to realize the diversity of paths that can lead to similar heights. The picture of enlightenment gets a little blurry here.
On another occasion, Siddhartha questions if they are really approaching higher knowledge or whether they are going round in circles themselves. He makes the point that the eldest samana teacher has not yet reached Nirvana. They don’t seem to be getting any closer to their goal. Siddhartha, slightly mockingly, tells Govinda that he has decided to leave the samana path, because he doesn’t trust that learning from even the wisest samanas is any better than learning from a monkey or some such creature. He isn’t even sure that there is any value in learning at all.
It is clear that, since childhood, the young pilgrims have been set on a track of seeking knowledge. When it seems that even the end of that track and the very highest authorities in the hierarchy of spiritual knowledge are no more enlightened than the young men are, the Brahma and samana methods of teaching and learning and ruminating come to seem misguided.
Govinda doesn’t understand how Siddhartha could say such things. It terrifies him to doubt everything he has valued as holy. What would be left without this holiness? he thinks. He recites a verse about how holy bliss cannot be uttered in words. Siddhartha thinks deeply about the problem but it does not appear clearly to him.
The difference opens up between Govinda, who still believes his lessons blindly, and Siddhartha, who can no longer trust in the words of hymns. Though Siddhartha’s path seems less clear, his will and doubt are leading him towards his own path while Govinda follows the paths of others.
After three years leading the samana life, a rumor reaches Siddhartha and Govinda of a Sublime teacher, called Gautama, the Buddha, who had also wandered through the land as an ascetic, and whose legend has all the Brahmins enthralled. Many believe that the Buddha can heal the sick. Some have even heard that he had encountered the devil, and won.
The rumors of this religious leader are so extreme that it doesn’t seem like Gautama could have had such humble beginnings as a wandering ascetic. Reputation puts the Buddha above all, in a kind of non-human realm of his own.
In a corrupt world, sick with plague, the news of this sage sounds wonderful. People all over India are struck with a new feeling of hope. And this hope comes to the samanas in the forest too. But the rumors are colored equally with doubt. Siddhartha distrusts the idea of teaching, but Govinda wishes more than anything to hear the Sublime One speak. Siddhartha expresses his surprise at the change in Govinda, who he had always expected would live as a samana for the rest of his days. Siddhartha is mocking, but he agrees to hear the teaching. Though he does not believe that Gautama will reveal anything new to them, he tries to go ahead with an open mind.
The world surrounding Siddhartha is suffering from the same loss of spiritual wellbeing as he is. Spiritual sickness spreads through the land, as if it is contagious. The Buddha’s teaching has arrived to them and presents a duality for Siddhartha, whether one should follow wisdom in another or find it within oneself – which is the truer goal?
Siddhartha tells the eldest samana that he and Govinda plan to leave and the samana is furious. Govinda is embarrassed to have upset their elder, but Siddhartha proposes showing the samana one of the skills he has learnt, and proceeds to hypnotize him, making him speechless and benevolent. As Siddhartha and Govinda go their way, Govinda praises his friend for having picked up such an impressive spell. Siddhartha does not wish to perform miracles though. That kind of trickery belongs in the samana’s world.
Siddhartha shows real, physical skills and is able to outdo an elder samana. He shows that his doubts are reasonable – if he can overpower someone who has been learning and philosophizing for many years, then there must be something that he has, something beyond the skills of a samana. | https://www.litcharts.com/lit/siddhartha/part-one-chapter-2-among-the-samanas |
Definitions for "Unresolved"
Keywords: harmonized, dissonance, enough, musical, old
characterized by musical dissonance; harmonically unresolved
Not old enough for all the components to have harmonized
Keywords: intransitive, participle, adjectives, disposition, verbs
To present participles which come from intransitive verbs, or are themselves employed as adjectives, to mark the absence of the activity, disposition, or condition implied by the participle;
Keywords: undecided, undetermined, conclusion, lawsuit, brought
not brought to a conclusion; subject to further thought; "an open question"; "our position on this bill is still undecided"; "our lawsuit is still undetermined"
Keywords: unexpectedly, unexpected, setup, assertion, did
This is an intermediate result code which requires manual intervention to identify the final test result. At least one of the following conditions must be true: The assertion test required manual inspection in order to determine its result. The setup for the assertion test did not complete in the manner expected. The test program containing the assertion test was unexpectedly interrupted. The assertion test could not be executed because a previous assertion test on which it depended failed. The test program containing the assertion was not initiated. Compilation or execution of the test program produced unexpected errors or warnings. The assertion test did not resolve to a final result code for another reason. | http://www.metaglossary.com/define/unresolved |
The Balearic Port Authority, APB, has approved a new law for the port of Palma which, for the first time ever, includes measures to protect the Posidonia meadows and anyone who drops anchor on the sea grass could be fined up to 30,000 euros.
Vessels will be allowed to anchor in two distinct zones just 300 metres off the coast of Palma between Can Pere Antoni beach and the mouth of the Gros torrent.
Ships that are less than 500 tons must use the area closest to land and all boats with higher tonnage must anchor in the zone furthest away.
Dangerous goods
There’s also a defined area for ships transporting dangerous goods, the bigger the risk, the further away they’ll be from the coast. All vessels must have permission to enter the zones that have been set up.
Dropping anchor in zone 1, inside the port and anywhere on the posidonia meadows is strictly forbidden.
Anchoring and ships, boats and naval devices in the access channel to the port other than by navigation in or out of the port is also prohibited, although boats responding to emergencies are allowed in the prohibited areas but only for the duration of the emergency.
Dropping anchor inside the port or in the access channel and anchoring ships with dangerous merchandise outside the allowed zone are considered serious infractions and will result in fines of up to 180,000 euros.
Mooring in prohibited areas can result in penalties of up to 90,000 euros and dropping anchor in other areas without proper authorisation can be fined up to 60,000 euros.
The Balearic Port Authority announced this week that the port of Palma has joined the “Cruise 2030 Call for Action’ in a bid to help shape the future of the cruise industry in Europe. Representatives of the main cruise ports in Europe joined the Working Group in Venice and all participants agreed on the importance of the economic and labour aspects of the cruise industry and the need to band together to reduce or eliminate the impact that cruise ships have on cities and the burdens they put on resources.
Members of the group are putting together a working paper to negotiate with the shipping companies, which will be presented at the next summit of port authorities in Palma in January 2020. | https://www.majorcadailybulletin.com/news/local/2019/10/27/59091/new-eco-restrictions-for-cruise-ships.html |
Snuggled up on her couch, Brooklyn’s own thimbelina embroiders dreams into existence. Her fingers fly and worlds of wonder are stitched together with dizzying color and imagination.
From Drake to Henry Darger, Molly Stern embroiders across themes and genres - her painstaking and tenacious works reinventing the art. The color is explosive and magnificent, often even more brilliant than the original works themselves. Her rendition of Henry Darger’s Vivian Girls or Realms of the Unreal is perhaps one of her most stunning pieces. The delicate details unfurl in the petals of the poppies and in both the subtle and drastic changes of tones. Even with just a quick glance, the depth of patience and passion is visible in exquisite glory. But while Darger practiced with a muted and softened color-scheme, Stern throws caution to the wind and pours the vibrancy of life into the piece. And while the chroma concocts a sort of celebration, it is the more uncouth pieces that she revitalizes that provide daring dynamism and intrigue into her work.
The disjuncture of subject and medium in Stern’s version of Edward Gorey’s A Dull Afternoon appeals in its essence of juxtaposition. Traditional hand embroidery tends to evoke more innocent images of flora and fauna or simple decorative motifs, but the appropriation of understood preconceived notions and its use for the macabre or semi-grotesque augments the versatility and allure, enlivening the form and opening up a new world of perception. Stern continues to push and pull with her handiwork through the creation of her own personal pieces, which range from pop figures to personalized commissions. Drake serves as a prominent figure for both patches and shirts, a nod to the ability of an ancient craft to expand itself into contemporary culture. Stern also works on commission pieces with couple portraits being a Valentine’s Day gift favorite. Her ability to recreate facial likenesses is an applaudable skill itself, but in a medium of more rigid lines it’s almost magic.
As a literary editor in New York City, Stern’s embroidery is a labor of love and a hobby, which she proudly exhibits through Etsy and her personal Instagram - butter_pups. Admiring her masterful skill, one is motivated to pick up their own personal passions – creativity is not for the passive. Utilizing both traditional motifs and the more offbeat and obscure, Stern’s embroidery is idiosyncratic, scintillating with warmth, fascination and charm. The young artist calls our attention to the craft, tempting our eyes and imagination with each and every stitch. Through re-imaginations of classics or in her own esoteric creations, we follow each small line of cotton and find our selves mesmerized by the vivid whole. | https://wsimag.com/fashion/34357-a-gorey-story-of-brooklyn-embroidery |
A method of operating a continuously variable semiactive damper and such dampers themselves.
Semiactive dampers, and in some instances control policies for them, according to the preambles of claims 1 and 3, are disclosed in U.S. Patent Nos. 3,807,678, 3,995,883, 4,468,050, 4,468,739, 4,491,207, 4,696,489 and 4,742,998; as well as in U.S. Patent Application Serial Nos. 06/913,067 filed 29 September 1986, and 06/945,380 filed 22 December 1986, both of which are owned by the assignee of the present Application, and in an article by M.J. Crosby et al, entitled "VIBRATION CONTROL USING SEMIACTIVE FORCE GENERATORS", Transaction of the ASME Paper No. 73 DET 122.
Semiactive dampers may be of the "off/on" type or of the "continuously" or "infinitely" variable type. A damper of the first type is switched, in accordance with the dictates of a suitable control policy, between alternative "on" and "off" damping states or conditions. In its on state, the damping coefficient of the damper is of preselected relatively high magnitude. The term "damping coefficient," as used herein, means the relationship of the damping force generated by the damper to the relative velocity across the damper, which relationship is not necessarily linear. In its off state, the damping coefficient of the damper is of relatively low magnitude. This may be approximately zero, but in many vehicle suspensions should be of a magnitude sufficiently greater than zero as to discourage "wheel hop." A continuously variable semiactive damper is also switched during operation between an off state, wherein its damping coefficient is approximately zero or of other low magnitude, and an on state. However, when a continuously variable damper is in its on state the damping coefficient thereof may be and normally is changed between a large (theoretically infinite) number of different magnitudes. If operated pursuant to a suitable control policy, a continuously variable semiactive damper may be caused to perform, when in its on state, in a manner similar to the hypothetical "sky-hook" damper discussed in the hereinbefore-mentioned Crosby et al article and in U.S. Patent 4,742,998.
A known control policy for a continuously variable semiactive damper dictates that damper be "on," and that the significant damping forces generated by it be proportional (although not necessarily linearly) to the absolute velocity of the supported member, when the sign of the product of such absolute velocity times the relative velocity between the supported member and the supporting member is positive, i.e., is greater than zero. The policy dictates that the damper be in its off state, wherein the damping coefficient is of preselected low magnitude, when the sign of the aforesaid product is negative, i.e., when the product is less than zero. Generally comparable results may be achieved, particularly at relatively high frequency excitations, by use of an alternative control policy which dictates that damping forces proportional to the relative displacement between the supported and supporting members be produced by the continuously variable semiactive damper at those times when the product of the relative velocity times the relative displacement between the members is less than zero, i.e. when the sign of the product is negative or minus; and that the damping forces be of low magnitude when the aforesaid product is greater than zero, i.e. when its sign is positive or plus.
Although generally producing good results, vibration attenuating systems having continuously variable semiactive damper means controlled in strict accordance with the control policies of the foregoing or similar types may experience shock forces of significant magnitude at some of the times when the damper is switched between its different damping states or conditions. The aforesaid shocks may stress system components to such an extent as to shorten their usual life, and/or may cause the generation of objectionable noise. The problem of noise generation may be particularly apparent in automobile suspensions or other systems containing a resilient deformable member, such as an automobile tire, that is capable of storing energy upon deformation, and of abruptly releasing its stored energy when allowed to rapidly return toward an undeformed condition.
EP-A-0 367 949, which belongs to the prior art according to Art. 54(3) EPC describes a continuously variable semiactive damper having first and second variable volume chambers interconnected by a flow path which has an adjustable valve that is adjusted in accordance with a preselected control policy to regulate flow through the flow path.
The present invention provides an improved control method which reduces the generation of undesirable shock forces and/or noise tending to occur in some vehicle suspension systems, or in other mounting systems, having at least one semiactive damper of the continuously variable type.
1) said damping force of said damper, when in its on state, being selected to have a value which is the lesser of a) a value which is proportional to the absolute velocity of supported member, and b) a value which is proportional to the relative velocity between supported member and supporting member;
2) said damping force of said damper, when in its on state, being selected to have a value which is the lesser of a) a value which is proportional to the relative displacement of the supported member and the supporting member, and b) a value which is proportional to the relative velocity of said supported member and supporting member; and
3) said damping force of said damper, when in its on state, having a rate of change of the damping coefficient limited to a predetermined maximum rate.
said damping force being controlled in accordance with one of the following control policies:
From one aspect the invention consists in a method of operating a continuously variable semiactive damper in a mounting system which includes relatively movable supported and supporting members interconnected by said continuously variable semiactive damper, said damper being switchable between a continuously variable on state and an off state to control a level of a damping force, said method being characterized by:
p
p
p
a second flow path interconnecting said first and second variable volume chambers, said second flow path being in parallel relationship with said first flow path and having a parallel flow path damping ratio Σ which is defined as a ratio of a damping coefficient C of said parallel flow path to a critical damping value, Σ having a value between 0.5 and 1.0.
Fig.1 is a schematic view of a force attenuating suspension or similar mounting system having continuously variable semiactive damper means controllable in accordance with and suitable for practice of the invention;
Fig.2 is a simplified graphic comparison of the damping forces producible by a continuously variable semiactive damper in a system, such as the system of Fig.1, operated in accordance with a standard version and a modified version of a first control policy;
Fig.3 is a simplified graphic comparison of the damper forces produced by the semiactive damper during standard operation and another modified mode of operation thereof,
Fig. 4 is another simplified graphic comparison of the damper forces produced by the damper when operated in a conventional manner and in another modified manner;
Fig. 5 is a simplified graphic comparison of the damping forces produced by the semiactive damper when operated in accordance with control policies based upon the product of the relative displacement and the relative velocity of the supported and supporting members;
Fig. 6 is a schematic representation of alternative control components for a semiactive damper in accordance with the invention; and
Figs. 7 and 8 are graphic representations of the effects of varying a damping ratio of a semiactive damper.
A continuously variable semiactive damper of a mounting system which includes relatively movable supported and supporting members interconnected by said continuously variable semiactive damper, said damper having first and second variable volume chambers interconnected by a first flow path which has a rapidly adjustable valve that is adjusted in accordance with a preselected control policy to regulate fluid flow through said first path of the circuit, said damper being characterized by:
Other features of the invention will be apparent from the following description of illustrative embodiments thereof, which should be read in conjunction with the accompanying drawings, in which:
1
1
1
1
The numeral 10 in Fig. 1 designates a two degree of freedom suspension or similar force-attenuating mounting system interconnecting vertically spaced and relatively movable supported and supporting members 12, 13, respectively. By way of example, members 12, 13 may respectively be body and frame components of an automobile or other motor vehicle that is supported upon a road or similar surface 14 by conventional resiliently deformable tire members 15, only one of which is shown. A primary function of a vehicle suspension system such as system 10 might be to isolate supported member 12 insofar as possible from vibratory and/or other forces transmitted to member 13 by such things as road-surface irregularities, engine disturbances, etc. The designations X, X respectively designate the absolute vertical displacement and the absolute velocity of supported member 12, it being arbitrarily indicated that these are positive when in an upward direction and thus are negative when in a downward direction. The same sign convention and the letters Y, Y similarly designate the absolute vertical displacement and the absolute velocity of supporting member 13. When system 10 is at rest, X, X, Y and Y are all zero.
System 10 includes compression spring means 16 and semiactive damper means 18 which extend in substantially parallel relationship to each other between members 12, 13 and are connected to such members. While only a single spring/damper set is shown, more would normally be provided in the typical vehicle suspension system. Damper assembly 18 is illustratively of the hydraulic piston and cylinder type. The piston rod 20 and cylinder 22 of damper 18 are secured to respective ones of the supported and supporting members 12, 13 by suitable connectors that illustratively include deformable bushing members 24 formed of elastomer or similar resilient compliant material. Relative vertical movement between members 12, 13 causes relative vertical movement between rod 20 and cylinder 22, which in turn displaces hydraulic fluid between variable volume chambers 26, 26' of damper 18 via an electrically or otherwise rapidly adjustable control valve 28 forming part of a hydraulic circuit 30 interconnecting such chambers. Rod 20 of damper 18 preferably and illustratively extends through both of the cylinder chambers 26, 26' such that the amount of fluid displaced between the chambers is the same irrespective of whether the displacement is produced by compression or by extension of the assembly. This eliminates the need for an accumulator or the like (not shown) in association with damper 18.
Damper 18 is of the "continuously variable" type. It is rapidly switchable between an "off" damping state or condition in which the damping coefficient of the damper is of relatively low magnitude (which in some cases is approximately zero), and an "on" state wherein the damping coefficient of the damper may be caused to be of any desired ones of a large (theoretically infinite) number of relatively high magnitudes. Changes in the damping state of damper 18 result from control signals that are imparted to the actuator (not separately shown) of its valve 28 and that cause the valve to throttle or restrict fluid flow through the valve to the extent indicated by the signals. Valve 28 may be of mechanical, electrorheological or any other type capable of rapid operation in the foregoing manner.
The control signals for controlling valve 28 are illustratively electrical ones produced by an electronic controller 32 that operates pursuant to a preselected control policy and input data received from selected ones of a plurality of motion sensors 34, 36, 38 and 40 associated with members 12, 13. Sensors 34, 36 directly detect relative displacements and relative velocities of supported and supporting members 12, 13. Sensors 38, 40 respectively detect accelerations of supported member 12 and supporting member 13, which accelerations can be utilized by such sensors and/or by controller 32 to derive displacement, absolute velocity and/or relative velocity data. Since the data produced by sensors 34, 36 can also be derived from the data produced by acceleration sensors 38, 40, it will be appreciated that not all of the illustrated sensors need be employed or provided in association with system 10. It will also be understood that pressure-sensitive and other types of sensors might be used instead of the illustrated ones.
1
1
1
1
1
X
1
(X
1
- Y
1
) < 0
X
1
(X
1
- Y
1
) > 0
(X - Y) (X
1
- Y
1
) > 0
(X - Y) (X
1
- Y
1
) < 0
Controller 32 is preprogrammed so as to operate in accordance with a standard modified version of any preselected one of a plurality of semiactive damper control policies. One known control policy is based upon the sign of the product of the relative velocity (X - Y) between the supported and supporting members times the absolute velocity (X) of the supported member. More specifically, the standard version of the control policy dictates that the damping coefficient of the damper be approximately zero or of other preselected relatively low magnitude when , i.e., when the sign of the aforesaid product is negative or minus. At those times when the , i.e, when the sign of the product is positive or plus, the standard control policy causes the damper to be "on," and also then so varies the damping coefficient of the damper as to cause its damping forces to be proportional to the absolute velocity of the supported member of the system. In its implementation of this control policy, or a modified version of it, the controller 32 of Fig. 1 may obtain the necessary data with respect to relative velocity from sensor 36 or may derive all of the necessary data from that supplied by sensors 38, 40, or from some other source. Another damper control policy which may be utilized by controller 32, in its standard or modified form, is based upon the sign of the product of the relative velocity (X - Y) of the supported and supporting members times the relative displacement (X - Y) of such members. The standard version of this policy dictates that the damping coefficient of damper 18 be approximately zero or of other preselected relatively low magnitude when , i.e., when the sign of the product is positive. When the sign of the aforesaid product is negative or minus, i.e, when , the standard policy causes the damping coefficient of the damper to be such as to cause generation of damping forces proportional to the relative displacement of the supported and supporting members. The relative displacement and relative velocity data needed for implementation of the policy may be obtained directly from sensors 34, 36 or, alternatively, may be derived from the data produced by acceleration sensors 38, 40.
Utilization of the foregoing control policies in their standard forms may in certain situations result in the production of undesirable system shock forces and/or noise. One such situation is illustrated in Fig. 2 of the drawings which shows in simplified fashion the different damping forces 42, 44 respectively produced in a system, such as the system 10 of Fig. 1, when damper 18 is switched (i.e., caused to undergo changes in its damping state) in accordance with the dictates of standard and modified versions, respectively, of the control policy predicated upon the sign of the product of the absolute velocity 46 of supported member 12 times the relative velocity 48 of members 12, 13. Standard implementation of the aforesaid control policy causes generation of damping forces 42, which are proportional to absolute velocity 46, in those time intervals A, C, E, G, I and K when the product of the absolute velocity 46 and the relative velocity 48 is greater than zero, i.e., is positive or plus. In the other illustrated time intervals, wherein the aforesaid product is less than zero, the damper is in its "off" state and the damping forces are of preselected relatively low magnitude (illustratively zero). It will be noted that abrupt changes or discontinuities in damping forces 42 occur at the end of time interval C and at the commencement of time intervals G and K. These force discontinuities coincide with "zero crossings," i.e., changes in the sign of the relative velocity 48. Immediately prior to the end of time interval C, generation of substantial damping forces 42 by damper 18 was dictated by the standard control policy, and such forces were being produced. In order to produce these damping forces when, as in time interval C, the relative velocity 48 was never large and was becoming increasingly smaller, the control signals directed to damper valve 28 caused it to throttle or restrict the fluid flow to an increasing extent which became maximum as relative velocity 48 reached approximately zero. As relative velocity 48 passed through zero, the standard control policy dictated that the damping forces be zero or of other low magnitude. Valve 28 therefore is caused to undergo abrupt transition from its prior condition, wherein it is substantially completely "closed" and provides maximum resistance to fluid flow, to a condition wherein it is substantially fully "open" and provides minimum resistance to fluid flow. This results in the indicated discontinuity in and abrupt reduction of damping force 42 at the end of time interval C. Similarly, immediately prior to the time intervals G and K, when the absolute velocity 46 and the relative velocity 48 are positive and negative, respectively, the control policy then dictates that no damping forces be produced, as a result of which damper valve 28 then occupies its fully "open" condition wherein it provides minimum resistance to fluid flow. As the relative velocity 48 crosses through zero at the outset of each of the time intervals G and K, the control policy dictates that damper 18 generate damping forces of substantial magnitude, proportional to the magnitude of absolute velocity 46. In order to generate damping forces 42 of such magnitude, at a time when the relative velocity 48 is of small magnitude, valve 28 of the damper undergoes an abrupt transition from its prior substantially fully open condition to its substantially fully closed condition, causing the abrupt force increases and discontinuities at the outset of the time intervals G and K. The indicated force discontinuities may produce undesirable stresses and/or noise in the system.
