content
stringlengths 0
1.88M
| url
stringlengths 0
5.28k
|
---|---|
New Delhi, Feb 25 : The Supreme Court on Thursday said the ossification test conducted on an accused at the age of 55 cannot be termed conclusive to declare him a juvenile on the date of the incident in the absence of reliable medical evidence.
A bench comprising Justices R.F.Nariman, Hemant Gupta and B.R.Gavai said when ossification tests cannot yield trustworthy and reliable results, such test cannot be made a basis to determine the age of the person concerned on the date of incident.
“Therefore, in the absence of any reliable, trustworthy medical evidence to find out age of the appellant (accused), the ossification test conducted in year 2020 when the appellant was 55 years of age cannot be conclusive to declare him as a juvenile on the date of the incident,” it said in its verdict.
The verdict came on an appeal of murder convict challenging the April 2020 Allahabad High Court verdict, which upheld his conviction.
Ram Vijay Singh filed an application before the court stating he was juvenile on the date of incident on July 20, 1982.
In support of his plea, Singh relied upon family register maintained by the panchayat, his Aadhaar card and an order passed by the High Court in 1982, granted him bail on the basis of the report of the radiologist that the age of the appellant at that time was between 15-17 years.
The top court noted that there was a mention of single barrel gun granted to Singh on July 24, 1982, a couple of days after the incident.In Column 2 of the application, Singh provided his date of birth as December 30, 1961.
It said that when a person is around 18 years of age, the ossification test can be said to be relevant for determining the approximate age of a person in conflict with law.However, when the person is around 40-55 years of age, the structure of bones cannot be helpful in determining the age.
On the aspect of age of the accused, the bench considered his date of birth for procuring arms licence, granted after the day of the incident.Dismissing the appeal, the bench said: “It is not necessary for the prosecution to examine all the witnesses who might have witnessed the occurrence.It is the quality of evidence which is relevant in criminal trial and not the quantity. | https://telugustop.com/ossification-test-at-55-cant-determine-juvenility-during-crime-sc-national-crime-disaster-accident-immigration-law-rights-latest-news |
Dimension of diamonds:
One 3 x 2.7 mm square point cut
Two 2 x 1.5 mm table cuts
One 2.25 x 1.6 mm rose cut
One 2.6 x 2 mm triangular cut
Dimension of rubies: all oval cushion cuts- one 2.5 x 2 mm, nine 2 x 1.6 mm (approx. 0.3 ctw)
Condition: a small 6 mm section at the back of the shank appear to have been added later; the gold color is slightly more rose. Some tiny nibbles and abrasions to the facet junctions of the stones, especially on the triangular-cut diamond (mostly visible under 40x loupe magnification only). One of the small rubies has a 1 mm cavity to the table. Surface wear and minor age-related flaws to the gold throughout. Otherwise this ring is remarkably original for the age: all stones are original, and the settings have not been modified. | https://www.hhantiquejewelry.com/shop/c-1730-60-french-rococo-giardinetti-ring/ |
The tourist arrivals to the country for the first three weeks of August have crossed the 30,000 mark.
The provisional data from the Sri Lanka Tourism Development Authority showed that for the August 01-23 period, a total of 31,105 international visitors entered the country.
This brings the total arrivals from January 01 to August 23 to 489,775. The average tourist arrivals per day for the month so far is about 1,350.
Analysis of the weekly arrival trend for August shows that the highest number of tourists visited the country in the first week of the month (August 01-07). The following weeks showed a declining trend.
The week-by-week tourist arrivals for August showed a contraction in numbers when compared with the
previous month.
The total arrivals for all the four weeks of July were above 10,000, with the fourth week recording arrivals of above 15,000. However, for the month of August, which is still the summer season, arrivals have been below 10,000 from the second week onwards.
It is likely total tourist arrivals for August will be below that of July, which was 47,293.
The top three source markets for Sri Lanka for the month of August were the United Kingdom, India and Germany. Arrivals from the UK for August 10-23 stood at 5,872, whereas from India and Germany, a total of 4,262 and 2,779 international visitors entered the country. | https://www.srilankantravelguide.lk/tourist-arrivals-top-30000-in-first-three-weeks-of-august/ |
Have you ever tried to build a multilanguage website using php ? Whether you did it or not, you should know that this thing requires some thinking before you start coding. I will present you a very simple, fast and scalable solution for this.
What is gettext ?
Gettext is a set of tools that provides a framework to help other GNU packages produce multi-lingual messages. These tools include a set of conventions about how programs should be written to support message catalogs, a directory and file naming organization for the message catalogs themselves, a runtime library supporting the retrieval of translated messages, and a few stand-alone programs to message in various ways the sets of translatable strings, or already translated strings.
Using gettext
Lots of big applications use gettext to translate the messages and strings shown in their user interface to several languages, for eg. the popular Xchat is one of them. When I first saw a website built with gettext I was perplexed. I had no idea how this works. Later on I studied and saw that the concept is very simple and easy to understand.
Requirements
First you must enable the Gettext PHP extension into PHP to have access to its functions. If you are using Windows, you probably already have the Gettext DLL and only need to change your php.ini configuration file to enable this extension. Do so by removing the semicolon from the front of the line where php_gettext.dll is located. After that, save the file and restart your Web server software.
Using .mo and .po files
The whole idea behind multilanguage with gettext is to keep the strings and their translation in separate files. These informations are stored in files with .po extension.
Example
Enough with the talk. Let’s see an example of how this runs.
First of all you should establish a predefined directory structure in your application like the following:
|
|
1
2
3
4
5
|
|
/locale
/en
/LC_MESSAGES
messages.po
messages.mo
In your application folder, you create a “locale” folder in which you put a directory called like the variable “lang” you get from the link. Inside it you create another directory called “LC_MESSAGES” and inside it two files. One with .mo and another with .po extension, both called messages. Then you can write the following lines in order to proceed with the translations:
|
|
1
2
3
4
5
6
7
8
9
10
11
12
13
|
|
<?php
$language = $_GET['lang'];
putenv("LANG=$language");
setlocale(LC_ALL, $language);
// Set the text domain with this name: 'messages'
$domain = 'messages';
bindtextdomain($domain, "/www/htdocs/myWebsite.com/locale");
textdomain($domain);
echo gettext("String to be translated with gettext");
?>
The above example is getting the language from the link and set that as the language for gettext. So if in the link you will have a parameter called ‘lang=en’, that one will be set as the gettext language. The next step, the directory with the name “en” from locale directory will be chosen for obtaining the translations.
Translations strings are stored in the .po file itself in this form:
|
|
1
2
|
|
msgid "String to be translated with gettext"
msgstr "The translation for the above string"
The first line which is called “msgid” is the text that is inside your document and will receive the translated string from “msgstr” line. So in your application, you will write the following line :
|
|
1
|
|
echo gettext("String to be translated with gettext");
and the output will be a string with the translation from the .po file: “The translation for the above string”;
Using POEDIT
Poedit is a tool for .po files editing and visualization. It is cross-platform gettext catalogs (.po files) editor. It is built with wxWidgets toolkit and can run on any platform supported by it (although it was only tested on Unix with GTK+ and Windows). It aims to provide more convenient approach to editing catalogs than launching vi and editing the file by hand.
Every time when you modify a .po file, you should recompile the .mo file in order to have that translation available on the page with gettext. This can be done easily from POEDIT just by pressing the second button from top left (the “SAVE” button ). | https://www.yourhowto.net/build-multilanguage-websites-with-gettext/ |
In Skyview Temple on The Legend of Zelda: Skyward Sword HD, you’ll be met with a series of puzzles and obstacles, but perhaps the most puzzling is the guardian eye door.
Fi isn’t of much help, and neither is the stone tablet on the ground level, so here’s how you open the eye door of the Skyview Temple.
How to unlock the eye door in Skyward Sword HD
- In the room of the eye door, walk to the centre of the raised platform, marked by a ring on the floor;
- Look at and target the eye by holding ZL;
- With the Right Joy-Con or right analogue, hold the sword upwards;
- Next, rotate the analogue or Joy-Con clockwise repeatedly;
- This will send the eye into a spin, eventually unlocking the guardian eye door.
Once you’ve swung your sword around a couple of times, the guardian eye will flash red, close, and open the door beneath.
How to get into Skyview Temple in Skyward Sword HD
If you’re running around outside of Skyview Temple trying to work out how to get in, stand by the bejewelled door that won’t open, look up, and shoot the red gems with your Slingshot (ZR to activate).
Doing this will open the doors to the Skyview Temple. You’ll need to make your way past a few Deku Baba (chomping planets), including one which inconveniently sits at the top of a vine climb.
To get past the Deku Baba at the top of the vine climb, you need to shoot it with your Slingshot and then quickly scurry up the vines and run behind it. Then, you won’t get knocked down by its next attack, giving you time to slash it down first.
After you hit the red gems behind the Deku Baba, the door on the lower level will open, taking you into the room of the guardian eye door.
So, that’s all that you need to know to open the guardian eye door in Skyward Sword HD: just show it your blade and make it dizzy! | https://outsidergaming.com/the-legend-of-zelda-skyward-sword-hd-how-to-unlock-the-guardian-eye-door-of-skyview-temple/ |
These statistics reflect information submitted by reporting circles. As teams continue to report their Big Sit! results, the statistics on this page will change to reflect up-to-the-minute information.
Team Information: SASsy Seawatchers
Team Checklist
- Pacific Loon Gavia pacifica
- Red-throated Loon Gavia stellata
- Common Loon Gavia imme
- Pied-billed Grebe Podilymbus podiceps
- Eared Grebe Podiceps nigricollis
- Horned Grebe Podiceps auritus
- Western Grebe Aechmophorus occidentalis
- Clark's Grebe Aechmophorus clarkii
- Sooty Shearwater Ardenna grisea
- Pink-footed Shearwater Ardenna creatopus
- Blue-footed Booby Sula nebouxii
- Brown Pelican Pelecanus occidentalis
- Double-crested Cormorant Phalacrocorax auritus
- Pelagic Cormorant Phalacrocorax pelagicus
- Brandt's Cormorant Phalacrocorax penicillatus
- Great Blue Heron Ardea herodias
- Great Egret Ardea alba
- Snowy Egret Egretta thula
- Turkey Vulture Cathartes aura
- Greater White-fronted Goose Anser albifrons
- Brant Branta bernicla
- Cackling Goose Branta hutchinsii
- Canada Goose Branta canadensis
- Blue-winged Teal Anas discors
- Mallard Anas platyrhynchos
- Green-winged Teal Anas crecca
- Cinnamon Teal Anas cyanoptera
- American Wigeon Anas americana
- Gadwall Anas strepera
- Ring-necked Duck Aythya collaris
- Black Scoter Melanitta americana
- Surf Scoter Melanitta perspicillata
- Common Merganser Mergus merganser
- Ruddy Duck Oxyura jamaicensis
- White-tailed Kite Elanus leucurus
- Northern Harrier Circus cyaneus
- Red-tailed Hawk Buteo jamaicensis
- Peregrine Falcon Falco peregrinus
- American Kestrel Falco sparverius
- Virginia Rail Rallus limicola
- Sora Porzana carolina
- American Coot Fulica americana
- Black-bellied Plover Pluvialis squatarola
- Killdeer Charadrius vociferus
- Black Oystercatcher Haematopus bachmani
- Greater Yellowlegs Tringa melanoleuca
- Black Turnstone Arenaria melanocephala
- Surfbird Calidris virgata
- dowitcher sp.
- Red-necked Phalarope Phalaropus lobatus
- Parasitic Jaeger Stercorarius parasiticus
- Heermann's Gull Larus heermanni
- Herring Gull Larus argentatus
- Glaucous-winged Gull Larus glaucescens
- California Gull Larus californicus
- Western Gull Larus occidentalis
- Elegant Tern Thalasseus elegans
- Common Murre Uria aalge
- Marbled Murrelet Brachyramphus marmoratus
- Barn Owl Tyto alba
- Great Horned Owl Bubo virginianus
- Anna's Hummingbird Calypte anna
- Belted Kingfisher Megaceryle alcyon
- Hairy Woodpecker Picoides villosus
- Northern Flicker Colaptes auratus
- Say's Phoebe Sayornis saya
- Black Phoebe Sayornis nigricans
- Tropical Kingbird Tyrannus melancholicus
- California Scrub-Jay Aphelocoma californica
- Common Raven Corvus corax
- Violet-green Swallow Tachycineta thalassina
- Tree Swallow Tachycineta bicolor
- Barn Swallow Hirundo rustica
- Chestnut-backed Chickadee Poecile rufescens
- Bushtit Psaltriparus minimus
- Bewick's Wren Thryomanes bewickii
- Marsh Wren Cistothorus palustris
- Wrentit Chamaea fasciata
- European Starling Sturnus vulgaris
- American Pipit Anthus rubescens
- Orange-crowned Warbler Oreothlypis celata
- Townsend's Warbler Setophaga townsendi
- Yellow Warbler Setophaga petechia
- Common Yellowthroat Geothlypis trichas
- Summer Tanager Piranga rubra
- California Towhee Melozone crissalis
- Clay-colored Sparrow Spizella pallida
- Savannah Sparrow Passerculus sandwichensis
- Fox Sparrow Passerella iliaca
- Lincoln's Sparrow Melospiza lincolnii
- Song Sparrow Melospiza melodia
- White-crowned Sparrow Zonotrichia leucophrys
- Red-winged Blackbird Agelaius phoeniceus
- Western Meadowlark Sturnella neglecta
- Brewer's Blackbird Euphagus cyanocephalus
- House Finch Haemorhous mexicanus
- American Goldfinch Spinus tristis
- Northern Shoveler Anas clypeata
- Harlequin Duck Histrionicus histrionicus
- Palm Warbler Setophaga palmarum
Team Notes
Participants: Mark Kudrav, Avis Boutell, Ginny Marshall, Marshall Dinowitz, Leslie Flint, Garth Harwood, Gary Deghi, Peggy Macres, Bill Groll, Jc Shaver, Carolyn Weng, Daria and Alex, William from Mark's workplace, Francis Toldi and Leigh Toldi, Nicole Westbrook and Dan, Susie Hons, Doug and Donna Pomeroy, Malia Kai De Felice, Bob Ulvang, Evleen Anderson, Douglas Brown, and team captain Jennifer Rycenga
Weather: Mild, generally clear throughout the day, mid-fifties to mid-sixties. Some wind in the afternoon.
Location: Pescadero State Beach and Marsh Natural Area
Time At Location: 6:05 am to 6:50 pm (12 hours and 45 minutes)
Notes:
The SASsy Seawatchers have a wonderful spot at Pescadero State Beach and Marsh, overlooking the sea, the pond, the marsh, and, as we discovered this memorable day, within scope sight of a first-class migrant trap! The list of best birds is absurdly long - and then there were the birds seen by the advance team that wandered into the migrant trap, and saw species that, even with our ladder and scopes, were not detected within the circle. Here's the two lists: Great Birds within the Circle: Blue-footed Booby - part of this historic incursion Pink-footed Shearwater Greater White-fronted Goose Cackling Goose Black Scoter Harlequin Duck - long-staying male Tropical Kingbird Three species of late-migrating swallows: Barn, Violet-green, Tree Palm Warbler - at least three, maybe more individuals Clay-colored Sparrow Summer Tanager
Anecdotes:
I arrived alone at 6:05 am (my spouse dropped me off, with some trepidations), but it paid off when, after stumbling around a bit to find the trailhead, I detected a screeching Barn Owl and a Great Horned Owl. When Mark Kudrav (a hero of this exceptional day!) arrived around 6:30 or so, we were off to the races, with both rails, his find of a north-bound Blue-footed Booby, and our efforts to scratch out a few tubenoses and alcids. By the time lots more folks arrived around 8:00 am, we knew we were in for a better day than last year's fog-shrouded affair. Peggy, my wife, brought the ladder, and it immediately paid off when we saw the day's only visible Savannah Sparrow from it (the ladder would later help secure rarer species, like Tropical Kingbird and Summer Tanager!). The snacks also appeared at this time, and provided adequate nutrition and energy, such that we suffered few lunch-hour defections. Thanks to all who brought the victuals. Around 11:00, Ginny Marshall spotted our first very cool rarity - a Spizella sparrow. She asked Donna to use her advanced pishing skills, and it worked: a Clay-colored Sparrow perched up! Wow! Much happiness and high-fiving at this bona-fide rarity. Then yours truly, team captain, needed to take a bathroom break. I walked up the narrow trail to the distant eucalyptus grove for this personal research. On the way back down, I spotted a Palm Warbler. Knowing this was an important bird to at least one member of our team, I invited them to come up while I returned to the circle. Those who now went to explore found more - a warbler swarm. Another reconnaissance mission was sent, with excellent birders, and they started pointing to things. We in the circle mounted the ladder, trained the scope, and got what we could in the excitement - Palm Warbler, Townsend's Warbler, Yellow Warbler, Summer Tanager. A bit later we added a Tropical Kingbird. We missed a few other rarities seen up there - Brewer's and Chipping Sparrows, House Wren and a Baltimore Oriole, as well as some common species like Spotted Towhee and Cooper's Hawk. Amazing day - a memorable migrant event for San Mateo county, great camaraderie, stories of exultation and frustration to share. | https://www.birdwatchersdigest.com/bwdsite/connect/bigsit/bigsit-2013/stats.php?find_type=circle&find=sassyseawatchers |
Recently Eitan Chatav asked in the Programming Haskell group on Facebook
What is the correct way to write breadth first traversal of a ?
He’s thinking of “traversal” in the sense of the class, and gave a concrete declaration of rose trees:
It’s an excellent question.
Breadth-first enumeration
First, let’s think about breadth-first enumeration of the elements of a tree. This isn’t compositional (a fold); but the related “level-order enumeration”, which gives a list of lists of elements, one list per level, is compositional:
Here, is “long zip with”; it’s similar to , but returns a list as long as its longer argument:
(It’s a nice exercise to define a notion of folds for , and to write as a fold.)
Given , breadth-first enumeration is obtained by concatenation:
Incidentally, this allows trees to be foldable, breadth-first:
Relabelling
Level-order enumeration is invertible, in the sense that you can reconstruct the tree given its shape and its level-order enumeration.
One way to define this is to pass the level-order enumeration around the tree, snipping bits off it as you go. Here is a mutually recursive pair of functions to relabel a tree with a given list of lists, returning also the unused bits of the lists of lists.
Assuming that the given list of lists is “big enough”—ie each list has enough elements for that level of the tree—then the result is well-defined. Then is determined by the equivalence
Here, the of a tree is obtained by discarding its elements:
In particular, if the given list of lists is the level-order of the tree, and so is exactly the right size, then will have no remaining elements, consisting entirely of empty levels:
So we can take a tree apart into its shape and contents, and reconstruct the tree from such data.
Breadth-first traversal
This lets us traverse a tree in breadth-first order, by performing the traversal just on the contents. We separate the tree into shape and contents, perform a list-based traversal, and reconstruct the tree.
This trick of traversal by factoring into shape and contents is explored in my paper Understanding Idiomatic Traversals Backwards and Forwards from Haskell 2013.
Inverting breadth-first enumeration
We’ve seen that level-order enumeration is invertible in a certain sense, and that this means that we perform traversal by factoring into shape and contents then traversing the contents independently of the shape. But the contents we’ve chosen is the level-order enumeration, which is a list of lists. Normally, one thinks of the contents of a data structure as simply being a list, ie obtained by breadth-first enumeration rather than by level-order enumeration. Can we do relabelling from the breadth-first enumeration too? Yes, we can!
There’s a very clever cyclic program for breadth-first relabelling of a tree given only a list, not a list of lists; in particular, breadth-first relabelling a tree with its own breadth-first enumeration gives back the tree you first thought of. In fact, the relabelling function is precisely the same as before! The trick comes in constructing the necessary list of lists:
Note that variable is defined cyclically; informally, the output leftovers on one level also form the input elements to be used for relabelling all the lower levels. Given this definition, we have
for any . This program is essentially due to Geraint Jones, and is derived in an unpublished paper Linear-Time Breadth-First Tree Algorithms: An Exercise in the Arithmetic of Folds and Zips that we wrote together in 1993.
We can use this instead in the definition of breadth-first traversal:
| |
This glass noodle recipe is an ode to all those specialty dishes that are usually expertly prepared by my generation's elders around the Lunar New Year or "Tết" as it is known in the Vietnamese language. This year will look quite a bit different as there are no large and extended family gatherings and no potluck style dinner spreads brimming with dishes speaking to the bright and bold flavours -- as well as over the top variety -- synonymous with Vietnamese food. Though the spread will feel different, I wanted to humbly replicate and share a dish that is always an extended family favourite made by an aunt who is arguably one of the best cooks in the family. Her version contains lobster but I have swapped it out here for more easily accessible and economical shrimp. The mushrooms I am using are a combination of fresh shiitake and seafood mushrooms but just about any preferred combination works, so don't be afraid to get creative!
Method
Vietnamese Glass Noodles With Shrimp and Mushrooms 7 Steps
-
Step 1
Soak the bean thread noodles in cool water for 1 hour until softened and pliable but not mushy. Drain and, using scissors, make 4-5 cuts through the bundle of noodles aiming about 5-6 inches apart, set aside. (This will yield shorter noodle strands, which will be easier to cut and handle in the pan.)
-
Step 2
Prepare the sauce: In a small bowl, combine the fish sauce, oyster sauce, soy sauce, sesame oil and sugar, mix well and set aside.
-
Step 3
Heat a non-stick skillet on medium-high heat, add 1 tablespoon of the vegetable oil, then add in the shrimp and sear until cooked and crusty on the exterior, approximately 1 minute per side, remove from the pan onto a plate and set aside.
-
Step 4
In the same skillet, add another tablespoon of vegetable oil, half of the sliced shallots and cook for 30 seconds until the shallots begin to brown. Then add in the mushrooms and cook for another 2-4 minutes, stirring regularly until the mushrooms start to soften and brown. Add in the sliced scallions and 2 tablespoons of the sauce mixture, stir to combine and transfer to the same bowl as the cooked shrimp.
-
Step 5
Wipe the skillet clean and return to the heat, add in the remaining vegetable oil, then the remaining sliced shallots and cook for 30 seconds, stirring the entire time. Add in the drained mung bean noodles, mix to combine. Add the chicken stock and the remainder of the sauce mix and turn heat to high. Once the stock is bubbling, turn the heat off and allow the noodles to continue to absorb stock until no stock remains (approximately 5-7 minutes).
-
Step 6
Once all of the stock is absorbed, mix in half of the cooked shrimp and mushroom mixture.
-
Step 7
Transfer to a serving platter and top with remaining cooked shrimp and mushrooms, garnish with cilantro leaves, lime wedges, sambal oelek and fresh cracked black pepper. | https://thedakotatavern.com/recipes/vietnamese-glass-noodles-with-shrimp-and-mushrooms |
Yesterday, I reached North-Korea 600 days after I took the first steps in the Gobi Desert.
The last couple of kilometres I was followed by a TV crew and two photographers. It was, at times, a little hard taking in what was going on as they were taking pictures, asking me to stand here or there and so forth. The truth is that even if I had been there completely alone, it would have been hard to take in the moment.
The Great Wall at Hushan goes over a small mountain. Then it dives steeply down to the Yalu River. This river marks the border between China and North-Korea. The Great Wall was covered in snow and I was happy once again to be walking with the walking sticks. All the time, I was being photographed and filmed from various angles, high and low. A very strange experience after having walked alone in solitude for so long.
At the bottom of the small mountain, there was a large watchtower. We walked up it, and as I walked the last steps, I made a little video, and also took pictures of my feet where they rested on the watchtower. (Thanks for the tip Roxanne – I’ll post the picture later) At that point, I was about 100 metres from the North-Korean border. In the distance I could hear manly voices shouting something that seemed well coordinated and military. There were two North-Korean border guards walking on the other side of the river.
Luckily, I remembered to pick up a stone close to the watchtower. This is a tradition I have had on all my longer trips. I pick up a (small) stone at the beginning, and then another one right at the end of my journey. A good memory to have in years to come.
What did I feel at that moment? I was happy, relieved and grateful to have reached my goal. At the same time sad that this life of walking is over for now. These are however feelings I have had the last week or two, and there was no big difference at the end point. Sorry – I was not struck by any unique awe-inspiring thoughts… Hopefully they will come when I return to Norway!
I walked back along the river which was an interesting experience. The path could best be described as an obstacle course. A hanging bridge, several very steep steps, winding steps, 180 degree turns etc. At one point the steps were bolted fast to the mountain and the river was right beneath. At the closest, I reckon the North-Korean border on the other side of the river was only 10 metres away. I made a point of hiding my walking sticks. Didn’t want any rifle-like objects to get the attention from the other side.
I go to Beijing tomorrow, and get to spend one whole day there before heading back home to Norway. That might be when the emotions start hitting me.
Once again – many thanks for all your comments – they are much appreciated! I promise to keep on writing this blog for some time yet. Many of you have said you will miss reading the blog entries, and if so, you can imagine how much I will miss the exciting life I have lived here in China. At the same time, NOT living an exciting life seems alluring now.
22 kilometres yesterday
0 kilometres in a straight line to Hushan Great Wall close to Dandong. | http://thegreatwallker.com/2010/12/reaching-north-korea/ |
This commentary originally appeared on EDF’s Energy Exchange blog.
A glossary of energy and water terms
In recent posts I’ve discussed the need for energy and water planners to co-manage resources more comprehensively. But another significant barrier exists: language. Water and energy planners use different terminology and a lack of understanding for these distinctions hampers true coordination. Also, it prevents customers from understanding how to make sense of their own usage patterns and maximize energy and water efficiency.
Electricity measurements
Getting into the nuts and bolts — or watts and volts — of the issue can get very dry very quickly, so let’s go over some basic units of measurement to set the stage.
Electricity is measured in watts, usually represented as kilowatts (kW), megawatts (MW), but often discussed as megawatt-hours (MWh). One MW is roughly equivalent to ten running cars engines. A MWh is the total amount of electricity produced by a power plant in one hour, roughly the amount of energy used by 330 homes in one hour. According to the U.S. Energy Information Administration (EIA), in May 2013, Texas generated 12,261 gigawatt-hours (GWh) of electricity from coal-fired power plants (1 GWh = 1,000 MWh) and only 4,116 GWh from renewable energy sources, such as wind and solar. | https://blogs.edf.org/texascleanairmatters/page/2/?s=energy-water+nexus&searchsubmit=Search |
the assembly code.
Some manual touch up will be required before reassembly, but
nearly all the typing is done for you by ASMGEN and anything
questionable is marked with "??".
A file of sequential instructions may be resident on the
same diskette to indicat to ASMGEN which addresses contain
code, byted, words, or strings. This file may also include
instructions to assume segment register values or toggle the
output of assembley code text, generation of the reference
table, 8087 mnemonics, of the inclusion of embedded reference
information in the assembly file.
DEBUG may be used to browse through the executable file to
determine the starting locations of code and data to develop
the sequential instruction file. It is important to accu-
rately specify these locations for an accurate reference
tabel and minimum touching up of the ASM output text.
The number of references within the file determines the amount
of memory required since a reference tabel is built in
memory during the first pass. Disassembly is done from disk
and only one file sector is in memory at any given time.
Therefore memory size does not limit the size of the file
to be disassembled. 48K bytes of memory will be enough for
most programs but a few will need 64K or 128K. One diskette
drive is sufficient but two is more convenient.
* STARTING ASMGEN *
There are two ways to work with ASMGEN: either by using the
command menu or by calling ASMGEN with parameters.
Following are the descriptions of both options.
* USING THE ASMGEN MENU *
The program is invoked by typing: ASMGEN
You are then prompted for a file specification. Respond with
the name of the executable file from which you wish to
generate the assembly code. The executable file will normally
have an extension of .EXE or .COM. ASMGEN will check this
file spec for validity and then respond with a prompt that
includes a summary of the command letters indicating that
you may give it a command. The executable file contents
are not checked for valid code and ASMGEN will try to dis-
assemble text or compressed BASIC files and produce unintell-
igible assembly code.
The commands are:
X filespec This file spec replaces any previous executable
file spec. The usual file extension is .COM
or .EXE
EXAMPLE: X DATE.COM
A
bly code is routed to the specified file. The
usual file extension is .ASM. If the filespec is
omitted, the output will default to the console.
EXAMPLE: A DATE.ASM
R
The usual file extension is .TBL. If the filespec
is omitted, the output will default to the console.
EXAMPLE: R DATE.TBL
Q The program is terminated and control returned to
DOS.
Each time a command has been executed, ASMGEN waits with a one line
prompt for the next command.
X
The default filespec for each command is shown in brackets. Enter
the next command of your choice as described above.
* USING ASMGEN WITH PARAMETER CALLS *
Up to three file specifications may be included when ASMGEN is
first called from DOS. The executable file's name is given first,
followed by specifications for the assembly and reference table
files.
EXAMPLE: ASMGEN DATE.COM, DATE.ASM, DATE.TBL
If a semicolon follows the last filespec, ASMGEN will exit to DOS
when the command has been executed. If no semicolon is entered,
ASMGEN will display the menu options described above and wait for
further input after executing the command.
EXAMPLE: ASMGEN DATE.COM, DATE.ASM;
If the filespec for the .ASM file and/or .TBL file is omitted,
ASMGEN will generate first the .ASM file, then a .TBL file using
the filename of the first filespec.
EXAMPLE: ASMGEN DATE.COM,,; creates DATE.ASM and DATE.TBL and exits
to DOS.
If only the reference table is desired, the dummy name NUL should be
entered in place of an .ASM filespec
EXAMPLE: ASMGEN DATE.COM, NUL, DATE.TBL
If only one filespec is given when the program is called, the reference
table is built in memory and then the menu options are displayed for
further commands.
EXAMPLE: ASMGEN DATE.COM
* PROGRAM EXECUTION *
The disassembly is done in two passes through the scource file. On pass
#1, the reference table is built in memory and the actual output is gen-
erated during pass #2. Once the reference table is established, it remains
in memory until an X or Q command is issued, and subsequent A and R com-
mand executions skip pass #1. This saves a lot of time when the executable
file is large.
Three contiguous data areas are built dynamically in memory during pass #1.
First is the compressed sequential instruction list. Second is a list of
pointers for .EXE files that point to the locations of all relocatable
variables in the program, also arranged in numerical order. These are
established before reading any code. Third, the reference table is then
built in a higher area of memory as pass #1 progresses.
If all available memory in the program segment is filled before the first
two data areas are completed, ASMGEN will abort to the command prompt.
After the reference table is started, a shortage of memory will produce
the message "Reference Table Incomplete Due to Insufficient Memory" and
continue.
Ctrl-Break may be used at any time to interrupt a command in progress.
* READING THE ASSEMBLY CODE FILE (.ASM) *
This file begins with a title taken from the executable file's name and
date followed by the current date (in brackets).
If not inhibited by the M switch in a SEQ file (explained later), the macro
library will appear next in the file.
Next will be a .RADIX 16 pseudo-op which tells the macro assembler that all
numbers are in hexadecimal form.
Then comes a header that indicates a starting value for the code segment,
stack segment, instruction pointer and the stack pointer. The stack pointer
is usually set to FFFF for .COM files but may be somewhat less depending on
available memory. These values are passed by the linker for .EXE files.
The first ASSUME statement might come next. There is one generated for each
segment that begins with code. All segment registers are designated according
to the current set of ASSUMEs. They will sometimes be incorrect, so all
ASSUME statements should be checked prior to re-assembly.
The disassembled output follows, terminated by an END statement and the
execution address. An ORG psuedo-op is included if required.
The text is compatible with the IBM Macro Assembler and the format is the same
except for RETurns. To avoid the need for PROCedure titles, special mnemonics
are provided for all RET instructions. These are defined in the macro library
at the beginning of the file. Only macros that are needed for the current file
are produced. The optional embedded commands that make up the reference table
enhance the readability of the file. For very large files, this is sometimes
undesirable and a separate reference table is best.
When invalid instructions are encountered in code areas, they are reproduced
as byte values followed by "??". If a near jump is defined previously in the
code, and it is within range of a short jump, a NOP instruction is inserted
after the jump. The executable file created with this .ASM file and the
Macro Assembler and Linker will then be the same length as the original file.
This makes it less important to differentiate between labels and numeric
constants since the label values and their offsets within the file will be
the same. The fundamental problem of disassembly is in knowing if the
original assembly code defined a number as a label which changes as a function
of it's position or as a number that always remains the same. If you make
changes in the assembly code however, you must properly specify all values.
You might as well remove all NOPs at the same time.
Labels are five characters long and begin with "L". Segment labels begin with
"S". The remaining characters are the current instruction counter in hex
form, thus making each label unique and showing it's location in the original
file. The instruction counter is continuous throughout the assembly code
without resetting at segment boundaries. The segment labels are then in byte
as opposed to paragraph form. In those cases where a label value is modified
by an ASSUME statement, the original value is included as a comment in the
referencing instruction so that it may be easily changed back if it was not
intended as a location.
The word "Relocatable" is printed at the end of any line that contains an
ablolute paragraph value. These are values that DOS modifies after loading but
befor executing a program. They are used for loading segment registers that
are sensitive to the program location in menory. Relocatable values are not
modified by ASSUMEs. ASMGEN converts these numbers from paragraph to byte
values by multiplying them by sixteen so that they will fit within the 16-bit
instruction counter field. When the paragraph value is negative or exceeds
0FFFH, it is left unchanged and a warning (??) is issued on that line. When
a program larger than 64K bytes is being disassembled, it should be divided
into smaller files.
All words are produced as labels, except when the "L" switch has been enacted
in the .SEQ file (explained later). The label name indicates it's numeric
value and, if it does not occur on an instruction boundary, the name indicates
it's position relative to the current instruction pointer is given by an EQU
statement. Therefore the Macro Assember will assume that it is a location,
but it is easily changed to a constant since the value is given in the label
name. The word OFFSET precedes a label whenever it is questionable whether
it is a label or an immediate value. You must decide which of the labels
should be constants and which of the constants should be labels, and change
them accordingly. When changing labels to numbers, be sure to append an
"H" if the number ends with a "D" or a "B" since the Macro Assembler will
otherwise assume that it is decimal or binary.
Bytes are always treated as constants. An optional switch may be included in
the .SEQ file (explained later) which enables numbers instead of labels if all
references to the value are data segment and immediate operation types.
An effective procedure to follow in attempting to understand the assembly code
file is to look first for the message text area, the input commands, and the
simpler subroutines. Then add label names to addresses in the .SEQ file
(explained later) that remind the you of their purpose. Add comments to the
labels. If these names are well chosen, the larger routines eventually will
become clear. The embedded references are produced as labels so they will
retain their meanings as they are changed.
It is also helpful to spend some time studying the structure of data areas.
Vector tables, which are frequently used to control the program's flow, reveal
the program's structure very quickly. If some routines do not have labels at
the beginning, it is usually because the code or tables that reference them
(or the segment register assumptions) are not properly defined in the .SEQ
file.
* READING THE REFERENCE TABLE (.TBL) *
A referencee is defined as a number that is referenced somewhere in the
program. It may be a program loaction or a numeric constant.
A referencor is is defined as the address in the program from which a refer-
ence is made to the referencee.
Each entry is composed of a referencEE followed by a list of referencors. If
more than one line is needed, additional lines are indented to the first
referencor position. The referencEE is followed by an "S" if it includes
references to the beginning of segment. The referencor is followed by two
letters, the first of which represents the segment register that is implied
or prefixed in the referencing instruction. The second letter indicates the
type of operation on the referencEE. When the reference entries are embedded
in the assembly code, all values are preceded with the letter "L".
----------------------------------------------------------------------------
1st letter | 2nd letter
SEG REGISTER | TYPE OF OPERATION
----------------------------------------------------------------------------
C code | J jump M modify - INC, ADD, etc.
S stack | C call I immediate - value or offset
D data | R read T test or compare
E extra | W write ? unknown or ESC instruction
| P port
----------------|-----------------------------------------------------------
* WRITING/READING THE SEQUENTIAL INSTRUCTION FILE (.SEQ) *
The sequential instruction file is a list of special instructions to ASMGEN
which the user creates. The file takes the form of a list of hexadecimal
addresses and single-letter instructions or generation switches. If used,
the .SEQ file must be on the same diskette as the source file and have the
same name as the source file with an extension of .SEQ. Each instruction in
the file must be in one of the following formats:
addr command
or
addr command ;comment
or
addr command label comment
or
addr command label comment ;comment
"addr" represents the instruction pointer value. All addr values must be in
numerical sequence in the file.
"command" may be either a toggle switch or a generation instruction.
"label" is optional and replaces the label generated for this address with
this non-blank string.
"comment" is optional and must be preceded by "label" unless the dummy label
"." is used. Everything following "label" is treated as an address comment
and will be printed in the ASM file behind the generated instruction. The
address comment may be up to 255 characters in length and should not contain
a semi-colon.
";comment" is optional. Anything following a semi-colon in the .SEQ file
instructions is considered as a comment in the .SEQ file only and is not added
to the generated .ASM file.
"label" and "comment" are not allowed when a generation switch is coded, but
a ";comment" may be used to help clarify the .SEQ file.
The .SEQ file is read into memory before the first pass starts. The addresses
and commands will be compressed, but "label" and "comment" will be held in
memory one to one. An effect of this is that memory space required for dis-
assembly increases with each "label" and "comment" added to the .SEQ file.
* DESCRIPTION OF GENERATION SWITCHES *
THE VARIOUS TOGGLE SWITCHES ARE SET TO ON BY DEFAULT. Switches may be toggled
on and off at any point in the .SEQ file/disassembly.
All options switches except /M and /H can be either toggled or directly set by
the user. A suffix of "+" turns the switch ON, and a suffix of "-" turns the
switch OFF. Switches encountered in the file that have neither of these
suffixes are toggled to the opposite of their state at the time; ON switches
are turned OFF and OFF switches are turned ON.
/B - generate byte references
When ON, byte and word references are included in the reference table. When
OFF, only word references are generated.
/E - embedded references in ASM file
When ON, reference table entries are inserted in the text just before the
referencee's definition statement. When OFF, these entries are not included
with the disassembled text. The entire reference table can be printed with
the "R" command.
/F - 8087 mnemonics
When ON, ESC instructions are produced. When OFF, ESC instructions are assumed
to be 8087 instructions and 8087 mnemonics are produced.
/H - append hex "H"
When this switch appears at any point in the .SEQ file, an "H" is appended to
all hex numbers. This does not, of course, apply to the labels which are
hex values preceded by the letter "L". The .RADIX 16 pseudo-op is omitted
which allows the assembler's radix to default to decimal. This switch defaults
to NO H APPEND. Note that it will be set only once. It retains it's value
until the next .SEQ file is read.
/L - generate label or number
When ON, all word references are treated as labels. When OFF, a word reference
is treated as a constant if all referencors are data immediate types.
/M - suppress macro library
When this switch appears at any point in the .SEQ file, no macro library is
included in the text output. The DEFAULT IS THAT THE MACRO LIBRARY WILL BE
INCLUDED. Note that this switch will be set only once. It retains it's
value until the next .SEQ file is read.
/O - control ASM output
When ON, ASMGEN will output the generated text. When OFF, output will be
suppressed.
/R - control TBL output
When ON, ASMGEN will output the generated reference data. When OFF, the
reference table is not printed.
/T - control trace output
When ON, up to 16 bytes of object code are included as comments in each line
of the assembly code file. When OFF, object code is not included.
* DESCRIPTION OF .SEQ FILE COMMANDS *
A - assume
The following lines contain ASSUMptions for segment register values. They
become effective at the address specified by this instruction and may be
modified anywhere in the disassembly. The required format for assumptions is:
& 0400 DS
The ampersand indicates a continuation of the A instruction.
In this example, a data segment beginning at a instruction pointer value of
400 will be assumed until another A instruction changes it. CS, ES, and
SS are also supported. The segment assumptions are used for effective address
calculations only. The code segment assumption does not affect the instruction
pointer value.
B - bytes
The bytes encountered in the source file are assumed to have meaning as single
byte values.
C - code
The bytes encountered in the source file are assumed to be valid 8088 machine
language instructions.
D - generate data operand
The operand of the instructions is changed to immediate data. Subsequent bytes
are interpreted as "C" (code follows).
I - initial value for IP
The hexadecimal value on this line overrides the instruction pointer value at
the beginning of the file - not to be confused with the address at which
execution begins. The default values are 0000 for EXE files and 0100H for COM
and other files. The execution address following the END statement is omitted
if this option is invoked.
S - strings
The bytes encountered in the source file are assumed to form text. Quoted text
is produced for valid ASCII characters and byte values for others.
# - defined length strings
The first byte encountered in the source file contains the length of the
character string which begins with the next encountered character. This length
value may be overridden by a subsequent SEQ file instruction.
$ - defined length strings
The first byte encountered in the source file contains the length of the
character string which begins with the next encountered character plus the
length byte itself. This length value may be overridden by a subsequent SEQ
file instruction.
W - words
Pairs of bytes encountered in the source file are assumed to have meaning
as word values.
X - repeating data structure
A cyclic data structure is assumed to begin at the specified instruction
pointer value. The structure definition may follow and is prefixed by
an ampersand (&) to indicate the continuation of this instruction. If the
definition does not follow, then the most recent definition is used. If no
structure is yet defined, then an error message is displayed.
The following elements may be used to define the structure:
& NNNN S - The next NNNN bytes are defined as string characters
& NNNN B - The next NNNN bytes are defined as byte values
& NNNN W - The next NNNN bytes are defined as word values
& XXNN $ - The next sequence of bytes is defined as NN fields. Each field
consists of a length byte and a string of characters. The length
of each field is contained in the first encountered byte. The
high nibble (XX), if non-zero, is a bit mask of the length field
within the byte. The length field is right-justified within the
byte after the byte value is sent to the output file.
* EXAMPLES OF .SEQ COMMANDS *
This example .SEQ file shows all the possible instructions in the appropriate
format.
;All switches are on at the beginning.
0 /T ;no object code as comments in output
0 /M ;no macro library in output
0 /H ;append "H" to all numbers
00H /A ;assume the following segment values
;Note that the ampersand (&) indicates the extended ASSUME
& 380 DS ;the data segment starts at 380 hex
& 380 ES ;the extra segment starts at 380 hex
0200 I ;initialize the instruction pointer to 200
0200 /F ;introduce 8087 mnemonics (not ESC)
0200 /E ;no embedded references
0200 C ;code begins at 200
0203H W ;words are at 203
0207 C ;more code starting here
220 X ;complex data structure begins here
& 3 W ;words
& 1 B ;byte
& 0E02 $ ;2 strings starting with the 2nd byte follow
;bits 3,2,1 of the first byte contain the length of the
;string including the length byte.
;the high nibble (0E) is the mask.
;see also # in summary below
& 1 B ;byte
;the structure repeats until 351
351 B ;bytes
358 C ;more code
380 S ;strings - list of messages
421 W ;words
4FD /B ;no further byte references
502 /R ;garbage here - turn off reference generation
502 /O ;and output
600H /O+ ;valid code - turn output back on
600 /R
600 C
1A60 /O- ;output file about to fill diskette - turn output off but keep
;scanning for references.
;another run will be needed to get the remaining code.
1B00 /D ;treat operand as immediate data
1DFD /B+ ;continue with byte references
1F45 W user_prt ;user provided labels will translate
2256 S $MSG ;to upper case
Comments may be included if preceded by a semicolon.
Alphabetic characters may be either upper or lower case.
An "H" may follow the hex address.
* SAMPLE SESSION *
The external command CHKDSK.COM will serve as an example for this sample
session because it is short. The .SEQ file is also short and easy to generate.
Only these few instructions are needed.
0100 /T ;include object code as comments in .ASM file
0100 /E ;simpler output without references
04F7H S ;messages
04F7H /H ;append "H" to numeric values
Using DEBUG, browse through CHKDSK.COM to see how this was arrived at.
Usually, but not always, the best procedure is to assume code. If the code
appears unintelligible, display it in hex/ASCII. If it is not text, assume
bytes. Label positions in the first disassembly may indicate that some
locations should be words. Next, generate the .ASM file by typing
ASMGEN CHKDSK.COM
A
The assembly code can be viewed on the screen. Then type
A CHKDSK.ASM
to save the assembly source code to a file. Then,
R CHKDSK.TBL
to save the cross-reference table to disk.
The Macro Assembler, Link.exe and Exe2bin could now be used to assemble
CHKDSK.ASM, link it to .EXE and convert it to a .COM file. No modification
should be necessary in this case.
If working with code that is to be modified, the symbol types must be correctly
specified as locations or as constants. If they are constants, place them
outside of any segment. The label names may then be changed to make the code
more readable. | https://www.pcorner.com/list/ASSEMBLY/ASMTUT.ZIP/INFO/ |
Q:
Calculate percentage of used fields(columns) in MySQL
I would like to know if there is any query to calculate the count of used fields(columns) in a table for every row(record).
I want to update my table new field called percentage usage by calculating
(total number of used columns) / (total number columns) * 100
for all records.
Any suggestion is appreciated. Thanks
For example:
I have a table named leads:
Name Age Designation Address
Jack 25 programmer chennai
Ram 30 ----------- ----------
Rob 35 Analyst ----------
I have added a new column called usagepercent and I want to update the new field as
Name Age Designation Address usagepercent
Jack 25 programmer chennai 100
Ram 30 ----------- ---------- 50
Rob 35 Analyst ---------- 75
------- indicates empty
A:
Something like this should work (if the default/empty/unused value of the fields is Null):
SET @percValue=25;
UPDATE
leads
SET
usagePercent =
IF(Name IS NOT NULL, @percValue, 0) +
IF(Age IS NOT NULL, @percValue, 0) +
IF(Designation IS NOT NULL, @percValue, 0) +
IF(Address IS NOT NULL, @percValue, 0);
You'll have to change percValue according to the number of columns you have.
Edit: Adapted solution of RSGanesh:
IF(Name IS NOT NULL, 1, 0) +
IF(Age IS NOT NULL, 1, 0) +
IF(Designation IS NOT NULL, 1, 0) +
IF(Address IS NOT NULL, 1, 0)
) / 4 * 100;
| |
Property addresses are listed in this system exactly as they appear on the City’s assessment records. For example, you may know your property as “125 North Lincoln Street” but the official address may actually be “123 to 127 Lincoln St N.” Note that the house or building number may not be exactly as you know it, and the adjectives north, south, east and west are at the end of the address. Try searching just by the street name: in this example you’d enter “Lincoln” and select from the choices listed.
Some service requests, complaints, or permits pertain to locations in the public right-of-way, and not to private property. Area-based activities apply to such locations as traffic signs, utility poles, roads, sidewalks, and other areas of the public right-of-way. To identify the location of an Area based request, you select from a list of street names and intersections and click on the one that best describes the location of the activity. If you don’t see the exact location of your concern, select a location close to it, and you can further describe the location in your description of the complaint.
The soonest your service request will appear is the next business day. If a similar service request has been entered for a property, subsequent requests may not appear individually. Also, only a limited amount of historic data is available online, so if you made a service request via telephone or some other method before the introduction of this web-based service, you are not likely to see it posted online.
Your request will be reviewed within 24 hours. Response times will vary greatly, depending on the nature of your request, the severity of the problem, staff resources and other factors.
To file a service request or complaint via the internet we require your name and email address so we can reach you with any questions we may have, and to provide you with a response to your request. If you wish to file your request anonymously, please call City Line at 315-448-CITY (2489). Please note that your contact information will remain confidential.
The “Lookup” function is used to search for a particular parcel (property) or location.
Use this Lookup to find a property. You can search by the address, the property owner, or the SBL number.
By Address – Property addresses are listed in this system exactly as they appear on the City’s assessment records. For example, you may know your property as “125 North Lincoln Street” but the official address may actually be “123 to 127 Lincoln St N.” Note that the house or building number may not be exactly as you know it, and the adjectives north, south, east and west are at the end of the address. Try searching just by the street name: in this example you’d enter “Lincoln” and select from the choices listed.
By Owner/Business – Use this lookup if you know the name of the property owner (the person or entity’s name). The name you enter must match exactly as the name appears on the City’s assessment records, so it may be helpful to enter less information, and choose the name from the search results.
By SBL – Use this lookup if you know the property’s unique Section Block and Lot number, which is how parcels are identified in the City’s assessment records. The SBL you enter must match exactly the SBL in the City’s assessment records. If you don’t know your property’s SBL, you can find it in the city’s assessment records at: http://ocfintax.ongov.net/imateSyr/search.aspx.
Use this Lookup for locations that are not associated with a specific property address, i.e., not on private property. Examples are streets, traffic signs, utility poles, roads, sidewalks, and other areas of the public right-of-way.
By Location – Enter the street name or closest intersection. Once you type a few letters, a list of possible street names and intersections appear. Keep typing or scroll until you see your location, and click on it to select it. If you don’t see the exact location of your concern, select a location close to it, and you can further describe the location in your description of the complaint.
When you know the transaction number assigned to a particular request or complaint, this function allows you to quickly access the status. To identify the type of transaction you want to view, select from Complaint/Service Request, Permit, or Permit Application. Click on “View” to see more information about a particular transaction.
To enter a property based request you first need to identify the property. This is done exactly the same as the lookup function; please refer to the instructions for Look up Parcel or Location.
Once you have entered a valid address, click on the button for “File Complaint/Service Request.” The property address will appear in the upper left corner of the screen (below the Mayor’s photo).
Select the “Type” of service request you wish to file from the drop down list.
Enter your “Contact Information.” First name, last name, and email address are required so we can contact you about your request. Address and telephone number are optional.
Please note that your contact information will remain confidential and it is requested for the purposes of follow up only.
“Attachments” allow you to upload up to three photos, images, or other documents to help explain your request.
To enter an area based request you first need to identify the location.
Once you have entered a valid location, click on the button for “File Complaint/Service Request.” The location will appear in the upper left corner of the screen (below the Mayor’s photo).
After selecting the type, “Specify Location” by further describing the location requiring service.
· Enter either the house or building number (or numbers) the location is near, or enter the nearest intersection(s). You can’t enter both.
· “Area Description” lets you add more detail about the location of your service request.
· First name, last name, and email address are required so we can contact you about your request.
· Address and telephone number are optional.
When you’ve selected the property or location, you can view the activity associated with that property or location by selecting “View” on the right.
You can select to see activity that is still being worked on (check “open”) or already resolved (check “closed”) or both.
You can also select a date range to limit the search results to a specific time period.
Transaction # – each transaction is assigned a number. If you make note of this number, you can search by it.
View – Click on “view” to see additional information about the request, such as actions taken, inspections and results. If a violation exists, each is listed with the violation date, the “comply by” date, and the status.
For additional information on permits issued by Code Enforcement, please contact the Permit Desk. For permits issued by the Department of Public Works, please contact the Permit Consultation Office. | http://www.syracuse.ny.us/ips_FAQ.aspx |
All withdrawal transactions on all accounts require two (2) signatures.
At the end of each fiscal year any surplus expense budget (other than H & G) not spent that year will be transferred to the Operating Reserve until it reaches 25% of the annual income.
Any accounts (bank, investment, etc....) EBHC chooses to deposit money in to must be FDIC insured for at least a $100,000.
EBHC may invest no more than 15% of its cash assets in a variable rate investment balanced fund with an A rating or better, and which has no more than 50% of its holdings in the stock market.
Any funds in the excess of a $1,000 that will not need to be accessed for 61 days or more may be invested in a 60 day or less CD at the same institution that the funds are currently held in. The purpose being to earn a higher rate of return as well as ensure that at maturity of the CD the money can be placed back in its original account.
Any funds in the excess of a $1,000 that will not need to be accessed for 91 days or more may be invested in a 90 day or less CD at the same institution that the funds are currently held in. The purpose being to earn a higher rate of return as well as ensure that at maturity of the CD the money can be placed back in its original account.
Any funds in the excess of a $1,000 that will not need to be accessed for 6 months and 1 day or more may be invested in a 6 month or less CD at the same institution that the funds are currently held in. The purpose being to earn a higher rate of return as well as ensure that at maturity of the CD the money can be placed back in its original account. | http://www.eastblairhousingcooperative.com/Home/handbook/financial-information/financial-policies |
CROSS REFERENCE TO RELATED APPLICATIONS
TECHNICAL FIELD
This application claims the priority benefit of Japanese Patent Application No. 2018-131785, filed on Jul. 11, 2018. The entirety of the above-mentioned patent application is hereby incorporated by reference herein and made a part of this specification.
The present disclosure relates to a color measurement method, a color adjustment method, and a printing system.
DESCRIPTION OF THE BACKGROUND ART
Conventionally, as a method of evaluating the print result by an inkjet printer, a method of evaluating using a color measuring instrument (color measuring machine) is known (see, e.g., Japanese Unexamined Patent Publication No. 2009-178979, Patent Literature 1). Consideration is made to use the color measuring instrument, for example, when performing color adjustment (color calibration) of matching the color in the print result to a desired color. Furthermore, in recent years, the same image may be required to be printed with a plurality of inkjet printers due to the wider range of intended purpose of the inkjet printers. Then, in this case, for example, color matching (equalization) may be performed in advance, for example, in order to unify the print quality in each inkjet printer. Furthermore, in this case, the color adjustment is performed by printing a predetermined color chart or the like with each inkjet printer, and measuring the color of the print result with a color measuring instrument.
Patent Literature 1: Japanese Unexamined Patent Publication No. 2009-178979
SUMMARY
When color adjustment is performed on an inkjet printer, a spectral color measuring instrument (spectral chromatometer) is conventionally used as a color measuring instrument. For example, color can be appropriately measured with high accuracy by using the spectral color measuring instrument. However, since the spectral color measuring instrument has a configuration that uses a complex optical system and an expensive sensor, the cost of the apparatus used at the time of measurement will be greatly increased. Furthermore, when color matching of a plurality of inkjet printers is performed, it may be necessary to perform color matching on a plurality of inkjet printers located at physically separated positions. In this case, it is necessary to prepare a spectral color measuring instrument at least for each place where the inkjet printer is installed, which further increases the cost of the apparatus. Furthermore, depending on the intended purpose of the inkjet printer, it may be preferable to provide a color measuring instrument individually for each inkjet printer. In such a case, if a spectral color measuring instrument is used as a color measuring instrument, the cost of the apparatus will increase significantly.
Therefore, conventionally, it has been desired to more appropriately measure the color printed by a printing apparatus such as an inkjet printer. The present disclosure provides a color measurement method, a color adjustment method, and a printing system capable of solving the problems described above.
The inventors of the present application considered using a device other than a spectral color measuring instrument (e.g., a more inexpensive device) as a color measuring instrument to be used for color measurement on a print result. Specifically, the inventors considered using a densitometer, a colorimeter, and the like for such a device. The inventors then found that among these apparatuses, it is possible to use a colorimeter for color measurement on a print result in terms of measurement accuracy and the like. However, the colorimeter usually has many variations in characteristics. Therefore, for example, if a plurality of colorimeters are used when performing color matching of a plurality of inkjet printers, color matching with high accuracy may become difficult to perform due to the influence of variations in the characteristics of the colorimeters.
On the other hand, the inventors of the present application initially considered correcting the output value of the colorimeter using a correction table created according to the characteristics of each colorimeter. In this case, as the correction table, for example, a table in which the correction amount is associated with each position in a color space in a Lab color system is used. However, in order to create such a correction table, it is usually necessary to perform a measurement that requires a lot of time for each colorimeter. Furthermore, the file (file of electronic data) indicating such a correction table is a file of a large capacity of about several MB or more (e.g., 10 MB or more). In this case, if individual correction table is prepared for each colorimeter, a large storage capacity is required to store all the correction tables. Moreover, the correction table may be stored, for example, in a storage incorporated in a member (e.g., color calibrator) used to adjust the color of the printing apparatus. In this case, a storage with a large capacity is required, which causes a significant increase in cost.
On the other hand, the inventors of the present application conducted an intensive research, and considered not preparing an individual correction table for each colorimeter but preparing a common correction table for a plurality of colorimeters, and then preparing a correction factor to use for the adjustment of the correction amount in the correction table for each colorimeter. When configured in this way, for example, data with a much smaller amount of data than the correction table can be used as the correction factor. Therefore, if configured in this way, for example, the amount of data of parameters used to correct the output value of the colorimeter can be significantly reduced. Furthermore, such a correction factor can be easily stored in a storage with a small capacity, if necessary. Moreover, such a correction factor can usually be created with less man-hours than at the time of creating the correction table. Furthermore, the inventors of the present application actually conducted experiments and the like, and confirmed that the influence of variation in the characteristic of the colorimeter can be appropriately suppressed by the configuration described above. The inventors of the present application found, through further intensive research, the features necessary for obtaining such effects and contrived the present disclosure.
In order to solve the above problems, the present disclosure provides a color measurement method for measuring a color printed by a printing apparatus, the color measurement method including a color measuring step of measuring the color printed by the printing apparatus with a colorimeter; and a correcting step of correcting an output value output by the colorimeter in the color measuring step, in which in the correcting step, the output value is corrected using a correction table in which a correction amount is associated with each position of a color space in an Lab color system, the correction table being prepared in advance for a plurality of colorimeters, and a correction factor used to adjust the correction amount in the correction table, the correction factor being individually prepared with respect to the colorimeter used in the color measuring step.
With such a configuration, for example, the influence of the variation in the characteristic of a colorimeter can be appropriately suppressed. Furthermore, in this case, for example, the data amount of parameters used for correcting the output value of the colorimeter can be significantly and appropriately reduced. Moreover, for example, the measurement of the color printed by printing apparatus such as an inkjet printer thus can be more appropriately performed.
Here, in this configuration, the color to be printed refers to, for example, the color to be represented in a printed matter printed on the medium to be printed. Furthermore, the operation of the correcting step can be considered to be performed, for example, after the operation of the color measuring step. In this case, in the color measuring step, for example, the output value of the colorimeter is acquired without performing the correction using the correction table and the correction factor. The operation of the correcting step may be performed simultaneously with the operation of the color measuring step. In this case, in the color measuring step, for example, an output value after the correction using the correction table and the correction factor is acquired. Moreover, it is conceivable to use an XYZ sensor as a colorimeter. In this case, for example, a known XYZ sensor or the like can be suitably used. According to such configuration, for example, the measurement by the colorimeter can be appropriately carried out.
Furthermore, in the color measuring step, the colorimeter outputs, as an output value, for example, a value associated with the color in the Lab color system. Moreover, in this configuration, each of the plurality of colorimeters targeted by the correction table is associated with, for example, different printing apparatuses. In this case, each colorimeter is used, for example, when measuring the color printed by the corresponding printing apparatus. With this configuration, for example, color matching and the like with respect to a plurality of printing apparatuses can be appropriately performed using a colorimeter.
Furthermore, as the correction factor, for example, it is conceivable to divide the color space in the Lab color system into a plurality of regions and use the factor set for each region. In this case, as the correction factor corresponding to the respective regions, for example, a factor for L value, a factor for a value, and a factor for b value are set. According to this configuration, for example, the correction of the output value according to the characteristic of each colorimeter can be appropriately performed using the correction factor having a small data amount. In this case, it is conceivable to divide the color space in the Lab color system into, for example, a red region, a blue region, a green region, and other regions.
Furthermore, in this configuration, in the correcting step, a correction table file, which is a file indicating the correction table, and a correction factor file, which is a file indicating the correction factor, are used. In this case, the file is a file of electronic data. In this case, a capacity of the correction factor file corresponding to one of the colorimeters is, for example, less than or equal to 1/1000 of a capacity of the correction table file. Furthermore, a capacity of the correction factor file corresponding to one of the colorimeters is more preferably less than or equal to 1/10000 of a capacity of the correction table file.
Moreover, in this configuration, it is conceivable that, in the color measuring step, color measurement is performed using, for example, a color calibrator including a colorimeter and a storage. In this case, it is conceivable to store the correction factors corresponding to the respective colorimeters in the storage in the color calibrator including the relevant colorimeter. As such a storage, for example, it is conceivable to use a storage that has a storage capacity for storing the correction factor but insufficient to store the correction table. In this case, in the correcting step, for example, the output value output by the colorimeter is corrected using the correction factor stored in the storage in the color calibrator and the correction table stored in any device exterior to the color calibrator. With this configuration, for example, even when a color calibrator including only a storage with a small storage capacity is used, information unique to each colorimeter can be appropriately stored in each color calibrator. Thus, the correction of the output value with respect to the respective colorimeters can be more easily and more appropriately carried out.
In this configuration, as the correction table, for example, it is conceivable to use a table created based on a difference between a result of measuring a predetermined color with a first colorimeter, and a result of measuring the predetermined color with a second colorimeter different from the first colorimeter. Furthermore, in this case, the plurality of colorimeters targeted by the correction table are three or more colorimeters including the first colorimeter and the second colorimeter. Then, when creating the correction table, for example, a range of variation of the output values of the plurality of colorimeters is confirmed, and a colorimeter whose output value is closest to a center of the range of variation is used as the first colorimeter. In addition, a colorimeter in which the characteristic of the output value is farthest from the first colorimeter is used as the second colorimeter. According to such a configuration, for example, a correction table commonly used for a plurality of colorimeters can be appropriately created.
Furthermore, as a configuration of the present disclosure, it is also conceivable to use a color adjustment method, a printing system, and the like having the features corresponding to the above. In this case as well, for example, effects similar to the above can be obtained.
According to the present disclosure, for example, the color printed by the printing apparatus can be more appropriately measured.
BRIEF DESCRIPTION OF THE DRAWINGS
FIGS. 1A and 1B
FIG. 1A
FIG. 1B
10
10
106
10
are views showing an example of a printing system according to one embodiment of the present disclosure. shows an example of a configuration of the printing system . shows an example of a configuration of a main part of a color measurement device used in the printing system .
FIGS. 2A and 2B
FIG. 2A
FIG. 2B
204
are views describing a correcting operation performed on an output value of an XYZ sensor . shows the correcting operation performed in the present example. shows an example of a way of setting a correction factor.
FIG. 3
is a view describing the effect of the correction performed in the present example.
FIG. 4
is a view describing the effect of the correction performed in the present example.
DESCRIPTION OF EMBODIMENTS
FIGS. 1A and 1B
FIG. 1A
FIG. 1B
10
10
106
10
10
10
12
12
12
102
104
106
Hereinafter, an embodiment according to the present disclosure will be described with reference to the drawings. show an example of a printing system according to one embodiment of the present disclosure. shows an example of a configuration of the printing system . shows an example of a configuration of a main part (main components) of a color measurement device used in the printing system . The printing system is a printing system that performs printing by a plurality of printing apparatuses, and executes equalization of performing color matching on a plurality of printing apparatuses as needed. Furthermore, in the present example, the printing system includes a plurality of printing units . In this case, the printing unit has, for example, a configuration of executing printing using one or more printing apparatuses. Each printing unit also includes a printing apparatus , a control PC , and a color measurement device .
102
12
102
12
102
12
102
102
102
The printing apparatus is an inkjet printer that executes a printing operation in each printing unit . The printing apparatus executes the printing operation on a medium (media) to be printed using the inkjet head that ejects ink droplets through an inkjet method. More specifically, in the present example, the printing unit includes a plurality of inkjet heads that respectively eject ink droplets of different colors, and performs color printing (e.g., full color printing). Furthermore, as each of the plurality of inkjet heads, at least an inkjet head for each color of cyan (C), magenta (M), yellow (Y), and black (K) is provided. According to this configuration, for example, the color printing by the subtractive color mixing method can be appropriately performed. Moreover, in the present example, the printing apparatus in each of the printing units is an example of a printing portion that ejects ink droplets. For example, a known inkjet printer can be suitably used as the printing apparatus . In this case, using a known inkjet printer as the printing apparatus may be, for example, using a known inkjet printer as a main body part that constitutes the main part of the printing apparatus .
104
102
104
102
102
102
104
102
104
102
104
12
The control PC is a computer (host PC) that controls the printing operation by the printing apparatus . The control PC generates data for controlling the operation of the printing apparatus based on, for example, image data indicating an image to be printed by the printing apparatus , and provides the data to the printing apparatus . The control PC thereby controls the printing operation by the printing apparatus . More specifically, it is conceivable that the control PC performs, for example, the RIP process and the like based on image data and supplies a raster image generated by such process to the printing apparatus . Furthermore, in the present example, the control PC in each printing unit is an example of a controller that controls the operation of the printing portion.
10
104
102
102
104
104
102
Furthermore, as described above, in the printing system of the present example, equalization is performed as needed. Then, in this case, the control PC controls the operation of the printing apparatus based on the setting reflecting the result of the equalization. More specifically, in this case, for example, it is conceivable to perform a process reflecting the result of the equalization and the like in the RIP process. As another method, for example, it may be considered to individually adjust the volume of ink droplets ejected by the inkjet head for each color. Furthermore, depending on the configuration of the printing apparatus , for example, consideration may be made to execute a printing operation reflecting the result of equalization irrespective of the control of the control PC . In this case, the control PC may control the operation of the printing apparatus without taking the result of equalization into consideration.
106
106
102
106
202
204
206
208
210
FIG. 1B
The color measurement device is a color calibrator (CCS) used at the time of executing the equalization. The color measurement device can also be considered as, for example, a sensor unit for color measurement used for color matching of the printing apparatus . Furthermore, in the present example, as shown in , the color measurement device includes a microcomputer , an XYZ sensor , a front end IC , a light source portion , and a storage . Each of these configurations is mounted on, for example, a plurality of substrates (not shown).
202
106
106
106
202
202
Among these configurations, the microcomputer is a controller (microcontroller) for controlling the operation of the color measurement device , and is mounted on a main substrate in the color measurement device to control the operation of each configuration of the color measurement device . As the microcomputer , for example, a known 16-bit microcomputer and the like can be suitably used. More specifically, in the present example, for example, a 16-bit flash microcontroller including a dual partition flash memory is used as the microcomputer .
204
106
204
102
204
106
The XYZ sensor is a sensor that executes color detection in the color measurement device , and is mounted on a substrate (sensor substrate) for a sensor different from the main substrate. Furthermore, in the present example, the XYZ sensor is an example of a colorimeter, and is used when measuring the color printed by the printing apparatus . In this case, the color printed by the printing apparatus is, for example, the color to be represented in a printed matter printed on the medium. The XYZ sensor can also be considered as, for example, a color measuring instrument or the like that measures color in the color measurement device .
204
204
Furthermore, in the present example, a sensor that detects each stimulus value of X, Y, and Z in the XYZ color system is used as the XYZ sensor . In this case, the XYZ color system is, for example, a color system based on CIE 1931 or a color system based on DIN 5033. Moreover, detecting each stimulus value of X, Y, Z means, for example, measuring a color using a tristimulus function method based on CIE 1931 or DIN 5033. For example, XYZ values can be obtained directly by using such XYZ sensor. Furthermore, for example, a corresponding Lab values can be ultimately calculated based on the acquired XYZ values. In this case, Lab values are L values (L * values), a values (a * values), and b values (b * values) that represent colors in the Lab color system (Lab color space). Furthermore, for example, a known XYZ sensor can be suitably used as such XYZ sensor .
204
102
12
204
12
10
102
204
102
Furthermore, in the present example, the XYZ sensor is used at the time of measurement (color measurement) of the color printed by the printing apparatus in the same printing unit . Therefore, for example, the plurality of XYZ sensors used in the plurality of printing units in the printing system can be assumed to be associated with different printing apparatuses . In addition, each of the XYZ sensors can be considered to be used, for example, when measuring the color printed by the corresponding printing apparatus .
206
204
202
204
206
204
202
The front end IC is an IC used to transmit the output of the XYZ sensor to the microcomputer . For example, it is mounted on the sensor substrate together with the XYZ sensor . Furthermore, in the present example, the front end IC is a multi-channel programmable gain transimpedance amplifier provided with an AD converter, and converts the output that the XYZ sensor outputs as an analog signal into a digital signal, and provides the digital signal to the microcomputer .
208
204
208
202
The light source portion is a configuration that irradiates light to a measuring position at the time the color is measured by the XYZ sensor . In the present example, the light source portion includes, for example, an LED for illumination that generates white light and an LED driver. A known LED for illumination and LED driver can be suitably used as the LED for illumination and the LED driver. More specifically, it is conceivable to use, for example, a white LED having a spectral distribution characteristic close to a sunlight of 5000K as the LED for illumination. Furthermore, for example, it is conceivable to use a 3-ch output LED driver/controller or the like as the LED driver. Moreover, for example, it is conceivable to mount the LED driver on the main substrate together with the microcomputer .
210
106
210
210
204
The storage has a configuration of storing various parameters and the like related to the color measurement device . For example, an EEPROM can be suitably used as the storage . Furthermore, in the present example, the storage stores a correction factor set in advance in association with the XYZ sensor . The correction factor will be described in more detail later.
106
102
104
106
102
106
102
106
102
106
104
106
106
104
106
106
204
Furthermore, in the present example, the color measurement device can be connected to the printing apparatus and the control PC . In this case, the color measurement device can be used integrally with the printing apparatus by connecting the color measurement device and the printing apparatus . Moreover, in this case, the color measurement device is connected to the printing apparatus by a cable, for example, by I2C communication. The color measurement device is connected to the control PC through, for example, a USB terminal and a USB cable. In this case, for example, the color measurement device can be used stand-alone by connecting the color measurement device and the control PC . In addition, the color measurement device may further have a configuration other than the above. More specifically, the color measurement device may further include, for example, a shutter for preventing mist from entering the XYZ sensor , a thermistor for monitoring the temperature of the white LED, and the like.
12
102
204
106
102
12
102
According to the present example, for example, in each of the printing units , measurement of the color printed by the printing apparatus (measurement by the XYZ sensor ) can be appropriately performed using the color measurement device . Furthermore, for example, color adjustment (color calibration) or the like for matching the color in the print result to a desired color can thereby be appropriately performed. Moreover, equalization can be appropriately executed by performing color adjustment in accordance with a common reference on the printing apparatus in each printing unit . This allows the print quality by the plurality of printing apparatuses to be appropriately unified.
106
204
204
106
Furthermore, as described above, in the color measurement device of the present example, the color measurement is performed using the XYZ sensor . A known XYZ sensor can be used as the XYZ sensor . In this case, since the optical system has a simple configuration, the XYZ sensor can usually be obtained inexpensively. Therefore, according to the present example, for example, equalization and the like can be appropriately executed using a low-cost color measurement device .
Here, conventionally, it was common to use a spectral color measuring instrument (spectral chromatometer) as a color measuring instrument to be used when performing equalization and the like. In this case, the spectral color measuring instrument is a device that acquires spectral values of colors using a spectrometer and a sensor array. The spectral color measuring instrument can be considered, for example, as a device that measures the relationship between the wavelength of light and the intensity (spectral spectrum). Moreover, when measuring a color using a spectral color measuring instrument, for example, XYZ values can be calculated from the spectral values. Furthermore, Lab values can be ultimately calculated based on the XYZ values. However, the spectral color measuring instrument has a configuration that uses a complex optical system and an expensive sensor. Thus, when the spectral color measuring instrument is used as the color measuring instrument, the cost of the device required for measurement usually increases.
106
204
106
106
On the other hand, in the present example, as described above, the cost of the color measurement device is significantly reduced by using the XYZ sensor . However, the XYZ sensor usually has large variation in characteristics compared to a spectral color measuring instrument or the like, and the accuracy of color measurement is poor. Therefore, if the color measurement device merely uses the XYZ sensor, the influence of variations in the characteristics of the sensor may increase. As a result, it may be considered that equalization or the like cannot be appropriately performed. On the other hand, in the present example, the influence of variations in the characteristics is appropriately suppressed by correcting the output value of the XYZ sensor. An inexpensive color measurement device having a relatively high accuracy is thereby realized.
106
A densitometer and the like are also known other than the XYZ sensor and the spectral color measuring instrument as a sensor used for color measurement. In this case, the densitometer is, for example, a device that measures color concentration using a filter of each color of RGB and a sensor. However, when the densitometer is used to measure color, the Lab values usually cannot be acquired. In this case, it is difficult to use it as a color measuring instrument for performing equalization and the like. Furthermore, the Lab values can be acquired with for example, a spectroscope type densitometer. However, in this case, the cost is assumed to increase as in the case in which a spectral color measuring instrument is used. Therefore, in order to perform equalization and the like using the low-cost color measurement device , it is preferable to use an XYZ sensor as in the present example.
204
106
204
FIGS. 2A and 2B
FIG. 2A
Subsequently, a correcting operation performed on the output value of the XYZ sensor in the color measurement device , and the like will be described in detail below. are views describing the correcting operation performed on the output value of the XYZ sensor . shows the correcting operation performed in the present example.
204
106
204
204
204
204
204
204
FIG. 2A
As also described above, a sensor that detects each stimulus value of X, Y, Z in the XYZ color system is used as the XYZ sensor in the color measurement device . In this case, the corresponding Lab value can be calculated based on the acquired XYZ value. Therefore, in this case, the output value of the XYZ sensor can be considered as, for example, a value associated with the color in the Lab color system. The Lab value corresponding to the output value of the XYZ sensor can be considered, for example, as the Lab value or the like calculated as the measurement result of the XYZ sensor . More specifically, in the present example, the output value of the XYZ sensor is converted into the Lab value, and then the correction process is performed. Therefore, in , the sensor output value before the correction corresponds to the output value of the XYZ sensor in a state after being converted to the Lab value and before being subjected to the correction. Furthermore, the sensor output value after the correction corresponds to the output value of the XYZ sensor in a state after the correction process is performed on the sensor output value before correction.
204
204
12
10
204
204
204
106
102
FIGS. 1A and 1B
FIGS. 1A and 1B
FIGS. 1A and 1B
Furthermore, as shown in the drawing, in the present example, the correction is performed on the output value of the XYZ sensor using a correction table and a correction factor prepared in advance. The correction table is a table used to correct the Lab value corresponding to the output value of the XYZ sensor . Furthermore, in this case, a table common to the plurality of printing units (see ) in the printing system is used as the correction table. Moreover, for example, it can be considered that the correction table is prepared in advance for a plurality of XYZ sensors . In this case, the plurality of XYZ sensors are the plurality of XYZ sensors included in the plurality of color measurement devices (see ) corresponding to the plurality of printing apparatuses (see ) to be subjected to equalization.
204
Furthermore, in the present example, a table in which the correction amount is associated with each position in the color space in the Lab color system is used as the correction table. In this case, the correction amount can be considered as a correction amount (basic correction amount) that becomes a basis commonly set with respect to the plurality of XYZ sensors . In the correction table, the basic correction amount is set to each value constituting the Lab value with respect to each position of the color space in the Lab color system. In this case, each position of the color space in the Lab color system is, for example, each position set on the color space at intervals set in advance according to the accuracy and the like required for printing. Furthermore, the intervals set in advance are, for example, intervals set in advance for each of the L value, the a value, and the b value. Further specific features of the correction table, way of creating the correction table, and the like will be described in more detail later.
204
204
204
204
The correction factor is a factor used to adjust the correction amount (basic correction amount) in the correction table. Furthermore, in the present example, the correction factor is set for every XYZ sensor to adjust the strength of correction according to the characteristics of the respective XYZ sensors . Moreover, the correction factor can be considered as, for example, a correction parameter or the like individually prepared for the XYZ sensor . For example, it can be considered as a parameter or the like indicating the strength of correction applied to each of the XYZ sensors . Furthermore, in the present example, a factor indicating the application amount of the basic correction amount set in the correction table is used as the correction factor. In this case, to indicate the application amount of the basic correction amount means, for example, to indicate the extent the basic correction amount is reflected.