The lowermost plot of Fig. 2 indicates the changed damping forces 42' that ensue when the previously described standard control policy is modified so as to delay changes in the damping state of damper 18 until absolute velocity 46 is zero or of other preselected relatively small magnitude. Under this modified control policy, the damping forces 42' generated in time intervals A, E and I are the same as the forces 42 in such time periods. However, the forces 42' which began to be generated in time interval C continue to be generated during and throughout time interval D, and no damping forces whatsoever are generated during time intervals G and K. The discontinuities in the damper force 42 arising from use of the standard version of the control policy therefore do not occur in the damping force 42' generated pursuant to the modified version of such control policy.
The modified control policy need not always defer all state changes of damper 18. It may instead be so designed as to defer only a preselected percentage of the state changes, or only those in which the state change is from on to off, or from off to on, etc., in which case not all of the force discontinuities will be eliminated.
The above-discussed modified control policy is most suitable for use in systems where there are many more zero crossings of the absolute velocity 46 than of the relative velocity 48. Substantial deterioration of the vibration attenuating performance of the damper may occur when the system is not of this type. Fig. 3 of the drawings is a simplified graphic representation of a system of the latter type, i.e., one in which there are considerably less zero crossings of the absolute velocity 50 than of the relative velocity 52. Pursuant to the dictates of the standard version of the control policy utilizing the sign of the product of the absolute velocity times the relative velocity, damper 18 is in its off state and no significant damping forces are generated in the time intervals B, D, F, H, J, L, N and P. In time intervals A, C, E, G, I, K, M and O, damper 18 is in its on state and generates damping forces which are proportional to absolute velocity 50. Except at the commencement of time intervals A and G and at the end of time interval O, at each of which there is a zero crossing of absolute velocity 50, the damping force 54 in each of the latter time intervals is characterized by an initial abrupt force increase and a final abrupt force decrease. As is indicated by the force curves 56 in Fig. 3, the abruptness of these transitional force changes can be significantly reduced by limiting to a preselected maximum magnitude the rate at which the adjustably variable damper valve 28 undergoes adjustment, and thus the rate of change of the damping coefficient of damper 18. Fig. 6 is a schematic representation of one type of apparatus that can be employed to achieve the foregoing result. Components of the Fig. 6 apparatus that are similar to those shown in Fig. 1 are designated by the same reference numeral with the addition of a prime designation. The valve-command signals generated by the controller 32' of Fig. 6 pass along a first path to the data input terminal 80 of a switching device 82 having alternatively selectable data output terminals 84, 86. The valve command signals also pass to a gain device 88, which then converts them to damper command force signals. The damper command force signals of device 88 are received by a logic device 90, and a summer device 92. Summer 92 also receives, from a strain gauge or other suitable sensor 94 associated with damper 18, input signals that are proportional to the negative of the damping forces then being produced by the damper. Device 92 sums the aforesaid inputs to create an error signal which is representative of the control policy dictated change in the damping force. This error signal is transmitted to logic device 90. If the error signal is no greater than a preselected magnitude, in an absolute value sense, a command from logic device 90 causes the valve command signal at terminal 80 of switch 82 to be transmitted via switch terminal 84 directly to the combination valve actuator 28' of damper 18'. If the error signal received by it is greater than the preselected magnitude, device 90 causes the valve command signal output from switch 82 to device 28' to be via terminal 86 and a low pass filter 96, the break frequency and order of which are such as to "smooth" (i.e., reduce the rate of change of) the valve command signals sufficiently as to prevent the production by damper force discontinuities of objectionable magnitude. When the error signal transmitted by summer 92 to logic device 90 again becomes less than the preselected magnitude, device 90 returns switch 82 to the condition in which its output again is from terminal 84. As is indicated by phantom lines in Fig. 6, the filtered output signals of filter 96 may also be directed, via a gain device 98, to summer 92. Such signals could then be used, in lieu of those generated by sensor 94, to create the signal used by logic device 90 to cause the input of switch 82 to again be directed to terminal 84.
on
on
p
p
on
on
on
p
p
p
on
p
Σ
on
= C
on
ö 2
,
MK
Σ
p
= C
on
ö 2
.
MK
Results comparable to those described above and illustrated by the damping forces 56 of Fig. 3 may alternatively be achieved by providing a bypass flow path, of preselected size, that provides limited communication across valve 28 and thus between variable volume damper chambers 26, 26' even when valve 28 is fully closed. This is indicated by phantom lines in Fig. 1, wherein the numeral 30' designates a branch of the circuit 30 interconnecting damper chambers 26, 26'. Branch 30' contains a restriction 100, which may be of either a fixed or an adjustably variable type, and extends in parallel relationship to the main part of the circuit 30 containing valve 28. C is the damping coefficient attributable to the restriction by valve 28, when damper 18 is in its "on" state, of fluid flow through the main part of fluid circuit 30. C relates the damping face produced in the on-state of damper 18 to the absolute velocity of the supported member 12 (Fig. 1). C is the damping coefficient attributable to restriction of fluid flow through parallel branch 30' of the circuit. If there is no flow through valve 28, C relates the damping force to the relative velocity. Σ is the on-state damping ratio (i.e., the ratio of C to the critical damping) related to the on-state damping coefficient C by the equation wherein M is the mass of member 12 and K is the stiffness of spring 16. Σ is the parallel flow path damping ratio (i.e., the ratio of C to the critical damping) related to C by the equation Fig. 8 is a plot of the normalized "jerk" (i.e., the derivative of acceleration of a supported member, such as member 12) against the on-state damping ratio Σ for mounting systems having a passive damper, a continuously variable semiactive damper not having a parallel flow path, and for a plurality of continuously variable semiactive dampers containing bypass flow paths having different values of Σ.
p
p
p
on
p
p
p
The curve 1 is for the Passive damper. The curve 2 is illustrative of that produced by a conventional continuously variable semiactive damper having no parallel flow path and a very high value of Σ. Curves 3-6 represent semiactive damper systems in which Σ has values of 1.0, 0.75, 0.5 and 0.25, respectively. As is apparent from a comparison of curve 2 and curves 3-6, each of the systems having parallel flow paths experiences less jerk than the conventional semiactive system, and the degree of jerk decreases as the value of Σ decreases. However, as is apparent from the graph of Fig. 7, which is similar to that Fig. 8 except that the abscissa in this instance represents the acceleration of member 12, the effectiveness of the semiactive damper (in terms of the degree of "isolation" achieved) also decreases, particularly at the higher values of Σ, as the value of Σ decreases. The preferred value of Σ therefore is a compromise one, which yields significantly reduced jerk without unduly detracting from the isolation of member 12, within the range of about 0.5 - 1.0. It will be understood that in providing an Σ value in the foregoing range, any leakage about or across valve 28 should be taken into consideration since it also is in parallel with the valve and acts in the same manner as the flow through by-pass branch 30' of circuit 30.
In the graphic representation of Fig. 4, the absolute velocity 50, the relative velocity 52, and the damping force 54 are the same as those respectively designated by the corresponding numerals in Fig. 3. The other damping forces 68 shown in Fig. 4 are produced by another modified version of the damper control policy based upon the sign of the product of the absolute and relative velocities. In the Fig. 4 modified version of such policy, the damping coefficient of damper 18 (Fig. 1) is varied so as to cause the damping forces generated at those times when the sign of the aforesaid product is greater than zero, i.e., is plus or positive, to be the smaller of the damping forces proportional to the absolute velocity 50, or the damping forces proportional to the relative velocity 52. The result of this policy is most clearly apparent from the damping forces 68 in time interval E. Such forces track (i.e., are proportional to) the relative velocity 52 until such time as the relative velocity becomes greater than the absolute velocity 50. Forces 68 then track absolute velocity 50 until such time as relative velocity 52 again becomes smaller than absolute velocity 50.
Fig. 5 is a simplified graphic comparison of the damping forces produced in a force attenuating system, such as that of Fig. 1, controlled in accordance with standard and modified versions of the control policy predicated upon the sign of the product of the relative displacement 70 and relative velocity 72 of the supported and supporting members 12, 13. In accordance with the dictates of the standard control policy, damper 18 produces damping forces 74 proportional to the relative displacement 70 of members 12, 13 in those time intervals A, C, E and G when the product of the relative displacement and relative velocity 70, 72 is less than zero, i.e., is of negative sign. The other damping force 76 of Fig. 5 is that produced by utilization of a modified control policy in which all switching of the on/off states of damper 18 is deferred until relative displacement 70 is at or near zero. The modified policy produces damping forces only in time intervals A and G, and not in time intervals C and E. As in the case of the control policy predicated upon the product of the absolute velocity of the supported member times the relative velocity of the supported and supporting members 12, 13, another possible modification of the control policy predicated upon the product of the relative displacement and the relative velocity of the supported and supporting members 12, 13 would be to cause the damping forces to be the smaller of those proportional to the relative displacement of members 12, 13, or those proportional to the relative velocity of members 12, 13.
In those modified control policies wherein state changes of damper 28 are deferred until the absolute velocity of supported member 12 is at or near zero, or until the relative displacement of supported and supporting members 12, 13 is at or near zero, the delay in state change does not necessarily have to occur at every such "zero crossing." Thus, by suitable programming of controller 32, the delays in state changes of damper 18 can be caused to occur only when the change is from a lower damping state to a higher damping state, or from a higher damping state to a lower damping state, etc. Modifications of the standard control policies frequently entail a compromise between system performance, on the one hand, and reduction of undesirable system shocks and noise, on the other hand. As a general rule, therefore, it is desirable to depart from the standard control policies only insofar as might be necessary to eliminate objectionable noise, jerks or shocks in the system.
It has been ascertained that the problem of noise generation in a conventional vehicle suspension system, such as that schematically shown in Fig. 1 and which includes a resilient deformable tire member 15 in series with the illustrated damper 18, is affected by the condition of the tire. Objectionable noise is particularly likely to ensue when damper 18 undergoes a change from a higher damping state to a lower damping state at a time when the magnitude of the tire's compressive deformation, and thus its stored energy, is of substantial magnitude. When in a high damping state, damper 18 transmits much of the load force of supported suspension member 12 to supporting member 13. This load force, as well as that of member 13, is transmitted via wheel 23 and axle 25 to tire 15, as a result of which the tire compressively deforms and stores energy. Abrupt reduction in the damping coefficient of damper 18, such as would occur upon change in the damper state from on to off, partially "decouples" supported suspension member 12 from suspension member 13. In a typical automobile suspension system the weight of member 12 is customarily many times greater than that of member 13. The foregoing "decoupling" therefore greatly reduces the forces tending to maintain tire 15 in a compressively deformed, energy-storing condition. Consequently, the tire undergoes rapid return movement to an undeformed condition and abruptly transmits a substantial portion of its stored energy, via wheel 23 and axle 25, to member 13. This causes "ringing" and "bouncing" of the aforesaid components and accompanying generation of objectionable "thumping" noise. If the particular system contains other resiliently deformable members in series with the damper, such as the compliant rubber bushings 24 shown in the system 10 of Fig. 1, these also may occasion or contribute to the production of objectionable shock forces and/or noise if the damper state is abruptly changed while such members are in a deformed energy-storing condition.
The aforesaid undesirable results can be eliminated, or at least minimized, by utilization of either of the modified versions of the control policies illustrated in Figs. 2 and 5, and which defer damper state changes, or at least changes from an on state to an off state, until the absolute velocity (in the case of the Fig. 2 policy) or the relative displacement (in the case of the Fig. 5 policy) is of zero or other preselected relatively low magnitude. An alternative approach is to defer all or at least some of the damper state changes until the magnitude of the deformation and thus the stored energy of tire 15, and/or of some other deformable energy-storing member within the system, is no greater than some preselected low magnitude. In the case of tire 15, this can be determined by monitoring the vertical displacement of member 13, either by use of data derived from that produced by accelerometer sensor 40, or by use of some other type of sensor (not shown) capable of more directly ascertaining the magnitude of the deformation and/or the stored energy of tire 15 and/or other energy-storing member of the system.
A further alternative is to defer some or all of the damper state changes until the stored energy of the deformable energy-storing system member is no greater than a preselected magnitude, or until the appropriate system motion parameter (e.g., absolute velocity or relative displacement) of the system is no greater than a preselected low magnitude, whichever first occurs.
Description of the Preferred Embodiment | |
Performs the job expectations of the Registered Nurse in his / her assigned care area.
Promotes on the job training of all staff members through coaching, mentoring and evaluation.
Serves as a role model for staff by collaboratively working with the staff and physicians.
Coordinates orientation of newly assigned staff with preceptor. Facilitates clinical experiences to meet orienting employee needs.
Assists in data collection for process improvement projects including restraints.
Mental and emotional stability, demonstrating a courteous and calm approach to all contacts with patients, visitors, and health care team members.
Personal qualities such as kindness, compassion, empathy, understanding, integrity, respect, sense of humor, discretion and confidentiality.
Ability to communicate verbally in English and in written form with persons of varied backgrounds in a respectful, effective and professional manner.
The Charge Nurse is an RN assigned a specific unit who assists with responsibilities for the coordination of patient care using a multidisciplinary approach in accordance with the Hospital's Mission, physician, and patient expectations. Additional responsibilities include but are not limited to policy implementation, giving input into staffing patterns, maintaining supplies and equipment, participating in process improvement projects and staff development programs to ensure delivery of quality care. If the situation arises, the Charge Nurse self-assigns patients based on patient acuity, staffing mix and the ability to perform primary and secondary responsibilities of a Charge Nurse. | https://system.joinahs.com/job/charge-nurse-emergency-department-full-time-day-shift/J3Q27P6BQ4X2VTDJ2R3/ |
This project exploits our recent and novel finding that the GAF domain of the NorR transcriptional activator, a member of the family of bacterial enhancer binding proteins (EBPs), contains a mono-nuclear non-haem iron centre that binds a single molecule of nitric oxide (NO). We have demonstrated that the NO-modified form of NorR activates transcription initiation by RNA polymerase holoenzyme containing the alternative sigma factor sigma 54. The interaction of the GAF domain of NorR with NO apparently relieves intramolecular repression of the AAA+ domain, leading to transcriptional activation. We plan to use a multidisciplinary approach, employing spectroscopy coupled with protein structure -function studies and analysis of nucleoprotein complexes to understand in molecular detail how the binding of NO to the ferrous iron centre in the GAF domain of NorR leads to transcriptional activation by this important regulatory protein. | https://gtr.ukri.org/projects?ref=BB%2FD009588%2F1 |
Itchy Skin Threatens CKD Patients' Quality of Life
More severe cases seen in those with higher stages of chronic kidney disease
MedpageToday
by Kristen Monaco, Staff Writer, MedPage Today
April 12, 2019
This article is a collaboration between MedPage Today® and:
Pruritus among non-dialysis chronic kidney disease (CKD) patients may be more common than previously realized, researchers reported.
In an international survey of 3,780 people with non-dialysis stages 3-5 CKD, 24% reported having moderate-to-extreme pruritus, Nidhi Sukul, MD, of the University of Michigan in Ann Arbor, and colleagues wrote in the Clinical Journal of the American Society of Nephrology.
Pruritus also appeared to be more common among those with more advanced disease. Compared with patients with stage 3 CKD, those with stage 5 had a 19% higher prevalence of moderate-to-extreme pruritus (adjusted prevalence ratio 1.19, 95% CI 0.97-1.48).
Moderate-to-extreme pruritus was also more likely to occur in CKD patients with certain comorbidities, including the following:
Lung disease: aPR 1.37 (95% CI 1.17-1.59)
Diabetes: aPR 1.17 (95% CI 1.04-1.31)
Diagnosed depression: aPR 1.29 (95% CI 1.10-1.52)
Patients who suffer from more extreme pruritus also tended to be female, and the prevalence increased with age -- i.e., pruritus was significantly more prevalent in patients ages ≥75 years versus those <55 (aPR 1.42, 95% CI 1.14-1.76).
"In dialysis facilities where 21-50% of patients reported having severe pruritus, only 1% of medical directors estimated this same prevalence," Sukul's group pointed out, citing previous research. "This may be due, in part, to underreporting by patients, as 17% of patients who were nearly always or always bothered by pruritus had not reported their symptoms to any healthcare provider."
In a statement, Sukul added: "One of the main goals of managing chronic disease is alleviating symptoms; however, this is only possible when we are aware of the suffering patients endure. This research gives us a uniquely international look at how important it is to ask our patients with chronic kidney disease if and how they are affected by pruritus."
The analysis used cross-sectional data from patients residing in the U.S., Brazil, and France from the CKD Outcomes and Practice Patterns Study. Participants completed self-reported patient surveys on health-related quality-of-life with the Kidney Disease Quality of Life Short Form and on depressive symptoms with the Center for Epidemiologic Studies Depression Scale Short Form.
Information of pruritus and severity level was gathered using a quality-of-life survey, where patients were asked how bothered they were by itchy skin within the past 4 weeks; approximately half the patients were free of pruritus, while 26% reported mild cases.
However, among the 24% with moderate-to-extreme cases, the majority said they also suffered from moderate-to-severe dry skin (73% vs 19% without pruritus). Around half of these patients also said they had restless sleep at least 3 nights per week compared with 26% of patients without pruritus.
These individuals also tended to have higher serum phosphate levels (aPR 1.07, 95% CI 1.00-1.15) and lower hemoglobin levels (aPR 0.94, 95% CI 0.90-0.98) compared with those with either mild or no pruritus. There were no differences with serum calcium levels, though. But the researchers pointed out that "given the strong correlation with advanced CKD, high serum phosphate and low hemoglobin levels may, to some extent, serve simply as markers of poor kidney function."
Self-reported depressive symptoms among patients with moderate (PR 1.83, 95% CI 1.58-2.11) or extreme (PR 2.55, 95% CI 2.07-3.13) pruritus was significantly higher compared with patients who didn't suffer from pruritus, suggesting that the condition may pose a notable threat to a patient's mental health and quality of life.
"It is conceivable that the higher prevalence of depression seen among patients with more severe pruritus could be mediated through mechanisms such as restless sleep and fatigue, which are exacerbated by severe pruritus," the group also pointed out.
Although some patients reported taking medications for their pruritus, including antihistamines, gabapentin, or pregabalin, Sukul's group suggested that future studies should aim to look at new treatment options and existing medications for pruritus.
"Some drugs have been shown to largely improve pruritus-related symptoms for a substantial percentage of patients, but even if we do not have a universally effective treatment for pruritus, recognizing that pruritus ails our patients and affects their quality of life will make them feel heard and enhance the patient-physician relationship in discussing approaches that may help provide relief from pruritus," Sukul concluded.
Accessibility Statement
At MedPage Today, we are committed to ensuring that individuals with disabilities can access all of the content offered by MedPage Today through our website and other properties. If you are having trouble accessing www.medpagetoday.com, MedPageToday's mobile apps, please email [email protected] for assistance. Please put "ADA Inquiry" in the subject line of your email.
| |
Autism Spectrum Disorder is a neurological condition that impacts a person’s perception and social behavior.
It causes problems in social interaction and communication of the individual.
These disorders are more concerned with the development of the individual.
Spectrum in it refers to wide range of symptoms along with severity.
It starts in the early age and lasts through out the life of an individual.
It is one of the common disorder among the 10 most common mental disorders.
Causes:
The causes of it are not known to have a single reason.
Based on the severity and symptoms there can be many causes.
Both genetics and environment may play a role.
- Genetics. Several different genes appear to be involved in autism spectrum disorder. For some children,it can be associated with a genetic disorder, such as Rett syndrome or fragile X syndrome. For other children, genetic changes (mutations) may increase the risk of it.
- Environmental factors. Researchers are currently exploring whether factors such as viral infections, medications or complications during pregnancy, or air pollutants play a role in triggering the disorder.
One of the greatest controversies in autism spectrum disorder centers on whether a link exists between the disorder and childhood vaccines.
There is no link between childhood vaccines and the autism spectrum disorders.
Avoiding childhood vaccinations can place your child and others in danger of catching and spreading serious diseases, including whooping cough (pertussis), measles or mumps.
Risk factors
The number of children diagnosed with autism spectrum disorder is rising.
- Your child’s sex. Boys are about four times more likely to develop disorder than girls are.
- Family history. Families who have one child with this disorder have an increased risk of having another child with the disorder. It’s also not uncommon for parents or relatives of a child with this disorder to have minor problems with social or communication skills themselves or to engage in certain behaviors typical of the disorder.
- Other disorders. Examples include fragile X syndrome, an inherited disorder that causes intellectual problems; tuberous sclerosis, a condition in which benign tumors develop in the brain; and Rett syndrome, a genetic condition occurring almost exclusively in girls, which causes slowing of head growth, intellectual disability and loss of purposeful hand use.
- Extremely preterm babies. Babies born before 26 weeks of gestation may have a greater risk of this disorder.
- Parents’ ages. There may be a connection between children born to older parents.
Symptoms:
Some children show signs of autism spectrum disorder in early infancy, such as reduced eye contact, lack of response to their name or indifference to caregivers.
Other children may develop normally for the first few months or years of life, but then suddenly become withdrawn or aggressive or lose language skills they’ve already acquired.
Signs usually are seen by age 2 years.
Each child with autism spectrum disorder is likely to have a unique pattern of behavior and level of severity — from low functioning to high functioning.
Some children with autism spectrum disorder have difficulty learning, and some have signs of lower than normal intelligence.
Because of the unique mixture of symptoms in each child, severity can sometimes be difficult to determine.
It’s generally based on the level of impairments and how they impact the ability to function.
Below are some common signs shown by people who have autism spectrum disorder.
Social communication and interaction:
A child or adult with autism spectrum disorder may have problems with social interaction and communication skills, including any of these signs:
- Fails to respond to his or her name or appears not to hear you at times
- Resists cuddling and holding, and seems to prefer playing alone, retreating into his or her own world
- Has poor eye contact and lacks facial expression
- Doesn’t speak or has delayed speech, or loses previous ability to say words or sentences
- Can’t start a conversation or keep one going, or only starts one to make requests or label items
- Speaks with an abnormal tone or rhythm and may use a singsong voice or robot-like speech
- Repeats words or phrases verbatim, but doesn’t understand how to use them
- He/ She Doesn’t appear to understand simple questions or directions
- Doesn’t express emotions or feelings and appears unaware of others’ feelings
- He/She point at or bring objects to share interest
- Inappropriately approaches a social interaction by being passive, aggressive or disruptive
- Has difficulty recognizing nonverbal cues, such as interpreting other people’s facial expressions, body postures or tone of voice
Patterns of behavior:
A child or adult with autism spectrum disorder may have limited, repetitive patterns of behavior, interests or activities, including any of these signs:
- Performs repetitive movements, such as rocking, spinning or hand flapping
- Performs activities that could cause self-harm, such as biting or head-banging
- Develops specific routines or rituals and becomes disturbed at the slightest change
- Has problems with coordination or has odd movement patterns, such as clumsiness or walking on toes, and has odd, stiff or exaggerated body language
- Is fascinated by details of an object, such as the spinning wheels of a toy car, but doesn’t understand the overall purpose or function of the object
- Is unusually sensitive to light, sound or touch, yet may be indifferent to pain or temperature
- Doesn’t engage in imitative or make-believe play
- Fixates on an object or activity with abnormal intensity or focus
- Has specific food preferences, such as eating only a few foods, or refusing foods with a certain texture
As they mature, some children with autism spectrum disorder become more engaged with others and show fewer disturbances in behavior.
Some, usually those with the least severe problems, eventually may lead normal or near-normal lives.
Others, however, continue to have difficulty with language or social skills, and the teen years can bring worse behavioral and emotional problems.
Types of Autism Spectrum Disorders:
- Asperger’s syndrome. This is on the milder end of the autism spectrum. A person with Asperger’s may be very intelligent and able to handle her daily life. She may be really focused on topics that interest her and discuss them nonstop. But she has a much harder time socially.
2. Pervasive developmental disorder, not otherwise specified (PDD-NOS). This mouthful of a diagnosis included most children whose autism was more severe than Asperger’s syndrome, but not as severe as autistic disorder.
3. Autistic disorder. This older term is further along the autism spectrum than Asperger’s and PDD-NOS. It includes the same types of symptoms, but at a more intense level.
4. Childhood dis integrative disorder. This was the rarest and most severe part of the spectrum. It described children who develop normally and then quickly lose many social, language, and mental skills, usually between ages 2 and 4. Often, these children also developed a seizure disorder.
Treatment:
The types of treatments generally can be broken down into the following categories:
- Behavior and Communication Approaches
- Dietary Approaches
- Medication
- Complementary and Alternative Medicine
Behavior and Communication Approaches:
- Applied Behavior Analysis (ABA). ABA is often used in schools and clinics to help your child learn positive behaviors and reduce negative ones. This approach can be used to improve a wide range of skills, and there are different types for different situations, including:
- Discrete trial training (DTT) uses simple lessons and positive reinforcement.
- Pivotal response training (PRT) helps develop motivation to learn and communicate.
- Early intensive behavioral intervention (EIBI) is best for children under age 5.
- Verbal behavior intervention (VBI) focuses on language skills.
2. Developmental, Individual Differences, Relationship-Based Approach (DIR). This kind of treatment is better known as Floortime. That’s because it involves you getting on the floor with your child to play and do the activities he likes.
It’s meant to support emotional and intellectual growth by helping him learn skills around communication and emotions.
3. Treatment and Education of Autistic and Related Communication-handicapped Children (TEACCH). This treatment uses visual cues such as picture cards to help your child learn everyday skills like getting dressed. Information is broken down into small steps so he can learn it more easily.
4. The Picture Exchange Communication System (PECS). This is another visual-based treatment, but it uses symbols instead of picture cards. Your child learns to ask questions and communicate through special symbols. | https://howlsofphoenix.com/2020/06/04/what-is-autism-spectrum-disorder/ |
Park officials report dangerous cannabis grow site found in Jail Canyon
Illegal grow-op rooted in remote canyon that is rarely visited.
Park rangers in California recently discovered a remote, 40-acre illegal grow-op in Jail Valley that has caused irreparable damage to the area and prompted officials to close down the site to public access as a safety precaution.
Growing cannabis indoors produces a lot of greenhouse gases — just how much depends on where it’s grown
And then there’s the trash. Last December, a joint team led by the California Department of Fish and Wildlife (CDFW) finished removing about 3,000 pounds (1,361 kilograms) of trash from a former illegal grow-op that was blighting pristine land in Los Padres National Forest.
With regard to the Death Valley discovery, the NPS reports growers involved with previous illegal operations have also “threatened hikers who have stumbled upon their illegal operations.” As such, Jail Canyon has been “temporarily closed for public safety reasons until park rangers can fully evaluate the area,” it notes.
Grow sites are unlikely to be an issue on well-travelled routes in the park. But hikers in “remote areas near water sources should remain alert, turn around and leave if they notice signs of suspicious activity, such as excessive amounts of trash, hillside terracing, or plastic irrigation tubing,” the NPS recommends. Once safe, the information should be reported to the NPS.
“The natural and cultural resources in these areas are irreplaceable and invaluable, damaging them for profit shows incredible disrespect to our homeland,” says Barbara Durham, traditional historic preservation officer for the Timbisha Shoshone Tribe.
“Seeing irreparable damage to a fragile ecosystem rich with rare natural and cultural resources is devastating,” adds Rob Wissinger, chief ranger at Death Valley National Park.
The NPS statement does not note if anyone was discovered at the grow or if any arrests have been made in connection with the illegal operation. | https://leaderpost.com/cannabis-news/park-officials-report-dangerous-cannabis-grow-site-found-in-jail-canyon/wcm/b1fddbb9-796f-4135-b874-81f66d421df5/amp/ |
The novella is divided into 3 chapters. Chapter 1 deals with the couple’s grievances in the city, their motivations for moving, and their initial period of settling into Garra Nalla.
Rising interest rates, Anna’s asthma and their cramped apartment are all cited as reasons for the couple to move away from Sydney’s CBD. Moreover, there is an even more powerful impetus, which appears psychological in nature that is not mentioned but implied. “He knew it was time to go. He could not see her deflated and diminished in this way. It was as though her robust beauty, an athletic glow that had first attracted him, was being preyed upon by an invisible vampire.” This “invisible vampire”, we later discover, refers to visions of ‘the boy’ – the couple’s stillborn child.
They then begin the process of selecting the coastal town which will become their new home. They settle on Garra Nalla, a town with “no shops, no hotel, no community hall or boat ramp or barbecue area. This was the reason they had chosen this place. They felt that in some essential way it was uncultivated, a landscape out of time, and as such it could not define them. Here they could live, and simply be.”
We are soon introduced to “the boy”, whose identity is not explained, but who comes and goes in unpredictable fashion. Our most important insight about the boy in chapter 1 comes when Anna says she “Expects him to be here every morning. But she must be careful of this; if she begins to take anything for granted, then she might break the spell.” This recurrent reference to the boy, without explanation of his identity builds curiosity in the reader. For now, in chapter 1, the true identity of the boy is left to the reader’s own theories and imaginings.
Chapter 1 introduces Luke and Anna’s routines and hobbies in significant detail. For Luke, birdwatching and reading the chronicles of Sir Edward Treves (a collection of old books he found in their shed) enables him to connect more deeply with the natural environment and history of Garra Nalla. This is contrasted to Anna, who’s late night blogging and trawling of CNN and BBC suggests she is eager to remain in contact with civilisation. “Luke leaves it to Anna to catch up with friends, to post news of their sea change and to write jokey accounts of rural mishaps…it makes her feel connected with the outside world.” The dichotomy between Luke and Anna in this respect can be utilised in your essay to demonstrate diversity in the way that each individual experiences change. Although both have moved to Garra Nalla, and both share many common sentiments, their overall personal experience is distinctly unique from each other’s.
Chapter 2
Chapter 2 deals with the various day-to-day aspects of life in Garra Nalla. We are introduced to most of the couple’s neighbours and the challenges of rural life, we learn of their misgivings and short-lived return to Sydney and learn more about the boy.
The first challenge of rural living that they face is the severe drought that has afflicted their town for years. “Accustomed to the sub-tropical downpours of the city and the smell of mould in their old apartment they cannot believe how dry the air is, how this dryness becomes part of you, of your skin and hair and how after a while you crave moisture in the air.” To add to this, the “hectoring wind” can “bluster for weeks at a time.” In her persistence to run and swim despite the wind, Anna’s skin turns to “parchment, dried out and stretched across her cheekbones in a mask.” A traumatic encounter with a snake, and the continued drought exacerbate Anna’s increasing frustration with life in Garra Nalla, until she admits “I keep wondering if we’ve made a mistake.” Chapter 2 is abundant in examples of how new environments challenge us and force us to progress in personal growth. This is a key human experience emphasised in the novel.
Anna’s irritation with rural life culminates in her and Luke returning to the city for a brief break, only to realise after 5 days that they miss Garra Nalla. “But then somewhere in the middle of the week she begins to feel claustrophobic…she misses her house…she misses the she-oaks with their wispy canopies…” This return to the city is a turning point for Anna’s identity. It is at this point that she truly begins to feel attachment to Garra Nalla and begins to ground part of her self-image in the bush. This can be used as another example of how new environments cause us to question and reshape our identities.
They meet the Watts – Alan, his wife Bette, and their two children, who are “Energetic, practical people, who seem able to do almost anything.” Meeting the vibrant Watts, who had built a solar-powered house and cleaned up the abandoned tennis court, makes Luke feel old. “he perceives that he is no longer spirited, juiced-up; he no longer has that youthful sheen, that cocky invincibility.” This could be used in an essay to portray the human experience of self-discovery when we are exposed to new environments and new kinds of people.
Chapter 3
Chapter 3 is much shorter and chiefly focuses on the events surrounding the fire, its prelude and aftermath. The first half of the chapter focuses on the couple’s increasing trepidation as the fire encroaches gradually upon Garra Nalla. Their attitude, like most of the townspeople, is complacency in the fact that the fire couldn’t possibly reach the coast. When it becomes clear that the fire has overtaken the town, the couple is rescued in timely fashion by a passing fire-truck.
After the fire passes, all the townspeople are shocked to learn that almost every house was still standing. In what could be described as the pivotal moment of the entire novel, the couple discover Luke’s navy-ribbed sweater had been burnt out, but had not caught fire, and that because of this it had saved the house from ruin. The sweater, which Luke had worn as he scattered the ashes of the boy in the ocean, had till then only represented memories of anguish, sorrow and death. However, by saving the house, the sweater had become a symbol of preservation of life. Until the fire, Luke had never really expressed visible grief towards the memory of the boy. However, when the sweater is burned, it triggers him to reminisce about the day of the miscarriage, finally revealing who “the boy” is and why he still plagues the couple. The fire also prompts Anna to see a dream of the boy “waving at her…dissolving into the light”, symbolising the last of his appearances to her. Just as fires initiate renewal of the bush, the fire in the novel comes to symbolise a reformation in the attitudes and beliefs of the protagonist duo.
Analysis of Main Characters
The storytelling form in Vertigo is unique in that it is 3rd person, but always speaks from the over-the-shoulder perspective of either Luke or Anna at any one time. The resulting narrative produces two unique story arcs, one from Luke’s perspective and one from Anna’s, which intersect and then diverge seamlessly. Hence each character is explored as individually and also in relation to the other.
Luke
Luke immediately adjusts to life in the country, despite Anna’s “misgivings, he remained resolute” in their decision to move. He eagerly takes up bird-watching as a hobby and becomes engrossed in the books he finds buried in their shed. With his increasing interest in his hobbies, and reduced receptiveness to his wife’s frustrations, Luke gradually becomes distant from Anna. “His detachment was infuriating” to Anna and he slowly becomes “tired of his wife’s churlishness.” Furthermore, Luke does not appear to be troubled by the visions of the boy in the same way Anna is. He sees “benign dreams” of himself swimming with the boy and does not display the same anxiety Anna does when the boy is not around. His grief does not become unleashed his navy-ribbed sweater is destroyed in the fire, and it brings back memories from the delivery-room. This outburst of emotion allows him to relate to Anna, who has harboured similar feelings all the while. After he returns from a day alone in the bush, she notes “she has never seen Luke cry, not even once… so they stand there in the doorway, and they hold onto one another for a very long time.” This embrace denotes reconnection between the couple, after a period of distance and estrangement. Again, this renewal in their relationship is brought about by the dramatic experience of the fire, which is an overarching symbol of reformation in the novel (as we have discussed earlier).
Anna
The majority of the novella is written from Anna’s perspective, which seems to be a deliberate bias on behalf of Lohrey. Anna does not adjust to their new home as smoothly as Luke does, and has reservations about the decision many months after the move. She is irked by the perpetual drought, unrelenting wind, snakes, neighbours, lack of connection to the outside world and by her own husband’s lack of receptiveness to her dissatisfaction. Furthermore, she is full of anxiety towards the apparitions of the boy and blames herself when he does not appear. Her identity crisis peaks at the end of chapter two when she asks herself: “so what is this pointless dance they are engaged in…locked in the illusion that they are going somewhere? …the thought of this brings on a rush of vertigo…she has lost her roots, her anchorage to the earth…perhaps it’s to do with the boy, for she feels he has abandoned them.” This page-long stream of consciousness clearly demonstrates Anna’s disorientation in her new environment and lack of clarity of self-image. It is only after the fire, after reconnecting with Luke and boding a proper farewell to the boy that she is able to resolve her internal turmoil.
Themes of Human Experience
Human Experience #1: Grief, Loss and the Diverse Ways Human Beings Cope with Them
It can be argued that the entirety of the novella is driven by the loss of Anna and Luke’s stillborn child. Their decision to move to the country, despite having multiple motivations, is sealed by the visions of their son that haunt them, especially Anna. “He knew it was time to go. He could not see her deflated and diminished in this way. It was as though her robust beauty, an athletic glow that had first attracted him, was being preyed upon by an invisible vampire.” Visions of the boy continue to return throughout the novel, until the concluding events of the story enable the couple to let go and move on.What is being explored here is the collective human experience of grief, and the diverse ways in which human beings deal with loss.
Sample Topic Sentence:
Despite portraying grief as a powerful, disorientating, collective human experience,
Vertigo
emphasises appreciation for the diverse ways in which individuals experience, deal with, and overcome grief.
As a couple, it is implied that both Luke and Anna pursue this major change in setting to escape the melancholy memory of “the boy” that continues to plague them. The fact that this relatively successful young couple, with promising futures in the city, would uproot their entire lives to move to the country – speaks volumes to the power that grief exerts on the human psyche.
Additionally, the ways in which they each experience and deal with loss is differentiated and unique. Anna notes her husband’s remarkable ability to “blot out emotion and distraction, drawing the world in around him on his own terms whereas she seems to bleed out into it…sometimes she feels like a fly caught in some invisible web.” While Luke’s visions of “the boy” are benign, reminiscent dreams of him “swimming beneath the sunlit surface like a water baby”, Anna’s visions are almost apparition-like, revealing anxiety and even guilt towards the memory of her stillborn. She is “disturbed” and “in a panic” when he has not appeared to her for 3 weeks, and she introspectively questions “if she is losing her power to summon him.” Luke’s “detachment infuriates her”, as he has seemingly overcome the anguish of the loss, whereas she continues to be plagued by hallucinations of their son. Through these varied, but equally valid manifestations of grief, the reader comes to appreciate the diversity of what it means for a human being to experience and overcome loss.
Furthermore, we are given a brief insight into how Luke’s neighbour, Gil, copes with the fact that his grandson is a soldier deployed in Afghanistan. Gil “doesn’t seem to want to talk about it”, and it is suggested that he believes “if he doesn’t dwell on it, nothing will happen to the boy.” In light of this additional example, Lohrey has presented the reader with this plethora of unique coping mechanisms, in order to instil her audience with appreciation for the diverse ways in which characters cope with grief and loss.
Human Experience #2: How Challenging Environments Transform our Views of Ourselves and Others
Throughout the novel, Luke and Anna are confronted by various features of their environment and circumstance which challenge them, and which ultimately transform their view of themselves and others. Whether these challenges are physical, psychological or interpersonal, they drive characters to constructively develop their identities and worldviews.
The human experience we are drawing on here is the process of transformation as a result of being challenged by X stimulus
, arriving at a realisation, and then reforming one’s ideas, attitudes and beliefs.
Moving to the countryside presents the largest change that Luke and Anna must adjust to. But by overcoming the challenges that rural life presents them with, they eventually feel as though they belong in Garra Nalla and begin to restructure their self-image around life in the bush. This process of adapting and reforming ourselves in response to challenges is a fundamentally shared aspect of the human experience, and without it, we would not be able to grow, develop or learn. At the beginning of the novel, the characters are painted as true-to-form city dwellers. “Luke Worley grew up on the edge of the city, in a neat suburban garden with a green lawn and a date palm.” We will observe, that through the challenges rural life presents them with, and in overcoming these challenges, Luke and Anna reshape their self-image to the point that the bush becomes an indispensable component of their identities. This process of adaptation in response to a new, challenging experience is the universal human experience that we are drawing upon. The first challenge they face in this regard is the drought. “For the first time they understand what it means to live on the rim of the driest continent.” Furthermore, the wind “continues to harass them” until Luke realises that his wife “needs a break” from Garra Nalla, and they retire to the city for a few days, tired of rurality. However, after just a few days in the city Anna realises that “she misses her house, its many rooms, the wide veranda, the great glittering lagoon.” It is at this point that the characters begin to develop strong attachment to Garra Nalla. Luke becomes irritable in the city, anxious to return to Garra Nalla. Their growing attachment is also demonstrated by their defensive feelings towards Ken, Luke’s father, when he belittles the town. “The abrasion of his father’s censure at their decision (to move), spurs Luke on at brisk clip.” When his father asks, “if they’ve gotten sick of it yet”, Luke responds that the town “grows on you.” Finally, Luke’s admission that Garra Nalla is “our promised land, we are here to stay” illustrates that the bush has now become a central aspect of their identity. Hence through the various challenges that moving posed them, and their response and adaptation to these challenges, Luke and Anna transform their view of themselves to be deeply rooted in their rural residence.
The second significant challenge that faces the couple is the fire in chapter III of the novella. This extremely confronting near-death experience prompts Luke and Anna to realise their own mortality, driving them to move forward from and relinquish the lasting pain of their miscarriage. When the fire destroys Luke’s navy-ribbed sweater, which he had worn while scattering the boy’s ashes in the ocean, he becomes distraught and disappears for a day-long meander in the bush. Although he “could not bear the thought that the sweater might come to harm” and he is grief-stricken at its ruin, he ultimately realises that “in its thick, smouldering resistance, the sweater had saved the house.” The sweater here symbolises “the boy” and the macabre memories that surround him. However, after the fire consumed it, thus protecting the house, the sweater becomes reborn as a symbol of renewal and preservation of life. Anna and Luke’s memories of the boy are thus transformed from a token of death, to a symbol of life, which helps them to bury this anguish. Anna’s realisation of her own mortality exemplifies this idea of moving on from the boy. “She is thinking she might go off the pill soon, that she is ready to try again. Life is so unpredictable, one cannot postpone decisions down the track, because what if one day… there is no track?” The fire has reminded her of the ephemeral nature of human life, thus ending her apparitions of the boy and persuading her to move forward with family planning. Due to the extremely confronting nature of their near-death experience, Luke and Anna are reminded of their own mortality, which prompts them to change their outlook and attitudes towards future decisions. The human experience in focus here is how any major, pivotal life event has the potential to challenge our current beliefs, and ultimately mature our outlooks and worldviews.
Style and Form
- Narrative Voice
Vertigo is narrated in in the present tense, by an omniscient 3rd person narrator. The present tense gives the reader a sense of proximity to the protagonist duo, while the 3rd person narrator enables Lohrey to seamlessly shift the between the personal perspectives of Luke and Anna. These two features achieve an almost dichotomous voice, uniquely enriching the narrative through perspectives from both characters.
- Illustrations
Throughout the novella are 10 scattered photographs by Lorraine Biggs, which capture the essence of the landscape. Images of the bush, birds and fire are placed at judiciously selected points in the story, often encapsulating the spirit of the preceding passage or chapter. The monochrome colouration of the images complements the rustic setting and vibe of the text.
- Motifs
The novella is riddled with recurring symbolisms and motifs. “The Boy” is the most prominent of these, representing the couple’s yearning to see their stillborn grow into a child, and the painful memories associated with his premature death. The text also makes extensive use of bird-imagery. Historically, birds have been associated with symbols of many things: freedom, peace, omens both good and bad, fate, death etc. Hence you can utilise the symbolism of birds in many ways to support almost any particular point in your essay.
For example, the couple’s sighting of the migratory pardalote shortly after moving into Garra Nalla is reflective of their own migration. It suggests that like the couple, the environment in the bush is in a constant state of motion and reform, which is exemplified at the novel’s end by the bushfire – the ultimate symbol of transformation and renewal. Just as the bush is reborn from the ashes, Luke and Anna experience a renaissance of attitudes and beliefs.