Furthermore, in this case, the color space in the Lab color system is divided into a plurality of regions (color regions) and the correction factor is set for every region (by region). In this case, to set the correction factor for each region means, for example, not to set the correction factor with respect to each position in the color space in the Lab color system at an interval set in advance like the basic correction amount in the correction table, but to set the correction factor in association with each of a plurality of regions obtained by dividing the color space into a plurality of regions in a larger range. In this case, for example, it is conceivable to divide the color space in the Lab color system into ten or less (e.g., about two to ten) regions and set a correction factor for every region. Furthermore, the number of regions for setting the correction factor is preferably about three to five. With this configuration, for example, the application amount of the basic correction amount can be appropriately adjusted without excessively increasing the number of regions. In addition, depending on the required printing quality and the characteristics of the printing apparatus to use, the color space in the Lab color system is not divided into a plurality of regions and the entire color space is treated as one region, and the correction factor may be set with respect to such a region.
FIG. 2B
17
13
204
More specifically, in the present example, for example, the color space in the Lab color system is divided into four regions, and correction factors are set for each region. is a view showing an example of a way of setting the correction factor, and shows an example on a manner of dividing the color space in the Lab color system into four regions. In the figure, CCS−CCS difference vector is the difference in the output characteristics of the two XYZ sensors used in the operation of creating the correction table which will be described in more detail later.
As shown in the figure, in the present example, the color space in the Lab color system is divided into four regions of red, blue, green, and others (achromatic). In this case, the Red region is, for example, a region (red region) of a color close to red in the color space in the Lab color system. The Blue region is, for example, a region (blue region) of a color close to blue in the color space in the Lab color system. The Green region is, for example, a region (green region) close to green in the color space in the Lab color system. Furthermore, in this case, each region of Red, Blue, and Green is set to become a region of a predetermined range including the respective colors of red, blue, and green as surrounded by a rectangle in the figure. Moreover, as shown in the figure, the other regions are regions not included in each region of Red, Blue, and Green. In this case, the regions not included in each region of Red, Blue, and Green are, for example, all parts not included in each of the Red, Blue, and Green regions in the color space in the Lab color system. The other regions may be considered as, for example, an achromatic region corresponding to the tertiary color obtained when the inks of each color of C, M, and Y are mixed.
204
Furthermore, in the present example, a factor for L value, a factor for a value, and a factor for b value are set as the correction factor corresponding to each region. Therefore, when the color space in the Lab color system is divided into four regions as described above, the correction factor corresponding to one XYZ sensor is configured by 12 factors as three factors are set for each region. In this case, the correction factor can be considered to be set, for example, for every region and every Lab (by region and by Lab).
204
204
204
204
204
Here, as described above, in the present example, a table in which the correction amount is associated with each position in the color space in the Lab color system is used as the correction table. In this case, the correction table is considered to have a large data amount as values (basic correction amounts) are set to many positions in the color space. On the other hand, in the case of the correction factor, since the value merely needs to be set only for limited number of regions as described above, the data amount is significantly smaller than that of the correction table. More specifically, consideration is made to save the correction table and the correction factor in any device, for example, in the form of a file (electronic data file) handled by an electronic device such as a computer. In this case, assuming that the file indicating the correction table is a correction table file and the file indicating the correction factor is a correction factor file, the capacity of the correction factor file corresponding to one XYZ sensor can be made to, for example, less than or equal to 1/1000 of the capacity of the correction table file. The capacity of the correction factor file corresponding to one XYZ sensor is more preferably made to less than or equal to 1/10000 of the capacity of the correction table file. More specifically, in the present example, the capacity of the correction table file is, for example, a capacity of about 9 to 13 MB (megabytes) (e.g., about 11 MB). On the other hand, the capacity of the correction factor file corresponding to one XYZ sensor is, for example, about 0.9 to 1.3 KB (kilobyte) (e.g., about 1 KB). Therefore, according to the present example, for example, the output value corresponding to the characteristics of each of the XYZ sensors can be appropriately corrected using, for example, a correction factor which data amount is significantly small compared to the correction table. Furthermore, for example, the amount of data of parameters used in the correction of the output value of the XYZ sensor can be significantly and appropriately reduced.
210
106
210
106
210
106
106
204
106
204
210
FIGS. 1A and 1B
Furthermore, as described above, in the present example, the correction factor is stored in the storage (see ) of the color measurement device . In this case, the correction factor can be appropriately stored even when the storage having a small storage capacity is used by using the correction factor having a small data amount as described above. More specifically, when saving data of large amount of data such as a correction table, for example, in the color measurement device , for example, it becomes necessary to use the storage having a large storage capacity. In this case, it is conceivable that the cost of the color measurement device greatly increases. On the other hand, in a case where only the correction factor is stored in the color measurement device as in the present example, the parameter for correction set for each of the XYZ sensors can be appropriately saved in the color measurement device including the relevant XYZ sensor even when using the storage with a small storage capacity.
106
210
204
106
210
Thus, according to the present example, for example, even when the color measurement device including only the storage with a small storage capacity is used, information unique to each XYZ sensor can be appropriately stored in each color calibrator. Furthermore, for example, the correction factor can be appropriately saved while appropriately preventing the increase in the cost of the color measurement device . In this case, for example, it is conceivable to use a storage device capable of storing a correction factor and having insufficient storage capacity to store a correction table as the storage .
204
106
104
12
10
FIGS. 1A and 1B
Consideration is made to store the correction table common to the plurality of XYZ sensors in any device exterior to the color measurement device . In this case, for example, it is conceivable to store the correction table in the storage device or the like of the control PC (see ) in each printing unit or the like. The correction table may be stored, for example, in a server or the like exterior to the printing system , and acquired from the server as needed.
106
12
10
106
12
10
106
204
Next, the way to create the correction table and the correction factor will be described. In the present example, when creating the correction table, first, an airframe to become the center of variation and an airframe having a large variation are selected from a plurality of color measurement devices included in a plurality of printing units in the printing system . In this case, the plurality of color measurement devices included in the plurality of printing units in the printing system are, for example, a plurality of color measurement devices corresponding to a plurality of XYZ sensors targeted by one correction table.
106
1
17
106
204
106
Furthermore, in the example described below, one correction table is created (generated) for the seventeen color measurement devices distinguished as CCS to CCS . In this case, the color measurement is performed on the ECI chart under the same conditions by the respective color measurement devices to acquire an ECI chart measurement value. In this case, the ECI chart is, for example, a color chart indicating a sample of a plurality of colors specified in a predetermined standard such as ECI. 2002. Furthermore, the ECI chart measurement value is a result of measuring the ECI chart using the XYZ sensor in the color measurement device . Moreover, in the present example, data indicated by the ECI chart measurement value (ECI chart measurement data) is an example of data covering a wide color gamut.
204
106
106
17
17
106
1
17
Further, in this case, the range of variation of the output values of the plurality of XYZ sensors is confirmed based on the ECI chart measurement values by the respective color measurement devices . Then, the airframe that becomes the center of variation in the characteristics and the airframe having a large variation are selected. In this case, the airframe that becomes the center of variation is, for example, the color measurement device whose output value is the closest to the center of the range of variation. Furthermore, in the following, a case where the CCS is selected as an airframe to become the center of variation will be described. In this case, the CCS can be considered as a reference machine (reference airframe) in the plurality of color measurement devices (CCS to ).
106
106
106
204
106
If there are a plurality of color measurement devices whose output values are close to the center of the range of variation and it is difficult to determine which output value of the color measurement device is the closest to the center, and the like any of the plurality of color measurement devices may be selected as the airframe to become the center of variation. Furthermore, in the present example, the XYZ sensor in the color measurement device whose output value is the closest to the center of the range of variation is an example of a first colorimeter.
106
204
17
204
106
106
106
13
In addition, as an airframe having a large variation, the color measurement device including the XYZ sensor in which the characteristic of the output value is the farthest from the reference machine (CCS ) is selected. In this case, the XYZ sensor in the airframe having a large variation is an example of a second colorimeter. In this case as well, if there are a plurality of color measurement devices having a large variation, and it is difficult to determine which color measurement device to select, one of the plurality of color measurement devices may be selected as an airframe having a large variation. In addition, in the following, a case where the CCS is selected as an airframe having a large variation will be described.
17
13
106
204
17
13
204
204
After an airframe (CCS ) that becomes the center of variation and an airframe (CCS ) having a large variation are selected, the correction table is created through an IDW (reverse distance weighing) method from the difference in the ECI chart measurement values by the two color measurement devices . In this case, the difference in the ECI chart measurement values can be considered as, for example, an example of a difference in the output characteristics of the XYZ sensor . Accordingly, for example, a correction table that enables correction corresponding to the difference in characteristics between the CCS and the CCS can be appropriately created. Furthermore, in this case, the correction table can be considered as, for example, a table created based on a difference between the result of measuring a predetermined color by the XYZ sensor corresponding to the first colorimeter, and the result of measuring a predetermined color by the XYZ sensor corresponding to the second colorimeter different from the first colorimeter.
204
106
106
204
204
204
204
106
17
106
1
17
Furthermore, as described above, in the present example, the correction table is also used to correct the output value of the XYZ sensor in the color measurement device other than the two color measurement devices used to create the correction table. Therefore, the plurality of XYZ sensors targeted by the correction table can be considered to be targeting three or more XYZ sensors including the XYZ sensors other than the XYZ sensors in the above two color measurement devices . More specifically, in the examples described above and below, one correction table targets color measurement devices distinguished as CCS to CCS , as described above.
1
17
204
106
13
204
However, the CCS to CCS have different characteristics (output characteristics) from one another. Therefore, the output value cannot be appropriately corrected by merely using the correction table as it is with respect to the XYZ sensor in the color measurement device other than the CCS used at the time of creating the correction table. On the other hand, in the present example, as described above, the correction factor is further used to correct the output value of each XYZ sensor .
106
13
17
106
106
Furthermore, at the time of creating the correction factor, based on the RAL chart measurement value (Lab) by the two color measurement devices (CCS and CCS ) used to create the correction table and the RAL chart measurement value (Lab) by an airframe (color measurement device ) to be corrected, a correction factor corresponding to the relevant airframe is calculated. In this case, the RAL chart measurement value (Lab) is a Lab value indicating the result of performing color measurement on the RAL chart using each of the color measurement devices . The RAL chart is a color chart of the RAL standard. For example, a commercially available RAL chart sold as a color sample can be suitably used as the RAL chart.
3028
5002
6029
106
106
106
Furthermore, as described above, in the present example, the color space in the Lab color system is divided into a plurality of regions, and the correction factor is set for every region. In this case, it is conceivable to acquire a measurement value corresponding to a color patch (RAL color patch) corresponding to each region as an RAL chart measurement value (Lab). More specifically, as described above, in the present example, the color space in the Lab color system is divided into four regions of red, blue, green, and others (achromatic). In this case, with respect to the region of Red, the correction factor is calculated based on the measurement value on the RAL color patch indicating a predetermined red color. In this case, for example, a patch of RAL , which is a color patch for Pure red color, can be suitably used as the RAL color patch indicating red. Furthermore, with respect to the region of Blue, the correction factor is calculated based on the measurement value on the RAL color patch indicating a predetermined blue color. In this case, for example, a patch of RAL , which is a color patch for Ultramarine blue color, can be suitably used as the RAL color patch indicating blue. With respect to the region of Green, the correction factor is calculated based on the measurement value on the RAL color patch indicating a predetermined green color. In this case, for example, a patch of RAL which is a color patch for Mint green color can be suitably used as the RAL color patch indicating green. Moreover, in this case, with respect to these color patches, the result of measuring with each color measurement device is compared with the result of measuring with two color measurement devices used to create the correction table to calculate a correction factor corresponding to the applied strength of the basic correction amount for each value (L value, a value, and b value) constituting the Lab value. According to such a configuration, the correction factor corresponding to each color measurement device can be appropriately calculated.
106
17
13
106
Here, as described above, in the present example, the color space in the Lab color system is divided into a plurality of region, and correction factor is set for every region and every Lab. However, in a case where a region and a Lab value (any of L value, a value, and b value) has a small basic correction amount in the correction table, it may be hardly necessary to use the correction factor as an index indicating the characteristics of each color measurement device . In this case, small basic correction amount in the correction table means, for example, that the difference (CCS -CCS ) in the ECI chart measurement values by the two color measurement devices used in the operation of creating the correction table is small. In such a case, it may be considered that the correction result may degrade by using the correction factor. Therefore, the corresponding correction factor may be set to zero for the region and Lab value having small basic correction amount in the correction table. More specifically, in an experiment (operation verification) specifically conducted by the inventors of the present application, there were cases in which the difference became small for the L value of each region and the b value of the Blue and Green regions. Therefore, the correcting process is executed with the correction factor set to zero on such regions and Lab values. In addition, among the four regions into which the color space in the Lab color system is divided, a value same as the correction factor corresponding to a region, among the regions of Red, Blue, and Green, having high correlation with other region may be used as the correction factor corresponding to the other region. More specifically, in this case, for example, it is conceivable to use the same value as the correction factor corresponding to the Red region as the correction factor corresponding to the other region.
17
13
106
106
As a manner of dividing the region in a case of setting the correction factor for each region, it is also conceivable to divide into region to other than four regions described above. In this case, as the manner of dividing the region, for example, it is conceivable to divide the region according to the magnitude of the correction amount (basic correction amount) set in the correction table. In this case, the magnitude of the correction amount is a value corresponding to the magnitude of the difference (difference between CCS and CCS ) in the ECI chart measurement values by the two color measurement devices used to create the correction table. Even when the region is divided in such a manner, a correction factor corresponding to the respective region can be set for each of the color measurement devices in the same manner as described above.
204
106
106
Subsequently, the operation of the correction, the result of the correction, and the like performed using the correction table and the correction factor will be described in more detail. As described above, in the present example, the correction is performed on the output value of the XYZ sensor in each of the color measurement devices using the correction table and the correction factor. In this case, first, the correction table is referred to using, as an index, a Lab value (Lab measurement value) obtained by measuring a color using the airframe to be corrected (color measurement device ). The basic correction amount corresponding to the Lab measurement value is thereby acquired. Furthermore, this operation can also be considered, for example, as an operation or the like for obtaining each Lab correction amount to become the basis with reference to the correction table using the Lab measurement value of the airframe to be corrected as an index.
After the basic correction amount is acquired, the correction value corresponding to each of the Lab values is calculated by multiplying the correction factor (correction factor corresponding to each of the Lab values) to the basic correction amount obtained by referencing the correction table for each of the Lab values. In this case, the correction value is a value to be added to the Lab measurement value at the time of correction. Furthermore, this operation can also be considered, for example, as an operation or the like for calculating each Lab correction value by multiplying each Lab correction factor to each Lab basic correction amount obtained by referring to the table. Moreover, in this case, for the correction factor to be used, for example, the correction factor corresponding to the Lab measurement value is used by determining to which region of a plurality of regions (four regions of Red, Blue, Green, and others) the Lab measurement value corresponds for the Lab measurement value used as an index at the time of referring to the correction table.
204
204
After the correction value is calculated, a correction process (Lab correction) is performed by adding the correction value to the Lab measurement value acquired by the airframe to be corrected. The output value after correction is thereby calculated as the output value of the airframe to be corrected. Furthermore, in the present example, the output value of the airframe to be corrected can be considered as, for example, the output value of the XYZ sensor of the relevant airframe. This operation can be considered, for example, as an operation or the like for obtaining the Lab value after correction by adding each calculated Lab correction value to each Lab measurement value of the airframe to be corrected. According to this configuration, for example, the Lab value measured using the XYZ sensor can be appropriately corrected so as to suppress the influence of the characteristic variation.
FIG. 3
FIGS. 1A and 1B
FIGS. 1A and 1B
106
1
4
6
7
13
15
16
17
106
204
106
204
102
204
is a view describing the effect of correction performed in the present example, and shows a part of the result of the experiment actually conducted by the inventors of the present application. In this experiment, measurement of the ECI chart was performed by seven color measurement devices (see ) indicated as CCS , , , , , , in the figure. Furthermore, in this measurement, a comparison is made between the case where correction is performed and the case where correction is not performed (comparison by presence or absence of Lab correction) by using a measurement application software incorporating the function of correction performed using the correction table and correction factor described above. Moreover, in this comparison, the comparison was made on the difference (ΔE) in the measurement result from the CCS which is the color measurement device used as a reference device at the time of creating the correction table. As shown in the figure, it can be seen that ΔE becomes smaller after applying the correction. Furthermore, as can be understood from the result, according to the present example, the characteristics of the XYZ sensor can be appropriately corrected when color measurement is performed using the color measurement device including the XYZ sensor . Thus, for example, the measurement of the color printed by the printing apparatus (see ) can be more appropriately performed while appropriately suppressing the influence of the variation in the characteristic of the XYZ sensor .
106
102
204
106
204
204
Here, when such correction is performed, a method (color measurement method) of measuring a color using the color measurement device can be considered as, for example, a method including a color measuring step and a correcting step. In this case, the color measuring step is, for example, a step of measuring the color printed by the printing apparatus with the XYZ sensor in the color measurement device . The correcting step is, for example, a step of correcting an output value output from the XYZ sensor in the color measuring step. The operation of the correcting step can be considered, for example, as an operation to be performed later than the operation of the color measuring step. In this case, in the color measuring step, for example, the output value of the XYZ sensor is acquired without performing the correction using the correction table and the correction factor. In a modified example of the operation of the color measurement method, the operation of the correcting step may, for example, be performed simultaneously with the operation of the color measuring step. In this case, in the color measuring step, an output value after the correction using the correction table and the correction factor is acquired.
204
204
Furthermore, as described above, according to the present example, the color measurement can be appropriately carried out while suppressing the influence of the variation in the characteristics of the XYZ sensor . In this regard, when color measurement is performed using the XYZ sensor , the XYZ values and the Lab values under a light source such as a light source of a spectral distribution approximate to D50, for example, are acquired, as opposed to a case where the color is usually measured by a spectral color measuring instrument and the like. Therefore, even if the correction as described above is performed, it is difficult to measure or the like a color or the like for creating an accurate ICC profile.
204
204
106
204
However, for example, when equalization or the like is performed, even if the accurate ICC profile is not created, it is considered sufficient if it can be determined as the same color with an appropriate accuracy when the measurement is performed on the same color under the same environment for the results of the color measurement by the plurality of XYZ sensors . In this case as well, the influence of the variation of the XYZ sensor can be appropriately suppressed by using the correction table and the correction factor as described above. Therefore, according to the present example, equalization and the like can be appropriately performed using the color measurement device including the XYZ sensor .
102
102
102
12
10
106
12
102
204
FIGS. 1A and 1B
Furthermore, more specifically, when performing equalization, for example, a predetermined color chart is printed by a plurality of printing apparatuses , and color adjustment is performed based on the color measurement result with respect to the color chart. In this case, the plurality of printing apparatuses refer to the plurality of printing apparatuses included in the plurality of printing units (see ) in the printing system . As the color chart, for example, it is conceivable to use a chart of a pattern including patches of a plurality of colors set in advance. Further, the color measurement result with respect to the color chart is the result of measuring the color by the color measurement device included in the same printing unit as the respective printing apparatus . The measurement result is a measurement result corresponding to the output value of the XYZ sensor after correction using the correction table and the correction factor is performed.
102
102
204
204
102
102
102
According to this configuration, for example, the characteristics of the color generated in the print result of each printing apparatus can be appropriately acquired by printing a common color chart by each printing apparatus . Furthermore, in this case, as described above, the influence of variations in the characteristics of the XYZ sensor can be appropriately suppressed by performing correction on the output value of the XYZ sensor . Moreover, in this case, the color adjustment is performed based on the measurement results obtained in this way, for example, so that the colors printed by the respective printing apparatuses approach a preset standard state. With this configuration, for example, the colors printed by the respective printing apparatuses can be appropriately adjusted. Thus, for example, equalization with respect to a plurality of printing apparatuses can be appropriately executed.
FIG. 4
FIG. 4
FIG. 4
204
204
106
106
13
15
106
Next, matters related to equalization among the effects of correction performed in the present example will be described in more detail. is a view describing the effect of correction performed in the present example, and shows an example of a difference in the result of equalization according to the presence or absence of correction. More specifically, in , two sensors with large characteristic variations are extracted from 100 XYZ sensors prepared by the inventors of the present application, and an example of a difference in the result of equalization according to the presence or absence of correction is shown. Furthermore, when the equalization, which results are shown in , is executed, a correction is performed using a correction table created for a plurality of XYZ sensors in a plurality of color measurement devices including a color measurement device other than CCS and CCS and a correction factor created for every color measurement device .
FIG. 4
102
13
15
106
204
Furthermore, in , before application of the correction table refers to a case where equalization is performed without performing a correction using the correction table and the correction factor. After application of the correction table refers to a case where equalization is performed after a correction using the correction table and the correction factor is performed. Furthermore, in this case, correction using the correction table and the correction factor is performed on all the regions. Before calibration and after calibration refer to before and after the equalization is performed. The numerical values shown in the figure are the measurement values of the color difference (color difference ΔE) that occurs when a color of the same setting is printed by two printing apparatuses corresponding to CCS and CCS , and shows the difference on the measurement result for each of cyan (C), magenta (M), yellow (Y), red (R), green (G), blue (B), and gray which is a tertiary color. Furthermore, the numerical value shown in association with the character CCS indicates the difference calculated based on the result of measuring the color with the color measurement device including the XYZ sensor . The numerical values shown in association with the characters FD-9 indicate the differences calculated based on the results of measuring the color with the FD-9 device which is a spectral color measuring instrument. As for the result of equalization, determination is made as pass (OK) when ΔE is less than 2 (ΔE<2), and fail (NG) when ΔE is greater than 2 (ΔE>2).
204
204
When the average of ΔE is calculated based on the numerical values shown in the figure, the average ΔE after calibration (after equalization is performed) when correction is not performed is about 2.6 (2.59). In this case, it is assumed that the influence of variation in the characteristics of the XYZ sensor appeared, and equalization at high accuracy cannot be performed. On the other hand, the average ΔE when the correction is performed is 1.53, thus improving to less than 2 (ΔE<2), which is pass. In this case, it is assumed that the influence of the variation in the characteristic of the XYZ sensor is appropriately suppressed by the correction.
204
106
204
106
Next, supplementary description and the like will be made regarding each configuration described above. As described above, according to the present example, for example, the influence of the variation in the characteristics of the XYZ sensor can be appropriately suppressed when the color measurement device including the XYZ sensor is used. Thus, for example, the equalization can be appropriately performed with high accuracy using the low-cost color measurement device .
106
106
102
106
102
106
102
102
106
102
106
102
106
102
204
106
102
204
204
204
106
102
In this case, as the configuration of the sensor unit is simplified, the color measurement device can be appropriately miniaturized, and the like. As a result, the color measurement device can be easily mounted, for example, on the printing apparatus . In this case, it can be considered that the color measurement device forms, for example, a part of the printing apparatus . With this configuration, for example, equalization and the like can be performed more easily by using the color measurement device mounted on the printing apparatus . Furthermore, in this case, with regard to the relationship between the printing apparatus and the color measurement device and the plurality of printing apparatuses to be subjected to equalization, it can be considered that one color measurement device is associated with one printing apparatus by mounting the color measurement device on the printing apparatus . Moreover, when considering the relationship between the XYZ sensor in the color measurement device included in each printing apparatus and the correction table, for example, it is conceivable that the correction table is prepared in advance for a plurality of XYZ sensors including the XYZ sensor other than the XYZ sensor in the color measurement device of one printing apparatus .
10
102
204
106
102
204
In the printing system of the present example, for example, color adjustment is performed by equalization, and the operation of the printing apparatus is controlled based on parameters and the like set at the time of adjustment. Furthermore, in this case, the output value of the XYZ sensor in the color measurement device is corrected at the time the equalization is performed. Therefore, the control of the operation of the printing apparatus can be considered, for example, as control using a value obtained by correcting the output value of the XYZ sensor .
12
10
102
104
10
102
102
In the description made above, regarding the configuration of each printing unit in the printing system , a case where the printing apparatus is considered as an example of a printing portion, and the control PC is considered as an example of a controller has been mainly described. However, depending on the configuration of the printing system , configurations other than the above can be considered as a printing portion, a controller, or the like. More specifically, for example, an inkjet head in the printing apparatus can also be considered as a printing portion. The controller built in the printing apparatus can also be considered as a controller that controls the operation of the printing portion.
204
106
106
204
204
Furthermore, as described above, according to the present example, the influence of the variation in the characteristics of the XYZ sensor can be appropriately suppressed. However, in order to obtain the effect of correction more appropriately, it is desirable to appropriately suppress the influence of the measurement conditions themselves at the time of color measurement performed using the color measurement device . More specifically, when color measurement is performed using a color calibrator such as the color measurement device , a gap between the XYZ sensor , which is a sensor, and the color chart always needs to be maintained at a constant distance in order to perform an accurate measurement (color measurement). On the other hand, it is conceivable to use media of various thicknesses as a medium for printing a color chart. In this case, if the position of the XYZ sensor in the height direction is fixed, the gap changes by the thickness of the medium.
204
106
102
106
102
106
204
106
106
Therefore, the position of the XYZ sensor in the height direction is preferably adjustable. Furthermore, in this case, it is conceivable to install the color measurement device on the printing apparatus in a state of being movable in the vertical direction (thickness direction of medium). More specifically, as such a configuration, for example, consideration is made to installing the color measurement device on the printing apparatus using a mechanism including a solenoid and a rotation roller for driving the color measurement device up and down. In this case, the position of the XYZ sensor in the vertical direction changes in accordance with the position of the rotation roller. Furthermore, the rotation roller is brought into contact with the surface (medium surface) of the medium by lowering the solenoid (down) downward. Then, at the time of color measurement by the color measurement device , the rotation roller is brought into contact with the surface of the medium by lowering the solenoid downward. According to such a configuration, the gap can be always maintained constant, for example, without being subjected to the influence of the thickness of the medium at the time of measurement. In this case, it is conceivable to maintain the gap at a constant distance of about 3 to 5 mm (e.g., about 4 mm). Furthermore, at the timing the color measurement by the color measurement device is not performed, the rotation roller and the medium can be brought into a non-contact state by raising (up) the solenoid. Thus, for example, the occurrence of jamming of the medium at the time of printing, the formation of roller marks on the surface to be printed, and the like can be appropriately prevented. In this case, it is conceivable to make the gap greater than or equal to 10 mm (e.g., about 11 mm).
106
106
102
106
106
In addition, in the case of performing color measurement on a color chart including color patches of a plurality of colors, proper measurement cannot be performed if shift occurs in the correspondence relationship between the color patch and the measurement result. More specifically, when performing the color measurement by the color measurement device , for example, it is conceivable to mount the color measurement device on a carriage that holds an inkjet head or the like in the printing apparatus , and continuously perform the color measurement while moving the carriage in a predetermined scanning direction. In this case, a color patch to be subjected to color measurement at each timing is specified by controlling the timing to cause the white LED used as the light source to emit light. In this case, if a shift occurs in the timing to cause the white LED to emit light, a shift may occur in the position to be measured, and the wrong color may be measured. Therefore, in order to appropriately perform color measurement on the color patches of each color by the color measurement device , the white LED needs to emit light in accordance with the timing when the position of the color measurement device matches the position of the color patch to be measured. For that purpose, for example, how to generate the timing of causing the white LED to emit light becomes important.
102
106
106
106
On the other hand, in order to cause the white LED to emit light at the correct timing, for example, it is conceivable to use a signal generated by a linear encoder for printing provided in the printing apparatus . In this case, the linear encoder for printing is, for example, a linear encoder used to control the position of the carriage at the time of the main scan. The main scan is an operation of causing the inkjet head to eject ink while moving the inkjet head in a predetermined main scanning direction. More specifically, in this case, for example, when the carriage is moved to the measurement start position of the color chart, a trigger command indicating the start of color measurement is generated and transmitted to the color measurement device . In this case, the color measurement device starts a predetermined measurement sequence by receiving the trigger command. Thereafter, an accurate continuous color measurement can be realized by transmitting a trigger command to the color measurement device for every color patch. Furthermore, in this case, it is possible to make it less susceptible to the speed (scan speed) at which the carriage is moved by generating a trigger command using a linear encoder, as compared to for example, a case where a trigger command is generated using a timer and the like. In addition, for example, the accuracy of color measurement can be more appropriately enhanced.
INDUSTRIAL APPLICABILITY
The present disclosure can be suitably used, for example, in a color measurement method. | |
10 Strangest Unidentified Creatures Ever Found. Number 10, Jersey Devil. The tales surrounding the Jersey Devil of New Jersey have been circulating since the 19th Century, so it could have been easier to think of this creature as more of a myth than of an unidentified creature. But then, hundreds of people in New Jersey began to report seeing the creature well into the 2000s, and the overwhelming majority of the reports gave the same description: a creature with hooves, a horse’s head, and bat wings. What’s more is that many unusual footprints and sounds have been discovered that people attribute to the creature. Number 9, Giant Panthers. Whether it’s a jaguar, a leopard or a cougar, we all know that panthers obviously exist. Except in Illinois, there have been numerous sightings of a large black panther, and no big cats live in the Illinois area at all.
But until we can capture one, we’ll never know if these black panthers in Illinois are myth or fact. Number 8, Farmer City Monster. Also spotted numerous times in Illinois is a creature known as the Farmer City Monster, which lurked in the woods of Illinois. There were so many reports of people who spotted the creature, who all noted glowing eyes, that a police investigation was tasked with tracking down the creature. The last sighting was in late 1970, where a driver claimed it ran across the road in front of his truck’s headlights. Number 7, Cohomo Monster. The Cohomo Monster has been described as eight feet tall with white fur and three toes. There have been so many sightings of the creature in the Midwest throughout the 1970s to the 2000s, that a police investigation was launched to find the creature, but it was never actually found by the police.
Nonetheless, more sightings by people continued. Number 6, Pope Lick Monster. The Pope Lick Monster is infamously claimed to be a mix of a human and a goat. It does sound sketchy, but there have been too many sightings of this half human, half goat creature to dismiss it entirely. It is also been claimed that the Pope Lick Monster has killed many people, and numerous people have gone missing that have also been attributed to the Pope Lick Monster. For now, it remains classified as an unidentified creature. Number 5, Flatwoods Creature. The Flatwoods Creature was discovered in West Virginia, in 1952. It was reported to stand ten feet tall with a strangely shaped head and bulgy eyes, green body and having very long claws. The creature was even thought by some to be an alien, but remains unidentified to this day, and no more sightings have been reported. Number 4, Lake Michigan Monster. If you’re sketchy of the Lochness Monster, then you may be sketchy of the Lake Michigan Monster, too. The Lake Michigan Monster was reported as being over fifty feet in overall length, with a long neck, gray scales and a small head. There have also been numerous reports of the loud, roaring sounds it makes. What puts this creature so high on the list is the story of a fisherman who claimed that the creature came within twenty feet of his boat. He was able to give an extremely detailed description and drawing of the creature, that matched many other sightings as well.
Number 3, Lizard Man. Sightings of a Lizard Man in the Deep South of the USA, especially in the swamps of South Carolina, have been reported ever since the 1980s to the present day, and the overwhelming majority of the sightings match the description of a seven-foot tall creature, with green skin and three fingers. Witnesses claimed that the creature heavily damaged their vehicles and escaped by walking on walls and buildings, and one family even claim they saw the creature in their backyard. The ‘Lizard Man’ remains one of the most fascinating unidentified creatures to this day, with too many consistent sightings and evidence of tracks and destroyed vehicles.
Number 2, Canvey Island Monster. The Canvey Island Monster was a carcass that washed up on shores of England in late 1954. A year later, a second very similar carcass rolled up on England’s shores as well. Both carcasses were reported as being roughly two feet long with thick skin, gills and bulging eyes without forelimbs. However, the back-legs were reported as resembling a horse with five toes. Both carcasses also reportedly weighed twenty to twenty five pounds. A photograph was also taken of one carcass that has been thoroughly studied even today, but no conclusion has been reached as to what the creature in the photograph was. Unfortunately, both carcasses were cremated before any more investigating could be done into what the creatures were. To date, there are no known animals or creatures that resemble the Canvey Island Monster in any way. Also to date, no other similar carcasses have washed up on shore anywhere in the world, at least as far as we know of.
Number 1, Montauk Monster. The carcass of the Montauk Monster famously rolled up on the shores of New York, in July of 2008. The dead creature was discovered by four surfers on the beach, who took a picture and instantly made headlines. Many scientists initially believed it to be the carcass of a decomposed raccoon, but the back legs have been found to be too disproportionate to the body. Other theories about it included being a mutated specimen from the nearby Plum Island Animal Disease Center. In 2011 and 2012, two more eerily similar carcasses washed up on the shores of New York as well, but all three still remain unidentified. It is unknown what has happened to the original carcass, but in many aspects, the Montauk Monster could be considered to be a modern day Canvey Island Monster on terms of how the carcasses of both washed up on the beach and immediately generated controversy.
. | http://as19.com/tag/top/ |
Reading poetry can be an uphill struggle. Don’t let those poets trip you up. Watch our Perfecting Poetry series!
We’ll introduce you to significant poets, as well as their personal and contextual influences. Afterwards, we’ll analyse their poems, line by line. Discover what the poet is actually saying by dissecting a range of language forms and features. Along the way, we’ll incorporate lots of visuals and annotations to help you imagine what is going on.
Before you get started, we recommend that you watch the English Essentials series. Check out the Perfecting Poetry videos to learn about a range of poetic forms and features.
Here’s how to get the most out of our videos:
1. Before you start studying a poet or poem/s at school.
Get a head start on your schoolwork! You can watch our lessons during the holidays or a few weeks before studying new poetry in class.
Meet each poet before diving into their poems. What were their main concerns? What key themes emerge from their poems? Why did they write in a particular style? Join us on a journey through the life of the poet, as well as the society they lived in.
Take notes as you watch each video. Create a mind map of the poet’s personal and contextual influences. Write a list of key themes to pay attention to as you study each poem.
2. While your class is studying a poet or poem/s.
You can watch our lessons a few days before studying a poem in class. That way, you’ll have a firm grip on the key themes in each poem. We analyse each poem line by line, so it’ll be easy to spot all the language forms and features. You’ll be one step ahead of your class!
If you need to revise a specific technique, you can always check out the Perfecting Poetry videos in our English Essentials Series.
What if you’re still stuck on a poem after covering it in class? You can always watch our lessons to fill in any gaps in your understanding. We recommend annotating a copy of the poem as you watch the video. Maybe you have extra thoughts to add to the analysis – just jot those down in the margins!
3. When preparing for an assessment.
Feel free to watch our videos to revise for upcoming assessments.
If you’re studying several poems by one poet, create a mind map of the key themes in each poem. Then, start thinking about how the poems are connected. Often, poets tend to discuss similar ideas across several poems.
If you’re preparing to write an analytical response or essay, brush up on all the key themes and techniques in each poem. You’ll need them to tackle your school assessments!
Guide for Educators
As educators, we can appreciate the beautiful and meaningful nature of poetry. But how do we share that with students?
At Schooling Online, we believe that a step-by-step approach works best. That’s how we structure our online lessons! Students need to become familiar with the poet and their personal and contextual influences. Afterwards, students can start to interpret poems on a broader scale, starting with the overall message or story. Then, they can explore the poems in depth with our detailed analysis.
Of course, poetry is written to be heard, not simply read. Our captivating voiceover brings each poem to life. This draws students’ attention to rhymes schemes and meter. Along the way, our stunning visuals help students to interpret even the most confusing poems.
Here’s how to get the most of our videos:
1. Integrate our videos into your school’s English curriculum
Our online lessons cover poems by a range of significant poets. These include poems prescribed for the NESA English Standard, English Advanced and English Extension Stage 6 syllabuses. Our lessons are also valuable for the International Baccalaureate Diploma Programme and other secondary English syllabuses.
We recommend that you integrate our videos into your weekly, monthly and yearly teaching plans. Our videos explain each poet’s key ideas and contextual concerns. Along the way, we foster valuable skills for detailed poetry analysis. Your students will develop their understanding of poetic forms and features in no time! Sign up your school with Schooling Online and set lessons for students to watch in class or at home.
2. Introducing students to a poet or poem/s.
At Schooling Online, we know that students can struggle to understand a new poet. They need to grapple with a load of information, ranging from the poet’s personal influences to their key thematic concerns.
It’s even harder for educators – you need to support students on this journey.
Our Perfecting Poetry series gives you full flexibility. For each poet, we dedicate one lesson to introducing the poet’s life and influences. You can play this video in class to introduce each poet’s main concerns. You can also assign videos for students to watch at home. Students can watch the introductory video at home, so class time can be reserved for discussion. Students will love revising with our lessons!
The introductory video can be used to spark discussion and fuel class activities. Students can create mind maps on key contextual influences or the poet’s main thematic concerns.
3. Supporting students as they engage in critical analysis of poetry.
Our videos equip students with essential poetry analysis skills. We annotate each poem in detail, providing line-by-line analysis of the language forms and features. Our series explains the key ideas of each poem in depth. At the same time, we equip students with vital tools for analysing a range of poetry, preparing them for unseen text analysis.
Turn your classroom into an interactive learning environment by watching each video in short segments. We recommend pausing the video after each stanza has been analysed. This is the perfect time to open a discussion with your class.
There are so many different ways to interpret a poem! Students may collaboratively analyse sections of a poem and discuss the key ideas. To actively engage students, you can use these discussion questions:
• In the poem, what does the poet reveal about the speaker?
• What are the key ideas in the poem? How did the poet share those ideas with you?
• What was the poet’s purpose for writing the poem?
• Explain the poem in your own words. What does this line mean?
Feel free to use our videos as a resource for the following sample activities. Students may:
• Create a quote analysis table that compiles key quotes relating to a specific theme
• Write a paragraph or essay response based on a major theme
4. Use our videos for internal and external assessment preparation.
Do your students stress out over assessments? Revision will seem relaxing with our engaging videos!
We recommend playing the videos in class to refresh students’ understanding of each poem. Even better, students can watch the lessons at home in preparation for an assessment. We’re just a click away!
That way, students will go beyond rote learning the material. They will understand each quote as they commit it to memory. This will help students to craft sophisticated thesis statements in their analytical responses.
Our videos can provide a basis for the following revision activities. Students may:
• Discuss how to approach an assessment task, such as how to structure an essay response
• Compile further quotes and analysis to support the discussion of major themes
• Check that their analysis reference the poet’s personal and contextual influences
Our Perfecting Poetry series brings beautiful poems to life!
Our videos introduce significant poets, including their personal and contextual influences. In each lesson, we’ll break down the main ideas in each poem. The line-by-line analysis helps you achieve an in-depth understanding of the key themes. We’ll teach you about all the weird and wonderful techniques that poets use to create meaning. It’s so easy to appreciate some of the best poems ever written!
Our fun and vibrant animations inject new life into poetry. All kinds of poems can be relatable, funny, profound and easy to understand. Along the way, you’ll pick up skills for analysing language forms and features.
What are you waiting for? It’s time to start perfecting poetry! | https://schoolingonline.com/secondary/perfecting-poetry-series-rosemary-dobson |
These Ancient standards of measurement are, in all probability closely related. At first glance the standards seem to differ by 0.6 mm out of 303 but on further examination they are much closer and in fact could be considered identical.
The Ancient Sumerians in the third millennia BC created a system of measurements which was based on a one second pendulum which was almost one meter long. Distance was measured in multiples of this standard. One of these was a little longer than 1/6 of a nautical mile while the next was about 5 nautical miles. The accuracy of these standards was improved throughout the following centuries
The Minoan foot was derived precisely from the length of a pendulum which swings 366 times in the period the earth rotates 1/366 of its circumference measured on a line of sight to Venus in opposition. The length of this pendulum is doubled then multiplied by 366 to produce a length which is approximately 1/6 arc minute in latitude. The Minoan foot is 1/1000 this distance.
In a similar manner, using the same formula and taking into account the difference in gravity at the two locations as well as allowing for the properties of a real pendulum, the error is well within the measuring ability of these ancient civilizations.
There can be no question that both of these standards are part of the same attempt to replicate a length equal to 1/6 of today’s nautical mile. A standard for accuracy which was only surpassed by the Greeks foot and Stadia.
Today, the arc second and the arc minute (nautical mile) are shown on every chart used today for navigation on both the sea and in the air. Maybe its not so surprising that sea faring nations half a world apart used the same navigational standards so long ago.
1 Why this is important
- March 14, 2012 This may not seem important to the layman but to a navigator it meant that 360 of these basic units of length was one degree and 360 degrees was all the way around the world on a meridian through Japan. Taking a trip on this meridian would take us southward through Australia and Antarctica, then northward though Brazil, the Atlantic Ocean, Canada, Iceland the north pole then southward through Siberia and back to Japan. The length of this journey taken over 3000 years ago would have been 99 percent of what we know the true distance to be today. We know that the Polar circumference of the Earth was important to the Japanese because one of their standards thr Ri is 1/10,000 the polar circumference I would like to thank Gretchen Leonhardt in her website “Kanashi” for bringing this ancient Japanese measurement to the attention of scholars throughout the world. | https://rolandboucher.com/2021/03/03/the-ancient-minoan-and-japanese-civilizations-used-the-same-navigational-standard-03-13-2012/ |
At Brookfield Park we provide a happy, safe and caring environment where all individuals get the chance they deserve and the opportunity to develop skills for life.
We gain high standards through great expectations of all and by creating interesting and exciting learning experiences.
By working together and being supportive of each other, children and family, we nurture a community where everyone wants to succeed.
School Aims
To create a happy, safe and caring environment where there is a place for everyone and there is a feeling of belonging:-
o Staff, pupils, parents/carers, governors and other members of the community work co-operatively;
o The whole school community recognises and is proud of all its achievements;
o Optimum staff allocation is operated to meet the needs of all pupils;
o Performance management is effectively implemented;
o The school is central to the local community;
o Appropriate continuing professional development for all staff is provided;
o Everyone's strengths are valued;
o Child Protection procedures are effectively managed;
o The school actively promotes pupils' and staff's emotional health and well-being.
To ensure that each learner reaches his/her greatest potential in academic excellence:-
o All pupils are encouraged to have active ownership of their learning;
o All staff, pupils, parents and governors have very high expectations of each other;
o The whole school community has a positive attitude to learning and strives 'to be the best';
o A clear focus for teaching is shared with the learner;
o Success criteria are focused on learning and shared with learners;
o Learning experiences offered are skill based to create life-long learners;
o Independent learning is actively encouraged;
o Finding out what learners already know and building on it;
o Assessment for learning is used to build on success for every pupil in recognising achievements and setting targets for future improvements;
o Challenging curricular targets are set;
o Teaching for learning is focused on all individual pupils' needs and abilities;
o Pupils are encouraged to reflect on their learning;
o Effective tracking systems in place to monitor a pupil's progress;
o The learning experience is well structured and paced to make it challenging and enjoyable;
o The curriculum reflects the diverse experiences of the pupils;
o Pupils are helped in recognising that they can learn from setbacks and mistakes;
o Involvement and good communication with parents/carers in supporting the partnership of the
educational process;
o All staff, pupils, governors and parents/carers enhance learning through creating an emotionally healthy school and contribute to the development of effective and successful learners.
To encourage positive self-image to give every pupil confidence to deal with events or problems as they may occur:
o Promotion in every pupil an ability to recognise, accept and value people of every race,gender and class;
o Encouragement of every pupil to appreciate what human beings have achieved and be inspired to make a useful and significant contribution to society himself/herself;
o Supporting pupils to become self-disciplined to act responsibly and with care for others;
o A sense of corporate identity is present to promote a sense of belonging and community spirit;
o Building respectful teacher-pupil relationships;
o Positive behaviour is recognised;
o A school code of conduct is agreed by all;
o Class full-value contracts are drawn up and agreed by the pupils;
o A school council is elected to represent the pupils' views;
o Circle times are regularly undertaken;
o A Behaviour and Attendance Leader, Learning Mentor and Key Workers support pupils as need arises in overcoming barriers to learning;
o Barriers such as racism are addressed so that learners feel, safe, secure and valued.
To offer a range of experiences whether aesthetic, physical, cultural or spiritual within a rich and creative learning environment, to expand every pupil's knowledge and understanding of the world around him/her:-
o A rich and vibrant curriculum is delivered;
o The curriculum is an inclusive one offering differentiated and challenging learning experiences;
o Learning is enhanced by clear and reasonable links across the subjects;
o All staff demonstrate high quality, effective classroom practice;
o All staff are excellent role models;
o Rigorous monitoring of learning and teaching is effectively undertaken by the Senior Leadership Team and Subject Co-ordinators;
o The self-evaluation process is undertaken in the continual strive for improvement.
o The curriculum is supported with good quality resources;
o The curriculum reflects disability awareness;
o The pupils are engaged in first hand experiences such as visits and visitors;
o Curriculum policy documentation is regularly reviewed;
o Pupils are encouraged to 'take risks';
o Learning is supported by the creative use of ICT;
o Pupils' personal, social and emotional skills are developed through a whole school curriculum approach;
o The quality of the building accommodation and grounds in relation to health and safety and the provision of a stimulating learning environment are well maintained. | http://www.brookfieldparkprimary.co.uk/visions-and-aims/ |
BIOMED CENTRAL BioMed Central is an STM (Science, Technology and Medicine) publisher of 264 peer-reviewed open access journals. The portfolio of journals spans all areas of biology, biomedicine and medicine and includes broad interest titles, such as BMC Biology and BMC Medicine alongside specialist journals, such as Retro virology and BMC Genomics.
BENTHAM OPEN It is an online peer-reviewed open access journals cover all major disciplines of science, technology, medicine and social sciences.
JSCIMED CENTRAL JSciMed Central is an Open Access publisher of forty-nine internationally peer reviewed science and engineering Journals. covering colossal fields like Medical, Clinical, Engineering, Chemistry, etc., to disseminate the advancements across the scientific community. JSciMed Central publishes peer reviewed Open Access Journals. JSciMed Central is dedicated towards Open Access by publishing the research across the scientific commuity.
HERBERT OPEN ACCESS JOURNALS Herbert Publications was established in 2011 and embrace gold open access journal publishing dedicated to provide a rapid access to quality peer-reviewed journals covering all disciplines widely in life sciences, medical research, chemistry alongside technology and management.
OPEN ACCESS MICROBIOLOGY JOURNAL Microorganisms is a scientific open access microbiology journal published quarterly online by MDPI.
BRITISH MICROBIOLOGY RESEARCH JOURNAL British Microbiology Research Journal is dedicated to publish research papers, reviews, and short communications in all areas of Microbiology such as virology, mycology, parasitology, bacteriology, clinical microbiology, phycology, parasitology, protozoology, microbial physiology, immunology, microbial genetics, medical microbiology, microbial pathogenesis and epidemiology disease pathology and immunology, probiotics and prebiotics, veterinary microbiology, environmental microbiology, microbial ecology, microbially-mediated nutrient cycling, geomicrobiology, microbial diversity and bioremediation, evolutionary microbiology, industrial microbiology, aeromicrobiology, food microbiology, molecular and cellular microbiology, entomology, biomedical sciences, pharmaceutical microbiology. This is a quality controlled, peer-reviewed, open access INTERNATIONAL journal.
CURRENT RESEARCH IN MICROBIOLOGY AND BIOTECHNOLOGY International open access bi-monthly journal that covers all aspects of latest research in microbiology and its allied disciplines including bacteriology, virology, mycology and parasitology as well as all aspects of biotechnology in food, medicine, industry, environment, agriculture, therapeutics and cosmetics.
OPEN BIOLOGY Open Biology is the Royal Society's fast, open access journal covering biology at the molecular and cellular level.
RESEARCH JOURNAL OF MICROBIOLOGY Research Journal of Microbiology is a monthly international peer-reviewed journal dedicated to publish and disseminate significant research in the field of microbiology.Journal includes: structure and function, biochemistry, enzymology, metabolism and its regulation, molecular biology, genetics, plasmids and transposons, general microbiology, applied microbiology, genetic engineering, virology, immunology, clinical microbiology, microbial ecology, environmental microbiology, food microbiology, molecular systematics, chemical or physical haracterization of microbial structures or products, and basic biological properties of organisms.
THE JOURNAL OF MICROBIOLOGY, BIOTECHNOLOGY AND FOOD SCIENCES The Journal of Microbiology, Biotechnology and Food Sciences is an Open Access, peer-reviewed online scientific journal published by the Faculty of Biotechnology and Food Sciences (Slovak University of Agriculture in Nitra). The major focus of the journal is publishing regular (original) scientific articles, short communications and reviews from animal, plant and environmental microbiology (including bacteria, fungi, yeasts, algae, protozoa and viruses), microbial, animal and plant biotechnology and physiology, microbial, plant and animal genetics, molecular biology, agriculture and food chemistry and biochemistry, food control, evaluation and processing in food science and environmental sciences.
INDIAN JOURNAL OF MEDICAL MICROBIOLOGY IAMM) journal is peer-reviewed open access publication and published quarterly in January, April, July and October.
JOURNAL OF MICROBIOLOGY AND INFECTIOUS DISEASES Journal of Microbiology and Infectious Diseases (JMID) is a "peer review" medical journal in the field of Microbiology, Infectious Diseases, Virology, Parasitology and Micology. The Journal is published four times a year (March, June, September and December).
MICROORGANISMS Microorganisms is an international, peer-reviewed open access journal which provides an advanced forum for studies related to prokaryotic and eukaryotic microorganisms, viruses and prions. It publishes reviews, research papers and communications. | https://bdugateway.webnode.com/journals/life-sciences/microbiology/ |
CROSS-REFERENCE TO RELATED APPLICATIONS
STATEMENT RE: FEDERALLY SPONSORED RESEARCH/DEVELOPMENT
The present application claims priority to U.S. Provisional Patent Application Ser. No. 62/739,678 entitled Horse Race Betting Graphical User Interface filed Oct. 1, 2018, the disclosure of which is incorporated herein by reference.
Not Applicable
BACKGROUND
1. Technical Field
2. Related Art
The present disclosure relates generally to pari-mutuel horse race betting and, more particularly, to a user interface for generating a ticket for horse race betting.
When betting on a horse race, a bettor typically tries to digest a large amount of information related to the horses running the race, some of which may be continually updated (e.g. on a tote board) as other bettors place bets. In the case of more exotic bets such as daily double or pick 3, 4, 5, 6, the bettor's decision-making process may become even more complex as he or she simultaneously considers multiple consecutive or non-consecutive races. In view of the difficulty of making well-informed bets in one's head or with pencil and paper, various computer-implemented betting tools exist in the marketplace. For example, Daily Racing Form LLC provides an online web application called DRF Bets™ TicketMaker™, available at www.drfticketmaker.com, which allows a user to construct a ticket for placing various types of bets. However, while such conventional betting tools may display published information such as morning line (M/L) odds to assist the user in choosing horses, they do not provide any real advantage to the user beyond convenience.
BRIEF SUMMARY
The present disclosure contemplates various systems, methods, and apparatuses for overcoming the above drawbacks accompanying the related art. One aspect of the embodiments of the present disclosure is a non-transitory program storage medium on which are stored instructions executable by a processor or programmable circuit to perform operations for generating a graphical user interface for horse race betting. The operations include displaying a first list of horses scheduled to run a first race from among a plurality of horses, displaying, in association with each horse of the first list of horses, a win selection element by which a user of the graphical user interface may mark the horse as selected to win the first race, displaying an automatic ticket generation button by which a user may request an automatic selection of horses, and, in response to a user interaction with the automatic ticket generation button, marking one or more horses of the first list of horses as selected to win the first race based on predicted win percentages of the horses of the first list.
The operations may include displaying, in association with each horse of the first list of horses, the predicted win percentage of the horse.
The operations may include displaying, adjacent to the first list of horses, a second list of horses scheduled to run a second race, displaying, in association with each horse of the second list of horses, a win selection element by which a user of the graphical user interface may mark the horse as selected to win the second race, displaying, adjacent to the second list of horses, a third list of horses scheduled to run a third race, displaying, in association with each horse of the third list of horses, a win selection element by which a user of the graphical user interface may mark the horse as selected to win the third race, and, in response to the user interaction with the automatic ticket generation button, further marking one or more horses of the second list of horses as selected to win the second race based on predicted win percentages of the horses of the second list and marking one or more horses of the third list of horses as selected to win the third race based on predicted win percentages of the horses of the third list.
The operations may include displaying, in association with each horse of the first, second, and third lists of horses, the predicted win percentage of the horse.
The operations may include displaying, in association with each horse of the first, second, and third lists of horses, a horse lock element by which a user of the graphical user interface may lock the horse's marked/unmarked status. The marking of one or more horses in response to a user interaction with the automatic ticket generation button may further be based on constraints imposed by a user interaction with the horse lock elements.
The operations may include displaying, in association with the first list of horses, a first leg lock element by which a user of the graphical user interface may lock marked/unmarked status of all horses of the first list of horses, displaying, in association with the second list of horses, a second leg lock element by which a user of the graphical user interface may lock marked/unmarked status of all horses of the second list of horses, and displaying, in association with the third list of horses, a third leg lock element by which a user of the graphical user interface may lock marked/unmarked status of all horses of the third list of horses. The marking of one or more horses in response to a user interaction with the automatic ticket generation button may further be based on constraints imposed by a user interaction with the first, second, and third leg lock elements.
The operations may include displaying a predicted ticket win percentage based on the predicted win percentages of horses marked to win the first, second, and third races, the predicted ticket win percentage being a likelihood that a horse from among the horses marked to win the first race will win the first race, a horse from among the horses marked to win the second race will win the second race, and a horse from among the horses marked to win the third race will win the third race.
The marking of one or more horses in response to a user interaction with the automatic ticket generation button may further be based on constraints imposed by a bet amount and a maximum ticket price. The operations may include displaying a maximum ticket price selector by which a user of the graphical user interface may select the maximum ticket price. The one or more horses marked in response to a user interaction with the automatic ticket generation button may maximize a function of a predicted ticket win percentage without causing a number of bets times the bet amount to exceed the maximum ticket price, the predicted ticket win percentage being a likelihood that a horse from among the horses marked to win the first race will win the first race, a horse from among the horses marked to win the second race will win the second race, and a horse from among the horses marked to win the third race will win the third race. The one or more horses marked in response to a user interaction with the automatic ticket generation button may maximize the predicted ticket win percentage without causing a number of bets times the bet amount to exceed the maximum ticket price.
The operations may include displaying, adjacent to the third list of horses, a fourth list of horses scheduled to run a fourth race, displaying, in association with each horse of the fourth list of horses, a win selection element by which a user of the graphical user interface may mark the horse as selected to win the fourth race, and, in response to a user interaction with the automatic ticket generation button, further marking one or more horses of the fourth list of horses as selected to win the fourth race based on predicted win percentages of the horses of the fourth list. The operations may include displaying a predicted ticket win percentage based on the predicted win percentages of horses marked to win the first, second, third, and fourth races, the predicted ticket win percentage being a likelihood that any of the horses marked to win the first race will win the first race, any of the horses marked to win the second race will win the second race, any of the horses marked to win the third race will win the third race, and any of the horses marked to win the fourth race will win the fourth race.
The operations may include displaying, adjacent to the fourth list of horses, a fifth list of horses scheduled to run a fifth race, displaying, in association with each horse of the fifth list of horses, a win selection element by which a user of the graphical user interface may mark the horse as selected to win the fifth race, and, in response to a user interaction with the automatic ticket generation button, further marking one or more horses of the fifth list of horses as selected to win the fifth race based on predicted win percentages of the horses of the fifth list. The operations may include displaying a predicted ticket win percentage based on the predicted win percentages of horses marked to win the first, second, third, fourth, and fifth races, the predicted ticket win percentage being a likelihood that any of the horses marked to win the first race will win the first race, any of the horses marked to win the second race will win the second race, any of the horses marked to win the third race will win the third race, any of the horses marked to win the fourth race will win the fourth race, and any of the horses marked to win the fifth race will win the fifth race.
The operations may include displaying, adjacent to the fifth list of horses, a sixth list of horses scheduled to run a sixth race, displaying, in association with each horse of the sixth list of horses, a win selection element by which a user of the graphical user interface may mark the horse as selected to win the sixth race, and, in response to a user interaction with the automatic ticket generation button, further marking one or more horses of the sixth list of horses as selected to win the sixth race based on predicted win percentages of the horses of the sixth list. The operations may include displaying a predicted ticket win percentage based on the predicted win percentages of horses marked to win the first, second, third, fourth, fifth, and sixth races, the predicted ticket win percentage being a likelihood that any of the horses marked to win the first race will win the first race, any of the horses marked to win the second race will win the second race, any of the horses marked to win the third race will win the third race, any of the horses marked to win the fourth race will win the fourth race, any of the horses marked to win the fifth race will win the fifth race, and any of the horses marked to win the sixth race will win the sixth race.
The operations may include displaying, in association with each horse of the first list of horses, a second place selection element by which a user of the graphical user interface may mark the horse as selected to finish in second place in the race, displaying, in association with each horse of the first list of horses, a third place selection element by which a user of the graphical user interface may mark the horse as selected to finishing in third place in the race, and, in response to a user interaction with the automatic ticket generation button, further marking one or more horses of the first list of horses as selected to finish in second or third place in the first race based on predicted win percentages of the horses of the first list.
Another aspect of the embodiments of the present disclosure is a method of generating a graphical user interface for horse race betting. The method includes displaying a first list of horses scheduled to run a first race from among a plurality of horses, displaying, in association with each horse of the first list of horses, a win selection element by which a user of the graphical user interface may mark the horse as selected to win the first race, displaying an automatic ticket generation button by which a user may request an automatic selection of horses, and, in response to a user interaction with the automatic ticket generation button, marking one or more horses of the first list of horses as selected to win the first race based on predicted win percentages of the horses of the first list.
Another aspect of the embodiments of the present disclosure is a system for generating a graphical user interface for horse race betting. The system includes a server in communication with a user device and a program storage medium on which are stored instructions executable by the server to perform operations for generating a graphical user interface accessible by the user device via a web browser or mobile application of the user device. The operations include displaying a first list of horses scheduled to run a first race from among a plurality of horses, displaying, in association with each horse of the first list of horses, a win selection element by which a user of the graphical user interface may mark the horse as selected to win the first race, displaying an automatic ticket generation button by which a user may request an automatic selection of horses, and, in response to a user interaction with the automatic ticket generation button, marking one or more horses of the first list of horses as selected to win the first race based on predicted win percentages of the horses of the first list.
Another aspect of the embodiments of the present disclosure is a non-transitory program storage medium on which are stored instructions executable by a processor or programmable circuit to perform operations for generating a graphical user interface for horse race betting. The operations include displaying a first list of horses scheduled to run a first race from among a plurality of horses, displaying, in association with each horse of the first list of horses, one or more eliminator elements by which a user of the graphical user interface may mark the horse as eliminated from consideration with respect to the first race, displaying an automatic ticket generation button by which a user may request an automatic selection of horses, and, in response to a user interaction with the automatic ticket generation button, marking one or more horses of the first list of horses as selected to win the first race based on predicted win percentages of the horses of the first list and constraints imposed by a user interaction with the eliminator elements.
The one or more eliminator elements associated with each horse of the first list of horses may include a race eliminator element by which the user of the graphical user interface may mark the horse as eliminated from consideration for coming in first place in the first race, eliminated from consideration for coming in second place in the first race, and eliminated from consideration for coming in third place in the first race.
The one or more eliminator elements associated with each horse of the first list of horses may include a first place eliminator element by which the user of the graphical user interface may mark the horse as eliminated from consideration for coming in first place in the first race while not being eliminated from consideration for coming in second or third place in the first race. The one or more eliminator elements associated with each horse of the first list of horses may further include a second place eliminator element by which the user of the graphical user interface may mark the horse as eliminated from consideration for coming in second place in the first race while not being eliminated from consideration for coming in first or third place in the first race. The one or more eliminator elements associated with each horse of the first list of horses may further include a third place eliminator element by which the user of the graphical user interface may mark the horse as eliminated from consideration for coming in third place in the first race while not being eliminated from consideration for coming in first or second place in the first race.
The operations may further include displaying, in association with each horse of the first list of horses, one or more single selection elements by which a user of the graphical user interface may mark the horse as singled with respect to the first race. The marking one or more horses in response to a user interaction with the automatic ticket generation button may further be based on constraints imposed by a user interaction with the one or more single selection elements.
BRIEF DESCRIPTION OF THE DRAWINGS
These and other features and advantages of the various embodiments disclosed herein will be better understood with respect to the following description and drawings, in which like numbers refer to like parts throughout, and in which:
FIG. 1
shows an example view of a horse race betting graphical user interface (GUI) according to an embodiment of the present disclosure;
FIG. 2
shows an example horse race betting apparatus according to an embodiment of the present disclosure;
FIG. 3
shows an example operational flow according to an embodiment of the present disclosure;
FIG. 4
shows another example operational flow according to an embodiment of the present disclosure
FIG. 5
shows an example eliminator page of a horse race betting GUI;
FIG. 6
shows an example wager selection page of a horse race betting GUI;
FIG. 7
shows an example questionnaire page of a horse race betting GUI;
FIG. 8
shows an example ticket customization page of a horse race betting GUI;
FIG. 9
shows another example ticket customization page of a horse race betting GUI;
FIG. 10
shows another example operational flow according to an embodiment of the present disclosure;
FIG. 11
shows another example operational flow according to an embodiment of the present disclosure;
FIG. 12
shows an example stable management page of a horse race betting GUI that displays a list of horses running today;
FIG. 13
shows an example stable management page of a horse race betting GUI that displays a list of horses running tomorrow;
FIG. 14
shows an example stable management page of a horse race betting GUI that displays a list of stabled horses;
FIG. 15
shows an example stable management page of a horse race betting GUI that displays a list of horses associated with a trainer; and
FIG. 16
FIG. 2
FIGS. 3, 4, 10, and 11
shows an example of a computer in which the horse race betting apparatus of , the operational flows of , and/or other embodiments of the disclosure may be wholly or partly embodied.
DETAILED DESCRIPTION
The present disclosure encompasses various embodiments of systems, methods, and apparatuses for generating a graphical user interface (GUI) for horse race betting. The detailed description set forth below in connection with the appended drawings is intended as a description of several currently contemplated embodiments, and is not intended to represent the only form in which the disclosed invention may be developed or utilized. The description sets forth the functions and features in connection with the illustrated embodiments. It is to be understood, however, that the same or equivalent functions may be accomplished by different embodiments that are also intended to be encompassed within the scope of the present disclosure. It is further understood that the use of relational terms such as first and second and the like are used solely to distinguish one from another entity without necessarily requiring or implying any actual such relationship or order between such entities.
FIG. 1
FIG. 1
100
100
170
100
100
110
120
130
110
140
150
160
170
180
190
shows an example horse race betting GUI according to an embodiment of the present disclosure. Using the horse race betting GUI , a user wishing to generate a horse race betting ticket may, in addition to manually selecting horses to win, automatically generate a combination of selections that maximizes a function of a predicted ticket win percentage within defined constraints. By supporting the automatic generation of a ticket, the horse race betting GUI may serve an advising function that is absent in conventional betting tools. represents a ticket generator page of the horse race betting GUI , which may include one or more lists of horses, a race selection portion , a list info portion corresponding to each list , a bet amount selector , a maximum ticket price selector , a ticket cost , a predicted ticket win percentage , a clear ticket button , and an automatic ticket generation button .
FIG. 1
110
110
110
110
110
110
110
110
110
110
110
110
110
110
120
In the example of , six lists of horses are shown: a first list including horses named “J K'S GIRL,” “GETHOT STAYHOT,” “PICKY BITS,” “Z LOVELEE LINDA,” and “FROSTY ZEN,” a second list adjacent to the first list and including horses named “SCOTTISH DEVIL,” etc., a third list adjacent to the second list and including horses named “U CALL ME ALEX,” etc., a fourth list adjacent to the third list and including horses named “CHRISTMAS DINNER,” etc., a fifth list adjacent to the fourth list and including horses named “ADIRONDACK DREAM,” etc., and a sixth list adjacent to the fifth list and including horses named “SISTER SPARROW,” etc. Each of the six lists may represent the horses scheduled to run a particular horse race. The lists may be displayed following the user's selection of race(s) using the various selectors in the race selection portion .
FIG. 1
FIG. 1
122
124
126
128
122
124
126
128
120
124
124
126
128
110
130
110
In the example of , the user has selected the date “Jun. 5, 2018” using the date selector , selected the track “FL” using the track selector , selected the bet type “PICK 6” using the bet type selector , and selected “Race 3” as the starting race for consecutive races using the starting race selector . The selectors , , , of the race selection portion may be, for example, drop-down menus as shown, and may allow selection from a list of choices that is dynamically populated with actual race data (which itself may be continually updated) as the user makes selections in any order. For example, the user may first select the date “Jun. 5, 2018,” e.g., by clicking on a date in a calendar or other date selection tool, where dates having no scheduled races may be omitted or indicated as unavailable (e.g. grayed out). When the user subsequently selects a track using the track selector , the previous selection of a date may cause the track selector to populate with only those tracks having races on the selected date. In the same way, the selected date and track may cause the bet type selector to populate only with permitted bet types for that date and track, and the selected date, track, and bet type may cause the starting race selector to populate only with races that could legally serve as the starting race for a ticket under the already selected conditions. In the example, of , for example, if there are only eight scheduled races for the selected date and track, the user's selection of “PICK 6” may limit the possible starting races to Race 1, Race 2, and Race 3 (since there are not six consecutive races beginning with Race 4). Based on the user's selections, lists representing the six consecutive races beginning with Race 3 may be displayed one after the other as shown. The list info portion may include, for each list , the race number (e.g. “R3” meaning Race 3) as well as a corresponding leg number one through six for the pick 6 ticket to be generated.
110
112
110
110
112
FIG. 1
In association with each horse of a given list , in addition to the identifying name (e.g. “FROSTY ZEN”) and number (e.g. “4”) of the horse, a win selection element (e.g. a checkbox) may be displayed by which the user may mark the horse as selected to win the race. In the example of , the first list shows two horses (“J K'S GIRL” and “GETHOT STAYHOT”) marked in this way as selected to win the first race (“R3”), the second list shows only one horse (“SCOTTISH DEVIL”) marked as selected to win the second race (“R4”), etc. A user may manually generate a ticket by clicking on or otherwise interacting with the win selection elements to mark or unmark horses as selected to win their respective races.
100
110
114
110
114
114
110
114
114
114
114
114
FIG. 1
As noted above, the horse race betting GUI may serve an advising function. To this end, in association with each horse of a given list , a predicted win percentage of the horse may be displayed. For example, in the first list shown in , “FROSTY ZEN” has a predicted win percentage of only 1%, while “J K'S GIRL” has a predicted win percentage of 45%. As shown, the horses of each list may be ordered according to their predicted win percentages , with the higher predicted win percentages appearing first. The predicted win percentage of a horse may represent the likelihood that the horse will win the race as determined according to any algorithm (e.g. any machine learning algorithm) on the basis of publicly available information. By reviewing the predicted win percentages of the horses running one or more races, the user may make a more informed decision when selecting horses to win each race. The user may, for example, compare the predicted win percentages to morning line odds and/or live odds in an effort to find horses that are being undervalued (overlays) or overvalued (underlays) by the public.
140
150
120
140
150
140
150
140
150
120
FIG. 1
The user may further input a bet amount using the bet amount selector and a maximum ticket price using the maximum ticket price selector . Like the selectors of the race selection portion , the bet amount selector and the maximum ticket price selector may be, for example, drop-down menus, and may allow selection from a list of choices. In the example of , the bet amount selector is a drop-down menu and the maximum ticket price selector is an input field in which the user may enter any value that is equal to or greater than the selected bet amount. Since different tracks may allow different minimum bet amounts on different dates and for different bet types and races, it is contemplated that the bet amount selector (and possibly the maximum ticket price selector ) may be dynamically populated depending on the selections made in the race selection portion .
FIG. 1
114
112
160
170
114
170
114
In the example of , the user has input a bet amount of $2.00 and a maximum ticket price of $200. In the case of a pick 6 ticket as shown, the bet amount of $2.00 may designate the cost of a single set of six horse selections, one for each of legs 1 through 6. So, for instance, if a user were to mark the top-listed horse in each race (i.e. the horse having the highest predicted win percentage ) as selected to win using the win selection elements , the user could manually produce a ticket costing $2.00 for placing a bet that “J K'S GIRL,” “SCOTTISH DEVIL,” “U CALL ME ALEX,” “CHRISTMAS DINNER,” “ADIRONDACK DREAM,” and “SISTER SPARROW” will each come in first in their respective races. The resulting ticket cost of $2.00 may be displayed as the ticket cost , and a predicted ticket win percentage may be displayed based on the predicted win percentages of the selected horses. For example, the predicted ticket win percentage may be calculated by multiplying the probabilities represented by the predicted win percentages , e.g., 0.45*0.40*0.22*0.30*0.26*0.27≈0.083%.
160
170
160
170
By way of illustration, if the user were then to add a single mark selecting “American Tzar” as an alternative horse to win in Leg 3, the user could produce a ticket costing $4.00 for placing the resulting two bets, one bet on “J K'S GIRL,” “SCOTTISH DEVIL,” “U CALL ME ALEX,” “CHRISTMAS DINNER,” “ADIRONDACK DREAM,” and “SISTER SPARROW” and one bet on “J K'S GIRL,” “SCOTTISH DEVIL,” “AMERICAN TZAR,” “CHRISTMAS DINNER,” “ADIRONDACK DREAM,” and “SISTER SPARROW.” The resulting ticket cost of $4.00 may be displayed as the ticket cost , and the predicted ticket win percentage may be updated to reflect the sum of the probabilities of the two possible combinations of horses, e.g., 0.45*0.40*(0.22+0.20)*0.30*0.26*0.27≈0.159%. If the user were then to further add a single mark selecting “FORBIDDEN WAY” as an alternative horse to win in Leg 5, the user could produce a ticket costing $8.00 for placing the resulting four bets, one bet on “J K'S GIRL,” “SCOTTISH DEVIL,” “U CALL ME ALEX,” “CHRISTMAS DINNER,” “ADIRONDACK DREAM,” and “SISTER SPARROW,” one bet on “J K'S GIRL,” “SCOTTISH DEVIL,” “AMERICAN TZAR,” “CHRISTMAS DINNER,” “ADIRONDACK DREAM,” and “SISTER SPARROW,” one bet on “J K'S GIRL,” “SCOTTISH DEVIL,” “U CALL ME ALEX,” “CHRISTMAS DINNER,” “FORBIDDEN WAY,” and “SISTER SPARROW,” and one bet on “J K'S GIRL,” “SCOTTISH DEVIL,” “AMERICAN TZAR,” “CHRISTMAS DINNER,” “FORBIDDEN WAY,” and “SISTER SPARROW.” The resulting ticket cost of $8.00 may be displayed as the ticket cost , and the predicted ticket win percentage may be updated to reflect the sum of the probabilities of the four possible combinations of horses, e.g., 0.45*0.40*(0.22+0.20)*0.30*(0.26+0.19)*0.27≈0.276%.
100
110
132
130
110
114
132
132
132
Along the same lines, the horse race betting GUI may include, in association with each list , a predicted leg win percentage , which may be a value displayed in the leg info portion of each list representative of the sum of the predicted win percentages of the selected horses in that leg. The predicted leg win percentage may provide an indication of the chances that that particular race will be won by one of the user's selected horses. The user may, for example, wish to select horses such that all legs exceed some predicted leg win percentage , e.g., all legs have a predicted leg win percentage greater than 50%.
100
190
100
110
114
170
140
150
100
170
170
FIG. 1
If the user would like the horse race betting GUI to advise on which horses to select for an optimal ticket, the user may click the automatic ticket generation button to request an automatic selection of horses. In response, the horse race betting GUI may mark one or more horses of each of the first, second, third, fourth, fifth, and sixth lists as selected to win based on the predicted win percentages of the horses. In a simple case, the automatically generated selections may maximize the predicted ticket win percentage without causing the number of bets times the bet amount to exceed the maximum ticket price . So, in the example shown in , where the user has input $2.00 as the bet amount and $200 as the maximum ticket price, the horse race betting GUI may select a combination of horses that maximizes the predicted ticket win percentage without exceeding 100 bets (since more than 100 bets times $2.00/bet would exceed $200). More generally, the automatically generated selections may maximize some function of the predicted ticket win percentage , as described in more detail below, within various constraints.
FIG. 1
190
100
160
170
112
110
130
112
110
134
130
110
180
160
170
In the example of , the user has clicked the automatic ticket generation button and, as a result, the horse race betting GUI has selected the first two horses in Leg 1, the first horse in Leg 2, the first four horses in Leg 3, the first five horses in Leg 4, the first two horses in Leg 5, and the first four horses in Leg 6, resulting in a ticket cost of $192.00 and a predicted ticket win percentage of 4.07%. The automatically selected horses may be indicated by their respective win selection elements , e.g., by displayed checkmarks as shown, allowing the user to easily review the selections. For convenience, the number of selections in each list of horses may also be displayed, e.g., in the corresponding list info portion as shown (e.g. “2 horse(s)”). The user may then modify the automatic selections as he/she sees fit. For example, the user may unmark and/or mark additional win selection elements . The user may also clear an entire leg (i.e. remove all selections from a particular list ) using a clear leg button in the corresponding list info portion . The user may clear the entire ticket (i.e. remove all selections from all lists ) using a clear ticket button . As the user makes changes, the ticket cost and predicted ticket win percentage may be automatically updated to reflect the newly selected combination of horses.
100
100
116
190
114
112
116
112
116
FIG. 1
The user may wish to produce a hybrid manually/automatically generated ticket by introducing desired constraints for the horse race betting GUI to take into consideration when automatically generating selections. To this end, the horse race betting GUI may include, in association with each horse, a horse lock element by which the user may lock the horse's marked/unmarked status. For example, after automatically generating the ticket shown in using the automatic ticket generation button , the user may decide to make some changes upon reviewing the selections. For example, the user may have done some independent research on “PICKY BITS” in Leg 1 and may feel that the predicted win percentage of 16% should be higher. The user may therefore click the win selection element associated with “PICKY BITS” to mark “PICKY BITS” as selected to win and also click the horse lock element associated with “PICKY BITS” to lock the marked status of this individual horse. At the same time, the user may dislike the name “SCOTTISH DEVIL” in Leg 2 and may therefore unmark “SCOTTISH DEVIL” using the associated win selection element and lock the horse's unmarked status using the horse lock element .
190
100
116
170
100
160
160
170
Wishing to apply these manual selections as constraints in an automatically generated ticket, the user may then click the automatic ticket generation button again. In response, the horse race betting GUI may again mark one or more horses as selected to win, this time based on the additional constraints imposed by the horse lock elements . For example, the automatically generated selections may maximize the same function of the predicted ticket win percentage with the same constraints imposed by the bet amount and maximum ticket price, but further with the additional requirements that “PICKY BITS” be selected in Leg 1 and that “SCOTTISH DEVIL” not be selected in Leg 2. As a result, the user may find that the horse race betting GUI has made various changes since the previous automatically generated selections. For instance, the algorithm may choose several other horses in Leg 2 to replace the eliminated “SCOTTISH DEVIL” and may deselect one or more horses in other legs in order to keep the ticket cost within the maximum ticket price. The user may then review the new ticket cost and the new predicted ticket win percentage .
100
136
130
110
136
116
136
136
116
The horse race betting GUI may further include a leg lock element associated with each leg, e.g., in the list info portion of each list as shown. By interacting with the leg lock element for a given leg, the user may simultaneously lock the marked/unmarked statuses for all horses in that leg. The horse lock elements and leg lock elements may change appearance to indicate that a given horse or leg is locked, for example, transitioning from an icon of an unlocked padlock as shown to an icon of a locked padlock. Clicking on a leg lock element may cause all of the horse lock elements to simultaneously transition to indicate that all horses of that leg are locked.
100
FIG. 1
The horse race betting GUI may further include various links, tabs, buttons, etc. for navigation to additional pages. For example, as shown in the example of , information buttons denoted by a small “i” may be used to display a pop-up window or otherwise navigate to additional detailed information about a particular horse (e.g. detailed statistics of the horse) or a particular race (e.g. detailed information about the race). Other pages may include options menus, user profile/statistics pages, links to external websites, etc.
FIG. 2
200
200
300
100
200
210
220
230
240
250
260
shows an example horse race betting apparatus according to an embodiment of the present disclosure. The horse race betting apparatus may be a server or a combination of networked servers that interacts with a web browser or mobile application of a user device in order to generate the horse race betting GUI described above. The horse race betting apparatus may include a user I/O interface , a ticket updater , a race data storage , a horse win percentage calculator , a horse selector , and a selection algorithm data storage .
210
300
100
122
124
126
128
120
140
150
112
100
190
116
136
134
180
100
100
100
100
200
100
210
100
100
210
200
300
FIG. 1
FIG. 1
FIG. 1
The user I/O interface may receive data from and transmit data to a web browser or mobile application of a user device . Input data may include, for example, user interaction data of a user with the horse race betting GUI , such as selections of date, track, bet type, and race(s) using the selectors , , , of the race selection portion , selections of bet amount and maximum ticket price using selectors , , manual selections of horses using horse win selection elements , requests for the horse race betting GUI to automatically generate a ticket using the automatic ticket generation button , and interactions with the horse lock elements , leg lock elements , clear leg buttons , clear ticket button , and any other links, tabs, buttons, etc. of the horse race betting GUI (e.g. the information buttons shown in or other buttons for navigating to other pages). Input data may further include data associated with navigation to the page shown in from a homepage of the horse race betting GUI , preference selection related to the horse race betting GUI , login information, or other data entered on a previous page of the horse race betting GUI , in response to which the horse race betting apparatus may display the elements of the horse race betting GUI described in relation to . Output data of the user I/O interface may include data to be interpreted by a web browser or mobile application in the generation of a functional display in accordance with the horse race betting GUI described herein. In this regard, it should be noted that the terms “displaying,” “generating,” “listing,” “populating,” “marking,” “updating,” etc. as used herein with respect to elements of the horse race betting GUI may include the outputting of data from the user I/O interface or another component of the horse race betting apparatus for use by a user device .
210
220
110
230
100
300
122
124
126
128
120
100
222
220
230
110
300
122
124
126
128
222
230
122
124
126
128
FIG. 1
FIG. 1
Based on the input data received by the user I/O interface , the ticket updater may return one or more lists of horses as shown in . For example, the race data storage may store race data from many race tracks, including race schedules, permitted bet types, permitted bet amounts, etc. and any other information to be displayed by the horse race betting GUI (e.g. individual horse statistics of a plurality of horses as may be purchased from a provider of horse racing data such as TrackMaster®). When a user of a user device makes a set of selections using the selectors , , , of the race selection portion of the horse race betting GUI , a list generator of the ticket updater may query the race data storage for the race(s) matching the user's selections and return the associated list(s) of horses for display on the user device as shown in . In some cases, as described above, the selectors , , , may be dynamically populated with selectable choices as selections are made. In such cases, the list generator may make a series of queries to the race data storage as the user's selections are made and return intermediate query results (e.g. a list of tracks having races on a selected date, a list of dates on which a selected track has races, etc.) for use in dynamically populating the selectors , , , .
230
110
100
In view of the fact that horses' statistics change over time, the race data in the race data storage may be continually updated, e.g., over a network such as the Internet. It is also sometimes the case that the list of horses running a particular race may change for various reasons (e.g. an injury) in the days leading up to the race. In this regard, it is contemplated that a horse that is no longer running a race may still be displayed in the list on the horse racing data GUI , e.g., with a symbol such as a strikethrough to indicate that the horse is no longer running the race and cannot be selected.
222
220
224
226
224
140
160
112
224
160
224
150
160
224
160
160
224
160
112
In addition to the list generator , the ticket updater may further include a ticket cost module and a lock module . The ticket cost module may, in response to a user's interaction with the bet amount selector , apply the user's selection of the bet amount to calculate or update the ticket cost . For example, as the user manually selects horses using the horse win selection elements , the ticket cost module may multiply the resulting number of bets (e.g. number of combinations of one selected horse per leg) by the bet amount to calculate the ticket cost . In some cases, the ticket cost module may further refer to the user's selection of a maximum ticket price using the maximum ticket price selector . For example, if the calculated ticket cost exceeds the selected maximum ticket price, the ticket cost module may update the display of the ticket cost in various ways to warn the user, e.g., displaying the ticket cost in a different color such as red, displaying a pop-up cautionary warning, etc. In some cases, the ticket cost module may even prevent the user from manually selecting horses that would result in the calculated ticket cost exceeding the selected maximum ticket price, e.g. by deactivating the horse win selection elements to disallow further manual selections.
226
220
110
116
136
200
226
112
112
112
116
136
The lock module of the ticket updater may manage the user's selections to lock the marked/unmarked status of individual horses and/or lists based on the user's interaction with the horse lock elements and/or leg lock elements . Such lock selections (including the marked/unmarked status) may be referred to by the horse race betting apparatus when automatically generating a ticket as described in more detail below. In some cases, the lock module may enforce the user's lock selections to prevent manual marking/unmarking of horse win selection elements . For example, the user may be prevented from modifying the horse win selection element of a horse or those of a leg (and the relevant horse win selection element(s) may, for example, be grayed out) until the user unlocks the corresponding horse lock element or leg lock element .
240
114
114
230
240
114
114
114
220
110
222
114
100
240
114
250
200
FIG. 1
The horse win percentage calculator may calculate predicted win percentages of the horses in each of a plurality of scheduled races. As noted above, the predicted win percentage of a horse may represent the likelihood that the horse will win a given race as determined according to any algorithm (e.g. machine learning algorithms) on the basis of publicly available information. For example, relevant data may be obtained from a provider of horse racing data such as TrackMaster® and stored in the race data storage . Based on such data, the horse win percentage calculator may input any combination of various data features (e.g. age of horse, horse's track record, jockey's track record, trainer's track record, etc.) into an algorithm whose output is the predicted win percentage . For example, past race data can be used to process past horses into arrays of data features (e.g. evaluated to −1, 0, and 1), and the race results can be used to train a Support Vector Machine (SVM) to predict horse finish order based on the data features. The SVM can then be used to predict future horse finish order and generate predicted win percentages based on the same data features as applied to future races. A corresponding predicted win percentage may thus be provided to the ticket updater for each horse in each of the lists generated by the list generator , such that the predicted win percentages may be displayed on the horse race betting GUI as shown in . The horse win percentage calculator may further provide the predicted win percentages to the horse selector for use in the automatic selection of horses by the horse race betting apparatus .
110
300
112
220
112
114
240
220
170
220
160
224
226
With the lists displayed on the user device , the user may manually mark horses as selected to win using the horse win selection elements . As the user marks horses in this way, the ticket updater may update the display to indicate that the horses are marked (e.g. displaying a checkmark with respect to the corresponding horse win selection element ). Based on the predicted win percentages calculated by the horse win percentage calculator , the ticket updater may further calculate and display a predicted ticket win percentage as described above. The ticket updater may further display the ticket cost calculated by the ticket cost module as well as any lock selections managed by the lock module .
250
190
210
250
260
250
114
110
222
250
224
226
250
170
250
170
170
160
170
160
160
170
160
170
160
190
200
260
100
FIG. 1
The horse selector may determine an optimal selection of horses in response to the user's interaction with the automatic ticket generator button . For example, upon receiving a command to perform automatic ticket generation from the user I/O interface , the horse selector may select one or more horses in accordance with a selection algorithm stored in the selection algorithm data storage . To this end, the horse selector may receive, as inputs to the selection algorithm, the predicted win percentages calculated for each horse of each of the list(s) generated by the list generator , along with various constraints. For example, the horse selector may receive, from the ticket cost module , the bet amount and maximum ticket price selected by the user and may further receive, from the lock module , the lock selections of the user. The horse selector may then select one or more horses so as to maximize a function of the predicted ticket win percentage without causing a number of bets times the bet amount to exceed the maximum ticket price and without altering the marked/unmarked status of any locked horses or horses in locked legs. In the simplest case, the horse selector may maximize the predicted ticket win percentage itself. However, a user may in some cases be better served by maximizing a function of predicted ticket win percentage and ticket cost , for instance. As an example, while the maximized predicted ticket win percentage of 4.07% may be achieved as shown in according to selections resulting in a ticket cost of $192.00, it may be the case that a significant reduction in ticket cost would only reduce the predicted ticket win percentage by a small amount. In such case, an algorithm that took into consideration the ticket cost and selected horses that resulted in a high predicted ticket win percentage and a low ticket cost may be optimal. It is also contemplated that the selection algorithm may further take into consideration an expected payout, e.g., as determined by morning line odds or live odds at the time the automatic ticket generation button is clicked. The horse race betting apparatus may include various selection algorithms in the selection algorithm data storage , and the horse race betting GUI may allow the user to choose a preferred algorithm from an options menu.
220
100
250
220
112
114
240
220
170
220
160
224
The ticket updater may update the horse race betting GUI to reflect the automatic selections made by the horse selector . For example, the ticket updater may update the display to indicate that the automatically selected horses are marked (e.g. displaying a checkmark with respect to the corresponding horse win selection elements ). Based on the predicted win percentages calculated by the horse win calculator , the ticket updater may further recalculate and display an updated predicted ticket win percentage . The ticket updater may further display an updated ticket cost calculated by the ticket cost module based on the automatically selected horses.
210
100
220
110
114
130
110
150
160
210
100
122
124
126
128
120
140
150
180
190
300
200
100
As described above, the user I/O interface may output data to be interpreted by a web browser or mobile application in the generation of a functional display in accordance with the horse race betting GUI described herein. Such data may include data that is output, updated, or managed by the ticket updater , such as data for displaying one or more lists , including predicted win percentages , horse selections (whether manually or automatically determined), and lock selections, as well as data for displaying list info portions associated with the lists , a predicted ticket win percentage , and a ticket cost . Data output by the user I/O interface may also include various data for displaying other static and dynamic elements of the horse race betting GUI , including, for example, the selectors , , , of the race selection portion , bet amount selector , maximum ticket price selector , clear ticket button , and automatic ticket generation button . By communicating such data to a web browser or mobile application of a user device (e.g. over a network such as the Internet), the horse race betting apparatus may be regarded as displaying, generating, listing, populating, marking, updating, etc. the various elements of the horse race betting GUI .
FIG. 3
FIG. 1
FIG. 2
FIG. 1
100
200
200
110
310
112
320
114
330
116
136
110
340
140
350
150
360
190
370
114
380
170
390
310
390
122
124
126
128
120
100
shows an example operational flow according to an embodiment of the present disclosure. Referring by way of example to the horse race betting GUI shown in and the horse race betting apparatus shown in , the horse race betting apparatus may, in any order or simultaneously in whole or in part, display one or more lists of horses (step ), display a win selection element in association with each horse (step ), display a predicted win percentage in association with each horse (step ), display a horse lock element in association with each horse and/or a leg lock element in association with each list of horses (step ), display a bet amount selector (step ), display a maximum ticket price selector (step ), display an automatic ticket generation button (step ), automatically mark one or more horses as selected to win based on the predicted win percentages (step ), and display a predicted ticket win percentage (step ). Steps - may be preceded by a user's selection of one or more races using selectors , , , of a race selection portion , as well as by preference selection, login, navigation, etc. prior to the arrival of the user at the ticket generator page of the horse race betting GUI shown in .
310
390
100
300
122
124
126
128
120
200
110
310
112
320
114
330
116
136
340
222
220
110
230
110
222
110
240
114
200
140
350
150
360
190
370
112
200
170
390
190
250
200
110
260
220
100
170
390
200
160
140
150
FIG. 1
As an exemplary use case of steps -, a user of the horse race betting GUI may arrive at the page shown in following login and/or navigation using a web browser or mobile application on a user device such as a smart phone, tablet, or personal computer. In response to the user's selection of a date, track, bet type, and starting race using the selectors , , , of the race selection portion , the horse race betting apparatus may display one or more lists of horses corresponding to the user's selections (step ), along with corresponding win selection elements (step ), predicted win percentages (step ), and horse/leg lock elements / (step ). For example, the list generator of the ticket updater may retrieve the relevant lists from the race data storage in response to the user's selections, along with additional information such as morning line or live odds (e.g. 6/5 for “J K'S GIRL”), horse/jockey/trainer statistics, etc. with which to populate the list and/or details pages for each horse (e.g. pages accessible via an information button or other link). The list generator may further pass the lists to the horse win percentage calculator , which may calculate the predicted win percentages of each horse for the display. The horse race betting apparatus may further display a bet amount selector (step ), a maximum ticket price selector (step ), and an automatic ticket generation button (step ). As the user selects horses using the win selection elements , the horse race betting apparatus may display or update the predicted ticket win percentage based on the user's manual selections (step ). At some point, the user may wish to generate an automatic ticket, so the user may click the automatic ticket generation button . In response, the horse selector of the horse race betting apparatus may automatically generate selections of horses for each of the lists according to an algorithm stored in the selection algorithm data storage . The ticket updater may update the horse race betting GUI to mark the automatically selected horses and may update the predicted ticket win percentage based on the automatic selections (step ). The horse race betting apparatus may further display or update the ticket cost based on the user's manual or automatic selections and on the user's input in the bet amount selector and maximum ticket price selector .
200
When the user is satisfied with the selection of horses, the user may wish to finalize the ticket. Features supporting the finalization of a ticket may include, for example, an option to print the ticket, save the ticket locally or on a remote server, submit/purchase the ticket (e.g. via a link to a third-party website or a third-party API providing direct bet placement functionality), etc. The horse race betting apparatus may further store records of such finalized tickets, which may be used to generate betting statistics/feedback associated with the particular user.
FIG. 4
FIG. 3
FIG. 3
FIG. 1
380
250
200
110
260
114
224
226
250
410
226
420
224
170
430
140
150
410
420
430
shows another example operational flow according to an embodiment of the present disclosure, detailing example sub-steps of step of . As noted above with respect to , the horse selector of the horse race betting apparatus may automatically generate selections of horses for each of the lists according to an algorithm stored in the selection algorithm data storage . Such automatic selection algorithm may take into account, in addition to the predicted win percentages of each individual horse, various constraints imposed by the ticket cost module and lock module in accordance with the user's input bet amount, maximum ticket price, and lock selections. The horse selector may apply a lock selection constraint (step ) based on the user's lock selections managed by the lock module and may apply a bet amount/maximum ticket price constraint (step ) based on the user's bet amount and maximum ticket price inputs managed by the ticket cost module . For example, in the example of , the automatically generated selections may maximize a function of the predicted ticket win percentage (step ) without causing the number of bets times the bet amount to exceed the maximum ticket price and without altering any of the locked selections. Steps , , and may be performed in any order or simultaneously, depending on the specifics of the algorithm.
100
126
100
110
110
100
112
110
190
200
110
114
160
170
114
200
170
FIG. 1
In the example horse race betting GUI shown in , the user has selected “PICK 6” using the bet type selector . However, the disclosure is not intended to be limited to the “PICK 6” bet type. In the case of other horizontal bet types (e.g. daily double, PICK 3, PICK 4, PICK 5), the horse race betting GUI may function as described above, with the number of lists varying depending on the number of races/legs associated with the bet type. In this regard, it should be noted that every feature described above in relation to the “PICK 6” bet type may equally apply in the case of other horizontal bet types as well as to vertical bet types. In a case where a user selects a vertical bet type for a single race (e.g. exacta, trifecta, superfecta, quinella), a single list may be displayed on the horse race betting GUI and, depending on the bet type, additional selection buttons may be displayed in addition to the win selection element . For example, separate first place, second place, and third place selection elements may be displayed in association with each horse of the list . By interacting with the first place, second place, and third place selection elements of each horse, a user may mark one or more horses as selected to finish in first, second, or third place in the race. In response to a user interaction with the automatic ticket generation button , the horse race betting apparatus may automatically mark one or more horses of the list as selected to finish in first place, second place, or third place the race based on the predicted win percentages of the horses. A ticket cost and predicted ticket win percentage may be calculated based on the manual or automatic selections according to the rules of the bet type. It is further contemplated that, in addition to the predicted win percentage of each horse, a predicted second place percentage and a predicted third place percentage may be displayed and/or used by the horse race betting apparatus to automatically select horses (e.g. when maximizing a function of a predicted ticket win percentage with constraints as described above). It is contemplated that additional finishing position selection elements may also be included, such as fourth place selection elements, fifth place selection elements, etc.
FIG. 5
FIG. 5
500
500
500
500
510
520
530
540
shows an example horse race betting GUI according to an embodiment of the present disclosure. Using the horse race betting GUI , a user wishing to generate one or multiple horse race betting tickets may, in addition to making manual selections, follow a step-by-step process to automatically generate a combination of selections that maximizes a function of a predicted ticket win percentage within defined constraints. By supporting the automatic generation of one or more tickets, the horse race betting GUI may serve an advising function that is absent in conventional betting tools. represents an eliminator page of the horse race betting GUI , which may include a list of horses, a race selection portion , a race navigator , and a ticket generation navigator .
FIG. 5
FIG. 5
500
510
510
510
520
530
510
The eliminator page shown in may allow a user of the horse race betting GUI to globally eliminate one or more horses so that they will not appear in any automatically generated tickets. In the example of , a list of horses is shown including horse number 1 (named “Cawboybandido”), horse number 2 (named “Hehasspirit”), horse number 3 (named “White Russsian”), horse number 4 (named “Fortunate Stoli”), horse number 5 (named “Fine Fine Borrachito”), horse number 6 (named “El Tormenta Perfecta”), horse number 7 (named “Latigo Sun”), and horse number 8 (“Peewaden”). The list may represent the horses scheduled to run a particular horse race, in this case “RACE 1” at the “Los Alamitos” track on the date “Dec. 12, 2018” as displayed. The list may be displayed following the user's selection of a race using the various selectors in the race selection portion . The user may also navigate between races associated with the selected track/date using the race navigator , e.g., by clicking R2 (i.e. Race 1), R3 (i.e. Race 3), etc. As the user navigates between races, a different list corresponding to the selected race may be displayed. As noted above, it may sometimes be the case that the horses running a particular race changes for various reasons (e.g. an injury) in the days leading up to the race. In this example, horse 8 is such a horse and thus appears with a strikethrough to indicate that the horse is no longer running the race.
FIG. 5
FIG. 1
FIG. 5
522
524
526
522
524
526
520
122
124
128
120
524
526
526
522
524
526
510
530
530
In the example of , the user has selected the date “Dec. 12, 2018” using the date selector , selected the track “Los Alamitos” using the track selector , and selected “RACE 1” using the race selector . The selectors , , of the race selection portion may be dynamically populated drop-down menus that function in the same way as the selectors , , of the race selection portion of . In the example of , the user is in the process of selecting a track from a list of tracks (“Albuquerque,” “Arlington Park,” etc.) using the track selector , after which the user might click the race selector to collapse the list of tracks and expand a list of races below the race selector . It is also contemplated that the words “Select Date,” “Select Track,” and “Race” of the selectors , , may only appear when no selection has been made and may be replaced with the user's selections as they are made. Based on the user's selections, a list representing the selected race may be displayed as shown. The race navigator may allow the user to thereafter navigate to other races at the same track on the same date (e.g. R2 through R14) without changing the selected race. The race navigator may be displayed as tabs/pages as shown, as a drop-down menu, etc.
510
512
512
512
500
512
500
In association with each horse of a given list , in addition to the identifying name (e.g. “Cawboybandido”) and number (e.g. “1”) of the horse, one or more eliminator elements (e.g. checkboxes) may be displayed by which the user may mark the horse as eliminated from consideration for coming in first place in the race (“1st”), coming in second place in the race (“2nd”), coming in third place in the race (“3rd”), or a combination thereof. For example, if the user wanted to eliminate “Cawboybandido” from consideration for placing in the race (i.e. coming in first or second place), the user could mark the eliminator elements labeled “1st” and “2nd” corresponding to “Cawboybandido.” In the example shown, the user wants to eliminate “Cawboybandido” from all consideration, so the user has marked the eliminator element labeled “ALL” corresponding to “Cawboybandido.” As a result, the horse race betting GUI will not select “Cawboybandido” when automatically generating a ticket. In this way, the user may navigate through the races at a given track on a given date and eliminate one or more horses in each race. It is further contemplated that additional eliminator elements may be included as well, for example, for fourth place, fifth place, etc. The eliminations may apply globally to any ticket generated using the horse race betting GUI .
500
510
514
510
514
514
514
510
510
514
514
514
114
514
FIG. 1
FIG. 1
As noted above, the horse race betting GUI may serve an advising function. To this end, in association with each horse of a given list , a predicted win percentage of the horse may be displayed. For example, in the list for Race 1 shown in , “Cawboybandido” has a predicted win percentage of only 37.0%, while “Hehasspirit” has a predicted win percentage of only 2.5%. The highest predicted win percentage of each list may be highlighted so as to be noticeable to the user. In addition, the horses of the list may be ordered according to their predicted win percentages using sort buttons (e.g. downward facing arrow next to “WIN %”), with the higher predicted win percentages appearing first. The predicted win percentage of a horse may be the same as the predicted win percentage discussed above with respect to . By reviewing the predicted win percentages of the horses running one or more races, the user may make a more informed decision when eliminating horses.
516
510
516
516
200
500
516
516
FIG. 5
A trouble indicator may also appear in association with some of the horses in the list . The trouble indicator may indicate that the corresponding horse experienced some unusual difficulty in its previous race, such as tiring early, falling down, or losing a rider. Unlike conventional race statistics, which might include descriptions of such unusual difficulties together with uneventful descriptions for other horses (e.g. even pace, good finish, etc.), the trouble indicator may be provided only for unusual difficulty (e.g. for horses 3 and 7 in ) while being absent for horses that experienced no unusual difficulty (e.g. horses 1, 2, 4-6, and 8). To this end, a list of significant words or phrases may be stored in a database of the horse race betting apparatus , and the horse race betting GUI may display the trouble indicator only when published information about a horse's past race includes a word or phrase on the list. In this way, the user can more quickly and easily notice which horses might require special consideration. As shown, the trouble indicator itself might be only a symbol (e.g. an exclamation point), which may then be clicked or rolled-over to navigate to a details page (e.g. pop-up window) showing the details of the trouble that the horse experienced.
510
518
518
518
518
518
The list of horses may also include a strength of race (SOR) for each horse. The SOR , which may be presented for a previous race and/or as an average, may be a numerical representation of how competitive a given race was. For example, a race with a higher SOR may indicate that the horses in that race were generally stronger than those in a race with a lower SOR . The SOR may be calculated based on a variety of factors, for example, the win/loss records of the horses in the race, the money earned on the race, the monetary values (e.g. claiming amounts) of the horses, etc.
540
500
540
540
FIG. 5
The ticket generation navigator may be a series of tabs or other tool for navigating through the process of generating one or more tickets using the horse race betting GUI . As shown in , a portion of the ticket generation navigator labeled “1. Eliminate” is highlighted, indicating that the user is currently on the eliminator page. As shown, later parts of the process include “2. Wagers,” “3. Questionnaire,” and “4. Get Ticket(s).” When the user has finished making any desired eliminations on the eliminator page, the user may click the next part of the process, e.g. “2. Wagers,” or may click a “Next” button (not shown) or a “Start Wagers” button to be directed to the next part of the process. It is contemplated that a user need not be constrained to the specific order set out in the ticket generation navigator and may freely backtrack to earlier steps of the process as well as jump around and skip steps.
FIG. 6
FIG. 5
500
520
540
550
560
500
540
500
500
550
552
554
556
represents a wager selection page of the horse race betting GUI , which may include, in addition to the race selection portion and ticket generation navigator , a wager selector and a race summary . A user of the horse race betting GUI may, for example, navigate to the wager selection page using the ticket generation navigator after choosing eliminations using the eliminator page described in relation to . The wager selection page of the horse race betting GUI may allow a user of the horse race betting GUI to select a wager type, bet amount, and budget for the automatic generation of one or more tickets. To this end, the wager selector may include a bet type selector , a bet amount selector , and a budget selector .
552
552
126
100
552
500
500
526
520
552
FIG. 1
The bet type selector may allow the user to select from among various bet types, which in some cases may include both horizontal and vertical bet types. In the example of , the bet type selector (e.g. radio buttons under the heading “SELECT WAGER”) allows selection from among horizontal bet types including Daily Double, Pick 3, Pick 4, Pick 5, and Pick 6 as well as vertical bet types including Exacta, Trifecta, Superfecta, and Super Hi 5. As described above with respect to the bet type selector of the horse race betting GUI , the bet type selector of the horse race betting GUI may be populated with permitted bet types for the selected date, track, and race. In the case of horizontal bet types, which involve multiple races, the horse race betting GUI may interpret the selected race as the first leg of the horizontal bet. So, for example, if the user selected Race 4 using the race selector of the race selection portion , a selection of Pick 3 using the bet type selector may result in Races 4, 5, and 6 as the selected races for one or more Pick 3 tickets.
554
140
100
554
554
FIG. 6
The bet amount selector (e.g. radio buttons under the heading “DENOMINATION”) may allow the user to input a bet amount and may be the same as the bet amount selector described in relation to the horse race betting GUI . In the example shown in , the bet amount selector includes an “Other” option, which may allow the user to input bet amounts that are not specifically listed. For example, in a case where any bet amount is permitted as long as it is not below a minimum bet amount, the bet amount selector may list several bet amounts spaced according to typical betting practices of users (e.g. $0.15, $0.20, $0.50, $1.00, $2.00) with the “Other” option allowing the user to select an atypical amount.
556
556
150
100
500
556
554
556
140
150
100
The budget selector may allow the user to enter the user's own budget, i.e. the maximum amount that the user would like to spend on the generation of one or more tickets. The budget selector may be the same as the maximum ticket price selector described in relation to the horse race betting GUI . However, in the case of the horse race betting GUI , it is further contemplated that multiple tickets may be automatically generated for the user. As such, the budget selector may be used to input a total budget that is the user's maximum for a plurality of tickets, which may be generated as described in more detail below. As described above, since different tracks may allow different minimum bet amounts on different dates and for different bet types and races, it is contemplated that the bet amount selector and budget selector , like the bet amount selector and maximum ticket price selector of the horse race betting GUI , may be dynamically populated depending on other selections made by the user.
560
522
524
526
552
560
562
564
514
560
552
560
568
560
512
530
FIG. 6
FIG. 5
The race summary (partially covered in ), may be a summary display of the races currently selected according to the user's selections. For example, in a case where the user has selected the date “12/12/18” using the date selector , selected the track “Los Alamitos” using the track selector , selected Race 1 using the race selector , and selected Pick 3 using the bet type selector , the race summary may show summary views (e.g. horse numbers , horse names , and win percentages as shown) of Races 1, 2, and 3 on that date at that track. The race summary may further change as the user selects different bet types using the bet type selector . For example, a single race may be shown for vertical bets, while multiple consecutive races may be shown for horizontal bets. By presenting a limited portion of the data for each race, the race summary reduces screen clutter while still helping the user visualize his/her bets while choosing a bet type, bet amount, and budget. This may be especially important considering the limited screen real estate of mobile computing devices (e.g. smart phones). By clicking a “View Race” button , the user may pull up a detailed view of one of the races listed in the race summary . In some cases, this may be a windowed view of the eliminator page of , which may allow the use to modify the selected eliminations using the eliminator elements as described above. The user may navigate between detailed views of the races using the race navigator .
FIG. 7
FIG. 5
FIG. 6
FIG. 7
500
520
540
570
500
540
500
500
570
represents a questionnaire page of the horse race betting GUI , which may include, in addition to the race selection portion and ticket generation navigator , one or more questionnaire items . A user of the horse race betting GUI may, for example, navigate to the questionnaire page using the ticket generation navigator after choosing eliminations using the eliminator page described in relation to and selecting a wager using the wager selection page described in relation to . The questionnaire page may prompt the user to input additional selections to assist the horse race betting GUI in automatically generating one or more tickets for the user that match the user's preferences and betting strategy. The questionnaire page shown in includes a series of easy-to-understand questions, which may enhance usability of the horse race betting GUI . However, it is contemplated that the questionnaire items may instead or additionally include non-question prompts to obtain the user's selections.
552
570
570
570
570
570
572
574
576
500
572
574
576
576
500
FIG. 6
FIG. 7
FIG. 6
a
a
a
a
a
a
a
a
a
a
a
The questions asked on the questionnaire page may depend on the user's bet type as input using the bet type selector of . In the example shown, the two questionnaire items are unique to horizontal betting. The first questionnaire item asks the user if the user has any “absolute singles.” If the user answers “Yes,” the first questionnaire item may expand to prompt the user to choose absolute singles for each race. For example, as shown in , the user may have selected a Pick 6 sequence of races on the wager selection page of . When the user answers “Yes” to the first questionnaire item , the first questionnaire item may expand to produce an appropriate race selector (e.g. radio buttons for “Race 1” through “Race 6”), an absolute single selector , and an absolute singles list . An absolute single, as the term is used herein, refers to a horse that is the sole horse selected to win a given race in a horizontal bet (e.g. Pick 6) for all tickets generated by the horse race betting GUI . In other words, the user is only interested in generating tickets with the selected absolute single and no other horses selected to win that particular leg. In the example, shown, the user has navigated to Race 1 using the race selector and selected “Cawboybandido” as an absolute single using the absolute single selector (e.g. by placing a checkmark in the circle on the right side of the list entry item for “Cawboybandido”). Since the user can select at most one horse as an absolute single in a given race, the other horses (horses 2-7) are not selectable and may be grayed out to show that no further selections are possible. As shown in the absolute singles list , the user has similarly selected absolute singles in Race 2 and Race 3. By clicking the “x” mark next to a horse's name in the absolute singles list , the user may remove a selection. A “Clear All” button may also be used to clear all of the user's absolute singles in a single click. Based on the user's selected absolute singles, the horse race betting GUI will generate a ticket in which only the one chosen horse is selected to win in each leg for which there is an absolute single.
570
570
570
570
572
574
576
500
572
574
500
574
576
576
576
500
b
b
b
b
b
a
b
b
b
b
b
a
b
FIG. 7
FIG. 6
The second questionnaire item asks the user if the user has any “multi-ticket singles.” If the user answers “Yes,” the second questionnaire item may expand to prompt the user to choose multi-ticket singles for each race. For example, as shown in , the user may have selected a Pick 6 sequence of races on the wager selection page of . When the user answers “Yes” to the second questionnaire item , the second questionnaire item may expand to produce an appropriate race selector (e.g. radio buttons for “Race 1” through “Race 6”), a multi-ticket single selector , and a multi-ticket singles list . A multi-ticket single, as the term is used herein, refers to a horse that is the sole horse selected to win a given race in a horizontal bet (e.g. Pick 6) for at least one ticket generated by the horse race betting GUI . In other words, the user is interested in generating at least one ticket with the chosen single and no other horses selected to win that particular leg. In the example shown, the user has navigated to Race 1 using the race selector and selected “Cawboybandido” as multi-ticket single using the multi-ticket single selector (e.g. by placing a checkmark in the circle on the right side of the list entry item for “Cawboybandido”). Since it is possible to select multiple horses as multi-ticket singles in a given race, the other horses (horses 2-7) remain selectable. (On the other hand, if the user had selected any absolute singles for a given race, the horse race betting GUI may make it impossible to choose any multi-ticket singles and may gray out the entire race in the multi-ticket singles selector with an indication that the chosen absolute single is already checked.) As shown in the multi-ticket singles list , the user has similarly selected multi-ticket singles in Race 2 and Race 3. As in the case of the absolute ticket singles list , the user may remove selections (e.g. by clicking the “x” mark next to a horse's name in the multi-ticket singles list ). Based on the user's selected multi-ticket singles, the horse race betting GUI will generate two or more tickets in which each horse chosen to be a multi-ticket single for a given leg is the sole horse selected to win that leg on at least one ticket.
FIG. 8
FIG. 5
FIG. 6
FIG. 7
FIG. 8
500
520
540
580
590
540
500
540
190
100
500
580
580
582
584
586
160
100
588
584
a
a
a
a
a
a
a
a
a
represents a ticket customization page of the horse race betting GUI , which may include, in addition to the race selection portion and ticket generation navigator , a ticket display and a ticket customizing tool . With the user having navigated through the eliminator page of , wager selection page of , and questionnaire page of (e.g. using the ticket generation navigator ), the horse race betting GUI may generate one or more tickets based on the user's selections. In this regard, the ticket generation navigator may serve as an automatic ticket generation button (like the automatic ticket generation button of the horse race betting GUI ) insofar as it may be used to generate the ticket(s) and/or navigate to a page of the horse race betting GUI on which the generated ticket(s) are displayed. The ticket display thus may show the results of the automatic ticket generation. In the example of , a single ticket (“TICKET 1”) is displayed. In the case of multiple tickets, the additional tickets (e.g. “TICKET 2” etc.) may be displayed simultaneously (e.g. side-by-side) or may be individually viewable using tabs or other navigation tools. As shown, the ticket display may show race/wager information about the selected date (e.g. “Dec. 12, 2018”), the selected track (e.g. “Los Alamitos”), the selected race(s) (e.g. “starting race: R1”), the selected bet type (e.g. “Pick 3”) and the selected bet amount (e.g. “15¢”), bet information indicating which horses are selected in which legs (e.g. “R1,” “R2,” and “R3”) of the horizontal bet, the ticket cost (which may be calculated by multiplying the number of bets times the bet amount in the same way as the ticket cost described in relation to the horse race betting GUI ), and a customize ticket button . As shown, the bet information may be shown in a highly condensed summary manner using only horse numbers. Limiting the data presented in this way may be especially important considering the limited screen real estate of mobile computing devices (e.g. smart phones).
500
580
500
500
500
500
500
500
500
570
a
b
In a case where a user has selected one or more multi-ticket singles, the horse race betting GUI may generate two or more tickets to be displayed in the ticket display . For example, the multiple tickets may be generated according to the following scheme. When a single multi-ticket single is chosen in a single race, the horse race betting GUI may generate two tickets, one with the horse selected as a single and one without the horse selected as a single. In other words, the horse race betting GUI may generate a first ticket with all of the user's constraints (e.g. eliminations, absolute singles, etc.) including the multi-ticket single and a second ticket with all of the user's constraints except ignoring the constraint imposed by the multi-ticket single. The constraints imposed by the bet amount and budget of the user may be imposed, for example, by dividing the budget evenly among the tickets to be generated. For example, if the user's budget is $30.00 and the user's bet amount is $0.15, the horse race betting GUI may generate two tickets by dividing the budget by two and generating two $15 ticket each with 100 $0.15 cent selections (e.g. 100 combinations in the case of horizontal betting). When two or more multi-ticket singles are chosen in respective races, the horse race betting GUI may generate one ticket per multi-ticket single. For example, if Horse 1 is selected as a multi-ticket single in Race 1, Horse 5 is selected as a multi-ticket single in Race 2, and Horse 7 is selected as a multi-ticket single in Race 3, the horse race betting GUI may generate a first ticket with Horse 1 singled in Race 1 ignoring the other two multi-ticket singles, a second ticket with Horse 5 singled in Race 2 ignoring the other two singles, and a third ticket with Horse 7 singled in Race 3 ignoring the other two singles. Other possible schemes are contemplated as well. For example, the horse race betting GUI may always generate one more ticket than the number of multi-ticket singles, where the extra ticket completely ignores the multi-ticket single constraints. In some cases, the horse race betting GUI may allow a user to choose more than one multi-ticket single in the same leg in response to the second questionnaire item , such that the resulting multiple tickets may include tickets with alternative horses singled for the same race.
FIG. 8
FIG. 6
FIG. 8
580
588
500
590
590
560
560
590
592
594
592
592
592
592
580
590
596
a
a
a
a
a
a
a
a
a
a
a
a
a
a
Referring back to the example shown in , if the user would like to make a change to the automatically generated ticket(s) shown in the ticket display , the user may click the customize ticket button , in response to which the horse race betting GUI may produce the ticket customizing tool . The ticket customizing tool may show summary views of each race similar to the race summary described in relation to the wager selection page of . In addition to horse numbers, horse names, win percentages, and “View Race” buttons as described in relation to the race summary , the ticket customizing tool may further include one or more manual selection elements corresponding to each horse and a lock element corresponding to each race. In the example of , each horse has an associated manual selection element in the form of a checkbox that may be unfilled, checked (indicating that the horse is selected to win), or x-marked (indicating that the horse is selected not to win). Initially, the checkboxes may be unfilled except for legs including a single (absolute or multi-ticket). For example, in Race 1, “Cawboybandido” may be selected as a single, in which case the manual selection element associated with “Cawboybandido” will be checked and the manual selection elements associated with the other horses in Race 1 will be x-marked. The manual selection elements corresponding to the horses of Race 2 and Race 3 may all be initially unfilled. For improved usability, it is contemplated that the horses selected in the currently generated ticket (i.e. the one displayed in the ticket display ) may be indicated in the ticket customizing tool , for example, by highlighting or other indication. For example, it can be understood from highlighting that horses 2, 3, and 4 are selected for Race 2 in the currently generated ticket.
592
592
592
500
595
590
592
594
592
594
a
b
a
a
a
a
a
a
a
As the user reviews the selections, the user may disagree with the automatically generated ticket and wish to manually select one or more horses to win or not to win a race. To do so, the user may simply click on the corresponding manual selection element to make a checkmark appear, designating that the horse is selected to win, or may click twice on the corresponding manual selection element to make an x-mark appear, designating that the horse is selected not to win. A third click may reset the manual selection element back to an unfilled state. Each checkmark or x-mark has the effect of locking the selection. That is, in subsequent automatic generations of the ticket, the horse race betting GUI will abide by the checkmarks and x-marks as additional constraints dictating which horses must or cannot be selected. In addition, a modified ticket amount displayed in the customizing tool may be updated to reflect the changing ticket cost as the user manually marks manual selection elements . A user may also click on the lock element to auto-populate all of the unfilled manual selection elements for that race as x-marks. The lock element may thus have the effect of locking the race so that only the manually checked horses and no others may be selected to win.
592
597
590
597
500
580
500
586
595
a
a
a
a
a
a
a
After the user is satisfied with any manual selections using the manual selection elements , the user may click the re-generate ticket button of the ticket customizing tool . In response to the user's interaction with the re-generate ticket button , the horse race betting GUI may automatically generate a new ticket, this time under the additional constraints imposed by the user's manual selections, and display the new ticket in the ticket display . Because the horse race betting GUI re-determines the best ticket within the user's budget while abiding by the additional constraints, the resulting ticket may differ from the previous ticket beyond the manual selections made by the user (resulting in a new ticket amount that might differ from the modified ticket amount as it appeared prior to re-generating the ticket).
590
598
599
590
596
598
592
596
597
500
a
a
a
a
a
a
a
a
a
The ticket customizing tool may further include various additional functionality to improve usability, such as a check generated horses button and a clear all races button . As explained above, the ticket customizing tool may display horses that have been selected in the current generated ticket together with some indication, e.g. highlighting , to point them out to the user. If the user agrees with all or most of the automatically selected horses and only wishes to make a few changes, the user might begin by clicking the check generated horses button to place checkmarks in all of the manual selection elements corresponding to automatically selected horses (e.g. those having highlighting ). The user may then tweak the automatic selections by adding a few additional checkmarks or changing a few checkmarks to x-marks, while leaving the majority of the automatically generated selections intact. As noted above, however, clicking the re-generate ticket button may sometimes result in significant changes to the automatically generated ticket even when the user makes relatively minor changes. For example, the removal of one selected horse in one race may cause the horse race betting GUI to add several other horses in other races in order to generate the best possible ticket within the user's budget.
599
592
599
597
590
a
a
a
a
a.
The clear all horses button may be used to reset all manual selection elements in all races to the unfilled state, except for those that are dictated by an absolute single or multi-ticket single. Thus, by clicking the clear all horses button followed by the re-generate ticket button , the user may re-generate the ticket that was originally generated prior to any manual selections made using the ticket customizing tool
FIG. 9
FIG. 8
FIG. 9
500
580
590
580
590
520
540
580
582
584
586
160
100
588
584
a
a
b
b
b
b
b
b
b
b
shows the ticket customization page of the horse race betting GUI in the case of vertical betting. Whereas in the case of horizontal betting (see ), the ticket customization page included a ticket display and a ticket customizing tool for horizontal betting, the ticket customization page of the vertical betting example of includes a ticket display and a ticket customizing tool for vertical betting. The race selection portion and ticket generation navigator may also be displayed. As shown, the ticket display may show race/wager information about the selected date (e.g. “Dec. 12, 2018”), the selected track (e.g. “Los Alamitos”), the selected race(s) (e.g. “R1”), the selected bet type (e.g. “Superfecta”) and the selected bet amount (e.g. “15¢”), bet information indicating which horses are selected to come in first, second, third, and fourth place in the race, the ticket cost (which may be calculated by multiplying the number of bets times the bet amount in the same way as the ticket cost described in relation to the horse race betting GUI ), and a customize ticket button . As shown, the bet information may be shown in a highly condensed summary manner using only horse numbers. Limiting the data presented in this way may be especially important considering the limited screen real estate of mobile computing devices (e.g. smart phones).
580
588
500
590
590
560
560
590
592
594
592
580
590
596
b
b
b
b
b
b
b
b
b
b
b
FIG. 6
FIG. 9
st
nd
rd
th
If the user would like to make a change to the automatically generated ticket(s) shown in the ticket display , the user may click the customize ticket button , in response to which the horse race betting GUI may produce the ticket customizing tool . The ticket customizing tool may show a summary view of the race (one race for a vertical bet) similar to the race summary described in relation to the wager selection page of . In addition to horse numbers, horse names, win percentages, and “View Race” buttons as described in relation to the race summary , the ticket customizing tool may further include one or more manual selection elements corresponding to each horse (e.g. one for each finishing position 1, 2, 3, 4, and one for “All” finishing positions) and a lock element corresponding to each finishing position. In the example of , each horse has an associated manual selection element in the form of a checkbox that may be unfilled, checked (indicating that the horse is selected to come in the designated finishing position), or x-marked (indicating that the horse is selected not to come in the designated finishing position). Initially, the checkboxes may be unfilled. For improved usability, it is contemplated that the horses selected in the currently generated ticket (i.e. the one displayed in the ticket display ) may be indicated in the ticket customizing tool , for example, by highlighting or other indication. For example, it can be understood from highlighting that, in the currently generated ticket, horse 2 is selected to come in first place, horses 4-7 are selected to come in second place, horses 1-8 are selected to come in third place, and horses 1-8 are selected to come in fourth place.
592
592
592
500
595
590
592
594
592
594
b
b
b
b
b
b
b
b
b
As the user reviews the selections, the user may disagree with the automatically generated ticket and wish to manually select one or more horses to finish differently in the race. To do so, the user may simply click on the corresponding manual selection element to make a checkmark appear, designating that the horse is selected to finish in the corresponding finishing position, or may click twice on the corresponding manual selection element to make an x-mark appear, designating that the horse is selected not to finish in the corresponding finishing position. A third click may reset the manual selection element back to an unfilled state. Each checkmark or x-mark has the effect of locking the selection. That is, in subsequent automatic generations of the ticket, the horse race betting GUI will abide by the checkmarks and x-marks as additional constraints dictating which horses must or cannot be selected. In addition, a modified ticket amount displayed in the customizing tool may be updated to reflect the changing ticket cost as the user manually marks manual selection elements . A user may also click on the lock element to auto-populate all of the unfilled manual selection elements for that finishing position as x-marks. The lock element may thus have the effect of locking the finishing position so that only the manually checked horses and no others may be selected to finishing in that finishing position.
FIG. 8
592
597
590
597
500
580
500
586
595
b
b
b
b
b
b
b
Just like in the case of horizontal betting (see ), after the user is satisfied with any manual selections using the manual selection elements , the user may click the re-generate ticket button of the ticket customizing tool . In response to the user's interaction with the re-generate ticket button , the horse race betting GUI may automatically generate a new ticket, this time under the additional constraints imposed by the user's manual selections, and display the new ticket in the ticket display . Because the horse race betting GUI re-determines the best ticket within the user's budget while abiding by the additional constraints, the resulting ticket may differ from the previous ticket beyond the manual selections made by the user (resulting in a new ticket amount that might differ from the modified ticket amount as it appeared prior to re-generating the ticket).
590
598
599
590
596
598
592
596
597
500
b
b
b
b
b
b
b
b
b
FIG. 8
The ticket customizing tool may further include various additional functionality to improve usability, such as a check generated horses button and a reset button . As explained above, the ticket customizing tool may display horses that have been selected in the current generated ticket together with some indication, e.g. highlighting , to point them out to the user. Just like in the case of horizontal betting (see ), if the user agrees with all or most of the automatically selected horses and only wishes to make a few changes, the user might begin by clicking the check generated horses button to place checkmarks in all of the manual selection elements corresponding to automatically selected horses (e.g. those having highlighting ). The user may then tweak the automatic selections by adding a few additional checkmarks or changing a few checkmarks to x-marks, while leaving the majority of the automatically generated selections intact. As noted above, however, clicking the re-generate ticket button may sometimes result in significant changes to the automatically generated ticket even when the user makes relatively minor changes. For example, the removal of one selected horse in one finishing position may cause the horse race betting GUI to add several other horses in other finishing positions in order to generate the best possible ticket within the user's budget.
599
592
599
597
590
b
b
b
b
b.
The reset button may be used to reset all manual selection elements in all finishing positions to the unfilled state. Thus, by clicking the reset button followed by the re-generate ticket button , the user may re-generate the ticket that was originally generated prior to any manual selections made using the ticket customizing tool
200
200
500
210
500
522
524
526
520
512
552
554
556
550
570
500
540
597
597
592
592
594
594
598
598
599
500
500
500
500
200
500
210
500
500
210
200
300
FIG. 2
FIG. 5
FIGS. 5-9
a
b
a
b
a
b
a
b
a
Referring back to the horse race betting apparatus of , the horse race betting apparatus may further generate the horse race betting GUI described above. In this regard, the input data of the user I/O interface may include, for example, user interaction data of a user with the horse race betting GUI , such as selections of date, track, and race using the selectors , , of the race selection portion , eliminations designated using the eliminator elements , selections of bet type, bet amount, and budget using selectors , , and of the wager selector , selections input using questionnaire items (e.g. absolute singles and multi-ticket singles in the case of horizontal betting), requests for the horse race betting GUI to automatically generate a ticket using the ticket generation navigator or re-generate ticket button , , manual selections of horses to win or not to win using manual selection elements , manual selections of horses to finish or not to finish in designated places using manual selection elements , and interactions with the lock elements , , check generated horses button , , clear all races button , and any other links, tabs, buttons, etc. of the horse race betting GUI (e.g. links to additional information or other buttons for navigating to other pages). Input data may further include data associated with navigation to the page shown in from a homepage of the horse race betting GUI , preference selection related to the horse race betting GUI , login information, or other data entered on a previous page of the horse race betting GUI , in response to which the horse race betting apparatus may display the elements of the horse race betting GUI described in relation to . Output data of the user I/O interface may include data to be interpreted by a web browser or mobile application in the generation of a functional display in accordance with the horse race betting GUI described herein. In this regard, it should be noted that the terms “displaying,” “generating,” “listing,” “populating,” “marking,” “updating,” etc. as used herein with respect to elements of the horse race betting GUI may include the outputting of data from the user I/O interface or another component of the horse race betting apparatus for use by a user device .
210
220
510
560
100
230
500
300
522
524
526
520
552
554
556
550
500
222
220
230
510
300
522
524
526
552
554
556
222
230
522
524
526
552
554
556
FIGS. 5-9
FIGS. 5 and 6
Based on the input data received by the user I/O interface , the ticket updater may return one or more lists of horses and/or race summaries as shown in . For example, in the same way as described above in relation to the horse race betting GUI , the race data storage may store information to be displayed by the horse race betting GUI . When a user of a user device makes a set of selections using the selectors , , of the race selection portion and/or selectors , , and of the wager selector of the horse race betting GUI , the list generator of the ticket updater may query the race data storage for the race(s) matching the user's selections and return the associated list(s) of horses for display on the user device as shown in . In some cases, as described above, the selectors , , , , , may be dynamically populated with selectable choices as selections are made. In such cases, the list generator may make a series of queries to the race data storage as the user's selections are made and return intermediate query results (e.g. a list of tracks having races on a selected date, a list of dates on which a selected track has races, etc.) for use in dynamically populating the selectors , , , , , .
240
514
114
100
514
220
510
222
514
500
240
514
250
200
FIGS. 5-9
The horse win percentage calculator may calculate predicted win percentages of the horses in each of a plurality of scheduled races in the same way as described above in relation to the predicted win percentages of the horse race betting GUI . A corresponding predicted win percentage may thus be provided to the ticket updater for each horse in each of the lists generated by the list generator , such that the predicted win percentages may be displayed on the horse race betting GUI as shown in . The horse win percentage calculator may further provide the predicted win percentages to the horse selector for use in the automatic selection of horses by the horse race betting apparatus .
100
250
540
597
597
210
250
260
250
514
510
222
250
224
250
226
500
592
592
594
594
570
570
500
250
228
220
512
250
170
100
250
a
b
a
b
a
b
a
b
FIGS. 8 and 9
FIG. 7
FIG. 5
As in the case of the case of the horse race betting GUI , the horse selector may determine an optimal selection of horses in response to the user's interaction with an automatic ticket generator button, this time in the form of the ticket generation navigator (“4. Get Ticket(s)”), re-generate ticket button , , or other button. For example, upon receiving a command to perform automatic ticket generation from the user I/O interface , the horse selector may select one or more horses in accordance with a selection algorithm stored in the selection algorithm data storage . To this end, the horse selector may receive, as inputs to the selection algorithm, the predicted win percentages calculated for each horse of each of the list(s) generated by the list generator , along with various constraints. For example, the horse selector may receive, from the ticket cost module , the bet amount and maximum ticket price selected by the user. The horse selector may further receive, from the lock module , the lock selections of the user, which in the case of the horse race betting GUI may include the user's selections made using the manual selection elements , and lock elements , (see ) and the questionnaire items , (see ). In the case of the horse race betting GUI , the horse selector may further receive, from an eliminator module of the ticket updater , the user's eliminations designated using the eliminator elements (see ). The horse selector may then select one or more horses so as to maximize a function of the predicted ticket win percentage (e.g. in the same way that a function of the predicted ticket win percentage of the horse race betting GUI is maximized) without causing a number of bets times the bet amount to exceed the user's budget and without altering the status of any locked horses, locked legs or finishing positions, absolute or multi-ticket singles, or eliminated horses. In the case of two or more tickets being generated, the horse selector may determine a maximum ticket price for each ticket by dividing the user's budget evenly among the tickets to be generated or according to some other scheme.
220
500
250
220
500
580
580
a
b
FIGS. 8 and 9
The ticket updater may update the horse race betting GUI to reflect the automatic selections made by the horse selector . For example, the ticket updater may update the horse race betting GUI to produce/update a ticket customization page having a ticket display , as described above in relation to .
500
224
595
595
590
590
224
595
595
595
595
100
a
b
a
b
a
b
a
b
FIGS. 8 and 9
In relation to the horse race betting GUI , the ticket cost module may further update the modified ticket amount , as the user makes manual selections using the customizing tool , (see ), i.e. without necessarily requesting re-generation of an automatically generated ticket. In this regard, the ticket cost module may in some cases update the display of the modified ticket amount , in various ways to warn the user, e.g., displaying the modified ticket amount , in a different color such as red, displaying a pop-up cautionary warning, etc. as described above in relation to the horse race betting GUI .
210
100
220
500
300
200
500
As described above, the user I/O interface may output data to be interpreted by a web browser or mobile application in the generation of a functional display in accordance with the horse race betting GUI described herein. Such data may include data that is output, updated, or managed by the ticket updater , including any data and static/dynamic elements displayed by the horse race betting GUI as shown and described above. By communicating such data to a web browser or mobile application of a user device (e.g. over a network such as the Internet), the horse race betting apparatus may be regarded as displaying, generating, listing, populating, marking, updating, etc. the various elements of the horse race betting GUI .
FIG. 10
FIGS. 5-9
FIG. 2
FIGS. 5-9
500
200
200
510
1010
512
510
1020
514
1030
550
1040
560
1050
570
1060
540
1070
514
1080
590
590
1090
1010
1090
522
524
526
520
500
a
b
shows an example operational flow according to an embodiment of the present disclosure. Referring by way of example to the horse race betting GUI shown in and the horse race betting apparatus shown in , the horse race betting apparatus may, in any order or simultaneously in whole or in part, display one or more lists of horses (step ), display one or more eliminator elements in association with each horse of the one or more lists (step ), display a predicted win percentage in association with each horse (step ), display a wager selector (step ), display a race summary (step ), display questionnaire items (step ), display an automatic ticket generation button (step ), automatically mark one or more horses as selected to win based on the predicted win percentages (step ), and display a ticket customizing tool , (step ). Steps - may be preceded by a user's selection of one or more races using selectors , , of a race selection portion , as well as by preference selection, login, navigation, etc. prior to the arrival of the user at the pages of the horse race betting GUI shown in .
1010
1090
500
300
122
124
126
520
200
510
1010
512
1020
514
1030
222
220
110
230
1
9
510
222
510
240
514
200
550
1040
560
1050
200
570
1060
FIG. 5
FIG. 6
FIG. 7
As an exemplary use case of steps -, a user of the horse race betting GUI may arrive at the page shown in following login and/or navigation using a web browser or mobile application on a user device such as a smart phone, tablet, or personal computer. In response to the user's selection of a date, track, and race using the selectors , , of the race selection portion , the horse race betting apparatus may display one or more lists of horses corresponding to the user's selections (step ), along with corresponding eliminator elements (step ) and predicted win percentages (step ). For example, the list generator of the ticket updater may retrieve the relevant lists from the race data storage in response to the user's selections, along with additional information such as morning line or live odds (e.g. . for “Cawboybandido”), horse/jockey/trainer statistics, etc. with which to populate the list and/or details pages for each horse (e.g. pages accessible via an information button or other link). The list generator may further pass the lists to the horse win percentage calculator , which may calculate the predicted win percentages of each horse for the display. Upon the user's navigation to the wager selection page shown in , the horse race betting apparatus may further display a wager selector (step ) and race summary (step ), and the user may input wager information including the bet type, bet amount, and budget. In the case of horizontal bets, the races for which the ticket will be generated may depend on the selected bet type in addition to the selected race (i.e. the starting race). After the wager information is entered, the user may navigate to the questionnaire page shown in , at which point the horse race betting apparatus may further display questionnaire items (step ) specific to the selected bet type.
200
540
1070
200
514
1080
250
200
510
260
220
500
580
580
200
590
590
1090
592
592
594
594
200
580
580
597
597
a
b
a
b
a
b
a
b
a
b
a
b.
FIGS. 8 and 9
At any stage in the process, the horse race betting apparatus may further display an automatic ticket generation button, which may be in the form of the “4. Get Ticket(s)” stage of the ticket generation navigator (step ). When the user clicks the automatic ticket generation button, the horse race betting apparatus may automatically mark one or more horses as selected to win based on the predicted win percentages (step ). For example, the horse selector of the horse race betting apparatus may automatically generate selections of horses for each of the lists associated with the user's selected race and bet type according to an algorithm stored in the selection algorithm data storage . The ticket updater may update the horse race betting GUI to generate a ticket display , accordingly as shown in . Lastly, the horse race betting apparatus may display a ticket customizing tool , (step ). After the user selects horses using the manual selection elements , and lock elements , , the horse race betting apparatus may update the ticket display , based on the user's manual selections in response to the user's interaction with the re-generate ticket button ,
100
500
200
When the user is satisfied with the selection of horses, the user may wish to finalize the ticket. As in the case of the horse race betting GUI , features of the horse race betting GUI supporting the finalization of a ticket may include, for example, an option to print the ticket, save the ticket locally or on a remote server, submit/purchase the ticket (e.g. via a link to a third-party website or a third-party API providing direct bet placement functionality), etc. The horse race betting apparatus may further store records of such finalized tickets, which may be used to generate betting statistics/feedback associated with the particular user.
FIG. 11
FIG. 10
FIG. 10
FIG. 5
FIG. 7
FIGS. 8 and 9
1080
250
200
510
260
514
224
226
228
512
570
570
592
592
594
594
250
1110
226
1120
224
250
1130
228
100
1140
1110
1120
1130
1140
a
b
a
b
a
b
shows another example operational flow according to an embodiment of the present disclosure, detailing example sub-steps of step of . As noted above with respect to , the horse selector of the horse race betting apparatus may automatically generate selections of horses for each of the lists associated with the user's selected race and bet type according to an algorithm stored in the selection algorithm data storage . Such automatic selection algorithm may take into account, in addition to the predicted win percentages of each individual horse, various constraints imposed by the ticket cost module , lock module , and eliminator module in accordance with the user's input bet amount, budget, and selections made using the eliminator elements (see ), questionnaire items , (see ), and manual selection elements , and lock elements , , (see ). The horse selector may apply a lock selection constraint (step ) based on the user's questionnaire responses, manual selections, and lock selections managed by the lock module and may apply a bet amount/maximum ticket price constraint (step ) based on the user's bet amount and maximum ticket price inputs managed by the ticket cost module . As noted above, in the case of multiple tickets being generated, the maximum ticket price constraint may be determined by dividing the user's budget among the tickets, evenly or otherwise. The horse selector may further apply an eliminator constraint (step ) based on the user's eliminations managed by the eliminator module . As in the case of the horse race betting GUI , the automatically generated selections may maximize a function of a predicted ticket win percentage (step ) without causing the number of bets times the bet amount to exceed the maximum ticket price or budget and without violating any of the constraints. Steps , , , and may be performed in any order or simultaneously, depending on the specifics of the algorithm.
FIGS. 12-15
FIG. 2
FIG. 5
FIG. 5
FIG. 5
FIG. 5
FIG. 5
500
200
500
200
500
541
show a series of stable management pages of the horse race betting GUI , which may further be produced by the horse race betting apparatus of . When a user of the horse race betting GUI wishes to track a horse from race to race, the user may have an option of placing the horse in a personalized list of horses referred to herein as the user's stable. The data representing a user's stable may be stored in a database of the horse race betting apparatus so as to be accessible to the currently logged in user (e.g. “John Doe” as indicated in the upper-righthand corner of ). When a user wishes to add a horse to the user's stable, the user may simply click an “add to stable” button, which, in the case of the horse race betting GUI is depicted as a small plus “+” icon to the left of the horse number (see ). Upon clicking the plus icon, the corresponding horse may be added to the user's stable and the plus icon may change to indicate that the horse is in the user's stable. As shown in , for example, it can be seen that “Hehasspirit” is in the user's stable because the plus icon has been replaced with a checkmark icon. To access the stable management pages, a user may click the manage stable button (see ), which may include a badge or other indicator of how many of the user's stabled horses are scheduled to run today (“6” as shown in ).
FIG. 12
FIG. 5
1210
1220
1224
1222
1222
shows a stable management page that displays a list of horses running today. As shown in the stable navigation portion , the words “Racing Today” are underlined, indicating the current page. The number “6” above the words “Racing Today” indicate that there are six of the user's stabled horses running in a race on the particular day (“Nov. 9, 2018”). For example, as shown in the horses running today portion , “Hehasspirit” is running in Race 1 (“R1”) at Ajax Downs. For details of the race, the user may click the corresponding “View Race” button. Unlike in the case of conventional systems for tracking horses, when a horse is placed in the user's stable the horse may by default remain in the stable for only a single subsequent race. This allows a user to adopt a strategy of applying the user's own inside knowledge about a horse. For example, upon watching a race, a user might note that a particular horse underperformed for some extenuating reason such as being blocked by other horses. The published statistics for the race often will not capture this particular information that was noticed by the user, resulting in statistics that cause the public at large to undervalue the horse in the next race. In such a situation, the user may place the horse in the user's stable, possibly along with some personal note about the horse (which may be added using a corresponding “NOTE” button in ). In the next race, the user may then use his/her own inside information to strategically bet on the horse. In general, such strategy may only work for a single subsequent race. Once the next race is over, the statistics will likely reflect the horse more accurately, causing the user's inside information to lose its value. To reflect this, when a horse is placed in the user's stable, the horse may remain only for a single subsequent race by default. If the user would like to continue following a particular horse for one additional race, the user may click the “Follow past this race” button , causing the horse to remain in the stable for one more race. The “Follow past this race” button may change (e.g. to a thumbs-up icon as shown) to reflect that the horse will be stabled past today's race.
1210
1210
1230
1220
1210
1210
1240
FIG. 13
FIG. 12
FIG. 14
In addition to how many stabled horses are scheduled to run today (“Racing Today”), the stable navigation portion may further indicate how many stabled horses are scheduled to run tomorrow (“Racing Tomorrow”). By clicking on the corresponding part of the stable navigation portion , the user may navigate to a stable management page that displays a list of stabled horses whose next race is tomorrow. As shown in , such a page may include a list of horses in a horses running tomorrow portion similar to the horses running today portion of . The stable navigation portion may further indicate how many stabled horses are scheduled to run at all (“Entered Horses”), which may take the user to a page listing the combination of stabled horses whose next race is scheduled for today, stabled horses whose next race is scheduled for tomorrow, and stabled horses whose next race scheduled thereafter. For example, a horse that is scheduled to run one week in advance may first appear on the “Entered Horses” page one week in advance. The stable navigation portion may further indicate how many horses in total are in the user's stable (“Horses Following”), which may link to a page as shown in . Here, all horses in the user's stable may be displayed in a followed horses portion irrespective of whether they are yet scheduled. A user may remove a horse from the stable by clicking the “X” button under the word “Remove” corresponding to the horse.
FIG. 15
FIG. 15
FIG. 14
1250
1210
The user's stable may also be used to follow horse trainers. An example of this is shown in , which shows a stable management page displaying a list of today's races in which a particular trainer (“TrainerName1”) has horses running. It is contemplated that the list may include races scheduled for two days (i.e. today and tomorrow) rather than just today. The information about TrainerName1 shown in may be accessed, for example, by searching for TrainerName1 using a search tool , by clicking on a trainer's name associated with a horse (see, e.g., ), or by clicking on a trainer's name from among the user's stabled trainers. A list of the user's stabled trainers may be accessed by clicking “Trainers” in the stable navigation portion . Whereas the horses in a user's stable may by default remain in the stable only for a single subsequent race, the trainers may by default remain stabled indefinitely.
500
500
500
500
In the above examples of the horse race betting GUI , it is described that one or more tickets may be automatically generated based on the user's choices including which race(s), eliminations, bet type, bet amount, budget, absolute and multi-ticket singles, and other manual selections. However, the disclosure is not intended to be so limited. For example, it is contemplated that one or more of these user selections may instead be determined automatically by the horse race betting GUI in producing the best ticket(s). A user may, for example, only input a particular date, track, and budget, with the horse race betting GUI automatically determining which race(s), which bet type, etc. to include in one or more tickets to maximize a function of a predicted ticket win percentage within the user's budget. It is also contemplated that multiple levels of user involvement may be accommodated by the horse race betting GUI , depending on the user's preferences.
190
540
170
200
170
200
170
100
500
150
556
In the above examples, it is described that the one or more horses marked in response to a user interaction with the automatic ticket generation button , may maximize a function of the predicted ticket win percentage without causing a number of bets times the bet amount to exceed the maximum ticket price or budget. That is, the horse race betting apparatus may look for the best ticket within the maximum ticket price (e.g. the user's budget or the user's budget divided among the number of tickets). However, the disclosure is not intended to be so limited. It is also contemplated, for example, that the automatically marked horses may minimize a function of ticket price or budget without causing the predicted ticket win percentage to fall below a certain percentage (e.g. 5%). That is, the horse race betting apparatus may look for the least expensive ticket(s) having a minimum threshold predicted ticket win percentage . In this case, the horse race betting GUI , may include, in place of or in addition to the maximum ticket price selector or budget selector , a minimum predicted ticket win percentage selector by which a user of the graphical user interface may select a minimum predicted ticket win percentage.
100
500
FIGS. 1, 5-9, and 12-15
Throughout the above description of the horse race betting GUI , , reference is made to various means of user interaction, including clicking on various user interface elements. The disclosure is not intended to be limited to such specific interactions and any known user-device interactions may be applicable, including but not limited to keyboard, mouse, touch, gesture, voice, eye-tracking, etc. The various selectors, selectable elements, navigators, and buttons described in relation to may be any kind of graphical user interface element that fulfills the described functions, for example, drop-down menus, list boxes, etc. for selection from a list (or alternatively blank input fields), and checkboxes, radio buttons, switches, etc. for elements to be marked, switched, toggled, etc.
100
500
200
114
514
114
514
Owing to the various combinations of features described throughout this disclosure, the disclosed horse race betting GUI , , horse race betting apparatus , and related embodiments may be regarded as an improvement to conventional computer-implemented horse race betting tools. Such conventional betting tools merely add the convenience of computer technology to the otherwise conventional paper-and-pencil process of manually choosing horses based on published information. In contrast, the disclosed embodiments represent an entirely unconventional approach to ticket generation by providing a graphical user interface that allows a user to automatically generate one or more optimal tickets within various constraints. The ticket(s) may be generated based on predicted win percentages , of each horse as in the above examples. However, the disclosure is not intended to be so limited and various other features of horses (including features of the horses' trainers, jockeys, etc.) may be used in place of predicted win percentages , throughout the disclosure including, for example, expected payout, return on investment (ROI), or any other feature that may be determined from available data associated with the horses, whether it is determined automatically based on an algorithm or manually by experts.
FIG. 16
FIG. 2
FIGS. 3, 4, 10, 11
FIG. 16
1600
200
1600
1610
1620
1610
1610
1630
1610
1630
1630
1620
1610
1600
1640
1600
300
100
500
1600
1650
shows an example of a computer in which the horse race betting apparatus of , the operational flows of , and/or other embodiments of the disclosure may be wholly or partly embodied. As shown in , the computer may include a processor (e.g. a CPU) , a system memory (e.g. RAM) that may be connected by a dedicated memory channel to the processor and temporarily stores results of data processing operations performed by the processor , and a hard drive or other secondary storage device . The processor may execute one or more computer programs, which may be tangibly embodied along with an operating system in a computer-readable medium, e.g., the secondary storage device . The operating system and computer programs may be loaded from the secondary storage device into the system memory to be executed by the processor . The computer may further include a network interface for network communication between the computer and external devices (e.g. over the Internet), such as user devices accessing the horse race betting GUI , described throughout this disclosure using a mobile application or web browser. Server-side user interaction with the computer may be via one or more I/O devices , such as a display, mouse, keyboard, etc.
1610
1610
1600
1600
200
1600
200
210
220
1600
1600
1600
310
1010
380
1080
410
1110
430
1140
FIG. 2
FIG. 2
FIGS. 3, 4, 10, and 11
FIG. 3 or 10
FIG. 4 or 11
The computer programs may comprise program instructions which, when executed by the processor , cause the processor to perform operations in accordance with the various embodiments of the present disclosure. For example, a program that is installed in the computer may cause the computer to function as an apparatus such as the horse race betting apparatus of , e.g., causing the computer to function as some or all of the sections, components, elements, databases, engines, interfaces, modules, updaters, selectors, calculators, etc. of the apparatus of (e.g., the user I/O interface , the ticket updater , etc.). A program that is installed in the computer may also cause the computer to perform an operational flow such as those shown in or a portion thereof, e.g., causing the computer to perform one or more of the steps of (e.g., display list(s) of horses , , mark horse(s) based on predicted win percentages , , etc.) and or (e.g., apply lock selection constraint , , maximize function of predicted ticket win percentage , , etc.).
1630
1600
The above-mentioned computer programs may be provided to the secondary storage by or otherwise reside on an external computer-readable medium such as a DVD-ROM, an optical recording medium such as a CD or Blu-ray Disk, a magneto-optic recording medium such as an MO, a semiconductor memory such as an IC card, a tape medium, a mechanically encoded medium such as a punch card, etc. Other examples of computer-readable media that may store programs in relation to the disclosed embodiments include a RAM or hard disk in a server system connected to a communication network such as a dedicated network or the Internet, with the program being provided to the computer via the network. Such program storage media may, in some embodiments, be non-transitory, thus excluding transitory signals per se, such as radio waves or other electromagnetic waves. Examples of program instructions stored on a computer-readable medium may include, in addition to code executable by a processor, state information for execution by programmable circuitry such as a field-programmable gate arrays (FPGA) or programmable logic array (PLA).
The above description is given by way of example, and not limitation. Given the above disclosure, one skilled in the art could devise variations that are within the scope and spirit of the invention disclosed herein. Further, the various features of the embodiments disclosed herein can be used alone, or in varying combinations with each other and are not intended to be limited to the specific combination described herein. Thus, the scope of the claims is not to be limited by the illustrated embodiments. | |
It’s one thing to go out into the woods with a full woodsman axe, a saw, hundreds of feet of bank line or 550 cord, and plenty of warm clothing to set out and build yourself a survival shelter. It’s a whole other story to be cold with a storm coming in as it’s getting dark with no tools and a desperate need to stay dry. That’s what a survival situation is, and with that in mind today we’re going to cover how to build a simple survival shelter with no tools called a debris shelter.
The first thing to note is that a debris shelter isn’t meant to be a permanent survival shelter. This isn’t something that you’re going to spend a whole summer in (although you could if you were very desperate). This is a shelter designed to keep you insulated and out of the elements with minimal tools and minimal time put in. Here TA Outdoors has made an excellent short video outlining construction techniques:
Select your site
Like any other campsite you want an area that is safe from widow makers and and other falling hazards. As you’re sleeping on the ground you want to avoid areas where water will pool around you, and ideally you will find a spot that has plenty of material to construct your shelter.
Begin construction
What you want to find is either a stump or the crook of a tree low enough to the ground to prop a main beam onto and only leave a little bit of space between it and the ground. This is where your body will go, but you need about a half foot on all sides to fill with insulation. The beam should be at least 8 feet long and thick/sturdy enough to not break under a bit of weight.
Add Walls
Next break medium sized branches by using larger trees as a wedge and fulcrum. Break them into smaller pieces and prop them against the main beam to make walls on both sides. These branches should be about the diameter of a broom handle. These should be touching the ground on either side about a half foot from where you expect your body to lay. Leave an opening at the front where your head will go.
Add Insulation
After your walls are on start piling your insulation on the outside and inside. Use smaller sticks, moss, leaves, pine needles, anything that is relatively soft and dry. You want this on both the outside and the inside to insulate you from wind and cold. To prevent the wind from taking the insulation off the outside you can also pile sticks over it to keep it in place.
After the entire thing is finished crawl inside making sure to get the insulation between you and all sides as evenly as you can. Always remember that the ground can sap warmth from you as well so make sure there is insulation under you. To construct a makeshift door you can fill a shirt full of insulated debris and plug the hole in front of your head.
While this certainly will not rival your queen sized bed at home, or your awesome tent that you’re used to camping in, it will absolutely keep you alive if you find yourself in a tight spot. Just because you may not have tools doesn’t mean you can’t use your brain and your surroundings to stay alive! | https://survival101.org/how-to-construct-a-debris-shelter/ |
Assign tasks to multiple users
I need to be able to assign tasks/projects to multiple users.
Thank you for all the feedback. We’ve completed the work to support assigning a task to multiple people, and it is now available for use world wide.
Thanks!
- Planner Team
360 commentsComments are closed
-
David commented
The way this was implemented doesn't make sense. The common use case is that everyone in a channel or group of users, needs to perform task individually by a due date. Not that 10 or less users are all possibly doing the same single task and they're collectively just supposed to agree it's done at some point, at which point one of them is supposed to figure out to mark it as done. Is there another user voice item to implement this in a way that people are asking for in these comments? If I've got a channel or team of 1000 users, and I need them to complete a survey by a certain date, why can't I just create a task for everyone currently in the team which contains a list of everyone marking it as completed individually? That's what makes sense and what everyone asking for. Maybe this is something available in a different plugin than planner tasks?
-
Pls add more than 11 people!
-
Need to know who is doing the task and who is being informed, also at checklist/subtask level
-
Does it actually assign one task per user? What happens when one person from the multiple people marks the task complete? Will I be able to view if each person has completed the task?
-
Are you able to add functionality for each team member assigned a task to complete individually without completing the whole task? Also keen to add more than 11 people to a task.
-
James Ward commented
This needs refinement, we need to be able to define who is ultimately responsible for the task. Something akin to a simple RACI assignment would be suitable.
-
I'd like the order of assignees to be displayed in the order that they are assigned, rather than defaulting to displaying in alphabetical order. On our team, we'll have one person as the project lead (who we'd like to have listed first) and the others as collaborators.
-
Would really like to be able to add more than 11 to a task, this is a big limitation for various efforts that we're using Planner for.
Thanks
-
I can still only assign to a maximum of 11 people, why is this?
-
Remmelt de Koning commented
can the functionality of 'assign to all' be implemented as well?
-
We have also the need to assign more than 11 people per task. Please increase the number of assignee's to at least 20 and please allow them to mark completion per user rather than closing the whole task. Tasks should not be allowed to be deleted either!
-
Mark commented
We urgently need more than 11 people. Incredible that this limit is in place!!!!
-
Agree with everyone that planner needs to be allowed to assign tasks to MORE than 11 users and allow each user to mark the task completed as an individual.
-
Please allow more than 11 assignees per task.
-
Michael commented
We have also the need to assign more than 11 people per task, please increase the number of assignees at least to 20. On top of it - we need a status per user and an Overall-Status.
Thanks
-
PS commented
Please allow each person on the team to mark their part 'complete' without showing the task 'complete' for everyone. Planner is ineffective if I cannot track the progress of each team member individually on tasks. The task should be marked complete for all members only after everyone has indicated it is complete individually or the 'owner' of the task marks it as complete.
-
JMP commented
We should be able to assign a task at least to the whole community of members sharing the same plan! and very simply, by assigning the task to the O365 group name, not member by member... Thank you!
-
nogard111 commented
It will be useful only if multiple assigners all click complete before the task is changed to completed
-
Same here; my team is significantly larger compared to the current 11 people at max. Please increase the number of people to assign a certain task.
-
Please add the ability to be able to assign a task to more than 11 people. There is more than 18 people in my team and being able to assign a task to only half of my team is very frustrating. | https://planner.uservoice.com/forums/330525-microsoft-planner-feedback-forum/suggestions/11424171-assign-tasks-to-multiple-users?page=2&per_page=20 |
We offer a large and beautiful house in a small village 25 minutes from Tel-Aviv center. We have four bedrooms, one with one single bed and the others with double sized beds. There is one more living room on the upper level with a t.v and sofas.
the lower level is a large open space (designed as a loft).
there is a large kitchen where all the family can eat.
anther place to eat is outside on the beautiful porch with the wooden deck under the trees.
the place is ideal base to all attraction in the center.
20 minutes to the beach and 45 from Jerusalem's center. | https://www.homeforexchange.com/listing/israel/kfar-bilu-private-and-quiet-house-near-tel-aviv |
Completing our study of polynomial functions, in this lesson we turn to complex zeros which will enable us to factor ANY polynomial. The Fundamental Theorem of Algebra shows that the degree of the polynomial matches the number of its roots when factored in the complex realm. Descartes Rule of Signs classifies the possible roots. The Rational Roots Theorem helps us list all the possible roots and synthetic division helps us find the actual roots.