Your Vertigo Paragraphs
Ultimately, your study of Vertigo
, or any other text in Human Experiences will boil down to a couple of paragraphs in your Paper 1 essay in the HSC, trials, half-yearly etc. It is upon you to carefully distil the short story into what you believe are the 2 most universal, relatable, transcendent aspects of the human experience that the text puts forward. You then need to develop these ideas into paragraphs that will intersect but also contrast with your related text. Try to ask yourself the question: “what are the two or three most important human experiences that stand out in this book?” Ensure that your discussion includes frequent reference to characters, form and literary techniques. | https://dc.edu.au/texts-and-human-experiences-vertigo-study-guide/ |
Multiple sources familiar with the private Wednesday meeting told CNN that Collins appeared unnerved by the latest allegation, citing in particular that it was a sworn statement sent to the panel, which carries with it the possibility of perjury for lying to Congress.
Collins, sources said, did not indicate how she would vote. But her private concerns underscore how Kavanaugh faces a critical test Thursday: He must reassure at least three key GOP senators that he did not act improperly towards women in the 1980s when he testifies after one of his accusers, Christine Blasey Ford. He can't afford to lose more than one GOP senator if all Democrats vote against his nomination.
At the meeting of Republican chairmen, GOP leaders tried to reassure Collins, keenly aware of the critical role she plays.
But it was made clear to senators inside the meeting that the most recent allegation had resonated with the Maine moderate in a way that others up to that point had not.
The sworn statement, Collins told the senators, brought the allegations to a new level and raised concerns that enough wasn't being done to address their veracity. Pointing to the affidavit, which she had printed out, Collins said given the weight of the allegations, it made sense to subpoena Kavanaugh's friend Mark Judge -- an alleged witness to the incidents — and bring him in for testimony.
Multiple senators in the room attempted to reassure Collins that the process in place -- with the Judiciary Committee investigators and staff looking into the multiple allegations, gathering evidence and attempting to interview all involved -- was the most efficient way to handle what had been brought to the forefront.
Senate Majority Leader Mitch McConnell told Collins that the committee staff had begun to reach out to the third accuser, while Senate Majority Whip John Cornyn and others suggested bringing in Judge would do little to shed light on the situation.
Senate Intelligence Chairman Richard Burr, a North Carolina Republican, even brought up his own experience running the Russia probe: He said issuing subpoenas to witnesses could take weeks -- if not months -- and often are not successful. It is unclear how Collins took those comments, and her spokeswoman could not be reached for comment.
Collins, throughout Wednesday, has not spoken at length about the allegation or where she stands in her process of deciding how she would vote on Kavanaugh's nomination. But Thursday's testimony will undoubtedly sway her vote.
"Obviously I take it seriously and believe that it should be investigated by the committee," Collins told reporters of the new allegation. "My understanding is the committee's investigators have already made a request."
Collins has told reporters that she plans to clear her schedule Thursday to watch the hearing, in its entirety, and won't make up her mind until she fully evaluates the testimony.
The latest allegation rocked the already shaky Kavanaugh nomination after a woman -- Julie Swetnick -- wrote a sworn statement to the committee, alleging she witnessed inappropriate behavior by Kavanaugh at more than 10 parties more than three decades ago. Among the allegations: engaging in abusing and physically aggressive behavior toward girls present at the parties.
Kavanaugh has vehemently denied all of the allegations, and many Republicans dismissed it as a political hit led by her attorney, Michael Avenatti. | |
The U.K.’s Migration Advisory Committee (MAC) has announced an open public consultation period, inviting employers and other interested and knowledgeable stakeholders to provide evidence and views on the use of the Intra-Company Transfer (ICT) immigration route, including salary thresholds and skill levels.
They are also seeking input on proposals to allow overseas businesses to send teams of workers to establish branches in the U.K., or to engage in work related to high-value contracts for goods or services on secondment.
The consultation period will close on June 15, 2021.
The ICT route is designed to enable employers in the U.K. to easily move existing senior-level employees and specialists who have been employed by the company for at least 12 months from overseas offices to roles within the United Kingdom. It has different salary thresholds and requirements than the Skilled Worker route – current ICT rates are the higher of at least £41,500 a year, or the market rate for the role.
Specifically, the MAC is seeking input to be able to advise on:
- the salary threshold for entry to the ICT route
- what elements, if any, beyond base salary should count towards meeting the salary requirement
- whether, as now, different arrangements should apply to the very highly paid
- what the skills threshold for the route should be
- the conditions of the route, particularly those that differ from the main Tier 2 (General)/Skilled Worker route
The MAC have developed a questionnaire to focus on the key areas of interest and gather responses consistently, and also welcome additional documents and supporting evidence as attachments. They are due to report back to the government with findings and recommendations in October 2021.
For more information on submitting feedback in response to the call for evidence, please contact the Sterling Lexicon immigration team.
As Head of Immigration with Sterling Lexicon, Leanne leads a team of specialists who are responsible for ensuring the entire immigration process is smooth and stress-free for clients, assignees and their accompanying family members. She brings over ten years of experience in strategic immigration management, planning and consultation to her role, and has cultivated invaluable knowledge and experience in processing countless global migration applications. As a trusted partner, she consults with clients on everything from policy considerations and cost or efficiency improvements, to the impact of opening offices in new locations. Leanne is a frequent presenter and author on global immigration topics and trends. | https://www.sterlinglexicon.com/resources/uk-issues-call-for-evidence-on-intra-company-transfers |
Main Text {#sec1}
=========
Bone morphogenetic proteins (BMPs), originally disclosed as an osteogenic factor in 1965,[@bib1] are considered a unique extracellular multifunctional signaling cytokine and represent part of the transforming growth factor-β (TGF-β) superfamily.[@bib2] The identification of BMPs has increasingly attracted much attention due to their functions not only in embryonic and postnatal development but also in tumor development and dissemination.[@bib3] These roles of BMPs are also highly correlated to various aspects of carcinogenesis, such as angiogenesis, epithelial-mesenchymal transition (EMT), and cancer stem cells. There are several reviews demonstrating the backbone of the BMP signaling pathways.[@bib4], [@bib5] In summary, BMP ligands bind to their receptors, including type I and type II, to form a heterotetrameric complex, which then activates the phosphorylation, recruitment, translocation, and gene expression of small mothers against decapentaplegics (SMADs) in cells.[@bib6] These interactions between BMPs and their antagonists or receptors significantly support the identification of the aggressiveness of primary tumors and establish a mechanism for cancer cell metastasis.
Additionally, various tumor microenvironment factors that strongly affect tumorigenesis interact with BMPs, such as microRNAs (miRNAs), mutations, or drug treatment. miRNAs, small molecules of approximately 18--25 nucleotides in length, can modulate gene expression through translational repression, and their critical roles in cancer progression and osteogenesis were recently manifested.[@bib7], [@bib8] The molecular mechanisms involved in the negative regulation of BMP activity by miRNAs are also evident. The purpose of this review is to provide a comprehensive understanding of BMPs in modulating cancer progression and their dynamic interactions with tumor microenvironment factors.
Biological Actions of BMPs and Their Involvement in Cancer {#sec1.1}
----------------------------------------------------------
### Antagonists, Ligands, and Receptors {#sec1.1.1}
BMP action is closely associated with certain classes of molecules that were recently characterized as BMP antagonists. These BMP antagonists may be broadly divided into three classes: ligand antagonists, which directly bind to BMPs; BMP pro-regions, which complex back with mature BMPs; and receptor antagonists, which prevent BMPs from occupying receptors, thus prohibiting BMPs from binding to their cognate receptors.[@bib9], [@bib10] Similar to their targets, they possess a signal peptide for secretion and putative N-linked glycosylation sites.[@bib9] Although BMP antagonists often exert biological functions as inhibitors of BMP action, in some cases, they function as activators of BMPs during distinct phases of development. Among the various BMP antagonists ([Table 1](#tbl1){ref-type="table"}; [Figure 1](#fig1){ref-type="fig"}),[@bib11], [@bib12], [@bib13] Noggin, which was originally isolated from the aquatic frog genus *Xenopus*[@bib14] and is encoded by the NOG gene, has received much attention due to its biological functions in cancer. Sharov et al.[@bib15] indicated that Noggin stimulates skin tumorigenesis via Wnt and sonic hedgehog (Shh) signaling pathways in K14-Noggin mice.Figure 1BMP-Mediated Signaling PathwaysThe type II receptor *trans*-phosphorylates the type I receptor, which, in turn, stimulates transcriptional regulators called SMADs, which transduce the signal to the nucleus to modify gene expression.Table 1BMP Components in Various CancersComponents InvolvedCancer Cell/ModelRelated Targets/PathwaysRolesReferences**Antagonists**NogginK14-Noggin miceWnt, Shhpromotes skin tumorigenesis[@bib15]tumor cells--reduces tumor size and decreases bone loss compared to untreated control animals[@bib19]blood vesselsBMP4suppresses BMP4 induction of vascular endothelial growth factor receptor (VEGFR)-2 in embryonic blood vessels[@bib87]tumor cells--Noggin silencing suppresses the growth of PC-3/F/*luc* cells in bone xenografts[@bib88]tumor cellsBMP7ectopic Noggin expression rescues tumorigenicity of Adenoviral (Ad)/BMP7-infected melanoma cells *in vivo*[@bib89]B16-F1 cells/chick embryoBMP2suppresses the invasive growth of murine B16-F1 melanoma cells[@bib20]FollistatinInhibin-deficient mice--acts as a modulator of gonadal tumor progression and the activin-stimulated wasting syndrome[@bib90]Gremlin 1basal cell carcinoma tumorsBMP4most consistently expressed at a higher level in BCC tumor stromal cells compared to non-tumor skin[@bib18]promotes tumor cell proliferationtumor cellsBMP2, p21promotes proliferation and tumor growth by non-stem glioma cells[@bib17]induces cell cycle progression via p21Drm/Gremlinchick embryo CAM implantsBMP4interacts directly with target endothelial cells[@bib91]acts as a proangiogenic factor to regulate angiogenesisDMH1primary mammary tumorSMAD1/5/8, inhibitor of DNA-binding (ID)1, Ecadreduces metastasis in a mouse model of breast cancer[@bib92]alters tumor-associated fibroblastssuppresses tumor growth**Receptors**BMPR2tumor cellsSMAD1/5/8, pRb, Cyclin BBMPRII expression is associated with clinicopathological features of chondrosarcomas[@bib93]BMPRII suppression inhibits chondrosarcoma tumor growth *in vivo*MMTV.PyVmT micecytokines, growth factorsdisruption of BMPRII is associated with tumor development and metastasis[@bib94]loss of BMPRII signaling in tumors leads to increased inflammation and myeloid cell infiltratesBMPIA and BMPIBBMPRIA BMPRIB double-mutant miceSMAD1/5ovarian tumor development was observed in BMPRIA BMPRIB dknockout (dKO) mice but not in BMPRIA cKO or BMPRIB^−/−^ mice[@bib95]BMPR1AmiceMuc5acBMP signaling via BMPR1A inhibits tumorigenesis at gastric junctional zones[@bib28]BMPR1AK19-C2mE micePGE~2~BMP suppression and prostaglandin E~2~ (PGE~2~) induction lead to gastric hamartoma development independent of the Wnt/β-catenin pathway[@bib96]BMPR1Binvasive ductal carcinoma (IDC) patients--low expression of BMPR1B shows poor prognosis of breast cancer and is sensitive to taxane-anthracycline chemotherapy[@bib97]breast tissue samplesreduced expression of BMPR1B increases the proliferation of breast cancer cells[@bib98]BMPR1Bestrogen receptor (ER)-stratified breast tumorsmiR-125bBMPR1B transcript is a direct target of miR-125b, which differentially modulates the C/T allelic variants of rs1434536[@bib99]BMPR1AKO miceEMT-like changesBMPR1A acts as a tumor promoter in human breast cancer[@bib27]BMPR1A deletion in mammary carcinomas inhibits tumor development
Noggin was also identified as a specific breast cancer bone metastasis-supporting gene that enhances the metastatic ability of breast cancer cell lines, therefore promoting the tumor-initiating ability of 1833 and SKBR3 cells.[@bib16] Similar to Noggin, Gremlin 1 is also a BMP antagonist. Gremlin 1 knockdown suppresses cancer stem cell (CSC) proliferation and tumor development in CSC models.[@bib17] This function of Gremlin 1 is believed to be highly associated with stimulating cell cycle progression in CSCs via p21.[@bib17] Additionally, Gremlin 1 was investigated as the gene most consistently expressed at a higher level in basal cell carcinoma (BCC) tumor stromal cells compared to those from non-tumor skin.[@bib18] Sneddon et al.[@bib18] also reported that Gremlin 1 can stimulate tumor cell proliferation. In contrast, overexpression of Noggin leads to decreased tumor size and reduced bone loss compared to control animals in prostate cancer (PC) cells implanted with tibias.[@bib19] Busch et al.[@bib20] reported that Noggin suppresses an EMT-like transition of melanoma cells and inhibits invasive growth of murine B16-F1 cells in the optic cup of the chick embryo. Similarly, Cyr-Depauw et al.[@bib21] found that inducible reduction of ShcA expression impairs mammary tumor development, and this stable reduction in the ShcA level enhances Chordin-like 1 (Chrdl1) *in vivo*. They also suggested that Chrdl1 blocks breast cancer cell migration and invasion by regulating BMP-stimulated matrix metalloproteinases (MMP)2 and MMP9 enzymatic activity.[@bib21]
Furthermore, BMPs are considered multifunctional cytokines belonging to the TGF-β superfamily. Like other members of the TGF-β superfamily, BMPs can bind and form heteromeric complexes with two types of serine/threonine kinase receptors (type I and type II) on the cell surface, both of which are required for signal transduction.[@bib22], [@bib23], [@bib24] Therefore, they modulate tumor growth, differentiation, or apoptosis in a variety of cancers ([Tables 1](#tbl1){ref-type="table"} and [2](#tbl2){ref-type="table"}; [Figure 2](#fig2){ref-type="fig"}).[@bib25], [@bib26] Pickup et al.[@bib27] recently found that deletion of the BMP receptor type IA (BMPR1A) impairs mammary tumor formation and metastasis in conditional knockout mice, suggesting that BMPR1A acts as a tumor promoter in human breast cancer. However, Bleuming et al.[@bib28] demonstrated that the squamocolumnar and gastrointestinal junctional zones in mice are epithelial areas that enhance oncogenesis; nevertheless, these areas are inhibited by the BMPR1A signaling pathway.Figure 2The Role of BMPs in Tumorigenesis(A) Prostate tumors produce tumor-derived factors, including BMPs, for the regulation of bone formation, which promote the process from osteoblast to osteoclast via RANKL. Subsequently, osteoclasts make bone-derived factors including BMPs, which promote tumorigenesis. (B) BMPs from tumor tissues activate TAMs and stimulate the type II cytokine, IL-10. IL-10 promotes the M2 polarization of TAMs and leads to tumor development by suppressing the local antitumor immune response.Table 2Bone Morphogenetic Protein Ligands in Various CancersTumorCell Type/ModelBMPs and Their InvolvementRelated Targets or PathwaysExpression and FunctionsReferencesLung cancerA549/nude miceBMP2ID-1, SMAD1/5highly overexpressed in human NSCLC compared to normal lung tissue or benign lung tumors[@bib100], [@bib101]stimulates cell proliferation, migration, and invasivenessenhances the growth of metastasis tumors; promotes tumor developmenthuman aortic endothelial cells (HAEC)/tumor neovasculatureNoggin, SMAD1/5/8, ERK-1/2enhances the angiogenic response in developing tumors[@bib102]150 patients and 69 healthy volunteers--a significantly higher level of serum BMP-2 was observed relative to the control group[@bib103]positively correlates with the stage and metastasis burdenidentified as a probable predictor of survival in NSCLC patientsA549/nude miceBMP4p-ERK, VEGF, SMAD1BMP4-treated cells exhibit significantly smaller xenograft tumors compared to untreated cells[@bib104]lung tissuesmiR-200, JAG2knockdown of BMP4 suppresses metastasis and tumorigenesis[@bib105]lung cancer patientsBMP2 and BMP4--significantly higher in lung cancer samples than in adjacent normal lung tissues[@bib106]a positive correlation between VEGF and BMP2 gene expression has been indicatedA549/nude miceBMP3Bc-Mycre-expressing of BMP3B caused tumors to grow significantly slower than those not expressing BMP3B[@bib107]lung cancer patientsBMP3b and BMP6mutation of K-ras codon 12BMP3b and BMP6 genes are common targets of epigenetic inactivation in NSCLC[@bib47]lung tissuesBMP7SMAD1higher BMP7 expression may be an indicator of bone metastasis[@bib108], [@bib109]BMP7 expression is associated with lymph node involvement in patients with lung cancerA549/mouseSpp24BMP2Spp24 reduces tumor growth in both soft tissue and intraosseus environments[@bib110]Breast cancerMDA-MB-231/nude miceBMP7--stable overexpression of BMP7 suppresses *de novo* formation and progression of osteolytic bone metastases[@bib34]BMP7 treatment suppresses intrabone tumor growthprimary tumor specimenshigh expression of BMP7 in breast cancer tissues compared to normal breast tissues[@bib111], [@bib112], [@bib113]breast tumorsBMP4 and BMP7--BMP4 and BMP7 are the most frequently expressed and display the highest expression levels[@bib114]MDA-MB-231 cells and pre-adipocytes, adipocytes/Nude miceBMP9signal transducer and activator of transcription (STAT)3, ERK-1/2, Aktinhibits the growth and metastasis of breast cancer cells[@bib115]suppresses breast tumor growth and decreases leptin expression in pre-adipocytes/adipocytesMDA-MB-231/mouse xenograft modelBMP4--causes a trend toward metastasis formation, especially in bone[@bib116]BALB/c miceNF-κBsuppresses leukocytosis, splenomegaly, and metastasis[@bib32]reduces G-CSF secretion by suppressing NF-κB activitytumor patientsBMP12--BMP12 expression is decreased in breast tumors and is associated with a poor prognosis[@bib117]Adrenocortical carcinomatumorsBMP2 and BMP5Aktexpression of BMP2 and BMP5 is lower in ACC and adrenocortical tumor cell lines[@bib118]BMP2 and BMP5 reduce baseline and IGF-I-induced Akt protein phosphorylationMedulloblastoma (MB)xenograft modelBMP2p38, apoptosisBMP2 mediates retinoid-stimulated apoptosis[@bib82]mice MBBMP4Atoh1, ShhBMPs are potent inhibitors of MB[@bib119]BMP4 inhibits mouse MB proliferation *in vivo*tissue MBBMP7MycMyc-dependent modulation of BMP7 activation[@bib120]Colorectal cancerprimary tumorsBMP3--BMP3 is downregulated in 50 of 56 primary tumors[@bib121]related to early polyp formation and colorectal tumor growthcolorectal tumorsBMP4PI3K/Aktrecombinant BMP4 induces apoptosis and differentiation of chemoresistant colorectal cancer stem cells (CRC-SCs)[@bib122]activates the canonical and non-canonical BMP signaling pathwaysHCT16/xenograft tumor modelBMP2--forced expression of BMP2 stimulates a significantly induced level of apoptosis[@bib123]mouse model of gastric tumorigenesisBMP signalingPGE~2~promotes epithelial cell differentiation[@bib124]BMP suppression appears to contribute to gastric cancer developmentserum from patientsBMP2--the mean serum BMP-2 level from patients with bone metastasis is significantly higher compared to patients without bone metastasis[@bib125]plays a role in progression to metastatic disease in gastric cancercancer patientsERK-1/2, Akt, EMTBMP2 stimulates the expression of ERK-1/2, Akt, N-cadherin, and MMP2[@bib126]BMPRII serves as a biomarker to antagonize the progression of gastric cancermiceDNA damageBMP-SMAD1 loss-of-function causes tumorigenesis[@bib127]mice infected with *Helicobacter spp.*CDX2, SOX2BMP pathway is associated with *H. pylori* infection in the modulation of intestinal and gastric-specific genes[@bib128]Prostate cancer (PC)MDA-PCa-118b/tumorBMP4cytokines: Interleukin (IL)-8, GRO, C-C motif chemokine ligand (CCL)2BMP4 mediates osteogenesis in the progression of PC in bone[@bib129]human PC tissueBMP7SMAD1/4/5, E-cadherin, vimentinacts as a potential inhibitor of PC bone metastasis *in vivo*[@bib130]PC patients--BMP7 induces reversible senescence in PCcancer casesBMP6ID-1, MMP activationassociated with increased ID-1 protein level and a more invasive phenotype[@bib36]Pancreatic cancerepithelial tumor cellsSMAD--related to stromal features and shorter postsurgical overall survival in pancreatic ductal adenocarcinomas[@bib131]PANC-1 cells/ xenograft tumor modelBMP2Spp24BMP2 dramatically promotes tumor growth[@bib132]secreted phosphoprotein (Spp)24 abolishes the effect of BMP-2 and induces tumor shrinkage when used aloneOvarian cancerSK-OV-3/nude miceBMP2--high SMAD5 expression is associated with poor prognosis in serous ovarian cancer patients[@bib133]stimulates the proliferation of serous ovarian cancertumor cellsBMP2 promotes ALDH^+^CD13^+^ cell expansion and inhibits progenitor cell growth[@bib67]BMP2 suppression or knockdown inhibits tumor growth *in vivo*BMP2 increases chemoresistanceBladder cancerarchival tissues of the human bladderBMP4--restoration of BMPRII expression leads to a decreased rate of tumor development[@bib134]tumor patientsBMP2, BMP4, and BMP7--the expression of BMP2 and BMP7 is downregulated in infiltrating urothelial carcinoma and is associated with a shorter time to recurrence[@bib135]BMP4 is downregulated in non-invasive tumorscancer casesBMP2--BMP2 is significantly higher in cases with bone metastasis and is positively related to cases with muscle invasion[@bib136]
BMPs: Tumor Suppressors or Oncogenes? {#sec1.2}
-------------------------------------
At present, there is a greater understanding of the critical functions of BMPs in cancer. BMP4 was reported to stimulate breast cancer cell invasion and promote bone remodeling.[@bib29] Clinically, Paez-Pereda et al.[@bib30] described the role of BMP4 in tumorigenesis with the stimulation of tumor formation. In contrast, emerging studies have suggested that BMPs exhibit tumor-suppressive functions in cancer development. Ye et al.[@bib31] suggested that BMP10 suppressed the growth and aggressiveness of PC cells by inducing apoptosis via a SMAD-independent pathway, which was correlated to the modulation of extracellular signal-regulated kinase (ERK)1/2 and X-linked inhibitor of apoptosis protein (XIAP). Cao et al.[@bib32] also reported that BMP4 suppresses breast cancer metastasis by inhibiting myeloid-derived suppressor cell activity in mice. They also suggested that BMP4 decreases granulocyte-colony stimulating factor (G-CSF) secretion via the suppression of nuclear factor-κB (NF-κB) activity.[@bib32] Taken together, the wealth of conflicting studies indicated that the same ligand may work differently depending on the cancer type, and it seems that multiple members in the BMP family should not be tested as simply equals.[@bib33] Furthermore, the same BMP ligand within the same cancer type is likely to work differently, depending on the study. Therefore, conclusions based on simply one cell line may be too straightforward, so diverse cancer cell lines or different types of tumors should be used; the suitable consensus is that BMPs and their involvement might act as both tumor promoters and oncogenes in cancer development ([Figure 3](#fig3){ref-type="fig"}).[@bib34], [@bib35], [@bib36], [@bib37], [@bib38], [@bib39] Although there is no definitive correlation between BMPs and the development of tumorigenesis, a large number of studies indicate a positive effect of BMPs on cancer development. Therefore, BMPs should be paid careful attention for cancer patient treatment.Figure 3The Dual Function of BMPs in Cancer CellsBMPs can suppress tumor growth and metastasis, acting as tumor suppressors. Paradoxically, BMPs also accelerate tumorigenesis as tumor promoters through various mechanisms, such as activation of oncogenes, and stimulation metastasis in tumor microenvironment. The bifrontal figure displays the Janus face of BMPs in tumor progression.