Objectives
By the end of this topic you should know and be prepared to be tested on:
- 3.4.1 Factor polynomial involving Complex roots/factors
- 3.4.2 Know that Complex roots come in conjugate pairs
- 3.4.3 Understand the Fundamental Theorem of Algebra and know that it assures every polynomial factors down to a product of linear factors
- 3.4.4 Write all the possible rational roots of a polynomial according to the Rational Roots Theorem
- 3.4.5 Classify the possible roots of a polynomial according to Descartes Rule of Signs and display the conclusions in a Descartes Root Chart
- 3.4.6 Use the list of possible rational roots and synthetic division to systematically find roots of a polynomial and factor it completely according to FTA
- 3.4.7 Use Descartes theorems and the Upper/Lower Bounds Theorem to organize and make more efficient the process described in objective 3.3.6
- 3.4.8 Electronically graph the polynomial function to verify the roots found algebraically
Terminology
Define: complex zeros, conjugate pairs, Fundamental Theorem of Algebra, Rational Roots Theorem, Descartes, Descartes Rule of Signs, Descartes Root Chart, Upper/Lower Bounds Theorem
Supplemental Resources (optional)
If you need supplemental tutorial videos with examples relevant to this section go to James Sousa's MathIsPower4U and search for topics:
"Determining the Characteristics of Polynomial Functions"
"Finding the Zeros of Polynomial Functions" | https://www.integreat.ca/NOTES/CALG/03.04.html |
Immunoassay of CEA, CA 19-9, CA 125, and CA 15-3 on the automated systems ES 300 and ES 600: methodological evaluation from a multicentre collaborative study.
The analytical performance of the automated Enzymun Test System ES 300 and ES 600 (developed by Boehringer Mannheim) for the assay of the tumour markers CEA, CA 19-9, CA 125, and CA 15-3, was assessed from data collected in a multicentre collaborative study in which eleven laboratories were involved. Results of the 1990 cycle of the external quality assessment (EQA) scheme for tumour markers, supported by the Italian National Research Council (CNR), were also used in this evaluation. The within-assay and between-assay precision was found to be 2.0 and 4.3 CV% for CEA, 2.9 and 6.8 CV% for CA 19-9, 3.6 and 9.4 CV% for CA 125, 2.9 and 6.0 CV% for CA 15-3. The between-lab variability of the four tumour markers on ES 300 and ES 600 systems was 9.4, 10.6, 11.9, 9.2 CV% for CEA, CA 19-9, CA 125 and CA 15-3 respectively. These values were comparable to or better than those obtained with the most precise manual kits used by laboratories participating in the 1990 EQA cycle. The agreement between the results from the Enzymun Test and those obtained using other method/kits was evaluated by assaying control samples previously circulated either in the CNR EQA or in the German EQA. The regression analysis indicates that for CEA, CA 125 and CA 15-3 assays the results produced by ES 300 and ES 600 are in good agreement with the consensus means of the EQAs; CA 19-9 results exhibit a worse correlation and are generally lower than the consensus mean. The linearity of the assays for the four tumour markers was checked by dilution tests performed by participants in the collaborative study; in all cases the dilution of the sample did not affect the values obtained.
| |
Balanced Equation for Sodium Bicarbonate and Sulfuric Acid
This content was COPIED from BrainMass.com - View the original, and get the already-completed solution here!
Sodium bicarbonate was added to an unlimited amount of sulfuric acid undergoing a reaction to produce sodium sulfate plus carbonic acid (which turned in to water vapor and carbon dioxide upon heating). Please provide a balanced equation for this reaction.© BrainMass Inc. brainmass.com December 24, 2021, 5:20 pm ad1c9bdddf
https://brainmass.com/chemistry/acids-and-bases/balanced-equation-sodium-bicarbonate-sulfuric-acid-42523
Solution Preview
Information to start with:
Carbonic acid is H2CO3
Sulfuric acid is H2SO4
Soduim ion has a valence +1
Hydronium ion has a valence +1
---
So sulfate ion has a net charge of -2
Sodium sulfate then looks like Na2SO4 and sodium carbonate must also then be ...
Solution Summary
The solution talks the reader through each choice and step in balancing the reaction between sodium bicarbonate and sulfuric acid leading to the production of sulfate and carbonic acid. It includes general tips and a helpful link as well. | https://brainmass.com/chemistry/acids-and-bases/balanced-equation-sodium-bicarbonate-sulfuric-acid-42523 |
This suggests that all the training examples have a fixed sequence length, namely timesteps. That is not quite correct, since that dimension can be None, i.e. variable length. Within a single batch, you must have the same number of timesteps (this is typically where you see 0-padding and masking). But between batches there is no such restriction. During ...
43
This is a problem of alignment of the virtual processors (VP) onto the physical processors (PP) of the GPU. Since the number of PP is often a power of 2, using a number of VP different from a power of 2 leads to poor performance. You can see the mapping of the VP onto the PP as a pile of slices of size the number of PP. Say you've got 16 PP. You can map 16 ...
41
Yes, you put it quite correctly. As a teacher, you wouldn’t give your students an exam that’s got the exact same exercises you have provided as homework: you want to find out whether they (a) have actually understood the intuition behind the methods you taught them and (b) make sure they haven’t just memorised the homework exercises.
37
When new observations are available, there are three ways to retrain your model: Online: each time a new observation is available, you use this single data point to further train your model (e.g. load your current model and further train it by doing backpropagation with that single observation). With this method, your model learns in a sequential manner and ...
29
Once a model is trained and you get new data which can be used for training, you can load the previous model and train onto it. For example, you can save your model as a .pickle file and load it and train further onto it when new data is available. Do note that for the model to predict correctly, the new training data should have a similar distribution as ...
21
There are a couple of nuances here. Complexity question very important - ocams razor CV - is this trully the case 84%/83% (test it for train+test with CV) Given this, personal opinion: Second one. Better to catch general patterns. You already know that first model failed on that because of the train and test difference. 1% says nothing.
19
Best way is to collect more data, if you can. Sampling should always be done on train dataset. If you are using python, scikit-learn has some really cool packages to help you with this. Random sampling is a very bad option for splitting. Try stratified sampling. This splits your class proportionally between training and test set. Run oversampling, ...
19
I personally haven't seen that for products going into production, but understand the logic. Theoretically, the more data your deployed model has seen, the better is should generalise. So if you trained the model on the full set of data you have available, it should generalise better than a model which only saw for example train/val sets (e.g. ~ 90%) from ...
17
Once you have obtained optimal hyperparamters for your model, after training and cross validating etc., in theory it is ok to train the model on the entire dataset to deploy to production. This will, in theory, generalise better. HOWEVER, you can no longer make statistical / performance claims on test data since you no longer have a test dataset. If you ...
15
A point that needs to be emphasized about statistical machine learning is that there are no guarantees. When you estimate performance using a held-out set, that is just an estimate. Estimates can be wrong. This takes some getting used to, but it's something you're going to have to get comfortable with. When you say "What if the performance actually ...
15
As the other answers already state: Warmup steps are just a few updates with low learning rate before / at the beginning of training. After this warmup, you use the regular learning rate (schedule) to train your model to convergence. The idea that this helps your network to slowly adapt to the data intuitively makes sense. However, theoretically, the main ...
14
If the number of values belonging to each class are unbalanced, using stratified sampling is a good thing. You are basically asking the model to take the training and test set such that the class proportion is same as of the whole dataset, which is the right thing to do. If your classes are balanced then a shuffle (no stratification needed here) can ...
14
It depends mostly on the problem context. If predictive performance is all you care about, and you believe the test set to be representative of future unseen data, then the first model is better. (This might be the case for, say, health predictions.) There are a number of things that would change this decision. Interpretability / explainability. This is ...
12
This usually means that you use a very low learning rate for a set number of training steps (warmup steps). After your warmup steps you use your "regular" learning rate or learning rate scheduler. You can also gradually increase your learning rate over the number of warmup steps. As far as I know, this has the benefit of slowly starting to tune things like ...
12
What are the filters? A filter/kernel is a set of learnable weights which are learned using the backpropagation algorithm. You can think of each filter as storing a single template/pattern. When you convolve this filter across the corresponding input, you are basically trying to find out the similarity between the stored template and different locations in ...
12
It is wrong because: it is fundamentally incorrect (a theoretical concern) it leads to bad results (a practical concern) It is fundamentally incorrect because usually the objective of testing a model is to estimate how well it will perform predictions on data that the model didn't see. It's quite hard to come up with good estimates of real-world ...
9
I just hacked together a very basic helper in python it requires that all images are stored in a pyton list allImages. import matplotlib.pyplot as plt category= plt.ion() for i,image in enumerate(allImages): plt.imshow(image) plt.pause(0.05) category.append(raw_input('category: '))
9
As you are working on image classification and would also like to implement some data augmentation, you can combine the two AND load the batches directly from a folder using the mighty 'ImageDataGenerator` class. Have a look at the execellent documentation! I won't copy and paste the example from that link, but I can outline the steps that you go through: ...
9
Definitions, so we are on the same page: Training set: the data points used to train the model. Validation set: the data points to keep checking the performance of your model in order to know when to stop training. Testing set: the data points used to check the performance once training is finished. May training and validation sets overlap? They should ...
9
stratify parameter will preserve the proportion of target as in original dataset, in the train and test datasets as well. So if your original dataset df has target/label as [0,1,2] in the ratio say, 40:30:30. That is, for every 100 datasets, you can find 40, 30 and 30 observations of target 0,1 and 2 respectively. Now when you split this original using the ...
8
I do something similar with keras and GPU training, where i also have only a small memory amount available. The idea would be split the numpy files into smaller ones, let's say 64 samples per file and then load each file and call train_on_batch on those images. You can use keras' train_on_batch function to achieve this: train_on_batch train_on_batch(self, ...
8
There are multiple ways to approach solving game playing problems. Some games can be solved by search algorithms for example. This works well for card and board games up to some level of complexity. For instance, IBM's Deep Blue was essentially a fast heuristic-driven search for optimal moves. However, probably the most generic machine learning algorithm ...
8
There is no "mismatch" of accuracy. Your problem is that you have an image segmentation problem where 99% of the pixels should be zero. So getting 99% accuracy is trivially easy. A model that predicts just blank output images would score roughly the same as your network has so far. Your accuracy metric is not meaningful. The low Dice coefficient score gives ...
8
@kbrose seems to have a better solution I suppose the obvious thing to do would be to find the max length of any sequence in the training set and zero pad it. This is usually a good solution. Maybe try max length of sequence + 100. Use whatever works best for your application. But then does that mean I can't make predictions at test time with input ...
8
Number of features of the model must match the input. Model n_features is `N` and input n_features is `X`.
You are supposed to pass numpy arrays and not lists as arguments to the DecisionTree, since your input was a list it gets trained as 70 features (1D list) and your test had list of 30 elements and the classifier sees it as 30 features. Nonetheless, you need to reshape your input numpy array and pass it as a matrix meaning: X_train.values.reshape(-1, 1) ...
8
Oversample the train data and NOT the validation data since if train data is unbalanced, your test data will most likely show the same trait and be unbalanced. If you don't know if test data will be balanced or not, oversample only train data. But there is one recommendation which I will personally give you since I suffered from same problem not so long ago. ...
8
The first has an accuracy of 100% on training set and 84% on test set. Clearly over-fitted. Maybe not. It's true that 100% training accuracy is usually a strong indicator of overfitting, but it's also true that an overfit model should perform worse on the test set than a model that isn't overfit. So if you're seeing these numbers, something unusual is going ...
8
It can happen that the model you train learns "too much" or memorizes the training data, and then it performs poorly on unseen data. This is called "overfitting". The problem of training and testing on the same dataset is that you won't realize that your model is overfitting, because the performance of your model on the test set is good. ...
7
It highly depends on the type of game and the information about the state of the game that is available to your AI. Some of the most famous game playing AIs from last few years are based on deep reinforcement learning (e.g. Playing Atari with Deep Reinforcement Learning), which is normal reinforcement learning (e.g. Q-learning) with a deep neural network as ...
7
Yes, there are models that do this. This link points to one of the first papers I believe. The main idea is called weakly supervised object detection. The paper essentially makes three modifications. They treat the typical hidden fully connected layer as a convolutional layer. This works because convolutional layers can be thought of as convolving the same ... | https://datascience.stackexchange.com/tags/training/hot |
My Thoughts On Twitter 8/2/18
By connecting the beginning of creation, its current state and its end, a person starts feeling grateful to the Creator, outside any personal calculations. By opening the heart to the friends and letting them in, I acquire the spiritual world. The group is my actual soul.
If I correct myself, parts of the world will converge and become a single whole. By taking responsibility for the world, I unite the broken parts of my soul. The world is a part of my Kli, the souls that I must connect. This is how my flaws requiring correction are revealed.
The the world’s condition is entirely up to me. I alone can bring it to total correction. After all, the “world” is what appears to me in my desire, either in a corrupted or a corrected one, to a greater or lesser extent. This means everything depends on me!
Any darkness must be taken as the reverse side of the light, as its starting point. Wishing for greater unity, guarantee, bestowal above the ego, seeking to see the Creator’s good in everything, we transform darkness into the light, bitterness into sweetness; we hasten the dawn.
Darkness and the lack of guarantee in the group are the light and the vessel of the next state. The Creator “flirts” so that we strive after Him. Any descent is an invitation to rise. Darkness demands that we strengthen the guarantee in order to become one with the Creator.
Merging with the Creator in darkness is transforming His reverse side into His face. If I cannot treat evil as goodness, if I cannot turn any condition into adhesion with the Creator, then I am not receiving the power of a guarantee from the group.
Darkness is a breaking, incapacity to perceive the light- force of bestowal. In the darkness of #selfishness we find the Creator’s “underside,” the opportunity for correction. And we rejoice at this, for He showed us what’s missing. Now from darkness we can come to adhesion with Him.
There is nothing accidental in the world. Everything is intended only for the disclosure of the Creator, the Good Who Does Good. If we prepare in advance, we will accept anything negative correctly, finding Him in the darkness, in the opposite states.
Spiritual work’s built on a request/gratitude to the Creator—He’s open to both. One chooses what will give him maximum equivalence = bestowal to the Creator, thru maximum effort against the self and through the group. We ask to unite our intentions. Becoming one, we’ll merge with the Creator
Every single day we cause numerous problems by our barbaric use of oil and trees, by poisoning the earth with #chemical #waste. But the biggest blow to nature we cause is by acting selfishly in our relations. Since this level is the highest, it causes a common crisis. #environment
#Kabbalah offers every person the opportunity to move through space at infinite speed and zero time—notwithstanding #Einstein!
#Wisdom #ThursdayThoughts #quotes #Time #life
Kabbalah explains tragedies by the lack of connection between us, the lack of balance between parts of nature. The world has turned into a ball girded with multiple threads that we are progressively destroying. In the integral world, breaking connections causes an integral crisis!
A person who wishes to advance in spirituality must remove his ego-desire.
He realizes that he can’t go against his ego-nature.
But since the Creator gave him the ego-nature, He will replace it as well, if the person asks for it from the bottom of his heart.
To lift a person from spiritual ascent, the Creator drops him down with thoughts of him instead of HIM. One thinks that he fell alone, spiritual growth isn’t for him and he’s worse than everyone. But precisely from this state, if he asks the Creator, He helps and brings him to Him.
Loss of energy and sensation of emptiness (after a congress) come from above—for us to find out: What does the Creator want from me? Why did He take away all my strength and desires?
It’s so I’ll depend only on Him and receive desires/strength to move to the goal only from Him!
After ascent (at a congress), we fall!
Yet it’s not descent, but opportunity to reevaluate the goal anew:
what do I want from the Creator and what does He want from me?
Whereas in ascent there is no care for spirituality—since I feel great and would stay this way my whole life.
According to Baal HaSulam, “Peace In The World”: Peace in a given society depends on world peace, for we’ve reached a stage where the whole world is a single society. So everyone has to care for the wellbeing of the entire world and serve it, in order to ensure his own existence.
From Twitter, 8/2/18
Related Material: | https://laitman.com/2018/08/my-thoughts-on-twitter-8218/ |
Polyglot is a highly extensible compiler front-end for the Java programming language. For more than ten years, researchers have used Polyglot to develop Java language extensions. While Polyglot originally targeted Java 1.4, its own extension mechanisms have been recently been used to add support for modern Java features such as generics and annotations. Polyglot has proved to be a very useful tool for experimenting with new language features and for building other language-processing tools.
One particularly useful Polyglot extension is the Accrue interprocedural analysis framework. The Accrue framework simplifies implementation of interprocedural analyses of programs written using either Java, or extensions to Java. These analyses can be used for program understanding or as part of the implementation of the language.
In this tutorial, we explore how to use Polyglot and the Accrue framework to build language extensions and program analyses.
Design philosophy
Polyglot has been successful because of its design philosophy:
- It is designed to support building complex language extensions that significantly modify the behavior of the base language, Java.
- Polyglot is built in Java and does not require coding in a specialized language.
- Its design patterns support modular extensibility in which the extended languages can be implemented while using the original Polyglot code as an unmodified library.
- Further, its extensibility is scalable: coding effort is proportional to the amount of functionality added.
- Compiler extensions can be layered on top of previous extensions, allowing languages to be built up incrementally.
Support for complex language extensions
Polyglot is not just a preprocessor; it supports the development of complex language extensions that add new features to the Java language, including to its type system. The base Polyglot framework implements an extensible compiler for the base language Java 1.4. This framework, also written in Java, is by default simply a semantic checker for Java. An implementation of a language extension may extend the framework to define any necessary changes to the compilation process, such as extending the abstract syntax tree (AST) and adding new compiler passes that analyze and transform the program.
Polyglot has been used to build extensions that change Java in very significant ways, such as supporting information flow labels (Jif), aspects (abc) and distributed computation (X10, Fabric). In fact, Java 5 and Java 7 are implemented as successive extensions to the base compiler. Because Polyglot implements Java 7, it is able to compile itself.
The standard back end of Polyglot generates pretty-printed Java code. It is also possible to add new back ends. In the usual mode of use, all static checking is performed by Polyglot and the extension code, and the back end compiler is handed fully correct Java code. Error messages are generated with respect to the original source code rather than relying on the back end compiler to generate messages, which would likely be less understandable.
Developing in Java with design patterns
Unlike some other recent extensible compilers, Polyglot is built using a standard programming language, Java. It's not necessary to learn a new programming language, and existing libraries and IDEs can be used to develop a Polyglot-based compiler. Polyglot was originally implemented using Java 1.4, but it has been able to grow along with Java and to take advantage of the new language features added in later versions of the language, such as generics.
Avoiding domain-specific language support does have a price, however. Even though object-oriented languages like Java are designed to support extensibility, a compiler is a particularly challenging kind of software to build in an extensible way. Compilers contain both complex data structures and complex algorithms, both of which may need to be extended. To make this possible without relying on support from specialized language features, Polyglot is implemented using a distinctive set of design patterns.
Patterns for modular, scalable extensibility
The difficulty of extending in a type-safe way both types and the procedures that manipulate them was observed early by Reynolds and is often called the “Expression problem”. This problem is encountered when extending compilers: the types to be extended are the abstract syntax tree nodes used to represent the program, and the procedures to be extended are the compiler passes that traverse and transform this AST.
Solutions to the Expression problem often have the problem that they are not scalable, in the sense that the amount of code needed to construct an extension is proportional to the size of the code base being extended, rather than to the size of the change being made.
To provide modular, scalable extensibility, Polyglot uses several design patterns:
-
Careful separation of interfaces and implementations. For example, all AST
nodes (e.g,
Node) are represented by interfaces with a standard implementation (e.g.,
Node_c) that can be replaced.
- A modified version of the Visitor pattern supports incremental, functional-style (side-effect-free) translation of ASTs. This pattern makes it convenient to split the work into a sequence of small compiler passes that each does only a small, modular task.
-
The Abstract Factory pattern is used to avoid binding the syntax of
the language to specific classes representing abstract syntax nodes.
Instead, these objects are created using a
NodeFactoryobject.
-
Extension objects allow Polyglot to mix in additional state and
operations to existing abstract syntax tree nodes. Each layer of extension
may add its own layer of extension objects to each node in the language.
They are created by
ExtFactoryfactory objects.
- Language dispatcher objects handle the dispatching of AST node operations to the appropriate extension object, performing the transformation that is appropriate to the current language extension. | https://research.cs.cornell.edu/polyglot/pldi14/tutorial/introduction/ |
Biomedical research is in general simply known as medical research. It is the basic research, applied research, or translational research conducted to aid and supports the development of knowledge in the field of medicine. An important kind of medical research is clinical research, which is distinguished by the involvement of patients. Other kinds of medical research include pre-clinical research, for example on animals, and basic medical research, for example in genetics.
Protein structure is the three-dimensional arrangement of atoms in a protein molecule. Proteins are polymers specifically polypeptides formed from sequences of amino acids, the monomers of the polymer. A single amino acid monomer may also be called a residue indicating a repeating unit of a polymer. Proteins form by amino acids undergoing condensation reactions, in which the amino acids lose one water molecule per reaction in order to attach to one another with a peptide bond. By convention, a chain of 30 amino acids is often identified as a peptide, rather than a protein. To be able to perform their biological function, proteins fold into one or more specific spatial conformations driven by a number of non-covalent interactions such as hydrogen bonding, ionic interactions, Van der Waals forces, and hydrophobic packing. To understand the functions of proteins at a molecular level, it is often necessary to determine their three-dimensional structure. This is the topic of the scientific field of structural biology, which employs techniques such as X-ray crystallography, NMR spectroscopy, and dual polarisation interferometry to determine the structure of proteins.
Bioinformatics is an interdisciplinary field that develops methods and software tools for understanding biological data. As an interdisciplinary field of science, bioinformatics combines computer science, statistics, mathematics, and engineering to analyse and interpret biological data.
Computational Biology involves the improvement and application of statistics-analytical and theoretical methods, mathematical modelling and computational simulation techniques to the study of organic, behavioural, and social structures. The field is widely described and includes foundations in biology, applied mathematics, data, biochemistry, chemistry, biophysics, molecular biology, genetics, genomics, pc technological know-how and evolution.
Genomics refers to the study of the genome in contrast genetics which refers to the study of genes and their roles in inheritance. Genomics can be considered a discipline in genetics. It applies recombinant DNA, DNA sequencing methods, and bioinformatics to sequence, assemble and analyse the function and structure of genomes (the complete set of DNA within a single cell of an organism). Advances in genomics have triggered a revolution in discovery-based research to understand even the most complex biological systems such as the brain. The field includes efforts to determine the entire of DNA sequence organisms and fine-scale genetic mapping.
Cardiovascular disease (CVD) is a class of diseases that involve the heart or blood vessels. Cardiovascular disease includes coronary artery diseases (CAD) such as angina and myocardial infarction (commonly known as a heart attack). Other CVDs are the stroke, heart failure, hypertensive heart disease, rheumatic heart disease, cardiomyopathy, heart arrhythmia, congenital heart disease, valvular heart disease, carditis, aortic aneurysms, peripheral artery disease, and venous thrombosis.
Electrospray ionization (ESI) is a technique used in mass spectrometry to produce ions using an electrospray in which a high voltage is applied to a liquid to create an aerosol. Liquid chromatography is an analytical chemistry technique that combines the physical separation capabilities of liquid chromatography (or HPLC) with the mass analysis capabilities of mass spectrometry (MS). Multidimensional Protein Identification Technology (MudPIT) is used to analyze the proteomes of organisms. Protein purification is a series of processes intended to isolate one or a few proteins from a complex mixture, usually cells, tissues or whole organisms. Imaging mass spectrometry (IMS) using matrix-assisted laser desorption ionization (MALDI) is a new and effective tool for molecular studies of complex biological samples such as tissue sections.
Epigenomics is the study of the complete set of epigenetic modifications on the genetic material of a cell, known as the epigenome. The field is analogous to genomics and proteomics, which are the study of the genome and proteome of a cell. Epigenetic modifications are reversible modifications on a cell’s DNA or histones that affect gene expression without altering the DNA sequence. Epigenomic maintenance is a continuous process and plays an important role in the stability of eukaryotic genomes by taking part in crucial biological mechanisms like DNA repair. Plant flavones are said to be inhibiting epigenomic marks that cause cancers. Two of the most characterized epigenetic modifications are DNA methylation and histone modification. Epigenetic modifications play an important role in gene expression and regulation and are involved in numerous cellular processes such as in differentiation/development and tumorigenesis. The study of epigenetics on a global level has been made possible only recently through the adaptation of genomic high-throughput assays.
Epigenetics are stable heritable traits (or "phenotypes") that cannot be explained by changes in DNA sequence. Epigenetics often refers to changes in a chromosome that affect gene activity and expression but can also be used to describe any heritable phenotypic change that doesn't derive from a modification of the genome, such as prions. Such effects on cellular and physiological phenotypic traits may result from external or environmental factors, or be part of the normal developmental program. The standard definition of epigenetic requires these alterations to be heritable, either in the progeny of cells or of organisms.
Proteins are a primary constituent of living things and one of the chief classes of molecules studied in biochemistry. Proteins provide most of the molecular machinery of cells. Many are enzymes or subunits of enzymes. Other proteins play structural or mechanical roles, such as those that form the struts and joints of the cytoskeleton. Each protein is linear polymers built of amino acids.
Systems biology is the computational and mathematical modelling of complex biological systems. An emerging engineering approach applied to biological scientific research, systems biology is a biology-based interdisciplinary field of study that focuses on complex interactions within biological systems, using a holistic approach (holism instead of the more traditional reductionism) to biological research. Particularly from the year 2000 onwards, the concept has been used widely in the biosciences in a variety of contexts. The Human Genome Project is an example of applied systems thinking in biology which has led to new, collaborative ways of working on problems in the biological field of genetics. One of the outreaching aims of systems biology is to model and discover emergent properties, properties of cells, tissues and organisms functioning as a system whose theoretical description is only possible using techniques which fall under the remit of systems biology. These typically involve metabolic networks or cell signalling networks.
Computational biology involves the development and application of data-analytical and theoretical methods, mathematical modelling and computational simulation techniques to the study of biological, behavioural, and social systems. The field is broadly defined and includes foundations in computer science, applied mathematics, animation, statistics, biochemistry, chemistry, biophysics, molecular biology, genetics, homology, genomics, ecology, evolution, anatomy, neuroscience, and visualization.
The high demand for low-cost sequencing has driven the development of high-throughput sequencing, which also goes by the term next-generation sequencing (NGS). Thousands or millions of sequences are concurrently produced in a single next-generation sequencing process. Next-generation sequencing has become a commodity. With the commercialization of various affordable desktop sequencers, NGS has become within the reach of traditional wet-lab biologists. As seen in recent years, the genome-wide scale computational analysis is increasingly being used as a backbone to foster novel discovery in biomedical research.
Pharmacogenomics is the study of the role of the genome in drug response. Its name (pharmaco + genomics) reflects it’s combining of pharmacology and genomics. Pharmacogenomics analyzes how the genetic makeup of an individual affects his/her response to drugs. It deals with the influence of acquired and inherited genetic variation on drug response in patients by correlating gene expression or single-nucleotide polymorphisms with pharmacokinetics (drug absorption, distribution, metabolism, and elimination) and pharmacodynamics (effects mediated through a drug's biological targets). The term pharmacogenomics is often used interchangeably with pharmacogenetics. Although both terms relate to drug response based on genetic influences, pharmacogenetics focuses on single drug-gene interactions, while pharmacogenomics encompasses a more genome-wide association approach, incorporating genomics and epigenetics while dealing with the effects of multiple genes on drug response.
Current transcriptomic profiling techniques include DNA microarray, cDNA amplified fragment length polymorphism (cDNA-AFLP), expressed sequence tag (EST) sequencing, serial analysis of gene expression (SAGE), massive parallel signature sequencing (MPSS), RNA-seq etc. The most recent technology for transcriptomic profiling is RNA-Seq which is considered as a revolutionary tool for this purpose. Eukaryotic transcriptomic profiles are primarily analyzed with this technique and it has been already applied for transcriptomic analysis of several organisms including Saccharomyces cerevisiae, Schizosaccharomyces pombe, Arabidopsis thaliana, mouse and a human cell.
Machine learning is closely related to computational statistics, which also focuses on prediction-making through the use of computers. It has strong ties to mathematical optimization, which delivers methods, theory and application domains to the field. Machine learning is sometimes conflated with data mining, where the latter subfield focuses more on exploratory data analysis and is known as unsupervised learning.
Molecular Interactions are attractive or repulsive forces between molecules and between non-bonded atoms. Molecular interactions are important in diverse fields of protein folding, drug design, material science, sensors, nanotechnology, separations, and origin of life. Molecular interactions are also known as non-covalent interactions or intermolecular interactions. Molecular interactions are not bonds.
The proteome of each living cell is dynamic, altering in response to the individual cell's metabolic state and reception of intracellular and extracellular signal molecules, and many of the proteins which are expressed will be post-translationally altered. Thus if the purpose of the proteome analysis is to aid the understanding of protein function and interaction, then it is the identification of the proteins in their final state which is required: for this mass spectrometric identification of individual proteins, indicating site and nature of modifications, is essential. | https://www.proteomicsconference.com/asia-pacific/call-for-abstracts.php |
Organize file folders, magazines and other vertical files on a tier of any Moll Carousel. The Organizer Set converts a full shelf tier into twenty smaller sections. Use the Organizer Set to neatly store file folders, magazines and unbound documents upright.
Features:
- 120 vertical files fit on an individual shelf tier
- Shelf quarter can be subdivided with four separators to stabilize the stored media and files
- Color: Dark grey
Specifications:
- Dimensions: 8" x 8" x 12" | https://www.empireimports.com/moll-deluxe-binder-file-carousel-organizer-set/ |
Great scientist Newton told us that time is absolute and it’s uniformly ticking throughout the whole universe. But Einstein did not agree with Newton and gave us a revolutionary idea that “time is relative”. He gave us the famous theory of relativity which is now the basis of modern physics. But there is some paradox that arose with this theory as a result of time dilation and one of them is the twin paradox.
However, we have many explanations for these paradoxes, but the question is how does time appear? faster or slower. The answer lies in the fact that the universe has more than four dimensions, and time which we assume to have a single dimension is made up of more than two dimensions and that’s the true reason why we find sometimes it moves faster while sometimes it moves slower. Just as gravity goes through every possible dimension and appears weak in three or four dimensions and that’s exactly the case with time, we can relate its faster and slower speed at different places of the universe with time’s multi-dimensional nature.
What is Multi-Dimensional Time?
Multi-Dimensional Time means the possibility of more than one dimension of time. The concept of multi-dimensional time has occasionally been discussed in physics, philosophy, folklore, and fantasy literature. However, the simplest explanation has been explained by Ankit Thapliyal from HNBGU, Dehradun which we have discussed below.
Let’s first think about gravitational force. It is supposed to be the weakest force in all known forces till now, but that’s only in three or four dimensions. Now scientists think that there may be more than three or four dimensions, but due to our observation limit, we can’t observe them directly. According to the present theory, the gravitational force is the force that can go through all possible dimensions and that’s the reason why it appears weak in our three or four dimensions.
Because we observe it in only three dimensions and not in all dimensions, it appears to be weak, but that is not the truth, it is weak in three dimensions because it flows through all possible dimensions (more than three). Now let’s discuss this analogy with time. Suppose there is not a single dimension of time but multidimensions of time. Then what will happen? Here we can suppose that time flows in more than one dimension, but we observe only a one-dimension component of that time.
Depending upon the relationship between the actual time axis and the component-time axis we observe, it may dilate, or it may seem to us go faster. So, in general, we can say that time flows in multidimensional and we observe it in one dimension. Which is not the actual time but the single component of that actual time, and that’s why we feel sometimes it’s going/flowing faster and sometimes it’s flowing slower.
Multi-Dimensional Time According to Physics
According to some theories in physics, there is more than one Time dimension. The extra dimensions could be analogous to ordinary time, compacted like the extra spatial dimensions in string theory, or components of a complicated time system. According to Itzhak Bars, “The 2T-physics approach in d+2 dimensions gives a highly symmetric and unified version of the phenomena described by 1T-physics in d dimensions,”
However, the metric signature of the F-theory depicts a 12 Dimensional spacetime with 2 Time dimensions (10,2). The presence of a well-posed starting value problem for the ultra-hyperbolic equation (a wave equation with multiple time dimensions) shows that initial data on a mixed (spacelike and timelike) hypersurface obeying a nonlocal constraint evolves deterministically in the remaining time dimension. Complex time, like other complex number variables, is two-dimensional, with one real and one imaginary time dimension, transforming time from a real number line to a complex plane. The Kaluza–Klein theory can be generalized by introducing it into Minkowski spacetime.
If there is more than a one-time dimension, Max Tegmark argues that the behavior of physical systems cannot be reliably predicted given knowledge of the relevant partial differential equations. Intelligent life capable of managing technology could not exist in such a universe. Furthermore, protons and electrons would be unstable, and they may decay into particles with a mass greater than their own. (This isn’t an issue if the particles are kept at a low enough temperature.)
Multi-Dimensional Time According to Philosophy
The idea of time is one of the most fundamental concepts in philosophy. It is also crucial to our understanding of the world and has been a central concern for philosophers, natural scientists, and theologians. The philosopher’s conception of time can be divided into two main types: linear time and cyclical time. Linear conceptions of time are based on an ontology that includes some form of progress or evolution (e.g., dialectical materialism). Cyclical conceptions are based on an ontology that includes repeating patterns (e.g., eternal return).
Various time aspects seem to permit the breaking or re-requesting of circumstances and logical results in the progression of any one element of time and applied challenges with numerous actual time aspects have been brought up in present-day logical ways of thinking.
J. W. Dunne postulated an infinite hierarchy of time dimensions, inhabited by a corresponding hierarchy of levels of awareness, as a solution to the problem of subjective time passage. Dunne proposed that the second dimension of time was required in the context of a “block” spacetime as depicted by General Relativity to gauge one’s progress along one’s timeline. This necessitated the existence of a conscious self-level at the second level of time. However, the same logic applied to this new level, necessitating the third level, and so on in an endless regress.
There was a “superlative general observer” who existed in eternity at the end of the regress. In his 1927 book An Experiment with Time, he published his hypothesis about precognitive dreams, and in The Serial Universe, he explored its applicability to contemporary physics (1934). Although writers such as J. B. Priestley acknowledged the potential of his second-time dimension, his endless regress was attacked as logically unsound and useless.
Multi-Dimensional Time According to Fiction
The concept of time is often represented as a linear progression of events. However, according to fiction, there are many other ways in which time can be represented. Some examples of these representations are cyclical, recursive, and parallel. Fairy tales have historically had many distinct timelines in which time moves at various rates. In some of their most renowned works, fantasy writers such as Inklings, J. R. R. Tolkien, and C. S. Lewis have used these and other multiple time dimensions, such as those hypothesized by Dunne. Tolkien appropriated them for Lórien’s period in The Lord of the Rings, while Lewis used them in The Chronicles of Narnia.
Multi-Dimensional Time’s Models
- In mathematics, a dimension is an independent direction in space or time. For example, a point has zero dimensions because it has no length or width, or height. A line has one dimension because it only has length but no width or height. Similarly, a plane has two dimensions because it can have both length and width but not height. In three dimensions, we have length and width as well as height.
- The same idea can be applied to time models in which each dimension represents one of the four temporal aspects: past, present, future, and duration of time. More formal models of multidimensional time have been presented by philosophers G. C. Goddu in 2003 and Jack W. Meiland in 1974. Learn about their model here: http://timetravelphilosophy.net/topics/multidimensional/
Conclusion
According to Newton’s perspective, time was outright and consistently ticking all through the universe. Yet, Einstein’s point of view time is relative, and it’s not uniform all through the universe. In certain spots, it moves quicker in any case, (as dark opening or places of the high gravitational field) it moves slower. Likewise, the clock of moving spectator generally shows an uptick gradually in another reference outline, yet it ticks regularly in its reference outline. Presently as researchers have anticipated multiple aspects, so it is time that has more than one aspect and it’s the parts of time pivot which we see in our day-to-day routine because of our restrictions.
Contingent on the point of the tendency of the genuine-time hub with part-time pivot, the two parts differ and that is the justification for why we feel time at some point moves quicker yet, in some cases, it moves more slowly. In this way, the entire secret of time enlargement and change in its stream rate at better places exists in the time multi-faceted hypothesis. A further variety of points that real-time hub makes with part-time pivot relies on the gravity and speed of the object. As gravity changes, detectable time parts pivot transforms, it likewise changes with changing speed and that is the entire explanation of progress in-stream pace of time at various spots of the universe.
Sources
- Multi-Dimensional Time. (n.d.). A Time Travel Website.
- Thapliyal, A. (2018). Time: Multidimensional Time. Time: Multidimensional Time.
- Craig, Walter; Weinstein, Steven (2009). “On determinism and well-posedness in multiple time dimensions”. Proceedings of the Royal Society A: Mathematical, Physical and Engineering Sciences. Royal Society A. 4653023–3046 (2110): 3023–3046. arXiv:0812.0210. doi:10.1098/rspa.2009.0097. S2CID 2422562.
- Terning, J; Bars, I (2009). Extra Dimensions in Space and Time. New York: Springer. doi:10.1515/9783110697827. ISBN 9780387776385.
- Dinov, Ivo; Velev, Milen (2021). Data Science – Time Complexity, Inferential Uncertainty, and Spacekime Analytics. Boston/Berlin: De Gruyter. doi:10.1515/9783110697827. ISBN 9783110697803.
- Marcus Chown, “Time gains an extra dimension!”, New Scientist, 13 October 2007.
- Penrose, Roger. (2004). The Road to Reality. Jonathan Cape. Page 915.
- Chodos, Alan; Freund, PGO; Appelquist, Thomas (1987). Modern Kaluza-Klein Theories. United Kingdom: Addison-Wesley. ISBN 9780201098297.
- Tegmark, Max (April 1997). “On the dimensionality of spacetime” (PDF). Classical and Quantum Gravity. 14 (4): L69–L75. arXiv:gr-qc/9702052. Bibcode:1997CQGra..14L..69T. doi:10.1088/0264-9381/14/4/002. S2CID 15694111.
- Weinstein, Steven. “Many Times”. Foundational Questions Institute. Retrieved 5 December 2013.
- McDonald, John Q. (15 November 2006). “John’s Book Reviews: An Experiment with Time”.
- J.A. Gunn; The Problem of Time, Unwin, 1929.
- Flieger, V.; A Question of Time: JRR Tolkien’s Road to Faerie, Kent State University Press, 1997.
- Inchbald, Guy; “The Last Serialist: C.S. Lewis and J.W. Dunne”, Mythlore, Issue 137, Vol. 37 No. 2, Spring/Summer 2019, pp. 75-88.
This Article was Published On: 25 February, 2022 And Last Modified On: 17 May, 2022
FACT CHECK: We strive for accuracy and fairness. But if you see something that doesn’t look right, please contact us
SUPPORT US: Help us deliver true multilingual stories to the world. Support the UNREVEALED FILES by making a small monetary contribution. Your contribution will help us run this platform. You can contribute instantly by clicking on this PAY NOW link or SUBSCRIBE membership. | https://www.unrevealedfiles.com/multi-dimensional-time-possibility-of-more-than-one-dimension-of-time/ |
Badh is a village situated in Karahal Block of Sheopur district in Madhya Pradesh. Positioned in rural part of Sheopur district of Madhya Pradesh, it is one of the 140 villages of Karahal Block of Sheopur district. As per the government records, the village number of Badh is 451915. The village has 92 families.
According to Census 2011, Badh's population is 493. Out of this, 265 are males whereas the females count 228 here. This village has 125 kids in the age bracket of 0-6 years. Among them 66 are boys and 59 are girls.
Literacy rate in Badh village is 45%. 223 out of total 493 population is educated here. In males the literacy ratio is 56% as 150 males out of total 265 are educated however female literacy ratio is 32% as 73 out of total 228 females are educated in this Village.
The Negative portion is that illiteracy ratio of Badh village is shockingly high -- 54%. Here 270 out of total 493 persons are illiterate. Male illiteracy ratio here is 43% as 115 males out of total 265 are illiterate. In females the illiteracy rate is 67% and 155 out of total 228 females are illiterate in this village.
The number of occupied people of Badh village is 243 while 250 are non-working. And out of 243 working people 59 peoples are entirely reliant on agriculture. | https://www.wikivillage.in/village/madhya-pradesh/sheopur/karahal/badh |
Jim Bruno:
At this point in time, Bob and I were both playing the Chapman Stick and I was also playing a synthesized horn called ‘The Lyricon’. The Lyricon was a 6-octave synthesizer instrument – a cross between a saxophone and an analog synthesizer. I loved it…another way of exploring new tones and using different reflexes.
One of the things that I discovered over the years of playing many different instruments was that the idiosyncrasies of those instruments can always help you to continue to be creative in your approaches toward songwriting. Just having to use new fingerings can give you new ideas about approaching a melody line and give you something to do in a different way than the way you’re used to doing it on instruments you already know how to play – it always adds some kind of new creative angle.
Each time I start playing a new instrument I also try to write a song. Not knowing the instrument well makes me think more on my creative side. When you know the instrument well, you can get locked up in the typical things that everybody else is doing because everybody’s looking at it the same way. That was, for me, what was so exciting about playing the Stick, Lyricon and the Steiner.
It may sound strange because I’m trying to explain a creative process that was going on in my head at the time, but the bottom line is that the Lyricon was yet another new instrument that we added to our arsenal of instruments in the Stickband.
The inventor of that instrument was a man by the name of Bill Bernardi. Both Bill and Emmitt Chapmen’s stories are so interesting and full of the things we Americans pride ourselves for – innovation and always moving things forward.
Keep Singing!
Want to know more? Jorrit Dijkstra has an excellent resource page on the Lyricon, including resource links and downloads: | http://stickbandsj.com/lyricon/ |
The CAFCO® 300 Series is a durable, gypsum based, wet mix, commercial density Spray-Applied Fire Resistive Material (SFRM) designed to provide fire protection to concealed floor and roof assemblies, steel beams, columns, and joists in building construction projects.
Declared unit
1,000 kg of spray-applied fire resistive material, packaging included.
Manufacturing data
Reporting period: January 2017 – December 2017
Location: Stanhope, NJ; Houston, TX; San Bernardino, CA
The amount of water required to be added during the mixing and application of 1,000 kg of dry product is 429 gallons. This water consumption will cause additional environmental impacts in the use phase, which is out of the scope of this assessment.
Default manufacturing scenarios
Production for the product series includes a Kraft paper bag for packaging. At the end of production, approximately 10% of vermiculite is sent to land fill when it does not “pop” in the manufacturing process. Vermiculite is used as a bulking agent in the production process.
What’s causing the greatest impacts
All life cycle stages
The transportation stage dominates the results for all impact categories except for acidification, respiratory effects, and smog where the material acquisition stage dominates. Following these two stages, the lowest impacts come from come from manufacturing stage.
Transportation stage
The impact of the transportation stage is mostly due to the calcium sulfate and vermiculite distances. These two raw materials have the greatest distances of the raw materials.
Sensitivity analysis
There are different raw material weights required for each product in the series. The different material weight directly affect the transportation, production, and end of life impacts.
Multi-product weighted average
Results represent the weighted average using production volumes for the products covered. Variations of specific products for differences of 10–20% against the average are indicated in purple; differences greater than 20% are indicated in red. A difference greater than 10% is considered significant.
Isolatek minimizes its waste portfolio by employing a variety of efforts, including the reuse of recycling of spent materials where feasible.
Isolatek offers the most thermally efficient materials on the market, meaning less material is needed to complete a project.
LCA results
|Life cycle stage||Raw material acquisition||Transportation||Manufacturing||Total|
|
|
Information modules: Included | Excluded
|A1 Raw Materials||A2 Transportation||A3 Manufacturing||A1-A3 Total|
|>|
|Impacts per declared unit||1.69E-02 mPts||2.72E-02 mPts||3.09E-03 mPts||4.72E-02 mPts|
|Materials or processes contributing >20% to total impacts in each life cycle stage||CAFCO® 300 Series raw material production.||Truck and rail transportation used to transport raw materials to manufacturing site.||Energy and ancillary materials required to make the passive fire protection product.||Sum of the single point scores.|
TRACI v2.1 results per declared unit
- A variation of 10 to 20%
- |
- A variation greater than 20%
|Life cycle stage||Raw material acquisition||Transportation||Manufacturing||Total|
Ecological damage
Human health damage
Additional environmental information
|Impact category||Unit|
|Ecotoxicity||CTUe Comparative Toxic Units of Ecotoxicity
|
Ecotoxicity causes negative impacts to ecological receptors and, indirectly, to human receptors through the impacts to the ecosystem.
|1.50E+02||1.13E+03||1.23E+01||1.30E+03|
|Fossil fuel depletion||MJ, LHV Mega Joule, lower heating value
|
Fossil fuel depletion is the surplus energy to extract minerals and fossil fuels.
|5.55E+02||5.83E+02||1.23E+02||1.26E+03|
References
LCA Background Report
Isolatek Products LCA (public version), Isolatek 2019. SimaPro Analyst 8.5.2.0, EcoInvent 3.1, 2.2 database.
PCR
ASTM PCR for Spray-Applied Fire Resistive Materials; Version 1.0, February 2022. PCR review conducted by Thomas Gloria, PhD (chair, [email protected]); Jeffrey Gould; and Karl Houser.
ISO 14025, “Sustainability in buildings and civil engineering works -- Core rules for environmental product declarations of construction products and services".
Independent external verification of the declaration and data, according to ISO 14025.
Download PDF SM Transparency Report/Material Health Overview, which includes the additional EPD content required by the ASTM Environment PCR.
"Transparency Reports™ / environmental product declarations enable purchasers and users to compare the potential environmental performance of products on a life cycle basis. They are designed to present information transparently to make the limitations of comparability more understandable. TRs/EPDs of products that conform to the same PCR and include the same life cycle stages, but are made by different manufacturers, may not sufficiently align to support direct comparisons. They therefore, cannot be used as comparative assertions unless the conditions defined in ISO 14025 Section 6.7.2. ‘Requirements for Comparability’ are satisfied." EPDs from different programs (using different PCR) may not be comparable. TRs/EPDs cannot be compared if they do not have the same functional unit, reference service life, and building service life. | https://www.transparencycatalog.com/company/isolatek-international/showroom/cafco-300/lca-results |
What journal entries are necessary for the declaration of a cash dividend?
Debit Cash Dividends, Credit Dividends Payable
Cash Dividends.......................$50,000
Dividends Payable......................$50,000
(to record declaration of cash dividend)
What journal entries are necessary to record payment of declared cash dividends?
Debit Dividends Payable, Credit Cash
Dividends Payable...............$50,000
Cash........................................$50,000
(to record payment of cash dividend)
What journal entries are made for the purchase of treasury stock?
Debit Treasury Stock, Credit Cash
Treasury Stock............$32,000
Cash.................................$32,000
(to record purchase of $4,000 shares of
treasury stock at $8 per share)
What affect does the purchase of treasury stock have on the balance sheet?
The Treasury Stock account would increase by the cost of the shares purchased. The original PIC account wouldn't be affected because the
the number of issued shares does not change.
Companies show treasury stock as a deduction from total PIC and retained earnings in the stockholders' equity section of the balance sheet.
Outstanding stock
The term
outstanding stock
means the number of shares of issued stock that are being held by stockholders
Why do corporations issue stock dividends or do stock splits?
Stock dividends
often issued by companies that don't have enough cash to issue a cash dividend.
This way they are still offering a gesture for
something.
Decreases RI, increases PIC. Issued: pro rata (proportional to ownership)
Stock splits
- issues additional shares of stock to holders according to their % ownership. However stock split results in a reduction in the par value or stated value of the stock.
Purpose: to increase the marketability of the stock by lowering it's market value per share. Makes it easier to sell additional stock.
What effect do
Stock Dividends
have on retained earnings and stockholders' equity? Also, how do they affect par value and market value?
Total paid in capital
increase
Total retained earnings
decrease
Total par value(common)
increase
Par value per share
No change
What effect do
Stock Splits
have on retained earnings and stockholders' equity? Also, how do they affect par value and market value?
Total paid in capital
no change
Total retained earnings
no change
Total par value(common)
no change
Par value per share
Decrease
Basically, Stock Splits decrease the price of the stock, but doesn't affect any balance sheet accounts/dollar amounts. The Stock Dividends, on the other hand, increase PIC, Decrease RI, increase total par value common stock, but doesn't affect the par value per share price.
What are the advantages of a coproration?
Countinuous life
Separate legal existence
Transferable ownership rights
Ability to acquire capital
What are the disadvantages of a corporation?
Government regulations (SEC, State laws, federal reg, Stock exchange requirements)
Additional taxes (double taxation on dividends)
Coprorate Management (board of directors, reduces owners' ability to actively manage the company)
How is paid in capital and in general Stockholders' equity shown on the balance sheet?
Stockholders' equity
Paid-in-capital
Capital Stock
x% preferred stock, $xxx par value, cumulative
xx,xxx shares authorized, x,xxx shares issued and
outstanding $xx,xxx
Common Stock, xxx par (or stated value),
xx,xxx shares authorized, xx,xxx shares
issued and xx,xxx shares outstanding
xx,xxx
Total capital stock xx,xxx
Additional PIC
In excess of par value - preferred stock x,xxx
In excess of par value - common stock
xx,xxx
Total additional PIC
xx,xxx
Total Paid-in-capital xx,xxx
Retained Earnings
xxx,xxx
Total PIC and RI xxx,xxx
Less
: Treasury stock- common(x shares)
(xx,xxx)
Total Stockholders' equity
xxx,xxx
What items are added and subtracted for cash flows from
Operating Activities
for the indirect method?
Depreciation Expense
Add
Losses
Add
Gains
Deduct
Increase in CA
Deduct
Decrease in CA
Add
Increase in CL
Add
Decrease in CL
Deduct
***Note: Long term assets (plant assets, etc), long term liabilities (bonds, etc), and stockholders' equity don't come into play on the Operating Activities section.
What are the three catagories of the Statement of Cash Flows?
Cash flows from
Operating activities
Cash flows from
Investing activities
Cash flows from
Financing activities
Operating activities
Income statement items
Investing activities
Changes in investments* and long term assets
Sale or purchase of PPE
Sale or purchase of investments in debt or equity securities of other entities
Making loans to other entities
Financing activities
Changes in long term liabilities* and stockholders' equity
Inflows= sale of common stock, issuance of bonds,notes
Outflows=Dividends, redeeming long term debt or reacquiring capital stock/ treasury stock.
What is an Extraordinary Item?
Item that satisfies BOTH conditions below
1.
abnormal
and only incidentally related to the customary activites of the entity. (Unusual in nature)
2.
infrequent
- the event should not be reasonably expected to recur in the foreseeable future.
Companies report extraordinary items net of taxes in a separate section of the income statement, immediately below discontinued operations, but before Net Income.
Irregular Items
Companies report two types of irregular items
1. Discontinued Operations
2. Extraordinary Items
Reported net of tax. If there's a gain, subtract the portion of tax. If there's a loss, reduce the loss by subracting the taxes you saved. In both scenaries, you subtract the tax amount.
What type of statement uses component percentages?
Vertical Analysis. But the book doesn't really label it as its own statement.
("statement")Vertical Analysis
AKA common size analysis. Compares the parts to the whole. Current liabilities, long-term liabilities measured in relation to Total liabilities. (Amounts and Percentages). Ditto with Current Assets, Long term assets, and Total Assets, and with the Stockholder's equity accounts. And with total Liabilities and Stockholder's equity. You can measure different slices, but the base amount will always be considered at 100%. You can measure the Income statment by vertical analysis, but most of our HW had us measuring the balance sheet this way.
Horizontal Analysis
AKA Trend Analysis
Comparing a companies performance with previous years/balance statement years. etc.
Presented as % change (for each balance sheet account) compared to the last year (or to the base year). Income statement can also be analyzed this way
What is Management Accounting?
a field of accounting that provides economic and financial information for managers and other internal users.
What are the three main manufacturing costs (cost of goods manufactured)?
Direct Materials + Direct Labor + Factory Overhead
According to teacher's T accounts, what goes into Work-in-process, and what comes out of it?
Beginning On the left (debit) side, we have
Debit side
Credit Side
Beginning WIP | =COGS or is it COGM?
+Direct Materials used | this gets "transferred/exported
+Direct Labor used | to the Finished goods acct
+ Factory Ovrhd
Total=Ending WIP
What are the differences between product costs and period costs?
PRODUCT COSTS:
manufacturing costs. becomes part of
COGS
/COGM=
DL
DM
Manufacturing overhead (the overhead= indirect materials, indirect labor, and other indirect costs)
PERIOD COSTS=
nonmanufacturing costs. Expenses are matched with the revenue for the period=
Selling expenses
Administrative Expenses
Indirect materials
Raw materials that cannot be easily associated with the finished product.
Not physically part of the finished product or they are an insignificant part of finished product in terms of cost.
Considered part of manufacturing overhead
Indirect labor
=Supervisors
Work of factory employees that has no physical association with the finished product or for which it is impractical to trace costs to the goods produced.
Part of mfg overhead.
Direct labor
Work of factory employees that can be physically and directly associated with converting raw materials into finished goods.
How do you do a journal entry for the sale of common stock in excess of par
Cash........................................................$5,000
Common stock (1,000 x $1)..........................$1,000
PIC in excess of par value................................4,000
(to record issuance of 1,000 shares
of common stock in excess or par)
Work in process costs/cost of goods manufactured
Cost of beginning WIP + mfg costs for the period=Total WIP for the year.
Total WIP cost - Ending WIP inventory = Cost of goods manufactured
Three manufacturing inventory catagories
1. Raw materials
2. Work-in-process
3. Finished goods
What does manufacturing overhead consist of?
Indirect Materials
Indirect Labor
Other indirect costs.
It DOES NOT include any selling or marketing expenses or administrative expenses. | https://freezingblue.com/flashcards/186428/preview/accounting-test-3 |
Clearly, all the hoo-rah has been a load of poo. But I am impressed with just one thing: the Mayan calendar, made umpteen years ago, predicted entirely accurately the day of the winter solstice in 2012. How wonderful. They had skillz.
Unless even that is a load of poo and whomever translated it decided this was the end date. In which case, someone out there has been giggling up their sleeve for at least a year now.
He/she also had skillz. And a fabulous sense of humour!
Because I have some interest in both ancient civilizations and Native American, I happen to have a good understanding of the Mayan calendar, which happens to be the most understood ancient calendar.
So, no, I didn’t believe in the end of the world, and yes, my yesterday’s post was a joke.
We know of the exact correlation between the Mayan and Gregorian (ours) calendars because some Spanish drew the Mayan date in his journal, which he dated the entry in Gregorian.
Actually it is quite impressive that the Mayan Long Count calendar was precise enough to predict the winter solstice of 2012, considering it was established some 2500 years ago. It is to note that the Mayan calendar was started out on a winter solstice and start again each year on the correct date. Our own calendar, established in 1582, aimed at fixing the inaccuracy of the previous (Julian) calendar, and needed to be adjusted by 10 days in order to resync the spring equinox on March 21. The Gregorian calendar fails by 1 day every 4000 years or so, while the Mayan calendar, slightly more precise, will still begin on the winter solstice every year for well longer.
The Mayan calendar was based on the sky, with its first day of the year on the winter solstice, and fixed the length of a year to 365.2422 days/year. The Gregorian calendar, adjusted so that the spring equinox is on March 21, because that was the date of the spring equinox in 325 AD when the Christian religion was instated in Rome (read: based on absolutely nothing), fixed the year to 365.2425 days/year. The modern science says a year is 365.24219. Maya were closer.
The Maya never said the 2012 winter solstice would mark the end of the world. And their calendar didn’t end today. In fact, this day mark the first day of a new Great Cycle in Mayan culture. If their civilization was still up, today they would hold a great celebration, not very different from what we did to mark the year 2000. On the Mayan Calendar, today is 13.0.0.0.0.
Why did I feel the need to write a comment longer than your actual post? I don’t know. But I like your posts in general. Happy new Mayan year to you and all your family. Keep writing, I will keep reading. And I plan to finish my 6-pack of La Fin du Monde tonight (see my yesterday’s post).
Looks like I made a slight mistake in the previous comment. The Long Count Mayan calendar was not meant to start again on the solstice every year. It did indeed started on a solstice, but was only meant to start on that day again only every great cycle, not every year. My bad. Thought I would mention in case someone in the future was to use the information in there.
Exactly! It was probably a cat.
Yep. just a very loooooong year. | https://heretherebespiders.com/2012/12/21/my-only-thought-on-the-supposed-end-o-de-world/ |
Inches To Centimetres Conversion Tables (0in-96in) Full conversion tables for inches to centimetres (in to cm) conversions. The tables on this page cover heights from 0" to 96" steps of one inch, with centimetre conversion being given to one decimal place (i.e to the nearest millimetre).... Meter (m) or centimeters (cm) to feet (ft ′) and inches (in ″). Here is the answer to questions like: what is 83 cm in feet and inches. 83 cm equals 2.72 feet. See how to convert cm to feet and inches, step-by-step, below on this web page.
Inches to cm How to convert centimeters to inches. 1 centimeter is equal to 0.3937007874 inches: 1cm = (1/2.54)″ = 0.3937007874″ The distance d in inches (″) is equal to the distance d in centimeters (cm) divided by 2.54:... Calculator to convert between Inches and cm. Useful information about the terms, formulas, a conversion table and much more.
metric / iNch coNverSioN tabLe —. 0004 .01 — .004 .10 — .01 .25 1/64 .0156 .397 —. 0197 .50 —. 0295 .75 1/32 .03125 .794 —. 0394 1.0 3/64 .0469 1.191 three little words susan mallery pdf Example 1 : To get centimeters from meters you multiply the meters by 10 * 10. So you need to multiply value of the centimeters by 100. You can answer easily, how many cm in a meter.
ft-in & cm converter: Interchangeably convert foot-inch measurements and centimeters (i.e. 5' 3" to 160 cm). * Shown as 0.39 after rounding to the nearest hundredth. Program uses 0.3937008 to convert centimeters to inches as referenced in NIST Handbook 44 - 2006 Edition . logiciel gratuit de conversion fichier pdf en word MORE USEFUL CONVERSIONS To convert decimal fractions of an inch to fractions of an inch. Take the decimal fraction of feet and divide by 0.08333 (1/12th) and this will give you inches and decimals of an inch.
Meter (m) or centimeters (cm) to feet (ft ′) and inches (in ″). Here is the answer to questions like: what is 83 cm in feet and inches. 83 cm equals 2.72 feet. See how to convert cm to feet and inches, step-by-step, below on this web page. | http://apesantsandancestors.com/western-australia/inch-cm-conversion-table-pdf.php |
Nature-Inspired Optimization Algorithms
Optimization algorithms are the highly efficient algorithms which focus on finding solutions to highly complex optimization problems like travelling salesman problems, scheduling problems, profit maximization etc. Nature-inspired algorithms are a set of novel problem-solving methodologies and approaches derived from natural processes. Some of the popular examples of nature-inspired optimization algorithms include: genetic algorithm, particle swarm optimization, cukcoo search algorithm, ant colony optimization and so on.
Why do we need nature-inspired optimization algorithms?
These algorithms are highly efficient in finding optimized solutions to multi-dimensional and multi-modal problems. The conventional optimization approach in calculus finding the first order derivative of the objective function and equating it to zero to get the critical points. These critical points then give the maximum or minimum value as per the objective function. The calculation of gradients or even higher order derivatives needs more computing resources and is more error-prone than other methods.
Further, you can imagine how complex it is to find solution to a minimization/ maximization problem with 20 or even more number of variables. However, by using these nature inspired algorithms, the problem can be solved with less computational efforts and time complexity. These algorithms use a stochastic approach to find the best solution in the large search space of the problem.
Applications of nature-inspired optimization algorithms: | https://www.geeksforgeeks.org/nature-inspired-optimization-algorithms/?ref=leftbar-rightbar |
In that year, more than eleven million travelers from these two European countries headed West for a trip to Spain. Meanhwhile, the United Kingdom ranked in the third place that year, accounting for around 4.3 million foreign visitors in Spanish territory.
How many Britons travel to Spain each year?
What are the UK’s top travel destinations? Spain tops the list, with 18.13 million visitors from the UK in 2019. France is second, with 10.35 million.
What percentage of tourists to Spain are British?
The leading source markets of Spanish beach tourism are the UK (around 24% of the total arrivals in Spain in recent years), Germany and France (around 15-16% each), followed by Scandinavia and Italy (around 7% each) and the Netherlands (around 5%).
How many people fly to Spain each year?
Inbound air travelers in Spain 2010-2021
The flow of international tourists arriving by air in Spain amounted to 24.4 million people in 2021, increasing by over 10 million versus the previous year’s figure. Compared to 2019, nonetheless, this figure represents a drop of more than 64 percent.
Which nationality visits Spain the most?
In 2021, the European country with the highest number of residents visiting Spain was France. In total, roughly 5.8 million French residents traveled to the neighboring country. Comparatively, nearly 5.2 million tourists from Germany also made their way to Spain in that year.
What percentage of Brits travel abroad?
Using modelling to extrapolate from past trends, 60% of UK residents’ visits abroad were for holidays. There were 14.2 million holiday visits abroad in 2020, a 76% decrease on the previous year (Figure 4). Visiting friends or relatives overseas decreased from 23.5 million in 2019 to 6.9 million visits in 2020.
Which countries do Brits visit the most?
Spain was the most visited country for holidays from the United Kingdom in 2019. Around 15.8 million visits trips were made by UK residents to Spain for holiday purposes that year. France and Italy ranked second and third respectively.
Does Spain rely on UK tourism?
Spending of British tourists in Spain 2004-2020
In 2020, British tourists in Spain spent a little over three billion euros in total, which represents a decline of 80 percent. In the previous three years, the total expenditure of residents from the United Kingdom in the Iberian country surpassed 17 billion euros.
How many Brits go on holiday each year?
Over 50 million domestic holiday trips involving at least one overnight stay are taken in Britain each year, with figures crossing the 60 million mark in 2019.
…
Average number of holidays abroad per person in the United Kingdom (UK) between 2011 and 2019.
|Characteristic||Number of holidays|
|–||–|
Why is Spain so popular with British tourists?
Many British tourists come to Spain looking for “sun & beach”. Spain has a much longer coastline than Portugal, with more beaches – and it has a (loooong) Mediterranean shore, that Portugal lacks: “Mediterranean” implies warmer water and better weather.
Which is the most visited country in the world?
Welcoming more than 89 million visitors per year, France is the most visited country in the world.
What country has the most tourists in the world?
Most Visited Countries 2022
|Country||International Tourist Arrivals|
|France||89,400,000|
|Spain||83,700,000|
|United States||79,300,000|
|China||65,700,000|
Why Spain is the most visited country in Europe?
Spain – 82.7 million visitors
Spain has 47 UNESCO world heritage sites, numerous beaches on the Atlantic and Mediterranean, and numerous festivals that bring together people from all across the world. Many have compared the coastal part of Spain with tropical islands.
How many tourists did Spain receive in 2021?
“In the first six months of 2021, the number of tourists visiting Spain decreased by 49.6 per cent and exceeded 5.4 million. 10.8 million of international tourists came in the same period last year,” the statement of INE reads.
Is Benidorm declining in tourism?
‘Since the beginning of the year, there has been a gradual decline which translates into a total of more than 23,000 overnight stays compared to the first half of July 2017, and a decline of eight per cent. | https://manxvoice.com/what-to-see/how-many-uk-citizens-travel-to-spain-each-year.html |
This card sorting exercise is a fun way to assess priorities. It also allows you to compare the priorities of two different sub groups, such as an agency and a client, or two departments within an organization.
Materials & Requirements
- Index cards with pre-printed ideas/topics on them
- Sharpies for each participant
- A meeting room large enough where everyone can sit around a single table
Steps
- Put all of the features and functionality for the website onto individual index cards. Create a set of cards for everyone attending the exercise. Ideally there should not be more than 20 cards, less is ideal.
- Seat everyone around the table. When assessing variance in priorities between organizations, it’s good to alternate seating. It helps people get to know each other and it prevents the awkwardness of someone deciding something has a low priority in front of a coworker or supervisor.
- Have each person sort the cards in order of their perceived priority, with the highest priority cards at the top of the pile and the lowest at the bottom.
- Each person should take the 3 lowest priority cards and put a hash mark in the upper right hand corner. They then should pass the cards to the person on their left, who should incorporate them into their pile.
- Variation: on the first pass, allow everyone to take the most important and least important card, write “save” and “remove” on them, respectively, and set them aside. Later these high and low priority cards are a good tool for facilitating a follow-up discussion.
- Repeat the prioritization sort and passing of low priority cards 2 to 3 more times. Pass fewer cards each time, e.g. 2 cards in round 2, and 1 card in round 3.
- After the final passing round, have everyone puts a number indicating the overall priority in the upper left hand corner, and their initials in the lower right hand corner. Their initials later can be used to indicate what sub group they belong to for assessing variance.
- Collect all cards and put them into a spreadsheet for analysis. If you did the variation outlined in step 5, lay those cards out and facilitate a discussion around common choices and outliers.
Analysis of Data
Total the number of passes for each card. A large number of passes indicates that the entire group shares a low priority, where conversely no passes indicates a high priority. If you assess the average ratings (the number in the upper left corner subtracted from the total number of cards, e.g. out of 10 items, a priority 1 item would get 10 points, and then average points across participants), it will give you another measure of group priority. Segment sub groups and run similar numbers to assess variance, and note that those ideas or topics might be harder to add or remove to the project for future discussion. | http://goodkickoffmeetings.com/2010/04/prioritization-card-sort/ |
Monday-Thursday 10:00 a.m.-6:00 p.m.
Friday Closed
Saturday 9:00 a.m.-12:00 p.m.
Policies, Fines, and Services
|
|
Policies
Materials are checked out on a two-week basis, except for video and DVD movies, which are checked out for one week.
Materials may be renewed for additional time either by bringing the materials to the library or by phoning the library. The librarian reserves the right to refuse to renew materials.
Anyone having unresolved, overdue materials or fines forfeits their library privileges until the matter is resolved.
|
|
Fines
Fines for books from Staunton Public Library are 10¢ per day per item, except movies, which are $1.00 per day for each movie.
All lost or damaged materials must be paid for at cost plus $5.00.
|
|
Services
Staunton Public Library offers the following services:
Loan privileges of printed, audio and visual materials.
Reference and genealogy materials are for in house use only.
Inter-Library Loan materials are offered through Illinois Heartland Library System. We are an online library with access to all online library collections in the State of Illinois.
Printing, Copying and Fax Services
|
|
Printer and Copy Services
Staunton Public Library offers printer copies and photo copies for 20¢ per page.
|
|
Color Copy Services
Staunton Public Library offers color copies for 50¢ per page.
|
|
Fax Services
Fax Service is $2.00 for the first page and 50¢ for each additional page to send, and 50¢ each page to receive.
Library Card Requirements
Two forms of identification are needed at Staunton Public Library to show city or non-city residency. | https://stauntonpubliclibrary.weebly.com/ |
Veterinary organisations spend around £180 per employee on external software. The largest spend is on custom software with £80 followed by system software at £50. By far the smallest amount is on development tools where the expenditure is under £10 per employee.
May 6, 2013 1:00 AM
Custom Software Spend – Fastest Growing Industry Sectorsfilm, growth, telecommunications, veterinary
The fastest growing sector for custom software in 2013 is research & development. Organisations in this segment are increasing their spend by some 30%. Next in line are veterinary concerns who are advancing their custom software expenditure by almost 25%. They are closely... | https://itknowledgeexchange.techtarget.com/computer-weekly-data-bank/tag/veterinary/ |
Timing is everything when eating a pear. Eat one before it's ripe and it will be crunchy but devoid of flavor. Eat one past its peak and the mushy texture will ruin the whole experience.
The traditional "pear-shaped" European varieties (Bosc, D'Anjou, Bartlett) get mealy when they are left to ripen on the tree. That's why pears are picked at a "mature" state and it is often up to the consumer to let them ripen properly.
Leave firm, unripe pears on a countertop or place them in a paper bag with other pears, apples or bananas to increase the rate of ripening. Pears ripen from the inside out, so if a pear is soft to the touch, it's already past its prime.
The best way to test the ripeness of a European pear is to gently squeeze its neck. A little give indicates that the pear is ripe and ready to eat. You can refrigerate a ripe pear for up to five days, but we advise against placing an unripe pear in the fridge as this will ultimately weaken its flavor.
Asian pears are round and do not need to ripen the same way. Whether you're eating it like an apple, slicing it into a salad, or poaching it in red wine, Asian pears should be eaten when they are firm and crisp.
Try These 3 Perfect Pear Recipes: | http://blog.bostonorganics.com/how-to-pick-the-perfect-pear |
Kevin was appointed to the Board of DMGT plc in 2004, having joined the Group in 1996. Prior to this, Kevin was managing director of the Scottish Daily Record and Sunday Mail Ltd, which at that time was part of Mirror Group plc.
With the Group for 20 years, Kevin has been managing director of The Mail on Sunday; managing director of the Evening Standard and London Metro; chief operating officer of Associated New Media; and managing director of Northcliffe Newspapers.
Kevin is now Chief Executive of dmg media, the consumer media operation of DMGT plc, which publishes the Daily Mail, The Mail on Sunday, Metro, Mail Online, Mail Plus, Metro digital editions and Elite Daily. dmg media also has minority interests in the London Evening Standard, Wowcher, a daily deals business and a number of e-commerce business.
He is a board member of the NMA and represents the UK publishing industry on the executive council of WAN-IFRA; he is a non-executive director of the PA Group where he chairs the nominations committee and is a member of the remuneration committee. Recently he has been appointed Chairman of the RFC, the body that funds IPSO (Independent Press Standards Organisation). | https://events.wan-ifra.org/speakers/kevin-beatty |
Can you cook meat directly on charcoal?
Steaks large and small turn out beautifully when grilled directly on hot coals. Steaks large and small turn out beautifully when grilled directly on hot coals. Tim Byres, an evangelist for live-fire cooking in his Smoke restaurants, introduced the technique to Matt Lee and Ted Lee this year.
How do I cook a roast on coals?
Place the roast in the pan over the holes and transfer the pan to the cooler part of the grill. Cover (positioning the lid vents over the meat if using charcoal) and cook until the roast registers 125 degrees F on an instant-read thermometer (for medium-rare), 40 to 60 minutes, rotating the pan halfway through.
Can you cook on coals?
Cooking on the coals from a fire is a very traditional way to create a meal. … This allows the food to create a crust very quickly so that the coals do not stick to it. Once the food is ready, you can easily brush off any burnt crisps and enjoy your smoky flavored meal.
Can you put hot coals on foil?
Place the foil packets over the hot coals and cook for 15-20 minutes, turning once. 6. Spread your hot coals out evenly and place the optional cooking grate over the coals. You may also cook directly on the coals if you do not have a cooking grate.
Should you grill steaks with the lid open or closed?
When you cook with the grill open, you’ll more effectively get a crispy, perfect-Maillard-reaction caramelization on the outside of the meat without overcooking the center. … So, they can hold up to the heat chamber the lid creates, and in fact, the lid will help thicker cuts of meat or vegetables cook more evenly.
How long do I cook a steak on each side?
Cook a 2cm-thick piece of steak for 2-3 minutes each side for rare, 4 minutes each side for medium, and 5-6 minutes each side for well-done. Turn the steak only once, otherwise it will dry out. Always use tongs to handle steak as they won’t pierce the meat, allowing the juices to escape.
How long do you let charcoal burn before cooking?
DON’T: Forget to preheat the grill before you start cooking.
Once your coals are distributed in your grill, throw the lid on and let it sit for five to 10 minutes before placing any food over the coals, you want to hear a light sizzle when the protein, fruit or vegetables hit the grates.
How long do coals burn for?
Charcoal briquettes are usually formulated to burn for about 1 hour at a steady temperature, generally hotter than smoking temperatures.
Do you leave the lid open or closed when heating charcoal?
The lid should be open while you arrange and light your charcoal. Once the coals are well-lit, close the lid. Most charcoal grills are hotter right after lighting. The heat then tapers off.
Can you cook chicken directly on coals?
To bump up flavor even more, roast vegetables directly in the coals without any foil and cook chicken, beef or pork on the grill grates above. … Cook the meat to the desired temperature and, as usual, let it rest before serving.
How do I cook a roast on the BBQ?
Cooking a Roast Beef with a hooded BBQ
- Preheat the barbecue in line with the type of cut you are roasting (see our chart). For 200ºC the burners should be set at medium. …
- Place the beef or lamb in the centre of the barbecue. …
- Close the lid and roast for the recommended cooking time (see below chart). …
- Remove roast when cooked to desired degree.
How long does it take to cook a roast on the BBQ?
As a rule of thumb, you’ll need to grill your roast for 15 to 20 minutes per pound, depending on your desired doneness. A medium rare roast should cook to 130 to 135 degrees, while a medium roast should cook to about 140 degrees before removing it from the grill.
How do you cook a ribeye roast on a charcoal grill?
Grill over medium-low heat (275-300°F) until the internal temperature of the beef reaches 120°F. Remove from the grill, wrap in foil, and allow to rest approximately 30 minutes. Over indirect-high heat (500-600°F) return the beef to the grill and cook an additional 10 minutes. Remove the beef from the grill. | https://houseofherby.com/grill/question-how-do-you-cook-meat-on-coals.html |
THE TRIALS OF A CRIME WRITER: SUBVERTING TROPES
This is a topic that has probably been covered by a lot of writers, crime and mystery alike. There are always certain tropes that get associated with a genre. Whether they're good or bad ones is up to the individual reader, but I do feel like there are some that are overused. There comes a time when a trope becomes a cliché, and I think that a lot of the time, it's because people don't know that you can still had a loveable trope in your book, but that you need to put a different spin on it, or subvert it in some way.
Since I've got thoughts and feelings on some tropes in this genre, I thought I would give you some tips about how to subvert a trope and what the good thing about doing this is. You'll all have seen that I did a video on my Authortube channel about the top five tropes I hate in crime and mystery (found here) and so I thought that taking from that, I would pick a couple of my least favs and show you how they can be subverted and how it helps your fiction to do this.
So starting with one that's pretty easy to do.
#1 THE BITTER AND ALONE DETECTIVE
This trope is basically just as it sounds, the detective is a loner, is someone that can never form a good personal relationship with anyone else on the squad or team because they are hiding some deep dark secret, or they're just too bitter to be able to be nice to other people. There's also the ones that show just how broken the detective is, and it kinda sends the message that if you have things in your past that are less than savoury, you're not worth the chance of an actual real relationship. So you can see how it can be harmful.
HOW DO YOU SUBVERT IT?
You basically have to take that trope and turn it on its head. You can leave the trauma in the background, or you can keep the deep dark secret, but you can show that while the detective finds it hard to be around others, there are some that they will allow to be close to them. Or you can show them going through the process of something like therapy, where they have to work through whatever issues they might have and are able to start that slow process of finding out how to connect with other people, especially those they work with on a day to day basis.
#2 THE LONE WOLF WHO ALWAYS SOLVES THINGS...ALONE.
This is an offshoot of the above trope. The detective is so lone wolf that they never work with anyone else. Only they have the prowess to solve all the crimes. They're so good at it, but they do it all alone, with no backup, no trust and no ability to empathise with other people. It can be great to have a main POV in your books, and it's great if they're part of the team that helps solve the crime. But the key point here is, if they're a high up detective and they have a team beneath them, or they have a partner, they can't just be the only one with the special ability to always solve the crime, and do it alone and with no help. It just doesn't work like that.
HOW DO YOU SUBVERT IT?
You can have the character start out as a lone wolf, you can have them going out on their own to find answers, and then have them get to a point where they have to ask for help. It may not come easily to them, but it will show some humanity in them. Whether that's a tentative trust, or whether it comes about by the lone wolf starting to accept that they don't have to be the only one to solve every single crime. You can even have them make a mistake and that can be a wake up call. That they need to have the people around them, otherwise they're going to end up getting hurt, or worse, missing something important and have someone else killed.
These are just two tropes, there are so many more in crime and mystery that I could talk about, but I think you get the point I'm trying to make here. There's always going to be books that follow the same tried and true tropes, that's never going to change, but as a writer, putting your own spin on things can make you stand out from the crowd in a good way. Try it with a trope you love, or even one you hate, see what ideas you can come up with to try and subvert that trope and make it your own.
As always, any questions, lemme know in the comments! | http://www.joeypaulonline.com/2021/02/the-trials-of-crime-writer-subverting.html |
Republic (Presidential Democracy)
"Where citizens come first."
About Presidential System:
This form of government is ran by executives that are elected by the citizens so the people choose who they want to lead the country. It is made up of different branch but the power of checks and balances keeps one branch from complete control of the government. Each state/ province is assigned with electors that represent both houses of congress.
Examples:
Weaknesses:
There is no such thing as a perfect government. In fact this type of system includes some weaknesses. Though the president runs the whole country, laws can not be passed without the say of congress. Popularity of a candidate does not guarantee them the win of an election. In fact "swing" states receive the most attention.
Strengths:
Some strengths of a presidential system is that it prevents separation of power. One branch of government does not overpower the others. The system also prevents a victory based solely on urban areas. It also helps maintain the nations federal character. Discouraging third party groups helps leave the nation with just two since it seems more stable. | https://www.smore.com/rnhf |
NEW YORK (JTA) — With consecutive quadruple jumps at the U.S. Figure Skating Championships, Max Aaron launched himself not only to a gold medal and a national championship. The 20-year-old Arizonan also joined the ranks of Jewish athletes who have made it big
For Aaron, that was even more exciting than executing the perfect salchows last month in Omaha, Neb., which moved him from fourth to first in the standings.
“I grew up looking to all those Jewish athletes for inspiration,” Aaron told JTA. “I always thought the list needed to be longer. We needed to have a stronger representation of Jewish athletes, and I’m so happy that I’m part of them now.”
Next month, Aaron will represent the United States at the World Figure Skating Championships in Canada. If he and nationals’ runner-up Ross Miner combine to finish at least among the top 13, the U.S. will be able to send three skaters to the 2014 Games in Sochi, Russia.
While the thought of facing some of the world’s top figure skaters might seem intimidating, Aaron is confident he’ll be prepared. After all, he’s been preparing for the competition since he was 3.
“This is a really difficult sport because you’re literally using every inch of your body,” he said. “I’m a little nervous to see who I’m facing, but we all put our pants and skates on the same way, and I’m focusing on training the hardest I can. And when I get nervous, I’ll just pray.”
Aaron’s training — and perhaps his praying — certainly paid off in Omaha. Bringing some attitude to the ice, he emptied his vault of tricks to songs from “West Side Story,” snapping his fingers and making faces to the music. His twirls had the audience and judges roaring, and his final score of 225 points was enough to send three-time U.S. champion Jeremy Abbott to third place.
Aaron, who was raised in a traditionally Conservative Jewish home in Scottsdale, spends numerous hours a day on the ice. As a boy his main passion was hockey; Aaron laced up his figure skates on the weekends. He would go on to join multiple hockey leagues, competing in the USA Hockey nationals in 2006 and 2007.
But after suffering a back injury four years ago that nearly ended his career, Aaron realized he couldn’t juggle two sports, and he decided to focus on figure skating. He went from placing 13th at the nationals in 2007 to eighth place in the Midwestern sectionals in 2008, to earning high marks in 2011 and 2012, and this year taking the national title.
Aaron is smaller and younger than most of his competitors but still follows the grueling regimen of figure skaters, sometimes spending eight hours a day on the ice and sticking to a strict, protein-heavy diet. The 5-foot-7 Aaron says he was inspired by Aly Raisman, the Jewish gymnast who won a gold medal at last year’s Summer Olympics in London and led the U.S. to the team title.
Aaron admits that the hard work can be disheartening some days.
“There are definitely times where I wish my schedule was more of an ordinary kid’s,” Aaron said. “I miss my family in Arizona, and some days, when I’m really exhausted and achy, I wish I was like everyone else my age, going to college and hanging out with friends. But I know my body can only handle this for so many years, and I have to give it my all right now.”
Aaron’s gift for skating seems to run in the family. His 18-year-old sister, Madeline, is also a professional figure skater and a 2013 U.S. junior bronze medalist. His older sister, Molly, also used to skate competitively.
A few years ago, the Aaron family bought a second home in Colorado, so Max and Madeline could train together at the Broadmoor Skating Club, although the two don’t perform together since Madeline is a pairs skater and Max skates solo.
“I wanted to become a figure skater after I saw how well Max skated,” Madeline said. “I’m hoping we get to perform one day together, but it’ll take a lot of dedication.”
Aaron’s mother, Mindy, said her children had always wanted to be professional ice skaters. As kids, they tried every activity to see what they liked. Max, she said, was a natural.
“They’ve put in a lot of hours for this, and while it’s not something that I recommend for everyone, my husband and I always try to encourage them to live up to their potential,” she said. “Watching the kids from the podium is always a proud moment for me, but we’ve had some disappointments in the past from scouts. Max is not a very tall boy, and scouts don’t usually go for the small ones.”
Mindy says her children struggled with a packed schedule, attending public school full time and ice skating in the morning and afternoons, but they were never allowed to ditch Hebrew school, which they attended three times a week.
“You need to be grounded, and we try to understand the value in Jewish traditions and hobbies,” she said. “Ice skating was important, but they always take off for the Jewish holidays.”
Aaron is enrolled at Pikes Peak Community College in Colorado Springs, where he takes night classes after training for the world championships. He says he wants to become a sports agent once he retires as a figure skater, but hopes he can win as many titles as possible before the time comes. He also has plans for what he’d like to do with his free time after the competition. | https://azjewishpost.com/2013/inspired-by-past-jewish-stars-champion-skater-max-aaron-eyes-sochi-olympics/ |
They find skates more comfortable than shoes, which is what will make retirement so hard for Brad and Wendy Loosley.
Sarnia’s former acting city clerk and his wife have been a constant presence in the skating world for 47 and 34 years respectively. But they want to spend time with each other and the grandchildren, without worrying about getting up at 4 a.m.
Brad Loosley is a hockey player turned figure skater who was helping with testing at his home arena in Woodstock. He had his eye on a young skater named Wendy and was working up the courage to ask her out. Then, he was told to test her.
And how did that go?
“Not well,” says Wendy, rolling her eyes while sitting in their Petrolia home.
“I didn’t pass her,” adds Brad, with a twinkle in his eye. “I had to judge her fairly … I couldn’t be biased.”
“Brad has always been more competitive than me,” says Wendy. “I skate because I love it.”
Wendy Loosley has taught many others to love it as well over her long teaching career.
“I say the family that skates together stays together,” she says, noting many times the family arose at 4 a.m. for practices at the rink.
“We introduced our kids to skating just so they could skate for school, but both of them fell in love with it.”
One son is an adjudicator; the other makes his living skating for Disney.
While their kids were at the rink they made lots of friends who became part of the extended family, Wendy says.
“We’ve taught so many kids, hundreds really, and the kids we taught now are bringing their kids to the rink.”
Some students who moved away for college would return to the rink at Christmas just to say hello.
“I’ve seen Wendy on her hands and knees trying to convince the little guys to stand up and skate,” Brad says.
Wendy has been teaching daily lessons in the Point Edward Arena for the past eight years, and Brad has helped with pairs skating.
They know they’ll miss it.
“It is going to be difficult when winter comes and the registration comes and we’re not sitting at the table telling our kids where to sign up,” says Wendy. “After 34 years of the Hokey Pokey and the Bird Dance, it’s not going to be the same.”
The pair is looking forward to spending more time with their grandchildren and finish up long-delayed jobs around the house.
“To not put on skates will be strange because they’re more comfortable than the shoes,” Wendy says. | https://thesarniajournal.ca/popular-skating-coaches-hang-em/ |
RCS students represent in YLA conference
Selected Roxboro Community School (RCS) students will attend the 2014-2015 Youth Legislative Assembly (YLA) Conference March 21-23.
YLA is a mock legislative session where high school students vote on issues in the government and share their opinions with others.
Five RCS students, sophomore Daniel Taylor, sophomore Emily Pierce, junior Anderson Clayton, junior Brandon Combs and senior Ben Townsend will attend the conference as committee chairs – those who represent 10 different committees each having to do with a pressing issue in today’s government. Each set of co-chairs is responsible for writing a bill having to do with the committee they are assigned to.
Sophomore Ashton Martin will also attend the conference as a clerk.
As a clerk, Martin will guide the tri-speakers, the overall leaders of the conference, throughout the process and control the time of the debates.
RCS school advisor Wanda Ball said, “As co-chairs, YLA offers students a leadership experience unlike any other. Student leaders collaborate with delegates and professional consultants on writing their bills; then, they present their bills to the assembly and give clarification during the debate.”
She continued “The entire process hones co-chairs’ communication and organizational skills. RCS is fortunate to have six officers this year – plus former RCS students Darby Madewell and Kate Branch who are now at North Carolina School of Science and Math – to guide our delegates through the assembly this year. Personally, I am so proud of the commitment these youth have made as officers. Since November 2013, cochairs have gone to Raleigh on Saturdays to plan and organize for the March 21-23 YLA Assembly. | http://couriertimes.our-hometown.com/news/2014-03-22/The_Bullhorn/RCS_students_represent_in_YLA_conference.html |
TALLAHASSEE, Fla. – Fallen correctional officers were honored Wednesday morning by the new Florida Department of Corrections secretary.
One of the officers who lost their lives in 2018 died supervising inmates, while another died helping after Hurricane Michael.
Correctional officers put their lives on the line every day.
“They have rightly earned our love and respect and for this we honor their memory,” said Chaplain Johnny Frambo.
A total of 52 Florida correctional officers have died in the line of duty.
Their sacrifices are remembered each year at the Fallen Officer Memorial.
The name of each officer was read aloud.
In 2018, two correctional officers lost their lives while serving.
“A man and woman of courage,” said FDOC Secretary Mark Inch.
Officer Tawanna Marin was struck by a vehicle while supervising a work crew.
Sgt. Derrick Dunn suffered a heart attack while volunteering in the Panhandle following Hurricane Michael.
“He knew they needed help. He probably was the first one to step up,” said Dunn’s cousin, Conchita Baldwin.
Dunn’s family said he died doing what he loved.
“I don't think that he would have wanted to go any other way other than being in the line of service,” said LaDawn Baldwin, also Dunn’s cousin. "Didn't matter where it was at because he was that person all around.”
Marin's and Dunn’s names are engraved on the Fallen Officer Memorial at the Wakulla Correctional Institution.
The FDOC needs of more officers like Dunn and Marin. Statewide, there are nearly 2,000 vacancies.
“I am awed by the number of individuals who step forward and dedicate their life literally in service to our state and our nation,” Inch said.
To help address the shortage, the Florida Legislature passed a bill to lower the age to become an officer from 19 to 18.
It’s awaiting the governor’s signature. | https://www.news4jax.com/news/2019/05/23/floridas-fallen-correctional-officers-honored-by-state/ |
It’s high Summer on the Pacific Northwest Coast. It hasn’t rained in weeks. The sun is hot and we spent the day hiking at Belcarra Regional Park about 1 hour outside of Vancouver. Shielded from the muggy, hazy air, the cooler temperature under the forest canopy was a welcome reward. Ignoring the cougar and bear siting signs, we trekked up to the summit overlooking Deep Cove and back down to the beach at Jug Island to snack on blueberries, rice crackers and hummus.
13 kms later and all I could think of was a big bowl of creamy pasta. During a visit to Bruce’s Country Market earlier in the week (http://www.bruces.ca/history.html), we picked up some of their famous salmon, double smoked on site. After snacking on it straight out of the bag if found it’s way into the drawer in the fridge so I pulled out the remaining 2 pieces and improvised this recipe that came out… OMG…really good.
The amounts will be to taste or approximate as this is the first time I’ve made this and my cooking is usually based on tasting it as it’s in the pot and adjusting so bear with me.
You will need:
- 4 cups cooked fettuccine
- 2 handfulls chopped baby spinach
- 1 cup flaked smoked salmon
- 3 Tblsp butter (1 for the cooked fettuccine and 2 for the sauce)
- 4 garlic cloves crushed
- 1/4 tsp garlic powder
- 1 3/4 cups half & half cream
- 1/2 cup chicken broth or white wine
- 4 Tblsp (or more to taste) parmesan cheese
- Salt and pepper to taste
Cook the fettuccine according to the package, strain and butter. Set aside. You will add the pasta to the sauce once it’s ready.
Merlin insisted he needed attention at the exact time as I was cooking. He can be demanding but he’s such a sweet guy that I had to crouch down and give him snuggles and belly rubs, dragging my cooking out a little.
To make the cream sauce set the stove at medium heat and in a deep/heavy pan add the 2Tblsp of butter and once melted add the garlic and stir for about a minute. Sprinkle the flour and stir quickly as it will thicken fast. Immediately add the chicken broth (or white wine) and stir/whisk as it begins to thicken again.
Next comes the cream, stirring while you pour it in. This is where you will have to use your judgement and add more cream or broth to keep the sauce thick but not too much so.
Add garlic powder and parmesan cheese, salt and pepper. Remember that smoked salmon is salty so you might prefer to add the salmon first then salt as needed.
Add the spinach and smoked salmon and mix well. Now it was smelling so good and my mouth was watering in anticipation.
Lower heat to minimum and add the pasta, scoop by scoop, mixing to coat.
Light candles, serve immediately and top with parmesan.
Love, | https://thebellwitchmanor.blog/2017/08/08/creamy-fettuccine-with-smoked-salmon-and-spinach/?like_comment=114&_wpnonce=8cbda47c66 |
For many hospitals, it’s essential to have an effective electronic health records (EHR) system. And it’s equally as important to have a plan in place if something happens to disrupt an EHR’s operations, whether it’s a natural disaster or a cyberattack.
In its recent mid-year update to the Work Plan, the Office of Inspector General (OIG) said it would be reviewing hospitals’ contingency plans in case their EHRs weren’t able to function.
The agency has just released a new report outlining the results of its review, including how hospitals are performing in meeting objectives required by HIPAA.
Required components
As part of the HIPAA security rule, a hospital’s EHR contingency plan should include the following elements:
- a data backup plan for creating and storing copies of electronic health information
- a recovery plan to restore lost data
- an emergency mode operations plan so facilities can continue performing required operations
- an assessment of all applications that would be affected (including the impact of a widespread outage), and
- protocol for testing and revising the contingency plan.
The OIG looked at federal data from hospitals that have received EHR incentive payments to determine how effective facilities are with creating contingency plans.
Almost every hospital (95%) said it had written procedures in place to specify how it’d handle EHR disruptions. Most of the remaining hospitals said they were either working on developing contingency plans or already had some of the procedures in place, but they weren’t a part of the facility’s written policy.
Out of the hospitals that did have a formal, written EHR contingency plan, most of them addressed at least three of the HIPAA-required elements: a data backup plan, a disaster recovery plan and an emergency mode operations plan. Around two-thirds of hospitals (68%) included these three elements, plus testing and revision procedures.
Implementing plans
When putting each HIPAA-required element into place, hospitals used a variety of methods.
For data backup, most facilities that maintained backup files updated them at least once a day. While some facilities saved data on a secondary server, others saved it on tapes or disks. Others used a combination of both approaches. Around half of the hospitals reported they had a “read only” EHR system that can be activated to display backup EHR data, if needed.
With disaster recovery, about 75% of facilities had duplicate EHR hardware running at an alternate site, and almost half of these hospitals said they could fully transfer EHR operations over to the alternate site within eight hours, the recommended time frame for this process. However, only about a quarter of facilities said they tested their alternate systems at least every three months.
Across the board, all hospitals’ emergency operations plans relied on the use of paper. In case of a total EHR shutdown, nearly every facility said it would provide staff with paper forms to perform important tasks like registering new patients and documenting vital signs, though slightly fewer hospitals (75%) said they had enough paper forms on hand to last eight hours.
Other common equipment hospitals had on hand for disasters included generators (98%) and uninterruptible power supplies (94%).
Additional steps
While these practices are essential for maintaining normal operations in cases of an EHR outage, the OIG recommended that hospitals expand on their contingency plans, following federally endorsed standards such as:
- visually differentiating an EHR’s “read-only” system from its normal appearance
- storing EHR hardware at an alternate site at least 50 miles from the primary site
- testing the hardware at each alternate site at least once every quarter
- testing generators and power supplies monthly (and keep at least two days’ worth of fuel onsite)
- creating a communication structure that doesn’t rely on the hospital’s computing network, and
- making sure there’s an adequate supply of paper forms.
The OIG also stressed the importance of regularly testing and revising EHR contingency plans. Staff should be trained on the plans through tests and exercises designed to simulate the actual experience of working without access to an EHR.
Contingency plans should be updated whenever there are any changes or enhancements to a hospital’s EHR system so they’ll continue to be applicable in case of an emergency.
With ransomware attacks and other threats becoming more common in health care, an up-to-date, tested EHR contingency plan is essential to keeping these situations from negatively affecting your facility’s operations. | https://www.healthcarebusinesstech.com/ehr-contingency-plan/ |
The unit sales of the Company's transmission boxes also doubled in the Q1, as compared to a year ago, mainly due to continued growth led by the reopening and rebound of the broader economy, along with the Company's successful introduction of new products.
"Doubling of our revenue on a year over year basis is impressive but we are even more excited about the expected sequential growth in the first quarter of 2021 compared to the fourth quarter of 2020. This would make the first quarter of 2021 the highest revenue quarter in the Greenland's history," says Raymond Wang, CEO.
The Company plans to release financial results for the first quarter of 2021 in mid-May.
To ensure this doesn’t happen in the future, please enable Javascript and cookies in your browser. | |
Q:
Statistical interpretation of Entropy
I'm preparing my statistical physics course, and while writing the lecture notes it says that a system with non distinguishable particles has much less microstates asociated with a particular macrostate. Hence, a system with distinguishable particles has much more microstates asociated with a particular microstate. Entropy $S$ is related with the number of microstates $\Omega$ via:
$$S=k \ln (\Omega) $$
where $k$ is Boltzmann's constant. Then my question is
Given the same macrostate for both systems, the entropy of the first is much lower than the entropy of the second?
Thanks for your time.
A:
In the microcanonical ensemble, the probability of each microstate is assumed to be the same. In this case, the Gibbs entropy formula reduces to Boltzmann’s equation, which you gave above. Assuming there are two systems in the same macrostate, since the number of microstates is less in a system with indistinguishable particles than in a system with distinguishable particles (reason: combinatorially, there are more ways to arrange distinguishable objects), the entropy—which increases when the probability that the system will be in more microstates increases—will be lower for the system with indistinguishable particles in the microcanonical ensemble.
For the canonical or grand canonical ensembles, the probability of each microstate is different, and so the entropy may or may not be lower.
I am not sure what you mean by “much” lower, but note that the logarithm function may reduce large differences.
A:
Let's examine a really simple "lattice gas" example. We have a lattice consisting of three cells, each of which can either be occupied with a particle or not. Let's say that the macrostate is $n=2$, i.e. there are 2 particles to be placed in each of the three cells. If we consider the case of indistinguishable particles, there are three possible microstates compatible with this macrostate:
x x .
x . x
. x x
(where x represents a particle and . is an empty cell.) So we have $S=k\log 3$ for this case. But if we consider the two particles to be different from one another, we have six microstates:
1 2 .
2 1 .
and thus $S=k\log 6$, which is greater than the other entropy by $k\log 2$. In this case the entropy was only slightly higher, but in general the number of microstates for distinguishable particles is greater than that for indistinguishable ones by a factor of $N!$, so the entropy will be greater by an amount $k\log N!$. With $N$ equal to Avogadro's number, $k\log N!$ is of the order 500 $\mathrm{JK^{-1}}$.
| |
According to the technical scheme, the black and white drill with the blade convenient to replace comprises a fixing device, a drill bit, a cutter head and the blade, the fixing device comprises a first outer hexagon screw and a second outer hexagon screw, the top of the drill bit is inserted into the inner wall of the cutter head, and a first positioning hole is formed in the inner wall of the top end of the drill bit in a cross shape; a first internal thread is arranged on the inner wall of the first positioning hole, and one end of the first external hexagonal screw is in threaded connection with the inner wall of the first positioning hole through the cutter head; the bottom of the blade is in threaded connection with the inner wall of the cutterhead, a second positioning hole is formed in the inner wall of the bottom end of the blade in a cross shape, a second internal thread is arranged on the inner wall of the second positioning hole, and one end of the second external hexagonal screw is in threaded connection with the inner wall of the second positioning hole through the cutterhead. The drill bit has the advantages that the blades on the drill bit are convenient to mount and dismount, material waste is reduced, and working efficiency is improved. | |
Editor's note: These comments were posted by Christopher Harrison on Spacealumni.com on 6 December 2006. These are his own thoughts and do not reflect the opinion or policies of his employer. These comments are republished here with the author's permission.
I was able to attend the conference as a student exhibitor in the Future Exploration Leaders Gallery. The exhibit area was among the best I have seen. Exceptional exhibits by many of the major aerospace companies and some newcomers who I had never seen before. As a student and industry co-op, I was excited to see Boeing, NGC, NASA, and the AIAA investing in the future by inviting 13 student groups to present their research in various aerospace topics. It was a great way for industry professionals to show their support for the future generation and for students to network with potential employers and industry players who deal in their area of research.
I was able to attend all but two of the sessions held during this conference. By far, the most beneficial and time-worthy session was "Sustaining the Vision". This session dealt with what is needed to ensure that the Vision for Space Exploration garners the support necessary to achieve it. In particular, methods for gaining and maintaining the support of the younger generation were discussed. In a deviation from the format used in previous sessions, this session became a public forum. This opened the door for anyone in the audience to step up to a microphone and speak their mind or ask a question to the panel chaired by Pete Worden (Center Director, NASA Ames Research Center). It was agreed by all panelists that the 18-30 year old demographic would be the future leaders of space exploration and more must be done to garner their support.
One panelist, from George Mason University, reported on a recent study she conducted which found that nearly 50% of students polled believed that nothing beneficial has ever come from NASA. Of all students polled, almost 25% were doubtful that the U.S. really landed on the Moon. She emphasized that so many these days are getting a majority of their information from the internet, a place where many conspiracy theories are born.
When opened to public questions, the most common theme expressed was that NASA should use some of its budget to advertise (to the target 18-30 year old demographic). Ideas ranging from more television commercials to more internet advertising were discussed. Absent from the public forum were the opinions of the age group in question. Noticing this, Keith Cowing from NASA Watch suggested that the Apollo generation stop listening to each other about how to reach the future generations and start listening to the opinions of the future generation themselves. It was at this point that the greatest single idea of the conference was expressed.
An 18-year old student from Texas A&M University spoke about his encounter with space. He spoke of how NASA, over the years, managed to lose sight of what got it to the Moon in the 1960s: inspiration. In his opinion, NASA needs to go back into the schools and inspire young kids to dream about the future and what space exploration has to offer. He shared that he himself would not be in college had someone from NASA not taken an interest in his future and made him feel like he could accomplish anything.
As a member of the audience throughout the conference, this was the only time I noticed that all BlackBerry and laptop users stopped and gave their full attention to the matter at hand. After this student's speech, many more were encouraged to stand up and speak about the topics creating a barrier between NASA and the future generations. One student suggested that NASA focus its efforts on reaching students and young professionals in the information arenas they use (Facebook, MySpace, etc). These websites are the primary means of communication among college students and advertisement costs are almost non-existent.
Another student, a winner of the NASA Means Business competition, simply asked what he could do to help NASA reach the young generation. He noted that NASA supports many competitions among students to create advertisements and public service announcements about NASA, yet few, if any, of these advertisements make it past the eyes and ears of those in the community. He stated that if NASA wants to truly reach their successors, they need to stop "preaching to the choir" and start targeting those outside of the aerospace community who are not already convinced of the benefits of human space exploration.
Personally, I spoke about NASA's current advertising programs. Many of their advertisements and short videos concerning the Vision for Space Exploration feature short video clips of President Kennedy's 1961 speech interspersed with clips of President Bush's vision announced in 2004. This could be seen by simply walking through the exhibition hall. Almost all short videos and handouts concerning the VSE featured President John F. Kennedy prominently. Sometimes, President George Bush was not even included. One of the main opinions/questions of college students is "Why should it be such a big deal that NASA is going back to the Moon and even more, why is it taking twice as long to get on the surface as it did for the entire Apollo program to take place?" Featuring President Kennedy as the primary figure in these advertisements only fuels the opinion expressed above.
Keeping the past achievements of NASA in mind as we return to the Moon is important, but it should not define the agency as it is currently doing. To attract the future generation of explorers, NASA needs to establish itself as the agency of the future, not the agency of the past. A return to the Moon is merely the stepping stone necessary to set foot on Mars and beyond, but advertisements would have the audience think the return to the Moon is the main goal of the VSE.
Finally, the single most powerful advertisement tool NASA has are the employees themselves. Anyone who works in the industry is usually quick to share with you where they were on July 20, 1969, or what other event sparked their interest in space. Many of our hearts still skip a beat when we watch a Space Shuttle launch. However, few of these heart-felt opinions are ever shared outside of work or "the choir". Taking the time to share these feelings with young students and those outside of the aerospace industry is vital to sustaining the VSE and recruiting the explorers of tomorrow. PAO is understandably not able to visit every school and give presentations on NASA, but that does not mean we cannot take the time to visit our children's schools and share our excitement and passion with them.
// end //
More status reports and news releases or top stories.
Please follow SpaceRef on Twitter and Like us on Facebook. | http://www.spaceref.com/news/viewsr.html?pid=22727 |
Kingston Police: Caught shoplifter also charged for carrying concealed weapon, drugs
An attempt to steal from a store at the Frontenac Mall led to four charges for a local woman.
The incident occurred on Wednesday, Feb. 27, 2019, when, at approximately 11:20 a.m., the accused woman was observed by store security shopping in one of the stores at the west-end mall. The accused woman selected a number of items and, at approximately 1:40 p.m., she proceeded to exit the store without making any attempt to pay.
Store security approached the accused woman and identified themselves before escorting her back into the store and contacting police.
Responding officers arrived at the store at 1:42 and arrested the accused woman. During a search, the accused woman was found to be in possession of a collapsible baton and a small case. Inside the case were two bags, one containing a substance suspected to be fentanyl, the other containing a substance suspected to be crystal methamphetamine.
The 40-year-old Kingston woman was charged with carrying a concealed weapon, theft under $5,000, and two counts of possession of a controlled substance. | https://www.kingstonist.com/news/kingston-police-caught-shoplifter-also-charged-for-carrying-concealed-weapon-drugs/ |
Last night I was up later than usual watching an NHL game between the Chicago Blackhawks and the New Jersey Devils. The Blackhawks ended up winning a high score affair 8-5.
After that game I was flipping through channels trying to find something to watch. After just checking out a little of this and a little of that I remember that Sportscenter should be on. I turned on ESPN, but I didn’t get Sportscenter as the NBA game between the Los Angeles Clippers and the Los Angeles Lakers was still on. I was going to start looking for something else to watch or just give up and go to bed when I noticed that there were only 25.2 seconds left in the game. I thought that it wouldn’t be a big deal tow watch this game wrap-up and then catch some SportsCenter; boy was I way off.
When I found the game, the referees had just started a review of a play. Lebron James had saved the basketball from going out of bounds and the referees where also looking to see if Clippers player Robert Covington had knocked the basketball out of bounds after James saved it. Now, it was difficult to tell if James had stepped on the baseline as he was attempting to save the basketball. As you can guess this slowed down the review and when I say slow down, I mean grind the game to a halt. I’m not sure how long this review took, but it seemed as though the game was stopped for 10 or 15 minutes as the referees reviewed the play.
Finally, after a very long delay it was ruled that James did step out of bounds giving the basketball to the Clippers who had a 1-point lead at 103-102.
Apparently, the Clippers decided that they wanted the keep the Lakers in the game as for whatever reason the Clippers committed an 8 second turnover as they couldn’t get the basketball over half court after calling a timeout. The turnover gave the lakers the basketball down 1-point with 18.3 seconds on the clock, but they didn’t use that time very well.
Richard Jefferson made some great points on commentary about how the Lakers should run their offense quickly and try to score so they would have time to either try to rebound if they missed their shot or play defense if they scored and took the lead. instead, the Lakers got the basketball to James, and he stood and dribbled down the cock until there were about 4 seconds left.
The Clippers ran a double team at James with a third player also close enough to defend James, so he passed the basketball instead of trying to force a contested last second shot.
Carmelo Anthony was the open Lakers player James got the basketball to. Anthony took a long 3-pointer even though the Lakers were just down by 1-point. Anthony shot came nowhere close to going in. The Clippers Reggie Jackson ended up with the basketball and was fouled quickly. Jackson made both free throws, but the Lakers still had 2.2 seconds to tie the game with a 3-pointer, but they didn’t have any timeouts and had to go the length of the floor.
Well, the Clippers decided to help the Lakers out again. The Lakers threw a full court pass which was knocked out of bounds by the Clippers with 0.7 seconds left in the game. If the Clippers would’ve just deflected the basketball into play, they would’ve won the game right then and there.
Obviously 0.7 seconds isn’t a lot of time, but the Lakers did manage to get the basketball to James for a 3-pointer from the corner that didn’t really get anywhere close to going in and the Clippers escaped with a 105-102 victory.
Now once the game got restarted it was interested to see how bad these two teams that were thought to be NBA title contenders at the start of the season are in the positions, they’re in.
Of course, the problem was the length of the review before the final 25.2 seconds of this game. Now if you’ve listened to the Sports Time Radio podcast you’ve probably heard Dan the Man complain about the length of time it takes Major League Baseball umpires to review calls. Well, if he would’ve been watching this, he would’ve thought that the umpires worked quickly compared to these NBA referees.
Now, I understand that the referees want to make sure they got the call right last night, but there’s no way they should’ve delayed the game for as long as they did. Not only does a delay like that kill the flow of the game it also allows the players to cool down which could lead to more injuries which the NBA seems to have enough of. I can tell you that it was no fun to sit there and watch the referees look at a replay of James trying to save the basketball over and over while the announcers try to fill time. It’s time for the NBA to look into some time of time limit for these reviews, but obviously that’s something to consider in the off season.
Unfortunately, this is just another reason that I don’t enjoy watching the NBA.
While we’re talking about the NBA James Harden made his debut for the Philadelphia 76ers last night. Harden was acquired by Philadelphia at the trade deadline in a deal that sent Ben Simmons and other to the Brooklyn Nets.
This was Harden’s first game since February 2nd. Harden had been out with a hamstring injury and even skipped last weekend’s All-Star game. Harden’s hamstring must be 100% as he played 35 minutes last night as the 76ers beat the Minnesota Timberwolves 133-102. Harden put up a double-double in his 76ers debut as he had 27 points and handed out 12 assists. Harden ended up just two rebounds short of having a triple-double last night.
There were quite a few people wondering how Harden would mess with Joel Embiid and for the first game it seemed to be just fine. Embiid also posted a double-double last night. Embiid was the 76ers leading scorer with 34 points while also leading the 76ers in rebounds with 10.
Philadelphia is currently 3rd in the Eastern conference standings 2 1/2 games behind the Miami Heat and Chicago Bulls who are tied for the top spot in the Eastern conference.
Philadelphia’s next chance to close the gap on the two teams ahead of them comes Sunday afternoon as they take on the struggling New York Knicks.
I hope you’ve taken the time to listen to the Sports Time Radio podcast. The podcast airs live on BlogTalkRadio.com, but if you miss the live edition of the podcast, you can still hear it. All you have to do is go to TuneIn.com and you can listen any time you want to. | https://sportstimeradio.com/2022/02/26/how-was-your-week-356/ |
IP vs MAC Address
What is IP Address?
In a network that uses Internet Protocol to communicate between the entities such as computers or printers of the network, the logical numerical label or address assigned to each entity is called an IP address (Internet Protocol Address). IP address serves the purpose of identifying and locating each entity separately in the network at the interface level and functions at the Network Layer of OSI model.
IP addressing has two versions depending on the number of bits used to store the address, namely Internet Protocol Version 4 (IPv4) which is developed with 32 bit addressing mode and most widely used, and Internet Protocol Version 6 (Ipv6) developed with 128 bits addressing Mode in the late 90’s. Though IP address is a binary number, usually it’s stored in the host in a human readable format. The Internet Assigned Number Authority manages the space and name allocation for IP addresses globally.
IP addresses are of two types; Static IP addresses are permanent and are assigned to the host manually by an Administrator. Dynamic IP addresses are newly assigned to the host each time it is booted by computer interface, host software or by a server using DHCP (Dynamic Host Configuration Protocol) or Point-to-Point Protocol, which are the technologies used to assign Dynamic IP address.
Dynamic IP addresses are used so that administrators do not have to assign IP addresses manually to each host. But in some cases, such as in translating a domain name to an IP address by the DNS (Domain Name System), it is essential to have a static IP address as it would be impossible to locate the location of a domain if it contains a frequently changeable IP address.
What is MAC Address?
MAC Address or Media Access Control Address is hardware or physical address associated with the Network Adapter of a host and is assigned by the Manufacturer of the NIC (Network Interface Card). MAC Addresses functions at the Data Link Layer of the OSI Model and serve as unique identifications of each adapter at a lower level in a Local Area Network (LAN).
Each MAC Address consists of 48 bits, with the upper-half contains the ID number of the Adapter Manufacturer, and the lower-half contains a unique serial number assigned to each Network Adapter by the manufacturer and is stored in the Adapter’s hardware.
|Organizationally unique Identifier (3 bytes)||Network Interface Controller Specific (3 bytes)|
MAC Addresses are formed according to the rules of either of the three numbering name spaces MAC -48, EUI -48, and EUI – 64, maintained by IEEE.
What is the difference between IP Address and MAC Address?
Though IP address and MAC Address both serve the purpose of giving hosts a unique Identification in a Network, depending on the status and function, these two have several differences. When the functioning Layer of Addressing is considered, while MAC Address functions in Data Link Layer, IP address operates in Network Layer.
MAC address gives a unique identification to the hardware interface of network, whereas the IP Address gives a unique identification to the software interface of the Network. Furthermore, if the assignment of address is considered, MAC addresses are assigned permanently to adapters and cannot be changed as they are Physical addresses. In contrast, IP addresses, either static or dynamic, can be modified depending on the requirements as they are logical entities or addresses. In addition, MAC addresses come in handy when it comes to Local Area Networks.
If the format is considered, the IP addresses use 32 or 128 bits long addresses while MAC addresses use a 48 bits long address. In a simplified view, IP address can be considered to support software implementations and MAC address can be considered as supporting hardware implementations of the network.
Despite differences, IP networks maintain a mapping between MAC address and IP address of a device, referred to as ARP or Address Resolution Protocol. | http://www.differencebetween.com/difference-between-ip-and-vs-mac-address/ |
Thick-walled Tree Grilles CorTen Square are available in a wide range of patterns - square or round. The diameter of the aperture always measures a third of the grille’s overall width, e.g. ø33 and ø60 cm - 13” and 24” in 100 and 180 cm - 39” and 71” wide grilles respectively. We recommend CorTen steel frames when installing tree grilles at ground-level in order to provide adequate support and to maintain uniformity with street paving.
Products supplied within the North American market are fully manufactured in the USA
Possibilities and restraints
- Available in square sizes of ca. 100, 120, 150, 180 or 300 cm | 39", 47", 59", 71" or 118" | https://www.streetlifeamerica.com/us/products/tree-grilles-corten-square |
You can specify your reference genome with "-reference" option. The
reference file should be formatted in fasta, and multiple files can be specified like
"-reference chr1.fa chr2.fa". You can also use a wildcard for specifying multiple files
as "-reference chr*.fa".
The options "-species"and "-revision" specify the name
of species and revision of genome sequences, respectively. These options also specify the
directory names and the file name to store the index structure. In default settings, BMap
uses the "Revisions" directory, which is located in the same directory with the executable file, to store the index files.
In this step, BMap create suffix arrays for two duplicated reference genome
sequences; one is generated by converting every C to T (C2T) and the other is generated by converting every G to A (G2A). These suffix arrays are created using an algorithm termed "induced sorting"
(Ge Nong et al., 2011), which is able to build the index structure in linear computational
time with the length of input sequence. After creating the suffix arrays, BMap next
constructs a Burrows-Wheeler Transform (BWT) version of C2T and G2A sequences required to construct an FM-index (Ferragina P. & Manzini M., 2001).
2. Map your reads
After creation of the index file, you can do mapping with BMap. BMap accept fasta, fastq
and illumina qseq file as query file(s) for single-end reads. Only pair(s) of fastq files
are acceptable for paired-end reads. The simplest commands for single-end and paired-end reads
are as follows.
1. Specifying reference genome or index file
Specify path to index file. Mutually exclusive with the combination of options "-species" and "-revision"
-root_dir
string
Specify the path to root for index path tree. (default="Revisions")
-binseq
string
Specify path to binseq file
2. Specifying number of threads used for mapping
Option
Value type
Descriptions
-thread
integer
Specify number of CPU core or threads used in mapping mode. (default=1)
3. Controlling sensitivity and speed of mapping
Option
Value type
Descriptions
-seedoffset
integer
Specify offset position of read to take first seed (default=1)
-seedstep
integer
Specify step width of seed (default=1)
-seediterate
integer
Specify number of repeat to take seeds (default=100)
-minseedlen
integer
Specify minimum length of seed (default=16)
-maxseedlen
integer
Specify maximum length of seed (default=26)
-minseedcount
integer
Specify minimum seed count for a candidate genomic region to be considered
for verification of alignment with read.
-maxseedcount
integer
Specify maximum seed count to be considered for verification of alignment with read.
4. Controlling stringency of alignment
Option
Value type
Descriptions
-minscore
integer
Specify minimum score for alignment to report. Value for a match and
a mismatch are 5 point and -30 point, respectively. A mismatch between C on reference
and T on reads is considered as a match. (default=150)
5. Selection of type of index structure and memory usage
Option
Value type
Descriptions
-bwt
integer
Specify index structure dependent on values:
0: Use suffix array.
1: Use FM-index with -SCF 4 -SCL 16
2: Use FM-index with -SCF 8 -SCL 16
3: Use FM-index with -SCF 16 -SCL 16
4: Use FM-index with -SCF 32 -SCL 32
5: Use FM-index with -SCF 64 -SCL 64
6: Use FM-index with -SCF 128 -SCL 128
6. Manipulating I/O
Option
Value type
Descriptions
-reference
string(s)
Specify input file name(s) for creating index
-fasta
string
Specify input file formatted in fasta. Only available
for single-end sequencing reads
-fastq
string(s)
Specify input file formatted in fastq. Only available
for single-end sequencing reads
-qseq
string(s)
Specify input file formatted in qseq. Only available
for single-end sequencing reads
| |
These symptoms may be indicative of multiple medical conditions, including acid reflux, food poisoning, or infection. If home remedies, such as over-the-counter antacids, are not helpful then you may want to contact your doctor.
While the list below can be considered as a guide to educate yourself about these conditions, this is not a substitute for a diagnosis from a health care provider. There are many other medical conditions that also can be associated with your symptoms and signs. Here are a number of those from MedicineNet:
-
Gastroesophageal Reflux Disease (GERD)
GERD (gastroesophageal reflux disease) is a condition in which the acidified liquid contents of the stomach backs up into the esophagus. The symptoms of uncomplicated GERD are: heartburn, regurgitation, and nausea. Effective treatment is available for most patients with GERD.
-
Food Poisoning
Food poisoning is common, but can also be life threatening. The symptoms for food poisoning are fever, abdominal pain, headache, diarrhea, nausea and vomiting. Food poisoning has many causes, for example, chemicals (from toxic fish or plants) and bacteria (Staphylococcus aureus or Salmonella). Treatment of food poisoning depends upon the cause.
-
Diabetic Ketoacidosis
Diabetic ketoacidosis (DKA) is a complication of type 1 diabetes that is life threatening. If a person thinks they may have diabetic ketoacidosis they should seek medical care immediately. Diabetic ketoacidosis happens when a person's insulin levels in the blood become dangerously low. Symptoms of diabetic ketoacidosis include dehydration, abdominal pain, confusion, and nausea and vomiting. Diabetic ketoacidosis needs medical treatment. It cannot be treated at home.
-
Constipation
Constipation is defined medically as fewer than three stools per week and severe constipation as less than one stool per week. Constipation usually is caused by the slow movement of stool through the colon. There are many causes of constipation including medications, poor bowel habits, low fiber diets, laxative abuse, and hormonal disorders, and diseases primarily of other parts of the body that also affect the colon.
At MedicineNet, we believe it is important to take charge of your health through measures such as a living healthy lifestyle, practicing preventative medicine, following a nutrition plan, and getting regular exercise. Understanding your symptoms and signs and educating yourself about health conditions are also a part of living your healthiest life. The links above will provide you with more detailed information on these medical conditions to help you inform yourself about the causes and available treatments for these conditions. | https://www.medicinenet.com/nausea_or_vomiting_and_taste_of_acid_in_mouth/multisymptoms.htm |
Santa Rosa Sound is a sound connecting Pensacola Bay and Choctawhatchee Bay in Florida. The northern shore consists of the Fairpoint Peninsula and portions of the mainland in Santa Rosa County and Okaloosa County. It is bounded to the south by Santa Rosa Island (also known as Okaloosa Island in the easternmost region of the sound), separating it from the Gulf of Mexico.
The Gulf Intracoastal Waterway between Pensacola Beach and Fort Walton Beach is routed through the sound.
Three bridges carry pedestrian and automobile traffic to the barrier islands on the south side of the sound. The first two bridges have the lowest clearance of any span over the Gulf Intracoastal Waterway. For this reason, many sailboats with masts taller than 50 feet must "go outside" and bypass the protected sound using the unprotected waters of the Gulf of Mexico.
The bridges crossing Santa Rosa Sound, including the names of communities on both sides of the bridge (mainland side, followed by island side) and center span clearances above mean sea level, are:
Coordinates: 30°24?07?N 86°46?37?W / 30.4019171°N 86.7768273°W . | http://www.like2do.com/learn?s=Santa_Rosa_Sound |
You are here:
Home
/
News at ZMT
/
News
/
News Archive
Filters
Display #
5
10
15
20
25
30
50
100
All
Filter
List of articles in category News Archive
Title
Published Date
ZMT Alumni Fellowship: Apply now
20/12/2018
Exhibition: In Sight – Bremen research for our grandchildren’s future
22/11/2018
Ocean and Coastal Governance for Sustainability: Course by ZMT and IOI
21/11/2018
Quench your thirst for knowledge: ZMT is back at Science Goes Pub(lic)
16/11/2018
Call for Papers: Conference of GAPS and IACPL takes place in Bremen next spring
12/11/2018
Effects of global changes in the Benguela Current: ZMT coordinates joint research project in Germany, Namibia and South Africa
09/11/2018
360° film about coral reefs honoured at international film festival in Belgrade
07/11/2018
ZMT hosted Coral Reef Conference "CAPTURE" at the Haus der Wissenschaft, Bremen
02/11/2018
Fisheries in West Africa: Cooperation and competition for marine biological resources
23/10/2018
Drowning megacities? How humans adapt when the water rises
23/10/2018
ECSA 56: Special conference journal issues now published
12/10/2018
Photo Exhibition: Coral Reef Organisms – Artworks of Nature
11/10/2018
Future Earth Coasts – On the Move!
11/10/2018
Apply now for Winter School “Applied Non-Linear Dynamics & Scientific Writing” at AIMS in Senegal
02/10/2018
Mourning the loss of ZMT's Brazilian partner Professor Horácio Schneider
01/10/2018
Leibniz Centre for Tropical Marine Research (ZMT) successful in audit working life and family
28/09/2018
Tropical coastlines: From global to local stressors
25/09/2018
REPICORE film: Visit to Fiji at the end of the ZMT project
24/09/2018
A virtual dive through coral reefs at Bremen's Research Mile
20/09/2018
Evaluating environmental risks differently: New event in ZMT's lecture series "Bremen Earth and Social Science Talks"
18/09/2018
Page 1 of 12
Start
Prev
1
2
3
4
... | https://www.leibniz-zmt.de/en/news-at-zmt/news/news-archive.html |
I used the 12.04 live cd to install Ubuntu over my Windows 7 partition and deleted everything so I just have Ubuntu on my laptop. But since during the installer I chose the simple “erase entire disk” option, did the installer create a swap partition or is that something I should’ve done with the “something else” option? Btw I have 6GB of RAM
Here is Solutions:
We have many solutions to this problem, But we recommend you to use the first solution because it is tested & true solution that will 100% work for you.
Solution 1
Easy, graphical way to check with Disk Utility
-
Open Disk Utility from the Dash:
-
In the left column, look for the words "Hard Disk", and click on that:
-
In the right column, see if you can find "Swap" as shown. If so, you have swap enabled; you can click on that portion to see details. It will look something like this:
Alternately, open a terminal with
Ctrl+Alt+T, and type
swapon -s; if you see a line like the below, with statistics, swap is enabled:
Solution 2
In terminal, type:
free -m
If you happen to have swap, you will see how much swap memory you have left.
Solution 3
Use
cat /proc/swaps
In addition to the size, it will tell the type of swap (partition/file).
It appears to give exactly the same output as
swapon -s (posted here, but apparently deprecated).
Or
cat /etc/fstab
which will not give you the correct info in the (unusual) case of a swap added manually, as per comment by Carlo Wood.
Solution 4
I’d use this method to verify presence of a swap partition
Open a terminal with CTRL + ALT + T and type
sudo blkid | grep swap
If you see an entry with
TYPE="swap", be sure that, you have a swap partition.
My output is like below: You can see that
/dev/sda7 is a swap partition.
/dev/sda7: UUID="4656a2a6-4de0-417b-9d08-c4a5b807f8dd" TYPE="swap"
The Installer should create a swap partition automatically. And also note that, You may never need a swap partition, unless you use "Hibernation" feature or use many more applications at a time. You can check these interesting question about swap size
I have 16GB RAM. Do I need 32GB swap?
what is SWAP and how large a swap partition should I create?
If it happens that, You did not create a swap partition, check this question for a help
Solution 5
Do
lsblk and check for SWAP near the end.
In simple terms,
lsblk | grep SWAP
output:
├─sdb2 8:18 0 7.6G 0 part [SWAP]
If you’re not familiar with
lsblk,
lsblk lists partitions , their mountpoint, their size etc.
Solution 6
Open gparted in a terminal:
sudo gparted
It will show all the partitions, you can see if you have a swap or not.
You will also be able to ‘swapon’ or ‘swapoff’ with gparted.
Solution 7
You could use
gparted as told in the previous post to see all the partitions including swap on your system.
gparted comes along with the LiveCD but you’ll need to install it if you’re not using the LiveCD. The command to do that is
sudo apt-get update && sudo apt-get install gparted
Alternatively, you could also use
sudo fdisk -l from the terminal to take a look at all the partitions.
[email protected]:~$ sudo fdisk -l Disk /dev/sda: 500.1 GB, 500107862016 bytes 255 heads, 63 sectors/track, 60801 cylinders, total 976773168 sectors Units = sectors of 1 * 512 = 512 bytes Sector size (logical/physical): 512 bytes / 512 bytes I/O size (minimum/optimal): 512 bytes / 512 bytes Disk identifier: 0x27edc0d3 Device Boot Start End Blocks Id System /dev/sda1 * 2048 206847 102400 7 HPFS/NTFS/exFAT /dev/sda2 206848 188743679 94268416 7 HPFS/NTFS/exFAT /dev/sda3 224569342 976771071 376100865 5 Extended /dev/sda4 188743680 224567295 17911808 83 Linux /dev/sda5 224569344 434284543 104857600 7 HPFS/NTFS/exFAT /dev/sda6 434286592 644001791 104857600 83 Linux /dev/sda7 644003840 684001279 19998720 83 Linux /dev/sda8 684003328 704002047 9999360 83 Linux /dev/sda9 804003840 972767231 84381696 83 Linux /dev/sda10 704004096 744001535 19998720 83 Linux /dev/sda11 744003584 803987455 29991936 83 Linux /dev/sda12 972769280 976771071 2000896 82 Linux swap / Solaris Partition table entries are not in disk order
The line stating the FileSystem type as Linux Swap/ Solaris is the Swap partition (in my case the last line). You could also peek into your
/etc/fstab file to see if swap is enabled by default on boot. If it was created during installation, you’ll almost always find it here.
[email protected]:~$ cat /etc/fstab | grep -i swap # swap was on /dev/sda12 during installation UUID=5604929a-9d9e-4ab0-907f-b9479a3b55e5 none swap sw 0 0
Solution 8
The default install creates a SWAP partition, Open system monitor from dash home and resources tab as an alternate way to verify. Something else allows you to do more extensive partitioning if desired.
Note: Use and implement solution 1 because this method fully tested our system. | https://zerosprites.com/ubuntu/how-do-i-find-out-if-i-have-a-swap-partition-on-my-hard-drive/ |
Presentation is loading. Please wait.
Published byLinette Richards Modified over 6 years ago
1
E-field calculations for the TPC/HBD N. Smirnov Upgrade Working Group Meeting 05/13/03, BNL.
2
100 MeV e - 20 cm 55 cm 70 cm CsI Photocathode Fast, Compact TPC with enhanced electron ID capabilities 2 x 55. cm 16 identical modules with 35 pad-rows, double (triple) GEM readout with pad size: 0.2x1. cm². Maximum drift: 40-45 cm. “Working” gas: fast, low diffusion, good UV transparency.
3
miniTPC module, proposed variant 16 identical miniTPC modules with the Drift distance 48. cm and its own Field Cage Common gas volume with double windows “working” gas – CH4, but another gases (mixtures) will be studied to select the best and convenient one. Shape: trapezoid, Cathode: Kapton or Mylar Field Cage: Kapton or Mylar with printed strip structure (for bottom and sides, wires for a top) N of Pad-rows: 35 Pad dimention: 1.x0.2 cm2 All construction (support) elements: low mass composites material like STESALIT. 5400 readout channels / module 86500 / Detector Anode (Gas amplification, ReadOut): microPattern Gas Detector(s) with Printed pad structure on Kapton or Mylar ( GEM, microMeGas,…)
4
Points should be checked Low mass construction “good” quality of Electric Field “work together” with Cherenkov Detector Simulation: to demonstrate that the construction approach is “reasonable” Full scale prototype: real answer
5
MAXWELL and GARFIELD were used to simulate an Electric Field Cathode Anode +/- 20 cm 80 strips, 3 mm width, 5 mm step. Cathode, 36 kV 30 cm 10 cm 40 cm Y X 5 mm
6
2D MAXWELL Ex / Ey / y x x y Ex / = 916 V/cm
7
GARFIELD, “wires on a top” variant. Comparison with MAXWELL Ex / Ey / Y Y GARFIELD; MAXWELL Strip side wire side
8
Cherenkov Detector E-field 30 cm mini TPC field cage wires 3 mm 5 cm -36 kV0. V + 75. V wire plane with 5 mm step
9
Cherenkov Detector E-field Ex, V/cm y x x y Ey, V/cm
10
Status and future steps It looks not so bad We are going to continue the simulation ( with FANLAB may be) But the prototype is the crucial step.
Similar presentations
© 2021 SlidePlayer.com Inc.
All rights reserved. | https://slideplayer.com/slide/4751030/ |
Please enable cookies in your browser to experience all the personalized features of this site, including the ability to apply for a job.
Welcome page
Job Listings
Click column header to sort
Here are our current job openings. Please click on the job title for more information, and apply from that page if you are interested.
Sort By...
Sort By...
Requisition ID
(Ascending)
Requisition ID
(Descending)
Title
(Ascending)
Title
(Descending)
Posted Date
(Ascending)
Posted Date
(Descending)
Job Description
(Ascending)
Job Description
(Descending)
Search Results Page 70 of 256
Job Locations
USA-MA-Westwood
Posted Date
1 month ago
(6/14/2019 2:17 PM)
Title
Accountant
GDIT is currently seeking an Accountant in Westwood, MA to join our team. In this role you will be part of the Accounts Receivable Department and performing analysis tasks that are currently performed by the AR Manager and AR Supervisor by contributing to the customer service activities we provide to our internal customers and management. Task and responsibilities in this role include, but are not limited to the following: - Keep track of the overpayments and short payments made in order to send out a monthly report to the user community. - Keep track of all credit invoices created and the reason for them and send this out monthly to the user community for comments. - Post cash in Oracle as required. - Respond and resolve service tickets received in the SCSM system. - Assist with researching and resolving unapplied payments that have been received. - Be responsible for IDI’s that need to be paid off in AR.
Requisition ID
2019-59757
Job Locations
USA-MD-Baltimore
Posted Date
1 month ago
(6/14/2019 2:28 PM)
Title
Full Stack Developer
GDIT is actively pursuing an immediate opportunity to continue the modernization of the Provider Enrollment Chain of Ownership System (PECOS) for the Centers for Medicare & Medicaid Services (CMS). If awarded, GDIT will implement CMS’s new vision of PECOS modernization efforts, with a heavy emphasis on ensuring that the end-user experience for provider and administrators meets the high standards set by Medicare, America’s most popular healthcare brand. GDIT is seeking truly knowledgeable talent that understand the provider lifecycle, are knowledgeable with the data structures and are highly skilled in their technical execution. Position Description This position will support the Centers for Medicare and Medicaid Services (CMS) PECOS 2.0 redesign. The ideal candidate will promote high quality, use of best practices and an outstanding user experience (UX). The Full Stack Developer will independently identify and resolve UX pain points, will stay current with regard to PECOS/web technology and will require minimal management direction/supervision. Role and Responsibilities · Actively participate in the entire application lifecycle · Elicit and fulfill front-end and back-end requirements · Develop functional and fast-responsive web applications, using markup languages · Enhance/leverage mobile-based and web-based features · Troubleshoot UI and ensure optimal performance · Fix bugs and improve usability · Employ the latest technology to re-build legacy apps · Perform training and support development activities · Utilize/promote best practices, including reusable code
Requisition ID
2019-59754
Job Locations
GBR-Menwith Hill
Posted Date
1 month ago
(6/18/2019 7:55 AM)
Title
Security Assistant - TS/SCI w/poly
**Position requires an in-scope TS/SCI clearance and polygraph.** The Security Administrative Specialist provides support to the Office of Security and Counterintelligence (OS&CI) senior managers in areas of division and operational administrative security functions. The services shall support the offices of the agency and others as required. Tasks - Maintain tracking records and filing systems; archives files as necessary - Recommend new administrative support processes - Execute agency and local Directorate/Office security in and out processing requirements - Issue security related equipment; records; receipts; or supplies - Maintain a schedule of appointments for a manager or offices - Schedule polygraph testing - Answer security related telephone calls; directs calls to the appropriate branch or office; and take messages - Research; records; and reports statistical analysis for historical and planning purposes - Provide security support for passing; verifying; and receiving clearances; confirming Sensitive Compartmented Information (SCI) security eligibility; processing visitor requests; processing requests for agency Badges; and processing Visit Certifications and Perm Certifications - Update security data; run inquiries; provide quality control; develop reports using various IC and/or DoD databases - Provide support coordinating; tasking and managing security action responses from internal agency; other Government; and industry organizations - Maintain and update appropriate security related databases - Provide administrative/customer support duties for access control and physical security support to the agency Headquarter buildings - Issue and manage badges for Headquarters personnel and visitors - Update data; provide quality control; run reports; and use the Monitor Dynamics Inc. system and Lenel Systems for proper badging; Visit Request and Badging System (VRBS); Access Polygraph Investigative Collection System (APICS); and others as needed - Process certifications for access via fax; email; electronic message format and IC databases for visitors' access for daily visit or multiple visits up to one year - Assist with badge issues; provide visitors information support; directions and assist in contacting visitor POC - Assist with onboarding and out-processing of personnel to include badge creation for new personnel and badge destruction for departed personnel as well as assist in updating accesses for personnel - Assist in the set-up and conduct of the weekly briefing for new personnel introduction to the agency - Provide guidance and assist with security specific needs for office renovations and move management activities; such as; but not limited to; review of furniture for classified information; review of facilities for SCI Facility requirements; working with facilities and communication personnel to assist in defining requirements; scheduling moves; etc. - Assist with work pertaining to the procurement; inventory control; and destruction of cryptographic material utilized by the agency - Serve as an OS&CI Custodial Property Officer tracking security related equipment and accountable property for the respective branches - Conduct security in-briefings and de-briefings related to security compartmented programs and office specific programs - Support field offices; including polygraph; to include generating tasking lists; providing program and personnel security requests for examinations - Interface in person and telephonically with outside federal agencies; requesting reports; referring and scheduling examinations; and answering general questions about the agency polygraph program - Work with agency Program Security Officers to process requests for examinations; gather or provide information about prospective examinees - Research; record; and report population statistical data for analysis and planning purposes of operational polygraph travel missions - Collect; interpret; and produce weekly; monthly and yearly branch reports and statistics which includes multiple data reports from APICS - Schedule; organize; and prepare read-aheads for the adjudication board and log/prepare all customer correspondence packages from the branch for mailing - Provide administrative support for case tracking and provide monthly reports to management - Coordinate logistics for off-site locations; provide logistical class configurations and reproduction of course materials - Update and archive student training records with OS&CI provided courses - Participates in special projects as required. This role is not yet funded
Requisition ID
2019-59752
Job Locations
USA-FL-Panama City
Posted Date
1 month ago
(6/17/2019 9:58 AM)
Title
Electronics Technician
Performs production assembly operations on electronic or electro-mechanical components or subassemblies. 1. Performs a wide variety of electronic and electromechanical subassembly and assembly operations to build up and assemble complex units such as power supplies, modules, chassis drawers, cable harnesses, PC boards, electronic systems, and subassemblies. 2. Uses visual aids, wiring lists, schematics, blueprints, and verbal and written instructions to assemble, modify, rework or reassemble units. 3. Identifies and selects components to be integrated into subassembly and assembly units. 4. Makes own set-ups, alignments, and adjustments, maintaining tolerance in accordance with instructions. 5. Disassembles, modifies, reworks, refurbishes, reassembles, and tests units as required. 6. Identifies failure trends and reports results. 7. May provide guidance and work leadership to lessexperienced assemblers. 8. Participates in special projects as required. Desired prior experience: - Experience with handheld electronics equipment, specifically underwater navigation equipment - Experience performing preventive and corrective maintenance on underwater equipment - Experience conducting maintenance or operator training of other electronics technicians and end users - Experience in either the Explosive Ordnance Disposal (EOD) or Naval Special Warfare (NSW) communities - 5-10 years’ military experience
Requisition ID
2019-59749
Job Locations
USA-VA-Chantilly
Posted Date
1 month ago
(6/18/2019 9:51 PM)
Title
Security Control Assessor III w/ Active TS/SCI with Polygraph
**Position requires an active in-scope TS/SCI clearance and polygraph.** Position Overview The Security Control Assessor (SCA) is the Information Assurance (IA) Independent Validation and Verification (IV&V) role in the Risk Management Framework (RMF) workflow. The SCA role requires an IA professional with in-depth system security knowledge and skills to provide Assessment & Authorization (A&A) support throughout a systems lifecycle. The SCA conducts full and partial assessments of security controls implemented on customer owned and sponsored Information System’s (IS), enhances IS security awareness of Directorates & Offices’ staff, ensures proper IS security resources are appropriately applied as well as acts as IS liaison between the Directorates & Offices and the Government. Responsibilities: - Review information systems for compliance with applicable DCID, ICD, and directives and guidance - Provide IS security advice and guidance in accordance with applicable DCID, ICD, and directives and guidance to Government and industry partners for the protection of data at all classification levels including SCI - Provide IS technical guidance and support in preparing responses for USG approval to A&A questions asked by Government and industry partners; - Evaluate and recommend approval, disapproval, or waiver(s) for IS processing national security data at industry and/or Government facilities - Support development and implementation of directives and guidance for Information Assurance, Information Technology, and Information Management policies - Provide input for consideration in the promulgation of future IS security policy - Support and/or conduct site visits and assessments to inspect and verify IS reports and plans at industrial and Government locations as approved by the Government, and provide a written report for review and approval by the USG; - Track completion of the Security Assessment Package and report status; - Support the preparation of the Security Assessment Report (SAR). The SAR contents include, but is not limited to the, Summary of Assessment results and Authorization Recommendation; - Review, coordinate, and respond to IS security issues as requested by the Government; - Perform short term (less than 90 days) CONUS and OCONUS travel to conduct site security inspections when approved by the Government; - Provide A&A support to the Government for the protection of special programs and tactical operations related activities. - Participates in special projects as required
Requisition ID
2019-59747
Job Locations
USA-VA-Falls Church | USA-MD-Towson
Posted Date
4 weeks ago
(6/21/2019 12:31 PM)
Title
Microsoft .Net-Software Developer Sr Advisor (Remote)
GDIT is seeking an experienced software application developer with healthcare related practice management application experience to join a dynamic team supporting modernization and enhancements for a Federal healthcare delivery system. Researches; designs; develops and/or modifies enterprise-wide systems and/or applications software. Designs; develops; codes; tests; and debugs complex new software products; or makes significant enhancements to existing software.Researches and integrates design strategies; product specifications; development schedules; and user expectations into product capabilities.Resolves complex hardware/software compatibility and interface design considerations.Conducts investigations and tests of considerable complexity.Researches emerging technologies to determine impact on application execution.Provides input to staff involved in writing and updating technical documentation such as user manuals; system documentation; and training materials.Troubleshoots complex problems and provides customer support for software operating systems and application issues.Advises hardware engineers on machine characteristics that affect software systems; such as storage capacity; processing speed; and input/output requirements.Prepares reports on analyses; findings; and project progress.Provides guidance and work leadership to less-experienced software engineers.May serve as a technical team or task leader.Maintains current knowledge of relevant technology as assigned.Participates in special projects as required.
Requisition ID
2019-59745
Job Locations
USA-PA-Philadelphia
Posted Date
1 month ago
(6/14/2019 12:16 PM)
Title
Full Stack Software Developer
Researches, designs, develops, and/or modifies enterprise-wide systems and/or applications software.
Requisition ID
2019-59744
Job Locations
USA-VA-Alexandria
Posted Date
4 weeks ago
(6/20/2019 1:53 PM)
Title
Information Security Analyst Senior - TS/SCI - Alexandria,VA
Information Security Analyst Senior TS/SCI Clearance Alexandria,VA US Battlefield Information Collection and Exploitation System eXtended (US BICES-X) is a cutting edge program supporting DoD intelligence information sharing on current and emerging global threats to mission and coalition partners and emerging nations. With an internationally dispersed team supporting each combatant command, the US BICES-X team is in direct support of the war fighter and their missions. We are seeking a creative and driven professional with a passion for solving real world issues on a cross-functional, fast paced team. 1. Performs all procedures necessary to ensure the safety of information systems assets and to protect systems from intentional or inadvertent access or destruction. 2. Performs Cybersecurity activities (formally known as IA - Information Assurance) for a large program; coordinates with government Program staff, USAF, and other government agencies to assist in the creation, dissemination, direction, and auditing of program policy, standards, and operating procedures. 3. Utilize available resources to conduct Cybersecurity activities, and report to senior GDIT and government personnel on overall program security posture. 4. Conduct network and system audits for vulnerabilities using Security Technical Implementation Guides (STIGs), ACAS vulnerability scanner, and DISA SCAP to mitigate those findings for Solaris, Linux, Windows, and associated network operating systems. 5. Ability to create, track and review Plan of Action and Milestones (POA&Ms) and conduct solution identification to assist in problem remediation and resolution. 6. Communicate tactical and strategic threat information to Government leaders, Cybersecurity-Ops and A&A (formerly C&A) Staff to assist them in making cyber risk decisions and to mitigate threats. 7. Carries out DoD Risk Management Framework (RMF) in accordance with DoD 8510 to ascertain information systems' security posture by utilizing security control validation activities and coordinating security testing. 8. Maintain the Security Accreditation status, including system documentation of multiple DoD classified networks and interconnected systems 9. Coordinates with OUSDI, USAF, DISA, and other organizations in support of audits and inspections and provides all necessary documentation as required for SAVs, ST&Es, and CCRI 10. Evaluate firewall change requests and assess organizational risk. 11. Communicates alerts to agencies regarding intrusions and compromises to their network infrastructure, applications and operating systems. 12. Assists with implementation of counter-measures or mitigating controls. 13. Ensures the integrity and protection of networks, systems, and applications by technical enforcement of organizational security policies, through monitoring of vulnerability scanning devices. 14. Performs periodic and on-demand system audits and vulnerability assessments, including user accounts, application access, file system and external Web integrity scans to determine compliance. 15. Provides guidance and work leadership to less-experienced technical staff members. 16. Maintains current knowledge of relevant technology as assigned. 17. Participates in special projects as required.
Requisition ID
2019-59742
Job Locations
USA-VA-McLean
Posted Date
1 month ago
(6/18/2019 9:32 AM)
Title
Financial Intelligence Targeting - TS/SCI w/ Poly Required
Required: • Experience identifying valid threat targets across various mission AORs and conducting all-source target analysis using multiple tools and databases; minimum of one year experience with IC targeting tools • Ability to prepare messages on targets and communicate results through the preparation of targeting packages. • Demonstrated experience with customer targeting Desired: • Bachelor’s Degree or higher in accounting, business, economics or finance (preferred) or demonstrate strong understanding of global finance through experience or knowledge • Demonstrated experience using customer messaging system • Minimum of one year of experience working with foreign partners. • Minimum of one year of experience providing training or giving presentations to foreign partners.
Requisition ID
2019-59736
Job Locations
USA-GA-Ft Gordon
Posted Date
2 weeks ago
(7/2/2019 2:44 PM)
Title
Hardware Support/Maintenance Technician - TS/SCI required
Contract: I2TS3 Hardware Support/Maintenance Technician (L3) GENERAL SUMMARY: GDIT is seeking candidates to support the US Army Intelligence and Security Command (INSCOM). Under the I2TS 3 task order, INSCOM ensures reliable, uninterrupted availability of Command, Control, Communications, Computers, and Information Management (C4IM) including: networks, hardware, software, engineering, and specialized tools at the point of customer need to support INSCOM's mission. INSCOM and its MSCs provide the enabling layer to connect the Army and its tactical formations to defense and national intelligence agencies via tactical networks. The ability to provide mission critical intelligence is dependent on the successful use of its information technology (IT) networks worldwide. Principal Duties and Responsibilities: An I2TS 3 Hardware Support/Maintenance Technician: · Conducts hardware maintenance and minor installations on equipment listed in the specified task order and understands the inter-operational relationships of all components to the extent required to perform maintenance services · Undertakes minor system tasks (e.g., loading software, rebooting systems) in support of hardware maintenance and operations functions · Installs and incorporates new releases, updates, or other changes to COTS hardware and software (diagnostics failures or potential failure predictions) · Operates and applies automated hardware management and diagnostics systems (to include remote management and diagnostics) and interprets findings to maintain, repair, or upgrade hardware · Plans, executes, and provides recommendations for preventative maintenance as approved by government personnel · Provides recommendations on spares, spares program, planning, and tracking operational spares and bench stock · Provides technical assistance to responding field service personnel · Assists in repairing computers, printers, digital senders, etc. Desirable Skills / Experience: - Perform STIGs & IAVA implementation for system devices, perform imaging of systems, CERP replacement, etc. - Ability to interact with customers on a daily basis providing guidance and procedures concerning account requests, e-mail, home directories, file access/storage, local procedures, etc. as required to ensure mission success - Perform Level I/II Active Directory functions such as unlocking accounts, creating and issuing accounts, etc. Certification(s): - DoD 8570.01-M IAT Level II Computing Environment (CE) Certification as determined by the Program Manager is required prior to support on contract - Required Security Environment Certification: CompTIA Security+ CE or equivalent - Computing Environment certification: MTA 98-349, Windows Operating System Fundamentals Security Clearance: - TS/SCI required Additional: - Candidates must be willing and able to attain a CI Polygraph for certain positions as determined by the contract - Position may require lifting of objects (i.e. IT Hardware), reaching/bending/kneeling (i.e. plug in cables) and other moderately strenuous activity
Requisition ID
2019-59735
First page of results
First
Previous page of results
Page
1
of 256
Page
2
of 256
Page
3
of 256
Page
4
of 256
Page
5
of 256
Page
6
of 256
Page
7
of 256
Page
8
of 256
Page
9
of 256
Page
10
of 256
Page
11
of 256
Page
12
of 256
Page
13
of 256
Page
14
of 256
Page
15
of 256
Page
16
of 256
Page
17
of 256
Page
18
of 256
Page
19
of 256
Page
20
of 256
Page
21
of 256
Page
22
of 256
Page
23
of 256
Page
24
of 256
Page
25
of 256
Page
26
of 256
Page
27
of 256
Page
28
of 256
Page
29
of 256
Page
30
of 256
Page
31
of 256
Page
32
of 256
Page
33
of 256
Page
34
of 256
Page
35
of 256
Page
36
of 256
Page
37
of 256
Page
38
of 256
Page
39
of 256
Page
40
of 256
Page
41
of 256
Page
42
of 256
Page
43
of 256
Page
44
of 256
Page
45
of 256
Page
46
of 256
Page
47
of 256
Page
48
of 256
Page
49
of 256
Page
50
of 256
Page
51
of 256
Page
52
of 256
Page
53
of 256
Page
54
of 256
Page
55
of 256
Page
56
of 256
Page
57
of 256
Page
58
of 256
Page
59
of 256
Page
60
of 256
Page
61
of 256
Page
62
of 256
Page
63
of 256
Page
64
of 256
Page
65
of 256
Page
66
of 256
Page
67
of 256
Page
68
of 256
Page
69
of 256
Page
70
of 256 , Current Page
Page
71
of 256
Page
72
of 256
Page
73
of 256
Page
74
of 256
Page
75
of 256
Page
76
of 256
Page
77
of 256
Page
78
of 256
Page
79
of 256
Page
80
of 256
Page
81
of 256
Page
82
of 256
Page
83
of 256
Page
84
of 256
Page
85
of 256
Page
86
of 256
Page
87
of 256
Page
88
of 256
Page
89
of 256
Page
90
of 256
Page
91
of 256
Page
92
of 256
Page
93
of 256
Page
94
of 256
Page
95
of 256
Page
96
of 256
Page
97
of 256
Page
98
of 256
Page
99
of 256
Page
100
of 256
Page
101
of 256
Page
102
of 256
Page
103
of 256
Page
104
of 256
Page
105
of 256
Page
106
of 256
Page
107
of 256
Page
108
of 256
Page
109
of 256
Page
110
of 256
Page
111
of 256
Page
112
of 256
Page
113
of 256
Page
114
of 256
Page
115
of 256
Page
116
of 256
Page
117
of 256
Page
118
of 256
Page
119
of 256
Page
120
of 256
Page
121
of 256
Page
122
of 256
Page
123
of 256
Page
124
of 256
Page
125
of 256
Page
126
of 256
Page
127
of 256
Page
128
of 256
Page
129
of 256
Page
130
of 256
Page
131
of 256
Page
132
of 256
Page
133
of 256
Page
134
of 256
Page
135
of 256
Page
136
of 256
Page
137
of 256
Page
138
of 256
Page
139
of 256
Page
140
of 256
Page
141
of 256
Page
142
of 256
Page
143
of 256
Page
144
of 256
Page
145
of 256
Page
146
of 256
Page
147
of 256
Page
148
of 256
Page
149
of 256
Page
150
of 256
Page
151
of 256
Page
152
of 256
Page
153
of 256
Page
154
of 256
Page
155
of 256
Page
156
of 256
Page
157
of 256
Page
158
of 256
Page
159
of 256
Page
160
of 256
Page
161
of 256
Page
162
of 256
Page
163
of 256
Page
164
of 256
Page
165
of 256
Page
166
of 256
Page
167
of 256
Page
168
of 256
Page
169
of 256
Page
170
of 256
Page
171
of 256
Page
172
of 256
Page
173
of 256
Page
174
of 256
Page
175
of 256
Page
176
of 256
Page
177
of 256
Page
178
of 256
Page
179
of 256
Page
180
of 256
Page
181
of 256
Page
182
of 256
Page
183
of 256
Page
184
of 256
Page
185
of 256
Page
186
of 256
Page
187
of 256
Page
188
of 256
Page
189
of 256
Page
190
of 256
Page
191
of 256
Page
192
of 256
Page
193
of 256
Page
194
of 256
Page
195
of 256
Page
196
of 256
Page
197
of 256
Page
198
of 256
Page
199
of 256
Page
200
of 256
Page
201
of 256
Page
202
of 256
Page
203
of 256
Page
204
of 256
Page
205
of 256
Page
206
of 256
Page
207
of 256
Page
208
of 256
Page
209
of 256
Page
210
of 256
Page
211
of 256
Page
212
of 256
Page
213
of 256
Page
214
of 256
Page
215
of 256
Page
216
of 256
Page
217
of 256
Page
218
of 256
Page
219
of 256
Page
220
of 256
Page
221
of 256
Page
222
of 256
Page
223
of 256
Page
224
of 256
Page
225
of 256
Page
226
of 256
Page
227
of 256
Page
228
of 256
Page
229
of 256
Page
230
of 256
Page
231
of 256
Page
232
of 256
Page
233
of 256
Page
234
of 256
Page
235
of 256
Page
236
of 256
Page
237
of 256
Page
238
of 256
Page
239
of 256
Page
240
of 256
Page
241
of 256
Page
242
of 256
Page
243
of 256
Page
244
of 256
Page
245
of 256
Page
246
of 256
Page
247
of 256
Page
248
of 256
Page
249
of 256
Page
250
of 256
Page
251
of 256
Page
252
of 256
Page
253
of 256
Page
254
of 256
Page
255
of 256
Page
256
of 256
Next page of results
Last page of results
Last
Use this form to perform another job search
The system cannot access your location for 1 of 2 reasons:
Permission to access your location has been denied. Please reload the page and allow the browser to access your location information.
Your location information has yet to be received. Please wait a moment then hit [Search] again.