Aberrance of BMPs and Their Implications in Cancer {#sec1.3}
--------------------------------------------------
There is increasing evidence that BMP proteins and BMP signaling components are novel biomarkers with significant therapeutic implications for cancer treatment even though the expression of specific BMPs remains controversial. Among the various cancers summarized in [Table 3](#tbl3){ref-type="table"}, prostate and breast cancers have been commonly used to study BMP signaling due to the unique features of their metastasis to bone tissues. Horvath et al.[@bib40] suggested that BMP2 may act as a marker of poor prognosis due to its significant decrease in PC compared to benign prostate tissue. Furthermore, Morrissey et al.[@bib41] found that BMP7 protein is expressed at higher levels in PC bone and soft tissue metastasis compared to primary PC. They also suggested that BMP7 signaling may be associated with clinical disease progression.[@bib41] Ye et al.[@bib42] previously reported that the upregulation of BMP7 in prostate tumors may be correlated with hepatocyte growth factor (HGF) or scatter factor (SF) (HGF/SF) in an *in vivo* murine tumor model. Ma et al.[@bib43] indicated that the expression of BMP2, BMPR1B, and BMPR2 is low in epithelial ovarian cancer tissue and suggested that these variations or loss of expression may elicit poor prognosis for ovarian cancer patients. Taken together, the aberrance of BMPs and their involvement in cancer have been implicated in various solid tumors and disease-specific bone metastasis.Table 3Expression of BMPs and Their Involvement in CancerCancer TypeCell Type/ModelBMPs and/or Their Related ComponentsExpressionFunctionsReferencesBladder cancerpatient specimensBMP2, BMP7decreasedlow expression of BMP2 and BMP7 is highly correlated to a shorter time to recurrence[@bib135]the levels of expression of BMP are not indicative of tumor stageProstate cancerhuman tissuesBMPR1A, BMPR1B, BMPR2decreasedBMPRs often lose their expression during the progression of prostate cancer[@bib137]human tissuesBMP2decreasedBMP2 is downregulated in prostate cancer compared to benign prostate tissue[@bib40]loss of BMP2 is associated with increasing Gleason scoreCarcinomahuman tissuesBMP2increasedtumors with high BMP-2 expression have higher rates of local failure compared to other tumors with low expression[@bib138]patient tissuesBMP4increasedassociated with tumor invasion and progression in papillary thyroid carcinoma[@bib139]Bloodanemia/patientsBMP6increasedpatients with cancer-associated anemia (CRA) have high expression of BMP6[@bib140]negatively related to s- Hemojuvelin (HJV)Breast cancertissuesBMP12decreasedassociated with a poor prognosis[@bib117]Melanoma cancertissuesBMP7increasedthe expression of BMP7 in metastatic and primary melanomas is strongly expressed compared to weak expression in normal nevi[@bib141]
BMPs and Their Components with Mutations in Cancer {#sec1.4}
--------------------------------------------------
Previous studies have shown that heterozygous mutations in BMPR2 were correlated to human familial and idiopathic pulmonary arterial hypertension, and decreased BMPR2 expression has been found in the lung tissues of all patients with pulmonary hypertension tested.[@bib44], [@bib45], [@bib46] Kraunz et al.[@bib47] found that the co-inactivation of BMP3b and BMP6 is highly associated with the mutation of *k-ras* (codon 12) in lung cancer, and these genes are common targets of epigenetic inactivation in non-small-cell lung cancer (NSCLC). Furthermore, BMP signaling may also be inactivated by a germline mutation of BMPR1A in the colon cancer predisposition syndrome, juvenile polyposis (JP).[@bib48], [@bib49] Recently, Voorneveld et al.[@bib50] provided evidence that p53 mutation can affect the activity of BMP signaling, thereby modulating Wnt signaling activity despite adenomatous polyposis coli (APC)/β-catenin mutations. Inactivation of activin signaling via mutations in activin type II (ACVR2) was also found in the majority of colon tumors with microsatellite instability.[@bib51], [@bib52] Therefore, the activity of BMPs and their involvement may be altered by changes in gene expression and mutations in cancer.
Negative Modulation of BMPs by miRNAs {#sec1.5}
-------------------------------------
miRNAs are short, non-coding RNAs of 18--25 nucleotides in length that play a significant role in numerous tumorigenic processes.[@bib7] Braig et al.[@bib53] determined the molecular mechanisms leading to the overexpression of BMP4 in melanoma cells compared to normal melanocytes and identified miR-196a as a BMP4-negative regulator that directly suppresses BMP4 in malignant melanoma. Similarly, by profiling miRNAs during BMP2-stimulated osteogenesis of C2L12 mesenchymal cells, Li et al.[@bib54] characterized two representative miRNAs and showed that miR-133 directly targets Runx2, an early BMP response gene essential for bone formation, and that miR-135 may also target SMAD5, a key transducer of the BMP2 osteogenic signal. Rai et al.[@bib55] employed unbiased genome-wide approaches in diffuse large B cell lymphoma and found that miR-155 directly targets the BMP-responsive transcriptional factor, SMAD5. miR-155 overexpression suppressed SMAD5 expression and disrupted its activity.[@bib55] In 100 hepatocellular carcinoma tissues, Li et al.[@bib56] found that miR-148a directly inhibited the expression level of activin A receptor type 1 (ACVR1), a key receptor in the BMP signaling pathway. They also determined that this miRNA is related to cancer development and metastasis via the ACVR1/BMP/Wnt pathway.[@bib56] In primary mouse keratinocytes following BMP4 treatment, Ahmed et al.[@bib57] identified miR-21, which is significantly suppressed by BMP4. They also found that miR-21 regulates two groups of BMP4 target genes, including tissue inhibitors of metalloproteinases (TIMP)1, TIMP3, and programmed cell death (PDCD)4. In primary keratinocytes and HaCaT cells, miR-21 can also prevent the inhibitory effects of BMP4 on cell migration and proliferation.[@bib57] Consistent with this observation, Qin et al.[@bib58] also showed that bone morphogenetic protein receptor II (BMPRII) is a direct target of miR-21 in PC3 and LnCap PC cells. Together, these studies indicate the existence of an additional level of complexity in the modulation of the BMP pathway.
BMPs and Drug Resistance in Cancer {#sec1.6}
----------------------------------
Cancer cell chemoresistance is considered as a major impediment in medical oncology. Emerging studies indicated that drug resistance of cancer cells is able to be related to various factors such as epigenetics, miRNAs, and cytokines.[@bib7], [@bib59], [@bib60] Such a phenomenon has been indicated for the superfamily member TGF-β, which is suggested as an emerging player in drug resistance;[@bib61] BMPs and their components have also been implicated to various different drug resistance of cancer. Indeed, Wang et al.[@bib62] recently demonstrated that the resistance of lung squamous cell carcinoma patients with epidermal growth factor receptor (EGFR) mutations to EGFR tyrosine kinase inhibitors (EGFR-TKIs) was, in part, due to activation of the BMP-BMPR-SMAD1/5 signaling pathway. Subsequently, the combined treatment of these cancer cells together with inhibitors specific to BMPR may overcome the resistance to EGFR-TKIs.[@bib62] Xian et al.[@bib63] enrolled 938 patients with stage III or IV NSCLC and reported that patients with high-level expression of BMP4 had a significantly higher chance of being resistant to chemotherapy than those with low BMP4 expression. Du et al.[@bib64] reported that knockdown of BMP2 increased chemoresistance of the MCF-7 breast cancer cell line. Similarly, Liu et al.[@bib65] also suggested that hypermethylation contributed to the regulation of BMP6 during the acquisition of drug resistance in breast cancer cells. BMP6 was recently indicated to induce castration resistance in PC cells via tumor-infiltrating macrophages.[@bib66] Choi et al.[@bib67] also demonstrated that treatment with BMP2 *in vivo* leads to increased tumor growth and chemotherapy resistance. Octamer-binding transcription factor (Oct)4 and nestin, stem cell markers that promote cell survival, are highly associated with resistance to chemotherapeutic agents, suggesting that the failure of cancer treatment and BMP signaling is a growth stimulator in cancer cells expressing Oct4 or nestin.[@bib68], [@bib69], [@bib70] Langenfeld et al.[@bib71] employed DMH2, a small molecule BMP inhibitor, and found that DMH2 also significantly suppressed cell growth of nestin/GFP- or Oct4/GFP-expressing cells. Similarly, Coffman et al.[@bib72] found that human ovarian carcinoma-associated mesenchymal stem cells (CA-MSCs) promote chemotherapy resistance of ovarian cancer by stimulating the BMP4/Hedgehog (HH) signaling pathway. However, employing the HH inhibitor, IPI-926, prevented CA-MSC-mediated increases in chemotherapy resistance and tumor growth.[@bib72]
Conversely, Persano et al.[@bib73] reported that BMP2-based treatment increased the temozolomide response in hypoxic drug-resistant glioblastoma multiforme (GBM)-derived cells. Eramo et al.[@bib74] indicated that chemotherapy resistance is one of the leading reasons for poor GBM among the most aggressive tumor types. However, Tate et al.[@bib75] found that a BMP7 variant may reduce tumor growth and stem cell marker expression in subcutaneous and orthotopic glioblastoma stem-like xenografts. Lian et al.[@bib76] also demonstrated that knockdown of BMP6 in breast cancer cells increased chemoresistance to doxorubicin by upregulating multiple drug resistance (MDR)-1/P-glycoprotein expression and activating the ERK signaling pathway. Overall, BMPs and their involvements highly related to drug resistance of cancer cells and employing BMP family inhibitors may promisingly enhance efficiency of cancer treatment.
Bioactive Compounds Targeting the BMP Pathway {#sec1.7}
---------------------------------------------
Natural compounds have been employed to cancer treatment for thousands of years[@bib77], [@bib78], [@bib79], [@bib80] and therefore, targeting BMPs with dietary natural-product-derived compounds is considered one of several therapeutic strategies in preventing cancer progression. To illustrate, Craft et al.[@bib81] demonstrated that genistein, a component of soybean, therapeutically induces reversion to a low-motility phenotype in aggressive endoglin-deficient human PC cells by activating anaplastic lymphoma kinase (ALK)2-SMAD1 endoglin-associated signaling. Hallahan et al.[@bib82] indicated that retinoid treatment may abrogate tumor growth in medulloblastoma xenografts. Using specific retinoid receptor agonists and gene expression arrays, they identified BMP2 as a candidate mediator of retinoid activity.[@bib82] Retinoid-stimulated expression of BMP2 is subsequently important and sufficient for apoptosis of retinoid-responsive cells, and the expression level of BMP2 by retinoid-sensitive cells is sufficient to promote apoptosis in surrounding retinoid-resistant cells.[@bib82] Kodach et al.[@bib83] also reported that statins, which induce apoptosis in colorectal cancer (CRC) cells via stimulation of BMP2, may only be effective in SMAD4-expressing CRCs and have adverse effects in SMAD4-negative tumors. Subsequently, based on these possible effects of statins on bone tissue, Chen et al.[@bib84] found that simvastatin induces osteoblast viability and differentiation via the RAS/SMAD/ERK/BMP2 signaling pathway.
Additionally, by employing *in silico* screening, Ahmed et al.[@bib85] attempted to identify new low-molecular-weight drug-like compounds with high theoretical scores to bind to Noggin to suppress the BMP-Noggin interaction. Sanvitale et al.[@bib86] also identified a new small molecule inhibitor of BMP signaling, K02288, a highly selective 2-aminopyridine-based inhibitor with *in vitro* activity against ALK2 at lower concentrations, similar to the current lead compound, LDN-193189, by screening a panel of 250 recombinant human kinases.[@bib84] In conclusion, the identifying bioactive compounds that specifically target BMPs and their involvement will provide the promising for high-through screening in a range of *in vitro* and *in vivo* models of disease where BMP functions are implicated. The progression of this study will drive toward clinical trials for new potential inhibitors of BMPs and their involvements in cancer treatment.
Conclusions {#sec1.8}
-----------
From the data described in the present review, it is necessary to understand the roles of BMPs and their functions in tumor growth so that the pleiotropic effects of BMPs can be manipulated by antagonists, small molecular inhibitors, miRNAs, or bioactive compounds. Altered expression of BMPs has been detected in many types of cancers and can be used as a marker of good prognosis in cancer treatment. However, the specific regulatory factors responsible for the dual behaviors of BMPs in cancer remain unclear. Further studies on a larger number of cancers are needed to investigate the molecular events involved in BMP signaling and their functions in tumorigenesis and metastasis. This review also supports the general conclusion that BMPs are a double-edged sword in cancer biology, as they can serve as tumor suppressors or tumor promoters depending on the type of cell or tissue in the microenvironment, epigenetic background of the patient, or stage of tumor growth.
Author Contributions {#sec2}
====================
D.-H.B. conducted the literature review and co-wrote the manuscript, H.J.P. discussed the contents of the manuscript, and S.K.L. provided overall supervision and co-wrote the manuscript.
This study was funded by the Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education (2015R1D1A1A02062012).
| |
R&C: What do you believe are the key objectives and elements of a continuous listening strategy? How can continuous listening strategies create value?
Vincent: A continuous listening strategy contributes to how an organisation builds its culture. It can encourage employee engagement, mitigate risk, drive innovation and build trust, both inside and outside the organisation. The value from a continuous listening strategy comes from the development of a healthy culture, and a healthy culture equals a high-performing organisation. A continuous listening strategy is multifaceted. Organisations should focus on the following critical elements: identifying the instances and times when ‘listening’ can occur; the methods and mechanisms for collecting the feedback and a way to consolidate and analyse the information received; determining how to follow-up on feedback received and what stakeholders should be involved in this process; and developing a strategy to communicate how employees and stakeholders were ‘listened’ to.
Moosmayer: First, we must acknowledge that there is an issue regarding ‘listening’ in some companies. It is a common experience that the ability and willingness to listen decreases the higher you move up in a company’s hierarchy. Management often requests a ‘speak up’ culture among their employees but forgets that speaking up requires a listening partner. Companies not only need a ‘speak up’ culture, they also need to ‘listen up’. To start a continuous listening strategy, this issue must be acknowledged by senior management. If this is done effectively, it will create value because collaboration will significantly increase. | https://riskandcompliancemagazine.com/creating-value-through-effective-continuous-listening-strategies |
Here is a list of all our FAQs generated from our Town Meetings and from email queries about our funding call.
How do you define interdisciplinary? - For example is doing biology and physics suitable or does it need to involve AI too?It must be interdisciplinary across AI and Chemistry.
How important is a publishing track record? If the proposed funding application team have no track record of publishing together would we still be encouraged to apply for the current funding round, or will you be expecting that collaborating teams will have a proven track record of outputs?No, we don’t expect the group to have even existed beforehand, so we don’t require a pre-existing long term collaboration. We want to see a reasonable track record of the individuals, and evidence that the group has collaboration plans in place. For example, if you work in the same institution then we can assume you will be able to get together, but if not briefly detail your collaboration plans. However, we also don’t exclude pre-existing teams, if existing collaborations already exist and want to apply that’s also fine.
Is it a problem if the application doesn't include an industrial partner?Industrial partners are not required. it is completely fine if the bid is across multiple academic partners. The main important collaboration element we’re looking for is that it’s interdisciplinary and demonstrates both cutting edge artificial intelligence and chemical discovery.
Are there any restrictions on who can apply for the funding grant - must the applicant hold a permanent/open contract with the institute they are at?
In line with EPSRC rules, a PI with a fixed term contract is fine as long as it is beyond the duration of the proposal length. https://epsrc.ukri.org/funding/applicationprocess/fundingguide/eligibility/investigators/
Can someone be part of more than one application to this funding call?
It is perfectly possible to be involved in more than one application as long as you provide a solid justification on both applications of your time commitments, so that if more than one application did get funded it would be clear that they could afford the time on both.
For user organisational approval, are you expecting someone in particular? E.g. Dean of School, Associate Dean of Research, or Head of Department?
The main thing that this person will be signing off is finance, as it is important that whoever signs it off is happy with the financial side of things, as successful applicants will of course have to provide the 20% as per FEC rules. We recommend whoever typically signs off EPSRC applications, or failing that the head of the lead department of the collaboration.
Do we have to comply with the exact types of AI listed in your teams?
You don’t have to comply exactly with these types of AI we just want to see that you are using both cutting edge AI and Chemical Discovery as part of your planned application.
What do you have in mind for “How will the project help grow and sustain the AI3SD Network+?
With regards to helping and sustaining the network, we are looking for you to demonstrate how the potential impact of the project aligns with the AI3SD Vision. We are looking for ideas where the pilot projects we fund can then grow into bigger projects and successful applicants would ideally use the results of their pilot projects to apply for future funding after their initial project has finished.
Can we write an application that has both high level chemistry and AI terminology in it? Will it be seen by both chemists and experts in AI? Or do we need to use non-expert-type terminology to describe the chemical problem we plan to investigate?
Your application will be reviewed by both high level chemistry and AI experts, so you can use expert language in both fields, but make it accessible so that it can be understood at a high level by reviewers from different disciplines.
Can images be embedded within the application form?
Yes - if you want to use images as part of your application that is fine.
1.11. The "background IP" section mentions Southampton.Are we supposed to address that precise question? Or is the section really more general than that?
This is a general section to stay if you are using any pre-existing IP.
Can you make any of the successful applications available so we can see the structure?
One of our applicants has shared some of the text of their project, this can be found here. Although we want to point out that there is no "winning structure" as each of the three funded projects were different, and they were assessed using all the criteria including relevance to the call, novelty of AI and Chemistry, impact, sustainability, quality of application etc.
What are the themes of the call?
- Novel Machine Learning for Chemical and Materials discovery
- Novel Active Learning AI in the Chemical Science
- New AI based methods for Scientific Discovery in Chemistry
2. Financial Questions
Are we allowed to use money for competitions or prizes?In principal yes. There are some restrictions within EPSRC rules but if you want to run a hackathon and give our prizes or provide subsistence / accommodation that should be fine. If you are unsure, talk to us, and if we are unsure we will go back to our EPSRC representatives to clarify the rules.
Do you have any idea how much you intend to spend this round (We are on round 2)?We have £300,000 to give out for funding calls for the 3 years. We have already run one funding call and funded 3 projects. For this round we are looking to fund around 4 projects, potentially 5 depending on costs.
Do you look more favourably if it’s a lower spend?Ask for what you need. There's no point in saying you can do something but not asking for enough money, but equally only ask for what you need. If you can get matching funding from somewhere else that is great.
Is there an upper limit on investigatorsNo – although be aware that there is obviously a cap on how much you can apply for, so you need to be able to justify how you are spending the money, but as long as it is justifiable and realistic it should be fine.
How it envisaged the 80% of the supporting fund be consumed? Are these scenarios allowable: on the salary to support the researcher par-taking in the research and to support consultant time on advising the project progression?The finance can be portioned out as necessary to fit the project provided it is properly justified. E.g x amount on one person because this will pay their salary during the project as they will be on it full time…X amount on travel expenses to meet with industry partner etc.
Can the award be used to fund equipment?No equipment is allowable under this grant. We note that items under £10k are not considered equipment but consumables. However, in line with EPSRC rules, we do not allow for standard computers/laptops as they should be provided by universities from the indirect and associated costs of the grants. However, we do allow the upgrade costs for computers/laptops if specific high spec ones are needed to run experiments on. So this is allowed if it is a computer with specific high end capabilities to enable the experiments rather than someone’s regular work laptop/desktop. Make sure this is properly justified in the proposal.
What is the maximum amount of funding we can apply for?Individual projects can request up to £40,000 funding (total spend up to £50,000 as per FEC 80%). Applicants will be awarded 80% of the full cost, and the institution receiving the award is responsible for the remaining 20%. These arrangements reflect the standard EOPSRC funding conditions.
Is there an ideal financial structure we should be aiming for?We aren't looking for anything specific. Typically we would expect that a good chunk would be spent on staff to conduct the research, and then the rest split between travel/consumables/workshops etc as you see fit. Just make sure you justify your financial allocations.
What if we spend less money on staff, can we expense a generous travel budget to bring in academics from other countries to run workshops?We have a separate budget for running workshops, so you would potentially be better off writing to us to ask us if we are interested in jointly co-ordinating a workshop.