Start your job search here
Job Function
(All)
Administration
Business Development
Contact Center Operations
Executives
Finance
Human Resources
Information Technology
Intelligence
Intern
Mechanical Production
Medical Support
Program Management
SCA
Science and Engineering
Supply Chain Management
Technical Operations (TechOps)
Location
(All)
AFG-Bagram
AFG-Kabul
AFG-Kandahar
AFG-VA-Bagram
ARE
ARE-Abu Dhabi
AUS-Alice Springs
BEL-Mons
DEU-Darmstadt
DEU-Garmisch
DEU-Hohenfels
DEU-Kaiserslautern
DEU-Stuttgart
DEU-WIESBADEN
GBR-Menwith Hill
GBR-Mildenhall
GBR-Cambridgeshire-Molesworth
GRL-Thule AB
IRQ-Al Asad
IRQ-Baghdad
IRQ-Balad Air Base
IRQ-Erbil Airfield
ITA-Vicenza
JOR
JPN
JPN-Fussa
JPN-Kanagawa-Ken
JPN-Tokyo
KOR-Pyongtaek
KWT-Al Jaber Air Base
KWT-Farwaniya
KWT-Kuwait City
QAT-Doha
USA
USA-AK-Ft Richardson
USA-AK-Ft Wainwright
USA-AK-Joint Base Elmendorf Richardso
USA-AL-Ft Rucker
USA-AL-Huntsville
USA-AL-Maxwell AFB-Gunter Annex
USA-AL-Montgomery
USA-AZ-Ft Huachuca
USA-AZ-Phoenix
USA-AZ-Sierra Vista
USA-CA-China Lake
USA-CA-Chula Vista
USA-CA-Dublin
USA-CA-Edwards AFB
USA-CA-El Segundo
USA-CA-Ft Hunter Liggett
USA-CA-Livermore
USA-CA-Lockwood
USA-CA-Los Alamitos
USA-CA-Monterey
USA-CA-Point Mugu
USA-CA-Sacramento
USA-CA-San Diego
USA-CA-San Mateo
USA-CA-Seaside
USA-CA-Vallejo
USA-CA-Vandenberg AFB
USA-CO-Aurora
USA-CO-Colorado Springs
USA-CO-Denver
USA-CO-Ft Carson
USA-CO-Peterson AFB
USA-CO-Schriever AFB
USA-CT-Pawcatuck
USA-DC-Bolling AFB
USA-DC-Washington
USA-FL-Cape Canaveral
USA-FL-Doral
USA-FL-Eglin AFB
USA-FL-Fort Walton Beach
USA-FL-Hurlburt Field
USA-FL-Jacksonville
USA-FL-MacDill AFB
USA-FL-Mayport
USA-FL-Miami
USA-FL-North Miami Beach
USA-FL-Orlando
USA-FL-Panama City
USA-FL-Pensacola
USA-FL-Tampa
USA-FL-Tyndall AFB
USA-GA-Atlanta
USA-GA-Fort Gordon
USA-GA-Ft Benning
USA-GA-Ft Gordon
USA-GA-Ft Stewart
USA-GA-Glynco
USA-GA-Hunter AAF
USA-GA-Robins AFB
USA-HI-Camp HM Smith
USA-HI-Ft Shafter
USA-HI-Hickam AFB
USA-HI-Honolulu
USA-HI-Pearl Harbor
USA-HI-Schofield
USA-IA-Coralville
USA-IA-West Des Moines
USA-ID-Bayview
USA-ID-Pocatello
USA-IL-Chicago
USA-IL-Great Lakes
USA-IL-Scott AFB
USA-IN-Crane
USA-KS-Ft Riley
USA-KS-Ft. Leavenworth
USA-KS-Lawrence
USA-KS-Topeka
USA-KY-Corbin
USA-KY-Ft Campbell
USA-KY-Ft Knox
USA-KY-Louisville
USA-LA-New Orleans
USA-MA-Westwood
USA-MD-Aberdeen Proving Ground
USA-MD-Adelphi
USA-MD-Annapolis Junction
USA-MD-Baltimore
USA-MD-Beltsville
USA-MD-Bethesda
USA-MD-California
USA-MD-Frederick
USA-MD-Ft Detrick
USA-MD-Ft Meade
USA-MD-Germantown
USA-MD-JB Andrews
USA-MD-Landover
USA-MD-Lanham
USA-MD-Lexington Park
USA-MD-Linthicum
USA-MD-Patuxent River
USA-MD-Rockville
USA-MD-Silver Spring
USA-MD-Suitland
USA-MD-Towson
USA-MD-Windsor Mill
USA-MI-Grand Rapids
USA-MN-Eagan
USA-MO-Arnold
USA-MO-Kansas City
USA-MO-Lees Summit
USA-MO-St Louis
USA-MO-Whiteman AFB
USA-MS-Bay St. Louis
USA-MS-Hattiesburg
USA-MS-Stennis Space Center
USA-NC-Asheville
USA-NC-Camp Lejeune
USA-NC-Fayetteville
USA-NC-Ft Bragg
USA-NC-McLeansville
USA-NC-Raleigh
USA-ND-Minot AFB
USA-NE-Offutt AFB
USA-NE-Omaha
USA-NJ-Atlantic City
USA-NJ-Mt Laurel
USA-NM-Albuquerque
USA-NM-Cannon AFB
USA-NM-Las Cruces
USA-NV-Fallon
USA-NY-Ft Drum
USA-NY-Jamaica
USA-NY-New York
USA-NY-West Point
USA-OH-Columbus
USA-OH-Dayton
USA-OH-Wright Patterson AFB
USA-OK-Ft Sill
USA-OK-Oklahoma City
USA-PA-King of Prussia
USA-PA-Mechanicsburg
USA-PA-New Cumberland
USA-PA-Philadelphia
USA-PA-Wilkes-Barre
USA-RI-Middletown
USA-SC-North Charleston
USA-SC-Shaw AFB
USA-SC-Sumter
USA-TN-Knoxville
USA-TN-Memphis
USA-TX-Austin
USA-TX-Corpus Christi
USA-TX-Dallas
USA-TX-El Paso
USA-TX-Ft Hood
USA-TX-Ft Sam Houston
USA-TX-Ft Worth
USA-TX-Harlingen
USA-TX-Houston
USA-TX-Lackland AFB
USA-TX-San Antonio
USA-UT-Salt Lake City
USA-VA-Alexandria
USA-VA-Arlington
USA-VA-Ashburn
USA-VA-Chantilly
USA-VA-Charlottesville
USA-VA-Chesapeake
USA-VA-Dahlgren
USA-VA-Dam Neck
USA-VA-Dulles
USA-VA-Fairfax
USA-VA-Falls Church
USA-VA-Ft Belvoir
USA-VA-Hampton
USA-VA-Herndon
USA-VA-Langley AFB
USA-VA-Lorton
USA-VA-McLean
USA-VA-Merrifield
USA-VA-Newington
USA-VA-Newport News
USA-VA-Norfolk
USA-VA-Portsmouth
USA-VA-Quantico
USA-VA-Reston
USA-VA-Richmond
USA-VA-Springfield
USA-VA-Sterling
USA-VA-Suffolk
USA-VA-Tidewater
USA-VA-Virginia Beach
USA-VA-Wallops Island
USA-VA-Warrenton
USA-WA-Keyport
USA-WA-SeaTac
USA-WA-Seattle
USA-WV-Clarksburg
USA-WV-Fairmont
One additional field has been created
Two additional fields have been created
One field has been collapsed
Two fields have been collapsed
Zip Code
Find jobs within (miles)
5
10
15
20
25
35
50
75
100
150
200
Accessibility and Accommodations
For Individuals with Disabilities, Medical Conditions, or Physical or Mental Impairments: General Dynamics IT is committed to ensuring that our employment process is open to all individuals. General Dynamics IT provides reasonable accommodations to individuals who need assistance during any part of the employment process due to a disability, medical condition, or physical or mental impairment. Reasonable accommodations are considered on a case-by-case basis.
• If you need assistance to navigate General Dynamics IT's Careers website or to apply for a position, please send an email to [email protected] or call 703-995-3003. Please provide your contact information and let us know how we can assist you.
• If you are selected for further consideration and need an accommodation for any part of the application or interview process, please notify your Recruiting Representative. Please note that this email address and/or phone number should only be used for inquiries concerning a request for accommodation. All other inquiries should be sent to [email protected]
Click here
to see your rights under the Family Medical Leave Act.
Click here
for a summary of your equal employment opportunity rights on the "EEO is the Law" poster.
Click here
to view the Pay Transparency Policy Statement
GDIT participates in E-Verify.
Download the PDF for more details
GDIT participa en E-Verify.
Descargue el PDF para más detalles.
General Dynamics Information Technology is an Equal Opportunity and Affirmative Action Employer. We welcome and encourage diversity in our workforce. It is the policy of General Dynamics IT to provide equal employment opportunity to all employees and qualified applicants without regard to race, color, religion, national origin, sex, age, disability, pregnancy, sexual orientation, gender identity, transgender status, genetic information, protected veteran status, or any other protected characteristic under federal, state or local laws. We invite and encourage former employees to explore new opportunities with us. Rejoining the company can enhance newly acquired skills and build on the strong fundamental skills developed at General Dynamics. Employees that return to the company may be eligible for reinstatement of some benefits based on total years of service. | https://hub-gdit.icims.com/jobs/search?pr=69&schemaId=&o= |
The genesis of this set of artwork goes as far back as 1976, when London's JPL Gallery distributed a standard deck of playing cards among 54 of the leading lights of contemporary British art, including Howard Hodgkin, John Hoyland, Patrick Heron, Allen Jones, Maggie Hambling, and David Hockney. The gallery asked each artist to produce their own, distinctive version of the card they received, ultimately creating a new and completely unique pack.
Exhibited in London as The Deck of Cards, the full collection was purchased by Anthony Jones and toured to over 20 countries courtesy the British Council. The works were eventually published as a functional pack of cards, copies of which continue to be sold all over the world. To commemorate the 40th anniversary of this project last year, the British Council repeated the exercise, however this time, they chose 54 Indian artists.
The resulting collection of original works, titled Taash ke Patte (Deck of Cards), serves as a mini-survey of modern and contemporary Indian art. In 2016, Taash ke Patte was exhibited alongside the original 1976 Deck of Cards at the British Council.
Christie's South Asian Modern + Contemporary Art sale goes live on May 25 in London. As a special preview Indian Art specialist Nishad Avari spotlights seven key works from the deck, the complete list will be made available on May 25. | https://www.architecturaldigest.in/content/satte-pe-satta-nishad-avari-shares-highlights/ |
Better Homes and Gardens Holiday Baking magazine: Chocolate-Cashew Bread
Another quick bread from the Better Homes and Gardens Holiday Baking magazine. This one is drizzled with chocolate and sprinkled with chopped cashews; it looks lovely and tastes delicious.
The recipe can also be made with hazelnuts. A quibble with the magazine: the recipe doesn't specify what type of cashews to use. Roasted-salted? Unsalted? No hints are given, so I assumed that roasted-salted nuts would be fine. They tasted good in the bread, but I'm curious about the recipe's "cashews or hazelnuts" choice. If we're to assume that roasted cashews are what's called for, then should the hazelnuts also be roasted? It sounds logical to me, but this is a call you'll have to make for yourself, because the editors of Holiday Baking aren't saying. If you decide to use hazelnuts, toast them in a 350 degree oven for about 5 minutes, or until they start to turn golden.
A note about cooking times: the magazine's cooking times were slightly longer than mine for both this loaf and the Eggnog Quick Bread. I've reduced the times from what the magazine indicates, but you may need to cook the loaves for slightly longer than I've indicated. Just keep checking every couple of minutes, until a toothpick comes out clean.
Prep Time: 15 minutes
Cook Time: 45 to 50 minutes
Yield: 1 loaf, about 12 servings
1/2 cup sugar
1 Tbsp baking powder
1/2 tsp salt
1 egg
3/4 cup milk
1/2 cup oil (vegetable, safflower, canola, etc.)
1 1/3 cups semisweet chocolate chips
1 cup chopped cashews or hazelnuts
1/2 tsp shortening
Coarsely chopped cashews or hazelnuts, optional
Preheat the oven to 350 degrees. Grease the bottom and 1/2 inch up the sides of an 8-by-4-by-2-inch loaf pan.
In a large bowl, combine the flour, sugar, baking powder, and salt. Make a well in the center of the mixture and set aside.
In a medium bowl, combine the egg, milk, and oil. Stir well to combine. Add egg mixture to flour mixture. Stir just until moistened (batter will be lumpy). Fold in 1 cup of the chocolate chips and the 1 cup of cashews.
Spoon the batter into the prepared pan, spreading evenly. Bake for 45 to 50 minutes, or until a wooden toothpick inserted in the center of the loaf comes out clean.
Cool in the pan on a wire rack for 10 minutes. Remove from the pan and continue to cool on the rack. Before serving, combine remaining 1/3 cup of chocolate chips and the 1/2 tsp of shortening in a small saucepan. Stir over low heat until smooth. Drizzle the chocolate mixture over the loaf, and if desired, sprinkle with additional chopped nuts. Let stand until chocolate is set. | https://www.cornercooks.com/archives/2005/11/better_homes_an.html |
Painted trillium is an herbaceous, long-lived, woodland, perennial wildflower with a broad distribution across New England, New York and Pennsylvania thence south in a narrow band in the Appalachian Mountains from West Virginia and Virginia to the high mountains of Georgia; and in Canada from Ontario, Quebec and the maritime provinces to Nova Scotia.
“Trillium”, from the Latin tri, refers to the flower parts occurring in threes; “llium” from the Latin liliaceous, refers to the funnel-shaped flower; and, “flexipes”, from the Latin undulatum (i.e., wavy) refers to the petals’ wavy margins.
Trillium undulatum has a short, thick rhizome from which a sheath (highly modified leaf called a cataphyll) enclosed scape (stalk of the inflorescence) emerges from the ground to 10 to 45 centimeters tall. It has a single, terminal flower. Leaves (actually bracts) are three, dark green infused with maroon, petiolate, lanceolate, acuminate, 5 to 17 centimeters long and 4 to 12 centimeters wide. The flower is pedicellate, with the pedicel ascending to erect. Sepals are three, dark red to dark maroon green, spreading, 1.5 to 4 centimeters long, and 0.5 to 1.0 centimeters wide. Petals are three, wavy-margined, white with a central red to reddish purple splotch at the base, lanceolate to obovate, acuminate, 1.4 to 1.8 centimeters long. Fruit is a scarlet, three-angled berry, 1 to 2 centimeters long.
Trillium undulatum flowers from early to late spring (dependant on latitude and/or elevation). The species occurs in mesic, northern hardwoods, mixed conifer-hardwood forests, to pinewoods and high-elevation red spruce forests in the central Appalachian Mountains in very acidic humus-rich soils.
For More Information
- PLANTS Profile - Trillium undulatum, painted trillium
- Case, F. W. and R. B. Case. 1997. Trilliums. 284 pp. Timber Press. Portland, Oregon.
- Jacobs, D. L. and Jacobs R. L. 1997. Trilliums in Woodland and Garden: American Treasures. 152 pp. Eco-Gardens. Decatur, Georgia.
- Patrick, T. 2007. Trilliums of Georgia. Tipularia 22: 3-22. Georgia Botanical Society.
- Frett, J. 2007. Trilliums at Mt. Cuba Center: A Visitor’s Guide. 75 pp. Mt. Cuba Center, Inc. Greenville, Delaware. | https://www.fs.fed.us/wildflowers/plant-of-the-week/trillium_undulatum.shtml |
This article is written to provide the reader with an understanding of what should be included in a Temporary employee’s offer of employment and to give businesses an offer template to download and use.
When putting together your offer of employment for Temporary Employees, it is important to understand employee classification types and what these employees are generally eligible to participate in for company run incentive and benefit programs.
If you need a quick reference to the different classification types, please feel free to read Part 5.3 of our series on Setting Up Payroll for more on Employee Classifications, where we compare and discuss how they impact employment.
Temporary Employees are full-time/part-time employees with an expected end date, generally less than 12 months from their starting date. Since these employees are not required for a long period of time, they generally do not receive the same treatment as permanent employees. Typically, temporary employees are paid an hourly wage rate; however, this is determined based on the company’s payroll practices.
We will take you through the template structure (that is available for download) to provide you with an executive summary of what details are generally found under each heading that relate directly to the position’s total rewards. Instructions to what other information can be captured under the headings are included as downloads.
Note: You will notice (*) found in the template. This means that if the information does not relate to a position that you can remove it from the offer letter template for the specific role.
In the template, we offer general verbiage examples of the various components that can impact a position’s total rewards. Please keep in mind that all headings and written content are general and subject for review depending on your company’s programs, practices, and requirements. If you require assistance for your written content, please reach out to a BIG representative!
Template
Before you begin outlining the details of a position’s total rewards, you will notice on the template provided for the Temporary Employees, that the Vacation and Benefits sections are removed. This is because generally temporary employees are not eligible to receive these benefits and incentives.
When it comes to your template, it is best practice to include the date that you are going to extend the offer of employment, the candidate’s full name, and address. If no address is available, use the city and province which the candidate lives in.
Offer and Terms of Employment Section
In this section, you will address the individual whom the offer letter is intended for with a brief description outlining the employment classification, Full Time Equivalency (FTE), for the company they will be employed by. You can add in gender pronoun salutations such as Mr., Ms., or Miss, however, we would like to bring caution to this common business practice, as this assumes an individual’s gender identity. We recommend sticking to writing the person’s first name.
Position Section
Under this section is generally where details are provided regarding the position’s title, start date, expected end date, and what position title the role will report to.
There are some instances where positions are deemed safety sensitive or are part of the vulnerable sector, which may require the candidate filling the position to undergo a pre-employment test or pre-hiring background check. If this is the case, it would be beneficial to outline this and define what the conditions are in order for the candidate to be successfully onboarded.
Compensation Section
Under this section is generally where the details are that confirm the pay type, regular pay amount, pay frequency, and/or other payments like uplifts, premiums, etc. It would be a great opportunity to also let the candidate know if the position is eligible to receive overtime pay, banked time, or time off in lieu.
Since temporary employees are not generally eligible to participate in paid vacation time off or benefits, it would be beneficial to the company and the candidate to define how vacation will be paid out and if they are eligible to receive a benefit uplift in lieu of participating in the company’s benefit program(s).
If your business has various compensation components, to better define them within this section, we recommend having headers, so the candidate can clearly read what their overall compensation package includes.
Pro Tip: If a temporary employee is paid salary, it is best practice to outline if their pay has been prorated based on their FTE. In most instances, this will not apply as typically temporary employees are paid an hourly wage rate.
Finally, when you are confirming a position’s compensation, we recommend including a simple clause that states the tax implications that affect their pay. While an understanding of taxes might be assumed, it is best practice to touch on tax implications regardless. To further protect your company, it is always a good thing to bring awareness to this matter.
Work Schedule
In this section, you will let the candidate know what their work schedule/rotation is by including the standard hours or work per week/day, how many days a week they are expected to be at work, and what their allocated time for lunch is.
There are instances where a position may be scheduled and required to be at work for over the maximum annual hours of work (2,080) that is set by the government. If this is the case, in this section, you will confirm how your company administers overtime and scheduling.
If your company allows flexible work arrangements (i.e. start and end times), add it in! This could be the one incentive that a candidate is looking for, especially if they have kids that go to school and need that extra time in the morning to get them ready.
Travel and Accommodations Section
In this section, you will confirm and summarize what the employee is eligible to participate in and receive when it comes to travel and accommodations. In most instances relating to this employee classification, they will not be eligible to participate in these programs. If the employee is not eligible to participate or your company does not have these programs, then do not include this section in their offer of employment.
Acknowledgment Section
To conclude the offer letter template, it would be considered best practice to not only provide a space for the candidate to sign their offer of employment, but also have a disclaimer relating to the offer and terms of employment. By having the candidate sign their agreement and read the disclaimer, they are agreeing to and are aware of the terms and conditions presented in the offer of employment.
If the signing authority and candidate signatures are captured on another page (due to content spacing), it would be considered best practice to include what page the signatures are found in the agreement, so it is clear that the signatures found on a separate page are to acknowledge the terms and conditions of this agreement.
Now that you have a general understanding of what can be included in a temporary employee’s offer of employment, please feel free to download the Offer of Employment template provided. To further assist you in creating one that will work for your business, we invite you to download and view our instructions and example of a completed Offer of Employment.
Stay tuned for Part 5 of this series when we discuss what information is generally found in a Casual Employee’s Offer of Employment.
Download the Offer of Employment: Part 4 – Temporary Employees – Template and Guide (zip). | https://bigcorplife.com/offer-of-employment-part-4-temporary-employees/ |
Q:
Recursive Sets vs Recursive Functions
What s the difference between a recursive set and recursive function?
A:
Recursive functions and recursive sets are terms used in computability theory. Wikipedia defines them as follows:
A set of natural numbers is said to be a computable set (also called a decidable, recursive, or Turing computable set) if there is a Turing machine that, given a number n, halts with output 1 if n is in the set and halts with output 0 if n is not in the set. A function f from the natural numbers to themselves is a recursive or (Turing) computable function if there is a Turing machine that, on input n, halts and returns output f(n).
In this context, a recursive function does not mean a function in a programming language that calls itself. Any mathematical function that meets the requirements of the definition above is a recursive function, including trivial ones such as the identity function or the function mapping all numbers to 1 (i.e. returns the number 1 regardless of input).
A:
The meaning of these terms varies depending upon your context. If we were discussing them purely from the standpoint of writing programs then recursive sets don't make much sense; however, it might just be that I have encountered it yet. That said, recursive functions are functions that call themselves in their execution. The calculation of a nth Fibonacci number is the classic example that is commonly presented:
/// <summary>A C# implementation of a function to return the nth Fibonacci number.</summary>
private static int Fibonacci(int n) {
if (n <= 2) {
return 1;
} else {
return Fibonacci(n - 1) + Fibonacci(n - 2);
}
}
That said, the other context for these terms in the context of computer science and specifically the theory of computation is when discussing of formal languages. In this context, a recursive set is defined to be a set for which there is a solvable membership problem. For example, we know that the set of all natural numbers ℕ is a recursive set because we can define a recursive function as follows:
Let f be defined as a function where
f(x) = 1 if x ∈ ℕ and
f(x) = 0 if x ∉ ℕ
The concept of a recursive set is important for the concept of computability because it leads to the recursively enumerable set which is a language that can be recognized by a Turing machine (i.e. Turing-recognizable). These are languages for which a Turing machine may or may not be able to determine if a given string is a member of a language, or in other words, the machine may either accept, reject, or loop. This is in contrast to a Turing-decidable language for which a the machine will enter into either the accept or reject state for a given input string.
This where the concept of a recursive function comes in play, as a recursive function (or total recursive function) can be computed by a Turing machine and halts for every input. Where as a partial recursive function can only be computed for a Turing machine with no guarantee in regard to halting behavior. Or in essence the recursive function is the counterpart to the recursive set.
So to bring things back around to your original question, in the context of the theory of computation, a recursive set is what can be generated (i.e. enumerated) or have membership tested by a recursive function on a Turing machine.
Further Reading:
M. Sipser - Introduction to the Theory of Computation (Second Edition)
J.E. Hopcroft, R. Motwani, J.D. Ullman - Introduction to Automata Theory, Languages, and Computation (Third Edition)
H.R. Lewis, C.H. Papadimitriou - Elements of the Theory of Computation (Second Edition)
F.D. Lewis - Essentials of Theoretical Computer Science (Digital Text)
A:
Perhaps the question should have been "Why is the word 'recursive' used to describe both sets and functions?"
As Greg Hewgill pointed out in his comment, the word 'green' can be applied to apples and cars, but this does not imply a relationship between apples and cars.
I think the quote from Wikipedia uses the term 'recursive' as a synonym for 'computable' — which we, as programmers, would cautiously agree with, but only in certain contexts.
| |
To search by structure, left click in the box below to display the chemdraw toolbar. Then, draw the chemical structure of interest in the box using the toolbar. When your structure is complete, click “Search by Name” or “Search by SMILES” to generate the product name or SMILES respectively. This feature will search within the Gelest product database for matching chemical names or SMILES. Note: In cases where Gelest uses alternate chemical names, it may be necessary to search for the product of interest by its CAS#.
- Einecs Number 236-818-1
- HMIS 3-1-1-X
- Molecular Formula C18H43NO6Si2
- Molecular Weight (g/mol) 425.71
- Purity (%) 95%
- TSCA Yes
- Boiling Point (˚C/mmHg) 160/0.6
- Density (g/mL) 0.97
- Flash Point (˚C) 162 °C
- Refractive Index @ 20˚C 1.4265
- Viscosity at 25 ˚C (cSt) 5.5
Additional Properties
Safety
Bis(3-triethoxysilylpropyl)amine
Silicon Chemistry, Articles
Manufacturing growth opportunities exist in the United States for alternative energy (photovoltaic modules, fuel cells, wind turbines) and medical and healthcare (surgical devices, dental implants and drug delivery) applications. More traditional markets where growth is expected include automotive, construction and specialty packaging. | https://www.gelest.com/product/SIB1824.5/ |
DescriptionFour Populus clones were grown in central Missouri for 2 years at 1 x 1 m spacing to study total biomass production on floodplain sites previously in forage grasses. Branch morphology (living, first-order proleptic, and sylleptic shoots) was assessed for 2-year-old plants. All 2-year-old plants had lateral branches, and clones varied significantly in certain branch attributes. A Populus deltoides x P. nigra hybrid (I45/51) had significantly more branches, greater total branch length and more branches per unit height than did three P. deltoides clones (26C6R51, 2059, 1112) derived from Midwest region collections. Further, I45/51 carried a greater proportion of its branches on the lower stem than did P. deltoides clones. Whereas intense branching often occurred below 50 cm height in the hybrid clone, P. deltoides plants often were clear of branches below 1 to 2 m. Mean angles of branch origin were similar among clones (46.9º to 51.1º) with no significant differences. Length-weighted vector averages of branch azimuth indicated that there was a significant trend toward greater branch growth on the south side of trees, but little apparent clonal variation in this attribute. The profuse branching habit of the hybrid I45/51 was closely associated with its high second-year leaf area index and biomass production.
Publication Notes
- Check the Northern Research Station web site to request a printed copy of this publication.
- Our on-line publications are scanned and captured using Adobe Acrobat.
- During the capture process some typographical errors may occur.
- Please contact Sharon Hobrla, [email protected] if you notice any errors which make this publication unusable.
- We recommend that you also print this page and attach it to the printout of the article, to retain the full citation information.
- This article was written and prepared by U.S. Government employees on official time, and is therefore in the public domain. | https://www.fs.usda.gov/treesearch/pubs/15842 |
Computer graphics and vision software relies on algorithms for shape analysis to create links between objects observed using sensing equipment and preprocessed databases of annotated 3D objects. While we typically can only observe the outer surface of an object in front of a camera, in reality that surface bounds a volume whose structure determines the purpose and affordances of the object. This project will develop tools for efficient volume-based shape analysis. To overcome inefficiencies of existing tools, our algorithms will leverage a mathematical technique known as the boundary element method (BEM) to derive conclusions about the volume bounded by a surface without an expensive process of filling it with tetrahedra or other volumetric elements. This project will be carried out by Prof. Justin Solomon with a student and a postdoctoral researcher at MIT as well as with potential collaborators at Skoltech.
Report
- Project Title: Boundary Element Methods for Shape Analysis
- Principal Investigator: Justin Solomon, MIT Department of Electrical Engineering and Computer Science, MIT Geometric Data Processing Group
- Grant Period: February 2017 – January 2018
This project for the MIT-Skoltech Seed Fund Program involves the development of mathematical models and algorithms for volumetric shape analysis. Most three-dimensional shapes are stored computationally using boundary representations, that is, as thin shell surfaces that bound a volume of interest. While this representation is efficient storage-wise since it stores two- rather than three-dimensional data, it captures a different type of shape: A thin sheet surrounding an object of interest rather than the object itself. Hence, algorithms in computer vision and graphics that analyze these representations often miss key extrinsic features relevant to a shape analysis task.
To address this gap between computation and physical reality, we propose using the boundary element method (BEM). BEM is a numerical algorithm for solving partial differential equations (PDEs) in a volume using calculations only on its boundary. The basic premise of our research is that the operators involved in BEM not only define an effective means of solving PDEs but also themselves encode information about the volume enclosed by a surface.
To explore this idea, we focused on a basic operator appearing in the BEM literature, the Dirichlet-to-Neumann operator for the Laplace equation. After interfacing with state-of-the-art BEM tools for approximating this operator, we carried out a theoretical and experimental study of this operator, validating its usefulness in 3D computer vision applications as well as its stability to typical sources of error present in this context. We additionally implemented some full application-oriented computational pipelines for shape analysis to demonstrate real-world usefulness of the resulting algorithms.
Our research project was extremely successful and has led to published papers, interest among the broader scientific community, and a broader collaboration with Skoltech. We outline some of the main outcomes of the project below.
Research Products
The generous support of the Skoltech seed grant is acknowledged in several publications that resulted from the one-year study:
Wang, Yu, Mirela Ben-Chen, Iosif Polterovich, and Justin Solomon. “Steklov Geometry Processing: An Extrinsic Approach to Spectral Shape Analysis.” ACM Transactions on Graphics, accepted pending revision.
This paper is a direct product of the proposed research in which we demonstrate the value of the Dirichlet-to-Neumann (Steklov) operator for key shape analysis tasks in computer graphics and vision.Supported by a collaboration with mathematician Iosif Polterovich, we were able to prove theoretically that BEM operators address drawbacks of operators applied in previous geometry processing techniques based on spectral computation, namely that it can distinguish between different isometric embeddings of the same shape.Beyond theoretical progress, the paper reports state-of-the-art performance for problems including shape retrieval and statistical analysis.At the end of the day, the paper shows that the Dirichlet-to-Neumann operator can serve as a drop-in replacement for the Laplace operator in countless geometry processing pipelines.
Claici, Sebastian, Mikhail Bessmeltsev, Scott Schaefer, and Justin Solomon. “Isometry-Aware Preconditioning for Mesh Parameterization.” Symposium on Geometry Processing 2017, London.
This paper proposes an algorithm for large-scale optimization of nonconvex objectives typically appearing in geometry processing applications.In particular, we view the set of deformations of a fixed-topology triangulated surface or tetrahedralized volume as itself a high-dimensional manifold.By defining a rigid-invariant Riemannian metric on this space, we show that simple gradient descent algorithms can be accelerated by several orders of magnitude, bypassing the need for complex optimization procedures.This technique currently applies state-of-the-art performance on challenging surface parameterization tasks.
Ezuz, Danielle, Justin Solomon, Vladimir Kim, and Mirela Ben-Chen. “GWCNN: A Metric Alignment Layer for Deep Shape Analysis.” Symposium on Geometry Processing 2017, London.
This paper provides a technique for machine learning on meshed geometry, building on algorithms for surface-to-surface correspondence proposed by Prof. Solomon in previous work.The idea is to learn a mapping from 3D geometry into a two-dimensional grid on which deep learning algorithms can carry out analysis for problems like classification and segmentation.The proposed technique is among the first end-to-end trainable machine learning pipelines for triangle meshes and related data.
Bessmeltsev, Mikhail and Justin Solomon. “Vectorization of Line Drawings via PolyVector Fields.” ACM Transactions on Graphics, submitted.
This paper explores an application of geometry processing ideas to a key problem in image processing:vectorization of line drawings.The algorithm proposed in this paper takes as input a sketched, hand-drawn image in bitmapped format and outputs a set of vectorized curves suitable for use in software like Adobe Illustrator.Behind the scenes, vectorization is guided by polyvector fields, a new representation of frames recently proposed in the geometry processing literature for quadrilateral meshing.Although this algorithm is not currently guided by machine learning techniques, we have begun a research project supported by the Skoltech Next Generation grant jointly with Prof. Evgeny Burnaev exploring how learning techniques can enhance algorithms in this class.
Educational and Career Development Outcomes
Most of the research supported by this seed grant has been carried out by MIT students and postdoctoral researchers. As members of the newly-formed Geometric Data Processing Group, these researchers’ work has formed the basis for future directions in the research group and is a significant portion of their portfolios for the PhD and academic job search.
As a few examples involving staff funded using this grant:
- PhD student Sebastian Claici has completed his RQE exam by presenting his SGP 2017 paper mentioned above; this is his final PhD requirement beyond thesis research.
- PhD student Yu Wang currently is wrapping up his MSc degree by presenting his research on Steklov geometry processing using boundary element operators.
- Postdoctoral research associate Dr. Mikhail Bessmeltsev is currently on the market for full-time academic positions and has received interviews at top-tier research institutions and universities.
Collaboration with Skoltech
A key secondary goal of the research in this proposal is to establish a research connection between the MIT Geometric Data Processing Group and colleagues at Skoltech. We are pleased to report the foundation of a longer-term collaboration between these two groups that will last beyond the term of the seed grant.
Approximately midway through the period of MIT-Skoltech Seed Grant support, postdoc Mikhail Bessmeltsev visited Skoltech in person and presented his research at MIT as well as his prior work as a PhD student at the University of British Columbia. The group also hosted a visit from Skoltech faculty member Evgeny Burnaev at MIT.
Based on discussions during these visits as well as at intermediate points over teleconference and inspired by the research on boundary element methods, the two parties proposed a longer-term collaboration studying machine learning techniques applied to curve network data and other expressions of three-dimensional shape. We are pleased to have received the Skoltech Next Generation grant to support his research. Geometric Data Processing Group members are currently completing preliminary stages of this new project, guided by feedback from both Prof. Solomon and Prof. Burnaev; already one submission for publication on machine learning for point cloud data has resulted from these discussions. The group plans to share an implementation of the proposed technique in a Skoltech-hosted repository in the coming weeks. | https://skoltech.mit.edu/collaborative-projects/seed-funds/year-1-seed-fund-grants/boundary-element-methods-shape-analysis |
---
abstract: 'The aim of the present work is to examine the role of discreteness in the interaction of both co-winding and counter-winding vortices in the context of the nonlinear Schr[ö]{}dinger equation. Contrary to the well-known rotation of same charge vortices, and translation of opposite charge vortices, we find that strong discreteness is able to halt both types of pairs into stationary, potentially stable configurations up to a critical inter-site coupling strength. Past the relevant critical point the behavior is also somewhat counter-intuitive as, for instance, counterwinding vortices start moving but also approach each other. This lateral motion becomes weaker as the continuum limit is approached and we conjecture that genuine traveling appears only at the continuum limit. Analogous features arise in the cowinding where the discrete coherent structure pair spirals outward, with rigid rotation being restored only in the continuum limit.'
author:
- 'J. J. Bramburger'
- 'J. Cuevas-Maraver'
- 'P. G. Kevrekidis'
title: 'Vortex Pairs in the Discrete Nonlinear Schr[ö]{}dinger Equation'
---
=1
Introduction
============
The discrete nonlinear Schr[ö]{}dinger equation (DNLS) constitutes one of the most prototypical examples of a nonlinear dynamical lattice, combining the linear form of lattice (discrete) dispersion and nonlinearity [@dnlsbook]. For this reason the model has been argued to be relevant as an exact or asymptotic description of a variety of different settings including, but not limited to, optical waveguide arrays [@dnc; @moti], as well as the evolution of atomic Bose-Einstein condensates (BECs) in the presence of optical lattice potentials [@ober]. These applications have been motivated by the theoretical exploration and even experimental observation of a diverse host of features such as discrete diffraction [@yaron] and diffraction management [@yaron1], lattice solitary waves [@yaron; @yaron2] and discrete vortices [@neshev; @fleischer], Talbot revivals [@christo2], and $\mathcal{PT}$-symmetry breaking [@kip], among many others.
Especially in two-dimensional settings, the study of both waveguide arrays and also photorefractive crystals has offered a wide range of possibilities [@moti]. Most recently, this includes, e.g., the study of topologically protected states in variants of the lattices that break the time-reversal symmetry [@moti2; @leykam; @mark2]. However, many of the relevant studies have been conducted in the focusing nonlinearity realm where bright solitonic structures on top of a vanishing background may exist. While gap structures have been considered in the defocusing realm in square [@hadii] and non-square lattices [@law], there is considerably less effort in the subject of vortices and their associated dynamics.
Indeed, vortex dynamics and interactions are of principal relevance to the evolution of atomic Bose-Einstein condensates [@fetter1; @fetter2; @siambook]. Furthermore, BECs often involve the evolution in periodic potentials [@ober], which in recent two-dimensional extensions have even been considered in the realm of geometries with curvature [@porto]. Nevertheless, the concurrent exploration of defocusing nonlinearity-induced vortices and discreteness has been quite limited, to the best of our knowledge, and in fact has been constrained to the study of a single such entity [@1Vortex; @Bramburger]. The aim of the present work is to go a step past this and develop a systematic understanding of the principal numerical phenomenology, aided by some analytical insights, of the case of multiple vortices in the DNLS model. This is a topic of interest for a number of reasons: continuum vortex pairs have a very definite behavior dictated by the topological charges. For same-charge (cowinding) vortices, the result of their interaction is a rigid rotation around their center of mass, while for opposite-charge (counterwinding) vortices, the coherent structures move parallel to each other in a steady translational (constant speed) motion [@fetter1; @fetter2; @siambook]. Discreteness, on the other hand, is well-known to “disrupt” the translational dynamics of solitary waves, due to the so-called Peierls-Nabarro barrier [@dnlsbook]. Hence, it appears to be of particular interest what the result of the interplay of these opposing tendencies is.
Our findings can be summarized in the following conclusions:
- For sufficiently weak coupling, discreteness “dominates” the interaction, entirely halting the rotational or translational motion of counter- or co-winding vortices, and leading instead to the formation of stable stationary configurations of such states.
- Past a sufficiently large critical coupling, the relevant branches feature a turning point bifurcation and stationary states cease existing. A one-dimensional example of such a saddle-center bifurcation has appeared for dark solitons in the work of [@susjoh]. Interestingly, this saddle-center bifurcation is not the only one taking place in the system; there is also a pitchfork bifurcation occurring near the turning point with an asymmetric (or 1 vortex, as we call it) branch.
- Past the turning point, a reasonable expectation might be that traveling arises, e.g., via a SNIPER bifurcation as happens in a different context in discrete systems [@sniper_yannis]. Nevertheless, to our surprise, we find that this is [*not*]{} the case. Instead, [*no*]{} traveling (for counter-winding) or rotating (for cowinding vortices) state exists in the dynamics past the critical point. Instead, cowinding vortices increase their separation distance slowly, while counterwinding ones move closer to each other and may eventually participate in catastrophic (annihilation) collisional events.
- As the continuum limit is approached, these “lateral” motions become slower, leading us to conjecture that genuine rotational (for cowinding) and translational (for counterwinding) vortex configurations can be reached solely in the singular continuum limit of the model.
The structure of our presentation is as follows. We first provide the general mathematical formulation of the model of interest. We then simultaneously consider both the counterwinding and cowinding cases in section III. A connection with the continuum limit is offered in section IV. Finally, section V summarizes our findings and presents some directions for future study.
Formulation
===========
Our starting point will be a two-dimensional discrete nonlinear Schrödinger equation $$\label{dNLS}
\mathrm{i}\frac{d\psi_{n,m}}{dt} - |\psi_{n,m}|^2\psi_{n,m} + \frac{\varepsilon}{2}\Delta\psi_{n,m} = 0, { \quad (n,m)\in\mathbb{Z}^2}$$ where $\Delta\psi_{n,m} = \psi_{n+1,m} + \psi_{n-1,m} + \psi_{n,m+1} + \psi_{n,m-1} - 4\psi_{n,m}$ is the discrete Laplacian. To consider potentially stationary states in the model, [ for all $(n,m)\in\mathbb{Z}^2$]{} we introduce the ansatz $$\psi_{n,m}(t) = \sqrt{\omega}\phi_{n,m}\mathrm{e}^{-\mathrm{i}\omega t},$$ [where $\phi_{n,m}$ is time-independent,]{} to transform (\[dNLS\]) to $$\label{dNLS2}
\frac{C}{2}\Delta\phi_{n,m} + (1-|\phi_{n,m}|^2)\phi_{n,m} = 0, {\quad (n,m)\in\mathbb{Z}^2}.$$ [Here we have set $C = \varepsilon/\omega$.]{}
Through an amplitude-phase decomposition (often referred to as the Madelung transformation [@siambook]), the complex field is rewritten as $\phi_{n,m} = r_{n,m}\mathrm{e}^{\mathrm{i}\theta_{n,m}}$ for all $(n,m) \in \mathbb{Z}^2$ so that solving (\[dNLS2\]) is equivalent to solving
\[Polar\_dNLS\] $$\label{Polar_dNLS_Radial}
0 = \frac{C}{2}\sum_{n',m'} (r_{n',m'}\cos(\theta_{n',m'} - \theta_{n,m}) - r_{n,m}) + r_{n,m}(1 - r_{n,m}^2), \\$$ $$\label{Polar_dNLS_Phase}
0 = {\frac{C}{2}}\sum_{n',m'} r_{n',m'}\sin(\theta_{n',m'} - \theta_{n,m})$$
for each $(n,m) \in \mathbb{Z}^2$. The sum in (\[Polar\_dNLS\]) is taken over all four nearest neighbours of ($n,m$) so that $(n',m') = (n\pm 1,m),(n,m\pm 1)$.
[In this work we begin by focusing on the behaviour of solutions in the anti-continuum limit, $C \to 0^+$. Simply evaluating (\[Polar\_dNLS\]) at $C = 0$ will of course trivially solve (\[Polar\_dNLS\_Phase\]), but this gives no indication as to the continuity of solutions into $C > 0$ since we no longer automatically satisfy (\[Polar\_dNLS\_Phase\]) for $C \neq 0$. Therefore, to maintain continuity of solutions as $C \to 0^+$ we can replace (\[Polar\_dNLS\_Phase\]) with $$\label{Polar_dNLS_Phase2}
0 = \sum_{n',m'} r_{n',m'}\sin(\theta_{n',m'} - \theta_{n,m})$$ for all $(n,m)\in\mathbb{Z}^2$ since $C/2$ appears only as a multiplicative constant in (\[Polar\_dNLS\_Phase\]).]{}
We consider the existence and stability of vortex pair solutions of (\[Polar\_dNLS\_Radial\]) and (\[Polar\_dNLS\_Phase2\]) which satisfy $r_{n,m} \to 1$ when $(n,m) \to \infty$. In our work we analyze the existence, stability and dynamics of different vortex pair states in $N\times N$ lattices, with $N = 41,81,$ and $251$ (but also examine the dependence of the results on the lattice size $N$). The vorticity of each structure is assigned to be either $S = 1$ (if the phase rotates counter-clockwise) or $S=-1$ (if it rotates clockwise) in the limit $C \to 0^+$. Either when we want to examine the unstable dynamics of the model, or when we consider values of $C$ past the critical point of existence of stationary configurations (see details below), the full dynamical model of Eq. (\[dNLS\]) is evolved in time. We now turn to the consideration of the two different cases of vortex pairs.
Vortex Solutions
================
In this section we handle both counter- and cowinding vortex solutions together. In $\S$ \[subsec:Sym\] we describe how the internal symmetries of the vortices can be used to reduce the number of equations required to solve (\[Polar\_dNLS\]). $\S$ \[subsec:Existence\] presents our numerical existence and continuation results which show that both counter- and cowinding vortices as solutions of (\[Polar\_dNLS\]) can only exist up to some finite $C > 0$, after which they become dynamic solutions of the full DNLS (\[dNLS\]). The stability of these static solutions is examined in $\S$ \[subsec:Stability\] and then in $\S$ \[subsec:Dynamics\] we provide dynamic simulations of the solutions near their respective critical existence thresholds in $C > 0$.
Symmetries and Reductions {#subsec:Sym}
-------------------------
We can obtain stationary vortex solutions by exploiting the symmetries of the system (\[Polar\_dNLS\]) and the underlying lattice structure in a similar way to what was done for single vortex solutions in [@Bramburger]. Here we define a function for which we will show that its roots can be used to obtain vortex solutions of (\[Polar\_dNLS\]) with the boundary conditions giving that the vortex is either counter- or cowinding. Define $$\label{F_Function}
\begin{split}
F^1_{n,m}(C,r,\theta) &= \frac{C}{2}\sum_{n',m'} (r_{n',m'}\cos(\theta_{n',m'} - \theta_{n,m}) - r_{n,m}) + r_{n,m}(1 - r_{n,m}^2), \\
F^2_{n,m}(C,r,\theta) &= \sum_{n',m'} r_{n',m'}\sin(\theta_{n',m'} - \theta_{n,m}),
\end{split}$$ for all integers $n,m\geq 0$, where $r = \{r_{n,m}\}_{n,m\geq 0}$ and $\theta = \{\theta_{n,m}\}_{n,m \geq 0}$. For some fixed $c \geq 0$, the indices $(n,m) = (\pm c, 0)$ will be considered the centers of each of the vortices. Notice that the form of $F^1_{n,m}(C,r,\theta)$ is taken to correspond to (\[Polar\_dNLS\_Radial\]) and the form of $F^2_{n,m}(C,r,\theta)$ corresponds to (\[Polar\_dNLS\_Phase2\]), and moreover $F^2_{n,m}(C,r,\theta)$ has no explicit dependence on $C$. Nevertheless, we will always be solving for roots of $F^1$ and $F^2$ together, endowing $F^2$ with an implicit dependence on $C$ coming from obtaining roots of $F^1$ at specific parameter values of $C$.
The system (\[F\_Function\]) is not fully defined until it is coupled with appropriate boundary conditions which account for neighboring connections with $n = -1$ or $m = -1$. It is exactly these boundary conditions that are used to extend to either counter- or cowinding vortices. We begin with counterwinding vortices and introduce the boundary conditions $$\label{Counter_Boundary}
r_{-1,m} = r_{1,m}, \quad r_{n,-1} = r_{n,1}, \quad \theta_{-1,m} = \theta_{1,m}, \quad \quad \theta_{n,-1} = 2\pi - \theta_{n,1}.$$ for all $n,m\geq 0$. Based upon these conditions, we necessarily have that $\theta_{0,m},\theta_{n,0}\in\{0,\pi\}$ for all $n,m\geq 0$. For the positive integer $c$ which is used to define the center of each of the vortices we will take $$\label{CountAssignment}
\theta_{n,0} = \left\{
\begin{array}{cl} 0, & 0 \leq n \leq c \\ \\
\pi, & n > c.
\end{array}
\right.$$ We note that these boundary conditions (\[Counter\_Boundary\]) along with the assignments (\[CountAssignment\]) imply that $$\begin{split}
F^2_{n,0}(0,r,\theta) &= r_{n,1}\sin(\theta_{n,1} - \theta_{n,0}) + r_{n,-1}\sin(\theta_{n,-1} - \theta_{n,0}) \\
&\quad+ r_{n+1,0}\underbrace{\sin(\theta_{n+1,0} - \theta_{n,0})}_{= 0} + r_{n-1,0}\underbrace{\sin(\theta_{n-1,0} - \theta_{n,0})}_{= 0} \\
&= \pm r_{n,1}\sin(\theta_{n,1}) \mp r_{n,-1}\sin(\theta_{n,-1})=0,
% &= \pm r_{n,1}(\sin(\theta_{n,1}) - \sin(\theta_{n,1})), \\
% &= 0,
\end{split}$$ for all $n \geq 0$. This shows that our boundary conditions (\[Counter\_Boundary\]) necessarily give that $F^2_{n,0}(C,r,\theta) = 0$, and in turn will reduce the number of equations required to obtain a counterwinding vortex solution.
Then, for a fixed $C>0$ solutions of $F^1(C,r,\theta) = F^2(C,r,\theta) = 0$ can be extended over the entire lattice through the following extension: $$\begin{split}
r_{-n,m} &= r_{n,m}, \quad
r_{n,-m} = r_{n,m}, \quad
r_{-n,-m} = r_{n,m}, \\
\theta_{-n,m} &= \theta_{n,m}, \quad
\theta_{n,-m} = 2\pi - \theta_{n,m}, \quad
\theta_{-n,-m} = 2\pi - \theta_{n,m},
\end{split}$$ for each $n,m\geq 0$. The symmetries of the phase components over the full lattice are given on the left in Figure \[fig:Vortex\_Symmetry\], and we note that the symmetries of the radial components are significantly simpler since they are identical in each of the four regions of the figure. Notice that counterwinding vortex solutions necessarily have an $(n,m) \mapsto (-n,m)$ flip symmetry.
![The symmetries of (left) counterwinding and (right) cowinding vortex solutions. The red shaded cells represent the indices $(n,m) = (\pm c,0)$ and the blue shaded cell is the center of the lattice $(n,m) = (0,0)$. The green shaded region represents the indices $n,m > 0$, and symmetry-based extensions beyond this region are indicated in each of the remaining three regions. The fuchsia region represents the cells with indices $(0,m)$, $m \neq 0$, which are not fixed by the symmetry of the counterwinding vortex solution.[]{data-label="fig:Vortex_Symmetry"}](fig1a "fig:"){width="40.00000%"} ![The symmetries of (left) counterwinding and (right) cowinding vortex solutions. The red shaded cells represent the indices $(n,m) = (\pm c,0)$ and the blue shaded cell is the center of the lattice $(n,m) = (0,0)$. The green shaded region represents the indices $n,m > 0$, and symmetry-based extensions beyond this region are indicated in each of the remaining three regions. The fuchsia region represents the cells with indices $(0,m)$, $m \neq 0$, which are not fixed by the symmetry of the counterwinding vortex solution.[]{data-label="fig:Vortex_Symmetry"}](fig1b "fig:"){width="40.00000%"}
We may do something similar for cowinding vortices by introducing the boundary conditions $$\label{Co_Boundary}
r_{-1,m} = r_{1,m}, \quad r_{n,-1} = r_{n,1}, \quad \theta_{-1,m} = 2\pi - \theta_{1,m}, \quad \quad \theta_{n,-1} = 2\pi - \theta_{n,1},$$ for all $n,m\geq 0$. Similar to counterwinding case, these boundary conditions require that $\theta_{n,0} \in \{0,\pi\}$ for all $n \geq 0$, and hence for $c > 0$ as described above we have that $$\label{CoAssignments}
\theta_{0,m} = 0, \quad \theta_{n,0} = \left\{
\begin{array}{cl} 0, & n \leq c \\ \\
\pi, & n > c.
\end{array}
\right.$$ An important distinction between the counterwinding and cowinding vortices is that in the latter case the values of $\theta_{0,m}$ are fixed by the boundary conditions (\[Co\_Boundary\]), whereas in the counterwinding case we do not necessarily have explicit values for these phase components. Furthermore, the boundary conditions (\[Co\_Boundary\]) along with the assignments (\[CoAssignments\]) imply that $$\begin{split}
F^2_{0,m}(0,r,\theta) &= r_{1,m}\sin(\theta_{1,m} - \theta_{0,m}) + r_{-1,m}\sin(\theta_{-1,m} - \theta_{0,m}) \\
&\quad+ r_{0,m+1}\underbrace{\sin(\theta_{0,m+1} - \theta_{0,m})}_{= 0} + r_{0,m-1}\underbrace{\sin(\theta_{0,m-1} - \theta_{0,m})}_{= 0} \\
&= r_{1,m}\sin(\theta_{1,m}) + r_{-1,m}\sin(\theta_{-1,m})=0,
% &= r_{1,m}(\sin(\theta_{1,m}) - \sin(\theta_{1,m})), \\
% &= 0,
\end{split}$$ for all $m \geq 0$, again due to the selection of boundary conditions. Similarly, the conditions for $m = 0$ give that $F^2_{n,0}(C,r,\theta) = 0$ for all $n \geq 0$, and therefore we are only left to solve $F^2_{n,m}(C,r,\theta) = 0$ for all $n,m > 0$ for $\{\theta_{n,m}\}_{n,m > 0}$. This shows that our assignments (\[CoAssignments\]) necessarily give that $F^2_{0,m}(0,r,\theta) = F^2_{n,0}(C,r,\theta) = 0$ for all $n,m \geq 0$, and therefore reduces the number of equations required to obtain a cowinding vortex solution.
Then, for a fixed $C > 0$, solutions to $F^1(C,r,\theta) = F^2(C,r,\theta) = 0$ can be extended over the entire lattice through the following definitions: $$\begin{split}
r_{-n,m} &= r_{n,m}, \quad
r_{n,-m} = r_{n,m}, \quad
r_{-n,-m} = r_{n,m}, \\
\theta_{-n,m} &= 2\pi - \theta_{n,m}, \quad
\theta_{n,-m} = 2\pi - \theta_{n,m}, \quad
\theta_{-n,-m} = \theta_{n,m},
\end{split}$$ for each $n,m\geq 0$. The symmetries of the phase components over the full lattice are given on the right in Figure \[fig:Vortex\_Symmetry\], and again we note that the symmetries of the radial components are significantly simpler since they are identical in each of the four regions of the figure. Notice that cowinding vortex solutions necessarily have an $(n,m) \mapsto (-n,-m)$ flip symmetry.
For both types of vortices considered in this work, the definition of the functions $F^1,F^2$ show that we may exploit the symmetries of the system (\[Polar\_dNLS\]) to greatly reduce the number of equations required to obtain a vortex solution. Most importantly, in the anti-continuum limit $C = 0$ we have $$F^1_{n,m}(0,r,\theta) = r_{n,m}(1 - r_{n,m}^2),$$ for all $n,m\geq 0$. Requiring that $r_{n,m}$ be nonnegative implies that $r_{n,m} \in \{0,1\}$ for all $n,m\geq 0$. In our case we will consider $r_{n,m} = 1$, for all $n,m\geq 0$ and $n \neq c$, along with the following two scenarios: $r_{c,0} = 0$ and $r_{c,0} = 1$. The former case corresponds to the vortical configurations that we will numerically consider below. The latter will be associated with a complementary branch that will arise in the relevant bifurcation diagram (cf. the details in the next subsection). This will give two vortex solutions of each type to continue in $C \geq 0$, and also describes a process by which counterwinding vortices can be obtained numerically by restricting ourselves to a finite positive range of integers $n,m$, i.e., the first quadrant. Then, once we have obtained a numerical solution in the anti-continuum limit, we may continue this solution in $C$ to move beyond this limit and into a region of parameter space where obtaining solutions becomes significantly more complicated since we must solve for roots of both $F^1_{n,m}$ and $F^2_{n,m}$ for all $n,m\geq 0$. Most importantly, the above discussion shows that the curves of counter- and cowinding vortices continued in $C$ up from the anti-continuum limit $C=0$ will always retain the symmetries of Figure \[fig:Vortex\_Symmetry\].
Existence of Stationary Solutions {#subsec:Existence}
---------------------------------
Having set up the relevant existence problem of a stationary vortex pairs analytically, we now turn to the corresponding numerical considerations in $N\times N$ lattices. We will mostly present numerical results for $N = 41$, but remark that our results have also been checked with $N = 81$ and $251$ to determine consistency. Moreover, unless otherwise stated, on every lattice we take $c = 5$ but comment on the effect of changing $c$ towards the end of this section. Using an ansatz such as the one described in the previous section we are able to identify solutions involving two distinct vortices of each type in the anti-continuum limit given by fixing $r_{n,m} = 1$, for all $n,m\in \{0,\dots,(N-1)/2\}$ and $n \neq
5$. The vortex pair branch involves the selection of $r_{\pm 5, 0}=0$ in the anti-continuum limit of $C=0$; we are able to continue these relevant wave forms into $C > 0$. Examples of these continued solutions, hereby referred to as stationary symmetric counterwinding (cowinding) vortices, are depicted in Figure \[fig:profiles1\] (Figure \[fig:profiles2\]) on a $41\times41$ lattice for the parameter value $C = 0.4$. In the figure structures involving zero or one vortex at the anti-continuum limit are also shown; these structures are explained in detail below.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
![[Counterwinding vortices for $C=0.4$ and $c=5$ in a $41\times41$ lattice. Density (top left panel) and phase (top right panel) of the symmetric 2VS (two-vortex states). Bottom panels show the density of 0VS (left) and 1VS (right). The phase of the latter solutions is not shown as they are almost identical to that of the 2VS.]{}[]{data-label="fig:profiles1"}](fig2a "fig:"){width="40.00000%"} ![[Counterwinding vortices for $C=0.4$ and $c=5$ in a $41\times41$ lattice. Density (top left panel) and phase (top right panel) of the symmetric 2VS (two-vortex states). Bottom panels show the density of 0VS (left) and 1VS (right). The phase of the latter solutions is not shown as they are almost identical to that of the 2VS.]{}[]{data-label="fig:profiles1"}](fig2b "fig:"){width="40.00000%"}
![[Counterwinding vortices for $C=0.4$ and $c=5$ in a $41\times41$ lattice. Density (top left panel) and phase (top right panel) of the symmetric 2VS (two-vortex states). Bottom panels show the density of 0VS (left) and 1VS (right). The phase of the latter solutions is not shown as they are almost identical to that of the 2VS.]{}[]{data-label="fig:profiles1"}](fig2c "fig:"){width="40.00000%"} ![[Counterwinding vortices for $C=0.4$ and $c=5$ in a $41\times41$ lattice. Density (top left panel) and phase (top right panel) of the symmetric 2VS (two-vortex states). Bottom panels show the density of 0VS (left) and 1VS (right). The phase of the latter solutions is not shown as they are almost identical to that of the 2VS.]{}[]{data-label="fig:profiles1"}](fig2d "fig:"){width="40.00000%"}
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------------------------- -----------------------------------------------------------------------------------------------------------------------------------
![[Same as Figure \[fig:profiles1\] but for cowinding vortices]{}[]{data-label="fig:profiles2"}](fig3a "fig:"){width="40.00000%"} ![[Same as Figure \[fig:profiles1\] but for cowinding vortices]{}[]{data-label="fig:profiles2"}](fig3b "fig:"){width="40.00000%"}
![[Same as Figure \[fig:profiles1\] but for cowinding vortices]{}[]{data-label="fig:profiles2"}](fig3c "fig:"){width="40.00000%"} ![[Same as Figure \[fig:profiles1\] but for cowinding vortices]{}[]{data-label="fig:profiles2"}](fig3d "fig:"){width="40.00000%"}
----------------------------------------------------------------------------------------------------------------------------------- -----------------------------------------------------------------------------------------------------------------------------------
Contrary to single vortices that can be continued throughout the interval of real non-negative values of $C$, we find that stationary symmetric counter- and cowinding vortices do not exist for all values of the coupling constant $C$. Of course, this is natural to expect given the absence of such stationarity in the continuum limit. However, the interest in our case involves the transition from the anti-continuum stationarity to the continuum traveling. We depict the bifurcation diagram of the stationary counter- and cowinding vortices on a lattice with $N = 41$ in Figure \[fig:Continuation\] with the vertical axis given by the complementary norm $$\label{PNorm}
P = \sum_n\sum_m (1 - |\phi_{n,m}|^2),$$ where we recall that $1$ is the background density. For both types of vortices we have $P$ is equal to $0$ and $2$ in the anti-continuum limit, depending on whether $r_{\pm c,0}=1$ or whether [$r_{\pm c,0} = 0$]{}. We will refer to the continued solutions in $C>0$ as a 0VS and a 2VS, respectively, i.e., as bearing $0$ or $2$ vortices, respectively. It is important to highlight that the relevant terminology is principally meaningful in the anti-continuum limit, yet by extension in the manuscript, we will refer to the branches using the same notation for non-vanishing values of $C$. The upper branches in blue in Figure \[fig:Continuation\] correspond to a stationary 2VS with $r_{\pm5,0} = 0$ in the anti-continuum limit, whereas the lower branches in red correspond to a stationary 0VS with $r_{\pm5,0} = 1$ in the anti-continuum limit. Our numerics reveal that upon continuing these solutions into $C > 0$, $r_{\pm5,0}$ monotonically increases with $C$, whereas 0VSs have $r_{\pm5,0}$ monotonically decreasing as $C$ increases. This monotonic decrease eventually terminates at a turning point bifurcation $C = C_t$ where these two symmetric vortex states (the 2VS and the 0VS) collide and annihilate each other. Our numerical investigations have revealed that this scenario is independent of the number of lattice sites, but we do remark that the exact value at which the turning point takes place does appear to change with $N$. In particular, we have found that on the $41\times41$ lattice we have $C_t = 0.5375386$ for counterwinding vortices and $C_t = 0.4953718$ for cowinding vortices. For counterwinding (cowinding) vortices the relevant critical point location slowly decreases (increases) as a function of increasing lattice size $N$ up to an asymptotic value, as shown in Figure \[fig:bifsN\].
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
![Dependence of the complementary norm $P$ versus the coupling constant $C$ for (top) counterwinding and (bottom) cowinding vortices with $c=5$ on a $41\times41$ lattice. The right panels are a zoom in of the turning point and pitchfork bifurcations.[]{data-label="fig:Continuation"}](fig4a "fig:"){width="40.00000%"} ![Dependence of the complementary norm $P$ versus the coupling constant $C$ for (top) counterwinding and (bottom) cowinding vortices with $c=5$ on a $41\times41$ lattice. The right panels are a zoom in of the turning point and pitchfork bifurcations.[]{data-label="fig:Continuation"}](fig4b "fig:"){width="40.00000%"}
![Dependence of the complementary norm $P$ versus the coupling constant $C$ for (top) counterwinding and (bottom) cowinding vortices with $c=5$ on a $41\times41$ lattice. The right panels are a zoom in of the turning point and pitchfork bifurcations.[]{data-label="fig:Continuation"}](fig4c "fig:"){width="40.00000%"} ![Dependence of the complementary norm $P$ versus the coupling constant $C$ for (top) counterwinding and (bottom) cowinding vortices with $c=5$ on a $41\times41$ lattice. The right panels are a zoom in of the turning point and pitchfork bifurcations.[]{data-label="fig:Continuation"}](fig4d "fig:"){width="40.00000%"}
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- -----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
![[Dependence of the bifurcation points $C_p$ and $C_t$ with respect to the lattice size $N$ for counterwinding (left panel) and cowinding vortices (right panel).]{}[]{data-label="fig:bifsN"}](fig5a "fig:"){width="40.00000%"} ![[Dependence of the bifurcation points $C_p$ and $C_t$ with respect to the lattice size $N$ for counterwinding (left panel) and cowinding vortices (right panel).]{}[]{data-label="fig:bifsN"}](fig5b "fig:"){width="40.00000%"}
----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- -----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Our investigation has revealed that there exists another pair of each vortex type which cannot be obtained via the functions $F^{1,2}$ since they do not satisfy the symmetries of Figure \[fig:Vortex\_Symmetry\]. In the anti-continuum limit these solutions are characterized by taking $r_{n,m} = 1$ for all $(n,m) \neq (\pm5,0)$, with $r_{5,0} = 1 - r_{-5,0} \in \{0,1\}$, and therefore we will hereby refer to these asymmetric cowinding vortices as 1VSs since their value in the complementary norm (\[PNorm\]) is exactly 1 in the anti-continuum limit (and they effectively involve only one vortex instead of two). An example counterwinding vortex profile is given in the bottom left panel of Figure \[fig:profiles1\] and analogously we provide a sample cowinding 1VS in Figure \[fig:profiles2\]. We find that continuing these solutions up from the anti-continuum limit leads to one of $r_{5,0}, r_{-5,0}$ increasing monotonically up from $0$ and the other decreasing monotonically down from $1$. As is demonstrated in Figure \[fig:Continuation\], these asymmetric counterwinding (cowinding) vortices bifurcate through a subcritical (supercritical) pitchfork bifurcation from the 2VS (0VS) branch of symmetric counterwinding vortices and the 0VS branch of symmetric cowinding vortices. This phenomenology is present irrespectively of lattice size but the value of $C_p$ does in fact vary with $N$, as can be observed in Figure \[fig:bifsN\]). Furthermore, these asymmetric solutions exist for all $C \in [0,C_p]$ starting from the anti-continuum limit and are mapped into each other by taking $$\begin{split}
&{\rm Counterwinding:}\quad \phi_{n,m} \mapsto \phi_{-n,m}, \\
&{\rm Cowinding:}\quad \phi_{n,m} \mapsto \phi_{-n,-m},
\end{split}$$ for any $C \geq 0$ for which they exist, as is natural for two branches emerging as a result of a pitchfork bifurcation. We find that, as expected, the dependence of $C_t$ and $C_p$ with respect to the distance between vortices for fixed $N$ gives a monotonic increment of $C_t$ when the distance is increased. Figure \[fig:bifsd\] shows this phenomenon for counterwinding vortices by depicting $C_t$ versus $c$; as $C_t-C_p\lesssim10^{-4}$, the curve $C_p(c)$ is almost indistinguishable from $C_t(c)$ and we have decided not to include it. A monotonic trend for the critical point as a function of $c$ is also obtained in the cowinding case (results not shown here).
![Dependence of the bifurcation points $C_t$ with respect to $c$ for counterwinding vortices with $N=201$. Notice the sharp increasing when $c=50$.[]{data-label="fig:bifsd"}](fig6){width="40.00000%"}
Linear Stability {#subsec:Stability}
----------------
The spectral stability of stationary solutions is obtained by means of Bogoliubov-de Gennes spectral linearization analysis. More specifically, the relevant ansatz of the form $$\psi_{n,m}(t) = \sqrt{\omega}[\psi_{n,m} + \delta(p_{n,m}\mathrm{e}^{\lambda t} + q^*_{n,m}\mathrm{e}^{\lambda^*t})]\mathrm{e}^{-\mathrm{i}\omega t},$$ is introduced into the differential equation (\[dNLS\]). Then, at lowest order in $\delta$ the linear problem can be written as the eigenvalue problem: $$\lambda\begin{pmatrix}
p_{n,m} \\ q_{n,m}
\end{pmatrix} = \mathrm{i}\begin{pmatrix}
2|\phi_{n,m}|^2 - 1 - \frac{C}{2}\Delta & \phi^2_{n,m} \\
-(\phi^2_{n,m})^* & 1 - 2|\phi_{n,m}|^2 + \frac{C}{2}\Delta
\end{pmatrix}\begin{pmatrix}
p_{n,m} \\ q_{n,m}
\end{pmatrix}.$$ As in the single vortex case of [@1Vortex], there will be eigenvalues with negative Krein signature/energy (the latter being defined as $K=\sum_{n,m} |p_{n,m}|^2 - |q_{n,m}|^2$) hereby denoted as NEEs, as well as continuous spectrum, which of course will be discretized since we are numerically identifying these vortices on a finite lattice. At the anti-continuum limit nVSs of all types, with $n = 0,1,2$, have exactly $n$ pairs of degenerate (between them) NEEs with $\lambda=\pm\mathrm{i}$ corresponding to excited sites, and $N^2-2n$ eigenvalues with $\lambda = 0$ corresponding to the non-excited sites.
We begin with a discussion of counterwinding vortices. Moving into $C
> 0$ we find that the degeneracy of $\lambda = 0$ eigenvalues (and of NEEs for 2VSs) is broken so that the continuous bands on the imaginary axis become bounded away from the origin of the complex plane. As illustrated also in the case of the single DNLS vortex [@1Vortex] (which, at the same time, is based in the analysis for 1D dark solitons performed in [@johkiv]), the background nodes lead, for finite $C$, to a continuous spectrum extending over the interval $\lambda \in \mathrm{i}[-\sqrt{16C^2 + 8C},\sqrt{16C^2 + 8C}]$ along the imaginary axis. At the same time, the absolute value of the NEEs decreases [in a quasi-linear way]{}, and we find that there exists a critical value, denoted as [$C_c\approx0.080$]{}, for which one of them enters the continuous band, creating a cascade of Hamiltonian Hopf and inverse Hamiltonian Hopf bifurcations, thus leading to oscillatory instabilities. The dependence of the NEEs for $C<C_c$ is almost the same, up to a $\sim10^{-4}$ difference, between 2VS and 1VS. Following the analysis performed in [@1Vortex], the NEEs can be approximated by $\lambda\approx\pm\mathrm{i}(1-2C)$, which leads to a collision with the continuum band at $C=(2\sqrt{3}-3)/6\approx0.077$, in good agreement with the numerical result. As in the single vortex case, due to the inverse Hamiltonian Hopf bifurcation there will be linearized stability windows that would not appear if the continuous spectrum were dense. In the limit $N \to \infty$ we expect to find that the vortex would be oscillatorily unstable whenever $C > C_c$. Notice that the value of $C_c$ decreases when the distance between vortices is decreased; in fact, for $c=1$, $C_c\approx0.071$.
Figure \[fig:stab1\] depicts the dependence on $C$ of the real and imaginary part of the eigenvalues for counterwinding 2VSs, 1VS, and 0VSs. In these images we have used a $41\times 41$ lattice, but as previously remarked, the results remain nearly identical for different lattice sizes. We can see that the 1VS and 0VSs are exponentially unstable for every $C\geq 0$ for which they respectively exist since they both have eigenvalues $\lambda$ whose real parts are only vanishing at their bifurcation points $C_p$ and $C_t$, respectively. In Figure \[fig:stab2\] we provide a zoomed in version of Figure \[fig:stab1\] close to $C_p$ and $C_t$ for the real part of the eigenvalues of 2VSs and the imaginary part of the eigenvalues of 0VSs, respectively. Here we find that one of the NEE pairs arrives at $\lambda = 0$ at $C = C_p$ so that the vortex pair becomes exponentially unstable past the bifurcation point due to its subcritical pitchfork bifurcation with the 1VS solution branch. The continuation past this critical point of the subsequently exponentially unstable 2VS solution branch stops when the remaining NEE pair reaches $\lambda = 0$ at $C = C_t$. There, the collision occurs with the 0VS solution branch and the termination of both of these branches takes place. No stationary solutions involving two counterwinding vortices at such a distance can be identified past this critical point. Both (the 0VS and the 2VS) branches have a positive real eigenvalue pair and a zero eigenvalue pair at the bifurcation point of $C=C_t$. Notice that supposing the previous linear dependence of the NEEs $\lambda=\pm\mathrm{i}(1-2C)$ leads to a zero eigenvalue at $C=0.5$, a value which is very close to the bifurcation point observed in Figure \[fig:bifsN\].
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
![Dependence with respect to $C$ of the (top) real and (bottom) imaginary parts of the eigenvalues of counterwinding (left) 2VSs, (middle) 1VSs, and (right) 0VSs. In every case, a $41\times41$ lattice has been used. Notice that among the 3 branches only the 2VS branch is stable up to a critical $C_c$ away from the anti-continuum limit of $C=0$.[]{data-label="fig:stab1"}](fig7a "fig:"){width="6cm"} ![Dependence with respect to $C$ of the (top) real and (bottom) imaginary parts of the eigenvalues of counterwinding (left) 2VSs, (middle) 1VSs, and (right) 0VSs. In every case, a $41\times41$ lattice has been used. Notice that among the 3 branches only the 2VS branch is stable up to a critical $C_c$ away from the anti-continuum limit of $C=0$.[]{data-label="fig:stab1"}](fig7b "fig:"){width="6cm"} ![Dependence with respect to $C$ of the (top) real and (bottom) imaginary parts of the eigenvalues of counterwinding (left) 2VSs, (middle) 1VSs, and (right) 0VSs. In every case, a $41\times41$ lattice has been used. Notice that among the 3 branches only the 2VS branch is stable up to a critical $C_c$ away from the anti-continuum limit of $C=0$.[]{data-label="fig:stab1"}](fig7c "fig:"){width="6cm"}
![Dependence with respect to $C$ of the (top) real and (bottom) imaginary parts of the eigenvalues of counterwinding (left) 2VSs, (middle) 1VSs, and (right) 0VSs. In every case, a $41\times41$ lattice has been used. Notice that among the 3 branches only the 2VS branch is stable up to a critical $C_c$ away from the anti-continuum limit of $C=0$.[]{data-label="fig:stab1"}](fig7d "fig:"){width="6cm"} ![Dependence with respect to $C$ of the (top) real and (bottom) imaginary parts of the eigenvalues of counterwinding (left) 2VSs, (middle) 1VSs, and (right) 0VSs. In every case, a $41\times41$ lattice has been used. Notice that among the 3 branches only the 2VS branch is stable up to a critical $C_c$ away from the anti-continuum limit of $C=0$.[]{data-label="fig:stab1"}](fig7e "fig:"){width="6cm"} ![Dependence with respect to $C$ of the (top) real and (bottom) imaginary parts of the eigenvalues of counterwinding (left) 2VSs, (middle) 1VSs, and (right) 0VSs. In every case, a $41\times41$ lattice has been used. Notice that among the 3 branches only the 2VS branch is stable up to a critical $C_c$ away from the anti-continuum limit of $C=0$.[]{data-label="fig:stab1"}](fig7f "fig:"){width="6cm"}
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
![(left) Imaginary part of the eigenvalues of counterwinding 2VSs, and (right) real part of the eigenvalues of counterwinding 0VSs, close to the pitchfork and turning points. The collision of the two branches occurs at $C_t$, where they disappear in a turning point bifurcation.[]{data-label="fig:stab2"}](fig8a "fig:"){width="6cm"} ![(left) Imaginary part of the eigenvalues of counterwinding 2VSs, and (right) real part of the eigenvalues of counterwinding 0VSs, close to the pitchfork and turning points. The collision of the two branches occurs at $C_t$, where they disappear in a turning point bifurcation.[]{data-label="fig:stab2"}](fig8b "fig:"){width="6cm"}
---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
The case of cowinding vortices is similar. Moving away from the anti-continuum limit there exists a $C_c \in (0,C_p)$ for which the NEEs of the cowinding 2VS collide with the continuous band, creating a subsequent cascade of Hamiltonian Hopf and inverse Hamiltonian Hopf bifurcations. This gives an oscillatory instability for the cowinding 2VS state for $C$ above $C_c$. We note that for $C<C_c$ the linear dependence of the NEEs is the same as in the counterwinding case, and, consequently, the value of $C_c$ is also the same for both cases.
The major difference between the counterwinding and the cowinding spectra concerns the location of the pitchfork bifurcation (and the branches it involves). Recall that in the counterwinding case the pitchfork bifurcation takes place on the 2VS bifurcation curve, whereas in the cowinding case the pitchfork bifurcation takes place on the 0VS bifurcation curve. Hence, the NEEs of the 2VSs in the cowinding case do not arrive at $\lambda = 0$ prior to reaching $C = C_t$. Therefore the cowinding 2VSs only exhibit oscillatory instabilities as the turning point is approached. At the turning point, one of the NEE pairs becomes zero. On the other hand, it is the 1VS branch that collides in the supercritical pitchfork bifurcation with the 0VS branch. The latter possesses 2 real eigenvalue pairs in the vicinity of the anti-continuum limit, while it only has 1 such in the vicinity of the turning point (past the pitchfork bifurcation). The 1VS branch, as in the counterwinding case, carries one real eigenvalue pair and a potential additional oscillatory instability due to an NEE mode.
Dynamic Solutions {#subsec:Dynamics}
-----------------
For the convenience of the reader, this subsection is broken down into two distinct components - one for counterwinding vortices and one for cowinding vortices.
### Counterwinding Vortices
In the continuum limit it is known that counterwinding vortices move in parallel along a straight line, whereas here numerical investigations will reveal that this is not the case in the context of our lattice dynamical system (\[dNLS\]). Here we will focus on the instabilities of the 2VS solutions for $C \in (C_c,C_t)$ to explore the expected dynamics for solutions that start very close to our stationary 2VSs. All images of simulations in this section are taken for an $81\times81$ lattice in an effort to minimize the boundary effects on the dynamics.
We first begin by adding a small random perturbation ($\sim 10^{-8}$) to 2VSs with $C$ in the interval $(C_c,C_t)$. We have found that all simulations lead to upward (i.e., perpendicular to the axis connecting the two vortices) translating vortices which eventually collide at some finite time step. This can be observed in Figure \[fig:dyncounter1\] where we take $C = 0.25$ and provide a number of snapshots of the dynamic evolution. Notice that the counterwinding vortices appear to be propagating upward with a slight bend toward each other, leading [at $t\approx360$]{} for this particular simulation to their collision and pair annihilation. We note that our random perturbation does have the effect of breaking the $\psi_{n,m} = \psi_{-n,m}$ symmetry of the counterwinding vortices, and therefore we have also explored initial conditions which preserved this symmetry. That is, if our solution is given by $\psi_{n,m} = r_{n,m}\mathrm{e}^{\mathrm{i}\theta_{n,m}}$, then we introduce the initial condition $\psi_{n,m}(0) = (r_{n,m}+\delta)\mathrm{e}^{\mathrm{i}\theta_{n,m}}$ so that $\psi_{n,m}(0) = \psi_{-n,m}(0)$. In this case the evolution in $t$ preserves the $(n,m)\mapsto(-n,m)$ symmetry of the initial condition, but again we find that the vortices eventually collide and annihilate each other. Moreover, this dynamical outcome arises both for the case of oscillatory instabilities (as in Fig. \[fig:dyncounter1\]), and for that of exponential instabilities (not shown here).
![Dynamics of (\[dNLS\]) with a randomly perturbed initial condition near the stationary counterwinding 2VS at $C=0.25$. At this parameter value the 2VS pair only possesses oscillatory instabilities. As can be seen, the vortices translate, yet also approach each other and eventually pair-wise annihilate. [The panels depict the density $|\psi_{n,m}|^2$ at selected values of time.]{}[]{data-label="fig:dyncounter1"}](fig9){width="12cm"}
For values of the coupling constant $C$ taken beyond $C_t$ we no longer have stationary counterwinding vortex solutions. We do however take the stationary solutions near $C = C_t$ and use them as initial conditions for coupling values well beyond the turning point. The aim of this is to explore the behavior of the vortex pair as the continuum limit is approached. Interestingly our temporal evolution reveals that the counterwinding vortices continue to propagate upward and eventually collide and annihilate each other. We further find that as the coupling constant $C$ grows larger, it takes a longer time for the vortices to approach each other and collide. In § \[sec:Continuum\] we will present formal arguments which appear to explain some of this behaviour. Our observations (and formal arguments to follow) thus suggest that the genuine traveling of counterwinding vortices at the continuum limit is a singular behavior that is “destroyed” by discreteness, rather than a behavior that potentially bifurcates at some finite value of $C$. Instead, discreteness introduces a (weaker, the larger the coupling strength) lateral dynamical motion of the vortex pair, leading eventually to its apparently generic for finite $C$ annihilation.
### Cowinding Vortices
We now numerically observe the dynamical evolution of solutions that start near our cowinding vortices. We recall that, as discussed above, the cowinding 2VSs only experience oscillatory instabilities. As a result of these, the waveforms which are initialized near these stationary solutions start to rotate about the $(n,m) = (0,0)$ lattice site but eventually slow down their rotation and appear to stop, resulting in a “pseudo-stationary” cowinding vortex configuration. Nevertheless, notice that it is less straightforward to extract the asymptotic scenario in this case in part due to the residual radiation present in the dynamical lattice. A relevant evolution is exemplified in Figure \[fig:dyncow1\] where we provide snapshots of the time stepping with initial condition given by a random perturbation of a 2VS state at $C = 0.23$. It is important to notice, however, that the dynamically resulting stationary configuration involves vortices at a larger distance than the initial one.
We also report that the exponential instabilities of the 0VSs appear to lead to vortices which rigidly rotate about the $(n,m) = (0,0)$ lattice for all $t\geq 0$. It is important to mention that such rotation does not happen at constant inter-center separation between the vortices. Rather, as we see in more detail also below, the distance between the cowinding pair member vortices increases over time in a spiraling out motion (see below for a demonstration of such a spiralling dynamical example).
![Dynamics of (\[dNLS\]) with a randomly perturbed initial condition near the stationary cowinding 2VS at $C=0.23$. The dynamical evolution leads to rotation around the $(n,m) = (0,0)$ lattice site, but then begin to slow down and appear to halt resulting in a rotated (and with larger distance between the vortices than the original one) vortex configuration. [The panels depict the density $|\psi_{n,m}|^2$ at selected values of time.]{}[]{data-label="fig:dyncow1"}](fig10 "fig:"){width="12cm"}\
Stationary cowinding vortex solutions no longer exist for values of the coupling constant $C$ taken beyond $C_t$, and therefore we will explore what happens when a stationary 2VS state taken at some $C$ slightly below $C_t$ is used as an initial condition in (\[dNLS\]) for coupling $C > C_t$. Our temporal evolution demonstrates that these cowinding vortices hold their shape but begin to rigidly rotate about the lattice site $(n,m) = (0,0)$, as is demonstrated in Figure \[fig:dyncow2\]. This type of temporal dynamics resembles the corresponding evolution in the continuum limit ($C\to \infty$) of (\[dNLS\]), however with a significant modification. In particular, over time the vortices rotate at larger distances from each other and do so more slowly (i.e., at smaller angular momentum). This is the by-product of discreteness once again presumably destroying the perfectly rotating continuum states, in favor of progressively separating (non-periodic) discrete ones. As the continuum limit is approached, this lateral motion is still present although it becomes weaker, suggesting that it only disappears in the (singular) continuum limit.
![Dynamics of (\[dNLS\]) with a stationary cowinding 2VSs at $C = 0.498$ used as an initial condition with $C=0.51$. Note that at $C = 0.51$ we have no longer stationary cowinding vortices and now we can see that the vortices begin to rotate around each other, spiralling outward (i.e., with a growing distance between them) over time. [The panels depict the density $|\psi_{n,m}|^2$ at selected values of time.]{}[]{data-label="fig:dyncow2"}](fig11 "fig:"){width="12cm"}\
The Continuum Equation {#sec:Continuum}
======================
In this section we provide formal arguments in an attempt to describe some of the expected counter- and cowinding vortex dynamics in (\[dNLS\]) for $\varepsilon$ (or equivalently $C$) large. More specifically, our aim here is to illustrate the plausibility of the non-existence of rigidly translating (for counterwinding) or rotating (for cowinding) vortex states in the genuinely discrete DNLS problem. We begin by noting that taking $\varepsilon \to \infty$ in (\[dNLS\]) marks a return to the well-studied non-linear Schrödinger equation in two continuous spatial dimensions given by [@siambook] $$\label{NLS}
\mathrm{i}\frac{\partial\psi}{\partial t} - |\psi|^2\psi + \frac{\partial^2\psi}{\partial x^2} + \frac{\partial^2\psi}{\partial y^2}= 0, \quad (x,y) \in \mathbb{R}^2,$$ where $\psi = \psi(x,y,t)$ is a complex-valued function. Equation (\[NLS\]) possesses an important symmetry property: if $\psi(x,y,t)$ is a solution to (\[NLS\]) then so is $$\tilde{\psi}(x,y,t) = \psi(\cos(\theta)(x+p_1) - \sin(\theta)(y + p_2),\sin(\theta)(x + p_1) + \cos(\theta)(y + p_2),t),$$ for any angle $\theta \in S^1$ and translation $(p_1,p_2)\in\mathbb{R}^2$. These rotations and translations together form the special Euclidean group, often denoted as ${\bf SE}(2)$, and equation (\[NLS\]) precisely is said to be invariant with respect to the action of this group. Given a function $\psi:\mathbb{R}^2 \to \mathbb{C}$, the [*group orbit*]{} of $\psi$ is given by the set $$\begin{split}
{\bf SE}(2)\psi := \{&\psi(\cos(\theta)(x+p_1) - \sin(\theta)(y + p_2),\sin(\theta)(x + p_1) + \cos(\theta)(y + p_2)): \\ &\quad \theta\in S^1,\ (p_1,p_2)^T\in\mathbb{R}^2\},
\end{split}$$ which is simply the application of every element of ${\bf SE}(2)$ to the function $\psi$. Then, a group orbit $X$ is a [*relative equilibrium*]{} if the flow of (\[NLS\]) leaves $X$ invariant. That is, relative equilibria of (\[NLS\]) are equilibrium solutions in a moving coordinate frame. A trivial example of a relative equilibrium would be any equilibrium of (\[NLS\]) since any function trivially belongs to its own group orbit.
Counterwinding vortex solutions of (\[NLS\]) linearly propagate with constant nonzero speed [@siambook], meaning that their temporal evolution is described by a continuous linear translation and therefore they belong to their group orbit for all $t \in \mathbb{R}$. Similarly, cowinding vortex solutions of (\[NLS\]) rotationally propagate with constant nonzero angular frequency, meaning that their temporal evolution is described by a continuous rotation and therefore belong to their group orbit for all $t \in \mathbb{R}$. Hence, cowinding and counterwinding vortex solutions are relative equilibria of (\[NLS\]) and in turn their respective group orbits define invariant manifolds in some appropriate complex-valued space of functions with domain $\mathbb{R}^2$. Most importantly, these invariant manifolds are exactly three-dimensional, corresponding to the three degrees of freedom of the special Euclidean group [**SE**]{}(2) (i.e. two dimensions of translations and one dimension of rotations). Much work has been undertaken to capture the qualitative dynamics of relative equilibrium solutions using the group orbit, particularly to understand a closely related example, namely the dynamics of spiral waves as solutions to reaction-diffusion equations [@Ashwin; @Victor3; @SSW]. We will use some of these theoretical results in an attempt to understand our observations for (\[dNLS\]) far from the anti-continuous limit.
An effective way to understand the dynamics of (\[dNLS\]) with large $\varepsilon$ is to apply an inhomogeneous symmetry breaking perturbation to (\[NLS\]) which preserves only the symmetries of a square lattice [@Victor1; @Victor2]. Such symmetry-breaking perturbations can be used to mimic the effect of discretizing space by breaking the continuous translational and rotational symmetries of the two-dimensional non-linear Schrödinger equation (\[NLS\]). Hence, let us consider a small parameter $0 \leq \delta \ll 1$ and some sufficiently smooth function $\mathcal{F}$ so that we perturb (\[NLS\]) as $$\label{NLS_Pert}
\mathrm{i}\frac{\partial\psi}{\partial t} - |\psi|^2\psi + \frac{\partial^2\psi}{\partial x^2} + \frac{\partial^2\psi}{\partial y^2} + \delta\mathcal{F}(x,y,\psi,\delta)= 0.$$ The specific form of $\mathcal{F}$ is not important and can be generalized, but here we will assume that it is $1$-periodic and even in both $x$ and $y$, and linear in $\psi$. The linearity of $\mathcal{F}$ with respect to $\psi$ allows one to eliminate the oscillatory component $\mathrm{e}^{-\mathrm{i}\omega t}$ and still obtain an autonomous equation, as was done for the discrete non-linear Schrödinger equation (\[dNLS\]) in the previous sections. One should note that an important, and possibly motivating, example of such a function $\mathcal{F}$ would be $$\mathcal{F}(x,y,\psi,\delta) = V(x,y)\psi,$$ where $V(x,y)$ is a potential that respects the symmetries of the two-dimensional integer lattice. Therefore, our goal is to hypothesize how the dynamics of the invariant manifolds for the unperturbed Schrödinger equation (\[NLS\]) given by the group orbits will perturb for $0 < \delta \ll 1$. This should inform us about what to expect regarding the behaviour of the cowinding and counterwinding vortices in the discrete spatial context of (\[dNLS\]).
Counterwinding Vortices
-----------------------
We begin by focusing on the case of counterwinding vortices. Such vortex solutions to (\[NLS\]) can be found by using the ansatz $$\label{CounterAnsatz}
\psi(x,y,t) = A(x,y-vt)\mathrm{e}^{-\mathrm{i}\omega t},$$ with $\xi = y-vt$, and constant $v \in \mathbb{R}$. We refer to $A$ as the profile of the counterwinding vortex pair, and we note these counterwinding vortices of (\[NLS\]) are partially characterized by their $x \mapsto -x$ symmetry, implying that the profile $A$ is even in $x$. The set of all functions which are even in $x$ is flow-invariant for (\[NLS\]), and hence an ansatz of the form (\[CounterAnsatz\]) represents the intersection of this flow-invariant subspace of even functions and the group orbit of counterwinding vortices. The profile $A$ can be obtained by solving $$\label{NLS_Counter}
A_{xx} + A_{\xi\xi} + (\omega - |A|^2)A - \mathrm{i}vA_{\xi} = 0,$$ where the subscripts denote partial differentiation. We assume that for some fixed $\omega > 0$, there exists a real $\bar{v} \neq 0$ such that a counterwinding vortex profile $A_0$ is a solution of (\[NLS\_Counter\]) with $v = \bar{v}$. That is, $$\psi(x,y,t) = A_0(x,y-\bar{v}t)\mathrm{e}^{-\mathrm{i}\omega t}$$ is a counterwinding vortex pair solution of (\[NLS\]) and that $A(-x,y-vt) = A(x,y-vt)$ for all $(x,y,t)$. The ansatz (\[CounterAnsatz\]) implies that our solution is propagating linearly parallel to the $y$-axis, but recall that the ${\bf SE}(2)$ invariance of (\[NLS\]) implies that we could make it propagate in any direction we want.
Now equation (\[NLS\_Pert\]) is a non-autonomous perturbation of (\[NLS\]), which, in turn, yields that the flow along the perturbed invariant manifold coming from the group orbit of counterwinding vortices will also be non-autonomous. Moreover, since the set of all functions which are even in $x$ is again flow-invariant for (\[NLS\_Pert\]), we again restrict ourselves to the intersection of this flow-invariant subspace and the perturbed invariant manifold. Let us assume that the function $A_\delta(x,y)$ is the profile of a counterwinding vortex solution to (\[NLS\_Pert\]) for $0 \leq \delta \ll 1$ which is even in $x$. Then, the results of [@Victor1; @Victor2] lead one to believe that the continued counterwinding vortex solution of (\[NLS\_Pert\]) for small $\delta > 0$ is of the form $$\label{NLS_Counter2}
\psi(x,y,t) = A_\delta(\cos(\alpha(x,y,\delta))\xi_1 - \sin(\alpha(x,y,\delta))\xi_2,\sin(\alpha(x,y,\delta))\xi_1 + \cos(\alpha(x,y,\delta))\xi_2)\mathrm{e}^{-\mathrm{i}\omega t},$$ where $\xi_1 = x - v_x(x,y,\delta)t$ and $\xi_2 = y - v_y(x,y,\delta)t$. Moreover, the functions $\alpha,v_x,$ and $v_y$ are uniformly bounded, $\alpha$ is $1$-periodic in both $x$ and $y$, and satisfy $$\alpha(x,y,\delta) = \mathcal{O}(\delta), \quad v_x(x,y,\delta) = \mathcal{O}(\delta), \quad v_y(x,y,\delta) = \bar{v} + \mathcal{O}(\delta),$$ where $\bar{v}$ is the speed of the counterwinding vortex from the unperturbed equation (\[NLS\]). One should interpret the function $\alpha(x,y,\delta)$ as introducing a slight wobble into the motion of the vortex solution, whereas $v_x(x,y,\delta)$ and $v_y(x,y,\delta)$ describe the inhomogeneous speed of linear propagation in the $x$ and $y$ directions, respectively.
From the form of (\[NLS\_Counter2\]), we have that for any fixed $(a_1,a_2)\in\mathbb{R}^2$, the function $A_\delta$ is constant along the (generically one-dimensional) level sets $$\begin{split}
\cos(\alpha(x,y,\delta))(x - v_x(x,y,\delta)t) - \sin(\alpha(x,y,\delta))(y - v_y(x,y,\delta)t) &= a_1, \\
\sin(\alpha(x,y,\delta))(x - v_x(x,y,\delta)t) + \cos(\alpha(x,y,\delta))(y - v_y(x,y,\delta)t) &= a_2,
\end{split}$$ for each fixed $\delta > 0$ sufficiently small. These curves serve as characteristics for the counterwinding vortex solution to the inhomogeneous equation (\[NLS\_Pert\]). Requiring that the solution (\[NLS\_Counter2\]) is even in $x$ gives that $\alpha$ and $v_y$ are both even in $x$ and $v_x$ is odd in $x$, and these symmetries imply that for every $a_1 \neq 0$ and $a_2\in\mathbb{R}$, the characteristic curve corresponding to the level set $(a_1,a_2)$ and the characteristic curve corresponding to the level set $(-a_1,a_2)$ are continuously mapping into each other by the action $(x,y,t)\mapsto(-x,y,t)$. Furthermore, in the case when $v_x(x,y,\delta) \neq 0$ for all $x \neq 0$, $y\in\mathbb{R}$ and $0 <
\delta \ll 1$, we have that these characteristic curves approach $x =
0$ in either forward or backward $t$. In this case we would observe an $\mathcal{O}(\delta)$ drift in the $x$-direction of the solution to the middle in either forward or backward time. Hence, these heuristic arguments seem to suggest that it is exactly the $n \to -n$ symmetry (the discrete analogue of $x \to -x$ symmetry) of the solutions to the discrete non-linear Schrödinger equation which drives the breakup of solutions we observed previously in the dynamics. Indeed, it is this drift of the vortex centers towards $x=0$ which leads to their pairwise approach and eventual annihilation observed in the dynamics of Fig. \[fig:dyncounter1\].
Cowinding Vortices
------------------
We now initiate a similar exploration for cowinding vortex solutions to show that the $(n,m)\to(-n,-m)$ symmetry of cowinding vortices is expected to drive the breakup observed in simulations of (\[dNLS\]) far from the anti-continuous limit. These vortex solutions to (\[NLS\]) can be found by using the ansatz $$\label{CoAnsatz}
\psi(x,y,t) = B(\cos(\beta t)x - \sin(\beta t)y,\sin(\beta t)x + \cos(\beta t)y)\mathrm{e}^{-\mathrm{i}\omega t},$$ for constants $\beta \neq 0$ and $\omega \geq 0$. We refer to $B$ as the profile of the cowinding vortex pair, and we note that the cowinding vortices of (\[NLS\]) are partially characterized by their $(x,y)\mapsto (-x,-y)$ symmetry, which is imposed by requiring that $B(-x,-y) = B(x,y)$. The set of all functions which are invariant with respect to $(x,y)\mapsto (-x,-y)$ symmetry is flow-invariant for (\[NLS\]), and hence an ansatz of the form (\[CounterAnsatz\]) represents the intersection of this flow-invariant subspace and the group orbit of cowinding vortices. We note that now cowinding vortices are rigidly rotating in space with angular velocity $\beta$, implying that the characteristic curves of solutions of the form (\[CoAnsatz\]) are closed concentric circles about the origin $(x,y) = (0,0)$, as opposed to straight lines in the counterwinding case. We assume that for some fixed $\omega > 0$ there exists a real $\beta^* \neq 0$ and a profile $B_0$ so that $$\psi(x,y,t) = B_0(\cos(\beta^* t)x - \sin(\beta^* t)y,\sin(\beta^* t)x + \cos(\beta^* t)y)\mathrm{e}^{-\mathrm{i}\omega t},$$ is a cowinding vortex solution of (\[NLS\]) satisfying $B_0(-x,-y) = B_0(x,y)$ for all $(x,y) \in \mathbb{R}^2$.
As previously remarked, the equation (\[NLS\_Pert\]) is a non-autonomous perturbation of (\[NLS\]), and hence the perturbed invariant manifold coming from the group orbit of counterwinding vortices will also be non-autonomous. Moreover, since the set of all functions which are invariant with respect to $(x,y)\mapsto (-x,-y)$ symmetry is again flow-invariant for (\[NLS\_Pert\]), we again restrict ourselves to the intersection of this flow-invariant subspace and the perturbed invariant manifold. Then, let us assume that the function $B_\delta(x,y)$ is the profile of a cowinding vortex solution to (\[NLS\_Pert\]) for $0 \leq \delta \ll 1$, which satisfies $B_\delta(-x,-y) = B_\delta(x,y)$. This leads one to conjecture that the continued cowinding vortex solution of (\[NLS\_Pert\]) for small $\delta > 0$ is of the form $$\label{NLS_Co2}
\psi(x,y,t) = B_\delta(\cos(\beta(x,y,\delta))\zeta_1 - \sin(\beta(x,y,\delta))\zeta_2,\sin(\beta(x,y,\delta))\zeta_1 + \cos(\beta(x,y,\delta))\zeta_2)\mathrm{e}^{-\mathrm{i}\omega t},$$ where $\zeta_1 = x - d_x(x,y,\delta)t$ and $\zeta_2 = y - d_y(x,y,\delta)t$. The functions $\beta,d_x,$ and $d_y$ are uniformly bounded and satisfy $$\beta(x,y,\delta) = \beta^* + \mathcal{O}(\delta), \quad d_x(x,y,\delta) = \mathcal{O}(\delta), \quad d_y(x,y,\delta) = \mathcal{O}(\delta),$$ where $\beta^*$ is the rotational velocity of the unperturbed cowinding vortex. Hence, we see that we should expect $\mathcal{O}(\delta)$ drifts in both the $x$- and $y$-directions.
From the form of (\[NLS\_Co2\]), we have that for any fixed $(b_1,b_2)\in\mathbb{R}^2$, the function $B_\delta$ is constant along the (generically one-dimensional) level sets $$\begin{split}
\cos(\beta(x,y,\delta))(x - d_x(x,y,\delta)t) - \sin(\beta(x,y,\delta))(y - d_y(x,y,\delta)t) &= b_1, \\
\sin(\beta(x,y,\delta))(x - d_x(x,y,\delta)t) + \cos(\beta(x,y,\delta))(y - d_y(x,y,\delta)t) &= b_2,
\end{split}$$ for each fixed $\delta > 0$ sufficiently small. These curves serve as characteristics for the cowinding vortex solution to the inhomogeneous equation (\[NLS\_Pert\]). Requiring that the solution (\[NLS\_Co2\]) satisfies $\psi(-x,-y,t) = \psi(x,y,t)$ requires that $$\beta(-x,-y,\delta) = \beta(x,y,\delta), \quad d_x(-x,-y,\delta) = -d_x(x,y,\delta), \quad d_y(-x,-y,\delta) = -d_y(x,y,\delta),$$ for all $(x,y)\in\mathbb{R}^2$ and sufficiently small $\delta \geq 0$. Note that this implies that $d_x(0,0,\delta) = d_y(0,0,\delta) = 0$. Hence, these symmetries imply that for every $(b_1,b_2) \neq (0,0)$, the characteristic curve corresponding to the level set $(b_1,b_2)$ and the characteristic curve corresponding to the level set $(-b_1,-b_2)$ are continuously mapping into each other by the action $(x,y,t)\mapsto(-x,-y,t)$. Furthermore, in the case when $d_x(x,y,\delta)\cdot d_y(x,y,\delta) > 0$ for all $(x,y)\in\mathbb{R}\setminus\{(0,0)\}$ and $0 < \delta \ll 1$, we have that these characteristic curves approach $(x,y) = (0,0)$ in either forward or backward $t$. In this case we would observe an $\mathcal{O}(\delta)$ spiral into to the centre $(x,y) = (0,0)$ in either forward or backward time. Hence, as before, we have provided heuristic arguments detailing the behaviour of (\[dNLS\]) near the continuum limit, i.e. $\varepsilon \gg 0$. Indeed, this is also in line with our observations namely the finding that over (positive) time, the distance between the vortices slightly increases, i.e., that they are spiraling outwards from the center. As they do so, once again a rigidly rotating configuration cannot be reached; cf. Fig. \[fig:dyncow1\], except at the continuum limit where $C \rightarrow \infty$.
Conclusions and Future Challenges
=================================
In the present work, we have extended considerations associated with a single vortex in a discrete nonlinear Schr[ö]{}dinger setting to ones involving vortex pairs of either the same or of opposite charges. These configurations in the continuum limit of the equation either rotate rigidly (for same charge) or translate with constant speed (for opposite charges). These tendencies are contrasted with the limit of vanishing coupling, the so-called anti-continuum limit which halts the vortex motion. This raises the interesting question of what happens “in between”, i.e., for coupling strengths between $C \rightarrow 0^+$ and $C \rightarrow \infty$. We find that in the vicinity of the vanishing coupling, stationary configurations can exist involving the two vortices (of either same or of opposite charge). These configurations present an interesting sequence of bifurcation phenomena involving pitchfork (symmetry breaking) bifurcations, as well as saddle-center, turning-point ones. The latter lead to the termination of the stationary multi-vortex branches, raising once again the question of how the continuum limit group orbit (rotation or translation) motions arise. Indeed, the answer to this question is non-trivial too. We find that vortex pairs initialized past these turning points cannot rigidly rotate or steadily translate. Rather, in the cowinding case instead of rotating, they spiral out. In the counterwinding one, rather than translate, they approach each other (while moving) and eventually annihilate. The rate of these lateral motions appears to decrease as the coupling increases, and it seems reasonable to conjecture that these motions only disappear altogether in the singular continuum limit.
Our numerical computations, we believe, shed some light on the system’s phenomenology. However, admittedly, they also raise numerous interesting questions for future investigation both at the mathematical and at the computational, as well as at the physical level. More specifically, quantifying the rate of spiraling for the cowinding case, and that of lateral approach in the counterwinding one (as a function of the coupling strength $C$) is an important question for future analytical and numerical consideration. On the other hand, proving rigorously the non-existence of discrete rotation or translation for finite $C$ is of interest in its own right. Providing a rigorous characterization of the stability of the 0VS, 1VS and 2VS states is also an interesting task from the opposite, near-anti-continuum limit. Naturally, all of these considerations are worthwhile to extend in the context of three-dimensional systems. There, it is well-known that configurations such as vortex lines and vortex rings represent the principal topologically charged entities in the dynamics [@siambook]. Presently, we are not aware of any studies exploring systematically the stability of such states as regards either a single structure or pairs thereof. Such a study would be particularly interesting because, e.g., for vortex rings even a single one is subject to translation in the continuum limit [@siambook]. Hence it is relevant to explore the impact of discreteness near the $C=0$ limit. Moreover, remarkable phenomena such as leapfrogging dynamics arise, e.g., as a result of the interaction of multiple vortex rings [@caplan], hence it is natural to inquire about their fate in the discrete realm. Such studies are currently in progress and will be reported in future publications.
Acknowledgements {#acknowledgements .unnumbered}
================
J.J.B. was supported by an NSERC PDF. This material is based upon work supported by the National Science Foundation under Grant No. PHY-1602994 and under Grant No. DMS-1809074 (P.G.K.). P.G.K. also acknowledges support from QNRF via the program NPRP-9-329-1-067. J.C.-M. thanks financial support from MAT2016-79866-R project (AEI/FEDER, UE).
[99]{}
M.J. Ablowitz and J.T. Cole, Phys. Rev. A [**96**]{}, 043868 (2017).
P. Ashwin, I. Melbourne, Nonlinearity [**10**]{}, 595 (1997).
J.J. Bramburger, J. Dyn. Differ. Equ. [**31**]{}, 469 (2019).
R.M. Caplan, J.D. Talley, R. Carretero-Gonz[á]{}lez, P.G. Kevrekidis, Phys. Fluids [**26**]{}, 097101 (2014).
L. Charette, V.G. LeBlanc, SIAM J. Appl. Dyn. Syst. [**13**]{}, 1694 (2014).
D.N. Christodoulides, F. Lederer, and Y. Silberberg, Nature **424**, 817 (2003);
J. Cuevas, G. James, P.G. Kevrekidis, and K.H.J. Law, Physica D [**238**]{}, 1422 (2009).
H.S. Eisenberg, Y. Silberberg, R. Morandotti, A.R. Boyd, and J. S. Aitchison Phys. Rev. Lett. [**81**]{}, 3383 (1998).
H.S. Eisenberg, Y. Silberberg, R. Morandotti, and J.S. Aitchison, Phys. Rev. Lett. [**85**]{}, 1863 (2000).
A.L. Fetter, Rev. Mod. Phys. [**81**]{}, 647 (2009).
A.L. Fetter, A.A. Svidzinsky, J. Phys.-Condens. Mat. [**13**]{}, R135 (2001).
J.W. Fleischer, G. Bartal, O. Cohen, O. Manela, M. Segev, J. Hudock, and D. N. Christodoulides, Phys. Rev. Lett. [**92**]{}, 123904 (2004).
M. Golubitsky, V.G. LeBlanc, I. Melbourne, J. Nonlinear Sci. [**7**]{}, 557 (1997).
R. Iwanow, D.A. May-Arrioja, D.N. Christodoulides, G.I. Stegeman, Y. Min, and W. Sohler, Phys. Rev. Lett. [**95**]{}, 053902 (2005).
M. Johansson, and Yu.S. Kivshar, Phys. Rev. Lett. [**82**]{}, 85 (1999).
P.G. Kevrekidis, [*The Discrete Nonlinear Schrödinger Equation*]{}, Springer-Verlag (Heidelberg, 2009).
P.G. Kevrekidis, D.J. Frantzeskakis, R. Carretero-Gonz[á]{}lez, [*The defocusing nonlinear Schr[ö]{}dinger equation: from dark solitons and vortices to vortex rings*]{}, SIAM (Philadelphia, 2015).
P.G. Kevrekidis, I.G. Kevrekidis and A.R. Bishop, Phys. Lett. A [**279**]{}, 361 (2001).
P.G. Kevrekidis, H. Susanto, and Z. Chen, Phys. Rev. E 74, 066606 (2006).
P. Kitanov, V.G. LeBlanc, SIAM J. Appl. Dyn. Syst. [**16**]{}, 16 (2017).
H. Kim, G. Zhu, J.V. Porto, and M. Hafezi, Phys. Rev. Lett. [**121**]{}, 133002 (2018).
K.J.H. Law, H. Susanto, and P.G. Kevrekidis, Phys. Rev. A 78, 033802 (2008).
F. Lederer, G.I. Stegeman, D.N. Christodoulides, G. Assanto, M. Segev, and Y. Silberberg, Phys. Rep. [**463**]{}, 1 (2008).
D. Leykam and Y.D. Chong, Phys. Rev. Lett. [**117**]{}, 143901 (2016).
R. Morandotti, U. Peschel, J.S. Aitchison, H.S. Eisenberg, and Y. Silberberg, Phys. Rev. Lett. [**83**]{}, 2726 (1999).
O. Morsch and M. Oberthaler, Rev. Mod. Phys. [**78**]{}, 179 (2006).
D.N. Neshev, T.J. Alexander, E.A. Ostrovskaya, Yu. S. Kivshar, H. Martin, I. Makasyuk, and Z. Chen, Phys. Rev. Lett. [**92**]{}, 123903 (2004).
M.C. Rechtsman, J.M. Zeuner, Y. Plotnik, Y. Lumer, D. Podolsky, F. Dreisow, S. Nolte, M. Segev, and A. Szameit, Nature [**496**]{}, 196 (2013).
C.E. R[ü]{}ter, K.G. Makris, R. El-Ganainy, D.N. Christodoulides, M. Segev, and D. Kip, Nature Phys. [**6**]{}, 192 (2010).
B. Sandstede, A. Scheel, C. Wulff, J. Differ. Equations [**141**]{}, 122 (1997).
H. Susanto and M. Johansson, Phys. Rev. E [**72**]{}, 016605 (2005).
| |
“I want to make my mom a cake for Mother’s Day,” announced Katherine, age nine. To keep the project a surprise, Katherine’s aunt conspired to whisk her away for a few hours. My job was to help Katherine and Stefanie, her two-year old cousin, bake a cake.
“Piece of cake!” I thought and proceeded to carefully select simple recipes for homemade chocolate cake with chocolate frosting. I phoned my mother, a retired home ec teacher, expecting praise. But no!
“Lon,” she started off, speaking with out-of-character gentleness. “Even simple recipes are too much. I think you should use a cake mix and canned frosting.” I gulped, knowing that even if Mom were right (and aren’t our mothers nearly always right?), it would take time for my brain to accept a boxed cake mix.
Her reasoning was sound though. She knew the girls’ cake would elicit ooohs and aaaahs on Mother’s Day. Afterward, she wanted them to be able to march into their own kitchens to duplicate their first cake, no help from me, no consideration of chocolate ratios or knowing how to measure flour or the difference between baking powder and baking soda.
So a cake mix it was and canned frosting too, though me being me, we made homemade frosting too and the girls did a taste test. (They liked the canned frosting better. Harumph.)
Today? Katherine is a junior at Northwestern and will graduate with a double major in History and International Studies. Stef moves to high school next fall. Will they become cake bakers? We’ll see! Only time will tell! (Update: So far, no cakes! But Katherine is a lawyer in Washington DC and Stef just graduated from engineering school and is off to save the world! Cakes can definitely wait ...)
Another Mom's Recipe
This story came back to me after New Year’s when I fell head-over-heels in love with a lemon cake from a restaurant in the South. When I called, the restaurant owner graciously shared his mother's recipe but asked to remain anonymous.
But oh my. That recipe. When I learned that it called for a cake mix and Jello, my heart nearly broke.
But I remembered my mom's advice many years before. And you know, even for a "real food" home cook like me, maybe there are times when a cake mix and jello have their place.
This cake is so moist, and so lemony. I love how it’s so easily adapts to other flavors. The restaurant is partial to lemon and orange, I've also tried peppermint and strawberry.
As a layer cake, this cake's a show stopper – so plain (in a good way, like the classic tailored lines of so many of the dresses at the royal wedding last week) and so pretty. I like to think that some of the world’s best pastry chefs got their starts early, with the confidence that comes from a cake mix.
SOUTHERN BELLE LEMON LAYER CAKE
Time to table: 4 hours
Serves 16 for a layer cake, 24 for a 9x13
-
LEMON CAKE
- 1 box lemon cake mix
- 1 small box lemon Jello (sorry, sugar-free Jello doesn’t work)
- Water, eggs and oil as specified by the cake mix
- 4 tablespoons (yes, tablespoons) lemon extract
-
LEMON CREAM CHEESE FROSTING (use half for a 9x13)
- 16 ounces low-fat Neufchatel cream cheese, room temperature
- 2 sticks (1/2 pound) salted butter, room temperature
- 1 small box lemon Jello (sorry, sugar-free doesn’t work)
- 2 tablespoons (yes, tablespoons) lemon extract
- 2 pounds powdered sugar
-
TO GARNISH, OPTIONAL
- Thin lemon slices
- Strawberries, halved at an angle, keeping the stems intact
LEMON CAKE Heat oven according to cake mix box. Spray three round cake pans or one 9x13 cake pan.
In a large bowl, mix together cake mix and Jello, smashing any lumps with the back of a spoon. Add the water, eggs, oil and lemon extract and use an electric mixer to mix according to package instructions. Turn the batter into the pans or pan and bake according to package instructions. Let cool on racks for at least 30 minutes until fully cool.
LEMON CREAM CHEESE FROSTING With an electric mixer, cream the cream cheese and butter until smooth. Add the Jello and lemon extract, mix until fully incorporated. In four batches, add the powdered sugar, mixing in completely after each addition.
TO ICE Frost the cake, there’s plenty of icing for spreading, enough that I end up with about a quarter leftover.
REFRIGERATE Refrigerate the cake until an hour or so before serving, then bring out to come to room temperature. This cake can be made a day ahead, maybe even two although I’ve not done that.
GARNISH Just before serving, garnish with lemon slices and strawberry halves.
Lemon Layer Cake Assumes 16 slices and using 75%/100% of frosting: 519/625 Calories; 19/23g Tot Fat; 10/13g Sat Fat; 78/91mg Cholesterol; 417/474mg Sodium; 78/94g Carb; 0g Fiber; 64/80g Sugar; 5/6g Protein. WEIGHT WATCHERS POINTS Old Points 12/14 & PointsPlus 14/17 & SmartPoints 26/31 & Freestyle 26/31
9x13 Cake Assumes 24 pieces and using half the frosting: 279 Calories; 10g Total Fat; 5g Sat Fat; 43mg Cholesterol; 243mg Sodium; 42g Carb; 0g Fiber; 33g Sugar; 3g Protein. WEIGHT WATCHERS POINTS Old Points 6 & PointsPlus 7 & SmartPoints 13 & Freestyle 13
Keeping It Real Everyone knows that a piece of cake is a calorie bomb. But with high-calorie recipes like this one, I some times quake to publish the nutrition information. But I make myself do it to keep it real, to face the reality. It's the ONLY way we'll understand our food choices. Most food magazines, most cookbooks, all the baking food blogs, publish one sweet temptation after another without nutrition information, making it too easy for us to believe (as if we're fooling ourselves ...) that a small piece "can't hurt". And it won't hurt, so long as we know what we're eating and decide if the enjoyment is worth it.
Strawberry Cake
This recipe is so adaptable! (See the recipe above.) For a spring birthday, I made a strawberry layer cake. It was requested by one of the twinzz turning seven. He was most specific! "Strawberry cake. Whipped cream frosting. No real strawberries. Enough cake so everyone can have two slices." Out of the mouths of babes! Here's what I did and what I'd do next time.
CAKE I used a strawberry cake mix, strawberry jello and strawberry extract from Olive Nation. The color was pretty, the flavor quite strawberry-y.
SQUARE CAKES For awhile now, I've started making layer cakes in two 8x8 or 9x9 squares. A square cake is much easier to slice and it's easier to get more servings aka smaller servings aka saving our waistlines! I even found a special square cake plate!
CENTER LAYER I've also learned that I like it when the middle frosting layers has a different flavor and texture than the outer frosting. So here I made a half batch of the cream cheese frosting recipe that's above. Hoping to avoid the jello entirely, I used the food processor to grind a 1.2-ounce bag of freeze-dried strawberries from Trader Joe's into a fine powder. Unfortunately, the strawberries added some flavor but no sweetness so I ended up adding the strawberry jello too, a whole small box. It was very good, though next time I'd make it slightly softer, probably with the addition of a little milk.
FROSTING I'm working on a stabilized whipped cream frosting recipe but it's not quite ready to share. The flavor and texture are great but so far, it's best only within a couple of hours of making it, not great for a make-ahead or carry-along cake.
Christmas Peppermint Cake
Here, for a Christmas party, I made a peppermint cake. It was really pepperminty – too pepperminty, truthfully. Here's what I did and what I'd do next time.
CAKE I used a white cake mix that called for just egg whites instead of whole eggs, cranberry jello and 4 tablespoons peppermint extract. The cake was very delicate and required patching, perhaps because of the use of egg whites, perhaps because of the addition of so much liquid; the color wasn't also that pretty. Next time, I would either make a very good white cake OR use a white or yellow cake mix that calls for whole eggs; cranberry jello; and use just a little peppermint, maybe 1 teaspoon.
FROSTING I loved the peppermint icing but again, it was just too strong so next time I would use 1 tablespoon peppermint extract. For part white/part pink frosting, I set aside about a third of the frosting to stay white, added cranberry jello to the remaining two-thirds. I also added some Wilton Icing Color (White-White) that makes things turn a very pretty bright white. In retrospect, I wish I'd added it only to the portion that was supposed to be white, I think the pink icing might have been brighter, maybe even the red I was hoping for.
CANDY CANES I intended to sprinkle peppermint sprinkles on top but read online that the colors would bleed. So instead I criss-crossed two candy canes, left wrapped to prevent bleeding. | https://www.kitchenparade.com/2011/05/southern-belle-lemon-layer-cake-recipe.html?showComment=1305662548974 |
Four Hundred Monitor, March 24
IBM is all about the hybrid cloud these days, and it is frustrating that there is never much said about our favorite platform. Of course we all know it’s humming away taking care of business somewhere in the background, but wouldn’t it be nice if once in awhile IBM did a little dreaming about what might be in the future of the IBM i? That’s one of the many reasons we appreciate our IT Jungle editor in chief, Tim Prickett Morgan, who enjoys the occasional daydream about what he’d like to see, which is why we’re sharing his latest wish as our Top Story this week.
(Micro Focus) The YouTube video offers a tutorial and demonstration of using Visual COBOL for Eclipse to debug COBOL applications deployed to Docker containers.
(IBM) Watch this webinar on-demand to attend this roundtable webinar discussion – 10 Surprising Insights On Used IT – with IDC, IBM, Skytap, Celerity, and ChannelWorks featuring IDC research on the used IT marketplace. Learn why organizations are increasingly turning to used IT, the most important criteria in selecting a used IT equipment provider and how used IT may help accelerate your sustainability initiatives, plus more research insights.
Chats, Webinars, Seminars, Shows, and Other Happenings
March 25 – Webinar – From ATM machines to POS systems, Excel spreadsheets to healthcare applications, and everything in between, each time an application connects to your IBM i a network connection is being made. Do you know who is making the connection? Do you know what is being accessed through these connections? Do you have log data to trace them? This one-hour session from Trinity Guard will dive into the how-to’s of securing IBM i network connections and help you gain a deeper understanding of this critical component in safeguarding your organization against costly security breaches.
March 29- April 2 – Online Training – The ” ILE COBOL/400 for COBOL Programmers Workshop” from 400School.com is a live five-day hands-on lab-style workshop designed for students with some knowledge of COBOL who need to understand the extensions made for IBM’s version of ILE COBOL/400. A main focus is Database I/O and the way that COBOL/400 interacts with IBM i DDS to process externally described database files and internally defined files. Additional Focus is placed on screen display files used for COBOL/400 interactive programming, as it replaces the mainframe CICS programming model.
April 13 – Online Meeting – The Central Texas IBM i User Group, CTXiUG, will have its free April meeting online at 6:30 p.m. CT. Space is limited, so register early to avoid disappointment. The April meeting will feature the presentation “Consume REST APIs from IBM i” by Ramraj Kasamsetty.
April 15 – Webinar – Learn how to secure the quality of your IBM i application with this webinar from ARCAD Software. Watch a demonstration on how specialized unit test automation can safeguard application quality and generate reusable test assets for both modular and monolithic code, and learn how to automate the IBM i unit testing process within a standard DevOps stack, including RDi, JUnit and Jenkins.
April 27-May 20 – Hands-On Workshops for IBM i Developers – Summit Hands-On Live! features your choice of eight interactive, 1-day workshops online with Paul Tuohy, Susan Ganter, Jon Paris, or Mike Pavlak. Cement new skills in SQL, RPG Procedures & Service Programs, RDi, Python, and building modern RPG applications. Each of the eight single-topic workshops includes in-person instruction, hands-on labs, a lab workbook, and access to an IBM i. Check the link above for full details.
May 3-5 – Framingham, Massachusetts – Plan now for the 2021 Northeast User Group (NEUGC) Conference. NEUGC is the largest technical conference in New England for IBM i.
May 24-27 – Columbus, Ohio, and Virtual – NAViGATE is COMMON’s new Hybrid event, completely reimagined content that focuses on quick tips-and-tricks, business cases, lessons learned, and innovative technologies and solutions – education that can immediately impact your job and organization that is entirely new content. NAViGATE will feature more than 250 short-format sessions presented by industry experts, peers, and solution providers from the i community, plus an in-person tabletop Expo, and Virtual Expo, of leading solution providers. This conference will offer unique in-person and virtual networking opportunities for attendees to interact and share knowledge.
October 4-6 – Virginia Beach, Virginia – The 2021 IT Executive Conference was created with the needs of IT managers and decision makers in mind to provide content and insight on leading topics that impact business. With a focus on strategic issues, ITEC attendees will hear from, and network with, IBM executives, industry recognized experts and peers on how to maximize IT investments.
October 4-7 – Virginia Beach, Virginia, and Virtual – POWERUp 2021 will be COMMON’s first Hybrid conference and will offer an in-person experience and virtual access to our remote attendees. Join friends and colleagues in the COMMON community and enjoy the best in Power Systems and IBM i education over the course of four days. Choose from nearly 300 sessions, which cover a broad range of IT topic areas that will be delivered live in-person and virtually. POWERUp will also boasts the largest Expo of its kind so that all attendees can learn about all the great products and solutions available to this community from our vendor partners. This conference is structured to give you the pure education and professional connections needed to best enhance your career. | |
Simplistically, search problems are solved by running the computation with different input combinations, looking for any combinations that satisfy the constraints. In reality, we play some tricks to avoid running every possible input combination, but the principle is the same:
This module exposes the
Config type, which stores an initial assignment for
the input parameters (typically something close to
mempty), and a function
that generates possible refinements for those inputs.
For example, we might have a variable we know must be a number between
1 and
10. A good initial value for this might be a
mempty value such as
Unknown, with the refinements being
Exactly
the ten possible values.
The initial values are first fed into the computation before the propagators are established. Sometimes, these initial propagators can produce new information (such as advancing a few steps forward in a sudoku puzzle) before we even start to refine the inputs. The benefit here is that we can sometimes discover that a variable's search space is smaller than we realise, and so we end up with much less work to do!
Documentation
data Config (m :: Type -> Type) (x :: Type) Source #
An input configuration.
This stores both an
initial configuration of input parameters, as well as
a function that can look for ways to
refine an input. In other words, if
the initial value is an Data.JoinSemilattice.Intersect of
[1 .. 5], the
refinements might be
singleton values of
every remaining possibility.
class Input (x :: Type) where Source #
The simplest way of generating an input configuration is to say that a
problem has
m variables that will all be one of
n possible values. For
example, a sudoku board is
81 variables of
9 possible values. This class
allows us to generate these simple input configurations like a game of
countdown: "
81 from
1 .. 9, please, Carol!"
Different parameter types will have different representations for their
values. The
Raw type means that I can say
81 , and have
the parameter type determine how it will represent
from [1 .. 9]
1, for example. It's
a little bit of syntactic sugar for the benefit of the user, so they don't
need to know as much about how the parameter types work to use the
library. | https://hackage.haskell.org/package/holmes-0.3.2.0/docs/Data-Input-Config.html |
FTSE 100
Nikkei 225
Fewer autonomous vehicle companies in California drive millions more miles in testing
Rebecca Bellan
February 10, 2022, 9:00 AM·5 min read
Fewer companies tested autonomous vehicles on California's public roads and yet they logged nearly twice as many miles driven compared to the previous year, according to data released by the California Department of Motor Vehicles.
On Wednesday, the California DMV released its yearly collection of autonomous vehicle testing and disengagements data which details the total number of autonomous miles driven per operator and the number of disengagements per operator, as well as the details of those disengagements.
The perennial release of this data has become controversial in the industry as some companies use it to prove advancements, while others dispute its value at validating technical progress or readiness for commercialization. Disengagements, a term that describes each time an autonomous vehicle disengages because its technology failed or a human safety driver took manual control for safety reasons, is at the center of the industry controversy. The problem is that companies have varying definitions of what qualifies as a disengagement. To further complicate things, that definition can change over time.
Still, it does provide some important information, including that in California between December 1, 2020 to November 30, 2021, power consolidated among an ever-shrinking group of autonomous vehicle developers that have the capital and the desire to expand public testing and add more vehicles to their fleets.
Gone are the long lists of unknown startups that have secured and actively test on public roads. In 2021, the list of active testers shrank and were dominated by companies based in Silicon Valley and China.
Fewer companies, more miles
During the reported period, test vehicles with human safety drivers behind the wheel traveled about 4,091,500 million miles on California's public roads, an increase of more than 2 million miles from the previous reporting cycle. Some 25,000 additional miles were logged by so-called driverless vehicles, a term that means the human safety driver is no longer sitting in the driver's seat.
The data from 2021 also shows those miles were completed by fewer companies.
In 2020, 58 companies held drivered testing permits, which allow operators to test AVs on public roads with a safety driver behind the wheel. In 2021, that number decreased to 50 companies, and of those, only 22 actually tested on public roads during the reporting period.
Leading the charge with the highest number of miles driven was Waymo, which increased its drivered permit miles from 628,838 miles in 2020 to around 2.3 million miles in 2021. Cruise followed behind with 882,471 miles driven with a human safety operator, up from 770,049 miles the previous year. The company also racked up 6,365 miles without a human safety operator in the vehicle in 2021. No other companies got close to the miles driven by Waymo and Cruise. The third spot was taken by Pony.AI with 305,617, followed by Zoox with 155,125 miles.
Waymo had a total number of 292 disengagements, which means it had a disengagement about every 7,800 miles. Cruise had a total of 21 disengagements while testing with a driver, so a total of 42,022 miles per disengagement. While Cruise improved significantly from the previous year, when it had 27 disengagements which happened on average every 28,520 miles, Waymo seems to have gotten worse. In 2020, Waymo reported 21 disengagements, which would put them at a disengagement every 30,000 miles or so.
TechCrunch and many others in the industry no longer use disengagements to pick winners or leaders on the path to commercialization: There is no standard about what qualifies as a disengagement, and as a result, companies will interpret and report their disengagements differently. Those interpretations can change over time, making it even more difficult to actually understand how a company has progressed in its technology.
A thread: Ah my favorite time of year. The CA DMV self-driving car/disengagement reports are public - (sits back and watches the texts and emails flow in about why these are good, bad, total trash, amazing sign of progress)
While these reports do contain juicy datasets that help us learn more about the AV companies playing the field, we're not buying claims of winning the safety or the tech from these reports alone. The most valuable information to come out of disengagement reports details how active companies are in public road testing in California or how much their fleets have grown or shrunk.
And even then it doesn't tell the whole story since numerous companies also test autonomous vehicles outside of California.
A few takeaways
Still, the report did provide a few nuggets.
For example, Waymo's registered fleet was around 240 vehicles in 2020. The following year, it jumped to nearly 700. However, a good chunk of those registered autonomous vehicles were inactive for either all of the reported period or most of it.
It's worth noting that the DMV doesn't require companies to report on testing done on private tracks and closed courses. Nor do companies need to report testing done out of state or miles driven while the vehicle is collecting data in manual mode or at an autonomy level lower than Level 4.
Indeed, Waymo told TechCrunch some of its registered cars could have been at different locations during the reported time period, like outside the state of California or at one of Waymo's closed course testing facilities.
Cruise's fleet was 137 in 2021, and pretty much all of them were actively used for testing. Interestingly, Cruise's fleet stayed about the same between 2020 and 2021.
The data suggests that the AV scene in California is consolidating in a big way around the major players we've all been hearing about like Cruise and Waymo. But, again, the numbers aren't the only thing to tell us which company is commercializing the fastest.
Let's take a look at Nuro. The company only tested 59,100 miles last year, but it's also already offering a commercial delivery service rather than chasing the dream of a California Public Utilities Commission permit to operate robotaxis for a price.
Sometimes, California's AV reports are loudest in the data that isn't there. Imagry was notably missing from the dataset because it failed to file a required report by January 1, so its permit was suspended effective February 7. In addition, Leonis Technologies's permit expired on December 31, 2021, and the company doesn't seem to have done anything about it.
Recommended Stories
Tinder is bringing back the idea of the "blind date" through a new in-app feature, launching today. Except, in this case, Tinder isn't sending out two members out on a blind date together -- it's introducing them to one another through a social chatting feature that will allow them to interact and chat before they can view each others' profiles. The feature aims to encourage people to gauge their first impressions of one other based on personality and conversation, instead of photos.
(Bloomberg) -- Apple Inc. confirmed plans to release its much-anticipated Tap to Pay feature on the iPhone later this year, giving merchants an alternative to Block Inc.’s Square technology. Most Read from BloombergThe Housing Boom May Be About to Go BustThe Housing Party Is Starting to Wind DownMusk Looks Increasingly Isolated as Automakers Embrace LidarPeloton’s Famous Instructors, Who Can Make Upwards of $500,000 a Year, Escape LayoffsByron Allen Says He’s Preparing Bid for NFL’s Denver Bronc
The metaverse cometh for us: The TechCrunch crew has been chewing on the metaverse for a while now, trying to tease out substance from hype, and real possibility from rank speculation. If you are catching up on what Meta is up to along with a host of startups, we have you covered. Also up on the site: three views on whether work or play is the true future of whatever the metaverse becomes from its historical roots in gaming.
(Bloomberg) -- Sony Group Corp. says it has trained a champion capable of beating the world’s best racers at Gran Turismo -- only the player is an artificial intelligence agent.Most Read from BloombergThe Housing Boom May Be About to Go BustThe Housing Party Is Starting to Wind DownMusk Looks Increasingly Isolated as Automakers Embrace LidarPeloton’s Famous Instructors, Who Can Make Upwards of $500,000 a Year, Escape LayoffsByron Allen Says He’s Preparing Bid for NFL’s Denver BroncosThe Gran Tur
(Bloomberg) -- Samsung Electronics Co. announced the latest generation of its flagship smartphone family and its largest tablet yet, upgrading its hardware lineup with new screen sizes, better cameras and more storage to better compete with Apple Inc. Most Read from BloombergThe Housing Boom May Be About to Go BustThe Housing Party Is Starting to Wind DownMusk Looks Increasingly Isolated as Automakers Embrace LidarPeloton’s Famous Instructors, Who Can Make Upwards of $500,000 a Year, Escape Layo | |
Q:
getting error in android
i have parsed data successfully using sax parser and output is coming properly in logcat but i have to arrange that data systematically. But the problem is my question length and index is 2 so options are also coming 2. instead they are 4 for each question. please suggest
code snippet is
for (int i = 0; i < categorylist.getTitle().size(); i++) {
TableRow tr = new TableRow(this);
tr.setPadding(2, 2, 2, 2);
TableLayout.LayoutParams tableRowParams=
new TableLayout.LayoutParams
(TableLayout.LayoutParams.FILL_PARENT,TableLayout.LayoutParams.FILL_PARENT);
int leftMargin=0;
int topMargin=2;
int rightMargin=0;
int bottomMargin=1;
tableRowParams.setMargins(leftMargin, topMargin, rightMargin, bottomMargin);
tr.setLayoutParams(tableRowParams);
name[i]= new TextView(this);
name[i].setText(categorylist.getTitle().get(i));
name[i].setTextColor(Color.WHITE);
name[i].setTextSize(12);
name[i].setPadding(10,0,0,0);
name[i].setLayoutParams(new LayoutParams(LayoutParams.FILL_PARENT,LayoutParams.WRAP_CONTENT));
tr.addView(name[i]);
t1.addView(tr, tableRowParams);
LinearLayout.LayoutParams layoutParams = new RadioGroup.LayoutParams(
RadioGroup.LayoutParams.WRAP_CONTENT,
RadioGroup.LayoutParams.WRAP_CONTENT);
rad1[i]= new RadioButton(this);
rad1[i].setText(categorylist.getValue().get(i));
rad1[i].setTextColor(Color.WHITE);
rad1[i].setTextSize(12);
rad1[i].setPadding(10,0,0,0);
rad1[i].setLayoutParams(new LayoutParams(LayoutParams.FILL_PARENT,LayoutParams.WRAP_CONTENT));
rgrp.addView(rad1[i], 0, layoutParams);
}
and xml is
<Values>
<Question>
<Description><![CDATA[Some Question]]></Description>
<Options>
<option value="correct"><![CDATA[All of these]]></option>
<option value="incorrect"><![CDATA[Ok]]></option>
<option value="incorrect"><![CDATA[Fine]]></option>
<option value="incorrect"><![CDATA[Good one]]></option>
</Options>
</Question>
</Values>
logcat output is:
05-14 15:22:27.228: INFO/This is the title:(559): Which of the following are called celestial bodies?
05-14 15:22:27.248: INFO/This is the option:(559): All of these
05-14 15:22:27.248: INFO/This is the option:(559): Sun
05-14 15:22:27.248: INFO/This is the option:(559): Planets
05-14 15:22:27.248: INFO/This is the option:(559): Moon
05-14 15:22:27.258: INFO/This is the title:(559): In our solar system, _________ planets revolve around the Sun.
05-14 15:22:27.258: INFO/This is the option:(559): eight
05-14 15:22:27.258: INFO/This is the option:(559): five
05-14 15:22:27.258: INFO/This is the option:(559): ten
05-14 15:22:27.258: INFO/This is the option:(559): nine
A:
I think You should have two loop for example
int l;
for (int i = 0; i < categorylist.getTitle().size(); i++){
for(int j= 0; j < optionlist.size()/categorylist.getTitle().size(); j++){
//add option to question
l=l++;
//use l;
}
}
| |
We have quite a few parties and unofficial meetings at our house and some visitors like to drink wine! Not me, of course, anyone who knows me will confirm that I never touch a drop!!! 😉
One of the problems I find is that people tend to put a glass down somewhere and then can’t remember which one is theirs. So, I made a bunch of coasters which slip onto the bottom of each glass and every one is slightly different – if only people could remember which colour/gem they are it would be a great idea!
The Coasters
Now I take no credit for coming up with this idea, there are many of them available around the world – but I did design these myself to be stitched completely in the embroidery hoop with no extra sewing steps needed.
I used some black fleece fabric and the edging is all done with a variegated pink thread. The flower design is a different colour on each coaster and – when I ran out of obviously differing colours – I added some large stick-on gems.
The coasters also serve as…well, coasters! Guests can put a glass down on any surface without worrying about leaving rings etc.. very useful really even if they still don’t remember which is their drink.
How to store them
This was the next issue, how do I keep them in the glasses cupboard neatly? Have you seen those dispensers they have for cups in cafeterias? That’s the sort of thing I wanted but on a much smaller scale, of course.
I wandered round the workshop looking for inspiration and found it in the guise of left-over drainpipe from the plumbing work we’ve just had done. There were a few pieces about 9″ long and a perfect diameter for the coasters so I grabbed one, got out my hot knife and cut a wide slit down the length of the pipe. It wasn’t easy and it’s not as neat as I would like but, as it’s hand-crafted, I decided it would be OK.
I also found a sweetie tin (travel sweets) which was a good size for the pipe to fit around and then dug out some braid, my alcohol inks and good-old crop-o-dile.
Decorating
I didn’t take any photos during the making of this but if you’ve used alcohol inks at all you’ll know to put them on the applicator with some blending solution and just dabble all over the item in question. That’s what I did, both inside and out and also on the braid to take away the contrast and on the brass paper fasteners (brads). I punched holes around the top of the tin, marked where the pipe sat on top of that and punched the holes to correspond and used the brads to hold it all together. The braid is just stuck on to hide the rough edges along the front and inside to hide the brads.
I know that the top of the pipe seems to fold in on itself, I guess that’s because the tin is just slightly too big and is stretching the bottom outwards. Never mind, it works and it looks quite nice sitting in my cupboard amongst the wine glasses…..which I never use myself, honest! | http://www.craftyjo.org.uk/altered-art/wine-coasters/ |
Chapter 5, Part 1, ACCS Strategic Plan
This text-only version is offered as a more accessible alternative to this PDF document: Arlington County Commuter Services Transportation Demand Management Plan (PDF, 2.6 MB).
SERVICE CHANGES AND EXPANSION PLAN
As ACCS looks ahead to the next six years, a variety of external factors, highlighted by Arlington County’s commitment to environmental, economic, and socio-demographic sustainability, will influence the organization’s ability to implement service changes and expand its reach.
From an environmental standpoint, Arlington’s population is projected to increase by over 28 percent by 2040. As the populations of seniors, millennials, and children change in the County, much of the challenge of how to efficiently move new residents on such a small piece of land will fall with ACCS. ACCS’ commitment to improve air quality by reducing vehicle miles traveled will also be of prime importance as Arlington welcomes new transportation network users.
Economically, Arlington’s office sector has struggled in recent years, leading to higher than desirable vacancy rates. Programs such as ATP will inherit the challenge of attracting and retaining more employers with the lure of effective and meaningful employer services. ACCS can work alongside Arlington Economic Development (AED) to achieve this goal.
Socio-demographically, although Arlington is a relatively affluent community, the need to serve the County’s underrepresented groups – such as low-income and minority residents as well as single-parent households with children, which represent nearly half of all County households with children – should increasingly inform ACCS’ suite of initiatives. Moreover, as housing and transportation costs alike increase, Arlington is becoming an increasingly expensive place to live. Through its programming, ACCS should remain sensitive to these issues and continue to equally serve all of the County’s residents and visitors.
ACCS will also need to consider regional transportation trends and changes in service infrastructure. Major projects such as the I-395 Express Lanes Extension could alter hundreds of daily commutes, as could a growing push toward flexible transit services. Efforts to encourage the use of WMATA’s Metrorail service, which has fallen out of favor with many residents, could prove crucial to the management of future travel demand. SafeTrack, Metro’s temporal campaign to improve passenger safety, has resulted in consistent service disruptions and may ultimately give way to permanent service changes on nights and weekends. Should such changes occur, ACCS may need to adapt its messaging accordingly. For example, as bike usage has increased during SafeTrack, the organization can continue to support this trend through BikeArlington programming and increased promotion of Capital Bikeshare.
ACCS’ ability to adapt and grow in harmony with technology and innovation trends in transportation will also be vital to its success. The prevalence and popularity of transportation network companies (TNCs) such as Uber and Lyft in Greater Washington poses several particularly challenging questions: how can ACCS best promote TNCs? Should TNC usage be encouraged as a first or last mile service or for entire trips? Should ACCS work with TNCs to subsidize services or merely ensure that users are familiar with options? In seeking to define and develop its role in this realm, ACCS can initiate pilot programs with on-demand companies, perhaps even in partnership with other Arlington bureaus or agencies.
Finally, as ACCS anticipates FY2018 and beyond, the bureau must continually evaluate its management and staffing situation. ACCS should assess its positioning to address the aforementioned trends as well as whether certain funding sources will carry into the future or require replacement. In the spirit of continuing to address all travel needs other than driving alone, the organization must revisit its operating priorities and relationships with other governmental and non-governmental groups in Arlington. A holistic approach to operations will drive the excellent customer service for which the organization is known. Lastly, ACCS’ capability to monitor the implementation of its programs and initiatives will provide continual feedback on the success of its services.
With these factors in mind, this chapter describes 11 Priority Strategies that ACCS staff developed to guide the organization’s programming over the next six years. Each Priority Strategy houses unfunded expansion programs to be carried out during the period spanning FY2018 through FY2023. Following a discussion of the rationale of each Priority Strategy, expansion programs – along with staffing needs, cost estimates, and relevant DRPT TDM categories – are listed.
PRIORITY STRATEGIES AND UNFUNDED EXPANSION PROGRAMS
ACCS staff developed and refined 11 Priority Strategies to guide the organization’s programming during the FY2018 through FY2023 timeframe and beyond. These Priority Strategies were developed to allow ACCS to respond both to immediate needs in the community and to a rapidly changing environment. During FY2018, ACCS business units will each endeavor to tailor their existing activities, and pursue any new activities that may be planned (grant funded or within the existing budget) to serve these priority strategies.
All Priority Strategies, along with a rationale and description, are outlined in this section. Each Priority Strategy is succeeded by a table listing relevant unfunded expansion programs, cost estimates by year, staffing needs, and relevant DRPT TDM categories. The TDM categories applicable to each expansion are demarcated in the final column of each table using the key shown in Figure 3. Relevant categories are highlighted in blue; inapplicable categories are shown in gray.
1. Strengthen Arlington’s Regional Competitiveness
Support and enhance Arlington County’s regional competitiveness through new and expanded partnerships with government and business organizations who work to achieve economic and environmental sustainability for the County.
Rationale: ACCS’ TDM program has contributed to Arlington County being a community with many affordable transportation options for its residents, workers and visitors, and has made Arlington a competitive place to live and work. With a 25 percent population increase and 20 percent employment increase anticipated in the County by 2030, ACCS will need to work with many different government and business partners to extend the reach of its services to new members of the community. While ACCS already works with many partners to reach the public, it will need to expand these working relationships while establishing new ones, seeking to educate and inform new customers.
As part of this strategy and to offset perceptions that Arlington is neither competitive with nor as affordable as other areas, ACCS will be partnering with Arlington Economic Development (AED) to create a joint regional connectivity strategy and implementation plan to assist the Arlington business community with workforce retention efforts. Approximately 82 percent of Arlington’s daily at-place workforce lives outside Arlington County. With advancing changes in the regional transportation infrastructure and the advent of tolling on the I-66 travel corridor, challenges for commuters to Arlington County will be paramount. Elements of the connectivity initiative will include:
• Increased support for business leaders to spread awareness and understanding of multi-modal transportation assistance available to them via Arlington Transportation Partners;
• Communication of multi-modal transportation benefit programs for employers’ workforces; and
• Education of workers regarding their many transportation options to help ease their commute and travel concerns.
ACCS will also partner with Arlington Public Schools (APS), who are planning to add many new school facilities to accommodate population growth. ACCS has been working on an expanded partnership with APS as part of a larger County-wide effort to foster the use of transit and other TDM services to reduce single occupancy vehicle commuting by school staff. ACCS will seek to identify new opportunities to strengthen existing partnerships as well as begin new partnerships to foster the economic, social and environmental sustainability of the County. The unfunded expansion programs for this Priority Strategy are summarized in Table 26.
Table 26: Priority Strategy 1 Expansion Programs
|Expansion Program||Cost FY18||
|
Cost FY19
|Cost FY20||Cost FY21||Cost FY22||Cost FY23||Staffing Needs|
|With Arlington Economic Development, create an implementation plan to assist the Arlington business community with workforce retention efforts.||$60,000||$-||$-||$-||$-||Consultant|
|Expand partnership with Arlington Public Schools to foster and encourage greater use of TDM services.||$200,000||$208,000||$216,320||$224,973||$233,972||$243,331||Consultant|
|Expand residential property partner outreach to encourage greater use of TDM and transportation options by residents.||$-||$150,000||$156,000||$162,240||$168,730||$175,479||Consultant|
|Enhance TDM services for tourists.||$-||$-||$-||$-||$150,000||$156,000||Consultant/ 1 ACCS Staff|
2. Reduce Single Occupant Vehicle (SOV) Usage
Reduce commuting by single occupant vehicles in neighborhoods and occupational sectors with above average use and in high growth corridors.
Rationale: While ACCS services have contributed to Arlington County having the lowest modal share of SOV commuters in Virginia (54 percent), several employment sectors in the County have much higher SOV use. Most notably, 88 percent of Arlington Public School (APS) employees drive alone to work. In addition, several corridors such as Columbia Pike and the Jefferson Davis Corridor are growing at a rapid pace, raising the concern that developments in these growth corridors may generate higher SOV use. ACCS will work closely with APS, the County government, business organizations, and neighborhoods in growth corridors to educate, promote and support efforts that result in greater use of TDM services and a reduction in overall vehicle use. Table 27 summarizes the expansion programs associated with this Priority Strategy.
Table 27: Priority Strategy 2 Expansion Programs
|Expansion Program||Cost FY18||Cost FY19||Cost FY20||Cost FY21||Cost FY22||Cost FY23||Staffing Needs|
|Expand the Vanpool Connect Program through the use of technology and regional partnerships.||$210,000||$218,400||$227,136||$236,221||$245,670||$255,497||Consultant|
|Increase TDM marketing to single family residential neighborhoods.||$-||$-||$100,000||$104,000||$108,160||$112,486||1 ACCS Staff|
|Support and update the CarFree AtoZ application to ensure its continued usage and relevance to the market.||$25,000||$26,000||$27,040||$28,122||$29,246||$30,416||Consultant|
|Expand the use of the CarFree AtoZ survey capability to Arlington employers and to support regional TDM programs.||$-||$150,000||$-||$-||$-||$-||Consultant|
|Develop mitigation measures to offset the adverse impacts on traffic from the expansion of I-66 and I-395 and the conversion to HOT lanes.||$175,000||$182,000||$189,280||$-||$-||$-||Consultant|
|Develop a complimentary Arlington Transportation Partners advanced achievement program for outcome based attainments that demonstrate pre-determined reductions in single occupant vehicle use.||$-||$-||$75,000||$78,000||$81,120||$84,365||Consultant|
3. Advance Equity in the Use of Transportation Options
Increase employee and resident use of transit, walking, bikesharing, biking, and ridesharing through targeted employer outreach, education, and promotion for minority, low-income, and senior populations.
Rationale: In recent years, through programs such as Hispanic Marketing, Retail Partners, and a new pilot Capital Bikeshare Community Partners Program offering discounted membership and extended free time to low income individuals, ACCS has actively sought to broaden the user communities that its services reach. In addition, seniors do not participate in the use of TDM services to the same extent as others and have obstacles to their use not faced by other demographic groups in the County. ACCS will look to build upon existing efforts to increase participation of these groups with new neighborhood initiatives and research to better understand the barriers to use and to further the reach of its information and education services. Table 28 summarizes the expansion programs housed within this Priority Strategy.
Table 28: Priority Strategy 3 Expansion Programs
|Expansion Program||Cost FY18||Cost FY19||Cost FY20||Cost FY21||Cost FY22||Cost FY23||Staffing Needs|
|Develop a multi-modal community partners equity program to foster greater use of TDM services and transportation options by low-income and minority communities.||$200,000||$208,000||$216,320||$224,973||$233,972||$243,331||Consultant /
|
1 ACCS Staff
|Develop educational and informational campaigns for seniors and persons aging in place.||$150,000||$156,000||$-||$-||$-||$-||Consultant /
|
1 ACCS Staff
|Develop payment mechanisms and convenient payment options for those who are unbanked or are partially banked.||$-||$-||$-||$-||$350,000||$-||Consultant|
|Expand ACCS's Predictable-Alert-Lawful (PAL) safety program.||$-||$50,000||$52,000||$54,080||$56,243||$58,493||Consultant /
|
1 ACCS Staff
4. Expand ACCS’ Organizational Capacity
Increase ACCS’ financial and organizational capabilities during a period of rapid growth in the use of its TDM services.
Rationale: Over the past few years, ACCS has seen a constant increase in the use of its services, including additional Commuter Stores® customers, ATP clients and Champions businesses, vanpools formed via the Vanpool Connect program, and more. Bicycling has also grown to include ten Arlington Bike to Work Day pit stops, including 1,000 registrations in Rosslyn. Capital Bikeshare usage has increased in Arlington by a greater percentage than the system as a whole: from January 2014 to October 2016, Arlington saw a 45 percent increase in annual members and a 22 percent increase in trips from its stations. By comparison, the entire Capital Bikeshare system has had a 30 percent growth in annual membership and a 12 percent increase in trips. Since FY2015, the number of planned, new construction, and existing TDM for Site Plan Development properties has increased from 170 to 216, meaning that 46 additional properties have had site plan requirements created, implemented, and verified.
In addition, technology-based service offerings have increased through new tools such as Car Free A-to-Z and Car-Free-Near-Me, as well as static and real-time traveler information screens, increased transit marketing, new Hispanic and Ethiopian services, and an expanded partnership with APS. At the same time, ACCS has addressed new challenges, from finding ways to adapt new technologies and on demand services for the benefit of Arlington residents and businesses, to responding to disruptions in Metrorail services from planned and unplanned events and programs such as SafeTrack. Further challenges, such as the expansion of I-66 to include new High Occupancy Toll (HOT) lanes and a similar institution of HOT lanes on I-395, lie ahead.
Since FY2010, ACCS has been operating with the same complement of staff and nearly the same static sources and amounts of funding. As ACCS deploys new technologies and strategies to accommodate the challenges and opportunities ahead, and with the projected growth in population and jobs, new institutional capabilities must be developed alongside expanded sources of funding and staffing. For example, new technologies and shared use services require greater policy focus on how to integrate these new developments into our transportation system to gain the greatest return on investment and offer the highest value to our taxpayers and customers. New staff focused on policy will be required. Staffing for partnerships and concentrated outreach will be required to provide full-time support to the growing number of collaborations in which ACCS is becoming involved. As the Northern Virginia region identifies issues that can only be addressed through regional approaches, ACCS must focus more of its time on regional collaboration. More fundamentally, ACCS will consider how all discrete services may need to be integrated to provide its customers with easier access to its services. Finally, ACCS will be reaching out to its current and new funding partners to seek additional support as well as to identify new opportunities for revenue generation. Table 29 summarizes the expansion programs associated with this Priority Strategy.
Table 29: Priority Strategy 4 Expansion Programs
|Expansion Program||Cost FY18||Cost FY19||Cost FY20||Cost FY21||Cost FY22||Cost FY23||Staffing Needs|
|Conduct leadership training for ACCS senior staff.||$15,000||$15,600||$16,224||$16,873||$17,548||$18,250||Consultant /
|
3 ACCS Staff
|Conduct an ACCS organizational study and analysis to identify improvements in organizational productivity.||$-||$-||$90,000||$-||$-||$-||Consultant /
|
3 ACCS Staff
5. Extend the Reach of TDM
Expand the number of residents and businesses who benefit from Arlington County’s affordable transportation options through new and expanded services.
Rationale: ACCS reaches many residents and businesses in Arlington with its information services and outreach activities. By 2040, Arlington’s preliminary estimate shows that population and jobs are expected to grow by 36 percent. In order to maintain and expand upon the reach of ACCS’s services, it will be necessary to upgrade and expand our services to keep up with the expected demand, ensure that our facilities are in a state of good repair, and maintain a high level of customer service. Further, a good portion of the County’s expected growth is along Arlington’s three major growth corridors: Rosslyn-Ballston, Route 1, and Columbia Pike. ACCS will collaborate with various parties – both internal and external – to develop effective tools and services to ensure that congestion does not overtake growth in these areas. Table 30 summarizes the expansion programs associated with this Priority Strategy.
Table 30: Priority Strategy 5 Expansion Programs
|Expansion Program||Cost FY18||Cost FY19||Cost FY20||Cost FY21||Cost FY22||Cost FY23||Staffing Needs|
|Purchase a new Mobile Commuter Store to serve the Rosslyn-Ballston corridor in conjunction with the I-66 expansion and HOT Lanes project.||$350,000||$-||$-||$-||$-||$-||Consultant|
|Open and operate new brick and mortar Commuter Stores at Pentagon City and on Columbia Pike.||$-||$500,000||$260,000||$500,000||$281,212||$292,465||Consultant /
|
2 ACCS Staff
|Upgrade two existing mobile Commuter Stores.||$150,000||$-||$-||$-||$-||$-||Consultant /
|
1 ACCS Staff
6. Integrate First Mile/Last Mile Technologies and Services
Adapt new information technologies and technology-enabled, on-demand services to expand transportation choices and support their use.
Rationale: Over the last few years, information technologies and new disruptive, on-demand services have created a major transformation in how services operate. The private sector has become a focus of new types of services featuring technology platforms that cater to real-time and personalized requests for service through smartphones. These changes have presented opportunities to adapt new technologies to improve service to communities that lack adequate fixed route transit or frequent and relevant transit services. ACCS will seek to work with Arlington Transit (ART) to integrate these new types of services into the existing transit network to serve as a first mile/last mile solution for communities that have high vehicle usage and/or communities where existing transit services are infrequent or do not provide connections for residents’ needs.
In addition, new types of information technologies with real-time arrival and departure capabilities, some coupled with trip planning and payment capabilities, are becoming available for smartphone and other uses. ACCS has been at the forefront of adapting these technologies to its TDM services, including developing a smartphone app for its CarFree AtoZ multimodal trip planning service. ACCS also offers its CarFree Near Me online service that provides real-time transit, carsharing and bikesharing information. ACCS will seek to update, integrate and further expand the utilization of these technologies throughout the County. Table 31 summarizes the expansion programs associated with this Priority Strategy.
Table 31: Priority Strategy 6 Expansion Programs
|Expansion Program||Cost FY2018||Cost FY2019||Cost FY2020||Cost FY2021||Cost FY2022||Cost FY2023||Staffing Needs|
|Hire a Chief Innovation Officer to foster the development of new services and technologies in collaboration with the public and private sectors as well as with internal County partners.||$200,000||$208,000||$216,320||$224,973||$233,972||$243,331||Consultant|
|Plan and implement pilot projects in neighborhoods with unmet travel needs.||$-||$1,000,000||$-||$500,000||$-||Consultant|
This text-only version is offered as a more accessible alternative to this PDF document: Arlington County Commuter Services Transportation Demand Management Plan (PDF, 2.6 MB). | https://www.commuterpage.com/about/accs-strategic-plan-text-only/chapter-5-part-1-accs-strategic-plan/ |
If two parties want to communicate with securely using OTP , how is the key ( that is lengthy as plain text) shared with other party for decryption ?
One way of sharing a OTP is to draw a random sequence (a huge list of randomly chosen characters or btis) in advance and to disclose it beforehand to the other party (physical meeting). The obvious disadvantage is the need to keep secret a big amount of information.