3. Staffing Questions
Based on previous experience it is hard to find perfect candidate for 6 months, especially from overseas as visas take a while. Can we use different postdocs part time who are already working on other projects and in that nature extend the project time?We have constraints for time wise – part time would be ok but only for 3 months then. Or you could try and extend other grants or find multiple people to make up the project. (e.g. 2 postdocs). We expect the types of people who would be looking at this grant would be a graduate coming to the end and wants a short job or a postdoc who could be extended by 6 months.
It is ideal to hire a research assistant or post doc as staff on these grants – is there any upper limit?There is no set upper limit, apart from our requirement that the pilot project not being longer than 6 months. Salary wise EPSRC put a limit of 37.5 hrs a week that can be claimed on their grants. So if applications justify having a postdoc or RA full time on the project within the £50, 000 limit of overall costs set there shouldn’t be a problem. We expect universities to have a process in place to monitor the time claimed by any Investigator/Postdoc/RA to ensure that no more than 100% of FTE is claimed as salary for any individual across all proposals funded by the Research Councils. It will be up to the applicants to make the case for Peer Review what is the optimal use of funds to achieve their proposed research.
Final year PHD students can work 20 hours a week, can they be included on these grants?We cannot pay for PhD students to do their PhD, however we can pay for them to do secondments or to be research assistants on projects that aren’t related to their PhD.
What stages of PhD student are allowed?It is not possible to pay for PhD stipend or fees from these grants. If a PhD student is seconded as a junior research placement and their PhD suspended during this period that may be possible but would depend on the rules at the individual university as many institutions would then require the secondment to be in an area unrelated to their PhD research.
4. Collaborator & Project Partner Questions
Is there a mechanism for collaboration within the Network - If we are looking for people to collaborate with or for named researchers how can the Network help with that?We have a specific Collaborators Page. You can sign up as a collaborator and find other collaborators there. Additionally if you are looking for something specific, get in touch with our Network Coordinator Samantha ([email protected]) and send her an email to send out to the mailing list asking if anyone is interested in your project.
Are there restrictions on what companies can apply to be collaborators? E.g. from the UK?No, as we are primarily giving money to the main applicant who will be an academic institution, therefore if they wish to collaborate with international companies that is fine.
Can we pay to bring someone who is from another UK university but currently in another country over to work as a collaborator?The standard EPSRC rules apply. Staff at eligible institutions can be paid if the usual EPSRC conditions are met. Visitors employed at overseas institutions may be eligible for their travel and subsistence to be met for a short visit to the UK for the purposes of the project again subject to the usual EPSRC rules on funding collaborations and overseas visitors. This would need to be fully justified in the application.
If we are planning an Industry collaboration of in kind support instead of financial – where does this go in application. Would it need a high level sign off?In an application there should be a statement of providing in-kind support (e.g. expertise or data etc). This only requires a high-level comment, rather than an official sign off. For all collaborations we ask that a collaboration agreement is put in place and we just need to be aware that this exists when the contracts are setup.
Can Catapult Centres be involved in these funding applications?Catapult Centres cannot be the primary applicant, as they do not currently meet the Research Councils’ eligibility criteria for Independent Research Organisations as they have been established by the public sector as detailed in the Research Councils' joint statement on eligibility. However, they can be collaborators or contractors on proposals.
If we name a partner in the application does he necessarily have to be a beneficiary to the project? Would a letter of support from a company mentioning that this proof-of-concept project is to their interest and would like to explore this idea in the future be a positive thing for the review panel to see?The partner doesn’t necessarily have to be a beneficiary, letters of support are always good as it shows that companies are also interested in what you are proposing.
With regards to industrial/academic in-kind support. The call asks for up to £10K coming from the institution, what percentage of the £10K can be part of the in-kind contribution?It’s not exactly the case of £10K from an institution. You apply for what you feel you need financially for this project (up to 50K) and then for that total, 80% of the money will be provided by AI3SD and the last 20% will be made up from the applying institution. This is working in line with the EPSRC FEC 80%. Individual projects can request up to £40,000 funding (total spend up to £50,000 as per FEC 80%). Applicants will be awarded 80% of the full cost, and the institution receiving the award is responsible for the remaining 20%. When invoices are submitted they should be for 80% of the full cost and a statement should also be submitted showing the full cost. Please note equipment purchase costs are ineligible. For further details on costing’s and overheads see EPSRC’s Full Economic Costing (FEC) Guides: https://epsrc.ukri.org/funding/applicationprocess/fundingguide/resources/
Can an industrial partner be in receipt of any funds?
A Project Partner is a collaborating organisation who will have an integral role in the proposed research. This may include in-kind or cash contributions such as expertise, staff time, use of facilities, etc. Project Partners cannot receive funding directly from the grant; the only exception to this is where a Project Partner is providing services or equipment that will go through a formal procurement process audited by the host research organisation. The Project Partner cannot receive any other funds from the grant, such as travel and subsistence’.
5. Timing Questions
How flexible is the starting date?Ideally, we like people to start as soon as possible, latest by 1st May 2020 (including time to get the Network+ Award Agreement in place). We can be moderately flexible, for example if you have someone lined up but they can’t start for another month, but for example if they couldn’t start for another 6 months that wouldn't be viable.
The information says that the invoices need to come in with a month after finishing, does the report have to come in then as well?Ideally yes we are looking for the report to come in at that time as well. We are expecting a report that details what you have done on the project, which you can potentially pull together from your progress blog posts or reports. We are not expecting the problem to be solved, but the project should demonstrate an achievement and tell the story of the project work. We are hoping that these pilot projects will lead to you applying for further grant applications, which we are happy to help with / back. You may want to consider videos to go with this!
Is it possible to extend projects past 6 months?We have capped projects at 6 months. However, we are specifically looking for pilot projects that have planned for sustainability and long term impact as well as short term impact, so we are hopeful that at the end of the 6 months the investigators will work with AI3SD to apply for further funding. So we would recommend planning for what is realistic in 6 months that will make a good starting point, and consider where you want to progress with your ideas after that, and we are here to help.
6. Other Questions
As an ECR, would applying to this funding call make me ineligible for applying at a later date to the first investigator award of the EPSRC?As this will be for a relatively small grant (£50k) this will not make the ECR ineligible for the New Investigator Award scheme at EPSRC.
What does getting extra help to continue funding applications mean?We have a range of experts in different domains as part of our Network. We will help you look for appropriate funding avenues, provide advice on your application and point you in the direction of people with the appropriate expertise to help you.
Are there any plans for future calls to bring in social scientists?Not specifically for the calls. We are planning to run some Philosophy of science and Ethics Workshops (AI for Science for Good), but there won’t be specific calls as this falls outside our remit. However, applications can include social scientists, as the EPSRC guidelines state that 50% of the research must be within EPSRC guidelines but that means that the other 50% can be in other areas. If you can justify why you need these aspects then it is fine to include them. | http://www.ai3sd.org/funding/funding-faqs |
01 Jul 2019
Mdm Vice-President,
We live in a diverse world. But managing diversity is not easy.
Globalisation and technology might have closed the distance between people and places, but people still instinctively bond and connect with those who think and speak like them, or those who share the same customs and beliefs.
The ease of the flow of ideas facilitated by advances in information technology has inadvertently accelerated the spread of extremist ideologies.
Global mass migration of peoples has also created its own challenges by fuelling both segregationist and nativist instincts.
A nation cannot prosper if its people are divided.
As one of the most religiously diverse societies in the world, and having experienced racial and religious riots in the 1950s and 1960s, forging unity and drawing strength from diversity has always been, and will continue to be, part of the Singapore story.
In Singapore, we work hard to ensure that no one is discriminated or disadvantaged on the basis of race, language or religion.
We achieve this through deliberate legislation, policies and programmes such as the Maintenance of Religious Harmony Act.
We’ve also expanded common spaces so that all Singaporeans can live, study and work together.
We are not doing too badly – a recent survey showed that 94% of respondents feel that Singaporeans are able to stay united even when events threaten the racial and religious harmony in Singapore.
Mdm Vice-President,
Building an inclusive and cohesive society is always a work in progress and we believe that there is much that states can learn from each other.
That is why Singapore hosted the inaugural International Conference on Cohesive Societies in June 2019 with the theme “Many Communities, One Shared Future”.
About 1,000 participants from 40 countries, including youth, attended this Conference.
The Conference sought new perspectives and insights on how different countries and societies manage diversity.
Our President Madam Halimah Yacob and His Majesty King Abdullah of Jordan were the keynote speakers of this Conference.
We hope that the Council can do more to share good practices on the promotion of social cohesion and inclusive societies.
. . . . . | https://www.mfa.gov.sg/Overseas-Mission/Geneva/Speeches-and-Statements--Permanent-Mission-to-the-UN/2019/07/press_20190701 |
CROSS-REFERENCE TO RELATED APPLICATIONS
BACKGROUND OF THE INVENTION
BRIEF SUMMARY OF THE INVENTION
DETAILED DESCRIPTION OF THE INVENTION
This application claims priority from provisional application Ser. No. 60/333,897 filed Nov. 28, 2001 and is a continuation-in-part of application Ser. No. 09/783,418 filed Feb. 14, 2001 now U.S. Pat. No. 6,454,490.
The present invention relates generally to road safety devices and, more particularly, to rumble strips and methods and apparatus for forming same.
Depressions, commonly referred to as rumble strips or sonic nap alert patterns (SNAPS), are formed in the surfaces of roads to alert drivers when their vehicles have drifted out of the travel lane of the road or when the vehicle is approaching a dangerous portion of road, such as a stop sign or toll booth. Rumble strip depressions are typically either uniformly spaced apart or are placed in spaced apart groupings in what is known as a skip pattern. Although there is no uniform standard for rumble strips, many highway departments require a five inch separation between adjacent depressions, with each depression having dimensions of seven inches by sixteen inches and a minimum depth of one-half inch. The long dimension of each depression normally extends perpendicular to the longitudinal axis of the road.
Rumble strip depressions are conventionally formed in various fashions, including by using a roller drum to impress the depressions into asphalt roads, using forms to shape wet concrete, or milling or cold planing the depressions in either asphalt or concrete roads. Using roller drums to form the rumble strips is desirable because the depressions are quickly and easily formed by simply rolling the drum over the road surface. Roller drums, however, can only be used on asphaltic roads, and the impressed depressions may tend to rebound over a period of time, thereby reducing the effectiveness of the rumble strips. Using forms to shape the depressions is of limited applicability because the forms can only be used with wet concrete. Milling of rumble strips is more versatile because the depressions can be formed in asphalt as well as hardened concrete.
Various types of milling machines are currently used to cut rumble strip depressions. These machines typically utilize a cylindrical cutting head that is formed by ganging together a plurality of circular diamond saw blades or by attaching tungsten-carbide-cutting elements to a drum. The cutting head is rotated about an axis parallel to the road surface and is repeatedly raised and lowered to cut spaced apart rumble strip depressions as the milling machine travels down the road in a continuous or step-wise fashion. The resulting depressions are typically rectangular in configuration, with curved forward and rearward walls and vertically extending lateral walls. The distance between the forward and rearward walls is variable and is determined by the length of time that the cutting head remains in contact with the road surface. The spacing between the lateral walls is fixed and corresponds to the axial length of the cutting head.
The vertically extending lateral walls in conventional rumble strip depressions can cause several problems. First, when a vehicle drifts off the travel lanes and onto a rumble strip positioned on the road shoulder, the vertical lateral walls cause the tires to suddenly drop laterally from the road surface into the rumble strip depression. This abrupt movement may pull the vehicle even further onto the shoulder and may momentarily distract the vehicle driver. Once the vehicle tries are within the rumble strip depressions, the vertical lateral walls may cause the driver to overcorrect in an attempt to remove the tires from within the rumble strip depression. These problems may be particularly serious for smaller cars, motorcycles and bicycles that are lighter and have smaller tires.
Another drawback of rumble strip depressions having vertical walls is the sharp 90° corner formed between the bottom of the depression and the vertical walls creates an area of localized stress that can cause cracking of the pavement. This cracking may accelerate degradation of the road and require costly repairs or replacement of the road. Water and other debris may also accumulate in those 90° corners and further contribute to road degradation.
As a result of the foregoing problems, a need has developed for a rumble strip depression that is less likely to interfere with vehicle steering and which does not cause premature failure of the road surface.
24
In one aspect, the present invention is directed to a cutting head for milling rumble strip depressions in an upper surface of a road. The cutting head includes a drum having opposed ends and a center rotational axis extending between the opposed ends. A plurality of milling elements are mounted on an outer surface of the drum and have cutting surfaces positioned to define a plane curve as the drum is rotated about its center rotational axis. The plane curve has a transverse diameter that varies in dimension along said center rotational axis so that the plane curve approximates at least a portion of an elliptical or other curved configuration. Positioning the cutting surfaces in the plane curve allows the cutting head to be used to mill rumble strip depressions that have a concave bottom that curves upwardly along two perpendicular axes. The milling elements preferably are milling teeth that are removably positioned within holders welded or otherwise secured to the outer surface of the drum. The milling teeth also preferably having cutting tips formed of a material that includes tungsten carbide. The cutting tips are positioned so that they cut in the plane curve by either configuring the drum in the shape of an ellipsoid and using the same sized milling elements across the surface of the drum or by providing a cylindrical shape to the drum and using different sized milling elements to achieve the desired profile. In an alternate embodiment, the drum and milling elements are formed by stacked saw blades with interposed spacers.
In another aspect, the present invention is directed to the resulting rumble strip depressions. In the preferred embodiment, the depressions have only two spaced apart sides and the curved bottom curves upwardly along the first axis to form the two sides. In another embodiment, the bottom curves upwardly along the second axis and connects to two lateral and spaced apart side walls.
The invention also includes a method of milling the rumble strips using the cutting head described above and a milling machine that can otherwise be of a conventional construction.
The rumble strip depressions of the present invention have bottoms that curve along both perpendicular axes, in contrast to conventional rumble strips that curve upwardly along only one axis. The resulting forward and rearward side walls curve in a horizontal plane and, when painted with traffic paint or another light reflective coating, is more readily observable because light from vehicle headlights is reflected in multiple directions. The curved nature of the bottoms of the depressions also reduces the areas of localized stress that can lead to cracking and degradation of the road surface. Vehicle-induced wind currents more easily remove debris entering the rumble strip depressions because there are no sharp corners within the depressions where the debris can be shielded from the wind currents. The rumble strip depressions can also be easier to mill because less road material is removed in the formation of the rumble strip depressions of the present invention.
FIG. 1
10
10
12
Referring now to the drawings in greater detail, and initially to , a cutting head used to mill rumble strip depressions in accordance with the present invention is represented broadly by the numeral . The cutting head is designed to be rotated about a center rotational axis as it is moved up and down to mill away portions of a road surface to form the rumble strip depressions in the road.
10
12
12
12
14
15
10
14
15
12
16
10
16
10
The cutting head has a preselected length along its rotational axis and a transverse diameter that varies along the length of the rotational axis . As used herein, the transverse diameter is understood to be taken in a plane perpendicular to the rotational axis . In the preferred embodiment, the smallest transverse diameter is at opposite ends and of the cutting head and the greatest transverse diameter is midway between the ends and . It will be appreciated that the areas of smallest and greatest transverse diameter can be shifted along the axis so long as the areas of smallest transverse diameter are located on opposite sides of the area of greatest transverse diameter. In this manner, an outer cutting surface of the cutting head is outwardly convex and defines a plane curve, such as an ellipsoid, having a major transverse diameter located in a first region and areas of reduced transverse diameter located on one and preferably both sides of the first region. The resulting profile of the cutting surface and the cutting head , when viewed from the side, is preferably elliptical with truncated ends, but other outwardly curved configurations such as oval, round and oblong can be selected if desired.
10
18
20
18
20
22
16
10
22
20
24
18
24
26
24
18
26
20
20
20
24
20
The cutting head is preferably a solid drum to which a plurality of individual milling teeth are removably attached in a spiral, chevron or other pattern that provides the necessary coverage along the drum . The milling teeth are also referred to as bullet teeth or tools and normally have cutting tips which form the cutting surface of the cutting head . The cutting tips are formed of a durable metal such as tungsten carbide, but can be formed from other materials having a hardness and durability suitable for milling asphalt or concrete. The milling teeth are mounted in blocks or holders that are welded or otherwise secured to an outer surface of the drum . Each holder includes a bore that extends through the holder at a preselected angle to the tangent of the outer surface of the drum . The bore receives a cylindrical body portion of the milling tooth and positions the milling tooth at the desired angle in relation to the surface to be cut. A lock ring (not shown) or other fastener is used to removably secure the body portion of the milling tooth in the holder so that the milling teeth can be replaced when worn.
16
10
18
24
20
18
16
18
24
20
18
22
10
12
The non-cylindrical outer cutting surface of the cutting head is preferably obtained by fashioning the drum in the desired elliptical or other curved configuration and using the same size holders and milling teeth across the outer surface of the drum . Alternatively, the non-cylindrical cutting surface can be obtained by using a cylindrical drum and placing different sized holders and/or milling teeth on the drum in a manner so that the cutting tips are positioned in the desired plane curve when the cutting head is rotated about the rotational axis .
15
10
18
10
The outer cutting surface of the cutting head can alternatively be formed by simply placing diamond bits or other abrasives on the outer surface of the drum , or by ganging together a plurality of disc-shaped cutting elements, such as diamond saw blades with spacers inserted between adjacent blades. If disc-shaped cutting elements are used, it will be appreciated that cutting elements with differing diameters must be used to obtain the desired elliptical or other curved profile for the cutting head .
10
2
FIG. 1
The ratio of the length of the cutting head to its transverse diameter can be relatively small as illustrated in the cutting head embodiment of or it can be relatively large as shown in the cutting head embodiment of FIG. .
FIG. 1
10
28
18
14
15
12
28
10
10
As is best shown in , the cutting head includes a pair of stub shafts that are suitably secured to the drum at the opposite ends and of the cutting head along the center rotational axis . The stub shafts allow the cutting head to be mounted for rotation on any suitable milling machine, including those conventionally used for milling rumble strips in road surfaces. The type of milling machine used is not of particular relevance to the present invention so long as it is capable of rotating the cutting head while moving it up and down and along the road surface.
FIGS. 3 and 4
FIGS. 3-4
30
32
34
32
36
28
10
38
28
40
10
10
42
44
32
10
42
46
48
46
42
44
46
50
52
54
52
56
50
54
54
58
60
42
46
54
58
54
42
46
52
42
10
46
10
10
10
30
Turning to , a preferred milling machine of the type disclosed in U.S. Pat. No. 6,454,490 is designated broadly by the numeral and includes a rumble strip milling attachment mounted forwardly of a vehicle . The attachment includes a hydraulic motor that directly drives the stub shafts of the cutting head to effect rotation thereof. A flywheel is connected to one of the stub shafts by one or more belts and functions to store kinetic energy which is then used to smooth out variations in rotational velocity of the cutting head resulting from load variations in the milling operation. The cutting head is housed within a cutter box that is spaced inwardly from lateral outer walls of the attachment . The cutting head and box are movable in an up and down direction by a crankshaft that is driven by another hydraulic motor . The crankshaft is spaced above the box and rotates within bearings (not shown) carried by the outer walls . The crankshaft includes a shaft having a pair of spaced apart eccentric lobes . A pair of spaced apart crank arms are mounted on the lobes by bearings that allow shaft to rotate within one end of the crank arms . The other ends of the crank arms are pivotally connected at pivot point to brackets that are fixed to and extend upwardly from the cutter box . In this manner, it can be seen that rotation of the crankshaft causes the crank arms to move alternately up and down while pivoting about pivot points . This movement of the crank arms in turn causes the cutter box to move up and down. The crankshaft thus exerts an alternating up and down force on the cutter box that causes up and down movement of the cutter box and cutting head . Notably, the positive downward pressure advantage exerted by the crankshaft on the cutting head causes the cutting head to cut into the road surface more quickly than would be possible relying solely on gravitational forces. Up and down movement of the cutting head can be obtained through other means known in the art, such as cam wheels that contact the road surface or cams that lift the cutting head upwardly, with gravity exerting the downward force to move the cutting head in the downward direction. It can be seen that hydraulic lines and other components have been omitted from in order to simplify and provide greater clarity in the illustrations. Further details of construction of the milling machine can be obtained from U.S. Pat. No. 6,454,490.
FIGS. 5 and 6
10
62
64
10
12
10
30
30
4
10
30
64
10
30
30
64
Turning now Co , the elliptical or other curved profile of the cutting head allows complementary shaped rumble strip depressions to be milled into a top surface of a road by rotating the cutting head about rotational axis as it is lowered into the road. The cutting head preferably rotates in a reverse direction in relation to the travel direction of the milling machine so that the cutting action resists the forward motion of the milling machine . Alternatively, the opposite or forward rotational direction may be used, such as when milling a softer road material such as asphalt. The rotating cutting head is preferably raised and lowered in a uniform, alternating motion as the milling machine is moved along the road . It will be appreciated that the up and down movement of the cutting head can be controlled so that it stops for a preselected period of time at one or more positions and can also move more rapidly during selected segments of its travel cycle. The forward movement of the milling machine may also be slowed or stopped during portions of the milling process. In order to achieve a faster production rate, the milling machine will normally be moved in an uninterrupted fashion in the direction of the longitudinal length of the road .
62
64
62
66
64
64
62
64
62
64
The rumble strip depressions can be formed along any desired portion of the road . For example, the rumble strip depressions can be formed along one or both shoulders of the road to provide a warning to vehicle drivers that they have drifted out of the normal travel lanes of the road . Alternatively, the rumble strip depressions can be positioned along the centerline or dividing line between travel lanes of the road to provide a audible warning when the vehicle is drifting from one travel lane to another. As yet another example, the rumble strip depression can be positioned across one or more travel lanes to warn of an upcoming intersection, toll booth or hazardous stretch of road .