Another way is to share a short secret (key) in advance (e.g. during a physical meeting). This is much more practical in the sense that the information to be kept secret is much shorter. In order to share a random sequence as long a the plaintext to be transmitted, a cryptographic primitive is then used such as a stream cipher (or, e.g. a block cipher or hash function running in counter mode). An IV (a public short string) is used to derive a random sequence anew for each plaintext. The drawback compared to sharing a long random sequence before hand is that the random sequences thus genereated are "only" pseudo-random (i.e. in the best case scenario, they appear random to a computationally bounded adversary provided some hard computational assumption holds, such as the hardness of computing quadratic residues for instance; sometimes, the security is even more ad-hoc, like when using hash functions in counter mode).
Finally, an additional way is provided by quantum key distribution (Bennett and Brassard, 1984). The key is distributed through a quantum channel and it is assumed that tampering will be detected due to the physical properties of the channel. The advantage is that the whole system can be made to rely on inconditionally secure primitives only. The disadvantage is that the rate of random sequence generation is pretty low nowadays and do not compete at all with the previous solution. Also, it is highly susceptible to denial of service attacks.
-
2$\begingroup$ A stream cipher working from a short key is not a one time pad. It doesn't have the same perfect security properties an one time pad has, so please don't call it that. $\endgroup$ – Paŭlo Ebermann Oct 22 '12 at 20:53
-
$\begingroup$ Well, I construe one time pad as a pad that you use one time. Please also note that the distinction you're trying to make is already part of the answer: sequences thus genereated are "only" pseudo-random. Also, you'll have a hard time defining what a perfectly random string is in practice: anything that you'll use to generate it has some bias... $\endgroup$ – bob Oct 23 '12 at 6:27
-
$\begingroup$ A stream cipher is not a one time pad. You might as well list RSA in your answer as well. $\endgroup$ – daniel May 29 '17 at 12:25
That's a well-known disadvantage of using OTP. Like in the ancient times, you could e.g. employ a trusted courier for that transfer.
-
1$\begingroup$ Or both parties are physically present to create or exchange the keys. $\endgroup$ – ericball Oct 9 '12 at 12:44
One way to share a OTP key is to separately send several different independently-generated OTP keys, each one in its own tamper-evident package (often more than one layer).
When Bob receives the package, if the seal shows the package hasn't been opened in transit, then therefore no one has opened the package and copied or modified or entirely replaced the OTP key inside, and therefore that key is safe to use between Bob and whoever sent the package.
When Bob receives the package, if the seal shows the package has been opened (or if shippers have banged it up so much it's hard to tell), then he simply discards it. That makes the key inside that package useless to whoever might have copied or replaced it.
The various quantum key distribution systems can each be seen as a high-tech way of sending one bit at a time, and discarding bits that might have been tampered with.
The tamper-detection system isn't perfect on its own. How can Bob be sure the package came from Alice and not Mallory? If Mallory has intercepted one of the OTP key packages from Alice, how can Alice discriminate between "good" over-the-air ciphertext messages from Bob vs "bad" over-the-air ciphertext messages that claim to be from Bob, but they're actually from Mallory? How do we prevent a denial-of-service attack? There exist work-arounds to these problems by combining tamper-detection with trusted couriers, or armed couriers, or some sort of back-and-forth key-agreement protocol, or some combination.
Given that the key does not need to be constructed in any particular way any secret sharing method such as the Diffie-Hellman exchange be repeated to build up to the required key length. And simply concatenating the acquired secrets (after potentially passing them through a cryptographically secure PRNG to remove any exchange artifacts). However this method is susceptible to the same attacks as the chosen secret sharing method. | https://crypto.stackexchange.com/questions/3996/one-time-pad-key-exchange/4029 |
Background of the Invention
1. Field of the Invention.
2. Description of the Prior Art.
Summary of the Invention
Brief Description of the Drawings
Description of Preferred Embodiments
Example
The present invention relates to an improved flare pilot which is stable in high winds and other severe weather conditions.
A variety of apparatus for flaring combustible waste fluid streams have been developed and used heretofore. Such apparatus are often referred to as flare stacks. Flare stacks are commonly located at production, refining and other processing plants for disposing of combustible wastes or other combustible streams which are diverted during venting, shut-downs, upsets and/or emergencies. Flare stacks generally include continuously operating pilots (often referred to as pilot lights) and flame detection apparatus which are often located at the elevated open discharge end of the flare stacks.
While the flare pilots utilized heretofore have operated successfully during normal weather conditions, at the time of high winds and other severe weather conditions both the burning waste or other fluid being flared and the pilot flame have been extinguished which allows the waste or other fluid to be discharged directly into the atmosphere without being burned. The unburned waste or other fluid pollutes the atmosphere which can be harmful to plant, animal and human life.
In order for a continuously operating flare pilot to remain lit and continue to ignite the combustible fluid discharged from a flare stack during severe weather conditions such as those which exist in hurricanes, typhoons and other similar weather conditions, the flare pilot must remain lit at wind speeds up to 125 mph or more when combined with two inches or more of rainfall per hour. In addition, gases which are often used as fuel for flare pilots are typically made up of natural gas or propane or a mixture of hydrocarbon gases that may contain hydrogen. A flare pilot utilizing gases as fuel which contain hydrogen must be capable of burning the gases without flashback due to the presence of the hydrogen.
Thus, there are needs for improved ultra-stable flare pilots which remain lit in high winds and other severe weather conditions.
The present invention provides improved continuously operating flare pilots which meet the needs described above and overcome the deficiencies of the prior art. The continuously operating flare pilot of this invention is stable in high winds and other severe weather conditions including wind speeds up to 160 mph or more and rainfall of 2 inches or more per hour at fuel pressures ranging from about 4 to about 45 psig using natural gas or propane as fuel. In addition, the pilot will stay lit in a 160 mph or more wind without flashback when burning a fuel containing up to 40% hydrogen.
The continuously operating flare pilot of this invention is basically comprised of a fuel-air mixture discharge nozzle connected to a fuel-air mixture inlet pipe. A wind shield having a partially closed or open lower end is sealingly attached to the fuel-air mixture discharge nozzle or to the fuel-air mixture inlet pipe whereby a fuel-air mixture discharged from the fuel-air discharge nozzle enters the interior of the wind shield. The wind shield has an open upper end which includes an upstanding wall portion positioned at the front of the wind shield facing the open end of a flare stack. Ignition flames from within the wind shield of the flare pilot are discharged through the open upper end of the wind shield adjacent to the combustible fluid discharged from the flare stack. The wind shield further includes at least one opening in each of the opposite sides of the wind shield positioned at substantially right angles to the upstanding wall portion through which wind can flow into the interior of the wind shield. Means for igniting the fuel-air mixture discharged within the wind shield by the fuel-air discharge nozzle and for detecting the presence or non-presence of flame therein can optionally be connected to the wind shield or discharge nozzle.
In a preferred embodiment, the wind shield and the upstanding wall portion of the open upper end of the wind shield include a plurality of downwardly orientated openings therein through which rain and wind are discharged when blowing in a direction from the back to the front of the wind shield. The wind shield also includes a plurality of openings in each of the opposite sides of the wind shield positioned at substantially right angles to the upstanding wall portion through which wind can flow into the interior of the wind shield. Wind catching baffles are also positioned around the pluralities of openings in the sides of the wind shield and the openings are orientated so that the wind flowing therethrough is caused to flow downwardly towards the inside lower end of the wind shield. The flare pilot preferably also includes a perforated flame stabilizer positioned within the wind shield attached to and surrounding the fuel-air nozzle. Finally, when included as a component of the flare pilot, the means for igniting the fuel-air mixture within the windshield and for detecting the presence or non-presence of flame therein are preferably a flame front igniting apparatus and an acoustic flame detecting apparatus.
It is, therefore, a general object of the present invention to provide an improved continuously operating flare pilot for igniting combustible fluids discharged from the open end of a flare stack which is stable in high winds and other severe weather conditions.
Other and further objects, features and advantages of the present invention will be readily apparent to those skilled in the art upon a reading of the description of preferred embodiments which follows when taken in conjunction with the accompanying drawings.
FIGURE 1 is a side elevational view of a flare stack including the flare pilot of the present invention.
FIGURE 2 is a top view taken along line 2-2 of FIG. 1.
FIGURE 3 is a side elevational view of the flare pilot of this invention.
FIGURE 4 is a side partially cut away view taken along line 4-4 of FIG. 3.
FIGURE 5 is a cross-sectional view taken along line 5-5 of FIG. 3.
FIGURE 6a is a cross-sectional view taken along line 6-6 of FIG. 4.
FIGURE 6b is a cross-sectional view similar to FIG. 6a which illustrates an alternate embodiment of the wind shield of this invention.
FIGURE 7 is a cross-sectional view taken along line 7-7 of FIG. 4.
Referring now to the drawings, and particularly to FIGS. 1 and 2, a flare stack including the improved flare pilot of the present invention is illustrated and generally designated by the numeral 10. The flare stack 10 includes a flare 12 and a stack 14 which are bolted together by a plurality of bolts 15 at a flanged connection 16. While the heights of flare stacks vary depending upon various factors, most flare stacks .utilized in production, refining and processing plants range in height from about 20 feet to as high as about 600 feet. The bottom end of the stack 14 is closed by a ground level base plate 18 and one or more waste or other combustible fluid inlet pipes 20 located at or near ground level are connected to the stack 14. As mentioned above, most flare stacks are operated on demand for disposing of combustible wastes or other combustible fluid streams such as hydrocarbon streams which are diverted during venting, shut-downs, upsets and/or emergencies but the flare stack must be capable of receiving and continuously flaring combustible streams at any time.
The flare 12 (also sometimes referred to as a flare tip) can include a cylindrical perforated wind deflector 22 attached thereto adjacent to the upper open discharge end 24 thereof and at least one flare pilot 26 positioned adjacent the open discharge end 24. As mentioned, the flare pilot 26 is usually operated continuously to provide a continuous flame for igniting combustible fluids which are intermittently flowed to the flare stack 10.
The flare pilot 26 of this invention, which will be described further hereinbelow, is connected to a fuel-air mixture inlet pipe 28 which extends from the flare pilot 26 at the top of the flare stack 10 to a fuel-air mixer 32 and is attached to the flare stack 10 by a plurality of brackets 30. The fuel-air mixer 32, which is typically a venturi type of fuel-air mixer, is connected to the pipe 28 at a convenient location. The fuel-air mixer 32 preferably includes a wind shield 33 (shown schematically) or other similar means for preventing operation interruptions due to high winds and the like. The fuel-air mixer 32 is connected to a source of combustible gas such as natural gas, propane, refinery gas or the like by a fuel gas supply pipe 29. As is well understood, the fuel gas is mixed with aspirated atmospheric air as it flows through the mixer 32 and the resulting fuel-air mixture flows through the pipe 28 to the flare pilot 26 and is burned within and adjacent to the flare pilot 26 as will be described in detail hereinbelow.
When used, pipes 28 and 34 are provided which extend from the flare pilot 26 to a location at or near ground level. The pipe 34 is shown attached to the pipe 28 by a plurality of brackets 35 and is connected at its upper end to the pipe 82 which is in turn connected to the flare pilot 26. The lower end of the pipe 34 is connected to an ignition flame front generator 36 and a flame detector assembly 38 is connected to the pipe 34 near ground level between the ignition flame generator 36 and the flare pilot 26.
The flare pilot 26 is ignited by flowing a combustible fuel-air mixture to the pilot burner 26 by way of the pipe 28 and then operating the ignition flame front generator 36 to produce a flame which is propagated through the pipes 34 and 82 to the pilot burner 26. When the ignition flame exits the pipe 82 it ignites the fuel-air mixture discharged within the flare pilot 26. After the pilot burner 26 is ignited, the ignition flame front generator 36 is shut-off.
The sound produced by the flame of the flare pilot 26 is conducted by the pipe 34 to the flame detector assembly 38 connected thereto. The flame detector assembly 38 continuously indirectly detects the presence or non-presence of the flame in the pilot 26 from its location remote from the flare pilot 26 by detecting the presence or non-presence of a level of sound conducted by the pipe 34 which indicates flame. If the flame of the pilot 26 is extinguished for any reason, the flame detector assembly 38 provides a warning such as a light and/or audible alarm so that the pilot 26 can immediately be re-ignited. As will be understood by those skilled in the art, the ignition flame front generator 36 can be electronically connected to the flame detector assembly 38 whereby each time the flame detector assembly 38 detects the non-presence of a flame at the pilot 26, the ignition flame front generator 36 is automatically operated to re-light the pilot 26.
Referring now to FIGS. 3-7, the flare pilot 26 and the upper end portions of the pipes 28, 82 and 34 are illustrated in detail. The flare pilot 26 is comprised of a fuel-air mixture discharge nozzle 40 (sometimes referred to as a gas tip) which is connected to the fuel-air mixture inlet pipe 28 such as by welding or a threaded connection. The fuel-air mixture produced by the fuel-air mixer 32 flows through the fuel-air mixture inlet pipe 28 and into the fuel-air mixture discharge nozzle 40 from where the fuel-air mixture is discharged by way of a plurality of orifices 42 in the nozzle 40. Attached to and extending above the fuel-air mixture nozzle 40 is a perforated flame stabilizer 44. The flame stabilizer 44 is preferably cylindrical and includes a plurality of spaced perforations or openings 46 therein. The flame stabilizer 44 causes the fuel-air mixture discharged by way of the orifices 42 in the nozzle 40 to be circulated within and around the flame stabilizer whereby the fuel-air mixture begins to burn therein and the flame produced within and above the flame stabilizer 44 remains stable during pressure fluctuations within the flare pilot 26.
Also attached to the nozzle 40 or to the fuel-air mixture inlet pipe 28 or to the pipe 82 is a wind shield generally designated by the numeral 48. The wind shield 48 has a partially closed or open lower end 50. In the embodiment shown in the drawings, the lower end 50 of the windshield is partially closed, i.e., the bottom includes an annular plate 51 having a plurality of openings 52 therein. A plurality of drain openings 54 are also provided in the lower sides of the flame stabilizer 44. The wind shield 48 is preferably cylindrical in shape and it includes an open upper end 56.
As best shown in FIGS. 1, 2, 3, 4 and 6a of the drawings, a substantially vertical upstanding wall portion 58 of the open upper end 56 of the wind shield 48 is positioned at the front of the wind shield 48 facing the open discharge end 24 of the flare stack 10. Ignition flames from within the wind shield 48 are discharged through the open upper end 56 of the wind shield 48 adjacent to the combustible fluid discharged from the flare stack 10. Preferably, as shown in FIG. 4, the wind shield 48 and the wall portion 58 thereof include at least one, and more preferably, a plurality of downwardly facing spaced openings 60 formed therein. The openings 60 function to allow a portion of rain and wind blowing in a direction from the back to the front of the wind shield 48 to exit the wind shield 48 without creating a substantial back pressure within the wind shield 48. As also shown in FIGS. 3, 4 and 6a, additional downwardly facing openings 62 can be formed in the front of the wind shield 48 below the upstanding portion 58 thereof.
Referring now to FIG. 6b, an alternate embodiment of the wind shield 48 is shown. That is, instead of being substantially vertical, the upstanding wall portion 58 of the wind shield 48 is inclined at the same angle as the rest of the wind shield 48. Either of the embodiments illustrated in FIGS. 6a or 6b can be utilized, but the embodiment illustrated in FIG. 6b may be slightly less costly to manufacture.
As best shown in FIGS. 3 and 5, preferably at least one opening, and more preferably, a plurality of openings is provided in each of the opposite sides of the wind shield 48 positioned at substantially right angles to said upstanding wall portion 58 thereof through which wind can flow into the interior of the wind shield 48. That is, one or a plurality of openings 68 are provided in one side of the windshield 48 and one or a plurality of openings 70 are provided in the opposite side of the wind shield 48. The wind shield 48 also preferably includes a pair of outwardly extending wind capturing baffles 64 and 66 attached to opposite sides of the wind shield 48. Each of the baffles 64 and 66 is positioned substantially around one or a plurality of the openings 68 and 70, respectively. As will be described further hereinbelow, without the presence of the baffles 64 and 66 and/or the openings 68 and 70, wind blowing from one or the other sides of the flare pilot 26 causes a suction effect or vacuum to be created in the wind shield 48. The baffles 64 and 66 and/or the openings 68 and 70 cause a portion of the wind to be captured and flow through the opening or openings 68 or 70 into the interior of the wind shield 48 to thereby off set the suction effect and equalize the pressure within the wind shield 48. As shown in FIG. 5, the openings 68 and 70 are preferably positioned so that the captured wind flowing through the openings is caused to flow towards the lower end 50 of the wind shield 48.
Referring again to FIGS. 1 and 2 and as mentioned above, when used, the upper end of the pipe 82 is connected to the flare pilot 26. The lower end of the pipe 34 is connected to the apparatus for igniting the fuel-air mixture discharged within the wind shield 48 and to apparatus for detecting the presence or non-presence of flame therein, i.e., the ignition flame front generator 36 and the flame detector assembly 38. As best shown in FIGS. 5 and 7, the upper end of the pipe 82 is sealingly connected to an elongated slot 74 in a side of the wind shield 48.
As will now be understood, the ignition flame propagated through the pipes 34 and 82 from the ignition flame front generator 36 enters the interior of the wind shield 48 by way of the slot 74 and ignites the fuel-air mixture discharged within the interiors of the flame stabilizer 44 and wind shield 48 by the nozzle 40. In addition, the presence or non-presence of the level of sound produced by flame emanating from the interior of the wind shield 48 is conducted by the pipes 82 and 34 to the flame detector assembly 38. A plurality of spaced openings 78 are optionally included in the wind shield 48 at a location adjacent to the slot 74 to relieve the pressure created when the fuel-air mixture discharged by the nozzle 40 is ignited by an ignition flame propagated through the slot 74.
In the operation of the flare pilot 26, pressurized fuel gas from a source thereof is conducted by the pipe 29 to the fuel-air mixer 32 wherein atmospheric air is mixed with the fuel gas. The resulting fuel-air mixture flows through the conduit 28 and through the orifices 42 of the fuel-air mixture discharge nozzle 40 into the interior of the flame stabilizer 44 and the wind shield 48. When used, the ignition flame front generator 36 is operated to produce an ignition flame which is propagated through the pipes 34 and 82 and through the slot 74 in the wind shield 48 of the flare pilot 26 to thereby ignite the fuel-air mixture flowing into the flame stabilizer 44 and the wind shield 48. The ignition flames produced by the flare pilot 26 within the wind shield 48 extend through the open end 56 of the wind shield 48 and ignite combustible fluid streams flowing out of the open discharge end 24 of the flare stack 10.
It has been found that when a high wind, i.e., a wind having a velocity up to and greater than 125 mph contacts a conventional flare pilot, one of two things can take place that extinguishes the flare pilot flame. That is, either the high wind creates a suction effect that increases air entrainment in the fuel-air mixture which causes the fuel-air mixture to be outside its flammability range and extinguishes the pilot flame, or the wind creates a positive pressure or pushing effect on the flare pilot fuel-air nozzle which retards, stops or reverses the flow of the fuel-air mixture and extinguishes the pilot flame. Referring to FIG. 2 of the drawing, the pushing effect takes place when a high wind contacts a conventional flare pilot in the direction indicated by the arrow 80, i.e., in a direction head-on to the front of the flare pilot 26. The suction effect is produced when a high wind contacts a conventional flare pilot from the side, i.e., from the direction indicated by the arrows 82 or 84, or to a lesser extent from the rear, i.e., the direction indicated by the arrow 86.
The flare pilot of the present invention eliminates the high wind flame extinguishing problems associated with the above described pushing effect and suction effect. That is, the high wind pushing effect is eliminated by the flare pilot of the present invention as a result of the provision of the wind shield 48 having an open upper end 56 which includes an upstanding wall portion 58 positioned at the front of the wind shield 48. A high wind flowing over the open discharge end 24 of the flare stack 10 in the direction indicated by the arrow 80 develops a downward momentum due in part to the low pressure zone created by the wind at the downstream side of the flare stack 10. The downward flow of the wind enters the conventional flare pilots utilized heretofore and causes the pushing effect. This is contrasted with the flare pilot 26 of this invention that includes the upstanding wall portion 58 which shields the front of the opening 56 and prevents or partially prevents wind from entering the wind shield 48. While the wall portion 58 includes the openings 60 therein, the openings 60 are preferably orientated at a downward angle from the inside to the outside of the wall portion which effectively prevents the wind in the opposite direction from entering the windshield 48. Thus, the pushing effect does not occur in the flare pilot 26 of this invention to a great enough degree to extinguish the flare pilot flames even when the wind speed is as high as 160 mph in the direction of the arrow 80.
When a high wind contacts the flare pilot 26 from a side direction indicated by either of the arrows 82 or 84, the suction effect is wholly or partially prevented by the inlet opening or openings 68 or 70 which are positioned in opposite sides of the wind shield 48 at substantially right angles to the front of the windshield facing the open end of the flare stack 10. When used, the U-shaped wind baffles 64 or 66 capture additional wind which flows into the interior of the wind shield 48 by way of the openings 68 or 70. This wind flow prevents or reduces the suction effect whereby it does not occur in the flare pilot 26 to a great enough degree to extinguish the flare pilot flames.
As will be understood by those skilled in the art, when the wind direction is in between the directions indicated by the arrows 80, 82, 84 and 86, any suction effect or pushing effect produced is cancelled as described above by a combination of the wall portion 58, and the various openings in the wind shield 48 which function as described above.
It is known in the prior art to ignite combustible fluids discharged from the open end of a flare stack with one or more continuously operating flare pilots positioned adjacent to the open end of the flare stack. The flare pilots utilized heretofore have been comprised of a fuel-air mixture inlet pipe, a fuel-air mixture discharge nozzle connected to the fuel-air inlet mixture pipe and a wind shield having an open upper end and a lower end attached to the fuel-air mixture discharge nozzle, the fuel-air mixture inlet pipe or the like. In high winds, rain and other severe weather, both the heretofore used flare pilots and the combustible fluid being flared have sometimes been extinguished which allowed the waste or other fluid being flared to be discharged directly into the atmosphere without being combusted.
In accordance with a method of the present invention, an improved flare pilot is utilized which remains lit at very high wind speeds in combination with very high rain amounts, i.e., the method includes the steps of providing a heretofore utilized flare pilot as described above with an upstanding wall portion positioned at the front of the windshield which faces the open end of the flare stack and/or providing at least one opening in each of the opposite sides of the wind shield at substantially right angles to the upstanding wall portion with or without outwardly extending wind capturing baffles through which wind can flow into the interior of the windshield.
Another method of the present invention for igniting combustible fluids discharged from the open end of a flare stack in high winds, rain and other severe weather comprises the steps of: (a) attaching at least one flare pilot which remains lit in winds having speeds up to 160 miles per hour or more combined with rainfall of 2 inches or more to the open end of the flare stack, the flare pilot being comprised of a fuel-air mixture discharge nozzle connected to the fuel-air mixture inlet pipe, a wind shield having a lower end attached to the fuel-air mixture discharge nozzle or the fuel-air mixture inlet conduit whereby a fuel-air mixture discharged from the fuel-air mixture discharge nozzle enters the interior of the wind shield, the wind shield having an open upper end and having an upstanding wall portion of the open upper end facing the open end of the flare stack and/or at least one opening in each of the opposite sides positioned at substantially right angles to the upstanding wall portion through which wind can flow into the interior of the wind shield; and (b) continuously operating the flare pilot to continuously ignite flammable fluids discharged from the open end of the flare stack.
In order to further illustrate the flare pilot apparatus of this invention, its operation and the methods of the invention, the following example is given.
Both a conventional flare pilot and a flare pilot of this invention were installed in a test facility and a large blower was utilized to generate wind. The flare pilots were operated to produce ignition flames and winds generated by the blower having speeds up to 160 mph or more were caused to contact the operating flare pilots from each of the directions indicated by the arrows 80, 82, 84 and 86 illustrated in FIG. 2 of the drawings. It was found that for a conventional flare pilot the greatest pushing effect was generated when the wind contacted the conventional flare pilot from the direction indicated by the arrow 80 and the greatest suction effect was generated by wind which contacted the flare pilot from the directions indicated by the arrows 82 or 84. In addition to the wind, the operating flare pilots were contacted with simulated rainfall at a rate up to and including 60 inches per hour. Several different fuels were utilized during the tests, i.e., propane, natural gas and natural gas with up to 40% hydrogen mixed therewith. The natural gas and propane fuels were utilized at pressures between 4 psig and 30 psig and the natural gas combined with hydrogen was utilized at pressures between 12 psig and 15 psig.
The test results demonstrated that the conventional flare pilot was rapidly extinguished at relatively low wind speeds and simulated rainfall. The flare pilot of this invention, on the other hand, stayed lit when contacted with wind at a speed of 160 mph with and without rainfall at the rate of 2 or more inches per hour at all positions around the flare pilot utilizing all of the various fuels described above.
Thus, the present invention is well adapted to carry out the objects and attain the ends and advantages mentioned as well as those which are inherent therein. While numerous changes may be made by those skilled in the art, such changes are encompassed within the spirit of this invention as defined by the appended claims. | |
South Africa is located at the southern tip of Africa. It is bordered by Namibia, Botswana and Zimbabweto north, Mozambique and Swaziland in east while within it lies Lesotho, an enclave surrounded by South African territory.
Land Area
Agricultural land 993780 square kilometres
Forest 92030 square kilometres
Water 6567 square kilometres
Desert 900,000 Square kilometres
National Park 37,000 Square kilometres
Total Land area 1,221,037 square kilometres
Districts
South Africa is divided into 52 district municipalities, Namakwa District Municipality with 126,747 square kilometres.
Mountains
South Africa has about 50 mountains with Mount Thabana Ntlenyana which is 3482 meters is the highest and Van Zinderen Bakker Peak which is the smallest with 672 meters
Longest River: Orange River
Largest Lake: Lake Chrissie
National Parks
South Africa has got twenty National Parks with Kruger National Park (19,633 square kilo meters) being the biggest. | https://fortuneofafrica.com/southafrica/2014/01/24/background-and-geography-of-south-africa/ |
A wave tank is a laboratory setup for observing the behavior of surface waves. The typical wave tank is a box filled with liquid, usually water, leaving open or air-filled space on top. At one end of the tank an actuator generates waves; the other end usually has a wave-absorbing surface.
Usually these tanks cost a lot money so i tried to make a really really cheap solution for students who want to use the tank for testing their projects.
Step 1: How Dose It Work
So the project consist of two actuators made using v-slot aluminium extrusions.
A stepper motor is connected to each actuator and both motors are controlled by same stepper motor drive so there is no lag.
Arduino is used to control the motor driver. A menu driven program is used to give input to the arduion connected via pc. Actuator plates are mounted on the v-slot gantry which will go back and forth once the motors start and this back and forth movement of plates generates the waves inside the tank.The wave height and wave length can be changed by changing the speed of the motor via arduino.
Step 2: Please Note Before Starting
I have not covered most of the small things how to use arduino or how to do welding to keep this tutorial small and easy to understand. Most of the missing things will cleared in the images and videos.Please message me if there are any problem or questions regarding the project.
Step 3: Gather All the Material
- Arduino micro contoller
- 2*Stepper motor (2.8 kgcm torque per motor)
- 1*Stepper motor Driver
- 2*V slot gantry system
- Steel or iron plates for tank body
- L-stiffeners to support body
- Fiber or plastic sheet to make actuator plate
- Wires 48 volt DC power supply
I have not included materials for v-slot gantry because the list will be very big then just google v-slot you will get many videos regarding how to assemble it i used 2040 aluminium extrusion. Motor capacity and power supply capacity will change if you want to carry more load.
Tank dimensions
Length 5.50 m
Breadth 1.07 m
Depth 0.50 m
Step 4: Variuos Dimensions
To make things simpler and tutorial shorter i have taken images of different components with a scale so that you can see the sizes of these.
Step 5: Making the Body
Body is made by 3 mm thick cast iron sheet.
Tank width is 1.10 meters ,length 5 meters and height 0.5 meters.
Tank body is made up of mild steel with stiffeners around it wherever necessary. Mild steel plates were bent and cut into various sections according to the tank dimensions. These sections were then erected by welding them together. Stiffeners were also welded together to make the structure more strong. | https://duino4projects.com/diy-wave-tank-flume-using-arduino-and-v-slot/ |
Marcia Clark books in order
Marcia Clark is an American criminal lawyer, television correspondent, television producer, and bestselling author of non-fiction, mystery and thriller books.
Born in Alameda, California, she holds a degree in political science from the University of California, Los Angeles, and a Juris Doctor degree from Southwestern University School of Law.
A prosecutor since being admitted to the State Bar of California in 1979, Marcia has worked as a criminal defense attorney and as a prosecutor in the Los Angeles District Attorney’s Office.
During her decade-long stay in the Special Trials Unit, Marcia was part of several high profile cases such as the prosecution of stalker and killer Robert Bardo, and the O.J. Simpson murder case.
Her debut novel Without a Doubt (1997) was #1 on bestseller lists such as the New York Times, Wall St. Journal, Washington Post, Los Angeles Times, and Publishers Weekly.
Marcia has been interviewed on shows such as Dateline NBC, NBC Nightly News, Ellen, Today, The View, The Early Show, Good Morning America, and Entertainment Tonight, and also featured in the Los Angeles Times, People, Vulture, Vogue, and Elle–just to mention a few.
Genres: Legal Thriller, Mystery, Non-fiction, Thriller
United States
Website: http://marciaclarkbooks.com/
Non Series
- Inherit the dead (2014)
Non-fiction
- Without a Doubt (1997)
Rachel Knight
- Guilt By Association (2011)
- If I'm Dead: A Rachel Knight Novella (2012)
- Guilt By Degrees (2012)
- Trouble in Paradise: A Rachel Knight Novella (2013)
- Killer Ambition (2013)
- The Competition (2014)
Samantha Brinkman
- Blood Defense (2016)
- Moral Defense (2016)
- Snap Judgment (2017)
- Final Judgment (2020)
Detailed book overview
Non Series
This New York Times and USA TODAY bestseller is a collaboration between twenty bestselling mystery novelists who have joined forces to create a spellbinding story of love, betrayal, and intrigue.
Pericles “Perry” Christo is a PI with a past—a former cop who lost his badge and his family when a corruption scandal left him broke and disgraced. So when wealthy Upper East Side matron Julia Drusilla summons him one cold February night, he grabs what seems to be a straightforward (and lucrative) case.
The socialite is looking for her beautiful, aimless daughter, Angelina, who is about to become a very wealthy young woman. But as Christo digs deeper, he discovers there’s much more to the lovely “Angel” than meets the eye. This classic noir tale twists and turns down New York’s mean streets and along the Hamptons beaches and back roads during a bitterly cold and gray winter where nothing is as it seems and everyone has something to hide.
In this inventive “serial novel” storytelling approach, each of the twenty bestselling writers brings his or her distinctive voice to a chapter of Inherit the Dead, building the tension to a shocking, explosive finale. The editor, Jonathan Santlofer, has arranged to donate any royalties in excess of editor and contributor compensation to Safe Horizon, the leading victim assistance agency in the country.
First Release: 2014
ISBN: 978-1451684773
Publisher: Touchstone
Non-fiction
Without a Doubt is not just a book about a trial. It's a book about a woman.
Marcia Clark takes us inside her head and her heart. Her voice is raw, incisive, disarming, unmistakable. Her story is both sweeping and deeply personal. It is the story of a woman who, when caught up in an event that galvanized an entire country, rose to that occasion with singular integrity, drive, honesty and grace.
In a case that tore America apart, and that continues to haunt us as few events of history have, Marcia Clark emerged as the only true heroine, because she stood for justice, fought the good fight, and fought it well.
First Release: 1997
ISBN: 978-1631680687
Publisher: Graymalkin Media
Rachel Knight
Los Angeles D.A. Rachel Knight is a tenacious, wise-cracking, and fiercely intelligent prosecutor in the city's most elite division. When her colleague, Jake, is found dead at a grisly crime scene, Rachel is shaken to the core. She must take over his toughest case: the assault of a young woman from a prominent family.
But she can't stop herself from digging deeper into Jake's death, a decision that exposes a world of power and violence and will have her risking her reputation -- and her life -- to find the truth.
With her tremendous expertise in the nuances of L.A. courts and crime, and with a vibrant ensemble cast of characters, Marcia Clark combines intimate detail, riotous humor, and visceral action in a debut thriller that marks the launch of a major new figure on the crime-writing scene.
First Release: 2011
ISBN: 978-0316198967
Publisher: Mulholland Books
It started with a haunting image: a Ford Explorer, iridescent in the moonlight and alone on a desolate stretch of beach. Its owner, Melissa Gibbons, has gone missing. Her husband says she flew the coop. But Los Angeles Deputy DA Rachel Knight is convinced otherwise: Melissa Gibbons has been murdered.
So begins the confounding case that Rachel must present before a disbelieving jury. A dissatisfied heiress and her philandering husband -- what really happened? The husband has a fiendishly convincing case that Melissa faked her own death and fled. But with the support of her trusty sidekick, Detective Bailey Keller, Rachel pieces together a much more sinister truth.
In this short, standalone Rachel Knight thriller, readers follow our savvy and riotously entertaining heroine through the surprising world of LA crime.
First Release: 2012
Ebook: B007BGQBE0
Publisher: Mulholland Books
Someone has been watching D.A. Rachel Knight -- someone who's Rachel's equal in brains, but with more malicious intentions. It began when a near-impossible case fell into Rachel's lap, the suspectless homicide of a homeless man.
In the face of courthouse backbiting and a gauzy web of clues, Rachel is determined to deliver justice. She's got back-up: tough-as-nails Detective Bailey Keller.
As Rachel and Bailey stir things up, they're shocked to uncover a connection with the vicious murder of an LAPD cop a year earlier. Something tells Rachel someone knows the truth, someone who'd kill to keep it secret.
First Release: 2012
ISBN: 978-0316199766
Publisher: Mulholland Books
In this digital-only short story, DA Rachel Knight and her besties take a Caribbean vacation and end up solving a crime.
With her besties Bailey and Toni in tow, Rachel leaves work and rainy LA behind and sets off for a much needed vacation in Aruba. Greeted by glittering sand and a balmy breeze, the three friends can't imagine anywhere more perfect.
But just minutes after hitting the beach, they're approached by a panicked young woman. A gofer on the biggest reality hit since "Survivor," she's lost the show's child star and must find her, now, before anyone else realizes she's gone.
Rachel, Bailey, and Toni put their dreams of paradise on hold and embark on a whirlwind search for the girl -- a search that ends with a twist so disturbing no one, not even a fortune-teller, could have seen it coming...
First Release: 2013
Ebook: B00B73T1XQ
Publisher: Mulholland Books
When the daughter of a billionaire Hollywood director is found murdered after what appears to be a kidnapping gone wrong, Los Angeles Special Trials prosecutor Rachel Knight and Detective Bailey Keller find themselves at the epicenter of a combustible and high-profile court case.
Then a prime suspect is revealed to be one of Hollywood's most popular and powerful talent managers -- and best friend to the victim's father. With the director vouching for the manager's innocence, the Hollywood media machine commences an all-out war designed to discredit both Rachel and her case.
Killer Ambition is at once a thrilling ride through the darker side of Tinseltown and a stunning courtroom drama with the brilliant insider's perspective that Marcia Clark is uniquely qualified to give.
First Release: 2013
Ebook: B00A2D7ZYE
Publisher: Mulholland Books
Los Angeles District Attorney Rachel Knight investigates a horrifying high school massacre.
A Columbine-style shooting at a high school in the San Fernando Valley has left a community shaken to its core. Two students are identified as the killers. Both are dead, believed to have committed a mutual suicide.
In the aftermath of the shooting, LA Special Trials prosecutor Rachel Knight teams up with her best girlfriend, LAPD detective Bailey Keller. As Rachel and Bailey interview students at the high school, they realize that the facts don't add up.
Could it be that the students suspected of being the shooters are actually victims? And if so, does that mean that the real killers are still on the loose?
First Release: 2014
ISBN: 978-1444755282
Publisher: Mulholland Books
Samantha Brinkman
Samantha Brinkman, an ambitious, hard-charging Los Angeles criminal defense attorney, is struggling to make a name for herself and to drag her fledgling practice into the big leagues.
Sam lands a high-profile double-murder case in which one of the victims is a beloved TV star―and the defendant is a decorated veteran LAPD detective. It promises to be exactly the kind of media sensation that would establish her as a heavy hitter in the world of criminal law.
Though Sam has doubts about his innocence, she and her two associates (her closest childhood friend and a brilliant ex-con) take the case. Notorious for living by her own rules―and fearlessly breaking everyone else’s―Samantha pulls out all the stops in her quest to uncover evidence that will clear the detective.
But when a shocking secret at the core of the case shatters her personal world, Sam realizes that not only has her client been playing her, he might be one of the most dangerous sociopaths she’s ever encountered.
First Release: 2016
ISBN: 978-1503954007
Publisher: Thomas & Mercer
For defense attorney Samantha Brinkman, it’s not about guilt or innocence—it’s about making sure her clients walk.
In the follow-up to bestselling Blood Defense, Samantha is hired as the legal advocate for Cassie Sonnenberg after a brutal stabbing left the teenager’s father and brother dead, and her mother barely clinging to life. It’s a tabloid-ready case that has the nation in an uproar—and Sam facing her biggest challenge yet. Why did Cassie survive? Is she hiding something?
As Sam digs in to find the answers, she’s surprised to find herself identifying with Cassie, becoming more and more personally entangled in the case. But when Sam finally discovers the reason for that kinship, she faces a choice she never imagined she’d have to make.
First Release: 2016
ISBN: 978-1503938694
Publisher: Thomas & Mercer
When the daughter of prominent civil litigator Graham Hutchins is found with her throat slashed, the woman’s spurned ex-boyfriend seems the likely suspect. But only days later, the young man dies in what appears to be a suicide. Or was it?
Now authorities are faced with a possible new crime. And their person of interest is Hutchins. After all, avenging the death of his daughter is the perfect reason to kill. If he’s as innocent as he claims, only one lawyer has what it takes to prove it: his friend and colleague Samantha Brinkman.
It’s Sam’s obligation to trust her new client. Yet the deeper she digs on his behalf, the more entangled she becomes in a thicket of family secrets, past betrayals, and multiple motives for murder. To win her case, she’s prepared to bend any law and cross any boundary that stands in her way.
Sam has always played by her own rules, and it’s always worked…so far. But this case cuts so deep and so personal that one false move could cost her everything.
First Release: 2017
ISBN: 978-1542045551
Publisher: Thomas & Mercer
When it comes to relationships and self-preservation, defense attorney Samantha Brinkman has always been cut and run. But it’s different with her new lover, Niko, an ambitious and globally famous entrepreneur. Sam is putting her faith in him. She has to. He’s also her new client―a suspect in the murder of an investor whose shady dealings turned Niko’s good life upside down.
He had the motive: revenge. As did many others who banked a fortune on the wrong man. That’s a point in Niko’s favor. So is his alibi for the day of the slaying. Until that alibi mysteriously disappears. As Sam’s feverish search for another viable killer begins, the investigation only leads deeper into Niko’s past and its secrets.
From the darkest suspicions to final judgment, fighting for Niko is Sam’s job. To do it, she must risk everything on a man who could make all her worst fears come true. | https://www.booksradar.com/clark-marcia/clark.html |
How to Draw a Cow. Drawing a cow can be as simple as combining rectangles and ovals and then refining the edges. This simple cow drawing can make anyone look like an artist. Painters like Constable made a whole career out of painting fields of grazing cows, so you might be on your way to artistic fame.
Start with a rectangle. This is the cow body, so make it as large as you want your cow to be.
Draw a smaller rectangle slightly overlapping the right side of the first rectangle.
Erase the overlapping line and the bottom line of the small rectangle. Draw an oval at the bottom of the small rectangle to make a muzzle.
Draw two ovals inside the smaller rectangle and two little circles inside those ovals for eyes. Add two lines inside the oval at the bottom of the small rectangle for nostrils and a curvy line for a mouth.
Stagger four skinny rectangles at the bottom of the main rectangle for legs. Add small ovals at the bottom of each of those for feet.
Place the udder of the cow at the bottom of the main rectangle.
Add a two-dimensional curvy line coming from the left side of the main rectangle to create a tail. Fray the end of the tail.
Color in black spots on the cow's body and legs.
Tip
Draw the boxes lightly as a guideline to make a more realistic cow as you get better with your drawing. Find a picture of a cow so you can have a visual reference for what you're drawing. | https://ourpastimes.com/how-to-draw-a-cow-12126872.html |
Risk, resiliency in aging brain focus of $33.1 million grant
Susan Bookheimer, PhD, the Joaquin Fuster Distinguished Professor of Psychiatry and Biobehavioral Sciences at the UCLA David Geffen School of Medicine, is co-principal investigator for a newly awarded nationwide study that will investigate what keeps our brains sharp as we age, and what contributes to cognitive decline. The study will be performed by researchers from UCLA, Washington University School of Medicine in St. Louis, Harvard University/Massachusetts General Hospital and the University of Minnesota.
Known as the Adult Aging Brain Connectome study, the project is funded by a $33.1 million grant from the National Institute on Aging, part of the National Institutes of Health (NIH). It will build on foundations laid by the Human Connectome Project. The Human Connectome Project and subsequent connectome studies mapped the anatomical and functional connections among brain areas in healthy children and adults of many ages, providing invaluable insight into normal brain structure and function across the life span.
Using techniques developed for the Human Connectome Project and the subsequent Mapping the Human Connectome During Typical Aging study, the Adult Aging Brain Connectome study will follow 1,000 younger, middle-aged and older adults over several years, taking multiple brain scans and collecting other data to help the researchers understand how each individual’s brain changes over time. The scientists will aim to identify factors that put people at risk for, or protect them from, cognitive decline.
“Many factors, from genes, lifestyle, stress, hormones, diet, and exercise, affect how we age- whether we will be resilient to risk factors for dementia, or whether and how quickly our brains and cognition decline with age,” said Dr. Bookheimer. “This longitudinal study examines these factors in depth starting from a place of good brain health across the adult lifespan, and seeks to understand how, when and why decline in brain function occurs over 5-10 years.” It is hoped that this study will help determine a person’s unique risk for unhealthy aging and understand what changes in lifestyle and behavior can improve outcomes.
The study is divided into four projects. The first looks at the effect of potentially harmful factors such as stress and inflammation on the brains of young adults. The second investigates the role of lifestyle factors such as exercise during mid-adulthood. The third studies hormonal changes that occur around the time of menopause, and their effects on brain function and structure. And the fourth looks at older adults who have retained their mental acuity well into their later years, to identify factors that protect them from Alzheimer’s disease and related dementias.
The project is led by Dr. Beau Ances of Washington University School of Medicine in St. Louis. Along with Dr. Bookheimer, other co-principal investigators are David Salat, PhD, assistant professor of radiology at Harvard Medical School/Massachusetts General Hospital; and Essa Yacoub, PhD, professor of radiology at the University of Minnesota.
The goal is to obtain at least three brain scans from each participant over about a 10-year period. Some participants already may have participated in the Mapping the Human Connectome During Typical Aging project and will provide two additional scans. Participants also will undergo regular cognitive testing and provide blood samples to be analyzed for molecular signs of Alzheimer’s disease, inflammation, and other biological processes. The researchers also plan to perform genetic analyses for inherited risk and protective factors.
A key aim of the project is to ensure a racial and ethnically diverse participant group so that the findings will be applicable to people of many backgrounds. The project’s Diversity Recruitment and Retention Unit is designing culturally sensitive and appropriate strategies to encourage the participation of people from under-represented groups such as African Americans and Hispanics.
When the project is complete, the researchers will have imaging data on 1,000 people, showing how their brains change over several years, coupled with demographic, genetic, molecular, and cognitive data on each person. Like their predecessors at the Human Connectome Project and Mapping the Human Connectome During Typical Aging study, the researchers leading the Adult Aging Brain Connectome project plan to make all of the data publicly available so other researchers can answer additional questions about human health and disease. | https://www.uclahealth.org/news/risk-resiliency-aging-brain-focus-331-million-grant |
Delivery of the Report will take 2-3 working days once order is placed.
SynopsisProteomics is the study of the structure and functions of proteins that are used in drug discovery, diagnosis, and treatment of diseases. A proteome is never constant as it differs from one cell to other with time. Proteomics is used to evaluate the rate of protein production, interaction of proteins with one another, involvement of proteins in metabolic pathways, and modification of proteins. Structural proteomics is used to identify the structure of protein complexes, while functional proteomics is used for characterizing the protein-protein interactions to demonstrate protein functions. In this report, the proteomics market is segmented by instrument, reagent, and services & software.
Table of Contents
Related reports : | http://www.market-research-reports.com/1026632-proteomics-company-regions-type-application-forecast |
Chef Josh Berry’s Maine Lobster Ravioli with buttery corn broth, petite basil and truffle essence.
Few combinations of ingredients when combined together invoke a surreal memory of a place. Fresh lobster, summer season native corn and wonderful butter…that’s Maine in the summer! These ingredients complement each other in such a way it is like poetry. A little basil and truffle oil is all you need to elevate this dish to its zenith performance.
Serves 4 (with leftover filling)
Lobster Filling Ingredients:
16 ounce fresh lobster meat, chopped
8 ounce shrimp, peeled, deveined and cleaned
1/3 cup heavy cream
2 tablespoons chives, chopped
salt & Pepper to taste
Lobster Filling Instructions:
Blend all in a food processor until well combined and smooth. Extra filling can be frozen for up to one month.
Pasta Dough Ingredients:
2 C semolina flour
6ea large egg yolks
1ea large egg
1½ t olive oil
Pasta Dough Instructions:
Make a well with the flour for the eggs, and oil to sit in. Stir eggs and oil around with your fingertips until the flour is incorporated. Once it starts to come together as a dough (you may need to add a few tsp. of water), form into a ball and knead the dough for about 15 minutes.
Let the dough rest for a half an hour before running it through the pasta roller. Roll the pasta in to a rectangle that is 6.5” long by 4”wide. Pipe a small amount of lobster filling on the bottom of the pasta sheet. Fold the bottom over the filling and wrap each end together (kind of making a cylinder of pasta with the filling in the bottom). Refrigerate the raviolo until ready to poach.
Corn Broth Ingredients:
4 ea ears of corn, shucked and cut off the cob, reserve the cob
8oz whole butter
Corn Broth Instructions:
Reserve the cut corn for the plated dish. In a medium size pot cover the kernelless cobs with water and slowly simmer for 1 hour until you have a good “corn stock”. Strain through a fine mesh strainer and whisk in the butter until combined. Reserve warm
Serving:
1 ea. 1¼ pound, live Maine Lobster cooked, deshelled. Cut up reserve cut corn. Poach off the ravioli in simmering salted water until cooked through, reserve warm. Heat the corn kernels and cut up lobster with a little corn stock and butter until “they get to know each other”, season with salt and pepper. In four pasta bowls, add one raviolo per bowl, fill with some of the corn-lobster mix. Spoon some of the buttery corn broth around the raviolo and garnish with some fresh basil and just the slightest whisper of white truffle oil. | http://www.maine-lylobster.com/2015/09/chef-josh-berrys-lobster-ravioli-recipe.html |
Introduction
============
Blood donation is considered as an important life-saving practice in medicine, especially in cases of medical emergency.[@b1-jbm-10-047]
The need for blood is universal; however, millions of patients who may need transfusion do not have timely access to safe blood, and there is a major imbalance between the developing and developed countries in access to safe blood. Safe blood transfusion is a major concern that needs the application of science and technology to blood processing and testing, as well as social efforts to promote blood donation by sufficient numbers of volunteers who are healthy and are at low risk of infections that can be transmitted to the recipients of their blood.[@b2-jbm-10-047]
The WHO Global Database indicated that \>92 million blood donations are collected annually from 164 different countries around the world. Around 1.6 million units were discarded due to the presence of infections such as hepatitis B and C, HIV, herpes and syphilis. In addition, at least 13 million donors were deferred due to having the risk of infection that could be transmitted through blood, a preexisting medical disease or anemia.[@b3-jbm-10-047] Due to this, blood donor selection is a cornerstone for blood transfusion safety, designed to safeguard the health of both donors and recipients.[@b4-jbm-10-047] Blood donor eligibility is determined by medical interview, based on national guidelines for donor selection.[@b5-jbm-10-047]
The key tool for blood donor selection would be a "donor questionnaire" that would assess a donor's health and history that would help assess if the donor has any risk for having infection that could be transmitted by blood and furthermore has no suitable screening test. After that, a confidential interview is conducted between the donor and a member staff to ensure that all questions are answered relevantly.[@b3-jbm-10-047]
Many studies have been conducted around the world concerning the causes for blood donor deferral, such as in Brazil, Turkey, India, Singapore, Dubai and Dammam, which is in the eastern region of Kingdom of Saudi Arabia.[@b6-jbm-10-047]--[@b11-jbm-10-047] Another study was conducted in the southern region of Jeddah; however, no study was carried out in the northern region of Jeddah, Kingdom of Saudi Arabia.[@b12-jbm-10-047] In this study, we aimed to analyze the commonest causes for blood donor deferral in northern Jeddah, Kingdom of Saudi Arabia.
Subjects and methods
====================
This cross-sectional study was conducted at King Abdullah Medical Complex, a major hospital in northern Jeddah, Kingdom of Saudi Arabia between October 2016 to May 2017. Ethical approval was obtained from the Directorate of Health Affairs, Department of Medical Research and Study, Jeddah. Data were held confidentially. This study was conducted in accordance with The Code of Ethics of the World Medical Association (Declaration of Helsinki) for experiments in humans. Informed consent was not needed because the study was conducted retrospectively. Data were collected from the records in the blood bank and then analyzed. About 400 donors came to apply for donation per month, including both Saudis and non-Saudis. About 20% of them underwent rejection. A sample of 500 deferred donors was selected; all were Saudis. Data were entered using Google Forms and then further analyzed by Microsoft Excel. Data were presented as numbers and percentages. The evaluation of all blood donors who came to apply for donation was done according to a questionnaire that included questions of personal history of behaviors, traveling and medical conditions. After that, the intended blood donor underwent a medical examination consisting of weight, height, vital signs and hemoglobin level. The American Association of Blood Bank's guidelines and the blood bank's guidelines were used for either selection or rejection.
All the donors were educated and the process of donation was fully explained to them. The donors were confidentially requestioned orally about certain risk behaviors, history of traveling and many other conditions that would eventually affect the recipient's safety. All this was done to make sure of the donor's eligibility.
Results
=======
This study was conducted on 500 selected Saudi deferred blood donors. Most of those who were rejected were males (428 \[85.6%\]) and the rest were females (72 \[14.4%\]), as shown in [Table 1](#t1-jbm-10-047){ref-type="table"}. Their ages ranged from 16 to 76 years, with most of them aged between 21 and 25 years (119 \[23.8%\]), as shown in [Table 2](#t2-jbm-10-047){ref-type="table"}.
The deferral of blood donors was categorized under three main categories: personal causes, causes due to significant medical examination and other causes due to a donor's history. [Table 1](#t1-jbm-10-047){ref-type="table"} also illustrates that 236 (47.20%) were deferred due to significant medical examination, 213 (42.60%) due to significant history and only 51 (10%) were rejected due to personal issues.
Concerning the personal causes for deferred blood donors, the commonest was that the intended blood donor was not getting enough sleep in the night prior to donation (29 \[5.80%\]), as shown in [Table 3](#t3-jbm-10-047){ref-type="table"}.
Regarding the examination causes for rejection, the commonest was that the donor had low blood pressure (68 \[13.60%\]), followed by low hemoglobin (54 \[10.80%\]), high hemoglobin (35 \[7%\]) and high blood pressure (28 \[5.6%\]), as shown in [Table 4](#t4-jbm-10-047){ref-type="table"}.
A donor's previous history of some personal behaviors, medical conditions or even traveling was also taken in to consideration as a cause of refusal. The most frequent was that the donor had undergone cupping (58 \[11.6%\]), followed by antibiotic ingestion (32 \[6.4%\]), dental causes (18 \[3.6%\]) and having undergone an operation (16 \[3.2%\]), as shown in [Table 5](#t5-jbm-10-047){ref-type="table"}. Least causes of rejection in this study included infectious disease such as malaria (2 \[0.4%\]), hepatitis (2 \[0.4%\]), sexually transmitted diseases (2 \[0.4%\]), hepatitis B virus antibodies (1 \[0.2%\]) and HIV (1 \[0.2%\]). There were other deferral causes such as history of having a nonmarital sexual relation (3 \[0.6%\]), tattoo in the past 3 months (1 \[0.2%\]), visited Africa 1 (0.2%) and visited Sudan less than a year ago (1 \[0.2%\]), all of which increase the risk of exposure to various infectious diseases. Other least common purposes in this category are mentioned in [Table 5](#t5-jbm-10-047){ref-type="table"}.
Discussion
==========
Billions of blood groups and their products are transfused every year all around the world. In the USA, about 13.6 million units of red blood cells and whole blood were transfused in 2013.[@b13-jbm-10-047] Donors who come to the blood bank have "altruistic intentions", and they believe themselves as healthy entities, though some of these contributors may be unfit to donate blood. Hence, it is the duty of the blood bank centers to recognize these unfit donors and defer them provisionally or permanently.
In our study, it has been found that 11.6% were refused to donate due to cupping. Similarly, Abdelaal et al[@b12-jbm-10-047] found that 7.3% were refused due to cupping. The widespread practice of cupping reflects the religious beliefs of the Saudi population in the fact that cupping can manage a variety of diseases.[@b16-jbm-10-047]
It has also been found in our study that 5.80% were deferred due to less hours of sleep at night. Abdelaal et al[@b12-jbm-10-047] also found that inadequate sleep was one of the commonest causes of deferral (6%). This may reflect the unhealthy sleeping habits in the Saudi population, as also concluded in previous studies done specifically in Jeddah and generally in the Middle East.[@b15-jbm-10-047],[@b18-jbm-10-047]
Our study showed that 13.6% were rejected due to low blood pressure. Similarly, Abdelaal et al[@b12-jbm-10-047] reported 12% were rejected due to the same cause. The low blood pressure could be due to the anxiety experienced prior to donation. Various studies have shown that low blood pressure is associated to anxiety.[@b14-jbm-10-047],[@b17-jbm-10-047]
Low hemoglobin as a cause of blood donor refusal accounted for 10.8% in this study. This is similar to that reported in other studies done in Turkey, India, Singapore, Dubai and Dammam, especially among females.[@b7-jbm-10-047]--[@b11-jbm-10-047] This could be due the menstrual loss of blood in the childbearing age group and consumption of low-iron diet.
In a study which was also conducted in Jeddah, Abdelaal et al[@b12-jbm-10-047] illustrated that deferral due to high hemoglobin was 0.4%, which was not as common as what has been found in our study, which showed 7% rejection due to high hemoglobin. They were mostly males, and their hemoglobin levels ranged from 17 to 21 g/dL. The reason why high hemoglobin was not reported as a cause of deferral in the previous study done in southern Jeddah may be due to the differences between the criteria of both centers for donor deferral. Since smoking is more common among males than females, a possible cause of high hemoglobin levels in males could be smoking, as concluded in multiple previous studies conducted in the years 2016, 2012 and 1990.[@b20-jbm-10-047]--[@b23-jbm-10-047]
Other studies showed slight differences in the commonest deferral causes, such as a study that was done in the USA that reported sore throat or having a cold or high temperature as the common causes of deferral, which were not much significant in our study.[@b19-jbm-10-047]
Unlike the findings of this study, a study that was conducted in Singapore showed that infectious diseases such as hepatitis, recent infection with measles and recent sexual activity which increased the risk of sexually transmitted diseases were major causes of blood donor deferral.[@b9-jbm-10-047] Sexually transmitted diseases are generally low in Kingdom of Saudi Arabia compared to that in other countries worldwide, which is due to religious teachings;[@b27-jbm-10-047] however, there are higher risks of being exposed due to traveling abroad.[@b24-jbm-10-047]
People were rejected due to history of visiting Africa or Sudan particularly, mainly because they are known endemic areas for malaria and HIV.[@b25-jbm-10-047],[@b26-jbm-10-047] There was a study done in Sudan that showed an incidence of 9 million episodes of malaria and 44,000 deaths, all in the year 2002.[@b25-jbm-10-047]
The similarities and variations seen between studies conducted on causes of blood donor rejection may be due to the different geographic areas and the cultural, educational and socioeconomic factors.
Conclusion
==========
Low blood pressure (13.6%), cupping (11.6%) and less hours of sleep in the night prior to donation (5.8%) were the major causes of rejection in this study. Similarities and variations between the commonest causes of blood donor rejection may be due to the differences and similarities in the geographic area and in the cultural, educational and socioeconomic factors.
We would like to take this opportunity to express our profound gratitude and deep regards to King Abdullah Medical Complex in Jeddah for supporting our research by providing the data needed. We would also like to thank our teachers Dr Saeed Mohammed Al Amoudi, Dr Heba Tawfiq and Dr Enaam Junainah who all provided us with guidance throughout our journey while working on this research. Nevertheless, their supervision, insight and expertise which greatly assisted the research. Great thanks to Mr Abduljawad Albeshri and Miss Banan Alsagga for their assistance during data collection. We would also like to show our gratitude to our dear family members for their endless patience with us throughout our work.
**Disclosure**
The authors report no conflicts of interest in this work.
######
Gender distribution and categories of causes of deferral
Gender No. deferred (%)
------------------------------------ ----------------------
Male 428 (85.6)
Female 72 (14.4)
**Category of causes of deferral** **No. deferred (%**)
Personal causes 51 (10%)
Examination causes 236 (47.20%)
History causes 213 (42.60%)
######
Age ranges of the deferred donors
Age ranges in years No. deferred (%)
--------------------- ------------------
16--20 38 (7.6)
21--25 119 (23.8)
26--30 99 (19.8)
31--35 87 (17.4)
36--40 68 (13.6)
41--45 34 (6.8)
46--50 19 (3.8)
51--55 20 (4)
56--60 12 (2.4)
62--76 4 (0.8)
**Total** **500 (100)**
######
The personal causes for blood donor deferral
Personal Causes No. of deferred (%)
------------------ ---------------------
Less sleep hours 29(5.8)
Old age 8 (1.6)
No vein 6 (1.2)
No ID 3 (0.6)
Young age 3 (0.6)
Didn't come back 2 (0.4)
**Total** **51 (10%)**
######
The examination causes for blood donor deferral
Examination causes No. deferred (%)
------------------------------------------- ------------------
Low blood pressure 68 (13.6)
Low hemoglobin 54 (10.8)
High hemoglobin 35 (7)
High blood pressure 28 (5.6)
High pulse 22 (4.4)
Low weight 14 (2.8)
Low pulse 7 (1.4)
Fever 3 (0.6)
Increased weight 3 (0.6)
Palpitations 1 (0.2)
Fainted during blood pressure measurement 1 (0.2)
**Total** **236 (47.20%)**
######
A donor's history, which caused deferral
History No. of deferred (%)
----------------------------------------- ---------------------
Cupping 58 (11.6)
On Antibiotic 32 (6.4)
Dental procedure 18 (3.6)
Operation 16 (3.2)
Injection in past 8 weeks 7 (1.4)
Growth hormone 6 (1.2)
Donated in past 8 weeks 6 (1.2)
Asthma 6 (1.2)
Aspirin 4 (0.8)
Leukemia 4 (0.8)
Travelled outside Saudi Arabia recently 4 (0.8)
Dizziness 3 (0.6)
Allergy 3 (0.6)
On insulin 3 (0.6)
Chest pain 3 (0.6)
Sexual relations (non-marital) 3 (0.6)
On medications 3 (0.6)
Heart/lung disease 2 (0.4)
Donated one month ago 2 (0.4)
Eczema 2 (0.4)
Diabetic 2 (0.4)
Malaria 2 (0.4)
Hepatitis 2 (0.4)
Sexually transmitted disease 2 (0.4)
Tattoo in the past 3 months 1 (0.2)
Visited Africa 1 (0.2)
Donated 2 units in past 16 weeks 1 (0.2)
Common cold 1 (0.2)
Bone/skin grafting 1 (0.2)
Post-cesarean section since 10 months 1 (0.2)
Psychiatric pills 1 (0.2)
Used needles 1 (0.2)
Drugs 1 (0.2)
Plasma injection 1 (0.2)
Transplantation 1 (0.2)
Hepatitis B Virus (HBV) antibodies 1 (0.2)
On hormones 1 (0.2)
Visited Sudan less than a year ago 1 (0.2)
Deferred previously 1 (0.2)
Prison 1 (0.2)
Wounds on hand 1 (0.2)
Human Immunodeficiency Virus (HIV) 1 (0.2)
On Anticoagulant 1 (0.2)
Sick 1 (0.2)
**Total** **213 (42.60%)**
| |
Home stretch!
Thanks for hangin’ in there. We’re in the final part of this series.
If you missed the earlier posts, you’ll want to read them to learn the first 6 things that enabled us to pay off over $51,000 of student loan debt:
Otherwise… let’s finish this!
Here are the last 2 things we did.
7. We Budgeted Each Month and Tracked Our Expenses
A budget is telling your money where to go instead of wondering where it went.”Dave Ramsey
One thing I’m constantly striving for is that my actions reflect my goals and priorities. This includes what we do with our money and budgeting plays a significant role in ensuring this.
If our goal is to pay off our student loans as quickly as possible, then we need to make sure we are living within our means, making our student loan payments a priority and not incurring additional debt. And to do this, we set a budget each month and do our best to hold ourselves accountable to it by tracking our expenses throughout the month.
While some months may have similar expenses, Our monthly expenses aren’t exactly the same every month. So, I like to set a budget for each month to account for what’s going on that month. It’s more accurate and applicable.
For example, in early spring and fall, we have clothing expenses for our kids to account for changing seasons and growth spurts. During the summer, we have higher childcare expenses with our daughter going to summer camps, rather than just afterschool care. Over November and December, we have holiday-related expenses for the festivities we take part in and the gifts we purchase. And in certain months, certain annual bills are due. You get the picture.
Then throughout the month, I’d track our expenses to see if we were sticking to our budget. This helped ensure we did our best to spend only what money we had available and be able to pivot early enough if we needed to. When we find that we’ve overspent in an expense category. We review our budget to see what other expense category had some wiggle room. And we’d move some of the allocated funds from that category to cover our overspending of the other category.
At times, we’d incur unplanned expenses, or something we budgeted for would end up costing more, or we’d totally forgot to budget for something that was due that month. Reviewing our budget and expenses regularly kept us on our toes and enabled us to quickly adjust, as needed, so we could stay within our budget.
Takeaway Action: Does your budget align to your goals and priorities? If your goal is to pay off debt, are you making debt payments a priority and making sure you don’t incur additional debt?
Create a monthly budget and customize it to your monthly needs. Your monthly expenses will vary to some degree, so your budget should vary as well.
But don’t stop with just setting a budget. You must also hold yourself accountable to it. Track your expenses throughout the month and if something happens that affects your budget, adjust and pivot. Do your best to only spend what you actually have.
After a few months of having a monthly budget, review it so you learn your spending behaviors/patterns and think of ways you can improve your system.
8. We Didn’t Take an “All of Nothing Approach” and Eliminate What We Value
The budget is not just a collection of numbers, but an expression of our values and aspirations.”Jack Lew
Because we want to pay off our student loans as quickly as possible, we tried to keep our expenses as low as we possibly could. BUT, we also tried to do this without totally reducing our overall quality of life either.
What do I mean by this?
As you already know, becoming debt-free is important to us. But health and wellness is also important to us. And, we’re a family of food lovers. So, we don’t totally strip down our grocery budget and just have “rice and beans” (like Dave Ramsey recommends) or ramen everyday. At the same time, we’re not extravagant with our food budget either. While I try to buy organic produce as much as possible, we are also cost-conscious. We look for deals and buying what’s on sale where we can. And, we stretch our grocery budget by having leftover nights or repurposing leftovers as something else. But we also don’t just buy food that may not be the best quality or be the healthiest option just because it’s on sale either.
In addition, we didn’t just cut expenses for the sake of cutting expenses. Cutting everything, including ones that bring us value and joy, as well as the ones that align with our priorities, can be an easy way to fall off the debt pay-off journey quickly.
As I mentioned, health and wellness are important to us. So we actually decided to join the local YMCA in the last year. My husband works out at least 3 times a week… and I … well, I’m a work in progress 😉 But I do try to work out at least twice a week. And our kids love their Child Watch program. As a family, we go almost every weekend. It’s an affordable way for my husband and I to have an hour or two break in the weekend, working out while the kids play. And, it helps our family be more active.
Because we know our journey will take a few years, we made the conscious choice of not making it an “all or nothing” approach. We figured that we can make an effort to aggressively pay off our loans, while still “have a life.”
Going extreme and eliminating all spending, including certain things that we enjoy and value, will feel depriving in the long run that we’d be at risk of giving up sooner. It’s like going on a crash diet versus changing your lifestyle by eating more fruits and vegetables everyday and exercising regularly to get to a healthier weight. It’ll take longer to see results with the latter, but the results are more lasting and your chances for success are better than with a crash diet.
But, it didn’t mean we had a free for all with our spending either. We took the time to really think through what was important to us and made choices to figure out how we could balance out allocating funds toward our financial goals and still prioritize some of the other things that are important to us given the resources we had at our disposable.
Takeaway Action: In addition to knowing your financial goal and why you have that goal, think about what you and your family value. Make sure you are allocating time and money into that as well. Review all your expenses and think about what can be reduced or eliminated. But also, think about the things that might be missing from your budget and you should probably be spending on. It’s not all about total elimination.
The road to becoming and living debt-free (especially if you have a massive amount) is long and hard. Don’t put yourself on a “crash diet” for this process. Help yourself not easily give up by not totally depriving yourself of everything that brings you joy (within reason and within your budget).
Our journey to becoming debt–free is hard. It will take time and require a lot of patience, grit and effort. To succeed, we need to consistently make decisions that align with our overall goal and intentionally take the necessary steps to achieve it. And I think it’s the sustained and consistent little steps we take that will add up and yield us that large impact in the end.
Are you ready to start tackling your debt?
If you are, set yourself up for success and do the following:
- Set a goal – one that is inspiring enough to make you dig deep.
- Take some to reflect and think about your why – what’s the deeper reason behind your goal?
- Create an action plan and revisit regularly – your action plan will do you no good if you just let it sit there collecting dust, do what it’s intended for and take action – your plan is only as good as your actions.
- Change your mindset and start believing you can do this – if you’re not there yet, just keeping telling yourself that you can do it until you slowly start to believe it for real.
- Keep your goal and plans top of mind by talking about it regularly with your spouse, a family member or a friend, and track your progress as you go.
- Practice the art of delayed gratification – your choice to make sacrifices today will lead you to achieving your long-term goal.
- Set a budget each month and track your expenses – tell your money what to do and make sure you’re living within your means.
- Don’t take an all-or-nothing approach by cutting all expenses, including the ones that bring you joy or align with your values – allocate time and money into these within reason and within your budget.
And that is a wrap, my friend!
Thanks for hangin’ in there. I know this was a long one. But I hope you were able to learn from our experience and got some encouragement to start in your debt pay-off journey or keep goin’ at it if you’re already on your path.
I wish you good luck on your way to becoming debt-free! | https://happinessinbetween.com/8-things-we-did-to-pay-off-over-51k-of-student-loan-debt-in-17-months-part-3/ |
The University of Vermont (UVM) invites applicants for a full-time (.75 to 1.0 FTE) 9-month, renewable, non-tenure track Lecturer position within the Department of Community Development and Applied Economics (CDAE) with expertise in communication design, community-centered design and multimedia production.
This position starts August 22, 2022. Qualified applicants must possess a relevant Masters or Ph.D. at the time of appointment. The successful candidate will contribute to teaching introductory to advanced courses in the Public Communication and Community-Centered Design majors. Presence on campus for instruction, advising, and department meetings is expected.
Preferred qualifications include teaching and/or professional experience in visual communication design, digital and emerging media production, and socially engaged design practice. Desired experience using digital media technologies, including the Adobe CC and other industry-standard design software.
We are seeking candidates with the ability to instruct a variety of class formats including seminar, studio/lab, lecture, and service learning, across in-person, online, and hybrid modalities.
The CDAE Department is a transdisciplinary, applied social science unit with scholarly activity focused on sustainable local, regional and international communities through research, education, and outreach. CDAE offers undergraduate majors in Community Entrepreneurship, Community and International Development, Public Communication, and Community-Centered Design. We also offer a Master of Science (MS) in Community Development and Applied Economics, Master of Public Administration (MPA), and Ph.D. in Sustainable Development Policy, Economics and Governance. A willingness and ability to teach across our majors is desired, and there is the potential for teaching at the graduate level.
All candidates must apply online at www.uvmjobs.com, to posting number F2012PO and must attach to their application a cover letter, curriculum vitae or resume, a document explaining their teaching philosophy, and a diversity statement. The University is especially interested in candidates who can contribute to the diversity and excellence of the academic community through their research, teaching, and/or service. Applicants are requested to include in a statement of how they will further this goal. Applicants are also required to list three references with contact information. Review of applications will begin on December 15, 2021 and will continue until suitable candidates are identified.
Members of the University of Vermont community embrace and advance the values of Our Common Ground: Openness, Respect, Responsibility, Integrity, Innovation, and Justice. The successful candidate will demonstrate a strong commitment to the ideals of accessibility, inclusiveness, and academic excellence as reflected in the tenets of Our Common Ground. To learn more about Our Common Ground please visit: https://www.uvm.edu/president/our-common-ground
The University of Vermont is an Equal Opportunity/Affirmative Action Employer. Applications from women, veterans, individuals with disabilities and people from diverse racial, ethnic, and cultural backgrounds are encouraged. Interested candidates are encouraged to visit the UVM-CDAE website: www.uvm.edu/cdae and the city of Burlington, Vermont website: www.burlingtonvt.gov. Contact Professor Jane Petrillo, Search Committee Chair: 802-656-0646, [email protected] or Dr. David Conner, CDAE Chair: 802-656-2001; [email protected] with questions regarding this position. | https://ecasite.org/aws/ECA/page_template/show_detail/72593?model_name=job |
Imagining, planning, designing cities - or parts of them - means designing collective futures. The seminar explores those significant questions that communities are facing in the contemporary transformations of their living environment. Whom are the futures designed for? How possible and imaginable futures, and related socio-cultural-economic-ecological conditions, affect contemporary design decisions? What is the temporal horizon of the design perspectives (Short? Medium? Long?). The contamination of disciplinary boundaries between landscape, architecture, urbanism, ecology, and futures studies (a recent branch of social sciences) has forced to expand and redefine the practice of designers and their field of operations. Following this, the seminar will focus on the expansion in approaches and definitions by associating the concept of future-proofing with the assessment of relevant megatrends; the megatrend assessment is considered the starting point to support the definition of future-proof policies or interventions.
We consider climate change as a key factor requiring the development of resilience in addition with other megatrends which might create synergies and reinforcing effects (both positive and negative), depending on the preparedness of social-economic systems and actors. The interaction among participants will consist of a facilitated discussion inspired to the MEGATRENDS IMPLICATIONS ASSESSMENT - A Workshop on Anticipatory Thinking and Foresight for Policy Makers (by the Joint Research Centre, JRC 2017), using the platform MURAL and an original template (created for the event).
Expectations
Students will be actively involved in interactive activities with the aim to achieve new knowledge of theories and practices on climate adaptation and urban resilience, as well as innovative tools for engaging communities. The seminar is specifically designed to address multiple disciplines and enrollment is encouraged for students from the fields of landscape architecture, architecture, urban planning and design, ecological design, as well students from environmental sciences, economics and social sciences interested in the long-term management and design of built environments or territories but it is also opened to other disciplines.
Activity Description
- Short and intensive lectures on design approaches and future studies methodologies.
- Applied exercise where participants work in groups on future-proofing for climate-resilient communities themes in order to test the proposed methodology.
- Collective restitution of the results in groups and to the larger audience.
TO PREPARE FOR THE LECTURE, make sure to get familiar with the following documents:
- Urban Tracks: Cities shaping collective futures? Download Urban Tracks: Cities shaping collective futures? | https://www.utwente.nl/en/autumn-challenge/Autumn%20Challenge%20Timeline/Stories/Thematic%20Lecture%20(elective)%20%E2%80%93%20Resilient%20communities%20in%20the%20age%20of%20transitions/ |
Has your child ever come home from school and told you they are bad at math?
Many children are growing up believing they can’t do it, and once that belief becomes ingrained, it’s hard to get past it. The easy answer is to tell your child that it doesn’t matter because nobody uses math skills once they’ve left school, and that you weren’t particularly good at it either. Unfortunately, that doesn’t cut it. Math does matter, and you do use it when you’ve left school, though you may not realize it.
Research by Dr. Tanya Evans of Stanford University suggests that those with a better aptitude at math have more connections in their brains, are better problem solvers, have a higher level of analytical skills and greater visual attention. In addition, we use math to tell the time, to work out bus timetables, to weigh and measure, to work out change, or how to divide a bill. We use math all the time, in every area of our life. Yet the most recent OECD (Office for Economic Cooperation and Development) study into student attainment, the Program for International Student Assessment (PISA), has the UK ranked 20th in the world for mathematical performance and the USA ranked 36th.
Is there anything that you, as a parent, can do to help your child become more confident with math? There’s plenty you can do, and you don’t have to be Einstein to work alongside your children to do this.
1. Start with young children by counting everything
A lot of math is abstract, so anchoring the idea of numbers to quantity or actual objects is important; this is called 1:1 correspondence. Rather than learning to count by rote, counting objects, such as steps, eggs, fingers, or toys, will ensure that the numbers have meaning. They will know the connection between the number symbol, the language, and the quantity.
2. Use real objects for calculations
When you are working with calculations, use real objects. “I had twenty toy cars but gave you four. How many are left?” Show that you can count them again, or you can count back the four from twenty. It’s the same with fractions – get a cake or a chocolate bar and chop it up. Anchoring math in reality helps children understand what is happening to their calculations or fractions and prepares them to move on to abstract images or numerical representations.
3. Keep bringing older kids back to real life
As your child gets older and moves on to bigger calculations, keep bringing them back to real life as much as possible. You can relate it to food or money — preferably something they can visualize. Even though they have moved away from concrete objects that they can manipulate and count, it will help them to be able to visualize those things to support their understanding of the calculations they are learning. Having a context will also help give them a sense check to make sure their answer makes sense.
4. Don’t stick to just one calculation method
Look at a question together to decide on the best method. Is there an easy way to do this in our head? For example, 19,998 + 3999. Many children see large numbers and jump to the formal column method that they’ve been taught even though this is time-consuming and involves exchange, with many opportunities for an error. Take a second look at the numbers, however, and we can see that 20,000 + 4,000 – 3 would be a much easier way to do it. Get a random selection of calculations and look at the different ways we could solve them — what are the best ways?
5. Get them involved in everyday learning opportunities
Get them involved in real-life math all around you every day — from counting the money in your purse, buying things and getting change, playing games that need scoring, counting spaces on board games, measuring in cookery and baking, looking at train timetables, working out how long something will take, to using maps relating to coordinates. Get them to help you measure for that new pair of curtains or measure the chest of drawers to see if it will fit in the new spot. These are everyday learning opportunities that are so much more valuable than the worksheet you can download off the internet.
Most importantly, through all of this, is to keep math fun. Make solving mathematical problems an adventure of discovery where it is okay to make a mistake, as long as you learn from it. Enjoy engaging in math problems together.
. | https://www.edubloxtutor.com/5-ways-to-help-your-child-get-better-at-math/ |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.