62
62
64
62
The rumble strip depressions can be arranged in various desired patterns, such as being uniformly spaced apart or grouped together in a skip pattern. The long dimension of the depression will normally be perpendicular to the longitudinal direction of the road , but can alternatively be parallel to the longitudinal road direction or can extend at an angle thereto. In one embodiment, each rumble strip depression has a length of sixteen inches along the long axis, a dimension of seven inches along the short axis and a depth of one-half to five-eighths inch at the center of the depression. Other dimensions are possible and are within the scope of the invention.
62
68
70
72
10
64
62
74
76
68
7
68
62
62
62
20
70
20
62
68
62
62
Each rumble strip depression has a concave bottom that is curved along both the long and short axes, and transitions along one of the axes, normally the short axis, into forward and rearward side walls and . If the cutting head cuts deeply enough into the road , the depressions will also have optional lateral side walls and that transition into the bottom along the other axis, normally the long axis as shown in FIG. . Because the bottom of the depressions curves upwardly along both the long and short axes, the vertical walls and ninety degree corners found in conventional rumble strip depressions are eliminated or minimized. As a result, the depressions allow for gradual lateral entry of vehicle tires into the depressions without the type of abrupt movement that can cause driver distraction. As the vehicle drifts into the rumble strip depressions , the noise generated by contact of the tires against the forward side wall gradually increases because the depth of each depression increases as the tires move toward the lateral center of the depression . This variation in rumble effect can help the driver understand that the noise and vibration are caused by road conditions rather than a flat tire that would be more likely to produce a constant response. In addition, the curved nature of the bottom along the long axis of the depression allows the vehicle tires to be easily removed laterally from the depressions without the tendency to over-correct, as can be the case with conventional rumble strips where the vehicle tires must scale the lateral vertical walls in order to be removed from the rumble strip depression.
68
64
62
62
62
64
The curved nature of the bottom along both the long and short axes and the absence or minimization of ninety degree corners eliminates or reduces the areas of localized stress that can lead to cracking and degradation of the road . In addition, water or other debris that enter the rumble strip depressions is funneled to a low point in the center of the depressions where it is exposed to vehicle induced wind currents that can expel the debris from the depression . In this manner, the debris is unlikely to remain in the depressions for extended periods of time where it can contribute to premature degradation of the road .
10
64
62
62
10
64
62
70
72
10
64
30
64
10
64
10
30
Notably, controlling the depth to which the cutting head is lowered into the road can vary the size of each depression along both the long and short axes. This allows the dimensions of a particular series of rumble strip depressions to be gradually increased or decreased by simply increasing or decreasing the depth to which the cutting head cuts into the road . The size of the depression along the short axis or between the forward and rearward side walls and can also be varied by increasing or decreasing the amount of time that the cutting head remains in contact with the road as the milling machine moves along the road . The amount of time that the cutting head contacts the road can be varied by increasing or decreasing the rate of up and down movement of the cutting head , as well as the rate of forward movement of the milling machine .
62
64
62
70
62
The rumble strip depressions may also be painted with a reflective coating to provide a visual indication of their location. For example, when positioned along the center of the road , the depression may be coated with the normal centerline markings formed from traffic paint containing crushed glass reflective beads. Because the forward walls of the depressions curve in both the vertical and horizontal directions, light from vehicle headlights is reflected in multiple directions and is more readily observed by an approaching driver.
FIG. 8
62
110
110
62
62
10
In an alternate embodiment illustrated in , side-by-side rumble strip depressions can be formed by a single cutting head having two areas of larger transverse diameter, each of which has areas of reduced transverse diameter on opposite sides thereof. Depending upon the shape of the cutting head and the depth of cut into the road surface, the side-by-side depressions can be spaced apart or interconnected. It will be appreciated that the side-by-side depressions can also be formed by positioning separate cutting heads end-to-end and providing means for independent operation thereof.
62
As used herein, the term “road” includes the travel lanes of the road, as well as the shoulders that extend along the travel lanes and are intended to be used to accommodate stopped vehicles for emergency use. The use of the terms “long axis” and “short axis” in describing the dimensions of the depressions is not meant to exclude the possibility that the perpendicular axes will be of equal length. This is contemplated by and within the scope of the present invention.
From the foregoing, it will be seen that this invention is one well adapted to attain all the ends and objectives hereinabove set forth together with other advantages which are inherent to the structure.
It will be understood that certain features and subcombinations are of utility and may be employed without reference to other features and subcombinations. This is contemplated by and is within the scope of the invention.
Since many possible embodiments may be made of the invention without departing from the scope thereof, it is to be understood that all matter herein set forth or shown in the accompanying drawings is to be interpreted as illustrative and not in a limiting sense.
BRIEF DESCRIPTION OF THE SEVERAL VIEWS OF THE DRAWING
In the accompanying drawings which form part of the specification and in which like reference numerals are used to indicate like parts in the various views:
FIG. 1
is a side elevation view of one embodiment of a cutting head of the present invention;
FIG. 2
is a side elevation view of another embodiment of the cutting head of the present invention;
FIG. 3
is a side perspective view of a rumble strip milling machine;
FIG. 4
4
4
3
is a side elevation view of a portion of the rumble strip milling machine taken in vertical section along line — of FIG. and with portions broken away to illustrate details of construction;
FIG. 5
is a fragmentary top perspective view of a road containing rumble strip depressions cut in accordance with the present invention;
FIG. 6
FIG. 5
6
6
is a side elevation view of a rumble strip depression taken in vertical section along line — of ;
FIG. 7
is a fragmentary top perspective view of the road containing an alternative embodiment of the rumble strip depressions; and
FIG. 8
is a side elevation view of a further embodiment of the cutting head of the present invention. | |
KNOXVILLE, Tenn. (WATE) — Sidewalks improvements totaling more than $700,000 are coming to the area around the South Knoxville waterfront.
The City Council on Wednesday voted to OK an agreement to improve sidewalks on sections of Waterfront Drive, Langford Avenue, Dixie Street and Empire Street. The project will cost $733,263 and be completed by Design and Construction Services Inc.
New streetlights and drainage, curb and utility upgrades are all part of the improvements.
“Connectivity and walkability on and near the South Waterfront are important,” said Rebekah Jane Justice, the city’s deputy chief of economic and community development. “Here on Waterfront Drive, a privately-developed apartment community is planned, but these public sidewalks and other upgrades will benefit the entire community. It’s a step in the right direction toward making it easier for pedestrians to get between Suttree Landing Park and Sevier Avenue.”
Long-range plans for the South Waterfront call for an eventual 3-mile continuous riverwalk and walkable neighborhoods that connect with nearby amenities and downtown.
Work on Claude and Barber streets is also planned to begin once funding becomes available. | https://www.wate.com/news/local-news/700k-in-sidewalk-upgrades-coming-to-south-knoxville-waterfront/ |
Writing an essay can give someone a headache especially if you have no idea on where to really start or go about it. According to studies, many writers fail in their writing due to lack of proper planning and writing bad introductions that do not interest any writer. If you are into essay writing, you may not get the best advice on how to write unless you carry out enough practices. Essay writing has its challenges but when you learn the tactics and write regularly, it will be easy to face any challenge in the essay writing. Do you want to take your writing to the next level? The following are some of the major steps to take help you write impressive essays.
As the saying goes, if you fail to plan, you are actually planning to fail. Whatever kind of work you are doing, planning influences a lot on your success. In essay writing, the process of writing does not take so much of time especially if you can type fast. When I write my essay, I invest about 80% of my time in planning and researching how to approach an essay. This way I am able to articulate my ideas and have a better understanding of what is needed in that essay. In planning, thinking about your essay counts and it is very helpful in ensuring that you develop a good essay.
Once you have a hood pan on what and how you want to write your article, the next step is researching. Ensure that you carry out proper research on the given topic. It goes without saying that you cannot undertake any writing task without understanding what is required of you and what the subject topic entails.
Good researching involves going through the topic lightly to have an idea of what the topic is about. Once you have this idea, you can now research thoroughly taking all the necessary notes. There are many academic databases that are available online that can help you to better understand and get content of your specific subject. As much as you are getting content online, it is recommended that you should find information on other academic sources offline.
While you are carrying out your research, it is recommended that you should write down all the quotations that will improve the quality of your essay. Reference the URLs that you are using for your research. Gather as much information as possible from different sources. This is helpful in getting quality content for your essay and it is still helpful in verifying the facts of your writing.
This basically entails analyzing the arguments of various authors. What are the authors’ argument principles? Look at the claims they are airing and their reasons for these claims. When looking for the reasons for a certain claim check out if there is an alternative explanation for a given claim. Getting an alternative explanation will greatly assist in noting a specific author’s weakness in their logic.
Also, look out if the given evidence is sufficient. This will involve looking at the presented facts, statistics, the reference to related studies, and any other content that will show more proof of a stated claim.
Does the writer make any errors in their reasoning? You will only realize this by going through various academic resources on a subject matter.
Once you have done your research and come up with an attractive headline, the next step is to write your work. This will not take much of your time because you spent a substantial amount of time in planning, researching and analyzing. In writing, ensure that you make your points as brief as possible but contain all the necessary information that will be required. | https://www.tgdaily.com/web/audience/practical-steps-on-how-to-write-great-essays |
Innovation Guide
Share
Explore
Innovation Guide
DESIGN THINKING
DESIGN THINKING
Getting Started
Getting Started
The Process
The Process
ALL TEMPLATES
ALL TEMPLATES
Action Learning
Action Learning
The Process
DELIVER PHASE
Design mini-pilot experiments - Test your concepts for desirability, feasibility and viability
This is the final phase that brings your ideas to life and to market. You will prototype your solution, test it, gather resources, build partnerships and pitch for funding to pilot your solution before you eventually get it out there. And you will be assured that your solution will be a success because you have kept the very people you are looking to serve at the heart of the process.
Outcomes
Decide Methods to Test Hypotheses
Design the Mini-Pilot
Implement User and Market tests
Prepare for Final Demo Day
Steps
IDENTIFY RISKY ASSUMPTIONS
EXPERIMENT
PITCH YOUR IDEA
< Back
Next >
Was this article helpful?
Outcomes
Steps
Gallery
Share
Want to print your doc?
This is not the way.
Try clicking the ⋯ next to your doc name or using a keyboard shortcut (
Ctrl
P
) instead. | https://coda.io/@ajay-parasrampuria/innovation-guide/deliver-phase-40 |
Keep3rV1 is a decentralized platform designed to facilitate the coordination between projects that need to source outside development operations and those who can provide those required services. Essentially, the project serves as a job board that facilitates the interaction between job posters, such as decentralized finance protocols, and job executors, known as Keepers. The tasks performed by Keepers range from submitting and calling transactions on-chain to completing complex operations off-chain. Keep3rV1 uses an ERC-20 token, KP3R, for governance and to provide rewards to Keepers.
The project was first announced on Oct. 22, 2020. It launched on the Ethereum mainnet in beta mode on Oct. 28, 2020.
Who Are the Founders of Keep3rV1?
Keep3rV1 was founded by Andre Cronje, a blockchain engineer and application developer who recently rose to prominence following the launch of DeFi project yearn.finance and the explosive growth of its governance token, YFI, which saw a 1,300-times increase in value during its first two months of existence in 2020.
Cronje previously served as head of innovation and technology at the Fusion Foundation, the organization behind the Fusion protocol, where he led initiatives related to decentralized applications, technology partnerships and implementations. He also worked as chief code reviewer and a contributor at Crypto Briefing, head of technology at fintech firm Freedom, and head of technology at Shoprite Group, in addition to serving in blockchain technology development roles for BitDiem, Cryptocurve and Lemniscap.
Despite the incredible growth of yearn.finance and YFI, Cronje has stated that his goal in launching new platforms is to empower developers, not speculators, by providing them with easy-to-use products and design templates.
What Makes Keep3rV1 Unique?
Keep3rV1 seeks to reduce the upkeep faced by blockchain-based projects that utilize large numbers of smart contracts to power increasingly complex systems. These projects often require external actors to complete tasks, and Keep3rV1 is designed to be a decentralized ecosystem for projects and developers to more efficiently work together.
The network relies on Keepers, who provide smart contracts, bots or scripts that are able to execute transactions or trigger events. To use the platform, a project submits a smart contract that is reviewed and approved by a bonded Keeper — one that has received and locked KP3R in the platform. Projects can set rules regarding which Keepers may take a job, such as requiring a minimum bonded stake of KP3R or a certain number of already completed jobs. Keepers are rewarded in KP3R for completing jobs, although a project may submit Ether (ETH) in exchange for KP3R-equivalent credits.
Cronje has said that Keep3rV1 has the added benefit of allowing for the development of DApps that would otherwise not be possible, including MetaWallet — a smart-contract wallet that does not require transactions or gas fees — and Unihedge — an impermanent loss mitigation system.
How Many Keep3rV1 (KP3R) Coins Are There in Circulation?
Keep3rV1 has no predetermined token supply, and the project did not undergo an initial coin offering or token generation event. Rather, KP3R is minted when liquidity is provided to the platform via Uniswap. At the project's launch, Keep3rV1 had a reported $5.5 million worth of liquidity. Within the first day, it had already reached $9.8 million, with $384,197 in fees generated.
The project's treasury is maintained by bonded Keepers, who are responsible for governance. Each non-KP3R transaction on the platform is charged a 0.3% fee, which is distributed to the treasury. Keepers who complete jobs are rewarded with KP3R, which can then be staked in order to participate in governance or receive dividends, should the platform's governance decide to generate and distribute them.
How Is the Keep3rV1 Network Secured?
Keep3rV1 is an Ethereum-based platform that utilizes KP3R, an ERC-20 governance token. This means that it relies on the Ethereum blockchain to validate any on-chain KP3R transactions. Ethereum uses a proof-of-work consensus algorithm in which miners compete among each other to add new blocks to the blockchain and a majority of all nodes in the network must confirm a record for it to be posted.
Within the Keep3rV1 platform itself, bonded Keepers are responsible for managing and approving jobs and for managing Keepers — including settling disputes and blacklisting bad actors, if necessary.
The project's smart contracts were audited at the end of October 2020 by PeckShield, a blockchain security company, before it went live. The audit found that Keep3rV1 was "well-designed and engineered" and uncovered no critical security flaws, but it did identify some potential medium- to high-severity risks, which Croje stated have been logged and updated. | https://support.bityard.com/hc/en-us/articles/4410261056921-What-Is-Keep3rV1-KP3R- |
Given the continued community transmission of COVID-19 in Metropolitan Sydney and a number of regional areas in NSW, we are restricting visitor access to nominated decision makers only, effective immediately and until further notice at all our Mentoring Services sites.
This decision is based on updated advice received from NSW Health. We are putting plans in place for a potential worsening of the situation.
DSA has introduced additional measures to help keep our participants, their friends and families, our employees and the communities we work in safe.
All DSA staff involved in supporting our participants wear a face mask while at work to minimise the potential spread of infection.
All our sites continue to limit access to non-essential visitors, enhance strict personal hygiene and infection control and implement social distancing.
Ongoing protocols such as site access measures (temperature checking, visitor registers and illness/travel history questioning) and additional strict hygiene and cleaning are in place at each of these sites.
These are important measures that help protect our participants and employees as well as reduce the spread of COVID-19 in the community.
We have communicating clearly with our participants and potential visitors to request that visits be postponed until further notice, wherever possible.
These important measures can help protect our participants and employees as well as reduce the spread of COVID-19 in the community.
Mentoring Services provide a safe and stable transition to the community for people with complex psychosocial disability requiring holistic, complex and integrated services and support.
Using an evidence-based framework designed by our highly skilled clinicians and mentors, people are supported in managing complex trauma, behaviours of concern and communication needs to effectively improve their quality of life including living as independently as possible on a spectrum of accommodation supports – from intensive through to drop-in support.
We focus on enhancing overall quality of life, responsible community participation and reducing re-offending behaviours. Our positive working relationships with primary medical and mental health services ensure that effective streamlined processes are in place that enable people to access the services they need, when they need them.
We work with challenging clients who have complex disabilities, offering understanding and support that is genuine, non-judgemental and dependable.
We continue to see growth in our complex support service with several new sites, mainly through the transition of the NSW Government’s Community Justice and Integrated Support programs to DSA. | https://dsa.org.au/services/mentoring-services/ |
Manchester Lumps Clinic is a specialised clinic treating for patients with a lump that requires expert assessment, diagnostics and management. We also assist in patients who have unexplained joint pain or swelling, and common lumps that you may want removing.
About Us
Consultant Orthopaedic Surgeon
He qualified at the Royal Free and University College London medical school in 2003 and undertook my early surgical training in the North West. His specialist post-graduate training in Trauma & Orthopaedics was in the East Midlands (South) T&O rotation.
He then completed fellowships in lower limb arthroplasty and sarcoma in Leicester, Nottingham and Wrightington hospitals.
Qualifications
MBBS BSc (Hons) – University College London – 2003
Member of the Royal College of Surgeons – 2006
Fellow of the Royal College of Surgeons of Edinburgh (Trauma & Orthopaedics) 2014
Specialist Interests
- Hip & Knee Conditions including arthroplasty and joint injecitons
- Soft Tissue Sarcoma
- Metastatic Bone Disease
Refferals
Considering Referring a Patient?
Manchester Lumps Clinic have an easy access referral policy for patients with a lump.
Referral criteria may include any of the following:
- Painful swelling, lump or joint
- Increasing in size
- Lump bigger than 5 cm
- Deep lump or swelling
- Recurrent lump from previous excision
- History of cancer
Patients can self refer or a GP referral can be sent to the team via the contact us page.
Education
We regularly host CPD events around Greater Manchester, if you would like more information please let us know here and follow us on Twitter @lumpsclinic where updates will be regularly posted. | https://www.manchesterlumpsclinic.com/about-us/ |
Although PWS is best known for hypothalamic obesity and hyperphagia, the cognitive and behavioral issues are the most challenging for families. Brain difference is the underpinning of the characteristics that define the Prader-Willi personality: food related behaviors, excessive/repetitive behaviors, stress sensitivity/mood disorder, cognitive rigidity, disruptive behavior and skin picking. A few brain imaging studies of individuals with PWS have shown how the brain actually looks different, and functional magnetic resonance imaging (fMRI) brain scans have shown how the brain functions differently during tasks, specifically with respect to food reward and satiety. Recent fMRI and electrophysiological studies have demonstrated that people with PWS have difficulty reading emotional expression in pictures of faces, and when they do, they read happy faces better than sad or angry ones. They respond better to reward than punishment, and they have diminished disgust, embarrassment and shame. A few studies have demonstrated differences in the connectivity (patterns of neuronal transmission and/or communication) between various regions of the brain in persons with PWS compared to normally developing individuals. Previous neuroanatomical studies in PWS have examined cells in the hypothalamus. To date, no data are available on the structure of the brain in PWS at the level of the neuron in the frontal lobe where executive function for decision making, sensory perception and social behavior reside. This proposal seeks to study the number and structure of a modified type of pyramidal cell, the von Economo neuron (VENs). These neurons are found typically in greater numbers in the right hemisphere of the brain in the anterior cingulate cortex (ACC) and frontoinsular (FI) cortex. They are believed to be responsible for sensory awareness, social perception, problem-solving behavior, and maintaining the balance in the autonomic nervous system which determines psychological as well as physiological state. They are abnormal in number and/or distribution in disorders such as autism, schizophrenia, and frontotemporal dementia. These neurons are found in higher primates, elephants and cetaceans whose survival requires social communication; they cannot be studied in mice models of PWS.
Through the generosity of the families who lost a loved with PWS, there are brains available for study at the NIH NeuroBioBank. An oversight committee reviews each proposal to guarantee research qualifications, ethical standards and legal obligations. The proposal for this study was approved and 19 brains have been released for study at Dr. Hof’s laboratory at the Fishberg Department of Neuroscience, Icahn School of Medicine at Mount Sinai in New York City, New York. This proposal aims to examine the FI and the ACC, that are responsible for integrating sensory information from the body with the social, perceptual and thinking part of the brain. Samples from the right and left hemispheres will undergo special tissue preparation and staining to allow microscopic analysis of neuronal structure and architecture. Stereological examination will determine the size and shape of the neurons.
Research Outcomes: Project Summary
Our study is the first to focus on stereological assessment of neuronal distribution in the anterior cingulate cortex (ACC). Von Economo neurons (VENs) are long, spindle-shaped cells that are found in the ACC and the frontoinsular (FI) cortex. The distribution and density of VENs are affected in several neuropsychiatric disorders. We found increased density of VENs in layer V of the ACC in a small set of subjects with Prader-Willi syndrome (PWS) compared to controls. These were no changes in density or volume of pyramidal neurons in the same brain region. Increased number of VENs during development in PWS may correlate with the onset and intensity of temper tantrums, hyperphagia, autonomic instability and social salience. We are expanding our study to include more PWS cases as well as controls across the age-spectrum, to test whether this observation holds with age and indeed associates with clinical data and genetic subtypes. We also observed atypical distribution and oblique orientation of VENs in the posterior insular cortex. Our findings suggest that abnormal proliferation and migration of VENs may represent at least a partial cellular marker of the observed behavioral phenotypes. It is highly relevant to consider that abnormal distribution of VEN has been documented in brains from patients with autism and patients suffering from conditions that include autistic traits like agenesis of the corpus callosum. As PWS in some cases presents with autism-like behaviors further comparisons of VEN distribution and molecular phenotype, and of the structural organization of the ACC and FI across such disorders will be crucial to understand better the basis of the functional deficits of PWS.
Research Outcomes: Publications
Autism spectrum disorder: neuropathology and animal models. Varghese M, Keshav N, Jacot-Descombes S, Warda T, Wicinski B, Dickstein DL, Harony-Nicolas H, De Rubeis S, Drapeau E, Buxbaum JD, Hof PR. Acta Neuropathologica. 2017 Jun 5.
Awarded to:
Patrick Hof, MD
Amount:
$75,600 (In partnership with Prader-Willi France)
Institution: | https://www.fpwr.org/fpwr-funded-projects/a-post-mortem-study-of-von-economo-neurons-in-the-frontal-cortex-of-brains-of-persons-with-pws |
BSC and TQM
One of the administrative science domains that feed Performance Management as a discipline is the quality movement (Brudan, 2010). Consequently, Total Quality Management (TQM) has had a significant impact on the approach to management since its conceptualization and promotion in the 1980s (Andersen et al, 2004). TQM as defined by Hoque (2000) is a set of management concepts and tools that aims to involve both managers and ordinary employees to yield continuous performance improvement.
Anderson et al (2004) refer to TQM and associated quality management tools as means to improve growth, profitability and customer satisfaction. Among the most successful and used management tools associated with TQM, mentioned by the scholars are Six Sigma, Malcolm Baldrige National excellence model, EFQM excellence model, ISO standards or the Hoshin Kanri methodology.
Despite their popularity and success, Anderson et al (2004), citing Harari (1993) point to the fact that only between one fifth and one third of the TQM associated initiatives in Europe and USA brought significant improvements in quality, productivity, competitiveness or financial return. One of the major biases identified as a possible cause for the poor TQM results is the poor linkage between quality and strategic control methods. (Anderson et al, 2004)
In this context, Anderson et al (2004) suggest that the successful application of total quality management to the organizational context through one of its associated tools can be significantly strengthened when combined with a strategic performance management framework, such as the Balanced Scorecard.
Hoque (2002) reinforce the linkage between TQM and Balanced Scorecard, acknowledging that by using a Balanced Scorecard approach, organizations that failed in their TQM initiatives can get back on track by borrowing insights from the BSC approach. The researcher considers that by connecting the TQM related performance metrics to the organizational strategy through the use of the Balanced Scorecard the success of the TQM initiatives and programs can be considerably strengthen.
|
|
Key TQM – related activities
|
|
TQM – related performance metrics
|
|
BSC dimensions
|
|
Executive commitment and management competence
|
||
|
|
|
Customer relationships
|
||
|
|
|
Supplier relationships
|
||
|
|
|
Benchmarking
|
||
|
|
|
Employee rating
|
||
|
|
|
Open, less bureaucratic culture and employee empowerment
|
||
|
|
|
Monitoring quality programs (Zero defects culture)
|
||
|
|
|
Internal business process improvement and manufacturing innovation
|
||
|
Source: adpated from Hoque, 2000
References
- Andersen, H., V., Lawrie, G. & Savic, N. (2004), Effective quality management through third-generation balanced scorecard, International Journal of Productivity and Performance Management, Vol. 53, No. 7, pp. 634-645.
- Brudan, A. (2010), Plan-Do-Check-Act (PDCA) / Plan-Do-Study-Act (PDSA), Philosophy and Performance Management, smartkpis.com Performance Architect update 21/2010, available at: http://www.smartkpis.com/blog/2010/05/28/plan-do-check-act-pdca-plan-do-study-act-pdsa-philosophy-and-performance-management/.
- Hoque, Z. (2000), Total quality management and the Balanced Scorecard approach: a critical analysis of their potential relationships and directions for research, Critical Perspectives on Accounting (2003), Vol. 14, pp. 553-566. | http://www.balancedscorecardreview.com/pages/bsc-as-a-system/bsc-and-other-concepts/bsc-and-tqm-65.html |
CLARENDON COUNTY - Abused and neglected children need a sense of belonging, unconditional love and when possible a safe, family reunification.
The period of uncertainty caused by the COVID-19 pandemic has everyone adjusting to a "new normal." The sad reality of the "new normal" is that so many programs have been halted amid the strain of the pandemic, and the new normal hasn't stopped child abuse and neglect.
These children need a chance for a better life. That's what the South Carolina Department of Children's Advocacy's Cass Elias McCarter Guardian ad Litem program offers.
Clarendon County residents who are concerned about child abuse and neglect victims can get involved. If you are over 21 and can give four to five hours a month of your time for a child, you can change a child's life. Individuals interested in participating in the GAL program are encouraged to submit a completed application by Jan. 15. To download an application or for more information, log onto gal.sc.gov.
On Jan. 25, Clarendon County's office of the Cass Elias McCarter GAL program is offering a free online training program for accepted applicants.
Founded in 1984, the GAL program holds free training courses throughout the state at various times during the year to teach community volunteers how to advocate as Guardians ad Litem for abused and neglected children who have or are involved in family court legal proceedings through the Department of Social Services.
GAL volunteers get to know the children and everyone involved in the child's life, including family, teachers, doctors, social workers and others. These volunteers gather information about the child and what the child's needs are. The GAL volunteers make their recommendations to the court to help the judge make an informed decision about a child's future.
GAL volunteers do more than just gather information. These volunteers provide a stable presence in a child's life, remaining on each case until the child is placed in a safe, permanent home.
To learn more about the GAL program, contact Cassandra Hilton at the Florence County office at (843) 669-7940.
The history of GAL in South Carolina
Almost four decades ago, a Columbia woman worked tirelessly to establish the first state-funded volunteer program for child advocacy. Cass Elias McCarter's vision was to protect South Carolina's children. It was through her diligence that she secured a grant to start a volunteer Guardian ad Litem program. McCarter's vision for the abused and neglected children of South Carolina became a GAL program that would eventually blanket the state.
The first program started in Marlboro County in 1984. Within five years, a GAL program was operational in every judicial circuit in South Carolina. In fiscal year 2017-18, the program had grown to 2,216 advocates serving more than 14,000 children.
McCarter died in 2004 and never got to see her vision completed. Her legacy continues to serve the children of South Carolina. In 2010, the South Carolina Legislature passed a bill changing the name of the program to the Cass Elias McCarter Guardian ad Litem Program.
Beginning in 2010, every child with an abuse or neglect case in South Carolina Family Court has been appointed a volunteer GAD to be their voice. The program that began in Marlboro County in 1984 has become a nationwide model for serving all children. | https://theitem.com/stories/guardian-ad-litem-program-will-host-free-online-training-jan-25,376732 |
The pandemic has only amplified the importance of doing research into the causes and consequences of violence as well as effective responses. However, sharing that research looks different these days.
In the Fall, our team typically heads off to the Annual Meeting of the International Society for Traumatic Stress Studies (ISTSS) to share our work with other researchers and practitioners. Instead of logging miles this year, however, we’re logging on to a remote meeting.
The findings that we’re sharing at the remote ISTSS Annual Meeting reflect the breadth that is characteristic of our team’s work — as I hope you’ll see below across five poster presentations led by graduate student team members. From measuring service needs to developing a better understanding of revictimization risk, we hope there’s something for everyone in these posters. (Click on the picture of the poster to open a pdf version of the work.)
Needs and Concerns of Caregivers Involved in Child Abuse/Neglect Investigations
Two posters focused on understanding the needs and concerns of caregivers involved in child abuse and neglect investigations.
Adi Rosenthal led our team’s efforts to gather information about the service needs of families involved in child abuse and neglect investigations — and barriers to getting those needs met. She described that “We developed a measure for assessing the service needs and barriers across a wide range of services (i.e., physical health, mental health, school, and social, and basic needs) for families involved in child abuse or neglect investigations. The measure appears to be a promising assessment and captured high rates of unmet service needs: 94% of caregivers reported at least 1 unmet need and 39% reported at least 5. Caregivers reported an average of 7 barriers to getting their service needs met.”
Recognizing a research gap that has implications for practice, Maria-Ernestina Christl set out to develop a way to measure failure-to-protect fears. She summarized that, “Women involved in a child abuse investigation who had a history of intimate partner violence reported fears related to failure-to-protect laws. These fears were found to be related to economic dependence on the offender, racial identity, and their perceptions of the child abuse investigation.”
Revictimization
Three of the posters built on our team’s longstanding focus on revictimization. | https://traumaresearchnotes.blog/category/research-findings/ |
How do you list references when changing jobs?
How do you list references when changing jobs?
What information do you need to include about references? For each reference include their name, position title, organization, phone number, email address and location. If your reference has changed jobs since you worked together, indicate how your reference knows you (e.g., “former supervisor”).
What are career references?
Professional references are persons who can vouch for your qualifications for a job based on their insight into your work ethic, skills, strengths, and achievements. References may provide correspondence that serves as a proof of service, length of employment, achievements, and qualifications.
What do you do if you have no professional references?
As long as you can find a trusted contact who will speak positively about your character, you can supply a reference. Even if you’ve only interacted with someone a few times, they can still act as a reference. Make a list of people you’ve interacted with besides family.
What are 3 examples of references you can use for a job?
Here are five people you can include on your list of professional references if you want to land the job:
- Former Employer as a professional reference. A previous employer can provide the best insight into your work ethic.
- Colleague.
- Teacher.
- Advisor.
- Supervisor.
Who should you not use for references?
4 people you should never use as job references
- Family members.
- Anyone who fired you.
- Friends or roommates.
- Anyone who’s not expecting a call.
- Give your career a heads-up.
What if you can’t use your boss as a reference?
What to do if a former employer won’t give you a reference
- Lean on your other references.
- Get a reference from someone else within the company.
- Be honest and unemotional.
Do professional references have to be bosses?
Professional References Employers want to understand the quality of your work and your ability to achieve results. As such, professional references should be anyone who can attest to your work, such as: Current or former boss.
Can you use a coworker as a reference?
Work-related references Most employers prefer work references since those individuals know you best in a professional atmosphere. They’re able to list your experience and skills and discuss their general observations of you. Work-related references include coworkers, managers, clients and vendors.
Who should not be a reference?
Do jobs ever call references?
Do employers always check references? Essentially, yes. While it’s true that not 100% of Human Resources (HR) departments will call your references during pre-employment screening, many do. If you’re about to begin a job search, you should expect to have your references checked.
What is an example of a career change resume?
Career Change Resume Examples The following career change resume sample is for a sales and marketing person pursuing a career in project management in a deadline-driven industry: Example #1 This resume was written by a career changer with more relevant work experience.
What does it mean to be a career changer?
As a career changer, you bring certain skills with you from past jobs that make your application more attractive to employers. Some of those skills can be listed in your skills section, and others can be highlighted as examples of work experience. Here’s what a combination resume for a career change candidate looks like:
How do you write a cover letter for a change of career?
In addition to tailoring your resume and preparing for your interview, changing careers often involves writing a cover letter that provides details about your experience, strengths and transferable skills (even if you don’t necessarily have experience specific to the new position).
How do I provide references to potential employers?
When you need to provide references to a potential employer, the best way to do this is to create a reference page you can share with them. A reference page is a list of your references . You don’t want to include the list on your resume. | https://baahkast.com/how-do-you-list-references-when-changing-jobs/ |
Source: ICMC Europe, Welcome to Europe! A comprehensive guide to resettlement, 2013
Afghan refugees in Iran and Pakistan constitute the largest and most protracted refugee population under UNHCR’s mandate. Pakistan hosts 1,615,876 refugees, and Iran 840,158 at 1 January 2014. The majority have been resident in both countries since fleeing the Soviet War in Afghanistan during the 1980s. Despite the success of voluntary repatriation programmes both in Pakistan and Iran, many Afghan refugees have specific needs, vulnerabilities and protection concerns that prevent their return. In addition, the volatile security situation and human rights violations in Afghanistan remain an ongoing concern. In May 2012, the governments of Pakistan, Iran, Afghanistan and UNHCR adopted the Solutions Strategy for Afghan Refugees (SSAR). The SSAR outlines the need for increased voluntary repatriation, but also for enhanced resettlement as a means of international responsibility sharing, assistance to refugee affected and hosting areas (RAH) and alternative stay arrangements for refugees in Pakistan. Resettlement is considered to be a strategic component of the SSAR and a vital tool for maintaining adequate protection space.
Afghan refugees in Pakistan
Pakistan is not a signatory to the 1951 Convention or the 1967 Protocol. The temporary stay of registered Afghan refugees in Pakistan is regularised by means of Proof of Registration cards, all of which expired on 31 December 2012. The Pakistani government extended their right to stay for an additional 6 months until the end of June 2013, and in July 2013 announced a further extension.
In Pakistan, 36% of the Afghan refugee population lives in refugee camps – known locally as ‘refugee villages’- and 63% in urban settings. In addition to the 1.7 million refugees registered with the government, it is estimated that a further one million undocumented Afghans live in the country. 85.1% of the Afghans in Pakistan are Pashtun, and the remainder are Tajiks, Uzbeks among others. One of the most vulnerable Afghan refugee groups is the ethnic Hazara, who face targeted killings and persecution by the Taliban and anti-Shia factions in Afghanistan. For the Hazara, and for other Afghan refugee groups, voluntary repatriation is therefore not a viable durable solution.
Since 2002, some 5.7 million Afghan refugees have returned to Afghanistan. From 2002 to 2012, UNHCR facilitated the largest voluntary repatriation programme via which 3.8 million refugees returned from Pakistan to Afghanistan. However, due to the volatile security in Afghanistan, voluntary repatriation was scaling down over the past years. Prospects for local integration remain low, as refugees have limited access to recognised legal status and to related services.
In late 2012, a Contact Group on Resettlement chaired by the Government of Australia was formed to mobilize international support for resettlement.
UNHCR has projected a total multiyear resettlement need amongst the Afghan refugee population in Pakistan amounting to 26,800 persons. For 2014, UNHCR is planning to submit for resettlement 3,850 Afghans from Pakistan. In 2012, UNHCR assisted the departure of 283 Afghan refugees from Pakistan.
Afghan refugees in Iran
Iran is a signatory to the 1951Convention and its 1967 Protocol. Hazara and Tajiks represent over 70% of the Afghan refugee population in Iran, with the remainder consisting of other ethnic groups such as the Pashtuns. Most refugees in Iran reside in urban areas, with only 3 per cent living in settlements mostly located in rural areas.
Prospects for local integration are limited and increasingly difficult due to the deteriorating economic situation. Refugees’ movements within Iran are limited to so-called ‘No-Go Areas,’ and the living standards of Afghan refugees have deteriorated significantly in recent years. During 2002-12, UNHCR subsequently assisted the voluntary repatriation of approximately 902,000 Afghan refugees resident in Iran. Due to the difficult economic conditions in Iran, voluntary repatriation to Afghanistan has risen in 2011. Resettlement is therefore an important durable solution for the Afghan refugee population although only a very small number of Afghan refugees in Iran have benefited from such solution so far.
In 2011, the Refugee Contact Group on Iran was established with the aim of enhancing the ongoing resettlement of Afghan refugees from Iran. Presently chaired by Sweden, with a membership comprising UNHCR and selected resettlement countries (Australia, Finland and Germany, with Brazil and Japan as observers), the Contact Group works in close cooperation with the Iranian government. It aims to increase the number of resettlement places available for Afghan refugees in Iran, and to encourage multi-year commitments by resettlement countries to make the process more predictable and reliable for all parties. In 2012, UNHCR assisted the departures of 1,427 Afghan refugees from Iran, three times the 2011 figure of 474 refugees. In addition to resettlement, the Contact Group has supported humanitarian assistance to refugees in Iran. A Health Insurance Scheme (HIS) was implemented in 2011, ensuring that refugees continue to benefit from free primary health care.
Iran has been designated as one of the seven priority refugee situations for the strategic use of resettlement. UNHCR has projected a total resettlement need of 82,000 persons among Afghan refugee populations in Iran. For 2013, UNHCR seeks as many as 5,000 places, including cases with special medical needs and women and girls at risk. However, there has been a growing reticence on the part of the resettlement countries to accept refugees with medical needs.
For Afghan refugees, the major countries of resettlement include Australia, Sweden, Finland and Norway. | https://www.resettlement.eu/page/afghan-refugees-iran-pakistan-0 |
Content Search
UNHCR - Iraq Fact Sheet (April 2021 )
Attachments
>37,000
Refugee and IDP women and girls have received sanitary kits in 2021 as of 30 April
>20,000
Refugees and IDPs have received legal assistance in 2021 as of 30 April
>24,000
Refugees have benefitted from COVID-19 awareness raising in 2021 as of 30 April
~1,000
Refugees and IDPs received their first COVID19 vaccination as of 30 April
Working with Partners
Through the Regional Refugee and Resilience Plan (3RP), UNHCR leads the humanitarian response for Syrian refugees in Iraq, in close coordination with humanitarian actors and government authorities, to protect and assist refugees and asylum-seekers. Under the 3RP, UNHCR leads the Protection, Shelter, and Basic Needs sectors, and co-leads the Health sector with the WHO and the WASH sector with UNICEF.
UNHCR is engaged in the inter-agency response to internal displacement and returns. UNHCR leads the Protection, Camp Coordination and Camp Management (CCCM), and Shelter/Non-Food Items clusters, as part of the cluster coordination mechanism for the IDP response. UNHCR also co-leads, with UNFPA and the WFP, the UN Sustainable Development Cooperation Framework (UNSDCF 2020-2024) Priority Working Group “Achieving Social Cohesion, Protection, and Inclusion”. UNHCR is also part of the inter-agency Durable Solutions Task Force and its technical subgroups.
Main Activities
Protection
Refugees – UNHCR coordinates the response for all refugees in Iraq with the government, UN agencies, and local and international partners, including activities related to: registration; protection monitoring and advocacy; legal aid; psychosocial support; child protection; prevention, risk mitigation, and response to gender-based violence (GBV) and sexual exploitation and abuse (SEA); and resettlement to third countries which is pursued for a small number of refugees with acute vulnerabilities/protection needs.
IDPs – Direct interventions are undertaken with local, regional, and national authorities to ensure that the displaced can access safety in camps and non-camp locations. Protection monitoring teams have been deployed to identify protection and assistance needs, including in areas of return, which directly inform protection responses, including: provision of legal assistance on a range of issues such as missing civil documentation; prevention, risk mitigation, and response to GBV and SEA; child protection; the reunification of separated families; and the coordination of IDP protection responses with the government, NGOs and other UN agencies.
Durable Solutions – Through an area-based approach, UNHCR works to develop pilot projects and strengthen local government coordination mechanisms to ensure the viability and sustainability of local integration, both in areas of return, for those who are willing and able to return, and in areas outside of places of origin.
Camp Coordination and Camp Management
As the CCCM Cluster and 3RP lead, UNHCR works with local authorities and humanitarian actors to provide coordinated services to IDP and refugee camps. This translates to ensuring adequate shelter, delivery of food and water, presence of education and health facilities, as well as capacity building for camp management actors and service providers.
In mid-October 2020, the Government of Iraq embarked on a sudden IDP camp closure exercise which resulted in the closure or reclassification of 16 IDP camps and informal sites, affecting over 42,400 individuals who departed from these sites. As of 30 April 2021, 184,552 IDPs were hosted in 29 camps, mainly in the Kurdistan Region of Iraq (KR-I), with only two camps operating in federal Iraq following the aforementioned closures.
Of the 245,953 registered Syrian refugees, over 95,000 reside in ten camps across the KR-I. Currently, over 98 per cent of Syrian refugees live in KR-I, with 39 per cent residing in camps and the remainder in urban, periurban, and rural areas.
Shelter and NFIs
UNHCR provides shelter assistance, core relief items, and coordinates with humanitarian actors to complement the work of local authorities to improve the living conditions of IDPs and refugees in camp and non-camp settings throughout Iraq. This includes the distribution of tents, blankets, mattresses, kitchen sets and sanitary kits.
Basic Needs
UNHCR assists vulnerable displaced and refugee families to cover their most basic needs through the distribution of cash assistance. In areas where markets are functioning and accessible to beneficiaries, unconditional cash provides an efficient way to meet the needs of those affected by displacement, allowing families to prioritize their own needs while upholding their dignity and making them less likely to resort to harmful coping strategies. | |
Research conducted by the Finnish Ministry of the Environment shows that the best way to promote the development of wind energy is to streamline and define regulatory procedures for the production of wind energy both onshore and offshore.
On June 30, 2021, the Finnish Ministry of the Environment presented a research report on the conditions for the development of wind energy in the country. The study covered three areas: regulatory procedures for the development of wind energy, profitability of offshore wind energy and coordination of wind energy development and regional control of projects.
The report puts forward a number of concrete proposals for action to streamline administrative procedures and enhance stakeholder dialogue. Regional planning should respond faster to technological developments and should be more coherent. Regarding the environmental impact assessment (EIA), the recommendations highlight the need to establish a common approach to the role of the municipality in this procedure.
It is also recommended to further clarify the role and significance of the 45 MW size limit as the wind farm’s impact threshold in the EIA. On December 14, 2018, the Finnish Parliament approved an amendment to the Finnish Act on Environmental Impact Assessment (252/2017). This amendment authorizes the construction of a wind farm without the need to conduct an environmental impact assessment (EIA), if the project consists of no more than 10 wind turbines (WTG – wind turbine generators) or less than 45 MW. Experts recommend increasing this limit or abolishing it altogether
Unclear regulatory procedure for Finnish offshore wind turbines
It would be useful to describe the steps and conditions in the offshore wind regulatory procedure as they are currently unclear, especially in Finland’s Exclusive Economic Zone. It is also recommended to amend the law to give priority to the first operator in granting construction rights to be given the right to exploit the site.
The study presents recommendations aimed at improving the profitability of offshore wind energy. Experts have proposed lowering the property tax for offshore wind farms to make offshore wind farms tax-neutral compared to onshore wind farms. In the maritime areas of the state, transparency in determining the amount and determining the amount of rents for the lease of land for wind energy should also be ensured. In addition, the possibility of using the state guarantee as an additional to long-term Power Purchase Agreements for medium-sized enterprises or as a loan financing guarantee for offshore wind projects should be further explored.
Currently, wind energy is concentrated in the western part of Finland, therefore, in order to increase the regional distribution of wind energy, the study looked at the coordination of wind energy development and regional control. The study showed that in some regions it can be a challenge to find solutions to coordinate the development of the sector.
The armed forces gave a positive opinion for 11,214 wind turbines, of which more than 1,350 could be built in eastern Finland. However, this potential is currently untapped. As part of the overall analysis of wind energy and regional control, the study also examined the consultation procedure of the Armed Forces. Currently, the consultation procedure is not based on the Regional Control Act, but a positive opinion is a prerequisite for the construction of wind farms. As an important improvement measure, it is proposed that the opinion of the Finnish Armed Forces is legally required in the initial stage of wind energy projects. | https://balticwind.eu/finland-the-best-way-to-promote-wind-energy-is-to-improve-the-regulatory-process/ |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.